Professional Documents
Culture Documents
ICT 0417
Theory
From Chapter 1 to 10
Page 1 of 168
Page 2 of 168
Section 1
ICT Theory
Page 3 of 168
6.10 Expert systems
6.11 Computers in medicine
6.12 Computers in libraries
6.13 Computers in die retail industry
6.14 Recognition systems
6.15 Monitoring and tracking systems
6.16 Satellite systems
Chapter 9 Audiences
9.1 Audience appreciation
9.2 Legal, moral, ethical and cultural appreciation
Chapter 10 Communication
10.1 Communication with other ICT users using email
10.2 Effective use of the internet
Page 4 of 168
1. Types and components of computer system
Internal Hardware:
Motherboard
Random access memory (Ram) RAM
Read only memory (Rom)
Video Cards
Sound Cards
Internal Hard storage devices ROM
(HDD & SSD) Video Card
External Hardware:
Monitor
Keyboard Sound Card Solid State Drive
Mouse
Printer
Storage
Page 5 of 168
Internal hardware:
Motherboard:
Printed circuit board in all computers.
It allow the processor and other hardware to function and communicate with
each other
It is central to any computer system
All components plug into the motherboard
Page 6 of 168
Video card:
Allow the computer to send graphical information to video display like monitor
or television, made of memory unit, cooling mechanism and connection to
display unit.
Sound card :
Integrated circuit to board to provide a computer with ability to produce
sounds
Page 7 of 168
• Control and measuring software: designed to allow a computer or
microprocessor to interface with sensors to measuring temperature ,
control application like chemical process (pH)
• Photo editing software : software allow editing digital photo stored in the
computer
• System software : Program that allow the hardware to run properly and allow the
user to communicate with the computer
• Compiler : computer program that translate program written in high level
language as a whole into machine code, the original program called the
Source Code and the program after compilation called the Object code,
Examples of high level language is Java, Python, C++ , Fortran .
• Linkers: computer program that takes one or more object files produced by
compiler and combine them into a single program. Different pieces of code
called module and the linker put all together.
• Device driver: the name of software that enable one or more hardware
device to communicate with the operating system and without driver the
device unable to work.
Page 8 of 168
• Operating systems (OS): software running in the background of a computer
system , without operating system the computer will not user friendly, OS
allow:
• Input / Output operation
• User communicate with the computer
• Error handling
• Managing of security ( log in – password – user account )
Boot files: Code tells the computer what to do when the first
start up referred as BIOS (Basic input/output system.
CMOS : Chip that BIOS stored the data ( date & time and
system configuration) in non-volatile chip called CMOS
(complementary metal oxide semiconductor) this is battery
powered
Page 9 of 168
Operating systems:
Page 10 of 168
GUI
CLI
Types of computers
Advantages Disadvantages
• Lower cost because spare parts and • Not portable.
connections tend to be standard • You need to copy files if you
• Better specification (fast processor..) do some work outside.
• No much heating • More complicated than
• Less damaged can be happened laptop
because fixed in one location
• Internet access is also stable because
not moved around
Page 11 of 168
2- Laptop / Notebook computer
Advantages Disadvantages
• Laptop in single unit then no trilling • Easier to steal.
wires • Battery is limited life.
• Can take full advantage of Wi-Fi. • Keyboard and pointing devices
• Lightweight. can sometimes be not suitable
• Low power consumption. to use.
• Portable, can be taken anywhere and
can connect with multimedia system
3- Tablets
Page 12 of 168
4- Smartphone
Allow normal phone calls and also have OS ( iOS, Android, Windows)
functions of smartphone :
Send/receive email
Surf internet
Global positioning system GPS
Calendar functions
Telephone banking using banking Apps
VIOP – voice over internet protocol using internet
Streaming of video
Streaming of music
Social networking
Instant message
Advantages Disadvantages
Easy to carry (very small in size The small screen make pages
and lightweight difficult to read
Used to make phone calls and also Small keyboard make difficult to
connect to internet while on move type things and slow also, but this
Used anywhere sine have Wi-Fi solved in large screen
Have hundreds of Apps Web browsing can consume
Have reasonable battery life battery quickly
compared to laptop Memory is not large when you
compare with laptop
Not all websites compatible with
smartphone operating system
Easier to lose or stolen since
small size
The data transfer rate using
mobile phone networks is slower
with Wi-Fi
Page 13 of 168
4- Smartwatches
Allow users to wear a mini computer in their writs and have the functions of
smartphone
Some functions of smartwatches :
Internet connectivity , can browse& search ,
send email
Ability to make and take phone calls
Messaging using text or video
Weather forecasting
Fitness and health monitoring capability
GPS , find location , using satnav , direction to
other location
Advantages Disadvantages
Same advantages of Same disadvantages of smartphone
smartphone Smartphones are large and bulky.
It can wear in wrists Problem with battery failure or
Monitoring fitness and health empty battery.
regimes Unattractive design
The software for GPS needs to kept
up to date update
During running loss of satellite can
make an issue
During running sunlight can make it
unreadable
Page 14 of 168
Mainframe computer
Is used for large and very powerful computer system, and the main purpose
to run commercial applications such as banking, insurance where huge
amount of data.
Page 15 of 168
Artificial intelligence (AI) biometric overcome this problem using
dynamic profiling , this is mean the person no worry to get his
fingerprint in exactly right place every time on the scanner
Facial-recognition system has the same problem ( wear glasses –
grown hair – has aged ) AI can overcome this problem
Vision enhancement
Low vision enhancement system ( LVES ) use video technology through
a headset connected to a computer, the system allow images to be
projected in from of the eyes, this bring the things closer by the user of
the system
Night vision enhancement ( NVE ) amplifies infrared light and visible light
so that the image can still be seen in the darkness ( military use this
technology
Robotics
Robotics mostly used in manufacturing industry, like weld car bodies ,
spray body panels, fit items
Robots appearing in many areas in our lives
One application used in drones (flying devices) used by military and
civilians.
Robots can perform many tasks:
Dangerous jobs ( bomb disposal )
Exploring (Volcanos)
Repetitive manufacturing job ( Cars )
Moving heavy objects
Surgical procedure
Page 16 of 168
Quantum cryptography
Cryptography is the science of making a message unintelligible to any
unauthorized user (hacker).
Quantum cryptography is based on the use of photons (light) and their
physical quantum properties
Send a message with complete privacy (encryption)
Make it much more complex to decrypt, ( enable secure
communication
Computer-assisted translation ( CAT )
• When human translators use computer software to help in translation
process
• Reduce translation time but may be not 100% accurate
Impacts on everyday life
More accurate
Multilingual
Quick translator
Page 17 of 168
Optical computers ( speed will be faster )
Virtual reality
Artificial environment that users can interact with
General equipment to use Virtual Reality
Eye goggles – gloves – headphones – sensor - powerful computer
Page 18 of 168
Heritage ( to see the mountains)
Business ( Training course )
Real state ( people can look around the house )
Engineering ( to show how design of the building will look )
Media ( special effects of movies( The matrix ) )
Scientific visualization ( to see molecular structure in chemistry
Page 19 of 168
2- Input and output devices
1- Keyboards :
Uses :
Input of data (text, number,..) into applications software
Typing commands to the computer ( Ctrl P + Ctrl S … )
Mostly QWERTY keyboard is used
Ergonomic keyboard is used to reduce the health-related problems
like ( carpal tunnel syndrome – RSI )
Advantages Disadvantages
• Fast text entry into the document • Can be difficult to use if the user
• Easy to use has limited arm/wrist use.
• Easier to do verification checks as • Slow method when compared
the data is entered. with direct data entry
• Large device.
2-Concept Keyboard
Uses icons instead of standard letters ,
Often used in fast food restaurants one
item (example ice cream)
Fast data entry.
The keyboards are waterproof.
Certain applications.
Tamper resistant
Page 20 of 168
2. Numeric keypads
Used to enter number only
USES:
Automatic teller machines (ATMs).
Mobile phones.
Point-of-sale (POS)
Chip and PIN devices when paying by credit/debit cards
Fast entry of numeric data into a spreadsheet
Advantages Disadvantages
• Faster than standard keyboard • Sometimes have small keys, input
• Very easy to carry around more difficult.
• Sometimes the order of the
numbers on the keypad isn’t
intuitive.
Pointing devices:
1- Mouse
By moving mouse around, you can control the
position of the pointer on the screen
USES:
Opening, closing and minimizing software.
Grouping, moving and deleting files.
Controlling the position of a pointer on the screen
Advantages Disadvantages
• Faster way than using a keyboard. • More difficult for people with
• Very quick way to navigate restricted hand
applications and internet • Easy to damage
• No need large desk area. • Difficult to use if no flat surface
Page 21 of 168
2- Touchpad
Used in many laptop as a pointing device
Advantages Disadvantages
• Faster than a keyboard • People with limited hand/wrist
• No need for a separate mouse. movement find the device difficult
to use.
• Difficult to control when compared
to a mouse.
• Difficult in certain operations such
as drag and drop.
3-Tracker ball
Uses
Used in applications where the user has disability
(RSI)
Used in a control room /faster than a mouse
Used in some luxury cars to select functions such
as radio, telephone, music
Advantages Disadvantages
• Easier than a mouse. • Not supplied with computers as
• More accurate positioning. standard.
• More robust than a mouse. • User may need training
• Needs less desk space than a mouse
Page 22 of 168
4-Remote Control
Uses :
Televisions, satellite systems, most of systems
use remote controls.
Control multimedia systems.
Used in industrial applications to remotely
control processes.
Advantages Disadvantages
• Operated from any reasonable • Difficult to use if the operator has
distance. limited hand/wrist movement.
• Some chemical processes are • It is easier to block the signal.
hazardous, can select operation
from distance
5-Joystick
Uses :
Used in video/computer games.
Used in simulators
Advantages Disadvantages
• Easier than a keyboard to • More difficult to control the on-
navigate the screen screen pointer
• Control is more realistic than
using a mouse
Page 23 of 168
5-Driving wheel
Uses :
Used in video/computer games.
Used in simulators (car-driving
simulators)
Advantages Disadvantages
• Easier than a keyboard or • Expensive input device.
joystick. • Movements too sensitive.
• Actual steering wheel and other
controls operate in real life.
6- Touchscreens
Uses :
Self-service
ATMs
Point-of-sale terminals
Airports, railway stations, tourist
offices
Personal digital assistants (PDAs), mobile phones and satellite
navigation systems
Interactive white boards in education.
Computer-based training (CBT) - on-screen testing.
Used as an output device
Advantages Disadvantages
• Faster entry. • Limited number of options
• Very easy method. available.
• User-friendly. • Can lead to problems.
• The screen can get very dirty,
reduce its responsiveness
Page 24 of 168
7- Scanners:
There are two types of scanner, The most common is
flatbed scanner, also barcode scanner is another type
Uses
• Scan documents.
• Scan in old/valuable documents/books.
• Scan in photographs.
• Scan in barcodes at POS terminals.
Advantages Disadvantages
• Images can be stored for editing • Quality can be limited depend on
at a later date. resolution of the scanner.
• Much faster and more accurate. • Slow at scanning if color scanning
• Recovery damaged documents selected
and photographs.
8- Digital Camera
Digital cameras replaced with traditional based film ,
now the images stored digitally on solid state
memory , and can be transferred to computer by:
Advantages Disadvantages
• Easier to produce better-quality • The quality of photographs
photographs. depends on the number of pixels.
• Easier and faster to upload • Images compressed to reduce
photographs to a computer reader. the memory used.
• No need to print out photographs.
• Can store several hundred
photographs.
Page 25 of 168
9- Video Cameras
DV (digital video) cameras, store
compressed photo frames at speed of 25
MB per second this is known as (MOTION
JPEG)
10- Microphone
Microphone connected directly with the computer,
Sounds converted to an analogue signal then converted
into a digital signal
Uses :
Presentations.
Input in voice-recognition software
As a sensor to pick up sound.
Used in video conferencing or Voice over Internet Protocol
Advantages Disadvantages
• Faster to read text instead using • Sound files is big.
keyboard • Voice-recognition software not
• Manipulate sound. accurate
• Voice-activation system, Advantage
of improving safety. – driving cars
Page 26 of 168
11-Sensors
Sensor is a device to input data into a computer, the data is physical
quantity like temperature, light, moister, this data is analogue in nature
Computer can read only digital data , then the data from sensor should
be converted to digital using an analogue digital converter ADC
Type of sensors:
Advantages Disadvantages
• More accurate than human • Faulty sensors can give spurious
operators. results
• Readings are continuous - no break
• Any necessary action or warning will
be initiated immediately
• Systems can be automatic, removing
the need for human intervention.
Page 27 of 168
12- Graphic Tablet
Used with stylus to produce freehand drawing
Uses
produce freehand drawings
Used in computer-aided design (CAD)
work
Advantages Disadvantages
• Modify drawings before they are • More expensive than other
input. pointing devices.
• Very accurate method of drawing. • Takes time to produce a drawing
• Can record levels of pressure. • Menus not very user-friendly.
• Larger drawings (such as A4) are
expensive to produce.
• The touch screens are damaged
easily.
13- Webcams
Uses
Conversation while chatting online.
Video conferencing
Advantages Disadvantages
Immediate face-to-face video chat Very limited features and often
Contact with each other without poor quality.
traveling Need to be connected to the
computer.
Page 28 of 168
14- Light pens
Light pens contain sensors that send signals to a
computer whenever light changes are detected,
and only work with CRT monitor
Uses :
• Selecting objects on CRT screens
• Drawing on screen ( as example CAD Package)
Advantages Disadvantages
Greater accuracy than touch screen Problems with delay when
Small drawing on screen.
Easy-to-use Only works with CRT monitors.
Not accurate when drawing.
Page 29 of 168
Direct data entry ( DDE ) devices:
Devices for reading information from cards
Magnetic stripe readers
Used to read information on the magnetic stripe
founded in back of credit/debit card
Uses:
On credit/debit cards for use at ATMs or EFTPOS
(Electronic Funds Transfer at Point Of Sale)
terminals
Security devices to allow entry to buildings,
(as in hotel rooms)
Advantages Disadvantages
• Fast data entry • If the magnetic stripe gets
• Error free damaged the data is lost.
• Secure • Doesn’t work at a distance.
• Prevents access to restricted areas • Not human readable.
• Not affected by oil, water, moisture
• Very robust.
Page 30 of 168
• Retailers will not access to the • Can take money twice.
customer’s card. • Transactions are a small
• The chip in the contactless
credit card responds with a
unique number used for that
transaction only.
Advantages Disadvantages
• More secure • Need to be careful to ensure PIN
• More robust isn’t read by somebody else while
typing it in.
Page 31 of 168
Magnetic ink character recognition/reader (MICR)
Is as system to read characters printed in a special ink
Uses:
Used to process bank cheque in banking operation
using system called batch processing
Advantages Disadvantages
• Offer greater security than OCR • Only certain characters can be read
• No manual input, so errors are and the number of different
reduced characters is very limited.
• The magnetic ink characters can • More expensive
still be read even if somebody
writes over them
Page 32 of 168
Optical character recognition/reader (OCR)
The new system in processing of passport and id cards
Uses:
Processing of passports and identity cards
Converting printed documents to an editable
electronic format
Read car number plate
Advantages Disadvantages
• Much faster data-entry system • Difficulty reading handwriting
• The number of errors is reduced • Not very accurate
• Can read handwriting
Page 33 of 168
Barcodes readers ( hand scanner )
Uses:
Supermarkets and shops
Libraries to keep track of books
Safety function - electrical equipment checking
regular basis.
Advantages Disadvantages
• Much faster • Expensive system to administer.
• Way of recording data • Not foolproof.
• Allow automatic stock control. • Easily damaged than RFID tags or
• Trusted technology. magnetic strips.
Advantages
• No need to write down a key or
website
• QR can store the website address
on business card or on the
magazine, train, bus
Page 34 of 168
Output devices and their uses
CRT monitors
Cathode ray tube (CRT) monitors
Uses:
Output device
Used with light pens
Advantages Disadvantages
• The angle of viewing is still better • Present a safety hazard if not
than with most TFT monitors supported properly
• They work with light pens in • Run very hot and can cause fires
CAD/CAM applications • They consume more power than
modern TFT
• They can flicker, can lead to
headaches and eyesight problems
Advantages Disadvantages
• Lightweight • The angle of viewing a TFT is
• Produce less glare than CRT monitors fairly critical.
• Less radiation • Definition is sometimes not as
• Consume less power / don’t generate good as a CRT monitor.
much heat
Page 35 of 168
LCD and LED monitors
• CRT monitor almost gone
• Most monitors become LCD ( Crystal Liquid display / diode
technology
• Modern monitors are backlight using light emitting diode LED
which give the monitor better contrast and brightness
• LED no need warm up to reach to full efficiency
• LED produce brighter light
• LED consume very little power / produce less heat
• OLED is new technology , which is very thin, flexible, lighter
Multimedia projectors
Uses :
Training presentations
Advertising presentations
Home cinema systems
Advantages Disadvantages
• Many people can see a presentation • Images can sometimes be fuzzy
without crowding • Expensive
• No networked computers • Setting little difficult to setup
Page 36 of 168
Printers
Laser Printers
Produce high-quality, high-volume printing
Uses :
When low noisy required
High-quality, high-volume printing
Advantages Disadvantages
• Low noisy • Color laser is expensive
• Fast if several copies • Produce ozone and volatile
• Handle very large print jobs organic compounds.
• High quality
• Long time toner
Inkjet printers
Uses:
Low volumes are required
For single pages are ideal
3-D inkjet printers to produce prototypes
Advantages Disadvantages
• High-quality • Slow output if several copies
• Cheaper than laser printers. • Can't do large print jobs
• Very lightweight and a small • Printing can (smudge) if user is
• Don’t produce ozone and volatile not careful
organic compounds • Can be expensive
Page 37 of 168
Dot matrix printers
type of impact printer head is slow, noisy and the
output is not good
Uses:
Used in noisy environments
Advantages Disadvantages
• Used in environments that would be • Very noisy
a problem to laser or inkjet printers • Actually cost more than an inkjet
• Carbon copies or multi-part outputs • Very slow, poor-quality printing
can be produced
• Very cheap
• Easy to use
3 D printers
Primarily used in computer aided design CAD
applications, can produce
solid objects
Advantages Disadvantages
• The manufacturing of items much easier • None original items
than ever before • Dangerous or illegal activities.
• Take a short length of time for designs to • Due to job losses
be converted into working prototypes
• less costs
• Medical benefits , producing artificial
organs, prosthetics and medical
products ,tissue engineering, artificial
blood vessels, designs of medical tools.
• Parts for machinery manufactured using
3D printers
Page 38 of 168
Speakers
Uses :
• Output sound
• Play downloaded sound files
• Audio output helps disabilities user.
Control applications
Actuators • Used to take signals from a
computer and convert them
into a form of motion as
example operating motor,
pumps and valves
• Usually convert from digital to analogue
(DAV)
Motors Turned on or off by the actuator
Uses
• Automatic washing machines , cookers , water
pumps in central heating systems, and in
automatic glasshouses to open windows and
switch on fans
• Control of robot
Page 39 of 168
• In computers to control fans, disk drives and
DVD drives
Buzzers Turned on or off by the actuator
Uses
• Used in cookers and
microwave ovens to tell the
operator when the cooking
process is complete
Lights The actuator is connected
to the switch that turns the
lights on or off
Uses
• Security lights
• In glasshouses
Heaters Actuators are connected to
switches that turn the
heater on or off
Uses
• Automatic washing
machines to heat up the water
• Automatically control the temperature in an
oven
• Control the heating in a central heating
system
• Temperature control in an automatic
glasshouse
Page 40 of 168
3- Storage devices and Media
Type of access
Serial access:
• When using serial access it is necessary to start from the beginning of the
file then access to each record ( like database including field , record and
file ) then run until to the required record found
• This way used in magnetic tape and very slow form of data access
• This way used when speed of access is not important ( as example utility
billing, clearing bank cheques, or producing pay slips)
Page 41 of 168
Direct access:
• Used with magnetic disks , optical media and solid state media
• The computer use key field to calculate where data should be stored
• Direct access much faster than serial access
• When updating files using direct access the old file or data written over
by new records
• Mostly used where data access speed is vital like controlling chemical
plants or online systems like booking air tickets or automatic stock
control.
Magnetic
Optical
Solid state
Page 42 of 168
Magnetic storage media (Direct access)
Magnetic storage media depend on magnetic properties of certain
materials, data read using direct access
Uses :
To store the operating systems, software
/data/files
To store applications software
Real-time systems ( robots, control of a
chemical plants) and online systems
Used in File Servers for computer networks
Advantages Disadvantages
• Very fast data transfer and fast access • Easily damaged
times • Have many moving parts
• Very large capacities • Their read/write operation can
be quite noisy
Page 43 of 168
Magnetic Tapes ( Serial Access )
Data is read from the tape using serial access , this way
is useless in real-time or online applications because is
very slow method
Uses:
In applications where batch processing is used, for example, clearing
bank cheques, utility billing (gas, electricity, water)
Backup media
Used in long-term archiving of data.
Advantages Disadvantages
• Less expensive. • Very slow data access times.
• Very robust technology. • When updating, another tape is
• Huge data storage capacity. needed.
• The data transfer rate is fast. • They are affected by magnetic
fields.
CD/DVD disks)
Laser light is used to read data and write
( R - Write once only) – (ROM - only read ) – ( RW - written or read
many times)
DVD have different technology from CD to increase storage capacity
Page 44 of 168
1-CD-ROM and DVD-ROM
Uses:
CD-ROMs are used to store
music files, software, computer
games and reference software , they can't be written over
DVD-ROMs have much larger storage and used to store films and
games
Advantages Disadvantages
• Store more data than floppy disks • The data transfer access time is
• Less expensive than hard disk slower than hard disks
Uses:
Home recordings of music (CD-R) and
films (DVD-R)
Store data to use later or to be transferred to another computer
Advantages Disadvantages
• Cheaper than RW disks • CD-R/DVD-R can only be
• Once burned they are like a ROM recorded on once.
• Not all CD/DVD players can read
CD-R/DVD-R
Page 45 of 168
3- CD-RW and DVD-RW
RW means the disk is rewritable media
and can be written several times
Uses:
To record television programmers
Data can be added to at a later.
Used in CCTV systems
Advantages Disadvantages
• Can be written over many times. • Relatively expensive.
• Can use different file formats • It is possible to accidentally
each time it is used. overwrite data.
4- DVD – RAM
Uses:
In recording devices such as satellite
receivers to allow simultaneous recording
and playback
Used in camcorders to store movies
Advantages Disadvantages
• Long life • Not as compatible as R or RW
• A rewrite operation over 100000 format
times • Expensive.
• Writing on DVD-RAMs is very
reliable
• Very fast access
• No need to finalize the disk
• Very large capacity
• Ability to read data at the same
time written
Page 46 of 168
5- Blu-ray discs
Uses:
Home video
Storing and playing back movies.
Data storage or backing up
Camcorder to store movie footage
Advantages Disadvantages
• Very large storage capacity • Expensive
• Very fast data transfer rate • Encryption problems
• Data access speed greater than • Fewer movie titles on Blu-ray
other optical format
Page 47 of 168
Solid state storage media Solid (Direct access)
Uses :
Transporting files between computers /
backup
Security device to prevent software piracy ( dongle)
Advantages Disadvantages
• Very compact and portable media • Can’t write-protect the data/files
• Very robust • Easy to lose
• Doesn’t need additional software • The user needs to be very
to work on most computers careful when removing a
• Not affected by magnetic fields memory stick from a computer -
• Small incorrect removal may damage
the port and memory stick
Page 48 of 168
2- Flash memory cards
Uses:
Storing photos on digital cameras
Used as mobile phone memory cards
Used in MP3 players to store music files
Used as a backup store in hand-held
computer devices
Advantages Disadvantages
• Very compact and can be easily • Expensive per gigabyte.
removed and used in another • Have a limited life.
device • Lower storage capacity than
• Very robust. hard disks.
Page 49 of 168
4- Networks and the effects of
using them
Computer Network:
A network is two or more computers or other device connected together so
that can exchange data, share resources and files. Network created using
cables or wireless signal
Network Devices :
Hubs:
Hubs are hardware devices that
can have a number of devices or
computers connected to them to
make LAN and not very high
secure / suitable for home
network
Page 50 of 168
Switches
Similar to hub but more
efficient, connect a number of
devices or computers together
to form a LAN and more
secure
Modem
• A device that converts analogue signal from telephone line to
digital signals which can be ready for the computer
• Also converts a computer’s digital signal into an analogue
signal for transmission by telephone line.
• Dial-up modems, transmission speed 60 kb/s
• ADSL (asymmetric digital subscriber line) modems operate at
up to 100 Megabits /s
Bridge:
Bridges are devices that connect
one LAN to another LAN that
uses the same
protocol
Page 51 of 168
Router:
• Connect network/computer to the internet
• Connect LAN/network together
• Transfer data between networks
• Router can connect two devices using cables
or wireless signal
Other hardware
Gateway:
A gateway is a network point that
acts as an entrance to another
network
Page 52 of 168
Network cables:
Even most of computers systems is using Wi-Fi
still network cables used because they have some
advantages over Wi-Fi :
Faster data transfer rate
Can be more secure than wireless
networks
Page 54 of 168
Differences between Wi-Fi and Bluetooth
Suppose you asked to setup and configure small network, you have to do
the following:
Page 55 of 168
Purchase hardware and software:
1-Hardware
Router to connect your LAN to the
internet
Page 56 of 168
2- Software
Web to browse the internet
browser
Network Environments
(Local area networks (LANs) and Wide area networks (WANs):
Page 57 of 168
Wide area networks (WANs)
Page 58 of 168
Accessing the internet
Page 59 of 168
Internet and intranet:
• Internet :
Internet is public
Internet is network of networks
Internet is global
Internet has more information
than an intranet
• Uses of internet:
Viewing webpages
Sending and receiving email messages
Communication using VIOP and Web video Conferencing
Playing multiplayer games
Streaming Video / Audio content
Online Shopping/ Banking
• Intranet :
Intranet is within one
organization ( private )
Intranet can be policed
/ managed
Intranet is more secure
Data on the intranet is more reliable and relevant to the
organization than which on the internet
• Uses of Intranet:
Viewing internal webpages ( Company , School , …)
Internal e-mail and messing between workers
Sharing internal documents
Page 60 of 168
Network issues and communication
Security issues:
• Threats of network:
Network could be shut down or infected by virus
Could stop production , cost a lot of money
advantages disadvantages
• To protect vulnerable users • It would be extremely difficult
gaining access to undesirable and expensive to police the
websites internet
• To prevent illegal material be • Infrastructure and staff would
opened or shared by web users have required
• It will stop incorrect information • It is difficult to push roles in
being published on websites different countries
• This will be against freedom
Page 61 of 168
Reliability of information
Information on the internet is more up to date than in books.
It is much easier to get information from websites.
There is a big amount of information on the internet that is
easier to locate than using several books
Information could also be incorrect.
It is possible to get millions of hits, which may make it difficult
to find the relevant information.
Page 62 of 168
• At least one other keyboard character.
Strong password Exp. (Syl2@#TT90kj=0 )
Week password Exp.( white, ahmed ,,,, )
Viruses:
• Computer virus is a piece of programming code/ software which can
install and replicate itself on the computer system without the user’s
permission which can cause:
Crash the computer ( become slower)
Can delete the files
Data files can be copied by hacker
Can stop the production
Antivirus software:
Antivirus software will check for virus attacks.
Encryption:
• Encryption is the process of
converting information into a
form that is meaningless to
anyone except holder of key.
Data is encrypted
If the data intercepted it then it prevents people from
understanding and reading the data
The person with the key is able to Decrypt and
understand the data
Page 63 of 168
Disadvantages:
Data can still be deleted from the system
Criminals can use encryption to keep incriminating
material secure
Page 64 of 168
Network communication (A physical fax-Electronic faxing and email)
Page 65 of 168
Network communication
Type of
Overview Hardware
communication
• Video conferencing uses
Video Conferencing both video and audio using
an internet connection
• It can be used for business
meeting when people are in
different locations
Advantages Disadvantages
• Much easier to access important • Technical problems with the
documents or bring “experts”. internet can affect the quality
• It is possible to hold conferences • Setup cost and purchase hardware
at short notice. • Lack of personnel contact
• Not travelling to meetings • Different time zone could difficult
reduces costs: to find suitable time
Reduced travelling costs. • Not possible to sign document
No need to pay for hotel
accommodation.
Reduces transportation.
When have delegates need
travel to unsafe places
around the world.
Page 66 of 168
Type of
Overview Hardware
communication
Audio conference can be done
Audio over the telephone network or
Conferencing using a computer making use of
VOIP
• The organizer of the phone
conference is given unique Pin which
can be shared participants to join
they have to dial the conference Telephone (VOIP) –
phone number then they would have Microphone – speakers
enter a PIN
Web Web conferencing can be done using
Conferencing internet connection
• Very similar to video conferencing
as the participants can see Video
and hear Audio
• Participants can join to the
conference by clicking on the link
provided by the organizer.
• Instant message available to
communicate with another Web Camera|Screen
• Business meetings participants |Speakers| Microphone
• Presentations. • Participants can be given
• Online education / permission to speak and can share
training contents
Page 67 of 168
5- The effects of using ICT
There are four main areas people losing their jobs:
1. Office work
2. Manufacturing
3. Shop work
4. Banking
Office Work:
Many of manual jobs no longer needed as example typing, filing
documents, and data entry because the computer changed the way of this
jobs
• Daily task carried out by (Administration department - Human
resources department – Payroll department)
• By introducing computer systems the work done by fewer staff in
short time
Page 68 of 168
Application software Effects
Can do formula to calculate automatically
payroll, salary calculation, wage slips,
number of hours worked
Spreadsheets Can do graph or charts
As example: teachers can monitor the
progress of their students (results / marks /
sort / chart ..)
This lead to reduction of staff
Manufacturing:
Many companies are using robots for production such as manufacturing of
cars, this change the way of people work, robot can do the following tasks:
Page 69 of 168
How this change the way of people work?
People lost their job to robots
Robots can work in dirty or dangerous environment
Robots can move heavy lifting
Working environment clean and safe
Workers have had to retrain to gain the following new skills:
o Maintenance of the robots
o Quality control
o Design and development
o Marketing
o Training other workers.
• Positive effect
Although ICT led to people losing their jobs, also led to create new big list
of jobs:
Network managers
Computer technicians
Website designers
Systems analysts
Programmers
Computer engineers
Delivery drivers
Page 70 of 168
The effects of ICT on working patterns:
Page 71 of 168
Microprocessor – controlled device in the home
Is a device that uses computer to control its functions, the devices fall
in main two categories:
This allow people to get on with other things while the device carries
out their tasks
Advantages Disadvantages
Reduces number of manual task at Can lead to unhealthy life styles
home because readymade meal
Give people time to do some Tend to make people lazy since they
activities (shopping – hobbies ) while are depend on devices
devices cooking foods or washing
clothes
Page 72 of 168
Smartphone can make control to People become less fit if the people
switch on/off oven / central heating just lie around at home while the
devices carry out the tasks
Automatic burglar alarms give people Losing household skills
sense of security
Smart fridges and freezer can lead to
healthy lifestyle
Advantages Disadvantages
Save energy since the device can Some people not familiar with this
switch off themselves technology , it will be difficult to use
It is easy to program the device by Leaving devises on stand-by like TV +
using QR codes instead of press receiver ) is very wasting of electricity
buttons manually
Some electronic devices can’t repair
specially circuit board ( just thrown
away )
Page 73 of 168
6- ICT Applications
Communication Applications
1- Paper Based : Flyers, Posters, Brochures and Newsletters
Page 74 of 168
2- Websites:
Companies uses websites
for advertising and
communicate the customers
Websites can easily updated
and can provide relevant
and up-to-date information
Websites can use for online shopping, research, social
networking, banking..
Advantages
• Video/ sound can be added
• Can hyperlink to another websites
• Can have navigation buttons
• Can have hit counter
• Seen by global audience
• Much easier to update
Disadvantages
• Websites can be hacked
• Risk of pharming
• You should have a computer and internet
• It's not portable like paper-based
• Website maintain is expensive
• Because its global, difficult to target the correct audience
3- Multimedia presentations:
Presentations that use animation, video and
sound or music are generally much more
interesting than a standard presentation
and can be displayed on the projector to
keep the audience see.
Page 75 of 168
Advantages:
• Video/ Sound/Music can be added
• Can add hyperlink to the presentation
• Can have transition effects
• Presentation can be interactive
Disadvantages:
• It needs special equipment/ expensive
• Equipment failure can be disaster
• Wherever presentation you need internet connection
4- Music scores:
Music now can created and edited on the
computer systems with the appropriate
software including mixing, creating music
slogan
5- Cartoons:
• Animation can be created by using
hardware and software specially 3D
animation software to promote new
product
• Objects are designed on a computer
Page 76 of 168
• 3D skeleton produced
• The parts of this skeleton are moved by animator using key frames
• This frames define start point and end point
• The difference in the appearance of the skeleton in this key frames
automatically calculated which known as (twinning – morphing)
and the final stage known as (rendering).
• Cartoons can be created by freehand drawing
6- Mobile phones:
Page 77 of 168
Advantages of using corporate letterheads produced by a printing website:
Measurement applications:
Measurement applications, using sensors and other electronic hardware.
Data convert from Analogue to Digital through (ADC) Analogue Digital
Converter
Page 78 of 168
Examples:
Weather stations
Scientific experiments
Measuring a patient’s vital signs on a hospital
Pollution monitoring
Burglar alarm systems
1- Weather station:
Weather station setup up automatically to gather information from the
environment, variety of sensor can measure:
Rainfall
Temperature
Wind speed
Wind direction
(Barometric) pressure ( air
pressure )
Humidity
Page 79 of 168
2- Measuring a patient's vital signs in a hospital
Sensors read key vital signs (such as
pulse rate, heart rate, temperature,
blood pressure, respiration, etc.)
The data from the sensors is
converted into digital using an ADC.
The data is stored in the
computer’s memory.
The computer compares the data
from the sensors with the values stored in its memory
The results are output on a screen in the form of graphs and/or
numerical readouts
An alarm is activated if any of the data is outside acceptable input
values
The system continues to measure the patient’s vital signs until the
computer is turned off.
Page 80 of 168
Advantages:
• The computer wouldn’t forget to take readings.
• The computer’s response time is much faster.
• Doctors, nurses, scientists etc. can get on with other tasks
while measurements are taken by computers
• Computers give 24-hour cover every day.
• More accurate reading
• Readings can be taken more frequently
• Safer since is being measured take readings or a nurse looking
after a patient
• Computers can produce graphs automatically
• Cost saving as fewer staff are needed
Disadvantages:
• The computer is unable to respond to unusual circumstances.
• Computer equipment and measuring software can be expensive
• The student will not learn as much using a computer system.
• Power cut
Page 81 of 168
Some control application includes:
• Automatic washing machines.
• Automatic ovens/cookers.
• Central heating systems.
• Chemical plants (Petrochemicals).
• Glasshouse environment control.
1- Automatic oven/cooker
• An automatic cooker/oven has
temperature sensors and a number of
controls to set the cooking time.
• The microprocessor checks the set time
against the current time and when they
are equal, the cooker/oven heating
elements are switched on.
• Once the cooker/ oven starts the cooking
process, the microprocessor then constancy
checks the end time against current time,
when they are equal, the cooking process is
stopped.
• The microprocessor checks the temperature data sent from a
sensor and turns the heating element on if the value less than
the pre-set value chosen by the user.
Page 82 of 168
2- Central heating systems
• A gas supply is used to heat water in a boiler.
• A valve on the gas supply is controlled by a microprocessor and
is opened if the heating levels need to be increased.
• A water pump is used to pump hot water around the central
heating system whenever the temperature drops below a
preset value
Page 83 of 168
pH is greater than 3.5, then a signal is sent to open a valve
and acid is added
pH is less than or equal to 3.5, then a signal is sent to close
this valve
The computer signals will be changed into analogue signals
using a DAC so that it can control the heaters
Page 84 of 168
5- Turtle graphics
Page 85 of 168
Page 86 of 168
Modeling applications
Spreadsheets :
• Business can use spreadsheets models to forecast
future profit or loss
• Due to use of formula business can adjust certain
values to see automatic change.
Flight simulator :
• Pilots able to learn how to fly a plan using simulator
• The interface and control are the same real plan
• Different conditions can be tested
• Reduced cost as plan will not be damaged
Building simulator:
• Before building are constructed, simulator take place
to make sure the building fit the requirements
• Simulations can ensure the building could cope with
earthquake or storm
Traffic Lights
• Traffic light simulator look at the flow of traffic ( data
captured from the sensor
• The simulator will adjust the best control for the
flow of traffic
Page 87 of 168
Manufacturing applications:
Robotics:
• Robots are used in many areas of
manufacturing like, paint spraying
of car bodies, welding bodywork
on cars, manufacturing of
microchips, manufacturing
electrical goods and automatic
warehouses.
• Robots include (built-in)
microprocessors or linked to a
computer system
Advantages:
Work in a bad environments
Work non-stop (24/7)
Less expensive
Don’t need holidays, etc.)
Greater consistency
NO boring, repetitive tasks
Disadvantages:
Difficult to do ‘unusual’ tasks.
Cause higher unemployment.
There is a real risk of certain skills being lost
Set-up and maintenance is expensive
Page 88 of 168
1- School registration systems:
The traditional way for student's attendance consume 10 minutes
from each session the beginning. There are number of possible ways
of automating the registration
Method 1 :
Issue each student with an ID card.
ID card contain a magnetic stripe
on the rear of the card.
The student would have to sign the
card and also write his unique
student ID on the back of the card.
The magnetic stripe would contain the name of the school
and other details, date of birth.
Each morning the student should swipe his ID card using
magnetic card reader.
The data now stored on a database.
On leaving the school he will swipe card again
Method 2 :
A second method could make
use of biometrics.
Each student would have their
fingerprint taken and store on a
database.
When the student enter the
school he would asked to put his
finger on a scanner to read his
fingerprint
Page 89 of 168
Advantages of finger print:
• Finger print are unique, impossible to sign in with another
fingerprint
• ID could be easily lost
• ID can be affected by magnetic field
• It is easier to make copy of ID card but you can’t with
fingerprint.
2- Student performance:
• Teacher are able to enter students data ( grades /reports /
applications / behavior) into the school management system
• This data stored in central storage which will be available for
any one from the staff
• The data can be analyzed and make a report.
Page 90 of 168
Booking systems:
Example uses :
Page 91 of 168
• The user selects their seat(s) by highlighting the actual seats on the
screen, display and then clicks CONFIRM to go to the next part of the
process.
• The database searched to check the availability of the selected seats
• If the seats are available, the total price is shown + the seat numbers
• If the customer is happy with this, they select CONFIRM on the
screen
Page 92 of 168
Banking Applications
The application of computers in the banking sector have enhanced
productivity regarding account management in this part we will
consider:
1. The use of automatic teller
machine ATM
2. Internet banking
3. Telephone banking
4. Chip and Pin technology
5. Clearing of cheques
6. Electronic fund transfer
Page 93 of 168
2- Internet Banking & Online shopping :
• Using internet banking requires good security. It allows the
transfer of sums of money between accounts, payment of bills,
ordering of statements, and so on.
• Online shopping and banking means that more and more people
are staying at home to buy goods and services
Page 94 of 168
High street shops and banks are closing because of the increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts
3- Telephone Banking:
• Similar to internet banking but the difference is using telephone
rather than computer
• The sequence of using Telephone banking is :
• The customer keys in their account number
• They are requested to enter four-digits PIN or selected
numbers from their PIN
• The customer will hear list of options which might be
include:
Page 95 of 168
1. Press (1) for your balance
2. Press (2) to carry out a money transfer
3. Press (3) to pay a bill
4. Press (4) to talk for one of our representatives
• The customer will choose an option
• As the same Online Banking the customers are able to:
1. Check balance
2. Pay bill or transfer money to another account
3. Talk to a bank representatives
Page 96 of 168
11. The same amount is added to the restaurant bank
account
12. A receipt is produced as proof of purchase
5- Clearing of cheques :
Expert systems:
Expert system is a computer software that attempts to act like a
human expert on a particular field.
Page 98 of 168
3. Inference engine - This acts rather like a search engine,
examining the knowledge base for information
that matches the user's query
Page 99 of 168
How to setup an expert system?
Data is gathered/collected from experts to create knowledge
base
The rules base is designed/create a based on the information
from the knowledge base.
A user interface screen is designed / created which would
provide the user with the ability to interact with the system
An explanation system is also developed
The inference engine is designed / created as link between the
user interface and the knowledge base
The system is tested.
Experts are interviewed about how the expert system effective
Computers in medicine:
1- Patient and pharmacy records:
• By keeping data of patient records in a database, correct
digenesis can be given according to patient's medical
history.
• Database allow to easy and quick search for patient records
• The data can be , patient ID , name , address, date of birth,
gender, medical history, blood group
2- Monitoring patients:
• By connecting patient to computer system, to carry out
24/7 monitoring the computer can monitor:
Heart rate
Respiration
Brain activity
Blood/body temperature
Blood pressure
Blood sugar levels
Oxygen levels in the blood
Prosthetics:
• 3D printer can print
prosthetics (false arms,
hands, and legs)
o Tissue engineering:
• Produce multilayered skin tissue, bone tissue,
heart/artery grafts and tracheal splints
Computers in libraries:
• Computers are used in libraries to keep
track on which books have been
borrowed by which members.
Database is used to store details of
book and members and usually
barcodes on the book
• Two files will exist which is ( Book file
and Borrowers' file)
• When borrowers take the book the
barcode first scanned then the book
details are found on the book file
• The system will calculate “due back” date
• The borrowers library card contains a unique barcode and will be
also scanned
• Book file linked with borrowers file and two files updated
• The date of due back is saved in the borrower’s file
3- Internet shopping:
Already described
Recognition systems:
Recognition systems are used directly to enter data into computer
system.
Recognition systems tend to be more accurate and quicker
method of entering data into a computer system compared to
manual system.
o STEP (4)
When the vehicle driver returns to the car park
they insert the ticket into a machine which
calculate charges
The payment registered on the database
The driver then drives to exit the barrier and
the ANPR again reads the number plate
If the number plate is recognized and payment
is done the barrier is raised
2- Cookies:
When a user visit a website cookie is created to store the user
browsing, described in chapter 8
3- key logging:
Software to monitor which keys has been pressed, hackers can
use this to obtain Password
Advantages:
Drivers doesn’t have to use maps.
GPS can re-rout to find quickest routes
The system can warn the driver about the location of
speed cameras
The system can estimate the time of arrival.
The system can also give useful
information such as location of petrol
stations
Disadvantages:
Loss of satellite signals can cause problems
Maps should be kept up to date, they can give incorrect
instructions if not up-to-date
If an incorrect start point or end point is keyed in the
system will give incorrect information
GIS uses:
Road network
Teachers can use GIS in
geography, science lessons
Biologist use GIS to protect
animals life and plants
Analysis
Collecting information about the current system and identify the problems
Design
Designing a new system to correct the problems identified in the analysis stage
Implementation
Replacing old system with the new system
Documentation
Writing technical and user documentation for the new system
Evaluation
Evaluate if the new system meets the requirements and client expectation
1- Analysis :
The basic step of analysis:
The first step in analysis stage is researching an existing system and there
are four common methods for fact finding:
2-Questionnaires
By distributing questionnaires to the workforce, clients or users to
write their view for the existing system
Advantages Disadvantages
• The questions can be answered • The number of returned
quit quickly questionnaires often low
• Inexpensive method • The questions not flexible
• Individuals can be anonymous if • Not immediate way
they want
• This method allow quick
analysis of data
Advantages Disadvantages
• Its open opportunity to • Time consuming
motivate interviewee to give • Expensive method ( by using
open and honest answer to the analyst time )
analyst • Interview can’t remain anonymous
• Open for more feed back
• Possible to modify question as
interview
Advantages Disadvantages
• Allow the analyst to collect • It can be time consuming process
information which can’t be • Costly method because the
collected by another method amount of time needed
• The analyst can see how the
paper system operate
Example of data about can manually completed for input later into the
computer system:
Form title
Tick box /
Save/ Close / Radio button
Navigation button
Before entry form created, the database should be created and the
following details should be considered:
Validation:
Is a process where data is checked to see if it satisfies certain criteria
when input into a computer
Validation technique:
Range check :
• Check weather data within given acceptable value
• Example : check person age >0 and <150
Look-up check :
• Check the data entered exists and stored in a table of data
• Example : check “ Training manager “ exists in the option”
Length check :
• Check the input data contains the required number of
character
Presence check :
• Check the data already present and not missed
• Example : in some forms telephone # required if not entered
the system give error message
Consistency check :
• Check if the fields correspond with each other
• Example : If Mr. typed in a field the gender should be Male (M)
Check digit :
• This is an extra digits added to the telephone number
• Example : if two number transposed during entry like ( 13597
instead of 13579
• Example : if number enter twice 13559 instead of 13579
• Example :if one number missing 1359 instead of 13579
File Structures:
Analyst should take the following into account :
• Field length
File structure
User interface
Testing strategies:
Software is often developed in modular form. This method allows
the software to be broken down into smaller parts called module
this means each part developed separately.
Once the development of each module is completed, the whole
system needs to be tested
Testing take place to ensure all components of system are working
correctly before the system is implemented.
Extreme:
Data at the limits of acceptability, for example, the extreme values
of month can be either 1 or 12
Abnormal:
Data outside the limits of acceptability, or the wrong type of data,
and should be rejected or cause an error message; values are not
allowed as example inputs for the month: -15 or -1 or any value
>12 or letters or non-integer 10.34 all abnormal
Live :
Data is entered into the new system and the results compared
with those produced from the existing system.
Advantages Disadvantages
• The benefits are immediate • May will be disaster if
• Cost are reduced because one system is new system failed
running
• Less possibility of a malfunction of the
system once new system tested
Parallel Parallel changeovers
Old system and new system
running side by side for a time Old
until new system take over System
New
System
Advantages Disadvantages
• If the new system fails the old • More expensive than direct,
system still running because extra staff needed
• Possible to train staff gradually • Time consuming since the
data entered into 2 systems
Advantages Disadvantages
• If the new system failed only one • It will take time to
part is affected implemented across all
• Possible to train staff one area departments
• The cost will be less than parallel
Advantages Disadvantages
• If a part fails, can go to failure • More expensive than direct
point ( failure is not disaster ) because each phase will
• Possible to ensure the system evaluate separately
working properly before • Time consuming because each
expanding part will be evaluated
4- Documentation :
Page 127 of 168
When the system is fully developed amount of documentation needed. To
introduce for (the end user – people who may need to develop the system in
the future, there are two types of documentation:
User Documentation and Technical Documentation
1- User documentation
To help the user to learn how to use the new system
How to load/install/run the software
How to save files / search/sort data
How to do print outs
How to add, delete or amend records
The purpose of the system/ program/ software package
Limitations of the system
Screen layouts / Print layouts
Hardware requirements
Software requirements
Sample runs (with results and actual test data used)
Error handling/meaning of errors
Troubleshooting guide/help lines/FAQs
How to log in/log out
Tutorials
Error messages/meaning of error messages
Glossary of terms.
2- Technical documentation:
To help the programmers / analysts to repair and maintains the system and
can consist of any of :
Program listing/coding
Programming language used
Program flowcharts/algorithms
5- Evaluation:
The final stage of the system life cycle is to evaluate the system which has been
implemented, the main purpose is to see if the new system resolved the issues
of the previous system and met the requirements in the design stage and the
following list is some of the main evaluation points considered when evaluating
the new system:
Compare the final solution with the original task requirements
Identify any limitations of the system
Identify any necessary improvements needs
Evaluate the user’s responses
Compare results from new system with old system
Compare performance of new system with old system
Interview users to gather responses about new system
Give out questionnaires to gather responses about the ease of use of the
new system.
The results from the evolution may due to two things happening:
Physical Security:
Health aspects:
Health and safety regulations advise that all computer systems have at least
moveable table and anti-glare screens, adjustable chairs and foot supports,
suitable lighting and uncluttered work stations, and recommend frequent
breaks and frequent eye tests.
Safety risks:
Health risk Ways to eliminating or minimizing
risk
(1) Electrocution • Use residual current breaker RCB
• Check insulation on wires regularly
• Don’t allow drinks near to computers
• Check equipment on regular basis
(2) Trilling wires • Use cable ducts to keep the wires save
• Cover wires under table
• Use wireless connection wherever
possible
E- Safety:
Refers to safety while using internet and devices (keep your data in safe
while using:
Mobile phone
Computer or tablet
Games console
Wireless technology.
You must be conscious when you are using social media networking
sites or chat room:
Block or report anybody who acts suspiciously or who uses
inappropriate language
Be very careful with the language used in chat rooms
Always use a nickname and never use your real name
Keep private and personal data secret
Don’t enter private chat rooms, stay public
Never arrange to meet anyone for the first time on your own
Always tell an adult first and meet the person in a public place
Avoid the misuse of images
Always use appropriate language
Always respect people’s
Security of data:
There are a number of security risks associated with any electronic device
as the following list:
Hacking
Phishing
Smishing
Vishing
Pharming
Spyware
Viruses
Spam
Moderated and unmoderated forums
Cookies
(2) Phishing:
What is phishing ? : a method of trying to gather personal
information using deceptive e-mails and websites by sending request
from bank or a note from someone in their company.
Effects of phishing:
The sender can gain personnel data such as credit card
number, this can lead to fraud or theft.
Method to avoid or remove:
Many ISP or web browsers filter phishing e-mail.
User always be cautious when opening email or attachment.
Don’t click on executable files attachment end with exe,
com, php, bat as example.
Phishing example:
Page 137 of 168
(3) Smishing ( SMS phishing ):
Page 138 of 168
What is Smishing? : Uses SMS system of mobile phones to send out
Fake text message which often including URL or telephone number
The user will be asked to log into the website or make telephone call
and supply personnel information like credit card number and
password (example : you won a prize or contact with your)
Effects of Smishing :
The effects are similar to Phishing and
Pharming where personnel details will
be obtained from users
4- Vishing:
What is Smishing? Short for voice mail phishing , uses voice mail
message to trick the user into calling the telephone number contained
in the message, The user will be asked to provide personnel data
5- Pharming:
What is pharming? Malicious code installed in the user computer to
direct the user to fake website
(7) Viruses:
What is the computer virus? : Program code or software which can
replicate or copy itself to do something like deleting or corrupt the
files or operating system
Effects of virus :
(8) Spam:
What is Spam? Often referred as junk mail, it will send to recipients
from mailing list
Effect of spam e-mail :
It can lead to Denial of services attack (DoS attack, by flooding
network with useless traffic which slow the network down.
Moderated forums:
Refers to online discussion forum in which all the posts are
checked by an administrator before posting
Moderator can prevent spam, filter out any posts are
inappropriate, rude or offensive
Unmoderated forums:
No one owns the internet
Not policed
(10) Cookies:
What is Cookies? Small files or code that are
stored on a user’s computer. Sent by web
server to user’s computer:
The data can be retrieved and
used to customize the web page
for each individual
Like if you buy a book online
cookies remember the type of the book
The data gathered by cookies from anonymous user
profile and does not contain personnel data like password
or bank card details
Record Protocol:
This part of the communication can be used with or without
encryption, it contains data
being transferred over the
internet.
Handshake Protocol :
It is a secure session
between user and website is established
Session cashing:
The use of session caching can avoid the need to utilize so
much computer time for each connection. TLS can either
establish a new session or attempt to resume an existing
session
Digital certificates:
• A digital certificate is a pair of files stored on a user’s
computer , each pair of files divided into:
Biometrics:
Biometric is a method of authentication, it relies on certain unique
characteristics of human beings and examples include:
1. Fingerprint scans
2. Signature recognition
3. Retina scans
4. Iris recognition
5. Face recognition
6. Voice recognition
Advantages:
Fingerprint for each person is unique and this technique will
improve the security since to be difficult to replicate person’s
fingerprint.
Other security devices such as (magnetic card) can be lost or
stolen
It's impossible to sign in by somebody else since the fingerprint
match one person only
Fingerprint can’t be misplaced; a person always has them.
Disadvantages:
Expensive to install and set up
If a person’s fingers are damaged through an injury, this can
have an effect on the scanning accuracy
Some people may regard it as an infringement of civil liberties
Retina scans
Retina scans use infrared light to scan the
unique pattern of blood vessels in the
retina
It is very secure because no way to
duplicate blood vessels patterns
It is illegal to:
Make a software copy and then sell it
Use software on a network or in multiple computers without a
license
Rent out a software package without permission
Use the name of copyrighted software without agreement
Examples:
Copying software, and then selling it without the permission – illegal
A student has changed the contents of a company website without
permission – immoral
Writing computer games that make fun of a country’s religion -
Cultural
Using pictures in a document without acknowledging copyright –
(immoral)
Passing information to a rival company – Unethical
The following is some laws and guidelines for the countries and companies
they required:
Copyright:
Copying or forwarding email is legal unless the sender indicate
clearly that the message is confidential
Recipient should check the email before copying or forwarding it
Some companies set out their rules for sending and receiving
email
Netiquette:
Email group :
Are contacts grouped together to send email to multiple
recipients
Intranets:
• Intranet is defined as a computer
network based on internet
technology but designed to meet
the internal needs for sharing
information within a single
organization
Advantages Disadvantages
• Files can be accessed from any • Files could be hacked
location though internet • Depend on quality of internet
• Users don’t have to carry storage connection due to fast or slow
devices around them download
• Offer backup solutions • Potential cost of cloud storage
• Unlimited storage capacity
http://www.MM .com/Esafety/ICTcourse .
Protocol://website address/Path/filename
The format is protocol://www.website address/path/filename,
website address :
1. domain host (WWW)
2. domain name ( name of website)
3. domain type (.com or .gov or .net or .org)
Search engines:
Search engines are useful if you don’t
know the URL
Search engines using variety of methods
to search
The more specific search you will get
accurate result
You can narrowing your search by typing
(+) between words (ICT+past+paper+2019)
You will find thousands of hits, then you can save it
Advantages:
Information on the internet is up-to-date
The internet limitless of information
Searching using a search engine is fast and easy.
People can look for information from home
Information on the internet is usually free of charge.
Pages on the internet can have multimedia elements , which
can make learning is interesting