Professional Documents
Culture Documents
Ict Revision Notes
Ict Revision Notes
1. What is Hardware?
• Hardware is the physical components that make up a computer system. Part that can be
seen and touched e.g.,
• Keyboard
• Mouse
• Circuit Board
2. What is Software?
• It is a general term for the programs that control the computer system. Part that can be
seen but cannot touched. Eg
• Operating System
• Application Software
5. What is an OS?
• OS enables users to communicate with computer systems. The general tasks for OS
include :
1. Controlling the operation of input, output and backing storage devices.
2. Supervising the loading, running and storage application programs.
3. Dealing with the errors that occur in the application programs.
4. Maintain the security of the whole computer system.
6. What is an interface?
• Computer users need to be able to communicate with the Operating System. This is
called the user interface.
What are the various types?
There are two types of interfaces:-
CLI (Command Line Interface):-
• CLI require the user to type in instructions in order to perform operations. There
are number of commands that need to be typed in, for example, save, edit, and
create. The user therefore, has to learn a number of commands first to carry out
basic operations.
• The advantages of CLI is that user is in direct communication with the computer and
is not restricted to predetermined options.
GUI (Graphical User Interface):-
• It allows the user to interact with the computer using pictures (icon) or symbols
rather than having to type into number of commands. GUI use various technologies
and devices IO provide user interface.
• One of the most common keys windows, icons, menus and pointing device (WIMP)
which was developed for use on personal PCs. This uses a mouse to control a cursor
which then selects icons to open or run windows.
• Each windows contains an application and modern computer system allow several
windows o be open at the same
• In recent years, devices such as touch screen phones use post WIMP interaction
were fingers are in contact with the screen. This allows actions such as rotating
which would be difficult to do using a single pointing device such as a mouse.
•
7. What are the types of computers?
There are many types of computers:-
1. PC/Desktop
• It refers to a general purpose computer which is made of separate monitor, keyboard,
and mouse and processor unit. The term PC usually refers to computer systems
which IBM compatible are thus distinguishing them from Macintosh machines.
• Advantages
• Spare parts and connections tend to be standardised which usually results in low
cost.
• Desktops have better specifications (faster processors) for a given price.
• The casing allows good dissipation of any heat that might buildup.
• Disadvantages
• Desktops are not particularly portable since they are made up of separate
components.
• All the components need to be connected by wires which can be quite complex
and take more space.
• Because they are not portable, it is necessary to copy files when you do your
work elsewhere.
2. Laptop
• Laptop refers to the type of computer where the monitor, keyboard, mouse,
processor are all together in a single unit. This makes them extremely portable. The
key features are Low weight, low power consumption and Processor which does not
generate more heat.
• Advantages
• They are very portable.
• No trailing wires.
• Advantages of WI-FI.
• Since they are portable, they link into any multimedia system.
• Disadvantages
• They have limited batter life so user needs to carry a heavy adapter.
• Since they are portable, they are easy to break.
• Keyboard and pointing devices are awkward to use.
• Generates more heat than desktops.
3. Netbook
• It is a term used to describe a computer that can almost fit in the hand and is a
smaller version of a laptop.
• Advantages
• Netbook computers have many of the same features of a laptop and therefore
have similar advantages and disadvantages.
• They use a touch screen and often a stylus.
• Disadvantages
• They don’t have CD or DVD drives.
• The keyboards are almost 80% the size of laptops.
• They lack some of the features found in smaller machines due to size constraints and
the fact that they are cheaper to purchase.
4. PDA
• PDA is similar to a palm top computer except that it is smaller and that it has no
keyboard, using a touch screen for all data input. Since the screen is small, PDAs
have a small stylus (plastic stick) that is used to press the thing on the screen. Most
PDAs use a handwriting recognition system, to allow the user to write on the screen
and the writing converted into computer text. PDAs are often called pocket
PCs. PDA (Personal Digital Assistant)
UNIT 2: INPUT DEVICES
Electronic Keyboard
A primary input device that use the QWERTY layout which consist of
keys that represent alphabet (A-Z), numeric (0-9), special characters
(!,*./,etc) and function keys. Most common type of input device used.
Advantages
• All computers come with a keyboard
• They are ideal for most applications such as word-processing
• Able to check accuracy as text comes up onto the screen
Disadvantages
• It is a slow method when you need to write a long piece of writing when there are faster
ways such as scanning and dictation
• Can cause strain injury by typing too much
• It is quite hard for people who don't have touch-typing skills which could cause a lot of
problems such as accuracy and frustration
Mouse
• A mouse is a pointing device found on most of the personal computers
• Sensors on the bottom of the mouse detect the change in movement
• Data regarding this movement is sent to the computer, which
immediately responds by moving the cursor on the computer screen.
• Advantages of using a computer mouse:
• Enables rapid navigation through an application such as a web browser
• Requires a small area on the computer to use
• Disadvantages of using a computer mouse:
• Challenging to use if the user has limited wrist or finger movement
• Needs a flat surface and a mouse-pad to move and function
Touch Pad
• Touch pads are pointing devices found on most laptop computers
• It has an advantage over the use of mouse as touch pads are inbuilt into the laptop and
consume less space
• A touch pad functions when the user moves his/her finger across the pad
• This movement is detected and sent to the computer
• The computer responds by moving the cursor across the screen.
• Touch pads are commonly used as pointing devices in graphic user interfaces (GUI)
• Advantages of using touch pads:
• There is no extra device to buy and carry; touch pads are inbuilt into the computer
• Generally, touch pads are easier to use than a mouse
• Touch pads are also faster to navigate through applications
• They consume far less space and are compact.
• Disadvantages of using a touch pad:
• Challenging to use if the user has limited wrist or finger movement
• Controlling the pointer is challenging, as compared to using a computer mouse
• Touch pads are difficult to use for actions such as dragging, drawing and rotating
• Touch pads tend to be used in cramped conditions; this can lead to numerous
health issues.
Trackballs
• Trackballs aren’t moved like a mouse; instead, they have a large ball that the
user spins to navigate through the computer screens
• Trackballs are specially used by people with limited hand/wrist movement as
they are easier to use as compared to a computer mouse
• Some mobile phones also make use of trackballs for faster navigation.
• Advantages of using a trackball:
• Easier to use than a mouse, if the user has limited wrist/ finger
movement
• Trackballs allow faster navigation as compared to a computer mouse.
• Disadvantages of using a trackball:
• Trackballs cost more as they aren’t normally included with a computer and need
to be bought separately
• Time is required to get accustomed to use a trackball
Touch screen
• A touch screen is an effective alternative to a separate pointing device such as a computer
mouse
• With touch screen, the user selects items on the computer screen by pressing on the
surface
• This makes touch screen system interesting, interactive and easy to use
• Touch screens are often used at information terminals and public places such as libraries,
railway stations, ticket terminals, self-check in terminals at airports, etc.
• Advantages of using a touch screen:
• Easier to use
• Cannot be stolen
• Interactive
• Difficult tasks such as rotating the screen can be easily executed with touch
screen
• Disadvantages of using a touch screen:
• Touch screens are extremely expensive to purchase
• Touch screens can be damaged by scratches and rigid finger impressions
Graphic tablets
• Graphic tablets are pointing devices that are specially meant to be used by designers and
artists
• They allow natural hand movement to be input into graphic applications
• Graphic tablets use a stylus to be moved over the tablet’s surface
• Data regarding this movement is sent to the computer and is executed in graphic
applications
• There is a major advantage as the stylus supports hand drawn images and sketches to be
drawn.
• Advantages of using graphic tablets:
• Easy to create hand drawn sketches
• Extremely portable
• Promotes natural wrist movement
• Disadvantages of using graphic tablets:
• Graphic tablets are more expensive than other pointing devices
• They can easily get damaged if not handled with care.
Joystick
• Joysticks are popularly used for playing games
• The user needs to move the joystick in the required direction
• Information regarding this movement is sent to the computer, which immediately
executes the action by showing appropriate movement over the computer screen
• Modern mobile phones also have small joysticks to allow users to navigate rapidly across
the computer screen.
• Advantages of using joysticks:
• Extremely fast navigation
• Joysticks are sensitive to the slightest move; this enhances the user’s gaming
experience
• Joysticks are extremely handy; this again enhances user gaming experience.
• Disadvantages of using joysticks:
• Joysticks tend to be costlier than other pointing devices
Light pen
• Light pen is a device used as a pointing device or to write on a computer screen
• Light pens are rarely used as high quality touch screens and graphic tablets provide
similar and better functionality.
Video camera
• A device that captures moving images or video is called a video camera
• Like a digital camera, most video cameras do not directly input data into a computer
• The captured movies are stored on video tapes or memory cards and then transferred to a
computer
• Advantages of using a video camera:
• Can capture both- still and moving images
• Easy to transfer video to computer
• Can store many images or videos until it can be used for editing
• Disadvantages of using a video camera:
• Very difficult to produce good video without training on a video camera
• A video camera can be expensive to buy
• Editing a movie on a video camera is complicated
• Picture quality of the video is determined by the number of pixels and this may
be low unless an expensive video camera is purchased.
Web Camera
• This is a very basic video camera used to feed live videos into a computer
• The video data from a web camera is of low quality as compared to a video camera
• However, it is good enough for web chats on Skype, Messenger, etc.
• Usually a web camera is clipped onto the top of the computer screen; however, many
laptops now have web cameras built into the edge of the screen.
• It is mainly used to conduct simple video conferences
• Advantages of using web camera:
• We can see the reaction of people as they are talking using a web camera
• A web camera allows people to view traffic on the local roads
• Disadvantages of using web camera:
• Limited extra features to improve image quality
• The picture quality can be poor at lower resolutions
• Generally have a fixed position; hence cannot be moved around
Microphones
• A microphone is an input device that converts sound signals into digital signals that can
be input into a computer.
• The signal from a microphone is usually analogue; so before it can be processed by the
computer it must be converted into digital data.
• An ADC (Analogue Digital Converter) is used for this conversion (ADCs are usually
built into the computers sound card to do so)
• Advantages of using a microphone:
• Microphones can be used by disabled people to input data
• Microphones are very cheap to purchase
• It can be faster to speak instructions over a microphone, rather to type them
• Disadvantages of using a microphone:
• Background noises can cause problems while using voice recognition system with
a microphone
• Voice recognition is not completely accurate; hence mistakes may occur
• Sound files when stored, take up a lot of disc space
Barcode reader/scanner
• A barcode is a numeric code represented by a series of lines. These lines have different
thicknesses and can be read by a barcode reader/scanner
• The most common use of barcode reader is at a POS (Point Of
Sale) in a shop.
• The code for each item to be purchased needs to be entered into
the computer.
• Reading barcodes is much quicker and accurate than typing each
code using a keypad.
• Advantages of using a barcode reader/scanner:
• Scanning barcodes is faster than typing data manually and lesser mistakes are made.
• Barcode enables automatic stock control
• Barcode scanning is a tried and trusted technology
• Disadvantages of using a barcode reader/scanner:
• Barcode scanning is relatively expensive system to administer since every item in the shop
needs a barcode and every barcode needs to be entered in the central database.
• The system is not full proof as barcodes can be easily swapped around an item
RFID
• Radio Frequency Identification (RFID) readers use radio waves to read and capture
information stored on a tag. The tag can be read from a distance of several metres, which is
one of its major advantages over the barcode system. The RFID tag is made up of two
components.
• a microchip that stores and processes information
• an antenna that is used to receive and transmit data/information.
• The tags can be passive or battery powered. Passive tags use the reader’s radio wave energy
to relay the information, battery powered tags use a small embedded battery to power the
RFID.
• Uses
• Admission passes (e.g., in the theme parks RFID cards eliminate the need to scan or swipe
people before ‘rides’, reducing the waiting time; it also
allows the tracking of people in the theme park and
certain information, such as height or age, can be stored
to prevent entry to certain rides on safety grounds.
• Libraries (books can be tracked in and out automatically
by readers at the library entrance; there is no need to scan
barcodes or magnetic stripe cards, making the process quicker and more accurate).
• Livestock tracking (so that the whereabouts of each of the animals on a farm is known and
it also identifies which farm owns the animal).
• Retail (it is similar to barcodes but does not require any scanning; details, such as price,
can be stored on the tag and then automatically read at a checkout – a big advantage is that
several tags can be read at the same time, thus speeding up the checkout process).
• Advantages
• Bulk detection is possible (i.e., detect several RFID tags at the same time).
• It is very robust and reliable technology.
• Bidirectional data transfer (that is, it allows read and write operations to take place).
• No line of sight contact is necessary; the tags can be read from a distance.
• It has very fast read rate (typically < 100 milliseconds to respond).
• Disadvantages
• RFID is more expensive than a comparable barcode system.
• Because RFID uses radio waves, they are relatively easy to jam or interrupt.
• It is relatively easy to hack into the data/signal transmitted by the tag.
• Tag collision (this happens when signals from two or more tags overlap, interfering with
each other).
Usually the data stored on this strip is the same data that is shown
on the front of the card
For example:
The strip allows the data to be input into the computer system, faster and with more accuracy
than typing it in.
MSR is used to read data from the strip. This can be done by swiping the card through a slot on
the reader.
Advantages of using MSR:
• Data can be entered more quickly by swiping the card rather than typing in manually
• The magnetic strips are not affected by water; hence they are robust
• Usage of MSR avoids possible typing errors
Modern credit cards/debit cards don’t use a magnetic strip; instead they have a tiny memory chip
of computer memory embedded into them.
Data can be stored in this memory and can be read by using a chip
reader.
A card is inserted in the reader where metal contacts to the metal
pad on the front face of the card.
The reader can then assess the memory chip and the data stored on
it.
Smart cards can store much more data than a magnetic strip.
For example an identity smart card would not only store the
owner’s name and card number, but will also have a digital image of the person.
Pin pad
The chip reader is often used in conjunction with a pin pad.
A pin pad has a small numeric keypad, where the personal identification number (PIN) is entered
and the holder of the card can be verified as the true holder of the card.
Main use of chip reader and pin pad is to read card details when making purchases for goods or
services where the card holder is present to input the Personal Identification Number (PIN)
1. ID card
2. Phone card
3. Credit card
4. Debit card
5. Door security card
6. SIM card
a. Automatic greenhouses
Brightness b. Automatic doors
Light c. Burglar alarms systems
(Light/dark)
d. Street light systems
a. Automatic washing machine
b. Burglar alarms systems
Pressure Change in pressure c. Robotics
d. Environmental monitoring
a. Automatic greenhouses
b. Factories where detecting
Moisture/ moisture level is crucial
Wetness/dryness
Humidity (For e.g.: factories where soft
drinks are manufactured)
1. What is a Network?
• A Network is two or more computers or other electronic devices connected together so that
they can exchange data.
• Network allows computers to share files, resources.
• A computer that is not connected to a network is known as Stand-
alone computer. Network connections are created using cables (wires), radio signals or by
satellite links.
7. What is a LAN?
• Local Area Network or LAN is usually within one building or not over a large
geographical area. A LAN consists of a number of computers and devices, e.g., printers,
which will be connected to hubs or switches.
• Advantages
• The sharing of resources (such as expensive peripherals and application software).
• Communication between users.
• A network Administrator to control and monitor all aspects of networking.
• E.g., changing password, monitoring internet, etc.
• Disadvantages
• Easier spread of viruses through the whole network.
• The development of queues for printer, which can be frustrating.
• Slower access to networks, such as internet.
• Increased security risk as compared to stand alone computers.
• If the main server breaks down, in most cases, the network will no longer function.
8. What is a WLAN?
• Wireless Local Area Networks or WLANs are similar to LANs, but there are no wires or
cables.
• They provide wireless network communication over very short distances (a few metres)
usually radio or infra-red signals instead of cables.
• Devices known as access points are connected into the wired network, at fixed locations.
• Because of the limited range, most commercial WLANs need several access points, to
permit uninterrupted wireless communication.
• The access point receives and transmits data between the WLAN and the wired network
structure.
• Advantages
• All computers can access the same services and resources. E.g., printers, scanners,
internet access, etc.
• There is no cabling to individual computers and devices so safety is improved.
• The system is more flexible since, users can move their laptops from their desks.
• Adding new computers and devices is a very easy task and costs are reduced, since no
extra cabling is needed.
• Disadvantages
• Security is a big issue, since anyone with a WLAN enabled laptop or computer, can
access a network if it can pick up a signal.
• There may be problems of interference, which can affect the signal.
• Data transfer is slower than LAN.
LAN WAN
Uses cables, wireless, infra-red which are It uses wireless, satellite links, which
c. usually queued by the organisation. c. are globally organised.
d. We can restrict or block any websites. d. WAN has very fast speed.
12. Wi-Fi
• Wi-Fi___33 refers to any system, where it is possible to connect to a network or to single
computer through wireless communication.
• E.g., Laptop computers which are Wi-Fi enabled can connect to devices like printer,
keyboard, etc.
• Wife system rely on some form of ‘AP’ (Access Point), which uses radio frequency
technology to enable the device to receive and send signals.
• It is not a short form of wireless Fidelity.
• It is a trademark name for any product which is based on IEEE 802.11 standard.
• Wi-Fi hotspots are places where you can access Wi-Fi (free or paid).
• They exist in public places such as airports, hotels, internet cafes’, etc.
• It is possible to log on to free Wi-Fi unless they are protected by password.
• Software exists which can be loaded in a laptop which then searches for non-protected Wi-
Fi system.
• The practice of driving around in a car looking for these unsecured Wi-Fi hotspot is known
as war driving and possess a security risk.
Internet Intranet
The term internet comes from the The term intranet comes from the phrase ‘Internal
phrase ‘International Network’. restricted access network’.
It is difficult to block certain web Possible to block certain internet web sites using
sites from internet. intranet.
Can be accessed from anywhere An intranet requires password entry and can only be
provided user has an ISP account. accessed from agreed points.
Will not give full protection against An intranet is behind the firewall which gives
hackers and viruses. protection against hackers and viruses.
5. What is Hacking?
• Hacking is the act of gaining access to a computer system or network without legal
authorisation; although hackers do this as a form of intellectual challenge, many do it with
the sole intention of causing harm (for example, editing, deleting files, installing harmful
software, executing files in a user’s directory or even creating a fraud).
Easy to make new friends in a chat You do not actually meet people face to face. This is
room. known as Social Isolation
Easy to spread.
10. Write positive and negative effect of microprocessor for not having to leave home
Positive Negative
Elderly or disabled people can still carry out You do not actually meet people face to
day-to-day tasks such as shopping and paying face as much. This is known as Social
bills. Isolation
You can find entertainment even if you do not Not leaving the house is bad for you. For
go outside due to bad weather. example: Lack of exercise
15. What are the ways to check that information on website is correct?
• Use well known websites that you have heard. For example:
• BBC News
• Yahoo News
• Google News
• Use official websites
• Verify the information by checking it on different websites. If each one says the same
thing, you can be sure that it is correct.
• Try and stay away from sites where anyone can post the information like Ask.com,
Answer.com, Wikipedia.com, etc.
• Use websites that are updated regularly. Fake websites are not usually kept up-to-date as
much.
Validation
Check Description Example
Checks that data has If a user missed out required data (such as post
Presence been entered and not code), the system does not allow them to
check missed out. proceed.
Advantages
• They never forget to answer a question when determining the logic.
• They provide consistent results and are not affected by emotional reasoning.
• Expert systems reduce the time to solve a problem.
• The potential of saving money is high since the need of hiring specialists is reduced (e.g.,
when carrying out oil exploration).
• Allows parts of the world access to expertise which they normally may not be able to afford.
• They indicate the probability of the given solution being accurate or correct.
Disadvantages
• Needs considerable training of the operators to ensure that the system is used correctly.
• The initial setup costs are generally very high.
• They tend to lack common sense in some of the decision-making processes.
• Errors in the knowledge base can lead to incorrect decisions being made.
• Though lack of emotional reasoning is an advantage, it can also be a disadvantage in certain
areas like medical diagnosis.
Using an expert system
Taking oil prospecting as a case, the process for using an expert system would be as given below:
The microprocessor/computer will check whether the incoming data is outside the given
parameters and will take any necessary action. For example, a temperature sensor sends data to a
computer which will then check whether the temperature is greater than the preset or stored
value. If the temperature is greater than the preset value, the computer will send a signal to
switch off a heater. If the temperature is less than the preset value, the computer will send a
signal to switch on a heater. Thus, the microprocessor/computer takes some action which affects
the input value it receives. By doing this, the microprocessor/computer is controlling the
application.
The microprocessor checks the set time against the current time and when they are equal, the
cooker/oven heating elements are switched on. Once the cooker/over starts the cooking process,
the microprocessor then constantly checks the end time against the current time (the end time
may be a pre-set value entered by the user or it may be a value calculated by the microprocessor,
based on the cooking time entered); when they are equal, the cooking process is stopped.
The microprocessor checks the temperature data sent from a sensor and turns the heating element
on if the value is less than the preset value chosen by the user. If the temperature is greater than
or equal to the preset value, then the heating element is switched off by the microprocessor.
Once the cooking process is finished, the microprocessor sends a signal to a beeper to make a
beeping sound to indicate that the cooking cycle is completed.
The table below gives a list of possible sensors that might be used in various applications which
involve measurement of control.
Sensor type Possible applications
Proximity/distance these tend to be another name for sensors such as infra-red, motion, etc.,
Customer inserts card into the ATM Contact made with bank’s computer system
The customer accepts one of the options or Customer’s account is accessed to see if
types in a different amount sufficient is available
• they are often in places where theft can take place at night
• ‘bogus’ ATMs can be set up to gather information about the card and retain the card
• some banks charge customers for the use of ATMs
• ATMs can be tempored with to get hold of customer’s card information and PIN.
The following lines lists the advantages and disadvantages of online banking and online
shopping using the internet
As there is considerable overlap between the advantages and disadvantages of online banking
and online shopping, these are both considered together here.
With this system, the customer calls the bank using a telephone. The sequence of steps are as
follows:
• the customer keys in their account number
• they are then requested to enter a four-digit PIN or selected numbers from their PIN
• the customer will then hear various options, which might include:
• press ‘1’ to pay a bill
• press ‘2’ to carry out a money transfer
• press ‘3’ for your account balance
• press ‘4’ to talk to one of our representatives
• the customer chooses one of the options (either by pressing the correct key, or some systems
ask the customer to speak the number – this relies on voice recognition).
Just like internet balance, customers are able to:
However, compared to internet banking, it can be much slower (there may be a long queue
before you can talk to somebody) and the options can be a little more complex to navigate. But it
can also quicker if your computer isn’t switched on at the time and you only want a balance
enquiry.
This system provides enhanced security since it is better than relying only on a signature. When
paying for items using a chip and PIN card, a form of electronic funds transfer (EFT) takes place.
Let’s say a customer goes to a store to buy groceries using a chip and PIN card:
1. The PIN is entered using the keypad.
2. The card is checked to see if it is valid (check on expiry date, whether a stolen card is being
used, etc).
3. The PIN is read from the chip on the card and is compared to the one just keyed in.
4. If they match, the transaction can proceed. If this is the third attempt at entering PIN, then the
transaction is terminated.
5. The store’s bank contacts the customer’s bank.
6. A check is made on whether they have enough funds.
7. If the card is not valid or there aren’t enough funds available, then the transaction is
terminated.
8. If everything is found OK, then the transaction is authorised.
9. An authorisation code is sent to the store.
10. The price of the goods is then deducted from the customer’s account.
11. The same amount of money is then added to the store’s bank account.
12. A receipt is produced as proof of purchase.
5. Describe how Clearing of Cheques works
Here you will see how banks clear cheques using a centralised clearing centre.
Let’s say Sam has an account with Great Bank and he issues a cheque for $100 to a company
called ABC Ltd., who have account with Keith Bank. How is the ABC bank account credited
with $100?
Well, first of all, the cheque is sent by ABC Bank to a centralised clearing centre. The cheque is
processed by the clearing centre by first passing through a reader/sorter machine. The machine
automatically reads:
The data from the cheque which was read earlier is then converted into an encrypted file known
as IBDE (Inter-Bank Data Exchange) file. Every IBDE is ‘signed’ with a digital signature so that
the receiving bank is assured of the genuineness of the data and that it has not been tampered
with.
Later Keith Bank delivers the cheque to an exchange centre. The exchange centre then passes the
cheque back to the paying bank (Great Bank in this case) which then sends it to its own clearing
centre.
At the paying bank’s clearing centre, the digital signature is first checked and then the cheque is
passed through their own reader/sorter machine to make sure the data matches with that on the
IBDE file. It also sorts the cheques into branch order (using the sort code).
Later on, Great Bank checks where there is sufficient balance in Sam’s account to cover the
cheque amount, and also that it has been signed, dated and written correctly and is genuine.
Based on this information, Great Bank decides whether to pay Sam’s cheque to ABC Ltd., or
return it unpaid to the Keith Bank.
If Sam’s bank decides not to pay the cheque to ABC Ltd., his bank will send the unpaid cheque
back to the Keith Bank by special courier.
The decision to return a cheque unpaid must be made on the morning of the day after exchange
so that the cheque can be returned straightaway to Keith Bank if necessary. A cheque may be
returned unpaid for various reasons, commonly being:
• the customer has not got enough money in their account to pay the cheque
• it has not been signed, dated or written correctly
• it is fraudulent for some reason.
This whole process, which is known as ‘clearing a cheque’ takes three working days, so if you
pay in a cheque on a Wednesday, Thursday or Friday, it will actually take five days to clear.
One of the most common use of EFT is the payment of salaries to the staff of a large company.
On the day when the payment is made, the company instructs the bank to transfer money from
their account into the bank’s accounts of their employees.
Other examples of EFT include: When a credit/debit card is used to pay for a purchase in a store,
the payment is made using a system called Electronic Fund Transfer at the Point-of-Sale
(EFTPOS).
COMMUNICATION APPLICATIONS
1. Describe Communication Applications
• There are several communication applications that make use of ICT technology
• Flyers, posters, brochures and newsletters
• Flyers and posters are very easily created using some of the commonly available
softwares like Word Processing and Desktop publishing. Flyers and posters often
contain photos which may have been taken or downloaded from the internet. The
following outlines the steps that are generally followed to make a document on a
computer:
• open one of the softwares as mentioned above
• create frames, boxes and/or text boxes
• take photos, if necessary using a camera
• upload the images from the camera/CD/DVD or downloaded photos fromm the
internet
• save the photos to a file
• import or copy and paste the photos into the document
• edit the photos and import from a file or type any required text
• Brochures are generally used to advertise a company or its products. While these can
be prepared on a normal computer and printed on a laser printer, it is advisable to go to
a specialist company who use specialised computer and print the outputs on glossy
paper resulting in a better final product.
• Brochures and flyers are generally sent out to households in a given area so that the
target audience gets to know about the compay and/or products. Another option
generally used is to insert them inside magazines and newspapers. However, the
disadvantage of both these methods is that these documents might be thrown away
unless they actually catch the eye to the readers and offer something interesting or
tangible.
• Single sheet of documents are called as flyers or leaflets and booklets or multiple sheets
of documents are called are brochures.
• Posters are usually much larger and displayed on buildings, noticeboards or advertising
hoardings.
• Newsletters are produced by companies or clubs using the methods mentioned
above. They generally contain local information which is read by company employees
or club members. The content is specific to the organisation and may contain:
• advertisng by other companies
• fundraising events or their successes by employees or club members
• news events, like certain achievements by that organisation
• marraiges, deaths and births of employees or their family members, club members
• Websites
• With the advent of the internet, companies tend to advertise in the virtual world rather
than on paper through the development of their own website or advertise on another
company’s website.
• Using the first option would mean hiring web designers and developers or go to a
company specialised in doing this kind of work. Add to it there are costs involved for
purchasing the hardware and software to develop the website, storage of the website,
prevent the sight from being hacked by employing IT security experts. However, the
biggest advantage of a website is that the company gets world wide audience and there
is no need to keep spending on paper, delivery of the leaflets and flyers, etc.
• There are pros and cons to both these options and it is company which has to take a call
what suits best for them
• Advantages
• Sound/video/animation can be added
• can’t be defaced or discarded away
• can be seen by a global audience
• links to other websites/hyperlinks can be made
• buttons to navigate or move around the website which provides more information
• hit counters which provide how many people have visited the website with details of
cities, countries from where the hits have come
• use of hotspots
• It is very easy to update a website and immediately it is visible to the global
audience
• Disadvantages
• It becomes necessary for the customers to have a computer and internet connection.
• There is a risk of the websites being hacked and modified or viruses and trojans
introduced.
• There is a possibility for customers to go to undesirable websites (due to accident or
as a result of hacking) which can lead to distrust among customers
• As it is a global system, it is very difficult to target the right audience by advertising
on the website
• The website needs to be maintained once it is set up, which can prove to be
expensive
• Multimedia Presentations
• Any presentation that uses animation, video, sound or music are generally more
interesting than a standard presentation done on slides or paper.
• The presentations are produced using one of the many commercial software
applications available in the market and then using a multimedia projector the whole
audience is able to seee the presentation.
• Advantages
• The use of transition effects allows a presentation to display facts in a logical
manner.
• It is possible to make them interactive or hyperlinks built into the presentation,
which means that the presentation could access the company’s website or even key
files stored on the cloud.
• The presentation can be interactive.
• Use of sound and animation or video effects are more likely to grab the attention of
the audience. Moreover, this makes the presentation more easy to understand
• As links to websites and other external systems like is possible, the presentations can
be tailored to suit a particular audience.
• Disadvantages
• Whenever the presentation is given it is necessary to have internet access.
• One needs special equipment which can prove to be expensive for many companies.
• Equipment failure can prove to be disastrous when giving multimedia presentations.
• Often the presentation can turn out to be bad if it contains too many animation
effects and/or too much text or images.
• When using a multimedia presentation, there is a danger that the focus is on the
medium i.e. on the multimedia presentation itself rather than the facts or message
which you want to convey.
• Paper based presentations
• It is always possible to produce presentations in a hardcopy format rather than the
system just described.
• Advantages
• the recipients can read the presentation at any time as per their convenience
• the recipients always have a permanent copy which they can refer at their will
• disabled people don’t have to go to the venue to see the presentations
• moreover, it is possible to print it out in Braille for the benefit of blind people
• Disadvantages
• there are no special effects like sound, video, animation, etc
• there are printing costs for paper, ink, etc
• the presentation needs to be distributed through some method
• Music scores
• The generation of music and the production of the music scores can now be done by
computer systems with the appropriate software. Some of the features of this
technology includes but not limited to:
• electronic instruments like guitars and organs can be played back through electronic
effects machines
• music samplers and mixers allow the original tracks that were recorded earlier to be
modified in any way one wants
• synthesisers combine simple wave forms to produce complex music creations
• electronic organs can mimic any other instrument
• the music score can be generated from the music itself using software
• software can automatically correct music notes in a score
• there is no real need to understand music notation to write a music score
• music notes are automatically printed out in the correct format.
• Cartoons
• Animations can be created using computer software and hardware. With 3-D animation,
objects are designed on a computer and a 3-D skeleton or framework or basic structure
is produced. The parts of the skeleton are moved by the animator using key frames
(these frames define the starting point and ending point to give a smooth animation
effect). The difference in the appearance of the skeleton on these key frames is
automatically calculated by the software and is known as tweening or morphing. In the
final stage, using a technique called rendering, a realistic image is made.
• Cartoons can also be freehand drawings and then scanned or computer generated.
• Further, just like any form of communication, cartoons should not offend anybody and
at the same time, it is necessary to make sure that cartoons don’t become the main
feature so that the actual message is lost.
• Mobile Phones
• Mobile phones communicate by using towers inside many cells networked together to
cover large areas. The towers allow the transmission of data throughout the mobile
phone network.
• Each tower transmits within its own cell; if you are driving a car and get to the edge of
a cell, the mobile phone signal starts to weaken. This is recognised by the network and
the mobile phone then picks up the signal in one of the adjacent cells. If a person is
making a call or sending a text to somebody in a different country then satellite
technology is used to enable the communication to take place.
• Mobile phone technology can now be used by computers and tablets. A plug-in-device
(using one the available USB ports) or SIM (Subscriber Identity Module) card allows
the computer to connect to the mobile phone network. This then allows access to the
internet.
•Advantages
• The phone can be used to make phone calls from any locationn within the cellular
network.
• It is easier to keep in contact with co-workers at the office no matter where you are.
• There is no need to look for an operational public telephone in an emergency.
• It is possible to conduct business or personal phone calls on the move.
• As they allow text messaging:
• it is quicker and less expensive than making phone calls
• they employ predictive texting where the system completes a word from the first
few letters keyed in e.g. key in ‘compl’ and the phone completes the word as
‘complete’. This allows the system to remember frequently used words – together
they increase typing speed
• text messages can be sent at any time of the day or night even if the recipient’s
phone is switched off.
Mobile phones allow access to the internet on the move using either the cellular network or a
Wi-Fi ‘hot spot’.
• Internet Telephony
• The most common form of internet telephony i.e., having a telephone conversation via the
internet is Voice over Internet Protocol (VoIP).
• VoIP is a method to talk to people using the internet. The sound which is picked up the
computer microphone is converted into discrete digital packets in VoIP and sent to their
destination via the internet. The biggest advantages of VoIP is that it is either free (if both
parties use computers to converse) or charged at a local rate to any call in the world (when
VoIP is used to communicate with a mobile or land line instead of a computer). Ofcourse,
you will need a broadband connection to work in real time. The main problem is sound
quality in the form of echos and strange sounds. Security is also a concern with VoIP, just
as it is with other internet technologies.
• One of the big advantage of VoIP is using it can be used as a video chat using the built-in
webcam. While this may not be a very sophisticated way of video chat, it is much cheaper
as it uses the computer’s built-in microphones, speakers and webcams. However, if you
want to improve the video quality, use an expensive webcam, which connects to the
computer’s USB ports.
• Business cards and letterheads
• Many IT companies offer to produce business cards and letterheads to any design. The
user connects to an appropriate website and they will given a number of business card
templates. The user chooses a template and keys in data such as
• name of the company
• contact details
• image wanted on the business card
• The final version of the business card is then shown. The customer places their order and
the business cards are printed and delivered.
• Business cards are handed out to people as a form of personal advertisement. The use of
IT (in this case, a website) has made this a much easier task. Business cards are less likely
to be thrown away since they are seen as personal contact. It is also possible to include
additional information on the reverse of the card – this could be further advertising of the
company’s products or it could be advertising another company.
• Many of the advantages of having business cards are similar to the advantages of using
headed stationery.
• The same format used on the business cards can be adopted on a company letterhead. This
helps to project a corporate image. As with business cards, these pages can be printed on
high quality paper using a laser printer.
• Flyers and brochures can be produced using the same design/logo so it becomes clear to
the customer that all the communication has come from one company.
• There are various advantages to a company in using corporate letterheads produced by a
printing website:
• legal reasons (it helps if there are any legal actions taken – legitimate documents using
the company letterhead is regarded as proof of actual communication)
• can make the company appear larger than it is (this could give a degree of confidence to
potential customers)
• professionalism (gives a degree of credibility to the company)
• helps to make the company stand out (will tend to have more impact than white sheets
of paper with a typed company heading)
• brand/company awareness (advertises the company by using the same designs on all
products)
• advertising (the letterhead can contain many useful pieces of information to advertise
the company).
MODELLING APPLICATIONS
Describe Modelling Applications
A computer model is the creation of a model of a real system in order to study the behaviour of
the whole system. The model is computer generated and is based on mathematical
representations.
The idea behind developing the model is to try to find out what mechanisms control how a
system behaves. This makes it possible to predict the behaviour of the system in the future and
also see if it is possible to influence this future behaviour.
Computer models are used because they can help find a solution more quickly and can be
considerably safer while at the same time saving money and time.
• a count of the number of vehicles passing through the junction in all directions at all differing
times of the day
• the day of the week (weekends, bank holidays, public holidays, etc., can alter how the data
need to be interpreted)
• how long it takes a vehicle to clear the junction
• how long it takes the slowest vehicle to pass through the junction
• whether there are any pedestrian crossings, etc., nearby
• whether there are other factors which might affect the junction (e.g. left turns, right turns,
filtering, etc.).
How the computer model is carried out?
Data from the above list is entered into the computer database and the computer model is
run. Once the designers are satisfied that it simulates the real situation accurately (i.e., by
comparing results obtained with actual traffic flow from a number of data sets), then different
scenarios can be tried out. For example:
• increase the number of vehicles stopped at part of the junction and then change the timing of
the lights to see how the traffic flow is altered
• increase or decrease traffic flow in all directions
• consider how emergency vehicles affect traffic flow at different times of the day
• vary the timing of the lights and see how the traffic flow is affected.
How the system would work in real life?
1. Sensors in the road gather data and count the number of vehicles at the junction.
2. This data is sent to a control box or to a computer.
3. The gathered data is compared to data stored in the system (the stored data is based on model
predictions which were used to optimise the traffic flow).
4. The control box or computer ‘decides’ what action needs to be taken.
5. Signals are sent out to the traffic lights to change their timing if necessary.
Why are computer models done (in general terms)?
• With computer models it is much easier to try out various scenarios in advance.
• Time scales are reduced by doing a computer model rather than the real thing (some
applications would take before a result is known e.g. climate change calculations, population
growth, etc.).
• They are less expensive than having to build the real thing (e.g., a bridge!).
• On many occasions it is safer to run a computer model (some real situations are hazardous
e.g., chemical processes).
Other examples of computer models include: training pilots and drivers, running chemical and
nuclear plants, crash testing of cars, financial modelling, weather predictions, population growth
and modelling queues at checkouts.
MANUFACTURING APPLICATION
Describe the use of computers in Manufacturing
Manufacturing uses ICT (i.e., automation) in a number of areas to improve productivity, reduce
costs, improve consistency and to make factories safer and more environmentally friendly.
Robotics
Robots are used in many areas of manufacturing, from heavy work to delicate operations. For
example, welding bodywork on cars, manufacturing of microchips, paint spraying of car bodies,
automatic warehouses and manufacturing electrical goods.
1. The robot is programmed with a sequence of instructions which allow it to carry out the series
of tasks (e.g. spraying a car body with paint).
2. Alternatively, a human operator manually carries out the series of tasks; this can be done in
two ways. Here lets assume, an object is being painted using a robot arm.
a. The robot arm is guided by a worker when spraying the object; each movement of the arm is
stored as an instruction in the computer
OR
b. The worker straps sensors to his own arm and sprays the object; each movement is stored as a
set of instructions in a computer; the sensors send back information such as position relative to
the object; arm rotation and son on – this information forms part of the instructions stored in the
computer.
Whichever method is used, once the instructions have been saved, each series of tasks can then
be carried out by a robot arm automatically. Each instruction will be carried out identically
every time (e.g. assembling parts in a mobile phone) giving a consistent product.
Robots are often equipped with sensors so they can gather important information about their
surroundings and also preventing them from doing ‘stupid things’ e.g. stopping a robot spraying
a car if no car is present or stop the spraying operation if the supply of paint has run out, etc.
Robots are very good at repetitive tasks. However, if there are many different tasks (e.g. making
specialist glassware for some scientific work) then it is often better to still use human operators.
Advantages
• They can do boring, repetitive tasks leaving humans free to do other more skilled work (e.g.,
quality control or design work).
• They can work in environments harmful to human operators.
• Higher productivity (don’t need holidays, etc).
• They can work non-stop (24/7).
• Greater consistency (e.g., every car coming off a assembly line is identical).
• They are less expensive in the long term (although expensive to buy initially, they don’t need
wages).
Disadvantages
• The initial set up and maintenance of robots can be expensive.
• They find it difficult to do ‘unusual’ tasks (e.g. one-off glassware for a chemical company).
• They can cause higher unemployment (replacing skilled labour).
• Since robots do many of the tasks once done by humans, there is a real risk of certain skills
(such as welding) being lost.
• Because robots are independent of the skills base, factories can be moved anywhere in the
world (again causing unemployment).
Method 1
Issue each student with an ID card. This contains a magnetic stripe on the rear of the card. The
student name and the unique student ID is written on the back of the card. The student has to
sign the card. The magnetic stripe contains the name of the school, the name of the student, the
student’s date of birth and unique ID (registration) assigned to the student.
Each morning the student has to swipe the ID card through a magnetic card reader on arriving at
the school. The data read would identify the student and the time and date the student entered
the school’s premises. This data would now be stored in a database. On leaving the school, the
ID card has to swiped again. This would now record the leaving time and date in the
database. This would give a very comprehensive record of when the student attended the school
and the number of hours the student attended. It would also be more secure method in the event
of, say, a fire. The school would now be able to account for every student currently showing as
being present on the school premises. Using the paper based system, a student could register
then just go home – with this ID card system, the student’s attendance would be known at all
times.
There are further subtleties that could be used such as (1) use of a PIN to stop another student
swiping in with the wrong card (2) use of GPS tracking so that the exact whereabouts of a
student would be known. This would require the addition of a chip on the ID card so that the
tracking system could identify them. At the end of a term (or school year), the database could be
interrogated and it would give an accurate attendance record for the student.
Method 2
A second method could make use of biometrics. Each student would have their fingerprints
taken. Their personal details like date of birth would be stored in a database. When a student
enters the school premises, he/she would be asked to put his/her hand on a scanner which would
read his/her fingerprints. Since each student would have unique fingerprints, this system would
be very secure.
The date and time of entering or leaving the school would also be accurately recorded in the
database.
Advantages
• It is much easier to ‘clone’ (i.e., to make copies) of ID cards than it would be copy
fingerprints (not impossible but very difficult).
• Fingerprints are unique, so it would be impossible for a student to sign in pretending to be
someone else (with magnetic cards, a student could give his card to a friend and ask him/her
to sign in for him/her) – this gives more accurate data and improved security.
• ID cards could be easily lost – fingerprints are ‘part of you’ so can’t be lost.
• ID cards could be affected by magnetic fields (e.g., by being placed close to a mobile phone)
which would stop them from working.
Disadvantages
• It would take a long time to collect the initial fingerprints for every student in the school.
• There are ‘invasion of privacy’ issues and some parents may object to having the fingerprints
of their children stored in a database.
• If a student cuts a finger, the fingerprint may not be identified by the system (which would
prevent entry to the school).
• The equipment needed to take and read fingerprints is more expensive than magnetic stripes
reading equipment.
• graphs and charts can be produced to show how the students compare to each other
• graphs and charts can also be used to show student progress over a given time period, use of
‘rolling averages’ or trend lines can be used to monitor changes in performance.
• it is also possible to use ‘conditional formatting’ to show which students are performing badly
(e.g. by highlighting the results in red) or well (e.g., by highlighting results in green)
• using functions, such as sorting or averages, allows the teacher to quickly see which students
are doing particularly well and how they compare against the class average
• it also allows the teacher to easily see how they are performing against each other students in
the same subjects
• it is also very easy to import data into a report, e.g., summarising a student’s performance
over the academic year.
3. Explain the use of Computers and softwares for preparing Exam timetables, subject
timetables and teacher substitution
Timetables are often required for the following:
Timetable for: Tom Alter 112 678 234 Summer term 2016
The main advantages of using software to create timetables is that it is quicker and less prone to
errors than the older paper based systems. It is also easier to try ‘what if’ scenarios to ensure the
most efficient use of time.
Likewise, timetables can be produced to cover classes when teachers are absent. This is often
done using the main timetable software since each teacher is allocated a class or non-contact
time for each of the teaching periods. In the above example, a teacher would have either a class
or a ‘free period’ for each 1.5 hour session. The main subject speciality of each teacher is also
stored so that a subject specialist can be used to cover for absent teachers.
COMPUTERS IN MEDICINE
1. Describe the use of computers in maintaining Patient and Pharmacy Records?
Hospitals and doctors need to keep accurate records of all their patients. This is essential to
ensure correct diagnosis and treatment. An up-to-date medical history is part of the diagnosis
process. Databases are kept by hospitals and doctors so that the data can be shared between
medical practitioners and pharmacies (e.g. to ensure no drugs are prescribed which interact with
each other in an unsafe manner).
Databases also allow for a quick and easy search of patient records. This is especially important
during an emergency. E.g, When accessing the patient’s medical history could mean the
difference between life and death. It also means that medication can be prescribed without
issuing paper prescriptions – an email could be sent to the pharmacy.
The sort of data which would be required on a patient database would be as follows:
Digital read-outs give the nurse or doctor an immediate value while graphical representations are
used to show trends over a period of time. Both methods supply different information and hence
serve different purposes. There is also sound outputs as well in the form of beeps to indicate that
the machine is working. It also indicates, for example, the heart rate and gives a warning if the
patient’s condition suddenly deteriorates. All these outputs give the doctors and nurses useful
information.
The system relies on sensors attached to patients and to a computer system that interprets the
sensor data and converts it into a format useful to the nurses and doctors. Using sensors and
computers has many advantages over taking manual readings:
• they are capable of responding much faster to any change in the patient’s condition
• they reduce the risk of a nurse being subjected to contagious diseases
• it is more accurate; using a computer system almost removes any chance of error
• they can automatically produce graphs/analyse results
• computers can monitor several patients at the same time
• readings can be taken more frequently using computer systems
• there is the potential to save money since fewer nurses need to be paid
• they never forget to take readings – a nurse could be too busy for example
• they can operate 24/7 and don’t require any breaks or get tired.
• The interface engine compares the symptoms entered in the input screen with those in the
knowledge base looking for matches.
• The rules base is used in the matching process.
• Once a match is found, the system suggests the probability of the patient’s illness being
identified accurately/
• The expert system also suggests possible solutions and remedies to cure the patient or
recommendations on what to do next.
• The explanation system will give reasons for its diagnosis so that the user can determine the
validity of the diagnosis or suggested treatment.
• MRI (Magnetic Resonance Imaging) – this uses strong magnetic fields and radio waves to
produce a series of images of the internal organs in the body.
A 3-D printer can then reproduce a solid object showing the exact internal organs of the
patient. The doctor or surgeon can then show the patient exactly what is wrong and then show
them what procedures are required. They also help the surgeons in planning surgical procedures
since they can see exactly what is required well in advance of the operation.
3-D printing systems enable blood vessels, major arteries, tumours and so on to be part of the
diagnostic, pre-surgical aids. This also allows for patient engagement which would be missing
from the more traditional consultation methods.
Some 3-D printers produce hard nylon objects which are used in certain pre-surgical planning. If
a patient has suffered, say, a bone fracture, then the surgeon can physically test and position
screws and plates in the ‘3-D bone nylon image’ prior to the surgery. This reduces the chance of
any errors when the actual procedure is carried out.
Prosthetics
3-D printers are now being used to print out prosthetics i.e. artificial arms, hands and
legs. Whilst state-of-the-art myoelectric prosthetics cost ten of thousands of dollars, the price of
a 3-D printed prosthetic arm or hand can be as low as $100.
Much research in this regard still needs to be done. However, the results to date are very
encouraging with many more people from poorer countries now having a chance to replace
missing limbs at a fraction of the cost compared to existing methods.
Tissue Engineering
Recent advances have allowed the 3-D printing of bio-compatible materials, cells and supporting
structures. This has improved the viability of the function of cells within a 3-D printed
object. 3-D bio-printing is a very complex process and requires the input from biologists,
medical engineers, physicists and other engineers. It has already been used successfully to
produce multilayered skin tissue, bone tissue, heart/artery grafts and tracheal splints.
The procedure involves making biological materials by diffusing cells into a bio-compatible
scaffold. The bio-printed tissue is then put into an incubator and the cell structure held within
the scaffold grows to form actual cellular tissue.
There is still much research to do, but the goal of growing replacement organs, using cells from
the actual patient, is getting ever closer thanks to 3-D printing technology.
Book file (this contains a number of records made up of the following fields):
Book Name of Date Unique book Borrower’s
Barcode title Author published identifier ID
Borrower’s file (this file contains a number of records made up of the following fields):
Borrower’s Borrower’s Borrrower’s Barode of book Unique book Date due
ID Name details borrowed identifier back
b. Thus, when a borrower takes out a book, the barcode is first of all scanned.
• The book file is linked to the borrower’s file and both files are updated to indicate which book
has been borrowed and when it is due back.
• The date the book is due back is saved in the borrower’s file. The system therefore knows
when to send out a reminder to the borrower of the book if the return date of the book is
exceeded.
d. On a daily basis, the borrower’s file is interrogated by the computer to see which books are
overdue for return. The sequence of events is summarised below:
• administration systems
• passport/ID cards
• automatic stock control system
• library book system
• equipment checking systems (safety records on maintenance of equipment)
• some burglar alarm systems.
The following lines details out the steps as to how barcodes are used to automatically control
stock levels in a supermarket:
• It may be necessary to track somebody taking part in a marathon to determine their position
and their time to complete the race.
• The person may be an offender who is released from prison on the understanding that their
whereabouts is known at all times.
• An elderly person may need to be tracked to ensure their safety.
Another application may be to track a patient’s health.
An ankle monitor makes use of RFID technology by inserting a microchip into the device which
is strapped to the ankle.
It sends out (at timed intervals) radio frequency signals. These signals contain the person’s
location and other data. They are tamper proof devices and automatically alert the authorities if
an attempt is made to remove the monitor from the ankle.
The monitor sends out RF signals which are picked up by a device in the person’s home. This
unit uses either landline or mobile phone networks to relay the information back to a computer in
a control room. GPS monitoring is also used to track people outside their home through a mobile
phone, which the person must carry with them at all times. This allows to know the exact
location of the person at all times. CCTV cameras are also used to monitor people in streets and
shopping malls in case of crime or any suspect activity.
Spyware gives the originator access to all the data entered using a keyboard on the user’s
computer. The software is able to install other spyware, read cookie data and also change a
user’s default browser.
To overcome this problem, use anti-spyware softwares to reduce the risk. Banks often use drop-
down menus where the user enters certain characters from the password using a mouse or touch
screen. The required characters are also changed every time the user logs into their account to
stop hackers getting the full password.
The user should always be alert and check for clues that their keyboard activity is being
monitored.
When entering a password, e.g., using a pointing device (or touch screen) to select characters
from a drop-down menu can reduce the risk.
1. monitor: this allows the manager/supervisor to listen in on calls (the line is muted so that
neither the employee or the other person being called is aware of their presence)
2. whisper: this allows the manager to speak to employees to help them with a call (only the
employee can hear the manager/supervisor’s voice)
3. barge: this allows the manager/supervisor to be heard by both the employee and the other
person in the call).
SATELLITE SYSTEM
1. Describe Global Positioning Satellite (GPS) systems and satellite navigation
Global Positioning Satellite (GPS) systems are used to determine the exact location of a number
of modes of transport (e.g., airplanes, cars, ships, etc). Cars usually refer to GPS as satellite
navigation systems (i.e. satnav).
Satellites surrounding the Earth transmit signals to the surface. Computers installed in the mode
of transport receive and interpret these signals. Knowing their position on Earth depends on very
accurate timing (atomic clocks are used in the satellites which are accurate within a fraction of a
second per day). Each satellite transmits data indicating its position and time. The computer on
board the mode of transport calculates its exact position based on the information from at least
three satellites.
In cars, the onboard computer generally contains stored road maps. With these satnav systems,
the car’s exact location, based on satellite positioning, can be shown on the map and the driver
can also be given verbal instructions such as ‘After 200 metres, take the next right turn onto
BCD124’. A screen on the satnav device also shows the car’s position in relation to the road
network.
Advantages
• It removes errors (can warn drivers about one way streets, street closures, etc).
• The system can also give useful information such as location of restaurants, petrol stations,
service areas.
• The driver need not consult paper maps, so it is far safer.
• The system is able to estimate the time of arrival.
• It is also possible to program in the fastest route, route to avoid towns, etc.
• The system can warn the driver about the location of speed cameras (again aiding safety).
Disadvantages
• If incorrect starting point or ending point is keyed in the system, it will give incorrect
information.
• If the maps are not kept up to date, they can give incorrect instructions.
• Loss of satellite signals can cause problems.
• Unless the system is sophisticated, road closures, due to accidents or road works, can cause
problems
Uses
• Teachers can use GIS in their geography, engineering or science classes.
• Environmentalists and Biologists use GIS to protect animal and plant life in vulnerable areas
(which meet a certain criteria after carrying out a search on the database).
• Emergency services use GIS to send the closest emergency personnel to a location.
Satellites contain antennas, transponders (to allow receiving and sending of data), solar panels
(for power from the Sun) and propulsion (to ensure the satellite is in the correct orbit at all times).
Signals are converted to analogue (if necessary) and then beamed to the satellite from a satellite
dish on Earth. The signals are delivered by carrier waves which consists of radio waves. Each
signal has its own frequency and bandwidth (the larger the bandwidth the more data can be
transmitted).
Once the data reaches the satellite, it is then resent to Earth. The satellite usually ‘boosts’ the
signal before sending it back to Earth. Often the frequency is changed to prevent the signal
received being confused with the signal sent.
The satellite system is used to transmit data from one part of the planet to another. Due to the
often great distances, cables would be too costly and there is also the problem of signal
deterioration over long distances. Satellite systems are used to transmit telephone,internet and
television data around the world.
CLOUD COMPUTING
1. What is Cloud Computing?
• Cloud computing is where users store their documents, programs and data on the Internet
rather than on their own computers. As long as the user has access to an Internet
connection, they can create, edit and share ICT files from almost any location. Because
the data and programs are stored remotely, on the Internet, the user will save space on their
computer’s storage drives.
5. What are the Advantages and Disadvantages of E-books and Online newspapers?
• Advantages
• Storage benefits:- Thousands of digital books can be stored on one computing device
or e-book reader. The same number of printed paper books would require a very large
room in which to store them.
• Paperless:- Digital books do not need to be printed onto paper. This is much more
environmentally friendly.
• Instant access to your book or newspaper:- E-books/newspapers can be downloaded
from the Internet almost instantly. If you want access to a printed book, you need to
travel to the store to buy it or order online and then wait a few days for delivery.
• Cheaper to buy:- E-books/newspapers generally cost less than printed publications.
• Disadvantages
• Health and Safety:- Computer screens (and some e-book readers) can reflect light which
causes glare. This can cause headaches and eye strain. Printed pages do not have this
problem.
• Piracy:- E-books are digital and so are very easy to copy and share.
• Usability:- E-books are hard to search through to find specific pages. The pages of printed
books can be flipped through quickly to find the page you want.
• High initial cost:- Before you can read a digital e-book or newspaper you need either a
computer or an e-book reader. These are not cheap.
Microsoft Excel
This section will make your ICT practicals in Microsoft Excel a bit easy!
count (for
nos.) =count(startvalue:endvalue) =Count(A1:G1)
count (for
text) =countA(startvalue:endvalue) =CountA(A1:G1)
IF =IF(value1,value2,criteria) =IF(D2>50,”A”,”B”)
=IF(criteria,value1, =IF(D2>80,”A”,
IF(criteria,value2, IF(D2>70,”B”,
nestedIF IF(criteria,value3,value4))) IF(D2>60,”C”,”D”)))
3. Page setup
• Orientation – Portrait, Landscape
• Margins – Top, Bottom, Left and Right
• Papersize – A4
• Insert row, Insert column, delete row, delete column
• Printouts – 1) For specific range
• e.g. A1 to D15
• Select range A1 to D15
• Click on File, click print active sheet
• select print, select print selection