Professional Documents
Culture Documents
Chapter 1
Computer System
External Hardware
Definition:
Devices that are external and can be seen by the user.
Examples:
Mouse, keyboard, monitor, printer, scanner, etc.
Internal Hardware
Definition:
Devices that exist inside the computer and are not normally
visible by the user.
Examples:
• Motherboard
• RAM
• ROM
• Video Card
• Sound Card
Software
Definition:
Application Software
Definition:
Programs that allow the user to do specific tasks.
Examples:
• Word processor
• Spreadsheet
• Database
• Photo editing software
• Video editing software
System Software
Definition:
• Programs that allow the hardware to run properly
• Programs that allow the user to communicate with the computer
Examples:
• Operating System (OS)
• Anti-virus
• Device Driver
• Compiler
• Interpreter
Main Memory
Secondary Storage
• Hardware that interprets and executes the commands from hardware and software.
• CPU contains Control Unit and Arithmetic Logic Unit (ALU)
Control Unit
Part of CPU that controls the input and output flow in the CPU.
Main Memory
Definition:
Internal memory that is directly accessible by the CPU
RAM
Definition:
Volatile means that if the computer's power is turned off the contents of
RAM disappear and are lost.
ROM
Definition:
• Stands for Read-Only Memory
• ROM is non-volatile
• Can only be read from but no written to
• Stores the start-up instructions when the computer is first switched on
o For example: Basic Input/Output System (BIOS)
BIOS is the program that is responsible for locating and loading the operating system.
The following table summarizes the differences between RAM and ROM:
RAM ROM
Can be written to and read from Can only be read from but not written to
Used to store data, programs or parts of the Stores the start-up instructions when the
operating system that are currently in use computer is first switched on
Input devices
Definition:
Devices that are used to enter data into the computer.
Output devices
Definition:
Devices that are used to obtain output from the computer.
Secondary storage
Definition:
Non-volatile storage that is not directly accessed by the CPU.
User Interface
Command Line Interface (CLI)
Definition:
An interface that the user would have to learn
commands to interact with the computer.
Advantages of using CLI:
• Uses less memory than GUI
• Can be used to have more control over the computer
settings
• Requires less processing power for the interface
• The user is in direct contact with the computer
Disadvantages of using CLI:
• Commands must be learnt and memorized by the user
• Commands must be typed in exactly
• More prone to errors on data entry
• Commands must be typed which takes time
• Hard to edit the typed commands
Features of GUI:
• Windows: Regions of the screen used to display information
• Icons: Small pictures that are used to represent folders,
software, etc.
• Menus: Lists of options the user can select from
• Pointer: An arrow used to navigate the screen and to select things on screen
Disadvantages of PCs:
Laptops
Advantages of laptops:
Disadvantages of laptops:
• As they are more portable, they are easier to lose compared to PCs
• They have limited battery life, so the user may need to carry a heavy adaptor
Tablets
Advantages of tablets:
• Very fast to switch on
• More portable than laptops
• Tends to have better battery life than laptops
• Can use several Apps
Disadvantages of tablets:
• Tends to have less storage capacity than laptops and PCs
• Easier to lose than laptops and PCs
• Typing on a touchscreen can be slower and harder compared to a standard keyboard
• Supports less types of file formats than laptops and PCs
Smartphones
Advantages of smartphones:
Disadvantages of smartphones:
• It is much easier to lose a smartphone than laptops or PCs as it’s more portable
• Tends to have less storage capacity compared to laptops and PCs
• Small keyboards make typing slower and more difficult compared to laptops and PCs
• Web browsing and photography can drain the battery quickly
Smartwatches
Advantages of smartwatches:
Disadvantages of smartwatches:
• Has small screen so more difficult to read data from it and type on it
• Has limited battery life compared to normal watches
• Small memory size compared to other types of computers
• Not all smartphone apps can be used on smartwatches
• They tend to be rather unattractive in design
Chapter 2
Input Devices
Mouse
Advantages:
• Fast navigation on screen
• Faster way to choose an option compared to keyboard
Disadvantages:
• Difficult to use for people with disabilities
• Excessive use can lead to RSI
Touchpad
Advantages:
• Faster way to choose an option compared to keyboard
• Takes less physical space than mouse
Disadvantages:
• More difficult to control compared to a mouse
• Difficult to use for people with disabilities
Tracker Ball
Advantages:
• Easier to use than a mouse and touchpad if the user is disabled
• More precise positioning of pointer on screen than mouse and touchpad
Disadvantages:
• Needs training as it’s not standard equipment
• More expensive than mouse
Disadvantages:
• Must learn how to type to achieve high input speed
• Excessive use can lead to RSI
Numeric Keypad
Advantages:
• Small, compact and easy to carry
• Faster than keyboards to input numbers
Disadvantage:
• Not used to enter text
Remote Control
Advantages:
• Operate devices from a distance which allows for easier control of devices
• Useful for people with walking difficulties
Disadvantage:
• Objects between the device and the remote control can prevent its operation
• Hard to use if the user has disbaility in hand movement
Joystick
Advantages:
• Control is more realistic than using a mouse
• Easier than keyboard to navigate the screen
Disadvantage:
• More difficult to control a pointer using a joystick than other pointing devices
Driving Wheel
It is similar to a joystick but used whenever steering is required.
Advantage:
• Easier and more realistic than other devices to control steering
movements
Disadvantages:
• More expensive input device compared to mouse or joystick
• Movements in the steering can be too sensitive, giving an unrealistic ‘feel’
Touch Screen
Advantages:
• Easy method to choose options
• Faster entry of options than using a mouse or keyboard
• No training is necessary to use it
Disadvantages:
• Limited number of options available
• Excessive use can lead to RSI
• Screen can get dirty with constant touching, which reduces its responsiveness
Microphone
Uses:
• Used in a voice-activation system to enhance safety
• Used to input in speech recognition software to convert voice into text
Advantages:
• In speech recognition software, it’s faster to read text than to type it in using
a keyboard
• If used in cars, it has the advantage of improving safety
Disadvantage:
• Sound files can use up a lot of computer memory
• Speech recognition software is prone to errors
Graphics Tablet
Definition:
It is a device that it used to input freehand drawings.
Advantage:
• More accurate in drawing than using pointing devices
Disadvantages:
• More expensive than other pointing devices
• Longer to produce a drawing using graphics tablet than using pen and paper
Digital Camera
Advantages:
• Memory cards can hold several hundred photographs
• The image can be immediately seen on the screen
Disadvantages:
• Images often need to be compressed to reduce amount of memory used
• Resolution is not as good as many expensive tradional cameras
Video Camera
Advantage:
• Very high quality video output
Disadvantages:
• Expensive to purchase
• The produced video files consume large storage space
Webcam
Advantage:
• They can be online constantly
Disadvantages:
• Limited in their features (no zoom facility, for example)
• Poor quality
Scanner
Definition:
Device used to input hard-copy images into a computer.
Advantage:
• Allows images to be stored for further editing
Disadvantages:
• They can be slow
• Quality is dependant on the resolution of the scanner
Advantages:
• Faster data-entry system than manually typing data
• Errors are reduced as there is no manual input
Disadvantage:
• Device has difficulty in reading handwriting
Advantages:
• Very fast way of inputting data
• More accurate than keying in the data
Disadvantages:
• If the marks don't fill the space completely they may not be read correctly
• If the marks are not dark enough they may not be read correctly
• Have to use prepared forms which may be expensive
Advantages:
• Errors are reduced as there is no manual input
• Faster than typing the characters with keyboard
• MICR can read magnetic ink even if it was damaged or written over
Disadvantage:
• More expensive than other direct data entry methods
• Only certain characters can be read and the number of available characters is very limited
The code of any bank cheque is written at the bottom using special ink
called Magnetic Ink, which is read by the MICR.
Barcode Reader
Definition:
Device used to scan barcodes on products.
Advantages:
• Much faster than keying in data manually
• Errors are reduced as there is no manual input
Disadvantages:
• More expensive system than using keyboards
• Barcodes can be damaged
Barcodes are series of black and white stripes of varying widths used
to represent data.
Advantages:
• Much faster than keying in data manually
• Errors are reduced as there is no manual input
• Can be used to prevent access to restricted areas
Disadvantages:
• If the magnetic stripe gets damaged, the data will be lost
• No PIN is required, thus less secure
• Doesn’t work at a distance
Advantages:
• Secure system as it used PIN code
• More robust system than magnetic stripe cards
Disadvantage:
• Need to be careful to ensure PIN isn’t read by somebody else while typing it in
The term robust refers to a system/device that can last for a long time.
Disadvantages:
• Only small amounts can be withdrawn
• Contactless cards are more expensive than normal cards
• The card may be read accidently
2.4 Sensors
Definition:
A sensor is an input device that measures and inputs physical variables from its surroundings
to a computer.
Examples:
Advantages:
• They take more accurate readings than humans
• They take more frequent readings than humans
• Readings are continuous
Disadvantage:
• Faulty sensors can give false results
3.1 Monitors
CRT Monitor
Advantage:
• Cheapest type of monitor
• Angle of viewing is better than most TFT monitors
Disadvantages:
• Consumes more power than any other types of monitors
• They generate more heat than other types of monitors
• They produce more harmful radiations than TFT monitors
TFT Monitor
Advantages:
• Thinner and more lightweight than CRT monitors
• They emit less radiations than CRT monitors
• They consume much less power than CRT monitors
• They generate less heat as CRT monitors
Disadvantages:
• More expensive than CRT monitors
• Angle of viewing is critical otherwise the image will not be clear
We can summarize the differences between the 4 monitors in the following diagram:
CRT Thinner
TFT Less power consumption
LCD Less heat generated
LED More expensive
3.2 Printers
Laser Printer
Definition:
Printer that uses static electricity and toner to produce output.
Advantages:
• High quality output
• Printing is fast
• Toner cartridge lasts for a long time
• Produces low noise
Disadvantages:
• High initial cost
• Coloured laser printers tend have high running cost
• Produce health hazards such as toner particles in the air
Inkjet Printer
Definition:
Printer that uses liquid ink to produce output.
Advantages:
• High quality output
• Low initial cost
Disadvantages:
• Slow output
• High running cost, as ink cartridges run out too quickly
Advantages:
• Best printer to work in harsh conditions
• Low running cost
• Produces carbon copies
• Easy to use if continuous stationery is required
Disadvantages:
• Very noisy
• Higher initial cost than inkjet
• Very slow
• Low quality printing
The following table is a comparison between laser, inkjet and dot matrix printers:
Low
Laser High High High
(in case of black and white)
3-D Printer
Definition:
3-D printer is an output device used to produce solid 3D objects.
Advantages:
• Easier and faster to produce customized items than using traditional
ways
• Cost of producing customized items is less when compared to the
conventional way
Disadvantages:
• Can be used to produce items that infringe others’ copyright
• 3-D printing can be used to produce dangerous items (such as, weapons)
• Potential job losses if technology takes over from some types of manufacturing
Disadvantages:
• Very expensive
• Slow in printing
Multimedia Projector
Advantage:
• Widens the display area so many people can view the screen easily
Disadvantages:
• Expensive to buy
• Difficult to set up
Speakers
The main function of speakers is to output sound.
• Security lights
Light bulb Provides light • Automatic street lighting
• Greenhouses
RAM ROM
Volatile Non-volatile
File transfer is the process of moving/copying files from one computer to another.
Serial Access
Definition:
• It is accessing data one by one in a sequence
• Slow form of data access
Direct/Random Access
Definition
• It is accessing data instantly with no need to pass through other files
• Faster than serial access
Data transfer rate: Speed at which data can be moved between two storage devices.
Data access speed: Speed to retrieve of piece of stored data from a storage device.
Disadvantages:
• Can be easily damaged if hit or dropped as they have many moving parts
• An incorrect shutdown procedure could lead to loss of data
Uses:
• To store the operating system
• To store system software and working files
• Storing application software that needs fast retrieval and storage of data
Disadvantage:
• Can be easily damaged if hit or dropped as they have many moving parts
• An incorrect shutdown procedure could lead to loss of data
Uses:
• To store backups
• To transfer data between computers
Magnetic Tape
Data is read from tapes using serial access.
Advantages:
• Huge storage capacity
• It is a very robust technology (lasts for a long time)
• Fast data transfer rate
• Cheaper per unit memory than equivalent hard disk
Disadvantages:
• Very slow data access speed
• They are affected by magnetic fields
Uses:
• To store backups
• Used in long-term archiving of data
Disadvantages:
• Data transfer rate is slower than for hard disks
• Data access speed is slower than for hard disks
Uses:
• CD-ROMs are used to store music, software and computer games
• DVD-ROMs are used to store movies and more sophisticated computer games
Disadvantages:
• Space can be wasted if the disk was not fully consumed before burning it
• Not all CD/DVD players can read them
Uses:
• Archiving of data
• File transfer between different computers
Disadvantages:
• More expensive than ROM and R formats
• It is possible to accidentally overwrite data
Uses:
• To store data and backups
• File transfer between different computers
DVD-RAM
Advantages:
• Can read and write data at the same time
• They have a long life
• Can be written over several times (even more than RW format)
• Fast data access speed
• Large capacity (about 10 GB)
Disadvantages:
• More expensive than other CDs and DVDs
• Many systems don’t recognize DVD-RAM (not so compatible)
Uses:
• To store backups
• File transfer between different computers
Blu-ray Discs
Advantages:
• Large storage capacity
• Fast data transfer rate
• Faster data access speed than other optical media
• They come with secure encryption system to prevent copyright infringement
Disadvantage:
• Most expensive optical device
Uses:
• To store HD movies and games
• To store backups
• File transfer between different computers
Disadvantages:
• Easy to lose
• Lower storage capacity compared to HDDs
• More expensive per unit memory than HDDs
Uses:
• To store backups
• File transfer between different computers
Disadvantages:
• More expensive per unit memory than hard disk
• Have a lower storage capacity than hard disk
Uses:
• To store photos on digital camera
• Used as mobile phones cards
• To store backups in hand-held devices
A server is a computer.
Servers used to store data in cloud storage are referred to as Cloud.
2 Private cloud
• Dedicated cloud storage provided to a specific
company
• Cloud computers exist within this company
3 Hybrid cloud
• Combination of the public and private clouds
• Sensitive data is placed in private cloud while less-sensitive data is placed in
public cloud
Advantages:
• Data is accessible at any time, from any device, anywhere in the world (provided internet
access is available)
• No need to buy or carry any storage device
• More storage space than physical devices
• User doesn’t have to manage the storage, it’s the job of the cloud service provider
Disadvantages:
• If there is not internet connection, the cloud cannot be accessed
• Loss of control of the data as the data is controlled by the cloud service provider
• Costs can be high if a large storage capacity on the cloud is required
• Data on cloud is duplicated and remains for a long time, which makes it easier to be
hacked
Data Loss
It is when important and irreplaceable data is lost from cloud storage due to actions from
hackers.
Chapter 5
Introduction to databases
1. Numeric Data
Numeric data simply means numbers. Numbers come in a variety of different types:
Integer
Positive or negative whole number
Examples: 12, 45, 1274, 1000000, -3, -5735
Real/Decimal
Positive or negative number with decimal/fractional parts
Examples: 1, 1.4534, 946.5, -0.0003, 3.142
Currency
Currency refers to real numbers that are preceded by a currency symbol
Examples: £12.45, -
Percentage
Percentage refers to any number that is followed by a percent symbol
Examples: 100%, 25%, 1200%, -5%.
2. Alphanumeric/Text Data
Alphanumeric data refers to data made up of letters and numbers.
Examples: DOG, "A little mouse", ABC123, enquiries@bbc.co.uk.
3. Boolean/Logic Data
Boolean data can only have two values.
Examples: TRUE and FALSE, YES and NO, ON and OFF, Male and Female.
4. Date/Time Data
Date/Time data is usually formatted in a specific way according to the setup of the
.
Date Examples: 25/10/2007, 12 Mar 2008, 10-06-08.
Time Examples: 11am, 15:00, 3:00pm, 17:05:45.
A row within a table that contains data about a single Details (all information) of
Record
item, person or event one student
have
Primary Key Student ID field
duplicates
Primary Key
Flat-File Database
Definition:
Database where all the date is held in a single table.
Example:
Relational Database
Definition:
Contains more than one table linked to each other
It uses relationships
Example:
For this example, all the data about customers is held in one file and all the data about jobs is
held in another file. In order to create a connection between the two files, a relationship must be
created
Foreign Keys
Definition:
It is a primary key in another table, used to create a relationship between two tables.
Example:
'Customer ID' field acts as the primary key in the customer file and foreign key in the job file,
thus enabling a relationship between the two tables.
Relationships
A relationship is a link or association between fields.
In an online form,
telephone number may be a
Presence check required field. So, if no data is
been left blank
entered, an error message will be
produced.
Screen/Visual Check
Definition:
Data is compared visually with the source document by a user
The user is asked to confirm that the data entered is same as original
If user finds a difference, the data is re-entered
Chapter 6
Part I
Introduction to networks
Methods of connection:
Cables (often called Ethernet cables)
Wi-Fi/Bluetooth
Satellite
3G/4G
Telephone lines
WLAN
Definition:
Stands for Wireless Local Area Network
Network that uses wireless communication to connect between devices in small
geographic area
The main wireless technologies used to form a WLAN are Wi-Fi and Bluetooth.
WAN
Definition:
Stands for Wide Area Network
Network that covers large geographic area
Example:
The most common examples of WAN are the internet and the network of
ATMs used by banks.
Satellite
It is a type of wireless communication that has the following characteristics:
Broadband (high-speed internet connection)
It has excellent coverage
Transmission is affected by rain and snow
3G/4G
It is a type of wireless communication that has the following characteristics:
Allows access on the move
Allows access even if no Wi-Fi available
Not affected by rain or snow
Computer
Data packet sent Data sent out to all
to network computers on the
Computer
network
HUB
Computer
Switch
Functions:
Connects number of devices to form a network
Sends the data packets to the destination computer(s) only
Bridge
Function:
Connects two similar LANs together.
Router
Functions:
Connect a LAN (network) to the internet
Connect multiple LANs to form a WAN
Routes data between different networks
The following diagram shows how routers are placed in the network:
Firewall
Definition:
It is a device/software that sits between the user's computer and an
external network and filters incoming and outgoing traffic based on a
given set of criteria.
Functions:
Checks whether incoming and outgoing traffic meets a given set of
criteria
Blocks/Filters traffic that doesn’t meet the criteria
Warns and prevents unauthorized access to the system
Can prevent viruses being transmitted to the network
Blocks access to undesirable websites
Logs all incoming and outgoing traffic
Functions:
Provides access to the internet for a monthly fee
Monitors internet usage
Gives users an IP address
Provides security services
Provides access to Email
Provides storage space to save data on cloud
Provides web hosting facilities
Chapter 6
Part II
Internet
Intranet
Definition:
Stands for Internal restricted access network
It is a private network
Accessible internally to members of some company or organization
It has limited resources
Uses:
Send/receiving emails
Send/receive attachments/files
Internal file transfer within the company
Allows the creation of extranets
Surf internal webpages
Sharing of applications/resources
The following table shows the differences between the internet and the intranet:
Internet Intranet
World-wide as can be accessed anywhere in Accesses from agreed computers within an
the world given an ISP account organization
Not policed as anyone can post information Policed as specific users can post information
Website
Definition:
It is a collection of related webpages.
Presentation layer
Used to define the formatting/style of the webpage
Usually defined in cascading style sheets (CSS)
Behavior layer
Used to make a website interactive by allowing the page to respond to user actions
Defined using scripting language (for example, JavaScript)
Webserver
Definition:
Computer that contains webpages
It has an IP address and a domain (name of the website)
Web Browser
Definition:
A program that allows a user to view webpages.
Features:
Connects to the webserver (using its IP address)
Translates the HTML
Stores cookies
Identifies protocols, such as https, http
Stores user’s favorite websites
Keeps a history of websites visited by the user
Structure:
protocol://webserver name/folder/filename
Protocol: http
Domain name: cie
Domain type: .org
Country code: .uk
Path: /gcseict/giraffe.html
Folder: gcseict
Filename: giraffe.html
Protocol
Definition:
A set of rules agreed by the sender and the recipient when data is transferred between devices.
HTTP
Definition:
Stands for Hypertext Transfer Protocol
The main protocol that controls the transmission of data to and from
webservers
Used to:
Access the World Wide Web
Transfer contents of a webpage to a web browser for veiwing
Download from webservers
HTTPS
Definition:
Stands for Hypertext Transfer Protocol Secure
Protocol used to control the transmission of data to and from webservers
but with encryption
Uses SSL
SSL
Definition:
Stands for Secure Socket Layer
A security protocol that uses encryption to allow data to be exchanged securely between
two devices over the Internet
FTP
Definition:
Stands for File Transfer Protocol
Protocol used to transfer files from one computer to another over the internet
Used to:
Tranfser files from one computer to another over the internet
Download from file servers
FTP upload is used in cases when the file size is very large
VOIP
Definition:
Stands for Voice Over Internet Protocol
A set of rules that enables people to use the internet to make phone calls.
Disadvantages of VoIP:
Quality of the sound is completely reliant on the internet connection
Security issues
Cookies
Definition:
Data stored in a text file that is sent by webserver and stored on a user’s computer.
Chapter 6
Part III
Security
Virus
Definition:
Program that replicates itself
Designed to:
Delete/Corrupt files
Causes a computer to malfunction or become unresponsive
Fill the hard disk/RAM
Cause software errors
Anti-virus software
Spyware/Key-logging software
Definition:
Software that records the key presses on the user’s keyboard. This data is
then sent to the originator of the software.
Hacking
Definition:
The process of gaining illegal access to a computer system without the owner’s knowledge.
Possible effects:
Misuse of personal information
Data can be deleted/corrupted
Data can be changed
Data can be copied from a system
Phishing
Definition:
The creator sends out a legitimate looking email that contains a link
to a fake website designed to obtain sensitive data.
Possible effects:
The creator of the email can gain sensitive data
Credit card fraud
Smishing
Definition:
The creator sends SMS to the user’s phone that asks the user to enter personal data or contains a
link to a fake website to obtain sensitive data.
Possible effects:
The creator of the SMS can gain sensitive data
Credit card fraud
Pharming
Definition:
A malicious code is installed on the user’s computer that redirects the user to
a fake website designed to obtain sensitive data.
Possible effects:
The creator of the malicious code can gain sensitive data
Credit card fraud
Spam
Definition:
Junk email sent to large numbers of people
Can be used for advertising
Passwords
Definition:
A secret text set by a user to identify them to a computer system.
Biometrics systems
Definition:
Systems that rely on certain unique physical characteristics of human beings to identify a user.
Digital Certificate
Definition:
An electronic document sent with an electronic message that is:
Used to verify the identity of the sender
Contains a unique key used by sender and receiver that allows computers to exchange
information over the internet securely
Encryption
Definition:
Encryption is the process of scrambling sensitive data to become
unreadable to unauthorized users
Data is encrypted using an encryption key and sent to the recipient
to be decrypted using a decryption key
Firewall
Definition:
It is a device/software that sits between the user's computer and an external network and filters
incoming and outgoing traffic based on a given set of criteria.
Functions:
Checks whether incoming and outgoing traffic meets a given set of
criteria
Blocks/Filters traffic that doesn’t meet the criteria
Warns and prevents unauthorized access to the system
Can prevent viruses being transmitted to the network
Blocks access to undesirable websites
Logs all incoming and outgoing traffic
Chapter 7
System Development Life Cycle
The main stages in the systems life cycle can be shown in the following figure:
Analysis
Evaluation Design
Implementation
7.1 Analysis
System analysis is done by someone called systems analyst.
Observation
Advantages:
The systems analyst obtains reliable data
Enables the systems analyst to get a better overall view of the system
A relatively inexpensive method
Disadvantages:
Workers may work in a different way if they know that they are watched (this is called
Hawthorne effect)
Interviews
Advantages:
More likely to get reliable data
Allow lots of very detailed information to be gathered
Flexible as the systems analyst can change script to suit
circumstances
Disadvantages:
Time consuming to complete all the interviews
Expensive method due to system’s analyst time
Not anonymous
Questionnaires
Advantages:
Faster to complete all questionnaires
It is a relatively inexpensive method
Individuals can remain anonymous
Individuals can fill it in their own time
Disadvantages:
The questions are inflexible since they have to be general
Users tend to exaggerate their answers as they are anonymous
As it’s anonymous people may not take it seriously
Disadvantage:
Time consuming to go through the documents
Expensive method as it is time consuming
Analysis phase is considered the most critical one among all other phases.
This is because all other stages rely on data collected in the analysis phase.
7.2 Design
Using the list of user requirements, the designer now has to design the new system.
Testing
After developing the system, it needs to be tested.
Testing strategies:
Test each module
Test linkages between modules
Test the whole system (after integrating all modules together)
Test data:
Normal
Abnormal
Extreme
Live
Normal data
Definition:
This is data that is acceptable.
Example:
The month number can be any whole number in the range of 1 to 12.
Abnormal data
Definition:
This is data outside the limits of acceptability, or wrong type of data, and should be rejected.
Example:
All the following values are not allowed as inputs for the month:
Any value greater than 12 or less than 1
Any data type other than integer
Extreme data
Definition:
This is data at the limits of acceptability.
Example:
The extreme values of month number can be either 1 or 12.
Live data
Definition:
This is actual data with known outcomes
Live data is entered into the new system and the actual results are compared with the expected
results:
Live data Expected result Actual result Any actions
data was validation routines on month
January error message
accepted element need to be modified
message output:
computer software needs to be modified to
0 ‘a zero value is
software crashed avoid the crash
not allowed’
1 Accepted Accepted no action
7.4 Implementation
After the system has been developed and tested, it will be ready to run.
Methods of implementation:
Parallel running
Direct changeover
Phase implementation
Pilot running
Parallel Running
Definition:
The new system runs along side the old system for a time
before the new system takes over completely. Old System
Advantages:
If the new system fails, the old system will still be New System
available as a backup
It is possible to gradually train workers on the new
system
Disadvantages:
Expensive as extra staff is needed to run both systems together
Time consuming as data needs to be entered into two systems
Direct Changeover
Definition:
Replacing the old system with the new system immediately/overnight.
Advantages:
Costs are less than parallel running as less workers are needed
The benefits of the new system are immediate
Saves time of implementing the new system
Disadvantages:
This method can be disastrous if the new system fails since the old the system is no longer
available
Phased
Definition:
New system is introduced part by part.
Advantages:
If the new system fails, then most of the old system still in place
Possible to ensure that the new system works properly before proceeding
Disadvantages:
More expensive than direct changeover since it is necessary to evaluate each phase before
moving to the next stage
Very time consuming since each part needs to be fully evaluated before proceeding
Pilot Running
Definition:
Whole system is introduced in one branch at a time.
Advantages:
If the new system fails, only one branch is affected
Possible to train staff in one area only, which is faster and less costly than parallel running
Disadvantage:
Takes time to implement the new system for all branches in the company
7.5 Documentation
User Documentation
Purpose:
To help users:
Learn how to use a system/understand a system
Overcome errors in a system
Technical Documentation
Purpose:
To help programmers and systems analysts to:
Make improvements to the system
Repair the system
Maintain the system
7.6 Evaluation
Factors that needs to be assessed in evaluation:
Efficiency of the system (cost and speed)
Easiness of the system
Appropriateness of the system (all user requirements are satisfied)
The following is a list of some of the techniques used to evaluate the new system:
Comparing performance of the new system with the old system
Evaluating the user’s responses to using the new system
Comparing the final solution with the original user requirements
Interviewing users to gather responses about how well the new system works
Identifying any limitations of the system
Identifying any necessary improvements that need to be made
Audience Appreciation
Factors to be considered:
The age of the target group
Example:
Young children will have a different response compared to more mature group of adults
Chapter 8
Effects of using ICT
Positive Effects
There has been a large increase in job opportunities in the following areas:
Network managers and computer technicians
Computer Programmers
Web designers
Systems analysts
Delivery drivers
Flexible-Working (flexi-time)
Definition:
Workers complete the same number of full-time hours over a working week
Workers can choose when to start and end in agreement with the manager
Example:
Workers start at 9:30 rather than 9 am to miss school run/miss rush hour
Job Sharing
Definition:
A full-time job is divided between two or more part-time workers.
Example:
The work of two employees combined is a 40-hour week; each work for two full days and a half
day.
Compressed Hours
Definition:
Working the full normal hours in a week but in fewer days.
Example:
A 40-hour week compressed into 4 days not 5 days
Eyestrain/Headache
Caused by:
Staring at a computer screen for a long time.
Caused by:
Continuous typing on keyboard or prolonged gripping of mouse
Repetitive clicking of mouse buttons
8.7 E-safety
Personal Data
Definition:
Data relating to a living person who can be identified by this data.
DPA principles:
Data must be fairly and lawfully processed
Data can only be processed for the stated purpose
Data must be sufficient, relevant and not excessive
Data must be accurate
Data must not be kept longer than necessary
Data must be processed according to the individual’s rights
Data must be kept secure
Data should not be transferred outside the area of the act
unless sufficient protection exists
Definition of E-safety
It is the need to take precautions to keep personal data safe when
using the internet.
Why are internet searches to find relevant information not always fast?
The search might be too general giving irrelevant information
Search providers add marketing advertisments to the search results
Computer might be infected with virus taking up memory and slow down data transfer
speed over the internet
If the computer’s memory is close to full, data transfer speed over the internet can slow
down significantly
Undesirable Information
Steps to help you avoid undesirable websites:
Use webpage filtering software
Use the safe search feature on search engines
Check keywords that you use to search with
Don't click the links that are shown in junk email (spam)
Plagiarism is the action of using ideas or words of others without citing the source.
Blogs
Definition:
Short for web log
A personal website where the blogger types in their opinion on some
topic
Features of a blog:
Website where data entered by a single author
Visitors can only read and comment on the material on blogs
Based on author’s personal observations
Usually organised in reverse chrolonogical order (most recent to least recent entry)
Microblogs
Feature of a microblog:
Is shorter in length than a blog
Consists of short sentences
Microblogs are most often used on social networking sites to make short,
frequent posts.
Wikis
Definition:
Software/websites that allow users to create and edit web pages using web browser.
Features of a wiki:
A wiki has many authors
Any user can edit, delete or modify the content
Its structure is determined by its users and the content
Uses links to websites
Allows large documents to be seen by many people – it is easier
than emailing several people
Forums
Definition:
Online discussion boards where users can hold conversations in the form of
posted messages.
Moderated forum
Definition:
A forum in which a post must be approved by an admin before it’s allowed to be posted.
Unmoderated forum
Definition:
A forum in which posts are posted without an approval from an admin.
Chapter 9
Part I
ICT Systems
Examples:
Human voice
Analogue watch
Temperature recorded using a mercury thermometer
Digital data
Definition:
Data that is made up from the binary values 0 and 1.
Examples:
Digital watch
Barcode
Light switch
ADC is needed to convert the analogue signals from the microphone into digital data that the
computer can then process.
DAC takes digital data from the computer and converts it into analogue signals, which the
loudspeaker then converts into sound.
Weather stations
Sensors used:
Rainfall
Temperature
Wind speed
Wind direction
Air pressure
Humidity
Steps:
1 Data is read by the sensors
2 The data is converted to digital data using the ADC
3 The data is sent to the microprocessor (in the ground base unit) by radio waves
4 Graphs are automatically produced by computer
5 Data is saved in the computer for later use
Unlike measurement systems, the microprocessor will take some action, which
will affect the next input value it receives.
Burglar Alarms
Sensors used:
Pressure sensor to pick up the weight of an intruder coming through a door
Motion sensor to pick up the movement of an intruder in the building
Sound sensor to pick up sounds such as footsteps or breaking glass
Steps:
1 The system is activated by keying in a password on a keypad
2 Sensors constantly send data to microprocessor:
3 Data from the sensors is converted to digital using an ADC
4 Microprocessor compares data from sensors with preset values
5 If data is inside the acceptable range then no action will be taken
6 If any of the incoming data values are outside the acceptable range,
then the microprocessor sends a signal to:
A siren to sound the alarm, or
A light to start flashing.
7 The alarm continues to sound and lights continue to flash until the system is reset with a
password
Definition:
It is computer software that acts like a human expert in a particular field.
Modeling Examples:
Finance modeling using spreadsheets
Simulators
Finance Modeling
Spreadsheets are often used to model the financial systems of a business.
Simulators
Definition:
System designed to imitate a real-life experience.
Examples:
Flight simulators
Car simulators
Ship simulators
9.6 Robots
Definition:
A machine that can be programmed to carry on a variety of tasks.
Uses of Robots:
In car manufacturing
In dangerous situations
To do repetitive work
Chapter 9
Part II
ICT Systems
Barcode reader
How does barcode reader read barcode on a product?
1 Barcode reader shines a red light onto the barcode
2 Light is reflected back to sensors in the barcode reader
3 Black stripes reflect less light than white stripes
4 The reflected light (analogue) is converted to digital data using ADC
to be sent to a computer
Uses of ANPR:
• To track a specific car
• With speed cameras
• In car parking systems
How does RFID reader read data stored on a passive RFID chip?
1 RFID reader provides energy so that the chips can broadcast data
to them
2 RFID reader sends out radio signal to the chip requesting data and to
establish a connection
3 Chip’s antenna broadcasts signals carrying data to the RFID reader
4 The signals are detected by the reader which interprets the data RFID reader
How does RFID reader read data stored on an active RFID chip?
1 RFID reader sends out radio signal to the chip requesting data and to establish a
connection
2 Chip’s antenna broadcasts signals carrying data to the RFID reader using its internal
battery
3 The signals are detected by the reader which interprets the data
The following are the step when somebody approaches passport control at an airport:
1 The passport page containing the RFID chip is scanned by RFID reader
2 Fingerprint data on the RFID chip is read by the RFID reader
3 The passport holder now presents their finger to a fingerprint scanner to capture their
fingerprint
4 This fingerprint is compared to the scanned fingerprint from the RFID chip
5 If the two fingerprints are the same, then the person is the true owner of the passport
Chapter 9
Part III
ICT Systems
GPS
Definition:
• GPS stands for Global Positioning System
• It is a space-based system that uses satellites to calculate the
position of a receiver
• Typically, four satellites must be visible to the receiver
Uses of GPS:
• In cars to calculate routes
• By walkers to locate position on hills/mountains
• By runners to calculate distance run
• By farmers for livestock control
• In satellite navigation systems for ships
• In tracking aircrafts
Advantages:
• The driver doesn’t have to consult paper maps, so it is safer
• The system can estimate the time of arrival
• It is also possible to program in the fastest route, route to avoid traffic, etc.
• The system can also give useful information such as the location of petrol stations,
pharmacies, hospitals, etc.
Disadvantages:
• If the maps are not kept up to date, they can give incorrect instructions
• Weak satellite signals can give inaccurate data
• If an incorrect starting point or destination point is input, the system will give incorrect
information
GIS
Definition:
• Stands for Geographic Information System
• A computer system that allows us to model, analyze and query
data according to their location
Uses of GIS:
• Allows the user to model and analyze data according to location
• Edits map data
• Combines maps, graphics and databases
• Works with GPS
RFID technology
Steps to use RFID technology to track a person:
1 An ankle monitor makes use of RFID technology
2 The ankle monitor with RFID tag sends out radio waves, which are
picked up by RFID reader in the person’s home
3 If the person isn’t at home, an alert is sent to the police’s control room
GPS
GPS monitoring is also used so that the person can be tracked outside their home.
Solution:
AI biometrics learns the user’s fingerprint by checking different alignments of the user’s finger
(dynamic profiling).
Solution:
Facial-recognition system uses AI to recognize the face of a person even if some soft biometric
changes exist. This requires the facial recognition system to understand these soft biometric
changes and be able to pick them out.
Soft biometric changes are small changes to the face like growing a beard,
wearing glasses or growing old.
Vision enhancement
Definition:
These are systems to improve vision for humans.
Robotics
Drones
Definition:
Drones are unmanned (pilotless) flying devices.
Uses of drones:
• Survey the landscape in 3-D for use with GPS
• Investigate weather phenomena
• Search and rescue people and animals in natural disasters
Robotic Surgery
Definition:
Robotic surgery allows surgeons to perform complex procedures with more
precision and control than the standard techniques.
Quantum cryptography
Definition:
Quantum cryptography is a type of encryption used in fiber optic cables.
All CAT software needs some post editing by the user to remove errors
from translation process.
Virtual reality
Definition:
Artificial environment created by software.
Chapter 10
Banking Applications
Real-Time Processing
Definition:
It is a mode of processing in which input data is processed immediately.
On-Line Processing
Definition:
Mode of processing in which input data is processed shortly
The system uses a network
Advantages of using Chip and PIN card over Magnetic strip cards
Presence of editable memory
More secure as the PIN typed must match up with PIN stored on chip
More robust as it’s not affected by magnetic fields
Disadvantages of using Chip and PIN card over Magnetic strip cards:
ATM fraud has gone up
The introduction of chip and pin has generated a rise in phishing
EFTPOS
Steps for EFTPOS process using Chip and Pin card to pay $50 to a supermarket:
1 The card is inserted into Chip and PIN reader to make contact with the customer’s bank
computer
2 The card is checked for its validity (check on expiry date, whether stolen card, etc.)
3 The cashier enters the value of purchase ($50 in our case)
4 The customer is requested to enter their PIN
5 The PIN is read from the chip on the card and is compared to the one entered in by the
customer
If they are the same, then the transaction will proceed
If the PIN is not correct, the user is asked to re-enter the PIN (only 3 trials)
6 Customer’s bank account is checked to make sure that it has sufficient balance to pay $50
7 If there are enough funds available:
$50 is deducted from the customer’s account
$50 is added to the supermarket’s account
8 A receipt is produced as proof of purchase
Clearing of Cheques
The third way to pay for the purchased goods is to write a bank cheque.
The re-order number is a pre-set value for the minimum allowable stock for
a good before ordering more stock from suppliers
1 Describe the advantages and disadvantages of the use of mail merge to produce
letters.
Advantages
Letters can be reused with different recipients
The operative does not need details of recipients
One letter only has to be proofread therefore saving time
Can select on any criteria which saves time creating it
Disadvantages
If there is an error, then all the sent letters will have this error.
Hardcopies will be wasted; taking up time and money
Slower checking on all letters
Higher level of staff skill is required
It may take longer time to setup mail merge than type to individuals.
3 Define a hyperlink.
A word/image in an HTML document that links either to another portion in the same
webpage or another webpage.
15 Describe is meant by CSS cascading style sheets (CSS) and why it used.
Files attached to a webpage that contains the settings for the appearance of text
and colors.
17 Define absolute cell reference, relative cell reference, named cell and named
range.
18 Describe what is meant by widows and orphans and how to avoid them.
Orphan: the first line of a paragraph, but it is the last line of text on a page. The rest
of the paragraph is on the next page.
Widow: the last line of a paragraph that appears by itself at the top of the page. The
rest of the paragraph is on the previous page.
They can ruin the appearance of the document so it can be avoided by using page
breaks, column breaks or changing page layout.
19 Write the line of HTML markup to display the picture “sport.jpg” or to display
the words ‘‘play sport’’ if the browser cannot locate the picture.
21 Write the line of HTML markup to link the text “Click on this link” to send an
email to email address “tmcp@cie.org.uk” with subject “Donation by John”
22 When the website has been created it has to be published on the internet. You
plan to upload it onto the internet using FTP.
Explain how to upload and publish the content of a website using FTP.
1 Download the FTP client program
2 Connect to the FTP server using the FTP client program
3 Login to the server using FTP username and password
4 Locate the files on your computer
5 Click upload button on FTP client program
6 Upload the files to the folder
Bookmark
Saved shortcut
Directs the browser to a specific web page
Allows the user to easily access favorite locations on the Web
Anchor
The anchor is a link/placeholder
The anchor links with another part of the web page
Hyperlink
Word/phrase/image
When the hyperlink is clicked
Links to another website
Gutter
A margin between the page margin and the fold of a book
Wrapping
Text written around an image in a word processing document
Header
Area at the top of every page
Footer
Area at the bottom of every page