Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
43 views66 pages

IAL IT Unit 1 Notes

Uploaded by

Narmeen Lodhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views66 pages

IAL IT Unit 1 Notes

Uploaded by

Narmeen Lodhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

‭ nternational A Levels‬

I
‭Information Technology‬

‭Unit 1 Notes‬

‭1.3 Unit content‬

‭ opicwise Question papers, Mark schemes and‬


T
‭Examiners’ Reports‬
‭Topic 1: Hardware and software‬
‭ igital devices consist of both hardware and software components. From the‬
D
‭hardware perspective, it is important to understand the technologies that enable‬
‭these devices. From the software perspective, it is important to understand‬
‭licensing and maintenance. Understanding both the hardware and software will‬
‭enable students to assess and select components to meet the requirements of an‬
‭individual, organisation or scenario.‬

‭What students need to learn‬

‭1.1 Hardware‬

‭ .1.1 Understand the features and functions of contemporary digital‬


1
‭devices.‬

‭Portability‬

‭●‬ ‭Portability is a key feature of many contemporary digital devices, especially‬


‭ obile phones and tablets. These devices are designed to be carried around‬
m
‭and used on the go.‬

‭●‬ ‭Wearable computers, such as smartwatches, are becoming increasingly‬


‭ opular as they allow users to access information and control devices without‬
p
‭needing to take out their mobile phone.‬

‭●‬ ‭Microprocessors/single board computers are often used for embedded‬

‭Notes by @uzayermasud‬
‭systems, such as in cars or appliances, where compact size is important.‬

‭Performance‬

‭●‬ ‭High performance is important for devices that need to process large‬
‭amounts of data quickly, such as computers and supercomputers.‬

‭●‬ ‭Games consoles are also designed for high performance, with powerful‬
‭processors and graphics cards to handle demanding games.‬

‭●‬ ‭Microprocessors/single board computers are often used for specific tasks that‬
‭require high processing power, such as in robotics or data processing.‬

‭Storage‬

‭●‬ ‭All contemporary digital devices have some form of storage, such as hard‬
‭drives, solid-state drives, or removable storage media.‬

‭●‬ ‭Network-attached storage (NAS) is a type of storage that can be accessed by‬
‭ ultiple devices over a network. This allows for easy sharing of files and‬
m
‭resources.‬

‭●‬ ‭RAID storage is a type of storage that uses multiple hard drives to protect‬
‭against data loss in case of a drive failure.‬

‭User interface‬

‭●‬ ‭The user interface of a digital device refers to how the user interacts with the‬
‭ evice. This includes input devices, such as keyboards and touch screens,‬
d
‭and output devices, such as monitors and speakers.‬

‭●‬ ‭The design of the user interface is an important consideration for‬


‭manufacturers, as it can affect the usability of the device.‬

‭●‬ ‭Some devices, such as biometric scanners and barcode readers, provide‬
‭additional input methods for secure authentication or data input.‬

‭Connectivity‬

‭●‬ ‭Connectivity is important for allowing devices to share data and resources.‬
‭ his can be done through cables, such as USB and HDMI, or wirelessly using‬
T
‭Wi-Fi, Bluetooth, or other wireless standards.‬

‭●‬ ‭Devices such as printers and scanners often have multiple connectivity‬
‭options to make it easier for users to connect to them.‬

‭●‬ ‭Some devices, such as microprocessors/single board computers (Raspberry‬


‭Pi, Arduino), can be connected to sensors and other devices to allow for data‬

‭Notes by @uzayermasud‬
‭collection and processing.‬

‭Media support‬

‭●‬ ‭Contemporary digital devices support a wide range of media formats,‬


‭including audio, video, and images.‬

‭●‬ ‭Some devices, such as cameras and scanners, are specifically designed for‬
‭capturing media.‬

‭●‬ ‭Other devices, such as smart TVs and games consoles, are designed to‬
‭display high-quality video and graphics.‬

‭Energy consumption‬

‭●‬ ‭Energy consumption is an important point to consider for manufacturers, as‬


‭it affects the cost of running the device and its impact on the environment.‬

‭●‬ ‭Mobile phones and tablets often have batteries that can be recharged, while‬
‭other devices are designed to be always plugged in.‬

‭●‬ ‭Some devices, such as smart thermostats, are designed to be‬


‭energy-efficient to reduce their impact on the environment.‬

‭Expansion capability‬

‭●‬ ‭Some devices, such as computers and microprocessors/single board‬


‭ omputers, have expansion slots for adding additional hardware, such as‬
c
‭graphics cards or network cards.‬

‭●‬ ‭Network-attached storage (NAS) can be expanded by adding additional hard‬


‭drives to increase storage capacity.‬

‭●‬ ‭Other devices, such as printers and scanners, can be expanded by adding‬
‭additional trays or modules to allow for more functionality.‬

‭Security features‬

‭●‬ ‭Security is an important consideration for many digital devices, especially‬


‭those that store sensitive information or are used for secure transactions.‬

‭●‬ ‭Devices such as biometric scanners and chip and pin devices provide secure‬
‭authentication to prevent unauthorised access.‬

‭●‬ ‭RAID storage provides redundancy and protects against data loss in case of a‬
‭drive failure.‬

‭Primary Storage:‬

‭Notes by @uzayermasud‬
‭RAM (Random Access Memory)‬

-‭ ‬ F ‭ ast, quickly accessible‬


‭-‬ ‭volatile (loses data when power turned off)‬
‭-‬ ‭Usually low storage capacity compared to secondary storage.‬

‭ROM (Read Only Memory):‬


‭-‬ ‭Fast‬
‭-‬ ‭Can be read from but not written to‬
‭-‬ ‭Holds BIOS/firmware which is needed to load the Operating System (OS)‬

‭Types:‬
‭-‬ ‭PROM (Programmable ROM)‬
‭-‬ ‭EPROM (Erasable Programmable ROM)‬
‭-‬ ‭EEPROM (Electrically Erasable Programmable ROM)‬

‭Cache:‬
‭-‬ ‭L1, L2, and L3 caches inside processor‬
‭-‬ ‭Very fast memory‬
‭-‬ ‭Very expensive‬
‭-‬ ‭L1 is fastest, L3 is slowest‬
‭-‬ ‭Store most frequently accessed data‬

‭Processors:‬
‭-‬ ‭x86 Architecture most common (Intel and AMD processors)‬
‭-‬ ‭High performance‬
‭-‬ ‭Upgradeable parts‬
‭-‬ ‭Relatively old‬
‭-‬ ‭Used in desktops and laptops‬

‭-‬ ‭ARM architecture is SoC (System on Chip) (Snapdragon, Apple M1)‬


‭-‬ ‭Relatively lower performance‬
‭-‬ ‭More efficient‬
‭-‬ ‭Everything in one chip‬
‭-‬ ‭Newer‬
‭-‬ ‭Not upgradeable‬

‭-‬ ‭Performance‬
‭-‬ ‭More cores‬
‭-‬ ‭Faster clock speed‬
‭-‬ ‭More cache‬

‭Storage Devices‬

‭Magnetic Tape:‬
‭-‬ ‭Magnetised bits of tape‬
‭-‬ ‭Very high capacity‬

‭Notes by @uzayermasud‬
-‭ ‬ V‭ ery cheap‬
‭-‬ ‭Very slow read/write speeds‬

‭Optical Hard Drives:‬


‭-‬ ‭Moving disks have magnetised bits that are read/written by a head‬
‭-‬ ‭High storage capacity (1-32 TB)‬
‭-‬ ‭Inexpensive‬
‭-‬ ‭Slow read/write speeds‬
‭-‬ ‭May be damaged by shock‬
‭-‬ ‭Large magnet can erase all data on it‬

‭Solid State Drives:‬


‭-‬ ‭Very fast read/write speeds‬
‭-‬ ‭Expensive‬
‭-‬ ‭No moving parts so resistant to damage‬
‭-‬ ‭Low power‬
‭-‬ ‭Relatively low storage capacity‬

‭Removable Solid State (SSID) Cards - SD Cards:‬


‭-‬ ‭Mid price range‬
‭-‬ ‭Very small and portable‬
‭-‬ ‭Used in phones and cameras as expandable storage‬
‭-‬ ‭Low power, medium capacity‬

‭Network Attached Storage (NAS):‬


‭-‬ ‭Normal storage devices connected to a network‬
‭-‬ ‭Remotely accessible‬
‭-‬ ‭Susceptible to network failure‬

‭RAID Storage:‬
‭-‬ ‭Replicate data over multiple drives‬
‭-‬ ‭Increases data reliability and I/O performance‬

‭Cables‬

‭●‬ ‭HDMI (High Definition Multimedia Interface): capable of transmitting audio‬


‭ nd video signals at high speeds of up to 18 Gbps, making it ideal for‬
a
‭high-definition multimedia content such as 4K and 8K video.‬

‭●‬ ‭USB (Universal Serial Bus): a versatile interface that can transfer data at‬
‭ peeds of up to 10 Gbps (USB 3.2 Gen 2x2), with backwards compatibility to‬
s
‭older USB versions.‬

‭●‬ ‭Ethernet: a wired network technology that can transmit data at speeds of up‬
t‭ o 10 Gbps (10GBASE-T), with faster speeds of up to 40 Gbps and 100 Gbps‬
‭available for enterprise-level networking.‬

‭●‬ ‭DisplayPort: a video interface that can transmit audio and video signals at‬

‭Notes by @uzayermasud‬
‭ igh speeds of up to 32.4 Gbps (DisplayPort 2.0), making it ideal for‬
h
‭high-resolution displays and gaming.‬

‭●‬ ‭Thunderbolt: a high-speed interface developed by Intel that can transfer data‬
‭ t speeds of up to 40 Gbps (Thunderbolt 3), with support for multiple‬
a
‭protocols such as USB, DisplayPort, and PCIe.‬

‭ ote that the speeds listed above are theoretical maximums and actual data‬
N
‭transfer rates may be lower depending on various factors such as‬‭cable length,‬
‭device compatibility, and signal interference‬‭.‬

‭ .1.2 Understand the technologies used by digital devices and how they‬
1
‭impact on the design and uses of devices:‬

‭Global Positioning System (GPS)‬

‭ llows devices to determine their location and track movements, enabling‬


a
‭applications such as navigation, location-based services, and geotagging.‬

‭Biometrics‬

‭ nables devices to recognise and authenticate users based on physical‬


e
‭characteristics such as fingerprints, iris, face or voice, improving security and‬
‭convenience for access control and payment systems.‬

‭Touchscreen‬

‭ llows users to interact with devices through touch, simplifying user interface‬
a
‭design and enabling new forms of interaction such as pinch-to-zoom and swipe‬
‭gestures.‬

‭Sensor‬

‭ rovides devices with the ability to detect and respond to changes in their‬
p
‭environment, such as movement, light, temperature, and pressure, enabling‬
‭features such as automatic screen rotation, ambient light adjustment, and fitness‬
‭tracking.‬

‭Memory‬

‭ nables devices to store and retrieve data quickly and efficiently, improving‬
e
‭performance and enabling features such as multitasking and fast app switching.‬

‭Storage‬

‭ rovides devices with the ability to store large amounts of data, such as‬
p
‭documents, music, and videos, enabling users to access their content on-the-go.‬

‭Battery power‬

‭Notes by @uzayermasud‬
‭ rovides devices with the ability to operate untethered from a power source,‬
p
‭enabling mobility and convenience, while advances in battery technology have led‬
‭to longer battery life and faster charging times.‬

‭Miniaturisation‬

‭ nables devices to become smaller and more portable, while maintaining or‬
e
‭improving their performance and functionality.‬

‭Processor‬

‭ rovides devices with the computing power to perform complex tasks, such as‬
p
‭running applications, processing images, and playing games, while advances in‬
‭processor technology have led to faster performance and improved energy‬
‭efficiency.‬

‭Radio-frequency identification (RFID)‬

‭ nables devices to identify and track objects using radio waves, enabling‬
e
‭applications such as inventory management, contactless payment, and access‬
‭control.‬

‭●‬ R
‭ FID stands for radio-frequency identification, and it uses radio waves to‬
‭automatically identify and track objects.‬

‭●‬ A
‭ n RFID system consists of a reader and a tag. The reader sends out a radio‬
‭signal that powers up the tag, allowing it to send back its unique‬
‭identification number.‬

‭●‬ R
‭ FID tags can be either passive, meaning they don't have a power source‬
‭and are powered by the reader's signal, or active, meaning they have a‬

‭Notes by @uzayermasud‬
‭built-in battery and can transmit their signal over longer distances.‬

‭●‬ I‭ t is used in a variety of applications, such as inventory management, supply‬


‭chain tracking, and access control.‬

‭●‬ R
‭ FID tags can be attached to a wide range of objects, including products,‬
‭vehicles, and even people or animals.‬

‭●‬ I‭ n retail, RFID can be used to track inventory in real-time, reducing‬


‭out-of-stock situations and increasing sales.‬

‭●‬ I‭ n logistics and supply chain management, RFID can help track the‬
‭movement of goods through the supply chain, improving efficiency and‬
‭reducing errors.‬

‭●‬ I‭ n healthcare, RFID can be used to track medical equipment and supplies,‬
‭monitor patients, and improve patient safety.‬

‭●‬ I‭ n access control, RFID can be used to grant or restrict access to buildings,‬
‭rooms, and equipment.‬

‭ verall, RFID provides a reliable, efficient, and cost-effective way to track and‬
O
‭manage objects, improving business operations and enhancing customer‬
‭experiences.‬

‭Near-field communication (NFC):‬

‭ nables devices to exchange data wirelessly over short distances, enabling‬


e
‭applications such as mobile payments, transit ticketing, and data transfer between‬
‭devices.‬

‭How NFC Works:‬

‭●‬ ‭NFC (Near Field Communication) is a wireless communication technology that‬


‭ llows two devices to communicate when they are placed in close proximity‬
a
‭to each other.‬

‭●‬ ‭NFC uses magnetic field induction to transmit data between devices.‬

‭●‬ ‭NFC operates at a frequency of 13.56 MHz and has a range of about 4‬
‭centimetres.‬

‭●‬ ‭NFC works by modulating a magnetic field to transmit data between two‬
‭devices. It can transmit encrypted data.‬

‭Applications:‬

‭●‬ ‭NFC is commonly used for contactless payments, allowing users to make‬

‭Notes by @uzayermasud‬
‭ urchases by tapping their smartphone or other NFC-enabled device against‬
p
‭a payment terminal.‬

‭●‬ ‭NFC can also be used for data transfer between two devices. For example,‬
‭ sers can transfer photos, videos, and other files between smartphones or‬
u
‭other devices using NFC.‬

‭●‬ ‭NFC is used in access control systems to allow users to gain entry to a‬
‭ uilding or secure area by tapping an NFC-enabled card or device against a‬
b
‭reader.‬

‭●‬ ‭NFC tags can be used to provide information to users, such as directions or‬
‭ roduct information. Users can tap their smartphone against an NFC tag to‬
p
‭access this information.‬

‭●‬ ‭NFC can be used in transportation systems to allow users to pay for fares or‬
‭access information about schedules and routes using an NFC-enabled device.‬

‭●‬ ‭NFC can be used in healthcare systems to manage patient information and‬
‭provide access to medical records using an NFC-enabled device.‬

‭Quick response (QR) code:‬

‭ nables devices to quickly and easily access information by scanning a code using‬
e
‭their camera, enabling applications such as marketing, advertising, and‬
‭authentication.‬

‭How QR Codes Work:‬

‭Notes by @uzayermasud‬
‭●‬ ‭QR codes (Quick Response codes) are two-dimensional barcodes that can be‬
‭scanned using a smartphone or other mobile device.‬

‭●‬ ‭QR codes are made up of black and white squares arranged in a specific‬
‭pattern.‬

‭●‬ ‭When a QR code is scanned, the device uses its camera to capture the‬
‭pattern and then decodes the information contained in the code.‬

‭●‬ ‭QR codes can contain various types of information, such as website‬
‭URLs, contact information, product information, and more.‬

‭●‬ ‭QR codes have:‬

‭○‬ ‭URLs‬

‭○‬ ‭Alignment Markers‬

‭○‬ ‭Position Markers‬

‭○‬ ‭QR Code version‬

‭○‬ ‭Date/Time Info‬

‭○‬

‭Applications:packag‬

‭●‬ ‭commonly used in marketing and advertising to provide additional‬


i‭nformation to consumers. For example, a QR code on a product packaging‬
‭can be scanned to provide product details, user reviews, or promotional‬
‭offers.‬

‭●‬ ‭ticketing systems, such as for airline or event tickets. Users can scan a QR‬
‭code to access their ticket information.‬

‭●‬ ‭payment systems to allow users to make payments by scanning a code with‬
‭their smartphone or other device.‬

‭●‬ ‭inventory management to track and manage products. QR codes can be‬
‭printed on product labels or packaging to help identify and track items.‬

‭●‬ ‭education to provide students with additional information or resources. For‬


‭ xample, a QR code on a textbook can be scanned to access interactive‬
e
‭content or study materials.‬

‭●‬ ‭used in contact tracing during the COVID-19 pandemic. Users can scan a QR‬
‭code when entering a public space or event to help track potential exposure‬

‭Notes by @uzayermasud‬
‭to the virus.‬

‭Connectivity:‬

‭ nables devices to connect to the internet and other devices, enabling features such‬
e
‭as messaging, social networking, cloud storage, and remote access. Advances in‬
‭connectivity technology have led to faster speeds, greater coverage, and improved‬
‭reliability.‬

‭ .1.3 Understand the term ‘technological convergence’ in the context of‬


1
‭digital devices.‬

‭ hen two or more separate technologies/devices merge into one. For example,‬
W
‭smartphones can do most things a laptop can and it is more portable.‬

‭ nother example would be gaming consoles evolving beyond just games and now‬
A
‭including streaming services like Netflix and Spotify.‬

‭ mart watches not only tell the time but have taken the jobs of health monitoring‬
S
‭systems.‬

‭ .1.4 Understand the concept of and the need for features and functions of‬
1
‭embedded systems.‬

‭Embedded systems:‬

‭Concept of Embedded Systems:‬

‭ n embedded system is a computer system designed to perform a specific function‬


A
‭within a larger system or product.‬

I‭ t is typically a combination of hardware and software components that work‬


‭together to accomplish a specific task.‬

‭ xamples of embedded systems include smart home devices, medical equipment,‬


E
‭automotive systems, and industrial machinery.‬

‭Need for Features and Functions:‬

‭ mbedded systems must be designed to meet specific requirements and‬


E
‭constraints, such as power consumption, size, and cost.‬

‭ hey often have limited resources, such as memory, processing power, and‬
T
‭input/output capabilities.‬

‭ herefore, the features and functions of embedded systems must be carefully‬


T
‭chosen and optimised to meet the requirements while operating within the resource‬
‭constraints.‬

‭The features and functions of embedded systems can vary widely, depending on the‬

‭Notes by @uzayermasud‬
‭ pplication, but may include sensing, actuating, processing, communication, and‬
a
‭control.‬

I‭ n addition, the reliability and safety of embedded systems are critical, particularly‬
‭in applications such as medical devices and automotive systems.‬

‭Pros:‬

‭●‬ E
‭ mbedded systems are highly specialised and can be optimised for specific‬
‭tasks, resulting in high performance and efficiency.‬

‭●‬ T
‭ hey can operate in real-time, providing fast and accurate responses to‬
‭external events and inputs.‬

‭●‬ ‭Embedded systems are often designed to be low-power, making them‬


‭suitable for use in battery-powered or energy-efficient devices.‬

‭●‬ ‭They can be highly reliable and secure, with built-in safety features and‬
‭protection against cyber threats.‬

‭Cons:‬

‭●‬ ‭The highly specialised nature of embedded systems can make them‬
‭expensive to develop and maintain.‬

‭●‬ ‭They can be challenging to debug and troubleshoot, especially in complex‬


‭systems where multiple components interact with each other.‬

‭●‬ ‭The limited resources of embedded systems can result in trade-offs between‬
‭performance, features, and cost.‬

‭●‬ ‭The custom nature of embedded systems can make it difficult to update or‬
‭ pgrade them over time, which can lead to compatibility issues and‬
u
‭obsolescence.‬

‭ .1.5 Understand the concept of and the need for firmware, including‬
1
‭where it is stored.‬

‭Concept of Firmware‬

‭●‬ ‭Firmware is a type of software that is embedded in hardware devices, such‬


‭as microcontrollers and system-on-chips (SoC)‬

‭●‬ ‭It provides low-level control of the device's hardware components and‬
‭interfaces with other software components to perform specific tasks‬

‭Need for Firmware‬

‭Notes by @uzayermasud‬
‭●‬ ‭Firmware is critical for the proper functioning of many hardware devices,‬
‭providing the necessary control and management of the device's components‬

‭●‬ ‭It is often responsible for booting up the device and‬‭performing‬


i‭nitialization routines‬‭, as well as‬‭managing memory‬‭,‬‭communication‬
‭interfaces‬‭, and‬‭other hardware components‬

‭●‬ ‭Firmware is also necessary for enabling the device to interact with other‬
‭software components, such as drivers and operating systems‬

‭●‬ ‭In addition, firmware can provide‬‭security features‬‭,‬‭such as encryption and‬


‭ uthentication, to protect the device from unauthorised access and‬
a
‭tampering‬

‭Where Firmware is Stored‬

‭●‬ ‭Firmware is typically stored in non-volatile memory (ROM), which allows it to‬
‭be retained even when power is turned off.‬

‭●‬ ‭The specific location of the firmware can vary depending on the device and‬
i‭ts architecture, but it is often stored in on-chip memory, flash memory, or‬
‭external storage devices, such as EEPROM or SD cards.‬

‭●‬ ‭In some cases, firmware can be updated or modified after the device has‬
‭ een manufactured, either through a physical interface or wirelessly via a‬
b
‭network connection.‬

‭ .1.6 Understand factors that can be used to assess the performance of‬
1
‭digital devices:‬

‭Speed:‬

‭●‬ ‭Refers to the rate at which a device can complete tasks and process data‬

‭●‬ ‭Measured in units such as GHz, Mbps, and FPS‬

‭●‬ E
‭ xample: A computer with a higher processor speed can run applications‬
‭faster than a computer with a lower processor speed.‬

‭Capacity:‬

‭●‬ ‭Refers to the amount of data that a device can store and process‬

‭●‬ ‭Measured in units such as GB, TB‬

‭●‬ E
‭ xample: A hard drive with a larger capacity can store more data than a hard‬
‭drive with a smaller capacity.‬

‭Portability:‬

‭Notes by @uzayermasud‬
‭●‬ ‭Refers to how easily a device can be transported from one place to another‬

‭●‬ ‭Factors that affect portability include weight, size, and durability‬

‭●‬ ‭Example: A smartphone is more portable than a desktop computer.‬

‭Bandwidth:‬

‭●‬ R
‭ efers to the amount of data that can be transferred over a network‬
‭connection in a given amount of time‬

‭●‬ ‭Measured in units such as Mbps and Gbps‬

‭●‬ E
‭ xample: A device with a higher bandwidth can download files from the‬
‭internet faster than a device with a lower bandwidth.‬

‭Power efficiency:‬

‭●‬ ‭Refers to how efficiently a device uses energy to perform its functions‬

‭●‬ ‭Measured in units such as watts and volts‬

‭●‬ E
‭ xample: A laptop with a more power-efficient processor can operate for‬
‭longer on battery power than a laptop with a less power-efficient processor.‬

‭1.1.7 Be able to calculate data file size and time needed to transmit a file.‬

‭Same as IGCSE Computer Science‬

1.2.3 Calculating File Sizes - Revise GCSE Computer Science

‭Grayscale (black and white):‬

‭images uses one byte per pixel (a byte being 8 bits).‬

‭‬ E
● ‭ ight bits means that a byte can store up to 256 levels of information.‬
‭●‬ ‭We can therefore store up to 256 levels of brightness per pixel – which gives‬
‭us what is called ‘8-bit grayscale’.‬

‭Calculating image sizes:‬

‭●‬ I‭ f we need to calculate the storage requirements of a black and white bitmap‬
‭image, we multiply the number of pixels wide by the number of pixels high.‬
‭●‬ ‭The answer will give us the number of bits.‬
‭●‬ ‭We then convert the number into an appropriate unit (kilobytes/megabytes).‬

‭Example: 800 by 900 resolution grayscale image size‬

‭Notes by @uzayermasud‬
‭800‬‭‬ * ‭‬‭900‬‭‬ = ‭‭7
‬ 20‬, ‭000‬‭‬‭𝑏𝑖𝑡𝑠‬

‭720‬, ‭000‬‭‬‭/‬‭‭8
‬ ‬‭‬ = ‭‬‭90‬, ‭000‬‭‬‭𝑏𝑦𝑡𝑒𝑠‬

‭90‬, ‭000‬‭‬‭/‬‭‭1
‬ 000‬‭‬ = ‭‬‭90‬‭‭𝐾
‬ 𝐵‬

‭Colour depth is the number of bits used to represent‬‭each pixel.‬

‭‬ S
● ‭ ize in bits = W × H × D‬
‭●‬ ‭Size in bytes = W × H × D/8‬
‭●‬ ‭W = image width, H = image height, D = colour depth in bits.‬

‭Sound‬

‭Sampling‬

‭●‬ B
‭ it depth defines the dynamic range of the sound – the amplitude (volume)‬
‭of the waveform at each sample point.‬

‭●‬ Q
‭ uantisation is the name of the audio snapshot when it has to be rounded off‬
‭to the nearest available digital value.‬

‭●‬ S
‭ ample rates are measured in hertz (Hz) or thousands of hertz (kHz,‬
‭kilohertz). For example, 44.1 kHz is equal to 44,100 samples of audio‬
‭recorded every second.‬

‭●‬ T
‭ he sample rate you choose depends on what the audio is going to be used‬
‭for. If you wanted to record a song to put on a CD you would usually use‬
‭44.1 kHz.‬

‭Calculation‬

‭●‬ W
‭ e can calculate sound file sizes based on the sample rate and the sample‬
‭resolution using the following formula:‬‭File size‬‭(bits) = rate × res × secs‬

‭●‬ ‭If we want 30 seconds of mono sound, where the sample rate is 44,100 Hz‬
‭ nd the sample resolution is 8 bits, we will have:‬
a

(‭44100‬‭‬‭×‬‭‭8
‬ ‬‭‭×
‬ ‬‭‬‭30‬)‭/(‬ ‭8‭‬‬‭×‭‬‬‭1000‬)

‭[divided by 8 as we have 8 bits in a byte and 1000 to get kB]‬

‭= 1323 KfB‬

‭= 1.323 MB‬

‭• The size of 30 seconds of stereo sound would be:‬

(‭44100‬‭‬‭×‬‭‭8
‬ ‬‭‭×
‬ ‬‭‬‭2‭‬‬‭×‭‬‬‭30‬)‭/‬(‭8‭‬‬‭×‭‬‬‭1000‬)‭‬ = ‭‬‭2646‬‭‬‭𝑘𝐵‬‭‬ = ‭‭2
‬ ‬. ‭6‬‭‭𝑀
‬ 𝐵‬

‭Notes by @uzayermasud‬
‭ .1.8 Be able to use and convert between binary and denary, as defined by‬
1
‭the International Electrotechnical Commission (IEC). (These are different‬
‭from SI units.)‬

‭IEC Binary vs SI Units‬

‭Understand the difference between binary and denary units:‬

‭●‬ ‭Binary units are based on powers of two (e.g. 2^0, 2^1, 2^2, etc.), and are‬
‭commonly used in computing and digital electronics.‬

‭●‬ ‭Denary units, also known as decimal units, are based on powers of ten (e.g.‬
‭10^0, 10^1, 10^2, etc.), and are commonly used in everyday life.‬

‭Know the IEC prefixes for binary units:‬

‭10‬
‭ ibibyte (KiB)‬ ‭2‬
K
‭bytes‬
‭20‬
‭ ebibyte (MiB)‬‭‬‭2‬
M
‭bytes‬
‭30‬
‭ ibibyte (GiB)‬‭2‬
G
‭bytes‬
‭40‬
‭ ebibyte (TiB)‬‭2‬
T
‭bytes‬

‭Understand the difference between IEC and SI prefixes:‬

‭●‬ ‭The International System of Units (SI) uses decimal prefixes, such as kilo-,‬
‭mega-, and giga-.‬

‭●‬ ‭The IEC uses binary prefixes, such as kibi-, mebi-, and gibi-.‬

‭●‬ ‭This means that the size of a kibibyte is 1024 bytes, whereas the size‬
‭of a kilobyte in SI units is 1000 bytes.‬

‭3‬
‭Kilobyte (KB)‬‭1‬‭0‬ ‭bytes‬
‭6‬
‭ egabyte (MB)‬‭1‬‭0‬
M
‭bytes‬

‭Notes by @uzayermasud‬
‭9‬
‭Gigabyte (GB)‬‭1‬‭0‬ ‭bytes‬
‭12‬
‭ erabyte (TB)‬‭1‬‭0‬
T
‭bytes‬

‭Use conversion factors to convert between binary and denary units:‬

‭●‬ ‭To convert from binary to denary units, multiply the binary value by the‬
‭ ppropriate power of two (e.g. 2^10 for kilobytes, 2^20 for megabytes,‬
a
‭etc.).‬

‭●‬ ‭To convert from denary to binary units, divide the denary value by the‬
‭ ppropriate power of two and round down to the nearest integer (e.g. divide‬
a
‭by 1024 for kilobytes, 1,048,576 for megabytes, etc.).‬

‭Be aware of potential confusion and use the correct units:‬

‭●‬ ‭In everyday use, kilobytes, megabytes, and gigabytes are often used to refer‬
‭to both binary and denary units, which can cause confusion.‬

‭●‬ ‭To avoid confusion, use the correct units for the context:‬
‭○‬ ‭such as kibibytes, mebibytes, and gibibytes for binary units‬

‭○‬ ‭kilobytes, megabytes, and gigabytes for denary units.‬

‭ .1.9 Be able to select digital devices to meet the needs and requirements‬
1
‭of individuals and organisations.‬

‭ omes up in questions often, usually with no correct answer. They just want you to‬
C
‭talk about the pros and cons of things.‬

‭1.2 Software‬

‭1.2.1 Understand the purpose of:‬

‭‬ S
● ‭ ystems software‬
‭●‬ ‭Applications software.‬

‭Application software:‬

‭●‬ ‭Application software is designed for specific tasks or functions, such as word‬
‭processing, photo editing, or accounting.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Application software can be purchased or downloaded by users to perform‬
‭specific tasks or functions.‬

‭●‬ ‭Application software is designed to be user-friendly and easy to use, with‬


‭intuitive interfaces and features that make it easy to perform specific tasks.‬

‭●‬ ‭Application software can be customised and configured to meet the specific‬
‭needs of individual users or organisations.‬

‭●‬ ‭Examples of application software include Microsoft Word, Adobe Photoshop,‬


‭and QuickBooks.‬

‭System software:‬

‭●‬ ‭System software is designed to manage and control the operation of the‬
‭computer system.‬

‭●‬ ‭System software is essential for the proper functioning of the computer‬
‭system, and includes operating systems, device drivers, and utility programs.‬

‭●‬ ‭Operating systems are the most important type of system software,‬
‭ roviding the interface between the hardware and the user, and managing‬
p
‭resources such as memory, storage, and processing power.‬

‭●‬ ‭Device drivers are used to control hardware devices such as printers,‬
‭scanners, and cameras, allowing them to be used with the computer system.‬

‭●‬ ‭Utility programs are used to perform specific tasks such as file compression,‬
‭disk cleanup, and virus scanning.‬

‭●‬ ‭System software is typically installed by the manufacturer or system‬


‭ dministrator and is not typically customised or configured by individual‬
a
‭users.‬

‭●‬ ‭Examples of system software include Microsoft Windows, MacOS, and Linux.‬
‭1.2.2 Understand the role of the operating system in managing:‬

‭‬
● ‭ evices‬
d
‭●‬ ‭processes‬
‭●‬ ‭users‬
‭●‬ ‭security‬

‭Devices:‬

‭●‬ ‭The operating system manages the interaction between the computer‬
‭hardware and software.‬

‭Notes by @uzayermasud‬
‭●‬ ‭The operating system communicates with device drivers to control input and‬
‭output operations for devices such as keyboards, mice, and printers.‬

‭●‬ ‭The operating system also manages the connection and configuration of‬
‭hardware devices such as external hard drives and USB devices.‬

‭Processes:‬

‭●‬ ‭The operating system is responsible for managing the allocation of system‬
‭resources to different processes.‬

‭●‬ ‭The operating system manages the scheduling of processes and ensures that‬
‭they have access to the CPU and memory when needed.‬

‭●‬ ‭The operating system also monitors and manages the use of system‬
r‭ esources to prevent conflicts and ensure the smooth operation of the‬
‭system.‬

‭Users:‬

‭●‬ ‭The operating system provides a platform for users to interact with the‬
‭computer system.‬

‭●‬ ‭The operating system manages user accounts and permissions, ensuring that‬
‭users only have access to the resources they are authorised to use.‬

‭●‬ ‭The operating system also provides a graphical user interface (GUI) that‬
‭allows users to interact with the computer system in a user-friendly way.‬

‭Security:‬

‭●‬ ‭The operating system provides a range of security features to protect the‬
‭computer system from unauthorised access and malicious software.‬

‭●‬ ‭The operating system manages user authentication and access control,‬
‭ensuring that only authorised users have access to the system.‬

‭●‬ ‭The operating system also provides security features such as firewalls,‬
‭ ntivirus software, and encryption to protect the system from external‬
a
‭threats.‬

‭●‬ ‭The operating system monitors system activity and logs events, allowing‬
‭administrators to detect and respond to security breaches and other issues.‬

‭1.2.3 Understand the different sources of software and copyright types:‬

‭Notes by @uzayermasud‬
‭‬
● f‭ree‬
‭●‬ ‭open-source‬
‭●‬ ‭proprietary‬
‭●‬ ‭creative commons.‬

‭Sources of Software:‬

‭●‬ ‭Free Software:‬‭Software that can be used, modified,‬‭and distributed freely‬


‭ ithout any restrictions. Examples include the GNU/Linux operating system‬
w
‭and the Apache web server.‬

‭●‬ ‭Open Source Software:‬‭Software that is available for‬‭free and provides‬


‭ ccess to the source code, allowing users to modify and distribute it.‬
a
‭Examples include the Firefox web browser and the MySQL database.‬

‭●‬ ‭Proprietary Software:‬‭Software that is owned and licensed‬‭by a specific‬


‭ ompany, and its source code is usually not available. Examples include the‬
c
‭Microsoft Windows operating system and the Adobe Photoshop.‬

‭●‬ ‭Creative Commons Software:‬‭A type of software that‬‭is released under a‬


‭ reative Commons licence, which allows others to use, modify, and distribute‬
C
‭the software under certain conditions. Examples include the Creative‬
‭Commons licence for the Scratch programming language.‬

‭Copyright Types:‬

‭●‬ ‭Free:‬

‭●‬ ‭Allows users to access and use copyrighted material without cost.‬

‭●‬ ‭Examples include freeware, public domain, and some Creative‬


‭Commons licences.‬

‭●‬ ‭Open Source:‬

‭●‬ ‭Software whose source code is made available to the public for use‬
‭and modification.‬

‭●‬ ‭Generally requires attribution to original creators.‬

‭●‬ ‭Examples include Linux, Apache, and Mozilla Firefox.‬

‭●‬ ‭Proprietary:‬

‭●‬ ‭Refers to copyrighted material that is owned by a person or company‬


‭and is protected by law.‬

‭●‬ ‭Users must obtain permission to use or access the material.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Examples include Microsoft Office and Adobe Photoshop.‬

‭●‬ ‭Creative Commons:‬

‭●‬ ‭A set of licences that allows creators to share their work while‬
‭retaining some rights.‬

‭●‬ ‭Allows creators to choose the level of freedom they want to give to‬
‭others to use and modify their work.‬

‭●‬ ‭Examples include Attribution (acknowledgement), No Derivatives (no‬


‭ hanging), Public Domain (all rights released), Non-Commercial (no‬
c
‭selling) licences.‬

‭1.2.4 Understand licensing options:‬

‭Licensing Options:‬

‭Single User Licence:‬

‭This licence allows a single user to use the software on a single device or computer.‬

‭●‬ ‭Pros: Simple to manage and cost-effective for individuals or small‬


‭teams.‬

‭●‬ ‭Cons: May not be suitable for larger organisations, and may require‬
‭additional licences for additional devices or users.‬

‭Multiple User Licence:‬

‭ his licence allows multiple users to use the software on multiple devices or‬
T
‭computers, typically with a limit on the number of users or devices.‬

‭●‬ ‭Pros: Cost-effective for larger organisations, and easier to manage‬


‭than multiple single-user licences.‬

‭●‬ ‭Cons: May not be suitable for very large organisations or those with‬
‭fluctuating user/device needs.‬

‭Institutional Licence:‬

‭ his licence allows a group or organisation to use the software on multiple devices‬
T
‭or computers within the same institution, such as a school or business.‬

‭●‬ ‭Pros: Cost-effective for institutions with many users and devices, and‬
‭may provide centralised management options.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Cons: May not be suitable for very large or distributed organisations,‬
‭and may require additional licences for additional institutions.‬

‭Fixed Term Licence:‬

‭ his licence grants the user the right to use the software for a specified period of‬
T
‭time, after which the licence expires and the user must renew it to continue using‬
‭the software.‬

‭●‬ ‭Pros: May be cost-effective for short-term projects or temporary use,‬


‭ nd allows users to try out the software without committing to a‬
a
‭long-term licence.‬

‭●‬ ‭Cons: Can be more expensive in the long run for continued use, and‬
‭may require additional administrative effort for licence renewal.‬

‭Indefinite Licence:‬

‭ his licence grants the user the right to use the software indefinitely, without any‬
T
‭time limit or expiration date.‬

‭●‬ ‭Pros: Provides maximum flexibility and long-term cost-effectiveness‬


f‭or continued use, and may provide access to software updates and‬
‭support.‬

‭●‬ ‭Cons: Can be more expensive initially, and may require additional‬
‭administrative effort for licence management and updates.‬

‭Network License:‬

‭ his licence allows multiple users to access the software on a network, typically‬
T
‭with a limit on the number of simultaneous users.‬

‭●‬ ‭Pros: Cost-effective for larger organisations, and allows users to‬
‭access the software from multiple devices.‬

‭●‬ ‭Cons: May require additional setup and administrative effort for‬
‭network management, and may limit simultaneous user access.‬

‭ ote: There may be other types of licences available, such as subscription licences‬
N
‭or open source licences, but these are the main types commonly used in‬
‭commercial software.‬

‭1.2.5 Understand the purpose of, and how to manage, software updates:‬

‭‬
● ‭ atch‬
p
‭●‬ ‭automatic‬
‭●‬ ‭upgrade‬
‭●‬ ‭compatibility issues.‬

‭Notes by @uzayermasud‬
‭Purpose:‬

‭●‬ ‭Software updates are released to fix bugs, improve performance, and add‬
‭new features to existing software.‬

‭●‬ ‭Updates may also include security fixes to address vulnerabilities that could‬
‭be exploited by malicious people.‬

‭●‬ ‭In some cases, updates may be required to ensure compatibility with other‬
‭software or hardware.‬

‭Managing Software Updates:‬

‭●‬ ‭Software updates can be managed manually or automatically.‬

‭●‬ ‭Automatic updates‬‭are typically enabled by default‬‭in most operating‬


‭ ystems and applications, and will install updates as they become available‬
s
‭without any user intervention.‬

‭●‬ ‭Manual updates‬‭can be initiated by the user through‬‭the operating system‬


‭or application settings.‬

‭●‬ ‭Patches‬‭are a type of update that address specific‬‭issues or vulnerabilities in‬


‭the software. They can be installed manually or automatically.‬

‭●‬ ‭Upgrades‬‭are major releases of software that typically‬‭include significant‬


‭ ew features or functionality. Upgrades may require a separate purchase or‬
n
‭subscription.‬

‭●‬ ‭Compatibility issues‬‭can occur when updates are installed‬‭on systems or‬
‭ evices that are not compatible with the updated software. It's important to‬
d
‭check compatibility requirements before installing updates to avoid potential‬
‭issues.‬

‭Tips for managing software updates:‬

‭●‬ ‭Keep your operating system and applications up-to-date to ensure that you‬
‭have the latest security patches and features.‬

‭●‬ ‭Check for compatibility requirements before installing updates to avoid‬


‭potential issues.‬

‭●‬ ‭Back up important data before installing updates, in case something goes‬
‭wrong during the update process.‬

‭●‬ ‭Consider enabling automatic updates to ensure that you are always running‬
‭the latest version of the software.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Be cautious when installing updates from unknown sources, as they could‬
‭potentially contain malware or other security threats.‬

‭ .2.6 Be able to select software to meet the needs and requirements of‬
1
‭individuals and organisations.‬

‭Topic 2: Networks‬
‭ omputer networks are essential to most organisations, enabling them to access‬
C
‭their information irrespective of its geographical location; make efficient use of‬
‭hardware and software resources, and communicate effectively. Network design,‬
‭based on an understanding of protocols, is fundamental to the way networks work.‬
‭Such reliance on networks in our society is founded on the assumption that there‬
‭are mechanisms for securing access to them.‬

‭What students need to learn‬

‭2.1 Network models and protocols‬

‭2.1.1 Understand the features and functions of computer network models:‬

‭Client-server network model‬

‭●‬ ‭Features: In a client-server network model, there is a central server that‬


‭ anages and controls the network resources. Clients, or end-user devices,‬
m
‭connect to the server to access these resources.‬

‭●‬ ‭Functions: The server provides resources and services such as file storage,‬
‭email, and web hosting, while the clients request and use these resources.‬

‭●‬ ‭Examples: Corporate networks, email servers, and web servers.‬

‭●‬ ‭Pros: Centralised control, increased security, scalability, and easier‬


‭management.‬

‭●‬ ‭Cons: High cost, single point of failure, and high maintenance requirements.‬
‭Peer-to-peer network model‬

‭●‬ ‭Features: In a peer-to-peer network model, all devices are equal and can‬
f‭unction as both clients and servers. Each device shares its resources and‬
‭services with other devices on the network.‬

‭●‬ ‭Functions: Devices communicate and share resources with each other‬
‭without a central server.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Examples: File sharing networks, gaming networks, and social media.‬

‭●‬ ‭Pros: Low cost, easy setup, and no single point of failure.‬

‭●‬ ‭Cons: Security risks, limited scalability, and potential performance issues.‬
‭Ad hoc network model‬

‭●‬ ‭Features: In an ad hoc network model, devices connect directly to each other‬
‭ ithout the need for a central infrastructure. This type of network is often‬
w
‭used for temporary or emergency communications.‬

‭●‬ ‭Functions: Devices communicate and share resources with each other‬
‭without the need for a centralised server or infrastructure.‬

‭●‬ ‭Examples: Mobile device to mobile device connections, emergency response‬


‭networks.‬

‭●‬ ‭Pros: Easy setup, flexible and adaptable, and can be used in remote areas.‬

‭●‬ ‭Cons: Limited range, limited scalability, and potential security risks.‬
‭Tethering‬

‭●‬ ‭Features: Tethering involves using a mobile device's cellular data connection‬
t‭ o provide internet access to other devices. The tethered device acts as a‬
‭mobile hotspot, allowing other devices to connect to it and use its internet‬
‭connection.‬

‭●‬ ‭Functions: The tethered device shares its internet connection with other‬
‭devices.‬

‭●‬ ‭Examples: Using a smartphone as a hotspot for a laptop or tablet.‬

‭●‬ ‭Pros: Easy to set up, widely available, and can be used in areas without‬
‭Wi-Fi.‬

‭●‬ C
‭ ons: Limited range, limited bandwidth, and potential data usage restrictions‬
‭and additional costs from cellular providers.‬

‭ .1.2 Understand the features and purposes of network communication‬


2
‭protocols:‬

‭Wi-Fi‬

‭●‬ ‭Provides wireless access to the internet or a network‬

‭Notes by @uzayermasud‬
‭●‬ ‭Uses radio waves to transmit data between devices‬

‭●‬ ‭Allows multiple devices to connect simultaneously‬

‭●‬ ‭Use cases: internet browsing, file sharing, streaming media‬

‭●‬ ‭Example devices: smartphones, laptops, tablets, smart TVs, gaming‬


‭consoles, home assistants‬

‭ZigBee‬

‭●‬ ‭Designed for low-power, low-data-rate wireless communication‬

‭●‬ ‭Used for home automation and control systems‬

‭●‬ ‭Operates on a mesh network topology‬

‭●‬ ‭Use cases: home automation, industrial automation, smart energy‬

‭●‬ ‭Example devices: smart thermostats, home security systems, lighting‬


‭controls, industrial sensors‬

‭Bluetooth‬

‭●‬ ‭Provides short-range wireless communication between devices‬

‭●‬ ‭Low power consumption‬

‭●‬ ‭Allows devices to connect and communicate with each other‬

‭●‬ ‭Use cases: wireless audio, wearable devices, file sharing‬

‭●‬ ‭Example devices: wireless headphones, smartwatches, fitness trackers,‬


‭wireless speakers, computer peripherals‬

‭Cellular – Global System for Mobile (GSM) communications (3G/4G)‬

‭●‬ ‭Provides wireless communication over cellular networks‬

‭●‬ ‭Offers high-speed data transfer and global coverage‬

‭●‬ ‭Provides voice and data services‬

‭●‬ ‭Use cases: mobile communication, internet browsing, video conferencing‬

‭●‬ ‭Example devices: smartphones, tablets, mobile hotspots, smartwatches‬


‭Infrared‬

‭Notes by @uzayermasud‬
‭●‬ ‭Uses infrared light to transmit data between devices‬

‭●‬ ‭Requires line-of-sight between devices‬

‭●‬ ‭Provides short-range wireless communication‬

‭●‬ ‭Use cases: remote controls, data transfer between devices‬

‭●‬ ‭Example devices: TV remote controls, cameras, printers‬


‭Ethernet‬

‭●‬ ‭Provides wired connection between devices‬

‭●‬ ‭Offers high-speed data transfer‬

‭●‬ ‭Requires physical connection between devices‬

‭●‬ ‭Use cases: internet connectivity, file sharing, media streaming‬

‭●‬ ‭Example devices: desktop computers, servers, network-attached storage‬


‭(NAS) devices, gaming consoles‬

‭ .1.3 Understand the features, functions, and use of network standards‬


2
‭and protocols:‬

‭‬
● ‭ ransmission Control Protocol/ Internet Protocol (TCP/IP)‬
T
‭●‬ ‭Voice Over Internet Protocol (VOIP)‬
‭●‬ ‭Session Initiation Protocol (SIP)‬
‭●‬ ‭7-layer Open Systems Interconnection (OSI) Model‬

‭Transmission Control Protocol/ Internet Protocol (TCP/IP)‬

‭●‬ ‭A suite of communication protocols used to connect devices on the internet‬

‭●‬ ‭Provides reliable, ordered, and error-checked delivery of packets‬

‭●‬ ‭Handles routing of data between networks and includes addressing schemes‬
‭to identify and locate devices‬

‭●‬ ‭Enables end-to-end communication across the internet‬


‭Voice Over Internet Protocol (VOIP)‬

‭●‬ ‭Technology that enables voice communication over internet protocol (IP)‬
‭networks‬

‭Notes by @uzayermasud‬
‭●‬ ‭Transforms analog voice signals into digital data that can be transmitted over‬
‭the internet‬

‭●‬ ‭Allows for cost-effective and efficient communication, especially for‬


‭long-distance or international calls‬

‭●‬ ‭Includes features such as call waiting, voicemail, and conference calling‬
‭Session Initiation Protocol (SIP)‬

‭●‬ ‭A signalling protocol used to initiate, maintain, and terminate real-time‬


‭ essions that involve video, voice, messaging, and other communications‬
s
‭applications and services between two or more endpoints on IP networks‬

‭●‬ ‭Enables users to establish and manage communications sessions such as‬
‭voice and video calls, and conference calls‬

‭●‬ ‭Uses text-based messages to negotiate and establish sessions‬

‭●‬ ‭Supports features such as call forwarding, call waiting, and call hold‬
‭7-layer OSI Model‬

‭●‬ ‭A conceptual framework for understanding and describing network‬


‭communication‬

‭●‬ ‭Consists of seven layers, each with its own set of protocols and functions‬

‭●‬ ‭The layers are: physical, data link, network, transport, session, presentation,‬
‭and application‬

‭●‬ ‭Each layer provides services to the layer above it and uses services provided‬
‭by the layer below it‬

‭●‬ ‭Enables communication between different types of hardware and software‬

‭2.2 Network design and implementation‬

‭ .2.1 Understand the characteristics of different network transmission‬


2
‭media:‬

‭Wireless‬

‭●‬ ‭Microwave:‬‭used for long-distance, point-to-point‬‭communication such as‬


‭ atellite communication and cellular networks. Example: satellite TV‬
s
‭transmission.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Radio:‬‭used for short-range communication such as Wi-Fi and Bluetooth.‬
‭Example: streaming music from a smartphone to a speaker.‬

‭●‬ ‭Light:‬‭used for high-speed, short-range communication‬‭such as infrared (IR)‬


‭ nd visible light communication (VLC). Example: using a TV remote control‬
a
‭to change channels.‬

‭●‬ ‭Satellite:‬‭used for long-distance, satellite-to-satellite‬‭or satellite-to-ground‬


‭ ommunication such as GPS and satellite internet. Example: using GPS to‬
c
‭navigate in a car.‬

‭Wired‬

‭●‬ ‭Copper-twisted pair and cable:‬‭used for short to medium-range‬


‭ ommunication such as Ethernet and telephone lines. Example: connecting a‬
c
‭computer to a router with an Ethernet cable.‬

‭●‬ ‭Fibre optics:‬‭used for high-speed, long-range communication‬‭such as‬


i‭nternet backbone networks and cable television. Example: streaming 4K‬
‭video over a fibre-optic internet connection.‬

‭●‬ ‭Powerline:‬‭uses existing electrical wiring to transmit‬‭data over short‬


‭ istances, typically in a home or office environment. Example: connecting a‬
d
‭smart TV to the internet using powerline adapters.‬

‭2.2.2 Understand a variety of network metrics:‬

‭Speed‬

‭●‬ ‭Refers to the rate at which data can be transmitted over a network.‬

‭●‬ ‭Measured in bits per second (bps) or bytes per second (Bps).‬

‭●‬ ‭Higher speed means that data can be transferred faster over the network.‬
‭Bandwidth‬

‭●‬ ‭Refers to the maximum amount of data that can be transmitted over a‬
‭network in a given time.‬

‭●‬ ‭Measured in bits per second (bps) or bytes per second (Bps).‬

‭●‬ ‭A higher bandwidth means that more data can be transferred over the‬
‭network.‬

‭●‬ ‭Essentially the same as speed‬

‭Notes by @uzayermasud‬
‭Throughput‬

‭●‬ ‭Refers to the actual amount of data that is transferred over a network.‬

‭●‬ ‭Measured in bits per second (bps) or bytes per second (Bps).‬

‭●‬ ‭Throughput is always lower than the network's bandwidth due to various‬
‭factors such as network congestion, errors, and retransmissions.‬

‭Scalability‬

‭●‬ ‭Refers to a network's ability to accommodate an increasing number of users‬


‭or devices.‬

‭●‬ ‭A scalable network can handle more users or devices without experiencing a‬
‭decrease in performance or functionality.‬

‭Latency‬

‭●‬ ‭Refers to the time delay that occurs when data is transmitted over a network.‬

‭●‬ ‭Measured in milliseconds (ms).‬

‭●‬ ‭Low latency means that data can be transmitted quickly and efficiently over‬
‭the network.‬

‭Error rate‬

‭●‬ ‭Refers to the number of errors that occur during data transmission.‬

‭●‬ ‭Measured as a percentage of the total number of packets transmitted.‬

‭●‬ ‭A lower error rate indicates a more reliable network.‬


‭Packet loss‬

‭●‬ ‭Refers to the percentage of data packets that are lost during transmission.‬

‭●‬ ‭Packet loss can be caused by network congestion, errors, or other issues.‬

‭●‬ ‭A lower packet loss rate indicates a more reliable network.‬


‭Availability‬

‭●‬ ‭Refers to the amount of time that a network is available for use.‬

‭●‬ ‭Measured as a percentage of total time.‬

‭Notes by @uzayermasud‬
‭●‬ ‭A higher availability means that the network is more reliable and accessible.‬
‭Jitter‬

‭●‬ ‭Refers to the variation in latency that can occur during data transmission.‬

‭●‬ ‭Measured in milliseconds (ms).‬

‭●‬ ‭Low jitter means that data can be transmitted smoothly and without delay.‬

‭2.2.3 Understand the role of components in networks:‬

‭Switch‬

‭ switch is a network device that connects devices together on a local area network‬
A
‭(LAN). It forwards data packets between devices based on their Media Access‬
‭Control (MAC) addresses.‬

‭Switches connect clients to a network.‬

‭Bridge‬

‭ bridge is similar to a switch in that it also connects devices together on a LAN.‬


A
‭However, bridges operate at the Data Link layer of the OSI model and use MAC‬
‭addresses to filter and forward network traffic between LAN segments.‬

‭Bridges connect two or more networks.‬

‭Gateway‬

‭ gateway is a network device that connects two networks that use different‬
A
‭protocols or technologies. It translates data between the two networks and‬
‭manages their communication.‬

‭Essentially a smart bridge.‬

‭Router‬

‭ router is a device that connects two or more networks and forwards data packets‬
A
‭between them based on their IP addresses. It acts as an intermediary between‬
‭networks, enabling communication between them.‬

‭Multi-function device‬

‭ multi-function device is a combination of a router and a switch. It allows for the‬


A
‭creation of a LAN and the connection of the LAN to the Internet.‬

‭Notes by @uzayermasud‬
‭Modem‬

‭ modem is a device that modulates and demodulates digital data for transmission‬
A
‭over analog telephone lines or cable lines. It converts digital signals into analog‬
‭signals and vice versa.‬

‭Repeater‬

‭ repeater is a device that amplifies and retransmits signals on a network. It is‬


A
‭used to extend the range of a network by regenerating the signal and boosting its‬
‭strength.‬

‭Server‬

‭ server is a computer that provides resources or services to other computers on a‬


A
‭network. It can be used for file storage, printing, or running applications.‬

‭Network Interface Card (NIC)‬

‭ NIC is a hardware component that enables a computer to connect to a network. It‬


A
‭allows the computer to communicate with other devices on the network.‬

‭Wireless Access Point‬

‭ wireless access point is a device that allows wireless devices to connect to a wired‬
A
‭network. It broadcasts a wireless signal and enables devices to connect to the‬
‭network using Wi-Fi.‬

‭Hubs‬

‭ hub is a network device that connects multiple devices on a LAN. It receives data‬
A
‭packets from one device and broadcasts them to all other devices on the network,‬
‭regardless of their MAC addresses. Hubs are generally less efficient than switches or‬
‭bridges and are less commonly used in modern networks.‬

‭Essentially a stupid switch/bridge.‬

‭ .2.4 Be able to produce outline designs for networks to meet‬


2
‭specified requirements that take account of location of devices.‬

‭2.2.5 Understand the characteristics and function of:‬

I‭ P addressing is a fundamental aspect of computer networking, used to uniquely‬


‭identify devices on a network. Here's an overview of the characteristics and‬
‭functions of different types of IP addressing:‬

‭Internet Protocol version 4 (IPv4)‬

‭IPv4 is the most widely used version of IP addressing. It uses 32-bit addresses and‬

‭Notes by @uzayermasud‬
‭ an support up to approximately 4 billion unique addresses. IPv4 addresses are‬
c
‭typically represented in dotted decimal notation (e.g., 192.168.1.1) and are divided‬
‭into two parts: the‬‭network ID‬‭and the‬‭host ID‬‭. The‬‭network ID identifies the‬
‭network, while the host ID identifies the individual device on that network.‬

‭Internet Protocol version 6 (IPv6)‬

I‭ Pv6 is the successor to IPv4 and uses 128-bit addresses, which provides an almost‬
‭unlimited number of unique addresses. IPv6 addresses are typically represented in‬
‭hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334) and are‬
‭divided into three parts:‬‭the network prefix‬‭,‬‭the‬‭subnet ID‬‭, and the‬‭interface‬
‭ID‬‭. This addressing scheme offers more efficient routing,‬‭improved security, and‬
‭easier network management.‬

‭Static IP addressing‬

‭ static IP address is manually assigned to a device and remains fixed. It doesn't‬


A
‭change unless manually modified, and it ensures that the device always has the‬
‭same IP address. Static IP addressing is commonly used for servers, printers, and‬
‭other network devices that require a consistent IP address for other devices to‬
‭access them.‬

‭Dynamic IP addressing‬

‭ dynamic IP address is assigned to a device by a DHCP server and can change‬


A
‭periodically. When a device connects to a network, it sends a request for an IP‬
‭address to the DHCP server, which responds with an available IP address. Dynamic‬
‭IP addressing is commonly used for end-user devices such as laptops,‬
‭smartphones, and tablets.‬

‭Dynamic Host Configuration Protocol (DHCP)‬

‭ HCP is a protocol used to automatically assign IP addresses and other network‬


D
‭settings to devices on a network. It enables network administrators to centrally‬
‭manage and allocate IP addresses, making it more efficient and scalable than‬
‭manually assigning IP addresses. DHCP servers can be configured to provide other‬
‭network settings such as subnet masks, default gateways, and DNS server‬
‭addresses.‬

I‭ n summary, IP addressing is a critical aspect of computer networking that enables‬


‭devices to communicate with each other over a network. Different types of IP‬
‭addressing and protocols, such as IPv4, IPv6, static addressing, dynamic‬
‭addressing, and DHCP, offer various benefits and drawbacks, depending on the‬
‭specific network requirements.‬

‭Media Access Control (MAC) Addressing‬

‭●‬ ‭MAC addressing is a unique 48-bit identifier assigned to network interface‬


‭controllers.‬

‭Notes by @uzayermasud‬
‭●‬ ‭It is used in the data link layer (OSI Model) to control network access and‬
‭ensure data is transmitted to the correct device.‬

‭●‬ ‭MAC addresses are permanent and cannot be modified by end-users.‬

‭●‬ ‭They are used in conjunction with protocols like ARP (gets the MAC address)‬
‭to enable device communication on a network.‬

‭●‬ ‭MAC addresses are essential for the proper functioning of network devices‬
‭and the Ethernet protocol.‬

‭●‬ ‭They can be used for security purposes to restrict access to a network.‬

‭●‬ ‭MAC addresses are used in virtualization and wireless environments.‬

‭●‬ ‭In short, MAC addressing is critical for networking and device‬
‭communication.‬

‭2.3 Network security‬

‭ .3.1 Understand the impact of network security issues on individuals and‬


2
‭organisations (threats and solutions, open networks).‬

‭Threats‬

‭ here are numerous network security threats that can impact individuals and‬
T
‭organisations, such as malware, phishing attacks, denial-of-service attacks, data‬
‭breaches, and unauthorised access to networks and devices.‬

‭Impact on individuals‬

‭ etwork security threats can lead to personal data theft, identity theft, financial‬
N
‭losses, loss of privacy, and exposure to malicious content.‬

‭Impact on organisations‬

‭ etwork security threats can cause significant damage to an organisation, such as‬
N
‭loss of confidential data, financial losses, reputational damage, legal consequences,‬
‭and disruption of business operations.‬

‭Solutions‬

‭ o address network security threats, individuals and organisations can implement‬


T
‭security measures such as firewalls, antivirus software, intrusion detection and‬
‭prevention systems, access control policies, encryption, and regular security audits‬
‭and training.‬

‭Notes by @uzayermasud‬
‭Open networks‬

‭ pen networks, such as public Wi-Fi networks, can pose a significant threat to‬
O
‭network security. They may lack encryption and other security measures, making‬
‭them vulnerable to attacks. Individuals and organisations should avoid using open‬
‭networks for sensitive tasks and use a virtual private network (VPN) for added‬
‭security.‬

‭Cybersecurity awareness‬

‭ aising cybersecurity awareness among individuals and employees is critical to‬


R
‭preventing network security threats. This includes educating them on safe online‬
‭practices, recognizing phishing emails, using strong passwords, and keeping‬
‭software and security measures up to date.‬

I‭ n summary, network security threats can have severe consequences for individuals‬
‭and organisations. Implementing security measures, avoiding open networks, and‬
‭raising cybersecurity awareness are critical to preventing and mitigating network‬
‭security threats.‬

‭ .3.2 Understand how to secure a network using both hardware and‬


2
‭software:‬

‭Firewall‬

‭●‬ ‭Install a firewall to block unauthorised access to the network and prevent‬
‭external attacks.‬

‭●‬ ‭Configure the firewall to restrict traffic to and from the network based on‬
‭predefined rules.‬

‭●‬ ‭Use a hardware firewall for added security‬


‭○‬ ‭Top-view centralised security‬

‭○‬ ‭All data passes through it‬

‭○‬ ‭Don’t have to configure software firewalls individually‬

‭Security settings‬

‭●‬ ‭Configure security settings for network devices such as routers, switches,‬
‭and servers.‬

‭●‬ ‭Disable unnecessary services and ports to reduce the attack surface.‬

‭●‬ ‭Use secure protocols such as HTTPS, SSH, and SSL/TLS to protect data in‬
‭transit.‬

‭Notes by @uzayermasud‬
‭Anti-malware‬

‭●‬ ‭Install anti-malware software on all network devices to detect and remove‬
‭malware.‬

‭●‬ ‭Ensure that the anti-malware software is up-to-date and regularly scans the‬
‭network for threats.‬

‭User controls/access/rights/profile‬

‭●‬ ‭Implement user controls, access rights, and profiles to restrict access to‬
‭network resources.‬

‭●‬ ‭Create separate user accounts with different levels of access based on job‬
‭roles and responsibilities.‬

‭●‬ ‭Regularly review and update user access rights and profiles to ensure they‬
‭are appropriate and up-to-date.‬

‭Authentication types‬

‭●‬ ‭Use strong authentication methods such as passwords, two-factor‬


‭authentication, and biometrics to verify user identities.‬

‭●‬ ‭Require users to create strong passwords that are difficult to guess and‬
‭regularly change them.‬

‭●‬ ‭Use two-factor authentication to provide an additional layer of security.‬


‭Encryption techniques‬

‭●‬ ‭Use encryption techniques to protect sensitive data on the network.‬

‭●‬ ‭Use encryption protocols such as WPA2 for wireless networks and SSL/TLS‬
‭for web traffic.‬

‭●‬ ‭Encrypt data stored on devices and backup media.‬


‭Physical controls‬

‭●‬ ‭Implement physical controls to prevent unauthorised access to network‬


‭devices and resources.‬

‭●‬ ‭Use locks, surveillance cameras, and access control systems to secure server‬
‭rooms and data centres.‬

‭●‬ ‭Ensure that network devices are physically secure and cannot be tampered‬
‭with.‬

‭Notes by @uzayermasud‬
‭Topic 3: The online environment‬
‭ he internet and the world wide web are fundamental parts of our digital activity.‬
T
‭The rise of cloud storage and cloud computing require more online activity. As more‬
‭and more people work online and participate in online communities, the issues of‬
‭potential and risk need to be considered.‬

‭What students need to learn‬

‭3.1 The internet and the world wide web‬

‭ .1.1 Understand what is meant by the internet and how it is structured‬


3
‭(Internet Protocol (IP) addressing and Domain Name System (DNS)).‬

‭●‬ ‭The Internet is a global network of interconnected devices that communicate‬


‭using standardised protocols.‬

‭●‬ ‭The Internet is structured using a hierarchical addressing system called‬


I‭ nternet Protocol (IP) addressing.‬‭IP addresses uniquely‬‭identify devices on‬
‭the Internet and allow for the routing of data packets between them.‬

‭●‬ ‭IP addresses are divided into two versions:‬‭IPv4 and‬‭IPv6.‬


I‭ Pv4 use‬‭32-bit addresses‬‭and are represented by‬‭dotted‬‭decimal notation‬
‭(expressed in series of 4 decimal numbers). It can support up to only 4 billion‬
‭addresses. It is separated into the‬‭Network ID which‬‭identifies the network address‬
‭and the‬‭Host ID which identifies the individual device‬‭on that network.‬

‭Ex. 192.168.1.1‬

‭ hereas IPv6 use‬‭128-bit addresses‬‭and are represented‬‭in‬‭hexadecimal notation‬


W
‭(where numbers larger than 10 are inputted as letters ex. A=10). It can support an‬
‭almost unlimited amount of addresses and is divided into the‬‭network prefix which‬
‭identifies the network portion of the IP address, the subnet ID is used by routers to‬
‭determine the best route between subnetworks and the interface ID identifies an‬
‭interface of a particular node.‬

I‭ Pv6 is more secure and efficient compared to IPv4. It’s also easy to manage‬
‭through a network with.‬

‭●‬ ‭The‬‭Domain Name System (DNS) is a decentralised naming‬‭system that‬


‭ aps domain names to IP addresses, making it easier for users to access‬
m
‭resources on the Internet.‬

‭●‬ ‭DNS servers store and maintain domain name records and allow users to‬
‭access websites by typing in domain names instead of IP addresses.‬

‭Notes by @uzayermasud‬
‭●‬ ‭These‬‭records are simpler than IP addresses‬‭, making it easier for users to‬
‭type in the search engine.‬

‭●‬ ‭The DNS system is‬‭organised into a hierarchical structure‬‭that includes‬


t‭ op-level domains‬‭(TLDs) (ex .com, .org, and .edu)‬‭and subdomains that are‬
‭assigned to specific organisations and websites.‬

‭●‬ ‭Internet Service Providers (ISPs) provide access to the Internet for‬
i‭ndividuals and organisations by connecting them to the global network‬
‭through their networks and infrastructure.‬

‭Exam Question:‬

‭Explain why a domain name is needed (2)‬

‭ ecause users may not be able to find a site without a domain name because the IP‬
B
‭address is not showing in the search engine.‬

‭ .1.2 Understand the features, functions, impact, and potential of the‬


3
‭world wide web.‬

‭●‬ T
‭ he‬‭World Wide Web (WWW) is an information system‬‭that allows users to‬
‭access and share multimedia resources (e.g., text, images, videos) over the‬
‭Internet.‬

‭●‬ T
‭ he Web is built on top of the Internet and uses standard protocols such as‬
‭HTTP, HTML, and URL‬‭to allow users to navigate and‬‭interact with web pages‬
‭and resources.‬

‭ TTP: Hypertext Transfer Protocol, provides a link from one page to another‬
H
‭anywhere on the internet.‬

‭ TML: Hypertext Markup Language, the standard markup language for document‬
H
‭creation.‬

‭URL:Uniform Resource Locator, an address on the web‬

‭●‬ T
‭ he Web has a‬‭decentralised architecture that allows‬‭anyone to create and‬
‭publish web pages and resources‬‭, making it a powerful‬‭platform for‬
‭information spreading and collaboration.‬

‭●‬ T
‭ he Web has transformed many industries and sectors, including education,‬
‭commerce, entertainment, and communication, by enabling new forms of‬
‭interaction, engagement, and innovation.‬

‭●‬ ‭Disadvantages include; lack of online security, privacy, and the digital divide (‬

‭Notes by @uzayermasud‬
‭the separation of the rich and the poor due to lack of access to technology).‬

‭Exam Question:‬

‭Explain what hypertext is (3)‬

I‭ t provides a link from one webpage to another which can be anywhere on the‬
‭internet. This type of link makes up the ‘web’ in the world wide web.‬

‭ .1.3 Understand the difference between static and dynamic web page‬
3
‭content, and the need to use the different types.‬

‭3.1.4 Understand the role of client-side scripting.‬

‭3.1.5 Understand the role of server-side scripting.‬

‭Static Web Page Content‬

‭●‬ ‭Hard-coded.‬

‭●‬ ‭Typically written in HTML, CSS, and JavaScript, and stored as files on a web‬
‭server.‬

‭●‬ ‭Easy to create and maintain‬‭, and can be served quickly‬‭and efficiently to‬
‭users.‬

‭●‬ ‭Suitable for websites that have little or no need for user interaction or‬
‭personalised content.‬

‭Dynamic Web Page Content‬

‭●‬ ‭Content that changes based on user input or other external factors, such as‬
‭database updates, API calls, or server-side scripting.‬

‭●‬ ‭Is created with a‬‭server-side script‬‭such as PHP,‬‭ASP, Python, or JavaScript.‬

‭●‬ ‭Allows for‬‭user interaction, personalization, and‬‭real-time updates.‬

‭●‬ ‭Suitable for websites that require‬‭user input, custom‬‭content, or real-time‬


‭data updates.‬

‭Difference between Static and Dynamic Web Page Content‬

‭●‬ ‭Static web pages are‬‭best for simple websites‬‭that‬‭don't require much user‬
‭interaction or personalised content.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Dynamic web pages are better suited for websites that require real-time‬
‭updates, user input, or personalised content.‬

‭●‬ ‭Dynamic pages don’t require knowing HTML because it is done by the‬
‭server-side script. Static requires the user to know HTML.‬

‭Exam Question:‬

‭1.‬ ‭Describe one difference between static and dynamic web pages (2)‬

‭ tatic web pages are written with HTML whereas dynamic web pages can be written‬
S
‭with a server-side script such as PHP, ASP, Python or JavaScript.‬

‭2.‬ ‭Discuss the advantages and disadvantages of using a dynamic web page‬
‭instead of a static web page. (6)‬

‭ ynamic web pages are better for websites like Hilmis because he has to‬
D
‭continuously update it so he can update his viewers on the places he has travelled‬
‭to. With dynamic web pages, he‬‭can update his site‬‭as many times as he wants‬
‭whereas with static pages are better for simpler websites which don’t require the‬
‭frequent changes.‬‭dynamic web pages are also better‬‭for personalised websites.‬
‭Also, using a dynamic web page makes it easier for Hilmi to create and organise his‬
‭page because it is‬‭not necessary for him to know HTML‬‭compared to static pages‬
‭where it is a requirement to know HTML, CSS and JavaScript.‬

‭Server-side Scripting‬

‭●‬ ‭Server-side scripting is executed on the server before the web page is sent to‬
‭the client's browser.‬

‭●‬ ‭Server-side scripting is‬‭used to generate dynamic‬‭content, process user‬


‭input, and interact with databases and other backend systems.‬

‭●‬ ‭Server-side scripting‬‭languages include PHP, Python,‬‭Ruby, and others.‬


‭Client-side Scripting‬

‭●‬ ‭Client-side scripting is executed on the client's browser after the web page is‬
‭loaded.‬

‭●‬ ‭Client-side scripting is‬‭used to add interactivity,‬‭animations, and other visual‬


‭effects to the web page‬‭, without requiring a round‬‭trip to the server.‬

‭●‬ ‭Client-side scripting‬‭languages include JavaScript,‬‭HTML5, and CSS3.‬

‭Notes by @uzayermasud‬
‭Difference between Server-side and Client-side Scripting‬

‭●‬ ‭Server-side scripting is‬‭more secure‬‭than client-side‬‭scripting‬

‭●‬ ‭Server-side scripting is‬‭more efficient‬

‭●‬ ‭Server-side scripting‬‭requires more resources and‬‭expertise‬

‭●‬ ‭Client-side server is‬‭more user friendly and responsive‬

‭●‬ ‭Client-side scripting is‬‭more resource intensive‬

‭Exam Questions:‬

‭State the difference between client-side script and server-side script (1)‬

‭3.2 Operating online‬

‭ .2.1 Understand the impact and potential of working in online‬


3
‭environments for individuals and organisations.‬

‭Impact‬

‭Advantages:‬

‭●‬ ‭Increased flexibility and accessibility‬‭for individuals‬‭and organisations,‬


‭enabling remote work and collaboration from anywhere in the world.‬

‭●‬ ‭Improved efficiency and productivity‬‭through streamlined‬‭workflows,‬


r‭ eal-time communication, and‬‭access to vast amounts‬‭of information and‬
‭resources.‬

‭●‬ ‭Enhanced creativity and innovation‬‭through new technologies,‬‭tools, and‬


‭platforms that facilitate collaboration and experimentation.‬

‭Disadvantages:‬

‭●‬ ‭Increased competition‬‭, as digital technologies and‬‭online platforms enable‬


‭new businesses to easily enter the market.‬

‭●‬ ‭Greater risk of cyber threats, data breaches, and privacy violations,‬‭as online‬
‭ nvironments expose individuals and organisations to new forms of security‬
e
‭risks.‬

‭Potential‬

‭●‬ ‭Enables global connectivity‬‭and access to diverse‬‭communities and markets.‬

‭Notes by @uzayermasud‬
‭●‬ ‭New opportunities for entrepreneurship and innovation.‬

‭●‬ ‭Improved access to education and knowledge.‬

‭●‬ ‭Increased social and political engagement‬‭, as online‬‭platforms and‬


‭communities enable new forms of activism, expression, and participation.‬

‭●‬ ‭Greater potential for sustainability and social impact‬‭,‬‭as online platforms and‬
t‭ echnologies enable new forms of collaboration, resource-sharing, and‬
‭collective action.‬

‭ .2.2 Understand the security risks to personal data stored online and‬
3
‭methods of protection.‬

‭Security Risks‬

‭●‬ ‭Data breaches‬‭: Unauthorised access to personal data‬‭stored online through‬


‭hacking, phishing, or malware attacks.‬

‭●‬ ‭Identity theft‬

‭●‬ ‭Privacy violations‬

‭●‬ ‭Malware infections‬‭: Downloading or accessing malicious‬‭software can infect‬


‭personal devices and compromise stored data.‬

‭Protection Methods‬

‭●‬ ‭Strong passwords and authentication‬

‭●‬ ‭Encryption‬‭: Encrypting personal data stored online‬‭can prevent unauthorised‬


‭access and ensure privacy.‬

‭●‬ ‭Regular software updates and patches‬

‭●‬ ‭Anti-virus and anti-malware software: Installing and regularly updating‬


‭ nti-virus and anti-malware software can prevent infections and protect‬
a
‭personal data.‬

‭●‬ ‭Awareness and education‬

‭Notes by @uzayermasud‬
‭ .2.3 Understand what a digital footprint (active, passive) is and the‬
3
‭positive and negative aspects of these.‬

‭Digital Footprint‬

‭ digital footprint is the digital trail that individuals leave behind as they interact‬
A
‭with various online platforms and services‬‭. It can‬‭include any information that‬
‭people share online, including social media posts, comments, photos, videos, and‬
‭search history.‬

‭Active Digital Footprint‬

‭ n active digital footprint is the information that individuals‬‭intentionally share‬


A
‭online‬‭. This can include‬‭social media posts, comments,‬‭and other content that‬
‭people create and publish on the internet.‬

‭Positive Aspects‬

‭●‬ ‭Can help individuals build their personal brand and establish themselves as‬
‭thought leaders or experts in their field.‬

‭●‬ ‭Can be used to showcase skills and accomplishments to potential employers‬


‭or clients ex. LinkedIn.‬

‭●‬ ‭Can be used to connect with like-minded individuals or build a network of‬
‭professional contacts.‬

‭Negative Aspects‬

‭●‬ ‭Can lead to reputational damage if the content shared is offensive or‬
‭inappropriate.‬

‭●‬ ‭Can be used by hackers or cybercriminals to gain access to personal‬


‭information or commit identity theft.‬

‭●‬ ‭Can be used by potential employers or clients to discriminate against‬


‭individuals based on their personal beliefs or opinions.‬

‭Passive Digital Footprint‬

‭ passive digital footprint is the information that‬‭individuals unintentionally leave‬


A
‭behind‬‭as they browse the internet. This can include‬‭search history, cookies, and‬
‭other data that is collected by websites and online services.‬

‭Positive Aspects‬

‭●‬ ‭Can be‬‭used to personalise‬‭online experiences and‬‭provide users with more‬


‭relevant content.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Can help companies improve their products and services by analysing user‬
‭behaviour and preferences.‬

‭●‬ ‭Can be used to monitor and prevent fraudulent activity online.‬

‭Negative Aspects‬

‭●‬ ‭Can be used to track individuals and collect personal data without their‬
‭consent.‬

‭●‬ ‭Can be used to create targeted advertising campaigns that invade users'‬
‭privacy.‬

‭●‬ ‭Can be used by governments or other organisations to monitor and censor‬


‭online activity.‬

‭3.3 Online communities‬

‭ .3.1 Understand the concept of an online community and that online‬


3
‭communities exist for social and professional purposes.‬

‭Online Community‬

‭ n‬‭online community is a group of individuals who‬‭interact and share information‬


A
‭and resources through online platforms‬‭(ex.how Hina‬‭found these notes).‬

‭ nline communities serve as a way for individuals to connect and collaborate with‬
O
‭others who share common interests or professional goals, regardless of physical‬
‭location or other barriers.‬

‭Social Online Communities‬

‭ ocial online communities are‬‭formed around common‬‭interests, hobbies, or‬


S
‭lifestyle choices.‬‭They serve as a way for individuals‬‭to connect with others who‬
‭share similar interests, regardless of physical location.‬

‭Examples:‬

‭●‬ ‭Reddit: a social news and discussion platform where users can share and‬
‭discuss content on a wide range of topics.‬

‭●‬ ‭Instagram: a photo and video sharing app where users can follow and‬
‭connect with other users based on shared interests or hobbies.‬

‭●‬ ‭TikTok: a video sharing app where users can create and share short-form‬
‭videos around various topics, interests, and challenges.‬

‭Notes by @uzayermasud‬
‭Professional Online Communities‬

‭ rofessional online communities are‬‭formed around‬‭a specific industry, profession,‬


P
‭or skill set‬‭. They serve as a way for professionals‬‭to connect with others in their‬
‭field, share knowledge and resources, and collaborate on projects.‬

‭Examples:‬

‭●‬ ‭LinkedIn: a professional social networking site where users can connect with‬
‭ ther professionals, search for job opportunities, and share industry news‬
o
‭and insights.‬

‭●‬ ‭GitHub: a platform for software developers to collaborate on code, share‬


‭knowledge, and contribute to open-source projects.‬

‭●‬ ‭Stack Overflow: an online community for programmers to ask and answer‬
t‭ echnical questions, share knowledge and resources, and build their‬
‭professional reputation.‬

‭ .3.2 Understand the impact of online communities on individuals and‬


3
‭organisations.‬

‭Impact on Individuals‬

‭Positive:‬

‭●‬ ‭Provides a sense of belonging and connection with like-minded individuals.‬

‭●‬ ‭Facilitates the sharing of knowledge, resources, and experiences with others.‬

‭●‬ ‭Can help individuals build their personal brand and establish themselves as‬
‭thought leaders in their field.‬

‭Disadvantages:‬

‭●‬ ‭Online harassment‬

‭●‬ ‭Bullying‬

‭●‬ ‭Exposure to harmful content or ideas.‬

‭Impact on Organisations‬

‭Positive:‬

‭●‬ ‭Provides a way for organisations to engage with their customers or users and‬
‭gather feedback and insights.‬

‭●‬ ‭Can help organisations build brand loyalty and community around their‬

‭Notes by @uzayermasud‬
‭products or services.‬

‭●‬ ‭Offers a platform for knowledge sharing and collaboration among employees‬
‭or team members.‬

‭Negative:‬

‭●‬ ‭Reputational damage due to negative online reviews or social media‬


‭backlash.‬

‭ nline communities have the potential to bring about significant positive impacts‬
O
‭for individuals and organisations, such as increased collaboration, knowledge‬
‭sharing, and innovation. However, they can also have negative impacts, such as‬
‭exposure to harmful content, reputational damage, and online harassment, which‬
‭must be carefully managed and addressed.‬

‭ .3.3 Understand the monetisation opportunities provided by online‬


3
‭communities:‬

‭Use of Customer Data with Targeted Advertising‬

‭ nline communities can collect data on users‬‭' interests,‬‭demographics, and‬


O
‭behaviours, and use this information to‬‭deliver targeted‬‭advertising‬‭to users. This‬
‭can generate revenue for the community platform and for advertisers.‬

‭Pay-Per-Click Advertising‬

‭ ommunity platforms can offer pay-per-click advertising opportunities to‬


C
‭advertisers, where‬‭they pay each time a user clicks‬‭on their ad‬‭. This can generate‬
‭revenue for the community platform and for the advertiser.‬

‭Selling of Customer Data‬

I‭ nvolves‬‭selling user data to third-party companies‬‭for market research or other‬


‭purposes‬‭. This can generate revenue for the community‬‭platform, but‬‭may raise‬
‭privacy concerns‬‭among users.‬

‭Paid Subscriptions (Paywalls)‬

‭ ommunity platforms can‬‭offer paid subscriptions or‬‭paywalls, where users must‬


C
‭pay to access premium content or features.‬‭This can‬‭generate revenue for the‬
‭community platform and offer a way for users to support the community.‬

‭Sponsored Content‬

‭ ommunity platforms can offer sponsored content opportunities to advertisers,‬


C
‭where they‬‭pay to have their content featured or promoted‬‭within the community‬‭.‬

‭Notes by @uzayermasud‬
‭This can generate revenue for the community platform and for the advertiser.‬

‭ verall, monetization opportunities in online communities can provide a way for the‬
O
‭community platform to generate revenue and sustain itself, while also offering‬
‭opportunities for advertisers to reach their target audience in a targeted and‬
‭engaging way. However, it's important to consider the privacy and ethical‬
‭implications of using customer data and to ensure that any monetization strategies‬
‭align with the community's values and goals.‬

‭3.4 The cloud‬

‭3.4.1 Understand the concept, use and impact of cloud storage.‬

‭3.4.2 Understand the concept, use and impact of cloud computing.‬

‭Cloud Storage‬

‭ loud storage is a service that allows users to store, access, and manage data over‬
C
‭the internet‬‭, rather than on local storage devices.‬‭This data can be accessed from‬
‭any device with an internet connection.‬

‭Uses‬

‭●‬ ‭Storing and sharing files‬‭and documents with others‬

‭●‬ ‭Collaborating‬‭on projects and documents with others‬‭in real-time‬

‭●‬ ‭Storing and accessing media files‬‭such as photos,‬‭videos, and music‬

‭●‬ ‭Backing up data to prevent loss‬‭in the event of hardware‬‭failure or disasters‬

‭Cloud Computing‬

‭ loud computing is a service that provides on-demand access to computing‬


C
‭resources‬‭, such as servers, storage, and applications,‬‭over the internet.‬

‭Uses:‬

‭●‬ ‭Hosting websites and web applications‬

‭●‬ ‭Running software applications without needing to install them locally‬

‭●‬ ‭Analysing large datasets for research or business purposes‬

‭●‬ ‭Running virtual machines for development or testing purposes‬

‭●‬ ‭Scaling computing resources up or down based on demand‬

‭Notes by @uzayermasud‬
‭Impact of Cloud Storage and Cloud Computing‬

‭Advantages:‬

‭●‬ P
‭ rovides easy and convenient access to computing resources and data‬‭from‬
‭anywhere with an internet connection‬

‭●‬ O
‭ ffers‬‭cost savings by reducing the need for users‬‭to invest in and maintain‬
‭their own infrastructure‬

‭●‬ F
‭ acilitates collaboration and teamwork‬‭by allowing‬‭multiple users to access‬
‭and work on the same files or applications simultaneously‬

‭●‬ E
‭ nables scalability‬‭, allowing organisations to quickly‬‭and easily adjust‬
‭computing resources based on demand‬

‭Disadvantages‬‭:‬

‭●‬ R
‭ aises security and privacy concerns‬‭related to data‬‭storage and access over‬
‭the internet.‬

‭ loud storage and cloud computing have revolutionised the way individuals and‬
C
‭organisations store, access, and manage data and computing resources. They offer‬
‭convenience, cost savings, and scalability, but also raise important security and‬
‭privacy concerns that must be carefully considered and addressed.‬

‭Topic 4: IT systems‬
I‭ T systems are pervasive in organisations. They are used for stock control, booking,‬
‭asset management, and logistics. These systems operate effectively because they‬
‭are designed and planned. An understanding of conventional notation will enable‬
‭students to design systems consisting of both hardware and software components.‬

‭What students need to learn‬

‭4.1 Systems design‬

‭4.1.1 Understand the concept of an IT system:‬

‭Hardware‬

‭ he‬‭physical components of an IT system‬‭, such as computers,‬‭servers, storage‬


T
‭devices, and networking equipment. Hardware‬‭provides‬‭the underlying‬
‭infrastructure for an IT system to function.‬

‭Notes by @uzayermasud‬
‭Software‬

‭ he‬‭programs and applications that run on IT system‬‭hardware‬‭, such as operating‬


T
‭systems, productivity software, database management systems, and security‬
‭software. Software is‬‭essential for performing various‬‭tasks and functions within an‬
‭IT system.‬

‭Processes‬

‭ he procedures and workflows that define how an IT system operates and how‬
T
‭tasks are performed within the system. Processes can be automated or manual and‬
‭can involve multiple components of the IT system.‬‭AKA the steps taken to‬
‭accomplish a certain objective‬

‭People‬

‭ he individuals who operate and maintain the IT system, including IT professionals,‬


T
‭end-users, and stakeholders. People are essential for ensuring the IT system is‬
‭functioning effectively and efficiently.‬‭AKA the stakeholders‬‭of the system‬

‭ .1.2 Understand how to decompose a system into smaller subsystems‬


4
‭and components.‬

‭Look at specification point‬‭2.2.3‬‭and‬‭question papers‬

‭●‬ ‭A group of related components that operate together within a larger group.‬

‭ .1.3 Be able to design IT systems, from individual components and‬


4
‭subsystems, to meet specified requirements. (Symbols are given in‬
‭Appendix 7‬‭.)‬

‭Look at specification point‬‭2.2.3‬‭and‬‭question papers‬

‭ .1.4 Understand the concept of ‘fitness for purpose’ when evaluating‬


4
‭systems.‬

‭ ystems have to be deemed fit for purpose and can only be if they meet the‬
S
‭requirements determined in an analysis made by clients, reviewers or the system‬
‭designers.‬

‭‬ S
● ‭ et of requirements‬
‭●‬ ‭Measurable criteria‬
‭●‬ ‭Agreement with customer/client‬

‭4.2 Dataflow‬

‭4.2.1 Understand the concept of and the need for data flow diagrams.‬

‭Notes by @uzayermasud‬
‭‬
● ‭ reates an overview of the system‬
C
‭●‬ ‭Helps visualise the process/dataflow‬
‭●‬ ‭Avoids excessive detail at an early stage‬
‭●‬ ‭Can be drawn at different levels of complexity‬
‭●‬ ‭Allows top-down expansion‬
‭●‬ ‭Easy to explain to non-technical audiences‬
‭●‬ ‭Shows the system boundaries‬
‭●‬ ‭Shows flow to external entities‬

‭ .2.2 Be able to interpret and create data flow diagrams for a given‬
4
‭scenario. (Symbols are given in‬‭Appendix 7‬‭.)‬

‭Data Flow Symbols‬

‭Notes by @uzayermasud‬
‭Information Flow‬

Data and Information Flow Diagrams

‭4.3 Flowcharts‬

‭4.3.1 Understand the concept of and the need for flowcharts.‬

‭ lowcharts are visual representations of a process or system that use symbols and‬
F
‭diagrams to illustrate the steps involved in completing a task or achieving a goal.‬

‭Need for Flowcharts‬

‭●‬ ‭Provide a clear and concise overview of a process or system‬

‭●‬ ‭Identify potential problems or inefficiencies in a process‬

‭●‬ ‭Standardise processes and procedures for consistent results‬

‭●‬ ‭Facilitate communication and collaboration among team members‬

‭●‬ ‭Aid in training and onboarding new employees‬

‭●‬ ‭Serve as a tool for analysis and improvement of a process or system‬

‭ .3.2 Be able to interpret and create flowcharts for a given scenario.‬


4
‭(Symbols are given in‬‭Appendix 7‬‭.)‬

‭IGCSE Computer Science‬

Flowcharts

‭Notes by @uzayermasud‬
‭4.4 Systems‬

‭ .4.1 Understand the advantages and disadvantages of IT systems for‬


4
‭individuals and organisations.‬

‭Advantages‬

‭●‬ ‭Improved efficiency and productivity through automation of tasks‬

‭Notes by @uzayermasud‬
‭●‬ G
‭ reater access to information and communication, enabling collaboration and‬
‭knowledge sharing‬

‭●‬ E
‭ nhanced decision-making capabilities through data analysis and‬
‭visualisation‬

‭●‬ I‭ ncreased convenience and flexibility through remote work and mobile‬
‭devices‬

‭●‬ P
‭ otential cost savings through reduced need for physical infrastructure and‬
‭streamlined processes‬

‭Disadvantages‬

‭●‬ D
‭ ependence on technology, making individuals and organisations vulnerable‬
‭to system failures, cyber attacks, and data breaches‬

‭●‬ ‭Potential loss of privacy and security of personal and sensitive data‬

‭●‬ ‭Risk of job displacement due to automation and outsourcing of tasks‬

‭●‬ I‭ nitial and ongoing costs associated with purchasing, implementing, and‬
‭maintaining IT systems‬

‭●‬ R
‭ isk of technology obsolescence, requiring regular updates and upgrades to‬
‭remain competitive‬

‭ .4.2 Understand how a range of contemporary digital devices, peripheral‬


4
‭devices, storage devices and memory are used in IT systems to meet the‬
‭needs of individuals and organisations.‬

‭See specification point‬‭2.2.3‬‭and question papers‬

‭Topic 5: Data and databases‬


‭ ur digital world runs on data. Whether it is personal data or institutional data, it‬
O
‭must be organised in such a way that it can be retrieved, manipulated, and‬
‭understood to have value. Databases are one way in which data is organised,‬
‭retrieved and manipulated.‬

‭What students need to learn‬

‭5.1 Data and information‬

‭5.1.1 Understand the difference between data and information.‬

‭Data‬

‭Refers to raw, unprocessed, and unorganised facts or figures that are collected and‬

‭Notes by @uzayermasud‬
‭stored by various sources.‬

‭Information‬

‭ efers to data that has been processed, organised, and analysed in a way that‬
R
‭makes it meaningful, useful, and actionable.‬

‭Key differences‬

‭●‬ ‭Data is raw and unprocessed, while information is processed and organised.‬

‭●‬ D
‭ ata is not useful on its own, while information provides insights and‬
‭knowledge.‬

‭●‬ D
‭ ata is the input for generating information, while information is the output‬
‭of data processing.‬

‭●‬ D
‭ ata is usually represented as numbers or text, while information can be‬
‭represented in various formats, such as graphs, charts, reports, and‬
‭dashboards.‬

‭ .1.2 Understand sources of and the difference between structured and‬


5
‭unstructured data.‬

‭Sources of data‬

‭Data can come from a variety of sources, such as:‬

‭●‬ ‭Business transactions, such as sales or inventory records‬

‭●‬ ‭Social media interactions, such as tweets or comments‬

‭●‬ ‭Web logs, such as website visitor data or clickstream data‬

‭●‬ ‭Sensors, such as temperature or location data‬

‭●‬ A
‭ udio and video recordings, such as surveillance footage or customer service‬
‭calls‬

‭Structured data‬

‭ efers to data that is organised and formatted in a specific way that makes it easy‬
R
‭to search, analyse, and process. Structured data is typically stored in databases or‬
‭spreadsheets and can be easily queried and analysed using software tools.‬
‭Examples of structured data include:‬

‭‬ C
● ‭ ustomer names and addresses‬
‭●‬ ‭Sales transactions‬
‭●‬ ‭Financial data‬

‭Notes by @uzayermasud‬
‭●‬ ‭Inventory records‬

‭Unstructured data‬

‭ efers to data that is not organised or formatted in a specific way and is more‬
R
‭difficult to search, analyse, and process. Unstructured data is typically stored in‬
‭text-based files, such as emails, social media posts, or documents, and may contain‬
‭a mix of text, images, and other multimedia elements. Examples of unstructured‬
‭data include:‬

‭‬
● ‭ mails and chat logs‬
E
‭●‬ ‭Social media posts and comments‬
‭●‬ ‭Images and videos‬
‭●‬ ‭Audio recordings‬

‭Key differences‬

‭●‬ ‭Structured data is organised and formatted, while unstructured data is not.‬

‭●‬ S
‭ tructured data is easier to analyse and process, while unstructured data‬
‭requires more advanced tools and techniques.‬

‭●‬ S
‭ tructured data is typically generated by internal systems and processes,‬
‭while unstructured data is often generated by external sources.‬

‭●‬ S
‭ tructured data is more easily stored and managed, while unstructured data‬
‭requires more storage capacity and management resources.‬

‭ .1.3 Understand the value to organisations of extracting meaningful‬


5
‭information from data.‬

‭Extracting meaningful information from data helps organisations‬

‭‬
● ‭ ake better decisions‬
m
‭●‬ ‭improve efficiency‬
‭●‬ ‭enhance customer experience‬
‭●‬ ‭gain competitive advantage‬
‭●‬ ‭increase revenue‬
‭●‬ ‭mitigate risks‬
‭●‬ ‭foster collaboration.‬

‭5.2 Structured data‬

‭5.2.1 Understand why databases are used to structure data‬

‭Data organisation‬

‭ atabases provide a structured way to store and organise data, making it easier to‬
D
‭find and retrieve information.‬

‭Notes by @uzayermasud‬
‭Data integration‬

‭ atabases can integrate data from multiple sources and applications, providing a‬
D
‭unified view of data that can be accessed by multiple users.‬

‭Data security‬

‭ atabases offer built-in security features to protect sensitive data from‬


D
‭unauthorised access and data breaches.‬

‭Data consistency‬

‭ atabases can enforce data consistency and integrity rules, ensuring that data is‬
D
‭accurate, complete, and up-to-date.‬

‭Data scalability‬

‭ atabases can handle large volumes of data and can scale to meet the needs of‬
D
‭growing organisations.‬

‭Data accessibility‬

‭ atabases can provide fast and efficient access to data, even for complex queries or‬
D
‭large datasets.‬

‭5.2.2 Understand the structure of a relational database‬

‭Tables‬

‭ relational database consists of one or more tables, which are used to organise‬
A
‭and store data. Each table represents a collection of related data that has a unique‬
‭name.‬

‭Fields‬

‭ ach table contains fields, which are used to store individual pieces of data. A field‬
E
‭represents a single category of data, such as a name, date, or amount.‬

‭Records‬

‭ record is a collection of related fields that describe a single instance of the data‬
A
‭being stored. Each record represents a unique entry in the database.‬

‭Primary keys‬

‭ primary key is a unique identifier for each record in a table. It is used to ensure‬
A
‭that each record can be uniquely identified and to enforce data integrity constraints.‬

‭Foreign keys‬

‭Notes by @uzayermasud‬
‭ foreign key is a field in one table that refers to the primary key of another table.‬
A
‭It is used to create relationships between tables and to enforce referential integrity‬
‭constraints.‬

‭Composite keys‬

‭ composite key is a combination of two or more fields that together uniquely‬


A
‭identify a record in a table. It is used when a single field cannot uniquely identify a‬
‭record.‬

Relational Databases and Key Fields

‭ he structure of a relational database is designed to ensure that data is organised,‬


T
‭stored, and accessed efficiently and accurately. By using tables, fields, records,‬
‭primary keys, foreign keys, and composite keys, relational databases can represent‬
‭complex data relationships and enforce data integrity constraints, making them an‬
‭effective tool for managing and analysing large volumes of data.‬

‭ .2.3 Understand the concept of entities and the relationships between‬


5
‭them:‬

‭Entities‬

‭ n entity is a distinct object or concept that is represented in a database. Each‬


A
‭entity has attributes that describe the characteristics of the entity, such as name,‬
‭address, or age.‬

‭One-to-one relationship‬

‭ one-to-one relationship is a type of relationship between two entities where each‬


A
‭entity in the relationship can be associated with only one instance of the other‬
‭entity.‬

‭One-to-many relationship‬

‭Notes by @uzayermasud‬
‭ one-to-many relationship is a type of relationship between two entities where one‬
A
‭entity can be associated with many instances of the other entity, but the other‬
‭entity can be associated with only one instance of the first entity.‬

‭Many-to-many relationship‬

‭ many-to-many relationship is a type of relationship between two entities where‬


A
‭each instance of one entity can be associated with many instances of the other‬
‭entity, and vice versa.‬

‭ .2.4 Be able to interpret and create entity relationship diagrams for a‬


5
‭given scenario. (Symbols are given in‬‭Appendix 7‬‭.)‬

‭See above and‬‭question papers‬

‭5.3 Structured query language (SQL)‬

‭ .3.1 Understand how and why SQL is used to manipulate data and data‬
5
‭structures.‬

‭●‬ ‭used to manage and manipulate data in relational databases‬

‭●‬ c
‭ reate and modify the structure of a database, including tables, fields, and‬
‭relationships between tables.‬

‭●‬ ‭insert, update, and delete data in a database.‬

‭●‬ q
‭ uery data in a database to retrieve specific information based on certain‬
‭criteria.‬

‭●‬ c
‭ reate views, which are virtual tables that are based on the result of a SQL‬
‭statement.‬

‭●‬ ‭create and manage user accounts and permissions for accessing a database.‬

‭ .3.2 Know how to select and use appropriate SQL commands, features‬
5
‭and functions to manipulate data:‬

‭ ure, here's a brief explanation of how to select and use appropriate SQL‬
S
‭commands, features, and functions to manipulate data.‬

‭Perform queries and subqueries‬

‭●‬ ‭Use the SELECT statement to retrieve data from one or more tables.‬

‭●‬ ‭Use the WHERE clause to filter data based on specific criteria.‬

‭●‬ ‭Use the GROUP BY clause to group data based on specific columns.‬

‭Notes by @uzayermasud‬
‭●‬ ‭Use the HAVING clause to filter groups based on specific criteria.‬

‭●‬ ‭Use the ORDER BY clause to sort data based on specific columns.‬

‭●‬ ‭Use subqueries to retrieve data from nested queries.‬

‭Example:‬

‭ELECT‬‭
S column1, column2‬
FROM‬‭
‭ table1‬
WHERE‬‭
‭ column1 =‬‭
'value'‬
GROUP‬‭
‭ BY‬‭
column2‬
HAVING‬‭
‭ COUNT‬
(*) >‬‭
‭ 1‬
ORDER‬‭
‭ BY‬‭
column2‬‭
ASC‬;‬

‭Create tables using appropriate data types‬

‭●‬ ‭Use the CREATE TABLE statement to create a new table.‬

‭●‬ U
‭ se the appropriate data types for each column, such as VARCHAR, INT,‬
‭DATE, etc.‬

‭Example:‬

CREATE‬‭
‭ TABLE‬‭
table1 (‬
column1‬‭
‭ VARCHAR‬
(‬
‭ 50‬
‭ ),‬

column2‬‭
‭ INT‬,‬

column3‬‭
‭ DATE‬
);‬

‭Populate tables/insert, amend, delete‬

‭●‬ ‭Use the INSERT INTO statement to add new records to a table.‬

‭●‬ ‭Use the UPDATE statement to modify existing records in a table.‬

‭●‬ ‭Use the DELETE statement to remove records from a table.‬

‭Notes by @uzayermasud‬
‭Example:‬

‭NSERT‬‭
I INTO‬‭
table1 (column1, column2, column3)‬
VALUES‬‭
‭ (‬
'value1'‬
‭ ,‬‭
‭ 123‬
,‬‭
‭ '2023-05-06'‬
);‬

‭PDATE‬‭
U table1‬
SET‬‭
‭ column1 =‬‭
'new_value'‬
WHERE‬‭
‭ column2 =‬‭
123‬
;‬

‭ELETE‬‭
D FROM‬‭
table1‬
WHERE‬‭
‭ column2 =‬‭
123‬;‬

‭Link tables(UNION, JOIN)‬

‭●‬ U
‭ se the UNION operator to combine the results of two or more SELECT‬
‭statements into a single result set.‬

‭●‬ U
‭ se the JOIN clause to combine data from two or more tables based on a‬
‭common column.‬

‭Example:‬

‭ELECT‬‭
S column1, column2‬
FROM‬‭
‭ table1‬
UNION‬

SELECT‬‭
‭ column1, column2‬
FROM‬‭
‭ table2;‬

‭ELECT‬‭
S table1.column1, table2.column2‬
FROM‬‭
‭ table1‬
INNER‬‭
‭ JOIN‬‭
table2‬
ON‬‭
‭ table1.id = table2.table1_id;‬

‭5. Use wildcards(% and _):‬

‭‬ U
● ‭ se the % wildcard to match any sequence of characters.‬
‭●‬ ‭Use the _ wildcard to match any single character.‬

‭Notes by @uzayermasud‬
‭Example:‬

‭ELECT‬‭
S column1‬
FROM‬‭
‭ table1‬
WHERE‬‭
‭ column1‬‭
LIKE‬‭
'value%'‬
;‬

‭ELECT‬‭
S column1‬
FROM‬‭
‭ table1‬
WHERE‬‭
‭ column1‬‭
LIKE‬‭
'v_lue'‬
;‬

‭Group, order, count‬

‭●‬ ‭Use the GROUP BY clause to group data based on specific columns.‬

‭●‬ ‭Use the ORDER BY clause to sort data based on specific columns.‬

‭●‬ ‭Use the COUNT function to count the number of records in a table or group.‬

‭Example:‬

‭ELECT‬‭
S column1,‬‭COUNT‬
(*)‬‭
‭ AS‬‭
count‬
FROM‬‭
‭ table1‬
GROUP‬‭
‭ BY‬‭
column1‬
ORDER‬‭
‭ BY‬‭
count‬‭
DESC‬;‬

‭Topic 6: Wider issues‬

‭ he pervasive use of technology has an impact, not just for individuals, but also for‬
T
‭the environment and society as a whole. The ability to make judgements about‬
‭technology is underpinned by an understanding of the moral and ethical issues and‬
‭the legal frameworks that are part of our lives.‬

‭What students need to learn‬

‭6.1 Environmental‬

‭ .1.1 Understand the environmental impact of construction, use and‬


6
‭disposal of information technology equipment.‬

‭Notes by @uzayermasud‬
‭Construction‬

‭●‬ E
‭ xtraction of raw materials required for the manufacturing process can lead‬
‭to land and water pollution, deforestation, and soil erosion.‬

‭●‬ E
‭ nergy-intensive manufacturing processes require significant amounts of‬
‭electricity and generate greenhouse gas emissions.‬

‭●‬ M
‭ anufacturing of certain components of IT equipment requires the use of‬
‭hazardous chemicals, which can have negative impacts on both the‬
‭environment and human health.‬

‭Use‬

‭●‬ I‭ T equipment consumes significant amounts of energy during its use, which‬
‭can contribute to greenhouse gas emissions and global warming.‬

‭●‬ O
‭ veruse and inefficient use of IT equipment can lead to unnecessary energy‬
‭consumption, which can increase energy costs and exacerbate the‬
‭environmental impact.‬

‭Disposal‬

‭●‬ I‭ mproper disposal of IT equipment can result in e-waste, which can‬


‭contaminate soil and water sources and pose a threat to human health.‬

‭●‬ E
‭ -waste contains hazardous chemicals that can release toxic substances into‬
‭the environment when not disposed of properly.‬

‭●‬ L
‭ andfills and incineration of e-waste can result in the emission of toxic gases‬
‭and contribute to air pollution and climate change.‬

‭ .1.2 Understand the positive impact that information technology makes‬


6
‭on environmental monitoring (including smart houses and smart cities)‬
‭and efficient use of resources.‬

‭Environmental Monitoring‬

‭●‬ I‭ T solutions can help monitor air quality, water quality, and weather‬
‭conditions, providing valuable data for environmental research and‬
‭decision-making.‬

‭●‬ S
‭ mart sensors and remote monitoring technologies can detect and track‬
‭changes in the environment, allowing for more efficient and timely responses‬
‭to environmental issues.‬

‭●‬ A
‭ dvanced analytics and machine learning algorithms can analyse data‬
‭collected from environmental sensors and provide insights for environmental‬

‭Notes by @uzayermasud‬
‭management and policy-making.‬

‭Efficient Use of Resources‬

‭●‬ I‭ T solutions can help optimise resource usage, such as energy and water,‬
‭through real-time monitoring and control.‬

‭●‬ S
‭ mart home technologies can adjust heating, cooling, and lighting based on‬
‭occupancy and weather conditions, reducing energy waste and saving money‬
‭on utility bills.‬

‭●‬ S
‭ mart city solutions can optimise traffic flow and public transportation‬
‭systems, reducing congestion and carbon emissions.‬

‭●‬ C
‭ loud computing and virtualization technologies can reduce the energy‬
‭consumption of data centres and IT infrastructure, leading to significant‬
‭energy savings.‬

‭6.2 Legal, moral and ethical‬

‭ .2.1 Understand the legal issues associated with the use of information‬
6
‭technology systems:‬

‭Data Protection‬

‭●‬ O
‭ rganisations must comply with data protection laws that regulate the‬
‭collection, storage, and use of personal data.‬

‭●‬ P
‭ ersonal data must be processed lawfully, fairly, and transparently, with‬
‭appropriate security measures in place to protect against unauthorised‬
‭access, loss, or theft.‬

‭●‬ I‭ ndividuals have the right to access their personal data, request that it be‬
‭corrected or deleted, and object to its use for certain purposes.‬

‭Copyright‬

‭●‬ C
‭ opyright laws protect the rights of creators of original works, including‬
‭software, music, videos, and written content.‬

‭●‬ T
‭ he use or distribution of copyrighted material without permission or proper‬
‭attribution is illegal and can result in legal action.‬

‭●‬ F
‭ air use exemptions allow for limited use of copyrighted material for certain‬
‭purposes, such as criticism, commentary, or education.‬

‭Computer Misuse‬

‭●‬ ‭Computer misuse laws prohibit unauthorised access, modification, or damage‬

‭Notes by @uzayermasud‬
‭to computer systems, networks, or data.‬

‭●‬ H
‭ acking, malware, and phishing attacks are examples of computer misuse‬
‭that can result in criminal charges and penalties.‬

‭●‬ P
‭ enetration testing and ethical hacking are legal ways to test the security of‬
‭computer systems with permission and under specific conditions.‬

‭Intellectual Property‬

‭●‬ I‭ ntellectual property laws protect the rights of creators of new inventions,‬
‭designs, or processes, including patents, trademarks, and trade secrets.‬

‭●‬ O
‭ rganisations must respect the intellectual property rights of others and‬
‭obtain appropriate licences or permissions to use patented technology or‬
‭trademarks.‬

‭●‬ ‭Trade secret theft or misappropriation can result in legal action and damages.‬

‭ .2.2 Understand the moral and ethical issues associated with the use of‬
6
‭information technology systems:‬

‭Privacy‬

‭●‬ I‭ T systems can collect and store personal data, raising concerns about‬
‭privacy and the potential misuse of personal information.‬

‭●‬ O
‭ rganisations must ensure that personal data is collected and used in a‬
‭transparent, lawful, and ethical manner.‬

‭●‬ I‭ ndividuals have the right to control their personal data and be informed‬
‭about how it is used, shared, and protected.‬

‭Inclusion‬

‭●‬ I‭ T systems should be designed to be accessible to everyone, regardless of‬


‭their race, gender, age, ability, or socioeconomic status.‬

‭●‬ O
‭ rganisations must ensure that their IT systems do not discriminate against‬
‭any group or individual and promote equal opportunities for all.‬

‭●‬ I‭ nclusive design can improve the user experience and increase the adoption‬
‭and effectiveness of IT systems.‬

‭Civil Liberties‬

‭●‬ T
‭ he use of IT systems can raise concerns about civil liberties, such as‬
‭freedom of speech, assembly, and association.‬

‭Notes by @uzayermasud‬
‭●‬ O
‭ rganisations must ensure that their IT systems do not infringe on civil‬
‭liberties and promote democratic values and principles.‬

‭●‬ G
‭ overnment surveillance and censorship of online content are examples of‬
‭civil liberties issues related to the use of IT systems.‬

‭Access‬

‭●‬ I‭ T systems should be accessible to everyone, regardless of their location,‬


‭infrastructure, or financial resources.‬

‭●‬ O
‭ rganisations must ensure that their IT systems are available to all users and‬
‭do not exclude any group or individual.‬

‭●‬ D
‭ igital divide, net neutrality, and access to education and healthcare are‬
‭examples of access issues related to the use of IT systems.‬

‭Accessibility‬

‭●‬ I‭ T systems should be designed to be accessible to people with disabilities,‬


‭such as visual, hearing, or mobility impairments.‬

‭●‬ O
‭ rganisations must ensure that their IT systems are compliant with‬
‭accessibility standards and guidelines, such as the Web Content Accessibility‬
‭Guidelines (WCAG).‬

‭●‬ A
‭ ssistive technologies, such as screen readers and voice recognition‬
‭software, can improve accessibility and usability for people with disabilities.‬

‭Expression‬

‭●‬ T
‭ he use of IT systems can facilitate the expression of diverse views and‬
‭opinions, promoting freedom of expression and democracy.‬

‭●‬ O
‭ rganisations must ensure that their IT systems do not suppress or censor‬
‭legitimate expressions of opinion and promote pluralism and tolerance.‬

‭●‬ H
‭ ate speech, cyberbullying, and online harassment are examples of‬
‭expression issues related to the use of IT systems.‬

‭Association‬

‭●‬ T
‭ he use of IT systems can facilitate the formation of social groups and‬
‭communities, promoting social cohesion and mutual support.‬

‭●‬ O
‭ rganisations must ensure that their IT systems do not exclude or‬
‭discriminate against any group or individual and promote inclusivity and‬
‭diversity.‬

‭Notes by @uzayermasud‬
‭●‬ O
‭ nline radicalization, hate groups, and online fraud are examples of‬
‭association issues related to the use of IT systems.‬

‭6.3 Society‬

‭6.3.1 Understand the impact of ubiquitous wireless access:‬

‭Smart Cities‬

‭●‬ U
‭ biquitous wireless access enables the creation of smart cities, where IT‬
‭systems are used to manage urban infrastructure and services.‬

‭●‬ S
‭ mart cities can improve the efficiency and sustainability of energy,‬
‭transportation, and waste management systems.‬

‭●‬ S
‭ mart city applications, such as traffic management, smart grids, and‬
‭intelligent building systems, rely on ubiquitous wireless access to collect and‬
‭analyse data in real-time.‬

‭Location Awareness‬

‭●‬ U
‭ biquitous wireless access enables location awareness, where IT systems can‬
‭track and analyse the location of people and objects in real-time.‬

‭●‬ L
‭ ocation awareness can improve the efficiency and safety of transportation‬
‭systems, emergency response, and supply chain management.‬

‭●‬ L
‭ ocation-based applications, such as GPS navigation, location-based‬
‭advertising, and geofencing, rely on ubiquitous wireless access to provide‬
‭accurate and reliable location data.‬

‭Notes by @uzayermasud‬

You might also like