Exam Date: May 13th 2015 R001 Introduction to Computer Systems – A Student’s Guide 123 Oldham Road, Royton, Oldham, OL1 8NN Cambridge Nationals ICT 2015 Contents 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 3. Learning Outcome 3: Know how ICT can be used to support business working practices 4. Learning Outcome 4: Understand how legal, ethical, safety and security issues affect how computers should be used. 123 Oldham Road, Royton, Oldham, OL1 8NN 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- Desktop Computer - Portable Devices - Laptop - Netbook - Tablet - Smartphone 123 Oldham Road, Royton, Oldham, OL1 8NN 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Mouse Keyboard Microphone Sensor PAD Specialist Keyboards Touch Pad Remote Controls Scanners Digital Cameras Web Cams Touch Screens Barcode Readers Magnetic Stripes Chip and Pin MIDI Instruments 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Monitor/Screen Printers Speakers Headphones Digital Projectors Data Projectors Plotters Actuators 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Operating Systems Utility Software Applications Software Word Processing Desktop Publishing Spreadsheets Database Management Software Communications Software Multi-media Software Slideshow Software Video- Editing Software Graphics Manipulation Software Communications Software (E.g. Social Networking,chat, instant messaging, file transfer and email clients) Presentation Software Gaming Software Web Browsers Apps 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. Optical Disks (E.g. CD and DVD for data storage) Magnetic Media (e.g. internal and external hard disk drives (HDD), tape) Solid State Drives (SSD) Memory Cards i.e. Flash memory devices Network Devices (e.g. routers, modems) Cloud Storage 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 5. Explain how systems can be customised to meet the specific needs of 123 Oldham Road, Royton, Oldham, OL1 8NN a) People with a physical impairment - Sight - Hearing - Movement b) People working remotely (e.g. travelling or from home) 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 6. How might the choice of a computer system be affected by 123 Oldham Road, Royton, Oldham, OL1 8NN a) b) c) d) Cost Availability User Needs Data Security 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 7. Explain the different methods below of connecting peripherals to a computer system 123 Oldham Road, Royton, Oldham, OL1 8NN a) Wired Methods (e.g. USB and Firewire) b) Wireless Methods (WIFI, Bluetooth, Infra – Red) 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 8. Explain how you would connect a computing device to an existing wireless network. 123 Oldham Road, Royton, Oldham, OL1 8NN 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 9. Explain how organisations use the following technologies to track and monitor employees a) GPS Location Tracking b) Monitoring Internet Use c) Monitoring Communications 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data a) Online and Paper based forms b) Automated data capture systems - Control System Sensors - Bar Code Readers - Radio Frequency Identification Device (RFID) - Near Field Communication (NFC) 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 2) Explain how the following factors can affect how data is captured. a) Cost b) Availability c) Ease of Use d) Data Security 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 3) Explain how data capture forms should be designed to obtain specific information 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 4) What is meant by coding when capturing data on a computer? How is this useful? 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 5) Explain Data Validation methods. How are these used to ensure accurate data is collected? 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 6) Explain Data Validation methods. How are these used to ensure accurate data is collected? 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 7) Explain what file formats are when storing data 123 Oldham Road, Royton, Oldham, OL1 8NN 8) What is a proprietary file format? 9) Which files use the following formats? a) .doc b) .xls c) .ppt d). fla e) .wma f) .wma g) .aac 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 10) What is an open format? 123 Oldham Road, Royton, Oldham, OL1 8NN 11) Which types of files used the following format? a) .rtf b) . pdf c) . Csv d) .exe e) .txt f) .mp3 g) .wav 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 12) What is local and removable storage? 123 Oldham Road, Royton, Oldham, OL1 8NN 13) What is meant by remote storage? a) Offsite location b) Cloud Storage 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 14) Explain relevant network and computer security measures that should be used when storing data? 123 Oldham Road, Royton, Oldham, OL1 8NN a) Usernames/Passwords b) Access Rights/Permissions 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 15) Explain the relevant document security measures that could be used when storing documents 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 16) Explain physical security measures that could be used to prevent data loss 123 Oldham Road, Royton, Oldham, OL1 8NN 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 17) What is the difference between wired and wireless technologies for transferring data? 123 Oldham Road, Royton, Oldham, OL1 8NN 18) What are the differences between 3g and 4g data transfers in mobile phone technology? 19) How is data transferred remotely? 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 20) How is data that is being transferred kept secure? 123 Oldham Road, Royton, Oldham, OL1 8NN 21) When thinking about transferring data, how do the following factors influence your decision? 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 28) Explain how bandwidth and router technology affect the transfer of data 123 Oldham Road, Royton, Oldham, OL1 8NN 29) Explain how important the following factors are when backing up data? a) The choice of media. (e.g. removable devices, remote storage) b) Back up frequency c) Archiving d) Automated vs manual systems 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 30) Explain how the following factors may well influence your choice of back up? 123 Oldham Road, Royton, Oldham, OL1 8NN a) b) c) d) Cost Availability Ease of Use Data Security 3. Learning Outcome 3: Know how ICT can be used to support business working practices 1) Explain the following remote ways in which businesses can communicate with employees and others 123 Oldham Road, Royton, Oldham, OL1 8NN a) SMS b) Instant Messaging c) E-Mail d) Chat Rooms e) Forums f) Bulletin Boards g) Voice-overoIP (VOIP) h) Video Conferencing i) Webcams j) Blogs h) Social Networking 3. Learning Outcome 3: Know how ICT can be used to support business working practices 2) Explain what is meant by appropriate use of communication tools in an organisation 123 Oldham Road, Royton, Oldham, OL1 8NN 3. Learning Outcome 3: Know how ICT can be used to support business working practices 3) Explain what is meant by diary management software 123 Oldham Road, Royton, Oldham, OL1 8NN 4) Explain how documents can be created and edited collaboratively 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 1) Explain how laws (legislation) affect computer users in terms of:123 Oldham Road, Royton, Oldham, OL1 8NN a) b) c) d) Health and Safety Data Protection Copyright Computer Misuse 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 2) Explain how moral and ethical issues affect business 123 Oldham Road, Royton, Oldham, OL1 8NN computer users 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 3) What are the implications and consequences for 123 Oldham Road, Royton, Oldham, OL1 8NN organisations of data loss, corruption and theft? a) b) c) d) Legal implications Impact on customers Impact on employees Impact on the organisation 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 4) What are the main threats to data security in an 123 Oldham Road, Royton, Oldham, OL1 8NN organisation? 5) What actions can an organisation take to minimise the risks of data theft? ANSWERS 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- Desktop Computer 123 Oldham Road, Royton, Oldham, OL1 8NN - A desktop computer is a personal computer that is used at a single location desk/table due to its size and power requirements. It is not carried around. It is typically made up of a tower, monitor, keyboard and mouse. Desktop computers run application software that help users complete various tasks i.e. Writing a letter, Editing photographs etc. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Portable Devices - Laptop A laptop combines the components and inputs of a desktop computer, including display, speakers, keyboard and pointing device (such as a touchpad or a track pad) into a single device. Most modern-day laptops also have built in webcam and a microphone. Laptops allow the user to carry them around and work away from the office. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- Portable Devices - Netbook A netbook is a small, light, low-power notebook computer that has less processing power than a full-sized laptop but is still suitable for word processing, running a Web browser and connecting wirelessly to the Internet. They are cheaper and smaller than laptops. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- Portable Devices - Tablet 123 Oldham Road, Royton, Oldham, OL1 8NN A tablet computer is a mobile device with a touchscreen display, components and battery built into a single unit. Tablets come equipped with sensors, including cameras, a microphone and an accelerometer, and the touchscreen display uses finger or stylus gestures instead of computer mouse and keyboard. Tablets run different apps or applications that range from games to business related software. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 1. Explain the features and purposes of the following devices:- Portable Devices - Smartphone 123 Oldham Road, Royton, Oldham, OL1 8NN A mobile phone that is able to perform many of the functions of a computer. Typically they have a larger screen and an operating system capable of running general-purpose applications (apps). Like tablets, a smartphone comes with a number of sensing devices like an accelerometer. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices Mouse A mouse in an input device that is used to control a pointer on a typical desktop computer system. Most mice are optical mice. This means they use a L.E.D underneath to detect movement. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices Keyboard A keyboard is an input device that is used by the user to type information into a computer system. A typical keyboard is known as a QWERTY keyboard because of the layout of the keys. Another type of keyboard is the concept keyboard. This keyboard uses symbols. The user can press these to communicate with the system. At McDonald’s concept keyboards are used to help type in your order. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices Microphone A microphone is an input device that captures sound waves for a computer system. More and more systems have built in microphones. Typically a laptop, smartphone and tablet will feature a built in microphone so that users can communicate with others. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices Sensor A sensor is an input device that detects something. There are many different types of sensor. A movement sensor may be used in a burglar alarm to detect movement. A light sensor may be used in the garden to detect a lack of light and turn on the garden lights. Heat sensors can be used by central heating systems to detected the temperature in order to turn the heating on or off. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- Input Devices - PAD Pressure pad sensors are input devices that can be used in burglar alarms or baby monitoring devices to detect pressure being applied. If a baby stops breathing in a cot, the pad can detect this and the system can alert the parents. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices Specialist Keyboards A specialist keyboard is an input device that has been designed to fulfil a particular task. Sometimes keyboards are designed for people with disabilities to make them easier to use. Alternatively, the keys may be move to allow the user to use the device in a better manner. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Touch Pad A touch pad is an input device that allows the user to control a pointer on the screen. Touch pads can often be found on laptops and netbooks. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Remote Controls A remote control is an input device that beams a infra red light at a receiver and allows the user to operate a system from a distance. Ie. On your T.V. you can control it from the comfort of your settee using a remote control. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Scanners A scanner is an input device that allows you to scan information onto a computer system. Text that is scanned onto a system can be read by Optical Character Recognition (OCR) software which then allows the user the chance to edit the text or add to it. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- Input Devices - Digital Camera A digital camera is an input device that allows the user to capture photographs . Photographs can then be uploaded onto a computer system to be edited and printed. Inside the digital camera is a sensor that captures data on a matrix. The more data it captures, the more megapixels the digital camera is said to have. A 12MP digital camera can capture 12 million pixels of data. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Web Cams Web cams are used to capture images and videos. These input devices are useful for video-conferencing sessions. Software such as Skype (Voice over IP) can be used to connect users across the world. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Touch Screen A touch screen is an input device that allows the user to control computer systems like Tablets and Smartphones. This type of control is easy to use and very intuitive. The user can point at apps they want to access and they will open. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Barcode Readers A barcode reader is an input device that allows the quick scanning of bar codes. The bar reader shines a dot of light across the code and picks up the returning signal which it converts into a digitised signal. The bar code identifies the item. The system is usually linked to an EPOS or Electronic Point of Sale system which deducts the product from the inventory of the store. This allows the store manager to keep control of his/her stock very easilyt. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Magnetic Stripes A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe,, is read by swiping past a magnetic reading head. Magnetic stripe cards are commonly used in credit cards, identity cards, and transportation tickets. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - Chip and Pin Chip and PIN is the name given to a smart card payment system for credit, debit, and Automated Teller Machines (ATM) cards. "Chip" refers to a computer chip embedded in the smartcard, and "PIN" refers to a personal identification number that the customer must supply. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 2. Explain the features and purposes of the following devices:- 123 Oldham Road, Royton, Oldham, OL1 8NN - Input Devices - MIDI Instruments The classic MIDI synthesizer is the electronic keyboard, resembling a small piano. When you press a key on the keyboard, you hear a tone. Most new keyboards come with hundreds of different preset instrument sounds and effects from which to choose. But when you press a key on a MIDI synthesizer, in addition to creating an audible tone, you also create MIDI data. If you connect the keyboard to a computer, you can record that MIDI data onto a sequencing program. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Monitor/ TFT Screen A computer screen or display. The monitor displays the computer's user interface and open programs, allowing the user to interact with the computer, typically using the keyboard and mouse. Monitors display picture elements or pixels. Pixels are tiny dots that make up the image. The more pixels a monitor can display, the greater the resolution the monitor has. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. - Explain the features and purposes of the following devices:Output Devices - Printers 123 Oldham Road, Royton, Oldham, OL1 8NN A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. The four printer qualities of most interest to most users are: • Color: Color is important for users who need to print pages for presentations or maps and other pages where color is part of the information. Colour ink costs more than greyscale • Resolution: Printer resolution (the sharpness of text and images on paper) is usually measured in dots per inch ( dpi ). Most inexpensive printers provide sufficient resolution for most purposes at 600 dpi. • Speed: If you do much printing, the speed of the printer becomes important. Inexpensive printers print only about 3 to 6 sheets per minute. Color printing is slower. More expensive printers are much faster. • Memory: Most printers come with a small amount of memory (for example, one megabyte ) that can be expanded by the user. Having more than the minimum amount of memory is helpful and faster when printing out pages with large images or tables with lines around them (which the printer treats as a large image). Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Speakers A speaker is an output device that lets the computer system communicate with the user via sounds and noises. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Headphones Headphones are similar to speakers in that they are an output device but they are worn by a single user. They come in different sizes and shapes. Some are worn in the ear whilst overs are worn over the ears Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Digital Projectors A digital projector is an output device that projects an image onto a wall or screen. These projectors allow large displays to be used. A business may use a digital projector in a boardroom or conference room so that many people can watch a presentation at once. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Data Projectors A data projector is an electronic device that collects video data from a computer or other media player and projects the incoming images onto a projection screen. These devices are generally thought of as updated models of the basic overhead projector Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Plotters The plotter is a computer printer for printing vector graphics. In the past, plotters were used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers. A plotter gives a hard copy of the output. It draws pictures on paper using a pen Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Output Devices - Actuators An actuator is an output device and a type of motor that is responsible for moving or controlling a mechanism or system. In your playstation controller, actuators are used to vibrate the handset when you are hit by a bullet or taking a penalty in a football game. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Operating Systems An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function.. Common operating systems include Windows, MacOS, Linux and Android OS. The operating system is the first thing that is loaded into a systems memory when the system is turned on. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Utility Software Utility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates. Utility software, along with operating system software, is a type of system software, distinguishing it from application software. Examples of utility software might be anti – virus software or back up software Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software - Word Processing A computer program that allows the user to compose, edit, format and sometimes print any sort of text. A common example is Microsoft Word. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Desktop Publishing DTP or Desktop Publishing s the creation of documents using page layout skills on a personal computer. These documents usually contain a mixture of text and graphics. Examples of documents produced using DTP might be a newsletter or a magazine front cover. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Spreadsheets An electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and used in calculations. A spreadsheet allows you to make graphs and charts too. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Database Management Software A database is an organised collection of data. Databases can be used to sort, find and manipulate data very quickly which saves businesses time and money. A good example of a database is Microsoft Access. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Communications Software Communication software is used to provide remote access to computer systems and exchange files and messages in text, audio and/or video formats between different computers or users. Examples of communication software include Voice over IP (VOIP) software like skype, instant messager software, email and File Transfer Protocol software (FTP) Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Multi-media Software Multimedia software is software that can play and view all sorts of media, such as Music, Videos, Pictures, etc. Examples: VLC Media Player, Windows Media Player. This software enables the creation and editing of multimedia documents. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Slideshow Software Slideshow software is used to produce presentations for different audiences. Slideshows can be set up with themes and contain text, graphics and other forms of multi-media. A good example of slideshow software is Microsoft Powerpoint. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Video- Editing Software Video – editing software allows for the editing of video files such as .AVIs, and MPGs. Videos can be cut, digital effects can be added and digital audio can be inserted to create professional looking video files. Typically, video editing software requires a powerful computer as the manipulation of large video files is resource intensive.An example of this type of software might be Windows Movie Maker or iMovie on an Apple Mac. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Graphics Manipulation Software In computer graphics, graphics software or image editing software is a program or collection of programs that enable a person to manipulate visual images on a computer. An example of this type of software would be Adobe Photoshop Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software - Applications Software Gaming Software Gaming software allows the user to play games on a computer system. Computer games are big business and the most popular games can make more money for the developer than Hollywood blockbuster films. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Software Applications Software - Web Browsers A web browser allows a user to access pages on the internet. The most common web browsers are Microsoft Internet Explorer, Mozilla Firefox and Google Chrome. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 3. - Explain the features and purposes of the following devices:Software 123 Oldham Road, Royton, Oldham, OL1 8NN Applications Software - Apps Apps is short for applications. Apps are downloadable programs that run on smartphones and tablets. Apps can be games or other types of programs. On Apple devices, the apps are downloaded from the Apple Store. On Android devices, the apps are downloaded from Google Play. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. Optical Disks (E.g. CD and DVD for data storage) Optical Disks are circular disks that are red by a laser. CDROM stands for Compact disk – read only memory. A CD-ROM can only be read. The user cannot write to a CD-ROM. The storage capacity of a CD is around 700MB. DVD stands for digital versatile disk. A DVD hold around 4+GB of information. Again DVD-ROMs can only be read. The user cannot write to them. The larger storage capacity makes DVDs more useful for storing games and movies. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. - Magnetic Media (e.g. internal and external hard disk drives (HDD), tape). Magnetic media uses different patterns of magnetisation in a magnetisable material to store data and is a form of non-volatile memory. The information is accessed using one or more read/write heads. Examples of magnetic media are Hard Drives and Magnetic Tape. These devices can typically store lots of information with capacities of 500GB or more being quite typical. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. Solid State Drives (SSD) A solid state hard drive (also known as a solid-state disk though it contains no actual disk, nor a drive motor to spin a disk) is a data storage device that uses integrated circuit assemblies as memory to store data persistently. SSD drives have begun to replace traditional magnetic hard drives because they are more reliable and don’t need to spin a platter or use a head reader. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. Memory Cards i.e. Flash memory devices. Memory cards are portable storage devices. This means they can be carried around easily. Lots of portable devices such as mobile phones and cameras rely on this type of storage device. Memory cards come in different formats. The one below is an SD format. Compact flash is another one. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. - Network Devices A network is a collection of 2 or more computers linked together. In order to allow computers to talk to one another, the following devices are needed. Router - This device forwards data packets between computer networks. A router is connected to two or more data lines from different networks When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination Modem – Modem stands for modulator/demodulator. This device converts signals to encode digital information and demodulates signals to decode the transmitted information. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 4. Explain the features and purposes of the following devices:123 Oldham Road, Royton, Oldham, OL1 8NN - Storage and Connectivity Devices i.e. - Cloud Storage Cloud storage is the idea of storing information online in a remote location rather than on individual storage devices. Cloud storage means that provided you have internet access and have logged into your account, you are able to access your files and documents wherever you are in the world. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Movement Puff-sip switch. This kind of switch is excellent for someone with limited physically mobility. The puff-sip switch tube is Oldhamor Road, Royton, Oldham, OL1 8NN placed in the mouth, as the person123sips blows, a switch connected at the other end goes off or on. The switch itself is then connected to the computer. Specific software running on the computer can take this input and act on it in any number of ways. 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Movement A foot mouse / control can be used by a person who has limited or no use of their hands or arms. The foot mouse can 123 Oldham Road, Royton, Oldham, OL1 8NN be used to navigate through software programs and select things in much the same way as a conventional mouse. The link below is set to search on Amazon so you can see the kind of products there are available HERE. Most foot mice consist of two segments. One segment will be used to control the cursor, the second segment is used to click the mouse or to select shortcuts. Most foot mice include straps that help to hold the device in place on the foot during use. A long cable runs from the mouse and plugs into the computer via a USB port. 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Movement The Eye Typer. This can be used by people who cannot use a hand or foot operated mouse and a conventional keyboard. A camera is mounted onto the computer and it is set to focus on the user's 123 Oldham Road, Royton, Oldham, OL1 8NNeye. The camera determines where the user is looking and monitors movements made by the eye .Mouse clicks are done with a slow eye blink. 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Movement Predictive text and sticky keys Predictive text (software) 123 Oldham Road, Royton, Oldham, OL1 8NN This is an input technology which is most commonly found on mobile phones and tablet computers. The technology allows words to be entered by a single or a few key presses. Instead of having to type out the whole word, the software tries to predict the most likely word that you want. Predictive text allows you to type faster and also to reduce the number of keystrokes or key presses that you make, thus helping people who have difficulties typing. It can be very frustrating though when it keeps predicting the wrong word, so it is useful to know how to switch it off on the device you are using. Sticky Keys (software) Sticky keys is a feature available with most computers. It is an accessibility feature to aid users who have physical disabilities. Sticky keys allows the user to press a 'modifier' key such as Shift, Ctrl, Alt and have it remain active until another key is pressed. When sticky keys is activated in Windows, a beep is sounded whenever the Shift, Ctrl or Alt keys are pressed. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Sight Braille is a writing system for blind and visually impaired people. It is made up of raised dots that can be 'read' by touch. A Braille keyboard is a specialist input device that allows user to 123 Oldham Road, Royton, Oldham, the OL1 8NN type and enter text or instructions for the computer in Braille. The image shows a Bluetooth powered Braille keyboard that can connect to a computer, smartphone or tablet (if they are Bluetooth enabled). A braille display is a piece of equipment that connects to the computer. It reads the screen text and presents it to the user via a refreshable Braille display. A Braille printer operates by embossing raised braille dots onto braille paper. Pins are pressed into one side of the paper in order to create raised dots on the other side of the paper. 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Sight Speakers can be useful for visually impaired people in terms of text-to-speech systems. The text-to-speech system takes in text as input and then outputs speech to a set of speakers. There are a number of text to speech software 123 Oldham Road, Royton, Oldham, OL1 8NN programs that enable any text on the screen to be selected with the keyboard or mouse. It is then spoken back to the user in a computer generated voice. The computer generated voice can sound disjointed and sometimes pronunciation can make the output difficult to understand. The new e-book devices such as the Kindle can also speak out the book being read. Microphone A microphone can be useful for people who find it difficult to use a keyboard or mouse. The person speaks their input clearly and specialist software is then used to convert the speech or commands into text or other actions. 1. Learning Outcome 1: Understand how ICT can be used to meet business needs - Sight. Zoom tool (software) 123 Oldham Road, Royton, Many software applications have the facility to allow you to zoom in Oldham, closerOL1 on8NN the work being displayed on the screen. Typically, you can choose to zoom in at different magnifications from 100% to around 500%. This can be useful for people with poor eyesight. There are also specific commercial applications that are designed to help with visual impairment. Tablet computers also allow you to magnify part of the screen with a certain gesture of the fingers (the specific gesture needed varies on the tablet computer brand). Screen magnifier (hardware) Another option that can be used to help people with visual impairment is a hardware screen magnifier. The one shown above can magnify the video feed from a standard display and can also magnify paper documents placed below the video camera input. Sheet Music display This device and software application can display music notation in a size that is useful for partially signted musicians. The background / foreground colours can be selected for maximum contrast 1. Learning Outcome 1: Understand how ICT can be used to meet business needs Modern operating system allow many adjustments to be made to make the computer a bit simpler to use given some specific difficulties. For example, see the options provided in Windows opposite. 123 Oldham Road, 'Ease Royton, Oldham, OL1 8NN You will find these under Control Panel Personalisation, of Access Center'' option. The operating system helps with Visual assistance For poor eyesight - by making text larger and optimising the clarity of the text or for complete blindness allow for using the computer without a display. Hearing assistance You can choose to use text or visual warnings instead of the usual alarm sounds. Motor assistance You can select the sensitivity of the mouse or use a different pointing device. For typing, the behaviour of the keyboard can be adjusted. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 6. How might the choice of a computer system be affected by a) Cost 123 Oldham Road, Royton, Oldham, OL1 8NN Faster computer processors and more memory cost more money. The faster they are the quicker the computer system will run. Many people will have a budget for a computer system and they will have to choose the system parts based on this budget. b) Availability Sometimes the parts you need in a computer system might be in short supply or have sold out. Therefore, you will need to consider this when buying a computer system. c) User Needs The computer system you purchase will depend on your needs as a user. If you wish to play 3D games that rely on graphics, a faster processor, more memory and a dedicated graphics card will be needed or the system will run very slowly. d) Data Security The need to consider data security may be important when selecting a computer system. If you are using the system to store customers’ details, security will be a high concern and you will need to ensure the system is secure enough. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 7. Explain the different methods below of connecting peripherals to a computer system a) Wired Methods (e.g. USB and Firewire) 123 Oldham Road, Royton, Oldham, OL1 8NN Peripherals (such as printers, mice, keyboards etc) can be connected to a computer system using wires. These connections usually take the form of a USB connector or sometimes a firewire connector. The connectors are used on many devices as standard . Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 7. Explain the different methods below of connecting peripherals to a computer system b) Wireless Methods (WIFI, Bluetooth, Infra – Red) 123 Oldham Road, Royton, Oldham, OL1 8NN Peripherals can connect to systems without wires. Bluetooth is a type of radio communication and networking protocol combined. It was developed so devices close to one another could exchange data, without any need for a physical connection. By close, we mean within about 10 metres of one another even if there is a wall in-between. This means it is possible to have 'hands-free' phone conversations in the car whilst driving because the car is fitted with bluetooth technology. A great boon to safety, as there were many road accidents caused by distracted drivers before the law on mobile phones changed and the introduction of Bluetooth into new cars. Wi-Fi is a communication technology that makes use of radio waves in order to connect to a local area network. It is also widely used to connect to the internet from a laptop or smart phone whilst out and about. The word Wi-Fi is actually a trade name owned by the Wi-Fi alliance. The alliance is a group of about 300 companies from around the world. They work together to make sure that all 'WiFi' enabled devices are compatible with one another. All laptops have Wi-Fi built in. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 7. Explain the different methods below of connecting peripherals to a computer system b) Wireless Methods (WIFI, Bluetooth, Infra – Red) 123 Oldham Road, Royton, Oldham, OL1 8NN An IR remote control (the transmitter) sends out pulses of infrared light that represent specific binary codes. These binary codes correspond to commands, such as Power On/Off and Volume Up. The IR receiver in the TV, stereo or other device decodes the pulses of light into the binary data (ones and zeroes) that the device's microprocessor can understand. The microprocessor then carries out the corresponding command. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 8. Explain how you would connect a computing device to an existing wireless network. 123 Oldham Road, Royton, Oldham, OL1 8NN In order to get onto a network wirelessly, you will need to know the name of the network. The network name is sometimes referred to as the Service Set Identifier(SSID). On your computer/device you would then need to make sure that WiFi is enabled and search for networks in your location. Once you have scanned for networks, look for the SSID of the network you want to connect to and click on this. You will then be asked for a security key. This might be known as a WEP or WPA wireless key. Type the key in and click connect. If your computer system is using a firewall, you will need to configure this to allow you to connect to the internet without being blocked. Go Back 1. Learning Outcome 1: Understand how ICT can be used to meet business needs 9. Explain how organisations use the following technologies to track and monitor employees Organisations can keep track of employees in a number of ways using technology. The first is through the use of Global Positioning System or GPS. GPS is a space-based satellite 123 Oldham Road, Royton, Oldham, OL1 8NN navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites by a GPS device. Employees maybe given mobile phones or tablets that contain GPS trackers. The employer can then quickly look up the whereabouts of the employee and know how far they are from work/customers etc. Delivery companies are using this technology to allow their drivers to be tracked by customers too. Some organisations will use IT to check the usage of the internet. A workers browsing history can be logged and the number of hours used can be monitored. Some workers are given key cards to sign into and out of buildings. The key card can show when you arrived to work and when you left work. Lastly, some workers have their communication monitored. For example, in a call centre phone calls are recorded to check that employees are giving customers the correct advice.. Email can be monitored too through IT software to ensure communications are not being sent with swearwords. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data 123 Oldham Road, Royton, Oldham, OL1 8NN Organisations can collect data in a number of different ways. The first is by use of a form. The form could be online or paper based. The form should ask relevant questions and allow users to fill it in without wasting time. Use of drop down menus or radio buttons make an online form easier to fill in. Paper forms should provide individual boxes per letter so that the information can be easily read. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data Sometimes organisations use automated data capture systems to collect data. One such system involves the use of sensors to collect data. Control System sensors will monitor certain physical properties (i.e. heat /movement etc) and then react accordingly. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data Bar code readers are used in supermarket readers to collect data about the product being sold. This information is looked up on the Supermarket’s database and information about product can be found (such as price, amount in stock, description etc) The system can then monitor stock being held by the supermarket and place orders automatically when stock gets low. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data Radio Frequency Identification Device (RFID) RFID is coming into increasing use in industry as an alternative to the bar code. The advantage of RFID is that it does not require direct contact or line-of-sight scanning. An RFID system consists of three components: an antenna and transceiver (often combined into one reader) and a transponder (the tag). The antenna uses radio frequency waves to transmit a signal that activates the transponder. When activated, the tag transmits data back to the antenna. The data is used to notify a programmable logic controller that an action should occur Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 1) Explain the following ways in which an organisation can capture (collect) data Near field communication (NFC) is a set of ideas and technology that enables smartphones and other devices to establish radio communication with each other by touching them together or bringing them into proximity, typically a distance of 10 cm (3.9 in) or less Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 2) Explain how the following factors can affect how data is captured. a) Cost. 123 Oldham Road, Royton, Oldham, OL1 8NN Some technologies are more expensive than other technologies to install and run. A bar code reader and the E.P.O.S system requires an organisation to buy the technology in the first place. This might be too expensive for some organisations even though it would save money in the long term b) Availability Some technologies may not be readily available in certain industries. For example, If you are working underwater, it may not be possible to find waterproof RFID tags that work. c) Ease of Use Some technologies are easier to use than others. Sometimes staff may need to be trained to use the new technology which might be expensive or not always possible. d) Data Security If a business is using sensitive data it is important that the technology doesn’t allow others to read the data Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 3) Explain how data capture forms should be designed to obtain specific information 123 Oldham Road, Royton, Oldham, OL1 8NN Data capture forms should aim to capture data quickly, efficiently and accurately as possible. Using individual boxes for letters will help eliminate data inputting errors. Care should be take to include enough boxes for each field. Clear instructions should also be given to help the user fill out the form. Do not ask irrelevant questions in your form. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 4) What is meant by coding when capturing data on a computer? How is this useful? 123 Oldham Road, Royton, Oldham, OL1 8NN Some data can be coded or shortened when entering into a database. For example in a database collecting information about people’s favourite films, coding could be used to shorten film types. e.g. Comedy Co Sports -> Sp Coding helps prevent data being entered inaccurately as there are less chances to type errors if there are fewer letters. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 5) Explain Data Validation methods. How are these used to ensure accurate data is collected? 123 Oldham Road, Royton, Oldham, OL1 8NN Validation is an automatic computer check to ensure that the data entered is sensible and reasonable. It does not check the accuracy of data. Validation takes place when data is being entered into a database. There are 3 basic types of validation you need to be aware of:Format Check The data is checked to see if it conforms to a certain format. E.g. Is it a date? dd/mm/yyyy Presence Check Data is checked to see if it has been entered (or is present) Range Check Data is checked to see if it falls between a certain range. (0-100 for Go Back example) 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 7) Explain what file formats are when storing data. File formats are the different types of file that exist on a computer system. 123 Oldham Road, Royton, Oldham, OL1 8NN Different programs create different types of files and their endings (or suffixes) tell us about the program that created that file 8) What is a proprietary file format? A file format which is used by a single organisation or entity, and which is not compatible with other formats. For example, files ending in .doc are proprietary Microsoft Word documents. 9) Which files use the following formats? a) .doc b) .xls c) .ppt d). Fla e) .wma g) .aac - Microsoft Word - Microsoft Excel - Microsoft Powerpoint - Flash file - Windows Media Player - Apple iTunes Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 10) What is an open format? 123 Oldham Road, Royton, Oldham, OL1 8NN Open file formats are also called free file formats and are not limited by any copyrights, patents, trademarks. Anyone can use them and they can be opened by different software packages. 11) Which types of files used the following format? a) .rtf b) . Pdf c) . Csv d) .exe e) .txt f) .mp3 g) .wav -rich text file - portable document format - comma separated values - executable file - text file - music file (compressed) - music file Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 12) What is local and removable storage? 123 Oldham Road, Royton, Oldham, OL1 8NN Local storage is storage that is built into the computer system and cannot be easily removed and taken with you. An example might be the built in hard drive in your computer. Removable storage can be plugged in and taken away. It is portable. An example might be a USB Flash Drive. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 13) What is meant by remote storage? a) Offsite location 123 Oldham Road, Royton, Oldham, OL1 8NN Storing information away from your geographical location. Some companies will store information locally (ie. On site) and also offsite at another location or series of locations. If anything happened to the local building, information would be ok as it is stored offsite. b) Cloud Storage Cloud storage is the idea of storing information and data online, using the internet. Microsoft Office 365 now allows you to save your work on Microsoft Servers rather than on your own computer. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 14) Explain relevant network and computer security measures that should be used when storing data? a) Usernames/Passwords Networks can be protected by using logins. Each user is given a login name and password which they must enter before gaining access to the network. Password should be at least 8 characters long, contain text and numbers, upper and lowercase characters and should never be written down. a) Access Rights/Permissions Another way of protecting networks is to ensure that different people in the organisation have different levels of access. If all you are doing is entering data onto a system, there is no need for you to be able to install and remove programs for example. Systems can be set up to ensure that each user has only the permissions they need to do their job and nothing more. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 15) Explain the relevant document security measures that could be used when storing documents a) Passwords 123 Oldham Road, Royton, Oldham, OL1 8NN Documents can have passwords placed on them so that other users can’t access the document without knowing the password. b) Other ways to restrict access to editing of content Documents can be saved as read only. Other others are able to read these documents by are not able to edit them without a password. c) How and why data is encrypted. Data can be encrypted when it is saved. This means that the data is turned into a code that cannot be read unless the reader decrypts the document. In order to do this, an encryption key is required. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 16) Explain physical security measures that could be used to prevent data loss 123 Oldham Road, Royton, Oldham, OL1 8NN a) Locks Putting locks on the door into an office can prevent theft or unauthorised entry into the computer area. b) Bars on windows Putting bars on the windows of an office will make theft more difficult for potential burglars. c) Site computer suites on higher floors If computers are placed on higher floors, theft becomes much more difficult Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 17) What is the difference between wired and wireless technologies for transferring data? 123 Oldham Road, Royton, Oldham, OL1 8NN Wired technologies typically use an ethernet cable to transfer data. Wireless technology relies on a WiFi card and Router to pass information. 18) What are the differences between 3g and 4g data transfers in mobile phone technology? 3g and 4g stand for 3rd generation and 4th generation and relate to the speed at which data is transferred on mobile phone networks. Generally speaking 4g is a lot faster than 3g and is better for transferring larger video files. 4g networks are being rolled out in the UK and this technology costs more money than the 3g equivalent. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 19) How is data transferred remotely? - email 123 Oldham Road, Royton, Oldham, OL1 8NN People use email to send messages and files from one location to another. Email is easy to set up and quick to use. - internet/cloud Data can be transferred by making use of the cloud. For example a photographer may take wedding pictures and upload these online for his/her clients to view. - peer to peer file sharing Peer-to-peer (P2P) file sharing is a method of networked file transfer that relies upon multiple peers (computers). This differs from traditional networks which use a central server to maintain and serve files. Each peer hosts all or part of a file and shares in the transfer load when a new peer connects to download it. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 20) How is data that is being transferred kept secure? Data that is being transferred is often encrypted. This means that OL1 it is 123 Oldham Road, Royton, Oldham, 8NN changed into a code and then decrypted at the other end using an encryption key. If anyone intercepts the data, it is useless without the encryption key. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 21) When thinking about transferring data, how do the following factors influence your decision? 123 Oldham Road, Royton, Oldham, OL1 8NN a) File Size Larger file sizes will take longer to transfer than smaller files sizes. Therefore, you must think about that when transferring data. Some email systems have limits at to the file size they will send also, so email may well not be an option. b) Transfer Speed The speed of your internet connection maybe an issue when transferring data. If your internet connection is slow, the transfer speed could take too long to be useful. 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 21) When thinking about transferring data, how do the following factors influence your decision? c)Future – Proofing 123 Oldham Road, Royton, Oldham, OL1 8NN Technologies can become obsolete (or no longer used or needed) Before thinking about how you will transfer data, you might need to think about whether the technology will still be being used in the next 1,2,5 years. b) Data Security Data security is important when considering transferring data as organisations won’t want unauthorised individuals intercepting data. This could be embarrassing or cost the organisation a lot of money. c) User Needs You will also need to consider how the user needs the information you are sending them. For example, a photographer’s clients would not want individual photographs sent to them by email as this would take a long time to view them opening emails one at a time. The cloud would be a better way of sharing this data so the clients could watch a slideshow of photographs. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 28) Explain how bandwidth and router technology affect the transfer of data Data transfer is affected by the speed of your Routers 123 hardware. Oldham Road, Royton, Oldham, have OL1 8NNa maximum transfer speed as does the bandwidth provided by your Internet Service Provider (ISP). The smaller the bandwidth, the slower the connection to the internet when transferring data. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 29) Explain how important the following factors are when backing up data? 123 Oldham Road, Royton, Oldham, OL1 8NN a) The choice of media. (e.g. removable devices, remote storage) When backing up data a decision needs to be made as to what media you will use to do this. Will the media be kept off-site? What is the capacity of the media? Do you have enough capacity in your choice of media to regularly back up files? b) Back up frequency You will also need to consider how often you back up files. This will depend on the work your business does and how much data it generates on a daily,weekly or monthly basis. 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 29) Explain how important the following factors are when backing up data? 123 Oldham Road, Royton, Oldham, OL1 8NN c)Archiving Data archiving is the process of moving data that is no longer actively used to a separate data storage device to keep for the long term. Businesses often have to decide how often they will archive their data. Some industries require you to keep records going back so many years even if you are not using them currently. d) Automated vs manual systems Some companies automate their systems of backing up data. For example, data back up maybe run once a week automatically. This might slow the computer systems down and may not suit the business so a manual system might be used instead. Go Back 2. Learning Outcome 2: Know how to work with information and data to meet specified business needs 30) Explain how the following factors may well influence your choice of back up? a) Cost 123 Oldham Road, Royton, Oldham, OL1 8NN Different backup systems cost different amounts of money. A business needs to consider the cost of each one and the benefits it would receive from using each one. b) Availability Some back up systems are not applicable to all businesses. A business might wish to automate its back up systems but this might not be possible because of the type of work the business does. c) Ease of Use A business needs to consider how easy it will be to back up data. Some users may require training or assistance. This would need to be carefully considered. d) Data Security When backing up information a business needs to sure that data will not end up Go Back being seen by unauthorised people. 3. Learning Outcome 3: Know how ICT can be used to support business working practices 1) Explain the following remote ways in which businesses can communicate with employees and others a) SMS- Short Messaging Service (Text message) Employees can text information to managers using this service. b) Instant Messaging – Some organisations may use instant messaging software to allow employees to communicate with one another across different locations. c) E-Mail – Most organisations use e-mail as a fast way of communicating between employees. d) Chat Rooms – A chat room allows employees to meet virtually and discuss issues and solutions. e) Forums – A forum is a place where employees can post problems and questions and other employees can post replies. f) Bulletin Boards – A bulletin board is similar to a forum. Go Back 3. Learning Outcome 3: Know how ICT can be used to support business working practices 1) Explain the following remote ways in which businesses can communicate with employees and others 123 Oldham Road, Royton, Oldham, OL1 8NN h) Voice-over IP (VOIP) – A service like Skype where users can talk to one another via a computer network i) Video Conferencing – Using computer technology to link up with other users online. Usually a webcam and microphone are used. j) Webcams- See above. k) Blogs – Some organisation use blogs to help sell their products and services to customers online. l) Social Networking – Twitter, Facebook, Youtube and other social networks allow organisations to keep in contact with their customers and sell them new products/services. 3. Learning Outcome 3: Know how ICT can be used to support business working practices 2) Explain what is meant by appropriate use of communication tools in an organisation Employees working for an organisation may well be asked to keep to the Oldham Road,means Royton, Oldham, 8NN must organisation’s acceptable user ICT policy. This123generally thatOL1 they use the internet (and other communication tools) for work related business only. Users must also use appropriate etiquette when using tools. Therefore emails must be completed in the appropriate manner with the subject,cc,bcc fields filled in. Go Back 3. Learning Outcome 3: Know how ICT can be used to support business working practices 3) Explain what is meant by diary management softwar Diary management software is used by organisations to help organise staff. software often runs across different devices (PC, Laptop, Smartphone, Tab and allows users to:123 Oldham Road, Royton, Oldham, OL1 8NN Create appointments/meetings Invite other colleagues to meetings Create Tasks Create To-Do lists Set Reminders Go Back 3. Learning Outcome 3: Know how ICT can be used to support business working practices 4) Explain how documents can be created and edited collaboratively Within organisations, people often work together to complete projects and tasks. Documents can be 123 Oldham Road, Royton, Oldham, OL1 8NN created and edited collaboratively in the following ways:• Documents can be placed in shared locations so that everyone can access them. This might be a cloud based service or a network shared area • Some software allows documents to have comments inserted. This is useful for a manager to make comments on work done by a team • Track changes can be used to show the various versions of a document as various people have added their parts. Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 1) Explain how laws (legislation) affect computer users in terms of:- a) Health and Safety The Health and Safety at Work Act and the Display Screen Regulations Act are two laws that affect computer users. The first act dictates that Health and Safety is the responsibility of the employer and the employee. All workers should be properly trained and should abide by this training. Employers should provide a work environment that doesn’t affect the employees health in a harmful way. If you are working at a computer it is reasonable to expect : Regular breaks All wires tired back behind conduit (no tripping hazards) Adjustable chair Blinds on windows Adjustable screen Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 1) Explain how laws (legislation) affect computer users in terms of:- b) Data Protection 123 Oldham Road, Royton, Oldham, OL1 8NN The Data Protection Act is a law that protects the rights of data subjects. It states that for data held by organisations: It should be kept confidential It should not be sold or passed on (without permission from the data subject) It should not be held for longer than is necessary It should be accurate and up-to-date. It should be shared with the data subject (if requested) Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 1) Explain how laws (legislation) affect computer users in terms of:- c) Copyright 123 Oldham Road, Royton, Oldham, OL1 8NN The Copyright, Designs and Patents Act protect the rights of people who create digital content (such as videos, photographs, music etc) If a user wishes to use digital content the user must contact the copyright holder and ask for permission. The copyright holder could ask for copyright details to be acknowledged. Lastly, the copyright holder is entitled to be paid for allowing the image to be used. Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 1) Explain how laws (legislation) affect computer users in terms of:- d) Computer Misuse Act. 123 Oldham Road, Royton, Oldham, OL1 8NN This was passed by Parliament and made three new offences: Accessing computer material without permission, eg looking at someone else's files. Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 2) Explain how moral and ethical issues affect business computer users 123 Oldham Road, Royton, Oldham, OL1 8NN a) Use and abuse of personal and private data If an organisation is keeping data on individuals it would be wrong to abuse this position of trust and leave the data for others to find and possibly exploit. b) Cyberbullying – Cyberbullying is becoming more and more of a serious problem in the workplace. Every employer has a moral duty to ensure that workers are not being picked on or made to feel bad using company technology. Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 2) Explain how moral and ethical issues affect business computer users c) Monitoring of individuals by organisations through the 123 Oldham Road, Royton, Oldham, OL1 8NN use of:a) Worker monitoring/logging Some organisations monitor workers by issuing them with keycards that they must use to swipe in and swipe out of the workplace. Secondly, they may also track when workers login or logout of the system. b) Cookies A cookie is a piece of code that is placed on your computer when you visit a website. It allows you to be tracked and can be used to help websites advertise certain products to you. Facebook for example tracks your internet habits when you browse the internet using cookies. c) Key logging Key logging software tracks each key press and saves it so that it can be seen later. Sometimes this software is used in Schools but some organisations are using this to keep tabs on workers. 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 2) Explain how moral and ethical issues affect business computer users c) Monitoring of individuals by organisations through the 123 Oldham Road, Royton, Oldham, OL1 8NN use of:d) Worker call monitoring/recording In call centres, employees are often monitored by a team leader who might listen into their phone call conversations and give advice as to how to deal with certain situations. e) Electronic Consumer Surveillance More and more shops are tracking customers through the use of CCTV and loyalty cards. A loyalty card can reveal when you shopped, where you shopped, how much you spent, what your bought and track your buying habits over weeks or months. f) Mobile Phone Triangulation Mobile phones are constantly touching base with the network by sending messages back and forth to towers around the local area. Using this technology, it is possible to work out exactly where a worker might be. Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 3) What are the implications and consequences for organisations of data loss, corruption and theft? a) Legal implications Under the Data Protection Act, any loss of data could result in action from the Information Commissioner. This might result in the organisation being taken to court and heavily fined. b) Impact on customers If customers data were to be taken or lost, customers may well lose confidence in the business. Also, customers may well end up having their identities stolen by fraudsters. c) Impact on employees Employees could end up on disciplinary action if they were responsible for losing data. d) Impact on the organisation Loss of data might end up costing the company money if customers lose confidence. Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 4) What are the main threats to data security in an organisation? Computer Viruses – Self replicating code that causes harm to a computer system 123 Oldham Road, Royton, Oldham, OL1 8NN Trojans - A trojan seems to do an useful task and so the user will use it. But in the background, the trojan is also carrying out its real purpose which is hidden and unknown to the user. Worms - A computer worm is a computer program that makes lots of copies of itself, like a computer virus. The main difference between the two is that a computer virus attaches itself to another computer program, but a worm works by itself. Phishing - “Phishing” is a form of Internet fraud where criminals aim to steal valuable information such as credit cards, social security numbers, user IDs and passwords for bank accounts. They set up a fake website which looks identical to a legitimate company such as a bank or insurance company. They then try to trick people into logging into the site and giving their account details and security codes. Spyware - Software designed to collect information about what you are doing on the computer Adware - It is a type of software application that displays adverts of some kind while it is running Hacking – Unauthorised access to a computer system Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 4) What are the main threats to data security in an organisation and how can they be dealt with? Denial Of Service (DOS) attacks - An illegal act, with the intent of disabling a server. 123 Oldham Road, Royton, Oldham, OL1 8NN A server responds to external requests from its network. For example a web server responds to a browser calling for a web page to be delivered from its hard drive. Each request takes a small amount of time and some CPU resources on the server. With a 'Denial of Service' attack, the server is overwhelmed by millions of rogue requests being sent it, effectively using up all its resources and denying normal service for legitimate users. Physical Threats (loss/theft of devices) – Data being stolen or damaged by an act Go Back 4. Learning Outcome 4: Understand how the Legal, Ethical, Safety and Security issues affect how computers should be used 5) What actions can an organisation take to minimise the risks of data theft? A business can act online in ways which reduce the risk of 123 Oldham Road, Royton, Oldham, OL1 8NN identity theft and protect personal security Use Protection Software such as firewalls or anti-virus software, anti spam filters and data encryption to store and transfer data Go Back