Information TechnologyGCSE/Key Stage 4

advertisement
GCSE Information Technology
Page 1
GCSE Information Technology
Contents
Chapter 0 - Introduction
0.1 About this book
0.2 Applications Used
0.3 Questions/Answers
0.4 Optional Research
0.5 Bookmarks
Chapter 1 - Introduction to Information Technology
1.1 Definitions for this Chapter
1.2 Information Technology - Defined
1.3 Digital vs. Analogue
Chapter 2 - Information and Data
2.1 Definitions for this Chapter
2.2 Information and Data
2.3 Data Types
2.4 Character Sets
2.5 Coding Data
2.6 Processing Information
Chapter 3 - Computers and Types of Processing
3.1 Definitions for this Chapter
3.2 What makes up a Computer?
3.3 Types of Computer
3.4 Types of Processing
Chapter 4 - Capturing and Inputting Data
4.1 Definitions for this Chapter
4.2 Data Capture
4.3 Inputting Data
Chapter 5 - User Interfaces
5.1 Definitions for this Chapter
5.2 User Interfaces
Chapter 6 - Outputting Data
6.1 Definitions for this Chapter
6.2 What is an output device?
6.3 Monitors
6.4 Printers
6.5 Other Output Methods
Chapter 7 - Storing Data
7.1 Definitions for this Chapter
7.2 Storage
7.3 How a disc works
7.4 Accessing Storage
7.5 Files
7.6 Security of files
Chapter 8 - Applications Software
8.1 Definitions for this Chapter
8.2 Software, Programs and Applications Software
8.3 Types of Application Package
8.4 Deciding which package to buy
Page 2
GCSE Information Technology
Contents
8.5 Some typical packages
8.6 Communication between packages
Chapter 9 -Word Processing
9.1 Definitions for this Chapter
9.2 Introduction to Word Processing
9.3 Margins
9.4 Indents
9.5 Tabs
9.6 Blocks of text
Chapter 10 - Databases
10.1 Definitions for this Chapter
10.2 What is a database?
10.3 Setting up a database
10.4 Using a database
Chapter 11 - Spreadsheets
11.1 Definitions for this Chapter
11.2 Models
11.3 Spreadsheets
Chapter 12 - Graphics
12.1 Definitions for this Chapter
12.2 Graphics
Chapter 13 - Communications and Networks
13.1 Definitions for this Chapter
13.1 Introduction to Communications and Networks
13.3 Types of Network
Chapter 14 - Control Systems
14.1 Definitions for this Chapter
14.2 What is a Control System?
14.3 Communicating with the devices
14.4 What can the computer control?
14.5 Feedback
14.6 Turtles and LOGO
Chapter 15 - Developing Systems
15.1 Definitions for this Chapter
15.2 The System Life Cycle
Chapter 16 - Documentation
16.1 Definitions for this Chapter
16.2 Types of documentation
16.3 Flowcharts
Chapter 17 - The impact of IT
17.1 Definitions for this Chapter
17.2 A brief History
17.3 The effect IT have had on our lives
Chapter 18 - Your Coursework Project
18.1 Introduction
18.2 What shall I do for my coursework?
18.3 How do I do my coursework?
Chapter 99 - Answers to Questions
Page 3
GCSE Information Technology
Chapter 0 - Introduction
Chapter 0 - Introduction
0.1 About this book
This book is for Information Technology GCSE Key Stage 4. It is known as a short
course. This means, in order to get a GCSE certificate the students have to continue
with their IT studies to convert the course into a GCSE for Information Systems.
Alternatively, they can combine Information Technology with another subject to give
a combined GCSE.
This book covers the syllabuses for all examination boards.
0.2 Applications Used
This book was written using Microsoft Office (Word 6, Excel 5 and Access 2). The
screen shots are taken from these packages.
However, the book does not assume the student is using any particular package.
The author would like to thank Microsoft for permission to use the screen shots.
0.3 Questions/Answers
Most sections have questions at the end. These check the students understanding of
the material just presented. The teacher can obviously choose which questions to use
and can incorporate their own.
Suggested answers to the questions are given in Chapter 99. For obvious reasons, the
students should not be given access to this chapter.
0.4 Optional Research
At the end of each chapter there is normally an ‘optional research’ section. This
material is not examinable but could be used as exercises for students who show a
strong interest in IT.
0.5 Bookmarks
In order to make this book as easy to use as possible ‘bookmarks’ have been placed at
the start of each chapter. If you use Word to read this book you can use the
Edit/Bookmark menu to display a dialogue box; like this:
You can now select the Chapter you want to go to and Click on Go To.
Page 4
GCSE Information Technology
Chapter 1 - Introduction to Information Technology
Chapter 1 - Introduction to Information Technology
1.1 Definitions for this Chapter
Information Technology (IT) : Describes the equipment and software used to process
information. It is not only used when talking about computers.
Digital : Describes something which can be in a known numbers of states.
Analogue : Describes something which is continuously variable - for example sound
or
the level of a river.
1.2 Information Technology - Defined
The term Information Technology (IT) is used to describe the equipment we use to
process information and the software we use to carry out those processes.
A calculator is an example of IT. It is a piece of technology that processes numbers
that we enter into it.
A telephone is another example. It processes the sounds that we make so that they can
be understood by somebody, perhaps, on the other side of the world.
Of course, a computer is another (and perhaps the most common) example of IT. It is
also probably the most versatile example of IT as it can be used as a Word Processor,
a Database, a Spreadsheet; in fact a computers uses are also unlimited.
There are generally considered to be five main areas of IT; these being:
1. Handling Information : This includes sorting data, searching for data and carrying
out analysis on data. This is typically done by a database program but many other
types of program also carry out these operations.
2. Communicating Data : Using IT it is possible to send data around the world by
telephone lines, radio waves - even microwaves. Before this technology was
available it could be weeks or even months, before you could get access to
information on the other side of the world.
3. Measuring and Control : This area of IT allows a machine to interact with the
outside world and act on the input it receives. For example, a car production line is
able to sense when a car body is in a certain position and weld together the relevant
parts of the car.
4. Presenting Information : IT is useless unless the output of the various processes
is presented in a form we understand. Word Processors, Desk Top Publishers even the television - takes raw data and presents it in a format we can understand
and find attractive.
5. Modelling the Real World : Using simulations we can see what happens if we do
something without having to do it for real. The government, for example, may run
a simulation to see what would happen if they were to raise interest rates.
Spreadsheet applications are often used to build models of, say, a company’s
accounts.
Page 5
GCSE Information Technology
Chapter 1 - Introduction to Information Technology
Q.1.2 Questions
Q.1.2.1 Give three examples of IT, that you use every day.
Q.1.2.2 Looking at the five main areas of IT, above, give one example of each area
that you use in everyday life
1.3 Digital vs. Analogue
In IT you will often hear the term digital and occasionally the term analogue. But what
do they mean?
Digital : If something can be in one or more specific states it is said to be digital. For
example, a light switch is either on or off - it cannot be in between. This could be
described as a digital device. Another example are the coins in your pocket. They
can only take certain values. A single coin cannot represent a value of, say, seven
pence.
Analogue : If something varies continuously it is said to be an analogue device. For
example, a river is analogue as its level is constantly changing. Another example is
a television signal. The picture is represented by a constantly varying signal which
eventually arrives at your TV set.
Q.1.3 Questions
Q.1.3.1 Would you consider the following digital or analogue?
i The music coming from a speaker
ii The price of postage stamps
iii Whether a bank account is in credit or debit (in the black or in the red)?
iv The different combinations of colours a traffic light can have
Q.1.3.2 Give an example of something which is digital and something which is
analogue?
Page 6
GCSE Information Technology
Chapter 2 - Information and data
Chapter 2 - Information and Data
2.1 Definitions for this Chapter
Information : Facts and knowledge that has meaning.
Data : Information that is held in a form that can be processed.
Data Type : Describes how a piece of data can be used and stored.
Data Processing Cycle : The sequence of events that is used to process information.
2.2 Information and Data
Information and data are fundamental to IT. Everything we consider in this book is
somehow related to Information and Data.
But what is the difference between the two terms? As can be seen in the definitions
(above), information has some sort of meaning whereas data is information in a form
in which it can be processed.
Here are some examples:
Information




A telephone directory.
A company report.
A class register showing who has attended each day.
A letter produced on a word processor.
Data
 The names which are in a telephone directory.
 A company report stored in a word processor document.
 A list of students in a class.
Notice how the information has meaning. By comparison, the data does not have
meaning; at least not until we do something to convert it (process it).
For example, a company report stored on your computer does not have meaning. But
if we apply a process to it (in the form of a Word Processor) we can print something
that does have meaning.
Sometimes it is not always easy to decide if something is information or data.
A list of students in a class could be information if all you wanted to know was who
was in the class. But if you wanted to know who has attended each day the data would
need to be processed so that it is a class register.
In some cases data and information is different depending on who is looking at it.
If you cannot read French, a book written in that language is just data but it is
information to somebody who understands the language as they can make sense of the
words.
Page 7
GCSE Information Technology
Chapter 2 - Information and data
Q.2.2 Questions
Q.2.2.1 Give two examples of information?
Q.2.2.2 Give two examples of data?
Q.2.2.3 Whether something is information or data sometimes depends on who is
looking at it. Give two examples where this could be the case and say who would
regard it as information and who would regard it as data?
2.3 Data Types
A data type describes how data is processed and stored.
The number 3.67 is a numeric data type. Being numeric we can perform calculations
on it. We could, for example, add 34.78 to it.
The characters ‘computer’ is a string data type. It makes no sense to add 34.78 to the
word computer.
As well as dictating the operations that can be performed on the data, the data type
also defines how the data is stored. Numeric values are normally stored in a special
format that makes calculations easier for a computer to do.
2.3.1 Examples of Data Types
These are some of the common data types. There are others and, sometimes, you are
allowed to define your own.
Character
String
Numeric
Integer
A single letter, punctuation character or number. For example ‘a’, ‘!’
and ‘3’. There are also special characters which cannot be printed or
seen on the screen. If you are printing a report and the printer starts a
new page a ‘Form Feed’ control character has been sent to the printer.
Although you cannot see a ‘Form Feed’ on the screen it is still a
character.
There are also other characters which are simple graphics. Using these
you can get special effects such as drawing a border around a screen.
A series of characters. For example, “This is a string”. A string that
contains both letters and numbers is sometimes referred to as an
alphanumeric data type
A number. For example 12.45, -678.98, +5.89234
A whole number. For example 12, 19862, 100861
Page 8
GCSE Information Technology
Chapter 2 - Information and data
Q.2.3 Questions
Q.2.3.1 Look at the following data and say which data type best describes it
i
12
ii
a
iii
aa
iv
-34.98
v
A telephone number
vi
Your age
vii
Your Christian Name
2.4 Character Sets
A character set is a complete set of characters used for a specific purpose.
The character set for a computer typically consists of 256 characters (called the ASCII
(pronounced askey) character set). This contains all the characters that your computer
uses. It includes all the numbers, letters and punctuation symbols. It also includes
many other characters; some of which are not printable (for example a form feed
character).
Q.2.4 Questions
Q.2.4.1 What characters do you think make up the character set of the English
language?
Q.2.4.2 What is the character set for all the non-vowel characters in the English
alphabet.
2.5 Coding Data
You already use codes in your everyday life without even realising it. A date such as
21/07/61 is a code for 21st July 1961. A time given as 21:15 is a code for a quarter
past nine in the evening. Your bank account number is a code that represents your
account within the bank.
Computers also use codes to store data. Some of the reasons for this are as follows.
 It uses less space. An international company might use a two character code to
represent a country rather than the full name of the country; say ‘UK’ instead of
‘United Kingdom’.
 It makes the data easier to handle. In the above example manipulating “UK” is
easier (and faster) than having to manipulate “United Kingdom”
 It is more consistent. Users are less likely to make a mistake entering ‘UK’ rather
than ‘Unitex Kingdom’ (see what I mean?)
 The computer is able to perform validation easier as there are only a certain number
of codes. By contrast you might enter ‘United Kingdom’, ‘Britain’ or ‘England’ to
represent the same country.
Of course, there are problems with using codes. Probably the main one is the fact that
the user has to be familiar with the codes being used or else keep looking them up.
Page 9
GCSE Information Technology
Chapter 2 - Information and data
However this is not so much of a problem these days as the computer themselves can
assist in the process and make the codes being used almost invisible to the users.
Q.2.5 Questions
Q.2.5.1 Give three examples of where you use codes in your daily life, almost without
realising it.
Q.2.5.2 If you were asked to introduce a coding scheme for the Premier Division
Football teams how would you do it? As well as devising a coding scheme what else
would you need to think about?
2.6 Processing Information
Computers are all about processing information (normally called Information
Processing). There is a typical sequence of events in processing information called the
data processing cycle. The normal sequence of events is;
1. Data Collection is the collection of data from whichever source you are using. It
might be a survey conducted on the High Street, figures from company accounts or
the names of people who will be attending school next term.
2. Data Input is inputting the data into the computer. How and where you input the
data will depend on the type of data, the equipment you have available and the type
of software you are using.
As the data is input it is checked (validated) and stored on the computer in a
suitable format for later processing. The concept of a data type (covered above) is
important in the input phase of the data processing cycle.
3. Processing is converting the data from one form to another. Maybe, a set of
company accounts for a High Street retailer needs to be sorted into some sort of
order. Maybe you want to use the data you have inputted to produce summary
information by adding up all the figures for each store to give one total.
4. Output is concerned with producing output from the data in a form acceptable to
the person processing the data. Maybe the output will be a set of company accounts
ready to submit to the tax office. Maybe, for a supermarket, it will be bar code
labels that they will put on the shelves, together with a price for each item.
This cycle continues so that after you have produced the output you will go back to the
beginning and collect more input. For example, a supermarket will receive deliveries
and sell goods. This data has to be collected and input to the computer on a daily
basis.
Q.2.6 Questions
Q.2.6.1 Consider a class register. Identify what happens to it during the various phases
of the data processing life cycle.
Page 10
GCSE Information Technology
Chapter 2 - Information and data
R.2 Optional Further Research
R.2.1 The ASCII character set is the most commonly used character set. What does
ASCII stand for?
EBCIDIC is another common character set. What does EBCIDIC stand for?
Get a copy of the ASCII character set and find out how many control characters there
are.
R.2.2 What code is used to uniquely identify a book? What does each part of the code
represent?
R.2.3 A light switch could be described as a binary device. What is meant by binary
and why is it important with regards to computers?
Page 11
GCSE Information Technology
Chapter 3 - Computers and Types of Processing
Chapter 3 - Computers and Types of Processing
3.1 Definitions for this Chapter
Computer : A device that processes data that has had input put into it. The processing
is done via a series of fixed instructions, usually called a program.
Central Processing Unit : The main part of the computer which controls all the other
parts of the computer.
RAM : Random Access Memory. Temporary storage in a computer that holds
programs and data.
ROM : Read Only Memory. Similar to RAM but you cannot write to the memory.
Normally stores programs which never change.
Discs : Used for permanent storage of data. There are three types of disc; Hard Discs,
Floppy Discs and CD-ROM’s.
Hardware : The physical pieces of equipment that make up a computer.
Software : The instructions that tell the computer what to do.
Personal Computer (PC) : A computer used by one person at a time.
Mainframe Computer : Large computers that can look after many jobs and users at
the same time.
Minicomputer : A computer that is more powerful than a PC but not as powerful as a
mainframe. Usually runs many jobs and has many people attached to it at the same
time.
Stand-Alone system : A computer used by one person at a time.
Multi-User system : A computer used by many people at the same time.
Real Time Processing : A computer that reacts to input as soon as it receives it.
Interactive Processing : You communicate with the computer and it responds; like a
two way conversation.
3.2 What makes up a Computer?
Before we start to look at the things that computers can do it is useful to know what a
computer is and identify the various parts that make up a computer.
What we are about to discuss is a typical computer.
 Computers are built using Hardware and Software.
The best definition we have ever heard for Hardware is “If you kick it, it clangs.”
From this you might be able to work out that hardware are all the physical bits and
pieces like the screen, the keyboard, the mouse and the computer case.
Software is what makes it all work. Software are the instructions to the computer
that tell it what to do. Software is often referred to as programs or applications.
 Every computer has a Central Processing Unit (CPU). This is the main part of the
computer and it controls everything the computer does; including looking after
access to devices (such as printers) which are not part of the CPU.
 Memory is used by the computer to store data. There are three main types of
memory
Page 12
GCSE Information Technology
Chapter 3 - Computers and Types of Processing
 RAM (Random Access Memory - also called Read Write Memory). This
memory is used as a temporary storage area. It is temporary as the contents of
RAM is lost when the computer is switched off.
RAM is used to hold programs that the computer is currently processing and
also to hold data which the program is using.
 ROM (Read Only Memory). This type of memory is like RAM except it can
only be read; unlike RAM which can be read and written to. ROM is put into
the computer by the manufacturer and it typically contains programs that are
used by the system itself. For example, the program that recognises when you
press a key on the keyboard could be in ROM.
 Backing Store, which is normally in the form of a disc or a magnetic tape.
There are three types of disc; Hard disc, Floppy Disc and CD-ROM.
 Hard discs are situated inside the main case of the computer and are used
for day to day storage.
 Floppy discs can be put into the computer and then have data copied onto it;
either for security purposes or so the data can be transferred to another
computer.
 CD-ROM’s are read only and are usually used to distribute software.
Magnetic tape works in the same way as a cassette recorder except that it
records computer data rather than music or sounds.
All discs and tapes are persistent media in that they retain the information
on
them even if the power is switched off.
 Peripherals are anything that is outside the main case. For example a screen
or a printer.
Q.3.2 Questions
Q.3.2.1 If some data is in RAM why should you regularly copy the data to a disc
drive?
Q.3.2.2 What is one advantage of distributing software (programs) on CD-ROM as
opposed to using floppy discs?
Q.3.2.3 From the following list decide if each item is hardware or software?
i
A Floppy Disc
ii
A Word Processing Program
iii
A Computer Game
iv
A Joystick
3.3 Types of Computer
There are three main types of computer
3.3.1 Personal Computers
As the name suggests a Personal Computer (or PC) is for personal use. It is normally
used by one person (a single user system). In a school you will almost certainly be
using PC’s. The majority of people in large companies have PC’s on their desks.
Page 13
GCSE Information Technology
Chapter 3 - Computers and Types of Processing
3.3.2 Mainframe Computers
These are large computers that cost millions of pounds. They are used by large
companies and government departments such as the tax office. Mainframes have large
memories and storage capacities and often run 24 hours a day.
Mainframes are capable of looking after many jobs at the same time and have many
people using them at the same time. Many PC’s in companies are connected to the
mainframe.
Mainframes often hold all the information about the business and its customers which
is accessed by PC’s which are on the employees’ desks.
A mainframe is often in a secure area and has to be in an air-conditioned room due to
the amount of heat it generates.
Mainframe computers are known as multi-user systems as many people can use the
computer at the same time.
3.3.3 Minicomputers
Minicomputers come somewhere in between PC’s and mainframes. They are less
powerful than mainframes but are used when a PC is not powerful enough for the
required job.
Like mainframes, minicomputers often have PC’s attached to them so that the data
can be accessed from people’s desks.
Minicomputers are usually multi-user systems.
Q.3.3 Questions
Q.3.3.1 What do you think is a disadvantage of a multi-user system?
Q.3.3.2 What do you think is a disadvantage of a single-user system?
3.4 Types of Processing
Computers can do various types of processing. In this section we are going to consider
some of them.
3.4.1 Real Time Processing
If a computer is reacting to input as soon as it arrives and then producing some form
of output as soon as it has processed the data then it is known as a real time system;
that is, it’s processing the data in real time.
A bank cash machine is operating in real time. You are asking for money, your
account is checked and money is given to you providing you have sufficient funds.
An aeroplane is an even better example. If it is flying under automatic pilot it is
certainly operating in real time. If it gets too close to the ground it must do something
quickly. It is no good waiting ten minutes, finishing another job before it gets to the
input that says “the ground is fast approaching.”
Because real time processing requires the computer to always be able to process any
input, real time processing is normally done on a dedicated computer so that is does
not get side-tracked by other, less important, tasks.
Page 14
GCSE Information Technology
Chapter 3 - Computers and Types of Processing
3.4.1 Interactive Processing
If you sit at a computer and type an instruction and then receive a reply you are using
the computer in an interactive mode. If the computer is also being used by other
people, for example a mainframe computer at a bank, you may have to wait for the
computer to get around to processing your input and replying to you. But you will
receive a reply eventually.
If you are using a stand-alone computer (where you are the only person using it) the
reply could be almost immediate, unless you have asked the computer to carry out a
task that takes it a long time.
Most things you will be doing on a PC are examples of interactive processing. For
example, typing a letter using a Word Processor is an interactive task.
Q.3.4 Questions
Q.3.4.1 Do you think the following are interactive or real time processes, or both;
i A flight simulator
ii Using a calculator
iii Booking a holiday at a Travel Agents
iv A Crossword Puzzle on a computer
Q.3.4.2 When you buy a train ticket you can reserve a seat. Do you think the train
operator could use a single user system to provide this service? If not, why not?
R.3 Optional Further Research
R.3.1 There may be somebody at your school who will open up a computer case and
let you see inside. You may be able to identify the RAM, ROM and CPU. Do not
open the case yourself. It is dangerous and you may cause damage to yourself and
to the computer.
R.3.2 By using utilities on your computer you will be able to find out how much RAM
and disc space are installed on your computer. You can also find out how much data
can be stored on a CD-ROM.
R.3.3 Find out the name of a large company in your area that uses a large mainframe
computer. See if a visit can be arranged. Find out how the memory size and disc
capacity of their mainframe compares with a PC at your school.
Page 15
GCSE Information Technology
Chapter 4 - Capturing and Inputting Data
Chapter 4 - Capturing and Inputting Data
4.1 Definitions for this Chapter
Data Capture : Obtaining data that is then fed into a computer.
Bar Code : A series of black and white stripes which represent numbers and letters.
Magnetic Stripe : A strip of magnetically coated material. The strip contains
information which can be read by a reader.
Optical Mark Reading (OMR) : A system that read marks made on paper (typically
crosses or filling in boxes). The position of the marks represent the data.
Optical Character Recognition (OCR) : Converting marks on paper into characters,
for example, hand-writing.
Magnetic Ink Character Recognition (MICR) : Characters printed in a special way
with magnetic ink which can then be read by a special reader.
Digitising : Convert an image or sound from analogue to digital. The digital
representation can more easily be stored on computer.
Scanning : Digitising an image (e.g. photograph, logo etc.) so that it can be stored on
computer.
Scanner : The equipment used for scanning.
4.2 Data Capture
Data is being captured all the time and much of it ends up on a computer. These are
just some of the ways data is captured.
4.2.1 Data Capture Forms
If you open a bank account you have to supply your name and address and various
other details. The form you fill in is a data capture form. It is capturing data about
yourself.
If you buy a new radio you normally have to fill in a guarantee card in case something
goes wrong with it. This is another example of a data capture form.
The benefit of using a form is that the form is produced by the company so that data is
presented in a standardised form.
An enhancement to the basic data capture form is a form that is produced specifically
for you. If you belong to a book club your order form is pre-printed with your name
and address and your account number. When you return your order they know who
you are from the information already present on the form.
4.2.2 Questionnaires
You will often find examples of questionnaires in the High Street when you are
stopped by somebody and asked to answer a few questions.
Designing a good questionnaire is very difficult. Some of the points you need to bear
in mind are (and there are many others);
 What type of questions should you ask; multi-choice questions, questions where
the person being interviewed can give an opinion, questions which can have more
than one answer?
Page 16
GCSE Information Technology
Chapter 4 - Capturing and Inputting Data
 Who is the questionnaire aimed at? Are you likely to get bias results if you only
interview people aged between 18 and 30?
 Are the questions clear and unambiguous?
 Will the questions be asked personally or will they be sent through the post?
Q.4.2 Questions
Q.4.2.1 Collect five examples of forms that are designed to capture data. Say what you
think are the good and bad points about each form. Design your own form to collect
data about your classmates. How does your form compare to others in your class?
Q.4.2.2 Give three examples of data capture forms where the form has already been
pre-printed with details about yourself.
Q.4.2.3 Design a simple questionnaire and try it out on people at school (both students
and teachers). What problems did you encounter? What could you have done to
reduce these problems?
4.3 Inputting Data
Data Capture is closely related to Data Input. Some of the methods of inputting data
are explained below.
4.3.1 Using the keyboard
Using the keyboard is probably the most common method of inputting data into a
computer. If you write a letter on a Word Processor you will almost certainly use this
method.
4.3.2 Mouse
A mouse is almost as common as a keyboard due to the rise in popularity of Graphical
User Interfaces. You communicate with the computer by moving a pointer around the
screen and then clicking one of the mouse buttons to carry out some task.
Mice, typically, have two or three buttons.
4.3.3 Bar Codes
You probably have seen bar codes being used in supermarkets (you can also see them
on books and magazines).
Most goods you buy are marked with a bar code and these are scanned at the till. The
bar code identifies the goods and the computer returns the price you have to pay. Note
that the price is not part of the bar code otherwise every shop would have to charge the
same price.
The numbers that are represented by the bar code are printed underneath the code.
This is so the numbers can be input manually if the bar code cannot be read.
Page 17
GCSE Information Technology
Chapter 4 - Capturing and Inputting Data
4.3.4 Magnetic Strips
Magnetic strips are most commonly found on bank cards. If you look at the back of a
bank card you can see the strip. It holds information about the owner which is read
when it is inserted into the cash point (or swiped through a machine).
Magnetic strips are also used in other places and you are asked to consider these as
part of the questions.
4.3.5 OMR, OCR and MICR
OMR (Optical Mark Reading), OCR (Optical Character Reading) and MICR
(Magnetic Ink Character Recognition) are all examples where the data is read from a
form by the computer or by a document reader which is specially designed to do the
job.
 OMR reads marks made on a form and ‘understands’ the data because the mark
was made in a specific place on the form.
OMR is being used when you are asked to complete a multiple choice examination.
You may have thought that an examiner had to mark each form (if you had thought
about it at all). In fact the papers are probably being marked automatically using
OMR to check if you have made the correct choices.
 OCR is used to read hand-written characters and to try to understand what they
represent. It is quite a complicated thing to do.
To see why this is so, get ten of your friends to write down the same sentence and
look at the difference in the writing. It is difficult for a computer to interpret all of
these reliably. It is for this reason that you are often asked to use block capitals or
are given spaces in which to write each character.
 If you look at a cheque you will see a series of characters printed at the bottom. Not
only are they a strange shape but they are also magnetised. Being magnetic they can
be read by special equipment. This is an example of MICR.
The reason MICR is used is to reduce fraud. If normal characters, with normal ink,
were used it would mean that a fraudulent cheque was relatively easy to produce.
Not a good idea for a bank.
4.3.6 Touching the screen
Some screens allow you to point at them and the action taken by the computer
depends on where you touch the screen. To assist you to touch the right part of the
screen, pictures are often used to guide you to the correct area. You may have seen
this type of data input at Tourist Information Points or Railway Stations.
An adaptation of this method is touching the screen with a pen or ‘stylus’.
Page 18
GCSE Information Technology
Chapter 4 - Capturing and Inputting Data
4.3.7 Scanning
If you wish to store a picture (such as a photograph or a logo) on a computer the most
common method of inputting it is to scan it. This is done with a scanner that converts
the image into a form that can be stored on the computer. That is it digitises it.
There are two main types of scanners.
Hand-held scanners are moved across the picture. They are cheap and portable.
With a flat-bed scanner the image is laid on the scanner itself. These are more
expensive but allow better quality images to be captured.
Scanners are also used to read characters that are then processed by OCR software.
4.3.8 Human Speech
Human Speech is input to a computer via a microphone. The sound, like images, are
converted to a form which is suitable for storage on a computer.
4.3.9 Sensors
It is possible to have a variety of sensors connected to a computer. For example, a
thermometer could be connected which tells the computer the temperature. The
computer can use this information to control something like a central heating system.
Q.4.3 Questions
Q.4.3.1 Next time you are in your local town see how many different ways you can
find that retailers capture data.
Q.4.3.2 Apart from cheque and cash cards where else would you find a magnetic
strip?
Q.4.3.3 As long as you are aged sixteen or over you can go into thousands of shops,
pay one pound and see OMR in action. What would you be doing?
Q.4.3.4 Give one advantage and disadvantage of OMR, OCR and MICR
Q.4.3.5 Can you think of another type of input device that is commonly used to play
games?
R.4 Optional Further Research
R.4.1 Try to arrange a visit to a local company. Ask them how many different ways
they collect data from their customers.
R.4.2 A computer keyboard is often called a “QWERTY” keyboard. Why is this? And
why is a keyboard laid out this way?
R.4.3 How many keys on a computer keyboard actually display a character on the
screen when it is pressed? What are the other keys used for?
R.4.4 All books have an ISBN number which is represented as a barcode somewhere
on the book (normally on the back cover). What do the various parts of the ISBN
number represent?
Page 19
GCSE Information Technology
Chapter 5 - User Interface
Chapter 5 - User Interfaces
5.1 Definitions for this Chapter
User Interface : How a person communicates with a computer
Command Line Interface : A type of interface where the user types commands (via a
keyboard) to the computer.
Command Line Prompt : The characters which are displayed inviting you to type
something.
Graphical User Interface : A type of interface where a graphical interface is used.
The
interface normally consists of menus, icons (pictures) and windows. A mouse, as well
as the keyboard, is used to enter commands.
5.2 User Interfaces
The User Interface is the way in which you communicate with a computer and the way
the computer communicates back to you.
There are two main types of User Interface; Command Line Interfaces and Graphical
User Interfaces.
5.2.1 Command Line Interfaces
An example of a Command Line Interface is shown below. Explanations are provided
for the most important aspects of this interface.
This is a
command that
has been
typed in.
This is the
output of the
command
This is the
prompt, waiting
for the next
command to be
typed
This particular screen is showing the DIR command being used on an IBM compatible
PC. The DIR command gives a listing of files which match the file specification. In
this case it is any files with an extension of BAT.
Page 20
GCSE Information Technology
Chapter 5 - User Interface
5.2.2 Graphical User Interface
Graphical User Interfaces (GUI’s - pronounced Gooey) present the user with a
graphical representation that the user manipulates using the mouse and keyboard.
There are four main parts to a GUI; these being;
Windows. This is where information is displayed. Windows can be made bigger
and smaller and moved around the screen.
Icons. These are little pictures which the user can click on (with the mouse
pointer) to perform certain actions. For example, you might click on a printer icon
to print a document.
Menus. Windows may optionally have menus. They are normally situated across
the top of the window and they drop down when you click on them. (Note that
Acorn machines, which you may have used, have pop up menus which appear
when you click another mouse button).
Pointer. This is an arrow on the screen which represents the mouse. When you
move the mouse the pointer moves. To perform an action you move the pointer to
the relevant part of the screen and then click the mouse.
Here is an example of a Graphical User Interface. In fact it was the GUI being used
whilst writing this book
Page 21
GCSE Information Technology
Chapter 5 - User Interface
Icon
Menu
Window
Pointer
Q.5.2 Questions
Q.5.2.1 What do you consider the main advantages of a GUI over a Command Line
Interface?
Q.5.2.2 If you have access to an IBM compatible PC go to the Command Line
Interface (the DOS Prompt) and try these commands. What do they do?
i DIR
ii CLS
iii COPY C:\AUTOEXEC.BAT MYFILE.BAT
iv PROMPT $T
(Note : You may not be allowed access to the DOS prompt. In which case you will be
unable to do this question)
Q.5.2.3 GUI’s are sometimes called WIMP environments. Why do you think this is?
Page 22
GCSE Information Technology
Chapter 5 - User Interface
R.5 Optional Further Research
R.5.1 See if you can arrange a visit to a local company which uses a variety of
computers. Identify how many different types of User Interface they use and classify
them into Command Line Interface and GUI’s
Page 23
GCSE Information Technology
Chapter 6 - Outputting Data
Chapter 6 - Outputting Data
6.1 Definitions for this Chapter
Output Device : A device that receives an electrical signal and converts it to data or
information.
Pixel (Picture Element) : The smallest unit of information on a monitor.
Resolution : The amount of detail (number of pixels) on a monitor.
Screen Mode : The mixture of colours, resolution and text/graphics allowed on a
monitor.
Dot matrix printers : Printers which make up the image on the page by pushing pins
against a ribbon to make a series of dots.
Ink jet printers : Printers which squirt dots of ink at paper to make up the dots.
Laser Printers : Printers which use a laser to produce the image.
Impact/Non-Impact printers : Impact printers make contact with the paper. Non
Impact printers do not.
Character Printer : Printers which print a character at a time.
Line Printer : Printers which print a complete line at a time.
Page Printer : Printers which produce and print a complete page at a time.
Draft Quality : A mode of printing which produces lower quality output but at a faster
speed.
NLQ (Near Letter Quality) : A mode of printing which produces high quality output
but at a slower speed.
Plotters : An output device which is normally used to produce line drawings such as
plans for a house.
Microfiche : Reduced images of pages held on plastic.
It could be argued that computers are useless unless we are able to see the results of
what they produce. After all why bother collecting data, entering it into the computer
and performing various processes on that it if we cannot see the end result.
The first part of this chapter (6.1) will consider what an output device is and suggest
some devices in everyday use.
The remainder of the chapter will look at output devices that are typically connected
to computers.
6.2 What is an output device?
Calculators, telephones, faxes, supermarket tills (for receipts), hi-fi speakers and train
ticket machines are all output devices. In the context of Information Technology an
output device is something which receives an electrical signal and produces data or
information.
All of the above produce output which we regard as information.
Output which does not have meaning is said to be data (see chapter 2). A computer
controlling a robot would output data. The data would be fed to the robot which it
would interpret as an instruction to do something.
Page 24
GCSE Information Technology
Chapter 6 - Outputting Data
Q.6.2 Questions
Q.6.2.1 Give examples of two output devices - one which produces information and
one which produces data. Do not use examples given in the text and do not use
computer output devices.
6.3 Monitors
Monitors are the most often used computer output devices. In fact, a computer without
a monitor is very unusual (although possible).
6.3.1 Pixel
The picture on a monitor is made up of pixels (which is short for picture elements). A
pixel is the smallest element on a monitor. It is just like a newspaper photograph
which is made up of dots. The dot is the smallest element in the picture.
6.3.2 Resolution
The amount of detail that can be displayed on monitor is called its resolution. This is
normally measured as the number of pixels it can display. A typical number is 640
pixels by 480 pixels.
Some computers allow you to change the resolution. If you use high resolution you
have greater detail but it takes more memory to store the image. A lower resolution
results in loss of detail but you do not use as much memory.
6.3.3 Screen Modes
The number of colours you want to display affects how much memory the computer
needs to store the image. For example, it takes more memory to allow for 256 colours
as opposed to sixteen colours.
You can also decide if you only want to display text, graphics or both.
Deciding on the number of colours and whether you want graphics, or just text, allows
you to have various screen modes. For example one screen mode might allow sixteen
colours, in medium resolution with a graphics display. Different screen modes will
allow different mixes of colours, resolution and text/graphics.
Q.6.3 Questions
Q.6.3.1 Teletext is an example of a screen mode. Would you say that a teletext display
needs a high, medium or low resolution monitor? Explain your answer.
6.4 Printers
If monitors are the most common output device then printers come a close second.
Printers can be classified into three types; dot matrix, inkjet and laser printers.
Page 25
GCSE Information Technology
Chapter 6 - Outputting Data
6.4.1 Dot Matrix Printers
Dot matrix printers work by pushing small pins against a ribbon which, in turn, makes
contact with the paper.
The pins are arranged in a column. Older printers have nine pins to a column. More
modern printers have 24 pins to a column. As the print head (the print head holds the
pins) moves across the page the correct character can be printed by firing the pins in
the correct sequence.
Good quality graphics can be printed (especially with 24 pins printers), although dot
matrix printers tend to be slow and noisy.
6.4.2 Ink Jet Printers
Dot matrix printers are called impact printers as the print head actually makes contact
with the paper (albeit through the ribbon). Ink jet printers are non-impact printers.
Instead of making contact with the paper they spray fine jets of ink at the paper. The
dots they produce make up the required characters.
Instead of having a ribbon, an ink jet printer has a bottle of ink. By putting in a
different colour ink bottle you can easily get colour. Some ink jet printers have space
for more than one bottle of ink so more than one colour can be printed at the same
time.
6.4.3 Laser Printers
Laser printers, as their names suggests, work via a laser. Ink (or toner as it is more
correctly called) sticks to a light sensitive drum where a laser has touched it. The toner
is then transferred to the paper.
Laser printers can produce high resolution images. Typically they produce 90,000 dots
in a square inch (300x300). This is known as 300 dpi (dots per inch). 600 dpi laser
printers are not uncommon these days.
Q.6.4 Questions
Q.6.4.1 Imagine you are a 24 pin dot matrix printer. Using graph paper show how you
would print an “m”, an “a” and an “!”.
Q.6.4.2 A printer can either be considered a character printer (where one character is
printed at a time), a line printer (where a complete line is printed at a time) or a page
printer (where a whole page is printed at a time). Classify a dot matrix printer, an ink
jet printer and a laser printer into each of these categories.
Q.6.4.3 Many printers have two modes of operation; draft quality and letter quality
(sometimes called Near Letter Quality or NLQ). After reading the definitions at the
beginning of this chapter how do you think the two modes might be implemented on a
dot matrix printer and a laser printer?
6.5 Other Output Methods
6.5.1 Plotters
Plotters are most often used for applications which require some form of line drawing,
for example; maps, diagrams, plans etc. They usually have a pen which moves over a
fixed piece of paper. Different colours are produced by using different colour pens.
Page 26
GCSE Information Technology
Chapter 6 - Outputting Data
6.5.2 Microfiche
Microfiche stores images of paper on a plastic film. The images are held in a much
reduced form and you can easily fit thirty pages on one sheet of microfiche which is
about fifteen centimetres squared.
You might be able to see a sample of microfiche in a book shop where they sometimes
hold all the books in print on this medium in order to answer customer queries about
books in print.
A special reader is needed to look at pages stored on Microfiche.
R.6 Optional Further Research
R.6.1 There are various types of monitor (often called CGA, EGA, VGA, SVGA etc.).
Find out the characteristics of each one with regards its resolution, the number of
colours it can be display and the modes in which it can operate.
Page 27
GCSE Information Technology
Chapter 7 - Storing Data
Chapter 7 - Storing Data
7.1 Definitions for this Chapter
Main Store : Any Storage that is directly accessible by the CPU; normally RAM and
ROM.
Backing Store : Any storage that is external to the CPU (typically discs).
Read : The process of reading data from backing store and making it available to the
CPU.
Write : The process of writing data from the CPU to backing store.
Access Time : The time taken to read a piece of data requested by the CPU and
making it available for processing.
Direct Access : The ability to access a piece of data directly without having to read
preceding data.
Sequential Access : Accessing data in a serial manner. If data is at the end of a file
you
must read all the other data first.
Magnetic Tape : A sequential access backing store device that is normally used to
take
security copies of data.
File : Data or programs that are held on backing store, such as a disc. A file is given a
unique name.
Directory : A method of grouping like files together. When you place a file on a disc
you specify which directory it is to be stored in.
Security : Taking a copy of important files so that you can use it should something
happen to the original.
In Chapter 3 we discussed RAM, ROM and Discs. It might be worth reviewing this
chapter before starting this chapter.
7.2 Storage
In chapter 3 we briefly looked at some types of storage. In this chapter we will take a
closer look at storage.
7.2.1 Main Store
The main store of a computer is also known as main memory. It is the storage that is
directly available to the CPU. In a typical computer the main store is in the form of
RAM and ROM.
7.2.2 Backing Store
Backing store is any type of storage that is not directly available to the CPU. For the
processor to act upon any data it must be in main store. Therefore, if the CPU needs
some data that is on backing store it must first be loaded into main store.
The time taken to do this is known as the access time.
You should be able to appreciate that the computer will work faster if the data is
already in main store as it does not have to be retrieved from backing store. In addition
the main store is faster than backing store.
Page 28
GCSE Information Technology
Chapter 7 - Storing Data
The problem is that main store is more expensive than backing store. Therefore there
is time/cost trade-off when designing or buying a computer.
In chapter 3 we have already talked about three types of backing store (Hard Disc,
Floppy Disc and CD-ROM). If you have not done so already try to have a look at each
of these types of discs.
I am sure you have all seen a CD-ROM. Many people have them at home as part of
their hi-fi system. The CD’s used on computers are exactly the same. In fact you can
play your music CD’s on a computer.
Floppy discs are common place these days and there are probably hundreds within
your school. Can you see where the data is stored?
A hard disc is more difficult to see. You may have to ask somebody to take the lid off
a computer (do not do it yourself - it can be dangerous). To be honest, they are not
much to look at; just a metal case with a few wires sticking out.
A further type of backing store is magnetic tape. This is similar to a tape recorder but
it is connected to the computer and records data rather than music or speech.
Magnetic tape is normally used to take security copies of data which is then held away
from the computer in case there is a disaster.
If your school has a large number of computers there is a high probability that the data
is regularly backed up onto a magnetic tape. The tape should then be stored away from
the computers or placed in a fire proof safe. This means that if there is a problem with
the computer the data is secure and can be re-loaded when the problem is fixed.
Q.7.2 Questions
Q.7.2.1 How many characters can you store on a 3.5” High Density Floppy Disc?
How does this differ from a 3.5” Double Density disc? (Note : this question requires
research by the student).
Q 7.2.2 Using your knowledge of storage devices what do you think is the best
medium for the following types of data;
i. A large application distributed to a great many people.
ii. An Operating System.
iii. A weekly security copy.
iv. A copy of a file that you need to take home.
v. A letter that you are writing to your friend.
7.3 How a disc works
It’s okay saying “data is stored on a disc” but how does a disc work?
Inside the protective covering of a floppy disc there is a piece of plastic that can be
magnetised. A read/write head moves over the surface of the disc and either reads the
magnetic fields or produces a magnetic field which writes data to the disc.
Of course there must be some structure to the data so that the computer knows where
to find a certain piece of information.
Page 29
GCSE Information Technology
Chapter 7 - Storing Data
This diagram helps explain how a disc is structured.
Data is stored on
concentric rings called
tracks
The Disc is a piece
of plastic which
can be
magnetised)
Tracks are divided into
sectors which actually
store the data
You can see that a disc is divided into concentric rings called tracks. Each track is
further divided into sectors. Each sector can typically hold 512 characters.
If the CPU needs data from a disc it can be accessed be specifying the track and the
sector where the data has been placed. Similarly, data is written to a disc by specifying
the sector and track number where the data is to be written to.
7.4 Accessing Storage
There are two main ways you can access the data held on a storage device.
7.4.1 Direct Access
A direct access storage device allows immediate access to any piece of the data
without having to read all the data which comes before it.
Discs and main store are both examples of direct access devices.
7.4.2 Serial Access
With a serial access device you have to read all the data until you find the data you
require. Magnetic tape is an example of such a device. With a magnetic tape you have
to start at the beginning of the tape and read down the tape until you come to the data
you require. There is no way to ‘jump’ (directly access) any one piece of data on the
tape.
In some cases data held on a disc must be accessed in a serial (sometimes called
sequential) manner. This is because there is no information stored about the file which
enables the CPU to work out where a particular piece of data has been placed on the
disc; that is, its track and sector number.
Q.7.4 Questions
Q.7.4.1 Would you consider a CD-ROM a direct access or a serial device?
Q.7.4.2 Give one advantage of a direct access device and one disadvantage.
Q.7.4.3 Give an example where direct access would be more suitable over serial
access.
Page 30
GCSE Information Technology
Chapter 7 - Storing Data
7.5 Files
7.5.1 What is a file?
Up until now we have been talking about storing data on discs and tapes. We have
also looked at how data is actually stored on a disc. But there is one more thing we
need to consider: the concept of a file.
If we first consider a non-computer system it may be easier to explain what a file is.
If you take a look at your school work you will find it is partitioned into various
subjects such as English, French and Maths. For each of these subjects you probably
have a book that you use for your notes, following examples and carrying out
exercises set by the teacher.
Each of these books could be considered a file. That is it holds information (and data)
about one particular thing.
A computer is no different. If you write a letter you save it in a file. That is you give it
a name and it is stored on a disc using that filename so that it can be identified later.
The program that you used to create the letter (the Word Processor) is held in a
another file. So it continues, with files being created for all the different types of
information and data you need to store. Each file is given a unique name so that it can
be identified later.
7.5.2 Directories
On a typical computer there will be hundreds or (more likely) thousands of files.
Although each one has a unique name it can still be difficult to find one particular file
when you need it. Directories help in organise our data. It groups together files that
have a common theme; for example all our Word Processing files or all our programs.
The way you group your files together is largely a matter of personal preference,
although when you install certain programs they will automatically set up their own
directories.
The screen shot below shows a number of directories. Note that there are various ways
of displaying directories on a computer. This just demonstrates one method.
Page 31
GCSE Information Technology
Chapter 7 - Storing Data
The top-level (or root directory) is the one labelled ‘C:\’. This has a number of subdirectories beneath it including ‘accounts’, ‘acroread’ and ‘agenda’.
In addition the ‘accounts’ directory has further sub-directories; these being ‘gk’, ‘hk’
and ‘house’.
Each of these directories can contain files within them. The screen shot above shows
that the ‘acroread’ directory has been selected. The right hand side of the screen shows
the files that are in this directory.
Also note that you can have a file with the same name as long as it is in a different
directory. This is because the directory name forms part of the unique name which
identifies the file.
7.5.3 Structure of a file
Every file that you create has some sort of structure to it. This is obvious when you
think about it. A Word Processor file, for example, has to have a certain structure so
that it knows where to find information about your document such as where a new
paragraph starts and where you want a new page to begin.
This is known as the internal structure of the file. As a user of the Word Processor you
do not need to know anything about this internal structure. That is the job of the
program you are using.
But there is also another structure to a file that is particularly apparent in a program
such as a database. This is the logical structure of the file. This means it is the
structure that you see when you use the program. The way it is stored - its internal
structure - might (and probably is) completely different.
We will look at the logical structure of a file when we consider databases in chapter
10.
Page 32
GCSE Information Technology
Chapter 7 - Storing Data
Q.7.5 Questions
Q.7.5.1 The directory structure shown in 7.5.2 can be represented as a tree structure.
Draw a tree that represents this structure.
7.6 Security of files
7.6.1 Why do we need to secure files?
If we are holding data on computer we need to take certain steps in order to ensure
that the data is secure. Some of the reasons why we need to do this are outlined below.
 The hard disc holding our data might become corrupted. For example, the disc
might become damaged so that data cannot be read from it.
 You might accidentally damage a disc. For example, you might spill a cup of
coffee onto a floppy disc or delete a file that you actually need.
 The computer might suffer a disaster such as fire or flood.
 Somebody might destroy the data deliberately. This could be done by physically
damaging the data or by planting a software version of such vandalism, often called
a virus. Alternatively the computer might be accessed by somebody who is
unauthorised to do so. These people are known as hackers.
 A file might be updated incorrectly so that you need to have a previous version
available in order to apply the correct processing to it.
7.6.2 Securing Files
In order to protect ourselves against the dangers outlined above it is important to take
copies of files on a regular basis. This means we have two copies so that if something
is wrong with the original copy we have another copy we can use.
It is also important to keep the security copy of the file away from the computer which
holding the original file.
There are many ways to copy files. Users who have a lot of data to secure will
probably copy all the data to magnetic tape on a regular basis.
Users which have only a small amount of data will often use floppy discs to hold their
security copies.
There are many programs available that will do your security for you. Some will even
do the security at a certain time each day so that you do not forget.
In addition, some programs allow you to compress the data as it is secured. This
means that the security copy occupies less space than the original file. If you need to
use the security copy you will need to expand the data before it is used.
Q.7.6 Questions
Q.7.6.1 Why is it important for a security copy of a file to be stored away from the
computer which has the original file on?
Q.7.6.2 Can you think of a disadvantage of compressing data as you take the security
copy?
Page 33
GCSE Information Technology
Chapter 7 - Storing Data
R.7 Optional Further Research
R.7.1 There are various types of floppy disc. Find out about the different types and
how much data each can hold. Note that floppy discs have been available in at least
two other sizes other than 3.5”.
R.7.2 If your school uses a magnetic tape to backup data find out how frequently the
back ups are taken, where they are stored and what, if any, tests have ever been done
to ensure the data can be restored if necessary.
R.7.3 If you have access to a CD-ROM drive find out how much data can be stored on
a CD-ROM. Work out how many floppy discs you would need to store the same
information. Also work out if the data on the CD-ROM would fit onto the hard disc
installed in the computer.
R.7.4 When implementing a backup system you can use a method sometimes known
as archiving. Under this system you only secure files which have been created or
changed since the last security was taken. Investigate how such a system would work.
Page 34
GCSE Information Technology
Chapter 8 - Applications Software
Chapter 8 - Applications Software
8.1 Definitions for this Chapter
Program : Instructions to the computer that tell it what to do and in what order.
Programs are written by programmers in a computer language such as BASIC.
Software : The term used to describe all types of programs including the operating
system, applications software and programs written by the user themselves.
Applications Software : Software designed for a specific task, such as Word
Processing, which normally has a full set of documentation. Applications Software is
sometimes called a package.
Evaluation : Looking at software to see if it is suitable for the planned job.
Word Processing : A package that allows you to enter, edit and print text and,
optionally, a great many other things.
Database : An application that allows you to store and retrieve information.
Spreadsheet : An application that allows data to be stored in a table format and have
calculations performed on that data.
Graphics : An application that allows you to produce graphics such as bar charts, pie
charts etc.
Desk Top Publishing : An application that produces documents suitable for
publication.
Export/Import Data : Allows one application to produce data suitable for another
application (export). An application that reads such data ‘imports’ it.
Cut/Copy/Paste : Remove data from an application (Cut) or make a copy of it. The
data can then be pasted into another, or the same, application.
8.2 Software, Programs and Applications Software
8.2.1 Programs
So far in this book we have been referring to software and programs as if they are the
same thing. This is because there is a very fuzzy line between the two terms if, indeed,
such a line exists.
We can start by considering a program. A program is a sequence of instructions to the
computer. It tells the computer what to do and in what order.
A program is produced by a programmer who uses a computer language to tell the
computer what to do. Some examples of the languages used by programmers include
BASIC, FORTRAN, COBOL, C, C++ and LISP. There are many more.
8.2.2 Software
Software is a term used to describe programs. However software encompasses others
areas such as the Operating System and programs supplied by third parties but as this
software is still a sequence of instructions to the computer it can still be considered a
program. However when people refer to the Operating System, they normally call it
software rather than a program.
Page 35
GCSE Information Technology
Chapter 8 - Applications Software
8.2.3 Applications Software
Applications Software is a little easier to define. It is a collection of programs (or
software) that has been designed for a specific task. It normally comes with
documentation (often on CD-ROM these days) and support from the supplier.
For example, a Word Processor is a piece of applications software. It is a collection of
programs that allows you to manipulate words (and usually graphics as well). You
will receive some sort of manual that allows you to use the application. You may,
optionally, receive some sort of support arrangement that allows you to phone
somebody if you have a problem or query.
Applications software is often known as a package or simply an application.
Q.8.2 Questions
Q.8.2.1 Is RAM hardware or software?
8.3 Types of Application Package
In the next few chapters we will be looking at three specific applications (Word
Processing, Spreadsheets and Databases). However it is important to realise that there
are other types of applications packages.
8.3.1 Custom Designed Packages
You (or more likely a company) may have a specific requirement that needs a custom
built application to be written. For example, an insurance company might consider
that it needs to write a package that deals with all its business needs.
The package may be written by the company itself or it might use a software house to
write it for them.
The end result is a custom designed (and written) package.
8.3.2 Common Requirement Packages
Word Processing, Spreadsheets and Databases are the three most common uses for
computers but there are other packages which people and companies commonly need.
For example, many companies use a computer to send invoices and prepare their
accounts. There are packages you can buy which have already been written to carry
out these tasks.
Q.8.3 Questions
Q.8.3.1 What do you consider are the advantages and disadvantages of a custom
designed package as opposed to buying a package ‘off the shelf’?
8.4 Deciding which package to buy
In order to decide which application to buy or to use it has to be evaluated. This means
deciding which application is most suitable for the job you plan to do.
An insurance company, for example, might evaluate all the packages available before
deciding if it will write its own.
Page 36
GCSE Information Technology
Chapter 8 - Applications Software
To carry out the evaluation a company will compile a list of all the things that it needs
a package to do. Each package will then be compared against this list to see if it meets
the requirements of the insurance company.
They may also consider some of the following points as part of the evaluation;
 Is the package easy to use?
 Is it supported in case there are problems?
 Is it updated regularly to cope with things like changes introduced by the
government?
 Does the package come with manuals so that the users can refer to them?
 Is there a training course available to learn how to use the package?
 Can the package accept input from and output data to other packages used by the
company?
 Does the package run on the computers used by the company?
 Is the package reliable? For example, does it validate and reject invalid input?
The company may also go and see other companies that are using the package in order
to see it in action and find out if it has proved reliable.
Once the evaluation has been completed the insurance company will decide which
package to buy or whether to write their own package.
Q.8.4 Questions
Q.8.4.1 If you had to write an essay, what would you look for in a Word Processing
Package to assist you?
8.5 Some typical packages
In the chapters that follow we will be taking a closer look at some typical applications.
This section gives an introduction to the applications we will be looking at and
describes when you might use them.
8.5.1 Word Processing
A Word Processor is a package that allows you to enter, edit and print text. This book
was produced on a Word Processor.
Depending on the sophistication of the Word Processor you may be able to change the
font and size of the characters as well as perform other actions related to the text.
Some Word Processors include options that will check your spelling and even your
grammar. You may be able to send a personalised copy of the same letter to all of your
friends without having to type a separate letter to each of them (that is, mail merge).
You may also be able to include pictures and graphics amongst the text although this
is getting close to Desk Top Publishing which produces documents which are suitable
for publication.
8.5.2 Databases
A database allows data to be stored and retrieved. Once the data has been entered it
can be retrieved in a variety of ways. For example, you can retrieve it in some sort of
order (that is, sort it) or you can retrieve data that satisfies some criteria (for example,
all employees who earn over £12,000).
Page 37
GCSE Information Technology
Chapter 8 - Applications Software
8.5.3 Spreadsheets
A spreadsheet holds data in a table format; as a series of rows and columns. The cells
(as they are called) can be related in various ways. For example, one cell might hold a
cost price for a particular item. Another cell might hold the VAT rate in force at the
current time. Using the information in these two cells you can work out the retail price
of the product. If the cost price or the VAT rate changes then the retail price will
automatically change.
8.5.4 Graphics
A graphics application will produce various types of graphics based upon some data
that has been supplied. The data often comes from a spreadsheet or database.
Various types of graphics can be produced. For example a simple line graph or a pie
chart.
Q.8.5 Questions
Q.8.5.1 What package would you use for each of the following tasks?
i. Writing a report.
ii. Preparing company accounts.
iii. Keeping information about the products a company supplies.
iv. Keeping a class register.
Q.8.5.2 Give an example of a use for each of the applications describe above. Say why
the application is suitable.
8.6 Communication between packages
Many applications allow communication between itself and other applications. This is
commonly done by one of two methods.
8.6.1 Importing and exporting
One application is able to accept data that has been produced by another application.
That is it can import data. To be able to import data the sending application has to be
able to export data. That is produce data in a format that another application can read.
8.6.2 Cut/Copy/Paste
Within an application you can often highlight a section of the data and then copy the
data . This makes a copy of the data in a reserved area (on some systems this is known
as the Clipboard or Clipbook). You can now switch to another application and do a
paste. This copies the previously copied data into that application.
You can also use cut instead of copy. This removes the data from the original
application but still makes it available to the other application.
Page 38
GCSE Information Technology
Chapter 8 - Applications Software
R.8 Optional Further Research
R.8.1 Being able to communicate between packages via the export/import method
often involves using special file formats. Investigate and experiments with the
following file formats; Rich Text Format (RTF), Comma Separated Variables (CSV)
and ASCII text (TXT).
R.8.2 DDE and OLE are yet other ways of using data from one application in another.
Find out what these terms mean and investigate how they work.
Page 39
GCSE Information Technology
Chapter 9 - Word Processing
Chapter 9 -Word Processing
9.1 Definitions for this Chapter
Word Wrap : The way a Word Processor automatically keeps words on the same line
without splitting them.
Font : A set of characters of a particular size and design.
Margin : The limits at which you are allowed to print text on a page.
9.2 Introduction to Word Processing
9.2.1 A typical Word Processor
Word Processing is an application that allows you to enter, edit and print text.
This book was written on a Word Processor and you may be using a Word Processor
to look at it.
The following screen shot shows what a typical Word Processor looks like.
You can see that the Word Processor is running in a GUI environment (see chapter 5).
The main part of the screen is where text is actually typed. You can see part of this
chapter within the window.
Page 40
GCSE Information Technology
Chapter 9 - Word Processing
9.2.2 Entering Text
To enter text you simply type and the text appears where the cursor is positioned (you
can see the cursor in the above screen - it is the black line just above ‘9.2’).
When entering text you simply keep typing until you reach the end of a paragraph.
You only press the ‘ENTER’ key when you reach the end of a paragraph. You do not
(and should not) press the ‘ENTER’ key when you are nearing the end of a line as the
Word Processor will automatically ‘word wrap’ onto the next line. This means that if
there is not enough space to fit a word onto the end of the current line the entire word
is placed on the next line. This means you do not have half of a word on one line with
the remainder on the next line.
9.2.3 Common features
The menus and toolbar (the little pictures below the menu) are there so that you have
access to the various facilities within the Word Processor. Some of the common
facilities are described below.
 You can underline text; like this
 You can make text bold; like this
 You can make text italic; like this
 You can change the font style and the size of text;
 You can centre text on the page; like this
 You can combine these different styles;
font and size).
(underline, bold, italic, different
9.2.4 Other Features
Some Word Processors will include features such as Spell Checking. If the Spell
Checker finds a word it does not recognise it will suggest words that you might
choose to take its place. If you select one of these words it will automatically replace
the incorrectly spelt word.
Here is an example of a spell checker in action.
The word ‘schol’ was spelt incorrectly. When it was spell checked it suggested that
the word be changed to ‘school’. We were also given a number of other words we
could use instead.
Page 41
GCSE Information Technology
Chapter 9 - Word Processing
The buttons on the right (Ignore, Ignore All, Change etc.) allow us to decide what to
do.
Word Processors contain many other features. Some will even check your grammar
and even allow you to type in a word and have it suggest alternatives; that is a
Thesaurus.
Q.9.2 Questions
Q.9.2.1 Using any Word Processor you have access to write at least three paragraphs,
with each paragraph occupying at least three lines. Make use of bold, italics and
underlining. Also use different fonts and sizes. Print the document.
Q.9.2.2 Type the word ‘windws’ (windows without the ‘o’) into a Word Processor.
Spell check it. What suggestions are you offered as a replacement word?
9.3 Margins
A piece of A4 paper is 21cms wide and 29.7cms high but when you print you do not
print right to the edge of the paper. It is the margins that dictate how far in from the
edges you print.
There are various ways to set margins. One method is to use a dialogue box; like this
This particular dialogue sets the margin for a complete document. You simply change
the values for the relevant margins (e.g. the left and right).
Alternatively we can set margins for individual paragraphs. This is done in a similar
way but only affects the selected paragraphs.
Note that the Word Processor you use might have a different way of setting the
margins but the result will be the same.
Page 42
GCSE Information Technology
Chapter 9 - Word Processing
9.4 Indents
Closely related to margins are indents. This is a method of formatting a
paragraph so that the first line of the paragraph is indented. Like this paragraph.
Alternatively the second, and subsequent, line can be indented. This means the
paragraph will look like this. Can you see the difference between the two.
To set indents you can often use a dialogue box similar to that shown above. But you
may also be able to use the ruler. This is an area on the screen that is dedicated to
changing the layout of the page. This screen shot shows a ruler.
This is the ruler. You can “drag”
this to change the margin or indent
Q.9.4 Questions
Q.9.4.1 Using the document you created in Q.9.2.1 change it so that the right and left
hand margins are 1cm less than they were originally. Also change the paragraphs so
that the first lines are indented by a further 2cm. Print the document.
9.5 Tabs
Pressing the ‘TAB’ key (normally the key above ‘Caps Lock’) is a method of
arranging text on the page. By pressing the tab key you can jump a certain number of
spaces. Typically this is five but you can define your own tabs so that you jump as
many spaces as you want.
Tabs are useful for creating simple tables and should be used in preference to multiple
space characters.
9.6 Blocks of text
When working with a Word Processor you often need to work with whole sections of
text. For example, you might need to delete a paragraph, move a page or copy a
couple of sentences. To do this, Word Processors allow you to highlight a section of
text and then work with that section.
If your Word Processor allows you to work with a mouse you usually highlight text by
clicking and dragging. Once the text is highlighted you can perform the relevant
operation on it.
Page 43
GCSE Information Technology
Chapter 9 - Word Processing
Q.9.6 Questions
Q.9.6.1 Using the document you created in Q.9.4.1 move the third paragraph so that it
becomes the second paragraph. Print the document.
R.9 Optional Further Research
R.9.1 It was stated in the text that tabs should be used in preference to multiple spaces.
Why is this? Hint : It has to do with proportional fonts.
Page 44
GCSE Information Technology
Chapter 10 - Databases
Chapter 10 - Databases
10.1 Definitions for this Chapter
Data File : Consists of a collection of records.
Record : A collection of fields which relate to one subject, for example all the details
about one of your friends.
Field : Part of a record that holds one item, e.g. a name, an address, a phone number
etc.
Key : A field which uniquely identifies a record
Database : A large file(s) containing related information which can be accessed in a
variety of ways.
Query : Specifying to a database program a set of conditions. The records which
match the criteria are returned.
Expression : Something which returns a single value. This can be a number, a string
or
a value such as TRUE or FALSE.
Logical Operators : Terms such as AND, OR and NOT which can be used within a
query to make a single expression.
Information Retrieval : Retrieving the information you require (normally via a query)
from stored data (usually a database).
10.2 What is a database?
Before we look at a computer database let’s just consider what a database is when it is
not stored on a computer.
A telephone directory is a database. The directory itself can be considered a data file.
It is a file that contains related information. The information consists of names,
addresses and phone numbers, for all the people in a particular area.
The directory (or data file) is split up into a number of records. In this case each record
consists of a persons name, their address and their phone number.
The individual parts of a record are called fields. In our telephone directory there are
three fields; name, address and phone number. Each field will have a data type
associated with it (see Chapter 2).
One of the fields will be designated as the key field. This is the field that uniquely
identifies each record. In the questions for this chapter you are asked to consider what
is the key field for a telephone directory.
To summarise, a database consists of a data file, the data file contains records, each
record has a number of fields; one of which is the key field.
The terms datafile and database are almost identical in meaning but the definition of a
database is that the data can be accessed in a variety of ways. With a telephone
directory you can only access the data using somebody’s surname. If the file was
stored on computer it would be possible to search the data to search for a number to
see who it belonged to. Of course, the same search is possible with a telephone
directory but it would be much too slow to be of practical use.
Page 45
GCSE Information Technology
Chapter 10 - Databases
Q.10.2 Questions
Q.10.2.1 What is the key field in a telephone directory?
Q.10.2.2 For a school register say what is the datafile, the records, the fields and
which field is the key field?
Q.10.2.3 Give three examples of when it would be sensible to use a computerised
database?
10.3 Setting up a database
10.3.1 Deciding upon and setting up the database structure
Let us assume that we want to set up a database to hold information about all the
people in the school.
When we are setting up a database the first thing we have to do is decide what type of
data we want to keep. Here is a list of the data we might want to hold (you would
probably want to keep more).
Field Name
Data Type
First Name
Surname
Date of Birth
Phone Number
Class Number
Text(30)
Text(30)
Date
Text(15)
Numeric
In deciding on our data we have already made some important decisions. We have
named each field and decided which data type we will use to represent it. We can now
enter this information into the database so that it knows what type of data to expect.
An example of this having been done is shown below.
Page 46
GCSE Information Technology
Chapter 10 - Databases
10.3.2 Collecting the data
Now we have decided on the data we want to keep we need to actually collect it. For
our example it is quite an easy process. The school probably has this information
already. We just need to collect it altogether so we can enter it into our database.
But you may need to find other ways in order to collect the data. For example, you
may want a field that holds information about each persons interests or hobbies. To
collect this you may need to send out a questionnaire.
Some ideas for collecting data were outlined in Chapter 4.
10.3.3 Entering the data
Once the database has been set up and the data has been collected we can enter it into
the database.
You will enter the data one record at a time. Carrying on with the example we started
above you may end up with a database that looks like this (though, in real life, there
would be more records).
First Name
John
Michael
Jane
Michele
Mark
Surname
Brown
Smart
Smithers
Sheet
Dempster
Date of Birth
21/07/83
19/08/83
20/03/83
06/04/83
09/07/83
Phone Number
01987-12345
01987-12303
01962-87614
01962-81762
01987-51482
Class Number
23
14
23
23
14
Once you have entered the data you can add new records, delete records and edit those
that are already in the database.
Q.10.3 Questions
Q.10.3.1 If your school identified its classes by cathedrals (e.g. Salisbury, Canterbury
etc.) what change(s) would need to be made to the database definition shown above
(section 10.3.1).
Q.10.3.2 Create a computer database that holds data about everybody in your class.
Decide for yourself what data you want to keep. Next collect that data in whatever
way you feel is appropriate, set up the database using appropriate data types and then
enter the data you have collected.
Produce a print of the database records and also a print showing the database
structure. Also hand in your data collection documents.
Page 47
GCSE Information Technology
Chapter 10 - Databases
10.4 Using a database
Once we have our database we can use that data in various ways.
10.4.1 Sorting
A database allows you to sort the data so that it appears in some sort of order. For
example, we could sort the small database we have been looking up so that it appears
in Surname order. Our database will now look like this.
First Name
John
Mark
Michele
Michael
Jane
Surname
Brown
Dempster
Sheet
Smart
Smithers
Date of Birth
21/07/83
09/07/83
06/04/83
19/08/83
20/03/83
Phone Number
01987-12345
01987-51482
01962-81762
01987-12303
01962-87614
Class Number
23
14
23
14
23
Of course, we can sort on any of the fields. Depending on what you want to use the
database for, it may be sensible to sort the database on the Class Number.
10.4.2 Querying
One of the most powerful features of a database is the ability to ask it questions or
perform queries.
As an example we might want to ask the database to show us all the records for class
23. We would be returned the following records.
First Name
John
Michele
Jane
Surname
Brown
Sheet
Smithers
Date of Birth
21/07/83
06/04/83
20/03/83
Phone Number
01987-12345
01962-81762
01962-87614
Class Number
23
23
23
To ask a query we enter an expression. This is something which returns a single value.
In the example given above the expression would be ‘Class Number = 23’. This is an
expression which returns a value of TRUE or FALSE. If TRUE is returned the record
is displayed. If FALSE is returned the record is not displayed. Therefore ‘Class
Number = 23’ is FALSE for class 14 so these records are not displayed.
In the database used to produce these examples the query to show all students in class
23 is entered in a window like this:
Page 48
GCSE Information Technology
Chapter 10 - Databases
It is possible to add simple expression together to form more complex queries. This is
done using logical operators.
For example, you could ask to see all students in class 23 with a surname of Smith.
The expression for this would be ‘Class Number = 23 AND Surname = Smith’. The
AND is a logical operator. It says that both simple expressions must be TRUE for the
entire complex expression to be TRUE.
Other logical operators include OR and NOT.
10.4.3 Printing
If we have taken the trouble to sort our database and perform queries to extract the
information we require it would seem sensible to be able to print it.
As well as printing all the records of the database it is also possible just to print the
results of a query. Examples of these types of print have been shown above.
It is also possible to only print certain fields. You may want to create a telephone list
from the database. This requires all the records to be printed but only the Surname,
First Name and Telephone Number. We do not require the Date of Birth or the Class
Number.
The telephone list would look like this.
Surname
Brown
Dempster
Sheet
Smart
Smithers
First Name
John
Mark
Michele
Michael
Jane
Phone Number
01987-12345
01987-51482
01962-81762
01987-12303
01962-87614
Notice that we have also moved the Surname field so that it is the first field. This is
because you would expect a telephone list to appear in this format.
Q.10.4 Questions
Q.10.4.1 Using the sample database we have developed in this chapter what
expression would you use to search for anybody in class 18 or for anybody with a
surname of ‘Jones’.
Q.10.4.2 Using the database you created in Q.10.3.2 sort the data on one of the fields,
carry out a query and produce a print which does not show all the fields. Hand in three
prints showing the results. Also provide a brief description of the field you sorted on
and the query you did.
R10 Optional Further Research
R.10.1 There are many types of database. Two of the most common are a ‘flat-file
database’ and a ‘relational’ database. Investigate the differences between the two and
make a list of advantages and disadvantages. Which one do you consider best?
Page 49
GCSE Information Technology
Chapter 11 - Spreadsheets
Chapter 11 - Spreadsheets
11.1 Definitions for this Chapter
Model : A simulation of something so that it behaves like the real thing.
Spreadsheet : A type of program that gives you a table on the screen. You can enter
various types of data into a spreadsheet and make relations between the data.
Cells : A spreadsheet is made up of rows and columns. The point at which a row and
column meet is called a cell. A cell is referenced by its row and column. You enter
data
into a cell.
Formula : A formula is typed into a cell. It is used when you wish to work out the
value for that cell from the values in other cells.
Relative Reference : A relative reference changes when the cell is copied. That is the
cell reference is relative to its position on the spreadsheet.
Absolute Reference : An absolute reference stays the same, even if the cell is copied.
11.2 Models
11.2.1 What is a model?
Before we look at spreadsheets we are first going to consider the term model, as a
spreadsheet is a good example of a model.
You will already be familiar with the term model either from its use on the catwalk or
when it is used to describe something that looks like another object. For example, you
could build a model of a Formula 1 racing car.
When creating a model on a computer we are doing something that is not too far
removed from building a model of the racing car.
We take a real life situation and model it on the computer. A good example, especially
for this chapter on spreadsheets, is the financial accounts for a company. If we use a
spreadsheet to ‘do the accounts’ we are modelling the accounts on the computer.
The accounts actually exist as part of the business. We are simply modelling them on
the computer.
Although this chapter is mainly about spreadsheets, models are not just applicable to
that type of application. Other examples of models are;
 A Space Invaders type game. This models a world where earth is being attacked by
aliens.
 A car assembly plant that is automated by robots. The computer will have a model
of the robot programmed into it.
 The database we developed in the last chapter. This models the students in a
school.
Page 50
GCSE Information Technology
Chapter 11 - Spreadsheets
11.2.2 Why use a model?
There are many reasons for using a model. Some of these reasons are as follows:
 A model can be made to go faster than real life so we can predict what is going to
happen; for example a weather forecast.
 You can ask ‘what if’ questions. If you have modelled a company on a spreadsheet
you can ask what will happen to your profits if you sell less products in the first
quarter next year?
 You can experiment without danger. In a car racing simulation it does not matter if
you crash.
 It can be cheaper. The Army may use a tank simulator to train their drivers rather
than risk using a real tank and have it damaged.
 It can give people access to things they could never do in real life. A museum could
model a rare book on computer so that everybody could look at it. The actual book
could not be handled by so many people.
 Systems such as road traffic in a town or the ‘Big Bang’ theory can be modelled to
see if we understand how they work by seeing if the model acts in the same way as
the real thing.
11.2.3 Disadvantages of using a model
The main disadvantage of using a model is that it does not know everything about the
situation you are modelling. Your company accounts will not know what will happen
to interest rates. In a Virtual Reality game you may only have feeling in your hands as
that is the only place on your body where there are sensors which are connected to the
model.
Q.11.2 Questions
Q.11.2.1 Think of three situations which are models of the real world. Where does the
model differ from the situation it is modelling?
11.3 Spreadsheets
11.3.1 Introduction to Spreadsheets
A spreadsheet is often used to model situations which are based on numeric
data. Spreadsheets were originally designed for accountants and they are often
used to prepare company accounts (which is a model of the current state of the
finances of a company).
Page 51
GCSE Information Technology
Chapter 11 - Spreadsheets
When you use a spreadsheet you are presented with a table; like this:
Column
Cell
Row
1
2
3
4
5
A
January
B
C
D
56.71
123.57
The spreadsheet is made up of individual cells. In the spreadsheet above one of
the cells contains the value 123.57.
The cells are arranged in columns and rows. The columns go down the
spreadsheet. The rows go across the spreadsheet.
Each column is given a name. In the above example we have the columns A, B,
C and D.
Similarly the rows are given names (1, 2, 3, 4 and 5).
Using the row and column labels it is possible to reference any cell in the
spreadsheet. The cell which contains the value 123.57 is in the cell referenced
by B3.
A spreadsheet can hold three types of data:
1. Numbers. For example, 123.57
2. Text. For example, ‘January’
3. Formulae, which we will look at in a moment.
11.3.2 Sample Spreadsheet
Below is a sample spreadsheet. It models a school outing that is going to visit
Manchester United’s Old Trafford Football Ground.
A
1
2
3
4
5
B
C
D
School visit to Old Trafford Football Ground
Name
Brian
Dawn
Stephen
Amount to pay
65.00
65.00
65.00
Page 52
Paid so far
33.54
23.58
5.87
Left to pay
GCSE Information Technology
Chapter 11 - Spreadsheets
Notice the following points
 The main title has spread over its neighbouring cells. This is because there is
not enough space to fit everything into the cell A1.
 The column widths are different sizes. This is so that we can fit all the data
into the cell. For example, the ‘Name’ column is quite wide so that we can
fit in a long name. It is possible to adjust the width of any column.
 You can improve the look of the spreadsheet by using different sizes of fonts
and types of alignment.
For example, the title is printed in a font size of 14. It is also bold.
The column headings are centred within the cell and also printed in bold.
The rest of the spreadsheet is printed in the ‘standard’ font size.
 All the figures have been ‘formatted’ so that they print two decimal places. If
we did not do this a value such as 23.90 would show as 23.9 and the 65.00
value would show as 65.
 The figures have been ‘right aligned’ within the cells. This means they are
right up against the right hand edge of the cell. This has been done so that the
decimal points line up.
 We have not entered values into the ‘Left to pay’ cells. Later we will see
how to get the spreadsheet to work these out automatically.
11.3.3 Adding a formula
So far all we have done is entered data into the spreadsheet. We could achieve exactly
the same result with a Word Processor. So why use a spreadsheet?
A spreadsheet program gives us the ability to enter a formula into a cell. Let’s take a
look at an example:
If we type ‘=B3-C3’ into cell D3 the value 31.46 will appear in D3. This is because
we are using a formula.
A formula always starts with an equals sign (that is how the spreadsheet knows it is a
formula) and is followed by a mathematical expression. In this case it is saying “take
the value in cell B3 and subtract from it the value in C3”.
We can enter the same formula into D4 and D5 to work out how much Dawn and
Stephen still have to pay. But we must change the cell references so that we are
referring to rows 4 and 5.
Our spreadsheet, with the formulae displayed, would look like this:
A
1
2
3
4
5
B
C
D
School visit to Old Trafford Football Ground
Name
Brian
Dawn
Stephen
Amount to pay
65.00
65.00
65.00
Page 53
Paid so far
33.54
23.58
5.87
Left to pay
=B3-C3
=B4-C4
=B5-C5
GCSE Information Technology
Chapter 11 - Spreadsheets
This is what you would actually enter but the actual display would look like
this:
A
1
2
3
4
5
B
C
D
School visit to Old Trafford Football Ground
Name
Brian
Dawn
Stephen
Amount to pay
65.00
65.00
65.00
Paid so far
33.54
23.58
5.87
Left to pay
31.46
41.42
59.13
Because the ‘Left to Pay’ values are being calculated by a formula we can
change one of the other figures and the ‘Left to Pay’ figure will automatically be
updated.
For example, if Stephen pays another £20 we would change C5 to 25.87. D5
would automatically change to 39.13.
Just to emphasise that point, we do not have to change D5 in any way because it
contains a formula, it updates itself.
11.3.4 More on Formulae
In a typical spreadsheet application there are many types of formula you can enter. In
the above example we have just used subtraction. We could just as easily have used
addition, multiplication or division (although it would not make sense in the context
of what we are modelling).
We can also use functions. These are features of the spreadsheet that do slightly more
complex tasks than simple expressions.
Before we look at some of the common functions we need to look at how we refer to a
group of cells at the same time.
At the moment, all we have learnt is how to refer to a single cell (e.g. C4, B3 etc.) but
what do we do if we need to refer to all the cells from C3 to C5? To do this we specify
the two ends of the range separated (normally) by a colon. So to refer to cells C3 to C5
we use ‘C3:C5’.
Now we can look at some of the common functions.
SUM :
This is by far the most common function. It adds together the values in
the specified range. For example, if we entered ‘=SUM(B3:B5)’ in cell
B6 of the above spreadsheet the cell will display 195.00. This is exactly
the same as using the formula ‘=B3+C3+D3’ but it is shorter,
especially when the range of cells becomes large.
AVERAGE : Returns the average of the cells in the given range e.g.
‘=AVERAGE(C3:C5)’ would return 40.04
MAXIMUM : Returns the maximum value in the range. ‘=MAXIMUM(C3:C5)’
would return 33.54.
MINIMUM : The same as MAXIMUM but returns the minimum number.
Note that the name of the functions may be slightly different in the spreadsheet
you use. For example, MAXIMUM may be called MAX.
Page 54
GCSE Information Technology
Chapter 11 - Spreadsheets
11.3.5 Copying Cells
Up until now you may have been entering each formula into every cell that requires a
formula. There is an easier way.
You can enter a formula into one cell and then copy that formula into other cells that
require a similar formula.
In our example, if we enter a formula into cell D3, we can copy that formula and then
paste it into D4 (see 8.6.2 for a description of copy and paste). The spreadsheet
automatically changes the cell references in the formula from row 3 to row 4. This is
because it assumes you want to work on figures on the same row that the formula is
on. And this is nearly always the case.
These types of references are called relative references as the cell references change
relative to where they are on the spreadsheet.
There is another type of reference called an absolute reference. These references are
often specified in the format $C$5 (as opposed to C5). If you copy one of these
references the cell reference does not change.
This type of reference is useful if you have a fixed figure on your spreadsheet (such as
the VAT rate). No matter how many times you copy a formula you always want the
formula to point to the same cell to find out the current VAT rate.
Q.11.3 Questions
Q.11.3.1 Look at the Old Trafford spreadsheet in 11.3.2 above and answer the
following questions:
 What value is in cell C4?
 In what cell is the value ‘Paid so far’?
Q.11.3.2 Using a spreadsheet package of your choice set up the Old Trafford
spreadsheet as shown in 11.3.2. Try to match the formatting as closely as possible.
Hand in a print of the result.
Q.11.3.3 Using the spreadsheet you produced in Q.11.3.2 answer these questions.
 Enter some text into cell B2. What happens and why?
 Increase the font size of ‘Amount to Pay’ by at least four points. What happens and
what can you do to correct it?
 Change the format of the cells which display numeric values so that a pound sign is
automatically displayed (e.g. entering 52.34 is displayed as £52.34). Why is it
important not to enter the pound sign when typing in the figures?
Q.11.3.4 Using the spreadsheet you have been developing, use the SUM function to
show how much all the students have paid so far and how much is still outstanding.
Produce a print.
Q.11.3.5 What is the benefit of holding something like the VAT rate on the
spreadsheet and accessing it via an absolute cell reference?
Q.11.3.6 Set up a spreadsheet that models the money you spend each week and what
you spend it on. The spreadsheet should have the days of the week down the side and
the things you spend your money on across the top. Provide totals for each day and for
each item you spend money on. Produce a print.
Page 55
GCSE Information Technology
Chapter 11 - Spreadsheets
R11 Optional Further Research
R.11.1 Using a spreadsheet it is easy to produce graphs. Find out how you do this with
the spreadsheet that you are using and produce a bar chart and a pie chart from one of
the spreadsheets you developed in this chapter.
R.11.2 Modify one of the spreadsheets that you have developed for the Manchester
United trip so that 10% is added to the money everybody has to pay. The 10% should
be held on the spreadsheet and referenced by absolute cell references. Change the 10%
to 12.5% and ensure the spreadsheet is updated correctly.
Page 56
GCSE Information Technology
Chapter 12 - Graphics
Chapter 12 - Graphics
12.1 Definitions for this Chapter
Graphic : A picture, graph or image that has been produced on a computer.
Bitmap : A picture that is built up from pixels.
Vector : A picture that is described in terms of points and how those points are joined
together.
12.2 Graphics
12.2.1 Introduction
Graphics are simply pictures on the computer and as a picture is worth a thousand
words they are an important part of Information Technology.
However just saying they are pictures on a computer does not really explain the
different types of graphics. Here are a few examples.
 The pictures used in a computer game.
 Pictures drawn by the computer based on some branch of mathematics. The most
famous example is probably fractals.
 Graphs and Charts that are used to help show how a business is performing. For
example, a graph could be produced which shows how sales have increased over
the past year.
 Architects use graphics to represent a building they are working on. This is often
called CAD (Computer Aided Design).
12.2.2 How graphics are stored
There are two main ways to store graphics on a computer; pixel based formats and
vector based formats.
If you look at a newspaper picture using a magnifying glass or microscope you will
see that the picture is actually made up of small dots. When viewed from far enough
away the dots create the picture. This is similar to a pixel based format on a computer.
The image is stored as a series of pixels (see chapter 6; especially 6.3.1) and the
computer just draws each of the pixels onto the screen to create the picture.
It is slightly more complicated than that as the number of colours has an affect on how
much space is needed to store each pixel. Also, many pixel based file formats
compress the data so that it does not take up so much disc space. But, the concept is
quite simple. Each pixel is held which, when displayed, creates a graphic.
Vector based graphics work differently. They describe the position of various points
that make up the picture and how those points are related. When the graphic is drawn
on the screen it uses this information to draw the various lines and points on the
screen.
Page 57
GCSE Information Technology
Chapter 12 - Graphics
Q.12.2 Questions
Q.12.2.1 If the same image is stored as a pixel based format and as a vector based
format, what format do you think would be most suitable to use if the image had to be
enlarged? Hint : Try drawing a circle on squared paper and then enlarging it by
making each pixel (square) bigger so that it occupies four squares instead of one.
R12 Optional Further Research
R.12.1 There are many different file formats available; for example GIFF, BMP,
JPEG, WMF etc. Find at least six different file format standards and find out in which
situations you would use them. Also say if they are pixel based or vector based.
Page 58
GCSE Information Technology
Chapter 13 - Communications and Networks
Chapter 13 - Communications and Networks
13.1 Definitions for this Chapter
Data Communication : Communication of data either between two computers or
between a computer and a person.
Telecommunications : Communicating data over long distances, usually over
telephone lines but could also be via satellite, micro waves etc.
Facsimile (Fax) : Using a telephone line to transmit documents.
Computer Network : Two or more computers that are connected together so they can
share data or devices such as printers or CD-ROM’s.
Local Area Network (LAN) : A relatively small network of computers. The computers
are usually in a single building such as an office or a school.
Wide Area Network (WAN) : A network of computers which connect computers over
a large area. The computers are often in different towns and even in different
countries.
Modem : A device which allows a computer to be connected to a telephone line.
Modem is short for MOdulator-DEModulator.
13.1 Introduction to Communications and Networks
We are all familiar with communication. We do it every day. Some forms of
communication are given here.
 Talking to people.
 Watching television.
 Listening to the radio.
 Reading books.
 Using a fax machine to transmit documents over telephone lines.
 Using a telephone.
 Using teletext to access information supplied by television companies.
Communication between computers is just another form of communication.
Every time you sit down at a computer you are taking part in a dialogue that is a form
of communication.
However a computer does not only communicate with people. A computer can also
communicate with other computers. Consider a Cash Card Machine. The machine into
which you insert your bank card is a small computer but it has to communicate with
another computer that holds your account details so that it can check you have enough
money in your account before it gives you any money.
In order for computers to communicate with one another they have to be connected
together. This is done by way of a network.
A network can be as simple as a piece of wire joining two computers together or it can
be a network that allows the computer to talk to millions of other computers all over
the world.
Page 59
GCSE Information Technology
Chapter 13 - Communications and Networks
Some benefits of having computers networked together are given below
 Computers can share information. It is easy for somebody to pass a copy of a file to
somebody else.
 There is only one source of data. The company can keep all their information on a
single computer and let everybody access that data.
 Devices such as printers and CD-ROM’s can be shared rather than every computer
having their own.
 Disc space requirements can be reduced as applications can be accessed from a
central point rather than everybody having their own copy.
 Maintenance is easier as support personnel can maintain the system via the
network.
Q.13.2 Questions
Q.13.2.1 One of the benefits of a computer network is that it allows everybody to
share a common source of data. Why do you think this is important?
13.3 Types of Network
There are two main types of network.
13.3.1 Local Area Network (LAN)
A Local Area Network (LAN) is a computer network that is located at one location;
typically an office or a school.
The computers are usually connected together by wires which run around the building.
There is normally somebody (or a team) who is responsible for the network and they
will ensure everybody can access the parts of the system they are entitled to access but
restrict access to the parts they are not authorised to use.
Often there are passwords that stops unauthorised people accessing the system.
13.3.2 Wide Area Network (WAN)
Wide Area Networks (WAN’s) connect computers together over large distances. It is
quite normal to join several LAN’s together via a WAN.
A LAN is normally connected via cables that have been run around the building. This
is obviously not convenient for WAN’s. Therefore other ways are used to connect
WAN’s together. Examples are;
 Fibre Optic Cables. These are supplied by third party companies and rented to
various users.
 Satellite and Micro Wave links.
 Telephone lines; either used by dialling up the computer you wish to communicate
with or by having a fixed line which is available all the time (often called a leased
line).
Page 60
GCSE Information Technology
Chapter 13 - Communications and Networks
It is worth noting that if you wish to communicate using the telephone line you need a
Modem (Modulator - Demodulator).
This equipment takes the data from the computer and converts it to a form that is
suitable for the telephone network. When the data arrives at the receiving computer
another modem does a similar operation but this time converts it from the telephone
format to a format which the computer can understand.
Q.13.3 Questions
Q.13.3.1 Think of three business in your local High Street that you think would use a
LAN and three that are probably connected to a WAN.
Q.13.3.2 The sale of modems has increased in the past few years. They have been sold
to people who wish to access the biggest computer network in the world. What is this
network?
Page 61
GCSE Information Technology
Chapter 14 - Control Systems
Chapter 14 - Control Systems
14.1 Definitions for this Chapter
Control System : Everything that in needed is order to control a particular device. This
includes all the hardware and software.
Output Port : A point on a computer into which a device can be plugged so that the
processor can communicate with the device.
Input Port : A point on a computer into which a device can be plugged so that the
device can communicate with the processor.
Control Signal : A signal from a processor to a device which tells it what to do.
Interface : A piece of hardware or software that sits between a processor and a device
which allows them to communicate.
Converter : A type of interface that converts signals from one form to another so that
a
processor/device can communicate.
Sensor : A detector that monitors on behalf of a device so that signals can be sent to
the processor.
Feedback : The ability of a device to provide signals to the processor about its current
state.
LOGO : A computer programming language.
Turtle : An electronic turtle or a turtle represented on the computer screen that is
controlled by LOGO.
Procedure : A series of instructions in a programming language that are grouped
together and can be executed by a single instruction.
14.2 What is a Control System?
A control system is a combination of everything that is needed to control a certain
device. This may involve a computer, some software, some additional hardware and
the device being controlled.
A good example is a robot. The computer will be running software that tells the robot
what to do. There will be some additional hardware that connects the computer and
the robot together. The device being controlled is the robot itself, whether just a
robotic arm or something that can move around, see things and pick things up.
However it is not only external devices that are control systems. A disc drive inside a
computer is an example of a control system.
The processor sends data to the disc drive together with instructions as to what to do
and the disc drive acts upon those instructions and tells the processor when it has
finished.
There are examples of control systems scattered throughout your house. A washing
machine is just one example.
Q.14.2 Questions
Q.14.2.1 Give examples of three other control systems that you would find in your
home.
Page 62
GCSE Information Technology
Chapter 14 - Control Systems
14.3 Communicating with the devices
The computer (or micro-processor) has to have some way of communicating with the
device it is controlling. Connection from the computer to the device is made via an
output port. This is a point on the computer where you can plug in the device. The
computer you use at school will probably have at least two output ports where a
mouse and a printer are connected.
Control Signals are used to tell the device what to do. In the case of a (simplified) disc
drive there will be a control signal that says the data that follows should be written to
the disc and another signal that says the disc drive should retrieve some data from the
disc.
Control signals can take various forms. For example, it could be a change of voltage
on a wire or it may be signals sent by radio waves.
In some circumstances there may have to be a converter between the computer and the
device. This is needed if the pieces of equipment use different signals. For example,
the computer may use digital signals and the device may use analogue signals (see
Chapter 1; especially 1.2).
In this case a Digital-to-Analogue (D-A) Converter is needed to convert digital signals
to analogue signals. Similarly an Analogue-to-Digital (A-D) converter will be needed
to convert signals being sent from the device to the computer.
An A-D (or D-A) converter is an example of a special type of interface that is needed
in order to allow the two pieces of equipment to work together.
An interface may be needed for other reasons. For example, if the two pieces of
equipment operate at different speeds an interface may be needed in order to keep the
two pieces of equipment in sync.
Q.14.3 Questions
Q.14.3.1 Do you think there is a need for any sort of interface between a mouse the
processor?
14.4 What can the computer control?
Typically a computer can control the following types of devices.
A relay switch : A relay is a switch which can be on or off. If the computer was
controlling a device such as an electrical socket or a motor, then a relay would be
appropriate.
An actuator : When an actuator receives a signal it converts it into movement. Disc
drives use actuators to position the read/write heads to the required track. It is
important that the actuator moves the read/write head the same distance for each
pulse of electricity it receives.
A motor : An actuator could be used to turn a motor on and off. But a special type of
motor, called a stepper motor has to keep receiving signals in order for it to keep
going. Every time it receives a signal it moves the motor a small amount. Actuators
and stepper motors are closely related.
Page 63
GCSE Information Technology
Chapter 14 - Control Systems
Q.14.4 Questions
Q.14.4.1 For a motor which can be turned on and off how many control signals are
required?
14.5 Feedback
It is possible that the processor just sends signals to a device and that is the end of the
matter. But it is more common to have some sort of feedback so that the device can
inform the processor about various situations.
For example, a printer can tell the processor it is out of paper so that the processor can
stop sending information.
In order to be able to receive signals from a device the computer must have an input
port. This is the same as an output port but allows the computer to receive signals.
There also has to be some form of sensor so that the device can detect what is going
on. In the case of something like a burglar alarm the sensor will be something that can
detect movement.
An extension of this idea is to have a device which continuously collects data. The
data can be stored on the computer for later analysis or can be analysed as the data is
collected so that instant decisions can be made.
Q.14.5 Questions
Q.14.5.1 Give three examples of control systems that have some form of feedback
capability.
Q.14.5.2 Think of a system where a device that continuously collects data would be
appropriate.
14.6 Turtles and LOGO
Your school may have access to a computer language such as LOGO. This language is
used to control a turtle.
The turtle can either be a real one (or at least an electronic version of one) or a
representation of one that appears on the computer screen.
You control the turtle with simple instructions (control signals).
Page 64
GCSE Information Technology
Chapter 14 - Control Systems
14.6.1 Example of LOGO
Assuming the turtle is facing North, the following LOGO program will produce a
square:
No.
Program 1
LOGO Instruction
Effect
1
2
3
4
5
6
7
8
9
10
PEN DOWN
FORWARD 60
RIGHT 90
FORWARD 60
RIGHT 90
FORWARD 60
RIGHT 90
FORWARD 60
RIGHT 90
PEN UP
Puts pen down so any movements draw a line
Moves the turtle forward 60 steps
Turns the turtle 90 degrees
Moves the turtle forward 60 steps
Turns the turtle 90 degrees
Moves the turtle forward 60 steps
Turns the turtle 90 degrees
Moves the turtle forward 60 steps
Turns the turtle 90 degrees
Lifts up the pen
You may notice that the above program uses the same four instructions four times
(FORWARD and RIGHT). We can use the REPEAT statement to replace instructions
2 to 9; like this:
REPEAT 4 [FORWARD 60 RIGHT 90]
This is saying, repeat the instructions in brackets four times.
A further enhancement we could make is to make the instructions for drawing a
square into a procedure. This means grouping the instructions together and giving
them a name. Now if we want to draw a square we simply use the instruction:
SQUARE (or whatever
we named the procedure).
Q.14.6 Questions
Q.14.6.1 If you have access to LOGO run the program 1 from this section. If you do
not have LOGO then run the program ‘manually’ (that is, use paper and pencil). Hand
in the results.
Q.14.6.2 Using the LOGO language write a program that would draw a triangle that
has equal sized sides and equal sized angles (that is, an equilateral triangle).
Q.14.6.3 What do you think are the main advantages of writing procedures?
Page 65
GCSE Information Technology
Chapter 14 - Control Systems
R14 Optional Further Research
R.14.1 If you are interested in programming you might like to look at languages such
as BASIC, PASCAL, C or C++. These languages are used within industry and an
understanding of them could be important if you wish to take up a career in the
computer industry.
R.14.2 If you live near an industrial area you might like to arrange a visit to a
manufacturing plant that uses computers on, say, a production line. You might like to
produce a small project showing how the computers work, what type of control
signals are used and if there is any data logging.
Page 66
GCSE Information Technology
Chapter 15 - Developing Systems
Chapter 15 - Developing Systems
15.1 Definitions for this Chapter
System Life Cycle : The steps that are followed when developing and maintaining an
IT system.
Systems Analyst : The person who analyses the current system (if there is one),
produces the requirements for the new system and comes up with a design that will
meet those requirements.
Programmer : The person who writes the programs that have been specified by the
systems analyst.
Top-down design : The process of breaking tasks down into smaller and smaller tasks
until they are easy enough to understand and write programs for.
15.2 The System Life Cycle
The system life cycle represents the various stages that an IT system goes through,
from the moment it is a twinkle in somebody’s eye to the moment it ceases to be of
any use.
The system life cycle is very important as it provides a framework which is used to
control the development and maintenance of a system and this is very important.
Many systems, in large organisations, take hundreds of man years to develop and are
very expensive. An investment of this size needs a lot of control to ensure the project
is progressing satisfactorily and that the company is getting a good return on their
investment.
The system life cycle looks like this
New Requirement
Feasibility Study
Maintain
Analysis
Implement
Design
Build
Each of the following parts of the system life cycle is explained below.
Page 67
GCSE Information Technology
Chapter 15 - Developing Systems
15.2.1 New Requirement
The starting point for any IT system is that somebody has a requirement. It might be to
ensure a warehouse never runs out of goods, make sure the customers pay the correct
amount for their gas or to install a new set of traffic lights to make the traffic flow
better at a certain crossroads.
At this stage it is important to state exactly what the problem is. For example, is it to
get customers to pay their gas bills on time or is it to make sure they are charged the
correct amount ? (It will probably be both of these (and more) but you can see there
are two different problems).
15.2.2 Feasibility Study
This is a report that says whether the system is feasible or not. It may include some of
the following points (and probably more). Some of these points may be discussed in
greater detail later in the system life cycle.
 Is the system cost effective? How much will the system cost to develop and will the
company get a return on the investment it plans to make?
 How long will the system take to develop? If it will take five years can the
company wait that long?
 Will the system be developed by the company’s staff or will an outside company be
asked to develop it? Alternatively are there any packages available that can be
bought that will do the job?
 Is the system practical to be implemented as an IT system? For example, if one of
the requirements is to be able to communicate with the system via speech is this
possible given the current state of technology?
 How will the company be affected by implementing the system? Will some of the
employees have to be made redundant? Will new employees be needed because of
the new system?
 What sort of training will be required; both to develop the system and to allow the
company’s employees to use it?
On production of the feasibility study the requirements of the proposed system might
change or it may even be decided to abandon the project altogether.
15.2.3 Analysis
The analysis phase allows the systems analyst (IT people who have the necessary
skills to analyse a current system and produce a specification for an IT system) to
investigate the system.
Page 68
GCSE Information Technology
Chapter 15 - Developing Systems
The systems analyst will do the following:
 Look at the current system (whether manual or already an IT system) to see what it
does and how it does it. This can be done by reading any documentation available
and by observing how the current system operates.
 Interview the people who use the current system to find out all they can about the
system and what their involvement is with it.
 Interview potential users of the new system to find out what their expectations are.
 Work out exactly what the new system has to do.
 Work out what other systems (whether computer based or manual) which the new
system has to communicate with.
At the analysis stage of the system life cycle no decisions are made as to which
hardware and software will be used (although in practise it is often assumed due to
hardware and software already being used by the company).
15.2.4 Design
The design phase takes all the work that the systems analyst has done and decides how
the system should be implemented. Actions carried out at this stage of the system life
cycle include:
 Deciding on the hardware and software to be used.
 Designing the screens that the user will see. This will also involve deciding on
what type of user interface will be used (e.g. command line or graphical).
 Deciding how data will be stored (e.g. on a database), what data is required and the
data type for each data item.
 Deciding what programs are required and what each program will do.
 Produce a specification that will allow computer programmers to actually write the
programs that will make up the system.
In carrying out the design the usual method is to use something called top-down
design (sometimes called stepwise refinement).
Using this method you start with the top level of the system (e.g. produce gas bills)
and gradually break this task down into smaller and smaller units until a task is easy to
understand and produce a program for.
15.2.5 Build the system
This stage is all about writing the programs and testing the system.
Initially a programmer will write the programs that have been specified by the systems
analyst during the design stage. The programmer will test the programs to ensure they
work as specified.
Once the program is working it will be tested with all the other programs that have
been written for the system. This is called System Testing.
The final stage of testing is called Acceptance System. This is when the future users of
the system test it to ensure it meets their requirements.
Page 69
GCSE Information Technology
Chapter 15 - Developing Systems
Also, as part of the new system built, the necessary documentation will be prepared.
This will include manuals for the users as well as documentation that allows the
system to be more easily maintained. In fact a lot of the system documentation will
come from earlier stages of the system life cycle.
15.2.6 Implement
Once the system has been acceptance tested, the system is implemented. This phase of
the system life cycle might include the following:
 Loading live data onto the system. This might including keying in data held on
manual records, collecting data by some other means (e.g. scanning bar codes) or
converting the data from an existing system.
 Training the users how to use the new system.
 Moving all the programs to a secure area so that they cannot be tampered with.
 The system might be implemented for all the company in one go (sometimes called
the ‘big bang’ approach) or it might be phased in over a number of weeks or a
number of months (often called a phased implementation).
15.2.7 Maintain
The ‘maintain’ phase of the system life cycle is really the starting point to enter the
cycle again. Somebody will come up with a change that needs to be made to the
system. It might be a legal change (e.g. gas for the over 60’s has to be charged at a
special rate) or it might be a change in the company’s policy (e.g. high gas users get a
special discount).
Once the change has been identified the cycle moves into feasibility study and so the
cycle continues.
When carrying out your coursework project you will need to use elements of the
system life cycle.
Page 70
GCSE Information Technology
Chapter 16 - Documentation
Chapter 16 - Documentation
16.1 Definitions for this Chapter
Documentation : A means of communicating information about an IT system.
Typically the documentation is supplied as a manual but it is often supplied on CD
ROM.
Flowchart : A form of documentation that graphically represents a process.
16.2 Types of documentation
In the previous chapter we briefly mentioned documentation when building a system.
During the build stage of the system life cycle it is usual to produce a user manual and
a systems manual.
16.2.1 User Manuals
The user manual is the documentation that describes how to use the system. It should
describe what to do when the users want to achieve a particular result. As an example,
take a look at the manual for the word processor you have been using and see if you
can find out how to centre text on the screen. This is an example of something you
want to do so the user manual should tell you how to do it.
The user manual should also tell you what to do if you get an error message (what
does it mean and what do you do to recover from it). It may also tell you how to install
the software.
16.2.2 System Manuals
System Manuals are used by those people who have to maintain the system. The
manual describes the system so that future developers can refer to it when deciding
what changes have to be made.
System manuals are typically split into a number of levels. The top level will describe
the whole system (often on a single page). It will say where the system fits into the
organisation and what other systems it communicates with.
The bottom level of the system manuals will describe each program so that a
programmer does not have to look at a program listing and work out what it is trying
to do.
16.3 Flowcharts
When producing documentation a wide variety of techniques can be used. One
technique, called flowcharts, is often used when describing processes.
Page 71
GCSE Information Technology
Chapter 16 - Documentation
A flowchart uses symbols to represent certain operations. Here are some examples
Disc File
Magnetic Tape
General Operation
Decision
An example of using a flowchart to describe a typical process is as follows.
Writing and Posting a Letter
Write Letter
Buy Stamp
No
Got a stamp?
Yes
Stick stamp on
envelope
Post Letter
This is obviously a trivial example but it demonstrates how processes are represented
and how decisions are catered for.
Page 72
GCSE Information Technology
Chapter 16 - Documentation
This example shows how file updates are represented.
Accept pupil name
from keyboard
Print Error
Message
Validate name
No
Name Okay?
Yes
Student Database
Add name to database
Again, this is only a simple example but notice how the student database is updated
only after a valid name has been input.
Also note that some of the operation boxes have a double line at the top. This shows
that this is a high level task that has another flowchart somewhere else which further
explains how that particular process works.
This is an example of stepwise refinement.
Q.16.3 Questions
Q.16.3.1 Draw a flowchart of the processes involved in making a cup of tea
Q.16.3.2 Draw a flowchart which expands the ‘Validate Name’ Box. Your flowchart
should check that both a first name and a surname has been entered and that neither
exceed 20 characters in length.
R16 Optional Further Research
R.16.1 Decide upon a computer program that you wish to write. Before starting to
write the program plan it using a flowchart. Try to keep each flowchart to one page
and use sub-flowcharts where necessary.
Only when you have finished flowcharting process should you write the program
using a language of your choice. Once the program is complete ensure the flowchart is
updated so that it accurately represents the program.
Page 73
GCSE Information Technology
Chapter 17 - The impact of IT
Chapter 17 - The impact of IT
17.1 Definitions for this Chapter
Electronic Funds Transfer (EFT) : Moving money from one bank account to another
using data communications between computers.
Electronic Data Interchange (EDI) : Moving data from one computer to another,
primarily to carry out a business transaction without the need for paper.
17.2 A brief History
IT has already had a big effect on our lives; arguably a bigger effect than the Industrial
Revolution.
It may come as a surprise that IT (using computers) is relatively young. The first
working computer was not produced until the 1940’s, with computers not being sold
until the fifties.
By the 1960’s many large companies had computers and used them for tasks such as
payroll and stock control. These computers filled rooms the size of football pitches
and they had to be air conditioned due to the amount of heat they generated.
To communicate with these computers you normally had to be in the same room and it
was usually by means of a teletype terminal.
In the 1970’s computers were getting smaller and mini and micro computers were
introduced. In addition the visual display unit become a lot more common.
In this decade the banks started using MICR to speed up cheque clearance.
The 1980’s were a boom time for computers. Personal computers became common
place. DOS and Windows (and Microsoft) almost dominated the PC business.
The Graphical User Interface (GUI) became the accepted way to communicate with
PC’s.
The range of software also increased and, as computers became more powerful, the
type of work they could do also increased.
By the ‘80’s most people would have used a computer (even if they were unaware of
it). Washing machines, video recorders, card cash machines and many other devices
used a computer of some description.
The cashless society, although not with us by the 80’s, looked increasingly more likely
as we got used to using Credit and Debit cards.
Most medium to large businesses had (and relied) on computers.
If the 1980’s saw the rise of the PC, then the 1990’s look like being the decade of
communication. The Information Superhighway (the Internet, Cyberspace - call it
what you will) has touched many lives and it is now possible to communicate with
millions of other computers and people for the price of a local phone call.
Computers are also becoming ever more powerful and it is possible, with a multimedia PC, to play video and sound.
Many small businesses have computers and many homes have a PC somewhere in
their house.
Most children use computers at school and are growing up computer literate.
Page 74
GCSE Information Technology
Chapter 17 - The impact of IT
17.3 The effect IT has had on our lives
Here are just a few ways that IT have affected our lives:
 We are now a more cashless society. We can pay by credit and debit cards.
Electronic Funds Transfer (EFT) is also widespread. EFT allows money to be
moved from one bank account to another using data communication between
computers. The majority of people are paid via EFT.
 More business is conducted using Electronic Data Interchange (EDI). EDI allows
goods and services to be sold without the need for paper forms. For example, you
can buy insurance via EDI. You go into an insurance broker and select the policy
you want. Your order will go directly to the insurance company and update their
database without the need to send any forms.
 The majority of office workers have a PC on their desk. This allows them to access
a lot more information than they could do before and also makes them more
effective in their day to day tasks.
 More personal data about us is held on computers. This helps companies in many
ways. One example, is that they can offer us products through the post which we
know we have an interest in.
 The government of the day holds information about us on computers. This can
speed up things like payment of Social Security and also help detect fraud. Some
people argue it is an invasion of privacy that the government (and companies) hold
all this information.
 Many homes in the country have a PC in their house. This helps students carry out
their school work, can help in areas such as the household accounts and can be
used for entertainment; such as playing games.
 Using on-line services such as the Internet we can communicate with people all
over the world. It is also possible to shop through these services.
 Many people are made redundant due to IT being introduced into the workplace. A
counter argument is that many IT related jobs are also created so overall it balances
out.
 IT is allowing many people to work from home (tele-work). This means less
commuting saving both time and money. But some of the reason for going to work
is for the social interaction that takes place.
Q.17.3 Questions
Q.17.3.1 Consider the statements given in 17.3 above. Choose three. Give a different
justification to those already given as to why it is a good thing and also give an
opposite viewpoint. Finally, state which viewpoint you agree with.
Q.17.3.2 Give another three areas where IT has changed our lives. State whether you
think they are a good or bad thing and give your reasons.
Q.17.3.3 Many jobs are lost through the introduction of IT into the workplace. Give
three reasons why this happens.
Q.17.3.4 The Data Protection Act was introduced in 1984. What are the main aims of
this act (you need to research this question).
Page 75
GCSE Information Technology
Chapter 18 - Your Coursework Project
Chapter 18 - Your Coursework Project
18.1 Introduction
As well as sitting an examination you will also have to produce some coursework
which will count towards your overall mark.
The coursework is very important. It accounts for 60% of the total mark and should be
taken seriously.
Before you start your coursework try to do the following:
 Make sure you know what is required. It is not just about showing that you can use
a computer. Typically you will have to show that you have used IT to solve a
problem.
 Try to look at projects from previous years. This will give you some idea of what
is required.
 Once you have decided on your project try to write down the main objective in one
or two sentences. If you cannot do this you will gradually get more and more
confused about what you are trying to achieve as the project continues.
 If you can, take a look at the marking scheme. As the project progresses, make
sure that you are addressing the areas where marks are awarded. For example, if
you create a database it may be pointless entering a thousand records if you can
enter just ten records and still pick up full marks for showing that you have
developed a system that meets the objectives you set out at the start of the project.
18.2 What shall I do for my coursework?
One of the biggest choices you have to make (assuming it is not made for you) is what
your coursework will be about. You will probably want to look for a problem that you
can use IT to solve. Here is a small list of suggestions but make sure you choose to do
something that interests you otherwise you will lose interest half way through.
 Putting the accounts of a small business onto a spreadsheet.
 Cataloguing your CD, Record and Tape collection on a database.
 Keeping a list of all your friends. You could include who you exchange birthday
(and Christmas) cards with, when you last sent them a letter, when you last spoke
to them on the phone.
 Managing a knock out competition for a local sports club.
 Managing the membership details of a local club. This could include sending out
letters when membership is due for renewal and keeping track of all the accounts.
18.3 How do I do my coursework?
In undertaking your coursework you need to adopt a logical approach. The following
is a list of steps you might go through. It is important that you document each stage as
these reports can form part of the overall project documentation.
Page 76
GCSE Information Technology
Chapter 18 - Your Coursework Project
18.3.1 Propose the Project
This document will describe to your teacher the problem you are trying to solve. You
should include the people who are affected by the project and what benefits they will
see once the project has been implemented.
Your teacher will have to agree with your project proposal before you are allowed to
continue.
18.3.2 Analysis
This stage of the project will be a more detailed analysis of the problem. You need to:
 Interview the people involved to find out exactly what they want.
 State exactly what the proposed system will do.
 Define all the data the system will be storing and where and how you will collect
it.
 Define what output will be produced by the system.
At this stage of the project you do not say how you will solve the problem. You are
simply stating what the problem is and what you need to do in order to solve the
problem.
18.3.3 Design the System
This is the stage where you say how you will solve the problem. You can investigate
potential solutions, evaluate packages and consider what hardware you need.
Depending on the project you may have to:
 Design programs (e.g. produce flowcharts).
 Define the structure of a database (e.g. say what fields you will use and assign a
data type to each one).
 Plan how a spreadsheet will be developed (e.g. what the rows and columns will
represent).
 Plan out how a letter will look (e.g. the wording of a letter to the member of a
club).
You may also have to do some work on designing forms for data capture, defining
exactly how the output will look and deciding how you will check the data has been
entered accurately.
18.3.4 Implement the System
During this part of the project you will actually build the system that you have been
planning. This might include writing computer programs, setting up a database or
spreadsheet or creating various letters and forms on a word processor.
It is important that you test the system. This should be done in a logical way. One way
of doing this is to decide what input data you will use and then work out what output
it will produce. When you enter the planned input you can check to see that you get
the expected output.
Page 77
GCSE Information Technology
Chapter 18 - Your Coursework Project
It is important to test every part of the system. Try putting invalid values into the
system to see that the system rejects them. Also try putting values that are on the
borders of the allowed values. For example, if you write a program that allows the
user to input a number between 1 and 100, try putting in 99, 100 and 101.
Whilst testing, keep a copy of your results as this can be used in your project
documentation.
18.3.5 Document the System
If you have been documenting the system as you go along you should have much of
the documentation already prepared.
You may need to finalise the system documentation and also produce a user manual so
that other people can use the system.
18.3.6 Evaluate the System
It is important that you produce a report which evaluates your project.
 Did you meet the original objectives you set yourself?
 What problems did you have and what did you do to resolve them?
 What could you do to further improve the system?
 What would you do different if you did the same project again?
 Was the project a success? If not, why not?
The evaluation ties up all the loose ends of a project and makes sure that you learnt
from it. It can also be a good starting point for other people considering a similar
project as they can see what problems you had and how you would resolve them if you
did it again.
You may have noticed that the method suggested above is very similar to the system
life cycle (see Chapter 15). You do not have to follow the system life cycle or the
procedure outlined above but it is important that you have some plan as to how you
will tackle the project.
Not only will you be able to check that you are progressing at a suitable pace but it can
also give you a framework into which you write your coursework report.
Page 78
GCSE Information Technology
Chapter 99 - Answers to Questions
Chapter 99 - Answers to Questions
Q.12 Questions
Q.1.2.1 Give three examples of IT, that you use every day.
A.1.2.1 There are obviously many answers. Examples are watches, faxes, mobile phones, radios,
televisions, washing machines.
Q.1.2.2 Looking at the five main areas of IT, above, give one example of each area that you use in
everyday life.
A.1.2.2 The students can give many examples. Possibilities are:
Handling Information : Searching an address book for a friends address.
Communicating Data : Phoning up a friend.
Measuring and Control : Using a TV remote control.
Presenting Information : Writing a school essay.
Modelling the Real World : Keeping a school timetable that models your day.
Q.1.3 Questions
Q.1.3.1
Would you consider the following digital or analogue?
i The music coming from a speaker. (analogue)
ii The price of postage stamps. (digital)
iii Whether a bank account is in credit or debit (in the black or in the red)? (digital)
iv The different combinations of colours a traffic light can have. (digital)
Q.1.3.2 Give an example of something which is digital and something which is analogue?
A.1.3.2 There are many answers. Digital examples include, stations on a TV set and a digital watch.
Analogue examples include tuning an old fashioned radio and a clock with hands.
Q.2.2 Questions
Q.2.2.1 Give two examples of information?
A.2.2.1 Almost any answer will do as long as it has meaning to somebody.
Q.2.2.2 Give two examples of data?
A.2.2.2 Almost any answer will do as long as it can be justified as being data.
Q.2.2.3 Whether something is information or data sometimes depends on who is looking at it. Give two
examples where this could be the case and say who would regard it as information and who would
regard it as data?
A.2.2.3 Many answers are acceptable. Two examples are
 A personal diary written in a code would be information to its owner but only data to anybody else.
 A news bulletin in English would be information to English speaking people but data to everybody
else.
Q.2.3 Questions
Q.2.3.1 Look at the following data and say which data type best describes it.
i
12 (integer)
ii
a (character)
iii
aa (string)
iv
-34.98 (numeric)
v
A telephone number (string - probably not numeric as there are likely to be spaces and
you will not want to perform numeric operations on the data)
vi
Your age (integer)
vii
Your Christian Name (string)
Page 79
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.2.4 Questions
Q.2.4.1 What characters do you think make up the character set of the English language?
A.2.4.1 All the letters (upper and lower case), all the digits and all the punctuation symbols. These
should definitely be included. The student may include others.
Q.2.4.2 What is the character set for all the non-vowel characters in the English alphabet.
A.2.4.2 B through to Z excluding A, E, I, O and U. The student may also include the lower case set as
well as the digits and punctuation characters.
Q.2.5 Questions
Q.2.5.1 Give three examples of where you use codes in your daily life, almost without realising it.
A.2.5.1 Almost any sensible answers are acceptable. For example, postcodes, CD ( for CD-ROM),
£3.20 (for three pounds and twenty pence) and a Telephone STD code to represent an exchange.
Q.2.5.2 If you were asked to introduce a coding scheme for the Premier Division Football teams how
would you do it? As well as devising a coding scheme what else would you need to think about?
A.2.5.2 There are ten teams in the Premier league so a one character code would be enough. But it
might be more sensible to code the teams as two characters so that teams like Liverpool and Leeds
(which both start with ‘L’) can use their second letter to identify them.
Alternatively, you might use a three character code which fits in with some of the normal football
conventions (e.g. QPR for Queens Park Rangers).
You need to think about what to do if there is still a clash after the first two (or three characters ). For
example, ‘Manchester City’ and ‘Manchester United’.
You also need to be aware there that the codes will change as teams are promoted and demoted.
Q.2.6 Questions
Q.2.6.1 Consider a class register. Identify what happens to it during the various phases of the data
processing life cycle.
A.2.6.1 Data Collection : Who is attending that class?
Data Input : Write the names in the register.
Data Processing : Mark attendances and absences.
Output : Produce a report on attendance for the Headmaster.
Q.3.2 Questions
Q.3.2.1 If some data is in RAM why should you regularly copy the data to a disc drive?
A.3.2.2 Because data is lost from RAM when the computer is turned off (or if there is a power cut) and
unless you copy it to a disc you will lose the data.
Q.3.2.2 What is one advantage of distributing software (programs) on CD-ROM as opposed to using
floppy discs?
A.3.2.2 Possible answers include:
 It is cheaper as a CD-ROM costs less to post than a number of floppy discs.
 It is easier to install the software as you do not have to keep swapping floppy discs.
 You can run programs from CD-ROM so you do not have to use space on your hard disc - this is not
usually true of floppy discs.
 The software providers normally give ‘extras’ away as they have spare space on a CD-ROM.
Q.3.2.3 From the following list decide if each item is hardware or software?
i
A Floppy Disc (Hardware)
ii
A Word Processing Program (Software)
iii
A Computer Game (Software)
iv
A Joystick (Hardware)
Page 80
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.3.3 Questions
Q.3.3.1 What do you think is a disadvantage of a multi-user system?
A.3.3.1 Possible answers include:
 If too many people are using the system the response time could be slow.
 If there is a problem with the system all the users are affected (how do you feel when you can’t get
money out of a cash machine due to ‘computer error’ ?)
Q.3.3.2 What do you think is a disadvantage of a single-user system?
A.3.3.2 Possible answers include:
 You may not have access to corporate data, which is somewhere else - possibly on the mainframe.
 Your computer may not be powerful enough to run the software you need in order to do a certain
job.
Q.3.4 Questions
Q.3.4.1
Do you think the following are interactive or real time processes or both?
i A flight simulator (both)
ii Using a calculator (interactive)
iii Booking a holiday at a travel agents (both)
iv A crossword puzzle on a computer (interactive)
Q.3.4.2 When you buy a train ticket you can reserve a seat. Do you think the train operator could use
a single user system to provide this service? If not, why not?
A.3.4.2 No. The bookings have to be done on a central, multi-user system so that the same seat is not
booked twice.
Q.4.2 Questions
Q.4.2.1 Collect five examples of forms that are designed to capture data. Say what you think are the
good and bad points about each form. Design your own form to collect data about your classmates.
How does your form compare to others in your class?
A.4.2.1 This is simply a matter of personal taste (although there are recognised good and bad practises
used in industry). For example, some students might think it good that boxes are provided for each letter
of your name. Others might see this as a restriction on the amount of data that can be input.
Q.4.2.2 Give three examples of data capture forms where the form has already been pre-printed with
details about yourself.
A.4.2.2 There are many examples including gas and electric meter reading forms, TV licenses, Road
Tax reminders, Mail Order Shopping orders.
Q.4.2.3 Design a simple questionnaire and try it out on people at school (both students and teachers).
What problems did you encounter? What could you have done to reduce these problems?
A.4.2.3 There are obviously many answers to this questions and many lessons to be learnt. It is almost a
mini-project and includes many other subjects as well as Information Technology.
Page 81
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.4.3 Questions
Q.4.3.1 Next time you are in your local town see how many different ways you can find that retailers
capture data.
A.4.3.1 There are many answers including bar codes (and scanning), entering prices into tills, collecting
customer requirements on a form, giving an estimate/quotation and approaching customers to ask if they
can help.
Q.4.3.2 Apart from cheque and cash cards where else would you find a magnetic strip?
A.4.3.2 There are many answers including entry cards, London Underground tickets, Credit Cards and
Phone Cards.
Q.4.3.3 As long as you are aged sixteen or over you can go into thousands of shops, pay one pound and
see OMR in action. What would you be doing?
A.4.3.3 Entering The National Lottery.
Q.4.3.4 Give one advantage and disadvantage of OMR, OCR and MICR.
A.4.3.4 There are numerous answers. A sample answer (with two answers in each section) is given
below:
Advantages (OMR)
 1) It is a quick way to collect data. 2) It is less error prone than some other methods.
Disadvantages (OMR)
 1) The design of the forms can be complicated. 2) The person filling in the form has to follow the
instructions precisely.
Advantages (OCR)
 1) It saves time as the data does not have to be re-type. 2) It can understand hand-written and typed
characters.
Disadvantages (OCR)
 1) There can be a high failure rate in recognition. 2) Characters can be recognised incorrectly.
Advantages (MICR)
 1) It is difficult to forge. 2) It is a common standard within the financial sector.
Disadvantages (MICR)
 1) The system only recognises one set of characters (font). 2) MICR systems are expensive.
Q.4.3.5 Can you think of another type of input device that is commonly used to play games?
A.4.3.5 A joystick.
Q.5.2 Questions
Q.5.2.1 What do you consider are the main advantages of a GUI over a Command Line Interface?
A.5.2.1 There are many answers but you might expect to see these (or variations):
 It is easier to use (more intuitive).
 You do not have to remember long strings of commands.
Q.5.2.2 If you have access to an IBM compatible PC go to the Command Line Interface (the DOS
Prompt) and try these commands. What do they do?
i DIR (show all the files in the current directory)
ii CLS (Clears the screen)
iii COPY C:\AUTOEXEC.BAT MYFILE.BAT (Copies a file)
iv PROMPT $T (changes the prompt to the current time)
(Note : You may not be allowed access to the DOS prompt. In which case you will be unable to do this
question)
Q.5.2.3 GUI’s are sometimes called WIMP environments. Why do you think this is?
A.5.2.3 WIMP is an acronym for Windows, Icons, Menus and Pointer
Page 82
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.6.2 Questions
Q.6.2.1 Give examples of two output devices - one which produces information and one which
produces data. Do not use examples given in the text and do not use computer output devices.
A.6.2.1 There are many answers. Two acceptable answers, in each category, are Personal Stereo
(information), TV Remote Control (data), Printing Press (information) and a Telephone when dialling a
number (data).
Q.6.3 Questions
Q.6.3.1 Teletext is an example of a screen mode. Would you say that a teletext display needs a high,
medium or low resolution monitor? Explain your answer.
A.6.3.1 Low. The characters are built from ‘chunky’ characters. There is no fine detail and no graphics
to talk of. Having said that they achieve some good effects.
Q.6.4 Questions
Q.6.4.1 Imagine you are a 24 pin dot matrix printer. Using graph paper show how you would print an
‘m’, an ‘a’ and an ‘!’.
A.6.4.1 You should receive a grid which is 24 units high. An ‘m’, ‘a’ and ‘!’ should be represented by
filling in the relevant squares. If the students use a magnifying glass they will be able to see the
individual dots on a page printed with a dot matrix printer.
Q.6.4.2 A printer can either be considered a character printer (where one character is printed at a time),
a line printer (where a complete line is printed at a time) or a page printer (where a whole page is
printed at a time). Classify a dot matrix printer, an ink jet printer and a laser printer into each of these
categories.
A.6.4.2 Dot matrix printer (character - typically), Ink jet printer (character - typically), Laser (Page).
Note : Line printers are normally connected to mainframes where a complete line is printed before the
paper is advanced.
Q.6.4.3 Many printers have two modes of operation; draft quality and letter quality (sometimes called
Near Letter Quality or NLQ). After reading the definitions at the beginning of this chapter how do you
think the two modes might be implemented on a dot matrix printer and a laser printer?
A.6.4.3 Dot matrix implementation is done by ‘missing’ dots.
Laser implementation is done by a printer with not such a high resolution (i.e. less dots per inch).
Q.7.2 Questions
Q.7.2.1 How many characters can you store on a 3.5” High Density Floppy Disc? How does this differ
from a 3.5” Double Density disc? (Note : this question requires research by the student).
A.7.2.1 3.5” HD = 1.4 million, 3.5” DD = 750,000 (both approx.)
Q 7.2.2 Using your knowledge of storage devices what do you think is the best medium for the
following types of data?
i. A large application distributed to a great many people (CD-ROM)
ii. An Operating System (ROM or Hard Disc)
iii. A weekly security copy (Magnetic Tape)
iv. A copy of a file that you need to take home (Floppy Disc)
v. A letter that you are writing to your friend (Hard Disc or RAM)
Page 83
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.7.4 Questions
Q.7.4.1 Would you consider a CD-ROM a direct access or a serial device?
A.7.4.1 It is a direct access device but some data may have to be read serially. However it is important
that the students recognise it is predominantly a direct access device.
Q.7.4.2 Give one advantage of a direct access device and one disadvantage
A.7.4.2 It allows fast access to any piece of data. There is an overhead to allow this type of access.
Q.7.4.3 Give an example where direct access would be more suitable over serial access.
A.7.4.3 There are many examples. One possibility is a library. If somebody borrows a book you would
want direct access to the data about that book. If you had to read information about every book the
system would be too slow.
Q.7.5 Questions
Q.7.5.1 The directory structure shown in 7.5.2 can be represented as a tree structure. Draw a tree that
represents this structure.
A.7.5.1 The start of the tree is shown here:
C:\
accounts
gk
acroread
hk
Q.7.6 Questions
Q.7.6.1 Why is it important for a security copy of a file to be stored away from the computer which has
the original file on?
A.7.6.1 If there is a disaster such as a fire you need to ensure the security copies remain intact.
Q.7.6.2 Can you think of a disadvantage of compressing data as you take the security copy?
A.7.6.2 You have to expand the data before you can use it. This takes times and means you have to
have access to the program that does the expansion. For example PKZIP (to compress) and PKUNZIP
(to expand).
Q.8.2 Questions
Q.8.2.1 Is RAM hardware or software?
A.8.2.1 The electronic chips that make up the RAM are hardware. It can, at any point in time, hold
software; along with the data that is being processed.
Q.8.3 Questions
Q.8.3.1 What do you consider are the advantages and disadvantages of a custom designed package as
opposed to buying a package ‘off the shelf’?
A.8.3.1 Advantages
Does exactly the job you require.
Disadvantages
More Expensive.
It will need supporting.
You need to develop and maintain it (e.g. legal requirements).
Potentially long time to develop.
Q.8.4 Questions
Q.8.4.1 If you had to write an essay what would you look for in a Word Processing Package to assist
you.
A.8.4.1 This is largely a matter of personal opinion but typically the students might say they need a
spell checker, something to check their grammar and a Word Processor that can help with the
presentation of their finished document.
Q.8.5 Questions
Page 84
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.8.5.1 What package would you use for each of the following tasks.
i.
Writing a report (Word Processor)
ii. Preparing company accounts (Spreadsheet)
iii. Keeping information about the products a company supplies (Database)
iv. Keeping a class register (Database - but Word Processing or Spreadsheets could also be
argued)
Q.8.5.2 Give an example of a use for each of the applications describe above. Say why the application
is suitable.
A.8.5.2 There are an infinite number of answers to this questions. The important point is that the student
can justify the answer.
Q.9.2 Questions
Q.9.2.1 Using any Word Processor you have access to, write at least three paragraphs, with each
paragraph occupying at least three lines. Make use of bold, italics and underlining. Also use different
fonts and sizes. Print the document.
A.9.2.1 A document should be presented that meets the specification set out in the question.
Q.9.2.2 Type the word ‘windws’ (windows without the ‘o’) into a Word Processor. Spell check it. What
suggestions are you offered as a replacement?
A.9.2.2 The actual list will depend of the Word Processor and the dictionary being used. The list might
include windows, winnow, wind, winds and windy.
Q.9.4 Questions
Q.9.4.1 Using the document you created in Q.9.2.1 change it so that the right and left hand margins are
1cm less than they were originally. Also change the paragraphs so that the first lines are indented by a
further 2cm. Print the document.
A.9.4.1 A document should be presented that you can check by inspection against the document handed
in for Q.9.2.1.
Q.9.6 Questions
Q.9.6.1 Using the document you created in Q.9.4.1 move the third paragraph so that it becomes the
second paragraph. Print the document.
A.9.6.1 A document should be presented that you can check by inspection against the document handed
in for Q.9.4.1.
Q.10.2 Questions
Q.10.2.1 What is the key field in a telephone directory?
A.10.2.1 The phone number. Everybody has a different phone number (compared to surname).
Q.10.2.2 For a school register say what is the datafile, the records, the fields and which field is the key
field?
A.10.2.2 Datafile = The register itself. Records = Students name and/or number and if they have
attended. Fields = Name and a series of repeating fields which represent a term (or week). Key Field =
Students Name and/or number. Other answers are possible.
Q.10.2.3 Give three examples of when it would be sensible to use a computerised database?
A.10.2.3 There are many possibilities including; an address book, a Christmas card list, a list of
birthdays, as well as the uses to which a company would use a database (e.g. stock control).
Page 85
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.10.3 Questions
Q.10.3.1 If your school identified its classes by cathedrals (e.g. Salisbury, Canterbury etc.) what
change(s) would need to be made to the database definition shown above (section 10.3.1)?
A.10.3.1 The Class Number description should be changed (to Class Name?) and its data type changed
to Text(20).
Q.10.3.2 Create a computer database that holds data about everybody in your class. Decide for yourself
what data you want to keep. Next collect that data in whatever way you feel is appropriate, set up the
database using appropriate data types and then enter the data you have collected.
Produce a print of the database records and also a print showing the database structure. Also hand in
your data collection documents.
A.10.3.2 You should receive two prints and the data collection documents. These should show the
students understanding of how to set up and input data into the database.
Q.10.4 Questions
Q.10.4.1 Using the sample database we have developed in this chapter what expression would you use
to search for anybody in class 18 or for anybody with a surname of ‘Jones’?
A.10.4.1 Class Number = 18 OR Surname = ‘Jones’
Q.10.4.2 Using the database you created in Q.10.3.2 sort the data on one of the fields, carry out a query
and produce a print which does not show all the fields. Hand in three prints showing the results. Also
provide a brief description of the field you sorted on and the query you did.
A.10.4.2 You should receive three prints and an explanation of what the student was trying to achieve.
You can check the results against the previous database print.
Q.11.2 Questions
Q.11.2.1 Think of three situations which are models of the real world. Where does the model differ
from the situation it is modelling?
A.11.2.1 This is a very open question. One possible answer is a name and address book. It models the
people you know. It differs in many respects; for example it does not model their height, eye colour etc.
Q.11.3 Questions
Q.11.3.1 Look at the Old Trafford spreadsheet in 11.3.2 above and answer the following questions.
 What value is in cell C4?
 In what cell is the value ‘Paid so far’?
A.11.3.1 23.58, C2
Q.11.3.2 Using a spreadsheet package of your choice set up the Old Trafford spreadsheet as shown in
11.3.2. Try to match the formatting as closely as possible. Hand in a print of the result.
A.11.3.2 You should receive a print that matches the spreadsheet shown in 11.3.2 (as closely as the
package allows).
Q.11.3.3 Using the spreadsheet you produced in Q.11.3.2 answer these questions.
 Enter some text into cell B2. What happens and why?
 Increase the font size of ‘Amount to Pay’ by at least four points. What happens and what can you do
to correct it?
 Change the format of the cells which display numeric values so that a pound sign is automatically
displayed (e.g. entering 52.34 is displayed as £52.34). Why is it important not to enter the pound
sign when typing in the figures?
A.11.3.3 Part of ‘School visit to Old Trafford Football Ground’ disappears as it can no longer ‘flow’
into cell B2.
The cell is no longer big enough to accommodate the data. The cell width will have to be increased.
It treats the data in the cell as text.
Q.11.3.4 Using the spreadsheet you have been developing, use the SUM function to show how much all
the students have paid so far and how much is still outstanding. Produce a print.
A.11.3.4 The spreadsheet should have the following figures in the following cells; C6 = 62.99, D6 =
132.01. You might want to check that formulae have been used to generate these figures.
Page 86
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.11.3.5 What is the benefit of holding something like the VAT rate on the spreadsheet and accessing it
via an absolute cell reference?
A.11.3.5 If the VAT rate changes you only have to change one cell on your spreadsheet and all the
other figures are automatically recalculated.
Q.11.3.6 Set up a spreadsheet that models the money you spend each week and what you spend it on.
The spreadsheet should have the days of the week down the side and the things you spend your money
on across the top. Provide totals for each day and for each item you spend money on. Produce a print.
A.11.3.6 A spreadsheet should be produced which meets the criteria of the question. The SUM function
should be used to work out the totals.
Q.12.2 Questions
Q.12.2.1 If the same image is stored as a pixel based format and as a vector based format what format
do you think would be most suitable to use if the image had to be enlarged? Hint : Try drawing a circle
on squared paper and then enlarging it by making each pixel (square) bigger so that it occupies four
squares instead of one.
A.12.2.1 Vector based graphics are better for scaling as pixel based graphics tend to become ‘jagged’
when enlarged.
Q.13.2 Questions
Q.13.2.1 One of the benefits of a computer network is that it allows everybody share a common source
of data. Why do you think this is important?
A.13.2.1 It means there is no duplication of effort in entering and maintaining the data. It also means
there is not inconsistency in the data caused by people holding their own files.
Q.13.3 Questions
Q.13.3.1 Think of three businesses in your local High Street that you think would use a LAN and three
that are probably connected to a WAN.
A.13.3.1 There are many answers but the best test that can be applied is if the company is part of a
national/multi-national company. Then they are likely to be connected to a WAN (e.g. Banks, Building
Societies, Insurance Companies, Travel Agents etc.)
Companies likely to have a LAN are medium sized self-contained businesses that have a number of
computers (e.g. solicitors, estate agents, accountants etc.)
Q.13.3.2 The sale of modems have increased in the past few years. They have been sold to people who
wish to access the biggest computer network in the world. What is this network?
A.13.3.2 The Internet.
Q.14.2 Questions
Q.14.2.1 Give examples of three other control systems that you would find in your home.
A.14.2.1 Possible answers include Video Recorder, CD Player, TV Remote control, an automatic
camera and a video camera.
Q.14.3 Questions
Q.14.3.1 Do you think there is a need for any sort of interface between a mouse the processor?
A.14.3.1 Yes. A mouse is an analogue device. Therefore there is a need for an interface.
Page 87
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.14.4 Questions
Q.14.4.1 For a motor which can be turned on and off how many control signals are required?
A.14.4.1 One or two. There could be two with one being for on and one for off. However one signal
could be used with the current state of the motor being reversed each time.
Q.14.5 Questions
Q.14.5.1 Give three examples of control systems that have some form of feedback capability.
A.14.5.1 There are many answers including a computer mouse (tells the processor when it is moving), a
burglar alarm (tells the processor when it detects movement), a telephone (tells the processor when
somebody is pressing buttons to dial a number) and a central heating system (tells the processor the
current temperature).
Q.14.5.2 Think of a system where a device that continuously collects data would be appropriate.
A.14.5.2 There are many answers. One possible answer is recording temperatures and wind speeds at
regular intervals for a weather forecasting system.
Q.14.6 Questions
Q.14.6.1 If you have access to LOGO run the program 1 from this section. If you do not have LOGO
then run the program ‘manually’ (that is, use paper and pencil). Hand in the results.
A.14.6.1 You should receive a square which is 60 ‘units’ in size.
Q.14.6.2 Using the LOGO language write a program that would draw a triangle that has equal sized
sides and equal sized angles (that is, an equilateral triangle).
A.14.6.2 One correct program would be:
PEN DOWN
REPEAT 3 [FORWARD 30 RIGHT 120]
PEN UP
(The repeat statement could consist of three separate statements)
Q.14.6.3 What do you think are the main advantages of writing procedures?
A.14.6.3 You do not have to replicate instructions in different parts of the program. This makes it easier
to read, easier to maintain and more reliable as the procedure should be fully tested before it is used
within a program.
Q.16.3 Questions
Q.16.3.1 Draw a flowchart of the processes involved in making a cup of tea.
A.16.3.1 There are many answers. You should check that the main elements of making tea are present
(add milk, add sugar, pour tea, fill kettle etc.) You should also check that there are relevant decisions
e.g. Do you take sugar? Do you take milk? Has the kettle boiled?
Q.16.3.2 Draw a flowchart which expands the ‘Validate Name’ Box. Your flowchart should check that
both a first name and a surname has been entered and that neither exceed 20 characters in length.
A.16.3.2 The flowchart will be different for each pupil but they should have common features. They
should all have decision boxes checking that the first name and surname has been entered. They should
also have decision boxes that check that neither part of the name exceeds 20 characters in length.
The flowchart should NOT get the name from the keyboard. This is done on the higher level flowchart
and including it in this would mean the user being asked twice.
Q.17.3 Questions
Q.17.3.1 Consider the statements given in 17.3 above. Choose three. Give a different justification to
those already given as to why it is a good thing and also give an opposite viewpoint. Finally, state which
viewpoint you agree with.
A.17.3.1 The answers the students give are almost immaterial as long as they provide some sort of
justification.
Page 88
GCSE Information Technology
Chapter 99 - Answers to Questions
Q.17.3.2 Give another three areas where IT has changed our lives. State whether you think they are a
good or bad thing and give your reasons.
A.17.3.2 Again, the answers are almost immaterial. The aim of these questions is to make the students
consider the implications of IT and not just consider the positive viewpoints.
Q.17.3.3 Many jobs are lost through the introduction of IT into the workplace. Give three reasons why
this happens.
A.17.3.3 There are many answers. Some samples are:
 People are more efficient now that many companies use an electronic office so less secretaries and
clerical staff are needed.
 Companies who automate their manufacturing process do not need as many people to produce the
same amount of goods.
 Companies which do not keep up with the IT revolution face stiffer competition and may go
bankrupt as they cannot compete.
 Companies such as railway operators and telephone operators rely on computers to monitor their
operations and do not need as many people.
 Industries such as printing have been deeply affected by the IT revolution. The industry has changed
almost beyond recognition and require a lot less people.
Q.17.3.4 The Data Protection Act was introduced in 1984. What are the main aims of this act (you need
to research this question).
A.17.3.4 There are eight main principles to this act.
1. The information to be held shall be obtained and processed fairly and lawfully.
2. Personal data shall be held only for one or more specified and lawful purposes.
3. Personal data held for any purpose shall not be used or disclosed in a manner incompatible with that
purpose.
4. Personal data shall be adequate, relevant and not excessive in relation to the purpose for which it is
being held.
5. Personal data shall be accurate and kept up to date.
6. Personal data shall not be held for longer than is necessary.
7. An individual shall be entitled, without undue delay or expense, to view the data being held about
them and, where appropriate, have it amended or deleted.
8. Appropriate security measures should be taken to protect the data.
Page 89
Download