IAL IT Unit 1 Notes
IAL IT Unit 1 Notes
I
Information Technology
Unit 1 Notes
1.1 Hardware
Portability
Notes by @uzayermasud
systems, such as in cars or appliances, where compact size is important.
Performance
● High performance is important for devices that need to process large
amounts of data quickly, such as computers and supercomputers.
● Games consoles are also designed for high performance, with powerful
processors and graphics cards to handle demanding games.
● Microprocessors/single board computers are often used for specific tasks that
require high processing power, such as in robotics or data processing.
Storage
● All contemporary digital devices have some form of storage, such as hard
drives, solid-state drives, or removable storage media.
● Network-attached storage (NAS) is a type of storage that can be accessed by
ultiple devices over a network. This allows for easy sharing of files and
m
resources.
● RAID storage is a type of storage that uses multiple hard drives to protect
against data loss in case of a drive failure.
User interface
● The user interface of a digital device refers to how the user interacts with the
evice. This includes input devices, such as keyboards and touch screens,
d
and output devices, such as monitors and speakers.
● Some devices, such as biometric scanners and barcode readers, provide
additional input methods for secure authentication or data input.
Connectivity
● Connectivity is important for allowing devices to share data and resources.
his can be done through cables, such as USB and HDMI, or wirelessly using
T
Wi-Fi, Bluetooth, or other wireless standards.
● Devices such as printers and scanners often have multiple connectivity
options to make it easier for users to connect to them.
Notes by @uzayermasud
collection and processing.
Media support
● Some devices, such as cameras and scanners, are specifically designed for
capturing media.
● Other devices, such as smart TVs and games consoles, are designed to
display high-quality video and graphics.
Energy consumption
● Mobile phones and tablets often have batteries that can be recharged, while
other devices are designed to be always plugged in.
Expansion capability
● Other devices, such as printers and scanners, can be expanded by adding
additional trays or modules to allow for more functionality.
Security features
● Devices such as biometric scanners and chip and pin devices provide secure
authentication to prevent unauthorised access.
● RAID storage provides redundancy and protects against data loss in case of a
drive failure.
Primary Storage:
Notes by @uzayermasud
RAM (Random Access Memory)
Types:
- PROM (Programmable ROM)
- EPROM (Erasable Programmable ROM)
- EEPROM (Electrically Erasable Programmable ROM)
Cache:
- L1, L2, and L3 caches inside processor
- Very fast memory
- Very expensive
- L1 is fastest, L3 is slowest
- Store most frequently accessed data
Processors:
- x86 Architecture most common (Intel and AMD processors)
- High performance
- Upgradeable parts
- Relatively old
- Used in desktops and laptops
- Performance
- More cores
- Faster clock speed
- More cache
Storage Devices
Magnetic Tape:
- Magnetised bits of tape
- Very high capacity
Notes by @uzayermasud
- V ery cheap
- Very slow read/write speeds
RAID Storage:
- Replicate data over multiple drives
- Increases data reliability and I/O performance
Cables
● USB (Universal Serial Bus): a versatile interface that can transfer data at
peeds of up to 10 Gbps (USB 3.2 Gen 2x2), with backwards compatibility to
s
older USB versions.
● Ethernet: a wired network technology that can transmit data at speeds of up
t o 10 Gbps (10GBASE-T), with faster speeds of up to 40 Gbps and 100 Gbps
available for enterprise-level networking.
● DisplayPort: a video interface that can transmit audio and video signals at
Notes by @uzayermasud
igh speeds of up to 32.4 Gbps (DisplayPort 2.0), making it ideal for
h
high-resolution displays and gaming.
● Thunderbolt: a high-speed interface developed by Intel that can transfer data
t speeds of up to 40 Gbps (Thunderbolt 3), with support for multiple
a
protocols such as USB, DisplayPort, and PCIe.
ote that the speeds listed above are theoretical maximums and actual data
N
transfer rates may be lower depending on various factors such ascable length,
device compatibility, and signal interference.
.1.2 Understand the technologies used by digital devices and how they
1
impact on the design and uses of devices:
Biometrics
Touchscreen
llows users to interact with devices through touch, simplifying user interface
a
design and enabling new forms of interaction such as pinch-to-zoom and swipe
gestures.
Sensor
rovides devices with the ability to detect and respond to changes in their
p
environment, such as movement, light, temperature, and pressure, enabling
features such as automatic screen rotation, ambient light adjustment, and fitness
tracking.
Memory
nables devices to store and retrieve data quickly and efficiently, improving
e
performance and enabling features such as multitasking and fast app switching.
Storage
rovides devices with the ability to store large amounts of data, such as
p
documents, music, and videos, enabling users to access their content on-the-go.
Battery power
Notes by @uzayermasud
rovides devices with the ability to operate untethered from a power source,
p
enabling mobility and convenience, while advances in battery technology have led
to longer battery life and faster charging times.
Miniaturisation
nables devices to become smaller and more portable, while maintaining or
e
improving their performance and functionality.
Processor
rovides devices with the computing power to perform complex tasks, such as
p
running applications, processing images, and playing games, while advances in
processor technology have led to faster performance and improved energy
efficiency.
nables devices to identify and track objects using radio waves, enabling
e
applications such as inventory management, contactless payment, and access
control.
● R
FID stands for radio-frequency identification, and it uses radio waves to
automatically identify and track objects.
● A
n RFID system consists of a reader and a tag. The reader sends out a radio
signal that powers up the tag, allowing it to send back its unique
identification number.
● R
FID tags can be either passive, meaning they don't have a power source
and are powered by the reader's signal, or active, meaning they have a
Notes by @uzayermasud
built-in battery and can transmit their signal over longer distances.
● R
FID tags can be attached to a wide range of objects, including products,
vehicles, and even people or animals.
● I n logistics and supply chain management, RFID can help track the
movement of goods through the supply chain, improving efficiency and
reducing errors.
● I n healthcare, RFID can be used to track medical equipment and supplies,
monitor patients, and improve patient safety.
● I n access control, RFID can be used to grant or restrict access to buildings,
rooms, and equipment.
verall, RFID provides a reliable, efficient, and cost-effective way to track and
O
manage objects, improving business operations and enhancing customer
experiences.
● NFC uses magnetic field induction to transmit data between devices.
● NFC operates at a frequency of 13.56 MHz and has a range of about 4
centimetres.
● NFC works by modulating a magnetic field to transmit data between two
devices. It can transmit encrypted data.
Applications:
● NFC is commonly used for contactless payments, allowing users to make
Notes by @uzayermasud
urchases by tapping their smartphone or other NFC-enabled device against
p
a payment terminal.
● NFC can also be used for data transfer between two devices. For example,
sers can transfer photos, videos, and other files between smartphones or
u
other devices using NFC.
● NFC is used in access control systems to allow users to gain entry to a
uilding or secure area by tapping an NFC-enabled card or device against a
b
reader.
● NFC tags can be used to provide information to users, such as directions or
roduct information. Users can tap their smartphone against an NFC tag to
p
access this information.
● NFC can be used in transportation systems to allow users to pay for fares or
access information about schedules and routes using an NFC-enabled device.
● NFC can be used in healthcare systems to manage patient information and
provide access to medical records using an NFC-enabled device.
nables devices to quickly and easily access information by scanning a code using
e
their camera, enabling applications such as marketing, advertising, and
authentication.
Notes by @uzayermasud
● QR codes (Quick Response codes) are two-dimensional barcodes that can be
scanned using a smartphone or other mobile device.
● QR codes are made up of black and white squares arranged in a specific
pattern.
● When a QR code is scanned, the device uses its camera to capture the
pattern and then decodes the information contained in the code.
● QR codes can contain various types of information, such as website
URLs, contact information, product information, and more.
○ URLs
○
Applications:packag
● ticketing systems, such as for airline or event tickets. Users can scan a QR
code to access their ticket information.
● payment systems to allow users to make payments by scanning a code with
their smartphone or other device.
● inventory management to track and manage products. QR codes can be
printed on product labels or packaging to help identify and track items.
● used in contact tracing during the COVID-19 pandemic. Users can scan a QR
code when entering a public space or event to help track potential exposure
Notes by @uzayermasud
to the virus.
Connectivity:
nables devices to connect to the internet and other devices, enabling features such
e
as messaging, social networking, cloud storage, and remote access. Advances in
connectivity technology have led to faster speeds, greater coverage, and improved
reliability.
hen two or more separate technologies/devices merge into one. For example,
W
smartphones can do most things a laptop can and it is more portable.
nother example would be gaming consoles evolving beyond just games and now
A
including streaming services like Netflix and Spotify.
mart watches not only tell the time but have taken the jobs of health monitoring
S
systems.
.1.4 Understand the concept of and the need for features and functions of
1
embedded systems.
Embedded systems:
hey often have limited resources, such as memory, processing power, and
T
input/output capabilities.
The features and functions of embedded systems can vary widely, depending on the
Notes by @uzayermasud
pplication, but may include sensing, actuating, processing, communication, and
a
control.
I n addition, the reliability and safety of embedded systems are critical, particularly
in applications such as medical devices and automotive systems.
Pros:
● E
mbedded systems are highly specialised and can be optimised for specific
tasks, resulting in high performance and efficiency.
● T
hey can operate in real-time, providing fast and accurate responses to
external events and inputs.
● They can be highly reliable and secure, with built-in safety features and
protection against cyber threats.
Cons:
● The highly specialised nature of embedded systems can make them
expensive to develop and maintain.
● The limited resources of embedded systems can result in trade-offs between
performance, features, and cost.
● The custom nature of embedded systems can make it difficult to update or
pgrade them over time, which can lead to compatibility issues and
u
obsolescence.
.1.5 Understand the concept of and the need for firmware, including
1
where it is stored.
Concept of Firmware
● It provides low-level control of the device's hardware components and
interfaces with other software components to perform specific tasks
Notes by @uzayermasud
● Firmware is critical for the proper functioning of many hardware devices,
providing the necessary control and management of the device's components
● Firmware is also necessary for enabling the device to interact with other
software components, such as drivers and operating systems
● Firmware is typically stored in non-volatile memory (ROM), which allows it to
be retained even when power is turned off.
● The specific location of the firmware can vary depending on the device and
its architecture, but it is often stored in on-chip memory, flash memory, or
external storage devices, such as EEPROM or SD cards.
● In some cases, firmware can be updated or modified after the device has
een manufactured, either through a physical interface or wirelessly via a
b
network connection.
.1.6 Understand factors that can be used to assess the performance of
1
digital devices:
Speed:
● Refers to the rate at which a device can complete tasks and process data
● E
xample: A computer with a higher processor speed can run applications
faster than a computer with a lower processor speed.
Capacity:
● Refers to the amount of data that a device can store and process
● E
xample: A hard drive with a larger capacity can store more data than a hard
drive with a smaller capacity.
Portability:
Notes by @uzayermasud
● Refers to how easily a device can be transported from one place to another
● Factors that affect portability include weight, size, and durability
Bandwidth:
● R
efers to the amount of data that can be transferred over a network
connection in a given amount of time
● E
xample: A device with a higher bandwidth can download files from the
internet faster than a device with a lower bandwidth.
Power efficiency:
● Refers to how efficiently a device uses energy to perform its functions
● E
xample: A laptop with a more power-efficient processor can operate for
longer on battery power than a laptop with a less power-efficient processor.
1.1.7 Be able to calculate data file size and time needed to transmit a file.
E
● ight bits means that a byte can store up to 256 levels of information.
● We can therefore store up to 256 levels of brightness per pixel – which gives
us what is called ‘8-bit grayscale’.
● I f we need to calculate the storage requirements of a black and white bitmap
image, we multiply the number of pixels wide by the number of pixels high.
● The answer will give us the number of bits.
● We then convert the number into an appropriate unit (kilobytes/megabytes).
Notes by @uzayermasud
800 * 900 = 7
20, 000𝑏𝑖𝑡𝑠
720, 000/8
= 90, 000𝑏𝑦𝑡𝑒𝑠
90, 000/1
000 = 90𝐾
𝐵
S
● ize in bits = W × H × D
● Size in bytes = W × H × D/8
● W = image width, H = image height, D = colour depth in bits.
Sound
Sampling
● B
it depth defines the dynamic range of the sound – the amplitude (volume)
of the waveform at each sample point.
● Q
uantisation is the name of the audio snapshot when it has to be rounded off
to the nearest available digital value.
● S
ample rates are measured in hertz (Hz) or thousands of hertz (kHz,
kilohertz). For example, 44.1 kHz is equal to 44,100 samples of audio
recorded every second.
● T
he sample rate you choose depends on what the audio is going to be used
for. If you wanted to record a song to put on a CD you would usually use
44.1 kHz.
Calculation
● W
e can calculate sound file sizes based on the sample rate and the sample
resolution using the following formula:File size(bits) = rate × res × secs
● If we want 30 seconds of mono sound, where the sample rate is 44,100 Hz
nd the sample resolution is 8 bits, we will have:
a
(44100×8
×
30)/( 8×1000)
= 1323 KfB
= 1.323 MB
(44100×8
×
2×30)/(8×1000) = 2646𝑘𝐵 = 2
. 6𝑀
𝐵
Notes by @uzayermasud
.1.8 Be able to use and convert between binary and denary, as defined by
1
the International Electrotechnical Commission (IEC). (These are different
from SI units.)
● Binary units are based on powers of two (e.g. 2^0, 2^1, 2^2, etc.), and are
commonly used in computing and digital electronics.
● Denary units, also known as decimal units, are based on powers of ten (e.g.
10^0, 10^1, 10^2, etc.), and are commonly used in everyday life.
10
ibibyte (KiB) 2
K
bytes
20
ebibyte (MiB)2
M
bytes
30
ibibyte (GiB)2
G
bytes
40
ebibyte (TiB)2
T
bytes
● The International System of Units (SI) uses decimal prefixes, such as kilo-,
mega-, and giga-.
● The IEC uses binary prefixes, such as kibi-, mebi-, and gibi-.
● This means that the size of a kibibyte is 1024 bytes, whereas the size
of a kilobyte in SI units is 1000 bytes.
3
Kilobyte (KB)10 bytes
6
egabyte (MB)10
M
bytes
Notes by @uzayermasud
9
Gigabyte (GB)10 bytes
12
erabyte (TB)10
T
bytes
● To convert from binary to denary units, multiply the binary value by the
ppropriate power of two (e.g. 2^10 for kilobytes, 2^20 for megabytes,
a
etc.).
● To convert from denary to binary units, divide the denary value by the
ppropriate power of two and round down to the nearest integer (e.g. divide
a
by 1024 for kilobytes, 1,048,576 for megabytes, etc.).
● In everyday use, kilobytes, megabytes, and gigabytes are often used to refer
to both binary and denary units, which can cause confusion.
● To avoid confusion, use the correct units for the context:
○ such as kibibytes, mebibytes, and gibibytes for binary units
.1.9 Be able to select digital devices to meet the needs and requirements
1
of individuals and organisations.
omes up in questions often, usually with no correct answer. They just want you to
C
talk about the pros and cons of things.
1.2 Software
S
● ystems software
● Applications software.
Application software:
● Application software is designed for specific tasks or functions, such as word
processing, photo editing, or accounting.
Notes by @uzayermasud
● Application software can be purchased or downloaded by users to perform
specific tasks or functions.
● Application software can be customised and configured to meet the specific
needs of individual users or organisations.
System software:
● System software is designed to manage and control the operation of the
computer system.
● System software is essential for the proper functioning of the computer
system, and includes operating systems, device drivers, and utility programs.
● Operating systems are the most important type of system software,
roviding the interface between the hardware and the user, and managing
p
resources such as memory, storage, and processing power.
● Device drivers are used to control hardware devices such as printers,
scanners, and cameras, allowing them to be used with the computer system.
● Utility programs are used to perform specific tasks such as file compression,
disk cleanup, and virus scanning.
● Examples of system software include Microsoft Windows, MacOS, and Linux.
1.2.2 Understand the role of the operating system in managing:
● evices
d
● processes
● users
● security
Devices:
● The operating system manages the interaction between the computer
hardware and software.
Notes by @uzayermasud
● The operating system communicates with device drivers to control input and
output operations for devices such as keyboards, mice, and printers.
● The operating system also manages the connection and configuration of
hardware devices such as external hard drives and USB devices.
Processes:
● The operating system is responsible for managing the allocation of system
resources to different processes.
● The operating system manages the scheduling of processes and ensures that
they have access to the CPU and memory when needed.
● The operating system also monitors and manages the use of system
r esources to prevent conflicts and ensure the smooth operation of the
system.
Users:
● The operating system provides a platform for users to interact with the
computer system.
● The operating system manages user accounts and permissions, ensuring that
users only have access to the resources they are authorised to use.
● The operating system also provides a graphical user interface (GUI) that
allows users to interact with the computer system in a user-friendly way.
Security:
● The operating system provides a range of security features to protect the
computer system from unauthorised access and malicious software.
● The operating system manages user authentication and access control,
ensuring that only authorised users have access to the system.
● The operating system also provides security features such as firewalls,
ntivirus software, and encryption to protect the system from external
a
threats.
● The operating system monitors system activity and logs events, allowing
administrators to detect and respond to security breaches and other issues.
Notes by @uzayermasud
● free
● open-source
● proprietary
● creative commons.
Sources of Software:
Copyright Types:
● Free:
● Allows users to access and use copyrighted material without cost.
● Software whose source code is made available to the public for use
and modification.
● Proprietary:
Notes by @uzayermasud
● Examples include Microsoft Office and Adobe Photoshop.
● A set of licences that allows creators to share their work while
retaining some rights.
● Allows creators to choose the level of freedom they want to give to
others to use and modify their work.
Licensing Options:
This licence allows a single user to use the software on a single device or computer.
● Cons: May not be suitable for larger organisations, and may require
additional licences for additional devices or users.
his licence allows multiple users to use the software on multiple devices or
T
computers, typically with a limit on the number of users or devices.
● Cons: May not be suitable for very large organisations or those with
fluctuating user/device needs.
Institutional Licence:
his licence allows a group or organisation to use the software on multiple devices
T
or computers within the same institution, such as a school or business.
● Pros: Cost-effective for institutions with many users and devices, and
may provide centralised management options.
Notes by @uzayermasud
● Cons: May not be suitable for very large or distributed organisations,
and may require additional licences for additional institutions.
his licence grants the user the right to use the software for a specified period of
T
time, after which the licence expires and the user must renew it to continue using
the software.
● Cons: Can be more expensive in the long run for continued use, and
may require additional administrative effort for licence renewal.
Indefinite Licence:
his licence grants the user the right to use the software indefinitely, without any
T
time limit or expiration date.
● Cons: Can be more expensive initially, and may require additional
administrative effort for licence management and updates.
Network License:
his licence allows multiple users to access the software on a network, typically
T
with a limit on the number of simultaneous users.
● Pros: Cost-effective for larger organisations, and allows users to
access the software from multiple devices.
● Cons: May require additional setup and administrative effort for
network management, and may limit simultaneous user access.
ote: There may be other types of licences available, such as subscription licences
N
or open source licences, but these are the main types commonly used in
commercial software.
1.2.5 Understand the purpose of, and how to manage, software updates:
● atch
p
● automatic
● upgrade
● compatibility issues.
Notes by @uzayermasud
Purpose:
● Software updates are released to fix bugs, improve performance, and add
new features to existing software.
● Updates may also include security fixes to address vulnerabilities that could
be exploited by malicious people.
● In some cases, updates may be required to ensure compatibility with other
software or hardware.
● Compatibility issuescan occur when updates are installedon systems or
evices that are not compatible with the updated software. It's important to
d
check compatibility requirements before installing updates to avoid potential
issues.
● Keep your operating system and applications up-to-date to ensure that you
have the latest security patches and features.
● Back up important data before installing updates, in case something goes
wrong during the update process.
● Consider enabling automatic updates to ensure that you are always running
the latest version of the software.
Notes by @uzayermasud
● Be cautious when installing updates from unknown sources, as they could
potentially contain malware or other security threats.
.2.6 Be able to select software to meet the needs and requirements of
1
individuals and organisations.
Topic 2: Networks
omputer networks are essential to most organisations, enabling them to access
C
their information irrespective of its geographical location; make efficient use of
hardware and software resources, and communicate effectively. Network design,
based on an understanding of protocols, is fundamental to the way networks work.
Such reliance on networks in our society is founded on the assumption that there
are mechanisms for securing access to them.
● Functions: The server provides resources and services such as file storage,
email, and web hosting, while the clients request and use these resources.
● Cons: High cost, single point of failure, and high maintenance requirements.
Peer-to-peer network model
● Features: In a peer-to-peer network model, all devices are equal and can
function as both clients and servers. Each device shares its resources and
services with other devices on the network.
● Functions: Devices communicate and share resources with each other
without a central server.
Notes by @uzayermasud
● Examples: File sharing networks, gaming networks, and social media.
● Pros: Low cost, easy setup, and no single point of failure.
● Cons: Security risks, limited scalability, and potential performance issues.
Ad hoc network model
● Features: In an ad hoc network model, devices connect directly to each other
ithout the need for a central infrastructure. This type of network is often
w
used for temporary or emergency communications.
● Functions: Devices communicate and share resources with each other
without the need for a centralised server or infrastructure.
● Pros: Easy setup, flexible and adaptable, and can be used in remote areas.
● Cons: Limited range, limited scalability, and potential security risks.
Tethering
● Features: Tethering involves using a mobile device's cellular data connection
t o provide internet access to other devices. The tethered device acts as a
mobile hotspot, allowing other devices to connect to it and use its internet
connection.
● Functions: The tethered device shares its internet connection with other
devices.
● Pros: Easy to set up, widely available, and can be used in areas without
Wi-Fi.
● C
ons: Limited range, limited bandwidth, and potential data usage restrictions
and additional costs from cellular providers.
Wi-Fi
Notes by @uzayermasud
● Uses radio waves to transmit data between devices
ZigBee
Bluetooth
Notes by @uzayermasud
● Uses infrared light to transmit data between devices
● ransmission Control Protocol/ Internet Protocol (TCP/IP)
T
● Voice Over Internet Protocol (VOIP)
● Session Initiation Protocol (SIP)
● 7-layer Open Systems Interconnection (OSI) Model
● Handles routing of data between networks and includes addressing schemes
to identify and locate devices
● Technology that enables voice communication over internet protocol (IP)
networks
Notes by @uzayermasud
● Transforms analog voice signals into digital data that can be transmitted over
the internet
● Includes features such as call waiting, voicemail, and conference calling
Session Initiation Protocol (SIP)
● Enables users to establish and manage communications sessions such as
voice and video calls, and conference calls
● Supports features such as call forwarding, call waiting, and call hold
7-layer OSI Model
● Consists of seven layers, each with its own set of protocols and functions
● The layers are: physical, data link, network, transport, session, presentation,
and application
● Each layer provides services to the layer above it and uses services provided
by the layer below it
Wireless
Notes by @uzayermasud
● Radio:used for short-range communication such as Wi-Fi and Bluetooth.
Example: streaming music from a smartphone to a speaker.
Wired
Speed
● Refers to the rate at which data can be transmitted over a network.
● Measured in bits per second (bps) or bytes per second (Bps).
● Higher speed means that data can be transferred faster over the network.
Bandwidth
● Refers to the maximum amount of data that can be transmitted over a
network in a given time.
● Measured in bits per second (bps) or bytes per second (Bps).
● A higher bandwidth means that more data can be transferred over the
network.
Notes by @uzayermasud
Throughput
● Refers to the actual amount of data that is transferred over a network.
● Measured in bits per second (bps) or bytes per second (Bps).
● Throughput is always lower than the network's bandwidth due to various
factors such as network congestion, errors, and retransmissions.
Scalability
● A scalable network can handle more users or devices without experiencing a
decrease in performance or functionality.
Latency
● Refers to the time delay that occurs when data is transmitted over a network.
● Low latency means that data can be transmitted quickly and efficiently over
the network.
Error rate
● Refers to the number of errors that occur during data transmission.
● Refers to the percentage of data packets that are lost during transmission.
● Packet loss can be caused by network congestion, errors, or other issues.
● Refers to the amount of time that a network is available for use.
Notes by @uzayermasud
● A higher availability means that the network is more reliable and accessible.
Jitter
● Refers to the variation in latency that can occur during data transmission.
● Low jitter means that data can be transmitted smoothly and without delay.
Switch
switch is a network device that connects devices together on a local area network
A
(LAN). It forwards data packets between devices based on their Media Access
Control (MAC) addresses.
Bridge
Gateway
gateway is a network device that connects two networks that use different
A
protocols or technologies. It translates data between the two networks and
manages their communication.
Router
router is a device that connects two or more networks and forwards data packets
A
between them based on their IP addresses. It acts as an intermediary between
networks, enabling communication between them.
Multi-function device
Notes by @uzayermasud
Modem
modem is a device that modulates and demodulates digital data for transmission
A
over analog telephone lines or cable lines. It converts digital signals into analog
signals and vice versa.
Repeater
Server
wireless access point is a device that allows wireless devices to connect to a wired
A
network. It broadcasts a wireless signal and enables devices to connect to the
network using Wi-Fi.
Hubs
hub is a network device that connects multiple devices on a LAN. It receives data
A
packets from one device and broadcasts them to all other devices on the network,
regardless of their MAC addresses. Hubs are generally less efficient than switches or
bridges and are less commonly used in modern networks.
IPv4 is the most widely used version of IP addressing. It uses 32-bit addresses and
Notes by @uzayermasud
an support up to approximately 4 billion unique addresses. IPv4 addresses are
c
typically represented in dotted decimal notation (e.g., 192.168.1.1) and are divided
into two parts: thenetwork IDand thehost ID. Thenetwork ID identifies the
network, while the host ID identifies the individual device on that network.
I Pv6 is the successor to IPv4 and uses 128-bit addresses, which provides an almost
unlimited number of unique addresses. IPv6 addresses are typically represented in
hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334) and are
divided into three parts:the network prefix,thesubnet ID, and theinterface
ID. This addressing scheme offers more efficient routing,improved security, and
easier network management.
Static IP addressing
Dynamic IP addressing
Notes by @uzayermasud
● It is used in the data link layer (OSI Model) to control network access and
ensure data is transmitted to the correct device.
● They are used in conjunction with protocols like ARP (gets the MAC address)
to enable device communication on a network.
● MAC addresses are essential for the proper functioning of network devices
and the Ethernet protocol.
● They can be used for security purposes to restrict access to a network.
● In short, MAC addressing is critical for networking and device
communication.
Threats
here are numerous network security threats that can impact individuals and
T
organisations, such as malware, phishing attacks, denial-of-service attacks, data
breaches, and unauthorised access to networks and devices.
Impact on individuals
etwork security threats can lead to personal data theft, identity theft, financial
N
losses, loss of privacy, and exposure to malicious content.
Impact on organisations
etwork security threats can cause significant damage to an organisation, such as
N
loss of confidential data, financial losses, reputational damage, legal consequences,
and disruption of business operations.
Solutions
Notes by @uzayermasud
Open networks
pen networks, such as public Wi-Fi networks, can pose a significant threat to
O
network security. They may lack encryption and other security measures, making
them vulnerable to attacks. Individuals and organisations should avoid using open
networks for sensitive tasks and use a virtual private network (VPN) for added
security.
Cybersecurity awareness
I n summary, network security threats can have severe consequences for individuals
and organisations. Implementing security measures, avoiding open networks, and
raising cybersecurity awareness are critical to preventing and mitigating network
security threats.
Firewall
● Install a firewall to block unauthorised access to the network and prevent
external attacks.
● Configure the firewall to restrict traffic to and from the network based on
predefined rules.
Security settings
● Configure security settings for network devices such as routers, switches,
and servers.
● Disable unnecessary services and ports to reduce the attack surface.
● Use secure protocols such as HTTPS, SSH, and SSL/TLS to protect data in
transit.
Notes by @uzayermasud
Anti-malware
● Install anti-malware software on all network devices to detect and remove
malware.
● Ensure that the anti-malware software is up-to-date and regularly scans the
network for threats.
User controls/access/rights/profile
● Implement user controls, access rights, and profiles to restrict access to
network resources.
● Create separate user accounts with different levels of access based on job
roles and responsibilities.
● Regularly review and update user access rights and profiles to ensure they
are appropriate and up-to-date.
Authentication types
● Require users to create strong passwords that are difficult to guess and
regularly change them.
● Use encryption protocols such as WPA2 for wireless networks and SSL/TLS
for web traffic.
● Use locks, surveillance cameras, and access control systems to secure server
rooms and data centres.
● Ensure that network devices are physically secure and cannot be tampered
with.
Notes by @uzayermasud
Topic 3: The online environment
he internet and the world wide web are fundamental parts of our digital activity.
T
The rise of cloud storage and cloud computing require more online activity. As more
and more people work online and participate in online communities, the issues of
potential and risk need to be considered.
Ex. 192.168.1.1
I Pv6 is more secure and efficient compared to IPv4. It’s also easy to manage
through a network with.
● DNS servers store and maintain domain name records and allow users to
access websites by typing in domain names instead of IP addresses.
Notes by @uzayermasud
● Theserecords are simpler than IP addresses, making it easier for users to
type in the search engine.
● Internet Service Providers (ISPs) provide access to the Internet for
individuals and organisations by connecting them to the global network
through their networks and infrastructure.
Exam Question:
ecause users may not be able to find a site without a domain name because the IP
B
address is not showing in the search engine.
● T
heWorld Wide Web (WWW) is an information systemthat allows users to
access and share multimedia resources (e.g., text, images, videos) over the
Internet.
● T
he Web is built on top of the Internet and uses standard protocols such as
HTTP, HTML, and URLto allow users to navigate andinteract with web pages
and resources.
TTP: Hypertext Transfer Protocol, provides a link from one page to another
H
anywhere on the internet.
TML: Hypertext Markup Language, the standard markup language for document
H
creation.
● T
he Web has adecentralised architecture that allowsanyone to create and
publish web pages and resources, making it a powerfulplatform for
information spreading and collaboration.
● T
he Web has transformed many industries and sectors, including education,
commerce, entertainment, and communication, by enabling new forms of
interaction, engagement, and innovation.
● Disadvantages include; lack of online security, privacy, and the digital divide (
Notes by @uzayermasud
the separation of the rich and the poor due to lack of access to technology).
Exam Question:
I t provides a link from one webpage to another which can be anywhere on the
internet. This type of link makes up the ‘web’ in the world wide web.
.1.3 Understand the difference between static and dynamic web page
3
content, and the need to use the different types.
● Hard-coded.
● Typically written in HTML, CSS, and JavaScript, and stored as files on a web
server.
● Easy to create and maintain, and can be served quicklyand efficiently to
users.
● Suitable for websites that have little or no need for user interaction or
personalised content.
● Content that changes based on user input or other external factors, such as
database updates, API calls, or server-side scripting.
● Static web pages arebest for simple websitesthatdon't require much user
interaction or personalised content.
Notes by @uzayermasud
● Dynamic web pages are better suited for websites that require real-time
updates, user input, or personalised content.
● Dynamic pages don’t require knowing HTML because it is done by the
server-side script. Static requires the user to know HTML.
Exam Question:
1. Describe one difference between static and dynamic web pages (2)
tatic web pages are written with HTML whereas dynamic web pages can be written
S
with a server-side script such as PHP, ASP, Python or JavaScript.
2. Discuss the advantages and disadvantages of using a dynamic web page
instead of a static web page. (6)
ynamic web pages are better for websites like Hilmis because he has to
D
continuously update it so he can update his viewers on the places he has travelled
to. With dynamic web pages, hecan update his siteas many times as he wants
whereas with static pages are better for simpler websites which don’t require the
frequent changes.dynamic web pages are also betterfor personalised websites.
Also, using a dynamic web page makes it easier for Hilmi to create and organise his
page because it isnot necessary for him to know HTMLcompared to static pages
where it is a requirement to know HTML, CSS and JavaScript.
Server-side Scripting
● Server-side scripting is executed on the server before the web page is sent to
the client's browser.
● Client-side scripting is executed on the client's browser after the web page is
loaded.
Notes by @uzayermasud
Difference between Server-side and Client-side Scripting
Exam Questions:
State the difference between client-side script and server-side script (1)
Impact
Advantages:
Disadvantages:
● Greater risk of cyber threats, data breaches, and privacy violations,as online
nvironments expose individuals and organisations to new forms of security
e
risks.
Potential
Notes by @uzayermasud
● New opportunities for entrepreneurship and innovation.
● Greater potential for sustainability and social impact,as online platforms and
t echnologies enable new forms of collaboration, resource-sharing, and
collective action.
.2.2 Understand the security risks to personal data stored online and
3
methods of protection.
Security Risks
Protection Methods
Notes by @uzayermasud
.2.3 Understand what a digital footprint (active, passive) is and the
3
positive and negative aspects of these.
Digital Footprint
digital footprint is the digital trail that individuals leave behind as they interact
A
with various online platforms and services. It caninclude any information that
people share online, including social media posts, comments, photos, videos, and
search history.
Positive Aspects
● Can help individuals build their personal brand and establish themselves as
thought leaders or experts in their field.
● Can be used to connect with like-minded individuals or build a network of
professional contacts.
Negative Aspects
● Can lead to reputational damage if the content shared is offensive or
inappropriate.
Positive Aspects
Notes by @uzayermasud
● Can help companies improve their products and services by analysing user
behaviour and preferences.
Negative Aspects
● Can be used to track individuals and collect personal data without their
consent.
● Can be used to create targeted advertising campaigns that invade users'
privacy.
Online Community
nline communities serve as a way for individuals to connect and collaborate with
O
others who share common interests or professional goals, regardless of physical
location or other barriers.
Examples:
● Reddit: a social news and discussion platform where users can share and
discuss content on a wide range of topics.
● Instagram: a photo and video sharing app where users can follow and
connect with other users based on shared interests or hobbies.
● TikTok: a video sharing app where users can create and share short-form
videos around various topics, interests, and challenges.
Notes by @uzayermasud
Professional Online Communities
Examples:
● LinkedIn: a professional social networking site where users can connect with
ther professionals, search for job opportunities, and share industry news
o
and insights.
● Stack Overflow: an online community for programmers to ask and answer
t echnical questions, share knowledge and resources, and build their
professional reputation.
Impact on Individuals
Positive:
● Facilitates the sharing of knowledge, resources, and experiences with others.
● Can help individuals build their personal brand and establish themselves as
thought leaders in their field.
Disadvantages:
● Bullying
Impact on Organisations
Positive:
● Provides a way for organisations to engage with their customers or users and
gather feedback and insights.
● Can help organisations build brand loyalty and community around their
Notes by @uzayermasud
products or services.
● Offers a platform for knowledge sharing and collaboration among employees
or team members.
Negative:
nline communities have the potential to bring about significant positive impacts
O
for individuals and organisations, such as increased collaboration, knowledge
sharing, and innovation. However, they can also have negative impacts, such as
exposure to harmful content, reputational damage, and online harassment, which
must be carefully managed and addressed.
Pay-Per-Click Advertising
Sponsored Content
Notes by @uzayermasud
This can generate revenue for the community platform and for the advertiser.
verall, monetization opportunities in online communities can provide a way for the
O
community platform to generate revenue and sustain itself, while also offering
opportunities for advertisers to reach their target audience in a targeted and
engaging way. However, it's important to consider the privacy and ethical
implications of using customer data and to ensure that any monetization strategies
align with the community's values and goals.
Cloud Storage
loud storage is a service that allows users to store, access, and manage data over
C
the internet, rather than on local storage devices.This data can be accessed from
any device with an internet connection.
Uses
Cloud Computing
Uses:
Notes by @uzayermasud
Impact of Cloud Storage and Cloud Computing
Advantages:
● P
rovides easy and convenient access to computing resources and datafrom
anywhere with an internet connection
● O
fferscost savings by reducing the need for usersto invest in and maintain
their own infrastructure
● F
acilitates collaboration and teamworkby allowingmultiple users to access
and work on the same files or applications simultaneously
● E
nables scalability, allowing organisations to quicklyand easily adjust
computing resources based on demand
Disadvantages:
● R
aises security and privacy concernsrelated to datastorage and access over
the internet.
loud storage and cloud computing have revolutionised the way individuals and
C
organisations store, access, and manage data and computing resources. They offer
convenience, cost savings, and scalability, but also raise important security and
privacy concerns that must be carefully considered and addressed.
Topic 4: IT systems
I T systems are pervasive in organisations. They are used for stock control, booking,
asset management, and logistics. These systems operate effectively because they
are designed and planned. An understanding of conventional notation will enable
students to design systems consisting of both hardware and software components.
Hardware
Notes by @uzayermasud
Software
Processes
he procedures and workflows that define how an IT system operates and how
T
tasks are performed within the system. Processes can be automated or manual and
can involve multiple components of the IT system.AKA the steps taken to
accomplish a certain objective
People
● A group of related components that operate together within a larger group.
ystems have to be deemed fit for purpose and can only be if they meet the
S
requirements determined in an analysis made by clients, reviewers or the system
designers.
S
● et of requirements
● Measurable criteria
● Agreement with customer/client
4.2 Dataflow
4.2.1 Understand the concept of and the need for data flow diagrams.
Notes by @uzayermasud
● reates an overview of the system
C
● Helps visualise the process/dataflow
● Avoids excessive detail at an early stage
● Can be drawn at different levels of complexity
● Allows top-down expansion
● Easy to explain to non-technical audiences
● Shows the system boundaries
● Shows flow to external entities
.2.2 Be able to interpret and create data flow diagrams for a given
4
scenario. (Symbols are given inAppendix 7.)
Notes by @uzayermasud
Information Flow
4.3 Flowcharts
lowcharts are visual representations of a process or system that use symbols and
F
diagrams to illustrate the steps involved in completing a task or achieving a goal.
Flowcharts
Notes by @uzayermasud
4.4 Systems
Advantages
Notes by @uzayermasud
● G
reater access to information and communication, enabling collaboration and
knowledge sharing
● E
nhanced decision-making capabilities through data analysis and
visualisation
● I ncreased convenience and flexibility through remote work and mobile
devices
● P
otential cost savings through reduced need for physical infrastructure and
streamlined processes
Disadvantages
● D
ependence on technology, making individuals and organisations vulnerable
to system failures, cyber attacks, and data breaches
● Potential loss of privacy and security of personal and sensitive data
● I nitial and ongoing costs associated with purchasing, implementing, and
maintaining IT systems
● R
isk of technology obsolescence, requiring regular updates and upgrades to
remain competitive
Data
Refers to raw, unprocessed, and unorganised facts or figures that are collected and
Notes by @uzayermasud
stored by various sources.
Information
efers to data that has been processed, organised, and analysed in a way that
R
makes it meaningful, useful, and actionable.
Key differences
● Data is raw and unprocessed, while information is processed and organised.
● D
ata is not useful on its own, while information provides insights and
knowledge.
● D
ata is the input for generating information, while information is the output
of data processing.
● D
ata is usually represented as numbers or text, while information can be
represented in various formats, such as graphs, charts, reports, and
dashboards.
Sources of data
● A
udio and video recordings, such as surveillance footage or customer service
calls
Structured data
efers to data that is organised and formatted in a specific way that makes it easy
R
to search, analyse, and process. Structured data is typically stored in databases or
spreadsheets and can be easily queried and analysed using software tools.
Examples of structured data include:
C
● ustomer names and addresses
● Sales transactions
● Financial data
Notes by @uzayermasud
● Inventory records
Unstructured data
efers to data that is not organised or formatted in a specific way and is more
R
difficult to search, analyse, and process. Unstructured data is typically stored in
text-based files, such as emails, social media posts, or documents, and may contain
a mix of text, images, and other multimedia elements. Examples of unstructured
data include:
● mails and chat logs
E
● Social media posts and comments
● Images and videos
● Audio recordings
Key differences
● Structured data is organised and formatted, while unstructured data is not.
● S
tructured data is easier to analyse and process, while unstructured data
requires more advanced tools and techniques.
● S
tructured data is typically generated by internal systems and processes,
while unstructured data is often generated by external sources.
● S
tructured data is more easily stored and managed, while unstructured data
requires more storage capacity and management resources.
● ake better decisions
m
● improve efficiency
● enhance customer experience
● gain competitive advantage
● increase revenue
● mitigate risks
● foster collaboration.
Data organisation
atabases provide a structured way to store and organise data, making it easier to
D
find and retrieve information.
Notes by @uzayermasud
Data integration
atabases can integrate data from multiple sources and applications, providing a
D
unified view of data that can be accessed by multiple users.
Data security
Data consistency
atabases can enforce data consistency and integrity rules, ensuring that data is
D
accurate, complete, and up-to-date.
Data scalability
atabases can handle large volumes of data and can scale to meet the needs of
D
growing organisations.
Data accessibility
atabases can provide fast and efficient access to data, even for complex queries or
D
large datasets.
Tables
relational database consists of one or more tables, which are used to organise
A
and store data. Each table represents a collection of related data that has a unique
name.
Fields
ach table contains fields, which are used to store individual pieces of data. A field
E
represents a single category of data, such as a name, date, or amount.
Records
record is a collection of related fields that describe a single instance of the data
A
being stored. Each record represents a unique entry in the database.
Primary keys
primary key is a unique identifier for each record in a table. It is used to ensure
A
that each record can be uniquely identified and to enforce data integrity constraints.
Foreign keys
Notes by @uzayermasud
foreign key is a field in one table that refers to the primary key of another table.
A
It is used to create relationships between tables and to enforce referential integrity
constraints.
Composite keys
Entities
One-to-one relationship
One-to-many relationship
Notes by @uzayermasud
one-to-many relationship is a type of relationship between two entities where one
A
entity can be associated with many instances of the other entity, but the other
entity can be associated with only one instance of the first entity.
Many-to-many relationship
.3.1 Understand how and why SQL is used to manipulate data and data
5
structures.
● c
reate and modify the structure of a database, including tables, fields, and
relationships between tables.
● q
uery data in a database to retrieve specific information based on certain
criteria.
● c
reate views, which are virtual tables that are based on the result of a SQL
statement.
● create and manage user accounts and permissions for accessing a database.
.3.2 Know how to select and use appropriate SQL commands, features
5
and functions to manipulate data:
ure, here's a brief explanation of how to select and use appropriate SQL
S
commands, features, and functions to manipulate data.
● Use the SELECT statement to retrieve data from one or more tables.
● Use the WHERE clause to filter data based on specific criteria.
● Use the GROUP BY clause to group data based on specific columns.
Notes by @uzayermasud
● Use the HAVING clause to filter groups based on specific criteria.
● Use the ORDER BY clause to sort data based on specific columns.
Example:
ELECT
S column1, column2
FROM
table1
WHERE
column1 =
'value'
GROUP
BY
column2
HAVING
COUNT
(*) >
1
ORDER
BY
column2
ASC;
● U
se the appropriate data types for each column, such as VARCHAR, INT,
DATE, etc.
Example:
CREATE
TABLE
table1 (
column1
VARCHAR
(
50
),
column2
INT,
column3
DATE
);
● Use the INSERT INTO statement to add new records to a table.
Notes by @uzayermasud
Example:
NSERT
I INTO
table1 (column1, column2, column3)
VALUES
(
'value1'
,
123
,
'2023-05-06'
);
PDATE
U table1
SET
column1 =
'new_value'
WHERE
column2 =
123
;
ELETE
D FROM
table1
WHERE
column2 =
123;
● U
se the UNION operator to combine the results of two or more SELECT
statements into a single result set.
● U
se the JOIN clause to combine data from two or more tables based on a
common column.
Example:
ELECT
S column1, column2
FROM
table1
UNION
SELECT
column1, column2
FROM
table2;
ELECT
S table1.column1, table2.column2
FROM
table1
INNER
JOIN
table2
ON
table1.id = table2.table1_id;
U
● se the % wildcard to match any sequence of characters.
● Use the _ wildcard to match any single character.
Notes by @uzayermasud
Example:
ELECT
S column1
FROM
table1
WHERE
column1
LIKE
'value%'
;
ELECT
S column1
FROM
table1
WHERE
column1
LIKE
'v_lue'
;
● Use the GROUP BY clause to group data based on specific columns.
● Use the ORDER BY clause to sort data based on specific columns.
● Use the COUNT function to count the number of records in a table or group.
Example:
ELECT
S column1,COUNT
(*)
AS
count
FROM
table1
GROUP
BY
column1
ORDER
BY
count
DESC;
he pervasive use of technology has an impact, not just for individuals, but also for
T
the environment and society as a whole. The ability to make judgements about
technology is underpinned by an understanding of the moral and ethical issues and
the legal frameworks that are part of our lives.
6.1 Environmental
Notes by @uzayermasud
Construction
● E
xtraction of raw materials required for the manufacturing process can lead
to land and water pollution, deforestation, and soil erosion.
● E
nergy-intensive manufacturing processes require significant amounts of
electricity and generate greenhouse gas emissions.
● M
anufacturing of certain components of IT equipment requires the use of
hazardous chemicals, which can have negative impacts on both the
environment and human health.
Use
● I T equipment consumes significant amounts of energy during its use, which
can contribute to greenhouse gas emissions and global warming.
● O
veruse and inefficient use of IT equipment can lead to unnecessary energy
consumption, which can increase energy costs and exacerbate the
environmental impact.
Disposal
● E
-waste contains hazardous chemicals that can release toxic substances into
the environment when not disposed of properly.
● L
andfills and incineration of e-waste can result in the emission of toxic gases
and contribute to air pollution and climate change.
Environmental Monitoring
● I T solutions can help monitor air quality, water quality, and weather
conditions, providing valuable data for environmental research and
decision-making.
● S
mart sensors and remote monitoring technologies can detect and track
changes in the environment, allowing for more efficient and timely responses
to environmental issues.
● A
dvanced analytics and machine learning algorithms can analyse data
collected from environmental sensors and provide insights for environmental
Notes by @uzayermasud
management and policy-making.
● I T solutions can help optimise resource usage, such as energy and water,
through real-time monitoring and control.
● S
mart home technologies can adjust heating, cooling, and lighting based on
occupancy and weather conditions, reducing energy waste and saving money
on utility bills.
● S
mart city solutions can optimise traffic flow and public transportation
systems, reducing congestion and carbon emissions.
● C
loud computing and virtualization technologies can reduce the energy
consumption of data centres and IT infrastructure, leading to significant
energy savings.
.2.1 Understand the legal issues associated with the use of information
6
technology systems:
Data Protection
● O
rganisations must comply with data protection laws that regulate the
collection, storage, and use of personal data.
● P
ersonal data must be processed lawfully, fairly, and transparently, with
appropriate security measures in place to protect against unauthorised
access, loss, or theft.
● I ndividuals have the right to access their personal data, request that it be
corrected or deleted, and object to its use for certain purposes.
Copyright
● C
opyright laws protect the rights of creators of original works, including
software, music, videos, and written content.
● T
he use or distribution of copyrighted material without permission or proper
attribution is illegal and can result in legal action.
● F
air use exemptions allow for limited use of copyrighted material for certain
purposes, such as criticism, commentary, or education.
Computer Misuse
Notes by @uzayermasud
to computer systems, networks, or data.
● H
acking, malware, and phishing attacks are examples of computer misuse
that can result in criminal charges and penalties.
● P
enetration testing and ethical hacking are legal ways to test the security of
computer systems with permission and under specific conditions.
Intellectual Property
● I ntellectual property laws protect the rights of creators of new inventions,
designs, or processes, including patents, trademarks, and trade secrets.
● O
rganisations must respect the intellectual property rights of others and
obtain appropriate licences or permissions to use patented technology or
trademarks.
● Trade secret theft or misappropriation can result in legal action and damages.
.2.2 Understand the moral and ethical issues associated with the use of
6
information technology systems:
Privacy
● I T systems can collect and store personal data, raising concerns about
privacy and the potential misuse of personal information.
● O
rganisations must ensure that personal data is collected and used in a
transparent, lawful, and ethical manner.
● I ndividuals have the right to control their personal data and be informed
about how it is used, shared, and protected.
Inclusion
● O
rganisations must ensure that their IT systems do not discriminate against
any group or individual and promote equal opportunities for all.
● I nclusive design can improve the user experience and increase the adoption
and effectiveness of IT systems.
Civil Liberties
● T
he use of IT systems can raise concerns about civil liberties, such as
freedom of speech, assembly, and association.
Notes by @uzayermasud
● O
rganisations must ensure that their IT systems do not infringe on civil
liberties and promote democratic values and principles.
● G
overnment surveillance and censorship of online content are examples of
civil liberties issues related to the use of IT systems.
Access
● O
rganisations must ensure that their IT systems are available to all users and
do not exclude any group or individual.
● D
igital divide, net neutrality, and access to education and healthcare are
examples of access issues related to the use of IT systems.
Accessibility
● O
rganisations must ensure that their IT systems are compliant with
accessibility standards and guidelines, such as the Web Content Accessibility
Guidelines (WCAG).
● A
ssistive technologies, such as screen readers and voice recognition
software, can improve accessibility and usability for people with disabilities.
Expression
● T
he use of IT systems can facilitate the expression of diverse views and
opinions, promoting freedom of expression and democracy.
● O
rganisations must ensure that their IT systems do not suppress or censor
legitimate expressions of opinion and promote pluralism and tolerance.
● H
ate speech, cyberbullying, and online harassment are examples of
expression issues related to the use of IT systems.
Association
● T
he use of IT systems can facilitate the formation of social groups and
communities, promoting social cohesion and mutual support.
● O
rganisations must ensure that their IT systems do not exclude or
discriminate against any group or individual and promote inclusivity and
diversity.
Notes by @uzayermasud
● O
nline radicalization, hate groups, and online fraud are examples of
association issues related to the use of IT systems.
6.3 Society
Smart Cities
● U
biquitous wireless access enables the creation of smart cities, where IT
systems are used to manage urban infrastructure and services.
● S
mart cities can improve the efficiency and sustainability of energy,
transportation, and waste management systems.
● S
mart city applications, such as traffic management, smart grids, and
intelligent building systems, rely on ubiquitous wireless access to collect and
analyse data in real-time.
Location Awareness
● U
biquitous wireless access enables location awareness, where IT systems can
track and analyse the location of people and objects in real-time.
● L
ocation awareness can improve the efficiency and safety of transportation
systems, emergency response, and supply chain management.
● L
ocation-based applications, such as GPS navigation, location-based
advertising, and geofencing, rely on ubiquitous wireless access to provide
accurate and reliable location data.
Notes by @uzayermasud