IAL IT Unit 1 Notes
IAL IT Unit 1 Notes
IAL IT Unit 1 Notes
Information Technology
Unit 1 Notes
1.1 Hardware
Portability
Notes by @uzayermasud
Performance
● Games consoles are also designed for high performance, with powerful
processors and graphics cards to handle demanding games.
● Microprocessors/single board computers are often used for specific tasks that
require high processing power, such as in robotics or data processing.
Storage
● All contemporary digital devices have some form of storage, such as hard
drives, solid-state drives, or removable storage media.
● RAID storage is a type of storage that uses multiple hard drives to protect
against data loss in case of a drive failure.
User interface
● The user interface of a digital device refers to how the user interacts with the
device. This includes input devices, such as keyboards and touch screens,
and output devices, such as monitors and speakers.
Connectivity
Media support
Notes by @uzayermasud
● Contemporary digital devices support a wide range of media formats,
including audio, video, and images.
● Some devices, such as cameras and scanners, are specifically designed for
capturing media.
● Other devices, such as smart TVs and games consoles, are designed to
display high-quality video and graphics.
Energy consumption
● Mobile phones and tablets often have batteries that can be recharged, while
other devices are designed to be always plugged in.
Expansion capability
Security features
● Devices such as biometric scanners and chip and pin devices provide secure
authentication to prevent unauthorised access.
● RAID storage provides redundancy and protects against data loss in case of a
drive failure.
Primary Storage:
Notes by @uzayermasud
- Usually low storage capacity compared to secondary storage.
Types:
- PROM (Programmable ROM)
- EPROM (Erasable Programmable ROM)
- EEPROM (Electrically Erasable Programmable ROM)
Cache:
- L1, L2, and L3 caches inside processor
- Very fast memory
- Very expensive
- L1 is fastest, L3 is slowest
- Store most frequently accessed data
Processors:
- x86 Architecture most common (Intel and AMD processors)
- High performance
- Upgradeable parts
- Relatively old
- Used in desktops and laptops
- Performance
- More cores
- Faster clock speed
- More cache
Storage Devices
Magnetic Tape:
- Magnetised bits of tape
- Very high capacity
- Very cheap
- Very slow read/write speeds
Notes by @uzayermasud
- Slow read/write speeds
- May be damaged by shock
- Large magnet can erase all data on it
RAID Storage:
- Replicate data over multiple drives
- Increases data reliability and I/O performance
Cables
● USB (Universal Serial Bus): a versatile interface that can transfer data at
speeds of up to 10 Gbps (USB 3.2 Gen 2x2), with backwards compatibility to
older USB versions.
● DisplayPort: a video interface that can transmit audio and video signals at
high speeds of up to 32.4 Gbps (DisplayPort 2.0), making it ideal for high-
resolution displays and gaming.
Note that the speeds listed above are theoretical maximums and actual data
transfer rates may be lower depending on various factors such as cable length,
Notes by @uzayermasud
device compatibility, and signal interference.
1.1.2 Understand the technologies used by digital devices and how they
impact on the design and uses of devices:
Biometrics
Touchscreen
allows users to interact with devices through touch, simplifying user interface
design and enabling new forms of interaction such as pinch-to-zoom and swipe
gestures.
Sensor
provides devices with the ability to detect and respond to changes in their
environment, such as movement, light, temperature, and pressure, enabling
features such as automatic screen rotation, ambient light adjustment, and fitness
tracking.
Memory
enables devices to store and retrieve data quickly and efficiently, improving
performance and enabling features such as multitasking and fast app switching.
Storage
provides devices with the ability to store large amounts of data, such as documents,
music, and videos, enabling users to access their content on-the-go.
Battery power
provides devices with the ability to operate untethered from a power source,
enabling mobility and convenience, while advances in battery technology have led
to longer battery life and faster charging times.
Miniaturisation
Processor
Notes by @uzayermasud
provides devices with the computing power to perform complex tasks, such as
running applications, processing images, and playing games, while advances in
processor technology have led to faster performance and improved energy
efficiency.
enables devices to identify and track objects using radio waves, enabling
applications such as inventory management, contactless payment, and access
control.
● An RFID system consists of a reader and a tag. The reader sends out a radio
signal that powers up the tag, allowing it to send back its unique
identification number.
● RFID tags can be either passive, meaning they don't have a power source
and are powered by the reader's signal, or active, meaning they have a built-
in battery and can transmit their signal over longer distances.
● In logistics and supply chain management, RFID can help track the
movement of goods through the supply chain, improving efficiency and
Notes by @uzayermasud
reducing errors.
Overall, RFID provides a reliable, efficient, and cost-effective way to track and
manage objects, improving business operations and enhancing customer
experiences.
Applications:
● NFC can also be used for data transfer between two devices. For example,
users can transfer photos, videos, and other files between smartphones or
other devices using NFC.
Notes by @uzayermasud
● NFC can be used in transportation systems to allow users to pay for fares or
access information about schedules and routes using an NFC-enabled device.
enables devices to quickly and easily access information by scanning a code using
their camera, enabling applications such as marketing, advertising, and
authentication.
● When a QR code is scanned, the device uses its camera to capture the
pattern and then decodes the information contained in the code.
● QR codes have:
○ URLs
Notes by @uzayermasud
○ Alignment Markers
○ Position Markers
○ QR Code version
○ Date/Time Info
Applications:
● ticketing systems, such as for airline or event tickets. Users can scan a QR
code to access their ticket information.
● used in contact tracing during the COVID-19 pandemic. Users can scan a QR
code when entering a public space or event to help track potential exposure
to the virus.
Connectivity:
enables devices to connect to the internet and other devices, enabling features
such as messaging, social networking, cloud storage, and remote access. Advances
in connectivity technology have led to faster speeds, greater coverage, and
improved reliability.
When two or more separate technologies/devices merge into one. For example,
smartphones can do most things a laptop can and it is more portable.
Another example would be gaming consoles evolving beyond just games and now
including streaming services like Netflix and Spotify.
Smart watches not only tell the time but have taken the jobs of health monitoring
Notes by @uzayermasud
systems.
1.1.4 Understand the concept of and the need for features and functions
of embedded systems.
Embedded systems:
They often have limited resources, such as memory, processing power, and
input/output capabilities.
The features and functions of embedded systems can vary widely, depending on the
application, but may include sensing, actuating, processing, communication, and
control.
In addition, the reliability and safety of embedded systems are critical, particularly
in applications such as medical devices and automotive systems.
Pros:
● Embedded systems are highly specialised and can be optimised for specific
tasks, resulting in high performance and efficiency.
● They can be highly reliable and secure, with built-in safety features and
protection against cyber threats.
Notes by @uzayermasud
Cons:
1.1.5 Understand the concept of and the need for firmware, including
where it is stored.
Concept of Firmware
● Firmware is also necessary for enabling the device to interact with other
software components, such as drivers and operating systems
● The specific location of the firmware can vary depending on the device and
Notes by @uzayermasud
its architecture, but it is often stored in on-chip memory, flash memory, or
external storage devices, such as EEPROM or SD cards.
● In some cases, firmware can be updated or modified after the device has
been manufactured, either through a physical interface or wirelessly via a
network connection.
Speed:
● Refers to the rate at which a device can complete tasks and process data
Capacity:
● Refers to the amount of data that a device can store and process
● Example: A hard drive with a larger capacity can store more data than a hard
drive with a smaller capacity.
Portability:
● Refers to how easily a device can be transported from one place to another
Bandwidth:
● Example: A device with a higher bandwidth can download files from the
internet faster than a device with a lower bandwidth.
Power efficiency:
Notes by @uzayermasud
● Example: A laptop with a more power-efficient processor can operate for
longer on battery power than a laptop with a less power-efficient processor.
1.1.7 Be able to calculate data file size and time needed to transmit a file.
● Eight bits means that a byte can store up to 256 levels of information.
● We can therefore store up to 256 levels of brightness per pixel – which gives
us what is called ‘8-bit grayscale’.
800∗900=720,000 bits
720,000/8=90,000 bytes
90,000 /1000=90 KB
● Size in bits = W × H × D
● Size in bytes = W × H × D/8
● W = image width, H = image height, D = colour depth in bits.
Sound
Sampling
● Bit depth defines the dynamic range of the sound – the amplitude (volume) of
the waveform at each sample point.
● Quantisation is the name of the audio snapshot when it has to be rounded off
to the nearest available digital value.
Notes by @uzayermasud
kilohertz). For example, 44.1 kHz is equal to 44,100 samples of audio
recorded every second.
● The sample rate you choose depends on what the audio is going to be used
for. If you wanted to record a song to put on a CD you would usually use 44.1
kHz.
Calculation
● We can calculate sound file sizes based on the sample rate and the sample
resolution using the following formula: File size (bits) = rate × res × secs
= 1323 KfB
= 1.323 MB
1.1.8 Be able to use and convert between binary and denary, as defined
by the International Electrotechnical Commission (IEC). (These are
different from SI units.)
● Binary units are based on powers of two (e.g. 2^0, 2^1, 2^2, etc.), and are
commonly used in computing and digital electronics.
● Denary units, also known as decimal units, are based on powers of ten (e.g.
10^0, 10^1, 10^2, etc.), and are commonly used in everyday life.
Mebibyte (MiB)220
bytes
Notes by @uzayermasud
Gibibyte (GiB) 230
bytes
● The International System of Units (SI) uses decimal prefixes, such as kilo-,
mega-, and giga-.
● The IEC uses binary prefixes, such as kibi-, mebi-, and gibi-.
● This means that the size of a kibibyte is 1024 bytes, whereas the
size of a kilobyte in SI units is 1000 bytes.
Megabyte (MB) 1 06
bytes
● To convert from binary to denary units, multiply the binary value by the
appropriate power of two (e.g. 2^10 for kilobytes, 2^20 for megabytes, etc.).
● To convert from denary to binary units, divide the denary value by the
appropriate power of two and round down to the nearest integer (e.g. divide
by 1024 for kilobytes, 1,048,576 for megabytes, etc.).
● In everyday use, kilobytes, megabytes, and gigabytes are often used to refer
to both binary and denary units, which can cause confusion.
Notes by @uzayermasud
○ kilobytes, megabytes, and gigabytes for denary units.
1.1.9 Be able to select digital devices to meet the needs and requirements
of individuals and organisations.
Comes up in questions often, usually with no correct answer. They just want you to
talk about the pros and cons of things.
1.2 Software
● Systems software
● Applications software.
Application software:
System software:
● Operating systems are the most important type of system software, providing
the interface between the hardware and the user, and managing resources
such as memory, storage, and processing power.
● Utility programs are used to perform specific tasks such as file compression,
Notes by @uzayermasud
disk cleanup, and virus scanning.
● devices
● processes
● users
● security
Devices:
● The operating system communicates with device drivers to control input and
output operations for devices such as keyboards, mice, and printers.
Processes:
● The operating system manages the scheduling of processes and ensures that
they have access to the CPU and memory when needed.
● The operating system also monitors and manages the use of system
resources to prevent conflicts and ensure the smooth operation of the
system.
Users:
● The operating system provides a platform for users to interact with the
computer system.
● The operating system manages user accounts and permissions, ensuring that
users only have access to the resources they are authorised to use.
● The operating system also provides a graphical user interface (GUI) that
allows users to interact with the computer system in a user-friendly way.
Security:
Notes by @uzayermasud
● The operating system provides a range of security features to protect the
computer system from unauthorised access and malicious software.
● The operating system monitors system activity and logs events, allowing
administrators to detect and respond to security breaches and other issues.
● free
● open-source
● proprietary
● creative commons.
Sources of Software:
● Free Software: Software that can be used, modified, and distributed freely
without any restrictions. Examples include the GNU/Linux operating system
and the Apache web server.
● Open Source Software: Software that is available for free and provides
access to the source code, allowing users to modify and distribute it.
Examples include the Firefox web browser and the MySQL database.
Copyright Types:
● Free:
Notes by @uzayermasud
● Open Source:
● Software whose source code is made available to the public for use
and modification.
● Proprietary:
● Creative Commons:
● A set of licences that allows creators to share their work while retaining
some rights.
Licensing Options:
This licence allows a single user to use the software on a single device or computer.
● Cons: May not be suitable for larger organisations, and may require
additional licences for additional devices or users.
This licence allows multiple users to use the software on multiple devices or
computers, typically with a limit on the number of users or devices.
Notes by @uzayermasud
● Pros: Cost-effective for larger organisations, and easier to manage than
multiple single-user licences.
● Cons: May not be suitable for very large organisations or those with
fluctuating user/device needs.
Institutional Licence:
This licence allows a group or organisation to use the software on multiple devices
or computers within the same institution, such as a school or business.
● Pros: Cost-effective for institutions with many users and devices, and
may provide centralised management options.
This licence grants the user the right to use the software for a specified period of
time, after which the licence expires and the user must renew it to continue using
the software.
● Cons: Can be more expensive in the long run for continued use, and
may require additional administrative effort for licence renewal.
Indefinite Licence:
This licence grants the user the right to use the software indefinitely, without any
time limit or expiration date.
Network License:
This licence allows multiple users to access the software on a network, typically with
a limit on the number of simultaneous users.
Notes by @uzayermasud
● Cons: May require additional setup and administrative effort for
network management, and may limit simultaneous user access.
Note: There may be other types of licences available, such as subscription licences
or open source licences, but these are the main types commonly used in
commercial software.
1.2.5 Understand the purpose of, and how to manage, software updates:
● patch
● automatic
● upgrade
● compatibility issues.
Purpose:
● Software updates are released to fix bugs, improve performance, and add
new features to existing software.
● Updates may also include security fixes to address vulnerabilities that could
be exploited by malicious people.
● Manual updates can be initiated by the user through the operating system
or application settings.
Notes by @uzayermasud
● Keep your operating system and applications up-to-date to ensure that you
have the latest security patches and features.
● Consider enabling automatic updates to ensure that you are always running
the latest version of the software.
Topic 2: Networks
Computer networks are essential to most organisations, enabling them to access
their information irrespective of its geographical location; make efficient use of
hardware and software resources, and communicate effectively. Network design,
based on an understanding of protocols, is fundamental to the way networks work.
Such reliance on networks in our society is founded on the assumption that there
are mechanisms for securing access to them.
● Functions: The server provides resources and services such as file storage,
email, and web hosting, while the clients request and use these resources.
Notes by @uzayermasud
● Cons: High cost, single point of failure, and high maintenance requirements.
● Features: In a peer-to-peer network model, all devices are equal and can
function as both clients and servers. Each device shares its resources and
services with other devices on the network.
● Pros: Easy setup, flexible and adaptable, and can be used in remote areas.
Tethering
● Functions: The tethered device shares its internet connection with other
devices.
● Pros: Easy to set up, widely available, and can be used in areas without Wi-Fi.
Cons: Limited range, limited bandwidth, and potential data usage restrictions and
additional costs from cellular providers.
Notes by @uzayermasud
2.1.2 Understand the features and purposes of network communication
protocols:
Wi-Fi
ZigBee
Bluetooth
Notes by @uzayermasud
● Provides voice and data services
Infrared
Ethernet
Notes by @uzayermasud
● Enables end-to-end communication across the internet
● Transforms analog voice signals into digital data that can be transmitted over
the internet
● Supports features such as call forwarding, call waiting, and call hold
● Consists of seven layers, each with its own set of protocols and functions
● The layers are: physical, data link, network, transport, session, presentation,
and application
● Each layer provides services to the layer above it and uses services provided
by the layer below it
Wireless
Notes by @uzayermasud
● Microwave: used for long-distance, point-to-point communication such as
satellite communication and cellular networks. Example: satellite TV
transmission.
Wired
Speed
● Higher speed means that data can be transferred faster over the network.
Bandwidth
● A higher bandwidth means that more data can be transferred over the
network.
Notes by @uzayermasud
● Essentially the same as speed
Throughput
Scalability
Latency
● Refers to the time delay that occurs when data is transmitted over a network.
● Low latency means that data can be transmitted quickly and efficiently over
the network.
Error rate
Packet loss
● Refers to the percentage of data packets that are lost during transmission.
Availability
Notes by @uzayermasud
● A higher availability means that the network is more reliable and accessible.
Jitter
● Refers to the variation in latency that can occur during data transmission.
● Low jitter means that data can be transmitted smoothly and without delay.
Switch
A switch is a network device that connects devices together on a local area network
(LAN). It forwards data packets between devices based on their Media Access
Control (MAC) addresses.
Bridge
Gateway
A gateway is a network device that connects two networks that use different
protocols or technologies. It translates data between the two networks and
manages their communication.
Router
A router is a device that connects two or more networks and forwards data packets
between them based on their IP addresses. It acts as an intermediary between
networks, enabling communication between them.
Multi-function device
Modem
Notes by @uzayermasud
A modem is a device that modulates and demodulates digital data for transmission
over analog telephone lines or cable lines. It converts digital signals into analog
signals and vice versa.
Repeater
Server
A wireless access point is a device that allows wireless devices to connect to a wired
network. It broadcasts a wireless signal and enables devices to connect to the
network using Wi-Fi.
Hubs
A hub is a network device that connects multiple devices on a LAN. It receives data
packets from one device and broadcasts them to all other devices on the network,
regardless of their MAC addresses. Hubs are generally less efficient than switches or
bridges and are less commonly used in modern networks.
IPv4 is the most widely used version of IP addressing. It uses 32-bit addresses and
can support up to approximately 4 billion unique addresses. IPv4 addresses are
typically represented in dotted decimal notation (e.g., 192.168.1.1) and are divided
into two parts: the network ID and the host ID. The network ID identifies the
network, while the host ID identifies the individual device on that network.
Notes by @uzayermasud
Internet Protocol version 6 (IPv6)
IPv6 is the successor to IPv4 and uses 128-bit addresses, which provides an almost
unlimited number of unique addresses. IPv6 addresses are typically represented in
hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334) and are
divided into three parts: the network prefix, the subnet ID, and the interface
ID. This addressing scheme offers more efficient routing, improved security, and
easier network management.
Static IP addressing
Dynamic IP addressing
● It is used in the data link layer (OSI Model) to control network access and
ensure data is transmitted to the correct device.
Notes by @uzayermasud
● They are used in conjunction with protocols like ARP (gets the MAC address)
to enable device communication on a network.
● MAC addresses are essential for the proper functioning of network devices
and the Ethernet protocol.
Threats
There are numerous network security threats that can impact individuals and
organisations, such as malware, phishing attacks, denial-of-service attacks, data
breaches, and unauthorised access to networks and devices.
Impact on individuals
Network security threats can lead to personal data theft, identity theft, financial
losses, loss of privacy, and exposure to malicious content.
Impact on organisations
Solutions
Open networks
Open networks, such as public Wi-Fi networks, can pose a significant threat to
network security. They may lack encryption and other security measures, making
them vulnerable to attacks. Individuals and organisations should avoid using open
networks for sensitive tasks and use a virtual private network (VPN) for added
Notes by @uzayermasud
security.
Cybersecurity awareness
In summary, network security threats can have severe consequences for individuals
and organisations. Implementing security measures, avoiding open networks, and
raising cybersecurity awareness are critical to preventing and mitigating network
security threats.
Firewall
● Configure the firewall to restrict traffic to and from the network based on
predefined rules.
Security settings
● Configure security settings for network devices such as routers, switches, and
servers.
● Use secure protocols such as HTTPS, SSH, and SSL/TLS to protect data in
transit.
Anti-malware
● Ensure that the anti-malware software is up-to-date and regularly scans the
network for threats.
Notes by @uzayermasud
User controls/access/rights/profile
● Create separate user accounts with different levels of access based on job
roles and responsibilities.
● Regularly review and update user access rights and profiles to ensure they
are appropriate and up-to-date.
Authentication types
● Require users to create strong passwords that are difficult to guess and
regularly change them.
Encryption techniques
● Use encryption protocols such as WPA2 for wireless networks and SSL/TLS for
web traffic.
Physical controls
● Use locks, surveillance cameras, and access control systems to secure server
rooms and data centres.
● Ensure that network devices are physically secure and cannot be tampered
with.
Notes by @uzayermasud
What students need to learn
● The Domain Name System (DNS) is a decentralised naming system that maps
domain names to IP addresses, making it easier for users to access resources
on the Internet.
● DNS servers store and maintain domain name records and allow users to
access websites by typing in domain names instead of IP addresses.
● The DNS system is organised into a hierarchical structure that includes top-
level domains (TLDs) such as .com, .org, and .edu, and subdomains that are
assigned to specific organisations and websites.
● Internet Service Providers (ISPs) provide access to the Internet for individuals
and organisations by connecting them to the global network through their
networks and infrastructure.
● The World Wide Web (WWW or Web) is an information system that allows
users to access and share multimedia resources (e.g., text, images, videos)
over the Internet.
● The Web is built on top of the Internet and uses standard protocols such as
HTTP, HTML, and URL to allow users to navigate and interact with web pages
and resources.
● The Web has a decentralised architecture that allows anyone to create and
publish web pages and resources, making it a powerful platform for
information dissemination and collaboration.
● The Web has transformed many industries and sectors, including education,
Notes by @uzayermasud
commerce, entertainment, and communication, by enabling new forms of
interaction, engagement, and innovation.
● The Web has also brought about new challenges and issues, including online
security, privacy, and digital divide, which require ongoing attention and
solutions.
● The Web has the potential to enable new technologies and applications, such
as the Internet of Things (IoT), artificial intelligence (AI), and blockchain, that
can further transform and improve our lives and societies.
● The Web has become an essential part of our daily lives and activities, and it
is expected to continue to evolve and shape our future in significant ways.
3.1.3 Understand the difference between static and dynamic web page
content, and the need to use the different types.
● Content that remains the same regardless of user input or other external
factors.
● Typically written in HTML, CSS, and JavaScript, and stored as files on a web
server.
● Easy to create and maintain, and can be served quickly and efficiently to
users.
● Suitable for websites that have little or no need for user interaction or
personalised content.
● Content that changes based on user input or other external factors, such as
database updates, API calls, or server-side scripting.
Notes by @uzayermasud
● Suitable for websites that require user input, custom content, or real-time
data updates.
● Static web pages are best for simple websites that don't require much user
interaction or personalised content.
● Dynamic web pages are better suited for websites that require real-time
updates, user input, or personalised content.
● A combination of static and dynamic web pages can provide the best user
experience and functionality for a website.
● The choice of static or dynamic web page content depends on the website's
purpose, audience, and functionality requirements.
Server-side Scripting
● Server-side scripting is executed on the server before the web page is sent to
the client's browser.
● Server-side scripting is more secure and efficient but requires more resources
and expertise.
Client-side Scripting
● Client-side scripting is executed on the client's browser after the web page is
loaded.
Notes by @uzayermasud
and client-side scripting to achieve the desired functionality, performance,
and user experience.
Impact
● Greater risk of cyber threats, data breaches, and privacy violations, as online
environments expose individuals and organisations to new forms of security
risks.
Potential
Notes by @uzayermasud
● Increased social and political engagement, as online platforms and
communities enable new forms of activism, expression, and participation.
● Greater potential for sustainability and social impact, as online platforms and
technologies enable new forms of collaboration, resource-sharing, and
collective action.
3.2.2 Understand the security risks to personal data stored online and
methods of protection.
Security Risks
● Identity theft: Personal data stored online can be used to steal identities and
perpetrate fraud.
Protection Methods
Notes by @uzayermasud
3.2.3 Understand what a digital footprint (active, passive) is and the
positive and negative aspects of these.
Digital Footprint
A digital footprint is the digital trail that individuals leave behind as they interact
with various online platforms and services. It can include any information that
people share online, including social media posts, comments, photos, videos, and
search history.
Positive Aspects
● Can help individuals build their personal brand and establish themselves as
thought leaders or experts in their field.
Negative Aspects
Positive Aspects
● Can be used to personalise online experiences and provide users with more
relevant content.
Notes by @uzayermasud
● Can help companies improve their products and services by analysing user
behaviour and preferences.
Negative Aspects
● Can be used to track individuals and collect personal data without their
consent.
Online Community
Examples:
● Reddit: a social news and discussion platform where users can share and
discuss content on a wide range of topics.
● Instagram: a photo and video sharing app where users can follow and
connect with other users based on shared interests or hobbies.
● TikTok: a video sharing app where users can create and share short-form
videos around various topics, interests, and challenges.
Notes by @uzayermasud
or skill set. They serve as a way for professionals to connect with others in their
field, share knowledge and resources, and collaborate on projects.
Examples:
● LinkedIn: a professional social networking site where users can connect with
other professionals, search for job opportunities, and share industry news and
insights.
Online communities serve as a way for individuals to connect and collaborate with
others who share common interests or professional goals, regardless of physical
location or other barriers.
Impact on Individuals
● Can help individuals build their personal brand and establish themselves as
thought leaders in their field.
● Can also lead to negative impacts such as online harassment, bullying, and
exposure to harmful content or ideas.
Impact on Organisations
● Provides a way for organisations to engage with their customers or users and
gather feedback and insights.
● Can help organisations build brand loyalty and community around their
products or services.
Notes by @uzayermasud
● Can lead to increased innovation and problem-solving through collaboration
and idea sharing.
Online communities have the potential to bring about significant positive impacts
for individuals and organisations, such as increased collaboration, knowledge
sharing, and innovation. However, they can also have negative impacts, such as
exposure to harmful content, reputational damage, and online harassment, which
must be carefully managed and addressed.
Pay-Per-Click Advertising
Online communities can sell user data to third-party companies for market research
or other purposes. This can generate revenue for the community platform, but may
raise privacy concerns among users.
Community platforms can offer paid subscriptions or paywalls, where users must
pay to access premium content or features. This can generate revenue for the
community platform and offer a way for users to support the community.
Sponsored Content
Overall, monetization opportunities in online communities can provide a way for the
community platform to generate revenue and sustain itself, while also offering
opportunities for advertisers to reach their target audience in a targeted and
engaging way. However, it's important to consider the privacy and ethical
Notes by @uzayermasud
implications of using customer data and to ensure that any monetization strategies
align with the community's values and goals.
Cloud Storage
Cloud storage is a service that allows users to store, access, and manage data over
the internet, rather than on local storage devices. This data can be accessed from
any device with an internet connection.
Uses
● Storing and accessing media files such as photos, videos, and music
Cloud Computing
Uses:
Notes by @uzayermasud
● Provides easy and convenient access to computing resources and data from
anywhere with an internet connection
● Offers cost savings by reducing the need for users to invest in and maintain
their own infrastructure
● Raises security and privacy concerns related to data storage and access over
the internet.
Cloud storage and cloud computing have revolutionised the way individuals and
organisations store, access, and manage data and computing resources. They offer
convenience, cost savings, and scalability, but also raise important security and
privacy concerns that must be carefully considered and addressed.
Topic 4: IT systems
IT systems are pervasive in organisations. They are used for stock control, booking,
asset management, and logistics. These systems operate effectively because they
are designed and planned. An understanding of conventional notation will enable
students to design systems consisting of both hardware and software components.
Hardware
Software
The programs and applications that run on IT system hardware, such as operating
systems, productivity software, database management systems, and security
software. Software is essential for performing various tasks and functions within an
IT system.
Processes
The procedures and workflows that define how an IT system operates and how tasks
Notes by @uzayermasud
are performed within the system. Processes can be automated or manual and can
involve multiple components of the IT system.
People
The individuals who operate and maintain the IT system, including IT professionals,
end-users, and stakeholders. People are essential for ensuring the IT system is
functioning effectively and efficiently.
● Set of requirements
● Measurable criteria
● Agreement with customer/client
4.2 Dataflow
4.2.1 Understand the concept of and the need for data flow diagrams.
4.2.2 Be able to interpret and create data flow diagrams for a given
scenario. (Symbols are given in Appendix 7.)
Notes by @uzayermasud
Information Flow
Notes by @uzayermasud
4.3 Flowcharts
Flowcharts are visual representations of a process or system that use symbols and
diagrams to illustrate the steps involved in completing a task or achieving a goal.
Flowcharts
Notes by @uzayermasud
4.4 Systems
Advantages
Notes by @uzayermasud
knowledge sharing
● Potential cost savings through reduced need for physical infrastructure and
streamlined processes
Disadvantages
Data
Refers to raw, unprocessed, and unorganised facts or figures that are collected and
stored by various sources.
Information
Notes by @uzayermasud
Refers to data that has been processed, organised, and analysed in a way that
makes it meaningful, useful, and actionable.
Key differences
● Data is not useful on its own, while information provides insights and
knowledge.
● Data is the input for generating information, while information is the output
of data processing.
Sources of data
Structured data
Refers to data that is organised and formatted in a specific way that makes it easy
to search, analyse, and process. Structured data is typically stored in databases or
spreadsheets and can be easily queried and analysed using software tools.
Examples of structured data include:
Unstructured data
Refers to data that is not organised or formatted in a specific way and is more
difficult to search, analyse, and process. Unstructured data is typically stored in
Notes by @uzayermasud
text-based files, such as emails, social media posts, or documents, and may contain
a mix of text, images, and other multimedia elements. Examples of unstructured
data include:
Key differences
● Structured data is more easily stored and managed, while unstructured data
requires more storage capacity and management resources.
Data organisation
Databases provide a structured way to store and organise data, making it easier to
find and retrieve information.
Data integration
Databases can integrate data from multiple sources and applications, providing a
unified view of data that can be accessed by multiple users.
Data security
Notes by @uzayermasud
Databases offer built-in security features to protect sensitive data from
unauthorised access and data breaches.
Data consistency
Databases can enforce data consistency and integrity rules, ensuring that data is
accurate, complete, and up-to-date.
Data scalability
Databases can handle large volumes of data and can scale to meet the needs of
growing organisations.
Data accessibility
Databases can provide fast and efficient access to data, even for complex queries
or large datasets.
Tables
A relational database consists of one or more tables, which are used to organise and
store data. Each table represents a collection of related data that has a unique
name.
Fields
Each table contains fields, which are used to store individual pieces of data. A field
represents a single category of data, such as a name, date, or amount.
Records
A record is a collection of related fields that describe a single instance of the data
being stored. Each record represents a unique entry in the database.
Primary keys
A primary key is a unique identifier for each record in a table. It is used to ensure
that each record can be uniquely identified and to enforce data integrity
constraints.
Foreign keys
A foreign key is a field in one table that refers to the primary key of another table. It
is used to create relationships between tables and to enforce referential integrity
constraints.
Composite keys
Notes by @uzayermasud
identify a record in a table. It is used when a single field cannot uniquely identify a
record.
Entities
One-to-one relationship
One-to-many relationship
Many-to-many relationship
Notes by @uzayermasud
each instance of one entity can be associated with many instances of the other
entity, and vice versa.
5.3.1 Understand how and why SQL is used to manipulate data and data
structures.
● create and modify the structure of a database, including tables, fields, and
relationships between tables.
● create views, which are virtual tables that are based on the result of a SQL
statement.
● create and manage user accounts and permissions for accessing a database.
5.3.2 Know how to select and use appropriate SQL commands, features
and functions to manipulate data:
Sure, here's a brief explanation of how to select and use appropriate SQL
commands, features, and functions to manipulate data.
● Use the SELECT statement to retrieve data from one or more tables.
Notes by @uzayermasud
Example:
● Use the appropriate data types for each column, such as VARCHAR, INT,
DATE, etc.
Example:
Example:
UPDATE table1
Notes by @uzayermasud
SET column1 = 'new_value'
WHERE column2 = 123;
● Use the UNION operator to combine the results of two or more SELECT
statements into a single result set.
● Use the JOIN clause to combine data from two or more tables based on a
common column.
Example:
Example:
SELECT column1
FROM table1
WHERE column1 LIKE 'value%';
Notes by @uzayermasud
SELECT column1
FROM table1
WHERE column1 LIKE 'v_lue';
● Use the COUNT function to count the number of records in a table or group.
Example:
The pervasive use of technology has an impact, not just for individuals, but also for
the environment and society as a whole. The ability to make judgements about
technology is underpinned by an understanding of the moral and ethical issues and
the legal frameworks that are part of our lives.
6.1 Environmental
Construction
● Extraction of raw materials required for the manufacturing process can lead
to land and water pollution, deforestation, and soil erosion.
Notes by @uzayermasud
hazardous chemicals, which can have negative impacts on both the
environment and human health.
Use
Disposal
● E-waste contains hazardous chemicals that can release toxic substances into
the environment when not disposed of properly.
● Landfills and incineration of e-waste can result in the emission of toxic gases
and contribute to air pollution and climate change.
Environmental Monitoring
● IT solutions can help monitor air quality, water quality, and weather
conditions, providing valuable data for environmental research and decision-
making.
● Smart sensors and remote monitoring technologies can detect and track
changes in the environment, allowing for more efficient and timely responses
to environmental issues.
● IT solutions can help optimise resource usage, such as energy and water,
through real-time monitoring and control.
● Smart home technologies can adjust heating, cooling, and lighting based on
occupancy and weather conditions, reducing energy waste and saving money
on utility bills.
Notes by @uzayermasud
● Smart city solutions can optimise traffic flow and public transportation
systems, reducing congestion and carbon emissions.
6.2.1 Understand the legal issues associated with the use of information
technology systems:
Data Protection
● Organisations must comply with data protection laws that regulate the
collection, storage, and use of personal data.
● Individuals have the right to access their personal data, request that it be
corrected or deleted, and object to its use for certain purposes.
Copyright
● Fair use exemptions allow for limited use of copyrighted material for certain
purposes, such as criticism, commentary, or education.
Computer Misuse
● Penetration testing and ethical hacking are legal ways to test the security of
computer systems with permission and under specific conditions.
Intellectual Property
Notes by @uzayermasud
● Organisations must respect the intellectual property rights of others and
obtain appropriate licences or permissions to use patented technology or
trademarks.
6.2.2 Understand the moral and ethical issues associated with the use of
information technology systems:
Privacy
● IT systems can collect and store personal data, raising concerns about
privacy and the potential misuse of personal information.
● Individuals have the right to control their personal data and be informed
about how it is used, shared, and protected.
Inclusion
● Inclusive design can improve the user experience and increase the adoption
and effectiveness of IT systems.
Civil Liberties
● The use of IT systems can raise concerns about civil liberties, such as
freedom of speech, assembly, and association.
Access
● Organisations must ensure that their IT systems are available to all users and
do not exclude any group or individual.
Notes by @uzayermasud
● Digital divide, net neutrality, and access to education and healthcare are
examples of access issues related to the use of IT systems.
Accessibility
Expression
● The use of IT systems can facilitate the expression of diverse views and
opinions, promoting freedom of expression and democracy.
Association
● The use of IT systems can facilitate the formation of social groups and
communities, promoting social cohesion and mutual support.
6.3 Society
Smart Cities
Notes by @uzayermasud
● Smart city applications, such as traffic management, smart grids, and
intelligent building systems, rely on ubiquitous wireless access to collect and
analyse data in real-time.
Location Awareness
Notes by @uzayermasud