1.1.1 Mobile phones were originally developed
to make and receive calls, but they
have now developed into smart phones.
1.1.2 These can be used for
purposes that were never
imagined when they were
first launched, such as
taking pictures or using the
1.1.3 A smart phone is an
example of a multifunctional
1.2.1 Picture resolution – refers to the
quality and detail that can be
shown on the screen of the mobile.
The higher the resolution, the better
the quality of the image displayed
on-screen. This is measured in
1.2.2 Camera resolution – the amount of
detail that the camera picks up in one
picture. The higher the resolution, the
more detail the camera picks up, but
this means that the picture _ les can
be very big. The resolution is measured
in mega-pixels (MP).
1.2.3 Storage capacity – the amount of
space the phone has in its internal
memory to store applications,
pictures, sounds, videos, etc. This is
measured in gigabytes (GB).
1.2.4 Memory card – a secondary storage
device that allows users to store, back
up, copy and remove their _ les. Users
can choose an appropriate card size
according to what they are using them
for. Different devices have different size
and shape memory cards. SD or SDHC
cards are commonly used, but there are
1.3.1 When making a phone call, if you
do not want the other person to
see your number you can withhold
1.3.2 For your own security you can
have a lock set up on the phone
to prevent unauthorised access.
1.3.3 If you register your
phone and it gets stolen,
you can report it to
your network provider.
1.3.4 They can block
the phone, making
1.4.1 To connect to the
Internet or share
information with other
phones need to be
able to send and
1.4.2 As the phone is a ‘mobile’
device, it needs to be able
to connect wirelessly.
1.4.3 The most
2 Chapter 1.2 - Designing A Mobile Phone
3 Chapter 1.3 - Mobile Phones For Everyone
4 Chapter 1.4 - What Kind Of computer
5 Chapter 1.5 - Socialising On The Internet
6 Chapter 1.6 - The Internet As A Work Tool
6.1.1 This is a
6.1.2 It involves sending messages over
a communications network, such as
the Internet, between computers
and other devices.
6.1.3 Email is a popular way of
communicating in school.
6.1.4 Worldwide email
traf c totalled 247
per day in 2009
with this number
set to increase to
507 billion per day
6.1.5 Emails are now commonly
accessible using mobile phones,
laptops and other devices
using wireless dongles which
use 3G mobile network.
6.1.6 This allows users to connect to
the Internet without being close
to a wireless router as it uses
the mobile network.
6.2.1 There are two types
of common protocol
used by email
7 Chapter 1.7 - Internet Safety
184.108.40.206 Viruses are
programs that can
infect a computer
knowledge of the
220.127.116.11 They can damage the
system’s settings and
error messages and
causing the computer
18.104.22.168 Viruses can get on
to your computer
content from the
such as memory
sticks, CDs, DVDs,
connecting to an
infected hard disk.
22.214.171.124 Spyware is a
which is installed
sometimes through a
virus or sometimes
as part of the
installation of a
126.96.36.199 It works by
and sending it
188.8.131.52 The information
collected could include
the websites you have
been visiting or what
you have been
184.108.40.206 This information
is often used for
purposes, but can
also be used for
such as fraud.
220.127.116.11 A cookie is a
small file which
related to your
and then reports
this back to the
18.104.22.168 Cookies are
websites to be
or details like
could be used
22.214.171.124 Spam is all unwanted email such as
unsolicited commercial email, unsolicited
bulk email and chain letters.
126.96.36.199 Phishing involves
sending a link via an
email to a website
which looks like a
genuine website (e.g.
a bank website) but is
in fact bogus.
188.8.131.52 The recipient
may be tricked
into following the
link and entering
details such as
184.108.40.206 It is important to
is stored on your
220.127.116.11 Hackers are people who
try to get access to your
computer without your
permission in order to
steal information which
they could use for
malicious or criminal
18.104.22.168 This takes place when someone
collects personal information about
you and uses that information for
malicious or criminal purposes.
22.214.171.124 In the past, criminals used to rummage though bins
to get information, but now people can access
Internet social networking sites where people’s
profi les contain personal information, which could
prove valuable to the criminals.
8 Chapter 1.8 - Digital Divide
8.1.1 This is the gap between
people in society who cannot
or do not have effective
access to digital technology
and those who do.
8.1.2 Because of the
importance of technology in
modern life, people who do
not have access to it can
be disadvantaged in many
8.1.3 Households with
access to the
Internet are far
more likely to use
other types of digital
equipment, such as
digital cameras, MP3
players and mobile
8.2.1 Economics is to do
with money, wealth,
goods and services.
8.2.2 People with knowledge of technology and
the skills to use it can get better-paid jobs.
8.2.3 Online banking allows people to use the
facilities of a bank in the comfort of their
8.2.4 The Internet gives people access to a
wider range of products and services.
8.2.5 The Internet allows people to research
products and get cheaper deals for goods
8.2.6 Less well off people may not be able
to afford the initial set up costs of ICT
systems resulting in them being unable
8.2.7 People may feel
pressure to purchase
equipment and ICT
systems that they
cannot afford, resulting
8.2.8 The Internet has led to a rise
in e-commerce and globalisation.
8.2.9 Countries with less ICT infrastructure may
be unable to make the most of globalisation,
and fall further behind at a greater rate.
8.3.1 This is about learning and the
knowledge gained from learning.
8.3.2 Students who use computers at home
or school can become independent
learners and excel in education.
8.3.3 Most schools are moving to
personalised learning using VLEs.
Without Internet access, young
people cannot bene t from this.
8.3.4 Having access to online educational
resources allows students to do better
8.3.5 People can take part in online courses to
gain further skills and qualifications, no matter
where they are in the world.
8.3.6 A gap in ICT skills may exclude
people from particular jobs.
8.4.1 This is about human society
and the people who live in it.
8.4.2 People can feel left out if
they do not have technological
goods and services.
8.4.3 Not having access to
communications such as
email, IM and mobile phones
can affect people’s social
8.5.1 This refers
8.5.2 Many cafés now offer facilities such
as the Internet to attract customers.
8.5.3 Many people carry around MP3/4
players, mobile phones and other digital
8.5.4 People can watch video on
demand and catch up on TV that
they have missed.
8.5.5 More children stay indoors and
play on games consoles instead
of playing outside.
8.5.6 Cultural and/or
some groups of
people from using
ICT which could lead
to lack of access,
lack of education
and an inability for
8.6.1 The government
recognises that there
are people who do
not have up-to- date
technology, such as
digital TV, computers
and the Internet.
8.6.2 There are government schemes to help
people who cannot afford them.
8.7.1 The fast pace of advances in
technology widens the digital divide.
8.7.2 Because of the cost of new
technology, many people are
unable to keep up to date.
8.7.3 This also causes issues of
compatibility; for example, an old
computer may not have the
specification needed to run new
software or hardware.
8.7.4 The digital divide is not just a UK
problem, it affects the whole world.