gcse ict revision booklet updated

29
GCSE ICT Revision Booklet Contents: The exam is 1hr 30 mins Mixture of multiple choice, short and long answers Answer all questions Do not use brand names

Upload: sana-hanif

Post on 28-Nov-2015

153 views

Category:

Documents


9 download

DESCRIPTION

This booklet has been updated

TRANSCRIPT

Page 1: GCSE ICT Revision Booklet Updated

GCSE ICT Revision Booklet

Contents:

The exam is 1hr 30 mins Mixture of multiple choice, short and

long answers Answer all questions

Do not use brand names

Page 2: GCSE ICT Revision Booklet Updated

Important things when looking at computers

RAM

USB CONNECTIONS

PROCESSOR

WI FI

HARD DRIVE SIZE

GRAPHICS CARDS

OPTICAL DRIVE

FUTURE PROOF

Page 3: GCSE ICT Revision Booklet Updated
Page 4: GCSE ICT Revision Booklet Updated

Video calling

msn

Wi-Fi

3g

Loud speaker

games

Touch screen

gps

Hands free

bluetooth

Internal memory

mp3

alarm

usb

roaming

email

radio

sms

calculator

camera

Personal organiser

Multifunctional

alarm

sms

alarm

calls

basic

smartspecialist

Simple menu interface

Loud speaker

basic

Large screen

Large buttons

Page 5: GCSE ICT Revision Booklet Updated
Page 6: GCSE ICT Revision Booklet Updated

Blue jacking is the process of sending unwantedmessages to other mobile phones usingBluetooth.

User Types

•Mobile phones can be expensive, so to avoid being a target, activate the lock feature which requires a pin.•If you take a video or photo of someone on your phone, you should ask for their permission, before uploading it to a public domain•Try to avoid using phones in a quiet place (library, trains)•Recycle your old phone•If internet enabled, avoid viewing content that is unsuitable for your age range•Don’t make prank calls or send malicious messages•Don’t drive and talk on your mobile•Activate keypad to prevent accidental emergency calls being made.

Mobile phone etiquette and safety

Page 7: GCSE ICT Revision Booklet Updated

How to be safe and efficient when communicating online

• Texting too much can lead to RSU• Health risks associated with the use of mobile phones (Cancer)• Overuse of ‘text speech affects the ability to spell word correctly• Young people can be victims of bullying if they are targeted for their phones

Example exam question: Some people find it difficult to use a mobile phone. State two features that can make a phone easier to use? (2)

Pros & cons of mobile phones

Disposing of old mobile phonesRecycle your old phone.Trade it inSell itGive it to a charitySome countries re-use the components, other refurbish phones and sell them for a cheap price to developing countries

Why do shops offer to recycle your phone?

Legal requirementEnhances their reputationShows their environmentally friendlyGive it to a charitySell it on

Page 8: GCSE ICT Revision Booklet Updated

Mobile broadband (3G 4G)• Relies on 3G network coverage• Need a sim & contact• Connection to the internet whilst on the move• More secure than Wi-Fi as all data is encrypted• No wires or cables• No need to look for hotspots• Access anywhere there is a 3G phone signal

Connectivity

Mobile phones operate on different frequencies in different countries. To be able to connect with a phone on a different frequency, the phone needs to be able to receive one or more frequencies. A phone can be:• dual band – picking up 2 frequencies• tri band – picking up 3 frequencies• quad band – picking up 4 frequencies.Having a quad-band phone allows you to use it in five different continents.

A mobile phones Network Band determines which countries the phone can be used in.

DISADVANTAGES• Interference, obstructions,

distance effect signal• Incur roaming charges whilst

abroad• 3G signal is not every where• You pay more if you go over

your limit• 24 hr. access (pressure,

stress due to working all the time)

• Limited download capacity

ADVANTAGES• Work anywhere,

anytime as long as there is a signal

• Work whilst travelling• No additional power

source• Can set up phone as

router and pair devices

Page 9: GCSE ICT Revision Booklet Updated

Lets Communicate - Chapter 1 : Mobile Phone Features

Smart Phone A phone offering

advanced features. E.g. the

ability to send emails or surf the

internet

GPS in a Mobile PhoneGlobal Positioning System – a navigation system that:Gives the current locationDirections from current location to a specified locationDistance to a specified locationGive you directions/distances from current location to key services such as a hospitalGeotag-to attach the exact geographical co-ordinates of longitude and latitude to a digital image, giving the location of where it was taken

Designing a Mobile PhoneWhen designing a mobile phone for a particular age group you need to consider certain things:Weight of phoneFeatures of phoneVolume capacity of speakersNavigation or menu systemInterface - how they will use it e.g. touch screen or keypadScreen resolutionSize of screen and buttons

Pro’s and Con’s of mobile phones•Texting too much can lead to RSI•Health risks associated with the use of mobile phones (Cancer)•Overuse of ‘text speech affects the ability to spell word correctly•Young people can be victims of bullying if they are targeted for their phones

Memory cards are used as secondary storage. Memory card size is measured in gigabytes(GB). There are 2 types of memory card:• SD- good for storing photos• SDHC- good for storing video files

Multifunctional

Having the ability to do

many different things using the

same device

Threats to data on phone • Spyware /Viruses• (Tracking) Cookies • Physical damage to phone (storage) that corrupts data • Theft of the device • Blue-jacking • Loss of power • Application / system error

Page 10: GCSE ICT Revision Booklet Updated

HDMI• Connects to a HDTV, PlayStation 3, Blu-Ray

player• Allows high definition electronic devices to

connect• Created high-bandwidth connections

between digital devices• Multiple HDMI inputs can be connected

using a switch

FirewireA FireWire connection lets you send data to and from high-bandwidth digital devices such as digital camcorders, and it's faster than USB

USBUSB cables let you attach peripherals to your device

Connections

HDTV• Digital• 1920x108

0• Wider

screen• More

colours

Connecting to the Internet:Ethernet Cable or wireless connection are the main 2 ways of connecting to the internet. A cable connection is faster than a wireless

one but may not always be available. A wireless connection is slower. There may also be security issues

connecting to an unsecured wireless network as there is a risk of hacking

network:Ethernet cable: A cabled connection which connects via an interface card, has three different speeds; basic, fast and Gigabit.Wireless: Allows computers to communicate via radio and microwaves. Powerline: Uses the existing mains power circuits in the house for data transmissionADSL (DSL): is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network.

WIFI BLUETOOTH INFRARED

Within range of router or hotspot

Faster than others

Multiple devices can connect

Short distance, yet more than IR

Line of sight Only 2

devices connect at a time

slow

Page 11: GCSE ICT Revision Booklet Updated

Entertain Me – Chapter 3

Choosing an ISP – You need to consider:

Cost Speed Download limits Email and Web

Space Storage Security Parental Control Reliability and

customer service

An ISP is: A company that offers its customers access to the Internet

Wireless Wired Flexible and convenient Can be used around the house , no

wires Bandwidth is effected by number or

devices using the wireless LAN Distance sensitive Interference (Can be affected by

household appliances) Less secure if not protected Effected by physical obstructions

(like walls)

Health & Safety, people can trip over the wire

Harder to set up and can be more costly in a large organisation

No Interference

2 main ways of connecting to a network –

Wireless/WiFI or Ethernet Cable

Broad BandA high speed connection

to the Internet that is always on

BandwidthThe amount of data that can fit through an Internet connection. A high bandwidth means more data

Download

Transfer of a file from a central computer to your

computer

Wireless Security Tips

Turn on WAP/WEP – this is a form of encryption which scrambles data sent over your network. You can only read it if you have the key. Disable SSID broadcast – shows your network is availableEnable your routers firewall if it has one – a firewall is a program that check incoming packets of data and determines if they are allowed in to the network. Enable MAC address filtering – router will only allow devices that have been registered with router. Disable when not in use

Threats to a Network VirusesHackersSpyware and MalwareInternal –staff and family members(may delete files)

LatencyThe speed of flow. A low

latency means there is only a small delay

It is important to for a good connection to have a high bandwidth and a low latency

Streaming when content is compressed and

sent over the Internet and is displayed in real time. When

streaming you do not have to wait for the media to download.

Page 12: GCSE ICT Revision Booklet Updated

Wireless connection to the internet

GPRS General packet radio service 2G Integrated into mobile

phones Suitable for making calls and

sending texts

3G Third generation of mobile

phone technology 3G enables devices such as

mobile phones and mobile dongles to deliver broadband-speed internet.

Even the lowest-end, cheapest mobile phones are now 3G enabled

suitable for checking emails and browsing the web

4G Fourth generation of mobile

phone technology suitable for streaming,

mapping and Social networking sites

5 times faster than 3G Works on a different

frequency to 3G

Page 13: GCSE ICT Revision Booklet Updated

CHAPTER 1The digital Divide

Page 14: GCSE ICT Revision Booklet Updated

Lets Communicate – The Digital Divide

The digital divide is the gap between

those who have access to

technology and those who do not.

The following may have an impact on the digital divide.

On a low income Living in a rural area

Weak literacy skills

Have a disability From an ethnic minority

Elderly

Economic

Is to do wit money, wealth,

jobs, production, distribution and consumption of

goods and services

EducationalThis is about

learning and the knowledge

gained from learning

SocialThis is about

human society and the people who live in it

CulturalThis refers to

the behaviour, attitudes and lifestyles of a

particular social group

• People with knowledge of technology and the skills to use it can get better-paid jobs.

• The Internet gives people access to a wider range of products and services

• The Internet allows people to research products and get cheaper deals for goods and services

• The Internet has led to a rise in e-commerce and globalisation

Implications of the Digital Divide page 38-39 •People can feel left out if they do not

have technological goods and services.•Not having access to communications such as email, IM and mobile phones can affect people’s social interactions.

•Many cafés now offer facilities such as the Internet to attract customers•Many people carry around MP3/4 players, mobile phones and other digital devices.•More children stay indoors and play on games consoles instead of playing outside•Cultural and/or religious in influences might dissuade some groups of people from using ICT which could lead to lack of access, lack of education and an inability for countries to participate in globalisation

•Students who use computers at home or school can become independent learners and excel in education•Most schools are moving to personalised learning using VLEs. Without Internet access, young people cannot benefit from this.•A gap in ICT skills may exclude people from particular jobs.•People can take part in online courses to gain further skills and qualifications

Example exam question: Some people have limited access to digital technology. Discuss the impact this has on their lifestyle. (6 marks)

Page 15: GCSE ICT Revision Booklet Updated

Staying in contact with people

Page 16: GCSE ICT Revision Booklet Updated

VoIP – Voice over internet protocol [Used to make telephone calls via the internet. A headset or speakers and a microphone are needed. Now available on mobile phones with a 3G connection]

Social Networking – Allow users to connect with a large number of people.[provide ways of interacting including chats, messaging, email, blogging, video and image sharing

Instant Messaging – Talking in real time by typing and receiving messages

Ways of staying in contact with people

Blogs – An online journal that can be shared over the internet. Videos, images and text can be shared

Page 17: GCSE ICT Revision Booklet Updated

The internet as a work tool

User Forums – allows users to get together for open discussions. general & specialist

VLE – Virtual learning environments are used in school and education. They allow teachers to upload resources and personalise learning for individual students. Students can access resources and have their own space where they can keep their work.

User Generate Websites (Wikis) – These websites are made by people working collaboratively adding their own content. [Advantages: the information is always current and not bound by copyright laws] [Disadvantages: Anyone can add to it so if not managed correctly information may be inaccurate, biased or untrue]

Podcasts – allows users to watch or listen to material at a time that suits them. People can create podcasts and upload them to websites, blogs and social networking sites for other to subscribe to and download

Page 18: GCSE ICT Revision Booklet Updated

Accessing EmailsPOP3

Requires users to access email via an internet mail account/mail deleted from server when sent to client [Useful when you only check e-mail from one computer]

IMAP 4Emails pushed directly to phone and a copy of mail is kept on both server and client. You can check your email from multiple locations

Email[involves sending messages over a

communications network such as the internet]Advantages:

Cheaper than sending a letterWill arrive faster than a letterCan send emails 24/7 to any countryCan access emails from multiple

locationsCan send attachments

Disadvantages:Need to have an internet connectionCan receive virusesReceive large amounts of spam (junk

mail)

IM (instant messaging)Advantages: Quick and easy communication in real time People to work collaboratively and discuss their views The user to see who is online and decide if they want to engage in a

conversation Use through certain mobile phones, PDAs and other portable devices.Disadvantages: You need Internet access to use IM. If the connection is slow, this could impact on the real-time feature. Overuse of IM could result in less face-to-face contact with people. People may misunderstand information as it lacks emotion – to combat this,

emoticons have been invented. You may prefer to chat rather than type a message.

Page 19: GCSE ICT Revision Booklet Updated

• Why register/join an online community?– post / review / comment – receive (email) updates – set content preferences – access more features – report (inappropriate) content / users

• What information do you need to provided?– User name, email, security question, contact details

• Why are reviews rated?– Encourage interaction with the site

– Increase reliability of reviews (through use of community)

Page 20: GCSE ICT Revision Booklet Updated

Optical Disc

Solid

Magnetic Disc

Storage

Cloud

• Cloud Computing [a system where programs and data are stored centrally (in one place), on a server owned by a company such as Google. They are then accessed virtually (using the internet)]

Hard Disks, magnetic tapesRead with a moving head inside the disk drive.• Moving parts make it quite slow• Vulnerable to damage• Can be damaged by magnets• Large storage capacity• Found in PC’s as internal hard drive• Can connect external hard drives

Solid state storage devices store data using special type of memory flash memory. Flash memory non volatile and the data can be erased or changed. Used in mobile phones, tablets, notebooks PC’s E.g. USBs SSDs

An optical disc is a type of data storage which can be written to and read using low powered laser beam. • Cd, Dvd, Blu-Ray• cheap• Portable• Software distribution

Capacity gets larger

Page 21: GCSE ICT Revision Booklet Updated

GPS A satellite based navigation system

Gives your current location Directions from current location to specified location Distance from current location to specified location

• Cyber cafe [is a cafe that has a number of personal computers connected to the Internet and available for use by customers]

• Hotspot [is a venue that offers a Wi-Fi Internet connection. E.g. Located in hotels]

• Cloud Computing [a system where programs and data are stored centrally (in one place), on a server owned by a company such as Google. They are then accessed virtually (using the internet)]

• Web Application [an application that is access using a web browser. Example being Google docs]

Geotagging Adding geographical coordinates of

where an image was taken. Metadata is the information stored about the

image

BiometricsA method of recognising someone based on physical characteristics. E.g. Fingerprints, face, iris, voice

ConvergenceWhen one device is developed to

carry out functions that were originally performed by several

different devices

Page 22: GCSE ICT Revision Booklet Updated

Smart Working – Chapter 4Health Problems From Using ICT

Back pain can be caused by sitting incorrectly for a long time.

Eye strain can be caused by staring at the screen for too long.

Repetitive strain injury (RSI) is a result of doing the same thing again and again (e.g. typing or moving a mouse) – it causes stiffness, pain and numbness, usually in the joints of the arm, wrist or hand.

Stress is often a feeling of not being able to cope, for example because of too much work, poor relationships with colleagues and a lack of support from employers.

How to Avoid the Problems• Breaks – people working at a computer must have frequent breaks to help prevent health problems.

Computer users are advised to take 30-second micro-breaks every 10 minutes. You should try to do the following: look away from the screen, stretch, change your position frequently, move your feet, lift your arms and adjust your hips.

• Training – employers need to train their staff on how to use work stations correctly, to help prevent injury. It is a legal requirement for employers to display a health and safety poster produced by the HSE. The poster tells workers what they and their employers need to do in simple terms, using numbered lists of basic points.

• Eye care – employers have to pay for regular eye-sight tests for anyone who needs prescription glasses in order to use the computer. If the employee needs glasses to correct their eye sight, then the employer has to make a contribution to the glasses.

• Ergonomics – Designing equipment to match the body shape and be more comfortable to use. (e.g. curved chairs, arc mouse etc)

Teleworking

Working from home but staying in contact

using technology. Can use VoIP, Video conferencing, email

Advantages DisadvantagesSave money – don’t have to rent

office spaceor travel to office.

Less social contact – don’t see work colleagues.

Increased productivity – don’t waste time commuting

Distractions – more distractions at home than at work.

Flexibility – can work when you’re most productive.

Boundaries – blurs distinction between work and rest.

Page 23: GCSE ICT Revision Booklet Updated

TrojansAre programs that record your activity on your computer and send the information back. They contain Spyware and Malware that get releases once they get past your firewallThey look legitimate but the are not. They hide on the computer doing their damage and allowing someone else to take control.

Online Shopping – Chapter 5Online Banking

Allows you to access your account from anywhere with an internet connection – 24/7 access to your accountMore convenient that having to go into a bank for some servicesCan go paperless and not have to receive statementsCan transfer money between accounts quicker/make paymentsThere are security issuesView/Track account details in real time

‘Bin raiders’, collect old receipts to find out your

card details.

Criminals can make a copy of your card – this is called

‘skimming’.

Principles of Data Protection Act

Law that organisations need to follow when storing personal data

1 People who keep the data must process it according to the law.

2 The data must be used only for the purpose it was provided.

3 Organisations should not ask for more data than is necessary.

4 Organisations should ensure that the data is accurate and kept up to date.

5 The data should not be kept longer than is necessary.

6 Organisations should respect the legal rights of the people whose data they are processing – the ‘data subjects’.

7 The data should be kept secure.8 The data should not be

transferred to other users in a country outside Europe, unless that country has similar laws to safeguard the data.

Autocomplete When your computer can

remember your usernames and passwords so you do not have to

keep re-entering them. Saves time and suitable if no one else uses

your PC and its secure. If someone accesses your

computer they will be able to log into your accounts

privacy policyA privacy policy is a legal document that discloses how the company will gather and use your data. It describes how you data is kept secureReputable firms will have their privacy policy in a prominent place and tell you what you are signing up for

Identity Theft When someone steals your details and your identity. They can find out your details from the different methods listed on these slides such

as Phishing, Skimming, spyware etc

Page 24: GCSE ICT Revision Booklet Updated

Data Protection Act - 1984

(Revised 1988) Act designed to cover storage of personal data on computer systems.

Data subject – an individual who is the subject of stored data. Data subjects have rights under the Data Protection Act.

Details of Data Protection Act: 1. Data must not be acquired and processed unlawfully.2. Personal data must not be passed to other organisations without the

consent of the data subject.3. Data must only be used for a specific purpose.4. Personal data should be accurate and up to date.5. Suitable measures must be taken to ensure the safety of personal

data.6. Data should be the minimum required for the purpose and must not

be kept longer than is reasonable.

Page 25: GCSE ICT Revision Booklet Updated

Smart Working– Software Options•You can now access software online or you can install it locally on your PC

Mobile broadband Mobile broadband allows

devices such as smart phones, laptops and netbooks to connect to a high speed

internet connection without the need for wires.

Mobile broadband relies on a 3G network the same

technology used by 3G mobile phones like the iPhone.

If you do not have the 3G technology built in you will

need a dongle

Strong PasswordA password that is difficult to guess. Use more than 7 charactersUse upper and lower case lettersUse combination of text, numbers and symbols

Smart Working – Chapter 4Collaborative Working

Means working together. Technology now allows us to work together from remote locations (Remote = not near each

other). Can use online workspaces such as Google documents. The files are stored virtually on the Internet and you can control who has access to them. You don’t need to

carry around a storage device but you do need access to the internet

Access RightsYou can control who has access to your documents and what they can do with them 4 levels of Access:

•Read Only•Read and Write•Read Write and Amend•Read, Write, Amend and Delete (full access)

Advantages Disadvantages

Can use on the move and access the internet from virtually anywhere

Signal is not always reliable (affected by tall buildings and the area your in)Not at fast as home broadbandLimit on the amount you can download

Advantages Disadvantages

You can access you software from anywhere with an internet connection and you do not need to install it on every computer

You need to have an internet connectionUsually has less features than locally installed software

Open Source Software page 24/26Is software code that is made available to the public domain so anyone can use itIt is usually free and you can then alter the code to customise it, as you have accessed to it You are not bound to a single software companyDifficult to receive support for the software as help is limited

Page 26: GCSE ICT Revision Booklet Updated

Internet Dangers: Pop-ups [small screens that open automatically on your screen.

Can be genuine advertising or scams]Spyware [computer software that obtains information from a

user's computer without their knowledge or consent]Identity theft [takes place when someone collects information

about you and uses it for criminal purposes] Spam [unwanted email] Phishing [a link that is sent to a recipient and they may be tricked

to click on it and give their personal details] Hackers [people who try to gain unauthorised access to someone

computer] Viruses [programs that infect your computer and damage the

system settings and memory]

Lets Communicate – Internet Safety

Cookies: is a file which stores information related to your internet activity. Cookies save time as they remember your

login details, website preferences are saved so next time you visit them they will look the same.

Shopping sites also make suggestions for you based on your search history] [Can cause problems when computers are shared as they store login details that can be used by hackers]

Adverts are tailored to what you have been looking at

Remember where you have been

Page 27: GCSE ICT Revision Booklet Updated

Payment Methods• Debit and credit

card• Gift cards and

vouchers•3rd party payment

processor such as PayPal pg.43

Online Shopping – Chapter 5 Advantages of online Shopping

You can shop online at any timeThere is a much greater selection of goods available online, and often for better pricesYou can use price comparison websites to find the item you want at the best priceIt is convenient to be able to shop without leaving your homeHas a positive impact on the environment as less people travel

Keywords

Definition

Required fields

Information that must be given when creating an online account

Combo box

A box you fill by selecting an item from a drop-down or by typing in information if the information you want to enter isn’t in the list

Validation

Checking that the data entered is sensible or within a certain range. E.g. someones age

Verification

Checking that the data entered is accurate. E.g.. Entering a password twice

Secret answer

Personal information that can be used to identify you

Captcha Prevents automated software from filling in a form

Auto-complet

e

Your computer’s operating system remembers your user names and passwords

Security• Ensure you have a firewall•Up to date antivirus software• Anti Spyware and Malware

software• Check your internet security settings. You can choose for example whether to accept

cookies

1. Why do you have to enter your password twice?

2. Why should you not check the remember password box when in a cybercafé?

3. Why are dots or stars used when entering your password?

4. What makes a secure password?5. Why are secret answers needed?6. When you register with a website, why do

you have to log onto your email before the account is activated?

Page 28: GCSE ICT Revision Booklet Updated

QR Codes

QR(quick response)/bar codes

Use an app on your phoneIt reads, scans, processes the

dataUses a camera

Stores more data than a barcode

Third party payment

PayPal• Allows a person to pay money into an account

and then use this money to pay for goods online• Only need to put in credit card details once• If selling goods online, they can have the money

put into their account• Can purchase goods from vendors that don’t

have credit payment facility on their website

Page 29: GCSE ICT Revision Booklet Updated

PhishingWhen fraudsters spam the Internet with an email claiming to be from a reputable financial institution (bank or building society) or e-commerce site. The email tries to make you click on a link and update your personal profile or carry out a transaction. The link takes you to a fake website designed to look like the real thing. Any personal or financial information that you enter will be sent directly to the scammer.

How to Spot Phishing:•Impersonal (does not state your nameCareless use of language – spelling & grammar mistakes Urgency – “you have 48hours to respond” Link to click on taking you to fake websiteWebsite Security

SSL Encryption (secure socket layer)

Https at the start of the website

Padlock in the browser Verified by Visa or

MasterCard Secure

Verified by Visa• protects your card against unauthorised

use and gives you peace of mind when shopping online.

• Once you’ve signed up to Verified by Visa, you’ll be protected whenever you make an online payment with your Visa card at any one of more than 300,000 web sites across Europe.

Verified by Visa involves two quick steps to authenticate your purchase.1. First you’ll see the personal message that

you provided when you signed up for Verified by Visa and that only you and your bank know about. This lets you know that the security screen you’re seeing is genuine

2. Then you’ll be asked to enter your Verified by Visa password.