Performance depends on browser compatibility and device resources.
Security risks if settings are lax (e.g., “Zoombombing”).
When many participants share video, bandwidth rises to medium‑high.
Limited functionality offline or with very poor connectivity.
5. Comparison of Conferencing Types
Feature
Video‑Conferencing
Audio‑Conferencing
Web‑Conferencing
Bandwidth Requirement
High (≥ 1 Mbps per participant)
Low (30–100 kbps)
Medium (≈ 300–600 kbps; rises with video sharing)
Visual Interaction
Full video + screen share
None (audio only)
Video optional; screen share & whiteboard always available
Ease of Access
Client install or web app
Phone or soft‑phone client
Browser‑based – click‑to‑join
Typical Use Cases
Remote meetings, e‑learning, tele‑medicine
Business calls, support hotlines
Webinars, virtual classrooms, large‑scale events
Security Concerns
High – video streams, recordings, screen data
Moderate – voice data, dial‑in numbers
High – web‑based vulnerabilities, link sharing
e‑Safety Features
Passwords, waiting rooms, lock‑meeting, consent for recording
Call authentication, PIN protection
Link protection, participant authentication, role‑based permissions
6. Effects of Using IT
Micro‑processor‑controlled devices – smartphones, tablets, smart watches, IoT sensors, embedded systems in appliances. They enable automation, data collection and remote control.
Health problems:
Repetitive Strain Injury (RSI) from prolonged typing or mouse use.
Eye strain and headaches from screen glare or poor lighting.
Documentation – user manuals, technical guides, maintenance procedures.
Evaluation – assess whether objectives are met, collect feedback, plan improvements.
9. Safety & Security
9.1 Physical Safety
Keep cables away from walkways to avoid tripping.
Use surge protectors; avoid over‑loading power sockets.
Do not touch electrical equipment with wet hands.
Ensure proper ventilation for high‑performance hardware.
Follow manufacturer instructions for battery charging and disposal.
9.2 Data‑Security Threats & Counter‑measures
Threat
Impact
Counter‑measure
Hacking / Malware
Unauthorised access, data loss
Firewalls, anti‑malware, regular patches.
Phishing / Smishing / Vishing
Credential theft
User education, email filters, 2FA.
Pharming
Redirected traffic to fake sites
Secure DNS, anti‑pharming tools.
Ransomware
Data encryption, loss of access
Back‑ups, least‑privilege accounts.
Card fraud
Financial loss
Encryption, tokenisation, PCI‑DSS compliance.
10. Audience & Copyright
Identify the intended audience (e.g., peers, teachers, customers) and adapt language, level of detail and visual style accordingly.
When using text, images, video or software in projects:
Check the licence – copyright, Creative Commons, public domain.
Give proper attribution (author, source, licence).
Do not copy large amounts of copyrighted material without permission.
Respect intellectual‑property policies of the school or organisation.
11. Communication Skills in ICT
11.1 Email & Internet Use
Use a clear subject line, professional greeting, concise body, and appropriate sign‑off.
Attach files in widely supported formats (PDF, DOCX, JPEG) and keep size reasonable.
Check URLs before clicking; verify the site’s security (HTTPS, padlock).
11.2 Common Protocols
HTTP / HTTPS – web page transfer; HTTPS adds encryption.
SMTP – sending email.
POP3 / IMAP – retrieving email.
FTP / SFTP – file transfer (SFTP adds encryption).
VoIP (SIP, RTP) – voice over IP.
11.3 Evaluating Information
Check the author’s credentials and the publishing organisation.
Look for bias, date of publication and citations.
Cross‑reference with at least two other reputable sources.
Consider the purpose – inform, persuade, sell – and assess relevance.
12. Key Take‑aways
Choose the appropriate conferencing type (video, audio, web) based on bandwidth, visual needs and ease of access.
Strong passwords, two‑factor authentication, firewalls and VPNs protect conference data and overall network traffic.
Anti‑malware, regular updates and user education guard against common security threats.
Understanding network hardware (router, NIC, hub, switch, Wi‑Fi, Bluetooth) and cloud services explains how data moves from source to destination.
Be aware of the physical and health effects of prolonged ICT use and apply ergonomic and break‑taking strategies.
Apply the SDLC stages when developing any ICT solution, and always consider the audience and copyright requirements.
Effective communication – clear email, knowledge of protocols and critical evaluation of information – underpins safe and successful ICT practice.
Suggested diagram: Typical video‑conferencing setup showing participants, cameras, microphones, routers/switches, firewall and the Internet backbone.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.