0% found this document useful (0 votes)
65 views26 pages

Unit 1 IT Revision Mat V1.2 2018

Uploaded by

yp9mkjj62h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views26 pages

Unit 1 IT Revision Mat V1.2 2018

Uploaded by

yp9mkjj62h
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Servers

Other devices like personal computers connect to the servers via a range of means such as
Personal Computers
ethernet cables and wifi. Depending on the types if servers other computers can connect
Personal Computers are computers with a general purpose by installing new software
to them and access resources.
and different applications the device dance have a completely new function.
Personal Computers contain individual processors, ram and hard components along
They are similar to personal computers and commonly contain larger storage capacities
with disk components and expansion ports. This makes it extremely easy to upgrade
and higher amounts of memory. Examples of servers include web servers, mail
them to add capability’s to our devices such as replacing the hard disk to adding more
servers, file servers and print servers.
storage or adding graphics card to an expansion port to improve graphics processing
power.
Web Servers - manages access to web pages they store webpages and associated files.
When a client computer makes asks for a web page using a URL the web server locates
Uses
the correct file and sends them back to you.
Personal computers have a wide range of functions, they have a wide range of functions
there are some popular uses.
Mail servers - Manage access to emails, when you send an email it goes to an outbound
For example word processing, desktop publishing, and database
server then it is sent across a network and when a user logs into their computer and
Management systems as well as graphics, music and film editing.
email account the email is forward to their computer.
This is due to a wide availability of software, goods processing
capabilities and the range of available input devices. For
File Servers - Store your files such as word documents and
example a mobile device doesn’t use a keyboard and isn’t useful
spreadsheets which can be accessed by any computer the files
for word processing.
are stored on a server and become available when logging in
We use these devices for daily accessing the Internet and
this is cloud storage.
surfing the web. They come with networking capabilities and
Print servers - They operate by storing jobs on a server
computers require expensive graphics cards if used for
until you log into the printer and release the job.
gaming.
Unit 1
Digital Devices 1
Entertainment Systems

Mobile Devices
They are designed to entertain via watching listening and playing. They usually contain
good hard disks storage for TV/Films and music. They commonly have wifi connectivity A computing device are designed to be portable being compact light-weight and running
for streaming and downloading content. on battery and connect to wifi.
Examples of entertainment systems include digital media players, mp3 players & video They have devices which are System-on-a-Chip which are integrated on a single chip this
game consoles. chip has a GPU and a RAM and CPU. However they are very difficult to upgrade as all
the components are integrated.
All these devices are used for home entertainment. Digital devices allow us to stream
digital media such as films, tv, music and images from over a network. Uses
Mobiles are a massive part of peoples lives and are used for most tasks, like PCs they are
This can be done with devices such as Apple TV and Chrome Cast. Instead of streaming used for all kinds of tasks and functions can be changed by applications.
we download the media and play it off the hard disk.
Most people use mobiles for browsing the web, emailing, and playing games they are also
MP3 players are able to access thousands of songs and on MP4 player we are able to used for organisational functions.
video and other forms of auditory.
These devices daily have touchscreens and this makes them impractical for word
Video Game consoles allow you to play video games and even use the Internet to play processing as they don’t have keyboards and intensive tasks.
video games.
Multifunctional Devices
Digtial cameras are able to capture data such as video as digital data.
It does this by using a grid of photosensors that convert light into a digital pixel that
A multifunctional device is usually related to as MFD’s they are multifunctional
our computers can read and store the data is usually stored on memory cards we refer to
peripherals.
a camera as having Mega pixels are indervidual pixel of colour is used to record an
An Example is a device can both perform an input and an output such as a Printer/Fax
image.
even tho both functions are outputs. Printers can offer several functions such as scanning
and photocopying other examples include multifunctional printer, touchscreens and force-
20 megapixels is a higher quality image.
feedback games controllers.
Most digital cameras contain bullt in memory card slot. As the memory card is removable
Uses
it will allow you to transfer pictures to another device such as laptop.
A multifunctional printer can print copy and scan and are usually used in home and offices
Examples of digital cameras include digital still cameras and digital video cameras.
and saves money on separate devices.
Uses
Touchscreens are used on tablet devices and allow users to input without a keyboard or
mouse. The user uses the touchscreen to view and input input can be made with an
One use of digital cameras is to allow use to share them using
onscreen keyboard.
computers we often uploads pictures and videos to our social
network profiles we like to share and its also done through email.
Force-feedback controllers are used on games consoles and allow
We also edit and manipulate videos and pictures using
You to control the game and receive vibration output is designed
photoshop.
To make the experience more immersive. Such as when you
Fire a virtual gun you will receive feedback.

Unit 1
Digital Devices 2
Communication Device & Systems
Data Capture and collection systems
It has become essential for all of our
Data capture and collection systems input data computing systems to be able to talk to each other through
and store data through methods other than direct data entry. the internet or smaller networks.
This allows the data to be entered into a computer system directly during the data
capture stage so reduces the amount of human errors. Examples of data capture & Communication devices allow us to transmit data between device over a network in
collection systems include barcode scanners, optical mark readers (OMR) and magnetic various ways. Sometimes through wired cabling sometimes wireless.
ink character readers (MICR). Examples of communication devices include network interface cards (NIC), wireless
dongles and routers.
These devices are often used at EPOS tills in shop.
Barcodes - Scanners capture data reading widths of dark and light bars they are on Our devices are all used to transmit data over a network commonly the internet or a
the back of most products when the barcode is read then it matches it to the database and LAN.
returns the price of the item.
Network, interface cards for example allows to be transferred to and from a networked
OMR is used shops for inputting lottery tickets pre printed when are marks are placed on computer using a ethernet cable.
the form then the OMR devices detect the markings and see what number you have
ticked. Wireless dongles allow you to ether transfer data to a router wirelessly as part of a
mobile broadband network often integrated into a smartphone.
MICR - is used for verifying that cheques are legitimate. A special kind of magnetised
ink used on the bottom of a cheque MICR device reads the magnetic codes. A router directs data to its correct destination over a large network wherever two
networks meet a router is required to direct the data to its correct place.
Eduction and Training

Interactive whiteboards are used by teaches in order to support teaching in-front of a Personal
class. These interactive whiteboards are multifunctional as they can have input and output
commands. This is beneficial over using a traditional whiteboard as notes can be saved to Entertainment systems - are used everyday as personal computers and tablets to watch a
a centralised location and can be accessed by students outside of a class room and can be Films and TV. In particular internet streaming has changed the way we access TV and
edited. film. By playing them straight from the internet we can save disk space and makes
content cheaper. Video games consoles are very popular in the home they allow use to
VLE - Virtual Learning Environments are used in schools as websites it allows teachers play games with friends and family. The drawbacks are that the growth of piracy,
to upload resources and share presentations and worksheets so that they can share them where TV, Films, Music and Games are illegally transferred over the internet.
with students. This allows access to their learning at home so they can prepare for lessons
and exams and submit their work for assessment and allow students to take part in a Online Shopping and Banking - Another major way that personal computers are used
discussion. are for online banking. Online retail websites like Amazon allow use to purchase pretty
much anything. Most popular high street stores have a websites.
Online Learning - Online learning environments are websites such as BBC BITESIZE Online banking has allowed for us to manage our finances which include checking our
We access sites though the internet and on mobile devices which allow access to content bank statements and transferring money. We can all do this without ever needing to
such as animations as well as visual and audio explanations. visit a bank. OB is extremely helpful for disabilities who would have difficulty getting
to physical bank.
A type of detail camera called Web Cam is extremely popular
for live training and conference calling. Home appliances can be controlled by many aspects of a digital
device this is known as Ubiquitous Computing an example of
this is controlling our central heating systems and being
able to see our fridges when we are running low on food.
This offers great convents and helps reduce costs.
Unit 1
Using Digital Devices
1&2

Social Networking
We use devices to access social networking such as Facebook to socialise with friends. This allows us to create Networks of friends.
We are able to share life events and message people directly.
Social networking sites allow you to create or join a group to talk to people with similar interests. Their are many drawbacks such as
they can be seen to be distracting and can often affect productivity in the workplace.

Instant Messaging -allows us to hold real time text messages based conversations with others. In many cases it replaces SMS text
messaging many people use WhatsApp. This is because these apps make messaging much cheaper as they allow use to hold
conversations free of charge and allow use to attach files. Instant messaging is proprietary meaning you need the person to have the
same IM as for example iMessage can only be used with Apple Devices.

VoIP - Voice over Internet Protocol is a type fo software that allows you to have a real time voice and video conversation Skype is a
popular kind of software. We can commonly use personal computing devices to hold VoIP calls or mobile devices Smart TVs and games
consoles can use Skype. This has become more popular as an alternative to phone calls in recent years. This to do with the ability to
hold group conversations at a much cheaper price this makes it a great tool.
other reasons.
Organisational Use
EPOS - Electronic point of sale is computerised checkout tills For example barcode
readers are used to add new products to a sale, Optical mark readers use used to input
Businesses use digital devices to make themselves more efficient.
lottery tickets. Magnetic ink character readers are used to verify cheques and chip and
Administration - Businesses use spreadsheets and accounting software to manage their
pin devices both are used for making payments. We can also use mobile devices by using
finances by tracking there sales and expenditure. Most business will make use of
NFC such as Apple Pay. This has made the sales process much quicker and efficient.
personal computers to use software like word processing a desktop publishing. This
We now even have self service tills so companies can save money by employing less
might be producing a sale report or giving a presentation to investors. Thanks to
people.
servers which are communication devices we can share information through email or
over the LAN. This helps make businesses more productive as less time is spent
Stock Management - personal computers and servers are used by shops EPOS’s are
correcting human error as it is done via a computer.
also connected to databases and when an item is sold the information goes through a
database and server and reduces the stock level. A stock management server can be
Video Conferencing - There are a number of software packages that allow you to hold
connected to the internet so it orders new stock automatically. This saves time and
meetings over the Internet as opposed to face to face. It allows you to have voice and
money as business’ doesn’t have to employe people to manage stock and reduces the
video conversation. They software allows for people to take part in meetings and share
human error level and doesn’t make you
documents. This saves a business a lot of time as employees will not have to meet or
order products incorrectly.
be a the same location.
Retail Websites - most popular stores will have a online
Design & Manufacturing - The manufacturing and construction
website to sell products to run an online website you need a
industry uses CAD software which is computer aided design
Web server to host and needs a PC to update the site.
this is used in technical drawings this allows for detailed
drawings we can use detailed drawing to build things and
Print using a 3D printer to produce models.

Unit 1
Using Digital Devices
1&2

Creative Tasks

The creative industry has benefits from a lot of growth of digital devices.

3D graphics the video game and film industry make heavy use of personal computers for 3D graphics. These graphics are called
CG effects these 3D models are used in most films and are more flexible and 3d models made. Similarly the majority of high end
video games use 3D graphics. High end video have high end 3D graphics.

Photo/Video Editing - When we take photos and videos using digital cameras. Professional photographers now heavily use both
digital cameras and personal computers for this purpose such as fixing the lighting of a picture or the saturation or removing a red eye.
However photo editing has been subject top contriversy as we see unrealistic expectations of beauty particularly with young people. In
addition the movie industry is very reliant on these technologies most film is shot on digital cameras then the video is edited using a
personal computer.

Graphics Design - Logos leafless and brochures are all designed with graphics software and desktop publishing software.
Graphics designers used to do the majority of their work by hand and typing was positioned inderviually however now desktop
publishing software does it automatically, This is much more efficient than manual type sets which otherwise would be a painstaking
and we can also sending data of to a printer quickly.
with disabilities.
Printer - is a device used to produce physical copies documents used in computer
Microphone - An audio input that allows uses to input sound which is commonly used for
systems. A Braille embosser will print with dots in the paper so that people with Visual
holding VoIP conversations used for recording your voice.
impairments can read the document.
Webcams - A device for recording digital video for VoIP conversations.
Plotter - A type to printer that is designed to print out vector images which typically prints
in high quality. This is typically used to print out CAD designs.
Game Controller - Used to control video games in the form of a gamepad or joystick
these can contain. Force-feedback so the device rumbles.
Speakers - are a device used to produce audio output by converting
digital signals to analogue signals. It is commonly used to listen to
Sensor - This is an input device that takes readings from the
music and take part VoIP conversations. Headphones are
environment such as temperature or light an example could
auditory devices.
be a thermostat.
Actuator - An output that produces motion which we use to
Scanner - A device that converts documents into digital data
move things. They are commonly used as part of
It can be hard for scanning images for editing.
Ubiquitous Computing an actuator that turns the
heating on an off.
Graphics Tablet - A flat boarding pointing device known as a
stylus that allows a user to enter data much like they are using
pen and paper. They use it for producing logos.

Unit 1
Input & Output
Devices
Advantages Disadvantages
• HDDs offer a big storage capacity for a • HHDs have a relatively slow read and
low price 1 TB for £50 Hard Disk Drives
write speed than SSDs. Solid State Drives

These are commonly used as the primary storage devices in a computer system they can They are often uses as portable devices with a large capacity they are usually a primary
also be uses as an external storage device. storage device in laptops. SSDs are a form of flash memory. They store data on
semiconductors and the chips can be switched on and off sold state drives remember the data
• They HDDs
are alsoareconsidered
a form of reliable
magnetic method
storage devices
• Theymade of magnetic
also have a number materials
of movingthatparts
we call even after being turned off.
of storage methods
platters the Hardas Disk
they have
Drivea magnetises
long and demagnetises billions of tiny individual
which makes then easily damageable.
life span and It
platters. tend to to fail
registers out right.
as binary 1s are magnetised areas and 0s are demagnetise areas. Advantages Disadvantages
• SSDs have extremely fast read and write • SSDs are much more expensive 1tb will
speeds compared to hard disk drives cost £200 (£50)

• They also consume less power than • Due to this higher cost this means storage
HDDs this makes them very good for will generally have a much lower capacity
devices that run off batteries. than HDDs.
• As they have no moving parts they are • SSDs have a finite number of writes before
less likely to be damaged which they no longer work this means they will be
less useful for devices that a lot of writing
makesOptical Disks
USB Flash Drives like servers.
them useful
These devices involve a USB connector and flash memory in order
Unit 1 CDs and Blue Ray disks are all examples of optical disks used
for storing Music TV and Films, all of these different types of
to store data with portability in mind. They are commonly used for
transferring data between different computers.
Storage Devices disks are a form of optical disks, a light is bounced off the
disk and is read back differently depending on whether the light
bounces off a marked or non-marked area. Marked areas
USB flasherives use flash storage much like SSDs and so they
are 0s and non-marked areas are 1s.
store data the same way.

Advantages Disadvantages
• The vast majority of personal computers have optical disk
• An individual disk has a small storage capacity up to 50gb.
drives.
• USB flash drives are very • There a small storage media which makes them highly • Optical disks are easy to damage with scratches.
portable storage devices due to portable.
• They only have a finite number of writes 1000 times
their small size and light weight
they are easily connective.
• Due to the small size they can
easily be lost.
SD Cards
•Much like SSDs USB flash
drives have a finite amount of Secure Digital Card which is a very small memory card which is commonly used in digital camera and in mobile
writes however people don’t devices like smartphones because they are small enough to fit inside. USB flash drives store data in the same way as
usually write to USB flash SD cards.
drives often.
• • SD cards have a low storage capacity compared to other
• Much like SSDs because they • Compared to HDDs and SSDs SD cards are extremely small and portable even compared
to USB drives making it very easy to transfer data between
devices 32 - 64gb are common capacity’s.
no moving parts this makes USBs have a relitivly low
devices.
• There are a lot of vareitys in SD cards SD, SDHC, SDXS
storage. are common. There are other types of flash memory
them reliable and durable as • Again like other forms of flash storage they are reliable which can lead to compatibility issued with SD Card
they’re unlikely to be and wont break when bumped.
readers.
damaged by knocks.
• USB connectors in the device
are highly compatible.
Real time operating systems - This type of operating system monitors external events
and processes data as soon as it enters the computer system to allow the computer to
respond immediately to the input. Real time operating systems are embedded in devices
Data Processing
such as aeroplanes, traffic lights and automatic systems.
Manual Data Processing - involves an individual entering data into the computer
Single User, Single Task Operating Systems - A single user single task operating
themselves. This might be used by a hotel clerk entering customers booking details using
systems can only be used by one person at a time and complete one person
a keyboard or marking examination papers.
application. This was popular in older smartphones digital assistants like palm devices
this used a single user single task called Palm OS.
Automatic Data Processing - makes it easy for data to be inputted as its done
automatically. For example Smart monitors will input data about how much
Single User - Multi Tasking Operating Systems - This type of operating system is also
electricity and gas you were using and send it to energy companies so they can give you
designed for only a single users at a time however it can run multiple applications at
the correct bill. Optical mark readers in schools do this for registers.
once. Such as Windows 10 and MacOS. We commonly see this operating system on
Manual Automatic smartphones and computing devices.

• Human error - people are Multi-User Operating Systems - A multiuser operating system allows
prone to making mistakes many users to make use of a computer system and all of its

Data is accurately entered into
resources at the same time.
• Time Consuming - Takes a lot the system with out error
of time to input data. • Time & cost - data entry can Powerful servers, supercomputers and mainframes make use of
be done quickly without hiring Multiuser operating systems.
staff.
• Complex data - can be entered. • Learning Curve - New systems
• Reduced Training as staff are often require staff training.
used to manual systems

Unit 1
Data Processing &
Operating Systems
Role of Operating Systems
Accessable Devices
Networking - Much of your networking capabilities, including
Trackballs - Acts as an alternative to a mouse which sits within a
connecting to the internet is controlled and managed by your
holder that can be rotated in order to move there cursor on screen.
operating systems and example of this is a TCP/IP which are the protocols that are
fundamental to transferring data over a network.
Braille & Large Key Keyboards - Braille keyboards use braille on the keys. Larger keys
Security - Computer systems are vulnerable to numbers threats examples include
use larger sized keys.
viruses your computers often come with preinstalled with measures to protect
computers. Such as antivirus and firewall software as wells as users being
Touchscreens - While not strictly accessible touchscreens are better for selecting things
authenticated to gain access
on the screen.
Memory Management - Your operating system and different software applications running
all need to be loaded into the main memory in order for them to run. It then allocate
Braille Embossers - This is a printer that will output braille into paper aspired to standard
each of your applications memory to run and deallocate memory space when they
ink.
are no longer in use. If the memory fills up then your computer will use the hard drive to
create virtual space.
Screen Magnifiers - This usually attaches to an existing monitor and magnifiers the
Multitasking - When running several different applications at once the operating system
display output.
plays an important role in managing system resources as it assigns resources to
different tasks the operating system will assign small amounts of processor time to each
Eye Typer’s - these use cameras mounted on computers to track the eye movements of
applications.
users to control the computers.
Graphical User Interfaces Adaptive Interface

Most computers use use graphical user interfaces known as a GUI these operating systems Adapted or adaptive interfaces can alter its presentation to better support the user.
are known as MacOS, iOS and Windows 10. Windows operating systems can change colours, images, font sizes, cursor sizes etc.
This type of user interface is designed around icons and images commonly known as a Windows 10 can also alter its self for smartphone or computers.
Wimp Interface (Windows, icons, Menus & Pointers) We use a pointer to interact with the
interface.

Advantages Disadvantages Advantages Disadvantages

• It is easy to use especially for • It uses a lot of processing


power and main memory to
beginners, users don’t need to
learn any complex commands in run this can cause problems • They fit the needs of a user • This requires an understanding
oder to us the interface. Instead with older systems that don’t effectively. This can ease of the user ignorer to adpat it.
of relying on navigation on a have enough resources. confusion and improve This can be a consuming task.
cursor on the screen. It is easy to • It can be frustratingly slow to accessibility for those with
individual needs such as an
This is true for devices being
used by multiple users who
move data between software perform certain tasks for users.
applications by dragging and impairment. each need an interface.
Many tasks require a number
dropping or copying and pasting. of actions to complete.

Unit 1
Choices in User
Interface

Command Line Interface

Command line interfaces were heavily used in the past when computer weren’t powerful Menu Based Interfaces
enough they relied on the user inputting a string of text to get an action. However it is This type of user interface presents the user with a menu that contains a list of options the
still used for some experts particularly for maintaining a network the users find a CLI user uses to navigate in a various order by choosing relevant submenus in an order.
much more powerful and effaceient for completing tasks. Such as MS DOCs would You can use this type of interface at ATM machines at the bank and self service tills at the
require a command to change fonts and settings. supermarket and many fast food resultants have self service kiosks like these.

Advantages Disadvantages Advantages Disadvantages

• Experienced Users who know various


command lines will find completing
tasks much quicker than navigating • You need to know the various • They are very easy to use with limited • A menu based interface can be very
possible actions and clear options. frustrating for users if there are a lot
around an interface. commands in order to operate the
• The simplicity requires much less computer system.
• The interface is easily adapted to of different levels of submenus.
memory and processing power in order • This makes it difficult for beginners.
different users and translates into various • Options are limited so more complex
languages and options can be spoken actions cannot be performed if the
to run. • You will need training. rather than being visual.
• This means it can run on weaker required option is not available.
computer systems.

Spreadsheets Software - is used to organise data into a grid of rows and columns
Hardware - All operating systems require a minimum hardware spec as a graphical User which allow you to perform calculations features are, formulas, functions, graphs.
Interface. Requires a lot of memory and processing power. • Database Software - is used to create and manage databases and can export reports and
Additionally every application will require processing power and memory will be create quires and police are forms.
assigned to it. If the system runs out of rehouses it will start to slow down and crash. • Presentations Software - is used to proceed slideshows and audiences used for lessons
Another issue is the hard disk fragmenting locating data in different places. business reception areas they can have animations and transitions.
This affects the the operating systems performance as its harder to locate the files. • Graphics/Multimedia Software - used to produce graphics on your computer
• CAD - Software is used to produce precise technical illustrations 2D/3D.
Malware - Malicious software such as viruses can hinder performance they can do this by • Graphics Editing - Software is used to create and manipulate images on a computer
corrupting data and affecting network traffic and disabling various functions. such as touchups, layering, resizing/cropping, colour, brightness.
These can causes the system to slow down significantly. •Desktop Publishing Software - is software used to arrange
graphics to produce leaflets and books they have grammar
Virtual Memory - A portion of the hard disk used to backups main memory when you no checking and printing functions.
longer have any ram available however virtual memory is not very effecient and will • Video Editing Software - Software is used for rearrange and
reduce performance data that is moved between the two manipulate video footage such as adding filters and effects.
Is known as thrashing and is very degrading.

Personal Software - Software Used in our homes.

Pagefile is too small and can not support the main memory

Home Finance Software - Is used to manage your personal
accounts such as investments, income and expenditure.
effectively.

Educational Software - Software is used to learn new skills and
musical instruments common features include progress tracking
and quizzes.

Entertainment Software - is used to take part in leisure
activities for hobbies and amusement.
Unit 1 •
Communication Software - Allows user to communicate.

Email software - Is used to send electronic messages over the Internet common
Performance Of Operating
features include carbon copy address books and replies.
Utility Software
Systems & Application •
Web Browsing Software - is used to access webpages and then view them and navigate
• Is software which is important for maintaining and managing a them.
computer system. Each utility software is used for maintaining
performance and is designed for a specific task.
Software internet. •
VoIP Software - Allows users to hold realtime voice and video conversations over the

• Disk Defragmented - HDDs are prone to fragmentation


As the
which negatively affect the disk read and write speeds and will

Instant messaging Software - is used to hold real time text based conversations over the
Internet and allows users to send and receive file attachments.
anywise the hard disk and regroup the data so the files are all in the same
place speeding up the computer. This should be done regularly. He computer shouldn’t be used during
this time and other applications open will slow it down.
• Backup - If data on our hard disks are damaged by a virus if you have a backups then you can
restore the data and backup software can automate the process. Backups can take a long time a and a
defragmented hard drive can slow performance and malware can corrupt it entirely. Where you are
storing the backup can cause the problem as cloud backup can take a long time but a backup on an
SSD with Thunderbolt 3 (USB 3.1 Type C) can take a matter of seconds.
• Disk Registry Cleaner - A Disk cleaner will remove temporary files that we don’t need this will
save hard disk space that can be used for newer data by removing redundant files this will improve
the read and write speeds of the disk it is generally quick to use the more data that you have the
longer it will take.
• Software Updates - Software running on computers needs regular updates to keep them secure and
remove any bugs to update software you need a stable internet connection if you don’t update
regularly there may be a lot of updates to complete at once this will take a long time the software
update utility will take care of the updates.
Antivirus - Antivirus will detect any suspicious software and remove them before they cause a
problem they will do this by scanning the system. The size of your data storage will determine how
long it take to find viruses, the process can temporarily slow the system down.
FireWalls - 🔥 They will monitor the incoming traffic in and out of your computer this might be
hackers or malware and it will stop them. They can slow network speeds down and prevent it from
working properly.
Compatibility - can come in a number of forms can the applications run with operating streaming. Containers are part of a video file format it includes a type of CODEC. The
systems such as Windows and MacOS. containers contains data, video and audio information and the CODEC used. Many
Compatibility issues could be can it run on the hardware you have available. Your containers allow you to use a number of different codecs which will change the quality
computer should be able to meet the minimum number of requirements. and file size of the final output.
A final compatibility issue is whether the applications will communicate with other • AVI - AVI is designed to produce the highest quality video format and has limited
software many applications come as suites such as MS - Office and Adobe Suites are all compression features so files are generally very large. AVI files are created without any
designed to work to together. Using a suite will be better such as file types all work compression to ensure quality this makes them poor for sharing, there is no good format
together and the design language is common. more streaming as the index which are chunks of data are stored at the end of a container.
• MP4 - This file type is used for high quality video and is similar to AVI and has limited
Uses - This is whether the software will have the desired functionality for the desired use compression options but better ones than AVI and can produce equivalent quality to AVI.
for example when choosing a video editing software such as windows movie maker Another benefit of MP4 is its highly compatible with a wide variety of media players and
is good for streaming MP4 is standard upload format
however for professional editing someone might use premier pro as is has more features.
for Youtube.
Some companies to get the features they need will custom make software.
• MOV - is an Apple proprietary format that is very similar to MP4.
• So compatibility is poor, it is good for streaming over the Internet
User Experience - Depending on how experienced people are they • it has good file quality to size but doesn’t have good compression.
will want software to be as easy to use. If you only use • MKV - Is a format designed for producing higher quality than MP4,
Microsoft products changing will be difficult. If a company MKV has flexible compression features that offer CODEC
changes its software employees will need to have training so compatibility. It does have much poorer compatibility than MP4
they can use it. with devices such as as iPads. Works great with HD video.

Unit 1
Application File Types
Application Software Choice, Image It is now common to see different applications loading different file types
Image File Types which are used by different applications. Some file type will have different file sizes and will
Different file types of images want different types of file formats and
& Video File Types, Application File
allow access to different features
need different formats depending on there intended use some need Types. such as being able to save and include macros.
high quality and some need to be able to be shared over the internet. • Word Processors - DOCX is the default file type for Microsoft Word 2007. It is replaced by
However different file formats can cause compatibility issues. the old DOC type. It can deliver much smaller file sizes and can suffer from less data
• BMP - This is an uncompressed format that has a 24-bit colour depth meaning it can display corruption. This is due to it being based on XLM which doesn’t corrupt and is compressible.
over 16 million colours. It is not able to be compressed so will have a large file size. These DOX also offers great security against Macro Viruses. DOCX can’t be opened in older
images are not shared on the web and most likely kept on a local server for storing original versions of work however is an open standard file type. RTF is a much older type which can
images. offer other formatting features and a low file size.
• JPG - Is a compressed file format which has a 24-bit colour even tho it has the same colour as
a BMP it is compressed using a lossy format making the file much smaller. Lossy compression • Spreadsheets - XLSX is a different file type for MS EXCEL it replaces the older file type
is a type of compression where data is removed during the compression process. Meaning XLS (same reason as DOCX & DOC). XLSM Stores Macros. A file type is that is also used
once you have saved a JPG it will always be a lower quailty. You can set the level of sometimes with spreadsheets is a CSV this stores no formatting just raw data on a single
compression. It is used for storing photos and is good for sharing them over the Internet and worksheet. File size will be small and works with any spreadsheet application when importing
offers a reasonable quality. data.
• GIF - Gifs are a compressed format that has an 8 bit colour depth and can only display 256 • Presentations - PPTX is the default file type or MSPPT 07 it replaces PPT and PPTM stores
different colours so file sizes will be very small. The compression it uses is lossless this means macros. PDF is commonly used with P-PT. They can be opened by most devices so expensive
it can be decompressed back to its original quality. The file size is small but has a very limited software isn’t needed. PDFs cant be edited once saved. Once presentation is complete it is
colours and is only useful for simple graphics like logos. useful but not during development it can’t display transitions.
• PNG - These can go up to 32-bit they don’t have any more colours than 24 bit but can store • Databases - ACCDB is the default file type for MS Access and replaces MDB it allows for
more transparency. It uses lossless compression file sizes can be quite low. many features, such as supporting multi-value fields, attached data and encryption. ACCDB
• SVG - This is a vector format this means it doesn’t store pixels as colour but as shapes and won’t work with older versions of Access. There is no significant effect on the file size
lines meaning it can be resized without becoming pixelated. They are used on webpages and it between ACCDB and MDB.
is an open standard file format which works with most vector graphics software and they can
only be used for simple images and can not have a very complex colour gradient so are only
useful for illustrations.
All software applications have a software licence to use the software you must purchase often struggle to manage.
the licence. Organisational Use of Emerging Technologies
Open Source Software - An open source software licence gives both users permission to use and • Businesses are under pressure keep up to date with technologies this can be every costly.
access the software and modify the code. The licence is simpler open source software is often free • Augmented Reality - The uses a computers to play a virtual images in the real world this can
to use and modify. The source code is available to modify to add or change features that suit the allow for targeted advertising. Some mobile apps use a basic form of this.
users needs. The software is used to maintained and made by a large community so there is a fast • Internet of Things - Time consuming tasking can be limited through IOT devices. Smart
cycle to updating and fixing security holes. It has better compatibility so you are less tied into sensors can be used to monitor things.
software. Development can be abandoned to by an author as they have no responsibility to • 3D Printing - Simplifying manufacturing of parts and products by printing them out from
maintain it. Maintaining updates can be difficult due to the fast update cycle. There are no design which we can use for producing models such as false teeth and car parts.
professional supports and documentation. This means people will have to rely on the community. • Advantages - Productivity - A lot of emerging technology in business
People will malicious intent can edit the code and use viruses. are designed around making tasks quicker to save time.
Proprietary Software - This gives the software licence to the end user for permission for • Reduce Errors - Many of these devices also aim to reduce human error
such IoT spotting if a warehouse temperature was too high.
them to use the software but it remains the intellectual property of the manufacturer this
means that you can’t edit the source code
• Disadvantages - Cost - As a business needs to constantly adopt new
technology to keep up with its competitors this can be expensive and a
Proprietary software comes with software updates and ongoing reliable bug fixes and big gamble but can save money in the long run.
software updates. The software is well supported their is usually good documentation. • Staff Training - Implementing new tech will need new staff training to
Proprietary software has a better UI. Licensing is much more restrictive ensure they can use it.
and the source code can be unavailable. You are reliant the
manufacture to make software updates which can take a long time
Factors Affecting the choice of IT system
which can affect productivity and security. Proprietary software
Emerging Technologies Digital Technology choice factors
often uses proprietary standards making it hard to switch to a
•different
Emerging Technologies Performance -Technology is advancing
software.
User Experience - The User experience is a feeling a person gets
at a rapid pace however we often don’t have the tech to keep up when using a device. When purchasing an IT system we want to
• Virtual Reality - The impact on performance means that it needs use it different reasons. The experience the user is looking for
powerful graphics processing capabilities and large main memory in order depends on their skill set.
to use. Video game console manufacturers are having to release upgraded consoles to provide VR Ease of Use - How simple and intuitive the device is to navigate and perform tasks. Such as an
capabilities to keep up. Unit 1 inexperienced user may choose a device that is easy to use.
Media Streaming - Home networking & internet connections are often not fast enough for Performance - How powerful the device is such as processing, memory, graphics and storage.
Software Licensing, Emerging
smooth media streaming. This is especially true for 4K content driven by emerging technologies Availability - How often the device can be used such as whether the device can always be on
in the TV industry, such as Ultra-HD TV screens.
Technologies, Factors Affecting theonline shop will want access 24/7.
such as an
Self-Driving Cars - Lidar sensors, mobile broadband communication & powerful processing are Choice of IT system
Accessibility - This is how available the device is to be used by someone with a disability. Such
all required for self-driving cars. Tesla said the computer used for their self-driving cars is 40 as someone with a impairment.
times more powerful than previously used. User Needs - This is about what actual tasks the user wants to perform using the IT system.
• By increasing power to keep up it has increased cost for newer technologies. Many devices are designed to meet specific users needs and are much better at meeting that
particular need.
• Personal use of emerging technologies -often change the way we live our lives such as when Specification - A list of components which are required of a computer system in order to allow it
the iPhone changed the way we communicate in 2007 which brought an MP3 player, internet to run and perform specific tasks someone who requires high performance features will need a
browsing, gaming and communication into one device. minimum requirement of specs.
• Smartwatches - are wearable devices which work like smartphones and often include health Compatibility - This is is whether a device can work with the current devices that you are using
functions. such as a new MacBook cant work with old style USB type A as it has USB - C ports.
• Smart Speakers - allow you to automate your home by speaking into the device to turn on the Connectivity - This is about how a device can connect to networks. Many devices can only
TV, Music System and control the central heating. connect wirelessly however some wireless devices can also use cables. For example a user who
• Self Driving Cars - Vehicles that can drive without human input is being developed they can only needs to connect to use the Internet will get a device that has wifi where as a business will
reduce road accidents and can save lives and reduce commute time. get one that can connect to their LAN with an ethernet.
compatible and stable. use it at home to connect PC to the internet. However Wifi is a great alternative at home.
• Migration - This is the process of moving existing data onto the new system such as Advantages - It is very reliable connection method unlike wifi it can’t be shared. It has a
software and files this can be every complicated but can be automated such as the good range of over 100 meters and transfers 1gbps and is extremely common in home
process on smartphones. computers.
• Timescales - The time it takes for the new system to be delivered. The lead time for a Disadvantages - Wifi offers limited physical wires running from your computer to the wall.
delivery, or if an item is not currently in stock, could mean it will take too long to You rarely find and ethernet port in a laptop. It can not transfer data over a overlong distance.
arrive to meet our needs. Fibre Optics Cable - is a connection method where data is transferred to through a pulse of light
• Performance - This is how fast can the computer complete tasks, boot up and whether and is reflected over a cable and provides super fast broadband.
it will freeze and crash. These factors can be bad for, Advantages - Exceptionally good data transfer speeds around
business and productivity so must be balanced against the cost. 100gbps which is the max fibre optical cable and has a range of
• Security - This is how safe a devices from viruses and malware 100kms. It is a very secure connection method and in not susceptible to interference.
for example windows PCs will morello to come under threat form Disadvantages - It is very expensive the cable isn’t very expensive
an attack than a Mac. however the equipment needed to run the network costs much more and makes it very costly.

Wired Methods of Connect Devices


USB - Universal Serial Bus commonly used in a wired connection.
It can be used to connect many different peripherals and transfer
power and data. Wireless Methods of Connecting Devices
Advantages - USB 3.0 has a great transfer speed of 5gbps. This allows for Infrared - This is a technology which transmits data through infrared
a HD video to be transferred to an external storage device in seconds. Unit 1 lights we usually see it used in remote controls such as your TV remote
• You can connect multiple peripherals using a USB hub 127 different devices to a single port.Technology choice factors, Wired
Digital controls. Similarly it could be used to transfer data between devices.
• USB provides power so you don’t need a separate power supply. Methods of Connect Devices, Wireless Advantages - Low susceptibility to interference as infrared connect to devices one -
• Nearly every computer system uses USB and USB 3.0 is compatible with USB 2.0. Methods of Connecting Devices
to - one. Not being radio technology it is susceptible to electromagnetic interference.
Disadvantages - USB has a Relatively Short length of just 3 meters. Disadvantages - It can only transmit data over very short distances with the maximum range 5 meters. It requires
• SATA - SATA is a method of connecting computers to storage devices internally and externally a line of sight it has a very slow data transmission speed of 4mbps.
Bluetooth - is a very popular wireless technology it is common and connects peripheral devices such as mice and
via SATA III. keyboards without cables this technology has a higher speed and range than infrared. Another use of bluetooth is
Advantages - SATA three is an extremely fast connection type capable of transmitting data at with mobile technologies used to create a PAN network connection to mobile devices this is known as tethering.
6Gbps. This is even faster than USB 3.0. Internal Storage devices are likely to have a SATA Bluetooth is now used very commonly to connect headphones
connector and external storage devices are not very likely to have eSATA port. Advantages - It is easily connectable and is fully automated once setup and connects when ever they are in range.
Disadvantages - A SATA cable has a shorter range than USB of 2m and doesn’t supply power so Low susceptibility to interference this is due to its low signal and frequency. It has low power signals which make
it needs additional power. sit good for mobile devices that run on batteries.
VGA - Visual Graphics Array is a connector used for display devices such as monitors Disadvantages - Relativity slow data transfer speeds maximum speeds of 25mbps. It has poor security
compared to Wifi and allows your devices to transferring data.
and projectors. It doesn’t transfer Audio. Its rare to see nowadays.
Wifi - this is commonly known as a form of wireless connection we often use it to connect to Local Area
Advantages - Older technologies can still use VGA in the work place and be compatible. Networks such as connecting to the internet and other peripherals such as a printer or mobile device. It can transfer
Disadvantages - Unlike display ports like DVI and HDMI it transmits analogue data. data at speed of up to 7gbps.
The makes the signal degrade easily. VGA cannot handle the same quality resolution such Advantages - Fast data transfer speeds compared to anything else it is very commonly used it has a large range of
as 4K. It can’t transfer audio signals. 70 meters it has a low cost installation and are inexpensive.
Disadvantages - Complexity in setting up Wifi can be an issue for inexperienced users. Security can be a big
issue if not set up properly so setting a complex password will be good.
Mobile Broadband - Mobile broadband is 3G/4G Internet access we can tether it computers via bluetooth and 4G
usage has doubled over the last year.
Advantages - internet access is available almost everywhere and is a easy use of communicating and connecting
to the internet.
Disadvantages - are that it can be very expensive and data transfer speeds are usually slower than wifi.
connect to a over a small area between one to two people and is very secure.
Local Area Networks - A LAN spans a small geographical area usually a single building in a home or
office commonly using an ethernet cable or wireless connections through Wifi. A LAN is most
Factors Affecting the choice of Networks choice factors (Continued)
commonly used in a business and allow all the computers to connect to each other.
Advantages - Peripherals such as printers can be accessed by many computers which saves a
• Costs - Varies wildly such as a WAN to share confidential data between its different cities can
be £1000 per month while VPNs can be £5 per user per month which is so much cheaper.
business money. Files can be stored in a central location and important documents can be shared
with all users. Computers can centrally be managed by installing software or backing up all the
• Efficiency - This is how effectively tasks can be complete by the network such as dial up
taking time to login and isn’t efficient.
computers.
Wide Area Network - WANs are networks that span a large geographical areas such as a country
• Implementation - This is the time it takes to install a new system and for it to become
operational. This involves installing new software. This involves;
or the world WANs are used by business to connect together different offices of a business and
can share data such as files.
• Testing - This involves making sure that the new system works correctly and is
Advantages - Confidential data can be shared between different businesses and locations. A dedicated compatible and stable.
WAN uses a private lease line rather than a broadband internet connection to transmit data • Downtime - this is the length of time we will be without access to our network service
Virtual Private Networks - VPNs are known as a private network mainly the when implementing the network.
Internet it does this by encrypting data. Business use it so it can work • Timescales - The time it takes for the new system to be delivered. The lead time for a
securely without having a dedicated private network. delivery, or if an item is not currently in stock, could mean it will take too long to
Advantages - Individuals can gain secure access to resources in local arrive to meet our needs.
area networks while away from the office. VPNs are a much cheaper • Performance - This is how fast can the computer complete tasks, boot up and whether it will
alternative to a WAN. If using a public network data is still securely freeze and crash. These factors Network Performance
can be bad for, businessFactors
and productivity so must be balanced
transmitted. against the cost.
• Security - This is how safe a devices from viruses and malware for
example the LAN is only accessible within the business so is relatively
secure and would be too dangerous as data could be intercepted so a
business may
The Network and its components canuse a VPN
affect thefor greater security.
performance of a system every composer
could potentially slow down your network and thus your IT system.
Servers CPU and memory could overwhelmed by having usage leading to the server
Unit 1 crashing.
Limited Bandwidth in your data transmission would mean slow data transfer speeds this
Types of Networks, Factors could
affecting
case logging in and saving files which could take a long time. Firewalls used for
the choice of a Network, Network
security network can slow down data transfer due to checking packets for threats. SOHO
Performance (Small Office Home Office) networking equipment being used cannot provide the
Digital Technology choice factors when choosing a Network. performance of professional equipment.
User Experience -When choosing a network you want it to be
accessible to its users. We can correct these issues by investing in our network infrastructure and regularly
Ease of Use - How simple it is to connect to a Network such as maintaining and updating it, however this is very costly.
connecting to Wifi and having complex passwords.
Performance - How fast a network transferring data and such uploading and downloading
media files would require great performance.
Availability - How easy it is for users to use the network such as in a rural area is the
service available.
Accessibility - How suitable the network it is for access from someone with a disability.
User Needs - This is about what actual tasks the user wants to perform using the IT
system such as over multiple buildings or in a single building.
Specification - A list of components which are required of a computer system in order to
allow it to run and perform specific tasks someone who requires high performance
features will need a minimum requirement of specs such as maximum bandwidth, power
consumption consumption.
Compatibility - This is is whether a device can work with the current devices that you are using
such as a new MacBook cant work with old style USB type A as it has USB - C ports. If you
choose a new network system.
Connectivity - This is about how a device can connect to networks for example such as using
wifi or a cable broadband. This is balanced over the users needs for speed and capacity and
reliability A business regularly transmits data over the internet.
connection to this server. It then will forward the email to their server ready for the recipient
frequency band.
to access it.
POP3 - The Post Office Protocol is used to download emails from your mail server to your
• 802.11g - Based on 802.11g supports bandwidth of 54mbps and 2.4GHz and is backwards
compatible to 802.11b. Pros of 802.11g - Fast maximum speed; signal range is good and not
email client. With POP3 a connection is established between recipients email client the mail
easily obstructed. Cons of 802.11g - Costs more than 802.11b; appliances may interfere
server. The emails are then downloads to the email client and removed from the mail server.
on the unregulated signal frequency.
You can’t access emails on multiple devices. POP3 has become less popular.
IMAP - The Internet Message Access Protocol is an alternative to POP3 it works the same way
• 802.11ac - is the news generation with dual-band wireless which supports 2.4GHz @
but the emails are synced between your client and your server. This means you will be able to 450mbps bandwidth and 5GHz @ 1300GHz bandwidth.
access emails on multiple devices. Broadband
Voice & Video Calls over the Internet - Video over Internet Protocol such as Skype. ASDL - Asymmetrical, Digital, Subscriber Line is a form of DSL, a data communications
SIP - The Session Initiation Protocol is a signalling protocol between the sender and receiver. technology that enables faster data transmission over copper telephone lines.
While the video is being transmitted it uses CODECS to encode and decode data A SIP ADSL is capable of providing up to 50 Mbps, and supports voice, video and data. ADSL
signalling packet is sent from the person establishing the VoIP call to is the #1 Broadband Choice. Data can flow faster in one direction transmission faster
the intended recipient. When the SIP packet is received, this is where the downstream to the subscriber. All data is purely digital. The data is carried over a
recipients VoIP phone starts to ring. single twisted pair copper loop to the subscriber premises.
RTP - The real time transport protocol works alongside SIP which
establishes a connection RTP transmits the data. RTP is a protocol VDSL - Very High Speed Digital Subscriber Line transmits data
built upon the User Datagram Protocol (UDP). UDP gives no Up to 55 Mbps over short distances, up to 1.5km. Over a twisted pair
grantee for delivery but TCP does guarantee delivery. copper wire.
VDSL connects to neighbourhood Optical Network Units which
Data Transmission Protocols 2 connect to the central office's main fibre network. VDSL allows users
RTCP - The RTP Control Protocol is a similar protocol to Real to access the maximum bandwidth available through normal
- Time Transmission Protocol. RTCP provides feedback on the phone lines.
quality of delivery. This includes information like bytes sent, DOCISIS3 - Cables allows for transfer faster of 10gbs and 1gbs uploads
packet, counts, jitter and round-trip times. It is energy efficient.
Websites Copper Cabling
HTTP - Hypertext Transfer Protocol establishes a connection between a Client and CAT5 is an older type of network cable of speeds of up-to 100mbs
Server and then transfer webpages to the Client to be rendered by the browser it will Unit 1 you can’t buy them anymore.
also transfer additional files. The website is found when you type a URL into the Data Transmission Protocols, CAT5e - Enhanced ethernet of up-to 1gbs allows for fast reliable
browser it will find the page and return it. speeds.
Communication Protocols
HTTPS - Is the same as HTTP its just secured using SSL or TLS. CAT6 - 10gbs speeds overkill!!! Not needed.
FTP - The File Transfer Protocol is used for transferring files over the Internet. It
uses Addresses, Usernames and Passwords. On it establishes a first connection this is Retired Protocols
called the control connection. The control connection is used to administrate the ▪ Dial-Up - ISDN - BitStream
connections and to send commands, while the data connection is used to transfer files
between the client and server.
Secure Payment Systems
SET - Secure Electronic Transaction that initially supported MasterCards & VISA for
secure payments SET sends the website card details to the merchants bank and the banks
with authorise the purchase to complete the transaction.
3D Secure - The 3D Secure Protocol is the popular for the secure online VISA, MasterCard,
American Express and uses XML Protocol uses SSL encryption to Secure data. When the
payment the merchants website will establish is the card is secured if it is then the transaction
goes through and the card details are transferred.
in a given period of time. This is measured in megabits a higher bandwidth is better than a
low bandwidth. The latency of a network is a measure of the time it take for a data packet to
transfer over a network this is measured in milliseconds. We refer to latency as Ping.
Data Transmission and Security Issues Increasing bandwidth will not help if your network latency is poor. “Increasing your
Security Issues - When transmitting data over a network data can be vulnerable to bandwidth would be like adding lanes of a motorway. The more lanes you have the more
interception as it doesn’t just go from A - B it goes to many computers on connected in the cars (or data packets) you can transfer at once. However the latency is like the speed
LAN. Malicious users are able to intercept the data using software. limit of that motorway. It doesn’t matter how many cars can travel at the same time, if
Sniffing - Packet Sniffers are legitimate software packages which are used to diagnose a the fastest they can travel is 10mph.” Online Gaming - little data needs transferring so
bandwidth is not important but the data needs transferring fast so little latency is required.
problem but can also be used to gain unauthorised access to data. The Packet sniffer will
Online Streaming - Video data is large so high bandwidth is needed data can be buffered so
instruct the computer to inspect the data being transmitted over the network. This means
the speed of data reaching the destination is less important.
that it can gain access to passwords or credit card data. This is obviously a concern when
CODECs
using a public wifi network so are PANS. Mobile 4G networks are NOT venerable to Hardware CODECs - A hardware CODECs are used to encode analogue data into digital
packet sniffing. Packet sniffing using a wired. Connection is harder because people will data. It will then decode the digital data into an analogue form. This would be done in a
notice. sound card when you use a microphone. This is important when using VoIP so people can
hear you.
Spoofing - Spoofing is where you get your computer to pretend to be another computer Software Codecs - They are used with audio and video data
every time your computer connects to the internet it is identified it has to present its In order to compress the data again this is very important in
identification number. So to spoof the system they just have it presents fake credentials VoIP as you need to hold realtime conversations. This often
and be able to access data as that machine spoofing can be used to cause a DOS attack and used with music streaming serves to play with out excess
send a lot of data to over load a network. buffering one the downside their are a wide variety of codecs
You can even spoof a VPN to gain access to business data Which can lead to compatibility
Compression issues
- allows asrescues
us to you need
thethe same
amount
of data needing to Codec
be transferred.
that encoded the content to decode it.
Lossy Compression - It permanently deletes certain bits of
data to reduce file sizes. But it can not be decompressed to
Unit 1 restore it.
Lossless Compression - It uses algorithms to pack the data into
Data Transmission and Security Issues,
space. The files can be decompressed to restore them to their original form.
Security Prevention Methods,
Lossy Applications & Implications - Lossy compression is most commonly used for video,
Bandwidth, Latency and Compression
audio and image compression. File sizes are reduced much more using a lossy compression
Security Prevention Methods
The impact of thats can be severe and worry for a business than lossless. This is helpful if your transmitting online such as via email to ensure quicker
download times.
so its important for them to invest in data transmission security
The compressed files are reduced in quality and can never be restored to their original high
to mitigate threat. Monitoring traffic with firewalls to encrypt your
quality. If you are sending data and quality is important losses compression may be
data in are important and sensible ways of using data transmission.
preferable. Video compression might prevent people from being able to view a file on their
computer. Some files can’t be compressed further when doing so it will actually increase the
Firewalls - You can use hard and soft firewalls to monitor traffic and block anything that file size making it take longer to download and transmit the file.
is dangerous to the system. They can block certain websites and prevent certain data Lossless Applications & Implications - Lossless compression is most commonly used for
being sent out of a business. To prevent external machines getting in and interacting with document like text files and spreadsheets using a file archiver program like WinZip or 7-Zip.
internal computers. Hard firewalls - are often integrated into a router and filter between However there are lossless compression formats for video, audio & images too, such as .PNG
your network and the internet to prevent anything from affecting the network. They can for images.
also prevent DoS attacks by stopping things from entering a LAN. Soft Firewalls - are Files can be decompressed back to their original quality meaning you do not need to
installed on individual devices they monitor data being transferred from individual compromise the quality of your work before sharing it.
computers this can allow one program access to the internet and others not. Compressed files can be incorrectly identified as malware by antivirus software, File archives
compression formats often only work with specific archive software. Decompressing files
Encryption - Prevents data from being intercepted, Encryption will turn the data into a can take significant processing time which can slow down a computer. Much like lossy
coded form so it can’t be read unless it is decrypted which is only possible by the intended compression files can’t be compressed further.
recipient this means that it will remain secure. SSL and TLS are methods of encrypting
data across a network. This is where a SSL is added to HTTP to add a layer of security.
So the data can’t be opened by anyone who doesn’t have the encryption key. SSL relies
on digital certificate that will authenticate a user allowing the to use a public key VPNs
encrypt data too.
Using Online Systems
Systems for Remote Working - online systems allow for remote working when away from
Use of Cloud Storage - We store our files locally such as on computer hard drives however
the desktop.
with cloud storage your data is stored remotely on servers which can be accessed every time
VPNS - Virtual Private Networks allow for users to connect to their work LAN while working
you log onto the web. remotely such as from home. This is to access private business a documents. Data could be
Personal Use - Cloud storage has become a popular alternative than a portable storage device intercepted in transmission without a VPN and data could be stolen and leaked. VPNS are
such as USB drive. It automatically syncs with our local storage so that we have our most up encrypted so you don’t need to worry about data being intercepted. VPNs however can be
to date version of data available to us where ever we are. It is also popular for storing files difficult to set up and deploy.
such as photos and videos such as the ones we would take on holiday and it make it easy to Remote Desktop Technologies - It allows workers to access their data from outside their office
share them as large files can’t usually be sent via email as you can share selected files with this can be done using Microsoft Remote Desktop Utility. It can allow you to access files,
certain users. printers and run software applications through the internet. This disadvantage is that it is not
Professional Use - Businesses need to regularly back up their data incase it is lost the cloud is good for graphically intensive tasks such as photo editing and if the internet goes down then it
an excellent solution this is because with cloud storage files are transferred to a remote server. won’t be accessible.
So if the office burns down then the data is still easily recoverable. It also allows a business to Factors Affecting Choice - You have to choose an online system that meets business
login and view their files remotely and work when not at office. requirements.
Uses Of Cloud Computing - Cloud computing refers to accessing software over the internet Security - To make use of cloud storage you need to transmit a lot of data this may be concerning
by storing it and running it over a server such as SaaS. for a business as the data might be intercepted and issued as well as cloud storage being hacked
Personal Use - Many home computes make use of cloud computing and data will be stolen. So a business needs good security to transmit data. So a method of
to access emails work on word documents and presentations it transmitting data securely would be using SSL/HTTPS this makes it safer for business to transmit
can also be used for editing software the software which runs on remote data.
servers and is accessed through the web for a monthly fee. Cost - Many online systems are free to use but individuals will need to pay a
subscription fee the fee usually scales with the business such which is
Professional Use - Businesses will use it because software
why they are so popular they also ensure additional charges such as
doesn’t need to be installed on individual computers to maintain
cost of broadband.
there software they can expand by altering their subscriptions Ease of use - So that tech illiterate people use the new system it has
Businesses also use it to work collaboratively on documents to be easy for them to use this can be done by making the interface
This allows employed to work together when they are apart.
Unit 1 easy to use and creating features for disabled people and ensuring
that it has good technical support.
Using Online Systems, Impacts and Features - Likely the most important factor when choosing an
Implications, System for Remote online so when you purchase it you need to ensure it has
Working all the features that you may need this might be such as
Impact and Implications collaborating with other colleagues and syncing data
Cloud storage and computing have offered huge benefits automatically with storage files and local storage and it protects
when replacing portable storage devices. However their are your data.
some negative implications. Connectivity - Cloud storage systems require fast reliable broadband connection it
Individual Businesses requires business to transmit large amounts of data when saving and downloading work.
Individuals Benefits Businesses Benefits Such as a company in the film industry it is exceptionally important as the data files are
Drawbacks Drawbacks
much larger. If your internet goes down then a business won’t be able to function as it cant
access data so it will reduce productivity.
• There is reduced
• Security can be a
• Software and data upfront costs so you
concern as hackers
can be accessed don’t need
flexibly, wherever • Security can be a expensive could get access to
there is an internet concern when data hardware. sensitive data. You
connection. is stored online as • Storage capacity have limited
it can be hacked. and software is control over back
• Data can be
• You have to be totally flexible to ups.
Automatically sync
and automatically
reliant on having a increase and • Productivity can
stable fast internet decrease. be harmed when
update on all • Businesses need
devices. connection with a there are network
large bandwidth. less IT support staff outages as data
• There reduced as most and software is
concern over data maintenances is
would not be
loss. performed by the
provider. accessible.
User Experience - This is the feeling a user gets when they use the system.
Ease of Use - People will only use an online community that is easy to use this means being able to
ONLINE COMMUNITIES easily navigate and perform actions easily and should be able to do things in just a few clicks.
Performance - Online communities are expected to load and display quickly this is largely affected
Social Media - Facebook is a social media site with 2 billion users. Most sports teams, by the speed of the connection good performance is 2 seconds response/load time.
celebrities, tv shows, films, businesses and musicians have social media pages that people Availability - Some online communities have restricted access for example a facebook group may
can follow. This makes it easy for them to share important information and communicate require the administrator to accept you joining the group before you can join. However many online
with their fans/customers and makes it easy for the public to contact these businesses. communities are open to users.
Accessibly - Is the online community compatible with screen recorders and can it be navigated
Blogs, Microblogs and Vlogs - A Blog is a a website which is regularly updated where without a using a mouse and can disabled people use it.
Meeting Needs - some use committed to organise events and some others use them for
people share news on new topics and commentary on topics of interest. Microblogs are
communicating with others. Different online communities do different things forums are a great way
short text blogs which are basically tweets or FB status’s. Vlogs are a video form of of communicating with others who have a shared interest. However social networking sites are very
blogging where a users shares a video of themselves talking this is usually done on good for organising events
Youtube. This allows for discussions to take place online between people and their related to your area of interest. Blogs and Podcasts are great for getting the latest news on a topic of
audiences. They have become sources off interest for many people that build up a large interest. There may be other needs such as accessing users ability. Costs - Online communities are
audience and get paid for advertising. very affordable for individuals in order for this users
have heavy advertising target at you based from your browsing history
Wikis - This is a community of users that create content to and make sure the information Facebook will use a lot of information about you and sell it to
is up to date, Such as Wikipedia and there are many advertisers this can lead to impulse purchases which can cause debt.
other Wikis out their because there are many enthusiasts out there using when abroad can be costly due to the data bills.
It makes wikis the best form of collecting information. However Privacy - Online communities can expose your personal data to a
Wide audience we make profiles that contain all sorts of
You have to check sources are correct.
information about us the data can be publicly available if you are not
careful with your privacy settings. Identity fraud can be performed
more easily thanks to the data obtained and photos can be used for
Unit 1 bullying and employers often look at individuals social media profiles.

Interacting with Online


Communities, Implications of online
communities for individuals and Security - Online profiles are not always safe, hackers
organisations may gain access to your profile in order to steal you personal information. Even with your
Online Communities
account being hacked people can gain access to your profile if it is isn’t encrypted. If you enter
Chatrooms - Chatrooms are websites that allow online
your bank details it could be used for fraud. Some stores are encrypted by using HTTPS, The
communities to communicate via short text messages on a
data should also be secured on a server and their is so way for us to tell if this is the case.
shared conversations. Chatrooms are not very popular now
Implications of Online Communities 2
however you can still find them there are no better way of communicating
Implications for Organisations - Many business use social media to communicate with
with others with a shared interest in real time however real time prevents filtering
customers as well to develop communications links with them.
inappropriate content.
Employee and Customer Experience - Ease of use if the online community is a poor
Instant Messaging - Instant messaging is very similar to chatrooms they are both in real
experience then it will discourage people from using it.
time and text based the difference is that chat rooms are for the public and instant
messaging is for a select small group of people. Instant messaging is available on social
• Ease of use - For employees and customers the online community should be easy for them to
use such as having a simple navigation and a modern interface.
media and has started to replace SMS messaging and you can also attach files along with
text.
• Performance - Much like individuals section of the website it should load quickly other
people will choose not to use it should load with in 2 seconds.
Podcasts - A podcast is an audio file shared over the internet which gives you regular
weekly episodes and gives you the latest news and opinions. Such as using iTunes and
• Availability - Organisation running online communities will need to make them available
24/7 employees who do this may need to be able to access it from home.
download it to MP3. You can listen to them while you are on the go. They are great
alternative to text to makes them more accessible to someone with visual impairments. It
• Accessibility - Customers with disability’s will need to be able to access the organisations
online community if it they can’t it may damage their reputation.
can become a two way conversation with the comments section.
Forums - An internet forum is a website where users can post a message or a question
and others will take part in the conversation and answer the question forums are
maintained by the community and have longer comments than on chatrooms are not in
real time.
Implications of Online Communities 2
Implications for Organisations
Implication of Threats of Data
Customer Needs - Online communities have become a key way in which customer
interact with a business. It is extremely important that organisations use online
Malware - Malicious Software is a computer program that is designed to harm or gain
communities effectively or it could cost them their reputation. Business will want to
access to a computer system and often take the form of viruses.
develop online communities social media is excellent for this It allows companies to
gather information directly from customers and respond directly to complaints. Dealing
• Viruses - A program that copies and inserts itself into programs running on a computer
system. It spreads by being passed onto another system when being shared.
with customers can have a positive impact.
Costs - Most organisations use existing communications methods such as facebook and
• Worms - Very similar to viruses in many ways however it doesn’t attach its self to other
programs they instead are standalone programs and spread through tunnelling through a
twitter as they can maintain them for free. Most large business will have a dedicated team
network and exploiting security holes in systems to gain access.
to maintain these sites this requires paying and training staff. Business will also use social
media sites to market themselves so they can gain awareness.
• Trojans - A harmful program that masquerades as a legitimate software application and
it hides in programs that users might want to use.
Implementation - this how the business will implement the online
community.
• Spyware - A malicious program that monitors user activity for the purpose of stealing
personal information.
Time Scales - This is how fast you can effectively hire staff train
Impacts to Individuals & Organisation
them and implement the new policies and procedures.
Malware can be used to corrupt or delete data being stored on IT systems. This could be
Testing - Before it goes live a new online community should be tested
inconvenient to organisations lead to data
this is to see if it engages people a poorly tested site can have a
being recovered and time being wasted and sales loses.
bad reputation.
The impact for individuals is just as harmful such as photos
could be lost, personal data could be stolen such as bank
details to steal money form intervals and commit fraud.

Unit 1 Hackers
Implications of online communities Someone who gains unauthorised access to a computer
for individuals and organisations, system. Hackers also used programs that will automatically go
Replacement or integration with current systems - through a list of common passwords until it breaks into a system
with “Brute Force”. There are more technical methods which
Replacing one system with another can cause problems.
will require knowledge and understanding of flaws of a Computer operating System. However
This can lead to new systems causing people to struggle to use not all hacking is malicious though. So called “white hat hackers” test systems for security flaws
the system. When integrating the system it can cause big issues by attempting to gain access to help check the security procedures of an organisations.
with data being integrated into the new system and ensuring that it works The unauthorised access can be used to steal financial information in order to steal money from
this can be costly and time consuming and may lead to your online community being them or take personal information such as records. Hackers could uses private information for
inaccessible for some time while this takes place this can harm the reputation with customers blackmail which will harm an organisations reputation.
as they are frustrated about not being able to use it. Phishing
Productivity - Online communities should improve the productivity of a business and the links This is where emails are sent out from people pretending to be companies to gain financial
between employees and the business, this should make it cheaper and quicker to respond to requests information. This will usually be in the form of an email will take you to a websites which will look
and complaints. Online communities can be distracting to employees and can lead to loss of official and get you to fill out a form with your details which will be submitted to to user. Only a
productivity where they spend time on social media instead of working Also, where the business small percentage of people will fall for this.
relies on the online community, if it goes down this can harm productivity as employees won’t be able The goal of fishing is to usually obtain financial information and steal money form and individual
to perform their job. or organisation and can be impacted by a fraud personal data is stolen and used to sign up for loans.
Working Practices - where the implementation of online communities new guidelines must be Accidental Damage
implemented to ensure they are not misused, this can include handling personal information gathered Not all damage is malicious and could be done through human error and data is lost such as dropping
and even guidelines on use in personal time. This might require additional staff training to ensure that laptops and tablets, or spilling liquids or misplacing external storage device. All of these are done
employees are aware of practices and disciplinary procedures as a result of failing to follow the with no malicious intent but can have catastrophic consequences to the business as you could lose a
guidelines. massive amount of data.
Security - When a business uses an existing online community much of the security of users data is Individuals may lose data such as photos with emotional meaning or business could loose sales
handled. However there have been many examples of businesses that have had their profiles hacked records. It can be extremely expensive to recover such as using a specialist.
and misused or defaced by malicious users this can harm the businesses reputation. Good security
will prevent this being hacked. If a business makes its own community it will have a greater
responsibility of users personal information they must have strong levels of security of information.
Protecting Data Tools
Anti-Virus - The software is a utility program that is used to prevent malicious software from
infecting your computer. It does this by signature detection which identifies a pattern in the
malware code which acts like a finger print this acts like a finger-print. Anti-Virus Software Also
uses Heuristic Detection to identify malware even without signatures it does this by monitoring
the behaviour of programs. Common features are, Scheduled Scans - These can automatically
be set to run at specific times each day. Full Scans - initiated on demand for your entire hard
disk, specific folders or even external storage devices. On access scanning of all files opened on
a Hard Disk. It is not a perfect solution and can have many implications to using it such as, It has
to regularly be updated and maintained, there are thousands of new malware programs made each
day, it doesn’t offer total protection, there are security holes that they exploit and it can
significantly slow down a PC when it runs a scan.
Firewalls - This is a program or device that monitors incoming and outgoing network traffic and
block suspicious traffic it does this in many ways such as a packet filtering which inspects each
packet of data and compares it to predefined rules if it is flagged then it is prevented pass through
its like border security. Common Features are - filtering which only allows some traffic through
it is used for security and productivity purposes and it can be used for blocking certain websites
and controlling what programs can access it can also
monitors applications for listening to incoming connections and intruder
detection and stops hackers. The implications of using it are that it can
Passwords - Passwords are used to prevent unauthorised users slow down performance and can constantly drain resources from your
from gaining access to their file systems, software and user profiles computers, productivity can be impaired as content and tasks can be
so its important to keep passwords private. Having a good password blocked by a firewall causing employees to back doors to get around
reduces the chances of a hacker gaining access to your documents as firewalls which harm network security. Firewalls can’t prevent
hackers can crack a simple password in minutes a good password should
be 10 characters in length some uppercase and some lowercase with numbers and symbols. The same password Unit 1 internal attacks viruses can change the setting of a software a
software firewall to compromise your system.
shouldn’t be used for different websites and so most people use password lockers to remember Protecting Data Techniques,
all the unique
passwords they have. Protecting data Tools
Physical Access Control - Business can also use physical access card to protect their IT systems these are,
Access Cards - that can be scanned to unlock rooms and can be encoded only to work with certain rooms can Encryption - is where data is encoded to prevent unauthorised access.
be also used as a form of identification. Keypad Access Control - This is a system that requires a passcode in Stored data - known as data rest sometimes needs to be encrypted while
order to gain entry into a room. Biometric Access Control - A system that scans biometrics data to gain access it might feel secure on you computer then if someone gains access to it
to a room this might be fingerprint, iris or facial recognition to gain access. Electronic Locks - All the above they can read any data on the device. By encrypting confidential
methods require electronic locks to be used to lock and unlock doors. These systems are designed to protect IT documents it is adding an extra layer of security to it so they can’t be read even if
systems against malicious users. someone gains access to the computer. Stored data is usually encrypted using symmetric encryption also
Digital Certificates - Digital certificate are also known as public keys and it allows the user to authenticate known as a private key encryption where the same key is used to encrypt and decrypt data. The key is a
themselves and allows them to use secure encrypted communications over the Internet. These are used on https value of 128 and 256 bits and is applied to an encryption key is applied to convert the data into an encoded
sites where data is transmitted between you and it. To do this a business requires a digital certificate which can form known as cipher-text. The implications of this are if you lose the encryption key you will not be able
to ever decrypt you data back to the original plain text format and the data will be gone forever sharing the
be viewed by anyone. Their are different components to a digital certificate but the most important is a digital
encryption key can compromise security.
signature which verifies the senders identify and their public key which is used to encrypt data when sending it
Data During Transmission - When sending data it requires encryption when the data you are sending is
to the WBS
private and personal this is because it can be intercepted by malicious users for example banking details.
Protocols - are different methods of sending data when transmitting over a network there are security protocols
We encrypt data in transit using asymmetric encryption known as public key encryption with asymmetric
SSL (Secure Sockets Layer) and TLS (Transport Layer Security). The protocols provide a secure connection
encryption different keys are used to encrypt and decrypt data. When sending data to someone you find
between two computing devices so that data can be in a secure encrypted format over the Internet. This their public key and to the encryption algorithm to reduce the encode cipherer - text form of your data.
prevents them from being intercepted by malicious users. When the recipient wants to encrypt the data they will use their private key which is private to the
recipient. The implications are that if working with large quantities of data this can have a real impact on
your processing power and is more processor intensive than symmetric encryption.
Legislation and Codes of Practice - Their is now legislation to protect data and IT systems. Data
Protection Act (1998) - Protects how individuals data can be handled and used. Computer Misuse Act
(1990) - protects against the wilful harm & damage of IT systems and data. Information Commissioners
Office produces codes of practice for the data protection these are not laws but guidelines. ICO are
responsible to enforcing the Data Protection Act they codes not just for organisations bit for individuals so
they know there rights.
brought online and delivered via the post or electronically. E-tailers are online shops that sell us
goods and services such as amazon.
Advantages - Customers have a much wider range of choice as you can browse thousands of
options, Its easier for customers to find the products they want and can easily compare prices for Productivity - Online productivity services are websites and web apps that are used to
the same product from different sites. Customers can do their shopping where and when it suits complete work tasks more efficiently they are used for tasks like communicating and
them. Disadvantages - concerns that payments being taken without products/services being collaborating and working remotely. Cloud computing lets us access our work software
delivered particularly with online auction sites. The lack of regulations with products provided and storage and allows use to video conference and hold meetings remotely and use
online such as unlicensed medicine could put a persons health at risk.
remote desktop software. Advantages - Employees can work much more flexibly these
Financial Services - much of our finances are managed online thanks to online services we can
online services make it easy to work from outside the office as at home. Working
access our bank and our investment all from the comfort of our own home. Online banking
allows us to check balances, transfer funds, manage accounts and apply for loans we can also collaboratively using cloud computing as multiple uses work on the same document.
trade on the stock market. Advantages - Managing your finances can be done where ever you Disadvantages - If these companies internet or network connection goes down then this
are 24/7 this use full for the disabled and elderly that find it hard to get to the bank and users have can damage productivity as users cannot access online services. Online productivity
total awareness of their financial situation and can quickly spot cases of fraud. services make us constantly accessible which increases stress within staff.
Disadvantages - Many people have security concerns over there risk of hackers and malware Booking Systems - We can pre-book all sorts of services online it becomes less and less
stealing their financial information gaining access to their accounts. Websites offering financial common to actually book over the phone due to the convinces of online booking. We can
services may be based in places where their are not book anything online such as flights concerts and hotels with out having too physically
they are not properly governed so the service is not genuine contact the venue. Advantages - Customers can compare prices of booking quickly to
Education and Training - A big growth in online services such as find the best price. Business need less admin staff this saves money and time and the
Education and training which can provide people with professional
customers doesn’t need to travel to the
qualifications and wok based training such as health and safety.
venue to get the tickets this makes it much quicker and slows you
Distance learning qualifications provides you with access to tutorials
such as MOOCs which are websites run by universities to provide to book in. Disadvantages - Booking systems require electronic
free programs of learning. Advantages - learners can access a wider payment which could lead to fraud if intercepted or booked
Range of courses offering the ability to learn all kinds of skills that with dodgy site. Booking websites may not be legitimate and
may not be available in their area, it allows people to learn in the their so you may be paying money for a booking that you never
own time. Disadvantages - Many online course qualifications are not actually receive.
accredited which would make a degrees from an unaccredited
school worthless. Learners must be self motivated as no one checks
Unit 1
their progress. Features of Online Services, Uses of
Online Services
Use of Online Services
Transactional Data - A transaction is the act of buying or selling
something it is the data collected from a purchase, businesses store
that data in a database for different purposes. The sort of data that
has great value to an organisation as they know the number of items
purchased, prices, date and time, delivery tracking data. Business use this data to spot trends and
help admin track finances and helping with customer complaints customers and organisations can
News and Information - Most of our news is gathered through online services. We also track and help the delivery process giving customers piece of mind as they know when their
use the Internet for real time information this allows use to keep up to date with the latest parcel will arrive. Organisations and identify customer habitats in order to personalise their
events. News sites access the latest news on current events such as traffic reports and marketing and advertising homepages can be altered to show products they will be interested in
roadworks and weather forecasts. Advantages - Its much easier to keep informed and up and adverts can be targeted. While all of this transactional data is incredibly helpful to a business
to date on events then ever before as soon as any other major events and its easy to plan and often a customer however their are concerns of all this data being stored. Transactional data
trips as you can easily access travel and weather information. Disadvantages - It is could be hacked this could include personal data which you may not wish to fall into the wrong
difficult to identify news and information with large quantities of fake news. News can be hands, some people are not comfortable with things like customised pages based on prevues
released before parties who it concerns have found out. transactions.
Entertainment and Leisure - A major use of services is to entertain ourselves we use Targeted Marketing - Targeted marketing is all about advertising products online to customer
Video Streaming, Sites and allow us to access film and music. It also allows us to play most likely to purchase the product it is done buy using transactional data we see this targeted
advertising using many different places. Web pages can be customised to display products based
games against other people. Advantages - People can access huge variety of
on previous purchases, browsing history and profile information. Search engines use search terms
entertainment. Hundreds of thousands of songs are available at low costs. We can stream to display adverts and related products you may be interested in social media uses your profile
when ever we want rather than traditional TV style be set at times. Online games allow data to target advertising. This helps improves the quality off marketing this in turn helps
use to play with people from all around the world. Disadvantages - Children can access organisations advertise more efficiently and help individuals find products they will be interesting
inappropriate content easily as their is no water shed and we can be come very distracted in buying. Their are negative implications such as it leading to impulse purchases that people
with these on demand services meaning we can always find things to watch. might not be able to afford. Vulnerable people can be more easily to buy products that are
illegitimate as mentioned in transactional data is used to display adverts which could potentially
lead to embarrassing situations.
Collabrative Working - This is where multiple inderviuals can work together in real time
over the internet this is made possible by use of the cloud. Employees working together
to produce a document while still in different locations or countries. Employees working
together can share information and hold meetings can be held without wasting time and General Office Tasks - The completion of general office tasks such as producing reports
money on travel such as video conferencing. It benefits organisations as it saves time such as letters and emails. Other examples include accountancy applications for
money and travel and increase flexability. But the ngitiave implications are there needs to managing finances. Video conferencing is used for holding meetings with clients and
be restrictions in place when it comes to sharing documents to prevent people from colleagues remotely. The Advantages - office tasks can be completed much more
overwriting each other. Version control saves multiple versions of a document. Security efficiently for example mail merger tools this means it takes less to complete tasks. They
can be a concern also as data could be accessed by hackers such as stalling it and sharing also require less skill to operate and can perform a wider range of roles with in a business.
online. The use of online services for collaborative working lead to business being really The Disadvantages are employees need a much greater technical skill which can be costly
reliant on internet connections with out a connection productivity is really harmed. to train people and business need to employ IT staff which is costly.

Creative Tasks - Creative tasks are now very commonly performed on IT systems for
example computer aided design such as products and packaging for computer aided
design. Another area is in the graphics editing people use computers to create art work
and use soft was such as Photoshop. It is now common for most creative artwork to be
done on computers and is done using graphics tablets. Film and music editing industry
Features of IT Systems are used to make music and film. Advantages - its much easier to edit creative work such
Stock Control - All retailers and suppliers use IT systems to manage as CAD designs which allow changes
stock control they are linked to EPOS tills so when sales are made to be made so you don’t reed to redesign work from scratch. Design
the system will record the sales. There will be a minimum and creative work can easily be distributed electronically such as
maximum stock level or items and alerts for when stock is too high email, the Disadvantages are that work such as film editing
and too low so when a sale is made it is deducted automatically requires a large hard disk so to store the work. Illegally
from total amount they use JIT so when the level of stock meets a sharing this digitally stored work is violations of copy rights.
minimum amount it will order more this improves efficiency this is
an advantage this can also reduce wastage ands make it more Unit 1
efficient the disadvantages are that stock management control Uses of Online Services, Features of IT
systems are that staff need extra training and the stock levels are Systems
Advertising - Online advertising has given companies the
not always accurate due to theft and can lead to a business
ability to precisely target people who will have and interest in
running out of stock.
their products. Companies can use social media advertising where
companies can be display adverts. Its not just with online advertising
Data Logging - This is the collection of data over a periods of time. that IT systems are used though. Video adverts are often shared on
The sensors are connected to computers and designed to automatically Youtube in the hope that they will go viral to give huge exposure to the advert at low costs. Advantages -
collect the data it gathers from computer sensors data can be logged 24/7. Data loggers is used Business can advertise directly to people who have an interest in their advert. Successful viral advertising
in a wide range of industries such as health and it logs many factors such as vital signs and campaigns can allow business to reach huge audiences without the cost for distribution. Disadvantages -
alerts staff of changes in their conditions. The same thing happens on an aircraft this data is Online advertising has led to the growth of spam emails which try to promote the products and phishing emails that
recorded on a black box. Weather stations record data to predict wind speeds, temperature and try to trick you into reviling private information.
humidity and can be used in forecasting the future. The Advantages of this are Automated Manufacturing - We can produce designs using computer aided design software then we use computer aided
systems allow for logging without human intervention data can be logged with far greater manufacturing to manufacture the products with CAM machines. A good example of this is a 3D printer which
accuracy and for longer than a humans can and data can be logged over longer periods of time. can be used in production of action figures. It is also used to control robotic arms to produce car body shells
The Disadvantages of data logging can be done with a wireless connection however if The Advantages are computer aided manufacturing tasks so it doesn’t make human errors. Machinery’s
something goes wrong data logging will be lost and if it isn’t calibrated properly it will lead to doesn’t to take a break or make payment this saves businesses money making them more efficient. The
incorrect results. Disadvantages are people can lose their jobs as they are replaced, Initial cost of purchase is high but saves
money over a long period of time.
Data Analysis - Data gathered by logging needs to be analysed this allows trends and patterns Security - In our own home and in business IT systems are commonly used for security such as motion
to be spotted we use data mining which is a term we use to describe the analysis of extremely sensors and door sensors activate a digital control panel and will trigger and alarm when the sensors detect
large data. Data is analysed is used in many different applications for example in supermarket anything. We also see IT systems used for CCTV in cameras allowing the monitoring of RFID tags so they
loyalty schemes to allow businesses to analyse customer habits. We also see similar data know when an item is taken out of the store. Some people even use CCTV now in their own home these can
mining performed on sites like Amazon. This analysis products purchased and promotes often be linked to the Internet so the Internet can view the cameras remote such as white on holiday. The
products to you that it thinks you might like the Advantages are that it allows business to advantages are organisations require less actual staff as computers automate lots of checks they would
become more efficient in identifying weak performing employees or products and data can be otherwise perform. These systems makes the home much more secure from that of theft. The Disadvantages
are concerns over increased security this can make employees feel like they are constantly being watched and
outputted in formats to make it easier to read. Disadvantages are computers lack common
are untrue they can also provide a false sense of security which leads to people not taking security seriously
sense and analysis is only as good as the data itself. Stored data can be subject to threats such
enough.
as hackers.
As they rely so heavily on employees using these systems effectively.
• Ease of Use - Employees can be reluctant to use new technology system when
implemented. It will employ efficiency and reduce training.
• Performance - IT systems should allow employees to do their job quicker, poor IT Working Practice - How we go about performing our jobs has changed significantly due to IT
systems can lead to inefficiencies such as if a machine breaks down regularly. systems. One impact is the growth of employees working form home and on the road saving
• Availability - of resources can be improved by IT systems as employees can access their money in travel with video conferencing, remote desktop and the cloud we are able to work
efficiently away from the office. The downside is we are expected to be available 24/7 and we
work using cloud storage and work from home using remote desktops.
• Accessibility - IT systems can be difficult to access by users with disabilities are expected to respond to emails in our free time this is increasing stress for employees.
organisations will have to invest in adaptive technologies to ensure they are not
Staff Training - Due to IT systems changing the way we work staff often need to adapt to these
discriminating. changing roles. Many of the manual labour tasks have been replaced by machine so people need
Employee & Customer Needs - Employees want to be able to do their job more safely and technical training to adapt to new roles. Even employees that have good skills need ongoing
efficiently. We use communications tools like video conferencing & email, to make it more training to adapt to these new skills as systems are ever changing. If staff don’t ever receive the
efficient to share information. IT systems automate many tasks removing a lot of very right training they will be less productive for the business.
repetitive activities in manufacturing. IT systems have also had a big impact on how the
organisation meet customer needs User Support - The growth of IT system in the workplace has meant supporting these systems is
as social media has allowed for business to connect and extremely important. Many off-the-shelf software comes with documentation and support most
communicate with business identifying their needs and businesses maintain their own IT support staff who will help employees should their be technical
responding to the we also have email and online chat features problems with the company this means the issue it can be resolved quickly.
in a website to provide better customer support. Data Security - IT systems haver opened up a whole range of threats so its
analysis can identify how efficiently customers are important for business to keep personal data for individuals, customers, or
being dealt with by employees. employees they are legally required to keep data security from these
threats. Its often required to keep business IT systems safe so IT staff
are needed to maintain computers. Of course if a business doesn’t
do this they can be fined hundreds of thousands of pounds under
the data protection act and can have their reputation destroyed
and go out of business.

Unit 1
Impact of IT Systems, Data Sources
Data Sources
Costs - The efficiencies created by IT systems allow efficiencies Primary Data - This is data that has been gathered through original
to run with less staff as business can replace staff with large numbers research it is collected by individuals often in the forms of
of automated machinery. There are high costs with IT systems as they questionnaires interviews and sensor readings. There are benefits to
quickly become out of date and need to be replaced frequently and primary research such as its more up to date and is more likely valid.
support staff must be employed to maintain the system. We often need You can research it to find specific data you are looking for as secondary data might not answer
to purchase new systems to keep up to date Such as supermarkets you question, its more reliable you researched it yourself. Secondary data can be difficult to
implementing new EPOS technology and business will need to pay for staff training.
verify its accuracy.
Implementation - It takes time to implement new systems effectively
• Timescales - It will take time for delivery of the new system and installation of a new IT system Secondary Data - This is data collected by a third party and comes from a wide range of
sources scubas census data, text books and official statistics. The benefits are that it much
especially if it is bespoke could make replacements could take a long time this will reduce the efficiency.
• Testing - A new system must be tested in a wide range of conditions and situations to ensure the there are cheaper the data collected so you don’t need to pay for the data to be gathered its much quicker
no bugs in the system which will further slows down and take time for the system to become operational. to obtain and the research has already been done so it is available as soon as you need it. It is
• Downtime - Implementing a new system will mean that likely their will be a period of time where the old also subject to organisations individual bias as you didn’t collect it so you couldn't influence the
system is down and the new one is going live this could impact productivity. findings.
Replacement or Integration - Replacing or integrating a new system will usually involve some downtime Data Reliability - When gathering data you need to be reliable, particularly with the growth of
while the business switches to using the new system once the new system had been fitted their will likely be a the web this is why its so important to choose sources of information. For data to be reliable it
period of time when their are teething problems making the business do things in effectively. This is why must meet the criteria such as Completeness - of all data that is required for what you are
news systems are integrated in quite periods of time for the business so that the impact isn’t as bad. investigating is included. Accuracy - the data is consistent in the collection and could be
Productivity - In general IT systems are viewed as having a big positive impact on productivity with in the repeated with matching results, and the data gathered matches what was gathered at the source.
work places humans can be replaced by machine this means they can work 24/7 with out breaks or making If we use primary data we can be sure of it as we collected it ourselves and performed some
mistakes. CAD/CAM has replaced manual labour and EPOS has reduced mistakes. The negativity can be that surveys to gather the data. Avoid using jargon that could lose people interest and can cause
works may spend a lot of their time surfing the web while at work and means they are unproductive. If tech incorrect responses Avoid Bias in language and avoid leading questions closes questions to
fails as we are so reliant on it we will not be able to perform our jobs. make simple data so the results are accurate. Secondary data can be difficult to verify the
reliability so its important to ensure that the source of secondary data is trust worth. Such as
their being no bias and the collector has a strong reputations and it is kept up to date.
Data Collection Methods - when gathering primary data a common method is to perform a Numerical & Data Modelling
survey. Numerical Modelling - A numerical model is where math calculations are used to
Questionnaire - This involves a set of normally closed questions for statistical analysis, traditionally simulate a real-life system and can analyse the data to make future productions. We do his
this was done with paper now it can be done online The Pros of questionnaires are they can gather data when predicting the weather so we can forecast the weather can use previous data
from a large group of people in a short space of time which provides a lot more data to analyse. Every captured by sensors to make a prediction. We also do it with data on stock levels and
respondent answers the exact same question so it removes bias and due to it being done anonymously buying trends to offer the best products and pricing in order to maximise profit this can
which can lead to more test answers. The Cons are poorly worded questions can create bias results as hep a business to expand.
they can be misinterpreted it can be difficult to get in depth response rates are usually very poor is Data Modelling - Data modelling is a process used to plan the structure of a database
people sign or it.
which is usually made up of a number of tables with field names such as DOB, Phone
Focus Groups - this involves a group of people asked questions on a particular topic. This is a small
Number and certain data types. We have to ensure that we have all our data set up
group of about 8 questions are designed to be interactive and encourage to respond to each other the
pros are respondents are able to build on each others answers. It provides depth and detail so the quays
correctly to be efficient in storing, processing and extracting data.
of data. You can get responses from a wides group of people which makes the more cost effective and Presenting Data & Results
it allows you to alter questions to fit on going conversations. The Cons respondents can influence each Once we have stored the data we are able to organise it, extract data now we must present
others answers as it can be difficultly to go against the rest if the group, the data provided is quality and it to the end users this is done in two ways such as;
descriptive and non numerical. Assembling a group of people together can take some time to assemble Tabular - this is text presentation to provide precise details. It is useful for where we
and it isn’t always convent to attend. need to look up individual values and is better for qualitative data which can be turned
Interview - One-to-one meeting where and interviewer asks a single respondent in-order to gather into a chart.
information. This is often performed face-to-face however it can be Graphical - this dat that can be turned into a chart or diagram to be
performed the pros are interviews are very good for drawing out interpreted and is useful for revealing relationships between
detailed follow up questions the interviewer can ensure the person multiple values. Choice of presentation is personal and is only
fully understand the question. The cons are interviews take a long
time to gather a wide range of people. This means it isn’t cost
useful if it communicated what it was intended to so generally
effective where a large number of responses are required. Unit 1 where precision is important tabular is useful but
where spotting patterns is important graphical is better.
Much like focus groups data gathered is much more qualitative
and so is difficult to analyse.
Data Collection
Methods,
Processing & Presenting Data, Data
Collection Interfaces
Processing & Presenting Data
Data Collection Interfaces
Ensuring Data Accuracy - It is extremely important to ensure
data we use is accurate especially when processing data using a
Ease of use - A data collection and processing system requires
computer system. Computers don’t know if data is accurate or not
an easy to use interface this helps reduce the training required
so if data is bad the results will be bad this is known as Garbage In Garbage
and increase the adoption rate. For it to be easy and simple to use
Out. The problems with this are Incorrect stock levels can lead to businesses running out
it must have clear navigation between screens. That it has good clear labelling input boxes
of stock. Computers are not good at identifying inaccurate data this is validation and
so the user knows what to enter. This could be a drop down box or a box with similar data
verification.
entry limits.
Validation - doesn’t make the data accurate it is used for making sure that if you enter a
Accessibility - It is important for data processing ti be accessible to people with disabilities
date of birth you have entered in a date.
so they are still able to perform their job properly. To make the interface more accessible it
Verification - Verification is a check to ensure that data entered matches the original
should be kept clear, to ensure navigation and can be performed with different inputs, with
source. Such as a requesting the user to reread the data they have entered to ensure it
high contrast colours so key elements can be identified and it such have changing sizes and
matches the original source. This could be a double check which could mean the user has
fonts. These can aid individuals requirements.
to input the data twice to ensure that it matches the original data.
Error Reduction - The user interface should help reduce the number of errors and can help
Extracting and Sorting - Data gathered has been stored on a computer in a database and
it prevent confusion leading to mistakes such as not using poor labelling. There are other
can be sorted and easily access. To do this we use database management systems. Once
factors involved in reducing errors such as validation and verification and the format data
our data is stored in a organised way we can use queries to request the data and retrieve the
should be entered such as a telephone number will only allow numbers.
data we want. This is called SQL. Extracting - is the selecting of precise fields and can
Intuitiveness - A user interface that is intuitive can be easily understood with out training
apply filters from and extract the precise info action that we require. Sorting - after we
this is one with good labelling and clear navigations. Another good method is making the UI
have selected information, Sorting can be done according to any field. These functions
match the paper one that it is transferred from this way it will be simple for the inputter. If
make it much easier to use the data that we have gathered we use queries to quickly
the process is of collecting data is replacing an existing one it should have a similar feel
identify information.
making the UI match the old one so its more intuitive for the user.
Globalisation - Due to the rise of IT systems it can allowed people to become more
connected and has led to globalisation as more people can communicate over the world
Functionality - Their is certain functionality than an organisation will expect of it data instantly. Despite positives such as increased awareness of global cultures their are also some
collection this will usually involve performing queries to extract information and negatives such s more jobs are being outsources to other countries taking employment away
production of specific reports. The user interface will allow users to perform this function this is due to the tech aiding communication. It has also been linked to the lost of culture in
easily such as loading the menu of result to display in a format useful to the user. If it is counties and increased spread of disease.
difficult for a user to perform the required functionality to reduce or discourage then form
using the system. Freedom of speech - IT systems are a vehicle for freedom of speech however it can be
abused and used to bully people and abuse people it can also be can be offensive to other
Performance - Users want their data collection quickly to ensure they work efficiently people. Many sites have guidelines for what is acceptable such as not spreading racist
this is down to data being stored in and efficient manner and the computer being powerful comments or posting inappropriate images. Some sites may choose to delete offensive videos
enough to complete processing quickly. The user interface will have an impact on how or groups or pages. Some people feel this is a violation of freedom of speech.
quickly someone can input data to perform the tasks and prevent the user from getting lost
with in the system and reduces errors that will slow the user down. Acceptable Use - Tech has caused new issues in the workplace to arise such as employees
being distracted on computers with social media this can cause a drop in productivity as they
Compatibility - Data collection processes will need to be compatible with other systems are not doing their job. Many businesses have an acceptable use policy which informs users
so that data can be imported from one to another. An example would be to take data from of what they should and shouldn’t do on computers while at work such as not sending abusive
spreadsheets into a database system. So that we messages. They will also have these
can inform additional calculations and analysis or perhaps policies in place to avoid legal issues this includes not sharing
produces a graph from it this ensures compatibility by importing copyrighted material and not downloading files and harassing other
and exporting data as a .CSV. A CSV file is a generic file type users on emails and private messengers. The acceptable use
that works with almost all systems so has high compatibility. policy will include sanctions for a breach of policy
which might include suspension ,warnings and termination
Unit 1 of employment.

Data Collection Interfaces,


Moral and Ethical Issues,
Moral and Ethical Issues
Environmental - Most old tech ends up in landfill sites every
Health & Safety - due to the increased use of IT systems it
year. We throwaway between 20 - 50 million tonnes this is called
can cause health issues to arise an organisation has both legal
techno trash which makes 5% per year with less than 25% being
and ethical responsibility to ensure that employees are not caused
recycled each year. Producing new technology systems is very resource
harm through the use of IT systems. Such as RSI this is caused due to repeated
intensive which is consuming lots of metals, fuels and chemicals. We also consume large
movement and over use such as typing as a keyboard one way it can be prevented is
amounts of fuels each year for creating power to run these systems.
having comfortable and adjustable seating positions and taking regular breaks. Eye strain
such as staring at a monitor for long periods of time particularly in dim or bright lights.
Unequal Access - Not everyone has the same level of access to technology as people from
Regular breaks, good lighting quality.
poorer backgrounds are significantly disadvantaged. This is shown with internet access as
Tripping such as loose trailing cabling across the floor where people walk so it would be
people in the developing world have much more limited access. One third of the UKs
good to tie loose cables back underneath the desk or running cabling through walls.
poorest students do not have Internet access at home This is leaving them at a disadvantage
Failing to take healths and safety seriously could lead to injury this could affect someones
as they can not make use of Internet for their education such as VLEs and online revision.
ability to work or reduce the quality of someones everyday life.
Online Behaviour - The anonymity of online communication has led to a big problem with
Copyright - IT systems have made it extremely easy to share and download copyrighted
people having poor behaviour on the Internet as they send each other abusive messages over
material such as movies and films. It concerns the use of people using images without the
social media. Their has been some serious repercussions of this as it has led to suicide as a
owners permissions doing so will infringe on copyrights. Copyrights can cover a range of
result of cyber bullying and people have lost their jobs due to inappropriate comments
things such as books and digital material. Breaking these such laws are punishable by jail
posted online. It is important when online to follow a good netiquette for acceptable
time and fine and this can cost business in the form of patent infringements. If someone
behaviour. Such as not sending abuse, not spamming people, not violating copyrights and
pirated a film then people would stop paying for it leading for the business to close down.
remember posting in public can impact your friends and family. The general rule is treat
other with respect.
Computer Misuse - Computers can be misused and data can be harmed due to the spreading of viruses and
malware. If you create a virus and spread it to another computer this is deemed ethically wrong as you are
causing harm to a IT which could impact on the productivity of the business. Hacking is a similar example of Copyright Designs and Patents Act - The 1998 act was brought in to protect the creators of
computer misuse we think of intelligent coders breaking their way onto a secure system as this is illegal but original works by giving them the right to control how these original works are used they can be
also ethically wrong as you can cause significant harm to the system. You should never access anyones IT movies or games etc. Copyrights not permeant and can last for music up to 70 years after the
systems with out their clear expressed permission. Sometimes it can be a joke but it can cause real damage authors death. Punishment for copyright infringement is usually limited to paying damages such
and could loose the Business money and it will cost people jobs as business could close down. as handing over any profits and a maximum of 10 years in prison. THE COPYRIGHT
Protection of Data - Organisations have a legal and ethical responsibility to protect individuals data. Most (COMPUTER PROGRAMS) REGULATIONS 1992 this ensures designed and programs are
business have huge quantities of data that belongs to individuals this includes things like there names and date of covered under the copy right act. This made it illegal for organisations to download and copy
birth, national insurance number which could be disastrous if they fall into the wrong hands this could lead to software.
banks theft or identity fraud. This happened to Tesco as they did not keep account secure and 9,000 we hacked The Health and Safety (Display Screen Equipment) Regulations - implemented in 1992 health
and they had to pay out 2.5 million to customers to cover their financial losses. You should make sure that you and safety at Work Act they must ensure equipment complies with safety regulations so it doesn’t
are keeping others data private, and don’t share the information through unsecured mansard don’t leave your cause eye strain. Key elements to include are business must perform a risk assessment for the
computer unlocked. workstation, employees must receive adequate breaks from display screens, employees have a
Privacy - Privacy is a big issue that has arisen with the growth of IT systems we share large amounts of right to a yearly eye test, employees must receive adequate health and safety training from their
private information online sometimes through social media sites employer end must receive adequate information from the employer. Failure to comply with
That sometimes don’t keep your information just private to your friends these is normally punished through a fine and can lead to imprisonment.
This is why we have an ethical repressibility to people online when we Consumer Rights Act 2015 it consolidated all the consumer rights act it protects consumers of
tag someone in a photo is it okay to share someones mobile number. goods, services. Before the consumer there was no protection for consumers. This includes
Not keeping someones data safe can put them at risk and lead to online content. The legislation provides consumers of digital goods with the right to
fraud such as cyber bullying and cat fishing. repair/replacement if a business fails to comply then consumers
Accessibility - IT systems should be accessible to all users so people can take them to court to get compensation if not given then
Can use IT systems and perform their job without discrimination they can receive up to 2 years imprisonment with a fine.
This can be through hardware such as a track ball or software such as
A screen reader. If the business doesn’t do enough this can cause
Accessibility Legislation & Guidelines
Disabled people anxiety and stressed and can lead to legal issues.
Unit 1 Accessibility Legislation - legislation is designed to prevent
discrimination against people has helped to ensure that IT systems
Moral and Ethical Issues, are accessible. Disability Discrimination Act - The Act was enacted
Accessibility Legislation & in 1995 this included both mental and physical impairments. The key
Data & User Protection Guidelines areas included; Due to their disabilities treating someone with
The Computer Misuse Act was brought into act in 1990, this disability less favourably than someone else. Failing to make reasonable
legislation covers hacking and spreading viruses such as you can be adjustments to allow access to goods, services and facilities.
punished for attempted hacking you can still be punished for gaining The disability discrimination act was amended in 2005. This includes
access to a system. The crimes that are covered are - Unauthorised access protecting people with HIV, Cancer and Multiple Sclerosis and mental illness. The equality act (2010)
to computer material. Such as hacking can be punished by up to 2 years. - Unauthorised access with replaced the discrimination act and enacted equal pay. The changes included Associated Discrimination
intent to facilitate and offence such as obtaining data to black mail someone is punishable by up to 5 such as discriminating against someone as their family member is disabled. Indirect Discrimination this
years in prison. - Unauthorised acts with intent to impair this could be altering the data found or might be a policy which applies to all employees but is negative to disabled people. Perceived
spreading a virus can lead to 10 years in prison or a large fine. Discriminations this involved discriminating against some because you might perceive them to have a
Police and Justice Act the 2006 - extended the computer misuse act it increase the punishment for disability. This can have an impact on the way IT systems are used within business as people with
offence 1 to 2 years. It allowed offence three to cover denial of service attacks. It added making, disabilities might not be able to perform their jobs. Organisations will have to ensure proper provisions
supplying or obtaining anything which can be used in computer misuse offences such as creating a such as installing screen and make IT systems Accessible. If a business is not found to put provisions
malware program punishable by up to 2 years. inlace they can be punished.
• Data Protection Act 1998 - to protect the privacy of individuals by ensuring that their personal
information is processed in an ethical manner. It covers data stored on paper or even audio data it have Accessibility Guidelines - This ensures that business must make their IT systems accessible to users. A
become much more relevant information is shared. There are 8 principals. number of organisation have developed and punished guidelines to help business make sure systems are
1. Personal data should be processed fairly and lawfully and shouldn’t be used in anyway an available. British Standards Institute BSI codes to practice. The British standards Institute define national
indervidual wouldn’t want it to be. standards for best practice. They set the requirements in the Equality Act that states its acceptable for all.
2. Personal data should be obtained for a limited specific purpose and it should be be clearly stated. The 16 Web Codes of Practice Define the purpose of the web product, define there target audiences,
3. Personal data should be adiquaute not excessive and no irellivant data is held. analyse the needs of the target audience, note any platform restriction, define the relationship the product
4. Personal data shall be accurate and kept unto date. will have with its user, define the user goals and tasks of the web products, consider the degree of the user
5. Personal data shall be kept for no longer than absolute necessary then deleted. experience, Consider the inclusive design and user personalisation, choose delivery platforms, choose
6. Personal data shall be processed acording to peoples data protection rights people can claim for target browsers, Choose whether to create the web product in house, Define the web technologies to be
poor handling data and can have data rectified in some cases. used, Use Web guidelines, assure accessibility through production, communicate the web product, plan to
7. Personal data shall be kept safe with good security with quick response times to breaches. assure accessibility in post launch updates.
8. Personal data should not be transferred outside European Economic Area without p rotection
Unit 1
Accessibility Legislation &
Guidelines

Open Accessibility Framework - A research group called AEGIS made the guidelines
framework to ensure IT systems are accessible.

Web Content Accessibility Guidelines - they have made new guidelines for making webpages
accessible to people with disabilities. The original version of this WCAG 1.0 was defined in
1999 with 14 guidelines but later they split 12 guidelines into four categories.

Perceivable - 4 Guidelines that cover presenting informations in a way that users can perceive
such as users having non text alternatives to content.
Operable - 4 guidelines that cover ensuring user interfaces and components being operable such
as having functionality available from using just a keyboard.
Understandable - 3 guidelines that cover making information understandable such as making
text rebate and making pages operating in predictable ways.
Robust - 1 Guideline that covers ensuring compatibility with user-agents including assistive
touch.

You might also like