Professional Documents
Culture Documents
9626 03 Noteform
9626 03 Noteform
- It does not involve physical currency like coins and bank notes.
- digital currency
- virtual currency
- cryptocurrency
Digital Currency
- Digital currency = payment method similar to coins/bank notes, but exchanged digitally
- Stored value card: set amount of currency stored, can be closed-loop or open-loop
- Mobile phones/smart watches: app acts as digital credit card, touch to payment machine, app provides data to
access bank account
- Digital currency can be used in different countries without exchanging physical currency.
- Risk of someone using a lost card or device for contactless payments before the user cancels it.
Virtual currency
- Unlike digital currencies that are centralized, virtual currency does not have a central body managing or regulating
its use.
- Virtual currency only exists within a virtual environment and does not have a physical representation like
banknotes or coins.
- An example of virtual currency is tokens that can be collected or bought within a computer game to buy different
items within the game.
- Virtual currencies are usually specific to the game or application for which they were created and cannot normally
be traded anywhere else.
- Advantages: virtual currency can personalize a game or application and make it more engaging.
- Disadvantages: virtual currency is part of a decentralized system, which means that it has little regulation, and it is
usually specific to the context for which it was created and cannot be spent elsewhere.
Cryptocurrencies
- Cryptocurrencies like Bitcoin and Litecoin are tracked using systems such as blockchain, and are a type of peer-to-
peer electronic monetary system.
- The value of cryptocurrencies can fluctuate greatly, and they are used by many people to buy and sell products
over the internet.
- Some people support the use of a decentralised currency, as it allows for cheaper and more efficient payments
without the usual charges applied by banks.
- Others have a more controversial stance, as they believe cryptocurrencies allow for a level of anonymity in
payments that can enable criminal activity.
- The growth of cryptocurrencies has been seen as a threat to traditional banks, leading some banks to consider
creating their own cryptocurrency.
Advantages:
- Cryptocurrency transactions usually do not have the usual charges that apply to bank transactions.
- People can invest in cryptocurrencies like Bitcoin and potentially make money if they sell it for a higher rate.
- It is difficult to create counterfeit currency for a cryptocurrency due to the high level of security involved.
Disadvantages:
- The anonymity provided by the decentralised system may encourage criminal activity and make it difficult to trace.
- There have been instances of businesses being hacked and cryptocurrency being stolen, with no bank to help
resolve the theft.
- CBDC will have a serial number and distinguishable characteristics to prevent counterfeit
- CBDC will work alongside existing currency such as physical bank notes and coins
Advantages:
- Potential decrease in criminal acts such as money laundering and tax evasion.
- Savings in costs of physical currency production that could be invested in CBDC security.
Disadvantages:
- Loss of privacy and anonymity for those who prefer physical currency as no record of details is attached to
payments made with cash.
- Objectives setting
Stage 5: Evaluation
- Results evaluation
Stage 6: Deployment
- Stakeholders' decision-making
Uses
- Governments use data mining to aid national security, predicting future activity to reduce risks.
- Data mining is used in surveillance to predict issues like criminal activity, but it's controversial due to privacy
concerns.
- Corporate surveillance involves mining data for marketing purposes or data profiling.
Business:
- Data mining is used to predict customer spending habits, product trends, and even in hiring staff to gain a
competitive advantage.
- Customer relationship management (CRM) aims to improve customer loyalty, and data mining can predict
customer needs.
Research:
- Data mining is the underpinning tool in research, helping to revolutionize industries like medicine and space
exploration.
Health care:
- Data mining is used to improve health care, identify successful practices, and reduce costs.
- Data mining predicts future social and economic trends, helping institutions and companies make important
decisions.
- Data mining raises ethical and privacy concerns, such as targeted advertising and sharing of personal data between
companies.
Advantages:
- Helps organizations make strategic decisions to maintain/increase revenue.
- Helps businesses save costs by streamlining processes and avoiding unwanted investments.
Disadvantages:
- Outcomes are only predictions based on past data, and may not be accurate.
- Social networking has become an inherent part of many people's lives for entertainment, communication, and
news.
- People share information about their daily lives, including their thoughts, feelings, beliefs, and activities.
- Various types of social networking include chat rooms, instant messaging, forums, email, blogs, and microblogs.
- Social media is typically accessed through a website or an app on a personal computer or mobile device.
Chat rooms
- A chat room is an online service that allows multiple users to communicate and discuss a chosen topic or issue.
- Users are given a username and password to enter the chat room, where they can type messages into a text input
box.
- Chat rooms are mainly used by individuals, but they could be used by businesses and organisations as a type of
marketing tool to gain feedback.
- Businesses can set up chat rooms to discuss products or services and prompt discussion by asking questions or
making comments.
Instant messaging
- Instant messaging is an earlier form of social networking that allows two or more users to send messages to each
other in real-time.
- Several social media platforms, including Facebook, Instagram, and Skype, have instant messaging services built
into them.
- Instant messaging services have reporting functions, which allow users to see when the other person has read their
message or is currently replying.
- Users can also send other media types such as sound files, images, video files, and emojis.
Forums
- Forums are online platforms for posting thoughts, ideas, and questions with replies from other users.
- They differ from chat facilities by allowing delayed replies and the ability to search for previous answers.
- Moderators monitor the forums to enforce rules and block inappropriate users.
- Users must register to post or reply to comments, but can read the forum without registering.
- Posts are structured as threads and are usually centred on a particular topic.
- Businesses and individuals use forums for support and advice on various topics.
- Email is an electronic message sent to one or more recipients using their unique email address.
- Businesses and organizations use email extensively for communication within the company and with customers.
- Individuals also use email to contact family, friends, and organizations, for messages they feel are too long for
instant messaging, and for making complaints.
Blogs
- They can be used by businesses, organizations, and schools to provide information to customers, parents, and
students.
- Microblogs are used by police and law enforcement to provide regular updates on local or national issues.
- Has a negative impact on individuals by creating a culture of constant sharing and comparison, leading to feelings
of unhappiness and allowing cyberbullying to occur
- Has a positive impact on businesses by providing an effective marketing tool and allowing them to reach global
audiences, but is becoming less effective due to overexposure to online ads
- Has a positive impact on organizations by allowing them to distribute important information on a large scale, such
as in natural disasters, but can be censored by governments to influence public opinion.
- Provides a sense of inclusion and allows for sharing of thoughts and ideas with like-minded people
- Allows for the distribution of important information that can be life-saving in critical situations
- Provides a platform for seeking advice or support on various issues, resulting in improved customer service and
care
- Offers entertainment and exposure to news stories people may not be aware of.
- Social networking can be overwhelming and make people feel excluded or dissatisfied with their own lives.
- Social networking may decrease attention span and encourage bad behaviour.
- Online learning and courses are the primary focus of technology's influence on society in this regard
- Websites like YouTube, Lynda.com, and edx.org provide tutorials and education resources that are accessible at no
or low cost
- Quality of resources may differ, and it may be difficult to find high-quality tutorials
- Technology-enhanced learning includes computer-based training, online tutorials, networked learning, massive
open online courses (MOOC), and video conferencing
Computer-based training
- Businesses and organizations can offer extensive training programs for staff through computer-based training.
- Training resources are available without the presence of a tutor and use a mix of text, sound, video, and images.
- Users can learn at their own pace and take tests that are automatically marked to show their progress.
- This type of training allows workers to improve their knowledge and skill set, potentially leading to pay raises or
promotions.
Advantages:
- Staff can improve their own skills set and knowledge resulting in promotion or additional pay.
Disadvantages:
- Learners may not have a tutor to answer any questions that they have.
- Staff may not be motivated to follow the computer-based training as they aren't being watched and driven to do
so.
Online tutorials
- YouTube is a popular online platform for tutorials with a vast array of topics.
- Online tutorials aim to teach the viewer how to achieve a specific goal or outcome.
- Online tutorials allow learners to learn at their own pace and in their own time.
- Viewers can watch tutorials repeatedly until they feel they have a good understanding of the desired outcome.
Advantages:
- Users can learn in their own time and at their own pace.
Disadvantages:
- The quality of online tutorials may differ greatly, and some may be poor quality, making it time-consuming to find a
good one.
- Online tutorials could teach someone in an incorrect manner, depending on the ability of the educator.
Networked learning
- Networked learning is online collaborative learning that connects learners with each other and their tutors to
develop relationships and gain feedback.
- The aim is to encourage learners to support each other's learning and share resources and opinions.
- Learners are asked to share their thoughts and resources, and others offer advice to improve their skills and
knowledge.
- Time scales are more limited as the current task depends on everyone participating in a similar time frame.
- Learners build relationships with other learners and gain feedback from them, as well as the tutor.
- Learners can offer their skills and knowledge to others while also learning from them.
- Learners may be more motivated to complete tasks as the learning of others is dependent on them.
- Some learners may dominate discussions and limit learning from others.
- Some learners may only provide positive feedback and not criticize others' work.
- If some learners do not complete tasks or provide necessary feedback, it may limit the learning of others.
- Assessment methods include peer review, written assignments and online tests
- Attractive to employers.
Advantages:
- Can provide a competitive advantage and demonstrate motivation to learn and improve.
- Free of cost.
- Self-paced learning.
Disadvantages:
- Large number of learners, so educators may not have much time to help each learner.
- Some learners may struggle with motivation and only complete tasks that are assessed.
Video conferencing
- Video conferencing: communication using computers with video stream via internet connection
- Video often shows user and other resources; sharing screen feature available
- Educator can speak to learners and show resources, feels more personal
Advantages:
Disadvantages:
- Limited number of learners who can participate, leaving some waiting for a long time.
- Finding effective teachers who can break down problems and help students is a challenge
Impact of I.T
I.T in sport
- IT used in Rugby to judge if ball was put over the goal line for a try
- Manufacturing system can run longer and require less rest than humans
- Robotics in manufacturing seen as a cause of job loss and competitive disadvantage for some companies
IT in medicine
- IT has enabled monitoring of patients and analysis of their health in various ways, such as heart rate and DNA
analysis.
- Artificial limbs controlled by technology have allowed people with disabilities to regain function and live a fuller life.
- Nanotechnology in medicine allows for the precise targeting of drug delivery to specific cells, reducing damage to
healthy cells.
- Smart devices implanted in the body can detect health issues early, allowing for earlier and potentially more
effective treatment.
IT in education
- Interactive whiteboards and other technologies are used in classrooms to enhance the learning experience.
- Online learning, which utilizes technology to aid learning, is becoming more popular.
- Online banking allows people to access their bank accounts, check balances, view bank statements, set up direct
debits, apply for loans and overdrafts, pay bills, and transfer money between accounts.
- Online banking saves people time and allows them to avoid queues and visit bank branches less.
- Advantages of online banking include 24/7 availability, convenience, and the ability to compare deals online.
- IT can be used to monitor investment portfolios, apply for financial services such as loans, mortgages, and
insurance, and compare deals from different finance companies.
E-business
- Cost savings from businesses not needing a physical store allows goods and services to be sold at cheaper prices
- Online shopping has become popular due to the convenience and quickness of delivery
- The rise of smart devices has made online shopping even more popular and convenient
- Online shopping can be better for the environment by reducing the number of people travelling to shops, but may
increase the number of vehicles on the road for deliveries
- Quality and sizing issues with online shopping may lead to a higher number of returns
- Social networking is now a regular part of people's lives and a source of news and media.
- IT has allowed people to be amateur journalists themselves and record events as they happen, and broadcast them
to a wider audience.
- This has both positive and negative effects, as it can provide a truer impression of what's happening, but could also
be harmful.
- People can use IT to set up news feeds that draw news stories from different sources, saving time and effort.
- IT has been introduced into homes in many ways, including devices like Amazon’s Alexa and Google’s Home
systems.
- These devices can be used to control different aspects of the home such as lighting and heating, even remotely.
- Remote control of home systems can save money and be better for the environment.
- These devices can also be a source of entertainment for families, allowing them to play games and stream music
together.
- Everyday devices like washing machines and refrigerators can also have IT incorporated into them to provide useful
information to the user.
- Social media is used in politics to raise awareness of political causes and issues.
- Online petitions are set up to encourage people to sign for the resolution of issues they support.
- The use of IT in politics can allow governments to see what issues the people have and help them prioritize what
they discuss in government.
- IT has allowed governments to make their services accessible online, such as paying taxes, applying for passports,
and driving licenses.
- This makes access to these services more convenient for people and saves costs for the government.
- Facial recognition software combined with CCTV footage can be used to scan and locate criminals passing through
public places like airports and train stations.
- Homeowners can install CCTV systems with motion sensors, allowing them to monitor the area around their homes
and receive alerts on their mobile phones if there is any motion detected.
- Drivers can install dashcams in their cars, which can help prove their innocence in the event of an accident.
- Some police authorities have started requesting dashcam footage from drivers to investigate crimes committed at a
particular time and location.
- The use of IT for monitoring and surveillance is relatively unpoliced and has raised concerns about privacy invasion.
Chapter 13 New and emerging technologies
emerging technologies: technologies that are still in development to allow them to reach their full potential
Advantages:
- Wireless communication
- Increasing universality
Disadvantages:
NFC Uses
Electronic wallet
- NFC used for electronic wallets
- NFC technology in mobile phones and smart watches used for contactless payments
- Apple Pay is an example of a service that enables NFC payments through a mobile device
- 4K screens have a resolution of 3840 × 2160, providing a clearer image with more detail than HD
- UHD screens are becoming more common in homes, but 8K systems are mostly used commercially
- Few entertainment services support 8K resolution due to the need for a high-speed internet connection, as it
requires significant bandwidth.
Advantages:
Disadvantages:
- High-speed internet connection needed to stream content at UHD level (at least 25mbps)
UHD Uses
UHD in surgery
- CyberMed NB24k and the Davinci are medical grade computers with 4K screens used in surgical situations.
- They allow surgeons to view surgeries in progress with a higher level of visibility and precision, which is particularly
useful for surgical incisions.
- 4K television systems are also increasingly used in surgery to allow for remote surgeries and a higher level of
precision.
- The use of 4K technology in surgery can improve patient outcomes and reduce the risk of complications.
UHD in cinemas
- The first Hollywood movie filmed in 8K was Guardians of the Galaxy Vol. 2 in 2017.
- Most cinemas were not able to display the film at this resolution, but they are upgrading their technology for future
movies.
- 8K resolution provides greater clarity and immersion, particularly on larger screens.
- 8K resolution may be the maximum level of pixels that our eyes can distinguish, and any further increase may go
unnoticed.
- AI (Artificial Intelligence) is a rapidly developing area of technology, creating computers with human-like
capabilities and the ability to simulate thinking.
- AI can learn, plan, recognize speech, and problem solve, and is based on the creation of rules which allow it to
adapt decisions based on its own learning.
- Alan Turing was one of the pioneers of AI, who cracked the Enigma code during World War II and became
interested in the idea of providing machines with heuristic knowledge.
- Heuristic knowledge allows machines to make decisions in a more human-like way and involves using a value to
determine the best pathway to select.
- Knowledge engineering is important to AI, as machines need access to a knowledge base and the ability to establish
relations between the available knowledge.
- Machine learning is also a core part of AI, which allows machines to establish patterns in input to inform its ability
to analyse and learn.
Advantages:
Disadvantages:
- Ethical and moral issues regarding the use of computers to recreate intelligence.
- Lack of emotion means they can't fully understand human emotions like sympathy and empathy.
Self-driving cars
- Google and Tesla are developing self-driving cars to remove the need for humans to drive.
- Self-driving cars are viewed as an advantage because they remove the possibility of accidents caused by tiredness
or emotional reactions.
- However, some view it as a disadvantage due to ethical and moral concerns. The quality of the algorithm is
dependent on the programmers who create it, and the standard of the programmers involved may differ, which
could affect the AI’s ability to make an effective decision in critical situations. Additionally, the issue of responsibility
arises if two self-driving cars have an accident.
Scientific analysis
Summary:
- AI is used to identify patterns and trends in the data that can be used to form future scientific discoveries or
hypotheses.
- The learning ability of AI can be used to ask the machine itself to provide its own hypothesis.
- AI can carry out data analysis far outweighing the capabilities of a human.
- This can mean scientific discoveries can be made quicker and with greater accuracy.
- Augmented Reality (AR) overlays computer-generated images onto the user's view of the real world to create an
interactive experience.
- AR technology has been around since the 1960s but is only just starting to realise its potential.
- AR commonly makes use of a digital camera and sensors to read data from the surrounding environment and
display the augmented reality.
- AR can be created with mobile devices like smartphones and pioneering technology like smart glasses.
- AR is used in the real world by organisations like the military to train professionals like pilots.
Advantages:
- AR can enhance learning experiences by making them more immersive and entertaining
- AR can simulate real-world experiences efficiently, like trying on clothes or navigating a new place
- AR can communicate information in a more immediate and engaging manner, making it effective for training
Disadvantages:
- Privacy and security concerns with the collection and analysis of user data
- AR may blur the distinction between reality and the digital world, leading to perception modification
Gaming
- Pokémon Go and Wizards Unite are examples of AR games that have gained popularity in the gaming world.
- Pokémon Go allows players to collect different Pokémon by augmenting their surrounding reality.
- Wizards Unite allows players to immerse themselves in the Harry Potter world by augmenting it onto their
surrounding reality.
Medicine
- It is being developed to provide surgeons with instant access to vital patient information during surgery.
- Surgeons can wear smart glasses to see patient data without looking away from the surgery.
- Scans of the patient can also be superimposed onto the patient, allowing surgeons to visualise the issue they are
addressing during surgery.
- Virtual reality (VR) creates a computer-generated reality that doesn't exist in the real world.
- The headset incorporates a visual display and headphones to create a fully immersive experience.
- The user can interact with the computer-generated reality and walk around in it.
Advantages:
Disadvantages:
- Expensive technology
Scientific research
- VR used in scientific research to explore the structure and appearance of atoms and molecules
- VR provides an immersive visual representation for scientists to interact with their research
- VR technology can help in the development of new medicinal drugs to treat medical conditions.
Tourism
13.6 Robotics
- Robotics involves designing, building and applying robots that can perform tasks normally done by humans.
- The word "robot" comes from "robota", meaning "forced work or labor".
- The automation aspect of robotics can be traced back to ancient Greece and Rome.
- In the 1960s, General Motors introduced robots on an industrial scale in their automotive factories.
- Today, robots are still used in car factories worldwide and are automated using microprocessors and sensors.
Advantages:
- Reduce errors
Disadvantages:
- Need for constant power supply, which can be expensive and harmful to the environment
Uses of Robotics
Prosthetic limbs
- Prosthetic limbs have been used for a long time to replace lost limbs in humans.
- Robotic prosthetics can be connected to a human mind, allowing the person to move the prosthetic with their
thoughts.
- This technology can greatly improve the quality of life for those who have lost limbs.
Nano-robots
- Nano-robots are microscopic robots that could be used in medical procedures.
- They could be put in a human's bloodstream to track and eliminate medical conditions or perform internal surgery
in hard-to-reach areas.
- They could revolutionize cancer treatment by targeting and destroying cancer cells in the body.
- These tools identify text elements and translate them into the required language
Advantages:
- Time-saving
- Reduced errors
Disadvantages:
- Struggles with certain terms used in context, such as slang or colloquial language.
Foreign-language websites
- Computer-assisted translation can be useful for accessing websites written in a different language.
- Websites from other countries may not be readable in the user's language.
- Translation tools can translate website content into the user's required language.
- This can improve communication and make more information accessible to people worldwide.
Spell checking
- The database of words for a language can be used to compare text and identify incorrect words.
- Holographic imaging, also known as a hologram, is a 3D image created using laser beams and mirrors.
- The laser beam is split up by reflecting it off mirrors, and when they recombine, they create the holographic image.
- Holograms were invented in the 1950s by Dennis Gabor, a Hungarian-born physicist who was awarded a Nobel
prize in Physics in 1971 for his invention and development of the holographic method.
- Holograms can be a 2D image that appears 3D when moved, or an image that is actually 3D and free-standing,
using photographic projection.
- Free-standing holograms are commonly seen in movies like Star Wars and Iron Man.
- Advantages of holograms include not requiring special glasses, being difficult to replicate, and providing better
depth perception.
- Disadvantages include the need for expensive equipment to create 3D projected holograms and the cost of data
storage.
Security
- Credit cards
- Currency
- Difficult to replicate
Architecture
- Optical data storage uses light to burn and read data from a reflective surface.
- A laser beam is used in holographic data storage, which is split and then bounced off mirrors before traveling to a
crystal.
- When the two beams meet again, a hologram is created and stored in the crystal.
- A single storage crystal can store up to a terabyte of data and is about the size of a grain of sugar.
- Advantages:
- Disadvantages:
- Holographic data storage is useful for transporting large amounts of data into space.
- Holographic data storage allows a significant amount of data to be sent with each mission.
Archiving data
- Large corporations need to archive large amounts of data, which can be costly in terms of storage space.
- Holographic data storage could reduce the size of data storage units, potentially saving organizations money.
- The CERN data centre in Switzerland generates 30 petabytes of data annually and could benefit from holographic
data storage.
13.10 3D printing
- 3D printing has been in development since the 1980s and is a relatively developed technology.
- 3D printing is a form of additive manufacturing, which creates physical models by layering thin materials based on
3D software-based models created using computer aided design (CAD) software.
- The application of 3D printing continues to develop, with increasingly more ways that it is being used and past
methods being revolutionised.
Advantages:
Disadvantages:
- Increased security and fraud issues due to ease of creating dangerous and counterfeit items
Uses of 3D printing
Bespoke prosthetics
- 3D printing has revolutionized the medical industry by making limb replacement more accessible through bespoke
prosthetics.
- 3D-like printing is also used in bio-printing, which enables tissue engineering to be developed by layering
biomaterials to create tissue-like structures.
- Biomedical printing techniques can be used to print organs and artificial blood vessels, reducing the need to
harvest organs for medical research and enabling the creation of artificial organs in the future.
Printing in space
- It is possible to take a 3D printer into space, which can be used to print replacement parts for the space station.
- With a 3D printer, broken parts can be replaced quickly, reducing the time the crew needs to wait for the next
mission to arrive.
- 3D printing in space is being researched and developed for creating structures and habitats on the Moon and Mars
in the future.
- Glasses or lenses can be tailored to the person and their current level of vision for greatest effectiveness
- Can provide blind people with images of their surroundings to work and enjoy like others
- Can help colour-blind individuals see the world in the same way as everyone else
- Can enhance vision in situations where visibility is limited, such as in the dark
- Night vision devices, such as night vision goggles, collect all available light, including infrared and ultra-violet light,
to create a more visible image
- Thermal vision devices, such as thermal vision goggles, use thermal imaging technology to capture the infrared light
emitted by objects
Advantages:
- Night and thermal vision devices are illegal or limited in some countries.
Improving vision
- Night vision and thermal vision devices are used by the military to enhance visibility at night.
- These devices allow soldiers to move around and assess dangerous situations without being easily seen.
- This can aid in combat strategy and increase safety for soldiers.
- Wearable computing includes a variety of clothing or accessories with computer-based components embedded in
them.
- Fitness trackers are a common form of wearable computing that tracks steps taken and other health information.
Advantages:
- Users can sync devices together and set challenges, increasing motivation to exercise.
- Aids communication by showing alerts for text messages or emails, and some can even make calls.
Disadvantages:
- Users can become obsessed with health statistics, leading to damaging thoughts.
- Accuracy of some trackers can be dubious, designed for the "average" person and not bespoke health.
- Data security concerns exist, and companies may use collected data for marketing purposes.
- Companies are providing employees with health trackers and rewarding them for recording exercise.
- Points are given for the steps recorded each day, and can be spent on rewards for the employee.
- Rewards can include gift vouchers or products the employee can purchase.
- Health trackers can be used to monitor users with serious health issues.
- The device can constantly monitor the user's heart rate and alert a medical professional or family member in case
of emergency.
- Health trackers can also be used to monitor other health conditions such as diabetes, asthma, and epilepsy.
- This type of monitoring can provide valuable data to healthcare professionals and aid in better treatment and
management of the condition.
- However, the accuracy of some health trackers can be questionable, so it is important to ensure that the device is
reliable and validated by medical professionals.
Advantages:
- AI can be used to monitor trends and patterns in the environment, which can aid in preparing for natural disasters
and adverse weather.
Disadvantages:
- The power consumption of technology creates emissions that harm the environment.
- Discarded technology creates e-waste, which can harm the environment and infiltrate water supplies.
14.1 Fundamental network models
- Divided into layers to allow for independent operation and easy adaptation of functions
- TCP/IP suite:
- OSI model:
- 7 layers (Application, Presentation, Session, Transport, Network, Data Link, and Physical)
- Application layer:
- Presentation layer:
- Session layer:
- Manages sessions
- Transport layer:
- Breaks down data into segments and manages flow control and error checking
- Network layer:
- Physical layer:
- Router:
- Switch:
- Router uses IP address to route packets, while switch uses MAC address to switch packets
- OSI model and TCP/IP model are network models used in creating a network
1. Application layer: combines the roles of application, presentation, and session layers from OSI model, uses HTTP,
SMTP, POP, and FTP protocols for standardized data exchange.
2. Transport layer: maintains end-to-end communication between devices, uses TCP and UDP protocols.
3. Network layer: also known as the internet layer, breaks data into packets and transmits them between networks,
uses IP and ICMP protocols.
4. Link layer: also known as the physical layer, combines the roles of the data link and physical layers from the OSI
model, uses ARP protocol.
- To understand how this happens and how networks are structured, it's important to understand how data is
packaged for transmission.
- A data packet is typically the smallest unit of data sent across a network and contains three elements: the header,
the payload, and the trailer.
- The elements of a packet may vary depending on the network used to send it. For example, packets sent over the
internet contain additional elements to ensure they are directed to the correct destination.
Header:
- Source IP address
- Destination IP address
- Sequence number
- Used protocols
Payload:
Trailer:
All the data sent in the header and trailer are designed to ensure the payload data arrives at its intended destination
without any errors.
- Switching is the term used for transmitting data packets across a network.
- There are three main types of switching: circuit switching, packet switching, and message switching.
Circuit switching
- Dedicated pathway is used to transmit data packets from one device to another.
- Other computers in the network can't use the same pathway while data is being transmitted.
- Once data transmission is completed, the path is released for use by other data transmissions across the network.
Packet switching
- Packet switching allows data packets to take any available path without a set pathway.
- Collating and reordering of packets happens when they reach the destination.
- Packet switching is commonly used when packets are sent over the internet, and routers are used.
- There are two main methods of transmission in packet switching: connection-oriented and connectionless.
- Connection-oriented packet switching creates a fixed channel for the data to travel after a session is created.
- Connectionless packet switching does not require any prior arrangement between devices for data transmission.
- Examples of connection-oriented packet switching are frame relay and transmission control protocol (TCP).
- Examples of connectionless packet switching are Ethernet, internet protocol (IP), and user datagram protocol
(UDP).
Connection-oriented Method
- Data is separated into frames, and error correction is performed by the devices at the endpoints.
- Dropped frames are retransmitted, making it suitable for low error rate data transmission.
- Permanent virtual circuits (PVC) and switched virtual circuits (SVC) are two main methods of connection in frame
relay.
- A connection is created and maintained until the application software at each endpoint has finished exchanging
data.
- TCP is responsible for error-free data transmission and managing the flow of data.
Connectionless Method
- UDP is a protocol that sends data in datagrams and does not control the flow of data or carry out error checking,
making it faster than TCP.
Message Switching
- Message switching is an intermediate method between circuit switching and packet switching.
- It combines the features of circuit switching (all data packets sent along the same path) and packet switching (any
path from source to destination can be taken).
- Data packets are sent from source to the first switch device which holds them until all packets have arrived.
- The switch then sends the packets to the next switch, which also holds them until all packets have arrived.
- The packets are sent from switch to switch in this way until they reach the destination.
Peer-to-peer
- Each peer in the network has the same level of responsibility and capability.
- Peer-to-peer networks are often used for file sharing of digital media.
- Dedicated software links users who have files with those who want them.
Advantages:
Disadvantages:
- Users are responsible for their own security, viruses can spread to others
Client-server
- Client computers are connected to the server to allow it to perform its dedicated function
- Print server
- Application server
- Database server
File server
- Allows users to access their files from any client computer in the network.
Web server
Mail server
- Scans emails for security issues like viruses, malware, and spam
Application server
Print server
- Print server receives print jobs from client computers and sends them to the correct printer.
- Can be set to print to a specific printer, find the next available printer, or the closest printer to the client.
- If many jobs are sent to the print server at a time, it will queue the jobs until it can deliver them to a printer.
FTP Server
- Manages the transfer of data using the file transfer protocol (FTP).
Proxy server
Virtual server
- A virtual server can be given the capabilities of any of the above physical servers.
- Businesses sometimes use third-party virtual servers to act as a web server for hosting their website.
- This allows the hosting company to host several businesses' websites on the hardware of a single physical server.
- Spreading network functionality across multiple servers can improve network efficiency.
- Some businesses plan to have fewer physical servers and divide them into virtual servers for required functionality.
Advantage of server:
- Files can all be located in a single place and backed up on a regular basis.
- Updates for any software or network peripherals can be rolled out from a central location.
Disadvantage of server:
- Can be very expensive to set up due to the need to buy expensive equipment, such as servers.
- Expensive to maintain as specialist knowledge is required to setup and maintain the servers.
- Failure of a server will mean that functionality is unavailable for all users.
- Server farms require a large amount of power to keep cool and run.
LAN:
WAN:
Advantages:
Disadvantages:
- Illegal/controversial usage in some countries
Mobile Networks
- Mobile networks are broken down into small areas called cells, which vary in size.
- There are several generations of mobile networks, each providing faster access speeds and greater reliability.
- Each generation of mobile network technology requires new hardware, software, and infrastructure.
- The cost of using mobile networks can be high, particularly for data usage.
- Mobile networks can be subject to interference, which can affect the quality of communications.
Advantages:
- Mobile networks enable communication and internet access on the move through smartphones.
- Lower power radio transmitters can be used by breaking down the network into cells, leading to energy and cost
savings.
- Radio frequencies can be split among neighbouring cells, increasing the number of communications that can take
place at the same time.
Disadvantages:
- Quality of reception can vary and can be poor towards the edge of a cell.
- The technology for 5G is currently limited and may take time and be costly to become fully usable.
These protocols are mainly designed to increase the privacy and security of data.
Tunnelling
- Allows for the secure transmission of data from one network to another
- Private data packets are sent across a public network through encapsulation
- Encapsulation makes private data packets look like public data packets
- Network protocol for securing connections between web clients and servers
- Uses public and private keys to encrypt data transmitted over secure connection
This is a network protocol that is the updated version of SSL. It uses updated and more secure encryption algorithms.
- Designed to encrypt and authenticate data packets sent over the internet
BitTorrent
- Allows the transfer of large files by distributing the load of downloading the file across several sources on the
network
- Several sources are collated to create a swarm, each given pieces of the file
- Allows the user to join the swarm and download the file from available hosts
- Downloads the file in pieces, simultaneously, from various hosts in the swarm
- It allows for the transfer of large files by distributing the load of downloading the file across several sources on the
network.
- The protocol creates a swarm by collating several sources, known as hosts, that are each given pieces of the file.
- Each user trying to download the file is called a peer, and each user providing an upload of the file as part of the
swarm is called a seed.
- The protocol protects each piece of the file to prevent modification by any users.
- The Internet Control Message Protocol (ICMP) is an error reporting protocol used in computer networks.
- It's used to diagnose network problems and to send error messages indicating problems with packet delivery.
- ICMP messages are typically generated by network devices such as routers and switches, and they are sent back to
the sender of the data packets.
-Use between the network layer and the data link layer of the OSI model.
This protocol performs the opposite role to the ARP. It translates a MAC address into an IP address.
- HTTP is a protocol used to transfer the content of web pages from a web server to a browser over the internet.
- HTTPS is a secure version of HTTP that incorporates the use of the SSL protocol to encrypt and authenticate the
data transmitted between the web server and the browser.
This protocol is responsible for the transfer of files between a client and a server in a network.
This protocol is used to send email from a computer to a mail server, and between different mail servers.
- It is similar to POP, but has one main difference: email is not deleted from the server by default.
- Emails remain on the server and can be accessed and managed by multiple devices.
- An email is deleted from the server only when the user chooses to delete it.
Telnet
This protocol allows a user to connect remotely to another computer, using the internet.
Secure shell (SSH)
This protocol provides a secure way to access a computer over an unsecure network. It does this using strong
authentication and encryption methods for communication.
A network can often include several different components, that each have a role within the network.
- NICs can be wired or wireless and are inserted into a device's motherboard.
- An ethernet cable is used to connect a wired NIC to another computer or network component.
- WNICs can be used for wireless connections and do not require an ethernet cable.
- For a simple network, a direct ethernet connection can be used between devices
- Hub: connects devices using a wired connection, forwards data to all devices, inefficient and prone to data
collisions, can be active or passive
- Switch: also connects devices using a wired connection, examines data packets to determine the intended
destination device, forwards data only to that device, creates a MAC address source table to determine destinations,
greatly reduces traffic and data collisions
Repeaters
- A repeater can be used for wired and wireless signals, as well as analogue and digital signals.
- Wireless access point (WAP) is a network component used to connect wireless devices to a wired network.
- It receives wireless signals and transmits them to their destination via the wired network, often through a switch.
- It creates a wireless LAN and can support multiple wireless devices, but there is often a limit, and larger
organizations may require multiple WAPs.
- Signal strength deteriorates with distance, so multiple WAPs are distributed throughout the building.
- Organisations with different branches may need to share data between LANs.
- A router assigns unique IP addresses to devices connected to it, allowing for their identification in the network.
- Two versions of IP address are IPv4 and IPv6, with IPv6 allowing for more possible combinations.
- An IP address can be static or dynamic, with most devices using dynamic IP addresses.
- Users can request a static IP address from their internet provider if needed.
- Routers forward data packets outside the current LAN to other networks.
- Routers use IP addresses, while switches use MAC addresses to establish packet destination.
- Routers use routing tables to establish the most efficient route for data packets.
- Three types of routing protocols: interior gateway protocols, exterior gateway protocols, and border gateway
protocols.
- Interior gateway protocols used for routers within a network, exterior gateway protocols used for routers between
different networks, and border gateway protocols used for exchanging data packets across the internet.
Coaxial
- Coaxial cable is a type of copper cable with a central wire surrounded by an insulating layer and an outer jacket.
- Coaxial cables are used in applications such as TV, cable TV, and some internet connections.
Advantages:
- Lower error rate due to the central wire being inside a faraday shield.
- Transmit signals over long distances with minimal signal loss and interference.
Disadvantages:
Twisted pair
- Twisted pair is a copper cable that consists of two insulated wires twisted around each other and covered by an
outer jacket.
- Twisted pair cables transmit electric current and are used for telephone communications and Ethernet networks.
- Minimises crosstalk
Fibre optic
- Used for faster data transmission, utilizing light properties to transfer data.
- Advantages: highest bandwidth available and can carry signals for longer distances without deterioration.
- Disadvantages: high cost for manufacture and purchase, difficult to install due to the fragility of glass tubes.
Wi-Fi
- Wi-Fi uses radio signals and is the most commonly used wireless communication method.
- The router or WAP also broadcasts radio signals that are received and processed by each device when it is receiving
data that has been transmitted.
- Wi-Fi currently transmits data at frequencies of 2.4 GHz and 5 GHz, which are much higher than those used by
mobile networks.
- These frequencies are considered high and required for sending larger amounts of data.
- The current limit for Wi-Fi data transmission is approximately 450 Mbps.
Advantages:
Disadvantages:
Bluetooth
- Bluetooth uses radio signals at 2.45 GHz to create a wireless connection between two devices within 10 meters of
each other.
- There is a limit of 8 devices that can be connected to Bluetooth at any given time, and devices must have matching
profiles to establish a connection.
- Bluetooth transmitter is turned on in a device to transmit radio signals, and any device with a matching profile
within range will pick up the signals and identify with the sender.
- Once the required device for connection is chosen, the devices are paired together, which can sometimes require
entering a pin code for added security.
Advantages:
Disadvantages:
- Limited range of 10 m
Infrared
- Scatter mode broadcasts infrared to an area and any device may receive it.
- Sending device needs infrared signal, and receiving device needs infrared sensor.
- Infrared lasers can also transmit data through direct line of sight.
- Laser transmission works similar to fibre optic but relies on free space.
Advantages:
Disadvantages:
- Wireless data transmission can have security issues since it lacks the same level of protection as wired connections.
- Wired networks have locks and other security methods to prevent unauthorized access.
- There are two protocols for wireless network security: WEP and WPA.
- WEP encrypts data transmissions sent through a wireless connection to provide a compatible level of security to a
wired LAN.
- WPA is a required standard for devices with a wireless internet connection and provides a more advanced
encryption method than WEP.
- Microwaves and radio waves are both types of electromagnetic radiation used for data transmission, with
microwaves having shorter wavelengths and being used for short-distance communications, while radio waves have
longer wavelengths and are used for long-distance communications.
- Historically, the term "radio waves" has been associated with wireless data transmission technology.
- Bandwidth measures the frequencies available on the channels of communication in a network, as well as the
maximum amount of data that can be transferred across a network within a given time (usually one second).
- Bit rate is a measure of how many bits of data are transferred in a given period of time and is used to describe the
rate at which a particular file, such as a video file, is transferred.
- Bandwidth and bit rate are not the same thing, with bandwidth being a measure of a network's performance ability
and bit rate being a measure of how fast a specific file is transferred.
- A network's bandwidth limits the bit rate of data transfer, with the maximum possible bit rate not exceeding the
available bandwidth.
- Bandwidth and bit rate are important in real-time and on-demand streaming of audio and video files, as the
available bandwidth affects the quality of the streamed file. A user with a lower bandwidth connection will not be
able to stream high-quality files.
- Cloud computing refers to internet-based services like storage, software, and servers.
- There are three main types of cloud computing. Infrastructure as a service (IaaS), platform as a service (PaaS) and
software as a service (SaaS):
- IaaS: Host provider hosts network resources such as servers, which businesses can access via the internet.
- PaaS: Host provider hosts platform resources used to build software applications.
- SaaS: Host provider hosts software applications accessible to users via the internet.
- Cloud computing is often used for data storage and personal data backup.
Advantages:
- Access to data and software applications from anywhere with an internet connection.
- Cloud provider handles software application updates and can quickly boost network performance by employing
more resources.
Disadvantages:
- Communications satellites are machines in space used to transmit radio waves from one place on earth to another
for telephone calls, internet data, and television broadcasts.
- The main components of a satellite are a solar powered battery, a transponder, and various antennas.
- Satellite communication involves converting data to radio waves, transmitting them from a ground station to the
intended satellite, and then transmitting them back to the destination ground station.
- Navigation systems such as GPS use satellites to work out a user’s current location, using triangulation to find the
location of a user.
- Devices with GPS capabilities include mobile phones and cars, and can be used for surveillance purposes by tracking
a device's activity log.
- Data is valuable to companies, and malicious systems may be created to steal or damage data, resulting in a risk to
data security, especially with the use of networks.
- Malware is a common risk, and it can be a virus, worm, spyware, or ransomware, which are often downloaded
unknowingly by users.
- Botnets can also be used to carry out attacks like DDoS by infecting many computers with malware and using them
as bots.
- Hackers can gain unauthorised access to a system using a backdoor, while crackers use a brute-force approach to
gain access by trying different password combinations.
- Physical security measures, such as barriers, locks, CCTV, security guards, and alarms, can be used to protect data.
- Biometric data can also be used to authenticate users, while software-based methods like anti-malware, anti-virus,
anti-spyware, and firewalls can be used to prevent malware and unauthorised access.
- Access rights can be used to restrict access to data, while encryption can protect the data if it is stolen.
- Disaster recovery is a planning mechanism to minimize risks and plan for disasters.
- The first step is to identify the potential disaster through risk analysis that includes identifying the potential
disaster, the potential harm, and its impact on the organization, and developing methods to control the possibility
and impact of the disaster.
- Perpetrator analysis is also carried out to identify potential culprits for the disaster.
- Risk testing is done to rehearse the plans and strategies developed during the risk analysis to make employees
understand what they should do in the event of a disaster.
- Quantifying the risk involves evaluating the risk and prevention methods in terms of cost and time by considering
maximum tolerable downtime (MTD) and recover time objective (RTO).
- Methods should be in place to prevent disasters such as power surge protection devices, backup generators, fire
and flood-proof cases for data, policies and procedures, and cloud computing.
- In the event of a disaster, data and resources will need to be restored, and a disaster recovery plan should be in
place to consider how to carry out these actions and what timescales to expect.
Chapter 15 Project management
- Project management software and tools such as Gantt charts, PERT, and CPM can assist in the process
- Failure to complete projects on time and within budget can cause embarrassment for organizations and frustration
for end-users.
Project initiation
- Define objectives, scope, risks, budget, and timescales and get agreement from stakeholders
- Carry out a phase review to ensure completion of all initiation aspects and stakeholder agreement on the project
brief.
Project planning
- Formulate comprehensive budget and timescales, and set milestones to track progress
- Identify and prioritize tasks, and produce a Gantt chart to show task order
- Allocate resources in a coordinated manner and ensure appropriate time is allotted to each task
- Conduct a phase review at the end of the planning phase to check for plan achievability and alignment with project
objectives.
Project execution
- Communicate roles and responsibilities to team members and set interim targets
- Conduct an execution phase review to learn from mistakes and identify good practices
Project close
- When the project is ready to complete, a handover will take place from the project team to the client.
- Contracts will be terminated, and resources assigned to the project will be released.
- A review of the project will take place between the client and the project management team.
- The client will sign off the project as completed, and closure will have been achieved.
Planning
- Project planning mainly involves scheduling tasks and allocating resources using project management software.
- Key milestones should be identified in advance to ensure crucial points in the project are reached, and tasks are
scheduled accordingly.
- Documents required for the project should be allocated to these milestones, such as success criteria and
specifications.
- Project templates can be used for setting up an initial project plan, and they can be provided by the software or
created based on previous successful projects.
Scheduling of tasks
- Project management software enables scheduling of tasks on a timeline using Gantt charts
- Team members can track progress and time spent on each task
- Overall calendar of all tasks and individual calendars for team members are available to the project manager.
- Project templates help set up company standards for planning projects, so employees have a common and
recognisable structure.
Allocation of resources
- Resources: equipment, property or people
Costings
- Project management software records team member expenses and accounts for them in overall costs
- Software provides daily, weekly, monthly or custom expenditure analysis and compares it to budget
- Costings information can be exported to common formats such as spreadsheets for further manipulation and
analysis
- Shared documents stored in a central repository, with changes tracked and alerts sent
- Discussions and forums for team discussions and notifications of new contributions
- Progress updates from team members that can be fed into the project plan, with automated email notifications for
changes to the timeline.
Decision making
- Graphs, charts, and reports used to analyse budget, scheduling, and task progress
- Complexity of the software requires extensive training for project managers and team members
- The critical path defines which tasks must complete on time for the whole project to complete on time
- The critical path method is suitable for projects where time needed for each task is known
- Float time is the time an activity can be delayed without affecting the rest of the project.
In the example network activity diagram for making a cup of tea, getting the milk out of the fridge has a float time of
120 seconds because it can be delayed this long before it would catch up with milestone 4.
To create a network activity diagram you need to know the following information:
The float time can also be added to each task. The float time is calculated by subtracting the EF of a task from the ES
of the next task: Float time = EF of task – ES of next task
Note: when working in days, the EF and ES are considered to be the beginning of the day. For example, if the EF of
task 2 is day 4 then task 2 should be finished by the beginning of day 4, or the end of day 3. This will then enable task
3 to start at the beginning of day 4.
- Resources can come from tasks with high float times as those tasks are not critical to finish at their planned earliest
finish time
- If there aren't any float tasks available, additional resources have to be found which incur additional costs.
For example, in Figure 15.7, if the laying of bricks needs to be completed 5 days earlier then there are no float tasks
available from which to use resources. However, if erecting the roof needed to be completed earlier than planned,
then resources could be used from the plumbing task which has a float of 12 days.
- PERT is similar to CPM and is used to plan, schedule and manage projects based on predecessors.
- The most optimistic time assumes that everything will go right and there will be no problems.
- The most pessimistic time assumes that anything that can go wrong will go wrong.
Gantt charts
- Each task is represented by a bar, which can be shaded to show completion percentage
- Resources required can be listed, usually with the person responsible for each task
- List of tasks
- To manage large projects, hierarchical decomposition of the project can be created as a work breakdown structure
(WBS).
- A WBS forms a hierarchical diagram with tasks allocated to sub-tasks or project phases.
- WBS helps in breaking down the project into manageable tasks and sub-tasks.
- In a software development project, WBS can be used to break down the project into the phases of a development
life cycle.
- A team manager would then be responsible for each phase of the project.
- WBS can be further broken down into stages to show the stages involved in each phase.
Chapter 16 System life cycle
- Developed system is tested and installed for client with user documentation
- Other software development methods include Agile and Rapid Application Development (RAD)
16.1 Analysis
Analysis involves finding out how the current system works and what the requirements of the client are for the new
system.
Methods of research
Questionnaires
- Online completion ideal for immediate storage and analysis with filters and comparison
- Not suitable for small sample sizes or elaboration without contacting user again
Interviews
- Suitable for single or small group end users, and management or representatives of user groups
- Honesty is important, but some users may not admit to shortcuts or not doing tasks well
- Involves watching processes within an organization to understand how tasks are completed
- Can involve sitting with users and asking questions, or wandering around an office
- Can give a good understanding of input data, processing methods, and output information
Document analysis
- Examples of output information, input data, and process information can be identified.
- Document analysis should be used in conjunction with other analysis methods to identify additional data and
processes.
- It's not a standalone method because it does not provide a complete picture of the organization's requirements.
The content of specifications There are three types of specification used within the life cycle.
Requirements specification
- The analyst writes the requirements specification in consultation with the client who approves it.
- Data that needs to be input to the system, including screens or data collection forms.
- Processes that need to take place to convert inputs into outputs or to store data.
System specification
- System specification lists required software and hardware for the new system.
- Software identification should come first as hardware will depend on the software.
- Only necessary software for the system should be specified.
- Higher than minimum hardware specifications may be recommended for system speed.
- Processing power, memory, and external hardware components should be specified based on user requirements.
Design specification
- The design specification is created by the designer and shows how the system will look and work.
- It aims to give users an idea of what the system will look like so that their feedback can be incorporated into the
final designs.
- It includes house style, screen sizes, a connectivity diagram, and the purpose of calculations.
16.2 Design
- During the design stage, the overall structure of the system and details of the system components are designed
without being developed.
- Diagrams can be used to describe how a current system works (during analysis).
- Diagrams can also be used to demonstrate how a new system will work (during design).
System processing
A data flow diagram (DFD) shows how data flows throughout a system. It is not about the order of processes, it is
purely about the data flows.
- DFDs can exist at multiple levels
- Level 0 DFD shows the whole system and data flows between system and external entities
- To create level 0 DFD, identify external entities and data flows, not physical objects
- Level 1 DFD shows flow of data within part of a system or whole system if small
- External entities are considered for parts of the system not shown
- Each data flow must be linked to a process before it's stored or passed to external entities
- To create level 1 DFD, identify external entities, data flows, and processes. Data flows can't move directly between
entities or data stores.
System flowchart
- A system flowchart displays the data and process flow within an entire system.
- System flowcharts were commonly used during the 1960s and 70s when punched card and magnetic tape were
prevalent, but they are not widely used in modern systems analysis techniques.
- Arrow points towards data file if data is being stored and towards the process if data is being retrieved.
- If user input is required, add manual input symbol at the appropriate place with the arrow pointing towards the
process.
- Identify any documents produced by the system and link each with a process with the arrow pointing from the
process to the document.
Data storage
Data dictionaries
- Data dictionary describes how data will be stored in tables within a database.
- Identify primary keys and foreign keys, including the names of tables to which the foreign keys link.
- Identify input masks, validation rules, or default values for each field.
Files
Input forms
- Avoid colour
- Clearly state how many options can be chosen from a multiple-choice list
- Avoid cluttering the form with too much information or too many questions
Screen layouts
- Good design principles include using colour sparingly and appropriately, consistent use of fonts, avoiding clutter,
and ensuring legibility.
- When requiring user input on a screen, include clear instructions, indicate required questions, provide enough
space for each answer, and use appropriate response options (tick boxes, drop-down boxes, option buttons).
- When designing a screen or data collection form, indicate the location of questions and responses, response
options, and layout of information.
Validation routines
- When designing a validation rule, identify the input data, type of validation rule, the rule to be used, and error
message.
- Error messages should be positive and guide the user on how to correct the error.
In addition to validation rules, any intended methods for verifying data input such as visual checking, double data
entry or hash control should be specified.
Output reports
The design of output screen layouts follows the same principal as input forms except that there is no need for
instructions or input fields.
When designing a printed copy layout, as well as following the same principles for output reports, consideration
needs to be made to the size of paper that will be used, the size of margins and the intended audience. Printed
copies can often include tabular data.
16.3 Development and testing
- The term "development" is now more commonly used instead of "implementation" to avoid confusion.
Test data
- Test data is used to simulate live data and to test the system's ability to handle large amounts of data and different
scenarios.
- There should be enough test data generated to ensure that the system is able to cope under the pressures of large
amounts of data in everyday use.
- Specific types of data are needed to test different scenarios within the software, including validation rules and
queries.
- Records will need to be created where there is data that meets the criteria of the query, does not meet the criteria
of the query, only just meets the criteria of the query and only just fails to meet the criteria of the query.
- A sample set of live data will also be used to test the system under normal conditions.
- End-users typically carry out the testing with a sample of live data, using the data as if they were doing their normal
job, simulating different processes that they would carry out.
Alpha testing:
- Carried out by developers or specialised team of testers before delivering the system to the user.
- Takes place close to the end of development when the application is nearly ready for the user.
- Can take a long time as each error found requires repetition of testing and there may be knock-on effects to other
parts of the system.
Beta testing:
- Beta testing involves real customers using the software in a real world environment using real data after alpha
testing has been completed.
- Beta testing is used when software is being made available to a large number of customers and helps to identify
bugs and gather feedback before the final version is released for sale.
- As bugs are found within a beta version, new beta versions will be released for further testing until a final version is
ready for release.
- Can involve testing the entire system or user testing by intended users or specialist testers.
- Involves the same input/output data process but with knowledge of the internal structure and logic of the program.
- Usually done with small program modules by the software developers who coded them.
- They can test pathways not known to black box testers and ensure detailed designs are developed correctly.
- White box testing requires knowledge of the internal structure and logic of the program, while black box testing
does not.
- In black box testing, only a limited number of test scenarios are performed, but with white box testing, each
module can be tested in-depth.
- Black box test plans are difficult to design, while with white box testing, test plans can be created for each
calculation, navigation, and input separately.
- White box testing requires skilled testers who understand the code, while black box testing can be carried out by
moderately skilled testers.
- A test plan is used to minimize errors and ensure all pathways through a system and types of data have been
tested.
- A test plan identifies all tests needed for every element of a system, including different types of test data such as
valid, invalid, and extreme.
- The plan covers all user requirements and provides a systematic outline of all features and functionality.
- A good test plan is continually updated to reflect new risks and ensures all aspects of testing are considered and
signed off.
- Each test in the plan is numbered and includes the type of test, input data, expected result, and space to record the
actual result.
- Calculations in the system are also tested, with each input for a calculation identified and an expected result
determined.
16.4 Implementation
- Parallel
- Plunge (direct)
- Pilot
- Phased
Parallel running
- New system goes live on agreed date but old system still runs
- Advantages:
- Less risky as old system still runs in case new system fails
- Disadvantages:
Direct changeover
- Data must be transferred from the old system to the new system before the new system can be used
Advantages:
Disadvantages:
- Requires advance training for all users, which could result in forgetting what they have learned by the time they
start using the new system.
Phased implementation
- Part of the old system retired and part of the new system starts running
- Advantages:
- Errors will only affect the part of the system that has changed over.
- End users can be trained in each phase of the new system before moving on to the next.
- Disadvantages:
Pilot implementation
- Pilot implementation involves introducing the new system to a smaller group of users while the rest of the
organization continues to use the old system.
- The pilot group effectively beta-tests the new system and may provide training to the rest of the organization when
the system goes live.
- This approach is useful when a system is complex or has a significant impact on an organization's operations.
- Once the pilot group has successfully used the new system for an agreed period, the organization can then decide
to roll out the system to the rest of the organization.
- Advantages:
- Errors found by the pilot group can be fixed before the system is installed for all users.
- Pilot group can train other users on how to use the system.
- Disadvantages:
- Users in the pilot group may not be happy about using the new system while it still has errors.
- Users not in the pilot group may be disgruntled about not being offered the opportunity to try the new software
first.
- Old and new systems need to be compatible for data to be shared between pilot and old system users.
16.5 Documentation
Technical documentation
- Technical documentation is an overview of the system's structure, function and how it was put together.
- Includes a data dictionary, programming code, macros, and a list of variables with their datatypes and purpose.
- Lists validation rules, calculation purpose, buttons, links, files, flowcharts, and other diagrams.
- Includes an installation guide, testing results, backup routines, and security settings.
User documentation
- Includes the name of the system, software and hardware requirements, and page numbers
- Main part is instructions on how to use the system with screenshots and bulleted/numbered tasks
- Includes a glossary of technical terms and troubleshooting section with common problems and solutions
- Has an index at the end with page numbers for popular terms.
Technical documentation:
- Important for new maintenance team or original team to remember system structure
User documentation:
16.6 Evaluation
- After system development and installation, the process is evaluated through a review.
- The evaluation considers how project teams and end-users worked together to learn from the project.
- Users are given questionnaires and specific tasks to complete to assess their satisfaction with the new system.
- The system is assessed against user requirements, efficiency, and ease of use.
- Feedback is collected from users regarding their experience with the system.
- Suggestions for future improvements or additions to the system are collected from users.
16.7 Maintenance
Perfective maintenance
- Perfective maintenance aims to improve a system even if it's already working fine
- If a system isn't improved for a long time, it can become outdated and inefficient
- An example is an online accounts application that needs to store details of multiple contacts for each customer to
send invoice payment reminders to the right person.
Adaptive maintenance
- Adaptive maintenance is necessary for systems to adapt to changes, both internal and external to an organization.
- It may involve complying with new legislation or adapting to new technology such as an operating system or web
browser.
- The system needs to be updated to ensure compliance with new laws and to prevent producing incorrect outputs.
- For example, an online accounts application had to be updated to check all employee payslips for pension
payments, and accounting software needed to be adapted to display a paper clip symbol on a new web browser.
Preventative maintenance
- Methods:
- Monitor system performance for efficient processor, memory, and storage usage
Corrective maintenance
- Importance: Ensure efficient and accurate system performance and produce desired results for the organization
- Effects of bugs: Slow or crash the system, frustrate users, reduce productivity
- Maintenance needs to follow similar stages as software development to ensure efficiency and accuracy in the
system.
- Three approaches to forming a maintenance team: separating development and maintenance, combined approach,
and functional approach.
- Maintenance process model stages: identification and tracing, analysis, design, implementation, system testing,
acceptance testing, and delivery.
- Impact analysis is necessary to identify the risks and resources required for the change and a cost-benefit analysis
of the change.
- Program restructuring may involve rewriting the program in a different programming language or restructuring the
way modules are used within a program.
- Version control is necessary for documenting changes to ensure efficient maintenance management.
16.8 Prototyping
- A prototype is a primitive form of software solution used during the design stage to demonstrate how a system will
look and work.
- It is focused on the user interface rather than data structures.
- It is used so that the client can get a feel for the new system before it is developed and can provide feedback that
can then be acted upon.
- The client can compare the prototype against the requirements specification.
- It provides the client an opportunity to explain their requirements more clearly having seen the designer's
interpretation.
Incremental prototyping
- Each prototype builds upon the previous one and includes more functionality
- Each prototype can be functional and used by the client until the next iteration
Evolutionary prototyping
- There is no requirements specification at the start of the project, but a goal or aim might be present.
- The analyst and developer brainstorm ideas and then the developer starts working on the best ideas while the
analyst talks to the customer to clarify their needs.
- After a few days, the developer demonstrates their work to the analyst who then discusses it with the customer to
get more clarification on their needs.
- The process continues as the product evolves from a goal to a usable piece of software.
- This approach is often used by start-ups or when new ideas are being experimented with.
Throwaway/rapid prototyping
- Benefits: cost-effective way to fine-tune requirements early in process, avoids costly changes later
- Problems can be identified early in the process and modifications can be made before it becomes costly to make
changes.
- End users can be more involved in the process, giving them more ownership and providing valuable feedback.
- If the prototype is evolutionary, users can get used to parts of the system before having to use the whole system,
reducing the need for bulk training.
- Changes are cheaper to make earlier in the process than after real development has taken place.
- Developers will have a better understanding of what users expect, resulting in a better quality solution.
Disadvantages:
- Requirements analysis can be rushed, resulting in prototypes not reflecting users' expectations.
- Prototypes can become rushed and have significant design flaws or structural errors that carry through to the end
solution.
- Users may request too many features, leading to disappointment if they can't be funded (feature creep).
- Users may have false expectations of the timescale required to turn a prototype into a working solution.
- The initial costs of developing a prototype are high compared to traditional designs.
Types of development
- Software development has two main categories: incremental development and iterative development.
- Incremental development is about developing the software in phases, moving onto the next part only after the
current part is fully developed and improved based on feedback.
- Iterative development involves planned rework throughout the project, with feedback from the customer used to
make improvements. The solution is built in small parts, with improvements made after each part is built.
- Incremental development is like a landscape artist painting a house and then a tree, perfecting each object before
moving on to the next.
- Iterative development is like a landscape artist sketching the whole landscape, adding background color to all parts,
adding details to all parts, and revisiting and changing the picture until satisfied with the final version.
Development methodologies
Waterfall method
- The waterfall method is an iterative development model that starts with gathering all the user requirements at the
beginning of the project.
- During the design stage, the interface and structure of the system are designed, and during implementation, the
system is developed, which often involves programming.
- The verification phase is to ensure that the project meets the customer’s requirements.
- As each stage starts, changes may need to be made to the previous stage as a result of user feedback or lessons
learned during that stage, making it an iterative model.
- The waterfall method is fundamentally flawed as it relies on the unrealistic expectation that requirements will be
clearly defined.
- The system life cycle discussed in this chapter is based on the waterfall model, and there are many variations in
existence.
Advantages:
- Works well for projects with clear and unlikely to change requirements.
Disadvantages:
Agile
- Agile approach responds to changing requirements throughout the development life cycle and values individuals
and interactions over processes and tools
- Collaboration with the customer underpins the whole project with customer collaboration over contract
negotiation
- Iterative approach with each iteration including planning, design, development, and testing of part of the software,
and a working solution is ready at the end of each iteration
- Team members including designers, developers, and testers are expected to be located in the same place, and a
customer representative is included in each team
- Daily 'scrum' is a briefing session where each team member reports their work and plan for their next stage of
development
- Pair programming is a technique used in agile development, where two programmers work together at the same
computer
- Agile is both iterative and incremental with each iteration incrementing the existing functionality and being
iterative in nature.
Advantages:
Disadvantages:
- Minimal documentation may lead to longer learning curve for new team members
- Rapid application development (RAD) uses prototyping for system development in less than six months
- Joint application development (JAD) involves user jointly with developer in system development
Advantages:
- Strict deadlines prevent feature creep and ensure project completion on time.
- Prototyping with user involvement results in less time spent on design and more on development, leading to a
shorter project.
- Software application frameworks allow for quick UI development with user involvement.
Disadvantages:
- Unclear requirements may result in a solution that does not meet all organizational needs.
- User involvement can lead to work overload or the need for temporary staff.
- Strict deadlines may lead to rushed project parts and lower quality.
- Existing software modules may not provide sufficient functionality for the system.
- Software application frameworks produce inefficient code, resulting in slower running systems.
- Users not involved in JAD may feel left out, and the system may not meet their specific needs.