Ict Notes - 1-11
Ict Notes - 1-11
Ict Notes - 1-11
1.1. HARDWARE
There are two (2) types of hardware, including internal hardware devices and external
hardware devices.
b) Internal hard disk drive/solid state drive (HDD/SSD) - is where files (text
,photos ,music n videos) and software is stored.
c) Random access memory (RAM) –is an internal chip where date is temporarily
stored when running applications.
Page 1 of 107
1.2. SOFTWARE
b. Linkers- is a computer program that takes one or more object files produced by a
compiler and combines them in a single program that can be run by a computer.
c. Device driver-is software that enables one or more hardware devices to communicate
with the computers operating system.
e. Utilities- utility programs are software that has been designed to carry out specific
tasks on a computer. They help to manage, maintain and control computer resources.
Page 2 of 107
Examples include: antivirus, security, screen savers, backup of files and file
management.
INTERNAL MEMORY
BACKING/SECONDARY
DEVICES
1. INPUT DEVICES-these are devices that are used to enter raw data into the
computer. E.g. mouse ,keyboard, touchscreen
Page 3 of 107
DIFFERENCES BETWEEN RAM AND ROM
RAM ROM
4.allows users to read and write data 4. Contents can only be read. Cannot be
edited
4. OUTPUT DEVICES-These are devices that are used to display information on the
monitor or these are devices that are used to take out information from the computer.
E.g. monitor ,speaker ,projector.
An operating system is system software that manages the general operation of a computer
system.
Operating system are programs that control hardware directly by giving it step by step
instructions that tell the computer what to do.
a. Helps the user to interact with the computer through a user interface.
b. Provides security and prevents unauthorized access to a system.
c. Recognizes the input, storage and output devices connected to a computer.
d. Supervises the loading, running and storage of application programs.
Page 4 of 107
e. Deals with errors that occur in application programs.
f. Helps with saving, organizing, finding and deleting files.
g. Manages computer memory by allocating memory to each task that is carried out in a
computer.
USER INTERFACE
CLI requires a user to type in instructions to choose options from menus and open software.
➢ The user needs to learn a number of commands to carry out basic operations.
➢ All commands need to be typed in, which takes time and can be error prone.
➢ Each command must be typed in using the correct format, spelling and so on.
Page 5 of 107
➢ It is more difficult once commands are entered.
GUI: end-user who doesn’t have any great knowledge of how the computer works.
➢ They usually have a higher specification e.g. (faster processor, more RAM/ROM, a
higher capacity hard disk drive).
➢ The keyboard is separate to the screen and both can be adjusted so the user is less
likely to suffer from backbone or repetitive strain injury (RSI).
➢ They are cheaper to buy, repair or upgrade.
➢ The full sized keyboard and mouse are easier to use compared with the smaller
keyboard used with a laptop.
➢ They are not portable because they are large and consist of separate components.
➢ There are many wires which need to be disconnected when moving the computer and
this takes time.
➢ If office work needs to be done at home then you cannot easily take the PC home, so
you have to spend time copying your files onto removable media.
2. LAPTOPS
Laptop computers are designed to be portable and used while on the move. A
touchpad is typically used instead of a mouse to move the cursor and make selections.
Laptops are often used in public spaces.
Page 6 of 107
➢ They make use of liquid crystal display (LCD) which use less power and are
light weight. This is vital because laptops use rechargeable batteries when
used away from a power supply.
➢ Much smaller and lighter, so it’s easily transportable. It can be used on your
lap when there is no flat surface on which to work on.
➢ They have a battery which enables them to be used when away from the mains
power supply.
3. TABLET COMPUTERS
Tablet computers, called tablets in short, are mobile computers with a display, electric
circuits and a battery in a single thin unit.
Tablet computers are usually equipped with some of the following:
➢ A camera which enables still or video images to be recorded as well as photo-
editing software.
➢ Speakers to output music, sound from video recordings, instructions from GPS
(global positioning systems).
➢ A microphone to record voice for the phone facility, the web and for voice
recognition to enable commands to be issued and to enable speech to be
converted to text for documents /emails.
➢ Handwriting recognition enables a user to write on the touch screen using a
stylus and then convert it to text which can be used in email and documents.
Page 7 of 107
➢ Bluetooth which allows communication between the tablet and peripherals
such as external speakers and other devices.
➢ Ability to use WIFI
➢ The ability to use 3G/4G telephony to access the internet.
4. SMARTPHONES
Smartphone’s have most of the features of a tablet but their small size limits their use of
certain applications. The following shows some of the features of a Smartphone;
➢ Bluetooth
➢ Applications
➢ Video
➢ Sms messaging
➢ Phone calls
➢ Wifi access
➢ 3G/4G telephony
➢ Clock/alarm/calendar/calculator
6. MAINFRAME
Mainframe computer is a term used for a very large, very powerful computer system.
The name comes from the days when the individual components were housed in
large(often room sized).
Uses
The main purpose is to run commercial applications such as banking and insurance
where huge amounts of data need to be processed each day.
The main features of mainframe computers are as follows:
➢ They have several CPU’s.
Page 8 of 107
➢ The have really fast processor speeds.
➢ They can support multiple operating systems.
➢ They have huge internal memories(e.g. several hundred gigabyte of RAM)
➢ They operate using time sharing or batch processing.
➢ They are very expensive to operate and maintain.
Page 9 of 107
c. Safer transport-Cars that can self-park already exist and it is predicted that cars that
drive themselves will be available soon. These could drastically reduce road accidents.
Driverless trains already exist in some countries!
d. Increased Personal safety-Modern home alarm systems use artificial intelligence
software that can tell the difference between the home owners and intruders. The
software automatically alerts the police when intruders are detected.
e. Improved medical care-Robotic surgery assistants are being used to quickly and
accurately pass the correct surgical tools to doctors.
2. BIOMETRICS
Biometrics is whereby parts of a person's body are used for identification purposes.
Three main properties that are used:
a) Finger prints
b) The pattern on the retina
c) The pattern on the iris
Examples:
➢ Fingerprints –used for recording attendance.
-used for access to buildings and rooms.
-used to restrict access to computers and smart phones.
➢ Eye recognition -Eye scans analyse the iris which is the coloured ring that surrounds
the pupil.
➢ Face recognition -This is where the shapes of individual's faces are analysed.
➢ Voice recognition -Pitch, tone and frequency of voices are unique and can be analysed
to identify people.
Page 10 of 107
➢ More secure mobile phones-Mobile phones contain our lives. We used our phones for
everything from social media to shopping online. They need to be as secure as possible
in order to protect the valuable data that they contain.
3. ROBOTICS
There are 4 different types of robots:
a. Manufacturing robots (used to perform repetitive tasks such as welding)
b. Carrier robots (used by the military to carry heavy loads over dangerous terrain)
c. Domestic robots (used in homes to perform cleaning tasks such as vacuuming)
d. Exploration robots (used to visit and send images from places such as Mars)
Some more typical tasks that robots can be used for are described in the table below:
i. Dangerous jobs -E.g. disposing of bombs, spray painting or cleaning up nuclear waste.
ii. Exploring extreme environments-E.g. inside volcanoes, planets or the depths of the
ocean.
iii. Repetitive manufacturing jobs -E.g. production lines, packing and welding etc.
iv. Moving heavy objects -E.g. installing large engines, moving pallets of items etc.
4. QUANTUM CRYPTOGRAPHY
Page 11 of 107
Quantum cryptography (encryption) is an emerging technology that allows messages and data
to be sent with complete privacy.
Note: Encryption is where digital data and files are scrambled so that only authorised people
are allowed to read it. There is a need for encryption and decryption key to open the message.
➢ Unauthorised people attempting to read the data would see illegible nonsense instead
of the real information. This makes the encryption impossible to break.
➢ In quantum cryptography, messages are encrypted using photons. These are tiny
packets of light.
Impacts of Quantum Encryption on everyday life:
➢ Completely secure voting- Securing votes with quantum encryption methods ensures
that they cannot be tampered with or changed.
➢ Completely secure communication-Messages sent by the military often include the
locations of squadrons or special op's teams. Using quantum cryptography to secure the
messages would eliminate the risk of them being read or heard by unauthorised ears.
➢ Completely secure bank transfers-Any electronic transfer of money, such as at ATM's
or buying goods online will be completely secure. Some banks are already using
quantum cryptography for the purposes of securing money transfers.
➢ Completely secure personal information-Health records, bank details and other types
of personal information will be absolutely secure from hackers and other people
wishing to commit identity theft crimes.
Page 12 of 107
• Translation memory software -Translation memory software are databases which store
translated text as the human translator works through it in order to be reused in the
future.
Impacts of Computer Aided Translation on everyday life:
➢ More accurate documents-Spell checkers can quickly scan your word processed
documents and automatically find spelling errors. Miss-spelt words can be quickly
corrected to produce an error-free document.
➢ A more multilingual society-Anyone with an Internet connection can access tools such
as Google Translate and the vast collection of language databases that the tools can
search through.
➢ Quicker and more efficient translations-Foreign visitors to countries can be
communicated with much easier through these CAT tools. They are especially useful
in places like embassies where a wide-range of foreign visitors may need to
communicate with local officials about problems or ask for advice etc.
Page 13 of 107
7. VIRTUAL REALITY
Virtual reality is where computers are used to create an artificial environment that users can
interact with as if it were real.
Equipment needed to create the virtual reality experience includes the following:
a) Eye Goggles -These produce the 3D images that make up the artificial world.
b) Special Gloves –The gloves detect your hand and finger movements which are input
into a computer and processed.
c) Headphones & a Powerful Computer
➢ Improved medical surgeons-Surgeons can be trained using virtual patients. This allows
them to practice over and over until they have perfected a particular surgery without
risk to a real patient.
➢ Larger and stronger buildings-Virtual buildings allow architects to walk around to
experience what the building would look like when completed and check for potential
errors before the actual building is constructed.
➢ More effective treatment of phobias-VR is being used to help patients overcome
phobias and anxieties. People can experience a tame, controlled version of what they
are afraid of. Slowly the person becomes used to the situation and can relax.
➢ Training in dangerous situations-VR can be used for training in dangerous situations
where it is impossible to practice the real thing.
➢ More realistic education-VR can give students the opportunity to learn in a much more
interactive way. For example: Astronomy students can learn about the solar system by
engaging with the objects in the virtual environment. They could look around stars,
move planets and track the orbits of comets.
Page 14 of 107
CHAPTER 2
2.1.INPUT DEVICES
Input devices are hardware devices that allow data to be input into a computer.
1. KEYBOARD
Keyboards are used to input data into application software. E.g. word processed documents,
text into online forms and typing commands to the computer (Ctrl+P).
Advantages
➢ Enables fast entry of new text into a document.
➢ Well tried technology and well known method of entry.
➢ Most people find them easy to use.
➢ Easy to do verification check as data is entered, as it appears on the screen
simultaneously.
Disadvantages
➢ Users with limited arm/wrist use can find keyboards hard to use.
➢ Entering data is slow when compared to direct data entry (e.g. Optical mark
recognition).
➢ They use up desk space as they are quite large.
Concept keyboard
Uses icons or phrases instead of standard letters.
A single key represents an item on the keyboard.
Uses
Used in: Fast food restaurants, offices and shops
Advantages
➢ Enables fast data entry (there is no need to type in whole commands)
➢ Waterproof, useful in a restaurant environment
➢ They are tamperproof, preventing people from keying in information (which could
corrupt the system) .
2. NUMERIC KEYPADS
A numeric keypad is used to enter numbers only.
Although some have function key to allow input of alphabetical characters .
Uses
➢ Used in Automatic teller machines (ATMs), where customers can key in their
personal identification number (PIN), or an amount of money
Page 15 of 107
➢ Used to key in phone numbers into telephones
➢ Electronic point of sale (EPOS) terminals have numeric keypads in case the barcode
reader fails
➢ Used in Chip and PIN devices to key in PIN, or amount of money
➢ Used to enable fast entry of numeric data into a spread sheet
Advantages
➢ Numeric keypads are faster than standard keyboards for entry of numeric data .
➢ Since many are small devices (e.g. mobile phones), they are easy to carry around.
Disadvantages
➢ Can be difficult to use due to the very small keys.
➢ Difficult to use for entering text.
➢ Sometimes the order of the numbers isn’t very intuitive.
3. POINTING DEVICE
Pointing devices are needed to make selections from a graphical user interface.
a. Mouse –the cursor moves in response to the movement of the mouse. The left mouse
button is used to make selections while the right button is used to display a drop-down
menu. A scroll button is used to help move quickly through a long document.
Uses
➢ Used for opening, closing and minimizing software
➢ Used for grouping, moving and deleting files
➢ Useful when editing images (e.g. controlling the size and position of the image)
➢ Used for controlling the position of a pointer on the screen to allow:
o Selection from a menu
o Selecting an icon
o Scrolling up/down and right/left
Advantages
Disadvantages
➢ People with restricted hand/wrist movement can find it hard to operate a mouse
➢ Easily damaged and can easily be clogged up with dirt
➢ They are hard to use if there is no flat surface available
b. Touchpad
Touchpads are used in many laptop computers as a pointing device.
The pointer is controlled by the user moving their finger on the touchpad.
Page 16 of 107
Uses
➢ Used for opening, closing and minimising software
➢ Used for grouping, moving and deleting files
➢ Useful when editing images (e.g. controlling the size and position of the image)
➢ Used for controlling the position of a pointer on the screen to allow:
o Selection from a menu
o Selecting an icon
Advantages
➢ Faster to select an option by a touchpad than a keyboard.
➢ Enables rapid navigation through applications and the internet.
➢ Since the touchpad is integrated into the laptop computer, there is no separate mouse,
aiding portability.
➢ They can be used when no flat surfaces are available.
Disadvantage
➢ People with limited hand/wrist movement can find touchpads hard to use.
➢ It can be more difficult to control the pointer when compared to a mouse.
➢ They are more difficult when doing operations such as ‘drag and drop’.
c. Trackerball
Tracker balls are similar to a mouse except that it has a ball on the top of the device.
Users control the pointer on the screen by rotating the ball
Uses
➢ Have the same pointing/cursor control capability as a mouse.
➢ Used in applications where the user has a disability (RSI).
➢ Used in a control room environment, where it is faster than a mouse to navigate
through process screens and more robust than a mouse.
Advantages
➢ They allow faster navigation compared to a mouse.
➢ People with limited hand/wrist movement find easier to use than a mouse.
➢ The pointer can be positioned more accurately on the screen than with a mouse.
➢ They take less desk space than mice since they are stationary.
Disadvantages
➢ Tracker balls are not supplied with the computer as standard, so they are more
expensive.
➢ User may need training since they are not standard equipment.
4. REMOTE CONTROLS
A remote control is used to control the operation of other devices remotely by using infra-red
signals.
Uses
Page 17 of 107
In home entertainment devices such as Televisions, DVD player/recorder and satellite
system
➢ Used to control multimedia systems.
➢ Used in industrial applications to remotely control processes, stop and start
machinery.
Advantages
➢ Enable devices to be operated from any distance, which is useful for people with
disabilities
➢ Some chemical processes are hazardous, so it is safer to operate equipment from a
distance.
Disadvantages
➢ People with limited hand/wrist movement can find them hard to use.
➢ The signal between the control and the device can be easily blocked.
➢ Needs batteries to operate and they need regular replacement.
5. JOYSTICK
Buttons are used to make selections.
Uses
➢ Video/computer games are often controlled by joysticks
➢ They are used in simulators to mimic actual controls
Advantages
➢ Easier to navigate round a screen compared to a keyboard
➢ They can be used by disabled people because they can be operated by foot,mouth,etc.
Disadvantages
➢ More difficult to control the on-screen pointer with a joystick than with other devices
such as mice
➢ You have to purchase them separately from a computer system.
6. TOUCHSCREENS
Touch screens are displays that can detect the presence and location of a touch to the screen.
User can choose an option by simply touching a button/icon on the screen .
he selection is automatically made without the need for any pointing device.
Use
➢ Used for service tills e.g. petrol stations
➢ Used where selections are made on a screen e.g. ATMs, public information systems,
airports and railway stations
➢ Used in PDA’s
➢ Used in Interactive white boards
➢ Used in computer based training (CBT)
Advantages
Page 18 of 107
➢ Enable faster entry of options than a keyboard or a mouse
➢ Very easy to choose options
➢ User friendly method for inputting data
➢ They are tamperproof, preventing people from keying in information (which could
corrupt the system)
➢ They are ideal where space is limited such as on a smartphone
Disadvantages
➢ There is a limited number of options available.
➢ Using touch screens often can lead to health problems e.g. (straining of arm muscles
and RSI).
➢ The screen can get very dirty with constant touching.
➢ They cost more than input devices such as keyboard.
7. SCANNERS
Scanners can be used to enter information on hardcopy.
Uses
➢ Used to scan in documents and convert them into a format for use in various software
packages
➢ Old and valuable documents and books can be scanned, protecting the original copies
from damage
➢ Non-digital photographs can be scanned for storing on a computer
Advantages
➢ Images can be stored for editing at a later date
➢ Scanners are much faster and more accurate than typing in documents again
➢ It is possible to recover damaged documents and photographs by scanning them and
then using appropriate software to produce an acceptable copy
Disadvantages
➢ The quality can be limited depending on how good the scanner resolution is
➢ They take up a lot of space
➢ It can take long time to digitize all the pages in a long document
8. DIGITAL CAMERAS
Digital cameras store the digital photographs on an internal memory card and display the
picture on a screen.
Pixels- dots making up a digital image.
Resolution-number of pixels used on an image.
Uses
➢ Digital cameras can produce photographs for direct transfer to a computer or to print
out
➢ Digital cameras allow short video clips to be produced
➢ Photographs can be uploaded directly into application software such as word
processor
Page 19 of 107
Advantages
➢ Easier to produce better quality photographs than with a tradition camera
➢ Easier and faster to upload photographs to a computer
➢ There is no need to develop film and print out photographs (saves paper and no longer
needs the chemicals to produce photographs from films)
➢ Easy to delete an image from the memory if it’s not satisfactory
➢ the memory card can store several hundred photographs
➢ Can use software to improve photos.
Disadvantages
➢ The camera user needs to be computer literate to use the camera properly
➢ There is some artistry lost since clever software corrects errors in the photographs
➢ The resolution is not yet as good as traditional cameras
➢ Images often need to be compressed to reduce the amount of memory used
➢ It is possible to fill up computer memory very quickly with several photos of the same
subject(in order to find the perfect snap shot)
9. MICROPHONES
Are input devices that allow sound signals to be converted into data, so that it can be stored
and processed by the computer.
Uses
➢ Microphones are used to input speech/sounds to be used in various applications
➢ They are used in voice recognition software- for conversion of speech into text, and
recognition of commands
Advantages
➢ They are relatively inexpensive.
➢ Faster to read in text than to type it using a keyboard
➢ Possible to manipulate sound in real time using special software
➢ Can improve safety for car phones
Disadvantage
➢ Sound files can use up a lot of computer memory
➢ Voice recognition software isn’t as accurate as typing in manually
➢ Background noises can cause problems with voice recognition systems.
10. SENSORS
A sensor is a device that converts a real-world property (e.g. temperature) into data that a
computer can process. Sensors are devices that measure physical quantities.
Page 20 of 107
Temperature To monitor temperature Automatic washing machines,
central heating systems,
automatic green houses, ovens
Light Used to measure light intensity Automatic doors, street
lighting control , Burglar
alarm systems, automatic
greenhouses
Pressure Pressure (e.g. someone standing on Burglar alarm systems ,
it) robotics, environmental
monitoring , Automatic
washing machines
Advantages
➢ Readings by sensors are more accurate than taken by humans
➢ Readings are continuous, there is no break in monitoring
➢ Because it is a continuous process any necessary action or warning will be initiated
immediately
➢ The system can be automatic, removing the need for human intervention, this is
particularly important if the process is hazardous
Disadvantages
➢ Purchase cost.
➢ Faulty sensors can give spurious results.
➢ Dirt and grease may affect performance.
Advantages
➢ It is possible to modify drawings before they are input
➢ They offer an accurate method of drawing
Page 21 of 107
Disadvantages
➢ They are more expensive than other pointing devices
➢ Requires more desk space
Disadvantages
➢ Can erode privacy as CCTV cameras are present in many public places.
➢ It is very difficult to produce a good video without training.
➢ Can be expensive to buy.
➢ The picture quality is determined by the number of pixels used and this may be low.
Uses
➢ While chatting online webcams can be used to have conversations
➢ Used to enable video conferencing to take place
➢ Allow people to view the traffic in local road systems
Advantages
➢ Can be left on constantly and activated when required
➢ Allow people to keep in contact with each other without the need to travel,
particularly useful for disabled or elderly people
Disadvantages
➢ Webcams have limited features and the picture is often of poor quality
➢ They need to be connected to a computer
Direct data entry devices are devices that read data from a source that’s provided and
transferred it directly to the computer system.
Are used to read data found on magnetic stripes found on the back of cards.
Page 22 of 107
The stripe on the cards holds information such as ; Bank account number, name of the card
holder,expiry date of membership.
Data contained on the card’s stripe is read by pulling the card through the magnetic stripe
reader.This is known as swiping.
USE
Advantages
• Fast data entry compared to keyboard.You just swipe the card through the machine.
• No possibly of data entry errors as there is no typing involved.
• The stripes are not affected by water and robust if dropped.
• Data held on the card cannot be read by eye so bank details.
Disadvantages
• Stripe could become unreadable – scratched and then the data is lost.
• The cards need to be in contact with the reader in order to be used.Does not work at a
distance.
• The magnetic stripe on cards can only hold a small amount of data.
• Magnetic stripes on cards are easily duplicated/copied.
These allow people to pay for goods and services electronically at electronic funds transfer
point of sale(EFTPOS) terminals.
The chip and pin reader works by inserting a credit/debit card into a slot and then entering a
PIN(personal identification number).
USES
Used to make secure payments for goods and services at superrmarkets,restaurants,cafes and
buying petrol.
Page 23 of 107
Advantages
• More secure than magnetic stripe readers as the user needs to know the correct PIN.
• Information contained on the chip is harder to copy than it is to copy magnetic
stripes.
• Chip and pin readers are portable so they can be brought to you.For example waiter in
a restaurant.
• Chip is less likely to be damaged compared to a magnetic swipe.
• Larger amount of information can be stored on the chip.
• Not affected by magnetic fields.
Disadvantages
• It is possible to forget your PIN which means you cannot make payments with your
card.
• People can look over your shoulder as you enter your pin.This makes it possible to
access your money if they stole your card.
• Hidden cameras sometimes are used to see which keys are pressed for the PIN.
RFID reads information stored on tags (small silicon chip that can be placed on a sticker)
using radio waves.
USE
Advantages
• Can read objects from a distance.Tags can be read even without a direct line of sight.
This makes them easier to use.
• Information stored on RFID tags can be read much faster than barcodes.
Page 24 of 107
• RFID tags allows read/write operations to take place.This means that one can add to
or alter information already on the tag.
• Can read biometric readings.The RFID tags can be placed within objects rather than
on their surface.
Disadvantages
Use
Used to process cheques in banking operations – cheque is read using a batch processing
method
• Account number
• Bank/branch sort code
• Cheque number
Advantages
• MICR offers great security than OCR since the oriented characters cannot be altered.
Page 25 of 107
• There is no manual input, thus errors are reduced.
• If somebody writes over the magnetic ink characters it can still be read.
• Cheques can be processed quickly.
Disadvantages
• Only certain characters can be read and the number of different characters is very
limited.
• It is a more expensive method than other methods used for direct data entry.
OCR scans text from hardcopies and converts it into an editable form which can be used and
edited in a range of software including word processors.
USE
Advantages
Disadvantages
Uses
Page 26 of 107
and other types of forms in the form of lines or shaded areas.
Advantages
• Extremely fast way of inputting information into a computer(around 4000 forms can
be read per hour).
• Since there is no typing, it is more accurate than keying in data.
• OMR is more accurate than OCR.
Disadvantages
7.BARCODE READER
• Used in supermarkets and other shops where the goods are marked with a barcode
• Used in libraries to scan users library card and barcodes on books (in order to keep
track of books on loan).
• Used as a safety function in many companies to ensure that electrical equipment is
checked on a regular basis.
Advantages
Page 27 of 107
Disadvantages
Contactless Cards Readers are used by customers to pay for products at thePOS without the
need to enter a PIN Number using RFID technology.
How it works
The payment terminal picks up a signal from the chip to process and complete the transaction
when the card is within a few centimetres distance.
Advantages
• Quicker Transaction meaning less time spent at POS.
• Don’t have to use PIN
• Transaction data (account details) is encrypted.
Disadvantages
• Less secure than chip and pin method.
• Anyone could use card if lost.
• It is easer for thieves to copy details of the card.
• Only small payments can be made.
Page 28 of 107
CHAPTER 3
TOPIC 3.1: STORAGE DEVICES AND MEDIA
STORAGE MEDIA: is the name given to the device that actually holds the data.
STORAGE DEVICE: is the equipment that is used to store the data on the media – eg the
CD writer.
FILE SIZES
Storage devices or files sizes are measured in:
1 byte=8 bits
1 KB=1000 BYTES
1 MB=1000KB
1 GB=1000MB
1 TB=1000GB
TYPES OF ACCESS
1. SERIAL(SEQUENCIAL ACCESS)
• Files are stored one by one in a sequence.
• Must search through the files one by one until you get to the one you want.
Examples: Cassete Tape ,Magnetic tape
2. DIRECT(RANDOM ACCESS)
• Stores files so that they can instantly be accessed.
• No need to search through to get to the files you want.
Examples:DVD,CD ROM,Blu-ray
Page 29 of 107
EXAMPLES
a) MAGNETIC TAPE
– Stores data on a plastic tape coated with a magnetic layer.
– Commonly used for large scale storage especially at the banks' when batch
processing bills and invoices.
Advantages
• Generally, less expensive and very robust technology
• Data transfer rate is fast
Disadvantages
• Access time is very slow
• When updating another tape is needed
EXAMPLES
a) CD/DVD RW(Compact disk/Digital Versatile Disk Rewriteable)
– CD-RWs and DVD-RWs are used to record radio and television programs
– They are used in closed circuit television (CCTV) systems
Advantages
– Can be re used many times
– Different file formats can be used each time
Page 30 of 107
– Less wasteful than R format since files or data can embedded at a later stage
Disadvantages
– Relatively expensive media
– Possible to accidentally overwrite
Page 31 of 107
• Used for storing and playing back high definition films.
Advantage
– Very large storage capacity
– Data transfer rate is very fast
– Data access speed is faster than with other optical media
Disadvantage
– Disks are relatively expensive
– Blu-ray disks still have encryption problems
EXAMPLES
a) Memory stick
Used to transfer files/backup (work) between computers.
Advantages
• Portable & Small
• Robust
• large capacities
• No need for additional drivers/software
Disadvantages
• Easy to loose
• USB could be damaged if not ejected correctly.
b) Memory cards
Used to store files on digital cameras, mobile phones and mp3 players.
• Very small and can be removed and placed in other devices.
• Robust
Disadvantages
• Smaller storage capacities.
• Quite expensive.
BACKUP
A backup simply means making one or more copies of your data.
For example, if you have a folder of photos stored on the hard-drive of your laptop, you
might back them up by copying them to a CD-R.
Page 32 of 107
• In case your laptop is stolen
• In case your business burns to the ground,
Having a backup copy means that you have not lost your precious data. You can recover your
lost files and continue working.
Page 33 of 107
4.1NETWORKS
• Networks can vary in size, for example:-school networks can consist of only few linked
computers and huge networks can consists of billions of computers.
Page 34 of 107
TYPES OF COMPUTERS FOUND ON A NETWORK
• Servers
• Clients
3. Provides network security by making sure that only people with valid usernames and
passwords can log onto client computers on the network.
Types of servers
1. File servers-gives network users a place to save and load their data files.
4. Proxy servers-used a s a kind of security device between client computers and network.
Page 35 of 107
WHAT IS A CLIENT COMPUTER?
A client computer is an individual computer that is used to perform everyday tasks to access
information and programs from the server.
NETWORK DEVICES
There are seven main devices that are used to build a network.
1. ROUTER
Router is used to connect the LANs together and also connect them to the internet.
• Internet Protocol Address (IP address)-a unique number that is assigned to each
computer connected to the internet.
• Router stores IP addresses in a routing table.
3. NETWORK CABLE
Network cables are plugged into computers wired network interface card and
connects it to the network.
• Cable holds advantages over wireless connections for two reasons:
Page 36 of 107
o Cables can transfer data faster than wireless
o Data transferred over cables is more secure than over wireless(Hackers cant
intercept data easily)
4. HUBS
A hub enables computers on the network to share files, data and resources.
• Broadcasts data passing through it.
• Contains multiple ports
5. SWITCH
Switches connect computers to form a local area network.
• They transmit data around the network more efficiently.
• Learns which devices are connected to which ports.
6. BRIDGE
Bridges are network devices that connect a LAN to another LAN using the same
protocol.
• Can connect different types of networks so that they act as one single LAN and
thus can communicate with each other.
7. MODEMS
Modem stands for ‘Modulator Demodulator’.
A. WI-FI
WiFi is a wireless technology which enables computers and other devices to communicate.
Page 37 of 107
• WiFi has better security than Bluetooth
• WiFi do not necessarily use batteries
• WiFi needs a WiFi adapter, a wireless router and a wireless access point.
• WiFi setup is more complex.
• WiFi range is approx. 100m
B. BLUETOOTH
Bluetooth is a wireless technology used to exchange data over shorter distances.
• Bluetooth/Wifi are both wireless can’t fall over the wires/move around the house
• Saves money (on cables) as both do not require wires.
Page 38 of 107
Web Browser Software-a web browser is a program that allows web pages stored on
the internet to be viewed.
INTERNET
Internet is a huge group of worldwide networks joined together.
INTRANET
An intranet is a private network that is used inside an organisation and makes use of web
pages, browsers and other technology just like internet.
• It is used within school with limited resources.
PURPOSE OF AN INTRANET
➢ Private/confidential data stays within a company/organisation/school.
Page 39 of 107
➢ To store relevant/up to date information about the organisation available to workers.
➢ To facilitate communication/collaboration between workers/students/teachers.
➢ Make it easier to access company specific applications.
➢ Restrict access to certain sites of the internet/regulate access to the internet.
➢ Restrict access for certain employees.
INTERNET INTRANET
Internet stands for INTERnational Intranet stands for INTernal Restricted
NETwork Access NETwork.
Contains information about everything. Contains only information concerning a
particular organisation that has set it up.
Can be used by anyone. Only used by the employees of a particular
organisation.
It is difficult to block sites. Simple to block certain websites using a
proxy server.
TYPES OF NETWORKS
LAN WAN
a. LAN is confined to a very small area. WAN covers wide geographical areas.
E.g. Between cities, countries and even
continents.
b. Usually located in a single building. Usually located between many buildings and
countries.
c. Uses cables, wireless, infra-red which are It uses wireless, satellite links, which are
usually owned by the organisation. globally organised.
Page 40 of 107
d. Less expensive to build as equipment is owned More expensive to build as complicated
by the organisation which is cheaper than renting communication systems are used involving
lines and equipment. rental of communication lines.
• They provide wireless network communication over very short distances (a few metres)
usually radio or infra-red signals instead of cables.
• Devices known as access points are connected into the wired network, at fixed
locations.
• Because of the limited range, most commercial WLANs need several access points, to
permit uninterrupted wireless communication.
• The access point receives and transmits data between the WLAN and the wired
network structure.
Advantages
• All computers can access the same services and resources. E.g., printers, scanners,
internet access, etc.
• There is no cabling to individual computers and devices so safety is improved.
• The system is more flexible since, users can move their laptops from their desks.
• Adding new computers and devices is a very easy task and costs are reduced, since no
extra cabling is needed.
Disadvantages
• Security is a big issue, since anyone with a WLAN enabled laptop or computer, can
Page 41 of 107
2. Laptop
Page 42 of 107
3. Desktop/Personal computer
Page 43 of 107
• Install anti-virus software.
• Do not open emails from unknown sources.
• Keep anti-virus up-to-.date.
• Do not allow games, videos or movies to be downloaded.
• Do not open file attachments to emails unless they are from a trusted source.
• Always can unknown storage media.
• Do not visit fake websites.
A fake website can be used to distribute viruses. Things to look for if a site is fake:
• Fake sites are often incomplete which means not all the links work, so check some of
the links.
• Check if the URL is correct.
• Check for mistakes in spelling /grammar.
• Check for padlock symbol and the web address starting with https:// security indicators
before entering personal information. Bogus sites do not have these indicators.
Hackers access a network using the internet. In most cases the hacker will try to guess the
users password or obtain the password another way.
✓ Use anti-spyware
Anti-spyware is special software that you run on your computer which will detect and remove
any spyware programs that have been put on your computer without your knowledge.
Page 44 of 107
1. USER-ID
A user-id is a name or number that is used to identify a certain user to the network. It
is also used by the network to give the user access to certain files.
2. PASSWORDS
A password is a string of characters (letters, numbers, punctuation marks and other
symbols) that the user can select.
AUTHENTICATION TECHNIQUES
1) BIOMETRIC SYSTEMS
• Retinal scanning uses unique pattern on the back of the eye to recognize a
person.
• Fingerprint scanning uses the unique pattern on a person’s finger to identify
them.
• Face recognition
• Iris scanning uses the coloured area of the eye surrounding the pupil for
identification.
•
2) ID CARDS
ID cards are small credit card sized cards used to verify a person’s identity.
3) ENCRYPTION
Encryption is the process of scrambling files before they are sent over a network to protect
them from hackers.
• It requires the encryption and decryption key.
Page 45 of 107
• Sending data between computers.
A data protection act is a law that protects individuals by placing obligations on the
organizations who collect and process the data.
PERSONAL DATA -data about a living identifiable person which is specific to that person.
Examples: date of birth, age, medical records, religion, political beliefs, criminal record and
address.
1. PHYSICAL FAXING
A dedicated machine connected to a telephone line; requires the number of the
recipient to be dialed before the document is scanned and then sent.
2. ELECTRONIC FAXING
It uses internet technology to send a fax.
3. EMAIL
An email is an electronic message from one communication device (computer,
telephone, mobile phone or tablet) to another.
Page 46 of 107
Advantages of using an email compared to faxing
Disadvantages
• Possibility of virus threats and hacking.
• Need for the email address to be correct.
• Inability to send bulky objects via emails.
4. VIDEO-CONFERENCING
Video conferencing is the use of telecommunication technologies e.g internet to allow people
in two or more locations to communicate.
• Allows long distance communication
• Using simultaneous two-way communication
• Uses video and audio transmissions/streaming
• They are also able to exchange electronic files with each other and also pass electronic
documents around rather than paper based documents.
• If meetings need to be conducted between people in different countries, a WAN is used
such as the internet.
• Desktop video conferencing, in addition to PC, includes video compression card, sound
card, microphone, web camera and special software.
5. WEB-CONFERENCING
Page 47 of 107
Web conferencing (sometimes called a webinar) uses a stable internet connection and remote
computers with microphones and webcams to allow real-time conferencing to take place.
6. AUDIO-CONFERENCING
Audio-conferencing (sometimes called a conference call) uses a telephone call that allows a
caller to talk to several people at the same time.
POLICING INTERNET
Page 48 of 107
CHAPTER 5
ICT has had many effects upon our lives for the better and for the worse. The same goes for
employment.
Workers jobs that have been replaced and increased by computers include;
REDUCTION OF EMPLOYMENT
• Payroll workers
• Typing pools
• Car production workers
• Checkout operators
• Bank workers
INCREASE IN EMPLOYMENT
- Network managers/technicians
- Website designers
- Computer programmers
- Computer engineers
Page 49 of 107
5.2 THE EFFECTS OF IT ON WORKING PATTERNS
Flexible hours When employees work the full normal hours Five days a week, eight hours a day,
in a week but work at times which suit them 4PM to 12AM
and the employer.
Job-sharing Two or more employees doing the same job Five days a week, 20 hours each
but working at different times. worker
Worker 1: 9AM to 5PM, Monday to
Tuesday, 9AM to 1PM Wednesday
Worker 2: 1PM to 5PM,
Wednesday, 9AM to 5PM Thursday
to Friday
Compressed When an employee works the full normal Four days a week, ten hours a day,
hours hours in a week but works fewer days. 8 AM to 7PM
ANALOGUE DATA- values that change very smoothly. They are continuous.
DIGITAL DATA- jumps from one value to the next in a step by step sequence.
Page 50 of 107
• Can encourage a healthy lifestyle because of smart fridges analysing food
ingredients and also re-orders stock automatically.
• Do not have to leave home to get fit.
• Burglar alarm provides a sense of security.
• Smart washing machines stop washes if incorrect materials present in the wash.
• If new materials are produced then the washing machine can analyse the materials
and tell you the correct dose of powder.
• If you want to watch up to date films then TV can connect to the internet.
Page 51 of 107
than the elbow, top of monitor at
eye level).
• Take regular breaks: get up, walk
around, and stretch your muscles.
Repetitive Strain typing and using a • Use a wrist-rest to support the wrists
Injury (RSI) in mouse for long periods while typing and when using the
Wrists and mouse.
Hands • Take regular breaks from typing or
using the mouse.
• Maintain correct posture.
Headaches Incorrect lighting, screen • Use an anti-glare screen.
reflections, flickering • Take regular breaks.
screens.
Page 52 of 107
TOPIC 6.1:COMMUNICATION APPLICATIONS
TOPIC 6.2:DATA HANDLING APPLICATIONS
TOPIC 6.3.MEASUREMENT APLICATIONS
TOPIC 6.4:MICROPROCESSORS IN CONTROL
APPLICATIONS
Microprocessors (aka Micro-controllers) are tiny computers embedded in household items,
such as televisions, washing machines, burglar alarms and greenhouses.
TURTLE GRAPHICS
This is based on the computer language called LOGO and is now usually known as turtle
graphics.
EXAMPLE
50
Starting
position 30
30
15
Page 53 of 107
FORWARD 50 FORWARD 30
RIGHT 90 LEFT 90
FORWARD 30 FORWARD 15
RIGHT 90
2. AUTOMATIC COOKERS
They can be used to cook a variety of meals and foods, including:
• Slow-cooked stews
• Pies, Pastries and Bread
• Rice
Inputs
➢ The cookers have temperature sensors to detect when the cooker has reached
the desired temperature
Output
➢ The cookers turn on and off the heating elements
➢ The cookers often also output a sound or tune when the food has finished
cooking
Preset Values
➢ The cooking temperature
➢ The programme type ( what type of meal is being cooked)
➢ Start time / delay so food only starts cooking at a certain time.
Page 54 of 107
3. COMPUTER CONTROLLED HEATING SYSTEMS
Heat sensor measures the current temperature and sends this data to the computer
where the analogue data is changed to digital data using the analogue to digital
converter. The computer will compare the sensor heat data against the pre-set value
stored in its memory. If the heat is high the heating is switched off else switched off.
4. BURGLAR ALARMS
Infra-red sensor detects movement when the sensor is broken and this information is
sent to the computer where the analogue data is changed to digital data using the
analogue to digital converter. Computer makes the decision to switch on the alarm.
The output is that the alarm is activated.
Inputs
• Temperature sensors
• Soil moisture level sensors
• Humidity Sensors
Outputs
• Motors to open and close the windows to the glass house in order to control the
temperature
• Motors to pump water from storage containers into the soil to water the plants
Page 55 of 107
TOPIC 6.5:MODELLING APPLICATIONS
A computer model tries to simulate something in the real world.
• Cheaper -Modeling a situation is often much cheaper than carrying out the task for real.
For example, architects can make and solve design errors on simulated buildings rather
than waiting until the real thing is constructed before realizing.
• Safer - Flight simulators mimic the skills needed to fly a plane. Novice pilots
are likely to crash the plane whilst they are learning. This could be fatal if piloting a real
aircraft. If a simulated plane is crashed, they just reload the simulation and try again.
• Saves Time -Simulations can produce results faster than the real thing. For
example, global warming models can predict the temperature of the earth in 50 years
time without actually having to wait that long.
Page 56 of 107
DISADVANTAGES OF USING COMPUTER MODELS
• Accuracy -Modeling a situation can never perfectly mimic real life. There will always be
some difference between the model and reality.
• Initial Expense -Simulators require sophisticated hardware and software. For example,
high powered processors and lots of RAM. The simulation software (program) can also
be expensive.
• Programmer Error -If the simulation's programmer has made errors whilst creating the
program, the simulation outcomes will be more inaccurate.
Online booking systems use real time processing which allows users to make and confirm
bookings instantly.
Page 57 of 107
➢ A confirmation appears on the screen telling you that the seats/holiday have been
successfully booked.
➢ A confirmation email is sent to you, which in many cases can be printed out as it acts as
your ticket.
ADVANTAGES OF EFT
• You can transfer money between accounts on any device with internet access.
• The transfer of money is fast.
• Funds can be sent to anyone who has a bank account anywhere in the world.
• The transfer is secure as the data is encrypted. Hackers won’t be able to understand the
data.
DISADVANTAGES OF EFT
• There is a danger that hackers could intercept the transfer.
• The charges for the service can be high especially when the accounts are in different
countries.
• A mistake in the entry of one of the very long account numbers could result in the money
being transferred to the wrong account.
Page 58 of 107
ATMs commonly called cash points are the hole in the wall cash dispensers that many people
use when banks are not open or when they do not want to queue inside the bank.
ATMs use real-time processing. This means that as soon as a customer gets money out of their
account, their balance is updated.
ATM Process
Page 59 of 107
Money is dispensed
Disadvantages of ATMs
• PIN can be forgotten
• There are additional charges for using the ATM by some banks
• ATMs can be placed in places where theft can happen at night
• No help of bank representatives.
• ATM can be offline
• ATM can break down or run out of cash
3. CREDIT CARD
A credit card is a payment card that is issued to the cardholder/customer to enable the
cardholder to pay a merchant for goods and services.
Page 60 of 107
The customer’s bank receives the transaction
information from the acquiring bank (or its
processor) through card network.
Customer’s bank responds by approving or
declining the transaction after checking to ensure,
among other things, that the transaction
information is valid, the cardholder has sufficient
balance to make the purchase and that the account
is in good standing.
Customer’s bank sends approval to card network
Card network relays approval to acquiring bank
(processor)
Processor sends approval to the merchant’s
terminal
Sale is complete
4. CLEARING OF CHEQUES
A cheque is a document that orders a bank to pay a specific amount of money from a person’s
account to the person in whose name is on the cheque.
Cheque clearing is the process of moving a cheque from the bank it was deposited to the bank on
which it was drawn, and the movement of its face amount in the opposite direction. This process
Page 61 of 107
normally results in a credit to the account at the bank of deposit and an equivalent debit to the
account at the bank on which it was drawn.
5. PHONE BANKING
A service provided by the bank to allow customers to perform financial transactions which do
not involve cash over the phone.
Page 62 of 107
• Press ‘3’to pay a bill
• Press ‘4’to talk to one of our representatives
5. The customer chooses one of the options
6. ONLINE BANKING
Online banking uses the internet to enable a customer to connect to the banks ICT system and
interact with them.
They can pay for goods and services, apply for loans, manage their bank accounts, book for
holidays, etc.
Page 63 of 107
▪ Statements can be viewed online so there is no need to keep the paper statements
▪ People who suffer some disability which makes travelling to the bank difficult can do the
banking from the comfort of their homes
▪ No need to travel to the banks and wait in queues to perform routine transactions
▪ No need to travel to the town centres hence cost reduction in fuel, bus fares, no time
wasting and reduced congestion and pollution.
▪ Money can be moved between accounts quickly to get the best interest rates.
▪ It is less embarrassing for some people to ask for a bank loan using the internet rather
than doing it face to face with the bank stuff.
7. INTERNET/ONLINE SHOPPING
Internet shopping means purchasing goods and services using the internet.
ADVANTAGES DISADVANTAGES
Goods/services are cheaper because of lower Hidden costs of postage and packing.
costs of internet business.
Cost savings are passed to customers with Lack of personal service you get in a store.
cheaper goods.
One can order goods from anywhere in the One can get wrong size or faulty goods.
worls.
No travelling costs to go shopping. Harder to access the quality of the goods
before ordering.
Wider range of goods to choose from. Loss of social pleasure of going shopping.
Goods are delivered to your home. Ideal for Problems with bogus sites where you pay for
disabled or elderly people who cannot get goods that never arrive.
out.
Page 64 of 107
Advantages and disadvantages of internet shopping to the store
ADVANTAGES DISADVANTAGES
Can sell goods 24 /7 Not everyone has access to the internet so
you will lose some customers.
Can sell goods to anyone in the world. Specialist ICT knowledge is needed to set up
the site.
Less shoplifting. Networks can fail and this means customers
cannot access the store.
Cheaper to keep in touch with customers as Postage charges can put people off.
they can be emailed.
No expensively fitted out high street stores to Dangers of hackers accessing your banking
pay for. details.
Personal data is kept about customers and
this could be targeted by hackers.
a. Medical databases-patient records are stored on a database and can be accessed from
different places.
b. Patient identification using bar codes.The barcodes are on patient wristbands so these can
be scanned and obtained at the bedside.
c. Hospital intranets
d. Patient monitoring to measure vital signs such temperature,blood pressure,pulse and
blood sugar.
e. Expert systems are used by doctors to make more accurate diagnosis.
f. Computerised reporting of laboratory tests.
g. Pharmacy reports-to generate labels for prescribed medicines,recording patient
prescriptions.
3D PRINTERS
3D printers are printers that can print 3D models.They can be used in medicine to produce;
Page 65 of 107
• Artificial body parts such as false teeth,teeth implants,artificial limbs and hearing aids.
• Artificial blood vessels
• Tissue Engineering
• Medical tools and equipment
1) BOOK FILE
This consists of all data on the book in the library.
• Book ID (number / text)
• Title (text)
• Author (text)
• Publisher (text)
• ISBN (number)
• Fiction / non-fiction (boolean)
• Genre / category (text)
• Cost (number)
• Date of purchase (date)
2) BORROWERS FILE
This contains all the details of the borrower.
• Borrower ID (number / text) • Address (text)
• Name (text) • E-mail address (text)
• Phone number (text) • Date of birth (date)
3) LOANS FILE
It contains the details of the date borrowed and return date.This acts as a link between the
book and borrowers file.
• Book ID (number / text)
• Borrower ID (number / text)
• Date of loan (date)
• Due date (date)
Page 66 of 107
COMPUTER PROCESSING INVOLVED IN ISSUING BOOKS
• The library’s database is checked on a daily basis to check which books are overdue.
• When a late record is found, the borrower ID can be used to link to the borrower's
record.
• The borrower's address / e-mail can then be used to send out an automatic reminder
letter.
TOPIC 6.12:EXPERT SYSTEMS
An expert system is an ICT system that uses artificial intelligence to make decisions based on
data supplied in the form of answers to questions.
Page 67 of 107
STAGES OF DESIGNING AN EXPERT SYSTEM
3.The inference engine matches the data input with the knowledge base,using the rules base
until matches are found.
EXAMPLE: Expert systems are used by doctors. Describe how an expert system can be used
to diagnose illnesses.
• Medical diagnoses
• Mineral prospecting
• Car engine fault diagnosis
• Chess games
• Tax queries
• Careers recommendations
Page 68 of 107
6.13 COMPUTERS IN THE RETAIL INDUSTRY
POINT OF SALE (POS)
Point of sale terminals are the computerised tills where you take your goods for payment in a
shop.
1. Loyalty card systems- where customers are given loyalty points according to how
much they spend.
2. Account systems- where the money coming into the shop is accounted for.
3. Automatic stock control systems
When stock is purchased at the POS and the amount is automatically deducted from the
overall stock level. If the stock level falls below (lower) than the pre-set value then an
automatic delivery request is sent to the supplier. A preset value will be reordered and will
arrive in the next delivery. The stock levels will automatically update.
These terminals allow payment to be made by a customer using their bank card.
PROCESSES INVOLVED
2. The cashier enters the card in to the chip and pin reader and confirms the value of the
purchase.
3. The customer is requested to enter their pin. If Pin matches the Pin stored on the chip then
the transaction can continue.
• Pin entered has to be correct for the transaction to continue. The card will also be
checked for validity (expiry date/stolen).
4. The shops computer will use the account details on the chip to connect to the customer’s
bank account and check the balance.
• If funds are not available a declined message will be sent to the stores computer. The
cashier will then request for another method of payment.
6. The purchase amount is subtracted from the customer’s account and deposited into the
shops banks account.
Page 69 of 107
7. Once the transaction is complete receipt will be printed. The cashier will give the card and
receipt to the customer.
• Barcode reader
• Swipe card readers
• Chip and pin reader
ANPR systems are used to read the number plates on cars in a number of applications
including car parks to enable entry and exit to be automatically controlled by a computer
system.
2. i. An algorithm is used to locate and isolate the number plate from the image taken by the
camera.
3. The car park barrier is raised and a ticket showing the date and time of entering is issued
4. When the driver returns to the car park, the ticket is inserted into a machine which
calculates the car park charges.
Page 70 of 107
5. The payment is registered on the database. If the number plate is recognized and payment
has been made, the exit barrier is raised.
APPLICATIONS OF ANPR
✓ Road enforcement
✓ Car park management
✓ Electronic toll collection
✓ the person may be an offender who is released from prison and his whereabouts is
to be known at all times
✓ an elderly person may need to be tracked to ensure their safety
✓ somebody taking part in a marathon to determine their position and their time to
complete the race.
✓ Internet service providers monitor web browsing activities for people. Usually the
web browser use cookies to capture user preferences.
C.WORKER MONITORING
Some employees keep a constant check on their employees. This monitoring is usually for
commercial purposes but it can be used to check up on their employees which can be used
to discipline employees if they have not obeyed company rules.
For example;
• Internet use monitored by network managers. They can record what sites are
visited and how long an employee spent on them. Therefore they can spot
employees who are spending too much time browsing the internet when they are
supposed to be working.
• Delivery drivers can have their location tracked by their employees using a
GPS(global positioning systems).
D. CALL MONITORING
Call monitoring allows managers to listen in to employees’ telephone calls for the
following reasons:
Page 71 of 107
2. whisper: allows the manager to speak to employees to help them with a call. Only the
employee can hear the manager’s voice.
3. barge: allows the manager to be heard by both the employee and the other person in the
call.
E. KEY LOGGING
Key logging is the process of someone recording the keys you press when you are using your
computer using a key logger.
• A keylogger software is a program that is designed to record and store every
keystroke made on the computer.
Key logging software monitors which keys have been pressed.
✓ Passwords and personal details can be obtained for malicious purposes by hackers.
Global Positioning System is used to determine the exact location of a number of modes of
transport.
Advantages:
• The driver does not have to consult paper maps while driving – far safer
• Removes errors as it can warn drivers about one way streets
• System can warn driver about location of speed cameras
• System can estimate time of arrival
• Possible to program in the fastest route
• System can give useful information
Page 72 of 107
Disadvantages:
Uses
Examples of GIS
Satellite navigation systems make use of GIS and a map to accurately position a car on
the road in order to issue traffic directions.
• Reduces fuel consumption which is therefore greener because you do not get lost.
• Can save money by choosing the shortest route.
• You can find where the nearest petrol station is.
• You can arrive at your destination without delay, as you can be warned in advance
of road works and so take an alternative route.
• They can send you down to very small and winding roads.
• They are sometimes difficult to use.
• Sometimes the information is out of date.
• They can cause accidents if people start using them while driving.
Are systems that use satellite signals to communicate. They are used by media companies e.g
TV to send stories, pictures and video from remote locations such as up a mountain.
Page 73 of 107
TOPIC 7:THE SYSTEMS LIFE CYCLE
Systems life cycle is a series of stages that are worked through during the development of a
new information system.
STAGES OF SLC
7.1 ANALYSIS
Analysis is where the current system is looked at in detail in order to figure out what changes
need to be made to make the system better than the old one.
Page 74 of 107
METHODS OF RESEARCHING AN EXISTING SYSTEM
SYSTEM SPECIFICATION- is the document that lists all of the improvements that we
hope the new system will bring.It includes the hardware and software that will be needed for
the new system.
Page 75 of 107
7.2 DESIGN
Page 76 of 107
VERIFICATION
A way of preventing errors when data is copied from one medium to another.
➢ Double entry: in this method, data is entered twice, using two different people.
The computer compares the two entries, either after data entry or during the data
entry process, and identifies any differences
➢ Visual check: this is the checking for errors by comparing entered data on the
screen with the data in the original document (not the same as proof reading)
VALIDATION
Process where data is checked to see if it satisfies certain criteria when input into a
computer, for example to see if the data falls within accepted boundaries .
Length Check Checks if the input data If a field needs six digits then
contains the required inputting a five- or seven-digit
number of characters number, for example should cause
an error message.
Character/Data Checks that the input data A person’s name should not contain
type Check does not contain invalid any numbers but a person’s height
characters should only contain digits.
Page 77 of 107
Presence Check Checks if data is actually In an electronic form, a person’s
present and has not been telephone number may be a required
missed out field and if no data is present this
should give rise to an error message.
Consistency Checks if fields correspond If ‘Mr’ has been typed into a field
Check (tie up) with each other called title then the gender field
must contain either ‘M’ or ‘Male
Check Digit Look at an extra digit Check digits can identify three types
which is calculated from of error:
the digits of a number and
then put on the end of the • If two digits have been
inverted during input.e.g
number
13597 instead of 13579
• An incorrect digit entered
twice.e.g 13559 instead of
13579
• A digit missed out
altogethere.e.g. 1359 instead
of 13579
This stage involves creating the new system and testing it. It is broken in four parts;
TESTING
Test plan lists all of the different tests that will be carried out.
Page 78 of 107
➢ A list of tests that are to be performed.
➢ The data to be used in the best.
➢ The type of test(normal/extreme/abnormal/live)
➢ The expected outcome of the test.
➢ The actual outcome of the test.
TESTING STRATEGIES
1. ABNORMAL DATA
Testing modules with data that is outside the range.Testing modules with data that is of the
wrong type/format/length.
2. NORMAL DATA
Testing modules with data that is within the range.Testing modules with data that is of the
correct type/format/length.
3. EXTREME DATA
4. LIVE DATA
Testing the system with the data that has already been used in the previous system and the
data has known results.
How it is used?
A table of expected results is drawn up.Live data is input to the system and actual results are
recorded.Then the results are compared.Any resulting differences will highlight limitations of
the system.
• Testing the system as a whole is known as Integration testing.Its done after testing
individual parts of the system.
7.4 IMPLEMENTATION
Page 79 of 107
TYPES OF IMPLEMENTATION
IDEAL USE
It is suitable to be used in the following situations.
• A small organisation which can afford to lose data.
• where system needs to be up and running very quickly
• where the new system has been thoroughly tested
ADVANTAGES
• The fastest way of changing from one system to another.
• The new system can be used immediately after installation.
• Cheap method of changeover as you don’t pay ofr two sets of staff.
• Less chance of the new system being faulty as it will already have been fully tested
and checked.
DISADVANTAGES
• Staff have to be trained and fully ready to use the new system before it is installed.
• It is time consuming since all of the old systems data needs to be uploaded into the
new systems database before it is installed.
• If the new system fails,there is nothing to go back to since the old system is
completely removed.Data can be lost permanently.
IDEAL USE
It is suitable to be used in the following situations.
• An organisation with large amounts of data which would take too long to re-enter /
cannot afford to lose data/where time taken/cost to implement is not an issue/where
the new system needs to be thoroughly tested.
ADVANTAGES
• No data is lost if the new system fails since theold system is still avilable.
• Staff can be trained in the new system gradually as the changerover doesn’t happen
immediately.
DISADVANTAGES
• It is more expensive than direct changeover, since extra staff are needed to run both
systems together.
Page 80 of 107
• Tasks will be duplicated as data is inputted into both systems.
3) PHASED IMPLEMENTATION
New system is implemented part by part.
IDEAL USE
It is suitable to be used in the following situations.
• An organisation where there are clearly defined separate processes/where the new
system needs to be thoroughly tested.
ADVANTAGES
• It is easier to find system errors as you are dealing with only one part at a time.
• If one part of the new system fails,it is possible to access the parts of the old system
that are still in use.
• Staff can be trained gradually as they only need to train in the part of the system that
is currently being phased in.
DISADVANTAGES
• More expensive as you ave to test each phase separately before moving onto the next.
• It can take long time to implement the whole system because the system is installed in
separate phases.
• Only suitable for systems that can be split into separate parts.
IDEAL USE
It is suitable to be used in the following situations.
• An organisation where there are several branches all doing the same work)/where the
new system needs to be thoroughly tested.
ADVANTAGES
• If the new system doesn’t work correctly,it only affects one part of the company.
• The implementation is on a smaller scale and is easier to manage than direct
changeover.
• Staff can be trained gradually from department to department.
DISADVANTAGES
• It takes longer to implement the new system across the new system across the whole
company.
Page 81 of 107
• Neither introduce the system as a whole new system (across the company) /both
introduce system in parts.
• Both allow for the performance of the new system to be thoroughly assessed /tested.
• Both allow gradual training.
• Both take time to introduce the whole of the new system (to the whole company)
• Only one distinct part is being used so safer to implement.
7.5 DOCUMENTATION
System documentation explains how the system was created and also how to use it.
1. TECHNICAL DOCUMENTATION
The technical documentation is intended to help the system analysts, designers and
programmers to maintain/improve/repair the system.
• Program listing
• Programming language
• Flowchart/algorithm
• List of variables
• File structure
• Purpose of the system/program
• Input format or example
• Output format or example
• Hardware requirements
• Software requirements
• Sample runs/test runs
• Known bugs/possible errors
• Validation rules
• Limitations of the system
2. USER DOCUMENTATION
The user documentation is intended to help the users of the system.The users are usually non-
technical people, who don't need to know how the system works. They just need to know
how to use it.
It usually includes:
• How to load software/install/run software
• How to save a file
• How to search
• How to sort
• How to print
• How to add records
• How to delete/edit records
Page 82 of 107
• Purpose of the system/program (only if not mentioned in technical documentation)
• Input format or example (only if not mentioned in technical documentation)
• Output format or example (only if not mentioned in technical documentation)
• Hardware requirements (only if not mentioned in technical documentation)
• Software requirements (only if not mentioned in technical documentation)
• Sample runs (only if not mentioned in technical documentation)
• Error messages (only if not mentioned in technical documentation)
• Error handling
• Limitations of the system
• Tutorials
• Troubleshooting guide/Contact details/help line/FAQ
7.6 EVALUATION
EVALUATION STRATEGIES
1. Efficiency
• Does it operate quicker than the previous system?
• Does it operate by reducing staff time in making something? // Does it reduce the time
to make a something?
• Does it operate by reducing staff costs? // is it more cost effective than the old
system?
2. Ease of use
• Are all the users able to use the system easily/effectively?
• Are all the users able to change and cancel things easily/effectively?
• Can all staff understand how to use the system with minimal training?
3. Appropriateness
• Is the system suitable for each of the departments?
• Does it meet the needs of the users?
• Does the solution match the original requirements?
Page 83 of 107
TOPIC 8.1:PHYSICAL SAFETY
Physical safety is all about ensuring that you do not suffer any harm whilst working with
computers.
It is concerned about dangers that could lead to serious injury or even loss of life. The table
below shows common safety risks.
1. Electrocution Spilling drinks over Do not allow any drink near computers.
electrical equipment.
2. Fire Sockets being Make sure the room has plenty of sockets
overloaded. and don’t plug too many devices into the
same outlet.
3. Tripping over Cables trailing across Encase the wires in cable covers.
wires a floor.
Tuck trailing wires under desks or carpets.
TOPIC 8.2:E-SAFETY
PERSONAL DATA
Personal data is any data regarding a living person who can be identified against the data.
Page 84 of 107
• Bank details
• Medical history
• Ethnic origin
• Membership of a political party
• Criminal activity
• Membership of a trade union
Page 85 of 107
WHY PERSONAL DATA SHOULD BE CONFIDENTIAL?
• Users can be stalked or even kidnapped –status updates can alert people of your
location at a particular time.
• Details can be stolen, copied or pass on.
• Users could be blackmailed/ threatened into doing inappropriate things.
• Customer details could be sold onto a third party.
Page 86 of 107
• Do not reply to emails from unknown sources.
To gain unauthorised access to a computer system without the user knowledge or permission.
EFFECTS OF HACKING
• To delete, corrupt, copy and edit files. Sensitive Data could be sold to competitors.
• Identity theft to steal users identity.
• To expose a company (for example wiki leaks).
• To cause disruption and stop production.
Page 87 of 107
Authentication is a method that is used to check that a person accessing a computer system or
a network is allowed to do so.
b) BIOMETRIC DATA
Biometrics data is difficult to copy and requires the user to be present so that this method of
EXAMPLES
a) Fingerprint Scans:Users will have press their finger against the scanner. Finger prints
are compared against those stored in the database.
b) Retina/Iris Recognition:Scans use infrared light to scan unique patterns of blood
vessels in the retina.
c) Face Recognition:Physical facial features are scanned and compared to the
information held in the database.
d) Voice Recognition:User will use speak which will compare the voice to one held on
the database.
DIGITAL CERTIFICATE
Page 88 of 107
• Communication protocol
• Security technology
• Encrypted link between the server and the client.
PHISHING
This is a scam involving emails whereby a legitimate looking email is sent containing a link.
• The user clicks the link and is sent to a website where personal details are asked for.
• The email asks for details of your (bank) account/personal details.
Effects of Phishing
The user will be tricked into entering their details into a fake website. The sender of the initial
email will have gained personal details from the user. These details can be used fraudulently
or for identity theft.
• Use a filter on your email account so that only emails from an allowed users appear in
your inbox.
• Always double check the URL and email address
PHARMING
Effects of Pharming
The fake website will look like the real website (websites tend to look like a trusted websites
to deceive the user). Users will betricked into entering their personal details. Like Phishing
this can lead to fraud or identity theft.
Page 89 of 107
SMISHING
A text message (SMS) is received/sent and it contains a link or phone number. When the user
phones or taps links and asked for personal information/details of
the account.
Effects of Smishing
The effects are very similar to Phishing and Pharming where personal details will be obtained
from users. However users could incur additional costs when they ring the premium number
to claim a prize.
ADVANTAGES
➢ The moderated forum does not allow inappropriate comments to be posted on the site.
Examples of inappropriate language: racist, offensive, swear words, phishing
attempts, spam, abusive, unrelated comments.
➢ In a moderated forum those who continually break the rules are banned
DISADVANTAGES
➢ Moderated forums can reduce freedom of speech/can be biased.
DISADVANTAGES
➢ Un-moderated tend to be used for spam attacks or phishing attacks
➢ High chance of being exposed to offensive content.
Page 90 of 107
SIMILARITIES
➢ Both are interactive websites
➢ Both are discussions
➢ Both require networked computers
SPAM
Spam refers to unwanted emails that are automatically sent out to a random mailing group.
These emails are obtained from chat rooms, websites, newsgroup, and even certain viruses
that harvest contacts.
ENCRYPTION
Encryption is the process of converting information into a form that is meaningless to anyone
except holders of a ‘key’.
Encryption is used to stop unauthorised people from reading your data in the following ways:
• Any files containing bank account or credit card data.
• When buying items on the internet using credit/bank cards.
• Emails that you wish to remain private.
Page 91 of 107
USING CREDIT CARDS ONLINE
Credit card details are very attractive to hackers, fraudsters and cyber criminals. They use the
information to withdraw your cash, make purchases online and apply for more credit cards in
your name.
Page 92 of 107
COMPUTER VIRUS
A virus is a piece of software/program code that infects a computer by replicating itself
,attaches itself to files and transfer itself from computer to computer through network.
EFFECTS OF VIRUS
➢ Causes computer to crash/shut down
➢ It can delete/corrupt data/files
➢ Causes the computer operations to run slowly/become unusable
➢ Makes software/OS unusable
➢ Fills up the computer memory/hard disk
➢ Can corrupt/erase contents of hard disk
There are some simple things you can do to help prevent a virus infecting your computer:
➢ Install anti-virus software and keep it up-to-date (this is the most important
thing you can do!)
Page 93 of 107
➢ Install anti-malware software (stops software installing without your
knowledge)
➢ Never download and install software from the Internet unless you are certain it
is from a source you can trust.
➢ Don’t open e-mail attachments unless you have scanned them (even a file that
seems to be a picture can contain a virus)
➢ Don’t click links in websites that seem suspicious (if a site is offering prizes /
free stuff / etc. be suspicious!)
➢ If someone gives you a memory stick or CD-ROM, run a virus scan on it before
opening any files.
➢ Don’t trust cracked versions of software from file-sharing sites (often these
have viruses and other malware added to them - a Trojan horse)
CLOUD COMPUTING
“The Cloud” is what we refer to storing data on the internet.
Cloud computing is where users store their documents, programs and data on the internet
rather than on their own computers.
Page 94 of 107
➢ You have no control over the physical security of the data since your data is stored
remotely not on your computer.
➢ If the online storage company go out of business, there is a chance that you could
lose all of data.
➢ If the online storage company don’t have adequate online security, your data could
be at risk of hackers stealing it.
THE BENEFITS AND DRAWBACKS OF USING THE CLOUD FOR STORING DATA
RATHER THAN OTHER METHODS
BENEFITS
• The data is accessible anywhere
• Helps to migrate data from one device to another
• Helps to synchronise data
• Don’t have to buy storage devices,some devices do not have hard discs/storage
• Cheaper than buying storage devices
• The cloud can be used for all storage requirements
• More storage space than using physical devices as the cloud has lots of storage
• Don’t have to manage the storage as the service provider manages the storage
• User does not have to worry about security measures as service provider secures data.
• Allows many users to access the data as the data is stored centrally.only pay for the storage
you use
• Much of the space on the hard disc may be wasted
• The data is regularly backed up
DRAWBACKS
• Loss of control of the data as the data is controlled by a data storage provider.
• The user needs to be able to trust the service provider and its staff.
• Security issues with the storing of the data with the provider.
• Fire/flood/electricity spikes can affect data without the user knowing.
• If data is not encrypted can lead to security issues due to loss of control/hacking.
• If connection is lost then the cloud cannot be accessed,data could be lost due to this.
• If there is a mass/lot of data the data could be split over several servers may have problems
retrieving the data and may lead to security issues.
• Data may be lost during the saving process
• Cost of storing data may be higher than physical methods since most computers have storage
so don’t need to purchase one
Page 95 of 107
• Private clouds can be expensive
• Difficult to delete all copies of a file as the data is stored/backed up several times
FIREWALL
A firewall is a program or hardware device that filters the information coming through the
Internet connection into your personal computer or into a company's network
Why is it Used
•Firewalls will examine network traffic and block and alert users to potential risks.
Page 96 of 107
9. AUDIENCE
An audience is who the product is aimed at or who is going to use the product.
CHARACTERISTICS OF AUDIENCE
• Age
• Gender
• Income level
• Interests.
TYPES OF AUDIENCE
TYPE NEEDS
1. Reading Fonts-if the audience is senior citizens then we use a small font, they won’t be able
to read what is written since they might have eye sight problems.
2. Wording-if one uses complex and ambiguous words, children won’t be able to understand
how the product works and it will be useless for them.
3. Content-if the content is not interesting to the audience they wont use the product.
4. Attraction-when developing an ict solution for children one has to consider colour schemes
they are using. If colour is not attractive to kids, they won’t use it.
SOFTWARE COPYRIGHT
Page 97 of 107
Software copyright is the protection of software from being downloaded, copied, or borrowed without
the owner’s consent and protects the author of the software.
Software copyright laws are used by companies to try to prevent the unauthorised copying of their
software.
2. Software should not be used on a network of more users than you have paid for (e.g. 20 users
instead of 10).
4. Stealing code from software and then using it in your own software product is illegal.
5. Using the name of copyright software on your product is illegal (Passing off your product as
Microsoft Word for example).
• When the software is bought it comes with a unique activation code. This can only be used
once and has to be typed in on a limited number of machines.
• Use of holograms- this shows that the software is a real copy. Holograms cannot be
photocopied.
• Use of licence agreements- The purchaser fills in a licence agreement and agrees to abide by
the rules
• Execution of the encryption code requires a key to run.
• Use of a dongle
• Guards hardware / software modules that have not been tampered with in any way.
• Digital signature on the CD.
When creating an ICT solution consideration also has to be taken regarding legal, morality, ethics and
cultural issues.
Legal: Ensure copyright laws are abided by including not using any coding or branding from existing
copyrighted software.
Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an act
however it could be against your morals. For example setting up a fake website to deceive is not
illegal but questions your level of morality.
Ethics: Is to break a code of conduct. One example could be to leak information to a rival software
publisher or to the press about new software ideas.
Culture: When software is released in different cultures then care must be taken so that people are not
offended. For example certain use of words could be offence to one culture and not to another. If
certain computer games mock religion or cultural beliefs then again this could cause offence.
Page 98 of 107
10.1 COMMUNICATE WITH OTHER ICT USERS USING
EMAIL
Emails are electronic messages that are sent between computers or devices either on a
network or over the internet.
Email Groups
Email Groups are list of contacts which are grouped together so that emails can be sent to
multiple recipients.
When sending an email to a group you would just have to write the name of the group rather
than writing everyone's email address.
Cc is where you send an email to someone but also want other people to see a copy of the
email as well.
i. Copyright
ii. The need for security
iii. Password protection
iv. LAWS FOR GENERAL USE OF EMAILS
Below are some laws which companies and individuals have to follow when using email:
• Ensuring emails do not have false or misleading subject lines.
• Organisations must include valid postal address.
• Organisations are not allowed capture and store lists of email addresses.
• Organisations are required to ask for permission before they can send emails to
individuals.
• There should be a clear way for recipients to “optout”(unsubscribe) from receiving
email.
• Organisations must ensure privacy policy is clear and that subscribers are made aware
of such policies.
v. ACCEPTABLE LANGUAGE
When sending an email the language and content within the email needs to be appropriate.
Page 99 of 107
• If the emails is being sent to an employee within a business then the language should
be formal
vi. NETIQUETTE
Netiquette is a set of rules that users of email should try and follow when sending emails.
These rules include:
• Do not type all in capital letters. This is seen as being aggressive.
• Only use reply to all if absolutely necessary.
• Fill in the subject line with something meaningful. Gives the reader an idea what the
content is.
• Do not email any personal information.
• Keep emails short and to the point.
• Use bcc: to ensure privacy. Bcc hides email addresses from recipients.
• Compress files attachments so that larger files can be sent quicker.
2. FTP (File Transfer Protocol) is used to transfer files from one computer to another.
4. URL-A URL is a Uniform Resource Locator is the unique address for a file that is
accessible on the Internet.
It consists of a;
hothouse-design - this shows the domain name that the company have purchased.
WEB BROWSER
A web browser is a software application that provides a way to view and interact with pages
on the World Wide Web.
SEARCH ENGINE
A Search engine is a database on the World Wide Web that helps us to quickly and easily
find the web pages we want.
The user enters 'key words' or phrases on the subject that they are interested in. The search
engine searches its database looking for references to the key words. It then returns web
pages with links to the relevant websites it found.
The most popular or most visited websites are usually put near to the top of the results page.
• Google
• AltaVista
• Yahoo
The owner can only edit it. It is written in an informal or conversational style and it’s an
Online journal/diary for writing personal opinions.
WIKI
A website or database used for collaboration by a community of users/members of a group
VOIP
Voice Over Internet Protocol is a method for the delivery of voice communications over
Internet /Internet.
Generic file formats allow you to save files so that they can be opened on any platform.
➢ Text (.txt extension)-can be opened in any word processor. A .txt file can be imported
into any text editor/ word processing/DTP package.
➢ Rich text format (.rtf)-is a text file type that saves some of the formatting within the
text. A .rtf can be used in any word processor and retains some formatting.
➢ Comma separated values (.csv)-takes a form of tables and saves it in text format,
separating data items with commas.A .csv file can be imported into any spreadsheet.
➢ Portable document format (.pdf)-a document that has been converted into an image
format.One can stop others from editing. A .pdf can be used in any document format
reader.
➢ Graphics interchange format (.gif)-stores still or moving images. It’s an efficient
method of storing images using a smaller size.
➢ Joint photographic expert group (.jpg)-stores still images only. A .jpg/.gif/.png file
can be used in most bitmap image editing software.
➢ Moving picture experts group layer 3(.mp3)-compressed file format used for
storing audio files.
➢ Computers have a limited storage capacity so the most efficient use of that
storage space is important.
➢ To increase transmission speed between computers and devices. The larger the
file size, the more it takes to transmit files.
➢ Resize an image.
➢ Resample an image by reducing the number of pixels.
➢ Compress the file.
GUTTER – A margin placed on the fold of a book // A margin between the page margin and
the fold of a book.
WIDOW – When the last line of the paragraph is the first line of a new page.
ORPHAN- When the first line of a paragraph appears as the last line of a page.
SECTION BREAK
➢ When you want to apply different formatting in the same page without disrupting the
formatting of the whole page.
➢ When you want to use columns in a page, and have different amounts of columns on
the same page.
➢ When you want to use a heading across the whole page but the text below is in several
columns.
➢ When you don't want headers on pages with a title, but you do want them on other
pages. If you didn't have them, each page would have the same header.
➢ To enable page orientation to change between 2 pages.