Weebly



GCSE ICT

Revision workbook

Name: _____________________________________

Class: _____________________________________

Chapter 1 Lets Communicate questions

1. What is cyberbullying?

2. Mobile phones can be used to cyberbully victims. What other methods does culprit use to cyberbully?

3. Give examples of situations where use of a mobile phone is prohibited?

4. Modern mobile phones are multifunctional devices. What does this means? Give some examples?

5. What is a responsible way of disposing of your old mobile phone?

6. What are the different methods of getting information from a mobile phone onto a website?

7. What does VOIP stands for and what is it used for?

8. Companies like to communicate with their customers online. What are the different methods that they can use to do this?

9. Some software is known as open source. What does this means?

10. Software does not always need to be purchased, it can be hosted. What are the advantages of hosted software

11. Sometimes a company or organisation will store information online. What are the advantages and disadvantages of this method.

Chapter 1: lets Communicate checklist

|What can your phone do? |Mobile phones for everyone? |Which kind of computer? |Socialising on the Internet |

|Mobile phone features |Impact of age/gender/disability on |Desktop computers |Ways of communicating |

|Picture resolution |choice of device |Types of portable computers |Advantages and disadvantages of Instant |

|Camera resolution |Advantages and disadvantages of mobile|(laptop, notebook, netbook, PDA) |messaging (IM) |

|Storage capacity |phones |Choosing a suitable computer based |Advantages and disadvantages of Voice |

|Memory cards |Mobile phone safety |on profession |over Internet Protocol (VoIP) |

|Music and video players |Mobile phone etiquette |Processor (CPU) |Advantages and disadvantages of social |

|File formats |Disposing of old mobile phones |Memory (RAM) |networking |

|Connectivity | |Hard disk drive |Advantages and disadvantages of social |

|Bluetooth | |Wireless enabled |networking |

|WiFi | |USB connection |Blogs |

|Transferring data between phones | |Sound/graphics cards |Social bookmarking |

|Network bands | |Optical drive |Internet safety |

| | |Choosing a computer based on user |Social networking safety |

| | |needs | |

| | |Conserving energy | |

| | |Peripherals (input, output, | |

| | |storage/media) | |

| | |Future proofing | |

|Designing a mobile phone |The Internet as a work tool |Internet safety |The digital divide |

|Mobile phone features for specific needs |Advantages and disadvantages of email |Viruses |Understand what is meant by the digital |

|Working collaboratively |Email protocols: IMAP and POP3 |Spyware |divide |

|Mobile phone features for social life |Advantages and disadvantages of |Cookies |Groups who are likely to have poor access|

|Energy consumption and battery life |Virtual Learning Environments (VLEs) |Spam |to latest technology |

|GPS |Advantages and disadvantages of |Phishing |Economic implications |

|User interface |user-generated websites (wikis) |Hackers |Educational implications |

|Mobile phone design |Copyright and plagiarism laws |Identity theft |Social implications |

|Fashion phones/business |Legal, illegal and unethical use of |Protecting your computer from the |Cultural implications |

|phones/multifunctional phones |content |dangers associated with being |Government initiatives to reduce the |

| | |connected to the Internet |divide |

| | | |Organisations working to reduce the |

| | | |divide |

Chapter 2 on the move Questions

1. Write three pieces of advice on how to avoid accidents involving a computer

2. What does ‘ergonomic’ mean

3. Name three common health problems associated with computer use. How can these be prevented.

4. Discuss the possible cause for the increase in the number of accidents involving: increase number of computer in people’s homes.

5. Discuss the possible cause for the increase in the number of accidents involving: people are using computers differently

6. Discuss the possible cause for the increase in the number of accidents involving: wireless internet and equipment is on the increase

7. Discuss the possible cause for the increase in the number of accidents involving: new technologies such as Nintendo WII

8. Can you think of examples of how digital technology improves people’s health and well-being

Chapter 2 : On the Move Checklist

|Planning a trip |Solving a last-minute hitch |Keeping in touch |

|Effective keyword searches |Searching using a search engine |Devices that can send text messages and share |

|Research and making bookings online |Reliability and validity of websites |photos |

| |Biometrics |Suitability of mobile phone for taking |

| |RFID (Radio Frequency Identification) chips |photos/videos |

| |Microchips |Features of digital cameras/camcorders |

| | |Features of netbooks |

| | |Transferring photos between devices |

| | |Bluetooth |

| | |USB cables |

| | |Flash memory cards |

|Finding the way |What digital devices should we take? |How can we connect? |

|What GPS is and what it does | |Mobile phone ‘roaming’ facilities and charges |

|How GPS technology works |Choosing between digital devices |Connecting to the Internet: cable and wireless |

|Convergence (e.g. mobile phones with GPS) |Features and functions of smart phones |connections |

|Metadata |Features and functions of netbooks |Cyber cafés |

|Geotagging | |Extra safety precautions needed when using shared |

|Advantages and disadvantages of GPS tracking | |computers |

|Geocaching | |Wireless hotspots |

|Privacy issues related to GPS technology | |Advantages of online photo albums |

| | |Advantages and disadvantages of cloud computing |

Chapter 3 Entertain me – what to buy questions

1. List three positives effects of playing computer games

2. List three negative effects of playing computer games

3. What is RSI?

4. List four methods to protect someone from RSI

5. What types of RSI is associated with playing games?

6. When playing online, games often run more slowly. What factors can contribute to this?

7. Some games are moving away from being controlled by a hand-held games controller. Name other methods of controlling games.

8. Games are often sold illegally. What law has been broken by such activity?

9. What could happen to your computer as a result of installing illegal software?

10. What are the symptoms of someone who is addicted to computer games

11. What are the benefits of using network cables rather than a wireless connection for online gaming?

12. Do you think that paying computer games can make children more aggressive?

13. What can people who play computer games do to avoid damaging their health?

14. Some teachers believe that computer games can help children to learn. Describe three examples of computer games in education.

Chapter 3 Entertain me – what to buy checklist

|Setting up a multimedia system |Which games console? |Connecting to the Internet |What are the dangers? |

|Effective keyword searches |Comparing games consoles |Types of modems – ADSL, cable and |Symptoms of computer game addiction |

|Criteria for choosing a laptop: |Advantages and disadvantages of gaming |wireless broadband |Health-related problems: eye strain, |

|features, functions, hard disk drive |using a console |Importance of bandwidth when |muscles and joint problems, RSI, |

|(HDD) size, performance, connectivity, |Advantages and disadvantages of gaming |downloading |obesity |

|future proofing, upgradability, support|using a laptop |Internet service providers (ISPs) |Benefits and drawbacks of computer |

|HDTV |Hands-free gaming |Choosing an ISP based on: cost, speed, |games |

|HDMI | |download limits, email and web space, |Identity theft |

|Portable music devices | |storage, security, parental control, |Predators |

|Disposing of old equipment – | |reliability and customer service |Staying safe online |

|environmental impact and privacy | |Firewalls and preventing spyware | |

|concerns | |Checking broadband connection speed | |

|How to create a home network |Which type of network? |Downloads and on-demand services |What precautions should I take? |

|Local area networks (LANs) |Latency | |Protecting your IP address |

|Advantages of networks |Unsecured networks (hot spots) |Possible consequences of illegal |Spyware |

|Types of network connections: Ethernet |Encryption |downloading |Cookies |

|cable, Wireless (WiFi), Powerline |Preventing unauthorised access to home |Downloading guidelines |Third-party cookies |

|Router |network |Digital Rights Management (DRM) |Overt and covert data collection |

|IP address | |Video streaming |Protecting your computer |

| | |On-demand streaming | |

| | |Licences | |

| | |Effects of illegal downloading on the | |

| | |industry | |

| | |Viral marketing | |

Chapter 4: Smart working Questions

1. What are the different ways that you can communicate using the internet

2. Most email users receive spam mail. What is this and why is it a problem?

3. Using email could mean that you are targeted by phishing websites. What does phishing means?

4. How might you be able to tell if a website is not legitimate of if an email is bogus (a phishing or spam)

5. What advice would you give to someone who receives suspicious messages from a stranger while instant messaging? Give practical steps that should be followed.

6. What does a firewall do?

7. What does anti-virus software do?

8. Filters are used to protect young people from the dangers of the internet. What dangers are associated with the internet

9. How can parents prevent their children from being exposed to the dangers of the internet?

Chapter 4: Smart working checklist

|Creating a safe workspace |Any time, anywhere |Collaborative working |Software choices |

|Computer-related health problems: |Mobile broadband |Technology that allows collaborative |Advantages and disadvantages of online |

|•back pain |Dongle |working |software applications, e.g. Google Docs|

|•eye strain |Dongle security |Advantages of collaborative working |Understand how commercial software |

|•repetitive strain injury (RSI) |Advantages and disadvantages of mobile |Different ways of working |producers can respond to the challenge |

|•stress |broadband |collaboratively: video, conferencing, |of software as a service |

|Ways of preventing computer-related |3G coverage |VoIP, online workspaces, wikis and |Software licences |

|health problems |Privacy issues |online forums |General purpose software versus |

|Ergonomics | |Different ways of working |specialist software |

|Other safety considerations | |collaboratively: video conferencing, |Buying and upgrading software:,locally |

|Working out the problem from the | |VoIP, online workspaces, wikis and |installed software, leasing the |

|physical symptoms given | |online forums |software, software as a service (SaaS) |

| | |Multitasking |Advantages and disadvantages of each of|

| | |Working remotely |the types of software |

| | |Creating a secure password |Copyright law regarding software |

| | |Good password practice |Open source software |

| | |Access rights | |

| | |Teleworking | |

| |Communicating with customers | | |

| |Digital methods of communicating with | | |

| |customers | | |

| |Why communicate with customers? | | |

| |Advantages and disadvantages to the | | |

| |customer and the business of using | | |

| |email to communicate with customers | | |

| |Advantages and disadvantages to the | | |

| |customer and the business of using | | |

| |instant messaging (IM) to communicate | | |

| |with customers | | |

| |Blogs | | |

| |Advantages and disadvantages of video | | |

| |conferencing | | |

| |Advantages and disadvantages of VoIP | | |

|Storing and backing up data | | | |

|What is data? | | | |

|Primary storage | | | |

|Secondary storage: USB pen/flash | | | |

|drives, CD, Flash memory card, DVD, | | | |

|Hard disk drive | | | |

|Advantages and disadvantages of online | | | |

|data storage | | | |

|Choosing suitable data storage media | | | |

|Importance of backing up data | | | |

|Disaster recovery | | | |

|RAID | | | |

|Data Protection Act 1998 | | | |

| | | | |

| | | | |

| | |Running a business online | |

| | |Benefits to businesses of selling and | |

| | |advertising online | |

| | |Benefits of the Internet to industry | |

| | |and individual businesses | |

| | |Importance of good website design | |

| | |Advantages of Internet advertising | |

| | |Advertising using a search engine | |

| | |Keywords | |

| | |Content networks | |

| | |Viral marketing | |

Chapter 5: Shopping Experience Questions

1. What are the advantages of social networking?

2. What are the disadvantages of social networking?

3. State ways in which you can control who can view your photos on a social networking site?

4. People sometimes exchange personal information who they have only met online. Give three reasons why this is not a good thing to do?

5. Sometimes posting personal information on social networking site can have unforeseen consequences. Give some example of the consequences.

6. When creating a password, how would you make it strong

7. What is social bookmarking

8. Data loss from computers is very common what media can you use to save data to stop this from happening?

9. What is primary and secondary storage

10. Give three reasons why it is important to backup data regularly

Chapter 5 - Shopping experience checklist

|Is shopping online a good thing? |Setting up an online account |Avoiding online fraud |

|Differences and similarities between shopping |Online accounts |Credit card fraud |

|online and on high street |Information you have to enter |Chip and PIN |

|Advantages and disadvantages of shopping online |Required fields |Skimming |

|Deciding on the trustworthiness of a website |Combo boxes |‘Bin raiders’ |

|Online customer rights – ‘cooling off’ period |Role of combo boxes in validation |Card not present fraud |

|Advantages to businesses of selling online |Verification |How criminals get hold of your details: |

|Effects of online shopping on lifestyle and |Secret answer |trojans |

|behaviour |Captcha tests |spyware |

| |Password strength |phishing emails |

| |Activating an account |How to spot a phishing email |

| |Advantages and disadvantages of auto-complete features | |

|Is it safe to pay online? |Is my data safe? | |

|Credit and debit cards | | |

|Information you have to enter online |Widespread storage of personal data | |

|Credit card validation (CCV) code |Data security risks: | |

|Verified by Visa |theft | |

|How to recognise secure sites |loss | |

|Encryption – Secure Sockets Layer (SSL) |companies selling data | |

|Advantages and disadvantages of online banking |Data Protection | |

|Third-party payment processors, e.g. PayPal |Privacy policy | |

|Gift vouchers | | |

|Environmental impact of shopping online | | |

Self-evaluation

|Topic |( |( |( |

|Chapter 1: Lets communicate | | | |

|Chapter 2: on the move | | | |

|Chapter 3: entertain me – what to buy | | | |

|Chapter 4: smart working | | | |

|Chapter 5 shopping experience | | | |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download