Grade 6 ICT Binder
Grade 6 ICT Binder
COMMUNICATION
TECHNOLOGY
Course Book
LEVEL VI
Contents
S.No. Topic Page No
UNIT 1 : TYPES AND COMPONENTS OF COMPUTER SYSTEM
UNIT 4 : NETWORKS
4.1 NETWORKS 35
7.1 E SAFETY
-
64
7.2 HACKING 65
Learning Outcome:
HARDWARE:
Hardware is the physical parts of the computer system – the parts
that you can touch and see. A motherboard, a CPU, a keyboard and
a monitor are all items of hardware. Hardware represents the
physical components of a computer - the components that can be
seen and touched.
Types of Hardware:
3
SOFTWARE:
Software is a collection of instructions that can be ‘run’ on a computer.
These instructions tell the computer what to do. Software is not a physical
thing (but it can of course be stored on a physical medium such as a
CDROM), it is just a bunch of codes. An operating system such as
Windows XP or Mac OS X, applications such as Microsoft Word, are all
examples of software
Types of software:
- System Software
- Application Software
What is a data?
We talk often about Information - the "I" in ICT. But what is information? How does it differ from "data"?
And what kind of information does a business require? Think of data as a "raw material" - it needs to be
processed before it can be turned into something useful. Hence the need for "Data processing". Data
comes in many forms - numbers, words, symbols. Data relates to transactions, events and facts. Data
consists of Raw and Figures. It does not have any meaning until it is processed and turned into something
useful.
What is Information?
Information is data that has been processed in such a way as to be meaningful to the person who receives it.
Information is organized or classified data which has some meaningful values for the receiver. Information
is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following characteristics:
• Timely - Information should be available when required.
• Accuracy - Information should be accurate.
• Completeness - Information should be complete.
4
CONTEXT: Context can be defined as the data what actually represents.
DATA PROCESSING: The process of converting data into information is called as “Data Processing”.
Data processing is simply the conversion of raw data to meaningful information through a process. Data is
manipulated to produce results that lead to a resolution of a problem or improvement of an existing
situation. Similar to a production process, it follows a cycle where inputs (raw data) are fed to a process
(computer systems, software, etc.) to produce output (information and insights). Generally, organizations
employ computer systems to carry out a series of operations on the data in order to present, interpret, or
obtain information. The process includes activities like data entry, summary, calculation, storage, etc.
Useful and informative output is presented in various appropriate forms such as diagrams, reports,
graphics, etc.
The computer may seem like a very complicated machine, but it basically does four simple tasks: input,
process, store and output. There are five very common terms that are linked to each other. They describe
particular stages in information handling.
They are:
• Input
• Processing
• Output
• Storage
• Feedback
5
INPUT:
Input refers to entering the data into the system. Data can be entered by a variety of methods, for
Example:
a keyboard to manually type in the data
a mouse to select from a list of options
scanning a bar code
using an optical mark reader
PROCESSING:
Processing is the stage where the input data is manipulated in order to produce meaningful information.
Processing can include a number of stages such as sorting, searching, calculations, graphing. The results
obtained from processing the data can then be used in the next stage, called "output".
OUTPUT:
Output is the stage where the information obtained via processing is presented to the user in a suitable
format. Examples of output could include:
- a weather forecast shown as an user-friendly graphic rather than a basic table.
- a printout of student examination results
STORAGE:
Information often needs to be stored on the system for use at a later date. The information might be stored
at any stage in the process, for example:- after the data has been input into the system it might be stored
without any further processing taking place
FEEDBACK:
Feedback is where the output from a system is fed back into the system in order to influence the input.
1.3 OPERATING SYSTEMS AND USER INTERFACE
An operating system is a software program that manages computer resources.
Operating systems allow components to communicate with each other and
enable the computer to run software applications. E.g. Microsoft Windows,
Apple Mac OS X, and Linux
6
Types of Operating System Interfaces
The way in which users communicate with the computer is called an 'interface'. The interface is what we
use to give the computer commands. There are three types of operating system interfaces:
Command Line Interface (CLI)
Graphical User Interface (GUI)
Touch screen Interface (POST WIMP)
Command Line Interface (CLI)
A command line interface is an older style operating system
where users type in commands using keyboard. Command
Line Interfaces do not make use of images, icons or graphics.
Because they do not use graphics they require very little
computer power. There are over 270 different commands that can be entered at the command prompt.
Commands have to be entered precisely without spelling mistakes or else the operating system will return
an error. Remembering commands and the exact way to enter them can be difficult and so Command Line
Interface Operating Systems are considered hard to use. Unix & IBM DOS are examples of CLI
The user can divide the screen into separate areas known as
'windows'. These windows can be anything from folders to
software applications. Windows allow you to work on several
tasks at the same time.
Icons
Icons are 'symbols' or small images / graphics that are used to represent files and commands. Icons can be
clicked to carry out a function or open a file etc. The user operates a mouse to move a pointer over the icon
and then clicks it to activate the function. Icons are also used to represent folders
7
Menus
These allow users to select functions from a list. Each item in the list will perform a different function.
Menus usually either will be 'pop-up' or 'drop-down’.
Pointers
Pointers are little arrows that you move across the screen by directing your mouse. Pointers can be used to:
Select and use icons
Select options found in menus
Reposition folders and icons on the screen.
Touch screen Interfaces
Portable devices such as mobile phones, PDA's and tablets (e.g. iPod)
use interfaces similar to a GUI (WIMP) where icons and menus are used to
input commands. Touch screen technology allows people to use their fingers
to select icons and options straight from the device's screen.
KEY FEATURES OF A TOUCH SCREEN INTERFACE
Pinching - This is where you pinch your fingers together across a touch screen to zoom into an image,
application or document on your device. You can also move your fingers apart to zoom out.
Rotating - This is where you use two fingers - one finger moves up while the other finger moves down the
touch screen to rotate an object.
Swiping - Swiping is where you swipe your finger across the touch screen to scroll through a document or
turn the page.
A Computer is an electronic machine that can solve different problems, process data, store& retrieve data
and perform calculations faster and efficiently than humans”. Many organizations are using computers for
keeping the records of their customers The banks are also providing the facility of online banki ng. The
customers can check their account balance from using the internet. They can also make financial
transaction online. Moreover, the computer is being used in every field of life such as medical, business,
industry, airline and weather forecasting.
Computers come in sizes from tiny to monstrous, in both appearance and power. The size of a computer
that a person or an organization needs depends on the computing requirements. The four basic types of
Computer are as follows:
1) Super computer
2) Mainframe computer
3) Mini computer
4) Macro computer
8
SUPER COMPUTERS:
Astronomers and space scientists use super computers to study the sun and space weather.
Scientists use supercomputers to simulate how a tsunami would impact a coastline or a given city.
Supercomputers are used in space explorations.
Supercomputers are used for designing aircrafts.
Supercomputers are used to model nuclear explosions, limiting the need for real nuclear testing.
They are used in designing robots.
ADVANTAGES:
Solve bigger problems
Run more problems in shorter time
May save money
Allows for virtual testing
Can be used for R&D
DISADVANTAGES:
Can be expensive
Takes up a lot of space
May only be good for specific applications
Does not replace physical testing
Requires trained staff
9
POPULAR SUPERCOMPUTERS
ADVANTAGES
Due to the features listed above, they can be used to do very large jobs which require large
memories and very fast processor time.
They are used in time-sharing systems to allow users to be given a time slice of the very powerful
facilities afforded by a mainframe system.
They are capable of very large number crunching, and so can deal with very complex mathematical
functions (e.g. fractals) which would be very time consuming using, for example, a PC.
10
DISADVANTAGES
Mainframe computers need to be permanently housed in a large room, so cannot be moved around.
They are very expensive to operate and maintain.
POPULAR MAINFRAME COMPUTERS
Fujitsu’s ICL VME, Hitachi’s Z800
MINI COMPUTERS
Mini computers are very popular among medium sized
companies. Mini computers offer facilities for faster
processing of huge information. Mini computers are
used by small businesses & firms. Minicomputers are
also called as “Midrange Computers”.
These computers are not designed for a single user.
Individual departments of a large company or organizations use Mini-computers for specific
purposes. For example, a production department can use Mini-computers for monitoring certain
production process.
Mini computers are used on computer networks. They are larger and powerful than desktop
computers
MICRO COMPUTERS
Desktop computers, laptops, personal digital assistant (PDA),
tablets & smart phones are all types of microcomputers. The
micro-computers are widely used & the fastest growing
computers. These computers are the cheapest among the other
three types of computers. The Micro-computers are specially designed for general usage like
entertainment, education and work purposes. Well known manufacturers of Micro-computer are
Dell, Apple, Samsung, Sony& Toshiba. Desktop computers, Gaming consoles, Sound &
Navigation system of a car, Net books, Notebooks, PDA’s, Tablet PC’s, Smartphone's, Calculators
are all type of Microcomputers.
11
AI is being developed in the following areas:
Biometrics
Biometrics is where parts of a person's body are used for identification purposes. All of these parts of the
human body are unique from person to person and can be used to authenticate identity. Even identical
twins have slightly different fingerprints and voices etc. Before biometric methods can be useful, people
have to perform a process known as 'biometric enrolment'. This is where body-part data such as
fingerprints or voice patterns are captured and stored within the system so that they can be used to identify
the person later on. Biometrics are beginning to be used in place of passwords and physical locks as a
means of security. Biometrics have advantages over these older methods as body parts cannot be lost,
forgotten or stolen as can be the case with passwords and keys.
12
Impacts of Biometrics on everyday life:
13
END OF CHAPTER QUESTIONS
G6_ICT_U1_QB
3) Define Data.
9) Weather forecast shown as an user-friendly graphic rather than a basic table. Comment.
15) Mainframe computers are considered as Multiprocessing System. Explain why with an example.
24) Given are the steps followed when we a Scan a book. . Classify the steps as Input, Process, Output,
Storage and Feedback.
14
(i) Place the page to be scanned in the Scanner.
28) List the various fields where Super Computers are used.
29) List the various fields where Main frame Computers are used.
30) Given are the steps carried out during an ATM transaction. Classify the steps as Input, Process, Output,
Storage and Feedback.
15
G6_ICT_U2
INPUT AND OUTPUT DEVICES
Learning outcome:
Candidate should be able to:
Identify input devices and their uses, e.g. keyboard, mouse and remote.
Identify output devices and their uses, e.g. Monitor & its types , Speakers.
Identify the devices and their uses e.g. Magnetic chip readers , Pin and chip readers.
PERIPHERAL DEVICES:
Peripheral devices are connected to the computer externally.
16
17
2.2 MANUAL INPUT DEVICE
KEYBOARD:
A keyboard is an essential input device that combines a typewriter keyboard with a numeric keypad. The
special purpose keys and the function keys are used to perform a special tasks like pressing Control key
(CTRL) key in combination with “P” prints a document, or pressing the “F2” function key opens a window
with help content about any issue or topic. Nowadays Multimedia keyboards are common as they have task
specific keys & buttons. For example, volume control ext. Wireless keyboards are also popular these days
it can be connected to a tablet or a computer via Bluetooth. An input device is a piece of hardware that is
used to enter data into a computer. The keyboard in most common use is the QWERTY board. Generally
standard keyboard has 104 keys. Ergonomic keyboards have also been developed recently. These are
designed to reduce health-related problems associated with the standard keyboard (e.g. carpal tunnel
syndrome or repetitive strain injury)
Application
The keyboard is used to type text or numbers into a word processor, text editor or other program.
Keyboards are also used for computer gaming, either with regular keyboards or by using special
gaming keyboards, which can expedite frequently used keystroke combinations.
A keyboard is also used to give commands to the operating system of a computer, such as
Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the
machine.
Advantages
Keyboards enable fast entry of new text into a document.
They are a well-tried technology and a well-known method of entry.
User friendly
18
Disadvantages
Users with limited arm/wrist use can find keyboards hard to use.
Entering data using a keyboard is slow when compared to direct data entry (e.g. optical mark
recognition).
Keyboards are fairly large devices that use up valuable desk space.
Types:
Concept Keyboard
Numeric Keypad
Concept Keyboard:
The concept keyboard uses icons or phrases instead of standard letters. These are often used in, for
example, fast food restaurants, offices and shops, where a single key represents an item. For example, the
symbol shown in the photo represents ‘add tax’. The person using the keyboard only needs to touch this
key to calculate the tax on an invoice.
Advantages
Concept keyboards enable fast data entry, as there is no need to type in whole commands.
They are waterproof, which is useful in a restaurant environment.
These keyboards are tamper proof and so are useful in certain applications (e.g. at unmanned
airport information kiosks), preventing people from keying in information which could potentially
corrupt the computer system.
Numeric Keypad:
19
Pointing Devices:
• These devices are used to move an on-screen pointer or cursor (usually an arrow).
• They are commonly used with Graphical User Interfaces (GUIs)
Mouse:
20
Uses
Most home entertainment devices such as a television, satellite
system, DVD player/recorder, hafiz systems, etc. have remote
controls.
Remote controls are also used to control multimedia systems.
They are used in industrial applications to remotely control processes,
stop and start machinery, etc.
Advantages
Remote controls enable devices to be operated from any distance, which is particularly useful
for people with disabilities.
Some chemical processes are hazardous, so it is safer to operate equipment from a distance.
Disadvantages
21
Magnetic stripes are unaffected by oil, water, moisture, etc.
There are no moving parts, so they are physically very robust.
DISADVANTAGES
If the magnetic stripe gets damaged (e.g. due to exposure to a strong magnetic field or excessive
use) the data is lost.
The card needs to be in close contact with the reader, so magnetic stripe readers don’t work at
a distance.
Since the information is not human readable, this can be a disadvantage in some applications.
Chip and PIN readers are similar to smart card readers, but are used at EFTPOS
terminals. The device has a slot into which the card is placed and the chip is read. The
PIN is entered using the keypad. A small screen is also part of the reader, which gives
instructions to the operator.
USES
Chip and PIN readers are used where payments are made using cards (restaurants,
supermarkets, travel agents, etc.).
ADVANTAGES
Chip and PIN readers provide a more secure payment system than requiring a signature or using a
magnetic stripe, since the PIN typed in must match up with PIN stored on chip.
Chip and PIN readers provide a more robust system than magnetic stripe readers, since the chip
does not need to be in contact with the reader.
DISADVANTAGES
Since the customer types in the PIN, they need to be careful that it isn’t read by somebody else, thus giving
an opportunity for fraud.
Output devices are hardware devices that allow data to be output from a computer. Some devices hold the
data temporarily whereas other devices produce permanent output in the form of a hard copy. There is a
third type of output device which is used to control processes in conjunction with sensor input devices
SPEAKERS
22
Uses
Speakers are used to output sound from multimedia presentations.
They are used in home entertainment centers.
They can help blind people (together with speech generation software) through audio output of text
on the screen.
They are used to play downloaded sound files.
23
Uses
TFT monitors are used as the primary output device for computers so the user can see
immediately what they are typing in.
They are an integral part of laptop computers.
Advantages
TFT monitors are lightweight, so do not pose the same risks as CRT monitors.
They produce less glare than CRT monitors and also emit less radiation.
They consume much less power and do not generate as much heat as a CRT monitor.
Disadvantages
The angle of viewing a TFT monitor is fairly critical, with the image appearing unclear when
viewed slightly from the side. This can be an issue if several people are looking at a screen at the
same time.
The definition is sometimes not as good as CRT monitors.
TFT monitors cannot yet be used with light pens, so these monitors cannot be used in CAD if
light pens are used to create and edit drawings.
24
END OF CHAPTER QUESTIONS
G6_ICT_U2_QB
1) Define Input devices and mention the different types of Input devices.
9) Discuss the advantages and disadvantages of each: (I) Mouse (ii) Tracker ball
16) Discuss the advantages and disadvantages of Pin and Chip readers.
25
G6_ICT_U3
LEARNING OUTCOME:
The device that actually holds the data is known as the storage medium (‘media’ is the plural). The device
that saves data onto the storage medium, or reads data from it, is known as the storage device. Any device
that is used to store data is called as Storage device. Sometimes the storage medium is a fixed
(permanent) part of the storage device, e.g. the magnetic coated discs built into a hard drive. Sometimes the
storage medium is removable from the device, e.g. a CD-ROM can be taken out of a CD drive.
Capacity :
The amount of data to be stored/Size of the file
Speed
How quickly the user needs to be able to access the data from the storage device
Portability
Whether the data needs to be moved from one place to another such as from home to School
26
Durability
27
SECONDARY MEMORY:
Secondary Storage Devices are essential as the size of Primary storage or main memory in every computer
is limited. With this, the computer can only accommodate a limited sized program and data. To carry out
big jobs like commercial data processing, it becomes essential that data be held in some expansive form of
storage. This is achieved through secondary storage Devices. It is also called as external storage, and can
hold data either sequentially or at random. You should always keep in in mind that data in secondary
storage devices is not directly accessible and has to be routed through the main storage for processing.
Apart from RAM and ROM all the other storage devices are included in Secondary storage. Examples of
Secondary storage Devices in Computers are: Magnetic tape, Hard disc, Flash drives, SD Cards, CD/DVD-
ROM etc.
28
Backup
Backing up is the process of using the storage device to copy files and data to a
different storage medium in case of a problem with the original copy
29
Businesses backup essential data by…
Making copies of data very regularly
USES:
Secondary storage devices are a very useful component to have.
Different people use them for different purposes, as they are very versatile.
backing up data.
Secondary storage devices are becoming more and more portable as technology progresses.
A very popular use of secondary storage devices has become using them to transport data.
30
or online systems such as booking air tickets or automatic stock control). When updating media which uses
direct access, the new data is written to the next available location and its position is calculated using the
built-in algorithm.
ACCESS SPEEDS:
Some storage devices can access data very quickly, whilst others are extremely slow...
UNITS OF STORAGE
31
3.3 TYPES OF BACKING UP STORAGE MEDIA:
MAGNETIC STORAGE MEDIA :
Magnetic storage media and devices store data in the form of tiny magnetized dots. These dots are created,
read and erased using magnetic fields created by very tiny electromagnets.
The term ‘solid-state’ essentially means ‘no moving parts’. Solid-state storage devices are based on
electronic circuits with no moving parts (no reels of tape, no spinning discs, no laser beams, etc.) Solid-
state storage devices store data using a special type of memory called flash memory. You might wonder
why, since flash memory is non-volatile, normal computers don’t use it instead of RAM. If they did we
would have computers that you could turn off, turn back on again and no data would be lost – it would be
great! The reason is speed – saving data to flash memory is very slow compared to saving it to RAM. If a
32
computer were to use flash memory as a replacement for RAM it would run very slowly. However some
portable computers are starting to use flash memory (in the form of solid-state ‘discs’ as a replacement for
hard-drives. No moving parts mean less to go wrong and longer battery life.
33
END OF CHAPTER QUESTIONS
G6_ICT_U3_QB
1) Explain the term “Storage device”.
10) Explain the different types of accessing stored data with examples.
11) Explain about magnetic storage media with any two examples.
12) Explain why CD-R is considered as a Optical storage medium.
13) Explain about solid state drives with any two examples.
14) Explain the role of RAM in a Computer System.
15) Differentiate between Storage device and Storage medium.
Bit:___________
1 Byte:_________
1 Nibble:_________
1 KB:_________bytes
1 MB:_________KB
1 GB:__________MB
1 TB:__________GB
34
21) Explain the different types of access in a Storage device.
22) Explain how the data is stored in a Magnetic Hard disc.
23) At the end of each day, a company makes a backup of all its data. What is backup?
24) A music video producer uses a computer to edit short movie clips for
advertising music videos. She sends her finished movie clips to stores and
television stations. Explain which storage device she should use.
Floppy disk, Pen drives, Internal Hard disk, Magnetic Hard disk, Compact disc.
26) Explain Flash memory.
30) Why Solid state devices have a higher Access speed? Explain.
35
G6_ICT_U4
COMPUTER NETWORKS
LEARNING OUTCOME
Candidate should be able to:
• Understand the characteristics and purpose of common network environments, such as intranets and
the internet define what the internet and intranet is
• Describe the differences between an intranet and the internet
• Explain the purpose of an intranet and how that differs from the purpose of the internet
• Describe the uses of an intranet
• Describe the uses of the internet
• Define the terms Local Area Network (LAN), Wireless Local Area Network (WLAN) and Wide
Area Network (WAN)
• Describe the differences between a LAN, a WLAN and a WAN.
• List out the Security issues regarding data transfer .
• Describe the security issues surrounding the use of computer networks
4.1 INTRODUCTION:
Most computer systems are now connected together in some way to form what is known as a network.
This ranges from the basic school/home network of only a few computers (often set up to share resources
such as printers or software) to large networks such as the internet which effectively allows any computer
connected to it to communicate with any other computer similarly connected.
A computer network consists of two or more computers or electronic devices such as printers that has been
linked together in order to share data
Network allows users to
Share files
Send emails to each other
Share resource
Computer networks are connected using
Cables
Radio-signals
Telephone lines and satellites
36
37
4.2 TYPES OF NETWORK COMPUTERS:
There are two types of network that makes up a network
Server
Client
SERVER COMPUTER
Server are powerful computers that provides services to the client computers on the network. Servers
controls the network and tells what to do
38
CLIENT COMPUTERS
A client computer is a normal computer(a desktop PC computer or laptop computer. A client computer is
an individual computer that is used to perform everyday tasks to access information and programs from the
server
4.3TYPES OF NETWORK
A local area network (LAN) is usually within one building or certainly not over a large geographical area.
A typical LAN will consist of a number of computers and devices (e.g. printers) which will be connected to
hubs or switches. One of the hubs or switches will usually be connected to a router and modem (usually
broadband) to allow the LAN to connect to the internet; in doing so it then becomes part of a wide area
network (WAN).
39
.
Wireless LANs (WLANs)
WLANs are similar to LANs but there are no wires or cables. In other words, they provide wireless
network communications over fairly short distances (a few meters) using radio or infrared signals instead
of cables. Devices, known as access points (APs), are connected into the wired network at fixed locations
because of the limited range, most commercial WLANs
(e.g. on a college campus or at an airport) need several APs to permit uninterrupted wireless
communications.
40
Wi -Fi:
Wi-Fi refers to any system where it is possible to connect to a network or to a single computer through
wireless communications, for example: on the WLAN described above PDAs and other handheld devices
laptop computers which are Wi-Fi enabled peripheral devices such as printers, keyboards and mouse which
41
can interface with the single computer when fitted with Wi-Fi adapters. Wi-Fi hotspots are places where
you can access Wi-Fi (free or paid). They exist in public places such as airports, hotels and internet cafés.
It is possible to logon to free Wi-Fi hotspots unless they are protected by passwords. Software exists which
can be loaded onto a laptop computer which then searches for non-protected Wi-Fi systems. The practice
of driving around in a car looking for these unsecured Wi-Fi hotspots is known as war driving and poses a
security risk to any unsecured Wi-Fi system.
Bluetooth
Bluetooth is an example of wireless personal area networking (WPAN) technology. Spread spectrum
transmission (radio waves) is used to provide wireless links between mobile phones, computers and other
handheld devices and allow connection to the internet. With this system, it is possible to create a small
home network, for example, to allow communication between any PDA, mobile phone, computer, media
player and printer. The range is, however, quite small (about 10 meters). Examples of its use include the
transfer of photographs from a digital camera to a mobile phone or the transfer of phone details to a
computer. It behaves like a mini-LAN.
42
WIDE AREA NETWORKS
A wide area network (WAN) is basically formed by a number of LANs being connected together through
either a router or a modem. Some companies will set up private WANs (usually by way of fiber optic
cabling or telephone wires restricted to company use only). This is expensive but comes with the advantage
of much enhanced security. It is more
common to use an Internet Service Provider (ISP) for connections to the internet and communicate via
this network system.
43
END OF CHAPTER QUESTIONS
G6_U4_QB
44
45
G6_ICT_U5
EFFECTS OF ICT
Learning outcome:
Candidate should be able to:
46
The Effect of These Devices on Our Lives
Microprocessor-controlled devices mean that we have more leisure time to relax and enjoy ourselves
instead of doing household chores. We are able to communicate with people very easily using computers,
mobile phones, etc. We can become part of online social networks, making friends with people from all
over the world. Computers and Internet connections mean that many of the tasks that involved us leaving
the house, for example, shopping for music, clothes or food, can now be done on-line. Online shopping
gives us more choice of products and saves us time. It is also great from those who are unable to get out
of the house easily, such as the elderly, or the disabled. If we use a computer for many hours (as people
often do at work), there are some health issues that might affect us...
Eye-strain:
One health issue that can occur after using computers for a long time is eye-strain. This is caused by
looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move,
and so get tired and painful. Staring at a computer screen for too long can strain your eyes and cause
headaches.
47
REPETITIVE STRAIN INJURY (RSI) IN WRISTS AND HANDS:
Any repetitive movement (same movement over and over again) can result in a health problem called
repetitive strain injury (RSI). In particular, typing and using a mouse for long periods are common
causes of RSI in the wrist (it is often called carpal-tunnel syndrome).
48
PREVENTIVE MEASURES:
TRAILING CABLES
Plugging too many power cables into a socket can result in the socket being
overloaded, overheating, and a fire starting.
Solution: Never plug too many cables into a socket. Always make sure there are
fire extinguishers nearby.
49
The following are the examples of typical household devices that contain a microprocessor
Computer system
Washing Machines
Alarm system
Heating System
Intelligent Ovens
Intelligent Fridges
50
END OF CHAPTER QUESTIONS
G6_U5_QB
1. Explain the various physical security hazards and the ways to prevent it.
2. List the various causes of RSI.
3. List the ways to prevent RSI.
4. List the various causes of Back and Neck Pain.
5. List the ways to prevent Back and Neck Pain.
6. List the various causes of Eye Strain.
7. List the ways to prevent Eye Strain.
8. What is a Microprocessor?
9. List any 4 examples of household applications that contains Microprocessor.
51
G6_ICT_U6
ICT APPLICATIONS
LEARNING OUTCOME
Candidate should be able to:
• Describe a range of communication applications (e.g. newsletters, websites, multimedia
presentations, music scores, cartoons, flyers and posters)
• Describe the use of mobile phones for communication (e.g. text messaging, phone calls, accessing
the internet)
• Describe how systems are used to manage learner registration and attendance
• Describe how systems can be used to record learner performance
• Describe how systems can be used for organizing examinations, creating timetables and managing
teaching cover/substitution
• Identify areas where booking systems are used (e.g. travel industry, theatre and cinemas)
• Describe the online processing involved in booking tickets
• Discuss the advantages and disadvantages of online booking systems.
• Describe the computer processing involved in Electronic Funds Transfer (EFT)
• Describe the computer processing involved in using automatic teller machines (ATM) (e.g.
withdrawing cash, depositing cash or cheques, checking account balance, mini statements,
mobile/cell phone recharge/top up, bill paying, money transfers, ordering paper-based goods)
• Describe the files used in libraries (e.g. records of books and borrowers)
• Describe the computer processing involved in the issue of books, including the use of direct data
entry methods.
52
PAPER-BASED:
It is always possible to produce presentations in a hardcopy format rather than the system described above.
This has the following advantages:
• Disabled people do not have to go to the venue to see the presentation.
• The recipient can read the presentation at any time they want.
• The recipients have a permanent copy, which they can refer to at any time they want.
There are, however, disadvantages:
• The presentation needs to be distributed in some way.
53
Desktop Publishing
Desktop Publishing (DTP) is a system of software and hardware that allows a user to create and print
documents such as:
Books
Posters
Flyers
Magazine
Newspapers etc...
DTP software is WYSIWYG (What You See Is What You Get - meaning that the document looks the same
on the screen as it will when it's printed). Document layout is produced using 'frames' - areas of the page
that can contain text or images. Text in frames can 'overflow' into other frames. Images can be added from
scanners or digital cameras, then cropped, rotated, resized, etc. Where text and images overlap, text can be
'wrapped' around images. Before DTP was available, if you wanted to produce a printed document, you
would have to pay a professional designer and printer to do the work for you. And, unless you planned to
print thousands of copies of your document, the price was often too expensive. Now, with relatively cheap
DTP software and a good quality laser printer, it is easy for anyone to produce their own posters, etc.
People can now publish documents literally from their own desktop!
NEWSLETTERS:
Newsletters are released regularly and are used to inform people about the areas of interest.
Newsletters are created easily using DTP Software's.
FLYERS AND POSTERS
Flyers and posters can be produced very easily using one of the many
software packages available, most commonly word processors and
desktop publishers (DTP). Usually, the flyer or poster will have photos
which have been taken specially or have been downloaded from the
internet. The following sequence is fairly typical of how such a document would be produced on a
computer system:
A word processor or DTP application
The user creates frames, boxes and text boxes.
If necessary, photos are taken, using a camera.
The images are uploaded from the camera, loaded from a
CD/DVD, scanned from hard-copy photos or downloaded from
the internet.
The photos are saved to a file.
The photos are imported or copied and pasted into the document.
54
The photos are edited and text typed in or imported from a file and then put into the required style.
DIGITAL COMMUNICATION:
Digital communication needs a Computer and a Screen. Digital communication involves creating and
displaying using a Computer screen.
MULTIMEDIA PRESENTATIONS :
Presentations using animation, video and sound/music are generally much more interesting than a
presentation done on slides or paper. The presentations are produced using one of the many software
packages on the market and then used with a multimedia projector so that the whole audience is able to
see the presentation.
WEBSITES :
Rather than producing flyers and posters by printing them out, it is possible
to use websites for advertising and communication. There are a number of
advantages and disadvantages of using this technique.
55
MUSIC PRODUCTION :
The generation of music and the production of music scores can now be done by computer systems with
the appropriate software, for example:
• Music samplers and mixers allow the original tracks
that were recorded in the studio to be modified in any
way that the producer wants
• Electronic instruments (like guitars and organs)
• Can play back through electronic effects machines
• Synthesizers combine simple wave forms to produce
57
SCHOOL ADMINISTRATION: REGISTRATION
Many schools have now moved over to electronic registration. Data from the MIS can be used in the
registration system e.g. student name, form. This saves having to re-enter the data twice and cuts down the
risk of errors, for example if a student changes their name or moves forms. The registration system might
run from the teacher's computer, it might be on a special device used especially for registers. Some schools
are using specialist registration systems which require students to swipe a small plastic card through a
reader. A few schools have introduced biometric registration which uses either the students' fingerprint or a
retinal scan. The registration system can tell office staff which students are at school and which are absent.
Some systems can be set up to send a text or make a phone call to parents to tell them that their child is not
at school. The registration system can be used to analyze attendance perhaps by year group, form or by
individual students. It can help to identify patterns of absence and perhaps flag up potential problems.
58
could follow a link to the pupil's class, and from there a link to the pupil's teacher, and from there a link to
the teacher's other classes, and so on. These connections between sets of data allow complex tasks to easily
be performed such as:
Sending letters to all parents of pupils who scored below 50% in their last English test
Printing personalized timetables for IGCSE pupils (even though they have all chosen different
options)
Monitoring the progress of pupils in multiple subjects, over a number of years
As you can imagine, School Management Systems are pretty complex.
Most systems are based on a complex relational database. The
database contains many tables of data, each table having many
records and many fields. An Example: An example of a part of a
typical school database showing the different data tables, the fields
within each table, and the relationships between the tables:
59
This is a system that manages all of a school's data in a single, integrated application. Having all of the
information in a single system allows schools to more easily connect data together.
These connections between sets of data allow complex tasks to easily be performed such as:
Sending letters to all parents of pupils who scored below 50% in their last English test
Printing personalized timetables for IGCSE pupils
Monitoring the progress of pupils in multiple subjects, over a number of years
As you can imagine, School Management Systems are pretty complex. Most systems are based on a
complex relational database. The database contains many tables of data, each table having many records
and many fields Libraries often contain many thousands of books, magazines, CD-ROMs, etc. Libraries
use computer-based systems to keep a record of their books, and of the people who borrow the books. A
computerized library database allows for:
Quick and easy searching for books
Easy printing out of book lists / labels
Easy tracking of book loans (who has it, when it was borrowed, etc.)
Automatic printing of warning letters for borrowers who have not returned books
60
Borrowers are commonly given library cards that have their details printed on, so that they don't have to
remember their ID. Most cards also have the borrower's ID in the form of a barcode for quick and easy
data input when borrowing books
THE LOANS DATABASE
The loans database has records added to it when someone borrows a book. The loans data base links
together records from the books database and the borrower database. A typical loans database would
contain:
Book ID (number / text)
Borrower ID (number / text)
Date of loan (date)
Due date (date)
6.4 BOOKING SYSTEMS:
Computers are often used to book (reserve) air flights, seats in the
cinema, rooms in a hotel, tables in a restaurant, etc. In all of the above
examples, there are a limited number of items (seats on a plane, rooms
in a hotel, etc.) which need to be allocated. It is very important that any
booking system prevents the same item being booked twice (double-
booking).
SO HOW DO BOOKING SYSTEMS WORK?
If we were talking about a single, small cinema, where you had to
queue up to buy tickets at the front door, the reservation system
would be very simple: We could just use a piece of paper and tick
off seats as they were reserved. However, most booking systems
are much more complex than this. A typical booking system must
cope with booking requests from many different sources, all
arriving at the same time. For example, flights can be booked by customers online, by travel agents in
dozens of different offices, by businesses, etc. How do booking systems manage all these bookings
without making any double-bookings?
61
In the case of a booking system:
The inputs are booking requests
The processing involves checking if bookings are possible, and if so making the bookings
The outputs are booking confirmations / rejections
Because a booking system is real-time, when a booking request arrives, the previous booking has already
been fully processed.
This is what prevents double-booking.
An Example...
Imagine that two people are using an airline's
website to try and book seats on a flight. Both people
try to book seat 38C and the same time. Even though
the booking requests are made at the same time, one
request will be received by the airline's computer just
before the other (since requests come into the system
through a 'queue') This is what happens:
1. Input: Please reserve seat 38C
2. Process: Has seat 38C already been booked? No... so book it
3. Output: Booking confirmed for seat 38C
4. Input: Please reserve seat 38C
5. Process: Has seat 38C already been booked? Yes!
6. Output: Booking rejected
You can see that the first input is fully processed before the next one.
So seat 38C doesn't get booked twice.
62
Field Value
Record ID 1229900
Seat ID 1A
Date 2/4/2012
Start time 19:30
End time 23:00
Booked YES
Customer ID Jones123
With the rise of the internet, online booking systems have become commonplace. They are all interactive
web sites because they have to update the master database whenever a booking is made. A typical web site
is shown for booking a hotel room: There are a number of interactive elements in this booking screen. For
example, clicking the little pink box next to the date box caused a calendar to expand on the screen so you
can click on the check-in date and check-out date. This is an excellent way to enter dates into a database
because the customer does not have to care about the date format. You can see that a drop-down box is
used for the number of nights needed. A small crossed box in the 'rooms and travelers' section invites you
to change the detail if you want to. A well-designed online booking web site is very easy to use because it
is obvious how it works. A poorly designed web site is much more difficult to use.
Field Value
Holiday ID 12889
All-inclusive,
Description 'Albanos Hotel' in
Algarve
Number of nights 10
Start date 15/4/2011
Current slots
157
available
63
MULTI-USER BOOKING SYSTEM
Some travel agencies have branches all over the country. And yet they will all by trying to book the same
package holidays and travel arrangement for their customers. There must not be over -booking or double
booking. This is only possible because there is a central database held in the main headquarters and every
branch has a set of terminals connecting remotely to it. This is called a multi-user system As soon as a
branch makes a booking, the central record is updated. For example, consider there are 300 slots available
for a particular package holiday. The agencies have been busy and the holiday package is selling fast. The
database record at one point in time may look like this: Every time a booking is made, the current slots
available is by 1 until no more are left. There will of course be records in other tables within the database
storing the details of every customer.
64
END OF CHAPTER QUESTIONS
G6_U6_QB
65
G6_ICT_U7
SAFETY AND SECURITY
LEARNING OUTCOMES
Discuss why e-safety is needed
Describe measures which should be taken when playing games on the internet (e.g. not using real
names).
Define the term hacking and describe it's effects
Explain what is meant by the term hacking and the measure that must be taken in order to protect
data
Define the terms: phishing, pharming, smishing
Describe the methods which can be used to help prevent phishing, pharming and smishing
66
Understanding e-safety can help protect us from online dangers
How can use the internet safely?
7.2 Hacking
Hacking is where people access computer system without permission. These people are known as
“Hackers”. Most of the time, hackers will try to access the computer system using the internet. Hackers
will usually try to break into the system by simply guessing the password or by using a Key Logger
A Key logger is a special type of software that is secretly sent to the computer system and then logs every
key press that users of the system make. The Key Press log is sent back to the hacker who then looks
through the log for the username and passwords which they can use to hack into the system
The following are the reasons why people try to hack into the computer system
To cause damage to files or data by deleting or changing them
To commit fraud by stealing data
To access sensitive information
To simple see if they are clever enough to beat the systems security
Effects Of Hacking
Identity Theft
Theft of money
Stealing of customer information
Stealing email addresses
Loss of important information
67
7.3 SECURITY ISSUES:
There are other security risks (not necessarily as a result of viruses or hacking) associated with connecting
to the internet. These security risks are now discussed in some depth.
Phishing
Phishing is a fraudulent operation involving the use of emails. The creator sends out a legitimate-looking
email, hoping to gather personal and financial information from the recipient of the email. As soon as an
unsuspecting user clicks on the link they are sent to a spoof website where they will be asked for personal
information including credit card details, PINs, etc. which could lead to identity theft.
Pharming
Pharming is a scam in which malicious code is installed on a computer hard disk or a server. This code
has the ability to misdirect users to fraudulent websites, usually without their knowledge or consent.
Whereas phishing requires an email to be sent out to every person who has been targeted, Pharming does
not require emails to be sent out to everybody and can therefore target a much larger group of people much
more easily. Certain anti-spyware, anti-virus software or anti-Pharming software can be used to identify
this code and correct the corruption.
Smishing(SMS Phising)
Smishing is same as phishing except the fraudulent messages are sent via text messages(SMS) rather than
Emails
Spam
Spam is electronic junk mail and is a type of advertising from a company sent out to a target mailing list.
It is usually harmless but it can clog up the networks, slowing them down, or fill up a user’s mail box. It is
therefore more of a nuisance than a security risk.
68
END OF CHAPTER QUESTIONS
G6_U7_QB
69
THE INDIAN PUBLIC SCHOOL
LIBRARY BOOK ISSUE
Student
Issue Return Librarian
Name of the Student ID No Section sign
Date Date sign
THE INDIAN PUBLIC SCHOOL
LIBRARY BOOK ISSUE
Student
Issue Return Librarian
Name of the Student ID No Section sign
Date Date sign