0% found this document useful (0 votes)
31 views27 pages

Theory Main Topics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views27 pages

Theory Main Topics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

ICT 0417/0983

(Chapter1,2,3 and 4)
Types of Computers
Desktop Laptop Tablet Smart Phone
Advantages  They are less likely to be  It is one unit so it takes up  It is one unit so it takes up less  It is one unit so it takes
damaged as they are not less space space up less space
portable  They are portable  They are portable  They are portable
 It is the most powerful  Internet connection may be  Internet connection may be  Internet connection
type of computers better as device is using WiFi better as device is using 4G may be better as
 It is the cheapest type of  faster to load up the operating device is using 4G
computers system  It can be used to make
 Has separatable parts so  Lower power consumption phone calls
it can be upgraded and if therefore batteries last longer  Lower power
component is faulty it  Front and back facing cameras consumption therefore
will be replaced easily are included batteries last longer

Disadvantages  It is not portable  Easier to steal/lose  Easier to steal/lose  Small screen size so it
 Batteries can run out  It uses touch screen not could cause eye strain
 If one piece of hardware keyboard therefore can be  Small keyboards so it
breaks it can be more harder to use can cause RSI
difficult to replace  Batteries can run out
 More likely to be damaged  Less standard ports
as they are portable.
 It can’t be upgraded
 Screens are smaller

2|Page
ICT 0417/0983

Software
Application software System software
It is software that helps the user to do his tasks It is software needed by the computer to work properly
Examples and uses (Never use brand name): Examples and uses:
 Word Processing: Used to prepare textdocuments.  Operating System: Manages computers functions
 Spreadsheet: Use to create to organize andmanipulate including hardware devices (input/output). Also
numeric data. providesusers with interface and it loads and runs
 Database: Database is used to store and organize data application software. Such as : GUI and CLI
using fields and records.  Compiler: Translate a program (HLL- High Level
 Photo Editing: Used to edit digital images toeither touch up Language) into a machine code (code understood by
or to apply various formatting techniques. thecomputer).
 Presentation design: Used for creating presentations  Interpreter: same as compiler but it translates
theprogram line by line
 Linker: Link more than one object file and combine
theminto single program
 Device driver Allows hardware devices to run on the
computer including printers, sound, graphics and
networkcards.
 Utilities: Help to manage and maintain computer resources
and performance by running specific tasks
Software is programs and data used for controlling the operation of a computer

3|Page
ICT 0417/0983

Hardware
Physical component that makes the computer

Internal Hardware
Processor (CPU): It carries out the instructions of a computer program. It performs basic arithmetic calculations and logical operations
using ALU
(Arithmetical Logic Unit) It performs input and output operations of the computer using CU (Control Unit)
Motherboard the main printed circuit board that contains the main components of the computer
Main Memory RAM and ROM (will be discussed later)
Video (Graphics) It enables the computer to process and display graphics (Images and videos)
Card
Sound Card It enables the computer to input, process, and deliver sound
Internal Hard Disk used to store information like software and files.

CLI (Command Line Interface) GUI (Graphical User Interface)


Both are interfaces for operating systems and used to control hardware and software
Features
How it is used? User must type in the command The tasks are pre-determined
Yes and needs to be typed accurately No (More user friendly) so you can
Memorising Commands?
(needs experienced users) locate applications more rapidly
Difficult to edit once commands typed Yes
Editing Action?
in
Usage of memory (RAM & CPU) Needs less memory and resources Needs more memory and resources
Allow Immediate visual feedback? No Yes
Allow Multi-tasking? No Yes
Input Devices Physical Keyboard Only All Input Devices
Power Consumption Less More
Direct communication with computer Yes No

4|Page
ICT 0417/0983

RAM vs. ROM


RAM ROM
(Random Access Memory) (Read Only Memory)
Use? Store data currently in use Store instructions to startup the computer
Size? Larger Smaller
Volatility? Volatile Non-volatile
Read and write? Read and write Read only

Input Devices
 Keyboard: used to enter characters (type in text or essays)
 Numeric Keypad: used to enter numbers only such as in ATMs
 Pointing Devices:
 Mouse: Used with desktops
 Touchpad: Used with laptops
 Tracker ball: Used by people with limited motor skills
 Joystick / Driving Wheel: used to move objects around the screen in computer video games
 Touch screen: an output device that is also an input device
 Scanner: used to scan hard copy images
 Graphics Tablet: used by designers and artists, which has a stylus for free hand drawing
 Microphone: used to input sound
 Barcode Reader: used to read barcodes from products at POS
 Cameras:
 Digital Camera: used to take photographs
 Video Camera: used to Input moving pictures often pre-recorded
 Web Cam: Inputting moving pictures from a fixed position

5|Page
ICT 0417/0983

Magnetic Stripe Reader Chip reader and PIN pads Contactless card reader
Price Cheapest Expensive Expensive
Speed of transaction Fast Slower Faster
Affected by magnetic Yes No No
field?
Easily scratched? Yes No No
Position At the back of the card At the front of the card Inside the card
Less secured (uses encryption)Small daily
limit
Less secured (No PIN More secured(PIN
Security? Can take money twice Transactions done
code) code)
without being
aware

Direct Data Entry Devices:


 Radio frequency identification reader (RFID): used to read data from tag from a distance
 How it works?
1. When the tag passes by the reader, the reader detects it.
2. The reader sends radiowaves with energy to activate the chip as it is a passive.
3. The tag will broadcast the information stored on the chip to the reader through the antenna
 Advantages and disadvantages:
Advantages Disadvantages
 the tag can be read from a distance  It uses radio waves so it is easy to jam or interrupt
 very robust and reliable technology  It is easy to hack data transmitted by a tag
 Very fast read rate and bulk detection is possible  More expensive than a barcode system
 Bidirectional data transfer  Tag collision (two tags interfering with each other)

6|Page
ICT 0417/0983

 OMR, OCR and MICR:


OMR OCR MICR
(Optical Mark Reader) (Optical Character Reader) (Magnetic Ink Character
Reader)
Use  MCQ Questions  Convert scanned image totext file  Reads magnetic ink
 Questionnaires which can be edited by another characters from bottomof
software bank cheques

Advantages and  Very fast correction  Faster data entry  Can’t be easily forged
disadvantages  Expensive for printing asthe  Very expensive  Human readable
paper must be accurate  Not working with  Very expensive to printon
 The marks must be fully handwriting cheques
shaded  Not all letters are
identified correctly

Output Devices
 CRT Monitor: outputs soft copy where space is not a problem
 TFT Monitor: Outputs soft copy in small space, it reduces eye strain and uses less power than CRT but it is expensive
 Projector: outputs slide shows for a large number of people
 Speakers: outputs sound

7|Page
ICT 0417/0983

Printers:
Laser Inkjet Dot matrix
Noise low medium high
Speed/ volume of high speed medium speed low speed
paper
Quality high high low
Portability most
Highest (changing cartridges
Running cost
frequently)
Initial cost Expensive lowest Expensive
Dirty environment most suitable
Stationery separate sheets separate sheets Continuous sheets
Copies carbon copies
Impact or non-impact Impact Impact Non-Impact
It uses laser to draw the printout on the
The ink droplets will be sprayed
drum, then toner attract to the drum,then A printer that prints by pressing
directly into the paper through the
How it works? toner transfer print metal pins against an ink ribbon onto
nozzle of ink cartridge.
image to plain paper the paper

Memory VS Backing Storage?


Memory Backing Storage
Magnetic, Optical, Solid
Examples RAM ROM
State
Store instructions to Provides Permanent storage
Use Store data currently in use
startup the computer and larger storage capacity
Read only and small
Disadvantages Volatile Slower Access Speed
storage capacity

8|Page
ICT 0417/0983

Comparison between backing storage:


Magnetic Optical Flash Memory
Fixed HD (HDD), Portable HD,
Example CD, DVD, Blu-ray SD Card, Pen drive, SSD
Magnetic Tape
Portability Less Portable Portable Very Portable
Expensive per GB
Price Cheaper per GB Very Expensive per GB
(Except Magnetic Tape)
Storage Capacity Very large Small Large
Size large Medium Smaller, lighter
Fast
Speed (Except magnetic tape as it uses Slow Very Fast access speed
serial access)
Robust Not Robust
Robustness /Durability
(but may be damaged as it has (Can be scratched and Very Robust
moving parts) broken easily)
Power consumption Large Medium Small

HDD vs. SSD:
HDD SSD
Size Bigger Smaller, lighter
Price Less More
Robustness Moving parts can be damaged No moving parts, robust
Noise Little noise Silent
Access Speed Slow Very Fast
Power consumption high low
Backup:
Backup is an extra copy of important files stored away from the original copy in case of damage or loss of originalcopy such as (virus or hacker
deleting the data, Accidental delete of data or corruption)

9|Page
ICT 0417/0983

Cloud Backing Storage:


Advantages Disadvantages
 needs access to the internet to be used  more chance of it being hacked as it is on all the time
 can be used on different devices  User loses control on his own data
 only pay for what you use  Risk of error by manufacturer leading to data loss
 automatic backup takes place  Slower download/upload than storage media
 The cost of storing in the cloud may be expensive in the long
 Storage capacity can be expanded easily
term

10 | P a g e
ICT 0417/0983

(Chapter 6)
Connecting a network
Advantages Disadvantages
Sharing hardware and software Spread of viruses
Sharing data between computers Slow access to the internet
Ease of communication Increase security risks

Network Types
Local Area Network (LAN) Wireless Local Area Network (WLAN)
Type of connection Cables Radio waves (Wi-Fi or Bluetooth)
Tripping over cables Yes No
Hacking More difficult Easier
Transfer speed (bandwidth) Higher Lower
Add devices More difficult Easier
Can connect mobiles No Yes
Allows portability during use No Yes

Types of Radio Waves


Wi-Fi Bluetooth
Range Wider Smaller
Transfer speed Higher Lower
Number of connections More Less
Needs device (router/access point/hotspot) Yes No
Security Encryption using password Pair Key
Energy usage Consumes more energy More effecient
Use Make networks Transfer data

11 | P a g e
ICT 0417/0983

LAN VS WLAN
Local Area Network Wide Area Network
Privacy Private Public
Number of computers Limited Unlimited
Range Close to each other Far away from each other

Intranet VS Internet
Internet Intranet
Similarities  Both are networks
 Both are communication systems such as emails
 Both are information systems
Privacy Public Private
(using world wide web) (Within a single organization)
Policed Not moderated can post anything Moderated
Security High risk of hacking and downloading viruses Lower risk of hacking and downloading viruses
Resources Many resources Less resources
Reliability Less reliable More reliable
Cost Cheaper to access and setup More expensive to setup, access and maintain
Time Takes less time to setup Time consuming to setup
Features More features such as online chat, online conference, Less features such as creating extranet (part ofintranet that
/use Online Gaming, can be accessed by authorized outside
Email users), Internal file transfer, send and receive emails

12 | P a g e
ICT 0417/0983

Similarities between extranet and intranet


 Both can share content
 Both have restricted access
 Both sits behind firewall
Differences between extranet and intranet
 Internet is owned by single organization, extranet owned by several organization.
 Extranet in part of intranet
 Intranet shared data in organization, extranet shares data to a specific customers

Network Requirements
Hardware:
 Network Interface Card: Placed inside the computer to be able to connect to any network device, stores the MACaddress of the
device in the network
 Modem: A network device that allows a stand-alone computer, using a dial-up (Telephone line) analogueconnection, to
connect to an ISP by converting a computer’s digital signal to an analogue signal
 Bridge: network device connects one LAN (or device) to another with the same protocol.
 Hub: network device sends the data packet from a computer to all devices connected to it
 Switch: A device that connects a number of other devices and sends data to one specific device only in thesame LAN using MAC
addresses.
 Wireless Access Point (WAP): A device that convert from cables to wireless communication ( Change from LAN to WLAN)

 Data packets: any data being transmitted over a network. It contains (IP address of both sender and receiver, part of the message,
number of each packer, total number of packets)
 Router: network device connects a LAN to the internet, sends the data through the fastest route available. It uses and stores IP addresses
of all connected devices in the routing table.

13 | P a g e
ICT 0417/0983

How data routed around networks?


1. Data Packet are sent to the switch/Hub and then passed to router
2. Router checks the IP address of the data
3. Router looks up the paths to get that address using its routing table
4. Router then checks which path is the Quickest Path
5. Router is then able to route the data to reach the correct switch/hub
6. Switch/Hub sends the data packets to the destination computer

IP address vs. MAC address


IP address MAC address
Use It identifies computer on the network It is unique hardware identifier
Changes? yes No
Given by? ISP Manufacturer
Consist of? 4 numbers separated by dots 6 pairs of hexadecimal

 Proxy server: device that block unwanted sites and controls internet access for all users, Cache (temporarily store)recently accessed
web pages and Cache (temporarily store) recently accessed web pages.
 File server: Connected to any network, to store files shared by users of the network.
Web server: They are computers that contains webpages. Every webserver has an IP address and domain name.
HTTP VS. FTP
HTTP (Hyper Text transfer Protocol) FTP (File Transfer Protocol)
Use Transfers the content of a webpage into a browser for Files are transferred from one device
viewing to another and copied into memory
Type of server used Webserver File server
Uploads Small files Large files

14 | P a g e
ICT 0417/0983

Internet Service Provider (ISP):


A company that provides Internet access to customers (to access the internet an ISP subscription is needed. It provides IP address,
Router, space on cloud to store files domain name and space on a server to create website

 VOIP (Voice Over Internet Protocol): A service that enables people to use the Internet as the transmission medium for telephone
calls.
 Video Conference: It is the use of Internet to allow people in two or more locations to communicate using video and audio
streaming. Disadvantages compared with other methods of conference: It need expensive hardware and there may be lag and lip
sync due to internet problems. The connection may not be stable.
 Audio Conference: same as video-conference but people can only hear each other and its one over telephone network. Advantages
compared to video conference: more stable connection and cheaper to setup. Disadvantages compared to other conference
methods: can’t see each other.
 Web Conference: It is conducted online. Participants tend to be sat at computers and can view the same screen. It tend to be
interactive. Organizer allows participants to click a link to ask questions .participants are then queued. It is possible to draw or write
on a ‘whiteboard’ using keyboard and mouse.

15 | P a g e
ICT 0417/0983

Network Risks
Risk definition Effect Protection
 Use of firewalls: software sits between the computer
 Data can be deleted
and the router to filterdata.
 Data can be
Hacking: Gaining unauthorised access to a  Encryption: encoding data so that only authorized
changed and
computer system people who have the key can decoded data. It Changes
corrupted
the data into a form that is not understandable.
 Can lead to the
 Authentication: It is a technique to verify that the
misuse ofpersonal
person who’s accessing thedata on a computer is an
data
authorized user
 Hard disk could be filled up  Install an up to date anti-virus
Virus: A virus is a piece of software code that  The computer is  Scan the pen-drive as it is inserted into his computer
infects a computer and has the ability to performing routine  Do not download media from an unknown source without
replicate itself. tasks a lot more slowly scanning it
 Files are being deleted  Don’t open or download attachments form unknown
 Software doesn’t work senders without scanningthe files
properly
Phishing This is a scam involving emails, that  Do not reply to emails that asks for confidential data
 takes personal info
looking like a legitimate email. It is sent  Report any suspicious activity.
How to detect?
containing a link the user clicks the link and is  Must have digital certificate
 urges you for a quick
sent to a website where personal details are (It is a level of security to verify he email comes from a
reply
asked for. known and trusted
 several grammar source contains: expiry date, details of the owner and serial
mistakes number)
Smishing: A text message (SMS) is received/sent  Report any smishing attempts
contains a link then user tapslink and asked for  takes personal info  Never give your personal details over the mobile phone
personal information  Never click on links in text messages from unexpected
people
Pharming: A virus is sent containing malicious
code when the user types in theURL (of the  Gain Personal data
 Use an up to date anti-spyware and anti-virus to remove
bank) it directs a user to a fraudulent  This is can lead to
pharming code
website. As the user enters the fraud oridentity
 Check sites carefully before a link is clicked
details they are copied to criminal’s website theft.
16 | P a g e
ICT 0417/0983

 Takes time to deal with it  Do not reply to spam emails


SPAM: Electronic Junk email that is
 Can slow down networks  Use a spam email filter
Unsolicited messages sent in bulk by emailand
 Can fill up the receiver’s  Block unknown senders
can consist of unwanted adverts
mail boxand that fill up  Do not sign up to commercial mailing lists
hard disk
Spyware (Key-logging SW): It Records every
keystroke on the keyboard  Can read a password  Use up to date anti-spyware software.
Saves it in a log file and transmits the log file being typedin  Use on screen keyboard when entering password
back to the hackers
 URL starts with HTTPS Hyper Text Transfer Protocol
Interception during transfer: Confidential data
Secured (It means that it’ssecured using SSL (Secure
could be intercepted by hackers whilebeing  Takes confidential data
socket layer which is Security technology that encrypts
transferred over the Internet.
data between the server and the client to make sure all
data is
private)
 remember information  Disable cookies from your browser settings
Cookies: a small file sent from a website and
such aspassword,  Don’t tick remember password on a website
stored on the user's computer
usernames  Log out from websites after using them
 provide tailored website for
user

17 | P a g e
ICT 0417/0983

Chapter 7
Analysis
Importance of analysis
 Important to meet the needs of the user
 More efficient system is produced that does what the users require
 identify problems with the system to avoid them in the new system
 identify user and information requirements (needed to solve the identified problems) to fulfill them in the new system

Methods of analysis:
Method Advantages Disadvantages
Interview employers,  Allows more detailed answers to be given rather  Time consuming to complete all the interviews
managers than questionnaires  Not anonymous
 The questions can be expanded or modified Both the members and the interviewer have to be free at
 Questions can be explained the same time
 Can see body language  Expensive due to analyst’s time
Questionnaire  Faster to complete all questionnaires than using  Tend not to be popular with users
employees interviews  Too inflexible cannot ask follow up questions
 Cheaper to produce questionnaires than As it’s anonymous people may not take it seriously
pay/employ an interviewer Cannot expand on their answers/limited in their responses
 Individuals can remain anonymous therefore they are
more truthful
 More people can answer the questionnaire than can
be interviewed
 Analysis of the results can be quicker with
questionnaires
Observation  Reliable data Most people are distracted or uncomfortable or don't work
 Better overall view of the whole system/all the inputs as usual while being watched
and outputs of the system
 Better overall view of the whole system/all
the inputs and outputs of the system

18 | P a g e
ICT 0417/0983

Examining documents  Information can be obtained which is not possible  Time consuming to go through the documents
of the using other methods. Expensive method as the analyst will have to spend time
existing system going through documents.

Design and development


Database File Structure:
Design field names, field types, field sizes, primary key and validation checks

Input methods (Input Screen and data capture form):


Input Screen Data Capture Form
Text:
 Text must be easily expressed
 Font must have appropriate size, style and colour
Boxes: Boxes:
 Box must fit to the data  Box must fit to the data
 Choose appropriate box type (Text box, Drop down  Choose appropriate box type (Text box and check
menu, Radio button and check box) box)

19 | P a g e
ICT 0417/0983

Testing
Test data:
 Normal Test Data: data within the range of acceptability and it is of the correct type
 Abnormal Test Data: Data that is outside the boundaries of acceptability or it is of the wrong type
 Extreme Test Data: Data that is on the boundary of acceptability.
 Live Test Data: Data which has been used with the current system and the results are known

Implementation
Method Advantages Disadvantages
 The benefits are immediate
Direct changeover: New system replaces  if the new system is faulty data will be lost
 Costs are reduced as only one system
existing system immediately
is needed
 More expensive as each part needs to be
evaluated before moving on
Phased implementation: New system is  If the current part fails then not all the
 More time consuming as each part
implemented part by part system is lost
needs to be evaluated before moving on

 If the system fails then only branch


is affected
Pilot running: Whole system is implemented  Cheaper as training is carried branch  More time consuming as the
in one branch at a time by branch changeover is spread out
 Less time consuming as training is
carried out branch by branch
 If new system fails, old system can be
Parallel running: New system runs together
used as a back up  High cost of running two systems.
with existing system
 Possible to gradually train staff

20 | P a g e
ICT 0417/0983

Documentation
User documentation Technical documentation
Use For the user to help him: For another programmer to help him:
 interact with the system  fix the system in case of any malfunction
 deal with any simple problems faced while  update the system if more functionality
using the system is needed

Components  sample runs/glossary of terms  program flowcharts


 how to use the system  file structures
 error messages  program coding/algorithm
 frequently asked questions  list of variables
 trouble-shooting guide  validation routines
Items that need to be included  software and hardware requirements
in both  purpose of the system
 limitations of the system
 Input and Output formats

Evaluation
Why?
To make sure users are satisfied with the system; make sure the system: does its job, is easy to use and has no problems

How?
 Interviews and questionnaires with the users to collect their opinions and responses after using the system
 Comparing the system with the original requirement

21 | P a g e
ICT 0417/0983

Chapter 8, 9
What is meant by DPA (Data protection Act) and how to apply?!
DPAs are laws that protect the rights of individual about whom personal data (It is any data concerning a living person whocan identified
by this data such as: Name, Address, Date of birth, banking details) is obtained, stored and processed.
 Do not keep data longer than required
 Do not collect data that is not required
 Do not pass on the data without the owner’s permission
 Only certain employees can view the data and handle it
 Keep the data safe and secure (encryption, firewall, password)
 Only use the data for the reasons given to the owner
 Keep the data up to data

What is meant by E-safety and how to apply?


Keep personal data safe so that others cannot use it against us
When using the internet When using email
 Never send people photos of yourself  Only open emails from known sources.
 Always maintain your privacy settings on  Only email people you know
 Only use websites recommended by teachers.  Never use personal details in emails.
 Use appropriate search conditions when usingsearch  Never include school’s name or photos of students wearingschool
engines uniform in any email
When using social networking sites When Playing Online Games:
 Block or report anybody who acts suspiciously  Always use nickname and never your real name.
 Keep private and personal data secret.  Never give your personal data to any player.
 Never arrange to meet anyone alone
 Avoid misuse of image.
 Always use appropriate language.

22 | P a g e
ICT 0417/0983

Banking
 Steps of Cash withdraw, deposit and checking balance:
 Enter Card
3 Inputs  Enter Language
 Enter PIN code
 Check that card is not expired (by comparing today’s date with expiry date)
3 Checks  Check that pin code entered is identical to the one stored on the card.
 Check that the card is not reported stolen
Check Balance Cash Withdraw Cash Deposit
 Master file is searched to  Customer enters amount of money required.  Customer enters amount of money
find the account number  Master file is searched to find the account to be deposited
 Corresponding balance is number  Master file is searched to find the
read from master file.  Customer's account is checked to see if it has account number
 Balance is displayed sufficient funds  Customer inserts the cash
Transaction
 Make sure that the amount within the daily limit  Cash is counted
 If the amount of money is available and does not  The master file is updated by
exceed the daily limit the transaction is increasing the account balance of
authorized the customer
 The master file is updated by decreasing the
account balance of the customer
 Receipt is printed  Receipt is printed  Receipt is printed
Output  Card is returned  Card is returned  Card is returned
 Cash is output

Phone Banking:

Phone Banking Online Banking


The customer calls the bank’s phone number The customer access the bank’s website
The customer keys in their account number
hey are then requested to enter a four-digit PIN or selected numbers from the PIN or using twin factor authentication
The customer will then hear various options for transactions The customer will then see various options for transactions
The customer chooses one of the options by pressing the The customer chooses one of the options by choosing the
correct key or by speaking the number. correct option.
23 |Page
ICT 0417/0983

Control System
Store Preset Value

Sensor ADC Microprocessor Control Unit

Receive Compare Takes action

How control system works?


1. Sensor: will continuously measure the physical variables, reads only analogue data
2. ADC: Analogue to Digital Converter (converts data read by the sensor to be understood by microprocessor).
3. The role of microprocessor in control system:
 It stores the required preset value
 Microprocessor receives the data from the sensor
 It compares the received readings with preset value
 It sends signal with action to control unit
 If received readings are greater than preset value ……………………………
 If received readings are lower than preset value ……………………………..
 This process is continuous
4. Control Unit: performs the action

 Advantages and disadvantages of microprocessor controlled devices:

24 | P a g e
ICT 0417/0983

Advantages Disadvantages

No need to do manual Tasks at home Can lead to laziness


More time to do leisure activity Less of household skills
More secure lifestyle (due to presence of automatic alarms) Lack of fitness/exercise

Measurement System
Measurement system is the monitoring/recording of physical variables without the microprocessor taking action
Control System is when the microprocessor takes action depending on sensor readings

Store data for later use


Sensor ADC Computer Make Graphs
Make predictions

 Advantages and disadvantages of robots/measurement systems:


Advantages Disadvantages
 Can work in dangerous conditions where humans can’t work  High initial cost
 It can work 24/7 without taking breaks or shifts  Maintenance cost is more expensive as staff needed
 More accurate readings  Requires backup systems, which are expensive
 Higher productivity  They replace skilled workers, leading to de-skilling
 More consistent readings and outputs  Workers need to be re-trained which is expensive
 Cheaper in the long run as no salaries needed  If something goes wrong, it may be difficult to find the
error

25 | P a g e
ICT 0417/0983

Health and Safety


Health issues: problems due to long use of computers.
Problem Caused by How to protect?
Staring at computer screens for a long  Use anti-glare screen filter
Eye strain/headache
time  Take regular breaks
Sitting in a wrong position in front of the Sit in an upright position - Take
Back pain
computer for a long time regular
breaks or use ergonomic chair
 Sitting on an adjustable chair
Neck pain Looking up or down at the screen
 Take regular breaks
Long use of mouse (pain in wrist) Use wrist rest or Take regular breaks
Repetitive Strain Injuries (RSI): Damage to fingers and
Use ergonomic keyboard or Take
wrists Long use of keyboard (pain in wrist)
regular breaks

Employment
Effects of introduction of computer:
new jobs were introduced jobs were outdated

technicians workers in factories replaced by robots

Programmers Secretaries
Webpage designers Accountants
\

26 | P a g e
ICT 0417/0983

ANPR
1. A sensor detects a vehicle then It sends a signal to the processor to instruct the camera to capture an image for the car
2. A program is used to isolate the number plate from the image and adjust the brightness and contrast of image
3. Each character is recognized using OCR then it is stored in the database

Navigation (how the satnav works?)


1. Destination is input by driver then Exact position of motor vehicle is continually calculated using GPS
a. using data transmitted from 3 / 4 satellites, Satellites transmit radio signals to the Earth
b. Software in the smart watch interpret the signals to locate its position
2. The Satellite navigation system contains pre-stored road maps
3. The car’s position is displayed on the map and the route displayed
4. Algorithm calculates the route from current car’s position to destination makes allowances for traffic jams
5. Car system receives regular updates of traffic conditions using GIS
6. Calculates the journey time using satellite navigation system and outputs the journey time and the directions.

27 | P a g e
ICT 0417/0983

Expert System
Components of the expert system
USE

Knowledge Inference Rules Base Interactive user


Base Engine interface

How to use?
1. Questions about the (………) are asked by the system, answers to these questions are entered by the user.
2. These answers are taken by rules base to make conclusions
3. Conclusions taken by inference engine to search in the knowledge base to find matching records
4. The matching records will be output to the user on the output screen
How to create an expert system?
1. Collect information from experts by interviews
2. Design and create knowledge base to contain the information collected
3. Design and create inference engine to search for records in the knowledge base
4. Design and create rules base to make conclusions about the inputs
5. Design and create input and output screens for the user to interact with the system

28 | P a g e

You might also like