Professional Documents
Culture Documents
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
HARDWARE
The
physical
components
that
make
up
a
computer
system
SOFTWARE
The
computer
programs/set
of
instructions
that
tell
the
computer
what
to
do
INPUT
DEVICE
Hardware
that
allows
data
to
be
entered
into
a
computer
STORAGE
DEVICE
Hardware
that
allows
data
to
be
saved/stored,
long-term,
after
it
has
been
inputted
into
a
computer
for
future
use
OUTPUT
DEVICE
Hardware
that
presents
data
from
the
system
to
the
user
b. Describe the purpose of input devices, storage devices and output devices
INPUT
DEVICE
Gives
the
computer
the
data
to
be
used
when
instructions
are
carried
out
Barcode
reader-
to
read
the
barcode
on
an
item
Keyboard-
to
input
damaged
barcode/amount
paid
STORAGE
DEVICE
Needed
to
store
files
when
the
power
to
the
processor
is
switched
off
Needed
to
store
files
which
are
too
big
to
be
stored
in
the
processor
E.g.
Hard
Disk
Drive,
CD-ROM,
USB
Memory
Stick
OUTPUT
DEVICE
Needed
so
that
the
computer
can
report
to
us
what
it
has
done
Needed
as
it
affects
future
input
in
system
Printer-
to
give
hard
copy
output
for
customers
to
keep
Screen
(LCD)
-
to
shows
details
and
price
of
current
items
Beeper-
to
signify
barcode
has
been
properly
read
Chip
and
Pin-
to
input
payment
details
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
3.1.2
SOFTWARE
a.
Describe
the
stages
of
the
systems
life
cycle
The
Systems
lifecycle
is
the
most
common
way
of
solving
problems
using
computers.
Problem
Definition
o Existing
problems
are
identified
o User
requirements
are
identified
Feasibility
Study
o Is
the
new
system
technically
feasible?
o Software/hardware
available
o Is
the
new
system
economically
feasible?
o Is
it
socially
feasible?
o Does
the
staff
have
the
necessary
skills?
o Is
it
legal/within
the
data
protection
legislation?
o Is
it
ethically
ok?
o Does
it
meet
environmental
standards?
Analysis
o Production
of
a
requirements
specification
o Detailing
inputs
needed
and
outputs
required
o Specify
user
requirements
o Hardware/Software
needs
o Fact
finding
Design
o Specification
of
a
system
o User
interface
designed
o Specification
of
data
structures
o Prototyping
o Algorithms
o Files/file
structure
o Input/form
design
o Output/report
design
o Validation
procedures
o Security
of
data
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Coding/Software
development
o Production
of
programs
o Modification
of
code
o Production
of
documentation
Testing
o Production
and
carrying
out
a
suitable
testing
strategy
o Production
of
test
data
Implementation
o Method
of
conversion/changeover
(parallel,
pilot,
direct
etc)
o Staff
training
o Installation
of
hardware/software
o Setting
up
data/transferring
data
Maintenance
o Debugging
the
system
o Modification
due
to
changing
needs
o Improving
current
processes
Review/evaluation
o Check
system
against
objectives
stated
o Are
there
any
limitations?
The
client
may
not
understand
the
potential
of
the
computer
system.
The
analyst
may
not
understand/have
detailed
knowledge
of
the
specific
field
of
interest.
Therefore,
the
analyst
may
produce
a
solution
which
does
not
satisfy
the
client.
The
two
must
pool
their
information
in
order
to
ensure
the
right
problem
is
solved.
The
analyst
and
client
will
have
very
different
ideas
of
the
problem.
It
is
necessary
that
the
problem
in
solved
in
a
way
such
that
both
the
client
and
analyst
agree
on.
Otherwise,
the
client
will
be
unhappy
and
the
analyst
will
not
be
paid.
The
analyst
is
an
expert
in
use
of
computer
systems
and
the
client
is
an
expert
in
the
specific
area
of
problem.
The
purpose
of
a
feasibility
study
is
to
carry
out
initial
enquiries
to
see
if
there
are
any
reasons
why
the
new
system
may
not
be
acceptable
before
starting
to
produce
it.
The
plan
should
be
revised
if
the
feasibility
study
highlights
any
problems.
TECHNICAL
FEASIBILITY
o Can
hardware
and
software
be
found
to
implement
the
solution
ECONOMIC
FEASIBILITY
o Is
the
proposed
system
possible
within
budget
o Is
the
proposed
system
economic
to
run
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
SOCIAL
FEASIBLITY
o Is
the
effect
on
the
humans
involved
too
extreme
to
be
allowed
o Is
the
proposed
system
environmentally
sound
SKILL
LEVEL
o Is
there
enough
skill
in
the
workforce
in
order
to
run
the
new
system
LEGALITY
FEASIBILITY
o Does
the
new
system
meet
the
requirements
of
the
data
protection
act
TIME
FEASIBLITY
o Is
the
proposed
system
possible
in
the
given
time
period/scale
QUESTIONNAIRE
o Many
workers
can
have
their
views
considered
in
a
short
period
of
time
o Advantages
Allows
all
to
feel
involved
Time-saving
o Disadvantages
Does
not
allows
for
individual
points
The
return
is
usually
poor
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
o Disadvantages
Workers
may
not
act
naturally
because
they
are
being
observed
Analyst
may
not
see
abnormal
procedures
The
requirements
specification
is
a
list
of
all
the
things
which
the
solution
is
intended
to
produce.
It
will
also
identify
inefficiencies/problems
in
the
current
system.
Contents
include:
o Input
Requirements-
source
of
the
various
data
o Output
Requirements-
identifying
the
destinations
of
the
final
output
o Processing
Requirements-
identifying
ways
in
which
data
is
processed
o Clients
agreement
to
requirements-
these
requirements
are
going
to
be
used
to
decide
whether
the
solution
satisfies
the
problem
and
whether
or
not
the
analyst
gets
paid
The
analyst
would
need
to
examine
the
current
data
structures
and
the
relationships
between
them.
This
includes
descriptions
such
as
data
type
because
this
will
dictate
the
form
that
the
data
will
be
stored
in
and
the
amount
of
storage
space
required
for
the
data
contained
within
the
new
system.
The
analyst
will
use
diagrams
to
help
in
the
understanding
of
the
present
system,
both
data
flow
diagrams
(DFDs)
and
systems
flow
charts.
o DATA
FLOW
DIAGRAMS-
showing
flow
of
data
through
a
system
Source
of
data
External
entities
Data
processes
o SYSTEMS
FLOW
CHARTS-
showing
how
parts
of
a
system
are
connected
File
storage
Input
Output
Processes
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
g.
Explain
the
importance
of
evaluating
the
system,
and
how
to
identify
the
criteria
used
for
evaluation
CLIENT
o Need
to
be
sure
the
system
will
perform
as
required
o Identifies
areas
where
the
solution
is
lacking
ANALYST
o It
determines
the
end
of
the
job
o It
determines
when
the
analyst
gets
paid
The
criteria
used
for
evaluation,
as
far
as
the
analyst
is
concerned,
is
to
prove
to
the
client
that
the
solution
works
and
meets
all
the
items
stated
in
the
requirements
specification.
The
criteria
could
also
include:
o SUITABILITY-
can
the
new
system
carry
out
all
the
requirements
that
were
set,
does
the
new
system
integrate
with
the
existing
software?
o EFFECTIVENESS-
is
it
an
improvement
on
the
existing
system,
is
it
cost
effective,
does
the
system
suffer
from
bugs,
is
the
hardware/software
reliable?
o USABILITY-
is
it
easy
to
use,
is
the
new
system
compatible
with
the
existing
systems,
do
the
users
require
continuous
training,
is
the
on-line
help/tutorials
useful?
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
INSTALLATION
STRATEGY
o Method
of
implementation-
parallel/pilot/phased/direct
o Training
program
must
be
devised
o Hardware
must
be
brought
and
installed
o System
must
be
tested
with
real
data
files
by
users
o Writing
the
technical
documentation
o Data
files
must
be
adapted/reformatted
from
present
files
j.
Explain
the
purpose
of
maintaining
the
system,
and
explain
the
need
for
system
review
and
reassessment,
understanding
that
software
has
a
limited
life
span
Maintenance
is
the
process
of
making
improvements
to
(or
modifying)
a
system
that
is
in
use.
System
review
and
reassessment
is
needed
because:
o Bugs/errors
are
discovered
in
the
software
code-
these
bugs
will
have
been
identified
only
after
the
system
is
in
full
use.
They
will
be
fixed
and
a
patch
would
be
issued
that
changes
the
appropriate
lines
of
code
within
the
end-users
program.
o The
user
requirements
may
change-
this
often
happens
after
a
system
has
been
in
operation
for
some
time
and
the
user
sees
further
uses
of
the
data
that
the
system
produces.
(changing
user
needs)
o Some
in-built
parameters
change-
e.g.
VAT
rate
(legal
requirements)
o Hardware
is
changing-
the
system
will
need
to
be
updated
to
take
advantage
of
new
hardware
developments.
This
could
be
a
new
input
device,
output
device,
or
even
communications
device.
o Operating
System
needs
upgrading-
the
system
will
need
to
be
modified
to
take
advantage
of
the
additional
capacities
of
the
OS.
o Performance
needs
improvement-
some
of
the
original
code
may
contain
several
unnecessary
routines
that
are
slow
to
execute
and
need
tidying
up.
Systems
performance
can
often
be
improved
by
finding
more
efficient
algorithms
for
such
routines.
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Disadvantages
o Takes
up
development
time,
especially
is
process
is
repeated
L.
describe
the
spiral
and
waterfall
models
of
the
systems
life
cycle
SPIRAL
MODEL
o Analyst
begins
by
collecting
data
followed
by
each
of
the
other
stages
leading
to
evaluation,
which
will
lead
to
a
return
to
data
collection
to
modify
results.
o The
different
stages
are
refined
each
time
the
model
is
worked
through
WATERFALL
MODEL
o Progress
is
seen
as
flowing-steadily
downwards
(like
a
waterfall)
o The
results
from
one
stage
are
used
to
inform
the
work
on
the
next
stage
in
the
cycle.
o At
any
stage,
it
may
be
found
necessary
to
return
to
re-evaluate
a
previous
stage
STOCK
CONTROL
Keeping
track
of
stock
Recording
stock
levels
10
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
o
o
o
o
o
o
Condition
of
stock
Keeping
track
of
where
stock
is
going
ORDER
PROCESSING
If
quantity
in
stock
falls
below
a
pre-determined
limit
The
system
automatically
institutes
a
reordering
process
When
goods
are
delivered,
the
ordering
system
is
informed
so
that
the
live
order
can
be
shown
to
have
been
fulfilled
PAYROLL
Records
are
processed
all
at
the
same
time
at
regular
intervals
(e.g.
once
a
week)
requires
no
human
intervention
during
the
processing
payroll
run
once
workers
have
gone
home
large
amounts
of
data
needs
to
be
processed
data
is
similar
in
nature,
requiring
similar
processing
no
need
for
instant
responses
to
input
PROCESS
CONTROL
Automatically
controls
a
process
Computer
receives
information
about
the
process
from
sensors
Data
from
the
sensors
allows
the
system
to
make
decisions
Results
of
decisions
are
actions
that
are
carried
out
The
next
set
of
inputs
from
the
sensors
are
compared
with
the
last
set
of
inputs
to
decide
whether
the
actions
that
were
taken
last
time
had
any
impact
E.g.
Rolling
Process
Computer
stores
parameters
between
which
the
thickness
is
acceptable
Actual
thickness
input
at
regular
intervals
from
the
sensors
Actual
thickness
compared
with
stored
values
If
acceptable
then
the
process
is
repeated
If
thickness
is
different
to
stored
values,
then
the
roller
is
adjusted
Feedback-
If
roller
is
adjusted,
the
next
input
is
compared
to
the
previous
input
to
see
if
the
adjustment
had
an
effect
11
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
N.
identify
and
justify
generic
applications
software
for
particular
application
areas,
e.g.
word
processing,
spreadsheets,
desktop
publishing
(DTP),
presentation
software,
drawing
packages
WORD
PROCESSING
Write
letters
to
customers
Process
reports
SPREADSHEETS
To
keep
records
of
sales
Calculate
invoices
Make
automatic
calculations
DESKTOP
PUBLISHING
(DTP)
Production
of
a
manual
(e.g.
instructions
manual)
Used
for
producing
brochures/leaflets/flyers
Produce
high
quality
graphics
12
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
PRESENTATION
SOFTWARE
Used
for
producing
multi-media
presentations
for
an
audience
DRAWING
PACKAGES
Used
for
producing
adverts/leaflets/flyers
DATABASE
To
store
files
of
customers
and
sales
To
manipulate
customer/stock
files
GRAPHICS
To
create
images
ADVANTAGES
of
Pre-written
(generic)
software
Shared
development
costs
makes
the
software
cheaper
to
buy
Immediately/readily
available
Ready
pool
of
trained
workers
Most
of
the
bugs
would
be
missing
as
software
will
be
fully
tested
Compatible
with
software
from
other
organisations
Third
party
user
documentation
available/online
help
available
There
may
also
be
training
material
accompanying
software
Staff
may
already
know
how
to
use
software
ADVANTAGES
of
Custom-written
software
Written
specifically
for
the
particular
purpose
needed
by
the
business
Designed
to
do
exactly
what
the
user
needs/fits
user
requirements
exactly
Application
is
one
off/unique
and
does
not
fit
normal
criteria
for
standard
software
Generic
software
will
not
exist
Contains
all
the
features
that
the
business
needs
including
non-standard
ones
Does
not
contain
excess
functionality
Program
maintenance
may
be
easier
13
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
KNOWLEDGE
BASE
o contains
the
information
supplied
to
the
system
by
the
experts
RULE
BASE
o Contains
the
rules
that
can
be
applied
to
the
knowledge
INFERENCE
ENGINE
o This
uses
the
rules
in
the
rule
base
and
searches
through
the
knowledge
base
HUMAN
COMPUTER
INTERFACE
(HCI)
o Allows
for
queries
to
be
input
and
results
to
be
output
14
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
BATCH
OPERATING
SYSTEMS
Data
is
collected
and
input
into
the
system
over
a
period
of
time
Inputs
are
stored
as
a
job
to
be
processed
later
and
collected
into
batches
Processing
occurs
when
all
input
has
been
collected
Therefore,
there
are
large
amounts
of
data
to
be
processed
Processing
is
carried
out
from
beginning
to
end
without
human
interaction
There
is
no
need
for
instant
responses
to
input
(not
time
sensitive)
Data
is
similar
in
nature
and
requires
similar
processing
REAL-TIME
OPERATING
SYSTEMS
Data
is
processed
instantly
and
the
system
responds
instantly
to
changes
in
input
Therefore,
the
output
affects
the
next
input
and
occurs
before
the
next
input
The
computer
must
respond
within
a
set
time
limit
SINGLE-USER
OPERATING
SYSTEMS
Allows
one
user
at
a
time
to
use
the
system
Allocates
each
user
with
rights
Keeps
user
files
separate
MULTI-USER
OPERATING
SYSTEMS
Allows
more
than
one
user
to
access
the
system
and
their
files
simultaneously
User
have
their
own
unique
access
to
the
computer
Keeps
user
files
separate
Allocates
each
user
with
rights
MULTI-TASKING
OPERATING
SYSTEMS
Allows
more
than
one
task
to
run
simultaneously
Use
of
separate
windows
for
each
task
Each
task
is
given
an
amount
of
processing
time
before
going
on
to
the
next
E.g.
play
music
while
typing
an
essay
A
typical
PC
is
described
as
multi-tasking
because
more
than
one
task
will
be
apparently
running
simultaneously
DISTRIBUTED
SYSTEMS
File
storage
or
processing
is
shared
between
different
computers
at
different
locations,
which
make
up
the
entire
system
Users
will
be
unaware
of
the
exact
physical
location
of
the
data
that
they
are
accessing
15
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Speeds
up
access
to
files
because
there
is
no
single
place
which
all
the
information
must
pass
through
BATCH
PROCESSING
Optical
Mark
Reading
(OMR)
o Multiple
choice
OMR
forms-
e.g.
multiple
choice
examinations
o Scripts
are
batch
processed
o Scripts
are
processed
incredibly
quickly
o All
processing
is
similar
in
nature
and
data
is
of
similar
type
o Large
amounts
of
data
to
be
processed
o Scripts
are
rejected
if
they
cannot
be
read
Produce
bills
for
customers
o Data
collected
over
a
month
o Similar
data
is
collected
o Processed
at
a
convenient
time
normally
at
a
quiet
time
o Results
are
not
needed
immediately
o No
need
for
human
intervention
o Processing
is
simple
o All
the
processing
is
the
same
for
each
bill
Payroll
o Inputs
are
stored
and
collected
over
the
course
of
one
week
because
inputs
are
only
useful
when
full
week
of
values
are
collected
o Payroll
run
once
a
week
all
at
the
same
time
o No
need
for
humans
to
be
present
o Runs
when
workers
have
gone
home
o All
processing
is
similar
in
nature
and
data
is
of
similar
type
o Large
amount
of
data
to
be
processed
RAPID
RESPONSE
Airline
booking
system
o When
a
seat
has
been
booked
on
a
flight,
the
system
needs
to
be
updated
before
the
next
transaction
(input)
occurs
in
order
to
avoid
the
possibility
of
a
double-booking
Missile
guidance
o Various
sensors
detect
altitude,
latitude,
speed
etc
o Constantly
providing
up-to-date
information
to
the
guidance
system
o If
the
missile
is
slightly
off
course
then
adjustments
must
be
made
immediately
o A
one
second
delay
could
result
in
the
missile
hitting
the
wrong
target
16
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Temperature/pressure
control
o E.g.
sensors
in
a
nuclear
power
station
will
be
providing
data
on
the
current
temperature
of
the
reactor
o If
the
reactor
starts
to
overheat,
then
initiating
cooling
will
have
to
happen
instantly
to
avoid
a
potentially
dangerous
situation
Process
control
o In
the
manufacturing
process,
1000s
of
signals
per
second
can
arrive
from
sensors
attached
to
systems
being
controlled
o As
such
systems
are
fast
moving,
the
response
time
would
need
to
be
extremely
minimal
t.
identify
and
describe
the
purpose
of
different
types
of
user
interface:
forms,
menus,
GUI,
natural
language
and
command
line,
suggesting
the
characteristics
of
user
interfaces
that
make
them
appropriate
for
different
types
of
user
FORM-BASED
INTERFACE
Characteristics
o Has
specified
areas
for
data
input
(input/text
boxes)
o Has
a
cursor
which
moves
to
the
next
box
to
be
filled
in
o Provides
list
of
alternative
responses
through
drop-down
list
o Use
of
radio
buttons
and
check
boxes
to
enter
data
o Cursor
shows
position
of
next
input
box
to
be
filled
in
and
would
move
to
it
o Cursor
may
not
move
until
data
has
being
supplied
to
important
boxes
o Checks
input
is
sensible/help
button
available
Why
use
it?
o Computer
outputs
prompts
and
the
user
responds
o Presents
user
with
an
on-screen
form
in
which
data
can
be
viewed
or
entered
o Clear
instructions
to
prompt
user
o Makes
sure
information
is
input
in
the
correct
order
(standard
format)
o Simplified
validation
process-
fixed
options
of
drop-down
menus
o Very
few
errors
on
input
o Ensures
no
necessary
information
is
missed
When
is
it
used?
o Travel
agents
and
other
booking
systems
o Workers
taking
orders
over
the
telephone
MENU-BASED
INTERFACE
User
interface
which
obtains
input
from
the
user
by
displaying
a
list
of
options-
the
menus-
from
which
the
user
indicates
his/her
choice
by
using
a
sequence
of
key
presses
or
by
using
a
mouse.
This
may
lead
to
further
menus.
17
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
18
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
NATURAL
LANGUAGE
INTERFACE
Allows
user
to
interact
with
computer
using
a
human
language
such
as
English
Operated
via
use
of
microphone
or
keyboard
E.g.
Expert
systems
Benefits
o User
may
find
use
of
a
natural
syntax
easier
Drawbacks
o OS
has
to
try
and
interpret
what
the
user
has
requested
however
there
is
a
problem
because
the
English
language
is
full
of
ambiguities
COMMAND
LINE
INTERFACE
User
interface
that
involves
typing
in
commands
for
the
operating
system
via
a
keyboard
to
perform
specific
task
Least
user-friendly
and
can
only
be
used
by
a
computer
literate
Allows
most
direct
control
of
OS
Task
can
be
performed
quickly
by
entering
commands
directly-
need
not
follow
a
sequence
of
menus
or
windows
to
get
to
the
desired
options
Uses
o Technician
needing
access
to
the
whole
system
o Computer
programming
Benefits
o Low
processing
power
and
system
resources
required
o Experts
able
to
perform
complex
tasks
using
single
commands
quickly
Drawbacks
o Difficult
for
an
inexperienced
user-
requires
the
user
to
learn
a
large
range
of
text-based
commands
and
their
uses
o Easy
to
make
mistakes-
syntax
of
command
is
vital,
instructions
will
not
execute
if
the
command
is
typed
incorrectly
19
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Volume
of
data
o If
large
amounts,
operator
might
miss
seeing
some
information
o Information
must
be
ordered
o There
is
danger
of
information
overload,
leading
to
omissions
o Information
must
be
prioritised
as
only
some
data
is
crucial
o Information
must
be
presented
in
such
a
way
that
it
has
immediate
impact
Colours
used
o Must
be
enough
contrast
to
make
information
readable
o Sensible
use
of
colours
like
red
for
danger
o Must
be
consistent
Experience
of
the
operator
o E.g.
CLI
not
suitable
for
inexperienced
operator
Operator
disability
o To
ensure
that
disability
is
not
an
issue
o Is
the
operator
colour
blind/deaf/capable?
Hardware
choices
o Suitable
for
both
user
and
environment
to
be
used
in
Layout
o Information
spread
around
the
screen
o Important
information
in
top
left
of
screen
o No
overload
COMPRESSION
SOFTWARE
Reduces
the
size
of
files
by
cutting
out
much
of
the
duplication
of
data
in
the
stored
material
but
maintain
the
content
of
the
files
Used
to
speed
up
transmission
of
data
from
one
place
to
another
Files
are
decompressed
using
a
decompression
algorithm
at
destination
HARDWARE
DRIVERS
Contains
the
instructions
to
the
OS
for
using
a
peripheral
Used
to
configure
hardware
E.g.
would
be
used
when
a
new
printer
was
bought
in
order
to
install
communications
protocols
to
the
OS
ANTI-VIRUS
SOFTWARE
Continually
looking
out
for
the
characteristics
of
a
virus
It
will
delete
any
viruses
that
the
software
finds
20
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
FILE
HANDLERS
Set
of
programs
that
manage
data
storage
Allows
files
to
be
searched,
stored,
accessed,
altered,
deleted,
merged,
sorted,
ordered,
renamed
or
copied
BACK
UP
UTILITY
Automatically
makes
copies
of
files
To
prevent
loss
of
files
Protects
important
work
by
ensuring
that
back-up
copies
are
made
on
different
hardware
devices
and
at
regular
intervals
Incremental
backups
should
be
made
ERROR
CHECKING
SOFTWARE
Used
to
check
that
data
has
not
been
corrupted
after
data
transfer
from
one
part
of
the
system
to
another
Often
error
checking
software
will
automatically
correct
errors
E.g.
echoing
back
or
parity
checks
CHARACTER
SET
The
symbols
that
a
computer
can
recognise
and
use
Each
symbol
is
distinguishable
from
all
others
E.g.
ASCII,
UNICODE,
EBCDIC
APPLICATIONS
THAT
NEED
CHARACTER
SETS
OF
DIFFERENT
SIZES
Word
Processing
ATM
terminal
o ATM
uses
10
digits
+
6
command
codes,
with
4
bits
per
character
HOW
ARE
CODES
USED
TO
REPRESENT
DIFFERENT
CHARACTER
SETS?
Each
required
character
is
given
a
unique
binary
code
The
more
characters
required,
the
more
bits
in
each
code
The
number
of
bits
to
represent
the
code
establishes
the
size
of
a
byte
E.g.
ASCII
uses
8
bits
per
character-
256
maximum
number
of
characters
EBCDIC
uses
8
bits
per
character-
256
maximum
number
of
characters
UNICODE
uses
16
bits
per
character-
65536
maximum
number
of
characters
Number
of
characters
will
therefore
tend
to
be
a
power
of
2
Allows
keys
to
have
different
characters
21
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
MANUAL
METHOD
A
form
would
be
used
to
collect
the
required
data
The
form
should
not
be
ambiguous
The
data
is
then
input
into
the
computer
via
a
keyboard
i.e.
an
operator
would
read
the
data
in
the
form
and
type
it
into
the
computer
AUTOMATIC
METHODS
Voice
recognition
use
of
a
microphone
to
read
instructions
into
computer
Data
is
input
in
audio
form
directly
through
use
of
a
microphone
sound
waves
produced
are
sampled
and
digitalised
digital
values
compared
with
stored
values
in
a
library
of
sounds
digital
values
interpreted
by
computer
command
is
executed
if
understood
e.g.
security
systems/mobile
telephones
Barcodes
How
a
barcode
stores
data
A
barcode
comprises
of
patterns
of
light/dark
lines
of
varying
widths
Pairs
of
lines
store
digits
Check
digit
included
in
barcode
for
automatic
checking
Start
and
stop
codes
allows
bars
to
be
read
both
ways
How
data
is
input
from
barcodes
A
laser,
infrared
scanner
is
used
Reflections
show
up
thickness
of
lines
Check
digit
calculation
done
for
immediate
checking
of
reading
Start
and
stop
codes
decide
direction
of
reading
Barcode
reader
High
level
of
accuracy
achieved
Data
capture
is
fast
Eliminates
human
entry
Barcodes
can
be
easily
misread
by
the
system
Barcodes
are
easily
damaged
22
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
23
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Electronic
camera
o Camera
would
take
a
picture
o Lens
focuses
image
onto
matrix
of
receptors
o Picture
transferred
to
computer
via
cable
or
a
memory
card
Chip
and
pin
Personal
information
is
extremely
sensitive
and
valuable
Stored
on
a
computer
chip
embedded
into
a
card
Identification
code
(PIN)
required
to
gain
access
to
information
E.g.
credit
or
debit
card-
to
input
card
details
SENSORS
Input
device
that
detects
physical
quantities
Including
heat,
light,
sound,
movement
Sensors
convert
these
quantities
into
electrical
signals
E.g.
measuring
temperature,
measuring
humidity
Magnetic
Stripe
Card
Data
can
be
read
from
the
stripe
by
a
magnetic
stripe
reader
Encoded
information
stored
on
the
strip
can
be
automatically
read
into
a
computer
Very
accurate/input
not
prone
to
human
errors
Stripe
can
only
store
a
small
amount
of
information
E.g.
credit
card/debit
card/membership
card
VERIFICATION
Inputs
data/values
twice
to
the
computer
system
System
checks
the
two
inputs
are
the
same
Another
technician
also
enters
data/values
to
the
computer
system
System
checks
two
inputs
are
the
same
VALIDATION
A
check
on
data
input
to
the
system
by
comparing
the
data
input
with
a
set
of
rules
that
the
computer
has
been
told
the
data
must
follow
CHARACTER
CHECK/TYPE
CHECK
o Checks
to
see
if
entered
data
is
of
the
correct
type
o E.g.
letters
of
alphabet
the
name
RANGE
CHECK
o Check
to
see
if
the
value
entered
is
in
a
certain
range
24
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
LENGTH
CHECK
o Checks
to
see
if
input
data
contains
a
certain
number
of
characters
o Number
of
characters
entered
should
be
within
a
pre-defined
limit
FORMAT
CHECK
o E.g.
Herd
type
should
be
1
character
followed
by
3
digits
PRESENCE
CHECK
o Ensure
that
a
value
has
actually
been
entered
EXISTENCE
CHECK
o Input
data
is
searched
on
a
database.
If
data
is
not
recognised
then
either
the
data
does
not
exist
on
the
database
or
the
data
has
been
wrongly
read
CHECK
DIGIT
o In
a
string
of
digits,
one
of
the
numbers
is
special.
It
is
called
the
check
digit.
The
value
of
this
digit
is
calculated
by
applying
a
simple
algorithm
to
the
other
digits.
When
the
strings
of
digits
are
sent,
the
check
digit
is
calculated
again
at
the
receiving
end.
If
the
arithmetic
does
not
give
the
check
digit,
then
the
string
of
digits
have
been
corrupted
during
data
transmission.
GRAPHS
o Shows
trends
very
clearly
when
two
variables
need
to
be
compared
o Not
possible
to
take
reliable
readings
to
any
degree
of
accuracy
REPORTS
o Hard
copy
printout
of
values
for
future
reference/research
o Produces
the
actual
figures
specified
by
the
user
o May
need
skill
to
interpret
significance
of
the
figures
themselves
o E.g.
to
allows
analysis
of
a
patient
condition
in
a
hospital
VIDEO
o Takes
large
amounts
of
memory
to
produce
o Useful
for
demonstrations
of
technique
IMAGES/GRAPHICS
o Used
to
enhance
understanding-
shows
details
o Makes
trend
spotting
easier
o Created
using
graphics
packages
o scanned
into
computer
o imported
from
camera
25
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
SOUND
o Beep
to
signify
data
has
been
accepted
o To
present
alarm
signals
BACKING
UP
DATA
Making
copies
of
important
files
Storing
them
on
a
portable
medium
Copies
are
kept
away
from
the
originals
(master
files)
So
that
if
the
original
files
are
corrupted,
they
can
easily
be
replaced
REASON-
files
are
important
to
an
organisation
and
so
must
be
protected
Data
could
become
corrupted
and
data
could
be
lost.
ARCHIVING
Storing
the
data
produced
on
a
long
term
storage
device
So
that
it
can
be
referred
to
if
necessary
REASON-
Data
is
available
without
taking
up
space
on
working
storage
BACKING
UP
ROUTINE
Frequency
of
backup-
e.g.
back
up
copy
taken
weekly
On
or
Offline?
-
e.g.
at
least
one
copy
should
be
stored
offline
Multiple
copies
of
data
should
be
taken
Incremental
or
full
backups-
preferably
incremental
back
ups
taken
When
taken?
immediately
after
updating
of
data
on
computer
system
Where
stored?
-
Back
ups
should
be
stored
in
more
than
1
location
and
stored
in
secure
locations
Media?
copies
of
all
files
stored
onto
a
removable
storage
device,
e.g.
CDRW
3.1.4
HARDWARE
A.
describe
the
function
and
purpose
of
the
control
unit,
memory
unit
and
ALU
(arithmetic
logic
unit)
as
individual
parts
of
a
computer
CONTROL
UNIT
Manages
execution
of
instructions
By
sending
control
signals
to
other
parts
of
the
processor
using
busses
Controls
the
fetch/execute
cycle
o It
decides
which
instruction
to
carry
out
o Then
fetches
it,
decodes
it,
and
synchronises
its
execution
Synchronises
actions
using
inbuilt
clock
26
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
MEMORY
UNIT
This
is
where
everything
the
processor
is
going
to
use
is
stored
Stores
the
part
of
the
OS
currently
in
use
Stores
software
currently
in
use
Stores
data
needed
to
carry
out
those
instructions
ARITHMETIC
LOGIC
UNIT
(ALU)
Carries
out
arithmetic
calculations
carries
out
logical
decisions
acts
as
a
gateway
to
the
processor
B.
explain
the
need
for,
and
use
of,
registers
in
the
functioning
of
the
processor
(Program
Counter,
Memory
Address
Register,
Memory
Data
Register,
Current
Instruction
Register
ad
Accumulator)
A
register
is
a
small
area
of
memory,
within
the
processor
itself,
where
data
or
control
information
is
temporarily
stored
Registers
are
used
because
transferring
data
to
and
from
a
register
is
much
quicker
than
transferring
the
data
between
the
processor
and
main
memory
PROGRAM
COUNTER
Stores
the
address
of
the
next
instruction
Controls
the
sequence
in
which
instructions
are
executed
It
is
incremented
after
being
read
It
is
altered
as
a
result
of
a
jump
instruction
MEMORY
ADDRESS
REGISTER
(MAR)
Stores
the
address
in
memory
currently
being
accessed
Holds
the
position
in
memory
of
the
location
containing
either
the
next
piece
of
data
to
be
read
or
the
next
instruction
to
be
used
MEMORY
DATA
REGISTER
(MDR)
Stores
the
data
being
transferred
to
or
from
memory
Acts
like
a
buffer
between
the
IAS
and
CPU
CURRENT
INSTRUCTION
REGISTER
(CIR)
Stores
the
instruction
currently
being
operated
on
ACCUMULATOR
Temporary
store
for
the
results
of
the
last
arithmetic
or
logical
operation
until
it
is
decided
what
to
do
with
the
data
27
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
C.
explain
the
need
for,
and
describe
the
use
of
buses
to
convey
information
(Data,
Address
and
Control
buses)
ADDRESS
BUS
Carries
identification
about
where
the
data
is
being
sent/coming
from
Necessary
if
large
amounts
of
memory
need
to
be
used
DATA
BUS
Carries
data
being
transmitted
between
areas
of
the
processor
Two-way
bus
as
data
can
be
transferred
in
either
direction
CONTROL
BUS
carries
control
signals
from
the
control
unit
to
allow
synchronisation
of
signals
28
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Reason
o Program
is
required
immediately
when
power
is
switched
on
o Therefore
the
boot
program
must
be
in
ROM
RAM
(RANDOM
ACCESS
MEMORY)
Description
o Volatile
o Contents
of
memory
is
erased
when
power
is
off
o Processor
must
have
some
RAM
as
working
memory/buffer
Type
of
software
stored
o Applications
software
o Operating
system
o User
files
Reason
o Allows
changes
to
be
made
to
saved
contents
o Allows
changes
to
be
made
to
files
in
current
use/user
can
enter
data
o Fast
access
to
data
SECONDARY
STORAGE
DEVICES
Peripheral/external
device
which
allows
storage
of
data
over
a
long
period
Hard
disk
drive
(HDD)-
Magnetic
medium
o Used
for
storing
software
including
operating
system,
other
systems
software,
applications
programs
and
data
files
o Fast
access
to
data
o Large
capacity
o However
requires
formatting
before
use
29
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
PERIPHERAL
Hardware
device
that
is
external
to
the
computer
but
can
be
attached
to
the
computer
30
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
PRINTERS
Provides
a
permanent
output
known
as
a
hard
copy
Can
be
kept
for
later
use
E.g.
proving
evidence
for
updating
other
files
Advantages
of
sharing
printers
on
a
network
o More
than
one
printer
in
case
of
failure
o Ease
of
maintenance
o Each
user
has
access
to
different
types
of
printers
for
different
jobs
Disadvantages
of
sharing
printers
on
a
network
o Need
to
queue
for
printout
o Printouts
are
not
private
o Printer
may
not
be
local
o There
would
be
no
direct
control
over
printer
o Lack
of
back-up
if
printer
fails
PLOTTER
Type
of
printer
designed
for
drawing
lines
and
geometric
designs
Image
created
by
pens
begin
moved
across
a
piece
of
paper
Used
for
drawing
blueprints,
e.g.
detailed
drawings
of
buildings
ACTUATOR
Output
device
operated
by
a
computer
which
produces
and
controls
physical
movement
E.g.
in
rolling
process,
actuator
used
to
adjust
gap
between
rollers
MICROPHONE
Instructions
or
data
can
be
read
into
computer
SPEAKERS
Used
to
output
sound
from
a
computer
system
Tells
user
what
the
computer
has
processed
Useful
for
visually
impaired
people
instead
of
monitors
3.1.5
DATA
TRANSMISSION
A. describe
the
characteristics
of
a
LAN
(local
area
network)
and
a
WAN
(wide
area
network)
LOCAL
AREA
NETWORK
A
collection
of
computers
and
peripherals
over
a
small
geographical
area,
usually
one
building
or
site
LAN
can
be
hard-wired
using
cable
or
connected
via
a
short-range
wireless
system
31
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
WIDE
AREA
NETWORK
A
collection
of
computers
over
a
large
geographical
area
Machines
in
a
WAN
tend
to
be
spread
more
remotely
WAN
tends
to
use
third
party
communication
links
Data
on
a
WAN
is
subject
to
interception/attack
WAN
requires
a
modem
E.g.
Internet
LOCAL
AREA
NETWORK
SOFTWARE
o Network
Operating
System
(NOS)
o Communications
software
o Drivers
for
hardware
o Network
versions
of
applications
software
HARDWARE
o Network
Interface
Card
(NIC)
o Cabling/wireless
access
points
o Server
WIDE
AREA
NETWORK
SOFTWARE
o Same
as
LAN
HARDWARE
o Fibre-optic
cable
o Telephone
cable
o Infrared/microwave
satellite
o Need
for
a
modem/router-
to
link
the
LAN
to
a
WAN
NETWORKING
Why
network
computers?
o Allow
each
computer
to
access
up-to-date
information
o Shared
access
to
database/system
o E.g.
ticketing
system-
avoid
double-bookings
32
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
Advantages
of
networking
o Sharing
of
hardware
o Sharing
of
software
o Sharing
of
data
files
o Can
use
any
machine
Disadvantages
of
networking
o Fault
in
hardware
may
cause
problems
throughout
the
network
o Security
of
files
is
worse
o Viruses
spread
more
easily
C.
describe
the
different
types
of
data
transmission:
serial
and
parallel;
and
simplex,
half-duplex
and
duplex
modes
SERIAL
DATA
TRANSMISSION
A
byte
is
sent,
one
bit
at
a
time,
through
a
single
wire
Slower,
but
simpler
and
more
reliable
PARALLEL
DATA
TRANSMISSION
A
byte
is
sent
through
multiple
wires,
one
wire
for
each
bit
in
the
byte
Therefore,
multiple
bits
are
transmitted
at
a
time
Faster
but
less
reliable
because
the
bits
can
become
muddled
up
as
bits
will
naturally
be
transmitted
at
slightly
different
rates
SIMPLEX
DATA
TRANSMISSION
Communication
in
one
direction
only
HALF-DUPLEX
DATA
TRANSMISSION
Communication
in
both
directions
but
one
way
at
a
time
DUPLEX
DATA
TRANSMISSION
Communication
in
both
directions
simultaneously
D.
explain
the
relationship
between
bit
rates
and
the
time
sensitivity
of
the
information
BIT
RATE
The
rate
at
which
data
is
transferred
How
many
bits
that
can
be
sent
in
a
specific
time
period
Measured
in
bits
per
second/baud
E.g.
Streaming
of
a
video
to
a
machine
o Require
large
volume
of
data
o Video
file
is
large
and
is
used
immediately
o Time
sensitive
because
delay
will
interrupt
video
output
o If
delay,
video
will
freeze
or
lag
o Therefore,
requires
high
bit
rate
otherwise
data
becomes
useless
33
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
E.
recognise
that
errors
can
occur
in
data
transmission,
and
explain
methods
of
detecting
and
correcting
these
errors
(parity
checks,
the
use
of
parity
in
data
blocks
to
become
self-correcting,
check
sums
and
echoes)
PARITY
CHECKS
Number
of
ones
in
a
byte
is
either
always
odd
or
always
even
System
has
been
initialised
to
always
expect
either
odd
or
even
number
of
ones
in
a
byte
Each
byte
has
one
bit
called
the
parity
bit
which
does
not
contain
data
It
is
set
to
1
or
0
in
order
to
maintain
the
agreed
odd
or
even
parity
When
transmitted,
the
number
of
ones
should
match
agreed
parity
If
not,
the
byte
contains
an
error
USE
OF
PARITY
IN
DATA
BLOCKS
TO
BECOME
SELF-CORRECTING
Each
byte
has
a
parity
bit
Each
bit
place
has
also
got
a
parity
bit
All
parity
is
checked
If
there
is
an
error
in
the
parity
for
a
byte
and
the
parity
for
a
place
value
Then
where
they
intersect
will
be
the
faulty
bit
If
it
is
0,
change
it
to
1
If
it
is
1,
change
it
to
0
If
more
than
one
error
in
the
block
has
occurred
then
data
is
re-transmitted
CHECK
SUMS
Blocks
of
bytes
are
added
together
before
transmission
This
total
is
transmitted
with
the
block
The
same
calculation
is
done
on
the
data
blocks
at
the
destination
The
result
is
compared
with
the
transmitted
value
If
different,
a
transmission
error
has
occurred
34
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
ECHOING
When
a
set
of
data
is
transmitted
from
one
device
to
another
The
received
data
is
retransmitted
back
to
the
sender
It
is
then
compared
to
the
original
data
Any
differences
will
signify
a
transmission
error
And
the
original
data
is
retransmitted
PACKET
SWITCHING
File
of
data
split
into
packets
which
are
sent
onto
the
network
Each
packet
is
sent
to
the
destination
via
different
(individual)
routes
Packets
arrive
at
the
destination
at
different
times
and
in
a
wrong
order
Packets
must
be
reordered
at
destination
CIRCUIT
SWITCHING
Route
is
deserved
before
transmission
For
the
duration
of
the
transmission
All
packets
follow
the
same
route
Packets
arrive
at
the
destination
in
the
correct
order
PACKET
SWITCHING
No
established
route
CIRCUIT
SWITCHING
Establishes
a
route
along
which
to
send
packets
for
duration
of
message
All
packets
follow
the
same
route
Message
can
be
easily
intercepted
because
all
packets
are
on
the
same
route
Packets
remain
in
correct
order
H.
define
the
term
protocol
and
explain
the
importance
of
a
protocol
to
the
transmission
of
data
PROTOCOL
A
set
of
rules
to
govern
communication
between
devices
35
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
J.
explain
the
need
for
both
physical
and
logical
protocols
and
the
need
for
layering
in
an
interface
PHYSICAL
PROTOCOLS
Wireless/hard-wired?
What
frequencies?
Serial
or
parallel?
Radio
or
microwaves?
Copper
cable
or
fibre-optic?
LOGICAL
PROTOCOLS
Baud
rate
Error
correction
technique
Routing
Flow
control
Packet
size
Compression
type
File
type
LAYERING
Protocols
are
arranged
in
layers
because
it
allows
different
rules
within
a
protocol
to
be
set
up
independently
Layers
are
ordered
which
simplifies
the
creation
of
the
protocol
Allows
manufacturers
to
design
for
particular
layers
Changes
can
be
made
by
altering
a
single
layer
and
the
links
to
the
other
layers
in
contact
with
it
36
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
UNRESTRICTED
ACCESS
TO
THE
INTERNET
Social
o Less
socialising
because
young
people
on
computer
all
the
time
o See
other
societies
which
may
cause
friction
with
parents
and
other
figures
of
authorities
o Will
raise
expectations/wants
o Will
increase
knowledge
of
other
societies
o Give
opportunity
to
communicate
directly
with
others
Ethical
o Copyright
and
plagiarism
o Use
of
internet
for
educational
purposes
o Use
of
internet
to
spread
understanding
WORKING
FROM
HOME
Economic
o Employees
save
money
on
commuting
o Company
would
not
need
to
supply
offices
Social
o Ability
to
work
at
own
times
(more
flexible
working
hours)
o More
freedom
with
family-
combine
work
and
family
commitments
o Save
time
on
commuting
o However
more
easily
distracted
o Lack
of
social
contact/interaction
between
people
(feeling
of
isolation)
o Team
communication
more
difficult
o Difficultly
if
system
malfunctions
o Company
would
have
less
control
over
the
work
of
individuals
o Less
flexibility
in
altering
course
of
work
o Opportunity
for
employment
of
disabled
people
o Difficult
to
arrange
meetings
Ethical
o Less
pollution
(more
environmentally
friendly)
o Reduced
traffic
congestion
as
fewer
cars
on
the
road
37
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
C.
discus
the
effects
of
privacy
and
confidentiality
of
data
held
in
computer
systems
and
steps
that
can
be
taken
to
protect
confidentiality
Measures/steps
o Use
of
firewalls-
prevent
identify
theft
To
stop
signals
from
unauthorised
users
reaching
the
system
o Passwords
Restrict
access
to
system
and
files
Passwords
should
use
a
mixture
of
cases
and
characters
for
security
38
Computer
Fundamentals
OCR
Computing
F451
Bhavesh
V
Tailor
o Encryption
So
that
if
unauthorised
access
is
gained,
the
data
is
unintelligible
o Proxy
server
Restricts
the
users
allowed
access
to
individual
machines
on
network
from
internet
o Intrusion
detection
system
Warns
when
uninvited
access
is
attempted
STORNG
PERSONAL
DATA
Information
is
confidential
and
sensitive
Information
must
be
accurate
Clients
must
have
confidence
that
measures
are
being
taken
to
protect
their
data
Data
stored
must
be
updated
regularly
to
ensure
irrelevant
data
is
not
kept
There
is
worry
about
identify
theft
and
fraud
Legislation
may
stop
data
being
passed
on
DATA
PROTECTION
ACT
Features
Data
must
be
kept
secure
with
no
unauthorised
access
Data
must
be
obtained
and
processed
lawfully
and
fairly
Data
must
be
accurate
and
up-to-date
Data
cannot
be
transferred
to
a
3rd
party
without
permission
Data
should
not
be
excessive
Data
must
be
relevant
Data
must
not
be
kept
longer
than
necessary
Personal
data
should
not
be
transferred
to
outside
the
E.U
Limitations
Difficult
to
monitor
whether
companies
are
abiding
to
the
principles
of
the
act
Some
parts
of
the
world
may
not
comply
to
data
protection
law
The
changing
nature
of
technology
requires
constant
reviewing
of
data
protection
legislation
39