-
Transition 2020 Y11 into Y12
Information Technology Cambridge Technical L3
The aim of this course is to develop students’ knowledge, understanding and
skills of the principles of IT and Global Information Systems. Students will gain
an insight into the IT sector as they investigate the pace of technological
change, IT infrastructure, the flow of information on a global scale, and the
importance of legal and security considerations.
Section A: There are 5 theory topics to explore:
❏ Study the presentation for each topic
❏ Watch the video clips
❏ Answer the questions in the booklet
IT CambTech_Transition 2020 HHS STUDENT BOOKLET.docx
NB You will need to be signed in with your haslingdenhigh.com account on your device to
access the links to presentations, and have access to YouTube for the video clips.
1. Online systems – cloud computing
Presentation: Topic 1 Cloud computing.pptx Describe the personal and professional uses and implications of cloud storage and cloud
computing.
Describe the impact and implications on individuals and organisations of using cloud storage and
computing.
What is the cloud, Linus? https://www.youtube.com/watch?v=dsKIpLKo8AE
2. Internet connection technologies – connection
types
Presentation: Topic 2 Connection types.pptx Examine the implications of selecting and using different connection types.
Evaluate the impact of connection types on the performance of an IT system.
EE 5G winner at Wembley https://www.youtube.com/watch?v=_vzVTD-EcJ4
Surf air travel club https://www.youtube.com/watch?v=GgzTjmAcsZw
https://drive.google.com/open?id=1ByXQYojFrHsfhkEoJSN4d22BmCQqZXAXhttps://drive.google.com/open?id=1FffCQpxXkDiEPj188s2cRZd0brjd04brhttps://www.youtube.com/watch?v=dsKIpLKo8AEhttps://drive.google.com/open?id=1hQjf9j0mes7Z0WItu1RZ8xCoM_lqvAxEhttps://www.youtube.com/watch?v=_vzVTD-EcJ4https://www.youtube.com/watch?v=GgzTjmAcsZw
-
3. Current legislation - laws relating to IT, computing
devices or data
Presentation: Topic 3 Current Legislation.pptx Describe the role of current legislation (and subsequent additions and amendments) in protecting
users and their data from attack or misuse.
https://www.gov.uk/personal-data-my-employer-can-keep-about-me
Andrew and Pete try hard to explain GDPR… https://www.youtube.com/watch?v=tBEMNcMihl4
4. Impact of threats to data, information and systems
Presentation: Topic 4 Impact of threats.pptx Describe the impact of threats to data, information and systems: on individuals; on organisations.
Apply this understanding with foresight to different scenarios.
Interesting example from the National Crime Agency https://youtu.be/yrjT8m0h cKU
https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/fraud-and-economic-crime
5. Global and environmental issues – relating to the
use of information technology
Presentation: Topic 5 Global and Environmental Issues.pptx Describe the moral and ethical factors relating to:
• Globalisation; on individuals; on organisations
• Unequal access to information technology
• Environmental factors
What happens to old devices? Recycled ethically or not?
https://www.youtube.com/watch?v=vufLW4xOsS4
BAN’s mission is to champion global environmental health and justice by campaigning for
everyone’s right to a clean environment. Check out https://www.ban.org/
Section B: Practical skills, including web authoring, are an
essential component of the course:
❏ Make an account with wordpress.com then start practising!
❏ Pick a small business (real or imaginary) and work through the tutorial
https://wordpress.com/support/tutorials/business-website-tutorial/
https://drive.google.com/open?id=1Bq7UEqEsDEwN0opH87X0_2xQXBDZ11zXhttps://www.gov.uk/personal-data-my-employer-can-keep-about-mehttps://www.youtube.com/watch?v=tBEMNcMihl4https://drive.google.com/open?id=1ymfY5yMSniqI_AGNXf7VgxaWixsDpNYThttps://youtu.be/yrjT8m0hcKUhttps://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/fraud-and-economic-crimehttps://drive.google.com/open?id=1j4v1YiOmdTMU7U1v1GrBuw78xXTkljKlhttps://www.youtube.com/watch?v=vufLW4xOsS4https://www.ban.org/https://wordpress.com/support/tutorials/business-website-tutorial/
-
Worksheet 1 CLOUD COMPUTING
1
Online systems – cloud computing
Task 1
(a) Choose one of the following cloud storage providers, or another cloud storage provider that you use or are interested in.
• Dropbox
• Google Drive
• Microsoft OneDrive
• iDrive
• CertainSafe Digital Safety Deposit Box
(b) For your chosen provider, what are the features that cloud storage offers
businesses and individuals?
-
Worksheet 1 CLOUD COMPUTING
2
Task 2
Research the Internet of Things (IoT) in order to answer the following questions.
(a) What is the IoT?
(b) Why does it matter?
(c) Is it secure?
(d) How many IoT devices are there currently? What are the predictions for the future?
-
Worksheet 1 CLOUD COMPUTING
3
Task 3
The table below shows how traditionally software has been purchased, installed, maintained and supported. Complete the table to show how these processes happen for Software as a Service (SaaS).
Traditional software Software as a Service
Purchase Typically, a licence will be purchased which allows the organisation to use the software
The software itself will be downloaded or sent on a CD/DVD
Installation New equipment such as servers / hard disks may need to be purchased before the software can be installed
An operating system will need to be purchased and installed
Any other software which the purchased software depends on to work will also need to be purchased and installed
The software is installed and configured
It may be that this process needs to be repeated across hundreds of personal computers in the organisation
Maintenance and support
An in-house IT technician will need to be employed, or a 3rd party paid for their ability to maintain the system
Support will need to be purchased via a 3rd party or employing someone
-
Worksheet 1 CLOUD COMPUTING
4
Task 4
The table below contains a list of statements that apply to cloud service providers. For each one, tick if the statement is an advantage or disadvantage. The first row has been completed for you.
Advantage Disadvantage
No need to purchase/own infrastructure
No cost for IT technicians
Users will require a reliable Internet connection to use
Users will require fast Internet connections to use the cloud service
Limited control of the infrastructure
Reduction in the management of upgrades when SaaS is used
Software is likely to be more reliable
Automatic version control / backups
Storage/computing capacities can grow/shrink depending on demand
On-going subscription costs
Cloud provider lock-in
-
Worksheet 1 CLOUD COMPUTING
5
Task 5
‘Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 165 fully featured services from data centers globally. Millions of customers - including the fastest-growing startups, largest enterprises, and leading government agencies - trust AWS to power their infrastructure, become more agile, and lower costs.’
Source: https://aws.amazon.com/what-is-aws/
(a) Using the source above, and others, research some of the companies that use AWS.
(b) What do they use AWS for?
https://aws.amazon.com/what-is-aws/
-
Worksheet 2 CONNECTION TYPES
6
Internet connection technologies – connection types
Task 1
For each of the scenarios in the table below, explain which type of connection would work best and why this would be the most suitable type.
Scenario Connection type Why this is the most suitable type?
A large multinational company with over 1000 employees needs a fast Internet connection to their head office.
A homeowner decides that they will let out one of their rooms on Airbnb. They wish to provide guests with access to the Internet.
A small community centre is being built. One of the rooms will be used as an office and have a single desktop PC. A phone line has already been installed. They will require an Internet connection.
-
Worksheet 2 CONNECTION TYPES
7
Task 2
Amelia lives in the countryside at the bottom of a valley. There is a mobile phone base station around two miles from her house, yet she has no signal on her phone. Her friend Mila lives five miles from the same transmitter, and she has a very good signal with her phone showing maximum bars.
(a) Draw a diagram to explain how it is possible for this situation to occur.
(b) What other factors could affect Amelia’s mobile phone reception?
-
Worksheet 2 CONNECTION TYPES
8
Task 3
EE launched the UK’s first 5G service on 30th May 2019. Research this new technology and answer the following questions
(a) How does 5G affect speed and reliability?
(b) Are there any other useful features the technology provides?
(c) What could the implications for individuals and businesses be of 5G?
-
Worksheet 2 CONNECTION TYPES
9
Task 4
An old block of 20 flats has poor Internet connections for the residents. Currently each flat is served by a 100Mb/s ethernet connection which leads to a central router. This router connects to the Internet with a copper connection running at 70Mb/s. The director of the management company is becoming increasingly frustrated with the number of complaints he is receiving. He has told his IT manager to “install fibre optic connections direct to every flat”.
(a) What are the advantages and disadvantages to this decision?
Advantages
Disadvantages
(b) Do you agree with the decision to install fibre optic connections direct to every flat?
Justify your choice.
-
Worksheet 3 CURRENT LEGISLATION
10
Current legislation - laws relating to IT, devices or data
Task 1 a) Describe, with examples, the three major areas that the Computer Misuse Act deals with.
b) Describe three extra powers that the Police and Justice Act 2006 (Computer Misuse) has added.
Task 2 Look at the following website: https://www.gov.uk/personal-data-my-employer-can-keep-about-me
a) Write down three items of data which a company can store about an employee.
b) Give three more examples of data that an employer can only store if they first get the employee’s permission.
https://www.gov.uk/personal-data-my-employer-can-keep-about-me
-
Worksheet 3 CURRENT LEGISLATION
11
Task 3 a) What are the meanings of copyright infringement and plagiarism?
Copyright infringement:
Plagiarism:
b) Using the websites below for help, give one example of copyright infringement and one
example of plagiarism.
Copyright infringement:
Plagiarism:
• What are two consequences of copyright infringement and software piracy?
• Give three possible consequences for individuals when using pirated software.
-
Worksheet 3 CURRENT LEGISLATION
12
Task 4
Listed below are some of the laws relating to the IT systems.
1. Computer Misuse Act 1990
2. Police and Justice Act 2006 (Computer Misuse)
3. Copyright, Designs and Patents Act 1988
4. Copyright (Computer Programs) Regulations 1992
5. The Health and Safety (Display Screen Equipment) Regulations 1992
6. Data Protection Act 2018
7. Consumer Rights Act 2015
Insert a number in the first column of each row to match each of the statements with one of the
above Acts.
One of statements is incorrect and not illegal. For this statement, write ‘Not illegal’.
Act number Clause
With some exceptions, it is illegal to use unlicensed software
Any product, digital or otherwise, must be fit for the purpose it is supplied for
Unauthorised modification of computer material is illegal
It is illegal to create or use a hacking tool for penetration testing
Personal data may only be used for specified, explicit purposes
Employers must provide their computer users with adequate health and safety
training for any workstation they work at
It is illegal to distribute hacking tools for criminal purposes
It is illegal to distribute an illicit recording
Personal data may not be kept longer than necessary
Gaining unauthorised access to a computer system is illegal
Employers must ensure that employees take regular and adequate breaks from
looking at their screens
It is illegal to prevent or hinder access (e.g. by a denial of service attack) to any
program or data held in any computer
Personal data must be accurate and where necessary kept up to date
-
Worksheet 4 IMPACT OF THREATS
13
Impact of threats to data, information and systems
Task 1
1. Hotels often store personal data about their guests.
(a) Give five items of personal data that are likely to be stored about guests on a hotel’s
computer systems.
(b) Describe how a phishing attack may be able to get personal details about a hotel’s
guests.
(c) The data about guests could lead to identity fraud. Give three ways in which a fraud
may occur.
-
Worksheet 4 IMPACT OF THREATS
14
(d) What are three impacts to the business and individual of this fraud occurring?
Impacts on the individual Impacts on the business
Task 2
Look up the following website, or search for Facebook phishing scams:
https://www.hoax-slayer.net/4-scams-that-all-facebook-users-should-know-about/
Describe some of the possible consequences to you and your Facebook friends of falling for such a scam.
https://www.hoax-slayer.net/4-scams-that-all-facebook-users-should-know-about/
-
Worksheet 4 IMPACT OF THREATS
15
Task 3
1. Research and write notes on the impact that threats to data, information and systems can have on:
(a) Individuals
See, for example:
https://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-
average-person-in-2018/#5ef196655efa
(b) Organisations
See, for example:
https://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business
(c) Now make a presentation on what you have found out.
https://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-average-person-in-2018/#5ef196655efahttps://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-average-person-in-2018/#5ef196655efahttps://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business
-
Worksheet 4 IMPACT OF THREATS
16
Task 4
Carry out some research on the Internet to find out about the economic impact on companies of employees losing their laptops. How can the impact be reduced?
Task 5
Answer the following questions about a Denial of Service attack.
(a) What is a DoS attack?
(b) Who is typically targeted?
(c) What are the consequences to an organisation of a DoS attack?
-
Worksheet 4 IMPACT OF THREATS
17
Task 6
An Austrian hotel suffered four ransomware attacks between 2016 and January 2017.
Read the following BBC news report about the attack: https://www.bbc.co.uk/news/business-
42352326 and answer the following questions based on it.
(a) How was the ransomware attack initiated?
(b) What did the ransomware attack hold ransom?
(c) How much ransom needed to be paid?
(d) What actions have been taken to reduce the risks of this happening again?
(e) The BBC article reports that the “hotel’s electronic door locks… were hacked for
ransom” The headline also states “Locked out”.
Read the article at: https://www.wired.co.uk/article/austria-hotel-ransomware-true-
doors-lock-hackers
What is a more accurate description of what happened with respect to rooms?
https://www.bbc.co.uk/news/business-42352326https://www.bbc.co.uk/news/business-42352326https://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackershttps://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackers
-
Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES
18
Global and environmental issues
Task 1
Freedom Computers is a charity which sends old computers from the UK to developing countries. When the charity receives an old computer, they first erase and reformat the hard disks so that no personal data is left on them. They then install Windows XP, so that the users of the computers don’t have to pay for an operating system.
The charity no longer sends out any CRT displays – those that they receive are sent for recycling. Instead, it only sends flat panel displays.
a) Explain two reasons why the Freedom Computers no longer sends CRT displays and instead sends flat-screen displays.
b) Developing countries include Burma, Libya, Cuba, Somalia, Ethiopia and others.
i) Discuss the barriers these countries have to better information technology access.
ii) Discuss what wealthy, developed countries can do to help to overcome these barriers.
-
Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES
19
Task 2
1. Discuss the lack of a good broadband service would have on a small business operating in a rural area in the UK.
2. Not all students in the UK have equal access to information technology.
a) State two reasons why this might be the case.
b) Describe one way in which unequal access to information technology negatively affects students studying at school.
c) Describe one way in which unequal access at school impacts students’ future prospects.
-
Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES
20
Task 3
Lithium may soon be mined in Cornwall.
Research lithium mining in Cornwall to answer the following points:
a) How will they mine the lithium?
b) What change in IT has created an increased demand for lithium?
Task 4
“Information technology is bad for the environment.”
Discuss the reasons why this statement is both true and false.
-
Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES
21
Task 5
The WEEE directive is concerned with the disposal of electrical and electronic equipment.
Research the directive using the following site: https://www.gov.uk/electricalwaste-producer-supplier-responsibilities or other websites.
Explain two purposes of this directive and how these are achieved.