Ict Special Notes
Ict Special Notes
Used to enter data or instructions into a computer Used to show the computer’s output in a form that is
directly. understood by a human.
Can send data to another device. but it can’t receive Can receive data from another device, but it can’t send
data from another device. data to another device.
Under
the control of the user or can be direct data Under the control of the computer.
entry.
More complex. Less complex.
RAM ROM
Volatile memory. Non-volatile memory.
Temporary memory device. Permanent memory device.
Can be written to and read from. Can only be read from but not written to.
Store data. programs or parts of the operating
system Stores the startup instructions when the computer is
that are currently in use. first switched
on.
Tends to have greater storage capacity. Lower storage capacity
Tablets * Very fast to switch on. * Have less storage capacity than laptops
* Have better battery life than laptops. and Pcs.
* Less heat 1s generated. * Expensive when compared to laptops.
CamScanner
Pointing Advantages Disadvantages Uses
devices “input"
* Doesn’t need a large desk area * Difficult to use if no flat surface * Moving and deleting files.
Mouse when compared to keyboard. readily available. * Controlling the position
» Faster way to choose an option » Difficult to use for people with of a pointer on the screen.
compared to keyboard. restricted hand movement.
* Needs less desk space than a e Needs training as it’s not * In some luxury cars to
Tracker ball mouse. standard equipment. select functions.
Easier to use than a mouse. * More expansive.
Rem ote * Operate devices from distance. | * Objects between the device and |« TV.
* Useful for people with walking | the remote control can prevent
control difficulties. its operation.
e Hard
to use if the user
has
disability in hand movement.
JO Stick e Control is more realistic than |« More difficult to control a « In video games.
y using a mouse. pointer using a joystick than * Flight simulators.
* Easier than keyboard to other pointing devices.
navigate the screen.
. Its faster to read text than to e Use up a lot of computer ¢ To input speech in
Microphone Sk memory. presentations.
Gra hic * More accurate in drawing than | ¢« More expensive than other e To input freehand
p using pointing devices. pointing devices. drawing.
tablet
Dicital * The image can be immediately | * Images often need to be * Taking pictures.
gl seen on the screen. compressed to reduce amount
camera of memory used.
* Allows image to be stored for | e Can be slow. ¢ Scan in documents and
Scanner further editing. convert them into a digital
format.
(%] CamScanner
Direct data Advantages Disadvantages Uses
entry (DDE)
Onptical * Faster data entry system than | ® Device has difficulty in reading | ® Processing of passport and
P manually typing data. handwriting. identity cards.
character * Errors are reduced as thereis | « Not a very accurate technique
d no manual input. to read text.
reaaer
(OCR)
Optic a] * Very fast way of inputting data. | ¢ If the marks don’t fill the space | ®* Multiple choice
* More accurate than keying in completely they may not be examination papers.
mark reade[‘ the data. read correctly. * School registers.
* More accurate than OCR. e If the marks are not dark
(OMR) enough they may not be read
correctly.
* Much faster than keying in data | « More expensive system than ¢ In supermarket.
Barcode manually. using keyboards. e libraries.
['eader ¢ Errors are reduced as there is « Barcodes can be more easily
no manual input. damaged compared to RFID.
chips and magnetic stripes.
Qlli Ck ¢ Can hold more data than ¢ Cam be used to transmit * Giving automatic access
traditional barcodes. malicious codes. to a website.
re spon Se * Faster and easier to scan. ¢ More than one QR format is
( QR) available.
Radio * Can store more data than ¢ Can hack into the data by the | ¢ Contactless payment.
barcode. fag. * (tag: contain Microchip
frequency * Allows greater security than « Initial cost is more expensive to store & transmit data
. . . barcode. than barcode. and Antenna to receive &
identification . Very fast read rate. « Tag collision may occur. transmit data)
(RFID)
: ¢ Much faster than keying in data | ¢ Data will be lost if its * ATM cards.
Magnetlc manually. damaged.
st ripe reader |* Errors are reduced as there is | » Doesn’t work at a distance.
no manual input.
: ¢ More secure than contactless as | * Ensure PIN isn’t read by * ATM cards.
Chlp and PIN must be typed. somebody else while typing.
PIN reader |+ More robust system than
magnetic stripe.
ContaCtleSS * Faster transaction than other * More expensive than normal e ATM cards.
payment methods. card.
card reader ¢ The card may be read
accidentally.
* Take more accurate readings ¢ Can give false results. * Temperature sensor.
Sensors than humans.
(%] CamScanner
Monitors Advantages Disadvantages Uses
CR’I‘ o Least expensive monitor to buy. | ¢ Heavyweight devices. ¢ Allow designs to be
e They allow the use of light * Have large footprint. created on screen with
pens. ¢ Consume more power. light pens.
Y * Lighter than CRT. * More expensive to buy than * Mobile phones. tablets
LCD /TFT e Less power consumption than CRT. and laptops use LCD
CRT. * Narrower angle of viewing screens.
e Sharper image than CRT. compared to CRT.
* Thinner and Lighter. * More expansive.
LED * Less power consumption.
* Run cooler.
o Sharper image.
Actuators ¢ They allow remote operation | ¢ Could go wrong. e Controlling robot arm.
of many devices.
(%] CamScanner
Magnetic Advantages Disadvantages Uses
media/storage
devices
Fixed
5
.
hard
o
* Large storage capacity.
* Fast data transfer rate.
* Noisy when compared to SSD.
* Have many moving parts
| * To store the operating
system.
dlSk drlve * Fast data access time. ““affect their reliability ™. * To store system software.
(HDD)
* Large storage capacity. ® Data transfer rate is not as fast | ®* To store backups.
Por:table .hard * Fast data transfer rate. as HDD. _ * To transfer data between
dlSk dnve e Fast data access time. * Have many moving parts. computers.
- * Huge storage capacity. * Very slow data access time. * To store backups.
Magne‘?lc * Fast data transfer rate. * They are affected by magnetic
tape drive |+ Cheaper per unit memory field.
than HDD.
Memory
.
cards ® -ciamiy —_
* Small and can be easily used. | * Lower storage capacity than
i
* To store photos on digital
Blu_ray * Greater storage capacity. * Most expensive optical device. | ®* To store HD movies and
* Faster data access time than games.
others. * To store backups.
* Faster data transfer rate than * File transfer between
others. different computers.
(%] CamScanner
Validation check Description Example
Checks if data is present and hasn’t A person’s ID may be required.
Pl'esence CheCk been left blank. If no data entered. an error message will be
produced.
Both use security when sending data Bluetooth is simpler to use and setup
Cost of Bluetooth is cheaper than Wi-Fi
(%] CamScanner
Network devices Function
¢ Allows a computer to be connected to a network.
Network interface ¢ Connects the MAC address of the computer.
card "NIC"
¢ Connects number of devices to form a network.
Hub * Broadcasts incoming data packets to every computer in the network.
Bridge ¢ Connects one LAN to another LAN that uses the same protocol.
e Used to connect different parts of a LAN so that they can function as a single LAN.
* Data packets are sent to the switch/hub and then passed to router.
IP address * Router inspects the IP address of the data packets sent to it.
"Internet protocol" » Router looks up the paths to get to that address using its routing table.
» Router then checks how busy the oaths are and identities the quickest path.
¢ Router is then able to route the data packets to reach the correct switch/hub.
¢ Switch/Hub sends the data packets to the destination computer.
Similarities Differences
Hub & Switch Hub & Switch
Both are used to connect devices to form a LAN. Security is lower in hubs.
Both use data packets. Switch uses MAC addresses to locate the destination of the device.
Both check/read the data packets. In a hub a data packet is sent to every device on the LAN.
Similarities Differences
Internet & Intranet Internet & Intranet
Both are networks. Internet public access.
Both are communication systems. Internet less secure.
Both use HTML to write the web pages. Internet wider range of resources.
Both use internet technologies. Internet information is less relevant/reliable.
(%] CamScanner
Website Definition
A web document written in HTML.
Webpage Features that can be inserted: text, image, videos & sound.
WebSit e It 1s a collection of webpages related together using hyperlinks.
Hypertext markup A mark-up language used to create webpages uses tags to format content.
language "HTML"'
s Information space that consists of massive collection of web pages all connected
WOl'ld WIde web together using hyperlinks, WWW is only part of the internet that can be accessed by
uwww " web browser.
(%] CamScanner
Security Definition Possible effects How to identify How to protect
threats
Virus Program that replicates itself • Deletefiles. • Deletion of files without user's • Use
up to date anti-virus
• Causes a computer to become consent. software.
unresponsive. • Don't use software from
• Computer becomes unresponsive.
• Causes software errors. • Random reboots.
unknown sources.
• Software errors. • Scan email attachments. Use
a firewall.
Spyware Software that records the key presses on the user's keyboard, this • Gives the originator the access to all • Use up to date anti-spyware
"key logging data is then sent to the originator of the software. data entered by the users’ keyboards software.
software" including sensitive data. • Use pointing device instead
of typing,
• Use a firewall.
Hacking The process of gaining unauthorized access to a computer system. • Misuse of personal information. • Use of firewalls.
• Data can be changed. • Use strong passwords.
• Data can be copied from a system. • Use biometrics,
• Data can be deleted.
Phishing The creator sends out a legitimate looking email that contains a link • The creator of the email can gain • Spellingor grammar mistakes in • Usespam filters.
when clicked it opens a fake website designed to obtain sensitive sensitive data. text. • Don't
click links from
data. • Credit card fraud. • Email urges you for a quick reply, unknown sources.
• Asking for personal details. • Never reveal personal
details.
• Report any suspicious
activity.
Smishing The creator sends SMS to the user's phone that contains a telephone • The creator of the SMS can gain • Spelling or grammar mistakes in • Ignore text messages from
number to call or contains a link when clicked it opens a fake website sensitive data. numbers you don’t
• Askingfor personal details.
to obtain sensitive data. recognize.
• Credit card fraud. • SMS from unknown source,
• SMS sent at an unusual time. • Report any smishing
attempts.
• Never click on links in text
messages from unexpected
people.
Vishing A voicemail message is used to trick the user into calling the • Creatorof vishing scam can gain • Askingfor personal details. • Never reveal personal details
telephone number contained in the message, the user will be asked sensitive data. • Voicemailfrom unknown over the mobile phone.
to supply personal data thinking they are talking to somebody who • Credit card fraud. telephone number. • Ignore voicemail from
works for a legitimate company. • Voicemail has generic greetings. unknown number.
• Report any vishing attempts,
Pharming A malicious code is installed on the user’s computer that redirects • The creator of the malicious code • Website's URL is incorrect. • Checkthe spelling of URL of
the user to a fake website designed to obtain sensitive data. can gain sensitive data. • If
webpage is requesting personal the website.
information and its URL states
• Credit card fraud.
with http instead of https
CamScanner
• Checking that the URL
contains https or a locked
padlock sign next it,
• Using
up to date anti-
malware software.
Card fraud The illegal use of a credit or debit card. • Card cloning.
• Shoulder surfing when using the
• Keylogging software.
• Phishing/smishing/
vishing
pharming.
Shoulder A form of data theft where criminals steal card data from a victim • Somebody watching you typing • When using ATMs, shield
surfing when using it. the card PIN by looking over your the keyboard with your other
shoulder. hand.
• Somebody listening in when you • When using a mobile device,
are giving credit or debit card never key in data in a public
details over the phone, place.
• Don't speak card details into
your smartphone in a public
place.
Card cloning The copying of a credit or debit card which uses a magnetic stripe, • Use chip & PIN card instead
cloning needs an electronic device known as a skimmer, skimmers of magnetic stripe cards.
can be placed in ATM slots where they can read all data from a card
• Doregular checks on your
and then copying the data to a fake card.
spendings and check for any
unusual activity with the
bank.
Spam Junk email sent to large number of people, can be used for • Can be used for spreading malware. • Incorrect grammar or spelling in • Use spam filters.
advertising. • Malware: programs installed on the email. • Delete or ignore messages
users’ computer with the aim of • Email has generic greetings. from unknown sources.
deleting. corrupting or manipulating • Absence of logos in email. • Delete accounts that you no
data illegally. longer use.
Authentication Refers to the ability user to prove who they are, there are 3 Authentication methods include:
techniques common factors used in authentication: • User IDs and passwords.
User IDs & ID: identifier for the user. Methods to avoid password interception:
Password Password: a secret string of characters set by a user to identify • Run up to date anti-spyware software.
them to a computer system used as part of authentication system • Change passwords on a regular basis.
to improve security. • Use strong passwords, Rules of strong
passwords:
• At
least I capital letter. I digit. I special
symbol and it should be at least 8
characters.
Biometrics Systems that rely on certain unique physical characteristics of Examples: • Biometrics is unique to each • Slowermethod to enter
human beings to identify a usen • Fingerprint scans. person. system than
• Retina scans. • Passwords can be forgotten
• Expensive to setup.
• Iris recognition • The user has to be present to
• Injuries to fingers can
• Face recognition. use the biometric system cause biometric deuce to
• Voice recognition. fail to recognize the user.
therefore more secure.
• Almost impossible to
duplicate
Zero login Method of login authentication that identifies a user by Behavioural pattern examples: Enhanced security as it is • User's privacy can be
combining both biometric data and behavioural patterns without • How you walk. difficult to copy biometrics violated as sensitive data is
the need to supply any other security information. • Your typing speed.
and behavioural patterns. being recorded.
• Your normal location.
• Easy and quick way to login • Hackers may gam access of
• How you swipe the screen.
toa system. the user's sensitive data in
case of a security
• Expensive to setup.
Magnetic Stripe Security device that stores details on magnetic stripe to allow new • They are easy to use. • No encryption is used and
cards to a building. • Not an expensive technology. the stripe contents can be
• Magnetic cards can be
copied fairly easily.
remotely deactivated.
• The
cards wear out with lot
of use.
• Magnetic readers often fail
to read the cards on first
attempt.
Smart cards Security device that uses RFID technology. the chip on the smart Steps: • PIN can be used to verify the • Possible to hack into the
card can store data such as name, security number, gender, date l. The owner of the card walks up to a security ownership of the card, thus data transmitted by the tag.
of birth and a PIN, gate and presents the smart card. can’t be used if stolen/lost. • Smart cards are expensive
• Very fast read rate. to manufacture than
2. RFID readers on either side of the gate scan
• More robust and reliable
the security data stored on the REID tag. magnetic stripe cards.
compared to magnetic stripe
cards.
CamScanner
3.The user will then be the • Possibleto jam as RFIDs
keypad. use radio
4. If all details match, then access will be
allowed.
Physical tokens A form of authentication that uses a hardware device that Steps: • Security is enhanced as thief • If the token device is lost.
generates a one-time password (OTP), this OTP changes on a l. The customer uses a physical token needs to have the token the user will not be allowed
regular basis and is usually only valid for less than a minute, supplied by device, a cloned card and the to access the system.
card's PIN.
2. The customer inserts their debit card into the
top of the token device and the device either
recognizes the card as genuine or rejects it.
3. The device then asks the customer to press
"IDENTIFY" then enter their PIN.
4. An OTP is then generated and shown on the
device screen
5. The customer goes back to their bank web
page and enters the generated OTP.
If correct, customer is given access to their
6.
account.
Electronic tokens Software installed on a user’s device. such as a smartphone that Steps:
generates an OTP which valid for less than one minute. I. The user installs the electronic token app on
their smartphone.
2, User opens the app when the website
requests the user to authenticate who they
are.
3, The app generates an OTP which is valid
for less than one minute.
4. The user enters this OTP when asked by
the website.
5. The website server SMS the same software
Observation • The system analyst obtains reliable data. • People may work in a different way when being watched,
• Enables the systems analyst to get a better overall view of • The quality and accuracy of information is highly dependent
the system. on the skill of the observer.
• Inexpensive method.
Interviews • More likely to get reliable data. • Time consuming to complete all the interviews.
• Allow lots of very detailed information to be gathered. Expensive method due to system's analyst time.
• Flexible as the systems analyst can change script to suit • Interviewees may not be available at times to suit the analyst.
circumstances.
Questionnaires • Faster to complete all questionnaires • The questions are inflexible since they have to be general
• Itis a relatively inexpensive method. • Users tend to exaggerate their answers as they are anonymous.
• Individuals can remain anonymous. • As it's anonymous people may not take it seriously.
• Individuals can fill it in their own time.
Examination of existing documents • This method allows information to be obtained which • Time consuming to go through the documents.
wasn't • Expensive method as it is time consuming.
• possible by any of the other methods,
• Can see the scale of the problem easily.
• Saves time as there could be copies of previous analysis.
Systems analyst Importance Examples Advantages
Identify inputs, processing and outputs of the current system • Helps the systems analyst to understand how the
system works.
• To be able to identify the input/output devices that
are needed for the new system.
• To be able to identify the processing devices that
are needed for the new system.
• To be able to identify$' the storage space that are
needed for new system.
User and information requirements • To meet all the needs of the customer.
• More efficient system is produced that does what
the customer
• Reducing the costs if the new system matches the
existing hardware and software.
CamScanner
Identify hardware for the new system Input devices:
• Barcode
readers.
• Touchscreen.
Output devices:
• 3D printer.
• Large
monitors.
• Speakers,
Identify software for the new system • Operating Off the shelf software:
system. • Cheaper to purchase as there are no development
• Off the shelf costs,
software. • Minimum training will be required
• Saves development time so can be used sooner.
• More reliable as the any errors will have been
tested.
• More support as it has huge user-base.
Bespoke software:
• Software is specially designed for the sports club
so that it meets their needs.
• Uses less memory as software only has the features
needed by the company,
• Easier to use as less functions in the software,
• Customized support from the systems analyst.
• Can be changed whenever the company needs a
change.
Need for testing • TO make sure that the database used in the system is robust (finalized and fully tested) when the system goes live.
• To make sure that the correct data is stored in files by fully testing validation routines used, by making sure any data
transferred from a paper-based system to an electronic system has been done accurately.
• To ensure the user screens are user friendly and that the correct output is associated with the inputs to the system.
Testing designs Aspects • Testing the data structures.
• Testing the file structures.
• Testing the input methods.
• Testing the output formats.
• Testing the validation rules.
Testing strategies • Testing each module separately.
(for each aspect) • Testing each function in the module separately.
• Testing the whole system (after integrating all modules together).
Testing plan (for each module) • A listof all the tests to be performed.
• Identifying what data is to be tested.
• Identifying what type of test data to be used,
• Identifying live data to be used.
• Identifying the expected outcomes from the testing.
Checking that actual outcomes match the expected ones.
CamScanner
Implementation Definition Advantages Disadvantages Situation where method might be
used
Parallel running The new system runs alongside the old • If the new system fails. the old • Expensive as extra staff is needed to An organization with large
system for a time before the new system system will still be available as a run both systems together. amounts of data which cannot
backup. Time consuming as data needs to be afford to lose data.
takes over completely.
• It is possible to gradually train entered into two systems. An organization where the new
workers on the new system needs to be fully tested.
• system.
Direct Replacing the old system with the new • Costs are less than parallel running as • This method can be disastrous if the • A small organization which can
changeover system immediately. less workers are new system fails since the old the afford to lose data.
system is no longer A small organization where
• The benefits of the new system are
• Available. system needs to be up and
immediate.
running very quickly.
Saves time of implementing the new
system.
Phased New system is introduced part by part. • If the new system fails. then most of • More expensive than direct • An organization where there are
the old system still in place. changeover since it is necessary to clearly defined separate
• Possible to ensure that the new evaluate each phase before processes.
system works properly before • moving to the next stage. • An organization where the new
proceeding. • Very time consuming since each part system needs to be fully tested.
needs to be fully evaluated before
proceeding.
Pilot running Whole system is introduced in one branch • If the new system fails, only one • Takes time to implement the new An organization where there are
at a time. branch is affected. system for all branches in the several branches all doing the
• Possible to train staff in one area only, company, same work.
which is faster and less costly than • An organization where the new
parallel running. system needs to be fully tested.
CamScanner
• How to print data.
• How to delete/edit records.
Technical documentation TO help programmers and systems analysts to make improvements to the • Purpose of the system.
system, repair the system, and maintain the system. • Limitations of the system,
• Hardware and software requirements.
• Sample runs.
• Input format.
• Output format.
• Program listing,
• Program algorithm.
• Program coding.
• File structures.
• Validation routines.
Effects of Definition Uses Positive effects Negative effects Security issues How to protect
microprocessor- against security
controlled devices issues
(smalt devices)
Lifestyle, leisure • They reduce the need for • Then can lead to unhealthy
time and physical people to-do manual task' at home. lifestyles if the dependency on
fitness ready meal is high
• Can be set remotely using a • then make people rather lazy
(in home) smartphone. because a dependence on the
• Cu be used in
device;
the • Lack of exercise result in
• Then people more becoming leg fit.
leisure hobble, shopping • Potential of of household skills.
and socializing, • Problem health issue: from the
• Cooker: be matched on we devices, e.g. microwave
are eat that a cooked meal, leakage-
• Automated burglar alarm:
people a of security
• Smart fridges can be used
to impr0'Æ health lifestyle.
Social interactions • Easier to make new friends chat • Social isolation u people
(in ome) donotmeetåce.to.
• Easier to find people who share
face as much
• Leg expensive to keep touch using • A lack of social interaction may
CamScanner
• people behave differently interact
online (they can be rude more
aggressive).
• Cyberbullying
CamScanner
• Driver and passenger
reluctance to use new
technology.
CamScanner
Fire risk • Overloading of • Have a fully tested C02 fire extinguisher
• Power sockets. • Nearby.
• Overheating of equipment. • Don't overload sockets with too many
• Plugs.
• Don't cover equipment.
• Use a cooling system.
CamScanner