CIE IGCSE ICT Theory Notes 3rd Edition

Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

UPDATED TO 2023 - 2025 SYLLABUS

IGCSE
ICT Aung Myat Hphone
SUMMARIZED NOTES ON THE THEORY SYLLABUS
3. Device drivers: A software that enables the
device to work with another, externally
1. ## 1.1. THEORY connected device.
4. Utilities: A system software that provides the
necessary facilities, (Antivirus, Scan Disk, Disk
Types and Components of Defragmentation etc.)

Computer Systems 5. Operating systems: enable computer systems


to function and allow users to communicate
with computer systems, special software,
Hardware & Software known as operating systems (OS), have been
developed.
Hardware
Analogue and digital data
the electronic physical components that make up a typical
computer system. These may include input and output
Computers can only understand data in the form of binary
devices as well.
digits (0,1), this is commonly known as digital data. However,
data in the real world is analogue, it isn’t limited to two
specific values.
: Central processing unit
Processor
Motherboard
Internal memory consisting of; RAM & ROM
Graphics & Sound Cards
Internal Storage devices like Hard disk drive (HDD) &
Solid-state drive (SSD)
Network interface card (NIC)
:
Monitor
Keyboard
Mouse
Printer
External Storage Devices

Software

The techniques, methods, commands, and instructions,


which tell the device what to do and how to do it. They are
the programs that control the computer system and The figures show how data changes in analogue and digital
process data. forms, analogue data forms smooth curves whereas digital
Relates to ideas & instructions for using physical objects. data changes in discrete steps.
So, for a computer to be able to process real-world data, it
Two types of software:
first needs to convert the received data into digital form. This
: is done by hardware known as ADC (analogue to digital
Provides services that allow the user to do specific converter), and its output is given back in analogue form
tasks. using DAC (digital to analogue converter).
Can be general purpose software or custom-made
software. (Specialist software) 1.2. The Main Components of Computer
E.g., Spread sheets, databases, word processing.
:
Systems
The software designed to provide a platform on which
all other software can run. For example:
Central Processing Unit (CPU)
1. Compilers: The software used to translate the
The component of the computer that understands and
High-level language into Machine code
executes hardware and software operations. Nowadays,
(Language Processor).
it’s also known as a microprocessor. It is a single
2. Linkers: A Software that creates the links
integrated circuit that is at the core of most PCs and is
between Language processors into workable
solutions (Data definition language).

WWW.ZNOTES.ORG
also present in many household gadgets and equipment
where some control or monitoring is required. Input devices are complex as
It consists of a control unit (CU) that manages the input Output devices are simpler as
they need to ensure proper
and output devices, an arithmetic and logic unit (ALU) that they only need to display the
communication between
performs computations and makes logical judgments, and finale.
computer and user.
tiny memory regions known as registers.
It processes the input and produces the outcome of the
processing in the form of output.
Backing/Secondary Storage

Internal Memory Required to permanently store significant amounts of


data.
1. Random access memory (RAM): temporary memory Most commonly in form of Hard disk drives and Solid-
storage, lost after power is shut down, performs read state drives.
and write functions, used to store data that’s currently
:
in use, can be increased in size to improve operational
speed.
2. Read only memory (ROM): permanent memory 1. RAM contents are lost when power is lost, and ROM is
storage, non-volatile, can only be read from, used to read-only, backing storage is permanent even without
store computer’s configuration data, such as BIOS. power.
2. RAM and ROM are much smaller as compared to
Note: The BIOS (basic input/output
backing storage.
system) stores the date, time and
3. RAM and ROM are significantly faster in accessing
system configuration on a non-volatile
data as compared to backing storage.
chip called a CMOS (complementary
4. Backing storage is much cheaper than internal
metal oxide semiconductor) – this is
memory.
usually battery powered.
5. Internal memories are fixed, backing storage can be
Differentiating between Internal memories: fixed or portable.
6. Internal memories can be directly read by the CPU,
1. RAM is temporary memory device, whereas ROM is while backing storage needs to be moved into the
permanent memory device. RAM before being read by the CPU.
2. RAM is volatile, ROM is non-volatile.
3. RAM can be written to and read from, but ROM can
1.3. Operating Systems
only be read from.
4. RAM is used to store data, files, programs and parts of Controls operation of input, output & backing storage
OS in current use. However, ROM is used in storing Supervises loading, running & storage of application
start-up data. program.
Deals with error in application programs.
Maintains security of whole computer system
Input & Output Devices
Maintains a computer log.
Input devices are pieces of hardware that allow users to Operating systems offer various types of user interfaces, for
enter data into computers. example:
An output device displays the computer's output in a
human-readable format. As words on a printer, for 1. :
example, or moving graphics on a monitor.
user needs to type in commands to communicate
Input devices Output devices with the computer. The user is in direct
An input device is any An output shows the result or communication with the computer. Not restricted to
hardware that enables data solution of the input after it pre-defined options. Possible to alter computer
entry. has been processed. configuration settings. Needs to learn many
commands for basic operations. All commands need
An input device can only send An output device can only
to be typed in, time-consuming. Very error prone, as
data. receive data.
commands must have correct format, spelling etc.
Input devices are necessary Output devices are needed in N.B: Mainly used by programmers who need to have
for a computer to receive order to display the outcome direct communication with the computer.
commands from the user for of the processing that took 2. :
processing to be permitted. place to the user. Uses WIMP (windows icons menu and pointing
device). The user does not need to learn any
commands. It is more user-friendly; icons are used
to represent applications. A pointing device

WWW.ZNOTES.ORG
is used to click on an icon to launch the application, 6. as they usually have wired connections, they have
this is simpler than typing in commands. This type of more stable internet access.
interface uses up considerably more computer Disadvantages:
memory than a CLI interface. The user is limited to the 1. not particularly portable because they are made
icons provided on the screen. Needs a more complex up of separate components.
operating system. 2. More complicated because all the components
N.B: Mainly used by end-users who don’t have great need to be hooked up by wiring, which also clutters
knowledge of how the computer works. up the desk space.
3. -: : use the human voice 3. Because they aren’t portable, files need to be
to give commands to a computer system. no need for copied to another portable storage device to take
a driver to take their hands off the steering wheel. In a work elsewhere.
home, it is especially useful for people with disabilities,
because many tasks can be carried out by the spoken
word only. Possible to use it as a security feature Mobile Computers:
because voice recognition could be used to identify a
person. Still unreliable, with many commands not 1. Laptop computer:
being recognized or needing to be repeated several
times (especially if there is background noise). Can be (Or notebook) refers to a type of computer where the
quite complex to setup. User needs to know which monitor, keyboard, pointing device and processor are all
commands can be used. together in one single unit. This makes them extremely
4. Gesture-based user interface: rely on human portable. lightweight (to aid portability). Low power
interaction by the moving of hands, head or even the consumption (and also long battery life). Low heat output
feet. Replaces mechanical input devices. No physical (cooling is very important).
contact required. Very natural interface for a human Uses:
operator. No training needed to interface with the 1. office and business work
computer. Possible for unintentional movement to be 2. educational use
picked up. Only works near to the camera or sensor 3. used as a gaming device.
(maximum of 1.5 meters). May only accept a limited 4. general entertainment
number of movements (for example, it may take Advantages:
several attempts to find out exactly what finger 1. Portability, all components are in a single unit so
movements are recognized). that they can be taken anywhere.
2. because of one single unit, there are no trailing
wires, and desk cluttering.
1.4. Types of Computers 3. take up much less room on a desk, so they can be
easily used in public spaces.
Desktop Computers 4. portability allows them to take full advantage of
Wi-Fi features.
Desktop usually refers to a general-purpose computer
Disadvantages:
that is made up of a separate monitor, keyboard, mouse,
1. portability makes it easier for them to be stolen.
and processor unit. It is distinguished from, for example, a
2. limited battery life means user needs to carry
laptop computer by the fact that it is made up of several
charger at all times.
separate components, which makes it not very portable.
3. keyboards and pointing devices may be awkward
Uses:
to use.
1. office and business work
4. not easy to upgrade, like adding more RAM.
2. educational use
3. general entertainment
2. Smartphones:
4. gaming device
Advantages: Allow normal phone calls to be made, but also have an
1. they are easier and less costly to upgrade and operating system (such as iOS, Android, or Windows)
expand. allowing them to run a number of computer applications
2. spare parts are standardized, which makes them (known as apps or applets). Smartphones communicate
cheaper. with the internet either by using Wi-Fi hot spots or by
3. they tend to have better specifications for a given using 3G/4G/5G mobile phone networks.
price. Uses:
4. no critical power consumption because they plug 1. They allow users to send/receive emails.
into a wall socket. 2. They allow users to use a number of apps.
5. due to fixed position, they are less likely to be 3. They allow users to use a camera feature (to take
damaged or stolen. photos or videos).

WWW.ZNOTES.ORG
4. They allow users to use a MP3/4 player (for music 3. typing on a touch screen can be slow and error
and videos). prone compared to a standard keyboard.
: 4. laptops tend to support more file formats than
1. very small in size and lightweight, makes them tablets.
portable.
2. connecting to the internet while on the move. 4. Phablets:
3. because they use Wi-Fi and mobile phone
networks, they can be used almost anywhere. Some of the latest smartphones have been designed as a
4. they have apps which can tell instant location, hybrid between a tablet and a smartphone; these are
which is a feature that isn’t available in either referred to as a phablet. They have much larger screens
desktops or laptops. than a smartphone but are smaller than a tablet.
5. they have reasonable battery life.

1. small screens and keyboards make pages difficult


to read.
2. more difficult and slower when typing things in.
3. Web browsing and photography can quickly drain
the battery.
4. Memory size in most phones is not very large
when compared to laptops and desktops.
5. Not all website features are compatible with
smartphone operating systems.
6. Because of their small size, it is much easier to
lose a smartphone or for it to be stolen compared
to laptops or desktops. :
7. The data transfer rate using mobile phone 1. Entertainment (streaming of music, videos, and
networks can be slower than with Wi-Fi. television programs).
2. Gaming (including group games).
3. Tablets: 3. As a camera or video camera.
4. Internet use (online sales, social networks, using
They work similarly to a smartphone. The only main QR codes, and so on).
difference is that they are much somewhat bigger in size 5. Sending/receiving emails.
as compared to a smartphone. 6. Global positioning system (use of maps to navigate
Uses: to a location).
1. They allow users to send/receive emails. 7. Calendar functions.
2. They allow users to use a number of apps. 8. Telephone banking (sending and receiving money
3. They allow users to use a camera feature (to take using banking apps).
photos or videos). 9. Voice over Internet Protocol: telephone network
4. They allow users to use a MP3/4 player (for music using the internet, which also allows video calling.
and videos). 10. Instant access to social networks (social contact
with friends no matter where you are in the world).
1. very fast to switch on (no time delay waiting for the 11. Instant messaging.
operating system to load up). 12. Office and business management (allows rapid
2. fully portable – they are so lightweight that they voice and video communication).
can be carried anywhere. 13. Education use (using interactive software to teach
3. touch screen technology means they are simple to or learn from).
use and don’t need any other input devices. 14. Remotely control devices.
4. not much heat, they use solid-state technology.
5. battery life of a tablet is a lot longer.
6. when the power button is pressed, it goes into
standby, but remains connected to the internet so
the user still hears alerts when emails or other
‘events’ are received.
:
1. tend to be rather expensive when compared to
1.5. Impact of Emerging Technologies
laptops.
2. they often have limited memory/storage when Artificial Intelligence (AI): There are many definitions of
compared to a laptop. artificial intelligence (AI). Essentially, AI is a machine or

WWW.ZNOTES.ORG
application which carries out a task that requires some An input device can send data to another device, but it
degree of intelligence. – the use of language, – cannot receive data from another device.
recognizing a person’s face, – the ability to operate Input devices are necessary for a computer to receive
machinery, such as a car, airplane, train, and so on, – commands from its users and data to process; the
analyzing data to predict the outcome of a future event, devices are under the control of the user or can be direct
for example weather forecasting. Impact: Whenever AI is data entry.
mentioned, people usually think of science fiction
fantasies and think of robots. The science fiction writer Input devices can be complicated because they must ensure
Isaac Asimov even went as far as producing his three laws that the user can interact with the computer correctly.
of robotics: » Robots may not injure a human through
action or inaction. » Robots must obey order given by 1. Keyboards:
humans without question. » A robot must protect itself
U:
unless it conflicts with the two laws above. Everyday uses:
1. An autonomous (driverless) vehicle – we already Input of data into applications software
have driverless trains and autopilots on airplanes, Typing in commands to the computer
but future developments include driverless cars.
2. Robotic research is leading to improvements in
technology to help amputees and people with
disabilities. Fast entry of new text into a document.
3. Robots are used to help people carry out Well-known method.
dangerous or unpleasant tasks – for example, Easy to use for most people.
bomb disposal, Negative impacts of AI: Easier to do verification checks as data is entered (can
4. Unemployment, robots are capable of doing immediately compare the source document with typed
tedious human tasks with much more efficiency data on the screen).
and excellence than humans.
:
5. Dependency on technology could lead to problems
in the future. Can be difficult to use if the user has limited arm/wrist
6. De-skilling: tasks that used to be considered a use.
talent are now part of general, tedious processes Slow method when compared to direct data entry.
that are done on a regular process by machines. Fairly large device that uses up valuable desk space.
Extended reality: refers to real and virtual combined
environments. The two most common examples at the
moment are: » Augmented reality (AR) is a merger
between the virtual and physical (real) world, it lays
objects onto the pre-existing objects. e.g., Pokémon GO!
Impact: safety and rescue operations’ training, shopping
and retail (getting a better look at a car before the
purchase), healthcare (better understanding of a patient’s
body) » Virtual reality (VR) enables an entirely new
world to be created, unlike AR, this has no link to the 2. Numeric keypads:
actual surroundings of the user. It requires the user to
be specially equipped with a VR headset, joystick, and Uses:
headphones. Impact: Military applications, educational
purposes (looking at ancient buildings), healthcare, media Automatic teller machines (ATMs), where the customer
(interactive special effects in a movie), scientific can key in their PIN, amount of money, etc.
visualization (part of molecular structures/cells). Mobile phones to allow phone numbers, etc. to be keyed
in.
Point of sale terminals (POS) in case the barcode reader
2. ## 2.1. THEORY fails to read the barcode – the number has to be keyed in
manually by the operator.

Input & Output Devices Chip and PIN devices when paying by credit/debit cards.
Fast entry of numeric data into a spreadsheet.

:
Input Devices & their Uses
Faster than standard keyboards when entering numeric
An input device is any hardware device that allows a user data.
to enter data or instructions into a computer directly.

WWW.ZNOTES.ORG
Because many are small devices, they are very easy to
carry around.
faster than a keyboard for choosing options.
: used to navigate applications and the internet.
Because the touchpad is integrated into the laptop
Sometimes have small keys which can make input more computer, there is no need for a separate mouse, this
difficult. aids the portability and is a big advantage if there are no
Sometimes the order of the numbers on the keypad is not flat surfaces available.

People with limited hand/wrist movement find the device


difficult to use.
Can be more difficult to control the pointer when
intuitive.
compared to a normal mouse.
3. Mouse:
Drag and drop operations are more complicated using a
:

opening, closing and minimizing software


grouping, moving and deleting files.
image editing, for example, controlling the size and
position of a drawing pasted into a document.
controlling the position of a pointer on the screen to allow
selection.

:
touchpad.
Faster method for choosing an option rather than using a 5. Tracker ball:
keyboard.
Very quick way of navigating through applications and the :
internet.
Does not need a large desk area when compared to a good alternative to a mouse for people with conditions
such as RSI.
keyboard.
Used in an industrial control room environment.
: Used in some luxury cars to select functions such as
radio.
Can be more difficult for people with restricted hand/wrist
movement than using a keyboard for data entry. :
Easy to damage, and the older type of mouse quickly
Does not need the same fine control as a mouse.
becomes clogged up with dirt.
Easier to use than a mouse if the operator has problems
Difficult to use if no flat surface readily available.
with their wrist.
More accurate positioning of the pointer on screen.
They are more robust than a mouse.
Needs less desk space than a mouse or keyboard.

Not supplied with the computer as standard, therefore


more costly.
4. Touchpad: Users may need training because it is not standard
equipment.

opening, closing and minimizing software


grouping, moving and deleting files.
image editing, for example, controlling the size and
position of a drawing pasted into a document.
controlling the position of a pointer on the screen to allow
selection.

WWW.ZNOTES.ORG
:

Used in video games.


Used in simulators, to mimic the actual controls.

Easier than keyboards for screen navigation.


In some applications, the control is more realistic than
using a mouse.

The on-screen pointer is more difficult to use.


6. Remote control:

Uses:

Televisions, satellite systems, DVD/Blu-ray players and Hi-


Fi systems, to alter controls such as volume, on/off etc.
Used to control multimedia systems.
Used in industrial applications to remotely control
processes.

Can be operated from any reasonable distance.


Safer in some conditions, e.g., in chemically hazardous
environments, we can control and measure from safe
distances.
8. Driving wheel:
:
Uses:
Difficult to use for people with limited hand/wrist
movements. Used in video games, especially car racing games.
The signal can easily be blocked by physical obstacles. Used in simulators, to mimic actual vehicle controls.

More realistic experience than both mouse and joystick.


Easier than a keyboard or joystick to control steering
movements.

Rather expensive input device as compared to a mouse or


joystick.
Steering movements tend to be over-sensitive, which
gives an unrealistic feel.
Unless it is an expensive simulator, feedback to steering
wheel is non-existent.

7. Joysticks:
9. Touch screen (as an input device):

WWW.ZNOTES.ORG
Fairly slow input method, especially if color mode is

Automatic teller machines (ATMs) to choose from on-


screen options.
Point of sale terminals such as in restaurants.
Interactive white boards in education.
Computer-based training (CBT) where answers are
selected during on-screen testing.

:
selected.
Faster entry of options than using keyboard or mouse.
Very easy method for choosing options. 11. Digital Cameras:
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Taking photographs, still better than smartphones and
tablets.
Limited number of input options available. Data-capture device, e.g., as a reversing aid in cars.
Can lead to problems if an operator has to use the system Dentistry, to help capturing pictures for better diagnosis.
frequently (straining of arm muscles, RSI, etc. are all The creation of virtual reality tours around houses,
possible). buildings etc.
The screen can get very dirty with constant touching.

Easier to produce better-quality photographs than with a


traditional camera.
Faster to upload photographs to a computer than
scanning in hard copies.
Memory cards can store many thousands of photographs.
No need to develop film and make printouts, saves money
and is more environmentally friendly.
Unwanted images can easily be deleted from memory
card.

Need to be computer literate to know proper use.


10. Scanners: Loss of artistry due to clever software doing all the work.
Images need to be compressed to reduce amount of
: memory used.

Scanning in documents and converting into different


formats
Scanning in old documents to protect them, in case
original is lost/damaged.
Scanning in photographs for storage
Scanning in barcodes at POS terminals.

Images can be stored for editing at a later date.


When used with OCR, they are much faster and more
accurate than typing the documents in.
12. Microphones:
Possible to recover damaged documents by scanning in
:
and producing an acceptable copy.
To input speech to be used in various applications.
:
Input in voice recognition software for authentication.
Limited quality, depending on how good the scanner’s As a sensor, to pick up sound, in an intruder alarm
resolution is. system.
Used in audio conferencing or VoIP applications.

WWW.ZNOTES.ORG
: Drawing on screens

Faster to read in text than it is to type it in. :


Possible to manipulate sound in real time rather than
working on a completed recording. Greater accuracy than touch screens
Improves security, if used as an authentication system. Small, makes them portable as well as capable of being
used in small spaces.
Easy-to-use technology.

Sound files use up a lot of computer memory. :


Reading in data is more error prone than typing in.
Lagging problems while drawing on screen.
Only works with CRT monitors.
Rather dated technology.

13. Sensors:

Uses:
2.2. Direct Data Entry & Associated
Temperature sensors are used in automatic Devices
washing machines, central heating systems, ovens,
automatic glasshouses.
1. Magnetic Stripe Readers:
Pressure sensors are used in intruder alarm
systems, washing machines. Uses:
Light sensors are used in automatic glasshouses,
automatic doors, street lighting control. On credit/debit card for use at ATMs
Sound/acoustic sensors are used in intruder alarm Security device to allow entry to buildings, hotels, etc.
systems, monitoring liquid and powder flow in pipes.
Humidity/moisture sensors are used in automatic :
glasshouses, environmental monitoring, in factories
Faster than keying in data manually.
where moisture levels are crucial.
Error-free, no human intervention needed.
pH sensors are used in automatic glasshouses, chemical
Secure, information isn’t in human-readable form.
processes and environmental monitoring.
Robust, there are no moving parts.
:
:
Readings are more accurate as compared to human
If the card is damaged, the data is lost.
operators.
Doesn’t work at a distance.
Readers are continuous, no breaks in the monitoring.
As the information isn’t human readable, this can be a
Because it is a continuous process, any action or warnings
disadvantage in some cases.
needed will be initiated immediately.
Automatic systems don’t need human intervention.

Faulty sensors can give spurious results.


Most sensors are analogue; therefore, they require
conversion using Analogue to Digital Convertors.

14. Light pens:

Uses: 2. Chip and PIN reader:

Selecting object on CRT screens :

WWW.ZNOTES.ORG
Where payments are made using cards Very fast way of inputting survey results.
More accurate because there is no human intervention.
: More accurate than OCR methods.

More secure than contactless cards as the PIN acts as a


second security layer.
More robust system than Magnetic Stripe Cards The designing of the forms can be complicated to make
sure the marks are correctly positioned.
If there are problems, they need to be manually checked,
which can be time-consuming.
Need to be very careful, so the PIN isn’t seen by anyone
while being typed in.

5. Optical Character Recognition/Reader:

Processing passports and identity cards.


Converting hard copy documents into electronic form.
3. Radio Frequency Identification (RFID) reader: Used in automatic number plate recognition (ANPR)
systems.
:
Digitizing historic hard copies for archiving.
Livestock tracking :
Retail, instead of barcodes, as they don’t need to be
scanned in. Much faster data entry system than manual typing.
Admission passes. No human intervention, its error free.
Library books, to acknowledge the books which have been
borrowed. :

: System has difficulty in reading different handwritings.


Still not a very accurate technique.
No line-of-sight contact is needed.
Very robust and reliable technology.
Very fast read rate.
Bidirectional data transfer.
Bulk detection is possible.

Tag collision
As they use radio waves, they are easy to jam/interrupt.
Easy to hack into the signal. 6. Barcode readers:
RFID is more expensive than a comparable barcode
system.

4. Optical Mark Reader/Recognition (OMR): Used in supermarkets for stock control.


In libraries, to keep track of books.
As a safety function to ensure checking of electrical
equipment on a daily basis.
Used in MCQs checking.
Used in reading voting papers.

: Much faster than manually keying in data.


Allow automatic stock control.

WWW.ZNOTES.ORG
They are a tried and trusted technology. QR codes can be used to transmit malicious data.

Relatively expensive system to administer.


Not fool-proof, barcodes can be swapped between items.
Can be more easily damaged than RFID tags or magnetic

stripes.

7. Quick response (QR) code scanner:

Uses:

used in advertising to contain information about the


advertising company.
Wi-Fi authentication
Used in restaurants, you can see the menu by scanning.
2.3. Output Devices & their Uses
1. Cathode ray tube (CRT) monitors:
hold much more information than normal barcode.
fewer errors than with barcodes. :
QR codes are easier to read because they can even be
read by the cameras on a smartphone. Their large screens allow complex diagrams to be created
It is possible to encrypt QR codes. in Computer-aided design.
Used with light pens to allow designs to be created.

More than one QR format is available.


Can be clearly seen at a wider range of angles unlike
LCDs.
Allow the use of light pens.

They are very heavy and bulky.


They run very hot and can cause fires if left unattended.
They use a lot more power than LCDs.
Their flickering can lead to headaches.
Image burn-in is a common issue.

WWW.ZNOTES.ORG
2. Liquid Crystal Display (LCD) screens:

Uses:

Main output device for modern computers.


Mobile phones, laptops, video games use LCD screens.

Very efficient, low power consumption.


Lightweight devices.
Screens can made in various sizes.
No flickering images.
Very sharp image resolution.

: 4. Multimedia projectors:
Color and contrast from different angles are inconsistent. Uses:
Motion blur is a common issue.
Lower contrast than CRT monitors. Training presentations to allow whole audience to see
images.
Advertising presentations.
Home cinema systems.

More people can watch as they don’t have to crowd


around a laptop.
Avoids the need for several networked computers.

Images can be fuzzy.


Expensive to buy.
Set-up can be complicated.

3. Touch screen (as an output devices):

Uses:

ATMs
POS terminals
Information kiosks.

:
5. Laser printers:
Don’t need additional input devices.
:
They are very interactive, many functions such as swiping
can be done. In uses where low noise is required.
They add a high-tech feel to devices and interfaces. If fast, high quality, high-volume printing is required.

: :
They tend to get dirty with frequent use. Printing is fast.
Frequent use results in straining of arm muscles, RSI, etc. They can handle very large print jobs.
If large amounts of data are being input/output, they Quality is consistently high.
aren’t very accurate, and the interface isn’t very fast. Toner cartridges last for a long time.

WWW.ZNOTES.ORG
They are only considerably fast if several copies are being :
made.
Color laser printers are expensive to run. Can be used in varying environments unlike laser/inkjet
They produce ozone and volatile organic compounds printers.
because of their printing method and toner. Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Good for continuous printing.

Very noisy
Initial cost is more than an inkjet printer.
Very slow, poor-quality printing.

6. Inkjet printers:

Where low-output volumes are required.


Where high-quality printing is required for single pages.
8. (Graph) Plotters:
:
:
High-quality output
Cheaper than laser printers.
Producing architectural drawings
Very lightweight
Producing engineering drawings
Don’t produce ozone and volatile organic compounds.
Drawing animation characters.
:
:
Slow output if many copies are needed.
Very high-quality output.
Can’t do large print jobs.
can produce large, monochrome and color drawings very
Printing can smudge if user isn’t careful.
accurately.
Can be expensive if used a lot.
Can print on a variety on materials.

Very slow printing.


Expensive equipment to purchase initially.
Have a very large physical footprint compared to a

7. Dot matrix printers:

Used in environments where noise isn’t a major issue. printer.


Carbon copies or multi-part outputs can be produced.
Widely used in till receipts. 9. 3D printers:

WWW.ZNOTES.ORG
: They take up a lot of desk space.

Custom-made prosthetic limbs.


In aerospace, if parts of the aircraft are made using 3d
printers they can be very lightweight.
Making spare parts for items that aren’t now
manufactured, e.g., parts of a vintage car.

Manufacturing objects has become much easier.


Even though the initial cost is high, it is still cheaper than
the more conventional way.
Parts for machinery that aren’t available can be made.

Potential to make counterfeit items.


Could lead to manufacture of dangerous items by almost
11. Actuators:
anyone.
Us

Used to turn on motors, buzzer, switches.


Allow a computer to control physical devices,

Ad :

Allow remote operation of many devices.


Relatively inexpensive devices.

Di:

They are an addition device in the system that could go


wrong.
Job loss potential. As they are analogue devices, signals need to be
converted using a DAC.
10. Speaker:

Uses: 3. ## 3.1. THEORY


Used in all phones and most computers.
Helps visually impaired people.
Plays downloaded sound files.
Storage devices and media
: What is backing up of data?
Amplified sounds can be much louder than the original
Backing up refers to the copying of files or data into a
sound.
different medium incase damage to or loss of original
Amplified sounds can be enough to be heard by a huge
copy.
crowd.
Very simple technology.
Why do we back up data?
They are especially useful for blind people, for instance,
reading e-books.
To safeguard against loss of data.
: To safeguard against damages caused by hackers.
In case files need to be sent elsewhere, to protect original
Speaker output can be disturbing to irrelevant people format of files.
present in the same area, e.g., an office.
Sound quality is high only in expensive speakers. 3.2. Data Access Types:
1. Serial access:

WWW.ZNOTES.ORG
This involves starting from the beginning of the file and Used in file servers for computer networks.
accessing each record to get to the file required.
It is a very slow form of data access. :
Used where speed isn’t vital.
They have a very fast data transfer rate and fast access
Examples where serial access is used:
times to data.
utility billing
They have a very large memory capacities.
clearing of bank cheques
producing pay slips

2. Direct access: Can be fairly easily damaged.


They have many moving parts which affect overall
This is used to access data stored in any record by typing reliability.
in the required key field. Their read/write operation can be quite noisy when
Typing in a key field will allow the user to access a compared to solid-state drives.
particular record directly from the calculated position.
Much faster data access speed. Portable Hard Disk Drives

Uses:
Magnetic Backing Storage
Can be used as backup systems to prevent data loss.
Media Can be used to transfer data/files/software between
computers.
Holds data magnetically.
:
Surface area of the media are magnetized so that they
can hold bits of data. Data access time and data transfer rate are very fast.
The device that reads media can also read the bits held Have a very large memory capacity.
on the surface area Can be used as a method of transferring information
between computers.
3.3. Magnetic tape drives
:
Uses:
They can be easily damaged if user accidently drops it or
used in application where batch processing is used. doesn’t correctly shut down the drive after use.
used as a backup media where vast amounts of data Data transfer rate is not as fast as for fixed hard disk
needs to be stored. drives.
used in long-term archiving of data, they have huge data
storage capacities and are known to be very stable.
Optical Backing Storage
:
Media
They are generally less expensive than hard disk drives.
It is a very robust technology.
Holds data by burning ‘dots’ onto the surface with a high
They have a huge data storage capacity.
powered laser.
The data transfer rate is fast.
The data that reads the media can read the data by
: shining a lower powered laser over the dots.

Very slow data access times (uses serial access). 3.4. CD-R/DVD-R
When updating, another tape is needed to store the final
updated version. Uses:
They are affected by magnetic fields, a strong field can
Home recordings of music and (CD-R) and films (CD-R).
corrupt data stored on the tape.
Used to store data to be kept for later use to be
transferred to another computer.
Fixed Hard Disks/Drives
:
Uses:
Cheaper medium than RW disks.
To store the OS, systems software and working data/files.
Once burned (and finalized) they behave like a ROM.
Storing applications files.
Used in real-time systems and in online systems. :

WWW.ZNOTES.ORG
Can only be recorded once; if an error occurs then the much smaller so they store five times more data than
disk has to be thrown away. DVDs.
Not all CD/DVD players can read CD-R/DVD-R. 2. Blu-ray disks automatically come with a secure
encryption system which helps to prevent piracy and
CD-RW/DVD-RW copyright infringement.
3. The data transfer rate for a DVD is 10 Mbps and for a
: Blu-ray disc it is 36 Mbps.

Used to record television programs which can be :


recorded over, time and time again.
Used in CCTV systems. Home video consoles.
Can be used as a backup device for files and data. Storing and playing back movies.
Computers can use this technology for data storage or
: backing hard drives.
Camcorders can use this media to store movies.
Can be written over many times.
Can use different file formats each time it is used. :
Not as wasteful as R format because the files/data can be
added at a later stage. Very large storage capacity.
Very fast data transfer rate.
: The data access speed is also greater than with other
optical media.
Can be relatively expensive media.
Blu-ray discs automatically come with a secure encryption
Possible to accidently overwrite data.
system.

CD-ROM/DVD-ROM :

: Relatively expensive discs.


encryption problems when used to store videos.
These are read-only memory (ROM) which means they Introduction of HD (high definition) DVD players has
can’t be written over and can only be read. Permanent reduced the advantages of using Blu-ray technology.
storage method.
CD-ROM is used to store music files and to store software,
computer games and reference software. Solid State Backing Storage
DVD-ROM has much larger storage and is used to store
films. Holds data on devices that don’t have any moving devices.
Used in applications where there is a real need to prevent
deletion or overwriting of important data. 3.5. Solid-state drives (SSD)
: Uses:
They are less expensive than hard disk drive systems. storage device to store files, applications, OSs, and so on.
Very portable as they are small and light.
Data stored on them is read-only, so it cannot be :
accidently overwritten.
They are more reliable as they have no moving parts.
: They are considerably lighter, suitable for laptops.
They do not have to ‘get up to speed’ before they work
Hold far less data than hard disk drives or memory sticks. properly.
Very slow data transfer rate and data access times, as They have a lower power consumptions.
compared to hard disk drives. They run much cooler than HDDs.
You cannot add your own files to the disks because they Because of no moving parts, they are very thin.
are both read only. SSD data access time is only 0.1 milliseconds compared
to 10 milliseconds for HDD.
Blu-Ray discs Data transfer speed for SSDs is also much faster than for
HDDs.
The main differences between DVD and Blu-ray are:
:
1. Blu-way uses a blue laser rather than a red laser.
(wavelength of blue light is 405nm, much smaller than SSD endurance - SSDs are conservatively rated at only
the 650nm red laser) This allows pits and lands to be 20GB write operations per day over a three-day period.

WWW.ZNOTES.ORG
More expensive than magnetic hard disks. Users will often be required to purchase a card reader or
Smaller storage capacity than magnetic hard disks. USB converter to view the data.

Pen drives (Memory sticks)


4. ## 4.1. THEORY
Uses:

Transporting files between computers or using as a Networks & the Effects of


backing store.
Used as a security device to prevent software piracy Using them
(known as a dongle).

: Routers
Very compact and portable media. A device that enables data to be sent between different types
Very robust. of networks. Used to connect a LAN to the internet, can be
Does not need additional software to work on most connected through cables or wirelessly.
computers. It can be used for:
They are not affected by magnetic fields.
connecting networks and devices to the internet,
: storing computer addresses,
routing data packets.
Cannot write protect the data/files by making it ‘read-only’.
Easy to lose (due to the small physical size). When a data packet is received, the router checks if the
The user needs to be very careful when removing a packet is intended for it or another network. If it’s meant for
memory stick from a computer - incorrect removal will its own network, then the data packet is routed to the local
corrupt the data on the memory stick and make it useless. switch/hub. If not, the data packet is sent to the relevant
router, which send it to the relevant device.
Flash Memory cards
They consult routing tables to know where to send the
Different types of memory cards: data.
» SD cards (secure digital card)
» XD cards (extreme digital card)
» CFast card (compactfast card). Common Network Devices
Uses:
1. Network Interface Cards (NIC): needed to allow a
Storing photos on digital cameras.
device to connect to a network. Turns binary data into
Used as mobile phone memory cards.
electrical signal that allows network access. Usually
Used in MP3 players to store music files.
integrated into the motherboard.
Used as a backing store in hand-held computer devices.
Each NIC is given a unique hardwired media access
:
control (MAC) address.
Very compact. Media access control (MAC) address: a number which
Because of no moving parts, they are very durable. uniquely identifies a device when connected to a network.
They can hold large amounts of data. First 6 hex digits identify the manufacturer’s code and the
Compact cameras and smartphones are able to read and next 6 identify the device’s serial number.
write memory cards allow the user to transport large
2. Hubs: they are hardware devices that can have a
collections of photographs, songs etc.
number of other devices connected to them. They are
: used to connect devices together to form a local area
network (LAN). It takes a data packet received by one
Expensive per gigabyte of memory when compared to of its ports and sends it all relevant or irrelevant
HDDs. device connected to it.
Have a lower storage capacity than hard disks.
Have a finite life regarding number of times they can be Not very secure, broadcast data to all devices.
read from or written to. Unnecessary network traffic.
Memory cards, specifically the micro SD card, are the
3. Switches: intelligent hubs. Used to connect devices to
smallest storage devices available; this means they are
form a LAN. Unlike hubs, the switches store MAC
more likely to be lost, stolen or damaged.

WWW.ZNOTES.ORG
addresses of all devices on a lookup table. So, it only Bluetooth uses key matching encryption however, Wi-Fi
sends data to relevant device. uses WPA (Wi-Fi protected access), and WEP (wireless
In summary: equivalent privacy).

Both are used to connect devices in LAN.


Both use data packets.
Cloud Computing
Hubs send data to every device on the network.
Switches send data to a relevant device only.
This is a method where data is stored on remote servers
Switches have better security.
accessed through the internet.
Switches use lookup tables to determine the destination
The three types of cloud storage are:
for a data packet.
Switches use MAC addresses for relevant device location. 1. Public Cloud - The customer and the cloud storage
provider are different companies.
Bridges: devices that connect one LAN to another LAN
2. Private Cloud - The customer and the cloud storage
that uses the same protocol. Unlike routers, they can’t
provider are a single organization.
communicate with external networks, such as the internet.
3. Hybrid Cloud - Combines both public and private cloud
Comparison:
options and allows for sensitive data to remain private
Bridges connect LANs together; routers connect various whilst providing public cloud services for less sensitive
information.
types of networks together.
Bridges scan MAC addresses while routers scan the IP
Cloud data is duplicated and stored on other servers to
addresses.
ensure data availability during system failures, upgrades
Both send out data in form of data packets.
and maintenance periods.
Bridges connect networks with same protocol, routers can
connect networks with different protocols. :
Router uses routing tables to direct data packets, bridges
don’t. Services can be scaled up or down according to changing
Bridges has only two ports, routers have multiple ports. requirements.
Cloud storage eliminates the need for a business to
purchase expensive equipment for infrastructure and
Wi-Fi & Bluetooth maintenance.
Easily available globally allowing both remote working and
Both are used for wireless communication between devices. data sharing.
They both use electromagnetic radiation as the carrier of Providers offer high levels of ensuring that services are
data transmission. always available.
Bluetooth uses: Can offer an almost unlimited amount of storage.
A backup of the data from the cloud will allow full data
When transferring data between 2 or more devices that recovery in case of incidents.
are very close together. Files can be synced across multiple devices.
When speed of data transmission isn’t crucial. No need to carry storage devices around.
For low-bandwidth applications.
:
Wi-Fi uses:
A stable internet connection is always required.
Full-scale networks. Data storage in clouds may be vulnerable to security
When data transfer rate is crucial. breaches.
For uses where higher range and better security is User is dependent on storage provider for reliability and
required. availability of services.
As the amount of storage or bandwidth required
Differences and similarities: increases, the services may become expensive over time.

Bluetooth uses a transmission frequency of 2.4 GHz,


whereas Wi-Fi uses a range of 2.4 – 5.0 GHz.
Wi-Fi has a much faster data transfer rate. Common Network Environments
Wi-Fi has a higher geographical range in which it is
effective. 1. Internet:
Bluetooth only allows up to 7 devices to be connected at a
The is a very large global network that consists of
many other networks
time, whereas the number of devices connected to a Wi-Fi
network depend on the router/routers used.

WWW.ZNOTES.ORG
The world wide web is the vast collection of web pages They all use client server architecture
that can be accessed using a web browser They all use security measures such as
The world wide web allows you to access information by authentication and encryption
using the internet They all promote and facilitate information and
resource sharing
: Differences between the internet, intranet and extranet
are as follows:
It is an open network meaning everyone has access to the
The internet is a global network whereas an
same resources and information as everybody else.
intranet/extranet is a private network contained within
People from all over the world can communicate with
an organization
each other in real-time.
The use of the internet covers a wide range of
Available to anyone who has a suitable device and access
purposes whereas an intranet/extranet is designed for
to any one of the interconnected networks.
specific users and purposes
: Much of the information is publicly available whereas
an intranet/extranet is not
Education and training The internet is not owned solely by one person or
Social Networking organization whereas intranets/extranets are owned
Online shopping usually by the organization.
Entertainment

2. Intranet: Network types


Usually private and are used to send information securely
1. Local Area Network (LAN): networks that are usually
and safely.
contained within a single building or small
Access to an organization’s Intranet is restricted and only
geographical location. It is made up using hubs and/or
accessible to authorized users such as employees.
switches which will connect several devices together.
Intranets have many advantages over the internet such It is common for one hub or switch to be connected to
as:
a router which will allow the LAN connectivity to other
better bandwidth than the internet,
outside networks such as the internet.
data is kept within the organization,
less chance of hacking and attacks, :
administrators can manage access to external sites
and links. Allows centralized management of updates, backups and
software installations.
: Can secure its devices with the use of firewalls, antivirus
software and other security features to prevent
Private network that is accessible to employees within a
unauthorized access.
company or organization.
A LAN allows users on the network to share resources
Usually behind a firewall to ensure security.
such as printers and other peripherals.
Allows for document sharing and the use of collaboration
tools between users. :
Can be customized to meet the specific requirements of
the business. Network may not function properly in case of hardware
Users will require a username and password to access failure.
the Intranet. More prone to attacks than standalone computers.
Data and peripheral accessing can be slow, based on
3. Extranet: network traffic.
LAN networks require maintenance to ensure software
Private Intranet that also allows access by selected being up-to-date.
parties that reside outside of the organization. These
parties, for example, maybe customers, key stakeholders 2. Wireless Local Area Network (WLAN): Local Area
or clients. Networks that allow devices to connect wirelessly
Users will have an authorization level once they have rather than using physical cables. Wireless Access
successfully logged in which will determine which Points (WAPs) are connected to an existing wired
resources they may access. network which provides wireless connectivity. Support
Similarities between the Internet, Intranet and extranet a vast range of devices such as smartphones and
are as follows: laptops and are very popular in public areas such as
They are all web based technologies shopping malls.
They allow users to access information remotely

WWW.ZNOTES.ORG
Advantages: (the user doesn’t have to take any action, unlike
phishing).
Allows users to connect anywhere that is in the range of a Viruses: Program code that replicates (copies itself)
Wireless Access Point (WAP). with the intention of deleting or corrupting files and
Can be used in a variety of environments both indoors causing the computer to malfunction
and out making them highly flexible.
As the requirements change, additional WAPs can be
added relatively easily.
Passwords
Printer’s access can be given to wireless devices.

: A common form of security and are often accompanied by a


username or email address.
The strength of their signals can be affected by obstacles
such as walls. There are many ways to enhance the security of your
Speeds can be affected by high traffic areas. password such as the following:
Can sustain interference from other devices which can Ensure that the password is changed regularly in case
affect performance and connectivity. it has been obtained illegally or accidentally
Can be vulnerable to security threats due to signal Ensure that the password uses a combination of
interception. uppercase, lowercase, numbers and special
characters to make the password more difficult to
3. Wide Area Networks (WAN): is formed by several guess.
LANs being connected through a router. It is expensive iloveict is a weak password
however it comes with a more enhanced security. 1lov3ICT# is a strong password
Additional hardware is needed for a WAN: Routers, Anti spyware software can be run regularly to ensure that
modems and proxy servers. your information including your password is not being
passed to an unauthorized third party user.
:

Provide the ability to connect geographically dispersed


locations, such as offices in different cities or countries. Other authentication methods
Offer the flexibility to scale up or down based on the
needs of the organization. 1. Zero login: It is a security concept that aims to
Administrators can monitor and manage the network eliminate traditional login methods, such as
infrastructure from a single location. usernames and passwords, by using biometrics or
other authentication factors for seamless and
: password-less access.
2. Biometric Recognition: These methods of
Setting up and maintaining a WAN can be expensive, authentication use unique physical or behavioral
especially when compared to LANs. characteristics, such as fingerprints, iris scans, or
Cover larger distances and often rely on public networks voice recognition, to verify a person's identity.
or leased lines, which can introduce latency and affect 3. Magnetic Stripes: These are authentication features
performance. on cards, storing data magnetically. They enable
WANs are subject to the reliability and availability of secure identification and authorization by containing
external service providers. encoded information that can be read by magnetic
stripe readers.
4.2. Security issues regarding data 4. Smart Cards: Smart cards are portable devices that
contain integrated circuits to store and process data.
transfer They are used for authentication, identification, and
secure transactions in various applications such as
Connection to a network exposes a user to:
banking, telecommunications, and access control.
Hacking: Unauthorized access given to computer. Can
5. Physical Tokens: It is a type of authentication that
lead to identity theft or the misuse of personal
takes the shape of a real, solid object. The user
information
demonstrates ownership of the token through
Phishing: Phishing involves getting sensitive
interaction with a login system. Physical tokens have
information such as usernames, passwords, and
embedded clocks that create one-time passwords
credit card detail, for malicious reasons, by mimicking
(OTPs) when a PIN and other authentication
a reliable webpage on the network
information are entered.
Pharming: This is malicious code installed on a user’s
6. Electronic Tokens: These are applications that users
computer or on a web server; the code will redirect
install on their hardware, such as smartphones. Say a
the user to a fake website without their knowledge
person wants to access a website on a tablet

WWW.ZNOTES.ORG
computer. To access this website, users must first Much easier to access important documents or bring in
authenticate themselves using electronic tokens. With ‘experts’ at key parts of the conference.
their smartphone, the user has already set up the Possible to hold conferences at short notice.
electronic token app. The user launches the app on Reduced travelling costs.
their smartphone when the website asks them to No need to pay for hotel accommodation or venue hire.
verify their identity. The program creates an OTP that Reduces the cost of taking people away from their work
is only good for a short period of time. for two or three days to travel.
Better to use video conferencing than have delegates
travel to potentially unsafe places around the world.
Anti-malware software :

An anti-malware software is designed to protect devices Potential time lag in responses/delays when talking.
against viruses and malicious software. It has 3 mains Images can jerk.
purposes, detect, prevent and remove malicious software. It Very expensive to set up in the first place.
is installed onto a computer system and will operate in the Problems if the delegates live in different countries where
background. the time zone differences are large.
Common features of Anti-Malware software include the Requires IT knowledge to some extent.
following: Not the best for people who consider travelling a job-perk.
Comparing the scanned files against a large database Completely reliant on stable internet connections.
of knowing
Real-time scanning 2. Audio Conferencing: Meetings held using audio
Regular updates to gather an up to date list of known (sound) technology are referred to as audio
threats conferencing. The normal telephone network can be
Quarantine of infected files used for audio conferencing, which is frequently
Quarantining files allows threats to be automatically referred to as a phone conference.
deleted.
Allows the user to determine if the file is a legitimate The hardware required is:
threat and not a false positive.
a computer (with built-in microphones and speakers)
Heuristic Checking: Instead of relying solely on a database of external microphone and/or speakers
known viruses, this method looks for behavioral patterns and an internet phone
other features in a file to identify possible risks there. a standard phone.

:
Electronic Conferencing Allows participants to join meetings from any location.
Eliminates the need for travel expenses, such as
1. Video Conferencing: It is a form of audio and video
transportation, accommodation, and meals.
communication. It serves as a stand-in for face-to-face
saves time by eliminating travel time and allowing
meetings between a number of persons who may
meetings to be scheduled and conducted quickly.
reside abroad or in another region of the country. It
utilizes a network in some way and is done in real :
time.
Lacks the visual aspect of face-to-face meetings, which
The basic hardware includes: can hinder communication.
Can limit interaction and engagement compared to in-
webcams,
person or video conferencing.
large monitors/television screens,
Heavily relies on technology, and technical issues such as
microphones,
poor audio quality, background noise, or connectivity
speakers.
problems are common.
The software used are:
3. Web Conferencing:
webcam and microphone software drivers Web conferencing, often known as webinars or
CODEC (coder and de-coder) webcasts, makes use of the internet to enable
Echo cancellation software conference calls. This system makes use of numerous
computers that are interconnected over the internet. It
: operates in real time, just like video conferencing, and
enables the following meeting types:
» business meetings to discuss new ideas
» presentations

WWW.ZNOTES.ORG
» online education or training.

:
save energy due to being efficient, as well as turning off
Allows participants to see each other through video, after inactivity
providing a more immersive and engaging experience can be easier 'programming' these devices to perform
compared to audio conferencing. tasks rather than turning knobs and pressing buttons
Often offer screen sharing capabilities, enabling manually
participants to share presentations, documents, or other
visual content in real-time.
Often provide features like chat, polling, hand raising, and
Q&A sessions, fostering interactivity and engagement lead to more wasteful devices
among participants. can be more complex to operate for technophobes
leaving devices on standby is wasteful
:

Heavily relies on internet connectivity and technical


Data Security Issues
infrastructure.
Any home appliance managed remotely could provide
Can be susceptible to distractions and multitasking.
hackers access to your personal information. These devices
Often have various features and settings that participants
frequently have default (or no) password settings, which
need to familiarize themselves with, especially if they are
makes it simple for attackers to get sensitive information. For
new to the platform.
instance, it is easy to discover holiday dates by hacking into a
central heating controller (or the software used to interface
5. ## 5.1. THEORY with it), making a home an obvious target for break-ins. It is
likely for a hacker to obtain important information, such as
credit card numbers, if the refrigerator or freezer
The Effects of Using IT automatically orders goods from a retailer.

A microprocessor-driven labour-saving machine enables Social interactions


users to focus on other activities while the machine
completes its work. The second generation of devices
containing microprocessors is more user-friendly and has
more functionality, such as "intelligent tuning" in easier to make new friends using chat rooms
television sets. easier to find people who share similar interests/hobbies
less expensive to keep in touch using VoIP technology.

no need to do manual tasks at home people do not meet face-to-face as much (social isolation)
more time for leisure activities a lack of social interaction may make people more
no need to stay home while chores are being done anxious of meeting people in real life
when communicating online, people can act less polite or
web-enabled devices allow devices to be switched on or
off while the owner is out more harshly, and cybercrime is a serious issue,
automated burglar alarms give a higher sense of security especially for teenagers.
and well-being
smart fridges and freezers prevent food waste by keeping Monitoring and controlling transport
track of products’ expiry, availability, etc.
:

monitoring traffic on motorways


congestion zone monitoring
unhealthy lifestyle due to inactivity caused by devices automatic number plate recognition (ANPR)
doing all tasks automatic traffic light control
tend to make people lazy air traffic control systems
potential deskilling railway signalling systems
any device containing a microprocessor and can
communicate using the internet displays a threat of
cybersecurity breaches
smart motorways keep updating according to changing
traffic conditions

WWW.ZNOTES.ORG
more efficient possible to increase the frequency of trains as the
traffic offences can be remotely penalized using ANPR possibility of delays is removed
car thefts can be spotted using ANPR easier to update changes in train schedules
minimizes human errors, reducing the rate of accidents
:
:
fear of the system being hacked into
If a hacker breaches security, the vehicle could be initial instalment costs are very high
controlled by them. ensuring passenger behaviour is vital, especially during
The system might come to a halt if it malfunctions. rush hours.
Systems with a poor design could compromise safety. human reluctance to new technology
The easy tracking of harmless people's movements is without drivers, CCTV monitoring will be continuously
made possible by ANPR equipment. Who can access such required
data?

Autonomous vehicles in transport


To properly execute their activities, autonomous cars require improvement in passenger comfort
sensors, cameras, actuators, microprocessors (along with reduced running costs, fewer staff
very complex algorithms). Automobile control systems can as most accidents are due to pilot-induced errors, safety
accomplish essential tasks by sensing information from is improved
cameras and ultrasonics. improved aerodynamics as an outcome of the removal of
Consider an autonomous vehicle approaching a set of red- the cockpit
lighting traffic signals.
:
The vehicle's control system must first recognize the road
security aspects due to the absence of pilots
sign before consulting the database to determine the
emergency situations may be difficult to deal with
appropriate action.
hacking into the system
The CPU must instruct the actuators to apply the brakes
passenger reluctance
and put the gear in "park" since the traffic light is red.
software glitches can be catastrophic
The light must be continuously watched until it turns
green.
After that, the CPU will again tell the actuators to engage 5.2. Health issues
first gear, let go of the brakes, and open the throttle
(accelerator). Long-term exposure to computing devices may have an effect
on user well-being.
Mentioned below are some of the health issues,
accompanied by their causes and prevention tactics:
safer due to the removal of human error 1. Repetitive strain injury (RSI): A condition effecting the
due to the more efficient operation of vehicles, it is better muscles and nerves
for the environment Cause: repetitive movements and overuse of muscles, such
reduced traffic congestion as wrists
increased lane capacity due Minimizing health risk: regular breaks, ergonomic equipment,
reduced travel times correct typing techniques.
stress-free parking for motorists 2. Back and neck strain: pack pain and other related issues.
Cause: due to prolonged use of monitors
:
Minimizing health risk: use adjustable chairs, use foot rests,
very high installation prices tiltable screens.
driver and passenger reluctance of the new technology 3. Eyestrain: strain and fatigue, unwanted harm to vision.
reduction in taxi requirements could lead to Cause: due to bad lighting and prolonged screen usage.
unemployment Minimizing health risk: use LCDs instead of CRTs, regular
maintenance of the sensors and cameras is crucial breaks, use anti-glare screens, regular eye-testing.
the ever-present fear of hacking into the vehicle’s control 4. Headaches: pain or discomfort in the head or face area.
system Cause: by incorrect lighting, screen reflections, flickering
screens, and so on.
Minimizing health risk: use anti-glare screens, take regular
breaks, regular eye-testing.
improved punctuality
5. Ozone irritation: inflammation and irritation of the tissues
reduced running costs due to fewer staff
lining human airways
no human error
minimized energy consumption

WWW.ZNOTES.ORG
Cause: inhalation of ozone released by laser printers in an Advantages
office. Use of sound and animation/video effects
Minimizing health risk: proper ventilation, laser printers Interactive/hyperlinks built into presentations
should be housed in a separate room, replace laser printers More likely to hold the audience’s attention
with inkjet printers, if possible. Disadvantages
Need for special equipment – expensive
May require internet access
6. ## 6.1. THEORY Distracts the audience from the sole content of the
presentation
Very easy to make a presentation with too many
ICT Applications features

Communication media Media streaming

Real-time transition of audio and video files over the


Newsletters and posters
internet
allows users to access content without downloading it to
Paper-based communication used to inform people about
their devices
their interests
popular services include Spotify, YouTube, and social
Schools use these to inform parents about events/dates
media websites
Advantages
uses buffering which makes sure the video plays back
Released regularly
smoothly without freezing. While the buffer receives data
The recipients have a permanent copy
packets, it sends previously received ones to the playback
Disadvantages
device, so that there are no gaps in the played data
Requires distribution
Advantages
There are no special effects; sound/video/animation
Users can access any information at any time and
There are printing costs; paper/ink
from any location
Targeted audience may or may not receive the
Offers an extensive library of content
information
Compared to traditional cable or satellite TV
subscriptions, media streaming can be more cost-
Websites
effective
Collection of webpages, text, graphics, video, and sound Disadvantages
Hosted on a web server on the internet Heavily relies on a stable and high-speed internet
Need to write code or use a web authoring application connection.
Hyperlinks to other pages can be added Not all content is available on every streaming
Interactive websites require programming knowledge platform due to licensing agreements and exclusivity
Can use a camera, scanner, and microphone to input data deals.
Usually, hire space from the web hosting company When streaming media, you don’t own the media, so if
Advantages the streaming service removes a movie or a TV show
Ability to add sound/video/animation from its library, it may no longer be accessible to you.
Links to other websites/hyperlinks
The use of hot spots e-Publications
Buttons to navigate/move around the website
digital versions of printed materials, such as eBooks, e-
Hit counters to see who has visited the websites
Magazines, and e-Newspapers.
worldwide advertising capability
can be read on electronic devices.
Disadvantages
Advantages
Can be hacked and modified or viruses introduced
aid portability
Need for a computer and internet connection
they are often more affordable than paperback books.
Lack of portability compared with the paper-based
offer interactive elements that enhance the reading
system
experience.
Need to maintain the website once it is set up
Disadvantages
reading from an electronic device for a prolonged
Multimedia Presentations
time can cause eyestrain
Uses a mixture of media to present information: e-Publications lack the tactile experience and physical
animations, video, sound, transitions, hyperlinks presence that some readers enjoy
Produced using software packages compatibility issues can arise if the e-Publications is in
Used with a projector so a large audience can view a format that is not supported by the reader's device

WWW.ZNOTES.ORG
or software individuals in making informed decisions and optimizing their
financial goals.
2. Bridge and building design: Computer modelling is
Mobile communication crucial in bridge and building design as it allows engineers
to simulate and analyze structural behavior
Mobile devices support many forms of communication, such assess load capacities, and predict the response to external
as: forces. It aids in optimizing designs, ensuring structural
1. Short message service (SMS) messaging: permits integrity, and minimizing potential risks before construction
extremely quick communication with another person via begins.
typing on a keyboard (a mobile phone or tablet's keyboard is 3. Flood water management: Computer modelling plays a
frequently virtual). Its benefit is that the recipient can get the vital role in flood water management by simulating water flow
text whenever they choose without having to be available. behaviour, predicting flood extents, and assessing potential
2. Phone calls: Making calls while on the go is among the flood risks. It helps design and optimise flood mitigation
most fundamental applications of a mobile phone. Mobile measures, such as levees and floodplain zoning, allowing
phones are the perfect method to stay in correspondence authorities to make informed decisions, develop effective
anywhere there is a network signal because they are so emergency response plans, and minimize the impact of
compact and have an independent battery. flooding on communities.
3. Voice over Internet Protocol (VoIP): a technique for 4. Traffic management: Computer modelling is employed in
communicating with Internet users. VoIP transforms sound traffic management to simulate and analyze traffic flow,
captured by the built-in mic of the cell phone into individual predict congestion patterns, and optimize traffic control
data packets that may be transmitted via the internet to their strategies. It aids in designing efficient road networks,
intended recipient. optimizing signal timings, and evaluating the impact of
4. Video calls: enables real-time video conversing between transportation infrastructure projects. This enables
multiple participants with a camera-enabled device. Uses an authorities to make informed decisions, alleviate congestion,
internet connection or cellular data. Software that may be and improve overall traffic efficiency for better urban
used for video calling includes; FaceTime, Skype, and Zoom. mobility.
5. Accessing the Internet: Another useful feature is the 5. Weather forecasting: Computer modelling plays a
ability to access the net from a mobile device. Any mobile pivotal role in weather forecasting by simulating the Earth's
device that has a wireless broadband connection or a mobile atmosphere, oceanic conditions, and other environmental
phone network can link to the internet. factors. These models use complex algorithms to predict
weather patterns, including temperature, precipitation, wind
speed, and storm systems. By assimilating real-time data,
6.2. Computer Modelling
computer models provide forecasts that aid meteorologists in
predicting weather conditions, issuing warnings, and helping
society prepare for potential hazards.
using models is less expensive than having to build the
Advantages of using computer modelling rather than
real thing
humans:
safer to use a computer model
can provide more precise and accurate results than
allows you to try out various different scenarios in
human-based methods, minimizing errors and
advance
increasing reliability.
nearly impossible to try out some tasks in advance in real
can analyze large amounts of data and perform
life due to high risk
complex calculations faster than humans
faster to use a computer model than to do the real thing
can be reused and updated easily, reducing the need
for repetitive manual analysis and potentially lowering
costs in the long run.
a model can’t be completely reliant as the output is Disadvantages of using computer modelling rather than
entirely based on the input humans:
frequently, computer modelling can be a very costly may overlook nuanced factors or intangible elements
option that humans can consider, leading to potential gaps or
human reluctance is a common problem in this inaccuracies in the analysis.
technology based on assumptions and simplifications, introducing
a level of uncertainty.
Some of the applications of computer modelling include:
their programmed algorithms and data inputs bind
1. Personal finance: Computer modelling in personal
models. They may struggle to adapt to unforeseen
finance involves using mathematical algorithms and data
circumstances or rapidly changing conditions that
analysis to simulate various financial scenarios, such as
humans can more readily navigate and respond to.
investment strategies, retirement planning, and risk
assessment, aiding

6.3. Computer controlled systems

WWW.ZNOTES.ORG
Robotics in manufacture: involves the use of automated
6.4. School Management Systems
machines to perform tasks such as assembly, welding,
and packaging. These robots are designed to mimic
Computer-controlled school management systems are
human actions with precision and speed, increasing
comprehensive software applications that automate
productivity and quality control. They offer benefits like
administrative tasks, such as attendance tracking, grading,
enhanced worker safety, improved efficiency, and the
scheduling, and student information management, improving
ability to handle repetitive tasks, revolutionizing the
efficiency, accuracy, and organization in educational
manufacturing industry.
institutions.
Advantages:
can work in environments that may be harmful to Advantages:
humans Absenteeism can be addressed more easily.
can work non-stop Parents are kept updated.
low running costs, majorly due to reduced employees Reduced workload for teachers.
thus less wages need to be given Disadvantages:
have higher productivity Operating the software will need training.
provide greater consistency The initial cost of the software is very high.
can do long, boring, tedious tasks Unauthorized access will have to be prevented as
can carry out different task by fitting them with there is lots of personal information
different-end effectors Learner registration and attendance
Disadvantages: ID cards with magnetic tapes: The students will have
robots find it difficult to do unusual tasks to swipe their ID cards, which contain the student’s
can cause higher unemployment name, school’s name, date of birth and the
robots do many of the tasks once done by humans, registration ID, when they enter and leave the school,
leading to deskilling this way time is saved and the attendance is more
robots are independent of the skills base, factory accurate.
headquarters can be moved internationally Biometrics: Every student’s fingerprint is stored on a
initial set-up and maintenance of robots can be database along with their personal information, the
expensive students must put their finger on a fingerprint scanner
Production line control: Computer-controlled systems in to enter or leave the school premises.
production line control involve the use of computers and Advantages of biometric over magnetic ID cards
software to monitor, coordinate, and optimize Unique fingerprints disable attendance forgery
manufacturing processes. These systems ensure efficient Portability makes them easy to lose
coordination of machinery, manage inventory, track Easy to be stolen due to small size
production metrics, and automate tasks. They enable ID cards can be easily cloned
real-time data analysis, error detection, and adjustment, Disadvantages of biometric over magnetic ID cards
leading to improved productivity, reduced downtime, and Time-consuming for all fingerprints to be individually
enhanced overall operational efficiency in the production collected
line. Expensive equipment is required to read fingerprints
Autonomous vehicles: Self-driving cars and drones If finger is cut/damaged, fingerprint won’t be readable
guided by computer algorithms. and access would be denied.
enhance safety There is an invasion of privacy in storing fingerprints
reduce traffic congestion on a school database.
increase fuel efficiency Learner’s performance
Advantages of using computer-controlled systems Spreadsheets can be used to record students’
rather than humans: performances. It is easier to compare each other’s
increased efficiency and productivity performances and an individual student’s
greater consistency performance over the academic year.
ability to work in any environment Computer-aided learning
reduced human error The use of computer-based technologies to help
can work with large or delicate items students acquire academic material is known as
Disadvantages of using computer controlled computer-aided learning (CAL). They are meant to
systems rather than humans: supplement classroom instruction, not serve its
very high installment costs purpose. Students will take online assessments to
very high maintenance costs track their progress while learning on computers.
dependency on reliable Although, CAL is not consistently able to assist a
lack of flexibility student with an issue; in certain circumstances,
requires costly backup systems students would need to get other aid.

WWW.ZNOTES.ORG
6.5. Online Booking Systems
These are web-based platforms and applications that allow PIN is checked to see if it is
users to reserve and purchase tickets or services for various correct
events and industries. Some of the applications of online Card is checked to see if it is
bookings include: PIN is entered using the valid
1. Travel industry: Booking flights, hotels, and holiday keypad If card is stolen or number of
packages, provides a convenient platform for travelers to PIN attempts allowed is
plan and book their trip. exceeded, transaction is
2. Concerts: Reserving tickets for live music events, allows closed.
music fans to secure their spot at popular concerts. A number of options are
3. Cinemas: Booking movie tickets in advance, enables given: change PIN, pay in
cinema-goers to reserve seats and avoid queues. cheques, pay a bill, see
4. Sporting events: Purchasing tickets for sports matches and balance, get money
competitions, offers sports enthusiasts an easy way to attend
The customer selects the
their favorite events.
cash option & several cash
Advantages: options are shown
convenience and accessibility The customer’s account is
instant confirmation and ticketing accessed to see if they have
ability to compare prices and options sufficient funds, it is checked to
promotions and personalized offers see if they are withdrawing
The customer accepts one of
faster to change/update more than their daily limit.
the options or types in a
automated reminders via email/text If limit not exceeded and all
different amount
repeated bookings can be easily made other checks are OK, then the
cost-saving as there are fewer wages due to reduced transaction is authorized, the
staff requirements cash is then counted out by the
Disadvantages: machine
potential for technical issues The customer is asked if they
possible security and privacy concerns want a receipt
transaction and booking fees The card is returned
impersonal customer service
Money is dispensed Customer’s account is updated
dependent on a stable internet connection
can lead to unemployment
possible to withdraw any time of the day
offer many banking services without having to go to
6.6. Banking Applications the bank
possible to access an account from anywhere in the
In order to avoid double scheduling, which might occur if
world
the system reaction time was slow, online banking
usually provides quicker service than waiting in a
systems depend on the capacity to update files instantly.
queue in a bank
The use of computer technology has revolutionized how
Disadvantages:
we do our banking transactions, for example:
often in places where theft can take place at night
Internet banking
potential for shoulder surfing
The use of automated teller machines (ATMs)
some banks charge customers for using ATMs
Chip and PIN technology
cash withdrawal limits are often imposed on people
Automated teller machines (ATMs)
Electronic Funds Transfer (EFT):
Automated teller machines (ATMs) are places where
It is possible to send money transfer instructions directly to a
customers can get cash (or carry out certain other banking
bank's computer system via the electronic funds transfer
activities such as order a statement) using their credit or
(EFT) technology. The entire system depends upon electronic
debit card.
transfers of money between accounts; no actual cash is
moved. The computer system automatically moves the
requested amount from an account to another when it
Customer puts card into Contact is made with bank’s receives an EFT command.
ATM computer

WWW.ZNOTES.ORG
very secure payment method slow method of payment
very quick payment method easier for fraudsters than other methods
less expensive than cheques relatively expensive payment method
customer has right to dispute an EFT payment for up
to 60 days Internet Banking
Disadvantages:
the bank transaction can’t be reversed without full Enable online access to banking services via a secure website
dispute investigations or app, allows for transfers, bill payments, account
customer needs to have funds available immediately management and more.
cannot guarantee the recipient’s identity
:
convenience and availability
Credit/debit card transactions
easy account management
Several credit/debit cards come with both a magnetic stripe branch visiting won’t be a requirement
plus a chip; the chip houses important data like the PIN. interest rates may be better
Because it is superior to depending solely on a signature, this easier to shop around for the best account
technique is intended to increase security. Having a chip and Disadvantages:
PIN card to make purchases is an example of an electronic security of transactions
funds transfer (EFT). requires a reliable internet connection
More risk of fraud
Advantages of credit cards: Easier to make errors
customer protection if ordered goods don’t arrive Physical cash can't be deposited/withdrawn
internationally accepted payment method
interest-free loan if money paid back within the 6.7. Computers in Medicine
agreed time period
can make purchases online
Information systems in medicine
Disadvantages of credit cards:
can be charged high-interest rates Patient records: Healthcare professionals maintain
annual fees often apply databases so that information can be communicated
easy to end up with credit damage between them and pharmacists (for instance, to
security risks in online transactions guarantee no medications are administered that interact
Advantages of debit cards: dangerously with one another).
money comes from the user’s current account, there Pharmacy records: Pharmacy records maintain a
is no interest comprehensive record of prescriptions filled for patients.
safer than carrying cash This includes details like the prescribed medication,
can make online purchases dosage, quantity dispensed, prescribing physician's
Disadvantages of debit cards: information, and the date of dispensing. These records
less customer protection if goods don’t arrive help track medication usage and can be used to verify
no credit allowed; funds are needed on the time of prescription accuracy and detect potential drug
purchase interactions or allergies.
security risks in online transactions

Cheques 3D Printers

Individuals and organizations use cheques as a form of Using 3D printers in medicine:


payment. When issuing a cheque, the payer writes the Prosthetics: 3D printers are used to print out artificial
recipient's name, the payment amount, and the date on the body parts such as false teeth, artificial limbs, hearing
cheque. The recipient then deposits or presents the cheque aids, etc. This is a less expensive method of replacing
to their bank for processing. The payer's bank verifies the body parts.
fund’s availability, and upon clearance, the specified amount Tissue engineering: it is the field of combining cells,
is transferred from the payer's account to the recipient's biomaterials, and engineering principles to create
account, completing the transaction. functional tissues or organs, aiming to repair or
replace damaged or diseased tissue in the human
:
body.
more convenient and safer than cash
Artificial blood vessels: these are synthetic structures
can be post-dated
designed to mimic the function of natural blood
can be traced if they are lost
vessels, facilitating the flow of blood and nutrients
Disadvantages:
aren’t legal tender and can be refused

WWW.ZNOTES.ORG
throughout the body to support tissue repair and
regeneration.
Customized medicines: these are personalized drug It is a repository of facts
formulations tailored to individual patients' specific stores all the knowledge about an area of expertise
a collection of objects and their attributes
needs. They utilize advanced technology and precise
measurements to create medications with accurate 5
dosages and unique compositions, optimizing
treatment outcomes. The rules base is a set of inference rules.
Used by the inference engine to draw conclusions
6.8. Expert Systems They follow logical thinking

It is an AI-based computer program that emulates the How an expert system is used to produce possible
decision-making capabilities of human experts. It uses solutions
knowledge and rules to provide accurate advice or solutions
in a specific domain. Given below is an example of how an expert system works to
Examples include: diagnose a medical issue:

Diagnostics The interactive screen asks a series of questions for the


Mineral prospecting doctor to answer, using a keyboard or a touch screen.
Tax and financial calculations The inference engine compares the symptoms with the
Strategy games knowledge base, using the rule base to find matches.
Identification of plants, animals and chemical compounds The system suggests the possible illness with a probability
Route scheduling for delivery vehicles of each, cures, and recommendations on the next step to
be taken.
The explanation system will explain how that particular
diagnosis was suggested.

6.9. Computers in the Retail Industry


Point of sale (POS) terminals: Computerized systems used at
checkout counters to handle purchases and oversee stock.
Extensively used in retail stores to process sales transactions.
They enable quick and secure payment processing through
various methods, including cash, credit/debit cards, mobile
payments, and even digital wallets. POS terminals calculate
totals, generate itemized receipts, update inventory, and
1 provide real-time sales data for effective business
management.

This is the only thing that the end user sees Some features include:
Allows the user to interact with the system update stock files immediately
Often requires training to operate effectively track inventory levels in real-time
prevent stock discrepancies and ensure accurate
records
Informs the user of the reasoning behind the expert monitor inventory levels and reorder when stock is
system’s conclusions lower than a predefined value
Will supply a conclusion and any suggested actions to take streamline supply chain management and minimize
It will also give the percentage probability of the accuracy stockouts
of its conclusions
Electronic funds transfer at Point of sale (EFTPOS)
terminals: Devices used for processing electronic payments,
they allow customers to make payments using debit or credit
The main processing element of the system cards by securely transferring funds from their bank accounts.
Acts like a search engine examining the knowledge base EFTPOS terminals authenticate and authorize transactions in
Responsible for gathering information real time, providing convenience and security for both
This is the problem solving part of the system customers and businesses during retail purchases.
Attempts to use information gathered from the user to The process of checking credit and debit cards at a
find a matching object supermarket EFTPOS is much the same as was described for

WWW.ZNOTES.ORG
paying a restaurant bill in Section 6.6.
6.10. Recognition Systems
Some functions of EFTPOS include:

Use of chip and PIN cards:


Enhance security with two-factor authentication
School registers: Paper-based registers are fed into OMR
Require customers to enter a personal identification
to be scanned and then stored in a database.
number (PIN)
Multiple-choice examination papers: The position of a
Use of contactless cards:
mark is stored in a computer’s memory after being read
Allow for faster transactions
by the OMR a device using a template that maps out the
Enable customers to tap their card on the terminal
X-Y coordinates of each lozenge (pen/pencil mark).
Use of Near Field Communication (NFC):
Used at POS terminals for scanning and reading the
Facilitate payments through smartphones and other
information stored in barcodes.
devices Many digital devices have OMR scanners in them, these
Increase convenience for customers may be used for scanning QR codes.
Communication between supermarket computers and
Advantages:
bank computers:
very fast way of inputting the results of a survey
Share transaction details securely
more accurate than keying in data
Enable instant payment processing and verification
more accurate than OCR methods
Disadvantages:
designing the forms is a very complex job
Internet Shopping
there can be problems if they haven’t been filled
correctly
often only work with black pens or pencils
Online stores accessible through web browsers
A wide variety of products and services are available
Convenient and often open 24/7
Automatic Number Plate Recognition (ANPR) systems:
The sensor sends a signal to instruct a camera to
capture an image of the front of the vehicle
access to global market An algorithm is used to locate and isolate the number
comparison between different products effortlessly plate from the image taken by the camera.
can shop from anywhere in the world The brightness and contrast of the number plate are
able to avoid queues and busy stores first adjusted. Each character on the number plate is
then segmented.
Each character is then recognized using OCR
software. The characters are converted into a string of
can target prices, and services based on buying data
editable text by the software.
can update stock availability and prices more quickly than
This text string is then stored in a database.
a physical store
A barrier is raised and the motorist is issued with a
cheaper to publicize special offers
ticket. The ticket shows the date and time of entering
international customer base
the car park.
increased profits due to lower staff
When the car returns to the car park, they insert their
ticket into a machine that calculates their charges and
registers the payment into the database.
security concerns Advantages:
can’t properly examine products before purchase Used to automatically monitor the average speed of
occasionally, products may take weeks before being vehicles over a stretch of road.
delivered No need to employ a car park or security guards.
additional shipping and handling costs Much faster system than having to check a ticket at
lack of face-to-face interaction with staff the exit.
Can be used to automatically control the entry and exit
to a car park or private roads.
increased competition Can be used as a security system; preventing illegal
digital fraud and security concerns parking.
technical issues and downtime Can be used to analyze driver behavior.
costs of delivery and return Can be used in inner-city congestion charging
fake negative reviews can lead to a bad company systems.
reputation Disadvantages:

WWW.ZNOTES.ORG
A lack of manned security car park surveillance could
lead to vandalism.
There could be an invasion of privacy issues due to the Enables short-range wireless communication between
recording of drivers’ number plates. devices.
Damaged or very dirty number plates will not be Allows payment using a smartphone.
recognized. Advantages:
ANPR system only recognizes the number plate and Convenient and secure method of payment
not the car, so it is possible for a car to be fitted with a allows for contactless transactions
cloned number plate thus bypassing car park security, Disadvantages:
for example. Limited range
compatibility issues with some devices

Tracking of stock using RFID involves either tracking


livestock (on a farm) or goods in a shop, supermarket, or Usually refers to automated technologies for
distribution center. authenticating and verifying human body characteristics
RFID in passports: such as face, iris, retina, finger, thumb, hand and voice.
The data on the RFID chip is read when the passport is Advantages:
scanned. very high accuracy
A photo of you is clicked which is then compared with very easy to use
the image stored in the RFID chip. very fast verification time
If the face recognition passes, some checks are made non-intrusive method
in turn to make sure you are eligible to enter the relatively inexpensive technology
country, and if you are, the gate opens automatically. Disadvantages:
RFID in automobiles: it can make mistakes if the skin is dirty or damaged
Tags allow or deny access to parking in a secure, very expensive to install and set up
private car park. uses a lot of memory for the data to be stored
RFID tags in lorries and delivery vans can be used at a person’s voice can be easily recorded and used for
weigh stations to ensure the vehicle is not carrying too unauthorized access
much weight. an illness, such as a cold, can change a person’s voice,
RFID tags can be used on a car production line to track making absolute identification difficult or impossible
its progress through the assembly process.
RFID in contactless payments: 6.11. Satellite Systems
The embedded chip on credit/debit cards and the
antenna enable customers to wave their card over a Global Positioning Systems (GPS)
reader at the point of sale terminals to make
payments Used to determine the exact location of several modes of
Smartphone apps can also be used to make transport
contactless payments. Cars usually refer to GPS as satellite navigation systems
Advantages: Satellites surrounding the Earth transmit signals to the
No line-of-sight contact is necessary. surface
It is a very robust and reliable technology. Computers installed in the mode of transport receive and
Tags are much more difficult to forge than barcodes. interpret these signals
RFID tags can reduce the number of staff needed in, Knowing their position on the Earth depends on very
for example, a warehouse because tracking of items is accurate timing – atomic clocks are used in the satellites
automatic (thus reducing costs). which are accurate to within a fraction of a second per
It provides a very fast read rate. day
It allows bi-directional data transfer. Each satellite transmits data indicating its position & time
Bulk detection is possible. The computer on board the mode of transport calculates
Disadvantages: its exact position based on the information from at least
Tag collision – this is when the signals from two or three satellites
more tags overlap, interfering with each other.
Because RFID uses radio waves, they are relatively
easy to jam or interrupt.
Used to determine the exact location of a car.
Relatively easy to hack into the data/signal transmitted
The computers onboard can be used to show directions to
by the tag.
a destination.
e initial cost of an RFID system is more expensive than
a comparable barcode system. :

WWW.ZNOTES.ORG
Better focus as there isn’t a need to constantly check They have very high bandwidth.
paper maps. It is relatively easy to expand the network.
Reduces fines by warning drivers about upcoming speed Security in satellite transmission is very good due to the
changes. fact that data is coded and the receiver requires decoding
The system shows an Estimated Time of Arrival (ETA). equipment.
Possible to program in the fastest route, a route to avoid During emergency situations, it is relatively easy to move
towns. stations on the ground from one place to another.
The system can also give useful information such as the They are well-suited for broadcasting.
location of petrol stations. Enable mobile communication in very remote locations.

If the maps are not kept up to date, they can give incorrect There is a time delay in receipt of the signals.
instructions. The signals received can be affected by bad weather.
Road closures due to accidents or roadworks can cause Sunspot activity can affect the performance of a satellite.
problems. they need to be monitored and controlled on a regular
The loss of satellite signals can cause problems. basis to ensure they remain in the correct orbit.
If an incorrect start-point or end-point is keyed in the
system will give incorrect information.
7. The systems life cycle
Geographic Information Systems (GIS)
Stages of Analysis:
Used to capture, manage, analyze, and display
geographically referenced information. 1. Analysis
Use to determine the distance between two places. 2. Design
Used to find the nearest petrol station or restaurant, etc. 3. Development & Testing
To protect animal and plant life in certain vulnerable 4. Implementation
places. 5. Documentation
Can be used in geography, science, or engineering 6. Evaluation
lessons.
7.1. Analysis of the current system

Allows geographical and thematic data of any kind to be The current system is studied using four different
methodologies. These are the four techniques:
combined in a way that shows how they are connected to
each other. Observation:
It allows the handling and exploration of huge amounts of involves watching users interact with the system to
data. figure out its workings
It allows data to be integrated from a wide range of very it is used for understanding how users interact with
different sources.
the current system
Advantages: provides first-hand, unbiased information
Disadvantages: can be time-consuming, may not
The learning curve on GIS software can be very long. reveal all issues
GIS software is very expensive. Interviews:
GIS requires enormous amounts of data to be input. direct one-to-one conversations with users on their
It is difficult to make GIS programs that are both fast and experience with the current system
user-friendly. used to gather comprehensive information about
individual users
Media Communication Systems Advantages: allows for in-depth exploration of issues
Disadvantages: relatively expensive, time-consuming,
Using satellite signals for communication. no user-anonymity which may affect the response
Used by media companies when sending Questionnaires:
stories/videos/pictures from remote locations. set of predetermined questions is given to the users to
complete and give their opinion on the current system
: it is majorly used in collecting data from a larger
They have good global coverage. group of people
They are cheaper, faster, and safer than laying cables in Advantages: allows for quantitative analysis, efficient
difficult or treacherous terrain. data collection, questions can be answered quickly

WWW.ZNOTES.ORG
Disadvantages: limited by predetermined questions, 3D printers,
may suffer from low response rates, users may monitors,
exaggerate answers due to anonymity speakers.
Examination of existing documents: Identifying suitable software needed for the new system
reviewing system documentation, user guides, or considering functionality, compatibility, and ease of
reports use
understanding the current system's design and any justifying choices based on user requirements and
known issues system efficiency
Advantages: provides insights into the system's Software that needs to be considered:
history, can reveal previously unknown issues operating system,
Disadvantages: may be an outdated or incomplete, applications software,
time-consuming, rather expensive method. size of storage,
type of storage.

Record and analyze information about 7.2. Design


the current system
Once the analysis has taken place and the systems analyst
has some idea of the scale of the problem and what needs to
be done, the next stage is to design the key parts of the
Data that is inputted, processed, and outputted into the recommended system.
system are identified.
Problems with the current system are identified. What File/Data Structures
could be improved?
The requirements of the user and the potential new Field length: number of characters allowed in a field
system are identified. What is the new system meant to Field name: an identifier for the field in the data structure
do? Data type: specifies the kind of data that can be stored in
Problems: issues that users face with the current system a field, e.g. text, numbers, dates
User requirements: what needs to be added to the new Coding of data: using codes to represent data, e.g. M for
system male, F for female
Information requirements: data or information the new
system must process Input Formats

New System Requirements Specification: Data capture forms: designed to collect data from users
• Once the systems analysts have completed the analysis in a structured format, they come in two types: paper-
stage of the systems life cycle they should be fully aware of based and electronic-based. Paper-based data-capturing
the limitations of the current system. forms need to be carefully designed with headings,
• The next step will be to design a new system (normally concise instructions, character and information fields,
computer-based) to resolve the problems identified by the checkboxes, and enough writing space. Text boxes, on-
users and the systems analyst. screen help, drop-down menus, radio buttons, automatic
• The Requirements Specification will be created which will validation, and control buttons for data entry are all
outline the required improvements and expectations for the features of computer-based forms.
new system. Consider a user-friendly layout, clear instructions, and
appropriate data fields

System specification Output Formats

Screen layouts: how information is presented to users on


a screen
Vital to identify the suitable hardware needed for the new Report layouts: how information is organized in a printed
system or digital report
contemplating system requirements, compatibility, Consider readability, visual appeal, and efficient use of
costs space
justifying choices based on user needs and system
performance Validation routines
Hardware that needs to be considered:
barcode readers, It is a method of examining data that has been submitted to a
scanners, computer to determine if it meets specific requirements. It is
touch screens,

WWW.ZNOTES.ORG
a routine check that the computer does as part of its Extreme data: values at the limits of acceptability (E.g. 1
programming. or 12)
1. Range check: ensures data is within a specified range of
values What is live data?
2. Character check: ensures data contains only allowed
characters Data that has been used with the current system
3. Length check: ensures data is of a specified length Hence, the results are already known
4. Type check: ensures data is of the correct data type
5. Format check: ensures data conforms to a specific format 7.4. System Implementation
6. Presence check: ensures data is present and not left blank
7. Check digit: a digit added to a number to verify its accuracy The system must then be fully implemented after it has been
thoroughly tested.
7.3. Testing We will now think more carefully about switching to the new
system. Four popular techniques are utilized to transition
Guarantees the system's functionality before it is put into from the old system to the new one.
use. Before selecting the approach best suited for a given
Identification and removal of errors, thus improving application, the pros and cons of each must be carefully
system reliability and performance. considered.

Test designs 4 Methods of Implementation

Test data structures, file structures, input formats, output


formats, and validation routines
The old system is replaced by the new system
Ensure all components function correctly and interact
immediately
seamlessly
Used when quick implementation is necessary
Advantages
Test strategies
fast implementation
Test each module: verify individual components function cost-effective as only one system is in operation
as intended Disadvantages
Test each function: ensure all features work correctly High risk of failure
Test the whole system: confirm overall system no fallback
performance and integration users can’t be trained on the new system

Test plan
Both current and new systems run simultaneously for a
Test data: specific data used for testing purposes period before the old system is phased out
Expected outcomes: predicted results based on test data Used when a smooth transition with minimal risk is
Actual outcomes: results obtained from testing required
Remedial action: steps taken to fix identified issues Advantages
Lower risk
Test data types easy system comparison
Disadvantages
The following data types will be explained using the example
Time-consuming
of months in a year.
resource-intensive
Normal data: valid and expected data values within the
range of acceptability, have an expected outcome. E.g.
any whole number between 1-12. The new system is implemented in a small, controlled
Abnormal data: invalid or unexpected data values. This environment before full-scale implementation
can either be: Used when testing the new system in a real-world setting
Data outside the range of acceptability or Advantages
Data that is the wrong data type Low risk as only trialed in one
In this case, examples could be… department/center/branch
any value less than 1 (i.e. 0, -6, etc.) allows for fine-tuning
any value greater than 12 (i.e. 13, 15, etc.) staff have time to train with the new system
letters or nun-numeric data (i.e. July, etc.) few errors as it's fully tested
non-integral values (i.e. 3.5, 4.2, etc.)

WWW.ZNOTES.ORG
Slower implementation overcome problems
potential inconsistencies
confusion as there are 2 systems in use Purpose of the system: Explanation of the system's
no backup for the department/center/branch using the intended function and goals
new system Limitations: Known constraints or issues with the system
Hardware & software requirements: Necessary
equipment and software to run the system
Loading/running/installing software: Instructions for
The new system is implemented in stages, with each setting up the system on user devices
stage replacing a part of the old system Saving files: Procedures for storing data within the system
Used when a gradual transition is preferred to minimize Printing data: Steps to produce hard copies of system
disruption data
Advantages Adding records: Instructions for creating new entries in
reduced risk the system
easier to manage Deleting/editing records: Guidelines for modifying or
Disadvantages removing existing entries in the system
Takes longer Input format: Structure and format for entering data into
potential compatibility issues the system
Output format: Structure and format for presenting data
7.5. Documentation generated by the system
Sample runs: Examples of system operation, including
In the life cycle of a system, documentation enables the input and expected output
correct recording of design, implementation, testing, and Error messages: Explanations of system warnings and
maintenance data, facilitating effective communication, error notifications
troubleshooting, and potential future improvements. Error handling: Steps to resolve issues and errors within
Technical documentation: detailed information on the the system
system's inner workings and programming for developers Troubleshooting guide/helpline: Assistance for diagnosing
and IT staff and addressing common problems
Used to maintain, repair, and update the system with Frequently asked questions: Answers to common user
improvements inquiries
Glossary of terms: Definitions of key terms and concepts
Purpose of the system/program: Explanation of the related to the system
system's intended function and goals
Limitations: Known constraints or issues with the system
Program listing: The code or scripts used in the system
7.6. Evaluate a solution
Program language: The programming language used to
It measures the productivity, efficiency, and compliance of a
develop the system
system with its goals in order to identify its strengths,
Program flowcharts/algorithms: Visual representations or
shortcomings, and potential development areas. This
descriptions of the system's logic and processes
assessment informs decision-making and improves overall
System flowcharts: Visual representations of the
performance over the course of a system's life cycle.
interactions between system components
Hardware & software requirements: Necessary
Assess the ef f i ciency of the solution:
equipment and software to run the system
File structures: Organization and layout of the system's Analyze the system's efficiency in terms of time, money,
files and data
and resource use. Examine whether the system is
List of variables: Collection of variables used within the
performing at its best or if its efficiency could be
system, including their names and purposes
increased.
Input format: Structure and format for entering data into
Provide examples of specific aspects that contribute to
the system the system's efficiency
Output format: Structure and format for presenting data
Identify areas that may be consuming excessive
generated by the system
resources or time, and suggest ways to optimize them
Sample runs/test runs: Examples of system operation,
Questions to ask:
including input and expected output
Does it operate quicker than the previous system?
Validation routines: Techniques used to check and confirm
Does it operate by reducing staff time in making
the accuracy of data entered into the system
bookings?
User documentation Does it operate by reducing staff costs?
Instruction and guidance for end-users on how to operate the
system. Used to help users effectively use the system and
Evaluate the ease of use:

WWW.ZNOTES.ORG
Look at the solution's usability and accessibility for the
target market. Check to see if the system is simple to Safety & Security
understand and use, and if users have no trouble
completing their jobs.
Safety issues
Describe the user interface and how it facilitates
interaction with the system
1. Electrocution: ICT devices require electrical power to
Mention any feedback from users regarding their charge or run, the electrical device can cause electrocution,
experience with the system, and address any issues
which is caused by the electric current moving through a
they encountered
body, causing fatal injuries and/or death.
Questions to ask:
There are multiple causes for electrocution, including:
Are all the users able to use the system and make
bookings easily? Contact between liquid substances and electronic devices:
Are all the users able to change and cancel bookings Keep liquids away from electrical equipment.
easily? Open cables: make sure that cables are entirely insulated
Can all staff understand how to use the system with and packed, and use circuit breakers or fuses to prevent
minimal training? electrical overload.

Determine the suitability of the solution: 2. Fire: ICT devices require electricity to charge or run, too
many devices using a single socket can cause the plug socket
Examine how well the implemented solution satisfies the to overload, and heat is generated by too much electricity,
desired outcome by contrasting it with the original task causing the wiring to degrade and ignite a fire.
criteria. The causes and reduction tactics for fire include:
Outline the initial objectives of the system and discuss
how the solution addresses each one Socket overload: Ensure enough plug sockets in the room,
Highlight any requirements that may not have been don’t plug too many devices into the same plug
fully met and discuss possible reasons for this socket, and don’t leave devices plugged in and
Questions to ask: unattended.
Is the system suitable for each of the departments? Overheated equipment: Ensure that equipment is
Does it meet the needs of the customers? properly ventilated and not obstructed, keep flammable
Does it meet the needs of the staff? materials away from heat sources, regularly check
Does the solution match the original requirements? equipment for signs of wear or damage, use fire
extinguishers in case of emergencies, turn off or unplug
Collect and examine user feedback: devices when away from the location, do not cover any air
vents on devices.
Collect users' responses to the results of testing the
3. Trailing cables: Devices can be plugged in using cables,
system. Their feedback can provide insights into potential
cables that are protruding can cause an accident, you can trip
issues and improvements, and help determine overall
over a cable left out in a location, and body damage can occur
user satisfaction
during a fall, for example, breaking bones, ligament damage,
Summarise the testing process, including test data,
bruising, sprains, etc. depending on the area fell on
expected outcomes, and actual outcomes
Trailing cables causes and prevention strategies:
Discuss users' reactions to the system, addressing
any concerns or suggestions they may have Unorganized/insecure cables: use cable ties to secure
cables, keep cables properly packed under, let’s say, a
Identify limitations and suggest necessary table, therefore not coming in the way of walking paths,
improvements: use wireless devices where possible, and regularly
inspect cables for signs of wear or damage.
Based on the analysis of efficiency, ease of use,
appropriateness, and user feedback, identify any 4. Heavy falling equipment: Devices have varying levels
limitations in the system and suggest necessary of weight and if a device falls on you it could cause injury,
improvements any device should be placed in a secure location, like a PC
List the limitations and provide explanations for each on a strong desk and not near the edge.
one Causes and reduction tactics for falling equipment:
Recommend specific changes or enhancements for
these issues Improperly secured equipment: Ensure that equipment
is properly secured and stable, regularly check the
stability of locations containing devices.
8. ## 8.1. THEORY Equipment on unstable surfaces: Keep equipment
away from edges and other potential hazards, and
regularly

WWW.ZNOTES.ORG
inspect equipment and locations containing devices for Medical history
signs of wear or damage. Threats that can be avoided by protecting personal data:
Identity theft
8.2. Data protection Privacy breaches
Misuse of the information
The Data Protection Act (DPA) controls personal data Data be sold to third-party companies
collection, storage and processing. Individuals could be held to ransom over personal
data gathered
In the UK, the European Union’s General Data Protection could be used to commit a physical crime
Regulation (GDPR) How to avoid inappropriate data disclosure:
Protects personal data, whether stored on paper or a Personal data must be kept confidential and protected
computer system through privacy settings on websites such as social
media or strong passwords on websites where
Principles of the Data Protection Act personal data is held or used
Access to personal data should be limited to
Data must be processed lawfully, fairly, and transparently, authorized individuals
with clear consent from the individual. Think before you post - consider what information
Data should only be collected for specific, explicit, and could be gathered from your image or content
legitimate purposes. Check website details about the collection, storage,
Organizations should only collect and retain the minimum and use of personal data
personal data necessary for their stated purpose. Only access websites where personal data is used or
Data should be accurate and up-to-date, and reasonable viewed when on a secure, encrypted connection
steps must be taken to rectify or erase inaccurate
information.
Personal data should not be kept longer than necessary eSafety
and should be securely deleted when no longer needed.
Organizations must protect personal data against E-safety is about knowing about and using the internet safely
unauthorized or unlawful processing, accidental loss, and responsibly
destruction, or damage. It refers to when an individual is using the internet, email,
social media, online gaming
Why is data protection legislation required? E-safety refers to the individual knowing how to protect
themselves from potential dangers and threats
Protecting Individual Rights: Data protection legislation
safeguards individuals' right to privacy and control over
The need for eSafety:
their personal information.
Preventing Misuse of Personal Data: It helps prevent awareness that personal information should not be
unauthorized access, identity theft, fraud, and other forms shared freely
of data misuse. awareness of how to act online and how to avoid falling
Promoting Trust: Data protection laws build trust between victim, creating a safe and respectful online environment.
individuals and organizations by ensuring their personal identify and avoid online scams, phishing attempts, and
information is handled responsibly. fraudulent websites that may try to trick them into sharing
Encouraging Responsible Data Handling: Legislation personal or financial information.
promotes responsible data collection, storage, and mindful of online behavior and interactions, protecting
processing practices among organizations. your digital reputation, which can have long-term
Enabling Data Subject Rights: Legislation grants consequences in your personal and professional life.
individuals rights such as access to their data, right to have control over privacy settings on social media
rectification, erasure, and objection to processing. platforms, limiting who can access/view personal
information and posts.
avoid encountering explicit or harmful content online,
Personal Data reducing the risk of exposure to inappropriate material or
online predators.
Refers to information that can be used to identify an engage in online gaming responsibly, avoid sharing
individual personal details, and behave respectfully towards other
Examples players.
Personal Name protecting devices from malware, viruses, and other
Address online threats, preventing data loss, privacy breaches, or
Date of birth device damage.
A photograph in school uniform

WWW.ZNOTES.ORG
develop responsible online behaviors, promoting Hacking: Unauthorized access to computer systems or
respectful conduct while interacting with others online. networks to gain control, steal information, or cause
maintain a healthy balance between online and o ine damage, thus leading to identity theft, privacy breaches,
lives, reducing the risk of addiction, mental health issues, and misuse of data
or negative impacts on relationships and self-esteem. Phishing: Deceptive emails or messages that are
received from trusted sources to trick individuals into
Safety Suggestions: revealing personal data
Pharming: Manipulation of DNS (Domain Name System)
The internet: to redirect users to fraudulent websites, often to steal
Use trusted websites recommended by teachers or personal data
reputable sources Smishing: Phishing attacks carried out through SMS or
Utilize search engines that only allow access to age- text messages
appropriate websites and use filters to ensure Vishing: (aka voicemail phishing) Phishing attacks
inappropriate content is not seen carried out through voice messages to trick users into
Never reveal personal information calling the telephone number contained in the
Email: message
Be aware of the potential dangers of opening or Viruses and malware: Viruses are program codes that
replying to emails from unknown people, including can replicate/copy themselves to cause data loss or
attachments, potential dangers include phishing, corruption. Malicious software designed to disrupt,
spam damage, or gain unauthorized access to computer
Ensure you know who the email is for when systems or networks
considering sending personal data or images via Card fraud: Unauthorized use of credit or debit card
email, only with people you know and not with information for fraudulent purposes which can be caused
identifiable content like school photos by shoulder surfing, card cloning, or keylogging.
Social media:
Know how to block and report people who send
content or messages that are unwanted Protection of data
Know where the privacy settings are to reduce the
number of people who can see your posts or images Multiple techniques are implied for the protection of data,
Be aware of the potential dangers associated with inclusive:
meeting online contacts face to face, do not meet 1. Biometrics:
anyone you do not know, if you do, take an adult and
meet publicly. Individuals' distinctive physical or behavioral traits, such
Do not distribute inappropriate images and as fingerprints, faces, or irises, can be used for access
inappropriate language control and verification. Since biometric data is hard to
Respect the confidentiality of personal data belonging fake or duplicate, it offers a more secure form of
to other people identification.
Only accept friend requests from people you know
Parents should be aware of what you are doing online,
discuss what you are doing online
A digital record that attests to a website's reliability and
Do not post images or details that can be used to
veracity A digital certificate is used to provide safe
locate you
communication and to build confidence between parties.
Online gaming:
Identifier data, the entity's public key, and a third party's
Do not use real names as usernames
digital signature are frequently found in digital
Never share personal or financial details with other
certificates.
players
Know how to block and report players for
inappropriate messages or comments
Sensitive Data is data that might result in loss of an a protocol that creates a secure connection between a
advantage or level of security if disclosed to others. ie, client computer and a server. SSL ensures that
ethnicity, religion, criminal record, etc. At the same time, information communicated between a server and client
personal data can be used to identify the user, i.e., stays private and cannot be intercepted or changed by
passport number, name, age, etc. unauthorized parties. a website's identification for it is the
S at the end of HTTP.

8.3. Threats to data


There are multiple methods by which data can be threatened, Creating data in a format that cannot be read without a
including: decryption key Data on hard drives, emails, cloud storage,
and secure websites (HTTPS) are all protected by

WWW.ZNOTES.ORG
encryption. Without a decryption key, it assures that even An essential aspect to remember while designing ICT
if unauthorized people obtain data, it cannot be decoded. solutions is to ensure that they are user-friendly. This
means that they should be intuitive to use, require
minimal training, and have easy-to-understand
instructions
A firewall is a network security device used to monitor and
Additionally, ICT solutions should be accessible to all
manage incoming and outgoing network traffic. Its goal is
users, including those with disabilities. This could involve
to separate an internal network from other networks by
adding features like voice commands, large text options,
filtering data according to established criteria. It assists in
or compatibility with assistive devices
preventing malware, unauthorized access, and other
Once the solution is created, it is crucial to test it to
network risks.
ensure it functions as expected and fulfills the users'
needs effectively

A security mechanism that requests two different kinds of Analyzing audience requirements:
identification from users to confirm their identity To
provide an additional degree of protection outside of just Designing an ICT solution requires an understanding of
a username and password, 2FA was created. Typically, it the target audience. The study should take into account
combines something that uniquely identifies a user, like elements that may affect the audience's capacity to use
biometric data with something the user has, like a the solution, like their age, technical proficiency, and
smartphone and a token, or something they know, like a expertise.
password. The audience's requirements for information should be
known by the solution creator. This could serve as a
design cue for the data processing elements and the
information architecture.
A typical authentication technique uses a password plus a
The design is also influenced by how the audience utilizes
secret code (user ID) as a means of identification To
and consumes the content. For instance, the answer
strengthen the security of data, user IDs and passwords
should be mobile-friendly if the audience accesses it
are used to restrict access to only authorized users. Using
mostly through mobile devices.
secure passwords and changing them frequently is critical
Finally, the designer should take into account any unique
to ensure security. When creating passwords, it is advised
requirements of the audience, such as visual or auditory
to utilize a mix of uppercase, lowercase, digits, and
impairments. These requirements should be taken into
special characters.
account when designing the solution, ensuring inclusivity.

9. ## 9.1. THEORY 9.2. Copyright


What makes copyright necessary?
Audience
To safeguard the rights of developers and innovators,
copyright regulation is crucial.
Audience Appreciation
It stops software piracy, which is the use, replication, or
distribution of software without authorization.
To express gratitude and value for the users by providing
It guarantees developers receive compensation for their
helpful and relevant information, fostering positive
efforts, fostering additional innovation and development.
experiences, and contributing to their understanding and
learning.
Principles of copyright in computer software:
Planning ICT solutions:
Copyright law prohibits the unauthorized copying,
distribution, or modification of software
To build effective ICT solutions, the first step is to identify
It also includes the End-User License Agreement (EULA),
and understand the needs of the intended audience.
which outlines what the software can and cannot be used
These needs can be functional, like processing
for
information, or aesthetic, like a visually appealing
Violations of these principles, such as software piracy, can
interface
lead to legal consequences
After identifying the needs, select the appropriate
technology and tools to create a solution. This choice
depends on factors like the complexity of the task, the
Preventing software copyright violation:
budget available, and the technical expertise of the users
Software developers employ a variety of copyright
protection strategies, such as Digital Rights Management

WWW.ZNOTES.ORG
(DRM). Must be made clear what email content is not permitted
Copyrighted works are subject to usage, modification, and Employees should be told to only use their accounts when
distribution restrictions thanks to DRM methods and sending emails
systems. Must be clear rules regarding the confidentiality of
Other techniques include software product activation, information
which needs a special code to be fully functional. Staff need to be aware of the method and duration of
Given that pirated software frequently is unable to receive storing emails
automatic upgrades, which over time render it less Incoming emails should only be read by the recipient
effective and secure, automatic updates may also serve Company policy on how to deal with and prevent viruses
as a kind of copyright protection. must be laid out
Monitoring of emails may be carried out and staff must be
aware that the company has the right to read all emails
10. ## 10.1. THEORY Suitable ongoing training will take place to ensure staff
follow company policy at all times

Communication Carbon copies (Cc) and Blind carbon copies (Bcc)

Carbon copies are used to send the email to multiple


E-mail
recipients.
Blind carbon copies are made to send the email to
:
multiple recipients without them acknowledging that it has
Email is a technique of sending and receiving messages been sent to other recipients.
and files via the Internet. Forward enables users to send an already existing email
It is employed in personal communication, business to a new recipient.
communications, and marketing. To attach files to be sent with an email, we make use of
Acceptable language needs to be used based on the Attachments.
recipient of the email, for example, professional when
composing a work-related email. Spam
Employers frequently establish requirements for
professional language, substance, and email frequency. It is defined as any unwanted email delivered via the Internet.
Email security is critical to preventing sensitive data from These can range from simply annoying to genuinely harmful
being accessed or manipulated. as they may contain viruses.
Netiquette is the right conduct and politeness when using The main disadvantages are:
email.
wasting time
Don’t be abusive
annoying people
Don’t send spam
using up valuable bandwidth on the internet, thus slowing
Be clear and succinct with your message
it down
Remember that posts are public in most cases and
may have viruses, or be a part of a phishing scam
can be read by anyone.
can take up significant space in user inboxes
Always check your spelling and grammar
Respect people's privacy and do not discuss or publish To minimize the spam you receive:
information that might embarrass somebody.
Forgive people’s mistakes use spam filters
Do not use CAPITAL LETTERS to highlight comments avoid disclosing your email address publicly
Do not plagiarize don’t click on links in spam emails or reply to them
Do not use too many emoticons as they might annoy
your readers. 10.2. The Internet
Email groups enable mass communication to a specific
group of subscribers.

allows individuals from all around the world to


instantaneously connect and chat with one another
It is up to companies to decide if personal emails should
Runs on a distributed network design, which means it is
be permitted on their systems
not controlled by a single central authority.
Companies may specify which company devices are
mostly used for transmitting data in a variety of formats
allowed to be used
such as text, photos, audio, and video
There needs to be a company standard style when
sending emails

WWW.ZNOTES.ORG
a vital communication tool that allows people to Internet resources including websites, email, social
communicate via emails, instant messaging, and other media, online shopping, and more.
means. An intranet's main goal is to make it easier for
acts as a massive database of information on almost any employees to communicate, work together, and share
subject information.
internet has transformed business by offering a platform Extranets are made to make it easier for a company's
for online purchasing, electronic payments, and digital external stakeholders to collaborate and
transactions, allowing enterprises to reach global communicate with it. It enables the organization and
consumers. its reliable clients or partners to securely share
information, documents, and resources.

Many people use the terms “Internet” and “World wide web”
users have access to an incredible amount of information, interchangeably, however, they can’t be used under the same
empowering them to learn context:
enables individuals and businesses to connect and - The internet refers to the global network of computers and
communicate with people from different parts of the other devices connected through routers and servers,
world in real-time however, the world wide web is a collection of websites and
the Internet has made many things easier to complete, webpages that are accessed via the internet.
thus providing simplicity and effectiveness
Blog:
it is a website or section of a website that continually
shares new information, frequently written informally
raises hazards to data security and personal privacy
or conversationally similar to a journal.
through the possibility of identity theft, data breaches, and
usually presented in a reverse chronological manner
online monitoring.
usually managed by individuals or small groups
the spread of propaganda, fake news, and misinformation
allow for reader comments, facilitating some level of
due to the simplicity with which content can be created
discussion
and distributed online.
often focus on specific topics, such as food, travel,
the digital divide that results from unequal Internet access
fashion, technology, or personal experiences
threatens to widen already existing disparities.
also, serve as a platform for sharing opinions or
insights
Forum:
Definition: an online discussion site where people can hold
The Internet is a vast network of linked computer conversations in the form of posted messages
networks and gadgets that communicate with one often organized around specific topics or interests,
another using the Internet Protocol Suite (TCP/IP). and divided into categories known as threads
The intranet is a secure network that operates within primarily focused on peer-to-peer interaction
an organization using internet technologies and may require users to create an account before posting
protocols, such as TCP/IP. can be moderated or unmoderated
Extranets are managed private networks that can give moderated forum refers to an online discussion
access to third-party users and give users, such forum in which all the posts are checked by an
as partners, suppliers, or clients, safe access to a administrator before they are allowed to be
portion of the intranet. posted.
Accessibility: The internet is essentially a huge unmoderated
Internet is open and accessible to the public, allowing forum. No one ‘owns’ the internet, and it is
users to access a wide range of information, services, essentially not policed.
and resources from all around the world. Wiki:
Intranets are restricted to internal users and typically a type of website that allows users to add, remove, or
secured by firewalls and other security measures to edit content
maintain the security of critical corporate data. designed to facilitate collaboration and knowledge
Extranet provides authorized external users only sharing from many people
limited access, in contrast to the internet, which is holds information on many topics which can be
public, or the intranet, which is entirely restricted. To searched
access the extranet, these users need a secure login. posts are not in chronological order
Purpose: structure is determined by the content or its users
Internet acts as a hub for intercultural dialogue, the most famous wiki is Wikipedia, an online encyclopedia
sharing of knowledge, and access to a range of changes can be tracked and reverted if necessary,
and the content is usually written in a neutral style

WWW.ZNOTES.ORG
Social networking: information tends to be up to date because it is
platforms where users can connect with others and quicker and easier to amend
share content internet has vast amounts of information
include platforms like Facebook, Twitter, Instagram, searching for information using a search engine is fast
and LinkedIn and easy
require users to create a profile and allow them to people can look for information in the comfort of their
share text, images, videos, and links own home
facilitate interaction, collaboration, and information information on the internet is essentially free of
sharing on a large scale charge
privacy settings allow users to control who can see webpages may have multimedia elements, making
their content learning more interesting
Disadvantages of using the Internet to find information
The functionality of the Internet it isn’t regulated, anything can be posted
always the risk of accessing inappropriate websites
Internet service providers (ISP): A company that provides too easy to be distracted by the many distractions
internet access. Typically, a monthly fee is charged for this available on the internet
service. A user's account is created when they register with Some research skills are lost when using the internet
an ISP, and they acquired login information such as user ID as search engines do all the work for you.
and password.
Uniform Resource Locator (URL): It is the address of a web Speed of searching:
page on the WWW. It is a text-based address that uniquely
identifies the location of any resource available on the To locate matches to your search query, search engines
internet. The three main components are: may scan billions of online pages in a fraction of a second.
Your internet connection and the effectiveness of the
Protocol: search engine's algorithms both influence the speed.
it is the communication protocol used to transfer data
between the client and the server Amount of information:
E.g. HTTP, HTTPS, FTP, and others
Domain: Because search engines can deliver a deluge of
it is the name of the server where the resource is information, it is critical to utilize particular and relevant
located search phrases.
it can be a name or an IP address Adding quotation marks for specific phrases, "+" signs for
Webpage/file name: required terms, and "-" signs for omitting terms can all
it is the location of the file or resource on the server help to narrow down the search.
it can contain the name of the file or directory where
the resource is located Finding relevant and reliable information:
A URL looks like this:
protocol://domain/path/filename The algorithm of the search engine determines the
E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a relevancy of information by taking into account
URL that consists of the HTTPS protocol, the domain parameters such as keyword frequency & page quality.
name "www.hoddereducation.co.uk", the path is Reliable information is often obtained from recognized
“IGCSE” and the filename is “ICT” sources such as educational, government, or well-known
A hyperlink is a word/phrase/image which references industry websites.
data that the reader can follow by clicking or tapping,
usually taking you to another web page Evaluating information found on the internet:
A web browser is a software application used to locate,
retrieve, and display content on the WWW, including web Although the internet provides a plethora of information,
pages, images, video, and other files not all of it is genuine or dependable.
Consider the reputation and trustworthiness of the source
Use of search engines: when determining the dependability of the information.
Check the accuracy of information by comparing it to
There are two fundamental methods for obtaining other reliable sources.
information via the Internet. The first method is to enter the Assess whether the information is skewed, keeping an
URL if you're familiar with the address of the website. If you eye out for views that may be pushing a particular point of
don't know where to look, the second option is to employ a view.
search engine to locate the information you seek. Check to see if the material is up to date, as obsolete
information might be deceptive.

WWW.ZNOTES.ORG
Internet protocols: 4. Secure sockets layer (SSL): a protocol that allows data to be
sent and received securely over the internet.
Protocols are sets of rules that the 'sender' and 'recipient'
agree on when data is exchanged between devices. Risks of using the Internet:
1. Hypertext transfer protocol (HTTP): when a web page is
being accessed, entering http:// at the front of an address Inappropriate and unlawful content: The internet may
tells the web browser that ‘http rules’ for communication are attract people to potentially dangerous or illegal
to be obeyed. materials.
2. Hypertext transfer protocol secure (HTTPS): A secure Data restriction: Parental, educational, and ISP
version of HTTP that encrypts data for security. restrictions can all be used to restrict access to specific
3. File transfer protocol (FTP): network protocol used when information or websites.
transferring files from one computer to another computer
over the internet. It is similar to HTTP, but the protocol is
specifically for the transfer of files.

WWW.ZNOTES.ORG
CAIE IGCSE
ICT

You might also like