You are on page 1of 168

IGCSE

ICT 0417
Theory
From Chapter 1 to 10

Page 1 of 168
Page 2 of 168
Section 1
ICT Theory

Chapter 1 Types and components of a computer system


1.1 Hardware and software
1.2 Main components of a computer system
1.3 Operating systems
1.4 Types of computer
1.5 Impact of emerging technologies

Chapter 2 Input and output devices


2.1 Input devices and their uses
2.2 Direct data entry (DDE) devices
2.3 Output devices and their uses

Chapter 3 Storage devices and media


3.1 Backing up of data
3.2 Types of access
3.3 Secondary storage media

Chapter 4 Networks and the effects of using them


4.1 Networks
4.2 Network issues and communication

Chapter 5 The effects of using ICT


5.1 The effects of ICT on employment
5.2 The effects of ICT on working patterns
5.3 Microprocessor-controlled devices in the home
5.4 Potential health problems related to the prolonged use of ICT equipment

Chapter 6 ICT applications


6.1 Communication applications
6.2 Data handling applications
6.3 Measurement applications
6.4 Microprocessors in control applications
6.5 Modeling applications
6.6 Manufacturing applications
6.7 School management systems
6.8 Booking systems
6.9 Banking applications

Page 3 of 168
6.10 Expert systems
6.11 Computers in medicine
6.12 Computers in libraries
6.13 Computers in die retail industry
6.14 Recognition systems
6.15 Monitoring and tracking systems
6.16 Satellite systems

Chapter 7 Systems life cycle


7.1 Analysis
7.2 Design
7.3 Development and testing
7.4 Implementation
7.5 Documentation
7.6 Evaluation

Chapter 8 Safety and security


8.1 Physical security
8.2 E-safety
8.3 Security of data
8.4 Additional security of data online

Chapter 9 Audiences
9.1 Audience appreciation
9.2 Legal, moral, ethical and cultural appreciation

Chapter 10 Communication
10.1 Communication with other ICT users using email
10.2 Effective use of the internet

Page 4 of 168
1. Types and components of computer system

Hardware and Software:


 Hardware : is a Physical Components that makes a computer system
 Software : is a general term of Programs that control the computer system
and processing data, there are two types

Internal Hardware:
 Motherboard
 Random access memory (Ram) RAM
 Read only memory (Rom)
 Video Cards
 Sound Cards
 Internal Hard storage devices ROM
(HDD & SSD) Video Card

External Hardware:
 Monitor
 Keyboard Sound Card Solid State Drive
 Mouse
 Printer
 Storage

Hard Disk Drive Motherboard

Page 5 of 168
Internal hardware:
Motherboard:
 Printed circuit board in all computers.
 It allow the processor and other hardware to function and communicate with
each other
 It is central to any computer system
 All components plug into the motherboard

(CPU) Central Processing Unit or (Microprocessor):


 CPU is brain / heart of the computer and consists of :
o Control unit – Coordinates input and output devices and carries out
program instructions
o Arithmetic and logical Unit ( ALU) – performs calculations and logical
comparison
o Immediate access store ( IAS) – Holds data and program instructions in
current use
 CPU Interprets , execute the commands and handle calculations, data
processing and movement data to and from system memory

Random Access Memory (RAM):


 Data stored temporarily
 This memory can be Written and Read
 Content lost when computer is turned off
 Volatile memory

Read only memory (ROM):


 To store permanent information
 Only read
 Data cannot be changed or lost when the power off
 Non-volatile memory
 Used to store BIOS instructions

Page 6 of 168
Video card:
 Allow the computer to send graphical information to video display like monitor
or television, made of memory unit, cooling mechanism and connection to
display unit.

Sound card :
 Integrated circuit to board to provide a computer with ability to produce
sounds

Internal Hard Disk Drive (HDD) / Solid State Drive (SSD):


 Main internal storage
 The main advantage is fast data transfer
 Magnetic in nature and one from the methods to store the information

Software: there are two types of software (application & system)

Application software: Program that allow the user to do specific task:

• Word processor: software to manipulate text documents, the user can


create, save, edit the documents, copy and paste, importing photos, translate
etc…

• Spreadsheet: software to manipulate numerical data in columns and rows,


use formula to carry out calculations, create graph and modeling the
calculations.

• Database: software to organize, manipulate, analyze data, each database


consists of one or more tables, and can carry out query, add modify data
and create report.

Page 7 of 168
• Control and measuring software: designed to allow a computer or
microprocessor to interface with sensors to measuring temperature ,
control application like chemical process (pH)

• Apps ( applications) software: it is applications which run on mobile phones


or tablet

• Photo editing software : software allow editing digital photo stored in the
computer

• Video editing software: software allow to manipulate videos and can do


editing, rearrange, adding, removing section, do color correction and
transition

• Graphics manipulate software : software allows bitmap and vector images


to be changed

• System software : Program that allow the hardware to run properly and allow the
user to communicate with the computer
• Compiler : computer program that translate program written in high level
language as a whole into machine code, the original program called the
Source Code and the program after compilation called the Object code,
Examples of high level language is Java, Python, C++ , Fortran .

• Interpreter: computer program that translate program written in high level


language , translation as one statement at a time ( step by step )

• Linkers: computer program that takes one or more object files produced by
compiler and combine them into a single program. Different pieces of code
called module and the linker put all together.

• Device driver: the name of software that enable one or more hardware
device to communicate with the operating system and without driver the
device unable to work.

Page 8 of 168
• Operating systems (OS): software running in the background of a computer
system , without operating system the computer will not user friendly, OS
allow:
• Input / Output operation
• User communicate with the computer
• Error handling
• Managing of security ( log in – password – user account )

• Utilities : software to carry out specific tasks on a computer, and to help to


maintain and control computer recourses include :

• Antivirus, Anti-spyware, Backup files, Disk repair, File management,


Security , Screensavers, Disk defragmentation

Main components of computer system

Computer system consists of:


1. Input devices
2. Output devices
3. Secondary storage devices

Internal hardware devices:


1. The central processing unit (CPU)
2. Internal hard disk drive
3. Random access memory ( RAM)
4. Read only memory ( ROM) :

 Boot files: Code tells the computer what to do when the first
start up referred as BIOS (Basic input/output system.
 CMOS : Chip that BIOS stored the data ( date & time and
system configuration) in non-volatile chip called CMOS
(complementary metal oxide semiconductor) this is battery
powered

Page 9 of 168
Operating systems:

Operating systems: to enable computer system to function and allow users to


communicate with computer systems
General tasks for Operating systems:
1. Controls operation of input & output & backing storage devices
2. Supervising running , loading, running and storage applications programs
3. Deals with errors may occur in applications programs
4. Maintain security of computer system
5. Maintain computer log
6. Allow to communicate between the user and computer system

User Interfaces (2 types):


• User Interface (2 types):
1. Command line interface (CLI) – used by programmers, analyst,
somebody need direct communication with the computer for
development. as MSDOS
2. Graphical User Interface ( GUI) – used by end-user who doesn’t need
to know the computer works or who need to play games, handle the
pointing device .. as Windows

Page 10 of 168
GUI

CLI
Types of computers

1- PC ( personal computer /desktop computers)

Advantages Disadvantages
• Lower cost because spare parts and • Not portable.
connections tend to be standard • You need to copy files if you
• Better specification (fast processor..) do some work outside.
• No much heating • More complicated than
• Less damaged can be happened laptop
because fixed in one location
• Internet access is also stable because
not moved around

Page 11 of 168
2- Laptop / Notebook computer

Advantages Disadvantages
• Laptop in single unit then no trilling • Easier to steal.
wires • Battery is limited life.
• Can take full advantage of Wi-Fi. • Keyboard and pointing devices
• Lightweight. can sometimes be not suitable
• Low power consumption. to use.
• Portable, can be taken anywhere and
can connect with multimedia system

3- Tablets

Advantages compared to laptops Disadvantages compared to


laptops:
• Very fast to switch on • Less storage space and memory
• Fully portable, small, light can be • Typing in touch screen can be
carried any where slow and can have some errors
• Built in camera & video • Transferring files has to be done
• Touchscreen , no need input device through App store
• Long battery life • Laptops support type file format
• Can use several Apps as standard more than tablets
(example : MP4 player)
• Don’t generate any heat
• When power button is pressed it
will be standby but remain
connected to the internet

Page 12 of 168
4- Smartphone
Allow normal phone calls and also have OS ( iOS, Android, Windows)

functions of smartphone :

 Send/receive email
 Surf internet
 Global positioning system GPS
 Calendar functions
 Telephone banking using banking Apps
 VIOP – voice over internet protocol using internet
 Streaming of video
 Streaming of music
 Social networking
 Instant message
Advantages Disadvantages
 Easy to carry (very small in size  The small screen make pages
and lightweight difficult to read
 Used to make phone calls and also  Small keyboard make difficult to
connect to internet while on move type things and slow also, but this
 Used anywhere sine have Wi-Fi solved in large screen
 Have hundreds of Apps  Web browsing can consume
 Have reasonable battery life battery quickly
compared to laptop  Memory is not large when you
compare with laptop
 Not all websites compatible with
smartphone operating system
 Easier to lose or stolen since
small size
 The data transfer rate using
mobile phone networks is slower
with Wi-Fi

Page 13 of 168
4- Smartwatches
Allow users to wear a mini computer in their writs and have the functions of
smartphone
Some functions of smartwatches :
 Internet connectivity , can browse& search ,
send email
 Ability to make and take phone calls
 Messaging using text or video
 Weather forecasting
 Fitness and health monitoring capability
 GPS , find location , using satnav , direction to
other location

Advantages Disadvantages
 Same advantages of  Same disadvantages of smartphone
smartphone  Smartphones are large and bulky.
 It can wear in wrists  Problem with battery failure or
 Monitoring fitness and health empty battery.
regimes  Unattractive design
 The software for GPS needs to kept
up to date update
 During running loss of satellite can
make an issue
 During running sunlight can make it
unreadable

Page 14 of 168
Mainframe computer
Is used for large and very powerful computer system, and the main purpose
to run commercial applications such as banking, insurance where huge
amount of data.

Main features of Mainframe computer:


 They can have several CPUs.
 They have very fast processor speeds.
 The can have support multiple operating
systems.
 They can have huge amounts storage capacity.
 They can have huge internal memories.
 They often operate using time sharing or batch processing

Impacts of Emerging Technologies:


 Artificial Intelligence (AI)
 Vision enhancement
 Robotics
 Quantum cryptography
 Computer assisted translation ( CAT )
 3-D and holographic imaging
 Virtual reality

Artificial intelligence AI biometrics:


 Biometric technology use unique characteristic of particular part of
the body comprising facial recognition, iris scan, retina scan,
fingerprint scan, etc
 The problem with biometric technology that many fingerprint
identification systems falsely reject a person's fingerprints , when
scan checked in database no matched found

Page 15 of 168
 Artificial intelligence (AI) biometric overcome this problem using
dynamic profiling , this is mean the person no worry to get his
fingerprint in exactly right place every time on the scanner
 Facial-recognition system has the same problem ( wear glasses –
grown hair – has aged ) AI can overcome this problem

Vision enhancement
 Low vision enhancement system ( LVES ) use video technology through
a headset connected to a computer, the system allow images to be
projected in from of the eyes, this bring the things closer by the user of
the system
 Night vision enhancement ( NVE ) amplifies infrared light and visible light
so that the image can still be seen in the darkness ( military use this
technology
Robotics
 Robotics mostly used in manufacturing industry, like weld car bodies ,
spray body panels, fit items
 Robots appearing in many areas in our lives
 One application used in drones (flying devices) used by military and
civilians.
 Robots can perform many tasks:
 Dangerous jobs ( bomb disposal )
 Exploring (Volcanos)
 Repetitive manufacturing job ( Cars )
 Moving heavy objects
 Surgical procedure

Impacts of Robots on everyday life


 Increased personnel time
 Increased manufacturing efficiency
 Much faster than human and less expensive
 Robotics replace human in some auto jobs
 Safer since robots can work in dangerous places

Page 16 of 168
Quantum cryptography
 Cryptography is the science of making a message unintelligible to any
unauthorized user (hacker).
 Quantum cryptography is based on the use of photons (light) and their
physical quantum properties
 Send a message with complete privacy (encryption)
 Make it much more complex to decrypt, ( enable secure
communication
Computer-assisted translation ( CAT )
• When human translators use computer software to help in translation
process
• Reduce translation time but may be not 100% accurate
Impacts on everyday life
 More accurate
 Multilingual
 Quick translator

3-D and holographic imaging


• Holography is a technology makes images appear as 3D ( known as
hologram )
• Hologram use 2 regular 2D images to manipulate to produce 3d images
• Hologram have the following application:
 Engineering design CAD
 Architecture , ability to rotate design 360 degrees
 Simulations
 Medical imaging ( see inside organs as 3D )
 Cinema ( special effects)
 Gaming ( special effects)
 Advertising
 Holographic television expecting in 2025 without special glasses
 Holographic computer memories ( new options of optical storage

Page 17 of 168
 Optical computers ( speed will be faster )

Holography involves to use:


 A source of laser light
 Interference of light
 Light diffraction
 Light intensity recording

Virtual reality
Artificial environment that users can interact with
General equipment to use Virtual Reality
Eye goggles – gloves – headphones – sensor - powerful computer

Used in the following areas/ uses:

 Military applications – training pilots


 Education – training surgeons
 Healthcare ( as diagnostic tool )
 Entertainment ( games when wear gloves with helmet , with sound to
make very real
 Fashion show to see the clothes on people

Page 18 of 168
 Heritage ( to see the mountains)
 Business ( Training course )
 Real state ( people can look around the house )
 Engineering ( to show how design of the building will look )
 Media ( special effects of movies( The matrix ) )
 Scientific visualization ( to see molecular structure in chemistry

Impacts on everyday life:


 Improved medical surgeons
 Stronger building
 More realistic education ( interactive learning environment)

Page 19 of 168
2- Input and output devices

Input devices and their used:

1- Keyboards :
Uses :
 Input of data (text, number,..) into applications software
 Typing commands to the computer ( Ctrl P + Ctrl S … )
 Mostly QWERTY keyboard is used
 Ergonomic keyboard is used to reduce the health-related problems
like ( carpal tunnel syndrome – RSI )
Advantages Disadvantages
• Fast text entry into the document • Can be difficult to use if the user
• Easy to use has limited arm/wrist use.
• Easier to do verification checks as • Slow method when compared
the data is entered. with direct data entry
• Large device.

2-Concept Keyboard
 Uses icons instead of standard letters ,
 Often used in fast food restaurants one
item (example ice cream)
 Fast data entry.
 The keyboards are waterproof.
 Certain applications.
 Tamper resistant

Page 20 of 168
2. Numeric keypads
Used to enter number only

USES:
 Automatic teller machines (ATMs).
 Mobile phones.
 Point-of-sale (POS)
 Chip and PIN devices when paying by credit/debit cards
 Fast entry of numeric data into a spreadsheet

Advantages Disadvantages
• Faster than standard keyboard • Sometimes have small keys, input
• Very easy to carry around more difficult.
• Sometimes the order of the
numbers on the keypad isn’t
intuitive.

Pointing devices:
1- Mouse
By moving mouse around, you can control the
position of the pointer on the screen

USES:
 Opening, closing and minimizing software.
 Grouping, moving and deleting files.
 Controlling the position of a pointer on the screen

Advantages Disadvantages
• Faster way than using a keyboard. • More difficult for people with
• Very quick way to navigate restricted hand
applications and internet • Easy to damage
• No need large desk area. • Difficult to use if no flat surface

Page 21 of 168
2- Touchpad
Used in many laptop as a pointing device

Advantages Disadvantages
• Faster than a keyboard • People with limited hand/wrist
• No need for a separate mouse. movement find the device difficult
to use.
• Difficult to control when compared
to a mouse.
• Difficult in certain operations such
as drag and drop.

3-Tracker ball
Uses
 Used in applications where the user has disability
(RSI)
 Used in a control room /faster than a mouse
 Used in some luxury cars to select functions such
as radio, telephone, music

Advantages Disadvantages
• Easier than a mouse. • Not supplied with computers as
• More accurate positioning. standard.
• More robust than a mouse. • User may need training
• Needs less desk space than a mouse

Page 22 of 168
4-Remote Control
Uses :
 Televisions, satellite systems, most of systems
use remote controls.
 Control multimedia systems.
 Used in industrial applications to remotely
control processes.
Advantages Disadvantages
• Operated from any reasonable • Difficult to use if the operator has
distance. limited hand/wrist movement.
• Some chemical processes are • It is easier to block the signal.
hazardous, can select operation
from distance

5-Joystick
Uses :
 Used in video/computer games.
 Used in simulators

Advantages Disadvantages
• Easier than a keyboard to • More difficult to control the on-
navigate the screen screen pointer
• Control is more realistic than
using a mouse

Page 23 of 168
5-Driving wheel
Uses :
 Used in video/computer games.
 Used in simulators (car-driving
simulators)
Advantages Disadvantages
• Easier than a keyboard or • Expensive input device.
joystick. • Movements too sensitive.
• Actual steering wheel and other
controls operate in real life.

6- Touchscreens
Uses :
 Self-service
 ATMs
 Point-of-sale terminals
 Airports, railway stations, tourist
offices
 Personal digital assistants (PDAs), mobile phones and satellite
navigation systems
 Interactive white boards in education.
 Computer-based training (CBT) - on-screen testing.
 Used as an output device

Advantages Disadvantages
• Faster entry. • Limited number of options
• Very easy method. available.
• User-friendly. • Can lead to problems.
• The screen can get very dirty,
reduce its responsiveness

Page 24 of 168
7- Scanners:
There are two types of scanner, The most common is
flatbed scanner, also barcode scanner is another type
Uses
• Scan documents.
• Scan in old/valuable documents/books.
• Scan in photographs.
• Scan in barcodes at POS terminals.
Advantages Disadvantages
• Images can be stored for editing • Quality can be limited depend on
at a later date. resolution of the scanner.
• Much faster and more accurate. • Slow at scanning if color scanning
• Recovery damaged documents selected
and photographs.

8- Digital Camera
Digital cameras replaced with traditional based film ,
now the images stored digitally on solid state
memory , and can be transferred to computer by:

 Directly reading the memory card.


 Connecting to the computer using a USB port.
 Using wireless data transfer (Wi-Fi or Bluetooth).

Advantages Disadvantages
• Easier to produce better-quality • The quality of photographs
photographs. depends on the number of pixels.
• Easier and faster to upload • Images compressed to reduce
photographs to a computer reader. the memory used.
• No need to print out photographs.
• Can store several hundred
photographs.

Page 25 of 168
9- Video Cameras
DV (digital video) cameras, store
compressed photo frames at speed of 25
MB per second this is known as (MOTION
JPEG)

Advantages of using DV cameras compared to traditional cameras

• Much easier to manipulate video.


• DV format gives a very high quality of image

10- Microphone
Microphone connected directly with the computer,
Sounds converted to an analogue signal then converted
into a digital signal
Uses :
 Presentations.
 Input in voice-recognition software
 As a sensor to pick up sound.
 Used in video conferencing or Voice over Internet Protocol
Advantages Disadvantages
• Faster to read text instead using • Sound files is big.
keyboard • Voice-recognition software not
• Manipulate sound. accurate
• Voice-activation system, Advantage
of improving safety. – driving cars

Page 26 of 168
11-Sensors
 Sensor is a device to input data into a computer, the data is physical
quantity like temperature, light, moister, this data is analogue in nature
 Computer can read only digital data , then the data from sensor should
be converted to digital using an analogue digital converter ADC

Type of sensors:

Advantages Disadvantages
• More accurate than human • Faulty sensors can give spurious
operators. results
• Readings are continuous - no break
• Any necessary action or warning will
be initiated immediately
• Systems can be automatic, removing
the need for human intervention.

Page 27 of 168
12- Graphic Tablet
Used with stylus to produce freehand drawing

Uses
 produce freehand drawings
 Used in computer-aided design (CAD)
work

Advantages Disadvantages
• Modify drawings before they are • More expensive than other
input. pointing devices.
• Very accurate method of drawing. • Takes time to produce a drawing
• Can record levels of pressure. • Menus not very user-friendly.
• Larger drawings (such as A4) are
expensive to produce.
• The touch screens are damaged
easily.

13- Webcams
Uses
 Conversation while chatting online.
 Video conferencing

Advantages Disadvantages
 Immediate face-to-face video chat  Very limited features and often
 Contact with each other without poor quality.
traveling  Need to be connected to the
computer.

Page 28 of 168
14- Light pens
Light pens contain sensors that send signals to a
computer whenever light changes are detected,
and only work with CRT monitor

Uses :
• Selecting objects on CRT screens
• Drawing on screen ( as example CAD Package)

Advantages Disadvantages
 Greater accuracy than touch screen  Problems with delay when
 Small drawing on screen.
 Easy-to-use  Only works with CRT monitors.
 Not accurate when drawing.

Page 29 of 168
Direct data entry ( DDE ) devices:
Devices for reading information from cards
Magnetic stripe readers
Used to read information on the magnetic stripe
founded in back of credit/debit card
Uses:
 On credit/debit cards for use at ATMs or EFTPOS
(Electronic Funds Transfer at Point Of Sale)
terminals
 Security devices to allow entry to buildings,
(as in hotel rooms)

Advantages Disadvantages
• Fast data entry • If the magnetic stripe gets
• Error free damaged the data is lost.
• Secure • Doesn’t work at a distance.
• Prevents access to restricted areas • Not human readable.
• Not affected by oil, water, moisture
• Very robust.

Contactless card readers


Contactless debit or credit cards allow customers to pay
for items worth up to $25 without entering their PIN
The steps are taken to pay :
 Costumers look out for the contactless symbol on
the payment terminal
 The shop assistant enter the amount
 The reader inform the customer to present contactless card
 The customer hold the card in front of the reader
 The terminal display the card has been read
Advantages Disadvantages
• Faster transaction. • More expensive than normal cards.
• Encryption. • A thief with a suitable reader could
• No typing errors. monitor contactless card transaction

Page 30 of 168
• Retailers will not access to the • Can take money twice.
customer’s card. • Transactions are a small
• The chip in the contactless
credit card responds with a
unique number used for that
transaction only.

Chip and PIN readers


Similar to smart card reader but used in EFTPOS terminal
Uses:
 Payments using card in (restaurants, supermarkets,
travel, etc.).

Advantages Disadvantages
• More secure • Need to be careful to ensure PIN
• More robust isn’t read by somebody else while
typing it in.

Radio frequency identification (RFID) readers


Use radio waves to read and capture information stored on tag
RFID tag is made up of two components:
 A microchip stores and processes information
 An antenna receive and transmit data
Uses:
 Livestock tracking ( each animal in farm will be known)
 Retail ( like barcode but without scanning )
 Admission passes (parks RFID cards )
 Libraries ( book can tracked )
Advantages Disadvantages
• No direct line • Tag collision.
• Very robust, • Easy to jam or interrupt.
• Very fast read rate and reuse. • Easy to hack.
• Bulk detection is possible • More expensive than barcode
(hundred tags/s . system

Page 31 of 168
Magnetic ink character recognition/reader (MICR)
Is as system to read characters printed in a special ink

Uses:
 Used to process bank cheque in banking operation
using system called batch processing

Advantages Disadvantages
• Offer greater security than OCR • Only certain characters can be read
• No manual input, so errors are and the number of different
reduced characters is very limited.
• The magnetic ink characters can • More expensive
still be read even if somebody
writes over them

Optical Mark recognition / Reader (OMR) Read


Read marks written in pen or pencil
Uses:
 Read questionnaires, multiple-choice examination papers
and other forms
Advantages Disadvantages
• Very fast way of inputting the • The forms need to be carefully
results of a survey. designed and correctly positioned
• More accurate. which can make problem for result.

Page 32 of 168
Optical character recognition/reader (OCR)
The new system in processing of passport and id cards
Uses:
 Processing of passports and identity cards
 Converting printed documents to an editable
electronic format
 Read car number plate
Advantages Disadvantages
• Much faster data-entry system • Difficulty reading handwriting
• The number of errors is reduced • Not very accurate
• Can read handwriting

Comparison between OCR and OMR


OCR OMR
Because this method reads handwriting, it Since use shading to answer, the
is possible for customers to extend their information obtained is limited to the
answers to questions choices offered in each question
poor handwriting may cause reading OMR relies on simply detecting where
errors marks have been made on a page; the
position of the marks is compared to
a template stored in memory
OCR is used for converting printed OMR simply reads the position of marks,
documents to an editable electronic so it is ideal for multiple-choice exam
format papers
OCR requires a complex recognition This method requires complex (and
system expensive) forms to be
completed; but the recognition system is
simpler than OCR
Fewer 'how to fill in' instructions are While this method requires more 'how to
needed for forms designed to be fill in' instructions, it is easier and faster
completed and then read by OCR for customers to complete OMR forms
than to complete OCR forms
While OCR is more accurate than data OMR is essentially a more accurate
entered into a computer by keyboard, method for reading data than OCR
there are still problems recognizing
all types of handwriting, leading to
inaccuracies

Page 33 of 168
Barcodes readers ( hand scanner )
Uses:
 Supermarkets and shops
 Libraries to keep track of books
 Safety function - electrical equipment checking
regular basis.

Advantages Disadvantages
• Much faster • Expensive system to administer.
• Way of recording data • Not foolproof.
• Allow automatic stock control. • Easily damaged than RFID tags or
• Trusted technology. magnetic strips.

Quick response (QR) code


• Is made of matrix of filled in dark square on light
background, normal barcode can have 30 digits but
QR can hold over 7000 digits.
• Smartphone with camera can read QR code which
can be website link or advertising

Advantages
• No need to write down a key or
website
• QR can store the website address
on business card or on the
magazine, train, bus

Page 34 of 168
Output devices and their uses
CRT monitors
Cathode ray tube (CRT) monitors
Uses:
 Output device
 Used with light pens

Advantages Disadvantages
• The angle of viewing is still better • Present a safety hazard if not
than with most TFT monitors supported properly
• They work with light pens in • Run very hot and can cause fires
CAD/CAM applications • They consume more power than
modern TFT
• They can flicker, can lead to
headaches and eyesight problems

Thin film transistor (TFT) monitors


Made up of thousands of tiny pixels.
Uses :
 Output device
 Laptop computers.

Advantages Disadvantages
• Lightweight • The angle of viewing a TFT is
• Produce less glare than CRT monitors fairly critical.
• Less radiation • Definition is sometimes not as
• Consume less power / don’t generate good as a CRT monitor.
much heat

Page 35 of 168
LCD and LED monitors
• CRT monitor almost gone
• Most monitors become LCD ( Crystal Liquid display / diode
technology
• Modern monitors are backlight using light emitting diode LED
which give the monitor better contrast and brightness
• LED no need warm up to reach to full efficiency
• LED produce brighter light
• LED consume very little power / produce less heat
• OLED is new technology , which is very thin, flexible, lighter

Multimedia projectors
Uses :
 Training presentations
 Advertising presentations
 Home cinema systems
Advantages Disadvantages
• Many people can see a presentation • Images can sometimes be fuzzy
without crowding • Expensive
• No networked computers • Setting little difficult to setup

Page 36 of 168
Printers
Laser Printers
Produce high-quality, high-volume printing

Uses :
 When low noisy required
 High-quality, high-volume printing
Advantages Disadvantages
• Low noisy • Color laser is expensive
• Fast if several copies • Produce ozone and volatile
• Handle very large print jobs organic compounds.
• High quality
• Long time toner

Inkjet printers
Uses:
 Low volumes are required
 For single pages are ideal
 3-D inkjet printers to produce prototypes

Advantages Disadvantages
• High-quality • Slow output if several copies
• Cheaper than laser printers. • Can't do large print jobs
• Very lightweight and a small • Printing can (smudge) if user is
• Don’t produce ozone and volatile not careful
organic compounds • Can be expensive

Page 37 of 168
Dot matrix printers
type of impact printer head is slow, noisy and the
output is not good

Uses:
 Used in noisy environments

Advantages Disadvantages
• Used in environments that would be • Very noisy
a problem to laser or inkjet printers • Actually cost more than an inkjet
• Carbon copies or multi-part outputs • Very slow, poor-quality printing
can be produced
• Very cheap
• Easy to use

3 D printers
Primarily used in computer aided design CAD
applications, can produce
solid objects

Advantages Disadvantages
• The manufacturing of items much easier • None original items
than ever before • Dangerous or illegal activities.
• Take a short length of time for designs to • Due to job losses
be converted into working prototypes
• less costs
• Medical benefits , producing artificial
organs, prosthetics and medical
products ,tissue engineering, artificial
blood vessels, designs of medical tools.
• Parts for machinery manufactured using
3D printers

Page 38 of 168
Speakers
Uses :
• Output sound
• Play downloaded sound files
• Audio output helps disabilities user.

Wide Format Printer


 Used to produce large drawings e.g. blueprints of
buildings; are often used with CAD applications
 Used to produce large pictures for use on
billboards or giant posters
 They can also print on plastic coated paper
 The most common types are pen plotters
Advantages Disadvantages
 Can produce huge printouts  Slow in operation
 Print quality is extremely high  Expensive to buy and maintain

Control applications
Actuators • Used to take signals from a
computer and convert them
into a form of motion as
example operating motor,
pumps and valves
• Usually convert from digital to analogue
(DAV)
Motors Turned on or off by the actuator
Uses
• Automatic washing machines , cookers , water
pumps in central heating systems, and in
automatic glasshouses to open windows and
switch on fans
• Control of robot
Page 39 of 168
• In computers to control fans, disk drives and
DVD drives
Buzzers Turned on or off by the actuator
Uses
• Used in cookers and
microwave ovens to tell the
operator when the cooking
process is complete
Lights The actuator is connected
to the switch that turns the
lights on or off
Uses
• Security lights
• In glasshouses
Heaters Actuators are connected to
switches that turn the
heater on or off

Uses
• Automatic washing
machines to heat up the water
• Automatically control the temperature in an
oven
• Control the heating in a central heating
system
• Temperature control in an automatic
glasshouse

Page 40 of 168
3- Storage devices and Media

Backing of data concept:


Backing of data is refers to copy files or data to different medium ( disk, tape,
flash drive .. ) in case of problem with the main secondary storage device , and
copying should be in regular bases.

Why back up data?


• To safeguard against loss of data due to the failure of the original
secondary storage
• To safeguard damage caused by hackers
• Backup can be made to use the files elsewhere
• Backup also taken to protect data files from virus

Type of access
Serial access:
• When using serial access it is necessary to start from the beginning of the
file then access to each record ( like database including field , record and
file ) then run until to the required record found
• This way used in magnetic tape and very slow form of data access
• This way used when speed of access is not important ( as example utility
billing, clearing bank cheques, or producing pay slips)

Page 41 of 168
Direct access:
• Used with magnetic disks , optical media and solid state media
• The computer use key field to calculate where data should be stored
• Direct access much faster than serial access
• When updating files using direct access the old file or data written over
by new records
• Mostly used where data access speed is vital like controlling chemical
plants or online systems like booking air tickets or automatic stock
control.

Secondary storage media:


The term byte is used to measure the size of memory or storage or file
size, and measured by KB, MB, GB and TB

Three different types of storage media:

 Magnetic
 Optical
 Solid state

Page 42 of 168
Magnetic storage media (Direct access)
Magnetic storage media depend on magnetic properties of certain
materials, data read using direct access

1- Fixed/internal hard disk drive (HDD)

Uses :
 To store the operating systems, software
/data/files
 To store applications software
 Real-time systems ( robots, control of a
chemical plants) and online systems
 Used in File Servers for computer networks
Advantages Disadvantages
• Very fast data transfer and fast access • Easily damaged
times • Have many moving parts
• Very large capacities • Their read/write operation can
be quite noisy

2- Portable hard disk drives


Connected to a computer using USB ( Universal
Serial Bus) port
Uses:
 Backup systems
 Transfer data between computers
Advantages Disadvantages
 Access time of data is very fast • Easily damaged if dropped or
 Large memory capacity subjected to a strong
 Transferring data between computers magnetic field; an incorrect
shut-down procedure could
also lead to loss of data

Page 43 of 168
Magnetic Tapes ( Serial Access )
Data is read from the tape using serial access , this way
is useless in real-time or online applications because is
very slow method

Uses:
 In applications where batch processing is used, for example, clearing
bank cheques, utility billing (gas, electricity, water)
 Backup media
 Used in long-term archiving of data.
Advantages Disadvantages
• Less expensive. • Very slow data access times.
• Very robust technology. • When updating, another tape is
• Huge data storage capacity. needed.
• The data transfer rate is fast. • They are affected by magnetic
fields.

Optical storage media

CD/DVD disks)
Laser light is used to read data and write
( R - Write once only) – (ROM - only read ) – ( RW - written or read
many times)
DVD have different technology from CD to increase storage capacity

Page 44 of 168
1-CD-ROM and DVD-ROM

Uses:
 CD-ROMs are used to store
music files, software, computer
games and reference software , they can't be written over
 DVD-ROMs have much larger storage and used to store films and
games

Advantages Disadvantages
• Store more data than floppy disks • The data transfer access time is
• Less expensive than hard disk slower than hard disks

2- CD-R and DVD-R


R letter means the disk is recordable once only

Uses:
 Home recordings of music (CD-R) and
films (DVD-R)
 Store data to use later or to be transferred to another computer
Advantages Disadvantages
• Cheaper than RW disks • CD-R/DVD-R can only be
• Once burned they are like a ROM recorded on once.
• Not all CD/DVD players can read
CD-R/DVD-R

Page 45 of 168
3- CD-RW and DVD-RW
RW means the disk is rewritable media
and can be written several times
Uses:
 To record television programmers
 Data can be added to at a later.
 Used in CCTV systems
Advantages Disadvantages
• Can be written over many times. • Relatively expensive.
• Can use different file formats • It is possible to accidentally
each time it is used. overwrite data.

4- DVD – RAM

Uses:
 In recording devices such as satellite
receivers to allow simultaneous recording
and playback
 Used in camcorders to store movies

Advantages Disadvantages
• Long life • Not as compatible as R or RW
• A rewrite operation over 100000 format
times • Expensive.
• Writing on DVD-RAMs is very
reliable
• Very fast access
• No need to finalize the disk
• Very large capacity
• Ability to read data at the same
time written

Page 46 of 168
5- Blu-ray discs

The main differences are:


 A blue laser, carry out read and write operations
 Blu-ray can store up to five times more than DVD

Uses:
 Home video
 Storing and playing back movies.
 Data storage or backing up
 Camcorder to store movie footage
Advantages Disadvantages
• Very large storage capacity • Expensive
• Very fast data transfer rate • Encryption problems
• Data access speed greater than • Fewer movie titles on Blu-ray
other optical format

Page 47 of 168
Solid state storage media Solid (Direct access)

Solid State drives (SSD)


There are some advantages of using SSD rather than HDD
 More reliable
 Lighter
 Lower power consumption.
 Run much cooler than HDDs
 Very thin.
 Data access faster than HDD

1- Memory sticks/pen drives


Store several gigabytes of data and use the
solid state technology

Uses :
 Transporting files between computers /
backup
 Security device to prevent software piracy ( dongle)

Advantages Disadvantages
• Very compact and portable media • Can’t write-protect the data/files
• Very robust • Easy to lose
• Doesn’t need additional software • The user needs to be very
to work on most computers careful when removing a
• Not affected by magnetic fields memory stick from a computer -
• Small incorrect removal may damage
the port and memory stick

Page 48 of 168
2- Flash memory cards

Uses:
 Storing photos on digital cameras
 Used as mobile phone memory cards
 Used in MP3 players to store music files
 Used as a backup store in hand-held
computer devices

Advantages Disadvantages
• Very compact and can be easily • Expensive per gigabyte.
removed and used in another • Have a limited life.
device • Lower storage capacity than
• Very robust. hard disks.

Page 49 of 168
4- Networks and the effects of
using them
Computer Network:
A network is two or more computers or other device connected together so
that can exchange data, share resources and files. Network created using
cables or wireless signal

Advantages of using Network:


 Easily share files and data
 Share resources (printers, internet..)
 Communicate with other network users
 Store data centrally by using file server
 Keep all setting centrally

Disadvantages of using Network:


 Greater risk of hacker
 Greater risk of viruses
 Cost of extra equipment
 Printer fast developing
 When the computer is down computers can’t use as standalone
computers

Network Devices :

Hubs:
Hubs are hardware devices that
can have a number of devices or
computers connected to them to
make LAN and not very high
secure / suitable for home
network

Page 50 of 168
Switches
Similar to hub but more
efficient, connect a number of
devices or computers together
to form a LAN and more
secure

Modem
• A device that converts analogue signal from telephone line to
digital signals which can be ready for the computer
• Also converts a computer’s digital signal into an analogue
signal for transmission by telephone line.
• Dial-up modems, transmission speed 60 kb/s
• ADSL (asymmetric digital subscriber line) modems operate at
up to 100 Megabits /s

Bridge:
Bridges are devices that connect
one LAN to another LAN that
uses the same
protocol

Page 51 of 168
Router:
• Connect network/computer to the internet
• Connect LAN/network together
• Transfer data between networks
• Router can connect two devices using cables
or wireless signal

Network interface card (NIC)


Allow to connect device to the network

Other hardware

Gateway:
A gateway is a network point that
acts as an entrance to another
network

Page 52 of 168
Network cables:
Even most of computers systems is using Wi-Fi
still network cables used because they have some
advantages over Wi-Fi :
 Faster data transfer rate
 Can be more secure than wireless
networks

Internet protocol (IP) and media access control ( MAC ) addresses

• Each device on the internet given unique address called internet


protocol (IP) address and the form is ( 109.108.158.1 )
• Home computer when connect to internet given IP assigned by ISP
(internet service provider )
• This IP can use instead of using full URL ( http://109.108.158.1)

Differences between IP and ( MAC ) addresses

• MAC Address is used to ensure the physical address of computer. It


uniquely identifies the devices on a network.
• While IP address are used to uniquely identify the connection of
network with that device take part in a network.

Wi-Fi and Bluetooth


Both provide wireless communication and
uses radio signals

Wi-Fi: is wireless networking technology


make it possible to connect devices
with a wireless connection to a network or to a single computer
• Easier to connect many devices to the network
• Better range up to 100 m
• Reduced cost of cabling / better security/ needs password
Page 53 of 168
• Limited area of network
• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/Less secure
• Sometimes physical devices can interfere with signal
which due to disconnection

Bluetooth: is wireless networking technology designed for very short


range connections

• Connecting wireless devices such as mouse, phone, which are very


close to a computer
• Transferring files between devices
• Printing wirelessly from a Tablet or Mobile phone
• Very slow data transfer speed
• Short distance of coverage, less than 30 meters distance
• Less secure since no password required
• Support limited number of devices
• Low-bandwidth

Page 54 of 168
Differences between Wi-Fi and Bluetooth

How to configure small network:

Suppose you asked to setup and configure small network, you have to do
the following:

• Setup an account with ISP


(Internet service provider )
to receive internet
connection
• Setting an IP account if
internet access is required
• Buy appropriate hardware
and make setup for all
hardware
• Configure all hardware with software correctly to allow wireless
connectivity
• Put all software into the server with its license
• Setup privilege (each user can access only on their own area)
• Setup network manager level of privilege to monitor the network
uses and can change the password

Page 55 of 168
Purchase hardware and software:

1-Hardware
Router to connect your LAN to the
internet

Switch / to connect Network devices


Hub together using cables

Network to connect physical


cables connections

Firewall it can be hardware of


software , to protect the
network against hacking

Server to manage network


functions such as network
security, network file
storage, share recourses ,
etc.

Page 56 of 168
2- Software
Web to browse the internet
browser

E-mail to send and receive e-mail


including attachments

Security Anti-virus /Spyware software


to protect your computer
from external threats
(Viruses / Hackers )

Network Environments
(Local area networks (LANs) and Wide area networks (WANs):

Local area networks (LANs)


 Covers small area (one building) or within
close area.
 LAN consists of number of computers and
devices that usually connect to a switch/Hub
which is connected to the router
Advantages Disadvantages
• Sharing of resources (printer, • Easier spread viruses to whole
internet.. ) network.
• Ease of communication • Printer fast developing
between users. • Slower access to external networks
• A network administrator to • Increased security risk when
control and monitor all aspects compared to stand-alone
of the network computers

Page 57 of 168
Wide area networks (WANs)

 Used where computers or networks are


situated a long distance from each other
 WAN is often created by joining several
LANs together
 Router is used to connect LAN networks
to form a WAN network
 The most common example of WAN is Internet

Wireless LANs (WLANs)


 (WLANs) are similar to LANs but there are no
wires or cables
 Devices known as Access Points (AP) are
connected to wire network at fixed locations.
 These devices provide wireless access to
devices on the network.
 It is much more convenient to use wireless
connections instead of running long wires all
over the building
Advantages Disadvantages
• All computers can access the • Security a big issue
same services and resources • Affect the signal by any problem.
(such as printers, scanners, • The data transfer rate is slower
internet) than in a wired LAN.
• Increased flexibility.
• Adding new computers and
devices is very easy

Page 58 of 168
Accessing the internet

Device Advantages Disadvantages


• More portable and • Touch pad may be difficult
Laptop computers smaller size compared to to use to navigate
desktop webpages
• Bigger screen compared • Processors are not as fast
to tablet and mobile as desktop computers
phones
• Stable internet • Should be connected to a
connection since the power supply all the times
Desktop connection is normally • Not portable
wired
• Use of input devices
including pointing devices
to make navigation easier

• More portable than • Signal strength dependent


Tablets laptop and desktop but on location
less than mobile phones • Smaller display screen
• Mobile : portable : easy • Not all websites designed
to carry around while you to be used by mobile or
move tablets
• Mobile : Always likely to • Touch screen may be
have a mobile all the difficult to use
Mobile Phones times • Limited battery life
• Mobile : can access
internet via mobile phone
network

Page 59 of 168
Internet and intranet:
• Internet :
 Internet is public
 Internet is network of networks
 Internet is global
 Internet has more information
than an intranet

• Uses of internet:
 Viewing webpages
 Sending and receiving email messages
 Communication using VIOP and Web video Conferencing
 Playing multiplayer games
 Streaming Video / Audio content
 Online Shopping/ Banking

• Intranet :
 Intranet is within one
organization ( private )
 Intranet can be policed
/ managed
 Intranet is more secure
 Data on the intranet is more reliable and relevant to the
organization than which on the internet

• Uses of Intranet:
 Viewing internal webpages ( Company , School , …)
 Internal e-mail and messing between workers
 Sharing internal documents

Page 60 of 168
Network issues and communication

Security issues:

• How hackers can affect your data and network


• Threats of data:
 Data could be deleted,
edited, corrupted or
replicated
 Data could be passed to
other people
 Accessing your email
account
 Carrying out online banking

• Threats of network:
 Network could be shut down or infected by virus
 Could stop production , cost a lot of money

Should internet be policed?

advantages disadvantages
• To protect vulnerable users • It would be extremely difficult
gaining access to undesirable and expensive to police the
websites internet
• To prevent illegal material be • Infrastructure and staff would
opened or shared by web users have required
• It will stop incorrect information • It is difficult to push roles in
being published on websites different countries
• This will be against freedom

Page 61 of 168
Reliability of information
 Information on the internet is more up to date than in books.
 It is much easier to get information from websites.
 There is a big amount of information on the internet that is
easier to locate than using several books
 Information could also be incorrect.
 It is possible to get millions of hits, which may make it difficult
to find the relevant information.

Unwanted of certain websites


 Risk of finding undesirable websites.
 Risk of connecting to websites that are not genuine, which
could lead to a number of problems.
 Security risks.

Methods of Authentication (username and password)


• Authentication: it technique to ensure only authorized users
are able to gain access to the network via Username/Password
or Biometrics, Magnetic Card, Digital certificates..etc.

ID and Password as authentication method:


 Password can be guessed especially if week password.
 Password can be seen by others
 Password can be stolen and used by others
 Spyware may be used to get the password
 Password can be hacked by using password generating software

Some ways to protect your password:


 Run anti-spyware software
 Change passwords on a regular basis
 Passwords should not be easy to guess or break, Strong
passwords should contain:
• At least 8 characters, one capital letter.
• At least one numerical value.

Page 62 of 168
• At least one other keyboard character.
 Strong password Exp. (Syl2@#TT90kj=0 )
 Week password Exp.( white, ahmed ,,,, )
Viruses:
• Computer virus is a piece of programming code/ software which can
install and replicate itself on the computer system without the user’s
permission which can cause:
 Crash the computer ( become slower)
 Can delete the files
 Data files can be copied by hacker
 Can stop the production

Antivirus software:
Antivirus software will check for virus attacks.

 They check software or files before they are run or loaded


 Checking of software and indicate a possible virus.
 Any possible files or programs that are infected are put into
quarantine that allows automatically deleted or ask the user to
make the decision about deletion.
 Antivirus software should up to date
 Full system should checks once a week.

To avoid virus look at security indicator https or padlock symbol

Encryption:
• Encryption is the process of
converting information into a
form that is meaningless to
anyone except holder of key.

 Data is encrypted
 If the data intercepted it then it prevents people from
understanding and reading the data
 The person with the key is able to Decrypt and
understand the data
Page 63 of 168
Disadvantages:
 Data can still be deleted from the system
 Criminals can use encryption to keep incriminating
material secure

To avoid virus and spyware when using internet:

 Don’t download any files from


untrusted source
 Don’t install illegal software
 Don’t click any link from unknown
websites
 Ensure antivirus is up-to-date
 Always look at security indicator
https or padlock symbol
 It is possible to pick up virus from any device plugged into your
computer.

Data Protection Act ( DPA ) :


• Most of countries have some form of Data Protection Act, these are
designed to protect individuals and to prevent incorrect or inaccurate
data being stored

(8) Principals of the Data Protection Act :


1. Data must be fairly and lawfully processed
2. Data can be only processed for the stated purpose
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject's rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they also
have adequate protection

Page 64 of 168
Network communication (A physical fax-Electronic faxing and email)

Type of communication Overview / Advantages Disadvantages

• Require fax machine and • Anyone can access fax


telephone line documents
Physical Faxing
• Number of recipient • The fax may be out of paper
dialed before the of toner
documents copied and
sent
• Physical documents are
printed and can be signed
• Can send multiple • Attachments may include a
E-mail
attachments virus
• Can send to multiple • May receive SPAM
recipients in one message • May receive Phishing e-mail
• Email received instantly
• Can access through any
platform (mobile – IPad-
Laptop)
• Send via internet connection
Electronic Fax
• No need to buy fax machine, ink or paper
• Electronic fax send to Email
• Can also send to fax machine
• Can send from any location have internet connection
• No additional cost to send fax through internet

Page 65 of 168
Network communication

Type of
Overview Hardware
communication
• Video conferencing uses
Video Conferencing both video and audio using
an internet connection
• It can be used for business
meeting when people are in
different locations

Web Camera| Screen


|Speakers|
Microphone

Advantages Disadvantages
• Much easier to access important • Technical problems with the
documents or bring “experts”. internet can affect the quality
• It is possible to hold conferences • Setup cost and purchase hardware
at short notice. • Lack of personnel contact
• Not travelling to meetings • Different time zone could difficult
reduces costs: to find suitable time
 Reduced travelling costs. • Not possible to sign document
 No need to pay for hotel
accommodation.
 Reduces transportation.
 When have delegates need
travel to unsafe places
around the world.

Page 66 of 168
Type of
Overview Hardware
communication
Audio conference can be done
Audio over the telephone network or
Conferencing using a computer making use of
VOIP
• The organizer of the phone
conference is given unique Pin which
can be shared participants to join
they have to dial the conference Telephone (VOIP) –
phone number then they would have Microphone – speakers
enter a PIN
Web Web conferencing can be done using
Conferencing internet connection
• Very similar to video conferencing
as the participants can see Video
and hear Audio
• Participants can join to the
conference by clicking on the link
provided by the organizer.
• Instant message available to
communicate with another Web Camera|Screen
• Business meetings participants |Speakers| Microphone
• Presentations. • Participants can be given
• Online education / permission to speak and can share
training contents

Page 67 of 168
5- The effects of using ICT
There are four main areas people losing their jobs:
1. Office work
2. Manufacturing
3. Shop work
4. Banking

The effects of ICT on unemployment

Negative effects - job losses

Office Work:
Many of manual jobs no longer needed as example typing, filing
documents, and data entry because the computer changed the way of this
jobs
• Daily task carried out by (Administration department - Human
resources department – Payroll department)
• By introducing computer systems the work done by fewer staff in
short time

Three types of software the most impact in offices:


Word processors – Spreadsheets – Databases

Application software Effects


 Easier to modify and update the documents
 No need to file big amount of documents in
Word processors cabinets, all stored electronic format
 Only print document when required , this
save money and ink
 This lead to reduction of staff

Page 68 of 168
Application software Effects
 Can do formula to calculate automatically
payroll, salary calculation, wage slips,
number of hours worked
Spreadsheets  Can do graph or charts
 As example: teachers can monitor the
progress of their students (results / marks /
sort / chart ..)
 This lead to reduction of staff

 Easy to add and update personal data such


as salaries/address/phone number .. , this
Databases task usually by (Human recourse)
 Workers need to retrain to use database as
it is difficult to use
 This lead to reduction of staff

Manufacturing:
Many companies are using robots for production such as manufacturing of
cars, this change the way of people work, robot can do the following tasks:

1. Spraying the bodies with paint


2. Assembly all the bodies parts
3. Assembly the engine and transmission
4. Fitting the windscreen

Page 69 of 168
How this change the way of people work?
 People lost their job to robots
 Robots can work in dirty or dangerous environment
 Robots can move heavy lifting
 Working environment clean and safe
 Workers have had to retrain to gain the following new skills:
o Maintenance of the robots
o Quality control
o Design and development
o Marketing
o Training other workers.

• Advantages of robots over humans


 Higher productivity.
 More consistent results
 Work non-stop without breaks
 They don’t get bored by repetitive tasks.
 They don’t go on strike.

• Disadvantages of robots over humans


 Expensive to purchase and setup first time
 Often need to be reprogrammed for every new task
 production errors may occur

• Positive effect
Although ICT led to people losing their jobs, also led to create new big list
of jobs:
 Network managers
 Computer technicians
 Website designers
 Systems analysts
 Programmers
 Computer engineers
 Delivery drivers

Page 70 of 168
The effects of ICT on working patterns:

Work pattern Change


 Staff usually work between 1 and 30 hours,
Part-time working someone can work fewer hours per day or
per week than full time
 Staff have ability to choose when can start
Flexible working and finish but must complete full day's
( Flexi-time) work
 This require agreement with employer

 Full time job is divided between 2 workers


, one employee in the morning and the
other in the afternoon or one from
Job sharing Monday to Wednesday lunchtime and the
other one from Wednesday to Friday
lunchtime
 Both workers working with the same job

 Worker can work full hours (40 hours) in


Compressed hours fewer days like 4 days

Page 71 of 168
Microprocessor – controlled device in the home
Is a device that uses computer to control its functions, the devices fall
in main two categories:

1- Labour – saving devices:


 Automatic washing machines
 Microwave ovens
 Cookers
 Automatic dishwashers
 Robotic vacuum cleaners
 Bread making machines
 Smart fridge and freezer

This allow people to get on with other things while the device carries
out their tasks

2- Other type of devices


 Alarm clocks
 Television sets
 Central heating and air conditioning systems
 Home entertainment systems

Advantages and disadvantages of microprocessor-controlled labor-


saving devices

Advantages Disadvantages
Reduces number of manual task at Can lead to unhealthy life styles
home because readymade meal
Give people time to do some Tend to make people lazy since they
activities (shopping – hobbies ) while are depend on devices
devices cooking foods or washing
clothes

Page 72 of 168
Smartphone can make control to People become less fit if the people
switch on/off oven / central heating just lie around at home while the
devices carry out the tasks
Automatic burglar alarms give people Losing household skills
sense of security
Smart fridges and freezer can lead to
healthy lifestyle

Advantages and disadvantages of other of microprocessor-controlled


devices ( not related to lifestyle )

Advantages Disadvantages
Save energy since the device can Some people not familiar with this
switch off themselves technology , it will be difficult to use
It is easy to program the device by Leaving devises on stand-by like TV +
using QR codes instead of press receiver ) is very wasting of electricity
buttons manually
Some electronic devices can’t repair
specially circuit board ( just thrown
away )

Page 73 of 168
6- ICT Applications

 Communication Applications
1- Paper Based : Flyers, Posters, Brochures and Newsletters

Page 74 of 168
2- Websites:
 Companies uses websites
for advertising and
communicate the customers
 Websites can easily updated
and can provide relevant
and up-to-date information
 Websites can use for online shopping, research, social
networking, banking..

Advantages
• Video/ sound can be added
• Can hyperlink to another websites
• Can have navigation buttons
• Can have hit counter
• Seen by global audience
• Much easier to update

Disadvantages
• Websites can be hacked
• Risk of pharming
• You should have a computer and internet
• It's not portable like paper-based
• Website maintain is expensive
• Because its global, difficult to target the correct audience

3- Multimedia presentations:
Presentations that use animation, video and
sound or music are generally much more
interesting than a standard presentation
and can be displayed on the projector to
keep the audience see.

Page 75 of 168
Advantages:
• Video/ Sound/Music can be added
• Can add hyperlink to the presentation
• Can have transition effects
• Presentation can be interactive

Disadvantages:
• It needs special equipment/ expensive
• Equipment failure can be disaster
• Wherever presentation you need internet connection

4- Music scores:
Music now can created and edited on the
computer systems with the appropriate
software including mixing, creating music
slogan

Features of music scores technology:


• The music score can be generated from the music played
• The editing/correcting of the music score in a different key is
faster
• Solo music scores can be easily transformed into music for many
parts
• Software can automatically correct the music score
• Music can be played automatically as it is written
• Music notes are automatically printed out in the correct format
• Music scores can be saved for future editing

5- Cartoons:
• Animation can be created by using
hardware and software specially 3D
animation software to promote new
product
• Objects are designed on a computer
Page 76 of 168
• 3D skeleton produced
• The parts of this skeleton are moved by animator using key frames
• This frames define start point and end point
• The difference in the appearance of the skeleton in this key frames
automatically calculated which known as (twinning – morphing)
and the final stage known as (rendering).
• Cartoons can be created by freehand drawing

6- Mobile phones:

7- Business cards and letterheads:


• Business card and letterhead help to
give corporate image
• Many companies offer templates to
produce business cards and letterhead
through websites
• Business card can be handed out to
people
• Business card have the same design for flyers/ brochures

Page 77 of 168
Advantages of using corporate letterheads produced by a printing website:

• Professionalism ( credibility of the company)


• Branding /company awareness
• Proof of actual communication
• Advertising
• High impact than white paper
• Can make the company appear larger than it is.

8- Data handling applications

Number of applications can make simple data handling technique:

• Surveys: information from surveys can be stored in a database


so the data can be analyzed and queried
• Address lists : Mobile phones include address books which
include contact names, numbers, email, address
• Clubs/ Society records : information for current members
including names and contact details which will be easy to
search, contact, send reminder
• School records: Students records including assessments,
behavior also staff record could be stored into database.
• School libraries : information for the current books including
borrowing details and members of the libraries can be stored
on the database

 Measurement applications:
Measurement applications, using sensors and other electronic hardware.
Data convert from Analogue to Digital through (ADC) Analogue Digital
Converter

Page 78 of 168
Examples:
 Weather stations
 Scientific experiments
 Measuring a patient’s vital signs on a hospital
 Pollution monitoring
 Burglar alarm systems

1- Weather station:
Weather station setup up automatically to gather information from the
environment, variety of sensor can measure:

 Rainfall
 Temperature
 Wind speed
 Wind direction
 (Barometric) pressure ( air
pressure )
 Humidity

Why use computers for measuring?


• Computers do not require a
break
• Reading are more accurate
compared to human
• Readings are taking more
frequently
• Data can be analyzed and compared with the existing data
• Automatic graph can be created
• Sensors can work in dangerous conditions which cannot do
by human
• People can complete other task while system working
automatically

Page 79 of 168
2- Measuring a patient's vital signs in a hospital
 Sensors read key vital signs (such as
pulse rate, heart rate, temperature,
blood pressure, respiration, etc.)
 The data from the sensors is
converted into digital using an ADC.
 The data is stored in the
computer’s memory.
 The computer compares the data
from the sensors with the values stored in its memory
 The results are output on a screen in the form of graphs and/or
numerical readouts
 An alarm is activated if any of the data is outside acceptable input
values
 The system continues to measure the patient’s vital signs until the
computer is turned off.

3- Measuring pollution in a river:


 The sensors are placed in at least two different positions
 The data from the sensors is converted into digital using an ADC and
sent to a computer
 The computer stores the received data
 The oxygen levels and acidity levels are compared to the historical
data stored in memory
 The oxygen and acidity levels from the different positions in the river
are also compared to see if they are similar

Page 80 of 168
Advantages:
• The computer wouldn’t forget to take readings.
• The computer’s response time is much faster.
• Doctors, nurses, scientists etc. can get on with other tasks
while measurements are taken by computers
• Computers give 24-hour cover every day.
• More accurate reading
• Readings can be taken more frequently
• Safer since is being measured take readings or a nurse looking
after a patient
• Computers can produce graphs automatically
• Cost saving as fewer staff are needed

Disadvantages:
• The computer is unable to respond to unusual circumstances.
• Computer equipment and measuring software can be expensive
• The student will not learn as much using a computer system.
• Power cut

 Microprocessors in control applications


• Sensors send data to the microprocessor or computer then
compares the incoming data to stored values or data entered
earlier.
• The microprocessor/computer will check whether the incoming
data is outside the given parameters and will take any
necessary action

Page 81 of 168
Some control application includes:
• Automatic washing machines.
• Automatic ovens/cookers.
• Central heating systems.
• Chemical plants (Petrochemicals).
• Glasshouse environment control.

1- Automatic oven/cooker
• An automatic cooker/oven has
temperature sensors and a number of
controls to set the cooking time.
• The microprocessor checks the set time
against the current time and when they
are equal, the cooker/oven heating
elements are switched on.
• Once the cooker/ oven starts the cooking
process, the microprocessor then constancy
checks the end time against current time,
when they are equal, the cooking process is
stopped.
• The microprocessor checks the temperature data sent from a
sensor and turns the heating element on if the value less than
the pre-set value chosen by the user.

Page 82 of 168
2- Central heating systems
• A gas supply is used to heat water in a boiler.
• A valve on the gas supply is controlled by a microprocessor and
is opened if the heating levels need to be increased.
• A water pump is used to pump hot water around the central
heating system whenever the temperature drops below a
preset value

3- Chemical Process Control


Only works if the temperature is above 70°C and the pH level is less than
3.5. Sensors are used as part of the control system. A heater is used to
heat the reactor and valves are used to add acid when necessary to
maintain the acidity.

How is sensors and computer used to control?


1. Temperature and pH sensors read data from the chemical process
2. This data is converted to digital then sent to the computer
3. The computer compares the incoming data with preset values stored
in memory if the:
 Temperature is less than 70°C, a signal is sent to switch on
the heaters
 Temperature is greater than or equal to 70°C, a signal is sent
to switch off the heaters

Page 83 of 168
 pH is greater than 3.5, then a signal is sent to open a valve
and acid is added
 pH is less than or equal to 3.5, then a signal is sent to close
this valve
 The computer signals will be changed into analogue signals
using a DAC so that it can control the heaters

4- Glasshouse environment control:


Five different sensors could be used here to control the glasshouse
environment; namely, Humidity, Moisture, Temperature, pH and
Light

Page 84 of 168
5- Turtle graphics

Page 85 of 168
Page 86 of 168
 Modeling applications
 Spreadsheets :
• Business can use spreadsheets models to forecast
future profit or loss
• Due to use of formula business can adjust certain
values to see automatic change.
 Flight simulator :
• Pilots able to learn how to fly a plan using simulator
• The interface and control are the same real plan
• Different conditions can be tested
• Reduced cost as plan will not be damaged
 Building simulator:
• Before building are constructed, simulator take place
to make sure the building fit the requirements
• Simulations can ensure the building could cope with
earthquake or storm
 Traffic Lights
• Traffic light simulator look at the flow of traffic ( data
captured from the sensor
• The simulator will adjust the best control for the
flow of traffic

Page 87 of 168
 Manufacturing applications:
Robotics:
• Robots are used in many areas of
manufacturing like, paint spraying
of car bodies, welding bodywork
on cars, manufacturing of
microchips, manufacturing
electrical goods and automatic
warehouses.
• Robots include (built-in)
microprocessors or linked to a
computer system

Advantages:
 Work in a bad environments
 Work non-stop (24/7)
 Less expensive
 Don’t need holidays, etc.)
 Greater consistency
 NO boring, repetitive tasks
Disadvantages:
 Difficult to do ‘unusual’ tasks.
 Cause higher unemployment.
 There is a real risk of certain skills being lost
 Set-up and maintenance is expensive

 School management systems:


• Registration and attendance records of the students
• Student performance
• Organization of school exams
• Creation of timetables
• Teacher substitution

Page 88 of 168
1- School registration systems:
The traditional way for student's attendance consume 10 minutes
from each session the beginning. There are number of possible ways
of automating the registration

Method 1 :
 Issue each student with an ID card.
 ID card contain a magnetic stripe
on the rear of the card.
 The student would have to sign the
card and also write his unique
student ID on the back of the card.
 The magnetic stripe would contain the name of the school
and other details, date of birth.
 Each morning the student should swipe his ID card using
magnetic card reader.
 The data now stored on a database.
 On leaving the school he will swipe card again

Method 2 :
 A second method could make
use of biometrics.
 Each student would have their
fingerprint taken and store on a
database.
 When the student enter the
school he would asked to put his
finger on a scanner to read his
fingerprint

Page 89 of 168
Advantages of finger print:
• Finger print are unique, impossible to sign in with another
fingerprint
• ID could be easily lost
• ID can be affected by magnetic field
• It is easier to make copy of ID card but you can’t with
fingerprint.

Disadvantages of finger print:


• It would take long time to collect
• The equipment to take and read fingerprint is expensive more
than ID reader
• If the student cut his finger will prevent him to enter.
• May be the parents object to take finger print for their children

2- Student performance:
• Teacher are able to enter students data ( grades /reports /
applications / behavior) into the school management system
• This data stored in central storage which will be available for
any one from the staff
• The data can be analyzed and make a report.

3- Exam timetables, subject timetables and teacher substitution


• Timetable can created
• Exams scheduling
• Subject scheduling
• Producing
cover/substitution plans
for teachers who are
absent.

Page 90 of 168
 Booking systems:
Example uses :

 Transport : Flight, Trains, Buses


 Entertainment : Theater, Cinema, Stadium
 Accommodation: Hotels, Apartments, Villas

Theatre and cinema booking systems


(How the system works)
• The customer clicks on the performance they wish to see.
• A date and time is typed in
• The required number of seats is also entered.
• The seating display in the theatre is shown on the screen.

Page 91 of 168
• The user selects their seat(s) by highlighting the actual seats on the
screen, display and then clicks CONFIRM to go to the next part of the
process.
• The database searched to check the availability of the selected seats
• If the seats are available, the total price is shown + the seat numbers
• If the customer is happy with this, they select CONFIRM on the
screen

Advantages of online booking systems


 Prevent double-booking.
 The customer gets immediate feedback on the availability of
seats
 The customer can make bookings at any time of the day.
 The customer can receive any special offer by e-mail
 Easier to browse the seating plans to choose the best seats
available.
 No printed tickets which saves costs
 Online booking allows to use modern smartphone and tablet
apps technology.
 Confirmation message sent once payment approved has been
authorized

Disadvantages of online booking systems


 Setup and maintenance is expensive.
 Service need a computer and internet
 Difficult to cancel the booking and get your money back
 If the server is down or systems breaks down, it will impossible
to book seats.
 If the websites are not well designed, it is difficult to make
exactly the booking
 Booking online does not allow to build a personal relationship
with the travel

Page 92 of 168
 Banking Applications
The application of computers in the banking sector have enhanced
productivity regarding account management in this part we will
consider:
1. The use of automatic teller
machine ATM
2. Internet banking
3. Telephone banking
4. Chip and Pin technology
5. Clearing of cheques
6. Electronic fund transfer

1- Automatic teller machines (ATMs)


ATM cash machines can be used for various purposes including ( cash
withdrawal / deposit / checking / printing statement)

Page 93 of 168
2- Internet Banking & Online shopping :
• Using internet banking requires good security. It allows the
transfer of sums of money between accounts, payment of bills,
ordering of statements, and so on.
• Online shopping and banking means that more and more people
are staying at home to buy goods and services

Advantages of online shopping and banking


 No need to travel / reducing costs and time-wasting.
 Users have access to a worldwide market and can look for
products that are cheaper.
 Disabled and elderly people can access any shop without to
leave home.
 Shopping and banking can be done at any time 24/7
 Shopping from the supermarket probably took up a lot of time
than online.
 No face-to-face discussion with staff.
 Internet banking saves time.
 The shops and banks save money , not having as many staff
working for them

Disadvantages of online shopping and banking


 There is the possibility of isolation and lack of socialization
because people stay at home.
 Health risks associated with online shopping or banking (lack of
exercise).
 Security issues.
 It is necessary to have a computer and to pay for the internet
 Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a
dress.

Page 94 of 168
 High street shops and banks are closing because of the increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
 It is easier to make errors with online banking and transfer
money incorrectly to different accounts

Effects on companies due to the spread of online shopping and banking:


 Companies can save cost by hiring fewer staff and no need to
have many shops or banks in high street.
 Because the internet is global the potential customers is
increased.
 Some will increase to retrain the staff and the need to employ
more staff in dispatch department
 More cost will be added to setting up and maintaining of
websites to enable online shopping and banking.
 Because there is no interaction between customer and
employee this can lead to drop loyalty of customers and cause
loss of customers.
 Robberies are less because decreases of number of high street
banks.
 Bank also need to employ fewer security staff which is
reducing cost.

3- Telephone Banking:
• Similar to internet banking but the difference is using telephone
rather than computer
• The sequence of using Telephone banking is :
• The customer keys in their account number
• They are requested to enter four-digits PIN or selected
numbers from their PIN
• The customer will hear list of options which might be
include:

Page 95 of 168
1. Press (1) for your balance
2. Press (2) to carry out a money transfer
3. Press (3) to pay a bill
4. Press (4) to talk for one of our representatives
• The customer will choose an option
• As the same Online Banking the customers are able to:
1. Check balance
2. Pay bill or transfer money to another account
3. Talk to a bank representatives

4- Chip and PIN


Many credit cards equipped with Chip
& Magnetic strip which have key
information like PIN

• What is happening when the


customer go to restaurant to pay
bill for meal using a chip and PIN
card
1. The PIN is entered using a keyboard
2. The card is checked if it is valid
3. The PIN is read from the chip on the card and
compared to the one entered in
4. If the same, the transaction can proceed
5. If three times PIN attempt to enter, the transaction
terminated.
6. The restaurant’s bank contact to the customer’s
bank
7. The check is made on whether they have enough
funds
8. If everything checks out (OK) then the transaction is
authorized
9. An authorization code sent to the restaurant
10. The price of the meal deducted from the customer
account

Page 96 of 168
11. The same amount is added to the restaurant bank
account
12. A receipt is produced as proof of purchase

5- Clearing of cheques :

Processing bank cheques uses batch processing

Electronic Fund Transfer (EFT)

Electronic Fund Transfer (EFT) allow money to be transferred


electronically from one account to another, an example of EFT is when
an employer pays their employees their salaries

• No actual money is transferred; the whole system relies on


electronic transfer of money between accounts. When an
EFT instruction is received, the computer system
Page 97 of 168
automatically transfers the specified amount from one
account to another

 Expert systems:
Expert system is a computer software that attempts to act like a
human expert on a particular field.

Examples of using Expert System:


 Diagnosing a person’s illness
 Diagnostics, finding faults in a car engine.
 Helping to discover locations to drill for water / oil
 Strategy games (chess)
 Identification of items such as plants / animals/ rocks
 Road scheduling for delivery vehicles.
 Providing financial advice

Elements of expert system


An expert system is made up of three parts:

1. User interface - allow a non-expert user to query (question)


the expert system, and to receive advice.
2. Knowledge base - collection of facts and rules. The
knowledge base is created from information provided
by human experts

Page 98 of 168
3. Inference engine - This acts rather like a search engine,
examining the knowledge base for information
that matches the user's query

Using an expert system:


• The non-expert user queries the expert system. By asking a
question, or by answering questions asked by the expert system.
• The inference engine uses the query to search the knowledge
base and then provides an answer or some advice to the user.

Page 99 of 168
How to setup an expert system?
 Data is gathered/collected from experts to create knowledge
base
 The rules base is designed/create a based on the information
from the knowledge base.
 A user interface screen is designed / created which would
provide the user with the ability to interact with the system
 An explanation system is also developed
 The inference engine is designed / created as link between the
user interface and the knowledge base
 The system is tested.
 Experts are interviewed about how the expert system effective

 Computers in medicine:
1- Patient and pharmacy records:
• By keeping data of patient records in a database, correct
digenesis can be given according to patient's medical
history.
• Database allow to easy and quick search for patient records
• The data can be , patient ID , name , address, date of birth,
gender, medical history, blood group

2- Monitoring patients:
• By connecting patient to computer system, to carry out
24/7 monitoring the computer can monitor:
 Heart rate
 Respiration
 Brain activity
 Blood/body temperature
 Blood pressure
 Blood sugar levels
 Oxygen levels in the blood

Page 100 of 168


3- Using expert system to diagnose patients:
 One of the common use to diagnose illness in patients.
Already discussed before
4- Using 3-D printers in medicine:
 Surgical and diagnostic aids: the patient is scanned using:
• CT (computed tomography ) - which involves
producing images of the internal parts of the body
• MRI (magnetic resonance imaging) - this uses strong
magnetic fields and radio waves to produce a series
of images of the internal organs in the body

 Prosthetics:
• 3D printer can print
prosthetics (false arms,
hands, and legs)

o Tissue engineering:
• Produce multilayered skin tissue, bone tissue,
heart/artery grafts and tracheal splints

o Design of medical tools and equipment


• 3-D printers used as part of the
product development cycle for
medical tools
• 3D printer allow several
prototype to be made within
short time

Advantages of using 3D printer to design medical tools:


• Development time is faster
• Development cost is reduced

Disadvantages of using 3D printer to design medical tools:

Page 101 of 168


• Technology still in early stage
• Limited selection of material available

 Computers in libraries:
• Computers are used in libraries to keep
track on which books have been
borrowed by which members.
Database is used to store details of
book and members and usually
barcodes on the book
• Two files will exist which is ( Book file
and Borrowers' file)
• When borrowers take the book the
barcode first scanned then the book
details are found on the book file
• The system will calculate “due back” date
• The borrowers library card contains a unique barcode and will be
also scanned
• Book file linked with borrowers file and two files updated
• The date of due back is saved in the borrower’s file

• On daily bases the borrower's file is reviewed by the computer to


check due back date and what happened if the borrower’s
overdue the date ,the sequence will be :
 The computer reads a record from the book file
 The corresponding record read from the borrower's
file
Page 102 of 168
 It compares due back date with current date
 The borrower's details found and E-mail or letter
send automatically to send
 The next record again read until to finish all records
 barcode not only the system but it can be magnetic
strip card
 Some libraries also is using RFID

 Computers in the retail industry:


1- Automatic stock control system using barcodes:
• Barcodes allow quick
identification of product details
once the barcode has been
scanned by a barcode reader
• Point of sale is the place a
transaction take place and the
customer can pay by cash or can
use debit/credit card
• Stock control system can
automatically update stock
records when item is purchased
at the POS
EPOS
Electronic Point Of Sale
2- Electronic fund transfer and Chip and Pin cards:
Already described

3- Internet shopping:
Already described

How barcodes are used to automatically control stock levels in a supermarket.


 Barcode is scanned at the POS/barcode number entered manually

Page 103 of 168


 Barcode is searched for in the stock file until the record is found
 Details of the product are read
 Stock level of the item reduced by 1
 New stock level written back to the file
 Item is flagged to state order in place
 If less than the re-order level then the item is automatically re-
ordered

Barcode used in the following applications:


 Library book system
 Administration systems
 Passport / ID cards
 Some burglar alarm systems
 Equipment checking systems
 Automatic stock control systems

 Recognition systems:
 Recognition systems are used directly to enter data into computer
system.
 Recognition systems tend to be more accurate and quicker
method of entering data into a computer system compared to
manual system.

• MICR: magnetic ink character recognition the number on


the bottom of the check is scanned by MICR reader
• OMR: optical mark reader:
o Pencil or pen mark scanned by OMR
• OCR: scanned text is converted into format which can be
edited
• RFID : radio frequency identification
o Use radio waves to capture and store information on
a tag
• Sensor plats: Sensors used to detect car and signal will be
send to the microprocessor to take the image for the
number plate
Page 104 of 168
• Multiple-choice question (MCQ) papers
o Multiple-choice form is using OMR and compare the
position filled by pen with the original answer

 Automatic Number Plate Recognition (ANPR) System:


• Automatic number plate recognition (ANPR) systems are
used to read the number plates on cars, car parking is an
example of ANPR as the following steps:
o STEP (1)
 Sensor detect vehicle and send signal to
microprocessor to instruct the camera to
capture image of the vehicle
o STEP (2)
 An algorithm used to isolate number plate
 The bright and contract of the number plate is
adjusted to be clearly read
 Each character is on the number plate is
segmented
 Each character recognized by OCR software
then character converted into a string of
editable text by the software
 This text string stored in the database

Number plate is segmented


Page 105 of 168
o STEP (3)
 Once step (1) and (2) happened the car park
barrier is raised
 The ticket is issued to the vehicle driver ,
shows date and time entering the car park

o STEP (4)
 When the vehicle driver returns to the car park
they insert the ticket into a machine which
calculate charges
 The payment registered on the database
 The driver then drives to exit the barrier and
the ANPR again reads the number plate
 If the number plate is recognized and payment
is done the barrier is raised

Page 106 of 168


 Monitoring and tracking systems:
1- Monitoring /tracking a member of the public:
Why the person may need to be tracked?
1. Potential Criminal/Terrorists
2. Tracking released prisoners to
ensure they stay within an agreed
location ( Ankle mentoring)
3. Monitoring customers buying patterns

2- Cookies:
When a user visit a website cookie is created to store the user
browsing, described in chapter 8

3- key logging:
Software to monitor which keys has been pressed, hackers can
use this to obtain Password

4- Employee call monitors


Employee call monitors allow
managers listen to calls of
employees for some reasons:
1. To improve employees
performance ( call center)
2. Can be used as training tool
3. Manager/ supervisor can join to call where necessary
4. Allow to the companies aware about security to listen to
calls (Police)
The three types of call monitoring :
1. monitor : manger listen to employees
2. whisper: as a training tool
3. barge: manger join to call between employee and others
 Satellite systems:
Page 107 of 168
Global positioning satellite (GPS) systems and satellite navigation

1- Global positioning satellite (GPS) can determine specific location


using satellite navigation systems:
 Cars, Ships, Plans can use GPS when navigating specific
location
 Walkers to locate position on
hills / mountains
 Used by runners to calculate
distance

• Four satellites must be visible to the driver


• Calculates the distance from the receiver to the satellite
• Calculates the position of the receiver

Advantages:
 Drivers doesn’t have to use maps.
 GPS can re-rout to find quickest routes
 The system can warn the driver about the location of
speed cameras
 The system can estimate the time of arrival.
 The system can also give useful
information such as location of petrol
stations

Disadvantages:
 Loss of satellite signals can cause problems
 Maps should be kept up to date, they can give incorrect
instructions if not up-to-date
 If an incorrect start point or end point is keyed in the
system will give incorrect information

Page 108 of 168


2- Geographic information system (GIS):
Geographic information system (GIS) is a computer system that allows
us to map, model, and query and analyze
large amounts of data according to their
location

GIS uses:
 Road network
 Teachers can use GIS in
geography, science lessons
 Biologist use GIS to protect
animals life and plants

3- Media communication systems:


Communication media is the methods of delivering
and receiving information using telecommunication
 There are many media to send and receive
information (Fiber Optics, Copper Cables, Wi-
Fi, Satellite )
 Satellitia can send signal from part to another
any wherein long distance on the earth
 Once the data received from the earth by the
satellite, send back to earth and collected by
dish
 Satellites systems are used to transmit
television, telephone and internet data
around the world

Page 109 of 168


7- System life cycle
The main stages of system life cycle to develop a new computer
system:

Analysis
Collecting information about the current system and identify the problems

Design
Designing a new system to correct the problems identified in the analysis stage

Development and Testing


Developing and testing new system

Implementation
Replacing old system with the new system

Documentation
Writing technical and user documentation for the new system

Evaluation
Evaluate if the new system meets the requirements and client expectation

1- Analysis :
The basic step of analysis:

Page 110 of 168


 Research to collect data from the current
system

 Describe the current system (establishing input


and outputs and processing

 Identify the problems with the current system

 Agree the objective with the clients


 Identify and agree customer requirements

 Interpret customer requirements

 Produce a cost- benefits analysis


 Identify suitable hardware and software
 Produce a data flow diagram

The first step in analysis stage is researching an existing system and there
are four common methods for fact finding:

Page 111 of 168


1- Observation
 Watching personnel using the existing system to find out how it
works
Advantages Disadvantages
• The analyst obtains reliable data • People uncomfortable being
• Possible to get an overall view watching, may can make in
of the system differed way
• Inexpensive method • Workers may do some mistakes,
while watching may they will not
do it

2-Questionnaires
 By distributing questionnaires to the workforce, clients or users to
write their view for the existing system

Advantages Disadvantages
• The questions can be answered • The number of returned
quit quickly questionnaires often low
• Inexpensive method • The questions not flexible
• Individuals can be anonymous if • Not immediate way
they want
• This method allow quick
analysis of data

Page 112 of 168


3- Interviews
 This method involves one to one question and answer between
analyst and employee or /customer and good if the analyst want
to go deeply into specific aspects of the existing system

Advantages Disadvantages
• Its open opportunity to • Time consuming
motivate interviewee to give • Expensive method ( by using
open and honest answer to the analyst time )
analyst • Interview can’t remain anonymous
• Open for more feed back
• Possible to modify question as
interview

4. Looking at existing paperwork :


 This method allow the analyst to see how the paper files are kept
and look at operating instructions and training manuals and get
some idea about scale of the problems of existing system

Advantages Disadvantages
• Allow the analyst to collect • It can be time consuming process
information which can’t be • Costly method because the
collected by another method amount of time needed
• The analyst can see how the
paper system operate

Page 113 of 168


Data Flow Diagram (DFD):
 DFD help the analyst by showing the data flows input and output
requirements, processing and type of data storage needed.

Example of reserving seat on a flight:

DFD used to describe:


 The need to identify inputs, outputs, processing of the current
system.
 The need to identify problems with the current system
 The need to identify the user and information requirements for the
new system
 System specification :
 Identify and justify suitable hardware for the new system
 Identify and justify new software for the new system.

Page 114 of 168


2- Design:
Next stage is to design a new system based on the information from
analysis system.

The basic step of design:

 Design the data capture form / input forms

 Design the screen layout

 Design outputs in the form of screen displays


and the printed report

 Produce system flowcharts


 Design validation rules that need to be used

 Design / agree on file structures

 Produce any algorithms or program flowchart


 Design a testing strategy / plan

Page 115 of 168


• Data capture forms:
This form allow to enter the data into the system either paper-passed
or electronic passed form must include:

1. Clear heading and instruction


2. Use of text boxes to collect
information such as name, date of
birth, gender..
3. Use of tick box to make choice
easier
4. Clear fonts and text styles
5. Make sure there is sufficient space to input data or answer the
question

Example of data about can manually completed for input later into the
computer system:

On screen forms should have:


 Appropriate spacing for each field
 Screen filled/not too much white space
 Clearly defined input area for each field

Page 116 of 168


 An easy to read font/font size
 A sensible font color and background color
 Drop down list and tick boxes
 No overlapping items
 Navigation buttons

Form title

Drop down list: to


choose option

Tick box /
Save/ Close / Radio button
Navigation button

Before entry form created, the database should be created and the
following details should be considered:

Page 117 of 168


• Type of data which will be captured
• Different tables and its relationships
• Different fields including keys
• Data types for each field :
1. Text
2. Integer (numeric)
3. Boolean
4. Data & Time
5. Object

Page 118 of 168


Screen display and printed reports:
The output from should be designed:
1. Make sure all the output fields is correct
2. Instructions or description are clear
3. Avoid large area without nothing
4. Font color and size are clear
5. Output report should include report type ( header ,
footer , fitting page correctly)

As Example of printed report :

System flow chart:


 Flow chart used to show data flow through a system and how
decision are made by using special symbols to represent input /
output/ processing/ decision and data storage.
 System analysts use this chart to show overall the proposed
system.

Page 119 of 168


Verification:
Verification is a way of preventing errors when data is copied from
one medium to another, there are two ways for verification check:
• Double entry : data is entered twice, using two people,
and is then compared
• Visual check : checking for errors by the person who is
entering the data; compare the entered data with the
original document

Validation:
Is a process where data is checked to see if it satisfies certain criteria
when input into a computer

Validation technique:

 Range check :
• Check weather data within given acceptable value
• Example : check person age >0 and <150

 Look-up check :
• Check the data entered exists and stored in a table of data
• Example : check “ Training manager “ exists in the option”

 Length check :
• Check the input data contains the required number of
character

Page 120 of 168


• Example : If a field needs six digits inputting five or seven
digit number , should cause a problem

 Character type check :


• Check input data doesn’t contain invalid characters
Example: Person /employee name shouldn't have any numbers

 Format / picture check :


• Check the data in specific format
• Example : date should be in date format dd/mm/yyyy or
identification number for a person xnnnnn ( single letter
followed by five digits)

 Presence check :
• Check the data already present and not missed
• Example : in some forms telephone # required if not entered
the system give error message

 Consistency check :
• Check if the fields correspond with each other
• Example : If Mr. typed in a field the gender should be Male (M)

 Check digit :
• This is an extra digits added to the telephone number
• Example : if two number transposed during entry like ( 13597
instead of 13579
• Example : if number enter twice 13559 instead of 13579
• Example :if one number missing 1359 instead of 13579

File Structures:
 Analyst should take the following into account :
• Field length

Page 121 of 168


• Field name ( suitable names )
• Data type
 A data dictionary is used to show suitable field names

Design and testing strategy plan:


When producing a software for the new system it is very important to test
it thoroughly in order to:

 Make sure that meets the clients requirements


 Remove any bugs or error from the system
 Make sure that produces the required output

Example of data dictionary

Page 122 of 168


3- Developing and testing:
Developing:
Once design stage is completed, the system should be created and fully
tested:

 Create the file structure ( Field names, data type)


 Validation rules
 User interface, check if the user interface is friendly

File structure

User interface

Page 123 of 168


Validation rules

Testing strategies:
 Software is often developed in modular form. This method allows
the software to be broken down into smaller parts called module
this means each part developed separately.
 Once the development of each module is completed, the whole
system needs to be tested
 Testing take place to ensure all components of system are working
correctly before the system is implemented.

Four category of testing :


 Normal
 Abnormal
 Extreme
 Live

Page 124 of 168


Normal:
 Data that is acceptable /reasonable and has an expected outcome;
for example, the Month in the range 1 to 12

Extreme:
 Data at the limits of acceptability, for example, the extreme values
of month can be either 1 or 12

Abnormal:
 Data outside the limits of acceptability, or the wrong type of data,
and should be rejected or cause an error message; values are not
allowed as example inputs for the month: -15 or -1 or any value
>12 or letters or non-integer 10.34 all abnormal

Live :
 Data is entered into the new system and the results compared
with those produced from the existing system.

Page 125 of 168


4- Implementation stage:
There are four common methods used for changing over from the old system
to the new system:

 Direct Direct changeovers


 Old system stopped overnight
then replaced with the new
Old System New System
system immediately

Advantages Disadvantages
• The benefits are immediate • May will be disaster if
• Cost are reduced because one system is new system failed
running
• Less possibility of a malfunction of the
system once new system tested
 Parallel Parallel changeovers
 Old system and new system
running side by side for a time Old
until new system take over System
New
System
Advantages Disadvantages
• If the new system fails the old • More expensive than direct,
system still running because extra staff needed
• Possible to train staff gradually • Time consuming since the
data entered into 2 systems

Page 126 of 168


 Pilot Pilot changeovers
 The new system introduced
in one branch or a part of Old System
company before to introduce
for whole company
New System

Advantages Disadvantages
• If the new system failed only one • It will take time to
part is affected implemented across all
• Possible to train staff one area departments
• The cost will be less than parallel

 Phased Phased changeovers


 Only one part from the system
introduce when its proved to
Old System
work satisfactory, then introduce
next part until to fully replaced
whole system
New System

Advantages Disadvantages
• If a part fails, can go to failure • More expensive than direct
point ( failure is not disaster ) because each phase will
• Possible to ensure the system evaluate separately
working properly before • Time consuming because each
expanding part will be evaluated

4- Documentation :
Page 127 of 168
When the system is fully developed amount of documentation needed. To
introduce for (the end user – people who may need to develop the system in
the future, there are two types of documentation:
User Documentation and Technical Documentation

1- User documentation
To help the user to learn how to use the new system
 How to load/install/run the software
 How to save files / search/sort data
 How to do print outs
 How to add, delete or amend records
 The purpose of the system/ program/ software package
 Limitations of the system
 Screen layouts / Print layouts
 Hardware requirements
 Software requirements
 Sample runs (with results and actual test data used)
 Error handling/meaning of errors
 Troubleshooting guide/help lines/FAQs
 How to log in/log out
 Tutorials
 Error messages/meaning of error messages
 Glossary of terms.

2- Technical documentation:
To help the programmers / analysts to repair and maintains the system and
can consist of any of :

 Program listing/coding
 Programming language used
 Program flowcharts/algorithms

Page 128 of 168


 Systems flowcharts
 Purpose of the system/program/software
 Limitations of the system
 Input formats
 Hardware requirements
 Software requirements
 Minimum memory requirements
 known ‘bugs’ in the system
 List of variables used (and their meaning/description)
 File structures
 Sample runs (with results and actual test data used)
 Output formats
 Validation rules
 Meaning of error messages

5- Evaluation:
The final stage of the system life cycle is to evaluate the system which has been
implemented, the main purpose is to see if the new system resolved the issues
of the previous system and met the requirements in the design stage and the
following list is some of the main evaluation points considered when evaluating
the new system:
 Compare the final solution with the original task requirements
 Identify any limitations of the system
 Identify any necessary improvements needs
 Evaluate the user’s responses
 Compare results from new system with old system
 Compare performance of new system with old system
 Interview users to gather responses about new system
 Give out questionnaires to gather responses about the ease of use of the
new system.

The results from the evolution may due to two things happening:

Page 129 of 168


Update of hardware because:
• Feedback from end user
• New hardware comes in the market
• Changes within the company require new devices to be added of
updated

Update of software because:
• Feedback from end user
• Changes to the company structure that may need modification
• Changes in legislation that may require modifications to the
software

Page 130 of 168


8- Safety and security

Physical Security:
Health aspects:
Health and safety regulations advise that all computer systems have at least
moveable table and anti-glare screens, adjustable chairs and foot supports,
suitable lighting and uncluttered work stations, and recommend frequent
breaks and frequent eye tests.

Health risk list:


Ways to eliminating or
Health risk
minimizing risk
(1) Back and neck • Use fully adjustable chairs to give the
correct position
problem/strain
• Use foot rests to reduce position
Cause by sitting in front of a
problem
computer screen for long
• Use screens that can be tilted to
period in the same position.
ensure your neck is at the correct
angle
(2) Repetitive strain • Ensure correct position is maintained
• Make proper use of a wrist rest when
injury / RSI :
using a mouse or a keyboard
Damage fingers or rest by
• Take regular break and do some
using continuous keyboard or
exercise
mouse click buttons
• Use ergonomic keyboard
• Use voice- activated software

Page 131 of 168


Health risk Ways to eliminating or minimizing
risk
(3) Eyestrain : • Ensure there is no screen flicker which can
Caused by looking at the lead to eye problems
screen for long time or • Change screen to LCD which flicker are
having incorrect lighting less
• Take a regular break
• Use screen anti-glare if the lighting in the
room is not correct or use window blinds
to reduce sunlight reflecting from the
screen.
• User should check his eyes on a regular
basis
(4) Headaches : • Use anti-glare screen or window blinds to
Caused by incorrect cut out reflections
lighting, screen • Take a regular break
reflections, flickering • User should check his eyes on a regular
screen. basis

5) Ozon irritation : • Proper ventilation should exist to remove


Caused by laser printer the ozone gas as quickly.
in the office area • Laser printers should be housed in a
designated printer room
• Change to the other type of printer if
necessary

Page 132 of 168


Safety aspects:
Safety concerned with dangers that could lead to series injury or loss of life

Safety risks:
Health risk Ways to eliminating or minimizing
risk
(1) Electrocution • Use residual current breaker RCB
• Check insulation on wires regularly
• Don’t allow drinks near to computers
• Check equipment on regular basis

(2) Trilling wires • Use cable ducts to keep the wires save
• Cover wires under table
• Use wireless connection wherever
possible

(3) Heavy equipment • Use strong desks and tables to support


hardware
falling and causing injury
• Use large desk and tables so that
hardware isn't too close to the edge,
where it can fall off

(4) Fire Risk • Have Co2/dry fire extinguishers


• Don’t cover equipment
• Make sure electrics used in hardware is
fully maintained
• Ensure good ventilation in the room
• Don’t overload socket with many items
• Change to low voltage hardware if
possible
Strategy to minimize safety risks to check in a regular basis:

Page 133 of 168


 Check the state of the wires and cables and plugs and make sure the
plug is not broken or damaged.
 Make sure any drinks are well away from the computer
 Fix wires along wall or behind the desks wherever possible
 Don’t cover the computer with paper, plastic, tissue paper, towels or
any fabric, which can block ventilation holes
 Don’t plug too many devices into an electric outlet socket -
overloading can cause a fire
 Make sure you exercise every hour to prevent health risk

E- Safety:
Refers to safety while using internet and devices (keep your data in safe
while using:
 Mobile phone
 Computer or tablet
 Games console
 Wireless technology.

• Personal data like ( name , Birth


date , address , medical history,
banking details
• Some personnel data referred to as (Sensitive personnel data )
includes ethnic origin, political views, religion, sexual orientation,
criminal activity

Some idea of E-safety issues:


 Don’t give out any personal information to people who are
unknown to you.
 Don’t send people photos of yourself - either online or via a
mobile phone unless the person known to you.
 Always maintain your privacy settings

Page 134 of 168


 When accessing the internet make
sure the websites being visited can
be trusted
 Only use recommended websites by
teachers
 Only open emails from known
sources.
 Only send email people you know
 Using social networking sites, instant messaging or chat room

You must be conscious when you are using social media networking
sites or chat room:
 Block or report anybody who acts suspiciously or who uses
inappropriate language
 Be very careful with the language used in chat rooms
 Always use a nickname and never use your real name
 Keep private and personal data secret
 Don’t enter private chat rooms, stay public
 Never arrange to meet anyone for the first time on your own
 Always tell an adult first and meet the person in a public place
 Avoid the misuse of images
 Always use appropriate language
 Always respect people’s

Some risks from playing online games:


 Violence in the game, can lead to
violent behavior in reality
 Predators (animal that eats other
animals)
 Cyber-bullying
 Use of webcams
 Voice-masking technology to change voice or age or accent.
Page 135 of 168
 Online games is a source of cyber-attack like (viruses –
phishing – spyware )

Security of data:
There are a number of security risks associated with any electronic device
as the following list:
 Hacking
 Phishing
 Smishing
 Vishing
 Pharming
 Spyware
 Viruses
 Spam
 Moderated and unmoderated forums
 Cookies

Page 136 of 168


(1) Hacking:
What is hacking? : Unauthorized access to the computer system
without permission
Effects of hacking :
 Hacker can delete,
corrupt, edit, files or
change data or personnel
information
 Hacker can steel user identity
 Hacker can stop production

Method to avoid or remove:


 Using firewall
 Using strong password
 Using protection software
 Use user ID and password
 Use encryption

(2) Phishing:
What is phishing ? : a method of trying to gather personal
information using deceptive e-mails and websites by sending request
from bank or a note from someone in their company.
Effects of phishing:
 The sender can gain personnel data such as credit card
number, this can lead to fraud or theft.
Method to avoid or remove:
 Many ISP or web browsers filter phishing e-mail.
 User always be cautious when opening email or attachment.
 Don’t click on executable files attachment end with exe,
com, php, bat as example.
Phishing example:
Page 137 of 168
(3) Smishing ( SMS phishing ):
Page 138 of 168
What is Smishing? : Uses SMS system of mobile phones to send out
Fake text message which often including URL or telephone number
The user will be asked to log into the website or make telephone call
and supply personnel information like credit card number and
password (example : you won a prize or contact with your)
Effects of Smishing :
 The effects are similar to Phishing and
Pharming where personnel details will
be obtained from users

Strategies to avoid smishing :


 Double check the SMS message ,
check for spelling mistakes
 Check the link of the website
 Contact your bank directly if you are requested to change
some details

4- Vishing:
What is Smishing? Short for voice mail phishing , uses voice mail
message to trick the user into calling the telephone number contained
in the message, The user will be asked to provide personnel data

5- Pharming:
What is pharming? Malicious code installed in the user computer to
direct the user to fake website

Page 139 of 168


Effects of pharming :
 The creator of malicious code can gain personnel data like bank
account information, this can lead to fraud or theft.

Strategies to avoid pharming :


 Some anti-spy software can identify and remove Pharming
code
 Always double check the URL to see if is the same one you
typed in

(6) Spyware and key-logging software


What is Spyware? : software to collect data by monitoring key presses
on the user’s keyboard, the data send back to the user who sent the
software.
Effects of spyware:
 Spyware gives the originator access to all data entered using a
keyboard on the user's computer.
 The software is able to install other spyware, read cookie data
and also change a user's default browser

Strategies to avoid spyware:


 Use anti-spy software
 The user should always alert and check any activity on the
keyboard monitored.
 Enter password by using drop-down menu to reduce risk

(7) Viruses:
What is the computer virus? : Program code or software which can
replicate or copy itself to do something like deleting or corrupt the
files or operating system
Effects of virus :

Page 140 of 168


 Viruses can crash the computer , stop
functioning or run slowly
 Viruses can delete files or data
 Viruses can corrupt the operating
system files

Strategies to avoid viruses:


 Install Ani-virus software and update regularly
 Don’t use any software from unknown source
 Don’t open attached file by e-mail from unknown sender
 Always backing up the files

(8) Spam:
What is Spam? Often referred as junk mail, it will send to recipients
from mailing list
Effect of spam e-mail :
 It can lead to Denial of services attack (DoS attack, by flooding
network with useless traffic which slow the network down.

Strategies to avoid Spam:


 Set the protection filter level to high when you use junk mail
filter to have maximum protection
 Make sure the junk mail filter is kept up to date
 Block images in HTML messages
 Look out for check boxes that are already selected when items
are bought online
 Do not sign up to commercial mailing lists
 Do not reply to an email or unsubscribe from a mailing list that
you did not explicitly sign up

Page 141 of 168


(9) Moderated and unmoderated forums:

Moderated forums:
 Refers to online discussion forum in which all the posts are
checked by an administrator before posting
 Moderator can prevent spam, filter out any posts are
inappropriate, rude or offensive

Unmoderated forums:
 No one owns the internet
 Not policed

(10) Cookies:
What is Cookies? Small files or code that are
stored on a user’s computer. Sent by web
server to user’s computer:
 The data can be retrieved and
used to customize the web page
for each individual
 Like if you buy a book online
cookies remember the type of the book
 The data gathered by cookies from anonymous user
profile and does not contain personnel data like password
or bank card details

Additional security of data online:


1. Firewalls
2. Security protocols
3. Encryption
4. Authentication

Page 142 of 168


(1) Firewalls:
 Can be Hardware or Software
 Its sites between the user’s computer and external network

Tasks which can be carried out by firewalls:


1. To examine the traffic between a user’s computer
2. Checks whether incoming or outgoing data meets a given set of
criteria
3. If the data fails the criteria, firewall will block the traffic and give
the user a warning about security issue.
4. The firewall can be used to log all incoming and outgoing traffic
to allow later interrogation by the user.
5. Criteria can be set so that the firewall prevents access to certain
undesirable sites
6. it is possible for firewalls to help prevent viruses or hackers
entering the network
7. The user is warned if some software on their system is trying to
access an external data source

(2) Security protocols


Two forms of security protocols
 Secure Sockets Layer (SSL)
 Transport Layer Security (TLS)

1- Secure Sockets Layer (SSL)


 SSL type of protocol that allows data to be sent and received
securely over the internet
2- Transport Layer Security (TLS)
 TLS is a form of protocol that ensures the security and privacy of
data between devices and users over the internet.
 Designed to provide encryption, authentication and data
integrity
Page 143 of 168
TLS is formed of two layers:

 Record Protocol:
This part of the communication can be used with or without
encryption, it contains data
being transferred over the
internet.
 Handshake Protocol :
It is a secure session
between user and website is established

Main differences between SSL and TLS:


 It is possible to extend TLS by adding new authentication
methods.
 TLS can make use of session caching, which improves the
overall performance compared to SSL.
 TLS separates the handshaking process from the record
protocol (layer), which holds all the data.

Session cashing:
The use of session caching can avoid the need to utilize so
much computer time for each connection. TLS can either
establish a new session or attempt to resume an existing
session

Page 144 of 168


(3) Encryption:
 Encryption is used to protect data in case it has been hacked or
accessed illegally
 Encryption is the method by which information is converted into
secret code that hides the information's.
 The science of encrypting and decrypting information is called
cryptography. In computing, unencrypted data is also known as
plaintext, and encrypted data is called cyphertext.
 The key used to encrypt is called encryption key and the key used
to decrypt called decryption key

Page 145 of 168


(4) Authentication:
 Authentication is used to verify that data comes from a secure
and trusted source, its working with encryption (digital
certificate, passwords, biometrics and their authentication roles).

Digital certificates:
• A digital certificate is a pair of files stored on a user’s
computer , each pair of files divided into:

 A public key (which is known by anyone)


 A private key (known to the computer user only).

• When sending an email, the


message is made more secure by
attaching a digital certificate.
When the message is received,
the recipient can verify that it
comes from a known or trusted
source by viewing the public key
information.

The digital certificate is made up of six parts:

 The sender’s email address


 The name of the digital certificate owner
 A serial number
 Expiry date ( validity of certificate)
 Public key
 Digital signature of certificate authority (CA)

Page 146 of 168


Passwords
 Strong passwords should contain upper case and lower case
characters, as well as numbers and other keyboard symbols as
example: R_tool$29/!
 Passwords should be changed on a regular basis
 If the password not matching with the user ID that access will
be denied.
 Many systems asking to enter password three times as a
maximum before user lock out.
 It's important to prevent others people to gain access to your
password through spyware or viruses.

Biometrics:
Biometric is a method of authentication, it relies on certain unique
characteristics of human beings and examples include:

1. Fingerprint scans
2. Signature recognition
3. Retina scans
4. Iris recognition
5. Face recognition
6. Voice recognition

Page 147 of 168


Fingerprint scans
Images of fingerprints are compared against
previously scanned fingerprints stored in a
database, if they matched then access allowed

Advantages:
 Fingerprint for each person is unique and this technique will
improve the security since to be difficult to replicate person’s
fingerprint.
 Other security devices such as (magnetic card) can be lost or
stolen
 It's impossible to sign in by somebody else since the fingerprint
match one person only
 Fingerprint can’t be misplaced; a person always has them.

Disadvantages:
 Expensive to install and set up
 If a person’s fingers are damaged through an injury, this can
have an effect on the scanning accuracy
 Some people may regard it as an infringement of civil liberties

Retina scans
 Retina scans use infrared light to scan the
unique pattern of blood vessels in the
retina
 It is very secure because no way to
duplicate blood vessels patterns

Page 148 of 168


Comparison between six common biometric techniques

Online credit Fraud:


 Hackers access to the computer through the use of spyware (phishing
or pharming) , the user can be tricked into giving personal and
financial details that enable the hacker to gain full access to a user’s
account.
 By breaking of passwords through a number of techniques if
passwords are weak or no encryption is used.

Page 149 of 168


 Always type in a web address or URL rather than copy and paste it
from an email or other website.
 If you are using wireless network, it is very important to access
through password.
 Public Wi-Fi can be found in popular public places like airports, coffee
shops, malls, restaurants, and hotels and it allows you to access the
Internet for free, there is always a risk that somebody is monitoring
internet usage in the area.

Number of simple precautions users can take:


 Always use varied and complex passwords.
 Check the accuracy of bank accounts continually
 Only provide personal information on sites that have ((https)) in the
web address
 Don’t provide personal information to any unsolicited requests for
information
 Don’t open emails or attachments from unknown senders
 Delete any messages from your spam folder on a regular basis
 Report any suspicious phishing activity to the company that is used
by the perpetrator
 Only download software from sites that can be trusted.

Page 150 of 168


Cloud Security:
Cloud is an online storage medium used to backup files, files can
be accessed from any device with an internet connection.

Advantages from using cloud:


 No need to carry memory sticks if you want to access your files
from home
 You don’t have to pay for large storage capacity on your
computer/tablet or mobile phone
 Cloud will ensure that your files are backed up and will reduce
the possibility of losing data
 Ability to synchronize files because automatically updated
across all devices
 Cloud storage is ideal for collaboration purposes, it allows
several users to edit and collaborate on a single file or
document

Issues related to security of data:


 Data has been lost in the past during routine backup
 Celebrity data has been hacked
and shared including images
 The security of the building where
the server are held and accesses
rights to employees could affect
the security of the data.

Page 151 of 168


9- Audiences
Audience appreciation
When planning or creating ICT solution, you have to consider audience who
will use or take part in the system

The list of factors should be considered:


 The age of the target group (the response is different between
children and mature)
 The experience of the audience (between company manager and
school children)
 The expectation of the audience ( If you advertise your business in
a restaurant older people expect coffee or tea but children expect
pizza or fast food )
 Knowledge of the audience (graduated in media would expect
different approach.

How to find audience target:


 Interviewing the target group to find out how to engage the
audience
 Giving out questionnaires to people in the target group to find
out their background, interests, and so on
 Carrying out market research by using interviewing and
questionnaires techniques

Giving a sample presentation to an audience


Consider Mobile Phone Company decided to do two presentations, one for
sales and features of the 4 different mobile phones the market and sell:

Page 152 of 168


1. One presentation to sales team who will receive bonus for the
phone sold (they will be interested with technical knowledge and
profitability of each sale).

2. Other presentation for the potential group of customers or end-


user (end user will be interested with features for each phone and
the price.

The key factors when you are writing the presentation:

(1) Language used:


 No vulgarity or use inappropriate language , it can offend people
 The use of technical terms should be only for experienced or
technical audience

(2) Multimedia used:


 Use photos, video, sound and animation always will catch the
attention of the audience
 A young audience is more likely high music and sound in addition
to videos clips.
 Complicated description better to use graph or animation or
both

(3) Length of presentation:


 Long presentation will only work if they are interesting and
engage the audience
 A very young audience quickly will get bored.

Page 153 of 168


(4) Interactive presentation:
 Asking questions but be careful because not everyone wants to
take part

(5) Examples used:


 When using examples to illustrate ideas ( don’t give examples
to meat products while your audience is vegetarian

Legal, moral, ethical, and cultural appreciation:


Software copyright and privacy
Software, Music CDs, videos, articles from magazines and books is
protected by copyright laws

It is illegal to:
 Make a software copy and then sell it
 Use software on a network or in multiple computers without a
license
 Rent out a software package without permission
 Use the name of copyrighted software without agreement

Ways to protect software installation:


 Before installation of software the user will be asked to enter
Product key
 The user will be asked OK/I Agree to the license agreement before
installation

Page 154 of 168


 The original software always come with the sticker informing the
purchaser it is illegal to make copy ( hologram form)
 Some software required to be original CD/DVD available in the drive
 Some software run only if dongle is plugged into USB port

Legal, moral, ethical, and cultural implication:

 Legal: covers the law; whether an action is punishable by law.


anything break the law is termed illegal

 Morality: governs the private and personal interactions between


people and is usually determined by the person concerned, the
human desire to distinguish between write or wrong

 Ethics: governs professional interactions, for example, codes of


behavior practiced by a society or group of people sometimes going
against an individual’s own sense of morality

 Culture: refers to the attitudes, values and practices shared by a


society or group of people

Examples:
 Copying software, and then selling it without the permission – illegal
 A student has changed the contents of a company website without
permission – immoral
 Writing computer games that make fun of a country’s religion -
Cultural
 Using pictures in a document without acknowledging copyright –
(immoral)
 Passing information to a rival company – Unethical

Page 155 of 168


 Adel a programmer , uses some of software routines from his day job
when writing computer games – Unethical
 Ali is a programmer and has some of his software written overseas,
but only pays low wage to do the work – immoral

Should the internet be policed?


Arguments in favor of some form of internet control:
 It would prevent illegal material being posted on websites
 People find it much easier to discover information (Ex. make a bomb)
 By some control would prevent children and other vulnerable groups
from being subjected to undesirable websites.
 By some control would stop incorrect information being published on
websites.

Arguments against some form of internet control:


 Material published on websites is already available from other sources.
 It would be very expensive to police all websites
 It would be difficult to enforce rules and regulations on a global scale.
 It can be argued that policing would go against freedom of information
 Many topics and comments posted on websites are already illegal
and laws already exist
 Who is to decide what is illegal or offensive, many things are only
offensive to certain people but others NO

Page 156 of 168


10 - Communication
Communication with other ICT users using email:
Email is very popular for communication between people, however many
countries have laws to protects people against misuse of email.

The following is some laws and guidelines for the countries and companies
they required:

It is important that emails are not


false or misleading subject lines

Organizations must include valid


postal address

Organizations not allowed to capture


or store list of email address

Organizations required to ask


permission before they can send
email to individuals

They should be clear with recipients


to unsubscribe from receiving email

Organizations must insure privacy


policy are clear and that subscribers
are made aware of such policies

Page 157 of 168


Acceptable language:
 When sending an email
Example of using inappropriate language:
the language and • Absence images
content must be • Abusive, profane, inflammatory
appropriate • Violent message
 If the email is being • Use illegal material in messages
sent to an employee
within a business the language must be formal

Copyright:
 Copying or forwarding email is legal unless the sender indicate
clearly that the message is confidential
 Recipient should check the email before copying or forwarding it
 Some companies set out their rules for sending and receiving
email

Netiquette:

Senders should consider Avoid humor as some


what they write as content Netiquette is the rules people may not
in an email could be of etiquette that apply understand the joke
misunderstood or taken when communication
out of context over computer Do not plagiarize and
networks especially obey the copyright law
Sender should check for internet
spelling and grammatical Do not chaptalize all
error text
Respond quickly to an
email message

Page 158 of 168


Spam:
What is spam email?
Spam or junk email is sent out to the recipients from mailing list, the
email could be part of phishing scam or to promote certain product,
usually unwanted email

Effects of spam email:


 If a spam email is part of a phishing scam then there is a
chance your details could be obtained.
 The network could also become slower or unresponsive if
there is a lot of unnecessary traffic flooding the network.

Email group :
 Are contacts grouped together to send email to multiple
recipients

Strategies to prevent spam email:


• Use a junk email filter to stop spam email
coming into the inbox.
• Do not sign up for any commercial mailing lists.
• Do not reply to spam email.
• Untick the check box if you are asked to give
your email to a third party.

Effective use of the internet:


The internet:
Internet is a world wide collection of networks that
allows users to:
 Send and receive e-mail
 Chat online
 Transfer files from computer to computer
 Browse the web

Page 159 of 168


WWW (World Wide Web):
 Is a part of the internet
 Collection of web pages has been based on the hyper text
transfer protocol (http)
 Can access by web browser

Intranets:
• Intranet is defined as a computer
network based on internet
technology but designed to meet
the internal needs for sharing
information within a single
organization

Why intranets adopted rather than using the internet


 Intranets are safer, less chance of hacking/viruses.
 It is possible to prevent external links
 Companies can ensure that the information available is specific
to their needs.
 It is easier to send out sensitive messages
 Intranets offer better bandwidth than the internet
 It is possible to create extranets that allow intranets to be
extended outside the organization

Page 160 of 168


 Online storage medium used to backup files.
Cloud Storage  Files can be accessed from any device with
an internet connection.
 Data is saved on more than one server so in
case of maintenance or repair data is always
accessible.

Advantages Disadvantages
• Files can be accessed from any • Files could be hacked
location though internet • Depend on quality of internet
• Users don’t have to carry storage connection due to fast or slow
devices around them download
• Offer backup solutions • Potential cost of cloud storage
• Unlimited storage capacity

There are three common systems:


1. Public cloud: Storage environment where the client and cloud
storage provider are different companies
2. Private cloud: Storage provided by a company protected by
firewall
3. Hybrid cloud: Combination of the two previous, sensitive data
will be stored in private cloud and less sensitive data will be
stored in public could

Page 161 of 168


General internet terms:
 Is a set of rules which are followed when
Hypertext transfer transferring information across the internet?
protocol (HTTP) &  Rules are agreed between the sender and
(HTTPS) recipient when data is being transferred
 When the protocol changed to seen as
padlock symbol or letter “s” after http
this is refer to “secure”

 A web browser allows the user to display a


Uniform webpage.
recourse  A web browser will use URLs to access specified
locator (URL) websites.
& web
 URLs are represented by numbers
browser
(http://195.196.101.1) not user friendly.
 Therefore an alphanumeric format
(http://www.MM .com/ict)
 Web browser translate HTML from websites to
show the result, it can be images, videos, or
sound

http://www.MM .com/Esafety/ICTcourse .

Protocol://website address/Path/filename
The format is protocol://www.website address/path/filename,
website address :
1. domain host (WWW)
2. domain name ( name of website)
3. domain type (.com or .gov or .net or .org)

Page 162 of 168


4. sometimes includes country code like kw, eg or uk ..
5. path which is a webpage
6. filename is the item on the webpage

What is the process a web browser to load a web page?


 When entering URL or clicking the link address request made
 Retrieve code from the server/resources then downloaded
 Interprets the code as a webpage or page resources to build the
web page
 The web page is displayed

 FTP is a network protocol when transferring


File transfer files from one computer to another over the
Protocol (FTP) internet.
 FileZilla is popular FTP application which
issued to upload webpages so that they can
be hosted and viewed on the internet.

Internet  ISP is a company which provides internet


Service access to users.
Provider (ISP)  Normally the users would have to pay a
monthly fee.
 Broadband connections tend to use fire-
optic cables for increased bandwidth.

Page 163 of 168


What are the differences between the internet and an intranet?
 Internet is " international network"
 Intranet is "internal restricted access"
 Internet covers topics of global or general interest, whereas Intranet
is used to give local information relevant to the organization
 Internet possible to block certain websites but more difficult where
as in intranet easy to block certain websites
 Internet can be accessed from anywhere but Intranet requires
password and user ID entry
 Internet access is open for hackers , but intranet is behind a firewall,
which gives some protection against hackers
 Internet is public access, whereas intranets can be private access

Blog: web  A blog is based on personal experiences


and usually updated by one author.
logs
 Blog entries are in order (most recent
entries are shown first).
 Blogs cannot be changed by other users of
the internet.
 Bloggers can be prosecuted for posting
offensive material.

Wikis  A wiki is a collaboration from users (many


authors) to create content.
 Wiki is can be edited by anyone (content
can be edited or deleted).
 Wikipedia is an example use of Wikis

Social Social Networking sites allow users to interact and


Networks communicate with each other.
Page 164 of 168
The features of social networking sites:
 You can connect with people with similar interests.
Microblogs  Similar to blogs but often used on social networking
sites to make short, frequent posts.
 The posts can be done using instant messaging,
emails or other social networking (such as tweets).
 Very difficult to customize

b-blog  Another version short for business blog which is used


by businesses to promote themselves on the internet.

Page 165 of 168


Searching the internet for information

There are two ways to find the information:


 When using the internet you can
either type in a URL address or use
a search engine to find specific data.
 Normally keywords would be typed
in to a search engine to find
particular information.

Search engines:
 Search engines are useful if you don’t
know the URL
 Search engines using variety of methods
to search
 The more specific search you will get
accurate result
 You can narrowing your search by typing
(+) between words (ICT+past+paper+2019)
 You will find thousands of hits, then you can save it

Using the internet

Advantages:
 Information on the internet is up-to-date
 The internet limitless of information
 Searching using a search engine is fast and easy.
 People can look for information from home
 Information on the internet is usually free of charge.
 Pages on the internet can have multimedia elements , which
can make learning is interesting

Page 166 of 168


Disadvantages:
 Anything can be posted on a web page and information may be
incorrect.
 There is always the risk of accessing inappropriate websites
 It is too easy to be distracted when searching on the internet
 There is always the risk of information overload if the user lacks
the necessary experience
 Some research skills are lost when using the internet as search
engines do all the work for you

Effective use of internet:

Why internet search to find relevant information is not always fast?


 Unless the user narrowing the criteria it will take long time to
find the relevant information
 It is possible to find millions of relevant web sites matching with
given criteria
 If the user uncertain what he needs it will take long time to find
the relevant information

Why it is not always easy to find reliable information on the internet?


 Content on the internet is not regulated.
 Anybody can make a website and post any content which is not
factually correct.
 Wikis can be edited to contain false information.
 Information may be biased depending on who was the author.

Page 167 of 168


How can you evaluate the reliability of information found on
the internet?

1. Anyone can setup website, so information not necessarily reliable or


accurate.
2. Some commercial web site will be based to advertise their products,
If the advertising only related to their own products It could be
unreliable
3. If the web site URL ending with .gov or .org … mostly is reliable
4. If you compare the information on the web site with the information
in the book, this will help to show if the information reliable or no .
5. It is good idea to see if responsible bodies endorsed ( support and
permit ) the website
6. Check if the website linked to reliable or unreliable web sites
7. Check if the website have a testimonials or recommendation this can
indicate reliability
8. If the last update was long time ago , this mean the information is
not reliable
9. If the author of the website is good credential, then the information
is more likely reliable

Page 168 of 168

You might also like