Dicm PDF
Dicm PDF
Dicm PDF
ICT
A practical
approach for
the updated
syllabus
Stephen Doyle
ICT
A practical
approach for
the updated
syllabus
Stephen Doyle
Motherboard
1
Software the computer hardware what to do. System software therefore
operates and controls the computer hardware.
Software are programs for controlling the operation of a computer
or for processing electronic data. System software includes:
Software consists of sets of instructions that tell the computer Operating systems
hardware what to do. Software is written in a computer language Device drivers
and there are quite a few different ones. Computer hardware Compilers
is useless without software. Software is of two main types: Linkers
applications software and system software. Utilities
2
1 TY PES AND COMPONENTS OF COMPUTER SYSTEMS
KEY WORDS
Q U E S TIONS A
Device driver a short, specially written program that
1 a Explain the main difference between computer understands the operation of the device it controls/
hardware and software. (2 marks) operates. For example, driver software can operate/control
b Give two examples of computer hardware and two a printer or scanner. Driver software is needed to allow
examples of computer software. (4 marks) the systems or applications software to control the device
properly.
2 System software includes the following: Operating system software that controls the hardware of
Operating system a computer and is used to run the applications software.
Device drivers Operating systems control the handling of input, output,
Utilities interrupts, etc.
Write down the piece of software from the list above that System software any computer software that manages
performs each of the following tasks. and controls the hardware thus allowing the applications
a Switches the printer on/off and sends data software to do a useful job. System software consists of a
to the printer for printing. (1 mark) group of programs.
b Compresses files so that they can be sent in Utility software part of the system software that
less time over the internet. (1 mark) performs a specific task such as creating a new folder,
c Provides a user interface so that users can easily copying files, etc.
create folders, copy files, move files, etc. (1 mark)
d Keeps track of where to store data on the
hard disk drive. (1 mark) The main components of computer
e Detects and removes viruses. (1 mark) systems
f Used to supply instructions as to how to operate
hardware attached to the computer such as
printers and scanners. (1 mark) Input devices Processor and internal memory Output devices
3
Internal memory: read only memory (ROM) and
Q UESTI O N S B
random access memory (RAM)
There are two types of memory called ROM and RAM. Both of
1 The diagram represents a computer’s main components:
these two types of memory are stored on chips and are available
immediately to the central processing unit.
A B C
Computers also have a hard disk drive as internal memory and it
is here that the application software is stored along with the user’s files.
D
ROM (read only memory) RAM (random access memory)
For each of these components, match it with a letter in
Data and program instructions are Data and program instructions are
stored permanently. stored temporarily. the diagram above.
Processor and internal Secondary storage
The computer can only read the Can read contents as well as write
contents. new contents. memory devices devices
Output devices Input devices
Non-volatile, meaning the Volatile, meaning the contents are
contents of memory are retained lost when there is no power. (4 marks)
when there is no power. 2 ROM and RAM are both types of internal computer
Used to store the BIOS program memory.
used to boot the computer up a i What do the letters ROM stand for? (1 mark)
when the power is turned on. ii What do the letters RAM stand for? (1 mark)
b Tick one box next to each item below to show
KEY WORDS
which statements apply to ROM and which to RAM.
BIOS (basic input/output system) stored in ROM and (4 marks)
holds instructions used to ‘boot’ (start) the computer up
ROM RAM
when first switched on.
RAM random access memory – fast temporary memory Contents are lost when the
which loses its contents when the power is turned off. computer is turned off
ROM read only memory – memory stored on a chip which Contents are not lost when
does not lose data when the power is turned off. the computer is turned off
Stores the programs needed
Input devices to start up the computer
These are used to get raw data into the computer ready for Stores application programs
processing by the CPU. Some input devices, such as a mouse, and data currently being used
keyboard, touch screen, microphone, etc., are manual and need to
be operated by a human. Others are automatic and once they are 3 a Explain why it is important that a computer
set up they can be left to input the data on their own. These include has a large amount of RAM and ROM. (2 marks)
optical mark readers, optical character readers, etc. b Computers contain RAM and ROM.
Explain what ROM would be used for in a computer.
Explain what RAM would be used for in a computer.
Output devices
(4 marks)
Once the raw data has been processed it becomes information
and this information needs to be output from the computer using
an output device. Output devices include monitors/screens,
printers, speakers, plotters, etc. Operating systems
Operating systems are programs that control the hardware directly by
Secondary/backing storage giving the step-by-step instructions that tell the computer hardware
Secondary/backing storage is used for the storage of programs what to do. An operating system performs the following tasks:
and data that are not needed instantly by the computer. It is also
used for long-term storage of programs and data as well as for Handles inputs and outputs – selects and controls the
copies in case the original data is lost. operation of hardware devices such as keyboards, mice,
scanners, printers, etc.
Secondary/backing storage media includes internal hard disks, Recognises hardware – the operating system will recognise
memory sticks, flash memory cards, optical disks (such as CDs that a hardware device such as a pen drive, camera, portable
and DVDs) and magnetic tape. hard drive, etc., has been attached to the computer. The
See Chapter 2 for more information on input, output and storage operating system loads the software it needs to control the
devices. device automatically.
4
1 TY PES AND COMPONENTS OF COMPUTER SYSTEMS
Supervises the running of other programs – it provides a way Graphical user interface
for applications software (i.e. the software that is used to Graphical user interfaces (GUIs) are very popular because they
complete a task such as word-processing, spreadsheet, stock are easy to use. Instead of typing in commands, you enter them
control, etc.) to work with the hardware. by pointing at and clicking objects on the screen. Microsoft
Handles the storage of data – it keeps track of all the files Windows and Macintosh operating systems use graphical user
and directories/folders on the disk. interfaces. The main features of a GUI include:
Maximises the use of computer memory – the operating
Windows – the screen is divided into areas called windows.
system decides where in the memory the program instructions
Windows are useful if you need to work on several tasks.
are placed. For example, some instructions are needed
over and over again, whereas others are needed only now Icons – these are small pictures used to represent commands,
and again. It ensures that the parts of the program needed files or windows. By moving the pointer and clicking, you can
frequently are put in the fastest part of the memory. carry out a command or open a window. You can also position
Handles interrupts and decides what action to take – when any icon anywhere on your desktop.
something happens such as the printer cannot print because
Menus – these allow a user to make selections from a list. Menus
the paper is jammed or it has run out of paper, it will stop the
can be pop-up or drop-down and this means they do not clutter
printer and alert the user.
the desktop while not in use.
The types of interface used with operating systems Pointer – this is the little arrow that appears when using Windows.
An operating system needs a way of interacting with the user. The pointer changes shape in different applications – it changes
The way the operating system communicates with a user is to an ‘I’ shape when using word-processing software. A mouse can
called the interface and there are two common interfaces in use be used to move the pointer around the screen.
and these are:
Notice that the first letter of each feature in the above list spells
Graphical user interface (GUI) – these are very easy to use and out the term WIMP (i.e. Windows, Icons, Menus, Pointers).
have features such as windows, icons, menus, pointers, etc.
Examples of operating systems which make use of a GUI are: The benefits and drawbacks between an operating
Windows system which uses a GUI and those which use a CLI
Mac OS
Ubuntu Benefits and drawbacks of a GUI
Drawbacks
A GUI takes up more hard disk space when being stored.
A GUI requires more memory (ROM and RAM) when
being used.
A more experienced user might find that typing in commands
is quicker than moving the mouse or clicking.
Example of a command line interface where the commands are entered
A powerful processor is needed to run the latest version of
at the prompt.
a GUI.
5
Benefits and drawbacks of a CLI Personal computers (PCs) or desktop computers
A personal computer is the type of computer that you are most
Benefits
likely to encounter at home or at school.
If the user is experienced in using the CLI it can be faster to
type commands rather than move the mouse and click on Computers can be classed as stand alone or networked:
drop-down menus and icons to issue the same commands.
Stand alone computers are not connected to a network so
A CLI does not use as much hard disk space when being
they do not share resources or files with other computers.
stored.
They are used when all the programs data/files needed for
A CLI does not need as much memory (ROM and RAM) when
the application, are stored locally (i.e. on one of the drives or
being run.
memory in the computer itself).
You do not need a powerful processor to run a CLI.
Networked computers are linked to a network so they are
Drawbacks able to share files, an internet connection and devices such
You need to learn and remember lots of commands. as printers and scanners with other computers connected to
Commands must be issued in a specific order otherwise the the network. Many programs are stored on the internet (i.e.
commands will be rejected. cloud storage) rather than locally on the computer and can
therefore only be accessed using networked computers.
Important note
Windows is an interface which allows easy user interaction with Laptops
a multitasking graphical user interface (GUI) operating system Laptop computers are designed to be portable and used while
as well as other software. MS Windows is a branded operating on the move. A touch pad is typically used instead of a mouse
system owned by the company Microsoft. to move the cursor and make selections. Laptops are often
used in public places so there is a greater likelihood of them
being stolen.
Q U E S TIONS C
Laptops make use of LCD (liquid crystal displays) which use
1 Graphical user interfaces are very popular interfaces less power and are light in weight. This is important because
that are used with computers, mobile phones, and other laptops use rechargeable batteries when used away from a
portable devices. power supply. If a laptop is not connected to a network then it is
a Give three features of a graphical user interface. a stand alone laptop and all the programs and files needed for
(3 marks) the application used are stored on the computer itself. Once the
b Other than a graphical user interface (GUI) give the computer is connected to a network then it is able to share files
name of one other type of user interface. (1 mark) and resources and it becomes a networked laptop.
2 All computers need an operating system.
a Explain what an operating system is. (2 marks) Tablet computers
b List three different functions of an operating Tablet computers, called tablets for short, are mobile computers
system. (3 marks) with a display, electronic circuitry and battery in a single thin
unit. They are designed to be portable yet have a screen size that
3 Users need a way of interacting with an operating system. makes them easy to use for accessing content on the internet,
a Give the names of the two different types of user playing games, listening to music, as well as using all the other
interface used with computers. applications for which you would use a computer. Tablets usually
(Note that the use of brand names will gain you feature an on-screen keyboard which pops up on the screen to
no marks in an examination.) (2 marks) enable text to be input.
b Give a benefit and a drawback for each type
of interface. (2 marks) Tablet computers are usually equipped with some or all of the
following:
A camera which enables still or video images to be recorded
Types of computer and saved as well as photo-editing software.
The type of computer you choose to use depends on the tasks Speakers to output music, sound from video recordings,
you intend to do with the computer and where you intend using instructions from GPS (global positioning systems), etc.
the computer. If a computer is to be used away from a desk then A microphone to record voice for the phone facility, the web
it needs to be small and light but there are some tasks such as cam, and for voice recognition to enable commands to be
desktop publishing where it becomes difficult to perform using a issued verbally and to enable speech to be converted to text
small screen. for documents and emails.
6
1 TY PES AND COMPONENTS OF COMPUTER SYSTEMS
Handwriting recognition enables a user to write on the Desktop Laptop Tablet Smartphone
touchscreen using a stylus and then convert it to text which
Separate All in one so easy Light and Very light and
can be used in email, documents, etc. components to move. compact so easily pocket sized.
Bluetooth which allows communication between the means hard to transported.
tablet and peripherals such as external speakers and dismantle/move.
other devices. Used on a desk so Often used Uses an on-screen On-screen
Ability to use Wi-Fi which allows access to the internet less likelihood of awkwardly so chance keyboard which can keyboard is small
wherever there is a wireless access point (e.g. in homes, RSI or backache. of backache or RSI. be awkward to use. and hard to use.
coffee shops, libraries etc.). Needs a mains Can be used away Can be used away Can be used away
The ability to use 3G/4G telephony to access the power supply. from the mains from the mains from the mains
internet when Wi-Fi is not available, provided you have power. power supply. power.
a mobile signal. Easy to upgrade Harder to upgrade Harder to upgrade Harder to upgrade
and repair. and repair. and repair. and repair.
Full size keyboard Touch pad is more Uses a touch screen Small screen
and mouse are cumbersome to which makes it easy makes it more
easy to use. use. to surf the net. difficult to use.
Flat surface No flat surface is Can be used in most Easiest type to use
needed to move needed. positions including when on the move.
mouse on. standing up.
Artificial intelligence
Because they are light in weight and have a touch-screen, tablet Artificial intelligence is the science of getting computers to learn
computers can be used while standing up.
in a similar way to the way the human brain learns new things.
The aim of this is to make computers more intelligent and make
Smartphones them able to work things out for themselves.
Smartphones have most of the features of a tablet computer
Artificial intelligence is a reasoning process performed by
but their small size limits their use for certain applications.
computers that allow the computer to:
The following diagram shows some of the features of a smartphone.
Draw deductions
Clock, alarm,
Produce new information
calendar & Modify rules or write new rules.
Communicating with nearby calculator 3G/4G
devices using Bluetooth telephony
KEY WORD
Ability to run small WiFi access to
Artificial intelligence (AI) creating computer programs
programs called apps the internet
or computer systems that behave in a similar way to
Features the human brain by learning from experience, etc. The
Video of a Phone calls
computer, just like a human, is able to learn as it stores
smartphone
more and more data.
Camera & SMS messaging
photo-editing
Voice messages
Biometrics
MP3
player
GPS Biometrics uses a property of the human body to identify people.
The three main properties used to identify a person using ICT are:
Fingerprints
The pattern on their retina (the pattern of blood vessels at the
back of the eye).
The pattern on their iris (the coloured, circular area around
the pupil in the eye).
7
These have the following uses. Uses for computer-assisted translation
Changing the language on websites – many websites are used
Fingerprint scanning:
internationally and it is possible for you change the language
Used for recording attendance in school/college used by the website to the language you use.
Used for access to buildings and rooms Translation of documents – documents such as contracts, letters,
Used to restrict access to computers/smartphones brochures, notes etc may need to be translated into different
Used to restrict access to countries at border control at languages. There is no need for translators to perform the translation
airports, ports, etc. as computer software can do it saving both time and money.
Retinal scanning: Quantum cryptography
Quantum cryptography uses a special branch of physics called
Used for passport control.
quantum mechanics to produce a very secure method of encryption. It
Used for access to buildings and rooms.
allows a sender and receiver to communicate in private using a special
key. If someone is trying to eavesdrop on the communication, the
system is able to detect this and the system stops the communication.
This method is used by the military to send orders to troops and also
for sending financial and banking details over networks.
8
1 TY PES AND COMPONENTS OF COMPUTER SYSTEMS
Holographic imaging uses laser light to form an image of an Can easily change the way the device works by re-programming it.
object that is almost indistinguishable from the object itself. More accurate than humans.
Research is currently taking place to use computer-generated Can react quickly to changes in conditions.
holograms with special holographic displays to produce
Disadvantages:
holographic television. The main problem at the moment is
that producing a holographic image requires huge numbers of Initial cost of equipment is high.
calculations to be performed very quickly and current processors Equipment can go wrong.
are not fast enough. There is also the problem of transmitting Fewer people needed so leads to unemployment.
holographic images, because the bandwidth needed is much Need specialist to program, which is expensive.
higher than that currently available. As soon as these technical
problems are solved, we will have true 3D images.
Virtual reality
Virtual reality is a simulation of the real world, or an imaginary
world that is created using computers. Sometimes the image is
displayed on a computer screen and sometimes it is displayed on
a specially designed headset that you wear. In some cases users
are able to interact with the virtual environment using a keyboard
and mouse or by using a specially wired glove.
Robotics
Robots have been widely used in manufacturing for years, especially
for painting and welding in car factories. Robots are also used for
picking and packing goods in large warehouses. Robots have been
developed that will do some of the tasks humans hate to do, such as
mowing the lawn or vacuuming floors. This robot is used by the army to make bombs safe.
There are robots available for the home that will wash floors, clean
gutters, and clean swimming pools. The robots that are available
at the moment in the home are usually capable of performing one
task. In the future you will probably buy a single multifunctional robot
capable of carrying out a range of different tasks.
Mowing the lawn is a chore for many people, so this robot lawnmower is a
useful device.
9
REVISION QUESTIONS
10
1 TY PES AND COMPONENTS OF COMPUTER SYSTEMS
1 Choose three tasks from the list below that are carried out 7 There are two types of internal memory called
by system software: ROM and RAM. Describe the differences between
Renaming a file ROM and RAM. [4]
Deciding where to store data on a hard disk drive 8 Complete each sentence using one item from the list:
Underlining text in a word-processing package
Cropping a picture Router Output Communication Software
Loading a file from the disk drive [3] Processor Microphone ROM RAM Input
2 a Give three tasks (other than those in Q1) a ……………… means the programs that supply the
performed by system software. [3] instructions to the hardware to tell it what to do.
b Some printers come with device driver software. b …………… devices such as keyboards, mice, and
Give one purpose of device driver software. [1] scanners are used to supply data to the computer.
3 Write down the name of the piece of system software that c …………….. devices are hardware such as printers,
carries out each of the following by matching the name to speakers, and screens.
the correct description. d …………….. is memory which is used to hold the boot
Utility program needed to start the computer up when first
Device driver switched on.
Operating system e ……………. is memory held on a chip that can
have its contents changed by the user. [5]
Description Name
9 Graphical user interfaces are very popular particularly
(A) Deals with errors that occur when the
with tablets and smartphones.
computer is working on tasks
a Give two advantages of a tablet compared to a
(B) Software needed when a new piece of
laptop computer. [2]
hardware is attached to the computer
b Give two disadvantages of a tablet compared to
(C) Scans the hard disk drive to detect a laptop computer. [2]
and remove viruses
c Give three features of a graphical user interface. [3]
[3] 10 Give two examples of tasks that are completed
4 Tick True or False next to each of these statements. by robots. [2]
11
2 Input and output devices
Input devices such as a keyboard and mouse/touch pad are available
The key concepts covered in this chapter are:
with nearly all computers. There are, however, other input devices
Input devices and their uses
which reduce the amount of work and improve accuracy when entering
Direct data entry and associated devices
data into the computer for processing. Output devices and their uses
Once data has been processed, the results of the processing, called
the output, will need to be produced. Various output devices such
as printers, screens, speakers, etc., are used for output.
In this chapter you will be covering both input and output devices.
Input devices and their uses Numeric keypads are also used in chip and PIN machines where
you insert a credit/debit card and then enter your PIN to pay for
Input devices are those hardware devices that are used for
goods or services.
the entry of either instructions or data into the computer for
processing. There are many different input devices; which one The main advantage of using a numeric keypad is:
is chosen depends mainly on the task being performed. For the
It is smaller than a full keyboard, making it easier to carry or
examination you will need to know how each of the following input
move, e.g. at a shop counter.
devices is used and their relative advantages and disadvantages.
The main disadvantages of using a numeric keypad are:
Keyboard Small keys might be difficult for some people to see.
Keyboards are used to enter text into word-processed documents,
Keys might be arranged differently, e.g. on a phone versus on
numbers into spreadsheets, text into online forms, and so on.
a chip and PIN pad.
The main advantages of using keyboard entry are:
Pointing devices
Text appears on the screen as you type so it can easily be Pointing devices are needed to make selections from a graphical
checked for accuracy. This is called visual verification. user interface. In order to move the pointer onto a button, icon,
They are ideal for applications such as word-processing or hyperlink, etc., it is necessary to use one of the following devices:
composing emails where you have to create original text.
Mouse – The cursor moves in response to the movement of
Can be used for other instructions (e.g. Ctrl+P to print).
the mouse. The left mouse button is used to make selections
The main disadvantages of using keyboard entry are: while the right button is used to display a drop-down menu.
A scroll button or wheel is used to help move quickly through
It is a slow method for entering large amounts of text
long documents.
compared to methods such as dictating or scanning text in.
It can be inaccurate as it is easy to make typing mistakes. Advantages of using a mouse include:
It can be frustrating if you do not have good typing skills.
Easier than using a keyboard to select or move items.
Typing for a long time can cause a painful condition called
Enables rapid navigation through an application,
repetitive strain injury (RSI).
such as a web browser.
Small, so it occupies only a small area on the desktop.
Numeric keypad
Numeric keypads are used where only numeric data is to be Disadvantages of using a mouse include:
entered. For example, you may see them being used in ATMs
Hard to use if the user has limited wrist or finger movement.
(Automatic Teller Machines—cash dispensers) to enter the PIN
Needs a flat surface so it can’t be used ‘on the move’.
(Personal Identification Number) and the amount to be withdrawn
or deposited.
12
2 INPUT AND OUTPUT DE VICES
Touch pad – these are used on laptop computers when there Advantages of using a trackerball include:
is no flat surface to use a mouse, though many people find
They are easier to use than a mouse if the user has wrist
them more difficult to use. They also have buttons to act like
or finger problems.
mouse buttons.
They allow faster navigation compared to a mouse.
They are stationary as it is only the ball that moves.
Disadvantages of using a trackerball include:
The cost, as trackerballs are not normally included with a
computer system.
Time is needed to get used to using them.
Remote control
Remote controls are input devices because they issue instructions
to control devices such as TVs, video players/recorders, DVD
players/recorders, satellite receivers, music systems, data
projectors or multimedia projectors.
Touch pads are used when there is not enough room for a mouse.
Advantages of using a remote control include:
Advantages of using a touch pad include: The user can operate a device wirelessly from a short line of
sight distance where a device’s controls are difficult to reach
Can be used ‘on the move’ where there is no flat surface (e.g. a projector positioned on a ceiling).
on which to use a mouse. Can control devices safely from a distance (e.g. a robot used
There is no extra device to carry as the touch pad is built to investigate a bomb).
into the computer. Enables people with disabilities to operate devices at a distance.
It is faster to navigate through an application compared to
using a keyboard. Disadvantages of using a remote control include:
Disadvantages of using a touch pad include: Typically uses infra-red signals and these can be blocked by
objects in their path, so the remote control may not operate.
They are hard to use if the person using the touch pad has Needs batteries to operate and these need regular replacement.
limited wrist or finger movement. Small buttons can be pressed by mistake and this can alter
Controlling the pointer is more difficult compared to using the settings of the device and make it hard for the user to go
a mouse. back to the original state.
They are hard to use for actions such as ‘drag and drop’.
They tend to be used in more cramped conditions so their
Joystick
long-term use could lead to health problems, such as RSI.
Joysticks are used mainly for playing computer games. They can
Trackerball – these are a bit like an upside-down mouse and also be used in car-driving simulators and flight simulators. The
you move the pointer on the screen by rolling your hand over stick moves on-screen in the same way as a mouse, and buttons
the ball. They are used by people with poor motor skills such are used to select items.
as the very young or people with disabilities.
Advantages of joysticks:
They are ideal for quick movement.
They can be used by disabled people because they can be
operated by foot, mouth, etc.
Disadvantages of joysticks:
Entering text is very slow as you have to select individual
letters (e.g. the name of a high scorer in a game).
You have to purchase them separately from a computer system.
13
Touch screen scanning text into word-processing or other packages thus saving
Touch screens are displays that can detect the presence and having to re-type the text. Scanning and recognising text in this
location of a touch to the screen. Usually a finger is used to way is called OCR (optical character recognition).
make selections on the screen, although some systems allow
Advantages of scanners:
several fingers to be used, for example re-sizing an image on the
screen by moving two fingers closer together or further part. Touch They can be used in conjunction with special optical character
screens can be found in information kiosks, tablet computers and recognition software to scan and enter text into word-
smartphones. processing or other software without the need for re-typing.
They can be used to digitise old documents such as maps,
Touch screens are popular in restaurants and shops for inputting
pictures and photographs for archive purposes.
orders/sale details because employees need little training to
They can be used with software to repair/improve old photos.
use them. They are also features of some point of sale terminals
(i.e. computerised tills). They are ideal for tourist information Disadvantages of scanners:
kiosks, transport information, airport self check-in or ticket
They take up a lot of space.
collection points.
It can take a long time to digitise all the pages in a long document.
The quality of the scanned item might be poor depending on
scanner resolution.
14
2 INPUT AND OUTPUT DE VICES
15
Graphics tablet Disadvantages of video cameras:
A graphics tablet is a flat board (or tablet) which you use to
Can erode privacy as CCTV cameras are present in many
draw or write on using a pen-like device called a stylus. Graphics
public places.
tablets are ideal for inputting freehand drawings. They can also be
It is very difficult to produce good video without training.
used for retouching digital photographs.
Editing is usually required to make a good video and this
Graphics tablets are used for specialist applications such as when can be complicated and time-consuming.
designing a kitchen using computer-aided design (CAD), and have a Can be expensive to buy.
range of specialist buttons for certain shapes and items. You can add The picture quality of the video is determined by the number
these items by clicking on them with the stylus. of pixels used (the resolution) and this may be low.
Web cam
Web cams are digital cameras that can take both still
and video images which can then be transferred to
other computers or saved. They are used for conducting
conversations over the internet where you can see the person
you are talking to.
Web cams are now included with many computers and are
easily added to computers not having one. The uses for web
cams are many and include:
To conduct simple video-conferencing.
Allow parents to see their children in nurseries when they
are at work.
A graphics tablet.
To record video for the inclusion on websites.
Allow people to view the traffic in local road systems.
Advantages of graphics tablets: Allow people to view the actual weather in a place they are
Used in countries such as Japan and China where graphical going on their holidays.
characters are used instead of letters for words. Advantages of web cams:
It is more accurate to draw freehand on a tablet than to use a
mouse to draw. Can see the reactions of people as you are talking to them.
The icons/buttons are on the graphics tablet rather than the Parents can see their children and grandchildren and speak
screen, leaving more screen space for the design/drawing. to them if they do not live near.
Specialist tablets are expensive. Limited extra features to improve image quality.
Requires more desk space. The picture quality can be poor at low resolution.
Generally have a fixed position so do not move around.
Video camera
Most modern video cameras are digital, which means the files KEY WORDS
produced are digital and can be transferred to a computer and
saved or edited and then saved. Like any digital file, it may be Sensors devices which measure physical quantities such
added to presentations, websites, etc. You can also add the as temperature, pressure, etc.
video to sites such as YouTube so that the video can be shared Touch screen a special type of screen that is sensitive to
with others. touch. A selection is made from a menu on the screen by
touching part of it.
Advantages of video cameras: Voice recognition the ability of a computer to ‘understand’
Can capture both still and moving images. spoken words by comparing them with stored data.
Easy to transfer video to the computer.
Can store many images/videos for editing later.
16
2 INPUT AND OUTPUT DE VICES
Q U E S TIONS A
Direct data entry and associated devices
Direct data entry (DDE) is a method of data processing where
1 a Which six of the following are input devices? the data is input directly into the computer system for immediate
Graphics tablet Digital still camera processing. The data are entered automatically by one of the
Colour laser printer Magnetic hard disk drive devices outlined here.
Mouse CD ROM drive
Microphone Web cam Magnetic stripe readers
Speakers Photocopier Magnetic stripe readers read data stored in the magnetic stripes
LCD screen Touch screen on plastic cards such as loyalty cards. The stripe contains data
(6 marks) such as account numbers and expiry date.
b Name two output devices given in the choices above. They are used for reading data off credit/debit cards where a
(2 marks) chip and PIN reader is not available. They are also used in ID
2 a Explain the purpose of an input device. (1 mark) cards where the card is swiped through a reader to gain access
b Give the names of two input devices that to buildings and rooms. Other uses include pre-payment cards for
would be used by a desktop computer. (2 marks) using services such as the internet, photocopiers, etc.
c Give the name of one input device that would Advantages of magnetic stripe readers:
be found on a laptop computer that you would
not find on a desktop computer. (1 mark) Faster input of data by swiping as opposed to typing.
Can be used as an alternative method to chip and PIN for
3 Laptop computers enable people to do work or keep in credit/debit cards.
touch when they are travelling. Avoids possible typing errors which could be introduced by
Name two input devices typically used with a laptop keying in.
computer. (2 marks) Stripes are not affected by water so they are robust.
4 Name two items in this list which are used as input Disadvantages of magnetic stripe readers:
devices.
Magnetic stripes can store only a small amount of data.
3D printer inkjet printer temperature sensor Magnetic stripes can be easily damaged by magnetic fields.
motor touch screen dot matrix printer Magnetic stripes can be duplicated relatively easily (called
card cloning) and this leads to card fraud.
web cam laser printer buzzer (2 marks)
The cards cannot be read at a distance as you have to put
5 Laptop computers usually use a touch pad rather than a them into the reader and swipe them.
mouse for pointing and making selections.
Chip readers and PIN pads
Explain why laptops use a touch pad rather than a mouse. Chip readers are the devices into which you place a credit/debit
(2 marks) card to read the data which is encrypted in the chip on the card.
6 Match each input device with the correct use.
Input device Use
a Keyboard i Used to enter a PIN when making
a purchase
b Remote control ii Used when checking the depth of
water in a container
c Touch screen iii For inputting a hand-drawn
drawing into the computer
d Numeric keypad iv Used to make selections on
tablets and some smartphones
e Pressure sensor v Used as the input for an air-
conditioning unit to keep the The chip on a credit card.
temperature of a room constant
f Temperature sensor vi Entering text when writing a book
g Scanner vii Operating a television (7 marks)
17
The PIN pad is the small numeric keypad where the personal Magnetic ink character recognition (MICR)
identification number (PIN) is entered, and the holder of the card Cheques are still used and millions of them go through a process
can be verified as the true owner of the card. called cheque clearing each day. Check clearing uses input
methods that use magnetic ink characters printed on the cheque.
The main use of chip and PIN is to read card details when making
purchases for goods or services where the cardholder is present
to input the PIN.
Advantages of chip readers and PIN pads: Numbers are printed onto the cheque using a special magnetic
ink, which can be read at very high speed by the magnetic ink
They reduce fraud as the true cardholder has to input their character reader. Most of the data (cheque number, bank sort
PIN. code, and account number) are pre-printed onto the cheque but
Chips are harder to copy compared to a magnetic stripe. the amount is not known until the person writes the cheque.
The storage capacity for data on a chip is much higher than
that for a magnetic stripe.
A chip is less likely to be damaged than a magnetic stripe.
Disadvantages of chip readers and PIN pads:
Not all countries can use chip and PIN, so they have to use
magnetic stripe readers.
People might forget their PIN.
Other people might furtively observe your PIN as you enter it
(called ‘shoulder surfing’).
Chips are also found in ID cards, some passports, public Bank cheques are read at high speed during the clearing process.
transport tickets, and these are fed into readers to allow access,
display information stored on the chip, etc. When a cheque is presented for payment, the amount is then
printed onto the cheque, again in magnetic ink. All cheques
RFID (radio frequency identification) readers are batched together at a clearing centre operated by all the
RFID (radio frequency identification) obtains data stored on a tag banks. All the cheques are read and processed in one go by the
(a small chip) using radio signals, which means that the reading machine; this is an example of batch processing.
device and tag do not have to come into contact with each other; Advantages of magnetic ink character recognition:
the data on the tag can be read from a distance. This is therefore
a wireless system. Accuracy – the documents (usually cheques) are read with
100% accuracy.
Applications of RFID tags: Difficult to forge – because of the sophisticated magnetic ink
Used for stock control in factories. technology used, it would be difficult to forge cheques.
Cattle can be tagged so the milking system can identify which Can be read easily – cheques are often folded, crumpled up,
cow is being milked and information about yield, etc. can be etc. Methods such as OCR or OMR would not work with these.
stored. Magnetic ink character recognition uses a magnetic pattern,
Used for season tickets to car parks. which is unaffected by crumpling.
Used in libraries as a replacement for bar codes. Speed – documents can be read at very high speed; this is
Used for automated passport/border control gates. particularly important for clearing cheques.
Disadvantage of magnetic ink character recognition:
Advantages of RFID tags:
Expense – the high-speed magnetic ink character readers are
There is no need for the reader and tag to come into contact very expensive.
with each other so you could have a tag with you which could
be read without getting it out of your pocket or bag.
Optical mark reader (OMR)
You can store more data on the tags compared to bar codes.
Optical mark readers use paper-based forms or cards with
Disadvantages of RFID tags: marks on them which are read automatically by the device.
OMR readers can read marked sheets at typical speeds of
The reader and the tags themselves are expensive.
3000 sheets per hour. OMR is an ideal method for marking
As tags can be read at a distance, some people are worried that
multiple choice question answer sheets for examinations.
the personal information contained in the tag can be hacked into.
Students mark the bubbles or squares by shading them in and
This information could then be used to commit identity theft.
the reader can read and process the results at high speed.
18
2 INPUT AND OUTPUT DE VICES
Advantages of OCR:
A faster way of inputting text compared to typing.
Avoids having to type the text in, which reduces the risk of RSI
(repetitive strain injury).
Can recognise handwriting so can be used to handwrite notes
on a tablet computer and convert them to word-processed text.
Reduces typing errors.
Disadvantages of OCR:
Text needs to be clearly typed or written (e.g. handwriting is
poorly read).
The forms may be rejected if they are incorrectly filled in.
19
Disadvantages of bar code input: Only a limited amount of data can be stored in a bar code –
for example, sell-by dates cannot be stored.
Bar codes can sometimes be damaged – this means having
Computers and network infrastructure must be at each point
to type in the long number underneath manually.
where the bar code may be read, which adds to the expense.
Expensive – the laser scanners in supermarkets are
expensive, although hand-held scanners are relatively cheap.
Q U E S TIONS B
20
2 INPUT AND OUTPUT DE VICES
Output devices and their uses They have a narrow viewing angle so the image is not as clear
as CRT when viewed from the side. They are less useful if
After data entered into the computer has been processed, the
many people are viewing the screen.
resulting information often needs to be output. There are many
output devices, with a screen (monitor) and a printer being the
most popular.
IPS monitor
IPS (in-plane switching) is a screen technology used with LCD
(liquid crystal display) which improves the response time, thus
CRT monitors images on the screen do not appear to ghost when they move.
CRT stands for cathode ray tube and these monitors are the older,
It also improves the image when viewed from an angle.
fatter monitors that you still see being used. They take up more
space than the more modern thinner TFT screens. Advantages of IPS monitors:
Advantages of CRT monitors: Wider viewing angle makes it easier for groups to watch.
They are much thinner than CRT monitors and therefore take
Can be used with a light pen to produce and edit drawings
up less desk space.
using CAD software.
Less glare on the screen compared to CRT monitors and are
Sometimes they are used where several people need to
therefore better when used in brightly lit rooms.
view the screen at the same time, for example where several
Much more energy efficient compared to a CRT monitor.
designers are viewing a prototype as they have a wide angle
of viewing. Disadvantages of IPS monitors:
Disadvantages of CRT monitors: Not as energy efficient as an LED monitor.
Not as good as graduating shades of colour compared to an
They are bulky and take up a large amount of space on the desk.
LED monitor.
They generate a lot of heat and can make rooms hot in the
Not as good when used in dimly-lit rooms.
summer.
Glare on the screen can be a problem.
They are much heavier and present a safety problem when
LED monitor
An LED monitor makes use of light emitting diodes (LEDs) to form
being moved, due to their weight.
the image. LED monitors have the advantage that they use very
Flicker can cause headaches and eyesight problems.
little power, thus very little heat is produced.
TFT (thin film transistor/LCD) monitors Advantages of LED monitors:
These are the thin, flat panel screens that are the more modern
They are a lot thinner than CRT monitors and about the same
type of monitor. The screen is made up of thousands of tiny pixels.
thickness as LCD monitors.
Each pixel has three transistors – red, green and blue in a liquid
They are much lighter than CRT monitors.
crystal display. The colour is generated by the intensity of each
Energy savings compared to LCD and CRT monitors.
transistor that forms each pixel.
Better picture quality when watching sports or playing games.
Advantages of TFT/LCD monitors:
Disadvantages of LED monitors:
They are very light and this is why they are used in laptop
More expensive compared to LCD monitors.
computers.
If you sit off-centre the visibility is poor.
They are thin so they do not take up much desk space.
They are cheaper to run as they use less power than CRT monitors.
They can be easily positioned to suit the user because they
Touch screens as an output device
We have already covered touch screens as input devices; touch
are light.
screens as output devices can be found on smartphones, tablets,
The radiation given off is much less than that by a CRT monitor.
and some laptops and desktops, and the output is produced
They do not get as hot as CRT monitors and energy is not wasted
usually on a TFT/LCD screen from choices made by touching
in the summer using air conditioning to cool offices down.
the screen.
They do not create glare and may be less likely to cause eye
strain and headaches.
They are ideal where only one person needs to view the screen. Printers
Printers are used to provide users with output in hard copy form.
Disadvantages of TFT/LCD monitors: This means the output is printed on paper.
They are not easy to repair, so if they go wrong it is usually
cheaper to replace them, which is not very environmentally
friendly.
21
Laser printers High quality print – ideal for printing photographs, brochures,
Laser printers are the type of printer mainly used by businesses and illustrated text.
and organisations because of their high speed. For this reason Quietness of operation – this is important in an office as
they are usually chosen as printers used for networks. Most laser telephone calls or conversations with colleagues can be
printers print in black and white. Although you can buy colour conducted during printing.
laser printers, they are relatively expensive. Inkjet printers are usually cheaper than laser printers.
Very quiet – important when used as a network printer in an High cost of the ink cartridges – this is okay for low volume
office where phones are also being used. work but for large volume it is cheaper to use a colour
Supplies last longer – the toner cartridge lasts longer than laser printer.
inkjet cartridges. Ink smudges – when the printouts are removed the paper can
High printing speed – essential to have high speed if lots of get damp which tends to smudge the ink.
people on a network are using one printer. Cartridges do not last long – this means they need to be
Very reliable – fewer problems compared to inkjet printers. replaced frequently.
No wet pages that smudge – inkjet pages can smudge but
there is no such problem with a laser printer. Dot matrix printers
They are cheaper to run (i.e. they have a lower cost per page Dot matrix printers are used in offices and factories where multi-
compared to inkjet printers). part printouts are needed and noise is not an issue. For example,
High quality printouts. one copy of an invoice could be kept by the sales office, one copy
could be sent to the customer and another given to the factory.
Disadvantages of laser printers:
They are impact printers and work by hitting little pins against an
More expensive to buy – but they are cheaper to run. inked ribbon to form the characters on the paper, which creates a
Colour lasers are very expensive to buy. lot of noise.
Power consumption is high.
Most laser printers are larger than inkjet printers.
Inkjet printers
With a dot matrix printer, characters are formed by an arrangement of dots.
Inkjet printers are popular with home users because they are
relatively cheap to buy. However, they are more expensive to Dot matrix printers may seem out-of-date but they are ideal
run, because of the high cost of the ink cartridges. They work by in some situations. You will see them being used to print out
spraying ink onto the paper and can produce very good colour or invoices in warehouses, car part stores, and garages. You
black and white printouts. They are ideal printers for stand-alone might also see them being used in pharmacies for printing labels.
computers but are less suitable for networked computers as they
are too slow. Advantages of dot matrix printers:
Can be used to print multi-part stationery – this is useful
where the printout needs to be sent to different places.
Can be used with continuous stationery – this makes it ideal
for stock lists, invoices, etc.
Cheaper to run than inkjet printers.
Disadvantages of dot matrix printers:
Very noisy – the pins make a lot of noise when they strike the
inked ribbon.
Low quality printouts. The text can look ‘dotty’.
Unsuitable for printing graphics.
More expensive to buy than inkjet printers.
22
2 INPUT AND OUTPUT DE VICES
Lights/lamps
Lights and lamps can be controlled using a control system
QU E S TION S C that has a light sensor to sense the light level. In a computer-
controlled greenhouse, optimum lighting conditions are
1 Write down the names of five items from the following list
maintained by switching on lights when the natural light level falls
that are used as output devices:
below a certain value. Security lights and outside lighting can be
Temperature sensor Touch screen Speakers controlled to come on when it gets dark and go off when it gets
light again. Some cars also turn lights on and off automatically
Multimedia projector Joystick Web cam
depending on light levels.
Pressure sensor Buzzer Mouse
Graphics tablet Bar code reader Motor
(5 marks) 3 Describe three differences between a laser printer and an
ink-jet printer. (3 marks)
2 Match each output device on the left with the correct use on
the right. 4 Touch screens are both input and output devices.
Output device Use Describe one application where a touch screen is used as an
Multimedia A large monitor used by older output device. (1 mark)
projector computers 5 A home computer user is about to purchase a printer and they
Buzzer Used when checking the depth of have the choice of the following printers:
water in a container Laser printer
Light Used for outputting large posters, Ink-jet printer
maps and plans Dot matrix printer
Wide format printer A thin lightweight monitor a Describe the advantages and disadvantages of each of
Dot matrix printer Used to make presentations to a these types of printer. (6 marks)
large audience b State which printer you think they should buy and give
CRT monitor Used for producing multi-part invoices reasons for your choice. (2 marks)
TFT/LCD monitor Used as an alert on smartphones
(7 marks)
24
2 INPUT AND OUTPUT DE VICES
REVISION QUESTIONS
1 Here is a list of devices that may be attached to a computer system:
LCD monitor keyboard
portable hard drive mouse
touch pad laser printer
flash/pen drive microphone
digital camera speakers
web camera CD ROM drive
a Write down the names of all the output devices in the above list. [3]
b List two other output devices not in the above list. [2]
c Give the name of one input device that is not included in the list above. [1]
2 a Give two uses for each of the following input devices in a personal computer: [6]
i mouse
ii microphone
iii digital camera
b Give the names of four output devices and give one use for each of them. [8]
3 Copy and complete the table below. [10]
25
The following notes summarise this chapter, but they have missing words. Using the words below, copy
out and complete sentences A to O. Each word may be used more than once.
input touch pad keyboard microphone
scanner optical character recognition laser
joysticks output sensors mouse
inkjet digital touch RFID
A Devices used to get data from the outside world into the computer are called _____ devices.
B The most common input device, which comes with all computers, is the _____.
C A _____ is used to move a pointer or cursor around the screen and to make selections when a
desktop computer is used.
D Where space is restricted, such as when a laptop is being used on your knee, a _____ is used
instead of a mouse.
H Special software can be used to recognise the individual letters in a scanned piece of text and this
is called _____.
I Cameras that do not use film and can transfer an image to the computer are called _____
cameras.
J A(n) _____ reader reads the data contained in a chip at a distance and can be used at passport/
border control and also at libraries.
K Quantities such as temperature and pressure can be detected and measured using _____.
M The type of printer that is very fast and uses a toner cartridge is called a _____ printer.
N A cheaper printer, which squirts a jet of ink at the paper, is called a(n) _____ printer.
O _____ screens are sometimes used as an input device for multimedia systems and are popular for
information points to be used by the general public.
26
2 INPUT AND OUTPUT DE VICES
EX AM-ST YLE QU ES T IO NS
1 Ring two items which are output devices. [2] 6 Here is a list of devices used with computer systems:
Blu-ray disk Wide format printer Scanner Pressure sensor
Touch screen
Optical mark reader Multimedia projector Web cam
Wide format printer
2 Draw four lines on the diagram to match the input device
Mouse
to its most appropriate use. [5]
RFID reader
Input device Use Magnetic ink character reader (MICR)
Scanner For recording narration to be Laser printer
used with a presentation Motor
Touch screen For digitizing an old photograph Light
so it can be put on a website Bar code reader
Light sensor
Chip reader For inputting selections when
buying a train ticket a Write down the names of all the devices in the list
which are input devices. [7]
Microphone Reading information on a
b Write down the names of all the devices in the list
credit/debit card
which are output devices. [5]
3 Complete each sentence using one item from the list. [4] c Write down the name of the device in the list most
suited for performing each of the following tasks:
Laser Dot matrix Wide format printers Projectors
Speakers Inkjet Motors Touch screens i Determining whether the liquid in a large vessel is at
the correct level.
a …………………. printers are printers that use continuous ii Printing out a large-scale plan of a house to be used
stationery. by a builder.
b …………………. are used when very large hard copy is iii For scanning goods in quickly at a supermarket checkout.
required. iv For giving the instruction to turn on the lights outside
c ………………… are used with tablets and smartphones a house automatically when it goes dark.
for both input and output. v Used for raising a barrier in an airport car park after
d ………………… printers are used for the printing of high the number plate has been read and matched that
quality photographs. a payment has been made. [5]
4 A payroll office, which prints out large numbers of payslips 7 Identify two devices which are used in control systems
every month, has decided to install a new printer. Discuss to output data. [2]
the advantages and disadvantages of using a laser printer, (Cambridge IGCSE Information and Communication Technology
an inkjet printer or a dot matrix printer in this office. [6] 0417/11 q2 May/June 2014)
(Cambridge IGCSE Information and Communication Technology
0417/13 q20 Oct/Nov 2010)
8 a State what is meant by OMR and OCR. [2]
b Compare and contrast the use of OMR, OCR and a
5 Name the input devices A, B, C and D using the words from keyboard as methods of data entry. [6]
the list.
(Cambridge IGCSE Information and Communication Technology
0417/11 q5 Oct/Nov 2012)
9 Describe two advantages and two disadvantages of wide
format printers. [4]
10 a Explain what is meant by 3D-printing. [2]
b Describe two uses of 3D-printing. [2]
Chip reader Digital camera Joystick
Light pen Microphone Remote control
Scanner Trackerball [4]
(Cambridge IGCSE Information and Communication Technology
0417/13 q1 Oct/Nov 2010)
27
3 Storage devices and media
Backing storage is any storage which is not classed as ROM or
The key concepts covered in this chapter are:
RAM. It is used to hold programs and data. Backing storage devices
Identification of storage devices, their associated media
include magnetic hard disk drives, optical drives (CD or DVD), flash/
and their uses
pen drives, etc. Storage devices are the pieces of equipment which The advantages and disadvantages of the storage
record data onto the storage media (i.e. optical, magnetic, etc.) or devices
read it from the storage media.
In this chapter you will be covering both storage devices and media.
Magnetic tape has a huge storage capacity but is used for only a few
limited applications.
Their size and portability means they are easily stolen. They have extremely large storage capacities and this makes
It makes it easy for employees to copy confidential data such them ideal for backup purposes where all data and programs
as a medical database which is a security risk to companies/ need to be stored.
organisations. They are less expensive compared to similar capacity
Their use with lots of different computers can mean there is a magnetic hard disk drives.
danger of viruses being transferred. The data transfer rate is high (writing to tape).
29
With CD ROM:
Data is read only
Data is stored as an optical pattern
There is a large storage capacity (700 Mb)
They can be used for the distribution of software.
Advantage:
Once written, data cannot be erased, making it useful for the
distribution of software/music or backing up.
Disadvantage:
Data transfer rate and access rate are lower than for a hard disk.
These magnetic tape cartridges are used for daily backups of data.
DVD ROM (digital versatile disk read only memory)
DVD ROM is used for the distribution of movies where you can
Disadvantages of magnetic tape include:
only read the data off the disk. A DVD ROM drive can also be used
They are not suitable for an application that requires fast for reading data off a CD. DVD is mainly used for the distribution
access to data because the access speed is low. of films, computer games and multimedia encyclopaedias.
In order to update details on a tape it is necessary to create
Advantage:
a new tape containing some of the previous details along with
the updated details. High storage capacity means full-length movies can be stored.
CD RW (CD rewriteable)
A CD RW disk allows data to be stored on the disk over and over
Optical disks include CDs and DVDs and are used to store digital data again – just like a hard disk. This is useful if the data stored on
as a binary pattern on the disks. the disk needs to be updated. You can treat a CD RW like a hard
drive but the transfer rate is less and the time taken to locate a
CD ROM (compact disk read only memory) file is greater. The media is not as robust as a hard drive.
CD ROMs are used mainly for the distribution of software and Advantages:
the distribution of music. Although most home computers are
equipped with DVD drives, a lot more computers, especially those Re-writable, so they can be re-used.
used in businesses, still only have CD drives. You can read a CD The data stored can be altered.
using a DVD drive but you cannot read a DVD with a CD drive. This Disadvantages:
is why software is still being sold on CD rather than DVD.
The data transfer rate is lower than for a magnetic hard disk.
Optical drives such as CD RW are more easily damaged than
hard drives.
30
3 STORAGE DE VICES AND MEDIA
31
Backups and the reasons for taking them
A backup is a copy of data and program files kept for security reasons.
Should the originals be destroyed or corrupted then the backups can
be used. Using a file server and storing both programs and data on it
The following notes summarise this chapter, but they have
means that backups can be taken in one place. Backups should be
missing words. Using the words below, copy out and complete
held on removable devices or media that are taken off site each day.
sentences A to G. Each word may be used more than once.
The individual users do not need to take their own backups. The person
in charge of the network (usually the network manager) will take the cartridges immediately DVD
backups needed. Many systems now take backups automatically at backing hard programs backups
a certain time of the day and send the data using the internet to a
A _____ are copies of data and program files kept for
company that specialises in storing backups. Backups should always
security reasons.
be removed off-site. This is in case of fire or if the building is destroyed.
B Backing storage is used for the storage of programs and
data that are not needed _____ by the computer.
Q U E S TIONS A C Flash/pen drives are popular _____ storage media
because they are very small and cheap compared to the
1 Which three of the following are backing storage
alternatives.
devices? (3 marks)
RAM Plotter D Currently they are also used for storing backups of _____
Hard drive Speaker and data in case the originals are damaged or destroyed.
CD RW drive Keyboard E _____ drives consist of a series of disks with a magnetic
ROM Pen drive coating and a series of read/write heads which put the
data onto or record it off each surface.
2 Give the meaning of the following abbreviations.
a DVD R (1 mark) F _____ usually use reels of magnetic tape in a hard
b DVD RW (1 mark) plastic case.
G Optical media include CD and _____ for storing data.
3 Backups of programs and data should be taken
on a regular basis.
a Explain what is meant by a backup. (1 mark)
b Give one reason why backups should be taken REVISION QUESTIONS
on a regular basis. (1 mark)
c Give one example of backing storage suitable 1 a Give two uses for each of the following devices in a
for the taking of backup copies and explain personal computer:
why it is suitable. (3 marks) i Magnetic hard disk drive [2]
ii CD ROM drive [2]
b Give two ways small, high capacity storage devices
Activity 3.1 have influenced the development of portable
Everyone who uses a computer needs to store their data equipment that can be used for work and play. [2]
and programs somewhere.
2 Computers need memory and backing storage.
For this activity you have to find out about the backing a Give one difference between main internal memory
storage devices that are available for computer users. and backing storage. [1]
Use the internet to find out: b Give one example of what would be stored in main
Types of storage devices and their storage capacity. internal memory. [1]
The main advantages and disadvantages of each c Give one example of what would be stored in backing
device. storage. [1]
Type of access. 3 Data needs to be stored for future use. For each of these
Speed of access. storage/media devices, explain a suitable use and explain
The cost of the storage device. clearly why it is suited to the application.
The media they need if applicable. a Memory card [3]
Online computer equipment stores are good places to look b CD ROM [3]
for information. c Magnetic hard disk drive [3]
d Flash/pen drive [3]
32
3 STORAGE DE VICES AND MEDIA
EX AM-ST YLE QU ES T IO NS
1 Ring two items which are storage media. 4 A website designer has the choice of backing their work up
using either a pen drive or a portable hard disk.
Flash memory card Graph plotter Magnetic disc
Give two advantages of using the portable hard disk for
OCR OMR Touch pad [2] backup. [2]
(Cambridge IGCSE Information and Communication Technology 5 Give two advantages of a fixed magnetic hard disc
0417/13 q2 Oct/Nov 2010)
compared to an optical disc to store data. [2]
2 A student wants to transfer work from a computer in school (Cambridge IGCSE Information and Communication Technology
to their home computer. 0417/11 q3 May/June 2014)
They have the choice of using a CD or a pen drive.
Give three reasons why a student would choose a pen drive 6 Draw four lines to match each storage medium to the most
rather than a CD. [3] appropriate use in this list.
Storage medium Use
3 Name the methods of storage A, B, C and D using the
words from the list. Fixed hard disc To transfer files from one computer
A B C D
to another
DVD ROM Batch processing applications
Pen drive To store operating systems
Magnetic tape Publishers distributing
encyclopaedias [4]
(Cambridge IGCSE Information and Communication Technology
0417/11 q6 May/June 2013)
Bar code Chip DVD RAM
7 Optical discs and magnetic tapes are both used to store
Graphics tablet Light pen Magnetic disc
computer data.
Magnetic tape Pen drive [4] Give two uses of optical discs and for each use give a
(Cambridge IGCSE Information and Communication Technology reason why they are preferred to magnetic tapes. [4]
0417/11 q1 May/June 2010) (Cambridge IGCSE Information and Communication Technology
0417/11 q15 May/June 2013)
33
4 Networks and the effects
of using them
Most computers are now connected to networks. For example, in the
home your computer may be able to access the internet, in which case The key concepts covered in this chapter are:
it becomes part of a network. You may have a small network at home, Networks (network devices, types of network, and using
which allows you to access the internet on a desktop computer and different types of computer to access the internet)
a laptop at the same time. Networks provide so many more benefits Network issues and communication (security issues and
compared to stand-alone computers (i.e. computers not connected network communication)
to a network).
Networks
A network is two or more computers that are linked together so
that they are able to share resources. These resources could
be a printer, scanner, software or even a connection to the
internet. You can also share data using a network. For example,
a pupil database in a school could be accessed from any of the
computers connected to the network.
Network devices
To build a network, some or all of the following network devices
This wireless router allows all the computers in the home to share an
are needed.
internet connection.
34
4 NETWORKS AND THE EFFECTS OF USING THEM
Hubs the signal. For a home network, the range of Wi-Fi are typically
A hub is a simple device that does not manage any of the 50m indoors and 100m outdoors.
data traffic through it. It is simply used to enable computers
Advantages of wireless communication:
on the network to share files and hardware such as scanners
and printers. Provided you have a wireless signal, you can work in hotels,
outside, in coffee shops, etc.
Data is transferred through networks in packets. A hub contains
You are not confined to working in the same place. For
multiple ports (connection points). When a packet arrives at one
example, you can work on trains, buses and even some
port, it is transferred to the other ports so that all network devices
aircraft provided there is a signal.
of the LAN can see all packets. Every device on the network will
Fewer/no trailing wires to trip over.
receive the packet of data, which it will inspect to see if it is
It is easier to keep a working area clean if there are not as
intended for that device or not.
many wires in the way.
Switches There are no network wires so there are no costs for their
Like hubs, switches are used to join computers and other devices installation.
together in a network but they work in a more intelligent way Disadvantages of wireless communication:
compared to hubs. Switches are able to inspect packets of data
so that they are forwarded appropriately to the correct computer. The danger of hackers reading messages.
Because a switch sends a packet of data only to the computer There are areas where you cannot get a wireless network.
it is intended for, it reduces the amount of data on the network, There is some evidence that there may be a danger to health.
thus speeding up the network. Limited signal range.
Bridges Bluetooth
Bridges are used to connect LANs together. When one of the LANs Bluetooth is a wireless technology used to exchange data over
sends a message, all the devices on the LAN receive the message. short distances and it makes use of radio waves. The range of
This increases the amount of data flowing on the LAN. Often a large Bluetooth depends on the power of the signal and can typically
LAN is divided into a series of smaller LANs. If a message is sent be from 5m to 100m.
from one computer in a LAN to another computer in a different LAN Here are some uses for Bluetooth:
then the message needs to pass between the LANs using a bridge.
The advantage in subdividing a larger network is that it reduces Wireless communication between input and output devices.
the total network traffic as only traffic with a different LAN as its If you have a wireless keyboard and mouse then they could
destination will cross over the bridge. A bridge therefore usually has use Bluetooth. Printers can be controlled wirelessly from a
only two ports in order to connect one LAN to another LAN. computer using Bluetooth.
Communication between a wireless hands-free headset and
Modems a mobile phone. These are the sort people can use while they
Modems have been largely replaced by routers for providing are driving.
access to the internet as the routers are much faster. A Creating a small wireless network where the computers/
modem converts the data from the computer (digital data) devices are near to each other and where the small
into sound (analogue data) that can be sent along ordinary bandwidth is not a problem. For example, creating a small
telephone lines. Once the data arrives at the other end of the home wireless network.
line, the sound will need to be converted back to digital data Transferring appointments, contacts, etc., between a computer
using another modem before it can be understood by the and a mobile device such as mobile phone or tablet.
receiving computer. Communication using a games controller. Many games
consoles use Bluetooth.
The use of Wi-Fi and Bluetooth in networks
There are two main technologies that allow wireless communication
between computers and other devices.
Wi-Fi
Wi-Fi enables computers and other devices to communicate
wirelessly with each other. Areas where the internet can be
accessed wirelessly using Wi-Fi are called access points or
hotspots and they can be found in many public places, such as
coffee bars, hotels, airports, etc.
The range of a Wi-Fi depends on the type of wireless router being
used and also if there are obstacles such as walls in the way of
Bluetooth is used with hands-free headsets.
35
Setting up and configuring Access to online shopping
Access to news, sport, weather, financial pages, etc.
a small network
To set up and configure a small network is easy. Here are the When you establish a network connection with an ISP and pay
steps you generally need to take. their subscription charge they generally supply you with a wireless
router. This will enable you to link devices wirelessly, thus forming
1 Choose an Internet Service Provider (ISP), pay them a a network that will allow users to:
subscription charge and get a router, often provided by the
ISP (which might include wireless access point). Share internet access
Share access to hardware devices such as printers and
2 Connect the router to the telephone line or cable point. scanners
(In some countries, this is connection to a satellite link.) Share access to files held on different computers.
3 Connect any cabled devices to the router using wires At the back of the router you will see some sockets into which
between the ports on the router and the Network Interface Ethernet cables can be connected. You can connect part of your
Card on the device. network to the router using cables rather than wirelessly.
4 Connect any wireless devices - e.g laptops, tablets, printers
using wireless network. You will need to open settings in your
operating system on each device to create a new connection.
You usually need the passcode given to you by the ISP to
do this.
5 You will need a browser on each device to access the internet.
Here is some more detail on some of the essential parts of a
network.
36
4 NETWORKS AND THE EFFECTS OF USING THEM
The disadvantages of the internet: Many of these websites allow customers to browse online
catalogues and add goods to their virtual shopping basket just
Misinformation – there are many bogus or fake sites so you
like in a real store. When they have selected the goods, they go
need to check the information you obtain carefully or use
to the checkout where they decide on the payment method. They
only reliable sites.
also have to enter some details such as their name and address
Cyber crime – we have to be extremely careful about revealing
and other contact details. The payment is authorised and the
personal information such as bank and credit card details.
ordering process is completed. All that is left is for the customer
Addiction to gambling, as there are many casino, bingo,
to wait for delivery of their goods.
horse racing, etc., betting sites.
Increased problems due to hacking and viruses.
Paedophiles look for children using the internet. The difference between internet and WWW
There is a difference between the internet and the world wide web
(WWW). The internet is the huge network of networks. It connects
E-commerce
millions of computers globally and allows them to communicate
Most organisations use websites sometimes for promotional
with each other. The world wide web is the way of accessing the
purposes and sometimes to allow people to order goods or
information on all these networked computers and makes use of
services using the site. This is called e-commerce.
web pages and web browsers to store and access the information.
QU E S TIONS A
Intranets
1 Give the name of the device that is used so that several An intranet is a private network that is used inside an organisation
computers in a home can all share a single internet and makes use of web pages, browsers and other technology just
connection. (1 mark) like the internet. Schools and colleges use intranets and they can
hold all sorts of information from teaching resources, information
2 Explain the main difference between the network devices about courses and adverts, to student personal records and
hub and switch. (2 marks) attendance details. Parts of an intranet can be made available
3 Bluetooth is a method that allows devices to to anyone in the organisation, while parts that contain personal
communicate with each other and pass data. details can be made available only to certain people. Restriction
a Give the names of two pairs of devices that can to certain parts of the intranet is achieved by using user-IDs
communicate using Bluetooth. (2 marks) and passwords.
b Explain one advantage in devices communicating
using Bluetooth. (1 mark) The differences between an intranet and
c Explain one disadvantage in devices communicating the internet
using Bluetooth. (1 mark) Internet stands for INTERnational NETwork, whereas intranet
stands for INTernal Restricted Access NETwork.
4 An office is thinking of introducing a wireless network with An intranet contains only information concerning a particular
a wireless connection to the internet. organisation that has set it up, whereas the internet contains
Give two advantages in using a wireless network rather information about everything.
than a wired one. (2 marks) Intranets are usually only used by the employees of a particular
organisation, whereas the internet can be used by anyone.
5 A small office uses a local area network.
With an intranet, you can block sites which are outside the
The telecommunications company supplies them with
internal network using a proxy server.
a cable into the building. They would like to set up a
Intranets are usually behind a firewall, which prevents them
wireless network.
from being accessed by hackers.
a Give one reason they would like their network to be
An intranet can be accessed from anywhere with correct
wireless. (1 mark)
authentication.
b A wireless router is bought. Give the purpose of a
wireless router. (1 mark) The advantages in using an intranet:
6 A company has a wireless network installed. Give one Intranets are ideal in schools because they can be used to
reason why they might be concerned about the security of prevent students from accessing unwanted information.
their data. (1 mark) The internal email system is more secure compared to
sending emails using the internet.
Only information that is relevant to the organisation can be
accessed and this prevents employees accessing sites that
are inappropriate or which will cause them to waste time.
37
The two types of network LAN and WAN Advantages and disadvantages of a WLAN compared
to a cabled LAN
There are two types of network: a local area network (LAN) and a
A cabled LAN uses either wired cables or optical fibre cables to
wide area network (WAN).
send and receive data over the network. A WLAN provides links
Basically a WAN is much bigger than a LAN and is spread over that are wireless between computers and other devices on the
different sites. A LAN, however, is within one site or building. This network such as printers and scanners.
table gives you the main features of each type of network.
Advantages of a WLAN:
LAN WAN
It is cheaper as there is less cabling needed.
Confined to a small area Covers a wide geographical area It is very easy to link devices such as printers and scanners to
(e.g. between cities, countries
the network.
and even continents)
You can work anywhere in the building in range of the wireless
Usually located in a single In lots of different buildings and
signal.
building cities, countries, etc.
Uses cable, wireless, infra-red Uses more expensive Disadvantages of a WLAN:
and microwave links which are telecommunication links that are
There may be areas in a building where the radio signal is too weak.
usually owned by the organisation supplied by telecommunication
There are security problems as the radio signals could be
companies (e.g. satellite links)
intercepted by hackers.
Less expensive to build as More expensive to build as
Wireless signals are not as reliable as wired cables and the
equipment is owned by the sophisticated communication
organisation which is cheaper systems are used involving rental
data transfer speeds are not as high.
than renting lines and equipment of communication lines There can be interference from other electrical and electronic
equipment used in the same building and this can disrupt the
wireless signal.
38
4 NETWORKS AND THE EFFECTS OF USING THEM
Advantages and disadvantages of using a laptop to access the Security issues regarding data transfer
internet Once computers are networked together the security risks
Advantages Disadvantages increase and if the network is connected to the internet, the
Portable compared to a desktop Not as portable as a smartphone security risks are even greater. In this section we will look at the
computer. or tablet because of its size and security issues of networks.
weight.
Here are some of the ways security of a network can be breached.
Almost full-sized keyboard is Screen and keyboard are
easier to use compared to those attached and this can lead to Password interception
on a tablet or smartphone. backache. Here a person’s password, which should be kept secret to them,
Fairly large screen makes reading Touchpads are harder to use becomes known to others. This means that other people can now
web pages easier. compared to a mouse when there sign in using their password and gain access to their files. When
is no flat surface available. using the internet you can have lots of different passwords such
Can be used when a flat surface as those for your email, bank accounts, stores, etc. If people know
is not available. these passwords then they could read your emails, remove money
from your bank account and purchase items using your details.
Advantages and disadvantages of using a desktop computer to
access the internet Virus attack
Advantages Disadvantages Viruses pose a major threat to networks. A virus is a program that
Full-sized keyboard and mouse are Large and heavy so not portable. replicates (copies) itself automatically and may cause damage.
easier to use. Once a computer or media has a virus copied onto it, it is said to be
You can view the full versions of a Hard to use whilst standing up. infected. Most viruses are designed to do something apart from copying
website rather than a trimmed down themselves. For example, they can:
version for a tablet or smartphone.
Display annoying messages on the screen
Screen and keyboard are adjustable
so there are fewer health problems. Delete programs or data
Use up resources, making your computer run more slowly
Large screen means text is easier
to read. Spy on your online use – for example, they can collect usernames,
passwords, and card numbers used to make online purchases.
One of the main problems is that viruses are being created all the
Q U E S TIONS B time and that when you get a virus infection it is not always clear
what a new virus will do to the network. One of the problems with
1 Give two benefits of using a local area network. (2 marks) viruses is the amount of time that needs to be spent sorting out
the problems that they create. All computers should be equipped
2 Give one difference between a local area network
with anti-virus software, which is a program that is able to detect
(LAN) and a wide area network (WAN). (1 mark)
and delete these viruses. This should be updated regularly, as new
3 Describe two advantages and two disadvantages viruses are continually being developed and would not always be
in a company using a computer network. (4 marks) detected by older versions.
4 Explain the difference between the terms internet
and intranet. (2 marks) How to prevent viruses
The best way to avoid viruses altogether is to use anti-virus
5 Describe what is meant by web browser software. (2 marks)
software and adopt procedures which will make virus infection
6 A school is currently thinking of replacing their less likely.
wired LAN with a WLAN.
a Explain the differences between a wired LAN and Here are some steps which can be taken to prevent viruses
a WLAN. (1 mark) entering a network:
b Give two advantages and two disadvantages Install anti-virus software.
of using a WLAN. (4 marks) Do not open emails from unknown sources.
Keep anti-virus software up-to-date. Configure the virus
checking software so that updates are installed automatically.
Network issues and communication Have a clear acceptable use policy for all staff who use
computers.
In this section you will be looking at some of the problems
Train staff to be aware of the problems and what they can do
associated with the use of networks. You will also be looking at
to help.
the different types of network that allow communication to take
Do not allow programs such as games, video or movies to be
place between people in different locations.
downloaded onto the organisation’s ICT systems.
39
Do not open file attachments to emails unless they are from a
trusted source.
If possible, avoid users being able to use their own removable
media (pen drives, portable hard disk drives).
Unknown storage media (e.g. media containing a game or music
files someone has given you) should always be scanned by anti-
virus software before using. To be sure, it is best not to use:
A popular way of buying software is to download it from the
internet. You must make sure that you are downloading the
software from a trusted site as counterfeit software may
contain viruses.
If your browser or other software alerts you that a site is not
trusted, then do not visit it as these sites may be a source of
viruses.
How to recognise fake/bogus websites Sometimes special software is installed on a user’s computer
Fake/bogus websites can be used to distribute viruses and some without their permission and it can log the keys that the user
can con you to pay for goods that never arrive or they steal your presses, which can tell a hacker about usernames, passwords,
personal details to use fraudulently. Fake/bogus sites are set up emails, etc. This software is called spyware or key-logging software.
to deceive you and in many cases they look convincing. Here are
Use a firewall – a firewall is hardware, software or both that will
a few of the things you should look for when deciding if it is a
look at the data being sent or received by the computer to either
fake/bogus site:
allow it through or block it. It logs the outgoing data leaving the
Fake/bogus sites are often incomplete which means not all network and incoming data from the internet. It therefore prevents
the links work so check some of the links. access to the network from unknown IP addresses and it can
Check the URL (i.e. web address). Check to see if the website prevent users from accessing unauthorised sites. It also warns
has the address you would expect. a user if software is trying to run a program on the computer
Check for mistakes in spelling/grammar. Not as much without the user’s permission.
checking is done on fake/bogus sites so they frequently
Use anti-spyware – this is special software that you run on your
contain these errors.
computer which will detect and remove any spyware programs that
Check for the padlock symbol and the web address starting
have been put on your computer without your knowledge with the
with https:// security indicators - Before entering personal
purpose of collecting passwords and other personal information.
information, check that the browser software is showing the
padlock symbol next to the web address and that the web Change passwords regularly – if someone does manage to obtain
address starts with https://. If these security indicators your passwords, if they are changed on a regular basis at least
are not present then there is no guarantee of security or they will only have the use of your passwords for a short while.
encryption of your personal detail. Bogus/fake sites are
unlikely to use these security indicators. Protecting access by using user-IDs/usernames
and passwords
Hackers accessing the network System security is making sure that only authorised people
Hacking is the process of accessing a computer system without access a computer system. This is called user authentication and
permission. Hackers often access a network using the internet. it is normally carried out using a system of user identification
In most cases the hacker will try to guess the user’s password or (i.e. user-IDs) and passwords. Most computer operating systems
obtain the password another way; for example, by using a cracking provide systems of user-IDs and passwords.
program which will generate millions of different passwords very
quickly trying each of them in turn. Identifying the user to the system: user-IDs
A user-ID is a name or number that is used to identify a certain
user to the network. The person who looks after the network will
use this to allocate space on the network for the user. It is also
used by the network to give the user access to certain files.
40
4 NETWORKS AND THE EFFECTS OF USING THEM
The network manager can also keep track of what files the user unique pattern on the back of the eye to recognise a person
is using for security reasons. Network managers can also track and fingerprint scanning uses the unique pattern on a person’s
improper use of the internet using user-IDs. finger to identify them. Face recognition can be used to match
someone trying to log onto the network with those people who
Preventing unauthorised access to the system: the use of passwords are allowed access.
A password is a string of characters (letters, numbers, and
punctuation marks and other symbols) that the user can select. Iris scanning is another biometric method used for authentication
Only the user will know what the password is. When the user and it uses the coloured area of the eye surrounding the pupil for
enters the password, it will not be shown on the screen. Usually identification. It has the advantage over retinal scanning in that
an asterisk is shown when you enter a character. Only on entry it can be carried out using regular video cameras and can be
of the correct password will the user be allowed access to the performed as far as two feet away and also on people who are
network. Some networks are set up so that if someone attempts wearing glasses.
to enter a password and gets it wrong three times, the user Biometric methods have the main advantage in that there is
account is locked. If this happens, the user should contact the nothing to forget such as a card or a code.
network administrator to have the password reset, which may
involve answering security questions. ID cards
Choosing a password – the differences between strong and ID cards are small credit card sized cards used to verify a
person’s identity. The cards have some information printed on the
weak passwords
card as well as information coded into either a magnetic stripe
There are programs available that are able to crack passwords
or a chip embedded in the card which enables the data on the
and if a password is short and contains just letters, then the
card to be read automatically. Typically the ID card would contain
password is weak and it is very easy to crack. Many people use
a photograph of the person, a unique identification number, their
weak passwords because they find them easy to remember.
date of birth, address, religion, profession etc.
Here are some examples of weak passwords: Some ID cards contain biometric data such as fingerprints and
mypassword retinal patterns and this data is encoded onto a chip in the
card. ID cards are used to gain access to buildings, rooms and
Ahmed
computers/networks.
Steve1234
Authentication methods used with passports are covered on
A strong password doesn’t need to be long provided it contains page 18.
symbols, capitals, numbers, and letters. Although strong
passwords are not impossible to crack, most hackers would
quickly move on to a different computer system where a weak
password had been used.
A strong password should be a combination of letters (capital and
lowercase), numbers, and symbols that have no relation to each
other, just totally random such as 4Hp!9$R;
Here are some examples of strong passwords:
S%7c&X
£D23&!uL
Authentication techniques
As weak passwords can be easily cracked, and strong passwords
are hard to remember, there needs to be an easier way to allow
users access to networks.
Many networks use magnetic stripe cards or other ID cards
containing chips which are used to gain access to the network.
These are still used in conjunction with passwords and usernames
since the card or ID card could have been stolen.
Biometric scanning systems can be used rather than usernames
and passwords to allow access. Retinal scanning uses the Face recognition can be used to authenticate users of a networks
41
Encryption Data that is more personal than name and address. For example,
If information needs to be sent over the internet or another medical records, criminal record, credit history, religious or
network and it needs to be kept secure, then encryption should political beliefs, etc., are all classed as personal data.
be used. Encryption scrambles the data while it is being sent
and only the true recipient is able to unscramble it. Should the KEY WORD
data be intercepted by a hacker, then the data will be totally Personal data data about a living identifiable person
meaningless. which is specific to that person and is more personal than
The process of scrambling data, sending it over the internet and just your name and address.
then deciphering it when it reaches the true recipient, is called
encryption. This requires encryption and decryption keys.
The effects of wrong personal data
Encryption should be used for: Examples of the effect of wrong information:
Sending credit card details such as credit card numbers, Your medical details could be wrong, meaning you get the
expiry dates, etc., over the internet. wrong treatment – which could be life threatening.
Online banking. Wrong decisions might be made; for example, you could be
Sending payment details (bank details such as sort-code refused a loan.
numbers, account numbers, etc.). Wrong exam results could affect you getting a job.
Confidential emails.
Sending data between computers when confidentiality is Rights of the data subject and the holder
essential. The person about whom the personal details are held is called
the data subject.
KEY WORDS
The person in the organisation who is responsible for the personal
Encryption the process of scrambling files before they data held is called the data holder.
are sent over a network to protect them from hackers. Also
the process of scrambling files stored on a computer so A data protection act is a law that protects individuals by placing
that if the computer is stolen, they cannot be understood. obligations on the organisations who collect and process the data
Firewall a piece of software, hardware or both that is able (i.e. the data holders) in the following ways:
to protect a network from hackers. The firewall looks at Registration (also called notification)—It requires anyone who
each item of data to see if it should be allowed access to uses personal data to register with the person who is in charge
the network or blocked. of the act/law. They must say what data they intend to hold and
Password a series of characters chosen by the user, used what they intend to do with it.
to check the identity of the user when they require access
to an ICT system. Individuals can see their own personal data—Anyone can apply to
see the personal data held about them. Organisations have to show
it and if there is any wrong information, then it must be corrected.
There are some exemptions where you would be unable to see the
The principles of a typical data information held about you. For example, you could be a criminal and
protection act apply to see the information the police have about you.
The widespread use of ICT has made the processing and transfer Data must be kept secure and up-to-date—Data subjects (the
of data much easier and to protect the individual against the people the data is about) could take to court an organisation that
misuse of data, many countries have introduced a law called a does not keep their personal data secure.
data protection act.
The right for a person to claim compensation—If data is
There are a number of problems in organisations holding personal data: processed unlawfully by an organisation then the person could
The personal data might be wrong, which means wrong take them to court and claim compensation.
decisions could be made.
The organisation may not take care of the personal data it
Data protection principles
All data protection acts are different but a typical act would
holds so others may find out about it.
contain the following principles.
What exactly is personal data? 1 Personal data shall be processed fairly and lawfully.
Personal data in a data protection act normally means: 2 Personal data shall be obtained only for one or more
Data about an identifiable person (i.e. the data must be about specified and lawful purposes, and shall not be further
someone who can be identified by name, address, etc.). processed in any manner incompatible with that purpose or
Data about someone who is living. those purposes.
42
4 NETWORKS AND THE EFFECTS OF USING THEM
Q U E S TIONS C
Network communication
1 Say whether each of the following statements is true or false: In this section we will be looking in detail at the different ICT
a Passwords should be changed regularly to make it methods that can be used to enable communication between
difficult for hackers to gain access to a computer system. different people in different locations.
b You should always write your password down in case
Physical fax
you forget it.
A physical fax consists of a single unit containing a scanner,
c Passwords should ideally contain numbers, symbols
modem, and printer. The document being faxed is scanned and
and a combination of upper and lower case letters.
then the modem converts the data from the scan into a series
d Passwords are best if they do not contain a word or
of sounds that are sent along a telephone line. To send the fax
phrase.
you need enter the number of the fax machine at the receiving
e A password and user-ID are different words for the
end of the line. The modem at the receiving end converts
same thing.
the sounds back into data and the printer prints the fax out.
f Key-logging software is a type of spyware used
When using a physical fax, only one fax can be sent or received at
by hackers to collect your passwords. (6 marks)
the same time.
2 Explain, by giving examples, the differences between
a strong password and a weak password. (4 marks) Electronic/internet faxing
Electronic/internet faxing uses internet technology rather than
3 Some people are not happy about organisations storing
a phone network to send a fax and it is not necessary for each
and processing personal information about them.
fax to be printed. All you need to send or receive the fax is a
a Explain, by giving two examples, what is
computer or mobile device that has access to the internet.
meant by personal information. (3 marks)
b Give one reason why a person might object to Differences between electronic faxing and physical faxing
an organisation storing personal information Electronic faxing requires the use of a computer network
about them. (2 marks) whereas physical faxing does not.
No additional phone line needed for electronic faxing.
4 All schools use computer systems to store details about
All physical faxes are printed; with electronic faxes, you
past and present pupils.
choose to print or not, thus saving ink and paper.
Schools are required to notify their use of the You do not have the cost of purchasing a physical fax machine.
personal data they hold under the terms of a data Faxes can be sent and received from mobile devices.
protection act. More than one fax can be sent and received at the same time.
a Give three items of personal information the You do not have to pay for the cost of a phone call to send a fax.
school is likely to store about their pupils. (3 marks)
43
Email Meetings can be called at very short notice without too much
An email is an electronic message sent from one communication planning.
device (computer, telephone, mobile phone, or tablet) to another. More environmentally friendly as there are fewer people
Documents and images in electronic form can be attached to an travelling to meetings. This cuts down on carbon dioxide
email. All web browser software has email facilities. emissions.
Fewer car journeys means fewer traffic jams and hence less
Advantages and disadvantages of using email compared to faxing stress and pollution.
Advantages in using email:
Disadvantages:
Emails can be viewed without others seeing them. Faxes are
The initial cost of the equipment, as specialist video-
usually printed out in an area shared by other employees so
conferencing equipment is expensive.
they can be seen by others.
Poor image and sound quality.
Emails can be viewed on any portable device (computer,
People can feel very self-conscious when using video-
smartphone, etc.) that has internet access. Physical faxes can
conferencing and not communicate effectively.
only be obtained using a fax machine.
Although documents and diagrams in digital form can be
The information in fax form is not normally a computer file
passed around, an actual product or component cannot be
and cannot be edited by the receiver.
passed around.
The receiver’s fax machine may be out of paper and this will
Lack of face-to-face contact may mean a discussion may not
prevent the fax from being received. With emails this problem
be as effective.
does not arise.
If the delegates are in distant locations, the picture can
Cheaper to use email. Sending a physical fax means you have
be out of synchronisation with the speech, which can be
to pay for the cost of the phone call as well as the cost of the
distracting.
paper and ink.
Disadvantages in using email:
Emails can be used to distribute viruses. Faxing does not
spread viruses.
Faxed signed documents are usually legally acceptable
whereas emails are not.
Video-conferencing
Video-conferencing allows two or more individuals situated in
different places to talk to each other in real time and see each other
at the same time. They are also able to exchange electronic files
with each other and pass electronic documents around rather than
paper documents. It allows people to conduct ‘virtual’ meetings. If
meetings need to be conducted between people in different sites or
even countries, then a WAN is used such as the internet.
Video-conferencing allows virtual meetings where delegates are not at
Desktop video-conferencing systems in addition to a PC include a the same location
video compression card, a sound card, a microphone, a web cam,
and specialist software. Web-conferencing
Web-conferencing (sometimes called a webinar) uses a stable
Advantages of and disadvantages using video-conferencing internet connection and remote computers with microphones and
Advantages: webcams to allow real-time conferencing to take place. Usually
there will be one host and many participants so it can be used for
Less stress as employees do not have to experience delays at training events, meetings, lectures and presentations. To take part
airports, accidents, road works, etc. in a web-conference either web-conferencing software needs to be
Improved family life, as less time spent away from home downloaded on all the computers used or everyone involved has
staying in hotels. to visit a web-conferencing website. During web-conferencing, the
Saves travelling time. host can decide who is allowed to speak and the participants can
Saves money as business does not have to spend money on indicate to the host (usually using a small flag on the host’s screen)
travelling expenses, hotel rooms, meals, etc. that they wish to speak.
Improved productivity of employees, as they are not wasting
time travelling.
44
4 NETWORKS AND THE EFFECTS OF USING THEM
5 a Explain what is meant by the term Bluetooth. [1] (Cambridge IGCSE Information and Communication Technology
b Name three devices that could be linked to a 0417/11 q13 May/June 2014)
computer using Bluetooth. [3] 10 Describe the benefits and drawbacks to companies of
6 Companies with offices all over the world use video- using video-conferencing. [5]
conferencing rather than face-to-face meetings. (Cambridge IGCSE Information and Communication Technology
a Tick three advantages of video-conferencing. 0417/11 q10 Oct/Nov 2012)
47
5 The effects of using IT
In this chapter you will learn about some of the many effects that
the use of IT has on our lives. Most of these impacts are for the good The key concepts covered in this chapter are:
but there are some bad ones, too. You will be looking at the way IT Effects of IT on employment
has changed employment and the way that we work. You will look Effects of IT on working patterns within organisations
at the impact that using microprocessor-controlled devices in the Microprocessor-controlled devices in the home
home has on our lives. You will also be looking at some of the health Potential health problems related to the prolonged use
of IT equipment
problems which can develop with the prolonged use of IT equipment.
Effects of IT on employment Numbers of people who work in shops have reduced because
of an increased number of people shopping online. Online
Many businesses now operate 24 hours per day and 7 days a week,
stores are heavily automated (e.g. many use robots to select
so people need to be more flexible in their hours of work. They will
goods and pack them) and employ fewer staff.
no longer spend their whole life doing the same job, so constant
Call centre automated response.
retraining will be needed so that they can take advantage of new
Designing and producing CDs/DVDs. Music, games, and
IT developments. Many organisations operate internationally and
software are more likely to be downloaded rather than bought
some jobs may be transferred abroad if the wage costs are lower in
on physical media such as a CD. This eliminates the need for
another country. Location is no longer an issue with IT as data can
packaging.
be accessed from anywhere in the world.
Fewer payroll workers needed. Working out pay and
Here are the main effects of IT on employment: deductions is performed by computers using data from
clocking on/clocking off machines which record the days
Fewer people needed to complete the same amount of work.
and hours worked. As many organisations pay wages
Increased number of people working from home using IT
directly into employee bank accounts using electronic
equipment.
transfer, there is no longer a need to prepare wage
More automation in factories due to the introduction of robots
packets.
for assembling products, welding, paint spraying, and packing
Typists are no longer needed. In the past, large numbers of
goods.
people were employed as typists who typed documents. Now it
Continual need for training as IT systems change.
is so easy to use a word-processor that most employees type
More availability of part-time work as many organisations
their own documents.
need to be staffed 24/7.
More variation in the tasks undertaken and staff need to be
flexible and well trained to cope with this.
Fewer ‘real’ meetings as ‘virtual’ meetings using video-
conferencing are used to reduce travel time and travel costs.
Increase in the number of technical staff needed such as
network managers.
48
5 THE EFFECTS OF USING IT
49
KEY WORD Disabled or elderly people who are confined to their home
can make friends with others.
Microprocessor the brain of the computer consisting It is much easier to find out about social activities, e.g.
of millions of tiny circuits on a silicon chip. It carries out classes, concerts, activities, etc., using the internet.
program instructions. Time spent not having to do jobs manually enables the time
to be used to do other things.
The effects of microprocessor-controlled devices There are a number of disadvantages and these include:
on leisure time
People rely on the internet for performing their daily
Many microprocessor-controlled devices save us time and
tasks (shopping, banking, entertainment, etc.) and
allow us to have more leisure time. For example, dishwashers
this means they do not meet people, which can lead to
can wash the dishes for us while we go out or watch a game
social isolation.
of football.
Playing computer games is unhealthy compared to playing
Here are some ways in which microprocessor-controlled devices proper physical games and can be isolating.
affect leisure time: People can lose some basic housekeeping skills so when the
machine breaks down they do not know what to do.
Mobile phones, laptops, netbooks, tablets, etc., mean
employees can do more work on the move and at home, which
can mean that they have less time for family life.
The effect of microprocessors on the need to leave
Electrical appliances controlled by microprocessors can the home
complete tasks such as washing and drying clothes, washing There are many ways in which microprocessor-controlled
dishes, and cooking meals, which can leave a person free to devices help people perform tasks from home. This may be a
do other things. convenience for many but it can mean the difference between
People can become lazy and rely on machines. having or not having your independence if you are disabled and
Lack of fitness as people are not spending time doing housebound.
manual work. Here are some of the ways the use of microprocessor-controlled
Can use the extra time saved to go to the gym or exercise more. devices reduces the need to leave the home:
Many people spend their leisure time playing games, surfing
the net, downloading and listening to music, etc., on computers Online shopping – means you order goods using the internet
and games consoles, which all make use of microprocessors. and have them delivered to your home.
Watching programmes on TV using satellite or cable TV makes Downloads – items such as software, music, games,
use of microprocessors. ring tones, videos can be downloaded onto your computer,
You don’t have to be in when washing is being done so you phone or tablet using the internet. There is no need to go to
spend time at work or doing other things. the shops for these.
Online banking – you can view statements, transfer money
between accounts, pay bills, apply for loans, etc., all from the
The effects of microprocessors on social
comfort of your home.
interactions Research – many people need to find out information in
The use of microprocessor-controlled IT equipment such as
their daily lives such as train times, opening times of shops,
computers and mobile phones has led to a huge increase in the
reviews of products, etc. All this can be done from home using
number of ways we can keep in touch with friends and family.
the internet.
Social interaction is important for a person’s well-being and there
Entertainment – there are so many ways to entertain your-
are a number of ways that microprocessor-controlled devices help
self using social networking sites, playing games, listening to
and here are some of them:
music, watching videos, etc. All of these are possible using
Mobile phones, SMS (texting), email, blogs, social networking microprocessor-controlled devices.
sites, chat rooms, and instant messaging make it much easier Working from home (called teleworking or telecommuting) by
to keep in touch with friends and family. making use of computers and telecommunication devices and
It is easy to make new friends in chat rooms and using social systems.
networking sites. No need to be present to supervise devices like ovens or
Cheap internet phone calls, made using a service called VoIP, washing machines.
enable people to keep in contact with friends and family who Can set TV recording or set oven from a remote place using
may live in other countries. embedded technology and mobile phones.
50
5 THE EFFECTS OF USING IT
(5 marks)
3 Describe the advantages and drawbacks of using
microprocessor-controlled devices in the home. (5 marks)
51
Position the mouse so that it can be used keeping the wrist
straight. Q UESTI O N S C
Learn how to type properly – two finger typing has been found
to be much worse for RSI. 1 The use of IT systems has been associated with a number
Use alternative input methods, e.g. speech recognition. of health problems.
a State three health problems that have been
KEY WORD associated with the prolonged use of IT
systems. (3 marks)
RSI (repetitive strain injury) a painful condition caused b In order to prevent health problems caused
by repeatedly using certain muscles in the same way for by the use of computers, some actions can be
long periods without a break. The condition usually affects taken. Describe six such actions that can be
wrists and/or fingers. taken to avoid the health problems you
have identified in part a happening. (6 marks)
Eye strain/headaches 2 An employee who spends much of their time at a
The following can cause eye strain/headaches: keyboard typing in orders at high speed is worried
Looking at the screen for long periods. about RSI.
Working without the best lighting conditions. a What do the initials RSI stand for? (1 mark)
Glare on the screen/screen flicker. b Give one of the symptoms of RSI. (1 mark)
Dirt on the screen. c Write down two precautions that the employee
can take to minimise the chance of
To help avoid eye strain/headaches: contracting RSI. (2 marks)
Take regular breaks (e.g. every hour) 3 Copy the table and tick (✓) the correct column to
Keep the screen clean, so it is easy to see characters on show whether each of the following statements
the screen. about health risks in using IT is true or false. (5 marks)
Use appropriate lighting (fluorescent tubes with diffusers). TRUE FALSE
Use blinds to avoid glare.
Give your eyes a rest by focusing on distant objects. True False
Have regular eye-tests (Note: if you use a screen in your work, The continual use of keyboards over a long £ £
then your employer may be required by law to pay for regular period can give rise to aches and pains in
eye-tests, and glasses if they are needed). the hands, arms and wrists
Ensure that the screen does not flicker. RSI stands for repeated stress injury £ £
Change to an LCD screen if you have an old CRT monitor. Wrist rests and ergonomic keyboards can £ £
help prevent RSI
Back ache can be caused by slouching in £ £
Revision Tip
your chair when using a computer
Always be guided by the mark scheme to decide how Glare on the screen can cause RSI £ £
much to write. For example, if you are asked to describe an
advantage or disadvantage for one mark, then just a brief
statement would be enough. If two marks were allocated,
Activity 5.1
then you would be required to supplement this with
further detail or an appropriate example. Repetitive strain injury has become a major worry for
those people who use computers continually throughout
Always think out your answer before you start writing it.
their working day.
You need to ensure you make your answer clear, so you
need a little time to think about it. You are required to use the internet to find out more about
this condition. You need to find out:
Advantages (sometimes called benefits) and
disadvantages are very popular questions. When covering What are the symptoms?
a topic for revision, it is a good idea to list advantages and Can you make it better?
disadvantages where appropriate. What is the likelihood of getting it?
What can you do to prevent it?
You need to be clear about the health problems (i.e. what
they are called), the symptoms (i.e. how they affect your
body) and what can be done to help to prevent them.
52
5 THE EFFECTS OF USING IT
REVISION QUESTIONS
1 Describe one way in which IT is used in
The following notes summarise this chapter, but they have manufacturing in order to reduce the number
missing words. Using the words below, copy out and complete of people needed to produce goods. [3]
sentences A to M. Each word may be used more than once. 2 There have been a lot of changes in the pattern of
payroll eye-tests part-time car website employment due to the increased use of IT.
back ache typing delivery working headaches Tick three boxes that give sensible reasons why
the pattern of employment has changed with
programming vacuuming RSI health
increased use of IT. [3]
blinds leisure
Tick three
A Robots have replaced many repetitive assembly jobs in boxes only
manufacturing industries such as _____ assembly, where Homeworking/teleworking is more popular £
robots weld panels and paint panels.
Employees are more likely to work more £
B Office jobs have been replaced by computers particularly in flexibly
the areas of _____ documents and preparing _____. It has brought about a huge rise in £
C The use of IT has created some new and interesting jobs in employment especially among factory workers
areas such as _____ and _____ design. Training and retraining are needed regularly £
D The increase in shopping online has meant an increase in Workers are generally less skilled than they £
employment for _____ drivers. were 20 years ago
E IT has also changed _____ patterns. There is more
opportunity for _____ working which has benefitted people
with commitments, such as looking after children or elderly
relatives.
Important
Exam words note
F Microprocessor-controlled devices in the home have freed Here are some of the words you will see being used in
up more _____ time. questions and what they mean:
G You no longer need to be in the home when _____ floors State/List – single words or phrases are usually enough.
as you can buy a robot to perform this task. Describe – needs a more in-depth answer to show
H The use of IT can lead to a number of _____ problems understanding.
such as back ache, eye strain, and headaches. It is important to be able to distinguish between health and
I The symptoms of eye strain include blurred vision and safety issues.
_____. Health (person) – RSI, headaches, eye strain and backache.
J Working in cramped conditions and not adopting the Safety (incidents) – fire, electrocution, tripping, etc.
correct posture when using a computer can lead to _____.
K _____ is caused by typing at high speed or using a mouse
over a long period.
L Adjustable _____ should be used on windows to prevent
glare on the screen, and the screen should also be kept
free from glare from lights.
M It is important to have regular _____ and use glasses or
contact lenses when working with computers, if needed.
53
EX AM -ST YL E Q UE ST I ON S 4 There are a number of health hazards associated with the
use of computers.
1 a What do the initials RSI stand for? [1] a Give the names of three health hazards
b RSI is a health problem that may be caused by outlining the health problems they create. [6]
prolonged computer use. b For each of the health hazards described in
Write a sentence to show how RSI is caused. [2] part (a) describe what a user can do to help
c Write down one precaution that a computer reduce the risk of their occurrence. [3]
user can take to minimize the chance of
contracting RSI. [1] 5 Describe two ways in which the working patterns
within organisations have changed owing to the
2 Here is a list of health problems. Write down the names of the increased use of IT. [4]
ones which can be caused by prolonged computer use.
6 Many workers now use computers a lot in their work and
Backache
this can cause them to suffer from RSI.
Toothache
Name two other possible health problems and for
Stress
each one describe a different precaution which
Sprained ankle could be taken to help prevent it. [4]
Repetitive strain injury (RSI) (Cambridge IGCSE Information and Communication Technology
Eye strain [4] 0417/11 q18 May/June 2014)
3 People who work with computers for long periods may 7 There are many microprocessor-controlled devices in the
experience some health problems. These health problems modern home.
include eye strain and RSI. Describe five effects of these devices on people’s
a Give the names of two other health problems lifestyles. [5]
other than eye strain and RSI that a user may
(Cambridge IGCSE Information and Communication Technology
experience. [2]
0417/11 q18 Oct/Nov 2013)
b Explain two things a user should do in order to prevent
future health problems when sitting on a chair at a desk
using a computer. [2]
54
6 ICT applications
ICT is used in almost every area of our lives, so in this chapter you
will be looking at the range of ICT applications in everyday life. You The key concepts covered in this chapter are:
will also be looking at the impact of developments in ICT which Communication applications
shape the way we go about our lives. Data handling applications
Measurement applications
Microprocessors in control applications
Modelling applications
Communication applications Applications in manufacturing industries
There are many different ways of communicating using School management systems
communication services such as phones, email, etc. In this Booking systems
section you will be looking at communication applications and Banking applications
how they allow people to communicate effectively using ICT. Computers in medicine
Computers in libraries
Expert systems
Multimedia Computers in the retail industry
Newsletters Websites
presentations Recognition systems
Monitoring and tracking systems
Satellite systems
Advantages:
Q UESTI O N S A
You can be contacted in case of an emergency.
Plans can be changed at the last minute. 1 a Explain what is meant by the abbreviation VoIP. (1 mark)
Parents like children to have a mobile phone so that they can b Describe one advantage in a person using VoIP to
be contacted in emergencies. communicate with others. (2 marks)
Clubs and society records Auto control – the readings can be used to control a device in
Clubs and societies have income and expenditures which need some way. For example, the readings sent from a temperature
to be recorded, and computers with appropriate software can be sensor could be used to turn an air-conditioning unit on or off.
used for this. They also need to keep membership details such
Monitoring can be used in science lessons for recording
as the contact details of their members. They will have to keep
temperature, light, force, etc. In geography lessons monitoring
details of membership renewals and use mail merge to send
can be used to record the weather. It can also be used in society
membership renewal reminders out to members.
for monitoring traffic flow, monitoring pollution, keeping track of
climate change, for electronic timing, etc.
Address lists
Address lists or contact details are essential for communication The main features of monitoring are:
by letter, email, SMS, phone etc. Address lists can be prepared The readings are taken automatically – there is no need for a
using one piece of software and then saved in a file format that human to be present. This means that it is much cheaper than
can be imported into different software packages so that you do employing a person to do this.
not have to ever input the address details again. Address lists are You can set the period over which the monitoring takes
frequently used for mail merges where a personalised document place – this is the total time over which the readings will
is sent to a large number of people. be collected. You can also set the system to take readings
continuously such as in a flood warning system.
School reports You can set how often the readings are taken. For example,
Every so often your school will need to issue a school report in an experiment to investigate the cooling of boiling water,
which is used to inform your parents/guardians about your current you might decide to set the frequency with which readings are
progress. All these reports need to be kept for each student over taken to be every minute.
their school days. School management software usually has a The sensors can be put in remote locations – you can put
module which allows the report data to be entered by each teacher them anywhere in the world and the data can be sent back
for each student. School report systems can allow teachers to wirelessly and even using satellites.
insert comments for each student which can then be output and The sent data can be stored and processed by a computer.
given to students/parents as part of the school report. The data can be analysed (you can do calculations such as
work out the mean, mode median, range, etc.), and draw
Libraries graphs and charts. The data can be imported into software
School and college libraries usually use bar codes to input such as a spreadsheet package.
unique borrower and book numbers (i.e. unique numbers given
to each book) into the library system. There are three files used; Sensors
one to contain book details, one for member details and one Sensors are used to detect and measure physical quantities.
which records the borrowings which links books to members. All Here are some examples of sensors:
of these files can be accessed using database software in lots
of different ways. For example you can find lists of books on a Temperature sensors – can be used in school experiments
certain topic, list members who are overdue with their books and such as investigating the cooling of a hot drink in different
so on. thicknesses of cardboard cup. Sensors can be used to
control a heating/cooling system in a home or classroom/
Library systems in general are covered on page 19. greenhouse.
Light sensors – detect the brightness of light. Can be used to
Measurement applications see how light levels affect the growth of a plant. They can be
Computers can be used in conjunction with sensors to measure used to control lights that come on automatically when it goes
physical quantities such as temperature, pressure, light intensity, dark in a greenhouse.
infra-red radiation, etc. Sound sensors – measure the loudness of a sound. They can
be used in noise disputes (e.g. monitoring sound at airports).
Pressure sensors – barometric pressure sensors measure air
Monitoring
pressure; other pressure sensors measure depth of liquid or
Monitoring involves taking readings/measurements regularly or
something pressing on them.
continuously over a period of time using sensors. There are three
Humidity sensors – these measure the moisture in the air in
things that can then happen:
greenhouses or art galleries, etc.
They can be stored for later – the readings can be stored and Passive infra-red sensors (PIRs) – these are the sensors
then output in some way, such as graphically. used in schools and homes to detect movement. They can
Set off alerts – they could be used to issue a warning sound be used in burglar alarms and also to turn lights on/off
such as the beeper if the heart rate of a patient being automatically in rooms when a person walks in/out.
monitored changes.
57
Advantages and disadvantages of monitoring using ICT is an analogue quantity because temperatures do not jump from
one degree to the next as there are many values in between.
Readings always Digital quantities jump from one value to the next. Computers are
taken at exactly nearly always digital devices and can operate only with digital
the right time Do not need to
pay someone to take values. If analogue values such as temperature readings need to
Sensors can be the readings be input into a computer, they first need to be converted to digital
located in
values using an analogue to digital converter.
inhospitable places
(e.g. the North Pole) Advantages of No human error when
monitoring
using ICT
taking readings
(i.e. greater accuracy)
Microprocessors in control
Readings can be
applications
Readings go
taken more frequently automatically into a Data from sensors can be used to control devices. For example,
than by a human computer for the data from temperature sensors are used to turn heaters
The system does
not forget to reports/alerts on or off to maintain a constant temperature. Most household
take a reading appliances such as washing machines, air conditioning units,
kettles, etc., use some form of control, as you will see later in
this chapter.
Users need to be Disadvantages
trained to of monitoring
Equipment is Using a sequence of instructions to control devices
expensive to purchase
use equipment using ICT In control systems it is necessary to give a series of commands
for the system to obey.
There is an educational package for teaching about control
Environmental monitoring commands called LOGO and it is used to move a turtle or cursor
Environmental monitoring is used to collect data for weather around the screen. The turtle or cursor can be instructed to leave
forecasts, to test water quality in rivers and streams, to collect lines to trace its path on the screen. For example, the following
data about air pollution, etc. Sensors take the readings set of commands can be used to move an arrow on the screen of
automatically and these readings can be saved on removable a computer. When the arrow moves, it leaves a line.
media or the data can be sent back to the computer automatically FORWARD distance
using a wireless signal. LEFT angle
RIGHT angle
Pollution monitoring
Water quality in rivers and air quality can be continually monitored Hence, using the command FORWARD 5 would move the arrow
for pollutants by remote sensors which send signals back to forward 5 units, and LEFT 90 would turn the arrow left through an
computers. As the signals from sensors are analogue and angle of 90o.
computers can only process digital signals, an analogue to digital The list of instructions that would draw this shape is as follows:
converter is used to convert the signals from the sensors into ones
FORWARD 50 50
that can be processed by the computer.
RIGHT 90 starting
FORWARD 30 position
Water pollution
RIGHT 90 30
Sensors usually measure indicators such as pH, oxygen level,
FORWARD 30
temperature and the cloudiness of the water. Measurements are 30
LEFT 90
collected and processed to produce graphs showing the variation of
FORWARD 15 15
values over time and in some systems alerts are sounded when values
from the sensors fall outside acceptable values called pre-set values.
The set of instructions to draw this shape on the screen are:
Air pollution
As with water pollution, sensors measure indicators such as levels FORWARD 30 30
of ozone, nitrogen dioxide, sulphur dioxide and fine particles (e.g. RIGHT 60 starting 27
120°
dust, smoke etc.). FORWARD 27 position
RIGHT 60
FORWARD 20 120°
Analogue to digital conversion 20
Analogue quantities are continuously variable, which means that
they do not jump in steps from one value to another. Temperature
58
6 ICT APPLIC ATIONS
Repeating sets of instructions: instructions can be repeated using Control the addition of the washing liquid.
the following commands: Control the length of time the drum rotates for.
Control the pumps which pump the dirty water out of the
REPEAT n
machine.
ENDREPEAT
Control the spin speed.
The instructions to be repeated a set number (i.e. n) times are Control how long the drier cycle is on for by using moisture
placed in between these two commands. sensors to sense when the washing is dry.
Control the release of the door hatch when it is safe to do so.
For example, a square could be drawn using REPEAT n using the
following commands:
Computer controlled central heating system
REPEAT 4 Computer controlled heating systems keep a room at constant
FORWARD 20 temperature. Here is a very simple control system for keeping a
RIGHT 90 room at constant temperature.
ENDREPEAT
The timer instructs the heating system when to switch on and
There are also some other commands: off. The timer switches the whole system on.
A temperature sensor measures the temperature of the air
PENDOWN (this instruction puts the pen down so that a line
and sends a signal to the computer. If the temperature of the
is ready to be drawn)
air is less than 23°C (i.e. the value pre-set by the user), a
PENUP (this instruction raises the pen so the pen can be
signal is sent to the heater to turn it on.
moved along without drawing a line)
The air temperature is continually measured by the
temperature sensor. Signals are sent back to the computer,
Simple control applications which compares the temperature with its pre-set value
Simple control systems use data from sensors.
(i.e. 23°C). As soon as the temperature reaches this value,
Security light system – uses a PIR (passive infra-red) sensor to a signal is sent to the heater to turn it off.
sense movement. When a person or animal walks up the path to At any time the temperature drops below 23°C, the heater is
your house, the PIR senses the heat from the person or animal switched on again so that the temperature remains constant
moving in the sensor’s field of view and sends a signal to the at 23°C.
processor to turn on a light. After a period of time, if no heat is The system continues to keep the temperature of the room
detected, the light is turned off. constant until the timer switches the whole system off.
A burglar alarm – works in a similar way to the security light using Computer-controlled greenhouses
PIRs as the input into the system. This time the output device is a In order to grow plants successfully they need perfect growing
bell or siren that sounds when the alarm is on and movement is conditions. Computer control can be used to monitor the
detected. conditions and keep these conditions constant.
Automatic cookers – temperature sensors relay temperature data The sensors used to collect the input data include:
back to the microprocessor to control the operation of the heating
Light
elements. The microprocessor also controls when the oven is to
Moisture
come on and how long it stays on for.
Temperature.
Simple control in automatic washing machines The output devices that are controlled by the computer include:
The user selects the program they want to use. The program will
Lamps (to make the plants grow faster)
be the set of instructions for a particular wash and will include
Heaters
pre-set values such as temperature, spin speed, time spent
Motor to turn the sprinkler on/off to water the plants
washing etc.
Motor to open or close the windows (to cool the greenhouse
The control program will then receive data from sensors down if it gets too hot).
(e.g. pressure to show how much water has entered the drum,
temperature to check that the water is heated to the correct The sensors (i.e. light, humidity and temperature) all read
temperature) etc. analogue values which are converted to digital signals using an
analogue-to-digital converter (ADC) before being processed.
The sensors and control program in the computer perform will:
The processing compares each value with set values to decide
Control the flow of water into the machine. whether each of the output devices (i.e. lamps, sprinkler, heater
Heat the water up to the correct temperature. and windows) should be turned on or off.
59
Sensors Q UESTI O N S B
60
6 ICT APPLIC ATIONS
Activity 6.1 The accuracy of the rules and variables – the person designing the
Use the internet to research examples of children’s toys model may have made mistakes with the rules or the variable data.
that use computer control. Produce some notes explaining Some situations are hard to model – some situations are
how the toys use control for their operation. difficult to model because some aspects of the model are
often open to interpretation. For example, experts on the
subject may disagree about the rules that apply.
Modelling applications
Spreadsheet software can be used to construct models and can
Applications in manufacturing
be used to produce financial models such as the money coming industries
into and going out of a school tuck shop or models on personal Robots have been widely used in manufacturing for years,
finance to help you manage your money. Modelling means especially for painting and welding in car factories. Robots
producing a series of mathematical equations that are used to are also used for picking and packing goods in large
mimic a real situation. When values are put into the model or we warehouses.
exercise the model in some way, we are said to be performing a
simulation. There are many types of specialist modelling software Advantages and disadvantages of using computer-
from games to flight simulators. Models can be created to controlled systems compared to using humans
describe the flow of traffic at junctions and the output from the Compared to humans doing the job, computer-based control
model can then be used to issue controls to the traffic signals to systems or robots have the following advantages and
ensure that the traffic flows as smoothly as possible thus keeping disadvantages.
queues to a minimum.
Advantages:
Modelling can also be applied to graphics. For example, you can
produce a computer model of a building in 3D using a plan of the Can operate continuously, 24 hours per day and 7 days per week.
building in 2D. Architects can make changes on the plan and then Less expensive to run as you don’t have to pay wages.
see the effect of the changes on the 3D view. Can work in dangerous places or places where a human would
find it difficult to work (e.g. stacking shelves in a frozen food
warehouse).
The advantages and disadvantages of using
Can easily change the way the device works by
simulation models
re-programming it.
Some advantages: More accurate than humans.
Can react quickly to changes in conditions.
Cost – it can be cheaper to use a model/simulation. For
example, car engineers can use a computer to model the Disadvantages:
effect on the occupants during a crash and this is cheaper
Initial cost of equipment is high.
than using real cars with crash test dummies.
Equipment can go wrong.
Safer – flight simulators can model the effect of flying an
Fewer people needed so leads to unemployment.
airplane in extreme situations. Extreme situations might
include landing without the undercarriage coming down, or
landing with only one engine working, and so on. It would be
far too dangerous to expect a pilot to try these in real life.
It can save time – global warming models can be set up to
predict what the likely effects of global warming will be in
the future.
It is possible to experience lots more situations – pilots
using simulations can experience all sorts of extreme
weather conditions such as sand storms, hurricanes, smoke
from volcanic eruptions, and so on. These would be almost
impossible to experience any other way.
Some disadvantages:
The differences between simulation and reality – there will
Robots assembling car panels in a car factory
always be some difference between a model/simulation and
reality. No model or simulation can ever be perfect because
real life situations can be very complex.
61
School management systems
ARC
ABSENCE REPORT CARD CARD NO.
There are many ways in which ICT is used to help with the
[0] [0] [0] [0] [0] [0]
administration and management of schools. [1] [1] [1] [1] [1] [1]
[2] [2] [2] [2] [2] [2]
[3] [3] [3] [3] [3] [3]
School registration [4]
[5]
[4]
[5]
[4]
[5]
[4]
[5]
[4]
[5]
[4]
[5]
School registration systems are something you will be familiar INSTRUCTIONS [6] [6] [6] [6] [6] [6]
Use only pencil when [7] [7] [7] [7] [7] [7]
with. You will know that it is important for the school to keep a completing this form. [8] [8] [8] [8] [8] [8]
Mark like this —
[—] [9] [9] [9] [9] [9] [9]
record of who is on the premises and who is not.
Student name Date Present Code
Computer-based methods of registration [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Any ICT system used for student registration in schools or colleges [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
should: [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Capture student attendance accurately [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Capture the student attendance automatically [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Be very fast at recording attendance details [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
As far as possible avoid the misuse of the system [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Enable not only morning and afternoon attendance to be [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
recorded but also to record attendance at each lesson and [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
enable attendance patterns for individuals and defined
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
groups to be worked out [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Be relatively inexpensive [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
Work with other ICT systems used in the school, such as the
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
system for recording student details. [”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
[”] [L] [M] [N] [P] [T] [H] [G] [J] [F]
62
6 ICT APPLIC ATIONS
Advantages of swipe cards: Results can be analysed using software which can compare
the performance of the student against other students in the
The cost of the cards and the readers is low compared to
same class/year or students nationally.
other methods.
Good and bad behaviour can be recorded.
Readers can be made that are almost vandal proof.
Data is held centrally so all teachers can access it which
Disadvantages of swipe cards: means a full picture of a student’s progress can be obtained
across all subjects.
Cards are often lost or forgotten, meaning that students have
Students and parents can see a student’s progress or
to be registered using a keyboard.
otherwise and take appropriate action.
Student cards can be swiped in by someone else.
School timetabling
Biometric methods Producing school timetables manually is quite difficult as there
Biometric methods provide a fast and easy way of recording student are four things to consider, namely:
attendance. Biometric methods make use of a feature of the human
Students
body that is unique to a particular person in order to identify them.
Teachers
Advantages of biometric methods: Rooms
Time slots/periods.
There is nothing for a student to forget, like a card.
You have to be there to register so no-one else can do it for School management systems have a timetable component which
you and it cannot be altered by students. will work out a timetable once all the data concerning the above
Performed in real time so the system knows exactly who has are entered.
registered and when.
Timetabling using a computer system has the following advantages:
Disadvantages of biometric methods:
Accurate timetables can be produced in much less time than
Biometric systems are expensive. you could produce one manually.
There are privacy issues. Some people object to fingerprinting It is much easier to make changes to a timetable. For
systems. example, if two teachers want to swap rooms, then this is
People can vandalise the readers. easily altered on the timetable.
If a classroom cannot be used for any reason (e.g. air
School management systems conditioning or heating not working), then an alternative
There are many different pieces of information stored by a classroom can be quickly found using the system.
school – the student records and the records of attendance are If a teacher is off sick, then those teachers who are free at the
just two. By integrating all the systems, it is possible to extract times for the lessons can be identified by the system so they
the data needed from the system in the form of reports. A report can cover the class.
might be a list of all those students with 100% attendance so
they can be given a certificate. Organisation of examinations
School management systems can also help school managers
School management systems are ICT systems that supply school
organise examinations by:
managers and staff with information that can help them make
decisions. For example, the attendance system might produce Ensuring that each pupil is entered for correct examinations
information about those students for whom attendance is poor. The Printing out individual student’s exam timetables
system might produce a report showing when they are absent to Identifying rooms in which examinations can take place
see if there is a pattern. The senior teachers can then take action. Producing lists of students for each exam
Identifying teachers who are free to invigilate the exams
Recording learner performance Collecting exam results and entering them into the student records.
Included as part of the school management system is a module which
Here are some other ways school management systems can be used:
records learner performance. In the past, teachers recorded marks
for homework, classwork and tests in their paper-based mark books. To work out how many students will be in the new intake and
Opinions about how each student’s performance, development of skills, to allocate them into tutor groups.
behaviour etc. was often held in the teacher’s head or handwritten on To decide whether a new teacher should be employed.
paper. Using ICT to record learner performance means: To work out the best way of allocating teachers and classrooms.
To decide on how best to spend the training budget to keep
Teachers enter marks for homework, classwork, tests and
teachers up-to-date.
details of skills learnt directly into the computer.
63
The main advantages in using school management systems are: You can read reports from people who have been on the same
holiday, seen the same concert, etc.
They reduce the workload for teachers in the classroom and in
There is no need to pick up tickets as you often print these yourself.
the school office.
They can provide up-to-date information for parents. Disadvantages of online booking:
They can support decision-making for school managers.
You have to enter credit/debit card details and these may not
They can tackle truancy effectively.
be kept safe.
They can be used to plan timetables.
People could hack into the site and know you were away and
The main disadvantages in using school management burgle your house.
systems are: There is no personal service like with a booking agent.
You could easily enter the wrong information and book the
The software is expensive to buy.
wrong flights or performance on the wrong day.
Student data is personal, so there must be no unauthorised
access.
Software is complex, so all staff need training. Q UESTI O N S C
Booking systems 1 An airline ticket is booked direct with the airline using the
internet. The airline booking system uses online processing.
The main feature of all online booking systems is that they use a Explain what is meant by online processing. (2 marks)
online processing. This means that while the transaction is taking b Describe two advantages in booking an airline
place and the user is entering their details, the seats are saved ticket online. (2 marks)
for them. If they choose not to go ahead with their purchase, c Describe two disadvantages in booking an airline
the seats held are released for sale to others. This immediate ticket online. (2 marks)
updating of files prevents double bookings.
2 a A school uses a school management system.
Online booking systems can be used to book: Describe two features of a school management
Holidays system. (2 marks)
Flights b Explain one advantage in the school using a
Train tickets school management system (1 mark)
Cinema seats c Explain one disadvantage in the school using
Theatre seats a school management system. (1 mark)
Tickets for sporting events. 3 ICT-based student registration systems in schools
The steps for online booking are as follows: offer the advantages of speed and accuracy to the
form teacher. Discuss two other advantages to the
Find the booking website using a search engine or type in the school in using ICT to register students. (4 marks)
web address.
Search the online booking database using dates, times, etc. 4 Robots are widely used in manufacturing industries.
Make your selection (in many cases you can choose where a Describe two tasks robots would perform in a
you sit from a plan). car factory. (2 marks)
The seats are now held for you so no-one else can book them. b Describe three advantages of robots rather than
Enter your details (names, addresses, etc.). humans manufacturing cars. (3 marks)
Select a payment method (credit card, debit card, etc.) and c Describe three disadvantages in robots rather than
enter the card details. humans manufacturing cars. (3 marks)
A confirmation appears on the screen telling you that the
seats/holiday, etc., have been successfully booked.
A confirmation email is sent to you, which in many cases can
be printed out as it acts as your ticket/reservation.
Banking applications
Many of the facilities offered by banks such as the use of credit/
Advantages of online booking: debit cards and online banking would not be possible without the
You can book from the comfort of your home at any time. use of ICT. Banks use ICT in many ways which are outlined below.
There is more time to look for holidays, flights, etc., than when
at a travel agents. ATMs (automatic teller machines)
You can make savings for flights/holidays when you book ATMs, commonly called cash points, are the ‘hole in the wall’
direct as there is no travel agent commission to pay. cash dispensers that many people use when the bank is not open
or when they do not want to queue inside the branch. In order
64
6 ICT APPLIC ATIONS
for you to use the service, the machine needs to check that The system makes it impossible for a customer to withdraw
you are the card holder. You are asked to enter a PIN (personal funds from their account unless they have the money in their
identification number) that only you should know. If the card is account or an agreed overdraft.
stolen then the thief should have no way of finding this, unless of Unusual spending patterns or location of withdrawal
course you have foolishly written it down! can trigger an alert to system not to issue cash without
contacting the bank for authorisation using a series of
Here are some of the things you can do using an ATM:
security questions.
You can get cash out.
Benefits to customers in using ATMs:
You can find out the balance in your account.
You can change your PIN (personal identification number). Some customers prefer the anonymous nature of the machine
You can make deposits (i.e. put cash, cheques or both into since it cannot think you have stolen the cheque book or think
your account). that you are spending too much.
You can obtain a mini statement listing your recent It is possible to use the service 24 hours per day; ideal for
transactions (i.e. money in and out of your account). those people who work irregular hours.
Other facilities such as topping up your mobile phone balance It is possible to park your car or bike near the dispenser of an
might be available. evening, so getting cash is a lot quicker.
Fewer queues, since the transactions performed by the ATM
Type of processing used with ATMs are a lot faster.
Real-time transaction processing is used with ATMs. This means If your card is stolen, the thief cannot get money from the ATM
that as soon as a customer gets the money out of their account, unless they know your PIN.
their balance is updated.
Cheque clearing
Processes involved in using an ATM Suppose Manisha wants to buy a tablet computer costing $250
The card is inserted – the ATM connects to the bank. from a store called Computer World and pay using a cheque.
Manisha banks with Bank AB and the store banks with Bank XY.
PIN is entered – if incorrect, it stops and allows a second try or Here is what happens to the cheque:
checks to see if the card is stolen.
Manisha writes out a cheque for $250 payable to Computer
If correct the ATM checks if the card is valid/not out of date. World.
If PIN is OK the system moves onto the next step, otherwise Computer World pay the cheque into their Bank XY branch.
it stops. Bank XY type in the amount of the cheque in magnetic ink
Customer selects option. characters so that the amount along with other information
pre-printed on the cheque in magnetic ink characters, can
ATM checks balance. be read at the clearing house using magnetic ink character
ATM checks if customer is trying to withdraw more than recognition.
their daily allowance. All cheques, including this one, are sent to a clearing centre
If OK the system asks if a receipt is required. where the cheques are processed. The cheques are passed
through sorters/readers where the magnetic ink characters
If Yes – receipt is printed are read automatically and an encrypted file is produced
Card is returned containing customer account number, bank sort code and
Money is given out. cheque serial number.
This file containing details of all the transactions are then sent
Note that the card is given out first and the money is given out last. to the main bank of the country (e.g. the Bank of England or
Benefits to banks in using ATMs: the Bank of Mauritius). They will then transfer the payment
from Manisha’s bank to Computer World’s bank (i.e. XY Bank)
There are some benefits to the banks in the use of ATMs and along with all the other payments between the banks.
these include: The cheque is then sent to the XY bank identified by the
Staff are freed from performing routine transactions so that sort code number, where the amount is deducted from her
more profitable sales-oriented work can be done. account.
Fewer staff are needed, since the computer does much of the As you can see the process is complicated and this is why there
routine work. is a delay of a few days between paying the cheque in and the
A 24-hour per day service is provided to satisfy their money arriving in an account. It is also the reason why banks
customers’ demands. are keen to get more people to use electronic methods such as
internet banking or the use of debit/credit cards to pay for goods.
65
Online banking EFT (Electronic funds transfer)
Many of the tasks you would have had to go to a bank branch Electronic funds transfer (EFT) is a method of transferring money
to do, you can now perform at home using internet or online from one bank account to another electronically. Using EFT,
banking. Using online banking you can: data is exchanged rather than physical money between the two
accounts and the transfer occurs quickly.
View bank statements
Transfer money between accounts The accounts used for the transfer can be in the same or different
Make payments for bills countries so there may be some currency conversion involved
Apply for loans. in the transfer. All the data sent for the transfer is encrypted so
if the data is intercepted by hackers they would not be able to
Online banking uses the internet to enable a customer at home to
understand the data.
connect to the bank’s ICT systems and interact with them. In order
to do this the customer has to enter log-in details (username and When you use a debit card at a store, the money is transferred
password) and answer some other security questions. from your account to the store’s account, so this is an example of
EFT. Another example of EFT is when an employee is paid by their
Any details passed between the bank and their customers are
employer, the employer instructs their bank to make a transfer of
encrypted to ensure hackers cannot access banking details.
money to the employee’s account.
Advantages to the bank of online banking:
Advantages of EFT:
The bank can reduce the number of branches, which will
You can transfer money between accounts on any device
reduce costs.
with internet access such as desktops, laptops, tablets, and
Fewer bank workers are needed and this means lower total
smartphones.
wage bill.
The transfer of money is fast. Sometimes it can be
The bank staff can be less qualified so this reduces the
instantaneous and other times it can take a couple of hours.
wage costs.
The transfer is secure as it is subject to a high degree of data
Disadvantages to the bank of online banking: encryption. Hackers will not be able to understand the data
even in the unlikely event of them intercepting it.
Customers may feel lack of personal contact and this may
Funds can be sent to anyone who has a bank account
cause some customers to move their account to a different
anywhere in the world.
bank.
It is easier to sell products such as loans face-to-face and Disadvantages of EFT:
this can reduce bank profits.
There is a danger that hackers could intercept the transfer.
Have to spend out large amounts of money on new systems to
The charges for the service can be high especially when the
perform the online banking.
accounts are in different countries.
Have to pay out large amounts of money on redundancies
A mistake in the entry of one of the very long account
when staff lose their jobs.
numbers could result in the money being transferred to the
Have to employ and train staff with skills in computer/network
wrong account.
development and maintenance.
Advantage to the customer of online banking:
Phone banking
Some people who are wary of internet banking can still do their
Do not need to spend time travelling to the bank to perform banking tasks at a distance using phone banking. In order to use
some banking transactions. phone banking it is necessary to register with your bank and they
Can perform banking transactions any hour of the day or night. will give you a number and a pass-code.
Can pay bills without the need for cheques and money for
Some of the tasks you can perform using phone banking are
postage/parking.
automated so they use voice recognition or input from the key
Easier to check on your account balance so less likely to be
pad of your phone to tell the system what you want to do.
charged for overdrafts, etc.
Using the part of phone banking where you do not have to wait to
Disadvantages to the customer of online banking:
speak to an advisor, you can perform some or all of the following:
The worry of hackers accessing your account and stealing
Hear the balance of your account.
money.
Check your latest transactions (i.e. what money has gone into
You cannot withdraw cash so will still need to visit a branch
and come out of your account).
or ATM.
Lack of the personal touch you get when banking at a
traditional branch.
66
6 ICT APPLIC ATIONS
67
Q U E S TION S E
Computers in libraries
Most libraries are computerised and the systems usually make
1 ICT is used in hospitals for patient monitoring. use of bar codes and a relational database.
a Sensors are used to monitor a patient. Give the Each member is given a unique member number. Rather than
names of three sensors that could be used. (3 marks) type this number, the number is coded in the form of a bar code.
b Other than patient monitoring give two uses This is faster and more accurate than typing it in.
of ICT in a hospital. (2 marks)
Books are also bar coded with a unique number and when they
2 An intensive care unit in a hospital uses sensors are borrowed the member’s ticket bar code is scanned along with
connected to computers to monitor a patient’s condition. the bar codes of all the books that have been borrowed. On their
a Give the names of three physical quantities that could return the books are scanned thus telling the computer that the
be monitored. (3 marks) borrower has returned the books. The system can identify overdue
b Most physical quantities cannot be used directly by a books and it is possible to use mail merge to send letters, or
computer without conversion. email members asking them to return the books.
i Give the name of the device that does the
conversion. (1 mark) The system can be used to locate a specific book and to find out
ii Explain why this device is necessary. (2 marks) whether it is on the shelf or has been borrowed. It is possible to
automatically generate lists of books (e.g. by author). Books can
3 Computer-controlled patient monitoring systems have many be reserved using the system so when the book arrives back, it is
advantages compared to using nursing staff to monitor a kept aside rather than being put back on the shelf.
patient’s condition. Tick which of the following are advantages
of computer-controlled patient monitoring systems.
˝
Nurses cannot take readings accurately.
Nurses cannot take readings at the correct time.
Sensors attached to computers can take readings
more regularly.
Computer monitoring can take place all the time
and not at certain intervals.
Printouts from the computer make it easier to spot
trends in the patient’s condition.
Computers can measure more than one physical
quantity at the same time.
It is cheaper to use a computer system rather than
employ lots of nurses.
Most libraries are still using bar codes for recording loans and returns but
Continual monitoring is safer than monitoring only there is a better more up-to-date method which makes use of RFID chips.
now and again.
RFID tags are stuck onto the back of a book’s cover and the data Inference engine – this part uses the rules base along with the
contained in the tag can help manage the loan and return of books. knowledge base to make a decision/conclusion based on the
The self check in/out enables people to use the tag on the book to facts being entered by the user.
borrow and return books and this frees up library staff to do other tasks. User interface – this uses an interactive screen (which can be
Alternatively there is the option to check books in and out at the desk. a touch screen) to present questions and information to the
operator and also receives answers from the operator.
When the library is closed, there is a book drop which means you
simply drop the book into the box where the RFID tag will be read
automatically and you are issued with a receipt to prove you have
Stages of designing/making an expert system
The stages of designing/making an expert system are as follows:
returned the book.
Experts are interviewed.
Data is collected from experts.
Q U E S TIONS F
Knowledge base is designed and created.
Rules base is designed and created.
1 Tick True or False next to each of these statements.
Input and output format/screens are designed and made.
True False Expert system is checked by using known results.
RFID uses radio signals to communicate The processes involved in a typical expert system such as a
with the reader
medical expert system for diagnosis are as follows:
The reader and the RFID must be in
contact for the reader to read the data
1 An interactive screen appears and asks the user questions.
off the chip 2 Answers are typed in or options are selected on a touch screen.
RFID is used in library management
3 The inference engine matches the data input with the
systems knowledge base, using the rules base until matches are found.
RFID does not make use of an aerial
4 The system suggests the probable diagnosis and suggests
treatments.
RFID is replacing bar codes in library
management systems Applications of expert systems
Using RFID, books can be returned when Expert systems can be used for all sorts of applications and here
the library is closed are some of them.
RFID makes use of magnetic ink
characters Medical diagnosis
A health service website enables users to determine whether they
(7 marks) need to call a doctor or visit a hospital. An expert system guides
2 a Explain how RFID is used in libraries to keep track them through a series of questions, which they answer by clicking
of books. (4 marks) on a choice of answers. Such expert systems can determine, for
b Older library systems made use of bar codes. example, whether someone with pains is having a heart attack or
simply has indigestion.
Describe two advantages in using RFID rather than
bar codes in library management systems. (2 marks) Prospecting for minerals and oil
Using geological information, an expert system can use the
information to determine the most likely places to choose for further
Expert systems exploration. This reduces the cost of mineral or oil exploration.
An expert system is an ICT system that uses artificial intelligence
to make decisions based on data supplied in the form of answers For giving tax advice to individuals and companies
to questions. This means that the system is able to respond Tax is complex and a lot of expertise is needed in order to give the
in the way that a human expert in the field would to come to correct advice. This is where expert systems come in. They are able
a conclusion. A good expert system is one that can match the to store a huge amount of data and they can ask the user a series of
performance of a human expert in the field. questions and come up with expert advice on how to pay less tax.
Expert systems consist of the following components: Car engine fault diagnosis
Modern car engines are very complex and when they go wrong it
Knowledge base – a huge organised set of knowledge about is hard for engineers to know what the problem is. Using an expert
a particular subject. It contains facts and also judgemental system created by the car manufacturer the engineers can be
knowledge, which gives it the ability to make a good guess, guided through a series of tests until the exact fault is identified.
like a human expert.
Rules base – this is made up of a series of IF, AND, OR and Chess games
THEN statements that form a set of rules to closely follow Chess game software is an expert system because it mimics an
human-like reasoning. expert human chess player.
69
Advantages of expert systems: Human experts can make judgements based on their life
experiences, and not just on a limited set of rules as is the
Fewer mistakes – human experts may forget but expert systems don’t.
case with computer expert systems.
Less time to train – it is easy to copy an expert system but it
Lack senses – the expert system can react only to information
takes many years to train a human expert.
entered by the user. Human experts have many senses that
Cheaper – it is cheaper to use an expert system rather than a
they can use to make judgements. For example, a person
human expert because human experts demand high wages.
describing a type of pain might use body language as well,
More expertise than a single expert – many experts can be
which would not be detected by an expert system.
used to create the data and the rules, so the expert system is
The system relies on the rules being correct – mistakes could
a result of not one but many experts.
be made that make the system inaccurate.
Always asks a question a human expert may forget to ask.
Disadvantages of expert systems: Computers in the retail industry
Lack common sense – humans have common sense, so they Point of sale (POS) and electronic funds transfer
are able to decide whether an answer is sensible or ridiculous. at point of sale (EFTPOS) systems
Point of sale terminals are the computerised tills where you take
your goods for payment in a shop. Many of these terminals also
Q U E S TIONS G
allow payment from your bank account to the store’s bank account
directly using a debit card. These terminals are called EFTPOS
1 Expert systems are used in medicine to help diagnose
systems. EFTPOS systems can also allow the customer to get
illnesses.
‘cashback’ which moves money from their bank account to the store
a An expert system consists of four components.
and this money is given to the customer as cash.
Name two of these components. (2 marks)
b Give one benefit to the patient in using an Because the terminals are networked together, when an item is
expert system. (1 mark) sold and its bar code is scanned, the system looks up the price
c Give one benefit to the doctor in using an and description details to print out an itemised receipt. At the
expert system. (1 mark) same time the system will deduct the item from stock so that the
d Give one possible disadvantage in using this stock control system is updated.
type of expert system. (1 mark)
POS/EFTPOS terminals consist of the following hardware:
2 Doctors and hospital consultants often make use of
Bar code reader/laser scanner – this is used to input a number
expert systems in their work.
that is coded in the bar code as a series of thick and thin lines.
a Explain what is meant by an expert system. (2 marks)
Keyboard – the keyboard is used to enter codes on items if
b Describe one way in which a doctor or
the bar code is damaged.
hospital consultant can make use of an
Touch screens – these are often used in restaurants where
expert system. (2 marks)
there are no goods to scan.
3 Expert systems are becoming popular uses for ICT. Swipe card readers – these are used to swipe the magnetic
a Name two jobs that are likely to use an stripes on loyalty cards.
expert system. (2 marks) Chip and PIN readers – these are used by customers to insert
b For each of the jobs you have named in their credit/debit cards containing a chip. The system then
part a explain how the expert system would asks them to enter their PIN (personal identification number)
be used. (2 marks) which is a number only they know. This is compared with the
number encrypted and stored on the card. If the number
4 One example of where an expert system is used
entered matches that stored, it proves to the system that they
is to help doctors diagnose illnesses. Give one
are the genuine owner of the card.
other use of an expert system. (2 marks)
Point of sale terminals are connected via networks to other
5 Expert systems have many uses. For example, one expert
systems such as:
system called MYCIN is used by doctors to pinpoint the
correct organism in blood that is responsible for a blood Loyalty card systems – where customers are given loyalty
infection. points according to how much they spend.
a By referring to the above example give one Accounts systems – where the money coming into the shop is
advantage of using an expert system rather accounted for.
than a doctor. (1 mark) Automatic stock control systems – the system knows what has
b By referring to the above example, give one been sold, so that it can automatically reorder more items
disadvantage in using the expert system rather once the stock falls below a certain level.
than a doctor. (1 mark)
70
6 ICT APPLIC ATIONS
Internet shopping
Internet shopping means purchasing goods and services using Can site warehouse Cheaper to keep in touch
the internet. anywhere that rental with customers as they
is cheap can be emailed
Most businesses have websites to show the products and services
available. Lots of these websites allow customers to browse online
catalogues and add goods to their virtual shopping basket/trolley Unemployment –
just like in a real store. When they have selected the goods, they staff in traditional
go to the checkout where they have to decide on the payment Specialist ICT shops lose their jobs Business lost
method. They also have to enter some details such as their name knowledge is needed so redundancy abroad if their goods
to set up the site payments are made are cheaper
and address and other contact details. The payment is authorised
and the ordering process is completed. All that is left is for the Virus attack could Networks can fail
customer to wait for delivery of their goods. stop people being and this means
able to access customers cannot
Goods/services are Goods are delivered to your the store Disadvantages of access the store
cheaper because of home – ideal if people internet shopping
lower costs of cannot get out because Not everyone has to the store Personal data is kept
internet business they are elderly or disabled access to the about customers
internet so you will and this could be
lose some customers targeted by hackers
Worldwide
No travelling costs
marketplace – you
to go shopping
can order goods from
anywhere in the world
71
QU E S TION S H
72
6 ICT APPLIC ATIONS
Road enforcement: Delivery drivers can have their location tracked by their
employers using GPS (global positioning systems). Usually
Speed cameras recognise the plate of cars speeding and use
they are tracked to determine where they are in case a
this to find details of the registered keeper/driver to send
customer wants to know when a delivery is likely to be made.
them fines.
Taxi firms track their taxis so that the nearest available taxi to
Cameras recognise cars parked illegally so fines can be sent.
a customer can be found.
Cameras recognise cars whose tax is out of date so fines can
be sent. Key logging
Key logging is the process of someone recording/monitoring
Car park management:
the keys you press when you are using your computer using a
Number plates are read by a camera and if allowed into the key logger which can either be hardware or software. As it can
car park, the barrier is raised. record keystrokes, someone can record your passwords and
Can be used for pre-booked spaces at airport car parks. No banking details. They can then use the information they collect
ticket is issued. (Tickets can easily be lost.) fraudulently.
Electronic toll collection:
Call monitoring/recording
Car numbers using toll roads, bridges or tunnels are Many employers monitor the calls employees make using phones
recognised so that payment can be collected from the driver provided by the company in order to detect whether the system is
automatically. This saves them having to keep change for the being abused.
tolls if they are regular users.
Mobile phone calls are always recorded by the mobile phone
companies and kept for a certain period as part of the fight
Public monitoring/tracking against terrorists and criminals.
Your web browsing activity is recorded by your internet service
provider (i.e. the organisation that provides your internet Companies record calls in case of a dispute over what was said.
connection) and it is possible to identify the computer from which
an email or message is sent. It is therefore almost impossible to
Q UESTI O N S I
remain anonymous on the internet.
Most websites use cookies. Cookies are pieces of text that 1 Employers often monitor the use of the internet by their
websites put onto your hard drive when you visit them. Internet staff and they may read their emails and check what they
cookies record details of the websites you have visited and how have been looking at.
long you spent on them, what pages were looked at, if you have a Give one reason why staff have their internet use
visited the site before, etc. Many people consider this to be an monitored. (1 mark)
invasion of their privacy. b Give one reason why staff have their email use
monitored. (1 mark)
It is possible to locate the position of a person using their
mobile phone. In fact with some mobile phones it is possible to 2 The police use automatic number plate recognition
determine all the places they have been over a period of time. systems.
a Describe briefly how the automatic number plate
Worker monitoring/tracking recognition system works. (3 marks)
Some employers keep a constant check on their employees. This b Give one advantage that the police have in
monitoring/tracking is usually for commercial purposes but it can using this system. (1 mark)
be used to check up on their employees which can be used to c Give two uses by the police of the number plate
discipline employees if they have not obeyed company rules. recognition system. (2 marks)
For example, supermarket checkouts can monitor and log how 3 Car park management systems often make use of number
many items are put through the checkout each hour by each plate recognition.
shop assistant. a Give the name of the input device used with this
Internet use is monitored by network managers. They can system. (1 mark)
record what sites are visited and how long an employee spent b Explain how the system uses optical character
on them. They can therefore spot employees who are spending recognition (OCR) to allow a car to enter the
too much time browsing the internet when they are supposed car park by raising the barrier. (3 marks)
to be working. c Give an advantage of this system compared
Emails can be read. This means that employers could read to having a manned barrier. (1 mark)
work-related emails as well as personal ones that have been
sent during work time.
73
Satellite systems Geographic information systems (GIS)
A geographic information system, or GIS for short, is an ICT
Satellite systems are an essential part of communication
system that is used to capture, manage, analyse, and display
systems. In this section you will be looking at the uses of some
geographically referenced information.
satellite systems.
What can you use a GIS for? Using a GIS you can:
Global positioning system (GPS)
Determine how far it is from one place to another
GPS stands for global positioning system. GPS is a satellite-
See a bird’s eye view of your house and its surroundings
based system which uses at least four satellites to work out the
Plan the quickest route to school/college
distance between the receiver and each of the satellites, in order
View the surroundings when you go to a new place or go
to work out the position (i.e. latitude, longitude, and altitude) of
on holiday
the receiver on the Earth. When the position is combined with
Look at the surrounding area when you are thinking of buying
a map, the system becomes a satellite navigation system with
or renting a property.
which most new cars are equipped.
Examples of GIS:
Satellite navigation systems – you can get navigation
instructions as you drive, be directed to the nearest petrol
station, locate hotels, etc.
Google Earth.
Multimap – useful for maps and aerial views.
The AA – useful for finding route details from one place/
postcode to another.
The Energy Saving Trust – this site allows you to enter your
postcode and it will tell you whether you could use a wind
turbine to generate your own electricity.
74
6 ICT APPLIC ATIONS
(7 marks)
75
G The part of an expert system where the user interacts with
The following notes summarise this chapter, but they have the system is called the _____.
missing words. Using the words below, copy out and complete
H Expert systems have the advantage that they are usually
sentences A to O. Each word may be used more than once.
built using the knowledge of many _____.
internet cheaper smartphones experts
I Expert systems have the advantage that they will not forget
VoIP knowledge base rules base
to ask a _____ nor will they forget things.
pre-set expert emails phone sensors
J One application of expert systems is medical _____ where
question ATM digital diagnosis
the expert system is used by a less experienced doctor to
analogue-to-digital converter user interface help make an expert and accurate diagnosis.
A There has been a huge increase in the way people can
K Expert systems have the advantage in that it is much _____
communicate with each other owing to the introduction of
than consulting one or several human experts.
the _____.
L Banking has changed and it is no longer necessary to
B Use of the internet means that cheap phone calls can
visit a branch to perform routine transactions owing to the
be made to anywhere in the world by using a service called
introduction of _____ and _____ banking.
_____.
M If you want to obtain cash from your account out of normal
C Mobile communication has been made possible by the use
banking hours then you can use an _____.
of _____ which can be used to make phone calls, send
texts, send _____ and browse the internet. N Control systems make use of data obtained from _____. As
these record quantities which are analogue these need to
D An _____ system is an ICT system that uses artificial
be converted to _____ data by using an _____.
intelligence to make decisions based on data supplied in
the form of answers to questions. O In control systems such as an air conditioning system to
keep a room at a constant temperature, the reading from
E A _____ is a huge organised set of knowledge about a
a temperature sensor is compared with a _____ value in
particular subject used by an expert system.
order to decide what action to take.
F The set of rules on which to base decisions on used by
expert systems is called the _____.
REVISION QUESTIONS
1 a Give the name of a household device that uses a control system. [1]
b Explain how the control system controls the device you have named in part a. [3]
2 A school is using a traditional paper-based registration system.
The school uses registers to record morning and afternoon attendance details for each student.
a Describe three advantages in using ICT systems for registration. [3]
b Describe three disadvantages in using ICT systems for registration. [3]
3 Give two examples of tasks that are completed by robots. [2]
4 Online banking is very popular with home users of ICT.
a Name and describe three services offered by online banking. [3]
b Some people are sceptical about online banking. Describe two worries that people might
have with online backing. [2]
c Describe one way that the banks can address one of the worries you have described in part b. [1]
5 Many people use the internet to access booking systems.
By referring to a relevant example, explain how an internet booking system works and
the advantages to the home user in being able to book tickets/seats online. [5]
76
6 ICT APPLIC ATIONS
Complete the set of instructions to draw this shape 7 Patients are continually monitored in the intensive care unit
by filling in the blank lines. [5] of a hospital.
a Name three physical quantities that would be monitored.
PENDOWN [3]
………………………….. 90 b Give three advantages in using computerized
monitoring of patients rather than using nursing staff for
REPEAT …………............
monitoring. [3]
FORWARD …………........
8 Describe the difference between phone banking and
…………………….……. 72 internet banking. [4]
………………………..…..... 9 A central heating system uses a temperature sensor, a
microprocessor, and a heater to keep a room warm in the winter.
(Cambridge IGCSE Information and Communication Technology
0417/13 q6 Oct/Nov 2010) a Explain why the microprocessor is not able to use
the data from the temperature sensor directly
2 An oil company is investigating whether they are likely to and give the name of the extra device that would
find oil at a certain site. They will use an expert system to be needed. [3]
help them. There are a number of inputs and outputs used b With reference to this central heating system, describe
with such a system. List four examples of these. [4] what is meant by a pre-set value and explain how it is
(Cambridge IGCSE Information and Communication Technology used by the system to keep the temperature of
0417/13 q12 Oct/Nov 2010) the room constant. [4]
3 A car repair centre uses an expert system to help diagnose
car engine faults.
a Describe the inputs, outputs and processing
of this system. [6]
b Give two other examples of situations where
expert systems might be used. [2]
(Cambridge IGCSE Information and Communication Technology
0417/01 q11 Oct/Nov 2009)
77
10 The Geography teacher in a school has set up an automatic a Give the cell reference of the cell that contains $3.45. [1]
weather station connected to a computer. b Give the cell reference of a cell that contains a label. [1]
a Name three physical variables which will be c How many columns are shown in the spreadsheet? [1]
measured by the sensors. [3] d Write down the formula which should go in cell G2. [1]
b i Explain why the computer is unable to read e Formulae similar to that used in cell F2,
the data directly from the sensors. [2] that is to say = E2 – D2, have been used
ii Name the device that is needed to enable in cells F3 to F6. These were not typed.
it to do so. [1] Describe how these were entered. [2]
c Give three advantages to the Geography department f Spreadsheets can be used for modelling.
of having a computerised weather system rather Give three reasons why computer models are used
than a manual weather system. [3] rather than the real thing. [3]
(Cambridge IGCSE Information and Communication Technology (Cambridge IGCSE Information and Communication Technology
0417/11 q10 May/June 2014) 0417/11 q12 Oct/Nov 2013)
11 A company uses robots to manufacture cars. 13 Many schools use ICT to record learner performance.
a Tick four advantages to the company of using robots Explain three ways in which ICT can be used to record
rather than humans to manufacture cars. [4] learner performance in a school. [3]
14 Here are some statements concerning cheque clearing.
˝
Tick whether these statements are true or false.
Robots are cheap to buy
Running costs are lower as humans have to be paid wages True False
Robots never need maintenance Cheque clearing uses magnetic characters
Humans cannot work continuously which are read automatically using optical
mark recognition.
Robots can work in hazardous conditions
Cheques are sent to a clearing centre where
There is lower productivity with robots
they are processed.
Robots produce the same standard of finished product
It takes over two weeks to clear a cheque.
every time
[3]
Humans have greater accuracy than robots
78
7 The systems life cycle
The systems life cycle is the series of stages that are completed when
The key concepts covered in this chapter are:
developing a new system or improving an old one. The stages are
Analysis
carried out in order and this ensures that the system is developed Design
properly. The existing system might be paper-based or, more probably, Development and testing
uses computers but is no longer good enough or up-to-date. In this Implementation
chapter you will learn about the systems life cycle and the tasks Documentation
that are completed for each stage. Evaluation
The purpose of the systems life cycle The different methods of researching a situation
The starting point of analysis involves finding out what people
It is important that new systems being created are fit for
want from the new proposed system or looking at the existing
purpose. Systems developed without too much thought tend to
system to find out how it works and might be improved. There are
have serious faults. To prevent this happening, most systems are
several ways this can be done:
developed in a series of set stages completed in a set order.
These are called the stages of the systems life cycle. Using questionnaires
Using interviews
Starting with Analysis, these stages are shown in the diagram:
Using observation
Examination of existing documentation.
Analysis
Using questionnaires
A questionnaire could be given to each user and left with them
Evaluation Design for completion. Questions should be about how the job is
done now and not about the overall running of the business. It
could also be about the information the new system needs to
give them.
Development
Documentation and testing Advantages of using questionnaires
More honest answers as they can be completed anonymously.
You do not have to pre-arrange appointments so easier to
Implementation
collect information.
The systems life cycle. Much less time-consuming method of getting information from
lots of people.
Analysis Questionnaires can be analysed automatically by making use
of optical mark recognition (OMR).
Analysis looks in detail at the current system or the requirements Less time needed to collect the information than by interviews.
for a task that has never been performed before.
Disadvantages of using questionnaires
Analysis will normally involve the following:
People often do not return the questionnaire.
Identifying the problems that need solving. Questions may be misunderstood, giving wrong answers.
Collecting facts about the old system or the required system It is hard to design a questionnaire that will collect all the
using questionnaires, interviews, etc. information needed.
Identifying the inputs, outputs, and processing of the current There is no-one to ask if a question is unclear.
system, or the new system if there is no existing system.
Identifying problems with the existing system.
Identifying the user and information requirements necessary
to solve the problem(s).
79
Disadvantages of using observation
Person being observed may work in a different way
from normal.
Person being observed may feel as though they are being
spied on.
81
Developing the system from the designs and
Q U E S TIONS A testing it
Creating the data/file structure and testing it
1 a What is meant by a check digit? (3 marks)
In the case of a database this would involve creating the
b Give two different examples where check
database tables and entering the field names, the type of each
digits are used. (2 marks)
field, the length of the field, etc., and setting up key fields. The
2 Here are some dates of birth that are to be entered into links between the tables will need to be created. Test data can
an ICT system: then be entered for each field to check that the data can be
a 12/01/3010 extracted in the way required.
b 01/13/2000
c 30/02/1999 Creating validation routines and testing them
The validation routines/checks will have been decided in the
Assume that all the dates are in the British format
design stage. These designs will be used with the software to
dd/mm/yyyy. For each one, explain why it
create the checks that the data being entered is reasonable or
cannot be a valid date of birth. (3 marks)
acceptable. Each validation check will need to be thoroughly
3 When an employee joins a company they are given tested by entering some test data, which will be discussed later.
an employee code.
a Here is an example of an employee code: Creating input methods and testing them
LLLNNNNNN, where L is a letter of the There are many different ways of inputting data into a system. For
alphabet and N is a number. example, share prices can be input directly from a website and
Describe one type of validation that could put into a spreadsheet. Many systems make use of a keyboard to
be used with this field. (2 marks) enter data into a form, spreadsheet, etc. As well as creating these
b Employees are given an annual salary. methods, they will need to be tested.
Describe one type of validation that could
be used with this field. (2 marks) Creating output formats and testing them
This involves designing of output such as reports from databases,
4 A computer manager says, ‘data can be valid yet output on screen, etc. Testing of the output involves checking
still be incorrect’. By giving one suitable example, that the information output is complete and that it produces the
explain what this statement means. (3 marks) correct results.
5 An online form for ordering DVDs uses a presence
Testing strategies
check for some of the fields.
Each module of the ICT solution created needs to be thoroughly
a Describe what a presence check is and why
tested to make sure it works correctly. The modules are tested
some fields have them while others don’t. (3 marks)
with data that has been used with the existing system so that the
b Give one field that might have a presence
results are known.
check and one field that would not need a
presence check. (2 marks) Testing strategies often make use of a test plan. A test plan is a
detailed list of the tests that are to be conducted on the system,
6 During the development of a new system it is important to
when it has been developed, to check it is working properly. These
find out how the existing system works (if there is one). The
test plans should be comprehensive. A good way of making sure
usual way to do this is to carry out a fact search/fact find.
that they are indeed comprehensive is to make sure that:
Name and describe three different ways of collecting
Tests are numbered
facts about an existing system. (6 marks)
Each test has the data to be used in the test clearly specified
The reason for the test is stated
The expected result is stated.
Development and testing Space should be left for:
Development of the new system means creating the new system
following the designs created in the previous stage. The new The actual result and/or comment on the result
system will need to be thoroughly tested during and after the A page number reference to where the hard copy evidence
development. can be found.
82
7 THE SYSTEMS LIFE CYCLE
Testing using normal, abnormal, and extreme data Improvements needed as a result of testing
Testing should always be performed with the following three types Testing is performed to identify problems with the new system.
of data: For example, it may not be possible to produce the output the
Normal data – is data that should pass the validation checks client has asked for and this may result in the need to change
and be accepted. the data/file structures. The test data may reveal that some of the
Abnormal data – is data that is unacceptable and that should validation routines need to be changed in order to trap certain
be rejected by the validation check. If data is rejected then an errors in data. Input or output formats may also need changing.
error message will need to be displayed explaining why it is
being rejected.
Implementation
Extreme data – is data on the borderline of what the system In order to change from one system to another it is necessary to
will accept. For example, if a range check specifies that a have a way of doing this and this is called a method of system
number from one to five is entered (including one and five) implementation. There are several methods used and these are
then extreme data used would be the numbers one and five. outlined here.
Here is a test plan to test a spreadsheet for analysing the marks Methods of implementation
in an examination. A mark is input next to each candidate’s name.
Direct changeover
The mark is a percentage and can be in the range 0% to 100%.
With direct changeover you simply stop using the old system one
Test Test Purpose of test Expected Actual result day and start using the new system the next day.
no mark result Advantages of direct changeover include:
entered
1 45 Test normal data Accept Fastest method of implementation.
2 0 Test extreme data Accept Benefits are available immediately.
3 100 Test extreme data Accept
Only have to pay one set of workers who are working on the
new system.
4 123 Test abnormal Reject and
data error message Disadvantages of direct changeover include:
5 -3 Test abnormal Reject and
data error message
If the new system fails, you might lose all the data.
All staff need to be fully trained before the change, which may
6 D Test abnormal Reject and
be hard to time/plan.
data error message
The old system is removed so there is no system to go back to
The ‘Actual result’ column would be filled in when the test mark was if things go wrong.
entered. If the expected results and the actual results are all the same
then the validation checks are doing their job. If the two do not agree, Parallel running
then the validation checks will need to be modified and re-tested. This method is used to minimise the risk in introducing a new
computer system. Basically, the old computer system is run
Testing using live data alongside the new computer system for a period of time until all
Rather than creating artificial data for the testing of a new system the people involved with the new system are happy it is working
it is sometimes easier to test a system using live data. Live data correctly. The old system is then switched off and all the work is
used for testing is a copy of the existing data files currently being done entirely on the new system.
used for the running of the existing system. For example, a copy
of the customer file can be used for testing the new system. The Advantages of parallel running include:
advantage in using live data is that test data does not have to be If the new system fails then no data will be lost.
created so the testing can take less time; however, it is a shortcut It allows time for the staff to be trained gradually.
and is not as thorough as testing using test data. You can improve the system before full implementation.
To test a new system, the live data is input into the system and Disadvantage of parallel running:
the results this data produces are recorded. These results can
then be compared with results obtained from the previous system It is expensive if paying two sets of workers.
to see if there are any discrepancies.
Phased implementation
Testing the whole system One module at a time can be implemented in phases until
Once all the modules have been tested separately and any the whole system is implemented.
problems with them solved, the modules can be joined to create
Advantages of phased implementation include:
the whole system. The whole system is then thoroughly tested and
any problems addressed. Only need to pay for the work to be done once.
Training can be gradual as staff need only to train in the
module required each time. 83
If the new system fails, the company/organisation can still Documentation
use the old system.
Once a new system has been produced it needs to be
If the new system fails, you only need to go back to the latest
documented. Two sets of documentation are produced with one
phase and do not have to review the whole system.
set aimed at the user and the other set at the developers who
IT staff can deal with problems caused by a module before
may need to alter the system in the future.
moving on to new modules.
Disadvantages of phased implementation: User documentation
User documentation is documentation that the user can turn to
If there is a problem, then some data may be lost. for learning a new procedure or for dealing with a problem that
There is a cost in evaluating each phase before implementing has cropped up. User documentation will normally consist of the
the next. following:
It is only suitable for systems consisting of separate modules.
It can take a long time before the whole system is The hardware requirements to run the system
implemented. The operating system required
How to run the program/use the system
Pilot running How to log in and log out of the system
This method is ideal for large organisations that have lots of How to perform tasks such as enter data, sort data, search for
locations or branches where the new system can be used by one data, save data, produce printouts, etc.
branch and then transferred to other branches over time. Details of sample runs
Advantages of pilot running: Tutorials to help a user become familiar with using the system
Details of input and output formats (e.g. screen layouts and
The implementation is on a much smaller and more print layouts)
manageable scale. Error messages and how to deal with them
There is plenty of time available to train staff. Trouble-shooting guide
Disadvantages of pilot running: Frequently asked questions/ FAQ/help guide
Purpose of the system/program
It can take a long time to implement the system across the Limitations of the system.
whole organisation.
If the system fails in one of the branches, data can be lost. Technical documentation
Technical documentation is aimed at people who may maintain
Which method should be chosen? the new system or develop systems in the future. Technical
For organisations or departments within organisations documentation will normally consist of the following:
which need a quick changeover, direct changeover is best.
Purpose of the system
However, this method is risky as some data could be lost if
Hardware requirements and software requirements
the system malfunctions but it is also relatively inexpensive
A copy of the system design
because the work is not having to be done twice as with
Copies of all the diagrams used to represent the system
parallel running.
(program flowcharts, system flowcharts, network diagrams, etc.)
For organisations or departments within organisations
Program listings/program coding
which cannot afford to lose data, parallel running, phased
Lists of variables used
implementation or pilot running can be used. Parallel running
Details of known bugs
offers less risk because the old system can still be used if
Sample runs (with test data and results)
there are problems, but it takes much longer and is more
File structures (e.g. structure of database tables, etc.)
expensive because everything is done twice.
Validation routines used
Direct Old system New system User interface designs
Test plans
Meaning of error messages
Parallel Old system
Limitations of the system.
New system
Evaluation
Phased Old system Evaluation takes place soon after implementation. It is only
New system
then that the users and others involved in the development
Pilot Old New Old New Old New of the system will find out about any problems with the
new system.
Branch A Branch B Rest of branches
84
7 THE SYSTEMS LIFE CYCLE
KEY WORD
Q UESTI O N S B
Evaluation the act of reviewing what has been achieved,
how it was achieved and how well the solution works. 1 Here is a list of the steps that are stages of the
systems life cycle. At present these are in the
The need for evaluation wrong order. Put the steps in the correct order. (5 marks)
Evaluation of a new system will look at each of the following: Documentation
Evaluation
The efficiency of the solution – this looks at how well the Analysis
system works such as, is it fast? Does it give people the Development and testing
information they require?... and so on. Implementation
The ease of use – is the system easy to use? Has a good Design
user interface been developed? Are training costs minimised
because it is so easy to use? 2 Here are some of the steps that are stages in the
The appropriateness of the solution – this can involve systems life cycle.
checking that the original user requirements have been fully Development and testing
met by the new system and assessing how happy the clients Implementation
are with the development of the new system. Design
Analysis
Evaluation strategies Evaluation
Ways of evaluating a system include:
Write down the name of a step from the list above where
Comparing the system developed with the initial requirements. the following tasks would be carried out:
Evaluating the users’ responses to using the system. a Planning the construction of the new system. (1 mark)
Comparing the performance of the new system with that of b Planning the testing of the new system. (1 mark)
the old system. c Getting the user to answer a questionnaire to find
Identifying any limitations that need to be made to the system. out what is required from the new system. (1 mark)
Identifying any improvements that need to be made to the system. d Asking users what they think of the new system
Interviewing users to gain an insight into problems with the system. that has been developed. (1 mark)
Seeing if cost efficiencies have been met (e.g. a person e Putting data into the computer to check if the
getting through more work than with the old system, etc.). output is what was expected. (1 mark)
Once they are developed, systems may still need to be changed in 3 When one ICT system is being replaced by another there
some way. These changes can be changes in hardware or software. are a number of different ways of doing this. One way is
Here are some of the changes that may need to be made: direct changeover.
a Describe the system strategy for implementing
Changes in the way the business or organisation operates may
systems called direct changeover. (2 marks)
require that the system be altered. For example, a change in
b Give one advantage and one disadvantage
the rate of sales tax or changes in income tax could mean
of direct changeover. (2 marks)
that software will need altering.
Users of the new system may ask for extra functions to be added.
The existing software will need to be changed to do this.
Users may report system crashes which need to be Activity 7.1
investigated and are often solved by changes to the software. Produce a mind map (either hand drawn or produced
Poor performance or bugs in the software will be reported using mind mapping software) that can be used to
during evaluation meetings so they can be corrected. summarise what is involved in each of the system
Slow performance may be reported and corrected by changes implementation strategies shown here. Your mind map
to hardware. should also show the advantages and disadvantages for
each method:
Revision Tip Direct changeover Parallel running
Phased implementation Pilot running.
You may be asked to discuss the different implementation
strategies for the organisation mentioned in a question.
Remember that you need to discuss this in relation to this
organisation and not a general discussion that could apply
to any business. Also, remember that a ‘discuss’ question needs
to be answered in complete sentences. When you do this, try to
ensure that each sentence contains one or more points.
85
REVISION QUESTIONS
1 A person’s date of birth is entered into a database.
The following notes summarise this chapter, but they have State three things the validation program could check
missing words. Using the words below, copy out and complete regarding this date as part of the validation. [3]
sentences A to K. Each word may be used more than once. 2 When a new member joins a fitness club they are given a
development and testing normal input membership number. The membership number is made
evaluation documented training implementation up in the following way:
whole direct changeover facts parallel running Date of birth as six numbers.
The final two figures of the year in which the
A During the analysis stage, the person developing the
customer joins the fitness club.
system will collect _____ about the system using
A letter which is either J or S depending on whether
techniques such as questionnaires, observation and
they are a junior or senior member.
examination of existing documents.
a Write down the membership number for a junior
B During the design stage the _____, processes, and output member who joined the club in 2010 and
will be designed. was born on 21/05/98. [1]
C With the design stage complete, the working version of the b When the membership number is entered into the
solution can be produced. This is called the _____ stage. database, it is validated.
D Testing involves testing each module with _____, Describe what is meant by data validation. [2]
abnormal, and extreme data. c Two examples of data validation are:
Range check
E Testing also involves testing the _____ system when all
Format check.
the modules are put together to form the whole system.
Describe how these two methods could be used on
F _____ involves stopping using the old system and starting the membership number field described above. [2]
to use the new system.
3 State the names of three different methods of
G There are four main ways of implementing a system
implementation from one ICT system to another and
called _____, parallel running, pilot running, and phased
describe an advantage for each method. [6]
implementation.
H _____ involves the old ICT system being run alongside the
new ICT system for a period of time until all the people
involved with the new system are happy it is working
correctly.
I Users need to know how to use the new system. The
processing of helping them to understand the new system
is called user _____.
J Once a new system has been developed it will need to be
_____ and there are two types called user documentation
and technical documentation.
K A review of the development of the project is completed at
the end and this is called _____.
86
7 THE SYSTEMS LIFE CYCLE
EX AM-ST YLE QU ES T IO NS
1 Identify three methods which could be used to implement a b Describe four features of a well-designed input screen. [4]
new system. [3] c The librarian will need to type in data about each book
(Cambridge IGCSE Information and Communication Technology from existing records. In order to prevent typing errors
0417/13 q17 Oct/Nov 2010) the data will be verified. Describe two methods of
verification which could be used. [4]
2 When a new system is implemented, documentation is
d After the system is designed it will need to be
provided with it. Identify four items which would be found in
implemented and then tested.
technical documentation but not in user documentation. [4]
No borrower can take out more than 6 books.
(Cambridge IGCSE Information and Communication Technology Describe the three types of test data that can be used,
0417/13 q18 Oct/Nov 2010) using a number of books as an example for each. [6]
3 Joan owns a small company. She wishes to replace the e The system must now be evaluated. Tick three reasons
existing computerised system with a new one. She has why this is done.
employed a systems analyst, Jasvir, to plan this.
a Before Jasvir decides on a system he must collect ˝
information about the existing system. Tick whether Improvements can be made.
the following statements about the various methods of The hardware and software can be specified.
information collection are TRUE or FALSE. Limitations of the system can be identified.
TRUE FALSE To see how many books are required.
Examining documents has to be done To make sure the user is satisfied with the
in the presence of all the workers ® ® system.
Appointments have to be made with a So that program coding can be written
worker in order to complete a
questionnaire ® ® [3]
f After the system is implemented the librarian
It is possible to change questions will be given technical documentation and user
in the course of an interview ® ® documentation. Name three different components of
Observing the current system can each type of documentation (Technical/User). [6]
provide a detailed view of the (Cambridge IGCSE Information and Communication Technology
workings of the system ® ® [4] 0417/01 q9 Oct/Nov 2009)
b After Jasvir has completed the analysis of the existing 5 A new system has been developed in a school: 25 multiple
system, he will need to design the new system. choice questions are being marked for each student using
Tick four items which would need to be designed. optical mark recognition. The mark is then processed so that
Inputs to the current system ® the teacher can see where revision needs to be focused.
User and information requirements ® The system is to be tested using test data. The maximum
Data capture forms ® mark for the test is 25. Test data can be normal, abnormal
Validation routines ® or extreme. Place a tick if the data items shown in the table
Problems with the current system ® are examples of Normal, Abnormal or Extreme data.
File structure ®
Report layouts ® Normal Abnormal Extreme
Limitations of the system ® [4] 25
Cambridge IGCSE Information and Communication Technology eighteen
0417/11 q14 May/June 2010 15
4 A systems analyst has been asked by a librarian to develop 30
a computer system to store information about books and –5
borrowers. After the existing system is analysed the new 0
system will be designed. The first item to be designed will 10
be the input screen.
[7]
a Name four items of data about one borrower, apart
from the number of books borrowed, that would be
input using this screen. [4]
87
6 Tick whether each of the following tasks is carried out 9 Mario has asked Louise, a systems analyst, to create a new
in the Analysis or Evaluation phase of the systems database system for keeping records of books he sells in
life cycle. his bookshop.
a Louise will collect information about the existing
Analysis Evaluation
system.
Carrying out research on
Describe three methods she would use to do this. [3]
the current system
Comparing the solution After collecting information, Louise noticed that Mario
with the original task sells both non-fiction and fiction books in hardback
requirements and paperback. She also discovered that no books cost
Producing a system more than $20.
specification She wrote down some of the questions that customers
Identifying any limitations ask, such as:
of the solution Have you got any non-fiction books by Arthur C Clarke?
Justifying suitable Have you got the hardback version of ‘Harry Potter and
hardware and software the Philosopher’s Stone’?
for the new system Have you got any books for less than $10?
b Complete the design table below filling in the field
[5] names and most appropriate validation checks to
7 A new computerized system is being developed for a school create a database which would answer these questions.
library.
Field name Validation Check
A screen input form is being developed which will be used none
for entering the details of each book into the system in none
turn. The librarian will input the details into the Books file Price
for each book using this form.
Design a screen input form that can be used for the input
of book details.
[7]
Your form should have at least 8 appropriate fields with c Identify three items of test data which could be used
enough space for their entry. with the Price field giving reasons for your choice. [6]
There should also be some navigation included on the (Cambridge IGCSE Information and Communication Technology
form to make it easy to use. [10] 0417/11 q14 Oct/Nov 2012)
8 A company is going to replace its existing computer system 10 Iqbal wants to test the new computerised payroll system he
with a new one. would like to introduce to his company. No company worker
is paid less than $100 and no worker is paid more than
Put the following steps into the correct order that the
$500.
systems analyst would follow:
Explain what is meant by the following three types of test
Implement the new system.
data using examples of the wages paid to workers.
Develop the new system.
Normal
Collect information about the existing system.
Abnormal
Evaluate the new system.
Extreme [6]
Design a file structure. [5] (Cambridge IGCSE Information and Communication Technology
(Cambridge IGCSE Information and Communication Technology 0417/11 q16 May/Jun 2013)
0417/11 q11 May/June 2014)
88
8 Safety and security
This chapter looks at safety and security when using computer
systems. There are a number of ways in which the use of computers The key concepts covered in this chapter are:
can physically harm you and steps should be taken to reduce or Physical safety
eliminate these dangers. When you are using the internet you may e-safety
encounter people you don’t know and these people could harm
you. Again, you must be able to recognise the dangers and take
measures to protect yourself. As well as ensuring your safety, you
must also ensure the safety of your computer system to protect it
from hackers, who may try to steal your identity, and from viruses,
which can cause you to lose files.
(7 marks) The strategies you can use to minimise these e-safety issues include:
2 The head teacher of a school wants to make working in Not including personal data in any email.
computer rooms as safe as possible. A number of safety Not opening emails from people you do not know.
risks have been identified. For each one of the following Not opening file attachments from people you do not know as
risks, describe a measure which the head teacher can put they may be offensive pictures or viruses that can infect your
in place so as to reduce the danger. computer.
a Tripping (1 mark) Not including details of your school or pictures of yourself in
b Electrocution (1 mark) school uniform included in or attached to emails.
c Fire (1 mark)
d Heavy equipment falling (1 mark) Evaluating your own use of social media/networking
sites, instant messaging, internet chat rooms and
3 Working in ICT exposes you to a number of health and
using strategies to minimise potential dangers
safety risks.
You need to consider how you use social media/networking sites,
a Explain the difference between a health risk and a
instant messaging and internet chat rooms and how you might be
safety risk. (2 marks)
exposing yourself to the following e-safety issues:
b Describe two safety risks that you are likely to
encounter in a computer room and explain what Following links which lead you to undesirable content or fake
can be done to help prevent the risks. (4 marks) websites designed to steal personal data or money.
Sharing personal information from which you can be identified.
Downloading music, films etc illegally.
The details you should not disclose to strangers include the following:
Not keeping your parents aware of what you are doing online.
Own name
The strategies you can use to minimise these e-safety issues include:
Address
School name Know how to block and report unwanted users.
A picture of yourself in school uniform Never arranging to meet anyone on your own and tell an adult
and meet in a public place.
You must ensure you do not give these details in chat rooms or on social
Never include images that are in any way rude as these could
media sites or gaming sites as these details can be used to identify you.
be used to threaten you in the future.
Only use appropriate language (i.e. no swearing that can offend).
Evaluating your own use of the internet and using
Respect confidentiality. If someone tells you something
strategies to minimise potential dangers private then you should not repeat it to others.
You need to consider how you can use the internet so as not to
expose yourself to e-safety issues such as:
e-safety
Accessing web pages with offensive, violent or undesirable content.
e-safety is about using the internet in a safe and responsible way.
Accessing sites promoting inappropriate behaviours such as
There is an unpleasant/dangerous side to the internet and this
eating disorders and drug use.
90 Accessing sites which are known to be a source of viruses.
8 S AFETY AND SECURITY
leaves individuals vulnerable to accidental or deliberate harm. link in the email you will be taken to a fake site where you
e-safety is needed so that: could be tricked into entering personal information.
You may receive an SMS message (i.e. a text) containing a
you are kept safe from physical harm
web address (i.e. a URL) or a telephone number to ring and if
you are not frightened or worried by bullying or stalking
you reply you will be asked for personal details which can be
you are not exposed to offensive or violent images/material
used to commit fraud. This is referred to as smishing.
you are not tricked into committing a crime such as
You may be asked to enter payment details into a fake website.
downloading copyrighted material illegally
The fake website looks similar to a genuine website except not
There are a number of precautions to take when using the internet all the links work and a secure link which starts with https is
and these include the following: not included in the URL (i.e. web address). Also look for the
padlock symbol showing that the site is a trusted site.
Never arrange to meet an online ‘friend’ on your own – always
take a responsible adult with you. When you find any of the above you should report them usually to
Never reveal personal information such as your name, the internet service provider or the organisation they are using for
address, school name, photograph, or any other information their internet connection.
from which you can be identified.
To avoid the disclosure of personal information you should not:
Use only those websites that are recommended by teachers or
your parents. Enter personal details in response to emails or SMS
Parents should supervise internet use where possible. messages.
Do not open an email from an unknown person. Follow links from emails and then enter personal details.
Do not open email attachments from strangers. Enter personal details into sites which do not start with https
Send emails only to people you know. in the URL.
Do not use your real name when playing games online. Give out personal details to people you do not know or trust.
Use a search engine which has a parental guidance
setting which your parents can set so that it filters out any Security of data
unsuitable content. Hacking and its effects
Do not email a picture of yourself in school uniform or give Hacking is the process of accessing a computer system without
out the name of your school. permission. Hackers often access a computer system using the
Know how to block and report unwanted users in chat rooms. internet. In most cases the hacker will try to guess the user’s
password or obtain the password another way.
Precautions to take when playing games on
the internet Some hackers just hack to see if they can enter a secure system
Many computer games are played with others over the internet. while others do it to commit fraud by making alterations to the
Most people use a fictitious name when playing games so you are data, etc. In most countries hacking is a crime but it is quite hard
unaware of who they really are. There are a number measures you to prove as it is necessary for it to be proved that the hacker
can take to protect yourself when playing online games and these deliberately hacked into the system.
include the following. Sometimes special software is installed on a user’s computer
Don’t reveal personal information such as your name, addresses without their permission and it can log the keys that the user
and passwords to anyone when playing online games. presses, which can tell a hacker about usernames, passwords,
Playing online games if you have anti-virus/antispyware emails, etc. This software is called spyware or key-logging software.
software included on your computer. This will help protect
against identity theft. The effects of hacking
Always buy new games and downloadable games from Once a hacker has gained access to a computer system there are
reputable sources as illegal copies of games are often a number of things they might do, including:
sources of computer viruses. Stealing credit card and bank account details for fraud or
identity theft.
How to recognise when someone is Stealing customer information or other important business data.
attempting to obtain personal data Stealing passwords for access to your internet service provider.
This means they will be able to use your internet connection
There are a number of ways you can recognise that someone is
for free.
attempting to obtain personal data from you, and these include
Stealing your email addresses which can then be used for
the following:
spamming.
They may send an email saying that your inbox is full or that
Using your computer for the sending of spam without your
your email account will be suspended unless you validate your
knowledge.
account by sending some personal details. If you click on the
91
Use of firewalls When using passwords:
Firewalls were introduced on page 37. Firewalls work like a filter
Do not write your password down.
between your computer/network and the internet and you can control
Change your password regularly (usually the system will
what comes in and what goes out. A firewall blocks other computers
prompt you to do this automatically).
from accessing your computer/network using the internet. Without a
Do not tell anyone else your password.
firewall someone could hack your computer and access the data held
Do not use your user-ID as your password.
or load a malicious program that can be used to steal passwords,
Never respond to an email that asks you for your password.
personal data including banking details. In addition to keeping out
hackers, here are a few of the other things firewalls do: Digital signatures
They can be programmed to prevent access to certain Ordinary signatures can be used to check the authenticity of a
websites such as social networking sites. document. By comparing a signature you can determine whether
The firewall can be used to block access to certain a document is authentic. When conducting business over the
undesirable sites. internet you also need to be sure that emails and electronic
Firewalls can restrict searches so that searches made using documents are authentic. Digital signatures are a method used
certain words are not allowed. with emails to ensure that they are actually from the person they
say they are from and not from someone pretending to be them.
Authentication techniques
KEY WORD
Authentication techniques are those techniques that are used
to check that a person accessing a network or communications Digital signature a way of ensuring that an email or
system is the genuine person. They can also be used to ensure document sent electronically is authentic. It can be used
that an email sent by a person is genuinely from them and not to detect a forged document.
somebody pretending to be them.
The main authentication techniques are: Authentication using biometric data
Many systems use biometric data to authenticate someone as an
Usernames and passwords
allowable user of a computer system. These biometric methods include:
Digital signatures
Biometrics. Fingerprint recognition
Retinal scans
Identifying the user to the system: usernames Iris scans
A username is a series of characters that is used to identify a Face scans.
user to the network. A username must be unique, meaning that
no two users will have the same username. The person who looks Biometric methods for the authentication of a user have the
after the network will use this to allocate space on the network following advantages:
for the user. It is also used by the network to give the user access There is nothing to forget such as a key fob, card, etc.
to certain files. The network manager can also keep track of what It is almost impossible to forge a fingerprint, face, etc.
files the user is using for security reasons. It is easy for someone else to access a card, fob, etc., but
Preventing unauthorised access to the system: with a biometric method, the person allowed access has
to be present.
the use of passwords
A password is a string of characters (letters, numbers, and The security of data online
punctuation marks) that the user selects. Only the user will know Online services such as email, banking, shopping, etc., all need
what the password is. When the user enters the password, it to be used with care and there are a number of ways in which
will not be shown on the screen. Only upon entry of the correct we can protect against malicious actions when we use these
password will the user be allowed access to the network. services. This section looks at the problems and ways in which we
can ensure the security of our online data.
Characteristics of good passwords
A good password that will keep out hackers should have the Digital certificates
following characteristics: A digital certificate is an attachment to an electronic message
Do not use a word that can be found in a dictionary. used for security purposes. A digital certificate verifies that a user
Do not use your own or any other name or surname even if sending a message is who he or she claims to be and it also
you put numbers after it. provides the receiver with the means to encode a reply.
Include numerals as well as letters. Secure Socket Layer (SSL)
Include a mixture of upper and lower case letters but try not SSL is a standard used for security for transactions made using
to make the first letter a capital letter. the internet. SSL allows an encrypted link to be set up between
If the password system allows, put other characters in your two computers connected using the internet and it protects the
92 password like £, &, %, $, @, etc.
8 S AFETY AND SECURITY
communication from being intercepted and allows your computer Un-moderated forums allow people to post whatever they want on
to identify the website it is communicating with. the forum. This means you can get rude and offensive messages.
Some of these forums may be used by people pretending they are
The encryption prevents your details, such as credit card and
someone they are not and they may use the forum maliciously.
banking details, from being stolen and used maliciously.
They may use the forum to try to obtain personal details about you.
Using most browser software, you can tell that you are on a SSL
There are dangers lurking in un-moderated forums as they are not
on a secure server as the web address begins with ‘https’ and
policed by a moderator and they should be avoided.
there is a padlock shown on the page.
Spam
Phishing, pharming and smishing Spam is email that is sent automatically to multiple recipients.
There are a number of methods fraudsters will use to try to trick you
These emails are unasked for and in the main about things you
into revealing personal information that may include credit card and
are not interested in. Spam is also called junk email and in most
banking details, and these methods are outlined here.
countries, the sending of spam is not illegal despite organisations
Phishing wasting huge amounts of time getting rid of it.
Phishing is fraudulently trying to get people to reveal usernames,
There are a number of problems with spam:
passwords, credit card details, account numbers, etc., by sending
them emails that appear to be from a bank, building society, credit It can take time looking at the email names of spam before
card company, etc. The message in the email typically claims that deleting it.
there has been a problem with your account and it asks you to Spam can sometimes be used to distribute viruses.
update (reveal) information such as passwords, account details,
People who collect email addresses for the purpose of sending
etc. Under no circumstances should you reveal this information. If
spam are called spammers. They collect email addresses from
you do then these details will be used to commit fraud.
chat rooms, mailing lists, social networking sites, etc.
Pharming Spam filters are software used to filter out spam from legitimate
Pharming is where malicious programming code is stored on a email. The problem is that some spam gets through and some
computer. Any users who try to access a website which has been stored legitimate email ends up as spam. This means you cannot just
on the computer will be re-directed automatically by the malicious delete all the emails in the spam folder in one go.
code to a bogus website and not the website they wanted. The website
they are directed to looks almost the same as the genuine website. In KEY WORDS
many cases the bogus website is used to obtain passwords or banking
details so that these can be used fraudulently. Phishing tricking people into revealing their banking or
credit card details using an email.
Pharming is similar to phishing but instead of relying on users Spam unsolicited bulk email (i.e. email from people you
clicking on a link in a fake email message, pharming re-directs do not know, sent to everyone in the hope that a small
victims to a fraudulent website even if they type the correct web percentage may purchase the goods or services on offer).
address of their bank or credit card company into their web browser.
Smishing
Activity 8.1
Smishing is a combination of the terms SMS and phishing and it
uses text messaging (SMS) rather than email to send fraudulent
Identity theft is a real problem for all computer users. It
messages that try to steal your credit card, banking or other
puts off many people from banking online or buying goods
personal details. Some of these messages may say you have won a
and services over the internet where they have to input
prize or that your account details need updating and if you click on
their card details.
the link you will be taken to a fraudulent website where you will be Perform some research using the internet so you can write
asked to enter your personal details. If you enter your details then an article in your own words entitled ‘What we can all do to
it is likely that your details would be used to commit fraud. protect ourselves from identity theft’.
You will need to mention the following in your article along with
Moderated and un-moderated forums and the your own ideas of what you feel the readers should know:
security offered by them What identity theft is
An online forum is a discussion on the internet where people can The consequences of identity theft
join the discussion and add their comments. Phishing
Moderated forums have a person called a moderator who checks Pharming
the comments before posting them on the forum. The moderator Smishing
will check that a post on the forum is not spam, is not rude or Un-moderated forums
offensive and does not wander off the topic being discussed. What you can do to ensure that you are not the next victim.
93
Recognizing spam email and avoiding being drawn into it Spelling and grammatical errors often indicate spam. Often
It is important to be able to recognise spam from legitimate they originate from different countries so they are not as
email. Here are some of the ways you can identify spam: familiar with spelling and grammar.
Look for emails that say that they are from your bank, credit
Look at the email address. If contains strings of alphanumeric
card company, internet service provider, etc. If they were
characters before the @ symbol, then it is probably spam.
genuine, they would never ask for your account or other
Look at the email address to see if you are familiar with it or it
personal details including your PIN.
has the person’s name followed by @name of organisation.com.
Genuine emails would address you by your name or have
For example, [email protected]
the first or last few digits of your credit card number or
If there is a link in the body of the message where you have to
account number. If the email addresses you generically
click on a link to correct something (e.g. keep your continued
(e.g. dear member, dear customer etc.), then it is likely to
use of a service) then it is likely to be spam.
be spam.
Asking you to do something immediately or quickly indicates
spam. This is because the email you will be replying to is
changed after a couple of days so the spammers do not Encryption
get caught. Because so many people use a network it is important to ensure
that the system is secure. If there is access to the internet via the
network, then there needs to be protection against hackers. These
hackers could simply intercept and read email or they could
Q U E S TION S B alter data or collect personal details and credit card numbers to
commit fraud.
1 a Explain the meaning of the term spam. (1 mark) Encryption is used to protect data from prying eyes by scrambling
b Describe two ways in which spam causes data as it travels over the internet. Encryption is also used
annoyance to computer users. (2 marks) when saving personal data onto laptops or removable storage
c Give one method that can be used to reduce devices. If any of these gets lost or stolen then the data cannot
the amount of spam. (1 mark) be understood. Only the authorised person being sent the
d Give two ways of identifying a spam email. (2 marks) information will have the decryption key that allows them to
2 Tick True or False next to each statement. unscramble the information.
Encryption should be used for the following:
True False
Unsolicited email is called spam. Sending credit card details such as card numbers, expiry
Pharming uses SMS to collect card details. dates, etc., over the internet.
Online banking.
Pharming uses programming code which
Sending payment details (bank details such as sort code
has been put on the user’s computer
without their knowledge.
numbers, account numbers, etc.).
Confidential emails (e.g. with personal or medical details).
Spam is fake messages trying to steal your
personal details.
Sending data between computers on a network where
confidentiality is essential (e.g. legal or medical).
(4 marks) Storing sensitive personal information on laptops and
portable devices and media.
3 Discuss the different ways of authenticating a
computer user. (5 marks)
KEY WORD
4 A parent is worried about the e-safety of their
Encryption the process of scrambling files before they
young child when they are using the internet.
are sent over a network to protect them from hackers.
a What is meant by the term e-safety? (2 marks)
Also, the process of scrambling files stored on a computer
b Describe four actions the parent can take
so that if the computer is stolen, the files cannot be read.
to improve the e-safety of their child’s
computer use. (4 marks)
Computer viruses
5 Many internet users participate in forums. Viruses pose a major threat to ICT systems. Once a computer
a Explain what is meant by a forum. (1 mark) or media has a virus copied onto it, it is said to be infected.
b Forums can be moderated or un-moderated. Most viruses are designed to do something apart from copying
i Explain the difference between moderated themselves. For example, they can:
and un-moderated forums. (2 marks)
ii There are more dangers when using Display annoying messages on the screen
un-moderated forums. Explain why. (2 marks) Delete programs or data
94
8 S AFETY AND SECURITY
Use up resources, making your computer run slower The use of pharming, phishing, and smishing to trick you
Spy on your online use – for example, they can collect to reveal credit card and personal details in response to
usernames and passwords, and card numbers used to make messages you receive on your computer or mobile phone.
online purchases. Hacking into secure sites to obtain the details.
One of the main problems is that viruses are being created all the Here are some precautions you can take to help prevent
time and when you get a virus infection it is not always clear what fraudulent use of credit cards online.
it will do to the ICT system. Apart from the damage many viruses
Do not follow a link and then enter your credit card details as
cause, one of the problems with viruses is the amount of time
the site could be phony.
that needs to be spent sorting out the problems that they create.
Always check that your credit card details will be encrypted by
All computers should be equipped with anti-virus software, which
checking that the web address of the page starts with https.
is able to detect and delete the majority of these viruses.
Do not write your credit card details down and ensure that you
do not leave your credit cards lying around for others to see.
Preventing a virus attack
To prevent a virus attack you should:
The security of data in the cloud
Install anti-virus software People use all sorts of computers to access their data. For
Not open file attachments to emails unless you know who they example, they may do most of their work on a desktop but when
are from they are out they may want to access their data using a tablet or
Not allow anyone to attach portable drives or memory sticks smartphone. The problem is that copying the data from one device
to your computer unless they are scanned for viruses first to another takes time and you have to be careful about which files
Not download games and other software from a site on the are the latest version otherwise you can end up losing work.
internet unless it is a trusted site.
Storage in the cloud is a way of storing data in one place so that
Anti-virus software should be kept up-to-date and scans should it can be accessed by all your devices as long as you have internet
be scheduled so that they are performed automatically on a access. Basically you store your files on a file server in a remote
regular basis. place (called the cloud) and you access your files using a user-ID
and password. Sometimes the organisation providing the storage in
KEY WORDS the cloud provides it free and other times you pay a subscription.
Virus a program that replicates (copies) itself There are a number of security issues with data stored in the
automatically and can cause harm by copying files, cloud and these include:
deleting files or corrupting files.
Anti-virus software a program that detects and removes The company providing the storage could go out of business.
viruses and prevents them entering a system. If this happens then you have to consider what would happen
to your data.
Some of the data could be personal data, in which case it
The dangers of using a credit card online should be encrypted so that if it is hacked into, hackers would
Credit cards are designed to make purchasing online easy. not be able to understand and use the data.
The trouble is possession of your credit card details along You have to trust that the organisation providing the storage
with some personal information about you can make it easy puts in all the security measures to keep your data safe.
for criminals to make purchases using your card. Using this Who owns the data when it is stored in a cloud? When
information they can also apply for new credit cards or loans photographs are stored using some cloud storage
without your knowledge. organisations, you have to give permission that anyone can
Here are some of the ways fraudsters can obtain your credit card access and use the photographs you store.
and personal details:
Physical security
The use of key logging software. Key logging software could
be put on your computer without your knowledge and this Physical security involves:
records your keystrokes and allows a fraudster to obtain your Locking doors to offices and computer rooms.
passwords, credit card details, and personal information. Not leaving your computer logged in when you are away from
Once they have enough information they can steal your your desk.
identity and commit fraud. Ensuring that there are no shoulder surfers looking at your
The use of bogus sites. Bogus sites are similar to the real screen when you enter a password.
sites except their purpose is to steal your credit card and
personal information when you make purchases.
95
The effectiveness of different methods of
increased security
There are lots of different methods by which you can increase the
security of your data and it is best when all these methods are
The following notes summarise this chapter, but they
used together. No matter how much security is in place there are
have missing words. Using the words below, copy out and
always weaknesses that can be taken advantage of by a skilled
complete sentences A to K. Each word may be used more
and determined hacker. For example firewalls prevent people
than once.
outside using the internet to access your computer/network.
However it would not prevent someone who is internal to an files download encrypted spam
organisation (and therefore is able to access the network), from passwords hacking phishing hackers
accessing some data for which they are not allowed access. firewall fake pharming biometric
digital signatures anti-virus
Anti-virus software will check against known viruses and new
viruses which have certain characteristics but people who produce A To protect data from deliberate damage caused by
viruses are constantly finding other ways to distribute viruses. hackers illegally gaining access to a computer network
via the internet, a _____ should be used.
Encryption methods have improved but hackers are still able to
B In order to prevent viruses entering an ICT system,
access some of the most secure systems such as those of banks
_____ software should be used to search for and
and the security services.
destroy viruses.
C Users should be told not to open _____ attached to
QU E S TIONS C emails unless they know who they are from.
D Users should also be told not to _____ music and
1 a Explain what is meant by a computer virus. (2 marks)
games illegally off the internet from file sharing sites.
b Describe steps a computer user can take
to prevent computer viruses from infecting E Unauthorised use of an ICT system with a view to
their computer. (3 marks) seeing or altering the data is called _____.
F _____ means sending emails which falsely say they
2 a Explain what is meant by hacking. (2 marks)
are from banks or other organisations in order to trick
b Describe the steps a computer user can
people into revealing their banking or credit card
take to help prevent hacking. (3 marks)
details.
3 Tick True or False next to each of the statements. G It is possible to use special software to filter out
unwelcome emails, which are popularly called _____.
True False
Email attachments can contain viruses. H _____ is where program code is deposited onto a
user’s computer or onto a server in the case of a
Viruses consist of programming code
network. When the user types in the web address
designed to cause harm to your computer
or annoyance. of a real website such as a bank’s website, they are
instead re-directed to a _____ website.
It is impossible to hack into a computer
without using the internet. I When credit card details are sent to make a payment
Anti-virus software must be kept for goods bought from an online retailer, the details
up-to-date. are _____ and this prevents them being understood
by _____ if they are intercepted.
(4 marks)
J User-IDs and _____ are used to authenticate users
4 Computer viruses pose a serious threat to all computer of computer systems and are methods which make
systems. use of properties of the human body. These methods
a Give the name of the piece of software that can be used are called _____ methods and include fingerprint and
to check for viruses and also remove them. (1 mark) retinal scanning.
b Describe two actions that may be taken, other than K _____ are used to ensure documents sent over the
using software, to prevent viruses from entering internet are authentic.
a computer system. (2 marks)
5 Many people are now storing their data in the cloud.
a Explain what the above statement means. (2 marks)
b Describe one advantage in storing your
data in the cloud. (1 mark)
c Describe the security issues when you
96 store your data in the cloud. (4 marks)
8 S AFETY AND SECURITY
REVISION QUESTIONS
1 Many people now store their data (documents, photographs, music, etc.) in the cloud.
a Explain what is meant by storage in the cloud. [1]
b Give one advantage and one disadvantage of storing data in the cloud. [2]
2 For each statement, tick the box indicating whether it refers to smishing, phishing
or pharming.
True False
Tripping accidents can be caused by trailing wires.
It is safe to use lots of multi-sockets connected to the one plug.
Overloaded power sockets can cause fires.
Waste paper bins should be emptied regularly to reduce the fire risk.
[4]
4 A school uses a website which students and parents can access from home. There is an area on
the website where students can access the marks they obtained for homework and tests. Only the
student or their parents should be able to access this area.
a Describe three ways the school could ensure that there is no unauthorised access to the area
containing the marks. [3]
b The school is worried about viruses infecting their computer system. Describe three things the
school should do to reduce the likelihood of a virus attack. [3]
5 A user is ordering goods from an online supermarket.
They have ordered the goods and are on the checkout web page where they are asked to enter their
payment details.
a The web page says it uses SSL.
i Give the meaning of the abbreviation SSL. [1]
ii Explain how SSL is used to make it safe to enter credit card details. [1]
b Apart from the site saying it uses SSL, how else could you tell that the site was using a secure
server for entering credit card details? [1]
6 Young people must be careful about using email services.
Describe three actions you should take in order ensure your e-safety when using email services. [3]
7 A bank customer is using online banking to pay an electricity bill.
Describe three methods of ensuring that the data being transferred is secure. [6]
97
EX AM -ST YL E Q UE ST I ON S
1 There are many examples of abuses of the internet. 9 Tick True or False next to each statement.
Explain what is meant by the following terms. [2]
True False
a Pharming
b Phishing Using a password always prevents
unauthorised access to data.
2 Spam causes annoyance to computer users. A strong password is one that is difficult for a
Explain what is meant by spam and give one example of hacker to guess.
why it causes annoyance to computer users. [2] Giving your password to a friend is a good idea
3 There are a number of health and safety issues caused by in case you forget it.
the use of computers. [4] If you forget your user ID you can still gain
a Describe two health issues that are caused by access to data using you password.
computer use. [4]
b Describe two safety issues that are caused by
(Cambridge IGCSE Information and Communication Technology
computer use. 0417/11 q9 May/Jun 2012)
4 Here are some statements. You have to tick whether the 10 The head teacher of a school is concerned that students
statements refer to pharming or phishing. may be hacking into the exam scores database to change
Pharming Phishing their marks.
Malicious programming code is stored Other than passwords, describe ICT methods that could be
on a computer. used to prevent this from happening. [4]
Emails are sent pretending to be from
(Cambridge IGCSE Information and Communication Technology
your bank. 0417/11 q17 May/Jun 2013)
You are re-directed to a bogus/fake
website. 11 Working with ICT equipment is fairly safe but you do need
Uses emails for identity theft. to check the way you are working to ensure you are working
safely and not exposing yourself to possible health problems.
[4]
Describe three checks you can make on the way you work
5 Young people need to be aware of e-safety when using the with ICT equipment to minimise any potential dangers. [3]
internet.
a Explain the meaning of the term e-safety. [2] 12 a Describe what is meant by personal data. [2]
b Discuss why e-safety is important when young b Give two items of personal data you should never
people use the internet. [5] give to a stranger. [2]
c Describe two reasons why e-safety is needed when
6 Chat rooms and social networking sites present many you are online. [2]
dangers to young people.
13 Here are some statements about the effectiveness of
Describe three precautions a young person can take to increased security.
ensure their safety when using chat rooms and social
networking sites. [3] Tick whether these statements are true or false.
7 Banks keep their customer account records on their file True False
servers. Firewalls prevent people from inside and
a Describe three ways in which hackers could misuse outside the organisation accessing a
this data. [3] computer/network.
b Describe the purpose of three different authentication Anti-virus software will detect all viruses.
techniques. [3] It is impossible for hackers to understand
(Cambridge IGCSE Information and Communication Technology encrypted data.
0417/11 q14 May/June 2014) [3]
8 Explain how a firewall could be used to secure the data in a 14 Most computers have internet access.
computer connected to the internet. [3]
Explain two reasons why the internet is so popular. [2]
(Cambridge IGCSE Information and Communication Technology
0417/11 q5 Oct/Nov 2012)
98
9 Audience
When developing ICT solutions you must have a clear understanding
of who your audience is for the solution. This is important as it will The key concepts covered in this chapter are:
influence your choice of design, reading age of text, complexity of Audience appreciation
the user interface, font and font size, the use of images, complexity Legal, moral, ethical and cultural appreciation
of language used, etc. When developing an ICT solution you will need
to also be aware of the legal, moral, ethical and cultural needs of
your audience. You need to be aware of all these so that you do not
offend any of your intended audience. You also need to consider
the legal, moral, ethical and cultural implications that might apply
to your proposed solution.
99
Analysing the needs of an audience Legal, moral, ethical and cultural
Suppose you are asked to design and produce a website. You appreciation
would need to consider the needs of the audience and analyse
When creating ICT solutions, you must consider the legal, moral,
how your solution can meet these needs. The two diagrams below
ethical and cultural implications of your solution.
show the needs for two different audiences for a website:
Legal implications
Uncluttered page Any ICT solutions must not break any laws. Hence they should:
Lots of images
design
not breach copyright
do what they are supposed to do, otherwise they would
breach trading standards legislation
Website/
Use fun animations presentation be safe to use otherwise it would breach health and
Very easy navigation
such as cartoons aimed to young safety legislation.
children
Copyright and software piracy
When people produce software, their software is protected by
No long words or Lots of bright copyright, which makes it an offence to copy the software in
sentences colours ways that are not allowed by the software licence. Software
piracy is the illegal copying of software. It is important to note
that it is not illegal to copy all software. For example, if you have
More complex
Longer sentences bought some software, then you may be allowed to copy it onto
page design
more than one computer if the software licence allows it. You
may also be allowed to take a backup copy of the software for
Website/ security purposes.
More subtle presentation Longer words
colours used aimed at The need for copyright legislation
adults Many people spend a lot of time and money creating original
work such as a piece of music, a picture, a piece of software, a
photograph, a newspaper article, etc. Many of these people do it for
More complex Images more
navigation appropriate for adults
a living, so it is only fair that their work should not be illegally copied.
Most countries use copyright legislation, which makes it illegal for
intellectual property to be copied such as:
Reasons why ICT solutions must meet the needs
of the audience Software
Many ICT solutions are developed which do not meet the needs Text (books, magazine articles, etc.)
of the audience. You have probably visited websites that are A new innovative human–computer interface
frustrating to use or do not enable you to obtain the information Hardware (a flexible screen, the design of a power saving
you want. Here are some reasons why any ICT solution should chip, etc.)
always meet the needs of the audience: Books and manuals
Images on websites.
The whole point of an ICT solution is to solve a problem and
if it fails to provide a solution it will be of no use. Here are some actions that would be illegal:
People will not use an ICT solution that does not meet Copying software and music without permission or license.
their needs. Copying images or text without permission or license.
It will be frustrating to use and annoy the users. Copying sections of websites without permission.
If the solution is too complex, then the users it is aimed at Sharing digital music illegally using file sharing websites.
will not be able to use it. Running more copies of software than is allowed by the
If users have paid for the solution, they are entitled to their site licence.
money back if it fails to do what it is supposed to do.
KEY WORD
Copyright legislation – laws making it a criminal offence
to copy or steal software.
100
9 AUDIENCE
The moral and ethical implications of Use of programming code – the program code can be altered to
software piracy help block copying.
You may think that software piracy does not really hurt anyone as Use of guards – guards are hardware or software modules that
it is only the software companies (that have lots of money) that keep a check on the program as it is being run to ensure that it
are affected. The truth is it affects everyone and here is how: has not been tampered with in any way.
It is against the law and is a crime punishable by a fine or a
Moral implications
jail sentence.
Morals are norms based on definitions of right and wrong. Most
It is theft as it deprives the owner of payment for their work.
people accept that telling lies is morally wrong so a website
The money from software piracy can be used to fund other
where people are able to say what they like about people even
illegal activities such as drug dealing, people trafficking, etc.
when it is incorrect would be morally wrong. A computer game
Not everyone who produces software is wealthy and many rely
that encouraged violence would be morally wrong.
on this income for their everyday living expenses.
Companies will not invest in new software, if they think they Any ICT solution must not:
will lose potential income through illegal copying.
Offend the majority of people
Internet service provider (ISP) denying service Encourage violence
An internet service provider is the organisation that provides Encourage people to lie about others.
most people with their internet connection. If you are caught
Cultural implications
illegally downloading music, video and other files then your ISP
Culture is the way beliefs and history influence society. An
could deny you connection to the internet. The aim of this is to
ICT solution which is acceptable in one country may not be
prevent persistent offenders from gaining internet access.
acceptable in another country because of cultural differences.
How software producers attempt to prevent copyrighted Make sure that any documentation and training manuals have
software being illegally copied an easy-to-understand language for any group of individuals.
Preventing copyrighted software from being illegally copied is very Determine a common language that all users of the solution
difficult. There are a number of methods used such as: can understand.
Encryption of the execution code – the execution code enables Address someone correctly – addressing someone using the
the software to run. This code is encrypted and a key is needed to wrong title may not matter in one culture but could offend
unlock the code to enable the software to be used. someone from a different culture. For example, the use of a
forename before you have met the person is acceptable in
Use of a digital signature on the DVD/CD containing the some cultures but not others.
software – this prevents the software being copied exactly.
Policing the internet
Use of an activation key – when you purchase software, after Many people think the internet should be policed so that all the
loading it on your computer, you will be asked to activate the inappropriate sites (how to make bombs, how to grow drugs,
software by going onto the software producer’s website and then pornography, paedophilia, etc.) could be closed down. Others
entering a product activation key (a long code). see policing the internet as an infringement of human rights.
Use of a dongle – a dongle is a piece of hardware that attaches The reasons for and against policing the internet are covered in
to a computer using the USB port and allows a secured piece Chapter 4.
of software to run. The dongle contains an electronic key that An attempt has been made to police the internet in certain
unlocks the program on the computer and allows it to run. countries. In some countries all internet access is controlled
Making a copy of the dongle is hard. which means you are not free to access all parts of the internet.
101
REVISION QUESTIONS
1 Explain the term software piracy. [2]
The following notes summarise this chapter, but they have 2 When creating an ICT solution you must first analyse the
missing words. Using the words below, copy out and complete audience’s needs.
sentences A to I. Each word may be used more than once.
Describe why this is necessary. [2]
legislation dongle money encrypt piracy
3 Tick True or False next to each of these statements. [5]
digital viruses needs audience
True False
A When designing an ICT solution to a problem you should
The illegal copying of computer
always think about the requirements of your intended
software is an example of software
_____.
piracy.
B The audience will have _____ which have to be satisfied by Copying software is always illegal.
your ICT solution.
Software piracy is acceptable as it
C The illegal copying of computer software is called software helps us obtain software cheaper or
_____. sometimes even for free.
D Copyright _____ are laws which make it a crime to illegally Software licences usually allow
copy software and other copyrighted material such as text, you to run a certain number of
images, music, etc. computers with the same software.
Copying deprives small software
E Copying software illegally is no different from stealing, as it
producers of money.
deprives someone of _____.
F You have to be careful of illegally copied software as it often
contains _____ that can be copied onto your computer.
G One method that software producers use to prevent illegal E XA M -S T Y L E QU E S T I ONS
copying of software is by the use of a _____.
1 Most countries have copyright laws which make it a crime
H Some software producers _____ the execution code of the
to copy software illegally.
software so that a key is needed to unlock the code and
a Describe why copyright laws are needed. [2]
allow the software to run.
b A copyright law will make it illegal to copy
I A _____ signature can also be used to help prevent illegal software in certain situations.
copying. i Describe a situation where the copying of
computer software would be allowed. [1]
ii Describe two terms a copyright law would
have in it. [2]
2 A website is being designed for children
aged 4 to 6 years old to help them read.
Explain, using this example, why the audience’s
needs should be taken into account in the
design of this website. [4]
3 It is reckoned that about 40% of software being
used by businesses has been illegally copied.
a Explain what is meant by software piracy. [1]
b Give one reason why copyright laws are
necessary. [1]
c Software producers use methods to prevent
software copyright being broken.
Describe two methods used to help software
producers prevent their software from being
copied illegally. [2]
102
10 Communication
The main methods of communication using ICT are email and the
internet. This chapter looks at the constraints that affect the use of The key concepts covered in this chapter are:
email. Email is widely used as a form of communication and overall it Communicating with other ICT users using email
is a highly effective communication tool. Email is inexpensive, as you Effective use of the internet
require only an internet connection that is generally already present.
Although a printout of emails is possible, emails often stay as soft
copies because archiving and retrieving email communications is easy.
This topic also looks at the fundamentals of the internet as well as
the advantages and disadvantages in using the internet as a source
of information.
What is an email?
An email is an electronic message sent from one communication
device (computer, telephone, mobile phone, or tablet) to
another. All web browser software has email facilities. There
are many email facilities but those shown here are the main
timesaving ones.
Groups
Groups are lists of people and their email addresses. They are
used when an email needs to be distributed to people in a
particular group. For example, if you were working as part of a
team and needed to send each member the same email, then
you would set up a group. Every time you needed to send the
members of the group email, you could then just send the one
email to the group, thus saving time.
103
The constraints that affect the use of email Spam
When communicating using email, there are a number of Sending the same email message to large numbers of people
constraints: is a fast, easy, and cheap form of communication. This means
that you can get lots of spam email sent to you. Spam is email
The laws within a country – free communication using email is
sent to you that you didn’t ask for (unsolicited email) – usually
taken for granted in most countries but this is not always the
advertisements for services that don’t interest most people, such
case. In some countries, email is monitored and some email is
as medications and products of an adult nature. People who send
read, meaning that you cannot criticise the government or talk
spam emails are called spammers. It is has been estimated that
about certain topics freely.
about 75% of all email messages are spam.
Acceptable language – you should always be polite in an email
and avoid the use of bad language. If you send an offensive Reasons why spam needs to be prevented
email, it is easy for the police to track it to your computer since The following are reasons why spam should be prevented:
internet service providers are required by law to keep the emails Spam clogs up your inbox making legitimate email harder to spot.
for a certain period for purposes such as law enforcement. Spam takes time to delete.
Copyright – copyright laws apply to text in emails. This means that Spam can be used to spread computer viruses and malicious
if you pass on a block of text or send a picture to others without software.
the copyright owner’s permission, then this would be illegal. Unnecessary email slows the internet down.
Young children could view inappropriate message or images.
Local guidelines set by an employer – most employers will set out
in your contract of employment what you can and cannot do using Methods used to help prevent spam
email. If you do not obey these rules then you would be in breach It is impossible to eliminate spam completely but here are some
of your contract and could be dismissed. methods that can reduce the amount you receive.
The need for security – emails containing certain words will be Use spam filters – this is software that is able to recognise what
routinely examined and investigated. Many criminals use emails is and isn’t spam. Spam emails are put into a separate folder and
to communicate with each other so the law enforcement agencies can then be deleted.
continually monitor emails in most countries.
Avoid publishing your email address on websites, blogs, forums, and
Password protection – emails often contain personal information. suchlike – spammers often use these to collect email addresses.
If you can access someone else’s email, you can find out a lot
of information about them. Email services are protected by Check the privacy policy when signing up for things online –
passwords and it is up to the user to protect this password and check they won’t sell your email address to a spammer.
ensure that is not disclosed to anybody. Change your password for internet access regularly and use
Netiquette – when using email, you must learn to abide by certain strong passwords – this will keep out hackers who may steal all
rules and these include: the email addresses in your address book to sell to spammers.
Not typing in all capitals – excessive use of capitals is Web browsers and search engines
considered to be the written equivalent of shouting. A web browser is an application installed on your computer that
Ensuring that any attachments are not too large – the person provides you a graphical user interface for accessing the internet
downloading the file may not be able to download the file if (the HTTP protocol among others).
it is too large. Also large files will clog up their storage space
and will also load slowly. A search engine is an application typically installed on a server
Never divulging personal information – always consider your at a company’s data centre that you access via your web browser.
e-safety. Emails are easy to hack into. A search engine ‘crawls’ the internet categorising and storing
Emails should be concise and to the point. The reader should information about sites (metadata) so when you use your web
not have to waste time reading unnecessary information. browser to access a company’s search engine to perform a
Use plain text and do not use any fancy graphics as they load search, it provides you with relevant results (for the most part).
slowly and waste storage space. You download and install a web browser (Google Chrome, Internet
Remember to attach file attachments; people often mention Explorer, Safari, etc.) to your computer and use it to access a
them in the email and then forget to attach them. search engine on the internet.
104
10 COMMUNIC ATION
Terms used when talking about the internet data around a network. The main use of an intranet is to share
There are a number of terms used when talking about the organisational information and resources. The main feature of an
workings of the internet. Here are the ones you must understand intranet is that only employees of the organisation are able to use
and remember. it. It is important to note that an intranet need not be confined
to a single site and it is still possible for people on an intranet to
Protocol – there are different ways, called protocols, for
access the internet.
transferring data using the internet. A protocol is a set of rules
governing the format of the data and the signals to start, control, The internet is a huge network of networks. Each computer on the
and end the transfer of data. network, provided it has permission, can access the data stored
on other computers on the network and also transfer messages
HTTP (HyperText Transfer Protocol) – a protocol that defines the
between computers.
process of identifying, requesting, and transferring multimedia
web pages over the internet. world wide web (www) – the world wide web is a means of
accessing information contained on the internet. It is an
HTTPS (HyperText Transfer Protocol secure variant) – a protocol
information sharing model that is built on top of the internet.
that defines the process of identifying, requesting, and transferring
The world wide web uses HTTP, which is one of the languages
multimedia web pages over the internet, except unlike HTTP it
used over the internet, to transmit information. The world wide
uses encrypted connections to hide passwords, bank information,
web makes use of web browser software to access documents
and other sensitive material from the open network. This is to
called web pages.
prevent hackers from accessing and hence using banking details
fraudulently. The internet provides services other than access to web pages.
Using the internet you have:
Uniform Resource Locator (URL) – a web address. The system
used to identify the location of a web page or document stored Email facilities
on the internet. Instant messaging
FTP (File Transfer Protocol) which is a way of exchanging files
Hyperlink – a feature of a website that allows a user to jump to
between different computers connected to the internet.
another web page, to jump to part of the same page web page
or to send an email message. Hyperlinks can be a word, phrase All of the above services require protocols different to that
or image. required by the world wide web (which uses HTTP).
Internet service provider (ISP) – a company that provides users The internet is therefore the actual network whereas the world
with an internet connection. wide web is the accessing of web pages using the internet. It is
important to realise that the world wide web is only one of the
FTP (File Transfer Protocol) – a common protocol for the
facilities based on the internet.
movement of files across the internet. Users can access a
server that contains the file they want and then download it to
their computer using FTP. Alternatively, they can upload a file Effective use of the internet
to the server from their computer using FTP. An example of this The internet is the largest store of information in the world and
would be when you upload your web pages to a web server being able to access relevant information quickly is an important
where your website is hosted. skill which you will need to demonstrate in the examination.
Storage in the cloud/cloud storage – where your data is not stored There are a number of different ways of locating information using
locally on your computer or attached storage devices, but is instead the internet and these are described here.
stored on servers in remote locations. When you save a file it is
transferred using the internet to one of the servers which are owned Locating specified information from a given
and managed by a host company who you pay to keep your data website URL
accessible and safe. Sometimes they provide a small amount of URL stands for Uniform Resource Locator, which is a complicated
storage free and you pay extra for additional storage. Storage in way of saying a website address. One of the ways of accessing a
the cloud means you can access your files from any device such as website is to type the URL (website address) into a web browser
desktops, laptops, tablets and smartphones. or search engine. Each page of a website has its own URL and
the URL quoted in books/magazines, etc., will usually take you
The differences between an intranet, the internet, to the homepage of the website. You can then search within the
and the world wide web (www) website for the information you need by making use of links and
An intranet is a private network that uses the same technology search facilities.
as that used by the internet for the sending of messages/
105
Finding specific information using a search engine Blogs/web logs
Searching for information can be performed using a search Blogs/web logs are online diaries of events or journals. Blogs
engine such as Google or Yahoo. The search results are displayed can be about anything. Groups, singers, and celebrities have
on the basis of relevance or who has paid the most money to blogs which let people know about their life and what they are
get in the top results. Clicking on a search result takes you to a doing. Blogs are also used by politicians, and for collecting public
website and may take you straight to the information you want opinion about certain topics.
or you may go to the home page of the website. It may then be
Features of a blog:
necessary to perform a search of the content of the website. This
is done by entering key words into a search box.
A blog usually has
Uses external links
just one author
http://www.oup.com
There are a number of different parts to this web address.
Wikis
A wiki is a web page that can be viewed and modified by anyone
http:// stands for HyperText Transfer Protocol and this helps your who has a web browser. This means that anyone with a web browser
web browser locate the website. You do not have to type it with can change the content of a web page. The problem with this is that
some web browsers as it is added automatically. someone could alter the web page to post incorrect information or
even offensive messages.
www. stands for world wide web which means the page you are
looking for is on the world wide web. You will have seen the online encyclopaedia Wikipedia. This
encyclopaedia has been created by ordinary people and anyone
oup. is the name of the server or website where the website or
can add material or delete material from it. You may think this is
web page is located. In many cases it will be the name of the
bad idea, but if someone posts incorrect information then there are
organisation or an abbreviated version.
plenty of people around who will view it and correct it. This means
.com is the domain which tells you where the web page is that information from sites like Wikipedia may contain inaccurate
registered and also what type of website it is. For example .com information – you should always check the information with other
tells you that it is a commercial site. Other common domains more reliable sources.
include .org (sites for organisations), .edu (sites for schools
Features of a wiki:
and colleges), .ac (sites for universities), and .gov (sites for
government departments).
Sometimes there are suffixes such as .co.uk which tells you Uses both internal
Usually has
and external links
that the site resides in the UK. There are suffixes for most other many authors
countries as well.
Sometimes there will be a slash (/) following the domain The structure is
name. For example, http://www.cie.org.uk/programmes-and- Contributors are able Features determined by
to edit entries of a wiki the content
qualifications. The / followed by another word or words lets
and users
you know that you are going to a different area or page on that
website. In the example, you will be taken to the programmes-
and-qualifications page on CIE’s (Cambridge International Usually objective
Examinations) website. You can have slashes after this showing
pages that are linked in a hierarchy.
106
10 COMMUNIC ATION
Social networking websites might assess the worth of the information and how you can check
Social networking websites are virtual communities of people its accuracy.
who communicate about a particular subject or interest or just
make friends with each other. Members of these sites create Unreliability of information on the internet
their own profiles with information about themselves such as Many people think that because information is published on
hobbies, likes and dislikes, etc. You have to ensure that you do the internet it must be true. This is far from the truth, as there
not reveal too much information about yourself as others view are many examples of sites that contain material which is
this information. Social networking websites enable members completely untrue. Some sites deliberately set out to misinform
to communicate using instant messaging, email, a type of or deceive.
blog, and even voice or video-conferencing. The services allow
It is important to remember that anyone is able to produce a
members to invite other members and non-members into their
website and publish it on the internet. They do not have to be an
circle of friends.
authority on the subject the site is about. In some cases the person
Social networking websites you might be familiar with include: creating the site has not checked the information on the site.
Facebook Advantages of using information on the internet are:
MySpace
The information is up-to-date compared to many books
Twitter
It is quick to search for the information
Reasons why the internet is so popular It is available on your home computer or mobile device
The reasons why the internet is so popular include: You can obtain information from other parts of the world easily
There is a huge amount of information stored on every subject Disadvantages of using information on the internet are:
imaginable. It is the largest store of information in the world.
The information could be unreliable
The information can be accessed from anywhere by lots of
There could be too much information to read
different devices (e.g. computers, smartphones etc.) provided
there is an internet connection. How can you make sure that information you use is accurate?
Search engines allow fast access to specific information Here are a few steps you can take:
provided the search criteria are carefully constructed.
Check the date that the site was last updated. Bogus sites are
There are a huge range of services you can access such as
not updated very often. Also, sites go out-of-date so you need
email, file transfer, chat rooms etc.
to be sure that the site you use has been updated recently.
Reasons why an internet search to find relevant Only use sites produced by organisations you have heard of
information is not always fast (major newspapers, the BBC, etc.).
The following are reasons why an internet search to find relevant Use several sites to get the information and check that the
information is not always fast: sites are giving similar information.
Follow the links to see if they work. Many bogus sites have
There might be a slow internet connection so pages take time links that do not work.
to load.
Millions of pages could be found and you have to spend time Undesirability of information on the internet
deciding which are relevant. It is impossible to censor what is on the internet. This is
The user may not have the skills in picking good search because much of the information on the internet comes
criteria resulting in too much irrelevant information. from other countries. Unfortunately the internet contains
pornography, violent videos, sites that promote racial hatred,
Issues with information on the internet and so on. Schools and parents are able to use parental
Just because information is on the internet does not necessarily controls that restrict the sites and information that can be
make it true. Any information you get from the internet needs to be viewed on the internet.
treated with caution. In this section you will be looking at how you
107
REVISION QUESTIONS
1 Tick True or False next to each of these statements.
The following notes summarise this chapter, but they have True False
missing words. Using the words below, copy out and complete
An intranet is a type of blog.
sentences A to I. Each word may be used more than once.
Intranets are used by people
internet HTTP accessing address HTTPS within an organisation.
blog locator blogger ISP search engine Intranets and the internet both
encrypt domain hyperlink web browser use similar technology.
An ISP is a type of virus.
A The _____ is a network of networks and the world wide
web is the means of _____ the information contained on (2)
the internet. 2 Describe two features of a blog. (2)
B _____ is the method used for transferring data over the
3 Describe the similarities and differences
internet when the data is not of a personal nature.
between the internet and an intranet. (4)
C _____ is the method used for transferring data such as
banking or credit card details over the internet where it is 4 Describe what is meant by a wiki. (4)
necessary to _____ the data to keep if safe from hackers. 5 Tick True or False next to each of the following
D URL stands for Uniform Resource _____ and it is another statements.
name for the web _____.
True False
E A feature of a website that allows a user to jump to another
Spam is unsolicited email.
web page is called a _____.
Email groups are used so as to
F An organisation that provides users with an internet avoid spam.
connection is called an _____.
Email groups are useful for when
G A website that allows comments to be posted usually in the same email needs to be sent
chronological order is called a _____ and the person who to all members of the group.
keeps one is called a _____. Spam filters can remove harmful
H The .com or .co.uk part of a web address is called the viruses.
_____. Storage in the cloud is useful
if you need to access the data
I A _____ is software that you use to access the internet
using lots of different devices.
and once this is loaded you can then use a _____ to find
specific information. (5)
6 Describe the differences between a web
browser and a search engine. (4)
108
10 COMMUNIC ATION
EX AM-ST YLE QU ES T IO NS
1 Explain the main differences between the internet and the 7 Tick True or False next to each of these statements.
world wide web (www). [2]
True False
2 Many organisations use an intranet. The internet is a network of networks.
a Explain what is meant by the term intranet. [2]
Intranets can be used by anyone with
b Describe one way in which an intranet is
internet access.
different from the internet. [1]
Intranets and the internet both use
3 Place a tick in the box next to each method if it is a web browsers.
method of protecting copyrighted software from being The internet uses HTTP.
copied.
[3]
¸
8 Describe three differences between a blog and a wiki. [3]
Use of chip and PIN.
(Cambridge IGCSE Information and Communication Technology
Registration system that makes use of a 0417/11 q7 Oct/Nov 2012)
registration code.
The use of anti-virus software. 9 Tick Internet or intranet, next to each statement, as
Encryption of the programming code used to appropriate.
execute the program.
Internet intranet
Use of data protection legislation.
...is a network of computer networks
Use of activation codes which can only be used a
...usually exists within one organisation
certain number of times on different machines.
The use of a dongle. ...anybody can access it
...can be expanded to become an
[4] extranet
4 Describe two methods that software manufacturers [4]
use to try to prevent their copyrighted software from
being illegally copied. [2] (Cambridge IGCSE Information and Communication Technology
0417/11 q7 Oct/Nov 2013)
5 Many internet users make use of social networking sites.
10 Discuss the use of blogs and social networking
Describe three features of a social networking site. [3] sites as means of communication. [6]
6 A student is doing a project at school and is using (Cambridge IGCSE Information and Communication Technology
the internet as a source of information. 0417/11 q18 May/Jun 2013)
a Describe three advantages of using the internet as a 11 Many people now store their files in the cloud.
source of information. [3]
b Describe three disadvantages of using the internet as Describe how storage in the cloud works. [3]
a source of information. [3]
109
11 File management
Being able to find files quickly is very important, as is being able
The key concepts covered in this chapter are:
to save files in a file format that other people can open using the
Managing files effectively
software they have. In this chapter you will be looking at how to
Reducing file sizes for storage or transmission
manage files effectively, so they are easy to find even if they were
first saved many years ago.
Sometimes you will receive a file in an unfamiliar format which you
need to convert into a format that can be opened using your existing
software. Being able to convert files from one file format to another
is an important part of using ICT effectively.
Managing files effectively pdf (portable document format) – used with a particular piece
of applications software for viewing documents. This file format
File formats and their uses is used by the software Adobe Acrobat. This file format is popular
Files can be in all sorts of formats depending on the software because the software used to view the files is widely available
used to create and save them. You can identify a file format by and free.
looking at the file extension which is defined here.
png (portable network graphics format) – used for storing graphic
File extension – A label after the file name, consisting of images that is an improvement on the gif format as it does
usually three or four characters, that gives information to the not lose any pixels (i.e. the dots making up the image) when
operating system and other software about what format the compressing the file.
data is stored in.
txt (text format) – text files contain just text without any
Here are the file formats you will need to know about for the formatting. When these files are imported into the package you
examination. are using, you may have to edit the text in order to add formatting.
css (cascading style sheets) – a file used to format the contents rtf (rich text format) – this file format saves the text with a limited
of a web page. The file contains properties for how to display HTML amount of formatting. You usually must still do some editing of
elements. HTML is a special code used for making web pages. the data to add additional formatting.
For example, a user can define the size, colour, font, line spacing,
indentation, borders, and location of HTML elements. CSS files are zip – a popular archive format widely used when downloading
used to create a similar look and feel across all the web pages in files from websites using the internet. ZIP files are data containers
a website. since they can store one or several files in compressed form. After
you download a ZIP file, you must extract its contents in order to
csv (comma separated values) – this is a list of data items use them.
that are separated from each other using commas. CSV files
are mainly used for saving data from a table, spreadsheet or
database where there are rows and columns of data. Locating stored files
You will need to be able to locate stored files for the
gif (graphics interchange format) – a very popular way of storing examination. You will also need to create folders for the various
graphic images on the internet as it includes compression of the files you create. When saving files for the first time it is always
file, which makes loading times shorter than uncompressed files. best to use ‘Save As’ because you can see where it is that the
htm – a popular file format used for storing web pages. computer intends to save the file. If the location is not suitable
then you can change it.
jpg (JPEG – Joint Picture Experts Group format) – a popular
way of storing still images from digital cameras that uses Before you start working through the activities, ensure you know
compression to make files smaller. This enables more files to be where the files you need can be found. You will also need to decide
stored on the storage medium and also faster data transmission where you will save any of the files amended or produced during
over networks. the activities.
110
11 File management
111
they save the files in different formats. To do this, you would have to Activity 11.2
save your document in a generic file format such as .rtf or .txt. All Saving a word-processed document as a .pdf file and
word-processors can save and load files in these generic formats. then using a pdf reader to view the file
Once your friend has opened the file, they can then save into the In this activity you will learn how to:
file format used by their software. They will now be able to view and
save a word-processed document as a .pdf file
make changes to the document using their software and if necessary
read a document stored as a .pdf file
they can save it in the generic format and send it back to you for your
comments. Being able to read and edit files using different software 1 Load Microsoft Word or your word-processing
is an important aspect when working with others. software and open the document called
Computer–control–in–Formula–One.rtf
The following are generic file formats that can be used for saving
2 Click on Save As. When the Save As menu appears, use
files and then exporting them into a different software package:
the drop-down arrow in the Save as type section and
.csv .rtf .css select (*.pdf), and then click Save.
.txt .pdf .htm 3 You have now saved the file in .pdf file format.
4 The file will usually load up automatically using the
To export a file into a different piece of software PDF reader thus allowing you to view the document in
when there is no common file format .pdf file format. It is important to note that if this does
Suppose a file created in application software 1 is to be loaded
not happen you may not have the PDF reader installed
into different application software 2. Software 2 cannot read
on your computer. A reader can be downloaded free
files created in the usual file format for software 1 so we need to
from the website www.adobe.com.
use a common generic file format. The file created in application
software 1 is saved in the generic file format which is then read It is important to note that the .pdf file can be viewed but
by application software 2. Application software 2 is now able to it cannot be edited; you would need to buy the software
view and edit the file. to do this. However, you can edit the file using the word-
processing software and then save as a .pdf file again.
To use a generic file format, follow these steps:
In many of the activities in the following chapters you will
1 Find a generic format that you can save your file in and check have to save and export data into other application packages.
that the other software is able to load a file in this format.
Suppose you notice that you can save the original file in .csv format
and that the new software is able to use files in this format.
Reducing file sizes for storage or
The original file is now saved into the generic file format.
transmission
It is very important to reduce file sizes when the files are used
2 You now import the file in its common file format into the new online. The reasons for this are to increase the transmission
software. speed when transferred over a network and to reduce the memory
Suppose you have a file which you have saved as a .csv file needed to store them.
(i.e. this file has been saved into a generic file format). Many email providers have a file size restriction, so if a file is
On loading the file into the new software, the data is too large it cannot be sent as an email attachment.
converted into a form that can be used by the new software. Large files take lots of time for downloading and eat up data
usage when used on mobile devices where you may have to
3 You now save the file in its new file format (i.e. the format pay for data usage above a certain amount.
used by the new software). Some websites have a certain restriction on the size of image
The file can now be used. files to be uploaded to their site.
Social networking sites often have file size restrictions on
Saving and exporting data into generic file formats image files.
Suppose you have produced a word-processed document that Users of websites prefer quality images but lower file sizes as
you would like someone else to see in order for them to make it makes browsing faster.
comments about it. If they did not have the same word-processing Reduced file sizes mean they occupy less memory.
software as you, you could save the file in a generic file format. If
they just needed to open the file and view it, then you could save
it in .pdf file format.
In the next activity you will save a word-processed document as
a .pdf file and then view it using the pdf reader.
112
11 File management
Activity 11.3
Compressing an image file Notice the following information in the screenshot
A plan on paper showing the outline of plots of land has been shown here.
scanned in using a scanner and the image is stored as a The size of the file (i.e. Size 4.51 MB).
.jpg file.
The width and height of the image in pixels (i.e. 2454 ×
1 Locate the image file called Land–plots.jpg.
3390). If you multiply these two numbers together you
2 Load Microsoft Office Picture Manager (or other suitable would obtain the total number of pixels used to create
image editing software) and open the file Land–plots.jpg. the image.
If you use Microsoft Office Picture Manager the screen 4 Notice that the plot numbers on the image cannot be
should look like this. If you use other software, it should read easily. The image needs to be rotated by 90° to the
have similar icons and menus for you to follow. right. To do this, click on and when the menu appears,
select Rotate right 90°.
5 Now compress this file so that it can be sent faster as an
email attachment.
Look at the left part of the screen where you should see
the Compress Pictures menu. If it is not there, use the
drop-down arrow to select Compress Pictures.
Notice that you can compress for documents, web pages
and email messages.
Click on Compress for Documents.
Click on OK to confirm.
6 Click on File and then Save As to save this file
in compressed form using the file name
Land–plots–compressed–file.jpg.
113
12 Images
Images are used in documents and slides to communicate information.
The key concepts covered in this chapter are:
For the IGCSE you will not need to produce the images yourself as
Using software tools to position images
the images you will use will be supplied as a file. You will have to Using software tools to edit images
position the image on a document or slide as well as edit the image.
Using software tools to position images Resizing an image without maintaining the aspect
ratio – if you resize the image in one direction only you will be
Images, which can include clip art, photographs and screenshots,
stretching the image in a single direction. This will distort the
can be edited using specialist graphics/photo-editing software
image, but if the change is small the distortion is only slight,
or alternatively you can use the software you are using to create
so it will not be noticed.
the document or slide. In this book, we are going to use the
latter method. Cropping an image – cropping an image involves using only
part of the image. For example, there might be something in the
Word-processing, presentation and spreadsheet software allow you
image which you don’t want to include. By cropping the image you
to insert a picture into a document, slide or spreadsheet. The cursor
can remove part of the image that you don’t want to include.
needs to be at the point where you want to insert the image.
Rotating an image – images can be obtained in portrait view
The techniques for positioning images will be looked at in the
(longest side is the height) or in landscape view (shortest side is
activity later on in this chapter.
the height) and you may want to turn the image around. You often
Using software tools to edit images have to rotate photographs taken with a digital camera so they
are the right way around.
Software for creating slides and documents has simple image
editing facilities and after you have positioned the image in the Reflecting an image – sometimes an image of an object can
correct place, you can then begin to edit the image. look better if it is facing in the opposite direction. Reflecting
an image produces a mirror image of the object. Note that
Aspect ratio reflecting an image is called flipping the image in some
Aspect ratio is the ratio of the width of an image to its height, software packages.
and it is expressed as two numbers separated by a colon like Adjusting the colour depth in an image – the colour depth
this 16:9. For example, if you had an image with a width of of an image refers to how many bits of information are used to
16 cm and a height of 9 cm, its aspect ratio is 16:9. If we represent the colour of each pixel. The more bits the more accurate
halved the width of the image to 8 cm then the height would you can make the colour. The trouble is that more bits leads to
need to be halved to 4.5 cm to keep the aspect ratio the same. greater file sizes. Using software tools you can increase the colour
You will need to edit images by performing some of the following depth in an image.
operations: Adjusting the brightness of an image – the brightness of
Placing an image with precision – you will normally be images can be adjusted to make the image look more realistic.
told where to position an image (e.g. on the next line following a Adjusting the contrast of an image – contrast is the
certain title). You will also usually be told about the alignment of difference between the light and dark areas of an image.
an image. For example, you may be told to align the image with
the top of a paragraph of text and to the left margin. The implications of image resolution
An image on the screen is made up of lots of dots of light called
Resizing an image, maintaining the aspect ratio – in most pixels. The resolution of an image is given as two numbers like
cases the image will need to be resized and in the examination you this: 640 × 480, where 640 is the number of pixel columns in
may be told the width or height in cm that the image will need to be the width of the image and 480 is the number of pixel rows in
resized to. If you change the width of the image the height will be the height of the image. By multiplying these two numbers you
automatically adjusted so that the image is not distorted. Similarly if obtain the total number of pixels in the image. In this example,
the height is adjusted, the width will be automatically adjusted. When 640 × 480 = 307 200 pixels. As we normally use mega-pixels we
resizing an image in this way you are said to be maintaining the divide this number by one million to give 0.3 M pixels.
aspect ratio of the image.
114
12 Images
A larger image taken using a smartphone might use 2560 × attach the image to send with an email) the time taken will be
1920 = 4 915 200 pixels which is approximately 5 M pixels. greater. When you download the image (e.g. view the image
on a website) the time will also be greater.
The resolution of an image affects the quality of the image. The
The file size will increase – this will have implications on the
file size of a high resolution image will be higher than a low
number of images you can store on storage media.
resolution image as more pixels and hence more bits are needed
to store the information about each pixel. An increased file size Adjusting image resolution
will have the following implications: Image resolution can be adjusted so as to reduce the file size. This
is particularly important if the image is to be used on a website.
Transmission time will be increased – when you upload (e.g.
There is only so long that a viewer of a web page will wait for it to
store the image on a website, social networking site or load
load before clicking off the site and going to a different one.
the image on an auction site or save the image to the cloud or
Activity 12.1
Resizing images and distorting an image
In this activity you will learn how to:
locate stored files and load a file in a generic file format
set page size, orientation and margins
position an image in a document
adjust the size of an image, maintaining the aspect ratio
adjust the size of an image, distorting the image slightly
1 Load Microsoft Word or your word-processing software and open the file Emerging–technology.rft.
2 Set the page size to A4. To do this click on Page layout and the Page Setup menu appears as
shown here.
Notice all the properties you can set from this menu. As we need to set the page size, click on Size
and from the list of sizes select A4.
3 Keeping on the Page Layout click on Orientation and select Portrait for the orientation.
4 Again, keeping on the Page layout click on Margins. From this menu you can select custom margins.
Click on Custom Margins and the following dialog box will appear.
<
115
Set all the margins to 2 cm. Adjust the settings for the Top, Bottom, Right, and Left margins to 2 cm.
Click on OK to confirm.
5 Save your document as Emerging Technology v2 in your work area, but do not store it as an .RTF file.
Instead, save it in the file format used by your word-processing software.
6 Click on the first line after the first paragraph of the nanotechnology section.
Import the image carbon–nanotube.jpg.
This can be done by clicking Insert and then Picture. You will have to locate the file
carbon–nanotube.jpg.
When you have located the file, select it and click on Insert.
Notice that this image has been aligned to both margins.
7 This image needs resizing. Click on the image to display format picture tools.
It is worth spending a bit of time looking at what you can do using these tools. Check the location of
the tools to do the following to the image:
Adjust the brightness
Adjust the contrast
Adjust the colour (Recolour)
Adjust the way the text wraps around the object (Position)
Crop the image
Rotate the image
Size the image.
Resize the image to a height of 8 cm. Notice that the width of the image changes automatically to
keep it in proportion. This is called maintaining the aspect ratio.
<
116
12 Images
8 Click on Position and then choose Position in Top Right Right-click on the image and the following menu appears.
with Square Text Wrapping.
The page containing the image should now look like this.
117
Activity 12.2
Editing an image We have now removed the unwanted parts of the image
In this activity you will edit an image using Microsoft Office to give an image like the one shown below.
Picture Manager which works in a similar way to other image
editing software.
In this activity you will learn how to:
crop an image
change the brightness and contrast of an image
export a file using a different file format (i.e. from a .png
file to a .gif file).
1 Locate the image file called Lindos.
2 Load the software Microsoft Office Picture Manager or
whichever image editing software you are using and
open the file Lindos.
3 There are two problems with this image. In the bottom 5 Now alter the brightness and contrast of the
right of the image there is the top of someone’s head image by clicking on the drop-down arrow
in a baseball cap. At the very top of the image there is
something else in the image that needs removing.
These objects can be removed by cropping the image. then select Brightness and Contrast:
Save the file using the original name in this new file
format.
Click on .
119
13 Layout
Documents and slides consist of different elements such as text,
images, charts, graphs, tables, screenshots, etc. The layout of the The key concepts covered in this chapter are:
elements on the page is just as important as the content and it Using software tools to prepare a basic document to
needs to meet the needs of the target audience. match the purpose and target audience
Using software tools to create headers and footers
appropriately within a range of software packages
Capturing an image from a website Click on Copy to put a copy of the image into the clipboard.
You may be asked to locate an appropriate image to be used You can then position the cursor where you would like the
within a document. Once you have located a suitable image, here image to appear in the document. You can then click on Paste
are the steps you should take: to put the image into position.
1 Display the web page where the image you want to capture is Importing text from a website
located. You may be required to copy text from a website or email and
Move the cursor onto the image you want to capture like this: then incorporate it into a document or presentation slide, and the
steps you need to take are as follows:
1 Display the web page where the text you want to copy is
located.
Move to the start of the text and left-click and then drag the mouse
until the complete section of text has been highlighted like this:
2 With the cursor on the highlighted text, right-click and select Copy.
3 This puts the selected text into the clipboard.
4 Move to the document that you want the text copied into and
click on Paste.
2 Right-click and the following menu appears: The text will now be copied into the required position. All that you
have to do is to ensure that the text (font, font size, font style, font
colour, etc.) is consistent with the rest of the document. Check
other formatting such as the number of lines after a paragraph,
bullets are the same as used in the same document, and so on.
121
You can then open the spreadsheet software, position the cursor Activity 13.1
where you want the data to start and then paste the data into it. Creating a table using data from a csv file
In this activity you will learn how to:
import a file in csv file format into word-processing
software
place text into a table automatically
make text bold.
1 Load Microsoft Word and open the file Countries (which
has been saved in csv file format) by double-clicking on
the file icon.
Your teacher will tell you where to find this file.
When looking for this file in the folder, make sure that
you select ‘All Files’ otherwise only Microsoft Word files
will be shown.
2 Notice the way the file is displayed. The first line
contains column headings and other lines contain the
actual data about the African countries. Notice also
that all the items are separated by commas, hence the
name of the file format (comma separated values).
There is usually some tidying up to do. For example, here there are
some ‘/’ characters that need deleting and columns A and B should
be made wider. If you want to draw graphs, you need to remove the <
units from the data and put them in the headings instead.
122
13 L ayout
3 Left-click on the start of the data and keeping your Click on OK to put the data into the table. Your table
finger pressed down on the left mouse button drag should now appear like this:
down until all the data is selected. When it is selected it
will show blue like this:
Activity 13.2
Click on in the toolbar. The following menu E ntering and editing text
appears from which you should select Convert Text to Table: In this activity you will learn how to:
accurately use the keyboard to enter text
use drag and drop to move text around
alter the font size
centre text
change the line spacing in a document
copy and paste an object (i.e. a table in this case) from
5 The following dialog box appears: one document to another
alter the border on a table
import an image file and position it in a document
edit an image by cropping it.
1 Load Microsoft Word and create a new document. Type
in the following text:
Africa is the world’s second largest continent according
to land size as well as by size of population. The African
continent consists of 54 separate countries and about
14% of the world’s total population live here.
The climate in Africa varies from tropical to subarctic on its
highest peaks. In the northern part of Africa there are deserts
and most of the land is arid. In the central and southern
parts there are savannah plains and dense rainforests.
Africa boasts the greatest variety of animals and
includes animals such as lions, elephants, cheetahs,
Notice that the number of columns and rows has been deer, giraffes, camels, monkeys, etc. One ecological
determined by the data itself. problem is deforestation where forests are being
< <
123
destroyed to make room for the growing of crops. This
Make the text bold by clicking on and centre the text
is destroying the habitat for many of the endangered
species. by clicking on .
Most scientists regard the African continent to be the 6 You are now going to increase the line spacing between
origin of the human species and evidence has been the lines of text. Select all the text other than the title by
found of the first modern human called Homo sapiens highlighting it.
dating to around 200,000 years old.
Ensure you have the tab selected and then
2 Use visual verification to check the text you have typed
in by comparing it with the original text. The two should from the paragraph section click on .
be identical. If there are any errors, these should be From the resulting list, select the line spacing 1.5 like this:
corrected before proceeding.
3 Select the entire third paragraph by highlighting it. Once
selected, click on the highlighted text and keeping the
right mouse button pressed down drag the cursor to
the line between the first and second paragraphs. This
technique is used to move text around.
Your text should now look like this:
Africa is the world’s second largest continent according to land size as well as by
size of population. The African continent consists of 54 separate countries and
about 14% of the world’s total population live here.
The document with the increased line spacing is now
Africa boasts the greatest variety of animals and includes animals such as lions,
elephants, cheetahs, deer, giraffes, camels, monkeys etc. One ecological problem
shown.
is deforestation where forests are being destroyed to make room for the growing 7 You are now going to add the table created in the
of crops. This is destroying the habitat for many of the endangered species.
previous activity.
The climate in Africa varies from tropical to subarctic on its highest peaks. In the
northern part of Africa there are deserts and most of the land is arid. In the Click midway between the first and the second
central and southern parts there are savannah plains and dense rainforests. paragraph as this is where the table is to be inserted.
Most scientists regard the African continent to be the origin of the human species Open the file Table–of–countries which contains the table.
and evidence has been found of the first modern human called Homo sapiens
dating to around 200,000 years old. Select the entire table by highlighting it like this:
8 The table needs adjusting to line it up with the text. Click on the Crop icon.
The image will appear like this with the black handles
Left-click on the left table border like this and that can be used to crop the image around the edges.
keeping the mouse button pressed down drag the left
border to the right so that it is lined up with the text. Now
line up the right margin with the text.
125
Activity 13.3
Placing and manipulating images Once found, click on the file Dist–computing–image1
In this activity you will learn how to: and then click on the Insert button.
locate stored files The image is inserted into the document like this:
import an image file
size an image maintaining the aspect ratio
wrap text around an image
adjust a margin.
1 Load Microsoft Word and open the document called
Distributed–computing.
Check that you have the right document displayed by
comparing the start of the document with that
shown here:
2 There are three images to be put into this text and they
have been saved using these filenames:
Dist–computing–image1
Dist–computing–image2
Dist–computing–image3
All these images have been saved in the folder for
this book.
Position the cursor on the line between the first and
second paragraphs of the document.
<
126
13 L ayout
Notice the tick in the Lock aspect ratio box. This means Notice these text wrapping options. You might be asked
that if either the height or width of the image is changed to use any of the following:
then the other dimension will change in order to keep the Square – if the image is placed in the centre of text
image in proportion. If you want to change the size of the the text flows around the image leaving a square
image in one direction only, then this tick will need to be shaped image.
removed. Tight – here the text moves in to the shape of the
At the moment the image is too large, so reduce the image on the right- and left-hand side of the image.
height of the image from 21.56 cm to 13cm. You can see this effect only if the image is not a
Click on Close. regular shape.
Top and bottom (this is called above and below in the
4 Right-click on the image again and this time select Text CIE specification)—this places the image with the
Wrapping from the menu. text above and below but with no text wrapped to the
side of the image.
Click on the option ‘Square’ in the menu and the text will
appear like this:
127
Left-click on the triangle for the right indent Once found, click on the file Dist–computing–image2
and then click on the Insert button.
and holding the mouse button down,
drag the margin to the left until it is lined up with the The image is inserted into the document like this:
right-hand edge of the image.
The caption now looks like this:
With the text still highlighted click on the (Justified) When these actions have both been completed correctly
button. the section containing the image will look like this:
<
128
13 L ayout
Here you can adjust the size of the margins around the
page (i.e. right, left, top and bottom). The margins define where the
main text and other objects such as images can be placed. You
can also set gutters which allow extra space to allow the pages to
be bound without concealing any information on the page.
Using the column tool you can put the text into columns.
You can also set up the width of each column and the space
between the columns and even have a vertical line or lines
separating the columns.
129
Merge and split table cells – if you create a table and then want The text is wrapped in order to keep the width of the cell the
to type a heading in the first cell, this is what happens: same. This is not what you want to happen with a heading, so it
is necessary to merge cells. When this is done the heading fits in
like this:
Activity 13.4
Creating a table 3 Tables consist of columns and rows. Suppose you
In this activity you will learn how to create a table with a wanted a table containing 5 columns and 6 rows. All you
specified number of columns and rows. do is run the cursor so that you have 5 columns and
1 Click on the Insert tab. 6 rows highlighted like this:
130
13 L ayout
Activity 13.5
Formatting tables parallel lines (either vertical or horizontal). Press the left
In this activity you will learn how to: mouse button and drag until the widths are similar to
insert a table into a document those shown below.
adjust the column width and row height LAN WAN
input data into a table. Difference 1 Confined to a small Covers a wide geographical
You are going to produce a table to show two of the main area, usually a area spanning towns,
differences between a wide area network (WAN) and a local single site. countries or even
area network (LAN). continents.
Difference 2 Usually uses simple Uses expensive
1 Load Microsoft Word and start a new document.
cable links owned telecommunication links
2 Set up a table consisting of 3 columns and 3 rows. Look by the company. not owned by the company.
back at Activity 13.4 if you have forgotten how to do this.
3 Type the data shown in the table above. You can centre
The following table will appear at the cursor position.
the headings LAN and WAN by typing them, highlighting
Notice that it spans from one margin to the other.
them and then clicking on the centre button on the
toolbar. This will centre the headings in the column.
Also, embolden the words LAN, WAN, Difference 1 and
Difference 2.
Adjust the width of the columns and the height of the 4 See how neat this now looks. Save your document using
rows in the following way. Move the pointer onto the the filename The–differences–between–a–LAN–
lines and you will notice that the cursor changes to two and–a–WAN. Print out a copy of your document.
Using software tools to create headers Rather than adding certain text to the headers and footers
manually, you can instruct the software to add it automatically.
and footers appropriately within a For example, you can instruct the software to add the date
range of software packages automatically in the header or footer on every page if required.
131
This file has been saved in rich text format and can be loaded 4 You are now going to insert headers and footers in the
into Word without alteration, as both the text and the simple document. A header is an area on the page between
formatting in this document are kept. the top margin and the top of the page. A footer is an
area between the bottom margin and the bottom of the
2 Click on the tab on the toolbar and select page. Headers and footers are used for such things as
the name of the author of the document, the date the
document was produced, page numbers, etc.
and from the items in the menu select Custom
Margins. The following box appears:
Click on the Insert tab in the toolbar, click on and
then choose the following layout from the list.
Type your name here. The text you type will replace the
text already there.
Click on the right placeholder box and type in the number
121121.
Notice the margin section where you can change the size Click on the centre placeholder box and click the
of the margins of the page you are producing. backspace key to delete the box.
Set the top, bottom, left and right margins to 3 cm each. Your header should now look like this:
When you have done this correctly the margin section
will look the same as this:
You are going to include the following in the footer: If the placeholder box has been forced onto the line below
An automated filename, left aligned. delete the place holder and then position the cursor after
An automated page number, centre aligned. the text Page 1 of 2.
Today’s date, right aligned.
To create the automated filename click on the
placeholder box on the left-hand side of the footer and
Click on and then select the date format
highlighted as shown:
Click on OK.
Important note
Click on OK to continue.
Different countries write dates in different formats. When
The filename now appears in the footer like this:
asked in the examination to insert a date, it does not matter
which format you use.
133
14 Styles
When producing documents for an organisation there is usually a
house style which anyone producing documents must adhere to. The key concepts covered in this chapter are:
The purpose of house style is to ensure that the style of documents The use and purpose of a corporate house style
produced by everyone in the organisation is the same no matter Applying styles to ensure the consistency of presentation
who produces them. Use of a house style helps reinforce a positive
image for the organisation.
The use and purpose of a corporate Font styles – ensure that headings use the same font style,
subheadings have the same font style and the main body text
house style has the same font style, unless you are instructed otherwise.
In many organisations there will be a corporate house style for Alignment – text can be left aligned, centred or right aligned.
documents which ensures that documents produced by different It can also be justified, which means the text is aligned to
areas and people still look the same. It also ensures that all both the left and the right margins. Ensure that you have
documents have a professional appearance. obeyed any specific instructions in the examination and have
The house style is designed to ensure that the information creates maintained consistency.
an image of the company which improves awareness and provides Spacing between lines, paragraphs and before and after
positive publicity. headings – if you decide to leave two blank lines after a main
heading, then there should be consistency whenever there are
In the examination there will usually be a house style specification other main headings. All other spacing needs to be consistent.
included and this tells you what styles to apply to any documents
you are producing. Font type and font size
Here is a sample of a house style specification sheet. Changing the font type (Arial, Times New Roman, etc.) alters the
appearance of the characters. Font types are given names and
Title Font – sans serif, 26 point, centre aligned you can change the font by selecting the text and then clicking
Subtitle Font – sans serif, 20 point, underlined and left on the correct part of the formatting toolbar shown below. Notice
aligned also that there is a section for altering the font size (i.e. how big
the characters appear).
Subheading Font – sans serif, 14 point with one clear line
space after a subheading Click here to alter the font size.
Body text Font – serif, 12 point, 1.5 line spacing with one
clear line space after each paragraph
Click here to alter the font type (each font is given a name.
In this case the font is called Times New Roman).
134
14 StyleS
Once you have chosen a colour, all subsequent text typed will be
in the chosen colour.
Important note When preparing documents in the
If you have already typed some text and want to change its
exam you will be asked to use a serif or sans serif font, so it is
colour, you need to first highlight it to select it before changing
important to be able to spot one. Stick with the common fonts
the colour.
in the table.
Highlighting text
Activity 14.1 Just like you can highlight printed text using a highlighting pen
(usually in a bright colour), you can produce highlighted text in a
Serif or sans serif?
word-processed document.
In this activity you will learn how to distinguish between
serif and sans serif fonts. To highlight text, you first select it like this:
Here are some fonts. You decide whether each of them is a
serif or sans serif font. This text is going to be highlighted.
1 6
Then click on .
2 7
3 You will then be presented with a palette of colours to choose from.
8
4 9
5 10
135
Text alignment Numbered lists
These buttons are used for aligning sections of Numbered lists are useful if the listed items need to be put into a
text. Each button is used to align text in the following way: particular order.
1 Select the section of text you want put into a numbered list by
Aligns text to the left.
highlighting it.
Centres the text. 2 Click on the button.
3 The list will be bulleted using the default numbers but you
Aligns text to the right.
can choose a different number style. After highlighting the
Aligns the text to both the left and right margins – called fully text you can click on the drop-down arrow on the numbered
justified text. list button. This menu appears, from which you can choose
a different type of number such as Roman numerals. Notice
Used to decrease or increase the indent level of a paragraph. also that you can have a lettered list.
Line spacing
Clicking on this button brings down a menu allowing you
to adjust the line spacing between lines of text in a document.
There are various options such as 1.0, 1.15, 1.5, 2.0, 2.5,
3.0. You can also use this to add lines automatically before or
after a paragraph.
Bullets
Bullets are useful to draw the reader’s attention to a list of points
you would like to make. Rather than just write an ordinary list, you
can put a bullet point (a dot, arrow, diamond, square or even a
small picture) at the start of the point. The text for your points is
then indented a small amount from the bullet.
To produce a bulleted list:
1 Select the section of text you want bulleted by highlighting it.
136
14 StyleS
Activity 14.2
4 Create or edit the following styles which should be
Choosing a font
applied to all the text in the document.
In this activity you will be given a series of fonts and uses.
Title
You have to match the font to the activity. Remember there
are no hard and fast rules about fonts, so be prepared for Subtitle
some lively argument at the end! Subheading
Body text
The styles for the above are outlined in the house style
Font 3 Times New Roman specification sheet shown here:
Title Font – sans-serif, 24 point, bold and centre aligned
Subtitle Font – sans-serif, 16 point, underlined and left
aligned
Subheading Font – sans-serif, 14 point, bold and with one clear
Which font would be best for each of these uses? line space after a subheading
1 The text in a children’s learning-to-read book Body text Font – serif, 12 point, 1.0 line spacing with one
clear line space after each paragraph
2 The text to go on a map of Treasure Island to mark the
landmarks 5 Insert an extra line under the title of the document
3 Some text at the bottom of a letter on a website to ‘Emerging technologies’ and apply the title style to
make it look as though the writer has signed it the title.
4 The text to go with an image of a witch on a scary 6 Below the title, add the subtitle: Report by: and add
party invite your name.
5 A novel 7 Apply the Subtitle style to this text.
8 The subheading Mobile working needs a line before
the body text starts. Insert a blank line after this
Activity 14.3 subheading to ensure consistency with the other
subheadings.
Applying styles to a document
9 Identify all the subheadings in the document and apply
In this activity you will learn how to:
the Subheading style to each one of them.
insert a header and footer
10 Apply the Body text style to all the remaining text in
apply a set of styles to the text in a document.
the document.
For the examination you will have to set the styles for the
11 Save your document using the filename
text in a document. You will need to identify the titles,
Emerging– Technology–v4.
subtitles, subheadings and body text and apply the styles
carefully according to the instructions given in the paper. 12 Print out a copy of your document.
1 Load the file Emerging–Technology–v3.
This file was created in Activity 12.1.
2 Create a header and enter your own name and the
number 121212 left-aligned and the number 33003
right-aligned. This header needs to appear on all the
pages of the document.
3 Create a footer and enter the automated file name
of the document, left-aligned and today’s date right-
aligned. This footer needs to appear on all the
pages of the document. _
137
15 Proofing
Proofing involves checking an ICT solution for errors. Errors can occur
at various stages depending on the type of ICT solution being used. The key concepts covered in this chapter are:
For example, incorrect data could be entered into a spreadsheet or Software tools
database resulting in the information produced being wrong. When Proofing techniques
producing documents or slides it is necessary to correct spelling
and grammar mistakes as well as checking for all the other possible
errors that can occur. There are a variety of software tools which can
help spot and correct errors. Software tools cannot spot all the errors
so it will be necessary to carry out other checks, including visual
verification and proofreading to spot and correct errors.
Software tools You need to look carefully at any word shown in red. This
word tyme is not in the dictionary because it is spelled
The following software tools are used to ensure that all work
incorrectly or mistyped. If the correct word is in the list
produced contains as few errors as possible:
of suggestions you can click on the word and then click
Spellcheck software on Change.
Grammar check software
Remember that just because a word is not in the dictionary
Validation checks/routines
does not make it incorrectly spelled. There are many words
Double data entry.
that are specialist words. Such words can be added to the
Spellcheck software dictionary by clicking on Add to Dictionary so that they will
If the spelling of your intended word is very different from the not be queried again in other documents.
correct spelling of the word, then the suggestions for the correct
Caution:
spelling provided by the spellcheck software will not contain the
Do not add words to the dictionary unless they are specific to you
word you require. In this situation, you are best asking someone
or your college/school. Don’t just add them because you think
else to see if they can spell the word correctly.
that is how they are spelled.
Spellchecking
Using a spellchecker to remove errors as you are typing in text
Any document you produce should be spellchecked.
When using document processing software such as word-
To check the spelling of a document you follow these steps: processing and presentation software most people will have
the spellchecker turned on so that any misspelled words will be
1 With the document open, click on the Review tab and
marked so they can be corrected immediately.
The following word has been spelled incorrectly so the word-
processing software has marked it by placing a red wavy line
then on . under the word:
2 The following dialogue box appears.
Succesfull
If you want If you right-click on the misspelled word, then a menu
the grammar appears showing a list of possible spellings for the word.
checking at As the incorrect spelling was close to the correct spelling, the
the same spellchecker has managed to find the correct word. To replace
time as the the word with its correct spelling you simply click on the
spelling
correctly spelled word.
then ensure
there is a As well as finding incorrect spellings, spellcheck software is able
tick in this
to spot if the same word has been typed in twice.
box.
138
15 Proof ing
Activity 15.1
Instances where there is more than one space left
In the text below, try to locate the mistakes a spellchecker
after a word before starting the next word.
would detect and those it wouldn’t.
Other mistakes in grammar.
The internet can be described as a network of networks. 6 Save your document in the file format your word-
All most any type of information can be found. It is posible processing software generally uses, giving the
to acess anything from a database on space sceince to document the filename Personal–data–final–version.
train timetables. The internet is accessed though internet
service providers. Through use of the internet, it is possible
for data data to be rapidly transfered around the world
alowing people all over the world to read it.
Using validation routines to minimise errors
When data is being entered into a spreadsheet or database it
is important that any errors are spotted by the program so that
Grammar checkers it can alert the user so they can check and then re-enter the
There are rules about the construction of sentences, and data. When creating ICT solutions using database or spreadsheet
grammar checkers are software tools most often found with word- software we need to produce validation routines that will help
processing software that will check that these rules have been prevent incorrect data being accepted for processing.
obeyed. Grammar checkers can be used to check that:
When the spreadsheet or database is being designed a series of
Sentences end with only one full stop. validation routines can be produced that govern what a user can
There is a capital letter at the beginning of a sentence. and cannot enter. It is impossible to trap every type of error, so if
Common errors like writing ‘you and I’ rather than ‘you and me’ someone’s address is 4 Bankfield Drive and the user incorrectly
have been avoided. types in 40 Bankfield Drive, we would not be able to devise a
simple validation routine that would detect this.
Activity 15.2
Data type checks
Spellchecking, proofreading and making corrections
Databases can automatically check to see if the data being entered
In this activity you will learn how to:
into a field fits what is allowed by the data type for that field. So, for
spellcheck a document example, text cannot be entered into a field that has a numeric data
proofread a document. type. If a field is given a data type of text, then you can enter any
1 Load your word-processing software then locate and characters from the keyboard into this field. Therefore, you can enter
open the file called Personal–data.txt. numbers into a text field but you cannot perform any calculations on
them. This type of check is called a data type check.
2 Insert two blank lines at the start of the document and
enter the title SELLING PERSONAL DATA. The style for Range checks
the title is: Font – serif, 20 point, upper case, bold and Range checks are performed on numbers to make sure that they
centre aligned. Apply this style to the title. lie within a specified range. Range checks will only check absurd
3 Other than the title, there is only body text. The style values. For example, if you typed ‘50’ as the number of children in a
for the body text is: Font – sans serif, 12 point, household instead of ‘5’ then a range check would spot the error; if
1.15 line space and fully justified. Apply this style to you typed in ‘7’ then the range check would not pick up the error.
all the body text in the document.
Presence checks
4 Now spellcheck this document by right-clicking on You can specify that some fields must always have data entered
all those words that are highlighted as being spelled into them. For example, everyone has a date of birth but not
incorrectly by having a wavy red line under them. everyone has an email address. Checks such as this are called
Enter the correct words from the list of suggested presence checks.
spellings for each word.
Validation routines will be looked at in more detail in the chapters
Note that in the section of text there is one word
where spreadsheets and databases are covered.
that has mistakenly been typed in twice, so delete
one of the occurrences. Proofing techniques
5 Carefully proofread the text looking for and correcting
Accuracy of data entry
the following:
Computers can produce accurate output (e.g. payslips, bills,
Instances where a sentence does not start with a invoices, posters, business cards, web pages, presentation slides,
capital letter. brochures, etc.) only if the data entered is accurate. Incorrect
_ data can have consequences of varying degrees of seriousness.
139
Consequences of data entry errors before moving to the next. Again by reading aloud you are more
Here are some of the consequences of data entry errors: likely to read every word. Some people like to read with a cover
such as a piece of paper covering the sentences below. Doing this
Embarrassment – imagine putting up a poster in your school
allows the reader to concentrate on a single line at a time.
for a disco with a spelling mistake in it or the wrong date on
it. A utilities company (e.g. water, gas, electricity or phone) Transposed numbers and letters
could send a bill for a ridiculous amount and then have to It is easy, when typing quickly, to type numbers and letters in the
admit their mistake. wrong order.
Loss of money – mistakes may mean having to compensate
customers. Managers could base their business decisions on Here are some examples:
wrong information resulting in reduced profits. ‘fro’ instead of ‘for’
Prosecution – if data about a person is incorrect and it the account number 100065 instead of the correct account
causes them loss in some way then an organisation could be number 100056
prosecuted because they did not take enough care in ensuring the flight number AB376 instead of BA376.
the data was correct. For example, a person could lose a job
because someone entering in data about them had recorded Transposed numbers can have a serious effect.
that they had a criminal record when they did not have one. Suppose you transposed two numbers in your passport number
The wrong goods being sent – mistakes in orders can result in when checking in for a flight online. You may not be allowed onto
goods being sent that were not ordered. The firm has to then the aircraft because the number on your passport and booking do
pick them up and send the correct goods. not match.
Ensuring the accuracy of information If you transfer money from one account to another using EFT and
When you create your own websites, blogs, multimedia transposed some numbers in the account numbers, then the
presentations, posters, letters, etc., you need to ensure that the money could end up in somebody else’s account.
material is accurate. Here are some ways you can do this:
Consistent line spacing
If you present facts you should always check these using Check that you have consistently left the same space between
several reliable sources. blocks of text, paragraphs, and between text and diagrams, etc.
Ask someone knowledgeable about the subject to check the
material for accuracy of information. In the examination paper you will be given instructions about
Use the spelling and grammar checkers provided in the the line spacing after titles, subtitles, heading, subheadings and
software you are using. Be aware that just because text has body text. You must be very careful that you apply the instructions
been spell - and grammar checked doesn’t mean it is correct. throughout the text.
The more people who look at your work, the more mistakes Consistent character spacing
are likely to be spotted. So ask friends and family to read When creating documents, the spacing between characters such
through your material for their comments. as a comma or a full-stop and the next character should be
Proofread your work carefully by reading through it slowly to consistent throughout the document. This is one of the things you
check it makes sense and there is nothing missing. should check for when proofreading.
Editing and proofreading documents Consistent case
The terms editing and proofreading are often taken to mean the Upper case letters are capital letters such as A, B, C, D, E... and
same thing but there are some differences between them. lower case letters are small letters such as a, b, c, d, e ... The use
Editing involves looking at the overall document to check its of capital letters in such things as titles or subtitles is a matter
content and organisation. Proofreading looks more closely at the of house style. If it is decided that all headings should be in
actual sentences and word combinations to make sure that they upper case, then this should be applied consistently throughout
make sense and are grammatically correct. the document and you would need to check for this when
proofreading.
What is the best way to edit a document?
After you have produced a document, it is a good idea to wait a Removing blank pages/slides
couple of days before editing it because, with a fresh mind, you It is common to move images and text around in documents
are more likely to spot any errors. It is common to miss words if or slides using cut and paste and this can produce blank pages.
you just read in your head. It is better to read aloud (make sure During proofreading blank pages/slides should be identified
there is no one around!) because you can’t skip words. and deleted.
141
EX AM -ST YL E Q UE ST I ON S
1 The head teacher of a school has employed Pierre, a systems analyst, to create a new database system
to keep details of all students. Each student will be allocated a unique ten-digit reference number.
Pierre has written out some of the questions that the head teacher might ask. He can then analyse
these in order to design a database which may answer these questions. Some are:
Which year is Johann Schmidt in? (the school has students in years 7 to 13)
Does Anita Nash have a sibling (brother or sister) in the school?
a Complete the data dictionary table below giving the field names which would be used in the
database and identifying a validation check for each field.
b Explain the differences between verification and validation giving reasons why both are needed
when data is entered into a database. [5]
(Cambridge IGCSE Information and Communication Technology 0417/11 q14 Oct/Nov 2013)
2 Give the name of two different methods of verification and describe their use. [4]
142
16 Graphs and charts
Tables of figures can be hard to understand, so it is much easier to
The key concept covered in this chapter are:
show these figures as pictures using graphs and charts. Using graphs
Producing graphs or charts from given data
and charts makes it easy to look at the relative proportion of the items
and spot any inconsistencies in the data. Also, graphs and charts are
helpful for spotting trends such as increasing or decreasing profits,
or for seeing the biggest or smallest reading.
Producing graphs and charts from Bar charts in spreadsheet software can be:
given data Vertical bar charts (or column charts as they are called in
There are many graphs and charts that you can produce using Excel) which display the bars vertically.
software, so it is important to pick the graph or chart that is Horizontal bar charts are simply called bar charts in Excel and
most suitable. they show the bars in a horizontal direction across the screen.
120
100
80
60
40
20
0
Jan Feb Mar Apr May Jun
Month
Scattergraphs
Bar charts These are used to see how closely, if at all, one quantity depends
These are good for displaying the frequency of different on another. This is called correlation. For example, you might start
categories. Here is a bar chart to investigate the types of vehicle with the hypothesis that someone who is tall will have big feet.
using a certain road as a shortcut. You would then collect height and shoe size data and then plot
the pairs of values.
Types of vehicle taking a certain road as a shortcut
Saloon
Hatchback
Van
0 5 10 15 20 25 30 35 40
Number of vehicles
143
Line graphs In this graph, average monthly precipitation for some location is
These can be used to show trends between two variables. plotted monthly over a one year period. The location is unknown,
The graph below shows how the value of a car falls over the first as there has been no title provided.
four years from new. Here the value of the car is plotted at the
end of each year. 140
Precipitation (mm)
£8,000
£7,000 80
£6,000
£5,000 60
Value
£4,000
£3,000 40
£2,000
20
£1,000
£0
0
Year 1 Year 2 Year 3 Year 4
J F M A M J J A S O N D
Month
Activity 16.1
Producing a scattergraph 1 Open your spreadsheet software and enter the data into
In this activity you will learn how to: columns A and B like this:
select data to produce a graph or chart
label the graph or chart with a title, legend, and axes.
A driving school advertises for pupils and they would like
to answer the following question: If we spend more on
advertising, will we get more pupils?
They have collected the following data and put it into a table:
Amount spent on Number of new pupils
advertising per week ($) per week from adverts
20 1
30 2
40 4
50 4
60 5
70 6 Check that you have centred the data in both columns.
80 6 2 Select the data by clicking and dragging the mouse from
120 9 cells A1 to B11. The selected area will be shaded.
150 10 3 Click Insert in the toolbar and notice the Charts section
160 12 shown:
<
144
16 Graphs and charts
Click Scatter and from the choices of scattergraphs choose the Scatter with only
markers option:
4 The scattergraph appears on the spreadsheet like this:
6 You can now choose which axis on which you’d like a title, and where to place it.
145
7 You will now see the Axis Title box appear on the scattergraph. Change the text in this box to read
‘Amount in Dollars spent on advertising each week’.
8 Put the title ‘Number of new pupils per week’ on the vertical axis. From the list of options, choose
to put the axis title horizontally next to the axis. Remember you will need to select the chart before
you will see the layout tab on the toolbar.
Your chart should now look like this:
Activity 16.2
Producing a column chart
In this activity you will learn how to:
copy and paste data
widen columns
change row height
use contiguous and non-contiguous data to produce charts
label the chart with title, legend, category, and value axes
scale and preview a printout.
The following table has been created using word-processing software in a document about nutrition
and healthy eating. The writer of the article would like to produce a bar chart that can be used to
compare the protein and fat in each of the different foods.
Product Oven chips Soup Yoghurt Salad Cream Corn Flakes
Amount (g) of protein per 100g 2 1 5 1 9
Amount (g) of fat per 100g 5 3 1 10 6
1 Load Microsoft Word or your word-processing software and open the file called
Table–showing–fat–and–protein.
Make sure your table looks the same as that shown above.
<
146
16 Graphs and charts
2 Select all the data in the table by clicking and dragging until all the data is highlighted like this:
With the cursor positioned somewhere on the table, right-click the mouse and in the menu that
appears select Copy. This copies the selected data to the Clipboard.
3 Load Microsoft Excel or your spreadsheet software.
When the spreadsheet grid appears, click on cell A2 as this is where we want the copied data
to start.
Right-click the mouse and from the menu that appears select Paste.
Check the table has appeared like this:
4 Adjust the column width by clicking and dragging the line between the columns like this:
Moving to the right will widen the column, and the text will reflow accordingly.
5 Adjust the row height of the data rows by right-clicking and dragging the lines between the rows:
<
147
6 You are now going to draw a vertical bar chart (called a column chart) using some of the data in the
spreadsheet (the first two rows). Because these two rows are next to each other, the data in them is
called contiguous data.
Select the data by left-clicking on cell A2 and then dragging to the end of the data in cell F3.
This area will now appear highlighted.
7 Click on Insert in the toolbar and then in the Charts section select .
Notice the following about this vertical bar chart (or column chart):
The category axis (i.e. the horizontal axis) has the categories (i.e. the names of the items) on it.
The vertical axis, called the value axis, has the numbers relating to the category on it.
The legend is the explanation (here on the right of the chart) that explains what the height of each
bar represents.
The title of the chart gives a few words to explain what the chart shows, i.e. amount (g) of protein
per 100g. This is only a suggested title and you can change this.
8 You are now going to change the title of the chart.
Click on the title to select it. When the item is selected it will appear like this:
Replace the text in the title with the text shown below.
<
148
16 Graphs and charts
9 Rather than using a legend, you are going to label the value axis.
Select the legend by clicking on it and then and press either the backspace button or the Delete
button on your keyboard to delete it.
10 You are now going to add a title to the value axis.
Click on the edge of the chart to select the entire chart.
The chart tools will appear like this:
Click on Layout, then Axis Titles. Choose Primary Vertical Axis Title and finally choose Horizontal
Title.
Notice the text box next to the vertical (value) axis.
Delete the text and replace it with the text ‘Grams of protein’.
Your chart should now look like this:
<
149
Now produce the vertical bar chart in a similar way to the way you did the one for the amount of
protein. Make sure you alter the text so that it appears like that shown below.
You will probably need to move the charts so they appear next to each other. To do this, click on the
border of the chart; when a four-headed arrow appears, hold the left mouse button down and drag
the chart into the correct position.
14 Save your spreadsheet using the filename Food–bar–chart–version–2.
15 You are now going to print the spreadsheet (table of data and the two charts).
Use Ctrl-P to open the Print dialog box and select your printer, if it’s not already the default printer.
16 The Print window opens.
Click on Properties.
As this spreadsheet is wider than it is tall, it would be better to print it using landscape orientation.
Click the radio button for Landscape.
Click on the Paper tab at the top of the window in the Scaling Printing section select Fit to page.
Click on OK and you will return to the Layout information. Click on OK again and you are taken to the
main Print menu.
Click on Preview to check that the printout is on one page in landscape orientation.
Click on the Print icon and a printout is produced.
150
16 Graphs and charts
Activity 16.3
Producing a pie chart From the main toolbar, click on Insert and then on
In this activity you will learn how to: Text Box.
create a pie chart Click and drag to create a text box in a position just
label pie chart segments with percentages above the legend:
add a title.
The table below shows the type of heating used in
100 houses.
Type of heating Number of houses
Solar 16
Wood 24
Coal 12
Gas 8
Electricity 10
Enter the text ‘Type of heating’ in the text box.
Oil 30
Centre the text in the text box by highlighting the text
1 Load Microsoft Excel or your spreadsheet software and
type in the data shown in this table, using columns A and and clicking on .
B, in rows 1 to 7. 5 You are now going to put labels on the segments (these
Visually check the data. are the slices of the pie). You can add the values
themselves (i.e. the actual number that represents a
2 Select all the data in the table by clicking and dragging segment) or you can add percentages.
from cells A1 to B7.
Click on the chart area to select it. Now click on
3 Click on Insert and then Pie. Select the type of Layout | Data Labels | More Data Label Options...
Notice how the actual values are now displayed on the
chart . segments. (You may need to move the Format Data
The pie chart appears like this: Labels window if it is over the pie chart.)
Click on the tick in the Value box to deselect it and then
put a tick next to Percentage.
Notice that the percentage values have been added to
the segments:
151
Activity 16.4
Changing the appearance of the pie chart
In this activity you will learn how to:
change the colour scheme or patterns of a chart
extract a pie chart segment.
1 Load your spreadsheet software and open the file created in the last activity called
Heating–pie–chart if not already opened.
2 Click on the border of the chart to select it.
You are now going to change the colour scheme for the chart.
If you are going to print the pie chart in black and white, the first colour scheme should be used
(i.e. shades of grey) as this will give enough contrast between the segments.
Click on the pastel green colour scheme to select it.
3 You can also add patterns to a chart.
Right-click on a segment inside the pie chart and then select Format Data Series.
On the Fill page, select Picture or texture fill, as shown here:
Click on the drop-down arrow for Texture and the following textures appear.
<
152
16 Graphs and charts
Activity 16.5
Choose a suitable pastel colour such as ‘Blue tissue’.
Producing line graphs
In this activity you will learn how to:
produce a line graph
add a second axis
change the axis scale maximum and minimum.
Line graphs are useful to show trends. For example, you
can show the trends in hours of sunshine per day and the
maximum daily temperature for each month over a year.
You are going to produce two such line graphs for
Dubai, UAE.
1 Load Microsoft Excel and open the file
Dubai–weather–table.
Check you have the following data in your
spreadsheet:
153
4 A pair of line graphs is drawn on the same axes like this:
<
154
16 Graphs and charts
9 You now need to add a title for the entire chart and a title for each axis.
Before you do this, make sure that you click on the border of the chart to select it.
To add the chart title, click on Layout on the toolbar and then on Chart Title.
Choose ‘Above Chart’ from the list of options. A textbox appears above the chart into which you
should enter the text Monthly–weather–data–for–Dubai, UAE.
Now add the axis titles as follows:
To add the chart title, click on Layout on the toolbar and then on Axis titles.
Select ‘Primary Vertical Axis’ Title and then select Rotated Title.
Enter the text Temperature in the text box next to the axis.
To add the chart title, click on Layout on the toolbar and then on Axis titles.
Select ‘Secondary Vertical Axis Title’ and then select Rotated Title.
Enter the text Hours of sunshine.
You will now need to increase the size of the chart by clicking on the corner of the border and
dragging the two-headed arrow that appears until the graph is about 1.5 times its original size.
Your chart should now look like this:
155
17 Document production
In this chapter you will be formatting and organising page layout for
a variety of documents and you will be using some of the skills and The key concepts covered in this chapter are:
techniques learnt in the previous chapters. You will be learning about Formatting text and organising page layout
how to edit tables within documents and how to format the contents Using software tools to edit tables
of the cells. This chapter also covers mail merge, which is useful if Mail merging a document with a data source
you want to combine a list of names and addresses and some other
information with a standard letter so that a series of similar letters,
each addressed to a different person, can be produced.
Formatting text and organising with landscape orientation the page is turned sideways so that
the width of the page is greater than its height. Portrait orientation
page layout is much more common and is used for most business documents
You looked at some formatting text and organising page layout in such as letters, memos and reports; this book is portrait format.
previous chapters. Here we will be expanding on this. However, landscape format can be useful for charts, spreadsheets
and notices.
Page orientation
There are two ways in which a page can be printed onto paper.
With portrait orientation the height is greater than the width;
Activity 17.1
Putting text into columns
In this activity you will learn how to:
set the right, left, top, and bottom page margins
set the page orientation (i.e. landscape or portrait)
set the number of columns to use
set each column’s width
set the amount of space between columns.
1 Load Microsoft Word or your word-processing software and locate and then open the document
called Advantages–and–disadvantages–of–networking.
2 Click on Page Layout and then on Margins and select Custom Margins; you will see the dialogue box
for the page layout appear.
Set the top and bottom margins to 3 centimetres and the left and right margins to 2 centimetres.
When done correctly the settings should be the same as this:
<
156
17 Document proDuction
Now set the page orientation to landscape by clicking on the icon like this:
Click on OK to confirm your selections and you will see the document appear on the screen in
landscape orientation.
3 Select all the text in the document by highlighting, then change it to a sans serif font and change
the font size to 14 pt.
4 Select the heading and change the font size to 26 pt.
5 Select all the text other than the heading and click on Page Layout and then click on Columns.
You will be given a choice of how many columns. Choose Two from the menu like this:
6 Double left-click on the gap in the centre of the ruler as shown here:
<
157
This dialogue box can be used to alter the width of each column, put a line between the columns,
and alter the spacing between columns.
You are going to alter the spacing between the columns to 1 centimetre.
Alter the spacing to 1 cm like this:
8 Create a header and add your name left aligned and the number 121121 right aligned.
9 Create a footer and place an automated page number aligned to the right margin.
10 Save your file as a Word file in your area using the filename:
Advantages–and–disadvantages–of–networking.
11 Print a copy of your document.
158
17 Document proDuction
Look carefully at the following, which shows how the text appears
when these indents are used.
In the above, the main body of text has been indented by 1.5 cm
You would then need to click on OK to apply the gutter to the from the left margin and the first line of the paragraph has been
whole document. indented by 0.75 cm from the line of the main text.
Look carefully at this menu and notice that it provides the tools for editing tables.
<
160
17 Document proDuction
5 Insert a row between the tours Classic Cairo and Caravans in the sand by clicking on the row for
Classic Cairo and then right-clicking to show the menu, and then click on Insert to insert the blank
row below. Then enter the data as show here:
6 It has been decided to run each tour on both dates, so the date column needs deleting. Right-click on
the Date and from the menu that appears choose delete cells; the following choices appear:
Choose Delete entire column and then click on OK to confirm the deletion.
7 The table will be improved if the contents of the cells are aligned. Highlight all the cells except the
tour names like this:
<
161
Right-click on the highlighted part of the table and select Cell Alignment and the following options
appear:
This is a good place to hover the cursor over each of the alternatives; for each selection, a caption
will appear explaining what it does. Here is a table show how the text will appear when each button
is applied to cells containing text:
Select Align Centre – this will position the data centrally (horizontally and vertically) in the cells.
Your table will now look like this:
8 You are now going to shade the cells containing the column headings to make them stand out more.
Select them by highlighting them like this:
<
162
17 Document proDuction
Click on Borders and Shading and the following dialogue box appears:
This box allows you to fill selected cells with a pattern. You can also add colour as the background to
selected cells.
Click on Style and change it to the following:
This will shade the selected cells so the column headings look like this:
Activity 17.3
Formatting a table
In this activity you will learn how to:
colour cells
hide the gridlines of a table.
1 Load Microsoft Word and open the file Stopping–distances.
This document includes a table showing the stopping distances for a car at certain speeds.
163
Click on the drop-down arrow on the Fill box and choose the following colour from the palette of
colours by clicking on it:
It is important to note that pastel colours are best as background colours to cells in tables if those
cells also contain text.
Click on OK to confirm the colour choice and the colour is applied to the column headings like this:
3 Now shade the other cells until the table looks the same as this:
4 You are now going to remove the gridlines from the table.
Select the entire table by highlighting it.
Right-click and select Borders and Shading from the menu.
<
164
17 Document proDuction
You need to change the settings on the dialogue box to the following:
Ensure that None has been selected from the Setting and then click on OK.
Also, as you do not want any of the borders (including the borders to the cells shown) check that
Table has been selected in the Apply to section. Click on OK to confirm these selections.
Notice that the table now appears like this with dotted lines showing where the borders had been.
These dotted lines do not appear when the table is printed. You can print preview the document to
see how it will appear when printed.
Mail merging a document with a Performing a mail merge is worthwhile only if a large number of
letters need to be sent. If you had ten letters then it may not be
data source worth the trouble of setting up a mail merge, as you could simply
Mail merging can be used to send the same basic letter, with just create the letter with one lot of details and then change these for
slight differences, to a large number of people. The data source the next letter and so on. If you need more than ten (or you may
is used to supply the names, addresses and other details of the need to send a similar letter to the same people in the future)
people to whom the letter is to be sent. The data source supplies then you should consider using mail merge.
the variable details that are merged into the letters. The data source
can be produced in word-processing, spreadsheet, database or any
other software that can save contact details as a file.
165
Activity 17.4
Mail merging a document with a data source
In this activity you will be using a document that has already been produced and a data source which
again has been set up for you, to produce a mail merge. You will learn how to:
insert appropriate fields from a data source into a master document
insert a date field into a document
select records to merge
merge a document with selected fields
save and print merge master document
save and print selected merged documents.
1 The first step in the mail merge is the creation of the letter. The letter has already been produced
and is available as a file. Load the document Green–project–letter.rtf.
Check that you have the following text loaded.
Dear
You may have heard of The Green Project, which is a project run by your Local
Authority to encourage everyone to recycle as much as possible.
Our database tells us that you have a large or medium sized garden and do not
make use of a compost heap. We would like to encourage as many people in your
situation to make use of a compost heap to get rid of same garden and household
waste by recycling. In turn you will produce rich compost that you can use on your
garden.
We have arranged for a free compost container for you. All you have to do is to
come and pick it up from our depot at 1 Moor Lane, L12 6RE. The depot will be
open from 9am to 5pm Monday to Friday. The compost container is flat-packed and
comes with full instructions for assemble and use. You will be able to fit the pack
into your car boot.
Please take advantage of this and do your bit to help the environment.
Thanking you for your time.
Stephen Doyle
Green Project (Compost) Manager
166
17 Document proDuction
6 As you are using an existing data source to supply the name and address recipient details you can
browse for the file called Green–project–names–and–addresses.
To find this file, follow these instructions.
Check that Use an existing list has been selected and then click on Browse
7 Find the file called Green–project–names–and–addresses.
Your teacher will tell you where this file is located.
Click on the file and then on Open.
8 The data source shows the name and address details for all the recipients of the letter.
Notice that there is an option to remove ticks from the checkboxes to indicate not to send a letter to
that person in the data source.
For this activity you are going to send the letters only to the six recipients with the surnames:
Cheung Gant
Clare Lee
Davies Miles <
167
Scroll and remove the ticks from all the recipients except these six.
Check that you have selected the correct recipients and then click on the first row in the list
(i.e. Cheung) to select it. Click OK.
9 Check that the cursor is positioned in the top left corner of the letter. To add the address details to
the letter, click on Address block shown below.
<
168
17 Document proDuction
Notice that a sample address is shown. Notice that this does not contain all the address items
stored in the data source. To add the items click on Match fields.
11 The following window appears.
Notice that only the Title, Surname and Postcode are shown.
Click on the drop-down arrow for First Name and select Forename.
Click on the drop-down arrow for Last Name and select Surname.
Click on the drop-down arrow for Address 1 and select Street.
Click on the drop-down arrow for Address 2 and select Area.
<
169
Check your settings look the same as those shown below.
<
170
17 Document proDuction
12 The following Address Block field is inserted at the top of the letter.
<<AddressBlock>>
Dear
You may have heard of The Green Project, which is a project run by your Local
Authority to encourage everyone to recycle as much as possible.
13 Move the cursor to after the ‘Dear’ at the start of the letter and insert a space.
Click on Greeting line and the following window appears.
<<AddressBlock>>
Dear <<GreetingLine>>
You may have heard of The Green Project, which is a project run by your Local
Authority to encourage everyone to recycle as much as possible.
<
171
16 The address and greeting details have now been inserted into the letter like this.
Ms Amy Cheung
18 Rycroft Road
West Derby
L12 5DR
Dear Ms Cheung,
Check that the details for the other recipients are correct by scrolling quickly through the letters
using the right arrow .
Click on OK.
Click Next: Complete the merge.
<
172
17 Document proDuction
18 At this stage you can edit individual letters. You can do this to check each letter.
173
18 Data manipulation
When a large amount of data needs to be stored, it first needs to be
put into a structure by using spreadsheet or database software. Once The key concepts covered in this chapter are:
the data has been stored it can then be manipulated by performing Creating a database structure
calculations, searches (i.e. queries), etc. Manipulating data
Presenting data
175
Flat files and relational databases In the flat file there would be data redundancy because
Computerised databases may be divided into two types: the customer address details are stored many times for each time
limited flat-file database suitable for only a few applications, and they hire a tool. This means the same data appears more than
the much more comprehensive and flexible relational database. once in the one table. Hence there are serious limitations in
using flat files and this is why data is best stored in a relational
Flat-file databases database where the data is held in several tables with links
Flat-file databases are of limited use and are suitable only for very between the tables.
simple databases. Flat files only contain one table of data. A record
is simply the complete information about a product, employee, Key words
student, etc. This is one row in the file/table. An item of information
Data redundancy where the same data is stored more
such as surname, date of birth, product number, product name,
than once in a table or where the same data is stored in
in a record is called a field. The fields are the vertical columns in
more than one table.
a table. Because flat-file databases contain only one table, this
Primary key this is a field that is unique for a particular
limits their use to simple data storage and retrieval systems such
record in a database.
as storing a list of names, addresses, phone numbers, etc. Tables
consist of columns and rows organised in the following way:
The first row contains the field names. Creating databases
The rows apart from the first row represent the records in the Before you create a structure for a database it is important to
database. look at a sample of the data that needs to be stored.
The columns contain the database fields. A school keeps details of all its pupils in a database. As well as
personal details (name, address, etc.), the school also holds
The problems with flat-file systems details of the tutor group and tutors.
Flat files store all the data in a single table. The disadvantages of
using a flat file are: The person who is developing the database asks the principal for a
sample of the data. This sample of the data is shown below:
Data redundancy. There is often a lot of duplicate data in the
table. Time is wasted retyping the same data, and more data Description of data stored Sample data
is stored than needs to be, making the whole database larger. Pupil number 76434
When a record is deleted, a lot of data that is still useful may Surname Harris
also be deleted. Forename Amy
Date of birth 15/03/98
Relational databases Street 323 Leeward Road
In a relational database, we do not store all the data in a single Town Waterloo
file or table. Instead the data is stored in several tables with links Postcode L22 3PP
between the tables to enable the data in the separate tables to
Contact phone number 0151-002-8899
be combined together if needed.
Home phone number 0151-002-1410
To understand this, look at the following example: Tutor Group 7G
A tool hire business hires tools such as ladders, cement mixers, Tutor number 112
scaffolding, chain saws, etc., to tradesmen. The following would Tutor teacher title Mr
need to be stored: Tutor surname Harrison
Tutor initial K
Data about the tools
Data about the customers Three tables are used with the names: Pupils, Tutor Groups and
Data about the rentals. Tutors.
Three tables are needed to store this data and these can be called:
Key words
Tools
Relational database a database where the data is
Customers
held in two or more tables with relationships (links)
Rentals.
established between them. The software is used to set
If the above were stored in a single table, (in other words using up and hold the data as well as to extract and manipulate
a flat file), there would be a problem. As all the details of tools, the stored data.
customers and rentals are stored together there would be no record Relationship the way tables are related or linked to each
of a tool unless it had been hired by a customer. There would be no other.
record of a customer unless they had hired a tool at the time.
176
18 Data manipul ation
Q u e s tions B Postcode
LandlineNo Text/Alphanumeric
1 A luxury car rental firm keeps the details of the cars it rents DateOfBirth Date
out in a table. The structure and contents of this table are
FreeSchoolMeals(Y/N)
shown below.
a Give the most appropriate data types for
Reg-number Make Model Year
the following fields: (3 marks)
DB51 AML Aston Martin DB7 2009 i Firstname
CAB 360M Ferrari 360 Modena 2008 ii Postcode
GT X34 FER Ferrari 355 Spider 2000 iii FreeSchoolMeals (Y/N)
MAS 12 Maserati 3200 GTA 2001 b Give the names of three other fields that are likely to be
FG09 FRT Porsche 911 Turbo 2009 used in this database. (3 marks)
M3 MMM BMW M3 Conv 2010 c Explain which field is used as the primary key in the
T433 YTH Jaguar XK8 2009 database and why such a field is necessary. (2 marks)
d It is important that the data contained in this
a Give the field names of two fields shown in database is accurate.
the table. (2 marks) Describe how two different errors could occur
b Give the field name of the field that should be when data is entered into this database. (2 marks)
chosen as the primary key. (1 mark) e Explain how the errors you have mentioned in
c Explain why the field you have chosen for part d could be detected or prevented. (2 marks)
your answer to part b should be chosen
as the primary key. (1 mark) 3 a Explain what is meant by a flat-file database. (1 mark)
d How many records are there in the table? (1 mark) b Explain what is meant by a relational database. (1 mark)
c Describe an application where a flat-file
2 Most schools use databases to store details about each database would be suitable. (2 marks)
pupil. The table shows some of the field names and data
types stored in one pupil database. 4 Databases are of two types: flat file and relational.
a Describe two differences between a flat-file
Field name Data Type
database and a relational database. (2 marks)
UniquePupilNumber Number b A dress hire company needs to store details of
Firstname dresses, customers, and rentals. They want to
Surname Text/Alphanumeric store these details in a database.
FirstLineAddress Text/Alphanumeric Which type of database do you suggest and
SecondLineAddress Text/Alphanumeric give two reasons for your answer. (3 marks)
177
Linking files or tables (i.e. forming relationships) The advantages of relational databases
To link two tables together there needs to be the same field in Using a relational database means that you don’t have to type in all
each table. For example, to link the Pupils table to the Tutor the data for each pupil when you create the Tutor Groups table.
Groups table we can use the Tutor Group field as it is in both
This has the following advantages:
tables. Similarly, the Tutor Groups table and the Tutors table can
be linked through the Tutor number field. Links between tables are It saves time typing
often called relationships, and they are one of the main features It reduces typing errors
of relational databases. It therefore reduces redundancy.
Choosing field names
Pupils
Field names should be meaningful to identify the field. Try to
Pupil number avoid using spaces in fields; instead use dashes or a combination
Surname of upper- and lower-case letters. Try not to make the fieldnames
Forename too long since these will be the column headings in the tables
Date of birth and if they are too long it will make the columns wide and not as
Street much data can be displayed on the screen at the same time.
Town Using the database to extract information
Postcode The Activities for this chapter on the website require the use
Contact phone number of database software. The suggested database software is MS
Home phone number Access 2007. MS Access is a brand name so you have to make
Tutor Group sure that you do not write MS Access in an examination question
when the answer is ‘database software’. MS Access is popular
Tutor Groups database software but there are other examples of databases
Tutor Group that can be chosen.
Tutor number
On creating the tables, linking them and adding data, the data in
Tutors any of the tables can be combined together.
Tutor number A query is used to extract specific information from a database,
Tutor title so queries are used to ask questions of databases. For example,
Tutor surname a query could be used to extract the names of pupils in a school
Tutor initial who are aged 16 years or over. Queries are usually displayed on
the screen but they can be printed out if needed. If a printout is
needed it is better to produce a report. A report is a printout of the
Foreign keys
results from a database. Reports can be printed out in a way that is
A foreign key is a field of one table which is also the key field
controlled by the user.
of another. Foreign keys are used to establish relationships
between tables. In the above example the field Tutor Group
would be the key field in the Tutor Groups table and a foreign
key in the Pupils table.
Activities
Activites for Chapter 18 can be found on the website that Putting formulae in queries
accompanies this book. There are thirteen activities covering: Performing searches on the Employees database
Locating, opening, and importing data from an Producing reports
existing file
Producing calculations at run time
Importing data from an existing file and creating a
Creating the report based on the query
relationship between two tables
Showing and hiding data and labels within a report
Entering data with 100% accuracy, showing subsets
of data and sorting data Database labels
Performing searches using queries Creating a data entry form
Performing wildcard searches
178
19 Presentations
You will probably have created many presentations in different subject
areas but you may not have developed skills in all the areas needed The key concepts covered in this chapter are:
for the examination. For the examination you need to have the skills Using a master slide to approximately place objects and
to be able to create and control an interactive presentation. set suitable styles to meet the needs of the audience
Using suitable software tools to create presentation
In this topic you will be learning how to create presentations using the slides to meet the needs of the audience
software MS PowerPoint 2007. There is other presentation software Using suitable software tools to display the presentation
available having similar features that could be used. MS PowerPoint in a variety of formats
is a brand name so you would get no marks for giving brand names
in the examination. So rather than say ‘use MS PowerPoint’ you would
say use ‘presentation software’.
Using a master slide to approximately In the examination you will be given details of designs, colour
schemes, fonts, etc., that you must add to a master slide.
place objects and set styles
The need for consistency in a presentation The footer, date and slide number areas on the
All the slides in a presentation should look as if they belong together. master slide
This means they should all have a similar design. It is acceptable if There is an area at the bottom of the master slide which is used
the first slide is different from the others because it usually shows to add certain information at the bottom of every slide in the
just the title of the presentation and sometimes the presenter’s name. presentation, such as a footer, page date, or slide number. The
Consistency needs to be considered before you start your footer can be used for text such as a copyright message (e.g.
presentation. Here are some of the things you will need to consider: ©Stephen Doyle 2015).
Styles should be the same for each slide in the presentation – this If you want to add text in the footer area placeholder (i.e. the
ensures that all the slides look as though they belong together. rectangle with footer in it) you click in the box and type in the text.
Fonts – you need to choose a set of fonts that work well The date and slide number (i.e. #) are already on the master slide
together. Fonts should be consistent from one slide to the next. but they will not be shown on the actual slides unless you make
Point sizes – the point size is the size of the font. You will need them active. To make these details appear on each page you must
to choose the point size for headings, sub-headings, and body follow the following steps:
text (i.e. the main text).
Colour schemes – all the slides need to use the same combination
of colours for components such as banners, borders, etc.
Transitions – these are the movements from one slide to the next. 1 Click on and then select and the
There are lots of eye catching transitions but you need to make following dialogue box appears where you can enter dates,
sure you do not use a different one for each slide transition. slide numbers, and a footer.
Animations – these are movements on the actual slides. For
example, you can animate the way bullet points appear on
each slide. Make sure that animations are used consistently.
In the examination you will usually be given instructions about
these features, so you need to understand how to create/change
them using the presentation software.
3 You can enter the footer text into the placeholder area
marked ‘Footer’ on the master slide or you can enter the
text for the footer into the Header and Footer dialogue box
like this:
Note the (c) next to the name will automatically turn into
a copyright symbol on the slides. Remember you can put
If you want the slide to always show the current date, then you any text into the footer and will be asked to do so for the
should select Update automatically like this: examination.
Activity 19.1
Creating a master slide add an image to a slide
In this activity you will learn how to: add text to the header and footer.
create a master slide which can be used to ensure 1 Load Microsoft PowerPoint or your presentation software.
the design consistency in all the other slides in the
presentation
change the background colour of a slide
add a text box to a slide 2 Click on the View tab and select .
3 The following screen appears:
_
180
19 Presentations
Click on .
This allows you to set the size of the screen you are
displaying the presentation on and the orientation of
slides and notes.
_
181
6 You are going to set up a master slide: Left-click on Format Background and the following
Ensure you have selected the master slide shown here: window is displayed:
Check that Solid fill has been selected and then click
_
182
19 Presentations
7 You are now going to add a text box to the master slide containing the following details:
Your full name
Your centre number (use 12122 if you don’t have this information)
Your candidate number (use 123123 if you don’t have this information).
These details need to be in a sans serif font, have a point size of 12 pt and be positioned in the top
left-hand corner of the slide.
There is already an object (i.e., a box containing the text ‘Click to edit Master title style’) and this
needs to be resized to make room for the text box we want to insert.
Click on the corner like this and use the handle and drag the corner down and to the right:
_
183
Now draw the text box in a similar position to that shown here:
Change the font to Arial (which is a sans serif font) and the font size to 12 Pt by altering the
settings like this:
Click on and then on and the following clip art pane appears:
_
184
19 Presentations
Again this image will appear in an identical position on all the slides in the presentation.
If any of these boxes are needed but not in the position shown, you can select the box and drag it
into a new position.
9 You are now going to re-position the box containing the slide number so that it is on the left. You will
need to move the date out of the way while you do this by left-clicking on it and drag it to another
position. Do not worry about putting it into the final position as you can do this later.
Left-click on the box with the slide number in it (i.e., shown as #) and keeping the mouse button
pressed down, drag the box over to the left-hand side of the screen. Now in a similar way move the
box containing the date into the position shown below:
The slide number will now appear on each slide positioned in the bottom left-hand corner.
10 Details such as slide number, the footer, and the date need to be turned on before they will be
shown on the slides.
Click on and then select and the following dialogue box appears:
_
186
19 Presentations
You can see that the clip art overlaps the box to hold the subtitle:
To solve this problem we can re-position the two boxes by moving them up slightly. To move them
you need to left-click on the border of the box and then keeping the left mouse button pressed down,
drag them into a position similar to that shown here:
_
187
12 You now have to set up the following styles for the presentation:
Heading: dark blue, 48 point, right aligned serif font.
Subheading: black, centre aligned, 24 point serif font.
Bulleted list: black, left aligned 18 point sans serif font and you are able to choose the style of
the bullet used.
Click on the text ‘Click to edit Master title style’ as this is the heading for the slide.
Choose any serif font (e.g., Times New Roman) and change the font size to 48 like this:
Click on and select dark blue (it does not matter which dark blue as there are several) from
the colour chart:
Click on and from the colour chart select the colour black.
Notice that there are no bullet points on this first slide.
Click on one of the slides whose layout contains bullet points and then click on the first level of
bullet points (i.e., the first bullet point on the master slide):
Click on the text next to the bullet point and choose a sans serif font (e.g., Courier, Calibri, etc.) and
set the font size to 18. Set the colour of the font to black and set the text to be left aligned.
Change the shape of the bullet by clicking on the drop-down arrow and choosing a bullet
shape of your choice by clicking on it like this:
_
188
19 Presentations
Activity 19.2
Creating a master slide that includes shaded areas
and lines
In this activity you will learn how to:
use a master slide to place objects and set styles
insert a shape onto a slide and change its colour
draw lines on the master slide
insert a clip art image on the master slide
insert information in a footer
include text on the slides including headings,
subheadings, and bulleted lists
format text (i.e., font type (serif or sans serif), point
size, text colour, text alignment, and enhancements
(bold, italic, and underscore).
1 Load the presentation software Microsoft PowerPoint
and create a new blank presentation. Click on and then select and then
choose the rectangle shape from the list of shapes by
left-clicking on it. You will now see the cursor change to
2 Click on and then on to bring up the a cross. Position this cursor on the top left-hand corner
slide master. of the slide and, keeping the left mouse button pressed
down, drag the cursor until you have drawn a rectangle
3 Click on the slightly larger first top slide in the list like this:
down the left-hand side of the screen. You will now see
the following on your screen:
_ _
189
The next step is to select the thickness of the
border which is expressed in points. Click on
again and this time select Weight
from the menu. Now choose 1½ pt from the list of
weights.
Click on tab.
The cursor changes to the cross-wires. Position this cursor Right-click on the image and drag it into the approximate
on the left at the start of the line and then drag the line until position. You will need to resize the image by right-clicking
it meets the other side of the slide. If you press the shift key, on a corner handle and dragging until it is of a size that will
it will keep the line in a horizontal position so you do not fit between the two lines. You will probably also have to
need to spend time trying to adjust the line yourself. move the image into the correct position.
Your image should now be in a position similar to this:
6 You are now going to insert a piece of clip art on the right
of the slide and between the two red lines you have just
inserted.
Click on the box for footer to indicate you want to include
a footer.
Now enter the following footer details: your name, Centre
Click on and then on and then enter the number, and candidate number. If you do not have the
search word ‘Computer’ into the search box and click on Centre number use the number 1234 and if you do not
Go. Then select an image of a computer (any will do). have your candidate number, enter 56789.
_
191
Your dialogue box will now contain the footer details you This text needs to be positioned at the top of the slide
entered: between the two red horizontal lines in a black bold 44
point sans serif font. The text also needs to be left aligned.
To put the text in this position you need to create a text box.
10 You are now going to set the styles of text throughout the
Click on and then select any sans serif font
presentation. This will ensure that text used for headings,
(Arial has been chosen here) and set the size to 12
subheadings, and bulleted lists is consistent across all
points like this:
the slides used in the presentation.
Align the placeholder areas as shown here:
9 You are going to add the following text at the top of the
master slide.
Compusolve
_
192
19 Presentations
You have been asked to set the following styles of text Click on the Filled Square Bullets to select that shape of
throughout the presentation: bullet.
Heading: sans serif font, red, left aligned, and 40 point The bullet now changes to this:
Subheading: sans serif font, centre aligned, and 32 point
Bulleted list: sans serif font, black, left aligned, and
24 point. You can choose your own bullet.
Highlight the text in the ‘Master title style’ placeholder area. 11 You now have to change the subheading. To do this you
need to have one of the slides that contain a subheading
You are now going to format the text to that described for
placeholder area displayed.
the heading.
Choose the second slide in the list by clicking on it.
Click on and then on change the font to a sans
serif font such as Arial and change the size to 40 pt
_
193
You can see that some of the placeholder areas overlap Highlight the text ‘Click to edit Master subtitle style’.
the grey rectangle, so you need to move and resize them Change the font if necessary to a sans serif font such
so that they look similar to that shown below: as Arial and change the size to 32 points like this:
Activity 19.3
Adding the content in the placeholder areas to create the slides
In this activity you will learn how to:
include text on the slides including: headings, subheadings, and bulleted lists
add text to a bulleted list in two columns
insert a text box
animate the addition of items in a bulleted list
create a chart within the presentation package
include segment labels, remove the legend, move and resize the chart
add presenter notes to slides.
1 Load the presentation file Compusolve–v1 if it is not already loaded.
2 You are now going to add the content for the first slide. Here is what you have to do:
Enter the heading: Solving your computer problems
Enter the subheading: Hardware and software problems solved
_
194
19 Presentations
3 Notice the area below the slide containing the message ‘Click to add notes’.
This is where you type in your presenter notes. These will appear on the presenter’s computer
screen but the audience will only see the slides.
In this area type in the following text:
4 You are now going to add the content to the second slide.
This slide is going to contain two bulleted lists – both in the white area of the slide with one list
down the left-hand side and the other down the right-hand side.
You therefore need to pick a layout which includes this feature.
Click on and then on and the following slide layouts will be shown:
_
195
Choose the ‘Two content’ layout by clicking on it, as this
layout includes two bulleted lists side by:side.
This slide contains overlapping placeholder areas. There are several ways of doing this but the easiest is
simply to create a text box and check that the text has
Also, you have to put the subheading ‘Helping the formatting of a subtitle.
businesses and individuals’ on the slide. There is no
heading for this slide.
Click on the outline of the placeholder area for the
heading (i.e., the box containing the text ‘Click to add Click on and then on and then create a
title’ and press the backspace key to delete it. text box in the position shown here:
Your slide should now look like this:
_
196
19 Presentations
_
197
6 You are now going to enter the content for the third slide.
Click on and then on and the following slide layouts will be shown:
Click on Blank.
7 You are going to create a pie chart using the data in the following table on this slide:
Problem % of calls
Virus infection 10
Hardware failure 28
Lost data 15
Lack of network 30
Other problems 17
Notice that an Excel spreadsheet has appeared at the side of the slide. This spreadsheet is used to
enter the data used to create the pie chart.
You can see that there is a table of data:
You need to replace this data with your own data like this:
_
199
You will then notice that the pie chart is produced Right-click on a segment in the chart again and select
automatically on the slide like this: Format Data Labels.
The format labels dialogue box now appears like this:
The chart now appears like this: Make the chart as large as possible to fit the white space
like this:
Notice that the text for ‘Virus infection 10%’ has not
appeared in the segment. This is because the text is too 11 Now add the following presenter notes to complete
wide to fit in the segment. this slide:
10 You have been asked to remove the legend from You can see from the chart that the majority of the calls
the chart. for our services are about network problems, although
To remove the legend, click on it so that the handles calls about hardware failure are a close second.
appear like this:
Now keep the right mouse button pressed down and drag
the corner to make the pie chart larger. Also ensure that
the pie chart is central in area.
_
201
12 Click on to start adding content on the fourth slide and then click on where
you can choose the layout best suited to the slide you want to produce.
You are required to produce a slide with a subheading, a single bulleted list that is left aligned and a
piece of clipart.
You can see from the list of slides that there is no one slide which meets all the requirements:
The most appropriate slide is the one called ‘Title and Content’ but this has a heading (called a title)
rather than a subheading but it is easy to change it.
_
202
19 Presentations
Click on the ‘Title and Content’ slide and the following Enter the following bulleted list on the left-hand side of
slide appears: the slide:
Offer advice
Provide training
Provide backup services
Place a different clipart image of a person using a
computer or a group of people using computers in the
white section at the bottom of the bulleted list and in a
similar position to that shown here:
Centre the text by clicking on if the text is not Now add these presenter notes to this slide:
already centred and change the font colour to black
.
Now enter the following text for the subheading:
13 Save your presentation using the filename Compusolve–v2
Activity 19.4
Adding slide transitions, printing presenter notes, and providing screen shots for evidence
In this activity you will learn how to:
automate the transitions between slides
print a copy of the presentation slides including the presenter notes
print a copy of the audience notes
provide printed evidence of animation of bullet points
provide printed evidence of animation of slide transitions.
1 Load the presentation software Microsoft PowerPoint and the file Compusolve–v2 if it is not already loaded.
2 You now have to use a transitional effect between each slide in the presentation.
3 Click on and then move your cursor onto each of the slide transitions (shown below)
in turn to see their effect.
_
203
Choose one of them (you choose which one) and then
click on , which will apply the transition
you have selected to all the slides in the presentation.
Notice the following settings which can be changed:
Click on the drop-down arrow in the section and choose Handouts (3 Slides
Per Page).
You will now see how the slides and note area will appear when printed:
_
205
Click on this slide so that it is displayed like this:
The numbering 1, 2, 3, etc., indicates that each bullet is animated separately and it is the evidence
that you have to supply. You now have to take a screenshot of this screen by pressing Prt Scrn (i.e.,
Print Screen) key on your keyboard. The image of the screen is stored in the clipboard. You can then
open a document using your word-processing software and then paste the image into a suitable
position. You will need to make sure that you include your name, centre number, and candidate
number on the document before printing it out.
8 You now have to produce evidence that the slide transitions have been applied according to the
instructions in the examination.
Click on if you are not looking at the normal slide view already.
_
206
19 Presentations
Click on and you will see the slides listed in the presentation appear like this:
You can see the small symbol appear on each slide showing that a slide transition has been
applied to each slide.
9 To obtain a printout of this evidence press the Prt Scrn (i.e., Print Screen) button on your keyboard
to copy it, and open a new document in your word-processing software. Paste the screenshot image
in a suitable place and make sure that you add your name, centre number, and candidate number to
the document which you should then print.
Activity 19.5
Manipulating images
In this activity you will learn how to:
insert an image onto a slide
crop an image
resize an image
flip an image
adjust the contrast and brightness of an image
1 Load the presentation software Microsoft PowerPoint.
2 You need a blank slide on which to load an image.
Click on and then from the list of layouts, select Blank.
_
207
3 Click on and then – you now need to follow instructions from your teacher who will
tell you where the image file called Caribbean can be found.
Once located, double left-click on the image and it will be loaded onto the slide like this:
This image occupies the entire slide and there is also an unwanted object in the picture.
If the picture has not been selected (as shown by the small circles around the edges) then left-click
on the image to select it.
The picture formatting toolbar will automatically appear like this:
Notice the handles around the edge of the picture. Click on the top right handle and drag it to the
left. Use these handles to crop the picture so that the part containing the bottle is not used:
Click on the white part of the slide to deselect the cropping tool.
Click on the image again so that the handles are shown. _
208
19 Presentations
Click on the bottom right of the image and drag the 7 You now have to alter the contrast and the brightness of
corner until the image has a height of about half of the the image.
original like this: Ensure that the image is selected and the picture format
tools are shown.
Click on
Increase the contrast to +20%:
Click on .
From the menu select Flip Horizontal:
Notice the image has flipped with the boats in the image
appearing on the right:
6 With the image selected move it to the top right-hand
corner of the slide like this: Click on and select +10%.
8 You now have to add a callout box containing text.
_
209
You will see the cursor change to a cross. Click on a
position near to the image and drag the cursor creating Notice Fill has been selected. Click on
the callout box like this: and choose White.
Click on .
The callout box needs turning into a text box. Click on
.
The cursor changes shape.
211
Activity 19.6
Placing sound within a slide
1 Load PowerPoint and load the file A life on the ocean wave. Your teacher/lecturer will tell you where
to find this file. Check the slide looks the same as this:
2 To add some sound to this slide, click on and then on the drop-down arrow on
Double-click on the file to insert it. The following menu appears where you have to decide how you
want the slide to be played. Click on Automatically so that it plays as soon as the slide appears.
Notice the icon of a speaker appears. Here it is making the text hard to read so we will move it.
_
212
19 Presentations
3 Move the cursor over the speaker icon where it changes shape to the following .
Click with the left mouse button and keeping the button pressed down drag the icon to the bottom
right of the slide.
The slide will now look like this.
Click on Yes.
2 You will then be presented with a screen showing all the slides along with their timings in seconds.
You have now completed the timings for all the slides.
214
19 Presentations
3 The next step is to complete the loop so the presentation runs automatically according to the slide
timings and repeats over and over until the Esc button is pressed.
Take some time to look at all the options on this menu. As we want the presentation to play
continuously without user intervention, select the following option.
Browsed at a kiosk (full screen)
Click on
215
20 Data analysis
In this chapter you will be learning about spreadsheets and how
they are used to create data models. You will also learn about The key concepts covered in this chapter are:
how such models need to be tested. Once the model has been Creating a data model
created the results from the model can be obtained and presented Testing a data model
in a suitable way. Spreadsheet software can also be used to Manipulating data
create a simple database and the data in the spreadsheet can Presenting data
be extracted using search criteria or sorted into different orders.
The tools provided in spreadsheet software can be used to adjust
the display features in a spreadsheet to improve the appearance
of the spreadsheet. Microsoft Excel has been used here as the
spreadsheet software. There are other brands, and other software
packages that do much the same.
Active cell Here are some calculations and what they do. Notice that you can
(where you can enter Worksheet use upper or lower case letters (i.e. capital or small letters):
or edit data) grid/matrix
216
20 Data analysis
= C3+C4 (adds the numbers in cells C3 and C4 together) Verifying data entry means checking that you have entered the data
= A1*B4 (multiplies the numbers in cells A1 and B4 together) accurately from the examination paper or other source. You do this
= 3*G4 (multiplies the number in cell G4 by 3) carefully by visually checking. A small mistake in a number in a
= C4/D1 (divides the number in cell C4 by the number in cell D1) spreadsheet can change the data in the whole spreadsheet so that
= 30/100*A2 (finds 30% of the number in cell A2) it is all incorrect if there are formulae that use the incorrect number.
= A2^3 (finds the cube of the number in cell A2)
You will also need to check that you have obeyed all the
What must be done with the numbers or contents of cells is instructions correctly. It is very easy to miss something out that
determined by the operator. Here is a table of operators and what you should have done.
they do in a formula:
Mathematical operations and formulae
Operator What it does Spreadsheets can perform all the usual mathematical operations
+ Add such as:
– Subtract Add +
* Multiply Subtract –
/ Divide Multiply *
^ Power Divide /
Power ^ (e.g., square, cube, square root, cube root, etc.).
Functions
Functions are calculations that the spreadsheet has memorised. The order of mathematical operations in a formula
For example, the function =sum(b3:b10) adds up all the cells Spreadsheets perform calculations based on the formulae
from b3 to b10 inclusive. Functions will be covered a bit later. entered. Spreadsheets carry out the operations in calculations in
the following order:
Copy and paste
1 Brackets (called parentheses) are carried out first. Where
Copy and paste can be used to move items around on the
there are brackets inside brackets (i.e. there are nested
same spreadsheet or to copy data from a completely different
brackets), the calculations in the innermost brackets are
document or file such as the table in a word-processed document
carried out first. Then the calculations in the next brackets are
or from a database.
carried out and so on.
2 Percentages
Drag and drop 3 Indices (i.e. powers and roots)
Drag and drop is a quick way of moving an item. You simply 4 Multiplication or division
left-click the mouse button on the item and then, keeping the 5 Addition or subtraction
left mouse button down, drag the item to the new position.
When the mouse button is released the item appears in the Suppose we have the following values contained in these cells in
new position. a spreadsheet.
a1 = 10
AutoFill b7 = 4
Suppose you want to type the days of the week or months of the g10 = 24
year down a column or across a row. Excel is able to anticipate g11 = 3
what you probably want to do by the first word alone. So, if you h2 = 8
type Monday, the chances are that you want Tuesday in the next The table below shows how the spreadsheet would use each
column or row, and so on. The main advantage in using AutoFill is formula with the contents of the cells to calculate the result.
that the data being entered is less likely to contain errors than if
you type in the data yourself. There are many other ways you can Formula Calculation Result
use spreadsheet software to fill in data for you, so use the Help to =a1+g10/g11 =10 + 24/3 = 10 + 8 18
find out more about AutoFill. =a1*b7+h2 =10 × 4 + 8 = 40 + 8 48
=a1*(b7+h2) =10 × (4 + 8) = 10 × 12 120
Manually verifying data entry
In the examination you will be asked to obey a set of instructions. =(a1*g11)+(g10/g11) =(10 × 3) + (24 ÷ 3) = 30 + 8 38
It is extremely important that you obey the instructions exactly. So =a1^2+g10/g11 =102 + 24 ÷ 3 = 100 + 8 108
if you are asked to use a certain font, you must use this even if =g10+10% =24 + 0.1 × 24 26.4
you feel a different one would be better.
=20%*h2 =0.2 × 8 1.6
217
Activity 20.1
Copying formulae relatively and showing the formulae for 5 Copy the function in cell B9 relatively across the row
a spreadsheet until cell F9.
In this activity you will learn how to: Check your spreadsheet looks the same as this:
enter the layout of a model
use mathematical operations
copy formulae
display formulae.
1 Load your spreadsheet software and enter the following
data exactly as it is shown here:
Click on .
You should now see the formulae being displayed like
this. This is handy as the formulae can be checked.
Activity 20.2
Setting up a simple model
In this activity you will learn how to:
enter data with 100% accuracy
format cells.
A university student is living away from home for the first time and she wants to make sure that she budgets the limited
amount of money she will have. She is going to create a spreadsheet model. You are going to follow her steps. _
218
20 Data analysis
3 In cell D4 enter the following formula to work out the amount the student gets per week from her student loan.
=b4/c4
4 In cell D5 enter the following formula to work out the amount of money the student gets each week from her part-time job.
=b5/c5
5 In cell D7 enter the formula =d4+d5. This calculates the total weekly income.
6 Enter a formula that will calculate the weekly spending on rent and put the answer in cell D11.
7 Copy the formula you have entered in D11 relatively down the column as far as cell D16.
8 Put a formula in cell D18 to add up the spending from cells D11 to D16.
9 Enter a formula in cell D20 which will subtract the total spending from the total income.
10 Your completed spreadsheet will now look like that shown here.
The following menu appears. Select Entire column and click on OK.
2 Check that correct column has been deleted.
To delete a row, position the cursor on any cell in the row you
want to delete and right-click and select Delete from the menu.
The following menu appears where you select Entire row and then
click on OK.
220
20 Data analysis
Deleting groups of cells reference will still be to the same number of cells up and to the
Select the group of cells you want to delete by left-clicking on one left, so the reference will now be to cell D2.
of the cells and dragging to select all the cells for deletion. Now
right-click and select Delete and then choose from the options in A B C D E
the following menu. 1
2
3
4 =A1
5
6
Figure 1
You can see that copying the formula did not work.
3 Delete the contents of cells C7 and C8.
4 Now change the formula in cell C6 so that it includes an
absolute cell reference to cell D3.
The formula to be entered is: =$D$3*B6.
The formula looks like this in the spreadsheet:
6 Save the spreadsheet using the filename Relative–and–
absolute–referencing.
Named cells
Rather than refer to a cell by its cell address (e.g. B3) we can give
it a name and then use this name in formulae or whenever else
we need to refer to it. For example, if cell B3 contains an interest
rate then we can use the name Interest_rate.
Activity 20.5
Naming a cell
In this activity you will learn how to:
name a cell
use named cells in formulae.
1 Load Excel and create a new document and input the
following data exactly as appears here:
5 You will now create the formula for working out the interest in cell B5 using the cell names in the formula rather than the
cell addresses.
Click on cell B5 and type in an equals sign ( = ) and click on (if the formula menus and icons are not
shown) and then click on Use in Formula.
You will see that the names for the two cells are displayed. Click on Amount_of_money_invested.
You will see this is inserted into the formula.
Type in an asterisk ( * ) and then click on Use in Formula again and this time click on Interest_rate. These two named cells
are used in the formula to calculate the interest received.
6 Your final spreadsheet should now look like this:
Naming cells makes it easier to understand how the formula works and makes it easier to test.
7 Cell B5 needs to be formatted to currency (dollars with no decimal places).
Do this and you have completed this simple spreadsheet.
Save this spreadsheet using the filename Activity–5–Named–cell.
_
223
2 When this file was saved in csv format, the formatting 5 Now give the cells in the range D7 to D15 the name
was lost, so you need to tidy up this spreadsheet. Format Amount–when–converted
the spreadsheet as follows:
6 Once the cells have been named they can be used in
Change the font size of the main heading (i.e. Currency the formulae, and doing this makes them easier to
exchange model) to 20 pt and make the text bold. understand.
Make the text ‘Enter amount in US Dollars to be In cell D7 enter the following formula:
exchanged’ bold.
=Amount–in–Dollars*Exchange–rate
Widen the columns so that all the column headings and
Notice that you do not use a relative reference for cell D4.
the text in the columns are shown properly.
The computer knows that this cell must have an absolute
Make all the column headings bold. reference because the name refers to a single cell and
Check that your spreadsheet now looks like this: not a range.
7 Enter the number 1 into cell D4. This is the amount in
dollars to convert into the other currencies.
8 Now copy the formula in cell D4 down the column as far
as cell D15.
ROUND This tests to see if the number in cell A2 is greater than or equal
The ROUND function rounds a number correct to a number to 500. If true, the number in cell A2 will be multiplied by 0.5
of decimal places that you specify. ROUND is used in the and the answer displayed. If false, the number in cell A2 will be
following way: displayed.
225
Nested functions Assuming that a mark to be tested is in cell B2, the following
A nested function is a function which is inside another function. formula making use of nested functions will do this:
Suppose we want to create a spreadsheet which will tell a teacher =IF(B2>=51,"Pass",IF(B2>=41,"Resit","Fail"))
whether a student has passed, failed or needs to resit a test. To
This formula works like this: the mark in cell B2 is tested to see
do this we first need a list of students and their marks.
if it is equal to or more than 51 marks, and if it is the message
A formula will need to be created that will do the following: ‘Pass’ appears in the cell where the formula is placed. If this
condition is not true then the formula moves to the next IF
If a student scores 40 marks or less then the message ‘Fail’
statement which tests the mark to see if it is greater or equal to
appears.
41 in which case a ‘Resit’ message appears. If this is false, the
If a student scores between (and including) 41 to 50 marks
message ‘Fail’ appears.
then the message ‘Resit’ appears.
If a student scores 51 or more marks then the message ‘Pass’
appears.
Activity 20.7
Nested formulae 5 Check that your spreadsheet looks like this:
In this activity you will learn how to:
use nested formulae
copy formulae relatively
demonstrate that the model works using test data.
1 Load Excel and open the file called Nested–functions.
2 Check you have the following on your screen:
4 Copy this formula relatively down the column from cell Save your spreadsheet using the filename
C2 to C15. Checking–nested–formulae.
226
20 Data analysis
COUNTIF
This is used to count the number of cells with data in them that
meet a certain condition.
For example, it could be used to find the total number of males in
a group of students by counting the number of entries of ‘Male’.
Activity 20.8
Using the COUNTIF function 6 Add the formulae in cells C20 and C21 to count the
In this activity you will learn how to: number of students who failed and who need to resit.
use COUNTA functions Remember that it is best to use absolute cell references
use COUNTIF functions. in these formulae.
1 Load the spreadsheet file Checking–nested–formulae 7 Check that your spreadsheet looks like this:
saved in Activity 14.7.
2 In cell A18 enter the text ‘Number of students’.
3 You have been asked to create a formula to display the
number of students.
Enter the following formula into cell C18
=COUNTA($C$2:$C$15)
Notice the absolute cell reference in this formula. This is
done so that if the formula is copied it will always refer to
cells C2 to C15.
4 In cell A19 enter the text ‘Number of students
who passed’ and in cell C19 enter the formula
=COUNTIF($C$2:$C$15,"Pass")
5 Enter the text for the labels as shown here:
Lookup functions
Lookup functions search for an item of data in a table and then
extract the rest of the information relating to that item. The table
of items of data is stored either in the same spreadsheet or a
different one. The table can also be a completely different file.
For example, if each different item in a shop has a unique
product number, a table of product details can be produced
with information such as product number, product description,
and product price. If a particular product number is entered, the
lookup function will retrieve the other details automatically from
the table.
This all sounds a bit complicated but hopefully by completing
activities 20.9 and 20.10.
227
Activity 20.9
Using VLOOKUP 3 Enter the product number 15 into cell B4.
In this activity you will learn how to: The VLOOKUP function needs to be placed in cells B5 and
use the VLOOKUP function B6. This will use the product number in cell B4 to obtain
format cells. the rest of the details about the product.
In this activity you will be using a function called VLOOKUP. In cell B5 enter the formula =VLOOKUP(B4,A13:C22,2)
The idea of this spreadsheet is to type in a product code, and This tells the computer to search for the data vertically
the details corresponding to that code will be looked up by in the table from cells A13 to C22 until a match with the
looking for a match for the product code in a vertical column. product number entered in B4 is found. The ‘2’ at the end
1 Load Excel and create a new document. means that once a match is found to use the data in the
2 Look carefully at the following spreadsheet and enter the second column.
details exactly as they appear here: In cell B6 enter the formula =VLOOKUP(B4,A13:C22,3).
Notice the last number in this formula is a 3 because the
data to be used is now in the third column.
Format cell B6 to currency with 2 decimal places.
Check that your spreadsheet looks like this:
Activity 20.10
Using HLOOKUP
In this activity you will learn how to:
use the HLOOKUP function.
In this exercise you will be using a function called HLOOKUP. This is used when you want the software to
look at the data in the table in the horizontal direction to obtain the match.
_
228
20 Data analysis
The idea of this spreadsheet is for the user to type in pupil names in a class with their forms, and the
name of the form teacher automatically appears. The code for the form is looked up horizontally in the
table until a match is found.
1 Load Excel, create a new document and type in the following spreadsheet exactly as it
appears here.
Important note: the data that is used to find the list (i.e. in cells B12 to H12) must be arranged in
ascending order for the HLOOKUP function to work.
2 Enter the following formula in cell C4:
=HLOOKUP(B4,$B$12:$H$13,2)
This formula works by looking at the contents of cell B4 and then comparing it with the contents in the
horizontal set of data in cells B12 to H13 until it finds a match. Once the match is found the computer
places the data in the second row (i.e. the form teacher) below the matched data into cell C4.
3 Copy the formula in cell C4 down the column as far as cell C10.
Your spreadsheet now contains all the form teachers for the students like this:
Testing the data model Absolute cell references being used in a formula instead of
Models should always be thoroughly tested to make sure that they relative cell references and vice versa.
are producing the correct results. It is easy to make a mistake when The wrong output being produced when data is filtered,
constructing a formula. Here are some things to watch out for: sorted, etc.
Mistakes in the formula (e.g. mistakes in working out a Not formatting the data in a cell containing a formula.
percentage). Always check any calculations performed on data using a calculator
Incorrect cell references being used. and check that all the instructions have been obeyed exactly.
229
When testing spreadsheets, you should have a testing strategy single file or spreadsheet. In order to produce a database using
and these were covered in Chapter 7. The testing strategy tests Excel you need to ensure that the field names appear at the
the validation checks using normal, abnormal and extreme data. top of each column and that the rows of data are directly below
A table is completed containing the test number, the test data, these. You must not leave a blank line between the field names
the purpose of the test, the expected result and the actual result. and the data. When creating a simple flat-file database using
Excel, the field names are at the top of the column and the data
Manipulating data representing a record is a row of the spreadsheet.
Spreadsheet software such as Excel can be used to produce
a flat-file database. This means that all the data is stored in a
Activity 20.11
Searching to select subsets of data
In this activity you will learn how to:
perform searches on a set of data
use Boolean operators in searches.
1 Load Excel and open the file Database–of–employees.
Check that the file you are using is the same as this one:
Notice the column names which act as the field names and the rows of data which are the records.
230
20 Data analysis
2 You are now going to search through this set of data and find a subset of it that satisfies certain
criteria.
You need to select the data you want to use. In this case you are going to use all the data so click on
at the top left of the spreadsheet as this is a quick way of selecting the entire set of data.
Check that you have the Home tab selected and if not, click on it.
Click on in the toolbar and then select Filter. You will notice drop-down arrows appear on
each field name.
3 Click on the drop-down arrow for Surname and then select Text Filters and finally Equals:
The following window appears where you view only those records that correspond to a certain
Surname:
231
Enter the surname Singh into the box like this and then click on OK:
Notice that only the records having the Surname equal to Singh are shown like this:
This selects all those records having the surname of either Singh or Hughes.
Click on OK and the data which meets the criteria will be displayed like this:
5 Go back to the original set of data and ensure that all the data is selected.
Check you have selected all 36 records.
_
232
20 Data analysis
Click on the drop-down arrow for Salary, select Number Filters, and then select Greater Than Or
Equal To, like this:
We want to display all the details for those employees earning $40000 or greater so enter the
details as shown into the window:
6 Print out a copy of the filtered data, putting the data onto a single page and using landscape
orientation.
7 Close the spreadsheet without saving.
233
Activity 20.12
Searching using wildcards
In this activity you will learn how to:
use wildcards in searches.
1 Load Excel and open the file Database–of–employees.
Check that the dataset has 36 records.
2 Select the entire set of data.
This will pick out the surnames having only three characters.
Click on OK to display the data:
5 To remove the filter and get back to the original data you can use Undo but here you will do this
another way.
Click on . Notice the filter symbol showing that data in this column has been
filtered.
_
234
20 Data analysis
This will search for all surnames starting with the letter ‘S’
followed by any 4 characters. Thus, Smith would be included in
the search, but not Simpson.
Check that the filter has been removed and you have
36 records on the screen.
6 Close without saving.
Activity 20.13
Searching for subsets of data in the employee database
In this activity you will learn how to:
perform searches using a single criterion and using
multiple criteria
perform searches using wildcards.
In this activity you need to load Excel and the file called
Database–of–employees and then perform the following
searches by filtering the data. For each search you are
This shows all the details for employees who are either Web
asked for, you should produce a printout in landscape
designers or Programmers.
orientation and fitted to a single page.
Here are the searches:
1 A list of details for employees who are female.
2 A list of details for employees who earn less than
$30 000.
3 A list of all the part-time employees.
4 A list of all the employee details with surnames
starting with the letter H.
5 A list of all the employee details with surnames that
end with the letter y.
6 A list of all employees who earn less than $50 000 but
more than $35 000.
7 A list of all the employees who are either Network
engineers or Technicians.
235
Sorting data
When sorting data you have to select all the data and not simply
the field you are performing the sort on. If you do not do this the
whole set of data will become jumbled up.
Activity 20.14
Sorting a set of data into ascending or descending order
In this activity you will learn how to:
sort data using one criterion.
1 Load the spreadsheet software Excel and open the file Database–of–employees.
Check that the file you are using is the same as this one:
2 Click on at the top left of the spreadsheet to select the entire set of data.
236
20 Data analysis
3 Click on and select Custom sort from the drop-down menu and this Sort box appears:
4 Click on the drop-down arrow for Sort by and select the field Surname from the list of fields. Notice
that we will be sorting the data in ascending order (A to Z) according to surname:
6 Close the file without saving as this will keep the file in its original order.
237
Activity 20.15
Sorting data using more than one criterion
In this activity you will learn how to:
sort data using more than one criterion.
1 Load Excel and open the file Database–of–employees.
2 Select the entire set of data and click on and select Custom sort from the drop-down menu.
You are now going to sort the data into alphabetical order according to position and also for those
people in the same position, sort these into numerical order of Salary with the greatest salary first.
Enter the details as shown:
Click on Add Level and in the Then by box select the field Salary and finally in the right-hand box
select Largest to smallest.
Check your settings are now the same as this:
238
20 Data analysis
3 You now have to follow a series of similar steps to produce the following sort on two criteria:
Sort into numerical order according to salary with the largest first and then into alphabetical order
according to surname starting with the letter A first.
4 Produce a printout on a single sheet of paper in landscape orientation.
5 Close the spreadsheet file without saving.
Activity 20.16
Further sorting into two criteria
In this activity you will learn how to:
sort data
print output according to instructions.
1 Load the spreadsheet Database–of–employees.
2 Sort the entire set of data into Position order according to alphabetical order (A to Z) and then sort
into date of birth order with the oldest employees first.
3 Save and print a copy of the sorted data on a single page in landscape orientation.
4 Close the spreadsheet without saving.
239
Headers and footers Here are some types of information commonly put into the
A header is an area between the very top of the page and the top headers and footers:
margin. A footer is the area between the very bottom of the page
Page numbers
and the bottom margin. Once you tell the spreadsheet you want
Today’s date
to use headers and footers then you can insert text into one or
The title
both of these areas.
A company logo (it can be a graphic image)
The author’s name
The filename of the file that is used to hold the document.
Activity 20.17
Creating a header and footer for the spreadsheet for the database of employees
In this activity you will learn how to:
add headers and footers to a spreadsheet
insert information such as date, page numbers, etc., into headers and footers.
1 Load Excel and open the file Database–of–employees.
Click on this area and a text box appears into which you can enter the details for the header. Enter
the text shown here:
With the cursor positioned on the line below this text line, click on .
The details in the header will now look the same as this:
Click on in the toolbar and a menu appears from which you need to click on Page 1 of ?
This will appear in the footer like this:
5 You are now going to see how the header and footer appear if the data was to be printed.
Click Print Preview.
240
20 Data analysis
241
Adding colour/shading to enhance the spreadsheet
Choose a font from the
drop-down list of fonts To add colour or apply shading to cells, you first select the
when you click here. cells by left-clicking on them and dragging until the cells are
highlighted. Then right-click on the selected cells and the
following menu appears, from which you select Format Cells:
242
20 Data analysis
Select the Fill tab and the following window appears where you If you want to adjust the column widths automatically so they
can select colours and patterns: accommodate the width of the field names and the data in the
fields, there is the following quick way: Click on the following
symbol at the top left of the spreadsheet . This will select
the entire spreadsheet. When this is done, you will see all the
spreadsheet cells change to light blue. Position the cursor
between two of the columns (any will do) and double-click the left
mouse button. You will see the columns automatically change so
they fit all the contents.
shown here
Aligning data and labels
Data in cells is normally positioned according to the following: The following menu appears from which you should select
Hide & Unhide.
Numbers are aligned to the right in a cell.
Text is aligned to the left in a cell.
To align cells, click on the Home tab and then look at the
alignment section of the screen.
To align the data or labels in a cell, select it and click one of
these icons:
Keeping the left mouse button pressed down, drag the cursor up
or down to change the row height.
243
Setting the page layout so that it prints on a Notice that you can alter the width to 1, 2, 3, etc., pages and
specified number of pages the height will be automatically adjusted. Alternatively you can
It is always preferable to print out a spreadsheet on a single page, alter the height to 1, 2, 3, etc., pages and the width will be
but in large spreadsheets this is not possible as the text could automatically adjusted. There is also the option to scale the
end up being too small to read. spreadsheet to a certain percentage of its original size. When
adjusting the size, always check that you can read all the text and
You can specify the number of pages on which the spreadsheet is remember to preview the spreadsheet before printing.
printed in the following way.
Click on Page Layout in the main menu. Look for the Scale to
Fit section of the ribbon:
244
21 Website authoring
In this chapter you will be learning how to create a structured
website with stylesheets, tables and hyperlinks. You will be using The key concepts covered in this chapter are:
a special code for this called HTML. There are other ways to create Web development layers
web pages using special web-authoring software such as Adobe Creating web pages
Dreamweaver or Microsoft FrontPage. In this book you will be Using stylesheets
using just a text editor to create the HTML code and then use web Testing and publishing a website
browser software to view the web page you have produced.
Web development layers HTML is a text file, just like MS Word, except that it contains special
markers called tags. HTML can be entered into a text editor, which
When large websites are developed it is important to note that
enables tags to be entered as well as content to which the tags
many people will be involved in the development of the site. For
apply. You will see how to use a simple text editor for entering and
example, writers, illustrators, photographers, cartoonists, etc.,
editing HTML later.
may work supplying the content for the website. Designers put
the content together in a way that is attractive and eye-catching Important note: HTML is not a programming language as such.
to users. Technical staff will create the code/instructions that will It just tells the computer how to display text and pictures on
make the various elements of the website behave in a certain way. web pages.
There are three layers in web development:
Key words
Content layer HyperText Markup Language (HTML) used to create
Presentation layer documents on the world wide web. You use it to specify the
Behaviour layer. structure and layout of a web document.
Content layer – when you view a web page the content layer is Tags special markers used in HTML to tell the computer
what you see. The content layer consists of text and images and what to do with the text. A tag is needed at the start and
also the pointers that allow you to navigate around the website. end of the block of text to which the tag applies.
Click on the device where you want the HTML files to be stored.
In most cases this will be one of the hard drives or a flash drive.
Your teacher will tell you on which drive/device the files are to
be stored.
3 Double-click on the name of the device and you will be Click once on the New Folder.
presented with a list of folders currently on that device.
4 Right-click on the white area around the file list and the
following menu appears:
You can now type in the name for this sub-folder.
In this case we will call this sub-folder Activity 21.1. You can
now add sub-folders for any of the other Activities as they are
needed.
Delete the text inside the box and replace it with the name <html>
HTML like this: <head>
<title> An example of HTML code </title>
</head>
<body>
</body>
</html>
246
21 Website authoring
Look at this section of code carefully. You will see the way the tags alignment attributes attached to it. Here is an example of HTML
are nested within each other (i.e. shown by the blue lines) and using different alignments:
also how indentation is used to make it easier to see the various
<html>
parts of the code.
<body>
The tags are the words enclosed between the < and > signs. They
<p align="left">This is an example of left aligned text.</p>
are HTML instructions and they tell the computer how to display
or format the text. <p align="center">This text has been centred.</p>
<p align="right">This text has been right aligned.</p>
Here is what each tag in this section of code does:
</body>
<html> and </html> tells the computer that we are creating
</html>
an HTML document. The <html> tag tells the computer that
the document is starting and the </html> tells the computer
that the document has ended. Creating an external stylesheet
<head> and </head> is a section where you provide Before the introduction of stylesheets, if you had a website
information about your document. containing 50 pages and wanted to change the text for all the h1
<title> and </title> tells the computer that you want to put headings from black to blue, you had to look for all the h1 tags
the text between the tags as a title. As the title is part of the on all the web pages and alter them manually. This was very time
‘head’ section it needs to be inserted after the opening head consuming.
tag <head> and before the closing tag </head>. The nesting
Luckily we now have stylesheets and you would need to make the
of tags in this way is very important as not nesting the starting
change only once in the stylesheet and all the text for the h1 tags
and closing tags is a frequent cause of problems when writing
would change from black to blue automatically.
HTML. The text used as the title does not appear on the web
page but instead is shown in the browser’s window. If a user of It is important to note that stylesheets are not HTML documents
the web page adds the page to their favourites, this title text is and do not use tags, and you will never see < and > used in
used as the name of the page. stylesheets. Also the files used to save stylesheets do not have
<body> and </body> is a section where you insert the the file extension .htm but instead use the .css extension
content of your document and visual information about how it
The use of stylesheets has the following advantages:
is to appear on the web page.
They save time – you change things in only one document
More code and what it does (i.e. the stylesheet).
<h1> and </h1> indicates that you want the text to be a They help give a website a consistent look (e.g. heading sizes,
heading of type h1. There are other headings h2, h3, etc., to fonts, font sizes, etc., will be consistent across all pages).
choose from. h1 headings are larger in size compared to h2
There are a few rules you need to obey when creating a stylesheet
headings and so on. The text you want on the page is placed
using CSS (Cascading Style Sheets).
between these two tags like this: <h1>This text is size h1</h1>
<p> and </p> mean start and end a new paragraph. A break CSS codes have the following structure:
between the paragraphs is inserted that is approximately two
lines in length. The text for the paragraph is placed between Selector {property: value}
This is the value of the
the two tags. property (e.g. 22pt)
More tags and what they do What HTML tag(s) the The property is a property
Here are some other tags and what they do: property applies to (e.g. h1) of the style (e.g. font-size)
<b> and </b> means start bold and stop bold style text.
<u> and </u> means start underline and stop underline style So to change the size of the font used for the h1 heading we
text. would use the following CSS stylesheet:
<i> and </i> means start italics and stop italics style text. h1 {font-size: 22pt}
<br> means insert a line break. There is no closing tag for
this. This creates a smaller gap than the <p> tag. To understand stylesheets you need to look at a few examples:
<hr> means insert a horizontal line and there is no closing tag. Here two different styles are applied to the h1 heading:
247
This stylesheet sets the heading h1 to the colour blue and also If you had a website and used a stylesheet and wanted all
aligns the text centrally. Notice the curly brackets at the start occurrences of the h1 heading to be changed from blue to red,
and end of the stylesheet and also notice that there is a comma you would only need to change the stylesheet slightly to this:
separating the properties.
h1 {text-align: center, color: red}
Activity 21.1
Creating a simple web page using HTML Check that your file has been saved correctly like this:
In this activity you will create a very simple web page using
HTML and you will learn how to:
use the editor to create HTML code
use simple tags to create a web page
alter the sizes of headings using h1, h2 and h3 Notice the browser icon is shown next to the filename.
save an HTML document. If you do not see this icon (or the icon for whichever is
1 Notepad is an editor and we can use it to put the HTML your default browser) then you have probably missed
together. If you don’t have Notepad as a shortcut, then out the .htm file extension and you will have saved the
from the Start menu, type ‘notepad’ in the search field to file as a text file by mistake.
locate and then open it. 3 To open the HTML file you have just saved it is necessary
Type the following text into the editor exactly as it is to use a web browser program.
shown here: Load the web browser program you usually use
(e.g. Internet Explorer, Firefox, Chrome).
4 Click on File and then Open.
You will now need to find the HTML folder.
Once you have found the folder click on the file
Mywebpage.
Your web page will now load and you can see the results:
248
21 Website authoring
There are two steps to create an external stylesheet: There are a number of colour names you can use shown here:
1 Create the external stylesheet in .css format.
black silver gray white
2 Link the stylesheet to the HTML pages you want it to apply to. (#000000) (#C0C0C0) (#808080) (#FFFFFF)
maroon red purple fuchsia
Font families (#800000) (#FF0000) (#800080) (#FF00FF)
There is a problem with some fonts because not all web browsers green lime olive yellow
can display them. This means when specifying fonts you need (#008000) (#00FF00) (#808000) (#FFFF00)
to produce a prioritised list of fonts. This means you do not just navy blue teal aqua
give one font; instead, two or more choices are given. What then (#000080) (#0000FF) (#008080) (#00FFFF)
happens is that the web browser looks along the list of fonts
starting from the first one that is specified and if it cannot be Note: the American spelling of the colour ‘gray’.
used it then moves onto the next font in the list and so on.
If you want to use a colour that is not one of the sixteen named
There are two ways of specifying a font: colours, you can refer to a colour palette and then use the
hexadecimal code for the colour.
by the name of the font such as Arial, Times New Roman,
Calibri, etc.
Palette of colours
by whether the font is serif or sans serif.
To get a palette of colours with their codes use the following
This stylesheet specifies the font families for the h1 headings: website:
h1 {font-family: Calibri, Arial, sans-serif) http://www.webmonkey.com/2010/02/color_charts/
This means that if Calibri can be used by the browser, it will be Activity 21.2
used and if not, Arial will be used and if this is not available then
any sans serif font will be used.
Creating a stylesheet
In this activity you will learn how to:
It is always best to end a font family with either sans-serif or serif create a stylesheet in .css file format
as these will always be available no matter which web browser is link a web page to a stylesheet.
used to display the web page.
In this activity you will be creating a stylesheet which will
If you use the name of a multi-word font such as Times New then be used by a section of HTML code to set the styles
Roman, the name of the font must be placed inside inverted for a web page.
commas like this: For this activity you will be creating two files:
body {font-family: ‘Times New Roman’, Century, serif} A stylesheet using the .css file format
Here is a list of properties and the values they can have: A web page using the .htm file format
Both of these files can be created and saved using a text
Property Value
editor such as Notepad.
Font-style normal
1 From your operating system screen, click on the Start
Font-style italic
Font-weight normal
Font-weight bold button then click on All Programs and then
Font-size 12pt, 22pt, etc. Accessories and then on Notepad.
Text-align left 2 Notepad is an editor and we can use it to assemble the
Text-align right formatting instructions that make up the stylesheet.
Text-align center
Text-align justify
Background colour
You can change the background colour in the stylesheet like this:
body {background: red}
or by using a code for red (#FF0000)
body {background: #FF0000}
Note the background colour of the body is being defined here.
_
249
Type the following text into the editor exactly as it is shown here:
body {background: #FEF76E; font-family: Arial, Verdana, sans serif }
h1 {font-family: Arial, Verdana, sans serif; font-size: 32pt; font-color: navy; font-weight: bold}
Important note: you must spell 'colour' as 'color' in both stylesheets and HTML code.
Click on Save.
3 With the stylesheet still being shown in Notepad, click on File and then New and type in the
following HTML exactly as it is shown here:
<html>
<head>
<title>My first stylesheet</title>
<link rel="stylesheet" type ="text/css"
href="Myfirststylesheet.css">
</head>
<body>
<h1>This heading should be point size 32 and colour
navy and in bold</h1>
<p>This is my first stylesheet so I hope it works</p>
</body>
</html>
Notice the following step which is used to inform the computer that this page is to be linked to a
stylesheet. Notice that the filename of the stylesheet is included so that the computer can find the
stylesheet that is to be used with this web page.
<link rel="stylesheet" type="text/css"
href="Myfirststylesheet.css">
_
250
21 Website authoring
Click on Save.
You have now completed the HTML code of the web page including the link to the stylesheet.
4 Load your web browser software and click on File and then Open.
You will now need to locate the folder where your HTML and CSS files are stored.
You will see the HTML file for the web page displayed like this:
You have now created a stylesheet and attached it successfully to the HTML code for a web page.
251
Activity 21.3
Creating a stylesheet according to instructions
In this activity you will learn how to:
change the appearance of a bullet in a list
use a stylesheet with common styles such as h1, h2, h3, p, and li.
In the examination you may be asked to create a stylesheet for use within all the pages of a website to aid consistency.
The stylesheet for a particular website must contain the following styles:
h1 – red, sans-serif font, 34 point, centre-aligned, bold
h2 – dark blue, serif font, 20 point, left-aligned
h3 – green, sans-serif font, 12 point, left-aligned
li – blue, sans-serif, 10 point, bullet points, left-aligned
p – black, serif font, 10 point, left-aligned
1 Load Notepad and key in the following text to create the stylesheet shown here.
Tip: Once you have completed one line of the stylesheet, copy it and paste it for the second line. You then have to make
only minor changes rather than type in the whole line, which will save time.
Look carefully at each line of the stylesheet and notice how the lines match the required styles.
Notice the way the font for each style is specified. First a font name is given (e.g. Arial or Times New Roman). If the font
name is more than one word, the font name must be enclosed between quote marks like this 'Times New Roman'. After the
font name and a comma, the words sans-serif or serif are used. This is so that if the required font is not available with the
browser, then an alternative serif or sans-serif font can be used.
Notice that the colours of the fonts are specified like this:
color: navy
There are 16 colours that have names and these are; black, silver, gray, white, maroon, red, purple, fushia, green, lime,
olive, yellow, navy, blue, teal, and aqua.
There are many other colours that you can use, but they are accessed using hexadecimal codes and further information
about the colours and their codes can be found at: http://www.w3schools.com/html/html_colors.asp
In the style for the list, notice that the type of bullet used for the list can be specified like this:
list-style-type: circle
This means a circle is used for the bullet. Here is a summary of the types of bullet you can have:
List-style-type Bullet appearance Example
disk Solid circle • UAE
• Egypt
circle Circle UAE
Egypt
square Square ¨ UAE
¨ Egypt
decimal Decimal number 1. UAE
2. Egypt
2 Save this stylesheet in your HTML folder using the filename Style–sheet.css.
_
252
21 Website authoring
3 You are now going to create the web page that makes use of the stylesheet you have just created.
At the top of the Notepad click on File and then New.
Type in the following HTML:
<html>
<head>
<title>Task setting up a stylesheet</title>
<link rel="stylesheet" type="text/css" href="style–sheet.css"/>
</head>
<body>
<h1>This is the h1 heading</h1>
<h2>This is the h2 heading</h2>
<h3>This is h3 heading</h3>
<p>This is the text used for the majority of paragraphs on each page</p>
<ul>
<li>This is point one in the list
<li>This is point two in the list
<li>This is point three in the list
<li>This is point four in the list
</ul>
</body>
</html>
Notice the fourth line where the stylesheet is linked to this web page.
Click on File and then Save As… and call the filename Second–web–page–with–a–stylesheet.htm.
4 Load your web browser software and click on File and then Open and locate your HTML folder and open the file
Second–web–page–with–a–stylesheet.htm.
The web page now opens in your browser like this:
253
Activity 21.4
Practising creating a stylesheet 2 Load the web page created in the last activity called
In this activity you will learn how to create a stylesheet. Second–web–page–with–a–stylesheet.htm into
In this activity you are required to create a stylesheet Notepad. With the HTML displayed in Notepad, change
according to instructions. You may find it quicker to amend one of the instructions so that the web page now uses the
the stylesheet created in the last activity and then save the stylesheet with filename Style–sheet–act4.css.
stylesheet using a different filename. You will then use the Save this HTML using the filename Third–web–page–
HTML file created in the previous activity to link to this new with–a–stylesheet.htm.
file. You will have to amend the HTML slightly as the filename 3 Load your browser and load the file Third–web–page–
for the stylesheet will have changed. with–a–stylesheet.htm.
1 Create a stylesheet for use by a web page. The styles for Check carefully that the stylesheet is producing the
this stylesheet are as follows: correct styles for the web page.
h1 – black, serif font, 28 pt, centre-aligned, bold
h2 – red, serif font, 20 pt, centre-aligned, italic
h3 – green, sans-serif font, 12 pt, right-aligned
li – black, sans-serif, 10 pt, square bullet points, left-
aligned
p – blue, serif font, 10 pt, left-aligned
Save this stylesheet using the filename Style–sheet–act4.css.
Hyperlinks (often just called links) It is also important to check external links regularly as websites
Hyperlinks are an important part of websites as they allow users sometimes change their URL, thus the links to them will no
to move from one web page to another or within the same web longer work.
page. Links are text or images that a user can click on in order to
jump to a new web page, which can be on the same website or a Creating a link in a new window
completely different one. They can also be used to move between Unless specified, a link will open in the same window.
sections on the same web page which is especially useful if the
To create the HTML to open a link in a new window you add
web page is long. When the cursor is moved over a link, the cursor
target="–blank" to the anchor tag as shown here:
arrow turns into a small hand.
<a href="http://www.oup.com/"target="_blank">Oxford
Creating external links to a website using the URL University Press website</a>
You can create HTML code that will provide a link to an external
This results in the link appearing like this on the web page: Oxford
website using the URL (i.e. web address) of the external site.
University Press website
External links are used to provide links to web pages and websites
that are outside your directory where you store your website. When the user clicks on the link they are taken to the website
with URL http://www.oup.com/ opened in a new window.
For example, if we wanted to provide a link to the Oxford
University Press website the HTML for this is:
Creating links to other locally stored web pages
<a href="http://www.oup.com/">Oxford University Press Websites usually consist of many web pages and users will want to
website</a> be free to move between these pages using links. These links are
The text shown in blue is the URL of the website you want to link called relative links and are used to enable users to move to other
to and the text to supply the link (i.e. Oxford University Press) also pages that are saved in the same directory on the computer or server.
appears in the tag. The HTML you need to enter in the editor for this feature looks
The link on the web page appears as follows: like this:
Oxford University Press website <a href="webpage1.html">Introduction to HTML</a>
Important note The text shown in blue is the name of the file for the web page
To create a link to an external website you have to use http:// as you are linking to and after it is the text that appears on the web
the starting part of the URL and not just www.
254
21 Website authoring
page and acts as the link. When viewed in the browser the link Using tables to organise a web page
appears as follows: Planning a web page is difficult but it can be made easier by
using a table. The table produces a page layout into which text,
Introduction to HTML
images and other elements can be placed. Tables are also used
in web pages for presenting content in a similar way to the way
Creating links to send mail to a specified email address
tables are used in ordinary documents.
Visitors to your website may want to send you a message and you
can create a link that will allow them to do this using the mailto In the examination you may be asked to create a table consisting
tag. When the user of your web page clicks on the text underlined of a certain number of columns and rows. In many cases there
acting as the link, a dialog box addressed to you will appear into will be a diagram to show what the table should look like on the
which they can type their message. web page.
The HTML you need to enter in the editor for this feature looks like There are three basic tags used to create a table:
this:
<table> this is the tag to start a table
<a href=mailto:[email protected]>Name to go here</a> <tr> this is the tag to start a row of a table
The text shown in blue is your email address and after it is the <td> this is the tag to start a data cell
name that appears on the web page that acts as the link. When </td>
viewed in the browser, the link appears as follows: Name to go here
</tr>
Creating anchors and links to anchors on the same web page </table>
Anchors act as points of reference on a web page. They enable a Here is a section of HTML used to create a table:
user to move to part of the same web page, usually using an item
in a menu as a link. It makes it easier for a user because they do <table>
not have to waste time looking at part of the web page they are <tr>
not interested in. <td>Cell 1</td>
Suppose there is a menu like this at the start of the web page <td>Cell 2</td>
and then material about each of these in turn is discussed in </tr>
sections on the same web page:
<tr>
1. What is copyright? <td>Cell 3</td>
2. When can you use copyrighted material?
<td>Cell 4</td>
3. Myths about copyright
</tr>
To create the above links to the anchors in the main body of text
</table>
in the document, you can use the following HTML:
The table for this section looks like this:
<a href="#copyright">1. What is copyright?</a>
<a href="#use">2. When can you use copyrighted material?</a>
<a href="#myths">3. Myths about copyright</a>
The above links will link to the anchors that are positioned in the
text to which they refer. So, for example, the link called ‘copyright’
will need to have an anchor called ‘copyright’ at the start of the
Notice that there is a <tr> and </tr> for each row in the table. Also,
‘What is copyright?’ section. Usually you would place the anchor
there is a <td> and </td> for each column in the row (or each cell,
near the heading for the section.
as the intersection of a column and a row is called a cell).
The HTML used to provide an anchor for the first item in the list
Notice that there is no border to the table. To include a border, a
could be:
border attribute has to be used as you will see later.
<a name="copyright"></a>
Borders around tables
The HTML for the second item in the list could be:
The tables so far did not have borders around them. To place a
<a name="use"></a> border around the table you use the following:
The HTML for the third item in the list could be: <table border="2">
<a name="myths"></a>
255
Activity 21.5
Creating anchor links
In this activity you will learn how to create anchor links in a web page.
Sometimes anchor points take the user to another point on a long web page and, to avoid the user having to use the scroll bar
to scroll the page back to the beginning, it is best to supply them with a link. This is done by inserting an anchor at the top of the
page and then placing a link further down the page. You can see the link at the bottom of the page in the following screenshot:
Activity 21.6
Creating the code for a table
In this activity you will learn how to create a basic table.
Write the section of HTML that can be used to produce a
table with three columns and four rows. Each cell in the
table should hold the following text.
256
21 Website authoring
This needs to be added after the <table> and before the Using merged cells
instructions which specify the rows and cells. If you want to merge cells in a table together there are two
attributes you can use depending on whether you want to merge
The number ‘2’ is used to specify the thickness of the border.
cells in columns or rows. These attributes are:
Here is a table that contains a border of thickness 2 pixels:
Colspan
Rowspan
Colspan
Colspan is an attribute using in the <td> tag and you can use it
to specify how many columns the cell should span. Look at the
following section of HTML:
<table border ="2">
<tr>
Changing the width of a table
By adding the following, when the table is drawn it will have a <td colspan="3">Cell 1</td>
border of 1 pixel and the whole table will occupy a width of 50% </tr>
of the entire screen width. <tr>
<table border ="1" width="50%"> <td>Cell 2</td>
In the browser the table will appear like this: <td>Cell 3</td>
<td>Cell 4</td>
</tr>
</table>
You can tell that this table consists of two rows as there are two
<tr> tags. You can also tell that the second row is divided into
3 cells as there are three <td> tags (one for each cell). There is a
The table width can also be specified by the number of pixels: border around the table of 2 pixels.
<table border ="1" width="500"> Colspan is short for column span.
257
Cell spacing and cell padding
To add spacing between the cells in a table you use the
cellspacing attribute. To add spaces between the content of a cell
and the cell itself you use the cellpadding attribute. You will see
how both of these attributes can be used in the following section.
Activity 21.7
Changing the width and height of a table and the width of Notice also how the width of each cell is specified in
cells in the table pixels.
In this activity you will learn how to: 2 Save this HTML in your HTML folder using the filename
change the width and height of a table Table–Activity–15.7.
change the width of cells in a table. Open this file in your browser to check it correctly
1 Load your HTML editor (e.g. Notepad) and enter the produces the basic table.
following HTML code: Check your table looks like this:
<table height="250" width="300" border="2">
<tr>
<td width="200">Cell 1</td>
<td width="50">Cell 2</td>
<td width="50">Cell 3</td>
</tr>
<tr>
<td width="200">Cell 4</td>
<td width="50">Cell 5</td>
<td width="50">Cell 6</td>
</tr>
</table>
Notice how the height and width of the table in pixels are
specified in the first line.
Table headers
Table headers can be used to specify the header of a column. In
the following table ‘Country’, ‘Capital’ and ‘Currency’ have been
used as the headers.
258
21 Website authoring
Here is the HTML used to create the above table. Notice that the table width is 60% of the screen width and
the cell spacing and cell padding have both been set to 5 pixels.
<table width="60%" border="1" cellspacing="5"cellpadding="5">
<tr>
<th>Country</th>
<th>Capital</th>
<th>Currency</th>
</tr>
<tr>
<td>Greece</td>
<td>Athens</td>
<td>Euro</td>
</tr>
</table>
Activity 21.8
Border, cell spacing and cell padding
In this activity you will learn how to insert a table using a table header, table rows, table data, cell
spacing, and cell padding.
1 Load your HTML editor (e.g. Notepad) and enter the code to produce the Country, Capital and
Currency table shown above but alter the first line to be:
<table width="60%" border="1" cellspacing="10" cellpadding="50">
Your table should look the same as this:
3 Add another row to the table containing the text: France, Paris and Euro.
4 Save the file using a different filename to the name given in step 2 and then load it into your browser.
259
Activity 21.9
Producing tables
In this activity you will learn how to use tables to organise a web page.
Being able to produce tables according to a design is needed for the examination. Here are some tables
that you need to work through and understand. Study the code carefully and then type them in and
save each using the filenames Example–Table1.htm, Example–Table2.htm, etc.
Table 1
This table has a horizontal width of 60%. Notice that the width of a cell can be specified and this width is
a percentage of the table size and not the screen size.
<table border="1" cellpadding="5" cellspacing="5" width="60%">
<tr>
<td width="20%">Cell 1</td><td>Cell 2</td>
</tr>
<tr>
<td width="20%">Cell 3</td><td>Cell 4</td>
</tr>
</table>
Table 2
This table uses a header that spans two columns:
<table border="1" cellpadding="5" cellspacing="5" width="50%">
<tr>
<th colspan="2">Table header</th>
</tr>
<tr>
<td width="30%">Cell 1</td><td>Cell 2</td>
</tr>
</table>
Table 3
Notice that in the first row of the table, the first cell occupies two rows and the second cell occupies the
normal one row. In the second row the cell is placed in the space left to the right of cell 1.
<table border="1" cellpadding="5" cellspacing="5" width="50%" >
<tr>
<td rowspan="2">Cell 1</td><td>Cell 2</td>
</tr>
<tr>
<td>Cell 3</td>
</tr>
</table>
_
260
21 Website authoring
Table 4
The first row of this table is used as a header and spans two columns. The second row contains Cell 1
which spans two rows and Cell 2 which spans a single row. The third row only contains Cell 3. The fourth
row contains Cell 4 which spans two columns.
<table border="1" cellpadding="5" cellspacing="5" width="50%" >
<tr>
<th colspan="2">Table Header</th>
</tr>
<tr>
<td rowspan="2">Cell 1</td><td>Cell 2</td>
</tr>
<tr>
<td>Cell 3</td>
</tr>
<tr>
<td colspan="2">Cell 4</td>
</tr>
</table>
Activity 21.10
Producing tables to a design
In this activity you will learn how to use tables to organise a web page.
In the examination you may be given a diagram of a table and then have to produce the section of HTML
needed to create it.
Produce the HTML code for each of the following tables.
Table 1
This table is to have a width of 50% of the screen, a table border of 1, cell spacing of 5 and cell padding of 20.
The table is to appear like this:
_
261
Table 2
This table is to have a width of 800 pixels, a table border of 1, cell spacing of 5 and cell padding of 20.
Cell 2 is to span two rows.
The table is to appear like this:
Table 3
This table is to have a width of 500 pixels and a table border of 1. Cell 1 is to span three rows.
The table is to appear like this:
262
21 Website authoring
Finding out file format and size of an image Images taken with a digital camera are far too large to be used on
a web page. They need to be resized and saved using a different
It is important to know the file format and size of an image. It is easy
filename before being used on a web page. To resize an image
to do this by displaying the image and then right-clicking on the
you need to use a photo-editing package such as Photoshop or
mouse so the following menu appears:
Fireworks. Here the image size has been altered to 200 pixels
wide and 150 pixels high.
263
Using tags to adjust image size a cell depends on the alignment used for that cell. Both text and
The height and width attributes are used to set the height and images can be aligned vertically in a cell using the following:
width of an image on a web page. Using these you can specify
<td valign="top"><This text will appear aligned to the top of
how big the image appears on the web page regardless of how
the cell></td>
large the image actually is.
The above valign will set the vertical alignment of the image to the
If you do not set a height and width for the image, it will appear in
top of the cell.
the actual size it was saved.
<td valign="top"><img src="picture1.jpg"></td>
<img src="filenameofyourimage.jpg" width="100"
height="100"/> The above valign will set the vertical alignment of the image in the
cell to the top.
This displays the image whose filename is ‘filenameofyourimage’
using a width of 100 pixels and a height of 100 pixels. You can have the following vertical alignment:
Although you may think that this reduces the file size of the image valign ="top"
and hence the time taken to load the image onto the web page, valign ="middle"
this is not the case, as the image is still loaded from the disk and
valign ="bottom"
then adjusted to fit the size specified.
For horizontal alignment of text and images, the following is used:
It is therefore better to reduce the image size using an image
editing program, as this will reduce the file size when the adjusted <td align="center"><This text will be aligned centrally></td>
image is saved. This will make the file size for the image smaller
The above HTML aligns the text centrally in the cell.
and hence faster to load on the web page.
<td align="right"><img src="picture1.jpg"></td>
It is still useful to use width and height attributes because it
tells the browser software how much space is needed in the final The above HTML aligns the text to the right in the cell.
layout and this makes the web page download faster.
You can have the following vertical alignment:
Activity 21.12
Inserting an image into a cell in a table
In this activity you will learn how to:
insert an image into a cell in a table
align an image horizontally and vertically in a cell.
1 Before starting this activity you will need to check that the image file called Oxford–banner.jpg appears in the same folder
that you use to keep your HTML files. If the file is not in the folder, you need to download it into the folder.
2 Load Notepad and open the file called Table–with–image.htm.
The following HTML appears:
<table border="1" cellspacing="5" cellpadding="5" width="50%">
<tr>
<td><img src="Oxford_banner.jpg" width="600" height="200"></td><td>Cell 2</td>
</tr>
<tr>
<td>Cell 3</td><td>Cell 4</td>
</tr>
</table>
Notice the way the tag for the image has been inserted into the first cell of the table. The filename of the image to be inserted
is between quotation marks and also the width and height of the image have been specified in pixels.
<img src="Oxford_banner.jpg" width="600" height="200">
_
264
21 Website authoring
3 Load the file Table–with–image.htm into the browser and you will see the image appear in the table like this:
4 There are three images you now need to place in the other cells. Each image is to have a width of
200 pixels and a height of 100 pixels. The image files are to be placed as follows:
In Cell 2: oup1
In Cell 3: oup2
In Cell 4: oup3
Adjust the HTML by replacing the text Cell 2, Cell 3 and Cell 4 with the above images. Check that
when viewed in the Browser the web page looks like this:
_
265
5 You are now going to alter the alignment of the content of the cells so that the image in the top right
cell is aligned to the top and the image in the bottom left cell is aligned to the right.
Change the tag for the top right data cell to:
<td valign="top"><img src="oup1.jpg" width="200" height="100"></td>
Change the tag for the bottom left data cell to:
<td align="right"><img src="oup2.jpg" width="200" height="100"></td>
Save the file using the file name Table–with–image1.htm
Load the file into your browser and check it appears as in the screenshot above.
Adjusting the alignment of the image on a web Using software to resize an image
page It is often necessary to resize an image so that it can be put into a
You can adjust the alignment of the image on a web page. This certain space on a web page. There are two ways this can be done:
section of HTML aligns the image to the middle of the page as
Use image editing software (e.g. Adobe Photoshop, Microsoft
well as setting the height and width of the image.
Photo Editor, Macromedia Fireworks, etc.)
<img src="filenameofyourimage.jpg" align="middle"
Specify the required height and width of the image in pixels in the
width="100" height="100"/>
image tag like this:
Here is a list showing the alignments you can have:
<img src="oup1.jpg" width="200" height="100">
align="middle"
align="left" Maintaining the aspect ratio
Maintaining the aspect ratio means keeping the ratio of the width
align="right"
to the height of an image the same when the image is resized.
align="top" This can be done in the image tag as follows:
align="bottom"
<img src="oup1.jpg" width="200">
All these alignments need to be inserted into the tag for the
The image in the image tag is resized so that it has a width of
image similar to that shown above.
200 pixels. Notice that the height is not specified in the tag as it
For example: will be automatically set to maintain the aspect ratio.
<img src="image.jpg" align="left"/>
aligns the image from image.jpg to the left of the page.
266
21 Website authoring
The top image is the original and the bottom image is distorted
because it has been widened while keeping the height the same
as the first image. You can see that the image has been stretched
in the horizontal direction only.
Aspect ratio
The aspect ratio of an image is the ratio of the width of the
image to its height. It is expressed as two numbers separated
by a colon. Suppose the aspect ratio of an original image is 2:1.
You can distort the image using a tag by specifying the width and
height like this:
<img src="oup1.jpg" width="200" height ="120">
Click on the image to follow the link
Notice that the ratio of the width to the height is no longer 2:1 so
the aspect ratio has changed meaning that the image has been
distorted slightly.
267
The need for low resolution images for data transfer Printing websites in browser view
When an image is used on a website, the user of the website has Printing websites in browser view means printing the web pages
to wait while the image is obtained from the server, transferred exactly as they appear when viewed in the browser you use. In
over the internet and assembled on the web page using the the examination, you will usually be asked to add your name
browser software. The time they have to wait for the image file and candidate number on the web pages so that when they are
to be transferred is called the data transfer time (also called printed, your work can be identified.
the download time). If the user has a high speed broadband
internet connection this time will be low. If they have a low speed Printing evidence of HTML code or stylesheets
connection there will be a time delay and this is annoying. The time If you are asked to supply a copy of the HTML code or stylesheet
for the image to appear depends on the file size of the image. It is or both, you will be asked to supply a printout containing details
therefore advisable to keep image files as small as possible. such as your name, candidate number and centre number. As
For the above reason, images in websites are normally used at always, you must follow the exact instructions given about the
low resolutions as low resolution images have a smaller file size. details required in the examination paper.
To produce a printout containing these details it is best to take a
Amending the file type screenshot of the HTML or stylesheet using the Prt Scr key on the
There are many file types for images but only three that are used keyboard. This will take a copy of the screen and store it in the
with websites: clipboard. The screenshot can then be pasted into a new word-
GIF file type images consist of only 256 colours. This file type processing document where it can be cropped to remove any
is good at compressing images so that they load quickly. unwanted parts and resized so that all information is clearly seen.
JPEG/JPG file type images comprise millions of colours and The details such as name, candidate number and centre number
this makes them the main file type for photographic images. can then be added before saving the document and then printing
PNG file type images are able to use millions of colours and it out.
are good at compressing images. You can also print the HTML code directly from some editors. Print
All graphics packages such as Fireworks or Photoshop are able to screens may not show enough for a long/wide string of code.
change different file types to those shown above. All you need to do
is to select Save As… and select the file type you want to save in.
Practical exam tip All documents and printouts must
have your name and some other details printed (not written)
on them.
You might also have to print the CSS file – again putting your
name on it. You can use Print screen and copy the screen to
word-processing software such as MS Word and then type the
details such as your name and other details before printing out
the document.
268
00 Glossary
3D printer printer that can print in three- systems that behave in a similar way person and others but you do not want
dimensions by repeatedly building up to the human brain by learning from the others to see each other’s email
layers of material. experience, etc. addresses.
Aspect ratio the ratio of the width of an Biometric a unique property of the
Abnormal data data that is unacceptable image to its height. human body such as fingerprints or
and that should be rejected by a ATM (automatic teller machine) another retinal patterns which can be used
validation check; for example, entering name for a cashpoint/cash dispenser. to identify a person and allow them
text into a numeric field or inputting Attachment a file which is attached access to a computer system.
data which is outside the range to an email which the recipient can BIOS (basic input/output system)
specified. open and view the contents provided stored in ROM and holds instructions
Absolute reference a reference to a cell they have suitable software to open used to ‘boot’ (i.e. start) the computer
used in a formula where, when the the file. up when first switched on.
formula is copied to a new address, Audio-conferencing conducting a Bit a binary digit 0 or 1.
the cell address does not change. meeting held by people in different Blog a website that allows comments
Address book the names and email places using devices that allow voice to be posted; usually in reverse
addresses of all the people whom you to be sent and received. chronological order.
are likely to send email stored as a file. Blogger a person who maintains a blog.
Alphanumeric data sometimes called Backing storage storage which is not Bluetooth a method used to wirelessly
text and it includes letters, digits and classed as ROM or RAM. It is used transfer data over short distances from
punctuation marks. to hold programs and data. Backing fixed and mobile devices. The range
Analogue a continuously changing storage devices include magnetic hard of Bluetooth depends on the power of
quantity that needs to be converted drives, optical drives (CD or DVD), the signal and can typically be from
to digital values before it can be flash/pen drives, etc. 5m to 100m.
processed by a computer. Backup keeping copies of software and Blu-ray optical disk that has a much
Analogue-to-digital converter (ADC) a data so that they can be recovered higher storage capacity than a DVD.
device that changes continuously should there be corruption or loss of Blu-ray disks have capacities of
changing quantities (such as some or all of the ICT system. 25 Gb, 50 Gb, and 100 Gb. These
temperature) into digital quantities. Backup file copy of a file which is used high capacity Blu-ray disks are used
ANPR (automatic number plate in the event of the original file being to store high definition video. They
recognition) a method using OCR on corrupted (damaged) or lost. are used for storing films/movies with
images obtained from video cameras Bandwidth a measure of the amount of a 25 Gb Blu-ray disk being able to
to read car registration plates. data that can be transferred per second store 2 hours of HDTV or 13 hours of
Anti-spyware software used to detect and over the internet or other network. standard definition TV. It is possible
remove spyware which may have been Bar code a series of lines of differing to play back video on a Blu-ray disk
put on your computer without your thickness which are used to represent a while simultaneously recording
knowledge or permission. number which is usually written below HD video.
Anti-virus software software that is the bar code. Can be read by a scanner Bookmark storage area where the URL
used to detect and destroy computer to input the number accurately. (i.e. the web address) of a website can
viruses. Batch processing type of processing be stored so that it can be accessed
Applet a program designed to be where all the inputs needed are later using a link.
executed from within another collected over a period of time and Boolean data data that can exist only in
application. Unlike an application, then batched together, inputted and two states; for example True or False.
applets cannot be executed directly processed in one go. For example, Bridge a hardware device used to
from the operating system. questionnaires from a survey are connect two local area networks to
Applications software software designed collected over a few weeks and then each other. The purpose of a bridge is
to do a particular job such as word- batched together and processed in to decide whether a message needs
processing or database software. one go. to be transferred between the two
Artificial intelligence (AI) creating bcc (blind carbon copy) this is useful networks or just confined to one of
computer programs or computer when you want to send an email to one them. This reduces network traffic.
269
Browser (also called web browser) Chip and PIN Chip readers are the indentation, borders, and location of
software program you use to access the devices into which you place a credit/ HTML elements. CSS files are used to
internet. Microsoft Internet Explorer is debit card to read the data which is create a similar look and feel across all
an example of a web browser. encrypted in the chip on the card. The the web-pages in a website.
Bullet point a block or paragraph of text PIN pad is the small numeric keypad CSV comma separated variables. A way
that has a symbol placed in front to where the personal identification of holding data in a file so that it
make the section of text stand out. number (PIN) is entered and the can be transferred into databases or
holder can be verified as the true spreadsheets.
CAD (computer-aided design) owner of the card.
software software used to produce CLI (command line interface) type of Data raw facts and figures, e.g. readings
technical drawings, plans, designs, user interface where a user has to from sensors, survey facts, etc.
maps etc. type in instructions in a certain format Data capture term for the various
cc (carbon copy) is used when you want to accomplish a task. methods by which data can be
to send an email to one person but you Clipboard temporary storage area used entered into the computer so that it
also want others to see the email you for copying or cutting data to and then can be processed.
are sending. To do this you enter the pasting it somewhere else. Data logger a device which collects
email address of the main person you Cloud computing internet-based readings from one or more sensors.
are sending it to and in the box marked computing where programs and data The time interval between each
cc you enter all the email addresses, are stored on the internet rather than on reading can be varied (called the
separated by commas, of all the people the user’s own computer. logging rate) and the total time over
you wish to receive a copy. Command line interface (CLI) type of which the data is logged (called the
CD-R (CD recordable) optical storage user interface where a user has to logging period) can also be varied.
where data is stored as an optical type in instructions in a certain format Data logging the process of using an ICT
pattern. The user can record their data to accomplish a task. system to collect data from sensors
onto the disk once only. Compression storing data in a at a certain rate over a certain period
CD-ROM (CD read only memory) optical format that requires less space. A of time. Remote weather stations use
storage where data is stored as an compressed file takes less time to be data logging.
optical pattern. Once data has been transferred across a network. Data Protection Act an act that restricts
written onto CD-ROM it cannot be Computer Misuse Act a law which the way personal information is stored
erased. It is mainly used for the makes illegal a number of activities such and processed on a computer.
distribution of software. as deliberately planting viruses, hacking, Data redundancy where the same data
CD-RW (CD rewritable) optical storage that using ICT equipment for fraud, etc. is stored more than once in a table or
allows data to be stored on the disk over Content the actual text, images, etc. where the same data is stored in more
and over again, just like a hard disk. This Control system system used to control a than one table.
is needed if the data stored on the disk process automatically by making use Data type check validation check to
needs to be updated. You can treat a of data from sensors as the input to ensure the data being entered is the
CD-RW like a hard drive but the transfer the system. same type as the data type specified
rate is less and the time taken to locate Copyright, Designs and Patents Act for the field.
a file is greater. The media is not as a law making it a criminal offence Database a series of files stored in a
robust as a hard drive. to copy or steal software or use the computer which can be accessed in a
Cell an area on a spreadsheet produced software in a way that is not allowed variety of different ways.
by the intersection of a column and a according to the software licence. Device driver a short specially written
row, in which data can be placed. CPU (central processing unit) the program that understands the
Changeover the process by which an computer’s brain. It interprets and operation of the device it controls/
older ICT system is replaced with a executes the commands given to it by operates. For example, driver software
newer one. the hardware and software. can operate/control a printer or
Character any symbol (letter, number, Cropping only using part of an image. scanner. Driver software is needed
punctuation mark etc.) that you can CSS (cascading style sheet) file used so as to allow the systems or
type from the keyboard. to format the contents of a web page. applications software to control the
Check digit a decimal number (or The file contains properties on how device properly.
alphanumeric character) added to a to display HTML elements. HTML is Digital camera a camera that takes a
number for the purpose of detecting a special code used for making web picture and stores it digitally so that it
the sorts of errors humans normally pages. For example, a user can define can be transferred to and processed
make on data entry. the size, colour, font, line spacing, by a computer or other device.
270
Glos s a ry
Digital certificate An electronic passport terminal. This means that money is person or a group of people.
that allows a person, computer or transferred from the bank or credit File compression using special software
organisation to exchange information card company to the store when you to reduce file size before sending them
securely using the internet. The digital pay for goods at a store. over the internet or to reduce their size
certificate provides identifying information Encryption the process of coding files so that they take up less space on the
and is issued by a trusted body and before they are sent over a network to storage media.
is used with websites to ensure that a protect them from hackers. Also the File Transfer Protocol (FTP) a common
website you are visiting is genuine. process of coding files stored on a protocol for the movement of files
Digital-to-analogue converter (DAC) a computer/storage device so that if the across the internet. Users can access a
device that changes digital quantities computer/storage device is stolen, the server that contains the file they want
into analogue ones. files cannot be read. Only the person and then download it to their computer
Direct/random access data is accessed who has a special key can see the using FTP. Alternatively, they can upload
immediately from the storage media. information in its original form. a file to the server from their computer
This is the method used with storage EPOS (Electronic point of sale) a using FTP.
media such as magnetic hard disks and computerised till which can be used Firewall a piece of software, hardware or
optical media such as CD and DVD. for stock control. both that is able to protect a network
Dot matrix printer a printer which uses Ergonomics an applied science from hackers.
numerous tiny dots to make up each concerned with designing and Flash/pen drives portable storage media
printed character. It works by hitting arranging things people use so that which offer cheap and large storage
tiny pins against an inked ribbon to the people and things interact most capacities and are ideal media for
make the dots on the page, so this efficiently and safely. photographs, music and other data
makes this type of printer noisy. e-safety using the internet in a safe and files. They consist of printed circuit
Double entry of data entering the details responsible way. boards enclosed in a plastic case.
into an ICT system twice; only if the two Evaluation the act of reviewing what has Flat file method used for storage of data
sets of data are identical will they be been achieved, how it was achieved in a database where all the data is
accepted for processing. It is a method and how well the solution works. held in a single table.
of verification. This method is often Expert system an ICT system that mimics Font a set of letters and characters in a
used when you set up a new password. the decision-making ability of a particular design.
Download to copy files from a distant human expert. Footer text placed at the bottom of
computer to the one you are working on. External hardware devices those a document.
Drag and drop allows you to select objects hardware devices situated outside the Format checks checks performed on codes
(icons, folders, files etc.) and drag computer casing. to make sure that they conform to the
them so that you can perform certain Extreme data is data on the borderline correct combinations of characters.
operations on them such as drag to the of what the system will accept. For
recycle bin to discard, add a file to a example, if a range check specifies Generic file formats file formats that are
folder, copy files to a folder and so on. that a number from 16 to 21 inclusive able to be used by different software
DVD-R (DVD recordable) a type of is entered, the extreme data would be no matter who the manufacturer of the
optical storage. DVD-R allows data to 16 and 21. software is.
be stored on a DVD only once. GIF (Graphics Interchange Format) file
DVD-ROM (digital versatile disk read Favourites storage area where the URL type used for images. Images in this
only memory) DVD-ROM is optical (i.e. the web address) of a website can format are reduced to a maximum of
storage and offers much higher be stored so that it can be accessed 256 colours. Images in this format
storage capacity compared to CD. It later using a link. are compressed so this means that
is used for the distribution of movies Fax a machine capable of sending and they load quickly. Used for simple line
where you can only read the data receiving text and pictures along diagrams or clip art.
off the disk. A DVD-ROM drive can telephone lines. GIGO abbreviation for garbage in garbage
also be used for the reading of data Field a space in an information handling out. It means that if you put rubbish into
off a CD. DVD is mainly used for the system/database used for inputting the computer then you get rubbish out.
distribution of films and multimedia data. For instance, you could have GIS (Geographic information system)
encyclopaedias. fields for surname, date of birth, etc. an ICT system that is used to
File a collection of related data. capture, manage, analyse and display
EFTPOS (Electronic funds transfer at File attachment (sometimes called an geographically referenced information.
point of sale) where electronic funds attachment) a file that is attached to GPS (Global Positioning System) system
transfer takes place at a point of sale an email and can be sent to another which uses the signals from several
271
satellites to obtain the exact position of unlike HTTP it uses encrypted Internet service provider (ISP) a company
any object (e.g. aircraft, ship, car, etc.) connections to hide passwords, that provides an internet connection.
on the Earth’s surface. Many cars are bank information and other sensitive Intranet a private network used with
equipped with satellite navigation material from the open network. an organisation that makes uses of
systems which use GPS so that the Hub a hub contains multiple ports (i.e. internet technology (e.g. web pages
driver can locate their position on a connection points). When a packet of and web browsers) used for sharing
map on a small screen inside the car. data arrives at one port, it is copied internal information.
Graph plotter an output device which to the other ports so that all network IP (Internet Protocol) address a number
draws by moving a pen. Useful for devices of the LAN can see all packets. which uniquely identifies the physical
scale drawings and is used mainly Every device on the network will computer linked to the internet.
with CAD packages. receive the packet of data which it will
Geographic information system (GIS) inspect to see if it is relevant or not. Joystick input device used instead
an ICT system that is used to Hyperlink a feature of a website that of the cursor keys or mouse as a
capture, manage, analyse and display allows a user to jump to another web way of producing movement on
geographically referenced information. page, to jump to part of the same web the screen.
Graphics tablet an input device which page or to send an email message. JPEG a file format used for still images
consists of shapes and commands on Hypertext Mark-Up Language (HTML) which uses millions of colours and
a tablet which can be selected by the a code used to create documents compression, which makes it an ideal
user by touching. The use of a graphics on the world wide web. You use it to file format for photographic images on
tablet means that more space is left specify the structure and layout of a web pages.
on the screen for a plan or diagram. web document.
GUI (graphical user interface) interface K Kilobyte or 1024 bytes. Often
that allows users to communicate with Identity theft using someone’s banking/ abbreviated as KB. A measure of the
the computer using windows, icons, credit card/personal details in order storage capacity of disks and memory.
menus and pointers. to commit fraud. Key field this is a field that is unique for
Inference engine one of four parts of an a particular record in a database.
Hackers people who break into a expert system. It uses the input data Key logging the process of someone
computer/computer network illegally. along with the rules in the rules base recording/monitoring the keys you
Hacking process of trying to break into a and the knowledge in the knowledge press when you are using your
secure computer system. base to arrive at conclusions/ computer using a key logger which
Hard copy printed output from a computer decisions/answers which are output can either be hardware or software.
which may be taken away and studied. using the user interface. As it can record keystrokes someone
Hardware the physical components of a Ink-jet printer printer that works by spraying can record your passwords and
computer system. ink through nozzles onto the paper. banking details.
Header text placed at the top of a Input device the hardware device used to Knowledge base one of four parts of
document. feed the input data into an ICT system an expert system. A huge organised
Hot spot an image or piece of text used such as a keyboard or a scanner. set of knowledge about a particular
as a link. When you click on the image Instant messaging (IM) a method of two subject. It contains facts and also
or text, you are taken to another part people using real-time text to conduct judgemental knowledge, which gives it
of the same page, a different page or a conversation using the internet. the ability to make a good guess, like a
a different site, or it may open a new Integer a whole number which can be human expert.
file or a new window. positive, negative or zero.
htm a popular file format used for storing Interactive where there is a constant LAN (local area network) a network of
web pages. dialogue between the user and computers on one site.
HTTP (HyperText Transfer Protocol) the computer. Landscape page orientation where the
a protocol that defines the process Internal hardware devices those width is greater than the height.
of identifying, requesting and hardware devices situated inside the Laser printer printer which uses a laser
transferring multimedia web pages computer casing. beam to form characters on the paper.
over the internet. Internal memory memory inside the LCD (liquid crystal display) technology
HTTPS (HyperText Transfer Protocol computer casing (e.g. ROM, RAM and used with thin flat screens.
secure variant) a protocol that internal hard disk). Length check validation check to make
defines the process of identifying, Internet a huge group of networks sure that the data being entered has
requesting and transferring multimedia joined together. The largest network in the correct number of characters in it.
web pages over the internet, except the world. Light pen input device used to draw
272
Glos s a ry
directly on a computer screen or used circuits on a silicon chip. It processes Online processing the system is
to make selections on the screen. the input data to produce information. automatically updated when a
Linkers programs that are usually part MIDI (musical instrument digital change (called a transaction)
of the compiler which take care of interface) enables a computer and is made. This means that the
the linking between the code the musical instrument to communicate system always contains up-to-date
programmer writes and other resources with each other. information. Online processing is
and libraries that make up the whole Monitor another name for a VDU or used with booking systems to ensure
program file that can be executed computer screen. seats are not double booked.
(i.e. run). Motherboard the main printed circuit board Online shopping shopping over the
Login accessing an ICT system usually by in a computer that connects the central internet as opposed to using
entering a user-ID/username and/or processing unit, memory and connectors traditional methods such as buying
a password. to the external hardware devices such as goods or services from shops or
keyboard, screen, mouse, etc. trading using the telephone.
Magnetic stripe stripe on a plastic card MP3 music file format that uses Operating system software that controls
where data is encoded in a magnetic compression to reduce the file size the hardware of a computer and is
pattern on the stripe and can be read considerably, which is why the MP3 file used to run the applications software.
by swiping the card using a magnetic format is popular with portable music Operating systems control the handling
stripe reader. players such as iPods and mobile of input, output, interrupts, etc.
Magnetic stripe reader hardware device phones. Optical character recognition
that reads the data contained in Multimedia making use of many media (OCR) input method using a scanner
magnetic stripes such as those on the such as text, image, sound, animation as the input device along with special
back of debit/credit cards. and video. software which looks at the shape
Mail merge combining a list of names Multimedia projector output device of each character so that it can be
and addresses with a standard letter used to project the screen display recognised separately.
so that a series of letters is produced from a computer onto a much larger Optical disk a plastic disk used for
with each letter being addressed to a screen that can be viewed by a large removable storage. Includes CD
different person. audience. and DVD.
Main internal memory memory which Optical mark recognition (OMR) the
is either ROM (read only memory) or Network group of ICT devices (computers, process of reading marks (usually
RAM (random access memory). printers, scanners etc.) which are able shaded boxes) made on a specially
Master slides (also called slide masters) to communicate with each other. prepared document. The marks are
used to help ensure consistency from Network interface card (NIC) circuit board read using an optical mark reader.
slide to slide in a presentation. They are which connects to the motherboard of Output the results from processing data.
also used to place objects and set styles the computer. It prepares the data ready
on each slide. Using master slides you for sending over a network. They include Password a series of characters chosen
can format titles, backgrounds, colour connectors that allow connection to by the user that are used to check the
schemes, dates, slide numbers, etc. network cables. identity of the user when they require
Megabyte a unit of file or memory size Networking software systems software access to an ICT system.
that is 1024 kilobytes. which allows computers connected pdf (portable document format) used
Megapixel one million pixels (i.e. dots together to function as a network. with a particular piece of applications
of light). Normal data data that is acceptable software for viewing documents. This
Memory cards thin cards you see in digital for processing and will pass the file format is used by the software
cameras used to store photographs validation checks. Adobe Acrobat. This file format is
and can be used for other data. popular because the software used
Memory stick/flash drive/pen drive OCR (optical character recognition) a to view the files is widely available
solid state memory used for backup combination of software and a and free.
and is usually connected to the scanner which is able to read Personal data data about a living
computer using a USB port. characters into the computer. identifiable person which is specific to
MICR (magnetic ink character OMR (optical mark reader/ that person.
recognition) system used for cheque recognition) reader that detects Pharming malicious programming code
clearing which is able to read data marks on a piece of paper. Shaded is stored on a computer. Any users
printed onto cheques in magnetic ink. areas are detected and the computer who try to access a website which
Microprocessor the brain of the can read the information contained has been stored on the computer will
computer consisting of millions of tiny in them. be re-directed automatically by the
273
malicious code to a bogus website Processing performing something on Real-time processing type of processing
and not the website they wanted. the input data such as performing where data received by the system is
The fake or bogus website is often calculations, making decisions processed immediately without any
used to obtain passwords or banking or arranging the data into a delay. Used mainly for control systems,
details so that these can be used meaningful order. e.g. autopilot systems in aircraft.
fraudulently. Processor often called the CPU and is Record the information about an item or
Phishing fraudulently trying to get people the brain of the computer consisting person. A row in a table.
to reveal usernames, passwords, credit of millions of tiny circuits on a silicon Relational database a database where
card details, account numbers, etc., by chip. It processes the input data to the data is held in two or more tables
pretending to be from a bank, building produce information. with relationships (links) established
society, or credit card company, etc. Program the set of step-by-step between them. The software is used
Emails are sent asking recipients to instructions that tell the computer to set up and hold the data as well
reveal their details. hardware what to do. as to extract and manipulate the
PIN (personal identification Proofreading carefully reading what has stored data.
number) secret number that needs to been typed in and comparing it with Relative reference when a cell is used in
be keyed in to gain access to an ATM what is on the data source (order a formula and the formula is copied
or to pay for goods/services using a forms, application forms, invoices etc.) to a new address, the cell address
credit/debit card. for any errors, or just reading what has changes to take account of the
Piracy the process of illegally copying been typed in to check that it makes formula’s new position.
software. sense and contains no errors. Report the output from a database in
Pixel a single point in a graphics element Protocol a set of rules governing the which the results are presented in a
or the smallest dot of light that can format of the data and the signals to way that is controlled by the user.
appear on a computer screen. start, control and end the transfer of Resolution the sharpness or clarity of
Plotter a device which draws by moving a data across a network. an image.
pen. Useful for printing scale drawings, Proxy-server a server which can be RFID (radio frequency identification)
designs and maps. hardware or software that takes requests reader reads data from a small chip/
Podcast a digital radio broadcast from users for access to other servers tag at a distance.
created using a microphone, and either forwards them onto the other ROM (read only memory) type of internal
computer and audio editing software. servers or denies access to the servers. memory on a chip which is permanent/
The resulting file is saved in MP3 non-volatile and cannot have its
format and then uploaded onto Query a request for specific information contents changed by the user. It is used
an internet server. It can then be from a database. to hold the boot routines used to start
downloaded using a facility called the computer off when the power is
RSS onto an MP3 player for storing RAM (random access memory) type switched on.
and then listening. of main internal memory on a chip Router hardware device which is able to
Point a length which is 1/72 inch. which is temporary/volatile because make the decision about the path that
Font size is measured in points. For it loses its contents when the power an individual packet of data should
example, font size of 12 pts means is removed. It is used to hold the take so that it arrives in the shortest
12/72=1/6 inch which is the height operating system and the software possible time. It is used to enable
the characters will be. currently in use and the files being several computers to share the same
Portrait page orientation where the currently worked on. The contents of connection to the internet.
height is greater than the width. RAM are constantly changing. RSI (repetitive strain injury) a painful
Presence checks validation checks used Range check data validation technique muscular condition caused by
to ensure that data has been entered which checks that the data input to a repeatedly using certain muscles in
into a field. computer is within a certain range. the same way.
Print preview feature that comes with most Read only a user can only read the rtf (rich text format) file format that
software used to produce documents. contents of the file. They cannot alter saves text with a limited amount of
It allows users to view the page or or delete the data. formatting. Rich text format files use
pages of a document to see exactly Read/write a user can read the data the file extension ‘.rtf’.
how they will be printed. If necessary, held in the file and can alter the data. Rules base one of four parts of an expert
the documents can be corrected. Print Real-time a real-time system accepts system and made up of a series of
preview saves paper and ink. data and processes it immediately. The IF, AND, THEN statements to closely
Process any operation that transfers data results have a direct effect on the next follow human-like reasoning.
into information. set of available data.
274
Glos s a ry
Sans serif a set of typefaces or fonts that Software licence document (digital or the different types of storage materials
do not use the small lines at the end paper) which sets out the terms by such as DVD, magnetic hard disk, solid
of characters which are called serifs. which the software can be used. It will state memory card, etc.
Scanner input device that can be used to refer to the number of computers on Style sheet a document which sets out
capture an image; useful for digitising which it can be run simultaneously. fonts and font sizes for headings and
old non-digital photographs, paper Solid state backing storage the smallest subheadings, etc., in a document.
documents or pictures in books. form of memory and is used as Changes to a heading need only be
Screenshot copy of what is seen on a removable storage. Because there are made in the style sheet and all the
computer screen. It can be obtained no moving parts and no removable changes to headings in the document
by pressing the Prt Scrn button and media to damage, this type of storage will be made automatically.
then a copy of the screen will be is very robust. The data stored on solid Swipe card plastic card containing data
placed in the clipboard. The copy of state backing storage is rewritable stored in a magnetic stripe on the card.
the screen can then be pasted. and does not need electricity to keep Switch a device that is able to inspect
Search engine program which searches the data. Solid state backing storage packets of data so that they are
for required information on the internet. includes memory sticks/pen drives forwarded appropriately to the
Secondary storage storage other than ROM and flash memory cards. correct computer. Because a switch
or RAM and is non-volatile, which means Sound card expansion card consisting only sends a packet of data to the
it holds its contents when the power is of circuitry that allows a computer to computer it is intended for, it reduces
removed. It is used to hold software/ send audio signals to audio devices the amount of data on the network,
files that are not instantly needed by the such as speakers or headphones. thus speeding the network up.
computer. Also used for backup copies. Spam unsolicited bulk email (i.e. email Systems software programs that
Secure Socket Layer (SSL) see SSL. from people you do not know, sent control the computer hardware
Sensors devices which measure physical to everyone in the hope that a small directly by giving the step-by-step
quantities such as temperature, percentage may purchase the goods or instructions that tell the computer
pressure, humidity, etc. services on offer). hardware what to do.
Serial/sequential access data is Spellchecker program usually found
accessed from the storage media by with a word-processor and most Tablet a portable hand-held computer
starting at the beginning of the media packages which make use of text device that is primarily controlled via
until the required data is found. It is which checks the spelling in a a touch screen.
the type of access used with magnetic document and suggests correctly Tags special markers used in HTML to
tape and it is a very slow form of spelled words. tell the computer what to do with the
access when looking for particular Spyware software that is put onto a text. A tag is needed at the start and
data on a tape. computer without the owner’s knowledge end of the block of text to which the
Serif a small decorative line added to and consent with the purpose of tag applies.
the basic form of a character (letter, monitoring the user’s use of the internet. Tape magnetic media used to store data.
number, punctuation mark, etc.). For example, it can monitor keystrokes Templates electronic files which hold
Smartphone a mobile phone with an so it can be used to record usernames standardised document layouts.
advanced operating system which and passwords. This information can Terabyte a unit of file or memory size that
combines the features of a mobile then be used to commit fraud. is 1024 gigabytes.
phone with other mobile devices such SSL (Secure Socket Layer) standard TFT (thin film transistor) a thin screen
as web browser, media player, Wi-Fi, used for security for transactions used in laptops/notebooks or in
camera, GPS navigation, etc. made using the internet. SSL allows desktops where desk space is limited.
Smishing using text messaging to send an encrypted link to be set up Thesaurus software which suggests words
fraudulent messages that try to steal between two computers connected with similar meanings to the word
your credit card, banking or other using the internet and it protects the highlighted in a document.
personal details. communication from being intercepted Touchscreen a special type of screen
SMS (short messaging service) service and allows your computer to identify that is sensitive to touch. A selection
that provides texting. the website it is communicating with. is made from a menu on the screen by
Social networking site a website used to Standalone computer if a computer is touching part of it.
communicate with friends, family and used on its own without any connection Tracker ball an input device which is
to make new friends and contacts. (wireless or wired) to a network rather like an upside down mouse and
Software programs controlling the (including the internet), then it is a is ideal for children or disabled people
operation of a computer or for the standalone computer. who find it hard to move a mouse.
processing of electronic data. Storage media the collective name for Transaction a piece of business, e.g.
275
an order, purchase, return, delivery, Validation checks these are checks that Web-conferencing service allowing
transfer of money, etc. a developer of a solution sets/creates, conferencing events to be shared with
Transcription error error made when using the software, in order to restrict users who are in remote locations using
typing data in using a document as the data that a user can enter so as to internet technologies. Usually there will
the source of the data. reduce errors. be one sender and many recipients.
Transposition error error made when Verification checking that the data being Web page a document that can be
characters are swapped around so entered into the ICT system perfectly accessed using browser software.
they are in the wrong order. matches the source of the data. Website a collection of interconnected
txt text files just contain text without Video cards circuits that generate signals web pages relating to a topic or
any formatting. Text files use the file that enable a video output device to organisation.
extension ‘.txt’. display text and graphics. Wi-Fi a trademark for the certification of
Video-conferencing ICT system that products that meet certain standards
Update the process of changing allows virtual face-to-face meetings to for transmitting data over wireless
information in a file that has become be conducted without the participants networks.
out of date. being in the same room or even the WIMP (windows icons menus pointing
URL (Uniform Resource Locator) another same geographical area. devices) the graphical user interface
way of saying a web address. Virus a program that copies itself (GUI) way of using a computer rather
USB (Universal Serial Bus) a socket automatically and can cause damage than typing in commands at the
which is used to connect devices to to data or cause the computer to command line.
the computer such as webcams, flash run slowly. WLAN a local area network (LAN) where
drives, portable hard disks, etc. Voice recognition the ability of a computer some or all of the links are wireless,
User a person who uses a computer. to ‘understand’ spoken words by making use instead of infrared or
User interface one of four parts of comparing them with stored data. microwaves as a carrier for the data
an expert system that uses an rather than wires or cables.
interactive screen (which can be a WAN (wide area network) a network World wide web (www) the way of
touch screen) to present questions where the terminals/computers accessing the information on all the
and information to the operator are remote from each other and networked computers which make up
and also receive answers from the telecommunications are used to the internet. WWW makes use of web
operator. Can also be one of the communicate between them. pages and web browsers to store and
three parts of an expert system. Web logs (blogs) websites that are access the information.
User log a record of the successful and created by an individual with
failed logins and also the resources information about events in their life, zip a popular archive format widely used
used by those users who have access videos, photographs, etc. when downloading files from websites
to network resources. Webcam a digital video camera that is using the internet. ZIP files are data
Username or User-ID a name or number used to capture moving images and is containers since they can store one or
that is used to identify a certain user connected to the internet so the video several files in the compressed form.
of the network or system. can be seen by others remotely. They are After you download a ZIP file, you will
Utility software part of the systems often included as part of the screen in need to extract its contents in order
software that performs a specific task computers or bought separately and to use them.
such as create a new folder, copy connected to a USB port.
files, etc.
276
00 Complete ICT for IGCSE: Index
3D imaging 8 cartoon animations 55
3D printers 23, 67 case 140
cash points 65
A CD R (CD recordable) 30
accident prevention 89–90 CD ROM (compact disk read only memory) 30
activation keys 101 CD RW (CD rewriteable) 30
address lists 57 central processing unit (CPU) 3
analogue to digital conversion 58 character spacing 140
analysis 79 check digits 81
different methods of researching a situation 79–80 chess 70
system specification 80 chip readers 17–18
anchor links 255, 256 cloud 95
anti-spyware 40 club records 57
anti-virus software 94 column charts 143, 146–50
artificial intelligence (AI) 7 columns 129, 156–8
ATMs (automatic teller machines) 65 command line interface (CLI) 5
audience 99 benefits and drawbacks of GUI and CLI 5–6
analysing the needs of an audience 100 communication 103
finding out about your target audience 99 email 103–4
legal, moral, ethical and cultural appreciation 100 internet 104–7
reasons why ICT solutions must meet the needs of the communication applications 55
audience 100 cartoon animations 55
audio-conferencing 45 creating music/music scores 55
authentication techniques 41, 91 mobile phones 56
authentication using biometric data 91 publicity and corporate image publications 56–7
AutoFill 217 SMS (texting) 56
automatic stock control 71 VoIP (Voice over Internet Protocol)/internet telephone 56
compilers 2
B computer systems 3
backache 51 central processing unit and its role 3
backups 4, 32 input devices 4
banking applications 65–7 internal memory 4
bar charts 143 output devices 4
bar code readers 19–20 secondary/backing storage 4
biometrics 7–8, 63 computer types 6–7
authentication using biometric data 91 contactless payments 73
BIOS (basic input/output system) 4 control applications 59
blogs 106 advantages and disadvantages of control systems 60
Blu-ray 31 automatic stock control 71
Bluetooth 35 computer-controlled greenhouses 59–60
booking systems 64 simple control applications 59
bridges 35 using a sequence of instructions to control devices 59
brochures 57 copy and paste 120, 217
bullets 136 copyright 100, 104
business cards 56 copyright legislation 100
buzzers 24 corporate image publications 56–7
credit cards 94
C CRT monitors 21
call monitoring/recording 74 css (cascading style sheets) 110
car engine fault diagnosis 70 csv (comma separated values) 110
277
cultural implications 101 optical mark readers (OMRs) 18–19
cut and paste 120 RFID (radio frequency identification) readers 18
document production 120, 156
D applying styles to ensure the consistency of presentation
data entry 139–40, 217 134–6
data handling applications 57 capturing a screenshot 120
data models 216 capturing an image from a website 121
entering the layout of the model 216–23 copying data from a table 121–2
formulae and functions 225–9 editing and proofreading documents 140
manipulating data 230–41 formatting text and organising page layout 156–9
presenting data 241–4 importing text from a website 121
testing the data model 229–30 mail merging a document with a data source 165–73
data protection acts 42 organising the page layout 129–30
data protection principles 42–3 using software tools to edit tables 159–65
effects of wrong personal data 42 using specialist screen capture programs 120
rights of the data subject and the holder 42–3 documentation 80, 84
what exactly is personal data? 42 dongles 101
data redundancy 176 dot matrix printers 22
data testing 83 drag and drop 120, 217
data type checks 139 DVD R (DVD recordable) 30
databases 174 DVD RAM (digital versatile disk random access memory) 31
choosing the software to create a database structure 175 DVD ROM (digital versatile disk read only memory) 30
creating databases 176–8 DVD RW (digital versatile disk read/write) 31
creating the data/file structure and testing it 82
data types 174 E
database terms 175 e-commerce 37
field names 178 e-safety 90
field types 175 internet games 90
flat-file databases 176 EFT (electronic funds transfer) 66
foreign keys 178 EFTPOS (electronic funds transfer at point of sale) systems 71
performing searches using wildcards 178 email 44
primary keys 175, 176 constraints that affect the use of email 104
relational databases 176 groups 103
designing systems 81 spam 93, 104
designing validation checks 81 using cc (carbon copy) 103
designing validation routines 81 what is an email? 103
producing designs 81 emerging technologies 7
desktop computers 6 3D and holographic imaging 8
internet access 39 artificial intelligence (AI) 7
developing systems 82 biometrics 7–8
developing system from designs and testing it 82 computer-assisted translation 8
improvements needed as a result of testing 83 quantum cryptography 8
testing strategies 82–3 robotics 9
testing using live data 83 virtual reality 8
device drivers 2, 3 vision enhancing 8
digital cameras 14–15 employment and ICT 48
digital certificates 91 areas of work where there is increased employment 49
direct changeover 83 areas of work where there is reduced employment 48
direct data entry (DDE) 17 working patterns within organisations 49
bar code readers 19–20 encryption 42, 93–4, 101
chip readers and PIN pads 17–18 environmental monitoring 58
magnetic stripe readers 17 evaluation 84
MICR (magnetic ink character recognition) 18 evaluation strategies 85
optical character readers (OCRs) 19 need for evaluation 85
278
Complete ICt for IGC S e: Index
282
Complete ICt for IGC S e: Index
283
surveys 57 V
swipe cards 62–3 validation checks 81
switches 35 validation routines 81, 82, 139
system software 2, 3 verification 81, 141
system specification 80 video cameras 16
systems life cycle 79 video-conferencing 44
analysis 79–80 audio-conferencing 45
design 81 web-conferencing 44
development and testing 82–3 virtual reality 8
documentation 84 viruses 39–40, 94
evaluation 84–5 how to prevent viruses 40, 94
implementation 83 vision enhancing 8
voice recognition 16
T VoIP (Voice over Internet Protocol)/internet telephone 56
tables 129–31
copying data from a table 121–2 W
relationship 176, 178 WANs (wide area networks) 38
using software tools to edit tables 159–65 web addresses 106
using tables to organise a web page 255–63 web browsers 36, 104
tablets 7 web cams 16
internet access 39 web-conferencing 44
tags 245, 247, 251, 264 web logs 106
tax advice 70 website authoring 245
technical documentation 84 background colour 249
testing systems 82–3 creating an external stylesheet 247–63
text alignment 136 font families 249
text documents 120 HTML (HyperText Markup Language) 245–7
applying styles to ensure the consistency of presentation hyperlinks 254–5
134–6 printing websites in browser view 268
editing and proofreading documents 140 tags to create lists 251
formatting text and organising page layout 156–9 using images on web pages 263–8
keyboard entry 120 using tables to organise a web page 255–63
organising the page layout 129–30 web development layers 245
placing objects into a document from a variety of sources Wi-Fi 35
120–9 wide format printers 23
text enhancement 135 widows and orphans 141
texting 56 wikis 106
TFT (thin film transistor)/LCD monitors 21 wildcards 178, 234–5
timetabling 63 WLANs (wireless local area networks) 38
touch pads 13 worker monitoring 73
touch screens 13–14, 16 call monitoring/recording 74
touch screens as an output device 21 working patterns within organisations 49
trackerballs 13 world wide web (WWW) 37, 105
tracking systems 73–4
translation, computer-assisted 8 Z
transposed numbers and letters 140 zip 110
txt (text format) 110
U
URLs (Uniform Resource Locators) 105
user documentation 84
user-IDs/usernames 40
identifying the user to the system 40–1, 91
utilities 2
284
Complete
ICT
Author
for Cambridge IGCSE Second edition ®
Stephen Doyle
Complete ICT for Cambridge IGCSE directly matches the latest Cambridge IGCSE ICT
syllabus, using plenty of practical guidance to develop understanding. A stretching,
skills-based approach progressively strengthens student ability, enabling confident exam
performance.
Also available:
978 0 19 835784 1 978 0 19 835783 4
Complete ICT for Cambridge IGCSE®
ICT
A practical
ICT
approach for
approach for the updated
the updated syllabus
syllabus
Stephen Doyle
Stephen Doyle
Oxford excellence for Cambridge IGCSE® Oxford excellence for Cambridge IGCSE®