You are on page 1of 10

1.

Operating systems

1.4

Define and describe operating systems which contain a Command Line Interface
(CLI)
Requires the user to type in instructions to choose options from menus, open
software and so on.
The user has to learn a number of commands to carry out basic operations. I.e. I.e.
>CopyA:NOTES.TXTC.1
Define and describe operating systems which contain a Graphical User Interface
(GUI)
Allows user to interact with a computer/ any electrical devices using pictures and
icons.
Instead of typing in a number of commands it could be replaced by a single icon
which would automatically execute the same commands.
GUI is a type of user interface which uses lots of graphics such as Windows,
Icons, Menus, and Pointing devices (WIMP). They can be used along side with
certain hardware for example the mouse controls the pointing device which is used
to control and select icons, menus, windows, etc.
Describe the differences, including the benefits and drawbacks, between operating
systems which contain a CLI and those which contain a GUI
Interface

Advantages

Disadvantages

Command
Line
interface
(CLI)

Direct communication with the


computer
Not restricted to a number of
predetermined options
Possible to alter computer
configuration settings

Needs to learn a number of


commands to carry basic commands
Takes times & can be error-prone
Commands must be typed in using
correct format & spelling
Difficult to edit once commands are
entered

No need to learn commands


More user-friendly, icons are
used to represent applications
Simpler as a pointing device is
used to click on a icon to launch
the application

Uses considerably more computer


memory than CLI
Limitation to the icons provided on
the screen
Need an operating system, such as
windows, which uses up memory

Graphical
user
interface
(GUI)

Types of computer

Describe the characteristics of a personal/desktop computer and its uses, both as a


standalone and networked computer
A general-purpose computer that is made up of input, output and storage devices.
Personal computers can be used as either
i) Standalone computer (used by one person at a time)
-Often used by single users to perform task such as school work,
gaming, emailing and so on.
-It is self sufficient and can operate without connecting to other
computers
ii) Networked computer (Part of a group of connected computers)
-Used by multiple users who often need a username and password to access
the PC
-Networked computers are joined together on a network and are used to
share resources such as printers, programs and information. It is also used to
access intranets [private internet].
Describe the advantages and disadvantages
Advantages (compared to laptops)

Disadvantages (compared to laptops)

You get a better specification for your


They are not portable thus it is
money. (Better components for the same necessary to copy files etc when you go
price) I.e.A faster processor than laptops elsewhere
Larger casing allows a better dissipation More complicated since all the
of heat; and power consumption is not
component (Mouse, keyboard) needs to
critical as it is directly plugged in
be carried around with you.
Cheaper to buy due to components
being easier to make.

Takes place on the desks and needs to


be connected by wires or wireless
connections

As it remains in one place the internet


access is more stable and theres less
likelihood of damage

1 of 10

Describe the characteristics of a laptop computer and what it is used for, both as a
standalone and networked computer
It is a type of computer where the monitor, keyboard, processor and so on are all
together in one single unit.
Main features
- Lightweight (Portable)
- Low power consumption (Long battery life)
- Processor does not generate too much heat
They
are used for similar tasks and purposes such as multimedia, school work,

Internet access etc.


Laptops are easier to connect to wireless networks due to built-in wi-fi.
Like desktop PC's, laptops can be used as both standalone and networked
computers.
I) Standalone computer
They can be used anywhere due to being small and having a built-in
battery which powers the laptop when theres no access to plug socket.
II) Networked laptops
Same as a PC to share resources and information
Advantages (Compared to PCs)

Disadvantages (Compared to PCs)

Smaller and lighter; much easier to


transport [Portable]

Limited battery life; needs to be


recharge frequently

No trailing wires as all is a single unit

Easier to steal

Can take full advantage of the Wi-fi

Keyboard and mouse can be awkward


to use [Smaller keyboards may be hard
to use]

Link to any multimedia as they are


portable

Laptops are compact and can get hotter


than a desktop PC.

Describe the characteristics of a tablet computer and what it is used for, including its
ability to use wireless technology or 3G/4G technology
It is a new internet-enabled portable computer that works in a similar way to
smartphones.
Use of touchscreen instead of a mouse and keyboard to input commands
Internet access is usually through Wi-Fi or 3G/4G/5G (mobile phone)connectivity.
Some of the latest tablets has been designed as a hybrid between tablet and
smartphones, also known as phablet. They have slots for SIM cards which allows
to make phone calls or to access 3G and 4G technology.

3G- A mobile communications standard that allows cell phones, computers, and
other portable electronic devices to access the Internet wirelessly.
Tablets can be used for:Multimedia (Music, Movies, video games, etc)
Internet access (web browsing, emailing, Skype)
Using application software (Word processing, spreadsheet, etc)
Graphic designers to directly draw onto the tablets screen by using
ccca stylus pen
Run a wide range of custom apps such as E-Book reader
Typical
features

High definition/ anti-glare displays


Front and back cameras
Light and longer battery life than laptops
Flash memory and cloud storage facilities to back up and
cc synchronize data sources
Sensors such as:A. Proximity sensors which detects if the device is close to the ear;
it allows to block unintended touches
B. Accelerometer which detects movement and orientation of the
device. I.e. Moving the display portrait or landscape.
C. Speech-recognition system (Siri) to enable the user to ask the
device to look for something
Advantages (Compare to laptops)

Disadvantages (Compared to laptops)

Very fast to switch on, no windows Limited memory or storage


Fully portable; lightweight

Expensive to run internet if it is being used


frequently via 3G mobile phone networks

Simple to use; no need of any input


devices

Typing can be slow and error-prone


compared to standard keyboards

Can use several apps as standard,


such as built-in camera, MP3..etc

Transferring of files that has to be done


through app store, [lack of apps]

Battery life is a lot longer; does not


generate any heat

Laptops support more types of file format;


they also are better quipped to run different
types of software

When off user is still alerted when


emails or other event are received

Not as powerful as a laptop

2 of 10

Describe the computer characteristics of a smartphone and what it is used for in


computing terms
Allows normal phone calls to be made but also have an operating system (Such as
IOS, Android or windows) allowing to run a number of computer application
Smart phones usually have on-screen keyboards or have a very small physical
keyboard.
Communicate with the internet either by using Wi-Fi hot sports or by using 3G/
4G/5G mobile phone networks.
Smart phones are used for:- Internet access
- Multimedia
- Running apps
- Making phones calls and messages
Smart
phones often have the following features/ functions:
- Digital cameras (both video and images)
- Sound recorders
- Calendars and Organizers
- GPS satellite navigation
- Wireless connectivity (to the Internet and other networks)
- Bluetooth connectivity (to connect to devices close by)
- Telephones bankings
- Streaming of videos/ music
- Surf the net; instant access to social networks
- Voice over Internet protocol (VoIP) which allows video calling
Next generation of smartphones will use touchscreen with OLED (Organic LightEmitting Diode) technology. It is coated with crystalline layer that allows the
phone to be partially solar powered & allows them to use Li-Fi (Similar to Wi-Fi
except communication uses visible light rather than radio waves, and it is much
faster). It is also more secure as it stops piggybacking, unauthorized use of the
internet connection and can be used in flights.
Advantages of smartphones

Disadvantages of smartphones

Very small and lightweight

Easy to lose

Practical; phone calls and text messages

Small screen makes it difficult to read


and type

Can be used anywhere because they


use Wi-Fi and mobile phone networks

Data transfer rate using mobile phones


networks is slower than with Wi-Fi

Have hundred of apps

Battery is drained quickly due to web


browsing and photography

Reasonable battery life

Memory size is limited, not as large as


laptops

Describe how emerging technologies are having an impact on everyday life (e.g.
artificial intelligence, biometrics, vision enhancement, robotics, quantum
cryptography, computer-assisted translation, 3D and holographic imaging, virtual
reality)
Artificial intelligence (AI) biometrics ! Known problem with biometric
technology is that many fingerprint identification is falsely rejecting a persons
fingerprint. Artificial intelligence overcomes this problem using dynamic
profiling- The systems learns from the different alignment therefore it will be able
to match the fingerprints to those stored on the database.
Facial-recognition systems have the same problem; computers are unable to
recognize a face if the person has grown facial hair, aged or wears glasses. They are
confused by such soft biometric changes. New systems use AI which allows the
system to pick out these soft biometric changes and cross-reference these attributes
with corresponding images stored on the database.
Impact on everyday life
Better airport security

Travelers have their eyes scanned and data is later


matched up when the person is performing airport
checks

Increase building security It ensure that only authorized people can enter
Reduce car theft

Cars that use fingerprints to unlock doors and start


engine makes it harder to steal as it wont unlock for
non-recognized fingerprints

More secure mobiles


phones

Fingerprints to unlock the phones makes if more


secure to protect the valuable data

3 of 10

Artificial intelligence (AI)! It is a computer system that stimulates human


intelligence. AI is being developed in the following areas:I) Game Playing
Computers developed to play games against human players.
II) Expert Systems
Computers that have been programmed to make decisions
based on information they are given. I.e. Medical diagnose on
patients illness based on symptoms.
III) Languages
Computers that understand differer human languages as they are
spoken to them
IV) Robotics

Machines are programmed to imitate a human


Impact on everyday life
Increase leisure
time

Robotic vacuum cleaners can do the task of cleaning the


house; they detect walls and other object in order to
vacuum around them.

Safer transport

Cars that can self-park exist thus reducing in road


accidents.

Increase in
personal safety

Modern home alarm systems use AI software that can tell


the difference between intruders and owners, the software
will automatically alert the police when intruders are
detected

Improve medical
care

Robotic surgery assistants are being used to quickly and


accurately pass the correct surgical tools to doctors.

Accurate prediction AI software will soon be used to predict approaching


of weather
storms and automatically issue warnings.
Vision enhancement! Low-vision enhancement systems (LVES) allow images/
video technology to be projected inside a headset [connected to a computer] in
front of the eyes. It effectively brings the object closer for examination by the user
of the system.
Night vision enhancement (NVE)! Amplifiers infrared and visible light so that an
image can still be seen in darkness, I.e. the military uses it to carry out surveillance
at night. Dim light is captured and passed through an image intensifier tube, which

converts light into electrons. It then pass through another tube where they are
amplified to produce several times more the original number of electrons. A screen
at the end of the tube is coated in phosphor dots that glow when elections collide,
this results in a considerable clearer image that the original.
Robotics !Robots are used to perform a wide range of physical task. They are
mostly used in manufactured industry and are either automated (controlled by a
computer chip) or manually controlled by a human.
There are different types of robots:
- Carrier robots that is used by the military to carry heavy loads over
dangerous terrain
- Manufacturing robots that is used in industries to preform repetitive task
such as welding
- Domestic robots used in homes to perform cleaning tasks such as vacuum
- Exploration robots used to visit and send images from the depth of the sea
or mars.
Typical tasks of robots
Dangerous jobs
E.g. disposing of bombs, spray painting or
cleaning up nuclear waste.
Repetitive manufacturing jobs
E.g. production lines, packing and welding etc.
Exploring extreme environments E.g. inside volcanoes, planets or the depths of
the ocean.
Moving heavy objects
E.g. Installing large engines, moving pallets of
items etc.
Impact on everyday life
Increase in personal time

Robots that can carry out domestic chores frees


up more time that can be spent to enjoy activities.
More efficient manufacturing Productivity increases, robots can work 24/7
without any wages thus less cost and grater
profits
Safer working environments

Robots can safely carry out tasks that are too


dangerous for humans.

Loss of jobs

Due to higher and cheaper productivity, robots


are taking over the manufacturing jobs that used
to be carried out by humans.

4 of 10

Quantum cryptography ! It is a technology that allows messages and data to be


unintelligible to any unauthorized user (A hacker). This is often referred as
encryption. It is based on the use of photons (light) and their physical quantum
properties to produce a virtually unbreakable cryptography system. [It is based on
the laws of physics rather than mathematics]
Impact on everyday life
Completely
Quantum encryption methods ensures that votes cannot be
secure voting
tampered with or changed.
Completely
Eliminates the risk of messages being read or heard by
secure
unauthorised ears.
communication
Completely
Secures money transfers.
secure bank
transfers
Completely
Health records, bank details and other types of personal
secure personal information will be absolutely secure from hackers and other
information
people wishing to commit identity theft crimes.

Computer-assisted translation (CAT)! CAT is an existing online language


translator that helps in the translation process. It can reduce the amount of time
that the translation takes however it is not always 100% accurate. CAT uses two
tools:- Terminology databases; Linguistic databases that grow and learn from
translations being carried out
- Translation memories; These automatically insert known translations for
certain words, phrases or sentences.
Impact on everyday life
A more
Allows anyone to access this tool and the vast collection of
multilingual
language databases. It is easier for people to learn these new
society
languages.
Quicker and
Foreign visitors to countries can be communicating with much
more efficient
easier through the CAT tools.
translations

3-D and holographic imaging ! It is a technology that allows 3-D images


(Holograms) to be produced. The technology involves the use of:- A source of laser light
- Interference of light
- Light diffraction
- Light intensity recording
As a holographic image is rotated, it appears to move in the same way as the original
object, thus appearing to be in three dimensions. Holograms have the following
applications:- Engineering design (CAD)
- Architecture (Ability to rotate through 360 degrees)
- Medical imaging
- Cinema
- Gaming
- Advertising
- Optical computers
- Holographic television (3D effect without glasses)
Impact on everyday life
Improved security
Credit cards, ID cards, software and some bank notes
include holograms as a way of trying to prevent forged
duplicates being created.
Better movie
Provides the viewer with a much more immersive
experiences
experience.
Virtual reality ! It is an artificial environment created by software. The user
makes use of data goggles, sensor suits, data gloves or helmets of get a feeling of
reality. The technology is used for:- Training soldiers in combat (Fighting & battlefield simulation)
- Education (To explore the inside of a building for history lesson)
- Training surgeons (Provide experience to trainee surgeons).
- Games (Driving simulator, cooking simulatoretc)
- Fashion (To check the clothes on people)
- Business (Training courses and role-playing for staff)
- Engineering (To see how the design looks)

5 of 10

Impact on everyday life


Improved medical
Surgeons can be trained using virtual patients and allow
surgeons
them to practice over and over until they have perfected a
particular surgery.
Larger and stronger Allow architects to experience what the building would
buildings
look like when completed and check for potential errors
before the actual building is constructed.
More effective
People can experience a tame, controlled version of what
treatment of phobias they are afraid of. Slowly the person becomes used to the
situation and can relax.
Training in dangerous VR can be used for training in dangerous situations where
situations
it is impossible to practice the real thing. I.e. An office in
fire.
More realistic
For example: Astronomy students can learn about the solar
education
system by engaging with the objects in the virtual
environment. They could look around stars, move planets
and track the orbits of comets.

10.1

Communicate with other ICT users using email

Describe the constraints that affect the use of email, including: the laws within a
country, acceptable language, copyright, local guidelines set by an employer, the
need for security, netiquette and password protection
Constraint are the rules and guides that prevent to some extend the exchange of
unacceptable messages through emails.
The term opt-out refers to several methods by which individuals can avoid
receiving unsolicited product or service information.
Laws within a country ! Many countries has laws against the misuse of emails;
the rules that companies and individuals are required to abide to is:- Senders of emails are required to obtain opt-in permission before emails are sent
- Company or individual must have a clear way for recipients opt-out
- Companies must provide subscribers with a very clear way to unsubscribe from
their listing
- Companies and organisation must take their privacy policy very clear to
subscribers
- Many countries don't allow companies to harvest email addresses
- Emails must not be sent out if it false or a misleading subject line
- A valid postal address must accompany emails from companies

Acceptable language! Language used by people when writing emails must lie
within an acceptable code of practice. Unacceptable content used in emails, text
messages and online forums are:- Obscene images
- Language that is regarded as abusive, profane, inflammatory, coercive,
defamatory or blasphemous
- Racist, exploitative, violent messages
- Use of illegal materials in messages
In many countries there are stiff penalties for going outside boundaries.
Copyrights ! Its very important to realize that emails are subject to copyright
law. The ease of forwarding emails and attachments does not make it always legal.
Therefore, always check if the sender clearly indicates the confidentiality of the
email or its subject to copyright law. This is particularly true if the senders email
address is part of the companys name, I.e. A.N.U.User@Company_name.com.
Normally emails and attachments contains a copyright statement.
Local guidelines set by an employer ! Employers are expected to follow a certain
code of conduct when using their email facilities. For example:- Send large files
- Send confidential emails
- Convey disagreements/ arguments
- Send offensive materials
Failure to follow the rules could end in the dismiss of the employer
Security and password protection ! Always consider the security of your email.
Some methods in increasing security are:- Using strong password that contains letters, numbers & symbols
- Changing passwords on regular basis
- Using spam filters to remove suspicious emails.
- Running anti-virus and anti-spam software at all times on your computer to
protect your emails from malicious attacks.
Emails are said to be vulnerable to both passive and active attacks.
- Passive attacks include the release of email materials to other users without your
consent.
- Active attacks include the modification of your message or even denial of service
(clogs up your computer- Overloading of your system by sending tons of emails),
it also involves viruses and phishing attacks.

6 of 10

Netiquette !Is shorthand for internet etiquette, which refers to the need to respect
other users views and display common courtesy when posting views in an online
discussion groups or when sending emails. Netiquette consists some rules from
which few are listed below:- Dont be abusive
- Dont send spam
- Be clear with your messages
- Remember that posts are public and can be read by any one.
- Always check your spelling and grammar.
- Respect peoples privacy and dont publish information that might embarrass
somebody.
- Forgive peoples mistakes dont be compelled to respond to errors.
- Dont use capital letters to highlight comments this is seeing as shouting.
- Dont plagiarise [take a work and pass it as your own]
- Dont use too many emoticons, as they may annoy your readers.
Define the term spam
It is an unsolicited email that is sent without being asked for.
Spam can be dangerous as it may contain viruses or be part of a phishing scam.
Spammers gets your email from a range of sources. This is called harvesting
email addresses. The sources includes social networking site, chat rooms, mailing
lists and so on.
Main reasons why spam are distributed are:- To attempt gaining personal data through phishing
- To advertise low quality products
- To spread viruses
Explain why spam needs to be prevented
- Uses peoples time
- Annoys people
- Uses valuable bandwidth on the internet, slowing it down
- Can contain viruses of be part of a phishing scam
- Clog up users inboxes
Describe the methods which can be used to help prevent spam
Use spam filters; this is included in most emails accounts and can be used
automatically to separate junk email from legitimate emails.
Dont post your email address in public website like chat rooms or social
networking site as spammers can simply read and add you to their distribution list.

Explain why email groups are used

- Its easier to send multiple emails


- Companies can group people together for marketing purposes.
- Companies use email groups to set up meetings to ensure nobody is left out

Effective use of the internet

Define the terms internet and intranet


Internet is a worldwide collection of networks that allows user to:- Send and receive emails
- Chat online
- Transfer files
- Browse the world wide web
Intranet is defined as a computer network based on internet technology but
designed to meet the internal needs for sharing information within a single
organization or company.
Explain the differences between the internet, an intranet and the World Wide Web
(WWW)
Internet

Intranet

International network
Covers topics of global or general
interest
More difficult to block websites

Internal restricted access network


Gives information relevant to the user
company
Possible to block certain website
Needs user id and passwords to access
Can be accessed from anywhere with
and can be accessed from knowing
ISP provided
computers only.
Open on an international scale so it is
Protected from hackers, viruses and
hard to protect.
other attacks by strong firewalls
Public access
Tend to be private access
World wide web (WWW) is a way of accessing information over the internet which
can be accessed by a web browser. It consist of a massive collection of web pages
and is based on hypertext transfer protocol (http). [WWW is part of the internet]
Explain the concept of storage in the cloud
It is a method of data storage where data is stored on offsite servers.
The same data is stored on more than one server to in case of maintenance or
repair, allowing clients to access data at any time. This is known as data
redundancy. The physical storage is owned and managed by a hosting company.

7 of 10

There are three common systems of cloud storage.


- Public cloud: this is storage environment where the client and storage provider are
different companies.
- Private cloud: storage provided by a dedicated environment behind a company
firewall. Client and storage provider are integrated as a single entity.
- Hybrid cloud: this is a combination of public and private cloud storage where
some data resides in the private and other less-sensitive data can be accessed from
a public cloud storage provider.
Advantages

Disadvantages

Data can be accessed anytime,


anywhere.

Security aspects (data security and data


loss)

No need for carrying external storage.

Slow or unstable internet connection will


cause difficulties to access the data/files

It provides users with the possibility


of remote backup.

Cost can be high for large storage


capacity

Cloud storage will allow recovery of


their data if theres a failure of their
hard disk

Personnel working for cloud storage can


use their authentication to access
confidential data for the purpose of
modification

Cloud storage provides almost


unlimited storage capacity.

Potential failure of the cloud storage


company posses a risk of loss of all
backup data

Define and understand the terms: HyperText Transfer Protocol (HTTP), HyperText
Transfer Protocol secure variant (HTTPS), Uniform Resource Locator (URL),
hyperlink, Internet Service Provider (ISP), File Transfer Protocol (FTP)
HyperText Transfer Protocol (Http and HTTPS)! Set of rules that must be
obeyed when transferring data across the internet. When accessing a website the
http:// is displayed at the beginning of the address telling the web browser that http
rules are to be obeyed for communication.
- When some form of security (like SSL or TLS) certification and encryption is
used the protocol is changed to https where the S here refers to secure.
- Because of encryption, Https is slower than http, so it is usually only adopted
when sensitive or private data is transferred across the internet.

Web browsers & Uniform Resource Locator (URL)! Web browser use URL to
access websites and retrieve files through the web browsers the sites are
represented by set of four numbers. I.e. http://109.108.158.1. However it is not
user-friendly so instead alphanumeric set is used, I.e. http://
www.hoddereducation.co.uk/igcse_ICT
File Transfer Protocol (FTP)!Is a protocol used when transferring data from one
computer to another through the internet.
Internet Service Provider (ISP)! Is a company that provides users with the access
to the internet for a monthly fee.
Describe the structure of a web address
protocol://website address/path/filename
Where:
Protocol is usually http or https
website address:
- Domaine host (WWW)
- Domaine name (name of website)
- Domain type (.com, .org, .co, .net, .gov)
- Sometimes a country code is given (.uk, .us, .de, .cy)
Path, which is a web page
Filename is the item on the web page
Hyperlink! It can either be a word or phrase that is often blue and underlined
which jumps to a new document whenever you click on it. It allows user to jump
from one page to the other.
Explain what a web browser is used for
Web browser is a software that allows a user to display a web page on their
computer screen. They interpret/ translate the HTML (Hypertext markup
language) from website into videos, images or sound.
Explain what a search engine is used for
A search engine is a software program or script available through the Internet that
searches documents and files for keywords and returns the results of any files
containing those keywords.

8 of 10

Define the term blog and describe the use of a blog as a means of communication
Blogs (web logs): are personal journals where a writer will type in their personal
views on some topics. I.e. Review on a movie release
Features
- Updated on a regular basis by the author.
- Usually organized in reverse chronological order. [Most recent to oldest]
- Public anyone can read them.
- Entries normally come from a single author.
- Cannot be altered by users.
Microblogs: are similar to blogs but are used on social networks to allow users
make short and frequent posts (such as tweets)
B-Blogs (Business blogs): is used by business to promote themselves on the
internet.
Define the term wiki and describe the use of a wiki as a means of communication
Wikis are web applications or websites that allow users to create and edit web
pages using any web browser. A wiki will support hyperlinks and uses a simple
syntax to create pages. Wikis are sometimes described as web pages with edit
button.
Features
- Anyone can edit, delete or modify the contents.
- Many authors can be involved in a wiki
- It is possible to organize the pages as the user wishes.
- Shows track of all entries
- Can easily be edited using a web browser
- Allows large documents to be seen by many people.
Define the term social networking and describe the use of social networking
websites as a means of communication.
A social networking website is an online platform that allows users to create a
public profile and interact with other users on the website. It focus on building
online communities of users who share the same interests and activities. They
enable people to share photos, videos, music, hobbies and so on.
Features
- Each member is provided with free web space
- Each member can built their own profiles
- Content upload is possible
- Its possible to write on others walls
- Emailing is possible
- Members have control on who can access their data

Advantages and disadvantages of using the internet


Advantages

Disadvantages

Information is up-to-date since it is


quicker and easier to adjust web pages

Information is not regulated, anything


can be posted which result in biased
or totally incorrect information

Vast and almost limitless amounts of


information

Risk of assessing inappropriate


websites

Search engine is fast and easy

Easy to be distracted while surfing

Information is usually free of charge

Risk of information overload if the


user lacks experience in using search
engines

Pages on the internet can have multimedia Huge risk of plagiarism and research
elements that makes learning more
skills are lost search engines do
interesting and easier to understand
everything
Explain why the internet is so popular giving reasons such as the amount of
information available and the speed of accessing information
The internet is popular due to
- Being easy to use
- The facility of finding any information on a certain topic
- Buying books is more costing than having usually free information on the internet
Explain why an internet search to find relevant information is not always fast
When using search engines, there is always the danger of information overload.
Millions of Sites can have matching data and therefore, if the user cannot narrow
their search criteria, it can take a long time to find exactly what they are looking
for.
Explain why it is not always easy to find reliable information on the internet
Anybody can create a website and publish information that could be inaccurate
and biased on one way of thinking. Its also possible that the search engines
suggested an outdated site which no longer is relevant or correct.

9 of 10

Explain how to evaluate the reliability of information found on the internet


- Websites with excessive advertisements could be unreliable.
- Checking the websites final part of the URL because sites ending
with .ac, .gov , .org might be more reliable.
- Its always a good idea to see if some known bodies have endorsed the
information.
- Check if the website has links to other site and learn if they are reliable or not.
- If the site has credentials, then it is more likely for the content to be reliable
- Check last update date.

10 of 10

You might also like