Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Pros & Cons of Digital Tech: Entertainment Systems, USBs, Auto Data Processing, & More, Exams of Nursing

Various aspects of digital technology, including entertainment systems, usbs, automatic data processing, and more. Topics covered include advantages and disadvantages, file formats, compression, encryption, and security. Entertainment systems include streaming media, gaming, and social media. Usbs are discussed in terms of their advantages and disadvantages, such as storage capacity and ease of loss. Automatic data processing advantages include complexity and reduced training. The document also covers single-user, multi-tasking operating systems, such as windows 10 and mac osx, and their features.

Typology: Exams

2023/2024

Available from 04/08/2024

Gradesbooster
Gradesbooster 🇬🇧

2.3

(3)

388 documents

1 / 55

Toggle sidebar

Related documents


Partial preview of the text

Download Pros & Cons of Digital Tech: Entertainment Systems, USBs, Auto Data Processing, & More and more Exams Nursing in PDF only on Docsity! BTEC IT Level 3 - Unit 1 What is a digital device? - ✔Piece of physical equipment that uses digital data, such as by sending, receiving, storing or processing it. What 9 types of digital devices are there? - ✔1. Personal Computers 2. Mobile Devices 3. Servers 4. Entertainment Systems 5. Navigation Systems 6. Multifunctional Devices 7. Digital Cameras 8. Data capture and Collection Systems 9. Communication devices and systems What is a personal computer? - ✔A general-purpose computing device small and cheap enough to be used by individuals. How are PCs able to perform common tasks? - ✔By installing a new software application the computer becomes capable of performing a new function. What 3 things do PCs contain? - ✔1. Individual processors 2. RAM 3. hard disk components with expansion ports. What additional capabilities can be upgraded on a PC? - ✔Replacing hard disk, more storage or adding a graphics card to an expansion port, improves graphics processing power. Give 2 examples of a PC - ✔1. Desktop 2. laptop How are PCs used in workplace? - ✔Word processing, desktop publishing, spreadsheets, database management systems, creative tasks (music, film editing). How are PCs used in personal lives? - ✔Accessing Internet, surfing the web/email, gaming (requires expensive graphics card normally) What is a server? - ✔A computer that manages access to different resources and services over a network. How do PCs connect to a server? - ✔Via Ethernet cable and WiFi (forming a network) What is the difference between servers and PCs? - ✔Contain larger storage capacity, higher processing power and larger amount of memory. Give 4 examples of servers? - ✔1. Mail servers 2. web servers 3. print servers 4. file servers How do web servers work? - ✔-Web server stores the web page and associated files. -Client computer makes request for a web page to server (by entering URL). -Web server locates correct files and sends back to client. Why are web servers used? - ✔To manage access to web pages. Why are mail servers used? - ✔To manage access to email How do mail servers work? - ✔-When you write an email/press send on PC, goes to outgoing mail server. -This mail server then sends across a network to recipient's mail server and stores in their mailbox. -When recipient logs into their email client the mail server will forward email to their computer. Why are file servers used? - ✔To store your files such as word processors and spreadsheets so they are accessible from any computer on the network. Why are print servers used? - ✔To share access to a printer. How do print servers work? - ✔By using a print server, you can send your files to print from any computer on the network. What is a mobile device? - ✔A computing device that is designed to be portable as it is compact, light-weight and capable of running for extended periods on battery power. What key feature helps make mobile devices more compact and reduce power consumption? - ✔System-on-a-Chip What is System-on-a-Chip? - ✔The core components of the computer are integrated onto a single chip. (CPU, GPU and RAM) What is a disadvantage of System-on-a-Chip? - ✔It is hard to upgrade a mobile device as all the components are integrated on the chip. What are 2 examples? - ✔1. Tablets What doe most digital camera devices have? - ✔They contain a built-in memory card slot to store the digital pictures and videos directly on the digital camera device. What is the benefit of having a removable memory card in a digital camera? - ✔It allows you to then transfer them to another device so that they can be stored on a computer and displayed on screen. What are 2 examples of digital cameras? - ✔Digital still cameras and digital video cameras. What is a use of a digital camera? - ✔You can upload the pictures/videos and share them as well as edit the photos. What does photoshopping mean? - ✔The use of a software program that we can use to remove blemishes or perform heavier changes to a photo. What is data capture and collection systems? - ✔They input and store data through methods other than direct data entry (such as through a keyboard). The data is entered as a result of a related activity. What does data capture and collection systems allow? - ✔The data to be entered into a computer system directly during the data capture stage and so greatly reduces the amount of human error issues that happen when manually entering data. What are 3 examples of data capture and collection systems? - ✔1. Barcode scanners 2. Optical mark readers (OMR) 3.Magnetic ink character readers (MICR) Where are barcodes used? - ✔On the back of products How do barcode scanners capture data? - ✔They capture data by reading the width of dark and light bars. When the barcode is read it matches it to a database of products on the computer and returns information. Where is OMR used? - ✔Used in shops for inputting lottery tickets How is OMR used in the lottery? - ✔Pre-printed forms like lottery tickets are designed so that when marks are placed on it, the OMR device can detect what numbers you select from the mark's location on the form. What is MICR used for? - ✔Verifying that cheques are legititmate How does MICR verify cheques? - ✔The magnetised ink is used to write a code on the bottom of the cheque. The MICR device reads the magnetic field of the characters to read the code to ensure it is a legitimate cheque. What are communication devices and systems? - ✔A device that is used to move data between two other devices, such as two computers What do communication devices allow? - ✔They allow us to transmit data between devices over a network in various ways. What are 3 examples of communication devices and system? - ✔Network interface cards (NIC), wireless dongles, routers What is the use of a Network interface card? - ✔Allow data to be transferred to and from a networked computer by connecting an ethernet cable. Where are NICs used? - ✔Desktop PCs. What is the use of wireless dongles? - ✔Allows you to either transfer data to a router wirelessly as part of a local area network or connect to a mobile broadband network. Where are wireless dongles used? - ✔Used in laptops. What is the use of a router? - ✔Directs data to its correct destination over a large network. When is a router required? - ✔Wherever two networks meet. What are the 6 uses of digital devices? - ✔1. Education and Training 2. Personal 3. Social 4. Retail 5. Organisational Use 6. Creative Tasks What three categories are there in Education and Training? - ✔1. Interactive Whiteboards 2. Virtual Learning Environments (VLE) 3. Online Learning What is the use of interactive whiteboards? - ✔Used by teaches to support teaching in front of a class Why are interactive whiteboards multifunctional? - ✔They display output on the screen and take input such as when used as a touchscreen to write notes and input commands. Why are interactive whiteboards beneficial? - ✔The notes taken can be saved to a central location that can be accessed by students to use outside of school. Where are Virtual Learning Environments used? - ✔Used in schools What is a VLE? - ✔Like a website that allows teachers to upload resources to the site so that they can share them with students. What benefit is a VLE to a student? - ✔They can access their learning at home so can prepare for exams/homework. What benefit is a VLE to a teacher? - ✔They can mark the work submitted by students and so students can access feedback whenever. Where is online learning used? - ✔Can access the sites through PC or mobile devices What does online learning do? - ✔Allows you to access visual content like videos, animation and audio explanations. What type of digital camera is used in online learning? - ✔A webcam (videos can be shared online through different sites) What three categories are there for Personal use of digital devices? - ✔1. Entertainment 2. Online shopping and banking 3. Home applicances Where do we use entertainment systems? - ✔To watch film and TV, listen to music and play video games. What are the advantages of streaming films online? - ✔No longer store files on computers saving space on hard disk. Accessing media content is now cheaper. What are digital media players used for? - ✔To access streaming on television set. What are video game consoles used for? - ✔Allows us to play games online with others without needing to be in the same location. What is a disadvantage of entertainment systems? - ✔Piracy now occurs where content (films, music etc.) is illegally transferred over the internet for free. What does online shopping allow us? - ✔Allows us to purchase anything and being able to get it delivered the same day. Why would an organisation use spreadsheets and accounting software? - ✔To manage their finances (tracking sales/expenditure/ calculating tax). Why do organisations use word processors, desktop publishers and presentation software? - ✔To produce documents they require for their business operation.(producing sales report/ presentations/ brochures) How has digital devices made a business more productive? - ✔Less time is spent correcting human error. What does video conferencing software packages allow you to do? - ✔Allow you to have voice and video conversation (VoIP). What is video conferencing designed to have? - ✔To have multiple people take part in meetings. What added features does video conferencing have? - ✔Able to display a presentation. Share documents How does video conferencing benefit businesses? - ✔-Saves time and money as employees don't need to travel to the same location. -Helps support employees working from home. Where is CAD software used? - ✔Used in construction industry for architectural drawings and manufacturing of parts. Where is CAM controlled machinery used? - ✔Produce the objects designed with CAD software. How has design and manufacturing helped businesses? - ✔Made them more efficient. What is a benefit of CAD? - ✔-Designs can be modified easily if changes are required. -Designs can be sent over email. What is a benefit of CAM? - ✔-Machinery can work 24/7. -Reduces human error as task is produced to the same standard each time. What 3 categories come under creative tasks? - ✔1. 3D Graphics 2. Photo/video editing 3.Graphic design Why are 3D models being used in movies? - ✔It is quicker and changes can be easily made. What has 3D graphics done to video games? - ✔Added a new level of realism to video games. What does digital cameras allow you to do? - ✔Edit the photos (fixing the lighting or removing objects, red blemishes) What is a disadvantage of photo editing? - ✔People in magazines are heavily edited sets expectations to younger generations. What types of graphics and documents use graphic design? - ✔Logos, leaflets, magazines, books and comics. What do we use desktop publishing software for? - ✔Designing the layout and typesetting (e.g. books) What are advantages of graphic design? - ✔-More efficient than manually typesetting. -You can send data to printers quickly. What is a peripheral device? - ✔A hardware device that isn't required for the computer to perform its primary function. What are input devices used for? - ✔To enter information into a computer system? What 8 input devices are there? - ✔1. Keyboard 2. Mouse 3. Microphone 4. Webcam 5. Game controller 6. Sensor 7. Scanner 8. Graphics tablet What is a keyboard? - ✔Made up of a panel of keys, this device is used to input alphanumeric characters, symbols and simple commands into a computer. What is a mouse? - ✔A pointing device that allows a user to control a cursor on the screen in order to select objects that are displayed. What is a microphone? - ✔An audio input device that allows a user to enter sounds into the computer system. What is a webcam? - ✔A device used to input digital video or still pictures into a computer system. What is a game controller? - ✔Used to control video games, this can come in a gamepad form or in the form of a joystick. What is a sensor? - ✔An input device that takes readings from the environment such as temperate or light. What is a scanner? - ✔A device that converts documents into digital data so that they can be viewed and edited on a computer system. What is a graphics tablet? - ✔A flat board and a pointing device, known as a stylus, that allows a user to enter data much like they're using a pen & paper. What are output devices? - ✔Output devices are used to send data from a digital device to a user or another device. What 6 output devices are there? - ✔1. Monitor 2. Projector 3. Printer 4. Plotter 5. Speakers 6. Actuator What is a monitor? - ✔A device that outputs a visual display of the user interface of any software that is currently being used on the computer. What is a projector? - ✔This projects a visual display of the user interface onto a wall or screen. What is a printer? - ✔A device that is used to produce physical copies of the documents & images produced using a computer system. What is a plotter? - ✔A type of printer that is designed to print out vector graphic images. It typically prints to a very high quality on very large paper. What are speakers? - ✔A device that is designed to produce audio output by converting the digital audio signal from a computer into an analogue signal. What is an actuator? - ✔An output device that produces motion. We use it to control or move things. What 5 storage devices are there? - ✔1. Hard disk drives 2. Solid state drives 3. USB flash drives 4. SD cards What are 2 advantages of automatic data processing? - ✔1.Accuracy 2.Time&cost What are 2 disadvantages of automatic data processing? - ✔1.Inflexible (only some data can be entered) 2.Requires staff training What is a trackball? - ✔This device is made up of a ball that sits within a holder that can be rotated in order to move the cursor on the screen. What is a Braille keyboard? - ✔They use braille characters on each key of the keyboard. What is a braille embosser? - ✔This is a printer that will output using braille cells as opposed to standard ink text. What are screen magnifiers? - ✔This usually attaches to an existing monitor and magnifies the display output to make it easier to see. What are eye typers? - ✔This uses a camera mounted on the computer that tracks the user's eye movement to detect where they are looking in order to enter data with an onscreen keyboard. Clicks can be recorded by blinking slowly. What 5 accessibility device should be used for someone with a visual impairment? - ✔1.Braille Keyboard 2.Large Key Keyboard 3.Touchscreens 4.Braille Embossers 5.Screen Magnifiers What 2 accessibility device should be used for someone with limited mobility? - ✔1.Trackballs 2.Eye Typers What 4 types of operating systems are there? - ✔1.Real-time 2.Single-user, single-task 3.Single-user, multi-tasking 4.Multi-user What is a Real-time OS? - ✔Monitors external events and processes data as soon as it enters the computer system. Where is a RTOS used? - ✔-Traffic lights -air traffic control systems What is a single-user, single-task OS? - ✔Can only be used by one person at a time, using a single application. What are 2 examples of single-user, single-task OS? - ✔1.Old mobile phones (not smartphones) 2.Personal digital assistants What is a single-user, multi-tasking OS? - ✔Designed for only a single user at a time, however it can run multiple applications simultaneously. What are 3 examples of a single-user, multi-tasking OS? - ✔1.Windows 10 2.Mac OSX 3. Android Where is a single-user, multi-tasking OS used? - ✔-smartphones -tablets -personal computers What is a multi-user OS? - ✔Allows many different users to make use of a computer system and its resources at the same time. Where would a multi-user OS be used? - ✔-Powerful servers -Supercomputers What are the 5 roles of operating systems? - ✔1. Networking 2. Security 3. Memory Management 4. Multi-tasking 5. Device Drivers What is an example of Networking in the OS? - ✔TCP/IP is built into all major operating systems.. What is TCP/IP? - ✔TCP/IP are the protocols that are fundamental in allowing us to transmit data over a network like the Internet. What features does networking have? - ✔-utility programs (managing and maintaining the network) What is the role of security in the OS? - ✔Comes with pre-installed range of tools to help protect your computer from threats. What is the role of memory management in the OS? - ✔To assign memory to each of your applications running in order to allow them to run. What is paging? - ✔This is where the operating system assigns applications to "virtual memory". What is virtual memory? - ✔Virtual memory is a portion of the hard disk that is used as an extension of your main memory. This portion of the hard disk is known as the "pagefile". What is the role of multi-tasking in the OS? - ✔When you open a new software application it needs to assign resources, like processing time and memory. Why is multi-tasking more complexed in an OS? - ✔Processors only perform a single task at a time. The OS assigns small amounts of the processor time to each application so it appears that they are running simultaneously. Why would your computer slow down? - ✔As you only have a limited amount of memory and processing power, so, if too many apps are opened it will slow down. What is a device driver? - ✔A small software program that controls the devices you connect to your computer. What 4 user interfaces are there? - ✔1. Graphical user interface 2. Command line interface 3. Menu-based interface 4. Adapted interface What is a graphical user interface? - ✔Designed around graphical icons and images. We use a pointer, such as a mouse cursor, to navigate and interact with the computer using windows, icons & menus. What are 2 examples of a GUI? - ✔1. Windows 10 2. Mac OSX What are 3 advantages for GUI? - ✔1. Easy to use (for beginners) 2.Don't need to learn complexed commands 3.Easy to move data between different software applications What are 2 disadvantages of GUI? - ✔1. Uses a lot of processing power/main memory to run. 2. Can be slow to perform tasks for experienced users. What is the command line? - ✔A plain background with a simple text prompt that would allow you to enter in commands to perform actions. When would we use backup? - ✔If the data on our hard disk is damaged (such as by a virus) we often use a backup to recover the lost data. What does the backup utility software do? - ✔can help simplify and automate the backup process to make it easier to recover. When would backups take longer? - ✔-If there is more to back up. -Defragmented hard drive can slow down performance. -Viruses and malware What are disadvantages of backing up to the cloud? - ✔Requires a long time to upload the backup. What are the disadvantages of backing up to an external disk? - ✔Can be slower depending on the connection used. What does a disk cleaner utility do? - ✔They identify data that can be removed to save hard disk space that can be used for newer data. What does a registry cleaner do? - ✔Removes old redundant registry entries, such as from deleted software programs. How do disk/registry cleaners improve performance? - ✔Reduces read/write times What will slow down disk/registry cleaners? - ✔-If you have more to clean up -Applications running -Heavily fragmented hard drive Why do you need to update the software? - ✔To keep them secure, to access the latest features & to remove any bugs. What are problems with manually updating software? - ✔Time consuming What happens if you don't schedule updates regularly? - ✔There will be a lot of updates to download which will take a long time and cause poor internet performance while they're downloading. What do automatic software updates require? - ✔Fast internet connection What does anti-virus do? - ✔Detect any suspicious programs and remove them before they can cause problems. How does anti-virus detect malware? - ✔scanning newly added files and software, as well as through regularly scheduled scans of the storage devices connected to your system. What will take anti-virus longer? - ✔-size of storage device -amount of data being used -how defragmented hard disk is -applications running -existing malware What is a firewall? - ✔monitors the traffic coming into and out of your computer system (via its ports) over a network to look for anything suspicious. How do firewalls prevent harm? - ✔Blocks off any suspicious data What 4 types of productivity software is there? - ✔1. Word processing 2. Spreadsheet 3. Database 4. Presentation What 4 types of graphic/multimedia software is there? - ✔1. CAD 2. Graphics editing 3. Desktop publishing 4. Video editing What 3 types of personal software is there? - ✔1. Home finance 2. Educational 3. Entertainment What 4 types of communication software is there? - ✔1. Email 2. Web browsing 3. VoIP 4. Instant messaging What 3 factors should be considered when choosing application software? - ✔1. Compatibility 2. Use 3. User experience What is compatability? - ✔Whether it works with your current hardware & software. What is use? - ✔Whether it has the required functionality. What is user experience? - ✔Whether the users are able to use the software comfortably. What are the 5 image file types? - ✔1.BMP 2. GIF 3. SVG 4.PNG 5.JPG What is the colour depth of BMP? - ✔24 bit colour depth What is the file size of BMP? - ✔Large How many bits of uncompressed data per pixel is BMP? - ✔24 bits of uncompressed data per pixel Who uses BMP? - ✔Professional photographers Is GIF compressed or uncompressed? - ✔Compressed How much bit colour depth does GIF have? - ✔8 bit colour depth What is the file size of GIF? - ✔Small What type of decompression is GIF? - ✔Lossless What colour can GIF make? - ✔Can make a single colour transparent What are GIF used for? - ✔Logos What type of image is a SVG? - ✔A vector image What is different about a SVG image? - ✔It stores images as shapes and images rather than pixels. What are uses of SVG images? - ✔-Images on web -Simple -Logos What is a benefit of SVG images? - ✔Images can be resized without being pixelated What quality/file size is PNG? - ✔Low quality and file size What type of decompression is PNG? - ✔Lossless How many bit colour depth does PNG have? - ✔32 bits 4. Can lead to malicious users What are 4 advantages of proprietary software? - ✔1. Support for updates, patches, bug fixes 2. Updates are simpler to maintain/install 3.Software is well supported by the company 4. Greater usability (more time spent on the development) What are 4 disadvantages of proprietary software? - ✔1.Licensing is more restrictive/complicated (often expensive) 2.Source code is not available to be viewed and modified (software can't be adapted) 3. Reliant on developer for updates 4. Uses proprietary standards (more difficult to switch to different software as transferring the data can be difficult) What are emerging technologies? - ✔technologies that are just starting to make an impact in the wider world. What are 3 examples of personal uses of emerging technologies? - ✔1. Smartwatches 2. Smart speakers 3. Self-driving cars What are 2 advantages of personal uses of emerging technologies? - ✔1. Convenience 2. Accessibility What are 2 disadvantages of personal uses of emerging technologies? - ✔1. Cost 2. Over-reliance What are 3 examples of organisational uses of emerging technologies? - ✔1. Augmented reality (Superimposing a computer image on a real-world view) 2. Internet of Things 3. 3D printing What are 2 advantages of organisational uses of emerging technologies? - ✔1. Productivity 2. Reduced errors What are 2 disadvantages of organisational uses of emerging technologies? - ✔1.Cost 2.Staff training What 10 factors affect the choice of IT system? - ✔1.User experience 2.User needs 3.Specification 4.Compatibility 5.Connectivity 6.Cost 7.Efficiency 8.Implementation 9.Productivity 10.Security What is user needs? - ✔What actual tasks the user wants to perform using the IT system. What is specification? - ✔The list of components required of a computer system in order to allow users to run the software they need and perform their tasks. What is compatibility? - ✔Whether the IT system can communicate with other devices you are using with it. What is connectivity? - ✔How a device can connect to a network, such as a LAN or the Internet. What is cost? - ✔How much purchasing and running a device will cost you or your business. What is efficiency? - ✔How effectively tasks can be completed by the digital technology with as little wastage of resources. What is implementation? - ✔The time involved with putting a new system into effect. What is productivity? - ✔How quickly tasks can be completed when making use of an IT system. What is security? - ✔How safe a device is from security threats, such as hackers & viruses. What 4 factors come under user experience? - ✔1. Ease of use 2. Performance 3. Availability 4. Accessibility What is ease of use? - ✔How simple and intuitive the device is to navigate and perform tasks on. What is performance? - ✔How powerful the device is, such as processing, memory, graphics & storage. What is availability? - ✔How often the device can be used, such as whether the device can be always on. What is accessibility? - ✔How available the device is to be used by someone with a disability. What 3 factors come under implementation? - ✔1.Timescales 2.Testing 3.Migration What is timescales? - ✔The time it takes for the new system to be delivered. What is testing? - ✔Ensuring the new system works correctly and our software is compatible & stable. What is migration? - ✔The process of transferring data, software & files from the old system to the new one. What are 6 wired methods of connecting devices? - ✔1. USB 2. SATA 3. VGA 4. HDMI 5. Ethernet cable 6. Fibre optic Why is USB used? - ✔use it to connect peripheral devices of all kinds to our computer. What are 4 advantages of USB? - ✔1. Excellent data transfer speed 2. Able to connect multiple peripherals to a single USB port. 3. Provides power to device while connected 4. Highly compatible as every computer system has a USB port. What is a disadvantage of USB? - ✔Relatively short range What is SATA? - ✔method of connecting storage devices to a computer What are 2 advantages to SATA? - ✔1. Extremely fast connection type 2. All internal storage devices will have a SATA connector. What are 2 disadvantages of SATA? - ✔1. A SATA cable has a shorter range 2. Doesn't supply power to a device What does USB stand for? - ✔Universal Serial Bus What are 2 disadvantages of WiFi? - ✔1. Complexed to set up (requires you to correctly configure a wireless access point) 2. if poorly configured, such as not setting a complex WiFi key, then it can be very vulnerable to hackers. What is mobile broadband? - ✔3G/4G internet we access wirelessly through a cellular connection. Where is mobile broadband used? - ✔used to access the internet while on the go, such as while commuting to work, via a mobile device. What is 2 advantages of mobile broadband? - ✔1. Internet access is available almost everywhere 2. Easy method to connect to internet ( requires no additional setup or configuration in order to access it) What is 2 disadvantages of mobile broadband? - ✔1. very expensive compared to other methods (£20+ for just 4GB a month) 2. Slower data transfer speeds (4G = 12Mbps) What is a network? - ✔A network is where two or more computers are linked together in order to transmit data. What 4 types of networks are there? - ✔1.Personal Area Network 2.Local Area Network 3. Wide Area Network 4.Virtual Private Network What is a PAN? - ✔Allows us to connect our digital devices together, such as our personal computer and mobile devices. Why is PAN used? - ✔Used to connect devices within the range of a single person. What is 3 advantages of PAN? - ✔1. reduces the need for cabling (less trip hazards) 2. Automatic sync of data between devices (prevents mistakes) 3. only connect over a small area makes the secure for transmitting data. What is a Local Area Network? - ✔A network that spans a relatively small geographical area, usually a single building or site. What does LAN allow us to do? - ✔allows us to connect all of the computers in our home/business together to share data. What are 3 advantages of LAN? - ✔1. Peripherals can be shared within a business between multiple computers (saves money) 2. Files can be stored in a central location (users can access from anywhere connected to the LAN) 3. Computers can be centrally managed (more efficient) - backing up computers What is a Wide Area Network? - ✔a network that spans a large geographical area, such as an entire country or the whole world. What are 3 advantages of a WAN? - ✔1. Confidential data can be shared between different offices (high security level) 2. Files can be accessed from different business locations 3. uses private leased lines rather than broadband internet connections to transmit data (faster data transfer) What is Virtual Private Network? - ✔a private network that runs across a public network How does VPN work? - ✔by encrypting the data that is being transmitted over the internet. Why is VPN used? - ✔used by businesses in order to allow employees to access their work's network securely What is 3 advantages of VPN? - ✔1. People gain secure access to their works LAN wherever. 2. Much cheaper than a WAN 3. If used on public/unsecured network the data transmitted is still secure as it is encrypted (unreadable to anyone who intercepts it) What are the 10 factors affecting the choice of a network? - ✔1. User experience 2. User needs 3. Specification 4. Connectivity 5. Cost 6. Efficiency 7. Compatibility 8. Implementation 9.Productivity 10. Security What 4 different types of data transmissions? - ✔1. Email 2. Voice & video calls over the Internet 3. Web pages 4. Secure payment systems What 3 protocols come under email data transmissions? - ✔1. SMTP 2. POP3 3. IMAP What is SMTP? - ✔-transmits data from your email client to your outgoing mail server. -transmit data between email servers (move from your outgoing mail server to the recipient's mail server). What does SMTP stand for? - ✔Simple Mail Transfer Protocol What does POP3 stand for? - ✔Post Office Protocol (3rd version) What is POP3? - ✔used to download emails from your mail server to your email client. What is the disadvantage of POP3? - ✔you won't be able to access your emails on multiple devices What does IMAP stand for? - ✔Internet Message Access Protocol What is IMAP? - ✔An alternative to POP3 for retrieving emails from your mail server. What is the difference between IMAP and POP3? - ✔Instead of downloading your emails, they are synced between your client and your server. What is a benefit of IMAP over POP3? - ✔You will be able to access the same emails on multiple devices What 3 protocols are there for Voice & Video Calls over the Internet data transmissions? - ✔1. SIP 2. RTP 3. RTCP What does SIP stand for? - ✔Session Initiation Protocol What is SIP? - ✔A signalling protocol that establishes the connection between sender & receive How does SIP work? - ✔-SIP signalling packet is sent from the person to the recipient. -SIP packet is received, recipients VoIP phone starts to ring. What does RTP stand for? - ✔Real-time Transport Protocol What does RTP do? - ✔Transmits the data packets along the connection. (works with SIP) What are 2 security prevention methods? - ✔1. Firewalls 2. Encryption What doe firewalls do? - ✔help prevent unauthorised access to data by monitoring traffic and blocking anything suspicious. Where do hardware firewalls sit? - ✔sits between your local area network and the internet What does a hardware firewall do? - ✔monitors the traffic coming into the network from outside and will use defined rules to filter the traffic to prevent anything unwanted. Where are software firewalls? - ✔installed on the individual devices connected to the network. What does a software firewall do? - ✔an monitor traffic going both into and out of the computer, filtering any unwanted traffic. What does encryption do? - ✔data is converted into an encoded form so as to prevent unauthorised access What are 2 methods of encrypting data across a network securely? - ✔1. SSL 2. TLS What will SSL do? - ✔will encrypt the data to secure it so that it cannot be accessed by anyone who doesn't have the encryption key. What does SSL rely on? - ✔SSL certificates (or digital certificates) What does SSL certificates (or digital certificates) do? - ✔authenticate a user and allows them to use the public key infrastructure to encrypt data transfer What is the bandwidth of a network? - ✔the amount of data that can be transferred from one computer to another in a given period of time. What is the latency of a network? - ✔a measure of the time it takes for a data packet to transfer over a network. What bandwidth/latency does online gaming need? - ✔-low latency due to the quick response time needed, -doesn't need a large bandwidth. What bandwidth/latency does online streaming need? - ✔-large bandwidth due to the amount of data that is transferred -doesn't need low latency What is compression used for? - ✔reduce the size of files. What 2 types of compression are there? - ✔1. Lossy 2. Lossless What is lossy compression? - ✔permanently deletes certain bits of data to reduce file size Where is lossy used? - ✔video, audio & image compression. What is lossless compression? - ✔uses algorithms to pack the data into less space. Where is lossless compression used? - ✔document compression What are Hardware CODECs used for? - ✔used to encode analogue data into digital data. It will then decode the digital data into an analogue form. What are Software CODECs used for? - ✔used with audio and video to compress the data so that it used transmitted over a network. What is disadvantage to CODECs? - ✔can be compatibility issues due to the variety of CODECs available. What is an advantage of lossy? - ✔file sizes are reduced much more than lossless compression (quicker upload/download times) What are 3 disadvantages of lossy? - ✔1. reduced quality, cannot be restored to original high quality 2. person receiving file may not have same CODEC installed 3. sometimes file cannot be compressed further and so file can increase the file size. What is an advantage of lossless? - ✔files can be decompressed back to original quality What is 3 disadvantages of lossless? - ✔1. can be seen as malware by anti-virus software and block files (recipients can't access file) 2. decompressing files can take a long processing time and memory (computer slows down) 3. sometimes file cannot be compressed further and so file can increase the file size. Where is data stored in cloud storage? - ✔stored remotely on servers What is 2 uses of cloud storage in our personal lives? - ✔1. for portable data storage uses syncing files across multiple devices 2. sharing files with others. What is 2 uses of cloud storage in our professional lives? - ✔1. remote data backups 2. remote working What is cloud computing? - ✔accessing the resources (processing, storage, etc) of a server over the internet. What is cloud computing used for in our personal lives? - ✔for accessing software applications across multiple devices at a low cost. What is cloud computing used for in our professional lives? - ✔for accessing software with low maintenance needs and to support cloud computing. What is the 2 benefits of using cloud storage/computing to individuals? - ✔1. software can be accessed flexibly 2. data can be synced between multiple devices and theft of equipment won't lose your data. What is the disadvantage of using cloud storage/computing to individuals? - ✔can be security concerns and it requires a stable, fast internet connection What is the 3 benefits of using cloud storage/computing to businesses? - ✔1. reduced upfront costs 2. access can be flexible to your business needs 3. less IT staff are required for maintenance. What is the 2 disadvantages of using cloud storage/computing to businesses? - ✔1. security can be a concern 2. productivity is damaged if the network/internet goes down. Why are VPNs used in businesses? - ✔to allow a user to connect to their work LAN while working remotely. What do remote desktop technologies allow a user? - ✔to access their work desktop from outside the business offices. What 5 factors are there to consider when choosing an online system? - ✔1. security 2. cost 3. ease of use 4. features 5. connectivity 5. Physical Access Controls 6. Digital certificates 7. Protocols What does file permissions do? - ✔you can set who can access the files and what they can do with them. What 3 file permissions can you set? - ✔1. Read only 2. Write only 3. Full control What is read only? - ✔files can be opened and viewed, but not edited. What is read/write? - ✔files can be opened, viewed and edited. What is full control? - ✔files can be opened, viewed, edited, modified & deleted. What are access levels? - ✔control what software, data and services a user can access What is the highest access level? - ✔administrator access What is administrator access? - ✔a user can access all folders with full control, alter the permissions of other users and can install and delete software. What can the lowest access level do? - ✔a user can only access a limited number of files and the software they need to do their job. What are backups? - ✔involves taking a copy of the data and storing it in a secondary location. What three types of backups are there? - ✔1. Full backups 2. Incremental backup 3. Differential backup What is a full backup? - ✔a complete backup of all your data. What is an incremental backup? - ✔a backup of only the data that has changed since the previous backup. What is a differential backup? - ✔A mixture of a full backup and an incremental backup What does physical access controls do? - ✔prevents unauthorised users from gaining access to our IT systems. What are 4 examples of physical access controls? - ✔1. Access cards 2. Keypad access control 3. Biometric access control 4. Electronic locks What are access cards? - ✔Cards that must be scanned to unlock rooms. What are keypad access controls? - ✔A system that requires a passcode to gain entry to a room. What are biometric access controls? - ✔A system that scans biometric data to gain access to a room. What are electronic locks? - ✔to lock and unlock doors electronically when sent signals from the above access control systems. What are digital certificates? - ✔used to authenticate a user as the owner of a public key so they can use public key encryption. What is the 2 important contents to a digital certificate? - ✔1. digital signature 2. public key What is a digital signature? - ✔verifies the sender's identity What is the public key? - ✔used to encrypt data when sending it to the website What are protocols? - ✔a set of rules that defines a method for transmitting data between different devices over a network. What are the 2 security protocols? - ✔1. SSL 2. TLS What do the security protocols allow us to do? - ✔send data securely over the internet using encryption. What are the 4 tools used for protecting data? - ✔1. Anti-virus 2. Firewalls 3. Encryption 4. Legislation & Codes of practice What are 3 common features you see in anti-virus software? - ✔1. scheduled scans (can be set automatically) 2. fulls scan on entire hard-disk 3. scanning of all fires opened (known as real-time protection) What are 3 disadvantages of anti-virus software? - ✔1. needs to be regularly maintained/updated (new viruses found) 2. doesn't offer total protection (new malware programs being written) 3. can slow down PC/network performance (takes up hard disk space, memory, processing power) What are 3 common features of a firewall? - ✔1. content filtering (used for security/productivity purposes) 2. controlling which programs can access the LAN/internet 3. Intruder detection/prevention (identifies/stops hackers from gaining access to network or computer system) What is 3 disadvantages of firewalls? - ✔1. diminishes performance of the network 2. productivity can be impaired (things may be blocked by firewall when needed) 3. cannot prevent internal attack from within the network. What 2 types of data do we encrypt? - ✔1. stored data 2. transmitted data What is stored data? - ✔uses the same key to both encrypt and decrypt the data. (symmetric encryption) What is transmitted data? - ✔uses different keys to encrypt and decrypt the data. (asymmetric data) What are 2 implications of stored data? - ✔1. if you lose the encryption key you won't ever be able to decrypt the data 2. sharing of the encryption key can compromise security (key can be intercepted) What is an implication of transmitted data? - ✔If working in large quantities data the data can have a real impact on processing power What 2 legislation have been implemented to protect data and IT systems from harm? - ✔1. Data protection act (1998) 2. Computer misuse act (1990) What is the data protection act (1998) - ✔protects how individuals data can be used and handled. What is the computer misuse act (1990)? - ✔protects against the wilful harm & damage of IT systems & data. What are 7 feature of online services? - ✔1. Retail 2. Financial services 2. search engine advertising uses search terms to display similar products 3. social media sites use your profile data to target advertising that you might like What are 2 disadvantages of targeted marketing? - ✔1. can lead to impulse buying 2. can lead to concerns over privacy (people don't like how there is personalisation from previous transactions) What is collaborative working? - ✔where multiple individuals can work together in real- time over the internet. What are 3 advantages of collaborative working? - ✔1. employees work together (more productive) 2. employees use technology to share work (can work from home) 3. meetings held without wasting time/money on travel What are 3 disadvantages of collaborative working? - ✔1. need to be restrictions in place with sharing things online (prevent overwriting) 2. security can be a concern (data can be accessed by hackers) 3. increased reliance on business' internet connection What are 8 features of IT systems? - ✔1. stock control 2. data logging 3. data analysis 4. general office tasks 5. creative tasks 6. advertising 7. manufacturing 8. security How does stock management use IT system? - ✔monitors and controls their stock and can allow the implementation of automated and JIT stock control. What is 'just in time'? - ✔where products are only ordered as they are needed. What are 3 advantages of stock control? - ✔1. stock levels are recorded more accurately 2. reordering can be done automatically (more efficient) 3. less stock needed (saves money/storage space) What are 2 disadvantages of stock control? - ✔1. can be very expensive to implement (require staff training) 2. not always accurate (due to theft) How does data logging use IT system? - ✔through the use of sensors to monitor a process and automatically log the data. What are 2 advantages of data logging? - ✔1. using sensors allows for logging without human intervention (greater accuracy) 2. data can be logged more frequently (better tracking for trends and patterns) What are 2 disadvantages of data logging? - ✔1. most data logging sensors rely on wireless connectivity (interference can miss reading) 2. if sensors haven't been calibrated properly recordings wont be accurate How does data analysis use IT system? - ✔to spot patterns and trends and make future predictions. What are 2 advantages of data analysis? - ✔1. can help spot trends/patterns (improve efficiency) 2. data can be outputted into different formats simply (easier to interpret data) What are 2 disadvantages of data analysis? - ✔1. if incorrect data is provided than incorrect analysis is performed. 2. to be analyses data has to be stored (exposed to threats from malicious users) How does general office tasks use IT system? - ✔to produce documents, writeup notes, manage finances, communicate and schedule appointments. What are 2 advantages of general office tasks? - ✔1. completed more efficiently 2. require less specific skills (allows staff to perform a wider range of roles) What are 2 disadvantages of general office tasks? - ✔1. employees need greater ICT skills (costly, stress to staff with no experience) 2. need to maintain IT support staff to help employees (expensive) How does creative tasks use IT system? - ✔for things like CAD, graphics design and music/film editing. What are 2 advantages of creative tasks? - ✔1. easier to edit creative work 2. can be easily distributed electronically (emails) What are 2 disadvantages of creative tasks? - ✔1. requires huge hard disk storage capacities 2. increase in illegally sharing of original creative work online (copyright piracy) How does advertising use IT system? - ✔through the use of online advertising, print advertising & video adverts. What are 2 advantages of advertising? - ✔1. can advertise directly to the people who will be interested (more efficient) 2. successful viral campaigns allow businesses to reach large audiences What is a disadvantage of advertising? - ✔Has lead to the growth of spam emails (can lead to phishing and private information being revealed) How does manufacturing use IT system? - ✔for Computer-Aided Manufacturing of products like car parts and clothing. What are 2 advantages of manufacturing? - ✔1. performs the task to the same standard each time (better quality) 2. the machines don't need to take a break (saves money/more efficient) What are 2 disadvantages of manufacturing? - ✔1. people can lose their jobs (being replaced with computers) 2. initial costs for machinery are high How does security use IT system? - ✔such as door/window and motion sensors connected to an alarm, security cameras & RFID sensors to detect theft. What are 2 advantages of security? - ✔1. requires less security staff as computers automate the checks 2. make business and homes more secure (protect from threat/theft) What are 2 disadvantages? - ✔1. privacy concerns over increased security 2. can provide a false sense of security (people not taking security checks seriously) What are the 10 major impact and implications for organisations using IT system - ✔1. User experience 2. Employee & customer needs 3. Cost 4. Implementation 5. Replacement or integration 6. Productivity 7. Working practices 8. Staff training needs 9. User support 10. Security What is primary data? - ✔data that has been gathered through original research done by the organisation or individual. What are 3 benefits of primary data? - ✔1. more up-to-date (more valid) 2. more relevant (you have collected it yourself) What 2 formats can data be presented in? - ✔1. tabular 2. graphical What is tabular presentation? - ✔a text presentation of data within a table When is tabular presentation used? - ✔where precise data and detail is required. What is graphical presentation? - ✔where data is presented using a chart or some other form of diagram. When is graphical presentation used? - ✔used where ease of interpretation and spotting trends is required. What are 7 data collection user interfaces? - ✔1. ease of use 2. accessibility 3. error reduction 4. intuitiveness 5. functionality 6. performance 7. compatibility How can error reduction be achieved in a user interface? - ✔can be achieved through validation/verification checks, input masks and warning messages. How can an intuitive interface be easy to use? - ✔can be achieved by making it easy to use and keeping the interface similar to paper forms or previous systems. What does functionality in a user interface allow? - ✔allows users to be able to perform the required tasks they need from the system. What are 6 moral and ethical factors of the use of IT? - ✔1. Environmental 2. Unequal access 3. Online behaviour 4. Globalisation 5. Freedom of speech 6. Acceptable use What 3 moral and ethical factors does the environment have on the use of IT? - ✔1. increase in landfill trash (technotrash) 2. consumes materials, power, chemicals & water to produce technology 3. use more power to run technology systems What 2 moral and ethical factors does unequal access have on the use of IT? - ✔1. many poorer people have very limited access/no access 2. they aren't able to use technology for things like education What 2 moral and ethical factors does online behaviour have on the use of IT? - ✔1. acting poorly online can affect employment/lead to legal problems 2. cyber bullying can affect the victims. What is the rules for good online behaviour known as? - ✔netiquette What 3 moral and ethical factors does globalisation have on the use of IT? - ✔1. the world is becoming more interconnected/integrated 2. lead to outsourcing (affects employment) 3. affects cultures, spread diseases and increases pollution What 2 moral and ethical factors does freedom of speech have on the use of IT? - ✔1. freely expresses views and opinions 2. offensive opinions are often censored to prevent causing offence What 2 moral and ethical factors does acceptable use have on the use of IT? - ✔1. use policies to govern how employees use their IT systems 2. covers what sites you visit/language you use/sharing copyright material (can lead to termination of contract if breached) What 6 moral and ethical factors are also protected by legislation? - ✔1. Health & safety 2. Copyright 3. Computer misuse 4. Protection of data 5. Privacy 6. Accessibility What are three issues of health & safety caused by IT systems? - ✔1. RSI 2. Eyes strain 3. Tripping What is the cause of RSI? - ✔Repeated movement & overuse. Such as typing at a keyboard. How can you prevent RSI? - ✔Wrist rests, adjustable equipment to allow good seating position, regular breaks. What is the cause of eye strain? - ✔Staring at a monitor for long periods, particularly in dim or very bright light. How can you prevent eye strain? - ✔Regular breaks, good lighting, good quality monitors. What is tripping? - ✔Loose trailing cabling across the room where people walk. How can you prevent tripping? - ✔Tie loose cables back, use cable ducting or run cabling through the walls/ceiling. How has IT systems impacted on copyright? - ✔have made it extremely easy to share and download copyright material without the permission of the copyright holder. How does copyright impact an individual/business? - ✔you cost them money by using their material for free. What is 5 data & user protection legislation? - ✔1. Computer misuse act 2. Data protection act 3. Copyright, designs & patents act 4. The health and safety regulations 5. Consumer rights act When was the computer misuse act brought in and why? - ✔-1990 -protect users against the theft and damage of the information they store using IT systems. What is the first offence covered by the computer misuse act? - ✔unauthorised access to computer material (hacking/up to 2 years in prison/large fine) What is the second offence covered by the computer misuse act? - ✔unauthorised access with intent to commit or facilitate the commission of further offences (using data from hacking to blackmail/up to 5 years in prison/large fine) What is the third offence covered by the computer misuse act? - ✔unauthorised acts with intent to impair the operation of a computer (altering data found/spreading a virus/up to 10 years/large fine) What is the police and justice act - ✔-2006 -extended the computer misuse act What was the modification of offence 1 of the computer misuse act? - ✔the punishment was increased to 2 years rather than 6 months What was the added offence to the computer misuse act? - ✔3a. making, supplying or obtaining anything that can be used in computer misuse offences. (creating malware program to gain access to system/harm data/2 years in prison/large fine) When was the data protection act introduced and why? - ✔-1998 -to protect the privacy of individuals by ensuring that their personal information is processed in an ethical manner.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved