IGCSE ICT Chapter 10 Communication
IGCSE ICT Chapter 10 Communication
Audiences
Objectives
10.1 Communication via emails • 10.3 internet service provider (ISP)
• Email uses and constraints • 10.4 search engines (including the evaluation of
information found)
• Security, Netiquette,
• 10.5 internet protocols
• Making copies, Attachments
• 10.6 internet risks
• spam
10.2 Effective use of the internet:
• Differences between the world Wide Web(WWW)
and the internet
• Intranets and Extranets
• Blogs, wikis, forums, social networking
• Piracy
• it is a worldwide collection of interconnected networks • web resources are accessed by web browsers
and devices • WWW uses the internet to access information from web
servers
• users can send and receive emails • it is a collection of multimedia web pages and other
information on websites
• allows online chatting (via text, audio and video) • uses http(s) protocols to send hypertext markup
language (HTML) documents
• makes use of transmission protocols (TCP) and internet • uniform resource locators (URLs) are used to specify the
protocols (IP) location of web pages
Exam question
A company uses an extranet
(a) Explain what is meant by an extranet [2]
Possible Answers
• A extension of a company’s intranet
• Allows communication over the internet to businesses in a secure way 0417/P12/Q4/June/2023
• Requires user ID and password to access
(a) Describe the differences between the internet and an extranet [2]
Possible Answers
• Internet allows information access to the general public while an extranet allows limited
communication to an organization
• An extranet is more secure than the intenet
• The internet has more information than an extranet
• The internet is not owned by anyone while an extranet is often owned by an organization
Internet Intranet
• INTERconnected NETwork • INTernal Restricted Access NETwork
• Global, covers everything • Local, company or organization-specific information
• Accessible to anyone with an ISP account • Requires password, user ID; access from agreed
points
• Website blocking possible but more difficult • Easier to block specific websites
• More vulnerable to hackers and malware • Protected by firewall, more secure against external
threats
• Distributed across global servers • Usually stored on local servers, more secure from ou
• Worldwide access • Limited to organization members and authorized
external users
Source: Giphy
Exam question
Explain the need for copyright legislation when data is published on the internet. [4]
0417/P11/Q13a/M/J/2022
Possible Answers:
• Copyright is the legal and exclusive rights to reproduce, or permit to be copied for some specific work
• You can not reproduce copyright web content withithout permission if you are not the owner of the web
content
• Copyright often starts with the creator of a work, but can be soled, traded or inherited by others
• Copyright legislation supports the original producer of software/content
• If you take photographs, publish online content, music and other copyrightable content etc, you have
legal ownership of the content.
• If you have to use other people content, permission must be requested if needed and the terms and
conditions carefully followed.
Exam question
Describe methods that software producers use to prevent software copyright being broken. [4]
0417/P11/Q13b/M/J/2022
Possible Answers
• License agreements
This are part of the software installation process and infor the use on how the software should be
legally used. User usually must agree to the license agreement before installing the software.
• Holograms
Often used on the packaging od the software to indicate that the copy is genuine
• Serial numbers/product keys
A unique number that is usually requested during installing to validate the authenticity of the software
Exam question
Emails are used by people to communicate with each other. Copyright and using acceptable language
in the email are two of the constraints that affect the use of email
0417/P11/Q13b/M/J/2022
(i) Describe four other constraints that may affect the use of email[4]
Possible answers:
• Netiquette
• Local guidelines set by an employer
• Laws within a country which may require email monitoring and people punished for what the write
• Using emails for marketing purposes
• Password protection of emails to avoid people seeing your email contents
Exam question
Emails are used by people to communicate with each other. Copyright and using acceptable language
in the email are two of the constraints that affect the use of email
0417/P11/Q13b/M/J/2022
(ii) Describe two rules of the use of acceptable language in emails [2]
Possible Answers:
• Use clear emails subjects
• Use a professional email address
• Use professional salutation and language
• Do not use swear or offensive words
• Do not use defamatory comments
• Proofread your email before sending
• Be careful with humour/sarcasm/slangs etc
Exam question
A village is built next to a river. During heavy rain the river floods and endangers the people living in
the village. If the river is in danger of flooding, an email is sent to all members of the village.
(a) Explain why an email group is used when contacting the villages [3]
Exam question
The use of email has replaced many forms of communication.
Describe the constraints that you need to consider when writing and sending and email. [6]
Possible Answers
• Use acceptable language in your emails
0417/P13/Q9/Nov/2022
• Abide by the copyright laws of emailing
• Follow netiquette
• Respect other peoples privacy
• Abide the laws of emailing within the country where you reside
• Use password protection and professional email accounts
• Be aware that email accounts can be hacked or illegally accessed
• Use appropriate security to scan and protect emails