| Hardware | Software |
|---|---|
| Physical components that can be touched – CPU, RAM, storage media, motherboard, input‑output devices. | Intangible instructions that tell the hardware what to do – operating systems, application programmes, utility software. |
| Input Device | Typical Use | Output Device | Typical Use |
|---|---|---|---|
| Keyboard | Text entry, commands | Monitor | Display graphics, text |
| Mouse / Touchpad | Point‑and‑click navigation | Printer | Hard copy of documents, images |
| Scanner | Digitise paper documents | Speakers / Headphones | Audio output |
| Microphone | Voice input, recordings | Projector | Large‑format visual display |
| Media | Capacity (typical) | Speed | Durability | Typical Use |
|---|---|---|---|---|
| Magnetic HDD | 500 GB – 10 TB | 80‑200 MB/s | Sensitive to shock, magnetic fields | Desktop / laptop primary storage |
| SSD (Flash) | 128 GB – 4 TB | 300‑3500 MB/s | No moving parts, very robust | High‑performance laptops, servers |
| Optical (DVD‑R) | 4.7 GB (single‑layer) | ~10 MB/s | Resistant to magnetic fields, can degrade over years | Software distribution, backups |
| USB Flash Drive | 8 GB – 256 GB | 50‑500 MB/s | Portable, easy to lose | Data transfer, temporary storage |
| Device / Concept | Purpose in a Network | Key Advantages | Key Disadvantages |
|---|---|---|---|
| Network Interface Card (NIC) | Provides a physical connection (wired or wireless) between a computer and the network. | Enables data transmission; built‑in to most devices. | Limited to the speed of the port (e.g., 1 Gbps). |
| Hub | Repeats incoming signals to all ports (OSI Layer 1). | Very cheap; easy to set up. | Creates collisions; no traffic management. |
| Switch | Forwards frames only to the intended port (OSI Layer 2). | Reduces collisions; supports full‑duplex. | More expensive than hubs. |
| Router | Connects different networks and routes IP packets (OSI Layer 3). | Enables internet access; can provide NAT, firewall, DHCP. | Configuration can be complex. |
| Bridge | Links two LAN segments and filters traffic based on MAC addresses. | Improves performance by reducing collisions. | Superseded by switches in most modern networks. |
| Wi‑Fi (WLAN) | Wireless LAN using radio waves (IEEE 802.11). | Mobility; easy to add devices. | Signal interference; lower security if not configured. |
| Bluetooth | Short‑range wireless technology for peripherals and small‑data transfers. | Low power; built into many devices. | Limited range and bandwidth. |
| LAN, WLAN, WAN | LAN – local area network (single site). WLAN – wireless LAN. WAN – wide area network (covers cities, countries, or the globe). | LAN/WLAN: high speed, low latency. WAN: connects remote sites. | WAN: higher latency, higher cost. |
| Intranet / Extranet / Internet | Intranet – private network for an organisation. Extranet – controlled access to part of an intranet for external users. Internet – global public network. | Intranet: secure internal communication. Extranet: collaboration with partners. Internet: vast resources. | Intranet/Extranet: need robust security. Internet: exposure to threats. |
| Cloud Computing | Delivery of IT services (storage, processing, applications) over the internet. | Scalable; reduces need for on‑site hardware. | Depends on internet connectivity; data stored off‑site raises privacy concerns. |
192.168.1.10).255.255.255.0).Network 192.168.10.0/24 (mask 255.255.255.0) provides 254 usable host addresses ( 192.168.10.1 – 192.168.10.254 ). Splitting into two sub‑nets using /25 gives two networks: 192.168.10.0/25 (hosts .1‑.126) and 192.168.10.128/25 (hosts .129‑.254).
| Method | Description | Advantages | Disadvantages | Typical Use |
|---|---|---|---|---|
| Zero‑Login (Password‑less) | Access granted after an initial trusted enrolment using device‑based certificates, TPMs or biometric enrolment. |
|
| Enterprise SSO, cloud services (e.g., Windows Hello, Apple Sign‑in with Apple ID) |
| Biometric Methods | Verification of physiological (fingerprint, iris, facial) or behavioural (voice, keystroke dynamics, gait) traits. |
|
| Smartphones, secure facilities, time‑and‑attendance systems |
| Magnetic Stripe Cards | Plastic cards with a magnetic stripe that stores data read by a swipe reader. |
|
| Public‑transport tickets, basic building access |
| Smart Cards | Cards with an embedded microprocessor that can store and process data securely; contact or contactless. |
|
| Corporate ID badges, e‑government services, payment cards |
| Physical Tokens (Hardware Tokens) | Small devices that generate a one‑time password (OTP) using a secret key and a time‑ or counter‑based algorithm (e.g., RSA SecurID). |
|
| Banking, VPN access, corporate remote login |
| Electronic Tokens (Software Tokens) | Apps or mobile programmes that generate OTPs (TOTP/HOTP) or send push‑notification approvals (e.g., Google Authenticator, Microsoft Authenticator). |
|
| Cloud services, email accounts, social‑media platforms |
The Time‑Based One‑Time Password algorithm (RFC 6238) is:
TOTP = Truncate( HMAC‑SHA1( K , T ) )
Devices such as smart‑home locks, wearable health monitors and connected vehicles improve convenience and safety but introduce new security and privacy considerations. Proper configuration, regular firmware updates and awareness of data‑sharing settings are essential.
IT can widen opportunities (e‑learning, tele‑medicine) but also creates a digital divide for those lacking access. The use of biometric data and location tracking raises privacy concerns; organisations must follow data‑protection legislation and adopt transparent policies.
| Application Area | Typical Use & Example |
|---|---|
| Communication | Email, instant messaging, video‑conferencing (e.g., Zoom, Teams). |
| Modelling & Simulation | CAD for engineering design; physics or climate simulations. |
| School Management Systems | Student records, timetabling, online grading (Moodle, PowerSchool). |
| Banking & Financial Services | ATMs, online banking – use PINs, smart‑cards, token authentication. |
| Computer‑Controlled Systems | Industrial PLCs, home automation (smart lights, locks), robotics. |
| Booking Systems | Online ticket/reservation platforms for travel, cinema, sports events. |
| Medicine & Healthcare | Electronic health records, tele‑consultations, wearable monitoring devices. |
| Expert Systems | Decision‑support tools such as medical diagnosis assistants or fault‑diagnosis in engineering. |
| Retail & E‑commerce | Online stores, point‑of‑sale terminals – rely on secure payment gateways. |
| Recognition Systems | Facial‑recognition entry, voice‑activated assistants, fingerprint scanners. |
| Satellite & GPS | Navigation, weather forecasting, remote sensing for agriculture. |
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.