0% found this document useful (0 votes)
347 views

IGCSE ICT Chapter 10 Communication

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
347 views

IGCSE ICT Chapter 10 Communication

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Chapter 10: Communication

CAIE IGCSE ICT (0417) THEORY-REVISION


For Exams from 2023

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 1


IGCSE ICT Chapter 10. Communication

Audiences
Objectives
10.1 Communication via emails • 10.3 internet service provider (ISP)
• Email uses and constraints • 10.4 search engines (including the evaluation of
information found)
• Security, Netiquette,
• 10.5 internet protocols
• Making copies, Attachments
• 10.6 internet risks
• spam
10.2 Effective use of the internet:
• Differences between the world Wide Web(WWW)
and the internet
• Intranets and Extranets
• Blogs, wikis, forums, social networking
• Piracy

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 2


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


• Emails are a common communication method, but their use is subject to
important constraints.
• These constraints include security measures and guidelines for acceptable
content, which are essential for responsible email usage.

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 3


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


❑Constraints on Emailing
1.Legislation:
Countries often have laws to protect people against the misuse of emails
• Opt-in permission: Many countries require explicit consent from recipients before sending marketing
emails. This protects individuals from unwanted spam.
• Opt-out option: Companies must provide a clear way for recipients to stop receiving emails. This ensures
user control over their inbox.
• Unsubscribe mechanism: A clear unsubscribe process must be available, allowing users to easily
remove themselves from mailing lists.
• Honest subject lines: Emails should not use false or misleading subject lines, promoting transparency
and trust.
• Valid postal address: Companies must include a physical address in their emails, adding legitimacy and
accountability.
• Restrictions on email harvesting: Many countries prohibit the automated collection of email addresses,
protecting user privacy.
• Clear privacy policies: Companies must transparently communicate their data handling practices to
subscribers.

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 4


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


• Emails are a common communication method, but their use is subject to important constraints.
• These constraints include security measures and guidelines for acceptable content, which are
essential for responsible email usage.
❑ Constraints on Emailing
Legislation:
• Countries often have laws to protect people against the misuse of emails

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 5


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


Constraints on Emailing
2.Use of acceptable language
• Language used in Emails should follow an acceptable code of practice and anyone using emails or posting
messages should be aware of this constraints.
• Unacceptable content in emails, texts, and online forums includes:
• Obscene images
• Abusive, profane, inflammatory, coercive, defamatory, or blasphemous language
• Racist, exploitative, or violent messages
• Illegal materials or messages

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 6


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


3.Guidelines set by an employer.
• Companies must publish guidelines for email and electronic communications use
• Guidelines should comply with local laws of the country
• Companies need to outline how they'll enforce these rules
• Example policies and guidelines may include:
• all employees are only to use company emails for business purposes
• companies can dedicate devices for emailing within and outside the company
• It must be made clear what email contents are unacceptable
• Employees must be educated on the rightful use of emails and the restrictions
• Employees should be aware of the company right to read and monitor emails
• Incoming emails should only be read by the intended recipients
• Privacy considerations, consequences for violations

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 7


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


4. Copyright and security of emails
• Corporate emails typically include copyright statements such as;
“Any dissemination or copying of this email or attachment is strictly prohibited unless you are
the intended recipient or are responsible for delivering the message to the intended recipient.
If you have received this email in error, please let us know and then delete the original email
and any attachments”
• Statements may disclaim company views and mention potential disclosure under Freedom
of Information laws
• Companies are cautious about potential copyright infringement risks

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 8


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


5. Security and password protection
Email security is crucial. Important security measures include:
• Use of Strong passwords:
- Combine letters, numbers, and symbols
- Example: Sy12@#TT90kj=0
- Avoid weak passwords like pet names
• Make regular password changes
• Use of spam filters:
- Move suspicious emails to 'junk folder'
- Block certain emails entirely
• Continuous use of anti-virus and anti-spam software to scan your computer and emails

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 9


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


Security and password protection
• Emails are vulnerable to:
1. Passive attacks:
• Unauthorized release of email content
2. Active attacks:
• Message modification
• Denial of service (system overload)
• Viruses
• Phishing attacks

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 10


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


❑6. Netiquettes
Netiquette (Internet etiquette) refers to respectful online communication.
• Respect others' views and display courtesy in online discussions and emails
• Be mindful of your writing, as readers can't see facial expressions or body language
• Humorous intent may be misunderstood and cause offense
• Be aware of potential misinterpretations when posting or emailing
• Various rules govern netiquette, such as "The Core Rules of Netiquette" by Virginia Shea (1994)
• Figure 10.3 (not shown in the text) provides examples of netiquette guidelines

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 11


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


❑Security and password protection

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 12


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


❑Email groups
Purposes of email groups:
• Simplify sending multiple emails using a single group name
• Enable targeted marketing by companies
• Facilitate mass spam distribution
• Ensure comprehensive meeting invitations
Benefits:
• Efficiency in sending to multiple recipients
• Targeted communication for marketing
• Comprehensive inclusion of all relevant parties
Concerns:
• Potential for misuse by spammers
• Privacy issues with address collection and distribution
Uses in organizations:
• Streamlining communication, organizing meetings and video conferences, ensuring all
relevant parties are included in communications

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 13


IGCSE ICT Chapter 10. Communication

10.1 Communication with other ICT user via email


❑Email groups
Additional email options:
✓ Carbon copies (cc)
✓ Blind carbon copies (bcc)
✓ Forward
✓ Attachments
• 2. Carbon copies (Cc) vs. Blind carbon copies (Bcc):
• Cc: Recipients visible to all
• Bcc: Recipients invisible to others
Usage: Cc: For interested parties, not main recipients,
Bcc: For security when sending to groups
Security practices for group emails:
• Put your own email in 'To' field
• Create a named email group
• Place group name in 'Bcc' field

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 14


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑ The differences between the internet and the World Wide Web (WWW)
• 1. Internet:
• Worldwide collection of interconnected networks
• A concept relying on physical infrastructure
• Broader system that includes various services
• 2. World Wide Web (WWW):
• Part of the internet, accessed via web browsers
• Collection of web pages
• Based on hypertext transfer protocol (http) since 1989
• A way of accessing information using the internet
Key differences:
• The internet is the underlying network infrastructure
• The WWW is a service that operates on top of the internet
• The WWW is just one part of the internet's functionality

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 15


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑The differences between the internet and the World Wide Web (WWW)
• Internet • World Wide Web (WWW)

• it is a worldwide collection of interconnected networks • web resources are accessed by web browsers
and devices • WWW uses the internet to access information from web
servers

• users can send and receive emails • it is a collection of multimedia web pages and other
information on websites

• allows online chatting (via text, audio and video) • uses http(s) protocols to send hypertext markup
language (HTML) documents

• makes use of transmission protocols (TCP) and internet • uniform resource locators (URLs) are used to specify the
protocols (IP) location of web pages

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 16


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑ Intranets and extranets
• An intranet is a computer network based on internet technology
• Designed for internal information sharing within an organization
Characteristics: Limited access;
• Confined to company members
• Not available to the general public
• Protected by a firewall
Advantages over internet:
• Enhanced security (less risk of hacking or viruses)
• Easier to control external links
• Information tailored to internal audience
• Safer for sensitive communications
• Better bandwidth and fewer connection limits
Uses: Internal company communications, Sharing sensitive information,
Efficient data transfer within organization
https://www.talkfreely.com/blog/intranet-vs-internet

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 17


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑ Intranets and extranets
• An extranet is an extension of an intranet to enable communication outside the
organization or company.
• allows controlled external access to some organizational information
Key features:
- Maintains intranet advantages
- Enables access for trading partners
- Provides controlled information sharing
• Security measure:
- Commercially-sensitive information is password protected
• Benefit: Balances external collaboration with internal security

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 18


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Differences between the Internet and Intranet
1• Internet: INTERconnected NETwork
• Intranet: INTernal Restricted Access NETwork
2. Scope:
• Internet: Global, covers everything
• Intranet: Local, company or organization-specific information
3. Access control:
• Internet: Accessible to anyone with an ISP account
• Intranet: Requires password, user ID; access from agreed points only
4. Content filtering:
• Internet: Website blocking possible but more difficult
• Intranet: Easier to block specific websites

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 19


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Differences between the Internet and Intranet
5. Security:
• Internet: More vulnerable to hackers and malware
• Intranet: Protected by firewall, more secure against external threats
6. Information storage:
• Internet: Distributed across global servers
• Intranet: Usually stored on local servers, more secure from outside access
7. Accessibility:
• Internet: Worldwide access
• Intranet: Limited to organization members and authorized external users

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 20


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Differences between the Internet and Intranet
• Internet: INTERconnected NETwork
• Intranet: INTernal Restricted Access NETwork
• Internet: Global, covers everything
• Intranet: Local, company or organization-specific information
• Internet: Accessible to anyone with an ISP account
• Intranet: Requires password, user ID; access from agreed points only
• Internet: Website blocking possible but more difficult
• Intranet: Easier to block specific websites
• Internet: More vulnerable to hackers and malware
• Intranet: Protected by firewall, more secure against external threats
• Internet: Distributed across global servers
• Intranet: Usually stored on local servers, more secure from outside access
• Internet: Worldwide access
• Intranet: Limited to organization members and authorized external users

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 21


IGCSE ICT Chapter 10. Communication

Exam question
A company uses an extranet
(a) Explain what is meant by an extranet [2]
Possible Answers
• A extension of a company’s intranet
• Allows communication over the internet to businesses in a secure way 0417/P12/Q4/June/2023
• Requires user ID and password to access

(a) Describe the differences between the internet and an extranet [2]

Possible Answers
• Internet allows information access to the general public while an extranet allows limited
communication to an organization
• An extranet is more secure than the intenet
• The internet has more information than an extranet
• The internet is not owned by anyone while an extranet is often owned by an organization

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 22


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Differences between the Internet and Intranet

Internet Intranet
• INTERconnected NETwork • INTernal Restricted Access NETwork
• Global, covers everything • Local, company or organization-specific information
• Accessible to anyone with an ISP account • Requires password, user ID; access from agreed
points
• Website blocking possible but more difficult • Easier to block specific websites
• More vulnerable to hackers and malware • Protected by firewall, more secure against external
threats
• Distributed across global servers • Usually stored on local servers, more secure from ou
• Worldwide access • Limited to organization members and authorized
external users

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 23


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Blogs, wikis, social networking sites and forums
Blogs: Web logs (blogs)
Personal internet journals where a blogger share their observations or views on a topic
• Regularly updated by author
• Reverse chronological order
• Public, but authored by individuals
• Readers can't modify content
Variations:
• Microblogs: Short, frequent posts on social media
• B-blogs: Business blogs for promotion

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 24


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Blogs, wikis, social networking sites and forums
Wikis:
• Web applications allowing collaborative editing, supports hyperlinks, and uses
simple syntax
Key features of wikis
• Anyone can edit, delete, or modify content
• Uses simple syntax (wiki markup)
• Tracks document history
• Easily edited via web browser

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 25


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Blogs, wikis, social networking sites and forums
Social Networking Sites:
• Builds online communities of users with shared interests.
• Allows people to share media; photos, videos, music, hobbies, places etc.
Features of social networking sites:
• Free web space for members
• Public and private profiles
• Content sharing (text, photos, videos)
• Instant messaging and video chat
• Internal email system
• Control over personal data access

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 26


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Blogs, wikis, social networking sites and forums
Forums:
• Moderated forums: online discussion site where all posts are checked by an
administrator before publishing.
• Unmoderated: Less controlled, like the internet at large
• Most online groups have rules or protocols for members
Key differences:
• Blogs: Individual authorship, no public editing
• Wikis: Collaborative editing, multiple authors
• Social Networks: Profile-based, focused on connections
• Forums: Discussion-based, can be moderated or unmoderated

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 27


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Functionality of the internet
Internet service providers (ISP)
• Company providing internet access to users
• Typically involves a monthly fee
Account setup:
• User receives login details (user ID and password)
https://popupsmart.com/
Infrastructure:
• ISPs own necessary equipment and telecommunications lines
• Often use broadband connections
• Many utilize fibre optic cables
• Acts as intermediary between user and broader internet
• Provides users with a gateway to connect to the internet

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 28


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Web addresses, URLs, hyperlinks and web browsers
• A web browser is a software that allows a user to access and display web page
on their computer.
• We pages interpret HTML from websites and display contents as text, images,
videos, audio etc.
Common web browser features:
• Home page
• Bookmarks (favorite websites/pages)
• User history
• Back and forward navigation
• Has hyperlink that allows navigation between web pages
• Typically appear as blue underlined text or small pictures (e.g., pointed finger)

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 29


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Searching the Internet
Web addresses and URLs:
• A URL contains the protocol, site address and file name.
• Typing in the full URL of a web address into a web browser gives
access to the web page.
• Websites can be accessed using a search engine like google
• a search engine usually provides many results than needed.
• Having more information about what you are searching for makes
it easier to access the website.

Source: Giphy

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 30


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Searching the Internet
Web addresses and URLs:
• A URL contains the protocol, site address and file name.
• Typing in the full URL of a web address into a web browser gives access to the web page.
• Websites can be accessed using a search engine like google
• a search engine usually provides many results than needed.
• Having more information about what you are searching for makes it easier to access the website.
Once the site is found the information can be;
1.Save as a favorite:
• Bookmark the page for easy future access
Add as a hyperlink: Insert a link to the web page in another document
2.Save image of web page:
• Use 'Print Screen' (or equivalent) to capture the page
• Paste the captured image into a word-processor document
3.Copy and paste content:
ALWAYS REMEMBER TO PROPERLY CITE THE SOURCE OF YOUR INFORMATION

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 31


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Advantages and disadvantages of using the internet to Search information
Advantages:
1. Up-to-date information
2. Vast amount of information available
3. Fast and easy searching using search engines
4. Convenience of accessing from home
5. Generally free access to information
6. Multimedia elements enhance learning
Disadvantages:
1. Lack of regulation - potential for biased or incorrect information
2. Risk of accessing inappropriate websites
3. Potential for distraction (games, social networking)
4. Risk of information overload
5. Increased temptation for plagiarism
6. Potential loss of traditional research skills

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 32


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑ Criteria to evaluate information found on the internet
1. Author legitimacy:
4. Currency:
• Can the author's credentials be verified?
• Is the information dated?
• Is the source reliable and verifiable?
• When was it last reviewed and by whom?
2. Factual accuracy:
5. Comprehensiveness:
• Can information be verified from other sources?
• Does it cover all aspects of the topic?
• Is it grammatically correct and free of spelling
• Are arguments supported by information or expert
errors? references?
3. Objectivity: 6. Website legitimacy:
• Is there evidence of bias? • Does the website appear legitimate?
• Are there links or advertising supporting a • Do all links within the website work?
particular viewpoint?

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 33


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑Internet Protocols
• Protocols are a Sets of rules agreed upon by sender and recipient for data transfer
1. HTTP (Hypertext Transfer Protocol):
Rules for transferring website data across the internet
entering "http://" tells the web browser that http rules must be followed for communication
Many browsers now default to HTTP if protocol is omitted
2. Secure Sockets Layer (SSL):
• Protocol for secure data transmission over the internet
• Designed to work with communication protocols like HTTP and FTP
• Encrypts data for secure transmission
SSL with HTTP (HTTPS):
• Encrypts data between user's computer and web server
• Indicated by "https://" in the web address
• Often shown with a padlock icon in the browser's address bar

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 34


IGCSE ICT Chapter 10. Communication

10.2 Effective Use of the Internet


❑ Internet Protocols
3. HTTPS (Hypertext Transfer Protocol Secure):
• Used when security certification or encryption is in place
• Indicated by "https://" at the beginning of a web address
• Often accompanied by a padlock symbol in the browser
• The 'S' stands for "secure(d)"
4. File Transfer Protocol (FTP): https://www.solodev.com/blog
Network protocol for transferring files between computers over the internet
• Similar to HTTP, but specific to file transfers
• Can be accessed via web browsers
• Example address format: ftp://username@ftp.example.gov/
Usage:
• HTTP is common for general web browsing
• HTTPS is crucial for sensitive data transfer (e.g., online banking, e-
commerce, sending and receiving emails, cloud storage facilities, intranets
and extranets etc.) Source: Cloudflare

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 35


IGCSE ICT Chapter 10. Communication

Exam question
Explain the need for copyright legislation when data is published on the internet. [4]

0417/P11/Q13a/M/J/2022
Possible Answers:
• Copyright is the legal and exclusive rights to reproduce, or permit to be copied for some specific work
• You can not reproduce copyright web content withithout permission if you are not the owner of the web
content
• Copyright often starts with the creator of a work, but can be soled, traded or inherited by others
• Copyright legislation supports the original producer of software/content
• If you take photographs, publish online content, music and other copyrightable content etc, you have
legal ownership of the content.
• If you have to use other people content, permission must be requested if needed and the terms and
conditions carefully followed.

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 36


IGCSE ICT Chapter 10. Communication

Exam question
Describe methods that software producers use to prevent software copyright being broken. [4]

0417/P11/Q13b/M/J/2022

Possible Answers
• License agreements
This are part of the software installation process and infor the use on how the software should be
legally used. User usually must agree to the license agreement before installing the software.
• Holograms
Often used on the packaging od the software to indicate that the copy is genuine
• Serial numbers/product keys
A unique number that is usually requested during installing to validate the authenticity of the software

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 37


IGCSE ICT Chapter 10. Communication

Exam question
Emails are used by people to communicate with each other. Copyright and using acceptable language
in the email are two of the constraints that affect the use of email
0417/P11/Q13b/M/J/2022
(i) Describe four other constraints that may affect the use of email[4]

Possible answers:
• Netiquette
• Local guidelines set by an employer
• Laws within a country which may require email monitoring and people punished for what the write
• Using emails for marketing purposes
• Password protection of emails to avoid people seeing your email contents

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 38


IGCSE ICT Chapter 10. Communication

Exam question
Emails are used by people to communicate with each other. Copyright and using acceptable language
in the email are two of the constraints that affect the use of email
0417/P11/Q13b/M/J/2022
(ii) Describe two rules of the use of acceptable language in emails [2]

Possible Answers:
• Use clear emails subjects
• Use a professional email address
• Use professional salutation and language
• Do not use swear or offensive words
• Do not use defamatory comments
• Proofread your email before sending
• Be careful with humour/sarcasm/slangs etc

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 39


IGCSE ICT Chapter 10. Communication

Exam question
A village is built next to a river. During heavy rain the river floods and endangers the people living in
the village. If the river is in danger of flooding, an email is sent to all members of the village.

(a) Explain why an email group is used when contacting the villages [3]

Possible Answers: 0417/P12/Q11a/M/J/2022


• It saves time rather than sending individual emails
• Less likely that an email address will be omitted
• The sender types in a group name and everyone is automatically copied
• The sender does not need to remember every email address
• less likely that the emails will be sent to the wrong people

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 40


IGCSE ICT Chapter 10. Communication

Exam question
The use of email has replaced many forms of communication.

Describe the constraints that you need to consider when writing and sending and email. [6]

Possible Answers
• Use acceptable language in your emails
0417/P13/Q9/Nov/2022
• Abide by the copyright laws of emailing
• Follow netiquette
• Respect other peoples privacy
• Abide the laws of emailing within the country where you reside
• Use password protection and professional email accounts
• Be aware that email accounts can be hacked or illegally accessed
• Use appropriate security to scan and protect emails

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 41


References and further Reading
• Cambridge IGCSE Information and Communication Technology
(0417), by Watson, D and Brown, G
IGCSE ICT CHAP:10
COMMUNICATION • Cambridge IGCSE Information & Communication Technology
Digital Textbook, 2022, By Greenhow, A, Assiaw, P, Roberts, C,
Astbury, et al.
• https://www.cambridgeinternational.org/

IGCSE ICT REVISION: CHAP 10 COMMUNICATION #ICT WITH TATCHEN 42

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy