0% found this document useful (0 votes)
26 views20 pages

Ict Special Notes

The document provides a comprehensive overview of input and output devices, memory types, computer types, user interfaces, and validation checks. It details the advantages and disadvantages of various devices such as desktops, laptops, tablets, and smartphones, as well as different input methods like command line and graphic user interfaces. Additionally, it covers storage media, including magnetic, solid-state, and optical devices, along with their respective uses and characteristics.

Uploaded by

dayagami675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views20 pages

Ict Special Notes

The document provides a comprehensive overview of input and output devices, memory types, computer types, user interfaces, and validation checks. It details the advantages and disadvantages of various devices such as desktops, laptops, tablets, and smartphones, as well as different input methods like command line and graphic user interfaces. Additionally, it covers storage media, including magnetic, solid-state, and optical devices, along with their respective uses and characteristics.

Uploaded by

dayagami675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Input devices Output devices

Used to enter data or instructions into a computer Used to show the computer’s output in a form that is
directly. understood by a human.
Can send data to another device. but it can’t receive Can receive data from another device, but it can’t send
data from another device. data to another device.
Under
the control of the user or can be direct data Under the control of the computer.
entry.
More complex. Less complex.

RAM ROM
Volatile memory. Non-volatile memory.
Temporary memory device. Permanent memory device.
Can be written to and read from. Can only be read from but not written to.
Store data. programs or parts of the operating
system Stores the startup instructions when the computer is
that are currently in use. first switched
on.
Tends to have greater storage capacity. Lower storage capacity

Main/Internal memory Backing storage


Directly accessible by CPU Not directly accessible by CPU
Faster access speed Slower access speed
Lower storage Tends to have greater storage
RAM & ROM are fixed inside the computer Can either be fixed or it can be removable
Can be volatile (RAM) and non-volatile (ROM) Non-volatile
More expensive per unit storage Cheaper per unit storage
Stores bootup instructions and can hold data during Stores files and software
processing

Types of computer Advantages Disadvantages


* [ess chance to be stolen. = Not very portable.
Desktop computer
® | ess expensive to upgrade. * Consume more physical space.
= More data storage. = It needs constant power supply.
Lapto * Low power consumptions. * Easier
to lose/steal comparedto PCs.
P P * Low heat generation. * Have limited battery life.
* Can be used if there’s a power cut. * Not always possible to upgrade them.

Tablets * Very fast to switch on. * Have less storage capacity than laptops
* Have better battery life than laptops. and Pcs.
* Less heat 1s generated. * Expensive when compared to laptops.

Smartphones than laptops.


* More portable than laptops/PCs.
* Small kevboards
* Can use several apps. » Less storage capacity than laptops/PCs.
* Easier to use than laptops. * Easier to lose than laptops and PCs.

User interface Advantages Disadvantages


types
* Uses less memory
than GUIL * Commands
must be learnt and memorized
Command life * Requires less processing power than GUIL bv the user.
interface #» The user is in direct contact with the * Commands
must be typed in exactly.
computer. * Commands
must be tvped which takes
time.

Graphic user * No need to memorize


® More user friendly
than CLL
any commands. * Consumes more memory than CLI.
* Requires more processing power than
interface = Fewer errors are made. CLL
* Computer settings are protected from the
user.

Dialogue based * Very useful for people with disabilities.


* Can be used as a security feature to
* Can be too complex to setup.
® User needs to know which commands can
interface identify a person. be used.

* No physical contact required. * Only works near to the camera or sensor.


Gesture based * No training needed to interface with the * May only accept a limited number of
interface computer. movements.

CamScanner
Pointing Advantages Disadvantages Uses
devices “input"
* Doesn’t need a large desk area * Difficult to use if no flat surface * Moving and deleting files.
Mouse when compared to keyboard. readily available. * Controlling the position
» Faster way to choose an option » Difficult to use for people with of a pointer on the screen.
compared to keyboard. restricted hand movement.

Touchpad e Takes less physical space than


mouse.
« Difficult to control compared to
mouse.
e Moving and deleting files.
* Controlling the position
* More suitable if there 1s no flat * Difficult to use for people with of a pointer on the screen.
surface available. restricted hand movement.

* Needs less desk space than a e Needs training as it’s not * In some luxury cars to
Tracker ball mouse. standard equipment. select functions.
Easier to use than a mouse. * More expansive.

Other input Advantages Disadvantages Uses


devices
Keyboard * Easy way to input data.
* Allows to input variety of data.
e Slower method compared to
direct data entry devices.
¢ Input of data into
applications software.
¢ Fast entry of new text. e Large device which uses up ¢ Typing in commands to
desk space. the computer.
* Very easy to carry around. e Have small keys which can
Numeric * Faster than keyboards to input make nput more difficult.
e In ATMs to enter data.
¢ Fast entry of numeric data
keypad numbers. * Not used to enter text. into a spreadsheet.

Rem ote * Operate devices from distance. | * Objects between the device and |« TV.
* Useful for people with walking | the remote control can prevent
control difficulties. its operation.
e Hard
to use if the user
has
disability in hand movement.
JO Stick e Control is more realistic than |« More difficult to control a « In video games.
y using a mouse. pointer using a joystick than * Flight simulators.
* Easier than keyboard to other pointing devices.
navigate the screen.

Drivin * Easter than a keyboard to e More expansive compared to | ¢ In video games.


g control steering movements. mouse or joystick. * Flight simulators.
wheel
TO“ Ch * Easy method to choose options. | « Limited number of options. * In ATMs.
» Faster entry of options. e Screen can get dirty with * Mobile phones, tablets,
screen constant touching. phablets.

. Its faster to read text than to e Use up a lot of computer ¢ To input speech in
Microphone Sk memory. presentations.
Gra hic * More accurate in drawing than | ¢« More expensive than other e To input freehand
p using pointing devices. pointing devices. drawing.
tablet
Dicital * The image can be immediately | * Images often need to be * Taking pictures.
gl seen on the screen. compressed to reduce amount
camera of memory used.
* Allows image to be stored for | e Can be slow. ¢ Scan in documents and
Scanner further editing. convert them into a digital
format.

Light pen ¢ Greater accuracy than touch


screen.
e Problems with lag when
drawing on screen.
¢ Selecting/drawing objects
on CRT screens.

(%] CamScanner
Direct data Advantages Disadvantages Uses
entry (DDE)
Onptical * Faster data entry system than | ® Device has difficulty in reading | ® Processing of passport and
P manually typing data. handwriting. identity cards.
character * Errors are reduced as thereis | « Not a very accurate technique
d no manual input. to read text.
reaaer
(OCR)
Optic a] * Very fast way of inputting data. | ¢ If the marks don’t fill the space | ®* Multiple choice
* More accurate than keying in completely they may not be examination papers.
mark reade[‘ the data. read correctly. * School registers.
* More accurate than OCR. e If the marks are not dark
(OMR) enough they may not be read
correctly.
* Much faster than keying in data | « More expensive system than ¢ In supermarket.
Barcode manually. using keyboards. e libraries.
['eader ¢ Errors are reduced as there is « Barcodes can be more easily
no manual input. damaged compared to RFID.
chips and magnetic stripes.
Qlli Ck ¢ Can hold more data than ¢ Cam be used to transmit * Giving automatic access
traditional barcodes. malicious codes. to a website.
re spon Se * Faster and easier to scan. ¢ More than one QR format is
( QR) available.

Radio * Can store more data than ¢ Can hack into the data by the | ¢ Contactless payment.
barcode. fag. * (tag: contain Microchip
frequency * Allows greater security than « Initial cost is more expensive to store & transmit data
. . . barcode. than barcode. and Antenna to receive &
identification . Very fast read rate. « Tag collision may occur. transmit data)
(RFID)
: ¢ Much faster than keying in data | ¢ Data will be lost if its * ATM cards.
Magnetlc manually. damaged.
st ripe reader |* Errors are reduced as there is | » Doesn’t work at a distance.
no manual input.
: ¢ More secure than contactless as | * Ensure PIN isn’t read by * ATM cards.
Chlp and PIN must be typed. somebody else while typing.
PIN reader |+ More robust system than
magnetic stripe.
ContaCtleSS * Faster transaction than other * More expensive than normal e ATM cards.
payment methods. card.
card reader ¢ The card may be read
accidentally.
* Take more accurate readings ¢ Can give false results. * Temperature sensor.
Sensors than humans.

(%] CamScanner
Monitors Advantages Disadvantages Uses
CR’I‘ o Least expensive monitor to buy. | ¢ Heavyweight devices. ¢ Allow designs to be
e They allow the use of light * Have large footprint. created on screen with
pens. ¢ Consume more power. light pens.
Y * Lighter than CRT. * More expensive to buy than * Mobile phones. tablets
LCD /TFT e Less power consumption than CRT. and laptops use LCD
CRT. * Narrower angle of viewing screens.
e Sharper image than CRT. compared to CRT.
* Thinner and Lighter. * More expansive.
LED * Less power consumption.
* Run cooler.
o Sharper image.

Printers Advantages Disadvantages Uses


Lasel‘ ¢ Higher printing quality. e Higher initial cost. ¢ produce 500 high-quality
¢ Higher printing speed. flyers.

Illkj et ¢ Low initial cost. * High running cost. * Printing photographs.


¢ High printing quality. ¢ Can’t do large print jobs. ¢ colored high-quality
photo.
¥ = ¢ Best printer to work in dusty * Low printing speed. * produce a shop receipt.
Dot-matrix environment. e Low quality printing.
¢ Very cheap to run and * Very noisy.
maintain.

3D * Easier to produce customized | ® High initial cost. * produce a customized


items. e Can be used to produce solid object.
¢ Medical benefit. dangerous items. * Surgical equipment.

Other output| Advantages Disadvantages Uses


devices
Plotter e Large output can be produced. | ® Very high initial cost. * Producing architectural
¢ Very high-quality printing. ¢ Very slow at printing. drawings.

: ¢ Enables many people to see a | ® Expensive to buy. ¢ Home cinema system.


PI'OJ ector presentation. e Difficult to set up. e For presentation.
* Avoids the need for several
networked computers.
Spe akers * Very simple technology. e Can have large footprint. e Used in all phones

Actuators ¢ They allow remote operation | ¢ Could go wrong. e Controlling robot arm.
of many devices.

(%] CamScanner
Magnetic Advantages Disadvantages Uses
media/storage
devices
Fixed
5
.
hard
o
* Large storage capacity.
* Fast data transfer rate.
* Noisy when compared to SSD.
* Have many moving parts
| * To store the operating
system.
dlSk drlve * Fast data access time. ““affect their reliability ™. * To store system software.

(HDD)
* Large storage capacity. ® Data transfer rate is not as fast | ®* To store backups.
Por:table .hard * Fast data transfer rate. as HDD. _ * To transfer data between
dlSk dnve e Fast data access time. * Have many moving parts. computers.

- * Huge storage capacity. * Very slow data access time. * To store backups.
Magne‘?lc * Fast data transfer rate. * They are affected by magnetic
tape drive |+ Cheaper per unit memory field.
than HDD.

Solid state Advantages Disadvantages Uses


media/storage
devices
SSD * Faster data transfer than * More expensive per unit * To store the operating
HDD. memory. system.
* Faster data access time than | ®* HDD has greater longevity * To store system software
HDD. than SSD. and working files.
* [ ess power consumption
than HDD.
* Run quieter and lighter than
HDD.
P en * Very portable. e Easy to lose. * To store backups.
®* Not affected by magnetic * [ ower storage capacity than ® File transfer between
driv e/Memory field. HDD. different computers.
. * More expensive per unit
stick memory than HDD.

Memory
.
cards ® -ciamiy —_
* Small and can be easily used. | * Lower storage capacity than
i
* To store photos on digital

* More expensive per unit * To store backups.


memory HDD.

Optical Advantages Disadvantages Uses


media/storage
devices
_ * Less expensive than HDD. * Data transfer rate is slower e CD: to store music and
CD/DVD than HDD. software.
ROM ® Data access time is slower than | ®* DVD: to store movies.
HDD.
= * Cheaper than RW disks. * Not all CD/DVD drives can * File transfer between
CD /DVD R * Once burned they behave read them. different computers.
like ROM. e Archiving of data.
_ * Can be written over many * More expensive than ROM and | * To store data and
CD/DVD times. R formats. backups.
RW ® Files/data can be added ata | *® It can overwrite data * File transfer between
later stage. accidentally. different computers.
A e Can read and write data at * More expensive than other * To store backups.
DVD RAM the same time. CDs/DVDs. * File transfer between
different computers.

Blu_ray * Greater storage capacity. * Most expensive optical device. | ®* To store HD movies and
* Faster data access time than games.
others. * To store backups.
* Faster data transfer rate than * File transfer between
others. different computers.

(%] CamScanner
Validation check Description Example
Checks if data is present and hasn’t A person’s ID may be required.
Pl'esence CheCk been left blank. If no data entered. an error message will be
produced.

Lookup check Checks if value entered 1s available 1n a


limited list of items.
When registering a course in IGSES, the session
must be either June, Nov or Jan. no other entry
should be accepted.

To check if a student’s age 1s <18 and >0.


Range check * Checks whether numeric data is
within given values.
* Uses 2 boundaries.

* Checks whether numeric data is To check if a student’s age 1s <18.


Limit check within given values.
* Uses 1 boundary only.

Length check Checks if the input data contains the


required number of characters.
If a field needs 6 digits, then inputting 5 digits
should case an error message.
Checks that the mput data has
Type check appropriate data type.
A person’s age should be numeric integer not
alphanumeric.
Checks the data is in a specific format A date should be in the form of dd/'mm/vyyv.
Format check or fixed pattern.
It checks that a string of characters A name should not contain characters such as %.
Character check doesn’t contain any invalid characters
or symbols.

Check digit A validation check used 1n barcodes to


validate the correctness of the barcode.
Validating the correctness of a barcode.

Types of Definition Advantages Disadvantages


networks
Network that uses cables and
LAN "local covers small geographic
area network" area.

WLAN Network that uses wireless


communication to connect
¢ Reduces cost of cables.
Safer as users won't trip
¢ Less secure.
¢ The data transfer rate is
" Wireless local between devices in small over wires. slower than in LAN.
" geographic area. * Easier to connect other * Physical obstacles can affect
area network devices to the network. the signal.
e Network that covers large
WAN WId € geographic area.
area network"
Similarities Differences
Bluetooth & Wi-Fi Bluetooth & Wi-Fi
Both use wireless communication Wi-Fi has faster data transfer rate than Bluetooth
Both use radio waves for communication Wi-Fi has greater range of transmission than Bluetooth
Both allow several devices to be connected Wi-Fi connects more devices than Bluetooth

Both use security when sending data Bluetooth is simpler to use and setup
Cost of Bluetooth is cheaper than Wi-Fi

(%] CamScanner
Network devices Function
¢ Allows a computer to be connected to a network.
Network interface ¢ Connects the MAC address of the computer.
card "NIC"
¢ Connects number of devices to form a network.
Hub * Broadcasts incoming data packets to every computer in the network.

¢ Connects number of devices to form a network.


Switch ¢ Sends the data packets to the destination computer only.

Bridge ¢ Connects one LAN to another LAN that uses the same protocol.
e Used to connect different parts of a LAN so that they can function as a single LAN.

RO uter ¢ Connecting networks and devices to the internet.


¢ Storing computer addresses.
¢ Routing data packets.

Firewall o Blocks traffic that doesn't meet the criteria.


¢ Warns and prevents unauthorized access to the system.
¢ Can prevent viruses being transmitted.

¢ Monitors internet usage.


Internet service * Gives uses an IP address.
provider "ISP" * Provides security services.

* Data packets are sent to the switch/hub and then passed to router.
IP address * Router inspects the IP address of the data packets sent to it.
"Internet protocol" » Router looks up the paths to get to that address using its routing table.
» Router then checks how busy the oaths are and identities the quickest path.
¢ Router is then able to route the data packets to reach the correct switch/hub.
¢ Switch/Hub sends the data packets to the destination computer.

Similarities Differences
Hub & Switch Hub & Switch
Both are used to connect devices to form a LAN. Security is lower in hubs.
Both use data packets. Switch uses MAC addresses to locate the destination of the device.
Both check/read the data packets. In a hub a data packet is sent to every device on the LAN.

Similarities Differences
Internet & Intranet Internet & Intranet
Both are networks. Internet public access.
Both are communication systems. Internet less secure.
Both use HTML to write the web pages. Internet wider range of resources.
Both use internet technologies. Internet information is less relevant/reliable.

(%] CamScanner
Website Definition
A web document written in HTML.
Webpage Features that can be inserted: text, image, videos & sound.
WebSit e It 1s a collection of webpages related together using hyperlinks.

. Word/phrase/image when clicked links to another website or another portion in the


Hyperllnk same webpage.

Hypertext markup A mark-up language used to create webpages uses tags to format content.
language "HTML"'
s Information space that consists of massive collection of web pages all connected
WOl'ld WIde web together using hyperlinks, WWW is only part of the internet that can be accessed by
uwww " web browser.

Webserver Comput erns webpages, it has an IP address and a domain name.


that contai

A program that allows a user to view webpages.


Web browser Function: translates HTML. provides an address bar, provides navigation tools. records
user history & allows the use of multiple tabs.
A unique address for a resource located on the internet, the user-friendly version of the
Uniform resource IP address. http://www.cie.org uk/gcseict/giraffe html
" "
locator "URL protoc ol:nfl: =
domain type: org
country code: uk
path: gcseict
filename: giraffe html

Protocol Definition Uses


A set of rules agreed by the sender and
Protocol the recipient when data is transferred
between devices.
The main protocol that controls the * Accessing the WWW.
HyperteXt transmission of data to and from ¢ Transferring contents of a webpage to a
transfer protocol | webservers. gemom- e
"HTTP" ¢ Downloading from webserver.

Protocol used to control the transmission


HyperteXt of data to and from webservers but with
transfer protocol | encryption uses SSL.
a P Encryption: the process of scrambling
secure "HTTPS'" | characters of a message so that message
becomes meaningless to unauthorized
users, plain text is encryptedto cypher
text using an encryption algorithm and an
encryption key. cypher text is decrypted
back to plain text using decryption key.
A security protocol that uses encryption | ® Online banking.
Secu re SOCket to allow data to be exchanged securely ¢ Online shopping.
layer " SSL " between two devices over the internet. * Sending and receiving emails.
* Using cloud storage facilities.
Protocol used to transfer files from one * Transferring files.
File trflESfer = ;omputct to another over the internet. * Downloading from file servers.
teps:
pl‘OtGCOl FTP Download the FTP client program,
connect to the FTP server using the FTP
client program_ loginto the server using
FTP username and password, locate the
files on your computer, click upload
button on FTP client program and upload
the files to the folder.
. A set of rules that enables people to use e Video conferences.
Voice over the internetto make phone calls. g s——
internet protocol
'!VOIP "

(%] CamScanner
Security Definition Possible effects How to identify How to protect
threats
Virus Program that replicates itself • Deletefiles. • Deletion of files without user's • Use
up to date anti-virus
• Causes a computer to become consent. software.
unresponsive. • Don't use software from
• Computer becomes unresponsive.
• Causes software errors. • Random reboots.
unknown sources.
• Software errors. • Scan email attachments. Use
a firewall.
Spyware Software that records the key presses on the user's keyboard, this • Gives the originator the access to all • Use up to date anti-spyware
"key logging data is then sent to the originator of the software. data entered by the users’ keyboards software.
software" including sensitive data. • Use pointing device instead
of typing,
• Use a firewall.

Hacking The process of gaining unauthorized access to a computer system. • Misuse of personal information. • Use of firewalls.
• Data can be changed. • Use strong passwords.
• Data can be copied from a system. • Use biometrics,
• Data can be deleted.

Phishing The creator sends out a legitimate looking email that contains a link • The creator of the email can gain • Spellingor grammar mistakes in • Usespam filters.
when clicked it opens a fake website designed to obtain sensitive sensitive data. text. • Don't
click links from
data. • Credit card fraud. • Email urges you for a quick reply, unknown sources.
• Asking for personal details. • Never reveal personal
details.
• Report any suspicious
activity.
Smishing The creator sends SMS to the user's phone that contains a telephone • The creator of the SMS can gain • Spelling or grammar mistakes in • Ignore text messages from
number to call or contains a link when clicked it opens a fake website sensitive data. numbers you don’t
• Askingfor personal details.
to obtain sensitive data. recognize.
• Credit card fraud. • SMS from unknown source,
• SMS sent at an unusual time. • Report any smishing
attempts.
• Never click on links in text
messages from unexpected
people.
Vishing A voicemail message is used to trick the user into calling the • Creatorof vishing scam can gain • Askingfor personal details. • Never reveal personal details
telephone number contained in the message, the user will be asked sensitive data. • Voicemailfrom unknown over the mobile phone.
to supply personal data thinking they are talking to somebody who • Credit card fraud. telephone number. • Ignore voicemail from
works for a legitimate company. • Voicemail has generic greetings. unknown number.
• Report any vishing attempts,
Pharming A malicious code is installed on the user’s computer that redirects • The creator of the malicious code • Website's URL is incorrect. • Checkthe spelling of URL of
the user to a fake website designed to obtain sensitive data. can gain sensitive data. • If
webpage is requesting personal the website.
information and its URL states
• Credit card fraud.
with http instead of https
CamScanner
• Checking that the URL
contains https or a locked
padlock sign next it,
• Using
up to date anti-
malware software.
Card fraud The illegal use of a credit or debit card. • Card cloning.
• Shoulder surfing when using the
• Keylogging software.
• Phishing/smishing/
vishing
pharming.
Shoulder A form of data theft where criminals steal card data from a victim • Somebody watching you typing • When using ATMs, shield
surfing when using it. the card PIN by looking over your the keyboard with your other
shoulder. hand.
• Somebody listening in when you • When using a mobile device,
are giving credit or debit card never key in data in a public
details over the phone, place.
• Don't speak card details into
your smartphone in a public
place.
Card cloning The copying of a credit or debit card which uses a magnetic stripe, • Use chip & PIN card instead
cloning needs an electronic device known as a skimmer, skimmers of magnetic stripe cards.
can be placed in ATM slots where they can read all data from a card
• Doregular checks on your
and then copying the data to a fake card.
spendings and check for any
unusual activity with the
bank.
Spam Junk email sent to large number of people, can be used for • Can be used for spreading malware. • Incorrect grammar or spelling in • Use spam filters.
advertising. • Malware: programs installed on the email. • Delete or ignore messages
users’ computer with the aim of • Email has generic greetings. from unknown sources.
deleting. corrupting or manipulating • Absence of logos in email. • Delete accounts that you no
data illegally. longer use.

Security measures Definition Uses/Steps/Examples Advantages Disadvantages

Authentication Refers to the ability user to prove who they are, there are 3 Authentication methods include:
techniques common factors used in authentication: • User IDs and passwords.

Something you know (password or PIN code) • Biometrics.

Something you have (mobile phone or tablet) • Zero login.

Something which is unique to you (biometrics) • Magnetic stripe cards.


• Smart cards.
• Physical tokens.
• Electronic
• Two-factor authentication.
• Digital certificates.

User IDs & ID: identifier for the user. Methods to avoid password interception:
Password Password: a secret string of characters set by a user to identify • Run up to date anti-spyware software.
them to a computer system used as part of authentication system • Change passwords on a regular basis.
to improve security. • Use strong passwords, Rules of strong

passwords:
• At
least I capital letter. I digit. I special
symbol and it should be at least 8
characters.
Biometrics Systems that rely on certain unique physical characteristics of Examples: • Biometrics is unique to each • Slowermethod to enter
human beings to identify a usen • Fingerprint scans. person. system than
• Retina scans. • Passwords can be forgotten
• Expensive to setup.
• Iris recognition • The user has to be present to
• Injuries to fingers can
• Face recognition. use the biometric system cause biometric deuce to
• Voice recognition. fail to recognize the user.
therefore more secure.
• Almost impossible to
duplicate
Zero login Method of login authentication that identifies a user by Behavioural pattern examples: Enhanced security as it is • User's privacy can be
combining both biometric data and behavioural patterns without • How you walk. difficult to copy biometrics violated as sensitive data is
the need to supply any other security information. • Your typing speed.
and behavioural patterns. being recorded.
• Your normal location.
• Easy and quick way to login • Hackers may gam access of
• How you swipe the screen.
toa system. the user's sensitive data in
case of a security
• Expensive to setup.
Magnetic Stripe Security device that stores details on magnetic stripe to allow new • They are easy to use. • No encryption is used and
cards to a building. • Not an expensive technology. the stripe contents can be
• Magnetic cards can be
copied fairly easily.
remotely deactivated.
• The
cards wear out with lot
of use.
• Magnetic readers often fail
to read the cards on first
attempt.
Smart cards Security device that uses RFID technology. the chip on the smart Steps: • PIN can be used to verify the • Possible to hack into the
card can store data such as name, security number, gender, date l. The owner of the card walks up to a security ownership of the card, thus data transmitted by the tag.
of birth and a PIN, gate and presents the smart card. can’t be used if stolen/lost. • Smart cards are expensive
• Very fast read rate. to manufacture than
2. RFID readers on either side of the gate scan
• More robust and reliable
the security data stored on the REID tag. magnetic stripe cards.
compared to magnetic stripe
cards.
CamScanner
3.The user will then be the • Possibleto jam as RFIDs
keypad. use radio
4. If all details match, then access will be

allowed.
Physical tokens A form of authentication that uses a hardware device that Steps: • Security is enhanced as thief • If the token device is lost.
generates a one-time password (OTP), this OTP changes on a l. The customer uses a physical token needs to have the token the user will not be allowed
regular basis and is usually only valid for less than a minute, supplied by device, a cloned card and the to access the system.
card's PIN.
2. The customer inserts their debit card into the
top of the token device and the device either
recognizes the card as genuine or rejects it.
3. The device then asks the customer to press
"IDENTIFY" then enter their PIN.
4. An OTP is then generated and shown on the
device screen
5. The customer goes back to their bank web
page and enters the generated OTP.
If correct, customer is given access to their
6.

account.
Electronic tokens Software installed on a user’s device. such as a smartphone that Steps:
generates an OTP which valid for less than one minute. I. The user installs the electronic token app on
their smartphone.
2, User opens the app when the website
requests the user to authenticate who they
are.
3, The app generates an OTP which is valid
for less than one minute.
4. The user enters this OTP when asked by

the website.
5. The website server SMS the same software

as the app and will generate the same OTP.


Once the OTP is verified by the website,
6.

the user will be allowed access.


Two-factor A form of verification which requires two methods of Example 1:
authentication authentication to verify a user; this makes it harder for the A code is sent to a device that is pre-set by the
hacker to access the system as it adds an extra level to hack user. The system requires the user to input this
code in order to log in.
Example 2:
The system requires the user to input log-in
details from a specific computer.
Digital An electronic document sent with an electronic message that is Items in digital certificate:
certificate used to verify the identity of the sender. contains a unique key • Serial number.
used by sender and receiver that allows computers to exchange • Public key
information over the Internet securely. • Digital signature.
• Valid from. Valid to.

Methods of researching the current system Advantages Disadvantages

Observation • The system analyst obtains reliable data. • People may work in a different way when being watched,
• Enables the systems analyst to get a better overall view of • The quality and accuracy of information is highly dependent
the system. on the skill of the observer.
• Inexpensive method.
Interviews • More likely to get reliable data. • Time consuming to complete all the interviews.
• Allow lots of very detailed information to be gathered. Expensive method due to system's analyst time.
• Flexible as the systems analyst can change script to suit • Interviewees may not be available at times to suit the analyst.
circumstances.
Questionnaires • Faster to complete all questionnaires • The questions are inflexible since they have to be general
• Itis a relatively inexpensive method. • Users tend to exaggerate their answers as they are anonymous.
• Individuals can remain anonymous. • As it's anonymous people may not take it seriously.
• Individuals can fill it in their own time.
Examination of existing documents • This method allows information to be obtained which • Time consuming to go through the documents.
wasn't • Expensive method as it is time consuming.
• possible by any of the other methods,
• Can see the scale of the problem easily.
• Saves time as there could be copies of previous analysis.
Systems analyst Importance Examples Advantages
Identify inputs, processing and outputs of the current system • Helps the systems analyst to understand how the
system works.
• To be able to identify the input/output devices that
are needed for the new system.
• To be able to identify the processing devices that
are needed for the new system.
• To be able to identify$' the storage space that are
needed for new system.
User and information requirements • To meet all the needs of the customer.
• More efficient system is produced that does what
the customer
• Reducing the costs if the new system matches the
existing hardware and software.

CamScanner
Identify hardware for the new system Input devices:
• Barcode
readers.
• Touchscreen.
Output devices:
• 3D printer.
• Large
monitors.
• Speakers,

Identify software for the new system • Operating Off the shelf software:
system. • Cheaper to purchase as there are no development
• Off the shelf costs,
software. • Minimum training will be required
• Saves development time so can be used sooner.
• More reliable as the any errors will have been
tested.
• More support as it has huge user-base.
Bespoke software:
• Software is specially designed for the sports club
so that it meets their needs.
• Uses less memory as software only has the features
needed by the company,
• Easier to use as less functions in the software,
• Customized support from the systems analyst.
• Can be changed whenever the company needs a
change.
Need for testing • TO make sure that the database used in the system is robust (finalized and fully tested) when the system goes live.
• To make sure that the correct data is stored in files by fully testing validation routines used, by making sure any data
transferred from a paper-based system to an electronic system has been done accurately.
• To ensure the user screens are user friendly and that the correct output is associated with the inputs to the system.
Testing designs Aspects • Testing the data structures.
• Testing the file structures.
• Testing the input methods.
• Testing the output formats.
• Testing the validation rules.
Testing strategies • Testing each module separately.
(for each aspect) • Testing each function in the module separately.
• Testing the whole system (after integrating all modules together).
Testing plan (for each module) • A listof all the tests to be performed.
• Identifying what data is to be tested.
• Identifying what type of test data to be used,
• Identifying live data to be used.
• Identifying the expected outcomes from the testing.
Checking that actual outcomes match the expected ones.

Testing data Normal: This is data that is acceptable.


Abnormal: This is data outside the limits of acceptability.
Extreme: This is data at the limits of acceptability and should be accepted.
Live: This is actual data with known outcomes.

CamScanner
Implementation Definition Advantages Disadvantages Situation where method might be
used
Parallel running The new system runs alongside the old • If the new system fails. the old • Expensive as extra staff is needed to An organization with large
system for a time before the new system system will still be available as a run both systems together. amounts of data which cannot
backup. Time consuming as data needs to be afford to lose data.
takes over completely.
• It is possible to gradually train entered into two systems. An organization where the new
workers on the new system needs to be fully tested.
• system.

Direct Replacing the old system with the new • Costs are less than parallel running as • This method can be disastrous if the • A small organization which can
changeover system immediately. less workers are new system fails since the old the afford to lose data.
system is no longer A small organization where
• The benefits of the new system are
• Available. system needs to be up and
immediate.
running very quickly.
Saves time of implementing the new
system.
Phased New system is introduced part by part. • If the new system fails. then most of • More expensive than direct • An organization where there are
the old system still in place. changeover since it is necessary to clearly defined separate
• Possible to ensure that the new evaluate each phase before processes.
system works properly before • moving to the next stage. • An organization where the new
proceeding. • Very time consuming since each part system needs to be fully tested.
needs to be fully evaluated before
proceeding.
Pilot running Whole system is introduced in one branch • If the new system fails, only one • Takes time to implement the new An organization where there are
at a time. branch is affected. system for all branches in the several branches all doing the
• Possible to train staff in one area only, company, same work.
which is faster and less costly than • An organization where the new
parallel running. system needs to be fully tested.

Documentation Purpose This can consist of any of the following


User documentation Learn how to use a system, overcome errors in a system. • Purpose of the system.
• Limitations of the system.
• Hardware and software requirements.
• Sample runs.
• Input format.
• Output format.
• How to load install/run the software.
• How to use the system.
How to save file,

CamScanner
• How to print data.
• How to delete/edit records.

Technical documentation TO help programmers and systems analysts to make improvements to the • Purpose of the system.
system, repair the system, and maintain the system. • Limitations of the system,
• Hardware and software requirements.
• Sample runs.
• Input format.
• Output format.
• Program listing,
• Program algorithm.
• Program coding.
• File structures.
• Validation routines.

Effects of Definition Uses Positive effects Negative effects Security issues How to protect
microprocessor- against security
controlled devices issues
(smalt devices)
Lifestyle, leisure • They reduce the need for • Then can lead to unhealthy
time and physical people to-do manual task' at home. lifestyles if the dependency on
fitness ready meal is high
• Can be set remotely using a • then make people rather lazy
(in home) smartphone. because a dependence on the
• Cu be used in
device;
the • Lack of exercise result in
• Then people more becoming leg fit.
leisure hobble, shopping • Potential of of household skills.
and socializing, • Problem health issue: from the
• Cooker: be matched on we devices, e.g. microwave
are eat that a cooked meal, leakage-
• Automated burglar alarm:
people a of security
• Smart fridges can be used
to impr0'Æ health lifestyle.
Social interactions • Easier to make new friends chat • Social isolation u people
(in ome) donotmeetåce.to.
• Easier to find people who share
face as much
• Leg expensive to keep touch using • A lack of social interaction may

Volp make people mote of meet


people m real life.

CamScanner
• people behave differently interact
online (they can be rude more
aggressive).
• Cyberbullying

Security of data (in • can to sabotage •different each


home) the mart dente. dente.
• can communicate •install software
remotely 'Aith nut updates, which
device your home. often contain
• Hackers can new security
data about features
• hacking into a central-
heating controller, it
possible for a hacker to
gain credit card
information
controlling transport • Monitoring • Controlling traffic will • A hacker could gain access to the
Controlling of traffic on reduce traffic jams and minimize computerized system and cause
motorways. everyone's journey time. disruption.
Transport systems are
• Congestion zone

• If the computer system fails, the
more efficient (as more transport
monitoring whole transport system could be
vehicles can use the transport
• Automated network, allowing for more regular brought to a standstill.
Number plate services). • Poorly designed systems could
recognition (ANPR) • Traffic offences can be compromise safety.
Automated automatically penalized using
• •ANPR systems mean that
ANPR.
control of traffic hght5. • Stolen cars and criminals innocent people's movements can
can be spotted using ANPR. easily be tracked, which violates
' Air traffic control
• Computerized control systems privacy.
minimize human error, which
reduces the rate of accidents.
Autonomous Vehicles that rely on sensors, cameras, • Safer because human error is • Very expensive system to
(Driverless) vehicles microprocessors, and actuators to control removed, leading to fewer set up.
their movement. Microprocessors process accidents. • Possibility of hacking
the data received from cameras and sensors • Better for the environment into the vehicle’s control
and send signals to actuators to perform because vehicles will operate system.
physical actions. more efficiently. • Software glitches could
• Can reduce traffic congestion. lead to potential
• Increased lane capacity (due disasters.
to better braking and • Cameras need to be kept
acceleration responses, clean so that they do not
together with optimized give false results.
distance between vehicles). • Sensors could fail in
• Can reduce travel time. heavy snowfall or
• Can self-park, reducing the blizzard conditions.
time to find a parking spot. • Reduction in the need for
taxis could lead to
unemployment.

CamScanner
• Driver and passenger
reluctance to use new
technology.

Effects of ICT on health Caused by Ways of minimizing the health risk


Eyestrain / Headache • Staring at a computer screen for a long time. • Take regular breaks.
• Having incorrect lighting in the room, • Make use of anti-glare screen.
• Sitting to close to a screen. • Use flat screens (TFTLCDLED) the flicker.
• Using dirty screens. • Improve the lighting in the room to match the brightness of the screen.
• Using flickering screens (CRT), • Turn the brightness down on the screen.
• Keep the screen clear ofdust and dirt.
• Test eyesight regularly.
Back and neck problems • Sitting in front of a computer screen for long time in the same position. • Take regular breaks
• Sitting in front of a computer for a long time in the wrong posture. • Sit with the correct posture.
• Use ergonomic chairs to give the correct posture.
• Do back and neck exercises,
• Use foot rests to improve posture.
• Use monitors that can tilt to reduce neck problems.
Repetitive Strain Injury (RSI) • • Take regular breaks.
• Holing a mouse with repetitive clicking on buttons, • Use an ergonomic keyboard/mouse,
• Use a wrist rest.
• Use a mouse rest.
• Exercise the hand and fingers.
• Use voice-activated software.
Effects of ICT on physical safety Caused by Ways of protection
Electrocution • Touching bare wires. • Check insulation on wires regularly,
• Spilling liquids near • Don't allow liquids or drinks near
• electrical equipment. • Computers.
• Use RCB.
Tripping and falling over trailing wires • • Use cable ducts to make the wires safe.
• Fix wires along walls and under carpets
• cables.
• to prevent any contact between
• people and wires.
• Use wireless connections wherever
• Possible.
Heavy equipment falling and causing injury • Placing devices near the • Use strong desks and tables to support
• edge of tables, • heavy hardware,
• Placing heavy equipment • Place devices in the middle of table.
• on weak tables or shelves. • Use large and sturdy desks.

CamScanner
Fire risk • Overloading of • Have a fully tested C02 fire extinguisher
• Power sockets. • Nearby.
• Overheating of equipment. • Don't overload sockets with too many
• Plugs.
• Don't cover equipment.
• Use a cooling system.

CamScanner

You might also like