Btec National Information Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

THIRD

REVISE BTEC NATIONAL EDITION


Information Technology
UNITS 1 AND 2
REVISE BTEC NATIONAL

THIRD EDITION
REVISION GUIDE
Our revision resources are the smart choice for those revising for
the externally assessed Units 1 and 2 in Information Technology
BTEC Nationals. This book will help you to:
Information
Technology

REVISE BTEC NATIONAL Information Technology UNITS 1 AND 2 REVISION GUIDE


• Revise all the essential content and key skills for each unit
• Organise your revision with the one-topic-per-page format
• Speed up your revision with helpful hints on how to tackle
questions and tasks
• Track your revision progress with at-a-glance check boxes
• Check your understanding with annotated example responses
UNITS 1 AND 2
• Practise with revision questions and answers.

Revision is more than just this Guide!


Make sure that you have put all your skills into practice with the
accompanying BTEC National Information Technology Revision REVISION
GUIDE
Workbook. It gives you:
• More revision questions and tasks to complete, with write-in
format
• Guided activities to help scaffold revision questions and tasks,
and build your confidence
Unit 2
• Practical hints to support your revision and practice. This is the Customer table.
Guided

ludes
REVISE BTEC NATIONAL
SECOND nc

FREE
EDITION

I
Information Technology
REVISION WORKBOOK REVISE BTEC NATIONAL
SECOND EDITION

Information
Our revision resources are the smart choice for those revising
for the externally assessed units in Information Technology BTEC
Nationals. This book will help you to:

• Practise with revision questions and tasks for all externally

Technology
I have added an (c) for the Postcode field.
assessed units, with answers
REVISE BTEC NATIONAL Information Technology REVISION WORKBOOK

n
• Build your confidence with guided revision activities to This is the (d) table.
scaffold longer tasks
• Improve your understanding with practical external assessment

on

io
hints throughout

REVISION li n t
• Prepare by completing practice responses in a write-in format

e e di
• Organise your revision in a single place.

Revision is more than just this Workbook!

WORKBOOK
Make sure that you have revised all the essential content and key
skills for each externally assessed unit with the accompanying BTEC
National Information Technology Revision Guide. It gives you:
• Full coverage of all essential content and key skills in a
one-topic-per-page format
• Key practical hints and tips for external
assessment throughout
• Annotated example responses demonstrating
good practice in approaching assessed tasks
Unit 1
Had a look Nearly there Nailed it!
Content

Emerging technologies
• The ability to track your revision with Emerging technologies are those that are currently in development and are just starting to make an
impact on business and general society.

What are emerging technologies?

at-a-glance check boxes


Some of the emerging technologies we see today include:
• artifi
artificial
cial intelligence
• biometrics
• robotics Virtual reality is an emerging
• virtual reality. technology set to make
a big impact on how we
REVISE BTEC NATIONAL entertain ourselves at home.

• Further revision questions Information


and tasks, with
Technology
REVISE BTEC NATIONAL I have added a (e) rule with validation text for the Date_time_reported and
REVISE BTEC NATIONAL Information Technology REVISION GUIDE

REVISION GUIDE Emerging technologies at home and work

answers.
Emerging technologies are changing the way we live our personal lives and the way we do business.
Here are some examples.

Information
Our revision resources are the smart choice for those revising
for the externally assessed units in Information Technology BTEC At home
Biometrics let Virtual reality is opening up new and
Nationals from 2016. This book will help you to:

(f) fields.
fields.
Artificial intelligence in
Artificial us log securely exciting video gaming opportunities.
automated vacuum cleaners into our tablets
• Revise all the essential content and key skills for each unit

Technology
gives us more leisure time. and smartphones Domestic robots can carry out
• Organise your revision with the one-topic-per-page format Self-driving cars could soon through our thumb household chores or home security.
make the roads safer. print. Social robots provide companionship.
• Speed up your revision with helpful hints on how to tackle
questions and tasks
At work
• Track your revision progress with at-a-glance check boxes
Artificial
Artifi cial Biometrics are increasing security at airports Virtual reality is

REVISION
• Check your understanding with annotated example responses intelligence through facial recognition at passport checks. allowing businesses
• Practise with revision questions, with answers. used in business to test products
forecasts is Robots are performing dangerous jobs without risk under development
helping in decision to life. They can then carry out routine production in a virtual
Revision is more than just this Guide! making. line tasks, as well as delicate surgical procedures. environment.

GUIDE
Make sure that you have put all your skills into practice with the
accompanying BTEC National Information Technology Revision Implications of emerging technologies
Workbook. It gives you: • The Internet of Things (IoT) allows your car to know where you are going and how to get there, and
your fridge to pre-order your supplies, but all this needs data. Increasingly, advanced data-hungry

THE REVISE SERIES


• More revision questions and tasks to complete, with write-in
technologies are placing a strain on the existing infrastructure.
format

45
• Society demands data wherever and whenever it likes – we are no longer confi
confined
ned to the home WiFi
• Guided activities to help scaffold revision questions and tasks, office
network or the office LAN. Location-aware technologies and the availability of 3D imaging means that data
and build your confidence access is essential to maintain and develop the emerging world of virtual reality and autonomous systems.
• There are new ways of gathering ‘big data’ which means we need new ways of analysing it.
• Practical hints to support your revision and practice ludes
• Layout and formatting that mirrors the actual assessment.
Unit 2
nc • New ways of identifying ourselves through biometric data also brings the need for greater and more
powerful security.
I

Guided

FREE
This is the Customer table.

Think about how Liam is


n

going to collect data


REVISE BTEC NATIONAL
Information Technology
on

io

REVISE BTEC NATIONAL


li n t and what he will do with
REVISE BTEC NATIONAL Information Technology REVISION WORKBOOK

REVISION WORKBOOK

e e di
Liam has a small chain of petrol stations and wants to capture the buying
Information
Our revision resources are the smart choice for those revising

it. Explain the potential


for the externally assessed units in Information Technology BTEC

habits of his customers so he has introduced a loyalty card scheme.


Nationals from 2016. This book will help you to:

• Practise with full-length assessment-style tasks for all externally

Technology impact on his existing


M02_BTEC_IT_WB_0352_M02.indd 45 23/01/2017 10:53
I have added an (c) for the Postcode field.
assessed units, with answers
• Build your confidence with guided revision activities to This is the (d) table.
scaffold longer tasks
• Improve your understanding with practical external assessment
hints throughout Explain what other measures Liam needs to consider so he can get useful systems.
REVISION
• Prepare with a layout and formatting that mirrors the actual
assessment
• Organise your revision in a single place with the option to write
straight into the book.
marketing information.

WORKBOOK
Revision is more than just this Workbook!
Make sure that you have revised all the essential

13

THE REVISE SERIES


content and key skills for each externally assessed unit with the
accompanying BTEC National Information Technology Revision Guide.
It gives you:
• Full coverage of all essential content and key skills in a one-topic-
per-page format
• Key practical hints and tips for external assessment
throughout
• Annotated example responses demonstrating
good practice in approaching assessed tasks
• The ability to track your revision with at-a-
glance check boxes I have added a (e) rule with validation text for the Date_time_reported and M01_IT_REV_BTEC_0345_U01.indd 13 24/11/2016 11:20
• Further assessment-style practice questions, (f) fields. This is the (g) table.
with answers.

THE REVISE SERIES


45

M02_BTEC_IT_WB_0352_M02.indd 45 05/12/2016 09:04

THE REVISE SERIES


For the full range of Pearson revision titles

For the full range of Pearson revision titles across

For the full range of Pearson revision titles across


across KS2, KS3, GCSE, AS/A Level and BTEC
visit: www.pearsonschools.co.uk/revise

For the full range of Pearson revision titles across


KS2, KS3, GCSE, Functional Skills, AS/A Level and
www.pearsonschools.co.uk
[email protected]

BTEC visit: www.pearsonschools.co.uk/revise


CVR_BTEC_NAT_IT_RW_0352_CVR.indd 2 12/12/2016 11:16

KS2, KS3, GCSE, Functional Skills, AS/A Level and


www.pearsonschools.co.uk
[email protected]

BTEC visit: www.pearsonschools.co.uk/revise


CVR_BTEC_NAT_IT_RG_0345_CVR.indd 2 12/12/2016 11:31

KS2, KS3, GCSE, Functional Skills, AS/A Level and


www.pearsonschools.co.uk
[email protected]

BTEC visit: www.pearsonschools.co.uk/revise


CVR_BTEC_NAT_IT_RW_0352_CVR.indd 2 21/06/2017 09:13

www.pearsonschools.co.uk
[email protected]

CVR_BTEC_NAT_IT_RG_9099_CVR_3ED.indd 1 3/5/19 9:42 AM


REVISE BTEC NATIONAL
Information Technology
UNITS 1 AND 2

REVISION
GUIDE

Series Consultant: Harry Smith


Author: Daniel Richardson and Alan Jarvis

A note from the publisher


While the publishers have made every attempt to ensure that advice on the qualification
and its assessment is accurate, the official specification and associated assessment
guidance materials are the only authoritative source of information and should always
be referred to for definitive guidance.
This qualification is reviewed on a regular basis and may be updated in the future.
Any such updates that affect the content of this Revision Guide will be outlined at
www.pearsonfe.co.uk/BTECchanges. The eBook version of this Revision Guide will also
be updated to reflect the latest guidance as soon as possible.

For the full range of Pearson revision titles across KS2,


KS3, GCSE, Functional Skills, AS/A Level and BTEC visit:
www.pearsonschools.co.uk/revise

F01_IT_REV_BTEC_0345_PRE.indd 1 15/03/19 6:45 PM


Introduction
Which units should you revise?
This Revision Guide has been designed to support you in preparing for the externally assessed units
of your course. Remember that you won’t necessarily be studying all the units included here – it will
depend on the qualification you are taking.

BTEC National Qualification Externally assessed units


Certificate 2 Creating Systems to Manage Information
For both: 1 Information Technology Systems
Extended Certificate 2 Creating Systems to Manage Information
Foundation Diploma
For both: 1 Information Technology Systems
Diploma 2 Creating Systems to Manage Information
Extended Diploma *11 Cyber Security and Incident Management
*14 IT Service Delivery
* Units 11 and 14 are not covered in this book.

Your Revision Guide


Each unit in this Revision Guide contains two types of pages, shown below.

pages help you revise the pages help you prepare for
Content Skills
essential content you need your assessment.
to know for each unit. Skills pages have a coloured edge and
are shaded in the table of contents.

Unit 1 Had a look Nearly there Nailed it!


Content

Application software
Application software allows end users to complete tasks, such as creating a report or a presentation.

Uses of application software Unit 1


There are many different types of application software that have their own uses.Had
These a look
include: Nearly there Nailed it!
Productivity software – these are applications like word processors, desktop publishers and Skills
spreadsheets that are used in office environments to support business tasks and improve efficiency.
Graphics software – these applications are used to edit photos or create original artwork.
Communications software – these applications make communicating quicker and easier. They include Using case studies
instant messaging, email and VOIP software. Exam questions may be based on case studies about a business’s or individual’s use of IT systems. Each
case study will give you all the background information you need to answer the questions effectively.
Always read a case study carefully as your answers must relate to it.
Proprietary and open source software Why case studies are important
These terms refer to who owns the source code behind the software. Case studies allow you to apply your knowledge of the unit’s content to real-world situations and
contexts. This will help you when you move into the working world.
Proprietary software Open source software
Areas of knowledge you will need to apply
The source code is privately owned by the The source code is available to read and modify.
software company. Most open source software is free to use,
Users pay to buy or subscribe to the software. The devices
although many companies provideinpaid-for
IT systems Transmitting data Online IT systems
Support (e.g. for setup and troubleshooting) services to enhance•and/or support are
how devices open source.
used • connection types • online systems and communities
is provided by the software Support and fixes•are
theprovided
relationships
by the • networks • implications for individuals
creators. between them
community, often via forums. • the implications • implications for organisations
It may have more features than open source Open source utility software is usually
software. compatible with other proprietary utility software.
Protecting data Impact of IT systems Issues involved in using IT systems
The software company may be slow to provide Support with fast response may not be
updates and bug fixes.
• implications of storing
available when needed, as it relies on goodwill.
• on individuals • moral and ethical issues
Software is usually very generic, with little
• implications of transmitting
There may be indirect costs involved in paying
• on organisations • legislation and codes of practice
scope for customisation due to copyright or for support and training. Case studies may be shown in a box above the questions, like
complexity issues. this. The content of case studies will be different each year
It can be costly. and the format may be different. Details of assessment may
change so always make sure you are up to date.

Thomas is a printer repair technician who travels to offices


Choosing software Performance spread all over London to repair printers. Highlight relevant
When choosing software, consider: When looking at performance,
In order to consider:
perform his job he uses a tablet to check his work information
• ease of use – familiarity and ease of use is • the maturity of the email for newasjobs
software, and toversions
stable report any updates to his managers. It is a good idea to highlight or
paramount of software can be more efficient given there underline case study details, as the
Describe the role of protocols in allowing Thomas to access
• reliability – ensuring software works as has been time for bugs to be resolved student has done here, to help you give
his emails. 6 marks
intended and can be depended upon • interoperability – interface with other devices a specific response to the question.
• capability – that the software can do the job or systems extract Here, you could underline the information
Sample response that Thomas needs to both send and
required of it and do it effectively. • support of dedicated hardware for complex
tasks. There are three main protocols used in email systems. retrieve emails and the device he is
SMTP is used to send Thomas’s emails from his email using while on the move.
client to his outgoing mail server. It also transfers the
email between email servers over the internet. Relate each part of your answer
POP3 is a protocol for retrieving emails from to the case study about Thomas.
Thomas’s
This incoming
task requires maildepth
greater server. It will download the
asemails
it asksfrom thetoserver
for you to his device so he can read
’analyse’. For this question, applying your knowledge
Seth is looking at different software options for managing them offl
Identify ine.
advantages and clearly of protocols is quite straightforward. If
orders and deliveries in his freight shipping business. explain
IMAPwhyis an alternative
they to POP3 where the emails
would be useful you were being asked to evaluate, you
forare
Seth, as well
synced between the server and device rather
as how some might need to look at which protocol out
Analyse the relevant benefits and drawbacks to Seth of using of IMAP and POP3 meets Thomas’s needs
drawbacks
than downloaded,
would affectsohim.Thomas would also be able to
an open source software application for meeting his needs. better, so you would need to make sure
access the emails on a different device.
you fully understand his situation.

12 You can gain a lot of information from


case studies to help you answer the
exam questions. Which key facts would
M01_IT_REV_BTEC_0345_U01.indd 12
Olivia is a marketing consultant29/07/17
who has several large
4:39 PM
you underline in this question?
organisations as her clients. She has recently started to store
all of her clients’ information online using cloud storage.
Look at pages 36–37 to revise
Explain the moral and ethical issues involved in Olivia storing her Links
moral and ethical issues, and
clients’ information on the cloud. pages 21–22 to revise cloud computing.
41

Use the Now try this activities on every M01_IT_REV_BTEC_0345_U01.indd 41 02/01/19 12:47 PM

page to help you test your knowledge


and practise the relevant skills. Look out for the sample response extracts to
questions or tasks on the skills pages. Post-its
will explain their strengths and weaknesses.

iii

F01_IT_REV_BTEC_0345_PRE.indd 3 25/01/19 11:30 AM


Work
b ook
Contents
also
avail
exte able for
asses rnally
sed u
ISBN nits
9781292
23059
7

Unit 1: Information Unit 2: Creating Systems to


Technology Systems Manage Information
1 Digital devices 1 48 Relational database management systems (RDBMS)
2 Digital devices 2 49 What are entities?
3 Uses of digital devices 50 Entity relationships: one-to-one and one-to-many
4 Input and output devices 51 Entity relationships: many-to-many
5 Devices for accessibility and data processing 52 Relational keys
6 Storage devices 53 Database integrity
7 Types of operating system 54 Relational algebra
8 The role of the operating system 55 Normalisation
9 User interfaces 56 The stages of normalisation
10 Utility software 57 Table designs
11 File types 58 Manipulating data structures and data: SQL – Create
12 Application software and Insert
13 Emerging technologies 59 Manipulating data structures and data: SQL Select
14 Choosing an IT system 60 Relational database design steps
15 Wired connection methods 61 Relational database design considerations
16 Wireless connection methods 62 User interface design
17 Features of different networks 63 Reports and task automation
18 Network choice and performance 64 Query design
19 Protocols 65 Test plans
20 Data transmission issues 66 Creating, setting up and maintaining data tables
21 Features of online systems 67 Data validation rules: lookup lists
22 Using online systems 68 Data validation rules: comparison and Boolean operators
23 Online communities: methods of communicating 69 Validation rules: input masks
24 Online communities: implications 70 Creating relationships
25 Threats to data, information and systems 71 Generating output with queries
26 Protecting data: tools and techniques 72 Queries using comparisons and multiple criteria
27 Protecting data: legislation and codes of practice 73 Action queries
28 Features of online services 74 User interface: creating and adjusting forms
29 Business uses of online services 75 User interface: adding automated features to form
30 Uses and implications of IT systems 76 User interface: login form
31 Impact of IT systems on organisations 77 Testing and refining the database solution
32 Gathering data 78 Evaluating the design process
33 Processing data 79 Evaluating the development and testing process
34 Data presentation and trend analysis 80 Your Unit 2 set task
35 Presenting data and results 81 Reading the brief
36 Moral and ethical issues 1 82 Handling data
37 Moral and ethical issues 2 83 Creating an entity relationship diagram (normalisation)
38 Legislation protecting users and data 84 Drawing an entity relationship diagram
39 Legislation ensuring accessibility 85 Creating table designs
40 Your Unit 1 exam 86 Creating table relationships
41 Using case studies 87 Creating the user interface
42 Long-answer questions 88 Automating forms
43 Short-answer questions 89 Devising a test plan
44 ‘Draw’ questions 90 Creating a database
45 ‘Explain’ questions 91 Evaluating a database solution
46 ‘Analyse’ questions
47 ‘Evaluate’ questions 92 Answers

A small bit of small print


Pearson publishes Sample Assessment Material and the
Specification on its website. This is the official content and this
book should be used in conjunction with it. The questions in 'Now
try this' have been written to help you test your knowledge and
skills. Remember: the real assessment may not look like this.

iv

F01_IT_REV_BTEC_0345_PRE.indd 4 02/01/19 6:08 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Digital devices 1
A digital device is an electronic device that uses digital data (such as 1s and 0s) as opposed to analogue
data (such as a sound wave). Here are five commonly used types of device that you need to know about.

Multifunctional devices
These devices can perform multiple functions, such as
inputting and outputting data.
An example is a touch screen, which outputs an image while
allowing the user to input data by pressing the screen or a
multifunctional printer.

Personal computers
These are small and inexpensive computers for use by
individual users.
Examples are desktops and laptops, which are more portable
and have a built-in battery, screen and keyboard. Force feedback game controllers
are multifunctional devices – they
can input data and output vibration.

Mobile devices
Smartphones and tablets are made with
portability in mind to give people computer and
internet access while on the go.

Servers
These powerful computers provide services to
other computers connected to a network.
Web servers store web pages An example is a mail server that provides access
and online content, and serve to email services for all the users on a network.
data to users over the internet.
For more on
Links
networks,
see page 17.
Entertainment systems
These are devices for watching Games consoles
TV/films (such as satellite or cable are entertainment
digiboxes), listening to music and systems with
playing video games. powerful graphics
processors that
allow users to play
video games.

Concentrate on
Nadeem’s requirements,
Nadeem wants to access the internet while he is travelling to college by train. and the features he
most needs when using
(a) Give a type of digital device that would be appropriate for Nadeem to use.
a device while out of the
(b) Explain two reasons why the device you chose is appropriate for Nadeem’s house, on a train.
requirements.

M01_IT_REV_BTEC_0345_U01.indd 1 02/01/19 6:13 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Digital devices 2
Digital devices are often developed to make everyday tasks easier, quicker or more cost-effective and
to provide efficient, improved access to data. There are four types of digital device that you need to
know about.

Digital cameras Navigation systems


These capture images and videos digitally These devices use a GPS (Global
using an image sensor and store them as Positioning Satellite) receiver to locate the
digital data on media such as a memory user’s position on a digital map and provide
card or hard drive. directions to a given destination.
Examples are still and video cameras. An example is an in-car satnav which uses
GPS location data with software to provide
There is more about data directions to a given destination when
Links storage on page 6. driving.

Communication devices and systems


These devices can send and receive analogue or digital
data to and from another device.
Traditional analogue examples include phones and faxes.
A modern digital example is a router which directs data
across a network.

WiFi dongles are communication


devices that allow your PC to
ly.
communicate with a router wireless

Data capture and collection systems


These devices collect and input data through
automated systems rather than direct data entry.
Examples include:
• a barcode scanner, which inputs (or reads) a
barcode and converts the information into data
• an optical mark reader, which reads pencil or pen
marks on specially designed printed forms, such as
lottery tickets
• an EPOS (electronic point of sale) system, which
records sales and updates stock levels.

An RFID reader reads data stored


on a smartcard
by being in close proximity to the
card. These are
often used by payment cards or for
stock control.

J P Lucy is a chain of small department stores, with five branches. Questions with the command word
‘state’ don’t require long answers.
State two different data capture and collection systems that might
You can give your answer using single
be used in the department stores.
words or short sentences.

M01_IT_REV_BTEC_0345_U01.indd 2 02/01/19 6:13 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Uses of digital devices


Digital devices play an increasingly important role in many different areas of our lives. They enhance our
social lives and make our work role more efficient. However, sometimes they also have the opposite effect.

Uses of digital devices


Here are some examples of how digital devices are used in six key areas of our lives.

Distance
learning Playing
Classroom teaching
degrees video games
– interactive Watching
whiteboards (IWBs) digital TV

Internet
The ability to access learning Virtual learning Personal banking
materials, submit work and environments
communicate with tutors (VLEs)
electronically makes e-learning Education and Operating
a fully interactive experience. training home systems

Online e-learning Instant


courses messaging
Uses of digital
devices Social Social
Designing logos networking
Creative
VOIP calls
Computer-aided
design (CAD) Editing
photos Online
Producing 3D Retail shopping
graphics for games
and movies
Organisational
use
Stock Recording
checking sales
Manufacturing
and constructing
Video Data/numerical
Producing and modelling
conferencing
sharing business The use of EPOS systems
documents allows retail businesses to
record sales, update stock
Managing accounts databases and identify
and payroll systems
customer preferences.

This is the second part of the


question you answered on the
previous page. When explaining how
J P Lucy is a chain of small department stores, with five branches. J P Lucy might use the data capture
and collection systems you identified,
Explain how your choice of data capture and collection systems you
focus on the advantages of these
have identified might be used in the stores and why they would be
systems. How do they help the
beneficial to the business.
business?

M01_IT_REV_BTEC_0345_U01.indd 3 02/01/19 6:13 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Input and output devices


Peripheral devices are hardware devices that are not essential to the running of a computer system,
but that connect to the system and provide additional functions. The most common types are input and
output devices.
For more on accessibility
Links
devices, see page 5.
Input devices
Device Features Example uses
Keyboard Made up of keys used to input alphanumeric • Writing a report
characters and symbols. • Inputting into a database
Mouse A pointing device used to select items on • Navigating a user interface, e.g. by
screen. clicking on icons
Scanner Converts hard copy text or images into a • Inputting a photo for editing in
digital format. graphics software
Graphics Controls the computer by using a stylus on a • Creating digital illustrations
tablet tablet.
Microphone Converts analogue signals (sound waves) into • Talking on VOIP software
electrical signals to be sent to the sound card • Voice recording
which converts analogue to digital.
Webcam Inputs video and still images directly into a • Video conferencing
computer.
Sensor Takes and inputs readings from the physical • Automated central heating systems
environment, such as changes in temperature. • Security systems

Output devices
Device Features Example uses
Monitor Outputs an image to the user, e.g. of the user • Viewing the user interface
interface, a photo or a document. • Watching movies
Projector Outputs an image onto a wall or screen.
Printer Produces hard copies of digital documents and • A hard copy of a report
images on paper. • Printing digital photos
Plotter This specialist type of printer draws to a very • Drawing vector graphics
high quality on very large paper.
Speakers Amplify analogue signals (sound waves) sent • Listening to music
from the sound card for the user to hear. • Listening to someone during a VOIP
Headphones A portable alternative to speakers. call

Marit is a graphic designer who


produces posters and leaflets.
She creates a lot of the digital
illustrations for these herself.
The question asks you to
‘explain’ your choice of input and
output devices, so as well as
naming the devices, you need to
State two input devices and two output devices, explaining how they give reasons why they are useful
would be useful to Marit in her graphic design work. to Marit.

M01_IT_REV_BTEC_0345_U01.indd 4 02/01/19 6:13 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Devices for accessibility


and data processing
Peripheral devices have been designed to perform many specialist functions. Two important types are
devices that aid accessibility to computer systems, and those that automate data processing for
organisations.

Accessibility devices
Adaptive technologies
Some peripheral devices are
specifically created to allow These are technologies that
accessibility for people with have been designed specifically
disabilities. For example: to aid people with disabilities.
They include both hardware
• trackball – an easier-to-use and software.
alternative to a mouse,
consisting of a moveable
ball on a base Peripheral devices such as
• touch screen or large a trackerball or eye motion
key keyboard – useful for sensors are hardware –
people unable to use a they are physical items that
keyboard easily you can touch.
• eye motion sensors and
There are also many types
head motion trackers
of software available to aid
– used by people with accessibility, such as voice
significantly limited mobility recognition software for input
• Braille embosser – a type and screen reading software
of printer that outputs text for output.
as Braille cells (characters).

Manual and automatic data processing


There are peripheral devices which can automate the input and processing of data and avoid human
errors such as typos during data entry. Some types of data collection, input and processing are more
commonly done manually. Here are some examples of both.

Automatic processes/devices Manual processes


• Biometric readers read fingerprints, hand prints or • Keying client or product details into a
irises for use in personnel identification systems. database.
• Barcode readers read lines of different thickness • Entering customers’ meal choices into
and convert them into a string of values. 2D a restaurant’s system.
readers read more complex QR-style codes. • Marking exam scripts.
• Optical mark recognition (OMR) readers • Entering survey responses from a
automatically read a form and input the data. form.
• Radio-frequency identification (RFID) devices are
used in stocktaking and race timing systems.
• Smart meters accurately record electricity and gas
usage and send readings to the energy supplier.

The question is specifically asking you


Marcus has recently become visually impaired following to identify peripheral devices rather
an accident. than software. But the peripheral
devices you suggest may allow Marcus
Give two peripheral devices that will allow Marcus to
to use adaptive software.
continue using his IT systems.

M01_IT_REV_BTEC_0345_U01.indd 5 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Storage devices
Storage devices are a type of peripheral device used for storing, backing up and sharing data, usually
for individual use where a network is not available.

Hard disk drives … Solid state drives …


are magnetic storage devices, commonly used are flash memory devices commonly used as the
as the primary internal storage device but can be primary storage in portable computing devices
external. like tablets and laptops.
Characteristics and limitations Characteristics and limitations
Large storage capacity (1 terabyte or more). Very fast data read/write speeds.
Low cost on a per byte basis. Low power consumption.
Very reliable. Extremely reliable as they have no moving
Slower than SSDs at loading data. parts which can be damaged.
External HDDs are not as portable as some Higher cost than HDDs on a per byte basis.
other options. Usually have a lower storage capacity.
Only have a finite number of writes.

SD cards … USB memory sticks …


are small flash memory cards that are commonly are small flash memory devices that connect
used for storage in digital cameras and some through a USB port.
smartphones. Characteristics and limitations
Characteristics and limitations Extremely portable device.
Very small and portable. Compatible with most computer systems via
Easy to transfer between devices with SD card USB ports.
readers. Storage capacity is low when compared to
Very small storage capacity, generally around SSDs and HDDs.
64gb – greater capacity is costly. Only have a finite number of writes before they
Various ‘enhancements’ to the standards, break.
resulting in potential compatibility problems, Because they are small, they can be lost easily.
for example SDHC and SDXC.

Optical disks … Magnetic tape …


such as CDs, DVDs and Blu-ray disks are used for is used for large data backups.
software, music and movies. Characteristics and limitations
Characteristics and limitations Very large storage capacity.
Small and portable. Very cheap on a per byte basis.
A lot of devices have built in capability to read optical Data is accessed serially which is
discs, with external devices being inexpensive if needed. very slow.
Archival stability of writable media can be questionable. Requires specialist equipment for
Fragile and easy to damage. recording and reading data.

Try to explain each


limitation you identify
in as much detail as
Explain two limitations of using a USB memory stick for transferring possible.
video footage and graphics between home and office.

M01_IT_REV_BTEC_0345_U01.indd 6 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Types of operating system


The operating system is what coordinates all the operations of your computer. It manages all the
resources on the computer, such as the CPU and RAM, and controls the software and hardware. Without
it, your PC would be useless.

Real-time operating systems (RTOS) Single-user single task


Inputs are processed and responded to instantaneously. operating systems
Why choose real-time? One user can use the system at a
• It provides fast response. time, and one application can run
• It is best used where inputs must be processed and at a time.
responded to immediately, such as traffic light and air traffic Why choose single-user single
control systems. task?
• It requires fewer resources.
Automatic braking systems (ABS) are
• It is best used on devices that
have limited processing and
an example of a RTOS. The system
memory, which could not handle
continuously processes input data
running multiple applications, for
to detect obstacles and apply the
example basic mobile phones or
brakes to avoid collision as required.
a simple handheld game (such as
a Virtual Pet).

Single-user multitasking operating Multi-user operating systems


systems Many users can use the system at the same time
and can run many applications simultaneously.
One user can use the system at a time, but many
applications can run simultaneously. Why choose multi-user?
Why choose single-user multitasking? • Processing and resources can be shared by
multiple-users.
• It allows the user to use several applications at
once. • It is best used where many users need access
to the same processing or resources at the
• It is best used on systems where a user same time, for example web servers.
needs to be able to switch quickly between
applications, for example an office worker using
a laptop or desktop PC.

Operating system performance factors


Operating systems require careful maintenance to keep them performing efficiently.
Limited CPU speed Viruses
Limited RAM capacity Worms
Number of cores Malware
Hardware factors
Slow hard-disk Spyware
read/write
(fragmentation) Factors affecting performance
Not enough HDD space allocated to extend Heavy use of virtual memory relies on
RAM (pagefile too small – the pagefile is a Virtual memory factors
slow disc transfers rather than the
section of the hard disk that is reserved as very fast working memory (RAM) data
an extension of the RAM) transfers

You need to demonstrate your ability to


use technical vocabulary. You should also
Analyse the factors that affect the performance cover a range of issues and not just one
of an operating system.
or two.

M01_IT_REV_BTEC_0345_U01.indd 7 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

The role of the operating system


The operating system on a digital device is the link between the hardware and the software. It passes
messages back and forth and carries out instructions from the software to the hardware.

Networking
Operating systems simplify networking in a
computer. The operating system implements a 7 Application
number of networking technologies such as:
• the TCP/IP stack 6 Presentation Application
• network utility programs such as traceroute
• device drivers for the network interface card. 5 Session

tocols used
The TCP/IP stack is the set of pro 4 Transport ← TCP → Transport
rnet. The data
for transmitting data over the inte
(or steps).
transmission takes place in layers
TCP /IP stack links 3 Network ← IP → Internet
The diagram shows how the
stan dard model
to the OSI model, which is the
netw ork.
used to explain how computers 2 Data link
Network
interface
1 Physical
For more on traceroute,
Links
see page 10.
OSI model TCP/IP

For more on protocols,


Links
see page 19.

Security Memory management


A number of features are commonly built into The operating system manages the computer’s
operating systems to help improve security. resources, such as its memory.
These include: To do this, the operating system decides and
• user authentication tracks:
• antivirus and firewall software • which processes to allocate memory to
• backup facilities. • how much memory to allocate to each process
• when to un-allocate memory
• transferring data to the pagefile (or swapfile)
on the HDD temporarily to free RAM (paging
or swapping).

Multitasking Device drivers


Most operating systems allow you to run more An operating system comes with generic device
than one application simultaneously. To do this, drivers that work with a wide variety of different
the operating system must be able to allocate peripheral devices, allowing them to communicate
resources (CPU, memory, disk space) to each with your computer. However, most hardware
application in order to allow it to complete two comes supplied with specific drivers to take full
or more tasks simultaneously. advantage of the hardware’s capabilities.

Try to answer the question without looking


Describe the ways in which operating systems help to at the information on this page. Then read
manage memory on an IT system. the page again to check your answer.

M01_IT_REV_BTEC_0345_U01.indd 8 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

User interfaces
The user interface is a core part of any operating system. It allows the user to interact with the
computer system and is the part of the software that has a huge impact on a user in terms of useability.

Command line interface (CLI)


The user interacts with the computer
by typing in commands in response to
prompts displayed on the screen.
Experienced users find it quicker to
complete tasks.
Requires far less memory and
processing power than GUIs to run.
Requires knowledge of the specific
commands for performing functions.
Learning so many commands can be
intimidating for inexperienced users. Command line interfaces use
a simple text-based screen
to provide interaction.

Graphical user interface (GUI)


Users interact with the device by controlling a pointer or touch screen to select icons and menus
displayed on screen. GUIs are widely used on devices from PCs to smartphones.
This simple, intuitive method of interacting is easy for beginners to use.
It doesn’t require users to learn any commands to perform tasks.
There are usually options to adapt the interface according to an individual user’s needs, for example
by using screen magnifiers or changing the colours or font sizes.
It is often resource intensive, requiring a lot of processor power and memory.
Experienced users can find it frustrating to complete tasks they could perform in a CLI with one command.

Menu-based interface
Users interact using a simple menu that Tourist Information: Liverpool
presents options to choose from. An
example is an ATM screen.
Theatres Cinemas Museums
The limited number of options makes it
easy to use.
Pubs &
It is often possible to figure out how to Shopping Night life
restaurants
perform tasks without any instruction.
They can include options to adapt the Public Ferries Parking
interface for an individual user’s needs, for transport
example by providing speech output or a
choice of larger font size. Click to find out more!
Performing tasks can be slow and Menu-based interfaces offer simple
frustrating where many levels of options options to provide interaction.
must be traversed.

Make sure that you


Rahul is an expert user of computer systems and has spent many explain what it is about
years using different types of operating system user interface. Rahul that makes a CLI
advantageous for him.
Explain why Rahul is more suited to using a command line interface.

M01_IT_REV_BTEC_0345_U01.indd 9 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Utility software
Utility software is used to manage system resources. Utilities are like a tool box to help us optimise and
maintain our computer system. Many utilities are pre-installed as part of the operating system, such as
traceroute, while others may be selected by the user and installed, such as antivirus scanners.

Disk utilities
Disk utilities are designed to maintain the performance of a computer’s disk drive.
File compressors – backing up very large files and sharing them online can be difficult. This utility
compresses files to reduce their size and decompresses them for later access.
Backup – you regularly want to back up your files, but this can be slow as a manual process. Backup
utilities allow you to automate the backup process.
Disk defragmenter – over time a computer’s disk drive becomes fragmented, which slows down file
access. This utility reorganises the data for quicker access, but is only required on a HDD when using
Windows (fat32/NTFS) file systems.

Network utilities
Network utilities are designed to maintain good
network traffic and keep networks secure.
Firewalls – open networks are at risk from
threats like hackers and worms. Firewalls prevent
unauthorised access by monitoring and blocking
suspicious traffic.
Antivirus – this utility prevents computers from
receiving viruses and detects and removes
viruses that have already infected a system.

Traceroute allows you to display the path that data packets


travel over an IP network to help diagnose problems.

Other utilities
There is a huge range of utilities which do not fall
under a particular category.
Registry cleaners are designed for Windows systems
to remove old, redundant registry entries. This can
help improve system performance.
System profilers display a detailed breakdown of the
system, including hardware and software. This can
help with deciding where a system needs upgrading
and diagnosing problems with the system.

System monitors monitor resources and


performance of PC systems. They help identify
the causes of poor system performance.

The question asks you to ‘analyse’


rather than simply ‘explain’. Make sure
Jessica wants to improve the performance of her computer you clearly explain why each feature you
system as it has been running slowly recently. identify would be useful for Jessica and
Analyse the features of two utility tools that would how they would therefore improve the
help Jessica improve her system performance. system’s performance. You should also
comment on how effective they might be.

10

M01_IT_REV_BTEC_0345_U01.indd 10 24/01/19 9:35 PM


Unit 1
Had a look Nearly there Nailed it!
Content

File types
Different file types are used to denote the form, or structure, of the data stored within the file. The
file extension tells the user what type of data the file should contain. It also tells the operating system
which icon to display and which software to use to open the file when the user double clicks the icon.

Examples of file types BMP – an


DOC and RTF – commonly PDF – a format
used file formats for that represents
JPG – good compression, uncompressed file
GIF – small file size, documents created using data independently
although compression is format, so image
but low quality due word processing software. of the originating
lossy so files cannot be quality is extremely
to limited number of software and/or
decompressed. high but file size is
colours. Can display Application software hardware.
very large.
basic transparency and file types
Image file types XLS – a common
animation. File types
format for files
created using
PNG – uses lossless compression spreadsheet
to save high-quality images software.
in a low file size. Also allows MDB and PPT – a
transparency. ACCDB – common ODF – an open
common file format for source XML based
types for slideshows format used to
For more on lossy
Links database created using represent office
and lossless files such as
compression, see page 20. software. presentation
software. spreadsheets, word
processing, etc.

MKV – supports high-quality AVI – uncompressed so is very


video playback but is not high quality but very large file size.
well supported by some Video file types Not good for streaming.
devices, e.g. iPads can’t MP4 – supports high-quality video
play .mkv files. MOV – designed for use with Apple QuickTime while still compressing file size.
software, but it can be played using other Works on a wide variety of devices
software. Can provide high quality but can also and software.
be compressed. Good for streaming.

Implications of file types


The choice of file type or storage method of data has ongoing implications for individuals and
organisations, including:
Issue Description Why might this be an issue?
Compatibility Some file types only work with certain May need to purchase new software.
software. Sharing files with others who do not
have the required software.
Quality Different image, video and audio file types Choice will depend on intended use
provide varying levels of quality. of the files – e.g. is high quality the
priority or small file size?
File size The file type affects file size – some types File size may have implications for
are very efficient in the way they store data storing, transmitting or displaying files.
whereas others use lots of storage space.

Kasim is making a website to advertise his wedding


photography business and wants to know what file type
he should be using to display his photographs. Think about the benefits of a jpg
Explain the benefits of using two different file types compared to a bmp or a gif.
for displaying his images.

11

M01_IT_REV_BTEC_0345_U01.indd 11 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Application software
Application software allows end users to complete tasks, such as creating a report or a presentation.

Uses of application software


There are many different types of application software that have their own uses. These include:
Productivity software – these are applications like word processors, desktop publishers and
spreadsheets that are used in office environments to support business tasks and improve efficiency.
Graphics software – these applications are used to edit photos or create original artwork.
Communications software – these applications make communicating quicker and easier. They include
instant messaging, email and VOIP software.

Proprietary and open source software


These terms refer to who owns the source code behind the software.
Proprietary software Open source software
The source code is privately owned by the The source code is available to read and modify.
software company. Most open source software is free to use,
Users pay to buy or subscribe to the software. although many companies provide paid-for
Support (e.g. for setup and troubleshooting) services to enhance and/or support open source.
is provided by the software Support and fixes are provided by the
creators. community, often via forums.
It may have more features than open source Open source utility software is usually
software. compatible with other proprietary utility software.
The software company may be slow to provide Support with fast response may not be
updates and bug fixes. available when needed, as it relies on goodwill.
Software is usually very generic, with little There may be indirect costs involved in paying
scope for customisation due to copyright or for support and training.
complexity issues.
It can be costly.

Choosing software Performance


When choosing software, consider: When looking at performance, consider:
• ease of use – familiarity and ease of use is • the maturity of the software, as stable versions
paramount of software can be more efficient given there
• reliability – ensuring software works as has been time for bugs to be resolved
intended and can be depended upon • interoperability – interface with other devices
• capability – that the software can do the job or systems
required of it and do it effectively. • support of dedicated hardware for complex
tasks.

This task requires greater depth


as it asks for you to ’analyse’.
Seth is looking at different software options for managing Identify advantages and clearly
orders and deliveries in his freight shipping business. explain why they would be useful
for Seth, as well as how some
Analyse the relevant benefits and drawbacks to Seth of using
drawbacks would affect him.
an open source software application for meeting his needs.

12

M01_IT_REV_BTEC_0345_U01.indd 12 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Emerging technologies
Emerging technologies are those that are currently in development and are just starting to make an
impact on business and general society.

What are emerging technologies?


Some of the emerging technologies we see today include:
• artificial intelligence
• biometrics
• robotics Virtual reality is an emerging
technology set to make
• virtual reality.
a big impact on how we
entertain ourselves at home.

Emerging technologies at home and work


Emerging technologies are changing the way we live our personal lives and the way we do business.
Here are some examples.
At home
Biometrics let Virtual reality is opening up new and
Artificial intelligence in us log securely exciting video gaming opportunities.
automated vacuum cleaners into our tablets
gives us more leisure time. and smartphones Domestic robots can carry out
Self-driving cars could soon through our thumb household chores or home security.
make the roads safer. print. Social robots provide companionship.

At work
Biometrics are increasing security at airports Virtual reality is
Artificial
through facial recognition at passport checks. allowing businesses
intelligence used in
to test products
business forecasts
Robots are performing dangerous jobs without risk under development
is helping in
to life. They can then carry out routine production in a virtual
decision making.
line tasks, as well as delicate surgical procedures. environment.

Implications of emerging technologies


• The Internet of Things (IoT) allows your car to know where you are going and how to get there, and
your fridge to pre-order your supplies, but all this needs data. Increasingly, advanced data-hungry
technologies are placing a strain on the existing infrastructure.
• Society demands data wherever and whenever it likes – we are no longer confined to the home WiFi
network or the office LAN. Location-aware technologies and the availability of 3D imagery means that data
access is essential to maintain and develop the emerging world of virtual reality and autonomous systems.
• There are new ways of gathering data resulting in the emergence of ‘big data’ which means we need
new ways of analysing it.
• New ways of identifying ourselves through biometric data also brings the need for greater and more
powerful security.

Think about how Liam is


going to collect data
Liam has a small chain of petrol stations and wants to capture the buying and what he will do with
habits of his customers so he has introduced a loyalty card scheme. it. Explain the potential
impact on his existing
Explain what other measures Liam needs to consider so he can get useful systems.
marketing information.

13

M01_IT_REV_BTEC_0345_U01.indd 13 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Choosing an IT system
There are many factors to consider when choosing the best system for the end user, ranging from what the
system needs to be capable of doing, to how the user interacts with it and what devices make up the system.

Does the user need the system to be


User experience and needs always available, even when on the go?

Are they looking for


Is the user
performance, e.g. for
experienced with Is accessibility
video gaming, and
computer systems or an important
need a system with
do they need a system issue?
a high specification
that is easy to use?
graphics device?

Specifications, compatibility and connectivity

Does the system meet the Will the system Can the IT system use the required
specification requirements work with other connectivity technology, e.g. for using mobile
of the software to be used? devices? internet connections or syncing devices?

Does the user have a large budget, Do they have a small budget
Cost allowing you to choose components which requires looking for a
from well-known brands? cheaper alternative?

Efficiency and productivity

Is it essential that the system Does the user have


Is the efficiency Do users need is able to start up fast, load the budget for the
of the system a to be highly and save programs and files higher-end machines
key issue? productive? quickly, never stutter or crash that provide greater
or have any other problems? efficiency?

Implementation

What is the Does the Will the Will you need to Will users need
timescale for the system need system need migrate data from training in order
IT system to be to be available extensive an old system to to use the
implemented? quickly? testing? the new one? system?

Does it need biometric Are portable devices not


Will the system be
security for login or the appropriate because of
Security handling sensitive
ability to attach physical the risk of them being
information?
security such as locks? stolen?

Look through all the factors listed on


Fraser has asked his friend Benjamin to advise him on a the page. When you have chosen the
new IT system for playing high-end online video games. two you think are most important, make
sure you explain their relevance to the
Explain two factors that Benjamin has to consider when
case study.
choosing an IT system for Fraser.
14

M01_IT_REV_BTEC_0345_U01.indd 14 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Wired connection methods


Wired methods of connecting devices are any method that uses physical cables to connect between
devices, systems or components. Different types of connection rely on widely differing connectors,
depending on what the signal or data is transmitting.

Wired system connection methods


Uses Advantages Limitations
Cat5 Telephone communications Versatile and widely Only useful over shorter
and ethernet networks. available. distances.
Cheap compared to other More susceptible to
networking options. interference than other wired
techniques such as fibre.
Coaxial All types of data Less susceptible to Thickness of cable makes
communication, commonly interference than UTP/STP so it difficult to work with.
used in television cabling. works over longer distances. Limited bandwidth.
Cheap, though not as
cheap as UTP/STP.
Fibre optic Telephone and internet Improved security as the Very expensive.
cables, cable television and cable cannot be tapped. Specialist skills needed
computer networking. to install.
Can be used over long
distances.
High data transfer rate.

Wired device connections


Uses Advantages Limitations
VGA Analogue connection of Universally used on high- Cumbersome cabling.
video display equipment, resolution display equipment. Signal affected over
such as projectors, CRTs or distance (noise).
LCDs. Low-cost cabling.
No DRM (digital rights
management).
HDMI Digital connection of Capable of 8k (and Limited length.
both video and sound beyond) resolution. Cabling and technology
from devices to display is more expensive than
equipment. Used in computing and
entertainment. analogue equivalents such
as VGA.
USB/ Connecting equipment and High speed capability. Limited distance.
FireWire peripherals, such as printers, Limited power supply.
scanners, input devices, Backwards compatibility.
cameras. Can connect multiple
devices.

Make sure you consider


ALL aspects of
Meera wants to connect her new laptop to the large 4k LCD Touchscreen connecting the screen
TV in the conference room to allow her to collaborate with colleagues on to Meera’s computing
product development. equipment and how she
might make use of the
Describe what wired connection methods Meera should consider to get the display as both an input
best out of the system.
and an output device.

15

M01_IT_REV_BTEC_0345_U01.indd 15 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Wireless connection methods


Wireless connection methods connect using the electromagnetic spectrum. This may be traditional radio
waves or even light waves.

Wireless system connection methods


Uses Advantages Limitations
WiFi To connect devices High data transfer Can be complex.
wirelessly to local and wide speeds. Security concerns.
area networks such as the
internet. Good range.
Relatively cheap to install.
3G/4G/ To connect to data Allows true mobility. Heavy data usage can
WiMAX networks such as the be costly.
internet whilst on the move. 4G provides for very fast
connection speeds. Uses public networks.
Satellite Provides connectivity to Wide coverage. High latency.
broadband remote areas, often rural. Subject to weather
High speed.
conditions.
Microwave/ Allows point-to-point LAN High speed. Affected by poor
Laser connections between weather.
locations. No ongoing costs.
High initial cost.

Wireless connections methods for devices


Uses Advantages Limitations
Bluetooth For pairing devices over Easy to set up. Low data transfer
short distances, such speeds.
as wireless headphones, Low power consumption.
Very short range.
watches, keyboards and
mice.
WiFi Direct For connecting devices to Can transmit both audio Limited range.
remote displays. and video. Can affect data
Usually built in to devices. connectivity (interference).
WiFi Allows ‘ad-hoc’ networks Simple setup. Using ad-hoc networks
to permit wireless printing/ can impact connectivity.
scanning, for example. Uses existing WiFi
infrastructure.

Make sure you


Shaheera wants to set up a local area network in her home to allow her to share compare WiFi to other
an internet connection and files between her different devices. methods of connecting
Shaheera’s devices,
Explain two benefits of using WiFi for her home network. both cabled and other
wireless methods.

16

M01_IT_REV_BTEC_0345_U01.indd 16 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Features of different networks


Different types of network can be defined by their size (personal, local, wide area networks) or by their
purpose (virtual private networks).

Local area networks (LAN) and wide area networks (WAN)


LAN

DATA CENTRE
Local area networks
Client Client Client often use UTP/STP
cabling in order to
connect the devices,
Ethernet
although WiFi can be
used for a wireless
LAN. Internet

Router/Switch
Printers Servers
Switch Router
The network allows The router might
resources like printers, connect the LAN to
files, internet and the internet or, in A WAN is a computer network that
software to be shared this case, to a WAN. covers a large geographical area
by all the computers
on the LAN. such as a country or the whole world.
WAN

The internet is the largest, most


well-known and widely used WAN.
A WAN is normally made up of several
LANs connected together, such as the
LANs from the offices in each country
for a multinational business. For more on wired and
Links
wireless connections, go
back to pages 15 and 16.

A LAN is a computer network that


covers a single building or site.

Personal area network (PAN) Virtual private network (VPN)


This network technology creates a secure
network connection over a public network,
usually the internet, by using encryption.
This allows a business to have a secure
Bluetooth earpiece A PAN is used to
wide area network without having to
network devices
pay the high costs of constructing
wirelessly within a
the physical network infrastructure,
short range of an
as they can use the existing internet
individual.
infrastructure.
Smartphone

Smartwatch
For a diagram of a
Bluetooth is commonly used to create a PAN to connect Links
VPN, see page 20.
all the digital devices in a person’s workspace, for
example connecting a mobile phone to a Bluetooth
headset for hands-free operation.

Make sure you cover


three different factors
James is considering whether he should use his home’s wireless network or use
and link them to the
Bluetooth to allow him to connect his PC, smartphone, printer and smartwatch.
features of PANs and
Explain what the differences are in terms of the type of network (PAN, LAN and LANs.
WAN) and what he should consider when making his decision.

17

M01_IT_REV_BTEC_0345_U01.indd 17 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Network choice and performance


Networks are all around us and are as unique as the users who use them. There are many factors and
reasons for selecting the various components that make up a network.

Factors affecting choice of network


User experience User needs
ease of use, performance, speed, reliability,
availability, accessibility way of working (fixed/ Specifications
mobile) manufacturer, standards,
functionality required
Security
What security features are
included? For example encryption,
firewall, malware protection, Connectivity
intrusion detection, monitoring physical connections,
facilitates for example choice

Productivity
Factors affecting choice of cabling (copper,
fibre, DSL), and
Is it suitable for the location
intended purpose, e.g. able
to support speed required Cost
for video editing? ongoing costs (Total
Cost of Ownership,
or TCO)
Efficiency
Implementation (timescales,
performance, expansion
testing, downtime) Compatibility
room, expected
limiting factors manufacturer, standard,
utilisation
schedule limitations interoperability

Choosing components Performance factors


Consider: Consider:
• manufacturer – is there an affinity to a particular • available bandwidth and connection
manufacturer? What is the corporate policy? methods
• specification – what kit meets the needs and supports • load – is the demand likely to be
required features? 100% loading the components (how
• warranty/ongoing support – corporate level of support? much ‘wiggle room’ is there)?
SLA? Response times? • professional level equipment or
• adherence to standards – will it work well with existing SOHO equipment?
components? • infrastructure – is it being used on
• familiarity – are there specific skills that in-house staff ageing infrastructure?
possess?
• infrastructure – what does it have to fit into, for example
incorporate existing Cat6 cabling?

Don’t forget to think


about the future. How
Jane’s graphic design business is expanding and she is recruiting two new might Jane’s business
graphic artists and moving into a small unit. continue to grow and
what impact might this
Explain two factors Jane should consider when choosing a network infrastructure.
have?

18

M01_IT_REV_BTEC_0345_U01.indd 18 02/01/19 6:14 PM


Unit 1
Had a look Nearly there Nailed it!
Content

Protocols
Protocols are the rules that define methods of communicating data between two or more digital devices.
They ensure that the transmission of data always follows a set procedure. There are different protocols
for different applications.

TCP/IP
Transmission Control Protocol and Internet Protocol are used together as the basic communication
language of the internet.
Data sent over the internet is broken up into ‘packets’ to enable it to be sent more efficiently. Each
packet is sent individually and then reassembled at the destination.
• TCP is used to create the packets and
reassemble them at the end.
Have a look at the diagram of
• IP is used to route packets to the intended Links
the TCP/IP stack on page 8.
computer, using the computer’s IP address.

Email Voice and video calls


SMTP – the Simple Mail Transfer Protocol is Many companies use their own proprietary
used to transfer emails between mail servers. protocols for voice and video calls over the
It is also used to transfer email from the client internet. Some well-known protocols are:
software to the outgoing mail server. H.323 – this was one of the first successful
POP3 – the Post Office Protocol 3 is used to VOIP protocols and is recommended by the ITU
retrieve emails from the mail server. It allows us (International Telecommunication Union). It defines
to download messages to our client software the rules for communicating audio and video over
for offline reading. packet switched networks.
IMAP – the Internet Message Access Protocol SIP – the Session Initiation Protocol is used to
is used to retrieve emails from the mail server. create, control and end VOIP connections.
Rather than downloading the messages, IMAP RTP – the Real-time Transport Protocol is designed
syncs them with the mail server. to transfer audio and video over IP-based networks.

Web pages Security protocols


HTTP – the HyperText Transfer Protocol is used to allow web servers SSL (Secure Sockets Layer)
and browsers to transfer files over the internet. It is how we access and TLS (Transport Layer
the World Wide Web. Security) are used to ensure
HTTPS – the secure version of the standard HTTP. It uses public key that transactions over
cryptography to encrypt communications between a web browser networks are kept safe. SSL
and server. is gradually being phased out
and replaced with TLS.
FTP – the File Transfer Protocol is used to transfer files over a
network. It is the technology used to upload files to a server as well
as to download large files.

There are two protocols to talk about for


this question. Look at the case study – one
Alex is a business executive who uses email as her main protocol is certainly more useful to Alex
means of communication. As she has to travel a lot she than the other. Remember, when you are
needs to use her email on several different devices. asked to ‘evaluate’, you need to review the
Evaluate the protocols used for receiving emails and information so you can give a supported
which would be most beneficial to Alex. judgement about the topic or problem.
Often, a conclusion will be required.

19

M01_IT_REV_BTEC_0345_U01.indd 19 02/01/19 6:14 PM


Unit 1 Had a look Nearly there Nailed it!
Content

Data transmission issues


Data transmission is an important part of computer use. It involves sending digital messages between
devices in a network, such as in a LAN or over the internet. Here are the main issues associated with
data transmission that you need to know about.

Security considerations VPNs and security


User authentication – usernames
and passwords authenticate
users who have permission Organisation’s
to use a network and prevent servers
unauthorised access by hackers.
Firewalls – these monitor traffic
to prevent unauthorised access
and dangerous data packets
being passed into the system
Secure VPN tunnel
and causing harm.
Internet
Encryption – information can Router VPN client
VPN server
be intercepted while being Firewall
transmitted. Using encryption
ensures intercepted data cannot VPNs create a secure connection
between
be read. HTTPS is a commonly remote sites and users over the
internet to
used method for secure data prevent data being intercepted and
read.
transmission.

Bandwidth and latency Bandwidth and latency implications


Bandwidth is the rate of data Browsing the internet doesn’t need an instant response so
transfer over a network – usually latency isn’t a big factor. Bandwidth is an important factor as it
measured in bits per second. affects how long files take to download.
Latency is the time delay for a Online gaming needs very low latency as players need a fast
data packet to transfer to its response for real-time updates of character movements, etc.
destination – usually measured in Video calls need low latency and high bandwidth as you need to
milliseconds. transfer a lot of data (video and audio), but you also want a fast
response to avoid stutter.

Compression Codecs
Compression reduces file size so files can be transferred A codec is a program used to
faster. Compression is used for images to be displayed compress and decompress video and
on the Web, video and audio in streaming and VOIP, and audio files. This reduces the space they
documents attached to emails. There are two main types of take up on disk and allows fast transfer
compression. over a network, such as the internet,
• Lossy – data removed during compression is permanently for VOIP calls and online streaming.
deleted. Commonly used in images, audio and video. This leads to a loss of quality in the
• Lossless – all original data can be recovered when video or audio – in the resolution,
uncompressed. Commonly used for documents. frames per second or both.

Joanna is a big fan of online video games. She is currently experiencing a lot of Make sure you
skipping. She has a high bandwidth connection and thinks the problem is the latency. relate your answer
to the context of
Describe how bandwidth and latency would affect Joanna when playing video games. video gaming.

20

M01_IT_REV_BTEC_0345_U01.indd 20 02/01/19 6:14 PM

You might also like