Year 7 11 ICT Notes
Year 7 11 ICT Notes
Year 7 11 ICT Notes
DIGITAL DEVICES
Digital devices are pieces of hardware that use computers or microcontrollers and are found everywhere in
our digital world.
A computer is an electronic machine that can follows a set of instruction to input, process, store and output
data and information that is used in decision making in an organization.
Computer Terminology
The following are commonly used terms in ICT:
Data -These are the basic raw facts that are collected from the field and are meaningless to the user and cannot be
used to make decisions e.g. number of vehicles, amount of items e.t.c
Data Processing (processing) - This is a way in data is manipulated, translated and converted into information. For
example; arithmetic processing (addition, subtraction, etc), logical processing (comparison of two or more numbers),
etc
Information – This is a finished product of data processing that is accurate and summarized in a manner the user can
use to make decision, planning and controlling in business and or in an organization.
Hardware – These are the physical components of the computer. They make up part of the computer that is tangible,
physical and have texture. For example; keyboards, mouse, monitor and system unit.
Software – This is a set of programs and or instructions that instruct a computer to perform a task and how to perform
the task. They give life to hardware for example; hardware can’t be used without software.
Uses of a Computer
Communication – Computer can be used to for communication purpose for example; through e-mail, video
conferencing, messaging applications (twitter, nimbuzz etc)
Education – Computers are used by students to carry out research, do assignment etc
Entertainment – Computers can be used to play games, watch movies, and listen to music etc.
In retail shops – Computers are used in retail shops to manage stock and inventories
In Banks – Computers are used in banking to keep records of deposits and withdrawals
In administration or offices – Computers are used in offices to type letters, memos etc
Manufacturing or industries – Computers are used in manufacturing and processing of products and the production of
goods
LAPTOPS
Laptops include a keyboard, a screen, a track pad and a rechargeable
battery. Having these features means that they can be taken away
from the desk, which makes them an example of a portable device.
SINGLE-BOARD COMPUTERS
Single-board computers (SBCs) are affordable computers used in
education, embedded computing projects and physical computing
projects. The Raspberry Pi Zero (see Figure 1.6) is an example of
an SBC. The unit itself costs very little and uses a cheap microSD
card as its storage.
Smart Phones – Are small computers with Wi-Fi and mobile phone connectivity to make phone calls and access the
internet. They have a more advanced OS than other mobile phones and allows apps to be downloaded onto the
smartphone for users to customize it with entertainment, educational and business features. Most use virtual
keyboards on touch screen to enter text, numbers and other characters. They have shorter battery life because it
combines many features.
Smart televisions use apps and can download and stream content from the internet
Sound Systems – Produce loud rich sound using high quality speakers and can be connected to personal devices like
smartphones, media players and tablets using wired connections like USB or wirelessly like Bluetooth. It can also be
connected to a LAN via Wi-Fi to play music stored on connected devices or to the internet to play online music.
Personal Video Recorders – device that records broadcasted content so that it can be watched at a later date. Some
satellite TVs contains both set-top box (STB) and PVR.
Navigation Aids – (Sat-Nav) can calculate the best route between two or more locations and provide updates to the
route if not followed accurately. Commonly used in cars, delivery vans and ships. They use information from GPS
satellites (Global Positioning System – uses radio signals from satellites to show your exact position on earth), to
determine the exact location of a device on earth. It also uses orientation sensors to know which way the device is
pointing, and the device will display the users position and orientation on a map. GPS do not need internet
connectivity to work but Navigation Aids need internet connectivity to update map data.
Physical security – Some devices use security slots which have locks
attached to secure them to furniture.
a) KEYBOARDS
Keyboards use buttons known as keys, which users
press to input text or to interact with software.
Keyboards send data to the computer either using
a wired or wireless connection. Different types of
keyboards are used for different operating
systems, languages and functions, as shown in
Figure below.
5. WEBCAM
Webcams are specialized cameras. They are generally lower quality than camcorders, and may have built-in
microphones to capture sound. They can be used as security cameras and can stream images or video to the
internet.
6. MICROPHONE
A microphone is used to capture sound. It uses a
diaphragm which moves when air hits it. This
movement produces an analogue electrical signal. A
microphone converts the electrical signal to a
digital signal with its sound card, which acts as an
analogue-to-digital converter.
Small, low-quality microphones are often built into
computers and are used for voice recognition,
recording speech or allowing VolP calls using
software such as Skype©. Higher quality
microphones are often used by recording artists and can be connected to a sound card's audio input port.
7. TOUCH SCREEN
Touch screens are used in many devices, including smartphones, tablet devices, laptops and desktop
computers. There are two types of touch screen:
• Resistive
• Capacitive.
RESISTIVE
When a user presses on a resistive screen, the pressure causes two layers
underneath the screen to touch and make a connection. Resistive touch
screens are more durable than capacitive touch screens, but are harder to
read because more layers reflect more light. In addition, they can only
recognize one touch at a time, so they are not suitable for multi-touch
applications.
CAPACITIVE
Under the glass of a capacitive screen, there is a layer of capacitive
material. When a user touches the screen, a small amount of charge flows
away from their finger because humans are conductive. The change in
electrical charge is measured precisely: the closer the finger is to the
charged areas, the more current flows away. This allows the computer to
calculate the precise location at which the screen was touched. Capacitive
touch screens are often used in smartphones.
8. BIOMETRIC SCANNER
If you have watched a spy film, you may have seen a biometric scanner being used. Biometric scanners work
by measuring part of the unique physical characteristics of a user, often multiple times, until a suitable
average result is produced. This average result is then stored and future samples are compared against it in
order to check whether the person being scanned is the
authorized user. This allows the information to be updated so that the saved sample is perfected.
Four examples of biometric scanners are as follows:-
Fingerprint recognition: These
scanners read the patterns of arches,
loops and whorls in a human
fingerprint. Fingerprints are unique to
each individual person, which makes
them a useful method of identification,
but fingerprints can be obscured,
damaged or changed, such as by injury
or disease.
9. CARD READERS
Card readers are used to read data stored on a card that is carried by a user. The data can be used to unlock
doors, access secure areas, make payments or track people, parcels and even pet animals. Cards can carry
data using three methods. Each method needs a specialist
type of reader.
Magnetic strip: This is the least secure method as the data on the magnetic strip can easily be stolen by
criminals who put the card through a card reader without the card owner's knowledge.
Programmable chip: Data on a programmable
chip is only readable when a correct PIN is
entered into the reader. In 2005, the UK
introduced the chip and PIN system, which
reduced certain types of fraud by 67%.
10. SENSORS
This is an input device that captures or detects physical quantities about the environment (such as
Temperature, light intensity, humidity, and pressure) and feeds it into the computer.
For the computer to understand a Sensor it needs an ADC (Analogue-To –Digital Converter)
This is a device that converts the Analog signals sensed by the sensor from the environment into a Digital
signal that a computer understands.
Sensors are one of the main features of smart devices such as smartphones and smart environments such as
smart homes.
NB:
Sensor is an input peripheral that inputs data about the physical environment
Smart home a home equipped with devices that can connect to the internet and be controlled remotely by a
computer or smartphone app.
Type of Sensor Applications (Used in:)
1 Temperature Automatic washing machines, central heating systems, automatic temp
sensors control in greenhouses, ovens, Microwaves
2 Pressure sensors Burglar alarm systems, washing machines, robotics, environmental
monitoring, monitor and control traffic lights, axle weights for vehicles.
3 Light sensors Automatic greenhouses, automatic doors, burglar alarm systems,
controlling street lights.
4 Sound sensors Burglar alarm systems, monitoring liquid and powder flow in pipes
Uses of Monitors
1. Used as the primary output device for computers so that the user can see immediately what they are
typing in.
2. Monitors also display the programs so that the user can choose what to do by clicking.
3. Those with touch capabilities can be used as input device to issue commands.
CRT TFT
SIZE Large in size Small in size
WEIGHT Heavy Light in weight
DESK SPACE Occupy more desk space Occupy less desk space
ENERGY CONSUMPTION Consume a lot of electricity Does not Consume a lot of
electricity
COST Less Costly than TFT More costly than CRT
SCREEN FLICKERING Flickers a lot Does not Flicker
HEAT Produce a lot of heat Does not Produce a lot of
heat
NOISE Produce a lot of noise Does not Produce a lot of
noise
2. PRINTERS
There are three types of standard printer: dot matrix, inkjet and laser
Dot matrix: These printers are sometimes called 'impact' printers. This is because the print is made
by hitting or 'impacting' the paper through a ribbon of ink, and this process is very noisy. The paper
often has a number of carbon copy layers so it can make several copies of the same document as it
prints it
Inkjet printers: These printers use cartridges containing different coloured ink. Black ink is held in a
one cartridge, while the colour cartridge is often split into three colours: cyan, magenta and yellow.
Tiny dots of these inks are sprayed onto the paper to form images or text
Laser printers: These printers contain a rotating cylinder or drum that holds an electrical charge. A
laser is used to discharge certain points on the drum and 'draw' an image. Electrically charged toner
is attracted to those points on the drum and is heated onto paper that is passed over the drum.
3D PRINTER
Three-dimensional (3D) printers create real-life
versions of digital models. These printers work by
adding layers of heated material from the bottom of
the model all the way to the top. 3D-printed models
take a long time to create.
3. PLOTTERS
Plotters are used by a variety of professionals, including
product designers, architects, Engineers and cartographers. The
plotter draws high-quality images created in Computer Aided
Design (CAD) software onto large sheets of paper. It does this
by moving a pen across the paper to draw the lines, and the
pen can be raised away from and lowered onto the sheet of
paper. Some plotters can also roll the paper backwards and forwards.
4. DATA PROJECTORS
Data projectors are used for home entertainment, such as
watching television or playing games, and for giving
presentations in classrooms and business meetings. They
have the following features.
Light bulbs: These bulbs can have various brightness
levels (measured in lumens) and are expensive to
replace.
Resolution: Like monitors, they use different quality
screens
Zoom functionality: The projected image can be made larger by enlarging the image using either
optical zoom or digital zoom.
Portability: Some smaller and lighter projectors are available, and these are easier to move around.
5. SPEAKERS
Speakers allow a computer to output sound. Speakers often
come in pairs to provide stereo sound. Multiple speakers are
commonly used to provide surround sound in home
entertainment systems. These speakers need a special
amplifier that can deliver different levels of sound to each
speaker to provide spatial awareness.
Stereo sound - sound that comes from two sides (left and
right)
Surround sound - sound that comes from four or more sides,
used so that sounds from a film or television program come
from all around the viewer as they would in real life
6. CONTROL DEVICE
Control devices are also known as actuators, and they are components of a system that make something
happen in the real physical world. These devices are often mechanical. Examples of actuators include:
• Valves
• Pistons
• Heaters
• Coolers
• Motors
3. SECONDARY STORAGE
Secondary storage is often referred to as 'storage'. However, it should not be confused with primary storage
or main memory, sometimes referred to as Random Access Memory (RAM) or Read Only Memory (ROM).
Secondary storage is non-volatile, which means it will not lose data when the system's power is turned off.
Other:
Online / Cloud storage – data storage over the internet i.e on hosted servers on the cloud.
1. A storage medium is the actual material object used for storing the data.
2. A storage device is the item of equipment that handles the use of the medium. E.g. a DVD is the
storage medium while the DVD drive is the device that is used to access data on the DVD.
3. Backwards Compatibility - the ability to be used with older technology without having to be specially
adapted.
Comparison Between SSD and HDD
HDD SSD
MEDIA
A. Hard disks
Hard disks are made up of many concentric platters. These platters make up a cylinder that spins on a
central spindle. A read/write head moves on an arm across tracks on the platter.
The amount of time that it takes the read/ write head to access data on the tracks is determined by how fast
the cylinder of platters spins and how fast the read/write head is moved across the tracks.
When reading, a read/write head changes the magnetic field into electrical current. When writing, it
transforms electrical current into a magnetic field.
Typical spin speeds are 5400 revolutions per minute (rpm) or 7200 rpm.
The average seek time for a read/write head is 4-15 milliseconds (ms).
Storing data on a storage device is also called WRITING while retrieving data from a storage device is also
called READING.
PARTS OF THE HARD DISK
platters.
Read/Write Heads.
B. Optical media
Types of optical media include CDs, DVDs and Blu-ray
disks.
CDs can store up to 700 MB of data. The data
is written to the disk using a laser, which writes data
to a plastic layer beneath layers of aluminium and
acrylic.
DVDs look very much like CDs. Data is written
to DVDs using a shorter wavelength of red laser light, which allows DVDs to store more data. They
can store 4.7 GB on a single-sided, single-layer disk. Double-sided, dual-layer disks can store as much
as 18 GB.
Blu-ray disks are similar to CDs and DVDs, but use a scratch-protection coating. Violet laser light is
used to store data at greater density than the red laser light used in DVDs. They can store 25 GB on a
single-sided disk, and double-sided disks can store 50 GB.
All optical media is recordable and is known as CD-R, DVD-R or BD-R. Some CDs and DVDs can be rewritten
(CD-RW, DVD-RW), and some Blu-ray media can be written then erased and rewritten (BD-RE).
C. Flash media
Flash media are more energy-efficient than hard disks as they do not have moving parts. For the same
reason, they are also less likely to fail when they are moved around. This makes them suitable for use in
portable devices.
D. Magnetic Tapes
Magnetic tape is a large capacity, serial access medium. Because it is a serial access medium, accessing
individual files on a tape is slow. Tapes are used where large amounts of data need to be stored, but where
quick access to individual files is not required. A typical use is for data back-up (lots of data, but rarely only
accessed in an emergency). Tapes are also used and in some batch-processing applications (e.g. to hold the
list of data that will be processed).
The storage capacity of a storage device is measured in bytes, Kilobytes (KB), Megabytes (MB), Gigabytes
(GB), and Terabytes (TB). The computer requires one byte of storage space to store one character of data. A
character is anything that can be stored in the computer e.g. a letter, a number, a space, a full stop, etc. (A,
9, +, ?, @).
Each character is made up of eight bits. The word BIT is a short form of BInary digiT. Binary digits are either
a “0” or a “1”. All data stored in the computer is stored as a series of binary digits (Bits) i.e. a series of 1s and
0s. e.g. letter A is written as 01000001.
Storage media store data in binary form. This means that each bit of data holds one of two values: 0 or 1.
Different media types interpret 0 or 1 differently.
Hard disks change the magnetic charge of a platter to either negative or positive, depending on
whether the value is 0 or 1.
Optical media use tiny bumps on the disk's surface to represent 0 and 1.
Flash media use different levels of electrical charge, held in tiny individual cells, to represent 0 or 1.
Magnetic tape changes the magnetic charge of the tape to either negative or positive, depending on
whether the value is 0 or 1.
Software
Digital devices consist of physical components referred to as hardware. The hardware devices of a digital
device can not function without software.
Software is a set of instructions tell the digital devices what to do and how to do it.
Software can also be referred to as programs or software programs.
Software is classified into two:-
1) Systems Software
2) Application Software.
Systems Software
This are sets of instructions that control the general running of the digital device.
They are designed to operate ,maintain and control the computer hardware and provide a platform for
running application software
There are two categories of system software;
1) Operating systems
2) Utility programs
Operating System
An Operating System (OS) is a software that allows a user to use, control and manage the hardware of a digital
device. It also provides a platform to run other system software and application software.
It is the most important software on any device, without which, the device won’t function.
Examples of Operating Systems;
Windows Operating System – Windows 10, 8.1,8,7,xp,98
Android
Linux
iOS
Unix
The diagram shows how an operating system lets a user control the Hardware directly or by using application software
and other system software.
5) Error handling - It deals with any errors that occur when a program is running or when data is been transferred
somewhere.
6) Print Spooling - Manages the printer spool allowing different tasks to be printed on the same printer one at a
time.
7) Input and output management - It manages the computer’s input and output hardware such as printers, which
involves; Accepting data from an input device and transferring it to the memory (RAM) and making sure that
any output is sent to the correct output device.
8) Manages the system security which involves - Monitoring and restricting access to the systems, programs and
data. and Preventing malicious files or users who is far away from damaging your system i.e. a virus or a
hacker.
Utility Programs
This are software programs that carry out configuration and maintenance tasks in a digital device
They include:
a) Backup utility programs
b) Defragmentation utility programs
c) Compression utility programs
d) Disk Formatting utility programs
e) Disk cleaning utility programs
f) Disk checkers/scanners
Backup Utilities create an extra copy of files and programs. Backups can be set to run automatically (usually at
a time when the system is not in use) or can be started by a user.
Defragmentation - As data is stored to hard disk, It is spread across the disk wherever there is free space. This
means that sometimes data is fragmented and stored out of order or out of sequence. Data from the same file
may be spread over multiple locations on a platter, on different platters in the cylinder or sometimes even on
different disks.
When these files are loaded, data has to be retrieved from these multiple locations. The read/write head of the hard
drive has to find this data, which takes extra time and slows down the process of loading the files.
To avoid this and to speed up the system, disk defragmentation utilities reorder the fragments of data so that they
are stored as close to each other as possible. Defragmentation utilities are usually set to run automatically, but they
can also be started by a user.
COMPRESSION UTILITY
• Compression utilities reduce the original size of a file or set of files thus reducing space occupied by the file on
the disk. Where there are repeated patterns of data, rather than storing every repeated instance, only the first
instance of the data is stored, alongside how many times it is repeated.
• For example, in the figure below, there were eight instances of a, 6 instances of b and 2 instances of c in the
original file. This data can be compressed to be stored as 'a8b6c2', which reduces the amount of storage
needed.
• The resulting compressed file is not usually readable by the original application. Compression utilities also
have the ability to decompress (extract) the data from a compressed file so it can be read by the original
application again.
Disk Formatting - Disk formatting prepares storage media such as a hard disk drive or USB flash drive for its first use.
If a disk has already been used, then formatting it will make all of the data on the disk unreadable by normal
applications. Disk formatting utilities make this process easy for users by providing them with the option to choose the
file system, file unit sizes and the name of the
disk. Perhaps most importantly, they make sure that the user really wants to format the disk.
Different operating systems require disks to be formatted in certain ways in order to perform specialist tasks. Disks
can also be formatted in a way that makes them compatible with all operating systems.
Formatting a disk will not erase the data completely and it can still be recovered using specialist tools, but there are
some utilities which will overwrite the data so that files cannot be recovered
Application Software
This are programs that allow users carry out specific tasks.
They are also referred to as Application Software or simply apps.
Apps are usually installed from a disk or downloaded from servers on the internet. Some devices, like smart phones
and tablets, use operating systems that provide access to app stores. Some of these only make apps available to users
after the store has checked the quality of the app and has ensured that the app does not include code that will harm a
user's device or data. Apps can also be installed from storage media like DVDs.
By use of application software, users produce a digital product, such as a document, presentation or image.
Word Processors
• Word Processors are software that enables users to create, format, edit or manipulate text documents.
• Most documents consists of text but may also contain some images, tables, hyperlinks, equations, simple
drawings and shapes and charts.
• Word processors are used in creating documents such as Letters, Reports, Essays, Books etc.
• Examples of word processors include;
• MS Word, Writer, Word Perfect, Word star, etc.
Spreadsheets
This is a program which displays information in form of a table divided into rows and columns forming individual boxes
known as cells. Spreadsheet programs allow calculations to be done on cells or on group of cells.
Examples:- MS Excel, Lotus 1-2-3, Quadra Pro, Open Office Spreadsheet
Features of Spreadsheets
1) Has a feature that allows users to enter text, number or formula into any cells
2) Have features to display data in charts.
3) Has formula that allows calculations to be done on other cells.
4) Allows a variety of operations to be done on rows and columns e.g. resizing rows and columns, inserting and
deleting rows and columns.
Quality of the image is lowered when the image Quality of the image isn’t affected when image is resized
is resized
Take up a lot of memory space compared to Take up little memory space compared to bit mapped file
vector format files format
Sound Editors
Sound editing software allows users to edit audio files or to join together different audio files in order to create
multitrack music or soundtracks for video.
An example of sound editing software is Audacity®.
Features of this software include;
• Cut and join audio clips
• Mute and solo some audio tracks
• Alter volume levels for individual tracks
• Change tempo
• Frequency equalization (changing the levels of high and low pitch frequencies)
• Add effects like reverberation
• Apply audio processing such as Reverse, Noise reduction, Normalization, Fade the volume in, so that it gets
louder, or out, so that it gets quieter.
Presentation software
Presentation software allows users to create multimedia content, including images, text, animation, audio and video.
This content can be placed on slides or pathways that are used to illustrate and support the spoken content of a talk
given to an audience.
An example of presentation software include MS Power Point and Prezi.
Features of a Presentation Software;
Some applications allow users to practice timings and add narration that automatically plays back on the
appropriate slides.
These slides can be set to advance(move) automatically after a set period of time, or on command from the
presenter.
Notes can be added to the presentation to remind and prompt the presenter to speak about specific points
during the presentation.
Web Browsers
Web browsers allow users to view web pages and websites created in web authoring software.
Web pages could be locally on the computer or hosted on web servers that could be accessed through the internet.
These servers may be in another country. Different browsers have different features and compatibility with file types
used on the World Wide Web.
Browsers also allow users to access other systems that use the internet but are not on the World Wide Web, such as
file transfer protocol (FTP) servers, e-mail, instant messaging, etc.
Examples of web browsers include Google Chrome, Microsoft Edge or Mozilla Firefox, etc.
Control Software
Control software are used to automate the movement of control devices or actuators, such as motors. They make
something happen in the physical environment.
Control software takes input from sensors, makes a decision based on the input value and then outputs something,
such as a command, as a result.
Control software is often used in engineering, vehicles and building control systems. However, a developing group of
control applications is in the area of home automation systems, where devices can be monitored and controlled using
a smartphone app.
Applications of control Software;
Application software are commonly used in control devices such as;
In lifts
Traffic lights
Burglar Alarm systems etc.
Project Management Software
A project is a lengthy task that needs to be completed within given time and budget.
Project management applications are used to help plan and track the individual tasks in a project, so that project
managers can make the most efficient use of the available resources.
Some tasks cannot be started until a previous task is completed or has been partly completed,
It is important for a project manager to see which tasks are dependent on others. When all of these dependent tasks
are combined together into a timeline, it is easy for the project manager to see the critical path.
Features of Project Management Software;
It can set milestones – important steps in the project.
Has a feature that allocates tasks to individual people or groups of people.
provide tools for tracking the costs
Able to arrange for resources to be delivered on time.
Communication Software
These are application software that enable us to communicate through electronic networks or smartphones. Common
examples include;
E-mail applications such MS Outlook, Gmail App on smart phones.
Social Media applications such Facebook, Instagram, etc.
Short messaging Service (SMS) applications found on mobile phones. They enable a user compose a message
of up to 160 characters using the mobile phone network and do not require an internet connection.
Multimedia Messaging Service (MMS) applications that extend the capabilities of SMS. Can deliver more than
160 characters per message and can include video, animations, images and audio. Like SMS, they are sent
using the mobile network and do not require Internet connection
Instant Messaging Apps such as WhatsApp – they are very similar to MMS applications, but they require a
connection to the internet. They can allow users to see when other users are typing, and users can also
prevent others from seeing when they are typing.
Software Licensing
A software license is a legal document governing the use or redistribution of the software. It give a user permission to
use one or more copies of software in ways where such a use would otherwise potentially constitute copyright
infringement of the software owner's exclusive rights under copyright law.
When buying software, the purchaser may acquire some or all of the following:-
Copy of software on a CD-ROM or access rights to download software from website.
Manual explaining how to use the software.
A license to use the software.
Sometimes, users require a software license to be able to install and use software on a computer.
There are a variety of different types of software licenses, with different characteristics and conditions:
1) Proprietary - Proprietary software, or closed source software, is computer software licensed by the copyright
holder with the intent that the licensee (the user) is given the right to use the software under certain
conditions, and restricted from other uses, such as modification and sharing.
2) Open Source - This type of license makes the source code and design of the software available to anyone who
wants to enhance or develop it. It is important not to confuse open source software with free software.
3) Trial Version - Trial version refers to a version of the software that is only usable for a certain period of time
before it has to be purchased.
4) Shareware - This is where software is initially made available free of charge to users. Software functionality
may be limited, with additional features becoming available only after payment.
5) Freeware - This is software which can be copied or downloaded for free. It is often fully functional. Examples
may include software developed by organisations such as universities, where the aim was not to profit from
the software. Freeware and shareware should not be confused.
Software Updates
Software updates refer to newer versions of the software which may be installed in part or an overhaul. An update
is simply a change or addition to a computer file so that it has the most recent information.
Software updates are usually made available for download from a server on the internet. Some updates can be
scheduled to happen automatically when they are released. It is important to back up a system and files before
updating software in case the update introduces problems, such as removing components that other software needs
in order to function.
Reasoning for Updating Software
1) Fixing security vulnerabilities or bugs in the software
2) Increasing compatibility with newer operating systems and devices
3) Improving performance and efficiency
4) Introducing new features
5) Improving usability i.e. make it easy to use the software or device.
NB:
Bugs are errors in the program's source code of a software program.
Compatibility is the ability of the software to work with other devices, systems and applications.
Memory
Memory refers to devices that hold data while is being processed. Memory is used during processing because it has
a higher access speed, i.e. can be accessed faster than secondary storage.
Memory is used to store instructions so that the processor can fetch them quickly in order to process them. It is
often called main memory or primary storage. The normal storage of a device is often called secondary storage.
Types of Memory
There are three types of memory that you need to know about:
1) Random Access Memory (RAM)
2) Read Only Memory (ROM)
3) Flash memory
Although the computer system cannot swap instructions in and out of ROM, it is possible to change the contents
of some special types of ROM so that the data on it can be updated. These types of ROM are called:
EPROM (Erasable Programmable Read Only Memory)
EEPROM (Electrically Erasable Programmable Read Only Memory).
The contents of EPROM and EEPROM can be erased and then rewritten to.
Data stored in EPROM can be erased by exposing it to strong ultraviolet (UV) light while data stored in EEPROM is
erased by applying a voltage to one of the pins on the ROM chip. This makes it possible to erase or change the
contents of EEPROM without removing the ROM chip.
EEPROM was later developed into flash memory.
The process of erasing and rewriting the contents of EPROM or EEPROM is used when updating the firmware for a
device.
Firmware is a type of software that controls a hardware device.
4) - Flash Memory
Flash memory is a type of EEPROM. Like other types of ROM, it is non-volatile but its contents can be altered by
the user. It does not have any moving parts, so it has a fast access time and low power consumption. Because of
its low power consumption, flash memory is used in the Solid State Drives (SSDs) that are used in portable devices,
such as laptops, as these devices often rely on internal batteries for their power. Flash memory is also used as
removable storage in flash disks and memory cards (SD cards).
Features of Flash Memory
• Flash memory has high access speed, which means that data can be written to or read from the device faster.
• The device is very small in size (compact).
• They are very Light in weight thus suitable to be used in portable devices such as tablets
• Have no moving parts unlike magnetic drives and optical drives
• They consume less power.
• They are more costly per GB
• Low storage capacity per unit cost
Processors
The processor is the brain of the digital device. It carries out software instructions.
A processor is made up of one or more Central Processing Units (CPUs). In processors that are made up of more than
one CPU, each CPU is referred to as a core. For example, in a quad-core processor, four cores are working during
each processor cycle. This means that it can do up to four times as much work as a single-core processor.
In multi-core processors, each core can run more slowly than in a single-core processor. This saves energy and
produces less heat, which means that the processor requires less cooling. This makes the computer quieter as the
fan does not have to cool the system.
Reducing the amount of time in which the fan is running also reduces the amount of energy that the system uses,
making the system more environmentally friendly and further increasing the battery life of mobile devices.
Processor Speed
Processor speed is measured in clock cycles per second. This is the number of times per second the processor can
carry out one or more instructions. Clock cycles are measured in units called hertz (Hz), Kilohertz (KHz), megahertz
(MHz) and Gigahertz (GHz).
Although clock cycles measure processing speed, there are other factors that affect how much work a processor can
do in a given time. A user should also consider the amount of work that a CPU can do in each clock cycle. Different
processors can carry out more instructions per core in each cycle.
Connectivity
Digital Communication
Our world is connected by wired and wireless digital communication systems. Data flows around these
systems, carrying information about our personal and work lives and providing us with entertainment and
news. Digital devices exchange data and communicate with each other.
Digital Communication refers to the way digital devices transmit data to one another.
Terminology
Network – set of interconnected digital devices that able to communicate and share resources.
Node – Any device connected to the network e.g. computers, routers, switch, printer, etc.
Work station a computer connected to the network.
Stand-alone Computer – A computer not connected to the network.
Server – main computer in a network that controls other devices in the network.
Client - computers in a network which are controlled by the server.
Bandwidth – amount of data that can be transmitted across a connection per unit time.
Latency – the time it takes to send data from one device to another.
Bandwidth is the amount of data in bits that can be transferred across a connection in one second.
The speed at which data can be transferred depends on the bandwidth of the connection.
Like a water pipe. The larger the pipe the more the amount of water the pipe can carry in a second.
Impact on user Experience:
A higher bandwidth means that more data can be transferred per second. This makes upload and
download faster. It makes it possible to do things that require lots of data to be transferred in short
time e.g. multiplayer online games or high definition video streaming.
Device-to-device Communication
This is where devices connect directly to each other using wired or wireless methods.
Examples of device to device communication
Network Communication
This is where two or more devices are connected to create a network so that they can exchange data.
A network is a set of interconnected digital devices that are able to communicate and share resources.
Resources that can be shared on the network include;
Data
Files
Printers
Storage devices
Programs
Internet connections
Types of Networks
Local Area Network (LAN)
is a network that connects digital devices that are in a small geographical area, like a building or group
of buildings close to each other.
Wide Area Network (WAN)
network that spreads over a large geographical area. They often use connectivity provided by third-
party telecommunication companies to link LANs together through the internet.
Due to their big size, they often have slower transfer speeds compared to LANs.
Internet is the largest example of a WAN.
Personal Area Network (PAN)
is a group of connected digital devices that are all for to be used by an individual.
Devices in a PAN are either connected to each other directly or connected through access points.
Satellite Communication
This is a wireless transmission technique where satellites are used to transmit data from one device to the other.
Digital devices use antennae to receive the radio signal transmitted by satellites.
Benefits
the transmission is very reliable and will always be available.
It is also not affected by power shortages.
Drawbacks
is that satellite signal do not pass through solid objects thus it needs line of sight.
Signals can also be affected by atmospheric weather conditions such as heavy rains or snow
Satellites are used in GPS, television, telephone and military communication systems.
Broadcast Communication
Broadcast communication is a wireless communication commonly used in both Analogue and digital television and
radio communication.
In Analogue Tv and Radio, the analogue signal is broadcast by transmitters and received by the viewer’s antenna which
sends the signal to the TV or radio which converts it into images and sound.
Digital broadcast is similar to analogue but may provide more information as well as transmit HD video signals
Wired Communication
Wired communication refers to a form of communication that involves devices transmitting information through
cables connected to the devices. The following are examples of commonly used wired Connections with some
examples of their uses;
Ethernet Networking
USB
USB is a very common connection type. It is a standard that is common with all types of connectivity.
This progress is made necessary as digital devices become more complex in their features and functionality.
Minijack
A minijack connector, also known as phone jack, audio jack, headphone jack or jack plug, is typically used for analog
audio signals. E.g. from phone to headphones.
Wireless Communication
Digital devices can communicate wirelessly to one another. This is where devices transmit data from one to another
without any physical connection such as cables.
There are many different types of wireless connections;
Wi-Fi
Bluetooth
Wi-Fi Direct
Infra-Red (IR)
Near Field Communication (NFC)
3G/4G
Wi-Fi
Wi-Fi is a wireless technology used to connect devices to a network.
It is commonly used in home and office networks. Wi-Fi networks can then be connected to the Internet.
Wi-Fi technology can transmit signals to a long distance though the range is limited depending on the strength of the
transmitter.
It has a high transmission bandwidth thus can transmit faster
Wi-Fi transmission does not require line of sight.
It can connect many devices at a time.
Bluetooth
Is a type of wireless connectivity that allows devices to connect over a short distance. It has less bandwidth so
it cannot transmit as much data as Wi-Fi.
It requires devices to pair before they can communicate.
Bluetooth is used to transfer small files between two devices. It can also be used to connect devices such as
smartphones, tablets and laptops to earphones, keyboard, mice, printers, etc.
Wi-Fi Direct
Infra-Red (IR)
Is a wireless transmission technique that transmits small amounts of data over a short distance.
The transmission requires a clear line of sight between the transmitter and the receiver.
Line of sight refers t a situation where the two devices (transmitter and receiver) are in a place where they are
not blocked.
This allows the signal to travel between them without being blocked by solid objects like walls.
IR signal is also affected by sunlight.
IR often used in remote-control devices such as TV remote controls
3G and 4G
Is a wireless transmission technic used to provide Internet access to mobile devices such as smartphones and
tablets.
Also referred to as mobile broadband.
The G stands for generation – thus 4G means fourth generation of mobile broadband technology.
Future generations of broadband technology will improve the speed and availability of the signal.
Mobile broadband provides high-speed wireless connectivity using 3G or 4G technology to connect to the
mobile phone network which acts as the user’s ISP.
Broadband networks provide fast access to the internet through a connection to an ISP. They use fiber optic
cables or copper cable network.
Range Can transmit over a long distance Transmits over short range. (maximum of
10M)
Bandwidth Has a high bandwidth Has a low bandwidth
Devices Connected Can connect multiple devices Connects a limited number of devices usually
Simultaneously simultaneously two. (pair)
Networks
Requirements of Connecting to Networks
Protocols
In order to connect to a network, computes need to fulfil certain requirements so that they all operate using standard
protocols. Protocols are rules that allow the exchange and transmission of data between devices.
Network Operating Systems
A network operating system allows a computer to communicate on a network by providing additional functionality to
a standalone OS which includes:-
Passing usernames and passwords to a server for authentication
Separating user accounts and ensuring users cannot access each other’s files.
Providing access to a network storage and shared resources such as networked printers.
It can store over 4billion addresses and was developed because of the huge growth in number of connected devices.
IPv6 – Uses eight groups of four hexadecimal numbers separated by colons e.g.
f02e:0db8:0000:0042:0000:8a2e:0370:7334.
IP addresses can either be assigned by a network administrator or allocated dynamically by a server running
Dynamic Host Configuration Protocol (DHCP).
A DHCP server is a networked computer that automatically assigns an IP address to other computers when
they join the network.
Commonly used with wireless devices such as smartphones and tablets.
Device Name
A device name is a descriptive name that helps users to identify computers on a network. They are not used by
computers to communicate with each other as they are not always unique i.e. they can cause conflicts if data is sent to
more than one device with the same name for processing. You can change a device name using tools in the devices
operating system.
Ethernet Cable
Coaxial Cable
Fibre Optic Cable
Server
This is a powerful computer on the network that shares its resources with connected devices. Computers
connected to a server are known as clients.
Types of servers;
1) A File Server stores all data and software that are shared in the Network.
2) An e-mail server will store all e-mails and also receive all e-mails then transmit them to each user.
3) A Proxy Server - a computer setup to share a resource, usually an Internet connection.
4) Authentication Server – checks usernames and passwords When a user logs in the network, if the password
and username are correct, then the client is allowed to access resources on the network.
5) Application Server – Provides clients with access to application softwares that are installed on the server.
6) Print Server – Manages printers in a network, dealing with print requests from client computers and adding
jobs to a queue to avoid overloading the printer with requests.
7) Web Server – this is where web pages are hosted. It enables client computers to access the web pages even
from outside the LAN by using HTTP.
Components of Wireless Network
A wireless network is a network in which nodes are connected without any physical media. The devices are able to
communicate with one another through wireless transmission techniques such as wi-fi, Bluetooth, NFC, Infrared, etc.
Wireless networks use the following components;
1. Wireless Access Point (WAP)
2. Wireless Network Interface Card (WNIC)
3. Wireless repeaters or wireless range extender
4. Wireless Router
Wireless Access Point (WAP) - It connects a group of wireless devices together then links them to wired LAN. It
conveys data between connected wireless devices and one connected wired device, such as a router or switch,
thus allowing wireless devices to communicate among themselves or with other wired devices.
Wireless Network Interface Card (WNIC) - It allows devices to connect to a wireless network. Most new laptops are
equipped with internal WNICs.
Wireless routers - A wireless router allows wireless LAN devices to connect to a wired device such as a modem so
as to connect to internet. Some wireless routers come with a few LAN ports the enable wired devices also to
connect to the internet.
Wireless repeaters (wireless range extender) - Is used to extend the range or boost/amplify the signal of an
existing wireless network. They can be strategically placed to elongate a signal area or allow for the signal to reach
around barriers such as those created in L-shaped corridors, Mountains and also tall buildings.
The Internet
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol
Suite of protocols (TCP/IP) to serve billions of users worldwide.
It is a network of networks that consist of millions of private and public, academic, business, and government
networks that are linked by electronic and optical networking technologies.
The Internet carries a big amount of information resources and services, most notably the inter-linked
hypertext documents called the World Wide Web (WWW). It also has the infrastructure to support electronic
mail.
Internet Services
1. World Wide Web (WWW) - interlinked hypertext documents (Web pages) stored on the webserver to be
accessed via the Internet.
2. E-mail - is a service provided by the internet to enable users to send and receive messages quickly and
securely through an electronic or computer channel.
3. News groups - is a service that provides a repository for messages posted from many users at different
locations.
4. Internet forum - is a web application for holding discussions and posting user-generated content. They are
also referred to as Web forums, message boards, discussion boards, discussion groups, discussion forums,
bulletin boards, or simply forums.
5. Chat rooms – is an internet service that gives users a way of communicating by sending text messages to
people in the same chat-room in real-time. Some chat rooms such as Yahoo! use both text and voice
simultaneously.
6. Instant messaging (IM) - is a form of real-time communication between two or more people based on typed
text conveyed via computers connected over a network.
7. Search engines - A search engine is an information retrieval system designed to help find information stored
on the www. Search engines help to minimize the time required to find information and the amount of
information which must be consulted, akin to other techniques for managing information overload. Other
kinds of search engines include enterprise search engines, which search on intranets, desktop search engines,
and mobile search engines.
8. Internet filter software – is a service that gives one the ability to control content displayed, block websites
and set up passwords. Powerful services like email filtering, popup blocking and chat room monitoring are just
some of the tools available with today's internet filter software, each designed to protect against and
counteract the tactics of aggressive malicious online companies.
Client-Server LANs
In a server-based network, the server is the central location where users share and access network resources.
This dedicated computer controls the level of access that users have to shared resources.
Shared data is in one location, making it easy to back up critical business information.
Each computer that connects to the network is called a client computer.
In a server-based network, users have one user account and password to log on to the server and to access
shared resources.
Network Server Operating Systems are designed to handle the load when multiple client computers access
server-based resources.
Benefits of Using Client-Server LANs
Control of user access rights – Users can be given access to some resources and restricted from accessing
others.
Centralized administration – Resources and user accounts can be managed by a server or administrators
hence avoiding problems in the network.
Centralized Backup – User data is protected from loss because backups can be automated for all users in the
network.
Shared software – Application servers can provide access to shared software.
Shared storage and file access – The amount of storage available to users can be managed centrally.
Roaming profiles – Ability to log into any computer in an office and see your settings and files hence allowing
users to access data, applications and printers from any client.
Encryption
Encryption is the process of encoding, scrambling or jumbling data so that unauthorized users are can’t understand it.
Caesar cipher was one method used to encrypt data whereby it shifts letters to the left by a set number of places.
Caesar cipher is easy to crack hence the need to have modern encrypting types/methods.
Two types of encryption are:-
a) Symmetric key encryption - It uses the same key at both ends of the process, meaning that the same key is
used to encrypt and decrypt the data.
b) Public key encryption - It uses two related keys called a key pair, one key is used to encrypt while the other is
used to decrypt it. A computer shares a public key with other computers that want to send it encrypted data.
This public key is mathematically related to a private key, which is not shared. E.g. If Farooq wants to send
Aisha an encrypted message, Farooq uses Aisha’s public key to encrypt the data. Data is then sent to Aisha,
who uses her private key to decrypt the message.
Unauthorized Access
• This is where users who are not permitted to access a network gain access to that network.
• Unauthorized users attempt to gain access to networks either directly or by use of programs that run numerous
login attempts on devices attempting to gain access to the networks with poor security.
Phishing
A technique used by criminals to get personal information and payment details from users by sending e-mail messages
that appear to be from real organizations, such as shops, banks or charities. These emails ask the user to provide their
information by replying to the message or following a hyperlink that opens a webpage into which the user is asked to
type their personal details.
Spear phishing is where the emails are highly customized or personalized and targeted at a smaller number of
particular users.
Smishing is where the messages are sent via SMS or instant message apps so that users open the fake webpage in a
mobile browser. Users may not realize that the webpage is fake, particularly if they have never seen the company's
real webpage in a mobile browser. As a result, they might type in their username and password details and reveal this
personal data to the criminals.
Pharming
A technique used by criminals to gain personal information from users by creating fake versions of trusted websites to
trick users into entering their login details, which are then used by the criminals to access users’ accounts. Two main
methods used to direct users to a pharming site are :-
•Internet traffic going to the real website is redirected to the fake website, so that users think they are visiting the real
thing. Criminals do this by altering the domain name servers to make internet traffic go to their fake site. They can also
use malware to redirect web requests.
• Often, the URL of a pharming website is designed to be very similar to the URL of the real website. This means that if
a user misspells the URL when typing it into the address bar of their web browser, they could go to the pharming site
by mistake. For example, if the URL of a real bank is https://moneybank.lk and the criminals create a website with the
URL http://moneybamk.lk, it could be easy for the user to make a mistake and arrive at the fake website.
Spyware
A technique used by criminals to gain personal information from users by sending a malicious program to the users
system to secretly capture personal information.
Key logger are spyware programs that monitor key presses on the keyboard to capture sensitive information such as
passwords.
Firewalls
A firewall could be a hardware device, a software program or both.
Firewalls are frequently used to prevent unauthorized users from accessing private networks and computers
connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall,
which examines each message and blocks those that do not meet the specified security criteria.
Encryption
Is a process of encoding, scrambling or jumbling data so that it is not understandable to unauthorized users. Caesar
Cipher was one method used to encrypt data whereby it shifts letters to the left by a set number of places. Caesar
cipher is easy to crack hence the need to have modern encrypting methods. There are two types;
Symmetric Key Encryption - uses the same key at both ends of the process, i.e. the same key is used to encrypt
& decrypt the data.
Public Key Encryption - It uses two related keys, one for encryption and the other for decryption.
A computer shares a public key with other computers that want to send it encrypted data. This public key is
mathematically related to a private key, which is not shared.
Encryption Protocols
Wireless Encryption Protocol (WEP) - It is used to secure data transfer in a wireless network. It’s less secured
because every device on the wireless network uses the same key for every transfer.
Wi-Fi Protected Access (WPA)/WPA2 - Is a security protocol designed to provide better encryption than WEP.
WPA generates a new key for each device on the wireless network and for each packet of data that is sent.
Anti-Malware Programs
Anti-malware prevents malware from accessing or operating on computers. It scans computer files in real time and
allows users to scan files, folders, disks or whole systems.
Common Anti-Malware Programs Include;
1) Updated Anti-virus software
2) Anti-adware - Adware displays unwanted adverts to users. Anti-adware software detects, Quarantines &
removes adware
3) Anti-spyware - Spyware secretly monitors and records computer data and user input. E.g. a keylogger is a type
of spyware that monitors and records actions such as key presses or mouse clicks to identify a user's
passwords and security codes. Anti-spyware software detects, quarantines and removes spyware.
Anti-Virus Programs
A virus is malware that uses networks to spread to connected devices. They are spread via communication software
such as email or web browsers or by being loaded into a computer's memory from external storage such as USB flash
drives. Viruses often look like normal files. However, they have unique virus definitions that can be identified by anti-
virus software.
Updated Anti-virus software constantly checks files that are downloaded and loaded by a computer for signs of virus
definitions. If the anti-virus software finds a match, it quarantines the file so that it cannot be run. Anti-virus software
has to be updated regularly because virus code can be changed, either automatically or by the developers of the virus.
Anti-virus utilities are often combined with software that protects against adware and spyware thus often known
more generally as anti-malware.
Secure Websites
Hypertext Transfer Protocol (HTTP) is used to exchange data between a web server and a client (that is, a computer
that is accessing the web server). However, data transferred using HTTP is not secure, so Hypertext Transfer Protocol
Secure (HTTPS) was developed. HTTPS authenticates payment servers and provides encryption using Secure Socket
Layer (SSL) and, more recently, Transport Layer Security (TLS). HTTPS keeps communications private and provides
security for users' online accounts. Web browsers often show that a website is secure by displaying a green padlock in
the address bar.
Email Attachments & Web Links
Another way of securing data & personal information online is by users being careful when opening email
attachments or hyperlinks in emails especially when:-
They do not recognize the sender
Text is irrelevant
Text has grammatical errors
File is executable file like .exe
User does not recognize the URL.
Backup Procedures
This is creating of extra copies of data on an external storage device or online storage where the data will be held on
two different geographical locations. Online backing storage is slower because it uses an internet connection.
During backup, users need to decide on;
how many or which files to back up and
how often to backup.
Three types of backup include:-
Full Backup – creates a copy of all files
Differential Backup – creates a copy of all files that have changed since the last full backup
Incremental Backup – Saves a copy of only the files that have changed since the last full or differential backup.
Operating Online
Impacts of the Internet
The Internet
The Internet is the interconnected network of computers and devices that provides many online services to
users.
The World Wide Web is just one use of the internet. Protocols are used by applications to transfer data
across the internet.
These protocols include:
• IMAP (internet message access protocol) for email
• FTP (file transfer protocol) for sending files
• SSH (secure shell) for secure remote logins
• VoIP (voice over internet protocol), used for voice call services like Skype
• XMPP (extensible messaging presence protocol), used for messaging services like WhatsApp
Impact of the Internet on Individuals
The use of Internet has numerous impacts on an individuals life. It affects the ways people carry out their
lives in the following ways;
Information and Services
It has improved access to information from news, sports and weather services as info is up to date
and spreads fast.
Access to online booking systems for travel, leisure and entertainment.
Online shopping and banking.
Study using Virtual Learning Environments (VLEs)
Employment
Skill requirement - Use of Internet has made many employers to require employees to use internet
for work meaning employees need to learn new skills.
It has created new job opportunities since skilled workers are needed to support this development.
If employees do not keep updating their skills in the use of the internet, they may not have the skills
required to carry out new work and they could lose their jobs.
Working Practices
It has affected the ways in which people carry out the tasks in the course of their working. These include;
Collaborative Working - enables people to connect with one another in real time where work is split
into a number of individual tasks each of which can be done by different employee at the same time.
Benefits:
Each employee can focus on one task.
Employees become experts in their area of work through experience or training.
Expertise is shared
Employees can share work
Drawbacks:-
Employees do not share their skills and expertise
Employees have less understanding of the whole project.
Difficult for many people to agree.
Difficult to co-ordinate work.
Flexible Working - A way of working that enables an employee to decide the hours that he/she can
work from home. Can also allow more than one person to work on a task at the same time.
Benefits:-
Can work at appropriate time while taking breaks.
Employees can fit their work around family life.
Access to up-to-date information
Can work from anywhere with internet connectivity
Drawbacks:-
No face to face interaction
Work cannot be managed effectively.
Can cause exhaustion if overworking
No access to the same facilities or resources.
Teleworking
Teleworking refers to a practice where employees work from their homes or a telecentre and use a
network, internet (E-mails, video-conferencing and mobile phones) to communicate with the office
instead of travelling to the office every day.
Teleworking is also referred to as telecommuting. The use of ICT has enabled many companies to use
this method of working and it has many benefits to the employers (company) as well as to the
employees (Individuals).
Social Life;
The internet has had a huge impact on the way in which people socialize.
Social Interaction – Internet allows people to interact with any other connected person on the planet
through virtual environments.
Cyber Bullying - the internet can be used to make communications aimed at to upset or embarrass
someone
Physical Activity - Access to online goods and services people not have to leave the comfort of their
homes to use the services, this reduces need for physical activity as part of daily life which could have
negative effects on people's health and wellbeing.
Digital Footprint
This is all the data that a user creates online which is recorded and stored. Is the impression that you leave
online which is shared or recorded either on archive sites or as backups.
You can minimize your digital footprint by:-
Closing old social media accounts and request all archived data to be deleted.
Searching for your own name online and see what information about you is publicly available
Ask website owners to remove old and irrelevant content about you.
Read terms and conditions when creating online accounts since some still have rights over your data
even after closing your account.
Negative Impacts
Security Issues
The data stored by organisations is often private and valuable. If data is stored in a central
location, it can be physically secured by walls, locks, alarms and security guards. None of
these methods is totally safe, but they are all good ways of securing data.
However, as you have already seen, employees often work from home. Organisations use the
internet to provide their employees with access to their systems while working from home.
They do so using three methods:
1) allowing employees to transfer a copy of the organisation's data to home via email
2) providing remote access to the data stored in the organisation's building, such as by
using a VPN
3) Storing data on another company's servers and providing access to that data. Each of these
methods means that the data is more vulnerable to being accessed by an unauthorised userthan
it would be if it remained in a central location.
There are three main ways in which unauthorised users can gain access to systems.
•Authorised users reveal their login details, either intentionally or unintentionally, such
as by losing paper copies of their login details, saving their login details to a
computer that they lose, being pressured into telling someone their details or
having passwords which are easy to guess. Organisations have policies that help
employees to understand and manage these risks. Policies like these make
employees accountable for their actions, which means that they are more likely to
act responsibly.
Greater Competition
In the past, organisations usually competed with other organisations in their local area
or their own country. However, the use of the internet means that organisations must
now compete in a global marketplace. In some industries, there are more organisations
with which to compete. Large organisations can also become less attractive to
customers because they may be less flexible than small online businesses.
Some types of organisation and even whole industries have been put at risk due to
the way in which the internet has provided new channels for the trade and distribution
of goods and services. i e
o Music and film retailers have been threatened by the increased use of online
downloads and streaming ie Netflix.
Negative Impacts
Availability of information which might not be relevant, accurate or valid and biased.
Too much information will be available hence difficult to extract key information.
Fast distribution of wrong information over the internet poses a great problem to law enforcement
agencies like the police.
Operating Online
Online Communities
An Online community is a group of people with a shared common interest who communicate online.
Each type of online community has:
A function - what it does for people who use it
Features – what enable it to achieve its function
Different online communities provide different features that their members can use to interact with each
other. Features that provide the function of one type of community now could be used for other types of
community in the future, because the internet and its uses are always evolving.
Profile
This is a collection of user information provided by the user when creating an account with a social
networking community.
Profiles can be personalized by members and they can include:
Biographical details
An 'about you' or short description of the user
Details about the user's work and education
Travel history
Family details
Contact information
Profile & background images, color schemes & designs.
Some communities allow their members to restrict other users' access to their full profile until the other
users request to add them to their network. Other communities allow totally unrestricted access.
User suggestions
Social networking communities suggest other members that users might want to connect with. They often
do this by analyzing a user's interests and the interests of people within that user's social network, then
matches them to friends of existing connections.
Share
Share functionality allows members of a social networking community to repeat other members' posts to
the community. This makes the original posts available to more people. When a post is shared widely on
the internet and spreads far beyond its creator's original social network, people describe this as 'viral' or
'going viral'.
Third-party integration -
Many websites now include direct links to social networking sites so that people can easily share the
information provided on the third-party website.
Additional Features
Add content to posts - Allowing members to add content such as photographs, videos and URLs to their
posts means that members can share their experiences in different ways. This feature usually allows users
to preview the content before they post it.
Private or direct messages - Most social networking communities allow their members to send private
messages to each other, rather than having to post messages publicly.
Notifications - Notifications tell members about new activities within a social networking community.
They help keep members involved with the rest of the community.
Wikis
These are website or database developed by multiple collaborating users, all of whom can add and edit
content.
Examples include;
the online encyclopaedia, Wikipedia, and the online music database, Discogs.
Features of Wikis
The function of a wiki is to allow members of the community to collaborate in order to build and edit web
pages.
The features that enable the function of wikis include:
Member accounts, which allow users to track which edits have been made by which members of the
community
An edit button, which takes editors to a text editor so that they can edit the content
Structured language, which allows members to format web pages or add links to other content
Search tools.
Forums
An online forum is a website or web page where users can post comments and information and reply to
other users' comments. Forums are also known as bulletin boards or message boards.
Examples include;
Yahoo!®, Google Groups™ 13, Stack Overflow®, Quora® and The Student Room®.
Features of Forums
Forums provide members of the community with online spaces for structured discussions. Posts on the
forum are arranged in topics or threads.
The features that enable the function of a forum include:
Groups, allowing members in one group to have different levels of access or rights to members in
other groups
Moderators, who are members who have the right to allow or block posts or members
Administrators, who are members with the same privileges as moderators plus some additional
rights, such as being able to promote members to be moderators and demote moderators
Posts, which are messages sent by members to the group
Threads, which are topics for conversation, with replies usually arranged and sorted by date or topic
Sticky notes or stickies, which are threads kept at the top of the list of threads to make them easily
accessible to members
Ratings, which allow members of the community to rate other members' posts and enable members
to see how helpful or genuine the posts are
Private or direct message functions, which allow members of the community to send private
messages to each other; sometimes these can also be seen by moderators or administrators.
Blog (short for web log) a website or web page that is updated regularly, often written like a diary or a
series of articles
Vlog (short for video log) a video blog
Blogger someone who creates or maintains a blog
Cyberbullying
Cyberbullying is the term used to describe the use of the internet to send text or images in order to upset
or embarrass someone.
Data Protection
Some countries have laws to ensure that, when data is stored about individuals, that data is protected.
One common law used in many countries is the Data Protection Act (DPA). This ensures that organizations;
• Get the individual's consent to collect, use or disclose personal data
• Collect, use or disclose personal data in an appropriate manner for the circumstances and must have
informed the individual of their purposes
• Collect, use or disclose personal data only for purposes that would be considered appropriate to a
reasonable person in the given circumstances.
Important Terms
• Personal Data – is data relating to a living individual who can be identified from that data. E.g. a
school can store information about students.
• Data Subject – the individual about whom the data is stored. E.g. students are the data subject
• Data Controller – The individual or organization that is responsible to collect, store and use personal
data. E.g. the school is the data controller.
• Data commissioner – this is the organization that ensures that all individuals or organizations that
collect personal data adhere to the Data Protection Act.
Monitoring Individuals
Digital technologies can be used to monitor individuals. This can have both benefits and significant
drawbacks.
Digital technologies can be used to monitor individuals movements as well as individuals communication.
Sustainability Issues
The use of digital technologies can negatively affect the environment. For example, it can use up natural
resources and contributes to long-term harm to the ecology of the planet.
The following table shows three ways in which the use of ICT can cause sustainability issues and lists some
of the ways in which the effects of these issues can be mitigated.
These are all useful tools. However, these AI systems do not have human
judgment and cannot apply common sense. Consider the following situations:-
What if a car needs to travel over the speed limit, perhaps to avoid a
hazard? Would AI software prevent the car from doing this if it was also
supposed to stay under the speed limit?
What if a car had to swerve to avoid another vehicle, but in doing so veers
off the road and into a pedestrian? What would the computer decide to do
in that situation? Can we know what it decided to do? Can we hold it
responsible?
CHAPTER 10: ONLINE INFORMATION
INFORMATION SOURCES
Information is available from a wide range of sources. These can either be:-
Primary sources, which are those that you have created yourself, or
Secondary sources, which are those that have been created by someone
else.
SEARCH ENGINES
If you want to find information online and do not know the URLs of any
sites that contain that information, you can use a search engine. Search
engines compare the words entered by a user with words in a database of
web pages.
They then show the user the results that are the closest match to their
original keywords.
Search engines can be used in browsers, but they are also used by smart
personal assistants such as Amazon's Alexa® and Apple's Siri®14. These
personal assistants allow you to speak your search terms aloud and have
results returned through a speaker.
Examples of web-based search engines are:
• Bing
• Google
• Yahoo
KEYWORDS
• Keywords are the words or search terms that a user types into a search
engine in order to look for matching information. When entering keywords
into a search engine, only enter the important words that you think
websites will contain. Keep it simple and do not add too many keywords.
SEARCH TYPES
• Some search engines allow you to specify the type of information that you
are searching for, as shown in Figure 10.4.
SUGGESTED SITES AND AUTOFILL
Some search engines give results using autofill as soon as you start to type
keywords into it. Some browsers also allow you to choose a search engine so
that you can type keywords directly into the browser's address bar.
The suggested results often change as you continue to type more text, because
the additional terms allow the autofill software to narrow its search for more
relevant words or phrases. Similarly, other search engines suggest sites that
users might be interested in visiting. These suggested sites can be based on
popular searches made by other users or your own browsing history.
PLAGIARISM
The internet has made information easily available to many people. However,
this means that it is becoming more common for people to copy and paste
information, sometimes without even
checking that it is suitable or true.
Sometimes, they may even claim that this information is their own. This is
known as plagiarism.
If you do this in your assignments for school, college or university, you will be
punished and your marks could be reduced or you could fail the assignment
completely.
One way to avoid plagiarism is to:-
Rewrite or paraphrase information. When you do this, it shows that you can
find information, understand its meaning and then express it in your own
words.
State where the original information came from. If you found the
information online, include the URL, the author's name (if it is available)
and the date on which you found the information.
Disclosure of Personal Information/Location
It can be dangerous to disclose too much personal information online. For
example, people could use this information for the purposes of grooming or to
locate the person or their friends and family. In some cases, location data can
be given away, either on purpose or by accident, by uploading geotagged
photographs to photo-sharing sites.
Many online community apps for mobile devices enable users to include their
location in their posts. This information is provided by GPS data, or calculated
from data provided by the user's Wi-Fi access point or ISP data.
If this feature is activated, then any member of the community can find out
exactly where that person is. To reduce the risk, online safety organizations
advise individuals to think carefully about how much of their personal
information they want to make public, and not to post publicly any images
containing information about their location.
It is also recommended that users check and update their privacy settings
regularly, so that only people that they know in the real world can access their
personal information online. Finally, members of online communities should
report anyone who they think may be misrepresenting themselves or who is
acting in a way that puts members of the community at risk.
Cyberbullying
Cyberbullying is the term used to describe the use of the internet to send text
or images in order to upset or embarrass someone.
How to Stay Safe Online
To stay safe when using the internet, users should follow three main rules:
Zip it
Block it
Flag it.