Professional Documents
Culture Documents
Ilovepdf Merged
Ilovepdf Merged
Ilovepdf Merged
2.1 Networks
Contents
Common Network Devices
Wi-Fi & Bluetooth
Cloud Computing
Extranet, Intranet & Internet
LAN & WAN
Page 1 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
The general format for a MAC address is that each pair of hexadecimal digits are separated by a “-”
An example of a MAC address:
Microsoft has an OUI of 00-15-5D,
a new laptop straight out of a Microsoft production line could have a MAC address of “00-15-5D-
45-1B-3F”
Exam Tip
Two completely different products can contain the same Network Interface Identifier but they
must use their own Organisational Unique Identifier
Microsoft can have the MAC Address 00-15-5D-45-1B-3F
Amazon can have the Mac Address 0C-5B-8F-45-1B-3F
Hubs
Hubs are devices that allow several other devices to be connected to them
Page 2 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Your notes
Page 3 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
1 DF-42-B2-11-4D-E3
2 11-14-F2-1D-C3-C6
Your notes
3 00-4B-17-7C-A2-C9
When a switch receives a data packet, it examines the destination MAC address of the box and looks
up that address in its lookup table
Once it has found the matching MAC address it will then forward the data packet to the corresponding
port
Worked example
Explain the difference between a switch and a hub regarding data forwarding capabilities.
[2]
A switch forwards data packets based on the destination MAC address and only sends data to the
intended device [1]
A hub broadcasts incoming data packets to all connected devices [1]
Bridges
Bridges are used to connect two networks or network segments to create a single larger network
An important note is that a bridge cannot communicate with external networks such as the internet like
a router can
Page 4 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 5 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Bluetooth Wi-Fi
Your notes
Maximum number of 30 (based on a standard consumer grade router with high end
7
connections options providing substantially more)
Worked example
A school IT team is trying to determine what technology they should use to connect students' tablets
around the school for data transfer and are unsure whether to choose Wi-Fi or Bluetooth technology.
Consider the advantages and limitations of both and justify your answer
[7]
WiFi offers significantly faster transfer rates compared to Bluetooth [1]
so students will be able to upload and download files faster [1]
WiFi coverage can be over a much larger area compared to Bluetooth [1]
so that students will be able to access resources wherever they are in the school [1]
Bluetooth however, is easy to set up [1]
students can transfer data without the school having to invest in expensive infrastructure [1]
Given the current situation, the school is in, the preferred choice for connecting student's tablets
would be Wi-Fi [1]
Page 6 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Cloud Computing
Your notes
Cloud Computing
Cloud computing is a method where data is stored on remote servers and accessed through the
internet
Local storage refers to a storage device that is connected to the computer
Page 7 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Accessibility
Cloud services are available globally and allow both remote working and data sharing
Reliability Your notes
Cloud computing providers offer high levels of uptime ensuring that services are always available
for its users
Storage Space
Cloud services can offer an almost unlimited amount of storage
Backup and recovery
If a customers machine or storage device fails, a backup of the data from the cloud will allow for
recovery
File Synchronisation
Files can be synced across multiple devices
Convenience
A user does not need to carry storage devices around with them as all data is stored on the cloud
Disadvantages of Cloud Storage
Internet Connection
A stable internet connection is required to use cloud storage
Security
Storing data in the cloud may be vulnerable to security breaches
Dependency
The user is dependent on the storage provider for the availability and reliability of its services
Ceases to trade/dissolve
Should the company dissolve or cease to change, all cloud data may be lost
Cost
As the amount of storage or bandwidth required increases, the service may become expensive
over time
Worked example
Explain the difference between cloud storage and local storage
[2]
Cloud storage involves storing data on remote servers accessed via the internet [1]
While local storage refers to storing data on physical devices like hard drives or flash drives [1]
Page 8 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Exam Tip
You must be very clear about the difference between the World Wide Web and the Internet
Page 9 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
The internet is a global network meaning that people from all over the world can communicate with
each other in real-time
Accessibility Your notes
The Internet is available to anyone who has a suitable device and access to any one of the
interconnected networks
The Internet has many uses and plays a critical role in our lives. This can include;
Education and training
Social Networking
Online shopping
Entertainment
Page 10 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Intranet
Intranets operate in a similar way to the Internet and although they are still networks, they are usually Your notes
private and are used to send information securely and safely
Unlike the Internet which is a global network accessible by all, access to an organisation’s Intranet is
restricted and only accessible to authorised users such as employees
Page 11 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
grows
Users will require a username and password to access the Intranet
Your notes
Page 12 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Extranet
An extranet is a private Intranet that also allows access by selected parties that reside outside of the Your notes
organisation. These parties, for example, maybe customers, key stakeholders or clients
External users will have an authorisation level once they have successfully logged in which will
determine which resources they may access
Page 13 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Worked example
Your notes
A company uses an Intranet. Explain what is meant by an Intranet
[2]
An Intranet is a private network that is accessible to employees of the organisation and not to
members of the public [1]
It provides employees access to company information and to share resources internally [1]
Page 14 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 15 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
WAN
Wireless LANs (WLANs) are Local Area Networks that allow devices to connect wirelessly rather than Your notes
using physical cables
Wireless Access Points (WAPs) are connected to an existing wired network which provides a means to
connect wirelessly
Wireless Access Points use spread spectrum technology that has a range of around 30 to 50 metres
compared to Infrared which has a range of around 3 metres
WLANs are often used when it is not practical to use cable or devices that will access the network do
not have Ethernet ports
WLANs support a vast range of devices such as smartphones and laptops and are very popular in
public areas such as shopping malls
Advantages of a WLAN include:
Mobility - WLAN allows users to connect anywhere that is in the range of a Wireless Access Point
(WAP) without the need for additional hardware or wiring.
Flexibility - WLANS can be used in a variety of environments both indoors and out making them
highly flexible
Scalability - As the requirements change, additional Wireless Access Points can be added
relatively easily resulting in additional users being able to use the network or increased network
coverage
Wireless devices have access to peripherals such as printers
Disadvantages of a WLAN include:
Coverage - WLANS are limited in their coverage and can be further affected by walls and other
structures
Bandwidth - Bandwidth speeds can become an issue in high traffic areas
Interference - WLANs can sustain interference from other devices which can affect performance
and connectivity
Security - WLANs can be vulnerable to security threats due to wireless signals being intercepted
Page 16 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Worked example
Your notes
Give 2 reasons why a fitness centre may want to install a WLAN
[4]
The fitness centre may wish to install a WLAN for several reasons such as :
Customers can connect to their Wi-Fi and search for information such as class times etc [1]
will improve customer services [1]
Staff at the fitness centre will be able to access resources wirelessly such as printers [1]
allowing them to move freely around the centre [1]
Page 17 of 17
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 1 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Security Issues
Your notes
Security Issues
When moving electronic data from one place to another, there are different types of security concerns
to consider:
Data interception can occur when an unauthorised user intercepts data being transferred.
Two common methods are:
Packet sniffing
Man in the middle attack
Encryption can be broken if it is not strong
Using HTTP instead of HTTPS protocols when dealing with sensitive information
Depending on whether the data being sent is sensitive will depend on the level of security needed to
ensure it stays safe
All types of information will need to be transferred from one place to another at some point but typical
examples may include:
User credentials when logging into online banking
Medical records being passed from a hospital to a GP
Student details from one school to another
Criminal records and details
When dealing with personal or sensitive data it is essential that not only is it protected from hackers but
also that it is protected from accidental disclosures such as:
Sending an email with sensitive information to the wrong person
Losing a device that has sensitive data stored
Shared access misconfigurations allow unauthorised users access to sensitive data
Page 2 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 3 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Authentication
There are also other forms of authentication aside from passwords that utilise what is known as “zero Your notes
login”
This aims at removing or reducing the need for the user to manually input their details and instead rely
on the system to verify the users credentials automatically
One such type is known as biometrics where the user's fingerprints or facial features are scanned to
provide unique biometric information to authenticate the user's details.
Newer methods of zero login types of authentication include the use of networks, location, device
data and human behavioural patterns to recognise users automatically.
Although these methods offer many advantages there are some concerns that need to be taken into
consideration. They include:
What personal data is being collected?
Is the collected data being kept securely?
Will it log in and out at the correct times?
Magnetic Stripe Cards
Magnetic stripe cards are a form of card that stores the user’s data on a magnetic strip usually on the
reverse side
The user scans the card through a reader where the details stored on the card are compared to the
details stored within the system. It the data from the card matches the data that is store on the system
the user is authenticated and granted access
The advantages to use magnetic stripe cards include:
Widely used and accepted
Cheap
Simple to use
A single card can serve multiple purposes within an organisation such as doors, purchasing food
from canteens and accessing IT equipment
Disadvantages to magnetic stripe cards include:
Some cards use a holographic or photographic ID to detect forged or stolen copies
The card can may need to be scanned multiple times before the user is accepted and
authenticated
Cards can become damaged or wear out over time (especially with constant use)
Cards can be easily cloned
Smart Cards
Smart Cards are cards that contain a chip and can be used as contactless
The card does not need to be inserted or swiped through a machine and can be detected from a short
distance away
Personal identification information can be stored on the card such as name, address, date of birth
and/or banking information
The information on the card is encrypted which means it can only be read by authorised devices
Page 4 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Often the card will require a personal identification number (PIN) which is needed to access the
information, providing an additional layer of security
Advantages of smart cards include: Your notes
Durable
Use for a wide range of applications (Payments, Access Control, Storing personal data
Enhanced security (Compared to standard cards)
Disadvantages of smart cards include:
Risk of loss
Initial Infrastructure requirements
More expensive compared to traditional cards
Physical Tokens
A Physical Token enables authentication with the use of a small physical device
To access a system that uses a physical token, a user will enter their username and password into the
system, and then enter the security code generated by the token
The physical token can be directly connected to the device that the user is trying to access or the
physical token will generate one time password (OTP) which is then entered into the system manually
To obtain a one time password (OTP) the user will enter their personal identification number (PIN) and
any other authentication requirements into the physical token device. If all requirements are satisfied
then an internal clock will be used to generate the one time password (OTP) which is displayed on its
screen
To enhance security, the one time password (OTP) changes frequently and each code will only be valid
for a short period of time (usually within 1 minute)
Advantages of physical tokens include:
Offline authentication
Portable
Disadvantages of physical tokens include:
Cost
Loss or theft of the physical token
Physical dependance
There are two typical of physical token:
Disconnected physical token
When using a disconnected physical token, a separate device is used to generate the one time
password (OTP) which the user will then enter into the system manually
Connected physical token
When using a connected physical token, the one time password (OTP) is generated and passed
to the system automatically though a physical connection and does not require to user to enter the
password manually
Electronic tokens
Page 5 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Electronic Tokens are a form of application software that is installed on a user's device (usually
smartphone) to allow them to authenticate their details and allow them to access a secure website
A user must download and register the electronic token software app prior to accessing the secure Your notes
website
As the website prompts for authentication, the user will open the app that will provide a one time
passcode (OTP) which will be entered into an entry box on the website along with other forms of
authentication such as a username and personal identification number (PIN)
Both the web server and the smartphone application have synchronised clocks which will generate
identical numbers and should the authentication details match, the user will be granted access to the
website
The above explanation is just one method of authentication when using electronic tokens. Another
method is as follows:
The website will prompt the user for their username and password
Upon successful credentials the website will generate a code
The code is then entered into the application software on the users phone which will generate
another code
The generated code from the application software is then entered into an entry box on the
website
Should all authentication methods pass successfully, the user is granted access to the website
Page 6 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Anti-malware
Your notes
Anti-malware
Anti-Malware (also known as Anti Virus software) is designed to protect devices against viruses and
malicious software
Anti-malware has 3 mains purposes, detect, prevent and remove malicious software
Anti-Malware is installed onto a computer system and will operate in the background
Common features of Anti-Malware software include the following:
Comparing the scanned files against a large database of known threats
Real-time scanning
Regular updates to gather an up to date list of known threats
Quarantine of infected files
Quarantining files allows threats to be automatically deleted
Allows the user to determine if the file is a legitimate threat and not a false positive
Scanning external storage media such as USB flash drives to prevent viruses from being loaded
onto the computer system
The scanning of downloaded software to ensure that it is free from any threats
Heuristic checking
This is the identification of potential threats within a file from behavioural patterns and
characteristics rather than just relying on a database of known viruses
Worked example
Give two examples of how Anti-Malware protects devices against malicious software
[4]
Regular updates by the Anti-Malware software will keep an up to date list of threats [1]
If any of the threats are detected on the device, the Anti-Malware software will quarantine the files [1]
Anti-Malware software will scan external storage media when they are connected to the device [1]
Preventing viruses from being transferred from storage media onto the device [1]
Page 7 of 7
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 1 of 5
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Page 2 of 5
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Over-reliance on these devices can decrease face-to-face interaction, impacting social skills
Physical fitness
Your notes
Despite fitness tracking, sedentary behaviour may increase due to the convenience of smart
devices
Impact of Microprocessors on Transport
Positive effects on data security, autonomous vehicles, and transport safety include:
Efficiency
Autonomous vehicles optimise routes, reducing travel time and fuel consumption
Safety
Advanced safety features, like automatic braking and lane assist, can reduce accidents
Data security
Real-time tracking and encryption help protect against theft or loss
Negative effects include:
Privacy issues
Data collected by these vehicles could be misused or hacked
Job losses
Autonomous vehicles could replace jobs in transport industries, leading to unemployment
Safety risks
Malfunctions in autonomous vehicle systems could lead to accidents
Page 3 of 5
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Worked example
Your notes
Microprocessor-controlled devices in the home have had positive effects on people’s lifestyles. One
of the positive effects of using these devices is that we can now set a cooker to switch on whilst we are
out so that we arrive home to a cooked meal. Describe the positive effects of using other
microprocessor-controlled devices in the home.
[4]
Four of:
Microprocessor-controlled devices reduce the need for people to do manual tasks at home [1]
People can use microprocessor-controlled devices for physical fitness tracking in the home [1]
People have more time to spend on leisure activities/shopping/socialising [1]
Increased sense of security as homes are protected with burglar alarms/ smoke alarms/fire alarms [1]
Smart fridges can be used to improve healthy lifestyle//Smart fridges automatically order fresh
food//Smart fridges reduce food waste [1]
Microprocessor-controlled devices can be set remotely using a smartphone [1]
Saves fuel as the heating/air conditioning is not on all day [1]
Reduces injuries by using microprocessor-controlled lights outside [1]
Page 4 of 5
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers
Head to www.savemyexams.com for more awesome resources
Health Issues
Your notes
Health Issues When Using Computers
Common health issues related to extensive ICT use include:
Repetitive Strain Injury (RSI)
A condition affecting muscles and nerves, often caused by repetitive movements and overuse
Back problems
Poor posture while using devices can lead to back pain and other related issues
Eye problems
Strain and fatigue from staring at screens for long periods can harm vision
Headaches
Overuse of ICT devices can cause headaches, usually due to eye strain or poor posture
Poor posture, particularly when using Correct posture, ergonomic furniture, and
Back problems
devices for long periods. regular movement.
Prolonged screen time leads to digital eye Regular breaks from the screen, appropriate
Eye problems strain, characterised by dryness, irritation, screen brightness, and maintaining an
and blurred vision. appropriate distance from the screen.
Factors such as poor posture, eye strain, Regular breaks, maintaining good posture,
Headaches
or stress from overuse of devices. and ensuring proper screen brightness.
Page 5 of 5
© 2015-2024 Save My Exams, Ltd. · Revision Notes, Topic Questions, Past Papers