Cambridge Nationals in ICT Unit 1 (R001) Revision Notes: Exam Questions at The Back of This Booklet
Cambridge Nationals in ICT Unit 1 (R001) Revision Notes: Exam Questions at The Back of This Booklet
Name: ______________________
Class: ______________________
Contents
Features and Purposes of Computing Devices ................................................................................................................. 3
Input Devices................................................................................................................................................................. 3
Other Input Devices: Sensors ........................................................................................................................................ 4
Output Devices.............................................................................................................................................................. 4
Operating Systems ............................................................................................................................................................ 5
Utility Software ............................................................................................................................................................. 6
Storage and Connectivity Devices ..................................................................................................................................... 8
Office Configurations .................................................................................................................................................... 9
Connectivity .................................................................................................................................................................... 11
Connecting to Wi Fi ..................................................................................................................................................... 12
Monitoring Employees .................................................................................................................................................... 13
Teleworking..................................................................................................................................................................... 14
Video Conferencing ......................................................................................................................................................... 15
Data Capture Methods.................................................................................................................................................... 15
Online and Paper Based Forms ................................................................................................................................... 15
Automated Methods................................................................................................................................................... 16
Data Validation............................................................................................................................................................ 16
Verification Checks:..................................................................................................................................................... 16
Factors Affecting Choice of Data Capture Method ..................................................................................................... 17
Encoding Data ............................................................................................................................................................. 18
File Formats..................................................................................................................................................................... 18
Security Measures to Protect Data ............................................................................................................................. 19
How Businesses Protect Data ..................................................................................................................................... 19
Data Transfer Technologies ............................................................................................................................................ 20
Backup and Recovery Systems & Choice of System ................................................................................................... 21
Business Communications .............................................................................................................................................. 22
Diary management software ...................................................................................................................................... 22
Working Collaboratively on Documents ..................................................................................................................... 23
ICT Law ............................................................................................................................................................................ 23
The Data Protection Act ................................................................................................................................................ 23
The Computer Misuse Act........................................................................................................................................... 24
Health and Safety At Work Act ................................................................................................................................... 24
Copyright Downloading Music and Copyright Issues.................................................................................................. 25
Computer Misuse Act.................................................................................................................................................. 26
Implications of Data misuse on an Organisation ........................................................................................................ 26
Threats to Data ............................................................................................................................................................... 27
Laptop
Netbook
Tablet
Smartphone
Ultrabook
Features
Large screen
Full keyboard
Touchpad mouse
Full computer
Portable
Small screen
Very light
Portable
Long battery life
Web cam
Large touch screen
Apps
Graphical interface
Wifi / 3G
Touch screen
Apps
Graphical Interface
Long battery life
Mobile phone
Internet access
Very thin
Large screen
Very powerful
Long battery life
Wifi
Purpose
Business people to use in multiple
locations.
Students to use between home/college.
Office/Multimedia/Gaming
Mobile users who need a basic computer
on the move.
Family entertainment.
Commuters working on the move.
Schools to promote learning
Entertainment
Web browsing.
Basic working
People who need a phone and business
utilities (email, web, calendar)
Entertainment: music, games and other
apps on the go.
Socially: People to use social media on
the go.
Gamers
Commuters very lightweight so easily
portable.
Business/School/Entertainment
Input Devices
An input device is something which lets you put information into a computer. Here are some common input devices.
Microphone
Graphics
Tablet
Mouse
This would be used to make recordings or as voice control giving the computer commands. It could
also be used to dictate a document.
This is like a really large touchpad mouse except you can draw on it with a special stylus. What you
draw appears on the computer. Bit like digital paper
Moving around a computer.
Touch
Screen
Keyboard
Touch Pad
On mobile devices like laptops where a normal mouse would not be convenient, this is a small square.
Moving your finger over it controls the cursor.
Still the most common way of quickly typing in text into a computer
For
Temperature
Light
Level of light
Pressure
Tilt
Touch
Sound
Example
Greenhouse / Home central heating.
Fire detection systems.
Security lights, street lights
Phone sensor (auto-adjusts brightness)
Car park barriers, burglar alarms
For example when a car moves over a pressure pad, the barrier
raises in a car park.
Mobile phones. For example if you put your phone landscape,
the screen rotates for you.
Mobile phones / touch screens. These are everywhere.
Security system or in public houses. It detects if noise is too loud
and alerts somebody.
Output Devices
An output device is something which is used to display or return information to a user.
Screen
Printer
Touch Screen
Projector
Speakers
Operating Systems
An operating system is what every computing device has to have. It allows us to interact (use) a computer. Without
it, your computer would just be plastic and metal. It controls everything the computer does.
An operating system (or OS) is a computer program which controls everything the computer does
(absolutely everything!!!).
It is essential software. Without it, a computer cannot run (It will not know what to do!!!)
Geeky Features
Manage memory
Save, Print
Provide an interface
Shortcuts for experts
Run software
Communicate with devices.
Process inputs
Icons
windows
gadgets
The desktop
menu
There are lots of different operating systems which you need to know about. Here they are
Operating
System
Devices
Desktop PC
Laptop
Netbook
Ultra Book
Windows
iPad
IPhone
iPod
Apple iOS
Smart Phone
Tablet
Netbook
Googles Android
Mac
Computers
Mac OS X
Features
Windows, Icons, Menus Pointers
Start Menu
Customisable background, icons.
windows files, folders.
Shortcuts (e.g. CTRL+C etc)
Separate usernames and passwords.
Accessibility features (magnify,
narrator etc)
F1 Help
App Store
Music
Camera
Bluetooth
Email/Internet
3G/WiFi
iCloud
Siri Voice Control
App Store
Music
Camera
Bluetooth
Email/Internet
3G/WiFi
iCloud
Finder quickly find programs and
files.
Dock to locate all programs
iLife: Garageband, iMovie, iDVD etc
for creativity.
Purpose
Can run a wide range of software:
Business E.g. to use Office
Personal Gaming, Entertainment
Social Internet browsing etc.
Mainly for working computers where
people do lots of different things.
Downloading and running apps on the
go via the app store. These can be for
entertainment, business or social
purposes.
Entertainment devices.
Business can use the calendar, email
and internet features.
Socially social media links and built in
camera etc.
All the same purposes as IOS
Users can also tether and connect their
laptop or other device to the internet
via their phone.
Utility Software
An operating system is something which allows us to interact with a computer. An example is Microsoft Windows.
Many operating systems have four features; Windows Icons Menus and Pointers. Instead of pointers, some mobile
operating systems like iOS or Android have a touch screen.
As well as these features, many operating systems have quick access to help facilities and shortcuts such as ctrl+c for
copy and ctrl+v for paste. Most OS also allow the user to personalise the desktop, for example by changing the
background or icon sizes.
Utility software allows us to manage specific parts of our computer. An example includes Anti-Virus software which
protects us against viruses A firewall also stops hackers or other unauthorised people getting in to our computer.
Disk cleanup allows the system to remove old files and software from our computer saving space and allow the
computer to run faster.
6
Item
Firewall
Anti-Virus
Software
System
Update
Disk
Cleanup
AntiSpyware
Definition / Meaning
A firewall is a piece of software which
controls what information comes in to
your computer and also what leaves your
computer based on a series of rules.
Software which checks files and
programs to ensure you do not get
infected with a virus.
Software which updates your operating
system or other programs with the latest
updates.
Memory Cards
Modem
Router
DVD
Cloud Storage
CD
Magnetic Tape
Main Features
Large capacity
Cheap
Small and portable
Connects to an internet
connection.
Speeds can vary
Allows you to share an internet
connection.
If you have a slow router, this
will affect your transfer speeds.
Large capacity (4-8GB)
Good quality
Read only (cannot overwrite)
Portable, light, cheap.
Access anywhere
Requires an internet connection.
Easily share with people.
Very fast.
Store a lot of data
No moving parts.
Very expensive.
700MB size.
Very cheap 10p
Portable, light.
Read only
Large capacity
Portable
Can be overwritten
Company backups.
It is very slow for anything else.
Office Configurations
People with various impairments may need help when accessing IT systems. Lots of technology exists which would
help them.
Braille Keyboards
Microphone input
Magnifier
On Screen Keyboard
Foot mouse
Touch Screens
Large icons/mouse
pointers etc
Remember: CASE
Area
Key Questions
Cost
Security
Example
If the computer is 2000 and it is only going to be
used by a receptionist to type letters is it worth it?
Will you use all the extra stuff it does?
10
Connectivity
So when buying a computer system, there are lots of different add-ons that you could connect (e.g. printer, scanner,
camera, keyboard, mouse, monitor etc.) These things are all called peripherals and they can connect in lots of
different ways.
USB
A wireless technology which allows one device to talk and connect to another. It can be
used in anything (phones, computers, even TVs!). It is secure and has a long battery life.
Uses: Bluetooth headset, Sending/Receiving files on phones, Car-Phone connection,
Wireless games controllers.
This is a standard technology on most computers that allows lots of different things to
connect to a computer. Examples include printers, mouse, keyboard, cameras etc
Firewire / Thunderbolt
Some devices have a lot of data, for example a video camera might have hours of film
footage from a family day out. Firewire is like a really fast USB connection that allows you
to transfer multimedia really quickly. Thunderbolt is a new version which is really really
fast!
HDMI or VGA
These are the two current main ways to connect a screen to a computer. VGA is an older
standard connection for normal quality screens. HDMI allows for much clearer quality
pictures and is high definition. It is used for computers, TVs and things like games
consoles.
A bit like Bluetooth you but the two devices connecting together have to be close next to
each other. It is really slow. Its an old technology now and is used in things like your
remote control for your TV. You will notice that it does not work around corners or too far
away from your TV.
Infra-Red
11
Connecting to Wi Fi
When connecting to wifi, these rough steps are needed; which are similar for most devices.
Diagram
Explanation
1. Check your wireless is switched on on your
computer, laptop etc
12
Monitoring Employees
If people are working from home, it is important that an employer can monitor their performance. Technology now
allows this to happen.
Term
Meaning
How work/used
GPS signal provided by
It can be used to track where you are in the world, whether
phone/device.
Using
satellites
you are moving and approximately what speed.
GPS
to track your location.
Employees may use it to determine whether you are where
Coordinates used in third
you are supposed to be. For example if you are working from
party software (e.g. Google
home checking if you are actually at home!
Earth) to determine employee
location on earth.
Internet Logging
Communications
Monitoring
System
Monitoring
Cookies
Key Logging
13
Working Patterns
Now we live in a globalised world, people can live anywhere and work for anyone. There is no need for a fixed office
any more. People can work together from anywhere at any time.
Teleworking
14
Video Conferencing
Input
(Data entered)
Process
(used)
Output
(displayed)
15
Automated Methods
Method
RFID
Radio Frequency
Identification
NFC
Near Field
Communication
Barcode
How it works
RFID uses a small chip which placed
underneath packaging or inside clothes.
It contains information such as item
name, price, expiry, where bought from
etc. When an RFID reader passes near it,
the chip is powered and the information
is read from it.
A small chip located in electronic devices
and also in readers. When the two come
into near contact (close proximity), the
information is read.
Data Validation
Validation aims to make sure that data is sensible, reasonable and allowable.
It does NOT check data is correct. How can it! E.g. 9/7/1984 is a VALID date of birth, but it would not be correct for
someone who is 14 years old.
Validation Checks:
Type Check checks something of the correct type is entered. E.g. a date in a date field, a number in a number
field etc.
Range Check checks something is within a specific range. E.g. an order quantity is between 1 and 10, > 18years
old, or <21 etc.
Presence Check checks that something is there. E.g. Mandatory field. Makes sure REQUIRED fields are entered.
Format Check checks what is entered is of the correct structure. E.g. Postcode (LLNN NLL) E.g. TS23 3DX.
E.g. a phone number is STD: NNNNN Num: NNNNNN
Length Check Ensures that information is of a specified length. For example a name field may be more than 2
characters. If it is less it would not be accepted.
Verification Checks:
Verification ONLINE
This is used to ensure data is as accurate as possible. Remember, it is not possible to check data is 100% correct.
Verification means to check the data that you have entered against the original source data.
You may also be aware of CATCHPA checks which ask you to type in a word, phrase or collection of letters/numbers.
This is to ensure you are a real person and not a scammer of automated computer trying to hack.
How is this done?
Entering the data twice (e.g. PASSWORDS).- Double Keying
Double Checking (Proof reading)
Verifying you are a human to prevent BOTS or AUTOMATED SIGN UPS by using CAPTCHA.
Remember: CADEN
Cost
Availability
Data Security
Is it cost effective
Do the benefits outweigh cost
Is it easy to implement.
Do all people involve use the
technology.
Is it secure enough to store data?
Ease of Use
Nature of data
collected
Environmental conditions
Where is the information.
17
Encoding Data
Encoding simply means shortening what is entered into a computer system when inputting data. It is all around us
and happens all over the place.
Registration Plates
Flight Names
Signs
Company Names
Computers do it because:
Takes up less storage space
Faster to enter / type
Easier to check with validation (no spelling etc).
Faster to use and send the data (smaller file sizes).
File Formats
Proprietary File Formats: created and owned by a company and can only be used properly in the software they
create.
File
Format
Creator
Used for
.doc
.docx
Microsoft
Word
processing
documents
made in Word.
.xls
.xlsx
Microsoft
Spreadsheets
made in Excel
.ppt
.pptx
Microsoft
Presentations
made in
PowerPoint
.fla
.wma
.aac
Adobe
Animation files
made in Flash.
Microsoft
Music to be
played back in
Windows
Media Player.
Apple
Music to be
played back
in Apple
iTunes.
Open File Formats: general formats which do not need one specific software package and can be adopted and
used by any developer
File
Format
Used
for
.rtf
.csv
.exe
.txt
.mp3
.wav
Basic text
with
pictures.
Read only
files for
people to
see but not
change.
Transferring
data from one
system to
another.
Programs on
a Windows
computer.
Plain text
files.
Compressed
music.
Full high
quality
sounds.
18
Access Security
Data Security
Monitoring Systems
Access Levels give different people different levels of access. For example, someone may be able to see customer
records but not change them. A senior manager may have a higher level of access where they can change them.
Firewalls prevent unauthorised access from outside.
Audit Transaction Logs these are files which keep a record of everything is done on a computer system. Should
anything be changed, the log file can be checked.
19
When choosing the best method you need to think of lots of different things. If the data is really important (e.g.
customer credit card details) then the most secure method should be chosen. Also if you have a 100GB file, the
chances are you are not going to use email or Bluetooth where it will take a long time.
As well the transfer method you also need to think about bandwidth. Imagine your connection to be like a large
road. In the early hours of the morning, the road will be really quiet and therefore a car could go the full speed limit
without issue. During rush hour, there will be a lot of traffic and the car would travel much slower.
The same applies to the internet. The more people use the internet, the slower your connection will be. The larger
the file (effectively, the bigger the car), so it will take longer to get it moving down the road.
20
Remember: CASE
Cost
Availability
Security
Ease of Use
21
Business Communications
Voice
Useful for quickly contacting
employees to discuss
something directly and
ensure the message is
understood.
Text Messaging
Used for sending short
informal messages to an
employee without them
having to answer
immediately.
Instant Messaging
Multiple people can chat all
at once in real time from
different locations.
Email
Instant communications
worldwide, where people
do not have to be there for
the email to arrive.
Chat Rooms
Like instant messaging but
more public and an open
way of conversing.
Forums
A way where people can
post comments or
contribute to discussions.
Like an electronic version of
a noticeboard.
VOIP
Using the internet to make
voice calls (e.g. Skype).
International and
significantly cheaper than
phones.
Social Media
Using things like social
networks to communicate
informally.
Blogs
Like an online diary where
employees can publish their
work publicly or privately
for others to review.
22
ICT Law
The Data Protection Act
The Data Protection Act 1998 sets out to protect the privacy of personal information.
Data subjects are people who have data held about them just about everybody really.
Data users are the people or organizations who hold the data. There are far more data users
than many people think.
1. fairly and lawfully processed (used)
2. used for limited purposes
3. adequate and relevant. Only what is needed may be used
4. accurate
5. not kept for longer than is necessary
6. accessible to the individual and able to be corrected or removed where necessary
7. secure
8. not transferred to countries without adequate protection.
Your Rights:
see what data is being held about them if they ask the data user. They may
have to pay to see it
change anything that is wrong
refuse to have some data stored at all, if it might cause damage or distress
refuse to allow processing for direct marketing junk mail
complain to the Data Protection Commission if they think the rules have been broken
claim compensation if they can prove they have been caused damage by a data controller breaking the
rules.
Exemptions:
national security you cannot demand to see your data if national security is at stake
police investigations information being used to prevent crime is not covered (though police records are)
examination results are exempt until they are published by the examining bodies.
23
Prevention
Sit at arms length
Not too light or dark
Regular breaks (15 minutes per hour)
New Monitor
Anti Glare screens
Prevention
At least 5 minutes break every hour
Mouse bags
Keyboard rests
Wrist supports
Keep elbows close to your side
Back problems
-- Caused by sitting in an awkward position at a
computer.
Prevention
Keep good posture
Use an adjustable chair to allow a good position Sit with
your back straight and head up
Adjustable monitor so you dont have to bend your neck
24
Copyright
Downloading Music and Copyright Issues
BUT:
It is illegal to download
music without permission
or purchase.
You could face legal
action or removal from
your internet service
under the three strike
legislation.
Ignorance is not an
excuse
What if someone illegally uses products from a business? (e.g. downloads a movie someone has produced without
paying for it).
1. Loss of sales?
2. Unemployment
3. Company have to pay legal expenses to prosecute.
4. Increased prices for consumers? Why?
5. Fewer products produced due to smaller budgets.
What if a business uses something they have not got permission to use? (e.g. copying a design from one product in
their own).
1. Loss of confidence by consumes
2. Could be prosecuted.
3. Brand name in disrepute.
4. Fine/Sued
5. Forced to withdraw product.
25
3.
It is illegal to access unauthorised data and change it e.g. Planting viruses and deleting files.
Accidental loss
Corruption (data becomes damaged)
Data is stolen.
If a business does any of the above, they can be in serious trouble. The three ways below outline just how businesses
can be affected.
26
Threats to Data
Threat
Computer Virus
Description
Something which is designed to replicate and cause
damage or harm to a computer system.
Worm
Trojan Horse
Phishing
Adware
Hacking
Denial of Service
Attack
Physical Threats
Staying Safe