Ict revision UNIT 1: Types and components of Computer systems Hardware and software Hardware: - The electronic physical components that make up a typical computer system. These may include input and output devices as well. Internal Hardware Devices: - Central processing unit (CPU) Processor Motherboard Internal memory consisting of Ram and Rom Graphics and sound cards Internal storage devices like Hard disk drives and Solid-State drives Network interface cards (NIC) External Hardware Devices: - Monitor Keyboard Mouse Printer External Storage devices Software: - Refers to programs that control the operation of a computer or the processing of electronic data Application Software: - Provides services that allow the user to do specific tasks. Can be general purpose software or custom-made software. E.g.: Spreadsheets, databases, word processing System software: - The software is designed to provide a platform on which all other software can run. For example: 1) Compilers: Used to convert high level language into machine code (language processor) 2) Linkers: A software that creates the links between language processors into workable solutions (data definition language) 3) Device drivers: A software that enables the device to work with another, externally connected device. 4) Utilities: A system software that provides the necessary facilities, (Antivirus, Scan disk, Disk defragment, etc.) 5) Operating systems: enable computer system to function and allow users to communicate with computer systems. Analogue and digital data - Computers can only understand data in the form of binary digits (0,1). This is commonly known as digital data. Data in the real world is Analogue. It isn’t limited to two specific values. For a computer to be able to process real-world data, it first needs to convert the received data into digital form. This is done by the hardware known as ADC (analogue to digital converter), and its output is given back in analogue form using DAC (digital to analogue converter). The main components of Computer Systems CPU - The component of the computer that understands and executes hardware and software operations. It consists of a Control Unit (CU) that manages the input and output devices, an arithmetic and logic unit (ALU) that performs computations and makes logical judgements, and tiny memory regions known as registers. It processes the input and produces the outcome of the processing in the form of output. Internal memory 1) Random Access memory (Ram): temporary memory storage, lost after power is shut down, performs read and write functions, used to store data that’s currently in used can be increased in size to improve operational speed. 2) Read only memory (ROM): permanent memory storage, non-volatile, can only be read from, used to store computer’s configuration data, such as BIOS. - The BIOS (Basic Input/output system) stores the date, time and system configuration on a non-volatile chip called a CMOS (complementary metal oxide semiconductor) – this is usually battery powered. Input and output devices - Input devices are pieces of hardware that allow users to enter data into computers. An output device displays the computer’s output in a human-readable format. As words on a printer, for example, or moving graphics on a monitor. Input devices An input device is any hardware that enables data entry An input device can only send data Necessary for a computer to receive commands from the user Complex as they need to ensure proper communication between computer and user Output devices An output shows the result or solution of the input After it has been processed An output device can only receive data Needed in order to display the outcome of the processing that took place Simpler as they only need to display the finale Backing/Secondary storage - Required to permanently store significant amounts of data. Most commonly in the form of HDD and SSD Differentiating between internal memory and backing storage: - RAM contents are lost when power is lost, and ROM is read-only, backing storage is permanent even without power. RAM and ROM are much smaller compared to backing storage devices. RAM and ROM are significantly faster in accessing data as compared to backing storage. Backing storage is much cheaper than Internal memory Internal memories are fixed, backing storage can be fixed OR portable Internal memories can be directly read by the CPU, while backing storage needs to be moved into the RAM before being read by the CPU. Operating systems - Controls operation of input, output and backing storage Supervises loading, running and storage of application programs. Deals with errors in application programs. Maintains security of whole computer system Maintains a computer log. Operating systems offer various types of user interfaces, for example: 1) 2) 3) 4) CLI: user must type in commands to communicate with the computer. GUI: Uses WIMP (Windows, Icons, Menus, Pointers). Dialogue based user interface: Uses the human voice to give commands to a computer system. Gesture based user interface: Rely on human interaction by the moving of hands, heads or even feet. Types of computers Desktops// - General purpose computer that is made up of many separate components that includes; Keyboards, Mouses and a processor unit. Uses: - Office and business work. educational use. general entertainment. gaming device. Advantages: - They’re easier and less costly to upgrade and expand. Spare parts are standardized which makes them cheaper. They tend to have better specifications for a given price. No critical power consumption because they plug into a wall socket. Due to fixed position, they’re less likely to be stolen/damaged. Disadvantages: - Not particularly portable due to their separate components. More complicated to set up. Files must be externally copied to a portable device to carry work elsewhere. Mobile computers 1) Laptop computer - (Or notebook) A type of computer where the monitor, keyboard, mouse and processor are all together in one single unit. Uses: - Office work Educational use Gaming device General entertainment Advantages: - Portable since all components are fixed together. No desk cluttering. Allows them to take full advantage of WIFI features. Disadvantages: - Portability makes it easier for them to be stolen. Limited battery life so the user needs to always carry charger. Keyboards and mouses may be awkward to use Not easy to upgrade, like adding more RAM 2) Smartphones - Allow normal phone calls to be made, bur also have an operating system (Such as iOS, Android, or Windows) allowing them to run a number of computer applications. Uses: - They allow users to send/receive emails. They allow users to multitask easily. They allow users to use a camera feature. They allow users to use an MP3/MP4 player. Advantages: - Very small in size and lightweight (portable) Due to 3G/4G/5G connections, the internet can be used anywhere. They have a reasonable battery life. Disadvantages: - Small screens and keyboards make pages difficult to read. More difficult and slower when typing. Web browsing and photography can drain the battery quickly. Memory size in most phones is not very large when compared to laptops and desktops. Not all website features are compatible with smartphone operating systems. 3) Tablets - They work similarly to a smartphone. The only main difference is that they are much bigger in size compared to a smartphone. Uses: - They allow users to send/receive emails. They allow users to use several apps They allow users to use the camera feature They allow users to use an MP3/MP4 player Advantages of tablets compared to laptops - Very fast to switch up (No time delay waiting for the operating system to load up) Completely portable Touch screen technology means they’re simple to use and do not need any other input devices They use Solid state technology (not much heat) Battery life of a tablet is much longer Disadvantages of tablets compared to laptops - Tend to be rather expensive when compared to laptops They often have limited memory/storage when compared to a laptop Typing on touchscreen can be slow and prone to many mistakes Laptops tend to support more file formats than tablets UNIT 2: Input and output devices Input devices and output devices - An input device is any hardware device that allows a user to enter data or instructions into a computer directly An input device can send data to another device, but it cannot receive data Output devices receive data from the computer Output devices display or produce the results of data processing Types of input devices - Keyboard and numeric pad – Entering text and numbers Pointing devices – Navigate and interact with computer interfaces Remote control – Control devices from a distance (TV’s and media players) Joystick/Driving wheel – Simulation and driving games Touch screen – Direct interaction with the screen using fingers or a stylus Scanners and cameras – Capture imagines and convert them into digital format Microphone – Capture a sound for recording or communication purposes Sensors and light pen – Sensors detect changes in the environment; light pen interacts with screens Direct data Entry & Associated devices - Magnetic stripe readers – Reading information stored on Magnetic stripes (Credit/debit cards) Chip and pin reader – Processing debit and credit card transactions Radio Frequency Identification (RFID) reader – Reading information from RFID tags (Inventory tracking) Optical Mark Reader/Recognition (OMR) – Reading marked areas on forms (MCQ exams) Optical Character Recognition (OCR) – Converting printed text into digital text (Digitizing books) Barcode reader – Scanning barcodes to retrieve product and information prices Quick Response (QR) scanner – Scanning QR codes for information retrieval or linking to websites Output devices - Montor – Displaying computer generated visual information on a screen - Touch screen (output) – displaying visual information and allowing users interaction with the screen Multimedia projector – Projecting computer generated images and videos onto a larger surface Laser printer – Printing high quality text and graphics quickly Inkjet printer – Printing text and graphics using liquid ink Dot matrix printer – Printing text and simple graphics using a print head that strikes an ink-soaked ribbon Plotter – Creating large-format graphics, such as architectural plans and engineering designs 3d printer – Creating 3 dimensional objects by adding material layer by layer Actuator – Converting electrical signals into physical movement (Motors and valves in robotics) UNIT 3: Storage devices and media What is backing up data? - Backing up refers to the copying of files or data into a different medium in case damage to or loss of original copy. Why do we back up data? - To safeguard against loss of data To safeguard against damages caused by hackers In case files need to be sent elsewhere, to protect original format of files Data access Types: 1) 2) - Serial Access: This involves starting from the beginning of the file and accessing each record to get to the fie required. It is a very slow form of data access Used where speed isn’t vital Examples where serial access is used: utility bill, cleaning of back cheques, and producing pay slips Direct access: This is used to access data stored in any record by typing in the required key field Typing in a key field will allow the user to access a particular record directly from the calculated position. Much faster data access speed. Magnetic Backing Storage Media - Holds data magnetically Surface area of the media are magnetized so that they ca hold bits of data The device that reads media can also read the bits held on the surface area Types: - Magnetic tape drives Fixed Hard disks/drives Portable hard disk drives Optical backing storage media - Holds data by burning ‘dots’ onto the surface with a high-powered laser. The data that reads the media can read the data by shining a lower powered laser over the dots. Types: - CD-R/DVD-R CD-RW/DVD-RW - CD-ROM/DVD-ROM Blu-Ray discs Solid state Backing storage - Holds data on devices that don’t have any moving devices. Types: - Solid state drives (SSD) Pen drives (Memory sticks) Flash memory cards UNIT 4: Networks and the effects of using them Routers - A device that enables data to be sent between different types of networks. Used to connect a LAN to the internet can be connected though cables or wirelessly. It can be used for: - Connecting networks and devices to the internet Storing computer addresses Routing data packets - When a data packet is received, the router checks if it is meant for it or another network. If it’s meant for its own network, it is routed to the local switch/hub. If not, the data packet is sent to the relevant router, which then sends it to the relevant device. Common Network Devices 1) 2) 3) - Network interface cards (NIC): needed to allow a device to connect to the network. Turns binary data into electrical signals that allows network access Usually integrated into the motherboard Each NIC is given a unique hardwired media access control (MAC) address. MAC addresses – a number which uniquely identifies a device when connected to a network Hubs: Used to connect devices together to form a local area network (LAN). It takes a data packet received by one of its ports and sends it all relevant or irrelevant device connected to it. Not very secure Unnecessary network traffic Switches: Used to connect devices to form a LAN. Unlike hubs, the switches store MAC addresses of all devices on a lookup table. So it only senda data to relevant device. In summary: 4) - Both are used to connect devices in LAN. Both use data packets Switches sends data to relevant devices only Switches have better security Switches use lookup tables to determine the destination for a data packet Switches use MAC addresses for relevant device location Bridges: Devices that connect one LAN to another LAN that uses the same protocol. Unlike routers, they cant communicate with external networks, such as the internet. Comparison: - Bridges connect LANs together; routers connect various types of networks together. Bridges scan MAC addresses while routers scan IP addresses Both send out data in the form of data packets Bridges connect networks with the same protocol, routers can connect networks with different protocols Router uses routing tables to direct data packets, bridges don’t - Bridges only have 2 ports, routers have multiple ports WIFI & Bluetooth - Both are used for wireless communication between devices. They both use electromagnetic radiation as the carrier of data transmission Bluetooth uses: - When transferring data between 2 or more devices that are very close together When speed of data transmission isn’t crucial For low-bandwidth applications WIFI uses: - Full scale networks When data transfer rate is crucial For uses where higher range and better security is required Differences and similarities: - Bluetooth uses a transmission frequency of 2.4 GHz, whereas WIFI uses a range of 2.4-5.0 GHz. WIFI has a much faster data transfer rate Wifi has a higher geographical range in which it is effective Bluetooth only allows up to 7 devices to be connected at a time, whereas the number of devices connected to a Wifi network depend on the router/routers being used Bluetooth uses key matching encryption however, Wifi uses WPA (Wifi protected access), and WEP (wireless equivalent privacy) Cloud computing - - This is a method where data is stored on remote servers accessed through the internet The three types of cloud storage are: 1) Public cloud – The customer and the cloud storage provider are different companies 2) Private cloud – The customer and the cloud storage provider are a single organization 3) Hybrid cloud – Combines both public and private cloud options and allows for sensitive data to remain private whilst providing public cloud services for less sensitive information Cloud data is duplicated and stored on other servers to ensure data availability during system failures, upgrades, and maintenance periods. Advantages: - Eliminates the need for a business to purchase expensive equipment for infrastructure and maintenance. Easily available globally allowing both remote working and data sharing. Provides high levels of ensuring that services are always available. A backup of the data from the cloud will allow full data recovery in case of incidents. Files can be synced across multiple devices Eliminates the need to carry storage devices Disadvantages: - A stable internet connection is always required - Data storage in clouds may be vulnerable to security breaches User is dependent on storage provider for reliability and availability of services As the amount of storage or bandwidth required increases, the services may become more expensive over time Common network environments 1) - Internet: The internet is a very large global network that consists of many other interconnected networks The world wide web (WWW) is the vast collection of web pages that can be accessed using a web browser The WWW allows you to access information by using the internet. Characteristics: - It is an open network meaning everyone has access to the same resources and information as everybody else People from all over the world can communicate with each other in real-time Available to anyone who has a suitable device and access to any one of the interconnected networks. Uses: - Education and training Social networking Online shopping Entertainment 2) - Intranet: Usually private and are used to send information securely and safely Access to an organization’s intranet is restricted and only accessible to authorized users such as employees Intranets have many advantages over the internet such as: Better bandwidth than the internet Data is kept within the organization Less chance of hacking and attacks Administrators can manage access to external sites and links Characteristics: - Private network that is accessible to employees within a company or organization Usually behind a firewall to ensure security Allows for document sharing and the use of collaboration tools between users Can be customized to meet the specific requirements of the business Users will require a username and password to access he intranet 3) - Extranet: Private intranet that also allows access by selected parties that reside outside of the organization. These parties, for example, maybe customers, key stakeholders, or clients Users will have an authorization level once they have successfully logged in which will determine which resources they may access Similarities between the internet, Intranet and extranet are as follows: They are all web-based technologies They allow users to access information remotely They all use client server architecture They all use security measures such as authentication and encryption - - They all promote and facilitate information and resource sharing Differences between the internet, intranet and extranet are as follows: The internet is a global network whereas an internet/extranet is a private network contained within an organization The use of the internet covers a wide range of purposes whereas an intranet/extranet is designed for specific users and purposes. Much of the information is publicly available whereas an intranet/extranet is not The internet is not owned solely by one person or organization whereas intranets/extranets are owned usually by the organization Network types 1) Local area Network (LAN): Networks that are usually contained within a single building or small geographical location. - It is made up of hubs/switches which will connect several devices together. 2) Wireless Local area Network (WLAN): Local area networks that allow devices to connect wirelessly rather than using physical cables. - Wireless Access points (WAPs) are connected to an existing wired network which provides wireless connectivity. 3) Wide area network (WAN): Formed by several LANs being connected through a router. - Additional hardware is need for a WAN; Routers, modems and proxy servers Security issues regarding data transfer - Connection to a network exposes a user to: Hacking: Unauthorized access given to computers. Phishing: Involves getting sensitive information such as usernames, passwords, credit card details for malicious reasons by mimicking a reliable webpage Pharming: This is malicious code installed on a user’s computer or on a web server; the code will redirect the user to a fake website without their knowledge Viruses: Program code that replicates with the intention of deleting or corrupting files and causing the computer to malfunction. Passwords - A common form of security and are often accompanied by a username or email address There are many ways to enhance the security of your password such as the following Ensue that the password is changed regularly in that case it has been obtained illegally or accidentally Ensure that the password uses a combination of uppercase, lowercase, numbers, and special characters to make the password more difficult to guess Examples: iloveict (weak), 1lov3ICT# (strong) Antispyware software can be run regularly to ensure that your information including your password is not being passed to an unauthorized third-party user. Other authentication methods 1) Zero-login: It is a security concept that aims to eliminate traditional login methods, such as usernames and passwords, by using biometrics or other authentication factors for seamless and password-less access. 2) Biometric recognition: These methods of authentication use unique physical or behavioral characteristics, such as fingerprints, iris scans, or voice recognition, to verify a person’s identity. 3) Magnetic stripes: These are authentication features on cards, storing data magnetically. They enable secure identification and authorization by containing encoded information that can be read by magnetic stripe readers. 4) Smart cards: Smart cards are portable devices that contain integrated circuits to store and process data. They are used for authentication, identification, and secure transactions in various applications such as banking, telecommunications, and access control. 5) Physical tokens: It is a type of authentication that takes the shape of a real, solid object. The user demonstrates ownership of the token through interaction with a login system. 6) Electronic tokens: These are applications that users install on their hardware, such as smartphones. Anti-malware software - Anti-malware software is designed to protect devices against viruses and malicious software. It has 3 main purposes, detect, prevent, and remove malicious software. It is installed onto a computer system. Common features of Anti-malware software include the following: Comparing the scanned files against a large database of known threats Real time scanning Regular updates to gather an up-to-date list of known threats Quarantine of infected files: Quarantining files allows threats to be automatically deleted Allows the user to determine if the file is a legitimate threat and not a false positive Heuristic Checking: Instead of relying solely on a database of know viruses, this method looks for behavioral patterns and other features in a file to identify possible risks there. Electronic conferencing 1) 2) 3) - Video conferencing: It is a form of audio and video communication. The basic hardware includes: Webcams Large monitors Microphones Speakers The software used are: Webcam and microphone software drivers CODEC (coder and de-coder) Echo cancellation software Audio conferencing: Meetings held using audio technology. The hardware required is: A computer (with build in microphones and speakers External microphone and/or speakers An internet phone A standard phone Web conferencing: often known as webinars or webcasts, makes use of the internet to enable conference calls. It operates in real time, just like video conferencing, and enables the following meeting types: Business meetings Presentations Online education or training UNIT 5: The effects of using ICT - A microprocessor driven labor saving machine enables users to focus on other activities while the machine completes their work. The second generation of devices, which contain microprocessors, are more user-friendly and have more functionality, such as ‘intelligent tuning’ in television sets. Advantages of microprocessor-controlled labor-saving devices: - No need to do manual tasks at home More time for leisure activities No need to stay home whole chores are being done Web enabled devices allow devices to be switched on or off while the owner is out Disadvantages of microprocessor-controlled labor-saving devices: - Unhealthy lifestyle due to inactivity caused by devices doing all the work Tend to make people lazy Potential deskilling Any device containing a microprocessor and can communicate using the internet displays a threat of cybersecurity breaches Health issues 1) 2) 3) 4) 5) - Long term exposure to computing devices may influence user well-being Repetitive strain injury (RSI): A condition effecting the muscles and nerves Cause: Repetitive movements and overuse of muscles, such as wrists Fix: regular breaks, ergonomic equipment, correct typing techniques Back and neck strain: Back pain and other related issues Cause: due to prolonged use of monitors Fix: use adjustable chairs, use footrests, tiltable screens Eyestrain: Strain and fatigue, unwanted harm to vision Cause: due to bad lighting and prolonged screen usage Fix: use LCDs instead of CRTs, regular breaks, use anti-glare screens, regular eye-testing Headaches: pain or discomfort in the head or face area Cause: By incorrect lighting, screen reflections, flickering screens, and so on. Fix: Use anti-glare screens, take regular breaks, regular eye-testing Ozone irritation: inflammation and irritation of the issues lining human airways Cause inhalation of ozone released by laser printers in an office Fix: proper ventilation, laser printers should be housed in a separate room, replace laser printers with inkjet printers, if possible. UNIT 6: ICT applications - Communication media Communication media are the various methods and channels used to convey information and messages between people, organizations, and devices. - Newsletters: Periodic publications, often used to inform, educate, or entertain subscribers about specific topics - Usually distributed through email or as printed copies Suitable for organizations, schools, and clubs to keep members up-to-date - Posters: Visual presentations that convey information or promote events or products Combine text, images, and graphics to grab the attention Used for advertising, public service announcements, and event promotion - Websites: Online platforms that provide information or services Accessible through the internet using a web browser Useful for businesses, educational institutions, and individuals to share information, sell products, or offer services. - Multimedia presentations: Digital presentations that combine various forms of media, such as text, images, audio, and video Used in education, business, and entertainment to present information in a visually engaging way - Audio: Sound recordings, such as podcasts, music, and radio shows It can be streamed or downloaded for offline listening Suitable for providing information, entertainment, or educational content - Video: Moving images with or without sound, used for entertainment, education, or promotional purposes Can be streamed or downloaded for offline viewing Typical platforms include YouTube, Vimeo, and social media websites - Media Streaming: Real-time transmission of audio and video files over the internet Allows users to access content without downloading it to their devices Popular services include Spotify, Netflix, and YouTube - ePublications: Digital versions of printed materials, such as eBooks, eMagazines, and eNewspapers. It can be read on electronic devices, such as eReaders, tablets, and smartphones Offer benefits like portability, searchability, and adjustable text size Mobile communication - SMS messaging: short message service allows sending and receiving text messages up to 160 characters long Phone calls: Traditional voice calls made and received through mobile devices VoIP: Voice over internet protocol enables voice calls over the internet instead of traditional phone lines Video calls: Real-time video conversations between two or more users with a camera-enabled device Accessing the internet: Mobile devices can connect to the internet using Wifi or cellular data Computer modelling - - Computer modelling is the use of computer programs and algorithms to simulate and analyze complex systems or processes. The accuracy and reliability of computer models depend on the quality of input data and algorithms used. Personal finance: Budgeting, investment planning, and financial forecasting Bridge and building design: Structural analysis and simulations to test designs Flood water management: Predicting and analyzing flood risks and mitigation strategies Traffic management: Analyzing traffic patterns and optimizing transportation systems Weather forecasting: Using complex algorithms and historical data to predict weather conditions Advantages Faster calculations and processing Reduced human error and bias Ability to simulate multiple scenarios and test different variables Better visualization of complex data and systems Disadvantages Dependance on accurate input data and assumptions Limited by the quality and complexity of the algorithms used May overlook unique or unpredictable situations not covered by the model Can be expensive and time-consuming to develop, maintain, and update models Computer controlled systems - - Computer controlled systems use computers and software to control, monitor, and manage processes, machines, or devices. The effectiveness of computer-controlled systems depends on the quality of software, hardware, and input data. Robotics in manufacture: automation of production processes using robots (Improves efficiency, precision, and productivity) Production line control: Supervising and managing assembly lines with computer systems (Ensures quality control and reduces human error) Autonomous vehicles: Self-driving cars and drones guided by computer algorithms (Enhances safety, reduces traffic congestion, and increases fuel efficiency) Advantages Increased efficiency and productivity (Due to working 24/7) Greater precision and accuracy Ability to operate in hazardous environments Reduced human error and fatigue Can work large or delicate items Disadvantages High initial investment and maintenance costs Job displacement for human workers Dependency on reliable software and hardware Lack of flexibility and adaptability to unexpected situations Requires costly backup systems School management systems - School management systems are software applications designed to manage various aspects of educational institutions, such as student registration, attendance, performance tracking, and online learning. There are various ways school management systems are used in educational institutions: Learner registration and attendance: Recording and tracking student enrolment and daily attendance. Record learner performance: Monitoring and analyzing student grades, test scores, and overall performance. Computer aided learning: Facilitating online learning resources and activities for students - Advantages of school management systems: Streamlined administration and record-keeping Improved communication between teachers, students, and parents – this can be automated. Centralized access to information and resources Data-driven decision-making and insights for teachers and administrators Information is more up to date Information can be obtained quickly in an emergency Patterns of absence can be found quickly which helps to tackle truancy/lateness. Online Booking systems - Online booking systems are web-based platforms and applications that allow users to reserve and purchase tickets or services for various events and industries Travel industry: Booking flights, hotels, and holiday packages (Provides a convenient platform for travelers to plan and book their trips) Concerts: Reserving tickets for live music events (Allows music fans to secure their spot at concerts) Cinemas: Booking movie tickets in advance (Enables cinema-goers to reserve seats and avoid queues) Sporting events: Purchasing tickets for sports matches and competitions (Offers sports enthusiasts an easy way to attend their favorite events) Advantages Convenience and accessibility (24/7 booking) Instant confirmation and ticketing Ability to compare prices and options Promotions and personalized offers Faster to charge/cancel Automated reminders via email/text Repeated bookings can easily be made Staff are freed up to do other things Disadvantages Potential for technical issues and downtime Possible security and privacy concerns Transaction and booking fees Impersonal and less tailored customer service Internet connected devices required Staff may lose their job Automatic Teller Machines (ATM) - Automatic Teller Machines is an electronic banking terminal that provides customers with access to financial transactions Characteristics and uses of ATMs: Withdrawing cash: Obtain money from a bank account Depositing cash or cheques: Add funds to a bank account Checking account balance: View the current balance of a bank account Mini statements: Obtain a summary of recent transactions Bill paying: Settle utility bills and other payments Money transfers: Send funds to another bank account Advantages Convenient access to banking services Available 24/7 Reduced waiting time Global access to funds Electronic Funds transfer (EFT) Disadvantages Risk of theft or fraud Limited services compared to bank branches Technical issues and machine downtime Fees for transactions at non-network ATMs - Characteristics and uses of EFT: Transfer of funds between bank accounts electronically Utilized for bill payments, salary deposits, and online purchases Utilizes Near field communication (NFC) in contactless payments - The process of EFT: The data is read from the chip (using RFID/NFC if its contactless) The business bank’s computer contacts the customer’s bank’s computer The card is checked if it is valid If the card is valid the transaction continues If it is not valid the transaction is terminated An authorization code is sent to the business The price of the item is deducted from the customer’s account This money is added to the business’ account Advantages Fast and efficient Reduces paperwork Lower transaction costs Disadvantages Risk of online fraud Technical issues Requires internet connections Credit/Debit card transactions - Characteristics and uses of credit/debit card transactions Payment or withdrawal using a bank card Accepted by most merchants and service providers Advantages Convenient and easy to use Widely accepted Secure with fraud protection Disadvantages Risk of theft or loss Potential for overspending Transaction fees Cheques - Characteristics and uses of cheques A written order to a bank to pay a specified amount to a designated person or entity Can be used for various payments including bills, services, and personal transactions. - How do you deposit a cheque at an atm? Customer is asked to enter their debit card in the ATM Customer’s bank computer is contacted The card details are searched in the bank database The card is checked to see if valid, in the date or if it has been stolen The customer is asked to enter their PIN The PIN is compared to the PIN stored on the chip The customer is asked to deposit a cheque The system checks whether the cheque is valid - The cheque is scanned by the ATM Amount is scanned The bank account is checked for sufficient funds The imagine of the scan is saved The customer is asked to select the account to deposit money Money is deducted from the back of the cheque Money is added to the account of the payee A receipt is sent to the printer at the ATM Advantages Secure and traceable No need for physical cash Useful for large transactions Disadvantages Slow processing time Not widely accepted Risk of cheque bouncing Online banking - Characteristics and uses of internet banking: Online access to banking services via a secure website or app Allows for transfers, bill payments, account management and more Advantages Convenience and 24/7 access Easy account management Reduced need for branch visits (saving time and money) Interest rates may be higher Easier to shop around for the best account Disadvantages Security of transactions Requires a reliable internet connection More risk of fraud Easier to make errors (typing in the wrong information) Physical cash can’t be deposited/withdrawn Information systems in medicine - Characteristics and uses of patient records: Digital records of a patient’s medical history Contains personal information, diagnoses, treatments, and test results Used by healthcare professionals for making informed decisions about patient care Characteristics and uses of pharmacy records Records of medication dispensed by a pharmacy Contains patient information, medication details, dosages, and the prescribing doctor Used by pharmacists to track medication history and ensure safe dispensing - Healthcare settings may also use online booking systems for appointments Healthcare professionals may also utilize expert systems to assist with a diagnosis 3d printers in medicine - There are various ways 3d printers can be used - Printing of prosthetics Tissue engineering Artificial blood vessels Customized medicines Internet shopping - Internet shopping is the act of purchasing goods or services online through websites or mobile applications Characteristics of internet shopping: Online stores accessible through web browsers Wide variety of products and services are available Convenient and often open 24/7 Advantages for the customer: Time saving and convenient Greater product variety Customization options Potential cost savings Disadvantages for the customer Security concerns Limited physical interaction Delivery delays and fees Impersonal customer service Advantages to the business Can target prices, products and services at specific groups based on buying data Can update stock availability and prices more quickly than a physical store through their website Cheaper to publicize special offers rather than mail shots International customer base Increased profits due to lower overheads Disadvantages to the business Increased competition Digital fraud and security concerns Technical issues and downtime Costs of Delivery and Returns Customer trust Inventory management Depersonalization Online reviews Dependency on internet infrastructure Logistical challenges Legal and regulatory compliance Increased customer expectations Expert systems - An expert system is a computer program that uses artificial intelligence to replicate the decision-making abilities of a human expert in a specific field Purpose of an expert system Solve complex problems - Enhance decision making Save time and resources Consistency and accuracy Knowledge preservation Uses of expert systems Mineral prospecting Car engine fault diagnosis Medical diagnosis Chess games Financial planning Route scheduling for delivery vehicles Plant and animal identification Career recommendations Components of an expert system - User interface: allows users to interact with the expert system Inference engine: A core component of the expert system that performs logical reasoning Knowledge base: Repository for domain-specific information, facts, and data Rules base: Stores logical rules and relationships governing the domain Explanation system: Provides transparency in the decision-making process - How an expert system is used to produce possible solutions Expert systems use the knowledge base and rules base to analyze input data The inference engine applies rules and logic to the input data The system generates potential solutions or recommendations based on the applied rules The explanation system communicates the reasoning behind the suggested solutions Recognition systems Recognition system Optical Mark Recognition (OMR) Characteristics Detects marks on paper, such as filedin circles or checkboxes Uses School registers, MCQ examinations, barcodes, QR codes Advantages Fast and efficient data collection, reduces manual entry errors Disadvantages Limited to predetermined responses, sensitive to poor marking or smudging Optical Character Recognition (OCR) Converts printed or handwritten text into machinereadable text Automated number plate recognition (ANPR) systems Speeds up data processing, reduces human errors Radio Frequency Identification Device (RFID) Uses Radio frequency signals to transmit data stored on a microchip Enables short-range wireless communication between devices Identifies individuals based on unique biological traits Tracking stock, passports, automobiles, contactless payment. Payment using a smartphone Fast and efficient data transfer, can be read without a direct line of sight Near field communication (NFC) Biometric recognition Face, iris, retina, finger, thumb, hand, voice recognition Convenient and secure, allows for contactless transactions Highly secure, difficult to forge or replicate Can struggle with different fonts or handwriting styles, sensitive to image quality Limited read range, can be susceptible to interference or hacking Limited range, compatibility issues with some devices Expensive technology, privacy concerns, potential false positives or negatives How does RFID work? - - - RFID tags: RFID stands for Radio Frequency Identification. It refers to a technology that uses radio waves to identify and track objects. This system includes RFID tags, which can be attached to objects and contains information about them. Components of RFID tags: RFID tags consist of an integrated circuit (IC) and an antenna. The IC is responsible for storing and processing information, while the antenna receives and transmits the signal. Passive RFID tags: Passive RFID tags do not have a power supply. They get their power from the electromagnetic energy transmitted by the RFID reader When the RFID reader emits radio waves, these waves are picked up by the passive tag’s antenna The energy from the waves is converted into electrical energy, which powers the IC The IC then transmits the stored information back to the reader via the antenna, again using radio waves. Active RFID tags: Unlike passive tags, active RFID tags have their power source, which is usually a battery. This allows them to broadcast a signal to the reader actively, making them more powerful and capable of being read from a greater distance Active tags emit a signal which is picked up by the RFID reader. They don’t require the reader’s signal to activate them, unlike passive tags. Communication with RFID reader: The RFID reader emits radio waves, which are either captured by the passive tag or interact with the active tag’s signal. The reader then receives the information transmitted by the tag’s IC through the tag’s antenna. This information can be used to identify and track the tagged object What is Near field communication? - - It’s a technology that allows two devices to communicate when they’re very close together, typically within a few centimeters. This is the same tech that allows you to make payments by tapping your phone or card on a payment terminal. Two modes of operation: - - NFC works in two modes – reader/writer mode and peer-to-peer mode. Power source: NFC devices can be either passive or active. Active devices like smartphones can both send and receive data. Passive devices, like NFC tags, don’t have their own power source and can only send data when they come close to an active device. Communication: Communication between NFC devices happens through radio waves. When two NFC devices get close, one sends radio waves that the other can pick up, allowing them to exchange information. Usage: NFC enables payment for things at the shop by tapping a phone on the terminal, sharing files by bringing two phones together, and use a phone as a bus or train ticket. Security: Because NFC only works over a short range, it’s generally secure. But it’s always good to be aware that any wireless communication could potentially be intercepted, so it’s important to only use NFC for secure transactions with trusted devices. Satellite systems - Characteristics Orbiting objects that receive, amplify and transmit signals Use radio frequencies to communicate with ground stations Require line of sight between satellite and receiver Uses: Determine location, speed and time using satellite signals Provides turn by turn directions for travel Collect, analyze and display spatial data Media communication systems Satellite navigation How does Satellite navigation work? The position/location of the car is calculated using GPS Data is transmitted every few seconds An algorithm calculates the speed/location of the car The map is updated every few seconds Advantages Wide coverage area Real-time data transmission Improved communication in remote locations Accurate location tracking Disadvantages Expensive setup and maintenance Signal interference due to weather or obstacles Limited bandwidth and capacity Privacy concerns and potential for surveillance UNIT 7: The systems Life cycle What is the purpose of system analysis and design? - It’s the process of looking at an existing system and then re-design it to make it better (carry out the same tasks better) What is the ‘System Analysis’ part? - This is where the existing system is looked at in detail and improvements are made. What is the ‘Design’ part? - This is where detailed plans are created for the proposed new system. Six stages of systems analysis and design? - Abbreviated to ADDIDE - Analysis: Look at the existing system and find improvements - Design: Plan the proposed new system - Development and Testing: Create the new system and test it - Implementation: Place the new system into the company - Documentation: Create user-guides for everyday users and those who may develop it further - Evaluation: Decide how well the new system is working DESCRIPTION NAME OF THE STAGE a) Examining the existing system and looking for improvements b) Installing the new system into the company c) Putting data into the new system to check to see if outputs are correct d) Planning the new system e) Considering how well the new system Is working f) Producing different guides that explain how the new system works Analysis Implementation Development and testing Design Evaluation Documentation Stage 1- Analysis What is analysis? - This is where the current system is looked at in detail in order to figure out the requirements for improving the new system. What does analysis involve? - Typical analysis would involve the following: - 1) Collecting data about the current system - 2) Find out problems with the current system - 3) Establish the problem that the customer needs solving - 4) Identify inputs, processing and outputs of the current system - 5) Identify the requirements of the new system - 6) Producing a cost-benefit analysis How is this data obtained? - Finding out information about the current / proposed system Is known as ‘fact finding.’ - There are four methods which are used to obtain this information: - Questionnaires - Interviews - Observing people using the current system - Looking at the current system’s documentation Questionnaires - Prepared questions are given to users of the system and they are left with the user to complete. advantages Questions can be answered quickly Answers are more honest Fairly cheap Can be analyzed automatically using an OMR disadvantages People do not complete or return it Unclear questions cannot be explained You may get incorrect data Hard to ask very technical/specific questions Interviews - Interviews take place face-to-face and usually involve more detailed questions than questionnaires. Advantages Questions can be explained More complex questions can be asked Questions can be changed Full set of data Disadvantages Takes longer to complete Expensive Answers may not be honest Observations - This is where a systems analyst sits and watches somebody using the current system. - They can log or make notes about different factors. Advantages Analyst can see exactly where the system lacks Disadvantages Person being watched may feel uncomfortable and may work in a different way Not expensive Looking at the current system’s documentation - This involves looking at paperwork for the current system - It’ll contain information needed to implement the new system Advantages Could save time Can see existing inputs, processing and outputs Analyst can predict the size of the system needed Disadvantages Very time consuming Very expensive Time could be wasted if documentation isn’t relevant Stage 2 – Design What is systems design? - Where the new system is designed how it’s going to look and work What is included within these designs? - Designing data entry screens - Designing user-interface layouts - Designing printed outputs - Designing screen-based outputs - Designing structures to store data - Designing data validation methods - Designing data verification methods Designing system validation - Validation is where a computer system checks that data entered by the user is sensible and usable Validation check Description Checks that data has been entered and not missed out Checks that the correct number of characters has been entered Performed on numbers to check they are within certain ranges Performed on numbers to make sure that data is not above or below a specific limit Makes sure that data is in a specific format Checks that entered data does not contain invalid characters Makes sure that data in one field is consistent with data in another field Presence check Length check Range check Limit check Format check Data type check Consistency check Designing system verification - Verification is a way of making sure that data being entered into the system exactly matches the source of the data Verification check Double entry Visual check Description This is where data is entered twice by two different people. The computer compares the two entries and lets the user know if it finds any differences. This is where the person entering data carefully compares what they have entered with the original document. Stage 3a- Development of a system What is systems development? - It means to ‘build the system - When analysis and design have been completed, there will be lists of requirements and sets of designs that a developer can follow. What are the stages of development? - Creating a file structure to store data - Create validation rules - Create a user-interface - Create output formats Creating file structures to store data. - Systems that are required to hold data need to use file structures - How the data is stored are made up of 4 parts: - Tables - Fields - Field properties - Records Creating Validation rules / Checks - Validation checks will have been thought about and decided on during the design stage. - Validation checks are testing in 2 ways: - Entering data that should be accepted - Purposefully entering data that shouldn’t be accepted Creating Input Methods - user-interfaces must be created to allow users to input data into the system What are form controls? - Forms controls are the items on a data entry form that allow you to interact with the system and enter data. - They include: - Text boxes - Option buttons - Check boxes - Combo boxes - Command buttons Creating Output Formats - Two types of system outputs must be created: - On-screen outputs - Printed outputs Stage 3b – Testing Testing individual modules of the system - when each module of the system has been created, it must be tested to make sure that it works correctly. - Examples of modules that should be tested: - Data structures - Validation rules - Input screens - Output screens - Testing individual parts of the system is known as unit testing Using a test plan - Testing a system involves creating and using a test plan Testing with normal, extreme and abnormal data - A test plan should always use 4 types of testing data: - Normal data - Extreme data - Abnormal data - Live data Test Data to test the system before it was delivered to the customer. Types of test data Normal data Extreme data Description Data which should be accepted and pass the test without any problems Data which is on the border of what the system will accept Example The numbers 1, 2, 3, 4, or 5 should be accepted The numbers 1 and 5 would be used to test the borderline data Abnormal data Data that should not be accepted by the system Examples of data that should be rejected could be 0, 6, Hello, etc. Test data to test the system after it was delivered to the customer. Type of test data Live Data Description Data that is used in the customers company Example Once installed into the customers workplace, all modules would be tested with real-life data that the company uses. Stage 4 – Implementing a system. - just means to ‘install’ the system ready for use. Staff training Transfer files from existing system to the new system Staff must be able to use the new system before it is fully installed If the old system was paper based, existing paper files will need to be scanned and then input into the new system. If the old system was electronic based, existing files will need to be either: - Typed manually into the system database - Downloaded into the new system Changing over to the new system - Once staff are fully trained, it is time to changeover from the old system to the new one - Changeover means to switch from the old system to the new, which could be done in 4 ways: - Direct changeover - Parallel running - Pilot running - Phased implementation Direct changeover - With this, the old system stops getting used one day and the new system starts. - The changeover is very fast. Advantages Fastest way Can be used immediately Cheap Less chance of the new system being faulty Disadvantages Staff must be trained Time consuming Data can be lost permanently Hard to plan Parallel running - With parallel running, the old system and the new system are run alongside each other - Data would be input into both the old and new system, producing 2 sets of data. Advantages No data will be lost Disadvantages More expensive due to running costs of two different systems Staff can be trained gradually Good way to test the new system using live data Pilot running - Implementing a system using pilot running means to introduce the system to one part of the company, then spreading it to different departments. - The term ‘pilot’ can be defined as ‘to experiment or test before introducing something more widely’ Advantages If the system is faulty, it affects one part of the company Smaller scale and easier to manage Staff can be trained gradually Cheaper than parallel running Disadvantages Longer to implement Database can lose data if system fails Phased Implementation - This type of changeover is where the new system is implemented one part at a time, in phases. - sometimes replacing an old system in this fashion is known as ‘phasing it out.’ Advantages Staff can be trained gradually Its easier to find system errors If one part of the new system fails, the old data is still accessible. Disadvantages More expensive More time consuming It can be split into separate parts Implementation method Direct changeover Parallel running Pilot running Suitable situation to use each method Best where you want a quick changeover Departments where you can’t afford to lose data Important department that must not lose any data Organizations that can’t afford to lose data and can afford the time and cost of a slow changeover Phased implementation Stage 5- Documentation What is system documentation? - It explains how the system was created and how to use it - Two sets of documentations are produced for a new system: Technical documentation Produced for the benefit of future developers of the system. It explains how the system was developed and includes information such as hardware and software requirements. For the benefit of the intended users of the system This explains how to use the new system and will include information such as how to log into the system. User documentation Technical Documentation Why is technical documentation needed? - For the benefit of analysts, designers and programmers - It explains exactly how the system was created What is included in technical documentation? - The purpose of the system - Hardware requirements - Software requirements - Memory (RAM) requirements - User-interface designs - input formats - output formats User documentation Why is user documentation needed? - User documentation is created for the benefit of anyone who is expected to use the system - It explains exactly how to use the system What is included in user documentation? - The purpose of the system - Hardware requirements - Operating system required - How to open/load in the system - How to sort data - How to print files - How to amend data Stage 6- Evaluation - The final stage of the systems life cycle is to evaluate its impact and effectiveness Why is it important to evaluate a system? - Systems are evaluated in order to determine if: - The system is doing the job it was designed to do - The system is working well with minimum errors - Staff can use the system properly What does an evaluation look for? Is the system effective? Is the system easy to use? Is the system appropriate? - Does the system work fast? - Does the system run smoothly? - Does the system reduce paper waste? - does the system have a user-friendly interface? - can everyone use the system easily? - Can the system be used with minimal training? - Does the system perform the job it was designed for? - Are the clients happy with the system? - Is there anything the system can’t do that it should? How is an evaluation carried out? - The answers to the above questions would be determined by carrying out a detailed evaluation - The analyst would evaluate the system by completing a series of tasks like: Comparing the system against the initial requirements Evaluating user’s experiences The analyst will compare the completed system to each of the original requirements Users of the system will be asked their views about the performance. - Do they find the system easy to use? - Does the system help them do their job? - Have they experienced any errors or glitches? Identifying limitations of the new system Identifying system improvements After evaluating the system, the analyst will make a list of system limitations. Based on the list of system limitations, the analyst will recommend improvements that need to be made Final improvements - After evaluation has been carried out and the system’s success has been determined, it could be necessary to carry out some changes. - These could include: Error correction Add functionality Performance improvement Any limitations and errors identified during evaluation will be fixed and tested Users of the system may ask for extra functions to be added in order to improve performance Hardware or software may need to be upgraded. - Hardware- Larger HDD, faster servers - Software- system code changed to remove bugs, etc What happens next? - After evaluation and improvements have been carried out, the system’s analyst will start the whole process again from the beginning. - The new system will be re-analyzed - Updated requirements specifications - New designs with improvements - These improvements will be developed into the system - Improvements to the system will be tested, installed and then evaluated.