One document. Four learning aims. Every concept explained in full, every exam technique mastered, every keyword defined — built to take you from knowing nothing to knowing everything.
"Technology has obliterated geography — the question is no longer where you work, but whether you work well."
An ad hoc network is a temporary wireless connection created directly between devices, without needing a central router or fixed infrastructure. Three main types are examined:
Storing data on remote servers accessed via the internet, rather than local hard drives. Key features:
Online applications run on remote servers and are accessed through a web browser — no installation required. Examples: Google Docs, Microsoft 365, Salesforce.
Key advantages over traditional software:
| Model | Description | Example |
|---|---|---|
| CapEx Capital Expenditure | Large one-off upfront costs for physical hardware | Buying servers, cables, routers for an on-site data centre |
| OpEx Operational Expenditure | Ongoing day-to-day running costs — predictable monthly bills | Monthly cloud subscription (Google Workspace: £5.20/user/month) |
Technology enables "world teams" — groups of employees in different countries, time zones, and cultures working together on shared projects 24/7/365.
"The question is not whether you will be attacked, but whether you will be prepared when you are."
Malware (malicious software) is deliberately created to damage, disrupt, or gain unauthorised access to systems. Each type operates differently — you must know the distinction.
Fake emails, messages, or websites that impersonate trusted organisations (banks, HMRC, Amazon, your employer) to trick users into revealing passwords, card details, or personal information.
Attackers spoof sender addresses so the email appears legitimate. Urgency is weaponised: "Your account will be closed in 24 hours — click here."
Redirects users from a legitimate website to a fake one even when they type the correct address. Achieved by corrupting DNS records (the internet's "phone book") so the real site name points to a fraudulent IP address.
The fake site looks identical to the real one — victims have no visible warning they've been redirected.
Not all threats come from outside. Employees represent a significant security risk — either accidentally or deliberately.
Penetration testing — authorised simulation of a cyberattack to find weaknesses before malicious hackers do. The five stages:
"Every digital action has consequences — legal, ethical, environmental, and social. Understanding them separates good practice from recklessness."
The Data Protection Act 2018 incorporates the EU GDPR into UK law. It governs how personal data must be collected, stored, processed, and protected. Eight principles bind every organisation handling personal data:
Consolidates 116 pieces of legislation. Protects 9 protected characteristics: age, disability, gender, race, religion, sex, sexual orientation, pregnancy, gender reassignment.
In digital contexts, organisations must ensure websites, apps, and IT services are accessible to everyone. Professional guidelines: WCAG (Web Content Accessibility Guidelines) — four principles: Perceivable, Operable, Understandable, Robust (POUR).
"A diagram is a language that everyone, regardless of spoken language, can read — if you follow the standard symbols."
Flowcharts use standard symbols so that anyone — regardless of language — can understand a process. Using the wrong shape loses marks in the exam. Each symbol has one specific purpose.
Shows how data moves between entities, processes, and data stores within a specific digital system. Uses short data labels on arrows.
Shows the exchange of detailed information between entities, people, or departments. Labels are more descriptive than a DFD.
Tables organise information for clear comparison and reference. Exam questions often ask you to create or interpret tables — follow these rules for full marks:
The BLT method — your secret weapon for 4–9 mark questions