IT

Cards (79)

  • Personal Area Network (PAN)

    A network that is spread over a very small area, often covering no more than a few metres, used to connect personal devices
  • PAN example
    • Connecting a smartphone and wireless headphones or a laptop
  • Purpose of PAN
    File sharing between devices
  • Connection types in PAN
    Bluetooth and WiFi
  • Open WiFi example
    • Public places such as hotels, cafes and train stations providing WiFi access for visitors
  • Tethering/Personal Hotspot example

    • Connecting a device without a network connection to one with a network connection, via Bluetooth, USB cable or WiFi
  • Ad hoc networks
    • Scalable - more devices can be added at any time
    • Flexible - can be temporarily set up at any time in any location
    • Quick to set up - devices can communicate instantly once a connection is established
  • Ad hoc networks Drawbacks

    • Less secure - more open and likely to be accessed by attackers
    • Slower - limit to amount of data that can travel at one time
    • No overall control - makes the network disorganised
  • Ad hoc networks have security issues • anyone can access, no password needed to join, no encryption
  • Ad hoc networks have performance issues: poor signal, limited range, incomplete data transfer
  • Ad hoc networks have availability issues: rural areas have less network coverage, mobile networks not as advanced in developing countries, network coverage can be poor in some parts, hills, valleys and thick walls cause blackspots
  • Cloud storage
    Storing files and folders remotely
  • Features of cloud storage
    • Scalability
    • Access rights
    • Synchronise - ensures the content is same on all devices
    • Available 24/7
  • Benefits of cloud storage
    • Can be accessed 24/7, anywhere, if you have an internet connection
    • Scalable
    • Security is managed by cloud provider
  • Drawbacks of cloud storage
    • Need an internet connection
    • Can be expensive to buy more storage
    • Need to trust the cloud provider
  • Cloud computing
    Being able to access and share online applications via the internet
  • Features of cloud computing
    • Share files
    • Use same version
    • Collaborate
  • Benefits of online applications
    • Can be accessed if you have an internet connection
    • No updates needed
    • Cost effective
    • No installation
    • Collaboration tools - add comments, track changes, live editing, chat features
  • Factors to consider when choosing a cloud platform
    • Security
    • Storage space
    • Ease of use
    • Device accessibility
    • Cost
    • Interface design
  • Organisations need to consider how suitable their chosen platforms and cloud services will be for their users
  • Implications of cloud technology include security of data, compatibility, responsiveness to user, managing demand, task complexity, devices, compatible systems, compatible software, software updates, minimise downtime, staff expertise
  • Benefits of collaborative technologies

    • Global and multicultural workplace
    • Inclusive workplace
    • Available 24/7 365 days
    • Flexibility of working
  • Managing a modern team remotely
    1. Allocating tasks on a to do list
    2. Scheduling when tasks should be completed
    3. Using a message board to communicate important information
  • Communication tools
    • Voice calls
    • Online messaging
    • Email
    • Video call
    • Social media
    • Intranet
  • Stakeholders
    Customers, employees, suppliers and anyone else that has an interest in the organisation
  • Ways of communicating with stakeholders
    • Social media
    • Email
    • Website
    • Voice calls
    • Live chat
  • Inclusivity
    Including people who can't work in a traditional way and might be otherwise excluded
  • Accessibility
    Making computers available to everyone
  • Accessibility features
    • Text to speech - read aloud the text on the screen for visually impaired users
    • ALT tags - text that describes an onscreen image for people with visual impairments
    • Speech to text - speech captured through the microphone and converted to text on the screen
    • Screen magnifier/Zoom - enlarges onscreen text
    • Changeable font size
    • Changeable font colours
  • Benefits of remote working for organisations
    • Reduced office space
    • Improved recruitment pool
    • Improved morale
    • Less sick days
  • Drawbacks of remote working for organisations
    • Employees may not be as productive
    • Employees can't build relationships
    • May have security issues when dealing with personal data
  • Impact of remote working on individuals
    Benefits: 1. Saves travel costs and travel time
    2. flexible hours,
    3. work at own pace,
    4. take breaks when you want
    Drawbacks: Higher household bills, lack of routine, lack of social life, distractions, work life balance
  • Data Protection Principles
    Protects people's personal data
  • Data Protection Principles
    • Data must be processed lawfully and fairly
    • Data must be accurate and kept up to date
    • Data must only be collected for a specified purpose
    • Data must be protected and stored securely (e.g. encryption)
    • Data must not be transferred to another place without the same level of protection
    • Data must not be kept longer than necessary
  • ICO
    Information Commissioner's Office
  • Data subject
    The person the data is about
  • Rights of the data subject
    • To know how your data is processed
    • To have data erased (right to be forgotten)
    • To be able to withdraw consent
    • To get and reuse your data for different services
    • To have inaccurate data corrected
    • To be informed about how your data is used
    • To be able to access the data held about you
  • Computer Misuse Act
    It's illegal to access a computer system without permission, create malware that deletes, steals or modifies data, and intentionally spread malware
  • Offences under the Computer Misuse Act
    • Unauthorised access
    • Unauthorised modification
    • Creation of malware
    • Intentional spreading of malware
  • Trademark
    A design, symbol or words legally registered by a company or product so they are recognised