Professional Documents
Culture Documents
Semires ICT Notes of Success
Semires ICT Notes of Success
CHOOSE A
TOPIC
School Management Systems
School management systems are software applications designed to manage various
aspects of educational institutions, such as student registration, attendance,
performance tracking, and online learning.
There are various ways school management systems are used in educational
institutions:
o Learner registration and attendance: Recording and tracking student
enrolment and daily attendance
Simplifies the registration process and ensures accurate record-
keeping
o Recording learner performance: Monitoring and analysing student
grades, test scores, and overall performance
Helps teachers identify areas for improvement and track progress
o Computer aided learning: Facilitating online learning resources and
activities for students
Enhances the learning experience and promotes self-paced learning
Worked Example
A school is setting up a new computerised system to manage many aspects of the
school administration.
a. Describe how this system can be used to manage student registration and
attendance.
[3]
3 of:
Student scans a card // teacher records the student as present on the computer
system [1]
The system records the time of arrival [1]
The system sends the data to the school administration database [1]
The data is searched in the database [1]
If a student arrives after a certain time the student’s attendance record is flagged as
late/absent [1]
Attendance/lateness records are automatically printed/sent to parents [1]
Letters/texts are automatically sent to parents to show the absenteeism/lateness of
students [1]
Parents can log in into the system to check student’s attendance/lateness records [1]
[2]
2 of:
Exam Tip
NEXT TOPIC
Advantages Disadvantages
Promotions and personalised offers Impersonal and less tailored customer service
[6]
6 of:
Display flights available [1]
The booking database is searched for the customer reference number [1]
A matching record is retrieved [1]
Details of the customer are displayed on the screen [1]
The booking database is searched for matching departure airports [1]
The booking database is searched for matching destination airports [1]
If the flight correct, the date/time found [1]
Search if seats/tickets/flights available [1]
If unavailable error message output [1]
Outputs the price [1]
If seats are available, flags seat as booked [1]
If not booked then the flag removed [1]
Reduces the number of seats/tickets available by the number booked [1]
E-ticket/ticket details are output [1]
E-ticket/ticket details sent to customer [1]
A receipt is printed//Verification email sent [1]
Advantages Disadvantages
Advantages Disadvantages
[4]
4 of:
The reader checks the amount to pay is less than the contactless limit [1]
The data is read from the chip using RFID / NFC [1]
The restaurant’s bank's computer contacts the customer’s bank's computer [1]
The card is checked if it is valid [1]
If valid the transaction continues [1]
If not valid the transaction is terminated [1]
An authorisation code is sent to the restaurant [1]
The price of the meal is deducted from the customer’s account [1]
Added to the restaurant’s account [1]
Exam Tip
Make sure you read the question to see if it's a contactless payment or involves
Chip & PIN and reference this in your answer
Don't forget that money isn't stored on the card, and that it provides a link to the
bank account it's linked to
Advantages
Disadvantages
Amount is scanned
Online Banking
Characteristics and uses of Internet banking:
o Online access to banking services via a secure website or app
o Allows for transfers, bill payments, account management, and more
Advantages Disadvantages
The Internet
The Internet refers to the global network of computers and other electronic
devices connected through a system of routers and servers
It is the infrastructure that allows us to send and receive information, including
email, instant messaging, and file transfers
It also provides access to other services such as online gaming, video streaming,
and cloud computing
The world wide web, or simply the Web, is a collection of websites and web
pages that are accessed using the internet
It was created in 1989 by Tim Berners-Lee, who envisioned it as a way to share
and access information on a global scale
The web consists of interconnected documents and multimedia files that are
stored on web servers around the world
Web pages are accessed using a web browser, which communicates with a web
server to retrieve and display the content
It is used for browsing web pages, sending emails, social networking, online
shopping, and much more
Advantages include ease of communication, access to information, and online
services
Disadvantages include privacy concerns, cybercrime, and misinformation
Blogs
A blog (short for weblog) is a website or part of a website that is updated
regularly with content, often written in an informal or conversational style like a
journal
They are usually presented in reverse chronological order
They are usually managed by individuals or small groups
They allow for reader comments, facilitating some level of discussion
Blogs often focus on specific topics, such as food, travel, fashion, technology, or
personal experiences
They can also serve as a platform for sharing opinions or insights
Forums
A forum is an online discussion site where people can hold conversations in the
form of posted messages
They are often organised around specific topics or interests, and divided into
categories known as threads
Unlike blogs, forums are primarily focused on peer-to-peer interaction
They may require users to create an account before posting
Forums can be moderated or unmoderated
Wikis
A wiki is a type of website that allows users to add, remove, or edit content
It is designed to facilitate collaboration and knowledge sharing from many
people
It holds information on many topics which can be searched
Posts are not in chronological order
The structure is determined by the content or its users
The most famous wiki is Wikipedia, an online encyclopaedia
Changes can be tracked and reverted if necessary, and the content is usually
written in a neutral style
Social Networking
o Social networking sites are platforms where users can connect with
others and share content
o They include platforms like Facebook, Twitter, Instagram, and LinkedIn
o Social networking platforms usually require users to create a profile and
allow them to share text, images, videos, and links
o They facilitate interaction, collaboration, and information sharing on a
large scale
o Privacy settings allow users to control who can see their content
Worked Example
Tick whether the following refer to moderated or un-moderated forums
[2]
Moderated Un-moderated
All posts are held in a queue.
Posts are not policed.
This forum reduces the chance of offensive messages.
This forum stops several postings on the same topic.
4 correct answers – 2 marks
2 or 3 correct answers – 1 mark
1 correct – 0 marks
Moderated Un-moderated
All posts are held in a queue. χ
Posts are not policed. χ
This forum reduces the chance of offensive messages. χ
This forum stops several postings on the same topic. χ
The Functionality of the Internet
Internet Service Providers (ISPs) provide services for accessing and using the
Internet
A Uniform Resource Locator (URL) is the address of a web page on the WWW
What is a URL?
The URL is a text-based address that identifies the location of a resource on the
internet
It is the address of a web page, image, video, or any other resource available on
the internet
Inappropriate and criminal material: The internet can expose users to harmful or
illegal content
Data restriction: Parental, educational, and ISP controls can limit access to certain
information or websites
Worked Example
HotHouse Design is a large design company. It has recently created a new web address
for its design portfolios. The web address is:
https://www.hothouse-design.co.uk/portfolios
a. Describe the following parts of the web address.
[4]
https://
1 of:
this shows the domain name that the company have purchased [1]
.uk
/portfolios
[2]
Word/phrase/image [1]
When clicking links to another document/page/website/top or bottom of the page [1]
Threats to Data
Threats
Worked Example
Data stored on a computer system is at risk of being hacked.
a. Explain what is meant by the term hacking. Include in your answer two examples of
the effects this can have on the computer system.
[3]
2 of:
Examples
b. Describe three measures that could be taken to protect the data from being hacked.
[3]
3 of:
Protection of Data
Biometrics
ADVANTAGES DISADVANTAGES
Digital certificate
Encryption
Firewall
A network security device that monitors and controls incoming and outgoing
network traffic
The purpose of a firewall is to create a barrier between an internal
network and external networks, filtering traffic based on predefined rules
It helps prevent unauthorised access, malware, and other network threats
ADVANTAGES DISADVANTAGES
ADVANTAGES DISADVANTAGES
Worked Example
The data stored on the computer system needs to be protected from unauthorised
access.
Discuss the effectiveness of different methods of increasing the security of this data.
[8]
8 of:
Using different passwords for parts of the computer system makes it more difficult to
gain access to the full system [1]
May be difficult to choose a unique password if it is changed every few weeks [1]
The firewall can affect the operation of the computer and stop some uploads [1]
The firewall may need to be shut down at times to upload files therefore making the
computer unsafe [1]