0% found this document useful (0 votes)
30 views76 pages

Grade 6 ICT Binder

ICT Binder

Uploaded by

akilanramesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views76 pages

Grade 6 ICT Binder

ICT Binder

Uploaded by

akilanramesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

INFORMATION AND

COMMUNICATION
TECHNOLOGY
Course Book

LEVEL VI
Contents
S.No. Topic Page No
UNIT 1 : TYPES AND COMPONENTS OF COMPUTER SYSTEM

1.1 HARDWARE AND SOFTWARE 3

1.2 COMPUTER OPERATIONS 4

1.3 OPERATING SYSTEM AND USER INTERFACE 6

1.4 TYPES OF COMPUTERS 8

1.5 IMPACTS OF AI AND BIOMETRICS 12

END OF CHAPTER QUESTIONS 14

UNIT 2 : INPUT AND OUTPUT DEVICES

2.1 INPUT DEVICE 16

2.2 MANUAL INPUT DEVICE 17

2.3 DIRECT INPUT DEVICE 20

2.4 OUTPUT DEVICE 21

2.5 TYPES OF MONITOR 22

END OF CHAPTER QUESTIONS 24

UNIT 3 : STORAGE DEVICE AND MEDIA

3.1 STORAGE DEVICES 25

3.2 TYPES OF ACCESS 29

3.3 TYPES OF BACKUP STORAGE MEDIA 31

END OF CHAPTER QUESTIONS 34

UNIT 4 : NETWORKS

4.1 NETWORKS 35

4.2 TYPES OF NETWORK COMPUTERS 37

4.3 TYPES OF NETWORK 38

END OF CHAPTER QUESTIONS 43

UNIT 5 : EFFECTS OF USING ICT

5.1 HEALTH EFFECTS OF ICT 44

5.2 PHYSICAL SAFETY 46

5.3 MICROPROCESSOR CONTROLLED APPLICATIONS 47

END OF CHAPTER QUESTIONS 49


S.No. Topic Page No
UNIT 6 : ICT APPLICATIONS

6.1 COMMUNICATION APPLICATIONS 50

6.2 SCHOOL MANAGEMENT APPLICATIONS 55

6.3 LIBRARY MANAGEMENT APPLICATIONS 57

6.4 BOOKING SYSTEMS 59

QB END OF CHAPTER QUESTIONS 63

UNIT 7 : SAFETY AND SECURITY

7.1 E SAFETY
-

64

7.2 HACKING 65

7.3 SECURITY ISSUES 66

END OF CHAPTER QUESTIONS 67


G6_ICT_U1

TYPES AND COMPONENT OF COMPUTER SYSTEM

Learning Outcome:

Candidate should be able to:

 Define hardware as consisting of physical components of a computer system


 Define software as programs for controlling the operation of a computer or processing of electronic
data
 Explain the basic computer functions (input, output, process, storage and feedback).
 Explain about the input-process-output cycle.
 List out the different types of computer.
 Describe about mainframe computer and its features.
 Describe about super computer and its features.
 List out the uses of mainframe and super computers.
 Describe the advantages and disadvantages of each type of computer in comparison with the others

1.1 HARDWARE AND SOFTWARE:


Computer systems are now common place in every part of our daily life. Comparing books with computers
is a good analogy: the actual pages and the ink used on the pages are equivalent to the hardware used to
make up these computers; the words written on these pages are equivalent to the software. Without the
words, the book is useless. Similarly, without software, computers would be of little use to any of us.
Hardware is a general term for the physical components that make up a computer system, for example
keyboard, mouse, monitor, processor, circuit board and so on. Software is a general term for the
programs that control the computer system.

HARDWARE:
Hardware is the physical parts of the computer system – the parts
that you can touch and see. A motherboard, a CPU, a keyboard and
a monitor are all items of hardware. Hardware represents the
physical components of a computer - the components that can be
seen and touched.
Types of Hardware:

 External hardware devices


 Internal hardware devices

3
SOFTWARE:
Software is a collection of instructions that can be ‘run’ on a computer.
These instructions tell the computer what to do. Software is not a physical
thing (but it can of course be stored on a physical medium such as a
CDROM), it is just a bunch of codes. An operating system such as
Windows XP or Mac OS X, applications such as Microsoft Word, are all
examples of software
Types of software:

- System Software
- Application Software

1.2 COMPUTER OPERATIONS:

What is a data?

We talk often about Information - the "I" in ICT. But what is information? How does it differ from "data"?
And what kind of information does a business require? Think of data as a "raw material" - it needs to be
processed before it can be turned into something useful. Hence the need for "Data processing". Data
comes in many forms - numbers, words, symbols. Data relates to transactions, events and facts. Data
consists of Raw and Figures. It does not have any meaning until it is processed and turned into something
useful.
What is Information?
Information is data that has been processed in such a way as to be meaningful to the person who receives it.
Information is organized or classified data which has some meaningful values for the receiver. Information
is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following characteristics:
• Timely - Information should be available when required.
• Accuracy - Information should be accurate.
• Completeness - Information should be complete.

INFORMATION = DATA + CONTEXT + MEANING

4
CONTEXT: Context can be defined as the data what actually represents.

DATA PROCESSING: The process of converting data into information is called as “Data Processing”.
Data processing is simply the conversion of raw data to meaningful information through a process. Data is
manipulated to produce results that lead to a resolution of a problem or improvement of an existing
situation. Similar to a production process, it follows a cycle where inputs (raw data) are fed to a process
(computer systems, software, etc.) to produce output (information and insights). Generally, organizations
employ computer systems to carry out a series of operations on the data in order to present, interpret, or
obtain information. The process includes activities like data entry, summary, calculation, storage, etc.
Useful and informative output is presented in various appropriate forms such as diagrams, reports,
graphics, etc.

INPUT – PROCESS – OUTPUT CYCLE:

The computer may seem like a very complicated machine, but it basically does four simple tasks: input,
process, store and output. There are five very common terms that are linked to each other. They describe
particular stages in information handling.
They are:
• Input
• Processing
• Output
• Storage
• Feedback

5
INPUT:
Input refers to entering the data into the system. Data can be entered by a variety of methods, for
Example:
 a keyboard to manually type in the data
 a mouse to select from a list of options
 scanning a bar code
 using an optical mark reader
PROCESSING:
Processing is the stage where the input data is manipulated in order to produce meaningful information.
Processing can include a number of stages such as sorting, searching, calculations, graphing. The results
obtained from processing the data can then be used in the next stage, called "output".
OUTPUT:
Output is the stage where the information obtained via processing is presented to the user in a suitable
format. Examples of output could include:
- a weather forecast shown as an user-friendly graphic rather than a basic table.
- a printout of student examination results
STORAGE:
Information often needs to be stored on the system for use at a later date. The information might be stored
at any stage in the process, for example:- after the data has been input into the system it might be stored
without any further processing taking place
FEEDBACK:
Feedback is where the output from a system is fed back into the system in order to influence the input.
1.3 OPERATING SYSTEMS AND USER INTERFACE
An operating system is a software program that manages computer resources.
Operating systems allow components to communicate with each other and
enable the computer to run software applications. E.g. Microsoft Windows,
Apple Mac OS X, and Linux

6
Types of Operating System Interfaces
The way in which users communicate with the computer is called an 'interface'. The interface is what we
use to give the computer commands. There are three types of operating system interfaces:
 Command Line Interface (CLI)
 Graphical User Interface (GUI)
 Touch screen Interface (POST WIMP)
Command Line Interface (CLI)
A command line interface is an older style operating system
where users type in commands using keyboard. Command
Line Interfaces do not make use of images, icons or graphics.
Because they do not use graphics they require very little
computer power. There are over 270 different commands that can be entered at the command prompt.
Commands have to be entered precisely without spelling mistakes or else the operating system will return
an error. Remembering commands and the exact way to enter them can be difficult and so Command Line
Interface Operating Systems are considered hard to use. Unix & IBM DOS are examples of CLI

Graphical User Interface (GUI)


GUI's are visual (graphical) interfaces and they are more popular than CLI's because they are very easy to
use. The graphics need more computer power. Instead of typing in commands, the user can use a mouse to
point and click objects on the screen. GUIs allow the user to interact with a computer (or MP3 player,
gaming device., mobile phone) using pictures or symbols (icons) rather than having to type in a number of
commands.
The main features of a GUI are Windows, Icons, Menus and Pointers (WIMP)
Windows

The user can divide the screen into separate areas known as
'windows'. These windows can be anything from folders to
software applications. Windows allow you to work on several
tasks at the same time.
Icons
Icons are 'symbols' or small images / graphics that are used to represent files and commands. Icons can be
clicked to carry out a function or open a file etc. The user operates a mouse to move a pointer over the icon
and then clicks it to activate the function. Icons are also used to represent folders

7
Menus
These allow users to select functions from a list. Each item in the list will perform a different function.
Menus usually either will be 'pop-up' or 'drop-down’.
Pointers
Pointers are little arrows that you move across the screen by directing your mouse. Pointers can be used to:
 Select and use icons
 Select options found in menus
 Reposition folders and icons on the screen.
Touch screen Interfaces
Portable devices such as mobile phones, PDA's and tablets (e.g. iPod)
use interfaces similar to a GUI (WIMP) where icons and menus are used to
input commands. Touch screen technology allows people to use their fingers
to select icons and options straight from the device's screen.
KEY FEATURES OF A TOUCH SCREEN INTERFACE
Pinching - This is where you pinch your fingers together across a touch screen to zoom into an image,
application or document on your device. You can also move your fingers apart to zoom out.
Rotating - This is where you use two fingers - one finger moves up while the other finger moves down the
touch screen to rotate an object.
Swiping - Swiping is where you swipe your finger across the touch screen to scroll through a document or
turn the page.

1.4 Types of Computer

A Computer is an electronic machine that can solve different problems, process data, store& retrieve data
and perform calculations faster and efficiently than humans”. Many organizations are using computers for
keeping the records of their customers The banks are also providing the facility of online banki ng. The
customers can check their account balance from using the internet. They can also make financial
transaction online. Moreover, the computer is being used in every field of life such as medical, business,
industry, airline and weather forecasting.
Computers come in sizes from tiny to monstrous, in both appearance and power. The size of a computer
that a person or an organization needs depends on the computing requirements. The four basic types of
Computer are as follows:

1) Super computer
2) Mainframe computer
3) Mini computer
4) Macro computer

8
SUPER COMPUTERS:

The most powerful computers in terms of performance and


data processing are the Supercomputers. These computers
are used for research and exploration purposes, like NASA
uses supercomputers for launching space shuttles,
controlling them and for space exploration purpose. It can
solve the very difficult and complex problems within a
nana seconds. It is multi-user, multiprocessor large
computer with a very high efficiency and storing capacity. A number of RISC (Reduced Instruction Set
Computer) processors are used. It is used to forecast the weather and global climates, and is also used in
military research and defense systems. They are also used in astronomy, automobile design, aircraft design,
robot design, nuclear physics and oil exploration. The supercomputers are very expensive and very large in
size. It can be accommodated in large air-conditioned rooms; some super computers can span an entire
building. They are used for solving very large and complex problems. Climate researchers use
supercomputers to forecast weather.
USES:

 Astronomers and space scientists use super computers to study the sun and space weather.
 Scientists use supercomputers to simulate how a tsunami would impact a coastline or a given city.
 Supercomputers are used in space explorations.
 Supercomputers are used for designing aircrafts.
 Supercomputers are used to model nuclear explosions, limiting the need for real nuclear testing.
 They are used in designing robots.

ADVANTAGES:
 Solve bigger problems
 Run more problems in shorter time
 May save money
 Allows for virtual testing
 Can be used for R&D
DISADVANTAGES:
 Can be expensive
 Takes up a lot of space
 May only be good for specific applications
 Does not replace physical testing
 Requires trained staff
9
POPULAR SUPERCOMPUTERS

 IBM’s Sequoia, in United States


 Fujitsu’s K Computer in Japan
 IBM’s Mira in United States
MAIN FRAME COMPUTERS:
Mainframe is very large in size and is an expensive computer
capable of supporting hundreds or even thousands of users
simultaneously. Mainframe executes many programs
concurrently and supports many simultaneous execution of
programs. The Mainframe computers can be accommodated
in large air-conditioned rooms because of its size. Super-
computers are the fastest computers with large data storage capacity, Mainframes can also process & store
large amount of data.
Banks educational institutions & insurance companies use mainframe computers to store data about their
customers, students & insurance policy holders. Mainframe computer is a term used for a large, very
powerful, computer system. The name comes from the days when the individual components were housed
in large (often room-sized) frames.
USES
Their main purpose is to run commercial applications, such as banking and insurance, where huge amounts
of data need to be processed each day. The main features of main frame computers are as follows.
 They can have several CPUs.
 They have very fast processor speeds.
 They can support multiple operating systems.
 They have huge amounts of storage capacity.
 They have huge internal memories (e.g. several hundred GB of RAM).
 They often operate using time sharing or batch processing.

ADVANTAGES
 Due to the features listed above, they can be used to do very large jobs which require large
memories and very fast processor time.
 They are used in time-sharing systems to allow users to be given a time slice of the very powerful
facilities afforded by a mainframe system.
 They are capable of very large number crunching, and so can deal with very complex mathematical
functions (e.g. fractals) which would be very time consuming using, for example, a PC.

10
DISADVANTAGES
 Mainframe computers need to be permanently housed in a large room, so cannot be moved around.
 They are very expensive to operate and maintain.
POPULAR MAINFRAME COMPUTERS
 Fujitsu’s ICL VME, Hitachi’s Z800
MINI COMPUTERS
 Mini computers are very popular among medium sized
companies. Mini computers offer facilities for faster
processing of huge information. Mini computers are
used by small businesses & firms. Minicomputers are
also called as “Midrange Computers”.
 These computers are not designed for a single user.
Individual departments of a large company or organizations use Mini-computers for specific
purposes. For example, a production department can use Mini-computers for monitoring certain
production process.
 Mini computers are used on computer networks. They are larger and powerful than desktop
computers
MICRO COMPUTERS
 Desktop computers, laptops, personal digital assistant (PDA),
tablets & smart phones are all types of microcomputers. The
micro-computers are widely used & the fastest growing
computers. These computers are the cheapest among the other
three types of computers. The Micro-computers are specially designed for general usage like
entertainment, education and work purposes. Well known manufacturers of Micro-computer are
Dell, Apple, Samsung, Sony& Toshiba. Desktop computers, Gaming consoles, Sound &
Navigation system of a car, Net books, Notebooks, PDA’s, Tablet PC’s, Smartphone's, Calculators
are all type of Microcomputers.

1.5 IMPACTS OF AI AND BIOMETRICS


Artificial Intelligence (AI)
This is a computer science that is focused on creating computer systems that simulate human
intelligence. The term was first used in 1956 by a computer scientist at the Massachusetts Institute of
Technology (MIT) who was focused on trying to make computers behave like humans.

11
AI is being developed in the following areas:

Impacts of AI on everyday life

Biometrics
Biometrics is where parts of a person's body are used for identification purposes. All of these parts of the
human body are unique from person to person and can be used to authenticate identity. Even identical
twins have slightly different fingerprints and voices etc. Before biometric methods can be useful, people
have to perform a process known as 'biometric enrolment'. This is where body-part data such as
fingerprints or voice patterns are captured and stored within the system so that they can be used to identify
the person later on. Biometrics are beginning to be used in place of passwords and physical locks as a
means of security. Biometrics have advantages over these older methods as body parts cannot be lost,
forgotten or stolen as can be the case with passwords and keys.
12
Impacts of Biometrics on everyday life:

13
END OF CHAPTER QUESTIONS

G6_ICT_U1_QB

1) List the basic functions of a Computer system.

2) Explain the following:

a) Input Unit b) Control Unit c) ALU d) Memory Unit e) Output Unit

3) Define Data.

4) Define Information and explain the characteristics of Information.

5) Define Data Processing.

6) Give an example for Data processing.

7) Explain the IPO Cycle with a neat diagram.

8) List the various method to Input data.

9) Weather forecast shown as an user-friendly graphic rather than a basic table. Comment.

10) Give an example for IPO Cycle.

11) List any 5 types of Computers.

12) Explain the following: a) Multiprocessing b) Multitasking

13) Explain about Mainframe Computers.

14) Explain the uses of Mainframe Computers.

15) Mainframe computers are considered as Multiprocessing System. Explain why with an example.

16) List any 5 features of Mainframe Computers.

17) Explain the advantages and disadvantages of Mainframe Computers.

18) Define Time Sharing System.

19) Explain about Super Computers.

20) Explain the uses of Super Computers.

21) List any 5 features of Super Computers.

22) Explain the advantages and disadvantages of Super Computers.

23) Give any 2 examples for Mainframe and Super Computers.

24) Given are the steps followed when we a Scan a book. . Classify the steps as Input, Process, Output,
Storage and Feedback.

14
(i) Place the page to be scanned in the Scanner.

(ii) Scanned copy is seen in the Monitor.

(iii) Making changes to the Scanned copy.

(iv) Taking Print out of the file.

(v) Saving the file for future use.

25) Information often needs to be stored on the system. Explain why.

26) What is the purpose of Feedback?

27) Differentiate between Output and Feedback.

28) List the various fields where Super Computers are used.

29) List the various fields where Main frame Computers are used.

30) Given are the steps carried out during an ATM transaction. Classify the steps as Input, Process, Output,
Storage and Feedback.

(i) Inserting the ATM card. (ii) Choosing the Language

(iii) Entering the PIN. (iv) Selecting a service.

(v) Entering the Amount. (vi) Getting “Insufficient funds” as a message.

(vii) Getting the message “Your transaction being processed…Please wait”.

(viii) Collecting the money. (ix) Reviewing the Balance Amount.

(x) Getting a Print out of the Transaction Slip.

31)What is artificial intelligence. List the impacts of Artificial Intelligence

32)List the impacts of Biometrics.

15
G6_ICT_U2
INPUT AND OUTPUT DEVICES

Learning outcome:
Candidate should be able to:

 Identify input devices and their uses, e.g. keyboard, mouse and remote.

 Identify output devices and their uses, e.g. Monitor & its types , Speakers.

 Identify the devices and their uses e.g. Magnetic chip readers , Pin and chip readers.

PERIPHERAL DEVICES:
 Peripheral devices are connected to the computer externally.

 These devices are used for performing some specific functions.

Peripheral devices are as follows:


1. Input Devices
2. Output Devices

2.1 INPUT DEVICES


As the name suggests, input devices are hardware devices that allow data to be input into a computer. Input
devices accept data and instructions from the user. Input device translates words, sounds images, and
actions that people understand into symbols that the system unit can process". Input devices include
keyboards, Mouse, digital Camera and light pen."An input device is a hardware device that is used to
provide input (data / instructions) to a computer so that it can be processed". Besides the widely used
input devices like keyboard & Mice there are other different input devices that perform various input
operations like a scanner scan images / documents.
An input device is a piece of hardware that is used to enter data into a computer.

Types of input device:

 Manual Input Device

 Direct Input Device

16
17
2.2 MANUAL INPUT DEVICE

KEYBOARD:

A keyboard is an essential input device that combines a typewriter keyboard with a numeric keypad. The
special purpose keys and the function keys are used to perform a special tasks like pressing Control key
(CTRL) key in combination with “P” prints a document, or pressing the “F2” function key opens a window
with help content about any issue or topic. Nowadays Multimedia keyboards are common as they have task
specific keys & buttons. For example, volume control ext. Wireless keyboards are also popular these days
it can be connected to a tablet or a computer via Bluetooth. An input device is a piece of hardware that is
used to enter data into a computer. The keyboard in most common use is the QWERTY board. Generally
standard keyboard has 104 keys. Ergonomic keyboards have also been developed recently. These are
designed to reduce health-related problems associated with the standard keyboard (e.g. carpal tunnel
syndrome or repetitive strain injury)

Arranged into various sections:


 Alphabet Keys ( A,B,C….Z)
 Numbers ( 0,1,2….9)
 Functional Keys ( F1,F2,…. F12)
 Arrow Keys
 Special keys (Alt, Ctrl, Delete, Insert, PrntScr, CapsLock etc)

Application

 The keyboard is used to type text or numbers into a word processor, text editor or other program.
 Keyboards are also used for computer gaming, either with regular keyboards or by using special
gaming keyboards, which can expedite frequently used keystroke combinations.
 A keyboard is also used to give commands to the operating system of a computer, such as
Windows' Control-Alt-Delete combination, which brings up a task window or shuts down the
machine.

Advantages
 Keyboards enable fast entry of new text into a document.
 They are a well-tried technology and a well-known method of entry.
 User friendly

18
Disadvantages
 Users with limited arm/wrist use can find keyboards hard to use.
 Entering data using a keyboard is slow when compared to direct data entry (e.g. optical mark
recognition).
 Keyboards are fairly large devices that use up valuable desk space.

Types:
 Concept Keyboard

 Numeric Keypad

Concept Keyboard:
The concept keyboard uses icons or phrases instead of standard letters. These are often used in, for
example, fast food restaurants, offices and shops, where a single key represents an item. For example, the
symbol shown in the photo represents ‘add tax’. The person using the keyboard only needs to touch this
key to calculate the tax on an invoice.
Advantages
 Concept keyboards enable fast data entry, as there is no need to type in whole commands.
 They are waterproof, which is useful in a restaurant environment.
 These keyboards are tamper proof and so are useful in certain applications (e.g. at unmanned
airport information kiosks), preventing people from keying in information which could potentially
corrupt the computer system.
Numeric Keypad:

A small keyboard that only has numbers. It is used to enter


numeric data into computers such as those in ATMs. Most
computer keyboards have a numeric keypad on the right side, and most mobile phones (there are also
computers) have alone for entering phone numbers, etc.
Advantages
• Numeric keypads are faster than standard keyboards for entry of numeric data.
• Since many are small devices (e.g. mobile phones), they are very easy to carry around.
Disadvantages
• They can be difficult to use, due to very small keys.
• It is difficult to use them for entering text.
• Sometimes the order of the numbers on the keypad isn’t intuitive.

19
Pointing Devices:
• These devices are used to move an on-screen pointer or cursor (usually an arrow).
• They are commonly used with Graphical User Interfaces (GUIs)

Types of Pointing Device


 Mouse
 Tracker Ball
 Touch Pad

Mouse:

Mouse is most popular pointing device. It is a famous cursor-control device having


a small palm size box with a round ball at its base which senses the movement of
mouse and sends corresponding signals to CPU when the mouse buttons are
pressed. It has two buttons called left and right button and a wheel is present
between the buttons. Mouse can be used to control the position of cursor on screen, but it cannot be used to
enter text into the computer.
Uses
 Mouse can be used for opening, closing and minimizing software.
 They are very useful when editing images
 Mouse are used for controlling the position of a pointer on the screen.
Advantages
 It can be faster to select an option using a mouse rather than a keyboard.

 Mouse enable rapid navigation through applications and the INTERNET.

 Mouse are small and so take up little area.


Disadvantages
 People with restricted hand/wrist movement can find it hard to operate a mouse.
 Mouse are easily damaged and the older type of mouse also quickly becomes clogged up with
dirt.
 They are difficult to use if there is no flat surface readily available.
REMOTE CONTROLS:

A remote control is used to control the operation of other devices remotely by


using infrared signals. The buttons on the keypad are used to select options (such
as television stations, sound levels on a hafiz, timings on a DVD recorder, etc.).

20
Uses
 Most home entertainment devices such as a television, satellite
system, DVD player/recorder, hafiz systems, etc. have remote
controls.
 Remote controls are also used to control multimedia systems.
 They are used in industrial applications to remotely control processes,
stop and start machinery, etc.

Advantages
 Remote controls enable devices to be operated from any distance, which is particularly useful
for people with disabilities.
 Some chemical processes are hazardous, so it is safer to operate equipment from a distance.
Disadvantages

 People with limited hand/wrist movement can


find them hard to use.
 The signal between the control and the device can be
easily blocked.

2.3 DIRECT INPUT DEVICES


MAGNETIC STRIPE READERS
These are used to read information on the magnetic stripe found, for example, on the back of a credit card .
The stripe contains useful information, such as the account number, sort code, expiry date and start date.
USES
 Credit and debit cards have magnetic stripes that are used by ATMs
 Security cards for entry to buildings, hotel rooms, etc. use magnetic stripes.

 Travel systems use magnetic stripes.


ADVANTAGES
 Data entry is faster compared with keying in using a keyboard or keypad.
 The system is error free, since no typing is involved.
 The information held on the magnetic stripe is secure: because it cannot be read directly by a
person; and, since there is no typing, there is not the risk of somebody observing your key
strokes.
 They can prevent access to restricted/secure areas.

21
 Magnetic stripes are unaffected by oil, water, moisture, etc.
 There are no moving parts, so they are physically very robust.
DISADVANTAGES
 If the magnetic stripe gets damaged (e.g. due to exposure to a strong magnetic field or excessive
use) the data is lost.
 The card needs to be in close contact with the reader, so magnetic stripe readers don’t work at
a distance.
 Since the information is not human readable, this can be a disadvantage in some applications.

CHIP AND PIN READERS

Chip and PIN readers are similar to smart card readers, but are used at EFTPOS
terminals. The device has a slot into which the card is placed and the chip is read. The
PIN is entered using the keypad. A small screen is also part of the reader, which gives
instructions to the operator.
USES
Chip and PIN readers are used where payments are made using cards (restaurants,
supermarkets, travel agents, etc.).
ADVANTAGES
 Chip and PIN readers provide a more secure payment system than requiring a signature or using a
magnetic stripe, since the PIN typed in must match up with PIN stored on chip.
 Chip and PIN readers provide a more robust system than magnetic stripe readers, since the chip
does not need to be in contact with the reader.
DISADVANTAGES
Since the customer types in the PIN, they need to be careful that it isn’t read by somebody else, thus giving
an opportunity for fraud.

2.4 OUTPUT DEVICES:

Output devices are hardware devices that allow data to be output from a computer. Some devices hold the
data temporarily whereas other devices produce permanent output in the form of a hard copy. There is a
third type of output device which is used to control processes in conjunction with sensor input devices
SPEAKERS

Speakers can be connected directly to a computer or are built in feature in a laptop


Digital data from the computer is converted into analogue form, using a digital to
analogue converter (DAC). The signal is then amplified through the speakers.

22
Uses
 Speakers are used to output sound from multimedia presentations.
 They are used in home entertainment centers.
 They can help blind people (together with speech generation software) through audio output of text
on the screen.
 They are used to play downloaded sound files.

2.5 TYPES OF MONITOR


CRT MONITORS:
CRT monitors are the least expensive type of monitor. They come in various
sizes. They use an electron gun to fire against a phosphor screen, which
creates a picture that is made up of tiny dots. Each dot is colored red, green
or blue – the intensity of each colored dot makes up the vast range of colors
interpreted by the eye.
Uses
 CRT monitors are used as the primary output device for computers so the user can see immediately
what they are typing in.
 They are used with light pens, for example to allow designs to be created on screen.
Advantages
 CRT monitors still produce a higher quality image than TFT monitors.
 The angle of viewing is still better than with a TFT monitor.
 They work with light pens.
Disadvantages
 CRT monitors tend to be rather heavy and are a weight hazard if not supported properly.
 They run very hot and can cause fires if left unattended
 They consume considerably more power than the modern TFT monitors.
 They can flicker, which can lead to headaches and eyesight problems with prolonged use.
TFT MONITORS
TFT monitors are taking over from CRT monitors as the main output device.
One of the reasons for the rapid development of laptop computers can be
attributed to the advancements made in TFT technology. The screen is made
up of thousands of tiny pixels, which are made up of transistors controlled by
a microprocessor. Each pixel has three transistors, colored red, green or blue;
the intensity of each governs the effective color of the pixel seen by the eye.

23
Uses
 TFT monitors are used as the primary output device for computers so the user can see
immediately what they are typing in.
 They are an integral part of laptop computers.
Advantages
 TFT monitors are lightweight, so do not pose the same risks as CRT monitors.
 They produce less glare than CRT monitors and also emit less radiation.
 They consume much less power and do not generate as much heat as a CRT monitor.
Disadvantages
 The angle of viewing a TFT monitor is fairly critical, with the image appearing unclear when
viewed slightly from the side. This can be an issue if several people are looking at a screen at the
same time.
 The definition is sometimes not as good as CRT monitors.
 TFT monitors cannot yet be used with light pens, so these monitors cannot be used in CAD if
light pens are used to create and edit drawings.

24
END OF CHAPTER QUESTIONS
G6_ICT_U2_QB
1) Define Input devices and mention the different types of Input devices.

2) Differentiate between manual and direct Input devices.

3) List any 5 examples of Manual Input devices.

4) List any 3 examples of Direct Input devices.

5) Explain the uses of Keyboards.

6) Explain the different sections in a Keyboard.

7) Why there is a need of ergonomic keyboards?

8) Explain Pointing devices.

9) Discuss the advantages and disadvantages of each: (I) Mouse (ii) Tracker ball

(iii) Track pad

10) List any three uses of joysticks.

11) Define Output devices.

12) Explain the different types of monitors.

13) Compare and Contrast LCD and LED.

14) Explain the uses of Magnetic stripe readers.

15) Discuss the advantages and disadvantages of Magnetic Stripe readers.

16) Discuss the advantages and disadvantages of Pin and Chip readers.

17) List the uses of Speakers.

18) List the uses of Headphones.

19) Explain about Sensors.

20) Explain any three sensors present in a Smart Phone.

25
G6_ICT_U3

STORAGE DEVICES AND MEDIA

LEARNING OUTCOME:

Candidate should be able to:

 Explain about Data Storage and its need.


 Explain about data access speeds and order the storage devices according to the access speeds.
 Explain about the different types of Storage Devices and its uses.
 Describe the advantages and disadvantages of the storage devices.
3.1 DATA STORAGE:

The device that actually holds the data is known as the storage medium (‘media’ is the plural). The device
that saves data onto the storage medium, or reads data from it, is known as the storage device. Any device
that is used to store data is called as Storage device. Sometimes the storage medium is a fixed
(permanent) part of the storage device, e.g. the magnetic coated discs built into a hard drive. Sometimes the
storage medium is removable from the device, e.g. a CD-ROM can be taken out of a CD drive.

Purpose of storage devices:


 For the efficient processing of the computer
 to hold data even when the computer is turned off so the data can be used whenever needed.
 Storage involves writing data to the medium and reading from the medium.
o Writing data
 recording the data on the surface of the disk where it is stored for later use.
o Reading data
 retrieving data from the surface and transferring it into the computer’s memory for
use.
Exactly how the data is stored depends on a number of factors such as:

Capacity :
 The amount of data to be stored/Size of the file
Speed
 How quickly the user needs to be able to access the data from the storage device
Portability
 Whether the data needs to be moved from one place to another such as from home to School

26
Durability

 How long the storage media can reasonably be expected to last


Reliability
 Whether the data can always be accessed reliably and in the format in which it was saved

3.2 HIERARCHY OF COMPUTER MEMORY:


Various forms of storage, divided according to their distance from the central processing unit. The
fundamental components of a general-purpose computer are arithmetic and logic unit, control circuitry,
storage space, and input/output devices. Historically, memory has been called main memory, real storage
or internal memory. Meanwhile, non-volatile storage devices have been referred to as secondary storage,
external memory or auxiliary/peripheral storage.
Primary storage
Primary storage (also known as main memory or internal memory), often referred to simply as memory, is
the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and
executes them as required. Any data actively operated on is also stored there in uniform manner. Any data
or instructions that are to be processed by the CPU must be placed into main memory (sometimes known
as primary storage).
Random Access Memory (RAM)
Random Access Memory (RAM) is the part of the computer that temporarily stores the instructions that the
computer is running, and the data it is processing. RAM is a volatile storage device. This means that if the
computer’s power is turned off the contents of RAM disappear and are lost. RAM, like the CPU, also plugs
in to sockets on the motherboard.
When a computer is in use, its RAM will contain…

 The operating system software


 The application software currently being used
 Any data that is being processed

Read-Only Memory (ROM)


Read-Only Memory (ROM) is used in most computers to hold a small, special piece of software: the 'boot
up' program. These instructions are known as BIOS (Basic Input Output System). This software runs when
the computer is switched on or 'boots up'. It also loads the Operating systems and it also performs a
Hardware check. The software checks the computer’s hardware and then loads the operating system. ROM
is non-volatile storage. This means that the data it contains is never lost, even if the power is switched off.

27
SECONDARY MEMORY:
Secondary Storage Devices are essential as the size of Primary storage or main memory in every computer
is limited. With this, the computer can only accommodate a limited sized program and data. To carry out
big jobs like commercial data processing, it becomes essential that data be held in some expansive form of
storage. This is achieved through secondary storage Devices. It is also called as external storage, and can
hold data either sequentially or at random. You should always keep in in mind that data in secondary
storage devices is not directly accessible and has to be routed through the main storage for processing.
Apart from RAM and ROM all the other storage devices are included in Secondary storage. Examples of
Secondary storage Devices in Computers are: Magnetic tape, Hard disc, Flash drives, SD Cards, CD/DVD-
ROM etc.

28
Backup
Backing up is the process of using the storage device to copy files and data to a
different storage medium in case of a problem with the original copy

Why back up data?

How Are Backups Created?


Personal backups of the data on your hard-drive can be made by…
Burning files to a CD-R

Copying files to an external hard-drive

Copying the files to another computer on a network

29
Businesses backup essential data by…
Making copies of data very regularly

Using large-capacity media such as magnetic tape

Keeping old copies of backups, just in case

Automating the system so that nobody forgets to do it!

Keeping backup media off-site (in case of fire or theft)

USES:
Secondary storage devices are a very useful component to have.

Many times, they also go by the name external hard drives.

Different people use them for different purposes, as they are very versatile.

backing up data.

Many businesses will connect secondary storage devices to their network

Secondary storage devices are becoming more and more portable as technology progresses.

A very popular use of secondary storage devices has become using them to transport data.

3.2 TYPES OF ACCESS


The way data is stored and read by different backing storage devices varies considerably. This section
briefly describes the two main methods of accessing data.
SERIAL ACCESS
With this system, to access data it is necessary to start at the beginning and then access each piece of data
in turn until the required information is found. It is primarily used on magnetic tape systems and is a very
slow form of access. It is used in applications where speed of access or where the order in which the data is
accessed is not important, for example in utility billing, clearing bank cheques or producing pay slips.
When a magnetic tape needs updating, an additional tape is required so that the old information can be
merged with the new data (itself often on another tape, but the new data could be stored in various ways)
to produce the updated tape.
DIRECT ACCESS
This method is used with magnetic disks and with optical media (such as CDs and DVDs). The computer
uses a key field to calculate where data has been stored. It is then able to access the data directly from the
calculated position. Consequently, access is much faster than with serial access. It is used in applications
where access speed is vital (e.g. in real-time process control systems such as controlling a chemical plant

30
or online systems such as booking air tickets or automatic stock control). When updating media which uses
direct access, the new data is written to the next available location and its position is calculated using the
built-in algorithm.
ACCESS SPEEDS:
Some storage devices can access data very quickly, whilst others are extremely slow...

UNITS OF STORAGE

31
3.3 TYPES OF BACKING UP STORAGE MEDIA:
MAGNETIC STORAGE MEDIA :
Magnetic storage media and devices store data in the form of tiny magnetized dots. These dots are created,
read and erased using magnetic fields created by very tiny electromagnets.

OPTICAL STORAGE MEDIA


Optical storage media stores data on a disc as a number of data dots that can
be read using light (Usually a laser beam). Optical storage devices save
data as patterns of dots that can be read using light. A laser beam is the
usual light source. The data on the storage medium is read by bouncing the
laser beam off the surface of the medium. If the beam hits a dot it is reflected
back differently to how it would be if there were no dot. This difference can be detected, so the data can be
read. Dots can be created using the laser beam (for media that is writable such as CD-Rs). The beam is
used in a high-power mode to actually mark the surface of the medium, making a dot. This process is
known as ‘burning’ data onto a disc.
SOLID STATE MEDIA
Any memory device with no moving parts and are based on electronic circuits. SSD technology is also
known as flash memory.

The term ‘solid-state’ essentially means ‘no moving parts’. Solid-state storage devices are based on
electronic circuits with no moving parts (no reels of tape, no spinning discs, no laser beams, etc.) Solid-
state storage devices store data using a special type of memory called flash memory. You might wonder
why, since flash memory is non-volatile, normal computers don’t use it instead of RAM. If they did we
would have computers that you could turn off, turn back on again and no data would be lost – it would be
great! The reason is speed – saving data to flash memory is very slow compared to saving it to RAM. If a

32
computer were to use flash memory as a replacement for RAM it would run very slowly. However some
portable computers are starting to use flash memory (in the form of solid-state ‘discs’ as a replacement for
hard-drives. No moving parts mean less to go wrong and longer battery life.

33
END OF CHAPTER QUESTIONS

G6_ICT_U3_QB
1) Explain the term “Storage device”.

2) Explain the purpose of storage.

3) Differentiate between read and write operation.


4) What is data storage?

5) The main memory in Computers is becoming very large. Give 3 reasons


why back up storage is still needed.

6) Explain about Primary memory.


7) Differentiate between RAM and ROM.

8) List out the functions of ROM.

9) Explain about backing/auxiliary storage.

10) Explain the different types of accessing stored data with examples.

11) Explain about magnetic storage media with any two examples.
12) Explain why CD-R is considered as a Optical storage medium.

13) Explain about solid state drives with any two examples.
14) Explain the role of RAM in a Computer System.
15) Differentiate between Storage device and Storage medium.

16) Explain the term “Access speeds” with examples.


17) The data is stored depends on a number of factors. Explain the various factors of Storing data.

18) Explain the different types of Storage devices.


19) Explain Storage capacity.

20) Complete the following:

Bit:___________
1 Byte:_________

1 Nibble:_________
1 KB:_________bytes

1 MB:_________KB
1 GB:__________MB

1 TB:__________GB

34
21) Explain the different types of access in a Storage device.
22) Explain how the data is stored in a Magnetic Hard disc.

23) At the end of each day, a company makes a backup of all its data. What is backup?
24) A music video producer uses a computer to edit short movie clips for

advertising music videos. She sends her finished movie clips to stores and
television stations. Explain which storage device she should use.

25) Order the Storage device based on their Access Speeds.

Floppy disk, Pen drives, Internal Hard disk, Magnetic Hard disk, Compact disc.
26) Explain Flash memory.

27) Explain the different types of Solid state hard disc.

28) What does formatting do to a Disc?

29) Why is SD card considered Secure?

30) Why Solid state devices have a higher Access speed? Explain.

35
G6_ICT_U4
COMPUTER NETWORKS
LEARNING OUTCOME
Candidate should be able to:

• Understand the characteristics and purpose of common network environments, such as intranets and
the internet define what the internet and intranet is
• Describe the differences between an intranet and the internet
• Explain the purpose of an intranet and how that differs from the purpose of the internet
• Describe the uses of an intranet
• Describe the uses of the internet
• Define the terms Local Area Network (LAN), Wireless Local Area Network (WLAN) and Wide
Area Network (WAN)
• Describe the differences between a LAN, a WLAN and a WAN.
• List out the Security issues regarding data transfer .
• Describe the security issues surrounding the use of computer networks

4.1 INTRODUCTION:
Most computer systems are now connected together in some way to form what is known as a network.
This ranges from the basic school/home network of only a few computers (often set up to share resources
such as printers or software) to large networks such as the internet which effectively allows any computer
connected to it to communicate with any other computer similarly connected.
A computer network consists of two or more computers or electronic devices such as printers that has been
linked together in order to share data
Network allows users to
 Share files
 Send emails to each other
 Share resource
Computer networks are connected using
 Cables
 Radio-signals
 Telephone lines and satellites

36
37
4.2 TYPES OF NETWORK COMPUTERS:
There are two types of network that makes up a network
 Server
 Client
SERVER COMPUTER
Server are powerful computers that provides services to the client computers on the network. Servers
controls the network and tells what to do

38
CLIENT COMPUTERS
A client computer is a normal computer(a desktop PC computer or laptop computer. A client computer is
an individual computer that is used to perform everyday tasks to access information and programs from the
server

4.3TYPES OF NETWORK

LOCAL AREA NETWORKS

A local area network (LAN) is usually within one building or certainly not over a large geographical area.
A typical LAN will consist of a number of computers and devices (e.g. printers) which will be connected to
hubs or switches. One of the hubs or switches will usually be connected to a router and modem (usually
broadband) to allow the LAN to connect to the internet; in doing so it then becomes part of a wide area
network (WAN).

39
.
Wireless LANs (WLANs)

WLANs are similar to LANs but there are no wires or cables. In other words, they provide wireless
network communications over fairly short distances (a few meters) using radio or infrared signals instead
of cables. Devices, known as access points (APs), are connected into the wired network at fixed locations
because of the limited range, most commercial WLANs
(e.g. on a college campus or at an airport) need several APs to permit uninterrupted wireless
communications.

40
Wi -Fi:

Wi-Fi refers to any system where it is possible to connect to a network or to a single computer through
wireless communications, for example: on the WLAN described above PDAs and other handheld devices
laptop computers which are Wi-Fi enabled peripheral devices such as printers, keyboards and mouse which

41
can interface with the single computer when fitted with Wi-Fi adapters. Wi-Fi hotspots are places where
you can access Wi-Fi (free or paid). They exist in public places such as airports, hotels and internet cafés.
It is possible to logon to free Wi-Fi hotspots unless they are protected by passwords. Software exists which
can be loaded onto a laptop computer which then searches for non-protected Wi-Fi systems. The practice
of driving around in a car looking for these unsecured Wi-Fi hotspots is known as war driving and poses a
security risk to any unsecured Wi-Fi system.

Bluetooth

Bluetooth is an example of wireless personal area networking (WPAN) technology. Spread spectrum
transmission (radio waves) is used to provide wireless links between mobile phones, computers and other
handheld devices and allow connection to the internet. With this system, it is possible to create a small
home network, for example, to allow communication between any PDA, mobile phone, computer, media
player and printer. The range is, however, quite small (about 10 meters). Examples of its use include the
transfer of photographs from a digital camera to a mobile phone or the transfer of phone details to a
computer. It behaves like a mini-LAN.

42
WIDE AREA NETWORKS
A wide area network (WAN) is basically formed by a number of LANs being connected together through
either a router or a modem. Some companies will set up private WANs (usually by way of fiber optic
cabling or telephone wires restricted to company use only). This is expensive but comes with the advantage
of much enhanced security. It is more
common to use an Internet Service Provider (ISP) for connections to the internet and communicate via
this network system.

43
END OF CHAPTER QUESTIONS

G6_U4_QB

1) Define Computer networks.


2) Explain how the network computers are joined together.
3) Discuss the advantages and disadvantages of Networks.
4) Explain the role of a Client and a Server.
5) List any 5 tasks of a Server.
6) List the different types of Networks.
7) Explain about LAN.
8) Differentiate between a LAN and WLAN.
11) Explain about the usage of WAN.
12) Discuss about MAN.
13) List any 5 uses of PAN.
14) Explain why PAN is not suitable for a Large network.

44
45
G6_ICT_U5
EFFECTS OF ICT
Learning outcome:
Candidate should be able to:

• Describe repetitive strain injury (RSI) and what causes it


• Identify other health issues (e.g. back problems, eye problems, headaches)
• Describe common physical safety issues and what causes them (e.g. eletrocution from spilling
drinks, fire from sockets being overloaded or equipment overheating, tripping over cables)
• Describe some simple strategies for preventing these issues
• Evaluate own use of ICT equipment and develop strategies to minimise the potential safety risks)
• Describe microprocessor-controlled devices in the home

5.1 HEALTH EFFECTS:


There are many health and safety problems associated with regular use of computer systems. Health and
safety regulations advise that all computer systems have a minimum of tilt able and anti-glare screens,
adjustable chairs and foot supports, suitable lighting, uncluttered work stations, and recommend frequent
breaks and eye tests. Although health and safety are closely related, they are very different subjects. Health
issues are related to how to stop people becoming ill or affected by daily contact with computers. Safety is
more concerned with the dangers which could lead to serious injury or even loss of life.
Health aspects
The table below highlights a number of health issues, together with possible solutions to either minimize
the risk or eliminate it altogether.

46
The Effect of These Devices on Our Lives

Microprocessor-controlled devices mean that we have more leisure time to relax and enjoy ourselves
instead of doing household chores. We are able to communicate with people very easily using computers,
mobile phones, etc. We can become part of online social networks, making friends with people from all
over the world. Computers and Internet connections mean that many of the tasks that involved us leaving
the house, for example, shopping for music, clothes or food, can now be done on-line. Online shopping
gives us more choice of products and saves us time. It is also great from those who are unable to get out
of the house easily, such as the elderly, or the disabled. If we use a computer for many hours (as people
often do at work), there are some health issues that might affect us...
Eye-strain:
One health issue that can occur after using computers for a long time is eye-strain. This is caused by
looking at a monitor which is a constant distance away. The muscles that focus your eyes do not move,
and so get tired and painful. Staring at a computer screen for too long can strain your eyes and cause
headaches.

BACK AND NECK ACHE


Many people suffer from back and neck pain after working at a computer for a long time. This is usually
due to them having a bad sitting posture. Back ache and neck ache can cause great pain and really affect
the quality of your life

Bad Posture Good Posture

47
REPETITIVE STRAIN INJURY (RSI) IN WRISTS AND HANDS:

Any repetitive movement (same movement over and over again) can result in a health problem called
repetitive strain injury (RSI). In particular, typing and using a mouse for long periods are common
causes of RSI in the wrist (it is often called carpal-tunnel syndrome).

5.2 PHYSICAL SAFETY:


The table below gives a number of safety issues, together with possible solutions to eliminate or minimize
the risk.

48
PREVENTIVE MEASURES:

TRAILING CABLES

Computer equipment is often connected to lots of cables: power, network, etc. If


these cables are laying on the floor, they can cause people to trip over them
Solution: Place cables inside cable ducts, or under the carpet / flooring

SPILT DRINKS OR FOOD

If any liquids are spilled on electrical equipment, such a s a computer, it can


result in damage to the equipment, or an electric shock to the user.
Solution: Keep drinks and food away from computers

OVERLOADED POWER SOCKETS

Plugging too many power cables into a socket can result in the socket being
overloaded, overheating, and a fire starting.
Solution: Never plug too many cables into a socket. Always make sure there are
fire extinguishers nearby.

HEAVY OBJECTS FALLING

Many items of computer equipment are very heavy: CRT monitors,


laser printers, etc. Heavy items can cause serious injury if they fall
on people.
Solution: Make sure equipment is placed on strong tables.

5.3 Microprocessor- Controlled Devices


A microprocessor is really just a tiny CPU built onto a single chip.
Microprocessor are put into electronic devices to control how they function.
Microprocessor controlled devices affect our lives in lots of different ways
including in our homes, our leisure times, how we interact socially. They
even have an affects of our needs to actually leave our houses

49
The following are the examples of typical household devices that contain a microprocessor
 Computer system
 Washing Machines
 Alarm system
 Heating System
 Intelligent Ovens
 Intelligent Fridges

50
END OF CHAPTER QUESTIONS

G6_U5_QB

1. Explain the various physical security hazards and the ways to prevent it.
2. List the various causes of RSI.
3. List the ways to prevent RSI.
4. List the various causes of Back and Neck Pain.
5. List the ways to prevent Back and Neck Pain.
6. List the various causes of Eye Strain.
7. List the ways to prevent Eye Strain.
8. What is a Microprocessor?
9. List any 4 examples of household applications that contains Microprocessor.

51
G6_ICT_U6
ICT APPLICATIONS

LEARNING OUTCOME
Candidate should be able to:
• Describe a range of communication applications (e.g. newsletters, websites, multimedia
presentations, music scores, cartoons, flyers and posters)
• Describe the use of mobile phones for communication (e.g. text messaging, phone calls, accessing
the internet)
• Describe how systems are used to manage learner registration and attendance
• Describe how systems can be used to record learner performance
• Describe how systems can be used for organizing examinations, creating timetables and managing
teaching cover/substitution
• Identify areas where booking systems are used (e.g. travel industry, theatre and cinemas)
• Describe the online processing involved in booking tickets
• Discuss the advantages and disadvantages of online booking systems.
• Describe the computer processing involved in Electronic Funds Transfer (EFT)
• Describe the computer processing involved in using automatic teller machines (ATM) (e.g.
withdrawing cash, depositing cash or cheques, checking account balance, mini statements,
mobile/cell phone recharge/top up, bill paying, money transfers, ordering paper-based goods)
• Describe the files used in libraries (e.g. records of books and borrowers)
• Describe the computer processing involved in the issue of books, including the use of direct data
entry methods.

6.1 COMMUNICATION APPLICATIONS


There are several communication applications that make use of ICT technology. These fall into two
categories: methods of communication and ways of communicating information.
Methods of communication include:
o Paper based
o Digital based

52
PAPER-BASED:
It is always possible to produce presentations in a hardcopy format rather than the system described above.
This has the following advantages:
• Disabled people do not have to go to the venue to see the presentation.

• It is possible to print it out in Braille for the benefit of blind people.

• The recipient can read the presentation at any time they want.

• The recipients have a permanent copy, which they can refer to at any time they want.
There are, however, disadvantages:
• The presentation needs to be distributed in some way.

• There are no special effects (sound, video, animation).

• There are printing costs (paper, ink, etc.).

53
Desktop Publishing

Desktop Publishing (DTP) is a system of software and hardware that allows a user to create and print
documents such as:
 Books
 Posters
 Flyers
 Magazine
 Newspapers etc...
DTP software is WYSIWYG (What You See Is What You Get - meaning that the document looks the same
on the screen as it will when it's printed). Document layout is produced using 'frames' - areas of the page
that can contain text or images. Text in frames can 'overflow' into other frames. Images can be added from
scanners or digital cameras, then cropped, rotated, resized, etc. Where text and images overlap, text can be
'wrapped' around images. Before DTP was available, if you wanted to produce a printed document, you
would have to pay a professional designer and printer to do the work for you. And, unless you planned to
print thousands of copies of your document, the price was often too expensive. Now, with relatively cheap
DTP software and a good quality laser printer, it is easy for anyone to produce their own posters, etc.
People can now publish documents literally from their own desktop!
NEWSLETTERS:
 Newsletters are released regularly and are used to inform people about the areas of interest.
 Newsletters are created easily using DTP Software's.
FLYERS AND POSTERS
Flyers and posters can be produced very easily using one of the many
software packages available, most commonly word processors and
desktop publishers (DTP). Usually, the flyer or poster will have photos
which have been taken specially or have been downloaded from the
internet. The following sequence is fairly typical of how such a document would be produced on a
computer system:
 A word processor or DTP application
 The user creates frames, boxes and text boxes.
 If necessary, photos are taken, using a camera.
 The images are uploaded from the camera, loaded from a
CD/DVD, scanned from hard-copy photos or downloaded from
the internet.
 The photos are saved to a file.
 The photos are imported or copied and pasted into the document.
54
 The photos are edited and text typed in or imported from a file and then put into the required style.

DIGITAL COMMUNICATION:
Digital communication needs a Computer and a Screen. Digital communication involves creating and
displaying using a Computer screen.

MULTIMEDIA PRESENTATIONS :
Presentations using animation, video and sound/music are generally much more interesting than a
presentation done on slides or paper. The presentations are produced using one of the many software
packages on the market and then used with a multimedia projector so that the whole audience is able to
see the presentation.

WEBSITES :
Rather than producing flyers and posters by printing them out, it is possible
to use websites for advertising and communication. There are a number of
advantages and disadvantages of using this technique.

55
MUSIC PRODUCTION :
The generation of music and the production of music scores can now be done by computer systems with
the appropriate software, for example:
• Music samplers and mixers allow the original tracks
that were recorded in the studio to be modified in any
way that the producer wants
• Electronic instruments (like guitars and organs)
• Can play back through electronic effects machines
• Synthesizers combine simple wave forms to produce

complex music creations


• Electronic organs can mimic any other instrument
• Music scores can be generated from the music itself
• Using software
• Software can automatically correct music notes in a
score
• There is no need to understand music notation to
write a music score
• Music notes are automatically printed out in the correct format.
CARTOON ANIMATIONS :
Animation can be produced using computer hardware and
software. With 3D animation, objects are designed on a computer
and a 3D skeleton produced. The parts of the skeleton are moved
by the animator using key frames (these frames define the start
point and end point to give a smooth an Imation effect). The
difference in the appearance of the skeleton in these key frames is
automatically calculated by the software and is known as tweening or morphing. The final stage is to
make a realistic image by a technique known as rendering.
Producing and Editing Pictures
56
The production of graphics and pictures has been revolutionized by the use of IT. Image editors such as
Photo Shop allow computer users to easily manipulate images in many ways:
 Crop (cut off bits that you don't want)
 Resize
 Distort (e.g. bend, twist, stretch, etc.)
 Alter color (e.g. brighten, make black & white, etc.)
 Add effects (e.g. shadows, glow, texture)
 Add graphics (e.g. lines, circles, borders, etc.) Add text Etc.
 High quality hard-copies can be obtained using colour laser printers or ink-jet printers.
INTERACTIVE COMMUNICATION :
Communication does not need to be one-way as it is in many of the above examples. When people create
images, documents, music, etc. they are communicating their message, but they are not listening to the
responses that other may have. With the rise of the Internet, and especially with the recent 'Web 2.0'
websites, such as wikis, blogs and social networking sites, communication has now become very
interactive. By 'interactive' we mean that people
can respond the information that they are given, add comments, alter / improve it, rate it, etc.
Good communication is essential to every organization: communication between organizations, and
communication between parts of a single organization (e.g. between offices in different countries). A wide
variety of communication systems are used...
 Leave comments
 Thumbs up/down
 Ratings
 Alter the content
6.2 SCHOOL MANAGEMENT SYSTEMS:
With hundreds of students passing through the school electronic records need to be kept for every student.
The records are kept in a database called a Management Information System (MIS).
Details stored are likely to include:
 Student name
 Home contact details and emergency contacts
 Date of birth
 Medical information such as allergies, serious illnesses
 Date of birth

57
SCHOOL ADMINISTRATION: REGISTRATION

Many schools have now moved over to electronic registration. Data from the MIS can be used in the
registration system e.g. student name, form. This saves having to re-enter the data twice and cuts down the
risk of errors, for example if a student changes their name or moves forms. The registration system might
run from the teacher's computer, it might be on a special device used especially for registers. Some schools
are using specialist registration systems which require students to swipe a small plastic card through a
reader. A few schools have introduced biometric registration which uses either the students' fingerprint or a
retinal scan. The registration system can tell office staff which students are at school and which are absent.
Some systems can be set up to send a text or make a phone call to parents to tell them that their child is not
at school. The registration system can be used to analyze attendance perhaps by year group, form or by
individual students. It can help to identify patterns of absence and perhaps flag up potential problems.

IN THE CLASSROOM - WHITEBOARDS


The old blackboard and chalk is long gone from modern schools and in their
place you are more likely to see an interactive whiteboard.
Interactive whiteboards can connect to any digital source such as a computer.
The computer can be used to show a lesson or to connect to a web site . Pupils
can interact with the screen by using a special pen or their hands. However,
many teachers do not use interactive whiteboards to their full capabilities and
after a while they are very often used as an expensive 'projector screen'. Schools have to manage many
different sets of data:
 Pupil information (name, contact details, etc.)
 Staff information (name, bank details for pay, etc.)
 Timetable (rooms, times, subject, staffed.)
 Pupil attainment (marks, grades, comments, etc.)
 Pupil behavior (dates, incidents, notes, etc.)
 Administration data (letters, forms, etc.)
 Financial records (wages, fees, etc.)
 Exam entries (times, dates, pupils, results, etc.)
Rather than use lots of different systems to manage this information,
many schools use a School Management System (sometimes called a
School Information System, or SIS). This is a system that manages all
of a school's data in a single, integrated application. Having all of the
information in a single system allows schools to more easily connect
data together. For example, when viewing a pupil's record, the user

58
could follow a link to the pupil's class, and from there a link to the pupil's teacher, and from there a link to
the teacher's other classes, and so on. These connections between sets of data allow complex tasks to easily
be performed such as:
 Sending letters to all parents of pupils who scored below 50% in their last English test
 Printing personalized timetables for IGCSE pupils (even though they have all chosen different
options)
 Monitoring the progress of pupils in multiple subjects, over a number of years
As you can imagine, School Management Systems are pretty complex.
Most systems are based on a complex relational database. The
database contains many tables of data, each table having many
records and many fields. An Example: An example of a part of a
typical school database showing the different data tables, the fields
within each table, and the relationships between the tables:

6.3 LIBRARY MANAGEMENT:


Schools have to manage many different sets of data:
 Pupil information (name, contact details, etc.)
 Staff information (name, bank details for pay, etc.)
 Timetable (rooms, times, subject, staff, classes, etc.)
 Pupil attainment (marks, grades, comments, etc.)
 Pupil behavior (dates, incidents, notes, etc.)
 Administration data (letters, forms, etc.)
 Financial records (wages, fees, etc.)
 Exam entries (times, dates, pupils, results, etc.)
Rather than use lots of different systems to manage this information, many schools use a School
Management System (sometimes called a School Information System, or SIS).

59
This is a system that manages all of a school's data in a single, integrated application. Having all of the
information in a single system allows schools to more easily connect data together.
These connections between sets of data allow complex tasks to easily be performed such as:
 Sending letters to all parents of pupils who scored below 50% in their last English test
 Printing personalized timetables for IGCSE pupils
 Monitoring the progress of pupils in multiple subjects, over a number of years
As you can imagine, School Management Systems are pretty complex. Most systems are based on a
complex relational database. The database contains many tables of data, each table having many records
and many fields Libraries often contain many thousands of books, magazines, CD-ROMs, etc. Libraries
use computer-based systems to keep a record of their books, and of the people who borrow the books. A
computerized library database allows for:
 Quick and easy searching for books
 Easy printing out of book lists / labels
 Easy tracking of book loans (who has it, when it was borrowed, etc.)
 Automatic printing of warning letters for borrowers who have not returned books

INTERNATIONAL STANDARD BOOK NUMBER (ISBN):


Every published book has an International Standard Book Number (ISBN).
The ISBN is typically printed on the back of the book in numeric form, and as a barcode (to allow for
quick data entry) A typical library book database might contain:
 Book ID (number / text)
 Title (text)
 Author (text)
 Publisher (text)
 Fiction / non-fiction (Boolean)
 Genre / category (text)
 Date of purchase (date)
The Borrower Database

A typical library borrower database might contain:


 Borrower ID (number / text)
 Name (text)
 Phone number (text)
 Address (text)
 E-mail address (text)
 Date of birth (date)

60
Borrowers are commonly given library cards that have their details printed on, so that they don't have to
remember their ID. Most cards also have the borrower's ID in the form of a barcode for quick and easy
data input when borrowing books
THE LOANS DATABASE
The loans database has records added to it when someone borrows a book. The loans data base links
together records from the books database and the borrower database. A typical loans database would
contain:
 Book ID (number / text)
 Borrower ID (number / text)
 Date of loan (date)
 Due date (date)
6.4 BOOKING SYSTEMS:
Computers are often used to book (reserve) air flights, seats in the
cinema, rooms in a hotel, tables in a restaurant, etc. In all of the above
examples, there are a limited number of items (seats on a plane, rooms
in a hotel, etc.) which need to be allocated. It is very important that any
booking system prevents the same item being booked twice (double-
booking).
SO HOW DO BOOKING SYSTEMS WORK?
If we were talking about a single, small cinema, where you had to
queue up to buy tickets at the front door, the reservation system
would be very simple: We could just use a piece of paper and tick
off seats as they were reserved. However, most booking systems
are much more complex than this. A typical booking system must
cope with booking requests from many different sources, all
arriving at the same time. For example, flights can be booked by customers online, by travel agents in
dozens of different offices, by businesses, etc. How do booking systems manage all these bookings
without making any double-bookings?

ALL BOOKING SYSTEMS ARE REAL-TIME


The Key to all booking systems is the fact that they are real-time systems.
A real-time system is one where every input is processed immediately,
so that the resulting output is ready before the next input is processed.

61
In the case of a booking system:
 The inputs are booking requests
 The processing involves checking if bookings are possible, and if so making the bookings
 The outputs are booking confirmations / rejections
Because a booking system is real-time, when a booking request arrives, the previous booking has already
been fully processed.
This is what prevents double-booking.
An Example...
Imagine that two people are using an airline's
website to try and book seats on a flight. Both people
try to book seat 38C and the same time. Even though
the booking requests are made at the same time, one
request will be received by the airline's computer just
before the other (since requests come into the system
through a 'queue') This is what happens:
1. Input: Please reserve seat 38C
2. Process: Has seat 38C already been booked? No... so book it
3. Output: Booking confirmed for seat 38C
4. Input: Please reserve seat 38C
5. Process: Has seat 38C already been booked? Yes!
6. Output: Booking rejected

You can see that the first input is fully processed before the next one.
So seat 38C doesn't get booked twice.

THE BOOKING DATABASE


The booking database system will have a record for every seat in the theatre, for every day and time slot, to
keep track of whether it is reserved or not. A typical record may look like: The field item called 'Available'
indicates whether the seat has been booked for the time slot on that date. It will also record who booked it.
When someone wants to make a booking the database is searched to show all un-reserved seats. What the
customer may see is an up to date seating plan like the one below The pale seats are showing which ones
are still available. The web site will have a key to the color coding as there is no standard way of doing
this. So behind this plan there is a real-time database system.

62
Field Value
Record ID 1229900
Seat ID 1A
Date 2/4/2012
Start time 19:30
End time 23:00
Booked YES
Customer ID Jones123

ONLINE BOOKING SYSTEM

With the rise of the internet, online booking systems have become commonplace. They are all interactive
web sites because they have to update the master database whenever a booking is made. A typical web site
is shown for booking a hotel room: There are a number of interactive elements in this booking screen. For
example, clicking the little pink box next to the date box caused a calendar to expand on the screen so you
can click on the check-in date and check-out date. This is an excellent way to enter dates into a database
because the customer does not have to care about the date format. You can see that a drop-down box is
used for the number of nights needed. A small crossed box in the 'rooms and travelers' section invites you
to change the detail if you want to. A well-designed online booking web site is very easy to use because it
is obvious how it works. A poorly designed web site is much more difficult to use.

Field Value
Holiday ID 12889
All-inclusive,
Description 'Albanos Hotel' in
Algarve
Number of nights 10
Start date 15/4/2011
Current slots
157
available

63
MULTI-USER BOOKING SYSTEM
Some travel agencies have branches all over the country. And yet they will all by trying to book the same
package holidays and travel arrangement for their customers. There must not be over -booking or double
booking. This is only possible because there is a central database held in the main headquarters and every
branch has a set of terminals connecting remotely to it. This is called a multi-user system As soon as a
branch makes a booking, the central record is updated. For example, consider there are 300 slots available
for a particular package holiday. The agencies have been busy and the holiday package is selling fast. The
database record at one point in time may look like this: Every time a booking is made, the current slots
available is by 1 until no more are left. There will of course be records in other tables within the database
storing the details of every customer.

PRO’S & CON’S OF BOOKING SYSTEM:

64
END OF CHAPTER QUESTIONS
G6_U6_QB

1. List the various communication applications available using ICT.


2. List the types of Communication applications.
3. Explain paper based communication with any three examples.
4. Explain the purpose of DTP Software.
5. Explain the advantages and disadvantages of Paper based communication.
6. Explain the advantages and disadvantages of Digital communication.
7. Explain the role of ICT in School Management Systems.
8. Explain how ICT is useful in saving the details of Students.
9. Explain how ICT helps in tackling truancy of Students in School Management systems.
10. List the fields included in a Students table.
11. List the advantages of introducing ICT in Booking Systems.
12. Explain how online bookings are done.
13. Explain the ways to avoid double booking.
14. Discuss the advantages and disadvantages of online banking.
15. List the fields included in a Students table.

65
G6_ICT_U7
SAFETY AND SECURITY

LEARNING OUTCOMES
 Discuss why e-safety is needed
 Describe measures which should be taken when playing games on the internet (e.g. not using real
names).
 Define the term hacking and describe it's effects
 Explain what is meant by the term hacking and the measure that must be taken in order to protect
data
 Define the terms: phishing, pharming, smishing
 Describe the methods which can be used to help prevent phishing, pharming and smishing

What is E- safety and why it is needed?


 E- Safety is all about how to use the internet safely.
 This helps to keep your personal information private in chat rooms, social media , e-mails and
when playing online games.

66
 Understanding e-safety can help protect us from online dangers
How can use the internet safely?

7.2 Hacking
Hacking is where people access computer system without permission. These people are known as
“Hackers”. Most of the time, hackers will try to access the computer system using the internet. Hackers
will usually try to break into the system by simply guessing the password or by using a Key Logger
A Key logger is a special type of software that is secretly sent to the computer system and then logs every
key press that users of the system make. The Key Press log is sent back to the hacker who then looks
through the log for the username and passwords which they can use to hack into the system
The following are the reasons why people try to hack into the computer system
 To cause damage to files or data by deleting or changing them
 To commit fraud by stealing data
 To access sensitive information
 To simple see if they are clever enough to beat the systems security

Effects Of Hacking
 Identity Theft
 Theft of money
 Stealing of customer information
 Stealing email addresses
 Loss of important information

67
7.3 SECURITY ISSUES:
There are other security risks (not necessarily as a result of viruses or hacking) associated with connecting
to the internet. These security risks are now discussed in some depth.
Phishing
Phishing is a fraudulent operation involving the use of emails. The creator sends out a legitimate-looking
email, hoping to gather personal and financial information from the recipient of the email. As soon as an
unsuspecting user clicks on the link they are sent to a spoof website where they will be asked for personal
information including credit card details, PINs, etc. which could lead to identity theft.
Pharming
Pharming is a scam in which malicious code is installed on a computer hard disk or a server. This code
has the ability to misdirect users to fraudulent websites, usually without their knowledge or consent.
Whereas phishing requires an email to be sent out to every person who has been targeted, Pharming does
not require emails to be sent out to everybody and can therefore target a much larger group of people much
more easily. Certain anti-spyware, anti-virus software or anti-Pharming software can be used to identify
this code and correct the corruption.
Smishing(SMS Phising)
Smishing is same as phishing except the fraudulent messages are sent via text messages(SMS) rather than
Emails
Spam
Spam is electronic junk mail and is a type of advertising from a company sent out to a target mailing list.
It is usually harmless but it can clog up the networks, slowing them down, or fill up a user’s mail box. It is
therefore more of a nuisance than a security risk.

68
END OF CHAPTER QUESTIONS
G6_U7_QB

1. Explain the term


a. Pharming
b. Phishing.
c. Spamming
d. Smishing
2. Explain Hacking.
3. List the ways to prevent from Hacking
4. What is E-Safety ?
5. Give any 2 reasons why people are trying to hack the computer system.
6. List the prevention measures of interne security.
7. What are the negative effects of Online gaming?

69
THE INDIAN PUBLIC SCHOOL
LIBRARY BOOK ISSUE

Student
Issue Return Librarian
Name of the Student ID No Section sign
Date Date sign
THE INDIAN PUBLIC SCHOOL
LIBRARY BOOK ISSUE

Student
Issue Return Librarian
Name of the Student ID No Section sign
Date Date sign

You might also like