Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor IGCSE ICT 0417 Quick Revision Paper 1 Theory By : Mr. Ayman Al-Nahhas Cambridge ICT Tutor www.etoptutor.com |Page1 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor |Page2 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 1 Type of components and computer system x Hardware : is a Physical Components that makes a computer system x Software : is a general term of Programs that control the computer system and processing data. x Types of software: ( applications and system) x Motherboard: Printed circuit board in all computers, All components plug into the motherboard, It allow the processor and other hardware to function and communicate with each other, It is central to any computer system x CPU is Central processing unit, is a brain of the computer consist of Control unit , Arithmetic and logical Unit ( ALU) , Immediate access store ( IAS) x CPU Interprets, execute the commands x and handle calculations, data processing and movement data to and from system memory Random access memory (RAM): temporarily, Written and Read, Content lost when computer is turned off , Volatile Read only memory (ROM): permanent, Only read , Data can' t be changed or lost, Non-volatile , to store BIOS instructions Video card : allow the computer to send graphical information to video display Sound card : to produce sounds x Internal Hard Disk Drive (HDD): Main internal storage , fast data x x x transfer, Magnetic in nature |Page3 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Application Software: Program that allow the user to do specific task x Word processor: software to manipulate text documents, ( create, save, edit , copy and paste, importing photos, translate ) x Spreadsheet : software to manipulate numerical data in columns and rows, use formula to carry out calculations, create graph and modeling the calculations x Database: software to organize, manipulate, analyze data, carry out query, modify data and create report. x Control and measuring software : designed to allow a computer or microprocessor to interface with sensors x Apps ( applications) software: run on mobile phones or tablet x Photo editing software : software allow editing digital photo x Video editing software: software allow to manipulate videos x Graphics manipulate software : software allows bitmap and vector images to be changed System Software: Program that allow the hardware to run properly and allow the user to communicate with the computer x Compiler : computer program that translate program written in high level language as a whole into machine code x Interpreter: computer program that translate program written in high level language ( step by step ) x Linkers: computer program to combine object files to a single program the linker put all together. x Device driver: software that enable one or more hardware device to communicate with the operating system x Operating systems (OS): software running in the background of a computer system, OS allow: Input. Output operation, User communicate with the computer, Error handling, Managing of security |Page4 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Utilities: software to carry out specific tasks on a computer, (Antivirus, Anti-spyware, Backup files etc.. ) x Internal hardware devices : CPU, Internal HDD, RAM, ROM x Boot files : Code tells the computer what to do when the first start up referred as BIOS x BIOS: Basic input/output system. x CMOS : Chip that BIOS stored the data ( date & time and system configuration) non-volatile Operating systems: Command line interface (CLI) example DOS – used by programmers, analyst, somebody need direct communication with the computer Graphical User Interface ( GUI) example Windows – used by end-user who doesn’t need to know the computer works x Types of computers : PC ( Desktop computer ) , Laptop computers, Tablet computer, Smartphone, Smartwatch , Mainframe computer x Mainframe computer : can have several CPUs, very fast processor , have Multiple operating systems, huge storage capacity, huge internal memories and using time sharing or batch processing x Artificial Intelligence (AI) : use to enhance video games, in expert system, to make robots , Understanding different languages x Biometric : including Finger print , Retina , Iris, Face and Voice x Quantum cryptography: Cryptography is the science of making a message unintelligible to any unauthorized user, use of photons (light) , message encrypted x Computer-assisted translation ( CAT ) : computer software to help in translation process |Page5 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x 3-D and holographic imaging : Technology makes images appear as 3D x Virtual reality : create an artificial environment that users can interact with , help in architects, train pilot , train surgeons and play games x Equipment of Virtual reality : Eye goggles – gloves –headphones – powerful computer |Page6 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 2 Input and output devices • Keyboard : Input of data into applications software and typing commands to the computer • Ergonomic keyboards : Designed to reduce the health-related problems • Concept Keyboard : Used in fast-food restaurants • Numeric keypads : to enter numbers only ( ATM – Mobiles – POS – Chip & Pin) • Mouse : Opening, closing , and minimizing software, grouping ,deleting files • Touchpad : Pointing device in laptop • Tracker ball: Used in applications , control room and luxury cars • Remote Control : Televisions, satellite systems, Control multimedia systems • Joysticks: Used in video/computer games nad simulators • Touchscreens: used in ATMs , POS, Airports, railway stations, tourist offices and used as output • Scanners : two types ( Flatbed scanner & Barcode scanner) • Digital Camera: Directly reading the memory card. • Video cameras : DV (digital video) camera, They store compressed photo frames at speed of 25 MB per second know as (MOTION JPEG) • Microphone : Sounds converted from analogue signal into a digital signal |Page7 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Sensors : is a device inputs data to a computer, ADC to convert the signal and types incudes (temperature, pressure, light, sound, humidity/moister, Proximity and pH • • • Graphics tablet : produce freehand drawings Webcams : used in video conference Light pens : contain sensors that send signals to a computer Direct data entry (DDE) devices: • Magnetic stripe readers : used On credit/debit cards for use at ATMs or EFTPOS, Security devices • EFTPOS : Electronic fund transfer at point of sale • Contactless card readers : allow customers to pay for items without entering their PIN • Chip and PIN readers: used in Payments (restaurants, supermarkets, travel, etc.). • RFID : Radio frequency identification readers, made up of two components ( a microchip and an antenna ) used in admission passes, libraries, retail and livestock tracking • MICR : Magnetic ink character recognition/reader : Read characters printed in a special ink (banking operations ) • OMR : Optical Mark recognition / Reader : Read marks written in pen or pencil used in questionnaires, multiple-choice , examination papers .. • OCR : Optical character recognition/reader : Processing of passports and identity cards, converting printed documents to an editable electronic format, read car number plate • Barcodes reader: to read barcode, used in supermarkets, libraries, electrical equipment .. |Page8 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Output devices • CRT monitors : Cathode ray tube (CRT) monitors, viewing angel better than most of TFT monitors • Thin film transistor (TFT) monitors : Made up of thousands of tiny pixels • Multimedia projectors : used in training , presentation or home cinema • Laser Printers : High quality, low noisy, Fast, long time toner, but produce ozone or volatile organic • Inkjet printers : low volume, high quality, cheap, but slow and not for large job • Dot matrix printers: impact printer, slow, noisy, cheap, use continuous carbon copy paper use ribbon not ink • 3-D printers : to produce solid objects ( like ,, artificial organs, prosthetics, medical products ,tissue engineering, artificial blood vessels, designs of medical tools • Speakers : Output sound Control Application • Actuators : Used to take signals from a computer and convert them into a form of motion and connect to one of the following: • Motors: Turned on or off by the actuator, used in automatic washing machines, cooker, water pump, automatic glass house. • Buzzers: Turned on or off by the actuator, used in cooking process |Page9 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Lights : to turn lights on or off , used in security lights , glasshouse • Heaters: to switch on or off, used in automatic washing machine, temperature control, heating system.. | P a g e 10 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 3 Storage devices and media Why back up data: To safeguard against loss of data / damage caused by hackers / use the files elsewhere / protect data files from virus Serial access: start from the beginning of the file then access to each record / in magnetic tap / very slow form of data access Direct access: Used with magnetic disks, optical media and solid state media / used in real time access (online systems or automatic stock control Secondary storage media: measured by KB, MB, GB, TB Three different types of storage media: Magnetic, Optical and Solid state Magnetic storage media: x Fixed/internal hard disk drive (HDD): to store operating system / applications/ data/ files / very fast / large capacity x Portable hard disk drives : using USB, to transferee data between computers / very fast / large capacity / damaged if dropped x Magnetic taps( Serial access): use batch processing (clearing bank Cheques ) , ( utility bills ), for long term backup/ huge data storage | P a g e 11 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Optical storage media: x CD/DVD- ROM : use Laser light is used to read data and to write / used to store music files, software, computer games / to record / the data transfer slower than HD x CD/DVD – R : for home recordings of music (CD-R) and films (DVD-R) x CD/DVD RW : to record TV programs , can be written many times x DVD RAM : To record satellite receivers to allow recording and playback x Blu-ray disk : use blue laser technology, use for home video, very fast, large capacity, encrypted but expensive, fewer movies formatted with Blu-ray Solid State drives (SSD) ( direct access ): More reliable / Lighter / lower power consumption, / very thin / data access faster than HHD x Memory sticks/pen drives: to transport between computers / backup / very compact / robust /easy to lose x Flash memory card : used as mobile memory cards/p3 player/ compact / robust / limited life / | P a g e 12 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 4 Networks Computer Network: A network is two or more computers or other device connected together so that can exchange data Advantages of using Network: easily share files / data / printer / internet/communicate with other users/store data on one file server/setting is centrally Disadvantages of using Network: risk of hacker / virus / if server is down can't use computers/ printer developing / equipment is costly Network devices: x Hubs: to connect computers/devices to make LAN / poor secure / suitable for home network x Switches : to connect number of computers / devices to make LAN / more secure / used in office/ school/ large network x Modem : to convert analogue signal from telephone line to digital signals and vise verse x Bridges : devices that connect one LAN to another LAN that uses the same protocol x Router: connect computer / network to internet / connect LAN network together / transfer data between networks x NIC : Network interface cards allow to connect device to the network x Network cables: data transfer faster than WiFi / more secure than WiFi | P a g e 13 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Gateway : network point that acts as an entrance to another network Internet Protocol ( IP ) address : uniquely identifies the connection of network , its address of computer when connected to internet as form 109.108.158.1, assigned by ASP MAC address: to ensure the physical address of computer. It uniquely identifies the devices on a network WiFi : use radio signals / easier to connect many devices / up to 100 range /reduce cost of cabling / limited area / signal strength is weaker / easier to hack -less secure / signal can interfere from other devices Bluetooth : use radio signal / devices should close to a computer/ transferring files between computers / very slow data transfer/ short distance up to 30 M / no password required – less secure / low bandwidth/ supporting to limited devices. Configuring small network : setup an account with ISP/ setting IP to connect to internet / buy hardware and software / configure hardware and software/ put all software in the server with its license / setup privilege/ setup network manager Hardware required for small network: Router/ (switch - hub) / Network cables/ Firewall / server Firewall: it can be hardware of software, to protect the network against hacking Server : to manage network functions ( network security/network file storage/ share recourses , etc) | P a g e 14 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Software required for small network: web browser / E-mail / security package ( AntiVirus / AntiSpy ) Local area networks (LANs): for small area/ one building / connect through hub/switch / share resource / communicate between users / control and monitor the network activities / easier to spread viruses/ security risk Wide area networks (WANs) : computer in long distance / joining several LANs/ as example of internet Wireless LANs (WLANs) : no cables/ devices connected wireless / better than running long cables / share resources / more flexible / security big issue/ affect signal problem / transferring data slower than wires Accessing to the internet: x Laptop : more portable / small size compare to desktop/ bigger screen compared with tablet of mobile phone / touch pad difficult to navigate webpages/ processor not fast x Desktop : internet stable / easier to navigate webpages by using pointing devices / should connect to power supply / not portable x Tablet/ Mobile : more portable than laptop and desktop / mobile easy to carry / everyone have mobile all the time / signal strength depend on location / screen is small / not all website can used by mobile or tablet / touch screen can be difficult to use / limited battery life. | P a g e 15 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Internet : Public / network of networks / global / lot of information / browse webpages / send and receive email / communicate using VOIP / web conferencing / playing multiplayer games / streaming video and audio / online shopping and banking x Intranet: Privet (one organization) / can be policed- managed / more secure / data more reliable / data is relevant to organization/ viewing internal webpage / internal email between workers/ sharing internal documents x How hackers affect data and network: DATA can be deleted or edited/ corrupted/ replicated / passed to others / accessing to email / carry online banking NETWORK can be shutdown / infected by virus / stop production x Should internet policed? : To protect vulnerable users access to undesirable websites/ prevent illegal material / stop incorrect information being published/ but extremely difficult and expensive to police internet / difficult to push roles in all countries / against freedom x Reliability of information: up-to-date / easier to get / big amount of information/ also may incorrect / may get millions of hits due to hard to get relevant information x What is Authentication: technique to ensure only authorized users are able to gain access to the network via Username/Password or Biometrics, Magnetic Card, Digital Certificates? | P a g e 16 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x ID and password as authentication method: can be (guessed if week password / seen by others / stolen / spyware can get it / hacked x How to protect your password: run Antispy software / change password x Strong password: 8 characters / one Capital letter / one numeral value / one keyboard character x Virus: piece of programming code/ software / can install / replicate itself without the user’s permission - due to computer crash (slower) / delete files or copied by hackers / can stop production x What Antivirus software do : check software or files before running or loaded / indicate a possible virus / infected put into quarantine to automatic delete or ask to make the decision about deletion/ should be up-to-date / system should full check once/week x Encryption: process of converting information into meaningless / Data is encrypted / prevents people from understanding and reading the data / Decrypt to understand the data x How to avoid virus and spyware /using internet: Don't (download files from unknown source / install illegal software / click any unknown like within a website / ensure antivirus up-to-date / look at https or padlock of the website x Data Protection Act ( DPA) : most of countries have DPA / 8 principals for DPA -- Data must be ( lawfully / stated purpose / | P a g e 17 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor adequate, relevant and not excessive / accurate / no longer than necessary / accordance with the data subject's rights / kept secure / be transferred to another unless have adequate protection. x Network communication: 9 Physical Faxing : Require fax machine / telephone line / recipients should be dialed before sending / can be printed and signed / but any one can access to fax / out of paper or toner 9 E-mail : multiple attachments / multiple recipients / received instantly / use any plat form/ attachment can include virus or spam or phishing email 9 Electronic fax : through internet / no need fax machine / no ink / no paper / from any location have net / no extra cost x Video conferencing: video and audio / for business meeting / hardware is ( Web camera – screen / monitor / speakers / Microphone ) easier to communicate with experts / hold meeting within short notice / No cost ( travelling – accommodation – transportation ) useful for unsafe places / but internet can affect quality / setup cost / lack personnel contact / problem with different time zone / signing document problem x Audio conferencing: over the telephone network using VOIP / need Telephone VIOP / Microphone / speakers x Web conferencing: using internet connection / hardware is (web camera – screen – microphone - speakers) / similar to video conferencing / participant joining to meeting through link received by email / instant SMS available and have permission to speak and share | P a g e 18 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor | P a g e 19 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 5 The effective of using ICT • Advantages of robots over humans: Higher productivity, More consistent results, Work non-stop without breaks, they don’t get bored by repetitive tasks, they don’t go on strike. • Disadvantages of robots over humans : Expensive to purchase and setup, need to be reprogrammed for every new task, production errors may occur • ICT New job opportunities : Network managers, Computer technicians, Website designers, Systems analysts, Programmers, Computer engineers, Delivery drivers • Part-time working: any one can work part time than full time • Flexi-time working: ability when can start and finish • Job sharing: Ability to share time between 2 workers , one morning / one evening • Compressed hours : Worker work 40 hours in few days like 4 days • Robots for production : Spraying the bodies /paint, Assembly bodies parts / Assembly the engine and transmission / Fitting the windscreen • Advantages of robots : Higher productivity / More consistent results / Work non-stop / repetitive tasks without boring / don’t go on strike. • Disadvantages of robots : Expensive to purchase and setup first time /need to be reprogrammed for new task /production errors may occur • Microprocessor – controlled device in the home: Is a device that uses computer to control its functions, | P a g e 20 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Two categories controlled device in the home (Labour – saving devices and Other type of devices) • Labour – saving devices: Automatic washing machines /Microwave ovens / Cookers / Automatic dishwashers / Robotic vacuum /cleaners / Bread making machines / Smart fridge and freezer • Other type of devices : Alarm clocks / Television sets / Central heating and air conditioning systems / Home entertainment systems • Advantages and disadvantages of microprocessor-controlled laborsaving devices ( check note ) • Advantages and disadvantages of other of microprocessor-controlled devices ( not related to lifestyle ) | P a g e 21 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 6 ICT Applications Communication applications: x Using word processor or desktop publishing: create flyers / posters / brusher / leaflet / Newsletter : Open word processor or DTP, create frames / text box / import photo / edit the photo x Websites : for advertising / communicate with clients / easily update / up-to-date information / online shopping / research / social networking / online banking / include ( video – sound – navigation buttons – it counter ) but can be hacked / risk of pharming / maintain expensive / not target audience x Multimedia presentation : use animation / video / sound / more interesting x Music / Cartoons : software to create and edit sound and 3D animation x Mobile phones : Mobile phones / text message / intent telephony (VIOP) x Business card and letter head : using for branding and awareness x Data handling applications : surveys / address lists / clubs/ society records / schools records / school libraries Measurement applications: x Using sensors / Data convert (ADC) | P a g e 22 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Sensor examples : Weather stations / Scientific experiments / Measuring a patient’s vital signs on a hospital / Pollution monitoring / Burglar alarm systems • Weather station : can measure Rainfall / Temperature / Wind speed / Wind direction / (Barometric) pressure ( air pressure ) /Humidity • Why use computer for measuring : No break / more accurate / reading frequently / data can analyzed / create automatic graph / work in dangerous places/ people can work while system working • Measuring a patient's vital signs in a hospital: sensors can read pulse rate, heart rate, temperature, blood pressure, respiration • How Measuring works ( data from the sensor converted into digital using ( ADC ) / data stored in a computer / compare the data with pre-set values / create graph / or readout / alarm activated if data is outside acceptable values / the system continue to read . • Measuring application In a river : Sensors place in 2 different places / data converted using ( ADC ) / computer store data in the computer / oxygen and acidity level compared • Microprocessors in control applications: Automatic washing machines / Automatic ovens/cookers / Central heating systems / Chemical plants (Petrochemicals) / Glasshouse environment control / central heating system / chemical process control • Glasshouse environment control : five sensors (Humidity, Moisture, Temperature, pH and Light ) used to control the glasshouse • Turtle graphics : forward x / Backward x / left d / right d / repeat n / endrepeat / pebup / pendown • Modeling applications : Spreadsheets / Flight simulator / building simulator / traffic lights | P a g e 23 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Robotics with manufacturing applications : Robotics used in paint / spray car bodies / welding body of cars / manufacturing microchips and electrical goods • School management systems : registration of attendance / student performance / organize school exam / create timetable / teacher substitution / traditional way / method 1 - using ID card / method 2 – using finger print • Student performance : grades / behavior / reports • Exam timetables, subject timetables and teacher substitution : all can be created • Booking systems : in transport ( flight – train – buses ) | entertainment ( Theater – cinema – Stadium ) | Accommodation ( Hotels – Apartments – Villas) • Advantages of booking system: Prevent double booking – immediate feedback - booking anytime - receive special offer – no printed ticket – through mobile phone – confirmation message. • Disadvantages of booking system: setup and maintenance is expensive / need internet / difficult to cancel booking / no personal relation / web site should organized well • Automatic teller machine : used for cash withdrawal / deposit / checking / printing statement) • Advantages of Internet banking & online shopping : reducing cost / no need to travel / product cheaper / suitable for disabled and elderly people / no face to face discussion / saves time / save money -no more staff • Disadvantages of Internet banking & online shopping : possible isolation for people / lack of exercise / should have computer / no picture of goods / no body in the street / money transfer mistakes | P a g e 24 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Chip and Pin : Many credit cards equipped with Chip & Magnetic strip which have key information like PIN • Clearing of check: a process whereby funds move from one account to another to settle a check payment. The amount is usually credited to the bank account of deposit and an equivalent amount debited at the bank from which it is drawn • Electronic Fund Transfer (EFT) : allow money to be transferred electronically from one account to another ( example, when an employer pays their employees their salaries • Expert systems : used in diagnosing person illness / Finding car faults / help to discover locations to drill for water or oil / strategy games / identification of plants – animals – rocks / Road scheduling / financial advice • Elements of expert system : inference engine user interface – knowledge base – • Using expert system : user asking/answering a questions / search in knowledge base / provide answer or advice • Setup expert system : data collected / create knowledge base / design rules base / design user interface / develop explanation system / design inference engine / interview experts to evaluate effective of the system • Computers in medicine : Patient and pharmacy records / Monitoring patients ( heart rate / respiration / brain activity / body temperature / blood pressure / blood sugar level / oxygen level in blood ) / using expert system to diagnosis illness / using 3D printer in medicine • Using 3D printer in medicine : Surgical and diagnostic aids / Prosthetics / Tissue engineering / Design of medical tools and equipment | P a g e 25 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Computer in libraries : keep track with books / database store book and members through two files / On daily bases the borrower's file is reviewed by the computer • Computers in the retail industry : Automatic stock control system / Electronic fund transfer / 3- Internet shopping • Using barcode in control stock level : barcode scanned / manual entry / search until to find the record / product details are read / stock level reduced 1 / new stock level / item is flagged / automatically re-order if the level less than re-order level • Barcode used in different applications : library book system / administration system / passport / id cards / burglar alarm system / automatic stock control system • Recognition system : MICR / OMR / OCR / RFID / Sensor plats / MCQ • Automatic Number Plate Recognition (ANPR) System : Sensor detect vehicle / send signal to microprocessor / camera to capture image of the vehicle / isolate number plate / plate is adjusted / number plate is segmented / character recognized by OCR software / text nor is editable / text string stored in the database / car park barrier is raised / ticket is issued / driver returns to the car park / the payment registered / the driver exit and again read number plat • Monitoring and tracking systems : Monitoring /tracking a member of the public / Cookies / key logging / Employee call monitors • Satellite systems: Global positioning satellite (GPS) systems / at least 3 satellite visible / determine specific location in ships, cars, plans, walkers, runners. • GPS advantages: NO paper maps to carry / re-rout / warn from camera / estimate the arrival time / locate petrol station. | P a g e 26 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Geographic information system (GIS) : is a computer system that allows us to map, model, query and analyze large amounts of data • Media communication systems: Communication media is the methods of delivering and receiving information using telecommunication. | P a g e 27 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 7 Systems Life Cycle x Stages of system analysis : analysis / design / development and testing / implementation / documentation / evaluation x Analysis stage ( researching in existing system ) : it can be through Observation / Questionnaires / Interviews / looking at existing system x Data flow diagram DFD : showing the data flows input and output requirements, processing and type of data storage needed / user requirement from the new system / suitable hardware and software x Design stage : design a new system based on the information from analysis system x Data capture form : paper based form or screen form must include | clear heading / instruction / text box to collect information ( name – date of birth – gender … ) , tick box to keep choice easier, clear font, sufficient space or each filed) x On screen form should have: appropriate spacing between each filed / not too much white space/ readable font / suitable font size / font color suitable with background color / drop down menu / tick box / radio buttons / no overlapping / navigation buttons / save & close buttons ( may in exam asking to evaluate form design or create simple design ) x When you create database you should consider: data type / tables and relationships / fields and its keys (Text – Numeric – Boolean – Date & time - object… x Screen output ( report ) : output fields should be correct / instruction is clear / avoid white space without nothing / suitable font style and color / report should have (header – footer - Title ) and fitting page correctly | P a g e 28 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Flow chart : show data flow through the system and how the decision is taken / analyst used this chart to proposed overall the system x Verification : a way of preventing errors when data is copied from one medium to another: 1. Double entry : data is entered twice / two people enter the data / then compared 2. Visual check : same person is entering the data and compare with the original document x Validation: Is a process where data is checked to see if it satisfies certain criteria when input into a computer: x Range check : if data within acceptable value x Lookup check : if data entered exists and stored in a table of data x Length check : if the data contains the required number of character x Character type check : if data doesn’t contain invalid characters x Format / Picture check : if the data in specific format x Presence check : if the data already present x Consistency check : if the fields correspond with each other x Digit check : an extra digits added x File structure : analyst should consider Field type / suitable field name / data type x Design and testing strategy plan : Make sure ( that meets the clients requirements / produce required output ) and Remove any bugs x Developing stage : system should be created and fully tested after design stage / during development file structure should be created ( data type / field names ) / check validation rules / create user interface x Testing strategy: software creates as a modules (small parts) each module should be tested / to make sure each part working correctly. | P a g e 29 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Category of user testing : Normal / Abnormal / Extreme / Live o Normal : data is acceptable /reasonable o Extreme: data at the limits of acceptability o Abnormal: data outside the limits of acceptability o Live : new system output compared with existing system output. x Implementation stage: change over from old system to new system by 4 common methods : x Direct : Old system stopped overnight / replaced with new system immediately ( immediate benefits / reduce cost / but may be disaster x Parallel : two systems running side by side until new system take over ( old system working in case new system filed – train staff gradually / but more expensive / Time consuming x Pilot : The new system introduced in one part of company before whole company ( if failed only one part affected / train staff in one area / less cost / but take time to implement x Phased : Only one part from the system introduce for all fully check the system / but more expensive / time consuming x Documentation : produce user documentation ( for end user ) and technical documentation ( for developers / programmers x User documentation: include.. how to ( load/ save / install / run /search / query / sort / print out / add / delete )- purpose from the system / hardware and software requirements / Error handling / trouble shooting guide / log-in and out / error messages meaning / glossary of terms / limitation of the system / sample run with result. x Technical documentation: include.. program coding and listing / computer language used / program and system flowchart / | P a g e 30 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x x x purpose from the system / limitation of the system / input formats / hardware and software requirements / known bugs of the system / list of variables / file structure / sample run with result / output format / validation rules / error messages and it meaning. Evaluation : evaluate the implemented system to see if the system resolved the issues The main evaluation points : Compare final solution with the requirements / Identify any limitations or necessary improvements needs / Evaluate the user’s responses / Compare results and performance for new system with old system / Interview users to gather responses about new system / questionnaires to gather responses Results from evaluation : Update Hardware: user feedback / new hardware in the market / changes in the company Update software : changes in the company structure / changes in legalization | P a g e 31 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 8 Safety & Security x Health aspects: computer systems have at least moveable table / antiglare screens/adjustable chairs/foot supports/suitable lighting/ uncluttered work stations/frequent breaks /frequent eye tests. x Health risk list: 1. Back and neck problem/strain: cause by sitting in front of a computer screen for long period in the same position / to minimize adjustable chairs / foot rests / screens that can be tilted 2. Repetitive strain injury / RSI : Damage fingers or rest by using continuous keyboard or mouse click buttons / to minimize / correct position / proper use of a wrist rest / Take regular break / Use ergonomic keyboard / Use voice- activated software 3. Eyestrain : Caused by looking at the screen for long time / to minimize use screen flicker / Change screen to LCD / Use screen anti-glare / User should check his eyes on a regular basis 4. Headaches : Caused by incorrect lighting ,screen reflections, flickering screen / to minimize - Use antiglare screen / Take a regular break / check eyes on a regular basis 5. Ozon irritation: Caused by laser printer in the office area / to minimize - Proper ventilation should exist / | P a g e 32 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor housed in separate room / change to other type of printer. Safety aspects: Safety risk : 1. Electrocution : to minimize - Use residual current breaker RCB / check wires and equipment regularly / Don’t allow drinks near to computers 2. Trilling wires : to minimize - Use cable ducts / Cover wires under table/ Use wireless connection 3. Heavy equipment falling and causing injury : to minimize Use strong and large desks and tables 4. Fire Risk : to minimize - Have Co2/dry fire extinguishers / Don’t cover equipment / use good ventilation / Don’t overload socket with too many items / Change to low voltage hardware E-safety : safety while using internet. • Personal data ( name , Birth date , address , medical history, banking details) • Sensitive personal data : ethnic origin, political views, religion, sexual orientation, criminal activity E-safety issues and advices: • Don’t give out any personal information to unknown people / Don’t send people photos of yourself unless the person known to you / maintain your privacy settings / only visit trusted websites / open emails from known sources / send email people you know / Using social networking sites, instant messaging or chat room | P a g e 33 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Using social media networking sites or chat room: • Block or report anybody who acts suspiciously or who uses inappropriate language / use a nickname / Keep private and personal data secret / Don’t enter private chat rooms / don’t meet anyone the first time on your own chat room / meet the person in a public place / Avoid the misuse of images / Always use appropriate language / Always respect people’s . • Security of data: Hacking / Phishing / Smishing / Vishing / Pharming / Spyware / Viruses / Spam / Moderated and unmoderated forums / Cookies • Hacking: Unauthorized access to the computer system without permission / Hacker can delete, corrupt, edit, files or change data or personnel information, steel user identity, stop production/ to avoid or remove .. Using firewall / strong password/ Protection software/ ID and password / encryption • Phishing: a method of trying to gather personal information using deceptive e-mails and websites by sending request from bank or a note from someone in their company/ can gain personnel data such as credit card number / to avoid .. filter phishing e-mail / be cautious when opening email or attachment / Don’t click on executable files • Smishing ( SMS phishing ): SMS system of mobile phones to send out Fake text message which often including URL or telephone number / to gain personnel details / to avoid .. Double check the SMS / check for spelling mistakes / Check the link of the website / Contact your bank directly • Vishing: uses voice mail message to trick the user into calling the telephone number contained in the message | P a g e 34 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Pharming : Malicious code installed in the user computer to direct the user to fake website / gain personnel data / to avoid .. use antispy software / double check the URL • Spyware and key-logging software : software to collect data by monitoring key presses on the user’s keyboard / effects : gives the originator access to all data entered using a keyboard on the user's computer / install other spyware/ read cookie data and also change a user's default browser / to avoid .. use Anti-spy software / Enter password by using drop-down menu • Viruses: program code or software / can replicate/ copy itself to do something like deleting or corrupt the files or operating system / crash or slow the computer / stop functioning / corrupt OS …. To avoid.. install antivirus and update / don’t use software from known source / don’t open attached files with email from known sender / always backup • Spam : refers as junk mail / by flooding network with useless traffic which slow the network down / to avoid .. Set the protection filter level to high / junk mail filter should kept up to date / Block images in HTML messages / Do not sign up to commercial mailing lists • Moderated and unmoderated forums: moderated forum is online discussion forum / posts checked y administrator / can prevent spam / filter posts / | unmoderated forum.. no one own the internet / not policed • Cookies: small files or code stored on a user’s computer/ Sent by web server to user’s computer / The data can be retrieved and used | P a g e 35 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor / online cookies remember the type of the book / The data gathered by cookies • Firewalls: hardware or software / sites between user computer and external websites / examine terrific between user computer / check incoming and outgoing data / can block terrific or warninig about security issue / can manage the criteria to prevent access to certain websites / can prevent hackers to enter the network / warning if software trying to access to the data. • Security protocols : Secure Sockets Layer (SSL) and Transport Layer Security (TLS) • Secure Sockets Layer (SSL) : type of protocol that allows data to be sent and received securely over the internet • Transport Layer Security (TLS) : form of protocol that ensures the security and privacy of data between devices and users over the internet / provide encryption / authentication and data integrity • TLS layers : • Record Protocol: part of the communication can be used with or without encryption/ contains data being transferred over the internet. • Handshake Protocol : secure session between user and website is established • Encryption : used to protect data in case it has been hacked / information is converted to secret code / encryption and decryption called cryptography | P a g e 36 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Authentication : used to verify that data comes from a secure and trusted source • Digital certificates: a pair of files stored on a user’s computer, each pair of files divided into / A public key (known by anyone) and a private key (known to the computer user only). • Passwords : Strong passwords should contain upper case / lower case characters/ numbers / keyboard symbols / should changes in regular basis / many systems asking to enter 3 times before lock out / prevent others to access to your computer • Biometrics: method of authentication / include : finger print scan / signature recognition / retina scans / iris recognition / face recognition / Voice recognition • Cloud Security: online storage medium used to backup files / access anywhere / no need to pay for extra local capacity / could make sure your data is backed up / synchronize data / several users can edit | P a g e 37 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 9 Audiences • Software copyright and privacy: Software / Music CDs, videos and articles from magazines and books is protected by copyright laws • What is illegal: make copy of software and sell it / use single user software and install in multiple computer / use code from copyright software / rent out software without permission / use software name without agreement. • Legal: covers the law; whether an action is punishable by law. • Morality governs the private and personal interactions between people • Ethics governs professional interactions • Culture attitudes, values and practices shared by a society or group of people • A dongle is a small device and used of protected software through USB | P a g e 38 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Chapter 10 Communication • Email : popular for communication between people • Email acceptable language : language and content must be appropriate / in business the language must be formal • Email terminology: 9 Attachment: any type of file sent along with an email message, can include photos and documents to zipped files, folders, mp3s, and more. 9 CC : Stands for Carbon copy, that recipients who else is getting a copy 9 BCC: Similar to CC, Blind Carbon Copy sends a copy of a message for the information of a large number of people. 9 Forward: sends a message that has been received to another email address 9 Group: group of email addresses that are given a group name so 9 Subject : short description of the message. | P a g e 39 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Inappropriate language: Absence images/Abusive, profane / inflammatory / Violent message / Use illegal material in messages • Netiquette : rules of etiquette over computer networks and internet / don’t write content in an email could be misunderstood / check spelling and grammatical error / respond quickly / Avoid humor / Do not plagiarize / Do not chaptalize all text • Spam: junk email is sent out to the recipients / part of phishing scam / usually unwanted email / effects: chance to obtain details / network could also become slower / unnecessary traffic flooding the network.. to avoid: Use a junk email filter / Do not sign up commercial mailing lists or reply spam email / Untick the check box if you are asked to give your email • Effective use of the internet : internet is worldwide collection of networks allow to send and receive email / chat / transfer files between computers / browse the web • World Wide Wep ( WWW) : is a part from the internet / collection of warpages based on http / access through web browser • Intranet : a computer network based on internet / designed to meet the internal needs / for single organization / safer, less chance of hacking/viruses / possible to prevent external links / easier to send out sensitive messages / better bandwidth / possible to create extranets • Hypertext transfer protocol http & https : set of rules which are followed when transferring information across the internet which agreed between the sender and recipient / http changed to https or padlock ( secure ) | P a g e 40 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor • Uniform recourse locator URL : web browser display webpages / URL represent numbers ( not user friendly ) / instead of numbers use alphanumeric / web browser translate html to show the result • URL format : domain host / domain name ( website name) / domain type .. com or gov or edu / may include country code.. kw or eg or uk / path / filename. • Process of loading webpages : enter URL or click the link / retrieve code of web page from the server / webpage displayed • File transfer protocol FTP : is Network protocol / transfer files from computer to another using internet / FileZilla is popular FTP application / to use FTP you have to install the FTP application and know ( ID , password , host name , port . x Internet service provider ISP : internet company provider / they are using fiber-optics to increase bandwidth . x Internet : international network / covers topics of global or general interest / Internet possible or difficult to block certain websites / accessed from anywhere / open for hackers / public access x Intranet : internal restricted access / used to give local information relevant to the company or organization / easy to block certain websites / behind a firewall / some protection against hackers / private access x Cloud storage : Online storage / backup files / files accessed from any device connected to internet / user don’t have to carry storage device / backup solution / unlimited capacity / but : files could be hacked / : | P a g e 41 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor x Three types of storage clouds : Public cloud / Private cloud / Hybrid cloud x Blog : personal experiences / updated by one author / recent entries are shown first / Bloggers can be prosecuted for posting offensive material x Wiki : collaboration from users / can be edited by anyone/ Wikipedia is an example Social networks : to interact and communicate with each other / similar interests / share content such as photos, video / each member can build public and private profiles / free instant messaging and video chatting / email other members / invite people to be a friend / members have control to access to personal data Microblogs : Similar to blogs / use short, frequent posts / like tweets / Very difficult to customize B-blog : business blog to promote themselves on the internet. Searching for information on the internet : using URL or search engines like Chrome , internet explorer , Mozzila ) Search engines : useful if you don’t know URL / use variety of methods to search / more specific search get more accurate result / narrowing search by typing (+) between words / you will see thousands of hits x x x x x x Advantages using internet to get information : up-to-date / limitless of information / searching using search engines is fast and easy / people can search while comfortable at home / pages on the internet can have multimedia x Disadvantages using internet to get information : anyone can post information which possible incorrect / risk to access to inappropriate websites / easy to distracted while searching on the net / may | P a g e 42 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor overload with information if you don’t have searching experience / losing research skills because search engine do every thing x x Why internet search to find relevant information is not always fast? without narrowing the criteria you will take long time to find the relevant information / millions of relevant web sites / If the user uncertain what he needs it will take long x Why it is not always easy to find reliable information on the internet?: Content on the internet is not regulated / anyone can make a web site / wikis can edited and include not correct information / information sometimes depending on who is the author. How can you evaluate the reliability of information found on the internet? Anyone can setup website, so information not necessarily reliable or accurate / some commercial website only to promote and advertise their products could be unreliable / if the URL ending with .gov or .org could be reliable / compare information on the website with a text book / good idea to check support or permit from endorsed / website linked to reliable or unreliable web sites / check testimonials or recommendation / check last update if was long time ago( not reliable ) / If the author of the website is good credential. | P a g e 43 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor ¾ File management : Manage Files Effectively: Extension name .CSS .CSV .GIF .HTM .JPG Full form Cascading Stylesheet Comma Separated Value Graphics Interchange Format Hypertext Mark-up (Language) Joint Photographic Experts Group Used for Stylesheets in webpages Store tabular data Moving images Webpages Standard for images .PDF Portable Document Format Documents to be circulated over the internet/email .PNG Portable Network Graphic Compressed images .RTF Rich Text Format Word processed documents .TXT Text (File) Simple Text files .ZIP Zone Improvement Plan Sending many files over the internet/email x Generic file formats can be opened by any software to access the data held in them. | P a g e 44 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor ¾ Styles: 9 Several organizations use a corporate house style or corporate branding, which is used to print on websites, visiting cards, letters, etc. It refers to a specific style of fonts and formats used in the making of ICT solutions by organizations. 9 A corporate house style when used effectively identifies the users of the style. 9 Consistent styles enable users to associate a particular organization with a style and also show consistency in the ICT solutions created by the organization ¾ Proofing: 9 When name (person or organization) is entered or sometimes newly coined terms are used, spell checkers might pick these up as errors, because they are not found in the dictionary. This makes spell checkers less efficient. 9 Validation ensures that the data being entered into an ICT solution is reasonable and makes sense. Entered data is checked against set criteria to be validated. Proofing techniques: 9 Verification: checking of data when copied from one medium to another to prevent errors. | P a g e 45 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor 9 Verification is also important and is a way of preventing a difference in data when it’s being transferred from one system to another. This tries to make sure data entered is correct, relative to the source. ¾ Document Production 9 Widow: A paragraph-ending line that falls at the beginning of the following page or column, thus separated from the rest of the text. 9 Orphan: A paragraph-opening line that appears by itself at the bottom of a page or column, thus separated from the rest of the text. 9 Page, section and column breaks are used to ensure that widows and orphans are not present in a document (these show poor typography). 9 A mail merge document is created in order to create a standard template and then use it to send documents personalized (by the computer system) for the selected recipients of the document | P a g e 46 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor ¾ Data Manipulation Create a Database Structure 9 Flat file databases are tables that have data sorted in rows and columns, whereas relational databases are several tables grouped together to from a link, thus preventing unnecessary repetition of data. 9 Primary key: The key field of a table which is unique and identifies each record 9 Foreign key: The field linked to the primary field of the table linked to through a relationship Relational database Flat-file database Complex queries can be carried out Poor at complex queries Better security Poor at limiting access Cater for future requirements Harder to update, so inherently inefficient Data is only stored once Potential duplication Require more planning Easy to design Non-unique records Harder to change data format. | P a g e 47 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor ¾Data analysis Create a Data Model 9 Charts: A graphical representation of (usually tabulated) data 9 Accurate data ensures the results obtained by the processing of data is relevant, which is essential to the usability of the model 9 Formulae are mathematical operators defined by the user to perform a function, whereas functions are predefined logical and mathematical operations a user can use in a spreadsheet 9 Mathematical operations are performed in the order PEMDAS (Parenthesis [Brackets] Exponents Multiplication Division Addition Subtraction). Brackets are used to notate data used by a function, e.g. =SUM (A2:A10). 9 Relative cell referencing is made when the cell reference is supposed to change when the cell it is referred to in is changing. It aids more efficient designing of models. 9 Absolute cell referencing is made when the cell referenced stays constant when the cell it is referred to in is changing. This aids the preparation of a model when a set of data is constantly being referred to throughout the model. 9 Cell reference or relative cell reference describes how far away a cell or group of cells is from some other cell in the same spreadsheet. Basically, the cell's address. | P a g e 48 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor 9 A model prepared needs to be tested before being used to ensure that all results computed are accurate. Definitions: 9 Cells: A space for data to be entered a table; a box formed by the intersection of columns and rows 9 Rows: Horizontal boxes that divide the table in segments 9 Columns: Vertical boxes that divide the table in segments 9 Sheets: A table of data 9 Tabs: A module of a database program that holds the tables on the computer, 9 Pages: Full pieces of papers that contain information held on one sheet of paper. 9 Ranges: A group of cells in a table 9 Named cell: A cell in a table that is given a name (like "profit") and can be referred to using that name. 9 Named range A group of cells in a table that are given a name (like ‘Pricing’) and can be referred to using that name. 9 Nested formulae/function: A formula/function used inside a formula/function as an argument | P a g e 49 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Test the Data Model 9 A model prepared needs to be tested before being used to ensure that all results computed are accurate. The test plan must be justified to be apt for the model. E.g. all the mathematical operations must be tested in a model that relies on calculations. 9 Definitions: o Testing: Checking if the designed model delivers the expected outcome when tested with data. o Test data: The input data used for testing model. o Expected outcome: The output a model is supposed to give with the test data. 9 Actual outcome: The output a model actually gives the user when the test data is input. ¾ Web Development Layers 9 Content/Structure layer: Holds the content of the webpage structure. 9 Presentation layer: The layer responsible for the formatting of a webpage(s) or elements (using a stylesheet). 9 Behavior layer: scripting language of a web page or an individual element | P a g e 50 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor ¾ Create a Webpage 9 Tables make the basic structure of a webpage and organize page layout. 9 Anchor: An element in a webpage that creates a hyperlink between a source anchor and a destination anchor. These can be used to link 2 resources together. 9 Relative file paths are used for attached stylesheets as the stylesheet is going to be stored on a server in the same directory as the webpage, and not where it an absolute file path says. ¾ Definitions: 9 Relative file path: A path referring to a file in the same directory relative to the page the reference is made in. 9 Absolute file path: The full path of a file, which is not relative to anything, whereas relative links only point to a file or a file path, the browser then redirects the user to that location on the current site. 9 Absolute paths always include the domain name of the website 9 These should not be used to refer to locally saved webpages as the computer the webpage is stored on (the server) is not the same as where the webpage was developed and thus an absolute file path would point to the wrong address. | P a g e 51 Mr. Ayman Al-Nahhas +965 97956633 Cambridge ICT Tutor Use Stylesheets: 9 CSS (cascading stylesheet) is a text-based language which is attached to webpages to set their format. CSS files have a “.css” extension 9 These should be attached using relative file paths as they are stored along with the webpage and thus can be linked relative to them. 9 Internal CSS have more preference over Inline CSS 9 If several external stylesheets are attached to one web page, the stylesheet attached last (at the bottom of that part of the code) is given preference over the other attached ones). Test and Publish a Website 9 To upload and publish content on a website using FTP, a user must have: o FTP client software o All files in one folder o Host Name/URL/IP address for ftp o Host port to be used for upload o Username and password 9 The test plan used to test a webpage must be justified based on the elements being tested. ( If hyperlinks are being tested, it makes to check if all the hyperlinks are redirecting the user to the correct webpage/ section of webpage. | P a g e 52