You are on page 1of 129

Ch.

1: Computer System Theory Notes

Chapter 1
Computer System

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.1: Computer System Theory Notes

1.1 Computer Definition


• A computer is a device that receives input, does processing on that input and then
produces the output.
• Computer consists of two main components: hardware and software.

Input Processing Output

1.2 Hardware and Software


Hardware
Definition:
• It is a general term for the physical components that make up a computer system.
• Hardware can be either External or Internal.

External Hardware
Definition:
Devices that are external and can be seen by the user.

Examples:
Mouse, keyboard, monitor, printer, scanner, etc.

Internal Hardware
Definition:
Devices that exist inside the computer and are not normally
visible by the user.

Examples:
• Motherboard
• RAM
• ROM
• Video Card
• Sound Card

Motherboard allows the processor and other computer hardware to


communicate with each other.

Eng. Omar El Safty Eng. Mustafa El-Komy


1
Ch.1: Computer System Theory Notes

Software
Definition:

• It is a general term for programs that control the computer system.


• There are two types of software: Application and System.

Application Software
Definition:
Programs that allow the user to do specific tasks.
Examples:
• Word processor
• Spreadsheet
• Database
• Photo editing software
• Video editing software

System Software
Definition:
• Programs that allow the hardware to run properly
• Programs that allow the user to communicate with the computer

Examples:
• Operating System (OS)
• Anti-virus
• Device Driver
• Compiler
• Interpreter

Eng. Omar El Safty Eng. Mustafa El-Komy


2
Ch.1: Computer System Theory Notes

1.3 Computer’s Main Hardware Components

Main Memory

Input Devices CPU Output Devices

Secondary Storage

Central Processing Unit (CPU)


Definition:

• Hardware that interprets and executes the commands from hardware and software.
• CPU contains Control Unit and Arithmetic Logic Unit (ALU)

Control Unit
Part of CPU that controls the input and output flow in the CPU.

Arithmetic Logic Unit (ALU)


Part of CPU that performs:
• Basic arithmetic calculations
• Logical operations

Main Memory
Definition:
Internal memory that is directly accessible by the CPU

RAM
Definition:

• Stands for Random Access Memory


• Used to store data, programs or parts of the operating system that are
currently in use
• RAM is volatile
• Can read from and written to

Eng. Omar El Safty Eng. Mustafa El-Komy


3
Ch.1: Computer System Theory Notes

Volatile means that if the computer's power is turned off the contents of
RAM disappear and are lost.

ROM
Definition:
• Stands for Read-Only Memory
• ROM is non-volatile
• Can only be read from but no written to
• Stores the start-up instructions when the computer is first switched on
o For example: Basic Input/Output System (BIOS)

BIOS is the program that is responsible for locating and loading the operating system.

The following table summarizes the differences between RAM and ROM:

RAM ROM

Can be written to and read from Can only be read from but not written to

RAM is volatile (temporary) ROM is non-volatile (permanent)

Used to store data, programs or parts of the Stores the start-up instructions when the
operating system that are currently in use computer is first switched on

Tends to have greater storage capacity

Input devices
Definition:
Devices that are used to enter data into the computer.

Output devices
Definition:
Devices that are used to obtain output from the computer.

Eng. Omar El Safty Eng. Mustafa El-Komy


4
Ch.1: Computer System Theory Notes

Secondary storage
Definition:
Non-volatile storage that is not directly accessed by the CPU.

1.4 Operating Systems


Definition:
Program that allows the user to communicate with the computer
hardware and performs many basic tasks.
Functions of operating system:
• Provides a user interface
• Loading and running of programs
• Input, output and storage devices management
• File handling
• Memory management
• It manages computer security
• Error handling

User Interface
Command Line Interface (CLI)
Definition:
An interface that the user would have to learn
commands to interact with the computer.
Advantages of using CLI:
• Uses less memory than GUI
• Can be used to have more control over the computer
settings
• Requires less processing power for the interface
• The user is in direct contact with the computer
Disadvantages of using CLI:
• Commands must be learnt and memorized by the user
• Commands must be typed in exactly
• More prone to errors on data entry
• Commands must be typed which takes time
• Hard to edit the typed commands

Eng. Omar El Safty Eng. Mustafa El-Komy


5
Ch.1: Computer System Theory Notes

Graphic User Interface (GUI)


Definition:

• An interface built around graphical items


• It uses WIMP (windows icons menus and pointer)

Features of GUI:
• Windows: Regions of the screen used to display information
• Icons: Small pictures that are used to represent folders,
software, etc.
• Menus: Lists of options the user can select from
• Pointer: An arrow used to navigate the screen and to select things on screen

Advantages of using GUI:


• No need to memorize or learn any commands
• More user friendly than CLI and can be used by non-experts
• No need to type in commands so fewer errors are made
• The use of pointer and icons is quicker and simpler than typing in commands
Disadvantages of using GUI:
• GUI consumes more memory than CLI due to graphics
• GUI requires more processing power due to graphics
• The user is limited to the icons and set menus provided on the screen
• Computer settings are protected from the user

1.5 Types of Computer


PC/Desktop computers
Advantages of PCs:

• Less chance to be damaged as they are usually fixed in one place


• Tends to have better specifications for a given price as parts are
separate
• Tends to have more powerful processor than tablets and smartphones

Disadvantages of PCs:

• Not very portable


• PCs consume more physical space than other computers
• If there’s a power cut, you can’t use the PC as it needs constant power supply

Eng. Omar El Safty Eng. Mustafa El-Komy


6
Ch.1: Computer System Theory Notes

Laptops
Advantages of laptops:

• More portable than PCs


• Consumes less physical space compared to PCs
• Lower power consumption compared to PCs
• Uses battery power so can be used if there’s a power cut

Disadvantages of laptops:
• As they are more portable, they are easier to lose compared to PCs
• They have limited battery life, so the user may need to carry a heavy adaptor

Tablets
Advantages of tablets:
• Very fast to switch on
• More portable than laptops
• Tends to have better battery life than laptops
• Can use several Apps

Disadvantages of tablets:
• Tends to have less storage capacity than laptops and PCs
• Easier to lose than laptops and PCs
• Typing on a touchscreen can be slower and harder compared to a standard keyboard
• Supports less types of file formats than laptops and PCs

Apps refer to programs that run on smartphones or tablets.

Eng. Omar El Safty Eng. Mustafa El-Komy


7
Ch.1: Computer System Theory Notes

Smartphones
Advantages of smartphones:

• Smaller and lighter than laptops thus more portable


• Easier to use than laptops while on the move
• Can make use of 3G/4G communication links
• Can use several Apps

Disadvantages of smartphones:
• It is much easier to lose a smartphone than laptops or PCs as it’s more portable
• Tends to have less storage capacity compared to laptops and PCs
• Small keyboards make typing slower and more difficult compared to laptops and PCs
• Web browsing and photography can drain the battery quickly

Smartwatches
Advantages of smartwatches:

• Easy to carry around (high portability) as it’s small in size


• More convenient to use than smartphones as notifications and calls
can be delivered straight to the arm’s wrist
• Can have an in-built GPS to track the location
• Can be used to monitor fitness easily

Disadvantages of smartwatches:
• Has small screen so more difficult to read data from it and type on it
• Has limited battery life compared to normal watches
• Small memory size compared to other types of computers
• Not all smartphone apps can be used on smartwatches
• They tend to be rather unattractive in design

Eng. Omar El Safty Eng. Mustafa El-Komy


8
Ch.2: Input Devices Theory Notes

Chapter 2
Input Devices

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.2: Input Devices Theory Notes

2.1 Pointing Devices


Definition:
Devices used to move and control on-screen pointer/cursor.

Mouse
Advantages:
• Fast navigation on screen
• Faster way to choose an option compared to keyboard

Disadvantages:
• Difficult to use for people with disabilities
• Excessive use can lead to RSI

Touchpad
Advantages:
• Faster way to choose an option compared to keyboard
• Takes less physical space than mouse

Disadvantages:
• More difficult to control compared to a mouse
• Difficult to use for people with disabilities

Tracker Ball
Advantages:
• Easier to use than a mouse and touchpad if the user is disabled
• More precise positioning of pointer on screen than mouse and touchpad

Disadvantages:
• Needs training as it’s not standard equipment
• More expensive than mouse

Eng. Omar El Safty Eng. Mustafa El-Komy


9
Ch.2: Input Devices Theory Notes

2.2 Other Input Devices


Keyboard
Advantages:
• Easy way to input data
• Allows to input variety of data including text, numbers and symbols

Disadvantages:
• Must learn how to type to achieve high input speed
• Excessive use can lead to RSI

Numeric Keypad
Advantages:
• Small, compact and easy to carry
• Faster than keyboards to input numbers

Disadvantage:
• Not used to enter text

Remote Control
Advantages:
• Operate devices from a distance which allows for easier control of devices
• Useful for people with walking difficulties

Disadvantage:
• Objects between the device and the remote control can prevent its operation
• Hard to use if the user has disbaility in hand movement

Joystick
Advantages:
• Control is more realistic than using a mouse
• Easier than keyboard to navigate the screen

Disadvantage:
• More difficult to control a pointer using a joystick than other pointing devices

Eng. Omar El Safty Eng. Mustafa El-Komy


10
Ch.2: Input Devices Theory Notes

Driving Wheel
It is similar to a joystick but used whenever steering is required.

Advantage:
• Easier and more realistic than other devices to control steering
movements

Disadvantages:
• More expensive input device compared to mouse or joystick
• Movements in the steering can be too sensitive, giving an unrealistic ‘feel’

Touch Screen
Advantages:
• Easy method to choose options
• Faster entry of options than using a mouse or keyboard
• No training is necessary to use it

Disadvantages:
• Limited number of options available
• Excessive use can lead to RSI
• Screen can get dirty with constant touching, which reduces its responsiveness

Touchscreen is considered an input device and an output device.


Touchscreen is NOT a pointing device.

Microphone
Uses:
• Used in a voice-activation system to enhance safety
• Used to input in speech recognition software to convert voice into text

Advantages:
• In speech recognition software, it’s faster to read text than to type it in using
a keyboard
• If used in cars, it has the advantage of improving safety

Disadvantage:
• Sound files can use up a lot of computer memory
• Speech recognition software is prone to errors

Eng. Omar El Safty Eng. Mustafa El-Komy


11
Ch.2: Input Devices Theory Notes

Graphics Tablet
Definition:
It is a device that it used to input freehand drawings.

Advantage:
• More accurate in drawing than using pointing devices

Disadvantages:
• More expensive than other pointing devices
• Longer to produce a drawing using graphics tablet than using pen and paper

Digital Camera
Advantages:
• Memory cards can hold several hundred photographs
• The image can be immediately seen on the screen

Disadvantages:
• Images often need to be compressed to reduce amount of memory used
• Resolution is not as good as many expensive tradional cameras

Video Camera
Advantage:
• Very high quality video output

Disadvantages:
• Expensive to purchase
• The produced video files consume large storage space

Webcam
Advantage:
• They can be online constantly

Disadvantages:
• Limited in their features (no zoom facility, for example)
• Poor quality

Eng. Omar El Safty Eng. Mustafa El-Komy


12
Ch.2: Input Devices Theory Notes

Scanner
Definition:
Device used to input hard-copy images into a computer.

Advantage:
• Allows images to be stored for further editing

Disadvantages:
• They can be slow
• Quality is dependant on the resolution of the scanner

2.3 Direct Data Entry (DDE) Devices


Optical Character Reader (OCR)
Definition:
Device than scans text from a hard-copy paper and sends it to the computer.

Advantages:
• Faster data-entry system than manually typing data
• Errors are reduced as there is no manual input

Disadvantage:
• Device has difficulty in reading handwriting

Optical Mark Reader (OMR)


Definition:
Device that can read the position of marks written on hard-copy forms.

Advantages:
• Very fast way of inputting data
• More accurate than keying in the data

Disadvantages:
• If the marks don't fill the space completely they may not be read correctly
• If the marks are not dark enough they may not be read correctly
• Have to use prepared forms which may be expensive

Eng. Omar El Safty Eng. Mustafa El-Komy


13
Ch.2: Input Devices Theory Notes

Magnetic Ink Character Reader (MICR)


Definition:
Device used to read characters written in magnetic ink on bank cheques.

Advantages:
• Errors are reduced as there is no manual input
• Faster than typing the characters with keyboard
• MICR can read magnetic ink even if it was damaged or written over

Disadvantage:
• More expensive than other direct data entry methods
• Only certain characters can be read and the number of available characters is very limited

The code of any bank cheque is written at the bottom using special ink
called Magnetic Ink, which is read by the MICR.

Barcode Reader
Definition:
Device used to scan barcodes on products.

Advantages:
• Much faster than keying in data manually
• Errors are reduced as there is no manual input

Disadvantages:
• More expensive system than using keyboards
• Barcodes can be damaged

Barcodes are series of black and white stripes of varying widths used
to represent data.

Eng. Omar El Safty Eng. Mustafa El-Komy


14
Ch.2: Input Devices Theory Notes

Radio Frequency Identification (RFID) Reader


Definition:
RFID readers are used to read information stored on RFID tag.

What is an RFID tag?


The RFID tag is composed of two components:
1 Microchip to store and process data
RFID tag
2 Antenna to receive and transmit data

Advantages of using RFID technology compared to barcode technology:


• No line-of-sight contact is necessary
• Faster reading rate
• Can be updated easier
• Larger storage capacity
• More robust

Disadvantage of using RFID technology: RFID reader

• RFID system is more expensive than the barcode system

Magnetic Stripe Reader


Definition:
Device used to read information on the magnetic stripe card.

Advantages:
• Much faster than keying in data manually
• Errors are reduced as there is no manual input
• Can be used to prevent access to restricted areas

Disadvantages:
• If the magnetic stripe gets damaged, the data will be lost
• No PIN is required, thus less secure
• Doesn’t work at a distance

Eng. Omar El Safty Eng. Mustafa El-Komy


15
Ch.2: Input Devices Theory Notes

Chip and PIN Reader


Definition:
Device used to read information stored on a Chip and PIN card.

Advantages:
• Secure system as it used PIN code
• More robust system than magnetic stripe cards

Disadvantage:
• Need to be careful to ensure PIN isn’t read by somebody else while typing it in

The term robust refers to a system/device that can last for a long time.

Contactless Card Reader


Advantages:
• Faster transcation than other payment methods
• User doesn’t need to worry about typing errors as no PIN is entered

Disadvantages:
• Only small amounts can be withdrawn
• Contactless cards are more expensive than normal cards
• The card may be read accidently

Eng. Omar El Safty Eng. Mustafa El-Komy


16
Ch.2: Input Devices Theory Notes

2.4 Sensors
Definition:
A sensor is an input device that measures and inputs physical variables from its surroundings
to a computer.

Examples:

Type of sensor Applications


Used in automatic washing machines, central heating systems,
Temperature
greenhouses, ovens

Used in burglar alarm systems, washing machines, environmental


Pressure
monitoring

Used in greenhouses, automatic doors, burglar alarm systems, automatic


Light
street lighting

Advantages:
• They take more accurate readings than humans
• They take more frequent readings than humans
• Readings are continuous

Disadvantage:
• Faulty sensors can give false results

Eng. Omar El Safty Eng. Mustafa El-Komy


17
Ch.3: Output Devices Theory Notes

3.1 Monitors
CRT Monitor
Advantage:
• Cheapest type of monitor
• Angle of viewing is better than most TFT monitors

Disadvantages:
• Consumes more power than any other types of monitors
• They generate more heat than other types of monitors
• They produce more harmful radiations than TFT monitors

TFT Monitor
Advantages:
• Thinner and more lightweight than CRT monitors
• They emit less radiations than CRT monitors
• They consume much less power than CRT monitors
• They generate less heat as CRT monitors

Disadvantages:
• More expensive than CRT monitors
• Angle of viewing is critical otherwise the image will not be clear

LCD and LED Monitors


Advantages of LED monitors over LCD monitors:
• LEDs produce better color definition
• Thinner than LCD monitors
• They produce less heat than LCD monitors
• They consume less power than LCD monitors

Eng. Omar El Safty 18 Eng. Mustafa El-Komy


Ch.3: Output Devices Theory Notes

We can summarize the differences between the 4 monitors in the following diagram:

CRT Thinner
TFT Less power consumption
LCD Less heat generated
LED More expensive

3.2 Printers
Laser Printer

Definition:
Printer that uses static electricity and toner to produce output.

Advantages:
• High quality output
• Printing is fast
• Toner cartridge lasts for a long time
• Produces low noise

Disadvantages:
• High initial cost
• Coloured laser printers tend have high running cost
• Produce health hazards such as toner particles in the air

The term running cost refers to the cost of operating a device.

Eng. Omar El Safty 19 Eng. Mustafa El-Komy


Ch.3: Output Devices Theory Notes

Inkjet Printer
Definition:
Printer that uses liquid ink to produce output.

Advantages:
• High quality output
• Low initial cost

Disadvantages:
• Slow output
• High running cost, as ink cartridges run out too quickly

Dot Matrix Printer


Definition:
Printer that uses matrix of pins and an inked ribbon to produce output.

Advantages:
• Best printer to work in harsh conditions
• Low running cost
• Produces carbon copies
• Easy to use if continuous stationery is required

Disadvantages:
• Very noisy
• Higher initial cost than inkjet
• Very slow
• Low quality printing

Dot Matrix printer is an impact printer.


All other printers in this chapter is non-impact.

Eng. Omar El Safty 20 Eng. Mustafa El-Komy


Ch.3: Output Devices Theory Notes

The following table is a comparison between laser, inkjet and dot matrix printers:

Name of printer Quality Speed Initial Cost Running Cost

Low
Laser High High High
(in case of black and white)

Inkjet High Low Low High


Dot matrix Low Low High Low

3-D Printer
Definition:
3-D printer is an output device used to produce solid 3D objects.

Advantages:
• Easier and faster to produce customized items than using traditional
ways
• Cost of producing customized items is less when compared to the
conventional way

Disadvantages:
• Can be used to produce items that infringe others’ copyright
• 3-D printing can be used to produce dangerous items (such as, weapons)
• Potential job losses if technology takes over from some types of manufacturing

3.3 Other Output Devices


Graph Plotter
Advantages:
• Extremely large output can be produced
• Very high quality output

Disadvantages:
• Very expensive
• Slow in printing

Eng. Omar El Safty 21 Eng. Mustafa El-Komy


Ch.3: Output Devices Theory Notes

Multimedia Projector
Advantage:
• Widens the display area so many people can view the screen easily

Disadvantages:
• Expensive to buy
• Difficult to set up

Speakers
The main function of speakers is to output sound.

3.4 Actuators/Control Devices


Definition:
Devices that take some action according to data provided by sensors.

The following table shows some actuators and their uses:

Name of actuator Function Applications

• Automatic washing machines

Motor Provides movement


• Greenhouses to open windows and
switch on fans
• Computers to control fans

Buzzer Provides noise/sound


• Burglar alarm systems
• Microwave ovens

• Security lights
Light bulb Provides light • Automatic street lighting
• Greenhouses

• Central heating systems


Heater Provides heat • Greenhouses
• Washing machines

Eng. Omar El Safty 22 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

4.1 Main Memory


Recall the differences between RAM and ROM:

RAM ROM
Volatile Non-volatile

Stores running programs and data being


Stores startup programs such as BIOS
processed by CPU

Can be read from and written to Can only be read from

Tends to have greater storage capacity

Main Memory can be referred to as Primary Memory and Internal Memory.

4.2 Backing Up of Data


Definition:
The process of making one or more spare copies of data and storing them on an alternative
device.

Why back up?


• To prevent loss of data
• To protect files being overwritten accidently
• To prevent possible corruption of files
• To prevent damage caused by hackers

Why backup data should not be stored on main memory?


• Data in main memory can be lost if computer shuts down
• Data in main memory can be corrupted
• Main memory is not portable, so it’s not suitable for file transfer

File transfer is the process of moving/copying files from one computer to another.

Eng. Omar El Safty 23 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

4.3 Access Types


There are two access types: Serial access and Direct access.

Serial Access
Definition:
• It is accessing data one by one in a sequence
• Slow form of data access

Direct/Random Access
Definition
• It is accessing data instantly with no need to pass through other files
• Faster than serial access

4.4 Secondary Storage/Backing Storage Devices


Factors to consider when comparing backing storage devices:
• Storage capacity
• Data transfer rate
• Data access speed
• Durability
• Portability
• Price per unit memory

Data transfer rate: Speed at which data can be moved between two storage devices.
Data access speed: Speed to retrieve of piece of stored data from a storage device.

Eng. Omar El Safty 24 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

4.5 Magnetic Storage Devices

Fixed/Internal Hard Disk Drive (HDD)


Advantages:
• Large storage capacity
• Fast data transfer rate
• Fast data access speed
• Has great read/write longevity

Disadvantages:
• Can be easily damaged if hit or dropped as they have many moving parts
• An incorrect shutdown procedure could lead to loss of data

Uses:
• To store the operating system
• To store system software and working files
• Storing application software that needs fast retrieval and storage of data

Portable Hard Disk Drive


Advantages:
• Large storage capacity
• Fast data transfer rate
• Fast data access speed
• Portable, so it can be used in file transfer

Disadvantage:
• Can be easily damaged if hit or dropped as they have many moving parts
• An incorrect shutdown procedure could lead to loss of data

Uses:
• To store backups
• To transfer data between computers

Eng. Omar El Safty 25 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

Magnetic Tape
Data is read from tapes using serial access.

Advantages:
• Huge storage capacity
• It is a very robust technology (lasts for a long time)
• Fast data transfer rate
• Cheaper per unit memory than equivalent hard disk

Disadvantages:
• Very slow data access speed
• They are affected by magnetic fields

Uses:
• To store backups
• Used in long-term archiving of data

4.3.1 Optical Storage Media


Advantages of optical media:
• Cheaper than other storage devices
• Portable

Disadvantages of optical media:


• Slow data transfer rate
• Slow access speed
• Not compatible with all computers

CDs and DVDs


CDs and DVDs can be categorized as follows:
• ROM – can only be read
• R – write only once
• RW – can be written to or read from many times

Eng. Omar El Safty 26 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

CD-ROM and DVD-ROM


Advantage:
• They are less expensive than hard disks

Disadvantages:
• Data transfer rate is slower than for hard disks
• Data access speed is slower than for hard disks

Uses:
• CD-ROMs are used to store music, software and computer games
• DVD-ROMs are used to store movies and more sophisticated computer games

CD-R and DVD-R


Advantages:
• Cheaper than -RW disks
• Once burned they cannot have any additional data written to it

Burning refers to adding data to an optical device.

Disadvantages:
• Space can be wasted if the disk was not fully consumed before burning it
• Not all CD/DVD players can read them

Uses:
• Archiving of data
• File transfer between different computers

CD-RW and DVD-RW


Advantage:
• Can be written over many times

Disadvantages:
• More expensive than ROM and R formats
• It is possible to accidentally overwrite data

Uses:
• To store data and backups
• File transfer between different computers

Eng. Omar El Safty 27 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

DVD-RAM
Advantages:
• Can read and write data at the same time
• They have a long life
• Can be written over several times (even more than RW format)
• Fast data access speed
• Large capacity (about 10 GB)

Disadvantages:
• More expensive than other CDs and DVDs
• Many systems don’t recognize DVD-RAM (not so compatible)

Uses:
• To store backups
• File transfer between different computers

Blu-ray Discs
Advantages:
• Large storage capacity
• Fast data transfer rate
• Faster data access speed than other optical media
• They come with secure encryption system to prevent copyright infringement

Disadvantage:
• Most expensive optical device

Uses:
• To store HD movies and games
• To store backups
• File transfer between different computers

Eng. Omar El Safty 28 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

4.3.2 Solid-State Storage Media


Solid State Drives (SSDs)
Advantages of SSDs over HDDs:
• Faster access speed
• No moving parts so more durable in portable computer
• Less power consumption
• They run much cooler
• They occupy less physical space
• They run quieter
• They are lighter, making them more suitable for a portable computer

Disadvantages of SSDs over HDDs:


• More expensive per unit memory
• HDDs has greater read/write longevity than SSDs

Memory Sticks/Pen Drives


Advantages:
• Very portable and compact
• Very robust
• Not affected by magnetic fields

Disadvantages:
• Easy to lose
• Lower storage capacity compared to HDDs
• More expensive per unit memory than HDDs

Uses:
• To store backups
• File transfer between different computers

Eng. Omar El Safty 29 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

Flash Memory Cards


Advantages:
• Small in size and can be easily removed and used in another device
• Very robust

Disadvantages:
• More expensive per unit memory than hard disk
• Have a lower storage capacity than hard disk

Uses:
• To store photos on digital camera
• Used as mobile phones cards
• To store backups in hand-held devices

4.4 Cloud Storage


Definition:
Method of data storage where data is stored on large groups of remote
networked servers, which are owned and managed by a hosting company.

A server is a computer.
Servers used to store data in cloud storage are referred to as Cloud.

There are three common cloud storage systems:


1 Public cloud
• Cloud storage which service provider makes cloud services available to the
general public over the internet

2 Private cloud
• Dedicated cloud storage provided to a specific
company
• Cloud computers exist within this company

3 Hybrid cloud
• Combination of the public and private clouds
• Sensitive data is placed in private cloud while less-sensitive data is placed in
public cloud

Eng. Omar El Safty 30 Eng. Mustafa El-Komy


Ch.4: Storage Devices Theory Notes

Advantages:
• Data is accessible at any time, from any device, anywhere in the world (provided internet
access is available)
• No need to buy or carry any storage device
• More storage space than physical devices
• User doesn’t have to manage the storage, it’s the job of the cloud service provider

Disadvantages:
• If there is not internet connection, the cloud cannot be accessed
• Loss of control of the data as the data is controlled by the cloud service provider
• Costs can be high if a large storage capacity on the cloud is required
• Data on cloud is duplicated and remains for a long time, which makes it easier to be
hacked

4.5 Cloud Security


Data Security
Data security is more concerned with physical security of the cloud:
• Natural disasters and power cuts can damage the servers
• Personnel who work for the cloud service company may access sensitive
data of the clients

Data Loss
It is when important and irreplaceable data is lost from cloud storage due to actions from
hackers.

Eng. Omar El Safty 31 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

Chapter 5
Introduction to databases

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

5.1 Data Types

1. Numeric Data
Numeric data simply means numbers. Numbers come in a variety of different types:

Integer
Positive or negative whole number
Examples: 12, 45, 1274, 1000000, -3, -5735

Real/Decimal
Positive or negative number with decimal/fractional parts
Examples: 1, 1.4534, 946.5, -0.0003, 3.142

Currency
Currency refers to real numbers that are preceded by a currency symbol
Examples: £12.45, -

Percentage
Percentage refers to any number that is followed by a percent symbol
Examples: 100%, 25%, 1200%, -5%.

2. Alphanumeric/Text Data
Alphanumeric data refers to data made up of letters and numbers.
Examples: DOG, "A little mouse", ABC123, enquiries@bbc.co.uk.

3. Boolean/Logic Data
Boolean data can only have two values.
Examples: TRUE and FALSE, YES and NO, ON and OFF, Male and Female.

4. Date/Time Data
Date/Time data is usually formatted in a specific way according to the setup of the
.
Date Examples: 25/10/2007, 12 Mar 2008, 10-06-08.
Time Examples: 11am, 15:00, 3:00pm, 17:05:45.

Eng. Omar El Safty 32 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

Selecting Data Types


When we input data to a computer, we must analyze it and select appropriate data types for each
value.

Student Name: Ben Smith Alphanumeric

Student Number: 1234 Numeric Integer

Date of Birth: 10 July 1998 Date/Time

Year Group: 6 Numeric Integer

Telephone: (0232) 744 6574 Alphanumeric

Special Diet: Yes Boolean

Exam Score: 78% Numeric Percentage

Height: 1.67 Numeric Real

Fees Paid: $ 1500 Numeric Currency

The data type of a telephone number is Alphanumeric data as:


Telephone numbers often have spaces, dashes or any other
symbol.
Telephone numbers may start with a zero (numeric data
cannot start with a zero).
Telephone numbers are not used in arithmetic operations

Eng. Omar El Safty 33 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

5.2 Definition of Database


A database is an organized collection of data related to each other.

5.3 Database Terminologies

Term Definition Examples

Table A collection of related records Table of students

For a student the fields could


include:
Student name
A column that contains one specific piece of
Field Student ID
information and has one data type
Age
Address
Gender

Field Name Title given to each field

A row within a table that contains data about a single Details (all information) of
Record
item, person or event one student

have
Primary Key Student ID field
duplicates

Primary Key

Databases have two types: flat-file databases and relational databases.

Eng. Omar El Safty 34 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

5.4 Database Types

Flat-File Database
Definition:
Database where all the date is held in a single table.
Example:

Relational Database
Definition:
Contains more than one table linked to each other
It uses relationships

Example:
For this example, all the data about customers is held in one file and all the data about jobs is
held in another file. In order to create a connection between the two files, a relationship must be
created

Eng. Omar El Safty 35 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

Foreign Keys
Definition:
It is a primary key in another table, used to create a relationship between two tables.

Example:
'Customer ID' field acts as the primary key in the customer file and foreign key in the job file,
thus enabling a relationship between the two tables.

Relationships
A relationship is a link or association between fields.

The relationship between the tables can be:


one-to-one
one-to-may
many-to-many

Advantages of relational database over flat-file database:


No duplication of data so less data entry
Less errors are produced due to less data entry
Saves storage space
Easier to edit data
Easier to add and delete data
Better security

Eng. Omar El Safty 36 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

Advantages of flat-file database over relational database:


Easier to set up
Easier to understand
Sorting is simpler
Filtering is simpler

Differences between Primary Key and Foreign Key:


Each table has one primary key whereas a table can contain several foreign keys
Primary key holds unique data while foreign key can be replicated in the table
Primary key identifies the record while foreign key is used to link with the primary key of
another table

5.5 Data Validation


Definition:
Checking that the data entered to a computer is sensible.

Validation check Description Example(s)

In an online form,
telephone number may be a
Presence check required field. So, if no data is
been left blank
entered, an error message will be
produced.

When registering a course in


Checks if value entered is available IGCSE, the session must be either
Lookup check
in a limited set/list of items June, November or Jan. No other
entry should be accepted.

Checks whether numeric data is


To check if a age is < 18
Range check within given/acceptable values
and > 0
Uses two boundaries

Checks whether numeric data is


To check if
Limit check within given/acceptable values
(no lower boundary)
Uses one boundary only

Eng. Omar El Safty 37 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

If a field needs six digits, then


Checks if the input data contains inputting a five-digit or seven-digit
Length check
the required number of characters number should cause an error
message.
A
Checks that the input data has the
Type check integer not alphanumeric, for
appropriate data type
example.
Checks the data is in a specific A date which should be in the form
Format check
format or fixed pattern of dd/mm/yyyy, for example.
A name would not contain
It checks that a string of characters characters such as %
does not contain any invalid
Character check
characters or symbols. A telephone number would
only contain digits

A validation check used in barcodes


to validate the correctness of the
barcode. Validating the correctness of a
Check digit
This is done by adding an extra digit barcode
that is calculated from the other
digits using some formula.

Eng. Omar El Safty 38 Eng. Mustafa El-Komy


Ch.5: Introduction to databases Theory Notes

5.6 Data Verification


Definition:
Checking that data has been copied/entered correctly from the source
There are two ways for verification: Visual check and Double data entry

Screen/Visual Check
Definition:
Data is compared visually with the source document by a user
The user is asked to confirm that the data entered is same as original
If user finds a difference, the data is re-entered

Double Data Entry


Definition:
Data is entered twice (sometimes by two different people)
A computer checks that both entries are equal
If they are not equal, an error message requesting to re-enter the data is displayed

Double data entry is different from Proofreading!


Proofreading is reading through the document to check grammar and
spelling mistakes without referring to the original source document.

Eng. Omar El Safty 39 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Chapter 6
Part I
Introduction to networks

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

6.1 Definition of a Network


Definition
Network is the connection of two or more electronic devices.

Methods of connection:
Cables (often called Ethernet cables)
Wi-Fi/Bluetooth
Satellite
3G/4G
Telephone lines

Advantages of connecting a network:


Sharing of hardware and software resources between networked computers
Sharing of data between networked computers
Ease of communication between networked computers
Users are controlled by a network administrator

Disadvantages of connecting a network:


Easier spread of viruses throughout the whole network
Increased security risks (for example, hacking) when compared to stand-alone computers
Slower access to the internet
Printer queues developing

6.2 Types of Networks


LAN
Definition:
Stands for Local Area Network
Network that uses cables and covers small geographic area, for example a building

WLAN
Definition:
Stands for Wireless Local Area Network
Network that uses wireless communication to connect between devices in small
geographic area

Eng. Omar El Safty 40 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

The main wireless technologies used to form a WLAN are Wi-Fi and Bluetooth.

Similarities between Bluetooth and Wi-Fi


Both Wi-Fi and Bluetooth use wireless communications
Both Wi-Fi and Bluetooth use radio waves for communication
Both Wi-Fi and Bluetooth allow several devices to be connected
Both use security when sending data

Differences between Bluetooth and Wi-Fi


Wi-Fi has faster data transfer rate than Bluetooth
Wi-Fi has greater range of transmission than Bluetooth
Wi-Fi connects more devices than Bluetooth (maximum of 7 devices in Bluetooth)

Advantages of connecting to a WLAN rather than to a LAN:


Reduces cost of cables
Safer – won’t trip over wires
Easier to connect other devices to the network

Disadvantages of connecting to a WLAN rather than to a LAN:


Less secure
The data transfer rate is slower than in a wired LAN
Physical obstacles can affect the signal

WAN
Definition:
Stands for Wide Area Network
Network that covers large geographic area

Example:
The most common examples of WAN are the internet and the network of
ATMs used by banks.

WANs can connect wirelessly using Satellites and 3G/4G.

Satellite
It is a type of wireless communication that has the following characteristics:
Broadband (high-speed internet connection)
It has excellent coverage
Transmission is affected by rain and snow

Eng. Omar El Safty 41 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

3G/4G
It is a type of wireless communication that has the following characteristics:
Allows access on the move
Allows access even if no Wi-Fi available
Not affected by rain or snow

6.3 Network Devices


Network Interface Card (NIC)
Functions:
Allows a computer to be connected to a network
Contains the MAC Address of the computer

MAC (Media Access Control) Address


Definition:
Unique number that identifies a device connected to the internet
Allocated by the manufacturer
Rarely changes
Consists of 6 pairs of hexadecimal digits
Example: FF:B3:A4:33:7E:F1
Hub
Functions:
Connects number of devices to form a network
Broadcasts incoming data packets to every computer in the network

Data Packets refer to any data being transmitted over a network.

The following diagram shows how hubs operate:

Computer
Data packet sent Data sent out to all
to network computers on the
Computer
network
HUB

Computer

Eng. Omar El Safty 42 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Switch
Functions:
Connects number of devices to form a network
Sends the data packets to the destination computer(s) only

The following diagram shows how switches operate:

Differences between Hub and Switch:


In a hub a data packet is broadcast to every computer or device on the LAN whereas in a
switch the data packet is sent to a specific computer
Security is lower in a hub as all data is broadcast
A switch uses MAC addresses to locate the destination of the device whereas in a hub
MAC addresses are not checked
A switch is capable of more functionality

Bridge
Function:
Connects two similar LANs together.

The following diagram shows how bridges operate:

Eng. Omar El Safty 43 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Router
Functions:
Connect a LAN (network) to the internet
Connect multiple LANs to form a WAN
Routes data between different networks

The following diagram shows how routers are placed in the network:

IP Address (Internet Protocol Address)


Definition:
Address that specifies location of a device on the internet
Allocated by the ISP
Can change
Consists of 4 numbers separated by dots
Example: 192.108.158.1

Routing steps of data between two different networks:


1 Network software determines that the destination computer is on a different network
from its IP address
2 Data packets are sent to the switch/hub and then passed to router
3 Router inspects the IP address of the data packets sent to it
4 Router looks up the paths to get to that address using its routing table
5 Router then checks how busy the paths are and identifies the quickest path
6 Router is then able to route the data packets to reach the correct switch/hub
7 Switch/hub sends the data packets to the destination computer

Eng. Omar El Safty 44 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Firewall
Definition:
It is a device/software that sits between the user's computer and an
external network and filters incoming and outgoing traffic based on a
given set of criteria.

Functions:
Checks whether incoming and outgoing traffic meets a given set of
criteria
Blocks/Filters traffic that doesn’t meet the criteria
Warns and prevents unauthorized access to the system
Can prevent viruses being transmitted to the network
Blocks access to undesirable websites
Logs all incoming and outgoing traffic

Internet Service Provider (ISP)


Definition:
Company that provides a connection to access the internet with a monthly fee.

Functions:
Provides access to the internet for a monthly fee
Monitors internet usage
Gives users an IP address
Provides security services
Provides access to Email
Provides storage space to save data on cloud
Provides web hosting facilities

Eng. Omar El Safty 45 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Chapter 6
Part II
Internet

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

6.1 Internet and Intranet


Internet
Definition:
Stands for International network of networks
It is a public and global network

Intranet
Definition:
Stands for Internal restricted access network
It is a private network
Accessible internally to members of some company or organization
It has limited resources

Advantages of using intranets over using the internet:


More secure as there is less chance of external hacking or viruses
More secure as private data stays within the organization
More secure as it regulates access to the internet
More secure as it can restrict access for certain employees
Easier to access company specific applications

Intranet sits behind a firewall.


Intranet can be expanded to become an Extranet.

Uses:
Send/receiving emails
Send/receive attachments/files
Internal file transfer within the company
Allows the creation of extranets
Surf internal webpages
Sharing of applications/resources

Eng. Omar El Safty 46 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

The following table shows the differences between the internet and the intranet:

Internet Intranet
World-wide as can be accessed anywhere in Accesses from agreed computers within an
the world given an ISP account organization

Less secure More secure than internet

No restrictions on websites Can restrict access to some websites

Not policed as anyone can post information Policed as specific users can post information

Wider range of resources Limited resources

Information is less relevant/reliable Information is more relevant/reliable

6.2 General Internet Terms


Webpage
Definition:
A web document written in HTML.

Website
Definition:
It is a collection of related webpages.

Hypertext Markup Language (HTML)


Definition:
A mark-up language used to create webpages
Uses tags to format content

Eng. Omar El Safty 47 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

To design a webpage there are three development layers to be used:


Content/Structure layer
Used to specify the webpage layout
Defined using HTML tags

Presentation layer
Used to define the formatting/style of the webpage
Usually defined in cascading style sheets (CSS)

Behavior layer
Used to make a website interactive by allowing the page to respond to user actions
Defined using scripting language (for example, JavaScript)

World Wide Web (WWW)


Definition:
Information space that consists of massive collection of web pages all
connected together using hyperlinks.
WWW is only part of the internet that can accessed by web browser

Eng. Omar El Safty 48 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Webserver
Definition:
Computer that contains webpages
It has an IP address and a domain (name of the website)

Web Browser
Definition:
A program that allows a user to view webpages.

Features:
Connects to the webserver (using its IP address)
Translates the HTML
Stores cookies
Identifies protocols, such as https, http
Stores user’s favorite websites
Keeps a history of websites visited by the user

Uniform Resource Locator (URL)


Definition:
A unique address for a resource located on the Internet
The user friendly version of the IP address

Structure:
protocol://webserver name/folder/filename

Protocol: Usually http or https


Webserver name:
www

domain name (name of the website)


domain type (.com, .org, .co, .net, .gov)
sometimes a country code is given (.uk, .us)
Folder
Filename

Eng. Omar El Safty 49 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

For example, the URL http://www.cie.org.uk/gcseict/giraffe.html

Protocol: http
Domain name: cie
Domain type: .org
Country code: .uk
Path: /gcseict/giraffe.html
Folder: gcseict
Filename: giraffe.html

Protocol
Definition:
A set of rules agreed by the sender and the recipient when data is transferred between devices.

HTTP
Definition:
Stands for Hypertext Transfer Protocol
The main protocol that controls the transmission of data to and from
webservers

Used to:
Access the World Wide Web
Transfer contents of a webpage to a web browser for veiwing
Download from webservers

HTTPS
Definition:
Stands for Hypertext Transfer Protocol Secure
Protocol used to control the transmission of data to and from webservers
but with encryption
Uses SSL

Because of encryption, it is slower to use https than http, so it is usually


only used when sensitive data is being transferred across the internet.

Eng. Omar El Safty 50 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

SSL
Definition:
Stands for Secure Socket Layer
A security protocol that uses encryption to allow data to be exchanged securely between
two devices over the Internet

FTP
Definition:
Stands for File Transfer Protocol
Protocol used to transfer files from one computer to another over the internet

Used to:
Tranfser files from one computer to another over the internet
Download from file servers
FTP upload is used in cases when the file size is very large

VOIP
Definition:
Stands for Voice Over Internet Protocol
A set of rules that enables people to use the internet to make phone calls.

Advantages of using VOIP:


Calls are either for free or at a local rate to anywhere in the world
A webcam can be used so that it becomes a type of video chat

Disadvantages of VoIP:
Quality of the sound is completely reliant on the internet connection
Security issues

Eng. Omar El Safty 51 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Cookies
Definition:
Data stored in a text file that is sent by webserver and stored on a user’s computer.

Cookies are used to:


Store the user’s preferences to customize the experience
Store login details to speed up login times
Store payment details
Carry out targeted advertising
Store items that has been added to an online shopping basket
Save internet surfing habits
Store progress in online games/quizzes

6.3 Steps to open a website:


1 User enters the URL of the webpage
2 Web browser uses URL to search for the IP address of the server
3 Web browser then sends a request to the web server
4 Web server sends the HTML code of the webpage to web browser
5 Web browser translates the code and displays the web page

Eng. Omar El Safty 52 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Chapter 6
Part III
Security

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

6.9 Security of Data


Malware
Definition:

Any program that damages, disrupts or gains unauthorized access to a computer.

Virus
Definition:
Program that replicates itself
Designed to:
Delete/Corrupt files
Causes a computer to malfunction or become unresponsive
Fill the hard disk/RAM
Cause software errors

How to recognize presence of virus:


Deletion of files without the user’s consent
Hard disk gets completely filled without the user’s consent
Computer becomes unresponsive
Random Reboots
Pop ups keep appearing on screen at random
Software errors

Protection against viruses:


Use up-to-date antivirus software
Don’t use software from unknown sources
Scan email attachments
Scan any external device connected to the computer
Use a firewall

Anti-virus software

Steps of detecting a virus:


1 The anti-virus software checks files aginst a database of known viruses
2 If a file is infected, two options appear: Delete the file or Quarantine the file
3 If the quarantine option is chosen, the antivirus attempts to cleanse the infected file

Eng. Omar El Safty 53 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Spyware/Key-logging software
Definition:
Software that records the key presses on the user’s keyboard. This data is
then sent to the originator of the software.

How key-logging software works:


1 Software records every keystroke on the keyboard and saves it in
a log file
2 The log file is transmitted back to the hackers

Protection against spyware:


Use up to date anti-spyware software
Use pointing device (or touch screen) instead of typing

Hacking
Definition:
The process of gaining illegal access to a computer system without the owner’s knowledge.

Possible effects:
Misuse of personal information
Data can be deleted/corrupted
Data can be changed
Data can be copied from a system

Protection against hacking:


Use of firewalls
Use of anti-hacking software
Authentication techniques

Eng. Omar El Safty 54 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Phishing
Definition:
The creator sends out a legitimate looking email that contains a link
to a fake website designed to obtain sensitive data.

Possible effects:
The creator of the email can gain sensitive data
Credit card fraud

How to identify phishing attacks:


Spelling or grammar mistakes in text
Act of asking for personal details
Originators email address does not match company
Email has generic greetings
Email urges you for a quick reply

How to protect yourself against a phishing attack:


Use of spam filters
Do not click links or open attachments from unknown sources
Never reveal personal details via email
Report any suspicious activity
Do extensive research before replying to any message (for example, checking the company
name)

Smishing
Definition:
The creator sends SMS to the user’s phone that asks the user to enter personal data or contains a
link to a fake website to obtain sensitive data.

Possible effects:
The creator of the SMS can gain sensitive data
Credit card fraud

How to identify smishing attacks:


Errors in text
Act of asking for personal details
Unknown source
SMS has generic greetings

Eng. Omar El Safty 55 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

How to protect yourself against a smishing attack:


Never reveal personal details over the mobile phone
Ignore text messages from numbers you do not recognize
Report any smishing attempts
Never click on links in text messages from unexpected people
Never phone the phone numbers that are given in a suspect text message

Pharming
Definition:
A malicious code is installed on the user’s computer that redirects the user to
a fake website designed to obtain sensitive data.

Possible effects:
The creator of the malicious code can gain sensitive data
Credit card fraud

How to identify pharming attacks:


Website’s URL is incorrect
If webpage is requesting personal information and its URL starts with http instead of https
Anti-virus detects presence of malicious code

How to protect yourself against pharming:


Check the spelling of URL of the website
Checking that the URL contains https or a padlock sign next it
Using up to date anti-malware software
Use a trusted legitimate ISP

Spam
Definition:
Junk email sent to large numbers of people
Can be used for advertising

Possible effects of spam:


Can fill up the recipients’ mailboxes
Can be used for spreading malware

Eng. Omar El Safty 56 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

How to recognize spam mail:


Incorrect grammar or spelling in the email
Absence of logos in email
Email contains suspicious attachments
Email has generic greetings

Methods to help prevent spam:


Use of spam filters
Delete or ignore messages from unknown sources
Use disposable email address
Delete accounts that you no longer use
Use black lists and white lists

6.10 Security measures


Authentication techniques
Definition:
Techniques used to verify that data comes from a trusted source.

Authentication methods include:


Passwords
Magnetic stripe cards
Biometrics
Digital certificates

Passwords
Definition:
A secret text set by a user to identify them to a computer system.

Text passwords can be: Strong or Weak.

Properties of a strong password:


Uses mixture of upper case letters, lower case letters, digits and symbols
At least eight characters

Eng. Omar El Safty 57 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Properties of a weak password:


Weak password is one that has few characters
Weak password has repeated characters
Weak passwords are ones that are similar to the user name
Weak passwords are passwords that relate to the user

Magnetic Stripe Cards


A security system may require the user to swipe a magnetic stripe card.
The system assumes that the cardholder is the user.

Biometrics systems
Definition:
Systems that rely on certain unique physical characteristics of human beings to identify a user.

Examples of biometrics systems:


Fingerprint scanner
Retina scanner
Iris recognition
Face recognition
Voice recognition

Biometrics is the measurement of body’s unique physical characteristics.

Advantages of using biometrics systems:


Biometrics is unique to each person, which is more secure than other authentication
methods
Passwords/cards can be forgotten, while biomterics are always with you
The user has to be present to use the biometric system therefore more secure
Almost impossible to duplicate biometrics

Disadvantages of using biometrics systems:


Method is slower to enter system than passwords
Biometrics systems are expensive
Injuries to fingers can cause biometric device to fail to recognize the user
Facial hair can stop facial recognition from recognizing the user

Eng. Omar El Safty 58 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

Digital Certificate
Definition:
An electronic document sent with an electronic message that is:
Used to verify the identity of the sender
Contains a unique key used by sender and receiver that allows computers to exchange
information over the internet securely

Items in digital certificate:


Details of the owner of the digital certificate
Serial number
Public key
Digital signature
Valid from
Valid to

Encryption
Definition:
Encryption is the process of scrambling sensitive data to become
unreadable to unauthorized users
Data is encrypted using an encryption key and sent to the recipient
to be decrypted using a decryption key

Firewall
Definition:
It is a device/software that sits between the user's computer and an external network and filters
incoming and outgoing traffic based on a given set of criteria.

Functions:
Checks whether incoming and outgoing traffic meets a given set of
criteria
Blocks/Filters traffic that doesn’t meet the criteria
Warns and prevents unauthorized access to the system
Can prevent viruses being transmitted to the network
Blocks access to undesirable websites
Logs all incoming and outgoing traffic

Eng. Omar El Safty 59 Eng. Mustafa El-Komy


Ch.6: Networks Theory Notes

6.11 Online Credit Card Fraud


Reasons for online credit card fraud:
Hackers gaining credit card data using phishing or pharming
Hackers gaining credit card data using spyware
If no encryption is used in a website that involves purchasing items
using credit card
Visiting a fake website and using the credit card in the website

Eng. Omar El Safty 60 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Chapter 7
System Development Life Cycle

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

The main stages in the systems life cycle can be shown in the following figure:

Analysis

Evaluation Design

Documentation Development & Test

Implementation

7.1 Analysis
System analysis is done by someone called systems analyst.

Systems analyst main tasks:


Collecting information about the existing system
Identify inputs, processing and outputs of the current system
Identifying problems with existing system
Identify the user requirements (objectives) for the new system
Identify the hardware and software of the new system

Methods of Collecting Information


Methods of collecting information about the current system:
Observation
Interviews
Questionnaires
Examination of existing documents

Observation
Advantages:
The systems analyst obtains reliable data
Enables the systems analyst to get a better overall view of the system
A relatively inexpensive method

Eng. Omar El Safty 61 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Disadvantages:
Workers may work in a different way if they know that they are watched (this is called
Hawthorne effect)

Interviews
Advantages:
More likely to get reliable data
Allow lots of very detailed information to be gathered
Flexible as the systems analyst can change script to suit
circumstances

Disadvantages:
Time consuming to complete all the interviews
Expensive method due to system’s analyst time
Not anonymous

Questionnaires
Advantages:
Faster to complete all questionnaires
It is a relatively inexpensive method
Individuals can remain anonymous
Individuals can fill it in their own time

Disadvantages:
The questions are inflexible since they have to be general
Users tend to exaggerate their answers as they are anonymous
As it’s anonymous people may not take it seriously

Examination of existing documents


Advantages:
This method allows information to be obtained which wasn’t
possible by any of the other methods
Can see the scale of the problem easily

Disadvantage:
Time consuming to go through the documents
Expensive method as it is time consuming

Eng. Omar El Safty 62 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Analysis phase is considered the most critical one among all other phases.
This is because all other stages rely on data collected in the analysis phase.

7.2 Design
Using the list of user requirements, the designer now has to design the new system.

Designers main tasks:


Design input forms
Design output forms
Design file structures (database)
Validation and verification

Designing Input Forms


Features of well-designed input form:
Have all of the necessary fields
Data must fill the form
Consistent spacing between fields
Use of navigation buttons
Clearly defined input area for each record
Suitable font size and color

Designing Output Forms


Types of output forms:
Screen displays (information displayed on the monitor)
Printed reports (hard-copy to be mailed, filed, etc.)

Designing File Structures/Database


When designing a database, the system designer needs to consider:
Data type of being stored
Size of the data
Field names

Eng. Omar El Safty 63 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Validation and Verification


As data is entered into the form, it needs to be checked for accuracy.

7.3 Development and Testing


Development
This phase involves programming to produce the software of the system.

To develop a piece of software, it should be broken down into small parts


called modules.

Testing
After developing the system, it needs to be tested.

Testing strategies:
Test each module
Test linkages between modules
Test the whole system (after integrating all modules together)

Test data:
Normal
Abnormal
Extreme
Live

Normal data
Definition:
This is data that is acceptable.
Example:
The month number can be any whole number in the range of 1 to 12.

Abnormal data
Definition:
This is data outside the limits of acceptability, or wrong type of data, and should be rejected.
Example:
All the following values are not allowed as inputs for the month:
Any value greater than 12 or less than 1
Any data type other than integer

Eng. Omar El Safty 64 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Extreme data
Definition:
This is data at the limits of acceptability.
Example:
The extreme values of month number can be either 1 or 12.

Live data
Definition:
This is actual data with known outcomes

Live data is entered into the new system and the actual results are compared with the expected
results:
Live data Expected result Actual result Any actions
data was validation routines on month
January error message
accepted element need to be modified
message output:
computer software needs to be modified to
0 ‘a zero value is
software crashed avoid the crash
not allowed’
1 Accepted Accepted no action

Eng. Omar El Safty 65 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

7.4 Implementation
After the system has been developed and tested, it will be ready to run.

Methods of implementation:
Parallel running
Direct changeover
Phase implementation
Pilot running

Parallel Running
Definition:
The new system runs along side the old system for a time
before the new system takes over completely. Old System

Advantages:
If the new system fails, the old system will still be New System

available as a backup
It is possible to gradually train workers on the new
system

Disadvantages:
Expensive as extra staff is needed to run both systems together
Time consuming as data needs to be entered into two systems

Situation where method might be used:


An organization with large amounts of data which cannot afford to lose data
An organization where the new system needs to be fully tested

Eng. Omar El Safty 66 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Direct Changeover
Definition:
Replacing the old system with the new system immediately/overnight.

Old system New system

Advantages:
Costs are less than parallel running as less workers are needed
The benefits of the new system are immediate
Saves time of implementing the new system

Disadvantages:
This method can be disastrous if the new system fails since the old the system is no longer
available

Situation where method might be used:


A small organization which can afford to lose data
A small organization where system needs to be up and running very quickly

Phased
Definition:
New system is introduced part by part.

Advantages:
If the new system fails, then most of the old system still in place
Possible to ensure that the new system works properly before proceeding

Disadvantages:
More expensive than direct changeover since it is necessary to evaluate each phase before
moving to the next stage
Very time consuming since each part needs to be fully evaluated before proceeding

Situation where method might be used:


An organization where there are clearly defined separate processes
An organization where the new system needs to be fully tested

Eng. Omar El Safty 67 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Pilot Running
Definition:
Whole system is introduced in one branch at a time.

Advantages:
If the new system fails, only one branch is affected
Possible to train staff in one area only, which is faster and less costly than parallel running

Disadvantage:
Takes time to implement the new system for all branches in the company

Situation where method might be used:


An organization where there are several branches all doing the same work
An organization where the new system needs to be fully tested

7.5 Documentation
User Documentation
Purpose:
To help users:
Learn how to use a system/understand a system
Overcome errors in a system

This can consist of any of the following:


Purpose of the system
Limitations of the system
Hardware requirements
Software requirements
Sample runs
Screen layouts (input formats)
Print layouts (output format)
How to load/install/run the software
How to use the system

Eng. Omar El Safty 68 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Technical Documentation
Purpose:
To help programmers and systems analysts to:
Make improvements to the system
Repair the system
Maintain the system

This can consist of any of the following:


Purpose of the system
Limitations of the system
Hardware requirements
Software requirements
Sample runs
Screen layouts (input formats)
Print layouts (output format)

7.6 Evaluation
Factors that needs to be assessed in evaluation:
Efficiency of the system (cost and speed)
Easiness of the system
Appropriateness of the system (all user requirements are satisfied)

The following is a list of some of the techniques used to evaluate the new system:
Comparing performance of the new system with the old system
Evaluating the user’s responses to using the new system
Comparing the final solution with the original user requirements
Interviewing users to gather responses about how well the new system works
Identifying any limitations of the system
Identifying any necessary improvements that need to be made

Eng. Omar El Safty 69 Eng. Mustafa El-Komy


Ch.7: System Development Life Cycle Theory Notes

Audience Appreciation
Factors to be considered:
The age of the target group
Example:
Young children will have a different response compared to more mature group of adults

The experience of the audience


Example:
A group of professors would expect a different approach compared to an audience
composed of school children

The expectations of the audience


Example:
If you are advertising or giving a presentation on a new restaurant, an older audience
would expect to see good waiter service; whereas a group of students would be more
interested in pizzas and fast counter service

Knowledge of the audience


Example:
For example, graduates in maths would expect to see a different approach to a solution
than a group of history students.

Eng. Omar El Safty 70 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Chapter 8
Effects of using ICT

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

8.1 Software Copyright


Definition:
Lawful protection of software from being downloaded copied or borrowed without the owner’s
consent.

How to breach software copyright:


Making a copy and giving it away without owner’s permission
Making a copy and selling it others without the owner’s permission
Making a copy and lending software without the owner’s permission
Rent out original software without the owner’s permission
Using a single copy with multiple simultaneous use on a network
Use code from the software without the owner’s permission
Modifying the original code

The action of making illegal copies of software is called software piracy.

How software manufacturers attempt to prevent copyright being broken:


Requesting to input a unique activation code
The user will be asked to agree to the license agreement and abide by its rules
Use of holograms to show that the software is a real copy
Putting digital signature on the CD
Use of dongle

8.2 Effects of Microprocessor-Controlled Devices in Our Lives


Positive effects of microprocessor-controlled devices on our lives:
People no longer have to do manual tasks at home
There is no longer a need to stay home while food is cooking or clothes are being washed
They give people more time for leisure activities, hobbies, shopping and socializing
Automated burglar alarms give people a sense of security
People are able to communicate with each other easily

Negative effects of microprocessor-controlled devices on our lives:


They can lead to unhealthy lifestyles due to dependency on ready meals
Laziness
People can become less fit
Potential loss of household skills

Eng. Omar El Safty 71 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

8.3 Effects of ICT on Employment


Negative Effects – Job Losses
The introduction of ICT systems has led to many job losses to the
following areas:
Office workers
Payroll workers
Typing pools
Car manufacturing

Positive Effects
There has been a large increase in job opportunities in the following areas:
Network managers and computer technicians
Computer Programmers
Web designers
Systems analysts
Delivery drivers

8.4 Effects of ICT on Working Patterns


Part-time Working
Definition:
It is working fewer hours per week than full-time working.

Flexible-Working (flexi-time)
Definition:
Workers complete the same number of full-time hours over a working week
Workers can choose when to start and end in agreement with the manager
Example:
Workers start at 9:30 rather than 9 am to miss school run/miss rush hour

Job Sharing
Definition:
A full-time job is divided between two or more part-time workers.
Example:
The work of two employees combined is a 40-hour week; each work for two full days and a half
day.

Eng. Omar El Safty 72 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Compressed Hours
Definition:
Working the full normal hours in a week but in fewer days.
Example:
A 40-hour week compressed into 4 days not 5 days

Advantages of having different working patterns to workers


Staff are more flexible when they work so they can carry out other activities
Staff are more contented as they can work hours which suit their home life
They can start earlier/work later to avoid rush hour in evening so cuts travel time
Compressed hours can lead to longer weekends therefore staff will be more refreshed
Job sharing allows a piece of work to be completed using the skills set of more than one
worker therefore cutting stress

Advantages of having different working patterns to the company:


Helps employers retain their employees therefore cutting training and recruitment costs
of new staff
Flexi-time allows company offices to remain open for longer hours
Job sharing ensures that the company has more than one person with a particular skill so
Compressed hours often lead staff to be more focused on their work therefore greater
productivity

8.5 Effects of ICT on Health


Health risks are caused due to the prolonged use of ICT equipment.

Eyestrain/Headache
Caused by:
Staring at a computer screen for a long time.

Ways of minimizing the health risk:


Take regular breaks
Make use of anti-glare screen
Use LCD/LED screens instead of CRT
Improve the lighting in the room

Eng. Omar El Safty 73 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Back and Neck Problems


Caused by:
Sitting in front of a computer screen for long time in the same position or in the wrong posture.

Ways of minimizing the health risk:


Take regular breaks
Use ergonomic chairs to give the correct posture
Sit in the correct posture
Use foot rests to reduce wrong posture problems

Wrong Posture Correct Posture

Repetitive Strain Injury (RSI)


Definition:
Damage to fingers or wrists caused by continuous use of keyboards or constant use of mouse.

Caused by:
Continuous typing on keyboard or prolonged gripping of mouse
Repetitive clicking of mouse buttons

Ways of minimizing the health risk:


Take regular breaks
Use ergonomic keyboards
Use wrist rest when using a mouse
Hand exercises

Eng. Omar El Safty 74 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

8.6 Effects of ICT on Physical Safety


Physical safety risks are caused by wrong use of ICT equipment.

Safety risk Caused by Ways of protection

Check insulation on wires regularly


Touching bare wires
Don’t allow liquids or drinks near
Spilling liquids on
Electrocution computers or any electricity-
electrical contacts
operated device
Use RCB

Use cable ducts to make the wires


safe
Tripping and Fix wires along walls and under
Presence of many
falling over trailing carpets to prevent any contact
trailing cables
wires between people and wires
Use wireless connections
wherever possible

Placing devices near the Use strong desks and tables to


Heavy equipment
edge of tables support heavy hardware
falling and causing
Placing heavy Place devices in the middle of a
injury
equipment on weak table
tables or shelves Use large and sturdy desks

Have a fully tested CO2 fire


estinguisher nearby
Overloading of Don’t overload sockets with too
powersockets many plugs
Fire risk
Overheating of Don’t cover equipment
equipment Ensure good ventilation in the
room to stop overheating of
hardware

Eng. Omar El Safty 75 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

8.7 E-safety
Personal Data
Definition:
Data relating to a living person who can be identified by this data.

Examples of personal data:


Name
Address
Date of birth
Banking details

Examples of sensitive personal data:


Racial origins
Political views
Religion
Criminal activity
Medical record
DNA
Biometric data

Why personal data should be confidential and secure:


As it links directly to a person
If someone gets access to the data then they can use the information to attack the person

Data Protection Acts (DPAs)


Definition:
Acts that are set up to protect the rights of the individual about whom the data is obtained,
stored and processed.

DPA principles:
Data must be fairly and lawfully processed
Data can only be processed for the stated purpose
Data must be sufficient, relevant and not excessive
Data must be accurate
Data must not be kept longer than necessary
Data must be processed according to the individual’s rights
Data must be kept secure
Data should not be transferred outside the area of the act
unless sufficient protection exists

Eng. Omar El Safty 76 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Definition of E-safety
It is the need to take precautions to keep personal data safe when
using the internet.

Measures to Maintain E-safety


When using the internet:
Never give out any personal information to people who are unknown to you online
Never send people photos of yourself (unless the person is known to you
Always maintain your privacy settings on
Only use websites recommended by teachers
Only use learner-friendly search engine
Use appropriate search conditions when using search engines

When using email:


Only open emails from known sources
Only email people you know
Never use personal details in emails
Never include the school’s name or photos of a student wearing a school uniform in any
email

When using social networking sites, instant messaging or chat rooms:


Block or report unwanted users
Never arrange to meet anyone alone
Always tell an adult first and meet in a public place
Always meet in a public place
Keep private and personal data secret
Avoid the misuse of images
Avoid giving your address or school name
Check profiles before contacting people
Verify person’s contact details with other trusted friends

When playing games online:


Always use a nickname and never your real name
Never give your personal data to any player

Eng. Omar El Safty 77 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

8.8 Internet Developments


Search Engines
Definition:
A piece of software used to find information on the internet.

Why are internet searches to find relevant information not always fast?
The search might be too general giving irrelevant information
Search providers add marketing advertisments to the search results
Computer might be infected with virus taking up memory and slow down data transfer
speed over the internet
If the computer’s memory is close to full, data transfer speed over the internet can slow
down significantly

Why isn’t it always easy to find reliable information on the internet?


Internet is not policed so information is not necessarily reliable
Information can be unverified on the internet
Information on some websites may be outdated and no longer correct or relevant

How to evaluate the reliability of information found on the internet?


Check information from different sources
Check the author’s credentials
If the date of the last update was a long time ago, it is likely to be unreliable website
Websites that have excessive advertising tend to be unreliable
Commercial websites tend to be biased
Check if responsible bodies have endorsed the website
Check if the website links to other reliable websites or to unreliable websites
Check spelling and grammar as too many spelling errors mean that website is not reliable
Use the final part of the URL to identify the website’s reliability. For example, websites
ending with: .edu, .org , .ac and .gov are more likely to be reliable.

Eng. Omar El Safty 78 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Undesirable Information
Steps to help you avoid undesirable websites:
Use webpage filtering software
Use the safe search feature on search engines
Check keywords that you use to search with
Don't click the links that are shown in junk email (spam)

Advantages of searching the internet for information:


The internet has vast, almost limitless, amount of information
Searching for information using a search engine is fast and easy
Information on the internet is for free
Pages on the internet can have multimedia files to make learning more interesting

Disadvantages of searching the internet for information:


The internet is not regulated
There is always the risk of accessing inappropriate sites when using search engines
It is too easy to be distracted when searching on the internet
There is a huge risk of plagiarism as it is very easy to copy material from the internet
Losing research skills when using the search engines as it does all the work for you

Plagiarism is the action of using ideas or words of others without citing the source.

Blogs
Definition:
Short for web log
A personal website where the blogger types in their opinion on some
topic

Features of a blog:
Website where data entered by a single author
Visitors can only read and comment on the material on blogs
Based on author’s personal observations
Usually organised in reverse chrolonogical order (most recent to least recent entry)

Eng. Omar El Safty 79 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Microblogs
Feature of a microblog:
Is shorter in length than a blog
Consists of short sentences

Microblogs are most often used on social networking sites to make short,
frequent posts.

Wikis
Definition:
Software/websites that allow users to create and edit web pages using web browser.

Features of a wiki:
A wiki has many authors
Any user can edit, delete or modify the content
Its structure is determined by its users and the content
Uses links to websites
Allows large documents to be seen by many people – it is easier
than emailing several people

Social Networking Sites


Definition:
Public websites that allow users to interact and communicate with each other.

Features of social networking sites:


Can create and share personal profile
Can upload content such as photos and videos
Can arrange events with a whole group
Can write comments on other’s posts
Can invite people to become friends

Advantages of social networking:


Increase the number of friends worldwide
Real time information sharing
Common groups can be formed more to keep in contact
Similar interests can contact each other
Easier to advertise to a larger number of people

Eng. Omar El Safty 80 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Disadvantages of social networking:


Reduces face to face communication
Cyber-bullying increases
Invasion of privacy increases
Needs the internet and a computer
Risks of fraud increases
Addiction to social networking

Forums
Definition:
Online discussion boards where users can hold conversations in the form of
posted messages.

Moderated forum
Definition:
A forum in which a post must be approved by an admin before it’s allowed to be posted.

Unmoderated forum
Definition:
A forum in which posts are posted without an approval from an admin.

Differences between moderated and unmoderated forum:


A moderated forum is checked by a moderator while unmoderated forum is not
Moderated may be more expensive as they have to appoint a moderator
Posting of moderated comments are delayed as they have to be checked
Moderated forums can reduce freedom of speech, but unmoderated forum allows people
to post what they like
The moderated forum does not allow inappropriate comments to be posted on the site

Similarities between moderated and unmoderated forum:


Both are interactive websites
Both are discussions
Both require networked computers

Eng. Omar El Safty 81 Eng. Mustafa El-Komy


Ch.8: Effects of using ICT Theory Notes

Arguments in favor of policing the internet:


It would help to prevent illegal material being posted on the internet
It would prevent children and vulnerable groups from being subjected to undesirable
websites
Harmful material and inappropriate sites can be found easily on the internet especially if
using a search engine
It would help to stop wrong information being published on websites

Arguments against policing the internet:


Material published on websites is already available from other sources
It would be expensive to police all websites
It would be difficult to enforce rules and regulations on a global scale
Policing would be against freedom of information
There are laws already exist to deal with those who post illegal material

Eng. Omar El Safty 82 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Chapter 9
Part I
ICT Systems

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.1 Analogue and Digital data


Analogue data
Definition:
Data that is constantly varying.

Examples:
Human voice
Analogue watch
Temperature recorded using a mercury thermometer

All natural/physical variables are analogue data.

Digital data
Definition:
Data that is made up from the binary values 0 and 1.

Examples:
Digital watch
Barcode
Light switch

Any electronic device reads digital data.

Analogue to Digital Converter (ADC)


Example of devices that use ADC: Microphone

ADC is needed to convert the analogue signals from the microphone into digital data that the
computer can then process.

Eng. Omar El Safty 83 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Digital to Analogue Converter (DAC)


Example of devices that use DAC: Headphones/Speakers

DAC takes digital data from the computer and converts it into analogue signals, which the
loudspeaker then converts into sound.

9.2 Measurement system


Definition:
It is a system, which involves sensors constantly taking measurement data.

Components of measurement system:


Sensors to take readings
Microprocessor to process data
Output device to display data

Advantages of using measurement systems:


Computers take much more accurate readings than humans
Computers do not need to take breaks
Computers can take data readings more frequently
People are free to do other more useful tasks

Eng. Omar El Safty 84 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Measurement system examples

Weather stations
Sensors used:
Rainfall
Temperature
Wind speed
Wind direction
Air pressure
Humidity

Steps:
1 Data is read by the sensors
2 The data is converted to digital data using the ADC
3 The data is sent to the microprocessor (in the ground base unit) by radio waves
4 Graphs are automatically produced by computer
5 Data is saved in the computer for later use

Measuring a patient’s vital signs in a hospital


Steps:
1 Sensors constantly send key vital signs (such as heart rate,
temperature, blood pressure, etc.) to the microprocessor
2 Data from the sensors is converted to digital using an ADC
3 Microprocessor compares data from sensors with preset values
4 If anything is out of the acceptable range, a signal is sent by the
microprocessor to sound an alarm
5 If data from the sensors is within range, the values are shown in graphical form on a
screen
6 Whole Process continues until the sensors are disconnected from the patient

Eng. Omar El Safty 85 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.3 Control System


Definition:
It is a system that takes some action that affects the surrounding environment.

Components of control system:


Sensors
Microprocessor
Actuators

Unlike measurement systems, the microprocessor will take some action, which
will affect the next input value it receives.

Advantages of using control systems:


Computers never need breaks
Computers don't need to be paid
Computers can operate in dangerous conditions
Computers can control systems more accurately than humans
Computers respond to changes more quickly than humans

Difference between Measurement system and Control system:


Measurement is the monitoring of physical variables without the microprocessor taking
action that affects the sensor’s readings
Control is when the microprocessor takes an action that affects the sensor’s readings

Eng. Omar El Safty 86 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Control system examples

Regulating the temperature in an air conditioning system


Steps:
1 Temperature set by user (it becomes the preset value)
2 Temperature sensor continually send data to microprocessor
3 ADC converts readings from the sensors into digital
4 Microprocessor compares temperature data with preset value
If the temperature value is greater than or equal to preset value
microprocessor sends signal to an actuator to turn on the
cooling unit
If the temperature value is less preset value, microprocessor
sends signal to an actuator to turn off the cooling unit
5 The whole process is continuous

Automatic Washing Machines


Sensors used:
Temperature sensor to measure temperature of the water
Water level sensor to measure the water level in the drum
Pressure sensor to measure the weight of clothes
Steps:
1 Sensors continually send data to microprocessor
2 ADC converts readings from the sensors into digital
3 Microprocessor compares the temperature of the water with preset
value
If temperature is greater than preset value, a signal is sent by
microprocessor to turn the heater off
If temperature is lower than preset value, a signal is sent by
microprocessor to turn the heater on
4 Water level is compared with preset value
If lower than preset value, a signal is sent by microprocessor
to turn on the tap
If higher than preset value, a signal is sent by microprocessor to turn off the tap
5 The whole process is continuous

Eng. Omar El Safty 87 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Burglar Alarms
Sensors used:
Pressure sensor to pick up the weight of an intruder coming through a door
Motion sensor to pick up the movement of an intruder in the building
Sound sensor to pick up sounds such as footsteps or breaking glass

Steps:
1 The system is activated by keying in a password on a keypad
2 Sensors constantly send data to microprocessor:
3 Data from the sensors is converted to digital using an ADC
4 Microprocessor compares data from sensors with preset values
5 If data is inside the acceptable range then no action will be taken
6 If any of the incoming data values are outside the acceptable range,
then the microprocessor sends a signal to:
A siren to sound the alarm, or
A light to start flashing.
7 The alarm continues to sound and lights continue to flash until the system is reset with a
password

9.4 Expert System

Definition:
It is computer software that acts like a human expert in a particular field.

Expert system’s components:


Knowledge base
Database created from information provided by human experts.
Inference engine
It examines the knowledge base for information that matches the user's query.
Rules base
Works with the inference engine to interpret information in a useful and organized way.
Interactive user interface
The interface that allows users to ask questions and to receive results.

Eng. Omar El Safty 88 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

How to set up an expert system:


1 Experts in the field are interviewed
2 Data is then collected from these experts
3 A knowledge base is first designed and then created
4 Rules base is then designed and created, and an inference engine is designed and created
5 The interactive user interface is designed and created
6 The expert system is tested against known scenarios
7 Experts are interviewed about how effective it is before the expert system goes out on
general release

Advantages of using expert systems


Available 24/7
Can reduce the time to get results
Allows the system to be used in parts of the world where experts are not available
Less need for specialists therefore reduces the cost of finding a solution
Use the collective wisdom of more than one expert
They give several different possibilities

Disadvantages of using expert systems


They are not human beings therefore they lack common sense
If the knowledge base contains errors then incorrect decisions can be made
Expensive to set up/purchase
Expensive to maintain
The need for training for operators
Cost of training for operators

Eng. Omar El Safty 89 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Medical Diagnosis Expert System Steps


Input:
1 Symptoms are typed in on the interactive user screen
Processing:
2 Expert system analyses data
3 Inference engine compares symptoms with those in the knowledge base using the rules
base
4 Matches of symptoms are found
Output:
5 Suggested/possible diagnoses are displayed on the interactive user interface

Examples of Expert Systems:


Medical diagnosis expert system
Data in knowledge base: Medical information
Query: Symptoms of the patient
Output: Diagnose of the patient's illness
Car engine fault expert system
Data in knowledge base: Car engine information
Query: Symptoms of the engine faults
Output: Diagnose of the car engine
Identify items such as plants, animals, rocks, etc.
Data in knowledge base: Characteristics of every item
Query: Details of an unknown item
Output: A likely identification of the item
Oil drilling expert system
Data in knowledge base: Characteristics of rock formations where oil could be
found
Query: Details of a particular location
Output: Probability of finding oil in that location

Eng. Omar El Safty 90 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.5 Modeling System


Definition:
A computer model is a computer program that simulates a real-life system.

Modeling Examples:
Finance modeling using spreadsheets
Simulators

Finance Modeling
Spreadsheets are often used to model the financial systems of a business.

Simulators
Definition:
System designed to imitate a real-life experience.

Examples:
Flight simulators
Car simulators
Ship simulators

Advantages of using simulators for training:


It is safer as trainees can make mistakes without putting anyone's life at risk
Saving cost of fuel
Saving cost of repairing planes/cars/ships
Easy to recreate extreme weather conditions for better training
Easy to create any training condition for better training

Eng. Omar El Safty 91 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.6 Robots
Definition:
A machine that can be programmed to carry on a variety of tasks.

Uses of Robots:
In car manufacturing
In dangerous situations
To do repetitive work

Advantages of using robots:


Higher productivity than human
Can operate 24/7
Higher accuracy and quality of products
Greater consistency than human
Reduces labor costs
Less health and safety issues

Disadvantages of using robots:


High initial cost
High maintenance cost
Causes unemployment
Robots cannot think for themselves

Eng. Omar El Safty 92 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Chapter 9
Part II
ICT Systems

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.7 Computers in Medicine


Uses of computers in medicine:
• Keeping patient records and pharmacy records using databases
• Monitoring of patients in a hospital (Measurement systems)
• Diagnosis of illness (Expert systems)
• The use of 3-D printers in many areas of surgery

Using 3-D printers in medicine


Uses:
• Surgical and diagnostic aids
• Artificial blood vessels
• Prosthetics (false arms, hands and legs)
• Tissue engineering
• Design of medical tools and equipment

Steps of producing a solid object using 3D printer:


1 3D model of the object is made and put in the 3D printer software
2 Software slices the model into multiple of layers
3 3D printer prints the object layer by layer on top of each other
4 3D printer then binds the layers together

9.8 Recognition Systems

Magnetic Ink Character Reader (MICR)


Definition:
System that can read characters printed in magnetic ink.

Advantages of using Magnetic Ink:


• Magnetic ink is more difficult to forge
• MICR can read magnetic ink even if it was damaged or written over
• Magnetic ink is human readable

How does MICR read magnetic ink?


1 The magnetic ink on the cheque passes over a magnet in the MICR which magnetizes
the ink
2 The MICR then reads the magnetic signal produced by the charged magnetic ink
characters on the cheque
3 Each character produces a unique signal which is read and translated by the MICR

Eng. Omar El Safty 93 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Barcode reader
How does barcode reader read barcode on a product?
1 Barcode reader shines a red light onto the barcode
2 Light is reflected back to sensors in the barcode reader
3 Black stripes reflect less light than white stripes
4 The reflected light (analogue) is converted to digital data using ADC
to be sent to a computer

Optical Mark Reader (OMR)


How does OMR read shaded lozenges (students answers)?
1 Lozenges on the MCQ form are identified by X-Y coordinates
2 OMR shines a beam of light onto the form and light is reflected
back to sensors
3 Shaded lozenges reflect less light, so sensors are able to identify
positions of students’ answers
4 The X-Y coordinates of the students’ answers are compared to the
corresponding coordinates on the answer sheet template

Optical Character Reader (OCR)

Automatic Number Plate Recognition (ANPR) System


Definition:
System used to read the car registration number from the number plate on cars.

Uses of ANPR:
• To track a specific car
• With speed cameras
• In car parking systems

How does ANPR system read data on number plates?


1 An image of the front of the vehicle is captured using a camera
2 An algorithm is used to locate and isolate the number plate from the image taken by the
camera
3 Each character is recognized using OCR and converted into digital text
4 The text is then stored on a database

Eng. Omar El Safty 94 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Radio Frequency Identification (RFID) Reader


Types of RFID tags:
• Passive (has no battery)
• Active (has a battery)
RFID tag

RFID readers use radio waves to read and capture information


stored on RFID tag.

How does RFID reader read data stored on a passive RFID chip?
1 RFID reader provides energy so that the chips can broadcast data
to them
2 RFID reader sends out radio signal to the chip requesting data and to
establish a connection
3 Chip’s antenna broadcasts signals carrying data to the RFID reader
4 The signals are detected by the reader which interprets the data RFID reader

How does RFID reader read data stored on an active RFID chip?
1 RFID reader sends out radio signal to the chip requesting data and to establish a
connection
2 Chip’s antenna broadcasts signals carrying data to the RFID reader using its internal
battery
3 The signals are detected by the reader which interprets the data

RFID Technology in Passports


Examples of items of information that are stored on the RFID chip:
• Name of passport holder
• Passport number
• Date of birth
• Nationality
• Biometric measurement (fingerprint, facial characteristics, etc.)
• Gender

The following are the step when somebody approaches passport control at an airport:
1 The passport page containing the RFID chip is scanned by RFID reader
2 Fingerprint data on the RFID chip is read by the RFID reader
3 The passport holder now presents their finger to a fingerprint scanner to capture their
fingerprint
4 This fingerprint is compared to the scanned fingerprint from the RFID chip
5 If the two fingerprints are the same, then the person is the true owner of the passport

Eng. Omar El Safty 95 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Advantages of using RFID technology in passports:


• More secure than a traditional passport as biometric data is more difficult to forge
• Forgeries can be more easily identified than non-RFID passports
• Quicker than reading it manually

Disadvantages of using RFID technology in passports:


• Easy to hack into the signal transmitted by the tag
• Tag collision may occur (when signals from two or more tags interfere with each other)

Eng. Omar El Safty 96 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Chapter 9
Part III
ICT Systems

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.7 Satellite systems

GPS
Definition:
• GPS stands for Global Positioning System
• It is a space-based system that uses satellites to calculate the
position of a receiver
• Typically, four satellites must be visible to the receiver

How does GPS know the location of a receiver?


1 Signals sent by satellites to surface of the Earth
2 These signals are received and interpreted by a receiver
3 The distance between the satellite and the receiver device is calculated and thus the
position of the receiver device is determined

Uses of GPS:
• In cars to calculate routes
• By walkers to locate position on hills/mountains
• By runners to calculate distance run
• By farmers for livestock control
• In satellite navigation systems for ships
• In tracking aircrafts

Satellite Navigation System (Satnav)


Definition:
It is a satellite system that uses GPS readings to:
• Find location of the user’s receiver
• Navigate the user to a specific destination

Advantages:
• The driver doesn’t have to consult paper maps, so it is safer
• The system can estimate the time of arrival
• It is also possible to program in the fastest route, route to avoid traffic, etc.
• The system can also give useful information such as the location of petrol stations,
pharmacies, hospitals, etc.

Eng. Omar El Safty 97 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Disadvantages:
• If the maps are not kept up to date, they can give incorrect instructions
• Weak satellite signals can give inaccurate data
• If an incorrect starting point or destination point is input, the system will give incorrect
information

GIS
Definition:
• Stands for Geographic Information System
• A computer system that allows us to model, analyze and query
data according to their location

Uses of GIS:
• Allows the user to model and analyze data according to location
• Edits map data
• Combines maps, graphics and databases
• Works with GPS

Examples of scenarios that can use GIS:


• Send the closest emergency personnel to a location
• Teachers can use GIS in their geography, science or engineering lessons
• Biologists and environmentalists use GIS to protect animal life and plants in certain areas

Media communication systems

Steps for global communication using satellites:


1 Signals are beamed to the satellite from a satellite dish on Earth via radio waves
2 Once the data reaches the satellite, it boosts the signal before ending it back to Earth
3 Signal is then resent to Earth
4 The satellite dish receives the signal

Eng. Omar El Safty 98 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

9.8 Tracking systems

Tracking a member of the public


Reasons why a person may need to be tracked:
• An elderly person may need to be tracked to ensure their safety
• A person taking part in a marathon to determine their position to complete the race
• An offender who is released from prison on the understanding that their location is known
at all times

RFID technology
Steps to use RFID technology to track a person:
1 An ankle monitor makes use of RFID technology
2 The ankle monitor with RFID tag sends out radio waves, which are
picked up by RFID reader in the person’s home
3 If the person isn’t at home, an alert is sent to the police’s control room

GPS
GPS monitoring is also used so that the person can be tracked outside their home.

Closed-circuit television (CCTV) camera


CCTV cameras are used to monitor people in streets and shopping malls.

Employee call monitors


Reasons for employee call monitoring:
• To improve the employees performance
• Can be used as a training tool
• To enhance security

Types of call monitoring:


• Monitor
▪ Neither the employee nor the other person being called is aware of the manager’s
presence
• Whisper
▪ This allows the manager to speak to employees to help them with a call
▪ Only the employee can hear the manager’s voice
• Barge
▪ This allows the manager to be heard by both the employee and the other person
in the call

Eng. Omar El Safty 99 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Other types of monitoring:


• Monitoring emails
• Monitoring key presses
• Monitoring websites visited
• Monitoring the use of printers
• Monitoring the amount of storage space used

9.9 Impact of emerging technologies


Artificial intelligence (AI) biometrics
Definition:
System developed to enhance the intelligence and reliability of biometric
technology.

First Scenario of using AI biometrics


Problem:
Fingerprint identification system falsely rejects a person’s fingerprint

Solution:
AI biometrics learns the user’s fingerprint by checking different alignments of the user’s finger
(dynamic profiling).

Second Scenario of using AI biometrics


Problem:
Facial-recognition system falsely rejects a person’s face if it has soft biometric changes.

Solution:
Facial-recognition system uses AI to recognize the face of a person even if some soft biometric
changes exist. This requires the facial recognition system to understand these soft biometric
changes and be able to pick them out.

Soft biometric changes are small changes to the face like growing a beard,
wearing glasses or growing old.

Eng. Omar El Safty 100 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Vision enhancement
Definition:
These are systems to improve vision for humans.

Examples of vision enhancement systems:


• Low vision enhancement systems (LVES)
• Night vision enhancement (NVE)

Low vision enhancement systems (LVES)


Definition:
They allow the images to be projected inside a headset in front of the eyes.

Night vision enhancement (NVE)


Definition:
NVE allows the image to be seen in apparent darkness.

Robotics
Drones
Definition:
Drones are unmanned (pilotless) flying devices.

Uses of drones:
• Survey the landscape in 3-D for use with GPS
• Investigate weather phenomena
• Search and rescue people and animals in natural disasters

Advantages of using drones:


• Safer to use than human life being risked
• Drones can be used in areas that would be inaccessible to humans
• Cheaper than using a helicopter
• Drones can cover a greater area than a human in the time available
• They are portable and can be transported from place to place easily

Robotic Surgery
Definition:
Robotic surgery allows surgeons to perform complex procedures with more
precision and control than the standard techniques.

Eng. Omar El Safty 101 Eng. Mustafa El-Komy


Ch.9: ICT Systems Theory Notes

Quantum cryptography
Definition:
Quantum cryptography is a type of encryption used in fiber optic cables.

Computer-assisted translation (CAT)


Definition:
It's a language translator that uses specific software to make the translation process more
realistic.
CAT uses two tools:
• Terminology database
▪ Linguistic database that grow and learn from translations being carried out
• Translation memories
▪ Automatically insert known translations for certain words, phrases or sentences

All CAT software needs some post editing by the user to remove errors
from translation process.

3-D and holographic imaging


Applications that use holograms:
• Engineering design
• Architecture
• Simulations
• Medical imaging (see inside organs in 3-D)
• Cinema/Gaming (special effects)

Virtual reality
Definition:
Artificial environment created by software.

Uses of virtual reality:


• Education
• Entertainment
• Fashion (e.g. to do fashion shows before doing the real thing to see the clothes on people)
• Sport

Eng. Omar El Safty 102 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Chapter 10
Banking Applications

Eng. Omar El Safty Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

10.1 Computer Processing Modes


Batch Processing
Definition:
Input data is stored in a file called transaction file and at a scheduled time, the computer
processes the collected data in one go.

Applications where batch processing is used:


Producing utility bills
Clearing of bank cheques
Updating of a stock database

Real-Time Processing
Definition:
It is a mode of processing in which input data is processed immediately.

Applications where real-time processing is used:


Monitoring systems (e.g. hospital patient monitoring)
Computer control systems
Traditional booking systems (e.g. flight booking, cinema seat booking, etc.)

On-Line Processing
Definition:
Mode of processing in which input data is processed shortly
The system uses a network

Applications where on-line processing is used:


Online booking systems
Withdrawing money from an ATM
EFTPOS

10.2 Payment Cards


Magnetic Stripe Card
Definition:
It is a type of card that stores data on the magnetic stripe found on its back.

Eng. Omar El Safty 103 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Chip and PIN Card


Definition:
Card that uses a chip on the front of the card, which
contains small memory used to store account information.

Advantages of using Chip and PIN card over Magnetic strip cards
Presence of editable memory
More secure as the PIN typed must match up with PIN stored on chip
More robust as it’s not affected by magnetic fields

Disadvantages of using Chip and PIN card over Magnetic strip cards:
ATM fraud has gone up
The introduction of chip and pin has generated a rise in phishing

10.3 Payment Methods


Let’s assume that a person goes to a supermarket and buys items that cost $50. There are
different ways for that person to pay the money to the supermarket other than paying in cash:
Use credit/debit card (EFTPOS)
Use contactless debit card
Withdraw money from ATM
Write a bank cheque

EFTPOS
Steps for EFTPOS process using Chip and Pin card to pay $50 to a supermarket:
1 The card is inserted into Chip and PIN reader to make contact with the customer’s bank
computer
2 The card is checked for its validity (check on expiry date, whether stolen card, etc.)
3 The cashier enters the value of purchase ($50 in our case)
4 The customer is requested to enter their PIN
5 The PIN is read from the chip on the card and is compared to the one entered in by the
customer
If they are the same, then the transaction will proceed
If the PIN is not correct, the user is asked to re-enter the PIN (only 3 trials)
6 Customer’s bank account is checked to make sure that it has sufficient balance to pay $50
7 If there are enough funds available:
$50 is deducted from the customer’s account
$50 is added to the supermarket’s account
8 A receipt is produced as proof of purchase

Eng. Omar El Safty 104 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Point of Sale (POS)


Definition:
POS is the place that you pay for your purchases.

A typical POS has:


A method of inputting the codes of goods purchased (e.g. barcode scanner)
A system to accept electronic payments or EFTPOS
A method of producing a receipt for purchases (e.g. dot-matrix printer)
A system to update the stock-level of goods whenever they are sold

EFTPOS means the process of transferring money electronically at a POS terminal

Contactless Debit Cards


Steps for paying $50 in a supermarket:
1 The operator enters the value of purchase
2 The reader checks the amount to pay is less than the contactless limit
3 The card is held in front of the reader and data is read from the chip using RFID
4 The restaurant’s bank's computer contacts the customer’s bank's computer
The card is checked if it is valid
The customer's balance is checked if it has sufficient funds
5 If there are enough funds and the card is valid:
$50 is deducted from the customer’s account
$50 is added to the supermarket’s account

Advantages of using Contactless Debit Cards:


Payments are made faster than other methods
User doesn’t need to worry about typing errors as no PIN is entered
Uses encryption to improve security
Less waiting time for customers which increases their satisfaction
Drawbacks of using Contactless Debit Cards:
Contactless cards are more expensive than normal cards
The card may be read accidently
Only small amounts can be withdrawn
More chance of fraud if card is stolen/lost
May not be able to use the ATM as not everyone will be contactless due to cost
Devices can read the cards wirelessly to steal money

Eng. Omar El Safty 105 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Automatic Teller Machines (ATMs)


Steps for withdrawing cash using ATM:
1 Contact made with the bank’s computer and card is checked to see if it’s
valid
2 PIN is entered using the keypad
3 The PIN is read from the chip on the card and is compared to the one
entered in by the customer:
If they are the same, then the transaction will proceed
If the PIN is not correct, the user is asked to re-enter the PIN (only 3 trials)
4 A list of services are given:
Change PIN
See account balance
Pay a bill
Make a money transfer
Withdraw cash
5 The customer selects the withdraw cash service
6 The customer is asked to enter the amount to be withdrawn
7 Customer’s balance is checked to see if they have sufficient funds
8 Check is made to see if daily limit exceeded
9 The customer is then asked if they want a receipt
10 The card is ejected from the ATM and money is dispensed
11 Customer’s account is update

Eng. Omar El Safty 106 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Clearing of Cheques
The third way to pay for the purchased goods is to write a bank cheque.

Structure of a bank cheque

A typical bank cheque has:


Place to write the amount
The code line, which consists:
Account number
Sort code/Branch code
Cheque number
Logo of the paying bank
Place for signature
Place write to whom the cheque is written to
Place to write the date

Data that is pre-printed on a cheque:


Account number
Sort code/Branch code
Cheque number

Eng. Omar El Safty 107 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Clearing of cheques scenario


Suppose that Ahmed uses HSBC Bank and he pays a cheque for EGP 10,000 to Omar who
banks with CIB.

The following steps are done to clear this cheque:


1 Omar delivers the cheque to his bank, CIB
2 The cheque is sent by CIB to a centralized clearing center
3 The cheque is processed by the clearing center by doing the following:
The cheque is passed through MICR to automatically read the code line (account
number, sort code and cheque number)
The cheque is passed through OCR to automatically read the amount
The data read from the cheque is converted into an encrypted file known as
IBDE file (Inter-Bank Data Exchange)
The IBDE file is signed with a digital signature so that the receiving bank can be
sure that the data hasn’t been tampered with
4 Cheques and their IBDE files are then sent to an exchange center
5 The exchange center passes all cheques and IBDE files to their corresponding paying
banks (HSBC in this case)
6 HSBC receives the cheque and IBDE file and performs some checks:
The digital signature is first checked
The cheque is passed through HSBC’s own MICR to scan the cheque and to
make sure that the data matches with that on the IBDE file
The cheque itself is checked that it has been signed, written correctly and is
genuine
HSBC checks if Ahmed has enough money in his account to pay the cheque
7 Based on this information, HSBC finally decides whether to:
a. Pay Ahmed’s cheque to Omar
b. Return it unpaid to CIB

The process of clearing a cheque takes three working days.

Eng. Omar El Safty 108 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

10.4 Automatic Re-ordering of Stock


Steps for automatic update & re-ordering of stock:
1 Before payment, the barcode of each good is scanned to calculate the total price and
amount of all goods purchased
2 The barcode is then searched in the database of the stock control system record by record
until a match is found
3 The ‘number in stock’ of the matching record is read
4 The ‘number in stock’ is subtracted by the quantity sold to the customer
5 The new ‘number in stock’ is compared with the re-order number
6 If the new ‘number in stock’ of the searched good is lower than re-order number, then
more stock is automatically re-ordered from the suppliers
7 The new value for ‘number in stock’ after subtracting what the customer has purchased
is written back to the file and the database is updated

The re-order number is a pre-set value for the minimum allowable stock for
a good before ordering more stock from suppliers

10.5 Internet Banking


Uses of internet banking:
Check the balance of bank accounts
Pay bills
Transfer money between accounts (using EFT)
Apply for loans

Advantages of internet banking to the customers:


Disabled and elderly people can now access any bank without the need to leave home
Banking can be done at any time on any day of the week
No queues, so it saves time
Allows people to spend more time doing other things
Many people find it less embarrassing to ask for bank loan using the internet rather than
enduring a face-to-face discussion with bank staff

Eng. Omar El Safty 109 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Disadvantages of internet banking to the customers:


Security issues (e.g. hacking, stealing credit card details, etc.)
Accidently using fake bank websites
It is necessary to have a computer and internet connection
It is easier to make errors with online banking and transfer money incorrectly to different
accounts
Possibility of isolation and lack of socialization

Advantages of internet banking to the banks:


Fewer staff is needed it isn’t necessary to have as many branches, thus saves cost
Because the internet is global, potential customer base is increased
Potential customer base is increased
Robberies are less likely

Disadvantages of internet banking to the banks:


Cost of retraining staff
Costs of setting up and maintaining of websites to enable online banking
Drop in customer loyalty, which could lead to loss of customers

10.6 Phone Banking


Steps of phone banking:
1 The customer calls the bank’s phone number
2 The customer keys in their account number
3 They are then requested to enter a four-digit PIN or selected
numbers from their PIN
4 The customer will then hear various options, which might
include:
Press ‘1’ to check your balance
Press ‘2’ to carry out a money transfer
Press ‘0’ to talk to one of our representatives
5 The customer chooses one of the options either by pressing the correct key or by speaking
the number

Similarities with internet banking:


Ability to check balance anywhere in the world
Ability to pay bills or transfer money to another account
Ability to talk with a bank representative

Eng. Omar El Safty 110 Eng. Mustafa El-Komy


Ch.10: Banking Applications Theory Notes

Advantages over internet banking:


No need to have a computer and internet service, thus cheaper
It is possible to talk to an actual human being
Quicker in case your computer isn’t switched on at the time and you only want a balance
enquiry

Disadvantages compared to internet banking


It can be much slower in case there is a long queue in order to talk to somebody
Options can be a little more complex to navigate using telephone banking

Eng. Omar El Safty 111 Eng. Mustafa El-Komy


Practical Questions Theory Notes

1 Describe the advantages and disadvantages of the use of mail merge to produce
letters.
Advantages
 Letters can be reused with different recipients
 The operative does not need details of recipients
 One letter only has to be proofread therefore saving time
 Can select on any criteria which saves time creating it

Disadvantages
 If there is an error, then all the sent letters will have this error.
 Hardcopies will be wasted; taking up time and money
 Slower checking on all letters
 Higher level of staff skill is required
 It may take longer time to setup mail merge than type to individuals.

2 State features that can be added to a form to be easier to use.


 Navigation buttons
 Drop down lists
 Radio buttons
 Self-explanatory field names
 Appropriate field spacing

3 Define a hyperlink.
A word/image in an HTML document that links either to another portion in the same
webpage or another webpage.

4 Describe what is meant by href.


An attribute within a hyperlink used to specify the URL of the web page to be used

5 Name the two sections that a webpage consists of.


 Head section
 Body section

6 Explain the purpose of the head section.


 Contains the webpage title
 Contains Styles used in the webpage
 Contains Scripts used in the webpage
 Contains the Default target frame

Eng. Omar El Safty 126 Eng. Mustafa El-Komy


Practical Questions Theory Notes

7 Explain the purpose of the body section.


 Defines the document’s body
 Contains all the elements of an HTML page
 Contains the content
 Contains style instructions

8 Explain the difference between a style and a class.


 Styles are pre-defined while classes are user-defined
 A class definition name starts with a full stop
 A class is used for adding or changing a style within CSS
 There are a limited number of styles

9 Describe the purpose of corporate house style.


 To ensure consistency across all documents.
 To support brand recognition.
 To reduce the amount of time staff spend setting up and formatting documents.
 To reduce the risk of mistakes.

10 Describe what is meant by the term formula


 Formulas can be simple calculations/mathematical operation
 Formulas can be typed directly into the formula bar
 A formula can contain a function

11 Describe what is meant by the term function


 It is a special type of formula
 Functions are built into the spreadsheet
 Functions can be used to simplify complicated calculations
 They can have built in commands
 Function has a pre-defined name/reserved word

12 Explain why a named range is used in a spreadsheet


 Easily refer to a group of adjoining cells
 Shortens/simplifies formulae
 Don’t have to re-set the absolute referencing manually

Eng. Omar El Safty 127 Eng. Mustafa El-Komy


Practical Questions Theory Notes

13 Making an image suitable for a webpage.


 Change color depth from 16 bits per channel to 8 bits per channel
 Saving in a gif format
 Saving in a jpg format

14 Explain the differences between relative and absolute file path.


 Relative path finds files in the current site while Absolute file path finds files on
different website
 Relative file paths only show the name or file path of the file while Absolute file
paths gives the full web address
 Absolute always has the domain name while relative does not need the domain
name
 Example of absolute file path:
o <img src="https://www.w3schools.com/images/picture.jpg"
alt="Mountain">
 Example of relative file path
o <img src="/images/picture.jpg" alt="Mountain">

15 Describe is meant by CSS cascading style sheets (CSS) and why it used.
 Files attached to a webpage that contains the settings for the appearance of text
and colors.

 Saves time as changes can only be done once.

 Consistent appearance across all pages within a website

16 Explain why generic file formats are needed.


 Generic file formats allow the user to save files so they can be opened in other
software

 To create a standard so that other software can understand the contents

Eng. Omar El Safty 128 Eng. Mustafa El-Komy


Practical Questions Theory Notes

17 Define absolute cell reference, relative cell reference, named cell and named
range.

 Absolute cell reference:


o The reference of the cell does not change when replicated
o Uses a $ to show the absolute reference
 Relative cell reference:
o The reference of the cell changes when replicated
 Named cell:
o A cell can be given a name instead of the regular cell reference, it will be
treated as absolute cell reference as it won’t change when copied or
replicated.
 Named range:
o A highlighted group of cells can be given a name and it will be treated as
absolute reference as it won’t change when copied or replicated.

18 Describe what is meant by widows and orphans and how to avoid them.
 Orphan: the first line of a paragraph, but it is the last line of text on a page. The rest
of the paragraph is on the next page.

 Widow: the last line of a paragraph that appears by itself at the top of the page. The
rest of the paragraph is on the previous page.

 They can ruin the appearance of the document so it can be avoided by using page
breaks, column breaks or changing page layout.

Eng. Omar El Safty 129 Eng. Mustafa El-Komy


Practical Questions Theory Notes

19 Write the line of HTML markup to display the picture “sport.jpg” or to display
the words ‘‘play sport’’ if the browser cannot locate the picture.

<img src="sport.jpg" alt="play sport">

20 Write the line of HTML markup to link to URL “https://www.google.com” with


link text “click here” and opens in a frame called “_ictframe”

<a href="https://www.google.com" target="_ictframe">Click here</a>

21 Write the line of HTML markup to link the text “Click on this link” to send an
email to email address “tmcp@cie.org.uk” with subject “Donation by John”

<a href="mailto:tmcp@cie.org.uk subject?Donation%20by%20John">Click on


this link</a>

22 When the website has been created it has to be published on the internet. You
plan to upload it onto the internet using FTP.
Explain how to upload and publish the content of a website using FTP.
1 Download the FTP client program
2 Connect to the FTP server using the FTP client program
3 Login to the server using FTP username and password
4 Locate the files on your computer
5 Click upload button on FTP client program
6 Upload the files to the folder

Eng. Omar El Safty 130 Eng. Mustafa El-Komy


Practical Questions Theory Notes

23 Define the following terms:

Bookmark
 Saved shortcut
 Directs the browser to a specific web page
 Allows the user to easily access favorite locations on the Web

Anchor
 The anchor is a link/placeholder
 The anchor links with another part of the web page

Hyperlink
 Word/phrase/image
 When the hyperlink is clicked
 Links to another website

Gutter
A margin between the page margin and the fold of a book

Wrapping
Text written around an image in a word processing document

Header
Area at the top of every page

Footer
Area at the bottom of every page

Eng. Omar El Safty 131 Eng. Mustafa El-Komy

You might also like