Information System Design and Development. Level

advertisement
Course: Computing
Science
Information System Design
and Development Units
Level: National 4/5
April 2013
This advice and guidance has been produced for teachers and other staff who
provide learning, teaching and support as learners work towards qualifications.
These materials have been designed to assist teachers and others with the
delivery of programmes of learning within the new qualifications framework.
These support materials, which are neither prescriptive nor exhaustive,
provide suggestions on approaches to teaching and learning which will
promote development of the necessary knowledge, understanding and skills.
Staff are encouraged to draw on these materials, and existing materials, to
develop their own programmes of learning which are appropriate to the needs
of learners within their own context.
Staff should also refer to the course and unit specifications and support notes
which have been issued by the Scottish Qualifications Authority.
http://www.sqa.org.uk
Acknowledgements
© Crown copyright 2013. You may re-use this information (excluding logos) free of
charge in any format or medium, under the terms of the Open Government Licence.
To view this licence, visit http://www.nationalarchives.gov.uk/doc/open-governmentlicence/ or e-mail: psi@nationalarchives.gsi.gov.uk.
Where we have identified any third party copyright information you will need to obtain
permission from the copyright holders concerned.
Any enquiries regarding this document/publication should be sent to us at
enquiries@educationscotland.gov.uk.
This document is also available from our website at www.educationscotland.gov.uk.
2
SOFTWARE DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
Contents
Introduction ................................................................................................... 4
Approaches to learning, teaching and assessment ................................... 8
Subject content ........................................................................................... 13
Staff notes ................................................................................................ 16
What is a database? ................................................................................. 19
What are webpages?................................................................................ 25
Media types .............................................................................................. 30
Macros, scripting languages and HTML.................................................... 35
Design and testing .................................................................................... 38
Hardware and software requirements ....................................................... 41
Computer architecture .............................................................................. 45
Types of computer .................................................................................... 47
Operating systems.................................................................................... 50
Backing storage devices ........................................................................... 51
Networking/connectivity ............................................................................ 54
Security risks ............................................................................................ 57
Computers and the law............................................................................. 60
Computers and the environment............................................................... 63
Glossary ................................................................................................... 65
Qualifications ............................................................................................ 71
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
3
INTRODUCTION
Introduction
This resource provides advice and guidance for staff delivering Information
System Design and Development units at National 4 and 5.
Before embarking on these units, staff should be familiar with the contents of
the technologies principles and practice paper:
http://www.educationscotland.gov.uk/learningteachingandassessment/curricul
umareas/technologies/index.asp
Staff should also read the computing science professional focus paper
produced by Education Scotland to ensure that they have familiarised
themselves with the key areas of significant change and potential approaches
to teaching and learning.
http://www.educationscotland.gov.uk/nationalqualifications/professionalfocusp
apers/index.asp?bFilter=1&bSortCD=0&11_subjecttopics=New National
Qualifications\|Technologies\|Computing Science (NQ subject)
The general unit information that follows has been taken, summarised and
adapted from the Computing Science National 4 and 5 course support notes.
4
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
INTRODUCTION
Guidance for staff
Key skills, knowledge and understanding
A broad overview of the subject skills, knowledge and understanding that will
be assessed in the Information System Design and Development unit is given
below.
Mandatory skills and knowledge
Applying, with guidance, aspects of
computational thinking across a range of
straightforward contexts.
National 4

Applying aspects of computational thinking
across a range of contexts.
Designing, implementing and testing, with
guidance, digital solutions (including
computer programs) to straightforward
problems across a range of contemporary
contexts.


Designing, implementing and testing, digital
solutions (including computer programs) to
problems across a range of contemporary
contexts.
Communicating basic understanding of key
concepts related to information system
design and development clearly and
concisely using appropriate terminology.
National 5


Communicating understanding of key
concepts related to information system
design and development clearly and
concisely using appropriate terminology.

Communicating understanding of key
concepts related to software design and
development clearly and concisely using
appropriate terminology.

Basic knowledge of the impact of
contemporary technologies on the
environment and society.

INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
5
INTRODUCTION
Understanding of the legal implications and
environmental impact of contemporary
information system technologies.

Applying computing science concepts and
techniques to create solutions across a
range of contexts.

Links to prior learning
Entry to this unit is at the discretion of the centre. However, learners would
normally be expected to have attained some relevant skills and knowledge
through prior experience.
Skills and knowledge developed through any of the following, while not
mandatory, are likely to be helpful as a basis for further learning for this
course.
Other SQA qualifications
For National 4:
 Computing Science National 3 or relevant component units
 Numeracy National 3.
For National 5:
 Computing Science National 4 or relevant component units
 Numeracy National 4.
Experiences and outcomes
In this course, any of the following Experiences and Outcomes may be
relevant.
Having investigated a current trend of technological advance in Scotland or
beyond, I can debate the short- and long-term possibilities of the technological
development becoming a reality.
(TCH 4-01a)
I can debate the possible future impact of new and emerging technologies on
economic prosperity and the environment.
(TCH 4-01c)
By discussing the business, environmental, ethical and social implications of
computer technology, I can begin to gain an understanding of the need for
sustainability and accessibility.
(TCH 4-05a)
6
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
INTRODUCTION
I can compare different forms of security software to gain knowledge and
understanding of their functions in protecting contemporary technologies.
(TCH 4-08b)
I can integrate different media to create a digital solution which allows
interaction and collaboration with others.
(TCH 4-08c)
Through research, I can gain knowledge of computer systems or emerging
technologies to understand their differing features and consider their suitability
for the world of work.
(TCH 4-08d)
By learning the basic principles of a programming language or control
technology, I can design a solution to a scenario, implement it and evaluate its
success.
(TCH 4-09a)
I can create graphics and animations using appropriate software which utilise
my skills and knowledge of the application.
(TCH 4-09b)
I can use features of software to create my own animation which can then be
used to create an animated sequence.
(TCH 4-09c)
Progression from this unit
From National 4 progression may be possible to:




Computing Science National 5
National Certificate Group Awards in computing, IT and related disciplines
other technological courses at National 4
employment, apprenticeships and/or training in IT and related fields.
From National 5 progression may be possible to:




Higher Computing Science
National Certificate Group Awards in computing, IT and related disciplines
other technological courses at National 5
employment, apprenticeships and/or training in IT and related fields.
Ultimately, for some, progression may be possible to:




Advanced Higher Computing Science
a range of computing-related Higher National Diplomas (HNDs)
degrees in computing, IT and related disciplines
careers in computing, IT and related disciplines.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
7
APPROACHES TO LEARNING, TEACHING AND ASSESSMENT
Approaches to learning, teaching and assessment
Computing science, like all new and revised national courses, has been
developed to reflect Curriculum for Excellence values, purposes and
principles.
The approach to learning and teaching developed by individual centres should
reflect these principles. Learners should be encouraged to participate fully in
active learning and practical activities by working together, talking, listening,
reading or reflecting on a topic while staff act as a facilitator.
An appropriate balance of teaching methodologies should be used in the
delivery of the course and a variety of active learning approaches is
encouraged, including the following.
Activity-based learning
Whole-class, direct teaching opportunities should be balanced by activitybased learning and practical tasks. An investigatory approach is encouraged,
with learners actively involved in developing their skills, knowledge and
understanding by investigating a range of real-life and relevant problems and
solutions related to areas of study. Learning should be supported by
appropriate practical activities, so that skills are developed simultaneously with
knowledge and understanding.
Group work
Practical activities and investigations lend themselves to group work, and this
should be encouraged. Working within a group will encourage learners to
collaborate and work co-operatively with others. Learners engaged in groupwork strategies capitalise on one another’s knowledge, resources and skills in
questioning, investigating, evaluating and presenting ideas to one another.
While working as a team is not specifically identified as one of the skills for life,
learning and work for this course, and therefore is not assessed, it is a
fundamental aspect of working in the IT and related industries and so should
be encouraged and developed by staff.
8
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
APPROACHES TO LEARNING, TEACHING AND ASSESSMENT
Problem-based learning
Problem-based learning (PBL) is another strategy that will support a learner’s
progress through this course. This method may be best utilised at the end of
an outcome or a topic where additional challenge is required to ensure
learners are secure in their knowledge and understanding, and to develop the
ability to apply knowledge and skills in less familiar contexts. Learning through
PBL develops a learner’s problem-solving, decision-making, investigative,
creative-thinking, team-working and evaluative skills.
Computational thinking
Computational thinking is recognised as a key skill set for all 21st-century
learners – whether they intend to continue with computing science or not. It
involves a set of problem-solving skills and techniques used by software
developers to write programs.
There are various ways of defining computational thinking. One useful
structure is to group these problem-solving skills and techniques under five
broad headings:
 Abstraction: seeing a problem and its solution at many levels of detail and
generalising the information that is necessary. Abstraction allows us to
represent an idea or a process in general terms (eg variables) so that we
can use it to solve other problems that are similar in nature.
 Algorithms: the ability to develop a step-by-step strategy for solving a
problem. Algorithm design is often based on the decomposition of a
problem and the identification of patterns that help to solve the problem. In
computing science as well as in mathematics, algorithms are often written
abstractly, utilising variables in place of specific numbers.
 Decomposition: breaking down a task so that we can clearly explain a
process to another person – or to a computer. Decomposing a problem
frequently leads to pattern recognition and generalisation/abstraction, and
thus the ability to design an algorithm.
 Pattern recognition: the ability to notice similarities or common differences
that will help us make predictions or lead us to shortcuts. Pattern
recognition is frequently the basis for solving problems and designing
algorithms.
 Generalisation: realising that a solution to one problem may be used to
solve a whole range of related problems.
Underpinning all of these concepts is the idea that computers are
deterministic: they do exactly what you tell them to do. The corollary of this, of
course, is that they can be understood.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
9
APPROACHES TO LEARNING, TEACHING AND ASSESSMENT
Whilst computational thinking can be a component of many subjects,
computing science is particularly well-placed to deliver it. Staff are encouraged
to emphasise, exemplify and make these aspects of computational thinking
explicit (at an appropriate level) wherever there are opportunities to do so
throughout the teaching and learning of this course and its units.
Using online and outside resources
Throughout the teaching of this course, the stimulation of learners’ interest
and curiosity should be a prime objective. Engagement with outside agencies
or industry professionals can greatly enhance the learning process. Online
resources, such as those listed in the individual unit support notes, may
provide a valuable addition to teaching and learning activities, encouraging
research, collation and storage of information and evaluation of these
materials. The use of interactive multimedia learning resources, online quizzes
and web-based software can also be used to support activity-based
approaches.
Assessment activities, used to support learning, may be usefully blended with
learning activities throughout the course, for example by:





sharing learning intentions/success criteria
using assessment information to set learning targets and next steps
adapting teaching and learning activities based on assessment information
boosting learners’ confidence by providing supportive feedback
encouraging self- and peer-assessment techniques wherever appropriate.
Working towards units and course
Learning and teaching activities should be designed to develop:
 skills and knowledge to the standard required by each unit and to the level
defined by the associated outcomes and assessment standards
 the ability to apply the breadth of knowledge, understanding and skills
required to complete the Added Value Unit at National 4 or the course
assessment at National 5 successfully.
Meeting the needs of all learners
Within any class, each learner will have individual strengths and areas for
improvement.
10
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
APPROACHES TO LEARNING, TEACHING AND ASSESSMENT
For example, within a National 4 class there may be learners capable of
achieving National 5 standards in some aspects of the course. Where
possible, they should be given the opportunity to do so.
Staff need to consider both the outcomes and assessment standards, and the
table of content in Appendix 2 of the SQA unit support notes, to identify the
differences between National 4 and National 5.
In some aspects of the course the difference between National 4 and National
5 is defined in terms of a higher level of skill. For example, in the Information
System Design and Development unit, Outcome 1 requires National 4 learners
to ‘develop simple information systems using appropriate development tools’,
by creating a structure with links, integrating different media types and
identifying and rectifying errors, while at National 5 in the similar Outcome 1
learners are also required to create a user interface and write or edit simple
code.
In other aspects of the course the difference between National 4 and National
5 is defined by additional or more in-depth knowledge. For example, in the
Software Design and Development unit, National 4 learners need to report on
a contemporary software-based application, while National 5 learners need to
compare two different software languages or environments.
When delivering this course to a group of learners, with some learners working
towards National 4 and others towards National 5, it may be useful for staff to
identify activities covering common knowledge and skills for all learners, and
additional activities for National 5 learners. This is particularly appropriate
where the National 5 learners have come directly from the Broad General
Education without previously studying National 4.
Where National 5 learners have studied National 4 in a previous year, it is
important to provide them with new and different contexts for learning to avoid
de-motivation.
Learning about Scotland and Scottish culture will enrich the learners' learning
experience and help them to develop the skills for learning, life and work they
will need to prepare them for taking their place in a diverse, inclusive and
participative Scotland and beyond. Where there are opportunities to
contextualise approaches to learning and teaching to Scottish contexts, staff
should consider this.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
11
APPROACHES TO LEARNING, TEACHING AND ASSESSMENT
Gathering evidence
Assessment should be an ongoing process that permeates effective learning
and teaching. Staff are encouraged throughout the Curriculum for Excellence
documentation to adopt imaginative and creative approaches to assessment
that take account of learners’ experience in terms of challenge, breadth and
application. Staff should refer to the principles of assessment as laid out in
Building the Curriculum 5:
http://www.educationscotland.gov.uk/thecurriculum/howdoyoubuildyourcurricul
um/curriculumplanning/whatisbuildingyourcurriculum/btc/btc5.asp
For unit assessment purposes, a variety of methods of assessment should be
used to gather a rich range of evidence such as creation of media, written
work, role-play and oral presentations. More detail on gathering evidence can
be found on the SQA secure website in the unit assessment support notes for
National 4 and 5.
Staff should share learning and assessment criteria with learners, provide
effective feedback, encourage peer- and self-assessment, and use effective
questioning techniques.
12
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Subject content
Below is a table summarising the content for the Information System Design
and Development unit taken from the Computing Science National 4 and 5
course support notes:
Information System Design and Development
Exemplification and implementation of the following in an application development
environment:
Topic
Structures and links
National 4
Database structure: field,
record, file
Field types: text, numbers,
date, time, graphics,
calculated
Website, page, URL
Hyperlink
User interface
Target audience
Structures and links
Database structure: field,
record, file
Field types: text, numbers,
date, time, graphics,
calculated
Website, page, URL
Hyperlink
National 5
Database structure: flat file,
linked tables
Field types: text, numbers,
date, time, graphics,
calculated, link, Boolean
Field lengths and range
Key field
Website, page, URL
Hyperlink: internal, external
Navigation.
User requirements: visual
layout, navigation, selection,
consistency, interactivity,
readability
Database structure: flat file,
linked tables
Field types: text, numbers,
date, time, graphics,
calculated, link, Boolean
Field lengths and range
Key field
Website, page, URL
Hyperlink: internal, external
Navigation
Frames, sequence
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
13
SUBJECT CONTENT
Media types
Coding
Sound, graphics, video, text
Macros
Testing
Purpose, features,
functionality, users
Simple descriptions of main
features and functionality
Technical
implementation
(hardware and
software
requirements)
Hardware:
 input and output devices
 processor clock speed
(Hz)
 memory (RAM, ROM)
Software considerations:
 operating system
platform required
Technical
implementation
(storage)
Storage devices:
 built-in, external, portable
 magnetic, optical
 capacity, speed
 rewritable, read-only
Technical
implementation
(networking/
connectivity)
Stand-alone or networked
LAN/internet
Wired/wireless
14
Standard file formats:
 text: txt, rtf
 audio: wav, mp3
 graphics: jpeg, bmp, gif, png
 video: mpeg, avi
 spreadsheet: xls, csv, xml
 pdf
Factors affecting file size and
quality, including resolution,
colour depth, sampling rate
Need for compression
Scripting languages (including
JavaScript)
Mark-up languages
Links and navigation
Matches user interface design
Description of purpose
Users: expert, novice, age
range
Hardware:
 input and output devices
 processor type and speed
(Hz)
 memory (RAM, ROM)
 device type (including
supercomputer, desktop,
laptop, tablet, smartphone)
Software considerations:
 operating systems
Storage devices:
 built-in, external, portable
 magnetic, optical
 solid state
 capacity, speed
 rewritable, read-only
 interface type and speed
Peer-to-peer versus
client/server
Media: wired, optical, wireless
Comparison of local versus
web/cloud
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Security risks
Viruses, worms, Trojans
Hacking
Security precautions
Anti-virus software
Legal implications
Environmental impact
Spyware, phishing, keylogger
Online fraud, identity theft.
DOS (Denial of Service)
attacks
Passwords/encryption
Biometrics
Security protocols and firewalls
Use of security suites
Computer Misuse Act
Data Protection Act
Copyright, Designs and
Patents Act (plagiarism)
Health and safety regulations
Energy use
Disposal of IT equipment
Carbon footprint
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
15
SUBJECT CONTENT
Staff notes
The main purpose of this text is to provide a single document with the basic
theory for the Information System Design and Development unit. It does not
provide a step-by-step practical guide in a particular application because there
are a variety of excellent resources available already for this purpose and
different departments will approach evidence gathering in different ways. The
unit assessment support notes for Computing Science National 4 and 5
provide examples of the sort of work learners are expected to be doing to
prove that they are working at the correct level. The notes are by no means
exhaustive and there are new documents and guides being shared every day
on the CAS forum (http://community.computingatschool.org.uk/), which is an
excellent community for computing staff to share ideas and resources.
Useful websites
A short and by no means exhaustive list of useful computing websites.
Back issues of Computer & Information Sciences & Engineering newsletters
http://www.nsf.gov/cise/csbytes/pastissues.jsp
Computer Science Unplugged
http://csunplugged.org/activities
The Roles of Variables home page
http://www.cs.joensuu.fi/~saja/var_roles/
Wikibooks on the topic of computing
http://en.wikibooks.org/wiki/Subject:Computing
Peer Instruction for Computer Science
http://www.peerinstruction4cs.org/
A site which allows staff to create free games, quizzes, activities and diagrams
http://www.classtools.net/
BBC site with a collection of excellent video clips to illustrate course theory,
with real-life examples
http://www.bbc.co.uk/learningzone/clips/
Harvard’s main page of resources for the Scratch programming environment
http://cs.harvard.edu/malan/scratch/index.php
16
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Computer Science for Fun magazine
http://www.cs4fn.org/teachers/activities/
Online interactive tool for learning programming
http://www.codecademy.com/#!/exercises/0
National forum for computing staff to support one another and share
resources, experiences and ideas
http://community.computingatschool.org.uk/
Home page for Education Scotland computing resources and documentation
http://www.educationscotland.gov.uk/nationalqualifications/subjects/computing
.asp
Recommended books
Below are some books that may help learners and staff in aspects of the
Computing Science National 4 and 5 courses.
Beginning Programming For Dummies (paperback), Wallace Wang. ISBN-13:
978-0470088708
Higher Computing (paperback), John Walsh. ISBN-13: 978-0340905630
How to Pass Intermediate 2 Computing (paperback). Frank Frame, ISBN-13:
978-1444108361
How to Pass Standard Grade Computing (paperback), Frank Frame. ISBN-13:
978-0340973912
Information Systems for You: Student's Book (paperback), Stephen Doyle.
ISBN-13: 978-0748763672
Megabyte (paperback), Simon Cotton, Graham Teager and Robert Austin.
ISBN-13: 978-0198328254
Pathways to Excellence: Level 3: Computing and ICT (paperback), Frank
Frame and John Mason. ISBN-13: 978-1444110791
Pathways to Excellence: Level 4: Computing and ICT (paperback), Frank
Frame and John Mason. ISBN-13: 978-1444110807
PCs For Dummies (paperback), Dan Gookin. ISBN-13: 978-0470465424
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
17
SUBJECT CONTENT
Raspberry Pi User Guide (paperback), Eben Upton and Gareth Halfacree.
ISBN-13: 978-1118464465
Scratch Programming for Teens (paperback), Jerry Ford Jr. ISBN-13: 9781598635362
Standard Grade Computing Studies (paperback), John Walsh. ISBN-13: 9780340885000
The BCS Glossary of IT and Computing Terms (paperback), British Computer
Society. ISBN-13: 978-0131479579
The Game Maker's Apprentice (paperback), Jacob Habgood and Mark
Overmars. ISBN-13: 978-1430213475
Visual Basic 6 For Dummies (paperback), Wallace Wang. ISBN-13: 9780764503702
Other resources
There are other digital resources which at time of writing are available for
Intermediate 1/2 Computing and Standard Grade and could provide additional
exercises and theory for the Computing Science National 4 and 5 courses.
These are listed below.
Softplanet Intermediate 2 and Standard Grade
http://www.softplanetgroup.com/study-software/businesscomputing/intermediate-2-computing
http://www.softplanetgroup.com/study-software/business-computing/standardgrade-computing
Webcal Intermediate 1/2 and Standard Grade
http://www.webcal.esmartbiz.com/prod0405.htm
Exercises and content
To reduce the costs of reprographics and allow differentiation in a multi-level
class, National 4 and 5 content is included in the same document. National 5
exercises are in bold and National 5 content is highlighted using shaded
blocks.
18
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
What is a database?
The contacts feature on a mobile phone and the products listed and grouped
on a games, clothes or music website are all databases. A database is simply
a list of items, all of the same kind, organised in a way that makes it easier to
choose or read from the list.
Most databases are stored electronically because this makes them quicker
and easier to edit, search and sort, and they take up less physical space.
Editing a database is when new details are added to the database or existing
details are changed. Searching a database simply involves finding a particular
set of information from the database, for example everyone whose surname is
Smith. Sorting a database is the act of reorganising the database into another
order, for example in ascending alphabetical order by surname from A to Z or
in descending numerical order by age from oldest learner to the youngest
learner.
Databases are used by many groups of people, for example:
 by schools, so that they know which pupils are absent
 by supermarkets, so that they know what items are in stock
 by banks, so that they know how much money their customers have.
A database application (such as MS Access) is required to create an
electronic database. A database application is a program that organises the
data entered into a computer.
The computer user enters into the computer the data that he or she wants to
keep, for example a list of customers or all the people in a club.
The database application arranges the data into a table.
Here is the data table from an example film database.
Film
Certificate
Genre
Goodfritters
18
Gangster
Diary of a Lazy Kid
PG
Kids
The Armwrestler
15
Drama
Inglorious Bar Stewards
18
War
Record
Field
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
19
SUBJECT CONTENT
All the data for one film is called a record (not to be confused with a row in a
spreadsheet). The Armwrestler is suitable for people aged 15 years and over
and is a drama. Each piece of data for a film – the name, the certificate and
the genre – is called a field in the data table.
When planning and designing a database the types of field used must be
considered. There are a number of different field types to choose from:
 text
 numbers
 date
 time
 graphics
 calculated
 link
 Boolean
eg Bob; DD3 O12; £20+VAT
can be integers (whole numbers) or real (floating point), eg
1.34
eg 01/01/2013; 1 January 2013
eg 23:30:00 or 11:30 pm
databases can hold pictures, eg employee photo or the
picture of a product
similar to a spreadsheet, calculated fields carry out a
calculation on another field or fields and displays the result
a hyperlink to a file outside of the database, eg a web page
holds one of two values, eg Yes or No, True or False
Types of database
The two main types of computerised database are flat file and relational.
Flat-file databases
A flat-file database is like an electronic card index file. In this type of database,
the data is stored in a single table. In the case of a games rentals system, the
table would store data about both members and games, as shown in the table
below.
Cost
Date
rented
Date
returned
Fallover 3
£2.50
03/09/12
05/09/12
Date
membership
started
03/09/11
003
GBH 5
£2.50
02/09/12
05/09/12
02/09/11
003
GBH 5
£2.50
10/09/12
14/09/12
10/09/11
£2.50
03/09/12
05/09/12
03/09/11
£2.50
12/09/12
14/09/12
12/09/11
£2.50
15/09/12
17/09/12
15/09/11
Game
code
Game title
001
011
Headband
4
Blacktops 2
011
Blacktops 2
008
20
Member
name
Telephone
number
Billy Whizz
Beryl the
Peril
Desperate
Dan
Dennis the
Menace
Burglar Bill
Bob
Hoskins
123344
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
234454
545454
676767
876454
986453
SUBJECT CONTENT
014
015
Toilet Rim
£2.50
03/09/12
06/09/12
03/09/11
Farmers
Field 3
£2.50
06/09/12
09/09/12
06/09/11
Freddie
Flintoff
Tom
Thumb
667854
454378
The flat-file database above contains one record for each computer game
rental. Flat-file databases have a number of problems:
 Data can be duplicated. Because a new record is created for each game
rented, the member details would have to be copied onto each new record,
which is inefficient.
 Duplicating data increases the chance of human error when typing in the
same customer’s details a number of times. It can then be hard to be sure
which the correct entry is.
 It is not possible to store information about a member without entering
details of a game rental. In other words a customer’s details can only be
recorded once they rent something.
 Removing a game from the database may remove the only record that
stores details of a member.
Relational databases
An improvement on flat-file databases is the use of a relational database. A
relational database stores data in more than one table. The idea is to ensure
that data is only entered and stored once, so removing the possibility of data
duplication and inconsistency. In the above example this would mean that
there would be a separate game table, rental table and customer table.
Primary or key fields
A key is a field or set of fields which uniquely identifies a record. For example
in a customer database or file, there may be a number of clients called John
Smith so to uniquely identify which John Smith it is there could be a key field
called Customer ID.
Foreign key
A foreign key is a field that is not a primary key in its own table, but is a
primary key in another table. Put another way, a foreign key in one table
points to a primary key in another table. In the example above, if the DVD
rental table was broken down into a customer table and rental table then the
primary key in the customer table might be called Customer ID. This Customer
ID field would also appear in the rental table as a foreign key.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
21
SUBJECT CONTENT
Field length and range
The length of a field refers to how many characters the database designer
sets aside for a particular field to hold. The age field in a customer database
should only need three characters, for example, because people do not live to
be thousands of years old (this would require four or more characters) but they
may live to be older than 99, thus requiring three characters.
The range of a field refers to the acceptable range of values it will accept. An
example of this might be if a field holds the month as a number from 1
(January) to 12 (December) then the range is 1 to 12.
Input validation can be used to make sure that a user only inputs data in the
correct format and if the user makes an error the database will display an error
message and ask the user to re-enter, eg in the above scenario, if the number
13 was entered for a month. Similarly, validation could check that the data
input is not too long, eg a user puts in an age of 12,000, or too short, eg a
telephone number of 1234.
22
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Exercises
1.
You own 100 computer games and you want to keep information about
them all on computer. You should use a:
(a)
(b)
(c)
(d)
2.
spreadsheet
database
word processing program
drawing program.
Here is part of a database where information about cars is stored.
Name of field
x
Model of car
Number of doors
Type of field
Text
Text
y
Sample data
Ford
Focus
5
The letter x shows the name of a missing field. Study the sample data
and decide on a name for field x:
A
B
C
D
3.
In the database above, the letter y shows the missing type of field for the
number of doors on the car. Choose the correct field type for y:
(a)
(b)
(c)
(d)
4.
Bob
colour of car
car registration
make of car.
text
number
date
graphic.
You keep a database of film stars. When a new star appears in a film
you need to:
(a)
(b)
(c)
(d)
edit a star’s record
add a new field
add a new record
create a new file.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
23
SUBJECT CONTENT
5.
It is very common to find duplication of data in a flat-file database. This
can lead to data becoming inconsistent. What type of database should
be used to reduce duplication of data and inconsistency?
6.
Using a database package that staff have shown you, create your own
flat-file criminal database. First plan out on paper which fields you will
need and which field types those fields will be. Then create and populate
the database with fictitious criminals.
7.
After staff have demonstrated how to create linked tables, take the flatfile database you designed and created in task 6 and design and create
a relational database with multiple linked tables.
8.
With a partner, research how databases are used in society. Pick a
usage and create a presentation, podcast, poster or leaflet summarising
your findings.
9.
Evaluate another group’s submission for task 8. Give the group two
pieces of positive feedback regarding areas you liked and offer one
suggestion for improvement.
24
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
What are web pages?
A website is a collection of web pages with information about a topic, person,
place or organisation. Users interested in a topic can connect to the internet
and visit a website to read the individual web pages about that topic.
The ‘landing’ page of a website is called the home page. Home pages provide
the user with links to other pages in the website.
The home page has a web address such as www.bbc.co.uk. This web
address is called a URL, short for Uniform Resource Locator.
Web pages can be created in hypertext mark-up language (HTML) and can
contain text, graphics, sound and video. The process of jumping from one
page to another or from one part of a web page to another part of the same
page is achieved by using hyperlinks. Hyperlinks can be internal within the
same page or website, or external, linking to an entirely different website. A
hyperlink could be a piece of text or a picture that is ‘clickable’; generally when
the mouse pointer hovers over a link it changes from an arrow to a hand icon.
Navigation
Navigation is the term used to describe how a user moves from one part of a
web page to another, from web page to web page and website to website.
To view a web page requires software called a web browser. There are many
of these on the market, including Safari, Internet Explorer, Chrome and
Firefox. Browsers include features specially designed to make accessing,
viewing and navigating web pages as straightforward as possible. Some of
these features are listed below:
 Address bar: allows user to type in web address or URL directly.
 Backwards, home and forwards buttons: allow user to flick back and
forward through web pages.
 Scroll bar: allows user to view web pages that are longer than the screen
area.
 Favourites/bookmarks: allow user to save the website in the browser's
memory so that on future occasions the user does not have to remember
and type in the full address again.
 History: the browser keeps a record of past websites that have been
visited, which allows users to back track to websites that they may have
used previously but forgotten to bookmark.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
25
SUBJECT CONTENT
Sequence
In web page design, sequence refers to how navigation on a website is
structured. There are three main ways to structure pages on a website:
1.
Linear: web pages can only be accessed in order, perhaps by topic or
chronologically.
Page
1
2.
Page
2
Page
3
Page
4
Page
5
Hierarchical: web pages are organised into groups and subgroups, and
users ‘drill’ down through categories or groups to get to specific pages or
subgroups.
Home
page
Games
PC
26
DVDs
Books
Console
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
3.
Web: web page navigation is designed in such a way as to let users get
to web pages from a number of routes.
Page
2
Page
1
Page
3
Page
4
Page
5
User interface
The interface just means how a piece of software and the user communicate
together, how the software gives the user feedback and how the user inputs
data into the program. Most applications use a graphical user interface with
windows, icons, menus and a pointer as this method is regarded as userfriendly.
Target audience
When creating an information system such as a web page it is important to
consider the target audience. The target audience involves factors like:





age group
expertise in computer use
level of education
geographical location
accessibility.
If the design does not cater for the needs and preferences of the intended
audience then users will choose not to use the information system. A website
or presentation about computer games targeted at teenagers will look very
different from a resource about cake-baking for adults.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
27
SUBJECT CONTENT
Visual layout
White space gives the reader‘s eyes a rest and separates one type of
information from another. Too little white space makes for a crowded,
unappealing page. Information should be organised so that there is space
between items and the amount of text for the user to read on screen at once is
reduced as much as possible.
Navigation
It can be frustrating for a web page user if they cannot figure out where to go
or where they are on a site. Buttons to get around a site should be easy to find
and clear to read. Any rollover submenu should be designed to give users
time to drill down before they disappear. Users also want to know where in the
site they are. Large sites use something called a breadcrumb trail usually at
the top of the current page to allow a user to backtrack to previously visited
pages further up the navigational tree. In web design there is a three-click rule
which says that important information should be no more than three mouse
clicks away at any time.
Consistency
Consistency means making everything on the page and website match. This
includes the fonts, colours, button styles and spacing. Everything should have
a similar theme to make the design look professional and easy on the eye. If a
designer uses too many different types of font, graphics and button types over
a website, the site will become more difficult to understand for the user and
less appealing.
Readability
This involves making sure the page, including the typeface (font), is easy to
read. This can be achieved by avoiding using all capitals, using large enough
text and keeping text left aligned with a contrasting background colour for that
page against the text colour. An example of this is that web designers don’t
usually use pink coloured text on a red background because the text becomes
hard to read.
Interactivity
An interactive site or information system is one which allows users to provide
information as well as just be passive readers. Interactivity can be achieved
through things like a built-in search engine facility, discussion areas, areas on
28
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
a page which change to reveal more information depending on where the user
puts their mouse on screen etc. In general, interactive websites and
information systems will be more appealing and engaging for a user.
Exercises
1.
Every web page is filled with dozens of these, each sending you to some
related web page or picture/file. What am I?
2.
Name three ways of navigating on a website.
3.
What does URL stand for and what is it?
4.
What are the three ways in which a website can be organised in terms of
how the user moves from page to page?
5.
What is the difference between an external hyperlink and an internal
hyperlink?
6.
When designing a web page what do we mean by target audience?
7.
Name and describe three aspects of good web design.
8.
With the web design program or editor that staff have shown you, create
a simple web page about yourself, what you study, your hobbies and
interests.
9.
Swap over with a neighbour and read their web page. Evaluate the
page, giving your neighbour two pieces of positive feedback regarding
areas you liked and offer one suggestion for improvement.
10.
With a neighbour, research what makes a good website and find
examples of well-designed websites and examples of badly designed
websites. After you have enough information, design and create a group
of linked pages explaining your findings, with links to the example sites
you have found.
11.
Swap with another group and read their submission for question 11. As
a larger group, prepare a report summarising the key points for good
website design. Each person in the group should be ready to feedback
their group's findings to the rest of the class.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
29
SUBJECT CONTENT
Media types
Multimedia combines different types of media such as text, audio, video and
graphics into one system. By combining two or more types of media together
in, for example, a presentation or website, the end result should be more eyecatching and engaging.
Each media type has a number of different standard file formats. Standard file
formats are file types that can be recognised, opened, worked with and saved
by a number of different computers and applications.
Text
Txt
The txt file format stores information about the characters in a document
without any information about the styles or fonts, just the plain text. Its
simplicity means that it is accepted by virtually all computer systems. Because
txt doesn’t contain any formatting information (apart from paragraph spacing),
it does not take up as much space on a hard disk and will take less time to
transmit across a network, for example in an email.
Rich text format (rtf)
Rich text format files contain more formatting information than txt files,
retaining information about indentation, styles, fonts and sizes.
Compression
Data files can be stored in uncompressed (full-fat version) or compressed (diet
version) formats. Uncompressed files have all of the original data and are
therefore high quality, but also have a large file size. Compressed formats
have a reduced file size but as a result, in general, there can be a loss in
quality. Files are compressed so that they take up less file space, thus
allowing more files to be stored. Another reason for compression is so that
files can be sent over a network quicker than sending an uncompressed file,
eg web pages will load more quickly and emails with attachments will be sent
and received more quickly and use less data bandwidth.
Factors affecting file size
The main factor that affects the size of a file, be it a graphic, sound or video
file, is the quality or resolution that it is saved at. The higher the quality or
resolution a file has, the better the quality but the more data is being saved.
More data means more disk space, longer downloads from the internet and
therefore more of a user’s data allowance being consumed. Taking a digital
photo as an example, there are two factors affecting file size:
30
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
 resolution – how many pixels are used to represent the picture
 colour depth – the size of the colour palette.
Below are two examples of file size calculations for graphics:
1.
A black and white graphic 4 inches by 4 inches and using 300 pixels per
inch.
(4 × 300) × (4 × 300) = 1440000 pixels
For black and white only one bit is required per pixel (0 for blank, 1 for
filled) so 1440000 bits.
1440000/8 = 180000 bytes.
180000/1024 = 175.78 kilobytes.
2.
A true colour (24 bits used per pixel, allowing 16 million colours) graphic
4 inches by 4 inches and using 300 pixels per inch.
(4 × 300) × (4 × 300) = 1440000 pixels
For true colour 24 bits per pixel, therefore 1440000 × 24 = 34560000
bits.
34560000/8 = 4320000 bytes
4320000/1024 = 4218.75 kilobytes
4218.75/1024 = 4.12 megabytes
Sampling/frame rate
For video and sound, the frame or sampling rate has an effect on the quality
and file size. The more snapshots or samples recorded per second the greater
the quality, but the more data that has to be captured and therefore the
greater the file size.
Audio
Wav
Wav files are uncompressed files containing digitised sound data. They are
often used in places such as digital telephone systems and CD players.
MP3
A compressed file format for sound, the MP3 file uses lossy compression to
reduce file size by taking out frequencies of sounds that the human ear cannot
detect, so quality does not suffer.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
31
SUBJECT CONTENT
Graphics
Bitmap (bmp)
This is an uncompressed file format with data being stored about each pixel
(picture element) in an image.
GIF
A compressed file format using lossless compression. GIFs allow users to set
a transparent colour in the image but only have a colour palette of 28 or 256
colours, so are best suited for cartoons, graphs and drawings rather than
photos.
JPEG
A compressed file format that takes a bitmap and reduces the file size by
cutting out data that the human eye would not notice, like subtle differences in
shading. This file format is ideal for photos.
PNG
The portable network graphics (PNG) file format is an improved version of the
GIF format. It is lossless but has a larger palette of colours and allows opacity
(the user can decide how transparent a colour is).
Video
AVI
Uncompressed file format for storing video.
MPEG
A lossy compression format for video that achieves a smaller file size by only
storing some of the key frames of video.
Spreadsheets
XLS
The default file format for Microsoft’s Excel spreadsheet package, which holds
data in worksheets, charts and macros.
CSV
A comma-separated values (CSV) file stores tabular data (numbers and text)
in plain-text form. Plain text means that the file is a sequence of characters.
CSV is ideal for transferring data between different makes and types of
applications, for example taking a list of names from a database and importing
it into a spreadsheet without having to retype all the names again.
32
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
XML
Extensible mark-up language (XML) is a mark-up language like HTML but
XML was created to structure, store and transport information. HTML is about
displaying information, while XML is about carrying information.
PDF
PDF (portable document format) is a file format for documents devised by a
company called Adobe. To view a PDF requires the user to download and
install Adobe’s free reader software. Many programs, such as Microsoft Word,
allow users to save documents as PDFs instead of their own native format (eg
.doc in MS Word). One of the advantages of saving a file as a PDF is that
anyone with a computer and the free Adobe Reader program can view it,
hence the word portable.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
33
SUBJECT CONTENT
Exercises
1.
Which of these file types is a sound file?
A
B
C
D
2.
A video file needs to be _______________ to reduce the file size.
A
B
C
D
3.
wav
gif
avi
jpeg
compressed
saved
edited
deleted
A txt file is used to store:
A
B
C
D
video
sound
text
graphic
4.
What type of file is an avi?
5.
Name two factors that affect the file size of a graphic.
6.
Create a piece of media of your own choice, be that a sound file,
graphic, video or animation. Save the file in its native version and note
its file size.
7.
Is there a method of compressing the size of the file you created in
question 6 either in the package you are using or in another package? If
so save the file in a compressed format and make a note of the new file
size. If not explain what steps you took to come to this opinion.
34
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Macros, scripting languages and HTML
Macros
Small programs called macros can be written within some existing application
packages rather than using a standalone programming environment. For
example, a series of complex or frequently used actions in a spreadsheet or
database package can be recorded and then repeatedly activated in the future
by a single key press or combination. Macros save time by executing a
complex set of frequently used instructions quickly, time and time again. An
inexperienced user can use powerful tools without having to know the detailed
steps behind them. Macros can be created within an application by selecting
the macro function from the menu, giving the macro a name, assigning the
key/keystrokes that will activate it and then recording the instruction/actions.
Another way of creating macros is by using a scripting language.
Scripting language
There are two types:
1.
2.
those built (embedded) into an application
those which work with the operating system and across and between
compatible applications.
An expert user of an application package would use a scripting language to
automate a repetitive task that had to be carried out frequently, thus saving
time.
Examples of scripting languages include VBScript, JavaScript and Perl.
JavaScript is a simple scripting language invented specifically for use in web
browsers to make websites more dynamic. On its own, HTML is capable of
outputting more-or-less static pages. Once you load them up your view doesn't
change much until you click a link to go to a new page. Adding JavaScript to
your code allows you to change how the document looks completely, from
changing text, to changing colours, to changing the options available in a
drop-down list.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
35
SUBJECT CONTENT
Example embedded script in JavaScript to write one line to the page:
<script type="text/javascript">
<!-document.write("<i>Hello World!</i>");
//-->
</script>
The advantages of this type of language are as follows:
 User interface already exists so no need to create one.
 Ready-made, pre-tested functions already included as part of the language
for programmers to use thus saving time and effort.
 Uses for scripts:
– within a word processor – a script to insert a preformatted/customised
header and footer on every page of a document
– within a photo-editing program – a script to automatically apply pre-set
colour levels and filters (eg sepia) to set of photos
– within a database – a script to insert a customised company logo and
contact details on every report generated by the database.
Mark-up languages
Mark-up languages are designed for processing, defining and presenting text.
The language provides code for formatting the layout and style of a text file.
The code used to set the formatting is called a tag. HTML is a popular markup language. Below is an example of some basic HTML:
<!DOCTYPE html>
< html>
< head>
< title>Title of the document</title>
< /head>
< body>
The content of the document......
< /body>
< /html>
36
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Exercises
1.
Macros can be set up when using applications. Describe one method of
activating a macro.
2.
What type of language would be used to code a macro?
3.
Name an advantage of using a macro.
4.
Name a mark-up language commonly used to write web pages.
5.
Using a text editor and with guidance from staff, write a basic web
page in a mark-up language rather than using a graphical webdesign package. The web page can be on a topic of your choosing.
Remember to save the file twice: once as the basic text file and
once as an HTML file so that it can be viewed in a web browser.
6.
Do some further research of your own and try to find and
incorporate an additional feature into the web page you created in
question 5. For example, can you add sound or embed an
animation into the page? Do you know what a marquee is? Could
you get a marquee working on your page?
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
37
SUBJECT CONTENT
Design and testing
Testing
Testing an information system involves looking at each function, checking that
it is of suitable quality and ensuring that all of the parts work on their own and
also together, matching the original design.
There are two main types of testing.
Screen testing
The tester looks at every screen to make sure it matches the design and
works as it should. Some standard screen tests are:
 Do the buttons do what they are supposed to do?
 Do all the texts, fonts, colours and sizes match the original design
specification?
 Does the video and audio run properly?
 Any spelling mistakes or typos?
Navigation testing
Some standard navigation tests are:
 Do all the internal links work?
 Do all external hyperlinks work?
Purpose, features, functionality and users
There must be a clear understanding of what a proposed information system
will do before construction begins. This is called the analysis stage and
involves answering questions such as the following:




What is the purpose of the information system?
Who will be using the information system?
What are the specific requirements?
What type of equipment will it run on?
Purpose
The designer of a new information system needs to consider what the system
aims to achieve when it is complete, what sort of content the system will
include and what type of user will be accessing it. For example, the purpose of
the system refers to whether the system is for business, leisure or educational
use and where the system will run, ie on the internet, on a mobile phone or on
a desktop computer.
38
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Features and functionality
A feature is what something has, and a function is what something can do. An
information system should feature a user-friendly interface; the function would
be to make it easier for the user to use that system. The features and
functionality an information system will have depend on what type of
information system it is, eg is it a website, presentation or mobile application?
In general, however, the designer considers things like what type of interface
the system will have (graphical or command line), whether or not the interface
is customisable, whether the system works online or offline, whether the
system uses video and/or sound, if the system is touch operated or uses a
mouse or keyboard etc.
Hardware and software requirements
Whatever system is created will have to be compatible with the user’s system,
therefore the designer will need to think about:




what specification of computer the user audience will have
what type of operating system the user computer will have
whether the user computer has sound and video capability
how much memory is installed and how fast the processor is.
User/audience
A new information system must meet the needs of the intended audience; if it
is not user-friendly or appealing, people will not use it. The designer must
consider the age, expertise, ability and language of the audience.
A novice user is one who has little experience of using information systems
and as such will require a simple ’cut-down’ user interface with clear icons and
menus, and a built-in help system.
An expert user will have lots of experience of using information systems and
as such will be happy to have access to a more complex and detailed
interface with more advanced features and the ability to use things like
keyboard shortcuts and commands rather than having to drill down through
menus and submenus.
The age of the user will affect the design of the system as well. An example of
this is that older users may be less dextrous and have poorer eyesight,
requiring bigger icons and buttons, and a higher contrast display.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
39
SUBJECT CONTENT
Exercises
1.
What are the two main areas that should be tested when looking at
an information system?
2.
Swap with a neighbour and look at the web page they created in the
previous section (questions 5 and 6). Create a checklist of things
you will test and proceed to fill that list in, giving your neighbour a
copy of the finished feedback and keeping a copy for yourself.
3.
Using examples, describe the difference between the functionality and
the features of a website.
4.
Describe what is meant by the purpose of an information system.
5.
Name and describe two factors a designer should consider when
planning and creating an information system.
6.
Take a well-known website of your choice and, on the computer or on
paper, make a list of the features and functions on the site.
7.
Swap with a neighbour and look at the website and list of features and
functions that they have identified in question 6. Tick or highlight the
ones you agree with and add any others you can think of. Keep your
neighbour’s work and be prepared to share your findings with the class.
40
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Hardware and software requirements
To be of use, a computer needs hardware and software.
Hardware refers to the physical (tangible) parts of the computer system like
the keyboard and mouse.
Software refers to the programs or instructions that control the hardware.
Hardware
Hardware can be grouped into input and output devices.
Input devices enable a user to interact with the computer. Brief descriptions of
some common input devices are given below.
Device
Description
Example of use
Digital camera
Captures light coming in from the lens
Digital images can be taken of an
and converts it into digital form and
event such as a birthday party and
stores it usually on SD memory card
then be transferred to a computer,
rather than traditional film.
edited and shared online with
others.
Microphone
Allows sound to be inputted to the
Recording narration for a video.
computer. Microphones are used to take
Used in conjunction with voice
a sound and convert it into an electrical
recognition software to give
signal for the computer.
commands to the computer or to
take the spoken word and convert
to text on screen.
Touchpad
Scanner
A small, flat pad which senses your
Similar to a mouse it can be used
finger movements and uses this to
to select items from a menu or
control the cursor on the screen and
highlight objects on screen to be
select icons and menus.
edited.
Used to input images to a system. A
Digitising a traditional photo on
light beam passes over the page or
photo paper so that it can be edited
photo and a sensor detects the light
and shared with others, for
being reflected. The image is then
example on a website.
stored in the system’s memory as binary
numbers.
Mouse
A pointing device used to interact with
Selecting items from a menu.
graphical user interfaces on screen.
Highlighting objects on screen to
be edited.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
41
SUBJECT CONTENT
Keyboard
A normal keyboard has keys for the
Typing an essay up in a word
letters of the alphabet, keys to produce
processor.
the digits from 0 to 9, keys to produce
Typing in numbers/data for a sales
all punctuation marks and special
spreadsheet.
command and function keys.
Typing in a web address (URL) for
a website.
Graphics
A flat plastic pad with sensors
Freehand drawing by artists into a
tablet
underneath the surface. The sensors
graphics package.
detect the movements of a pointing
device or stylus and move the cursor on
the screen accordingly.
Output devices enable a computer to communicate with the outside world.
Brief descriptions of some common output devices are given below.
Device
Description
Example of use
Inkjet printer
Uses ink cartridges and sprays fine jets
Home use to print off short letters
of ink onto the paper. Inkjet printers can
or colour photos.
produce high-quality printouts and are
quite cheap to purchase but are slower
than laser printers and the cost of ink
cartridges can be high.
Laser printer
Similar to a photocopier, a laser printer
Business use to print out long
uses electrostatically charged toner (ink
documents or multiple copies of
dust) cartridges instead of wet ink. Lser
reports quickly.
printers produce high-quality printouts
quickly, but are expensive to buy and
maintain.
Monitor
Used to display computer output.
To watch a movie that is being
Monitors can vary in size (measured in
streamed over the internet.
inches diagonally from corner to corner)
To read the input from a keyboard
and resolution (measured in amount of
as an essay is being typed.
pixels displayed on screen). The higher
the resolution, the clearer the image.
Monitors today are flat and can be LCD,
TFT or LED. LED screens are the most
efficient of the three in terms of electricity
consumption.
Speakers
These are used for outputting sound;
To provide sound for a multimedia
how loud the speakers are is generally
presentation.
measured in watts.
To allow the user to hear the
dialogue in a DVD being played on
the computer.
42
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Graphics
These cards have on-board memory that
Allows a user to play high-quality
card
is dedicated to handling graphics. This
first-person shooter games.
relieves the main CPU, allowing it to
Allows a user to edit and produce
concentrate on other tasks. The graphics
high-definition video.
card takes digital information about the
graphics stored in the RAM then sends it
out to control the colours and refresh the
image on the screen.
Sound card
Similar to a graphics card, sound cards
Allows a user to enjoy high-quality
have on-board memory that is dedicated
immersive surround sound whilst
to handling sound, relieving the main
playing first-person shooter games.
CPU and allowing it to concentrate on
Allows a user to edit and produce
other tasks. The sound card takes digital
high-quality audio.
information about the sound stored in the
RAM sends it out to speakers.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
43
SUBJECT CONTENT
Exercises
1.
What does the L in LCD stand for?
A
B
C
D
2.
What is the smallest measure of storage size?
A
B
C
D
3.
Kilobyte
Megabyte
Byte
Bit
Which of these is an input device?
A
B
C
D
4.
Lighter
Links
Liquid
Laser
Speakers
Monitor
Digital camera
Printer
Which of these is an output device?
A
B
C
D
Scanner
Mouse
Keyboard
Monitor
5.
In pairs, pick an input device of your choice and produce an animation,
slideshow or podcast describing it. One person must do research and
produce the information on the device description whilst the other should
research and produce the information for possible uses for the device.
6.
Pair up with another group who have picked a different device to you,
watch each other’s pieces and be prepared for anyone in the new larger
group to share what they have learned from one another with the rest of
the class.
44
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Computer architecture
Processor
The processor is the brain of the computer, controlling everything that takes
place on the computer. Most computers today have more than one processor
working together to improve system performance. The processors on mobile
phones and tablets will be different to the ones on a normal desktop. These
mobile processors might not be as powerful as the desktop equivalent but will
be designed to use less power so that the battery on the phone or tablet lasts
longer. In addition to this, different companies compete with one another in the
processor market and different computer manufacturers can use differing
processor types, which can make comparing computers difficult.
A basic measure of the power of a computer is processor or clock speed.
Currently measured in gigahertz (1000 million pulses per second) this
measures how many times per second the system clock pulses. If the
computer carries out an instruction or calculation with every pulse of the
system clock then the faster the system clock ticks or pulses, the more
operations will be carried out per second.
Unfortunately it isn’t as simple as just comparing clock speeds of computers
because as mentioned earlier there are a wide number of processor types and
manufacturers on the marketplace and they perform differently so other
measures need to be taken into account as well, such as the amount of
memory a computer has installed.
Memory
If the processor is the brain of the computer, the memory of the computer
could be compared to its muscles. The main memory of a computer comprises
RAM and ROM. Random access memory (RAM) is the largest part of the main
memory, storing the operating system, programs and data while the computer
is switched on. Read-only memory (ROM) stores a small part of the operating
system called the bootstrap loader. When a computer is powered on, the
bootstrap loader pulls the computer up by its bootstraps, finding the rest of
operating system in backing storage and loading it into the faster RAM.
The main differences between RAM and ROM are that ROM is small
permanent memory that does not get written to by the user during normal
operations whereas RAM is larger, temporary storage which loses its contents
when the computer is powered down.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
45
SUBJECT CONTENT
Exercises
1.
Which part of the computer controls everything that happens within it?
2.
What is the name of the basic measure of a computer processor’s
performance?
3.
What is the unit of measurement for the measure mentioned in question
2?
4.
Research and list three different companies that manufacture computer
processors.
5.
Which one of these statements about RAM and ROM is true?
A
B
C
D
Neither ROM nor RAM holds data when the power is switched off.
RAM holds data when the power is switched off and ROM doesn't.
The user can write data to RAM but not to ROM.
The user can write data to ROM but not to RAM.
6.
Which generally holds more data, RAM or ROM?
7.
When a computer is first switched on, which type of memory is read from
first and why?
46
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Types of computer
Computers come in different shapes and sizes designed for different users
and situations The main categories are listed below.
Embedded
These are small computers built into other devices, such as cars, mobile
phones and microwave ovens. They can be controlled in some cases with
simple touchpads or screens, such as the touchpad buttons on the front of a
microwave oven. Some embedded systems might provide output, for example
if the device is a microwave the output device might be the LED counting
down the seconds of cooking time left on the front of the oven. The portability
of an embedded system depends on the size and weight of the device the
computer is embedded into. If the computer is inside a washing machine it
won’t be portable.
Smartphone
Smartphones are mobile phones that contain a number of convergent
technologies. Modern smartphones allow users to send and receive email,
surf the world wide web, take and edit digital photos and videos, play MP3s,
access e-books, watch movies, play games and carry out many other tasks
that users might traditionally perform on a desktop computer. Smartphones
have an LED touchscreen or mini qwerty keyboard and built-in speakers.
Many have one or more built-in cameras. The phones are generally pocketsized but at the time of writing, a trend for slightly larger phones with larger
screens is emerging. Smartphones run off a battery for a number of hours.
Tablets
These are book-sized computers with a touchscreen or attachable compact
keyboard on some types. Many tablets have one or more built-in cameras for
things like video conferencing. For output devices tablets have LED displays
and built-in speakers. Tablets are light and portable but not pocket–sized, and
they are able to run off a battery for a number of hours.
Laptop
Traditionally operated using a keyboard and track pad, many laptops have
built-in webcams. Some new laptops now come with touchscreens as well. In
terms of output devices, laptops have LED displays and built-in speakers.
Laptops are portable enough to fit in a backpack or special laptop case, and
run off a battery for a number of hours. Larger laptops will contain an optical
DVD or blu-ray drive.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
47
SUBJECT CONTENT
Desktop computer
These computers are not portable and are powered by mains electricity rather
than by battery. A desktop will have a monitor, full-sized keyboard, mouse and
optical DVD or blu-ray drive.
Mainframes and supercomputers
These computers are very large physically, generally positioned in specially
designed rooms with air conditioning, uninterruptable power supplies and
enhanced physical and electronic security. Mainframes are used for large
organisations like banks to perform a high volume of important tasks
simultaneously, whereas supercomputers are generally used by scientists to
crunch massive amounts of data to perform a specific complex calculation.
Both types of computer have a massive amount of memory, multiple powerful
processors and can allow a number of users to access the system at once.
Server
In client/server networks, one computer acts as a central resource for the
others. A server is the central computer on this network. Servers generally
have multiple fast processors, lots of RAM and a greater amount of backing
storage (hard drive) than the client computers it serves on the network.
Servers can have specific tasks on the network such as storing and backing
up all of the files centrally for the users on the network and controlling access
to the internet and email. Similar to mainframes, servers are generally located
in a secure room or cupboard and combined with the additional networking
racks the servers require they it can take up a substantial amount of physical
space.
48
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Exercises
1.
Which type of computer controls and distributes resources on a
network?
A
B
C
D
A server
A tablet
A palmtop
A bottletop
2.
What type of computer might be used for a large and complex scientific
project?
3.
Put the following devices in order of physical size with the smallest first:
laptop, desktop, smartphone, tablet.
4.
Using the internet research embedded devices and create a
presentation, web page, podcast or poster on a particular kind of
embedded device of your choice. What is it embedded into? What
is its function?
5.
Look at your neighbour’s submission for question 4. Is there any
other information you would like to know that is missing? Feed
back to your neighbour two things you liked about the piece and
one area that could be improved on.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
49
SUBJECT CONTENT
Operating systems
Some people would say that the operating system is the most essential
software on a computer system. The operating system is the first program to
load up when a computer is powered up and contains a set of programs that
control how the computer functions. Without an operating system installed the
computer is just an expensive lump of metal and plastic. The operating system
co-ordinates and manages all of the computer's activities, looking after things
like where files are saved, how much RAM a program needs to carry out a
task, customising the interface to suit the needs of the user and handling any
hardware that is plugged into the system.
Operating systems are large programs that can take up a large amount of disk
space and require a lot of RAM. Different types of computer can require their
own type of operating system, for example Apple computers use a different
operating system to normal personal computers. In addition to this, some
operating systems are called open source and can be freely downloaded and
then re-programmed or customised whilst others have to be paid for and the
source code is closed or locked down and can’t be reprogrammed by the user.
The operating systems that run on mobile phones and tablets are a little
different to the ones found on a normal desktop computer. A mobile phone or
tablet operating system will have be able to run on different and in some cases
less powerful processors. It will also have to deal with input from a different
range of input devices and because the devices are battery powered,
managing power consumption will be particularly important.
Large organisations like banks and government departments will require an
operating system that allows lots of users to communicate and share files over
a network and will have to incorporate enhanced security, backup and user
management features.
Exercises
1.
With a partner, research and list as many operating systems as you can.
2.
Swap your list from question 1 with another group, tick the ones you had
on their list and add any others they didn’t have. Make a note of any
names you didn’t have on your list and make sure to add them to yours.
3.
What must be taken into account when designing an operating
system for smartphones and tablets?
50
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Backing storage devices
Backing storage devices are used to store the programs and data that the
computer can access. The contents of backing storage are not lost when the
power to the computer system is turned off.
There are two ways to access data on a backing storage device: randomly or
sequentially. Random access means that particular files can be jumped to
without having to read through all of the data, in the same way a user might
select a track from a CD or a scene from a DVD. With sequential access, the
user has to run through all of the data to find a file (similar to fast forwarding
on an old video tape).
Type of access
Random/direct
Sequential/serial
Backing storage device
Hard disk drive, memory cards, flash drive, CD, DVD
and blu-ray drives
Magnetic tape drive
Hard disk drive – magnetic drive
The hard drive is the main storage device for programs and files on personal
computers. They have a very large storage space, usually measured in
gigabytes (but some are now into terabytes).
Traditional hard disks have spinning platters and a moving read head, but
recently companies have started to produce solid state hard disks which do
not have any moving parts and are therefore smaller, use less power and are
more reliable.
Flash drive
Small and portable, this type of backing storage plugs into the USB port of a
computer and can store gigabytes-worth of data, making them a convenient
way of keeping a backup copy of files and of transferring files from one
computer to another.
Memory cards
Mainly used in small electronic devices such as digital cameras, MP3 players
and mobile phones, memory cards are usually read by connecting the device
containing the card to the computer or by using a USB card reader. Memory
cards are small, light and again have no moving parts. Despite the small
physical size some types of memory card can hold many gigabytes worth of
data.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
51
SUBJECT CONTENT
Optical disks
These disks use lasers to read data ‘burnt’ onto the disk surface. Disks can be
ROM, recordable or rewritable. ROM disks can only be read from and can’t be
written to, recordable disks can generally only be written to once and
rewritable disks allow users to write over the disk multiple times as you might
a flash drive. CDs store around 700MB of data, DVDs about 4GB and blu-rays
about 25GB.
Magnetic tape
These small cassettes (similar to old 8mm video camera or audio cassettes)
are mainly used as backup systems for large networks. The tapes can store a
lot of data but retrieving data can be slow as the user has to fast forward and
rewind through the tapes to get to the data.
Interface type and speed
When discussing backing storage, the interface refers to how the device
communicates with the processor. The most common interface is USB. When
looking at an interface it is important to consider the speed of data transfer, or
how quickly data is sent to and from the device. The slower the interface
speed the longer a user has to wait to copy or save files.
52
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Exercises
1.
Which of these is a backing storage device?
A
B
C
D
Scanner
Flash drive
Printer
Speakers
2.
What type of access is used by a magnetic tape drive?
3.
Use the internet to research the current cost and capacity of the backing
storage media mentioned on the previous page. Put your findings into a
table, sort the table from lowest value storage to highest value storage,
print this list out and save your table.
4.
Using the table created in question 3, perform another sort but this time
for capacity in descending order from highest capacity to lowest
capacity.
5.
What is meant by the term ‘solid state’?
6.
Add two other columns to the table created in question 3, adding
any information you can find about the interface type and speed of
the backing storage types mentioned.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
53
SUBJECT CONTENT
Networking/connectivity
A network is two or more computers connected together. Networks commonly
consist of a server computer that manages the network, and clients for users
to connect to the network.
Servers are special computers on a network that manage the running of the
network resources; clients are any computers that can access the network.
The other kind of network examined in this course is a peer-to-peer network.
Peer-to-peer networks consist of between two and five computers connected
together. Peer-to-peer networks don’t have the expense of a dedicated server.
All machines on the network have equal status, with no one machine having
any controlling role. Machines can share resources such as printers, folders
on hard disks and an internet connection, but security and backups are more
difficult to implement than they would be on a client server network. This kind
of system works best in a home or small office.
Advantages of networking
Networks allow users to share data and programs. Data stored on one
computer can be made available to all computers on the network. This saves
time because files do not have to be individually placed on every single
computer on the network. Also, parts of programs can be stored centrally on a
server which saves storage space on the client computers.
Peripherals can be shared more easily on a network. Some expensive
hardware, such as colour laser printers, can be shared using a network.
Instead of buying a printer for each individual workstation one fast printer can
be bought and shared by the clients.
A big advantage of networks is that clients can easily communicate
electronically with other clients on the network.
Scale of a network
Networks can be categorised into two main types based on their scale or size.
There are local area networks and wide area networks. Local area networks
(LANs) are groups of computers in close proximity to each other, such as in an
office building, a school or at home. Wide area networks (WANs) cover a large
geographic area, such as a city, county or country. The internet is a global
network of networks where many LANs and WANs are interconnected.
54
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Wired, optical and wireless networks
Wired networks use cables to transfer data between computers and devices.
The type of wire used can have an effect on how fast the data can be sent and
received. The most common type of networking cable is twisted pair or
ethernet cabling, which can support quite high transmission speeds, but the
fastest type of cabling is fibre-optic, which uses light signals. The downside to
fibre-optic cabling is that it is more expensive than twisted pair.
Wireless networking involves computers and devices communicating with one
another without any cabling. Common types of wireless networking methods
are Bluetooth and wi-fi. Wireless technology allows you to move around a
building and still be connected to the network. A wireless network requires
each computer to be fitted with a wireless network card and to be within range
of a wireless hub or router. The downside to wireless networking is that the
bandwidth or speed of transmission is generally slower than a wired
connection. Bluetooth is a wireless network technology that allows devices like
mobile phones, printers, headsets and laptop computers to form mini-networks
when they are in close proximity to each other.
Cloud computing
Cloud computing involves renting computer storage and power from large
multinational companies with special facilities. With cloud computing, the user
accesses data and applications over the internet from their supplier rather
than from the backing storage of the local computer or device that is currently
being used. The advantages to this are many but include the convenience to
the user of always being able to access their data wherever they are as long
as they have an internet connection and the added security of the user data
being stored safely and securely on a state-of-the-art server.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
55
SUBJECT CONTENT
Exercises
1.
When two computers are linked together it is called:
A
B
C
D
2.
A server controls:
A
B
C
D
3.
the world wide web
the internet
a server
a network
switching on a computer
the running of a network
switching off a computer
the running of computers
A network with a small geographical spread is called:
A
B
C
D
a LAN
the internet
a WAN
the world wide web
4.
Name two advantages of setting up a network.
5.
Name two types of wireless network technology.
6.
Name two kinds of network media.
7.
Research a company that provides cloud computing services and
produce a report or presentation profiling that company.
8.
With a partner, create a presentation, poster, animation or podcast
detailing the advantages and disadvantages of cloud computing.
One team member should be responsible for the advantages and
another should be responsible for the disadvantages. When you
are both finished have a discussion and try to agree as a pair
whether the advantages outweigh the disadvantages.
56
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Security risks
When computers are connected together in a network the benefits are
numerous. However, there are risks to computers being interconnected. A
major problem can be viruses. A virus is a program that when run infects a
computer system, causing damage or disruption to the system. As well as
viruses there are two other types of file that can cause disruption on a
network: worms and trojans. Worms, once activated, copy themselves
automatically and very quickly between computers on a network, causing a
bottleneck on the network. Trojans are programs that might perform a normal
process on the computer but underneath secretly perform another, possibly
harmful, process at the same time.
Denial of service attacks are when individuals target networks and try to bring
them to a standstill by activating programs like worms or bombarding the
network with bogus requests, both of which keep the network so busy that the
normal activity on the network cannot continue. A denial of service attack can
cost organisations lots of money in terms of lost business, damaged reputation
and wasted manpower.
Hacking
Hackers can be likened to digital burglars using a network to gain
unauthorised access to other people’s computer systems in order to place
viruses, copy or delete data.
Spyware
Spyware is software that secretly records the activities of an unsuspecting
computer user. The majority of spyware is malicious, aiming to capture
passwords, banking and credit card details, and send them over the internet to
fraudsters.
Keylogger
A keylogger is a type of surveillance software that can record every keystroke
made by a user and save it to a file. A keylogger recorder can record instant
messages, email and any information typed at any time on the user’s
keyboard. The file created by the keylogger can then be sent back over the
network to, for example, a fraudster.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
57
SUBJECT CONTENT
Phishing
Phishing is the act of fooling a computer user into submitting personal
information by creating a fake website that looks like a real (and trusted) site.
It is a hacking technique to ‘fish’ for passwords and other secret financial
information.
Software security measures
Antivirus software
A group of programs devised to stop or find and remove viruses from
computer systems. To be most effective, antivirus software should be running
all the time, scanning the system, checking for tell-tale virus signatures or
suspicious virus-like activity.
Firewalls
A firewall is a program or piece of hardware that helps stop hackers, viruses
and worms from entering a computer over the internet.
Security suites
A collection of programs controlled by a single control panel that provides the
user with a number of functions in one place, including antivirus, firewall,
antispam, parental controls, website authentication, password storage and
protection against identity theft. Some security suites also include backup and
computer tune-up services.
User identities (IDs) and passwords
Only authorised users are issued with the IDs and passwords that are needed
to gain entry to the network. When users log on, the computer system checks
their IDs and passwords, and tries to match them with those on file. Users only
gain access to the network if the IDs and passwords they have entered match
those kept on the system.
Biometrics
Some systems use biometric technology to ensure that only authorised users
gain access to a network. Biometric security involves storing data about
fingerprints, voices or people’s eyes on special smart cards.
Encryption
Encryption is the encoding of data held on the system. This means that if the
network is hacked into the data are meaningless to the hacker because they
do not have the security key to unlock or decipher the encrypted data.
58
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Exercises
1.
Which statement about viruses is true?
A
B
C
D
Only networked computers can be affected by viruses.
The best method of avoiding viruses is to use antivirus software.
All viruses delete data from the user’s hard disc.
Viruses can only be spread by sharing USB flash drives.
2.
State one way of spreading computer viruses.
3.
Describe one common symptom of a computer virus.
4.
What is the name given to gaining unauthorised access to another
person’s computer?
5.
Apart from hacking and viruses, name two other threats to
computer systems.
6.
Name two kinds of biometric security measure.
7.
If a computer has been hacked and data has been stolen how else
could that data be made secure?
8.
Name three services that could be included in a security suite.
9.
Describe what is meant by a denial of service attack.
10.
Research a recent news story about computer security. Was there
any damage or loss of data? Who was involved? Was the issue
resolved? Write a short report or presentation detailing your
findings. Swap with a neighbour after you have finished and read
their piece.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
59
SUBJECT CONTENT
Computers and the law
With the advent of computers new laws were created to tackle issues that
arose.
The Data Protection Act
Companies and organisations like the government hold a lot of personal data
about individuals. To protect this data and people’s rights, the Data Protection
Act was passed by Parliament to protect peoples’ privacy. In short the law
states that:
 all data held on a computer must be registered with the Data Protection
Agency
 if a data subject wishes to inspect data held about themselves they can
request to see their own personal data
 if data held about data subject is incorrect they can demand it is changed
 the data user is obliged to keep the data safe, secure and up to date, and
not to hold the data for longer than is necessary.
The Computer Misuse Act
This law makes it illegal to gain access to a computer without permission from
the owner. The Act also makes it illegal to create or deliberately spread
viruses that cause deliberate damage to computers.
Copyright Designs and Patents Act
The Copyright Designs and Patents Act makes it illegal:
 to make unauthorised copies of software that is copyright protected
 to send software over a network and copy it without the permission of the
licence holder
 to run unauthorised copies of software on a computer or network.
Health and safety
There are a number of health problems that can arise when working at a
computer for long periods. Repetitive strain injury (RSI), backache, headaches
and eyestrain are all conditions that can occur. By using the correct
equipment, good working practices and good posture these conditions can be
avoided.
60
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Repetitive strain injury
RSI occurs when the joints in the fingers constantly tap away at the keyboard.
The symptoms of RSI are pain in the joints of the hand. RSI can be avoided by
using an ergonomically designed keyboard in a good position coupled with
frequent breaks from typing and a good typing technique. Computer users can
also purchase gel wrist pads which support the typist at the keyboard.
Eyestrain
The symptoms of eyestrain can be blurred vision and irritated eyes, and can
be avoided by the computer user looking away from the screen at regular
intervals and focusing on a distant object.
Health and safety law
Because of the health issues mentioned above employers are now required by
law to provide the following:
 training – employees should have access to training on health and safety
issues
 eye tests – computer users should receive regular free eye tests with
spectacles provided at the employer’s expense if required
 inspections – chairs, computers and work areas should be regularly
inspected to make sure that they are up to standard
 tasks – employers should design their employees’ working day so that
workers can have regular breaks from computer-based activity.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
61
SUBJECT CONTENT
Exercises
1.
Name the law that makes hacking and creating viruses a crime.
2.
Name and describe a health and safety measure employers must
take to help their employees when using computing equipment.
3.
State the law that protects a company logo from being used by
another company without permission.
4.
Name and describe a health problem that can occur when using a
computer.
5.
Research a piece of hardware or equipment that prevents a
particular health issue when using computers. Present your
findings in a presentation or report.
6.
Describe what a company must do to adhere to the Data Protection
Act.
62
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Computers and the environment
Carbon footprint
A carbon footprint measures the amount of greenhouse gases emitted during
the production and use of a product, in this case computer equipment.
Using the internet consumes energy at the user end but also involves
electricity usage and therefore carbon emissions by the companies that run
the websites users view.
On the plus side, computers can help reduce carbon emissions by making
equipment more efficient. An example of this would be modern enginemanagement systems on cars that control the car engine to make it more fuel
efficient.
Modern manufacturers of IT equipment are constantly looking for ways to
reduce the energy consumption of devices from low–power-consumption
processors to low-energy-rated LED monitors.
With modern advances in networking, employees can telecommute, which
means that they can work from home without having to physically commute by
car, bus or train. Similarly, organisations can save money and the environment
by holding meetings using teleconferencing. Teleconferencing involves people
meeting together using webcams and microphones instead of having to leave
their normal office and travel to another city or country to meet with colleagues
or customers.
Disposal of IT equipment
What is WEEE?
WEEE is waste electronic and electrical equipment like TVs, fridges and
computers. Many smaller items slip through the net and are not treated or
recycled and get buried in landfill sites. This wastes resources and puts a
major strain on the environment.
Stores that sell electrical equipment should provide facilities to take back
WEEE. They must either offer in-store take-back or be a part of a distributor
take-back scheme (and so tell customers where to take it). There should also
be information in stores about the environmental impact of WEEE and what
customers can do to help reduce the impact their purchases make on the
environment.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
63
SUBJECT CONTENT
Consumers should consider the environmental consequences before
replacing mobile phones, computers or other gadgets. Could the equipment
be upgraded or a refurbished product be bought instead?
Computer equipment can contain lead and other hazardous materials such as
mercury and cadmium . Among the risks when exposed to these materials are
lead poisoning, high blood pressure, iron-poor blood, liver disease, nerve and
brain damage, and cancer. Because of the dangers involved with having these
devices lying around in public landfills, it is important to dispose of equipment
responsibly.
Besides environmental concerns, a risk of not disposing of equipment properly
is identity theft. Identity theft is one of the fastest growing crimes, involving
information such as names, addresses, bank and credit card information, and
social security numbers being illegally obtained from, for example, old
computer systems not properly disposed of. Identity theft can result in
damaged reputation and credit rating. Victims of identity theft may have to
deal with such effects as denied loans or credit, lost job opportunities, being
harassed by credit agencies and even being arrested for crimes they did not
commit. Recovering from identity theft can be both time-consuming and costly.
Exercises
1.
What does a carbon footprint measure?
2.
Name two risks when disposing of old computer equipment.
3.
Research on the internet or using computing magazines to find an
energy efficient computer. Produce a poster, animation or
presentation advertising the energy-efficient features of the
computer you have found.
64
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Glossary
Below is a glossary of common computing terms that you may come across
during your studies.
Analysis
The analysis stage involves reading and
understanding a problem.
Animation
File made up of moving images.
Application software
Comprises all the programs you apply to a task
such as writing a report or sending an email.
Applications package
Software that performs a particular task such
as word processing or desktop publishing.
Arithmetic/logic unit(ALU)
Component of the processor of a computer
that does the calculations and makes the
decisions.
ASCII
A 7-bit code allowing 128 different characters
to be represented.
Back up
A second copy, kept separate from the original,
of a program or file made in case the original is
lost or damaged.
Backing storage
Permanently holds data on media such as disk
or memory card.
Backing storage medium
The physical item which holds data such as
USB pen drive.
Binary
Counting using two digits, 1 and 0.
Binary language
Machine language represented using a series
of 0s and 1s.
Biometrics
Security method using physical characteristics
to identify a user such as fingerprints, retinal
scan or voiceprint.
Bit
A binary digit, either one (1) or zero (0).
Broadband connection
A high-speed internet connection.
Byte
A collection of eight bits.
Central processing unit
(CPU)
The hardware component that processes data.
Computer system
A combination of all the components required
to process and store data using a computer.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
65
SUBJECT CONTENT
Control unit
Controls parts of the processor and ensures
instructions are in the correct order.
Cropping
Taking away part of a graphic.
Debugging
The process of finding and correcting program
errors.
Documentation
All the supporting paperwork for a program.
DTP
Desktop publishing.
Embedded system
Minicomputer inside another piece of
equipment such as a car or a mobile phone.
Encryption
Formatting a message into a secret code so
that it can’t be understood by anyone who is
not authorised to view it.
Evaluation
Evaluation involves reviewing a solution
against a checklist of requirements,
highlighting any strengths, weaknesses and
improvements needed.
Exceptional test data
Test data that should be rejected by the
program.
Extreme test data
Test data that is on the limit of acceptability.
Field
A single item of data stored in a record.
File management
A function of an operating system dealing with
how files are held, controlling the process of
saving or loading files from disk.
File server
Central disk storage for users' programs on
network.
Flowchart
A pictorial representation of the logical steps it
takes to solve a problem.
Graphical user interface
(GUI)
Allows users to interact with a program in a
graphical environment.
Hardware
The equipment or physical devices that are
associated with a computer.
66
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Hotspot
An area of a graphics or piece of text that
performs a function when selected. Hot spots
are particularly common in multimedia
applications, where selecting a hot spot can
make the application display a picture, run a
video or open a new window of information.
HTML
Hypertext mark-up language – the language
used to write web pages.
Human computer
interface (HCI)
The means by which a computer and user
communicate.
Hyperlink
Links between web pages, documents or files
activated by clicking on text or on a particular
area of the screen, such as a graphic.
Icons
Symbols or pictures on a screen.
Import
To bring in data from one program file to
another.
Information
Data that has been processed.
Inkjet printer
Reproduces images using dots produced by
tiny jets of inks.
Input
Describes the entry of data items into
computer memory using hardware devices
such as a keyboard or mouse.
Input device
Allows data to be entered, such as a scanner
or a mouse.
Interface
Part of a computer system that allows different
devices to communicate with the processor by
compensating for any differences in their
operation.
Internet
Area network spanning the globe.
LCD
Liquid crystal display.
Local area network (LAN)
A network within a single room or building.
Macro
A set of commands activated by a single
keystroke.
Mailbox
Where electronic mail is stored while waiting to
be read/downloaded.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
67
SUBJECT CONTENT
Menu
List on-screen from which choices may be
made by the user.
Monitor
Output device to view computer activity.
Non-volatile
Describes storage whose contents are retained
when power is lost.
Online help
Help available in the form of information
screens built into the program being used.
Online tutorial
Step-by-step lessons on how to use a
computer program.
Operating system
Programs which control the operation of a
computer system.
Optical character
recognition (OCR)
Characters on paper can be digitised into an
editable document for use on a computer.
Optical storage
A form of non-magnetic storage read by a laser
beam being reflected off the pits and bumps on
the disk surface.
Output
Describes the operation of retrieving
information from memory and sending it to a
device, such as a monitor or printer, so people
can view, interpret and use the results.
Output device
A device which displays data from a computer
system, such as a printer.
Palmtop
A hand-held computer with an LCD screen
using a stylus and touchscreen for input.
Password
A secret code used to gain access to private
information on a computer system or to log on
to a network.
Peripheral
A device attached to a computer for input,
output or backing storage.
Pixel
Short for picture element; small dots used to
make up a picture on a screen.
PPM
The speed at which a printer can output pages
of print, measured in pages per minute.
Processing data items
May involve organising items, checking them
for accuracy or performing calculations with
them.
68
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Processor
The part of a computer that carries out the
process.
Program
A list of instructions that tell the computer what
to do.
Random access
Files are accessed directly.
Random access memory
(RAM)
Computer chip that stores data temporarily;
data are lost when the computer is powered
down.
Read-only memory (ROM)
Computer chip that stores data permanently:
data are not lost when the computer Is
powered down.
Record
Data structure consisting of multiple fields of
information.
Registers
Fast-access memory locations inside a
processor.
Resolution
Quality of a picture: more pixels mean better
quality.
Rich text format
Stores information about text, including
formatting.
Rotate
Turn a graphic or picture around.
Scale
Making a graphic smaller or bigger.
Scanner
Input device that allows printed text/graphics to
be digitised.
Scrolling
Moving the display on the screen using cursor
keys or mouse.
Sequential access
Files are accessed one after another.
Software
Instructions that tell the hardware what to do.
Speaker
Output device allowing sound to be produced
by a device.
Spellchecker
Software feature that compares the words in a
document with the words in an electronic
dictionary and offers alternatives if no match is
found.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
69
SUBJECT CONTENT
Spreadsheet
A program used for numeric data, calculations
and graphs divided into rows and columns.
The individual cells in a spreadsheet can
contain text, numbers and formulae.
Standard file formats
A way of storing data for use by a number of
different application packages.
Technical guide
Contains the installation instructions and
technical requirements of a piece of software.
Template
Ready-made structure/layout for a document.
Text editor
Allows source program code to be entered and
changed.
Transition
How one slide, page or scene changes to
another.
Translator
Converts a high-level language program into
low-level machine code so the processor can
use it.
User guide
Explains the functions and features of a piece
of software.
Username
The means of identifying a user on a computer
system or network.
Validation
A check carried out by the computer on any
data to see if it is unreasonable or incomplete,
for example to see if a value is within a range
(range check).
Viruses
A harmful piece of software that attaches itself
to a file, reproduces and spreads.
70
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
SUBJECT CONTENT
Qualifications
The requirements for a qualification in Computing Science National 4 or
National 5 are laid out in the SQA documentation, which can be accessed
from http://www.sqa.org.uk/sqa/48477.html.
To gain a course award, a learner must pass all units as well as the Value
Added Unit at National 4 or the course assessment at National 5. The course
assessment will contain the Added Value Unit and will consist of a question
paper and an assignment. The assignment will be assessed under controlled
conditions and marked externally.
INFORMATION SYSTEM DESIGN AND DEVELOPMENT UNITS (COMPUTING SCIENCE NAT 4/5)
© Crown copyright 2013
71
Download