Mobile phones were originally developed
to make and receive calls, but they
have now developed into smart phones.
These can be used for
purposes that were never
imagined when they were
first launched, such as
taking pictures or using the
Internet.
A smart phone is an
example of a multifunctional
device.
Choosing
A Mobile
Phone
Picture resolution – refers to the
quality and detail that can be
shown on the screen of the mobile.
The higher the resolution, the better
the quality of the image displayed
on-screen. This is measured in
pixels.
Camera resolution – the amount of
detail that the camera picks up in one
picture. The higher the resolution, the
more detail the camera picks up, but
this means that the picture _ les can
be very big. The resolution is measured
in mega-pixels (MP).
Storage capacity – the amount of
space the phone has in its internal
memory to store applications,
pictures, sounds, videos, etc. This is
measured in gigabytes (GB).
Memory card – a secondary storage
device that allows users to store, back
up, copy and remove their _ les. Users
can choose an appropriate card size
according to what they are using them
for. Different devices have different size
and shape memory cards. SD or SDHC
cards are commonly used, but there are
others.
Safety
When making a phone call, if you
do not want the other person to
see your number you can withhold
it.
For your own security you can
have a lock set up on the phone
to prevent unauthorised access.
If you register your
phone and it gets stolen,
you can report it to
your network provider.
They can block
the phone, making
it unusable.
Connectivity
To connect to the
Internet or share
information with other
phones, mobile
phones need to be
able to send and
receive signals.
As the phone is a ‘mobile’
device, it needs to be able
to connect wirelessly.
The most
common ways
of connecting
devices (e.g.
phones,
routers, and
computers) to
each other
are Bluetooth
and Wi-Fi.
Chapter 1.2 - Designing A Mobile Phone
Chapter 1.3 - Mobile Phones For Everyone
Chapter 1.4 - What Kind Of computer
Chapter 1.5 - Socialising On The Internet
Chapter 1.6 - The Internet As A Work Tool
Email
This is a
popular
method of
communication.
It involves sending messages over
a communications network, such as
the Internet, between computers
and other devices.
Email is a popular way of
communicating in school.
Worldwide email
traf c totalled 247
billion messages
per day in 2009
with this number
set to increase to
507 billion per day
in 2013.
Emails are now commonly
accessible using mobile phones,
laptops and other devices
using wireless dongles which
use 3G mobile network.
This allows users to connect to
the Internet without being close
to a wireless router as it uses
the mobile network.
Protocols
There are two types
of common protocol
used by email
services providers:
IMAP4 andPOP3.
Chapter 1.7 - Internet Safety
Dangers
Virus
Viruses are
programs that can
infect a computer
without the
permission or
knowledge of the
user.
They can damage the
system’s settings and
memory, generating
error messages and
causing the computer
to malfunction.
Viruses can get on
to your computer
through: visiting
certain websites,
opening emails,
downloading
attachments or
content from the
Internet, using
infected portable
storage devices
such as memory
sticks, CDs, DVDs,
connecting to an
infected hard disk.
Spyware
Spyware is a
computer program
which is installed
without permission,
sometimes through a
virus or sometimes
as part of the
installation of a
program.
It works by
collecting
information
and sending it
back to
another
source.
The information
collected could include
the websites you have
been visiting or what
you have been
downloading.
This information
is often used for
marketing
purposes, but can
also be used for
illegal purposes
such as fraud.
Cookies
A cookie is a
small file which
stores
information
related to your
Internet activity
and then reports
this back to the
website server.
Cookies are
used
legitimately by
website
creators to
enable
websites to be
customised for
individual users.
However,
cookies can
cause
problems such
as pop-ups
being generated
or details like
passwords
stored which
could be used
by hackers.
Spam
Spam is all unwanted email such as
unsolicited commercial email, unsolicited
bulk email and chain letters.
Phishing
Phishing involves
sending a link via an
email to a website
which looks like a
genuine website (e.g.
a bank website) but is
in fact bogus.
The recipient
may be tricked
into following the
link and entering
details such as
bank passwords
or personal
information on
the website.
Hackers
It is important to
keep the
information that
is stored on your
computer secure.
Hackers are people who
try to get access to your
computer without your
permission in order to
steal information which
they could use for
malicious or criminal
purposes.
Identity
Theft
This takes place when someone
collects personal information about
you and uses that information for
malicious or criminal purposes.
In the past, criminals used to rummage though bins
to get information, but now people can access
Internet social networking sites where people’s
profi les contain personal information, which could
prove valuable to the criminals.
Chapter 1.8 - Digital Divide
Digital
Divide
This is the gap between
people in society who cannot
or do not have effective
access to digital technology
and those who do.
Because of the
importance of technology in
modern life, people who do
not have access to it can
be disadvantaged in many
ways.
Households with
access to the
Internet are far
more likely to use
other types of digital
equipment, such as
digital cameras, MP3
players and mobile
phones.
Econimic
Economics is to do
with money, wealth,
jobs, production,
distribution and
consumption of
goods and services.
People with knowledge of technology and
the skills to use it can get better-paid jobs.
Online banking allows people to use the
facilities of a bank in the comfort of their
own homes.
The Internet gives people access to a
wider range of products and services.
The Internet allows people to research
products and get cheaper deals for goods
and services.
Less well off people may not be able
to afford the initial set up costs of ICT
systems resulting in them being unable
certain services.
People may feel
pressure to purchase
equipment and ICT
systems that they
cannot afford, resulting
in debt.
The Internet has led to a rise
in e-commerce and globalisation.
Countries with less ICT infrastructure may
be unable to make the most of globalisation,
and fall further behind at a greater rate.
Educational
This is about learning and the
knowledge gained from learning.
Students who use computers at home
or school can become independent
learners and excel in education.
Most schools are moving to
personalised learning using VLEs.
Without Internet access, young
people cannot bene t from this.
Having access to online educational
resources allows students to do better
work.
People can take part in online courses to
gain further skills and qualifications, no matter
where they are in the world.
A gap in ICT skills may exclude
people from particular jobs.
Social
This is about human society
and the people who live in it.
People can feel left out if
they do not have technological
goods and services.
Not having access to
communications such as
email, IM and mobile phones
can affect people’s social
interactions.
Cultural
This refers
to the
behaviour,
attitudes and
lifestyles of
a particular
social group.
Many cafés now offer facilities such
as the Internet to attract customers.
Many people carry around MP3/4
players, mobile phones and other digital
devices.
People can watch video on
demand and catch up on TV that
they have missed.
More children stay indoors and
play on games consoles instead
of playing outside.
Cultural and/or
religious influences
might dissuade
some groups of
people from using
ICT which could lead
to lack of access,
lack of education
and an inability for
countries to
participate in
globalisation.
Government
Initiative
The government
recognises that there
are people who do
not have up-to- date
technology, such as
digital TV, computers
and the Internet.
There are government schemes to help
people who cannot afford them.
Constant
Change
The fast pace of advances in
technology widens the digital divide.
Because of the cost of new
technology, many people are
unable to keep up to date.
This also causes issues of
compatibility; for example, an old
computer may not have the
specification needed to run new
software or hardware.
The digital divide is not just a UK
problem, it affects the whole world.