Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
GCSE ICT
Revision workbook
Name: _____________________________________
Class: _____________________________________
1
Chapter 1 Lets Communicate questions
1. What is cyberbullying?
2. Mobile phones can be used to cyberbully victims. What other methods does culprit use to cyberbully?
3. Give examples of situations where use of a mobile phone is prohibited?
4. Modern mobile phones are multifunctional devices. What does this means? Give some examples?
5. What is a responsible way of disposing of your old mobile phone?
6. What are the different methods of getting information from a mobile phone onto a website?
2
7. What does VOIP stands for and what is it used for?
8. Companies like to communicate with their customers online. What are the different methods that they can use to do this?
9. Some software is known as open source. What does this means?
10. Software does not always need to be purchased, it can be hosted. What are the advantages of hosted software
11. Sometimes a company or organisation will store information online. What are the advantages and disadvantages of this method.
3
Chapter 1: lets Communicate checklist
What can your phone do?
Mobile phone features Picture resolution Camera resolution Storage capacity Memory cards Music and video players File formats Connectivity Bluetooth WiFi Transferring data
between phones Network bands
Mobile phones for everyone?
Impact of age/gender/disability on choice of device
Advantages and disadvantages of mobile phones
Mobile phone safety Mobile phone
etiquette Disposing of old
mobile phones
Which kind of computer?
Desktop computers Types of portable
computers (laptop, notebook, netbook, PDA)
Choosing a suitable computer based on profession
Processor (CPU) Memory (RAM) Hard disk drive Wireless enabled USB connection Sound/graphics
cards Optical drive Choosing a
computer based on user needs
Conserving energy Peripherals (input,
output, storage/media)
Future proofing
Socialising on the Internet
Ways of communicating Advantages and
disadvantages of Instant messaging (IM)
Advantages and disadvantages of Voice over Internet Protocol (VoIP)
Advantages and disadvantages of social networking
Advantages and disadvantages of social networking
Blogs Social bookmarking Internet safety Social networking safety
Designing a mobile phone
Mobile phone features for specific needs
Working collaboratively Mobile phone features
for social life Energy consumption and
battery life GPS User interface Mobile phone design Fashion phones/business
phones/multifunctional phones
The Internet as a work tool
Advantages and disadvantages of email
Email protocols: IMAP and POP3
Advantages and disadvantages of Virtual Learning Environments (VLEs)
Advantages and disadvantages of user-generated websites (wikis)
Copyright and plagiarism laws
Legal, illegal and unethical use of content
Internet safety
Viruses Spyware Cookies Spam Phishing Hackers Identity theft Protecting your
computer from the dangers associated with being connected to the Internet
The digital divide
Understand what is meant by the digital divide
Groups who are likely to have poor access to latest technology
Economic implications
Educational implications
Social implications Cultural implications Government
initiatives to reduce the divide
Organisations working to reduce the divide
4
Chapter 2 on the move Questions
1. Write three pieces of advice on how to avoid accidents involving a computer
2. What does ‘ergonomic’ mean
3. Name three common health problems associated with computer use. How can these be prevented.
4. Discuss the possible cause for the increase in the number of accidents involving: increase number of computer in people’s homes.
5. Discuss the possible cause for the increase in the number of accidents involving: people are using computers differently
5
6. Discuss the possible cause for the increase in the number of accidents involving: wireless internet and equipment is on the increase
7. Discuss the possible cause for the increase in the number of accidents involving: new technologies such as Nintendo WII
8. Can you think of examples of how digital technology improves people’s health and well-being
6
Chapter 2 : On the Move Checklist
Planning a trip
Effective keyword searches
Research and making bookings online
Solving a last-minute hitch
Searching using a search engine
Reliability and validity of websites
Biometrics
RFID (Radio Frequency Identification) chips
Microchips
Keeping in touch
Devices that can send text messages and share photos
Suitability of mobile phone for taking photos/videos
Features of digital cameras/camcorders
Features of netbooks
Transferring photos between devices
Bluetooth
USB cables
Flash memory cards
Finding the way
What GPS is and what it does
How GPS technology works
Convergence (e.g. mobile phones with GPS)
Metadata
Geotagging
Advantages and disadvantages of GPS tracking
Geocaching
Privacy issues related to GPS technology
What digital devices should we take?
Choosing between digital devices
Features and functions of smart phones
Features and functions of netbooks
How can we connect?
Mobile phone ‘roaming’ facilities and charges
Connecting to the Internet: cable and wireless connections
Cyber cafés
Extra safety precautions needed when using shared computers
Wireless hotspots
Advantages of online photo albums
Advantages and disadvantages of cloud computing
7
Chapter 3 Entertain me – what to buy questions
1. List three positives effects of playing computer games
2. List three negative effects of playing computer games
3. What is RSI?
4. List four methods to protect someone from RSI
5. What types of RSI is associated with playing games?
6. When playing online, games often run more slowly. What factors can contribute to this?
8
7. Some games are moving away from being controlled by a hand-held games controller. Name other methods of controlling games.
8. Games are often sold illegally. What law has been broken by such activity?
9. What could happen to your computer as a result of installing illegal software?
10. What are the symptoms of someone who is addicted to computer games
11. What are the benefits of using network cables rather than a wireless connection for online gaming?
12. Do you think that paying computer games can make children more aggressive?
9
13. What can people who play computer games do to avoid damaging their health?
14. Some teachers believe that computer games can help children to learn. Describe three examples of computer games in education.
10
Chapter 3 Entertain me – what to buy checklist
Setting up a multimedia system
Effective keyword searches
Criteria for choosing a laptop: features, functions, hard disk drive (HDD) size, performance, connectivity, future proofing, upgradability, support
HDTV HDMI Portable music devices Disposing of old
equipment – environmental impact and privacy concerns
Which games console?
Comparing games consoles
Advantages and disadvantages of gaming using a console
Advantages and disadvantages of gaming using a laptop
Hands-free gaming
Connecting to the Internet
Types of modems – ADSL, cable and wireless broadband
Importance of bandwidth when downloading
Internet service providers (ISPs)
Choosing an ISP based on: cost, speed, download limits, email and web space, storage, security, parental control, reliability and customer service
Firewalls and preventing spyware
Checking broadband connection speed
What are the dangers?
Symptoms of computer game addiction
Health-related problems: eye strain, muscles and joint problems, RSI, obesity
Benefits and drawbacks of computer games
Identity theft Predators Staying safe online
How to create a home network
Local area networks (LANs)
Advantages of networks
Types of network connections: Ethernet cable, Wireless (WiFi), Powerline
Router
IP address
Which type of network?
Latency
Unsecured networks (hot spots)
Encryption
Preventing unauthorised access to home network
Downloads and on-demand services
Possible consequences of illegal downloading
Downloading guidelines
Digital Rights Management (DRM)
Video streaming
On-demand streaming
Licences
Effects of illegal downloading on the industry
Viral marketing
What precautions should I take?
Protecting your IP address
Spyware
Cookies
Third-party cookies
Overt and covert data collection
Protecting your computer
11
Chapter 4: Smart working Questions
1. What are the different ways that you can communicate using the internet
2. Most email users receive spam mail. What is this and why is it a problem?
3. Using email could mean that you are targeted by phishing websites. What does phishing means?
4. How might you be able to tell if a website is not legitimate of if an email is bogus (a phishing or spam)
5. What advice would you give to someone who receives suspicious messages from a stranger while instant messaging? Give practical steps that should be followed.
12
6. What does a firewall do?
7. What does anti-virus software do?
8. Filters are used to protect young people from the dangers of the internet. What dangers are associated with the internet
9. How can parents prevent their children from being exposed to the dangers of the internet?
13
Chapter 4: Smart working checklist
Creating a safe workspace
Computer-related health problems:
•back pain•eye strain
•repetitive strain injury (RSI)
•stress Ways of preventing
computer-related health problems
Ergonomics Other safety
considerations Working out the
problem from the physical symptoms given
Any time, anywhere
Mobile broadband Dongle Dongle security Advantages and
disadvantages of mobile broadband
3G coverage Privacy issues
Collaborative working
Technology that allows collaborative working
Advantages of collaborative working
Different ways of working collaboratively: video, conferencing, VoIP, online workspaces, wikis and online forums
Different ways of working collaboratively: video conferencing, VoIP, online workspaces, wikis and online forums
Multitasking Working remotely Creating a secure
password Good password
practice Access rights Teleworking
Software choices
Advantages and disadvantages of online software applications, e.g. Google Docs
Understand how commercial software producers can respond to the challenge of software as a service
Software licences General purpose
software versus specialist software
Buying and upgrading software:,locally installed software, leasing the software, software as a service (SaaS)
Advantages and disadvantages of each of the types of software
Copyright law regarding software
Open source software
Communicating with customers
Digital methods of communicating with customers
Why communicate with customers?
Advantages and disadvantages to the customer and the business of using email to communicate with customers
Advantages and disadvantages to the customer and the business of using instant messaging (IM) to communicate with customers
Blogs Advantages and
disadvantages of video conferencing
Advantages and disadvantages of VoIP
Storing and backing up data
What is data? Primary storage Secondary storage:
USB pen/flash drives, CD, Flash memory card, DVD, Hard disk drive
Advantages and disadvantages of online data storage
Choosing suitable data storage media
Importance of backing up data
Disaster recovery RAID Data Protection Act
1998
Running a business online
Benefits to businesses of selling and advertising online
Benefits of the Internet to industry and individual businesses
Importance of good website design
Advantages of Internet advertising
Advertising using a search engine
Keywords Content networks Viral marketing
14
Chapter 5: Shopping Experience Questions
1. What are the advantages of social networking?
2. What are the disadvantages of social networking?
3. State ways in which you can control who can view your photos on a social networking site?
4. People sometimes exchange personal information who they have only met online. Give three reasons why this is not a good thing to do?
5. Sometimes posting personal information on social networking site can have unforeseen consequences. Give some example of the consequences.
15
6. When creating a password, how would you make it strong
7. What is social bookmarking
8. Data loss from computers is very common what media can you use to save data to stop this from happening?
9. What is primary and secondary storage
10. Give three reasons why it is important to backup data regularly
16
Chapter 5 - Shopping experience checklist
Is shopping online a good thing?
Differences and similarities between shopping online and on high street
Advantages and disadvantages of shopping online
Deciding on the trustworthiness of a website
Online customer rights – ‘cooling off’ period
Advantages to businesses of selling online
Effects of online shopping on lifestyle and behaviour
Setting up an online account
Online accounts
Information you have to enter
Required fields
Combo boxes
Role of combo boxes in validation
Verification
Secret answer
Captcha tests
Password strength
Activating an account
Advantages and disadvantages of auto-complete features
Avoiding online fraud
Credit card fraud
Chip and PIN
Skimming
‘Bin raiders’
Card not present fraud
How criminals get hold of your details:
• trojans
• spyware
• phishing emails
How to spot a phishing email
Is it safe to pay online?
Credit and debit cards
Information you have to enter online
Credit card validation (CCV) code
Verified by Visa
How to recognise secure sites
Encryption – Secure Sockets Layer (SSL)
Advantages and disadvantages of online banking
Third-party payment processors, e.g. PayPal
Gift vouchers
Environmental impact of shopping online
Is my data safe?
• Widespread storage of personal data
• Data security risks:
o theft
o loss
o companies selling data
Data Protection
Privacy policy
17
Self-evaluation
18
Topic
Chapter 1: Lets communicate
Chapter 2: on the move
Chapter 3: entertain me – what to buy
Chapter 4: smart working
Chapter 5 shopping experience