0% found this document useful (0 votes)
6 views29 pages

My IT Notes

The document discusses the differences between 3G and 4G mobile networks and their capabilities. It also covers topics such as data normalization, lossy vs lossless compression, RAM vs ROM vs hard disks, device drivers, and data dictionaries.

Uploaded by

qwertymujtaba474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views29 pages

My IT Notes

The document discusses the differences between 3G and 4G mobile networks and their capabilities. It also covers topics such as data normalization, lossy vs lossless compression, RAM vs ROM vs hard disks, device drivers, and data dictionaries.

Uploaded by

qwertymujtaba474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

▪There is no data duplication so there are become more difficult

3G VS 4G fewer errors in the data You can end up with more tables than an un-
🔵Both are types of mobile network ▪Modifying a table is easier as there is less normalised database making it
🔵Both allow smart phones to access the data to modify difficult to keep track of data
WWW 🔸May require greater expertise (which may
🔵Both allow video calling on phones ◾As there is less data to search through, it is need to be bought in).
much faster to run a query on the data
🔵Both allow emails to be sent by phone
#It
🔵Both allow videos and music to be ◾As there is no redundant data there is better IT
downloaded to a phone data integrity
🔵Both allow phones to be used as a SATNAV Lossy and Lossless
◾As there is no redundant data there is less Lossy compression
Differences: chance of storing two or more different copies ◾Lossy compression removes some of a file’s
🔴4G has faster download speeds than 3G of the data original data in order to reduce the file size.

◾Data is grouped logically within the database ◾This might mean reducing the numbers of
🔴4G enables smoother browsing with web
structure colours in an image or reducing the number of
pages failing to load, very rare unlike 3G
samples in a sound file.
🔴4G allows videos and music to be streamed ◾Normalised databases only contain atomic
data ◾This can result in a small loss of quality of an
without the buffering and freezing found on 3G image or sound file.
networks
*Disadvantages:*
◾A popular lossy compression method for
🔴Batteries last longer on 3G than on 4G images is the JPEG, which is why most
🔸A larger number of tables requires more
relationships to be designed taking images on the internet are JPEG images.
🔴3G data allowance tends to be cheaper than
more time
4G ◾A popular lossy compression method for
IT sounds is MP3.
🔸Making data atomic may not always be the
Must Memorize
best solution such as date of
◾Once a file has been compressed using
Adv/Dis of Normalization birth can be separated into day, month and
lossy compression, the discarded data cannot
year but this may serve no
be retrieved again.
purpose
*Advantages:*
🔸Data may be stored as codes rather than
▪Any change to one record which is needed meaningful data making it difficult Lossless compression
can instantly be made to any related records for humans to read/level of detail can be lost
▪The database does not have redundant data ◾Lossless compression doesn’t reduce the
making the file size smaller so less money 🔸With more tables setting up queries can quality of the file at all.
needs to be spent on storage
✖ Handles the translation of requests between devices and more prone to failure than
◾No data is lost, so lossless compression a RAM/ROM – no moving parts
allows a file to be recreated exactly as it was device and the computer
when originally created. ♣ In a normal computer configuration RAM
💠Defines where outgoing data must be store size is much smaller than the hard disk size
◾There are various algorithms for doing this, IT
usually by looking for patterns in the data that Must Memorize ♦ ROM cannot be changed by a program or
are user
repeated. RAM, ROM, HDD
♠ RAM / ROM allows quicker access to data ♠ ROM/HDD retains its data even after the
◾Zip files are an example of lossless than HDD computer is turned off
compression.
♥ HDD or the Hard Disk Drive stores ♥ ROM stores the instructions for the computer
◾The space savings of lossless compression information for permanent storage/long term to start up when it is turned on again
are not as good as they are with lossy whereas RAM only stores information for
compression. relatively short-term usage ♣ Would be expensive to save an operating
IT system on ROM so need hard disk
Must Memorize ♣ Data in RAM is deleted once the power to
the device is stopped ♦ Still need to have boot up instructions to
Device Driver activate hard disk drive so ROM is
💠It operates/controls a device attached to the ♦ RAM stores active program data whereas needed.
computer ROM is unable to IT
Must Memorize
✖Without the device driver, the corresponding ♠ RAM stores data that the user is currently
hardware device fails to work working on whereas ROM is unable to Data Dictionary

✖It is an interface between operating ♥ Large RAM chips can be read faster than 〰Table name – a unique name for each table
systems/applications software and the device most ROMs ... in a database

✖Tells the operating system how to ♣ ROM content is sometimes copied to RAM 〰Field name – to identify each field
communicate with the hardware device and subsequently read from RAM
〰The data type allocated to each field – e.g.
✖Upon installation it detects and identifies the ♦Hard disks can be portable and easy to move text, numeric, Boolean
from device to device unlike ROM/RAM
peripheral device
〰Field length – the number of characters in
♠ Data in RAM can be accessed much faster each field
✖ Wakes up the device when it is needed and than the data on a hard disk
puts it back to sleep when it is not
〰Field default value, where present, is the
♥ Hard disk drives are electromechanical value automatically entered in that field when
a new record is created security issues« Usually covered by copyright which provides a
legal basis for its owner to establish exclusive
〰Validation – the validation check applied to 🔴if Bruce’s local wireless network is not rights.
each field secure
〰Table security – Packet loss will be higher with the VPN and
cause data to be lost and need to be *Open-Source* can be used by any application
〰 Keys – primary keys are identified retransmitted« that supports them
«increasing the time taken to receive
〰 Relationships – relationships between documents
#It
tables are stated – one to one, one to
many 🔴The connection depends on the ISP and so
performance can be variable IT
#It
Disadvantage of Direct Data Source
IT 🔴Will need to install extra anti- malware tools ◾ Data gathering may be expensive as other
to ensure his PC is clean in order to comply companies may have to be hired to get it
Benefits and Drawbacks of VPN
with VPN suppliers’ requirements
Benefits
IT ◾It may involve having to purchase equipment
🔵Offer a much higher level of secure Must Memorize such as data loggers/computers/printers
communication when compared to other
remote methods of communication Open-Source and Proprietary
◾Compared to indirect data sources using
direct data sources may be very expensive in
🔵Every file coming into a computer or going preparing and carrying out the gathering of
out from a computer is encrypted *Proprietary Formats* are used by data
manufacturer of software applications for their
🔵meaning no unwanted user will be able to applications only ◾Costs can be incurred in producing the paper
open the files for questionnaires
Proprietary software is software that is owned
by an individual or a company
🔵Can be used to work automatically as part of ◾ It takes longer to gather data than to acquire
(usually the one that developed it) data from an indirect data source
logging on
There are almost always major restrictions on ◾By the time the project is complete/all the
Drawbacks its use
🔴The company may not permit him to use data is collected the data may be out of date
other third party software on his computer in A software vendor delineates the specific
order to safeguard the integrity of their VPN ◾The sample size may be small.
terms of use in an end-user License
connection IT
agreement Must Memorize
🔴The use of mobile devices to initiate access Its source code is almost always kept secret RAM and ROM
to the virtual private network can cause
♣RAM stands for Random Access Memory ♣Computers deal with each input after a short 🔵It may allow a larger set of data to be
and ROM stands for Read Only delay/give examined using less time and money
Memory apparently immediate/real time responses than direct data collection would require.
♣RAM stores information for relatively short ♣The delay is caused by the computer 🔵It allows data to be gathered from subjects to
term/temporary usage by the accepting/dealing with other whom the data gatherer does not have
processors/CPU and other components such inputs physical access.
as the VGA ♣The delay may be so brief that it seems to 🔵A larger sample size can be used…
♣RAM is used by computers for storing data the user as if the
…direct data gathering could have limitations
during computing processes transaction has happened straight away
due to the availability of the
♣RAM is a volatile memory/data are destroyed ♣Interactive processing deals with one
people being interviewed…
once the power to the device transaction at a time
…using indirect data sources the sample could
is stopped ♣Once the transaction has taken place the
be increased giving rise to
♣RAM stores active program data database will be
greater confidence in the findings.
♣Large RAM chips can be read faster than updated immediately/same time as the
most ROMs… booking 🔵There is a relatively low cost as travelling
… so ROM content is sometimes copied to ♣The booking system takes a request for a expenses and time taken to collect data using
RAM and subsequently read seat and marks that a direct data source can be great.
from RAM seat as booked 🔵Information can be of a higher quality as
♣ROM cannot be changed/erased by a ♣The computer sends a message to the user data collected indirectly has
program/user/easily/can only be read to inform him/her the already been collated and grouped into
from seat has been booked meaningful categories.
♣RAM can be read from and written to ♣Because the database is updated 🔵Poorly written responses to questionnaires
♣RAM is needed to store data that the user is immediately it is impossible to have or interview transcripts do not
currently working on overbooking have to be read through to create the data
♣ROM is non-volatile memory/ROM retains its ♣Seats can be booked at any time of day or source
data even after the computer night
is turned off/ROM is needed to store the ♣Customers know immediately if they have Disadvantages
instructions for the computer to successfully booked a seat/get 🔴The various purposes for which data was
start up (when it is turned on again)/ immediate confirmation collected originally may be
permanent computer instructions ♣Customers are able to re-book immediately if different to the purpose of the current
♣ROM is used to store software that is unlikely they are unsuccessful first research…
to need frequent updates time …so unnecessary data may need to be filtered
♣ROM is needed to store boot up instructions out.
to activate hard disk drive/BIOS IT 🔴There may be no data available as the data
IT Must Memorize required has simply never been
Must Memorize recorded.
Indirect Data Sources
Interactive Processing Advantage 🔴There may be sampling bias as data from
only one section of the community may have
been collected (and data from a representative
cross section of the community may be the internet have their own VoIP
required). Disadvantages of the cloud ♦protocols and have no need for the WWW
🔴There may be coding difficulties… 🔴Data will be in the hands of a third-party so ♦The world wide web is accessed through
…as different sources being used means there security measures may be less browsers/users browsing
will be differences in the than required. IT
content. 🔴Cloud service providers can be transient, Must Memorize
…as there may be a lack of standardisation resulting in possible loss of data. TLS and SSL
across the data required. 🔴Cloud storage is only as reliable as the 🔷All the major web browsers currently in use
…as different sources will have different user’s internet connection.
amounts of data. support TLS.
🔴Some cloud service providers charge a
🔴If it has already been coded the coding may
be difficult to understand.
cheap fee initially but then raise 🔶SSL stands for Secure Socket Layer and
prices later. TLS stands for Transport Layer
🔴Indirect data sources may also vary in 🔴Users are at risk of not having their data Security
reliability, depending on who stored in compliance with
collected the data and how old the data are. government regulations if the physical storage 🔷TLS is the successor to SSL as SSL is being
location resides in a different phased out
country.
IT IT
Must Memorize 🔶TLS and SSL are protocols that provide
Must Memorize
security of communication in a network
Cloud Storage Internet Vs WWW
Advantages of the cloud ♦The internet is an international network of 🔷TLS/SSL are used in web browsing, email,
🔵The initial cost of an external hard disk networks of computers Internet faxing, instant messaging and Voice
drives can be more expensive than ♦The internet refers to the physical connection over IP/VoIP (at least two examples needed)
paying a low monthly fee for the cloud. between networks of computers
🔵Cloud storage has no physical presence/it ♦WWW makes use of hypertext to access the 🔶Client-server applications use TLS in a
does not take up valuable space various forms of information available on the network to try to prevent eavesdropping
at home or in the office. internet
🔵Cloud storage services back up data ♦The internet consists of hardware 🔷Encryption protocols enable credit card
automatically after initially being ♦The internet consists of computers, cables, payments to be made securely
instructed. routers, switches, repeaters
🔵Do not need to transport hard disk drive with ♦The internet is the physical layer on which a
🔶SSL/TLS requires a handshake to be carried
you if you want to transfer data to another number of protocols are in use to carry data all
out
computer/device. around the world
IT
🔵Syncing ensures files are automatically ♦The world wide web is only one of the
Must Memorize
updated across all devices owned services provided by the internet
by an individual. ♦Instant messaging uses the internet without Hard-Disk Drive and Magnetic Tape Drive
using the world wide web Evaluation based on:
♦IP Phones that are used to make calls over
Pie Chart network causes data transmission rates to be
Advantages 🍰They are harder to read than the slower in a WAN than a LAN.
🔵HDDs have faster data access speed than alternatives IT
magnetic tape drives . Must Memorize
◾The brain’s not very good at comparing the
Custom Written Vs Off-the-Shelf Software
🔵Quicker to make single file retrievals from size of angles.
backups / selective backups with 🔵Custom written software is specially
HDD than magnetic tape drives ◾Because there’s no scale reading accurate
values is difficult. developed for a specific
company/business.
🔵Tapes are more likely to go missing as they
are more portable ◾They become more difficult to read as more
segments and colours are 🔵Custom written software is written to
added. accommodate that customer's
🔵HDDs are cheaper to buy than magnetic particular preferences and needs/off the shelf
tape drives software has to be adapted to fit the business
◾Labels can be hard to fit especially to smaller
segments. that has purchased it.
IT
Disadvantages 🔴Off-the-shelf software may have several
Must Memorize
🔴Once the data is found, magnetic tape drives unnecessary features that the company may
have quicker data transfer rate than HDDs WAN not need/custom written software has only the
when reading data 🔘Wide Area Network features the user needs.

🔴HDDs tend to have shorter longevity 🔘A wide area network is formed by 🔵Custom written software is written by
compared to magnetic tape drives connecting a number of LANs through a router programmers to solve specific
or a modem. problems.
🔴HDDs have less storage capacity than
magnetic tape drives 🔘It covers a much larger geographical area 🔵Custom written software is owned by the
than a LAN. business that commissions it/off
🔴When further memory is required the shelf software means the business only
subsequently, it is more expensive to buy 🔘Private WANs can be set up by has a licence.
another HDD than to buy a new tape organisations to connect their LANs by the
means of leasing telephone lines... 🔴Off-the-shelf software is ready-written/ready
🔴HDDs are more prone to mechanical failure ...or private fibre optic cable purely for their for use and already exists/
than magnetic tape drives own use... there is often a delay between commissioning
...these can be Virtual Private Networks and receipt of custom written
🔴HDDs have higher power consumption than (VPNs). software.
magnetic tape drives
IT 🔘The use of an existing telecommunications 🔴Off-the-shelf software is available to all
Must Memorize
businesses and companies/general public not allowed for transactions less than a certain
just a specific company/business. amount. ♦Data items which are related in some way
can be checked for the consistency of their
🔵Custom written software means that support 🔳Chip and PIN is more reliable than reading relationship.
is available directly from magnetic stripe.
creators/off-the-shelf usually provide call ♦Checks fields to ensure data in these fields
centres which may not be able to 🔳Chip and PIN is quicker than typing in details correspond to each other.
solve problems specific to the business. from the card. IT
IT
Advantage of Primary Key
Input Devices at Checkouts 🔳Contactless card readers speed up ♣Creates an index so records can be found
🔲 Bar code reader is used to read bar codes transactions as no PIN is required. quickly.
IT
from the products.
♣Makes each record unique even if other
Safety Issues in IT Environment
🔲Number pad would be used to input the bar identifying fields are identical such as first
⬛Electric shock from spilling liquids on to name and family name.
code if the bar code was damaged and could computer wires/touching bare wires/
not be read by bar code reader. use a circuit breaker. ♣Enables a search to go to the record directly
⬛Do not bring food and drink near without having to search through preceding
🔲Number pad would be used in conjunction computers/Ensure wires are properly records so faster search.
with bar code reader for entering the number insulated.
of items with that bar code. ♣Enables relationships to be formed if a
⬛Fire from overloading power sockets. relational database is to be created.
🔲Entering number on number pad would be ⬛Use a multi-pin adaptor/use a circuit breaker. IT
quicker than scanning several identical bar
codes. Calculated Field
⬛Tripping over loose cables. ◾A field that derives its data from the
⬛Ensure cables are tied up/properly trunked. calculation of other fields.

🔳Chip and PIN reader to read details from ⬛Equipment falling and injuring someone. ◾It contains a formula.
customer’s bank card. ⬛Ensure equipment is not overhanging edge
of table/use sturdy tables. ◾The data are not entered into a calculated
IT field by the user.
🔳Contactless card reader to read details from
customer’s bank card. Consistency Check ◾It only contains data computed at run time.
♦A consistency check is a test performed to IT
🔳Chip and PIN reader more secure than determine if the data has any internal conflicts
contactless reader. . Reason to Protect Personal Data
♦Detects whether the value of two or more 🔑 Individuals who access someone’s personal
🔳In many countries contactless method is only data items are not in contradiction. data can retrieve login details and commit
identity theft. IEEE 801.11 Mbps when downloading/down streaming.
♠ A set of media access control (MAC) and
🔑Fraudsters can take a person's banking physical layer (PHY) specifications. ⚫Only from 16 to 640 Kbps upstream/upload
information and make unauthorised speed.
withdrawals and transfers. ♠Used to implement wireless local area IT
network (WLAN) computer communication. Must Memorize
🔑People who announce their holidays/when
♠Specifies an over-the-air interface between Advantage of Internet Awareness
they will not be home on social media can
leave themselves open to burglary. two wireless clients. 🔷 Discourages access to illegal, harmful or
inappropriate images or other content.
🔑Sharing personal information on social ♠Used in the 900 MHz and 2.4, 3.6, 5, and 60
GHz frequency bands. 🔷Teaches students to be aware that
networks, such as likes and dislikes about
politics, religion or their current job can hinder unauthorised access to personal information
♠Used in most home and office networks to can occur.
future job opportunities.
allow laptops, printers, and smartphones to
🔑Criminals can take business information
communicate with each other. 🔷Reduces the risk of being subject to
from people who run their business online and grooming by those with whom they make
♠Created and maintained by the Institute of contact on the internet.
create false email accounts and fake Electrical and Electronics
employee names. Engineers (IEEE) LAN/MAN Standards 🔷Discourages the sharing / distribution of
Committee (IEEE 802). personal images without an individual’s
🔑Credit card scams are on the rise when IT
people use their credit cards for online consent or knowledge.
Must Memorize
shopping credit card numbers and security
codes can be intercepted. ADSL 🔷Reduces inappropriate communication /
⚫Asymmetric digital subscriber line is a type contact with others, including strangers
🔑Home insurance or life insurance could be of DSL broadband communications technology .
denied if personal information about risky used for connecting to the internet. 🔷Encourages students to report cyber-bullying
behaviours that person, or their home, is by fellow students.
posted on social media sites. ⚫ADSL allows more data to be sent over
copper cable than existing telephone lines. 🔷Teaches students how to avoid unsuitable
🔑Criminals troll websites specifically looking video / internet games
for detailed medical information and use it to ⚫A micro filter is installed to allow both ADSL
gain personal medical attention for themselves and telephone services to be used at the same 🔷Teaches students how to evaluate the
or to sell to others, leading to the owners of time. quality, accuracy and relevance of information
that information being denied medical on the internet.
attention due to unpaid debt. ⚫ADSL requires a special ADSL modem.
IT 🔷Discourages plagiarism and copyright
⚫ADSL supports data rates of from 1.5 to 24 infringement.
➕Extranets allow companies to integrate 🔵Batches can be stored up during working
🔷Discourages illegal downloading of music or operations with external stakeholders. hours and then executed during the
video files… evening/weekend whenever the computer is
…giving rise to the potential for excessive use ➕Suppliers are able to communicate with the idle.
which may affect the social business. 🔵Batch processing is particularly useful for
and emotional development and learning of payroll as it requires the computer/peripheral
the student. ➕Customers can use it to place orders. device for an extended period of time.
IT 🔵Transaction file of hours worked is kept for
Extranet ➕Customers can access information such as later processing – weekly/monthly.
♌A website that allows controlled access to support information. 🔵Master file of workers’ details/rate of pay per
authorised users to an organisation's network hour is only updated weekly/monthly.
🔵Transaction file is used with master file to
♌Usually only allows access to a subset of the update
Examples (max 2 marks) of extranet use could IT
information on the organisation’s intranet
be:
✖ A company could provide access to a Adv. & Dis of Mental Model
♌Provides access to specific services without Advantages
supplier for online ordering, order tracking and
granting access to the organisation's entire
inventory management
network
✖A hospital providing local doctors with 🔵It is easier for the user to use a user
access to a booking system so they can make interface that matches his/her mental model
♌Usually operates within a VPN framework
appointments for their patients
✖Pupils could use the school’s intranet to 🔵It takes less time for a user to learn how to
♌Usually operates over a public use the interface.
submit work from home
telecommunications network.
✖Employees could use the company intranet
when working from home 🔵The interface is predictable for the user as it
➕Extranet is a means of extending an will match their requirements.
IT
organisation’s intranet for use by
Must Memorize
selected people (outside the organisation)/so 🔵The user will gain transferable skills so it will
that employees can work remotely Batch and Real Time in Pay-Roll System be easier to use other applications matching
🔵It is collecting the data and then processing the mental model.
➕If staff working outside the organisation can it in one go/all at once.
access an intranet by using a VPN this 🔵Jobs are set up so they can be run to
becomes an extranet completion without human interaction. Disadvantages
🔵The input data/hours worked are collected 🔴The range of definitions of what constitutes a
➕Extranet is set up by providing a secure into batches and each batch is processed as a mental model can cause confusion...
link/firewall to the intranet using the internet whole. ...possibly resulting in inaccurate results.
🔵Batch processing/payroll is run when the
computing resources are less busy. 🔴There is a lack of a clear methodology in the
use of mental models... will take less time to learn
... often leading to bias as it is based on the 🔴Printouts are transportable and can be
designer’s own interpretation of what the user viewed anywhere. 🔶A user interface that matches the user’s
is thinking out loud. mental model will be easy to use
🔴May skim over on-screen results, increasing
🔴Different designers observing the same the chance of errors being overlooked/on 🔷A user interface that matches the user’s
interaction may derive different mental models. paper text is more likely to be read mental model will provide the user with
thoroughly. transferable skills so«
🔴There is little research about how to design IT «another interface using similar ideas will be
to help the user create the best mental model. just as easy to use
Mental Model
🔴It can be difficult to match the user interface 🔶A user interface that matches the user’s
to a user's perception of the real world. mental model enables the user to
IT 🔶A mental model is based on belief not facts predict how to navigate the interface
Must Memorize
🔷A mental model is what the user will 🔷Training can be used to change a user’s
Printer VS Monitor describe in terms of what they need mental model to fit the design of the
Advantages:
interface
🔶The designer must produce a user interface
🔵Will not have to spend money on buying a which reflects the user’s line of thought #It
printer.
🔷It is a model of what users know/think they
🔵Results are produced (almost) instantly. know about a system

🔵Graphs tend to more accurately represented. 🔶Users create mental models very quickly, IT
often before they even use the software or
Batch and Real time processing
🔵Easier to scroll through a table of results device
than look through several printouts.
🔷Users’ mental models come from their prior
🔵 Batch processing would be used if you had
experience with similar software or devices
Disadvantages collected a very large amount of data offline
and need to now process it all in one go
🔶If the designers of the user interface do not
🔴Difficult to compare graphs of results day by take the user’s mental model into account then 🔵 Transaction file of hours worked is kept
day. it is highly likely that it will be hard to learn and
use
🔴It is often easier to print off results and use a 🔵 Master file of workers details/rate of pay per
hour
pen to annotate the results than using 🔷A user interface that matches the user’s
software mental model will be easy to learn/it
🔵 Transaction file is used with master file to 🔴Controlling rockets often involves the use of
update master file/produce sensors and control systems Similarities
payslips 🔴Web authoring software and presentation
🔴A computer system used for real-time software can both be used to manipulate text
🔵 Jobs are set up so they can be run to processing is often used 24 hours a and graphics
completion without human interaction day for the same task
🔴Web authoring software and presentation
🔵 The input data are collected into batches 🔴Real-time data processing gives the software can both be used to create and
and each batch is processed as a scientists the ability to take immediate format tables
whole action for those times when acting within
seconds is significant 🔴Web authoring software and presentation
🔵 Batch processing can occur when the software can both be used to include
computing resources are less busy 🔴If a rocket is off course for just a short period video/animations
of time its speed is such it
🔵 Batches can be stored up during working would be off course by a large distance 🔴Web authoring software and presentation
hours and then executed during software can both be used to
the evening/whenever the computer is idle 🔴If the rocket veers off course the computer include sound
would immediately fire engines to correct it.
🔵 Batch processing is particularly useful for 🔴Both often provide spelling and grammar
operations that require the Real-time processing requires/batch checkers and a thesaurus
computer or a peripheral device for an processing does not require constant use of
extended period of time the computer when it might be needed for
other tasks. Differences
Real-time processing requires immediate 🔵With presentation can know exactly which
🔴Real-time processing would be suitable for processing of data which is unnecessary with parents have been informed
controlling the rockets payroll.
Hours worked would only be known at the end 🔵With web pages have to pay for an ISP
🔴Real-time processing causes a response of each day so there is no point in using real-
time processing. 🔵You may have to pay extra to host a website
within specified time constraints
The payroll only needs to be run at the end of
the week/month so real-time processing is
🔴Real-time responses are in the order of unnecessary. 🔵Less information on a slide than a web page
milliseconds, and sometimes Real-time processing does not usually involve
microseconds the processing of large volumes of data such 🔵With web pages parents can respond
as running a whole company’s interactively
🔴Real-time means that the inputs are payroll.
processed and produce an output IT 🔵Fewer skills needed to produce a
which in turn affects the input presentation
Web pages versus presentation
IT Reasons why people do not use the internet 🔴Many people prefer to read hard copies of
newspapers as they can take a
Web pages versus DTP/WP
🔴Some may be reluctant to send emails newspaper with them and read it any
because of malware, speed of reply, IT
Similarities
impersonal nature
🔵Web authoring software and DTP/WP Forward and Backward Chaining
software can be used to manipulate
🔴People may not want their children to use 🔵Forward chaining starts with the available
text and graphics data and uses inference rules to
the internet ...
... because of eSafety ... extract more data ...
🔵Web authoring and DTP/WP software can be ... because children could become addicted ... until a goal is reached
used to create and format tables and not do their school work 🔵An inference engine using forward chaining
searches the inference rules until it finds one
🔵Web authoring and DTP/WP software often 🔴Those that do not use the internet may be where the IF statement is known to be true
provide spelling and grammar people and regions that do not have access to 🔵When such a rule is found, the inference
checkers and a thesaurus aspects of modern technology or those that engine uses the ‘Then’ part to cause
have restricted the addition of new information
🔵Inference engines will iterate through this
Differences
🔴 people who live in rural areas/people who process until a goal is reached
are uneducated/people who are 🔵Because the data entered determines which
🔴You can use video/animations in web pages poor/people who are older who do not wish to rules are selected and used, this method is
learn how to use it called data-driven
🔴You can have sound on web pages
🔴Some people might prefer face-to-face 🔴Backward chaining starts with a list of
🔴Ink/paper is more expensive than web pages contact rather than impersonal communication goals/hypotheses and works backwards
methods 🔴An inference engine using backward
🔴Web pages easier/less costly to update chaining would search the inference
🔴Some people may be unable to use the rules until it finds one which has a THEN part
🔴Cannot be sure everybody would see internet because they have lower performance that matches a desired goal
website/can deliver newsletter to every computers 🔴If the IF part of that rule is known to be true,
home then it is added to the list of goals
🔴lower-speed wireless connections … 🔴Because the list of goals determines which
🔴Producing web pages would take longer 🔴lower-priced connections such as dial-up rules are selected and used, this
than producing a DTP/WP document …🔴limited access to subscription-based method is called goal-driven
content IT
🔴You have to pay for an ISP 🔴Smaller, traditional companies may be Must Memorize
reluctant because of cost/security Sampling Resolution
🔴You may have to pay extra to host a website issues
IT
🔴These values are all per channel
Sampling Resolution: 🔴For stereo audio two channels are needed 🔵Saves the cost of hiring a venue for a
🔴This doubles the sampling and memory meeting
🔴The number of bits used to carry the data in requirements
each samples of sound usually, 8
🔴The higher the sample resolution, the more 🔵When vital workers in a business have to
or 16 bits travel, the business is left
accurate the representation of the
level of each sample but more memory is short- handed, possibly for days
🔴Decreasing sound sample resolution results required to store each sample 🔵Flight cancellations, airport delays, traffic
in lower quality IT jams will no longer be reasons or
excuses for missing meetings and conferences
🔴It can reduce file size and save storage Video Conference in Real World 🔵Can increase productivity as a worker who
space Legislators has a sick child, for example,
Two from: may be able to hold an important meeting
🔴Sampling resolution is the number of bits per 🔲Local government representatives would no even if they have to stay home for
sound sample longer have to attend a meeting far from their the day
home leading to savings in travel expenses 🔵Workers can easily share a word-processed
🔴Sampling resolution is the maximum document / spreadsheet with a
accuracy of each measurement taken of a 🔲Representatives can take part in and manager
wave form when creating an audio file observe a meeting happening in more 🔵Much less personal interaction
than one location
🔴The higher the sampling resolution the more
accurately the wave form will be converted 🔲Problems with video transmissions could
from analogue to digital lead to misunderstandings / delays in passing Television news presenters
laws Two from:
🔴The higher the sampling resolution the • Can hold discussions with more than one
greater the size of the file 🔲Saves the task of booking a room for a person who normally would
meeting not travel just for an interview
🔴Digital audio is normally found in 8 bit or 16 • Can speak with correspondents based in
bit resolutions different countries
simultaneously
Business people • Do not have to wait for eye-witnesses to
Two from: travel to the to centre
🔴16-bit resolution is the standard for compact
🔵Do not have to pay for air / train tickets / car • Presenters do not have to travel to
disc audio and newer sound
running costs to meet with dangerous areas
cards
customers • Interviewees do not have to travel and risk
🔴Each sample can take one of 65 536 arrest / terrorists / attack.
different values «
« more than any human can readily discern 🔵Do not have to pay for hotel accommodation IT
to meet with customers Referential integrity
🔴Every foreign key value has a matching and / or public keys the session «
value in the corresponding primary key ⚫« symmetric encryption for the main
⚫scrambles data so that only the key holder conversation.
🔵Referential integrity uses these to prevent can decrypt / understand it IT
the deletion of related records ⚫data remains encrypted throughout Must Memorize
transmission and is only decrypted at
Static and Dynamic Parameter Query
🔴It can alert if the user tries to delete a record the destination computer
🔴Static parameter query is a query that is
which is related to another one
fixed
⚫It can use IPsec Internet Protocol Security
🔵 A dynamic parameter query can be used to
🔵Queries will begin to fail if the relationships ⚫is a network protocol suite that encrypts
search for different values each
do not match packets of data sent over a
time it is run
network
🔴In a static query every time that the query is
🔴If a table is relying on the keys in another ⚫protects data flows between a pair of hosts
run it will search for the same
table, then relationships between the two can (host-to-host)
data
be lost if bad data is entered into one location
🔴If different data is to be searched for the
⚫ It uses a firewall which (monitors and)
user would need to open up the
🔵Referential integrity can be used to ensure controls the incoming and outgoing network
query in design view and change the data in
foreign key values are valid. traffic
the criteria to that required
🔴Prevents the entry of duplicate data ⚫establishes a barrier between a trusted,
🔵With a dynamic parameter query you can
🔵Prevents records being added to a related secure internal network and
type in different data each time
table if there is no associated another outside network or computer
record in the primary table 🔵Every time the query is run a dialogue box
🔴Prevents the changing of values in a primary ⚫It uses authentication, authorization, and
appears asking the user to type in
table that result in orphaned accounting / AAA «
the data required
records in a related table 🔵This would save the time of designing the
🔵Prevents the deletion of records from a ⚫AAA server is a program that handles user
query every time different data is
primary table if there are matching requests for access to
required
related records. computer resources «
IT 🔵Dynamic parameter query requires less
Must Memorize ⚫AAA server typically interacts with network
technical knowledge of the user
access and gateway servers /
How VPN Works with databases and directories containing user
⚫This process is called tunnelling as it uses a IT
information
secure means to tunnel through a publicly Codecs
accessible network ⚫It can use TLS / SSL « 🔴This type of encoding is used to reduce the
⚫« uses asymmetric encryption to establish size of audio and video files
⚫It uses encryption involves the use of private
Trojan Horse: 🔴Some applications that contain adware track
🔵Encoded media file is sometimes similar in 🔵A Trojan Horse is generally a non-self- the user’s internet surfing habits
quality to the original but has much smaller file replicating program containing in order to serve ads related to them
size « malicious code that, when executed, carries
🔴« however, video compression can be lossy out actions, typically causing loss of data Rootkits:
« 🔵A rootkit is a type of software designed to
🔵Malicious programs are classified as Trojans hide the fact that an operating
🔴the compressed video lacks some if they do not attempt to inject themselves into system has been compromised ...
information present in the original other files … sometimes by replacing vital executables
video
Worm: 🔵Rootkits allow viruses and malware to ‘hide
🔴decompressed video has lower quality than 🔴A worm is a computer program that in plain sight’ by disguising as
the original as there is replicates itself in order to spread to other necessary files that anti-virus software will
insufficient information to accurately computers overlook
reconstruct the original video
🔴It uses a computer network to spread itself 🔵Rootkits themselves are not harmful – they
🔴Each audio and video file format has a are simply used to hide malware,
corresponding coder-decoder / codec program 🔴Unlike a computer virus, it does not need to bots and worms
attach itself to an existing
🔴The codec is used to code it into the program Malicious Bots:
appropriate format and then decodes for 🔴Malicious bots are self-propagating malware
playback Spyware: designed to infect a host and connect back to
🔵Spyware is software that aids in gathering a central server or servers
🔴Encoding involves the use of a code to information about a person or organisation 🔴The servers act as a command and control
change original data into a form that can be without their knowledge (C&C) centre for an entire network
used by an external process of compromised devices
🔵It may send such information to another 🔴Hackers can launch flood-type attacks
🔴Encoding / decoding often refers to the entity without the consumer’s consent, asserts against their target(s)
process of analogue-to-digital / digital to- control over a computer without the 🔴In addition to the worm-like ability to self-
analogue conversion consumer’s knowledge propagate, bots can act as spyware

🔴Can apply to images, audio, video, signals 🔵It detects key presses of the computer user Ransomware:
from sensors / control systems. 🔵Ransomware is a type of malware which
IT Adware: restricts access to the computer system that it
Must Memorize 🔴Adware is a form of spyware that collects infects
information about the user in order
Virus Types to display advertisements in the web browser 🔵It demands a ransom paid to the creator(s)
of the malware in order for the restriction to be
removed 🔴Producing presentation would take longer 🔵A flat file database consists of a single table
than producing a DTP/WP document
🔵Some forms of ransomware encrypt files on IT 🔵A flat file database can contain many fields,
the system’s hard drive often with duplicate data
IT Word processor (WP) versus desktop
publishing package (DTP)
Presentation versus DTP/WP Similarities 🔵When data is merged between two flat files
🔵DTP software and WP software can both be relevant data needs to be copied and pasted
Similarities from one file to the other
used to manipulate text and graphics
🔵Presentation software and DTP/WP software 🔵DTP software and WP software can both be
can both be used to manipulate text and 🔵If there are two or more flat files containing
used to create and format tables
the same fields, if data in one is changed the
graphics 🔵Both often provide spelling and grammar other has to be manually modified
checkers and a thesaurus
🔵Presentation software and DTP/WP software Differences
🔵Designing flat file databases is simple and
can both be used to create and format tables 🔴DTP software includes the key elements requires little design knowledge
involved in producing these
🔵Presentation software and DTP/WP software products ...
often provide spelling and grammar checkers 🔴Designing a relational database takes more
... such as typesetting, page layout and
and a thesaurus planning than flat file databases
graphic design
🔴DTP software is a little more difficult to use
🔵With flat files information can be added as
than regular word processing
Differences necessary
software because there are so many different
🔴You can use video/animations in options to consider
🔴A relational database incorporates a number
presentations 🔴DTP is used by graphic designers
of tables with methods for the tables to work
🔴Arrangement of the text on the word
🔴You can have sound in presentation processing page is largely linear
together
🔴Word processing has few options to set text 🔴Building a relational database is dependent
🔴Ink/paper is more expensive than slideshow precisely where the user want
presentation (if the slides are not printed) upon the ability to establish a
🔴DTP packages have a wider selection of relational model ...
import and output options for various ... which must fully describe how the data is
🔴Presentation easier/less costly to update (if forms of content organised, in terms of data
the slides are not printed) 🔴DTP packages are better able to combine structure, integrity, querying, manipulation and
text and graphics in a single storage
🔴Cannot be sure everybody would see document
presentation/can deliver newsletter to IT
every home/might have presentation at an
Flat-File and Relational 🔴Relational databases allow defining of
inconvenient time for some parents
certain record fields as keys to perform
search queries, join table records and
establish integrity constraints 🔴Only display information the user needs to exam scores in spreadsheet
perform the current
🔴Table records can be easily joined by the operation 🔵Repeated data such as names or classes
indexed values can be easier to enter using spreadsheet
🔵limiting the information to that necessary for software
the user
🔴Integrity constraints can be established to 🔵Charts to show student progress are easier
ensure that table relationships are 🔴Which controls will be required: to produce using spreadsheets
valid. buttons, checkboxes, radio buttons, dropdown
IT lists, list boxes, toggles, date field
Drawbacks of spreadsheets
User Interface Design
🔴As work gets more complex, such as an
🔵How colour is to be used, which colour
🔵Which navigational aids will be required such increase in the number of students,
combination is most suitable/which colours spreadsheets become more difficult to change
as breadcrumb,
would make it easier to read and manage
forward/backward buttons, end of file button
IT
🔴The layout of the screen, such as: 🔴Spreadsheets are good for creating one-time
Spreadsheet for School Records analysis such as exam scores
◾ positioning of elements to emphasise Benefits of spreadsheets for one year, but become problematic as the
importance data grows and evolves over
🔵The amount of learning required by the time
◾positioning of elements to ensure readability/ principal to use spreadsheets is not as
much as that for databases ... 🔴As new rows and columns are added for
◾ layout needs to look
extra scores and students, ranges
organised/ 🔵it’s easier to use spreadsheets and get and formulas may need to be modified or new
solutions straight away ones created
◾grouping of similar items
IT
🔵Spreadsheets are easier to use to store
🔵Increase of font size to: student data/perform numerical Benefits of Database
emphasise the importance of certain calculations on exam scores/format Benefits of databases
elements/to cells/adjust layouts to generate output
ensure readability of information and reports 🔵Data structure and normalisation are
available through multiple tables
🔵Easier to create complex formulae such as
reduction in font size to conserve space
exam scores per teaching group in 🔵Data and referential integrity is inbuilt
spreadsheets
to suit the age of the audience 🔵Queries and reports on student
🔵Easier to use functions to calculate average progress/exam score trends are easier to
create with databases roads access easily
🔵Meetings can be called at short notice 🔴Difficult to allow doctors to answer in turn
Drawbacks of databases saving doctors time in preparation for a 🔴Might be difficult to see all doctors to see
🔴They take more skill and training for the meeting who is contributing
principal to use well 🔵It is more environmentally friendly as less 🔴Doctors may be put off by the camera, as
car movement is needed many people are self-conscious
🔴Structuring the information so it's easy to 🔵It makes it easier for the doctors who do not when being videoed
edit, query, view, and report can be work in the hospital to liaise 🔴Doctors away from the hospital may incur
difficult for the principal (if normalisation is when necessary/allows hospital doctors to costs due to obtaining video
employed) share new treatments with other conferencing equipment
doctors IT
🔴Creating a database is more complicated for 🔵Hospital doctors can demonstrate
the principal than just entering data in the cells procedures/treatments to other doctors Utility Software
of a spreadsheet
🔵A program that helps perform maintenance
🔴It is not as easy to copy and paste blocks of Drawbacks in a computer system
data 🔴Confidential documents may need to be
IT seen in their original form by both 🔵A program that performs a very specific task
sets of doctors usually related to managing system resources
Doctors and Video Conference.
Benefits 🔴There can be poor quality of the video
because of bandwidth problems 🔵Operating systems can contain a number of
🔵Both groups of doctors will not waste time utilities for managing files and storage devices
travelling to a conference/meeting 🔴Lack of bandwidth can lead to problems with
time lag IT
with each other
🔵Both groups of doctors will save expense of 🔴Not all countries have sufficient bandwidth to Advantages and Disadvantages of Networking
travelling to a conference/meeting support video conferencing Advantages
with each other 🔴Interruption to, or breakdowns of, the 🔵Easier for workers to share work/files in
🔵All doctors will save time by not staying transmission can occur projects
overnight 🔴Power cuts/outages are common in some
🔵Doctors less likely to be fatigued if they have countries, leading to breakdown of 🔵Can access work from any computer
not had to travel long distances transmission
so able to perform better at the meeting 🔴Both sets of doctors may be concerned that 🔵Easier for network manager to roll out new
🔵Saves doctors time printing out large hackers may attempt to hack into software
amounts of documents the video conference
🔵Doctors are less likely to misplace 🔴Hackers could gain access to patient details 🔵Easier for managers to monitor workers'
documents as electronic documents can be 🔴Some video conferences do not have a progress
viewed online password/you can just dial into a
🔵It is safer as accidents can happen on the video conference so hackers could gain 🔵Peripherals can be shared so fewer needed,
leading to lower cost in the 🔲Accounting information systems for ... requires processing power and memory for
future. accounting functions encryption
🔲Human resource management
🔵Company can have an intranet for workers systems/systems used for personnel aspects 🔴HTTPS introduces latencies/delays
to access of an organisation/storing records/information
about employees 🔴SSL connections take longer to set up with
🔵If a server is used workers do not need to 🔲Office automation systems automate more roundtrips
worry about making backups workflow, eliminating bottlenecks
🔲School Information Management Systems 🔴Browser caching does not work properly
Disadvantages cover school administration
🔴A server may be required to cope with extra IT 🔴Modern sites will run slowly without browser
computers, so more expensive Must Memorize caching

🔴Extra network points/cabling may be Advantages and Disadvantages of HTTPS


🔴Need to buy an SSL certificate issued by
needed, which leads to more cost Advantages of https
certificate authorities
🔵Messages can’t be read by any third-party
🔴If the server breaks down company projects 🔴It is possible to make your own certificate
might become inaccessible 🔵A certificate guarantees the information a but other users will not trust it so you need to
browser is receiving originates at buy one
🔴Viruses are easier to transmit from one the expected domain
computer to another. 🔴Warnings can arise that despite using SSL a
🔵It’s a guarantee that when a user sends web page is partially serving insecure content
🔴Easier for disgruntled employees to hack sensitive data, it’s being sent to the
right place, and not to a malicious third party
into colleagues' work 🔴The browser may not want users to think a
site is totally secure but warning can be off-
🔴A network manager/administrator may need 🔵HTTPS connections make man-in-the-middle putting to many users
to be employed, leading to extra attacks much more difficult to execute
costs 🔴There are proxy caching problems
IT 🔵Search engines list HTTPS websites higher
than sites without HTTPS
MIS Tools 🔴Everything is encrypted including packet
🔲Executive information systems/a reporting headers and content
🔵The green padlock indicates that your site
tool that provides quick access to provider takes security seriously and this gives
summarised reports coming from all 🔴Any caching that might have happened
users confidence
departments between the points at which data is encrypted
🔲Marketing Information Systems/systems and decrypted is blocked
Disadvantages of https
IT
designed specifically for managing
the marketing aspects of the business 🔴HTTPS uses a lot of server resources ... Intranet
🔵A private computer network used within one Types of Database Keys combination of columns guarantees
organisation ♣A primary key: uniqueness, though individually uniqueness is
not guaranteed. Hence, they are combined to
🔵Can only be accessed by workers within the is a field in a table which is unique and uniquely identify records in a table.
organisation/ restricted access enables you to identify
network every record in that table. The difference between compound and the
composite key is that any part of the
🔵Users tend to need user ids and passwords compound key can be a foreign key, but the
♣ A foreign key: composite key may or maybe not a part of the
to prevent outsiders using the intranet
foreign key.
is used to link tables together and create a IT
🔵Based on internet technologies/TCP/IP relationship / it is a
protocols field in one table that is linked to the primary Driving Simulations
key in another table. Advantages:
🔵There is a client-server relationship set up 🔵Driving schools can test all aspects of
between computers and the driving without worrying about damaging an
servers ♣ A compound key: expensive car

🔵Used to share information/send emails within is a primary key that combines more than one 🔵Can provide results that are generally
the organisation foreign key to make a unique value. difficult to measure such as reaction times

🔵Tends to be a LAN 🔵Computer simulation can allow you to see


♣COMPOUND KEY: how a system might respond before you
🔵Has greater security/less susceptible to design or modify it avoiding mistakes
hackers/viruses than the internet has two or more attributes that allow you to
uniquely recognize a specific record. It is 🔵It is safer to use a model and simulation for
🔵Intranets have web pages about company possible that each column may not be unique car driving
events, health and safety policies by itself within the database. However, when
and staff newsletters combined with the other column or columns 🔵Can be slowed down to study behaviour
the combination of composite keys become more closely
unique. The purpose of the compound key in
🔵Contains forms for workers to complete such
database is to uniquely identify each record in
as claiming expenses/requesting 🔵Is easier to create a simulation of a critical
the table
holidays event rather than waiting for it to happen in
real life
♣COMPOSITE KEY:
🔵Is easier to create a simulation of different
is a combination of two or more columns that driving conditions rather than waiting for it to
IT happen in real life
uniquely identify rows in a table. The
Must Memorize
just upgrade the server
.
IT 🔵Easier for users to access the server in a
Disadvantages: client-server network using
System software & Application software
🔴Sometimes there is not sufficient data to alternative devices
produce a mathematical model 🔵 System software is a type of computer
program that is designed to run a computer’s
🔘Disadvantages
hardware and application programs
🔴Sometimes it is impossible to create
simulations that can accurately predict
Examples are 🔴A specialist network operating system is
the occurrence / effects of human behaviour needed
utilities,
operating systems,
🔴The formula and functions that are used may compilers, interpreters, assemblers, 🔴The server is expensive to purchase
not provide an accurate description of the linkers and device drivers.
system resulting in inaccurate output from the
simulation 🔴Specialist staff such as a network manager
🔴 Application software is a program or group is needed
🔴Sometimes simulations can require the use of programs that is designed for the end user
of a computer system with a fast
processor and large amounts of memory which Examples are 🔴If any part of the network fails a lot of
are very expensive database programs, word processors, disruption can occur
web browsers and spreadsheets IT
🔴May give drivers a false sense of security IT
regarding their ability to drive. HDD Vs SDD
IT Client-Server Network: advantages and
disadvantages
Sampling Rate 🔘Advantage *Advantages*
Sampling Rate:
🔵All files are stored in a central location 🔵 Hard disks tend to have *higher storage*
🔵The frequency at which sound samples are Network peripherals are controlled centrally capacities than SSDs
taken in a given period of time.
🔵Backups and network security is controlled 🔵 Hard disk drives still *cost less* per
🔵 There is a minimum rate at which it should centrally gigabyte than SSDs
be taken in order to faithfully reproduce the
original signal 🔵 Users can access shared data which is 🔵 HDDs *last longer* than SSDs the NAND
centrally controlled flash used in SSDs can only be used for a
🔵 Decreasing sampling rate can lead to finite number of writes
distortion of the original 🔵Upgrading the network is easier with a client-
server network as it is easier to 🔵 The choice and availability of SSDs is still
limited 🔴OCR is cheaper than paying someone to
🔹Signature Based Detection manually enter large amounts of text
🔸Heuristic Based Detection
*Disadvantages* 🔹Behavioural Based Detection 🔴OCR can allow documents to be made
🔸Sandbox Based Detection editable MICR does not
🔴Hard Disk Drives are *more susceptible to
shock and damage* as they consist of various
#It 🔴OCR – all documents need to be checked
moving parts over carefully and then manually
IT
corrected
🔴SSDs have *faster data* transfer rate MICR and OCR
🔵 MICR characters are readable even if a 🔴OCR – not 100% accurate, there are likely to
🔴SSDs have *quicker boot ups* document is obscured by marks or be some mistakes made during
overprinted reading...
🔴 can have almost *instantaneous data ...such as 1 and I, O and 0
access* 🔵 MICR systems provide a high level of IT
security since MICR documents are difficult to
Hierarchical Database Management System
🔴HDDs data access speed is dependent on forge
how close the data is to the
read/write heads 🔵 The error rate for reading MICR characters ⬛Uses several one-to-many relationships
is small as compared to other character
🔴while all parts of the SSD can be accessed recognition systems ⬛Uses a tree structure
at once
🔵 Printing of MICR is demanding, requiring ⬛Links a number of records to one owner or
🔴SSDs use significantly *less power* at peak difficult-to-achieve standards which causes it parent primary record
load than hard drives to be slower to print
⬛It is not a versatile system
🔴SSD's energy efficiency can deliver *longer 🔵 MICR readers are expensive to purchase
battery life* in laptops ⬛It is limited by using only one type of
🔵 Capable of recognising only MICR fonts relationship (so is confined to some
🔴With no moving parts SSDs run at near written in a specific format very specific uses)
*silent IT
🔵 MICR printers run on cartridges that cost far Must Memorize
#It more than other toner cartridges Indexed Sequential Access
⬛A Allows records to be accessed either
IT 🔴OCR is much faster than someone manually sequentially in the order they were
Types of Viruses Detection: entering large amounts of text entered or randomly using an index
⬛Each index defines a different ordering of the OD, so appropriate for server backup. 🔴Allows organisations to communicate with
records each other
🔶MT are cheaper per unit memory, so its
⬛A database may have several indexes, viable for large companies with storing lots of 🔵 Normally consists of LANs that may be
based on the information required data. remote from each other...
...such as different branches of an
⬛A key is specified in each index 🔶MT are more portable than OD organisation

⬛It is a method of indexing data for fast 🔶Both last longer than the technology that 🔴It enables organisations to communicate
retrieval reads them. over a large area

⬛Data is organised into records which consist 🔶MT is less susceptible to damage than OD 🔵 It is cheaper than creating a conventional
of fixed length fields during handling as it is completely encased. WAN

⬛A set of hash tables known as indexes 🔷Optical disks are more viable where there 🔴The security used consists of firewalls,
contain "pointers" into the records are large variations of encryption, the use of IP security
temperature.
⬛Individual records can be retrieved without
having to search the entire file 🔵To enable organisations to communicate
over a large area securely
IT
⬛Indexes can be searched quickly, thereby
allowing the database to access only Virtual Private Networks VPNs 🔴To enable employees to transmit data
the records it needs 🔵 Vpn is a virtual private network securely

⬛Searches use an index which will narrow 🔴It is not a physical network 🔵To enable employees to access the
down the records/data to be searched company’s computer network remotely /
from home securely
🔵 It is made using internet and other WANs to
⬛Then that section of the file is searched transmit data
sequentially to find the record required. 🔴To restrict which external users are able to
use the company’s network
🔴The data remains encrypted throughout the
IT
transmission and only decrypted at the
Must Memorize
destination computer 🔵To restrict the resources the external user is
permitted to use.
Magnetic Tape & Optical Disks
🔵 The process is called tunnelling as it uses a IT
secure mean to tunnel through a publicly Must Memorize
Advantages Of Magnetic Tapes. accessed network
🔶A single MT stores more data than a single Uses of Technology to Monitor Employees
** Function of Operating Systems
🔵Allocating Memory To Software 🔵 Writing HTML would take much longer/it
Employer drawbacks: saves time when, it comes to
🔵 Sending Data and Instructions to output creating content/establishing the
🔵 Software is expensive to purchase devices layout/graphical elements of the page.

🔵 System is expensive to set up 🔵 Responding to input devices such as when disadvantage


a key is pressed
🔵 Can lend itself to lawsuits for infringement 🔴It limits the user’s options as a designer
of privacy 🔵 Opening and closing files on storage Such programs rely on templates with limited
devices options for the look and feel of the site
🔵 Can make employees resentful (and less
productive) of infringement of 🔵 Giving each running task a fair share of 🔴 Depending on the type of software, user
privacy processor time may not be able to implement video
🔵 Mistrust of their employer or other common web-design elements
🔵 Sending error messages or status
messages to applications or users 🔴Software may make user completely reliant
Employee benefits: on it «
🔵 Dealing with logons and security. ... if the program suddenly becomes
🔴Security measure for employee safety IT
unavailable for some reason user cannot
create a website
Must Memorize
🔴Provides employer with detailed snapshots
of how an employee is going Advantage of Web authoring software 🔴Knowledge of HTML means web pages can
Advantage be designed regardless of what
software is available/only needs a simple text
🔵 Do not have to spend time learning editor.
Employee drawbacks: HTML/do not have to be an expert/have IT
much experience/many skills to make a fully
Normalisation
🔵 Allows employers to monitor without functional website
🔴First Normal Form (1NF):
the employees' knowledge
🔵Most web authoring packages involve
The relation has a Primary Key, which
🔵 Messages sent can be subject to basically pointing and clicking to
uniquely identifies each row in the relation.
monitoring by employer create a web page rather than typing in
Every column stores Atomic Values, and there
IT instructions
are no Repeating Groups.
Atomic means the column only stores one
Information is data which has been processed 🔵 It is more difficult to, remember the various thing. A column called, Full Name, which
within a context in order to give it meaning HTML codes for creating web stores the customer’s first & last name is not
IT pages atomic. You should have 2 atomic columns,
one for First Name, and another for Last Transitive Functional Dependency is when a Disk encryption: Advantages & Disadvantages
Name. Columns storing comma-separated non-key column is Functionally Dependent on
values are also non-atomic. another non-key column, which is Functionally Advantages
Dependent on the Primary Key. 🔵Files encrypted by one user cannot be
opened by another user if they do not possess
If you’ve ever seen Suppose your Employees table has appropriate permissions
Phone1, Phone2, and Phone3 StateCode, a CHAR(2) column that stores the
in your Customers table (each phone column state the employee lives in. The StateCode 🔵 After encryption a file remains encrypted
more sparse than the prior), then this table column is not part of the Employees table regardless of where it is moved
contains a Repeating Group. Primary Key. Suppose this table also has Encryption can be used on any files including
columns describing the state, such as the full executable files
state name, and information about the state’s Users with permission to decrypt a file are able
🔵Second Normal Form (2NF): geography. Any columns describing the state, to work with the file without
beyond StateCode, are Transitively Dependent experiencing any restrictions/difficulties
The relation meets 1NF, and there are No on the Primary Key (via StateCode), and Other users receive a restricted access
Partial Functional Dependencies. That is, each should be removed from the Employees table notification when they attempt to
non-key attribute is Functionally Dependent on and added to the States table. access the encrypted file
the full Primary Key. For a Partial Functional A common saying people use to remember the
Dependency to occur, the Primary Key must first 3 normal forms is, Disadvantages
be a Composite Primary Key. A Composite If the password is lost or reset it becomes
Primary Key is a Primary Key that consists of impossible to gain access to files
2 or more columns. “Every non-key attribute must provide a fact on the drive
about the key (1NF), the whole key (2NF), and If the operating system fails it becomes
Suppose your Orderliness table has a nothing but the key (3NF).” impossible to gain access to files
Composite Primary Key of Order ID + Product If the operating system has to be reinstalled it
ID. Any other columns in this table that IT becomes impossible to gain
describe Products are only Functionally Internet access to files...
Dependent on the Product ID, and have ...data can be lost irreversibly
🔵It is the global system of interconnected
nothing to do with the Order ID. These IT
computer networks
columns are Partially Functionally Dependent
on the Primary Key, and should be removed Disadvantage of Encryption
from the Orderliness table and placed in the 🔴It uses the Internet protocol suite (TCP/IP) to 🔳If the encryption key is lost the data is
Products table. link devices effectively lost

🔵It is a network of networks linked by an array 🔲Encrypting data and creating the keys
🔴Third Normal Form (3NF): of electronic, wireless, and optical networking necessary to encrypt and decrypt the
technologies. data requires expensive systems
The relation meets 2NF, and there are No IT
Transitive Functional Dependencies. A Must Memorize 🔳Public key encryption is based on
complicated mathematics so computers 🔵Conditional formatting allows you to highlight database) into a spreadsheet
have to work very hard to both encrypt and certain values that match specific criteria
decrypt data using the system making such 🔷Data can be entered more accurately
systems *very slow* 🔴Graphs/charts to detect trends. because of computer-based validation
IT and verification
🔳Many systems use a third party to certify the
reliability of public keys and if Uses of spreadsheet models for Financial
the certification authority is compromised, the Model Drawbacks:
criminal that did it could issue 🔴You cannot account for every possible
false certificates fooling people into sending Benefits: variable in a financial model
data 🔶Calculations can be performed more
quickly/more easily/recalculated automatically 🔴Banks cannot model exactly how much
🔲Users can have a false sense of security money they think people will save or
forgetting that once the data is 🔴What if statements can be asked without borrow
decrypted it becomes vulnerable to attack rebuilding a model from scratch each time the
again test is carried out 🔴There is no way of predicting the effect that
IT financial crises will have on real
🔷Models provide quick answers to events that life behaviour
Spreadsheet Model for Situations
may take months to actually happen
**
🔴Many variables need to be considered and it
🔶Graphs that are produced to help
🔴Absolute and relative cell referencing makes is easy to omit some
understand the result will automatically
sure you only increment the parts of a formula
change (as new values are added/old values 🔴Some situations will need purpose-built
you need to
altered) software/technical expertise which is
🔵Cell protection makes sure that the cells you expensive to buy.
🔷Graphs can be produced automatically/more IT
want do not change by accident
quickly/no manual method
required Control-Systems
🔴User interface forms makes it easier to input 🔴 Computer controlled production lines using
values into the model 🔶They provide consistent results/not affected robots instead of humans has
by user's inconsistent decisions increased unemployment
🔵Macros make it easier to create more 🔴Computer-controlled printing presses have
complex formulae or functions 🔷There are templates for regularly used replaced many print workers
spreadsheet models 🔴IT Technicians are needed to maintain
🔴Automatic re-calculation means it is not computers and robots increasing
necessary to evaluate a formula every
🔶Spreadsheets can also interact with employment
time you change it
databases
Data can automatically be imported (from a 🔴Programmers are needed to program
computers and robots 🔸Attempts to create larger region of free
Advantages Of Magnetic Tapes. space using compaction.
🔵 However, number of new jobs is far less 🔶A single MT stores more data than a single 🔹Some keeps smaller files within the same
than old jobs lost OD, so appropriate for server backup. directory.
🔶MT are cheaper per unit memory, so its 🔸When fragmented the movement is slower
🔴Microprocessor-controlled devices in the viable for large companies with storing lots of so slower access time.
home allow people to have more data.
leisure /free time instead of doing household 🔶MT are more portable than OD #It
work 🔶Both last longer than the technology that IT
reads them.
🔴Burglar alarms give people a greater sense Advantages of Encoding Data
🔶MT is less susceptible to damage than OD
of security during handling as it is completely encased.

🔵 Can lead to people becoming lazy/over 🔸 Speed up data entry


reliant on microprocessor-controlled 🔹Data is more accurately entered
devices in the home 🔸Less storage space on computer
🔹Makes data easier for validation
🔵 There has been a loss of manual household IT 🔸Faster to search and produce results
skills due to increase in use of
Disk Formatting
microprocessor-controlled devices in the home #It
IT
🔴Traffic lights – fewer traffic jams than 🔸Prepares data storage device for initial use. Validation & Verification
manually controlled
🔹Organises tracks on a disk into sectors.
🔸Prepared in order to store files. 🔶Verification is checking that the data entered
🔴Street lights – more economical – only come
is copied correctly from the data source
on when needed
♦ Low-Level formatting 🔷Validation is checking if the data entered is
♦Partitioning makes data storage device reasonable and sensible
🔴Air conditioning units in shopping malls
make shopping a more comfortable
visible to the OS 🔺Neither method checks if the data is
♦High level formatting generates a new file accurate
experience« system. 🔶Verification ensure the is correctly copied
🔵 But increases costs for stores and therefore #It
but it can't check if the original data is correct
prices to the customer 🔷Validation is needed if the data entered is
IT IT correct but the original source might be invalid
🔶 Common errors are *Transcription* and
Magnetic Tape & Optical Disks Disk Defragmentation *Transposition* Errors.
🔹Organises the content of a disk to the 🔷Verification can pick up both transcription
smallest number of contiguous region. and verification errors. validation might not.
dynamic source, the data can be overwritten *File transfer* – transmitting files over a
#It or vanish computer network like the internet.

IT #It
*Dynamic Data:*
Knowledge
▪Up to date IT
▪Might not be accurate
Expert System
▪Updates automatically
🔷Knowledge is remembering a set of facts
🔷Knowledge is the use of information to solve
problems #it
*Knowledge Base*
🔷Data cannot be interpreted until it is
organised IT 🔶 Knowledge base comprises a database of
🔷Know-how and learning of contextualised facts and a rules base
information/knowledge is the
Internet Services 🔶A database of facts is built up by the
appropriate collection of information, such that engineer on information and knowledge of
its intent is to be useful. experts
*Electronic Mail *– email is a message that ...also data from databases that may exist for
may contain text, files, images, or the topic
#It other attachments sent through a network to a
IT 🔶Knowledge base editing software/knowledge
specified individual or group
base editor enables the
Static and Dynamic data sources of individuals
knowledge engineer to edit rules and facts
*World Wide Web* – The World Wide Web is a
within the knowledge base
*Static Data:* system of Internet servers that
▪Accurate support specially formatted HTML documents
▪Not up to date *Video Conferencing Services* – to conduct a
*Rule Base*
▪Viewed Offline conference between two or
more participants at different sites by using 🔷Rules base is a set of rules which are
▪Doesn’t change regularly usually of the form IF . . . THEN
computer networks to transmit
audio and video data 🔷The shell often includes the user interface,
Usually checked for accuracy so often more
explanation system, inference
reliable than dynamic sources
*VoIP*- Voice over Internet Protocol – the engine and knowledge base editor
Can be used without access to the internet. delivery of voice communications
and multimedia sessions over Internet
Protocol (IP) networks *Inference Engine*
If the information is paper-based, then it can
be used without access to a computer. *Instant messaging* – to communicate via 🔶Inference engine is the reasoning part of the
messages in real time over the system
Have a historical copy to refer back to even if internet 🔶The method used by the inference engine
a later version is produced. Whereas with a *Video streaming* – video is sent to the viewer involves the use of forward chaining,
in real time
backward chaining or a combination of both expensive
🔶Extra network points may be needed which
leads to more cost
*User Interface* 🔶If the server breaks down student work might
🔷 User interface is how the computer interacts become inaccessible
with the user, displaying questions Viruses are easier to transmit from one
and information on a screen/enables the user computer to another
to type in answers to the
questions
Explanation system explains to a user the
chain of reasoning used to arrive at
a particular conclusion.

IT
Adv/Dis of Computer Internet

*🔲Advantages of connecting school


computers*
🔹Easier for students to share work/files in
group projects
🔸Easier for network manager to roll out new
software
🔹Easier for teachers to monitor students when
working
🔸Peripherals can be shared so fewer needed
leading to lower cost in the future
🔹Can access the internet more easily
🔸School intranet would become available to
all students more
frequently

*Disadvantages may include e.g.:*


🔸Easier for students to share work which
could lead to copying
🔶Bigger server may be required to cope with
extra computers so more

You might also like