ICT Notes 2024
ICT Notes 2024
ICT Notes 2024
Internal Components:
Central Processing Unit (CPU), processor, motherboard.
Hardware Components: Graphics card, video cards, sound cards and internal hard disk drives
External storage devices like CD and DVD drives, external hard drives and pen drives
Software: Programs for controlling the operation of a computer or processing of electronic data
Application Software:
Provides services that the user requires to perform a task
e.g. word processing, spreadsheet, database management systems, control software, measuring
software, applets and apps, photo-editing software, video-editing software, graphics editing, audio
editing, CAD.
System Software:
Provides the services that the computer requires to operate.
Digital data needs to be converted to analogue so it can be used to control devices (DAC)
1
The main components of computer systems
The following figure shows the components of a computer system:
RAM is random access memory, where all programs and data are temporarily stored, but it is volatile
(loses data when computer is switched off)
ROM is read only memory, this part cannot be deleted or changed, it holds instructions needed to start
up computer (System BIOS)
RAM ROM
Random Access Memory Read only memory
Volatile Non-volatile
Stores data and programs in current use Stores start-up instructions, System BIOS
2
Input Devices:
Are devices used to send data to the microprocessor,
Output Devices:
Are devices used to display or deliver data from the microprocessor,
control of the operation of the input, output and backing storage devices
supervising the loading, running and storage of applications programs
dealing with errors that occur in application programs
maintaining security of the whole computer system
maintaining a computer log (which details computer usage)
allowing communication between user and the computer system (userinterface).
3
Types of User Interface:
command line interface (CLI)
graphical user interface (GUI)
dialogue-based user interface
gesture-based user interface.
4
Dialogue based Interface
use the human voice to give commands to a computer system.
Examples:
In modern cars where voice is used to control entertainment system or satellite navigation
In homes, voice commands are used to switch lights on/off or operate electronic equipment
Apple Siri or Microsoft Cortana which act as personal assistants
Advantages:
No need for a driver to take their hands off the steering wheel
Useful for people with disabilities at home
Can be used as a security feature applying voice recognition
Disadvantages:
Still unreliable as many commands cannot be recognised
May need to repeat command many times if there is noise
May be complex to setup
User need to know what commands are used
5
Types of computers
PC or Desktop computer:
A general purpose computer made up of separate monitor, keyboard, mouse and
processor unit. PCs can be used as stand alone computers or connected in a LAN.
Advantages:
Less expensive than a laptop
Can be easily upgraded by replacing individual components
Less risk of overheating due to large size of case
Tends to have better specifications for a given price
Less prone to stealing, loss or damage as they are in one location
More stable internet access as it can use a wired connection
Disadvantages:
Cannot be carried around easily
Occupies large physical space, has a large footprint
Uses:
Office and business work
Educational use
Gaming and entertainment
Mobile Computers:
Laptop
Smartphone
Tablet
Phablet
Laptop:
A laptop is a computer where all devices are altogether in a single unit. This makes it extremely
portable.
Advantages:
Easily carried around
Takes up less physical space, smaller footprint
Can be easily connected to a WLAN using WiFi technology
Can be used if electricity is cut using its charged battery
No trailing wires
Disadvantages:
Can be easily stolen
Can be easily damaged
Needs charging from time to time
Heat dissipation is more difficult
Difficult to upgrade
6
Uses:
Office and business work
Educational use
Gaming device and entertainment
Control and monitoring purposes
Smart Phones:
A smart phone is a mobile phone with an advanced mobile operating system
which combines features of a personal computer operating system with other
features useful for mobile or handheld use
Advantages:
Small and lightweight so easier to carry
Contains a SIM card, so can make phone calls and connect to3G/4G internet
Easier to use in the move
Have with you all the time
Can browse internet from anywhere
They have apps that make use of sensors, for instance location on maps
Have reasonable battery life compared to laptops
Disadvantages:
Small screens and keyboards make pages difficult to read
Slower and more difficult typing
Web browsing may drain battery quicker
Smaller memory and storage
Websites don’t have full features
Easier to be stolen or damaged
Tablet computers:
commonly shortened to tablet, is a mobile computer with a touch screen
display, circuitry and battery in a single device
Advantages:
More portable than a laptop
Very fast to switch on
Fully portable
Can use several apps as standard (camera, MP3 players,..)
Not much heat as they use SSD
Battery life longer than laptop battery
Disadvantages:
More expensive than laptops
Less memory and storage than laptops
Typing on a touch screen may be slow and error prone
Laptops support more file formats
7
Phablets:
Some of the latest smart phones are designed as a hybrid between tablets and smartphone, these are
called phablets. They have a larger screen than a smartphone and are smaller than a tablet
Emerging technologies
Artificial intelligence
Machine or application that requires some degree of intelligence
Examples:
Use of language
Recognising a person’s face
Analysing data to make future predictions; weather forecast
AI duplicates human tasks which require decision-making and problem-solving skills. Eventually,
many tasks presently done by humans will be replaced by robots or computers, which could lead to
unemployment. However, the positive side includes improvements in safety and quality of services
and products.
Extended Reality:
Refers to real and virtual combined environments
8
CHAPTER 2
INPUT & OUTPUT DEVICES
Input Devices and their uses
.Keyboard:
keyboards are available in most PCs and laptops. They are used to type in
text as well as perform some tasks.
Advantages:
Robust
Suitable for typing text
Disadvantages:
Human errors may occur during typing
It is a slow method for data entry
Difficult to input diagrams
Continual typing on keyboard may lead to RSI
RSI: (Repetitive strain injury) is a damage in wrist and fingers caused by continual use
of the keyboard for long periods.
To minimize the risk of RSI:
use ergonomic keyboards
take regular breaks
regularly exercise fingers
use wrist rests
use wrist pads
Numeric keypad:
They are smaller keyboards that can only input numbers and symbols.
Uses:
ATMs
PIN pads when using bank cards to pay for goods
In supermarkets to input quantity sold of goods or for manual input of barcode
In smart phones
Advantages:
Occupies less space and can be used for portable devices
Disadvantages:
May be difficult to use due to small size of buttons
Difficult to enter text
9
Pointing Devices:
Mouse
Movements of the mouse control the position of a pointer on the screen. Mouse is
also provided by two buttons, one to make selections, the other to display shortcut
menu as well as a scroll button to allow moving between pages
Uses:
Opening, closing or minimizing windows
Used to drag and drop objects to copy or delete
Drawing shapes or lines
Selecting text or images for editing and formatting
Advantages:
Faster than keyboard in selecting objects
Occupies small space
Disadvantages:
Difficult for people with hand or wrist disabilities
Needs a flat surface
Touch pad
Used in laptops. Pointer is controlled by moving fingers on touchpad
Advantages:
Does not need a flat surface
Disadvantages:
More difficult to drag objects than a mouse
Tracker ball
A tracker ball is similar to a mouse, but user has to rotate a ball on top of the
device using fingers.
Uses:
Can replace a mouse
Suitable for people with disabilities
Advantages:
Does not need a flat surface
More accurate positioning of pointer than mouse
Disabled people find it easier than a mouse
Disadvantages:
Not supplied with the computer as standard, so more expensive
10
Remote control
Used to control the operation of other devices remotely by using infrared signals.
Uses:
Most home entertainment devices such as a television, satellite receiver, DVD
player or Air conditioner have remote controls
Used in industrial applications to remotely control process, stop and start
machinery
Advantages:
Useful for disabled and elder people
Some processes are dangerous, so it is safer to operate from a distance
Uses:
In tablets and smart phones to replace keyboard and mouse
Interactive maps in shopping malls
ATM machines, banks and restaurants
Tourist information kiosks
11
Advantages:
Suitable for outdoor use
Easier for inexperienced users
Replaces several devices
Disadvantages:
Difficult to type text
Scanner
Scanners are used to scan text or pictures from a hard copy into the
computer's memory where they can be manipulated in some way
(image processing) before being printed.
Uses:
Scan photographs and pictures for use in desktop publishing.
Scan part of a design to be used with CAM (Computer aided design)
Digital Camera
Digital cameras look like traditional cameras except that they have a flash memory
card to store the image instead of a film. The amount of memory taken by a picture
depends on its resolution (number of dots which forms the image); the greater the
resolution, the better the image.
Special software is needed to edit, store and display pictures on the computer. You
can remove things that you did not spot while taking the image.
Uses:
In tablets and smart phones to capture images to be uploaded and shared on the internet
To capture photographs of different events to be enhanced and printed
To capture images for inclusion in articles in newspapers, books or presentations
Advantages:
Cheaper running cost than traditional camera
Can edit, share or store images in digital form
Microphone
Sound can be input using a microphone then manipulated. A computer sound card is
needed to convert analog sound into digital signals.
Uses:
Input of human speech to be used in presentations, movies or songs
As voice commands to a computer system
In speech to text applications to input text without typing
Used for authentication in voice recognition systems
12
Advantages:
No typing or data preparation is needed
Disabled people can control their equipment using voice commands
It can be used remotely by telephone
Disadvantages:
Recognition may be slow
Unsuitable for noisy places
Not as accurate as typing
Sensors
A sensor is a device which measures a value (usually a physical quantity)
which is continually changing.
Physical quantities are analog in nature. Computers can only use and
understand digital signals. A device called Analog to Digital Converter (ADC) is required to convert
analog signals from sensors into digital signals so that it can be received, understood and processed
by a digital computer.
Sensor Applications
Temperature Weather stations, central heating system, green house, automatic
cooker, washing machine, fire alarm
Pressure Weather stations, washing machine, burglar alarm ststem,
robotics
Light Burglar alarm, automatic doors, street light control, green house
Sound Burglar alarm system
PH Chemical processes, green house
Advantages:
More accurate readings
More frequent readings can be recorded
Can take measurements at regular intervals
Measurement is continuous
System can be automatic which reduces the need for human workers thus less wages
13
Light pen
Light pens contain sensors that send signals to a computer whenever light changes are detected. The
devices only work with CRT monitors
Uses :
Selecting objects on CRT screens.
Drawing on screen (for example, with CAD packages)
Advantages
Greater accuracy than touch screens.
Small (can be used where space is an issue).
Easy-to-use technology.
Disadvantages
Problems with lag when drawing on screen.
Only works with CRT monitors (at the moment).
Not that accurate when drawing.
Rather dated technology.
Uses
Credit cards at ATMs or EFTPOS (Electronic fund transfer at point of sale) terminals
Security cards for entrance of buildings or hotel rooms
Advantages
Faster method of data entry
No human errors
Disadvantages
Information may be affected by magnetic fields
Magnetic stripes may be scratched
14
To the bank
Extra service without extra wages.
Less work load inside the bank.
Disadvantages
Machines are sometimes empty.
Limited amount of cash can be withdrawn per withdrawal.
Limited amount of transactions can be performed per day.
Some services are not available. Ex. loans, opening or closing accounts
Information stored on the magnetic stripe of a credit card:
account number
bank sort code
card number
issue date
expiry date
15
6. Then added into shop's account
7. A receipt is printed out to be signed by customer
16
Advantages of chip and Pin technology over magnetic stripes:
Chips are more robust than magnetic stripes
Chips cannot be hacked as easy as a magnetic stripe
Chips can store more information than magnetic stripes
Adds to the security level by checking PIN at EFTPOS
A tag is an integrated circuit which contains an aerial which receives and transmits data
Uses:
In many industries, for example an RFID tag is attached to a car during production to track
its progress through the assembly line
Tracking of goods
Tracking of persons and animals
Toll collection and contactless payment
Machine readable travel documents (passports)
Airport baggage tracking logistics
17
Example;
A passenger places his passport against the RFID reader, he stands in front of a scanner or a
fingerprint scanner, his facial characteristics/fingerprints are compared with those stored on the RFID
chip
Advantages:
RFID readers input data from a long distance
Can input or identify different items simultaneously
Takes less time to input data
No need to be in line of contact
Disadvantages:
Tags and readers are expensive
Errors may occur due to detection of different RFID
Uses:
For multiple choice examination papers correction.
For data collected in the field by research workers.
For school registers
Advantages:
Reads huge amounts of data in a small time.
Minimum errors.
Disadvantages:
Documents are difficult to design.
Documents are complicated to fill.
Uses:
It is useful for turnaround documents, where some characters are printed by the computer
and others are added later by hand.
Used to scan handwritten text to be neatly printed
Advantages:
Reads different types of fonts, even hand written characters.
Quicker than typing
Design of forms is less complicated.
18
Disadvantages:
High rejection rate if document is smeared or handwritten.
Bar code reader
A bar code is a set of parallel lines of different thickness used to represent a number.
Often the number represented by the bar code is written below (to be input through the
keyboard if the reader fails to input the barcode). When a bar code is used to identify
a product, it may contain the country of origin code, the manufacturer code, an item
code and a check digit.
Uses:
In point of sale terminals in supermarkets. (Bar codes are printed on goods to identify them)
Library systems. (ISBN of books is represented by a bar code)
Warehouse stock control. (on labels on the shelves)
Luggage handling systems at airports
Advantages of EPOS (Electronic Point of Sale):
To the customer
No typing of prices so less time and eliminates wrong pricing.
An itemized receipt is obtained.
To the supermarket
No stealing by cashiers.
Better customer service.
Super market will never run out of stock.
Full stock control is held.
Changing of prices is easier, as well as making special offers.
Disadvantages:
Barcodes are not suitable for recording prices, or any changeable information.
Can only be read by machines.
Only numbers can be coded in this way.
19
QR Code Scanner
Another type of barcode is the quick response (QR) code. This is made up of a matrix
of filled-in dark squares on a light background. For example, the QR code in the figure
is a website advertising rock music merchandise. It includes a web address in the code.
QR codes can hold considerably more information than barcodes.
The three large squares at the corners of the code function as a form of alignment; the remaining
small corner square is used to ensure the correct size and correct angle of the camera shot when the
QR code is read.
Because of modern smartphones and tablets, which allow internet access on the move, QR codes can
be scanned anywhere. This gives rise to a number of uses:
Advantages
They can hold much more information than normal barcode.
There will be fewer errors than with barcodes; the higher data capacity of the QR code
allows the use of built-in error-checking systems
QR codes are easier to read; they do not need expensive laser or LED (light emitting diode)
scanners like barcodes – they can be read by the cameras used on smartphones and tablets.
It is easy to transmit QR codes either as text messages or images.
It is also possible to encrypt QR codes, which gives them greater protection than traditional
barcodes.
Disadvantages of QR codes
More than one QR format is available.
QR codes can be used to transmit malicious codes; known as attagging.
20
Output Devices
Monitors
CRT monitors
Uses:
They are only used in computer-aided design (CAD); the screens are
usually very large to enable complex diagrams to be created or modified.
They are used with light pens to allow designs to be created on screen.
Advantages
The screen can be clearly seen at a wider range of viewing angles than with most LCD
monitors.
They allow the use of light pens in, for example, CAD/CAM applications.
Disadvantages
Heavy
Have a large footprint
Run very hot
Consume considerably more power than LCD monitors.
They can flicker, which can lead to headaches and eyesight problems with prolonged use.
TFT/LCD/LED monitors
LCD monitors are taking over CRT
Uses
Used as the main output device for most modern computers.
Many LCD screens offer touch-screen input.
Mobile phones, tablets, laptops and portable video games all use LCD screens.
Advantages
Very efficient, low power consumption.
Lightweight devices.
Screens can be made in large variation of sizes.
Do not suffer from a flickering image, unlike CRT monitors.
Very sharp image resolution (allow a vast range of colours).
Produce low electromagnetic fields compared to CRT monitors.
Disadvantages
Colour and contrast from various viewing angles can be inconsistent.
Lower contrast than CRT monitors, because it is harder to produce a deep, rich level of
black.
The LCD panel may not be uniformly illuminated by the back light, resulting in uneven
intensity and shading over the screen.
21
Multimedia projector
used to display multimedia presentations on a board or a screen on the wall,
it is also used for home cinema devices when used with a DVD player.
Uses
For training presentations
Advertising presentations
Home cinema systems
Advantages:
Enables many people to see the same view
Disadvantages:
Images may be fuzzy
Expensive to buy
Laser printers
Laser printers offer the best quality of printing of text, together
with high printing speed. They use toner cartridges which contain
a fine powdered black plastic called toner. They print page by
page.
Uses:
Laser printers are used when a large amount of printing is to be produced with high quality.
Advantages:
High quality of text printing
Fast printing
Silent
Large paper tray and large toner size make it suitable for high volume printing
Disadvantages:
Expensive to buy
Expensive to repair or maintain
Cannot use multipart or continuous stationary
Cannot be used in difficult weather conditions(dirt, dust or hot and moist weather)
Coloured laser printers are expensive to run
They produce ozone and volatile organic compounds because of their method of printing
and type of toner/ink used (these have been linked to health hazards in the office).
22
Inkjet printers:
They can print high quality text and graphics, almost compared to that produced
by laser printers. Ink-jet printers are cheap to buy but expensive to run.
Uses:
They can print high quality coloured images and pictures
Used for high quality low volume colour printing in homes, schools or small business
Advantages:
High quality of printing
Produces photo quality
Cheap to buy
Can print in colour
Disadvantages:
Noisy
Slow printing
Cannot work in difficult weather conditions
Needs frequent replacement of ink
Expensive to run
Dot matrix printers
They are impact printers, they tend to be slow, noisy and output is of low
quality, but they are useful where multipart or continuous stationery is used
Uses:
In noisy environment (e.g. garage workshops)
When print quality is not very important
Where carbon copies are needed
Advantages:
Can be used in dusty,dirty or moist environment
Carbon copies can be produced
Very cheap to run or maintain
Can use continuous stationery
Disadvantages:
Noisy
Very slow
Poor quality of printing
Expensive to buy
23
Graph plotter:
These are printers capable of producing large sizes of printouts.
Uses:
Produce CAD designs of buildings
Produce posters and advertising material
Produce signs and maps
Advantages:
Can produce huge printouts
High print quality
Can use continuous stationary
Disadvantages:
Expensive to run or maintain
Occupies large physical space
3D printers
Produce 3D models using modified inkjet technology. Thin layers of fine powder are bonded together
as a 3D model is slowly built up (each layer is about 0.25 mm thick).
Uses:
Produce prototypes of CAD designs
Scale models are produced in colour before real thing is manufactured
Produce organic objects such as replacements of human organs
Advantages:
Cheaper and faster to produce prototypes
Powder used can often be grounded up and reused
Produce accurate models of the real thing
Disadvantages:
Expensive to buy
End product can sometimes be rough and needs further work to be done on it
Slower than other types of printers
Speakers
Uses:
Small hand-held devices which produce synthesized speech which makes
learning more interesting and help in translation of foreign languages
Emergency messages in cars like: "You are running out of petrol", in a
washing machine like: "I'm overloaded"
Text-to-speech translation (reading machines) for blind people
To output voice of participants in video conferences
To listen to music files and videos
As an output device in phones
24
Actuators:
Uses
They are used to control motors, pumps, switches, buzzers and so on.
They allow a computer to control physical devices that normally require analogue inputs.
Advantages
They allow remote operation of many devices (for example, pumps in a nuclear reactor
where remote operation is a big safety factor).
They are relatively inexpensive devices.
Disadvantages
They are an additional device in the system that could go wrong.
Because they are usually analogue devices, computer signals need to converted using a
DAC to enable computer control.
25
Chapter 3
Storage Devices and Media
Storage media and devices:
It is important to use the terms "medium" and "device" carefully.
A medium is where data is stored while a device is the hardware used to read and write data into the
storage medium.
Advantages:
Cheaper per unit storage than main memory and solid state drives
Have a large storage capacity (up to terabytes)
Have fast speed of access
Have direct access
Hard disks are robust
Disadvantages:
More expensive per unit storage than magnetic tape
Can be affected by magnetic fields
Less reliable than SSD as it has moving parts
Advantages:
Does not need a device to read and write data
High storage capacity
Fast rates of data transfer
Fast access to data
Portable
Disadvantages:
Expensive per unit of storage
Larger size than other media
26
Magnetic Tape Drives:
Are devices that can store data on tapes similar to those used for audio and
video recording, but data on them can only be accessed serially.
Uses:
In batch processing applications (e.g. utility bills production)
For backups of network servers
Advantages:
Tapes are cheaper per unit of storage
Tapes are more compact than a portable hard disk for the same memory
Tapes are less prone to data loss and mechanical failure
High storage capacity
Fast data transfer rates
Disadvantages:
Tape drives are not available in most computers
Cannot use direct access
Slow rates of data access
Uses:
CD-ROMs are used by manufacturers to store music files, computer games and
encyclopedias
DVD-ROMs have much larger capacity and are use to store films, software and games
Advantages:
Cheaper method to distribute software and data
Contents cannot be changed
Portable
Disadvantages:
Slow data access rates
Slow data transfer rates
Can be easily scratched or broken
Needs an optical drive
27
CD-R and DVD-R:
Recordable CDs and DVDs where data can be written to the disk only once and cannot be changed
anymore.
Uses:
Home recording of music files and films
To store data which will not be changed anymore (photos, coursework,..)
To transfer files and software between computers
Advantages:
Cheaper than rewritable disks
No risk of changing or deleting important data
Disadvantages:
Unsuitable for changing information
Uses:
To record radio and television programs
For backups of data
To transfer files between computers
In CCTV security systems
Advantages:
Can be re-used many times
Disadvantages:
It is possible to accidentally overwrite data
Blu Ray:
Blu-Ray disks have the largest capacity of all optical media and go up to 100
GB.
Uses:
The main use of blu rays is in home video game consoles
For high definition movies
To store films in video cameras
Advantages:
Large storage capacity(25 GB,50 GB,100 GB)
High rates of data transfer
High access speeds of data
Disadvantages:
They are relatively expensive
28
Solid State Storage Devices:
Solid state technology has been developed to the point where solid state drives will soon replace hard
disk drives in laptops. This is due to their thinness, their much faster data access and the fact that they
are extremely robust.
Uses:
Transporting files between computers
As a backup store
Used as a security device - a dongle -to prevent software piracy
Advantages:
Small and light, so can be easily carried
High storage capacity
Fast data transfer rates
Very robust
No need for a device for reading and writing
Disadvantages:
Expensive
Can be easily lost
Cannot write protect data stored on them
Flash Memory Cards:
Memory cards use the same technology of a memory stick.
Uses:
To store photos in digital cameras
In mobile phones
In MP3 players to store music files
Advantages:
They are very compact so can be easily removed from a device and inserted into another
Very robust
Disadvantages:
Expensive per Gbyte of memory when compared to hard disks
29
Chapter 4
Networks and the effects of using them
Networks:
A network is a series of computers systems connected together to share computer
resources. It may be a wide area network (WAN), a local area network (LAN) or a
wireless local area network (WLAN)
Types of Networks:
Local area networks:
LANs are confined to a small area usually within the same building, and sometimes through several
buildings in the same site. The link in this case is permanent, it is via cables.
Internet is a WAN.
30
Hubs
Connect network devices together in a LAN; hubs broadcasts data to all
connected devices.
Switches
Switches are used for connecting computers but unlike hubs, switches inspect the data received and
forward it to the appropriate device.
Each device has a media access control (MAC) address that uniquely
identifies it. Data packets are sent to switches will have a MAC address
identifying the source of the data and an additional address identifying each
device that should receive it.
Bridges
Connect two different LAN segments. It passes messages from one segment to the other. For example,
if there was a LAN segment in two different buildings, a bridge usually has two ports.
WAN Devices:
Routers:
Routers are used to route data packets from one network to another
network, based on IP addresses. It can do this because each router has
its own IP address. Routers are used to join a LAN to the internet.
When a data packet is received at one of its ports, the router inspects
the IP address and determines whether the data packet is meant for its
own network or for another, external network. If the data packet is meant for its own network, then
the data packet is routed to the local switch or hub. Otherwise, the data packet is transmitted to a
different router (and therefore to an external network). Routers know where to send data packets by
consulting a routing table (stored on the router’s RAM). The routing table will contain information
about the router’s immediate network (such as computer addresses) and information about other
routers in its immediate vicinity. When a data packet reaches a router, it examines the IP address.
Because the routing table contains computer addresses of all the computers/devices on its network, it
will be able to work out that the data packet is intended for a computer on its network. Routers
however, do not store the MAC addresses of devices (only IP addresses of all computers and devices
are stored). The router does not need the MAC address because the data packet will be sent by the
router to the switch on the recipient local network. The switch can then use its look-up table to send
the data packet to the correct device.
Functions of a router:
Connects LAN computers to the internet
Selects the best routes for data packets
Directs data packets to the correct computer or device in the network
Allows data transfer between different LANs or between LAN and the internet
Connects a LAN to a WAN
Connects several LANs together
31
WLAN Devices:
Wireless adaptor/wireless access point
A wireless transmitter (WAP) receives information from a network via its connection. This
transmitter converts received information into radio waves and transmits them.
A device (e.g. a computer) receives the radio waves via an installed wireless adaptor which allows it
download the information from the data source. This works in reverse when the device wishes to
transmit data over the network.
Cloud Computing:
Cloud storage
Cloud storage is a method of storing data on offsite servers. The same data is stored on more than one
server in case of maintenance or repair, allowing clients to access data at any time. This is known as
data redundancy.
Public cloud: this is a storage environment where the customer/client and cloud storage
provider are different companies
Private cloud: this is a storage provided by a dedicated environment behind a company
firewall; customer/client and cloud storage are integrated and act as a single entity
Hybrid cloud: this is a combination of the two previous environments; some data resides in
the private cloud while less sensitive data can be accessed from a public cloud storage
provider
32
Advantages of cloud storage:
Customer/client files stored in this cloud can be accessed at any time, from any device,
anywhere in the world, provided internet access is available
There is no need for clients to carry external storage devices with them
The cloud provides the user with remote backup of data
Cloud storage allows data recovery in case of client’s computer failure or data loss
The cloud storage provides almost unlimited capacity
Disadvantages:
Security aspects of cloud storage are discussed later
If the customer has a problem in internet connection, data cannot be accessed
Costs can be high if a large storage capacity is needed
The potential failure of the cloud storage company is always possible
Data security using cloud storage/computing
Companies that transfer vast amounts of confidential data to a cloud service provider are potentially
losing control of their own data security. This raises a number of questions:
What physical security exists regarding the building where the data is housed?
How good is the cloud service provider’s resistance to natural disasters or power cuts?
What safeguards exist regarding personnel who work for the cloud service company? Can
they use their authorisation codes to access confidential data for monetary purposes?
Data loss
There is a risk that important and irreplaceable data could be lost from cloud storage
facilities.
Actions from hackers (gaining access to accounts or pharming attacks, for example) could
lead to loss or corruption of data.
Users need to be certain that sufficient safeguards exist to overcome these potentially very
harmful risks.
Common Network Environments:
Intranet
Extranet
Internet
Intranets
An intranet is defined as ‘a computer network based on internet technology but designed to meet the
internal needs for sharing information within a single organisation or company’. Access to an intranet
is usually confined to a company or organisation and, unlike the internet, is not available to the general
public. Intranets reside behind a firewall and are only accessible internally to members of the
company
There are a number of reasons for adopting intranets rather than using the internet:
Intranets are safer because there is less chance of external hacking or viruses.
It is easier to prevent external links to, for example, certain websites.
Companies can ensure that the information available is specific to their internal audience’s
needs.
It is easier to send out sensitive messages in the knowledge that they will remain within the
company.
33
Extranets:
Allow intranets to be extended outside the organisation, but with the same advantages as an
intranet; this allows, for example, trading partners to have controlled access to some
information (commercially-sensitive information is password protected).
Internet:
The word internet comes from INTERconnected NETwork, because it is basically a worldwide
collection of interconnected networks. it relies on a physical infrastructure that allows networks and
individual devices to connect to other networks and devices.
In contrast, the World Wide Web (WWW) is only a part of the internet which users can access using
web browser software. The World Wide Web consists of a massive collection of web pages, and has
been based on the hypertext transfer protocol (http) since 1989.
34
Other authentication methods
Passwords are one of the most common types of authentication (that is, a way of proving your
identity). This section will look at a number of other types of authentication:
zero login
biometrics
magnetic stripes
smart cards
physical tokens
electronic tokens.
Zero login and biometrics
Zero login essentially relies on devices being smart and secure enough to instantly recognise
a user by a number of features based on:
o biometrics
o behavioural patterns.
Instead of using passwords, the zero login system builds up a complex user profile based on
the above two features.
Biometrics is already used on many smartphones as a way of logging into the phone using
finger prints and recently face recognition.
Behavioural patterns include: how you walk, your typing speed, your normal location, how
you swipe the screen, and so on.
These behavioural patterns, coupled with biometric data, should be enough to uniquely
identify a user, and allow them into a system without actually supplying any passwords or
other security information.
The advantages of zero login are fairly clear:
o Enhanced security (it is difficult to copy biometrics and behavioural patterns) and an
easier and much quicker way to login to a system. But there are certain
disadvantages that need consideration:
How do users know when they are being monitored?
How do you know if and when you have been logged out?
How well protected is it in reality?
Magnetic stripe cards
The stripe is read by swiping it through a card reader.
Data such as name, ID number, sex, and date of birth may be contained on a magnetic stripe
when used as a security device to allow entry to a building, for example. Access will only be
allowed if the scanned data matches data in a database.
Advantages of magnetic stripe cards
They are easy to use.
It is not an expensive technology.
Magnetic cards can be remotely deactivated (if lost or stolen).
The cards can be multi-purpose (for example, door key cards, network access cards or used
in vending machines to buy food or drink).
Disadvantages of magnetic stripe cards
Less secure than, for example, biometric methods (no encryption is used and the stripe
contents can be copied fairly easily).
The cards wear out with a lot of use.
Magnetic readers often fail to read the cards on first attempt.
35
Smart cards
Smart contactless cards (that is, it can be read from a distance and does not have to be swiped through
a card reader). The chip on the smart card can store data such as name, security number, sex, date of
birth and a PIN. Smart cards can therefore be used as a security device. If the card is in a wallet or a
pocket as the owner of the card walks up to a security gate, readers on either side of the gate quickly
scan the security data stored on the RFID tag embedded in the card. The user will then be invited to
enter a PIN on the keypad. If all details match, then access will be allowed.
Physical tokens
A physical (or hardware) token is a form of authentication in the form of a physical,
solid object. The user’s interaction with a login system is used to prove that the user
has possession of the token. Physical tokens contain internal clocks and when a PIN
and other authentication details are entered, then a one-time password (OTP) is
generated. The OTP is shown on a small screen. The code changes on a regular basis and is usually
only valid for less than a minute.
Electronic tokens
Electronic (software) tokens are software installed on a user’s device, such as a smartphone. User
opens the app to log in to a website. The app generates a one-time password (OTP) which is valid for
less than a minute. The user enters this OTP when prompted by the website, together with some other
form of authentication, such as PIN, touch ID or face ID. The website server runs the same software
as the app. Because both the server and smartphone have synchronised clocks, they will generate the
same numbers. Once the OTP and other form of authentication are verified by the website, the user
will be allowed access.
Anti-virus software
Protects devices against a potential virus attack.
36
Electronic conferencing
o video conferencing
o audio conferencing
o web conferencing.
Video conferencing
Video conferencing is a communication method that uses both video and sound. It is a
substitute for face-to-face conferences between a number of people, who may be in a
different part of the country or live overseas. It is carried out in real time and makes use of
some form of network.
The basic hardware includes:
o webcams
o large monitors/television screens
o microphones
o speakers.
There are a few items to consider when a conference is about to begin:
o It is essential to agree a time and date for the conference to take place.
o The delegates in each conference room must log into the video-conference system.
o The video-conference set-up needs to be checked before the meeting goes live.
o Webcams need to be placed in the correct position so that all the delegates in the
room are within visual contact (the webcams will capture the images and then
transmit them to the other delegates – they will see the images on their own large
screens).
o Microphones need to be placed centrally so that all of the delegates can speak – the
sound is picked up by the microphones and is transmitted to the other delegates (they
hear the voices through speakers in their own conference room).
o It is important for one person to be the main contact in each conference room to
make sure each delegate is able to be heard; this is particularly important if more
than two video-conference rooms are linked up at the same time.
In addition to the hardware items described above, it is also important to realise that
software plays an important role in a successful video conference.
37
o it also reduces the cost of taking people away from their work for two or three days
to travel – people are still paid their wage even though they are not in the office, so
this is a large ‘hidden’ cost.
It may be better to use video conferencing than have delegates travel to potentially unsafe
places around the world.
It is better for the environment – less travel means less pollution.
Disadvantages of using video conferencing
There is potential time lag in responses/delays when talking.
Images can jerk – usually due to poor internet/network performance or poor bandwidth.
It can be very expensive to set up in the first place (both the hardware and the software are
expensive to purchase and get set up correctly).
There can be problems if the delegates live in different countries where the time zone
differences are large.
Training people to use the system correctly can be both costly and time consuming.
o It can be demotivating for staff if they believe that one of the ‘perks’ of their job is
international travel.
o The whole system relies on a good network connection – if it breaks down or the
signal strength is diminished in any way, then the video conference can be almost
unusable.
Audio conferencing
Audio conferencing refers to meetings held between people using audio (sound) equipment. It can be
done over the standard telephone network.
It is also possible to hold an audio conference using a computer, as long as a microphone and speakers
are connected. This makes use of Voice over Internet Protocol (VoIP). It is also possible to connect
an internet telephone, which usually plugs into the router or other internet device.
39
CHAPTER 5
DATA
Data gathering, verification, validation and Databases
Data Types:
Text/ Alphanumeric:
o May consist of letters, numbers or symbols
o Cannot be used in calculations
o Examples: Name, passwords, codes, phone number
Numeric:
o Consists of digits, decimal point or +_ signs, can be used in calculations
o Integer(whole numbers only); number of students, number of subjects, ..
o Real(has decimals or fractions); temperature, length,..
o Currency(used for money); price, taxes, wage,…
Boolean/Logical
o Data that has only 2 possibilities
o Yes/No, True/False…
o Examples: Attendance, Pass/Fail, ..
Date
o Any date/time
o Examples: Date of birth, exam date,…
Data gathering:
Data is collected from users by filling forms, other paper based or screen data entry forms. A good
form to collect data is an easy form to fill, with enough space for your data.
40
Data verification and validation:
To minimize transcription errors during input of data, the computer system must include extensive
checking procedures to guard against incorrect, missing or duplicate data. Data checks can be broadly
classified into verification and validation.
Data verification:
Verification is the user's task; it checks that data entered is what was meant to be entered.
Verification methods:
Double data entry:
Data is entered twice, either by the same user or by different users. Both entries are compared by the
computer, if they are identical data is assumed to be correct.
Visual verification:
The operator checks the data on the screen against what they are entering and correct errors they
detect.
Data validation:
Checking that data entered is sensible, reasonable and complete. Validation checks that data matches
a given rule.
E.g. a phone number is composed of digits; this can be tested by the computer at the input stage and
it will only accept digits for the phone number.
Range checks:
Range checks are performed on numbers to make sure they lie within a specified range.
Length checks:
Length checks determine the number of characters in a particular data item.
Format check:
Used when data should follow a given pattern; a centre number should consist of 2 letters followed
by 3 digits
Check digit:
It is an extra digit appended to a code number. The digit is generated from the code number itself by
applying an algorithm. Each time a code number is input, the computer follows the same steps,
calculate the check digit and compares the calculated with the input check digit, if they are equal the
code number is accepted.
41
How data is stored:
Data must be organized in a logical and consistent way if it is to be of use. In computer systems data
is organized into the hierarchy shown.
File/Table Structure:
To design a file some items of information should be specified:
Field names
Data types
Field sizes
Validation rules (for each field)
Primary key field
Data coding to reduce space
42
Database Structure:
To design a database with all its elements
File structure
Data input forms
Relationships between files
Passwords
Encryption of data
Report design
Query design
Types of database files:
Flat files:
A flat file is a database that only consists of one table.
Relational databases:
A relational database is a database that consists of several tables related to each other in some form.
Ex. in a supermarket database, there is the products' file and the suppliers' file, in each product's
record there is some information about the supplier, this information is the supplier code which relates
to the supplier's information in the suppliers' file.
The barcode of the product is the primary key in the products' file and the supplier code is a foreign
key. (since it uniquely identifies the supplier but not the product) .
43
CHAPTER 6
The effects of using IT
Microprocessor-controlled devices in the home
Examples of these devices are automatic washing machines, automatic cookers, air conditioning
systems, dish washers, burglar alarm systems, and fire alarm systems
Positive effects:
Microprocessor controlled devices do much of housework
Do not need to do many things manually
Do not need to be in the house when food is cooking
Do not need to be in the house when clothes are being washed
Can leave their home to go shopping
Can work at any time of the day
Greater social interaction
More family time
More time to go out/more leisure time/more time to do other things/work
Are able to do other leisure activities when convenient to them
Can encourage a healthy lifestyle because of smart fridges analyzing food constituents
Microprocessor controlled burglar alarm provides a sense of security Do not have to leave
home to get fit
Negative Effects:
Can lead to unhealthy eating due to dependency on ready meals
Can lead to laziness/lack of fitness
Manual household skills are lost
Monitoring and controlling transport
The use of microprocessors in transport systems is becoming more and more widespread. Examples
of where they are currently used include:
45
RSI
Repetitive Strain Injury is a damage in wrist and fingers due to continual typing on keyboard (wrist)
or continual clicking of mouse (fingers).
Protection:
Use ergonomic keyboards
Take regular breaks
Regularly exercise fingers
Use wrist rests and wrist pads
Eye problems
Due to using computers and staring at the monitor for long periods of time, some eye problems may
occur like:
Eye strain
Eye dryness
Sight problems
Protection:
Wear special glasses
Have regular sight checks
Use an antiglare screen
Use an LED monitor instead of CRT monitors
Back Problems
Back problems take place due to bad posture while working with a computer.
Protection:
Use ergonomic chairs
Use straight back chairs
Take regular breaks
Headaches
Headaches occur due to prolonged use of computers
Protection:
Take regular breaks
Have regular sight checks
Take care of lighting in computer rooms
46
Chapter 7
ICT Applications
1 Communication
Communication Media:
Newsletters and posters
Websites
Multimedia presentations
Media streaming
E-Publications
Newsletters and posters:
Newsletters:
Steps of creating newsletters using a word processor:
First a word-processor application would be opened
Photos could be obtained by:
o using a digital camera and taking photos
o searching for images/photos on the internet, or suitable photos could already be
stored on the hard drive or cloud
o using hard copy photos, which could be scanned in.
If necessary, camera images would then be uploaded (either by connecting the camera or
camera memory card) to the computer via a USB port, or by using Bluetooth connectivity).
Photos from all selected sources would then be saved to a file on the HDD or SSD.
Photos are imported from the stored file, photos would need to be cropped, edited and/or
resized.
Text would be typed in using a keyboard, and any previously saved text would need to be
imported.
Photos need to be placed in their correct position and the text wrapped.
Finally, the whole document would need to undergo proofreading for errors and then saved,
ready for printing.
Posters:
Posters are a good way of publicising, for example, a sporting event or an advertisement for a
forthcoming movie.
A sporting event poster would need to include at least the following information:
what the event is and where it will take place
date, time and place of event
admission fees (if any)
other information such as facilities for people with disabilities).
The movie poster would need to include:
an image taken from the movie to give some idea of the type of movie
the date of release
a list of the main characters.
47
As with newsletters, posters can be printed out using high-quality printers or can be posted online.
Printed posters can be any size. Large posters have the advantage that they are eye-catching and
usually very difficult to miss. They are used in many countries on the sides of roads so motorists see
them on their way to work. By placing the posters in strategic positions, it is possible to target certain
people rather than the general public (for example, advertising expensive cars by placing the posters
on buildings or advertising hoardings in financial districts in big cities). The drawback is the cost of
display (the advertising areas can only be rented) and that they are subject to weather conditions, so
only have a limited life.
Websites:
Websites are made up of web pages and can contain a variety of content, for example:
Text
Images
Sound
Animation
Videos
Hyperlinks
User interaction (comment boxes, reviews, forums, hit counters....)
Many companies choose to advertise their products on websites rather than on paper-based
documents. This is because websites can be accessed by millions of people.
Multimedia presentations
49
SMS
Features and advantages:
quicker and less expensive than making phone calls
can be sent at any time of the day even if the recipient’s phone is switched off
predictive texting, where the system completes a word from the first few letters keyed in,
texting also allows the system to remember frequently used words – together they increase
typing speed
Phone Calls:
Features and advantages:
There is no need to look for an operational public telephone in an emergency.
It is possible to conduct business or personal phone calls on the move.
It is easier to keep in contact with co-workers at the office no matter where you are
VOIP:
Voice over Internet Protocol (VoIP) is a method used to talk to people using the internet.
VoIP converts sound, picked up by the mobile device’s internal microphone, into digital
data packets that can be sent to their destination via the internet.
The internet can be accessed via a mobile phone network or a broadband network (wifi)
Advantages:
o phone calls are free, no matter where in the world the caller and receiver are.
o device’s built-in cameras can also be used so that it becomes a type of video call.
o it is much cheaper than a video-conference (no need for special software and
additional hardware items – VoIP uses built-in microphones, speakers and cameras).
Disadvantages:
o sound quality (echo and ‘weird sounds’ are both common faults).
o Security is also a main concern with VoIP, as it is with other internet technologies.
Video Calling:
Video calling uses software such as FaceTime or Zoom.
Both these options require the user to download an app.
FaceTime makes use of the built-in smartphone cameras and microphone/speakers.
A split screen allows you to see a number of people at the same time; although the small
screen size limits the potential of this feature.
Zoom is a cloud-based video calling service that allows live video chatting on any device.
Advantages:
o It is also possible to record sessions to be played back at a later date.
o Cloud-based video calling prevents the need for users to invest in expensive
infrastructure; users can simply dial into a virtual meeting room which makes it
much cheaper than conventional video conferencing
Features:
Video calls permit:
o live video and audio chat
o screen-sharing during the call
o recording during sessions.
50
Internet Access:
Any mobile device can connect to the internet either using a wireless broadband connection
or via the mobile phone network.
Due to the use of smaller screens, internet pages displayed on mobile phones are often
different to those on desktop or laptop computers.
Software detects which type of device is connecting to a website, which then sends out the
web page optimised for that device.
Mobile devices also have a built-in feature which automatically selects wireless broadband
connectivity (if possible), instead of the mobile phone network, when connecting to the
internet.
This has the following advantages:
o less expensive (mobile phone company ‘data plans’ often have a cap on how much
data can be downloaded, and charge for exceeding this maximum)
o lower power consumption (Wi-Fi routers are usually much closer than the mobile
phone towers; the longer the range, the greater the power consumption)
o quality of service (Wi-Fi usually offers greater bandwidth than the mobile phone
network giving the possibility of downloading more data more quickly)
2 Modelling applications
A computer model is the creation of a model of a real system in order to study its behaviour. The
model is computer generated and based on mathematical representations.
The whole idea is to try to find out what mechanisms control how a system behaves. This makes it
possible to predict future behaviour of the system and see if it’s possible to influence future behaviour.
Examples:
Personal Finance
Bridge and building design
Flood water management
Traffic management
Weather Forecasting
Advantages of using models
Using computer models is less expensive than having to build the real thing (for example, a
bridge!).
On many occasions it is safer to use a computer model (some real situations are hazardous,
for example, chemical processes).
Computer modelling allows you to try out various different scenarios in advance.
It is nearly impossible to try out some tasks in advance in real life because of the high risk
involved or the remoteness (for example, in space, under the sea, in nuclear reactors, when
crash testing cars, etc.).
It is often faster to use a computer model than do the real thing (some applications would
take years before a result was known, for example, climate change calculations, population
growth, etc.)
Disadvantages of using models
A model is only as good as the programming or the data entered; the simulation will depend
heavily on these two factors.
Although building the real thing can be expensive, sometimes computer modelling is also a
very costly option, and the two costs need to be compared before deciding which to use.
51
People’s reactions to the results of a simulation may not be positive; they may not trust the
results it produces (there will always be a difference between the results from modelling and
reality).
3 Control Applications
Robotics
Production lines
Autonomous Vehicles
Robotics
Robots are used in many industries, control of robots is either through a built in microprocessor or
linked to a computer system.
Advantages of robots:
They can work in dangerous environment
They can work 24/7
Do not need wages so less running cost
Higher productivity
Greater consistency(produce the same standard of product each time)
They can do boring, repetitive tasks leaving human free to do more skilled work( e.g.
quality control or design tasks)
Disadvantages:
They find it difficult to do unusual tasks
Can cause higher unemployment
There is a real risk of deskilling or loss of some skills
Initial set up cost of robots and maintenance costs are expensive
Automated Production lines:
Advantages:
faster operations (the number of cans of baked beans filled is 120 per minute)
much greater productivity (the production can run 24 hours a day for every day)
greater consistency (every can contains exactly the correct weight of baked beans)
built-in quality control (automatic testing for foreign material, such as metal filings, which
would result in automatic rejection from the production line)
reduced cost to the consumer (although initial robot arms are expensive, there are far fewer
staff in the factory who would need wages).
52
Autonomous Vehicles:
Method 1
Give each student a magnetic stripe card; student’s information is stored on the magnetic stripe. The
card is read when student arrives at school and when leaves school so exact information about date
and hours of attendance are recorded on a database.
Method 2
Make use of biometrics by taking the fingerprints of all students, their personal details as well as their
fingerprints are stored on a database. Students pass their fingers on a fingerprint scanner as they enter
or leave school.
53
Advantages of fingerprint method:
Fingerprints are unique, so it is impossible for a student to pretend to be someone else
Cards could be easily lost
Cards could be affected by magnetic fields
Fingerprints are difficult to replicate but cards can be cloned
Disadvantages:
It would take a long time to collect the initial fingerprints of all students
Equipment needed for fingerprints are more expensive than card readers
Some parents may object on these methods due to invasion of privacy
Student performances:
Teachers can use spreadsheets efficiently to monitor the performance of their students
54
Theatre and cinema booking systems
Online booking systems rely on the ability to update files immediately thus preventing double
booking
55
Depositing cheques at an ATM:
The user is asked to insert their debit card and type in the PIN.
A message will then appear asking the customer which service they require.
The customer chooses to deposit a cheque.
A drawer will then open and the customer inserts the cheque.
The drawer will then close and an OCR device will read the cheque details including the
amount of money.
The amount appears on the screen and the customer confirms the amount.
The customer’s account is updated with the amount on the cheque (pending cheque
clearance within 24 to 48 hours).
A printed receipt of the cheque is then given to the customer.
If they do not require another service, the card is returned to the customer.
EFT:
Electronic funds transfer (EFT) is a system that allows money transfer instructions to be sent
directly to a bank’s computer system.
No actual money is transferred; money is electronically transfered between accounts.
When an EFT instruction is received, the computer system automatically transfers the
specified amount from one account to another.
Advantages of EFT
It is a very secure payment method.
It is a very quick payment method.
It is less expensive than, for example, using cheques.
The customer has the right to dispute an EFT payment for up to 60 days.
Disadvantages of EFT
Once an amount has been transferred the bank cannot reverse a transaction (requires a full
dispute investigation).
The customer needs to have funds available immediately (unlike when using a cheque).
It cannot guarantee the recipient (someone with a fake ID could collect the money).
Clearing of cheques:
Cheques are collected to be sent at the end of the day to a centralised cheque clearing centre, a cheque
is processed by passing it through a reader/sorter machine. This machine reads:
56
All the cheques are then sorted using their sort codes(unique 6 digits to identify a bank) ready for
sending to an exchange centre.
Data from the cheque is converted into an encrypted file known as IBDE file (Inter bank data
exchange).
Every IBDE file is signed with a digital signature so that the receiving bank can be sure data was not
altered.
Later the cheque is sent to an exchange centre which passes the cheque back to the paying bank which
then sends it to its own clearing centre.
Later on the paying bank checks to see if the account has enough money to cover the cheque, it has
been signed, dated and is genuine.
The bank then decides whether to pay the cheque or return it unpaid to the receiving bank.
57
8 Expert Systems:
Expert systems have been developed to mimic the expertise and knowledge of an expert in a particular
field. Examples include:
59
10 Recognition systems:
OCR, OMR, RFID
These were discussed in chapter 2.
Step 1
A sensor detects a vehicle and sends a signal to a microprocessor to instruct a camera to capture an
image of the front of the vehicle. (Often an infrared camera is used to give a clearer image and for
use at night)
Step 2
Each character is then recognized using OCR software. The characters are converted into a string of
editable text by the software and stored in a database.
Step 3
The car park barrier is raised and the motorist is issued with a ticket. The ticket shows the date and
time of entering the car park.
Step 4
When the motorist returns to the car park, they insert their ticket into a machine which calculates the
car park charges. Payment is registered on the database. When the car comes to the exit barrier, the
ANPR system again reads the number plate and checks its database. If the number plate is recognised
(and payment fulfilled), the exit barrier is raised.
Advantages of ANPR
It can be used to automatically monitor average speed of vehicles over a stretch of road; this
can be used in smart traffic management systems (see also Section 6.2).
There is no need to employ car park security guards, which saves money.
It is a much faster system than having to check a ticket at the exit; car parks can issue tickets
on entry, but this ticket is simply used for payment purposes by the motorist before leaving
the car park and is not used at the exit since payment will now be linked to the number plate
on the car.
It can be used to automatically control the entry and exit to a car park or private roads.
It can be used as a security system; preventing illegal parking and preventing unauthorised
access to private car parks.
It can be used to analyse driver behaviour (that is, route choice and destinations) to help in
transport planning.
It can be used in inner-city congestion charging systems; it is possible to automatically
charge a motorist if they enter a congestion zone, but also allows in permitted vehicles
without charge (for example, emergency vehicles, buses and electric zero-emission
vehicles).
60
Disadvantages of ANPR
There is a lack of manned security car park surveillance which could lead to vandalism (and
other crimes) because nobody is checking on a regular basis; CCTV is often used, but this is
often just used ‘after the event’.
There could be invasion of privacy issues due to the recording of drivers’ number plates. »
Damaged or very dirty number plates will not be recognised by the system.
Number plate cloning; the ANPR system only recognises the number plate and not the car,
so it is possible for a car to be fitted with a cloned number plate thus by-passing car park
security, for example.
Biometric Recognition systems:
Biometric recognitions systems include:
face recognition
iris and retina recognition
finger and thumb recognition
hand recognition
voice recognition
Retina recognition
The retina is the light-sensitive area at the back of the eye that has a unique pattern of blood
vessels.
The retina cannot be seen without specialised equipment – this means it is a secure
technology, but more expensive to implement.
The special equipment is used to take an infrared photograph of the retina.
It is quite invasive – the subject has to sit very still and stare directly into the light source.
It is slower to scan and verify.
It is only used in very specialised high-security settings
Iris recognition
The iris is the coloured part of the eye, surrounding the pupil.
A digital camera is utilised which uses both visible and near infrared light to take a sharp
photograph of a person’s iris.
The method produces a unique pattern of a person’s iris by locating and taking an image of:
o the centre of the pupil
o the edge of the pupil
o the edge of the iris
o the eyelids and eye lashes
The system works with:
o contact lenses and glasses
o blind people.
It can umiquely identify a person in less than 5 seconds
used a security system in:
o immigration control (in some countries)
o some banks have introduced this in some branches as a security feature
61
11 Satellite Systems
11.1 Global positioning satellite (GPS) systems and satellite navigation
GPS systems are used to determine the exact location of a number of transports (airplanes, cars, ships,
etc.)
Satellites surrounding the earth transmit signals to the surface. Computers installed in the mode of
transport receive and interpret these signals. Knowing their position on the earth depends on very
accurate timing (atomic clocks in satellites). Each satellite transmits data indicating its position and
time. The computer on board the mode of transport calculates its exact position based on information
sent from at least three satellites.
In cars, the on-board computer contains stored road maps. With these satnav systems, the car’s exact
location, based on satellite positioning, can be shown on the map and the driver can also give verbal
instructions such as: “after 100 metres, take the next turn …”
A screen on the satnav device will also show the car’s position in relation to the road network.
Advantages:
the driver doesn’t have to consult paper maps, so it is far safe
It removes errors ( can warn drivers about one way streets, street closures, etc.)
The system can estimate journey time
System can give useful information like the nearest gas station
Disadvantages:
Maps need to be up to date
Loss of satellite signals may cause problems
15.2 Geographic information system (GIS)
GIS is a computer system that allows us to map, model, query and analyse large amounts of data
according to their location.
62
Signals are converted to analogue (if necessary) and then beamed to the satellite from a
satellite dish on the Earth.
The signals are delivered by carrier waves which consist of radio waves. Each signal has its
own frequency and bandwidth (the larger the bandwidth the more data can be transmitted).
Once the data reaches the satellite, it is then re-sent to Earth.
The satellite usually ‘boosts’ the signal before sending it back. Often the frequency of the
signal is changed to prevent the signal received being confused with the signal sent.
Satellite systems are used to transmit data from one part of the planet to another. Due to the
great distances involved, cables would be too costly and there is also the problem of signal
deterioration in cables over long distances
Satellites systems are used to transmit television, telephone and internet data around the
world.
63
Chapter 8
Systems Analysis
Systems analysis is the process of developing a new system to operate and manage the performance
of some business or application in real life. The job of a system analyst is to study the existing system,
find out its problems together with the requirements of the new system and try to come out with the
optimum solution.
Analysis
Evaluation
Design
Development and
Testing
Documentati
on
Implementatio
n
Advantages:
Quicker to be answered and analysed
Does not need a previous appointment unlike interviews
64
Disadvantages:
Some workers may ignore
Limited to short responses
3. Observing the daily work details.
Advantages:
Relatively inexpensive
Can give detailed idea about the whole system
Disadvantages:
People may work in a different way when monitored
4. Examining the existing documents.(ex. Any bits of papers, screen displays, files)
Advantages:
Shows a good idea about inputs and outputs of the system
Disadvantages:
No idea about processing
After this step, a report should be produced which includes:
Detailed information about the existing system.
Inputs, processing and output in the existing system.
Problems with the existing system, together with possible solutions.
The objectives of the new system.
User and information requirements for the solution.
Any constraints about the proposed system.
Hardware and software required to for the new system.
A cost benefit analysis
A data flow diagram
System Design:
If the directors of the business are convinced with the proposed system, then work can be started
designing the new system.
65
Development and Testing:
Once the system has been designed, it needs to be created and fully tested.
Development stage:
To create a system, file structure needs to be finalized, and then files are created.
File structure needs to be tested, as well as verification and validation routines to make sure that the
system will work properly.
Testing strategies:
There are four types of test data:
1. Normal values: is data which is usual for the situation ( e.g. a number in the range 0 to 100 for an
exam score)/has an expected outcome.
2. Abnormal data: is data which is outside the acceptable range ( e.g. -20 or 125 for an exam score)
or is of a wrong data type
3. Extreme values: is data which is at either end of a normal range of data ( e.g. the numbers 0 and
100 for an exam score)
4. Live data: is data from a real life situation already used with the old system , so output from both
systems can be compared.
As a result of system testing, some parts of the design can be changed to correct any errors; examples:
File structure
Programs
Hardware specification
Verification methods
Validation routines
Implementation:
Implementation is replacing the old system with the new system.
Advantage: can use the old system if the new system fails, no data loss, can train staff gradually.
Disadvantage: it costs a lot in wages for two sets of staff.
66
Pilot implementation:
Making the conversion in a small part of the system (e.g. a branch of an organization), when settled
down, move to another part.
Advantage: if the new system fails, only one part is affected, it is possible to train staff in one
area only.
Disadvantage: It takes time to implement.
Phased Implementation:
One part of the new system is introduced. Only when it proves to work satisfactorily is the next part
introduced, and so on, until the old system is fully replaced.
Advantage: if the latest part fails, it is only necessary to go back in the system to the point of
failure, it is possible to ensure the system works before expanding.
Disadvantage: more expensive, since each stage needs evaluation before moving to the next
stage.
Documentation:
User documentation:
It is a user guide or manual. It should be written in simple language and contains no terms, contains:
67
Input formats
Hardware requirements
Software requirements
Minimum memory requirements
Known bugs in the system
List of variables used
File structures
Sample runs
Output formats
Validation routines
Meaning of error messages
System Evaluation:
After a system has been implemented it should be reviewed periodically to make sure that it meets
its objectives.
A good way of evaluating a solution is to ask the users of the system to find out their responses to
using the system and to state how easy and efficient the system is.
It is also needed to compare the solution with the original task requirements.
Finally, limitations of the system and any required improvements should be identified, and this may
lead us to start developing a new system.
68
Chapter 9
Safety and Security
Physical safety:
The increased use of computers brings its own physical dangers, which can cause harm to users unless
they take some sensible precautions.
Safety Risks:
Safety Risk Ways of eliminating or minimising risk
Electrocution Use an RCB (residual current breaker)
Check wire insulation regularly
Don’t allow drinks near computers
Check equipment on regular basis
Trailing wires (trip hazard) Use cable ducts
Cover wires or have them neatly tucked away (under
desks,..)
Use wireless connection where possible
Heavy equipment falling Use sturdy or strong tables
causing injuries Use large desks and tables so equipment are away from
table edges
Fire risk Have a fully tested CO2 extinguisher nearby
Don’t cover equipment vent (causing equipment to
overheat)
Ensure good room ventilation
Don’t overload electrical sockets
Data Protection Act:
Data must be fairly and lawfully processed.
Data can only be processed for the stated purpose.
Data must be adequate, relevant and not excessive.
Data must be accurate.
Data must not be kept longer than necessary.
Data must be processed in accordance with the data subject’s rights.
Data must be kept secure.
Data must not be transferred to another country
E-Safety:
It refers to safety when using the internet, i.e. keeping personal data safe and applies to any of
the following devices:
Mobile phones
Computer or tablet
Game consoles
Wireless technology
Personal Data:
Personal data refers to any data concerning a living person who can be identified from the data itself
or from the data in conjunction with other information. For example, ‘Peter Smith has long purple
hair and lives at 40 Green Street’ would very clearly identify this individual!
69
Examples of personal data include:
Name
Address
Date of birth
Medical history
Banking details
Some personal data is often referred to as sensitive data and includes:
Political views
Religion
Criminal activity
Sexual orientation
Membership of a trade union
Membership of a political party
The following list is exhaustive but gives some idea of the e-safety issues that can be encountered
by users of ICT:
Don’t give out any personal information to unknowns especially online and it is very
difficult to determine whether they are genuine or not.
Don’t send people photos of yourself- either online or via a mobile phone- unless the person
is known to you. This is a particular risk in social websites.
Always maintain privacy settings on whatever device is being used online, which allow
user to control which cookies are stored on their computer or enable user to decide who can
view information about them, for example, in social websites.
Only use websites recommended by teachers or learner friendly search engines.
Only open emails from known sources.
In social websites or chat rooms:
Block or report any suspicious person
Be careful with language used
Always use a nick name and not your real name
Keep private and personal data secret
Don’t enter private chat rooms, stay public
Never arrange to meet someone for the first time in your own
Avoid the misuse of images
Security of data:
There are a number of security risks associated with any device connected to a network:
Hacking:
This is the act of gaining unauthorised/ illegal access to a computer system
Effects:
This can lead to identity theft or the misuse of personal information; data can be deleted, changed or
corrupted on a user’s computer
Prevention:
Use of firewalls
Use of strong (frequently changed) passwords and user IDs
Use of anti-hacking software
70
Phishing
The creator sends out legitimate-looking emails to target users. As soon as the recipient clicks on a
link in the email or attachment, they are sent to a fake website or they are fooled into giving personal
data in replying to the email. The email often appears to come from a trusted source, such as a bank
or well-known service provider
Effects:
The creator of the email can gain personal data, such as bank account data or credit card
numbers, from the user
This can lead to fraud or identity theft
Prevention:
Many ISPs or web browsers filter out phishing emails
Users should always be cautious when opening emails or attachments
Don’t click on executable attachments that end in .exe, .bat, .com or .php, for example
Smishing
Short for SMS phishing, use of mobile phones SMS to send out fake messages in order to get sensitive
personal details.
Vishing
Voice mail phishing is another version of phishing.
Pharming
This is malicious code installed on a user’s computer or on a web server; the code will redirect the
user to a fake website without their knowledge (the user doesn’t have to take any action, unlike
phishing)
Effects:
The creator of the malicious code can gain personal data such as credit/debit card details
from users when they visit the fake website
Pharming can lead to fraud or identity theft
Prevention:
Some anti-spyware software can identify and remove pharming code from a user’s
computer
The user should always be alert and look out for clues that they are being redirected to
another website
Viruses and malware:
Malware is one of the biggest risks to the integrity and security
of data on a computer system. Many software applications, such
as anti-virus, are capable of identifying and removing most of
the forms of malware. There are many forms of malware; this
section details just a selection of those forms.
Virus:
This is program code or software that can replicate/copy itself with the intention of deleting or
corrupting files on a computer; they often cause the computer to malfunction (for example, by filling
up the hard drive with data)
71
Effects:
Viruses can cause the computer to ‘crash’, stop functioning normally or become
unresponsive (e.g., the user gets the ‘not responding’ message)
The software can delete files or data on a computer
The software can corrupt operating system files, making the computer run slowly or even
‘crash’
Prevention:
Install anti-virus software and update it regularly
Don’t use software from unknown sources
Be careful when opening emails or attachments from unknown senders
Card fraud
Card fraud is the illegal use of a credit or debit card. This can be due to:
shoulder surfing when using the card on an ATM or a handheld POS terminal
card cloning
key logging software.
Shoulder surfing
Examples:
somebody watching you key in data, such as your PIN; by just looking over your shoulder
or watch from a distance using binoculars or using a video camera
somebody listening in when you are giving credit or debit card details over the phone
use of tiny digital cameras which take high-quality images of the keys being pressed.
There are ways to overcome this security risk:
When using ATMs shield the keyboard with your other hand (many ATMs also have a small
mirror built into them so you can see if somebody is standing right behind you).
When using a mobile device (such as a smartphone, tablet or laptop) never key in data in a
public place; nor should you speak card details into your smartphone in a public place.
If you are using a public place, make sure you are nowhere near security cameras which
could record passwords or use biometrics (touch ID or face ID) on your smartphone or
tablet, because these cannot be duplicated by simply watching you.
72
Card cloning
Card cloning is the copying of a credit or debit card which uses a magnetic stripe. Cloning of this
type of card employs an electronic device known as a skimmer.
Skimmers can be placed in ATM slots where they can read all the data from a card; this data is then
copied to the magnetic stripe of a fake card. The skimmer would also make use of shoulder surfing
to know the PIN. Smart cards, which give considerably more security can be cloned by a different
device, known as a shimmer. This uses a paper-thin shim (that contains a chip and a flash drive) that
can be put into a card reading slot. It is so thin that it is almost impossible to detect. When a customer
puts their card into the reader slot, the shim reads all the data from the credit/debit card, allowing the
criminal to create a fake replica credit/debit card. Although the chip itself cannot be cloned, all the
data gathered from the cloned card is now stored on a magnetic stripe and a fake card is produced.
The fake card can be used to make purchases where a magnetic stripe card is still acceptable; for
example, when making purchases online. Obviously, the best way to check on this type of fraud is to
do regular checks of your spending and query any unusual activity.
Key logging
The use of key logging software has been discussed earlier. This is used to detect all key presses,
such as when entering a credit or debit card:
number
security code (card verification value – CVV)
PIN.
Because all this data can be obtained by key logging software, illegal use of a credit or debit card to
buy things online is a continued risk.
Protection of Data:
biometrics
digital certificates
secure sockets layer (SSL)
encryption
firewalls
two-factor authentication
user ID and password
Biometrics:
Biometrics relies on certain unique characteristics of human beings. Examples include:
fingerprint scans
signature recognition
retina scans
iris recognition
face recognition
voice recognition.
Fingerprint scans
Images of fingerprints are compared against previously scanned fingerprints stored in a database; if
they match then access is allowed. The system compares patterns of ‘ridges’ and ‘valleys’ which are
unique.
73
Advantages:
Fingerprints are unique and difficult to replicate
Other security devices (such as magnetic cards) could be lost or even stolen
It would be impossible to ‘sign in’ for somebody else
Fingerprints cannot be misplaced; a person always has them!
Disadvantages:
It is relatively expensive to install and set up.
If a person’s fingers are damaged through an injury, this can have an effect on the scanning
accuracy.
Some people may regard it as an infringement of civil liberties.
74
Digital certificates
A digital certificate is a pair of files stored on a user’s computer to ensure the security of data sent
over the internet. Each pair of files is divided into:
For example, suppose Kate wishes to buy a new camera from a website. She logs into the website
using her computer. This requires her to enter a user name and a password, which is step one of the
authentication process.
To improve security, an eight-digit PIN (called a one-time pass code) is sent back to her either in an
email or as a text message to her mobile phone (the mobile phone has already been registered by Kate
on the website as the second stage of the authentication process).
Kate now enters this eight-digit PIN into her computer and she is now authorised to buy the camera.
Using the definitions of authentication at the start of this section, the mobile phone is something she
has and the password/PIN code is something she knows.
76
Chapter 10
Audience
Audience Appreciation:
When planning and creating ICT solutions, it is important to consider the audience who will use the
solution. The following list shows a number of factors to be considered:
77
Software copyright
Software is protected by copyright laws in the same way as music CDs, videos or articles from
magazines and books are protected.
It is illegal to:
Make a software copy and sell it or give it to a friend or colleague
Use software in a network or multiple computers without a license
Use coding from a licensed software in your own software and then pass this software on or
sell it as your own without permission from copyright owners
Rent out software without permission from publishers
Use the name of copyrighted software on other software without an agreement to do so
Software piracy (illegal copying of software) is a big issue among software companies. They take
some actions to protect their work.
78
Chapter 11
Communication
Communication using email:
Constraints
There are many rules we need to follow to ensure the security of messages sent and to prevent people
from writing things regarded as unacceptable. This part considers these constraints:
Law
Many countries have laws to protect people against misuse of emails.
Copyright
It is very important to realize that emails are subject to copyright laws. Just because it is relatively
easy to forward an email does not mean it is always legal to do so. This is also true of any attachments.
As with a webpage, copyright is determined by its content. Printing, copying or forwarding an email
is not considered a breach of copyright unless the sender has indicated clearly that the message is
confidential or subject to copyright.
79
Spam
Unsolicited email sent over the internet to multiple recipients and can range from being simply
annoying to dangerous, spam is used for advertising but can contain viruses or be part of a phishing
scam.
Disadvantages of spam:
It uses up people’s time
It generally annoys people
It uses up valuable bandwidth on the internet, slowing it down
It can fill up user’s inbox
How to recognise spam:
Content too good to be true
Sender unknown( not in contact list)
May contain grammar or spelling mistakes
General greeting(not personalized)
May contain links
How to prevent spam:
Never reply to a spam mail
Learn how to block and report spammer
Use an ISP with a spam filter
Move spam to junk folder
Email groups
Email groups are used for a number of purposes:
It is easier for a user to send out multiple emails if the addresses are grouped together under
a single name
Companies and organisations can group people together for marketing purposes
Spammers can create email groups by buying addresses of people from certain companies-
this means that several thousands of people can be sent spam by pressing the send key
Companies use email groups to set up meetings
Other email operations
Apart from the person you are sending the email to, there are other options available, such as:
The use of Cc is really just netiquette; those on the ‘To’ are the main recipients and those in
the ‘Cc’ list are interested parties.
80
Bcc is often used as a security measure when using email groups. When sending an email to
many recipients, the following is an added security to keep the addresses of everyone safe:
o Put your own email address in the ‘To’ field.
o Set up an email group containing all the recipients and give it a name; then store this.
o Put this named email group in the ‘Bcc’ field.
o This will provide some additional protection, because anyone seeing the email
(authorised or unauthorised) will not be able to see the email addresses of the other
recipients.
Forwarding of emails
Resending a received email to other recipients
Attachments
Files sent within an email, they should be treated with great caution as they could be
phishing or viruses.
Attachments should be scanned for viruses and malware before download.
Effective use of the internet
The internet
The internet is a worldwide collection of networks that allows users to:
Send and receive emails
Chat online
Transfer files from computer to computer (using file transfer protocol)
Browse the world wide web
Internet Functionality:
Internet service provider (ISP)
An ISP is a company that provides users with access to the internet. It is normal to pay a monthly fee
for this service. When a user register with an ISP, an account is set up and they are given login details
that include a user ID and password.
An ISP has the equipment and telecommunications line access required to have internet access-
usually broadband connections, which use copper cables, or more recently, fibre-optic cables.
Web browsers use uniform resource locators (URLs) to access websites, retrieve files and so on.
81
Hypertext transfer protocol (http and https)
Set of rules used while transferring data across the internet. Protocols are sets of rules agreed between
sender and receiver when data is being transferred between devices. When opening a webpage,
enteringhttp:// at the front of an address tells the web browser that http rules are to be obeyed.
When some sort of security is used, SSL or TLS, then the protocol is changed to https (the letter “s”
refers to secure)
Features of a blog:
Updated regularly by the author
Usually organised in reverse chronological order(most recent to less recent)
Normally public-anyone can read
Usually have a single author
Other internet users can’t change blogs-they can only read them
Microblogs are similar to blogs but are most often used on social networking sites to make short,
frequent posts such as tweets.
Wikis
Wikis are web applications or websites that allow users to create and edit web pages using a web
browser. A wiki will support hyperlinks and uses a very simple syntax (known as wiki markup) to
create pages. They can be described as webpages with an <edit> button.
Features of wikis:
Anyone can edit, delete or modify the content
Many authors can be involved in a wiki
It is possible to organise the page anyway that the users wish
Keeps track of all entries-i.e. stores a document history
Can be easily edited using a web browser
Allows many people to see large documents
Forums:
A moderated forum refers to an online discussion forum in which all the posts are checked by an
administrator before they are allowed to be posted. Many users prefer this type of forum, compared
to an unmoderated one, as the moderator can not only prevent spam, but can also filter out any posts
that are inappropriate, rude or offensive, or even those that wander off the main topic.
The internet is essentially a huge unmoderated forum. No one ‘owns’ the internet, and it is essentially
not policed. The only real safeguards are a voluntary cooperation between the users and the network
operators. However, most social forums or networking groups on the internet have a set of rules or
protocols that members are requested to follow or they will be deleted.
82
Social networking sites
Social sites focus on building online communications of users who share the same interests and
activities. They enable users to share photos, videos and music, hobbies, favourite eating places, and
so on. The members do this by creating public profiles and thus form ‘relationships’ with other users.
Search engines
Search engines are useful when you don’t know the URL of the website or if you want to find some
information but don’t know where to look.
Search engines use a variety of search methods, but they all have one common feature: they use the
words entered in the search box and look up in their database of web pages to find out which of them
match your search string.
83
Practical Questions
Generic file formats:
Generic file formats allow you to open files in different applications. They may not contain all
formatting but can be used in different systems.
Some file types , such as spreadsheets (.xls) or databases (.accdb) are not generic. It is not always
possible to open these files on other applications.
Anything produced for a company will usually have a logo, colour scheme, font style, paragraph
style, page layout, page formatting, and defined styles for bullets and numbering.
The purpose of a house style is to make sure that documents and other material of a company have
consistency. It is also used to save time of planning, setting up or creating documents and other
material. It is also used to support brand recognition and reduces the risk of mistakes in documents
like typing errors in address or phone number.
85