Sei sulla pagina 1di 25

ICT Unit 1

Topic 1: Digital Devices

Personal digital devices include:


Mobile phones
Media Players (like MP3 players)
Tablets (like iPads)
Digital cameras
Video cameras
Games consoles
Laptops
Netbooks
E-book readers
Digital photo frames

Digital devices allow people to communicate at any time and wherever they are through:
Text Messages (Short Message Service; SMS)
Social networking sites
Instant messaging
Media Messaging Service (MMS; picture messages)
Email
Voice and video calls

Uses of Digital Devices:


Leisure time - streaming films, playing games, taking photos etc.
Work life - working from home with laptops and internet connections etc.
Travel - using GPS to find locations etc.

Teenagers - To use social networking sites; internet connection.


Business people -To send and receive emails, so they might want a QWERTY keyboard on screen
that is easy to use.
Old people - Large screen and an easy-to-use interface.

When choosing any digital device (like a laptop), people will have wants (it would be nice to have these
features) and needs (it MUST have these features).

i.e. Laptop
Wants Needs
A widescreen, as big as possible Something small that I can carry easy
A fast processor for games Something that is not too expensive
When buying any new digital device (like a laptop, mobile phone or tablet), people need
to consider different factors:
Cost
User interface (easy to use?)
Security
Connectivity (does it have Wi-Fi? Bluetooth?)
Storage capacity/memory
Convenience (size, weight)
Compatibility with other devices (like printers)
Speed of internet connection
Purpose of the device

Processor:
There is a processor in all digital devices, from desktop computers to mobile phones.
The processor controls all the functions of the device.
The higher the processor, the faster the device will operate.
The size of the processor is measured in megabytes (MB) or gigabytes (GB).

Memory:
While the processor is working, it needs to store the program instructions and data in its
internal memory.
Different devices have different amounts of internal memory which is measures in
bytes.
In addition to internal memory, digital devices contain components that can store data.
In a laptop, for example, data is stored on a hard disk drive.
Hard disk drives contain moving parts so do not often feature in portable devices
because they could get damaged.

Flash memory is added memory/storage space to a digital device.


This could be:
Secure Digital Card (SD card)
Micro SD Card (for smaller devices; like phones)
SDXC Card (Extended Capacity Card stores up to 2TB)
USB Drive (or memory stick)
SDHC (High capacity card up to 32GB)

1000 Bytes 1 Kilobyte (1 KB)


1000 Kilobytes 1 Megabyte (1MB)
1000 Megabytes 1 Gigabyte (1GB)
1000 Gigabytes 1 Terabyte (1TB)
Peripherals - Additional devices that can be added to your personal digital device.
Peripherals for people with disabilities consist of speakers, eye-controlled mouse, and Braille keyboards.

Peripherals can be grouped into three:


Input devices
Output devices
Storage devices

Input devices:
Input devices - Allow users to give instructions to the device or input data.
These include:
Mouse
Keyboard
Controller
Webcam
Microphone
Scanner

Output devices:
Output devices - Allow users to see or hear information.
These include:
Speakers
Headphones
Printer
Headset
Screen

Storage Devices:
Storage devices Any computing hardware that is used for storing, porting and extracting data files and
objects.
These include:
USB Drive
SD Card

Mobile Phones:
Mobile Phone A wireless telephone with access to a cellular radio system.
Smart Phone A mobile phone that performs many functions other than its intended purpose. i.e. Being
able to take pictures.

The most widely used personal digital device is the mobile phone. Modern phones do much more than
just allowing users to make and receive calls.
Theyre now multifunctional devices because they have additional features like:
Internet browsing
Entertainment (games, music, videos)
Camera/Video camera
Security:
Mobile phones and the data they contain must be kept safe.
People should hide their phones when not in use to prevent theft from cars etc.
Set a PIN, password or biometric (finger print) lock to prevent unauthorised access.
Restrict Bluetooth usage Blue jacking is where people nearby send anonymous
messages via Bluetooth.
Record the unique IMEI number the mobile service provider can block the phone
using this number if its stolen.

Responsible Use:
Dont use mobiles in quiet places (like libraries!)
Dont send inappropriate/bullying messages
Dont overuse (you could get repetitive strain injury RSI)
Dont take someones photo without permission
Recycle old phones
Dont use mobiles whilst driving
Dont use whilst walking theres a risk of accident

Personal Computers:

Desktop Computes Laptops


- 500 GB - 1 TB
- Heavy (22 lbs) - 5 lbs
- Variety of external ports for printers, - Portable
scanners, etc. - Many external ports
Netbooks Tablets
- 1 GB - 16-32 GB
- Lightweight - 1 lbs
- Cheap - Portable
- Potable - 10 tall and 8 wide
- 3 lbs
- Screen 10 or smaller

To compare personal computers, you need to consider:


Processor Speed a quick processor means a fast computer.
RAM more RAM (memory) will mean more applications can run at once.
Storage higher capacity means more files can be stored.
USB Ports many peripherals use USB connections.
Battery Life for portable devices, long battery life means less frequent
charging.
Wi-Fi allows wireless connections.
Digital Devices away from home:
Roaming Using a mobile phone outside the UK Turned off during travel as its
expensive.
Hotspot A venue that offers a wireless internet connection.

Heath Risks Causes Possible Solutions

o Looking at screen for too long o Take regular breaks away from the screen
Eye
o Sunlight/artificial light shining on o Adjust the screen
Strain
monitor o Use an antiglare screen

Repetitive
o Performing repeated actions, for o Use wrist rest to support your hands
Strain Injury
example clicking the mouse o Take breaks from repeated actions
(RSI)

o Sitting in the wrong position o Change height of the chair/screen


Neck/Back
o Sitting in the same position for a o Adjust the lumbar support
Problems
long time o Move the computer closer or further away

o Sitting in the wrong position o Adjust the chair so your feet are flat on the
Pain in knees
o Sitting in the same position for a ground or use a foot rest.
and legs
long time o Take regular breaks to stretch your legs

More modern cameras/camcorders allow users to:


Zoom in using optical or digital zoom
Take photos/record video and sound
Download files to a computer using USB or Bluetooth
View files on a TV using USB or HDMI ports
Store files using SD and micro SD cards
View images/videos on the built-in LCD screen

Digital zoom - Enlarges part of the image which can become blurred but optical zoom moves
the lens closer.

Some cameras/camcorders also have:


GPS receiver allows the place an image/video was taken to be stored with the
file
Wi-Fi this allows users to email pictures or upload them directly to online
photo galleries (on Flickr or Facebook, for example)
Media Players:
Media players Music/ Video players. i.e. iPods.

The key features of them are:


Small, light and portable
Use solid state memory so they dont skip when playing songs
Long battery life
Hold a lot of media on inbuilt memory
Playlists can be set
Can lock to prevent accidental activation
Have a simple interface

Common file types that Media Players support are:


MP3 and WMA for Audio (sound)
JPEG, GIF and PNG for images
MPEG-4 and MWV for video

Digital Rights management (DRM) - Some files downloaded to media players cannot be copied
or transferred to others. This is to protect the copyright holder of the material to prevent illegal
copying.

Downloading VS. Streaming:


Most users download audio and video files to store and play on their media players.
If the device has Wi-Fi connectivity, then the user can stream media. The file is sent in
compressed form over the internet and displayed by the viewer in real time.

Expansion Capability - Some devices use removable storage formats (such as SD cards) and are

Advantages of streaming video Disadvantages of streaming video

o Saves time users do not have to wait to o Cannot keep a copy for viewing offline.
download a full video. o Requires internet access.
o Uses less storage space. o Buffering can interrupt playing.

said to have expansion capability because new or higher-capacity memory cards can be easily
inserted.
Games Consoles:
A video games console is a computer than enables games to be played on television or through
a digital projector. These are multifunctional devices. They also allow users to browse the
internet, watch videos, listen to music etc.

There are whole range of peripheral devices available. These include:


Controllers (some are wireless)
Headsets (some are wireless)
Storage drives
Webcams
Speakers
Microphones
Motion Sensors (like Kinect)

Games Consoles Risks:

Health Risk Causes Prevention

Overuse o Set sensible time limits


o Pressing buttons can lead to RSI
injuries o Take frequent breaks
o The amount of time spent
o Set sensible time limits
Obesity playing games and obesity are
o Do physical activity when not playing games
linked.
Muscle o Take regular breaks to walk around and
o Hours in the same position
and joint stretch
impacts on posture and spine
problems o Adjust furniture heights
o Eyes become fatigued when
o Adjust screen contrast and brightness
Eye strain focusing at the same distance
o Take gaze breaks.
for a long time.
Satellite Navigation:
Sat Navs use GPS to plan routes and give directions.

Sat Nav - A device, usually used in a car, that gives directions based on information received from a
series of satellites.

GPS - Global Positioning System.


GPS - A navigational system used in many devices which gives current location, directions from current.

Drivers use Sat Navs to get directions but also to:


Check their speed
Warn about speed cameras
Get live traffic reports
Avoid congestion with rerouting
Find conveniences such as petrol stations on route

There are risks involved when using Sat Nav and driving. Drivers must make sure the Sat Nav does not
block their view and that they do not take their eyes off the road when driving.
Sat Navs help reduce accidents by speaking directions to the driver and showing the road ahead.

Satellite Navigation Aid: Sat navs receive signals from the GPS system of satellites that triangulate the
position. This involves calculating the distance from each satellite by measuring the time delay to
receive signals from each one. The position is compared to pre-prepared electronic maps and the
position is then indicated on the display.

Convergence - When a digital device takes on the functions normally found on another device.

For example, GPS is now found on Smart Phones and sales of Sat Navs are falling because of
this.

+ves -ves
More likely to carry a phone than a Sat Nav Drains battery quickly
Lighter, Smaller Phone wont always update quickly

Geo tag - To attach the exact geographical coordinates of longitude and latitude to a digital
image, giving the location of where it was taken.

Digital Devices in Organisations:


Digital devices are now used by businesses, schools, hospitals and countless other organisations
to improve how they communicate and operate.
I.E., it is now easy for businesses to create a website using technology they own.
Communication is quicker with e-mail and mobile phones.
Software Programs that give instructions to a computer and which allow the user to carry out
different tasks.
Hardware - The physical parts of a computer system, e.g. the CPU and the devices connected to
it.
Topic 2: Connectivity

Home Networks

Most homes with a home network use it mainly to allow users to share an Internet connection.
A local area network (LAN) connects all the computers in a house so that resources can be
shared.

Benefits of a home network include:


Sharing the Internet connection
Sharing files, including backing up files
Sharing peripherals, for example printers
Connecting to the Internet from a home network requires a router.

Cable Connection to Router (Ethernet) Wireless Connection to Router (Wi-Fi)

Cables must be run from the router to all All you need is a wireless router
Setting up
rooms
Cost Installation is expensive cheaper; only the cost of the router
Bandwidth Very fast (1 Gigabit per second) Slower; 54 megabits per second (Mbps)
Should not experience any interference Can be affected by walls, distance,
Interference
electronic devices
Good; users are directly connected to the poor; anyone can connect unless a
Security
network password/key is set
You cannot connect in a room without a Connect from any room and stay
Mobility
socket connected moving

Network Security

Wireless networks are less secure than cabled ones.


If you dont secure your network, anyone within range can access it.
To secure the network, people should be advised to change the default password on their
router.
People should set up some form of encryption.
Encryption - The process of scrambling data before it is sent over a network.
Combining Technology

Digital devices can be used together.


Mobile phones and laptops, for example, are compatible because they can communicate via
Wi-Fi or Bluetooth technology and they both have USB ports.
A photograph can be taken on a mobile phone, for example, and shared online after being
uploaded to a laptop.

Bandwidth and Latency

Bandwidth - The number of bits that can go through the network connection in one second
(measured in bits per second, bps).
Latency - The time in milliseconds between a bit leaving one device and arriving at the other. It
is measured in milliseconds (ms).

For streaming videos, you need a connection with high bandwidth otherwise the video pauses.
To get quick search results from Google, you need a low latency network connection so that
information arrives quickly.

Wi-Fi and Mobile Broadband

The most common ways of connecting to the internet on the move are Wi-Fi and mobile
broadband.
Wi-Fi devices need to be within range of a wireless access point (hotspot).
This connection is good because it has a good range (60 metres from the hotspot) and is quite
widely available.
This connection is not so good because, sometimes, hackers can set up fake hotspots putting
users at risk.
3G and 4G can be used which have greater coverage than Wi-Fi.
3G is more secure than Wi-Fi because data is encrypted.
3G costs money and downloads are limited.

Communication Protocols

Protocols - Rules that devices follow when they communicate with each other.
VoIP (Voice over Internet Protocol) is the set of rules for transmitting audio messages over the
Internet. These help people make free voice calls or, combined with a webcam, video calls.
POP3, IMAP, SMTP these are the rules used when sending emails.
HTTP this is the protocol of the World Wide Web (WWW). HTTPS is the secure version of this.
Security Risks

When you connect a computer to a network, there are security risks that you need to be aware
of and how these can be prevented.
When you connect to the Internet, your computer is visible to billions of computers around the
world.
To protect yourself, use a firewall.
Firewall - Hardware/software tool which controls the data flowing in and out of the network.

Data can also be stolen through unauthorised access. People should set secure passwords
consisting of numbers, punctuation and upper and lower case letters.
People should also lock their computer when they leave it unattended.
To prevent physical theft of the computer, chains and locks should be used to further protect
data that is saved on the machine itself.
Topic 3: Operating Online

The Internet is a huge network that links networks of computers all over the world.
All of the computers use the same protocol (rule) TCP/IP so they an communicate and send
data to each other.
One of the most widely used services on the Internet is the World Wide Web (WWW) which
uses the HTTP protocol to allow users to access the documents that we call web pages.

To connect to the Internet, you need to sign up with an Internet Service Provider (ISP).
ISPs are companies that provide customers with a means to connect to the Internet; like BT, Sky
and Virgin Media.

People need to consider many things when they choose which ISP (company) to sign up to:
Cost how much is the monthly fee?
Bandwidth how fast is the connection?
Download limits some ISPS have download limits!
Security ISPs might provide services like parental controls or virus protection.
Reliability how reliable is the connection/service?
Support does the ISP offer good customer support?

Communicating on the internet:


Email Sending messages
Can be accessed on a range of devices
Blogs Shared online diaries
Post and share experiences
Social Networking Sites that allow chat, messaging, file sharing, email
Voice over Internet Needs fast internet connection i.e. Skype

Security Measures:
Passwords are used on the Internet as a security measure to protect
personal details.
To enhance security, sometimes security questions are asked when
signing up to a website.
Security questions help further protect personal information and can be
used if a user forgets their password.
To prove you are human, a captcha is sometimes used when signing up
to some websites.
Personal Space:
You can design your own websites and blogs and have access to your own social networking
profile pages.
You need to be careful because what you publish online tells the world what you are like!
So, follow these basic rules:
Dont post anything online that you would not want made public.
Minimise details that identify you or your whereabouts.
Keep usernames, account numbers and passwords a secret.
Only share your screen names with people you know.
Dont share things with people you do not know.

Stealing Information:
Personal details are valuable and can be stolen online.
Filling in online forms can be one way criminals steal personal data. People need to make sure
they are using a secure website by looking for https:// in the address bar or looking for a
padlock on display.

Tricking people into filling in an online form is called overt data collection because people know
this data is being collected.

Hackers can install software called Trojans on your computer. These spy on users and record
what keys are pressed on the keyboard or take pictures of the screen.

Secretly installing software on a persons computer is called covert data collection because the
people dont know that this information is being collected.

Identity Theft:
If fraudsters find out peoples personal details they can use them to make money by pretending
to be that person.

They could easily open bank accounts and apply for loans all in someone elses name.
Data is valuable. The government, for example, sell the personal details that people give when
they tax their car through the DVLA to private companies.

This is the reason sites like Facebook allow users to sign up for free they can find out lots
about what people like as well as their habits which can then be sold to companies or used to
show users advertisements related directly to their interests.
Preventing Stolen Information:
People need to take precautions to make sure their personal information is not stolen.

Controlling Cookies
Cookies track which websites you have visited to make sites load quicker or remember
details about your previous visit.
People should set their preferences to only accept cookies from trusted websites.
People should also delete cookies regularly.
Trusted websites will have a privacy policy that makes people aware that cookies are
being used.

Phishing
Phishing is a scam that tricks people into giving out personal details (overt data
collection). This is commonly done using bogus emails.
People need to be cautious when giving out information banks never ask for
passwords or personal details, especially via email and people to need to consider this
when they receive such correspondence.
People also need to look out for the fact that a phishing email does not contain their
name and will probably contain web addresses that are not that of the official company.

Preventing Spyware
Spyware is software that is installed on a persons computer without them knowing.
Spyware is usually installed when people download files online or when they open email
attachments from fraudsters.
To prevent spyware, people need to use a firewall.
People should also install antispyware protection software.
Care should be taken when downloading free programs or music.

Laws:
The Data Protection Act 1998: this law ensures companies that hold data are required to keep it
secure, not keep it longer than needed, keep the data up to date and not use the data for any
other purpose without our consent.

The Computer Misuse Act 1990: this law makes it a criminal offence to:
Log into another persons computer without permission
Steal someones documents or programs
Destroy or corrupt another users files or create viruses
Gain access to financial or administrative documents and using this information
to commit further crime (like fraud)
Copyright:
Copyright protects peoples original work from being used without their permission.

Original work includes;


Literature (writing)
Music
Art
Images
Software
Drama
Films

People spend a lot of time and money creating original work so they deserve to be paid for
them. If professional artists cannot make any money from their work, then they will not be able
to afford to create any more.
Breaking copyright law (by downloading music illegally or sharing videos on the Internet) is
called Copyright Infringement and is a crime.
People can be prosecuted for copyright infringement and could go to prison or face a fine.
Internet Service Providers may prevent use of the Internet for people breaking copyright laws.
Topic 4: Online goods and Services

Online shopping refers to the buying and selling of goods and services using websites accessed
through the Internet.
Physical goods can be purchased online (books etc.) as well as non-physical goods like music
downloads.
Some companies that sell only online include Amazon.

Online Shopping
+ves -ves
Greater choice of products available people Delivery is usually an added expense.
are not limited to one geographical area
People can shop 24/7 People must submit personal information
through a website to shop online.
People can be in the comfort of their homes Greater risk of fraud as people risk not
receiving goods or having personal details
stolen on fraudulent websites.

Impact on businesses:
Online businesses can be located anywhere so they do not have to pay expensive High Street
rents.
Online businesses often need less staff, again saving money.
Online businesses can have a greater range of products because they do not have to have
anything on display.
Online businesses can attract custom from all over the world.

Online Auctions:
Online auctions are like traditional auctions but buyers and sellers can be all over the world.

+ves -ves
Users can search for products easily. Users can be open to fraudulent behaviour
when buying and selling, though online
auctions work hard to reduce this happening.
Rare items can be found easier. Users must be registered and often must sign
up to a third party online payment system
(like PayPal).
Users often get better deals online because Users who bid on an online auction must wait
they can search for cheaper products and for the auction to end before they know they
could win auctions at low prices. will have made a purchase.
Online Services:
Education Students can have online accounts on school websites or VLEs where they can
access teaching materials and submit assignments.
The website you have accessed to get to this PowerPoint is an example of how online services
have helped in education.

News - News reports are now not just printed in the newspapers but also published online.
These sites are usually free but some offer users a subscription.
Users can use RSS feeds (automatic updates on webpages) to get up-to-date information.

Banking - Online banking now makes it easy for users to check their balances and transfer
money. Customers can now access their account securely using mobile phone apps too.

Online Gaming - Online gaming enables players to connect via the Internet and interact with
each other.
A central server runs the game software and streams each players position and actions to all
players over the Internet.
Players need a high bandwidth and low latency Internet connection to avoid lag when gaming.
Some games store data such as graphics and sound locally on players computers.

Transactional Data:
A transaction occurs every time you buy or sell something.
Every time you buy something online, data about the transaction is saved.
Personalised information is often stored in cookies.
Cookies - Small text files that are created on your computer when you visit a website.
Transactional data includes personal information about the buyer and details about the
purchase they made (like price and item information).

Transactional data is valuable to a company because it allows them to keep a record of your
purchase and allows them to track your delivery.
The data can then be used to understand customers buying habits and see any trends.
This data can also allow websites to display products that it thinks you might be interested in
based on what you have purchased before.
The data often allows for a more personalised online shopping experience.
Internet Advertising:
Internet advertising is another way in which organisations operate online.
Internet advertising can be targeted at customers.
It allows for statistics be gathered (like how many people have clicked on the advert itself).
It reaches a wide range of customers.
It can reach customers faster than traditional forms of advertising.
Internet advertising can be done on search engines. This takes a users key words to display
adverts that are appropriate for to their search.
Internet advertising can also be done on social networking websites.
These websites use the personal information they know about their users to display
advertisements they think will be appropriate.
Facebook has over 800 million users worldwide and can select to advertise to locations, age
groups and interest groups.

Viral Marketing:
Viral marketing - When an organisation creates interesting and entertaining content that
making people want to pass it on to their friends using social networking, email and texts.
This type of marketing is very cheap because the organisation does not need to pay for adverts.
Memorable content means that people remember the brand name.

Avoid Targeted Marketing:


Targeted marketing is when online services use personal information about you to display
adverts appropriate for your age, location or interests.
To avoid this type of marketing people can opt out of sharing personal information with other
organisations when creating accounts online.
People can also delete cookies from their computers.
People should be careful with what information they are adding to online profiles.

Online payments:
There are four ways of paying online:
Credit/debit cards
Online bank transfer
Third party payment processors
Online coupons/gift vouchers/eVouchers

Credit/debit cards
Debit cards take payment directly from a customers account.
Credit cards are like borrowing money from the bank, customers need to pay the money back
later, often with interest.
Credit Card Verification:
The Credit Card Verification (CCV) code is the number on the back of the card.
This number is not included on the magnetic strip or chip itself.
Entering this code means that the person must have seen the credit card (so it enhances
security).

Online Bank Transfer:


Customers can make online payments directly from their account to other accounts if they
know the bank account details of who they are paying.
Online banks keep customers safe from online fraud by checking accounts to make sure there is
no unusual activity.
They also sometimes provide login protection schemes such as PINsentry devices that look
like calculators that generate codes to confirm the users authenticity.

Online Coupons/ Vouchers:


Many online shops now offer online gift eVouchers or money off coupons.
These can be sent to people electronically by email, or printed out and sent by post.
To redeem the gift eVoucher or coupon the recipient creates and online account and enters the
unique reference numbers given on the eVoucher or coupon.

Third Party payment processors:


Third party payment processors are trusted organisations who stand between the customers
and the retailers so payments are not made directly.
These services, like PayPal, mean that sellers do not need to offer a secure site (which can be
expensive).
For the buyer, these services mean that users are not exposed to fraud.

Consumer protection:
Consumer protection is all about the laws that exist to protect the rights of people who are
buying things.
When you buy something, the item must be of satisfactory quality, fit for purpose and as
described if not, the item must be replaced, repaired or the customers money refunded.
If you buy from an online retailer in the UK, you have the same rights as if you bought the item
in a real shop.
There is also a cooling off period when buying online this means orders can be cancelled up to
seven working days after receiving an item.
Online software:
Locally installed software means that a program is installed on your computer. It is now
common, however, to use hosted software this is not installed on the users machine
instead, they use the Internet to access the program (like Google Documents, instead of
Microsoft Word).

+ves -ves
Software doesnt take up space on your An Internet connection is required to access
computer the software
You can access the software on any Its not as secure as local software
computer

Online Storage:
Similarly, people now use online storage instead of saving documents locally (on their
computer). I.e. OneDrive.
Again, there are problems with an Internet connection being required and with security.
People do, however, save disk space on their computer when using online/cloud storage and
they can access their documents no matter where they are!

Search Engines:
Search engine A computer program that searches for web content that contains or is tagged
with key words.
Choosing key words when performing a search is important and people can narrow their search
down by doing a more advanced search (by deciding what not to see or where to search).
People need to realise that no one checks or verifies that websites contain truthful information,
so users should always double check information they get from a search engine.
Topic 5: Online Communities

Online Communities:
Online community - A group of people who meet up online.
These include blogs, social networking sites, VLEs, wikis, forums and virtual worlds.
Each type of online community has different:
Functions the reasons for the community
Features the things users can do in that community
Target Audiences - who theyre aimed at.
Most online communities require users to have an online account with a
username and password.

Online workspaces and VLEs:


Online workspaces provide an online community for people who work together.
VLEs - Online spaces where teachers can share resources with students and students can access
them from school or at home.
Virtual Learning Environments (VLEs) provide an online community for a group of people who
learn together.
Some VLEs let students see their timetables and reports too.

Social Networks:
Social networking site - An online community where people are linked together using their
personal information.
There are lots of social networking sites available, each with their own functions and target
audiences. i.e. Linkedin, is aimed at business people with advice given by industry experts.

+ves -ves
Easy way to keep in touch with people. Some people create fake profiles.
Easy to make new friends with similar Loss of privacy / privacy issues.
interests.
Often free to join and use. Online bullying.

Reference Sites (User Edited):


User-generated reference site - Allows users to contribute and share information.
Wikipedia is an example of one of these. Users can add or edit content.
These websites are good because the information on them is usually very up to date.
They often contain a lot of information too.
People can, however, add biased, inaccurate or untrue information.
The information on these sites can also become disorganised and include errors or duplication.
Social Bookmarking Sites:
Social bookmarking websites are like wikis but users add bookmarks/weblinks instead of
content then share these with others.
Pinterest is an example of one of these sites users organise and share images they like on the
web on their own pinboards.

Impact on working practices:


Online communities have changed peoples working lives.
Some workers can telecommute and work from home. They no longer need to live close to
where they work.
Cloud computing - Allows workers to access documents and software from anywhere they can
get online.
Decisions can be made effectively through an online work space.
Employers can research potential employees through social networking sites.
There are some negatives though;
People now avoid face to face contact and email people who are just a few desks away.
Workers without an Internet connection may feel left out of the decision making process.

Socialising:
Socialising is about how you get along with others.
The Internet means that people can keep in contact easily and messages can be sent 24/7.
People do, however, need an Internet connection to keep in touch and socialise online.
Some people can pretend to be someone theyre not, this is made easier with the Internet.
Some people spend less time with their real friends because they socialise online.

Acceptable Use policy:


When you set up an online account you are asked to agree to the rules given in an acceptable
use policy.
Breaking the rules will result in your online account being withdrawn.
These policies are like the one you see when you log-on to a school computer and must agree
to the terms of use that are shown on the blue and white screen.

Globalisation:
Globalisation - The increasing integration of economies and societies around the world,
particularly through international trade.
ICT and the Internet have sped up globalisation.
It is now easy to make purchases from all over the world at any time of the day.
Some companies have gone global with the help of ICT and the Internet.
Some countries now censor or control access to social networking sites and search engines to
help them control access to information.
Topic 6: Issues

Security issues:
Physical threats such as theft, flooding, fire and accidental damage.
To avoid issues here; keep computers locked in rooms and back up any data.
Hackers these try to get access to data without your permission.
To avoid issues here; use firewalls, passwords and encrypt information travelling across
networks.
Phishing this cons people into giving out personal details via email or text.
To avoid issues here; use secure websites, avoid giving out details unless 100% genuine.
Viruses are designed to be harmful to digital devices and spread easily over networks.
To avoid issues here; dont trust attachments on emails from unknown people, install anti-virus.
Bluejacking the process of sending unwanted messages over open Bluetooth connections.
To avoid issues here; keep Bluetooth switched off when not in use.
Cookies storing passwords etc. in cookies makes it easier for others to gain access to your
accounts and personal information.
To avoid issues here; delete cookies!

Monitoring movements:
ICT is used to monitor how we move about and how we communicate:
Passports are scanned and our movements between countries are monitored. Some passports
now also contain a chip with information on.
Your computers IP address provides details about your geographical information.
Mobile phone companies can track your movements and know who you have contacted by
phone or text.
Geographical information from GPS enabled devices can track your position.
The use of credit/debit cards provides a clue to our locations too.

Health and Safety:

Using ICT (health and Safety)


+ves -ves
Easy to keep in contact with people. RSIs can develop from doing the same thing
over and over.
Easier to access information and learn new Eye strain can be an issue when looking at
things. screens for a long time.

GPS helps us find locations and guide us on Radio waves from mobile phones can affect
routes. health.
Digital Divide:
Some people do not have access to ICT the difference between these people and those who
have access to ICT is called the Digital Divide.
There are reasons for this:
Economic some people cannot afford technology and access to ICT/Internet.
Education some people do not know how to use computers.
Disability or illness
Location people who live in remote areas may not be able to get phone or Internet
connections.

ICT and Environment (Sustainability):


E-Waste old computer equipment often ends up in land fill sites. Good practice would be to
send e-waste to less developed countries.
Pollution toxic substances from e-waste can get into soil and water supplies.
Electricity all digital devices use electricity. Production of electricity often generates
greenhouse gases.
Finite resources some elements of digital devices are in short supply and will run out one day.

Laws:
Data Protection Act this law prevents companies sharing your data without you knowing and
legally binds them to protect your information, keep it up to date and delete it responsibility
when they no longer need it.

Computer Misuse Act this law covers the use of computer equipment for illegal means
(hacking, fraud etc.)

Digital Economy Act stops people downloading media (music etc.) illegally.

Potrebbero piacerti anche