0% found this document useful (0 votes)
32 views52 pages

Ict Notes

Uploaded by

Rami Qoura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views52 pages

Ict Notes

Uploaded by

Rami Qoura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Chapter 1: Computer System

Computer: is a device that receives input, does processing on that input and then produces the output.
★ Computers consist of two main components: Hardware & Software.

Hardware and Software:


Hardware:
➔ The physical components that make up a computer system.
➔ Hardware can be External or Internal.
External Hardware: Devices that are external and normally visible to the user.
Eg. Mouse, Keyboard, Monitor, Printer, Scanner, etc.
Internal Hardware: Devices that exist inside the computer and are not normally visible to the user.
Eg. CPU/Processor, Motherboard, RAM, ROM, Graphics Card, Sound Card, Internal HDD/SSD.
MotherBoard: allows the processor and other computer hardware to communicate with each other.

Software:
➔ Programs for controlling the operation of a computer system and processing of electronic data.
➔ There are two types of software: Applications and System.
Applications Software: Programs that provide the services that a user requires to solve a task.
Eg. Word processor, Spreadsheet, Database management system, Graphics editing, Video editing, Audio editing.
System Software: Programs that provide the services that computers require to run properly.
Eg. Operating system (OS), Device Driver, Compiler, Linkers, Utilities (Anti-virus).

Computer’s main hardware components:-


Central Processing Unit (CPU): Hardware that processes instructions
entered into the computer in order to produce an output. (contains Control
Unit and Arithmetic Logic Unit “ALU”)
➔ Control Unit: Part of the CPU that controls the interactions
between the different parts of the CPU.
➔ Arithmetic Logic Unit (ALU): Part of the CPU that performs
Arithmetic calculations and Logical operations.

Main Memory: Internal memory that is directly accessible by the CPU.

Random Access Memory (RAM) Read Only Memory (ROM)


Volatile memory. Non-volatile memory.

Temporary memory device. Permanent memory device.

Can be written to and read from. Can only be read from but not written to.

Used to store data, programs or parts of the operating Stores the start-up instructions when the computer is first
system that are currently in use. switched on.

Tends to have greater storage capacity.

Backing storage: Non-volatile storage that is not directly accessed by the CPU and Can be fixed or removable.

Input Devices Output Devices


Devices used to enter data or instructions into a computer Devices used to show the computer’s output in a form that is
directly. understood by a human.

Can send data to another device, but it cannot receive data Can receive data from another device, but it cannot send
from another device. data to another device.

The devices are under the control of the user or can be Output devices are under the control of the computer.
direct data entry.

More complex. Less complex.


Operating systems:
A piece of system software that allows the user to communicate with the computer hardware and performs many basic
tasks.
Functions of operating system:
➔ Provides a user interface
➔ Manages user accounts
➔ Memory management
➔ Provides system security

User interface Definition Advantages Disadvantages


types

Command life An interface that the Uses less memory than GUI. Commands must be learnt and
user would have to type Requires less processing power memorised by the user.
interface
commands to interact than GUI. Commands must be typed in
(CLI) with the computer. The user is in direct contact exactly.
with the computer. Commands must be typed which
takes time.

Graphic user Interface built around No need to memorise any Consumes more memory than CLI.
graphical items. commands. Requires more processing power
interface
It uses WIMP interaction More user friendly than CLI. than CLI.
(GUI) (Windows, Icons, Menus Fewer errors are made. Computer settings are protected
and Pointer from the user.

Dialogue based Interface that uses the Very useful for people with Can be too complex to set up.
human voice to give disabilities. User needs to know which
interface
commands to a computer Can be used as a security commands can be used.
system. feature to identify a person.

Gesture based Interface that relies on No physical contact required. Only works near the camera or
human interaction by the No training needed to interface sensor.
interface
moving of hands, head or with the computer. May only accept a limited number
the feet. of movements.

Types of Computers:-
Types of computer Advantages Disadvantages

Desktop computer Less chance to be stolen. Not very portable.


Less expensive to upgrade. Consume more physical space.
More data storage. It needs constant power supply.

Laptop Low power consumption. Easier to lose/steal compared to PCs.


Low heat generation. Have limited battery life.
Can be used if there’s a power cut. Not always possible to upgrade them.

Tablets Very fast to switch on. Have less storage capacity than laptops and Pcs.
Have better battery life than laptops. Expensive when compared to laptops.
Less heat is generated.

Smartphones More portable than laptops. Smaller keyboards than laptops/PCs.


Can use several apps. Less storage capacity than laptops/PCs.
Easier to use than laptops. Easier to lose than laptops and PCs.
Chapter 2 & 3: Input and Output Devices
Analogue data:
Data that is continuous/constantly varying.
● Note: all natural/physical variables are analogue data.

Digital data:
Discrete data that has only two values 0 and 1.
● Note: any electronic device reads digital data.

Analogue to Digital Converter (ADC):


ADC is needed to convert the analogue signals from the microphone into digital data that the computer can then
process.
Digital to Analogue Converter (DAC):
DAC converts digital data from the computer into analogue signals, which the loudspeaker then converts into
sound.

Pointing devices: Device used to move and control on-screen pointer/cursor.

Pointing Advantages Disadvantages Uses


devices "input"

Mouse Doesn’t need a large desk area Difficult to use if no flat Moving and deleting files.
when compared to a keyboard. surface is readily available. Controlling the position of a
Faster way to choose an option Difficult to use for people pointer on the screen.
compared to keyboard. with restricted hand
movement.

Touchpad Takes less physical space than a Difficult to control compared Moving and deleting files.
mouse. to a mouse. Controlling the position of a
More suitable if there is no flat Difficult to use for people pointer on the screen.
surface available. with restricted hand
movement.

Tracker ball Needs less desk space than a Needs training as it’s not In some luxury cars to select
mouse. standard equipment. functions.
Easier to use than a mouse. More expansive.
Other input devices:

Other input Advantages Disadvantages Uses


devices

Keyboard Easy way to input data. Slower method compared to Input of data into applications
Allows input to a variety of direct data entry devices. software.
data. Large device which uses up desk Typing in commands to the
Fast entry of new text. space. computer.

Numeric Very easy to carry around. Have small keys which can make In ATMs to enter data.
Faster than keyboards to input more difficult. Fast entry of numeric data
keypad
input numbers. Not used to enter text. into a spreadsheet.

Remote Operate devices from a Objects between the device TV.


distance. and the remote control can
control
Useful for people with prevent its operation.
walking difficulties. Hard to use if the user has a
disability in hand movement.

Joystick Control is more realistic than More difficult to control a In video games.
using a mouse. pointer using a joystick than Flight simulators.
Easier than a keyboard to other pointing devices.
navigate the screen.

Driving Easier than a keyboard to More expensive compared to a In video games.


control steering movements. mouse or joystick. Flight simulators.
wheel

Touch Easy method to choose Limited number of options. In ATMs.


options. Screen can get dirty with Mobile phones, tablets,
screen
Faster entry of options. constant touching. phablets.

Microphone It's faster to read text than Use up a lot of computer To input speech in
to type. memory. presentations.

Graphic More accurate in drawing More expensive than other To input freehand drawing.
than using pointing devices. pointing devices.
tablet

Digital The image can be Images often need to be Taking pictures.


immediately seen on the compressed to reduce the
camera
screen. amount of memory used.

Scanner Allows images to be stored Can be slow. Scan documents and convert
for further editing. them into a digital format.

Light pen Greater accuracy than touch Problems with lag when drawing Selecting/drawing objects on
screen. on screen. CRT screens.
Direct Data Entry (DDE) device: Devices used to input data into a computer with minimal human interaction.

Direct data Advantages Disadvantages Uses


entry (DDE)

Optical Faster data entry system than Device has difficulty in reading Processing of passport
manually typing data. handwriting. and identity cards.
character
Errors are reduced as there is Not a very accurate technique to
reader (OCR) no manual input. read text.

Optical mark Very fast way of inputting data. If the marks don’t fill the space Multiple choice
More accurate than keying in the completely they may not be read examination papers.
reader (OMR)
data. correctly. School registers.
More accurate than OCR. If the marks are not dark enough
they may not be read correctly.

Barcode reader Much faster than keying in data More expensive system than using In the supermarket.
manually. keyboards. libraries.
Errors are reduced as there is Barcodes can be more easily
no manual input. damaged compared to RFID, chips
and magnetic stripes.

Quick response Can hold more data than Can be used to transmit malicious Giving automatic access
traditional barcodes. codes. to a website.
(QR)
Faster and easier to scan. More than one QR format is
available.

Radio frequency Can store more data than Can hack into the data by the tag. Contactless payment.
barcode. Initial cost is more expensive than (tag: contain Microchip
identification
Allows greater security than the barcode. to store & transmit
(RFID) barcode. Tag collision may occur. data and Antenna to
Very fast read rate. receive & transmit
data)

Magnetic stripe Much faster than keying in data Data will be lost if it's damaged. ATM cards.
manually. Doesn’t work at a distance.
reader
Errors are reduced as there is
no manual input.

Chip and PIN More secure than contactless as Ensure PIN isn’t read by somebody ATM cards.
PIN must be typed. else while typing.
reader
More robust system than
magnetic stripe.

Contactless Faster transaction than other More expensive than a normal card. ATM cards.
payment methods. The card may be read accidentally.
card reader

Sensors Take more accurate readings Can give false results. Temperature sensor.
than humans.
Output devices:

Monitors Advantages Disadvantages Uses

CRT Least expensive monitor to buy. Heavyweight devices. Allow designs to be created on
They allow the use of light pens. Have a large footprint. screen with light pens.
Consume more power.

LCD / TFT Lighter than CRT. More expensive to buy than CRT. Mobile phones, tablets and
Less power consumption than CRT. Narrower angle of viewing laptops use LCD screens.
Sharper image than CRT. compared to CRT.

LED Thinner and Lighter. More expansive.


Less power consumption.
Run cooler.
Sharper image.

Printers Advantages Disadvantages Uses

Laser Higher printing quality. Higher initial cost. Produce 500 high-quality
Higher printing speed. flyers.

Inkjet Low initial cost. High running cost. Printing photographs.


High printing quality. Can’t do large print jobs. coloured high-quality photo.

Dot-matrix Best printer to work in a dusty Low printing speed. Produce a shop receipt.
environment. Low quality printing.
Very cheap to run and maintain. Very noisy.

3D Easier to produce customised High initial cost. Produce a customised solid


items. Can be used to produce object.
Medical benefits. dangerous items. Surgical equipment.

Other Output devices:

Other output devices Advantages Disadvantages Uses

Plotter Large output can be produced. Very high initial cost. Producing architectural
Very high-quality printing. Very slow at printing. drawings.

Projector Enables many people to see a Expensive to buy. Home cinema system.
presentation. Difficult to set up. For presentation.
Avoids the need for several
networked computers.

Speakers Very simple technology. Can have a large Used in all phones
footprint.

Actuators They allow remote operation of Could go wrong. Controlling robot arm.
many devices.
Chapter 4: Storage Devices
Backing up data:
The process of making one or more spare copies of data and storing them on an alternative device/medium.
Importance of backing up data:
➔ To be able to retrieve data in case of accidental deletion.
➔ To be able to retrieve data in case of accidental overwriting of files.
➔ To be able to retrieve data in case of malicious damage.

Backing storage:
Non-volatile storage that is not directly accessed by the CPU, used to store files and software.

Main/Internal memory Backing storage


Directly accessible by CPU Not directly accessible by CPU

Faster access speed Slower access speed

Lower storage Tends to have greater storage

RAM & ROM are fixed inside the computer Can either be fixed or it can be removable

Can be volatile (RAM) and non-volatile (ROM) Non-volatile

More expensive per unit storage Cheaper per unit storage

Stores boot up instructions and can hold data during processing Stores files and software

Factors to consider when comparing backing storage devices:


➔ Storage capacity.
➔ Data transfer rate.
➔ Data access time.
➔ Durability.
➔ Portability.
➔ Price per unit memory.
Storage media VS. Storage device:
Storage media: Hardware on which the data is actually stored (for example: CD & DVD)
Storage device: Hardware used to read from or write to the media (for example: CD/DVD reader or writer)

Magnetic media and Magnetic storage devices:


Note: Magnetic media (magnetic tape) & Magnetic devices (HDD, portable HDD, magnetic tape drive)

Advantages Disadvantages Uses

Fixed Hard Large storage capacity. Noisy when compared to an SSD. To store the operating
Fast data transfer rate. Have many moving parts ‘’affect their system.
Disk Drive
Fast data access time. reliability’’. To store system
(HDD) An incorrect shutdown procedure could software.
lead to loss of data.

Portable Hard Large storage capacity. Data transfer rate is not as fast as To store backups.
Fast data transfer rate. HDD. To transfer data
Disk Drive
Fast data access time. Have many moving parts. between computers.

Magnetic Tape Huge storage capacity. Very slow data access time. To store backups.
Fast data transfer rate. They are affected by magnetic fields.
Drive
Cheaper per unit memory than
HDD.
Optical media and Optical storage devices:
Advantages of optical media:
➔ Cheaper than other storage devices.
➔ Portable.
Disadvantages of optical media:
➔ Slow data transfer rate.
➔ Slow access time.
➔ Not compatible with all computers.
Note: optical media (CD, DVD, Blu-ray disc) & Optical devices (CD drive, DVD drive, Blu-ray drive)

Advantages Disadvantages Uses

CD/DVD - ROM Less expensive than HDD. Data transfer rate is slower than CD: to store music and
“Can only be read” HDD. software.
Data access time is slower than DVD: to store movies.
HDD.

CD/DVD - R Cheaper than RW disks. Not all CD/DVD drives can read File transfer between different
“Write only once” Once burned they behave like them. computers.
ROM. Archiving of data.

CD/DVD - RW Can be written over many times. More expensive than ROM and R To store data and backups.
“Can be written to or Files/data can be added at a formats. File transfer between different
read from many times” later stage. It can overwrite data accidentally. computers.

DVD-RAM Can read and write data at the More expensive than other To store backups.
same time. CDs/DVDs. File transfer between different
computers.

Blu-ray Greater storage capacity. Most expensive optical device. To store HD movies and games.
Faster data access time than To store backups.
others. File transfer between different
Faster data transfer rate than computers.
others.

Solid-state media and Solid-state storage devices:


Note: Solid-state media (memory cards) & Solid-state devices (SSD, Flash drive, Pen drive, memory card reader)

Advantages Disadvantages Uses

SSD Faster data transfer than HDD. More expensive per unit memory. To store the operating
Faster data access time than HDD. HDD has greater longevity than SSD. system.
Less power consumption than HDD. To store system software
Run quieter and lighter than HDD. and working files.

Pen Very portable. Easy to lose. To store backups.


Not affected by the magnetic field. Lower storage capacity than HDD. File transfer between
drive/Memory
More expensive per unit memory than different computers.
stick HDD.

Memory cards Small and can be easily used. Lower storage capacity than HDD. To store photos on a
Very durable. More expensive per unit memory digital camera.
HDD. To store backups.

Examples of memory cards:


➔ SD cards (secure digital card): Used in digital cameras, audio players, smartphones and tablets.
➔ XD cards (extreme digital card): Used in digital cameras.
➔ CFast card (compactfast card): Used inexpensive digital and video cameras.
Cloud storage (Cloud computing):
Online storage platform, data is stored in a remote physical location using hundreds of interlinked data servers.

How data is stored using cloud storage:


➔ Users access the cloud storage using the internet from any device.
➔ User uploads files to a data server.
➔ Users pay a monthly/annual fee for storage used.
How data is managed using cloud storage:
➔ The server is managed by a cloud provider.
➔ Data is automatically backed up.
➔ If one server fails, there are others used as backup.

Steps to transfer files from a computer at home to another computer at university using cloud storage:
1) User logs into the cloud from any device at home using the internet.
2) User ensures sufficient storage in the cloud account.
3) User uploads the files from his home computer to the data server.
4) User then logs into the cloud storage account from the university’s computer using the internet.
5) Finally, the user downloads the files on the university’s computer.

Advantages compared to storing data locally:


➔ Data is accessible at any time anywhere in the world provided internet access is available.
➔ More available storage space.
➔ Storage capacity can be increased without adding additional physical devices.
➔ Automatic backups can be made.
➔ Users only pay for the storage they use.

Disadvantages compared to storing data locally:


➔ Users must have an internet connection to access data.
➔ Users must have a reliable internet connection to store data.
➔ Cloud storage has an ongoing cost.
➔ Loss of control over the storage of data (storage is controlled by the cloud provider).
➔ More security issues as multiple copies of the data are stored.
➔ Easier to hack as data is always available.
Note: last three disadvantages are issues related to the security of data in the cloud.
Chapter 5: Databases
Data Types:-
1) Numeric Data: Numbers that come in a variety of different types.
A. Integer: +ve/-ve whole number, eg. 12, 45, 1243, ……
B. Decimal: +ve/-ve number with decimal parts, eg. 1.232, 98.93883, -0.0003, ……
C. Currency: refers to real numbers that are preceded by a currency symbol, eg. £12.45, -£0.01,
€999.00, $5500,.......
D. Percentage: refers to any number that is followed by a percent symbol, eg. 100%, 25%, 1%, ......
2) Alphanumeric Data: Refers to data made up of letters and numbers.
3) Boolean Data: Can only have two values.
4) Date/Time Data: Usually formatted in a specific way according to the setup of the computer.

★ Primary Key: A field that contains unique data that identifies a record.
★ Flat-File Database: Database where all the data is held in a single table.
★ Relational Database: Contains more than one table linked to each other, it uses relationships and it makes use of
foreign keys.
★ Foreign Key: It is a primary key in another table needed to act as a link between two tables.
Similarities between relational databases and flat file databases:
➔ Both use a primary key.
➔ Both can create reports.
➔ Both store data in records and fields in the table.
Advantages of relational database over flat-file database:
➔ No duplication of data so less data entry.
➔ Saves time when entering data due to less data entry.
➔ Less errors are produced due to less data entry.
➔ Saves storage space as data is only stored once.
➔ Easier to add/modify/delete data.
Disadvantages of relational database over flat-file database:
➔ Takes more time to set up.
➔ More complex to understand.
➔ Sorting of data is more complex.
➔ Slower extraction of data.
Differences between primary key and foreign key:
➔ Each table has one primary key whereas a table can contain several foreign keys.
➔ Primary key holds unique data while foreign key can be replicated in the table.
➔ Primary key identifies the record while foreign key is used to link with the primary key of another table.
Validation check Description Example

Presence check Checks if data is present and hasn’t been left A person’s ID may be required.
blank. If no data entered, an error message will be
produced.

Lookup check Checks if value entered is available in a limited When registering a course in IGSES, the session
list of items. must be either June, Nov or Jan. no other entry
should be accepted.

Range check ○ Checks whether numeric data is To check if a student’s age is <18 and >0.
within given values.
○ Uses 2 boundaries.

Limit check ○ Checks whether numeric data is To check if a student’s age is <18.
within given values.
○ Uses 1 boundary only.

Length check Checks if the input data contains the required If a field needs 6 digits, then inputting 5 digits
number of characters. should cause an error message.

Type check Checks that the input data has the appropriate A person’s age should be a numeric integer not
data type. alphanumeric.

Format check Checks the data is in a specific format or fixed A date should be in the form of dd/mm/yyyy.
pattern.

Character check It checks that a string of characters doesn’t A name should not contain characters such as %.
contain any invalid characters or symbols.

Check digit A validation check used in barcodes to validate Validating the correctness of a barcode.
the correctness of the barcode.

Data Verification:-
Checking that the data has been copied/entered correctly from the source.
1) Visual check: data is compared visually with the source document by a user, the user is asked to confirm that
the data entered is the same as original, if the user finds a difference, the data is re-entered.
2) Double data entry: Data is entered twice by the same person, a computer checks that both entries are equal, if
they are not equal, an error message requesting to re-enter the data is displayed.

Why it is necessary to carry out validation as well as verification for this system:
➔ Not all errors are found by either validation or verification separately.
➔ Source document may contain errors.
➔ Verification only checks that data is copied correctly.
➔ Validation only checks if data is reasonable/sensible.
Chapter 6 P1: Introduction to networks
Network: is the connection of two or more electronic devices.
Advantages of connecting a network:
➔ Sharing of hardware and software resources between networked computers.
➔ Sharing of data between networked computers.
➔ Ease of communication between networked computers.
Disadvantages of connecting a network:
➔ Easier spread of viruses throughout the whole network.
➔ Increased security risks when compared to stand-alone computers.
➔ Slower access to the internet.
Types of networks:-
LAN (local area network):
Network that uses cables and covers small geographic areas, for example a building.
WLAN (wireless local area network):
Network that uses wireless communication to connect between devices in a small geographic area.
The main wireless technologies used to form a WLAN are Wi-Fi and Bluetooth.
Advantages of connecting to a WLAN rather than to a LAN:
➔ Reduces cost of cables.
➔ Safer as users won’t trip over wires.
➔ Easier to connect other devices to the network.
Disadvantages of connecting to a WLAN rather than to a LAN:
➔ Less secure.
➔ The data transfer rate is slower than in a wired LAN.
➔ Physical obstacles can affect the signal.
Similarities between Bluetooth and Wi-Fi:
➔ Both use wireless communications.
➔ Both use radio waves for communication.
➔ Both allow several devices to be connected.
➔ Both use security when sending data.
Differences between Bluetooth and Wi-Fi:
➔ Wi-Fi has a faster data transfer rate than Bluetooth.
➔ Wi-Fi has a greater range of transmission than Bluetooth.
➔ Wi-Fi connects more devices than Bluetooth.
➔ Bluetooth is simpler to use and set up.
➔ Cost of Bluetooth is cheaper than Wi-Fi.
WAN (wide area network):
Network that covers a large geographic area.
Eg. the internet , the network of ATMs used by banks.
Network devices:

Function

Network interface Allows a computer to be connected to a network.


Contains the MAC Address of the computer generated at the manufacturing stage.
card "NIC"

Hub Connects a number of devices to form a network.


Broadcasts incoming data packets to every computer in the network.

Switch Connects a number of devices to form a network.


Sends the data packets to the destination computer only.

Bridge Connects one LAN to another LAN that uses the same protocol.
Used to connect different parts of a LAN so that they can function as a single LAN.

Router Sends data packets to a specific destination on a network.


Storing computer addresses.
Can connect a local network to the internet.

Firewall It is a device/software that sits between the user’s computer and an external network and
filters incoming and outgoing traffic based on a given set of criteria.
Blocks traffic that doesn't meet the criteria.
Warns and prevents unauthorised access to the system.
Can prevent viruses being transmitted.

Internet service Company that provides a connection to access the internet with a monthly fee.
Monitors internet usage.
provider "ISP"
Gives uses an IP address.
Provides security services.

MAC (media access control) address:


Unique number that identifies a device connected to the internet, allocated by the manufacturer, normally does not
change.
★ Consists of 6 pairs of hexadecimal digits.
IP Address (internet protocol address):
Address that specifies location of a device on the internet, allocated by the ISP, can change.
★ Consists of 4 numbers separated by dots.
Routing steps of data between two different networks:
1. Data packets are sent to the switch/hub and then passed to the router.
2. Router inspects the IP address of the data packets sent to it.
3. Router looks up the paths to get to that address using its routing table.
4. Router then checks how busy the paths are and identifies the quickest path.
5. Router is then able to route the data packets to reach the correct switch/hub.
6. Switch/hub sends the data packets to the destination computer.
Similarities between Hub and Switch:
➔ Both are used to connect devices to form a LAN.
➔ Both use data packets.
➔ Both check/read the data packets.
Differences between Hub and Switch:
➔ Security is lower in hubs.
➔ A switch Uses MAC addresses to locate the destination of the device.
➔ Hubs broadcast data packets to every device on the network whereas switches send data packets to a specific
device only.
Chapter 6 P2: Internet
Internet:
Stands for international network of networks, it is a public and global network.
Intranet:
Stands for internal restricted access network, it is a private network, accessible internally to members of
some company or organisation.
Similarities between internet and intranet:
➔ Both are networks.
➔ Both are communication systems.
➔ Both use HTML to write the web pages.
➔ Both use internet technologies.
Differences between internet and intranet:
➔ Intranet is more secure as there is less chance of external hacking.
➔ Intranet is more secure as private data stays within the organisation.
➔ Intranet is more secure as it can restrict access for certain employees.
➔ Intranets easier to access company specific applications.

Internet Intranet

Public access Accesses from agreed computers within an organisation

Less secure More secure

No restrictions on websites Can restrict access to some websites

Anyone can post information Specific users can post information

Wider range of resources Limited resources

Information is less reliable Information is more reliable

Extranet:
It is a private network that is controlled by a company, allowing access for authorised customers.
Extranets have the same uses and advantages of intranets, but it can also allow authorised users outside the organisation to have controlled
access to some information.

General internet terms:-


To design a webpage there are three development layers to be used:
1) Content/Structure layer “defined using HTML tags”:
➢ Used to enter the information of a webpage.
➢ Used to specify the web page layout/structure.
2) Presentation layer:
➢ Defines the formatting/style of a webpage through styling elements.
➢ To display elements within the webpage.
➢ Holds the CSS/stylesheet.
➢ Maintains the consistency of the elements in the webpage.
3) Behaviour layer “defined using scripting language”:
➢ Controls elements within the webpage.
➢ Adds interactive content of the webpage.
➢ Adds functionality to a webpage.
Definition

Webpage A web document written in HTML.


Features that can be inserted: text, image, videos & sound.

Website It is a collection of webpages related together using hyperlinks.

Hyperlink Word/phrase/image when clicked links to another website or another portion in the same
webpage.

Hypertext markup A mark-up language used to create web pages uses tags to format content.

language "HTML"

World wide web Information space that consists of a massive collection of web pages all connected together
using hyperlinks, WWW is only part of the internet that can be accessed by web browser.
"WWW"

Web Server Computer that contains webpages, it has an IP address and a domain name.

Web browser A software that allows a user to view webpages.

Uniform resource A unique text-based address for a web page, it contains the protocol, the domain name and
the file name.
locator "URL"

Protocol A set of rules agreed by the sender and the recipient when data is transferred between
devices.

Differences between WWW and internet:


➔ WWW is a massive collection of websites/web pages.
➔ WWW is part of the internet.
➔ WWW is accessed through the internet.
➔ WWW is a service on the internet.
➔ Internet is a global/worldwide network of interconnected networks.
➔ The Internet is the infrastructure.
Functions of web browser:
Records user history, provides an address bar, manages HTTP and HTTPS protocols, provides navigation tools.

URL structure:
http://www.cie.org.uk/gcseict/giraffe.html
➔ Protocol: http://
➔ Domain name: cie
➔ Domain type: .org
➔ Country code: .uk
➔ Folder: gcseict
➔ Filename: giraffe.html

Protocol:
Hypertext Transfer Protocol (HTTP):
The main protocol that controls the transmission of data to and from web servers.
Uses:
➔ In accessing the world wide web.
➔ In transferring contents of a webpage to a web browser for viewing.
➔ In downloading from web servers.
Hypertext Transfer Protocol Secure (HTTPS):
Protocol used to control the transmission of data to and from web servers but with encryption, uses SSL.
Secure Socket Layer (SSL):
A security protocol that uses encryption to allow data to be exchanged securely between two devices over the
internet.
Uses:
➔ Online banking.
➔ Online shopping.
➔ Sending and receiving emails.
➔ Intranets and extranets.
➔ VOIP when carrying out video or audio chatting over the internet.
File Transfer Protocol (FTP):
Protocol used to transfer files from one computer to another over the internet.
Uses:
➔ Used in transferring files from one computer to another over the internet.
➔ Used in downloading from file servers.
➔ FTP upload is used in cases when the file size is very large.

Steps to upload and publish the content of a website using FTP:


1) Download the FTP client program.
2) Connect to the FTP server using the FTP client program.
3) Login to the server using FTP username and password.
4) Locate the files on your computer.
5) Click the upload button on the FTP client program.
6) Upload the files to the folder.

Voice Over Internet Protocol (VOIP):


A set of rules that enables people to use the internet to make phone calls.
Uses:
➔ Video conferences.
➔ Audio conferences.
➔ Making phone or video calls over the internet.
Advantages of using VOIP:
➔ Calls are either for free or at a local rate anywhere in the world.
➔ A webcam can be used so that it becomes a type of video chat.
Disadvantages of VOIP:
➔ Quality of the sound is completely reliant on the internet connection.
➔ Security issues.
Chapter 6 P3: Cyber Security
Malware:
Programs installed on a user's computer with the aim of deleting, corrupting or manipulating data illegally.

Security Definition Possible effects How to identify How to protect


threats
Virus Program that replicates itself within a Delete files. Deletion of files without user's consent. Use up to date antivirus software.
computer. Causes a computer to become Computer becomes unresponsive. Don’t use software from unknown sources.
unresponsive. Random reboots. Scan email attachments.
Causes software errors. Software errors. Use a firewall.

Phishing The creator sends out a legitimate looking The creator of the email can Spelling or grammar mistakes in text. Use spam filters.
email that contains a link when clicked it gain sensitive data. Email urges you for a quick reply. Don't click links from unknown sources.
opens a fake website designed to obtain Credit card fraud. Asking for personal details. Never reveal personal details.
sensitive data. Report any suspicious activity.

Smishing The creator sends SMS to the user's The creator of the SMS can Spelling or grammar mistakes in text. Ignore text messages from numbers you
phone that contains a telephone number to gain sensitive data. Asking for personal details. don't recognize.
call or contains a link when clicked it opens credit card fraud. SMS from unknown source. Report any smishing attempts.
a fake website to obtain sensitive data. SMS sent at an unusual time. Never click on links in text messages from
unexpected people.

Vishing A voicemail message is used to trick the Creator of the vishing scam can Asking for personal details. Never reveal personal details over the
user into calling the telephone number gain sensitive data. Voicemail from an unknown telephone mobile phone.
contained in the message, the user will be Credit card fraud. number. Ignore voicemail from unknown number.
asked to supply personal data thinking Voicemail has generic greetings. Report any vishing attempts.
they are talking to somebody who works
for a legitimate company.

Pharming A malicious code is installed on the user's The creator of the malicious Website's URL is incorrect. Check the spelling of the URL of the
computer that redirects the user to a code can gain sensitive data. If webpage is requesting personal website.
fake website designed to obtain sensitive Credit card fraud. information and its URL starts with http Checking that the URL contains https or a
data. instead of https locked padlock sign next to it.
Using up to date anti-malware software.

Spam Junk emails sent to large numbers of Can be used for spreading Incorrect grammar or spelling in the Use spam filters.
people can be used for advertising. malware. email. Delete or ignore messages from unknown
Malware: programs installed on Email has generic greetings. sources.
a user's computer with the aim Absence of logos in email. Delete accounts that you no longer use.
of deleting, corrupting or
manipulating data illegally.
Spyware Software that records the key presses on Gives the originator the access Use up to date anti-spyware software.
the user's keyboard, this data is then to all data entered by the Use a pointing device instead of typing.
"key logging
sent to the originator of the software. user's keyboards including Use a firewall.
software" sensitive data.

Hacking The process of gaining unauthorised access Misuse of personal information. Use of firewalls.
to a computer system. Data can be changed. Use strong passwords.
Data can be copied from a Use biometrics.
system.
Data can be deleted.

Card cloning The copying of a credit or debit card Use chip & PIN cards instead of
which uses a magnetic stripe, cloning needs magnetic stripe cards.
an electronic device known as a skimmer, Do regular checks on your spendings and
skimmers can be placed in ATM slots check for any unusual activity with the
where they can read all data from a card bank.
and then copying the data to a fake card.

Shoulder A form of data theft where criminals Somebody watching you typing the card When using ATMs, shield the keyboard
steal card data from a victim when using PIN by looking over your shoulder. with your other hand.
surfing
it. Somebody listening in when you are giving When using a mobile device, never key in
credit or debit card details over the data in a public place.
phone. Don’t speak card details into your
smartphone in a public place.

Card fraud The illegal use of a credit or debit card. Card cloning.
Shoulder surfing when using the card.
Key logging software.
Phishing/smishing/ vishing/pharming.
Anti-virus software:
Steps to avoid the danger of infecting a computer with a virus from a downloaded file:
1) Download and install an up-to-date antivirus.
2) The antivirus software checks files against a database of known viruses before they run or loaded on a
computer.
3) If a file is infected, two options appear: Delete the file or Quarantine the file.
4) If the quarantine option is chosen:
➔ The file is moved to a hidden directory.
➔ The user does not have access to the quarantined file.
Features:
➔ Checks software/files before they are run or loaded on a computer.
➔ Can constantly run in the background.
➔ Prevents a user from downloading viruses.
➔ Can quarantine a virus.
➔ Can delete a virus.

Security measures:
Authentication techniques:
Refers to the ability of a user to prove who they are.
There are three common factors used in authentication:
➔ Something you know (eg. password or PIN code)
➔ Something you have (eg.mobile phone or tablet)
➔ Something which us unique to you (eg. biometrics)
Authentication methods include:
➔ User IDs and passwords.
➔ Biometrics.
➔ Zero login.
➔ Magnetic stripe cards.
➔ Smart cards.
➔ Physical tokens.
➔ Electronic tokens.
➔ Two-factor authentication.
➔ Digital certificates.
User IDs and Passwords:
Password definition and purpose:
A secret string of characters set by a user to identify them to a computer system, used as part of the authentication
system to improve security.
User ID definition:
Identifier for the user.
Methods to avoid password interception:
➔ Run up to date anti-spyware software.
➢ To make sure that your passwords are not being relayed back to anyone who put the key logging software
on your computer.
➔ Change passwords on a regular basis.
➢ In case it has come into the possession of another user illegally or accidentally.
➔ Use strong passwords that are not easy to crack.
➔ Use encryption when sending sensitive data over the internet.
➢ So that data becomes meaningless if intercepted.
Rules of a strong password:
➔ Should contain At least one capital letter, one digit, one special character/symbol.
➔ Should be at least 8 characters long.
➔ Not a previously used password.
Biometrics system:
Systems that rely on certain unique physical characteristics of human beings to identify a user.
Examples of biometrics system:
Fingerprint scans, Retina scans, Iris recognition, Face recognition, Voice recognition.
Advantages of using biometrics system:
➔ Biometrics is unique to each person, which is more secure than other authentication methods.
➔ Passwords/cards can be forgotten, while biometrics are always with you.
➔ The user has to be present to use the biometrics system, therefore more secure.
➔ Almost impossible to duplicate biometrics.
Disadvantages of using biometrics system:
➔ Slower method to enter the system than passwords.
➔ Expensive to set up.
➔ Injuries to fingers can cause biometric devices to fail to recognize the user.
➔ Facial hair can stop facial recognition from recognizing the user.

Zero login:
Method of login authentication that identifies a user by combining both biometric data and behavioural patterns without
the need to supply any other security information.
Examples of behavioural patterns:
➔ How you walk.
➔ Your typing speed.
➔ Your normal location.
➔ How you swipe the screen.
Advantages of using zero login systems:
➔ Enhanced security as it is difficult to copy biometrics and behavioural patterns.
➔ Easy and quick way to login to a system.
Disadvantages of using zero login system:
➔ User’s privacy can be violated as sensitive data is being recorded.
➔ Hackers may gain access to the user’s sensitive data in case of security breach.
➔ Expensive to set up.

Magnetic stripe cards:


Security device that stores details (such as name, ID number, gender, date of birth) on a magnetic stripe to allow
entry to a building.
Advantages of magnetic stripe cards:
➔ They are easy to use.
➔ Not an expensive technology.
➔ Magnetic cards can be remotely deactivated (if lost or stolen).
➔ The cards can be multi-purpose.
Disadvantages of magnetic stripe cards:
➔ No encryption is used and the stripe contents can be copied fairly easily.
➔ The cards wear out with a lot of use.
➔ Magnetic readers often fail to read the cards on the first attempt.

Smart cards:
Security device that uses RFID technology (chip & antenna), the chip on the smart card can store data such as name,
security number, gender, date of birth and a PIN.
Steps to enter a security gate using smart card:
1) The owner of the card walks up to a security gate and presents the smart card.
2) RFID readers on either side of the gate scan the security data stored on the RFID tag.
3) The user will then be invited to enter a PIN on the keypad.
4) If all details match, then access will be allowed.
Advantages of using smart cards:
➔ PIN can be used to verify the ownership of the card, thus can’t be used if stolen/lost.
➔ Very fast read rate.
➔ More robust and reliable compared to magnetic stripe cards.
Disadvantages of using smart cards:
➔ Possible to hack into the data/signal transmitted by the tag.
➔ Smart cards are more expensive to manufacture than magnetic stripe cards.
➔ Possible to jam as RFIDs use radio waves.

Physical tokens:
A form of authentication that uses a hardware device that generates a one-time password (OTP), this OTP changes on
a regular basis and is usually only valid for less than a minute.
Steps of using physical token when logging into a bank’s website:
1) The customer uses a physical token supplied by the bank.
2) The customer inserts their debit card into the top of the token device and the device either recognizes the card
as genuine or rejects it.
3) The device then asks the customer to press ‘IDENTIFY’ and then enter their PIN.
4) A one-time password (OTP) is then generated and shown on the device screen.
5) The customer goes back to their bank web page and enters the generated OTP.
6) If correct, the customer is given access to their account.
Main advantage of using physical tokens:
➔ Security is enhanced as the thief needs to have the token device, a cloned card and the card’s PIN.
Main disadvantage of using physical tokens:
➔ If the token device is lost, the user will not be allowed to access the system.

Electronic tokens:
Software installed on a user’s device, such as a smartphone that generates a one-time password (OTP) which is valid
for less than one minute.
Steps of using electronic token when logging into a bank’s website:
1) The user install the electronic token app on their smartphone.
2) User opens the app when the website requests the user to authenticate who they are.
3) The app generates a one-time password (OTP) which is valid for less than a minute.
4) The user enters this OTP when asked by the website.
5) The website server runs the same software as the app and will generate the same OTP.
6) Once the OTP is verified by the website, the user will be allowed access.

Two-factor authentication:
A form of verification which requires two methods of authentication to verify a user, this makes it harder for the
hacker to access the system as it adds an extra level to hack.
Example 1:
➔ A code is sent to a device that is pre-set by the user.
➔ The system requires the user to input this code in order to log-in.
Example 2:
➔ The system requires the user to input login details from a specific computer.

Digital certificate:
An electronic document sent with an electronic message that is used to verify the identity of the sender, contains a
unique key used by sender and receiver that allows computers to exchange information over the internet securely.
Items in digital certificate:
➔ Details of the owner of the digital certificate.
➔ Serial number.
➔ Public key.
➔ Digital signature.
➔ Valid from.
➔ Valid to.

Encryption:
The process of scrambling characters of a message so that message becomes meaningless to unauthorised users, plain
text is encrypted to cypher text using an encryption algorithm and an encryption key, cypher text is decryption key.
Encryption applications:
➔ Encryption of data on HDDs/SSDs.
➔ Encryption of emails.
➔ Encryption of data on the cloud.
➔ Used with HTTPS and SSL protocols to encrypt data being transferred over the internet.

Secure Socket Layer (SSL):


A security protocol that uses encryption to allow data to be exchanged securely between two devices over the internet,
makes use of digital certificates.
How to know if SSL is being applied:
➔ The URL starts with https.
➔ Locked padlock sign is available in the status bar.
Applications that use SSL:
➔ Online banking and all online financial transactions.
➔ Online shopping.
➔ Sending and receiving emails.
➔ Using cloud storage facilities.
➔ Intranets and extranets.
Firewall:
It is a device/software that sits between the user’s computer and an external network and filters incoming and outgoing
traffic based on a given set of criteria.
Functions:
➔ Checks whether incoming and outgoing traffic meets a given set of criteria.
➔ Blocks traffic that doesn’t meet the criteria.
➔ Warns and prevents unauthorised access to the system.
➔ Logs all incoming and outgoing traffic.
➔ Can prevent malware being transmitted to the network.
Chapter 7: System Development Life Cycle
Analysis:
System analysis is done by someone called a systems analyst.
System analyst main tasks:
➔ Research the current system.
➔ Identify input, processing and outputs of the current system.
➔ Identify problems with the current system.
➔ Identify the user and information requirements for the new system.
➔ Identify the suitable hardware for the new system.
➔ Identify the suitable software for the new system.

Methods of researching the current system:


Advantages Disadvantages

Observation The system analyst obtains reliable data. People may work in a different way when being
Enables the systems analyst to get a better overall watched.
view of the system. The quality and accuracy of information is highly
Inexpensive method. dependent on the skill of the observer.

Interviews More likely to get reliable data. Time consuming to complete all the interviews.
Allow lots of very detailed information to be Expensive method due to the system's analyst time.
gathered. Interviewees may not be available at times to suit
Flexible as the systems analyst can change script to the analyst.
suit circumstances.

Questionnaires Faster to complete all questionnaires. The questions are inflexible since they have to be
It is a relatively inexpensive method. general.
Individuals can remain anonymous. Users tend to exaggerate their answers as they
Individuals can fill it in their own time. are anonymous.
As it’s anonymous people may not take it seriously.

Examination of This method allows information to be obtained which Time consuming to go through the documents.
wasn’t Expensive method as it is time consuming.
existing
possible by any of the other methods.
documents Can see the scale of the problem easily.
Saves time as there could be copies of previous
analysis.

Importance of Identifying inputs, processing and outputs of the current system:


➔ Helps the system analyst to understand how the system works.
➔ To be able to identify the input/output devices that are needed for the new system.
➔ To be able to identify the processing devices that are needed for the new system.
➔ To be able to identify the storage space that is needed for a new system.
Importance of identifying the User and information requirements:
➔ To meet all the needs of the customer.
➔ More efficient system is produced that does what the customer requires.
➔ Reducing the costs if the new system matches the existing hardware and software.
Identify Hardware for the new system:
Examples of input devices that could be used with their justification:
➔ Barcode readers
➢ Faster entry than manual input.
➢ Less errors than manual input.
➔ Scanners
➢ Can be used if it is necessary to convert any existing paper documents into an electronic format.
➔ Touchscreens
➢ The most cost-effective way of gathering information from a business customer and to ensure an
employee does not miss any important data during a customer conversation.
Examples of output devices that could be used with their justification:
➔ 3D printer
➢ Faster to produce customised items than using traditional ways.
➢ Cost of manufacturing is less than labour costs and other costs involved in manufacturing in the more
conventional way.
➔ Large monitors
➢ The company may be using CAD software and the need for very large, expensive monitors, may be
justifiable.
➔ Speakers
➢ The company may employ people with disabilities, so the need for verbal outputs from the computer may
be a necessary requirement.
Identify Software for the new system:
Examples of software that could be used with their justification:
➔ Operating system
➢ Which operating system is the most appropriate to meet the company needs.
➔ Off the shelf software
➔ Bespoke software (written specifically for the company)
Advantages of using off the shelf software compared to bespoke software:
➔ Cheaper to purchase as there are no development costs.
➔ Minimum training will be required.
➔ Saves development time so it can be used sooner.
➔ More reliable as any errors will have been tested.
➔ More support as it has a huge user-base.
Advantages of using bespoke software compared to off the shelf software:
➔ Software is specially designed for the sports club so that it meets their needs.
➔ Uses less memory as software only has the features needed by the company.
➔ Easier to use as less functions in the software.
➔ Customised support from the systems analyst.
➔ Can be changed whenever the company needs a change.
Design:
Using the list of user requirements, the designer now has to design the nes system.
Design’s main tasks:
➔ Design input forms
➢ Data capture forms.
➔ Design output forms
➢ Screen layouts.
➢ Report layouts.
➔ Design file structures (database)
➢ Field length.
➢ Fields names.
➢ Fields data types.
➢ Coding of data.
➔ Validation routines
Features of well-designed input form:
➔ Have all of the necessary fields.
➔ Data must fill the form.
➔ Consistent spacing between fields.
➔ Use of navigation buttons.
➔ Clearly defined input area for each record.
➔ Suitable font size and colour.

Development and Testing:


Development:
This phase involves programming to produce the software of the system (it should be broken down into small
parts called modules).
Testing:
Need for To make sure that the database used in the system is robust (finalised and fully tested)when the system
testing goes live.
To make sure that the correct data is stored in files by fully testing validation routines used, by making
sure any data transferred from a paper-based system to an electronic system has been done accurately.
To ensure the user screens are user friendly and that the correct output is associated with the inputs to
the system.

Testing designs Testing the data structures.


Aspects Testing the file structures.
Testing the input methods.
Testing the output formats.
Testing the validation rules.

Testing Testing each module separately.


strategies (for Testing each function in the module separately.
Testing the whole system (after integrating all modules together).
each aspect)

Testing plan A list of all the tests to be performed.


(for each Identifying what data is to be tested.
Identifying what type of test data to be used.
module)
Identifying live data to be used.
Identifying the expected outcomes from the testing.
Checking that actual outcomes match the expected ones.

Testing data Normal: This is data that is acceptable.


Abnormal: This is data outside the limits of acceptability.
Extreme: This is data at the limits of acceptability and should be accepted.
Live: This is actual data with known outcomes.

Implementation:
After the system has been developed and tested, it will be ready to run.

Definition Advantages Disadvantages Method might be used

Parallel The new system runs If the new system fails, the Expensive as extra staff is An organisation with large amounts of
alongside the old old system will still be needed to run both systems data which cannot afford to lose
running system for a time available as a backup. together. data.
before the new It is possible to gradually Time consuming as data An organisation where the new
system takes over train workers on the new needs to be entered into two system needs to be fully tested.
completely. system. systems.

Direct Replacing the old Costs are less than parallel If there’s a problem with A small organisation which can afford
system with the new running as less workers are the new system, then all to lose data.
changeover system immediately. needed. data can be lost since the A small organisation where the
The benefits of the new old system is no longer system needs to be up and running
system are immediate. available. very quickly.
Saves time of implementing Staff cannot be trained
the new system. gradually.

Phased New system is If the new system fails, then More expensive than direct An organisation where there are
introduced part by most of the old system is changeover since it is clearly defined separate processes.
part. still in place. necessary to evaluate each An organisation where the new
Possible to ensure that the phase before moving to the system needs to be fully tested.
new system works properly next stage.
before proceeding. Very time consuming since
each part needs to be fully
evaluated before proceeding.

Pilot Whole system is If the new system fails, only Takes time to implement the An organisation where there are
introduced in one one branch is affected. new system for all branches several branches all doing the same
running branch at a time. Possible to train staff in one in the company. work.
area only, which is faster An organisation where the new
and less costly than parallel system needs to be fully tested.
running.
Documentation:
Purpose This can consist of any of the following

User documentation Learn how to use a system, Purpose of the system.


overcome errors in a system. Limitations of the system.
Hardware and software requirements.
Sample runs.
Input format.
Output format.
How to load/install/run the software.
How to use the system.
How to save files.
How to print data.
How to delete/edit records.

Technical To help programmers and Purpose of the system.


systems analysts to make Limitations of the system.
documentation
improvements to the system, Hardware and software requirements.
repair the system, and maintain Sample runs.
the system. Input format.
Output format.
Program listing.
Program algorithm.
Program coding.
File structures.
Validation routines.

Evaluation:
Factors that need to be assessed in evaluation:
➔ Efficiency of the system (cost and speed).
➔ Easiness of the system.
➔ Appropriateness of the system (all user requirements are satisfied).
The following is a list of some of the techniques used to evaluate the new system:
➔ Comparing performance of the new system with the old system.
➔ Evaluating the user’s responses to using the new system.
➔ Comparing the final solution with the original user requirements.
➔ Interviewing users to gather responses about how well the new system works.
➔ Identifying any limitations of the system.
➔ Identifying any necessary improvements that need to be mad.
Chapter 8: Effects of using ICT
Copyright:
Copyright legislation: Legal protection of specific content/work from being downloaded, copied or borrowed without
the owner’s permission.
Importance of copyright legislation:
➔ Supports the original producers of the content.
➔ Helps in protection against plagiarism.
➔ Allows for legal ownership of the content.
➔ Restricts who can legally use and copy the work (based on owner’s permission).
➔ Restricts who can legally sell and distribute the work (based on owner’s permission).
Software piracy: Illegal copying of software.
How to breach software copyright:
➔ Making a copy and giving it away without the owner's permission (software piracy).
➔ Making a copy and selling it to others without the owner’s permission.
➔ Making a copy and renting it out to others without the owner’s permission.
➔ Using a single copy with multiple simultaneous use on a network.
➔ Use code from the software without the owner’s permission.
➔ Modifying the original code without the owner’s permission.
How software manufacturers attempt to prevent copyright being broken:
➔ Requesting to input a unique product key when software is being installed.
➔ The user will be asked to agree to the licence agreement before the software continues to install.
➔ If supplied with a hardcopy, a form of hologram is used to indicate that the software is a genuine copy.
➔ Software will only run if the CD, DVD or memory stick is actually in the drive.
➔ Software will only run if a dongle is plugged into one of the USB ports.
Effects of microprocessor-controlled devices (smart devices) in the home:
Lifestyle, leisure time and physical fitness:
Positive effects:
➔ They reduce the need for people to do manual tasks at home.
➔ Can be set remotely using a smartphone.
➔ Can be used for physical fitness tracking in the home.
➔ They give people more time for leisure activities, hobbies, shopping and socialising.
➔ Cookers can be switched on whilst we are out so that we arrive home to a cooked meal.
➔ Automated burglar alarms give people a sense of security.
➔ Smart fridges can be used to improve a healthy lifestyle.
Negative effects:
➔ They can lead to unhealthy lifestyles if the dependency on ready meals is high.
➔ They tend to make people rather lazy because there is a dependence on the devices.
➔ Lack of exercise will result in becoming less fit.
➔ Potential loss of household skills.
➔ There is the risk of cybersecurity threats as the internet can be used in smart devices.
➔ Possible health issues from the devices, e.g. microwave leakage.
Security of data:
Security issues when using smart devices (microprocessor-controlled devices connected to the internet):
➔ Malware can be installed to sabotage the smart devices.
➔ Hackers can communicate remotely with smart devices in your home.
➔ Hackers can gain personal data about you
➢ By hacking into a central-heating controller, it is possible to find out holiday dates, which then makes a
home an easy target for break-ins.
➢ If the smart fridge automatically orders food from a supermarket, then it is possible for a hacker to gain
credit card information.
How to protect against security issues when using smart devices:
➔ Use a different password for each device.
➔ Install software updates, which often contain new security features.
Social interactions:
Positive effects:
➔ Easier to make new friends using chat rooms.
➔ Easier to find people who share similar interests/hobbies.
➔ Less expensive to keep in touch using VoIP technology.
Negative effects:
➔ Social isolation as people do not meet face-to-face as much.
➔ A lack of social interaction may make people more anxious of meeting people in real life.
➔ People behave differently when interacting online (they can be ruder or more aggressive).
➔ Cyberbullying.
Effects of microprocessor-controlled devices (smart devices) in controlling transport:
Uses:
➔ Monitoring/Controlling of traffic on motorways.
➔ Congestion zone monitoring.
➔ Automatic number plate recognition (ANPR).
➔ Automatic control of traffic lights.
➔ Air traffic control systems.
Positive effects:
➔ Controlling of traffic will reduce traffic jams and minimise everyone’s journey time.
➔ Transport systems are more efficient (as more transport vehicles can use the transport network, allowing for
more regular services).
➔ Traffic offences can be automatically penalised using ANPR.
➔ Stolen cars and criminals can be spotted using ANPR.
➔ Computerised control systems minimise human error, which reduces the rate of accidents.
Negative effects:
➔ A hacker could gain access to the computerised system and cause disruption.
➔ If the computer system fails, then the whole transport system could be brought to a standstill.
➔ Poorly designed systems could compromise safety.
➔ ANPR systems mean that innocent people’s movements can easily be tracked which violates privacy.
Autonomous (Driverless) vehicles: Vehicles that rely on sensors, cameras, microprocessors and actuators to control
its movement. Microprocessors process the data received from cameras and sensors and send signals to actuators to
perform physical actions, such as: Change gear , Apply the brakes, Turn the steering wheel.
Positive effects:
➔ Safer because human error is removed, leading to fewer accidents.
➔ Better for the environment because vehicles will operate more efficiently.
➔ Can reduce traffic congestion.
➔ Increased lane capacity (due to better braking and acceleration responses together with optimised distance
between vehicles).
➔ Can reduce travel time.
➔ Can self-park so it reduces the time to find a parking spot.
Negative effects:
➔ Very expensive system to set up.
➔ Possibility of hacking into the vehicle’s control system.
➔ Software glitches could lead to potential disasters.
➔ Cameras need to be kept clean so that they do not give false results.
➔ Sensors could fail to function in heavy snowfall or blizzard conditions.
➔ Reduction in the need for taxis could lead to unemployment.
➔ Driver and passenger reluctance of the new technology.

Effects of ICT on health: Health risks are caused due to the prolonged use of ICT equipment.

Caused by Ways of minimising the health risk

Eyestrain/ Staring at the computer screen for a long time. Take regular breaks.
Having incorrect lighting in the room. Turn the brightness down on the screen.
Headache Sitting too close to a screen. Keep the screen clear of dust and dirt.
Using dirty screens. Test eyesight regularly.

Back and neck Sitting in front of a computer screen for a long Take regular breaks.
time in the same position. Sit with the correct posture.
problems Sitting in front of a computer for a long time in Do back and neck exercises.
the wrong posture. Use foot rests to improve posture.
Use monitors that can tilt to reduce neck problems.

Repetitive Strain Constant typing on keyboard. Take regular breaks.


Holding a mouse with repetitive clicking on Use a wrist rest or mouse rest.
Injury (RSI) buttons. Exercise the hand and fingers.
Effects of ICT on physical safety:
Physical safety risks are caused by wrong use of ICT equipment.

Caused by Ways of protection

Electrocution Touching bare wires. Check insulation on wires regularly.


Spilling liquids near electrical equipment. Don’t allow liquids or drinks near computers.
Use RCB.

Tripping and falling over Presence of many trailing Cables. Use cable ducts to make the wires safe.
Fix wires along walls and under carpets to prevent any contact
trailing wires between people and wires.
Use wireless connections wherever Possible.

Heavy equipment falling Placing devices near the edge of tables or Use strong desks and tables to support heavy hardware.
heavy equipment on weak tables or Place devices in the middle of a table.
and causing injury shelves. Use large and sturdy desks.

Fire risk Overloading of power sockets. Have a fully tested CO2 fire extinguisher Nearby.
Overheating of equipment. Don’t overload sockets with too many Plugs.
Don’t cover equipment.
Use a cooling system.

E-Safety:
Personal data:
Data relating to a living person who can be identified by this data.
Examples of personal data:
➔ Name.
➔ Address or email address.
➔ Date of birth.
➔ Banking account number.
➔ Photographs of the individual.
➔ Gender.
Examples of sensitive personal data:
➔ Racial origins.
➔ Political views.
➔ Religion.
➔ Criminal activity.
➔ Medical record.
➔ DNA.
➔ Biometric data.
Why personal data should be confidential and secure:
➔ As it links directly to a person.
➔ If someone gets access to the data then they can use the information to attack the person.
➔ To protect sensitive personal data.
➔ It could lead to home burglaries as people post holiday details on social media.
➔ Can lead to identity theft.
Data Protection Acts (DPAs):
Legislation designed to protect individuals and to prevent incorrect or inaccurate data being stored.
DPA principles:
➔ Data must be fairly and lawfully processed.
➔ Data can only be processed for the stated purpose.
➔ Data must be sufficient, relevant and not excessive.
➔ Data must be accurate.
➔ Data must not be kept longer than necessary.
➔ Data must be processed according to the individual’s rights.
➔ Data must be kept secure.
➔ Data should not be transferred outside the area of the act unless sufficient protection exists.
Definition of e-safety:
It is the need to take precautions to keep personal data safe when using the internet.
Measures to maintain e-safety:
When using the internet:
➔ Never give out any personal information to people who are unknown to you online.
➔ Never send people photos of yourself.
➔ Always maintain your privacy settings on.
➔ Only use websites recommended by teachers.
➔ Only use a learner-friendly search engine.
➔ Use appropriate search conditions when using search engines.
When using email:
➔ Only open emails or attachments from known sources.
➔ Only reply to an email if you know the person who sent it.
➔ Never include any personal data in emails.
➔ Never send photos of yourself in any email.
➔ Avoid clicking on hyperlinks within emails because it could be part of a phishing scam.
➔ Use spam filters to stop spam emails.
When using social networking sites:
➔ Block or report unwanted users.
➔ Never arrange to meet anyone alone.
➔ Always tell an adult first and meet in a public place.
➔ Always meet in a public place.
➔ Keep private and personal data secret.
➔ Avoid the misuse of images.
➔ Avoid giving your address or school name.
➔ Check profiles before contacting people.
➔ Verify a person's contact details with other trusted friends.
When playing games online:
➔ Use a nickname and never your real name.
➔ Don’t give your personal or financial data to any player.
➔ Report and block cyberbullies.
➔ Turn on privacy settings.
➔ Check game ratings for age.
➔ Reduce the amount of time spent gaming.

Internet developments:
Search engines:
A piece of software used to find information on the internet.
Why are internet searches to find relevant information not always fast?
➔ The search might be too general, giving irrelevant information.
➔ Search providers add marketing advertisements to the search results.
➔ Computers might be infected with viruses taking up memory and slow down data transfer speed over the internet.
➔ If the computer’s memory is close to full, data transfer speed over the internet can slow down significantly.
Why is it NOT always easy to find reliable information on the internet?
➔ Anyone can post information on the internet.
➔ Websites may contain incorrect information.
➔ Similar websites may have conflicting data on the same topic.
➔ Search engines do not necessarily give the most reliable searches at the top of the list.
➔ Data on some websites may be outdated.
➔ The search engines tend to be generalised.
How to evaluate the reliability of information found on the internet?
➔ Check information from different sources.
➔ Check the author’s credentials.
➔ If the date of the last update was a long time ago, it is likely to be an unreliable website.
➔ Websites that have excessive advertising tend to be unreliable.
➔ Commercial websites tend to be biassed.
➔ Check if responsible bodies have endorsed the website.
➔ Check if the website links to other reliable websites or to unreliable websites.
➔ Check spelling and grammar as too many spelling errors mean that the website is not reliable.
➔ Use the final part of the URL to identify the website’s reliability. For example, websites ending with:
.edu, .org,.ac and .gov are more likely to be reliable.
Advantages of searching the internet for information:
➔ The internet has a vast amount of information.
➔ Searching for information using a search engine is fast and easy.
➔ Information on the internet is for free.
➔ Pages on the internet can have multimedia files to make learning more interesting.
Disadvantages of searching the internet for information:
➔ Information may not be reliable as the internet is not regulated.
➔ There is always the risk of accessing inappropriate sites when using search engines.
➔ It is too easy to be distracted when searching on the internet.
➔ Easy to plagiarise when using the internet.
➔ Losing research skills when using the search engines as it does all the work for you.
Disadvantages of using a search engine to find information rather than typing in a web address:
➔ Information overload.
➔ Websites at the top of the list may not be relevant.
➔ Risk of accessing inappropriate websites if search words are not specific.
➔ Search engines may not include all web pages.
➔ Search engine companies may be paid to display certain web pages.
Methods to protect against risks when using the internet to search for information:
➔ ISP control which can prevent users from accessing certain websites.
➔ Parental control over what websites to be accessed by children.
➔ Schools and textbooks can be used in educating users about the correct use of the internet.
➔ Checking with teachers first to see if it is safe to access a website.
Blogs: Short for weblog, A personal website where the blogger types in their opinion on some topic.
Features of a blog:
➔ Website where data entered by a single author.
➔ Visitors can only read and comment on the material on blogs.
➔ Based on the author's personal observations.
➔ Usually organised in reverse chronological order (most recent to least recent entry).
Wikis: Software/websites that allow users to create and edit web pages using web browsers.
Features of a wiki:
➔ A wiki has many authors.
➔ Any user can edit, delete or modify the content.
➔ Its structure is determined by its users and the content.
➔ Uses links to websites.
➔ Allows large documents to be seen by many people.
Social networking sites: Public websites that allow users to interact and communicate with each other
Features of social networking sites:
➔ Can create and share personal profiles.
➔ Can upload content such as photos and videos.
➔ Can write comments on other’s posts.
➔ Can invite people to become friends.
Advantages of social networking:
➔ Make new friends worldwide.
➔ Communicating with friends and colleagues all over the world.
➔ Easy to find other people with common interests.
➔ Can be used more easily for analytics and market research.
➔ Develops social skills.
➔ Allows people to share knowledge.
Disadvantages of social networking:
➔ Reduces face to face communication.
➔ Cyber-bullying increases.
➔ Needs the internet and a computer.
➔ The Risk of fraud increases.
➔ Addiction to social networking.
Forums: Online discussion boards where users can hold conversations in the form of posted messages.
Differences between moderated and unmoderated forum:
➔ A moderated forum is checked by an admin while an unmoderated forum is not.
➔ Posting of moderated comments are delayed as they have to be checked.
➔ The moderated forum does not allow inappropriate comments to be posted on the site.
Chapter 9 P1: ICT Systems
Sensors:
It’s an input device used to measure physical properties of the surrounding environment.
Why data from the sensors need to be converted for use by a computer:
➔ Sensors read analogue data.
➔ Computers only understand digital data.
➔ ADC must be used to convert analogue to digital so that data can be understood by the computer.

Type of sensor Applications

Temperature Central heating systems.


Glasshouses.
Ovens.
Automatic washing machines.
Pollution monitoring in rivers.

Pressure Detects intruders in a burglar alarm system.


Weigh things (e.g. check the weight of a vehicle).
Automatic washing machines.
Robotics.

Light Street lighting control.


Glasshouses.
Automatic doors.
Burglar alarm systems.
Pollution monitoring in rivers.

Motion/Infra-red Burglar alarm systems.


Count people entering/leaving a building.

Sound/Acoustic Burglar alarm systems.


Monitoring liquid flow in pipes.

Humidity/Moisture Glasshouses.
Environmental monitoring (weather station).
In factories where moisture levels are crucial (for example. paint & spraying)

pH Glasshouses (to measure pH of soil).


Chemical processes.
Pollution monitoring in rivers.

Computer-controlled systems:
A computer-controlled system can consist of:
➔ Sensors to take readings.
➔ Microprocessor/processor to process data.
➔ Output devices to display data /Actuators to do mechanical output.
Advantages of using computer-controlled systems:
➔ Take more accurate readings than humans.
➔ Higher productivity than humans.
➔ Can work 24/7.
➔ Produce more consistent results than humans.
➔ Work continuously with no breaks so any necessary action is initiated immediately.
➔ Work without human intervention which is safer for humans in hazardous situations.
➔ Less expensive in the long run than employing humans.
Disadvantages of using computer-controlled systems:
➔ Faulty sensors can give false results.
➔ Subject to cyber attacks.
➔ Expensive to set up.
➔ Needs more maintenance than traditional systems which are expensive.
Examples of computer-controlled systems:
Monitoring systems, Control systems & Robots.
Monitoring systems:
A system that uses sensors to constantly take measurement data.
Examples of monitoring systems:
➔ Monitoring a patient in a hospital for vital signs.
➔ Checking the temperature levels in a car engine.
➔ Monitoring intruders in a burglar alarm system.
➔ Monitoring pollution levels in a river.
Monitoring a patient in a hospital for vital signs:
Sensors used:
➔ Heart rate sensor, Temperature sensor & Blood pressure sensor.
Monitoring intruders in a burglar alarm system:
Sensors used:
➔ Pressure sensor
➢ To pick up the weight of an intruder coming through a door.
➔ Light sensor
➢ To detect if an intruder is coming through a door.
➔ Motion/Infra-red sensor
➢ To pick up the movement of an intruder in the building.
➔ Sound sensor
➢ To pick up sounds such as footsteps or breaking glass.
Monitoring pollution levels in a river:
Sensors used:
➔ Temperature sensor, Light sensor, pH sensor, Oxygen sensor & Carbon Dioxide sensor.

Control system:
A system that uses sensors, microprocessors and actuators to take some action that affects the surrounding
environment.
Difference between monitoring system and control system:
➔ Measurement is the monitoring of physical variables without the microprocessor taking action that affects the
sensor’s readings.
➔ Control is when the microprocessor takes an action that affects the sensor’s readings.
Examples of uses of control systems:
➔ Controlling the environment in a glasshouse.
➔ Regulating the temperature in an air conditioning system.
➔ Controlling of street lighting.
➔ Controlling of automatic washing machines.
Glasshouse:
Sensors used:
➔ Temperature sensor, Humidity/moisture sensor, Light sensor & pH sensor.
Automatic washing machines:
Sensors used:
➔ Temperature sensor
➢ To measure the temperature of the water.
➔ Water level sensor
➢ To measure the water level in the drum.
➔ Pressure sensor
➢ To measure the weight of clothes.

Robots:
A machine that can be programmed to carry on a variety of tasks.
Advantages of using robots:
➔ More accurate than humans.
➔ Higher productivity than humans.
➔ Can work 24/7.
➔ Can produce more consistent results than humans.
➔ Reduces running costs such as wages and overheads.
➔ Can replace humans working in a dangerous environment therefore safer to perform tasks than humans.
➔ Can lift larger and heavier equipment than a human.
Disadvantages of using robots:
➔ Expensive to set up.
➔ High maintenance cost.
➔ Can lead to higher unemployment in manual labour tasks.
➔ Robots cannot think for themselves, they cannot do non-standard tasks.
➔ May cause deskilling when they take over.
➔ Robots are vulnerable to security risks like hacking.
Examples of uses of robotics:
➔ Manufacture, Production line control & Autonomous vehicles (discussed in chapter 8).
Examples of roles of robotics in manufacturing:
➔ Paint spraying a car body.
➔ Welding parts together.
➔ Manufacturing electrical goods.
➔ Stock movement in automatic warehouses.
Examples of roles of robotics in production line control:
➔ Filling bottles with a liquid, capping the bottle and applying a label.
➔ Filling metal cans with baked beans, sealing the cans and applying labels.

Expert System:
Computer software that acts like a human expert in a
particular field.
Expert system’s components:
➔ User interface
➢ Allows users to interact with the expert
system.
➔ Knowledge base
➢ Database that stores all the knowledge about
an area of expertise obtained from several
expert resources.
➔ Rules base
➢ Set of inference rules used by the inference engine to draw conclusions.
➔ Inference engine
➢ The inference engine acts like a search engine examining the knowledge base for information that matches
the queries.
➢ It makes use of the rules base to find the matching results from the knowledge base.
➔ Explanation system
➢ Informs the user of the reasoning behind the expert system’s conclusions and suggested actions.
➢ It gives the percentage probability of the accuracy of the expert system’s conclusions.
How to set up an expert system:
1. Information needs to be gathered from human experts or from written sources such as textbooks, research
papers or the internet.
2. The knowledge base is created, and information gathered is used to populate the knowledge base.
3. A rules base is created
➢ This is made up of a series of inference rules so that the inference engine can draw conclusions.
4. The inference engine is set up.
5. The user interface is created to allow the user and the expert system to interact.
6. The expert system is tested against known scenarios and any changes are made.
Advantages of using expert systems:
➔ Available 24/7.
➔ They offer a very fast response time (much quicker than a human expert).
➔ Allows the system to be used in parts of the world where experts are not available.
➔ They give several different possibilities.
➔ They can store vast amounts of ideas and facts.
➔ They indicate the probability of any suggested solution being correct.
Disadvantages of using expert systems:
➔ They are not human beings therefore they lack common sense.
➔ If the knowledge base contains errors, then incorrect decisions can be made.
➔ Expensive to set up/purchase.
➔ Expensive to maintain.
➔ Cost of training for operators.
Examples of expert systems:
➔ Medical diagnosis, Car engine fault diagnosis, Oil prospecting, Chess games, Financial planning, Route scheduling
for delivery vehicles & Plant and animal identification.
Medical diagnosis expert system steps:
1. The system, through the user interface, asks a series of questions about the patient’s illness.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine compares symptoms entered with those in the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system suggests the probability of the patient’s illness being identified accurately.
7. The expert system also suggests possible solutions and remedies to cure the patient or recommendations on what
to do next.
8. The explanation system will give reasons for its diagnosis so that the user can determine the validity of the
diagnosis or suggested treatment.
Oil prospecting expert system steps:
1. The system, through the user interface, asks a series of questions about geological profiles.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine searches the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system suggests the probability of finding oil as an output.
7. The explanation system will also explain how the expert system arrived at its conclusion.
Plant/Animal identification expert system steps:
1. The system, through the user interface, asks a series of questions about characteristics of the plant/animal.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine compares characteristics entered with those in the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system outputs the name of the plant/animal with percentage of accuracy of the
identification.
7. The explanation system will also explain how the expert system arrived at its conclusion.

Computer Modelling:
A computer program that simulates a real-life system.
Modelling Examples:
➔ Personal finance using spreadsheet, Bridge design, Flood water management, Traffic management & Weather
forecasting.
Advantages of using computer models:
➔ Using computer models is less expensive than having to build the real thing.
➔ Safer to use a computer model if the real situation is hazardous (for example, chemical processes).
➔ Allows you to try out many different scenarios in advance.
➔ Often faster to use a computer model than to do the real thing (for example, climate change calculations and
population growth).
Disadvantages of using computer models:
➔ A model is only as good as the programming, or the data entered; the simulation will depend heavily on these two
factors.
➔ Although building the real thing can be expensive, sometimes computer modelling is also a very costly option.
➔ People’s reactions to the results of a simulation may not be positive; they may not trust the results it produces.
Personal Finance using spreadsheet:
How can modelling used:
➔ Listing the possible income and expenses to be able model the potential profit or loss.
Flood water management:
How can modelling used:
➔ To perform a risk assessment, To identify sources and extent of potential flooding & To identify protection
measures against floods.
Bridge design:
Example of scenarios to be considered in modelling:
➔ The amount of traffic that might be caught in a traffic jam on the bridge in the event of an accident (this could
lead to very heavy loading on the bridge structure).
➔ The effects of strong winds.
➔ The effect of earthquakes.
➔ The effect of tidal waves and ice floes during extreme weather conditions.
Traffic management:
Example of scenarios to be considered in modelling:
➔ Varying the timing of the lights and observing how the traffic flow was affected.
➔ Changing the number of vehicles stopped at part of the junction and then changing the timing of the lights to see
how the traffic flow is affected.
➔ Increasing or decreasing traffic flow in all directions.
➔ Considering how emergency vehicles affect traffic flow at different times of the day.
Weather forecasting:
Weather stations are set up to automatically gather data from the environment. They are usually automatic and use a
variety of sensors to measure; Temperature sensor, Wind speed sensor, Wind direction sensor, Barometric pressure
(air pressure) sensor & Humidity sensor.
How does this system work:
➔ Data from sensors needs to be gathered every hour of every day of the week.
➔ This data can then be input into a model which simulates weather patterns.
➔ By running the computer model, weather forecasters can predict the weather for the next few days or even
longer.
Chapter 9 P2: ICT Systems
Recognition systems:
Optical Mark Reader (OMR):
Uses:
➔ Used in multiple-choice examination papers, School registers & Used to read questionnaires.
Optical Character Reader (OCR):
Uses:
➔ Processing of passports and identity cards & Automatic number plate recognition (ANPR) systems in car parks.
➔ Converting hard copy documents into digital form to be stored on a computer.
Automatic Number Plate Recognition (ANPR) System:
System used to read the number plates on cars.
Uses of ANPR:
➔ To track a specific car, With speed cameras & In car parking systems.
➔ To monitor average speed of vehicles (smart traffic management system).
How does ANPR system read data on number plates?
1. An image of the front of the vehicle is captured using a camera.
2. An algorithm is used to locate and isolate the number plate from the image taken by the camera.
3. Each character is recognized using OCR and converted into digital text.
4. The text is then stored on a database.
Advantages of using ANPR:
➔ There is no need to employ car park security guards, which saves money.
➔ In car parking systems, ANPR is a much faster system than having to check a ticket at the exit.
➔ Can be used as a security system preventing illegal parking and preventing unauthorised access to private car
parks.
➔ Can be used to analyse driver behaviour to help in transport planning.
Disadvantages of using ANPR:
➔ Lack of security guards could lead to vandalism because nobody is checking on a regular basis.
➔ There could be invasion of privacy issues due to the recording of drivers’ number plates.
➔ Damaged or very dirty number plates will not be recognized by the system.
➔ Number plate cloning will not be detected by ANPR
➢ So it is possible for a car to be fitted with a cloned number plate and by-pass car park security.
Radio Frequency Identification (RFID) Reader:
Uses:
➔ Tracking stock, Passports, Automobiles & Contactless payment.
Tracking stock:
Tracking of stock using RFID involves:
➔ Tracking of livestock (on a farm).
➔ Tracking of goods in a shop, supermarket or distribution centre.
Uses in livestock tracking:
➔ Keeps track of the whereabouts of every animal on a farm.
➔ Allows farmers to identify who owns an animal as it is possible for animals to stray into neighbouring fields.
➔ Keeps data about the animals on the tag (for example, medical history, date of birth, identification number).
Uses in retail:
➔ Stores information about products without the need for any manual scanning.
➔ Several tags can be read at the same time, thus speeding up the checkout process.
➔ An item can easily be located because the tag can store its exact location in the warehouse.
➔ Allows automatic tracking of an item from warehouse to customer; the customer can be informed at all stages
where the item is.
Automobiles:
Uses in automobiles:
➔ Can allow or deny access to parking in a private car park.
➔ Used at weigh-stations to ensure the vehicle is not carrying too much weight.
➔ Tags can be used on toll roads
➢ The driver registers their vehicle and attaches a tag to the windscreen.
➢ As the vehicle approaches the barrier, an RFID reads the tag and checks the stored reference number.
➢ If it is valid the barrier will open without them having to stop.
➔ Can be used on a car production line to track its progress through the assembly process.
Passports:
Examples of items of information that are stored on the RFID chip:
➔ Name of passport holder, Passport number, Date of birth, Nationality & Biometric measurement.
Advantages of using RFID technology in passports:
➔ More secure than a traditional passport as biometric data is more difficult to forge.
➔ Forgeries can be easily identified.
➔ Quicker than reading it manually.
Disadvantages of using RFID technology in passports:
➔ Easy to hack into the signal transmitted by the tag.
➔ Tag collision may occur.
Near Field Communication (NFC):
NFC is a subset of RFID technology, operating at a particular frequency, It requires the sender and receiver to be in
very close proximity.
Uses:
➔ Used by smartphones when making payments.
➔ Two smartphones sharing links, contacts and photographs with each other.
➔ NFC devices can function as a smart card and be used as a way of entering public transport systems.
Advantages of NFC:
➔ Requires the sender and receiver to be in very close proximity, which makes communication more secure than
RFID.
➔ Has very fast connectivity.
➔ There is no need to pair the two devices connecting.

Satellite Systems:
GPS (Global Positioning System):
A space-based system that uses satellites to calculate the position of a receiver, Typically, four satellites must be
visible to the receiver.
Uses of GPS:
➔ In satellite navigation systems.
➔ By walkers to locate positions on hills/mountains.
➔ By runners to calculate distance run.
➔ By farmers for livestock control.
➔ In tracking aircrafts.
How GPS can be used to show the route and current location of a taxi car:
➔ The location of the car is calculated using GPS software.
➔ Data is sent to the taxi office computer every few seconds.
➔ An algorithm calculates the speed of the car.
➔ The map is updated every few seconds.
Satellite navigation system (Satnav):
It is a satellite system that uses GPS readings to:
➔ Find location of the user’s receiver.
➔ Navigate the user to a specific destination.
Advantages:
➔ The driver doesn’t have to consult paper maps, so it is safer.
➔ The system can estimate the time of arrival.
➔ It is also possible to program in the fastest route, route to avoid traffic, etc.
➔ The system can also give useful information such as the location of petrol stations, pharmacies, hospitals, etc.
Disadvantages:
➔ If the maps are not kept up to date, they can give incorrect instructions.
➔ Weak satellite signals can give inaccurate data.
➔ If an incorrect starting point/destination point is input, the system will give incorrect data.
How satellite navigation system can be used by a driver to reach a destination:
➔ Destination is input by driver.
➔ Exact position of the motor vehicle is continually calculated using GPS.
➔ The on-board computer contains pre-stored road maps.
➔ The car’s position is displayed on the map.
➔ An algorithm calculates the route from the current car’s position to the destination.
➔ The algorithm makes allowances for traffic jams.
➔ System calculates and outputs the ETA of the journey.
➔ System outputs voice messages to give the correct directions.
GIS (Geographic Information System):
➔ A computer system that allows to map, model, analyse and query large amounts of data according to their
location, Combines maps with computer graphics and databases.
➔ Allows users to
➢ Create interactive queries.
➢ Edit map data.
➢ Analyse spatial data.
Examples of uses:
➔ Emergency services use GIS to send the closest emergency personnel to a location.
➔ Teachers can use GIS in their geography, science or engineering lessons.
➔ Biologists use GIS to protect animal life and plants in certain vulnerable areas (after searching the database).
➔ It can be used for crime mapping in a region or in a country.
➔ It can be used to address public health issues.
➔ It can be used to map wildfire risks.
➔ It can be used for management of agricultural crop data.
Advantages of GIS:
➔ It allows geographical and thematic data of any kind to be combined in a way which shows how they are
connected to each other.
➔ It allows the handling and exploration of huge amounts of data.
➔ It allows data to be integrated from a wide range of very different sources.
Disadvantages of GIS:
➔ The learning curve on GIS software can be very long.
➔ GIS software is very expensive.
➔ GIS requires enormous amounts of data to be input thus increasing the chances of errors.
➔ It is difficult to make GIS programs which are both fast and user-friendly.
Media Communication Systems:
Refers to a method of delivering and receiving data using telecommunications.
Uses:
➔ Transmission of television data.
➔ Transmission of telephone data.
➔ Transmission of internet data.
Advantages of media communication systems using satellites:
➔ Covers the majority of the Earth’s surface.
➔ Cheaper to use than laying cables in difficult landscapes.
➔ They have a very high bandwidth.
➔ Easy to expand the network.
➔ Security is very good as data is coded and the receiver requires decoding equipment to read the data.
➔ Well-suited for broadcasting.
➔ Satellite receivers on the ground can be portable, enabling mobile communication in very remote locations.
Disadvantages of media communication systems:
➔ There is a time delay in receipt of the signals.
➔ Signals received can be affected by bad weather and obstructions (such as tree branches).
➔ Sunspot activity can affect the performance of a satellite.
➔ If they are not in a fixed position relative to the Earth, then they need to be monitored and controlled on a
regular basis to ensure they remain in the correct orbit.

Impact of emerging technologies:


Artificial Intelligence (AI):
A machine or application which carries out a task that requires some degree of intelligence.
Uses:
➔ The use of natural language (e.g. Siri).
➔ Recognizing a person’s face in face recognition systems.
➔ The ability to operate machinery (such as a car, aeroplane, train).
➔ Analysing data to predict the outcome of a future event (e.g. weather forecasting).
➔ Autonomous vehicles.
➔ Robots are used to help people carry out dangerous or unpleasant tasks
➢ Bomb disposal.
➢ Welding of car bodies.
➢ Entering nuclear disaster areas.
Extended Reality (virtual and augmented):
Augmented Reality:
Technology that allows:
➔ Users can experience the relationship between virtual and real worlds.
➔ Virtual objects to be overlaid onto real-world situations.
➔ Real world to be enhanced with digital details (e.g. images, text and animation).
Uses:
➔ Shopping and retail user
➢ Using your smartphone camera, you can try out clothes and see how it looks on you before buying it.
➔ Entertainment
➢ AR takes users into a virtual environment where it is possible to interact with the characters.
➔ Healthcare
➢ Doctors can make use of AR to have a better understanding of a patient’s body.
➔ Safety and rescue operations
➢ It is possible to provide 3D images of an area where a rescue mission is to take place, giving the team the
opportunity to interact with the environment and try out rescue procedures before doing the real thing.
Virtual Reality:
3D computer generated environment that can be explored and interacted with by a person, Can manipulate objects or
perform a series of actions & Makes use of the sensory experience.
Examples of hardware used:
➔ VR goggles.
➔ Speakers.
➔ Joystick.
➔ Driving wheel.
➔ Camera.
➔ Motion sensors.
Uses:
➔ Entertainment
➢ Games where gloves, goggles or helmets are worn to fully immerse players and make it seem very real.
➔ Fashion
➢ See the clothes on people.
➔ Military application
➢ Training to operate a new tank.
➔ Engineering
➢ Seeing how new designs like bridges will look in an existing environment.
➔ Education
➢ Looking inside an ancient building as part of a history lesson.
➔ Business
➢ Training courses and role-playing scenarios for staff.
➔ Sport
➢ A golfer trying to improve his swing can use this technology and get feedback to improve his game.
➔ Media
➢ Interactive special effects in movies.
Chapter 10: Banking Applications
Payment Methods:
Payment methods that can be used instead of paying by cash:
➔ Electronic Funds Transfer (EFT), Credit/Debit card transactions, Credit/Debit contactless card transaction, NFC
payment, Withdrawing cash from ATM & Cheques.
Electronic Funds Transfer (EFT):
A system that allows money transfer instructions to be sent directly to a bank’s computer system, No actual money is
transferred as the whole system relies on electronic transfer of money between accounts.
Uses:
➔ Payment of salaries to the staff of a company.
➔ Credit/debit card is used to pay for a purchase in a store (EFTPOS).
Advantages of EFT:
➔ It is a very secure payment method.
➔ It is a very quick payment method.
➔ It is less expensive than using cheques.
➔ The customer has the right to dispute an EFT payment for up to 60 days.
Disadvantages of EFT:
➔ Once an amount has been transferred, it’s hard for the bank to reverse the transaction.
➔ The customer needs to have funds available immediately (unlike when using a cheque).
➔ It cannot guarantee the recipient (someone with a fake ID could collect the money).
Credit/Debit card transactions:
Steps for debit card transaction using Chip and Pin card to pay a meal to a restaurant:
1) The card is inserted into the Chip and PIN reader and a contact is made with the customer’s bank computer.
2) The card is checked for its validity (check on expiry date, whether stolen card, etc.).
3) The operator enters the value of the meal to be paid.
4) The PIN is entered using a keypad.
5) The PIN is read from the chip on the card and is compared to the one just keyed in
➢ If they are the same, then the transaction can proceed.
➢ If different, the user is asked to re-enter the PIN (3 trials only).
6) Customer’s bank account is checked whether it has enough funds
➢ If there are not enough funds available, then the transaction is terminated.
➢ If there are enough funds, an authorization code is sent to the restaurant.
7) The price of the meal is then deducted from the customer’s account.
8) The same amount of money is then debited to the restaurant’s bank account.
9) A receipt is produced as proof of purchase.
Contactless debit cards:
Steps for contactless debit card transaction to pay a meal to a restaurant:
1) The operator enters the value of purchase.
2) The reader checks the amount to pay is less than the contactless limit.
3) The card is held in front of the reader and data is read from the chip using RFID.
4) The restaurant’s bank's computer contacts the customer’s bank's computer
➢ The card is checked if it is valid.
➢ The customer's balance is checked if it has sufficient funds.
5) If there are enough funds and the card is valid:
➢ Amount is deducted from the customer’s account.
➢ Amount is added to the supermarket’s account.
Advantages of using Contactless Debit Cards:
➔ Fast payment process.
➔ User doesn’t need to worry about typing errors as no PIN is entered.
➔ Uses encryption to improve security.
➔ Less waiting time for customers which increases their satisfaction.
Disadvantages of using Contactless Debit Cards:
➔ Contactless cards are more expensive than normal cards.
➔ The card may be read accidently.
➔ Only small amounts can be withdrawn.
➔ More chance of fraud if the card is stolen/lost.
➔ May not be able to use the ATM as not everyone will be contactless due to cost.
➔ Devices can read the cards wirelessly to steal money.
Near Field Communication (NFC) Devices:
Steps for NFC payment using smartphone:
1) The operator enters the value of the purchase to be paid in the NFC terminal.
2) The smartphone is held close to the NFC terminal.
3) When the NFC payment is initiated, the NFC terminal and smartphone pass encrypted data back and forth to
each other to enable the payment to be made.
4) The customer's balance is checked if it has sufficient funds.
5) If there are enough funds and the card is valid:
➢ Amount is deducted from the customer’s account/wallet.
➢ Amount is added to the supermarket’s account/wallet.
Advantages of NFC payment using smartphone:
➔ Payments are made faster than other methods.
➔ Less waiting time for customers which increases their satisfaction.
➔ User doesn’t need to worry about carrying or using a banking card as only a smartphone is needed.
➔ Uses encryption to improve security.
➔ Smartphones can be protected by biometrics, which means that even if the smartphone is stolen, it cannot be
used to make payments.
Electronic Funds Transfer at Point Of Sale (EFTPOS):
Payment made by card or smartphone at the POS terminal.
Payment methods:
➔ Credit/debit cards transactions (Chip & PIN cards).
➔ Contactless debit cards.
➔ NFC payment.
Point of Sale (POS):
A typical POS has:
➔ A method of inputting the codes of goods purchased (e.g. barcode scanner).
➔ A system to accept electronic payments or EFTPOS.
➔ A method of producing a receipt for purchases (e.g. dot-matrix printer).
➔ A system to update the stock-level of goods whenever they are sold.
Chip and PIN card:
Advantages of using Chip and PIN card over Magnetic strip cards:
➔ Presence of editable memory.
➔ More secure as the PIN typed must match up with PIN stored on chip.
➔ More robust as it’s not affected by magnetic fields.
Disadvantages of using Chip and PIN card over Magnetic strip cards:
➔ ATM fraud has gone up.
➔ The introduction of chip and pin has generated a rise in phishing.
Automatic Teller Machines (ATMs):
Uses:
➔ Withdraw cash, Deposit cash, Deposit cheques, Check the balance of their account, See a mini bank statement,
Pay a bill & Transfer money.
Steps for withdrawing cash using ATM:
1) PIN is entered using the keypad.
2) The PIN is read from the chip on the card and is compared to the one entered in by the customer:
➢ If they are the same, then the transaction will proceed.
➢ If the PIN is not correct, the user is asked to re-enter the PIN (3 trials only).
3) A list of services are given, for example:
➢ Change PIN.
➢ See account balance.
➢ Pay a bill.
➢ Make a money transfer.
➢ Withdraw cash.
4) The customer selects the withdrawal cash service.
5) The customer is asked to enter the amount to be withdrawn.
6) Customer’s balance is checked to see if they have sufficient funds.
7) Check is made to see if the daily limit is exceeded.
8) The customer is then asked if they want a receipt.
9) The card is ejected from the ATM and money is dispensed.
10)Customer’s account is updated.
Advantages of ATM:
➔ It is possible to withdraw cash at any time of day.
➔ They offer many banking services without the need to go into the bank – such as statements, account balance
and bill paying – which helps people to manage their money more easily.
➔ It is possible to access an account from anywhere in the world.
➔ It usually provides quicker service than waiting in a queue in a bank.
Disadvantages of ATM:
➔ They are often in places where theft can take place at night.
➔ There is potential for shoulder-surfing and card-cloning scams.
➔ Some banks charge customers for using ATMs.
➔ Cash withdrawal limits are often imposed on customers.
➔ If the debit card is faulty then no transaction can take place.
➔ There is a loss of the personal touch, which some customers will not like.
Cheques:
A typical bank cheque has:
➔ Place to write the amount.
➔ The code line, which consists of:
➢ Account number.
➢ Sort code/Branch code.
➢ Cheque number.
➔ Place for signature.
➔ Place to whom the cheque is written to.
➔ Place to write the date.
Advantages of using cheques:
➔ More convenient and safer than cash.
➔ It is possible to stop payments if necessary.
➔ A cheque can be drawn any time (up to six months after it was dated and signed).
➔ Cheques can be post-dated.
➔ Cheques can be traced if they are 'lost'.
Disadvantages of using cheques:
➔ Cheques can be refused.
➔ It is a slow method of payment.
➔ Easier for fraudsters than credit card or debit card payment methods.
➔ Relatively expensive payment method.
Automatic re-ordering of stock:
Steps for automatic update & re-ordering of stock:
1) Before payment, the barcode of each goods is scanned to calculate the total price and amount of all goods
purchased.
2) The barcode is then searched in the database of the stock control system record by record until a match is
found.
3) The ‘number in stock’ of the matching record is read.
4) The ‘number in stock’ is subtracted by the quantity sold to the customer.
5) The new ‘number in stock’ is compared with the re-order number.
6) If the new ‘number in stock’ of the searched goods is lower than the re-order number, then more stock is
automatically re-ordered from the suppliers.
7) The new value for ‘number in stock’ after subtracting what the customer has purchased is written back to the
file and the database is updated.
Internet Banking:
Uses of internet banking:
➔ Check the balance of bank accounts.
➔ Pay bills.
➔ Transfer money between accounts (using EFT).
➔ Apply for loans.
Advantages of internet banking to the customers:
➔ Disabled and elderly people can now access any bank without the need to leave home.
➔ Banking can be done at any time on any day of the week.
➔ No queues, so it saves time.
➔ Allows people to spend more time doing other things.
Disadvantages of internet banking to the customers:
➔ Security issues (e.g. hacking, stealing credit card details, etc.).
➔ Accidently using fake bank websites.
➔ It is necessary to have a computer and internet connection.
➔ It is easier to transfer money incorrectly to different accounts using online banking.
➔ Possibility of isolation and lack of socialisation.
Advantages of internet banking to the banks:
➔ Fewer staff is needed, It isn't necessary to have as many branches, which saves cost.
➔ Banks also need to employ fewer security staff, which saves cost.
➔ Because the internet is global, the potential customer base is increased.
➔ Potential customer base is increased.
➔ Robberies are less likely.
Disadvantages of internet banking to the banks:
➔ Cost of retraining staff.
➔ Costs of setting up and maintaining websites to enable online banking.
➔ Drop in customer loyalty, which could lead to loss of customers.
Extras
Software:
Recall that there are two types of software: Application and System.

Examples of Application Software Definition


Computer-Aided Design (CAD) Software that allows users to design 3-D models.

Word Processor Software used to create and edit text documents.

Spreadsheet Software used to manipulate numerical data.

Database Management System It is used to store, manipulate and analyse data.

Web-authoring Software Software that allows individuals with no programming experience to create
their own websites.

Presentation Software used to create slide-show presentations.

Control and Measuring Software Software designed to allow a computer or microprocessor to interface with
sensors.

Apps/Applets Software that runs on mobile phones or tablets.

Examples of System Software Definition


Operating System It is software running in the background of a computer system and manages
many of the basic operations.

Device Driver Software that allows hardware devices to communicate with the computer’s
operating system.

Compiler A program that translates code written in a high level-programing language


into computer language.

Linker A program that links one or more modules and combines them into a single
program.

Utilities Programs that help to manage and maintain computer resources.


Eg. antivirus, Anti-spyware, File management, screensavers & Disk repair.

Bluetooth and Wi-Fi:


Steps of how Bluetooth works Steps of how Wi-Fi works
1) Switch on the Bluetooth on the first device. 1) The computer sends data to its wireless adapter ..
2) Both devices automatically connect when they come 2) .. to be converted to radio waves.
into range. 3) The radio waves are transmitted to wireless routers.
3) Bluetooth uses a band of 79 radio frequencies to send 4) Wireless router receives the radio waves and
and receive data. converts them into data
4) The tablet randomly picks one of the 79 frequencies.
5) If it is being used it randomly chooses another
frequency.
6) The used frequency constantly changes to avoid
interference (spread-spectrum frequency hopping).
Mobile Communication:
Examples of uses of mobile devices for communication:
➔ Make/receive phone calls.
➔ Text messaging.
➔ Instant messaging.
➔ Video calls.
➔ Surfing the internet.
➔ Sending and receiving emails.
➔ Streaming of music/videos.

Electronic Mails (emails):


Email terms:
Definition
cc (carbon copy) Email addresses listed after cc are sent a copy of the email that is sent to the main recipient.

bcc (blind carbon copy) Same as cc except that the recipient is unaware that copies have been sent.

forward This sends a message that has been received to another email address.

reply This sends a message to the email address of the sender.

attachment A file that is sent attached to the email.

group A group of email addresses that are given a group name so that the sender only needs to type in
one name to send an email to several recipients at once.

Constraints that affect the use of email:


Constraints:
➔ Laws within a country, Acceptable language, Netiquette (Internet Etiquette), Local guidelines set by an employer
& The need for security.
Laws within a country:
Examples of laws withing some countries:
➔ Senders of emails are required to obtain permission from the recipients before sending emails to them (opt-in
permission).
➔ Organisations must make their privacy policy very clear to subscribers.
➔ Emails must not have false or misleading subject lines.
➔ A company or individual must have a clear way for recipients to avoid receiving emails from them (opt-out).
Acceptable language:
Rules of acceptable language in emails:
➔ Include a clear and direct subject line.
➔ Use professional greetings.
➔ Be cautious with sarcasm.
➔ Do not use capital letters as it implies shouting.
➔ Proofread the message before you click send.
➔ Do not use offensive words.
Netiquette (Internet Etiquette):
Refers to the need to respect other users’ views and display common courtesy online.
Rules of netiquette:
➔ Don’t be abusive.
➔ Always check your spelling and grammar.
➔ Respect people’s privacy and don’t discuss or publish info that might embarrass somebody.
➔ Don’t use CAPITAL LETTERS to highlight comments.
➔ Don’t plagiarise.
Local guidelines set by an employer:
Sometimes an employer can set his/her own rules of using emails, which may restrict the usage of emails.
Electronic Conferencing:
Video-conferencing:
Conference that uses simultaneous two-way communication, Allows people in two or more locations to communicate, Uses
video and audio streaming, Uses internet connection & Allows long distance communication.
Hardware used:
➔ Webcams/Video cameras, Large monitors/Television screens, Microphones & Speakers.
Software used:
➔ Webcam and microphone software drivers, CODEC (COmpression-DECompression) & Echo cancellation software.
Advantages of video conferencing:
➔ Reduces the cost of travelling to the meeting.
➔ Reduces the cost of hotel accommodation.
➔ Safer than travelling.
➔ Reduces the time lost in working due to travelling.
➔ It is possible to hold conferences at short notice.
➔ Workers use their own offices so documents do not get lost while traveling.
➔ Better solution for disabled people who cannot easily travel.
Disadvantages of video conferencing:
➔ Expensive to set up.
➔ There could be time lag in the responses if no reliable internet connection is available.
➔ Lip sync problem if no reliable internet connection is available.
➔ Training people to use the system correctly can be both costly and time consuming.
➔ Needs to consider different time zones of participants when setting an international meeting.
➔ Difficult to manage contributions as if more than one person talks at once it is difficult to hear what is said.
➔ Difficult to sign documents/contracts.
Audio-conferencing:
Refers to holding a meeting between people using audio equipment over the telephone network or the internet.
Equipment used:
➔ A computer.
➔ Microphone.
➔ Speakers.
OR
➔ A standard phone.
OR
➔ An internet phone (plugs into a router).
Advantages of audio-conferencing:
➔ Does not require internet connection.
➔ Does not have time lag.
➔ Lip sync errors cannot occur.
➔ Greater sound quality than video-conferencing.
➔ Requires less equipment than video-conferencing so less expensive.
➔ Greater stability than video-conferencing (less chance of disconnection).
Web-conferencing:
Real time communication between multiple users over the internet.
Hardware used:
➔ Webcams, Monitor, Microphones & Speakers.
Features:
➔ Sending instant messages.
➔ Users are able to hear each other using VOIP.
➔ Users are able to send images or videos.
➔ Documents can be shared by uploading them.
➔ Users are able to see the same screen at all times in their web browsers.
Differences between web conference and video conference:
➔ Video conferencing provides two-way communication whereas web conferencing can be either two-way or a
webcast.
➔ Video conferencing is more expensive to set up as it requires specialised equipment on both ends whereas web
conferencing uses a computer.
➔ Video conferencing participants use a shared microphone and speakers whereas web conferencing participants sit
at their own computers.
➔ Sound quality on video conferencing is poorer than web-conferencing.
Accessing the internet:
Advantages Disadvantages

Desktop Computers Usually have a more stable and reliable You have to buy extra hardware to access the
internet connection. internet.
All web pages are accessible due to larger If there’s a power cut, you can’t use the PC as it
screen size than other devices. need constant power supply.

Laptops Laptops are more portable than PCs. Heavier and less portable than tablets or
Use of full-sized keyboard and pointing smartphones.
devices which makes web page navigation much Screen size is not as large as that on a PC.
easier compared to tablets/smartphones.
All web pages are accessible due to the large
screen size.

Smartphones, Very portable. Screen sizes are smaller than other devices which
Easier to use a smartphone while on the move makes it harder to read web pages and to type in
Tablets & Phablets
than other devices. messages.
Not all websites may be accessible using
smartphones/tablets.
Signal is less stable than a wired system (used by
PCs and laptops).

Internet Shopping:
Advantages to the customers:
➔ Reduces cost and time of transportation.
➔ Users also have access to a much wider choice of goods.
➔ Shopping can be done at any time on any day of the week.
➔ Saves time as there are no queues.
Disadvantages to the customers:
➔ Security issues such as viruses and other malware.
➔ The risk of accidently using fake shopping websites.
➔ It is necessary to have a computer and internet connection.
➔ Goods arrive after several days.
➔ Returning goods is expensive.
Advantages to the business companies:
➔ Saves cost of having many staff members.
➔ Saves cost of having multiple branches.
➔ Potential customer base is increased.
Disadvantages to the business companies:
➔ Cost of retraining staff.
➔ Cost of setting up and maintaining websites to enable online shopping.
➔ Could lead to a drop in customer loyalty, which could lead to loss of customers.

Online booking systems:


Uses:
➔ Travel industry, Concerts (theatre and music events), Cinema tickets & Sporting events.
Advantages of online booking systems:
➔ Prevents double bookings.
➔ The customer gets immediate feedback on the availability of seats and whether or not their booking has been
successful.
➔ The customer can make bookings at any time of the day.
➔ Easier to browse the seating plans to choose the best seat available at the price.
Disadvantages of online booking systems:
➔ Expensive to set up.
➔ The need to have a computer and a reliable internet connection.
➔ More difficult to cancel the booking and get your money back using online systems.
➔ If the system breaks down, booking will not be made.
➔ If the websites are not well designed, it can be difficult to make exactly the booking you want and can lead you
to make mistakes.
➔ Lack of personal relationship with travel agents who might offer free upgrades or special offers.
Steps carried out by the theatre’s computer when making a theatre ticket booking:
1) Customer enters a performance reference number.
2) Computer looks up the performance reference number in the database.
3) Matching record is retrieved.
4) Check if the seats are available.
5) Flags the seats as temporary holds to stop double booking.
6) Calculates cost of seats.
7) After a customer pays for the seats, the computer generates e-ticket/prints ticket.
8) E-ticket/ticket sent to customer by email or SMS.
9) Receipt is printed.
10)Computer finally reduces the number of available seats by the number booked once the booking is complete.
11)If booking is not completed, then the temporary hold flag is removed from the seat.

School Management Systems:


Tasks of school management systems:
➔ Managing registration and attendance of students, Recording student performance & Computer-aided learning.
Managing registration and attendance of students:
Methods that can be used to automatically record attendance:
➔ Using magnetic stripe cards & Using biometrics.
Magnetic stripe cards:
Data that can be stored on the magnetic stripe ID cards:
➔ Unique student ID number, Student’s name, School’s name & Student’s date of birth.
Steps to register and record attendance using magnetic stripe ID cards:
1) On arriving to school each morning, the student swipes their ID card through a magnetic stripe reader.
2) This is done to record the arrival time and date to be stored on a database.
3) This data would now be stored on a database.
4) On leaving the school, the ID card would again be swiped to record the leaving time and date on the database.
5) To produce an attendance report for any student, the database is searched at any given time to retrieve the
attendance record for the student.
Advantages of using magnetic stripe ID cards instead of paper-based registers:
➔ Takes less time to register students and to record the attendance on the database.
➔ Less errors are produced as a student name may be missed during the registration process.
➔ Takes less time to retrieve the attendance report for any student.
➔ A more secure method to keep attendance records in the event of a fire.
Biometrics:
Steps to register and record attendance using biometrics:
1) Each student would have their fingerprints recorded.
2) On arriving at school each morning, the student is asked to put their hand on a scanner which would read their
fingerprint.
3) The date and time of entering the is recorded on the database.
4) On leaving the school, the student again scans their fingerprint to record the leaving time and date on the
database.
5) To produce an attendance report for any student, the database is searched at any given time to retrieve the
attendance record for the student.
Advantages of using biometrics instead of magnetic stripe ID cards in this scenario:
➔ More accurate data and improved security as fingerprints are unique.
➔ ID cards could easily be lost but fingerprints cannot be lost.
➔ Not affected by magnetic fields unlike ID cards.
Disadvantages of using biometrics instead of magnetic stripe ID cards in this scenario:
➔ It would take a long time to collect the fingerprints for every student in the school.
➔ The equipment needed to take and read fingerprints is more expensive than magnetic stripe reading equipment.
➔ If a student cuts a finger, the fingerprint may not be identified by the system.
➔ A number of students and parents may object to having fingerprints stored on a database.
Recording student performance:
System features:
➔ Recording the test results of each student over a term.
➔ Recording behavioural data of each student over a term
➢ Attendance records.
➢ Number of times the student was in detention.
➔ Produce an end-of-term report showing academic and behavioural performance.
Computer-Aided Learning (CAL):
The use of computer systems to enhance the learning and teaching process.
Advantages of using CAL to enhance the learning process:
➔ Students can learn when they want to and at their own pace.
➔ Can make learning more interactive.
➔ VR learning can be used, which allows the student to be fully immersed into the learning environment.
➔ The student can stop at any point and return later to continue where they left off.
➔ Can make use of MCQs which can be marked immediately by the computer system, giving instant feedback to the
student.
Disadvantages of using CAL to enhance the learning process:
➔ Expensive to integrate CAL properly into the learning environment.
➔ Time consuming to integrate CAL properly into the learning environment.
➔ Students can easily be distracted while online.
➔ It’s not a self-contained learning system as it cannot answer unusual questions.
➔ It can lead to the isolation of a student because they are spending their time on their own in front of a
computer screen.

Communication media:
Posters:
Characteristics of posters:
➔ Can be printed out using high-quality printers or can be posted online.
➔ Available in different sizes.
➔ Used on the side of the roads so motorists can see posters on their way.
Advantages of using posters:
➔ Large posters are eye-catching and usually very difficult to miss.
➔ Can target certain people rather than the general public by placing them in strategic positions.
Disadvantages of using posters:
➔ There’s a cost of display as advertising areas can only be rented.
➔ They are subject to weather conditions.
Newsletters:
Characteristics of newsletters:
➔ Can be printed out using high-quality printers or can be posted online.
➔ Regularly distributed.
➔ Contains information related to an organisation.
Websites:
Characteristics of websites:
➔ Can use sound files, videos and animations.
➔ Links to other pages and websites using hyperlinks.
➔ Contain buttons to navigate the website.
➔ Can allow the owner of the website to know how many people have visited the website.
Advantages of using websites for communication:
➔ Can be seen by a global audience.
➔ Cannot be damaged or thrown away as with newsletters and posters.
➔ It is much easier to update a website compared to newsletters and posters.
➔ Links to other pages and websites can be added in hyperlinks.
Disadvantages of using websites for communication:
➔ Websites can be hacked.
➔ There’s a risk of potential pharming.
➔ It is necessary for the potential customers to have a computer and internet connection.
➔ Cost of setting up and maintaining the website can be expensive.
➔ It is more difficult to target the correct audience.
Multimedia presentations:
Characteristics of multimedia presentations:
➔ Can use sound files, videos and animations.
➔ Can have interactive links.
➔ Makes use of transition effects.
➔ Created using presentation software.
➔ Presented using multimedia projectors or screens.
Advantages of using multimedia presentations:
➔ The use of sound and animation effects grabs the attention of the audience and makes the presentation easier
to understand.
➔ Can be interactive.
➔ Flexible and can be tailored to suit a particular audience.
Disadvantages of using multimedia presentations:
➔ They need to have special equipment which can be expensive.
➔ Danger that equipment could fail while giving multimedia presentations.
➔ There may need to be internet access.
➔ Very easy to make a bad presentation with too many animation effects and too much text or images.
Media streaming:
Characteristics of media streaming:
➔ Data is transmitted and played in real time.
➔ Must be connected to the internet.
➔ Saves storage space as no download is needed.
➔ Saves download times as no download is needed.
➔ Quality is dependent on internet speed and the video/audio quality.
➔ Makes use of buffering to make sure video/audio plays back smoothly without freezing.
e-publications:
Examples:
➔ e-books.
➔ Digital magazines.
➔ Digital newspapers.
➔ Digital libraries.
Characteristics of e-publications:
➔ Can be downloaded to a device to be read.
➔ Moving between pages is usually done by swiping a finger across the screen.
➔ Pages can be expanded in size.
➔ Publications can include media.

Spell checker software:


How does spell checker work:
➔ Compares each typed word with its dictionary/database.
➔ Uses algorithms to check the spelling.
Why spell checker software may not always give appropriate suggestions:
➔ The language used in checking the spelling could be different (For example, English US and English UK).
➔ Names or proper nouns might be highlighted as an error by the spell checker.
➔ Similar sounding words need to be checked (for example, where, were or wear all sound the same but have very
different meanings).
➔ The spell checker may not understand the word if it is very badly misspelt.
➔ The word may not exist in the spell checker dictionary.

Audience appreciation:
Factors to be considered:
Features to make a presentation appeal to the adults:
➔ Use a small font size.
➔ Use a formal font type.
➔ Use of technical language.
➔ Use fewer images and more text.
➔ Don’t use too much colour.
➔ Use plain and simple backgrounds.
➔ Use of both upper and lower case characters to make it easier to read.
Features to make a presentation appeal to the young children:
➔ Use animation (to keep their attention).
➔ Use sound (to keep them interested).
➔ Use larger font size (so the text is easier to read).
➔ Make the presentation colourful (to keep their attention).
➔ The language used needs to be simple.
➔ Short sentences should be used.
➔ More images than text is needed.
➔ Slide transitions need to be used.
Features to make a website appeal to young children, adults and older people:

You might also like