BTEC IT Unit 1 – Mock Exam Corrections (25 01 Jan25-Unit1-EP)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:02 PM on 5/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

112 Terms

1
New cards
PNG file format
PNG is a lossless image format, meaning it reduces file size without losing image quality.
2
New cards
PNG advantage
PNG supports transparency, making it useful for logos, icons and images that need no background.
3
New cards
PNG disadvantage
PNG files can be larger than JPEG files, especially for detailed photographs.
4
New cards
PNG correction
PNG does not lose quality when compressed because it uses lossless compression.
5
New cards
BMP file format
BMP is an uncompressed or lightly compressed image format that stores images in high detail.
6
New cards
BMP advantage
BMP can keep very high image quality because little or no data is removed.
7
New cards
BMP disadvantage
BMP files are usually very large, so they take up more storage and are slower to transfer.
8
New cards
JPEG file format
JPEG is a lossy image format often used for photographs because it creates smaller file sizes.
9
New cards
JPEG advantage
JPEG files are small and easy to share, upload and store.
10
New cards
JPEG disadvantage
JPEG loses some image quality each time it is compressed or saved.
11
New cards
Vector image
A vector image is made from shapes, lines and mathematical paths, so it can be resized without losing quality.
12
New cards
SVG file format
SVG is a vector format useful for logos because it can scale to different sizes without becoming pixelated.
13
New cards
Login authentication
Login authentication checks that a user is who they claim to be before allowing access to a system.
14
New cards
Username in authentication
The username identifies which account is trying to access the network.
15
New cards
Password in authentication
The password is checked against the stored password for that account before access is granted.
16
New cards
Authentication process
The user enters a username and password, then the system compares them with stored credentials.
17
New cards
Successful login
If the details match, the user is given access to the network and the correct files, apps and permissions.
18
New cards
Failed login
If the details do not match, access is denied and the user may be asked to try again.
19
New cards
Access levels
Access levels control what a user can view, edit, delete or run on a network.
20
New cards
Two-factor authentication
Two-factor authentication uses two forms of proof, such as a password and a code sent to a phone.
21
New cards
Privacy in the classroom
Privacy means staff and students should protect personal data and not access, share or expose information without permission.
22
New cards
Student privacy example
Students should not look at or share another student’s files, messages, grades or personal information.
23
New cards
Staff privacy example
Staff must keep student records, grades, behaviour logs and personal details secure and confidential.
24
New cards
Online behaviour
Online behaviour means acting responsibly when using email, chat, forums, shared documents and learning platforms.
25
New cards
Netiquette
Netiquette is the expected polite and respectful behaviour when communicating online.
26
New cards
Poor netiquette example
Sending rude messages, spamming, trolling or using offensive language is poor netiquette.
27
New cards
Acceptable use policy
An acceptable use policy explains what users are allowed and not allowed to do on a school or college IT system.
28
New cards
Acceptable use example
Students may be allowed to use the network for learning but not for hacking, bullying, gaming or accessing banned websites.
29
New cards
Moral factor
A moral factor is about what is right or wrong when using IT, even if it is not always covered by law.
30
New cards
Ethical factor
An ethical factor is about responsible, fair and respectful use of IT systems and data.
31
New cards
Why privacy matters in schools
Privacy matters because students and staff trust the college to keep personal and educational data safe.
32
New cards
Why netiquette matters
Netiquette matters because poor online behaviour can cause bullying, conflict and disruption to learning.
33
New cards
Why acceptable use matters
Acceptable use matters because it sets clear rules and consequences for safe and responsible IT use.
34
New cards
EPOS terminal
An EPOS terminal is used by sales staff to record sales and update stock levels automatically.
35
New cards
Payment card reader
A payment card reader takes card payment details and sends them securely for authorisation.
36
New cards
Store desktop PC
The store desktop PC receives stock updates from the EPOS system and sends stock requests to the warehouse.
37
New cards
Store printer
The store printer can print receipts, reports or local stock documents.
38
New cards
Warehouse desktop PC
The warehouse desktop PC receives stock requests and sends them to the warehouse printer.
39
New cards
Warehouse printer
The warehouse printer prints stock requests so warehouse staff know what items to send.
40
New cards
Database server
The database server stores central stock data for stores and the warehouse.
41
New cards
EPOS to desktop PC connection
The EPOS terminal connects to the store desktop PC so sales can update local stock records.
42
New cards
Card reader to EPOS connection
The payment card reader connects to the EPOS terminal to process customer payments.
43
New cards
Store to warehouse connection
The store desktop PC connects to the warehouse database server over a WAN or internet/VPN connection.
44
New cards
Warehouse PC to printer connection
The warehouse desktop PC connects to a printer using a wired network, USB or wireless connection.
45
New cards
EPOS diagram annotation example
When a sale is made, the EPOS terminal updates stock levels on the stockroom desktop PC.
46
New cards
Warehouse diagram annotation example
At the end of the day, the stockroom desktop PC sends a stock request to the warehouse database server.
47
New cards
Wired connection
A wired connection uses cables such as Ethernet and is usually stable, fast and secure.
48
New cards
Wireless connection
A wireless connection uses signals such as Wi-Fi and is useful where cabling is difficult.
49
New cards
WAN in the EPOS scenario
A WAN links the store and warehouse so stock requests can be sent between different locations.
50
New cards
Firewall
A firewall monitors and controls network traffic to block unauthorised access.
51
New cards
Firewall benefit
A firewall helps protect company systems from hackers, malware and suspicious network traffic.
52
New cards
User access controls
User access controls limit what each employee can access based on their role.
53
New cards
User access control benefit
Access controls reduce damage if an account is misused because users only access what they need.
54
New cards
Strong password policy
A strong password policy requires secure passwords that are hard to guess.
55
New cards
Strong password benefit
Strong passwords reduce the chance of unauthorised users accessing company systems.
56
New cards
Backups
Backups are copies of data that can be restored if files are lost, damaged or deleted.
57
New cards
Backup benefit
Backups protect the company from data loss caused by hardware failure, mistakes, malware or disasters.
58
New cards
Anti-malware software
Anti-malware software detects, quarantines and removes malicious software.
59
New cards
Physical security
Physical security protects hardware and servers using locks, ID cards, CCTV or restricted rooms.
60
New cards
Encryption
Encryption converts data into unreadable form so it cannot be understood without the correct key.
61
New cards
Encryption benefit
If data is intercepted or stolen, encryption makes it difficult for attackers to read it.
62
New cards
Digital certificate
A digital certificate proves the identity of a website and helps create a secure encrypted connection.
63
New cards
Digital certificate reason 1
Digital certificates show customers that they are connected to the genuine website, not a fake copy.
64
New cards
Digital certificate reason 2
Digital certificates support HTTPS, which encrypts data sent between the browser and website.
65
New cards
Digital certificate and trust
A browser can check a certificate authority to confirm that a website certificate is valid.
66
New cards
Invalid certificate risk
An invalid certificate may warn users that the website could be fake, expired or unsafe.
67
New cards
HTTPS
HTTPS is the secure version of HTTP used to send website data securely.
68
New cards
HTTP
HTTP transfers web pages but does not encrypt data, so it is not suitable for sensitive information.
69
New cards
SSL/TLS
SSL/TLS is the security technology used by HTTPS to encrypt data during transmission.
70
New cards
Security protocol
A security protocol is a set of rules used to protect data when it is transmitted across a network.
71
New cards
HTTPS benefit
HTTPS protects customer details, passwords and payment information while they are sent online.
72
New cards
TLS encryption
TLS encrypts transmitted data so intercepted data cannot easily be read by attackers.
73
New cards
TLS authentication
TLS uses digital certificates to confirm the identity of the website.
74
New cards
TLS integrity
TLS helps detect if data has been changed while being transmitted.
75
New cards
Website data transmission
When a customer orders online, HTTPS/TLS protects personal and payment data travelling between browser and server.
76
New cards
Positive cloud impact: access
Cloud storage lets staff access files from different locations, which supports remote and flexible working.
77
New cards
Positive cloud impact: collaboration
Cloud storage lets multiple staff work on shared files, improving teamwork and reducing duplicate versions.
78
New cards
Positive cloud impact: backup
Cloud providers often include backup and redundancy, reducing the risk of losing data.
79
New cards
Positive cloud impact: disaster recovery
If the company building is damaged, cloud data can still be accessed from another location.
80
New cards
Positive cloud impact: scalability
The company can increase or reduce cloud storage when needed instead of buying new hardware.
81
New cards
Positive cloud impact: lower hardware cost
The company may spend less on local servers, storage devices and maintenance.
82
New cards
Negative cloud impact: internet dependence
Staff need a reliable internet connection to access cloud files.
83
New cards
Negative cloud impact: downtime
If the cloud provider has an outage, staff may be unable to access important data.
84
New cards
Negative cloud impact: ongoing cost
Cloud storage may have monthly or yearly subscription costs that increase over time.
85
New cards
Negative cloud impact: less control
The company has less direct control because data is stored on another organisation’s servers.
86
New cards
Negative cloud impact: security risk
Cloud accounts can be targeted by hackers, especially if passwords or permissions are weak.
87
New cards
Negative cloud impact: data protection
The company must make sure the cloud provider stores and handles data legally and securely.
88
New cards
Cloud evaluation point
Cloud storage is useful for collaboration and remote access, but the company must manage costs, security and internet reliability.
89
New cards
Collaborative working
Collaborative working means staff work together on shared tasks, documents or projects using networked systems.
90
New cards
Central file storage
Central file storage lets designers save work in one shared place so others can access the latest version.
91
New cards
Central file storage benefit
It reduces duplicate files and makes it easier for teams to find and manage project work.
92
New cards
Shared folders
Shared folders allow team members to access common project files, images and resources.
93
New cards
Shared folder risk
If permissions are not set correctly, users may edit, delete or view files they should not access.
94
New cards
File permissions
File permissions control who can read, write, edit or delete shared files.
95
New cards
Version control
Version control tracks changes to files and can help recover earlier versions if mistakes are made.
96
New cards
Network printer
A network printer lets several designers print from different computers without needing separate printers.
97
New cards
Email on a company network
Email allows designers to send messages, files, updates and feedback to each other.
98
New cards
Instant messaging
Instant messaging allows quick real-time communication between designers.
99
New cards
Video conferencing
Video conferencing supports meetings between staff in different locations.
100
New cards
Remote access
Remote access lets designers connect to company files and systems when working away from the office.