transition 2020 y11 into y12 - haslingden high school · 2020. 4. 27. · transition 2020 y11 into...

23
Transition 2020 Y11 into Y12 Information Technology Cambridge Technical L3 The aim of this course is to develop students’ knowledge, understanding and skills of the principles of IT and Global Information Systems. Students will gain an insight into the IT sector as they investigate the pace of technological change, IT infrastructure, the flow of information on a global scale, and the importance of legal and security considerations. Section A: There are 5 theory topics to explore: Study the presentation for each topic Watch the video clips Answer the questions in the booklet IT CambTech_Transition 2020 HHS STUDENT BOOKLET.docx NB You will need to be signed in with your haslingdenhigh.com account on your device to access the links to presentations, and have access to YouTube for the video clips. 1. Online systems – cloud computing Presentation: Topic 1 Cloud computing.pptx Describe the personal and professional uses and implications of cloud storage and cloud computing. Describe the impact and implications on individuals and organisations of using cloud storage and computing. What is the cloud, Linus? https://www.youtube.com/watch?v=dsKIpLKo8AE 2. Internet connection technologies – connection types Presentation: Topic 2 Connection types.pptx Examine the implications of selecting and using different connection types. Evaluate the impact of connection types on the performance of an IT system. EE 5G winner at Wembley https://www.youtube.com/watch?v=_vzVTD-EcJ4 Surf air travel club https://www.youtube.com/watch?v=GgzTjmAcsZw

Upload: others

Post on 08-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • Transition 2020 Y11 into Y12

    Information Technology Cambridge Technical L3

    The aim of this course is to develop students’ knowledge, understanding and

    skills of the principles of IT and Global Information Systems. Students will gain

    an insight into the IT sector as they investigate the pace of technological

    change, IT infrastructure, the flow of information on a global scale, and the

    importance of legal and security considerations.

    Section A: There are 5 theory topics to explore:

    ❏ Study the presentation for each topic

    ❏ Watch the video clips

    ❏ Answer the questions in the booklet

    IT CambTech_Transition 2020 HHS STUDENT BOOKLET.docx

    NB You will need to be signed in with your haslingdenhigh.com account on your device to

    access the links to presentations, and have access to YouTube for the video clips.

    1. Online systems – cloud computing

    Presentation: Topic 1 Cloud computing.pptx Describe the personal and professional uses and implications of cloud storage and cloud

    computing.

    Describe the impact and implications on individuals and organisations of using cloud storage and

    computing.

    What is the cloud, Linus? https://www.youtube.com/watch?v=dsKIpLKo8AE

    2. Internet connection technologies – connection

    types

    Presentation: Topic 2 Connection types.pptx Examine the implications of selecting and using different connection types.

    Evaluate the impact of connection types on the performance of an IT system.

    EE 5G winner at Wembley https://www.youtube.com/watch?v=_vzVTD-EcJ4

    Surf air travel club https://www.youtube.com/watch?v=GgzTjmAcsZw

    https://drive.google.com/open?id=1ByXQYojFrHsfhkEoJSN4d22BmCQqZXAXhttps://drive.google.com/open?id=1FffCQpxXkDiEPj188s2cRZd0brjd04brhttps://www.youtube.com/watch?v=dsKIpLKo8AEhttps://drive.google.com/open?id=1hQjf9j0mes7Z0WItu1RZ8xCoM_lqvAxEhttps://www.youtube.com/watch?v=_vzVTD-EcJ4https://www.youtube.com/watch?v=GgzTjmAcsZw

  • 3. Current legislation - laws relating to IT, computing

    devices or data

    Presentation: Topic 3 Current Legislation.pptx Describe the role of current legislation (and subsequent additions and amendments) in protecting

    users and their data from attack or misuse.

    https://www.gov.uk/personal-data-my-employer-can-keep-about-me

    Andrew and Pete try hard to explain GDPR… https://www.youtube.com/watch?v=tBEMNcMihl4

    4. Impact of threats to data, information and systems

    Presentation: Topic 4 Impact of threats.pptx Describe the impact of threats to data, information and systems: on individuals; on organisations.

    Apply this understanding with foresight to different scenarios.

    Interesting example from the National Crime Agency https://youtu.be/yrjT8m0h cKU

    https://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/fraud-and-economic-crime

    5. Global and environmental issues – relating to the

    use of information technology

    Presentation: Topic 5 Global and Environmental Issues.pptx Describe the moral and ethical factors relating to:

    • Globalisation; on individuals; on organisations

    • Unequal access to information technology

    • Environmental factors

    What happens to old devices? Recycled ethically or not?

    https://www.youtube.com/watch?v=vufLW4xOsS4

    BAN’s mission is to champion global environmental health and justice by campaigning for

    everyone’s right to a clean environment. Check out https://www.ban.org/

    Section B: Practical skills, including web authoring, are an

    essential component of the course:

    ❏ Make an account with wordpress.com then start practising!

    ❏ Pick a small business (real or imaginary) and work through the tutorial

    https://wordpress.com/support/tutorials/business-website-tutorial/

    https://drive.google.com/open?id=1Bq7UEqEsDEwN0opH87X0_2xQXBDZ11zXhttps://www.gov.uk/personal-data-my-employer-can-keep-about-mehttps://www.youtube.com/watch?v=tBEMNcMihl4https://drive.google.com/open?id=1ymfY5yMSniqI_AGNXf7VgxaWixsDpNYThttps://youtu.be/yrjT8m0hcKUhttps://www.nationalcrimeagency.gov.uk/what-we-do/crime-threats/fraud-and-economic-crimehttps://drive.google.com/open?id=1j4v1YiOmdTMU7U1v1GrBuw78xXTkljKlhttps://www.youtube.com/watch?v=vufLW4xOsS4https://www.ban.org/https://wordpress.com/support/tutorials/business-website-tutorial/

  • Worksheet 1 CLOUD COMPUTING

    1

    Online systems – cloud computing

    Task 1

    (a) Choose one of the following cloud storage providers, or another cloud storage provider that you use or are interested in.

    • Dropbox

    • Google Drive

    • Microsoft OneDrive

    • iDrive

    • CertainSafe Digital Safety Deposit Box

    (b) For your chosen provider, what are the features that cloud storage offers

    businesses and individuals?

  • Worksheet 1 CLOUD COMPUTING

    2

    Task 2

    Research the Internet of Things (IoT) in order to answer the following questions.

    (a) What is the IoT?

    (b) Why does it matter?

    (c) Is it secure?

    (d) How many IoT devices are there currently? What are the predictions for the future?

  • Worksheet 1 CLOUD COMPUTING

    3

    Task 3

    The table below shows how traditionally software has been purchased, installed, maintained and supported. Complete the table to show how these processes happen for Software as a Service (SaaS).

    Traditional software Software as a Service

    Purchase Typically, a licence will be purchased which allows the organisation to use the software

    The software itself will be downloaded or sent on a CD/DVD

    Installation New equipment such as servers / hard disks may need to be purchased before the software can be installed

    An operating system will need to be purchased and installed

    Any other software which the purchased software depends on to work will also need to be purchased and installed

    The software is installed and configured

    It may be that this process needs to be repeated across hundreds of personal computers in the organisation

    Maintenance and support

    An in-house IT technician will need to be employed, or a 3rd party paid for their ability to maintain the system

    Support will need to be purchased via a 3rd party or employing someone

  • Worksheet 1 CLOUD COMPUTING

    4

    Task 4

    The table below contains a list of statements that apply to cloud service providers. For each one, tick if the statement is an advantage or disadvantage. The first row has been completed for you.

    Advantage Disadvantage

    No need to purchase/own infrastructure

    No cost for IT technicians

    Users will require a reliable Internet connection to use

    Users will require fast Internet connections to use the cloud service

    Limited control of the infrastructure

    Reduction in the management of upgrades when SaaS is used

    Software is likely to be more reliable

    Automatic version control / backups

    Storage/computing capacities can grow/shrink depending on demand

    On-going subscription costs

    Cloud provider lock-in

  • Worksheet 1 CLOUD COMPUTING

    5

    Task 5

    ‘Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 165 fully featured services from data centers globally. Millions of customers - including the fastest-growing startups, largest enterprises, and leading government agencies - trust AWS to power their infrastructure, become more agile, and lower costs.’

    Source: https://aws.amazon.com/what-is-aws/

    (a) Using the source above, and others, research some of the companies that use AWS.

    (b) What do they use AWS for?

    https://aws.amazon.com/what-is-aws/

  • Worksheet 2 CONNECTION TYPES

    6

    Internet connection technologies – connection types

    Task 1

    For each of the scenarios in the table below, explain which type of connection would work best and why this would be the most suitable type.

    Scenario Connection type Why this is the most suitable type?

    A large multinational company with over 1000 employees needs a fast Internet connection to their head office.

    A homeowner decides that they will let out one of their rooms on Airbnb. They wish to provide guests with access to the Internet.

    A small community centre is being built. One of the rooms will be used as an office and have a single desktop PC. A phone line has already been installed. They will require an Internet connection.

  • Worksheet 2 CONNECTION TYPES

    7

    Task 2

    Amelia lives in the countryside at the bottom of a valley. There is a mobile phone base station around two miles from her house, yet she has no signal on her phone. Her friend Mila lives five miles from the same transmitter, and she has a very good signal with her phone showing maximum bars.

    (a) Draw a diagram to explain how it is possible for this situation to occur.

    (b) What other factors could affect Amelia’s mobile phone reception?

  • Worksheet 2 CONNECTION TYPES

    8

    Task 3

    EE launched the UK’s first 5G service on 30th May 2019. Research this new technology and answer the following questions

    (a) How does 5G affect speed and reliability?

    (b) Are there any other useful features the technology provides?

    (c) What could the implications for individuals and businesses be of 5G?

  • Worksheet 2 CONNECTION TYPES

    9

    Task 4

    An old block of 20 flats has poor Internet connections for the residents. Currently each flat is served by a 100Mb/s ethernet connection which leads to a central router. This router connects to the Internet with a copper connection running at 70Mb/s. The director of the management company is becoming increasingly frustrated with the number of complaints he is receiving. He has told his IT manager to “install fibre optic connections direct to every flat”.

    (a) What are the advantages and disadvantages to this decision?

    Advantages

    Disadvantages

    (b) Do you agree with the decision to install fibre optic connections direct to every flat?

    Justify your choice.

  • Worksheet 3 CURRENT LEGISLATION

    10

    Current legislation - laws relating to IT, devices or data

    Task 1 a) Describe, with examples, the three major areas that the Computer Misuse Act deals with.

    b) Describe three extra powers that the Police and Justice Act 2006 (Computer Misuse) has added.

    Task 2 Look at the following website: https://www.gov.uk/personal-data-my-employer-can-keep-about-me

    a) Write down three items of data which a company can store about an employee.

    b) Give three more examples of data that an employer can only store if they first get the employee’s permission.

    https://www.gov.uk/personal-data-my-employer-can-keep-about-me

  • Worksheet 3 CURRENT LEGISLATION

    11

    Task 3 a) What are the meanings of copyright infringement and plagiarism?

    Copyright infringement:

    Plagiarism:

    b) Using the websites below for help, give one example of copyright infringement and one

    example of plagiarism.

    Copyright infringement:

    Plagiarism:

    • What are two consequences of copyright infringement and software piracy?

    • Give three possible consequences for individuals when using pirated software.

  • Worksheet 3 CURRENT LEGISLATION

    12

    Task 4

    Listed below are some of the laws relating to the IT systems.

    1. Computer Misuse Act 1990

    2. Police and Justice Act 2006 (Computer Misuse)

    3. Copyright, Designs and Patents Act 1988

    4. Copyright (Computer Programs) Regulations 1992

    5. The Health and Safety (Display Screen Equipment) Regulations 1992

    6. Data Protection Act 2018

    7. Consumer Rights Act 2015

    Insert a number in the first column of each row to match each of the statements with one of the

    above Acts.

    One of statements is incorrect and not illegal. For this statement, write ‘Not illegal’.

    Act number Clause

    With some exceptions, it is illegal to use unlicensed software

    Any product, digital or otherwise, must be fit for the purpose it is supplied for

    Unauthorised modification of computer material is illegal

    It is illegal to create or use a hacking tool for penetration testing

    Personal data may only be used for specified, explicit purposes

    Employers must provide their computer users with adequate health and safety

    training for any workstation they work at

    It is illegal to distribute hacking tools for criminal purposes

    It is illegal to distribute an illicit recording

    Personal data may not be kept longer than necessary

    Gaining unauthorised access to a computer system is illegal

    Employers must ensure that employees take regular and adequate breaks from

    looking at their screens

    It is illegal to prevent or hinder access (e.g. by a denial of service attack) to any

    program or data held in any computer

    Personal data must be accurate and where necessary kept up to date

  • Worksheet 4 IMPACT OF THREATS

    13

    Impact of threats to data, information and systems

    Task 1

    1. Hotels often store personal data about their guests.

    (a) Give five items of personal data that are likely to be stored about guests on a hotel’s

    computer systems.

    (b) Describe how a phishing attack may be able to get personal details about a hotel’s

    guests.

    (c) The data about guests could lead to identity fraud. Give three ways in which a fraud

    may occur.

  • Worksheet 4 IMPACT OF THREATS

    14

    (d) What are three impacts to the business and individual of this fraud occurring?

    Impacts on the individual Impacts on the business

    Task 2

    Look up the following website, or search for Facebook phishing scams:

    https://www.hoax-slayer.net/4-scams-that-all-facebook-users-should-know-about/

    Describe some of the possible consequences to you and your Facebook friends of falling for such a scam.

    https://www.hoax-slayer.net/4-scams-that-all-facebook-users-should-know-about/

  • Worksheet 4 IMPACT OF THREATS

    15

    Task 3

    1. Research and write notes on the impact that threats to data, information and systems can have on:

    (a) Individuals

    See, for example:

    https://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-

    average-person-in-2018/#5ef196655efa

    (b) Organisations

    See, for example:

    https://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business

    (c) Now make a presentation on what you have found out.

    https://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-average-person-in-2018/#5ef196655efahttps://www.forbes.com/sites/quora/2018/01/30/how-cyberattacks-will-affect-the-average-person-in-2018/#5ef196655efahttps://www.nibusinessinfo.co.uk/content/impact-cyber-attack-your-business

  • Worksheet 4 IMPACT OF THREATS

    16

    Task 4

    Carry out some research on the Internet to find out about the economic impact on companies of employees losing their laptops. How can the impact be reduced?

    Task 5

    Answer the following questions about a Denial of Service attack.

    (a) What is a DoS attack?

    (b) Who is typically targeted?

    (c) What are the consequences to an organisation of a DoS attack?

  • Worksheet 4 IMPACT OF THREATS

    17

    Task 6

    An Austrian hotel suffered four ransomware attacks between 2016 and January 2017.

    Read the following BBC news report about the attack: https://www.bbc.co.uk/news/business-

    42352326 and answer the following questions based on it.

    (a) How was the ransomware attack initiated?

    (b) What did the ransomware attack hold ransom?

    (c) How much ransom needed to be paid?

    (d) What actions have been taken to reduce the risks of this happening again?

    (e) The BBC article reports that the “hotel’s electronic door locks… were hacked for

    ransom” The headline also states “Locked out”.

    Read the article at: https://www.wired.co.uk/article/austria-hotel-ransomware-true-

    doors-lock-hackers

    What is a more accurate description of what happened with respect to rooms?

    https://www.bbc.co.uk/news/business-42352326https://www.bbc.co.uk/news/business-42352326https://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackershttps://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackers

  • Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES

    18

    Global and environmental issues

    Task 1

    Freedom Computers is a charity which sends old computers from the UK to developing countries. When the charity receives an old computer, they first erase and reformat the hard disks so that no personal data is left on them. They then install Windows XP, so that the users of the computers don’t have to pay for an operating system.

    The charity no longer sends out any CRT displays – those that they receive are sent for recycling. Instead, it only sends flat panel displays.

    a) Explain two reasons why the Freedom Computers no longer sends CRT displays and instead sends flat-screen displays.

    b) Developing countries include Burma, Libya, Cuba, Somalia, Ethiopia and others.

    i) Discuss the barriers these countries have to better information technology access.

    ii) Discuss what wealthy, developed countries can do to help to overcome these barriers.

  • Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES

    19

    Task 2

    1. Discuss the lack of a good broadband service would have on a small business operating in a rural area in the UK.

    2. Not all students in the UK have equal access to information technology.

    a) State two reasons why this might be the case.

    b) Describe one way in which unequal access to information technology negatively affects students studying at school.

    c) Describe one way in which unequal access at school impacts students’ future prospects.

  • Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES

    20

    Task 3

    Lithium may soon be mined in Cornwall.

    Research lithium mining in Cornwall to answer the following points:

    a) How will they mine the lithium?

    b) What change in IT has created an increased demand for lithium?

    Task 4

    “Information technology is bad for the environment.”

    Discuss the reasons why this statement is both true and false.

  • Worksheet 5 GLOBAL AND ENVIRONMENTAL ISSUES

    21

    Task 5

    The WEEE directive is concerned with the disposal of electrical and electronic equipment.

    Research the directive using the following site: https://www.gov.uk/electricalwaste-producer-supplier-responsibilities or other websites.

    Explain two purposes of this directive and how these are achieved.