P. 1
Computer Studies

Computer Studies

|Views: 191|Likes:
Published by Michael Scofield

More info:

Published by: Michael Scofield on Sep 06, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less






  • A Computer System
  • Algorithms and Flowcharts
  • Bar Codes
  • Batch Processing
  • Billing Systems
  • Bits and Bytes
  • Bulletin Boards
  • Bus
  • Star
  • Ring
  • Cache
  • CAL and Computers in School Administration
  • CAM
  • Codes of Practice
  • COM
  • Computer Misuse Act
  • Exercise : Computer Misuse Act
  • CPU (Central Processing Unit)
  • Data
  • Text (alphanumeric) John Smith
  • Decimal (real numbers) 432.5
  • Integers 432
  • Currency £12.50
  • Pictures
  • Sounds Boo!
  • Moving graphics / Video Clips
  • Data Collection
  • Data Capture Forms
  • Data Encoding
  • Exercise : Data Protection Act
  • Passwords
  • Voice prints
  • Identity Cards
  • Data Transfer
  • Data Transmission
  • Data Validation
  • Data Verification
  • Databases
  • Digital camera
  • Distributed Systems
  • Documentation
  • E-Commerce
  • Health risks
  • Email
  • Embedded systems
  • Employment
  • Exercise : Employment
  • Expert Systems
  • Disadvantages
  • Expert Systems in Medicine
  • Fax
  • File Access
  • Serial Access
  • Direct Access
  • File Backup
  • File Generations
  • File Merge
  • Merging files (in words) :
  • Example : File 1 :
  • Merged file :
  • File Operations
  • File structure
  • NumberSurnameFirstName Form
  • How it works (in words) :
  • How it works (System flowchart) :
  • Fixed Length Fields
  • Field NameField Size
  • Floppy disks
  • DO NOT
  • Graph plotter
  • Graphics
  • Graphics Tablet (Pad)
  • Hard disks
  • Exercise : Hard Disks

All Topics

A Computer System Algorithms and Flowcharts Applications Software Bar Codes Batch Processing Billing Systems Bits and Bytes Booking Systems Bulletin Boards Bus, Star and Ring Networks Cache CAD/CAM CAL and Computers in School Administration CAM Codes of Practice COM Computer Control in Hospitals Computer Misuse Act Control Systems CPU (Central Processing Unit) Data Data Collection Data Compression Data Encoding Data Protection Act Data Security Data Transfer

A Computer System. A computer system has three main stages :

1. The Input Stage - where data is put into the computer. 2. The Processing Stage - where the data is processed. 3. The Output Stage - where the results are displayed.
A computer also needs to store data for later use. This is done on a backing storage device.

A typical computer system :

The arrows show the flow of data.

Algorithms and Flowcharts An algorithm is a sequence of steps used to complete a task. Algorithms may be presented... • • • in words as a flowchart in structured code
The word 'sequence' implies there is an order to the steps.

A computer program is an algorithm written for a computer in a special programming language.

Example in words : Go straight on to the traffic lights, turn left and take the third turning on the right. If the red gate is open then go through it, otherwise go through the green gate. Example as a flowchart :
Flowcharts have terminators (Start and Stop boxes)...and the algorithm is determined by direction on the flow lines. Decision boxes are diamond shaped.

Example in structured code : Go straight on to the traffic lights; Turn left; Take the third turning on the right; If the red gate is open then go through the red gate else go through the green gate end if; Applications Software

Each line is executed in turn...

Examples: • a word processing program (can be used to produce a legal document. • • Applications programmers write the software using a computer programming language.An applications program enables a user to perform a specific function. a school homework essay etc) spreadsheet program a database program. An applications package is a complete set of applications programs and documentation. This method of data entry is used in big shops and . computer game If an application program can be used in many different areas it is usually called a generic program (or content-free program). Examples : • • • • • school management software. Bar codes are read using a Bar Code Reader. Programs can be configured to the specific needs of a user by altering the coding. a newspaper article. taxi service system. theatre booking system. which can be in the form of a hand-held ‘wand’ or a stationary laser scanner over which the bar code is passed. Bar Codes A bar code is a set of parallel printed lines of differing thicknesses which are used to store coded information about an item. air traffic control system.

how much has been paid etc.electricity payments. This may be done using OMR or OCR. There is no interaction between the user and the computer while the program is being run. The reading is recorded onto pre-printed forms. Advantages • • • a fast method of data entry eliminates possible human error Disadvantages scratched or crumpled barcodes may cause problems Batch Processing A batch processing system is one where programs and data are collected together in a batch before processing starts. The data must be validated before it is processed to A document produced by the computer which is later used as input is called a turnaround document. The file will also include information such as latest meter readings. Jobs are stored in job queues until the computer is ready to process them. Example : Payroll . The forms are all collected and input to the computer system. meter readers go round each house to read the electricity meter. how much electricity the customer has used this year.. The electricity company has a large database (master file) of all its customers. or by manually keying in the data. Computers which do batch processing often operate at night.supermarkets and in libraries. .. A job usually consists of a program and the data to be run. At regular intervals. Each piece of work for a batch processing system is called a job.when a company calculates the wages for its workforce and prints payslips. Every customer receives an electricity bill which must be paid. Billing Systems An example of a billing system is .

make sure no 'silly' data is input.. Payments received will need to be recorded as transactions on a transaction file and used to update the master file. These bills will be posted to the customers. The electricity bill for each customer is calculated by the computer and printed.. Some customers may pay by monthly standing orders or direct debits. Keyed data will need to be verified to check for transcribing errors. For some billing systems statistical analysis can be done on . • • customer usage or spending patterns (eg seasonal variations) payments . The customer then pays the bill by either sending a cheque or by credit/debit card.

Bits and Bytes The size of a computer's memory is measured by the amount of data which can be stored in it. so for example the number 0110 is a 4-bit binary number... Each of these can only be in one state (0) or the other (1). 8 bits is called 1 byte. This means that there are 640 kilobytes of memory in the computer. (A is 01000001. B is 01000010 etc. A Megabyte (abbreviated to Mb) is 1024 kilobytes. ASCII stands for American Standard Code for Information Interchange. This is measured in bytes.. Booking Systems . Using the ASCII system of coding each character is stored as a unique 8-bit pattern.. 1011001011001010 0110100100010111 1110101110110100 1101101000100010 0001001010010010 1001011011101010 . A Kilobyte is 1024 bytes. A Kilobyte is usually abbreviated to K. The reason that binary numbers are used is that memory consists of millions of two-state devices (think of them as switches). Data is stored in memory as a number of 0s and 1s. and you will sometimes see a computer described as having 640K RAM. Each of these is called a bit (Binary digIT). so to store the word ‘FRED’ would need 4 bytes of storage....Most computers use the same system so data can be transferred from one computer to another. 1 byte of storage is needed to store one character. so 1 Mb = 1024 x 1024 bytes = 1048576 bytes (approx 1 million) A Gigabyte (abbreviated to Gb) is 1024 Mb so 1 Gb = 1024 x 1048576 = 1073741824 bytes (approx 1 billion) You can think of data stored in memory or on disc as looking like..)..

on a form on an Internet web page. The computer will check to see if the booking is available. number of people etc). This form (on an Internet web page) is used for collecting details of a passenger's booking on the Eurotunnel.. trains. the booking is . planes. This is an example of a multi-access system. These details may be entered .It is now possible to make bookings on-line for holidays. hotel rooms. date. by transcribing them from a paper booking form.. and.and many others.. A travel agent for example. theatre performances. the customer will need to provide input details (name. • • • • at a computer terminal in a multi-access system. When a booking is made. These details are then used as input data when the booking is made. place. by typing them in when in telephone communication with the customer. may have computers in all its branches directly connected to a central computer where a database of all bookings is stored. This data is validated to check if the details are sensible. if it is..

enabling worldwide 'newsgroups' to exchange information on topics of interest.possibly using a tape streamer. so the database will have to be regularly backed up . Bulletin Boards A bulletin board is accessible using the Internet and is a place where people who share a common interest may leave or read messages. Less cabling but can be slow if there are a large number of users. As soon as a customer makes a booking it has to be processed immediately. then these can generally be done on-line using a Credit card or a Debit card. If payments for the booking are required. Documents will need to be output to give to the customer. so that no other customer can make the same booking. This means it is a real-time (transaction processing) system. the website must be secure so that this information cannot be stolen. It is essential that no data is lost. confirming the booking and giving details about it. .made and it will then store the booking details in the database. Bus. Especially popular on Usenet. Star and Ring Networks Network topologies (ways in which computers are arranged in a network) Bus Each computer is linked to a bus (cable) and there are terminators at each end of the bus. If details of these are transmitted over the Internet.

Ring Token Ring Network 'Tokens' of data are passed round the ring (in one direction only) and collected by the receiving computer. Cache Modern software usually requires a large amount of memory in a computer in order to operate. . Access from disk is much slower than from RAM so the speed of operation will be reduced if disk cache is used. A faster system and it is easier to add more computers. Most computers use a part of the hard disk as extra memory. Data stored in memory which is not actually needed immediately is temporarily moved into the disk cache and moved back into memory when it is needed. The computer will seem to have more memory than it really has. The disadvantage is that if this file server breaks down then all the computers are affected. CAD/CAM CAD stands for Computer Aided Design.Star Star Network All computers are connected to a central computer (file server).

CAD is used for displaying and editing designs on the computer.The image can be rotated or viewed from different angles. • • • cars bridges buildings . The arrangement can be changed on the computer and 'tested' without needing to move actual furniture around. (Graphics pads) Input may be from a keyboard.. This can be viewed from a number of different angles. Example : CAD can be used for interior design work. Graphics tablets. Arranging furniture in a room.. Calculations can often be made. Some CAD packages allow 3D design... graphics pad or touch-screen monitors. CAD can be used to design.

stresses etc) designs can be tested (eg electrical circuits) ... .are used to produce the product. CNC devices receive the production instructions from the computer as numbers.. volumes. • • • • • creating and editing new designs viewing designs from different angles adding standard pre-designed shapes from a library calculations (areas.• • • • boats engines circuit boards ... The result of any change can be quickly analysed. CAM uses a computer to control a manufacturing process.. CNC (Computer Numerical Control) machines such as • • • • • • lathes milling machines drilling machines welding machines soldering machines robots. .printed out using a graph plotter.. ...used as input for a CAM process.... In the CAD/CAM process slight changes to design are quickly and easily made and implemented. Finished designs may be • • CAM stands for Computer Aided Manufacture.and many more Facilities include..

Cutters on a swivelling head receive instructions and shape a block of metal. • • • • text . • • • • • more interesting learning with interactive systems and multimedia . Benefits of CAL.a commentary or music background animation self assessments . CAL courses may use .so greater motivation students can learn at any time students can learn from any place eg home students proceed at their own pace not so many teachers needed .notes and other resources graphics sound ... You are using CAL right now! • CAL systems use interactive computing...A milling machine. CAL and Computers in School Administration CAL stands for Computer Assisted Learning.for the student to know how much has been learned.

Pupils generally learn better when they study on their own and can learn at their own pace.. A school which has networked computers may have an Intranet which provides web-based resources available at any workstation..or even knitting machines. their teachers. Word processing or DTP software may be used to produce documents for the teachers or pupils. This database can be searched to produce eg class lists Pupil assessments may also be recorded (test and exam results) so that pupil progress can be monitored. This database will store personal data about the pupils as well as the classes they take. Timetables are produced using special software. (CNC stands for Computer Numerical Control and means that instructions for the machines are given as numbers. CAM CAM stands for Computer Aided Manufacture. The . medical information etc. Output from a computer is used to control CNC manufacturing machines such as millers or lathes. CAD is used to produce the design of a product and the code to run the CNC machine is output. Computers in School Administration Most schools now have a large database of pupil details. Spreadsheets may be used to calculate and monitor the school's financial budget. Some school may have on-line registration systems where pupils use swipe-cards (with magnetic strips).) CAD/CAM is the whole process of design and manufacture using computers.

It is not legally binding but the business would ask an employee to agree to it before being employed and would be grounds for dismissal if they were not obeyed. COM COM is a technique of reducing documents in size and photographically printing them so that they can be read using a special magnifying machine. It is always in the best interest of a business to treat its customers fairly and with due consideration .machine then manufactures the product. It ensures consistency of practice. Codes of Practice A Code of Practice is a set of standards that a business would expect its employees to conform to. Advantages : • • uses much less storage space film lasts longer than paper Computer Control in Hospitals .or they will go elsewhere. Microfilm is a roll of film and microfiche is a rectangular sheet of film on which many frames (pages of information) can be stored. Microfiche readers are needed to read the very small text and pictures. Example : Newspapers might be archived on microfiche. All employees would conduct their business in a similar way.

.....disadvantages. If any of these readings goes outside acceptable levels an output signal sets off an alarm to alert the nursing staff. • • • • gain unauthorised access to a computer's software or data (hacking) . This includes planting viruses.The main use of computer control in hospitals is in lifesupport systems.. The Computer Misuse Act makes it illegal to. . gain unauthorised access to a computer's data with the intention of altering or deleting it. copying programs illegally (software piracy) A conviction may lead to a fine and a 5-year prison sentence. Computer Misuse Act The Copyright Act makes it illegal to copy and use a file or software without the owner's permission..including the illegal copying of programs. gain unauthorised access to a computer's data for blackmail purposes. These systems may be used for • • • • • • patients in intensive care (eg after operations) prematurely born babies The advantages of this system. monitoring can be continuously done 24 hours a day no chance of human errors due to eg tiredness frees the nursing staff to carry out other duties these systems are expensive but. Sensors attached to a patient monitor • • • • pulse temperature blood pressure breathing rate The readings are taken at regular intervals and used as input to a computer..

U.heat sensors.Exercise : Computer Misuse Act The Computer Misuse Act was introduced to prevent Viruses Copyright infringements Hacking Using computer data for blackmail or fraud Illegal deleting or altering of computer data Control Systems The output from a computer may be in the form of a signal to a hardware device. sound sensors.L. sensors are used to measure a physical quantity and send input to the controlling computer. The computer responds by sending an output signal to a control interface which activates various devices eg a switch or an alarm. The control interface is needed because of the different operating characteristics of the computer and the devices. The computer will then analyse the data and send output signals. The Control Unit . CPU (Central Processing Unit) The Central Processing Unit (CPU) of a computer is the main processor which operates the computer . • • The A. humidity sensors. The CPU has three main parts. Sensors continually send information about the temperature and humidity in the greenhouse to the computer. if necessary. to activate the ventilators or sprinkler systems. movement sensors.. light sensors. Example: A computer may be used to control a greenhouse. Commonly used sensors are .ie it carries out the instructions of the program being run.. (Arithmetic and Logic Unit) which performs all the calculations. The output signal may be sent a to an actuator which activates a mechanical device such as a motor.which controls the A microprocessor . In a control system.

Microcomputers would have a single CPU but parallel computers have a number of processors which share the processing tasks.which is used to store data. Data consists of raw facts and figures. Data can be of different types Data Type Text (alphanumeric) Decimal (real numbers) Integers Currency Dates Calculated Examples John Smith 432. facts from a survey. ALL data is represented as numbers. Pictures Sounds Boo! Moving graphics / Video Clips In a computer system. A computer processes data to output information. Data Computers process data.flow of data round the computer by sending out control signals. • Memory . Examples : Exam marks. People apply rules and make deductions from this information to produce knowledge. .5 432 £12. readings from a light sensor.50 12/03/02 an average of exam marks.

easily read and should match the document being copied.. This is called transcribing the data. Example : School registers. . MICR). are easy to fill in and there should be no doubts as to how to enter data.. (GIGO = Garbage In Garbage Out) Data Collection Before data is input to a computer it needs to be collected.. These forms are called data capture forms (questionnaires) and need to be carefully designed... Eg Format of dates should be specified . Example : A membership form for a club may need to be filled in by a pupil wanting to join. The data is entered twice by two different people and the computer will only accept the data if the two versions are identical.but often the data is typed in. When data is typed the input screen should be designed to be attractive. These answers will then need to be typed into a computer for analysing. Some forms can be read automatically by special machines (OMR. Data preparation is the process of transferring the data into a form which can be processed by a computer. Data Compression . Answers to questions are filled in by people on speciallyprepared forms.dd/mm/yy This method is liable to errors when the data is entered into the computer (Transcription errors). Data capture Forms must be designed so they have instructions.. There are several methods of doing this: Data Capture Forms. OCR.If we put the wrong data into a computer we will get the wrong results.. One method of avoiding transcription errors is verification.

.. . Graphics files take up a lot of space and usually include a number of repeated bytes. PKZip and WinRar Common file extensions of compressed files are .. For example a gender field may be stored as codes (eg 'M' for Male. a program can be run which compresses the data so that the data takes up less storage space... A disadvantage is that the file will need to be decompressed before it can be used. Example : Normally each character is stored as an 8-bit binary number. • • • makes data entry easier (less to type) saves storage space makes validation easier Validation rules can be set to check if gender data entered into a database is either 'M' or 'F'.rar Compressed files are often referred to as Zipped files.but consists of 6 numbers instead of 10. eg The data 28 28 28 45 45 45 45 45 81 81 could be stored as 3 28 5 45 2 81 with no loss of information. One method of compressing data is to assign the common characters a smaller number of bits and the less commonly used characters a larger number of bits. A number of different codes are defined for the data. Some examples of Compression programs are WinZip.. This is useful when files are to be transmitted over a network or attached to an email as the transfer will take less time.zip. Data Encoding Data may be encoded when it is stored. 'F' for Female). . (encryption) Data Protection Act . This.When storing a file.. A special program is needed for compression and for decompression although some compressed files will automatically decompress themselves. Data may also be encoded for security reasons..

. The organisation must make sure that. • • • National Security Crime Taxation The full details of the Data Protection Act can be found at http://www.. Examples : • • • • • Tax Office Doctor / Dentist National Insurance DVLC Police .gov. The organisation must....and many others.There are many organisations which hold personal information about individuals.. • • • • • • • • gather the data fairly and lawfully gather only data needed for the stated purpose make sure the data is not used for any reason other than the stated purpose make sure the data is accurate and up-to-date make sure the data is secure not keep the data for longer than is necessary view the data stored about him have the data changed if it is incorrect The individual has the right to The exemptions to the Data Protection Act are organisations that hold data about. . The Data Protection Act (1998) states that organisations which store personal information must register and state the purpose for which they need the information.hmso.htm Exercise : Data Protection Act The Data Protection Act states that organisations that hold personal data must register and state the purpose for which the data is needed..uk/acts/acts1998/19980029.

to identify the person. view data held about them have incorrect data changed refuse to have their data stored Exemptions to the Act are organisations which hold data involved with crime. the person is then authorised to view. retina (eye) scans. Different people may have different levels of authorisation. . or edit the data.. face recognition. If the password is accepted... Data Security Ways of keeping data secure include the following software and physical methods: Passwords (software) Password protection usually involves a person typing in. A Password .to authenticate the person. Encryption (software) The data may be encrypted (coded) into a form which can only then be decoded by the intended user.. Voice prints (physical) A person speaks into a microphone and the computer analyses the voice. taxes or National security. If the data falls into the wrong hands it will be meaningless. A User Name . the computer allows entry to a room or allows access to a computer. He should be the only one to know what it is. If it belongs to an authorised person. Methods of identifying people from biological data are called 'Biometrics' and include fingerprint scans.the data is formatted correctly the data is kept up-to-date and accurate the data is only used for the stated purpose the data is passed on to other companies the data is kept secure the data is collected fairly and law fully only data needed for the stated purpose is gathered the data is backed up regularly the data must not be kept longer than necessary (select only the relevant lines) The individual has the right to.

Locks (physical) Rooms may be locked. preferably in a fire-proof environment. a person may have to swipe an identity card through a card reader. Identity Cards (physical) Backups To guard against the loss of data. backups should be regularly made. (Fire-proof safes are available). If data is lost then it can be re-created by . Some computers may have locks on them. In order to gain access to a room or a computer. These backups should be stored in a separate place. Transactio n Log A transaction log is a record of all transactions made by a business since the last backup was made. File dumps on paper can be a useful back-up.

. Each computer needs a special wireless network card. emailed to another user who could import it into a wordprocessed document.loading the previous backup and reentering all the transactions. . This transfer is possible because of standard file formats.gif...bmp. Cable can be twisted-pair. A wireless hub receives and transmits data to each computer. Data Transmission Data in a network can be transmitted using : Cable Each computer has a network card installed with appropriate network software. Standard file formats for graphics include . Example : A graphic created using a graphics package may be saved. Infra-red. The transfer may be between different software packages or between different computers.tif etc. Radio) Data is transmitted using radio. Data Transfer Data created using one software package may often be transferred into another. Wireless (Microwave..rtf.. . Standard file formats for text include . . or optical fibre. . coaxial.jpeg. and is linked to another computer using a network cable.. . .doc. infra-red or microwaves. Different applications software will store data in the same format..txt Data may also be transferred between applications using copy and paste.

If the speed is slow.. Eg the month of a person's DOB should lie between 1 and 12 presence check This checks that important data is actually there and has not been missed out. type check A check that data is of the right type. .No cabling involved. Methods used for validation are. range check This checks that the data lies within a specified range of values.. Eg Customers may be required to have their telephone numbers. Satellite There are now hundreds of satellites orbiting the Earth which can be used to 'bounce' signals off. • • a user will find it takes a long time for a response from a computer to be made it will take a long time to download data Data Validation Data validation checks that the data is sensible before it is processed.. Data Transmission speeds may vary.. text etc length check Checks that fields have the correct Presence checks can be carried out by running queries that look for 'Null' fields. Eg number.

Checking for errors by looking through the data. After transmission. The last digit is a check digit. The batch total is entered and the computer checks that the total is correct. Eg A bank account number may always be 10 digits long. Eg Add the 'Total Cost' field of a number of transactions together. Used to check for transmission errors over networks or between memory and disk. each binary number is checked to see if it still has an even number of '1' bits. (eg paper to disk. The computer checks this calculation when data is entered. Example (Even parity) Visual check Parity . Eg Add the Telephone Numbers together for a number of Customers..number of characters. Verification is used to prevent errors occurring when data is copied from one medium to another. hash totals This is just a batch total done on a meaningless field. Eg Proof-reading a typed document.. memory to disk) Methods used for verification. An extra bit is added to each binary number before it is transmitted. The computer will only accept the data for processing if the two versions are identical. disk to disk. Even parity systems make sure that each number has an even number of '1' bits. An extra digit is added to a number which is calculated from the other digits. batch totals This checks for missing records. Numerical fields may be added together for all records in a batch. The data is entered twice (by two different people). Data Verification It is important to prevent errors occurring in data. Double keying Used to check for transcription errors. Eg The ISBN number on a book. check digits Used for numerical data.

Each file (table) has a number of related records. (5 '1' bits) then the computer knows a corruption of the data has occurred.. • • • • • • • • define the data structure (field names and types) enter and edit data import data from saved files or other applications search for data by using queries (including AND..(6 '1' bits) and 11010011 is received . averages etc. set security levels . Databases allow the user to.. Each record consists of related fields... Data is stored in files (tables). Databases A database stores and organises data and allows the user to access it in a number of different ways.If 11010111 is transmitted . OR and NOT) sort data into alphabetic or numeric order validate data on entry output reports which may include totals.. Microsoft Access is an example of a Database package..

. Documentation All software packages include documentation. The operating system will control access to the resources. The Technical Manual is written for other programmers or computer experts and may include. Distributed Systems In a distributed system.more pictures can be taken at a lower resolution...Digital camera A photograph can be taken by a digital camera and then downloaded into the computer from the camera. computers and peripherals are linked together. The User Manual is written to make sure the user can use the software and should be written in simple language. A user on one computer may be running a program stored on another computer accessing data stored on yet another computer. The resolution of the pictures can be set . Some digital cameras are used as surveillance cameras eg for taking pictures of speeding cars. .. There is no need to buy film. The User Manual is written for the user and may include. Each user is not aware of which computer or peripheral he is using.. • • • instructions for installation instructions for use trouble-shooting guide (what to do if it goes wrong!) The Technical manual is written for other programmers who may need to alter some of the software and may include technical computer terms.

Retailers create websites which display the items they are selling. This will be helped if long wordy explanations are replaced by. Advantages of e-commerce: • • • • greater range of goods can be done from home goods are delivered to the door-step the business does not have to provide and pay for premises Disadvantages : • • • there is a couple of days delay before receiving goods. possibility of credit card information getting into the wrong hands you cannot see or touch the goods before buying Electronic Office and Safety . Customers load the web-site and add the items they wish to buy to a 'shopping-basket'. • • • • • graphs tables flowcharts diagrams photos E-Commerce Shopping over the Internet is increasingly popular..• • data flow diagrams (or flowcharts) showing how the program works. (Credit card details are encrypted on secure sites) The goods are delivered to the buyer's house. program listings Documentation should explain software (or a system) as simply as possible.. and then pay by credit or debit card.

• • • • • for word processing eg for documents. for spreadsheets eg accounts and budgets. • • • • eye strain (looking at computer monitors for too long) neck/back strain .tendon injury from using keyboards too much. The aim is to make a paperless office . contracts.where all information is sent and received electronically. Email would be used to send messages to customers and between employees.. letters.from lack of exercise.. The business may use the Internet for advertising and allowing e-commerce... daily transactions. brochures. • • • finding information should be fast costs should be reduced (eg cost of paper) storage space should be minimal Computers would be used. ... fitness problems ... In the paperless office...from poor seating arrangements RSI (Repetitive Strain Injury) . for presentations eg annual report.. Health risks..Most businesses use ICT in their office.. for databases eg of customer details.. for DTP (Desk Top Publishing) for creating pamphlets. These computers would be networked... An Intranet would store important information used by the business.

The study of the working environment is called ergonomics. Files (text. Advantages of email over conventional mail (snail-mail) : • • • • • • messages arrive much faster (within a few seconds) it is cheaper to send an email one message can be sent to a number of users. music. Each user has a unique email address. video clips etc) can be sent with the message as an attachment. This picture shows how you should be sitting at a computer! Other measures for prevention of accidents.. do not leave wires where they can be tripped over. do not bring food or drink near computer equipment. do not overload electric sockets. attachment files can be sent no stamp needed can be sent from home . A user can send messages to another computer user.pictures.. make sure fire extinguishers are installed.. • • • • Email Email stands for Electronic Mail.

• • • • reply to a received message forward a message on to another user keep an address book of email addresses keep mailing lists so that the same message can be sent to groups of users WARNING!.. processing and output of data. Examples : Microwave Washing machine . Embedded systems An embedded system has processors built in to a machine.filters can be used to eliminate this.Disadvantages of email : • • • • • you can only send a message to other users with email accounts email attachments can contain viruses you cannot send physical objects messages can only be sent to other email users unwanted junk email may be sent to you in large amounts! .Some viruses spread by sending emails to all the users in the address book. Email facilities may also include. These deal with the input.

Some jobs have been created and others have been lost. New jobs created include . DVD players. calculators. Workers have often had to be re-trained to use ICT in their workplace. Most jobs now require some ICT skills. boring or paper-based employment to lose their jobs manual assembly w orker refuse collector office filing clerk type-setters in a printing firm taxi driver eg but has created others . games consoles.and many more. Employment ICT has changed the nature of jobs. ATMs (cash machines).. • • • • • • • computer programmers systems analysts computer technicians robot maintenance boring or repetitive jobs replaced by robots (Eg assembly line) dangerous jobs replaced by robots office jobs ... digital cameras.fewer workers needed Jobs which have been lost include.... Exercise : Employment ICT has caused some workers in repetitive..... mobile phones..A guided missile. Other examples : Traffic lights.

. the question will be asked.. • • • • it must not be too expensive it must be able to do the job it must be reliable it must not be too difficult for people to use The software chosen must be appropriate... • • • • • it must not be too expensive it must do the job without errors occurring it must not be too complex for the users it must be compatible with the hardware is it adaptable if changes happen? The measure of 'success' of a system will be by how well it achieves the criteria..What hardware and software will be needed? The hardware chosen must be appropriate.. A set of evaluation criteria may be specified.. Expert Systems An expert system is a knowledge-based system which attempts to replace a human 'expert' in a particular field.. The system will consist of • • • a large database of knowledge facilities for searching the knowledge database a set of rules for making deductions from the data (inference engine) Example . When a new computer system is designed..systems analyst computer programmer robot maintenance engineer netw ork manager refuse collector eg Evaluation . These will be used to measure how well the hardware and software perform.

uses its rules and makes suggestions about the disease and its treatments. Advantages.. An expert system. expert systems are being used for disease diagnosis. Well we don't want to do the experts out of jobs! Lacks the 'human touch'! Disadvantages Expert Systems in Medicine. in Medicine. There are ethical and legal reasons for this .. The computer searches its database. • • • . the drugs used in treatments etc.. The computer does not take the place of the doctor but can be used to help the doctor make decisions.but others would prefer the 'human' touch. An expert system is a computer system which simulates the knowledge and expertise of a human expert. Data can be kept up-to-date. who do you sue? Some patients would feel happier typing medical information into a computer than discussing it with a human doctor. Expert systems are not really replacing doctors but are being used to help them.. The patient's details and symptoms are input.. The system can be used at a distance over a network.. . A patient is asked by a doctor about symptoms and the replies are input to the expert system. recommended treatments or drugs which may be prescribed. . .. and the system outputs probable diagnoses.has a large database of knowledge... For example.if a computerised diagnosis is wrong. The expert system is always available 24 hours a day and will never 'retire'.allows the database to be interrogated.has a set of rules (inference engine) for making deductions.. • • • • • • • The computer can store far more information than a human. The computer does not 'forget' or make mistakes. Sometimes probabilities are assigned to diagnoses.A medical diagnosis expert system (eg MYCIN) would have information about diseases and their symptoms.

Printouts are in black and white. There is no loss of knowledge as there is when a doctor retires. • . transmits it down the telephone lines to another fax machine where it is printed out..start at the beginning of the file and access each record in turn until the one needed is found. Serial Access This means . . Fine for documents but not good enough for graphics.. Fax is short for facsimile.. ..the computer can access specialist knowledge that a doctor may not have. Fax A fax machine copies a document. ... If files are stored on magnetic tape then serial access is the only method of access. .it can store more knowledge than a person..a large database of knowledge can be added to and kept up-to-date .The advantages of an expert system over a doctor are..the system cannot 'forget' or get facts wrong...it survives forever. File Access When records in a file need to be accessed there are two ways of doing it.. A fax machine. • • • An expert system would be programmed using an AI (Artificial Intelligence) language such as PROLOG..... The quality of the printout is not good.

.. In practice the old master file would be archived in case the update process has to be re-run. Direct access can only be used if files are stored on media such as disk. All the files used by a business are saved onto tape every night using a tape streamer.. Direct access of records will generally be much faster than serial access. but are then re-used the following week. A different tape is used each night of the week ...there may be problems just around the corner. Sometimes the old master file is referred to as the father file and the new master . wait!!. DVD. Any changes to the file since the last time the file was backed up will need to be done again.. If backups are made of large files then they may be compressed before being saved.. CD. and can then access the record directly from that position. Sometimes a number of backups are made and stored in different places.. the process creates a new master file.no. the backup copy of the file may then be used... The old master file can then be deleted. File Generations When a transaction file is used to update a master file. A typical scenario. Backups of a company's files can take a long time to do and so are often done at off-peak times eg at night Important files or files that are changed often may need to be frequently backed up. If a file becomes unusable. Direct access is also known as random access File Backup Backing up a file is saving a copy of the file on backing storage (eg disc or tape). It is necessary to do this in case the file becomes corrupted or lost...eg different discs stored in different rooms or buildings..Direct Access The computer can calculate (from the key field) where the record is stored in the file.

File Merge To merge two files is to combine them into a single file. The two files must be sorted in the same way...the fields are defined the same in each file.file as the son file. Two files can only be merged together if they have the same structure . 3. A new file is created 2. the son file becomes the father file the father file becomes the grandfather file .. When the update is next run. The resulting merged file will also be sorted in the same way.etc.. A record is read from each of the two files.. The new merged file contains all the records of both the merged files. In practice companies will keep several generations of files. 4. . Merging files (in words) : 1. This is because there may be a problem (eg disk crash) and the update runs may have to be done again to re-create the current master file. The record which comes first (in sorting order) is placed on the new file and is replaced by reading a new record from the original file. The process [3] is repeated until both files are empty.

File 1 and File 2 are merged together to create a new merged file which contains all records from File 1 and File 2... Merged file : ID No Sold today 301 5 305 3 309 1 310 1 316 2 317 1 319 7 The merged file is also sorted in order of ID. File 2 and the new file will . have the same data structure be sorted in the same way Files may be saved on media other than magnetic Example : File 1 : ID No Sold today 305 3 309 1 316 2 317 1 File 2: ID No Sold today 301 5 310 1 319 7 The two files to be merged are sorted in order of ID. • • tape. File 1. .

Using one field. A record may be removed from a file. File Operations The common operations carried out on files are : Sorting Files may be sorted into order of a field. Editing data A record in a file may be changed. If records are sorted it is much easier and quicker to find a record. With Queries. The buttons used for sorting may look like these. Smithers. Egs (NAME='Smith') AND (BALANCE > £100) (PET='Dog') OR (PET = 'Cat') (PET = 'Dog') AND NOT (Type='Spaniel') Wildcard query . Eg A business discontinues the selling of an item. Eg (NAME = 'Sm*') will include all names starting with Sm . Searching Queries are used to find records which match certain conditions..using two or more fields with OR. Smedling and so on. Eg (NAME = 'Smith') Complex query .Any number of files may be merged together if they are properly sorted and have the same data structure.Smith. AND or NOT.. Simple query . Adding new data Deleting data A new record may be added to a file. Eg A business may start to sell a new brand of item. File structure A database consists of a number of related files (sometimes called tables). The records are arranged in ascending or descending order (numerically or alphabetically). .. the names of the Fields must be given as well as the data to be searched for. Eg If the price of an item changes.In alphabetical fields * may stand for anything.

No two records would have the same data in the key field. Surname. Fields may be of a number of different types : • • • • • • • • • integer real (decimal) string (alphanumeric) date currency picture sound video a calculated field When a database is created it is important that the same data is not stored twice (this may lead to inconsistencies). The file has 6 records and each record has 4 fields (Number.using the key field of one table as a field in another table. Data in a database can be accessed and used to produce reports. Firstname and Form).. A field is a single data item consisting of a number of characters. Example 1 This table shows a small section of a file which contains details about school pupils: Number 91230 91231 91232 91233 91234 91235 Surname Sam Sanders Saunders Sealey Shaw Shaw FirstName Fenella Michael Ian Kelly Lucy Oliver Form B G B R S N The yellow section shows one record. The key field in this example is 'Number'.A file consists of a number of related records. . File Update A report may use data drawn from a number of different files. The key field is used to uniquely identify a record. This is usually done by linking the tables with relationships.. A record consists of a number of related fields.

Example : A master file of stock is kept for a clothes shop. The data is updated and the record 4. A new master file is created. The transaction file must be sorted in the same order as the master file. the transaction and master files are stored on magnetic tape and used as input for the update process. For each transaction record. Some of the records are shown in this .The data on a transaction file is used to update some of the fields on a master file. the remaining records on the master file are read and written onto the new master file. All updated (and unaltered) records are stored on the new master file. written onto the new master file. the records of the master file are read and written onto the new master file until a matching record is found. When the last transaction record has been processed. 3. How it works (System flowchart) : Here. How it works (in words) : 1. This is generally done in a batch processing system where the transactions are recorded on the transaction file and later used to update the master file. 2.

99 28 Todays transactions are shown in the transaction file below.. Note that some records will have remained unchanged..99 34 317 Socks(Black) £1.00 8 309 Shorts (Size 12) £12.table : ID Garment Price No Sold this year 305 Sweater (Red) £25.99 29 The transaction file must be sorted in the same order as the master file (using the key field) The key field is the ID field.00 15 315 Shorts (Size 14) £12..99 36 317 Socks(Black) £1.00 14 315 Shorts (Size 14) £12. Advantage . Example 1 Each record of this file has 4 fields. Number 91230 91231 91232 Surname Sam Sanders Saunders FirstName Fenella Michael Ian Form B G B .Every record is the same size. Fixed Length Fields A fixed length field is one which contains a set number of characters. so it is possible for the computer to calculate exactly where each record starts in the file and therefore it is quicker for the computer to find a particular record. ID No Sold today 305 3 309 1 316 2 317 1 The resulting new master file is shown in the next table : ID Garment Price No Sold this year 305 Sweater (Red) £25. the fields may need to be padded out to the right length.00 8 309 Shorts (Size 12) £12.00 12 308 Sweater (Blue) £25.. The master file in practice would have many more fields than this . eg If a Surname field is set at 10 characters then the name SIMPSON would need 3 <Space>s added on to the end of it. With fixed length fields.and many more records! The updated data is shown in red.00 9 316 Socks(Grey) £1. eg with <space> characters.00 9 316 Socks(Grey) £1.00 15 308 Sweater (Blue) £25..

Floppy disks Used for storage on microcomputers.. High density floppy disks can store 1. DO NOT. Field Name Field Size Number 5 Surname 10 Firstname 10 Form 1 The first three records of the file would therefore be stored as in the following table (each square represents one byte): 9 1 2 3 0 S a m F e n e l l a B 9 1 2 3 1 S a n d e r s M i c h a e l G 9 1 2 3 2 S a u n d e r s I a n B Each record takes up 26 bytes of storage space. Access to data is slower than from a hard disk. Floppy disks are portable and can be used for • • transferring data or programs from one microcomputer to another.it lets the dust in! touch the brown disk inside .91233 91234 91235 Sealey Shaw Shaw Kelly Lucy Oliver R S N The field sizes may be fixed at . Usually 3. • • • leave floppy disks in heat (eg the sun) or damp open the sliding metal thingy.44Mb of data...5 inches in diameter. The data can be protected by opening a small write-protect tab which prevents the contents of the disk being changed. backing up data from a hard disk. Floppy disks (and hard disks) have to be formatted before they can be used... The first three records of the file take up 78 bytes of storage.

A mechanical arm holds a pen which can be moved across the page. The paper is sometimes laid on a flat bed (flat bed plotter) ..The discs are protected by a stiff plastic cover.. They are slow. This has a hole for the read/write heads which is protected by a sprung metal cover. but can draw continuous curves often in a variety of colours. Graph plotter Graph plotters are used to produce high quality precision graphics usually on large sheets of paper. building plans and CAD (Computer Aided Design) applications. . where precision drawing is required. They are especially useful for architectural drawings.

or on a rotating drum (drum plotter). .. Photos from a digital camera may also be edited... a graphics tablet or a scanner. Input may be from a mouse. light pen. Graphics A graphics package is used to create images.

images can then be used in DTP pages or web pages. . It can be used to . Graphics Tablet (Pad) A graphics tablet is a board covered by a touch-sensitive membrane which can detect the position of a pointing device on its surface. • • • • • • • • • • creating and editing of new image choice of brushes choice of colours choice of fills freehand drawing import of images from other sources (including standard shapes) addition of text zoom options textured effects rotation of shapes Once created..Microsoft Paint is an example of a Graphics package.. Graphics packages would allow.hold a drawing while the user traces it.

The read-write head floats so close to the disk that a small speck of dust would ruin the disk. . Hard disks One or more hard disks are found in the hard drive which is usually housed inside a computer.you cannot carry it round and use it on different computers.hold a sheet of menus. It has crosshairs to position it accurately and a number of buttons for different actions. Advantages over floppy disks : • • • Access to data is faster than from floppy disks.. This is why the drives are sealed. A puck is a mouse-like input device for a graphics tablet which is moved over the surface of the tablet. They are more reliable than floppy disks as they have more protection from dirt. One disadvantage of a hard disc over floppy disk is that it is not portable . Hard discs store more data than floppy disks. Exercise : Hard Disks A hard drive is a sealed unit which contains one or more hard disks in a sealed case. (40 Gb drives are now common). Each drive is built into a sealed unit to prevent contamination by dust and moisture. icons and shapes which the user can select A stylus (or pen) is a pointing device for a graphics tablet.

Graphics programs etc.. Hardware consists of. (If you can kick it.. hard drive . The main program which runs the computer system is called the Operating System. it’s hardware!). Database programs.output devices such as a printer. Programs use less memory. HCI (Human Computer Interface) The Human Computer Interface (HCI) is the way the user interacts with the computer. Spreadsheet programs. Computer game Be careful .media such as discs. paper etc Software is the programs which run the system. . They can be carried around They have greater storage capacity They are less liable to damage (select only the correct answers) Hardware and Software A computer system consists of hardware and software.backing storage devices such as disc drive.. tapes.a floppy disk is hardware but a program which is stored on it is software. but the user needs to learn all the commands and type them in correctly. Other programs (called Applications programs) include .The advantages of a hard disk over a floppy disc are Access to data is faster.the Central Processing Unit (CPU) . monitor.. The three main types are : Command The user types in commands.which does all the processing .. Quick to operate and very flexible.input devices such as keyboard. . • • • • • Word Processing programs. graph plotter . Type DIR /W to get a list of all the files in a directory.. mouse. Example : The MS-DOS interface. Hardware is the equipment which makes up the computer system. joystick ..

All good Interfaces will have allow users to seek help if they need it. GUI Graphical User Interface Also known as a WIMP (Windows. decisions about which user interface is to be used are often governed by the IT skills of the user. There may be sub-menus. Eg a picture of a disk to save a file... The user talks a command into a microphone. Colour and sound may also be used to make the interface more 'userfriendly'. Detail of a GUI interface Sound Speech driven interfaces are also now available. surgeons.Menu Drop-down menus have options for selection. fighter pilots. Identical icons may be used in a number of different programs. Easy to use intuitive interface. This will make it easier for the user to learn to use the program.. Pointers) interface.handicapped. Useful for. Eg The same buttons are used on a GUI for printing in each application and they appear in the same position on each display. The user selects an option with either a key or a click of the mouse. but those with low IT skills will need a GUI.. Icons (small pictures) represent options. Menus. Children need plenty of colour and sound. Consistency of design of interfaces is important. Icons. No need to learn the commands but it can be difficult to locate a particular option. . Example : Windows Low-level IT skills needed by the user. When a new computer application is being designed. Experts can use a command driven interface..

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->