CIE ICT Chapter 4 Notes
CIE ICT Chapter 4 Notes
Them
Networks
Routers
A device that enables data to be sent between different types of networks. It can be
When a data packet is received, the router checks if the packet is intended for it or
another network. The data packet is routed to the local switch/hub if it's meant for its
network. If not, the data packet is sent to the relevant router, which sends it to the
relevant device.
1. Network Interface Cards (NIC): These are needed to allow a device to connect to a
network. Turns binary data into an electrical signal that allows network access. Usually
Media access control (MAC) address: a number that uniquely identifies a device when
connected to a network.
• The first six hex digits identify the manufacturer’s code, and the next 6 identify the
2. Hubs: they are hardware devices that can have several other devices connected to
them. They are used to connect devices together to form a local area network (LAN). It
takes a data packet received by one of its ports and sends it to all relevant or irrelevant
3. Switches: intelligent hubs. Used to connect devices to form a LAN. Unlike hubs, the
switches store the MAC addresses of all devices on a lookup table. So, it only sends
In summary:
• Switches use lookup tables to determine the destination for a data packet.
Unlike routers, they can’t communicate with external networks, such as the Internet.
Comparison:
• Bridges connect LANs together; routers connect various types of networks together.
• Bridges connect networks with the same protocol; routers can connect networks with
different protocols.
• The router uses routing tables to direct data packets, but bridges don’t.
Both are used for wireless communication between devices. They both use
Bluetooth uses:
• When transferring data between 2 or more devices that are very close together.
Wi-Fi uses:
• Full-scale networks.
• For uses where a higher range and better security are required.
GHz range.
• Bluetooth uses key-matching encryption. However, Wi-Fi uses WPA (Wi-Fi protected
Cloud Computing
1. Public Cloud - The customer and the cloud storage provider are different companies.
2. Private Cloud - The customer and the cloud storage provider are a single organization.
3. Hybrid Cloud - Combines public and private cloud options and allows sensitive data to
remain private while providing public cloud services for less sensitive information.
• Cloud data is duplicated and stored on other servers to ensure availability during
Advantages:
• Cloud storage eliminates the need for a business to purchase expensive equipment for
• Readily available globally, allowing both remote working and data sharing.
• Providers offer high levels of ensuring that services are always available.
• A backup of the data from the cloud will allow full data recovery in case of incidents.
Disadvantages:
• The user depends on the storage provider for reliability and availability of services.
• The services may become expensive as the amount of storage or bandwidth required
increases.
1. Internet:
• The World Wide Web is a vast collection of web pages that can be accessed using a
web browser.
• The World Wide Web allows you to access information by using the internet
Characteristics:
• It is an open network, meaning everyone can access the same resources and
• People from all over the world can communicate with each other in real-time.
• Available to anyone who has a suitable device and access to any one of the
interconnected networks.
Uses:
• Social Networking
• Online shopping
• Entertainment
2. Intranet:
• Usually private and are used to send information securely and safely.
Characteristics:
• Allows for document sharing and the use of collaboration tools between users.
• Private Intranet that also allows access by selected parties that reside outside of the
organization. These parties, for example, maybe customers, key stakeholders or clients.
• Users will have an authorization level once they have successfully logged in, which will
o The use of the internet covers a wide range of purposes, whereas an intranet/extranet is
o The Internet is not owned solely by one person or organization, whereas the
1. Local Area Network (LAN): networks usually contained within a single building or
small geographical location. It is made up of hubs and/or switches, which will connect
several devices together. One hub or switch commonly connects to a router, allowing
Advantages:
• Can secure its devices with the use of firewalls, antivirus software and other security
• A LAN allows users on the network to share resources such as printers and other
peripherals.
Disadvantages:
2. Wireless Local Area Network (WLAN): Local Area Networks allow devices to connect
wirelessly rather than using physical cables. Wireless Access Points (WAPs) are
vast range of devices, such as smartphones and laptops, are very popular in public
Advantages:
• Allows users to connect anywhere in the range of a Wireless Access Point (WAP).
• They can be used in various indoor and outdoor environments, making them highly
flexible.
Disadvantages:
• It can sustain interference from other devices which can affect performance and
connectivity.
3. Wide Area Networks (WAN): is formed by several LANs connected through a router. It
Advantages:
• Administrators can monitor and manage the network infrastructure from a single
location.
Disadvantages:
• Cover larger distances and rely on public networks or leased lines, which can introduce
o Hacking: Unauthorized access given to the computer. This can lead to identity theft or
passwords, and credit card details, for malicious reasons by mimicking a reliable
o Pharming: This is malicious code installed on a user’s computer or a web server; the
code will redirect the user to a fake website without their knowledge (the user doesn’t
o Viruses: Program code that replicates (copies itself) to delete or corrupt files and cause
Passwords
• There are many ways to enhance the security of your password, such as the following:
o Ensure that the password is changed regularly in case it has been obtained illegally or
accidentally
o Ensure that the password uses a combination of uppercase, lowercase, numbers and
1. Zero login: A security concept that eliminates traditional login methods, such as
4. Smart Cards: Smart cards are portable devices with integrated circuits to store and
process data. They are used for authentication, identification, and secure transactions in
5. Physical Tokens: It is a type of authentication that takes the shape of a solid object.
The user demonstrates ownership of the token through interaction with a login system.
Physical tokens have embedded clocks that create one-time passwords (OTPs) when a
6. Electronic Tokens are applications that users install on their hardware, such as
this website, users must first authenticate themselves using electronic tokens. The user
has already set up the electronic token app with their smartphone. The user launches
the app on their smartphone when the website asks them to verify their identity. The
program creates an OTP that is only good for a short period of time.
Anti-malware Software
software. It has 3 primary purposes: detect, prevent and remove malicious software. It is
• Real-time scanning
o Allows the user to determine if the file is a legitimate threat and not a false positive.
method looks for behavioural patterns and other features in a file to identify possible
risks.
Electronic Conferencing
stand-in for face-to-face meetings between several persons who may reside abroad or
in another region of the country. It utilizes a network in some way and is done in real-
time.
The basic hardware includes:
• webcams,
• microphones,
• speakers.
Advantages:
• It is much easier to access important documents or bring in ‘experts’ at key parts of the
conference.
• Reduces the cost of taking people away from work for two or three days to travel.
• Using video conferencing is better than having delegates travel to potentially unsafe
places worldwide.
Disadvantages:
• Problems if the delegates live in different countries with large time zone differences.
• Requires IT knowledge to some extent.
• It's not the best for people who consider travelling a job perk.
2. Audio Conferencing: Meetings held using audio (sound) technology are called audio
conferencing. The normal telephone network can be used for audio conferencing,
• an internet phone
• a standard phone.
Advantages:
• Eliminates the need for travel expenses, such as transportation, accommodation, and
meals.
• Saves time by eliminating travel time and allowing meetings to be scheduled and
conducted quickly.
Disadvantages:
• Lacks the visual aspect of face-to-face meetings, which can hinder communication.
• Heavily relies on technology, and technical issues such as poor audio quality,
Web conferencing, often known as webinars or webcasts, makes use of the Internet to
enable conference calls. This system makes use of numerous computers that are
interconnected over the internet. It operates in real-time, just like video conferencing,
» presentations
Advantages:
• Allows participants to see each other through video, providing a more immersive and
• Often provide features like chat, polling, hand raising, and Q&A sessions, fostering
Disadvantages:
• It often has various features and settings that participants need to familiarize