You are on page 1of 14
a4 Networks and the effects of using them Most commuters are now connected to networks. For example nthe ‘home your computer maybe ableto access the interes, i wtich case ‘tbecomes part of « network, You may have a small ietwork at home, which allows you to aceess the internet on a desktop computer and 8 laptop at the same tie. Netaonks provide 30 many more benefits ‘compared to stand-slone computers (Le. computers not connected toa networ). Networks -A network is two or more computers that are linked together so that they are able ta share resources. These resources could ‘be a printer, scanner, software or oven a connection to the internet. You can also share data using a network, For example, 2 pupil database in a schoo! could be accessed from any of the ‘computers connected 10 the network Network devices To bul a network, some oral ofthe folowing network devices are needed. Routers ach computer linked 10 the internet is given a number which is called its IP (Intenet Protoco}) address, An IP adress looks like this: 123.456.1.98 and is unique for gach device while inked to the internet When data is transferred from one network to another the data is ‘ut into packets. The packets contain details ofthe destination ‘address of the netwark ts intended for. Computers an the same network all have the same fst part ofthe Intemet Protoco ‘address and ths is used to locate a particular network Routers are hardware devices that read the address information ta determine the final desnation ofthe packet. From details stored in table in the router, the router can direct the packet ‘onto the next network on its journey. The data packets then ‘eceived by routers on ther metworks and sent on its way until finaly ending up atthe final destination network Routers can Ue used to join several wired or wireless networks together. Rovters are usually @ combination of hardware whieh act ‘a galeways so that computer networks can be connected to the internet using a singe connection Core eon diferent typ c oa eee ee eat cet "Wis wireless outer allows al the computers inthe amet share an Network interface cards (NIC) Before @ computer can be connected to netark wil need to have a network intface card, Most modern computor have these when you buy the computer. These cars comect directly to the motherboard ofthe computer and have extemal sockets sn ‘hat the computer can be conected to network via cables Basically a NIC does the following: It prepares the data for sending, It sends the data >» It controls the flaw of data from the computer tothe transmission media (metal wire, optical re, et.) -Anetnork card allows 9 cannection to be made between the net cables and the matherboardofthecompurer Hubs ‘Athub is a simple device that does not manage any af she data vafic through It tis simply used to enable computers (on the network to shave files and hardware such as scanners ‘and printers, Data is transferred through networks in packets. hub contains ‘muiple ports (connection points) When a packet arrives at one ‘port, itis transfered tothe other ports So that all network devices. ‘of the LAN can see all packets. Every device on the network il teceive the packat of data, which it wll inspect to see iit is intended for tat device or not, Switches Uke hubs, switches are used to jin computers and other devices together in 2 nevwork but they work ina more intelligent way ‘compared to hubs. Switches are abe to inspect packets of data 30 that they are forwarded appropriately tothe correct computer Because a Swit sends a packet of data oly to the computer {tis intended for, eduoes the amount of data on the network, thus speeding up the network, Bridges ‘Briggs are used to connect LANs togsther. When one ofthe LANS sends a message, all the devices onthe LAN receive the message This iereases the amount of data fawing onthe LAN. Otten a age LAN is vided ito a saris of smaller LANs fa message I ent from one computer n @ LAN wo another comer ine ferent LAN then the message needs to pass between the LANS using abide The edvantage in subdiiing along network that eduoes te total network aces only trafic wih a ciferent LAN as its destination wl cross over the bid. Abide therefore usually as only two posi order to eannet one LAN to another LAN, Modems Modems have been largely replaced by routers for providing ‘access tothe Internet as the routers are mut faster. A ‘modem converts the data from the computer (digital data) Into sound (analogue data) that can be sent along ordinary telephone lines. Once the data arrives atthe ether end of the line, the sound will ned to be converted back to digital data using another modem before it can be understood by the ‘oceiving computer ‘The use of Wi-Fi and Bluetooth in networks There are two main technologies that alow wireless communication ‘between computers and other devices. Wi-Fi W-FI enables computers and other devices to communicate Witelessly with each other. Areas where the internet can be accessed wirelessly using WP-FI are called access points or ‘hotspots and they can be found in many public places, such as caffee bar, otels, apart, ete. The range of a WL-FI depends on the type of wireless router being used and also if tere ave obstacles such as walls in the way of the signal For a home network, the range of Wi-Fi are typically 50m indoots and 100m outdoors ‘Advantages of wireless communication » Provided you have a wireless signal, you can workin hotels, ‘outside, in cotfee shops, etc. »» You are not confined to workingin the same place, For ‘oxample, you can work on trains, buses and even some alrcrat provided there Is a sig 1» Fewer/ no tailing wires to tip over. » lis easier to keep a working area clean if there are not as mary wites in the way > There are no network wites So there are na costs for their installation. Disadvantages of wireless communication: The danger of hackers reading messages. » There are areas where you cannot get a wireless network There is some evidence that there may be 2 danger to health » Limited signal range Bluetooth Bluetooth is a wireless technology used to exchange data over ‘short distances and it makes use of radio waves. The range of Blyetooth depends on the power ofthe signal and can typically be ftom 5m to 100m, Here are some uses for Bluetooth: » Wieeless communication between input and output devices Ityou have @ wireless keyboard and mouse than they could Use Bluetooth. Printers can be controled wirelessly from @ ‘computer using Bluetooth » Communication Between 8 witeless hands-fee headset and a mobilephone. These are the sort people ean use whe they are avin, » Creating a smal wireless network where the computers/ ‘devices are near to each other and where the small bandwidth 's not a problem. For example, creating a smal home wireless network. » Transfering appointments, contacts, etc, between a computer ‘and a mobile device such as matile phone or tablet. »» Communication using 8 games controller. Many games ‘consoles use Bluetooth Bluetothis used wit ands fee headsets Setting up and configuring asmall network To set up and configure a small network is easy Here are the steps you generally nee to take, 1 Choose an Intemet Service Provider (1SP), pay them 2 subscription charge and get route, often provided by the ISP (which might induce wireless access point), 2 Connect the outer tothe telephone line or cable pint. {ln some countries, this is connection toa satelite link) 3 Connect any cabled devices to the router using wires between the ports onthe router and the Network interface Cand om the device 4 Connect any wirless devices - eg laptops tablets, printers using wireless network. You will need to open settings in your operating system on each device o create a new conection. You usualy need the passcode given to you bythe ISP to 1 this {5 You will need 2 browser on each device to aceess the internet, ere is some more detal on some of the essential parts of @ network Web browser software Aweb browser is a prngram that allows web pages stored on the lmeret to be viewed, Web browsers rea the instructions on how to display the items on a web page which are written ina form called HIN (Hypertext Markup Language). You wil be learning ‘about HTML In Chapter 21. A web browser allows the user to find information on websites and web pages quickly and it does ‘his through: > Emerng a web address (URL) >» A webintemet portal >» Key word searenes >> Links >» Menus. Web browger software includes email software that allows you to send and receive email Access to an internet service provider ‘Connecting rectly tothe internet is very expensive and only suitable fo lane companies and organisations. Most people connect tothe intemet vin an orgonisation called an internet service provider. This is an organisation tht supplies the connection to the intemet as well as providing services including » Storage on ther server, where you can store your website >» Email facilities > Instant messages where you can send short messages to your friends when they are onine »» Access to online shopping » Access to news, sport, weather, nancial pages, ete. ‘When you establish 2 netwotk connection with an ISP and pay their subseription charge they generally supply you with @ wireless router. This will enable you to link devices wielessy thus forming network that wl allow users to: » Share intomet access > Share access to hardware devices suchas printers and scanners » Share access to les held on diferent computers. At the back of the router you wil see some sockets into which Ethemet cables can be connected. You can connect par: of your rnetwotk tothe router using cables rater than wirelessly ‘he yellow cable shomct here is an Ethernet cable a this allows devices tobe connected straight tothe router eather than king them wirelessly The internet The iniemet iso huge goup of worldwide networks joined together Each ofthese networks consists of lots of smaller networks, When you connect to the imtemet your computer becomes part ofthe largest networkin the world. The advantages ofthe internet: 1» Huge amounts of information can be accessed almost anywhere. » Improved communication systems ~ this includes the use of text messages, emails, insiant messaging, tc »» Changes inthe way we shop - many people prefer to shop online >» VoIP (Voice over Internet Protocol) - enables cheap international phone calls to be made using the internet rather than having to pay for calls using a mobile or landline ‘telephone. WoIP allows wice data to be transferred over the internet and allows phone cals to be made without the need to subsarie and pay fora phone service > Can help people with disabilities to be more independent - because they can order goods and services online The disadvantages ofthe intemet: » Misinformation - there are many bogus or fake sites so you need to chock the information you obtain carefully or use only reliable sites, > Cybercrime - we have to be extremely careful bout revealing persoral information suct as bank and eredit card details. » Addiction to gambling, as there are many casino, bingo, horse racing, ete, beting sites » Increased problems due to hacking and viruses. »» Paedophiles laok for children using the internet E-commerce Most organisations use websites sometimes for pramational ‘purposes and sometimes to allow people to order goods ot services using the site, This is called e-commerce QUESTIONS A 1 Give the name of the device thats used so that several ‘omnputers ina home can all share single intomet connection, (mark) 2 Explain the main diference between the network devices ‘hub and suite (2 marks) 3. Bluetooth is @ method that allows devices to ‘communicate with each other and pass data. Give the names of two pats of devices that ean ‘communicate using Bluetooth. (2 marks) 1b Biplain one advantage in devices communicating using Buetoth, (1 mark) © faplain one cisadvantags in devioes communicating using Buetoth (1 many 4 An ofice is thinking of intducing a witeless network with 8 witeless convection tothe internet. Give to advantages in using a wireless network rather ‘than a wires one. (2 marks) 5 Assmallofice uses @ local area network ‘The telecommunications company supplies them wth 2 cable ino the ulti. They would ke to setup @ eess network, 48 Give one reason toy woud ie their network to bo wires (1 mark) 'b- A ireless router is bought Give the purpose ofa wires router. (1 mat) A company has a wireless network installed. Give one. reason vty they might be concerned about the securty of ‘their data (man) Many of these websites allow customers to browse online catalogues and add goods to thelr vitual shopping basket just Tike in areal store. When they have selected the goods, they go to the checkout where they decide on the payment method. They alsa have to enter some details such as their name and address and other contact details. The payments authorised and the ordering process is completed, al that is lefts for the customer 10 wait for dolery oftheir ods. ‘The difference between internet and WWW. ‘Thore isa difference between the intemet and the world wide web (WNW). The internet is tre huge network of networks, I connects nilions of computers globally and allows them to communicate ‘with each other. The word wide web is the way of aocessing the Information on al these networked computers and makes use of web pages and web browsers to store and access the information, Intranets ‘An intranets a private network thats used inside an organisation and makes use of web pages, browsers and other technology just like the intemét. Schools and colleges use intranets and they can tol ll sos of information tom teaching resourees, information about courses and adverts to student personal reeards and attendance details. Parts ofan intranet can be made available {o anyone inthe organisation, white parts that contain personal deals can be made avaiable only to certain people. Restriction to certain pars ofthe intranet is achieved by using users and passrords ‘The differences between an intranet and the internet D» Internet stands for INTERnational NETwork, whereas intranet stands for INTernal Rested Access NETWork » Anintranet contain only information concerning a particular ‘organisation that has setitup, whereas the internet contains information about everything. » lInranets are usually only used by the employees of a paroular ‘organisation, whereas the internat can be used by anyone > With an intrane, you can block sites which are outside the internal network using @ proxy server. » Intranets are usually behind a firewall, which prevents them {rom veing accessed by hackers An intranet can be accessed from anyahere with corect authentication. ‘The advantages in using an intranet: » Intranets are idea! in schools because they can be used to prevent students from accessing unwanted information. » The intemal email system is more secure compared to sending emails using the intemet 1 Only information that is relevant to the organisation can be ‘accessed and this prevents employees accessing sites that are inappropriate or which wil cause them to waste time, The two types of network LAN and WAN There are two types of network: a focal area network (LAN) and a wide ara network (WAN). Basically a WAN is much bigger than a LAN and is spread over ferent sites. A LAN, however, s within one site or building This table gives you the main features of each type of network ‘Conn to smal te Cavers a wide geographical aes (eg. between cities, countries: and even continents) Usual cated in a single In ots of eiterent tidings an bailing ‘cities. counties, etc. ‘Uses cal, wie, nfis-red Uses more eperive and microwave links which are telecammunication links that are usualy owned bythe rgarisaton suppl by tlcoramaniatin cxmparies (satelite nhs) ess emensie bul es Move pense to bul as ‘equipments owned by me ‘sophisticated communication ‘oypnisition which s cheaper stems are used nving rents than ening inesand equpman. of communist lines Wide area networks afte make use of satelite inks, WLAN WLAN stands for wireless local area network and means a LAN, here the computers ae able to communicate with each other nirelesly WLAN is the type of network you have in your home whee several computers are all abe to access the intemet wirelessly at the same time. AWLAN allows users to move around an area andl yet stil stay ‘connected tothe Internet. Gury Network a group of computers that are able 19 communicate with each ater. LAN (local aree network). network of computerson one sito WAN [wide area network) a network where the terminals computers ate remote fram each ather and telecommunications ae used to communicate between them WLAN Awizeless local area network makes use of inrawed cor microwaves asa carrie forthe data rather than wires ‘Advantages and disadvantages of a WLAN compared toa cabled LAN ‘Acabled LAN uses either wired cables ar optical fibre cables to send and receive dete over the network. A WLAN provides links ‘that are wireless between computers and other devices on the retwork such as printers and scanners, ‘Advantages of a WLAN: itis cheaper as ther Is less cabing needed, >» Its wry easy {0 link devices such as printers and scanners to the network. >» You can work anywhere in the building in range of the wireless signal Disadvantages of a WLAN: 2» There maybe areas in building where the rao signals too weak »» There are secuty problems as the radio signals could be intercepted by hackers » Wireless signals are not as reliable as wired cables and the data tansfer speeds are not as high > There can be interference from other electrical and electronic equipment used in the same building and this can oisrupt the wires signa. The advantages and disadvantages of using different types of computer to access the internet ‘he internet can be accessed by a wide variety of devices ‘om desktap computers to smartphones. Each device has its advantages and disadvantages over other devices for accessing ‘the internet and these are outlined inthe fllowing sections ‘Advantages and disadvantages of using a smartphone to ‘access the internet Advantages: The internet can be accessed anywhere provided there is W-FL ora mobile signal >» Encourages users to sacalise with the social networking applications. >» You can stay connected while moving around. Disadvantages: > Smariphones are not easy for parents to police. tis possible ‘that children could access unsuitable content or arrange to ‘meet up with stingers > The websites are afen a immed down version for smartphones and don't have the ful capabilites ofthe full website when used wit a laptop or desktop computer »» The small screen and keyboard can be frustrating to use compared to tablets, laptops or desicops. » As the smartphone fs usually care all the time, the frequent checking of email and intemet applications may take time and attention away from interpersonal relationships. ‘Advantages and disadvantages of using tablet to access the internet Advantages: 1» Tablets are smailer and lighter than most taptops and desktops which makes them easier to carry. » Tablets have lrgersoreens compared to smartphones which makes using the intemet easier. » Tablets are easy to use when standing up, making therm useful {or accessing information about places of interest, galleries, ‘etc, when you are visting ther. Disadvantages: > Tablets have a smaller screen than most laptops and desktops ‘0 It shard to see a page without the need to scr it » Tablets come with a virtual keyboard which is not as easy to use as real keyboards used wih laptops and desktops. » The awkward position in which tablets are used may lead to future heath problems, Advantages and disadvantages of using laptop computer toaccees the internet Advantages: » Designed to be portable so they are smaller and lighter cmpated to desktop computer. » Has a faily large scraen which mekos wading web pages easier ‘than reading the same pages on 9 smartphone or tablet. » Has an almost full-sved keyboard which makes typing Search conditions easier. 1 Can be used when 2 fat surface is not available to use @ mouse Disadvantages: » Not as portable as @ smartohone or tablet because of is size and weight (ypically 2g) » The screen and keyboard are attached, which may lead to incorect posture being used which car cause backache, of otter health problems. Advantages and disadvantage: toaccess the internet ‘Advantages: >» Afullsize keyboard and mouse make it easier to type search ‘rteria and make selections. » The majority of web pages are designed to be viewed using 1 desitop and this enables the pages ta be viewed! as te ‘website designed meant them to be viewed »» Desitop computers ae beter engonomicaly because the monitor ‘an be adjusted to the correct height and the keyboard and mouse: are casero use. This means tere willbe fewer heath problems ‘used by thelr use Disadvantages: » Desktop computers are not portable 8s they ate lange and hem. » Desktop computers are hard to use while standing up. Network issues and communication In this section you wil be looking at some ofthe problems, associated with the use of networks. You wil aso be looking at ‘the different types of network that allow communication to take Place between people in diferent cations. Security issues regarding data transfer Once computers are networked together the security risks increase and if the network's connected tothe internet, the ‘security risks are even greater. In tis section we wil look atthe secur issues of reworks. Here are some of the ways security of 3 network can be breace. Password interception Here a person's password, which should be kept sere to them, becomes known to others. his means that ether people can row ‘sigh in using their password and gain access to thir les. When using the intemet you can have lots of afferent passwords such as those for your email, bank accounts, stores. etc. f people know ‘these passwords then they could read your emails, remove money from your bank account and purchase items using your details Virus attack ‘Yiruses pase a majrtreat to netvors. A wis program that replicates (copies) self atomically and may cause dara, (Once a computer cx media has avin coped ont itis said to be infected. Mose viruses ae designed to do something apart fom oopying ‘hemsehes. For example, they can: » Display annoying messages on the screen » Delete programs or data D> Use up resources, making your computer run more slowly > Spy on your online use ~ for exemple, they can collect usernames, ‘passwords, and card numbers used to make online purchases. 4 On of te main problems i that vituses are being ereated all the time and that when you get a vitus infection itis not always clear ‘what a new virus wil do to the network, One of the problems with ‘viruses is the amount of time that needs to be spent sorting out the problems that they orate. All computers should be equipped with andsirus software, whichis 8 program that is able to detect anid delete these viruses. This should be updated regulary, 2 new viruses are continual being developed and would not always be detected by older versions ‘ruses pose a major treat tall computer systems Howto prevent viruses. The best way to-avold viruses altogether isto use ami-virus software and adopt procedures which will make virus infection less likely. Here are some stops which can be taken to prevent viruses entering @ network: > Install anti-virus sofware »» Do not open emails from unknown sources, > Keep anti-virus sofware up-to-date. Configure te virus checking software so that updates are installed aulomaticaly >» Have clear acceptable use policy forall staff who use computers. > Tein staf to be aware ofthe problems and what they can do to help. >» Do not allow programs such as games, video or movies tobe ‘downloaded onto the organisation's 1 systonis, »» Domnot open le attachments to emails uniess they are trom ‘rusted source. > 1 possible, avoid users being able to use their own removable media (pen drives, portable hard disk drives). Hackers accessing the network Hacking isthe process of accessing a comiputer system without permission, Hackers offen access a network using the intemet, In mast eases the hacker wil ty to guess the user's passmard or ‘obtain the password another way for example, by using a cracking ptogram which wit generate milion of efferent passwords very ‘quick trying each of them in tum, “The identity 1 stole was a fake! Boy, you just cat trust people these days!” Sometimes special sotware Is installed on a user's computer ‘without their petmission and it can log the keys thatthe user presses, which can tell a hacker about usemames, passwords emails, et. This sofware is called spyware or ke-logging software Use a frewall~a firewall is hardware, software oF both that wil look at the data being sent or received by the computer to ether allow it through or block tt togs the outgoing data leaving the network and incoming data from the internet. I therefore prevents ‘acoess tothe network from unknown IP addresses and It can brevent users flom accessing unauthorised sites. It also warns 1 user if software is tring to run a program on the computer ‘without the user's permission Use ant spyware - tis is special software that you run on your Ccamputer which wil detect and remove ary spyware programs that have been put on your computer without your knowledge withthe purpose af collecting passwards and other personal information (Change passwords regulary -f someone does manage to obtain Your passwords, if they ar changed on 2 regular basis et least ‘they wil only have the use of your passwords for short whe. Protecting access by using user-IDs/usernames and passwords System security is making sur thet only authorised people access a computer system. This i called user authentication and itis normally eared out using @systm of user identification (i.e, userDs) and psswords. Most computer operating systems provide systems of user-Ds end passwords. Identifying the user to the system: ueer-IDs Auser-ID isa name or number that is used to identity @ certain User to the network. The person who looks ater the network wil use this to allocate space on the network forthe user. Its also used by the network to give the user aces to certain les. The network manager can also keep track of what les the user | using for security easons. Network menagers can also track Improper use of the internet using user- IDs Preventing unauthorised access tothe system: the use of passwords [A passvodd is @ sting of eharactes (letters, eumbers, and ‘punetation marks and other symbols) thatthe user can select. Only the user will know what the password is. When tie user centers the password it will not be shown on the sereen. Usually an asterisk is shown when you enter a character Only on entry ofthe correct password wil the user be allowed access to te network, Some networks are set up so that f someone attempts to.enter a password and gets it wrong three times, the user account is locked. If this happens, the user should contact the ‘network administrator to ave the password reset, which may Jinvolve answering security questions, Choosing a paseword ~ the differences between strong and weak passwords ‘There are programs avaiable that are abe to crack passwords ‘and fa password is short and contains ust letters, then the password is weak and itis very easy to crack. Many people use weak passwords because they find them easy to remember. Here are some examples of weak passwords: ‘mypassnord nme Stowe12a4 ‘A strong password doesn’t need toe long provided it contains symbols, capitals, numbers, and letters, Although strong passwords are not Impossible to creck, most hackers would ‘uickly move on to a diferent computer system where a weak password hed been used. ‘A trong password should be a combination of letters (capital and lowereas2), numbers, and symbols that have no relation to each ‘other, just totally random such as 4HpIOSR; Here are some examples of strong passwords: SHTCRX 0234101 Authentication techniques ‘As weak passwords can be easily crackad, and strong passwords {are hard to rememiver, there needs tobe an easier way to allow users acne to networks. Many networks use magnetic stipe cards or other 1D cards containing chips which are used to gain access to the network These ae stil used in conjunction wth passwords and usernames. since the card or ID card could have been stolen. Biometic scanning systems can be used rather than usernemes ‘and passwords to allow access. Retinal scanning uses the ‘unique pattem on the back of the eve to recagnise a person and fingerprint scanning uses the unique pattern on a person's finger to idensty them. Face recognition can be used to match ‘someone trying to og onto the network with those people who are allowed access tis scanning is another biometric method used for authentication ‘and it uses the eoloured area ofthe eye surrounding the pup for idontifcation. thas the advantage over retinal scanning in that itcan be carried out using regular video cameras and can be performed as far as two feet away and also on people who are wearing gasses. Biomettc methods ave the main advantage in that there fs nothing to forget such as a cant or & code. ogneticstrne cards cane used to restrict accesso networks Face racagnton can based t authenticate users of 2 networks Encryption W information needs to be sent over te iteret or another network and it needs to be kept secure, then encryption should ‘be used. Encryption scrambles the data while itisteing sent ‘and only the tue recipient sable to unscramble it Should the dats be intereopted by a hacker, then the dota wl be totaly mearindess Te process of sorambling data, sending it over the intemet and then deciphering it when it reaches the tue recipient, s called ‘encryption. Ths requtes encryption and decryption keys. Encryption should be used for: > Seniing creat card details such as credit card numbers, apy dates, ete., over the internet. >» Oning banking »» Sending payment details (bank details such as son-code rumbers, account numbers, ete). »» Confidential emails, >» Sending data between computers when confidentiality is essentil urna Encryption the process of scrambling files before they _ate sent over a network to protect them from hackers. Also" the process of scrambling fles stored on a computer so that ifthe computer is stolen, they cannat be understood Firewall a piece of software, hardware or both that is able ‘opprotect a network from hackers. The firewall laoks at ‘each item of data to soe if t should be allowed access to the network or blocked, Password aseries of characters chosen by the user, used to check the identity of the user when they require access toan CTeystem The principles of a typical data protection act Tho widespread use of ICT has made the processing and transfor ‘of date much easier and to protect the individual against the misuse of data, many counties have introduced a law called @ dato protection act. There area number of problems in organisations holding personal data » The personal data might be wrong, which means wrong decisions could be made, »» The organisation may not take care ofthe personal data it holds so others may find out about it What exactly is personal data? Personal data ina data proterton act normally means >» Data about an identifiable person (i.e. the data must be about someone who can be identified by name, address, et) » »» ‘Data about someone who is ving >» Data that is more personal than namie and address. For example, ‘mecioal record, criminal record, credit history religious of politcal belies, et, ae all lassed as personal data, Garam Personal date data about a living identifiable person whichis specitie to that persan and is mare personal than just your name and address, ‘The effects of wrong personal data Examples ofthe effet of wrong information: >» Your medical details could be wrong, meaning you get the ‘wrong treatment - which could be life threatening, > Wrong decisions might e made; for example, you could be refused a loan 1» Wrong exam results could affect you geting aj, Rights of the data subject and the holder The person about who the personal details are held is called the data subject ‘The person inthe orgonisatian who is responsible forthe personal data held is called the data holder. A data protection act isa law that protects individuals by placing obligations on the organisations who collect and process the data ((e.the data holder) in the following ways: Registration (also called notfication)—It requires anyone who ses porsonal data to registor with the person who isin ange ofthe act/law. Mey must say what data they intend to hold and ‘hat they intend to do with it Individuals can see their own personal data—Anyone can apply to 60 the personal data held about them, Organisations have to show it and ifthere is any wrong information, then it must be comected. There ae some exemptions where you would be unable to see the infomation hea about you. For example, you could be a criminal and apply to see the information the police have about you Data must be kept secure and up-to-date-Data subjects (ihe people the data is about) could take to court an organisation that does not keep their personal data secure, The right fora person to claim compensation—Hf data is processed unlawfully by an organisation then the person could take them to court and claim compensation Data protection principles ‘i dota protection acts are aiteret ua typical act would contain the following principe, 1. Personal data shall be processed fairy and lawfully. 2 Personal data shall be abtained only for one or more specified and lawful purposes, and shall not be futher processed in any manner incompatibie with thet purpose or ‘those purpases. Personal data shall be adequate relevent and not excessive in relation to the purpose or purposes fr which they are processed, Pupils in the schoo! ate gion contain wah: Personal data shall be accurate and, where necessary, kept ieee Vicia eect up to date spain two ofthese ngs. (2 mons) {© One pupils worried thatthe personal information Personal data processed fr any purpose or purpases shall - sacar tora tte stool holds about her might be income. not be kept for longer than is necessary for that purpose or those purposes Explain, with an example, how incorect information Personal data shall be processed in accordance with the Sond afer spurt Lemerts) Fights of data subjects under this act. 5 Give three data protection principles that are likely Appropriate technical and organisational measures shall be ‘to be included as part of s deta protection act. (3 mars) taken against unauthorised or unlawful processing of personal data and against accidental oss or destruction of or damage | Matt altheniicatian melt‘od for neler zones rake to personal data se a Bloetes Personal data shall not be transfered to @ county or territory ee eer een uniess that country or terior ensures an adequate evel Diometics (man) of protection forthe righ and freedoms of data subject in iD Sees Marne meniaas eee relation tothe processing f personal data, rework acces. (mans) QUESTIONS C Network communication 1 Say whether each oftheflloving statements iste orfolse, ‘this section we wil be Yooking in detail at the eiferent ICT Passwort shouldbe changed regan to mate Imetheds that canbe used to eneble communication between cece alec cmiecena) enn perpen ater iccmre & Sisoittes meyers same ys sa gt : A pf cos of sng unt ong sane © smoot cnennimbess cba yan, pner Te donor ing Wad sated ard 4, imtaconinon super and lneeseletes one naer cers he nf he san in ses pee cre eee il alaal of sounds that are sent along a telephone line. To send the fax phase you need enter the number ofthe fax machine at the receiving eer a eet vores fend of the fine. The modem atthe receiving end converts same thing. the sounds back into data and the printer prints the fax out When using a physical fax, only one fax can be sent or received at, the same time. f Key logging sofware is a type of spyware used by hackers to collect your passwords. (6 marks) 2 plain, by ging exemples, the aifeences berwoen a sting password and a weak password. (4 maris) _Electronic/intemnet faxing Electronic/intemet faxing uses intemet technology rather than a phone network to send @ fax and itis not necessary foreach fox to be printed. ll you need to send or receive the fx is @ computer or mobile device that has access tothe interme. 3 Some people are not happy about organisations storing ‘and processing personal information about them. 4. Biplain, by giving two examples, what is meant by personal information. (3 marks) Give one reason why a persan might object 10 Differences betweon electronic faxing and physical faxing ‘an organisation storing personal information » Electronic faxing requires the use of a computer network about them, (2 marks) ‘whereas plysicl faxing does not RET re ee caneaeretrees »» No additional phone line needed for electronic faxing. iy » All physical faxes are printed: with electronic taxes, you Es Sree ‘choose to print or not, thus saving ink and paper. Shoo ae required to not thei se ofthe » You do not have the cos of purchasing a physical fax machine. personal data they hold under the terms of a data > Foxes can be sent and received fom mobile devices protection act, D> More than one fax can he sent an received atthe same time. 2 Give tree ers of pessoal information the > You da nat have to pay forthe cost of @ phone cll to sand a fax ‘Schools lkelyto store about ther pupils. (3 marks) Email An email is an electronic message sent ftom one communication derive (computer telephone, mobile phon, or tablet) to another. Documents and images in electronic form can be attached to an ‘emai All web browser sofware hes email facies, Advantages and disadvantages of using emall compared to faxing Advantages in using email: > Emails car be viewed without others seeing them, Faxes are usvally printed out In an area shared by otter employees so they ean be seen by others. Emits cam be viewed on any portable device (computer, smartphone, et.) that has inernel acoess. Piyscal faxes can only be obtained using a fax machine. > The information in fox form isnot normally computer file ‘ang cannot ne cited by the receive. > The receivers fax machine may be out of paper and this will prevent the fx fom being received. With emais tis problem ‘oes not arise. »» Cheaper to use email. Sending a physical fax means you have 1 pay forthe cost ofthe phone call 3s wel as the cost ofthe paper and ink Disadvantages in using email: >» Emails ca be used to dsuibute viuses. Faxing does not spread viruses. » Faxed signed documents are usually legoly acceptable whereas emails are not Video-conferencing Yieo-conferencing allows two or mare individuals situated in different places otek to each otherin rel time and see each other atthe same time They ae abo able to exchange electric files with each other and pass electronic doouments around rater than paper documents allows people to conduct ‘vitual meetings Ir meetings need to be conducted between peonle in dierent ses or ‘even counties, ten a WAN is used such asthe ntemat Desktop video- conferencing systems in addition to a PC include a video compression card, a sound card, 8 microphone, a web cam, ‘and specialist software Avant sot of and diesdvantages using video-conferencing Advantages: >» Less stress as employees do not have to experience delays at aipors, accidents, road works, ete > Improved family fe, a lass time spent away from home. ‘staying in hotel, >> Saves traveling time. »» Saves money as business does not have to spend money on traveling expenses, note rooms, meals, ete. > Improved productivity of employees, as they are not wasting time traveling. »» Meetings can be called at very short naice without too much planning >» More environmentally friendly as there are fewer people travelling to meetings. This cuts down on carbon dioxide emissions. » Fower car journeys moans fower trafic ams and hence less stress and pollution, Disadvantages: » The inital cost of the equipment, as specialist video: conferencing equipment is expensive. » Poor image and sound quality. »» People can feel very seif.consclous when using video- conferencing and not communicate effectively. 1» Although documents and diagrams in digital form can be passed around, an actual product or component cannot be assed aroune, Lack of face-to-face contact may mean a discussion may not be 2s effective Ifthe dolegites are in distant locations, the picture can be out of synctronisation withthe speech, which can be distracting Video conferencing lows vital mestings where delegates are nt t| Web-conferencing Web: conferencing sa serve that afows conferencing events to be stared using inemnet technologies wit users who ae in emote locations, Usualy there wil be one sender and many recipients so, for example, taining event cout te conducted by one tainer and mary trainees in various locations Web-conferencing i used for ‘raining events, meetings, lectures, and presentations, Using web conferencing the folowing can be shared > Text and images » Voice » Video. Audio-conferencing ‘Audio. conferencing wolves conducting 2 meeting held by people in diffrent places using devices that allow voce to be sent and received Policing the internet Mary people tink ate ene should be polced because cova dry use Ses, ut tesa use std i i igo: Ta bl wt pitt iret is that inert a bal network ond you youl eed agreement from all countries using it, which is highly unlikely, Here are some ofthe arguments for and against policing the inte. Yes, the internet should be policed: » tis too easy for children to access pornography » Flins,7V & radio programmes are regulated so the internet ‘should be regulated a8 wel, 1» There isa ot of misinformation, Wrong information about a Person could potentially ruin ther ite » Pople can hide through the anonymity ofthe internet and say ‘things that they would not say to someone's face. » Other activities such a5 driving a cat, drinking alcohol, ete are policed s0 the intemet should be policed as well 1» There are many undesirable ses whieh tel you How to make ‘explosives, produce Megal drugs, ete. No the internet should not be policed To police the internet would require resources no aw ‘enforcement agency has. » Lis up to people to decide what they want to read or look at, »> What is allowed in one county is not alowed in another so yu could not agree on what to police » Free speech isa fundamental sight and should not be removed, REVISION QUESTIONS 1. LAN and WAN are both {pes af computer networks. 121 Wat does LAN stand for? 11) {i What clos WAN san for? i) Gi serene betwepr Nn al WAN. Py © Give three advantages to computer users ‘of LAN, rather than working on stand-alone machines. (3) 4 Give one method which ean be used to prevent data from being misused when it is being transferred between computers, i 2 When goods are ordered over the internet, payment hasta be made, 3 Giveone method of payment used over the internet. fa) b Describe why some people may not want to put their payment details into a website [2 ‘© Describe one way an online stare can make ‘sure that payment details ate safe [2] 3. Expl beflyhow each one ofthe following helps prove the security ofa network a serio {2} b Passwort (2) © Encryption fa) 4. Acompany is thinking of nstaling a new network. They hnave the choice of wired network, where cables are sed to vansmit the data, ora wireless network, where nocables are needed, Deserbe the relatwe advantages: ‘and disadvantages inusinga wireless network, [4] 5 \ideosconterencingis used by many organisations to conduet meetings ata distance. 2 opin twoadvantages of video-conferencing. [2] Explain two disadvantages ofvdeo-conterencing, [2] Test yourself The folowing notes summarise this chapter bu they have missing words. Using the words below, copy out and complete sentences A to $. Each word may be used mare than once. intemet inact router WLI attachments ‘synchronise local network interface card ‘encryption Bluetooth broadband WLAN wide wirwless download bridge spyware antivieus passwords ‘A With __ communication, the data travels through the air rather than through cables, B. An internal network which makes use of web pages and web browser sonware is called an © A-caid that connects direct to the motherboard of the computer and lias extemal sockets so that the computer an be connected to a network via cables is called a DA hardware device that is used to connect local area netiorts together is called a E ___ area networks are those networks that are rosticted ta singe building or site. F ‘area networks ae situated across a wide seogsaphical ea, GA hardware device tht allows several computers to share a single iternet connection is called a. M The letter ___i88 wide area network that uses wireless cornmunication rete than cables. Ahotspotis an area where ___'s avallable. A hardware device that takes a packet of data and reads the address information to determine the final destination ofthe packet is called a. Is a method used to vansfer data over short stances from fed and mobile devices. Bluetooth can be used to__ the music on your home computer and your portable music payer so the tracks stored on each are the same. Jn WLAN stands for Key logging software records keystrokes made and is an example of _ Credit card details are scrambled before sending over the Inemet This process is called _ and prevents hackers being able to understand the information ifimeroepted. In order to prevent viruses entering an ICT system, __ software siiould be used to sear for and destioy viruses. Users should be told not to open __to emails unless they know who they are from. Users should also betold to_ music and games only from trusted sites. To protec the data stored in networks, userDs and __ should he used to prevent unauthonsed access EXAM AND EXAM-STYLE QUESTIONS 1 Complete each sentence below using one item from the tis. oy Ahub ——Anintranet AWAN A proxy server AWLAN isa device used to connect computers together to form a LAN, » | a network with restricted access. e ‘can allow networked computers to connect tw the internet. a. Js. a witless local area network. (Comeitge GCSE tnfarmation ana Communication emoogy (0817/1195 ay/sune 2010) 2 Aftab and his family have three computers in their home. He wants to connect the computers into & network. Explain why he would ogee: router Abrowser Email AN ISP ih ‘camonige16CSE ivomation and Curmanication Teenatogy (0407/11 12 Mayne 2010 3. A.small office nas four stand-alone computers. The office manager wants to connect the computers together to form a LAN, a Name a network device which would have to be present in each computer before they could be networked, a b Give two reasons why a WLAN would be preferable to a cabled LAN. 2 © Give two reasons wy the manager should ‘not use Bluetooth technology to create the network 2 The company’s workers are concerned that thet payroll data may not be secure as a resit of he computers being networked Explain wy the workers ‘are conoeined 16 Give three actions thatthe office manager could take to ensure data security (3r amb IGCSE Infomation and CarmunicatonTecholagy (0417/13 14 02/Now 2010 4 Describe five differences between a WAN and aLAN, oy 5 a Explain what is meant bythe term Bluetooth ay 1b Name three devices that could be linked to 2 Computer using Biuetootn Bt 6 Companies with offices all ovr the word use video conferencing rather than face-to-face meetings. Tick three advantages of video-conferencing. '8 Compare and contrast the use of @ desktop computer ‘and a smartphone to access the interme. ‘9 Most schoo! computer networks nave @ router ‘and switches. a. Boplain what is meant by 9 switch 'b Describe the purpose ofa router. (Cambridge (60SE formation and Comrusicaton Reknoogy (0417/11 913 May/ tie 2024) 10 Deserite the benefits and drawbacks to companies of using video-conferencing, (Camtridge IGE nfonnatin and Communication enroegy (0417/11 940 Ger/War 2012) 15) 2 2 151

You might also like