This set of notes fulfils Cambridge IGCSE/AS‑Level ICT Section 6.1 – Mobile communication. It covers the range of mobile‑communication methods, the technical concepts behind each service, their advantages and limitations, e‑safety issues, and the wider social, ethical and environmental impact. A practical activity at the end develops AO2 skills.
| Feature | SMS | MMS | USSD | Phone Call | VoIP | Video Call | Messaging Apps | Internet Access |
|---|---|---|---|---|---|---|---|---|
| Typical cost | Low – per message | Medium – per message/size | Free or minimal | Medium – per minute | Low – data only | Low – data only | Low – data only | Variable – data plan or Wi‑Fi |
| Required network | Cellular signalling (2G‑5G) | Cellular signalling + data (3G+) | Cellular signalling (2G‑5G) | Cellular voice channel (2G‑5G) | Internet (Wi‑Fi or 3G‑5G) | Internet (high‑bandwidth) | Internet (Wi‑Fi or 3G‑5G) | Internet (any speed) |
| Device compatibility | All phones | All phones with camera | All phones | All phones | Smartphone, tablet, PC (app) | Smartphone, tablet, PC (camera) | Smartphone, tablet, PC (app/web) | Smartphone, tablet, PC |
| Data usage (approx.) | 0 MB | 0.1‑1 MB | 0 MB | 0 MB | ≈ 0.5 MB / min | ≈ 2‑5 MB / min | 0.1 MB / 10 texts; higher for media | Varies – web page ≈ 0.1 MB, streaming > 5 MB / min |
| Battery impact | Very low | Low‑moderate | Very low | Low | Moderate (audio processing) | High (camera + video encoding) | Low‑moderate (depends on media) | Variable – high with streaming |
| Reliability in low‑signal areas | High (uses signalling) | Moderate (needs 3G+) | High | Low‑moderate | Low (depends on data signal) | Low (needs good bandwidth) | Low‑moderate | Low‑moderate (Wi‑Fi often better indoors) |
| Typical uses | Alerts, verification codes | Photo/video sharing, event invites | Balance checks, service menus | Voice conversation, emergencies | Long‑distance/audio calls, business | Remote meetings, tutoring, family chats | Group chats, file sharing, voice notes | Browsing, email, streaming, e‑learning |
| Security risks | SMS spoofing, smishing | Malware in attachments, spoofing | Social engineering via fake codes | Caller ID spoofing, interception | Unencrypted traffic (if app lacks encryption) | Same as VoIP + unauthorized camera access | Data leakage, over‑broad permissions | Phishing sites, unsecured Wi‑Fi, malware |
Objective: Apply knowledge of VoIP and video‑call technology, record data usage, assess quality and reflect on security.
Assessment criteria (AO2): Demonstrates understanding of technical concepts (bandwidth, latency, data usage), evaluates the practical outcomes, and reflects on e‑safety considerations.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.