100% found this document useful (1 vote)
1K views148 pages

Gcse - Aqa Ict - The Essential Guide - Ocr

Uploaded by

api-75701151
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views148 pages

Gcse - Aqa Ict - The Essential Guide - Ocr

Uploaded by

api-75701151
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 148

Vl

<lJ
e
l-
o
..c
l-
e
o
Vl
--
<lJ
Z
)
AQA GCSE Information and Communication Techr7c:>logy i s a unique bl
of print and online resources, with an Essential c:::; IlJ i de p lu 50 on line teac
learning and assessment materials delivered via
www.nelsonthornes.com/aqagcse
.. AQA endorsement and approval relates to the content of Icerboodl.' only
and
Communication
Technology
The Essential Guide
W205
BHk NtJ. 12
Flora Heathcote
Diane Spencer
Editor
Peter Sykes
_ . _ Nelson Thornes
Text Diane Spencer and Flora Heathcote 2010
Original illustrations (C) Nelson Thomes 2010
The right of Flora Heathcote and Diane Spencer to be identifi ed as authors
of this work has been asserted by them in accordance with the Copyright,
Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced or transmitted
in any form or by any means, electronic or mechanical, including photocopy,
recording or any information storage and retrieval system, without permission in
writing from the publisher or under licence from the Copyright licensing Agency
Limited, of Saffron House, 6-10 Kirby Street, London, ECIN 8TS.
Any person who commits any unauthorised act in relation to this publi cation
may be liable to criminal prosecution and civil claims for damages.
Published in 2010 by:
Nelson Thomes Ltd
Delta Place
27 Bath Road
CHELTENHAM
GL53 7TH
n ~ e d Kingdom
10 11 12 13 14 / 10 9 8 7 6 5 4 3 2
A catalogue record for this book is available from the
British Library
ISBN 978 1 4085 0584 7
Cover photograph: Strauss/Curtis/Corbis
Page make-up by GrecnGate Publishing, Tonbridge, Kent
Printed in China by 1010 Printing International Ltd
Picture acknowledgments
A1amy: page 20; 1.2F; I.4M; IAN; 1.4P; I.4Q; 1.6V; 4.18; 6.31; 7.1A; 8.18; 8.2C
Author supplied: 3.40; 7.2C
Fotolla: banner Images for Chapters 2, 3, 4, 6, 7, 9; 1.1 Ciii; 1.1 Clv; 1.4L; I.SR;
1.55; 2.1A; 2.1C; S.2G; 6.1AII
Getty: 1.1CII; 3.3C; 6.1Ai; 6.1B; 6.3J; 7.20; 9.10
15tockphoto: banner Image for Chaptersl ,S and 9; 1,1 B; 1.1 Ci; 1.10; 1.4K; 1.40;
I .ST; 1.6U; 3.SC; 6.1 C; 7.2E; 9.1 B
NASA: 7.3G
Photollbrary: 9.1A
SCience Photo Library: 6.2E
S.2F courtesy of Erik Fairbairn, http://madracing.blogspot.com
7.2F courtesy of EyeTech Digital Systems
Microsoft product screen shots reprinted with permission from Microsoft
Corporation.
Contents
Introduction 4
.,
Using the web 72
G
Introducing ICT 6 5.1 Web browsing and e-mail 72
1.1 Computer systems 6 5.2 Web logs, social networking
1.2 The operating system 10
and forums 78
1.3 Using computer systems 14
I.
Examination-style questions 83
1.4 Input and output devices 16
Data logging and control
1.5 Storage devices and media 21
software 84
1.6 Communication networks and
6.1 Data logging 84
entertainment 23
6.2 Control software 87
Examination-style questions 26
6.3 Mobile technologies 92

Systems life cycle 28
Examination-style questions 94
2.1 Feasibility studies 28
t) Implications of ICT for society 96
Examination-style questions 37
7.1 Legal issues relating to the use of I CT 96
0
Applications software 1 38
7.2 Social and economic issues relating
to the use of ICT 101
3.1 Applications software 38
Word processing and desktop
7.3 Political, ethical and environmental
3.2
issues relating to the use of ICT 105
publishing 41
Examination-style questions 108
3.3 Presentation software 44
3.4 Graphics production and image
0
Using leT responsibly 109
manipulation 46
8.1 Health issues for computer users 109
3.5 Web design 48
8.2 Responsible behaviour online 112
3.6 Software for audio, DVD and video
8.3 Preventing unauthorised access 115
players 51
3.7 Transferring data between applications 52
Examination-style questions 119
3.8 Designing documents using
iO
Collaborative working 121
accepted layout 53
Examination-style questions 54
I 9.1
Principles and processes of
collaborative working 121
0
I
Examination-style questions 130
Applications software 2 56
4.1 Spreadsheets and modelling software 56
Appendix 131
4.2 Databases 62 Glossary 137
Examination-style questions 69 Index 142
Nelson Thornes has worked in partnership with AQA to ensure
this book and the accompanying online resources offer you the
best support for your GCSE course.
All AQA endorsed resources undergo a thorough quality
assurance process to ensure that their contents closely match
the AQA specification. ,(ou can be confident that the content of
materials branded with AQA's 'Exclusively Endorsed' logo have
been written, checked and approved by AQA senior examiners,
in order to achieve AQA's exclusive endorsement.
TIlese print and online resour<:es together unlock
blend d learning; this means that the links
between the activities in the book and the
activities online blend together to maximise your
understanding of a topic and help you achieve your
potential.
These online resources are available on
which can be accessed via the internet at
www.ke rboodle.com/live. anytime, anywhere.
If your school or college subscribes to ., .' \
I!
you will be prOvided with your own personal login
details. Once logged in, access your course and
locate the required activity.
For more information and help on how to use
visit www.kerboodle.com.
How to use t his book
To help you unlock blended learning, we have referenced
the activities in this book that have additional
online coverage in kerboodle! by using this icon:
The icons in this book show you the online
resources available from the start of the new
specification and will always be relevant.
In addition, to keep the blend up-to-date and engaging,
we review customer feedback and may add new
content onto kerboodle! after publication.
... , ... -."_ . :,,' "' ''' ..
. __ . .. ........ c ............. _
... ... - "l ............. .. ,, _ _
:" .. .:o _.' _ ..... ,.,._
" . .... .. .U- , .... o; ._-n'_ ... .
....... 1
.-
.-.... , .. '-.- ... ... -.-.... . -, .. "'" .' ...
.. , ... ... ... '", ... .. , .. .. ,
0< _ .. , .... , ... , ....... _
. .. .. .. _ ,. . .... .. ___, .. _ .. , .... ...... , ..... .. ,
"'-............ . . ...... "' .... " _-.. ... :t;..o.., ..... ..,.""
.... ........ .. -.....
'---""' .. - -. ....... "' ........ .-.. ..- ... "', .......... _ ... -
...... ... ..,.. ...... ... _ ... -._, _
AOft GCSE Information and
Communication Technology 5
Welcome to a fresh look at GCSE leT. This is an
exciting new textbook to match the latest GCSE leT
specification from AQA.
leT is an everchanging subject. New technologies
are continually being developed and soon become
absorbed into everyday life.
The new content included in the book reflects:
changes in the way in which people use the
internet (for example using social networking
sites, downloading videos and music)
the growth of linking video, Tv, music and
games, based around ICT
the growth of mobile technologies
working together - collaboration between
individuals and organisations.
It is a good time to study ICT because it provides the
knowledge and skills which will help you to move
into employment and Higher or Further education.
Examinations and Controlled
Assessment
For GCSE ICT t.here are three assessment ul'its.
There is a written examination paper and two
Controlled Assessments.
Unit 1, which carries 40% of the marks, is a
written examination paper.
There are two Conttolled Assessment units which
make up the remaining 60% of the marks. In both
units you will be expected to be able to use a variety
of software packages.
Unit 2, which carries 30% of the marks, is called
The Assignment: Applying ICT. For this unit, AQA
will set two compulsory tasks based on up-co-
date usage of leT. You will provide the evidence
co show that you have tackled and solved the
two tasks.
Unit 3, which carries 30% of the marks, is called
Practical Problem Solving in ICT. In Unit 3 AQA
provides a set of problems and you can choose
one that you will enjoy doing. You can decide
how to tackle this problem, but you will need
to write a report and produce a portfolio of
evidence to show what you did.
For research in Units 2 and 3, you will need to be
able to access the Internet.
Supporting the new GCSE
specification
This book has broken down the subject content
into manageable chunks that match the AQA
speCification. The follOwing features will help you to
focus on key points and avoid common mistakes:
[email protected]*
These give you a clear indication of what will be
covered in each chapter.
How to a.void common mistakes and gain extra
marks in exams.
,.WHIM;, ",.lii
SOIDe of the more unusual but relevant facts.
Shan tipS and things to remember about leT.
CA@M
Sbort tasks to help you to broaden your knowledge .
ifl"I'M
,\ shorr example of where leT is used at home or in
indusrry.
' :;9+
1
@,*
A focused look at real-life examples demonstrating
ICT theory.
CDHnks
A link to other parts of the book or a link to further
reading and web sites.
',i}"V,U,
These are in blue when they first appear in the text.
Definitions are given in the page margin and in the
Glossary on page 137.
QuestIons
Apply your knowledge in new situations before
attempting the exam-style questions.
II" '1m; I.".:!II h3\m IOJ" II
A round up of what you should know at the end of
the chapter.

The essential extra knowledge for those
intending to gain higher grades at GCSE.
questions are reproduced
by pennission of the Assessment and Qualifications
Alliance.
:=I
- - -
,-
...-::; 1 _- #!!!
.
/' ,,- .
Computer syst ems
Tills section introduces you to computer systems. It looks at some of
the hardware and software that make up a computer system and helps
you to think about how to choose input, output and storage devices.
ICT is used in communication and entertainment. The final part of this
chapter looks at where and how it is used .
Information systems
One of the main functions of computer systems is to process data.
There are three main stages involved in information processing: input,
processing and output.
Look at this example of a supermarket checkout:
The input to the system is the product code, taken from the number
scanned from the bar-code.
The input is then processed. The product details and price are
looked up in the stock database.
The output is a screen display showing product name and price.
These details will also be printed on the customer's receipt.
Details of new stock levels are stored in the updated database.
The relationship between these is shown in Diagram A.
Storage
Stcd. are
upd.ted ",
d't.ba
Input Processing
fo'rC\JlJct code refl d Product naffit!
from and
..A...
up fl:orn !:tCld
tla1abase
a Stages of information :I)focessing
Hardware
output
f'r \'JdLlct and price
dlSpl.y<:C or.
screen and
on receipt
The physical objects that make up a computer system are known as
hardware. Examples include a computer, a monitor, a printer or even
a connecting cable. Hardware provides input, output, processing and
storage devices.
Objectives
Underst and a/range of input and
out put deVice;-; and how they
mi ght be used.
Be aware of a
of st ori ng data and be able to
I
suggest uses for the"'1.
Be aware of communicat ion!; and
entertainment technologies!and
how they affect ICT systems.
!
Hardware: the
th.t make up a compvter
system, such as
mOnitors and
Input. data entered '"to a .system I
Examples of Inputs are i
scanned In a or key I
entered by a typist
Output the action that occurs
dfter an Input hns been
plocessed For example.
name and pn.:e of an Itern
15 displayed on a
foll';WlOg a bar-code scan
turning the Input IOto
a useful fmm For example,
companng bar-cilde dala With.
to analyse which item
It corresponds to
Stored ,"formation is kept
for later USE, for
in formation on the stock levels
alter the Item has been scanned.
Types of hardware
The main component that makes a computer work is the
microprocessor. The microprocessor is a silicon chip that contains
the CPU (central processing unit) . The CPU carries out aU of the
calculations that make the computer work. It is sometimes called the
'brain' of the computer.
Uses of microprocessors
Microprocessors are not just used in computers. They are used to
control lots of devices, such as DVD players and washing machines.
Mobile phones and games consoles also use microprocessors in order to
function. They are an important component of office equipment such
as photocopiers, but they are also used in industrial machines such as
robotic assembly lines.
Software
Software is the part of a computer system that you cannot see or touch.
It is a program or set of instructions that the processor runs in order
to carry out tasks that the user requires. There are two main types of
software, operating systems sofrn.are and applications software.
Operating systems are the software packages that control and manage
the computer and its components. Computer programs such as
word processors, databases or computer games are all examples of
applications software. Operating systems are needed in order to run
applications software.
The differences between hardware and software
Hardware is a physical device that you can touch, such as a mouse
or monitor.
Software is program code that gives the computer instructions
about how to operate. Computer programs are software.
Hardware needs software in order to function.
Hardware and software work together in computers and other
devices that use microprocessors.
Chapter 1 Introducing leT 7

D The microprocessor acts as the
'brain' of the computer
_""ll f
1 :
. ,

Kaylerms
Devkes pieces of h.rdwale Fot'
example, a rnonltor IS an output
devl(e
a chip that
contains d central processing
Unit, which acts thp 'brain' of
a ..
CPU. central processing unit,
Pdrt of the computer that does
most of the dat.a
, Operating systems software
contI ols and mandges the
Examples
Windows, l"iae: OS and Llnux,
I Apptkatlons software ""mputer

programs that are designed 1.0


carry out speerf,c.
-----'
Components of a personal computer
Motherboard and central processing unit
The motherboard is the main circuit board in
./>-
the computer. It has slots to plug in other boards
and sometimes it has built-in sound and video
controllers. Better-quality sound and video can be
achieved if the computer has separate sound and
video cards rather than using the ones built in to
the motherboard. The CPU is a computer chip that
sits on the motherboard. It carries out the main
processing functions for the computer. Newer
computers contain dual- or quad-core processors to
make the computer work more quickly.
El A motherboard
Methods of processing
Interactive processing responds to inputs from the user. Most home
computers work in an interactive way by responding to what you
choose to do. An example of interactive processing might be in a
computer game when decisions you make cause obstacles to be placed
in your way.
Multi-tasking is when the computer is carrying out several tasks at
once. It might be running a word processor and a spreadsheet at the
same time as it is printing a document.
Real-time processing takes place straight away in response to input from
the user. For example, if the number of 1Vs in stock in an online store is
six and someone buys one, the level immediately reduces to five.
Online processing takes place when a computer is working via an
Internet connection.
Multi- user systems allow many users to log in at once. For example,
several customers may log on to the same website to look for cinema
tickets. If you ask to reserve four seats, the computer will lock the
records for those seats until you decide whether to buy them. It will
then either mark them sold or return them to the system if you decide
not to buy them.
Main/internal memory
There are two kinds of internal memory: ROl\li and RAM.
ROM stands for read-only memory. It contains instructions that are
built in during manufacture, so that when it is inside your computer,
it is read only. When the computer beats up it loads instructions from
ROM, but the computer cannot write data to it.
RAM stands for random-access memory. This is used when the
computer is operating and it holds programs and data while the
computer is switched on. As soon as the power is turned off, data held
in RAM is lost. Increasing the amount of RAM on a computer will help
to improve its performance.
ROM. reddonLy memory.
RAM' random-acces5 lTlp.mory
up when till' computer is
iWlt<.h<'<.! on, it
t3 sat of to
,,!Low t he computer to IX' used
Remember
AO!' Examiner's lip
Learn that RAM" for .tonnl(
and diltil
ROM IS for p .. ;t oraf:e
of instructions to up til.

Input devices
The most common input devices used on a personal computer are a
mouse and keyboard. The keyboard is mainly used to enter letters and
numbers and the mouse is used to point and click. The keyboard also
has keys for moving the cursor and can be used for shortcuts (such as
pressing Fl for help). A separate section of the keyboard, called the
numeric keypad, is useful if you are entering lots of numbers.
Output devices
The most common output devices are monitors, speakers and printers.
The monitor is used to display what the computer is doing so that you
can control the system using your input devices. If you need sound, it
is produced by speakers. If you need to produce paper-based output, a
printer is required.
Secondary/backing storage
Desktop computers need to store dara and programs. For this they
need storage that still holds data when the power is switched off. This
is known as secondary storage or backing storage. The main backing
store on a desktop computer will be its hard drive. Desktop computers
will usuaily have drives for removable media, such as DVDs or CDs, but
notebooks and other portable computers may not. They will also have
USB ports that can be used for flash storage de,ices such as memory
sticks. (See pages 21-22 for more on storage devices.)
What computer to buy?
USing the Internet, a cOITlf>uter or an advertiSing lealtet,
two computer 'ystems that might be suitable for use
home The two computers should De qUite d,ffe,ent In pnce Make a table
like thIS one
DeScribe what extra features the more computer has and why
they might be useful For ex.mf>le, the more expensive machlnP. might.
have a bigger hard dnve Why might that be a gooci thing t'J have>
Chapter 1 Int roducing leT 9
/\0" Examlner's lip
Know the IDr hard drl'fes
(main batkmg storage), memory
stick, (small stor., to transfel
data between computp.r<), DVDs!
CDs (fO/ permanent ;torage of
files, for ""ample muslC/photur.)
Summary questions
a
the
betweeil hardware and
software Give two
example, of each
fJ
Exf>laln the J,ffereilCe
between RAM and HOM .nd
deSCIibe what each type of
rnemory IS used for
D
WhICh of the 1011owlng
would use RAM and whICh
would use ROM?
"
Storing;; word-processing
program when rt IS being
used
b
Storlllg the cornmands to
st.rt lOp the computer
c
Storing Q musIC download
which IS being played
II
list three ways that
you could the
perfOimance of your
compute,
The operating system
Operating systems software turns a set of electronic parts into a
working computer. It controls the system hardware and software.
It allocates memory and processor time to each process that your
computer is running and it controls where your data is stored.
Operating systems software also provides the user interface and useful
tools such as file management software.
The user interface is the way that the user interacts with a computer
system. It includes the input and output devices and the screen display
that the user sees. The operating system also controls the type of user
interface that the user sees on the screen.
Most personal computers use a graphical user interface or GU!.
This is made up of windows, icons, menus and pointers, and so it is
sometimes called WIMP. The user clicks on the icon or chooses from a
menu and the computer responds to their choices. It is also possible to
use the pointer to drag and drop items on :1 page. GUIs are quite easy
to use and very versatile.
Menu
-
Aall c. ""
,.-
--
--- " Tn.1 N .... II.--.
O"..ttl'fbCiM'Ir.Ln
...........
11> Sr.. AAS
10 WM ktrr
--

'+.-,;i
l' Aharonl m'tall
AJ.OIIll
. .,...;.
....
:r ....
... ..!
:to At: ...
-t Arbl

Graphical user interface, or GUI
Features of a GUI
You can customise a GUI to suit your personal preferences. It is possible
to change the size of the icons or even the icons themselves. You can add
hyperlinks and hotspots to link to other pages or to external websites.
You can alter the display options including changing the screen resolution
and contrast. There are many other features of a GUI that you need to be
familiar with. For a full list of features, see the Appendix on pages 131-136.

_
User interface. the way thp. user
Interacts with the computer-
",put and output deVices as well
as the screen display
GUI graphkal user With
\\'lndows, ICl)nS, menus and
; pointer!:
Hyperlinks links to other web
," files, usually accessed
by clICking on a ''IIord or Image
Resolution mo.asures how many
dots of cok'''' an Image is made
up of ThiS c,an apply to a bltm_p
Image, a display on a monitor or
a pnnted page Hlgn .es'Jlutlon I
(more dots pt'r Inch) gives
.. _ ..... __ ---1

, I Minimise.
\ : maximise and
\ close icons
\ Window
Icon
Menu user interface
Sometimes it is better to allow the user to choose from a restricted
set of options. A menu user interface is a good way of doing this.
Menu user interfaces are very easy to use and so they are often used in
systems for the general public such as ATMs and information systems.
Menu user interfaces work well with touch screens.
File and folder organisation
You will probably already be familiar with the folder structure of either
Windows or Mac. A computer stores all files in folders. A folder can
contain other folders (called subfolders), allowing you to organise all
of your files and use many levels of folders.
Each file has what is called a fi le path. This is baSically an address for
the file that specifies exactly which folder it is stored in.
C:\Users\Public\Pictures'.Sample pictures ....
The file path is in the address bar at the top of the window. The file
path in Screenshot G is for the folder Sample Pictures, which is a
subfolder of Pictures, which in tum is in the Public folder.
Find the file
Worl,lng In pairS, ea.:h oi you should fond;, file on the computer. preferably
one that IS contaIned w,th,n a few subfc,lders 1.\I"te down the fIle name
and the fIle pdth of that file (usongthe file path fo, mat dS Ii1 the
m Screenshot H) Now swap ille paths WIth your p.;tner, 3nd navlg.te to
your partner's ;:h,'sen TIle on the computer
File extensIons
All files have a Iile extension. A file extension shows what type of file
it is - some common examples can be seen in Table !' Note that file
extensions are usually three letters (occasionally four), and appear at
the end after a full stop.
Fi le names
There are some simple rules to keep in mind when naming files:
Avoid full stops and special characters such as \ / < > ? % : ".
They are prohibited by some operating systems.
Keep file names short. Some file systems do not recognise long
names and will cut them short.
Do not forget the file extension. When you doubleclick a file, the
operating system uses the file extension to choose what program to
open it in.
Chapter 1 Introducing ICT 11
..A..
II nis smartphone uses touch screen
and a menu usp.r interface
Key'erms
Menu user interface an mterface
where the user chooses from a
restntted lost of options.
File path an 8':ldress for the fite
that spec,f,e, . xactty whKr.
folder It st",."d In
File extension a r.oJP. that defInes
t he type of fIle At the end (If
fi le name there IS a dot plus thp
extension, for example doc
IS a document fIle called lettel
Ci:'fr.j:'UW
4 I' :J; C",)
4 (I; t .if

: ,: 1$

r .v: fI! U


h",:

...A... 11 . :
CJ YOUCanscf!alloithefil l?s
organised in foldo" and subfolders
doc tetter.doc worn
- --'- -'--

.. Is accounts. spreadsh""t
xis
Jpg head.hot. !rnagf!
jpg
File sizes
Every file has a file size associated with it. A file that contains a lot of data
will haye a large file SIZe. The file size is important because it will affect:
how much space it uses on your computer hard drive
wheth.er it will fit on a portable memory stick
how long it will take to e-mail to someone.
"TYPically graphics, music and video files tend to be very large, and because
of this they can sometimes be troublesome to store or transfer. Word
processing documents tend to be smail unless they contain many images.
II you t'3k., a phe,to u31ng a 7 camera the photos could
1".3v" a file size 01 about 5M8 each
l
II you haVE: a ot 20
photos that ',L'U want to:; gl""',o a fnend that 1& 20 , 5 = 100MB.
YOl; .VlII n",ed to jeclde how be'lf ,0 tlansler the Images te yOUi
tnn,j
Storing large files
Depending on how large your hard drive is, you may choose to store
some files on an external bard drive. This is common practice for
people who work with large files every day such as photographers, film
and music editors. Some external hard drives are small enough to be
portable, so they can provide a convenient way of transferring large
files between computers.
Transferring large files
Many email packages have a limit on the size of the attachment you can
send. Also, the person you are sending the e-mail to may have a linlit on
the file size that they can receive. Sending large files can take a long time.
You can also transfer files using CDs, DVDs, USB memory sticks and
portable external hard drives. However, obviously you either have
to physically hand over the files or send them in the post. "TYPical
capacities for these storage devices are:
CDs: 650MB
DVDs:4.7GB
USB memory stick: this is increasing all the time, but 1-16GB is
common
Portable external hard drive: this is increasing all the time, but
10D-500GB is common.
Encoding data
When data is changed from one form to another this is known as
encoding. This is often done with large amounts of data so that it is
easier for the computer to use it. Many systems encode data, mainly
for the follOwing reasons:
to make inputting information quicker and easier
to make retrieving data from the system easier
to reduce errors
to reduce disk space required to store the file.
;:'Jr!l wrr"-.!f1:: tJO ..
fl It- ,j n(J (,,1' /.0: " .
d fil .. : t 6' l: j1 e:':
dd Jl
il f r;(-o r j r-: I)dt-f. ii :> of
th ::t ( ,I i ! .i.'l t! hi \Vhptl
yO' ' .! (l
t h'"
I
Hm. rnr.d o :' I'11!.tJe<"J jf WItt
ik!', \' (0:: m;mu.';"ll:t fwd If 1.1 riK+
o;'.' f fl Ij
Did you know
aft..:ldlmE"nI size
a prot-tem, one alternatIve IS to
uplc>ad t he fllp to. web 5<'rllce
There ar. many online webSIte,
that dllow YOl; to transfer large
fi les IIp to about 2 GB fr(,e of
chare. r."" a lOOK at
www.yollsandlt.com. for example
L ---'
One way to "vercome the
prcbiom of large ill.; IS to make
ther n smaller by compressing
t hem A cl1mpre.sslon program
(fo' exomple WlnZlpl IS hy
both the senri"r .n<.l the receIver
of the r.olllproed file i hc files
ar. ' 0 rnak . the", snl.11e,
til tr.II,t(,r received they
are UnlJpped to m.l:e them
readabt" CDmpresslon
si zes !ilTlaLier 1n to
t hpPl qUICkly
Key,erms
Encoding replatlng WIth
a code which shortens It (lor
replating male WIth M
or with Fl.
Encoding data on mail-order forms
Look at the following form for Collar Fast mail-order shirts.
Chapter 1 Introducing ICT 13
How is data encoding
benefiting Collar Fast?
SLWHT'!6 Slimfit shirt
. j
32.00 32 Oil
DISCUSS how the use of encodIng
is used to.
sh:e 16
White T-shirt size 12 1. 15.00 3000
a reduc:a errors
b make entenng orders eaSIer
ar,d qUlckel
Collar Fast has many different shirt styles, sizes and colours. In the
catalogue, every item has a unique item code next to it, as well as a
simple item description. When a customer orders an item, they only
need the item code, but the item description is also included on the
form to double-check they have the correct code.
c make retnevmg Item
InformatIon qUICker and

d redu,:e dISk space.
Collar Fast also accepts orders over the phone. Customers call up and
quote the item code they want to order. The sales staff look up the
item code on the system and read it back to the customer to check
they are ordering the correct item.
/\0.'\ Examiner s tip
Encoding use,; II'
of a word or
(for ,,"amp'., fema'e) whICh
,.duces th.' entry time and saves
dISk .'pace
Collar Fast stores information on all orders for five years. For each
customer it stores only the item codes from the order rather than the
full item descriptions.
fi,,,,f,,fUiHJ'jU,I,?J .,
D Describe th,ee Jobs that the operatrng sys'1em
does
fJ Explarro two .dvantages of uSIng a GUJ
b ExplaIn c.l'le dISadvantage of usrng a GUI
L Why would you use a menu user rnterface In
preference to a GUi>
U Rob has saved a phot" in a new folder called
ParntballrngDec09 whIch he created 10 the My
PIctures folder or, the C drrve of hIS computer
What IS the file path of thIS photo>
II A 1 GB file of Images as well as
text to be transferred D,scuss whethel
each of the follOWIng methods of transfarrrng the
file would be approprrate
a burning the fil" onto CD-R
b savIng the flIp. onte. a USB memory stIck
to e-mallrng the file to J school e-maIl account
D FOI each of the followrng scenaCIOS, explain whICh
s"I'J'110n would be best
a Caitlin has Just .. turned frorn a geography field
trip Her role was to tak" photos .r,d nolW
they are at schOOL she needs to dlStrrtoute
the te, the rest of her team of SIX There are
100 In each about 3 MB
to Gareth Just fln"hed taking photos on le<ation
In Greece for e UK travel maga,rne He needs tl)
se"d all of the photo, to the as soon .5
pOSSIble The photos were taken Oil a profeSSIonal
camera very high rese,lutlon and the
filo SIze of aU the photos that he .,eeds to send IS
15GB
, Alexa IS orgdnising a youth-clut, tnp There ar. 23
members atto;,dlng, and she "eeds to send out a
five-page Word document WIth th. final travel and
accommodation arrangements There are two maps
In the Wor,j docum.nt, but apart from that .t IS all
text and tables, so the fllp. SIze IS only abo"t 1 MB

. " - -.
#
..,. -. '
Using computer systems
When a computer is switched on it uses the data stored in ROM to
boot up. Networked computers usually boot up to a screen that asks
for a user name and password. When you log on, your USer name will
control what you See and what files and software you can access.
At the end of a session, it is important to close all of the programs that
you have open and then log off. If you forget to close files before you
shut down, the data in them may become corrupt. This means that
the file might not open when you next want to load it. If you leave the
computer and forget to log off, it leaves your files open and anyone
who uses that computer after you can access them.
In some systems a screen saver is displayed if no key is pressed for a set
number of minutes. It is possible to set the system up so that the screen
saver stays on unless the correct password is entered. Once you have
logged off, the computer should be shut down properly rather than
switched off. Leaving your computer on standby for long periods of
time wastes energy .
Identifying leT problems and solving errors
From time to time problems will occur with any computer. It is
important to know what to do and when to call for expert help.
Freeze
Sometimes the computer may 'freeze' and stop responding to software
commands. On most personal computers pressing the etr!, Alt and
Del buttons together will allow you to close the package and shut the
computer down safely. You may still lose any changes made since you
last saved. Software freezes are more llkely if the computer is low on
RAM or hard-disk space. Having lots of packages open at once also
makes a freeze more likely.
Error messages
Errors may also occur when you are working with software. It is
important to read any error messages carefully and follow the
instructions given. If software freezes or error messages occur often,
the computer may need to be checked by a technician. If the problems
occur with just one software package, it may be useful to uninstall that
piece of software and then reinstall it.
..

U Example of an error message
. "
...
Ke ,e,m"
Corrupt the data IP a file IS
Th" happen It
the data IS changed or damaged
on some way so that It cannot
be loadP.d by the ongonal
software
Old you know
A dlaiogue box " a
secondary w,,,dow uspd to
displdy Information tor user
The Simplest 1)'P'l1S an that
displays a m"""ge and rt'<jurrt:5 an
aclmo,,1edllement sud. as OK
Storage space
If the storage space on the computer becomes too full, the system is
likely to slow down and freeze more often. It is important to delete
any files you no longer need. You can also archive files that you do
not expect to need very often but do not want to delete. This involves
copying them to removable memory, labelling them and storing them
carefully. A removable hard drive that plugs into a USB port is a good
way to increase the storage capacity of the computer.
Printers
Printers can also cause problems, especially if the paper is not loaded
correctly. If the paper jams, it is important to switch the printer off before
removing any jammed paper. Many printers have displays that show
where the paper jam has occurred. New paper can then be loaded.
Obtaining help and support
Sometimes the error message will be enough to help you fix the
problem, but in other cases you may need more help. Most businesses
and schools have technical support arranged either through their own
on-site technician or a support service.
If you need technical support, you will be asked for details of the
problem. If it is a software freeze, you might be asked what operating
system you are using and perhaps what other software you had open at
the time. The technical support operator may be able to suggest some
things that you can ny. They can often talk you through a solution. If
not, they will usually arrange a visit from an engineer. Some services
have a system whereby they access your computer remotely and try to
fix the problem or at least find out more about it.
If you are working from home and do not have a maintenance contract,
it is worth doing an Internet search to look for help. Many bulletin
boards discuss computer problems and may offer a simple solution.
Software houses also have support sections on their websites and they
may also offer support bye-maiL If you need telephone support you
usually have to pay for it. Hardware problems will usually involve a
trip to your local computer shop.

a RaJ IS workong on hiS cornputer at and the screen dISplay
suddenly freezes What should he do' What adVice would yO'J
him If thiS happens regl'larly'
D How can you manage storage space to redl'ce the .:hance of a
computer freeZing'
II a What IS the most commor, prot-lem With pnnters'
b Explain how you can reduce the llkellh'Joel of thiS happening
Chapter 1 Introducing ICT 15
';' '!:Ofr- t 'itfttl'( jn i_ dry p!ac..e
; LMnw
't( Jr! 1h.eo
Did you know
The f('glSt'Y I< d file "" your
computer that stall" tho.
Important tnfonnatlon aDOU!
how It is set up. Yr)l] need to De an
co 'hangp. registry
safely It you them wmng. you
can m"ke your unusable
{::) .. "':. ...
,!'.I f'"fC/.!.;r1f:.
(;;" :i\.it?gt..,;::;. i!?
1;'1
tr.o:-: 't:.l ;-jn
i .. ________ . _____ . _ _ _ _ __ _ . ___ ,
. =
~ -.... - -
.-. . - . '-
./ ..... '
Input and output devices
Input devices
There are a large number of input devices available. A few of the most
common ones that you will need to know about are described here. In the
Appendix on pages 131-136 there is a list of those not mentioned here.
Keyboards
Everyone who uses a desktop computer is familiar with a standard
qwerty keyboard, but there are other types of keyboard too.
Ergonomic keyboards are bent slightly, a bit like a boomerang. They are
intended to help people find a typing position that will not hurt their wrists.
A concept keyboard is divided into sec.tions or has programmable keys.
For example, in a restaurant, each key can be allocated to a product, so
the waiter would press one button for a prawn salad and another for
an orange juice. Concept keyboards are simple to use and avoid errors
by restricting choices to a limited number of options.
Mouse
A mouse is used to move a screen pointer and choose options on the
screen. There are two main kinds of mouse: mechanical and optical. A
mechanical mouse works by rolling a ball around a surface. An optical
mouse uses a light beam instead of a balL Optical mice do not need a
mouse pad and do not get clogged with dirt in the way that mechanical
mice do. For that reason they ha\'e become very popular.
Microphones
If you need to speak or sing into a computer you will need a
microphone. Some look like the traditional microphones used on stage
and others are built into headsets along with earphones. These can
be extremely useful for call-centre operators as they leave their hands
free to use the computer. Many laptops come with a microphone and
web cam built in, so that video-conferences are easy to set up. Speech
recognition software can be used to convert voice input into text that
can be edited with a word processor. The software may still confuse
words that sound the same but have different spellings.
Digital (video) cl.!meras
For most people, digital cameras have almost replaced traditional
cameras that use film. Once the photograph has been taken it is usually
stored on flash memory inside the camera. This means that you can
look at the pictures and delete those that you do not want or like.
You can then ptint the photographs or load them onto a computer to
be edited. You can send digital photographs to other people bye-mail
or to a mobile phone. You can also display them online on a social
networking site or a blog.
Digital video cameras work in the same way, but they take many shots
per second and they can also record sound.
Touch screen
Touch screens are combined input and output devices. Wires are
embedded in the screen and these sense when the screen is touched.
Large touch screens are often used for information systems in public
places. They are easy to use and do not need extra devices such as a
keyboard or a mouse.
Touch screens are also used on many portable devices such as mobile
phones. Some need to be pressed with a little stick called a stylus.
Others can be operated with your fingertip.
fvlagnetic stripes
Magnetic stripes are fixed to the back of plastic cards. When they are
swiped through a reader, they input a limited amount of data. This
might be an employee number that is recorded when the employee
uses the card to open a security door. Credit and debit cards now
use a chip and pin system, but they still have a magnetic stripe for
older card readers. The stripe can also be used if the chip is not read
correctly.
Sensors
You can fit a wide range of sensors to computers. The Nintendo
Wii has specialised remote input devices that behave like other
ohjects, for example golf clubs and guitars. They use motion and
pressute sensors to sense the action of the player and reflect that in
the game. Domestic devices such as washing machines and heaters
contain heat sensors to control the temperature reached. Burglar
alarm systems use pressure sensors to sense when someone has
stepped into a particular area. Sensors are covered in more detail in
Chapter 6, page 81.
Automatic data-capture devices
Manual devices such as keyboards are inexpensive and very versatile,
but they tend to be slow and it is easy to make mistakes when you use
them. Automatic data-capture devices can be expensive to buy and set
up. They speed up data entry and reduce mistakes, and so they are
worth the cost if there is a lot of data.
!32r-code reader
Barcode readers read printed bar-codes. A bar-code is a printed pattern
of black lines on a white background. Each bar-code represents a
number that is read when the bar-code is scanned. The bar-code reader
has a checking facility. It does a complex calculation based on the
numbers in the code. It then checks that the number matches a check
digit, which is the last number of the bar-code. If it does not match, the
reader beeps to tell the operator that the bar-code may be damaged.
The operator then enters the number manually.
The number on the bar-code can be stored in a database where
other details can be looked up. This will include the product number
and other details, such as price and description, which are found
from the database. Bar-codes are often used in library systems and
supermarkets.
Chapter 1 Introducing leT 17
"lSi" Touch-screen Injormation systems
are easy to use
"a,meptaye" use input
del'fCessu'cn." this steerIng wheel to
make the pame feel more redlistic
A WnHTIlIn ",rstake 1\ to tholt
tne bar-code c.""tains 01
the rroduct It dO\!.S nc<t it slrnply
a number thr.t can b.
k)Oked tJ I) 1n a to find
other det{111 c; sucr. oS pr ice and
dpscri!->tlOn
_ -""
..... .
-"'- j
- . . _-
-" --
OMR
OMR stands for optical mark recognition. You may have come across
optical mark recognition sheets if you have taken a multiple-choice
test. The sheet is printed with blocks and you choose your answer
by shading in the correct box. The sheet is then scanned, and the
scanner senses the poSition of the pencil marks. It matches them
against the correct answer to calculate your mark automatically.
Optical mark recognition is also used to fill in numbers at terminals
that sell lottery tickets.
OCR
OCR stands for optical character recognition. It is used to convert
paper-based text into computer text that can be saved and edited in a
word processor. The paper-based documents are scanned to produce a
picture of the document. Each character on the paper is then matched
against a library of letter shapes to choose the correct letter. This
is fairly easy on printed documents, but it is much more difficult
with handwritten ones. This is because the letter shapes vary a lot
and handwriting is joined together. Some systems use special forms
divided into squares. You fill in each square with a single letter in block
capitals. This reduces the number of possible shapes and it spaces the
letters clearly. Passport applications use this type of OCR form.
Choosing an input device
Most data is still input into computers using a keyboard and mouse,
but there are times when mare specialised input devices are useful.
When choosing an input device you need to think about the type of
data to be entered, the user and the job that they need to do.
,#
... ,
- ;
Output devices
t"lonitor

D Passport forms are read
by OCR technology
A monitor or screen is still the most essential output device. It can vary
in size from a tiny screen on a mobile phone to a giant plasma screen.
The image on a monitor is made up from tiny dots called pixels and
each one glows in a particular colour to make up the image. More
expensive monitors have more pixels per inch of screen, giving a more
detailed display.
OMR "ptlcal mark recognItIon
Tho. data IS entered by the user
shading in Doxes on a p, inted
sheet An example would be
answer sheets for multlple-
exams
OCR optIcaL character
ThIS can mvolve
scannIng a pl inted de.cument
and converting each letter
shape to a text character It can
.150 IOvolve form where the
usel wlltes aile letter In each
box, for examplt hI a passport
application
Form filling
Think about a busIness that
lovolves lo'cs of customers filling
out applIcatIon forms DeCIde or.
the two Input devICes to
and <lescnbP. the benefIts for o.)th
choKes GIve <lrawbaclc for both
of your chOIces
Printers (laser and inkjet)
Most home users tend to use inkjet printers that work by spraying ink
onto the page. They are cheap to buy and can be used for all types of
printing, from text to photographs or even printable CDs. The ink to
refill them is expensive and so they cost quite a lot to run.
Laser printers work in the same way as photocopiers. They use
powdered toner rather than ink to make an image. The page passes
through a fuser unit that heats up the toner and fixes it to the paper.
Laser printers produce excellent-quality text and they print quickly. The
cost to print each page tends to be cheaper than on inkjet printers, but
laser printers are more expensive to buy.
Printers also have memory stores, called buffers, built in to them.
The document is held in the printer memory store rather than in the
computer's memory. This frees up the computer memory so that it can
continue working at a good speed.
Speakers
Computers produce sound via speakers. Sometimes these are built
in LO (he computer (internal speakers), which are suitable for system
sounds (such as the beep that you hear whpJ1 an e-mail arrives) and
low-quality output. For music and highquality sound, most people
add external speakers for greater volume and sound quality. Earphones
are tiny speakers and can be useful if you do not want to disturb other
people around you.
Digital projector
If you want to produce a large image of a computer output, a digital
projector is useful. The projector is connected directly to the computer
and displays the image on a large screen. Projectors vary in brightness
(measured in lumens), and a more powerful projector will be needed
in a large room or a brightly lit one. The bulbs for projectors can he
very expensive, and they are likely to fail if not shut down properly.
Plotters
Plotters are specialised printers. There are
two main types. A pen plotter works by
moving a pen left and right over a long
strip of continuously moving paper. It can
draw complex outlines but it cannot print
large areas of colour. This type of plotter
was originally used to print engineering
drawings. A variation on this type of
plotter is to replace the pen with a cutting
blade which cuts through sheet material
such as vinyl for signs. Smaller versions
of these are also available for craft users
who want to cut shapes from card.
Plotters are expensive to buy and they
are usually bought by architectS and
engineering companies.
Chapter 1 Introducing ICT 19
Which printer?
Look again at ActIVIty 11 where
you compared computer
system$ Do some research
Into pnr,ters 'JSlnl; the Internet,
a computer magazine, or an
adveltislng leaflet. ExplaIn
whether you a laser or an
Inkjet pnnter is best for home
use Suggest s<'me models t:,at
mIght be SUItable for home use
and give ,"easons f('lr your
Buffers. tempor3ry $torag" aleas
In the prlllter that hold the data
waItIng to be pnnted
i-- - ------- - -
........ _ _ ____ , _t_ _ _
Control devices
Computers can be used to send signals that control almost any kind
of electronic device. This can be as simple as a light or a buzzer, or
something much more complex like a computerised arm. ActuatorR
are used to tum computerised motors and other devices on or off or
to adjust their speed. More information about control devices and the
software used to run them is given in Chapter 6, pages 87-91.
Choosing an output device
In most cases there are not as many choices of output device as
there are input devices. If you need paper-based output, you need a
printer. You can choose what kind of printer, and that will depend
on what kind of documents you produce and how many you print.
Similar choices will apply to other types of output device. In general,
more expensive devices will give you better-quality output and more
features. The important thing is to decide whether those extra features
are worth the additional cost for the job you need to do.
f
i
,I"I"f'4,,'ijU',Ei
D you ar2 walking do""" your local high
It has a bank, a supermarket, a newsagent
and a launderette. a list of all the Input
devices that may be used ",
o Describe what concept are and explain
two different uses for them.
D Which computel outplJt deVice would be rnost
use.,ul for the followIo'g'
a Printing photos at home.
n l,stening t" a musIc download
c Showing a summer hol.lday video
.. You have the foll,)wmg input deVICes keyboard,
mo)use, scanner Which would be the most SUitable
to use In the follOWing sltl'ations'
a To copy an old phot.ograph "nto disk
b To select an Item fr0m a meno
( To entel a set of exam results
D DeSCribe the mput a"d outpu" devices that a cashier In a supermarket
IS likely to 'Jse, and whai: t.hey might be used for
Kay farms
Actuators device$ that
an action in respon$e to) a Signal
from a computer
'--------
A< 1I' Examiner 's tip
four p"puia, input dovrce,
(e.g keyboard, ".,OU' touch pad
and anel three
popular Q"tp"! tlevlces (c g
screen. prlnler speakers] and
know what they are be.t used fl)r
Storage devices and media
Units of memory
All computer data is stored in binary form as ones (1) and zeros (0).
The smallest unit of computer storage is a bit, which holds a 1 or a O.
A byte is eight bits. A byte is very small, so it is usually talked about
in terms of kilobytes (KB), megabytes (MB), gigabytes (GB), terabytes
(TB). Each unit is about 1,000 times bigger than the previous one, so:
1MB is just over 1,000KB
1 GB is just over 1,000MB
1 TB is just over 1,000GB.
All types of memory and storage on a computer are measured in bytes,
so a computer might have 3 GB of RAeVl and a 500 GB hard drive.
Backing up
However careful you try to be, there is always the possibility that data
could be damaged or lost. Faulty hardware is a common reason for data
loss, but human error is even more likely to cause problems. It is so easy to
forget to save, or to delete a file by accident. For this reason it is important
to carry out regular backups.
How often data needs to be backed up depends on how often the data
changes. Businesses will nOlmally use mirrored server drives or duplicated
servers so that many copies of their data are saved each time it changes.
The type of storage media to be used depends on how much data needs to
be backed up.
It is best to store backup media away from the main computer, preferably
in a fireproof safe or in another building. You should also avoid storing
media anywhere that gets damp or very hot or cold.
Choosing storage devices
Hard drives
The main storage device for desktop computers is the hard-disk drive. It
stores a lot of data and is robust, fast and reliable. Hard drives are made
up of metal disks coated with a magnetic material. They spin at a very
high speed and data is read through a read-and-write head that moves in
and out just above the disk's surface. Most hard drives are a type of local
storage, and can only be used with the computer they are a component of.
Removable hard drives are also available. These usually connect through
the USB port. Their main disadvantage is that they take up a lot of room.
Optical drives
CDs and DVDs are known as optical media because laser beams are used
to record and read data. CDs hold about 650 MB of data. DVDs can hold
4.7GB or more. Optical disks have many uses. CD-ROMs and DVD-ROMs
are ideal for delivering software or films. Writable CDs and DVDs are
useful for transferring data and for backups.
Chapter 1 Introducing leT 21
Did you know
A.round 15 years ago. 2 GB h.rd
drive a iot for cI
running a school
Now far more data than that fits
on a mf:mory stlck and servers '1l1ll
l have sev .. ra( 1 B of storage.
Backups' copies of data stored
in case the onglnal is stolon or
COl rupl:
\
...A.
IJ II.rd drives store most of the date
on desktop PCS
fh" distance between" read
and-wnt .. head and t.h. magnetIC
disk of a hard dnve .. , only a
few nanomp.tms Th(\1 IS ctLrnoSl
10,OUO times tndn a
human haill
Reading and writing
USing the Internet or another
good source of Illformatlon,
find out what the difference
IS between CD-ROMs, CD-ks
and CD-RWs Whdt are
differences between DVO-ROMs
DVO-Rs and DVD-RWs?Think
about where each of these types
of CD and DVD would be used.
-- -
c -
. "'---. - .. -
--
Flash memory
'The newest type of memory to be developed is solid state memory. Flash
memory cards (which contain solid state memory) are often used in digital
cameras or MP3 players. Flash drives and memory cards are small and
ideal for fitting into portable devices or transporting data from one place
to another. 'Their size makes them easy to lose or damage, so they are less
suitable for backup. Solid state hard drives are becoming more common
and are used mosdy in laptops because of their small size.
Memory sticks, or pen drives as they are sometimes called, are based
on flash memory. They are fitted into a case with a USB connection.
They can hold several gigabytes of data in a very small space and they
are easy to carry around.
Magnetic cartridges
Magnetic carttidges, such as DAT tapes, are often used to back up
servers. Tney can have a capacity up to 160 GB in a very small
cartridge. Tape drives are mainly used for backup purposes.
Specialist storage media
Virtual memory
Virtual memory is a way of using the computer's hard drive to store
some of the data that would be stored in RAM. This makes the
computer behave as if it had more RAM and so it works faster.
Online storage
Online storage is becoming a popular method of storing data. Some
companies offer small amounts of online storage free. 'They hope to
encourage users to buy more storage space. Online storage has the
advantage of being away from the main computer and so it is safer in
case of fire or flood. There are security issues - you do have to trust the
company that is storing the data.
Storing and sharing photographs
Some websites allow you to store photographs online. 'They may
charge if you use large amounts of storage space. You can choose to
keep the photographs private or allow other people to see them.
..A-
U Flesh memory cards are often used
in digital cameras 0, MP3 player;
...A...
o A memory stick or pen drive
It irnpOiT3nt t o USf! storagp
medIa wr""tly The m.d,. should
be ",serted carefully WIthout
touchlllll recordmg <lIrface.
When you I .. move the me<iia.
make , ure the d"ve is not
flashing 1 he flashing lIght shows
that is being t r"m;ferred and
it will be c:orrupted If the dIsk IS
removed. Once yuu have
the mE'd,a, you should label on.1
stv" It ::alP-fully
CD links
www.flick . com allows users to
store their photographs online.
.. Why IS vIrtual memory an advantage for computer
users?
a ehTls IS worlcing on a school geography prc.ject
Q Describe two of uS!rlg storage
D Wh,ch storage IS most useful for
follOWIng
a Transferring small amolJnts of data between
comput2fs.
b B.cicmg up data on ",mputer.
c The ma'" computer storage
that req""es large weather maps to t.e saved In
add,t,')n to text and graphs to explain them eh,.,s
must shrJWthe project to her geography tea(her
at school but also want!; to work Oil It at home
Dls(uSS lo(al and online storage methods that eh'ls
could use .nd make a recommendatIon to her
Chapter 1 Illtroducing ICT 23
Communication networks and entertainment
A network is a group of computers connected together. The Internet
is sometimes called a network of networks. It connects computers all
over the world mostly using the World Wide Web (www) .
The development of broadband means that people have high-speed
Internet access at a fairly low cost. It allows businesses, friends and
family members to communicate using e-mail and instant messaging.
Businesses advertise their services and sell their products via e-commerce
websites. For many businesses, this means they can reach a wider range
of customers. Even a small business can sell its goods internationally.
The Internet provides ways for people to entertain themselves by
playing games or downloading music and videos. The Internet has
become a major source of information. For example, people can do
research for school or university or trace their family tree for fun.
The Internet also has disadvantages. Connecting your computer to lots
of others increases the chance of damage to your data resulting from
a virus. Not all communication is positive. Terrorists, criminals and
paedophiles use the Internet to t"Ommunicate too.
Local Area Networks and Wide Area Networks
A Local Area Network (LAN) connect<; computers that are fairly close
together, usually in the same building. lANs connect computers either via
cables or wireless technology A Wide Area Network (WAN) connects
computers that are farther apart. It uses telephone and cable networks or
satellites to transmit the data. Large national and international companies
are likely to set up WANs for secure transmission of their data .
Communication devices and media
Telephones and VolP/lnternet telephone
There are two main types of telephone: land lines and mobile phones.
Mobile phones are extremely convenient, but it costs more to make calls
on a mobile phone than using a land line. Mobile phones can also be used
to send SMS (text) messages. These messages are cheaper than phone
calls and it is now possible to send pictures or even video messages.
A new type of telephone has been developed fairly recently. It uses
VoIP (Voice over Internet Protocol). These phones use a broadband
connection to transmit voice messages to other users over the Internet.
Skype is one example of this. These calls are essentially free, as it is
included in the cost of your broadband connection. Some mobile-
phone companies are now offering free Skype-to-Skype calls.
E-mail and fax
E-mail is used for communication between businesses and individuals. You
type in your message and send it to the other person's e-mail address. The
message is sent to their e-mail server, where it walts until they download
it. E-mai1s arrive quickly and are cheap to send. E-mail, chat rooms,
forums and bulletin boards are dealt with in more detail in Chapter 5.
World Wide Web (www) a
,ystern of Internet servers that
s(rpport a ,.f web
page$ on the Inte",et which
hyperllnk to each other
Local Alea Network (LAN) iJ
, network computP.;s
In the same area/room/buliding
Wide Area Network (WAN)
a network that covers a
geographltal area larger thdn
a ';Jngle bUilding, It rnay hi!
national or global.
SMS ,hort message serv,,:e,
a systP.nI for serrdlng text
messages on mob!l. phones
"---- - - ---_ .. _---
Did you know
A home network (whIch IT'a)' be
Wifeless) IS both a LAN (lo(al r.o
the area of the house) and aLY>
I a WAN ("""dlr.g a"d "',"IVIlIi:
I inform_tlon over a drea)
I
f
j
- .. - -
-""' ... e.. __
...
Fax machines have been used less since e-mail has become popular, but
they are still used by some businesses. They work by scanning a paper-
based document and sending that image to the other fax machine
over the telephone lines. The advantage with faxes is that neither user
needs a computer, just a fax machine and a telephone line.
Network devices
Internet connections
Until quite recently most people accessed the Internet using a modem
connected to a standard telephone line. These dial-up connections
used normal telephone lines. They needed a modem to convert digItal
signals to analog signals that could be transmitted over the telephone
lines. These connections tied up the phone line, so you could not make
telephone calls when connected to the Internet.
In most areas of the UK, telephone exchanges have been adapted to
deliver broadband connections. These are much faster and do not stop
you using the phone at the same time. Most broadband contracts allow
you to stay connected for as long as you want for a fixed price. They
will usually have a limit on huw much data you can download.
Wi-Fi and Bluetooth are both wireless technologies based on radio
waves. Bluetooth is used mainly to replace cables as a way of connecting
two devices that are close together. You might use Bluetooth to send
an image from your phone to your computer. Wi-Fi is used to connect
devices to communications networks. An example would be using your
laptop in an Internet cafe or on a wireless network at home.
Internet connection speeds control how quickly you can download or
upload data. They are measured in megabytes per second. Bandwidth
measures the capacity of a communications channel. Broadband
services have a much higher capacity than narrow band, giving
faster data transfer rates. [f you want access to your home phone, 'IV
broadband, computer Internet services and music and video streaming
at the same time, you need a large amount of bandwidth.
Another way of connecting to the Internet is to use a mobile broadband
connection. This involves using a wireless dongle that contains a SIM
card. The dongle acts as a modem to connect the computer to the
Internet. The dongles will work wherever there is a suitable 3G signal.
Servers
Seryers are used to manage computer networks. There are various
types of server. File servers manage the files that you can save on a
school network. Printer servers manage printers and the print jobs sent
to them. Web servers store the files that make up web pages and they
allow you to view them on your computer. E-mail servers store e-mail
messages for distribution to users and forward them when requested.
Entertainment systems
TV (terrestrial, digitaL, cilble, broadband) and radio
Until a few years ago the only way of watching TV programmes was
through a TV connected to an aerial. This is known as terrestrial rv.
Modem electrOniC device used
to ())nnect c.omputers via a
telephone line It converts digital
data to analog and vICe versa
Digital signlls signals that take
on only two values. off or on, In
code
Analog signals electrical signals
that vary (ontmuously
BandWIdth the rate at which data
can be transferred If bandWidth
IS too I.ow, data is transferred
veryslowiy
Dongle a small piece of hardware
that connects to a computer's
USB port It allows a (.omput.>r
user to use certain pieces
of 50ftwdre Most Wireless
broadband
a. part of tileir modem deVices
SIM card sub.crib<>.r Identity
module (ard, a small electroOic
c.ard Into il mobile
phone that a ID
fOI Iflat
Did you know
Internp.t proVider') often
lugh data tr unsfer speeds,
but most people's connections are
much 510'.".1 You can cher.k your
<.Oon,,<.:tlon rate at wv:w topl0-
broad hand co
..A-
m A donyif! atts a moJem
....onnect a romputer to Internet
Many cable companies then started to offer TV services delivered
through a network of underground cables. Over the next few years all
of the TV programmes offered in the UK will be digital. Many users
already watch TV through a digital service, using a set-top box or a
digital Tv. It is also possible to watch TV or listen to radio programmes
on your computer using a broadband service.
Home entertainment
Because TV programmes are delivered digitally, they can be stored on
hard drives just like any other computer data. This means that you
can record TV programmes to watch later. Digital TV also allows live
TV to be paused and restarted later. People can now have integrated
cr:tcrtainment systems linking Tv, video and music on a range of
devices across the home. Games can be played on a TV screen because
that data is digital too. TV has also become interactive through digital
services. Viewers can take part in quizzes or vote in online programmes.
Music and film downloads
Instead of buying music on CD or films on DVD, many people now
download content from websites. MP3 players are small and make
it easy to carry around a lot of music and videos. The legal issues
surrounding downloads are dealt with in detail in Chapter 7.
.. What equipment do you ne.d tC' be able to view digital TV?
II Descoibe diffecent ways you could your I.aptop tC' the
Intemet
II When viewing a programme, what are the advantage, (If digital TV?
II Why would Amy buy a musIC download rather than a CD:'
l1 New TVs use technology Explain how thIS cai' be lIseful in
terms of an Integlated e"teltalnment system
In this chapter you will have lea""t:
II' the difference between hardware and software
II' the main hardware components that make up a computer system
II' about the operating system
II' using computer systems and seeking help
II' the features of a variety of input and output devices
II' the units of computer memory and the types of memory available
II' the uses of communication networks and entertainment
systems.
Chapter 1 Introducing ICT 25
Remember
, '.Vh'l'!'r! abr.ltlt a"TV
i ]J.-l ).grllnm {;'? ' f ":,;Bl . \n':, '
! '::"l, ml< :)tlt ::;
1 t1as 'Wj t , ';TI '
l .- " .; ..... I

entertainment
systems that combine
a I ange of deVIces offering
visual. muskal, Video, audiO and
gaming enteltdlnmer,t,
(.:orJ!u(!.s are llset.i tn t rad,: yenu
webSite allow,ng the
to \remflmber' you it can
lhen t.>rgp.t the
you 5(,'C, on what you
htlvp. tooled at so 1 ar Tnt-
website sto",..s a .>nmll text file
on your th.t gives It
information dbout your ar.tiv,ty,
If YOll go back to the
yow browsel sends the moki.,
back to the servel Th. hyperlmb
yu" have alre<ldy
will In rhe 'clicked' I,ther
than 'uncllCked' colour Many
USt: t o t rcK.:k.
on lim.' trallsactl{)IlS (what you
hd"" bought).
- - - - -- - - ---
AQf:,,./' Examination-style questions
Answer all questions in the spaces provided.
1 Which one of the following is not an input device?
A Keyboard B Scanner
c Hard disk drive c Joystick (1 mark)
2 Which one of the following is not an output device?
A Screen (VDU) B Plotter
c Laser printer D Microphone (1 mark)
3 Which one of the following is not a storage device?
A Thuch sensitive screen B Floppy disk drive
c CD-ROM drive D Magnetic tape unit (1 mark)
4 Which one of the following loses its contents when the computer is switched off?
A ROM B RAM
c Hard disk D Floppy disk (1 mark)
AQA. June 2007
5 Modem computer systems make use of a variety of methods of data capture, some of
wruch are shown below.
A bar-codes B data logging c feedback
D magnetic strips E MICR F OCR
G OMR H questionnaires I sensor
From the list given above, choose the most suitable method of data capture for each
of the applications given below.
(a) Used to input students' answers to multiple-choice examination questions. Students
put a mark in the box next to their chosen answer.
(b) Used to collect information from parents about planned changes to length of the
school day.
(e) Used to input information from groceries at the supermarket checkout.
(d) Used to input information from a credit card when paying for petrol at a garage.
(e) Used by banks to input cheque details including the value of the cheque.
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(J mark)
AQA. June 2008
6 Below is a list of problems that people come across when using reT.
A Paper jam B Storage full
c Software freeze D Uninstalling software
E Shortcut not working
Which problem is being described?
(a) The output on the computer's screen does not respond to input from the keyboard
or mouse and the display remains unChanged.
(b) An error that occurs when attempting to save a 2 gigabyte "ideo file on to a CD that
can store 900 megabytes. (2 marks)
7
8
Describe four tasks that are carried out by an operating system.
Daniel Chan has just started a new job as a reporter on a loc.a1 newspaper. He has to
choose a password to use on the newspaper's WAN.
(a) What do the letters WAN stand for?
(b) Why would it be essential for the newspaper to be connected to a WAN?
(4 marks)
AQA, june 2006
(1 mark)
(1 mark)
AQA,june 2008
9 An estate agent, who sells and rents houses, is about to install a new computer system.
(a) Which two of the following would be the most useful input devices for the company?
A A monitor
D Amodem
B Amouse
E Ajoystick
c Ascanner
F An OMR reader (2 marks)
(b) Which two of the following would be the most useful output devices for the company?
A A monitor 8 A dot-matrix printer c A scanner
D A colour laser printer E Ajoystick p ACD-ROMdrive (2 marks)
(e) The estate agent is going to install a LAN. What does the ahbreviation IAN stand
for? (1 mark)
(d) Which two ofthe following are advantages to the estate agent of working on a LAN
rather than stand-alone machines?
A Reduces expensive telephone calls
B Reduces costs as users can share peripherals
c Allows access to the Internet
D Users can share centrally stored files with details of houses
E The estate agent will be able to work at weekends (2 marks)
AQA, june 2006
10 (a) Which one of the following best describes a smart phone?
A An electronic handheld device for playing games only
" An electronic handheld de,'ice that integrates a mobile phone with a personal
digital assistant and web access
c An electronic handheld device which has a smarter appearance than a standard
mobile phone
D An electronic handheld device that operates a television. (1 mark)
(b) (i) Describe two advantages of using a smart phone compared with a landUne
phone (traditional 'home' phone). (2 marks)
(ii) Describe two disadvantages of using a smart phone compared with a landline
phone (traditional 'home' phone). (2 marks)
11 Most personal computers contain a video card. Describe two activities where it is essential
that the computer has a high-quality video card. (4 marks)
12 You will be marked on your ability to use good English, to organise information clearly
and to use specialist vocabulary where appropriate.
A home owner is going to buy a new entertainment system. She is considering buying a
terrestrial TV with surround sound, wruch is cheaper, or a digital integrated entertainment
system, which is more expensive. What are the possible advantages and disadvantages of
each type of system for the home owner? Explain your answer with reference to usability
and entertainment issues. (8 marks)
Feasibility studies
One of the main purposes of any lCT system is to solve problems.
When a new lCT system is being developed, it follows a path called the
systems life cycle. The life cycle has eight main stages. The system is a
cycle rather than a straight path because at some point a new system
will be needed and the procedure is followed again.
Most organisations use ICT systems to assist with work. They might use
them to keep track of their finances, produce a product, manage their
stock - it all depends on what the organisation does. From time to time
they will introduce a new system. This might be to update the one they
already have, or it may be something completely new. When a business
or organisation is considering a new lCT system, the first thing they
will do is carry out a feasibility study.
If something is feasible, it means that it is possible to do. It does nOt
necessarily mean that it will succeed, but the chances are that it will be
worth going ahead with. A feasibility study is a process that is carried
out to decide whether a project is worth starting or continuing.
Gat hering information
The first part of a feasibility study is to find out why the organisation wants
a new system. It mar be because it might help them to solve a problem or
perhaps meet some need that the organisation has. F'Or example:
A business may have become very successful and need an updated
computer system that can cope with the larger number of orders.
A school might decide it would like to be able to keep better track
of the progress of its students.
A jeweller working at home might decide that selling their products
through a website may attract more customers.
What information is ne!:d!:d?
Remember that the purpose of a feasibility study is to decide whether
to proceed with the project. There will be time for more detailed
analysis later, but for the moment the important information is as
follows:
Who is the client? Is the system going to be for an individual, a
business or some other organisation? A little bit of background
information is useful.
What is the problem? What does the client want the new system
to do?
How is the problem currently handled? There may be a manual
system in place, or pethaps a computer system that is no longer
Objectives
Understafld .he purpose of
feuibllity itudies in the analysiS
of new 01 existing s y t ~ n u
UndN,tand the use of
IfltclViews. questlonmures and
obSHValion when analysing
systenu
Identify the s.,ges ofthl!
sYitems life cycle ilnd apply
them to uilmples in Industry
Idelltlfy reliable sources 01
information.
Key terms
Feasibility study an tnvp.st.lgatlon
to dedde whethN It IS worth
proceeding "11th iI project or mIt
Client the person who wdnts the
ilewsystem
good enough. If the problem is a new one, there may be no current
system at all.
Who will use the system? The client may have decided that the
system is needed, but they may not be the user of it. Will their staff
use it? Will they manage leT support within the organisation?
What resources are available? This might include existing hardware
and software, but people are also important. Their skills are an
important resource. If the users' skills need to be improved, then
training will need to be arranged to suit their needs.
What is the time scale? When does the new system have to be
working?
Techniques used to gat her information
Interviews
The most obvious way of finding out what a client needs is to ask
them. It is difficult to imagine developing any system without talking
to the person who needs it. Interviews are very useful because they
allow discussion. One person can ask a question, the other person
gives their answer, and they can both talk about anything that is
unclear. Face-to-face contact allows you to see the other person's
facial expressions and body language. They also help to build trust.
Interviews can take up a lot of time, and it is easy to wander off the
main topic, so it is important to prepare in advance.
If the project goes ahead, much more detailed follow-up interviews will
be needed as part of the analysis of the system.
Questionnaires
A questionnaire can be given to lots of people at once. This is a quicker
way of gathering the information than carrying out lots of interviews.
Questionnaires tend to be cheap to produce and administer. They can
be answered anonymously (without revealing the identities of the
people who answered them) and completed at a convenient time.
A well-designed questionnaire may also be easier to analyse on
computer than the results of an interview. This is because the
responses that can be given are mucll more limited, especially if closell
question are used.
An open question allows the person filling in the questionnaire to
write anything at all. A closed question limits the responses they can
make. Not everyone likes filling in questionnaires and some may
deliberately include silly answers.
Key terms
User_ the person who Will .ctIJ.tiy
the system.
Closed questions questions
where the answers are limited
and the response has to be
at the options given
Open questions where
the person can give dny answer
dtan
Open question: HOI", oftl3n do you use the
internet?
Closed question: Do you use the Internet:
a Every day?
Responses ,;ould be any of the following or
something else 'quite a lot', 'not much', 'every
evening', ",hen I feel like it', 'only when I need to',
All of thuse l esponses are valid, but they do not
make It very 8asy to analyse the results.
b Three or more days a week?
c Fewer than three days a week?
d Never?
The closed question gives a much clearer picture
of how often the sample of people surveyed use
the Internet. The answers can be gathered and
easily analysed,
The number of people that the questionnaire is given to is known as
the sample size. The bigger the sample size the more reliable the
results should be. However, a bigger sample will cost more and take
longer to collect and analyse.
A paper-based questionnaire is quite simple to produce, but all of the
results have to be entered onto the computer manually. The same
questionnaire filled in online can be linked to a database so that the
responses are captured automatically. This speeds up the process and
may reduce errors. If the questionnaire only includes closed questions,
OMR (optical mark recognition, for example an answer sheet for a
multiplechoice exam) forms might be a suitable method of collecting
the data. This type does need specialised forms and software.
OCR (optical character recognition, for example a passport application
form) forms are also a possibility, with the responses written letter
by letter into squares drawn on the form. Again, specialist equipment
is required. OMR and OCR should be considered if there are a lot of
responses to analyse.
Observation
It can be extremely useful to watch an existing system working. You
can sometimes notice things that the people using the system are not
aware of. Observation allows you to make your own decisions about
what is happening in the system.
Your results are not likely to be affected by biased answers from users.
If a system is used for a long time, people get used to it and take
certain things for granted. Someone else watching that system may
spot t.lllngs that slow it down. Observation does not interfere with the
running of the business and you may notice things t.o.at have not been
thought about or discussed in an interview or questionnaire.
Feasibility report
At the end of a feasibility study you will need to write a report to sum
up what you have found out. This would need to cover the follo'wing
points:
if the system is likely to be feasible in technical terms, whether a
system can be made that will solve the problem
the most likely way of producing the solution
whether the cost of the system fits into the budget available
whether it is possible to get the system finished in time to meet the
deadline
how the developers will judge whether the final solution is
successful.
The stages of the systems life cycle
FeasibiLity study
A feasibility study is the first stage in developing a new system. Once a
new system has been produced, it is not really finished. The system will
need to be maintained as things around it change, and eventually the
decision may be taken to replace it. At that point, the cycle starts again.
Key t9rms
Sample size the number of
questIonnaIre!: that are gIven out.
_ . . _ . __ .. _______ ..J
Remember
!t i: lH;h1' Pf)::Slbl<-:: b) :'
i YO;j1
! -,:.:':-\'0 f"::UVl t!f cJ. tout iA {-.';" "; ) ::' ....
1 ;::f:H:"I .;Si(' I: .
...... .. _._--_ .... ,- - ------'
to, fi',J;ibJii ty :1t ',; .";'f ;S <In
iook ;.:.! P( D!Jk wmI1:hf.
t , I'hcl Vihl-ltl HH 0.:: 1'
("o:1ti ull{!, \1';1."'1':: rlr?'t:;c;tt;",j
bo:.' ::::lrr l . tJ tT

- -
31
- -
Monitoring
and
maintenance
Evaluation

Feasibility
study
Sy.toms
Ufo cycle
User training
and documentation
Systems
analysis
System
testing
o The systems life cycle is a continuous process
Systems analysis
Design
Implementation
A feasibility study involves analysing the current situation, but systems
analysis does it in more detail. The aim is to state exactly what the new
system needs to achieve. It will need to examine:
What data needs to be input, its format and the quantity of data. For
example, are there likely to be five transactions each day or 500?
What information needs to be produced and in what format?
What processing will be needed to turn that input into the correct
output?
What hardware and software are currently available?
Who will the users be and what are their skill levels and training
needs?
What performance criteria will be used to judge.the final solution?
Design
The first phase of the cycle defined what the new system needs to do.
The design phase deals with how the system is going to do it. It also
specifies how the system will be constructed. It is during this phase
that plans are drawn up regarding how the system will be tested.
Plans for construction
Time planning
First it is necessary to write down a list of tasks that need to been done
as the system is being built. The next job is to set a time to complete
each of those tasks so that the overall system is finished in time to meet
the deadlines (these are sometimes called milestones).
System design
The exact design tasks that will need to be completed will obviously
depend on the system that is being produced. However, in any system
it will be necessary to consider how it will work and what the user
interface will be.
ACE' Exammer 's tip
Learn the order of the main
parts of the systems life cycle,
which are Analysis, Design,
i
lmPlementation, Testing,
Evalu"tl"" (which makes a (UIIOU'
word 'ADITF.')
Dfdyou know
Because flilalysis IS such an
important part of dcvelopll1& new
ICT systerru., the job of a
I analyst IS well respected and well
Pdld Within the leT Industry
CDiinks
www.connexions-direct.com/
Jobs4u is a searchable database
that can give you more information
about training to be a systems
analyst and other jobs in ICT.
Functional design
At this stage it is necessary to decide what software will be best for
building the system. Sometimes that will mean choosing between two
different types of package, for example a spreadsheet or a database.
Sometimes it might mean choosing between two similar packages, for
example two different web authoring packages with different features.
Once the package has been selected, a decision has to be made about
how to use the functions it provides to make a system that works
efficiently. The content, its layout and how it will be formatted are
considerations that must all be addressed. Then the designs must be
documented in a way that is appropriate for that package, for example:
Spreadsheets - a sheet for each page showing which cells will
contain the text, numbers and formulae. It is also necessary to show
what the formulae are and what they do. Other features such as
validated cells and conditional formatting should be shown too.
Websites - a sheet for each page of the site showing the
on them and how the sheets are linked. It is also good practice to
produce a list of files that will be linked in, for example graphics,
videos and text files, and where they will be stored, so that the
hyperlinks will work efficiently.
Illterface design
Hardware
The user interface controls how the user will interact with the system.
It involves the input and output devices they will use as well as the
screen layout they will see. Input and output devices should be chosen
with both the user and the task in mind. (Input and output devices are
covered in more detail in Chapter I , pages 16-20.)
A. bar-code reader is a useful device. It is easy to use and has built-
In ,'alldatlon, which speeds up data entry for the user. However, it is
unly pGsslble to Input numbers, so it is only suitable for applications
;" here long numbers need to be input. A school library is a good
tlxample of a bar-code reader is a useful input device.
Screen layouts
The screen layout needs to be suitable for both the user and the task.
An interface with bright colours and bold shapes might be suitable for
an educational game for a young child, but it would be very tiring on
the eyes of an adult user entering data all day. An interface for a very
young child should use little or no text, relying much more on pictures
and sounds.
When designing a system that is to be used for long periods at a time,
consideration should also be given to the health and safety of the user.
The screen colours, fonts and font sizes should be chosen to make
the screen easy to read without making the users' eyes too tired. It is
necessary to think about the ease of use and the risk of repetitive strain
injury. It is best to avoid the user having to scroll around the screen
more than is absolutely necessary. Using check boxes and drop-down
lists can avoid the user having to type in long pieces of text.

Chapters 3 ana 4 (pages 38-53 and
56-68) give you more in:orma tion
about software features that ;,eed
t o be considered in the functional
design ,tage.
Design sheets
A design sheet should be made for all of the screens in the system. The
design sheet should show the sizes and colours of the objects on the
screen, with an explanation of what each object does.
Testing plan
There is no point in building an Ief system that does not work or is
difficult to use. The only way to be sure that a system does what it
needs to do is to test it. It may seem strange to plan the testing this
early in a project, but it is important to decide what needs to be tested,
when the testing needs to be done, how it will be carried out and what
data will be used.
The testing that is required will depend on the software being used:
Spreadsheet - is all of the data and information displayed correctly,
does each formula produce the correct answer, does the validation
work as expected?
Website - are there any spelling mistakes or grammatical errors, do
the pictures display correctly, do all of the hyperlinks go to the right
place, do the pages load in an acceptable time, do the pages display
on a range of browsers and at different resolutions?
Database - do the searches produce the correct results, does the
validation work as expected, do the forms and reports show the
correct fields and is all of the information displayed correctly?
Multimedia presentation - does the presentation load and run
correctly, does it contain the correct information, are the text
and graphics appropriately sized, are the timings for each section
correct, is it suitable for its target audience?
The tests above are all concerned with how the system works, but
every system should also be appropriate for its user. This means that
the users need to be involved with the testing. They can then give their
opinions about changes that might need to be made.
At the end of the design phase there should be:
a list of all the tasks that must be done and the deadline for each one
a set of designs that show how the system is to be built
a testing plan that states the tests that will be canied out, what data will
be used for them, and what the expected result of each test should be.
Implementation
Once the designs have been completed, thc system needs to be built.
This is known as implementation. Implementation should follow the
plan for construction, and each feature will need to be tested as it is
produced, following the testing plan.
As a solution is implemented, it may tum out that the deSigns need to
be changed. This may be because the original designs did not work or
a better way of doing something has been discovered. That is fine, but
the changes should be documented.
At the end of the implementation stage there should be:
a working system
details of any changes that were made to the designs.
Good testing IS to
il project fall, or at tea"t to test It
to Its lim.!,
Iflrms
Valir!at.,n' "nsures that ddta IS
"""siht,, 111 the In
11: ;5 bell1g usee fl)r example,
a percentage Indli< for an
IiIXdrmnatlon not be
than 0 nr more than 100
-_ ... .-_ " ... "._-----'
, VilUdatlor. C(ti"! redll.:e data
I errol>. but It cannot stop th.?rn -
occumng at a
o
, A datp of bilth
enterM as 06/07/2000 might
vallO, but !f an error has becon
m3d@ and the pCl'Siln acn;a!!y
b<>rn 07106/2000. wOllid
be wrong record
shOUld be r.hecked ttiP.
",r;tten form !t entered from
ThIS IS c.diled venflcatlon
System testing
As mentioned above, testing is not something that just happens at the
end of a project. It needs to take place as the system is being built, so
that mistakes are corrected before the next section is implemented.
This is actually a natural way of working. For example, if a formula
is written into a spreadsheet cell, it is natural to make sure it works
before moving on to the next task.
It is important that a record is kept of the testing that is carried out and
the results of it. If changes need to be made as a result of tests that fail,
then that needs to be documented too.
User testing also needs to be documented. After all, there is no point in
producing a system that the user is not happy with.
User training and documentation
In the analysis stage of the life cycle, the users' skills were established.
From this the amount of training that each user needs can be decided.
A novice user will require more detail about each step of the process
than an experienced one.
Most systems will also need some technical documentation that
shows how the system works and what its structure is. For example,
spreadsheets should show details of formulae, validation and cell
protection. This is because at some point in the future the system
may need to be changed, and someone will need to understand its
structure. The design sheets may form part of this documentation.
Evaluation
Evaluation is an important stage in the life cycie of a system. It involves
looking carefully at the system that has been produced and deciding
whether or not it does what it set out to do. At the end of the systems
analysis section, a list of perfonnance criteria is produced. These will
help decide how successful the implementation has been.
An evaluation looks at each of the performance criteria and judges
how weJl the system matches them. If some of the performance criteria
were not met, it examines the reasons for that and what can be done so
that the system does match the criteria.
What next?
Another question that should be asked at this stage is: 'What next?'
This looks at how the system might be developed in the future. This
might be to improve the current system or extend it to do more things.
Self-evaluation
At the end of any major task that you carry out, you should always ask
yourself how well you think you did it. Identifying your strengths and
weaknesses will help you to improve your performance on the next
task that you undertake.
It is important to be realistic rather than to grumble about things.
For example, it is not appropriate for an evaluation to say; '1 did not
complete my testing because my user was too busy to see me'. The
truth is more likely to be, 'I did not book an appointment with my user
in advance, and so he was not able to test my system in time for my
Old you know
User testmg IS sometImes called
'beta testing' Beta IS the second
letter 'n the Greek dlphabet.
Beta testIng I< often the second
stage of the system test.
Performance criteria' ,tdtements
of what levels of pPlformance
the fon,she<! plodlJct should
have An example mIght be that
a web page must link to another .
speCIfied web page .
Performance criteria
Choose two websltes selling
products aImed at young people.
DISCUSS what YO" th",k
the websites set out to
do and make a list vf the
performance criteria fo,- the
websites.
Evaluate the websites .gamst
those performance cnteria.
Compare the good and bad
points of each
/\.0
11
Exammer 's lip
Know that evaluatIon
periorman,:e cnt.eria are
in order that they can
be chpcked ','Vhen the systp.ms
cyde IS complete - they spt!':Jfy
wh.t ,stem should do and
hew it should
final deadline'. That statement is useful because it identifies that it is
important to book appointments.
Monitoring and maintenance
Delivering a new system is not the end of the systems life cycle. The
system needs to be monitored. That means keeping a close eye on it to
make sure that it continues to perform at an acceptable standard.
Over a period of time, the system may need to be maintained for a
variety of reasons, for example:
errors may be found that were not discovered in the original testing,
and these will need to be corrected
the situation itself may change, for example an invoicing system
that adds VAT at 17.5 per cent will need to be changed if the VAT
rate changes to 15 per cent
the user may decide that a new feature needs to be added or an
existing one changed.
This maintenance happens all the time with commercial software. Anti-
virus software needs to be updated to cope with new viruses that have
been produced. Operating systems need to cope with new hardware and
software or new security threats. Often these updates are carried out by
downloading a patch from the company's website. Eventually, the client
may decide that the system needs to be completely redesigned or replaced,
and so the systems life cycle startS again with a feasibility study.
Information sources I
At various stages of the systems life cycle information will be needed.
Some of that information will come from people, using interviews or
questionnaires. At other times it will be necessary to use other sources,
some leT-based and some not.
These days, there is a tendency to assume that the Internet is always
the best place to find information. Websites certainly have lots of
information, but they are not always accurate or truthful .
Other web-based sources may include pod casts and blogs, wikis
and online databases. Pod casts and blogs may be from professional
organisations, such as the BBC, or they may be posted by individuals.
Anyone can add facts to a wiki, and there is no guarantee that they will
be accurate.
CDs and DVD-ROMs can be a good source of accurate information.
These sources of information will have been checked before they were
published and they are likely to be accurate. Electronic material may
be easier to search than paper-based books. Many books are now also
published in an electronic format, known as an e-book. If you need
information that is absolutely up to date, these sources may not be as
suitable as websites and newspapers that are updated more frequently.
Magazines and newspapers can be useful sources of information.
Specialist magazines are available on many topics and they often
contain good comparisons of products. National newspapers may give
you national and international information. Local newspapers can be
an excellent way of finding out about suppliers in your neighbourhood
and events that are happening close to where you live.
Key'ermit
Patch a of code that
updates a software
Patches are often downloaded
from thE" software cornpdny's
webSite
Examiner 's lip
Learn about a val iely of
Information sources (books,
newspapels, magazines. CD-
ROMs, wiklS, poded,ts, blogs)
Know which iire more likely
to bE accurate (books, certaon
newspapers, CD ,1\0,.15, podeasts
by oigal1lsatIOi15)
ODlinks
Podcasts, blogs, wikis and online
databases are covered in more
detail in Chapter 5.
-f,nl.UI:\'!'
:,{ .,'-. ..-"

I:, j"C'
'ie .!. :ti'l,J h:) ',"': :" .. . ;-i
yOd t l t.l !>t
1;;)'; inr,"){";1'."tmn"l I
i:5 t hd;: :iio;t,
\. t:t:l d ::TJoi I.,.', jd C!{
t:d"; ;':'::" bl.:ls i}
ODlinks
an online
database that allows you to search
for information about any area
based on its postcode. You can
find out information about the
area itself, such as crime rates and
property prices. You can also look
for suppliers of goods and services.
Finding good-quality information
In order to check the quality of your information:
Check the information you find with another source. This will help
you to check that it is accurate and not biased.
Look at the uri (web address) of any websites you use to help you
to find out who created the information.
Check the publication date. In some cases, especially when looking
for information about new technology, you need to make sure the
information is up to date.

Is .)h':h! inTOflYPf.k./ ' j ..a1lU
way cf sa:c ynu (If:! j'
ilidudp. 1)\ 7.'J
? ,-. r YOH
r :H nt-I I"flrt ;! .,,",l St
("piIo1g :1-.. mtoj'lj"l?1 Ir:;n
. = tu
D A shopping centre would like an
mformatlon system to shoppers fin,j thel,.
wayaroun<:l You have boen asked to carry out a
feasIbIlity study help them decide ",hether r. ..
not to go ahead G,ve c'ne example r.f where you
would use
II Once the shopping centre system IS up and
running, it mIght need maIntenance Give tw\l
SItuations where might be needed
,. Intervle\..tS
b questil)nn."es
c
o YI)U are deslgnmg the mter system for the
shopping ce"tre usmg a touch screon for inp'Jt and

What featur.s of a touch screen make It SUitable
for use In a shl)pprr.g centre?
b What would you need to carry out on such a
system? Give reasons for yOIJr answers
a An \lnlme shr.pplng site has a fOlm that ClJstomers
fill 10 tu .n Older The deSigner has been t\lld
to use validatIon possIble
" Explain what validation means .nd why
designer has been asked t\l use it
b Give three fIelds that could be validated and
describe a diffolent 'type of valodat ion used fo ..
each onE:'
o A spreadsheet 15 used to keep tcack
of sales forecasts In a large company
tWI) types of user documentation that might
needed for users of this system
In this chapter you wil/ have learnt:
AUA bam/ner's tip
v that leT systems development follows the systems life cycle
v that a feasibility study is carried out before proceeding with the
project
v that systems analysis defines what the system needs to do
v what needs to be included when designing a system and a
testing plan
v t hat implementation means building the system
v that a new system needs to be tested thoroughly to check that
it works and the client is happy with it
v that users need documentation that suits their skill level
v that analysis helps you to build a better system next time
v that systems need to be monitored and maint ained
v how t o find good-quality information.
You could try making a table "f
t he sources you lOt'k at, giving
each of them a mark (Jut of
for relevance, atcuracy and
I Yow r.an then go back and
, the be,t 0"5
AQ,b/ '\ Examination-style questions
1 The stages in the development of a new computer system include Analysis, Design, Implementation,
Testing and Evaluation. Below are some of the tasks that usually take place during the production of
a new computer system.
-' Considering how well the new system works B Deciding the features of the software needed
c Entering test data 0 Finding out how the present system works
B Planning screen and report layouts F Preparing a test plan
G Setting up a suitable database H Setting up perfonnance criteria and desired
Suggesting future improvements to the outcomes
new system
For each of the questions below, write the letter or letters for the answers.
(a) Which two of these would take place during the Analysis stage?
(b) Give three ofthese that would take place during the Design stage.
(e) Which one of these would take place during the Testing stage?
(d) Give one of these that would take place during the Evaluation stage.
(2 marks)
(3 marks)
(1 mark)
(1 mark)
AQA, June 2008
2 Which one of the following would be most useful for finding information to write an article
about the Prime Minister?
A a web log B an online database
c a text message o an Internet search engine
3 How does verification help to ensure the accuracy of data?
(1 mark)
(2 marks)
4 A travel company is going to install a computer system for the staff to book holidays online.
5
They need to design a user interface for the holiday booking system.
(a) Which one of the following is a type of user interface tbat could be used for the new system?
-' Sensor driven B Link driven c Menu driven (1 mark)
(b) Which one of these factors should be taken into consideration when designing the new
user interface?
A Consistency of layout B Cbeap bolidays c The need to take regular breaks
(1 mark)
(e) Give two other factors that should be taken into consideration when designing the new
user interface. (2 marks)
AQA. June 2007
A college has just developed a new computer program for processing examination results.
The system needs to be tested using a test plan.
(a) At which stage of the systems life cycle would the test plan be produced?
(b) Which two of the following would you expect to find in the test plans?
A A printout of the computer program B A list of all tests io be carried out
c An annotated design of the program 0 Changes to be made as a result
B Expected results of testing
(e) Give two reasons why a test plan is needed.
(1 mark)
(2 marks)
(2 marks)
AQA,June2008
Applications software
It is possible for you to write a letter, produce a ptofessional-looking
poster, design an animated presentation and create a website all whilst
sitting at your computer. The software that enables you to do this is
called applications software.
Each type of applications software is designed to enable you to
carry out a specific type of task. In this chapter you will learn the
main features of each type of software, what sort of tasks can
be accomplished using the software, and how to select the most
appropriate software for a given situation.
Applications software is designed to carry out user-related tasks to
solve problems. The software is task specific. You will have used a
number of different types of application software already. Table A lists
all of the types of applications software along with examples of each.
Microsoft Publisher, Adobe Serif
Pageplus
---_ .. _- .. -.---.. .
Presentation saft'\la. t;> Microsoft PowerPoint, OpenOffice Impress,
Starlmpress, GoogLeOocs Presentation
_ . __ .... --_ ..... ---_. --_.. _--_.
.. _. ___ . __ .. _ Photoshop, GIMP, Imagine!, Ultimate Paint
Web-dE>slgr, _ __ .....:A=d::o::b::e.:D::.,e::a:::m:::w:::e::a::.ve::,.!.;, 5::.::;'i::.fW.::.:.::;bP::I::us:..... _ _ _
Other examples of applications software include everything from
graphics manipulation software to spreadsheets, databases and web
browsing. You will learn more about these types of applications
software in the next few chapters .
Generic features of applications software
You can do lots of tasks using software. You might want to produce
a music track or create a newsletter. These tasks might seem very
different, but the software used has some common features. For
example, you might want to copy and paste a sound file, or copy and
paste a name. These sorts of features are called generic features.
Here are some generic features and a brief description of each:
Help - this provides assistance on how to use the applications
software. The help library Can be installed on your computer and it
is also onlioe.
Objectives
Know what kind of appl ications
software is available and what
type or tasks each 15 used for.
Task specific applir;atlDns software
I., task speCific It ha. a
of that are desJgm.'<I to
cany out particular jobs
Generic features that
appE'ar in mdny type.,
of applications softwer.
At)}\ Exami ner 'S tip
You need to be famil iar With a
range of application, software By
uSing d,fft'rent types of softwarE:
you will!parn which featuret are
genetic and which are unique to
t hat type or applications
Chapter 3 Applications software 1 39
Edit text size size is usually measured in points. Paragraph text is
typically between 8 and 12 points.
Copy - this copies the current selection to the clipboard.
Cut - this copies the current selection to the clipboard then deletes
the selection.
Paste - this inserts the contents of the clipboard.
There are many more generic features in applications software. For a
full list of these see the AppendiX on pages 131-136.
Open source and proprietary software
Open source means that the software code is freely a\'ailable (at no cost)
for people to use, copy and edit. An example of open source software
would be the Linux operating system. Linux is free to download and use,
and software developers can also view and edit the code.
Proprietary software is software that you pay to use, but you are not given
access to the coding behind it and are not permitted to edit or change the
code. An example of proprietary software would be Microsoft Windows.
People pay to use Windows, and the coding behind it remains secret.
Advantages of open source software
The software is free. Proprietary software can be expensive.
The software code can be developed by a community of developers
in a collaborative way. This results in rapid addition of new features
and fast fixing of any bugs.
It can be customised for specific applications.
Advantages of prcprietary software
The developers of proprietary software usually provide a good
service, and good followup or customer support.
The software usually comes with automatic updates - this is not
always the case with open source software.
The company is responsible for the integrity and legality of the code
it is selling. It must ensure that the code is robust and won't cause
harm to a computer system .
Hosted and locally installed
applications
.. .. r

Generic features in two
different applications
Open a WOld-processing
package like MlCmsoft Word
Choose features
from the task bar USlflg the
Help feature, find out
to use each of your chosen
f2atllres.
Create a table cOilt"nlng
each of the five features and
a short description 01 each
Now these steps, thiS
time 'Jslng 3pplications
software such as Starlmpress,
.'\dobe Photoshop Elements or
Microsoft hcel Note that not
every Single genenc feature
IS found il1 aU applications
A genenc featLore appears In
mO)st applications, but there are
exceptions
- e"
' ... .... .... _ "1- . ..... .. . > '" - .. .... o:-- ::t
Historically; all applications were installed locally
on your computer. More recently; with widespread
access to fast Internet connections, some software
is run on central servers and accessed online.
These are called hosted or web-based applications.
Common examples of web-based applications are
Hotmail and Google Docs. Common examples of
locally installed applications would be Microsoft
Windows or Open Office.
1/ , ... . . . . ,
II " .. . c . ". .... ... - .
"
.... " .
-
ri'-.. " ,' .
. ",
.
"
, 1 ... ,. ,
_ .. . " " .. .... .
L,, ': ,,- ' co "
:.A.. -- ." .. .' . --.., ...
[] Hotmail is an example of a hosted application
Advantages of hosted applications
Low start-up costs. Some hosted applications are free
to use; those that are aren't free often charge a monthly
subscription fee instead of an up-front payment.
You don't need to install software upgrades - this is managed
centrally.
Since data is stored online, backup is handled automatically by the
software developer
You can access the application and the data from anywhere in the
world - and from any PC that has access to the Internet.
Disadvantages (If hosted applications
User needs to be online to use the software.
If the internet connection is slow, the application runs slowly.
There are some concerns over security and lack of control over
stored data.
Advantages of 100001ly installed applications
User has more control, since data and software are stored locally.
They are not reliant on an Internet connection - full functionality
of software is available when offline.
Dislldvantages of !ocillly installed appliciltions
They typically involve a large one-off cost.
Users have to download regular software updates.
They can use up a lot of computer memory.

D Look at the document below. List the nine genenc
features that you can see have been used to
create '(he page
' u.tin"I ',:n..:oo.rt
Packing a healthy lunch I
Brown bread

Fruit
"
"-
Water

<,
Fruit juice
-=

Low fat yoghurt
?
Nuts
Nea/thy"Wops
Whit, bread
Chc)(.{'Iliite bc:r
['esselt pot

Sweet':.

.:1
."
( ,
,.
"
v
..>
"'"
u
c:
"

Cakes
Chocolate bars
Biscuits
H.:zy d, inks
Crisps
Sweets
Br.1WI I
!Jar
tow fat yoghurt
Nut.'
FrlJlt
o Give one eXample of when you might use ea.:h of
the follOWing featul'es
a Pnnt Screen
b Find dnd Replace
.: Template,
IJ Which feature IS most apptopnate fur each of the
following
a Omar has a six-page Word document The content
IS finished but the layout needs some wNk He
would like to view aLL SIX pages on the saeen at
once. What tool would yo', recommena,
b Tatyana has a wide panoramic photo that she
wants to Insert In a docur"ent With some text
underneath, At the moment the page IS too
narrow for the Image to fit properLy on the page,
and the lowe; half of the page IS empty What
wouLd you recommend?
c Luc<l has a 20-page docum.nt that he IS about to
submit as course .. ork, Before submitting It he needs
to add hiS name ana page n'Jrilbers to every page
Which feature would heLp t,illl to do thIS '1udly>
Chapter :I Applications software 1 41
Word processing and desktop publishing
You will almost certainly have used a word processor before, but you
may not have used desktop publishing software. A simple definition
of desktop publishing software is: software that combines graphics and
word.processing tools to allow the mer to create professionallooking
printed documents.
Wordprocessing software is quite similar to desktop publishing software
in many ways. If you have used both types of software you will already
know that many of the features can be found in both, for example:
edit text
columns
spelling and grammar checker.
There are many more common features. For a more complete list take a
look at the Appendix on pages 131-136.
Designers of wordprocessing software are continually adding new
features, many of which used to be found only in desktop publishing
software. The designers of desktop publishing software are also adding
wordprocessing features. This has resulted in fewer differences
between the two types of software. However, there are still some clear
rules about which software to use. You need to know that:
Word processors deal with text documents, for example letters and
essays.
Desktop publishers deal with text and graphic publications, for
example posters and leaflets .
Word processing or desktop publishing
Although word-processing software and desktop publishing software
perform similar tasks and share many common features, it is important
to recognise when each type of software is most appropriate.
The main difference becomes apparent wben you want to create a
profeSSional-looking, well laid-out document that contains images. To
help you understand how to choose the most appropriate software we
will look at two different scenarios:
, Zach needs to produce a one-page document listing current
committee members, a photo of each and some contact rletails. He
will print out 10 to place on various school notice boards.
2 ABProp is a large public company. It needs a lO-page document
showing a photo and short background of each board member. It
will be enclosed with the annual report and sent out to over 10,000
shareholders.
Essentially, both of these situations need a very similar-looking
document, but they would not necessarily be created using the same
applications software.
Look at the solution to each scenario on page 42 to help understand
how to select the most appropriate software.
Key terms
Word pro :essor a type of
appl.catu,n. software used to
t:reate tex.t d()(1Jments
Des:<top publishing, d[50 known
as DTP A type of appllrati"n<
softwilre to ctedte printed
matenals containing t"xt and
Image5.
There are many flxampJt?s of
uppeanl'g Jtl
1.15 a t)f ;:-.utomttb:aUy
'peU-checkmg dn article without
lookong al it One example was
an in tjle Op.fJver that
tUI nerl the Harry ?otter v,liilon
Voidernort into Voltmeter
l
i
=
Scenario 1: a word processor would be the most suitable choice
because:
it does not matter if the document does not look professional- it is
only for school notice boards
images need to be placed on the page, but it will be a simple layout
and there is only one page.
Scenario 2: a desktop publisher would be the most suitable choice
because:
a DTP will make it easier to create a professional-looking cover than
a word processor
images and logos can be more accurately positioned for a smarter
appearance
within the 10 pages there will be a large number of photographs to
organise. These will be much easier to position using a DTP package
than a word processor.
The choice of whether to use a word processor or desktop publisher
is often a question of which one will do the job best, or which will be
easiest to use. You will find that for many situations you could actually
do the job using either - so you need to analyse which would be the
most appropriate.
What features of desktop pubLishing 00 companies use in
industry?
This book was created using a combination of word-processing software and
desktop publishing software.
The authors wrote the material in a word processor using style templates . The
content was finalised and checked for errors using features such as word count
and spelling and grammar check.
The styled Word documents were then imported into a desktop publishing
package. The DTP software recognised the styles created in the Word
documents. That meant minimal reformatting, which reduced errors and saved
a lot of time.
A DTP package was also used to create the cover. Features such as
transparency, colour gradients, drop shadows and text effects allowed the
deSigners to experiment with a variety of different effects.
Analyse the requirements
Discuss and wrote a list of the
main Similarities between
the scenanos of Zach and
ABProp
Discuss and wrote a list of
the main dlfferenc.s In
requirements of Zach and
ABProp.
At)!\ Examlner's lip
Whilst many documents can
be uSing a word
plOce"or or a de<kLop publisher,
In the exam you should remembel
that text .. only documents are best
handled by a word pfocessor, and
documents containing beth text
and Images ale best created uSing
a DTP pad:age
00 links
www.quark.comlen (Quark) and
www.adobe.com/prodacts/i .. design/
customers (Adobe In Design). These
are the two most commonly used
desktop publishing packages.
look at thIs document about SaInt Felix Open Day
Saint Felix Open Day: 22nd April
Saint Felix like to to welcome all potential students and
parents to an upcoming Open Day_ The dar will include a cour
all the facilities, and provide an opportunity to
meet the headmistress and speak with teachers of all subjects.
TImetable Of the daY'
l Oam: Coffee and registration Reception
I O.30arn: Introduction to Saint Felix by Mrs. Campbell,
Headmistress Assembly Hall
l1am: Thur of the new Performing Arts facilities Meet Rt
Perfonning Arts block
12pm: Lunch Canteen
I pm: Tour of the sports facilities Gym
2pm: ExhIbition of students' work DT & .At ;: Depamnent
3pm: Q\'en.iew of extracurricular activitaes (see beloVl).
4-6pm: Open question and answer sessions with teachers, see
t B ble o\-erieaf for det ails of subject teachers & locations
Extracurricular activities
Saint Felix also has a wide variet)' of extra curricular activities
t hat pupils can get involved with. These include:
Duke of Edinburgh's Award
Chess Club
School trip such as skiing
Optional subj ect field t rips
Squash league
Language exchange programmes
II list three errors In the doculTlent,
o Suggest how the follOWing featules could be used
to Improve the layout of the document
a texi fonts and styles
b tableS
, bullets
d sect:IO,' brf:!als
e page Orlt:.!nwtlo!'!
f layenng (order of Images on the page)
g me,ge/splrt table cells
I
I
Chapter 3 Applications software 1 43
.'
Open question and ;:o.e.sSion details
Subject 1 .. d>er(.) Location
Mam, Mr. Ratcliff Mrs. warne _ .Gosling Assembly Hall
Fnglli<h Mrs. Roberts Mrs. Holland EnglliiliBlock
Imt"'y Humanities
Block
Geography Miss. Cl>ang A<sembly Hall
DT &An Mr. Kite DT&An
Block
Ptrlunning Mn. Leicester Ptrlunning
-
_ Block
Science Mrs.A11ca Assembly Hall
Spon Miss. Maskell A<sembly Hall
Langu""",
Mrs. College Mr. Dixon Assembly Hall
Map of Saint Felix School
fi' &,.\r; ';,v,tj.-o:1r.
hll/lJ blad. Nld J-ro. 1)I..;.:lc
r1"w, Reception

Milth!-.
&.
Hurnil'lrt"".s
"i).OIlS ;'0111 1
btli l

&

: ' Xlrll
II For each of the 'ollowlng documents and tasks,
stat e whether a word processor or a desktop
put.llSher would be most a!>propnate
a wntlng a SlIT.ple cumculum vitae (eV)
b deSIgnIng a poster to ad"ertlSe a school play
C writing an essay fOl hlStOiY coursework
d c,eatlng a multI-page booklet on paIntIngs done
by schOOL pupIls, along WIth text about each artist,
for a chadty artwoik auctIon
Presentation software
Presentation sofr'Nare is software that is used to create slideshows of
text and graphics. Presentations are then viewed either on a computer
screen or they are projected onto a large screen. Presentation software
is used in many different ways, from training and teaching to selling a
new product or idea. Some common examples of presentation software
are Microsofr PowerPoint and OpenOffice Impress.
Take a look at the three situations below which show different
examples of when presentation software might be used:
Kamal has created a multimedia presentation about the Duke of
Edinburgh's award expedition. It contains photos, a short video and
bulleted lists. He uses this to help with his talk about his expedition.
A school has an electronic bulletin board in
their reception. They have a short presentation
informing visitors about things that are happening
in the school that week. The slides automatically
change every few seconds, showing text, graphics
and photos.
An advertising salesman for a magazine has
created a short interactive p.esentation that
lists some magazine statistics mixed in with many
attention-grabbing images of the publication.
He e-mails this as an attachment to potentiai
cllstomers who enquire about advertiSing in ",1.e
magazine.
Each of these presentations ,viII use different
features. There are a variety of features common to
all presentation software that you need to be familiar
with:
Key Iftrms
soitware
I
sottware that ;'; used ,0 cre<lte
stldeshows Te:l>.:t, graph,cs, v!deQ
, arvJ sound can be
Multimedia. content that has
many diffeorent forms, such -35 r.;
("vrnbinatlon of te).t. dud!':.'. stilt
IIl'Mges, anlmrilion Cllle vi(ip.o
lnteract:ve present3t:on a
preSe!ltiltlon IS affected
by user Input, tor the
of if b"tton
Insert slide - add a new slide to a new
presentation.
Enter and edit text - enter slide titles and content,
edit text fonts and sizes.
Presentation software can be used to sell a new."roduct
or idea
Insert pictures - add photos, diagrams, images, etc. to a slide.
Insert buttons - add buttons to slides that perform actions such as
'Go to slide 3' or playa sound.
Create hyperlinks - make hyperlinks on a slide that link to other slides,
or to a docwnent on your computer, or to a page on the Internet.
For a full list of presentation software features see the Appendix on
pages 131-136.
tA'M"",' _
Use a seaoch er,glne to find an online that you can download
Try searching for 'onl-ine prospectus_ppt' -lo(>k fOI search res'Jlt.
containing PowerPolnt ppt ilies Download the and look at
which have been used
Chapter 3 App!lcarlons software 1 4S
Create a short presentation
Imag",e you are on holrday and a represer,t.tive of " local scuba
diving club is ec>ming to do a presentation at your about
scuba d,ving courses He has wrrtten the text for each slide and
he has some underwater photos to adJ He has asked you if you
can make the presentation Co bit mo{e interesting
Become an Open Wat8r DI\It?r
WIth Gnstal Dr.'" :(oh Tao. ThaIland
Create a four-page presentatIon with the follc..wing te)(t on
each page
Use Google to download some 'lnderwater photos (search
Google Images for 'anemone fISh', 'blue spotted stIngray'
and 'seah0r:;e')
Add some colour arid backgrour,d, the Images and
change the font styles to make the presentatIon look a bIt
more InterestIng Add a ilsh logo to every page uSing the
page template (also called a Slide Master)
with variolJs animation, tranSition and sour.d
effects
Play slldesh'Jw to test out the new effects
YO" can make the preser,tation more Interactive by addIng
hypertlnks and buttons Think about how you might use those
features then add one of each (you can Insert add,t,onal slides
if you like)
:.&!
Slrde 1
C<:1I.'rS6
i
!=,CU;)t'l \..:hllng thl:'ryv
npttrng 111 "vail"',
D:t: 2
PI act!::;,: :J5>IIIU S'ClIDfI equlprl)l3nt In--I
::i.... 11l11ll1n:) !)0ol
Slide 2
[JRV
2 open dl'es dt ('(Ie 01
thf. k.x,,,ti1OJ
- I PI:';,'tIo-s
-. to-181"Jo,;;O 3.;::r
- V'r11Itf- Rod,
D)'.,"", SITe l'jo.:.8tIO,l on
IJj",=, bc,at .:;chttdl'le
SlIde 3
Wh<'lt 1'::1 ti lEl"f, to 1"E''''
Koh To"l. ,Ila))
Slide 4
For the three presentatIons mentIoned on page f sound
44 think of three speCIfIC features that the
software would need to have In order
to create each presentation
II Wrrte a sholt descriptIon of how you would 'lse
each of the fOLLOWIng features
a priilt
b hyperlinks
" slrde handouts
d buttons
e anlri'latlon
g template/mast2r slide
II ZeDra DeSIgns IS a deslg,' agency based in
'-ondon, It works for a variety of clIents across
the UK It has a large portfolrc. of that
It has done for clIents, fi"Om SImple to
websltes and onlme p,esentations, Make a list
of three features of applIcatIons software that
you thInk they would find most 'lseiul Give a
reason why they would fmd each feature useful
In multImedIa deSIgn
Graphics production and image
manipulation
Graphics production and image manipulation software is used to create
and draw images as well as to edit existing images and photos. There
are many reasons why graphics software is used both at home and in
industry. Here are some examples of how graphics software is used:
cropping a photo or changing it to black and white instead of colour
changing the image size of a drawing to reduce the file size so that
it can be e-mailed
cleaning up marks that appear on a scanned document
placing a photo of a model against a library shot of a beach for a
travel advert
airbrushing out a bruise on a model's ann for a magazine cover.
You need to be familiar with a selection of features common to
all graphics software. Features such as brush and airbrush tools,
shading, text box and layering can be used to create a drawing in a
graphics package. There are many additional features that are used
in image manipulation packages such as Photoshop. The Appendix
on pages 131-136 has a full description of the common features of
graphics software.
Joseph finds '1 '181Y old family phOtu .".hllst nelp,ng hiS mum to clear
out the attic HIB mum IS pleas13d to find the phutv but IS upset that It
has been damaged - th13re 'lre some small flpS and creases as ""'311
some discolouratron or, It Jos13ph decld.;s to tlY and clean up the
photo an,j ha\l8 It framed as '1 present
The first 'thing Joseph does IS
to scan In the phuto N&xt he
US8S a glaphlcs p,sckage tv
meate th"llmage slightly
antlclockwlse (b8,:ause the
s('an "Nas not GOmplet13ly
straight)
ClOp the untidy border
arrbl u3h out
scratches and spots
19mu'le ;:rny marks uSing a
dust and scratches IUter
- thlB IS a feature found In
Photoshup
Then he pflr,ttld photo on
hhJh-gloss photo and
put It In a frame
Kay terms
Filter in graphics software, a filter
IS a process thot changes the
appe_rance of an image Filters
are used tu create speCIfiC
effeds, fo' example blur,
p,xelate an<f acid brush strokes
Chapter 3 Applications software 1 47
Create a picture round for a quiz
Often m a pub mght one of the rounds IS a picture round Each of the
quiz teams will be given a one-page sheet with 10 images Oil it There IS
one based on every Image.
Use the techniques below to create a one-page sheet for the plct'Jre round
With 10 questions
D 'Guess the celebrity' questions first download some photos of
celebrities Use -,he foll,owlng features to distort the photos so that
people to gu.ss wh(' IS m edch photo
a morphlng
b image sIZe - change the sIZe so that the image IS stretched
" paintbrush
d eraser
" repeoting p>.ttern (cut out a section of the photo and use it to
creote a repeatmg pattern)
fJ 'Gue" the headline' scan in some headlines fr(lm a
Use a graphics package to crop heodlme so ther2 is no
othe .. te)(, arour,d It No>" the paintbrush or eraser tools -'0 blank
out one or two words from the headline,
D 'Spot thE dlffe.en.:e', start With two identical photos and make small
changes t o one of them, for eXample you could en object
II Flilally, Insert the Images into a word-proceSSing documer,t add
-,he qup.stlons (or, for a mNe profeSSional-looking qui" use a DTP
Remember to add question ;'umbe;,1 Print the page
give It to fnend to try
fi'I,",,&'iiliiijVI,fi r"
Q Emmd has beP.n asked to produce the grophics for an advert to put
In her sohool newsletter The advert IS forT-shirts with the name and
logo "f the school football team on them, Emma has two photos
of someone weanng the T-shirt, one shOWing front ann one
shOWing the Her bnef IS to show the T-shirt without the person
modelling It, on a r.d baokgrc,und. List the steps she should ';:ake tt)
do thiS and the tools and features she would
D You wont teo creatE a Simple drawing of some flrew"rks fDr use Ir, an
advert fOl' the school mgh-, hplaln how y('u might use the
follOWing tools and features to create the draWing
a ':l'rved trne
b vanous brush shapes
c elrbrush tool
d plcholour
Examiner's tiP
You should be familiar With the
different types (If Image that
image manipulation software is
used tor, such as photos, scanned
images and draWings
Web design
Websites are used by individuals and companies to capture the
attention of potential clients. The purpose of the website may be to
tell visitors about a person, or to explain about a company's products
or services. In order to do this a website must be designed so that it is
interesting for people to view and they can easily find the information
they are looking for. There is a range of applications software that
helps to create websites, and there are many advanced features for
creating eye-catching effects_
A website is a collection of single web pages that are linked together
using hyperlinks. The website structure depends on how these pages
are linked. When you first create a website, you sketch out each page
and specify which page the hyperlink leads to.
- ---- --_.
--

,--

......
II Here are a fe.' pages from Ihel:erboodlo! website
The website is made up of a collection of web pages, each linked
together by hyperlinks. You can find out how a website is organised by
looking at where the hyperlinks on each page take you. Look at three
ofthe web pages from the kerboodle! website:
The Home page has feature panels that are updated regularly to
reflect current events and new products that Nelson Thomes is
trying to promote. The feature panels are designed to grab the
user's attention through the use of a variety of images and colours.
Evaluation login allows users to log in to their accounts. Not all
websites have this feature, but most online banks and online shops
such as Amazon will require the user to have an account.
The order page allows customers to place orders online or give
contact details for customer services. Notice that in addition to the
top menu bar (containing Home, Login, etc.) there are additional
hyperlinks within the page for each of the publications being
offered. Each byperlink is linked to a separate page that contains
images and deScriptions of each product.
------..,,.,
..... " . . , .. ' . . " " .
'. 4 ....... .... ...--... .......
. ... r- ' 4 ... ;-:!-.
r:;.!:':..:..;', :;:!. ,
Otd"p, gc
Templat(!/master page
Mo't webSite, Will ust: " template
(sometimes called rhe master
page) on whlC.:h the Illayon!)' of
the' w<!b pages are based
the templatp wil! mntaln a nlenul
navigath)n bC' f, company name
and log" You ':an Identify which
areas of eacn p.ge are pal t of
template drc thl:!
sarne on e"l'ry P"gP.
..A-
1:1 Templflil! f.-om tile Kerbooole:

Chapter 3 Applications software 1 49
Website analysis
Choose one of the following websltes to analyse, or choose one of your
own
wwwecune25.co.uk
www.crystaldlve.com
http!lItheraceway.com
wwwasl)s com
For YO'Jr chosen website
On the h"me pago, Identify which pa;ts are "n the template and which
parts are unique to that page
USing the pnnt screen feature, paste f(lur of the web pages Into one
document Draw lines to represent where the links are between the
four pages
Flash
Flash is applications software that is used to create animation effects
for websites, such as a moving icon, shon movie or rotating photo.
It is possible to create an entire website in Flash. However, Flash is
commonly used to create effects that are insened into websites that
were created in other software. Adobe Flash is the most common
applications software used to create Flash mes, but there are olller
software packages available.
Publishing a website on the Internet
When you create a website, you design and build all of the pages
offline. You can view all of the pages in a web browser and see what
they will look like and how all of the hyperlinks work just as if it was
online. When you are happy that the website is finished, you need to
upload the website mes to an online server - this is often called posting
a website.
The first step before posting a web page is to make sure you have some
web space I You might get some free web space from your Internet
service provider, or your school might provide some.
To publish a website online, you post the web pages that you have
created to your web space along with any images used on the pages.
HTML
Most webdesign software will code the website in HTML (hypenext
mark-up language) . You can design a website without ever seeing the
HTML code behind it. For example, in Dreamweaver you can choose
between Design view and Code view. Design view gives a view
similar to how the final page looks in a web browser. TItis is known as
WYSIWYG, which stands for 'what you see is what you get'. Some lines
of the HTML from a web page are shown on the next page:
To view a webSite t halls o 'eated
in Flash, or that containS" nash
file, you to have dowr.I""Jed
Flash player ThiS IS a fret' piece of
softwarp. (often referrpd to as it
' plug"In') and "I<ost ",ebslt.s thai
flash Will also C;,)r,t(iln J tlnk to
download t.he Flash player
Key terms
Flash applications softwa,...
us.d to add animation and
Interadlvlty to web pages
Ho<spots areas of a page thdt
change when the mouse
hovers over or cliCks n. n them
A hotspot Cdn nw"ible, for
an of an Image
that not iook
as If It is ct"kable
WYSIWYG an aCI (,nym fvl
you see IS what you get' It I., a
term use<l to descnb" software
that allows the user to View
$nrnething veri Similar tl) the
l'I1d result while the documenl
is being edited
a lo()k at t hiS wei>sile that
was ceeated enl.1 rely ;n Hash
www.richordchasemore.com
Now take a looic at www nasa.
gov/audience/lor klds/kidsclubl
flash/index.html ThIS webSite
WdS created uSing HTM!., but
there are rnany Flash files '.""th.n
It Notice how hotspots en the
page chonge when you roll the
mouse o'ler t hem There arE' aLljo
many aOlmat&l effects on t he
page, and Imk! to that
have created uSing n.sh
< tr>
< td height="220">&nbsp;</td>
<td valign="top"> <! .. InstanceBeginEditable
name="MainEditRegion" -->
<p class="style7 style16">&gt;Home</ p >
<p class="style7">Weicome to the <strong>Thai Cookery
School</strong> . </ p>
<p class="style7"> We teach a variety of cookery courses
from complete beginners to seasoned chefs. All ages and abilities
weicome!</p>
< p class = "style7"> Take a look at our courses to see upcoming
course details and dates. </p>
< I InstanceEndEditable .. > <l td>
< td>&nbsp; <l td>
</tr>
Web developers will often develop the
website in a WYSIWYG editor (for example
Design view in Dreamweaver), then switch
to Code view to modify it . There are many
reasons why you would want to edit the
HTML directly. Here are some examples:
to delete any unnecessary code that the
WYSIWYG editor has added. This reduces
the fil e size.
Did you know
You can VIew the HTM L for any
web page Just by usong a web
browser In Internet Explorel.
go to Page. VI"'W Source on the
m.nu A new Window w,ll open
up contaInIng all of the HTML fo!
thot page
Hom. Courses Contact Photos Links
to the n,al Sch"ol
We teach a VaJl'3ty' of coo!,:ery cullrses from
camplt3i"e rJ8Qlnners to seasoned chers ';11
3-nd abilities w&lcomel
Take E. look Ei: CUi to se8
upcomu"tg course dc-tails and dates
to add code, for example code that
makes it easier for search engines to track
your website, or free code that you have
downloaded to insert a website counter.
m The web page created from the HTML text shown above left
thai Cookery School has a webs,te shown on Screensh.,t G.
.. Which page IS shown:"J
f.I website a template Which parts of the page do you <hlnf;
are f,art (If the template (and thelefore are same on every page of
the webSite
U many pages on t oul do you think the webSite has> list thP. page
names.
a How many diffelent text stylP. types are used on the Home page
(including those or. the template)?
o What is a website cClunter and where would you choose to put this
on the page>
m Sugges1: ways YOl' coul.d use Flash to create an attent,,,n-
grabbing effect.
a Dese lbe two steps you w"uld take to t he on the Inter"et.
A web Ct'unter (sometlme., railed a
hit count.".) mnsi.ts of H TMI. code
that T.I ack., the Ilumb., of VIsitors
or hits a web paRe lIas
rec.lven It d,spldYS the
in graphlc.l form 011 the page
and Increasp.s after each hit.
Chapter 3 Applications software 1 S1
Software for audio, DVD and video players
Windows Media Player and RealPlayer are examples of applications
software that plays music and video, but there are many others. All
of these have features such as:
play, pause, forward and rewind
volume adjustment and mute.
Play lists
Most applications software that plays music will let
you create a play list. A play list is a selection of
songs chosen by you from a library of music that
the software will play in the order you specify. You
can create a play list then burn that play list to a
CD, save the play list for later or just use it to select
which songs the computer will play next.
downloads
A music download is any piece of music that you
have transferred from an online website to a local
computer. There are many music download sites
such as Apple iThnes, Amazon MP3 and eMusic
where you pay to download a single track or album
.... -
... --
.. -
... _-
.- .....
instead of buying a music CD. CJ Microsoft Media Player
Some download websites allow users to illegally download copyrighted
music without permission. Preventing illegal downloads is something
that record companies are working to try to stopl
Streaming
Music and video files tend to be quite large, so they can take a
long time to download. Streaming allows a song or film that you
are downloading to start playing before it has fully downloaded.
The idea is that by the time you have watched or listened to the
first few seconds of the downloaded file, a bit more will have been
downloaded that you can then view or listen to. Websites such as
YouThbe use streaming. You may have experienced a video file stopping
momentarily. TIlls is because you are watching the film faster than it
can be downloaded, so it needs a few seconds to catch up.
Ei"u'''':l#i:lI
ii
jll''ti
Ma rk each of these statements true orfaLse
D Streaming allows you to start listening to mUSic It
has finIShed do"/nloadlng
fJ Streaming IS only SUitable for small files
II A slow Intel net when streaming Will cause a film to pause
oftei1
Play list a of songs selected
trom a library
Streammg. multimedia content
,$ playp.d back tt' the end
USH whll,t It IS sttll being

Transferring data between applications
One of the features of applications software is the ability to transfer
data from one application to another. Text can be transferred from a
website to a presentation and to a DTP or word-processing file. Photos,
graphics and even video can be transferred between different types of
application software.
Files created using applications software are of a specific file type. For
example, a word-processing document may have the file extension
.doc, whilst a spreadsheet will have a file extension .xIs. If you try
to use word processing software to open a spreadsheet file with the
.xls extension, you will get an error! See Chapter 1, page 11 for more
information on file extensions.
However, it is possible to transfer files between certain applications
using the import and export features.
Here are some examples of which files types can be transferred:
1
Word-processing documents with the extension .doc can be saved as
.html files, and can then be edited in website design software.
Images created using Photoshop that have the extension .psp can
be exported as .jpg files. They can then be inserted into many other
applications such as word-processing, presentation or desktop
publishing software.
Spreadsheet files can be exported as .csv files (comma separated
values), which can be opened by a variety of different applications
software including word-processing software.
!I !O> t".) ,,' 1:' " ' . _ .. _ ': ..:"4 1\<.....
' . ' :r
.. ,
--,-
.-!>.. - . - ,
$ -::' ... -'
,.-..- .
-..


f,i' . I ..
--
o Spreadsheet files can :)e SJ 'Ie(} as . ..:sv files
Key terms
Import t.ansfer a filE that WaS
create<! In
package into The
apptlcatlonc; Cioftware
currently open.
Export a file that IS
currently open so th.,t It ri'r, be
<>pened In different
softv\}i:::Ir
Examiner 's lip
Data fllt's ;n common text: or
graphiC f::')f(nats (for example txt,
doc, JPc. cae; be m.osferred
call
be transferred by drag drop (l"
using itn insert feature frorn .:1
Summary quesllons
of t.heSE: statements as
true 01
II Files created using one type
of software can
be as file
types for use in different
applrcatlons
fJ Sound files cannot be opened
uSing a word-proceSSing
package, using ""port
anrl Import features
D If you want to change the
f,le extension of a file, you
can just rename it Instead of
uSing the Import alld exr,ort
feature.
Chapter 3 Applications software 1 S3
Designing documents using accepted layout
Before you begin creating a new document, you should consider if
there is an accepted layout that you should use. These accepted layouts
are to help other people read and understand your documents easily.
You should also consider if what you are creating is fit for the purpose
and relevant to your audience. There would be no point in writing a
presentation to wish someone well if they were ill. However, you might
design a 'get well soon' card using graphics software.
Depending on which type of document you are creating - whether it is
a letter, poster, presentation, etc. - there are some general rules about
the format of the document. You need to be aware of these:
Printed letters: usually contain the address of the recipient and the
sender, the date and an appropriate sign-off. Each of these is found
in a specific place on the page. It is rare to find an official letter that
does not follow the traditional format.
Posters and flyers: keep to one clear message using a simple, short
tide. Do not get carried away with many different colours, fonts and
effects, as it will become cluttered and difficult to read.
Web page: each web page should be clearly labelled so that a user
knows at a glance which page they are currendy on. It should also
contain a navigation bar, which should be in the same location on
each page.
Presentations: do not fill each page with too much text. Stick to a
small number of bullet points. Use images and multimedia content
to add interest but without making the presentation too cluttered to
understand.
In this chapter you will have learnt:
11'
the generiC features found in most applications software
./
the features common to word processors and desktop
publishers
..,..
when to choose a word processor and when to choose a
desktop publisher for a given t ask
V
the features found in presentation software
v'
which features to use to make a presentation interactive and
multimedia
V
which features are found in graphics production and image
manipulation software, and how they are used to create and
edit images
""
the main features of web-design software such as hyperlinks,
publishing online and including Flash animation
11'
the features of audio, DVD and video software
v'
that data can be transferred between applications
v'
that there are accepted layouts for many types of document
AOII Exammer 's tip
I
Many dotuments h.vc an
(for example a
I letter) Appl1catJc.ns software
(such as a word processor) usually
proVide template< for a of
I ____ . ____ J
Summary questions
Below is a list of gUidelines
for desrgnrng varrous types of
d'JCuments Mat.:h each to
""e of the do.:ument types listed
aoove
D
Use one simple title or
headlrne, and d" not
try to rnelude too much

fJ
Use short bullet points th.t
are large and easy to read.
II
Display the page name
dearly
a
Use only one font, and keep
to a tradrtro"allayout
ACJ!;/'" Examination-style questi ons
1 Choose your answers from the list given below.
A Alteration of margins and spacing
c Number scales on axis to be edited
E Construction of bar-charts and pie-charts
from tables of data
G 'rabies to be linked together
Use of tabulation
B Complex searches on two or more criteria
o Formatting of cells
F Sections of a picture to be copied,
reflected and scaled
H Use of brushes
J Validation of data
(a) Which two of the above are important fea tures that any word-processing package
should allow? (2 marks)
(b) Which two of the above are important features that a charts package should allow? (2 marks)
(c) Which two of the above are important features that a graphics package should allow? (2 marks)
(d) Give two of the above which are important features that any spreadsheet package
should allow. (2 marks)
AQA,June 2007
2 Some types of applications software are more suitable than others for carrying out a given task.
3
A Database B Desktop publishing c Graphics
o Web design E Word processing
Match the best type of applications software, A, B, C, 0 or E to carry out the tasks below.
(a) Typing in, formatting and checking the text for a new novel
(b) Designing the cm'er for" mllsic CD
(e) Storing and processing the details of members of a gym
(d) Creating a printed school magazine that includes images of the various school activities
over the year. (4 marks)
Below is a list of various types of applications software.
A Database B Desktop publishing c Drawing
o Mail-merging E Modelling F Spreadsheet
G Web design H Word processing
Which one would be the most suitable to use for each of the following tasks?
(a) Rotation of shapes
(b) Typing in text for a novel
(e) Using frames to position text and graphics on a page
(d) Replication of cells
(e) Carrying out a complex search on two or more criteria
(f) A simple flight simulation. (6 marks)
AQA,June 2008
4 A graphic artist specialises in producing the artwork for comics and graphics nmcls. He uses a PC
and a graphics package to produce his images. Which two of the follo\\ing are important features that
you would expect to find in a graphics package?
A Calculating the cost of each page of artwork B Importing images
c Mail-merging letters 0 Extensive search facilities
E Freehand drawing (2 marks)
AQA.lune 2007
5 Phantastic Phones sell mobile phones and accessories. The manager has produced the
following leaflet using word-processing software. The leaflet will be given out to people
shopping in the High Street.
Phanlastic Phones Special Offers
To celebrate the end of our first year in business, we are offering these special deals.
1 Buy any new phone in May and get 25<;0 off the marked price.
2 Take out a new monthly contract with us and get the first three months free.
To resen'e your phone or to get more details, phone Steve on 057 117 11700.
(a) Which of the following features of a word-processing package could be used to imprOl'e the
layout of the leaflet?
A Line spacing
D Centre
B Search facility
E Hyperlink
c Mail-merging
(2 marks)
(b) Give two additional features of a word-processing package that could be used to improye the
presentation of the leaflet. (2 marks)
(e) Give nne feature of the software that could be used to check the accuracy of the text used in
the leaflet. (1 mark)
(d) The manager wants to use the word-processing package to rearrange the leaflet so that the
second special deal comes before the first. Using the tist given below, write down the steps
needed to do this.
A Paste
c Highlight the second special deal
B Cut
o Position the cursor just above the
first special deal (2 marks)
AQA,June 2006
6 (a) Why does web design software include 'publishing' features? (2 marks)
(b) Give three other specialist features of web design software that could be used to
build a website. (3 marks)
7 A teacher is creating a presentation about climate change for use in a school assembly. She intends
to use clip art in the presentation.
(a) Which one of the following hest describes clip art?
A A set of free software B Part of a computerised picture
c A ready-made piece of computerised graphic art
D A graphics tool from a graphic software gallery (1 mark)
(b) The ability to use dip art and digital images is one feature of presentation software that can
impro\'e the appearance of a presentation. Give three other features of presentation software
that could be used to improve the appearance of the school assembly presentation. (3 marks)
(e) What are the advantages of producing a report about climate change using presentation
software compared with using DTP (desktop publishing)? (3 marks)
8 (a) Which one of the following best describes media streaming?
A Storing digital video and sound locally
B The transmission of a set of digital figures
c The transmission and viewing of digital video without first storing it
D The transmission and local storage of digital sound
(b) Describe two advan tages of media streaming.
(e) Describe a disadvantage of media streaming.
(1 mark)
(2 marks)
(1 mark)
Spreadsheets and modelling software
Spmadsheets and databases are types of applications software used to
store, manipulate and output information and data.
Almost every company in the world uses spreadsheets to make income
and expense projections and to analyse company performance.
A spreadsheet enables numbers to be processed and to be shown
graphically if needed, maldng it easy for people to make decisions
bascd on the information shown.
Databases are used to store data and to make that data easily accessible
to users. The largest database in the world contains over 250TB of
data, and anyone piece of data can be retrieved instantly .
Information and data
There is an important distinction between information and data. Data
is raw figures or words with no context, for example: 2, Mid, VIO, 5.2,
B, 560,202, 165,000.
Data can be turned into information by giving it meaning. The
Lamborghini Gallardo statistics in Thble A are information. The same
is true in a database or spreadsheet .. without correct labelling the
numbers and text stored within it would be meaningless!
Features of a spieadsheet
D:ota formats
A spreadsheet is typically used to store numerical data and to perform
various calculations on that data. Spreadsheets deal with a large variety
of dz.ta types and number formats. Look at Screenshot C which is an
entry form for a football tournament. Various data types have been used.
There are more options that you can choose for number formats, such
as number of decimal places, currency from many different countries,
and fractions.
As with other applications software that you have used, such as word-
processing software, you can use various formatting features to make
the spreadsheet more presentable and easier to read, for example:
font size and style
text alignment
merging cells
cell shading and borders
including gridlines
column and row width.
Objectives
Key terms
Spreadsheets docurnents that
store data In a gnd of rows and
columns They _liaw the data to
be analysed uSing and
calcuiatlons
collectIons of data or
lecords stored In tables
I'J Lamborghini Gallardo statistics
.. V
_____ .. ....::2 ____ _
Mid
[ngino V1 0
---------"_.-
_ .Eng_,"_1:: :,ze ____ ._ 5.2 ___ _
0-100 mph 8 seconds
-----_ .. __ ... _-.-
Pow.r 560 bhp
Top 5po!.d 202 mph
. __ . __ ..... - -.- ---_.
R.rtalt poiQ' 165,000
Chapter 4 Applications software 2 57
Text Radio/optJon
t
.. - c.:::::aJ .
... ..
. I _ .. .. .... .
. ,1'
c
;
.: Team: Th. Tower Footbill Team
! Le.,ue: '5 !i
,
7 Oate:
w" '"
15/09/2009
)00 :; Entry fee:
::.1
i.;
'.
_A....
Name
18!omTuc:lter
2 nmoGriffth,
3 Austin W!sht
4 Nick Sharpe
8lrth Heilht (em) Welt;ht lk&J Body t.rt per cent
5 Robert Metzkil
11980 : 1:,\
192 93
180 n 11"
167 '"
Currency Date Number Percent
B Entlj form for football tournament showing data types and numberformats
Cell references
Every cell in the spreadsheet has a unique address, known as a cell
reference. A cell reference consists of a letter which specifies which
column the cell is in, followed by a number which represents the row it
is in. For example, in Screenshot C, the team name appears in cell B4.
You can also refer to a range of cells, for example D 11: D 15 means
all of the cells from Dll to D15 inclusive, nine cells in total. This is
particularly useful with functions such as SUM and AVERAGE which
you will use later.
it is pos51ble tll refe,.,,,',, a eel! [rom a worksheet II I' You
do th" usmg the foliowlllg TOnnJt -lJstlllg fllst tilcflle lIome, the
$f'.et number, dnd fll1ally the cell (;()lumn alld row
'[Football
Tl1I'; IS t hC" tr-fpr'l:'r.o:! cpU (26) wnl(; h !S on in
the f![" Football xis
Formulae and functions
Spreadsheets are mainly used to enter numbers and then perform
calculations on them. Look at the spreadsheet in Screenshot D
(overleaf) on the next page. It was created to calculate how much
profit was made from a charity cream tea stall at the school fete.
Every number highlighted in Screenshot 0 has been automatically
calculated by the spreadsheet. One of the advantages of using formulae in
this way is that if you change one small thing such as the quantity of tea
sold, all of the other cells are automatically updated to reflect this change.
Information' data With meaning
Data raw figures or wor<:is With no
contelCt or
Data types' deSCriptions of the
types of data being stored iT] a
cell, for example text, numbers
or dates
Number formats des("'ptlons
of how tho. data In a cell IS
displayed, for example number
of deCimal place>
Fur.ctivns mathematical
opp.rations perfonno.d en the
vaiu" III a "ell, for example SUM
and AVERAGE
Formatting a spreadsheet
Create the spreadsheet shown
in Screenshot C Make sure each
cell has the correct data type
Use the features listed at the
bottom of page 56 to make the
entry foml more presentable.
Save the spreadsheet to use later.
Old you know
RadlQ buti(ms (also c.alied option
button.s) ar. liSe<! wheT<: only ene
op1 ion In a lIs.t (c:" be sf:letted
:f yow Wrint peor,!(' to be abtf1 t o
Selec.l than one Item In a
yuu sh':"llld use
dlW.iy! i":.:"; t ltai:'i
i: .. by ,'::
l" 'Jr e .. -
WllJ .. I"'I.J \ l'y(' l.! '.\n [p: {ji'j
yt::'!.: r, i"',jf1 \,, 111 b!! rm!rhr;..;
wren,? in m' ,:';"';1rnin: ii i}!':,
Using formulae
Q Create the cream tea spreddsheet in Screens hot 0 uSing a spreodsheet
package. Enter all of the numbers ones hlghUghted
fJ Now, enter a formula In 06 that multiplies the quantity of tea sold
by Unit C,)st oftea (S6 x C6) If you are not sure how enter;;
multiplication formula, look It up in tbe ieature.
EI Copy and paste the formula In 06 to c.ll, 07 and [18 Oouble check
that formulae been transferred clJrrectly
The SUM function
When you have a long list of numbers to add together it is much better
to use the SUM function than simple addition.
In the example given in Screenshot 0 , you need to add together
the cost of all the ingredients in cells Dl2 to D18. Instead of writing
=D12+Dl3+D14+DlS+D16+D17 +Dl8, you can use the SUM fum:tion
and just write =SUM(D12:D18). This is much quicker and more efficient.
MIN, IYIAX and AVERAGE
Three other useful functions are MIN, MAX and AVERAGE. They are
used to find the minimum value, maximum value and average of a list
of numbers. You will use these functions to find the minimum weight,
maximum weight and average weight of all the football players in the
example given in Screenshot C.
The MIN function has the following format:
MIN (FirstValue:LastValue)
where FirstValue is the first cell reference in the list and LastValue is the
last cell reference. MAX and AVERAGE functions follow the same format.
The MIN, MAX and AVERAGE functions
Using the football spreadsheet that you produced for 4.1, add the
follOWing somewhere underneath the table:
Minimum weight welgh'l Average weight
<nterthe fOllOWing a< formula for mlnhnum welgnt
Now enter formulae for ma, imum weight and average weight
,,(1 player
1>
II
" ..
l!i
..
Nilme
1 8jom Tucker
2 TImoGriffittl.
3 Austin Wilht
4 NickShlrJ)e
5 Robert Mt.ttkt
OAte of Birth Helsht (em) W.ipt (kf) Body fit per cent
20/09/1980 204 90 12,.
Ol/lZj1982 1512
" '"
20/12/1986 nl 93 11"
03/ 02/1982 180 n 11":-
0S/06/!9'7 161
" '"
I MInImlA'!! woeilht 56
.111 Mlllimum weicht: Il
wel&ht: Ie
........
[I MIN, MA.x '1nd AVRA0 1)[ tile pii<.Yf:f!)
B
Cream Tea Stall
- - - COit!- --r;;r1
J l o.SO j'1 U;O
1 [ o.75 ' ! 1,,,, 1
<Ol .....
T U ..... l _ J!,I'J! J
" c.oIJM
;. 0-..-. ,
. - - --I
'1 Cott of 5.1"1
-r- f:
'
.i'o Milk l 5.00
! ; ( UCI
" .. - lain" I ' u.oo
..:' JIIII " 1CI.0CI
__ _ _ . ... , _ __
L _ _ T'!"_of ......
"'
. ..A-
m Profit from cream tea sales
'.AII9'&
The SUM function
Using the spl'!adsheet you
fa; Activity 4.2, writ2 a
SUM f"nctlon rn cell D19 that adds
together cells D12 to 018. Write
another SUM function In ,ell 09
that adds together cells 06 to D8
Enter" formula for Profrt that IS
'Total Sales - Total cost of sales'
!SUM' a function that
, .
I
together all numbers
In a Irst or range
I MIN a funct ion that returns the
lowest value In a ,et of valu(>s
MAX a function that returns the
largest value In a set ,,1 values.
AVERAGE function that returns
the avel age (,I a set of vaiues
Chapter 4 Applications software 2 59
Other useful functions
There are many functions available in spreadsheet software. Table F
shows a handful of other functions that you should be familiar with.
g UsefuL functions
-y-'
function Description Example
namp
- - ------ - ------_ .. __ ._- - -_._---- - ---- ------
Rounds a number to
a specified number of
digits Rounds the nIJmbe:!:" :n D I to 1 digIts
ROUND UP Rounds a number UP -, ROL'NDI.'FiDI,2)
RANK
Rounds ttl c?U D 1 tv
_ ________ ___ ___ . _ __________ _
Tells you the position
of one number
within a sequence of
numbers
r)9)
YCIU y:here the- number In celt 04
Ir. the rr-rrge- ot In ccI.!.s
D4to D9
---- ------ ----------------- .. _---- -- -
COUNT Counts the number oCOUNf(D1 D-IO)
of cells that contain
numbers fl:!!lb; "iOl! txtw many of the In thE>
______________ .. .. 1!10 ____ ._
lOOWP Looks up a number
in an array (a type of
table)
Take. look at this example
A6,B2 Be)
for thll! worti 1applt; In (oLum" A
2 t., . (;f the (and show.s the
cOifespClndll1g vaLut: 111 catumn B
Llam lives at number 1S (ilaveney Road Alex lives number 16 c.raveney
The two houses are oppoSIte each other
It you asked Aiex he lives, he could give either ar, absolute
or i"eteren(;e
an absolute reference would bP. numbP.r 16 Craveney Road
a reiatlve reference would be OppOSltP. to Llam
In " spreadsheet, a relative cell reference means that, for example, cell
D2 IS three columns to the right and one lOW down In Screensh"t E, If the
formilia In Dlllefers to heIght ofthe first player_ when thIS f(llmul.
IS wpiC,d down column D the cell reterence needs to change to the next
However, the cell r.femnce for the aver.ge weight must not .:#mnge
l
If you do not want a (_ell reference to be changed, you to 'JS. an
absolute cell ref"rence '(Oil write an dbsolute celi rp.fel ence
the $ character If yo II want to refer to the average weight (In celL E19,
Screensh"t E) oS an absolute reference you would write $E$19
Look .t the difference a reLative and tell In "
tormtlLa
ReLative reference =1F(E11<.E19, "UNDER', "OVER")
Absolutp.leference' "UNI)EP", "OVER")
The IF function IS used !f you want
the In a ..:ell to on
the answer to a question The
I F statement needs to say 'If
weight IS iess th." average, wnte
UNDER, othelWlse write OVER'
The function WILL Look Like thiS
I (players weight < average
weight, "UNDER", "OVER")
Irlt.-:'J celi references
thiS looks (ike ' _[19,
"OVER")
Key terms
I F an I F as.s a
question, then retul ns one value
If the answer IS yes, and another
if the ar)5wer IS no
ilelative where the
program does not actually store
the addless (jf cell Instead
it stNes the poSition of the cell
reLative t,) the celi containing
the formula.
Absolute cell referente, the
actual location of the celi,s
stoled, and IS unaffected by the
locatl,m Cof the tell contalnrng
thefolmula
t\Q:\ Examiner 's tIP
Cells may contain different
of data (l1umbers, currency, text)
or they rnay contain formuLae (for
exampLe 63/C5) and functions (for
exampLe SUM(D2 D9)) Cells can
also be formatted to have diffelent
slyles (for exampLe ooLd) and sizes
(for example 16 point)
Sorting
A useful feature of a spreadsheet is the ability to immediately sort a
table of data into a specific order.
The football spreadsheet is currently in order of player number. The
sort feature would be used if you wanted to re-order the table. It is
possible to sort on both text and numbers, so you could:
sort the table alphabetically by player first name (if you wanted to
sort by surname you would need to write the surname in a separate
column)
sort the table in order of height, with the tallest first.
Graphs and charts
There is a large variety of graphs and charts that you can create using
spreadsheets. Based on the football spreadsheet in Screenshot C and
the cream tea spreadsheet in Screenshot D you could create:
a pie chart of all the ingredient costs
a scattergram of the heights and weights of all the players
a bar chart of the sales of tea, coffee and scones.
Chart tit!es, labels and keys
It is important to make sure that all charts and graphs are properly
labelled. Depending on what sort of graph or chart you have created, it
will need:
a chart title
a key (sometimes called a legend) that explains what the colours or
symbols on the chart represent
axis titles
appropriate axis scales.

Spreadsheets can be used to model situations, allowing you to change
various values and see what the effect is.
Use the cream tea spreadsheet in Screenshot 0 as an example. Imagine
you arc in a meeting discussing a future cream tea event at a school
open day. Following the success of the first event, everyone is confident
that profits could be improved for the next event. The main issues that
arise are:
How much would you have to charge per scone to generate a profit
of 1 DO?
1b make it easier to handle the money on the day, the organisers would
like to change the price of tea, coffee and scones to 1 each. Assuming
the number sold remains the same, what is the effect on the profit?
What is the effect on profit if the price of coffee is reduced to SOp,
and 2S cups of coffee are sold?
Each of these scenarios can be easily answered using the cream tea
spreadsheet that you have already created.
7
Cream teas: cost of Ingredients
21
Tea
Coffee
Milk
Sugar
./'0...
a Piechart
32%
Scones
lam
Cream
Pia"",
weight
1:11 --__-_- : -


70;"'-! --
60 1-
1
-.- -----

.. - ,--,-------;_- - ";- - ...
150 160 li"t) 180 190 200 210
Player height (,:;nJ
J>....
m Scatter graph
Create a graph or chart
Create two different types of
graph or chait uSing one of
the spre.dsheets you Geated
In Act,vity 41 or 4 2 or a new
spreadsheet Make sure that y'.lU
label the charr properly and g,"e
,t key ,f needed The type of
chart you choose IS Import::ant,
50 think about which chart type
,s most appropriate tor
Informat,on ,t is lepresenting.
1\01\ Examiner 's tip
Practise uSing ,preadshoets to
draw (line, bar, pie,
scatVrgJam) and the graph
presentatilm (axes, scale, tltle
and colour)
Chapter 4 ApplicatIOns software 2 61
To find the answer to the first example, you would try entering
different values in the cream scone cost cell (C8). What scone cost
gives a profit closest to nOD? You are not expected to get the correct
cost straight away - the idea is to use trial and improvement. If the
profit is less than 100 you will need to increase the cost, and if it is
over 100 you will need to reduce it.
li" "I"f
f4
il1'iili,hfi
D Which "f the foll"wing statements is true?
a Data + information = CCJntext
b Data + me.nlrog = information
fJ Sar3h has created the following spreadsheet to estimate her monthly
phone bill.
.... --.... -- ...... - .. -- ..... _ ... -_ ..
.,- '"

,
! Mobile Phone Bill Calculator
:-:-c:,,-,:----.:;-- - - --- ---..----::-=
.1 Monthly line rental: f 15,00
:. Call tost per lit mobiles: 0.12
Chosen free I':l.tmber: 107745022744
, ----,;::;== :::-r.===--r;;:c=----,
, ===.,.,.-__ ICllltOltp,rmlnutl C.U durltlcn (mlns)
!? G1274 527'-47 0.12 / 15 1.SS
.iJ! (;77':3 0117" I Sf
;'.:l. 0:'748226402 0.12 SS f 6.60
.1.1. Cl234126640 0.12 12 1.44
13 e774S 0227"
! :l 07723499283
1:1 Ci713

0.12
0.12
1.' ::7745 ___ ....:.--f..=""
n
I:
TDtal cost of c.,.:
[Monthlx tout:
41
2 ,
21
37
(
1
Which data formats are used In the follOWing cells?
A2
b D4
( A9
0.24
2.52


D Which olthe follOWing formulae would you In D177
a
b =SlIM(D9+D16)
e D16)
II formuia usoo In D9 is :;;:B9"'C9.
a Are t.he cell In thiS iormula relz.t,ve or abmlolte?
b If the'Nmula In cell D9 IS copied and pasted into cell D10, what
would it be?
C Write 3 f"rmula, using the MAl( funct ion, that displays the longest
call duration.
Remembpl' that there ore three
step' In the modelling pr"cess or
'what if' que.stlons
ler:iuceiincrease a vanal/le
check result
conf'inue until the result IS
correct
AUi\, Examiner 's lip
In modelling, If you use the word
'change' you '11'111 not be "wardlod
any marks YOu need to bE' m(,1e
specific With the ldnguage you use,
! for example 'intreas/?,' or 'reduce'
Use a spreadsheet to model
different scenarios
Using the cream tea spreadsheet
from ActiVity 42, enter different
values to reflect each of the
three scenarios that are being
discussed In the
MoJel the best answer til each
scenario Write a brief sentence
in response to each of the bullet
points listed, stating what
yo," wOIJld say In the meeting
follOWIng your analYSIS
It you asked to e.xplalll the
bl:'nveen tnfOirnatlon
and data In the YOLI Will
probdbiy find It eaSiest tl, gm
some exampll!!>. The same IS
true for many ()f th" of
spre.dsheets and odtilhases It
something IS explainlod With
an example then use one I
I
Databases
A database is used for storing data in a highly efficient and organised
way so that it can be easily and quickly retrieved. The simplest
definition of a database is a structured collection of records. A small
paper address book organised alphabetically is an example of a simple
database. A stock system for a supermarket or an online encyclopaedia
such as Wikipedia are examples at the larger end of the scale. The data
for all of these examples is organised in such a way that it can be easily
retrieved in a useful form.
Types of data
As with spreadsheets, databases deal with a variety of different types
of data.
Thble I is a simple database used by the organiser of a rowing race to
store data about all of the competitors.
o A tabl. of data farrOWing races

Did you know
Imagine searching tor 3 name
in a phone With a billion
pages - that IS wbat a datab.,e
c.lIed ChOleePoin! doe, It can
almost liistantly return detd,l!i
requested from a datai"Jao;e that
would reach to the moo" dnd
back If It was pnnted
l
BootlD SoatN.me Race CoachNnme "a"el1r!1e FinisitPositiot1

Paid"
-- ---- - -.--
29471 Titania James Kapp 250
y
---_. __ .
--- -----_._-_ ._---- - -
Loyola F
y
------_.
Emma
Gilbertson
::.c:c:::..::..:c. __ . __ . _ _ .. . ___ _ _ _ _ _ ._. ___ .
91320 Goldie M Roger
Newcombe
The race day has not yet taken place so there are no race times or finish
positions. There will be two races, one for men and one for women. The
Race column in the database specifies which race the boat is entered in.
o D.la 'YP"s
""V
Data type Desc, iflti!!n
----'-'---'''-'----_=-=-:''-'''--'''-'--.. __ .- - --_ ... _- - -- - ---
Aut.oNumbf'1
.. _- -----_._--

Numbers that are automatically generated for
each record. AutoNumber is normally used for key
fields to make sure each one is different
Numeric values. These can be integers or decimals
_ __ . __ . Short values containing numbers and 'o_t_to_rs __ _

Oate'flme
Monetary values
Oates and times
---
Ob/ectl lmoge Files , uch as digital photos
cal ed
--------------------
loglcaL'BooLean Yes/No vaLues

limited <.holee Where values are Umited to those in a drop-down list
Text and numbers. It is possible to store a large
number of characters, for example you can use thIs
for a 'Notes' or 'Description' field.
250 N
Choosing appropriate data
types
The column headings In Table I
the field names in the
database For each ofthe field
ndmes, choose an appropriate
data type from Table J.
.
Chapter 4 Applications software 2 63
Data structures
A simple database is basically a table of data like that in Table I. A
database that consists of just one table is called a flat file database. In
a database, it is not correct to refer to columns and rows. Instead, the
terms fields and records are used.
Each column heading represents a field in the database. There are
eight fields in the rowing race database. Each row is a record in the
database; there is one record per boat, and Table I has three records.
Problems with flat file databases
The main problem with flat file databases is the duplication of
information. This duplication is known as data redundancy. Entering
duplicates of the same data is time consuming and a waste of file space.
It can also lead to a greater possibility of errors in the database. If the
race organiser wanted to add the details of each member of the crew to
the database in Table I, the flat file database would look like Table K.
Titania M James Kapp ;'ZSIJ
._---_.
7.94(1 Titania M James Kapp ,50
. _---_._--
Titania M James Kapp f:SO
---_ ...
TItania j1 James Kapp 1,250
- .---
'<9975 Loyola f Emma lOU
Gilbertson
--_. -- -_ ..
---- ----
39975 Loyola f Emma
Gilbertson
.... . __ . . _-_._--_ ...... --.. ---- _ ..
---.---.- ...
39970; l OYJla F Emma ':200
GiLbertson
._--_ .. ,.
399TS Loyola " Emma 2CJtJ
Gilbertson
..
913?O Goldie M Roger
Newcombe
91320 Goldie M Roger
Newcombe
---._.
913:?:O Goldie Roger
Newcombe
---'
...... - -..... --
,- --.,
9' 320 Goldie tl Roger !:SC
Newcombe
Notice that the boat details such as BoatiD, BoatNarne, and CoachNarne
have to be typed in for every boat member. When the race organiser enters
the race times and positions, they will have to enter them four times, once
for each rower! This information should only need to be entered once.
Relational databases
To overcome the problems of data redundancy that you get with flat file
databases, you can use more than one table. There will be one table for
the boat information and another for rowers. Both tables will be linked.
- .
Kev terms
Flat file database, a database
with Just one table of data,
Fields column headIngs ttl
database tables FIelds are part
of a record.
Records ttoese also rows In a
database table, and they hold
all of the informatIon about one
subject
Data redundancy whero the same
data is ,tored more than once In
a table Thts IS sometimes called
data duplication
V ( amel Co ll 4/8/79
D.wl'!S
_ .. _--_ ..
Y V,Ic".am 2511169
"--------" .
V Andlew 16/9/90

Y Ross 21110/91
Y ALe> lilmu 4/8179
-,_. __ ...... .
_._---
y
CI ..'IIt:: 9/5/81
Ft:-IJ'andl$
----_ ... _- --
--
V
St"p"
1/11188

, .. _--"._ .. ... -... -
Y 2511/69

._ .. -
N Rubert 16/9/90

N BJNn Tur.kt:1 21/10/91
----'--
N CI.:tlg Hal'lei 1111/88
" "---"---'-." - ----
N Au!.tln 9/5/81
Wright
r .. EKam;ne,'s lip
RemOVing ledundant data
(duplicated data) makes data
entry faster and more accur
and reduces space
A database that contains linked tables is called a relational database,
The two tables will look like this,
Boat table
FieLd name Data typO!
Bo.tlD AutoNumber
eoatN.me Text
Race
COcichi
R..ac:eTi rne
Text
Text
Time
Fi!'ll'ShPr..Sltlon Number
__ . Currency
Paid' YIN
. .A...
II Example of a relational database
Rower table
ROWI!fID AutoNumber
,---- - ------
Bo.tlD Number
- ..
Text
Clateotalrth Date
Phlltl) attachment
._---
The rae" orga",;.r could aho add
a Photo Ilek! with the data type
'attachment' If needed photo
I D fOf all the entnmts
The tables will be linked using the BoatID field.
validation IS used to leducc datil entry Hlors by checking that the,
data being entered passes rules Valld.tlon IS that t he
data" senSible There ace many d,fferellt tfpes of data that you
can use In a dat.abas.
Presence check ;; pi esenee cilt'Ck .stops a field being left blank Y"u
cann{J't move Q.l unt.d YOII entereJ (j Vd[UP.
look-up list thiS checks that the data entered exactly matches "fie of"
li,t "f pre-sp!. fOi example a title f,. td only allow Mr, ;"irs,
rvllss, Ms, Sir 01' Dr
Type ched, thiS checks that a f!eld cuntalns data ail of th" same typf'
(for nU'l1b.rs) 0' in a spcc,flc format (fOf "xample onE letter
by lhree or It is d spe<:Jfic length (fO! exampie:t
contal< " SIX digits)
check Hils that the data fillts Within tw'.' spoClflcd
values, for e"dmplf.' I'm e:t,am !11drk!s between {) ami 'loa
ICo fll! lds where long n"mt;.,. has t" be e"tered. d (.hECk
rhg,t v.alidatior'l used ThiS carnes out a based on the
entered and ched;.;. that the result IS what. IS xpec.ted
tast on i) har-..-:ode IS a check: dlgft :f it 15 lhe
beeps to warn the operator that 1$ a
'f data passes a validation check, It can ,till be wrc."g t. rang. ,heck
might allow an exam mark of Ti to entered Ifthe actually
scored 73, the ent.l"j ".,,,ld t>" ' .... rang Checking the data entered against Hie
source document IS ')ne toon oi venficat,on Anotiler form of venfrr.atlon
would be to entpt the data sets tW'IC' arlo comparE:' them T:lis IS sometlnles
when rJ user !s asked to 1:!1it.er an e-mai l address OJ password
system compares the entnes In case the user bas made" t'jping en'(lr
,Key'.rms
Relational database a dat"base
cootainlng two or !Th)re tables
that ale linked to other
ThiS overcomes problems of data
redundancy, resulting in
entry errors arod reduced storage
space
i\(lA Exammer 's tiP
Learn <common Idcts about
databa,e lise which will help
you to answer any qliestlon ['01
eXample' 111 a databC'lsf' It IS
faster to edit field c"ntents, ,t IS
I
to search for/sr,rt recordo,
a up less phYSical
I sp;,ce, it car, edsily bt: backed up
Validation
In the Boat table (Diagram L) the
Race field Will only ever be M or
F, so it is a good Idea to enter a
'value list' validation rule Inr thIS
A suitable rule for thIS field woulcl
look like thIS =M or F
Think of some other SUitable
rules to apply to the athel fields
Try and use each of the val'dation
rule types mentioned above
Old you know

oJ(ample g,ven In Dlagrilm L "


a one-to-mrtny "boat
mimy hut each rower
c.n Oill)' to boal
----
Chapter 4 Applications software 2 65
Key fietds
All tables in a database should have a key field (also known as a primary
key). The key field must be unique. For example, it would be a bad idea to
make BoatName a key field in Diagram l because there is a chance that
two boats will have the same name. For this reason an additional field
called BoatID is used. The same is true for the Rower table in Diagram L
Forms
You can enter boat and crew details directly
into the tables, but it is much more convenient
to use database input forms. The Boat form
(Screenshot contains all of the fields from
the Boat table (Table l ) in the same order as
they appear in the Boat table.
Advantages of using a form
A form is used to simplify data entry. Forms make
it easier to enter data:
They allow you to enter data into more than
one table using a Single form. In the example
of the rowing race, it would be possible to
create a form that allowed you to enter data
into the Boat table and the Rower table at
the same time.
Forms give you many layout options, and
look much more user friendly than tables.
Yeu can add extra text to a form to make it
more user friendly.
Sorting and filt ers
Boat Form
"
",
. ..,..
" .
You can sort the data in tables and reports using a method that is
similar to the way you sort tables in a spreadsheet. You can sort in
ascending or descending order, and you can also sort using more than
one field.
Examples of sorts you could do are:
Sort the Boat table (Diagram L) in order of race time. You would
use an ascending sort on the RaceTime field to do this.
Separate the results of the men's and women's race. You could sort
first by race type (M or F), and then by race time. To do this you
would use an ascending or descending sort on the Race field, and
then an ascending sort on the RaceTime field.
Filtering allows you to select information on one particular type of
data. If you want to enter the race positions in the men's race you
would filter using the Race type field and select M. This would show
only the boats in the men's race, allOwing for easy entry of positions.
Key terms
:(cyfiel.d also <:ailed pnmary
A Ilel,j In a table which Uniquely
Identifies each 'e<nrd !n that tabie.
- _. -- _. -
. - - . -
---- --- .-
_-1
- - - - ..
J
::;u;:"
Old you know
As \/!e!1 dilt., enTry :tOil -r ar- r..!..so

d f!)r 1':1 to
. . ,. fl'-; '" . : ... ....
... 1 0", . pee.IIK .et: . ',c
II amend tlf1U

AOA Examiner 's lip
x
If YOu are asked to mo.,t
appropnate softWc1fP. for (I glvl!1
Hsk, r .. that
a is best for
many
on data, 2tnd rnodelhng ""hat If I
scenarios
" dat.ba", is b,,!;t for I
for data when the data
l(} I'm.; tahltl' w,thrlut
duplicating It, and a \.anety of
formatted are
'------------------
Searching a database
One of the most powerful features of a database is the ability to search
and find specific information.
You can set search criteria, then the database very quickly searches
through all of the records in the database (which might be millions)
and returns only the results you are looking for.
Setting search criteria
To tell the database which recotds you are looking for, you need to set
seatch criteria. Examples of searches you might want to do on the Race
database are:
find all rowing teams who have not paid their race entry fee
find all boats who completed the race in less than four minutes
find all rowers who are younger than 16 years old
find all boats who are not coached by James Kapp.
To do those searches, you need to design a database query and enter
the search criteria using the symbols shown in Table N.
In Search criteria
-V
Sear(h criteria Table and field that tho> Example
___ . _ ___ . . __ .. ____ _ __ .. __ ___ ...
equals PaId' field III the table Paid? "N"
_____ _ _ _ '._ .. ___ _ ... _ ________ _ _
Less than RaceTlme fieLd In the Boat tabLe RaceTime < 4:00
.- ... ---.. ----..
more than
not equal
Reports
DateOfB,rth field In t.he
table (Dlaglam !.)
DateOfBirth > 9/1/1993
(this will depend on the
current date)
_ ... _. _ _ . _ _ ._ ..... ____ . _ . .....::::.:.::.:::=.::::c...... __
Coadi Held In the Boat taMe Coach <> "James Kapp"
One of the most useful features of a database is the ability to run
reports on the data. Reports can be based on one table in the database,
or they can contain data from multiple tables.
When you create a report, you can select which fields to show and also
what order and layout to present the results in. Reports can also be !inked
to seatches, filters and sorts. If you have designed a seatch or sort you can
then use a report to present the data so that it is easy to understand.
Examples of reports that the race organiser can run using the
information in the database are:
a list of boats in time order
a contact sheet listing all of the coaches, the boat they represent
and their contact numbers
a report of every boat that has not yet paid their entry fee, and how
much the entry fee is for that boat.
It pOSSIble to set more
compllcdt.d cntel ia, wher" the
database se.rches ""any f,elds
In the databasp These searche!
would require dat abase ta
Sea, ch more thall aile field
Frnd all boats rn the men's
race WIt h a lace tIme of less
than four mInutes ThIS would
Involve both the Rdce field and
the RaceTlme In t he Boat
table (DIagram L)
FInd all boats that EITHfR
,-ample-ted the race In tess
than lour mInutes OR t hat had
a fInIsh pOSItIon of less than
fIve nilS would Involve both
the R."e rime field and the
FlnrshPoSltlon fIelds from the
Boat tablp (DIagram L)
Did you know
You enn us. wlld<:ards when l
entering search ,=fit'!na For
ev.amplt', 'f YOll seard ",.j for all
rowe" WIth a t'qual to gO, tn. j
datlbase search would n oll
rowers whose nal,",s stalted wrth g
Reports
For each of the reports listed (left),
state which fields you would use
fro", each table in the database
from DIagram L on page 64
A(}A EKaminer's tip
Lear n the followmg things .bout
reports. When creatrng a report
tht' "sel can
select the fields to display
(.hvosc the order thp ficttis
appeal In
add headel /footer ,nlornlatror,
for each page I)f the' eport
,
-
Chapter 4 Applications soi1wan! 2 67
MD Frames limited
MD Frames is a small family-run framing company. Customers bring in
prints, paintings or photos, and MD Frames make a custom frame to fit.
Until recently they were using a paper order book, but they were finding
this often caused problems:
Some customers dropped off their prints for framing then did not
collect them for months. MD Frames had no way of tracking these
customers without manually going through the order book.
Some customers brought in many prints, but each time they placed an
order, the staff at MD Frames would have to write down their contact
details on the order form again. This was time consuming and annoyed
the customers!
The solution was to create a database that contained all of the
customer information, codes for common frame types and a log of
every order placed by each customer. later MD Frames added fields
for the order status, invoice amount and amount due. This is a good
example of the use of ICT to solve a problem.
MaiL merge
A mail merge allows the data stored in a database to be transferred to
another type of application software such as a word processor or an
e-mail. Common uses of a mail merge are:
A mail merge that selects all customers who have placed an order in
the last six months, alerting them to a special promotion. The name
and contact information of the customers stored in the database
would automatically be linked to the word-processed document.
The word processor would then create letters to be sent to the
customers, making the whole process automated.
A mail merge that prints a specific customer's details on a customer
loyalty card. The customer name (taken from the database) and
the date the card was issued are printed on the membership card
automatically.
A mail merge that is used to send out payslips to all of the staff at the
end of the month. The database contains the name and contact details
of all the staff. The monthly wages "nc! tax information is inserted and
then all of the payslip letters are printed in one batch and sent out.
Mail merge
Think af three more applications of mail fa .. the cc.mpany MD
Frames featur.d In the case study aoove
In " database such as the one that
MD Frames uses, the data held In
It is constantly mcredsmg, so the
database ends up holding a large
amount of data that IS na longer
needed The solution to thiS IS to
archive the data It IS possible In a
dat.!'as. program to run a repOit
that automatically archives off
data that m.tcilp.s speof'" mtena
(for example orders than
five years)
Al)!\ Examiner 's riP
neports am also Include merged
data from several files/tables,
.- --
I - ___ :.. ..
. - ---..

..,_ ...."",-I
.v-, ..


l:: s:::
4.l . ' IC.: :!. .. ::,.. " ... j ' pr""
>. 1- I . , ',. !t =<'> !Ie "1 no. y loeoolartii.
: ..... I:r l:"-j r.:,r: : '1: ' : ,, ='-,1
-

_.
,-
", , .,
Here you select which fields you want to appear
in the mail merge. The fields from the contact
list you selected will appear here. and you
choose from these. The merge fields selected in
this example are highlighted grey.
You can choose to type in all the
contact details for the mail merge.
use existing e-mail contacts
you have stored. or an existing
database of contacts/customers.
-.1;)':" -..; <:. .. ........
You can use a letter that is already written.
:.r-" -- --- __ .. ___ or type a new one for the mail merge.
r:.J Mail merge in Microsoft Word
fi""I"k'*'"Uf1
U

J
,fi
A school head of year creates a Simple database that CIlntalns details of
all pupils In the year The details held about each pupil are P'JpILName.
ParentContact, A.:idrp. ss, FormNumbP.r The,e are SIX F,,,,,, groups in the
yP.ar, and r.late, to whICh Form group a pupil IS In
.. The database <anslsts of Just one table called PUpi l. What wO'Jld the
field be in the Pupil table? Is there a suitab!. field mentioned
N would a new field need to be created?
fJ What dat. type ",,'uld you use for the field and why?
II The head of year now wants to add details of each form tUtol and
form room number What potential problems couki be causP.d if
thesP. details are added to the Pupil table?
II What search CrIteria we,uld you use to find all pupils who ai'e P.lther ",
Form 1 or Form 2?
In this chapter you will have learnt:
t/ the difference between data and information, and the
relationship between the two
t/ which features and functions are found in spreadsheet software,
and how these are used
t/ how a spreadsheet is used to model 'what if' scenarios
t/ how to design a database, and the problems caused by data
redundancy
t/ how to search and filter information in a database
t/ how database reports can be used to summarise data in a database.
A G J ~ i Examination-style questions
1 (8) Which type of applications software is often used for financial modelling?
(b) Applications software can be used for modelling a "ariety of situations. Explain
briefly what is meant by the term modelling.
(1 mark)
(2 marks)
AQA, lune 2007
2 Some students are planning a School Prom for Year 11. Their first attempt is shown below.
A B C D E
1 Year 11 Prom Planner
2
3 29 June 2008
4
5 Number of students paying 150
6
7 Expenditure Cost of Number Total Cost
each needed
8 Coach Hire 75.00 4 300.00
9 Function rooms 100.00 3 300.00
10 Decorati ons (per room) 22.50 3 67.50
11 Three course meal 14.00 150 fL,100.00
12 Soft drinks 3.50 150 525.00
13
14
15
16
t7 Total cost of the Prom 3,292.50
18
19 Cost per student 21.95
(a) What is the cell reference of the shaded cell? (1 mark)
(3 marks) (h) Name three cell formats that have been used in this spreadsheet.
(e) A spreadsheet can generate different types of graph. Give one suitable type of graph
tbat could be used to display the various kinds of expenditure. (1 mark)
(d) What formula has been used to calculate tbe cost per student in D19? (/ mark)
(e) Many Year 11 students said that tbe maximum they would pay to go to the Prom would
be 20. Explain bow the software could be used for modelling situations, to try to keep
tbe cost under 20. (2 marks)
AQA, June 2008
3 A video shop stores information about its customers in a database table.
Part of the customer database table is giyen below.
ID SUfDame First House Postcode
Number name No.
0021 Jones Jon 6 ZZ232KJ
0034 Smith Anne 78 ZZ203GT
0156 Ali Ahmed 17 ZZ161KN
0234 Collins Sarah 2 ZZ234PH
0452 Chan Michael 113 ZZ128PR
(a) How many records are shown in this database table?
(b) Which is the key field in this database table?
Date of
Birth
20/11/80
12/0875
06,02/82

15, 10.'84
(c) Which one of the follo\\ing is the best defioition of a key field?
A A key field must be the first field in a customer database table
B A key field must be a combination of letters and numbers
c A key field must be unique in a database table
(d) As well as the customer table, the ''ideo store uses two other linked tables. Name
one other table it would be sensible for them to use.
(e) Give one reason why the video store should link tables together.
4 CottagesRUS is a company that rents out holiday homes. They use a database to store
information on their properties to rent. Part of the Database file is shown below.
(1 mark)
(1 mark)
(1 mark)
(1 mark)
(1 mark)
AQA,June 2007
Property ID 'iYpe of Property Max Heating Weekly rent Pets
Property location people
C4UC01 C Lanere 4 CH 200 - 300
C4UC02 C Lanere 4 CF 200 - 300
C4UH02 H Hick/ey 12 CH 300 -500
C4UC04 C Hickley 6 EF 250-375
C4UB02 B Lanere 6 CH 275 - 375
C4UB03 B Hick/ey 4 CH 175 - 275
C4UH03 H Lanere 8 CH 300 - 400
C4UC06 C LaneTe 6 CF 200 - 300
C4UC07 C Lanere 2 CH 150 - 225
C4UH05 H Hickley 8 CH 250- 375
C4UB05 B Hickle!' 4 CH 175 - 250
C4UC09 C LaneTe 2 CH 150 - 225
The following codes have been used for the 1Ype of Property field.
C- Cottage
H-House
B-Bungalow
(a) Name one other field that has been coded.
(b) How many records are shown in this database file?
allowed
Y
N
N
N
N
Y
Y
N
N
N
Y
Y
-.-
(1 mark)
(1 mark)
(c) Wby is the Property ID field needed?
(d) VI'hich one of the follo\\ing is an important reason wby CottagesRUS uses data
validation to check the data as it is entered into the database?
A Make sure that it is correct
H Make sure that it is sensible
c Make sure that it is sorted into order
(e) Wbich field would be the most suitahle to validate using a range check?
A Property location
It Max people
cHeating
(I) Give two advantages to CottagesRUS of using a datahase rather than a manual
method for storing tbis information.
(g) Write down the Property ID(8) found as a result of the following searches.
A Search 1: Max people equal to 12
B Search 2: Property location equal to Lancre AND Pets allowed equal to Y
c Search 3: Heating NOT equal to CH
(J mark)
(J mark)
(1 mark)
(2 marks)
(3 marks)
AQA,June 2008
Web browsing and e-mail
Over the past few years there has been a buge change in the way
people communicate online. Now most people not only have an e-mail
account, they have profiles on social networking sites and their own
personal blogs, and they may regularly use and contribute to Internet
forums. This chapter looks at each of these online tools and how they
are used by both individuals and companies .
Web browsers
A weh bruwser (also called an Internet browser) is the software used
to look at web pages. You will almost certainly have used one before.
Two of the most common web browsers are Microsoft Internet Explorer
and Mozilla Firefox. Web browsers have many useful features for
navigating to web pages.
St op: Use the Stop button
if you want the browser
to loading a page,
for if it is taking
a long time, or if you have
dicked a lillk.
/
Refres!1: reloucJs
the web page. This
;s useful for web page.
that updat. regularly - for
an e-mail
inbox, or news heel.
"
._ ...:..aw
..
Objectives
Become famil ial wit h e-n\ail,
web-browser soft ware,
engines and search t erm' .
Web browser .L<o an
!ntemet it a 50ftwClfe
,jppUcaU<i!"! u,ed t/) weI;

: 0 "
-/
.,.,. _ .. Q Home page: A web
_ ... _ - .. - .Q .. .
Web address:
Every web page
has an address.
;t usually begins
v.!ith www. llIa
"/eb browser, you
type the web-page
.ddress thai: you
to vie'..-: into
the address bur
Jnd (provideJ
yO" are onlir,e!)
the web pag .. is
dis?layed .
-
.. ll - 'r. ._- ';I. . .,. . ... ...... ,,_ .. - browser allows
. .. .. - . you to set a Home
. 1' .. H. ... : '"';; page. This is the
web page address
thcl the browser
will automatically
navigate to time
you ol't'n it and each
time you press the
Home icon.
.-g-Tiie Thorries homf:. pagf: in f.1icrf'sofi Interna ::'xplorer
Pop-ups
Pop-ups are additional browser windows that are opened by the web
page that you are currently Sometimes these are desirable - for
example, if you are browsing the web page of a theme park and you click
to open another window that shows a map of the park. More annoyingly
many websites open pop-up windows containing advertisements.
Most web browsers have an option that lets you block pop-ups, or asks
your permission before opening a pop-up.
Favourites and bookmarks
Th save you from typing in the web address of your favourite websites
each time you want to open them, you can set up a list of favourites
(also called bookmarks). There is no limit to the number of favourites
you can specify, and you can also organise them into folders and
subfolders just as you can when saving other types of file. To go to one of
your favourite websites, you just select it from a menu in the browser .
Common types of website
Search engines
Examples of search engines are Google, Yahoo! Search, and Ask. Search
engines work by searching through all of the pages on the Internet
and making a central index of words and sentences on each web page.
When you enter a word or sentence into a search engine, the search
engine looks up the word or string of words in its central index and
returns a list of all the websites that contain that word or sequence
of words. Different search engines use different methods for indexing
websites, so they will return different results for the same search terms.
Entering search criteria
When you enter a few words into a search engine, it returns the
websites that contain those words most frequently.
It is also possible to enter multiple search criteria, and to specify
in more detail the sort of results you are searching for. Look at the
examples in Table B.
[I Exame.'e, of detailed search criteria
.,.". - .
Type of arch critpria Example Finds pages containing
seard l
AND s.:!alc:h - If!
thi> search tp..oms
NOT often
puttlllg a sign (0.)
a seai d1
OR the \'Io'r ...rd'
OR betw"een two
hotel London
MP3 player
- iPod
the woro., hotel London
MP3 p!nyers but NOT iPods
--------_. __ .. __ ._-----
Cornwall rnfolmatlC'u'l on Cornwall
windsurfing OR windswfing OR
_ _ _ w_a_ke_bo_a_rd_in..;g,,-_. ________ .
Exact phrase - puttli'lg "let me tht:: l,lVdct phrase 'let me
_ 9.!arch 10 'luotes __ e_n_te_rta_in-"-yo_u___ Y"_u_' _______ ._.
Wildcard sear.:h "" fin Cook
aqensk .. Of after Ci
search
Vlord!; begltl(ling with Cook
tQf <ample cook. cooking,
cooks, cookery. cooker
Chapter 5 Using the web 73
iii,::; 5!t.u:-d ':t!nnJ\ mdt''Y:.
Y'IU . tu t h:i t,: c.Jn-:flJU.'y
'JOU i,.' ''f.' "j."::'ZiT
.:-:t i. Y.j.a:"lt ;;j
bret:lc Id .!t:...;m?,
d ;l; \rV.;ltG ' ;JT.!::.ltf In !'u EI s\"'!:Jldl
\ .... J I .;{
ill':. kt: i c: I 'i /Gs r():,t. t :;J:-: :'; 2! ;
1
,;; ld Y',, ' .::10 3 .:(2-,!' !
G, r,j io' -
: b/i-lif,:i nu!';": ;(-'"nf
I ...
AQA Examiner 's tiP
learn the ways of settong search
criteria
a Simple search
narrow two criten. uSing AND
combille two crrterla using OR
remove some aspect_' of
using NOT
incl'Jde iI wlldcar" t;) fmd links
whICh are lIke the one In _
Goog\e does not dctually use
astensks Ifyau
sean.:h for c.oo':. Goollie WIll
autornatK311y Indudp.
terms such "5 cooh and cookmg
In the st!arch results
Wiki
Wiki is the name given to sites that allow users to freely create and edit
webpage content using a web browser. The most well-known example of
a wiki site is Wikipedia, the online encyclopedia. Anyone can log on to
Wikipedia and create a page on a new subject, or go to an existing page
and add content and links, or edit content that is currently there. For more
information about how people use wilds see Chapter 9, page 126 .
Internet service providers
An Internet service provider (ISP) is a company that connects
people to the Internet. ISPs usually charge a monthly fee in return for
providing Internet access. This may be via a variety of connection types
such as dial-up connection, cable, wireless or broadband.
Customers are normally required to sign up to the ISP for a minimum
length of time (12 or 18 months is common) .
Many ISPs provide other services in addition to providing Internet access,
such as web mail and website hosting. You may also have seen companies
offering a phone line and digital 1V as part of the same package.
Web mail
The ISP may provide you with one or more free e-mail addresses and
an online account. You can log into the online account and check your
messages. The e-mail account will come with a certain amount of free
storage, so you can store e-mails online up to that limit.
Hosting a website
Some ISPs provide free web space. This means that if you create your
own website using website design sofrware, you can upload it to your
free web space and have a live website! The [SP will provide you
with the details needed to upload or post your web pages.
E-mail
There are many different e-mail providers. Popular examples
are Hotmail, Gmail and AOt. All e-mail providers have the same
common features that allow you to write e-mails and send and
receive them. They also allow you to send and receive attached
files (attachments) and keep an address book containing all of your
contacts.
Sending e-mail
To send an e-mail to someone you need to have an e-mail account
and know the e-mail address of the person that you want to write to.
Look at Screenshot C, which shows an e-mail from Daniel (the
organiser of a rock-climbing club) to members of the club. The main
features of the e-mail have been explained.
Receiving e-mail
Screenshot 0 is what the e-mail looks like when it is received by a
club member.
ClOlinks
Go to www.wikipedia.org. Click on
English and then on the left menu
click About Wikipedia - here there is
lots of information about how users
create and edit content.
Key terms
Internet service provider liSP) a
that prOVides people
With access to the Internet, for
example uSing dial-up, (able or
a broadband conn&.-t,on
-.... -_._--------'
You may have come dCross POP
ond SMTP when sending and
rec.:elv'ng e-maIL"
POP stands fOI 'Post Office
Protocol' and IS the language used
to send e .. mali from an onlIne
selver to YOllr computer
SMTP stands for 'SImple Mail
Transfer Protocol' ThiS IS the
l.nguage used to send mail from
your CClmputer to online mall
servp.r
For example, If you have an
pmdll plogram on your computer
such as MIcrosoft Outlook. It WIll
probably use POP to .:ollect mall
from an onlme e-mail ser/er and
put It In your rnbox, and use SMTP
to transfel e .. malls you wnte to
the onlrne server and onto the
recIpient
From: Some e-mail editing
software lets you send and receive
e-mails from more than one
e-mail account. In that case you
need to specify which account
you are sending the e-mail from
by entering an e-mail address into
the From field.
Cc: This stands for
carbon copy. It
is used to send a
copy of an e-mail
to someone who
To: You can enter
one e-mail address
or many e-mail
addresses to send your
message to. List all of
the addresses in the
To field. You need to
separate the e-mail
addresses using either
a comma or a semi-
colon depending on
which e-mail software
you are using.
Chapter 5 Using the web 75
Bee: This stands for blind carbon
copy. A copy of the e-mail will be
sent to that e-mail address, but none
of the other recipients will be able
to see that a copy has been sent. In
this example, a copy has been sent
to the representative at the sports
centre - Bee has been used instead
of Cc because the sports centre
representative does not want her
e-mail address to be known by aU
the members of the club. Notice that
this e-mail address does not appear
anywhere in the received e-mail,
shown below.
/ //
I I ....
.... 4 := :;' '1. -'''-; J'" "f'
/' --, text can be included
is not directly
affected by the
message, but who
you want to be
aware of it. In this
example the school
head of year has
been sent a copy so
that she is aware
there is no practice.
I '1'" .... . ... ;... -:;, - --. . . Attachments: Only
. ". ',, " --'" ",, ,,/' ... .. . ". in the main body
____ ' :,-oJ ':!!', .. fI ly . j >....,.r' . :.: t , ,... . -" _to 1 ' r ' ' ''''.: .': > __ of an e-mail.soif
n w"- . : ". ' ./ _______ you want to e-mail
" ' ", - en' r ____ other file types
. .... '" .. . 4< .. 1fIo . ' ''''"" " ... , .... . .1 d
'om" Subject: You should
always enter a
subject line that
makes it clear what
the e-mail is about.
and will make it
easy for recipients
to find the e-mail if
they need to refer
back to it .
. 1><- ' to include them as
art' . :. rlVI 3':C ' r ", . ' .t'. 'J .. SI attachments.
''''''''" tiC!", : '. _ 'I r:- I aloCi al .
r,lYe ... t"t II '. i l" 1 , : ::a: 'UA- I!
,-'<ItO. p ... ", 1 '"loII : -. to -. U ' to:. " . 11 : .' , - . ... . . 1 . .. 1 .. '
.....
....... ..
: ..: .. ... ; .. , ..
,., . ..... . ,,,,." ,.:as....am
-----------'-",'-
..A..
a Example of an e-mail
.. ' 1.a; 1 ...... .,. k .. ''"' ... _ ._._ ..... --
Reply: When you read __ _ ' _ . . _,
an e-mail, you have """'.;. - - ...... "
/- 4 " .
Clicking reply will
...
-
the option to reply. " ... . ,,:.. ..
open a new, blank ' ''"<1
e
-ma,'l so that you can ,." ." "''',.,
i, ... t.lL ,,,,,,",,,",, .... , ..
send a reply back to ....... .......... :; .... . . .,o! .. ..:
the address in I ........... ...., .;. ..:. , ;:,,, .7e 'i
the From field. /
$(.': .. 'ort , . :.:. ' '0 : ' ''' .. :: r t" . " .' e-' : I: : ' i' 'P"'ll : 1
w:r',tsel, .... t ... , ..
. ......
. ",""
..... .
.... .. .. , .. l::.': , .. .
Clicking Reply to AU
will send an e-mail
. ' "," , ' .;outteN. I to'.O:O oj' ... '.-; ,-111'1 . ,n., , J.e :l.; ' t: , '
r ... I" ,,' e . !o, ( ,," 0 " l ."
to all of the e-mail
addresses in the From,
To and Cc fields.

o.nIIl HlIl'lIlIonci

c,..- ......
"'->.' . .,........,.,(.U .... 1W
I!l Example 0/ the received e-mail
Attachments do not
open automatically,
you usually have
to click on them to
download them.
Forward: Clicking
Forward will
forward a copy of
the e-mail to an
address that you
choose. You can
also add comments
to the e-mail before
forwarding it.
Managing the address book
All e-mail providers have an address book where you can store the
e-mail addresses (and sometimes other contact information) of the
people you e-mail. The advantage of this is that when you create an
e-mail, you can just look up the person you are e-mailing in the address
book and select their e-mail address instead of typing it in each time.
You can add new contacts to the address book, edit e-mail addresses of
contacts whose details have changed and delete contacts that you are
no longer in contact with.
I-Iailing lists
Look at the e-maiiTh field in the example in Screenshot C on page 75.
There are several addresses here and it would be time consuming for
the activities coordinator to type them all in every time he needed to
contact the group. It would also be easy to make a typing error - just
one wrong character would mean that someone would not receive the
e-mail.
The activities coordinator runs several different clubs and regularly
e-mails the members of each club.
To save time, the coordinator has created a mailing list for each club
that contains the e-mail addresses of all the members in that club.
When he needs to send an e-mail to a specific club, he just selects the
mailing list he needs from the address book.
As members join and leave a club, the activities coordinator edits the
mailing list by adding and deleting e-mail addresses.
E-mail storage
E-mails are like files, and they need to be organised into folders, stored
and backed up just like word-processing or spreadsheet files.
When you receive an e-mail, it automatically goes into your inbox.
The inbox is one of several folders that you will have in your e-mail
account. Others are:
Sent items - contains copies of all the e-mails you have sent.
Drafts - contains all of the e-mails you have started to write but
ha"e not sent.
Outbox - e-malls that are complete and are waiting to be sent. For
example, if you are offline any e-mRils you try to send will remain
in the outbox. When you are online, these will be sent, and a copy
will be put in the sent items folder.
Junk mail (sometimes called spam) - contains all e-mails that
either the ISP or virus checker thinks are junk/spam.
Deleted items - contains e-mails you have recently deleted. This
folder is usually emptied automatically so do not expect an e-mail
that you deleted a week ago to still be there!
As well as the folders above, you can create more folders in order to
organise your e-mails.Forexample.theacti.ities coordinator mighr
create the folders shown in Screenshot E to help him organise his
e-mails.
An p-mail slgnatilre IS "
of text (and sometImes a small
Imag.) that appears at the end
of pvery .-mai! you wrote Oroce
set It up, It WIll appe"r
automatlc:ally III each you
although you can to
it . It is usetul ,f ,Y(I'J
waf;t your and cnntact
detaIls to appear on eilth e.-mail
as It !KIW!S yolO typing it in every
time
rhem ar" all of rillps about
the way you .hould e-maIL<,
such a, "ot writing III capital
lettErS and always Inci.Jdong the
orlgmal meo.:,sap;e in your reply
For "Iort.' infoimation on try
tWlng ",to a
search eng'ne
AClA Examiner's lip
You w!lI probably already kno""
how to send and recelVl:;!
but fo; the exam you need to b"
farnlll"r With all of the features of
emall soft",,'are mell'i:loned In thiS
section, some of WhIch you may

before, "'lake
you what each teature IS
used for dnd practise using them
In your own e-mail a(;count.
Ol iUt i
!j .....J -! na lh

...J _ \.!t. :!' ) f
_-'
---I

o E-mafls organised into folders
Junk mail, spam and spam filters
Junk mail, also known as spam, is mail that is sent in bulk to users
who have not requested or opted in to that e-mail list. It is frequently
sent by companies trying to make money by advertising products or
services, or from organisations trying to gather personal details or
obtain money from you by illegal means.
Most e-mail providers and virus checkers will automatically scan your
e-mails for spam and put suspicious messages straight into a junk mail
or spam folder. This means that when you open your inbox you should
not see messages that you do not want.
Spa:n filters work by blocking known spammers and looking for
key words in messages. These rules are not entirely accurate and it is
normal for some genuine e-mails to end up in your junk mail or spam
folder. To prevent this, you can add a sender to a list of safe senders.
You should also check your junk mail folder regularly to check for
e-mails that have been put in there by mistake. You should never reply
to a spam e-mail, even to ask to be removed from the list. If you do, the
spammers know your e-mail address is real and live, so they will use it
even more.
Instant messaging
When you send an e-mail, you do not know whether the recipient
is online, so do not know when your e-mail might he read or when
they will reply. However, with L'1Stant messaging you know that the
recipient is online before you begin, and that what you type will appear
on their screen as soon as you click Send. Instant messaging allows two
or more people to have a conversation in real time.
t#'
D WhHI uSing a search engln .. , whICh terms would yuu use If you
wanted to fInd the follOWing!
IngredIents for salsa sauce, ,,"th no entdes relatIng to salsa dance
lessc,"s
b The name of artIst who sIngs the 'Other SIde of the world'.
c Informatlorl OJn hotels 01 hostels In OxfOld
D a What IS the dlfferen.:e the e-mail address f,elas marked
Cc and Bcc ''Vhen you send an e-maIl?
l' reason why you mrght use type (\f f,eld
II How IS Instant messagIng different from e-mail?
a Name two folders "ther than the Inbox whIch are usually found '" an
e-maIl aCCl>Ui.t G,ve a bnef descnption (of whICh e-malls ar .. :;tored In
th .. folders yOIJ have nameo
Chapter 5 Using the web 77
mail ' also known as <pam,
e-rnails that are I1l)t ... eic<>me
or soliCIted arln are often sent
In bulk Typically they are of a
commerda! nature
Spam filters that
redrre,ts marts that appear
to b., lunk mail or sparn rnto il
Junk mall or spilm
loider
Instant messaging. real-time te>t
conversatIon hel' ... een two or
rnore who are onlir,e
Organising your e-mails
using folders
If your Inbox contaIns hundreris
of e-mail>, some riatrng back over
a year, then you almost certatrlly
are not organrslng your e-malls
properly I your e-mails troto
ab(Jut categones and create
'for .. ach Go through the
In your InLox and decIde
If they should r2maln there, be
deleted, or fIled ,n one of the
fol'ler< you have ",eated.
A report. '" 2007 found
I that P'" of ail e-mail5 sent
during the mClnth
spain (,)mpallies que,iro" .. " sard
that spam was the" iCl
problem
Examples Dr r)nllrrr, provrders of
Skype,
Gmi.ill cHid MSN
Messenger
Web iogs, social networking and forums
Web logs (blogs)
Web logs (usually shortened to 'blogs') are a type of website where
people post comments on a particular sUbject. There are a few different
types of blog, including:
Personal blogs - these are used as a sort of online diary. For
example, an amateur racing driver who writes (or 'posts') details
of each race and track day complete with photos and videos for
friends and family to view and to post comments.
Corporate blogs -web pages containing updates on what a
company has been doing, which might include recent events or
forthcoming store openings. A company may use this to keep
customers updated and also to find out customers' opinions by
looking at the comments being posted by visitors to the blog.
News and views - blogs created to update people with news on a
specific topic. For example, the BBC has a blog on climate change
where relevant findings and news items are posted. People can
subscribe to the blog to be kept up to date with new entries, and
readers can also post comments on each blog post.
Micro blogs - Twitter is an exam pIe of a micro blog, where users
write very short updates (about 140 characters) on what they are
doing (known as ' tweets') . This results in a blog made up of many
shorr entries thot can look like a running commentary of someone's
life. Twitter allows people to subscribe to other people's tweets. This
means that you can keep up to date with the movements of friends
and family, or your favourite personalities, by subscribing to their
tweets.
A blog will always
display the most
recent entry at the
top ofthe page,
and the date of the
blog entry is always
clearly marked.
Blog posts can
contain photos
within the text. This
photo is hyperlinked
to a larger version
of the article for
people to read.
..A...
II Example of a blDg

.... - - - ....
Key terms
Web logs; usually abbreViated tl)
biogs websltes where
people Of organisations Writ"
dbout events or
on a particular subject
CD links
If you are not familiar with Twitter,
go to http://twitter.com and have
a look.
The has a large selection of
blogs on various subjects. Look at
some of the blogs available on their
website at www.bbc.co.uklblogs.
On the same page you will also find
more information about blogs in
general, including some FAQs.
/\{}/\ Examjner 's Up
You should be fam,l.ar With what
web Ings (biogs) are used for
Lock IJP some of blogs
cr"ated by indiVi duals as w .. !1 as
mmpanles _. it Will help you 111 th ..
exam :f you can StJrne
real-life examples
People are invited
to comment on
each blog post.
You can read
the comments
by clicking on
the Comments
_____ hyperlink.
Other fun features
can be used in
blogs, such as a
vote as seen here -
visitors to the blog
- - just click to vote .
Social networking sites
A social networking website is a website where individuals and
organisations each have a profile page and can link to other individuals
and organisations. The links might be based on friendship, common
interest or similar background (such as going to the same school).
Some popular examples of social networking websites that you will
probably already be familiar with are Facebook, Bebo and MySpace.
Using a social networking site
Before you can begin using a social networking site, you have to
create a profile for yourself. Your online profile is made up of one or
more web pages containing information about you. Your profile might
include personal information, such as the name of the town where
you live or the school that you go to, details about your interests, and
photos or videos you have taken or that you like. Companies and clubs
can also create a profile, which might contain information such as
contact details and photos of recent events.
linking with other people
Once you have an online profile, you can link to other people or
companies who also have a profile. You can find them on the social
networking site by searching for them by name or using information
you know about them that they may have included in their profile,
such as the town where they live or the school they attend. On some
social networking websites every user has a unique user name, so you
can find someone by typing in their user name if you know it.
Communicating with other people in your network
People to whom you have linked become part of your network. You can
talk to people in your network by:
sending them a message (just as you would send an e-mail) - which
they can read when they log on to their page on the networking site
instant messaging - many social networking sites provide
instant messaging. You can see who is currently logged on to the
networking website, and send a message that instantly appears on
their screen
sending status updates - you can write a sentence stating what you
are doing, or just an opinion. This status update can be read by
people in your network. People can also write comments on your
profile that others can view.
Uploading files to your profile
You can upload photos and videos to your profile too. Sometimes you
will have to download an additional piece of sofrware known as a
plug-in so that you can do this. It allows you to search your computer
for the photo or video file and then upload it. You can also organise
photos into albums and add a description to each one.
Chapter 5 Using the web 79
KeY'9I'ms
Social networking contacting
other people/fnend$ to arrange
t o meet or to find out about
their Interests
Plug-in a small software
that yuu download
uSing an Internet browser
Each plug-in enables a speCifiC
feature or function of the web
brows ... An example would
be a contaimng
It would offer an Flash
plug' ln on the to enable you
to view the Flash objects
t\< :)l\ Examlner's tip
You may abeady use a social
networking >Ite sllcl, a.s I'acebook
or and be familldr with
how these are by IndiViduals
Remember that you also need
to know how these are used by
companies and dubs
Look up rome profiles of dubs you
belong to 01 you know
I.ook the sort of information
they have orl profile
and ttunk about how a social
networking 'ite benefits them
Learn three advantages
and of SOCial

Advantages you can conract
people you MOW, you can keep In
contact With 'fnends' who do nut
live nealbY, you can meet people
with similar Interests
Disadvantages Identl ty theft,
members themselves
dishol1estly/lymg about
I
t.hemselves, who
are Ilot what they appear to
-
" ... - ' -.
.....-: I _ ,.
- -- - .
--
Dangers and risks of social networking sites
Writing personal information about yourself online can be risky
and you should be aware of how this information might be used by
someone who is not a friend. The risks of social networking sites are
covered in more detail in Chapter B, pages 112- 113.
Privacy
You can select who can see information about you online by changing
your privacy settings. For example, it is normal for individuals to set
privacy settings so that only people they have links with (those who are
pan of their network) can view their personal profile.
Abusing social networking websites
Over the last few years there have been several cases where people
have used social networking sites to pretend to be someone they are
not. Examples include:
creating an account under someone else's name, and posting
information that might damage their reputation
trying to connect to people who are not friends in order to view
personal information on their profile and to use it in identity fraud.
Viruses and hacking
There have been many cases of people hacking into social networking
sites and creating viruses. They often try to get sensitive personal
information such as credit-card details. These usually work by asking
you to download a file (or by directing you to another website which
tries to install a file) which then infects your computer. The dangers of
viruses and hacking are covered in morc detail in Chapter 7, page 97.
Facebook users hit by virus
Many viruses have been targetee at Facebook's 120 million users. Some are
created just to cause minor issues and annoy users, but some viruses are more
serious and are deSigned to illegally collect informat ion about users.
A virus called Koobface was designed to collect confidential information
such as credit-card details. The virus was spread by sending a message to
Facebook users that looked as if it was sent by a friend. The message said: 'You
look funny in this video', or: 'You look just awesome in this new video'. The
recipient of the message was then encouraged to click a link to view the video.
When they clicked the link, a download of the latest version of Adobe Flash
Player started, which was when the virus downloaded to the user's computer.
Once the Koobface virus had infected the computer, there were two ways that
it obtained the person's credit-card details. The first was to wait until they
bought something online, when it recorded the details that they typed in.
The second way was to search the computer for details that had already been
entered and saved from previous online purchases.
What privacy options are
there?
If you a profile on an onlme
networking webSite such as
Facebc.ok or Bebo, log In and look
at the different privacy options
What 15 the m"st e.trerTIe setting
YOll can choose to make your
information available to the least
number of people?
Identity fraud on social
networking sites
Use a Sf:drch to 5Oarct,
fa .. court cases Invo!l',ng SOCIal
networking websltes such as
Facebook, where users have
pretended te, be someone they are
not There are a :,igh-profile
Cd,..S Involvmg celebntles that
you may alreaoly "" familiar with
Forums
An Internet ferum is an online discussion website where users can post
comments in an open conversation. lYPically forums are created for
people to discuss particular areas of common interest. Some examples
offorums are:
car enthusiasts' site where members discuss the relative merits of
new or classic cars
software developers' website where people can post queries about
the software and the developers can post solutions
forum on a news website where people can post opinions about the
featured news article.
?odcasts
A poc!cast is a file that you can download from the Internet to play
back on a ponable audio piayer or compurer.
Podcasts are used for a variety of pmposes. They are mainly used for
content that changes or is updated frequently; such as:
Education: learning a language, downloading university lectures.
Business: marketing and promotion of products, staff training
videos.
Recreation: radio shows, music playlists.
Podcasts can be audio or audio and video. Some examples of podcasts
are as follows.
Audio only:
Radio 1 Chart Show: a bite-sized run-down of
Radio l's weekly Offidal Chart Show top 40.
Coffee Break Spanish: a weekly 20-minure
Spanish lesson.
Audio and video:
Sky Sports Boots 'N' All: weekly highlights of
Rugby League
NASA Cast Video: daily news and features from
NASA:s missions.
POdCilsts versus normal music and video
downloads
The important difference between podcasts and
other downloads is that podcasts are normally part
of a series made available for download on a regular
basis, often daily or weekly. Software (such as Apple
iTunes) can detect when a new pod cast in a series
you like is available, and automatically download
it. You select which podcasts to download by
subscribing. There are hundreds of free podcasts as
well as some that you have to pay for.
Chapter 5 Using the web 81
Key rermS
Forum. sometJrnes ulled a
mes'"'ge board. An ontme
discussion webSIte consisting of
ated content
Podcast audio and files
downl()dde,1 from the Int .. met,
nnonally updated dally or weekly
Forums
LilOk at the website http II
news,bocco.uklcbbcnewsl
hichat There a
r
2 many forums
here - called message boards-
on different topics rangmg from
TV senes to current news Items
Choose a forum to see what sort
of thing people are Writing, and
find out how you wc.uld add your
own comments
- - ...
/:. . & _ -
, ....
Old you know
Making your own podcast
It IS possible for anyone to create ,hell own podcast and It available
tor others t" ,jownload uSIng the Interilet
Podcasts were a concp.pt originally
developed by Apple, and the word
' pedcast' s a combination of
the words 'IPod' al1d 'broadcast'
Despite that fact, It has nevel
actually bt'en necessary to use
basIc steps you need to take to make your "",n poocast are
Record your pocicast uSing a digital sound recoloer, and load It "nto a
an IPod or any other form of
computer
Upload the recording to an "nllne In fV1P3 format
MP3 player to listen to a pod.:a5t
because they can be played on
y"ur wmplJter Create an online blog that Includes a podeast feed
Subscribe to your podcast
There that I't to; you to create a podcast You Just
create an online account, then proVided your .:omputer has microphone
the webSite will lead you through recording, uploading and making your
podcast available tN download Have a look at www.ode ... com
D ':or each of the follOWing Situations, suggest either
web log, forum or social networking site'
a Ell,. is !;olng travelling In her gap year and wants
to Upload freq'Jent updates and photos to a web
page 50 that/riends ar,d family can see where she
IS and what she is dOing,
b DaVid has formed a film club that meets once a
week to watch a film He would a way f"r all
members of the cll,l b t" diSCUSS 'Vhlch films
they would like to View at neoct
c Chli3g" about to take hiS A Leveis and move
a'Vay to university He would like an easy way to
keep In touch 'Vlth his school friends as as
new he meets
In this chapter you wili have
learnt:
V' which features are found in web browser
software
V' how to send and receive e-mail, as well as
manage e-mail folders and the address book
V' how to send and receive e-mail, control who
an e-mail is sent to and include attachments
V' how to manage an e-mail address book and
organise e-mails into folders
V' what a search engine is and which search
terms to use to get relevant results
II On a SOCIal networking how would you use
pnva'Y settings to recilJce the risk of someone
accessing personal Information about yOIJ?
D Mark each of these statempor.ts as twe 01
a A pod east has sound only, not Video,
b People cao subScribe to a pod cast
A pod east I; usually p.,t of
d You need a p'Jltable media player such as dn IPod
to able to listen to a podcast
V' what a web log (blog) and forum is, and how
they are used by individuals and organisations
V' what social networking sites are, how to use
them and how to manage the risks associated
with them
V' what a pod cast is and how it differs from a
normal music or video download.
Examination-style questions
1 A search engine is
.\ hardware used to help find information on the Internet.
8 software used to find information on the Internet.
Co hardware used to send e-rnails.
o software used to send e-mails. (1 mark)
AQA,June 2007
2 An increasing number of people use e-mail (electronic mail) as a method of
communication. For many of these people it is gradually replacing other means of
communication such as fax, telephone and post.
(a) Explain what is meant by the term e-mail. (1 mark)
(b) i Which of the following is an advantage of using e-mail compared to using post?
,\ The e-mail will usually arrive quicker than the post.
8 The e-mail can be sent worldwide.
c The e-mail can contain pictures,
II Give one other adYantage of using e-mail compared to using post.
iii Give one disadvantage of using e-mail compared to using post.
(J mark)
(I mark)
(1 mark)
AQA, June 2007
3 An increasing number of people are writing their own web logs (blogs).
(a) Which one of the following is a well-known blog website?
A E-book
B Blog4U
c 'IWitter
D YouTwit
(b) Describe what is meant by the term web log.
(e) Gh e two reasons why web logs are becoming increasingly popular.
(d) Give two possible disadyantages to the visitor of using social networking sites when
at work.
(e) Discuss the advantages of using a web log compared to using a social networking
website.
4 An increasing number of people are joining social networking sites.
(a) Which one of the following is a well-known social networking website?
A E-book
B Face-to-face
c Facebook
D Netbook
(b) Describe what is meant by the term social networking.
(e)
(d)
(e)
Give two reasons why social networking websites are becoming increasingly popular.
Give two possible disadvantages to the "isitor of using social networking sites.
Discuss the admntages of using a social networking website compared to using a web
(I mark)
(2 marks)
(2 marks)
(2 marks)
(3 marks)
(1 mark)
(2 marks)
(2 marks)
(2 marks)
log (biog). (5 marks)
Data logging
Data logging is the process of collecting data over a period of time.
There are many situations where data logging is used both in the home
and in industry, for example monitoring the temperature of an office or
a greenhouse.
Data is collected using sensors. Sensors feed data into a computer, the
computer stores and processes the results, and sometimes an action is
taken depending on the data values detected.
Data logging can be done manually, but in industry it is usually done by
computers. Computers can access locations that a human cannot, and they
can read data many times faster. This means that data can be logged using
computers in situations where it was not previously possible.
Types of sensor
Sensors are used to detect physical quantities, for example heat, sound,
temperature and pressure. A variety of different types of sensor are
used depending on what sort of physical quantity you are trying to log.
Think about the sorts of sensors that might be found in your home:
a heat sensor (called a thermistor) used by the central heating to
keep the temperature within a set range
a movement sensor or infrared heat sensor for a burglar alarm to
detect people inside a room.
Identifying sensors
Sensors are used in mailY devices all around us Look around your classroom
oryour school Try and fmd devices that use sensors - examples include
security alarms temperatl're contmls Wnte a list "f all the sensors ycou
find, what It is that the se,lsor is detecting, and where YOl' iound It
oe
Thermostat and ;ieat sens"rs
Objectives
familiar with
different or sensor
available. and how they alf
for data logging
Understand the advantages
and dISadvantages of using
cDmputerised data IDgginll.
AOfl Exammer 's lip
Ynll to be aware ofthe
olff'ert'!!t ot sensols available
You should be to, r.'<'omrnend a
type of sensor for a given
See tt", Appt'lldi,( vll pages '131-136
ior a Ilf s.'msors and th.,r u,.".,
- -------- - - ---------
-- ---
;pata ,85
----- -- - -
The process of data logging
Data logging always takes place over a period of time. The data from
each sensor is recorded at set time inten'als.
Data logging does not always involve computers - it can be done
manually. You have probably done some manual data logging in
science class, for example heating a beaker of water to boiling point
then measuring the temperature every 20 seconds for five minutes as
it cools. In that example, the logging period is five minutes and the
logging interval is 20 seconds.
At the other extreme, scientists monitoring climate change might take a
daily reading of carbon dioxide levels in the atmosphere over many years.
In this case the logging period is years and the logging interval is one day.
Adval1tages of computerised data logging
Although data logging can be done manually in many situations, there are
several reasons why you would use computerised data logging instead.
Computers can:
run 24 hours a day, 365 days a year and are cheaper than
employing someone to do the same thing
take very accurate and consistent readings - they eliminate human
error in taking readings
take readings with very small logging intervals - for example, a
computer could take a temperature reading hundreds of times per
second
be placed in locations that are not accessible to humans, or are
dangerous or hazardous - for example inside a volcano or on Mars
immediately analyse the data and take action if required - for
example switching on a heater or sounding an alarm
automatically present the readings as graphs or tables
log data from many sensors at the same time.
There are also disadvantages of automatic data logging, such as:
buying and setting up the automatic logging can be expensive
faulty sensors may not be noticed immediately, resulting in
incorrect readings
if the equipment fails, new readings will not be taken and existing
data may be lost.
Logging period. the total length
of time that data IS belllg
recorded.
Logging interval; t he length of
tIme between recording each
measurement.
Learn the terms Logging period
and loggIng JIlterval The period is
always Longer than the interval,
':;J:(
,:.md
;!:
tv,:t'.
.
, t-i;t" t--- X.i;'l,'t ; ;;.' ,.1.n il:,,;."'"
. ..... - "' , . ... ' -r' ''''
i \Jf
Automatic data logging in food transport
Automatic data logging is frequently used in the food
industry to log the temperature of food whilst it is in
transit By law, companies who transport food have to
show proof thatthe temperature ofthe food has been
kept at a specified leveL In order to do this, food transport
companies install data loggers in vehicles that remotely
log the temperature and transmit the readings back to
the company headquarters.
In this case, using automatic data logging enables
companies to keep track of the temperatures without
involving the driver. This removes the possibility of
human error with temperature reading, and also
makes it impossible for the drivers to submit false
results.
Automatic data logging in racing
Data loggers are used by both amateur and professional race teams. The
data logger is fixed to the race car and can either t ransmit the results in real
t ime back to the team. or can log the data for download later to a Pc.
Sensors need to be callvrated
before they can be used ThIS
checks their lIccuraC'j to be able to
measure the (hanges pl"ce
CalIbratIon matches against a
known SLate
These data loggers measure quant it ies such as:
Location, using a GPS sensor. This enables the t eam to locate exactly
where the car is on the track, from which they can calculate current
speed. lap times, and 'split' times (time to complete a specific
section of a lap).
Acceleration usi ng an accelerometer. This measures
forward acceleration and deceleration through
braki ng. It also measures the sideways g-force
experienced by the driver and the car as it goes
around comers.
All of these results help the driver to understand the
different forces on the car, and where lap times can
be improved. It would be impossible for the driver to
measure t hose quantities and log t hem - especi ally
whilst drivi ng! A data logger that can transmit the
results in real time to a race team enables the team
to give immedi ate advice to the driver about how t o
make the car go faster.
7Z!2D.. f;f
II BeioIN IS a lost of Sltuabons where data loggIng IS
lJS'!d Match 2ach sItuatIon to ooe or the follOWing
loggIng Intervals:
half II secorld
f,ve seconds
one hour
one day
Give" reason why you have chosen these intervals
a A temperature .ensor m an offICe bUIlding that IS
.,art ofthe air condltlonln!; system. The system
sWItches the alr condltlonmg on or off to the
temperature within preset range.
b A pressure sensor on an aeroplane that mor,itors
cabin pressure If the pressure fall!; below a certain
vahle cncyger. maslcs are automatically r2ledsed
C A sensor measunng pdlen levels In central london.
The results are fed back tl) "ews statIons tl) include
,n a rnamlng update for hay-fever sufferers
d A hUlToldlty sensor In d pla"t pot that is part of an
automatIc plant watering system.
o A patient IS In hospItal and IS attached to a heart-
rate mOnitor A screen .JlSplays the heart rate as
a graph and as a number of beats per minute lIst
f,ve reasons why an automated system IS usee to
do thIS Instead "f a nu'se 'Tlanually taking a pulse
D For each of the systems velow, sL'.ggest wh"h o;,e
of these ser,sors WIll be used:
move,."ent sensor light sensor
pressure sensor con'i:act
a A security lJght t:,at 51'!ltches on when you walk
near it
b A comp'Jter game with a dance mat that senses
when you Jump on a specifIC area of the ,."at
c A fridge light that SWItches on when you open the
{.Idgedoo'
- I
Chapter 6 Data login! Bnd control softwarll 87 I
- - .
Control software
Control software is used to make robots and other devices move
around remotely or act automatically. Control software is a type of
applications software used to write instructions. These instructions can
be simple directions such as 'move forward one square', or they might
be more complex such as 'if the temperature falls below 20 degrees,
switch on the heater'.
You are surrounded by control software. It is what makes the burglar
alarm sound if a window sensor is broken, and it makes the shop door
slide open automatically when you walk up to it. Electronic gadgets
and toys also operate using control software.
How are traffic lights controlled?
Traffic lights are an example of a system that uses control software.
Some use external sensors and some run on a fixed timer.
The simplest system switches the lights in a fixed sequence at fixed times.
The times are set according to historical data collected about traffic
flow. The traffic-light system does not monitor the current state of the
traffic. The timing of the lights will not change as a result of current traffic
conditions. This system is fine for fairly quiet junctions without heavy
traffic flow, but for busy junctions a more sophisticated system is used.
The second type of traffic-light system uses sensors to detect current
traffic movements. There are magnetic sensors located under the
tarmac at junctions that detect the movement of vehicles passing over
them. All of the traffic data is transmitted back to a central computer.
Using information collected from all of the sensors, the central
computer calculates the optimal timing sequence for the traffic lights.
This information is then transmitted back to the lights, so that the
timing is constantly adjusted according to real-time traffic conditions.
The turtle
This section focuses on control systems that do not use external inputs or
sensors. Control software can be used to give a list of instructions either to
an on-screen robot or a real-life robot - often called a turtle. You can write
instructions that tell it to move around the screen in a specific pattern.
Here you will look at how to write a simple list of instructions to make
a turtle pen move around a grid in a chosen pattern. The pen will then
sketch a diagram.
The instructions to make the pen mm'e are:
UP: lifts the pen up
DOWN: puts the pen down on the paper
FORWARD 1: moves the pen forwards one square on the grid
BACK 1: moves the pen backwards one square on the grid
LEFI': moves the pen one square to the left on the grid
RIGHT: moves the pen one square to the right on the grid.
Control software" s"ftware used
teo programme robuts and
With so
that. they can act or

Turtle' a small robot, either
real Or on-scr""n Simple
Instructl(\ns are used to
programme it to move a(uund
Old you know
Examples of software (;Ire
Star Lago and Flow", Starl.cg"
?' lIom you to ..... nte simple
Flowal
advanced you 'Nnte
l
mort:' mstnJl tlons uSing
flow rn.i1:s
Using these instructions, if you wanted the pen to draw a simple square
in which each side was the length of two grid squares, the outcome
would look like this (assuming that the pen starts in the UP position).
It is good practice to add an UP instruction at the end to return the pen
to the up position where it started.
Using different instructions
instructIons used WIll vary dependIng on whIch sofnvare YO'J are using
MOle importantly, the instructions in the exam will probably be different
to those you have used before! BlJt the good ne'''s is that each instructIon
that you use In the exam WIll be explained In the same way the
InstructIons have been explaIned fr' DIagram 0
Using thE follOWing list of instructIons, write down how you would make
tfle pen draw the same squar2 as the one 'n DIagram 0
PI); Pen Up - raises the drawing pen so that It stop, draWIng
PO: Pen Down -lowers the draWIng pen so that It stari:s d,awlng
m 1: Move forwalds one square
BK 2 Move backwards two squa .. es
RT 90: Turn nght through 90 degrees
LT 90; left thro'Jgh 90 degrees
Now use InstrL'ctlons givE:!n here to ' 'Imte your Init ial!:, even you.
You WIll have to style some of the letters, C, 3,0 and r are some eXdmples
of letters that wili be difficuit to draw using the turtle. It is possible though
- use some squ.red paper to help you
Using control software to programme a water-jet cutter
Most machines and robots used in industry are programmed using control
software. Examples include robots that spot-weld car body parts together
and industrial milling and lathing machines.
Water-jet cutters are used In industry to cut complicated shapes from sheets
of metal, glass or plastic, using a very high-powered thin jet of vlater. They are
very powerful and can cut precise and intricate shapes.
The path of the water jet is programmed using control software. The control
software used to write the instructions for the water-jet cutter will have many
built-in sections of code and rules to help the programmer. For example, if
the programmer enters the type of material and the thickness, the control
software can advise what the maximum speed of the cutter can be and there
will be no risk olthe jet failing to cut rightthrough the material. It can also
automatically calculate a suitable acceleration, deceleration and speed for
corners without causing any distortions.
A simulation of the water jet path will be shown on screen before the cut is
actually made. This enables the programmer to correct any errors in the code,
and to refine the path or speed up the cutter as required.
DOWN
FORWARD:!
RIGHT 2
BACK 2
LEFT:>'
UP
Forwarlj "2
Start and finish pOint
.,A....
I!J a !.unp!e sq,lwe ;):"ii'l9)
turUt'f'p(;
---=--- - - - -- -
C:h.pw.6 DIU loutr.gaod (onff!lt Wtwat:t 89
. . . -.. -.- -
- - - -
Control software used in computer games
All computer games are programmed using control
software, including those that you play on a PC or on a
dedicated games console such as an Xbox, PlayStation or
Nintendo.
The programming involved uses the same concept as the
simple examples above using the turtle - but it is a lot
more complicated!
Of course, when you are racing a car in a computer game,
you are not typing out line-by-line directions for the car!
Instructions for the car are usually input either through
simple keystrokes or using a joystick, games controller or
steering wheel. The control software then converts these
inputs into programming code that changes the pOSition of
the car on the screen.
Take the example of a car race game. The turtle is
with an on-screen car, most likely a three-dimensional car
with very sophisticated graphiCS. The control program is not
a set of pre-written instructions; instead tho instructions
are given in real time by the person playing the game.
There will be many more aspects involved in a computer
game - the control software developed for the latest games
will take a team of programmers months to write. There
are many different parts of programming code that control
other aspects of the game, including the speed of the car,
the movements of other cars in the race, and the constantly
changing background scenery.
Control-feedback loop
In the control software example of the turtle pen, the robot turtle is told
to move without first reading an input from a sensor. In many control
systems, the robot or device must receive an input from a sensor before
takirlg (L">1 action. In those systems, L1.ere is a loop.
There are three main stages involved in the control-feedback loop:
input, processing and output. Take an example of a temperature-
controlled greenhouse:
The input to the system is the current temperature of the
greenhouse, taken from sensors.
The input is then processed. The current temperature is compared
against set values. These values are saved as storage in the memory
of the system. The current temperature is also recorded and stated for
later analysis.
The output is to switch the greenhouse heaters either on or off (or
leave them as they are) in order to keep the temperature within the
desired range.
This output affectS the input because the heater being turned on or off will
affect the current greenhouse temperature. This is the system feeLiback.
Storage
.... on the :""ilngft r)f rE'qlJln:d In thp greenhvust ::twvlti I:n:
informatje,;n en huw temperature .)t the: hi'JS fhJnged over the day
Inll"!
"he: cwre!1
i
.
ti:rnperat ure
t h,:, kreeul. Oli!:>t'
n1p. 3SurE'd uy

t

--,..
t
Processing
Comparing the
!emperaturt::
wi th thE' preset.,
df-5Wed
Feedback
Heater being switched on or off affects
the temperature of the greenhouse
Output
Heater!> are
switched ()(l
or off
II An example of a c(,ntrol-feedhac.:k loop tv control greenhouse temperature
Feedback the way the OUtpllt
the onput example,
a heater swito:hing (In Will affect.
the temf'erat",... Input
tearn the stage. of the (ool rol-
feedback loop
mput a new
re,;pond to It by processing (for
example t.um on I.eating)
check reading . f not a$ reqUired
then change the Input
(feedt-ack)
The autopilot control-feedback loop
Aeroplane autopilot systems were originally introduced to
control the aircraft during long flights to allow the pilot to
rest. Today, autopilots are very complicated systems that can
fly a plane even without a pilot. Many autopilot systems can
actually perform better than a human pilot. They can make a
flight smoother, and can perform landings in zero visibility.
The autopilot works by collecting information about
the current position and status of the plane using
many sensors. The human pilot sets the course for the
plane to travel The autopilot compares the two sets of
information. The autopilot then makes adjustments to
the aeroplane to keep it on course. In order to do this, the
autopilot uses the control-feedback loop.
Look at each part of the system.
The system inputs are:
readings from various sensors, such as speed,
acceleration, wind speed, location, altitude and angle
of the plane in two directions (wing to wing and front
to back)
the desired speed, altitude, location and route, etc. as
set by the human pilot.
The system outputs are:
signals sent to three sets of motors on the aircraft:
elevators: devices on the tail of the aeroplane that
control the pitch of the plane - the angle of the
plane front to back
the rudder: also on the tail of the piane, the rudder
controls how the aircraft twists right or left
- ailerons: these are the flaps on the wings that
move up or down to control the roll of the aircraft;
this is what tilts the plane left or right, making one
wing higher or lower than the other.
Rudder
.. AlsCo the tall of the plane .
1
/ the rudder conimls 1101\' the
".,' m '"
AIlerons
Tht3st: are tfl l:3 ft ape
thdt ;-nove up (II dawn to C(Jnirol
the roll of thp a!rcralt - thiS IS what
tilts plane left or right making
Oile Wli'lg higher (Jr lovlRr than the
otrler
.A.
13 Autopilot control-feedback loop
Processing
The autopilot system is constantly
monitoring the status of the plane
and comparing it to the desired
status.
Look at just one part of the
autopilot system, the control-
feedback loop involving the pitch
of the plane.
Storage
,
Elevatof'l
CleVie",," on the tali of the
aeroplan8 i'hat ctJlltrol
tho 01 Ih& -
lhe angle ,Jf plane
ft!')nt to r.acr.
A data (rdlled a flight. data rewrdel or 'black ;'Ol( recorder') constantly records
and sb,r.?s tile status of 3JrCrafi: ar!d Inputs from the sensnrs This is used to
analysf! fl.lght safety and engn"le as welt ::IS what went wrong In eVE:llt
of an aCCident. Inft:rmatlor. IS at'io transnlltted bad: toll\cal air traffiC cor.tml t::entres
sc. that they can tr ad location and :'itatus of the aircraft
Input
The- current altitude
.:)r.d rutch of the __
plant:! IS measul ed

+
t
Processing
the
CUI rent altitude
pitch ... f the pl"ne
With thE'! values set
by the human pilot
Feedback
The movement of the elevator affects
.A.. the altitude and pitch of the plane
m Feedback loop to control the pitch of a plane
Output
A :Silgnal ls sent to
thif: motor (:ontrolling
elevator at the t:=IIL
of tht: ;)Jrc.raft to
move It up o. d.)wrl
I
---- --- - - -
_ g, ,
The advantages of autopilot over a human pilot are that the autopilot can
monitor the input from many sensors and process them instantly and many
times per second, This means that it can respond to very small changes, very
quickly, resulting in fast response times and a smoother flight,
Of course, autopilot systems can and do fail, although fortunately this is rare,
All aircraft have a simple override switch, where the pilots can switch off the
autopilot system and control the aircraft manually if they believe it is not
functioning correctly,
The conb'ol-feedback loop In household appliances
Consider the following two kitchen appliances '
a kettle that balls water then s''1ltches off
as soon as the reaches 100C
J which ",her, the slot IS pushed down, ""ll
toast the bread for 3 5 minutes then P"'P It up
Draw a Simple diagram With brief explanations of
the contr<'l-feedback loop fl)r that system Your
diagram should Indude the INPUT, PROCESSING,
STORAGE and OUTPUT stages
Which one of the appliances uses a control-
feedback loop?
Choose ,'ne .. household repeat
steps 2 and 3 uSing your chosen applrance
What type of sensor IS "eeded for that c<'ntrol-
feedb<.ck loop?
Summary qUCJs,jons
.,
D ThIS list of instructlor,s (right) IS l'sed to make an o,,-screen tortle
create the shape shown
a What do the FORW and RIGHT Instructions do?
There IS another instruction called REPT does the follOWing
REPT 3 [J: It repeats the Instructions contained In squai-e bracbts (J
times
b Write how you would IJse the Instructl,'" tu create the triangle
shape ab<,ve uSing fewer lines of code
D A ra,ce car h;,s a sporler that changes Its angle a'Jtomatl,:ally to give
a constant downforce regardless of speed, w",d and all temperature
Label the follo"''''g parts of the system as INPUT, PROCESSING,
OUTPUT, STORAGE and FEEDBACK
a sensor thE: curreilt downfurcc 0.' the spoiler
b the sporler angle IS adJusted
c the current downforce IS compared against desired downforce
d the new spoiler angle affects current
I' the current downforce IS logged for later analysis
FORW10
RIGHT 120
FORW10
RIGHT 120
FORW10
Start and
finish p)lnt
Mobile technologies
Today there are many different types of device that allow you to
access the Internet - not just desktop computers!
There are various technologies and pieces of hardware that make this
possible, such as:
1 Laptops (also known as notebook computers): these work in the
same way as a desktop computer, but they are much smaller. They
corne in different sizes and weights, but they all tend to have a
small keyboard with a fold-down flat screen.
2 Smart mobile phones (also called smart phones, PDAs (personal
digital assistants) or palmtops): these are mobile phones that offer
many of the features found on a computer. Some of the features
you will find on most smart phones are:
Internet access
e-mail that automatically downloads to the phone when it is
received
a calendar and c.ontacts address book
applications software such as word processing and spreadsheets
large memory for storing data, and the option to insert
additional memory cards
a cligital camera.
WAP
Wireiess Application Protoml (WAl') is a technology that enables
mobile-phone users to view specially adapted websites on their phone
screens. If you have a mobile phone with access to the Internet, and the
websites you view look simplified and have a different layout from when
you see them on a computer, then you are probably looking at a WAF
site. Note that nevler phones like the Apple iPhone do not use WAF, and
instead display websites exactly as you would see them on a computer.
Convergence of mobile t echnologies
Over the last few years. we have seen many different types of
technology combined into single devices. It used to be that your
computer, phone, television, satellite navigation system and electronic
organiser were all separate devices. NoW; it is common to find all
these technologies (and more) in one package. An Apple iPhone is an
example of this - it has all of the above features and more packed into
a small handheld device.
Satellite navigation systems
Satellite navigation systems are often used by drivers to find their way
around. They use the global positioning system (GPS), which has 24
satellites named NAVSTAR orbiting l8,000km (11,000 miles) above
earth. The receiver listens for signals from these satellites. If it can pick
up signals from three or four different satellites, it can calculate your
KQy'arms
laptops ( aIled A
personal computer IS small
enough to lise on your lap
to cany Mound They have a
keyl>oard, rnotisP an,'

Smart mobile p!1ones' also
called ,mart roAs
0" poirnt'JDS,
ph..,ne:; offer features found
on computers,
'nte! net access, e""mall
some applications softwal e
!\f>plic6ti:>n Protocol
(Wt,P) technology that
mODI I.-phone users t.o
View ph,mp-fnendly of
Vleusltes 011 d ph(/ne screer.
- "'--
D Appi" /Ph01!e
precise location. It can then plot a route for you to follow. Satellite
navigation systems use touch screens ro make it easy for the driver to
use on the move. They also give voice commands so that the driver
does not have to look at the screen while driving.
Look up five different mobile digital devlc.s on the Interroet A good place to
start would be a selling mobile phones.
Draw a the one below Look up details on each device and fill in
the table. Which one woul.d you buy and why?

- - --.. . . . _._.
.... __ ._-_ ... . _--,---- --,
Device name
I fit in a
I
Performance - Storage/
is it powerful memory - how
enough to run I much memory
a variety of does the
applications, such come with?
as Por..ket ExceL? Is it possible
to pand the
I
L-" -=-_-_ -_ -1 . .lf- .. _.-..... -... _-=--=--=--=.l- i-_-=-_
memory?
Summary qU0sr/ons
Identify which devl.:e would most suitable for each .;f the follOWing
Situations Give ,'easons for your choice.
11 IS taking a three-hour train jourroey from her office to a conference
where she wiU be giVing short presentatlOl1 She has prepared most of
presentation but Intends to make some c'n the .I0Ul ney
Q Raul area manager for a restaurant and is the
day travell.i ng around restaur.nt locations He needs to be
In contact With heod office and to 'Ilew hIS e-malls at all times He
also needs to update hiS calendar and address book legLilarly
In this chapter you will have learnt:
V the variety of sensors used to measure physical quantities such
as heat, light and pressure
V how data logging is used, and what is meant by logging period
and logging interval
y the advantages and disadvantages of using computerised data
logging
..... what control software is used for, and how to write simple
instructions for robots and devices using control software
y the different stages of the control-feedback loop and how to
identify these stages in real systems
..... the advantages of mobile technology.
Connectivity - for
example, does it
have 3G, Wi -Fi or
Bluetooth'
Applications
- what sort of
applicvtions are
available to use
on the device?
---'-_ ... _ .. -
AQjj,/1 Examination-style questions
1 The definitions below are all related to data logging and control systems. From the list
given below, choose the tenn that best matches the definition.
A actuator B calibrate c data logging
D encryption E feedback F graphing
G keyboard H logging interl'al modem
J period of logging K sensor L "izard
(a) Collecting and storing of data at regular, fixed intervals over a period of time.
(b) An input de,ice used to measure environmental conditions.
(e) The time taken between one reading and the next.
(d) Th compare readings of a sensor againsllhose of a known scale.
2 A group of pupils from a school enter a competition to build a programmable robot.
The robot must move around an obstacle course without bumping into the walls. The
walls are shown in black in the diagram below.
Examples of the instructions needed to programme the robot are given below.
Instruction list
Fd2
Bk2
Rt90
Command list
Fd4
Fd5
Fd6
Rl90
Bk4
Bk5
Movement by the robot
Moves the robot forwards two squares
Moves the robot backwards two squares
1I1ms the robot right through 90 degrees
(J mark)
(J mark)
(J mark)
(1 mark)
AQA. June 2008
-- - ------- -
(a) Using only the commands from the Command list abm'e, write down instructions
to mOVe the robot from the starting position shown to pomt A.
(b) Again using only the commands from the Command list, wrlte down instructions
to move the robot from the original starting position shown to point A, then to
point B and finally back to the original starting position.
(2 marks)
(3 marks)
AQA, June 2008
3 A home central heating system uses a monitoring and feedback system to control the
temperature of each room in the house.
l'
9
,/'"
N:y
Yes
-I
,,/ .........
Yes
-I
<., /:
-
No r
(a) The system is used to maintain the temperature of the li\ing room at 23 'c. Copy
and complete the tlowchart to show how this system works by \\Titing a letter for
each answer in the flowchart boxes,
(b)
(e)
A Turn off the heating B Turn on the heating
C
E
G
Disconnect the heating D
Is the temperature greater than 23C? F
Is the temperature equal to 23C? H
Read the temperature in the room
Is the temperature less than 23C?
Print the temperature of the room
What dey-ice would be needed to read the temperature in the room?
Why might the central heating system need such a de,ice in each room?
(3 marks)
(1 mark)
(1 mark)
AQA, June 2007
4 A weather station is located on the seafront of a large seaside town,
(a) Name one sensor that could be used to take the temperature. (1 mark)
(b) What is the name given to this automatic process of collecting and recording data at
fixed intervals? (J mark)
(e) Give one ad\-antage of the weather station using more than one sensor to record the
temperature. (J mark)
(d) Gi,e two admntages to the weather station of collecting data automatically rather
than by hand. (2 marks)
(e) Each sensor used by the weather station has to be calibrated to a known scale before
it is used. Explain why this is important. (2 marks)
AQA, June 2006
-- - -
- - ---=- - - -- ".. - -
Legal issues relating to the use of leT
ICT plays such an important pan in modern life that it has many
implications for the way society operates. It affects the way that
businesses are run and the things that people do in their leisure time.
ICT can have an impact on the environment and on everyone's privacy.
This means that laws are needed to control the way ICT is used .
The Data Protection Act 1998
From the moment we are born, data about each of us is collected and
stored by many organisations. The Data Protectior.. Act! 998 (DPA
1998) is designed to protect the privacy of people about whom data
is held. These people are known as data subjects. Organisations
that hold personal data are called users. In the UK, the Data
Protection Act 1998 is enforced by the Infonnation Commission" ...
Data users have to register with the Information Commissioner and
state what data they hold, what they intend to use it for and how long
they intend to keep it stored. They also have to agree to follow the
rules of the DPA 1998, which are known as the eight data protection
principles. These say that data must be:
fairly and lawfully processed
processed for limited purposes
adequate, relevant and not excessive
accurate and up to date
not kept for longer than is necessary
processed in line with your rights
secure
not transferred to other countries without adequate protection.
The rules sound complicated, but most of them are really common sense.
Data users must make sure that they follow the rules when they collect
data. If they intend to pass your data on to anyone else, they must ask
your permission. They have to make sure that they keep their records
up to date and delete them when they are no longer needed. They
must make sure that only authorised people can access the data. Each
organisation holding data must appoint a data controller - a person
who is responsible for making sure the organisation follows the rules.
Your rights
As a data subject you have the right to:
see what data is being held about you and ask the organisation
holding your data to provide a copy of it. The organisation can
make a small charge for sending it
Objectives
Understand the political, ethical
and environmental issues
affecting the way ICT is used
AU' Examiner's liP
MakE: sure you knm\ the
between a user
(for YOllr school) and a
data subject (for exampie Y"")'
The Act to data
Data Protection Act 199a a ldw
deSigned to protect the privacy
of sonal information
Data subje<:ts abwt
whom data IS stored
Data users reoplp or
o;gan!satlol's that
personal data
Inrorm;Jtiot1 COf!1m;ssitmer the
government depdi1:n1enf. that
p.nfort:cs Dat.a
Act 1998
controUer the Hi dn
org.OIsatlon who IS resp<'nsibte
tor ensuring thi!
Act 1398 rul.es are tollc,wsd
Chapter 7 Implications of ICT for society 97
have anything corrected that is inaccurate
ask the organisation not to process information if it might cause you
damage or distress
refuse to have your data used for direct marketing (sometimes
called junk mail)
complain to the Infonnation Commissioner if you think a data
controller has broken the rules
claim compensation through the courts if you have been caused
damage by a data controller breaking the rules.
Exemption
There are some cases where the DPA 1998 does not apply. These are
called cxcn::ptions to the Act. There are a large number of these, but
some of the most important ones are:
where national security may be put at risk
where information must be available to the public
where information is for personal use within families
where information is needed to prevent and detect crime
where information is needed to collect taxes.
Keeping data safe
It is important for data users to keep your data safe. It is also important
that you protect yom own system against computer Viruses
are pieces of computer code that can delete or corrupt data files. They
are often sent as e-mail attachments or web links. Some viruses affect
the user's instant messaging package. They send virus-infected files to
the contacts in the user's address book. If you think an attaclunent or
message looks suspicious do not open it.
It is also possible to corrupt computer data, either deliberately or
accidentally. It is important to follow the rules about how and where
files should be saved. There is more information about version control
in Chapter 9, page 127.
The rules of sensible behaviour should also be applied when
contributing to Wikis. Adding content that may not be correct might
confuse other people. For that reason, you should also be careful to
check the reliability of any information that you use from such sites.
computer Misuse Act 1990
The Computer Misuse Act 1990 sets out to prevent unauthorised
access to computer data. Accessing a computer system that you are
not authorised to use is sometimes called hacking. You might think
that hacking is done by people outside an organisation, but that is not
entirely true. Most networks allow users to access limited parts of the
system. If a user tries to access a part of the network that they are not
authorised to use, they are breaking the Computer Misuse Act 1990.
The Computer Misuse Act 1990 has three levels of offence:
Levell: accessing a computer system, software or data that you
know you are not authorised to use.
Remember
j :>"It .. ,, d:on ,. t;i,.
I. " . "
I
, . i to<lu::
, l' .:b.'.ut .u
r
. ) W:;'" f":;' an.! J
J : . ;,.:."',"}'I> I
.,-_ _ _______ . . __ .1
Lea! n four 01" the data
protectlClrl th.t apply
to a lIS<'r o the . "er
tl) ",member about 'loollng
after
th",. fights of data
sllbJett - the easIer to
rt.'mem!.n!f ;oj? dbout :you'
Learn two to the
Data ProtEct, on Act 1998 -the
onp.s to .li e
at,out 'keepIng you and the UK
",j-e'
Key termfl
SrtudtlOns wherE:' the
data nllp_< do not apply
Viruses of computer cOlle
that by t:OPY"lj;
t o ot her files They
c,m cause dam;,ge to stored
dal. or stop pro!;r.ms funrung
p,uper!y
HackIng a(wsslng CQlT'puter
system you are not t o
Harimg ls an ,'ffR"'" under I
the Co/uput", MIsuse Act 1990
<X)l!nks
More information about the DPA
1993 can be found on the website
of the Commissioner's
Office at www.ico.gov.uk.
-
.... (,\' ,., . " . ....
--
i "'---:-;J,:::;, .. .
....-.

.... .A.....
B Vims protection !J ottware mf.:ssDqr.
Level 2: unauthorised access with the intent to commit a further
offence such as fraud or theft.
Level 3: unauthorised modification of computer material. This
could mean changing or deleting data or planting a virus.
The person committing the offence does not actually have to benefit
from what they do. Levell of the Act would apply to someone who used
another person's password just to have a look at various parts of the
system. The important point is that they know they are not authorised to
see those pans of the network. This would be a level 1 offence.
An example of a level 2 offence would be someone who used their
unauthorised access to find out someone else's Internet banking password.
Creating a virus and deliberately sending it to another computer would
be a level 3 offence.
Copyright and Patents Act 1988
Copyright legislation is designed to protect intellectual property. It
applies to books and music as well as computer sofnvare and images.
Material that is protected by copyright has a symbol next to it, and
that means that it cannot be used or reproduced without permission.
Copyright legislation also applies to computer software. If you buy
a computer package, you are actually buying a licence to use it. A
software licence lays down the rules that you have to agree to if you
want to use the software. The licence agreement is usually displayed at
the beginning of the installation procedure and you have to click to say
you agree to it before you install the software.
Imagln", that yuu tlaV'? a bnlllanl Idea lor a new computer game.
Y()U spend a lot of tlr,le planiling and on your Idea, you
P"')' people to clraw ri' and ',,",nte tlle programming code and you
are read; ['J cany out a hU2e !aUn(;1130 that people can buy it. On
the your launch IS due you lind til at someone else has
stolen your code a(jj publ:shed the garne half the pnc9 you can
afford ,0 sell It 101 You w0uld not b8 .'c,rl happy. would you? The
game was )iOur Id"a Ikj',lch mal,es ri your rnt8I1e,;tual property. If
you had apph8d for (';0PYlight ,il8 other ])8rson would not be able
to use your (; vcj", wltilout YOUI p"rrnlss lon
Types of software licence
A single-user iicence will allow you to instail and use the software
on one computer. Sometimes it will allow you to install the software
on your laptop too, as long as you never use both copies at the
same time.
A multi-user licence will state how many copies of the software you
are allowed to install. Businesses will use multi-user licences when
they install software that runs across their network.
Site licences apply to some educational software packages. They
allow the school to install as many copies as they want, but only
within that school.
Shareware software is usually available on a free trial to begin with.
Sometimes the trial version only works for a limited period of time
Personal data guardianship
code
The BCS (British C"mputer Society)
alms to help to understand
th",r rndlVldual
when they store personal data
The code has pnnclples
of ac.countabllity. VISibility.
con",n!, arcess. stewardship and
responSibility Use the link to the
BCS webSite to .ead about the code
Produce a leaflet that why
the code is needed and what the
pnnaples"f the c.ode are .
ClDlinks
The BCS (British Computer Society)
has developed a Personal Data
Guardianship Code which is at
www.bcs.org.
KfiY tfirms
Intellectual pr'operty'
creations such as s"feware or I
mUSIC that can be protected by
copyrrght,
Soflwarl> licence a legal ag_ment
,t.;tlng how a piece of software
may b. installed and used
Breaking the Computer Misuse
Act IS punIShable by a pnson
sentence of up to five
N...J
A
Examiner 's tip
Learn two facts about the
Copynght.and Patents Act 1988.
The easier "nes to are
It prevents the theft of your
ideas (,.lled 'mtellectual
proper ty'),
!t applies to computel
software/music!vldel)lbooks
Chapt e r 7 Implications of leT for society 99
or has some functions removed. For example, you may not be able
to save the files you create. If you like the software, you then pay
for it and the restrictions are removed.
Public domain software is sometimes called freeware. You can
install and use it without having to pay for it.
..........
MICROSOFT SOFTWARE SUPPLEMENTAL LICENSE TERMS
MICROSOFT ' .... IHDOWS INTERNET EXPLORER 8 FOR
MICROSOFT WINDOWS XP, WINDOWS VISTA, WINDOWS
SERVER 2003, AND wumows SERVER 2008
l' : ::. -e ,:",.;: :_.; .-J,
...
.-, ' ,, : ... :-e:: :_c:<
, ' I 0;-: :!.o:';'It !T "!! r.: '. n : ' :1. t <!:
Il A licence agreement
Plagiarism and copyright
v
With so much content available on the Internet, it is very easy to obtain
information. It is also easy to cut and paste that information into
your own work. If you mark that information as a quote from another
source, then that is acceptable. If you simply use it without saying
where you got it from, that is plagiarism, which is a form of cheating.
The Internet is a useful place to carry out research, but it is important
to write about what you find in your own words. You should only select
the parts of the material that are important, and you should always
quote your sources so that you can prove you have not cheated.
Some images and other material may be subject to copyright. TItis means
you are not allowed to use them without permission. TItis material will be
marked with a symbol. It is not enough to crop an image to remove the
symbol- you should ask permission to use it or choose another image.
Univeisity applications
UCAS reported that:
Key terms
Plagiarism copYing a piece
of WI itlng. mu"c or othel
Intellectual property from
someone else and presenting It
as your own work
Copyright: a legal nght gIVen to
who create; document>.,
pictUres or musIc It mean, that
other pP.Ople cannot use that
without the permiSSion of
the copyright owner
Students applying for places at British universities do so
through an organisation called UCAS. As part of that process,
they have to write a personal statement that tells the
universities about themselves. It is important that the personal
statement is written by t he student in their own words.
'Almost 800 medical applications had personal
statements containing phrases directly borrowed from
three online example statements. Some elements of
sentences were found to be remarkably common:
In 2007, UCAS estimated that about S per cent of applicants
copied parts of their personal statement from the Internet
or from other students. UCAS is unhappy about this as a
personal statement should be the student's own work.
UCAS needed a system to stop this plagiarism. They used
detection software called Copycatch. It compares every
application with thousands of personal statements posted
on websites as well as those from previous years.
If three sentences or more (about 10 per cent of the
statement) appear to have been copied, the forms are
passed to UCAS staff to be looked at in more detail.
370 contained a statement starting with: " ... a
fascination for how the human body works ... "
234 contained a statement relating a dramatic
incident involving " ... burning a hole in pyjamas
at age eight ... "
17S contained a statement which involved" ... an
elderly or infirm grandfather. .. ".
Data taken from the UCAS website (www.ucas.ac.uk).
Music downloads
It is perfectly legal to upload to a website such as MySpace music that
you have composed and recorded, so that other people can listen to
it and download it. If you want to stop people using it without your
permission, you have to apply for copyright.
Music bought and sold commercially is subject to copyright. If you buy
a CD or music through a digital download, you are buying the right to
play it for your own personal use. You do not have permission to pass it
on to other people, even if you do not charge any money for doing so.
It is illegal to upload music bought commercially onto a peer-to-paPI
site that allows other people to download it. If you download music
illegally, the anist and music company, vlhich paid a lot of money to
produce it, do not get paid for the work they have done.
The music industry takes illegal downloading of music very seriously.
They have prosecuted individual people who have uploaded or
downloaded music illegally. Some ISPs will also warn users and close
their Internet account if they continue to download illegal content.
The same arguments apply to illegally downloaded video.

D What law would you be brzdklng If you did the follOWing"
a Downlodde<:! new album of your singer and gave (op,es
to all yOU! fnends
b Plmt2d out a customer's 'finance record an} I,eft it tin your desk when
you went home.
Used a computer that a member of staff had forgot.ten
to log off, "nd you luoked at another student's file
o James wanted to buy a ne,1 comput.er on Interest-free credit, but the
shop said hIS credit rating was not good James is
hec3'lse he does not tt' anybody
a What nghts does James have under the Data Protection Act 199B?
b What. would you adVise him t o d.:l ;
( .lames has Just m0ved house. Why do you think thiS :ould have
caused the problem>
Peer-to-peer site' dlso (aile<:!
a PLP S!te-; 3: webSite where
people upload muSiC and
Video so that other people can
download It, usually Illegally
TI!e orit:sh Ir/jIJ5try
(aPI) IS a trade ,ltl<anlscilon that
anne; te protecl. anti
'the: Bnt.I')h rm.:slt 1m iustry it
prosccutj pwpl" fe,r III.e!!,,1
.... FOi:- p-xi.':rnplp. the
parenL ... of '.Nho tjld fII)i;
ufi(wr!ltznd trw dov:n(\)ads
werE" have
!n tIlt:' of' a '4
l//itS h!lt!d 2,500 ii-X t:us
CD links
Creative Commons is a non-profit
organisation that encourages
creators of music and video to share
it with other people. It provides a
method of licensing that allolVs
creators to control what their
content can be used Find out
more about Creative Commons at
http://creativecommons . .,rg.
Chapter 7 Implications of ICT for society 101
Soci al and economic issues relat i ng to the
use of leT
Chi.lnging pattern of commice and industry due
t o increased use of ICT
I CT in industry
Developments in ICf have had huge impacts on the way that
businesses are run. In manufacturing industries, computer control is
often used to design and produce products. The designer can use CAl)
(computer-aided design) to draw a product on screen. The data from
the design is then fed to the that will produce it. This is called
CAM (computer-aided manufacture).
Robotic arms can be used to move goods on automated production
lines. The progress of goods can be tracked as they are manufactured.
The stock level of components used in the production process can be
monitored and items can be re-ordered automatically when they fall
below a minimum level. This ensures that the correct amount of stock
is always available.
The effects on product s and people
These developments have had an effect on the products themselves
and the jobs of the people who make them. products have tended to
become more standardised. This is because it is expensive to set up a
production line. So it is more cost effective to make large amounts of
one product rather than smaller amounts of two or three variations.
Fewer workers are needed on automated production lines, so many jobs
have been de-skilled. Watching a machine produce things does not take
the same sort of skill as producing the things yourself. On the other hand,
the design and setting up of the production run is a very skilled job.
It is important to remember that some products will never be suitable
for automated manufacture and that many people still value handmade
goods because they can be a little bit different.
ICT in commerce
Commerce, the way people buy and sell things, has changed too.
F-wmmercc, or electronic commerce, has grown massively in recent
years. Most high street shops also have an e-commerce website and
many retailers, such as the bookseller Amazon, do not have shops at
all. This reduces the company's costs as they only need warehouse
premises, which tend to be cheaper to rent than high street stores.
E-commerce is convenient for shoppers as they can choose and buy
products from home rather than travelling to the shops. This saves
time and money. It is also easier to shop around for the cheapest price
online. Disabled people find online shopping particularly useful.
On the other hand, there are delivery charges to pay and you do need
to be at home when the goods are delivered. It is not possible to see
Key ferms
CAD. cornputer-arded dp-sign
U:;es Cl c.:ompirt er to produce
drawl!1gs \)T "[he deSign of a
pro<luct It may alst) be used
for l1utometlc (.cll-:ulatlon r..:f

CAM
(rldr'lufdctt,re I.lses ')utp" t
from C/\D pat:kagp5, it us,:"s
()']tTi putei '5 ':0 cOf'ftroi the tools
that manutc.1C[Urc nf
product,
!=-comm:!rce t he intemet fflr
ir-sk, sw:- h as 5climg
goods or ,SJ: ;VI(t.'S
fxample of CAD used to desi!111 a
bousing deve/(Ipm'::,"'Jt
I . . .:0 = V; " ' ,, :; ,' "
, " .,, 0' '._-." .j. ":: 1-'
;: l U .. ' . ," 'It..
1 ;, i : ' - . " . . . .;.:. ,,.. . ::::::::, . I
" - .. " .:;1 H --.;:
.. -:. I _<" - . ,!!IIl'" .... . - - - - - 1;, ...
\
the quality of goods or try them on, so there is a danger that you will
be disappointed when they arrive. It is also important to choose a
reliable supplier, otherwise the goods may not arrive at all!
It is now possible to order goods from virtually anywhere in the
world. That also causes problems as some goods such as weapons and
prescription drugs are legal in some countries and not in others.
Changing pattern of empLoyment due to increased
use of ICT
ICY has changed the way that many businesses operate. Manufacturing
processes that used to be done by hand are now often performed by
computer. This can change the way a business operates, closing down
some types of businp.ss and creating new ones. In many cases the
number of people needed has been reduced, and the jobs that they do
have changed. Many factories have become smaller but, with a much
higher level of technology, they need powerful computer networks and
clean operating environments.
UK newspaper industry
For a long time the English newspaper industry was based in Fleet Street
in central London. The newsprint was set by skilled operators on huge
typesetting machines. In the 1970s and 1980s, things began to change. Rupert
Murdoch and Robert Maxwell became heavily involved and the decision was
made to move newspaper printing out of the centre of London.
The layout and printing of newspapers at the new sites were computer
controlled and needed a different type of skill. The manual skills of the print
workers were no longer needed. This caused the workers to strike. In 1978
strikes meant that The Times and The Sunday Times were not published for
11 months. The old methods were inefficient and expensive. Some of the
newspapers retrained their existing workers, some simply sacked them.
Newspapers are now laid out by computer and can be sent anywhere in the
world to be printed. This means that holidayma kers in Spain can see their
favourite newspaper almost as quickly as they would in the UK.
Use of the Intemet and growth of 24hour news channels present new
challenges to the newspaper industry. Most newspapers also have online
editions and some are struggling to compete for the advertising income
that pays for their production. Some newspapers have gone out of business
because ofthis.
Teleworking
Powerful computer networks have meant that more people are able to
work from home through a process known as teleworking. They log on
to the company network via their own computer and work mostly from
home, perhaps visiting the office from time to time for meetings. This
way of working suits some people, particularly those with disabilities
or those who care for children or elderly parents.
Working from home reduces the time and money that is spent
travelling to work, and the reduction in traffic is good for the
environment. A wider range of employment may be available if you
AQ" Examiner'S lip
teaon four advantages of
e-commerce, for example buy
from horne, buy at any time (24n),
much more chOice (worldWide
market), no com;
compare costs. bUSiness does not
have to rent a high street shop
Learn four disadvantages of
for example
computer/lntemel
reqUired, delivery charges, goods
may be damagedltncorrecr, have
to be i't "QI"n4! to receJVe
cannot feeVsee the goods
Development of eBay
http://news ebay com/history
dm shows the :list"ry of the
development "f eBay Look at
the informatIon In the yeal-by-
and present
of It In a graphical way USh'g the
appropnate softwarz You might
:>rodu.t:e a tll'Tle of Important
cievelopments, or chalts of the
trading and ernployment figures
workmg from home
usmg a networked computer
ratherthan travelling to a place
of work each day
Chapter 7 Implications of ICT for society 103
do not have to live near the place that you work. Businesses need less
office space, thus reducing their costs. On the other hand, teleworkers
miss out on the social side of work. There is a danger that home
workers may feel isolated and less able to discuss work problems than
those in a shared working environment. It may also be difficult to avoid
distractions when working from home. This could be anything from
watching TV to friends visiting duting working hours. Teleworkers
must set aside time each day when they can concentrate on work.
The InueaBlng use or computers and networks has made
It PC'SSlblt! tor peepl8 to 'A,,)I'I-. III a less traditional way A
bank s financial used to ,'ISlt dlants and dlSCIJSS their
reqLllremoS"ts The,' 'IIould ,"'Ite them down and then work on
(hem on a computer In the oifrce
the frnancral advrser can find Inforrnatloll about clients'
products I)n-Jurance pollcrss. mortgages. etc') and accounts
o"el th'? Internst The'{ '';<In aC0'!55 the ballk's computer system
uSing a SflcLlnty-er,Gr'ipt8d lapiop -rhey can war k from home
rather th"n gOlllg Into the nifrcEo :::marl ':,an be accessed
'.'Ia .noblle phone and d",t"rls of apporntments sent by text
m8esages
The result ,)'f this i<hnol091 rs ihat {Jorklng hours b.;:come more
tl"xrble eB people clo n'Ji he:;e to b", III the c,fflce at set times.
When they do go rnto the office rt operates a 'hot deskrng'
sjstern Th"t means no one therr 0'." 11 rjesk they Just use
...,llICh03J81 one to 00 fr",,,, For many peoplt!. thiS more
Ilet.lble way I)f wo;klng '>'I'IIIIIl'; lrease lilerr Job satlsIactlon.
Socia! and personal effects of leT
ICf has changed the way that many people communicate. lWenty
years ago, social communication was done in person or over a landline
telephone. lbday, most people in the UK have a mobile phone and access
to the Internet. These have widened the choice of methods that people
use to keep in touch with each other. Personal websites and hlogs can
be set up to let the world know what you are up to. Instant messaging
makes it possible to chat to a friend whilst working on a computer. The
biggest development in recent years has been social networking sites
such as Facebook, MySpace and Bebo as well as blogs such as '!'witter.
There are even junior versions of these sites, such as Club Penguin.
Many media celebrities use social networking sites as a way of keeping
their profile in the public eye. Politicians use these sites to put over
their message. It is now much easier for old friends to keep in touch.
Most of us would not write dozens of letters about our personal news.
Social networking allows us to tell others about the events in our lives,
from the trivial to the really important.
On the other hand, these sites can create pressure. Having 300 friends
listed on a social networking site is unlikely to mean you have 300
friends in reality. The pressure amongst some teenagers to have a lot of
friends listed means that they accept people onto their site that they do
not actually know, Personal safety online is covered in more detail in
Chapter 8.
computer-based WOIj., .Ilow,
to monito! employees
extremely closely caU
centres, for example Evel y cAl
that 15 made can be 50
every word that. the employee
speaks in a day can be
and dlscus.<ed may be
used for '(rail ling or to deal With
customer compl.rnts
Th. number of call< pro(essed
Cdn be calculated Employees
may be rewarded for effiCIency
01' dlsclplirred for a poor call rate
lhis can cause .'Some emph.'yees
to become !,tresser.
Did you know
Many (elebrrtles "nd pol.itlclans
use TWItter. In 2009 the r"lleS
Online published d l.s1 of lamuus
listed In ordel of how
many people had SIgned up for
therr posts Stephen FlY came top
of thetr list, which also rnclu(;ed
pop st.r Brltnoy Spears and
former Amencan VI(:ePr'!Sldent
Al Gore
'You tar. lead a celeb to tWltt.er
but you can't make theM
tweet.'
http://technology.timesonline.
co.ukltoVnews/tech. and. webl
articlE'5641S93.ece
. - ,... - . :,s:::,
.'- - . I J.._' . , :.. .. 17' -
... . r .. -.... : .;- .. .t' . of' -'" .... -. \ --.;;;, .'
ti . ; .>1';';'. - ," . 'c.'" c "'- .
. " 'f_ r,
. ;. " \ . ' _ " ., ;-.,;;;1 . k
. _ _.,_-.-:-- - " i"'!'\ _
The growth in personal communication methods means that many
people find it much more difficult to relax and get away from the
pressures of daily life. A busy business person used to go on holiday
and forget about everything for a week or two. Now it is very easy
for their colleagues to phone or e-mail about the slightest problem,
meaning that the break is much less of a holiday than it used to be.
On the other hand, people with restricted mobility or those who are
shy about communicating in person, can feel much more able to
connect with others using electronic methods.
Equality of computer access and leT skills
Computer skills have also become very important in the employment
market. Businesses tend to look at computer skills when choosing
employees, and the UK government has listed ICf along with English
and maths as a basic skill that all students need.
In the UK, the Computers for Pupils scheme aims to help some of the
most disadvantaged secondary-school children. It aims to improve their
education and life skills by putting a computer into the home. Local
authorities identified as having eligible schools and pupils in their area
have been given funding to buy ICf equipment.
Outside the UK, stUdents in developing countries may not have access to a
computer - they may not even have access to an electticity supply on which
to run one. This puts them at a disadvantage compared with students in
wealthier counnies. The One Laptop per Child scheme is researching ways
of providing computer access to children in developing counties.
Accessibility
It is important that computers are made as accessible as possible for
people with a range of disabilities. People with visual impainnent often
find computers extremely useful once they have made some adjustments
to the display. The operating system can change the zoom settings to
make the screen display bigger, although this means the user will have to
scroll around more. Changing the colours of the background and text can
make it much easier for some people to see. Websites can be set so that
they read out the text and descriptions of the pictures. Scan-and-speak
systems can scan paper documents and read them out loud. This means
that a visually handicapped person can deal with their own letters rather
than needing someone else to read them.
Specialised input devices such as eye-tracking devices or a mouse that
can be operated with your foot can help physically handicapped people
to become more independent.
li
J1
"i"Ei4ia
i
'41
11
.J,?i
D 'C(lmputers steal people's Jobs and cause redundan(les ' Clo you
With thIS statement> Draw a mind map or list to help you
foel's yOl" Ideas on c"rnputers arId Draw up d table of
and disadvantages of comp'Jters In bUSiness and industry
o 'If computer$ are important In education, what happens to .. en
who do not have access teo them" DISCUSS thIS stztement, etpla,n,ng
some "f the schemes that are available to prOVide computer access
tc, children at home and
co links
http://industry.becta.org.ukl
display.cfm?resID=2061S describes
the Computers for Pupils scheMe.
http://laptop.org describes the One
laptop per Child scheme.
This el'e-trac,/:in'7 d"vlce uses
be.,msano cameras to 0110\'.' the
control tile ccmputer\:/iih eye
movements
Chapter 7 Implications of ICT for socJety 105
Polit ical; ethical and environmental issues
relati ng t o the use of l eT
National databases
The DNA database
The UK police keep a national DNA database. DNA samples obtained
for analysis from the collection of DNA at crime scenes and from
samples taken from individuals in police cl.lstody can be held in the
national DNA database. One aspect of this that is unpopular with many
people is that the DNA of people who are questioned but not charged
with a crime has been stored on the database.
There is no doubt that DNA analysis has helped the police to solve
many crimes, and some people believe that it would be better if
everyone had their DNA stored. Others believe it is a breach of human
rights. The European Court of Human Rights has ruled that the storage
of DNA from innocent people is illegal. This may stop it being collected
or it may just place a time limit on how long it can be stored.
Nationa! identity cards
In some countries around the world, citizens are expected to hold an
identity carel. These are used as proof of identity, for example if they
wish to open a bank account. In some countries they are compulsory,
in others they are voluntary. In 2008 the UK government launched
its identity card scheme. The cards will be compulsory for foreign
nationals living in the UK and voluntary for UK citizens.
The cards use biometric data from faces and fingerprints to identify
individual people. The government believes that the ID cards will improve
national security. They are compulsory for key workers at airports, as the
government believes this reduces the chances of terrorist attacks. The
cards cost 30 each, and many people feel that this charge is unfair and a
waste of taxpayers' money. Others feel that it is an invasion of privacy.
Security and privacy
Storing data on a large scale always causes concerns about the privacy
and security of the data. Several cases of data loss from government
systems have been reported. The fear of identity theft makes people
very anxious about personal details falling into the hands of criminals.
Some personal data gathered for one purpose could easily be used
for a very different one. If data from the NHS Connecting for Health
database became available to private companies, people with a risk of
future health problems might be unable to get insurance or find a job.
ODlinks
NHS Con;1ecting for Health is ene oi the largest schemes of its kind in the
world. It aims, amongst other things, to store all patient data centrally. find
out more about it at www.connectingforhea!th.nhs.uk.
CDlir.ks
The National Policing Improvement
Agency website www.npia.police.
uk gives more information about
how the police use technology to
help them solve crimes.
Old you know
The UK's DNAdatabaS<' IS
!.he- largest of any (X,untiY
ApproXImately S 2 per cent of the
I
UK popuidt;cn I, or. ".taba",
WIth 0 5 cent in the
USA database has
slgmficc:'ntty over rp.!cent year.s By
the of 2005 thor. , 4
mIUJo." DNA of l"own
activE" held on
database
'--_ .. ____ " __ --.I
Identity cards - what do you
think?
Information about identity c.rds
IS on the Dlrectgov site www.
direct.gov.uk Follow the Hnk to
Government, citizens and rights
Search for information on the
Identity card within thiS website
Theil seal ch for articles on
identity cards or; -the BBC news
webSite (www.bbc.co.uk) These
WIll reveal some facts and
op'nions.
Wnte a short artide about
the identity cards, explomlng
your opinion on such mattel s
as whether they should be
compulsory and whether
should e'pect to pay for them
tAWt"",
Healthy or unhealthy?
In pairS, ;'ead ab<lut the Connectmg for l'Sing the website
Draw u.p a table that lists benefits 0' the scheme alongside possible
drawbacks Clr concerns
The surveillance society
CClY (closed-circuit television) is increasingly being installed as a
crime prevention measure. Modern cameras can be operated remotely
and produce high-resolution colour pictures. CClY has been developed
that is capable of recognising individual car number plates and
recording them on central databases. The congestion-charging scheme
introduced in London in 2003 uses this system. Facial recognition
can also be used with CC1V footage and it has been used to identify
criminals and football hooligans.
Many people worry that constant recording takes away their privacy.
Others feel that if CC1V stops criminals, the loss of privacy is a price
worth paying. It is unclear to what extent CC1V actually reduces crime.
One report showed that CC1V reduced crime by S per cent, whereas over
the same period, improving street lighting reduced crime by 20 per cent.
CCIV is not the only way that people can be 'spied on'. At the moment,
MIS can apply for a warrant that allows them to monitor phone calls,
e-mail and web browsing. Government ministers are considering spending
up to 12 billion on a database to monitor and store the Internet browsing
habits, e-mall and telephone records of every person in Britain.
The government believe this is necessary in order to fight crime and
terrorism. There are huge concerns about this idea on the grounds
of privacy and security. Many government ministers are also very
concerned about the cost and whether it is ethical to intercept pri\'ate
communications.
Uberty
liberty is an 01 gamsation campaigns tCl CIvil liberties and
rights Their "ebslte contams or, ma,lY of the Issues
discussed In this section Look at their webSite www.lib.!rty-human-
nghts.org.uk/lndex shtml and follow the l.lnk tv Iss'Jes
Write a short ar1:lcle that would be SUitable for other people of your "ge,
glVlngy,'ur opmion Cln whether too much use of ICT Invades personal privacy .
Using leT to monitor the environment
ref has the ability to store and process huge amounts of data very
quickly. This makes it ideal for collecting data about weather and
climate. Monitoring the environment can help to explain what is
happening to the world's climate. It can also help to predict events
such as floods, earthquakes, hurricanes and tornadoes. This makes it
easier to prepare for natural disasters.
Old you know
In 2007 a record 37 million Items
of personal data went rnlsSlng lrum
govp.rnment offiCial." c:ounclls,
NHS trlJsts. Insuranc,?
companies and cham stor es
Ksy ferma
CCTV' dosed-ell CUlt An I
unmanned. remotely moullted
vrdeo camero system is used i
to transmit !rve pictures back jl
to a screen
developments can be monitored
and record .. J
_ .. -
Tn.. "the wOlld leader III Video
and d,g,talsur'/elllance SlIt"rn
is monltl')red by "vel' 4 5 million
CCTV one c,f
the most watched nations In the
world There IS one eCTY
for "Vi>IY 14 people In t he UK.
KP.eprng t.rack 01 ccmmunrcatJolls
",auld be a huge job I". ZOO? a total
0157 billron text messages
sent In the UK - thiit IS 1,800 pvery
second Ear.h day 3 b,Urt", .. mails
are sent - 35,000 every sl!COf'ld
Chapter 7 Implications of ICT for society 107
Oceans
NASA has sponsored a project called Estimating the Circulation and Climate
of the Ocean. Phase II (ECC02) is modelling global ocean currents, changes in
temperature and salt levels in sea water, and the growth and melting of sea-ice
in the polar regions.
It collects data from all available NASA satellites and from on-site instruments.
It uses this data to produce images and models of ocean depth and sea ice. The
changes in these images are then compared over a period of time. The images
will help scientists to analyse the role of oceans in the climate, and the changes
in the oceans in polar regions .
Sustainability and recycling
In recent years it has become clear that it is very important to manage
resources such as energy and raw materials. Computers are used to design
energy-efficient buildings and also to monitor and control their energy
use. Monitoring systems can observe and control the consumption of gas,
electricity and water. They can show organisations where they are wasting
resources. They can also control the systems, for example by automatically
nuning off heating systems when offices are closed.
Impact of leT on different populations
leT has had a huge impact on many different communities and cultures.
It has made it easier for people all over the world to communicate and
trade with each other. The Internet has also made it much easier for
people to find out what is happening in other parts of the world.
Until quite recently it was reasonably easy for governments to have
some control over what people in their country knew. In wartime,
they issued propaganda - carefully selected communications that told
people about the war. The information was not always accurate, and
could be biased to give people an impression, for example, that the war
was going better than it actually was. This would be much harder now,
as information and videos are sent back from war zones very quickly.
Some governments still try to control the access to information in their
country.
In this chapter you will have leamt:
r,I how the Data Protection Act 1998 affect.s individuals and
companies
to! the importance of the Computer Misuse Act 1990
r,I about copyright law and how it protects against plagiarism
r,I the effect that ICT use has on employment
r,I the social impact of ICT
t/ how ICT has affected surveillance and security
r,I how ICT is used to monitor the environment, our natural
resources and recycling.
Smart bins
Several councils are currently
trialling the use of smart bins that
monitor the amount of rubbish
people throwaway. They have a
microchip embedded in them that
weighs the amount of rubbish and
charges the household accordingly.
CX)links
Optimal Monitoring (www.
optimalcomms.net) is a company
offering energy monitoring. Its
website includes many case studies.
Da
Whdt does the term
'surveillance sClciety'
mean?
b DISCUSS the use of CCTV
on Britain, explalno"g Its
benefits and drawbacks
II 'The Intemet must allow
free speech for
Do you agree ""th thiS
statement or do YOIJ
that the Internet
should have some form of
Explain your
views In a short essdY
f\C}fj,/ Examination-style questions
1
2
Quickcallz is a high street company that sells a range of mobile phones. They are going
to produce a leaflet that will contain text and clip art, to ad"ertise their 'Summer Sale'.
The owners of the shop are worried about the copyright on the clip art they are planning
to use.
(a) What is meant by the term copyright?
(b) Which one of the following applied to the copyright clip art?
A Clip art is always free of copyright
B aip art is never free of copyright
c Clip art is sometimes free of copyright
(e) Give one penalty the owners could face if they broke the copyright law.
(1 mark)
(1 mark)
(1 mark)
AQA,June 2008
Give four responsibilities placed on data users by the 1998 Data Protection Act. (4 marks)
AQA, June 2008
3 (a) National identity cards are considered to be a way in which the government
could 'spy' on tlie general public. List two other ways in which this could happen. (2 marks)
(b) Many people are concerned about the security of public data held by the government
on laptop computers. Which two of the following would be the most suitable security
measures to prevent their concerns?
A Ensure that government laptops have a lock.
B Ensure that all data on go,'ernment laptops is encrypted.
c Ensure that government employees don' t use laptops.
o Ensure tbat personal data is not stored on government laptops.
E Ensure that gO\'ernment laptops have a strong password with a combination
of letters, numbers and symbols, (2 marks)
4 Which of the following ICT methods will help to monitor the environment?
A A computerised model of the UK
B A series of sensors placed throughout tbe UK
c An ICT -controlled recycling plant
D The use of low-energy wind turbines. (1 mark)
5 An increasing number of companies store vast amounts of information on their computer
systems. Information is stored on a wide range of items such as details of their employees,
customers and suppliers. It is vital that the information stored is accurate.
(a) Describe the possible consequences to a company if some of tills information is
inaccurate. (3 rrul1ks)
(b) Describe the ways in which the information stored by the company on the computer
system may become inaccurate. (3 marks)
(e) Describe the ways in which a company could reduce the risks of inaccurate data
being stored on their computer system. (4 marks)
AQA, June 2008
Health issues for computer users
Everybody has the right to work in safe conditions. Also, everyone is
responsible for looking after their own health and safety. It is possible
to achieve this by behaving responsibly and following rules and
procedures put in place to protect us and other people.
Working with a computer all day can damage your health permanently
if you do not follow procedures. People who use computers a lot often
sit in the same position repeating the same physical actions over and
over again. This can cause problems with their health. It is important
to recognise those risks and try to reduce them as much as possible.
Some health risks may be short term, such as a headache at the end of
a busy day. Other risks, such as spinal damage, may be permanent .
Eye problems
Focusing on the screen for long periods of time can cause eye strain
and headaches. This can be made worse if the screen is not clean or
suffers from glare from reflected light. It is important to make sure
that the lighting in the room is suitable and that you can adjust the
5=en brighmess to a level that suits you. Computer users should have
regular eye tests to make sure their eyes are healthy.
Wrist problems (RSI)
Using a mouse and keyboard over and over again can cause a condition
called upper limb d.isorder. This is sometimes called RSI (repetitive
strain injury). Symptoms include pain in the fingers and wrists and
even in the shoulders. It is imponant that users make sure their wrists
are in the correct position when using a keyboard. Some people find a
wrist-rest helpful in redUCing the symptoms of RSI.
Stress
All of us experience stress sometimes. Many jobs that people do can be
stressful, and this is particularly true of some ICT jobs. In recent years,
more and more people have been employed in call centres and data
entry centres. In these jobs, the work that people do is monitored in
great detail. Operators are expected to answer calls very quickly, and
the calls are usually recorded in case of a complaint. if target call rates
are set too high, operators may also be tempted to work through their
breaks rather than fall behind. Some levels of stress are acceptable and
necessary with important projects or exams. However, people must
manage stress levels so that they do not put their health at risk.
Objectives
Understand the health issues
that can affect people who use
computers lor most of their
workmg dall.
,

Understand some of the safety
issues that can affect
working in office
Old you know
Some peopl.e flom a
COndItiO" (ailed pnotosen;,tl'le
?pilep".'1 rh,s mC!arlS that flashmg
,'gllt 5 C dn br:ng DOl an epllephc
sei7.ure You m-l)' n:lve
warnIngs pnof to SOfTie TV
Imclges
on a OJMputer .!-tueen can cause
epllepS"j to" Mdny (.()mput;;1
g.mes the<F. (If
I
and It IS Import not t.) play
them for too Lcmg Without a bruak
I _______ , __ _
Key terms
RSI . "'pC'tJtrve 'iValn Injury, G
Condl thi.t cau,"", painful
JOInts ,n the wnst or flngE!l.' It
is SOlTh!times Cdlled upper "rna
Gisorder. USIng a ccmpu1.ef for
long penods of time coln calISE' f\SI
Did you know
that I
ItS I " morE' to be cali;ed by I
over: ISing a mouse! ?other than J
a

Back and neck problems
Sitting in the same position for long periods of time can cause and
aggravate back and neck problems. For that reason, it is very impottant
to sit correctly when using a computer. You should take the following
points into consideration:
A well-designed adjustable chair will help to make sure your back is
properly supported.
Yours eyes should be level with the top of the monitor.
Your feet should be resting comfortably on the floor or on a footrest.
A monitor that tilts and swivels will also help you to find a
comfortable working position.
A well-designed workstation should have enough work surfaces for
papers and other equipment to be arranged appropriately.
If your posture is not correct when you are sitting at a computer, you
are in danger of developing back and neck problems and can even
damage your spine permanently.
All of the above problems will also be helped by taking
breaks or changing activity. Regular short breaks work
better than one long break .
Health and safety at work
The risks discussed so far apply specifically to people
who use computers for most of their working day.
However, there are many more health and safety risks
that apply to offices and other workplaces where
computers are used.
Tripping
. j\ m;1ii,H1 !':O IV1t rh'=" .:Jiity y.;:;y
to ':'(i l.! CO',lVl
l,!S"C:.t ir-l::. ,BI h,:,li t('f
c,:,' t.ht:- lime (); (jl.:," t:) ...
ycr . .cr fTl t;.l\f(l(fH: ' l t; t. tl,+'
chi,;l{x' ::;f R:a.
C.1
A
Examiner s rip
When d,scu",ng workstatIon
deSIgn, It IS not. enough to say
t hat a chaIr must be
You must mentIon that tho chall
should be dnd pruvlce
good bad 'UppOlt
Many offices were designed for far fewer pieces of
electrical equipment than are used today. This means
that cables are sometimes run over long distances to
reach power sockets. Even if cables are secured to the
floor, it is still possible to trip over them. It is much
safer to think carefully about where equipment is
placed and have extra power sockets installed if they
are needed.
.... --- .. ,,'
D Good posture is extremely important when using a
computer tor long periods of time
Heat
Computers give off a lot of heat, and this can mean that rooms quickly
become uncomfortably hot. Sometimes simple methods such as opening
windows and using fans to circulate air may be enough to keep the room
cool. The best way to maintain a comfortable temperature is to install
air comlitioning, although this is expensive and not particularly good for
the environment. Switching computers off rather than leaving them on
standby saves money and reduces the amount of heat given off. Server
rooms need to be air conditioned as the equipment does not perform
well if it gets too hot and may malfunction.
Working safely on computers
DesIgn d poster to rP.I11lnd users
about on.. a'pe<.-t of health and
safety th.t they need to ;;,membor
when workmg on computer It
must be printable (S0 that It can be
on the wall or noticebodrd In
an office) and It must b .. rosslbie
"La e-i11C1I! it to workers
Chapter 8 Using ICT responsibly 111
Electrical safety
All electrical equipment can become dangerous if it is not checked
regularly for electrical safety, and computers are no exception. Users
should get into the habit of looking at their computer equipment
carefully and if cables or plugs become damaged they should report
this. If equipment cannot be repaired safely it may need to be replaced.
Electrical safety checks also reduce the risk of fire.
If the fire protection methods fail, suitable fire extinguishers need to
be available. Fire extinguishers for electrical equipment must be filled
with carbon dioxide. Carbon dioxide extinguishers have a black stripe
on the bottle.
Computers can be damaged if their power supply fails. TIlls can
also cause the data stored on them to be lost or damaged. A UPS
(uninterruptible power supply) contains a battety and can protect
the computer by maintaining its power until the computer can be
closed dowll safely. This is particularly important for servers. When
the voltage of the electricity supply suddenly increases, this is called
a surge. This can also damage equipment. A surge protector plug is a
simple way to protect the computer from voltage surges. A UPS will
usually have surge protection built in.
Hygiene
Like any piece of equipment, a computer should be kept clean. Food
and drink should not be placed near to a computer. Keyboards are
often used by many different people over the course of a day and all
users should follow basic hygiene precautions. This includes washing
their hands regularly, especially after coughing or sneezing. Specialist
keyboard wipes will also help to keep the surfaces clean.
Lighting
The position of computer equipment should be planned carefully when
the layout of an office is designed. Monitors should be positioned so
that they do not suffer from the glare and reflection that can cause eye
strain. Blinds can be fitted to windows to block out direct sunlight.
Diffused lighting is less likely to cause glare and reflection than normal
fluorescent tubes.

D caSSI. uses a computer for mllst of her workmg day
a Give health nsks that uSing a computer this much may expose
her to
b For each fisk, one thmg Cassie can d" to reduce the likelihood
:t he! health
D Give two re;,sons why electncal equipment ,holJld have
safety checks
-A....
D Carbon dioxide fire extinguisher
Key terms
UPS uninterruptlblP. powe, supply
This p .. a computer If th"
power fails by proViding power
untIl compuler can bi! dosed
down sefely It Will al.o protect
___ .. J
CD links
www.hse.gov.uk/pubns/indg36.pdf
is a leaflet published by the Health
and Safety Executive that covers
the health and safety aspects of
working with computers.
AQf\ Examiner 's lip
lea'" fllUI health risks $tdrt at
the top of your body and work
down.
Head .- headaches - a
break
Eyes - eye Stl aln .. eye testsl
adjust mOnitor dlstan(pjrl'<iuce
screen glare/use
lighting
Neck/back - .,edJbark "che
- adjustable chair!
mOnitor height position/use a
footrest
Wrists/flngels - RSI- use a

Responsible behaviour online
St aying safe and behaving responsibly
Using computer technolOgy opens up exciting possibilities for
interesting and creative work. It can also be lots of fun and help friends
and family to keep in touch. As well as the right to use the technology,
everyone is personally responsible for the way they use it.
You need to think about your conduct online:
how you behave when you are online
the material you view online
the people you interact with online.
Keeping yourself safe
Social networking sites, instant messaging and chat rooms are all great
ways to communicate. Online game sites allow users to chat when they
play, which adds to the fun for a lot of people. Users create user names
and use avatar characters to represent themselves online. In one way, this
keeps people safe, because they are not giving out their real information.
However, other users have to remember that they have no idea who the
person behind the avatar really is. They can be of any age or gender and
bear no resemblance to their avatar. It is easy to feel as if the people you
chat with online are trustworthy friends, but the reality might be very
different. For that reason, it is very imponant not to give out personal
information such as an address or phone number or even your full name.
Page 125 in Chapter 9 explains how webcarns can be used for
videoconferencing. It is important to remember that webcams should
only be used when talking to friends and family members. Never use a
webcam to talk to someone you met online.
When you have been chatting to someone online, it is easy to feel that
you know them well enough to meet in real life, but you need to think
carefully about the possible consequences.
Arranging a real-life meeting with someone that you chat to online
can be very dangerous. If you really feel you want to meet them,
it is important to discuss the idea with your parents before making
arrangements. You should also arrange to meet in a public place and
take an adult with you. There are many documented cases of adults
using the Internet to build up a young person's confidence. The adult
gradually asks for photographs and contact details and finally asks
to meet in person. This process, known as grooming, is a criminal
offence, and has led to teenagers being assaulted and abused.
If you are a member of a group, you may receive e-mails that are sent
to lots of people at once. You may even be responsible for sending out
such e-mails to the group. These e-mails should be treated with care. If
someone who receives the message then forwards it to another person,
the e-mail addresses of everyone on the circulation list will also be
forwarded. If you use the Bec (blind carbon copy) feature on your
e-mail software, the people on your list will not see each other's e-mail
addresses. It is important to respect other people's privacy in this way.
Key terms
Avatar a pIcture that Yf.JU
to lep","sent. you".lf 'mime It IS
sal'er thlln l!>mg a pIcture ()f
yourself
GroomIng a Cfl lTllrldl whero
a person gradudUy bUIlds l ip a
young person'; confidence online
They may then ."k the young
person to n __ tthem In !""wn
.. A..
B AT' is a picture C'r figure thlt
you choo:;e to represent yourself online.
These are avatar; from the 3-D virtual
,varld Second Ufe
Chapter 8 Usi ng leT responsibly 113
Respecting others
It is easy to forget how many people can see a comment or photograph
posted online, and how hard it is to take it back. [n real life, at one
time or another most people will say something that they later wish
they had not. If they are brave enough, they will go to the person and
apologise, and with any luck the apology will be accepted. If they made
the original remark in front of other people, the situation becomes a
little more difficult. If an unpleasant comment has been posted on a
social networking site, then the situation is much worse.
Emma and Sophie have been out together to a theme park. One
of the rides made Emma feal unwall and Sophie took a video
of her oolng Sick In .. "hleh she looks awful Video has been
posted on Sophle's SOCial page ".11 of Sophie s friends
can see It. and so can all of Emmi.fS friends That means about
500 pt30ple ha/E; s.;.en It 30 far Emma IS 'eall',' upset and Sophie.
V;110 IS n,)t really Immedlacely takes the 'Jldeo down The
probleom IS that ona oi SOphiE; s frlands who does not even know
Emma. saved a copy of the vld80 and passed It Con tc hel friends.
One ot thoseo ,,'lought It vJas leally funny and postE:(! it on YouTube.
Suddenly It has an audlenct? of many tr,ousands of people and it is
tetail:, out of SCophIE'S control
Cyber bullying
Using text messages, e-mail and social networking to say things that
are hurtful and upsetting is known as cybcr bullying. In previous
generations, once students went home from school they were in contact
with only a few friends until the next day. With the availability of text
messages, e-mail, mobile-phone calIs, instant me=ging and social
networking sites, students can contact friends at any time of the day or
night. If these methods are used for bullying, the person being bullied
can feel that it is impossible to escape. Often this kind of bullying starts
as a bit of a joke, but then lots of other people join in, and suddenly it
is not funny any more. The other people may not do very much, but the
person being bullied can feel isolated and insecure. There have even
been cases where this kind of bullying has led to suicide attempts.
Things to remember
If you are being bullied, tell someone. It could be an adult such as
a parent or a teacher, or perhaps a peer mentor if your school has
such a scheme.
Cyber bullying leaves a ttail of proof. Save text messages or instant
messenger conversations. Take screenshots of websites. This proof
makes it much easier to tackle the bullies.
Remember that the bully is trying to look clever, funny or 'hard' to their
friends. That means they are looking for a reaction. They want their
victim to look foolish, unhappy or scared. If you do not react, they are
not getting what they want, and so they will get bored and move on.
Bullying is made possible because of people who join in. You may
not have bullied that person, but you might have made it possible
for someone else to do so because bullies need an audience.
Do not just take the bullying - tell someone who can help/
Keyt.rms
Cyber bullying u"ng c""'puters
and mobile phones In WdYS that
per:ion unhdpPY
Of u'lcomi"rtaLle
ClDlinks
The follOWing links will give you
more information about on tine
safety.
Childnet International, a non-profit
organisation working with others
to 'help make the Internet a great
and safe place for children', WWW.
childnet-int.org. This Links page
shows you lots of ot her websites
where you can find out more.
Thinkuknow is a scheme run by
the Child Exploitation and On tine
Protection (CEOP) Centre, www.
thin"uknow.co.uk.
p
:
E-mails
I
J
Chain e-mails are often sent to lots of people. They sometimes contain
jokes or even threats that something bad will bappen if you do not
forward the e-mail to lots of people. This passes all of the e-mail
addresses already on the message to everyone it is sent to, and the
number of e-mail addresses can become huge. If you do receil'e a
chain letter, it is best to simply delete it. If the e-mail is in any way
frightening, you should show it to an adult.
Flaming e-mails contain angry or abusive messages. They can
sometimes happen, for example, if one user on a forum disagrees
with another user. It is very easy to write something when you are
angry and just press Send. An e-mail is sent immediately, and it is not
possible to take it back. It is always best to give yourself time to calm
down and think before reacting to anything that makes you angry.
Keep safe online!
Parents d,' not alw.ys understand \he Inteme\ particularly Pr"duce
a leaflet that gIves the parent of a teeroager informa\lon dbout why young
enJoy cornmur"cat,ng onlrne It <hould also explain some of the
hazards dnd how the pare,1t help keep theIr child safe
Filtering content
Most schools and some home computers are set up with content-filtering
software that restricts the matetial displayed. The rules will vary; but
they will usually restrict access to 'hate' sites (websites that promote
hatred, typically against people of a specific race, religion, or sexual
orientation) and sites containing pornography, plus other sites that the
school or parent feels are inappropriate. As sites get closed down, others
open, and so even on filtered systems these sites may still be accessible
from time to time. If you open an inappropriate site accidentally, you
should immediately close it and tell a teacher or parent.
Some systems also filter e-mails, usually based on a list of forbidden
words. The e-mails are sent to the system manager who then decides
whether they should be passed on to the person they were addressed to.
til
II 'Socldl networkrng srees are dangerous and not be used oy people
under 16 ' Dc, you WIth thIS statemen't' Explain the bE:f1I!tres of
SOCIal nelworklng for people and also some of the halards
D Most organisatIons reserve lIght to read any e-malls sent using
therr syste.n
Explarr, why they .nIght chrJOse to do thIS
b Discuss whether you believe thIS IS an mvaslon of personal prrvacy
Chain e-mails e-malis that
encourage you to make l"ts
ot copies and send them t"
everyone in your address
book. making the chaIn longer
Sometimes they threaten that
bad things ",ill happen if you
D;eak the charr. n,ey should ile
or shown to an adult
Flaming e-mails e-mails
containing angry or abusIVe

..:.:ond srte; ....
:--in;.: gr''!''i. d::;. l. vi"
!l .. y"":' !C"
f411 ..
. ,)th, ar
.!":;} \ : thl ,';k y.:.u F: 1':'
d Oli 't! ! toy 5 .... : ;'1
ra i i,. "'il'
:f t ht;: y ,TITr.::-,.,::'
T': -. ;: _i IT \,'.)11
O' it i nu ' :
dbuse
!-!'.,,!! uni:nJf.
;) .t ... a ' ;i
'.,;;",<1(',(, If ,,,'.i:
I' ir;h: ..... bC.a.li" I,
..
J ."!" It J!. tl(JI;:,' ,t
,. _ ___ _ _ ....., .... 01
Chapter 8 Using ICT responsibly 115
Preventing unauthorised access
Software methods
FirewalLs
Anyone using a computer connected to the Internet should make sure
they ha,-e a firewall in place as a defence against hacking. A firewall
is a piece of hardware or software that prevents unauthorised access
to a network or a specific computer. It limits the data that can be sent
to and from the system, for example by blocking websites considered
to be unsafe. Firewall software may also have intrusion detection built
in. This will alert the user if anyone who is not using an authorised
address attempts to access the computer.
User accounts and passwords
Most online systems are secured by way of user names and
passwords, but some sites are much more secure than others. An
online game site or bulletin board will not have high security levels.
You should always assume that passwords on these sites may become
visible to someone else. For that reason you should always use a
different password on these sites to the password you might use for
secure transactions. Sites such as Internet banking and reputable online
shopping sites use encryption to protect their data. The uniform
resource locator (url) of secure sites begin with https rather than the
usual http, and they have a padlock symbol to show they are safe.
Networked computer systems allocate a user name and password to each
user. You need that information to log on and it controls the rights that you
have on the network. This may include the software you can use, the files
you can see, and what access you have to files and directories. Levels of
access are used to control what you are allowed to do to files, for example:
No access: you cannot open the file and may not be able to see it
at all.
Read only: you can open the file and perhaps save a copy, but you
cannot make any changes to the original file.
Read/write: you can read the file and make changes to it, but you
cannot delete it.
F\tll access: you can do anything to the file, including deleting it.
YJhen you log 0n to jour sch(>Oi netw0rk i0U may
be allc"Ned to use 3tandard scftware packages but not the
odv::mced Ool"!'>
ha'le full c.ontrol o\ler your own user dIrectory
have read-oroly nghtB to a common dlret:tory where you can
accass worksheets to use In
be oJnable to see the teacherB' dlrect0ry
br; IJnable t,j change the screen wallpa,'er or screensaver.
.AJ10f theBO nghts are by your UBel name and password,
Kfly terms
Firewall software or hardware
thdt limits the data that can
be sent to or from a computer.
preventing unauthollsed aess
User names umquE' names
that you must use to access
networks
Passwords combinations of letters
and numbers that control
to your us.r name. Passwords
should be kept 5eoet,
Encryption scrambling data
to make it secure Only users
With the key t o t he code can
unscramble and read the ,jato
Uniform resource locator
(uri) anot her name for a web
address
levels of access the nghts that
you have over network fries
PIN personalldent:flcatlon
number A numenc password
used to access ATMs dnd
bank accounts
ATM automated teller machme
Allows bank to check
thei r accounts and depOSit and
withdraw money They are
called cashpolnts or
hole-in-the .. wall machines
0' "
.A-
m Padlock symbol
n:.1" .k
'
(} loS p';" 't.: tp{/': r;T
.. :cl ..
... ... -)d f ; t, aiT,p;r,.> if
t"\ l' :;'( ATM. q,
Ii,. j, ... t. , ",,(wr k'" \.I tt,'
.. . "'..:;:'!; I-'!' .J, ,1 . _1;" . " , . \
f{: l ... on;:... l
! r! :""ll'it;: " }'i.!::! eJtt d li'.i N
UF:I \'. b!=" J
..;.:i ;
Most networks set rules that passwords have to follow. They may
set a minimum number of characters or force the user to choose a
password that has numbers as well as letters. The strongest passwords
are the ones that are hardest to guess - lots of random characters with
numbers, letters and other characters such as and $. They should
also be changed frequently. The problem with setting rules such as
these is that users then cannot remember their password and so they
write it down.
Because user names and passwords control security, it is important to
keep them secret and not share them with others. Your teacher cannot
stop another student logging in as you and deleting your work if other
people know your password. It may also mean that you get the blame for
something you did not do, for example accessing inappropriate websites.
Diometric identification
Biometric methods use the characteristics of a person's body as a way
of identifying them. Fingerprint recognition is available instead of a
password on many laptops. Retina scanning, where a camera scans the
back of a person's eye, is also used in some sophisticated systems. Voice
recognition is also a form of biometric identification .
Physical methods
It is possible to prevent unauthorised access to computer systems using
physical methods. The easiest way to do this is to lock and alarm the
doors of tbe room that the computer is in. CCIV cameras can also be
used to record images of people entering and leaving the room when it
is unlocked. Choosing a room above ground level is also a good idea.
The computers are less visible to potential thieves and it also makes it more
difficult to carry the equipment away. Some security systems use voice
recognition technology. The person wishing to enter the room speaks into a
microphone and the system matches their voice pattern against stored daLa.
In high-risk situations it is also possible to clamp the computers to desks
or install locks that prevent them being used. Workstations at which access
to removable media drives is blocked prevent the unauthorised copying of
data. This physically stops users copying data to USB sticks, CD-Rs, etc.
Keeping your money safe
Chip and PIN technology has made it harder for criminals to use
stolen credit cards in higb street sbops. So criminals are now using
the Internet to steal money. They use many different methods to trick
people into giving their banking details, and these methods are called
Internet fraud.
When you log in to a secure site such as those used for Internet banking,
you sometimes have to enter some of the c.haracters as well as your full
password. Sometimes these are selected from a drop-down menu to
avoid a criminal capturing the details through keystroke logging.
If you forget your login details, you can usually be reminded of them
or allowed to change them. You will often be set security questions that
you have to answer in order to identify yourself. These might include
your date of birth or the name of your first school. Some websites
use image code recognition to prevent people from creating lots of
Biometric u';ng human
tharactensti", such as fingerprints
as IdentifK"allDn methods
Internet fraud a general term
for uSing the Internet to steal
money by abUilDing banking or
credit .:ard details
r.:'3;;;:o.:"'o'orQ
2:1.\861" Ct ..
;:ecurli.y i' :lr5
p ::tf!d (II: :::):,.:r

.. . :r . ,.,_ .. it_' ___ --'
Many campar,;es now use RFID
tags to keep trac.k of whele
goods are RFID , t.anas 101 rijd,o"
frequency Identofu:atioe
tags broadcast Signals that are
picked up by sensors. A Simple
example IS the security tags
attached to goods In many shops
RFID tags can also be used to
track products along a prod., ctlon
line Rr- ID also has many
poSSibilities fOI trdeklng people
and th." property

Chapter 8 Using ICT responsibly 117
accounts automatically. The site displays a picture of some text and you
have to type in the characters.
Phishing involves sending e-mails pretending to be from a bank, eBay
or any other organisation that handles financial transactions. The
e-mail says that the user needs to log on to a website and update their
security details. This would give the crintinal access to that person's
account. The e-mails can sometimes look very convincing, but there are
usually ways of spotting the fraud:
Name. A genuine bank e-mail would always use a name, rather
than 'Dear Customer'. The criminals do not know your name, so
they cannot use it.
The uri (web address). The fraudsters will try to create a uri that
looks convincing, but they cannot use the bank's real urI. These
websites are sometimes called mirror-image websites, and they may
look very realistic.
The e-mail address that the e-mail came from. The criminal cannot
use the bank's real e-mail address.
Errors in spelling and grammar. Many of these e-mails come from
abroad, and the English may not be correct.
The contact websites or e-mail addresses for these frauds are changed
every few days, making the criminals more difficult to catch. A
phishing filter can be used to scan the websites that you visit and
alert you if they seem suspicious. The filter does this by comparing
the website address against an up-to-date list of those known to be
fraudulent phishing sites.
ATM fraud
ATM or hole-in-the-wall machines are the most popular way for most
people to withdraw cash from their bank account. Another common
fraud is to fix a device to the card slot that actually reads the details on
the carel. When the criminals collect the scanning device they have the
information they need to produce a fake duplicate card and use it to
withdraw money. You should look very carefully at any ATM you use.
Identity theft
Many people use the Internet for banking and shopping, and they set
up an electronic identity for security purposes. This is made up of their
name, address, user names, passwords and PINs. If a thief obtains this
information they can steal money from bank accounts or buy goods
online. This is called identify theft because the thief pretends to be the
person online. Phishing e-mails try to get hold of this information, but
they are not the only method used.
Some spyware looks for password flies saved on your computer. Anti-
spyware software can be set up to detect attempts to install spyware
on your computer. Some operating systems offer to store passwords
for sites that you use regularly. If this is a bulletin board or gaming
site, that is not too much of a problem. If it is your Internet banking
password, then it is a problem. For this reason, most Internet banking
sites ask you to enter a selection of characters from your password and
digits from your PIN rather than the whole thing.
"!ils
Key terms
Phishing. sending e-malls th'Jt
pretend to b. from a
or organiSGtlon that handles
transactlon.s, askmg
users to on d link
and E:ntei bankmg 111formatlon
such dS passwords
Identity theft gatheflng pel.,onal
information that can be used
to identify someone, then
obtaining money or good. by
pretending to be that
Spyware' software thdt IS
downloaded onto a computer
Without the owner's ,nowledge
or pem11s510n It dala back
from the oWl1er', comp:.rter
Did you know
,bay, PayP.1 and have
e-mail addresses where the,e
scam$ (an be rep<'lted If you arc
in ilny doubt L'S to \vhethp.r an
e-malllsgenUln.!.f It t<J
the genuine organisation and ask
them whet to do 00 not dICk
any webSite lmk., or enLer .ny
pers ...... llal information
Some th'eves gil through the
rubbish that peopl" t.'lrow out.
IMbng for ,ntorrn.t'on lhat
might be used for Identity theft
Remember to . 111 ed any paper
With persoroallnfmrnatlon on It
before throwmg It away
Phlshlng e-rnalls are not the only scalT,S 'Jthers In'lolve telling people
that they hav'l "on a prize In a lottel}' or draw tha'( they I,a\/e not
dctuall,' entered One famolls e-marl that appears regularly tells the
stOIY of money In an acc:0unt In a wal-tOlrllXluntr:, There IS a large
amJunt of money III a dead pelsoll 's bank account that tile writer
cannnt get Qui c,f til" Gountry It you send your t"mk account detaiis,
t.hey .... 111 give you of the money V>.'hen ycu read the story. it is
hard to Imagine ho",' anyol,E' would tJ'3lle'l It IS trlle that not many
people dJ, t,ut It only taheE. one or l\tJO to maKe It worth sending
thousan.Js of e-malls After all. a-malls cost 'ipry little to send.
Acceptable use policies
Schools, colleges, businesses and other organisations usually have
acceptable use policies in place that set out what users are permitted
to do when using the organisation's computer facilities. They will
include what websites may be accessed and often lay down rules for
the use of e-mail facilities. It is important to read the acceptable use
policy and make sure you folIow its rules.
fi
J
,,,i,,E"'iJ'i1
li
f,t'
D a Explain two ways that cllmrnals can use the Internet to
steal horn peopl.e who bank or shop online
b three methods people can use to
trom these criminal actIVities
D I:-mall is very useful. but ther:: Cdn be such as phishing
Explain the of thiS term and the ,t car, cause fCor
e-marl
II 'SOCial netwolk.lng sites can put you at of theft.' Explain
what thiS statement means and how you can prot.ct by
behavrng sens,bly
II Descrrbe three methods that a company ca" 'Jse to prevent
unauthorrsed access to Its data.
D 'A strong pass\Vord will help keep your data , DISCUSS thIS
5tatement, what a strong password IS why not
uSeS them.
7
Acceptable use when online
in schools
In small groups, look at the
dcceptable use potrcy that
applies In your school. or (ollege
Fo,. each of the ,ules It rndudes,
deCide whether the rule I<
deSigned to protect agarnst
inappropriate
co"tent
conduct

Do you th'nk all of the I "les are
fair and reasonable? If fofJr. which
ones do you think should be
changed?
Are there any rules you think
should be added"
Acceptable use policies' AUPs
are that set out.
what users are allowed to do
or, an organlsath.>n's computer
system
In this chapter .You will have
learnt:
tI' the health risks that computer users face and
what they can do to reduce them - these
include spinal damage, eye strain and RSI
tI' some of the Internet frauds that criminals use
to steal money
tI' the health and safety hazards that are present
in an office environment and what can be
done to prevent them
tI' how to behave safely and responsibly online
V methods of preventing unauthorised access to
computer data
tI' methods of preventing fraud and theft using
leT
tI' the importance of following an acceptable use
policy.
AQb/
l
' Examination-style questions
1 A small fast food 'drh'e thm' restaurant has bought two new computers. It needs to use them
to send and receive information from head office. The restaurant manager is concerned about
the safety of the computers, because it would be easy for customers arriYing by car to steal them.
Describe two methods of physically keeping the computers secure. (2 marks)
2 Which of one of the following would be suitable method of preventing employees from
accessing unsuitable websites?
A disable Internet access
8 install antivirus software
e switch the computer off when not being used
D use a content adviser program in the web browser.
3 A tra,'el agency uses networked computers that are connected to the Internet to book
holidays for its customers.
(a) Security is very important and each trayel agent has his or her own password.
(1 mark)
(i) What is meant hy a password? (1 mark)
(ii) The choice of password is very important. Give three pieces of advice that you
would give to the travel agents about choosing a suitable password. (J marks)
(b) One of the biggest security problems for the travel agency comes from hackers.
(i) Explain what is meant by a hacker. (1 mark)
(ii) Other than the use of passwords, explain one other software method of
pre"enting hackers. (1 mark)
AQA,June 2008
4 Daniel Chan has just started a new job as a reporter on a local newspaper. He has to
choose a password to use on the newspaper's WAN. He has come up with four possible
passwords, which are:
Daniel
ChanNews
DC007
Adfhi245361
(a) The least secure choice from these four passwords would be DanieL Give one reason
why this would be the least secure password. (1 mark)
(b) State which of these passwords would be the most secure and give a reason for your
choice. (2 marks)
AQA, June 2006
5 A company sells computer games on the Internet.
(a) Choose three of the following that are advantages to the company of seUing computer
games online rather than from a shop.
A Cheaper because they do not ha,e any staff to pay
8 Cheaper because they get the games free
e Cheaper because they do not have to rent and equip a high street shop
o Gives them access to a worldwide market rather than a local one
E Gives them access to people over the age of 18
.. Gives their customers 24-hour access. (3 marks)
(b) Give two disadvantages to the company of selling the games online rather than
from a shop. (2 marks)
(c) Give two disadvantages to the customer of buying games online rather than
from a shop. (2 marks)
AQA,June2006
6 Online shopping for items such as food, books and CDs is increasingly becoming an
everyday part of life in the 21st century.
(a) Describe possible advantages of online shopping to both the companies who
operate it and to their customers. (6 marks)
(b) Describe the possible disad,-antages of online shopping to both the companies who
operate it and to their customers. (4 marks)
7 A new computer system has recently been installed into an office. Each member of staff
now has a PC on their desk.
(e) Discuss possible health and safety imp.iications of the use of computers in an office.
(b) Describe what steps can be taken to alleviate some of these problems.
(5 marks)
(4 marks)
AQA, June 2007
Principles and processes of collaborative
working
Collaboration is wben people work together to achieve a common
target. There are many situations in which people need to work
together to produce an end product such as an agreement, a document
or a computer system. Collaborative working methods help people with
a common target to produce the end product they need.
An example of working collaboratively would be the production of
a school yearbook. A group of five year 11 students have decided to
produce a yearbook with quotes and photographs of all the students
in Ille year. They intend to get the yearbooks printed by a professional
printing company.
All members of the team work together to plan what needs to be
included and what jobs need to be done:
All of the students in the year are to write about themselves, their
hopes and ambitions.
Jas and Amber are to take the photographs.
Ben and Ali are to layout the photographs and text to make the
artwork to send to the ptinters.
Isabel is in charge of getting quotes from printers and getting the
artwork to them on time. She will also take orders for the yearbook
and collect the money.
If several people are working on a document, it is important that their
work is consistent in writing style and in layout. Often, a house style is
agreed before work starts and a template is set up so that fonts, styles,
margins and other layout features are easier to control. The yearbook
is an informal student document, so it would probably not use the
school's house style in full, but a template would ensure that each
student page has the sa:rne basic layout.
Working in this way is sometimes called a reCUl'Sive process. In this
example, each person in the chain works on the document to improve
and refine it until everyone is happy with the finished product. Once a
draft version has been written, it will be:
revised: reviewed to see whether it needs to be altered or amended
for any reason and to check that it conforms to the agreed house style
edited: style, word choice and grammar are checked
proofread: to spot any last-minute errors.
The people invoh'ed will check the text, looking for slightly different
things. Someone needs to make sure all of the students have been
included and the text and photographs are applied to the correct
student. Editors will make sure the text is not too long to fit in the space
Objectives
collaborative
working groups of
people, companies or countries
wor king
the processes t hat
coll abc;>i'ative working may
involvd.
,
--, .
Knowa range of situations
where collaborative working
may be sUitabl"
IfyolJ have ever bE"eri
J n1dtu-IJSer ::mHne you h.)ve
I With
t(, actueYt" a CDr'!1m(tn r,:oal
Key terms
Hous: style tln agreed set of
layout and form.at: that
rPlght l11Votve logo
schemes, etc..
Recursive, ?- tha t ! ...
repetluve, fo! example C1
do.::: umel1t !s revlsI(j , edited and
proofread to Improve the flna!
product
allowed for each student. Proofreaders will make final checks for errors,
particularly in spelling and grammar. The head of year 11 will also
want to review the book to make sure that it does not contain anything
inappropriate. Each reader will suggest changes until a fmal version is
agreed and the artwork is sent to the printers. Spelling and grammar
checkers will be used as part of this process, but it is important to realise
that these will not find all of the mistakes that may be present.
Collaborative working processes
Planning
One of the first jobs to do on a collaborative project is to agree a plan.
The project plan shows which person is to cover each task and by
what date it must be fiItished if the overall deadline is to be met. The
project plan should also have milestones built into it. Milestones are
key points that must be reached by a certain date if the project is to be
completed on time. Everyone involved must keep checking to make
sure they are sticking to the plan, and if the plan needs to change for
any reason everyone needs to be informed.
Communication
All of the work that the year 11 students are doing needs to be
organised. Regular communication between the members of the
team is extremely important. lCT provides great opportunities for
collaborative working, because it allows people from allover the world
to communicate in many different ways. Now that it is possible to
tum voices and video into digital data that can be transmitted over a
communications network, many communication methods are available.
Large companies have their own international networks, but most of this
communication uses public communication systems and the Internet.
E-mail
E-mails are not as expensive to send as traditional posted letters, and
they arrive much more quickly than a letter would. They are a very
popular way of exchanging information and sending files to one or
more members of a team.
Instant messaging
Instant messaging allows two or more users to have a 'conversation'
in real time by typing messages to each other. They can also send files
across the connection, which is particularly useful for collaborative
working. Most instant messaging software now has the facility to use a
microphone to add voice and a web cam to add video if the users want
to. It is possible to save the conversation for future reference. Many
instant messenger users like to add emoticons, tiny pictures that show
smiley faces, hearts, flowers or just about anything else that would
make the message more interesting.
Chat room
Internet chat also has many uses. People can log into a chat room
and type messages that other people who are logged in can read and
respond to. Sometimes this chat is simply social, but an increasing
number of companies use chat to supply customer suppon. A private
Key terms
Artwork the version of a
document that IS sent to a
printer It includes the text of
tho. document, not Just the
plcturps and phot(,graphs
Deadline an established d.te
by which tasks have to be
completed
Milestones po,nls that must
be by a certain date If
a pTGJect IS to be r.ompleted 'In
time
Milestones
Wllte a lrst of tasks thet would
have to be done for the yearbook
project Hlghl,ght where you
thin. the Importar,t milestones
would be If the overall t.sk IS to
IIllIsh on time Bear In mmo that
two tasks can be earned out at
the time as k,ng as they are
done by different people
Examiner 's lip
D" "ot lise words suth as 'QulCker'
or 'cheapet ' without
them 'An qUicker' would
not marks. 'An e-mail amves
more qlllckly than a posted letter'
would ga", marks

'''""'
.- :"
y l

"'"-'
:::- (
Z
. ;;:\ ,
.......
II
, .
,--,""'I
-
-
-
. ' ..


'-"
--'
..A..
Il
A selection of emoticons
Chapter 9 Collaborative worlcing 123
chat room is a useful way for people who are working collaboratively
to discuss things without having to set up a yideoconference. The
students working on the yearbook proj ect could use the group facilities
of instant messaging software to discuss issues relating to the project.
Voice over Internet Protocol
VolP (Voice over Internet Protocol) is a way of using an Internet
connection to transmit the sound of voices. That means that it can be
used to make telephone calls without paying the telephone company
for each call that is made. For users with broadband connections, VolP
calls are essentially free. A microphone and speakers can be used, but it
is also possible to buy VolP phones and mobiles.
VolP technology can cut down on mobile-phone bills. Both people
involved in the call have to be using VolP for this to work. Skype is one
example of using VoIP technology, and it can be used for free Skype-to-
Skype calls on Internet-connected mobile phones.
Communication
DraV! up a table of all the methods 01 communicatIon that the yearbook
team could use for each method. YOl' m'Jst explain "'hy they mIght choc.se
to u'" It and what ,"fo.-matleon they mIght pass on us"'g that method
Project management
All projects need:
an agreed list of tasks shOwing who is responsible for each one
a clear schedule of when each task must be completed
a list of resources, such as hardware and software, that will be
needed for each task
an agreed budget that must be kept to
a method of managing it, such as project management software
a final deadline for the completion of the project.
The bigger the project is, the more important it becomes to plan and
manage it efficiently. Project management software can be used to
help project managers track the progress of the project. The information
about each stage can be viewed in different ways. Gantt charts are often
used to display the time smedule for each task and to show whether
the work is on time. If one task is falling behind, the mart will show the
effect that it might have on the finishing time of the whole project.
Workflow management software allows an organisation to set up
systems where data is passed on to the people who need it within the
project. Each team member can fill in forms giving the data that is
needed automatically to the people who need it. This helps managers
to track the progress of projects and to model the effect of any delays.
It might help them to make decisions. For example, they may decide
that they need to put mOre people on to one part of a project to avoid
it delaying progress further down the line.
VoIP' VOIce over P;"'tocol, I
t a method of uSlIlg IntelOet i
I technologIes to phone calls
Schedule. a tIme pldn listing dll
of the tasks ", the plOject and
when they mu,t be completed
Resources things that are
required for the project. for
example hardware.
or P.ven people WIth speCIalIst
,kIll,
Budget a finanCIal plan to show
how much money can be spent
on part ofthe project
Project managemen; software a
computer progrdln to hdp pldn
proJe(ts and resources
Gantt chart.o that show
a schedule of Individual tasks
d. ocellr (lver the pet/ad of
time dUllng whleh the project IS
developed
Workflow maoagement
sohware. a computer program
to help a busoness manage the
flow of a proJec:t
r. I I:.:t:c;;>r
'i! .:o>,r\I H if
-'!'JB ;'j'ed . .:nt
..:.;-.::t r "gf-:: rt-. ;)!.:'r
:,'ec !:\' oj
.. d
Project Development Schedule
Qtr 1 Qtr2
Project steps: Jan Feb Mar Apr May
__________
Develop concept for product _..--CI
Begin development eyriE>
Develop interface
User interface test evaluation
Alpha version release
Quality assurance testing phase 1
Fix outstanding problems from alpha
Beta version release
Quality phase 2
Fix outstanding problems from beta
Design box and CD labets
Begin advance advertising campaign
Product preparation
final quality assurance testing
Product release
Production and packaging
Jun
I, Development
Marketing
==n QA Testing ep====:'l9 Box art
B Gantt ch3rt
Working within a team
When people work as a team on a joint product they have to get
used to the fact that other people will review and criticise their work.
Members of a good team trust each other to criticise in a positive
way so that the end product gradually gets better as each person
contributes. Constructive criticism makes you look at your own work
more closely, it gives you ideas and helps you to make the next piece of
work better.
Members of the team need to communicate with each other on a
regular basis so that everyone is kept up to date with the progress
being made. Sometimes this will be by telephone, e-mail or instant
messaging, but at other times a more formal meeting will be needed.
Usually, meetings are planned in advance so that everyone can fit them
into their work schedule. There may also be times when emergency
meetings are needed because a problem has cropped up. The things
that are going to be discussed at the meeting are listed in the form of
an agenda. This is gh-en to people in advance so that they have time to
think about the points they might want to make. The discussions that
take place and the conclusions that are reached are written up as che
minutes of the meeting.
Jul
Qtr3 Qtr4
Aug s.p Oct Nov Dec
I
I
Milestone
Creating a Gantt chart
Assume the yearbc>ok team
has six weeks from starting
the proJe.:t to handing out the
finished books. The printers need
one to do the printing.
Draw a Ga"tt chart to plan the
schedulp. for the project
When do we meet?
At what stages of the yearbook
project do you there w("Jld
need to be fonnal meetings' Add
them to the Gantt chart that you
created In the activity
Chapter 9 Collaborative working 125
Videocon ferencing
Videoconferencing allows people to hold a meeting
without all having to travel to one place. Each
person needs a video camera and microphone to
input sound and video, plus speakers and a monitor
on which to see and hear the other people in the
meeting. The sound and pictures are transmitted
simultaneously across an Internet connection,
to give a feeling that is as close as possible to a
face-ta-face meeting. Businesses sometimes have
sophisticated videoconferencing suites, giving large,
good-quality pictures. It is also possible to hold a
simple videoconference using a webcam and instant
messaging software to give a two-way link. The
quality of sound and video will not be as good as
using specialist software, but it will be less costly.
Videoconferencing saves time and money because team members
are not required to travel to a meeting, which may also involve
booking expensive meeting rooms. Reducing the amount of miles
that people travel, whether by car, train or air, is also good for the
environment. The arrangements can be made quickly, which makes
videoconferencing particularly useful for emergency meetings. If
there are files that might be discussed at the meeting, people can send
these to each other electronically. It is possible to see the expressions
and body language of the other people in the meeting, which helps
evetyone to communicate. Videoconferencing still has a less personal
feeling than a face-to-face meeting and people cannot interact in quite
the same way. Videoconferencing needs high bandwidth if the images
and sound are ro be good quality, and there is always a short time
lag between one person speaking and the others hearing them. Users
should remember that this is not a face-to-face meeting, and they need
to ensure that they do not all talk at once.
Te\econferer.cing
It is also possible to hold a web-based conference using te1econfel''!ncing
software. All of the team involved in the meeting log on at the same time.
A presentation is given using a microphone and presentation software.
The other members of the meeting can communicate by typing, rather like
instant messaging. If they want to speak using their own microphone, they
press a button to 'put their hand up', and the person running the meeting
gives them permission to speak. Unlike some face-ta-face meetings, this
ensures that only one person can speak at a time!
Because it does not involve video, teleconferencing needs less
bandwidth than videoconferencing as less data needs to be transferred .
Collaborative situations and software
Schools and colleges are places where collaboration can lead to a good-
quality end product. Work can be submitted to teachers electronically
and comments can be added to help the students improve its
quality. VlrtUallearning environments (VLEs) encourage people
to collaborate using bulletin boards and forums to discuss issues
Vidp,xf)nferendng IJslng ICT
to hold d Virtual r'leetlllg wrth
v,deo audio
transmitted III rpal time
Teleconferencing uSing ICTto
hold a Vlrtuai meetlllg uSIOg text
and ,ol.IOd nof" Video
Virtual environments
(VLF. s) -systems available In
S<"hools and (o!leg .. s so th.t
can access school
matellal from
Bulletin boards online dISCUSSion
spioces post
mesSdges and get
from othel people
:.edll1 two ad"anta&,,< dnd
dlsadv-dntilge, or
and two advantage", oM
dl..rovantagto; of vlde<xonfel Eo<'lng.
Old you know
can be
that t:,C peopi" \.3P
If thf!y to
---------

.
II _.iii":. _ .. __ -- -
.; -- .
that they find mteresting or important. Srudents can work in groups,
perhaps on a project, a school issue or as part of a school council.
When people work for a company, the busmess WIll use various methods
to help them work together. Networks allow users to share files, and
network management software allows the file permissions to be
controlled. Some users will have full rights to a file, others may be allowed
to read but not change it, and others will be allowed to read the file and
change it but not to delete it. Network management software can track
which users have worked on a file. This is useful when tracking changes
to shared documents, especially if problems occur. Many companies have
an intranet, which looks like a website but is only available within the
company. It passes on information that employees need and may have a
bulletin board where employees can discuss company issues.
Blogs, bulletin boards and forums can also be used for people's leisure
time and hobbies so they can talk to other people with similar interests.
Social networking sites are also used to keep members of groups in touch
with each other, to post news of events and promote causes. Websites
such as www.justgiving.com make it easy for charity fundraisers to ask
their friends to help them to raise money for their favourite charities,
even if they live at opposite ends of the country. Wilds allow people to
edit and add contributions to web pages, and sites like Wikipedia are the
result of lots of people collaborating. Online games sites allow people
from allover the world to play games against each other or even inhabit
virtual worlds where they can playa character in a huge interactive
story. YouThbe allows actors and musicians to connect and share their
music and ideas and work together on new projects.
Collaborative documents
Most word processors have a feature on them that allows readers to add
comments on the work for other people to read. They can also set the
software to track changes. This means that when the work is edited,
the words that have been changed appear in a different colour, and
deleted words are shown with a line through them rather than vanishing
altogether. Then the next person can look at the suggestions side by side
with the old version and decide whether to accept the changes or not .
.. _---
- --
-
.
--
-.
..... :., .. ."""" ,.;
... :.,,Jot<} ,' '1 .... 4! .. ... .,II;1 .. ., ' , ", '
.'"- '"
' . : . _ . . . _ .. _ . . __ __ . ...- ___ . _ .. _ _ _ "'"'_ '""C> "'''' ... _ _ _ .....
D Comment balloons ;;nd changes make it easier to keep track a/changes when
a document is reyiewed
permissions the actIons that
uselS ale allowed to perform on
: a file. for example read only or
,
, read/wrote
. Intranet a system within an
o(ganlsatlon thdt Ie.oks like a
. web"te and people to
acct:ss information
Wikis web pagps that allow
p&iplp who read them to edIt
and add conterot to them.
CDlinks
www.justgiving.com makes it easy
for charity fundraisers to use the
Internet to raise money.
http://en.wikipedia.org is the
Wikipedia encyclopedia. the result
of lots of people collaborating.
www.youtube.com allows actors
and musicians to connect and shMe
their music and ideas.
Chapter 9 CoHatiorative working 127
Sharing files
When people work collaboratiyely, they will sometimes need access to
the same files in order to edit them or add their comments. This needs
to be controlled very carefully so that nobody works on out-of-date
versions of the file. Version control involves agreeing how new files
should be named, for example by adding a version number or date to
the file name.
Ber has aJde;d seceral entnts to; tile fror" tile people
who wrote them and laid them out In the house style He has
saved the file as yearbook201 (M
.Jas sends a baKh 01 edtt",.j photos bye-mall and All puts them
In tM correct places In th", booi' He then sa'les the file as
yee.rbo.J!r2010'.(2
limber pmofr<;>ad8 th" book and fln<:js some errors She corrects
!I1em and 53V0S the tile af. yearbO,)1201 Ov3
.. D
lje&! :" ..v
t hev.. _
t\ ;..
:,..\1. at

\t!

tleaP'" ...;:",
\ hl,ll. Our
r'i.a.l.1II.Gd
::c.I1 . .,( l
"
I I
'-/


tL .. e
l1eQY
", !U!\.'\.OIA.I '

:') I'.JL

Hte
d
./'--
I I
'-/
II V:d; lim I I'c,niment i$ If :, 5 saved wIth .! new ver5ion number
If you need to read the document, but you are not required to make
changes to it, the document can be protected by making it read only.
One way of enforcing version control is to use a shared storage area
from which the files must be accessed. The person working on the
file checks it out, works on it and makes changes, then checks it back
in with a new version name. A read-only version of the file remains
available to other people in case they need to refer to it, but they
cannot make changes to that version of the file. The storage area needs
to be secure, so all of the users will need a user name and password.
Security and online safety when working collaboratively
Online security is described in more detail in Chapter 8. Students working
collaboratively through a school's VLE do not have to worry much about
online safety. All users of the VLE will have to register through the school,
and all posts will usually be monitored so that inappropriate ones can be
removed. Users should always show respect towards others. For example,
forum discussions are designed to allow students to express their opinions
and disagree with each other, but there is never any excuse for making
rude or offensive posts. It is also important to respect the privacy of others
and comply with data protection legislation. These rules would also apply
to the yearbook project.
Key terms
Ver'sion control "system put In
place to make that people
w[)rkmg collabor2tlvely do mt
use old versrons of a dowment.
by mistake
Old you know
i Wlnduw, live prOVides lisers
With !.ump. free onllli('
that can b" p""w()rd protected
ThiS 1< a;. Skydnve
(see >vww.microsoft coml
uklwindows/windowslivel I
I
-- -
......:; - .. -- ..
, - ...... - - I
Backups
It is vital to make sure that important data is backed up so that a secure
copy exists if data is accidentally corrupted or deleted. Whilst it is true
that hackers and viruses can put data at risk, it is far more likely to be
damaged by a hard drive failing. In a collaborative working situation,
it is possible that someone will delete a file by mistake or save an old
version of the file over a new one. In these situations, a backup copy is
the only way to recover the data.
Backups can be made to removable media such as CDRs or DVD Rs
which should be labelled and stored securely, away from the main
computer. Memory sticks hold a lot of data and could be used to hold
a backup copy of the data. However, they are small and easy to lose
or damage. Removable USB bard drives can be used, or backups can
be stored online. Online backup services usually charge a fee if more
than a small amount of data is stored. They make sure a copy of the
data exists on their server so it is not physically close to the customer's
main computer.
It is important that everyone in a collaborative working situation
understands how data is to be backed up and who is responsible for
doing it. If team members have files on their own computers, they
must understand the need to ensure u1.ey are backed up or transferred
to the central storage area.
Advantages ilnd di.;advant ages or collaborative home
. '.
wQI'king .
Some computer networks allow remote ., ccess so that people can log
on to them from wherever they are working. This is obviously extremely
useful when people are working away from the office, but it does pose
security risks as it is more difficult to be sure wbo is logging on.
Many people who work collaboratively work from home, a process
sometimes called teleworking. This is covered in more detail in
Chapter 7, pages 102-103. The biggest benefit of teleworking is
not having to travel to work. TItis saves on time and travel costs.
Teleworking benefits parents, carers and workers with disabilities in
particular. It is also beneficial for someone who needs to be flexible with
their time because they are working on multiple projects. There will still
be some time restrictions, particularly when meetings are necessary.
Companies who employ home workers may save money as they need
less office space. However, they do have to make sure they have a
secure, reliable network, and arrangements must be made to ensure
that work done at home is uploaded to company servers and backed
up regularly.
Collaborath' e working from home
This book is an example 01 collaborative working Irom home. The authors
wrote their material at home, uploading it to a central storage space called an
e-room. The editors, reviewers and proofreaders checked the liles out 01 the
eroom, added their comments and then checked them back in again,
Internet, intranet and
extranet
You Will be used t o usong web
pages on the Internet. but
many orga,,,satlon,. als" have
an Intranet. The Illtranet
b,owser software to dlsp',ay
page. of InternallnlOi matlon
for company employees onlv
Some organisations extend
their Intranl2t to and
suppliers ollt"d" the organlsatlcn
This 15 called an extranet, and
external uSPrS Will usually have
limited ateess right' t i) I( A
school VI.E IS a tom1 of extranet,
bo!tausi! It allows parent, dS wnll
as student, to log In from home
and tlnd !nformatlon they
Keyflums
Remote access abll!ty for
Us.?f'S to log on tu a
from locations oLl1sIae the
blJltdmg wherE: the !1F!twork 15_J

II students making yearbook working as

G,ve two benefIts of uSIng a team of people rather
thar, Just one to work on a project such as the
yearbook
b G,ve one drawback e>f uSIng a team of people
rather than Just to work 0,', a project such a,
the yearbouk
II Lf)ok closely at tne pages of thIS book What
features <Jf it make up ItS house style>
II The text bel,)w IS part of Sean's yearbook entry
Tlle,'e are 10 spelling and grammar mIstakes
a Find the 10 mIstakes
(, Wnlch mIstake N mist.kes would be pICked up by
running a spell
c Which 'yards are spelled Incorrectly but would not
pICked up by spell check I Why ci<J.s the spell
check not find error. ?
d The remaining mistakes are grammat:lcCil
them and state whICh you think would be pICked
up by a grammar check
Pete and me had a grate tin,. last summer
when we went to Dublm I had nevel been
to Island betol': and I didn't no wha"t to
.'pect Peat has an ,,-unoe ,,ho ltves their
and she let us stay at her hel' wttige, We
was gomg agam thiS June, but now we are
not sure If 'we can afford It
Chapter 9 Collaborative working 129
U G,ve twl) reasons why it IS Important to have a
clear schedule and project pia" when working on a
collaboratIve proJ",,-r
o A team IS working from home at dIfferent
locations all overthe and the USA They
all have up-to-date computer eqUIpment wIth
mICrophones, web cams ano speakers
a G,ve two reasons why they mIght choose to use
videoconferenc"'g rather than hold a face-to-face
meeting
b Why WIll the team to think very calefulLy
about what tIme of day to hold the c<Jnference'
, G,ve or,e .jisadvantage of holding a teleconferenr.e
rather than. face-to-face meetIng.
o Many peuple use e-mail when workIng as part of
a group Describe three other ways In which the
Internet. can help people vvorklng tugethel on
collaboratIve projects
D It IS ext,emely Important that dat.a does
lost 01 damaged. three lish to
Ciata when working on ative projects and
explain what the group members can do to reduce
thensks.
In this chapter you will have learnt that:
tI' collaborative working involves people working together to reach
a common target
tI' naming files appropriately, version control and file security are
important in collaborative working
tI' project management sets milestones that can help to keep
collaborative projects on schedule
t/ ICT helps collaborative workers to communicate, for example
through e-mail, videoconferencing, teleconferencing, instant
messaging, Internet chat and VolP
tI' collaborative working from home can save time and money
because employees do not have to travel to work.
ACJ!:;/1 Examination-style questions
1 Which one of the following best describes collaborative working?
A Working by yourself to set and meet targets
8 Working all weekend to meet a deadline
C Working with others to meet common targets
D Working part-time in an office to meet your current requirements (1 mark)
2 Which of the following is a disadvantage of video conferencing as a means of collaboration?
A Need to spend money on office space
8 Need to spend money on broadband connection
c Need to spend money on new staff
D Need to spend money on travel
3 Which is the best method for an employee to keep in touch with the company's offices,
both in this country and around the world?
A Bulletin board
8 Chat room
c Sat-nav
D Smart phone
4 (a) What is meant by a software tool?
A A gadget that can be attached to a computer.
B A gadget for cleaning computer keyboards.
c A program used for development.
D A program used for car maintenance.
(b) A shared workspace is a software tool that can help collaboration. Explain how it can
be used by two authors who are working to produce a book for schools.
(c) Describe two other software tools that can be used to assist collaboration.
5 A rock musician in the USA and a classical pianist in the UK are collaborating on a score
for a new fUm. Both musicians ha\'e recently installed a computer system that has Internet
access. What are the possible ad,-antages and disadvantages of Internet access to the
musicians in collaborating on the fUm score? Explain your answer with reference to
collaborative working processes, sharing information and teleCOnferencing.
Note: You will be marked on your ability to use good English, to organise information
(1 mark)
(1 mark)
(1 mark)
(2 marks)
(4 marks)
clearly and to use specialist \'Ocabulary where appropriate. (8 marks)
Appendix
Generic features of GUI
reaturt! Description
- ---_ ... _----- _ .. _, ------ -----_ .. -_ ... -----_._--.- -_.- -._--- '.- - - _ ._ .---,-
Jeon A picture representing a program or an operation such a'- s_P'-ri'-n.ct. _ ______________ _
Icon size Icons can be made smaller (perhaps for a laptop) or larger to make them easier to see.

Menu A list of options for the user to choose from. These will be grouped together to make them easier to
find. For example, the Insert menu might let you insert a shape, a picture or a table.
_ ...... ___ ..... --"'.'-'--==-'-"'-"--'-'-"-"-'---"-"-'"""'-.:..:..:..:c'-'-'-..c:..::.c.-==.::.==-:..-"-"-'=='----___ _
Submenu Some menus will bring up other menus when items are clicked. These are called submenus. For
. ____ _ . ____ . . _ -.. __ __ . . . _ !xample, the menu might let you choose u picture fHe and a piece of clip art.
Pointer This can be an arrow shape or an 'I' shape when working with text. tt can be used to show where you
are in a document, or to select items from menus or elide: on menus .
.. __ .. . --_._-..... - .. _ .. _--- - .- -- - - ._---
Buttons Icons can be drawn to look like buttons that can be pressed by clicking the mouse. Buttons are often
used for navigation on websites,
Hyperlinks and These link to other pages in the document or website which load when clicked. They can be attached to
_ _ ts ________ tc:.:ec:.: x.'-ta.'-r-' pc.ic:.:t.cur_'ec:.: s. ____________________________ _
Window
Close
Minimise
A window will open for each software package or document that you have open,
Each window will have an icon that looks Like an 'X'. Clicking the icon doses the wIndow.
The minimise icon will hide the window without closing it completely.
_ .. .. ..... _._ .... _TI:e maximise icon wilt r.lake the as big as the screen that displays it.
Restore Clicking on a minimised window wilt restore it to its normal size.
----._.-- _ ._-'-'''-----'----------'---------
Re"slze
foolbar
Sero\! bat
Dialogue box
_ the corner window will make it larger or smaller. _ _ . _ _______ ___ _ _
A group of icons that are linked in some way. A graphics package might have a palette toolbar, a fill
for example.
This is used when the display is too big to fit on the screen all at once. Moving the scroll bar changes the
portion of the screen that is displayed, moving it up or down, left or right.
This allows you to enter information that the computer needs, for example the number of copies to
print.
---- -- ----_ ... --'..----- - -----------------
Drag and
Saeen resolutIOn
Desktop contrast
Using the pointer, objects and windows can be moved to new positions. Drag and drop can also be used
to move text in a document or sections of a sound wave in sound editing software.
The number of dots of colour (pixels) displayed on the screen, far example 1,280 x 800. High
resoluticns will give more detailed display, but icons will appear smaller.
High-contrast colours on the display can make it easier for people with visual impairment to see items
on the screen.
_ .. _---_._. __ .. _._---------------------------
Set date and time You can set the date and time depending on where in the world you are situated. Most systems update
the time autom.JticaUy when British Summer Time starts and ends,
132 Appendix
Input devices
Joy.tick
Tracker ball
Touch pad
This is mainly used by games players to control th.:! game's movement. The joystick has a button for
firing as well as a stick for moving around.
A tracker ball is a bit like an upside-down mechanical mouse. The ball is on the top surface and you roll
it v/ith your fingers. It needs less space than a mouse and can be for peopl!'! with disubilities to
use,
This is usuaUy found on a Laptop computer, where it takes the place of the mouse as it takes up Less
spiKe. You stroke the pad with your finger to control the cursor .
.. _________ _ _____ ___ _
ScJI1n@rs
- _._-- -----
Rp.:mote contlols
Int eractive white
board
MIDI !I'strumel'lts
Cr.!ph.u bbl.t
These are used to convert paper-based pictures documents into computer imag..!S. A beam of Ught
senses colour of each dot in the picture and buHds up the image. The resolution of the image is
measured in dots per inch (dp:i). High dpi 5ettings give a better image, but create larger file sizes. CoLour
scans create larger than black-and-white or . ___ _ _ _
Devices such as TVs and DVD players are often operuted by remote controls. These use infrared beams
to send signals to the device they are operating.
- -
This is a combination of a touch screen and a digital projector. The projector displJYs an image from the
computer on the sr:reen. You can ther touch the to move the cursor. Some whiteboards allow
you to use your finger to do -::his. Others use special devices that look like pens that can be used to write
or highlight text_
---- ---- ----
;-1101 stands for musical instruml!flt digital interface. This type of interface is used to link realistic
electronic instrum-:':1ts to the computer. This means thilt a composer can write by playing on a
midi keyboard. They can then use software to edit that music and print it out as a musical Tracks
for different instruments can be recorded individually and then added at a mixing desk. So one
person can play several inst;-uments ilnd sing as well jf they want to. The final product will play brick aU
of the track, together.
--- - - - - -------------
A graphics tablet works in a similar way to a touch screen. You use a stylus. which looks a bit like a
pcn, to dravi on a flat surfilce. The surface senses the position and pressure of the pl! n and produces a
matching shapt: on ti,e screen. Artists and designers find it a much more natural to draw .
Generic features of applicat ions sof tware
- ----_., ._ --
Of' s<riptkm
_ .. _--_. __ .. __ ... _- - --_.---- - ._--
Pnnt This copies what is on the screen to the clipboard.
Help T:lis provides assistrmce fln how to use the appL:cations software. The Help library can be installed on
...... _. __ . __ ...... _ .... _ ... _ .. be .. _. " .. _ .. _ _ . _ _ . _ _ , ... , ... _ _ .. .. __ . ___ . _. __ ... _ ..
te"!_ ..... __ ... __ . __ ______________ __
Toxt style

Highlight on area, word or imCige on a page In order to edit it.
Style retatt:s to whether the text is in bold, is rtalic or underlined. There are also many other styles such
as and superscript.
. rlin'r:g) _____________ _
---- --.---- -
TeKt size
Copy. cut and
pit,to
Undo and redo
.. Size is usually measured in points. Paragraph text is typir.a;Uy between 12 points,
C0py: copies t;,e current selection to the dipooa:-d.
Cut: copies the cummt s'!lection to the clipt>oard deletes the selection from the documeilt.
Paste: inserts the contents or the clipboard.
Undo: undoes th..! most recent action.
Redo: redoes has just lJeen 'Jndone.
Appendi x 133
._ ... _-----------------
Find and replacE' Find: finds a particular word within a document.
Replace: finds aU instances of a particular word and replaces them with a different word or words.
Zoom Changes the size of the document on your screen for easier vi.:!wing.

_ __ . Items that ar. selected can be dragged and dropped usiilg the mouse.
Print and prJnt Print: sends the document to Cl printer.
preview
______ .. ___ sho';'s you what,the like prior __ .. ______ ._._
_ __ ... ____ ._ -- -- -- ---- _ . .. _ - -_._ - .. _ ..... _ .. _-_ ... . ..... _ ... .
__ ..
Headl"rj illnd
footer!!:
Set the space between teX:: a,d the edge of the paper.
The contents of the headers and footers appear on every page within a document. Headers appear at
the top of th. page, footers at the bottom. Typical things to put in the headers or footers would be page
numbers, document title, date, etc .
. _ _ .. . _ . .. . __ .. _ .... -'----'----'-'---'--'-'---"-'--'---'-'--'--:..c=-'---______________ _
PaliE nLlml;er:ng
Alignment,

(left/nghilflitl
Ju'Stltu.;atlo,)n,

Orientation
(,_'ortrait ur.d
IandS';ope)
_ ... _. _- , .... _--_ .
Ii you add page numbers to the he .. der or footer, you just specify that you want;:j page number - you do
not manually type in the page numbers.
left that text is aligned on tnQ left of the page, t he margin on the right of the page
is ragged - this i!; normal for paragraph text.
FulL justification means that the text is aligned on both the right the Lf'ft.
Which way up the Is. iJortmit is taller than it is wide - this book is portrait format. landscape is
t han it is taLL
. ______ . _ _________ ... .. _ _ ._._ .. _____________ . __ ____ ... ____ __ __
Insert text A text box is used when you want text to stand out and be outside the perimeters of the rest of the
paragraph text, for example a box of texi in th>! margin.
A1lgllmp.nt You call change the direction in wh1ch text runs in a text bon.
and
v.rtlal text)
----- --- ---- .-----
Crop images Cropping is different to resizing b!cause: you actuaUy cut off portions of image.
(lndudlng dip
art, photo and
.. __
Inserting dip art Clip art is a library contdining simpL2 :mages that you can insert into document.:; .
... -.-- _.- -._- -----
W,,,dArt (or A feature that vory artistic text .
. _ _ .
Autoshapes A library contair.ing shapes such as stars, arrows, flowchart symhols, etc.
--- -- - _ .. _ .
.. _ ___ . __ ._ ._ You can use shading around Autoshapes, imi:lges and text boxes.
Place befllnd and
in front and wrap
text
.
Wizard
You can chOOSe! whether an image appears in front of or behind texl.
Text wrClpping refers to the way in which text flows ?round un object on the page (su.:h as::ln image).
are predesigned docume,"Its fer spedfictasks, kr example a template ft)f a fax or a letter .
A wizard is a guid2 for creating a document. A wizan.i guicies you a series of multiple-
choice steps to accomplish a specific task.
For example, there is a vli:;::ard that helps _____________ _
I
134 Appendix
Common features of word processors and desktop publishers
Edit text
--'---
Columns
In both word-processing and desktop publishing software you can enter text, change it or delete it.
When you open a new document, it will always appear with just one column. You can select a portion
of text and change the number of coLumns, and te.:.."1 wilt automatically flow down the first column and
into the next.
---_._-_._------------------------------
Spelling and These tools are important for checking accuracy. However, there are many mistakes that they will not
grammar ched.er recognise, so you should aLways read your work as weLL as using the spelling and grammar checker.
- -.----.--..
Au!owrap
Indentation, tabs,
paragraphs
Bullets,
numbering and
jng
Wrap refers to the way that text flows on a page. Auto wrap means that the VliII automatically flav.'
onto the next without you needing to press Enter.
------------------------------
Indentation allows you to select a paragraph of text and move the left edge of the text to the right. This
can be a useful presentation tool.
Tabs move the cursor a predetermined distance. Tabs are used where you want words on a line spaced
at regular intervals. Do not use the space bar to try anJ space out text on a line.
A paragraph is a continuous flow of text. A new paragraph begins when you press the Enter key.
- -
Bullets are u5ed for Lists and are a very useful layout tool. You can edit the shape and size of bullets.
Formatting a List as a numbered List means the software will automatically keep track and add the
correct number when you enter a new Line.
Sub-numbering allows you different levels of numbering - for exampLe 1 a, b, c, 23, b, c, etc. In a
___ ._._ .. _______ n_um_b_er __ e __ d_li.:..st , :-vhen you press tab a wiLL be sc.. t_art _ed_. ___ _
Borders These can be used to draw a box around parts of the text. You can change the border style (solid line,
_ . _. ___ . __ ... _ . __ dotted line, etc.), border thickness and coLour_. __________________ _
If you have a number of objects that you want to move around together you can group them. When you
___ ___ c_l_ic_k_o_n_o __ n __ e __ i __ te __ __ t __ h __ __ __ i __ s.:..se __ L __ ____ _____________ _
Layenng This is the order in which Objects are pLaced on a page. You can change the order of the layers by using
the arrange command, which lets you move objects to the front, back, etc .
... .. _ ..... _. This is a tooL shows you the total a seLection or in the whoLe document.
Page and line A page break is when you force text to start on a new page. A line break is inserted by pressing Enter
.. ____ ._. _. _ _ and forces text to start on a new Line (and begin a new-'-p_a_ra-'g:..ra..!p_h..:. ). ____________ _
tine spacing

rabLes. ",ergo and
spLit ceLls

Line spacing means the verticaL space between two Lines of text. SingLe line spacing is normally used,
but you can change this. For exampLe, changing the line spacing to doubLe (or 2) will insert more space
between the lines of text.
- - -- ------- --
If you want to format different parts of a document in different ways you may need to add a section
break. ExampLes of format changes that require section breaks are: margins, paper size and orientation,
headers and footers and text direction.
-----------------------
You can use tables to present both t.ext and numbers, and you can aLso insert Images into table ceLls.
You can also merge and split cells in a table to make the Layout more flexible.
----- -- - -
Appendix 135
Presentation software features
__ __ _ _ _ __ _ __ ___ _ __ __ _ ______ ._ ._. __ ._ .. ___ __ . _________ __ . __ _
Insert slide Add a new slide to a presentation.
Enter te)(:t Type in slide t itles and content, edit text fonts and sizes.
-------------------
pictures ____ In_s_e_rt-'-ph_o_t_o_s'- , d_i_ag"r_a_m_s-,-, _im_ag"e _s-,- , _e_tc_._o_n_to_a_s_lid_e_, _ _________ _
__ IIl_ser _ t _ ... Add buttons to slides that such as 'Go t o slide 3', or pLaya sound.
Cre.te byperlinks Make links on a slide that connect to other slides, to a document on your computer, or to a page on the
Intemet.
Edit layouts Move text and images on a slide .
. _------ - ---------------''---------------------------------
Change colour
schemes
There are many preset coLour schemes to choose from.
- -,- ----_._--_._----------------------
':;lide transitions
andt,ming
A transition is the way that one slide changes to another - for exampLe, does the next stide fade in or
dart in from the side? There are many different effects to choose from. Timing means how long each
slide is displayed and how long the t ransition from one slide to another takes.
----------
Ar4lmatlon Animation makes objects or text move around on a slide.
----------------- --- -----
Sound effects These can be used for slide transitions or interactive buttons.
Print Print out copies of a slideshow in the form of handouts. You can select which slides to include in the
handout and how many slides are printed on each.."p_a"'gc.e _________________ _
VIew sUde show Run the presentation as a full-screen stideshow.
-- ----_ .. - .. _-_.- ---------------------
Generic features You also need to be familiar with a range of generic features as previously discussed, such as dip art and
text styles,
Website design applications software features
__ .... __ ____ , _____ _______ ... _________ ._. ___ ____ .. _ .. ______ , ______ . __ , ___ ._
Template and A template or master page contains aU items that appear on every page in a website, such as the menu.
__ .. ______________________________________ _
Hotspot An area of a page that changes when the mouse hovers over it or clicks it. A hotspot can be invisible
until you hover the mouse over it.
-----------------------
Addine .. w P!_g,:s_ to add extra pages to the website yo_u_a_re_c_r_e_at_in-'g'- , ______________ _
_ Linki!'J ... _ _ . Using hyperlinks and hotspots to link aU of the pages in a website,
Converting to
HTML
Whichever web design software you use, you can convert each page into HTMl code.
---,----,--_ ... --------------------------------------------
PUblishing on the
Int"1rnet
DTl'styles
.. _--_ . . .. __ .
indud,ng n...h
animation
Uploading a website to the Internet.
These specify vari?u:o; detc::ils such as text font and size.
Using Flash to add animated elements to a web page, such as moving objects, flashing menu items,
photo rotation, animating objects when the mouse roUs over them, etc. v
------------
A website counter shows the number of visitors to that site.
----------_.------------------------------------------------------
Marquee
RSSfeed
A small area of a web page that contains scrotling text.

RSS stands for 'really simple syndication' or 'rich site summary'. RSS feed is often induded on websites
to display frequently updated content (such as news headlines, share prices and blog entries) In a set
This may include a brief summary with a link to more information.
136 Appendix
Graphics manipulation software features
_________ ________ _______ . _______ .. _ ______ . ________ . ___ _ _
Pick colour and Ml The Pkk CoLour tooL is used to select the current coLour. The current colour will be applied to whatever
with colour you draw next.
- _. ---._---_.--._--_.-
Pencil, brush arid
31rbrlish tools
Shading
.... _--_ .. _-- --_ ..
These tools each produce a different style of line. The pencil tool gives a simpLe Line, the brush tooL can
take on many different shapes a!,d sizes, and the tool produces a spray effect.
You can add shading to an object. This can be done manually or by using a built-in shading tool.
Entel text Graphics packages are nonnaUy used for drawings, but they also allow you to add text LabeLs or
paragraphs of text .
.. _- _. _-_. __ . - .. __ .... -.. _-_._- - ----
Straight lines and As well as simple straight lines, you can also draw complicated curves. You add points and the graphics
cUlves package wilt draw a [hie all ofth>! points. ____ _
Layermg You can add different layers to a drawing. This is useful if two objects overlap and you want to change
which app:ars on top .
Sensors
.. --- - -..
Thermllmeter
. __ ._._._ ---- _ .... _-_ .. _-- --_._ . -- -_. _-_ .... __ .. _._-'---- --
__ li_=g_ht ____ _ . _______ _
Tr'ansducer Pressure
_._ .. _. __ ... _._ ----_._- _. _ _ . __ ._ .. _--------------
PIR (piIS<ive ry,.".,I'!C1:nc ' ntrared Movement
-. - - -_.- _.,--_ ..... _ .. _----_ .... _ -_ ..
Radiation sensor Nuclear radiation
sensor Wind spe<!d
- -- - _ ..... --_._ .. _ ..... . _. __ ._ ..... _-_. _. __ ... -
.. .. _ _____ . __ ... _ .. __ ______ Humidity
Microphone Sound
- -_. _---_. __ . . _- -_. - _ .. _ ... _------ - -------
pH sel1sor pH (acid/alkali . .:.l)_________________ _
- - - -- --- - - - I
- - - - -
Glossary
Absolute cell reference: the actual
location of the cell is stored, and
is unaffected by the location of
the cell containing the formula.
Acceptable use policies: AUPs are
agreements that set out what
users are allowed to do on an
organisation's computer system.
Actuators: devices that perform
an action in response to a signal
from a computer.
Analog signals: electrical signals
that vary continuously.
Applications software: computer
programs that are designed to
carry out specific tasks.
Artwork: the version of a
document that is sent to a
printer. It includes the text of
the document, not just the
pictures and photographs.
ATM: automated teller machine.
Allows bank customers to check
their accounts and deposit and
withdraw money. They are
sometimes called cashpoints or
hole-in-the-wall machines.
Avatar: a picture that you choose
to represent yourself online. It is
safer than using a real picture of
yourself.
AVERAGE: a function that returns
the average of a set of values.
Backups: copies of data stored
in case the original is stolen or
becomes corrupt.
Biometric: using human
characteristics such as
fingerprints as identification
methods.
Boots up: when the computer is
switched on, it automatically
performs a set of processes to
allow the computer to be used.
Jludget: a financial plan to show
how much money can be spent
on each part of the project.
Buffers: temporary storage areas
in the printer that hold the dara
waiting to be printed.
Bulletin boards: online discussion
spaces where people can post
messages and get responses from
other people.
B
CAe: computer-aided design. Uses
a computer to produce drawings
of the design of a product. It
may also be used for automatic
calculation of weights, strengths,
etc.
CAM: computer-assisted
manufacture. Often uses outpul
from CAD packages. It uses
computers to control the tools
that manufacture or assemble
products.
CC1V: closed-circuit television. An
urunanned, remotely mounted
video camera system is used
to transmit live pictures hack
to a television screen where
developments can be monitored
and recorded.
Chain e-mails: e-mails that
encourage you to make lots
of copies and send them to
everyone in your address book,
making the chain longer.
Sometimes they threaten that
bad things will happen if you
break the chain. They should be
deleted or shown to an adult.
Client: the person who wants the
new system.
Closeel questions: questions
where the answers are limited
and the response has to be one
of the options given.
Control software: software used
to programme robots and
devices with instructions so
that they can act remotely or
automatically.
Copyright: a legal right given
to someone who creates
documents, pictures or music.
It means that other people
cannot use that work without
the permission of the copyright
o w n ~
Corrupt: the data in a file is
unreadable. This can happen if
the data is changed or damaged
in some way so that it cannot be
loaded by the original software.
CPU: central processing unit; the
part of the computer that does
most of the data processing.
Cyber bullying: using computers
and mobile phones in ways that
make another person unhappy
or uncomfortable.
m
Data: raw figures or words with no
context or meaning.
Databases: collections of data or
records stored in tables.
Data controller: the person in an
organisation who is responsible
for ensuring the Data Protection
Act 1998 rules are followed.
Data Protection Act 1998: a law
designed to protect the privacy
of personal information.
Data redundaney: when the same
data is st.ored more than once in
a table. This is sometimes called
data duplication.
Data subjects: people about whom
data is stored.
Data types: descriptions of the
types of data being stored in a
cell, for example text, numbers
or dates.
Data users: people or
organisations that store personal
data.
Deadline: an established date
by which tasks have to be
completed.
Desktop publishing: also known
as OTP. A type of applications
software used to create printed
materials containing text and
images.
138 Glossary
Devices: pieces of hardware. For
example, a monitor is an output
device.
Digital signals: signals that take
on only two nlues, off or on, in
binary code.
Dongle: a small piece of hardware
that connects to a COlnputer's
USB port. It allows a computer
user to use certain pieces
of software. Most wireless
broadband services use dongles
as part of their modem devices.
D
E-commerce: uses the Internet for
commercial tasks such as selling
goods or services.
Encoding: replacing data with
a code which shortens it {for
example, replacing male with M
or female veith Fl.
Encryption: scramhling data
to make it secure. Only users
"dth the key to the code can
unscramble and read the data.
Exemptions: situations where
the data protection rules do not
apply.
Export: preparing a 61e that is
currently open so that it can be
opened in different applications
software.
a
Feasibility study: an investigation
to decide whether it is worth
proceeding "' ith a project or not.
Feedback: the way the output
influences the input. For
example, a heater switching
on will affect the temperature
input.
Fields: column headings in
database tables. Fields are part
of a record.
File extension: a code that defines
the type of file. At the end of the
file name there is a dot plus the
extension, for example letter. doc
is a document 61e cilled letter:
File path: an address for the 61e
that specifies exactly ,,:hich
folder it is stored in.
File permissions: the actions that
users are allowed to perform on
a 61e, for example read only or
read/write.
Filter: in graphics software, a
61ter is a process that changes
the appearance of an image.
Filters are used to create specific
effects, for example blur, pixelate
and add brush strokes.
Firewall: software or hardware
that limits the data tl13t can
be sent to or from a computet;
preventing unauthorised access.
Flaming e-mails: e-mails
containing angry or abusive
messages.
Flash: applications software
used to add animation and
interactivit:y to web pages .
Flat me database: a database with
just one table of data.
Forum: sometimes called a
message board. An online
discussion website consisting of
user-generated content.
Functions: mathematical
operations performed on the
value i.u a cell, lor example SUM
and AVERAGE.
Gantt charts: diagrams that show
a schedule of individual tasks
as they occur over the period of
time during which the project is
de\e1oped.
Generic features: features that
appear in many different types
of applications software.
Grooming: a criminal offence where
a person gradually builds up a
young person's confidence online.
They may then ask the young
person to meet them in person.
GUI: graphical user interface with
windows, icons, menus and
pointers.
m
Hacking: accessing a computer
S}stem you are not authorised to
use. Hacking is an offence under
the Computer Misuse Act I 990.
Hardware: the physical objects
that make up a computer
system, such as computers,
monitors and printers.
Hotspots: areas of a page that
change when the mouse hovers
over or clicks on them. A
hotspot Cln be invisible, for
example an area of an image
that does not immediately look
as if it is chckable.
House style: an agreed set of
layout and format rules that
might invoh'e logo placement,
fonts/ colour schemes, etc.
Hyperlinks: links to other Vleb
pages or files, usually accessed
by clicking on a word or image.
D
Identity theft: gathering personal
information that can be used
to identify someone, then
obtaining money or goods by
pretending to be that person.
IF: an IF statement asks a
question/ then returns one value
if the answer is yes, and another
if the aUS\o\'er is no.
Import: transfer a 61e that was
created in one applications
software package into the
applications software that is
currently open.
Information: data with meaning.
Information Commissioner: the
government department that
enforces the Data Protection Act
1998.
Input: data entered into a system.
Examples of inputs are bar-codes
scanned in a supermarket/ or
key strokes entered by a typist .
Instant messaging: real-time text
conversation between two or
more people who are all online.
Integrated entertainment
systems: systems that combine
a range of devices offering
,isual, musical, video, audio and
gaming entertainment.
Intellectual property: ideas or
creations such as software or
music that can be protected by
copyright.
Interactive presentation: a
presentation that is affected
by user input, for example the
cliclting of a button.
Internet fraud: a general term
for using the Internet to steal
money by obtaining banking or
credit card details.
Internet service provider (ISP):
a compan)" that provides people
v:ith access to the Internet, for
example using dial-up, cable or a
broadband connection.
Intranet: a system within an
organisation that looks like a
website and allows people to
access information.
D
Junk mail: also koo"m as spam;
e-mails that are not welcome
or solicited and are often sent
in bulk. 1}>pically they are of a
commercial nature.
13
Key field: also called primary key.
A field in a table which uniquely
identifies each record in that table.
D
Laptops: also called notebooks. A
personal computer that is small
enough to use on your lap and to
carry around. They have a built-
in keyboard, mouse and screen.
Levels of access: the rights that
you have over network files.
Local Area Network (LAN): a
network connecting computers
in the same areairoom/building.
Logging interval: the length of
time between recording each
measurement.
Logging period: the total length
of time that data is being
recorded.
m
MAX: a fnnction that returns the
largest value in a set of values.
Menu user interface: an interface
where the user chooses from a
restricted list of options.
Microprocessor: a silicon
chip that contains a central
processing unit, which acts as
the 'brain' of a computer.
Milestones: key points that must
be reached by a certain date if
a project is to be completed on
time.
MIN: a fnnction that returns the
lowest value in a set of values.
Modem: electronic d",ice used
to connect computers via a
telephone line. It converts digital
data to analog and vice versa.
Multimedia: content that has
many different forms, such as a
combination of text, audio, still
images, animation and video.
m
Number formats : descriptions
of hove the data in a cell is
displayed, for example number
of decimal places.
OCR: optical character
recognition. This can im"olve
scanning a printed document
and converting each letter
shape to a text character. It can
also invoh-e a form where the
user '''Lites one letter in each
box, for example in a passport
application.
OMR: optical mark recognition.
The data is entered by the user
shading in boxes on a printed
sheet. An example would be
answer sheets for multiple-
choice exams.
Open questions: questions where
the person can give any answer
at all.
Operating systems software:
controls and manages the
computer. Examples are
Windows, Mac OS and Linux.
Output: the action that occurs
after an input has been
processed. For example, the
name and price uf an item is
displayed on a monitor following
a bar-code scan.
Glossary 139
Passwords: combinations of
letters and numbers that control
access to your user name.
Pass,vords should be kept secret.
Patch: a piece of code that updates
a software package. Patches
are often downloaded from the
software company's website.
Peer-to-peer site: also called a
P2P site; a website where people
upload music and \;deo so that
other people can download it,
usually illegally.
Performance criteria: statements
of what levels of performance
the finished product should
have. An example ntight be that
a web page must link to another
specified v;eb page.
Phishing: sending e-mails that
pretend to be from a bank
or organisation that handles
financial transactions, asking
users to click on a website link
and enter banking information
such as passwords.
PIN: personal identification
number. A numeric password
often used to access ATMs and
bank accounts.
Plagiarism: copying a piece
of writing, music or other
intellectual property from
someone else and presenting it
as your own v'lOrk.
Play list: a list of songs selected
from a library.
Plug-in: a small software
application that you download
using an Internet browset Each
plug-in enables a specific feature
or fnnction of the web browser.
An example would be a website
containing Flash. It would offer
an Adobe Flash plug-in on the
site to enable you to view the
Flash objects.
Podcast: audio and \ideo mes
downloaded from the Internet,
normally updated daily or weekly.
Presentation software: software
that is used to create slideshows.
Thxt, graphics, video and sound
can be used.
140 Glossary
Processing: turning the input
into a useful form. For example,
comparing bar-code data with a
database to analyse which item
it corresponds to.
Project management software: a
computer program to help plan
projects and resources.
RAM: random-access memory.
Records: these are also rows in
a database table, and they hold
all of the information about one
subject.
Recursive: a process that is
repetitive, for example where a
document is revised, edited and
proofread to improye the final
product.
Relational database: a database
containing two or more tables
that are linked to each other.
This overcomes problems of
data redundancy; resulting in
fewer entry errors and reduced
storage space.
Relative cell reference: where the
program does not actually store
the address of the cell. Instead
it stores the position of the cell
rela ti ve to the cell containing
the formula.
Remote access: the ability for
users to log on to a network
from locations outside the
building where the network is.
Resolution: measures how many
dots of colour an image is
made up of. This can apply to
a bitmap image, a display on a
monitor or a printed page. High
resolution (more dots per inch!
gives better quality.
Resources: things that are required
for the project, for example
hardware, software, or even
people with specialist skills.
ROM: read-only memory.
RSI: repetitive strain injury, a
condition that causes painful
joints in the wrist or fingers. It
is sometimes called upper limb
disorder. Using a computer for
long periods of time can cause
RSI.
D
Sample size: the number of
questionnaires that are given
out.
Schedule: a time plan listing all
of the tasks in the project and
when they must be completed.
SIM card: subscriber identity
module card; a small electronic
card inserted into a mobile
phone that provides a unique ID
for that phone.
Smart mobile phones: also
called smart phones, PDAs
or palmtops. These mobile
phones offer features found on
personal computers, such as
Internet access, e-mail and some
applications software.
SMS: short message service;
a system for sending text
messages on mobile phones.
Social networking: contacting
other people/friends to arrange
to meet or to find out about
their interests.
Software licence a legal agreement
stating how a piece of software
may be installed and used.
Spam filters: software that redirects
e-mails that appear to be junk
mail or spam into a designated
junk mail or spam folder.
Spreadsheets: documents that
store data in a grid of rows and
columns. They allow the data to
be analysed using fonnulae and
calculations.
Spyware: software that is
downloaded onto a computer
without the owner's knowledge
or permission. It sends
data back from the owner's
computer.
Stored: information is kept
for later use, for example
information on the stock levels
after the item ~ s been scanned.
Streaming: multimedia content
is played back to the end
user whilst it is still being
downloaded.
SUM: a function that adds
together all numbers specified in
a list or range.
II
Task specific: applications
soltv/are is task specific. It has
a number of features that are
designed to carry out particular
jobs.
Teleconferencing: using lCT to
hold a virtual meeting using text
and sound but not \ideo.
Teleworking: working from home
using a networked computer
ra ther than travelling to a place
of work each day.
'furtlt!: a small robot, either real or
on-screen. Simple instructions
are used to programme it to
move around.
I!I
Unifonn resource locator (uri):
another name for a web address.
UPS: uninterruptible power
supply. This protects a computer
if the power fails by providing
power until the computer can be
closed down safely. It will also
protect against voltage surges.
User: the person who will actually
use the system.
USC! interfae<o: the veay the user
interacts with the computer -
input and output devices as well
as the screen display.
Uscr names: unique names
that you must use to access
networks.
Validation: ensures that data is
sensible in the context in which
it is being used. For example,
a percentage mark for an
examination must not be less
than a or more than 100.
V;,rsion control: a system pu t in
place to make sure that people
working collaboratively do not
use old yersions of a document
by mistake.
Videoconferencing: using reT to
hold a virtual meeting with two-
way video and audio transmitted
in real time.
Your Writing Team
Teamwork This book has been planned and written a l c>n gsi de the
AQAGCSE Information and Communicati c>n TechnoLogy
specification by a team of senior examiners a n d teachers_
Confidence AQA examiners have checked the content t hi s book fo r ac:cu r acy an
provided quality control throughout deve Lc>prTlent, ensuri ri g an exact n
to the specification.
Peter Sykes led the specification developrTlent t eam for 201 0 GCS
ICTspecification. His considerable experien ce spans tha n 1 0 yea l
as both a senior examiner and moderator fc> r GCSE ICT. N e>vv P
was previously Deputy, then Acting Headteacher at FyndC>LJ n e Commu
College.
Diane Spencer is the ICT coordinator at T ettenhaLl '-"'<>l verhan
and has considerable exper ience as an exa m i n e r and mod{
andas aconsultanttoQCDAandOfquaL S h e i s aLso
electroni c resources author, and was the Lead a u thor for l son Th
AQA A Leve/lnformation and Communicatior7 Technology s t La d e ..... t book:
Flora Heathcote is an experienced author I C T text bool<.s - S h e has w
best-selling software guides on Dreamweave r , Access and E ::xce l . as we
a range of school textbooks. Her considerabl e computi ng krl c>vvledge a
expertise have been gained in educationa l, b u s iness and a
diverse as designing business stationery to t h r ee-d i mensi C> ..... a l rT"I
sites off a small island in the Gulf ofThaila nd_
Acknowledgements
The authors wish to acknowledge the active s u pport and c=e> ntri b ution'
they have received from Janet Osisiogu, H ele n Scott, rt Ev-a ns anc
Elizabeth Coppell.
" Using NeLson Thornes support materiaLs means teachers and
students can be absoLuteLy confident that they are fOLLOWing "
the course as our examiners intended.
AQA Teacher Support
I SBN 978-1 - 4085- 0584- 7
Nelson Thornes
II I
9 7 8 1 47
Virtual learning environments
(VLl'.s): systems ayailable in
schools and colleges so that
students can access school
material from home.
VlI11ses: pieces of computer code
that can reproduce by copying
themselves to other files. They
can cause damage to stored
data or stop programs running
properly.
VoW: Voice over Internet Protocol,
a method of using internet
technologies to make phone calls.
Web browser: also called an
Internct browseL It is a softwate
application used to view web
pages.
Web logs: usually abbreviated to
blogs. These are websites where
people or organisations \o\"rite
entries about recent events or on
a particular subject.
Wide Area Network (WAN) :
a network that covers a
geographical area larger than
a single building; it may be
national or global.
Wikis: web pages that allow people
who read them to edit and add
content to them,
Wireless Application Protocol
(WAP) : a technology that
allov:s mobile-phone users to
viev; phone-friendly versions of
websites on a phone SCreen.
Word :>rocessor: a type of
applications software used to
create text documents.
Clossary 141
Workflow management software:
a computer program to help a
business manage the flow of a
project.
World Wide Web (www) : a
system of Internet servers that
support a collection of ..... eb pages
on the Internet ..... hich hyperlink
to each other.
WYSIWYG: an acronym for 'what
you see is what you get' . It is a
term used to describe software
that allows the user to view
something very similar to the
end result while the document is
being edited.
Index
Key terms and their page numbers
are in bold
absolute cell relerence 59
acceptable use policies 118
access, computer
equality of 104
unauthorised 115-18
actuators 20
analog signals 24
applications software 7, 38
for audio, DVD and video players
51
control software 87- 91
data transfer 52
databases 62--8
document design 53
generic features 38-9, 132-3
graphics 46
hosted and locally installed 39-40
open source and proprietary 39
presentation softyJare 44-5
spreadsheets 56-61
web design 48-50
'word processing and desktop
publishing 41-2
artwork 122
ATMs (automated teller machines)
116, 117
avatars 112
AVERAGE function 58
back and neck problems 110
backing storage 9
backnps 21, 128
bandwidths 24
bar-code readers 17, 32
behaviour, responsible 112-14
biometric identification 116
blogs 78, 126
Bluetooth 24
bookmarks 73
boot up 8, 14
broadband 24
budgets 123
buffers 19
bulletin boards 125
bullying, cyber 113
bytes 21
ra
CAD (computer-aided design) 101
CAM (computer-assisted
manufacture) 101
cameras 16
CCIV 106, 116
cell references 57, 59
chain e-mails 114
charts 60
chat rooms 123-4
clients 28
closed questions 29
collaboration 121-2
situations and software 125-8
working processes 122-4
working in a team 124-5
commerce, leT in 101- 3
compression programs 12
Computer Misuse Act 1990 97-8
control software 20, 87-91
cookies 25
copytight 98-100
Copytight and Patents Act 1988 98
corruption of data 14, 97
CPU (central unit) 7, 8
cyber bullying 113
m
data 56,57
archiving 67
backing up 21, 128
corruption 14, 97
encoding 12-13
encryption 115
input 9, 16-18, 132
logging 84-6
output 9, 18- 20
processing 6, 8
protection 96--8, 105
sorting 60
storage 9, 12, 21-2
transfer 52
,-alldation 33, 64
data controllers 96
Data Protection Act 1998 96-7
data redundancy 63
data subjects 96
data types 56, 57, 62
data users 96
databases 56, 62
forms 65
key fields 65
mail merge 67-8
national 105
reports 66-7
searching 66
sorting and filters 65
structure 63-4
types of data 62
deadlines 122
desktop publishers (DTP) 41-2, 134
devices 7
input 9, 16-18, 132
output 9, 18-20
storage 9, 12, 21-2
dialogue boxes 14
digital cameras 16
digital projectors 19
digital signals 24
DNA database 105
documents
collaborative 126-7
design 53
dongles 24
D
e-commerce 101-2
e-mail 23-4.74-7. 112.114. 122
economic issues 101-3
electrical safety 111
employtDent, leT and 102-3
encoding of data 12-13
encryption of data iis
entertainment systems 25
emironmental issues 106--7
error messages 14
ethical issues 105-7
export features (data transfer) 52
extranets 128
eye problems 109
II
fa,'ourites (websites) 73
faxes 24
feasibility studies 28-30, 30
feedback (control-feedback loop)
89-90
fields, database 63, 65
file extensions 11, 52
me paths 11
me permissions 126
files
organisation 11-13
shating 127
transferring 52
films 25
filters, computer content 114
filters, databases 65
filters, graphics software 46
firewalls 115
flaming e-mails 114
Flash applications software 49
flash memory 22
flat file databases 63
folders 11
forms, database 65
formulae 57-9
forums, online B 1
functions 57, 58-9
Gantt <harts 123, 124
generic features of software 38-9,
132- 3
graphics manipulation software 46,
136
graphs 60
grooming (criminal offence) 112
GUTs (graphical user interfaces)
10,131
m
hacking 80,97
hard drives 21
hardware 6-7, 7
input de,ices 9, 16-18, 132
output devices 9, 18-20
storage del'ices 9, 12, 21-2
health issues 109-11
hit counters SO
home working 102, 128
hosted applAications 39-40
hotspots 10, 49
house styles 121
HTML (hypertext mark,up language)
49-50
hygiene III
hypcrlinks 10, 48
D
identity cards 105
identity thd't 117
IF function 59
import features (data transfer) 52
industry, ICf in 101
information 56, 57
gathering 29-30
sources 35-6
Infonnation Commissioner 96
input 6
input devices 9, 16-18, 132
instant messaging 77, 122
integrated entertainment systems
25
intellectual property 98
interactive presentations 44
Internet 23, 24
see aLso World Wide Web
internet fraud 116
Internet service providers (ISPs)
74
interviews 29
intranets 126, 128
D
junk mail 77
13
key fields 65
keyboards 9, 16
D
laptops 92
legal issues 96-100
lighting 111
Local Area Networks (LANs) 23
logging intervals 84, 85
logging periods 84, 85
magnetic cartridges 22
magnetiC stripes 17
mail merge 67-8
MAX function 58
Index 143
memory. computer 8, 21
memory sticks 22
menu user interface 11
message boards 81
microphones 16
microprocessors 7
milestones 122
MIN function 58
mobile phones 23, 92
modelling using spreadsheets 60-1
modems 24
monitors 9, 18
motherboard 8
mouse 16
multimedia presentations 44
music 25, 51, 100
nffiVorks 23, 24
Humber formats 56, 57
m
obsem,rion (intonnation gathering) 30
OCR (optical character
recognition) 18, 30
OMR (optical mark recognition)
18,30
open questions 29
open source software 39
operating systems s o ~ r e 7,
10-13
option buttons 57
output 6
output de"ices 9, 18-20
passwords 115-16
patches 35
peer-to-peer sites 100
pen drives 22
performance criteria 34
phishing 117
photographs, online storage 22
PIN (personal identification
number) 115, 116
plagiarism 99
play lIsts 51
plotters 19
plug-ins 79
podcasts 81, 82
political issues 105-7
POP (Post Office Protocol) 74
144 Index
pop-ups 73
presentation softwa,--e 44--5, 135
primary keys (databases) 65
printers IS, 19
priyacy 105-6
problems, computer 14-15
processing, data 6, 8
project management 123-4
project management software 123
projectors, digital 19
proprietary software 39
' Ill e, tionnaires 29-30
open and closed 29
radio 25
radio burtons 57
RAIl'! (random "CCCSS memory) 8
n..'COms, database 63
recursive processe.!O! 121
registry 15
relationdl data;'ases 63-4
relative cell referellces 59
rr.mote access 128
reports, from databases 66-7
resolution 10
re:3ourccs, project 123
RFID (radio-frequency identification)
116
ROM (read-onIy memory) 8
RSI (repetitive strain injury) 109
safety
collaborative working 127
online 112
workplace 110-11
sample sizes 30
satellite navigation systems 92-3
schedules 123
screen layoulS 32
search engines 73
searches, database 66
secondary storage 9
security
issues of 105-6
online 115-18
sensors 17, 84, 136
servers 24
S1M cards 24
smart mobile phones 92
SMS (short message service) 23
SMTP (Simple Mail Transfer
Protocol) 74
social effects of leT 103-4
social networking 79-80, 103, 112,
126
software 7
operating systems 10-13
selecting 32
see also applications software
software licences 98-9
sort feature 60, 65
spam fillers 77
speakers 19
.preadsheets 56
features 56-7
formulae and functions 57-9
graphs and charts 60
modelling 60-]
sorting 60
.pyware 117
storage 9
devices 9,12,21-2
shortage of space 15
streaming 51
stress 109
SUM function 58
systems life cycle
feasibility studies 28-30
information sources 35-6
stages of 30-5
o
task specific software 38
tcams, working within 124--5
technical support 15
teleconfe!ccnccs 125
telephones 23, 92
telcworking 102- 3, 1.28
tests, system 33, 34
text messages 23
touch screens 17
turtles 87-8
TV 25
II
uniform resoUJ'Ce locators (UlUs)
115
UPS (unintcrruptible power
supply) 111
user interfaces 10, 32
user names 115-16
users 29, 34
validation 33, 64
version control 127
videoconferences 125
virtualleaming environments
(VLEs) 125, 127
virtual memory 22
viruses 80, 97
VolP (Voice over Internet Protocol)
23, 123
web browsers 72-3
web cams 112, 125
web counters 50
web logs 78
web-based applications 39-40
Vlelrdesign applications software
48-50, 135
webm.il74
websites 48, 73-4, 74
Wi-Fi 24
Wide Ml!a Networl<s (WANs) 23
wilds 74, 97, 126
wlldcards 66
Wireless Application Protocol
(WAP) 92
word processors 41-2, 134
v.:orkfiow management
123
World Wide Web (www) 23
browsers 72-3
common types of websites 73-4
e-mail 74--7
forums 81
instant messaging 77, 122
Internet service providers 74
mobile technologies and 92
podc.slS 81
social networking 79-80
using safely and responsibly
112-14
web logs 78
wrist problems 109
Vi YSIWYG 49-50

You might also like