IGCSE Theory Notes Section 6: The Effects of Using ICT Explain what is meant by the term software copyright. (2) When someone creates an original piece of software the protection they have from the law that prevents someone from copying it is called software copyright. Four things that copyright law prevents people from doing? (4) Copy Lend Rent Install on a network Define the term computer virus. (2) A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without the users knowledge or permission. Six measures to protect against computer viruses. (6) Anti-virus Anti-malware Don’t download anything that is not from a trusted source Don’t open email attachments Don’t click hyperlinks in websites Scan memory sticks before using them Don’t use cracked software Define the term hacking. (2) Breaking in to a computer system or accessing data without prior authorization. Three different types of measure that can be taken to protect computer systems from hackers plus an example of each (6) Use strong passwords, for example a mixture of letters, numbers and symbols, not too short, and not a word in the dictionary. Don’t reveal your password to anyone. Use firewall software, which is often free for personal use. Disconnect from networks when not using them. Encrypt any sensitive information. Four types of job in which ICT has led to a decrease in employment (8) Manufacturing: Automated production lines and computer-controlled robots have replaced human workers. Secretarial work: Specialists are no longer required to produce documents because it is possible to type and print documents using a computer with word processing software. Accounting: Specialists are no longer required to do financial calculations because it is possible to do this type of work with a computer and spreadsheet software. Printing: Printers and typesetters are now obsolete because of DTP (desktop publishing) and computer-controlled printing presses. Four types of job in which ICT has led to a increase in employment (8) IT technicians: Maintain and fix hardware and software. Computer programmers: Create new computer applications. Web designers: Create and maintain new websites. Help-desk staff: Answer support calls from and give advice to users. Two advantage and two disadvantages of using computers for work (4) Advantage: Repetitive tasks done quickly. Advantage: More pleasant jobs for humans. Disadvantage: Overdependence. System outages can prevent work from being done. Disadvantage: Ability to work at home can mean longer hours and lack of home life. Define microcontroller (2) A microcontroller is a microprocessor which is embedded into and manages everyday electronic devices. Three components of a microcontroller (3) CPU ROM RAM Why might a microcontroller require an ADC? (4) [Quite a hard question but should be possible if you were paying attention to the analogue vs digital lesson] An ADC is an analogue-to-digital converter. It allows computer systems to collect and store information from sensors, which collect analogue information. An example of this would be a modern oven. Sensors in the oven measure the temperature in the oven. This is analogue data and it has to be converted to digital data by the ADC before the oven’s microcontroller can process it. Once it is converted to digital form the microcontroller can make a decision as to whether to increase or decrease the temperature. Why might a microcontroller require a DAC? (4) A DAC is a digital-to-analogue converter. It allows a computer system to output analogue data, such as sound or light. An example of this is an MP3 player. Music is stored in digital form on the MP3 player’s disk. The DAC converts this to an analogue sound signal which is sent to the headphones. Four effects of microprocessor-controlled devices on our lives: Labour-saving, so more leisure time. Easier communication using mobile devices. Products and services can be ordered online. Greater freedom for those whose mobility is restricted, such as the elderly. Provide definitions for each of the following (give examples for each except Web 2.0): Web 2.0 Not really a new version of the web but an acknowledgement that the way we use the web has changed, much of the content and taxonomy now being supplied by the users rather than by specialist web masters. Blog Short for web-log. An online diary or commentary that people use to keep others updated with their news. Digital media uploading The use of the internet to store personal photos, music or video, e.g. Flickr, Napster. Wiki A special type of website that allows its users to create and edit its content. They are often used for collaborative projects. Social networking An online community in which users share information according to their common interests, e.g. school, hometown, political affiliation. Examples are Facebook and Twitter. Three ways to make sure the information you find on the internet is reliable: Check several sources. Use websites that you know and trust. Check the spelling and grammar of the site. Reputable websites are more likely to be correct. Four ways to avoid undesirable content on the internet: Use web content filtering software. Use the “safe search” option in your search engine. Don’t click the links in spam email. Be careful which search terms you use. Two ways to make sure the web page you are accessing is secure: Check that the URL begins with https, not just http. Look for a padlock icon somewhere in your browser window. Provide definitions for the following Phishing In a phishing attack an email is sent to the target with a fake URL to a site that seems reputable, like a bank. The fake site is designed to look genuine and it asks the target to enter his/her username and password. These details are then recorded by the fake site and can subsequently be used by the attackers to gain access to personal data. Pharming More sophisticated than phishing, pharming is an attack on a DNS (domain name service) server, which causes internet traffic to be routed to a fake website. The fake website then harvests usernames and passwords. Spam Unwanted, usually commercial email. Above is a screenshot of an email I received recently. What type of attack is this an example of? (1) Phishing Describe why I should not press the “show images” button (4) The image will be hosted on the attackers’ server. When you click “show images”, your browser will make a request of that server. This request will be logged in the server’s http log and the attackers will then know that your email address is a “live” address (ie someone is actively using it). They will then prioritise your email address when sending spam and you will receive even more unwanted email. Your friend, who does not study ICT, tells you that it’s ok to click the link because it says “https” at the beginning. Is she right? Explain. (4) She is totally wrong. The text of the link is absolutely independent of the actual URL that the link will take you to. Consider this piece of html: <a href=”http://201.43.3.212/login.asp”>https://online.lloydstsb.co.uk</a> This link says that it goes to a secure bank website, but in fact it is going to some unknown IP address. Three potential health problems, together with causes and methods of prevention Potential health problem Cause Prevention Eye strain Looking at a monitor for Take regular breaks extended periods Back pain Bad posture when Use an ergonomic chair, sitting at the computer take breaks Repetitive Strain Injury Typing for extended Use a wrist support and (RSI) periods an ergonomic keyboard Four types of accident along with methods of preventing them: Fire Do not overload power sockets. Use circuit breakers and keep fire extinguishers near. Heavy object falling Make sure computers are sited on strong tables. Trip Don’t leave trailing cables across walkways. Put them under carpets or in proper cable ducts. Electric shock Keep liquids away from computer equipment.