Ilovepdf Merged

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Head to www.savemyexams.

com for more awesome resources

CIE IGCSE ICT Your notes

2.1 Networks
Contents
Common Network Devices
Wi-Fi & Bluetooth
Cloud Computing
Extranet, Intranet & Internet
LAN & WAN

Page 1 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Common Network Devices


Your notes
Common Network Devices
Network Interface Cards (NICs)
Network Interface Cards (NIC) allow an electronic device to be connected to a network
Network Interface Cards are connected to the motherboard but in most modern systems are usually
integrated
Each network interface card has a unique identifier which is known as a media access control address
or MAC address which is created during the manufacturing process
Wireless Network Interface Cards (WNIC) are the same as a NIC but use wireless connectivity to
connect devices to networks
A MAC address is a 48 bit hexadecimal code where 12 hexadecimal characters are grouped in pairs

The general format for a MAC address is that each pair of hexadecimal digits are separated by a “-”
An example of a MAC address:
Microsoft has an OUI of 00-15-5D,
a new laptop straight out of a Microsoft production line could have a MAC address of “00-15-5D-
45-1B-3F”

Exam Tip
Two completely different products can contain the same Network Interface Identifier but they
must use their own Organisational Unique Identifier
Microsoft can have the MAC Address 00-15-5D-45-1B-3F
Amazon can have the Mac Address 0C-5B-8F-45-1B-3F

Hubs
Hubs are devices that allow several other devices to be connected to them

Page 2 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Your notes

Hubs are generally much cheaper than switches but:


When a hub receives a data packet it will broadcast it to every device on the network
This creates two potential issues:
As the information is being broadcast to every device it will make unnecessary traffic especially if
there are a large number of devices
As every device will receive the data packet, security may be a concern
Switches
Switches are also used to connect several devices together just like a hub; however, rather than
sending data packets to all devices on the network, the switch will only send the data to its intended
device

This is done by each switch having a lookup table

Port Mac address

Page 3 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
Your notes
3 00-4B-17-7C-A2-C9

When a switch receives a data packet, it examines the destination MAC address of the box and looks
up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to the corresponding
port

Worked example
Explain the difference between a switch and a hub regarding data forwarding capabilities.
[2]
A switch forwards data packets based on the destination MAC address and only sends data to the
intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]

Bridges
Bridges are used to connect two networks or network segments to create a single larger network
An important note is that a bridge cannot communicate with external networks such as the internet like
a router can

Page 4 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Wi-Fi & Bluetooth


Your notes
Wi-Fi & Bluetooth
Bluetooth is a wireless communication technology that allows devices to be connected within a
maximum range of about 30 meters
Before communication can happen, two devices connect using a process called “pairing” to establish
a secure connection
When two devices pair, they both exchange a cryptographic key. Both these keys are used to
generate a secret shared key which is used to encrypt the data between the two devices and create a
Wireless Personal Area Network (WPAN)
Bluetooth operates using a frequency range of around 2.4Ghz
Connected devices continuously change their transmitting frequency between 79 different channels
to avoid interference and improve the reliability of the connection. This is known as the frequency
hopping spread spectrum (FHSS)
Bluetooth may be preferred over Wi-Fi when:
File transfer required between two close-range devices such as a laptop and smartphone without
the need for internet connectivity
Streaming audio from a smartphone to another wireless device such as a speaker or headphones
Connecting to a car system allows for music streaming and hands-free calling
When low power communication is required
Wi-Fi is also a wireless communication technology that allows devices to be connected up to a range
of about 100 meters depending on the standard that is being used
Wi-Fi operates across the 2.4Ghz and 5Ghz frequency ranges and although 5Ghz is faster, the 2.4 GHz
range is preferred as the lower frequencies often travel further and penetrate obstacles more easily
Similar to Bluetooth bands are split into channels
Wi-Fi-enabled devices connect to a network by connecting to a hotspot or wireless access point
(WAP) also referred to as an access point (AP)
Wi-Fi may be preferred over Bluetooth when:
High speed data transfer is required
Long range communication is required
Many devices are needed to be connected at the same time
Similarities between Bluetooth and Wi-FI
Use radio waves for wireless technologies
Can connect multiple devices
Support encryption for secure connections
Based on industry standards that are universally accepted
It can be used to connect Internet of Things (IoT) devices and applications
Differences between Bluetooth and -Wi-Fi

Page 5 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Bluetooth Wi-Fi
Your notes

Maximum number of 30 (based on a standard consumer grade router with high end
7
connections options providing substantially more)

Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz

Maximum range (meters) 30 meters 100 meters (depending on obstructions)

Maximum transfer speed


3 Mbytes /
(Depending on the standard 75 Mbytes / Sec
Sec
being used)

Worked example
A school IT team is trying to determine what technology they should use to connect students' tablets
around the school for data transfer and are unsure whether to choose Wi-Fi or Bluetooth technology.
Consider the advantages and limitations of both and justify your answer
[7]
WiFi offers significantly faster transfer rates compared to Bluetooth [1]
so students will be able to upload and download files faster [1]
WiFi coverage can be over a much larger area compared to Bluetooth [1]
so that students will be able to access resources wherever they are in the school [1]
Bluetooth however, is easy to set up [1]
students can transfer data without the school having to invest in expensive infrastructure [1]
Given the current situation, the school is in, the preferred choice for connecting student's tablets
would be Wi-Fi [1]

Page 6 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Cloud Computing
Your notes
Cloud Computing
Cloud computing is a method where data is stored on remote servers and accessed through the
internet
Local storage refers to a storage device that is connected to the computer

The three types of cloud storage are:


Public Cloud - The customer and the cloud storage provider are different companies
Private Cloud - The customer and the cloud storage provider are a single organisation
Hybrid Cloud - Combines both public and private cloud options and allows for sensitive data to
remain private whilst providing public cloud services for less sensitive information
Cloud data is duplicated and stored on other servers to ensure data availability during system failures,
upgrades and maintenance periods
Advantages of Cloud storage
Scalability
As the business requirements change the customer can scale services up or down to meet their
needs
Cost saving
Cloud storage eliminates the need for a business to purchase expensive equipment for
infrastructure and maintenance which can result in significant cost savings

Page 7 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Accessibility
Cloud services are available globally and allow both remote working and data sharing
Reliability Your notes
Cloud computing providers offer high levels of uptime ensuring that services are always available
for its users
Storage Space
Cloud services can offer an almost unlimited amount of storage
Backup and recovery
If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
File Synchronisation
Files can be synced across multiple devices
Convenience
A user does not need to carry storage devices around with them as all data is stored on the cloud
Disadvantages of Cloud Storage
Internet Connection
A stable internet connection is required to use cloud storage
Security
Storing data in the cloud may be vulnerable to security breaches
Dependency
The user is dependent on the storage provider for the availability and reliability of its services
Ceases to trade/dissolve
Should the company dissolve or cease to change, all cloud data may be lost
Cost
As the amount of storage or bandwidth required increases, the service may become expensive
over time

Worked example
Explain the difference between cloud storage and local storage
[2]
Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash drives [1]

Page 8 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Extranet, Intranet & Internet


Your notes
Internet
The Internet is a very large global network that consists of many other interconnected networks
The world wide web is the vast collection of web pages that can be accessed using a web browser
The world wide web allows you to access information by using the internet

Exam Tip
You must be very clear about the difference between the World Wide Web and the Internet

Characteristics of the Internet


Open
The Internet is an open network meaning anyone with access can access the same resources and
information as everybody else
Decentralisation
The Internet is a decentralised network with no owner, controller or governing body. Instead, it is
made up of vast numbers of interconnecting networks that operate independently but work
together to provide communication
Global Reach

Page 9 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

The internet is a global network meaning that people from all over the world can communicate with
each other in real-time
Accessibility Your notes
The Internet is available to anyone who has a suitable device and access to any one of the
interconnected networks

The Internet has many uses and plays a critical role in our lives. This can include;
Education and training
Social Networking
Online shopping
Entertainment

Page 10 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Intranet
Intranets operate in a similar way to the Internet and although they are still networks, they are usually Your notes
private and are used to send information securely and safely
Unlike the Internet which is a global network accessible by all, access to an organisation’s Intranet is
restricted and only accessible to authorised users such as employees

Intranets have many advantages over the internet such as:


Better bandwidth than the internet
Data is kept within the organisation
Less chance of hacking and attacks
Administrators can manage access to external sites and links
Characteristics of an Intranet
Private
An intranet is a private network that is accessible to employees within a company or organisation
Security
An intranet is usually behind a firewall to ensure security and that only authorised users can access
it
Sharing and Communication
An Intranet allows for document sharing and the use of collaboration tools between users. It can
also allow the use of email and video calling to enable efficient communication within the
organisation
Customisation
An intranet can be customised to meet the specific requirements of the business such as
navigation and subject content as well as the service being able to be scaled up as the business

Page 11 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

grows
Users will require a username and password to access the Intranet
Your notes

Page 12 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Extranet
An extranet is a private Intranet that also allows access by selected parties that reside outside of the Your notes
organisation. These parties, for example, maybe customers, key stakeholders or clients
External users will have an authorisation level once they have successfully logged in which will
determine which resources they may access

Similarities between the Internet, Intranet and extranet are as follows:


They are all web based technologies
They allow users to access information remotely
They all use client server architecture
They all use security measures such as authentication and encryption
They all promote and facilitate information and resource sharing
Differences between the internet, intranet and extranet are as follows:
The internet is a global network whereas an intranet/extranet is a private network contained within
an organisation
The use of the internet covers a wide range of purposes whereas an intranet/extranet is designed
for specific users and purposes
Much of the information is publicly available whereas an intranet/extranet is not
The internet is not owned solely by one person or organisation whereas intranets/extranets are
owned usually by the organisation

Page 13 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Worked example
Your notes
A company uses an Intranet. Explain what is meant by an Intranet
[2]
An Intranet is a private network that is accessible to employees of the organisation and not to
members of the public [1]
It provides employees access to company information and to share resources internally [1]

Page 14 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

LAN & WAN


Your notes
LAN
Local Area Networks (LANs) are networks that are usually contained within a single building or small
geographical location
A LAN is made up using hubs and/or switches which will connect several devices together
It is common for one hub or switch to be connected to a router which will allow the LAN connectivity to
other outside networks such as the internet
A LAN can offer many advantages such as:
Centralised management - A LAN allows centralised management of updates, backups and
software installations.
Security - A LAN can secure its devices with the use of firewalls, antivirus software and other
security features to prevent unauthorised access
File Sharing and Collaboration - A LAN allows users on the network to share resources such as
printers and other peripherals. This also allows the users of the network to collaborate and share
files and folders
Disadvantages of a LAN include:
If hardware fails, the network may not function properly or even at all
Networks are more prone to attacks than standalone computers
Access to data and peripherals can be slow depending on network traffic
Maintenance - LAN networks require maintenance to ensure that software is up to date, upgrades
and backups which can be costly

Page 15 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

WAN
Wireless LANs (WLANs) are Local Area Networks that allow devices to connect wirelessly rather than Your notes
using physical cables
Wireless Access Points (WAPs) are connected to an existing wired network which provides a means to
connect wirelessly
Wireless Access Points use spread spectrum technology that has a range of around 30 to 50 metres
compared to Infrared which has a range of around 3 metres
WLANs are often used when it is not practical to use cable or devices that will access the network do
not have Ethernet ports
WLANs support a vast range of devices such as smartphones and laptops and are very popular in
public areas such as shopping malls
Advantages of a WLAN include:
Mobility - WLAN allows users to connect anywhere that is in the range of a Wireless Access Point
(WAP) without the need for additional hardware or wiring.
Flexibility - WLANS can be used in a variety of environments both indoors and out making them
highly flexible
Scalability - As the requirements change, additional Wireless Access Points can be added
relatively easily resulting in additional users being able to use the network or increased network
coverage
Wireless devices have access to peripherals such as printers
Disadvantages of a WLAN include:
Coverage - WLANS are limited in their coverage and can be further affected by walls and other
structures
Bandwidth - Bandwidth speeds can become an issue in high traffic areas
Interference - WLANs can sustain interference from other devices which can affect performance
and connectivity
Security - WLANs can be vulnerable to security threats due to wireless signals being intercepted

Page 16 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Worked example
Your notes
Give 2 reasons why a fitness centre may want to install a WLAN
[4]
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times etc [1]
will improve customer services [1]
Staff at the fitness centre will be able to access resources wirelessly such as printers [1]
allowing them to move freely around the centre [1]

Page 17 of 17

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

CIE IGCSE ICT Your notes

2.2 Network Issues


Contents
Security Issues
Passwords & Authentication
Anti-malware

Page 1 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Security Issues
Your notes
Security Issues
When moving electronic data from one place to another, there are different types of security concerns
to consider:
Data interception can occur when an unauthorised user intercepts data being transferred.
Two common methods are:
Packet sniffing
Man in the middle attack
Encryption can be broken if it is not strong
Using HTTP instead of HTTPS protocols when dealing with sensitive information
Depending on whether the data being sent is sensitive will depend on the level of security needed to
ensure it stays safe
All types of information will need to be transferred from one place to another at some point but typical
examples may include:
User credentials when logging into online banking
Medical records being passed from a hospital to a GP
Student details from one school to another
Criminal records and details
When dealing with personal or sensitive data it is essential that not only is it protected from hackers but
also that it is protected from accidental disclosures such as:
Sending an email with sensitive information to the wrong person
Losing a device that has sensitive data stored
Shared access misconfigurations allow unauthorised users access to sensitive data

Page 2 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Passwords & Authentication


Your notes
Passwords
Passwords are a common form of security and are often accompanied by a username or email address
This type of security is often seen when accessing online banking, virtual learning environments, email
accounts and many more
There are many ways to enhance the security of your password such as the following:
Ensure that the password is changed regularly in case it has been obtained illegally or accidentally
Ensure that the password uses a combination of uppercase, lowercase, numbers and symbols to
make the password more difficult to guess
iloveict is a weak password
1lov3ICT# is a strong password
Passwords should not contain personal information related to you such as your date of birth, your name
or the name of your pet
Anti spyware software can be run regularly to ensure that your information including your password is
not being passed to an unauthorised third party user

Page 3 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Authentication
There are also other forms of authentication aside from passwords that utilise what is known as “zero Your notes
login”
This aims at removing or reducing the need for the user to manually input their details and instead rely
on the system to verify the users credentials automatically
One such type is known as biometrics where the user's fingerprints or facial features are scanned to
provide unique biometric information to authenticate the user's details.
Newer methods of zero login types of authentication include the use of networks, location, device
data and human behavioural patterns to recognise users automatically.
Although these methods offer many advantages there are some concerns that need to be taken into
consideration. They include:
What personal data is being collected?
Is the collected data being kept securely?
Will it log in and out at the correct times?
Magnetic Stripe Cards
Magnetic stripe cards are a form of card that stores the user’s data on a magnetic strip usually on the
reverse side
The user scans the card through a reader where the details stored on the card are compared to the
details stored within the system. It the data from the card matches the data that is store on the system
the user is authenticated and granted access
The advantages to use magnetic stripe cards include:
Widely used and accepted
Cheap
Simple to use
A single card can serve multiple purposes within an organisation such as doors, purchasing food
from canteens and accessing IT equipment
Disadvantages to magnetic stripe cards include:
Some cards use a holographic or photographic ID to detect forged or stolen copies
The card can may need to be scanned multiple times before the user is accepted and
authenticated
Cards can become damaged or wear out over time (especially with constant use)
Cards can be easily cloned
Smart Cards
Smart Cards are cards that contain a chip and can be used as contactless
The card does not need to be inserted or swiped through a machine and can be detected from a short
distance away
Personal identification information can be stored on the card such as name, address, date of birth
and/or banking information
The information on the card is encrypted which means it can only be read by authorised devices

Page 4 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Often the card will require a personal identification number (PIN) which is needed to access the
information, providing an additional layer of security
Advantages of smart cards include: Your notes
Durable
Use for a wide range of applications (Payments, Access Control, Storing personal data
Enhanced security (Compared to standard cards)
Disadvantages of smart cards include:
Risk of loss
Initial Infrastructure requirements
More expensive compared to traditional cards
Physical Tokens
A Physical Token enables authentication with the use of a small physical device
To access a system that uses a physical token, a user will enter their username and password into the
system, and then enter the security code generated by the token
The physical token can be directly connected to the device that the user is trying to access or the
physical token will generate one time password (OTP) which is then entered into the system manually
To obtain a one time password (OTP) the user will enter their personal identification number (PIN) and
any other authentication requirements into the physical token device. If all requirements are satisfied
then an internal clock will be used to generate the one time password (OTP) which is displayed on its
screen
To enhance security, the one time password (OTP) changes frequently and each code will only be valid
for a short period of time (usually within 1 minute)
Advantages of physical tokens include:
Offline authentication
Portable
Disadvantages of physical tokens include:
Cost
Loss or theft of the physical token
Physical dependance
There are two typical of physical token:
Disconnected physical token
When using a disconnected physical token, a separate device is used to generate the one time
password (OTP) which the user will then enter into the system manually
Connected physical token
When using a connected physical token, the one time password (OTP) is generated and passed
to the system automatically though a physical connection and does not require to user to enter the
password manually

Electronic tokens

Page 5 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Electronic Tokens are a form of application software that is installed on a user's device (usually
smartphone) to allow them to authenticate their details and allow them to access a secure website
A user must download and register the electronic token software app prior to accessing the secure Your notes
website
As the website prompts for authentication, the user will open the app that will provide a one time
passcode (OTP) which will be entered into an entry box on the website along with other forms of
authentication such as a username and personal identification number (PIN)
Both the web server and the smartphone application have synchronised clocks which will generate
identical numbers and should the authentication details match, the user will be granted access to the
website
The above explanation is just one method of authentication when using electronic tokens. Another
method is as follows:
The website will prompt the user for their username and password
Upon successful credentials the website will generate a code
The code is then entered into the application software on the users phone which will generate
another code
The generated code from the application software is then entered into an entry box on the
website
Should all authentication methods pass successfully, the user is granted access to the website

Page 6 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Anti-malware
Your notes
Anti-malware
Anti-Malware (also known as Anti Virus software) is designed to protect devices against viruses and
malicious software
Anti-malware has 3 mains purposes, detect, prevent and remove malicious software
Anti-Malware is installed onto a computer system and will operate in the background
Common features of Anti-Malware software include the following:
Comparing the scanned files against a large database of known threats
Real-time scanning
Regular updates to gather an up to date list of known threats
Quarantine of infected files
Quarantining files allows threats to be automatically deleted
Allows the user to determine if the file is a legitimate threat and not a false positive
Scanning external storage media such as USB flash drives to prevent viruses from being loaded
onto the computer system
The scanning of downloaded software to ensure that it is free from any threats
Heuristic checking
This is the identification of potential threats within a file from behavioural patterns and
characteristics rather than just relying on a database of known viruses

Worked example
Give two examples of how Anti-Malware protects devices against malicious software
[4]
Regular updates by the Anti-Malware software will keep an up to date list of threats [1]
If any of the threats are detected on the device, the Anti-Malware software will quarantine the files [1]
Anti-Malware software will scan external storage media when they are connected to the device [1]
Preventing viruses from being transferred from storage media onto the device [1]

Page 7 of 7

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

CIE IGCSE ICT Your notes

3.1 The Effects of Using IT


Contents
Microprocessor Controlled Devices
Health Issues

Page 1 of 5

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Microprocessor Controlled Devices


Your notes
Microprocessor Controlled Devices
A microprocessor is a small computer chip that can be used to control devices. It is made up of a central
processing unit (CPU), memory, and input/output (I/O) devices. The CPU is responsible for carrying out
instructions, the memory stores data, and the I/O devices allow the microprocessor to communicate with
the outside world.
Microprocessor controlled devices are used in a wide variety of applications, including:
Household appliances, such as washing machines, refrigerators, and ovens
Office equipment, such as printers, scanners, and photocopiers
Industrial machineries, such as robots and assembly lines
Transportation, such as cars, aeroplanes, and trains
Medical devices, such as pacemakers and insulin pumps
Impact of Microprocessors on Home Life
Positive effects on lifestyle, leisure, physical fitness, and data security include:
Convenience
Devices such as smart thermostats, lights, and appliances can be controlled remotely, saving
time and effort
People have more time to spend on the things they want
Smart fridges automatically order fresh food and therefore reduce food waste
Fitness tracking
Devices like smart watches monitor physical activity and health data, encouraging healthier
lifestyles
Security
Smart security systems provide real-time surveillance, adding an extra layer of protection to
homes
Negative effects include:
Privacy risks
These devices can be vulnerable to hacking, risking the security of personal data
Social interaction

Page 2 of 5

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Over-reliance on these devices can decrease face-to-face interaction, impacting social skills
Physical fitness
Your notes
Despite fitness tracking, sedentary behaviour may increase due to the convenience of smart
devices
Impact of Microprocessors on Transport
Positive effects on data security, autonomous vehicles, and transport safety include:
Efficiency
Autonomous vehicles optimise routes, reducing travel time and fuel consumption
Safety
Advanced safety features, like automatic braking and lane assist, can reduce accidents
Data security
Real-time tracking and encryption help protect against theft or loss
Negative effects include:
Privacy issues
Data collected by these vehicles could be misused or hacked
Job losses
Autonomous vehicles could replace jobs in transport industries, leading to unemployment
Safety risks
Malfunctions in autonomous vehicle systems could lead to accidents

Page 3 of 5

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Worked example
Your notes
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles. One
of the positive effects of using these devices is that we can now set a cooker to switch on whilst we are
out so that we arrive home to a cooked meal. Describe the positive effects of using other
microprocessor-controlled devices in the home.
[4]
Four of:
Microprocessor-controlled devices reduce the need for people to do manual tasks at home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the home [1]
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke alarms/fire alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically order fresh
food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]

Page 4 of 5

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources

Health Issues
Your notes
Health Issues When Using Computers
Common health issues related to extensive ICT use include:
Repetitive Strain Injury (RSI)
A condition affecting muscles and nerves, often caused by repetitive movements and overuse
Back problems
Poor posture while using devices can lead to back pain and other related issues
Eye problems
Strain and fatigue from staring at screens for long periods can harm vision
Headaches
Overuse of ICT devices can cause headaches, usually due to eye strain or poor posture

Health Issue Causes Prevention Strategies

Repetitive Repeated physical movements do


Regular breaks, ergonomic equipment, and
Strain Injury damage to tendons, nerves, muscles, and
correct typing techniques.
(RSI) other soft body tissues.

Poor posture, particularly when using Correct posture, ergonomic furniture, and
Back problems
devices for long periods. regular movement.

Prolonged screen time leads to digital eye Regular breaks from the screen, appropriate
Eye problems strain, characterised by dryness, irritation, screen brightness, and maintaining an
and blurred vision. appropriate distance from the screen.

Factors such as poor posture, eye strain, Regular breaks, maintaining good posture,
Headaches
or stress from overuse of devices. and ensuring proper screen brightness.

Page 5 of 5

© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers

You might also like