Theory Main Topics
Theory Main Topics
(Chapter1,2,3 and 4)
Types of Computers
Desktop Laptop Tablet Smart Phone
Advantages They are less likely to be It is one unit so it takes up It is one unit so it takes up less It is one unit so it takes
damaged as they are not less space space up less space
portable They are portable They are portable They are portable
It is the most powerful Internet connection may be Internet connection may be Internet connection
type of computers better as device is using WiFi better as device is using 4G may be better as
It is the cheapest type of faster to load up the operating device is using 4G
computers system It can be used to make
Has separatable parts so Lower power consumption phone calls
it can be upgraded and if therefore batteries last longer Lower power
component is faulty it Front and back facing cameras consumption therefore
will be replaced easily are included batteries last longer
Disadvantages It is not portable Easier to steal/lose Easier to steal/lose Small screen size so it
Batteries can run out It uses touch screen not could cause eye strain
If one piece of hardware keyboard therefore can be Small keyboards so it
breaks it can be more harder to use can cause RSI
difficult to replace Batteries can run out
More likely to be damaged Less standard ports
as they are portable.
It can’t be upgraded
Screens are smaller
2|Page
ICT 0417/0983
Software
Application software System software
It is software that helps the user to do his tasks It is software needed by the computer to work properly
Examples and uses (Never use brand name): Examples and uses:
Word Processing: Used to prepare textdocuments. Operating System: Manages computers functions
Spreadsheet: Use to create to organize andmanipulate including hardware devices (input/output). Also
numeric data. providesusers with interface and it loads and runs
Database: Database is used to store and organize data application software. Such as : GUI and CLI
using fields and records. Compiler: Translate a program (HLL- High Level
Photo Editing: Used to edit digital images toeither touch up Language) into a machine code (code understood by
or to apply various formatting techniques. thecomputer).
Presentation design: Used for creating presentations Interpreter: same as compiler but it translates
theprogram line by line
Linker: Link more than one object file and combine
theminto single program
Device driver Allows hardware devices to run on the
computer including printers, sound, graphics and
networkcards.
Utilities: Help to manage and maintain computer resources
and performance by running specific tasks
Software is programs and data used for controlling the operation of a computer
3|Page
ICT 0417/0983
Hardware
Physical component that makes the computer
Internal Hardware
Processor (CPU): It carries out the instructions of a computer program. It performs basic arithmetic calculations and logical operations
using ALU
(Arithmetical Logic Unit) It performs input and output operations of the computer using CU (Control Unit)
Motherboard the main printed circuit board that contains the main components of the computer
Main Memory RAM and ROM (will be discussed later)
Video (Graphics) It enables the computer to process and display graphics (Images and videos)
Card
Sound Card It enables the computer to input, process, and deliver sound
Internal Hard Disk used to store information like software and files.
4|Page
ICT 0417/0983
Input Devices
Keyboard: used to enter characters (type in text or essays)
Numeric Keypad: used to enter numbers only such as in ATMs
Pointing Devices:
Mouse: Used with desktops
Touchpad: Used with laptops
Tracker ball: Used by people with limited motor skills
Joystick / Driving Wheel: used to move objects around the screen in computer video games
Touch screen: an output device that is also an input device
Scanner: used to scan hard copy images
Graphics Tablet: used by designers and artists, which has a stylus for free hand drawing
Microphone: used to input sound
Barcode Reader: used to read barcodes from products at POS
Cameras:
Digital Camera: used to take photographs
Video Camera: used to Input moving pictures often pre-recorded
Web Cam: Inputting moving pictures from a fixed position
5|Page
ICT 0417/0983
Magnetic Stripe Reader Chip reader and PIN pads Contactless card reader
Price Cheapest Expensive Expensive
Speed of transaction Fast Slower Faster
Affected by magnetic Yes No No
field?
Easily scratched? Yes No No
Position At the back of the card At the front of the card Inside the card
Less secured (uses encryption)Small daily
limit
Less secured (No PIN More secured(PIN
Security? Can take money twice Transactions done
code) code)
without being
aware
6|Page
ICT 0417/0983
Advantages and Very fast correction Faster data entry Can’t be easily forged
disadvantages Expensive for printing asthe Very expensive Human readable
paper must be accurate Not working with Very expensive to printon
The marks must be fully handwriting cheques
shaded Not all letters are
identified correctly
Output Devices
CRT Monitor: outputs soft copy where space is not a problem
TFT Monitor: Outputs soft copy in small space, it reduces eye strain and uses less power than CRT but it is expensive
Projector: outputs slide shows for a large number of people
Speakers: outputs sound
7|Page
ICT 0417/0983
Printers:
Laser Inkjet Dot matrix
Noise low medium high
Speed/ volume of high speed medium speed low speed
paper
Quality high high low
Portability most
Highest (changing cartridges
Running cost
frequently)
Initial cost Expensive lowest Expensive
Dirty environment most suitable
Stationery separate sheets separate sheets Continuous sheets
Copies carbon copies
Impact or non-impact Impact Impact Non-Impact
It uses laser to draw the printout on the
The ink droplets will be sprayed
drum, then toner attract to the drum,then A printer that prints by pressing
directly into the paper through the
How it works? toner transfer print metal pins against an ink ribbon onto
nozzle of ink cartridge.
image to plain paper the paper
9|Page
ICT 0417/0983
10 | P a g e
ICT 0417/0983
(Chapter 6)
Connecting a network
Advantages Disadvantages
Sharing hardware and software Spread of viruses
Sharing data between computers Slow access to the internet
Ease of communication Increase security risks
Network Types
Local Area Network (LAN) Wireless Local Area Network (WLAN)
Type of connection Cables Radio waves (Wi-Fi or Bluetooth)
Tripping over cables Yes No
Hacking More difficult Easier
Transfer speed (bandwidth) Higher Lower
Add devices More difficult Easier
Can connect mobiles No Yes
Allows portability during use No Yes
11 | P a g e
ICT 0417/0983
LAN VS WLAN
Local Area Network Wide Area Network
Privacy Private Public
Number of computers Limited Unlimited
Range Close to each other Far away from each other
Intranet VS Internet
Internet Intranet
Similarities Both are networks
Both are communication systems such as emails
Both are information systems
Privacy Public Private
(using world wide web) (Within a single organization)
Policed Not moderated can post anything Moderated
Security High risk of hacking and downloading viruses Lower risk of hacking and downloading viruses
Resources Many resources Less resources
Reliability Less reliable More reliable
Cost Cheaper to access and setup More expensive to setup, access and maintain
Time Takes less time to setup Time consuming to setup
Features More features such as online chat, online conference, Less features such as creating extranet (part ofintranet that
/use Online Gaming, can be accessed by authorized outside
Email users), Internal file transfer, send and receive emails
12 | P a g e
ICT 0417/0983
Network Requirements
Hardware:
Network Interface Card: Placed inside the computer to be able to connect to any network device, stores the MACaddress of the
device in the network
Modem: A network device that allows a stand-alone computer, using a dial-up (Telephone line) analogueconnection, to
connect to an ISP by converting a computer’s digital signal to an analogue signal
Bridge: network device connects one LAN (or device) to another with the same protocol.
Hub: network device sends the data packet from a computer to all devices connected to it
Switch: A device that connects a number of other devices and sends data to one specific device only in thesame LAN using MAC
addresses.
Wireless Access Point (WAP): A device that convert from cables to wireless communication ( Change from LAN to WLAN)
Data packets: any data being transmitted over a network. It contains (IP address of both sender and receiver, part of the message,
number of each packer, total number of packets)
Router: network device connects a LAN to the internet, sends the data through the fastest route available. It uses and stores IP addresses
of all connected devices in the routing table.
13 | P a g e
ICT 0417/0983
Proxy server: device that block unwanted sites and controls internet access for all users, Cache (temporarily store)recently accessed
web pages and Cache (temporarily store) recently accessed web pages.
File server: Connected to any network, to store files shared by users of the network.
Web server: They are computers that contains webpages. Every webserver has an IP address and domain name.
HTTP VS. FTP
HTTP (Hyper Text transfer Protocol) FTP (File Transfer Protocol)
Use Transfers the content of a webpage into a browser for Files are transferred from one device
viewing to another and copied into memory
Type of server used Webserver File server
Uploads Small files Large files
14 | P a g e
ICT 0417/0983
VOIP (Voice Over Internet Protocol): A service that enables people to use the Internet as the transmission medium for telephone
calls.
Video Conference: It is the use of Internet to allow people in two or more locations to communicate using video and audio
streaming. Disadvantages compared with other methods of conference: It need expensive hardware and there may be lag and lip
sync due to internet problems. The connection may not be stable.
Audio Conference: same as video-conference but people can only hear each other and its one over telephone network. Advantages
compared to video conference: more stable connection and cheaper to setup. Disadvantages compared to other conference
methods: can’t see each other.
Web Conference: It is conducted online. Participants tend to be sat at computers and can view the same screen. It tend to be
interactive. Organizer allows participants to click a link to ask questions .participants are then queued. It is possible to draw or write
on a ‘whiteboard’ using keyboard and mouse.
15 | P a g e
ICT 0417/0983
Network Risks
Risk definition Effect Protection
Use of firewalls: software sits between the computer
Data can be deleted
and the router to filterdata.
Data can be
Hacking: Gaining unauthorised access to a Encryption: encoding data so that only authorized
changed and
computer system people who have the key can decoded data. It Changes
corrupted
the data into a form that is not understandable.
Can lead to the
Authentication: It is a technique to verify that the
misuse ofpersonal
person who’s accessing thedata on a computer is an
data
authorized user
Hard disk could be filled up Install an up to date anti-virus
Virus: A virus is a piece of software code that The computer is Scan the pen-drive as it is inserted into his computer
infects a computer and has the ability to performing routine Do not download media from an unknown source without
replicate itself. tasks a lot more slowly scanning it
Files are being deleted Don’t open or download attachments form unknown
Software doesn’t work senders without scanningthe files
properly
Phishing This is a scam involving emails, that Do not reply to emails that asks for confidential data
takes personal info
looking like a legitimate email. It is sent Report any suspicious activity.
How to detect?
containing a link the user clicks the link and is Must have digital certificate
urges you for a quick
sent to a website where personal details are (It is a level of security to verify he email comes from a
reply
asked for. known and trusted
several grammar source contains: expiry date, details of the owner and serial
mistakes number)
Smishing: A text message (SMS) is received/sent Report any smishing attempts
contains a link then user tapslink and asked for takes personal info Never give your personal details over the mobile phone
personal information Never click on links in text messages from unexpected
people
Pharming: A virus is sent containing malicious
code when the user types in theURL (of the Gain Personal data
Use an up to date anti-spyware and anti-virus to remove
bank) it directs a user to a fraudulent This is can lead to
pharming code
website. As the user enters the fraud oridentity
Check sites carefully before a link is clicked
details they are copied to criminal’s website theft.
16 | P a g e
ICT 0417/0983
17 | P a g e
ICT 0417/0983
Chapter 7
Analysis
Importance of analysis
Important to meet the needs of the user
More efficient system is produced that does what the users require
identify problems with the system to avoid them in the new system
identify user and information requirements (needed to solve the identified problems) to fulfill them in the new system
Methods of analysis:
Method Advantages Disadvantages
Interview employers, Allows more detailed answers to be given rather Time consuming to complete all the interviews
managers than questionnaires Not anonymous
The questions can be expanded or modified Both the members and the interviewer have to be free at
Questions can be explained the same time
Can see body language Expensive due to analyst’s time
Questionnaire Faster to complete all questionnaires than using Tend not to be popular with users
employees interviews Too inflexible cannot ask follow up questions
Cheaper to produce questionnaires than As it’s anonymous people may not take it seriously
pay/employ an interviewer Cannot expand on their answers/limited in their responses
Individuals can remain anonymous therefore they are
more truthful
More people can answer the questionnaire than can
be interviewed
Analysis of the results can be quicker with
questionnaires
Observation Reliable data Most people are distracted or uncomfortable or don't work
Better overall view of the whole system/all the inputs as usual while being watched
and outputs of the system
Better overall view of the whole system/all
the inputs and outputs of the system
18 | P a g e
ICT 0417/0983
Examining documents Information can be obtained which is not possible Time consuming to go through the documents
of the using other methods. Expensive method as the analyst will have to spend time
existing system going through documents.
19 | P a g e
ICT 0417/0983
Testing
Test data:
Normal Test Data: data within the range of acceptability and it is of the correct type
Abnormal Test Data: Data that is outside the boundaries of acceptability or it is of the wrong type
Extreme Test Data: Data that is on the boundary of acceptability.
Live Test Data: Data which has been used with the current system and the results are known
Implementation
Method Advantages Disadvantages
The benefits are immediate
Direct changeover: New system replaces if the new system is faulty data will be lost
Costs are reduced as only one system
existing system immediately
is needed
More expensive as each part needs to be
evaluated before moving on
Phased implementation: New system is If the current part fails then not all the
More time consuming as each part
implemented part by part system is lost
needs to be evaluated before moving on
20 | P a g e
ICT 0417/0983
Documentation
User documentation Technical documentation
Use For the user to help him: For another programmer to help him:
interact with the system fix the system in case of any malfunction
deal with any simple problems faced while update the system if more functionality
using the system is needed
Evaluation
Why?
To make sure users are satisfied with the system; make sure the system: does its job, is easy to use and has no problems
How?
Interviews and questionnaires with the users to collect their opinions and responses after using the system
Comparing the system with the original requirement
21 | P a g e
ICT 0417/0983
Chapter 8, 9
What is meant by DPA (Data protection Act) and how to apply?!
DPAs are laws that protect the rights of individual about whom personal data (It is any data concerning a living person whocan identified
by this data such as: Name, Address, Date of birth, banking details) is obtained, stored and processed.
Do not keep data longer than required
Do not collect data that is not required
Do not pass on the data without the owner’s permission
Only certain employees can view the data and handle it
Keep the data safe and secure (encryption, firewall, password)
Only use the data for the reasons given to the owner
Keep the data up to data
22 | P a g e
ICT 0417/0983
Banking
Steps of Cash withdraw, deposit and checking balance:
Enter Card
3 Inputs Enter Language
Enter PIN code
Check that card is not expired (by comparing today’s date with expiry date)
3 Checks Check that pin code entered is identical to the one stored on the card.
Check that the card is not reported stolen
Check Balance Cash Withdraw Cash Deposit
Master file is searched to Customer enters amount of money required. Customer enters amount of money
find the account number Master file is searched to find the account to be deposited
Corresponding balance is number Master file is searched to find the
read from master file. Customer's account is checked to see if it has account number
Balance is displayed sufficient funds Customer inserts the cash
Transaction
Make sure that the amount within the daily limit Cash is counted
If the amount of money is available and does not The master file is updated by
exceed the daily limit the transaction is increasing the account balance of
authorized the customer
The master file is updated by decreasing the
account balance of the customer
Receipt is printed Receipt is printed Receipt is printed
Output Card is returned Card is returned Card is returned
Cash is output
Phone Banking:
Control System
Store Preset Value
24 | P a g e
ICT 0417/0983
Advantages Disadvantages
Measurement System
Measurement system is the monitoring/recording of physical variables without the microprocessor taking action
Control System is when the microprocessor takes action depending on sensor readings
25 | P a g e
ICT 0417/0983
Employment
Effects of introduction of computer:
new jobs were introduced jobs were outdated
Programmers Secretaries
Webpage designers Accountants
\
26 | P a g e
ICT 0417/0983
ANPR
1. A sensor detects a vehicle then It sends a signal to the processor to instruct the camera to capture an image for the car
2. A program is used to isolate the number plate from the image and adjust the brightness and contrast of image
3. Each character is recognized using OCR then it is stored in the database
27 | P a g e
ICT 0417/0983
Expert System
Components of the expert system
USE
How to use?
1. Questions about the (………) are asked by the system, answers to these questions are entered by the user.
2. These answers are taken by rules base to make conclusions
3. Conclusions taken by inference engine to search in the knowledge base to find matching records
4. The matching records will be output to the user on the output screen
How to create an expert system?
1. Collect information from experts by interviews
2. Design and create knowledge base to contain the information collected
3. Design and create inference engine to search for records in the knowledge base
4. Design and create rules base to make conclusions about the inputs
5. Design and create input and output screens for the user to interact with the system
28 | P a g e