Computer Chapter 1 Notes
Computer Chapter 1 Notes
Feasibility Study
The feasibility study assesses if the proposed system is viable and sustainable:
• Technical Feasibility: Can the existing technical infrastructure support the
new system? What upgrades are required?
• Economic Feasibility: Will the new system be cost-e ective? Consider
development, operation, and maintenance costs.
• Legal and Compliance Feasibility: Ensure the system complies with
relevant laws, regulations, and standards.
Cost-Bene t Analysis
Weigh the system's potential bene ts against its costs:
• Direct and Indirect Costs: Include development, deployment, training, and
maintenance costs.
ffi
fi
fi
fi
ff
fi
ff
• Bene ts: Increased e ciency, improved data accuracy, customer
satisfaction, and competitive advantage.
Underlying Technologies
• Selection of Technologies: Decisions regarding software languages,
development frameworks, and hosting environments.
• Data Management: Ensuring the integrity, accessibility, and security of
data within the new system.
Installation Challenges
• Customisation Needs: How much customisation will the system require to
meet speci c organisational needs?
• Training and Support: Developing comprehensive training programmes for
di erent user groups.
Conclusion
Planning a new system in an organisation involves more than just technological
considerations. It's about aligning a new system with the business goals,
understanding the needs and limitations from various perspectives, and navigating
through the challenges of implementation while considering ethical, social, and
security aspects. Thorough planning, research, and engagement with all
stakeholders are key to the successful deployment of a new system that meets the
evolving needs of the organisation.
ff
fi
fi
fi
ffi
fi
ff
1.2.1
De ning Key Terms
Hardware
• Hardware refers to the tangible, physical elements of a computer system.
• Major components include the CPU (the 'brain' of the
computer), RAM (short-term memory), storage devices (like HDDs and
SSDs for long-term data storage), and motherboards (which connect all
internal components).
• External hardware, like monitors, keyboards, and printers, are known as
peripherals.
Software
• Software is the collection of data, programs, and instructions used to direct
hardware to perform desired tasks.
• Operating Systems (OS) like Windows, macOS, and Linux manage the
hardware and create an environment for other software to run.
• Application software, like Microsoft O ce or Adobe Photoshop, enables
users to perform speci c tasks.
Peripherals
• Peripherals extend a computer's capabilities, connecting externally or
internally, and can be input, output, or storage devices.
• Input devices (e.g., keyboard, mouse) allow users to input data, whereas
output devices (e.g., monitors, printers) display or project data.
• Some peripherals, like external hard drives, serve for both storage and data
transfer functions.
Network
• A network in computing refers to a collection of interconnected computers
and devices that can share resources and data.
• Networks can range from small local area networks (LANs) in a single
building to massive, spread-out wide area networks (WANs), like the
Internet.
• Components of a network include routers, switches, cables, and wireless
access points.
Human Resources
• Human Resources in IT encompass all personnel involved in system
analysis, design, implementation, maintenance, and management.
• They play key roles in project management, technical support, security, and
ensuring that IT infrastructure aligns with organisational goals.
fi
fi
ffi
Roles of Computers in a Networked World
Client
• In networking, a client is a device that accesses shared network services
provided by another computer (server).
• Clients can be a variety of devices like desktop computers, laptops,
smartphones, etc.
Server
• Servers are powerful computers or software systems that provide data,
services, or resources to clients.
• Servers can handle various functions depending on their role: le storage,
email management, web hosting, and database services.
Email Server
• An email server is a server that handles and manages the sending,
receiving, processing, and storage of emails.
• Email servers ensure security protocols, store emails, and sort incoming
and outgoing messages.
DNS Server
• A DNS server converts user-friendly domain names into IP addresses
necessary for locating computer services and devices worldwide.
• This system is like the Internet’s phonebook, essential for the functionality
of the global internet.
Router
• Routers are devices that forward data packets between computer
networks, creating an overlay internetwork.
• They manage tra c between home and o ce networks and the internet,
determining the best route for data to travel e ciently.
Firewall
• A rewall is a network security device that monitors incoming and outgoing
network tra c and decides whether to allow or block speci c tra c based
on a de ned set of security rules.
• It's a primary line of defence in network security, safeguarding internal
networks from external threats.
Digital Divide
• The digital divide addresses inequalities in access to information
technology, heavily in uenced by geographic, economic, and socio-political
factors.
fi
fi
ffi
ffi
fl
ffi
ffi
fi
fi
fi
fi
ffi
• It questions the fairness and accessibility of technology, highlighting the
need for inclusive, global strategies to bridge this gap.
Environmental Impact
• The environmental footprint of technology is a growing concern. This
includes energy consumption of data centres, electronic waste, and the life
cycle impact of producing and disposing of tech products.
• Responsible use, recycling policies, and developing greener technologies
are ethical considerations.
Dependence on Technology
• Over-reliance on networked systems raises questions about vulnerability to
system outages, data loss, and the erosion of traditional skills and privacy.
• This dependency highlights the importance of backup systems, robust
security protocols, and balanced integration of technology in daily life.
Identifying stakeholders is the rst step in ensuring their needs are met. In system
planning, stakeholders typically include:
• End-Users: Individuals who will directly interact with the system.
Understanding their needs is crucial as they determine the system's
success or failure.
• Developers: They are responsible for building the system in line with
stakeholder requirements.
• Business Owners/Managers: They ensure the system aligns with broader
business strategies and goals.
• IT Support Sta : They play a pivotal role in the ongoing maintenance and
troubleshooting of the system.
• Suppliers and Vendors: These stakeholders provide the necessary
hardware, software, and other technology components.
fi
ff
fi
• Regulators and Legal Entities: They are essential for compliance with
legal standards, especially in matters relating to data protection and
privacy.
Ethical Considerations
• Ethical dilemmas often arise when balancing diverse stakeholder needs. For
instance, enhancing functionality for some users might compromise the
privacy or accessibility for others.
• An ethical approach requires carefully navigating these dilemmas, ensuring
respect for individual rights and societal norms.
Interviews
• Preparation: Adequate preparation is key, including developing a set of
guiding questions that are open-ended to elicit detailed responses.
• Conducting Interviews: Interviews can be face-to-face or virtual. The key
is to create a comfortable environment encouraging open communication.
• Analysis: Qualitative analysis techniques are used to interpret the
responses, extracting themes and insights to inform system development.
fi
fi
ff
fi
fi
Direct Observations
• Contextual Understanding: Observations allow for an understanding of
how stakeholders interact with existing systems in their natural settings.
• Data Collection: Notes, video recordings, and interviews can complement
observations, providing a comprehensive understanding of stakeholder
interactions and challenges.
Literature Searches
• Purpose: To build a foundation of theoretical and empirical knowledge
around the system being developed.
• Methodology: Involves reviewing academic journals, industry-speci c
reports, and technical documents.
• Bene ts: Ensures that the system design is informed by up-to-date,
research-based insights and innovations in the eld.
Intellectual Property Considerations (S/E)
• Understanding: Emphasising the importance of adhering to legal standards
regarding intellectual property.
• Practices: This includes ensuring compliance with copyright, patents, and
trademark laws during system development.
• Consequence: Protects against legal disputes and fosters ethical
standards in IT development.
Connection to Pseudocode
• De nition of Pseudocode: A high-level description of an algorithm or
system operation, presented in a structured but readable format.
• Linkage: The transition from ow charts to pseudocode involves translating
the visual representation into a textual form that resembles actual code
structure but is simpler and language-agnostic.
• Transition: This step is crucial as it lays the groundwork for actual coding,
enabling developers to structure their code logically and e ciently.
• Non-alignment with User Needs: Systems that don’t re ect the real-world
context of user operations may hinder rather than help productivity.
• Usability Issues: A lack of user input can result in interfaces or
functionalities that are non-intuitive or cumbersome, increasing error rates
and reducing e ciency.
Privacy Concerns
Privacy is a paramount concern in the age of information, where
vast amounts of personal data are collected, processed, and
stored by IT systems.
Security Challenges
The reliance on IT systems for personal and national security brings
its own set of challenges.
Cybersecurity Threats
• Types of Threats: Delving into various forms of cyber threats such as
hacking, phishing, and ransomware.
fi
fi
• Implications for National Security: Discussing how cybersecurity is
integral to national defense strategies.
Reliance on IT Systems
• System Vulnerabilities: How dependence on IT systems makes them a
target and what vulnerabilities this reliance brings.
• Preventive Measures: Strategies and practices for mitigating these
security risks.
Emerging Technologies
Emerging technologies such as AI, blockchain, and quantum
computing present new frontiers in ethical considerations.
AI and Ethics
Digital Cameras
• Small Physical Controls: Can be di cult to manipulate, particularly for
users with motor impairments or larger hands.
• Complex Menu Systems: Extensive, multi-level menus can be confusing,
making it hard to nd speci c settings or options.
Mobile Phones
• Screen Size Constraints: Especially in older models, small screens can
impede usability, a ecting the visibility of content and the ease of touching
controls accurately.
• Touchscreen Accuracy: Users with motor di culties or larger ngers may
struggle with precise interactions, such as typing or selecting small on-
screen items.
Games Consoles
• Controller Design: Controllers that are not ergonomically designed can
cause hand and wrist strain during extended use.
• Interface Complexity: Non-intuitive interfaces can hinder non-gamers or
beginners from fully enjoying the gaming experience.
MP3 Players
• Interface Navigation: Small buttons and screens can make navigation and
selection tasks challenging.
• Physical Interaction: Limited physical feedback can hinder the user's
ability to operate the device without looking directly at it.
Ticketing Systems
• Complex Processes: Users often face di culty understanding multiple
steps or navigating through convoluted booking processes.
• Screen Readability: Small font sizes and poor contrast in user interfaces
can make reading and selection tasks di cult, especially on mobile
platforms.
Scheduling Systems
• Interface Overload: Overwhelming amounts of data or features packed
into a single screen can confuse users.
• Adaptability: Systems that fail to cater to various user working styles or
preferences can limit e ciency and satisfaction.
Illustrative Examples
• Robotic Warfare: The use of drones and autonomous weapons in con ict
and the moral questions they raise regarding human oversight.
• AI in Healthcare: Balancing the bene ts of AI in diagnosis and treatment
with the moral implications of machine error and patient consent.
Ethical Implications
Technology and Ethics
Ethical considerations focus on questions of justice, rights, and the welfare of both
individuals and society. This involves analysing the standards guiding the
behaviour of individuals and institutions in the development and use of technology.
• Algorithmic Transparency: Ensuring the operations of algorithms,
particularly in critical areas like criminal justice or credit scoring, are
transparent and fair.
• Consent and Privacy: Issues surrounding data collection, user consent,
and the usage of personal information.
Economic Implications
The Economy in the Age of Technology
Economic implications consider how technology in uences job markets, economic
policies, and the overall nancial landscape.
• Automation and Employment: The balance between job creation in tech
sectors and job losses in traditional industries due to automation and AI.
• Economic Inequality: How the concentration of technological expertise
and resources can lead to wider economic disparities.
Environmental Implications
Assessing Environmental Impact
Environmental considerations include the entire lifecycle of technology products,
from creation to disposal, and the sustainability of tech-driven practices.
• Carbon Footprint of Digital Services: The environmental cost of powering
large-scale data centres and cloud computing services.
• Sustainable Design: Principles of designing technology products and
services that are environmentally sustainable and energy-e cient.
fi
fi
fi
ff
ff
fl
ffi
Sustainable Technology Practices
• Renewable Energy in Tech: Incorporating solar, wind, and other renewable
energy sources in tech infrastructure.
• Recycling and Upcycling E-Waste: Strategies for dealing with the growing
challenge of electronic waste, focusing on recycling and upcycling.