Ict Notes
Ict Notes
Computer: is a device that receives input, does processing on that input and then produces the output.
★ Computers consist of two main components: Hardware & Software.
Software:
➔ Programs for controlling the operation of a computer system and processing of electronic data.
➔ There are two types of software: Applications and System.
Applications Software: Programs that provide the services that a user requires to solve a task.
Eg. Word processor, Spreadsheet, Database management system, Graphics editing, Video editing, Audio editing.
System Software: Programs that provide the services that computers require to run properly.
Eg. Operating system (OS), Device Driver, Compiler, Linkers, Utilities (Anti-virus).
Can be written to and read from. Can only be read from but not written to.
Used to store data, programs or parts of the operating Stores the start-up instructions when the computer is first
system that are currently in use. switched on.
Backing storage: Non-volatile storage that is not directly accessed by the CPU and Can be fixed or removable.
Can send data to another device, but it cannot receive data Can receive data from another device, but it cannot send
from another device. data to another device.
The devices are under the control of the user or can be Output devices are under the control of the computer.
direct data entry.
Command life An interface that the Uses less memory than GUI. Commands must be learnt and
user would have to type Requires less processing power memorised by the user.
interface
commands to interact than GUI. Commands must be typed in
(CLI) with the computer. The user is in direct contact exactly.
with the computer. Commands must be typed which
takes time.
Graphic user Interface built around No need to memorise any Consumes more memory than CLI.
graphical items. commands. Requires more processing power
interface
It uses WIMP interaction More user friendly than CLI. than CLI.
(GUI) (Windows, Icons, Menus Fewer errors are made. Computer settings are protected
and Pointer from the user.
Dialogue based Interface that uses the Very useful for people with Can be too complex to set up.
human voice to give disabilities. User needs to know which
interface
commands to a computer Can be used as a security commands can be used.
system. feature to identify a person.
Gesture based Interface that relies on No physical contact required. Only works near the camera or
human interaction by the No training needed to interface sensor.
interface
moving of hands, head or with the computer. May only accept a limited number
the feet. of movements.
Types of Computers:-
Types of computer Advantages Disadvantages
Tablets Very fast to switch on. Have less storage capacity than laptops and Pcs.
Have better battery life than laptops. Expensive when compared to laptops.
Less heat is generated.
Digital data:
Discrete data that has only two values 0 and 1.
● Note: any electronic device reads digital data.
Mouse Doesn’t need a large desk area Difficult to use if no flat Moving and deleting files.
when compared to a keyboard. surface is readily available. Controlling the position of a
Faster way to choose an option Difficult to use for people pointer on the screen.
compared to keyboard. with restricted hand
movement.
Touchpad Takes less physical space than a Difficult to control compared Moving and deleting files.
mouse. to a mouse. Controlling the position of a
More suitable if there is no flat Difficult to use for people pointer on the screen.
surface available. with restricted hand
movement.
Tracker ball Needs less desk space than a Needs training as it’s not In some luxury cars to select
mouse. standard equipment. functions.
Easier to use than a mouse. More expansive.
Other input devices:
Keyboard Easy way to input data. Slower method compared to Input of data into applications
Allows input to a variety of direct data entry devices. software.
data. Large device which uses up desk Typing in commands to the
Fast entry of new text. space. computer.
Numeric Very easy to carry around. Have small keys which can make In ATMs to enter data.
Faster than keyboards to input more difficult. Fast entry of numeric data
keypad
input numbers. Not used to enter text. into a spreadsheet.
Joystick Control is more realistic than More difficult to control a In video games.
using a mouse. pointer using a joystick than Flight simulators.
Easier than a keyboard to other pointing devices.
navigate the screen.
Microphone It's faster to read text than Use up a lot of computer To input speech in
to type. memory. presentations.
Graphic More accurate in drawing More expensive than other To input freehand drawing.
than using pointing devices. pointing devices.
tablet
Scanner Allows images to be stored Can be slow. Scan documents and convert
for further editing. them into a digital format.
Light pen Greater accuracy than touch Problems with lag when drawing Selecting/drawing objects on
screen. on screen. CRT screens.
Direct Data Entry (DDE) device: Devices used to input data into a computer with minimal human interaction.
Optical Faster data entry system than Device has difficulty in reading Processing of passport
manually typing data. handwriting. and identity cards.
character
Errors are reduced as there is Not a very accurate technique to
reader (OCR) no manual input. read text.
Optical mark Very fast way of inputting data. If the marks don’t fill the space Multiple choice
More accurate than keying in the completely they may not be read examination papers.
reader (OMR)
data. correctly. School registers.
More accurate than OCR. If the marks are not dark enough
they may not be read correctly.
Barcode reader Much faster than keying in data More expensive system than using In the supermarket.
manually. keyboards. libraries.
Errors are reduced as there is Barcodes can be more easily
no manual input. damaged compared to RFID, chips
and magnetic stripes.
Quick response Can hold more data than Can be used to transmit malicious Giving automatic access
traditional barcodes. codes. to a website.
(QR)
Faster and easier to scan. More than one QR format is
available.
Radio frequency Can store more data than Can hack into the data by the tag. Contactless payment.
barcode. Initial cost is more expensive than (tag: contain Microchip
identification
Allows greater security than the barcode. to store & transmit
(RFID) barcode. Tag collision may occur. data and Antenna to
Very fast read rate. receive & transmit
data)
Magnetic stripe Much faster than keying in data Data will be lost if it's damaged. ATM cards.
manually. Doesn’t work at a distance.
reader
Errors are reduced as there is
no manual input.
Chip and PIN More secure than contactless as Ensure PIN isn’t read by somebody ATM cards.
PIN must be typed. else while typing.
reader
More robust system than
magnetic stripe.
Contactless Faster transaction than other More expensive than a normal card. ATM cards.
payment methods. The card may be read accidentally.
card reader
Sensors Take more accurate readings Can give false results. Temperature sensor.
than humans.
Output devices:
CRT Least expensive monitor to buy. Heavyweight devices. Allow designs to be created on
They allow the use of light pens. Have a large footprint. screen with light pens.
Consume more power.
LCD / TFT Lighter than CRT. More expensive to buy than CRT. Mobile phones, tablets and
Less power consumption than CRT. Narrower angle of viewing laptops use LCD screens.
Sharper image than CRT. compared to CRT.
Laser Higher printing quality. Higher initial cost. Produce 500 high-quality
Higher printing speed. flyers.
Dot-matrix Best printer to work in a dusty Low printing speed. Produce a shop receipt.
environment. Low quality printing.
Very cheap to run and maintain. Very noisy.
Plotter Large output can be produced. Very high initial cost. Producing architectural
Very high-quality printing. Very slow at printing. drawings.
Projector Enables many people to see a Expensive to buy. Home cinema system.
presentation. Difficult to set up. For presentation.
Avoids the need for several
networked computers.
Speakers Very simple technology. Can have a large Used in all phones
footprint.
Actuators They allow remote operation of Could go wrong. Controlling robot arm.
many devices.
Chapter 4: Storage Devices
Backing up data:
The process of making one or more spare copies of data and storing them on an alternative device/medium.
Importance of backing up data:
➔ To be able to retrieve data in case of accidental deletion.
➔ To be able to retrieve data in case of accidental overwriting of files.
➔ To be able to retrieve data in case of malicious damage.
Backing storage:
Non-volatile storage that is not directly accessed by the CPU, used to store files and software.
RAM & ROM are fixed inside the computer Can either be fixed or it can be removable
Stores boot up instructions and can hold data during processing Stores files and software
Fixed Hard Large storage capacity. Noisy when compared to an SSD. To store the operating
Fast data transfer rate. Have many moving parts ‘’affect their system.
Disk Drive
Fast data access time. reliability’’. To store system
(HDD) An incorrect shutdown procedure could software.
lead to loss of data.
Portable Hard Large storage capacity. Data transfer rate is not as fast as To store backups.
Fast data transfer rate. HDD. To transfer data
Disk Drive
Fast data access time. Have many moving parts. between computers.
Magnetic Tape Huge storage capacity. Very slow data access time. To store backups.
Fast data transfer rate. They are affected by magnetic fields.
Drive
Cheaper per unit memory than
HDD.
Optical media and Optical storage devices:
Advantages of optical media:
➔ Cheaper than other storage devices.
➔ Portable.
Disadvantages of optical media:
➔ Slow data transfer rate.
➔ Slow access time.
➔ Not compatible with all computers.
Note: optical media (CD, DVD, Blu-ray disc) & Optical devices (CD drive, DVD drive, Blu-ray drive)
CD/DVD - ROM Less expensive than HDD. Data transfer rate is slower than CD: to store music and
“Can only be read” HDD. software.
Data access time is slower than DVD: to store movies.
HDD.
CD/DVD - R Cheaper than RW disks. Not all CD/DVD drives can read File transfer between different
“Write only once” Once burned they behave like them. computers.
ROM. Archiving of data.
CD/DVD - RW Can be written over many times. More expensive than ROM and R To store data and backups.
“Can be written to or Files/data can be added at a formats. File transfer between different
read from many times” later stage. It can overwrite data accidentally. computers.
DVD-RAM Can read and write data at the More expensive than other To store backups.
same time. CDs/DVDs. File transfer between different
computers.
Blu-ray Greater storage capacity. Most expensive optical device. To store HD movies and games.
Faster data access time than To store backups.
others. File transfer between different
Faster data transfer rate than computers.
others.
SSD Faster data transfer than HDD. More expensive per unit memory. To store the operating
Faster data access time than HDD. HDD has greater longevity than SSD. system.
Less power consumption than HDD. To store system software
Run quieter and lighter than HDD. and working files.
Memory cards Small and can be easily used. Lower storage capacity than HDD. To store photos on a
Very durable. More expensive per unit memory digital camera.
HDD. To store backups.
Steps to transfer files from a computer at home to another computer at university using cloud storage:
1) User logs into the cloud from any device at home using the internet.
2) User ensures sufficient storage in the cloud account.
3) User uploads the files from his home computer to the data server.
4) User then logs into the cloud storage account from the university’s computer using the internet.
5) Finally, the user downloads the files on the university’s computer.
★ Primary Key: A field that contains unique data that identifies a record.
★ Flat-File Database: Database where all the data is held in a single table.
★ Relational Database: Contains more than one table linked to each other, it uses relationships and it makes use of
foreign keys.
★ Foreign Key: It is a primary key in another table needed to act as a link between two tables.
Similarities between relational databases and flat file databases:
➔ Both use a primary key.
➔ Both can create reports.
➔ Both store data in records and fields in the table.
Advantages of relational database over flat-file database:
➔ No duplication of data so less data entry.
➔ Saves time when entering data due to less data entry.
➔ Less errors are produced due to less data entry.
➔ Saves storage space as data is only stored once.
➔ Easier to add/modify/delete data.
Disadvantages of relational database over flat-file database:
➔ Takes more time to set up.
➔ More complex to understand.
➔ Sorting of data is more complex.
➔ Slower extraction of data.
Differences between primary key and foreign key:
➔ Each table has one primary key whereas a table can contain several foreign keys.
➔ Primary key holds unique data while foreign key can be replicated in the table.
➔ Primary key identifies the record while foreign key is used to link with the primary key of another table.
Validation check Description Example
Presence check Checks if data is present and hasn’t been left A person’s ID may be required.
blank. If no data entered, an error message will be
produced.
Lookup check Checks if value entered is available in a limited When registering a course in IGSES, the session
list of items. must be either June, Nov or Jan. no other entry
should be accepted.
Range check ○ Checks whether numeric data is To check if a student’s age is <18 and >0.
within given values.
○ Uses 2 boundaries.
Limit check ○ Checks whether numeric data is To check if a student’s age is <18.
within given values.
○ Uses 1 boundary only.
Length check Checks if the input data contains the required If a field needs 6 digits, then inputting 5 digits
number of characters. should cause an error message.
Type check Checks that the input data has the appropriate A person’s age should be a numeric integer not
data type. alphanumeric.
Format check Checks the data is in a specific format or fixed A date should be in the form of dd/mm/yyyy.
pattern.
Character check It checks that a string of characters doesn’t A name should not contain characters such as %.
contain any invalid characters or symbols.
Check digit A validation check used in barcodes to validate Validating the correctness of a barcode.
the correctness of the barcode.
Data Verification:-
Checking that the data has been copied/entered correctly from the source.
1) Visual check: data is compared visually with the source document by a user, the user is asked to confirm that
the data entered is the same as original, if the user finds a difference, the data is re-entered.
2) Double data entry: Data is entered twice by the same person, a computer checks that both entries are equal, if
they are not equal, an error message requesting to re-enter the data is displayed.
Why it is necessary to carry out validation as well as verification for this system:
➔ Not all errors are found by either validation or verification separately.
➔ Source document may contain errors.
➔ Verification only checks that data is copied correctly.
➔ Validation only checks if data is reasonable/sensible.
Chapter 6 P1: Introduction to networks
Network: is the connection of two or more electronic devices.
Advantages of connecting a network:
➔ Sharing of hardware and software resources between networked computers.
➔ Sharing of data between networked computers.
➔ Ease of communication between networked computers.
Disadvantages of connecting a network:
➔ Easier spread of viruses throughout the whole network.
➔ Increased security risks when compared to stand-alone computers.
➔ Slower access to the internet.
Types of networks:-
LAN (local area network):
Network that uses cables and covers small geographic areas, for example a building.
WLAN (wireless local area network):
Network that uses wireless communication to connect between devices in a small geographic area.
The main wireless technologies used to form a WLAN are Wi-Fi and Bluetooth.
Advantages of connecting to a WLAN rather than to a LAN:
➔ Reduces cost of cables.
➔ Safer as users won’t trip over wires.
➔ Easier to connect other devices to the network.
Disadvantages of connecting to a WLAN rather than to a LAN:
➔ Less secure.
➔ The data transfer rate is slower than in a wired LAN.
➔ Physical obstacles can affect the signal.
Similarities between Bluetooth and Wi-Fi:
➔ Both use wireless communications.
➔ Both use radio waves for communication.
➔ Both allow several devices to be connected.
➔ Both use security when sending data.
Differences between Bluetooth and Wi-Fi:
➔ Wi-Fi has a faster data transfer rate than Bluetooth.
➔ Wi-Fi has a greater range of transmission than Bluetooth.
➔ Wi-Fi connects more devices than Bluetooth.
➔ Bluetooth is simpler to use and set up.
➔ Cost of Bluetooth is cheaper than Wi-Fi.
WAN (wide area network):
Network that covers a large geographic area.
Eg. the internet , the network of ATMs used by banks.
Network devices:
Function
Bridge Connects one LAN to another LAN that uses the same protocol.
Used to connect different parts of a LAN so that they can function as a single LAN.
Firewall It is a device/software that sits between the user’s computer and an external network and
filters incoming and outgoing traffic based on a given set of criteria.
Blocks traffic that doesn't meet the criteria.
Warns and prevents unauthorised access to the system.
Can prevent viruses being transmitted.
Internet service Company that provides a connection to access the internet with a monthly fee.
Monitors internet usage.
provider "ISP"
Gives uses an IP address.
Provides security services.
Internet Intranet
Extranet:
It is a private network that is controlled by a company, allowing access for authorised customers.
Extranets have the same uses and advantages of intranets, but it can also allow authorised users outside the organisation to have controlled
access to some information.
Hyperlink Word/phrase/image when clicked links to another website or another portion in the same
webpage.
Hypertext markup A mark-up language used to create web pages uses tags to format content.
language "HTML"
World wide web Information space that consists of a massive collection of web pages all connected together
using hyperlinks, WWW is only part of the internet that can be accessed by web browser.
"WWW"
Web Server Computer that contains webpages, it has an IP address and a domain name.
Uniform resource A unique text-based address for a web page, it contains the protocol, the domain name and
the file name.
locator "URL"
Protocol A set of rules agreed by the sender and the recipient when data is transferred between
devices.
URL structure:
http://www.cie.org.uk/gcseict/giraffe.html
➔ Protocol: http://
➔ Domain name: cie
➔ Domain type: .org
➔ Country code: .uk
➔ Folder: gcseict
➔ Filename: giraffe.html
Protocol:
Hypertext Transfer Protocol (HTTP):
The main protocol that controls the transmission of data to and from web servers.
Uses:
➔ In accessing the world wide web.
➔ In transferring contents of a webpage to a web browser for viewing.
➔ In downloading from web servers.
Hypertext Transfer Protocol Secure (HTTPS):
Protocol used to control the transmission of data to and from web servers but with encryption, uses SSL.
Secure Socket Layer (SSL):
A security protocol that uses encryption to allow data to be exchanged securely between two devices over the
internet.
Uses:
➔ Online banking.
➔ Online shopping.
➔ Sending and receiving emails.
➔ Intranets and extranets.
➔ VOIP when carrying out video or audio chatting over the internet.
File Transfer Protocol (FTP):
Protocol used to transfer files from one computer to another over the internet.
Uses:
➔ Used in transferring files from one computer to another over the internet.
➔ Used in downloading from file servers.
➔ FTP upload is used in cases when the file size is very large.
Phishing The creator sends out a legitimate looking The creator of the email can Spelling or grammar mistakes in text. Use spam filters.
email that contains a link when clicked it gain sensitive data. Email urges you for a quick reply. Don't click links from unknown sources.
opens a fake website designed to obtain Credit card fraud. Asking for personal details. Never reveal personal details.
sensitive data. Report any suspicious activity.
Smishing The creator sends SMS to the user's The creator of the SMS can Spelling or grammar mistakes in text. Ignore text messages from numbers you
phone that contains a telephone number to gain sensitive data. Asking for personal details. don't recognize.
call or contains a link when clicked it opens credit card fraud. SMS from unknown source. Report any smishing attempts.
a fake website to obtain sensitive data. SMS sent at an unusual time. Never click on links in text messages from
unexpected people.
Vishing A voicemail message is used to trick the Creator of the vishing scam can Asking for personal details. Never reveal personal details over the
user into calling the telephone number gain sensitive data. Voicemail from an unknown telephone mobile phone.
contained in the message, the user will be Credit card fraud. number. Ignore voicemail from unknown number.
asked to supply personal data thinking Voicemail has generic greetings. Report any vishing attempts.
they are talking to somebody who works
for a legitimate company.
Pharming A malicious code is installed on the user's The creator of the malicious Website's URL is incorrect. Check the spelling of the URL of the
computer that redirects the user to a code can gain sensitive data. If webpage is requesting personal website.
fake website designed to obtain sensitive Credit card fraud. information and its URL starts with http Checking that the URL contains https or a
data. instead of https locked padlock sign next to it.
Using up to date anti-malware software.
Spam Junk emails sent to large numbers of Can be used for spreading Incorrect grammar or spelling in the Use spam filters.
people can be used for advertising. malware. email. Delete or ignore messages from unknown
Malware: programs installed on Email has generic greetings. sources.
a user's computer with the aim Absence of logos in email. Delete accounts that you no longer use.
of deleting, corrupting or
manipulating data illegally.
Spyware Software that records the key presses on Gives the originator the access Use up to date anti-spyware software.
the user's keyboard, this data is then to all data entered by the Use a pointing device instead of typing.
"key logging
sent to the originator of the software. user's keyboards including Use a firewall.
software" sensitive data.
Hacking The process of gaining unauthorised access Misuse of personal information. Use of firewalls.
to a computer system. Data can be changed. Use strong passwords.
Data can be copied from a Use biometrics.
system.
Data can be deleted.
Card cloning The copying of a credit or debit card Use chip & PIN cards instead of
which uses a magnetic stripe, cloning needs magnetic stripe cards.
an electronic device known as a skimmer, Do regular checks on your spendings and
skimmers can be placed in ATM slots check for any unusual activity with the
where they can read all data from a card bank.
and then copying the data to a fake card.
Shoulder A form of data theft where criminals Somebody watching you typing the card When using ATMs, shield the keyboard
steal card data from a victim when using PIN by looking over your shoulder. with your other hand.
surfing
it. Somebody listening in when you are giving When using a mobile device, never key in
credit or debit card details over the data in a public place.
phone. Don’t speak card details into your
smartphone in a public place.
Card fraud The illegal use of a credit or debit card. Card cloning.
Shoulder surfing when using the card.
Key logging software.
Phishing/smishing/ vishing/pharming.
Anti-virus software:
Steps to avoid the danger of infecting a computer with a virus from a downloaded file:
1) Download and install an up-to-date antivirus.
2) The antivirus software checks files against a database of known viruses before they run or loaded on a
computer.
3) If a file is infected, two options appear: Delete the file or Quarantine the file.
4) If the quarantine option is chosen:
➔ The file is moved to a hidden directory.
➔ The user does not have access to the quarantined file.
Features:
➔ Checks software/files before they are run or loaded on a computer.
➔ Can constantly run in the background.
➔ Prevents a user from downloading viruses.
➔ Can quarantine a virus.
➔ Can delete a virus.
Security measures:
Authentication techniques:
Refers to the ability of a user to prove who they are.
There are three common factors used in authentication:
➔ Something you know (eg. password or PIN code)
➔ Something you have (eg.mobile phone or tablet)
➔ Something which us unique to you (eg. biometrics)
Authentication methods include:
➔ User IDs and passwords.
➔ Biometrics.
➔ Zero login.
➔ Magnetic stripe cards.
➔ Smart cards.
➔ Physical tokens.
➔ Electronic tokens.
➔ Two-factor authentication.
➔ Digital certificates.
User IDs and Passwords:
Password definition and purpose:
A secret string of characters set by a user to identify them to a computer system, used as part of the authentication
system to improve security.
User ID definition:
Identifier for the user.
Methods to avoid password interception:
➔ Run up to date anti-spyware software.
➢ To make sure that your passwords are not being relayed back to anyone who put the key logging software
on your computer.
➔ Change passwords on a regular basis.
➢ In case it has come into the possession of another user illegally or accidentally.
➔ Use strong passwords that are not easy to crack.
➔ Use encryption when sending sensitive data over the internet.
➢ So that data becomes meaningless if intercepted.
Rules of a strong password:
➔ Should contain At least one capital letter, one digit, one special character/symbol.
➔ Should be at least 8 characters long.
➔ Not a previously used password.
Biometrics system:
Systems that rely on certain unique physical characteristics of human beings to identify a user.
Examples of biometrics system:
Fingerprint scans, Retina scans, Iris recognition, Face recognition, Voice recognition.
Advantages of using biometrics system:
➔ Biometrics is unique to each person, which is more secure than other authentication methods.
➔ Passwords/cards can be forgotten, while biometrics are always with you.
➔ The user has to be present to use the biometrics system, therefore more secure.
➔ Almost impossible to duplicate biometrics.
Disadvantages of using biometrics system:
➔ Slower method to enter the system than passwords.
➔ Expensive to set up.
➔ Injuries to fingers can cause biometric devices to fail to recognize the user.
➔ Facial hair can stop facial recognition from recognizing the user.
Zero login:
Method of login authentication that identifies a user by combining both biometric data and behavioural patterns without
the need to supply any other security information.
Examples of behavioural patterns:
➔ How you walk.
➔ Your typing speed.
➔ Your normal location.
➔ How you swipe the screen.
Advantages of using zero login systems:
➔ Enhanced security as it is difficult to copy biometrics and behavioural patterns.
➔ Easy and quick way to login to a system.
Disadvantages of using zero login system:
➔ User’s privacy can be violated as sensitive data is being recorded.
➔ Hackers may gain access to the user’s sensitive data in case of security breach.
➔ Expensive to set up.
Smart cards:
Security device that uses RFID technology (chip & antenna), the chip on the smart card can store data such as name,
security number, gender, date of birth and a PIN.
Steps to enter a security gate using smart card:
1) The owner of the card walks up to a security gate and presents the smart card.
2) RFID readers on either side of the gate scan the security data stored on the RFID tag.
3) The user will then be invited to enter a PIN on the keypad.
4) If all details match, then access will be allowed.
Advantages of using smart cards:
➔ PIN can be used to verify the ownership of the card, thus can’t be used if stolen/lost.
➔ Very fast read rate.
➔ More robust and reliable compared to magnetic stripe cards.
Disadvantages of using smart cards:
➔ Possible to hack into the data/signal transmitted by the tag.
➔ Smart cards are more expensive to manufacture than magnetic stripe cards.
➔ Possible to jam as RFIDs use radio waves.
Physical tokens:
A form of authentication that uses a hardware device that generates a one-time password (OTP), this OTP changes on
a regular basis and is usually only valid for less than a minute.
Steps of using physical token when logging into a bank’s website:
1) The customer uses a physical token supplied by the bank.
2) The customer inserts their debit card into the top of the token device and the device either recognizes the card
as genuine or rejects it.
3) The device then asks the customer to press ‘IDENTIFY’ and then enter their PIN.
4) A one-time password (OTP) is then generated and shown on the device screen.
5) The customer goes back to their bank web page and enters the generated OTP.
6) If correct, the customer is given access to their account.
Main advantage of using physical tokens:
➔ Security is enhanced as the thief needs to have the token device, a cloned card and the card’s PIN.
Main disadvantage of using physical tokens:
➔ If the token device is lost, the user will not be allowed to access the system.
Electronic tokens:
Software installed on a user’s device, such as a smartphone that generates a one-time password (OTP) which is valid
for less than one minute.
Steps of using electronic token when logging into a bank’s website:
1) The user install the electronic token app on their smartphone.
2) User opens the app when the website requests the user to authenticate who they are.
3) The app generates a one-time password (OTP) which is valid for less than a minute.
4) The user enters this OTP when asked by the website.
5) The website server runs the same software as the app and will generate the same OTP.
6) Once the OTP is verified by the website, the user will be allowed access.
Two-factor authentication:
A form of verification which requires two methods of authentication to verify a user, this makes it harder for the
hacker to access the system as it adds an extra level to hack.
Example 1:
➔ A code is sent to a device that is pre-set by the user.
➔ The system requires the user to input this code in order to log-in.
Example 2:
➔ The system requires the user to input login details from a specific computer.
Digital certificate:
An electronic document sent with an electronic message that is used to verify the identity of the sender, contains a
unique key used by sender and receiver that allows computers to exchange information over the internet securely.
Items in digital certificate:
➔ Details of the owner of the digital certificate.
➔ Serial number.
➔ Public key.
➔ Digital signature.
➔ Valid from.
➔ Valid to.
Encryption:
The process of scrambling characters of a message so that message becomes meaningless to unauthorised users, plain
text is encrypted to cypher text using an encryption algorithm and an encryption key, cypher text is decryption key.
Encryption applications:
➔ Encryption of data on HDDs/SSDs.
➔ Encryption of emails.
➔ Encryption of data on the cloud.
➔ Used with HTTPS and SSL protocols to encrypt data being transferred over the internet.
Observation The system analyst obtains reliable data. People may work in a different way when being
Enables the systems analyst to get a better overall watched.
view of the system. The quality and accuracy of information is highly
Inexpensive method. dependent on the skill of the observer.
Interviews More likely to get reliable data. Time consuming to complete all the interviews.
Allow lots of very detailed information to be Expensive method due to the system's analyst time.
gathered. Interviewees may not be available at times to suit
Flexible as the systems analyst can change script to the analyst.
suit circumstances.
Questionnaires Faster to complete all questionnaires. The questions are inflexible since they have to be
It is a relatively inexpensive method. general.
Individuals can remain anonymous. Users tend to exaggerate their answers as they
Individuals can fill it in their own time. are anonymous.
As it’s anonymous people may not take it seriously.
Examination of This method allows information to be obtained which Time consuming to go through the documents.
wasn’t Expensive method as it is time consuming.
existing
possible by any of the other methods.
documents Can see the scale of the problem easily.
Saves time as there could be copies of previous
analysis.
Implementation:
After the system has been developed and tested, it will be ready to run.
Parallel The new system runs If the new system fails, the Expensive as extra staff is An organisation with large amounts of
alongside the old old system will still be needed to run both systems data which cannot afford to lose
running system for a time available as a backup. together. data.
before the new It is possible to gradually Time consuming as data An organisation where the new
system takes over train workers on the new needs to be entered into two system needs to be fully tested.
completely. system. systems.
Direct Replacing the old Costs are less than parallel If there’s a problem with A small organisation which can afford
system with the new running as less workers are the new system, then all to lose data.
changeover system immediately. needed. data can be lost since the A small organisation where the
The benefits of the new old system is no longer system needs to be up and running
system are immediate. available. very quickly.
Saves time of implementing Staff cannot be trained
the new system. gradually.
Phased New system is If the new system fails, then More expensive than direct An organisation where there are
introduced part by most of the old system is changeover since it is clearly defined separate processes.
part. still in place. necessary to evaluate each An organisation where the new
Possible to ensure that the phase before moving to the system needs to be fully tested.
new system works properly next stage.
before proceeding. Very time consuming since
each part needs to be fully
evaluated before proceeding.
Pilot Whole system is If the new system fails, only Takes time to implement the An organisation where there are
introduced in one one branch is affected. new system for all branches several branches all doing the same
running branch at a time. Possible to train staff in one in the company. work.
area only, which is faster An organisation where the new
and less costly than parallel system needs to be fully tested.
running.
Documentation:
Purpose This can consist of any of the following
Evaluation:
Factors that need to be assessed in evaluation:
➔ Efficiency of the system (cost and speed).
➔ Easiness of the system.
➔ Appropriateness of the system (all user requirements are satisfied).
The following is a list of some of the techniques used to evaluate the new system:
➔ Comparing performance of the new system with the old system.
➔ Evaluating the user’s responses to using the new system.
➔ Comparing the final solution with the original user requirements.
➔ Interviewing users to gather responses about how well the new system works.
➔ Identifying any limitations of the system.
➔ Identifying any necessary improvements that need to be mad.
Chapter 8: Effects of using ICT
Copyright:
Copyright legislation: Legal protection of specific content/work from being downloaded, copied or borrowed without
the owner’s permission.
Importance of copyright legislation:
➔ Supports the original producers of the content.
➔ Helps in protection against plagiarism.
➔ Allows for legal ownership of the content.
➔ Restricts who can legally use and copy the work (based on owner’s permission).
➔ Restricts who can legally sell and distribute the work (based on owner’s permission).
Software piracy: Illegal copying of software.
How to breach software copyright:
➔ Making a copy and giving it away without the owner's permission (software piracy).
➔ Making a copy and selling it to others without the owner’s permission.
➔ Making a copy and renting it out to others without the owner’s permission.
➔ Using a single copy with multiple simultaneous use on a network.
➔ Use code from the software without the owner’s permission.
➔ Modifying the original code without the owner’s permission.
How software manufacturers attempt to prevent copyright being broken:
➔ Requesting to input a unique product key when software is being installed.
➔ The user will be asked to agree to the licence agreement before the software continues to install.
➔ If supplied with a hardcopy, a form of hologram is used to indicate that the software is a genuine copy.
➔ Software will only run if the CD, DVD or memory stick is actually in the drive.
➔ Software will only run if a dongle is plugged into one of the USB ports.
Effects of microprocessor-controlled devices (smart devices) in the home:
Lifestyle, leisure time and physical fitness:
Positive effects:
➔ They reduce the need for people to do manual tasks at home.
➔ Can be set remotely using a smartphone.
➔ Can be used for physical fitness tracking in the home.
➔ They give people more time for leisure activities, hobbies, shopping and socialising.
➔ Cookers can be switched on whilst we are out so that we arrive home to a cooked meal.
➔ Automated burglar alarms give people a sense of security.
➔ Smart fridges can be used to improve a healthy lifestyle.
Negative effects:
➔ They can lead to unhealthy lifestyles if the dependency on ready meals is high.
➔ They tend to make people rather lazy because there is a dependence on the devices.
➔ Lack of exercise will result in becoming less fit.
➔ Potential loss of household skills.
➔ There is the risk of cybersecurity threats as the internet can be used in smart devices.
➔ Possible health issues from the devices, e.g. microwave leakage.
Security of data:
Security issues when using smart devices (microprocessor-controlled devices connected to the internet):
➔ Malware can be installed to sabotage the smart devices.
➔ Hackers can communicate remotely with smart devices in your home.
➔ Hackers can gain personal data about you
➢ By hacking into a central-heating controller, it is possible to find out holiday dates, which then makes a
home an easy target for break-ins.
➢ If the smart fridge automatically orders food from a supermarket, then it is possible for a hacker to gain
credit card information.
How to protect against security issues when using smart devices:
➔ Use a different password for each device.
➔ Install software updates, which often contain new security features.
Social interactions:
Positive effects:
➔ Easier to make new friends using chat rooms.
➔ Easier to find people who share similar interests/hobbies.
➔ Less expensive to keep in touch using VoIP technology.
Negative effects:
➔ Social isolation as people do not meet face-to-face as much.
➔ A lack of social interaction may make people more anxious of meeting people in real life.
➔ People behave differently when interacting online (they can be ruder or more aggressive).
➔ Cyberbullying.
Effects of microprocessor-controlled devices (smart devices) in controlling transport:
Uses:
➔ Monitoring/Controlling of traffic on motorways.
➔ Congestion zone monitoring.
➔ Automatic number plate recognition (ANPR).
➔ Automatic control of traffic lights.
➔ Air traffic control systems.
Positive effects:
➔ Controlling of traffic will reduce traffic jams and minimise everyone’s journey time.
➔ Transport systems are more efficient (as more transport vehicles can use the transport network, allowing for
more regular services).
➔ Traffic offences can be automatically penalised using ANPR.
➔ Stolen cars and criminals can be spotted using ANPR.
➔ Computerised control systems minimise human error, which reduces the rate of accidents.
Negative effects:
➔ A hacker could gain access to the computerised system and cause disruption.
➔ If the computer system fails, then the whole transport system could be brought to a standstill.
➔ Poorly designed systems could compromise safety.
➔ ANPR systems mean that innocent people’s movements can easily be tracked which violates privacy.
Autonomous (Driverless) vehicles: Vehicles that rely on sensors, cameras, microprocessors and actuators to control
its movement. Microprocessors process the data received from cameras and sensors and send signals to actuators to
perform physical actions, such as: Change gear , Apply the brakes, Turn the steering wheel.
Positive effects:
➔ Safer because human error is removed, leading to fewer accidents.
➔ Better for the environment because vehicles will operate more efficiently.
➔ Can reduce traffic congestion.
➔ Increased lane capacity (due to better braking and acceleration responses together with optimised distance
between vehicles).
➔ Can reduce travel time.
➔ Can self-park so it reduces the time to find a parking spot.
Negative effects:
➔ Very expensive system to set up.
➔ Possibility of hacking into the vehicle’s control system.
➔ Software glitches could lead to potential disasters.
➔ Cameras need to be kept clean so that they do not give false results.
➔ Sensors could fail to function in heavy snowfall or blizzard conditions.
➔ Reduction in the need for taxis could lead to unemployment.
➔ Driver and passenger reluctance of the new technology.
Effects of ICT on health: Health risks are caused due to the prolonged use of ICT equipment.
Eyestrain/ Staring at the computer screen for a long time. Take regular breaks.
Having incorrect lighting in the room. Turn the brightness down on the screen.
Headache Sitting too close to a screen. Keep the screen clear of dust and dirt.
Using dirty screens. Test eyesight regularly.
Back and neck Sitting in front of a computer screen for a long Take regular breaks.
time in the same position. Sit with the correct posture.
problems Sitting in front of a computer for a long time in Do back and neck exercises.
the wrong posture. Use foot rests to improve posture.
Use monitors that can tilt to reduce neck problems.
Tripping and falling over Presence of many trailing Cables. Use cable ducts to make the wires safe.
Fix wires along walls and under carpets to prevent any contact
trailing wires between people and wires.
Use wireless connections wherever Possible.
Heavy equipment falling Placing devices near the edge of tables or Use strong desks and tables to support heavy hardware.
heavy equipment on weak tables or Place devices in the middle of a table.
and causing injury shelves. Use large and sturdy desks.
Fire risk Overloading of power sockets. Have a fully tested CO2 fire extinguisher Nearby.
Overheating of equipment. Don’t overload sockets with too many Plugs.
Don’t cover equipment.
Use a cooling system.
E-Safety:
Personal data:
Data relating to a living person who can be identified by this data.
Examples of personal data:
➔ Name.
➔ Address or email address.
➔ Date of birth.
➔ Banking account number.
➔ Photographs of the individual.
➔ Gender.
Examples of sensitive personal data:
➔ Racial origins.
➔ Political views.
➔ Religion.
➔ Criminal activity.
➔ Medical record.
➔ DNA.
➔ Biometric data.
Why personal data should be confidential and secure:
➔ As it links directly to a person.
➔ If someone gets access to the data then they can use the information to attack the person.
➔ To protect sensitive personal data.
➔ It could lead to home burglaries as people post holiday details on social media.
➔ Can lead to identity theft.
Data Protection Acts (DPAs):
Legislation designed to protect individuals and to prevent incorrect or inaccurate data being stored.
DPA principles:
➔ Data must be fairly and lawfully processed.
➔ Data can only be processed for the stated purpose.
➔ Data must be sufficient, relevant and not excessive.
➔ Data must be accurate.
➔ Data must not be kept longer than necessary.
➔ Data must be processed according to the individual’s rights.
➔ Data must be kept secure.
➔ Data should not be transferred outside the area of the act unless sufficient protection exists.
Definition of e-safety:
It is the need to take precautions to keep personal data safe when using the internet.
Measures to maintain e-safety:
When using the internet:
➔ Never give out any personal information to people who are unknown to you online.
➔ Never send people photos of yourself.
➔ Always maintain your privacy settings on.
➔ Only use websites recommended by teachers.
➔ Only use a learner-friendly search engine.
➔ Use appropriate search conditions when using search engines.
When using email:
➔ Only open emails or attachments from known sources.
➔ Only reply to an email if you know the person who sent it.
➔ Never include any personal data in emails.
➔ Never send photos of yourself in any email.
➔ Avoid clicking on hyperlinks within emails because it could be part of a phishing scam.
➔ Use spam filters to stop spam emails.
When using social networking sites:
➔ Block or report unwanted users.
➔ Never arrange to meet anyone alone.
➔ Always tell an adult first and meet in a public place.
➔ Always meet in a public place.
➔ Keep private and personal data secret.
➔ Avoid the misuse of images.
➔ Avoid giving your address or school name.
➔ Check profiles before contacting people.
➔ Verify a person's contact details with other trusted friends.
When playing games online:
➔ Use a nickname and never your real name.
➔ Don’t give your personal or financial data to any player.
➔ Report and block cyberbullies.
➔ Turn on privacy settings.
➔ Check game ratings for age.
➔ Reduce the amount of time spent gaming.
Internet developments:
Search engines:
A piece of software used to find information on the internet.
Why are internet searches to find relevant information not always fast?
➔ The search might be too general, giving irrelevant information.
➔ Search providers add marketing advertisements to the search results.
➔ Computers might be infected with viruses taking up memory and slow down data transfer speed over the internet.
➔ If the computer’s memory is close to full, data transfer speed over the internet can slow down significantly.
Why is it NOT always easy to find reliable information on the internet?
➔ Anyone can post information on the internet.
➔ Websites may contain incorrect information.
➔ Similar websites may have conflicting data on the same topic.
➔ Search engines do not necessarily give the most reliable searches at the top of the list.
➔ Data on some websites may be outdated.
➔ The search engines tend to be generalised.
How to evaluate the reliability of information found on the internet?
➔ Check information from different sources.
➔ Check the author’s credentials.
➔ If the date of the last update was a long time ago, it is likely to be an unreliable website.
➔ Websites that have excessive advertising tend to be unreliable.
➔ Commercial websites tend to be biassed.
➔ Check if responsible bodies have endorsed the website.
➔ Check if the website links to other reliable websites or to unreliable websites.
➔ Check spelling and grammar as too many spelling errors mean that the website is not reliable.
➔ Use the final part of the URL to identify the website’s reliability. For example, websites ending with:
.edu, .org,.ac and .gov are more likely to be reliable.
Advantages of searching the internet for information:
➔ The internet has a vast amount of information.
➔ Searching for information using a search engine is fast and easy.
➔ Information on the internet is for free.
➔ Pages on the internet can have multimedia files to make learning more interesting.
Disadvantages of searching the internet for information:
➔ Information may not be reliable as the internet is not regulated.
➔ There is always the risk of accessing inappropriate sites when using search engines.
➔ It is too easy to be distracted when searching on the internet.
➔ Easy to plagiarise when using the internet.
➔ Losing research skills when using the search engines as it does all the work for you.
Disadvantages of using a search engine to find information rather than typing in a web address:
➔ Information overload.
➔ Websites at the top of the list may not be relevant.
➔ Risk of accessing inappropriate websites if search words are not specific.
➔ Search engines may not include all web pages.
➔ Search engine companies may be paid to display certain web pages.
Methods to protect against risks when using the internet to search for information:
➔ ISP control which can prevent users from accessing certain websites.
➔ Parental control over what websites to be accessed by children.
➔ Schools and textbooks can be used in educating users about the correct use of the internet.
➔ Checking with teachers first to see if it is safe to access a website.
Blogs: Short for weblog, A personal website where the blogger types in their opinion on some topic.
Features of a blog:
➔ Website where data entered by a single author.
➔ Visitors can only read and comment on the material on blogs.
➔ Based on the author's personal observations.
➔ Usually organised in reverse chronological order (most recent to least recent entry).
Wikis: Software/websites that allow users to create and edit web pages using web browsers.
Features of a wiki:
➔ A wiki has many authors.
➔ Any user can edit, delete or modify the content.
➔ Its structure is determined by its users and the content.
➔ Uses links to websites.
➔ Allows large documents to be seen by many people.
Social networking sites: Public websites that allow users to interact and communicate with each other
Features of social networking sites:
➔ Can create and share personal profiles.
➔ Can upload content such as photos and videos.
➔ Can write comments on other’s posts.
➔ Can invite people to become friends.
Advantages of social networking:
➔ Make new friends worldwide.
➔ Communicating with friends and colleagues all over the world.
➔ Easy to find other people with common interests.
➔ Can be used more easily for analytics and market research.
➔ Develops social skills.
➔ Allows people to share knowledge.
Disadvantages of social networking:
➔ Reduces face to face communication.
➔ Cyber-bullying increases.
➔ Needs the internet and a computer.
➔ The Risk of fraud increases.
➔ Addiction to social networking.
Forums: Online discussion boards where users can hold conversations in the form of posted messages.
Differences between moderated and unmoderated forum:
➔ A moderated forum is checked by an admin while an unmoderated forum is not.
➔ Posting of moderated comments are delayed as they have to be checked.
➔ The moderated forum does not allow inappropriate comments to be posted on the site.
Chapter 9 P1: ICT Systems
Sensors:
It’s an input device used to measure physical properties of the surrounding environment.
Why data from the sensors need to be converted for use by a computer:
➔ Sensors read analogue data.
➔ Computers only understand digital data.
➔ ADC must be used to convert analogue to digital so that data can be understood by the computer.
Humidity/Moisture Glasshouses.
Environmental monitoring (weather station).
In factories where moisture levels are crucial (for example. paint & spraying)
Computer-controlled systems:
A computer-controlled system can consist of:
➔ Sensors to take readings.
➔ Microprocessor/processor to process data.
➔ Output devices to display data /Actuators to do mechanical output.
Advantages of using computer-controlled systems:
➔ Take more accurate readings than humans.
➔ Higher productivity than humans.
➔ Can work 24/7.
➔ Produce more consistent results than humans.
➔ Work continuously with no breaks so any necessary action is initiated immediately.
➔ Work without human intervention which is safer for humans in hazardous situations.
➔ Less expensive in the long run than employing humans.
Disadvantages of using computer-controlled systems:
➔ Faulty sensors can give false results.
➔ Subject to cyber attacks.
➔ Expensive to set up.
➔ Needs more maintenance than traditional systems which are expensive.
Examples of computer-controlled systems:
Monitoring systems, Control systems & Robots.
Monitoring systems:
A system that uses sensors to constantly take measurement data.
Examples of monitoring systems:
➔ Monitoring a patient in a hospital for vital signs.
➔ Checking the temperature levels in a car engine.
➔ Monitoring intruders in a burglar alarm system.
➔ Monitoring pollution levels in a river.
Monitoring a patient in a hospital for vital signs:
Sensors used:
➔ Heart rate sensor, Temperature sensor & Blood pressure sensor.
Monitoring intruders in a burglar alarm system:
Sensors used:
➔ Pressure sensor
➢ To pick up the weight of an intruder coming through a door.
➔ Light sensor
➢ To detect if an intruder is coming through a door.
➔ Motion/Infra-red sensor
➢ To pick up the movement of an intruder in the building.
➔ Sound sensor
➢ To pick up sounds such as footsteps or breaking glass.
Monitoring pollution levels in a river:
Sensors used:
➔ Temperature sensor, Light sensor, pH sensor, Oxygen sensor & Carbon Dioxide sensor.
Control system:
A system that uses sensors, microprocessors and actuators to take some action that affects the surrounding
environment.
Difference between monitoring system and control system:
➔ Measurement is the monitoring of physical variables without the microprocessor taking action that affects the
sensor’s readings.
➔ Control is when the microprocessor takes an action that affects the sensor’s readings.
Examples of uses of control systems:
➔ Controlling the environment in a glasshouse.
➔ Regulating the temperature in an air conditioning system.
➔ Controlling of street lighting.
➔ Controlling of automatic washing machines.
Glasshouse:
Sensors used:
➔ Temperature sensor, Humidity/moisture sensor, Light sensor & pH sensor.
Automatic washing machines:
Sensors used:
➔ Temperature sensor
➢ To measure the temperature of the water.
➔ Water level sensor
➢ To measure the water level in the drum.
➔ Pressure sensor
➢ To measure the weight of clothes.
Robots:
A machine that can be programmed to carry on a variety of tasks.
Advantages of using robots:
➔ More accurate than humans.
➔ Higher productivity than humans.
➔ Can work 24/7.
➔ Can produce more consistent results than humans.
➔ Reduces running costs such as wages and overheads.
➔ Can replace humans working in a dangerous environment therefore safer to perform tasks than humans.
➔ Can lift larger and heavier equipment than a human.
Disadvantages of using robots:
➔ Expensive to set up.
➔ High maintenance cost.
➔ Can lead to higher unemployment in manual labour tasks.
➔ Robots cannot think for themselves, they cannot do non-standard tasks.
➔ May cause deskilling when they take over.
➔ Robots are vulnerable to security risks like hacking.
Examples of uses of robotics:
➔ Manufacture, Production line control & Autonomous vehicles (discussed in chapter 8).
Examples of roles of robotics in manufacturing:
➔ Paint spraying a car body.
➔ Welding parts together.
➔ Manufacturing electrical goods.
➔ Stock movement in automatic warehouses.
Examples of roles of robotics in production line control:
➔ Filling bottles with a liquid, capping the bottle and applying a label.
➔ Filling metal cans with baked beans, sealing the cans and applying labels.
Expert System:
Computer software that acts like a human expert in a
particular field.
Expert system’s components:
➔ User interface
➢ Allows users to interact with the expert
system.
➔ Knowledge base
➢ Database that stores all the knowledge about
an area of expertise obtained from several
expert resources.
➔ Rules base
➢ Set of inference rules used by the inference engine to draw conclusions.
➔ Inference engine
➢ The inference engine acts like a search engine examining the knowledge base for information that matches
the queries.
➢ It makes use of the rules base to find the matching results from the knowledge base.
➔ Explanation system
➢ Informs the user of the reasoning behind the expert system’s conclusions and suggested actions.
➢ It gives the percentage probability of the accuracy of the expert system’s conclusions.
How to set up an expert system:
1. Information needs to be gathered from human experts or from written sources such as textbooks, research
papers or the internet.
2. The knowledge base is created, and information gathered is used to populate the knowledge base.
3. A rules base is created
➢ This is made up of a series of inference rules so that the inference engine can draw conclusions.
4. The inference engine is set up.
5. The user interface is created to allow the user and the expert system to interact.
6. The expert system is tested against known scenarios and any changes are made.
Advantages of using expert systems:
➔ Available 24/7.
➔ They offer a very fast response time (much quicker than a human expert).
➔ Allows the system to be used in parts of the world where experts are not available.
➔ They give several different possibilities.
➔ They can store vast amounts of ideas and facts.
➔ They indicate the probability of any suggested solution being correct.
Disadvantages of using expert systems:
➔ They are not human beings therefore they lack common sense.
➔ If the knowledge base contains errors, then incorrect decisions can be made.
➔ Expensive to set up/purchase.
➔ Expensive to maintain.
➔ Cost of training for operators.
Examples of expert systems:
➔ Medical diagnosis, Car engine fault diagnosis, Oil prospecting, Chess games, Financial planning, Route scheduling
for delivery vehicles & Plant and animal identification.
Medical diagnosis expert system steps:
1. The system, through the user interface, asks a series of questions about the patient’s illness.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine compares symptoms entered with those in the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system suggests the probability of the patient’s illness being identified accurately.
7. The expert system also suggests possible solutions and remedies to cure the patient or recommendations on what
to do next.
8. The explanation system will give reasons for its diagnosis so that the user can determine the validity of the
diagnosis or suggested treatment.
Oil prospecting expert system steps:
1. The system, through the user interface, asks a series of questions about geological profiles.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine searches the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system suggests the probability of finding oil as an output.
7. The explanation system will also explain how the expert system arrived at its conclusion.
Plant/Animal identification expert system steps:
1. The system, through the user interface, asks a series of questions about characteristics of the plant/animal.
2. The user answers the questions asked (either as multiple-choice or yes/no questions).
3. The next questions asked are based on the previous response(s) input by the user.
4. Inference engine compares characteristics entered with those in the knowledge base looking for matches.
5. The rules base is used in the matching process.
6. Once a match is found, the system outputs the name of the plant/animal with percentage of accuracy of the
identification.
7. The explanation system will also explain how the expert system arrived at its conclusion.
Computer Modelling:
A computer program that simulates a real-life system.
Modelling Examples:
➔ Personal finance using spreadsheet, Bridge design, Flood water management, Traffic management & Weather
forecasting.
Advantages of using computer models:
➔ Using computer models is less expensive than having to build the real thing.
➔ Safer to use a computer model if the real situation is hazardous (for example, chemical processes).
➔ Allows you to try out many different scenarios in advance.
➔ Often faster to use a computer model than to do the real thing (for example, climate change calculations and
population growth).
Disadvantages of using computer models:
➔ A model is only as good as the programming, or the data entered; the simulation will depend heavily on these two
factors.
➔ Although building the real thing can be expensive, sometimes computer modelling is also a very costly option.
➔ People’s reactions to the results of a simulation may not be positive; they may not trust the results it produces.
Personal Finance using spreadsheet:
How can modelling used:
➔ Listing the possible income and expenses to be able model the potential profit or loss.
Flood water management:
How can modelling used:
➔ To perform a risk assessment, To identify sources and extent of potential flooding & To identify protection
measures against floods.
Bridge design:
Example of scenarios to be considered in modelling:
➔ The amount of traffic that might be caught in a traffic jam on the bridge in the event of an accident (this could
lead to very heavy loading on the bridge structure).
➔ The effects of strong winds.
➔ The effect of earthquakes.
➔ The effect of tidal waves and ice floes during extreme weather conditions.
Traffic management:
Example of scenarios to be considered in modelling:
➔ Varying the timing of the lights and observing how the traffic flow was affected.
➔ Changing the number of vehicles stopped at part of the junction and then changing the timing of the lights to see
how the traffic flow is affected.
➔ Increasing or decreasing traffic flow in all directions.
➔ Considering how emergency vehicles affect traffic flow at different times of the day.
Weather forecasting:
Weather stations are set up to automatically gather data from the environment. They are usually automatic and use a
variety of sensors to measure; Temperature sensor, Wind speed sensor, Wind direction sensor, Barometric pressure
(air pressure) sensor & Humidity sensor.
How does this system work:
➔ Data from sensors needs to be gathered every hour of every day of the week.
➔ This data can then be input into a model which simulates weather patterns.
➔ By running the computer model, weather forecasters can predict the weather for the next few days or even
longer.
Chapter 9 P2: ICT Systems
Recognition systems:
Optical Mark Reader (OMR):
Uses:
➔ Used in multiple-choice examination papers, School registers & Used to read questionnaires.
Optical Character Reader (OCR):
Uses:
➔ Processing of passports and identity cards & Automatic number plate recognition (ANPR) systems in car parks.
➔ Converting hard copy documents into digital form to be stored on a computer.
Automatic Number Plate Recognition (ANPR) System:
System used to read the number plates on cars.
Uses of ANPR:
➔ To track a specific car, With speed cameras & In car parking systems.
➔ To monitor average speed of vehicles (smart traffic management system).
How does ANPR system read data on number plates?
1. An image of the front of the vehicle is captured using a camera.
2. An algorithm is used to locate and isolate the number plate from the image taken by the camera.
3. Each character is recognized using OCR and converted into digital text.
4. The text is then stored on a database.
Advantages of using ANPR:
➔ There is no need to employ car park security guards, which saves money.
➔ In car parking systems, ANPR is a much faster system than having to check a ticket at the exit.
➔ Can be used as a security system preventing illegal parking and preventing unauthorised access to private car
parks.
➔ Can be used to analyse driver behaviour to help in transport planning.
Disadvantages of using ANPR:
➔ Lack of security guards could lead to vandalism because nobody is checking on a regular basis.
➔ There could be invasion of privacy issues due to the recording of drivers’ number plates.
➔ Damaged or very dirty number plates will not be recognized by the system.
➔ Number plate cloning will not be detected by ANPR
➢ So it is possible for a car to be fitted with a cloned number plate and by-pass car park security.
Radio Frequency Identification (RFID) Reader:
Uses:
➔ Tracking stock, Passports, Automobiles & Contactless payment.
Tracking stock:
Tracking of stock using RFID involves:
➔ Tracking of livestock (on a farm).
➔ Tracking of goods in a shop, supermarket or distribution centre.
Uses in livestock tracking:
➔ Keeps track of the whereabouts of every animal on a farm.
➔ Allows farmers to identify who owns an animal as it is possible for animals to stray into neighbouring fields.
➔ Keeps data about the animals on the tag (for example, medical history, date of birth, identification number).
Uses in retail:
➔ Stores information about products without the need for any manual scanning.
➔ Several tags can be read at the same time, thus speeding up the checkout process.
➔ An item can easily be located because the tag can store its exact location in the warehouse.
➔ Allows automatic tracking of an item from warehouse to customer; the customer can be informed at all stages
where the item is.
Automobiles:
Uses in automobiles:
➔ Can allow or deny access to parking in a private car park.
➔ Used at weigh-stations to ensure the vehicle is not carrying too much weight.
➔ Tags can be used on toll roads
➢ The driver registers their vehicle and attaches a tag to the windscreen.
➢ As the vehicle approaches the barrier, an RFID reads the tag and checks the stored reference number.
➢ If it is valid the barrier will open without them having to stop.
➔ Can be used on a car production line to track its progress through the assembly process.
Passports:
Examples of items of information that are stored on the RFID chip:
➔ Name of passport holder, Passport number, Date of birth, Nationality & Biometric measurement.
Advantages of using RFID technology in passports:
➔ More secure than a traditional passport as biometric data is more difficult to forge.
➔ Forgeries can be easily identified.
➔ Quicker than reading it manually.
Disadvantages of using RFID technology in passports:
➔ Easy to hack into the signal transmitted by the tag.
➔ Tag collision may occur.
Near Field Communication (NFC):
NFC is a subset of RFID technology, operating at a particular frequency, It requires the sender and receiver to be in
very close proximity.
Uses:
➔ Used by smartphones when making payments.
➔ Two smartphones sharing links, contacts and photographs with each other.
➔ NFC devices can function as a smart card and be used as a way of entering public transport systems.
Advantages of NFC:
➔ Requires the sender and receiver to be in very close proximity, which makes communication more secure than
RFID.
➔ Has very fast connectivity.
➔ There is no need to pair the two devices connecting.
Satellite Systems:
GPS (Global Positioning System):
A space-based system that uses satellites to calculate the position of a receiver, Typically, four satellites must be
visible to the receiver.
Uses of GPS:
➔ In satellite navigation systems.
➔ By walkers to locate positions on hills/mountains.
➔ By runners to calculate distance run.
➔ By farmers for livestock control.
➔ In tracking aircrafts.
How GPS can be used to show the route and current location of a taxi car:
➔ The location of the car is calculated using GPS software.
➔ Data is sent to the taxi office computer every few seconds.
➔ An algorithm calculates the speed of the car.
➔ The map is updated every few seconds.
Satellite navigation system (Satnav):
It is a satellite system that uses GPS readings to:
➔ Find location of the user’s receiver.
➔ Navigate the user to a specific destination.
Advantages:
➔ The driver doesn’t have to consult paper maps, so it is safer.
➔ The system can estimate the time of arrival.
➔ It is also possible to program in the fastest route, route to avoid traffic, etc.
➔ The system can also give useful information such as the location of petrol stations, pharmacies, hospitals, etc.
Disadvantages:
➔ If the maps are not kept up to date, they can give incorrect instructions.
➔ Weak satellite signals can give inaccurate data.
➔ If an incorrect starting point/destination point is input, the system will give incorrect data.
How satellite navigation system can be used by a driver to reach a destination:
➔ Destination is input by driver.
➔ Exact position of the motor vehicle is continually calculated using GPS.
➔ The on-board computer contains pre-stored road maps.
➔ The car’s position is displayed on the map.
➔ An algorithm calculates the route from the current car’s position to the destination.
➔ The algorithm makes allowances for traffic jams.
➔ System calculates and outputs the ETA of the journey.
➔ System outputs voice messages to give the correct directions.
GIS (Geographic Information System):
➔ A computer system that allows to map, model, analyse and query large amounts of data according to their
location, Combines maps with computer graphics and databases.
➔ Allows users to
➢ Create interactive queries.
➢ Edit map data.
➢ Analyse spatial data.
Examples of uses:
➔ Emergency services use GIS to send the closest emergency personnel to a location.
➔ Teachers can use GIS in their geography, science or engineering lessons.
➔ Biologists use GIS to protect animal life and plants in certain vulnerable areas (after searching the database).
➔ It can be used for crime mapping in a region or in a country.
➔ It can be used to address public health issues.
➔ It can be used to map wildfire risks.
➔ It can be used for management of agricultural crop data.
Advantages of GIS:
➔ It allows geographical and thematic data of any kind to be combined in a way which shows how they are
connected to each other.
➔ It allows the handling and exploration of huge amounts of data.
➔ It allows data to be integrated from a wide range of very different sources.
Disadvantages of GIS:
➔ The learning curve on GIS software can be very long.
➔ GIS software is very expensive.
➔ GIS requires enormous amounts of data to be input thus increasing the chances of errors.
➔ It is difficult to make GIS programs which are both fast and user-friendly.
Media Communication Systems:
Refers to a method of delivering and receiving data using telecommunications.
Uses:
➔ Transmission of television data.
➔ Transmission of telephone data.
➔ Transmission of internet data.
Advantages of media communication systems using satellites:
➔ Covers the majority of the Earth’s surface.
➔ Cheaper to use than laying cables in difficult landscapes.
➔ They have a very high bandwidth.
➔ Easy to expand the network.
➔ Security is very good as data is coded and the receiver requires decoding equipment to read the data.
➔ Well-suited for broadcasting.
➔ Satellite receivers on the ground can be portable, enabling mobile communication in very remote locations.
Disadvantages of media communication systems:
➔ There is a time delay in receipt of the signals.
➔ Signals received can be affected by bad weather and obstructions (such as tree branches).
➔ Sunspot activity can affect the performance of a satellite.
➔ If they are not in a fixed position relative to the Earth, then they need to be monitored and controlled on a
regular basis to ensure they remain in the correct orbit.
Web-authoring Software Software that allows individuals with no programming experience to create
their own websites.
Control and Measuring Software Software designed to allow a computer or microprocessor to interface with
sensors.
Device Driver Software that allows hardware devices to communicate with the computer’s
operating system.
Linker A program that links one or more modules and combines them into a single
program.
bcc (blind carbon copy) Same as cc except that the recipient is unaware that copies have been sent.
forward This sends a message that has been received to another email address.
group A group of email addresses that are given a group name so that the sender only needs to type in
one name to send an email to several recipients at once.
Desktop Computers Usually have a more stable and reliable You have to buy extra hardware to access the
internet connection. internet.
All web pages are accessible due to larger If there’s a power cut, you can’t use the PC as it
screen size than other devices. need constant power supply.
Laptops Laptops are more portable than PCs. Heavier and less portable than tablets or
Use of full-sized keyboard and pointing smartphones.
devices which makes web page navigation much Screen size is not as large as that on a PC.
easier compared to tablets/smartphones.
All web pages are accessible due to the large
screen size.
Smartphones, Very portable. Screen sizes are smaller than other devices which
Easier to use a smartphone while on the move makes it harder to read web pages and to type in
Tablets & Phablets
than other devices. messages.
Not all websites may be accessible using
smartphones/tablets.
Signal is less stable than a wired system (used by
PCs and laptops).
Internet Shopping:
Advantages to the customers:
➔ Reduces cost and time of transportation.
➔ Users also have access to a much wider choice of goods.
➔ Shopping can be done at any time on any day of the week.
➔ Saves time as there are no queues.
Disadvantages to the customers:
➔ Security issues such as viruses and other malware.
➔ The risk of accidently using fake shopping websites.
➔ It is necessary to have a computer and internet connection.
➔ Goods arrive after several days.
➔ Returning goods is expensive.
Advantages to the business companies:
➔ Saves cost of having many staff members.
➔ Saves cost of having multiple branches.
➔ Potential customer base is increased.
Disadvantages to the business companies:
➔ Cost of retraining staff.
➔ Cost of setting up and maintaining websites to enable online shopping.
➔ Could lead to a drop in customer loyalty, which could lead to loss of customers.
Communication media:
Posters:
Characteristics of posters:
➔ Can be printed out using high-quality printers or can be posted online.
➔ Available in different sizes.
➔ Used on the side of the roads so motorists can see posters on their way.
Advantages of using posters:
➔ Large posters are eye-catching and usually very difficult to miss.
➔ Can target certain people rather than the general public by placing them in strategic positions.
Disadvantages of using posters:
➔ There’s a cost of display as advertising areas can only be rented.
➔ They are subject to weather conditions.
Newsletters:
Characteristics of newsletters:
➔ Can be printed out using high-quality printers or can be posted online.
➔ Regularly distributed.
➔ Contains information related to an organisation.
Websites:
Characteristics of websites:
➔ Can use sound files, videos and animations.
➔ Links to other pages and websites using hyperlinks.
➔ Contain buttons to navigate the website.
➔ Can allow the owner of the website to know how many people have visited the website.
Advantages of using websites for communication:
➔ Can be seen by a global audience.
➔ Cannot be damaged or thrown away as with newsletters and posters.
➔ It is much easier to update a website compared to newsletters and posters.
➔ Links to other pages and websites can be added in hyperlinks.
Disadvantages of using websites for communication:
➔ Websites can be hacked.
➔ There’s a risk of potential pharming.
➔ It is necessary for the potential customers to have a computer and internet connection.
➔ Cost of setting up and maintaining the website can be expensive.
➔ It is more difficult to target the correct audience.
Multimedia presentations:
Characteristics of multimedia presentations:
➔ Can use sound files, videos and animations.
➔ Can have interactive links.
➔ Makes use of transition effects.
➔ Created using presentation software.
➔ Presented using multimedia projectors or screens.
Advantages of using multimedia presentations:
➔ The use of sound and animation effects grabs the attention of the audience and makes the presentation easier
to understand.
➔ Can be interactive.
➔ Flexible and can be tailored to suit a particular audience.
Disadvantages of using multimedia presentations:
➔ They need to have special equipment which can be expensive.
➔ Danger that equipment could fail while giving multimedia presentations.
➔ There may need to be internet access.
➔ Very easy to make a bad presentation with too many animation effects and too much text or images.
Media streaming:
Characteristics of media streaming:
➔ Data is transmitted and played in real time.
➔ Must be connected to the internet.
➔ Saves storage space as no download is needed.
➔ Saves download times as no download is needed.
➔ Quality is dependent on internet speed and the video/audio quality.
➔ Makes use of buffering to make sure video/audio plays back smoothly without freezing.
e-publications:
Examples:
➔ e-books.
➔ Digital magazines.
➔ Digital newspapers.
➔ Digital libraries.
Characteristics of e-publications:
➔ Can be downloaded to a device to be read.
➔ Moving between pages is usually done by swiping a finger across the screen.
➔ Pages can be expanded in size.
➔ Publications can include media.
Audience appreciation:
Factors to be considered:
Features to make a presentation appeal to the adults:
➔ Use a small font size.
➔ Use a formal font type.
➔ Use of technical language.
➔ Use fewer images and more text.
➔ Don’t use too much colour.
➔ Use plain and simple backgrounds.
➔ Use of both upper and lower case characters to make it easier to read.
Features to make a presentation appeal to the young children:
➔ Use animation (to keep their attention).
➔ Use sound (to keep them interested).
➔ Use larger font size (so the text is easier to read).
➔ Make the presentation colourful (to keep their attention).
➔ The language used needs to be simple.
➔ Short sentences should be used.
➔ More images than text is needed.
➔ Slide transitions need to be used.
Features to make a website appeal to young children, adults and older people: