B061 – ICT in today’s world You need to study a range of ICT systems, as used in the home, at school & in society. You need to be aware of current & emerging technologies & the impact that advances in technology may have on you and others. 2.1.1 ICT Systems Systems Main components of a computer – CPU, memory, backup storage, input & output devices & power supplies PCs, mainframe, super computers, embedded systems Hardware & software Hardware Input devices & usage: keyboards, pads, specialist keyboards, mouse, joystick, tracker ball, touch pad, microphones, remote controls, scanners, digital cameras, webcams, touch screens, bar code readers, magnetic strips, chip & pin, sensors, MIDI instruments. Output devices & usage: monitors/screens, printers, speakers, headphones, earphones, digital projectors, plotters, actuators Storage devices & usage: hard disks, optical storage devices, magnetic tape, drives, flash memory devices Communication devices & usage: modems, routers, hubs, network interface cards in fixed & mobile devices Advantages & disadvantages of a variety of input, output storage & communication devices Software Systems software: operating systems, utility software, drivers. User interfaces: human-machine interfaces – graphical, command line, direct neural interface Applications software: word processors, desktop publishing, spread sheets, database, multimedia, slideshow, web authoring, photo-editing, video-editing, graphics manipulation, communications (social networking, chat, IM, web browser, file transfer, email clients), presentation, gaming Programming: compilers, debuggers, interpreters, linkers, editors Appropriate use of software Advantages & disadvantages of different software applications Different types of files used to support software: image, audio, video, document & executable types. 2.1.2 Exchanging information Communications 2.1.3 Communication services: voice telephones, SMS, IM, fax, email, chat rooms, forums, bulletin boards, Voice-over-IP (VoIP), video conferencing Advantages & disadvantages of different methods of communication Sharing, exchaning & managing information: sharing files, file naming conventions & online safety version control, secure transfer of data & secure access, read/write permissions Safe & responsible use of communication services: showing respect towards others, complying with data protection regulations, staying safe (personal data, using appropriate language, misuse of images) Communications software: web browsers, email software, messaging & file transfer Use of internet: communication, commerce, leisure & information retrieval Controlling ICT systems remotely: remote controls, remote access to computer systems Monitoring tracking systems: monitoring or logging a workforce or member of the public, cookies, key logging, worker call monitoring/recording, electronic consumer surveillance, mobile phone triangulation, automatic number plate recognition, CCTV cameras Applications software: word processors, desktop publishing, spread sheets, database, multimedia, slideshow, web authoring, photo-editing, video-editing, graphics manipulation, communications (social networking, chat, IM, web browser, file transfer, email clients), presentation, gaming Presenting information Types & purposes of different ways of presenting information: word processors, Desk Top Publishing, slideshow, multimedia & web authoring software Use of ICT tools & features/facilities for presenting information with regard to efficiency and quality of work & ease of transfer 2.1.4 Manipulating data Data management: Different types of data types, alpha numeric text, numeric (integer, real e.g. currency, percentage, fraction), date/time, limited choice (drop down lists, radio buttons, tick lists) object, logical/Boolean (e.g. yes/no, true/false) types Main issues governing design of file structures: folders, subfolders, filenames, file types, paths, how encoding affects data entry & retrieval Main issues governing design of data capture methods – advantages & disadvantages, forms questionnaire, online forms, chip & PIN, OMR, barcode reader, voice recognition, biometrics & RFID tags Validation: range checks, type checks, format checks, presence checks, check digits, parity checks Verification: batch totals, hash totals, double keying, visual checks Data handling software Features of spread sheet software: cells, cell references, rows, columns (height & width), show row/column labels, enter & edit cell content, key fields, cell gridlines, cell ranges, replication, formatting, merging cells, formulae, functions, automatic recalculation, sorting rows/column, graph/chart creation & development (bar, pie, line scattargram, use of scales, title, axis title & key/legend, layout of worksheets & linked sheets. Features of modelling software: how a data model may be used to answer ‘what-if’ questions & the benefits of being able to answer such questions using a data model Use of data modelling, formulae, functions, variables, different scenarios, verification (accuracy & plausibility), graphs & charts for predicting trends Features of database software: field (column) & record (row), field names, key fields (unique), primary key, file Create a database, insert/delete field/record, enter & edit field contents, organise & select records, view database structure, control the content of reports by selection of fields & use of headings, control the format of reports (header & footer), creation & developing charts/graphs Typical tasks for which data handling software can be used: organising data, collecting data, amending existing data, deleting redundant data, select/search/filter records, sort on one or more fields (ascending & descending order), merging data, report production Use of relational databases & spread sheets: flatfile vs relational databases Emerging data handling applications: models for financial forecasting, queuing, weather forecasting, flight simulators, expert systems for decision making 2.1.5 2.1.6 Keeping data safe and secure Secure & safe practices in the use of ICT, protecting data from accidental destruction, protecting data from deliberate damage; what is meant by data encryption – when & why it is used Backups & archiving: taking backups of data/programs, keeping information/archives safe, use of backing storage media & protecting data from unauthorised access Appropriate User Security methods & devices: user IDs, usernames, password, encryption, restricted physical access (e.g. biometric scans, electronic passes), restricted access to data (e.g. hierarchy of passwords, access rights, encryption), monitoring, (e.g. transaction logs) Malicious software (malware) & damage it can cause: viruses, including key logging software How to avoid the loss/disclosure of personal data to unauthorised users Legal, social, ethical & environmental issues when using ICT Main aspects of legislation relating to use of ICT: the Computer Misuse, Data Protection, Copyright Design & Patents Act & other relevant legislation to ICT Potential health problems related to the prolonged use of ICT systems: stress, eye problems, wrist problems, Repetitive Strain Injury (RSI), back & neck problems, Carpal tunnel syndrome Need for good design of user interfaces & impact on health of users How ICY systems can affect the quality of life experienced by persons with disabilities: screen filters, voice recognition software, text to voice software, customised desktop environments, Braille keyboards, specialist input devices, communication & control device, software accessibility options Range of safety issues related to using computers & measures needed for prevention of accidents: taking breaks, appropriate lighting, eye tests, wrist rests, adjustable seating, monitor positioning, avoiding hazards, electrical safety measures Environmental impact of digital devices: use, deployment & eventual recycling & disposal Social & ethical implications of electronic transmission of personal information: monitoring/detecting loss or corruption of information, preventing the abuse of personal information, purpose & costing of national databases, security of public data, links between public & private databases, national identity cards, CCTV, government access to personal data, surveillance society 2.1.7 Using ICT systems How ICT systems are used Correct procedures to start, access, exit & shutdown ICT systems Selection & appropriate adjustment of system settings & user preferences Selection & use of features of user interfaces Management of folder structures & files to ensure the safe storage & retrieval of information Networking: the main types of network, the components & advantages & disadvantages of networked systems Troubleshooting 2.1.8 2.1.9 Common problems encountered when using ICT systems: software freeze, error dialogues, storage full, paper jams, hardware malfunction Troubleshooting activities: hardware & software troubleshooting Difference between hardware & software problems & how to solve them Monitoring, measurement & control technology Different types of sensor & suitable uses: sensors & actuators for visible, tactile, audible & other physical signals Advantages & disadvantages of computerised data logging Writing a sequence of instructions to control a screen image or external device: light buzzers, sound or turtle, using repeated instructions, procedures & variables Use of ICT to control & monitor areas of everyday living: applications that utilise data logging & control, analogue-digital conversion, control & feedback loops & associated hardware & software ICT & modern living How ICT systems have changed the way people go about their daily lives: communication, shopping, gaming, entertainment, education & training, banking & financial services, social networking, online/remote working, advantages/benefits & disadvantages/dangers of using ICT/the internet Impact of emerging technologies on organisations: AI, robotics, biometrics, vision enhancement, computer-assisted translation, quantum cryptography, 3D & holographic imaging, 3D printing, virtual reality