Uploaded by ezza saeed

IGCSE ICT Notes

advertisement
IGCSE ICT 0417 Notes
Contents:
1. Types and Components of a Computer system
2
2. Input and Output Devices
11
3. Storage Devices and Media
20
4. Networks and the effects of using them
24
5. The Effects of using IT
34
6. ICT Applications
37
7. The Systems Life Cycle
51
8. Safety and security
58
9. Audience
63
10. Communication
65
11. File Management
70
12. Images
73
Practical Notes for Paper 1
75
1
LivingLegend - MsHana
1. Types and Components of a Computer system
1.1 Hardware and Software:
Hardware - Physical components of a computer system
Internal Hardware Devices:
Internal Hardware Device
Description
Processor/CPU
‘Brain’ of the computer.
Controls actions and carries
out calculations and
processing of data.
Motherboard
Main printed circuit board that
connects various components
in a computer system
Random Access Memory
(RAM)
A form of computer memory
that is volatile and stores
data temporarily. When the
power button is switched off,
all data is lost. It stores the
data that is part of the
operating system currently
in use and can be altered.
Read-Only Memory (ROM)
A form of computer memory
that is non-volatile and
stores data permanently.
When the power button is
switched off, data is still
stored. It stores the
‘boot-strap’ instructions to
start a computer and cannot
be altered
Picture
2
LivingLegend - MsHana
1. Types and Components of a Computer system
Video Cards
An expansion card that
allows the computer to send
graphical information to a
video display device
Sound Cards
An expansion component
used in computers to send
and receive audio
Internal Hard Disk Drives
The secondary storage
device located inside a
computer system
3
LivingLegend - MsHana
1. Types and Components of a Computer system
External Hardware Devices:
External Hardware Device
Description
Monitor
Display images generated by
the computer
Keyboard
Used to input text
commands into a computer
Mice
Used to control a point on
the screen.
Printer
Used to output copies of
information stored on a
computer.
External storage devices
Memory sticks connect to a
computer and are used to
store and transfer data.
Picture
4
LivingLegend - MsHana
1. Types and Components of a Computer system
Software - Programs that control the operation of the computer or the processing of
electronic data.
- Application Software - Programs that allows the user to carry out specific tasks
- System Software - Programs that control and manage the computer's hardware and
runs the application softwares
Application Software:
● Word processing
○ Prepare essays, reports...
● Spreadsheet
○ Create to organise and
manipulate numerical data
● Database management system
○ Insert and organise data
using field and records
● Control software
○ Compares sensor readings
and decide on an output
● Measurement software
○ Sensors take readings which
are processed by a computer
● Applets and apps
○ Runs of mobile phones
● Photo editing software
○ Edit digital images
● Video editing software
○ Edit and format videos
● Graphics manipulation software
○ Create and edit bitmap and
vector graphics.
System software:
● Compilers
○ Translates a program written
in a specific language so that
it can be understood by the
computer
● Linkers
○ Combines object files into a
single program
● Device drivers
○ Allows hardware devices to
run on the computer.
● Operating Systems
○ Manages computer functions
● Utilities
○ Maintain computer’s
resources and performance
by running specific tasks
5
LivingLegend - MsHana
1. Types and Components of a Computer system
1.2 The Main Components of a computer system:
Central Processing Unit:
● Hardware that contains the internal storage/control unit
● Carries out instructions of a computer program
● Performs basic arithmetic calculations/logical
operations/input and output operations
Internal Memory: RAM and ROM
Random Access Memory (RAM)
Read Only Memory (ROM)
Stores information temporarily
Stores information permanently
Volatile - when power button switched off, all
data is lost
Non-volatile - when power button switched
off, all data is still stored
Stores files of the operating system
currently in use
Stores ‘boot-strap’ information needed to
setup a computer
Read and write (altered)
Read only
Input devices: Any device which allows us to get information from the outside world into a
computer so that it can be stored and processed in a digital form
Output devices: Any device which can take the data stored inside a computer in a digital
form and turn it into another format which we can process
Peripheral devices: Non-essential hardware devices that can connect to a system
externally. The system can function without them.
Secondary/Backing Storage: Used to store and backup data that is not instantly needed
by the computer. It permanently stores data and programs for a long time.
6
LivingLegend - MsHana
1. Types and Components of a Computer system
1.3 Operating Systems:
Operating System: A software program that manages the general operation of a computer
system.
Command Line Interface (CLI):
● Text-based user interface used to view and
manage computer files
● Enables the user to interact with the computer by
typing a series of text commands
Graphical User Interface (GUI):
● Enables the user to interact with the computer by
using pictures, graphics and icons
● Main features are (WIMP): Windows, Icons,
Menus, Pointers
Command Line Interface (CLI)
Graphical User Interface (GUI)
Advantages
Disadvantages
Advantages
●
●
●
●
●
●
●
User directly
communicates
with computer
Wider range of
commands
Needs little
computer power
●
●
User must
remember
complex
commands
Need to type in
commands
accurately
Commands
difficult to be
edited once typed
●
Quicker
Easier
Less chance of
errors
User does not
need to
remember the
commands
Disadvantages
●
●
Smaller range of
commands
Require more
computer power
7
LivingLegend - MsHana
1. Types and Components of a Computer system
1.4 Types of Computers:
Type
Uses
Advantages
Desktop
Computer that is
(standalone) not connected to a
network and is
used by one
person each time.
Self-sufficient
Personal/
work use
●
●
Desktop
(networked)
Computers that are
joined together on
a network and are
used to share
information. Used
by multiple users.
Share
resources
and files
Laptop
Portable computers
(standalone) that can be used
everywhere by one
person
Personal/
work use
Laptop
(networked)
Portable computers
that are connected
to a network used
to share
information
Tablet
(includes
wireless &
3/4G)
Smartphone
Description
Disadvantages
Personal use
●
Damage control - if something goes
wrong, only the standalone is
●
affected
●
Does not affect other computer
users
Restricted to a
single computer
Harder to monitor
Loose cables
Convenient resource sharing - can
access work from any computer
Software easily updated
Increases storage capacity
Fewer printers/scanners needed
All computers access the internet
through one connection
●
Increased risk of
security issues
from hackers
Increased risk of
computer viruses
and malware
Long print queues
●
●
●
●
Smaller and lighter
Rechargeable battery
Personal use
Portable
●
●
Share
resources
and files
●
●
●
Fewer printers/scanners needed
Convenient resource sharing
Software easily updated
●
A portable
computer that is a
touch screen
primary input
device. Have SIM
cards to access
3G&4G technology
Multimedia,
internet
access,
and using
application
software
●
●
●
●
●
Smaller and lighter
Portable
Touchscreen
Built-in cameras
Longer battery life (than mobile
phones)
Wireless, 3G/4G, Bluetooth
connection
●
A mobile phone
with highly
advanced features
and are
multifunctional
devices.
Make
phone calls
and text
messages,
multimedia,
internet
access
●
●
Most portable
More likely to have mobile phone
with you
Easier to use mobile phone on the
move
Smaller in size so can fit in pocket
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Limited battery life
Smaller
keyboards
Prone to theft
Hotter
Increased risk of
security issues
from hackers
Increased risk of
computer viruses
and malware
Less storage
space
Slower
performance
Touchscreen hard
to use for detailed
tasks.
Small screen
Limited storage
Prone to theft
Short battery life
8
LivingLegend - MsHana
1. Types and Components of a Computer system
1.5 Impact of emerging technologies:
Artificial Intelligence:
Computer science focused on creating computers that stimulate human intelligence
Areas being developed:
● Game Playing
● Expert Systems
● Language
● Robotics
Impacts on daily life:
● Increased leisure time
● Increased personal safety
● Improved medical care
● Safer transport
Biometrics:
Where parts of a person’s body is used for identification methods as a means of security
Areas being developed:
● Fingerprints
● Face, Eye and Voice recognition
Impacts on daily life:
● Better airport/building security
● More secure mobile phones
● Reduced car theft
Robots:
Used to perform a wide range of specific tasks, usually in the manufacture industry
Areas being developed:
● Dangerous jobs
● Exploring extreme environments
● Repetitive manufacturing jobs
● Moving heavy objects
Impacts on daily life:
● Increased personal time
● More efficient manufacturing
● Loss of jobs
● Safer working environment
Quantum Cryptography:
Encryption that allows messages and data to be sent with complete privacy using photons
Impact on daily life:
● Secure voting
● Secure bank transfers
● Secure personal information
9
LivingLegend - MsHana
1. Types and Components of a Computer system
Vision Enhancement:
Uses video technology that is projected to the user using lens
Computer Assisted Translation (CAT):
Where a human translator uses computer software to help in the translation process
Areas being developed:
● Spell checkers
● Translation memory software
● Language search engine
Impacts on daily life:
● More accurate documents
● More multilingual society
● Quicker and more efficient translations
3D and Holographic Imaging:
Technique where images appear to be three-dimensional
Impacts on daily life:
● Improved security
● Better movie experiences
● Greater data storage
Virtual Reality:
Computers create an artificial environment that users can interact with as if it was real
Purposes:
● Allow architect to walk around buildings
● Training soldiers in combat
● Training surgeons
Impacts on daily life:
● Improved medical surgeons
● Larger and stronger buildings
● More effective treatment of phobias
● Training in dangerous situation
● More realistic situation
10
LivingLegend - MsHana
2. Input and Output Devices
2.1 Input devices and their uses:
Device
Uses
Advantages
Disadvantages
Keyboard
Input data into
applications and
typing commands
into a computer
system
●
●
●
Used to input
numbers into a
computer system,
however, some
can enter simple
text and symbols.
●
Control a pointer
on the screen to
click on icons,
selecting windows
or positioning the
pointer
●
Numeric Keypad
Mouse
Touchpad
●
●
●
●
●
Used as a pointing ●
device on laptops
●
Trackerball
Used by users
who have limited
movement in their
wrist
Fast data entry
Easy to use
●
●
Faster to enter
numbers
Small, so can
easily fit on
smaller devices
●
Faster to select
icons
Easy to use
Small and do not
take up much
space
●
●
●
●
Painful for people
with wrist and hand
problems
Large
Slow data entry
compared to
automatic data entry.
Keys can be too
small
Difficult to enter text
Painful for people
with wrist and hand
problems
Can pick up dirt
which will affect the
accuracy
Need flat surface
Easier than
●
QWERTY
●
keyboard
Built into laptops portable
●
Difficult to control
Painful for people
with wrist and hand
problems
More difficult to use
than mouse
Easier to use
compared to
mouse
More accurate
positioning of
pointer
More expensive
Not familiar to many
users
●
●
11
LivingLegend - MsHana
2. Input and Output Devices
Remote Control
Used to control
other devices
using infra-red
signals
●
Used in computer
games and
simulators to
control a pointer
on a screen
●
Driving Wheel
Used by gamers
in racing/driving
computer games
and in simulators
Touch Screen
Joystick
Scanner
Digital Cameras
Can be used from ●
a distance
Operate in unsafe
environments
●
Difficult for people
with limited hand
movement
Remote control
signals can be
blocked by walls
Easier to control
than a keyboard
Easy to learn
Used by disabled
people
●
●
Harder to use
compared to mouse
Painful for people
with hand/wrist
issues
Difficult to enter text
●
Better driving
experience
●
More expensive
Allow users to
input commands
into a computer by
touching
buttons/icons on a
screen
●
Fast and easy to
use
No training
needed
●
Limited number of
options
Expensive
Screen can become
dirty
Options can be
accidentally selected
Used to enter
information on
paper into a
computer
●
●
Used to take
photographs and
videos.
●
●
●
●
●
●
●
●
●
●
●
●
Easy to use
Digital data can
be backed up
Photos can be
edited
●
●
Higher resolution ●
images
No need to
develop films
●
Memory cards
can store
thousands of data
copies
Scanned images are
lower quality
Scanned images
take up a lot of disk
space
Camera user must
have good computer
skills
Not all digital
cameras produce
good quality images
12
LivingLegend - MsHana
2. Input and Output Devices
Microphones
Graphics Tablet
Video Camera
Webcam
Used to input
analogue sounds
into a computer.
Used in voice
recognition
softwares.
●
Recorded audio
can be
automatically
typed into word
processing
softwares
Cheap
●
Used by artists
and designers to
create and store
digital graphics in
a computer
●
Easy to draw
images with
stylus
Accurate method
of drawing
●
Very expensive
compared to mouse
Used to record
video footage
●
●
Can record in HD
Footage can be
edited on a
computer
●
HD movies takes up
storage
Costly
Directly connected
to a computer and
can capture digital
images and
videos.
●
Allows long
distance video
calls
Video conference
business
meetings and job
interviews can be
conducted
Parent can keep
an eye on
children
Security
purposes
●
●
●
●
●
●
●
●
●
●
Sound files take up a
lot of space
Speaking words into
word processors is
not accurate
Background noises
can interfere
Poor image/video
quality
Fixed position cannot move around
13
LivingLegend - MsHana
2. Input and Output Devices
Sensors: a device that automatically inputs data into a computer system where the data is
constantly changing and can be measured
An Analogue to Digital Converter (ADC) is used to convert analogue data into digital for the
computer to read.
Sensor
Used in:
Temperature
Greenhouses to measure temperature
Pressure
Burglar alarms
Light
Burglar alarms, automatic doors etc..
Sound
Burglar alarms, voice recognition
Humidity/Moisture
Automatic greenhouses, Environmental
monitoring
Movement
Detect movement that could trigger an alarm
pH
Chemical manufacturing
Advantages:
Disadvantages:
●
●
●
●
Readings taken are more accurate
Monitor information constantly
Respond to information immediately
No need for humans to operate
●
Faulty sensors can give incorrect
results
14
LivingLegend - MsHana
2. Input and Output Devices
2.2 Direct data entry and associated devices:
Device
Uses
Advantages
Disadvantages
Magnetic Stripe Reader
Used to read data found on
magnetic stripes found on
the back of cards
●
●
●
●
Uses:
● ATM - cards
● EFTPOS
● Door keys
●
Entering data is fast
No data entry errors
Strips are robust and
are no easily affected by
water
Data held cannot be
read by eye - security
●
●
●
●
Chip and Pin reader
Radio Frequency
Identification Readers
(RFID)
Used to make payments
electronically at EFTPOS
terminals.
●
Uses:
● Supermarkets
● Restaurants
● Cafes
●
Reads information stored
on tags using radio waves.
RFID tags can be attached
to animals/objects/people.
●
Uses:
● Track movement
● Identify Pets
● Airports - track
luggage
● Manage stocks
(supermarkets)
●
●
●
●
●
●
●
More secure than
magnetic stripe readers
Information harder to
clone
Can hold more data
than magnetic stripe
readers
Portable
●
Hold more data than
barcodes
Data can be read from
long distances
Tags can be read
without direct line of
sight
Faster to read
Writeable
Can be made very small
●
●
●
●
Magnetic stripe can
only hold a small
amount of data
Cards need to be in
contact with reader
Stripe can get
damaged
Magnetic stripes can
be easily duplicated
Easily lost
Possible to forget your
PIN
People can look over
your shoulders as you
enter the PIN
If thieves access
handheld scanner, can
steal information
More expensive
Tags can interfere with
each other
RFID Tags made of:
● Microchip - stores
and processes
information
● Antenna - receive
and transmit data
15
LivingLegend - MsHana
2. Input and Output Devices
Magnetic Ink Character
Recognition/Reader
(MICR)
Used to read characters
printed in special magnetic
ink and convert it into a
form in which the computer
can understand.
Uses:
● Cheques
● Passport numbers
Optical Mark
Recognition/Reader
(OMR)
Used to read marks that
are made in pen or pencil.
The position of the mark is
stored in the computer’s
memory.
●
●
Processed quickly
Greater security difficult to forge
Characters cannot be
changed once printed
Less errors
Information can still be
read if characters is
written over
●
●
More expensive
Limited number of
different characters
can be read
●
●
●
Fast
Accurate
Save money
●
If incorrectly filled,
cannot be read
properly
Can only read shaded
areas - no text
●
●
●
Fast
Cheap
Avoids typing errors
●
●
●
●
●
Uses:
● Read multiple
choice
examinations
● Lottery tickets
Optical Character
Recognition/Reader
(OCR)
Used to scan text from
hardcopies and transfers
them into an editable form
which can be edited in
word processors
●
Difficult to read messy
handwriting
Not 100% accurate
Uses:
● Processing of
passports
● Digitizing books
16
LivingLegend - MsHana
2. Input and Output Devices
2.3 Output devices and their uses:
Device
Uses
Advantages
Disadvantages
CRT Monitor (Cathode
Ray Tube)
Old, heavy and bulky
monitors that allow users to
instantly see outputs from the
computer.
●
Can be used with light
pens
Larger range of colours
than TFT monitors good resolution
Cheaper
●
●
●
●
●
TFT/LCD Monitor
●
Large and bulky
Create a lot of heat
Screen glare and
screen flicker
Need more power
than TFT
Thin film transistor monitor
allows the user to instantly
see outputs from the
computer.
●
●
●
●
●
Lightweight
Thin
Produce less glare
Use less power
Produce less heat than
CRT
●
●
IPS/LCD Monitor
Used by creative
professionals.
●
●
Wide viewing angles
Better colour
reproduction
●
More expensive
LED Monitor
Used as the display output for
flat screens. LED monitors
use an LED panel as their
light source.
●
●
Energy efficient
Produces better light
●
●
Expensive
Colour can shift
due to age and
temperature
Touch screen (as an
output device)
Users use their fingers or a
stylus to interact with the
computer.
●
No need for additional
buttons
Easy to use
●
Screen can
become dirty due
to fingerprints
Difficult to input
many commands
and information
●
●
●
Lower resolution
Lower picture
quality
Cannot be used
with light pens
17
LivingLegend - MsHana
2. Input and Output Devices
Multimedia Projector
Laser Printer
Project images on the
computer monitor onto a very
large screen. Used for
training presentations and
large advertising
●
Produce high quality hard
copy outputs and can print
large amounts at a fast rate.
●
●
Used when high quality
printouts and high volume is
needed (e.g. school, office)
Inkjet Printer
Produce high quality outputs
by spraying ink on paper.
Used when few single paged
printouts are needed (e.g.
photographs)
Dot Matrix Printer
Often called an ‘Impact
printer’ where pins are
pressed against an inked
ribbon which produces an
imprint on paper.
●
●
●
●
●
●
●
●
●
●
●
●
Larger audience can
view
Enhance viewer’s
experience
●
Fast printing rate
Toner cartridges last a
long time
Can handle high
volumes of printing
Quiet
Reliable
●
High quality output
Cheaper to buy
Smaller - takes up less
space
Do not produce ozone
Quiet
●
●
More resistant to a dirty
and dusty environment
Cheap to buy and
maintain
Can print carbon copies
●
●
●
Noisy
Slow to print
Poor print quality
Can print larger
printouts
High printout quality
●
●
Slow printout time
Expensive to buy
and maintain
●
●
●
●
●
●
Lower image
quality
Expensive
Environmental
unfriendly
Use more power
than inkjets
More expensive to
buy
Larger in size
Slow printing rates
Ink cartridges don’t
last long
Expensive to run
Printouts easily
smudge
Used to print shop receipts,
carbon copies etc..
Wide Format Printer
Generally used when large
format printing is required.
Used for printing banners,
billboards, posters etc...
●
●
18
LivingLegend - MsHana
2. Input and Output Devices
3D Printer
Speakers
Printer that allows us to print
three-dimensional solid
objects by printing in layers.
●
Used in the medical, car
industries and
computer-aided design (CAD)
applications.
●
Speakers are used to output
sounds. They can be
connected directly to a
computer or built into the
monitor.
●
●
●
Produces prototypes
quickly
Can find design flaws
early
Environmental friendly
●
●
Everyone in the room
can hear the sound
Help blind people use
computers
●
Cheap
Speed Variation
●
●
●
●
Limited in size
People can print
dangerous items
Copyright issues
Expensive
Sound can disturb
people
High quality
speakers are
expensive
Used to listen to music, watch
movies, play games etc...
Motors
Used in automatic washing
machines, DVD players.
●
●
●
Not suitable in
clean
environments
High maintenance
Buzzers
Used in microwave ovens and ●
alarm systems
Small - doesn’t take up
space
●
Irritating sound
Heaters
Used in central heating
systems and automatic
greenhouses
●
●
Heats up quickly
Some are portable
●
Can only heat up
one area
Lights/lamps
Used in security lights and
greenhouses
●
●
Easy to install
Can be used as a
signal
●
●
●
Fragile
High heat
output
Easily dimmed
Actuators: Part of the control process and the digital signals sent from the computers to
actuators affect and control the world.
19
LivingLegend - MsHana
3. Storage Devices and Media
3.1 Storage Devices and Media:
Writing data: Storing data (saving)
Reading data: Getting data (opening)
Backing data: process of making copies of files to a different medium
in case of a problem with the main secondary storage device.
Sequential Access (Serial Access)
Direct Access (Random Access)
Stores files one by one in a sequence
Stores files so they can be instantly accessed
Data must be searched through one by one until the
required information is found
No searching
Very slow
Faster
Examples: cassette tape, magnetic tape...
Examples: DVD, CD-ROM, Blu-ray…
Data storage capacity:
● Measured in bytes
● 1000B = 1kB (kilobyte)
● 1,000,000B = 1MB (megabyte)
● 1,000,000,000B = 1GB (gigabyte)
● 1,000,000,000,000B = 1TB (tetrabyte)
Storage devices:
Uses:
Advantages:
Disadvantages:
Magnetic Backing Storage Media
Fixed Hard Disk and
Drives
Main backing storage used to
store operating systems, software
applications and online databases
●
●
●
High storage capacities
Fast data transfer rate
Fast data access time
(direct access)
●
●
Portable and
Removable Hard
Disk Drive
Device that connects externally to
the computer using a USB port and
is used to store personal backup
data and transfer files between
devices.
●
●
●
●
Portable
High storage capacities
Fast data transfer rate
Fast data access time
(direct access)
●
●
●
Hard drives can
malfunction
due to incorrect
shutdown
procedures.
Not portable
because ‘fixed’
into a computer
More prone to
errors
Small size - can
be misplaced
More expensive
20
LivingLegend - MsHana
3. Storage Devices and Media
Magnetic Tape Drives Magnetic tape is a thin strip of
and Magnetic Tapes
magnetic coated plastic which is
wrapped onto a reel. Data is stored
in binary form and is accessed by
serial access.
●
●
●
Robust
High storage capacities
Fast data transfer rate
Used when large amounts of data
is needed to be backed up schools/businesses
●
●
●
Used to store server backups
Slow data
access rate
(serial access)
Another tape is
needed when
updating
Affected by
magnetic fields
- strong magnets
can corrupt data.
Optical Backing Storage Media (CD/DVD/Blu-ray): use light sources to read/write data onto a disc. Data is
read by shining the laser beam onto the surface of the disc
CD ROM/DVD ROM
Optical disks that are read-only
●
memory and data is stored as a
series of pits (1) and lands (0). Data ●
is accessed via direct access.
Holds significantly more
data than floppy disks
Less expensive
●
Slower data
access times
and data transfer
rates than hard
disks
Cheaper than RW disks
Once burned and
finalised, disc is read
only and data is
impossible to delete
●
Only recordable
once impossible to
update disc
If error occur,
must throw away
disc
Not all CD/DVD
players can read
CD R/DVD R
disks
CD-ROMS used to store music,
files, software
DVD-ROMS used to store films,
and applications which require the
prevention of deletion of the data
CD R/DVD R
‘R’ means recordable; it becomes
CD-ROM/DVD-ROM once finalised.
Data is accessed via direct
access. A laser beam produces
heated spots (1) and unheated
spots (0).
●
●
Used to backup data and music
(CD-R) and films (DVD-R).
CD RW/DVD RW
‘RW’ means rewritable - data can
be recorded many times. Data is
accessed via direct access. Spots
are used to represent data.
●
●
●
●
Can be written over many ●
times
Data can be updated
Data can be
accidentally
overwritten
Used to record TV programmes,
music and in applications which
require the updating of information.
21
LivingLegend - MsHana
3. Storage Devices and Media
DVD RAM
Data is accessed via direct access
and can be read and written at the
same time. Shiny and dull marks
are used to represent data.
●
●
●
Used in recording devices and
camcorders to store videos.
Blu-ray Discs
Data is read by blue lasers and
accessed using direct access. CD
and DVD are read by red lasers.
Used in home video consoles, and
storing high quality videos
●
●
●
●
Long life
Can be rewritten many
times
Data can be read and
written at the same time
●
High storage capacity
Fast data transfer rate
Fast data access speed
Automatically comes with
a secure encryption
system.
●
●
●
●
Relatively
expensive
Not very
compatible with
many devices
Relatively
expensive
Fewer movie
titles on Blu-ray
format
Only work in
Blu-ray drives
Solid State Backing Storage - any memory device with no moving parts and are based on electronic circuits.
Solid State Drives
(SSDs)
Used in desktops (PC) and
laptops and stores files
permanently.
Used to store music/video files,
operating systems, software
applications etc...
Flash Drives (pen
drive/memory
stick/USB stick)
Small portable external storage
devices used to transfer and
back-up data between computers.
●
●
●
●
●
●
●
●
●
Flash memory cards
Known as ‘Secure Digital cards’
(SD cards). They are small and
rectangular in shape and are a
form of Electronically Erasable
Programmable Read Only Memory
(EEPROM).
Used to store photos on digital
cameras and are used in mobile
phones.
●
●
More reliable - no
moving parts
Fast data access time
Use less power and
produce less heat
Run silently
●
Small and lightweight
Portable
Robust
Compatible with many
devices
Large storage
capacities
●
Very small - portable
and compact
Robust
●
●
●
●
●
●
Smaller storage
capacity
Expensive
Cannot
write-protect
data
Easy to lose
Incorrect
removal will
corrupt data
More expensive
per gigabyte
Lower storage
capacity than
hard disks
Smaller size easily stolen
22
LivingLegend - MsHana
4. Networks and the effects of using them
4.1 Networks:
Networks - two or more computers connected so that they can share resources
Advantages of computer networks
Disadvantages of computer networks
Resources/data can be shared
If one part of network fails, can cause whole
network to break down
Software can be easily updated
Greater risk of virus
All computers access internet through one
connection
Too few printers can develop printing
queues
Can access work from any computer
Greater risk of hackers
Router - Transfers data from one network to another using IP address to figure out the
best/fastest route possible
● Transfer data between networks (receives and sends data packets to switch with
correct IP address)
● Connects networks/computers to the internet
● Connects LANs/networks together
● Connects a LAN to a WAN
Each data packet contains:
● Header to identify data packets
● Number of data packets that make up the message
● Identity number of each packet
● The sender’s and receiver’s IP address
○ Internet Protocol address - unique identifier
set up by a network manager/ISP that consists
of 4 numbers separated by full stops. IP addresses can change but it should
match the network it is on.
○ Routers store IP addresses in a routing table, which stores the MAC address of
the device
23
LivingLegend - MsHana
4. Networks and the effects of using them
Common network devices:
Device
Network interface cards
Uses
●
●
Hubs
●
●
●
Bridges
●
●
Switches
●
●
●
Modems
●
●
●
●
●
Used to connect individual computers/devices
to a network
Contains the MAC address used to identify the
computer to the network
Use to connect devices to form a LAN.
Transfers data packets received at one of its
ports and broadcast it to every computer on
the LAN
Non-intelligent - lack of data management
makes it slow, inefficient and low security
Devices that connect one LAN to another LAN
using the same protocol (communication
rules) so that they function as one LAN
Direct data packets to specific networks
Type of hub used to connect devices to form a
LAN
Switch checks the data packet received and
works out the destination address and sends
the data to the specific computer(s) only.
Uses MAC address and look up table to
locate the destination of the device
Modems means ‘modulator demodulator’
Allows computers to connect to networks
(internet)
(modulates) Convert digital computer data
into analogue signals for transmission over an
existing telephone line
(demodulates) Convert analogue signals into
digital signals to allow the computer to process
data
Contains Digital to Analogue Converter (DAC)
and Analogue to Digital Converter (ADC)
24
LivingLegend - MsHana
4. Networks and the effects of using them
WiFi:
● Allows computers to connect to each other wirelessly,
● Use radio frequencies and radio waves as the carrier of
data transmission
● Routers commonly used to provide hotspots for computers
to connect to the internet
● Devices can connect only within Wireless Access Point
(WAP)
How computers connect to WiFi:
● Laptops transmits data by radio waves to a wireless transmitter (WAP) where it
receives information from a network through connection (broadband) and converts the
radio waves into data and transmits them to destination computer
Bluetooth:
● Allows computers to connect to each other wirelessly
● Use radio frequencies and radio waves as the carrier of data
transmission
● Known as Wireless Personal Area Network (WPAN)
How computers connect to bluetooth:
● When connecting, the device picks up one of the 79 channels at
random, known as spread-spectrum frequency hopping
Bluetooth
Similarities
WiFi
Wireless communications
Use radio frequencies and radio waves as the carrier of data transmission
Use security when sending out data
Differences
Slower data transfer rate
Faster data transfer rate
Smaller range of transmission
Greater range of transmission
Uses WEP (wireless equivalent
privacy) and WPA (Wi-Fi protected
access) as a type of data
transmission security system
Uses key matching encryption as a
type of data transmission security
system
Connects less devices
Connects more devices
Cheaper
More expensive
Bluetooth devices are battery
operated - need to be recharged
Wi-Fi do NOT necessary use batteries
More useful to transfer data between More suitable for full scale networks
two devices
25
LivingLegend - MsHana
4. Networks and the effects of using them
How to set up and configure a small network:
Buy Hardware:
● Switches, hubs - to link devices together
● Network cables - to connect devices together
● Router - to connect LAN to internet (WAN)
● Network devices (printers, scanners…)
Buy Software:
● Firewall - to protect network from hacking
● Servers - manage network security & store files
● Email account
● Web browser
Organisation:
● Setting up an account with an internet service provider (ISP)
○ ISP is a company that gives you access to the internet
● Configuring the hardware and software so they work correctly together
● Acquire network licence
● Setting up privileges - so each user can only access own area or common shared area
● Install network cards
Internet: Worldwide public network of networks
Uses: Browse world wide web (www)
Send and receive emails
Transfer/share files
Video conferencing
E-commerce/social media/blogging
Intranet: Private network that uses the same protocols as the internet, but usually confined to
a small organisation and is not available to the general public.
Uses: Viewing internal web pages
Sending internal emails between workers
Sharing of internal documents
Internet
Intranet
Term ‘internet’ comes from international
network
Term ‘intranet’ comes from internal restricted
access network
Used to provide information covering a
wider range of topics
Used to give local information relevant to
organisation
Harder to block certain websites
Easier to block certain websites
Can be access if have ISP account
Requires password and ID
Public access - can be accessed
anywhere
Private access - can only be accessed from
access points/certain computers
Harder for protection against viruses
Have firewall so gives some protection against
hackers
26
LivingLegend - MsHana
4. Networks and the effects of using them
Why intranet?
● Safer - less chance of virus/hacking
● Can prevent external links
● Company can ensure that the information is all relevant
● Can send messages within company easily
● Better bandwidth
Local Area Networks (LANs):
● A private Local Area Network that covers a small area/one building and belongs to an
organisation/business
● Example: School network
Advantages:
Disadvantages:
Resources shared easily
Viruses spread quickly
Ease of communication between users
Printing queues
Faster transmission of data
Initial cost of setting LAN up is high - need to
buy cables, equipment etc...
Network administrator can control and
monitor
Slow internet connections
Wide Area Networks (WANs):
● A Wide Area Network that covers a large geographical area/worldwide and consists
of connected LANs.
● Example: Internet
Advantages:
Disadvantages:
Can be connected across wide areas
Greater security issues
Share files over large areas
Easy to accidentally download viruses from
WAN
Slower data transfer rate
Difficult to monitor
27
LivingLegend - MsHana
4. Networks and the effects of using them
Wireless Local Area Network (WLANs):
● Wireless Local Area Network that uses wireless technology to transmit data. It uses
Wireless Access Points (WAPs) that are connected to a wired network at fixed
locations.
Advantages:
Disadvantages:
Physically safer - no loose cables
Security issue - anyone with wireless
enabled device can access the network
Cheaper - don't need to buy cables
Wireless signals are unreliable - can suffer
from interference with other radio signals
Computers and devices can access
resources from anywhere within the range of
the access points
Slower data transfer rate than LAN
Adding new computers and devices is easy
Accessing the internet using different devices:
Advantages
Laptop computers
●
●
●
Desktop computers ●
●
●
●
●
Tablets
●
●
More portable than desktops
but less portable than tablets
and smartphones
Keyboard/touchpad easier to
use than mobile phones
Safer - won't trip over loose
cables
Disadvantages
●
●
●
●
Screen size not as large as
desktops
Slower access speeds
than desktops - processors
not that powerful
Have to be in range of
network point
Limited Battery life - needs
recharging
More powerful processors
Full-sized keyboard and
mouse
Larger screen size
Wired system - more stable
internet connection
Better heat dispersion rate
●
Not portable
Portable
Larger screen than
smartphones
●
Larger and less portable
than smartphones
Use Wi-Fi - less reliable
internet connection
Smaller screen
On-screen keyboard harder
to use
●
●
●
28
LivingLegend - MsHana
4. Networks and the effects of using them
Smartphones
●
●
●
●
Most portable
More likely to have mobile
phone with you
Easier to use mobile phone on
the move
Access internet from greater
places
●
●
●
●
●
Keyboard on mobile phone
is difficult to type
Smaller display
May not be able to access
certain sites
Some sites do not have full
facilities for mobile phones
Use Wi-Fi - less reliable
internet connection
4.2 network issues and communication:
Security issues surrounding the use of computer networks:
● Hacking
● Phishing
● Pharming
● Viruses
● Data can be deleted, edited, corrupted or replicated.
Should the internet be policed?
Yes
●
●
●
●
●
No
Prevent illegal material being posted
Prevent porngraphy for minors
Ensure copyright laws are enforced
Prevent children/vulnerable people
from being exposed to undesirable
websites
Help stop incorrect information from
being posted onto websites
●
●
●
●
Unsuitable materials easily available
in many other ways
Expensive to ‘police’ all websites
Difficult to enforce rules and
regulations on a global scale
Go against freedom of information
Methods for avoiding password interception:
● Running anti-spyware software
● Change passwords regularly
● Passwords should not be easy to guess or break
○ Strong passwords (e.g. Sy12@%TY965k=*) contain:
■ At least one capital letter
■ At least one number
■ At least one special character
○ Weak passwords - easy to guess (e.g. qwerty) contains::
■ Few characters
■ All letters OR All numbers
■ Relates to users
29
LivingLegend - MsHana
4. Networks and the effects of using them
Authentication Techniques:
Technique
Description
Biometrics
●
●
●
●
Relies on certain unique characteristics of human beings
Examples: Retina scans, Face scans, Iris scans
Nearly impossible to forge
More expensive
Retina Scans
●
●
●
Use retina scanners to detect retina pattern
Very accurate
Wearing contact lens can stop retina scans from working
Iris Scans
●
●
Use digital camera to record image of iris
High quality images of ‘iris’ can fool the system
Magnetic Stripe
●
●
Magnetic stripe made of tiny magnetic particles on plastic film
Read by swiping through card reader
ID cards
●
Some use holographic image (hologram) to make forgery
more difficult
Passports
●
Contains RFID tags, photograph and a holographic image
Other Physical Tokens
●
Using physical objects for authentication
Virus - A program that copies itself automatically and can cause damage to data or cause
the computer to run slowly
Viruses Can:
● Delete/corrupt data
● Fill up disk space
● System files can be corrupted if on hard disk
How the computer is infected with a virus:
● Open spam email and downloaded attachments
● Running software without being checked by up to date anti-virus
● Sharing a portable medium
Methods to avoid Viruses:
● Antivirus Software:
○ Check software or files before they are run
○ Compares virus coding with database
○ Asks user’s permission to delete files with potential viruses
○ Quarantines infected files and clean them
○ Full system checks carried out once per week
● Only open email attachments from trusted sources
● Keep anti-virus software up to date
● Do not use unknown storage medias to transfer data
30
LivingLegend - MsHana
4. Networks and the effects of using them
Encryption: Process of scrambling and encoding data so that the data is not
understandable. It protects sensitive data from being understood if it falls into the wrong
hands. It requires an encryption key to encrypt and a decryption key to decrypt.
Uses of Encryption:
● Protect sensitive data
● Prevents hackers from understanding the data
● Secures data being transferred from computer to computer
● Online banking
Principles of a typical Data Protection Act:
1. Data must be fairly and lawfully processed
2. Data can only be processed for the stated purpose
3. Data must be adequate, relevant and not excessive
4. Data must be accurate
5. Data must not be kept longer than necessary
6. Data must be processed in accordance with the data subject’s rights
7. Data must be kept secure
8. Data must not be transferred to another country unless they also have adequate
protection.
Network communication:
Facsimile communication:
Physical Faxing:
● Does not require use of network
● Document is scanned and the modem converts data into sound
so sent across the telephone line.
● Document is printed at the receiving end
● Requires the number of the recipient to be dialled before the
document is copied and then sent electronically
Electronic Faxing:
● Requires network (e.g. internet)
Email communication:
● Useful for sending attachments (e.g. documents, videos, music etc…)
● Can be sent and received from any device connected to the internet
31
LivingLegend - MsHana
4. Networks and the effects of using them
Advantages
Traditional
Faxes
●
●
Disadvantages
Signatures on faxes are accepted
legally
Physical copy
●
●
●
●
Email
●
●
●
●
●
●
●
More secure than faxes (password
protected)
Reduced costs
Better quality document
Document received can be modified
Can be sent and received from any
devices that is connected to an
internet
Easier to send to multiple recipients
People are more likely to have access
to email accounts than fax machines.
●
●
More likely to be intercepted
Poor print quality
If telephone line is busy, can
have a delay in sending the fax
Slow process if several
documents need to be sent
Unwanted emails (spam)
Viruses can be downloaded
Video-conferencing:
● Method of visual and audio communication between people at separate locations
● Substitute for face to face conferences
● Carried out in real time
● Hardware used:
○ Webcams - input faces of participants
○ Large monitors - output faces of participants
○ Microphones - input voices of participants
○ Speakers - output voices of participants
● Software used:
○ Webcam and microphone software drivers
○ Echo cancellation software
Advantages
●
●
●
Possible to hold conferences at
short notice
Not travelling physically so
reduces costs (transport,
hotel)
People in own buildings - can
access important documents
Disadvantages
●
●
●
●
●
●
●
Time lag and lip sync problems
Jerking images due to poor internet
connection
Expensive to set up
Problems with different time zones
People need to be trained to use the system
Whole system relies on internet connection
May not be able to communicate effectively
32
LivingLegend - MsHana
4. Networks and the effects of using them
Audio-conferencing:
● Refers to meetings held between people using audio (sound) equipment (e.g phone,
computer)
● Can be done over telephone network (phone conference)
● Uses Voice Over Internet Protocol (VOIP) to allow communication using voice, instant
messaging and video.
● Organiser is given a unique PIN to be shared to participants where they dial the
conference phone number and enter the PIN to join.
Web-conferencing:
● Uses internet to permit conferencing to take place
● Carried out in real time
● Uses:
○ Business meetings
○ Presentations
○ Online education or training
● Equipment:
○ Computer
○ Stable internet connection
● Links to video conferencing and audio conferencing through use of webcams,
microphones and speakers.
33
LivingLegend - MsHana
5. The Effects of using IT
5.1 The effects of IT on employment:
Positive Effects of IT on employment
●
●
Increase in employment
○ Website designers
○ Computer programmers
○ Delivery drivers in retail stores
○ Network managers
Introduction of robots in manufacturing
industry creates a safer working
environment
Negative Effects of IT on employment
●
●
●
●
Advantages of using robots over humans
●
●
●
●
●
●
●
●
●
Higher productivity
Don’t go on strikes
Safer/cleaner environment
Can work in hazardous environments
Don’t get bored by repetitive tasks
More consistent results - more
accurate
Can lift heavy loads
Do not require wages so cheaper in
long run
Can work without breaks
Reduction of employment in offices as
workers’ jobs have been replaced by
computers (robots):
○ Payroll workers
○ Typing pools
○ Car production workers
Office work is being reduced due to word
processors, spreadsheets and
databases.
Robots replace jobs in manufacturing
industry
More high street jobs closing down
because of more online shops.
Disadvantages of using robots over humans
●
●
●
●
●
●
Unemployment
Expensive start up costs
Maintenance/repair costs are expensive
Need to be programmed
Reprogramming takes time and is
expensive
Increased redundancy payments
5.2 effects of IT on working patterns within organisations:
Use of technology led to increased numbers of workers changing working patterns:
● Part-time working
● Flexible hours
● Job sharing
● Compressed hours
34
LivingLegend - MsHana
5. The Effects of using IT
Working Pattern
Description
Part-time working
●
Work fewer hours per week than full-time staff
Flexible hours
●
●
Any working schedule outside the traditional working pattern.
Ability to choose the start and finish times but must complete a
day’s worth of work
Job sharing
●
Full-time job is divided between two part-time workers
Compressed hours
●
An employee works full hours for the whole week but works fewer
days.
5.3 Microprocessor-controlled devices in the home:
Positive effects of microprocessors
●
●
●
●
●
●
●
●
Increased leisure time
Do not need to be in house when food
is cooking/clothes are washing
Microprocessor-controlled devices do
most of housework
Do not need to do things manually
Greater social interaction/family time
More time to go out
Microprocessor-controlled burglar
alarms provides a sense of security
Smart fridges can lead to healthier
lifestyle
Negative effects of microprocessors
●
●
●
●
●
●
Lack of exercise
Unhealthy lifestyle due to reliance
on labour-saving devices (e.g.
ready-made meals)
Laziness
Manual household skills lost
Danger of devices that use internet as
can have security issues
If the internet crashes, the device
cannot operate.
5.4 potential health problems related to the prolonged use of IT equipment:
Health RIsk
Ways to eliminate/minimise risk
Repetitive Strain Injury (RSI):
● Damage to fingers/wrists caused by
continuous use of keyboard or
repetitively clicking mouse buttons
●
●
●
●
●
Ensure correct posture
Use wrist rest
Take regular breaks
Use ergonomic keyboards
Stretching exercises
Back problems:
● Caused by sitting in front a computer
screen for a long time/all day
●
●
●
●
Use fully adjustable chairs
Use foot rests
Use screens that can be tilted
Taking breaks
35
LivingLegend - MsHana
5. The Effects of using IT
Eye problems:
● Caused by continuous staring at a
computer screen for a long time or
having incorrect lighting in a room.
●
●
●
●
●
●
●
Ensure there is no screen flicker
Change to LCD screens instead of
CRT monitors.
Take regular breaks
Use anti-glare screens
Test eyes on regular basis
Use blue-screen technology
Make sure screen is at eye level
Headaches:
● Caused by incorrect lighting, screen
reflections, flickering screens etc...
●
●
●
Use anti-glare screen
Have regular breaks
Have eyes tested regularly
36
LivingLegend - MsHana
6. ICT Applications
6.1 communication applications
Communication applications:
● Newsletters
● Websites
● Multimedia presentations
● Music Scores
● Cartoon
● Flyers and posters
Uses of smartphones for communication:
● Text messaging
● Phone calls
● Accessing the internet
Internet Telephony: Type of communication technology that allows users to have a telephone
conversation via the internet
● Example: Voice Over Internet Protocol (VoIP)
○ Technology that enables people to use the Internet to make telephone calls
○ Sends voice data in packets using IP
○ Hardware needed: Microphone, speakers, headphones
Publicity and corporate image publications:
● Business cards
● Letterheads
● Flyers and brochures
6.2 Data handling applications:
Data handling application
Description/uses
Surveys
●
Information collected can be held in databases to
analyse and query it easily
Address Lists
●
Information (name, contact address, phone no.) are held
in address lists
Clubs and Society
records
●
Information (contact details, names, membership no.)
are held on databases
School reports
●
Held on databases so it can be accessed by parents
and teachers and printed reports can be made.
School Libraries
●
Information (available books for borrowing, members’
data) are held in databases.
37
LivingLegend - MsHana
6. ICT Applications
6.3 Measurement Applications:
Measurement: monitoring of physical variables WITHOUT the microprocessor taking action
Examples of Measurement Applications:
● Scientific Experiments
○ Measure temperature using a data-logging system
● Weather Stations
○ Use a variety of sensors to measure: rainfall, temperature, wind speed, wind
direction, air pressure and humidity
○ Used by weather forecasters to predict the weather
Analogue Data
●
●
●
●
Data is constantly varying and has
no discrete values
Data collected from sensors is
analogue
Digital Data
●
●
Discrete data which is made up from
the binary values 0 and 1
Computers can only understand
digital data
Data from sensors is analogue data so they are sent to an Analogue to Digital
Converter (ADC) to turn the data into digital format as microprocessors and
computers only understand digital data.
When controlling devices, data from the computer needs to be converted into analogue
form using a Digital to Analogue Converted (DAC).
Use of microprocessors and computers:
● Pollution monitoring
○ Sensor (e.g. light, temp, pH, O2, CO2) placed in 2 different locations so can
compare the level of pollution
○ Data from sensor is converted to a digital form using an ADC
○ Data is sent to the computer which receives it and automatically produced
graphs
○ Data from sensor compared to pre-set value
○ Computer is connected to a mobile phone network and transmits data to
monitoring stations.
● Intensive care units in hospitals
○ Sensors read key vital signs: pulse rate, heart rate, temperature, blood
pressure, rate of respiration, glucose concentration
○ Data from sensor is converted to a digital form using and ADC
○ Data is stored in the computer’s memory
○ Computer compares data from sensors with values stored in its memory
○ An alarm is activated when the data is outside the limits of acceptability
38
LivingLegend - MsHana
6. ICT Applications
Using computers in measurement
Advantages
●
●
●
●
●
●
●
●
More frequent readings
Wont forget to obtain readings
Faster response time
Employees can carry out other tasks using that time
Can give data 24/7
More accurate readings
Safer as process of measuring using humans could
be dangerous
Fewer staff needed = lower costs.
Disadvantages
●
●
●
●
Cannot respond to
unusual
circumstances
Expensive to set up
initially
Students may rely too
much on computers
IF malfunction,
computer cannot be
used
6.4 Microprocessors in Control Applications:
Microprocessor: an electronic circuit or chip that can process data, perform calculations
and act upon the results by issuing instructions.
● Found in CPUs of all computers and devices
Control: when the microprocessor takes action depending on sensor readings
Role of Microprocessor in Control Applications:
● Sensor readings are compared to pre-set value entered by the user
● If sensor reading is too high or too low, signals are sent to an actuator to change the
physical conditions
General Procedure:
● Microprocessor is programmed with pre-set values. It continually monitors the (name the
sensor in the exam) sensors, which sends data readings to an ADC, which sends a
digital signal to the computer. The reading will be compared to the pre-set value and if it
is too high or too low, a signal will be sent to the DAC and output devices called
actuators and suitable procedures (name them in the exam) will be carried out. This
process will continue to repeat until suitable conditions are obtained.
Computer control in Applications:
● Turtle graphics
● Automatic Washing Machines
● Automatic cookers
● Computer controlled central heating systems
● Burglar alarms
● Computer controlled glasshouses
39
LivingLegend - MsHana
6. ICT Applications
Sensors:
Sensor type
Possible Applications
Temperature
●
●
●
●
●
Central heating systems
Chemical processes
Glasshouses
Washing Machines
Automatic cookers
Moisture
●
Glasshouses
Oxygen/Carbon
Dioxide
●
●
Glasshouses
Environment monitoring
Light
●
●
●
Glasshouses
Automatic doors
Photography
Infra-red
●
●
Intruder alarms
Counting items
Pressure
●
Intruder alarms
Acoustic
●
●
Sound
Check for blockages in pipes
Motion
●
Detect movement
pH
●
●
●
Pollution monitoring
Glasshouses
Chemical processes
6.5 Modelling Applications
Uses:
●
●
●
●
Stimulate scenarios to work out the possible outcomes
Predict outcomes based on the inputs
Training (ex. Surgeons, pilots)
Design (ex. Architects produce 3D model of building)
Examples of modelling applications:
● Spreadsheets - personal finance
● Pilot simulation
● Weather forecast models
● Building simulation
● Traffic control
● Car driving simulations
● Large scale chemical experiments
40
LivingLegend - MsHana
6. ICT Applications
Advantages
●
●
●
●
●
Disadvantages
Cheaper as the real thing doesn't
need to be built
Safer to run a computer model as real
life situations may be hazardous
Saves time - smaller time scale
Can introduce a greater variety of
situations (e.g. extreme weather)
Save materials
●
●
●
●
Accuracy - cannot perfectly mimic
real life situation
High Initial cost
Programming error
Workers need to be trained to use the
system
6.6 Applications in Manufacturing Industries:
Robots in Manufacture and production line control:
● Used in manufacturing industries to:
○ Lift heavy objects
○ Assemble parts together
○ Paint/spray items
○ Manufacturing of microchips
● Robots are programmed to carry out the task
● Robots are equipped with sensors to detect
changes in the environment
● Good at repetitive tasks
Computer controlled systems (Robots):
Advantages
●
●
●
●
●
●
●
●
●
Higher productivity
Don’t go on strikes
Safer/cleaner environment
Can work in hazardous environments
Don’t get bored by repetitive tasks
More consistent results - more
accurate
Can lift heavy loads
Do not require wages so cheaper in
long run
Can work without breaks
Disadvantages
●
●
●
●
●
●
Unemployment
Expensive start up costs
Maintenance/repair costs are
expensive
Need to be programmed
Reprogramming takes time and is
expensive
Increased redundancy payments
6.7 School Management Systems:
School Management Tasks:
● Manage learner registration and attendance
● Record learner performance
● Organising Examinations
● Creating timetables
● Managing teaching cover/substitution
41
LivingLegend - MsHana
6. ICT Applications
Managing learner registration and attendance:
● Can use an ID card containing a magnetic stripe on the back of the card and swipe
through a magnetic card reader when entering and leaving school to identify the
student name, time and date.
● System records time of arrival and sends data to administration database
● If student arrives after a certain time, student flagged as late
● Letters are sent automatically to parents if late
Recording learner performance:
● Use spreadsheets to monitor the student’s performance
● Can import data into a report to summarise the student’s performance
Timetables used for:
● Organising examinations
● Creating student and staff timetables
● Managing teacher cover/substitutions
6.8 Booking Systems:
Areas where booking systems are used:
● Travel industry
● Theatres
● Cinemas
Online processing involved in booking tickets:
● Customers clicks on type of ticket they would like to buy
● Date, time, and required number of seats is entered
● A seating display of the theatre is shown and the user selects the seat(s) they want
and clicks CONFIRM
● Database is searched to check the availability of the selected seat(s)
○ If seat is available, total price and seat numbers are shown
■ If customer is happy, they will select CONFIRMED and the seats are no
temporarily set at NO LONGER AVAILABLE
■ Customers enter their personal information
■ Payment method is selected and payment is made
■ Final details shown and email is sent to customer (e-ticket)
■ Database updated and seats are no longer available
○ If seat not available, customer has to choose another option
42
LivingLegend - MsHana
6. ICT Applications
Online Booking Systems:
Advantages
●
●
●
●
●
●
Disadvantages
Prevent double-booking
Customer gets immediate
feedback on where seat is
available/taken
Can make bookings
anytime/24/7
Customer’s email address
allows the booking customer to
advertise special offers to them
E-tickets reduces chance of
ticket being lost
Data is updated immediately
●
●
●
●
●
●
●
Expensive set up and maintenance
Need access to a computer and a reliable
internet connection
If websites poorly designed, can be
difficult to book
Doesn’t allow customers to build a
personal relationship with the travel
agent.
Requires a credit/debit card to make
payments online
Requires an email address
Easier to make mistakes when booking
6.9 Banking Applications:
6.9 Banking Applications past paper questions
EFT (Electronic Fund Transfer): System that allows money transfer instructions (from
banks/businesses) to be sent directly to a bank’s computer system.
Uses of EFT:
● Large businesses pay the employee’s
salaries
Automatic Teller Machine (ATMs):
Used for:
● Withdrawing cash
● Depositing cash or cheques
● Checking account balance
● Money transfers
Customer inserts bank card into ATM
Bank card read by magnetic stripe reader
Card is checked if valid
Customer is asked which currency/language they require
Customer is asked to enter PIN using the numeric keypad
ATM compares typed PIN with stored PIN in the chip.
a. If same, transaction proceeds,
b. If the PIN is incorrect, the customer is asked to reenter the PIN. If three failed
attempts customer’s card is withheld and transaction is rejected
7. Customer is asked which service they require and they select an option (to take cash)
8. Customer enters amount to withdraw
9. Amount checked against card limit
10. Customer asked if they want a receipt
11. Card is returned and money is dispersed
1.
2.
3.
4.
5.
6.
43
LivingLegend - MsHana
6. ICT Applications
Credit/debit card transactions:
Debit Card
What is it? How does it
work?
What information is
contained in the card?
What is the difference
between them
Debit cards draw money
directly from your checking
account when you make the
purchase.
●
●
●
●
●
●
Credit Card
A credit card allows you to
borrow money against the
card’s credit limit
Card number
Cardholder name
Expiration date
Magnetic stripe
Hologram
Signature
Debit cards do not have interest but credit cards charge
interest.
Processing involved in credit/debit card transactions:
1. PIN is entered using keypad
2. Card is checked to see if it’s valid (expiry date, correct owner, etc)
3. PIN is read from chip on card and compared to the one that’s been keyed in
a. If they match then transaction may continue
b. If incorrect a maximum of three attempts before the transaction is terminated
4. Restaurant’s bank contacts customer’s bank
a. Check is made if they have enough funds
b. If card not valid/ not enough funds then transaction
is cancelled
5. If everything is OK then transaction is authorised
6. Price of meal/item is then deducted from customer’s
account
7. Same amount is added to restaurant’s bank account
8. A receipt is produced as evidence of purchase
Clearing of cheques:
1. Check sent to clearing centre where checks are
sorted and cheque data is created
2. Amount is read using OCR
3. Cheque data is written in special magnetic ink
and passed through the MICR reader where the
cheque number/amount/bank code is read
4. Cheques sorted by sort code
5. Check data electronically sent to payer’s bank
6. Payers bank checks for fraud and checks if there are sufficient funds
7. If funds are available, money is sent to receiver’s bank where it is deposited in the
receiver’s bank account
44
LivingLegend - MsHana
6. ICT Applications
Contactless Cards:
● Use RFID Technology
● Have a small chip that emits radio waves so when the card is held near a terminal,
the terminal picks up the waves and processes the transaction
Phone Banking
1. The person calls the bank
2. Enter their account number using the phone’s number keys
3. Enter PIN
4. Hear various options and they pick one option
Uses: check balance, pay bills, transfer money using EFT, get financial advice
Advantages
●
●
Disadvantages
No need for computer
Can speak to actual person
●
●
System is difficult to use
Slower and longer queues
Internet Banking:
● Customers use a computer to connect to a bank’s secure encrypted website where
they login
● Uses: check balance, pay bills, transfer money using EFT, apply for loans
Advantages
●
●
●
●
Disadvantages
More convenient because 24/7
Save travel time and transport cost
Data can be downloaded and
analysed
People find it embarrassing to ask for
a loan face to face
●
●
●
●
Requires computer and internet
access
Some people prefer face to face
conversations
If an account is hacked (password
and username stolen), money can be
stolen.
Easier to make errors with online
banking
6.10 Computers in Medicine:
Contents of information systems in Medicine:
● Patient records
● Pharmacy records
● Monitoring and expert systems for diagnosis
Medical aids that 3D printers produce:
● Surgical and diagnostic aids
● Development of prosthetics and medical products
● Tissue engineering
● Artificial blood vessels
● Design of medical tools and equipment
45
LivingLegend - MsHana
6. ICT Applications
6.11 Computers in Libraries:
Files used in libraries:
● Barcode on the books being borrowed
● Barcodes of the borrower’s library card
Processing involved in the issue of books:
1. Barcode of book is scanned by barcode scanner
2. System automatically calculates the due back date
3. Borrower’s library card’s barcode is scanned
4. Searches book code in books table until matching record is found
5. Flag the book as ‘borrowed’
6. Book file is linked to the borrower’s file and both files are updated to record which books
are borrowed and when it is dued back
7. Date of book due back is saved in the borrower’s file and a reminder is sent if the due
date is exceeded
Automatic processing involved in issuing reminders for overdue books:
1. Computer reads record from book file
2. Corresponding record read from borrower’s file
3. Compares due date with current date
4. The borrower’s details are found and letter/email automatically sent out
5. Next record in book file read
6. Repeats until whole file have been checked
6.12 Expert Systems:
Applications that use expert systems:
● Mineral Prospecting
● Car Engine fault diagnosis
● Medical diagnosis
● Chess games
Components of an expert system:
● Interactive user interface
● Inference engine
● Rules base
● Knowledge base (uses knowledge from experts)
How an expert system is used to suggest diagnoses:
1. An interactive user screen generates often multiple choice/yes or no questions
2. System asks questions related to diagnosis
3. Operator types in answers to questions
46
LivingLegend - MsHana
6. ICT Applications
4. System asks questions based on previous response input by the operator
5. Inference engine compares answers to questions with facts stored in knowledge base
using the rules base
6. System suggests possible diagnosis
7. Explanation system will explain how the expert system arrived at its conclusion
8. Expert system shows predictions and conclusions
Advantages of using expert systems
●
●
●
●
●
●
Disadvantages of using expert systems
Provide more consistent answers
Give number of different possibilities
Reduced cost of finding a solution
because less need for specialists
Can be used online/24/7
Collective wisdom of more than one
expert
Do not forget to ask a question
●
●
●
●
Machines lack common sense
Expensive to maintain
Expensive to set up
If knowledge base contains errors,
incorrect decisions may be made
6.13 Computers in the Retail Industry:
Point of Sale (POS):
● Place where you pay for purchases
Includes:
● Barcode scanner
● EFTPOS
● System to update the stock-level of the good
● Producing receipts
How the stock file is updated automatically at POS terminals:
1. Barcode of each item is scanned using a barcode scanner
2. Barcode searched for on the stock file until match is found
3. Price and product description is sent to EPOS
4. Stock level in the record is reduced by 1
a. If stock level is less than or equal to reorder minimum level of stock, computer
automatically orders a batch of items from the supplier
b. Once order purchased, item is flagged on file to prevent reordering
c. When new goods arrive, the barcodes will be used to update the stock files
and item will be unflagged
5. Repeated until all items have been scanned
6. Customers are given a bill with prices of their purchase.
Electronic Fund Transfer at Point-of-Sale (EFTPOS)
1. Customer gives bank card to the cashier
2. Cashier runs the card through a card reader (+ customer enters a PIN)
3. Reader checks if amount to be paid is less than contactless limit
4. Card is checked if it is valid
47
LivingLegend - MsHana
6. ICT Applications
5.
6.
7.
8.
9.
a. If valid, transaction continues
b. If not valid, transaction is terminated
PIN is read from chip on card and compared to one typed in
An authorisation code is sent to cashier
Cashier confirms the purchase and sends an EFT message to the bank
Bank subtracts money from customer’s account and adds money to the store
account
Cashier returns the card and receipt to the customer.
Internet shopping: Buy things online using a computer connected to the internet and some
form of electronic payment
Advantages of internet shopping
●
●
●
●
●
●
Reducing travel costs
Wastes less time as no need to travel
Users have access to worldwide
markets - greater variety of products
that may be cheaper
Disabled/elderly can access any shop at
home
Can be done 24/7
Shops save money as less staff needed
Disadvantages of internet shopping
●
●
●
●
●
●
Lack of socialisation
Health risks due to lack of exercise
Security issues (phishing, hacking,
pharming etc…)
Accidentally using fraudulent shopping
websites has a risk of security issues
Can only see a picture of goods (colour
may differ)
High street shops closing down
6.14 Recognition Systems:
Recognition systems
How they work
Magnetic Ink
Character
Recognition (MICR)
●
Optical Mark
Recognition (OMR)
●
●
●
●
System that reads characters printed in a special ink
(containing iron particles)
Characters converted into a form the computer can
understand
Device that read marks written in pen or pencil
Shines beam of light - light reflected to sensors and areas
shaded in reflect less light
Position of the mark is stored in the computer’s memory
Optical Character
Recognition (OCR)
●
Used to scan text from hardcopies and transfers them into
an editable form which can be edited in word processors
Radio Frequency
Identification Device
(RFID)
●
●
●
Uses radio waves to read and capture info stored on a tag
Tag read from a distance
RFID made from two components:
○ Microchip that stores and processes information
○ Antenna to receive and transmit data/info
48
LivingLegend - MsHana
6. ICT Applications
Number Plate Recognition Systems:
1. Sensor detects vehicle and sends a signal to a microprocessor to instruct the camera
to capture image of front side of vehicle
2. Algorithm used to isolate number plate from image
3. Brightness and contrast of image is adjusted to make the number easier to read
4. Each character read and decoded using OCR
5. Number plate and time stored in database
6. Number plate compared with ones stored in database
7. Car is identified
Processing of cheques:
● MICR used to read information stored on bottom of cheques (e.g. account number,
name, date, bank account number)
Uses of OMR Media:
● School registers
● Multiple-choice examination papers
Uses of RFID technology:
● Tracking stock
● Passports
● Automobiles
● Contactless payments
6.15 Monitoring and tracking systems:
How a workforce or member of public can be monitored/logged:
● Ankle monitor uses RFID by inserting microchip into device strapped to ankle
● GPS monitoring
● CCTV cameras
Cookies: Small look-up table containing pairs of values that stores the user’s browsing
preferences and creates an anonymous user profile.
Key-logging: Software used to monitor each key press on a user’s computer (may be used by
hackers to obtain personal details)
How worker/employee call monitors can be used?
● Employee call monitoring allows managers to listen in to employee’s telephone calls to
improve the employee’s performance, used as training tool and monitor calls for
companies who are concerned with security
49
LivingLegend - MsHana
6. ICT Applications
6.16 Satellite Systems:
Satellite systems
Uses
Global Positioning Systems (GPS)
Used to find exact location of a transport using
satellite navigation systems
Used in cars and lorries to calculate routes
Geographical Information
systems (GIS)
Computer system that allows potential locations to be
analysed based on specific querries
How does GPS display location:
1. At least three satellites are used to transmit radio signals to earth
2. Software in smartwatch/phone/any device interpret signals
3. Triangulation takes place
50
LivingLegend - MsHana
7. The Systems Life Cycle
Purpose of system analysts:
● Review an existing system and suggest a number of improvements to design a new
system that can carry out the same tasks better.
Main Stages: (ADDIDE)
1. Analysis
2. Design
3. Development and Testing
4. Implementation
5. Documentation
6. Evaluation
7.1 Analysis:
Analysis stage: where the current system is looked at in detail in order to figure the changes
needed to make the system better
● Research and collect data about current system
● Identify the inputs, processing and outputs of the current system
● Identify problems with current system
● Identify user and information requirements for the new system
● Identify suitable hardware and software for the new system
● Produce a cost-benefit analysis
Methods of researching an existing system:
Method
Description
Observations
Systems analyst
sits and watches
somebody using
the current system.
Interviews
Questionnaires
One to one
question and
answer session
between analyst
and employee.
Distributing
questionnaires to
the users/
employees to find
out about their
views on the
current system.
Advantages
●
●
●
●
●
●
●
●
●
●
●
Disadvantages
Analyst obtains reliable data
Better overall view of the
system
Cheap
●
People can be
uncomfortable being
watched and may work
differently (Hawthorne
effect)
User is more open and honest
about answers
Questions can be modified and
extended
Can observe facial expression
and body language
●
Time consuming to
complete all interviews
Expensive as time needed
Not anonymous
Can give answer that they
think the interviewers want
Faster to complete all
questionnaires
Cheaper than interview
Individuals can remain
anonymous so more trustful
More people can answer
questionnaire than interview
Can fill it in in their own time
●
●
●
●
●
●
●
●
Not popular with users
Too inflexible so no follow
up questions
Users tend to exaggerate
responses if anonymous
As anonymous, may not
take it seriously
Cannot expand answers
51
LivingLegend - MsHana
7. The Systems Life Cycle
Examination of
existing
documents
Look at paperwork
and files to allow
analysts to analyse
the operating
instructions,
training manuals
etc...
●
●
Information can be obtained
that is not available for other
methods
Can see the scale of the
problem easily
●
●
Time consuming to go
through all the documents
Expensive as time needed
Recording and analysing information about the current system:
Describe the need to identify:
● Inputs, outputs and processing of the current system
○ New system need to deal with similar inputs and outputs and processes
● Problems with the current system
○ To improve it in the new system to run more smoothly and efficiently
● User and information requirements for the new system
○ Need to make a list of requirements for the new system so the new system can
be designed to meet these requirements
System Specification:
● Hardware:
○ Number of computers
○ Input and output devices
● Software:
○ Custom made or off-the-shelf software
7.2 Design:
Design stage: Where the system is planned thoroughly to make sure that the developers
know how each screen should look and how the system should look
● Design the data capture forms
● Design the screen layouts
● Design outputs in the form of screen displays and printed reports
● Produce system flowcharts
● Design validation rules
● Design file structures
● Choice of hardware/software
● Deciding on test strategies
52
LivingLegend - MsHana
7. The Systems Life Cycle
Data Capture forms:
● Either paper-based or
electronic-based
● Allow data to be input to the system
Paper Based
●
●
●
●
System outputs:
● On-screen reports
● Printed report
Electronic Based
Heading and instructions
Use text boxes/tick
boxes/character boxes
Sufficient space to write answers
Clear fonts and colours
●
●
●
●
●
●
●
Use text boxes
Use on-screen help when completing the form
Use drop down/combo boxes
Automatic validation of data
Control buttons
Double entry boxes
Clear font and colours
Data Validation Routines:
Validation method
Description
Length check
Check if input data contains the required number of characters
Type check
Checks that the data doesn’t contain invalid characters
Format check
Makes sure that data is in a specific format
Presence check
Checks that data has been entered
Check digit
This is an extra digit added to a number which is calculated from
the digits.
Can identify three types of errors:
● Two digits transposed (e.g. 13597 instead of 13579)
● Incorrect digit entered twice (e.g. 13559 insead of 13579)
● Digit missed out (e.g. 1359 insead of 13579)
Data Verification Routines:
Verification methods
Visual verification
visual comparison of data entered with a data source
Double data entry
entering data twice by 2 different people and the computer
compares the two sets of data
File structure:
When building a database, the following needs to be considered:
● Field Length
● Field Name
● Data type
53
LivingLegend - MsHana
7. The Systems Life Cycle
7.3 Development and Testing:
Testing Designs:
Data/File Structures:
● Determine how data is stored in a system
● Made of tables, fields, field properties and records
Validation Routines:
● Created by entering validation rules
● Tested by:
○ Enter correct data
○ Purposefully enter wrong data
Input Methods:
● Create well designed data-entry forms with form controls
● Tested by:
○ Checking whether data can be entered
Output methods:
● On-screen outputs and printed outputs
● Tested by:
○ Ensure that printed outputs can be printed
○ Checking whether the information is clear and correct
Testing Strategies:
●
●
Individual modules should be tested after created
Once the development of each module is completed, the whole system needs to be
tested as even though each module may work individually, when put together there
might be data clashes or incompatibility.
Type of data
Definition
Example
Normal
Data that is appropriate/reasonable and has
an expected outcome
Month can be any whole
number between 1 and 12.
Abnormal
Data outside the limits of acceptability or
wrong type of data that should be rejected or
cause an error message
Month cannot be negative
number, non-integer values,
numbers greater than 12.
Live
Data with known outcomes. It has been
used in the previous system/existing system.
-
Extreme
Data that is at the limits of acceptability
Extreme values for month are
1 and 12
●
Necessary to improve the system and make changes after testing.
54
LivingLegend - MsHana
7. The Systems Life Cycle
7.4 Implementation:
●
●
●
Train staff
Transfer files from existing system to new system
Changeover:
○ Direct Changeover
○ Parallel Running
○ Pilot Running
○ Phased Implementation
Method of
implementation
Description
Suitable for
which
situation
Advantages
Disadvantages
Direct
Changeover
New system
introduced
immediately
Small
organisation
that can
afford to lose
data OR
need quick
changeover
●
●
Cheaper
Saves time
implementing new
system
Advantages are
intermediate
Less likely to have
malfunctions as new
system is fully tested
●
Disastrous if
new system fails
More expensive
than direct
changeover
More time
consuming than
direct changeover
Parallel
Running
Pilot Running
Phased
Implementation
●
●
Old and new systems
run side by side for a
time before new
system takes over
Organisation ●
that cannot
afford to lose
data and
●
cost is not an
issue.
If new system fails,
old system is still
available
Can gradually train
staff
●
New system
introduced to one
branch/office and its
performance is
assessed before
introduced to other
areas of the company
Organisation
where there
are clearly
definite
separate
processes
●
Only affects certain
branch if system
goes wrong
Faster and cheaper
than parallel
running
●
Only one part of the
new system is
introduced and once
works satisfactorily, the
next part is introduced
and so on until the old
system is fully
replaced.
Organisation
where there
are several
branches
doing same
work
●
If new system fails,
most of old system is
still available
Can see if part of
new system works
before proceeding
Can gradually train
staff
●
●
●
●
●
●
●
More expensive
than direct
changeover
More time
consuming than
direct changeover
More expensive
than direct
changeover
More time
consuming than
direct changeover
55
LivingLegend - MsHana
7. The Systems Life Cycle
7.5 Documentation:
Technical Documentation:
● Needed to help programmers/analysts to:
○ Make improvements to the system
○ Make repairs to the system
○ Maintain the system
● Components:
○ Purpose of the system/program
○ Limitations of the system
○ Hardware and software requirements
○ Sample runs/test runs
○ Input format
○ Output format
○ Program listing
○ Program language
○ Program flowcharts/algorithms
○ System flowcharts
○ File structure
○ List of variables
○ Validation routines
User Documentation:
● Needed to:
○ Help users to learn how to use the software/system
○ Help users to overcome problems
● Components:
○ Purpose of the system
○ Limitations of the system
○ Hardware and software requirements
○ Sample runs
○ Input format
○ Output format
○ How to load/run/install software
○ How to save a file
○ How to print data
○ How to add records
○ How to delete/edit records
○ Error messages
○ Error handling
○ Troubleshooting guide/helpline
○ Frequently asked questions
○ Glossary of terms
56
LivingLegend - MsHana
7. The Systems Life Cycle
7.6 Evaluation:
How should the solution be evaluated on?
● The efficiency of the solution
● The ease of use of the solution
● The appropriateness of the solution
Evaluation strategies:
● Compare solution with original task requirements
● Identify any limitations and necessary improvements to the system
● Evaluate the user’s responses to the results of testing the system
● Analyse feedback from users
57
LivingLegend - MsHana
8. Safety and Security
8.1 Physical Safety:
Common physical
safety issues
Causes
Methods of prevention
Electrocution
Spilling drinks near
computers
Use an RCB (residual current breaker)
Check insulation on wires regularly
Don't allow drinks near computers
Fire
Sockets being overloaded
Equipment overheating
Ensure good ventilation
Don't overload sockets
Don't cover equipment vents
Have carbon dioxide extinguisher nearby
Tripping wires
Trailing cables
Use cable ducts
Neatly tuck wires away
Use wireless connections when possible
Heavy equipment
falling
Heavy equipments falling
off the edge of a desk
Use strong and large desks
Place hardware at the centre of the table
Strategies to minimise potential safety risks:
● Check state of wires regularly
● Put drinks away from the computer
● Tidy wires neatly
● Don't cover computer with fabric/paper
● Don’t overload a socket
8.2 eSafety:
Personal Data: Any data concerning a living person who can be identified either from the data
itself or from the data in conjunction with other information
Why should personal data be confidential and protected?
● Prevent identity theft
● Prevent theft of money
● Prevent from harm from online predators
Examples of personal data: (*Sensitive personal data)
● Name
● Home address
● School Name
● Ethnic origin
● Medical details
● Criminal records
● Date of birth
● Banking details
58
LivingLegend - MsHana
8. Safety and security
How to avoid disclosing personal data:
● Do not give out personal information to strangers online
● Do not send people photos of yourself
● Maintain privacy settings
● Online visit secure websites
● Use websites recommended by teachers
● Use learner-friendly search engines
● Be vigilant when using social networking sites
Using social networking sites/instant messaging/internet chat rooms:
● Know how to block/report unwanted users
● Never arrange to meet anyone alone
● Always telling an adult first and meeting in a public place
● Avoid misuse of images
● Always use appropriate language
● Respect people’s confidentiality
Measures taken when playing online games:
● Using nickname and never real name
Why is E-safety needed?
● Protect against identity theft, online predators, cyber attacks, cyber bullying…
Using emails:
● Only email people you know
● Think before opening email from an unknown person
● Never email school’s name or picture of learner in school uniform
8.3 security of data:
Hacking: act of gaining illegal unauthorized access to a computer system with the intention
of causing harm.
Effects of Hacking:
● Identify theft - misuse of personal data
● Data can be deleted, changed, corrupted, and used for fraudulent purposes
Measures to protect data from hackers
● Use firewall
● Use biometric data to enter the network
● Use strong passwords and ID that are frequently changed
● Use intrusion detection software
59
LivingLegend - MsHana
8. Safety and Security
User id and Passwords: Method of authentication that helps improve security
Methods of minimizing the risk of passwords being misused if intercepted:
● Encrypting the password
● Use twin-factor authentication
● Changing passwords regularly
Biometric data: unique identification that relies on certain unique characteristics of human
beings - used to improve security
Digital certificate: A pair of files stored on the user’s computer that allows
people/organisation/computers to exchange secure information over the internet
Pair of files include:
● Public key - known by anyone
● Private key - known by the computer user
Digital certificates include:
● Sender’s email address
● Name of digital certificate owner
● Serial number
● Expiry date
● Digital signature for certificate authority
Secure Socket Layer (SSL): a type of protocol that allows data to be sent and received
securely over the internet
Features of a webpage that identify it as a secure server:
● Website URL contains https
● Small padlock in the status bar
Phishing: A fraudster sends out legitimate-looking emails to target users that appear to come
from a trusted source (authentic). They are lured to click on a fake website and enter their
personal details.
Methods of preventing Phishing:
● Filter out phishing emails
● Users should be cautious when opening emails or attachments
● Dont click on executable attachments ending in .exe, .bat, .com etc...
Pharming: A malicious code installed on a user’s computer or on a web server and the code
will redirect the user to a fake website without their knowledge that looks authentic but
belongs to the fraudster It is used to obtain the user’s personal details.
Methods of preventing Pharming:
● Use up-to-date anti-spyware software
● Keep DNS serve up to date
● Use up-to-date firewall services
● Users should be cautious and look out for clues they are redirected to a fake website.
60
LivingLegend - MsHana
8. Safety and security
Smishing: SMS phishing where creators use SMS systems on mobile phones to send out
fake messages that often contain an URL or telephone number embedded in the text.
Methods of preventing Smishing:
● Double check message for spelling/grammatical errors
● Check link to see if it is legitimate
● Never reply to messages from unknown senders
● Users should be cautious when receiving suspicious messages
Vishing: voice mail phishing that uses a voice mail message to trick the user into calling the
telephone number contained in the message.
Malicious use of technology (phishing, pharming, smishing) to collect personal data can lead to
identity theft
How to recognise if someone is attempting to obtain personal data:
● Conveys a sense of urgency
● If it is too good to be true, it is probably fake
How to report if suspecting someone has obtained your personal information:
● Contact the bank immediately
Moderated forms
Unmoderated forms
Online discussion forum in which all the
posts are checked by an administrator
before posted. It prevents spam and filters
inappropriate/rude/offensive posts
Not policed and not moderated by an
administrator, e.g. the internet
Spam Emails: Electronic junk emails/unsolicited emails sent to everyone on mailing lists and
may lead to denial of services where the network slows down because of being flooded with
spam. It can also fill up the receiver’s mailbox.
Why should spam emails be protected:
● May contain viruses
● May contain spyware
● Spam fills inbox and stops other emails
Spam Prevention Techniques:
● Use up-to-date spam filter
● Block images in HTML messages as these are used in web beacons
● Do not sign up to commercial mailing lists
● Do not reply to suspicious emails
● Unsubscribe from mailing list not explicitly subscribed in the first place
61
LivingLegend - MsHana
8. Safety and Security
Encryption: Process of scrambling and encoding data so that the data is not
understandable. It protects sensitive data from being understood if it falls into the wrong
hands. It requires an encryption key to encrypt and a decryption key to decrypt.
Computer virus: A piece of program code that replicates itself automatically and can fill up
hard disk space and cause damage to data or cause the computer to run slowly
Viruses Can:
● Delete/corrupt data
● Fill up disk space
● System files can be corrupted if on hard disk
Effects of infecting a computer with a virus from a downloaded file:
● Cause the computer to ‘crash’ and become unresponsive
● Software can delete files/data on the computer
● Software may corrupt operating system files
Preventative actions to avoid computer viruses from downloaded files:
● Install up-to-date anti-virus software
● Don't download softwares from unknown sources
● Don't download email attachments from unknown senders
How to be subject to online credit card fraud:
● Hackers gaining access through spyware, phishing, pharming where user is tricked into
giving personal and financial details
● Breaking of passwords
● User visiting a fake website and entering personal and financial details.
● Using internet access without password control
● Logging into an account or website in a public place
Cloud: An online storage medium used to backup files and can be accessed anywhere with
internet connection
Issues related to cloud security:
● People transferring confidential data to a cloud service provider have risk of data being
hacked → lead to loss or corruption of data
● Celebrity data had been hacked and images had been shared online
Firewall: Can be software or hardware and it sits between the user’s computer and an
external network and filters information coming in and out of the user's computer.
Tasks carried out by a firewall:
● Monitors and controls ‘traffic’ between user’s computer and public network (internet)
● Checks where incoming/outgoing data meets the criteria
● Gives user security warning when data fails the criteria
● Log all incoming/outgoing traffic
● Keep list of all undesirable IP addresses
● Prevent access to undesirable sites
● Prevent viruses or hackers entering the user’s computer network
62
LivingLegend - MsHana
9. Audience
9.1 Audience Appreciation:
Factors that should be considered when planning and creating an ICT solution:
● The age of the target group
● Experiences of the audience
● Expectations of the audience
● Knowledge of the audience
Factors that should be considered when writing a presentation:
● Language used
● Multimedia/colours used
● Length of presentation
● Interactive presentation
● Examples used
9.2 legal, moral, ethical and cultural appreciation:
ICT 9.2 Moral, ethical, legal
Why is copyright legislation is needed:
● Protect software
● Gives the author legal protection
Principles of copyright relating to computer software (e.g. software piracy)
● It is illegal to:
○ Make a software copy to sell and give away
○ Use the software on a network on multiple computers
○ Use coding from copyright software in your own software and then selling it
without permission
○ Rent out the software without permission
○ Use the name of the copyrighted software on another software
Methods used by software producers to prevent software copyright from being broken
● When software installed, the user needs to enter a unique product key
● User needs to click OK/I AGREE to license agreement
● Original software packaging has a hologram
● Software only runs when there is CD-ROM, DVD-ROM, or Memory stick in the drive
63
LivingLegend - MsHana
9. Audience
What does it mean?
How is it applicable to ICT?
Legal
Ensuring that copyright laws are
followed
Not using any coding/branding
from existing software
Morality
Distinguishing between right and wrong
Setting up a fake website
Ethics
Breaking a code of conduct
Leaking information to the rival
software publisher
Culture
Ensuring that people are not offended
when the software is released to
another country with different cultures
Certain colors/designs
Computer games may mock
religious beliefs
Should the internet be policed?
Yes
●
●
●
●
●
No
Prevent illegal material being posted
Prevent porngraphy for minors
Ensure copyright laws are enforced
Prevent children/vulnerable people
from being exposed to undesirable
websites
Help stop incorrect information from
being posted onto websites
●
●
●
●
Unsuitable materials easily available
in many other ways
Expensive to ‘police’ all websites
Difficult to enforce rules and
regulations on a global scale
Go against freedom of information
64
LivingLegend - MsHana
10. Communication
10.1 communication with other ICT users using email:
Constraints that affect the use of email:
Laws within a country
●
●
●
●
Emails with false/misleading subject lines should not be sent
Must have a clear way of unsubscribing
Must have a clear privacy policy
Don't allow organisations to harvest email addresses
Acceptable language
●
●
●
●
Cannot use obscene images
Cannot use abusive language
Cannot use racist language
Uses of illegal materials
Copyright
●
Emails & attachments from companies and organisations
usually contain a copyright statement
●
Respect each other’s view and display common courtesy
Local guidelines set
by an employer
The need for security
Netiquette
Rules involve:
● Checking for spelling/grammatical errors as it sets a good
impression
● Do not be abusive as this may upset people
● Do not plagiarize and follow copyright laws
● Avoid humour as some people may not understand
● Do not use capital letters to highlight comments as this can
be seen as shouting
● Don't send spam
● Respect other people’s privacy and do not discuss public
info that may embarrass
Password protection
●
Using strong passwords and change it regularly
Spam Emails: Electronic junk emails/unsolicited emails sent to everyone on mailing lists and
may lead to denial of services where the network slows down because of being flooded with
spam. It can also fill up the receiver’s mailbox.
Why must spam be prevented:
● Annoying
● Use up valuable bandwidth on the internet and slows it down
● Potential of virus attached
● Clogs up a user’s inbox
65
LivingLegend - MsHana
10. Communication
Methods to prevent spam:
● Use up-to-date spam filter
● Block images in HTML messages as these are used in web beacons
● Do not sign up to commercial mailing lists
● Do not reply to suspicious emails
● Unsubscribe from mailing list not explicitly subscribed in the first place
Why are email groups used:
● Easier to send multiple emails
● Group people together for marketing purposes
● Use email groups to set up meetings to ensure that everyone is invited → prevents
forgetting
10.2 effective use of the internet:
Internet: Worldwide network of networks
Intranet: Private network that uses the same protocols as the internet, but usually confined to a
small organisation and is not available to the general public.
World wide web: part of the internet which users can access through a web browser as a
means of researching information on the internet
Cloud Storage: An online storage medium used to backup files and can be accessed anywhere
with internet connection
Internet Terms
Definition
HyperText Transfer
Protocol (HTTP)
Set of rules that must be obeyed when transferring files over the internet
HyperText Transfer
Protocol secure
variant (HTTPS)
Set of rules that must be obeyed when transferring files over the internet
Uniform Resource
Locator (URL)
A web browser that allows the user to display a webpage
Hyperlink
Allows users to navigate between web pages
Internet Service
Provider (ISP)
Company that provides internet services to users
File Transfer
Protocol (FTP)
Network protocol when transferring files from one computer to another
66
LivingLegend - MsHana
10. Communication
Structure of web address:
1. Protocol (usually http or https)
2. Domain host (www)
3. Domain name (name of website)
4. Domain type (.com, .org, .gov) OR A country code (.uk, .us)
Use of a web browser:
● Allows a user to display a webpage on their computer screen
● They interpret or translate the HTML from websites and shows the result of the
translation
Uses of a search engine:
● Useful if you don’t know the URL of the website or to find information but don’t know
where to look
● They use words entered in the search
Blog: Personal internet journals where the writer will type their personal opinions on some topic
and provide links to relevant websites
Features of a blog:
● Public/anyone can see it
● Personal journal/online diary
● Owners’ observations/opinions on a topic
● Can have links to other sites
● Viewers can post comments/authors reply to comments
● Frequently updated by owner
Wiki: Software/website that allows users to add/modify/delete content and edit web pages using
any web browser. It normally uses a simplified mark-up language and is created collaboratively
with multiple users.
Features of a wiki:
● Anyone can edit, delete or modify
● Many authors
● Shows/keeps track of all entries
● Allows large documents to be seen by many people
Differences between Blogs and Wikis:
Blogs
●
●
●
●
Wikis
Single author
Usually in reverse chronological order
Personal (contains someone’s
opinion)
Can only add comments to blogs but
cannot edit them
●
●
●
●
Many authors
Has structure determined by content
and users
Usually objective
Can be edited
67
LivingLegend - MsHana
10. Communication
Social Networking: Building online communities of users who share the same interests and
activities - enables people to share photos/videos/send messages and is done by creating a
public profile.
Features of social networking sites:
● Each member provided with free web space
● Each member can build their own private and public profiles
● Can upload content (photos/videos…)
● It is possible to ‘write on each other’s wall’
● Free instant messaging and video chatting
● Can email other members
● Can create pages to post photos,articles…
● Can invite people to become friends
● Can control who can access their private data
Advantages and disadvantages of social networking
Advantages
●
●
●
●
●
Increase number of worldwide friends
Real time information sharing
Easier to advertise to large groups of
people
Similar interests contact each other
Speed of news increases
Disadvantages
●
●
●
●
●
●
●
●
Reduce face to face communication
Cyber-bullying increases
Risks of frauds increases
Risks of identity theft increases
Time wasting increases
Need the internet
Need a computer/device
Addiction
Why is the internet so popular:
● Huge amount of information available
● Fast speed of accessing information
● Information is likely to be up to date
● Pages on the internet has multimedia elements
Why is an internet search to find relevant information not always fast:
● Danger of information overload
● Certain websites are always on the top but some may not contain valuable
information
Why is it not always easy to find reliable information on the internet:
● No guarantee that the information is accurate or unbiased
● Materials posted on websites are not needed to be checked by others to ensure they are
factually correct
● Some websites are out-of-date
68
LivingLegend - MsHana
10. Communication
How to evaluate the reliability of information found on the internet:
● Some commercial websites are biased
● If a website has excessive advertising, it may be unreliable
● Websites ending with .gov and .ac are often more reliable
● Comparing information with other sources/books
● See if responsible bodies have endorsed the website
● If a website has testimonials, this indicates reliability
● Check the date of the website → may be out-of-date
69
LivingLegend - MsHana
11. File Management
11.1 Manage Files Effectively:
File Type
Uses
css
cascading style sheet
Stylesheet that is attached to webpages (normally
html) to define the colours/fonts etc.
csv
comma separated values
Generic file format that takes data in the form of
tables and saves it in a text format that separates
data items by commas. Can be used with
spreadsheets/databases.
gif
graphics interchange format
Stores still/moving images and stores small file
sizes efficiently
htm
hyper text markup language
Text-based language that displays information as a
web page.
jpg
joint photographic expert group
Uses for lossy compression for digital
images/used for complex images
pdf
portable document format
A document that has been converted to an image to
protect the file from being edited. It displays text and
graphics in the same fixed layout and reduces file
size (compressed). It allows for digital signature
png
portable network graphics
Lossless data compression without decreasing the
image quality. Mostly used for internet images.
rtf
rich text format
Saves some of the formatting within the text and
does not allow graphs/comments
txt
text
The file is not formatted and can be opened in any
word processor (generic file format)
zip
zip
Container that can contain almost any file type in a
compressed format. It is used to reduce the no. of
bytes needed to store/save/transfer the file.
Generic File Type - file types that can be opened on any platform/application software - some
formatting will be lost but the info will be the same
● Common generic file types:
○ Comma Separated Values (.csv): Takes data in the form of tables and saves it
in a text format that separates data items by commas.
○ Text (.txt): The file is not formatted and can be opened in any word processor
○ Rich Text Format (.rtf): text file that saves some of the formatting within the
text
70
LivingLegend - MsHana
11. File Management
Non Generic File Type - files that are not always possible to be opened on all platforms
● E.g. File types by Microsoft Office - (.xlsx), (.docx), (.accdb)
Why are generic file types needed?
● Allow users to save files so that they can open the files on any platform/software (e.g.
mobile phone to PC)
● Create a standard so other software can understand the contents
Image Files
Audio Files
Website Authoring
Compressed File
GIF
MP3
CSS
RAR
HTML
Zip
JPG
PDF
PNG
MPEG
Compression - reducing file size
● Why?
○ Save storage space
○ Allows quicker transmission of files
■ Smaller file = fewer packets = faster transmission
● Largest files are often image/video files → need to be compressed but also ensure that
the video/image quality is good
Practical: Compressing Images using photoshop:
Option 1: Change image size
Option 2: Decrease image quality
71
LivingLegend - MsHana
11. File Management
Practical: Compressing Folders:
72
LivingLegend - MsHana
12. Images
12 Images:
●
Need to reduce image resolution to increase transmission speed
Practical: Resizing/Rotating an image w/wo locking aspect ratio
Practical: Reflect//Rotate/Crop an image
Practical: Adjust the color depth of the image using Photoshop
73
LivingLegend - MsHana
11. File Management
Practical: Adjust the brightness/contrast of an image in Photoshop
74
LivingLegend - MsHana
Practical Notes for Paper 1
Practical Notes for Paper 1 - Theory:
13. Layout:
Explain why headers and footers are needed:
● Make sure each page have elements like: Page numbers, Book/document/chapter,
Logo, Titles, Filename placed consistently
● When put in header/footer, it will appear on every page so it saves time rather than
typing them on every single page.
14. Styles:
Corporate branding/house style:
● A specific style that is adopted for work you produce that ranges from company logos
and recognised colour schemes, fonts, font sizes
Why are consistent styles required?
● Make sure that all the documents and other materials from the organisation have
consistency
● Save time planning, setting up, formatting documents
● Support brand recognition
15. Proofing:
Why are automated suggestions given by spell checkers not always correct?
● The language/dialect used in checking the spelling could be different, e.g.English (US)
● Names/proper nouns might be highlighted as an error
● Similar sounding words need to be checked, i.e. where, were, wear
● The spell checker may not understand the word if it is very badly misspelt
● The word may not exist in the spell checker dictionary
Verification: Way of preventing errors when data is copied from one medium to another
Verification methods
Visual verification
visual comparison of data entered with a data source
Double data entry
entering data twice by 2 different people and the computer
compares the two sets of data
If word used ‘verification’ is used in question, call method ‘visual checking’ If word not used in
question, call it ‘visual verification’.
Need for Validation and verification:
● Reduce errors in data entry
75
LivingLegend - MsHana
Practical Notes for Paper 1
17. Document Production:
Widow: A paragraph-ending line that falls
at the beginning of the following page or
column, thus separated from the rest of the
text. (They have a past but no future.)
Orphan: A paragraph-opening line that
appears by itself at the bottom of a page or
column, thus separated from the rest of the
text. (They have no past but a future.)
Why is it necessary to use page, section, column breaks
● Want to apply different formatting in the same page without disrupting the formatting of
the whole page.
● Don't want headers on some sections and want it on other sections
● To enable page orientation to change between 2 pages.
● Avoid widows and orphans
Why are mail merge documents created?
● Produce more professional documents
● Fewer errors in typing details
● Process is faster than typing in each person’s detail individually
● Easier to personalise the document
18. Data Manipulation:
Flat file database - Stores all data in one table only, which is organised by rows and columns
Relational database - Stores data in multiple tables. The tables are linked and there is a
primary key and a foreign key in the linked table.
How to create a relational database from two files?
1. Open database package
2. Select database tools
3. Import the files into separate tables
4. Primary key identified
5. Foreign key identified
6. Click relationships
7. Primary key dragged to foreign key
8. Save the database
76
LivingLegend - MsHana
Practical Notes for Paper 1
Primary key - Field that holds unique data. It is a unique identifier.
Foreign key - Regular field in one table which is being used as the primary key field in another
table. Used to provide the link (relationship) between the tables.
Advantages and disadvantages of using relational database rather than flat-file database:
Advantages
●
●
●
●
●
Disadvantages
Duplicated data is reduced
Database space not wasted because
there are no unnecessary duplicated
data
Quicker to enter data as there are no
duplicates
Quicker to update data
Easier to produce reports
●
More complex to set up than a flat-file
database
20. Data Analysis:
Formula
Always start with equal sign and uses mathematical operators
of including functions
Function
Has a predefined name to perform a particular calculation (e.g.
SUM/AVERAGE)
Absolute reference
A reference that is "locked" so that rows and columns won't
change when replicated. Uses dollar symbols like $A$3.
Relative reference
When a formula with relative cell references in copied to
another cell, the reference changes based on a relative
position of rows and columns
Ranges
A collection of cells
Named range
A collection of cells given a name
Nested formulae/functions
Having one formula or function inside another one
Why should a named range be used?
● Used if the range of cells is used many times
● Easier to remember a name than cell references
● Only has to type in the name rather than cell references so reduces typing errors
● If the range of cells replicated, the named range still refer to the same group of cells
77
LivingLegend - MsHana
Practical Notes for Paper 1
Excel Formulas:
Mathematical Operators:
Addition
+
Subtraction
-
Multiplication
*
Division
/
Indices
^
Functions:
SUM
=SUM(A1:A4)
AVERAGE
=AVERAGE(A1:A4)
MAX
=MAX(A1:A4)
MIN
=MIN(A1:A4)
INT
=INT(A1)
takes whole number part and ignore digits
after decimal point
ROUND
=ROUND(A1, 0)
ROUND (cell, no. of decimal places)
COUNT
=COUNT(A1:A4)
Counts the number of numeric values
COUNTA
=COUNTA(A1:A4)
Counts the number of numeric or text
values
COUNTIF
=COUNTIF($A$1:$A$4,”Yes”)
COUNTIF (range, criteria)
IF
=IF(A1>5,”Yes”,”No”)
IF(criteria, value true, value false)
SUMIF
=SUMIF($A$1:$A$4, Yes,
F4:F10)
SUMIF(range, criteria, sumrange)
HLOOKUP
=HLOOKUP(B6,
$B$2:$H$3,2,FALSE)
HLOOKUP(lookupvalue, table, row
number, appropriate/exact match)
VLOOKUP
=VLOOKUP(B3,$A$2:$B$8,2,FA
LSE)
VLOOKUP(lookupvalue, table, column
number, appropriate/exact match)
78
LivingLegend - MsHana
Practical Notes for Paper 1
21. Website Authoring:
Structure of a webpage:
<head>
● Title of the webpage
● Default target window
● Meta Data
● Styles
● Scripts
● Character set
<body>
● Style instructions
● Table content
● Paragraph
● Hyperlinks
● Headings
● Images
Three web development layers:
1. Content Layer - enter the content and create the structure of a webpage
2. Presentation Layer - display and format elements within a web page. It is defined by
cascading style sheets.
3. Behaviour Layer - enter scripting language to elements within a web page
Function of a hyperlink:
● Move your position within a page
● Open another page
● Send an email
Relative file path: only show the name or file path destination of the file. It does not need a
domain name and can only be used to find files on the current site
Absolute file path: gives the full web address/full path. It always has the domain name and can
be used to find files on a different website.
Cascading style sheets: a text based language that is created and added to web pages to
define the font styles, colour, background etc…
Because stylesheets are linked to all web pages within a website, a relative file path must be
used
79
LivingLegend - MsHana
Practical Notes for Paper 1
Style
Class
Limited number of styles
Styles are pre-defined
Styles are defined in the head section
Styles are used once
Class definition name starts with a full stop
Used for adding/changing style within CSS
Subtypes within an element
Classes are user-defined
Classes are styles saved for future use.
Upload and publishing the content of a website using ftp:
● Register for domain name
● Use File Transfer Protocol to upload files to the web hosting space
80
LivingLegend - MsHana
Download