0% found this document useful (0 votes)
0 views

ICT Short Note - 6 Pages

The document provides an overview of digital devices, their types, features, and software, including operating systems and peripheral devices. It also discusses connectivity, types of digital communications, and the implications of online services, highlighting risks to data and personal information. Additionally, it covers the impact of the internet on individuals and organizations, online communities, and the effective use of software applications.

Uploaded by

sg2933920
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

ICT Short Note - 6 Pages

The document provides an overview of digital devices, their types, features, and software, including operating systems and peripheral devices. It also discusses connectivity, types of digital communications, and the implications of online services, highlighting risks to data and personal information. Additionally, it covers the impact of the internet on individuals and organizations, online communities, and the effective use of software applications.

Uploaded by

sg2933920
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Topic 1 DIGITAL DEVICES Knowledge Organiser

1.1 TYPES OF DIGITAL DEVICES 1.3 SOFTWARE 1.5 TYPES OF PERIPHERAL DEVICES - STORAGE
Mainframe computers used for complex processing – Systems software is the operating system. Windows, HARD DRIVES are used to store data permanently. They
payroll etc. Mac OS, Linux etc. can be either magnetic or Solid State – SSD.
Microprocessors are the engine of the computer, they Operating systems provide a bridge between hardware Internal storage – inside the computer, e.g. the hard
input data, process it and provide an output. They can and software, they help look after the computer. drive.
be embedded in washing machines and cars. Utility software looks after the computer, it includes External storage – outside the computer, e.g. the
Laptops can be used as desktop replacements. Along anti-virus software. external hard drive, USB stick, CD ROM etc.
with desktops they are known as personal computers. Operating systems functions include, network Flash memory drives are also known as USB sticks or
Smartphones are phones that have extra computing connectivity, memory (RAM) management, resource external hard drives or SD cards used by cameras etc.
capacity, they can be used to access the internet etc. management – e.g. printer, security, e.g. passwords and Magnetic tape is used for backing up of computers on a
SIM Stands for Subscriber Identity Module. Lets the being able to print. server every day.
phone network know who you are and with phone Apps – also known as software applications which can CD-R – readable, created once and then read only after
provider (company you use). do things like, increase productivity, web authoring, that, CD-RW – re-writable, once it is created it can be
Tablet Devices provide a bridge between a laptop and a image and sound editing, presentations, control written over again.
mobile phone. They have apps and can allow internet software and project management software. TB – tebibytes – 1024 gibibytes
access. They can be 3G and WiFi or just WiFi. Proprietary software – software that is paid for. GB – gibibytes – 1024 mebibytes.
Camera and camcorders record pictures and film Free/open source software is free to use and can be MB – mebibytes – 1024 kibibytes
digitally which then can be uploaded and edited on a changed by the user, the source code is open to edit. KB – kibibytes – 1024 bytes
computer. Games consoles connect to a TV and allow Communication software is to provide remote access Byte – 8 bits
the user to play computer games. They usually have to systems and exchange files and message in text,
internet access to allow the user to play with others. audio or video form. Examples include email, Skype, 1.6 MEMORY
Home entertainment systems e.g. Set Top Box, Facetime and any other VOIP software. RAM is Random Access Memory and ROM is Read Only
sometimes called a STB. A digital device that sends Software updates – software is updated to avoid Memory.
audiovisual signals from a television broadcaster to security issues and strengthen security. Software RAM is for temporary instructions the computer needs.
your television. should be updated regularly to ensue it is secure and It is volatile which means when power turned off the
Navigation aids, e.g. Sat Navs. Built into modern cars that you are using the latest version. contents are lost.
but can also be stand alone, can be an app used on a ROM is non-volatile, it does not lose it’s contents and is
mobile, e.g. Google maps. used to store the basic system settings of the computer.
1.4 TYPES OF PERIPHERAL DEVICES – INPUT AND
Multifunctional and convergence, when devices can do OUTPUT 1.8 ICT SYSTEMS TO MEET SPECIFIED NEEDS
more than one thing and overlap each other, e.g. Peripherals are devices that are added on to the Accessibility – some peripheral add accessibility to the
smartphones and tablets becoming more similar. computer, they are extra. They include such things as computer, e.g. Headset with a microphone so that the
printers, plotters, monitors, keyboards etc.
user can speak their commands into the computer if
1.2 FEATURES OF DIGITAL DEVICES INPUT peripherals – keyboard, touch screen, scanner,
they cannot use a mouse or keyboard.
The features of digital devices are it’s performance, it’s digital camera, webcam, OCR reader, barcode scanner.
Software can be used to meet needs.
storage, user interface, connectivity, media support, OUTPUT peripherals – Touchscreen, monitor, printer,
speakers, headphones and 3D printer.
Settings can be changed to meet needs, for example
energy consumption, expansion capacity and security monitor settings to make the screen icons larger.
features. 1.7 PROCESSORS Justification – changes should be justified, e.g. the user
You need to be able to discuss the features of identified CPU or Central Processing Unit is the ‘brain’ of the with limited sight needs different screen settings.
digital devices. You will be given four specs to look computer, it takes an input, processes it and hen does
through and you will have to decide what has the something with it – output.
largest storage, fastest processor etc. The CPU is measured in GHz or Gigahertz, cycles per
second, how many instructions per second.
Topic 2 CONNECTIVITY Knowledge Organiser
2.1 TYPES OF DIGITAL COMMUNICATIONS 2.3 REQUIREMENTS FOR CONNECTING TO A 2.4 BENEFITS OF USING A LAN/HOME NETWORK
Range of ways that digital devices communicate – NETWORK, INCLUDING THE INTERNET Peer to peer network – two or more devices connected
through satellite, broadcast (TV, radio), wired (cable) Networks – devices need to be identified on a network. together to share files or access.
and wireless. They have a device name, an IP or Internet Protocol Client/Server – the client requests a service from the
PAN – Personal Area Network – a small network about address and MAC address or Media Access Control. server – e.g. to print or access something.
a person, e.g. Bluetooth. IP address – the unique address given to the device. Local Area Networks benefits:
LAN – Local Area Network – a network inside a campus, MAC address – the address the hardware is given, used • Share peripherals e.g. printers
e.g. a school that jut covers that area. to block devices if needed e.g. parent removing access. • Share data
WAN – Wide Area Network – a larger network that Wired systems need to use a network cable. • Flexible access
covers a large geographical area, e.g. the Internet. Wireless use a wireless transmitters and receivers and • Media streaming – videos, audio etc.
• Communication, emails etc.
Tethering – connect devices together. use signals to transfer the data.
• Shared access to the internet
Wireless communication – WiFi, Bluetooth, GPS, 3G, Access point – the point where you can gain access to
Benefits of a client/server network are:
4G, 5G, infra-red (IR) and near-field communication the network.
• Control of user access rights
(NFC) which is used for contactless payments. Router – connects network devices and forwards data
• Centralised administration
WiFi vs Bluetooth, Bluetooth is used for the connection between them. • Centralised backup
of devices usually, e.g. wireless headphone. WiFi would Gateway – the ‘gate’ between two networks. • Shared software
be used for connection to the internet and networks. Booster – boosts and amplifies WiFi network signal and • Shared storage and file access
strength. • Roaming profiles – the ability to hotdesk which is to
2.2 FACTORS INFLUENCING THE CHOICE OF DIGITAL Server – provides access to a service – e.g. printing or move to different desks, not stay at a particular one.
COMMUNICATION IN A NETWORK network access or a website.
Influences on speed and volume of data transfer. Web browser – used for displaying the web page, 2.5 SECURING DATA ON A NETWORK, INCLUDING THE
Wired vs. wireless communication – wired is faster as converts the HTML code into the page you can see. INTERNET
there is no interference, unlike wireless which may ISP – Internet Service Provider – provides access to the Passwords – used to access the network, matched with
have a weaker connection due to outside interferences. internet e.g. DU in Dubai. the correct ones in the database to grant or not grant,
Wired is more expensive an disruptive to set up than Search engine – identifies items in a database access.
wireless. corresponding to keywords. E.g. Google, Bing etc. Firewalls – block or allow website traffic, they an block
Bandwidth – how much data can be downloaded at any Filter software – allows or denies access to certain web certain websites and are a security device.
one time. pages. WEP/WPA – WiFi Protected Access is a security system to
Latency – how long you have to wait. protect users of WiFi.
Both of these have an impact on he user experience. Encryption – data is ‘scrambled’ so that it cannot be read
Broadband – to transmit data quickly and easily. without a key to unscramble it. This is a security system
Mobile broadband – used when you don’t have access used by banks and other websites that hold personal
to your WiFi, out and about. 3/4/5G etc. data.
Cellular networks – data transfer over ‘cells’ and the VPN – Virtual Private Network. A VPN gives you online
last link is wireless. privacy and anonymity by creating a private network
from a public internet connection. It masks your internet
protocol address to keep your online actions private. It
provides secure and encrypted connections to provide
greater privacy and security.
File access rights – whether you can access certain files.
Transaction logs – to keep a record of what has happened
on the network – the transactions.
Backups – keeping a regular backup copy of files.
Topic 3 OPERATING ONLINE Knowledge Organiser
3.1 POTENTIAL RISKS TO DATA AND PERSONAL 3,4 IMPACT OF THE INTERNET ON ORGANISATIONS 3.8 IMPLICTIONS OF THE USE OF DIGITAL
INFORMATION WHEN INFORMATION IS POSTIVE IMPACTS: improved communication, access TECHNOLOGIES
TRANSMITTED AND STORED DIGITALLY to global markets and workforce, changes in the way Data protection – this means that organisations
Risks to data and information by – unauthorised information is used and managed. storing data must do so legally and individuals have
access, deliberate damage by malware, accidental NEGATIVE IMPACTS: security issues, risk of hacking, rights over their data.
deletion and theft of personal data through phishing greater competition. Copyright legislation and how this affects the use of
and pharming. images and media – permission needs to be granted
Methods to secure data and personal information 3.5 IMPACT OF THE INTERNET ON SOCIETY from the author before an image or media can be
online: Less restricted access to networks at any time. used.
• Firewalls – see Topic 2 Information rich and poor.
• Encryption – see Topic 2 Unequal access to IT – digital divide. 3.9 AVAILABILITY OF INFORMATION ONLINE AND
• Passwords, PIN and biometric Impact on communities with no or limited access to THE USE OF ONLINE INFORMATION
• CAPTCHA – e.g. click on the images of bridges digital technologies. Information can be gathered from a variety of
• Anti-virus, malware, spyware, adware etc. Impact of IT on socializing and how it has changed sources.
• Access rights and file permissions the way we socialise – social networks etc. You must be able to select and use appropriate
• Not opening attachments or following links sources of information.
• Backup procedures 3.6 TYPES OF ONLINE COMMUNITIES You must be able to use search engines effectively,
Online payment systems, bank cards, contactless and KEY FEATURES OF ONLINE COMMUNITIES: advanced search etc.
NFC – Near Field Communication. • Social networking Evaluate fitness for purpose of information in terms
• Online gaming of accuracy, age, relevance, reliability and bias.
3.2 ONLINE WORKING FROM HOME • Online work spaces Issues
IMPACT OF THE INTERNET ON INDIVIDUALS ON: • Virtual Learning Environments (VLEs) Copyright – you cannot use a source without the
• Employment, new job opportunities, job • User generated reference sites – wikis, websites, creators permission.
changes, new skills and job losses. forums. Plagiarism – copying and pasting and paraphrasing.
• Working practices – collaborative, flexible or • User generated content: video sharing sites, You must not use someone else's work and pass it off
mobile working. blogs, websites. as your own.
• Better access to information, new ways of
learning and wider range of entertainment and 3.7 USE OF ONLINE COMMUNITIES
leisure opportunities. Functions and target audience of different forms of
• Social impacts – reduced social interactions, online communities.
increase in cyberbullying, reduced physical Online communities are used to communicate and
activity. collaborate on a global scale.
• How to stay safe online. Acceptable Use Policies (AUP) used to ensue users do
not do anything they shouldn't on public computers,
3.3 ONLINE WORKING FROM HOME e.g. schools or libraries.
Individuals can more easily work from home due to
the internet and the availability of digital devices.
Benefits and drawbacks of working from home –
negatives, isolation, positives less commute time,
less pollution.
Topic 4 OPERATING ONLINE Knowledge Organiser
4.1 TYPES OF SERVICE 4.2 IMPACT OF ONLINE SERVICES 4.3 ONLINE SOFTWARE
ONLINE SERVICES: Impact on an individual’s lifestyle and behavior CLOUD BASED SERVICES: Services that are
• Shopping sites – basket, checkout, secure of the availability of goods and services online. stored on the ‘cloud’, a server somewhere that
payment, product catalogue. You can now buy things online easily, 24/7. stores your documents, files, profile etc. An
• Booking systems for travel, leisure and Understand the impact of the internet on the example is Google Docs or Office 365.
entertainment. ways that organisations do business. They can
• Banks. trade with people all around the world. HOSTED APPLICATIONS: A hosted application is
• Education and training providers – VLE, Understand how transactional data is collected a software as a service (SaaS) solution that
online support, online training courses, and used: what is what is collected, cookies, allows users to use the service on a cloud
remote access. transaction tracking. This data is very valuable (server) somewhere. A subscription is normally
• Gaming sites. to organisations and is used to target you with needed for this. Hosted applications are
• News and other information providers. adverts and products. hosted and powered from the remote cloud
• Auction sites. Know about targeted marketing and infrastructure (servers and network) and are
• Entertainment providers – on demand, personalisation techniques. This targeted accessed globally through the Internet.
streaming, downloads. marketing is important to companies and they
can found out all about you and exactly what ONLINE STORAGE: Online storage is where
you buy, so that they can advertise thing you data is stored on a server somewhere. It is
are more likely to buy. online, on the internet and a connection is
needed to access it. Whereas LOCAL STORAGE
is stored on your computer, on your hard
drive, locally. You do not need an internet
connection to access these files.
Topic 5 APPLYING ICT Knowledge Organiser
5.1 SOFTWARE APPLICATIONS 5.3 USING SOFTWARE APPLICATIONS

Use the following software effectively: Produce information that is fit for purpose and
• word processing audience, using accepted layouts and house
• database management styles. HOUSE STYLE – given to you in your
• spreadsheet exam paper.
• web authoring
• presentation (multimedia) Use styles appropriately, including serif and
• graphics. sans serif fonts, colour choice.

Select appropriate software applications to Work accurately and proofread, using software
meet needs – e.g. using a database instead of facilities where appropriate for the task.
a spreadsheet to store data as you can query it
etc. 5.4 REVIEWING OUTCOMES

5.2 DATA AND INFORMATON Review the outcomes of the use of software
applications by comparing the digital product
Understand the difference between data and with the original requirements.
information – INFORMATION IS DATA +
MEANING. Identify strengths and weaknesses in a digital
product and suggest possible improvements.
Use:
• text Make modifications to improve the outcomes.
• numbers
• images Evaluate the selection, use and effectiveness
• animation. of ICT tools and facilities used.

Enter, organise, develop, refine and format


information, applying editing techniques to
meet needs. E.g. use bold, italic, underline.

Bring together and organise different types of


information to achieve a purpose – e.g. a
graph in a Word processed document.
Topic 6 SOFTWARE SKILLS Knowledge Organiser
6.1 WORD PROCESSING 6.2 DATABASE MANAGEMENT 6.3 SPREADSHEETS
Enter or edit text that is appropriate for a given context Identify data types: Know data types, number, text, currency etc.
using accurate spelling, punctuation and grammar. • alphanumeric/text
Enter, edit and format text using: bullets, numbering, • numeric/number Format a worksheet: currency, percentage, decimal
sub-numbering, alignment, tabs, line spacing, colour, • date, currency places, date, time, text wrap, row height, column
font size and style, text wrap, text boxes. • logical/Boolean. width, gridlines, merge/split cells, cell borders, cell
shading, hiding rows and columns.
Use columns and/or tables: horizontal and vertical text Explain the structure of a given database, including:
alignment, merge and split cells, gridlines, borders, record, field, table, primary key/field, foreign key/field, Use formulae: arithmetic operators (plus, minus,
shading. relationships between tables. FOREIGN Key is PRIMARY multiply, divide), percentage, single operators, multiple
key in the linked table. operators, absolute and relative cell referencing,
Use page layout: headings, sub-headings, lists, named cells/ranges.
templates, header, footer, portrait, landscape, page Explain the need for validation and identify validation
breaks, page numbering. checks such as range check, presence check, type Use functions: SUM, AVERAGE, IF, VLOOKUP /LOOKUP,
check, length check. These are needed to check data in MAXIMUM, MINIMUM, COUNT (COUNTA, COUNTIF),
Integrate in a single document: charts, tables, images, the database is VALID and conforms to our LENGTH, PRODUCT.
callouts/autoshapes, text from different files, text requirements.
boxes, grouping, layering (in front of/behind), values Use other features: multiple worksheets, sorting,
from spreadsheets. Sort using a single field, multiple fields, filtering.
ascending/descending order. Use the FILTER for this.
Produce documents in these document types: letter, Input information to given tables or forms applying Add graphs and charts: pie chart, line chart,
report, newsletter, poster, leaflet, information sheet format consistently. bar/column chart, scattergram.
(fact sheet), memo.
Use standard conventions: salutation, complimentary Use search/query using single criterion, multiple Select an appropriate graph/chart and format it
close, date, subject, logo. criteria, search within results, relational operators, effectively adding title, axis labels, legends, axis, scale,
logical operators. > - greater than < - less than, = - equal trend line as appropriate.
Use mail merge: mail merge from word processed, to. AND & OR in queries.
spreadsheet and database documents. Print selected columns/rows from a worksheet formula
Produce outputs: reports, mail merge documents, view or data view in landscape or portrait format,
6.4 WEB AUTHORING specified fields, design view (table structure, adding headers and footers, row and column headers.
Use a template: tables/frames, standard page features, searches/queries, forms, relationships), data view
banners, menu/navigation. (table, search/query results, forms). 6.6 GRAPHICS
Explain features of image types: bitmap, vector.
6.5 PRESENTATION Create images: combining basic shapes and text,
Insert text, images, buttons, animation. Create a template/master slide: placeholders, footer, rectangles (including square), circles (including ovals),
slide number, background, font enhancements (bold, lines, triangles, arrows, text boxes.
Format a web page: headings, subheadings, body text, italic, underline).
alignment. Edit images: image editing, cropping, adding
captions/text, editing/deletion of unwanted aspects.
Create slides: insert text, images, action buttons,
Use HTML code: insert hyperlinks, insert images, font hyperlinks; add animation, transition effects. 6.7 FILE MANAGEMENT
enhancements. Print: handouts (two to a page, three to a page), notes Save work regularly and keep information secure.
pages, full page, headers and footers. Use sensible filenames and formats.
Create and manage files and folder structures.

You might also like