ICT Notes

Subdecks (1)

Cards (834)

  • Data Protection Act

    Ensures organisations must: have an individual's consent to collect, use or disclose personal data; inform the individual of their purpose
  • Requirements for data handling under the Data Protection Act
    • Used fairly and lawfully
    • Used for limited, specifically stated purposes
    • Accurate
    • Kept for no longer than is absolutely necessary
    • Handled according to people's data protection rights
    • Kept safe and secure
  • Individual rights under the Data Protection Act

    • Access a copy of the information comprised of their personal data
    • Object to data processing that is likely to cause or is causing damage or distress to the individual
    • Prevent processing for direct marketing, such as being sent newsletters or emails
    • Object to decisions that are taken by automated means
    • Claim compensation for damages caused by a breach of the act
  • Copyright
    A law or set of laws that provides the creator of an original work with the sole authority to use and distribute it
  • Using someone else's work without permission could result in the user facing legal action from the work's copyright owner
  • Options for copyright owners to distribute their works
    • Distribute under licences that users pay for
    • Distribute under free licences such as open source or creative commons licences
  • Examples of fair use of copyrighted material
    • Copies made by libraries, educational establishments, museums or archives
    • Recordings of broadcasts for archive purposes
    • Uses for the benefit of people with a disability
    • For non-commercial research or private study
    • When used in a parody
  • Digital rights management

    Systems designed to check that the device on which the work is opened is allowed to open it
  • Geoblocking
    Limiting access to internet content based on the user's geographical location
  • Geoblocking prevents users in countries with different legal frameworks from accessing copyrighted work
  • Methods for monitoring individuals' movements

    • Closed circuit television (CCTV), sometimes using facial recognition software
    • Automatic number plate recognition (ANPR) cameras
    • Monitoring the use of identification cards, travel cards, passports at borders and bank card transactions
    • Identifying devices on networks by their IP or MAC address
    • Using GPS data shared by apps such as friend finder apps
    • GPS trackers attached to items of clothing
  • Benefits of monitoring individuals

    • Find people who are lost, especially young children
    • Locate nearby friends in order to arrange to meet socially
    • Identify people on networks
    • Identify and locate potential criminals at events
    • Keep travellers safe, such as by checking for potential criminals at airports
    • Verify individuals for financial transactions in order to reduce financial crime
  • Drawbacks of monitoring individuals

    • Compromising people's privacy
    • The expense of setting up, monitoring and maintaining systems
    • The energy consumption of the systems and the effect on the environment
    • Making people feel as though they are not trusted
  • Examples of communications that can be monitored

    • Text messages
    • Emails
    • Posts on social media networking sites
    • Comments on blogs
    • Web histories
  • Risks from using digital devices
    • Eye dryness and fatigue
    • Repetitive strain injury
    • Back and neck ache
    • Trip hazards
    • Electric shock
    • Fire
  • Causes of risks from using digital devices

    • Looking at a screen for long periods of time
    • Using devices incorrectly
    • Poor posture
    • Trailing wires
    • Damaged cables
    • Liquid on devices
    • Overheating
    • Overloaded plug sockets
  • How to minimize risks from using digital devices
    • Take breaks
    • Make sure the screen is not too close
    • Use a large enough screen
    • Use blue light filters
    • Use suitable lighting and reduce glare of sunlight through windows
    • Use ergonomic devices
    • Use ergonomic support such as wrist pads
    • Maintain correct posture
    • Use good cable management
    • Tidy and secure cables in trunking
    • Regular cable inspections
    • Repair or replace damaged cables
    • No liquids near devices
    • Use cooling devices
    • Regular maintenance
    • Install fire extinguishers
    • Ensure that sockets are switched off when not in use
  • Maintaining a good posture
    • Keep a distance from the monitor
    • Monitor should be kept at an angle 10°-20°
    • Keyboard must be at elbow height
    • Keep feet flat on the floor
    • Adjust the seat height
    • Chair must include adjustable arm rests
    • Chair must include adjustable backrest
    • Avoid tight elbow angle
    • Avoid wrist bent upwards
    • Avoid pressure on elbow or wrist
    • Use of wrist pads can help maintain good posture and reduce the risk to health
  • Social Networking
    Allow members to connect through shared interests or relationships
  • Online Gaming

    Allow members of the community to play multiplayer games
  • Online Work Spaces

    Allow members of the community to collaborate together for the purpose of work
  • Virtual Learning Environments

    Allow students and teachers to use learning and assessment materials
  • Wikis
    Allow members in a community to collaborate and edit web pages to build communities
  • Forums
    Provide members of the community with online space for structured discussions
  • Video and Photo Sharing Sites
    Allow people to access and share content created and uploaded by members of the community
  • Blogs
    Allow creating online diaries of events or articles
  • Social Bookmarking
    Allow people to share web documents and URLs with each other
  • Members can choose to stay anonymous online, which can protect users but also means some users can misrepresent themselves
  • Disclosing too much personal information online can be dangerous, as it can be used for grooming or to locate the person or their friends and families
  • Location data can be given away either on purpose or by mistake, such as by uploading geo-tagged photographs to photo-sharing sites
  • Primary Sources

    Information that you have created yourself
  • Secondary Sources
    Information created by someone else
  • Examples of primary sources

    • Photographs you have taken yourself
    • Interviews or questionnaires conducted by you
    • Your own blogs, social media posts or emails
    • Your own sound recordings
  • Examples of secondary sources
    • Newspapers, books and maps
    • Television or radio broadcasts
    • Websites created by other people
  • Search Engines
    Compare the words entered by a user with words in a database of web pages and show the user the results that are the closest match to their original keywords
  • Search engines are used by personal assistants such as Amazon's Alexa and Apple's Siri, which allow you to speak your search terms aloud and have results through a speaker
  • Examples of search engines
    • Bing
    • Creative Commons
    • DuckDuckGo
    • Google
    • Yahoo
  • Keywords
    Words or search terms that a user types into a search engine in order to look for matching information
  • When entering keywords into a search engine, only enter the important words that you think websites will contain, and keep it simple without adding too many keywords
  • Search Syntax
    • (+) Adding + between words will return only results that match both words
    • (-) Adding - before a word will return only results that do not include that word
    • ("") Placing "" around a group of words will return only results that include the whole phrase with the words in that specific order