-ICT summary notes lat minutes Revision 2023
-ICT summary notes lat minutes Revision 2023
r
2) State what is meant by software.
he
te i
42 to st an
• Programs for controlling the operation of a computer
ac
• Can not be touched
98 u ali rgh
3) Optical Character Reader (OCR)
• Convert scanned image to a text file which can be edited (processed) by another software
i
pe M
package such as word processors, spreadsheets, databases
ed
4) Optical Mark Reader (OMR)
i
11 r
•
c
Reads multiple choice candidate exam answers & Questionnaires where responses are
Pr T m
12 e
M
5) Barcode Reader
t
09 a
•
M
According to the intensity of the reflections (white reflects more light than black) the code is
g
detected
id
br
• The codes in the pattern contain a small amount of data; such as website URLs and contact
Ca
details.
• Many smart phones have QR readers and the codes can be scanned quickly to access
information.
• The codes avoid the user having to remember long telephone numbers and website
addresses, because the QR reader will quickly convert the QR code into the information.
r
9) Biometric readers (Fingerprint scanners, Retina scanners, Iris recognition, Face
he
recognition, Voice recognition)
te i
42 to st an
ac
Advantages
• unique as no two people have the same fingerprint
98 u ali rgh
• difficult to be copied
• impossible to be lost or forgotten
i
Disadvantages:
pe M
• expensive equipment and takes time to scan
• needs a lot of storage space
ed
• security issues related to storing people’s biometric data
i
11 r
c
Pr T m
IC am
10) Printers
S
T
oh
Running cost
frequently)
id
14) Discuss the advantages and disadvantages of using the cloud rather than a hard
disk
Advantages
r
he
• Files stored in the cloud can be accessed from any device/any place with internet access
te i
•
42 to st an
Don’t have to pay for large computer/mobile storage capacity
ac
• Only pay for the storage you use as much of the space on the hard disk may be wasted
•
98 u ali rgh
Easier to add storage capacity on the cloud (unlimited storage capacity)
• Ability to synchronize files across multiple devices (automatically if requested) easily
• Backups are automatic on the cloud
•
i
User does not have to worry about security measures as service provider manages securing
the data
Disadvantages pe M
ed
• If the internet connection is unstable/slow there will be a problem accessing/downloading
files on the cloud i
11 r
c
Pr T m
• Data is controlled by the storage service provider; customers should choose a trusted
S
company
T
oh
• Risk of fire , floods etc. at the server can cause data loss
12 e
M
t
09 a
•
v
× Expensive to develop
× Affected by background noise
br
17) Describe the benefits and drawbacks of using a command line interface (CLI)
rather than a graphical user interface (GUI)
Benefits
• In CLI the user is not restricted to predetermined options// GUI uses icons & setmenus
• In CLI the user has more control over the computer settings//in GUI computer settings are
protected from the user
• CLI uses less memory than GUI
• CLI requires less processing power for the interface
r
Drawbacks
he
• The commands used have to be learnt/The commands used have to be remembered
te i
42 to st an
• The commands used have to be typed in/entered exactly
ac
• Have to remember the exact path/correct name of application
98 u ali rgh
• More risk of errors on data entry
• In CLI Commands have to be typed in by keyboard//in a GUI can use touchscreens/mice
• Tends to be used by experienced people//GUI is more user-friendly and can be used by non-
i
experts
pe M
ed
11 r
c
Pr T m
IC am
S
T
oh
12 e
M
t
09 a
r.
v
ge
i
M
id
br
m
Ca
Chapter 4-8-10
1) Describe the differences between an intranet and the internet
• Intranet has restricted access/its private//Internet is world-wide/everywhere
• Intranet is used only within a company/organisation/school
• Intranet access has more control of data whereas the internet access is open/public
access//the internet anyone can add material
•
r
Intranet is policed/moderated/managed
he
• The intranet has reduced unauthorised access to material whereas the
te i
•
42 to st an
Intranet can restrict access to some websites//internet has no restrictions on websites
•
ac
Data on the intranet is more reliable/relevant//
• Intranet is protected by passwords /more secure
98 u ali rgh
• Intranet is used to give information relating to the company whereas the internet gives
general information
• Internet has more information
i
pe M
2) Extranet is when an employee is accessing intranet remotely
ed
3) Explain the purpose of a router
i
11 r
c
Pr T m
•
T
Divides messages into packets
oh
• If the destination is in this network it Uses the MAC address to send to correct computer
id
• If not it uses IP address and routing table to send Data packet to the appropriate/next router
• Uses the IP address to work out the best/quickest route
br
m
Similarities
• Both WiFi and Bluetooth use wireless communications
• Both WiFi and Bluetooth use radio frequencies for communication/radio waves
• Both WiFi and Bluetooth allow several devices to be connected
• Both use security when sending data
Differences
• WiFi has faster data transfer rate
• WiFi has a greater range of transmission
• WiFi uses key matching encryption
• Bluetooth uses pairing code
• Wifi connects more devices
• Wifi requires a network device (router/WAP)
6 of 22 Mr Mohammed Mirghani ICT Teacher
Mr.Mohammed Mirghani Cambridge ICT Specialist Private Tutor 0912984211
r
7) Describe the process of using WiFi to connect to a WLAN.
•
he
computer sends radio waves / signals to search any wifi network in range
te i
• wireless router responds by sending back signal to computer
42 to st an
•
ac
name of network is displayed to the user
• user will choose the network and enter the password
98 u ali rgh
• if the network has been used before saved password is used
• wireless router ensures password is correct
• connection is established and data can be exchanged between devices
i
pe M
8) Describe four strategies that he could use to stay safe when using social network
ed
websites
• i
11 r
c
Don't give out personal information such as his address or phone number
Pr T m
• Never arrange to meet someone in person who he has only met online
12 e
• If anything he sees or reads online worries him, he should tell someone about it/block them
M
•
t
• Set your account private so only friends can see your info
r.
•
v
i
M
Benefits:
br
Drawbacks:
• It would be very expensive to police/set up a police group
• It would be very difficult to set standard rules as many countries/states have different rules
• Freedom of speech/human rights is restricted
• Material found on the internet can be found elsewhere
• Some medical websites could be classed as illegal but could be legal
• The mass of information increases daily therefore difficult to check
• People tend to be anonymous therefore difficult to find/track
10) Describe the advantages of using the internet to research information for a
technicalproject.
• Vast amount of information available
• More up to date information is available as information in books may be outdated
• Information can be found quicker using search engines
• Information can be researched at home rather than using research libraries
• Don't have to waste time going to the library
• Don't have to spend money going to the library
r
• Ability to discuss topics far easier with people from around the world
he
•
te i
Ability to get wider range of opinions.
42 to st an
• Allows emailing therefore sending/collecting information far quicker than manual methods
ac
• Data is digital therefore can be easier to transfer to documents
98 u ali rgh
11) WAN (Wide Area Network)
i
•
pe M
Public network
• Connecting unlimited number of computers
• Far away from each other
ed
11 r
c
Pr T m
• Private network
S
13) URL
09 a
r.
•
v
14) HTTP:
br
15) HTTPS
• Hyper Text Transfer Protocol Secure version
• same as HTTP, but where everything transferred between webserver and user’s computer is
encrypted using the SSL (Secure Socket Layer)
SSL
• SSL is a security protocol (set of rules) developed for sending information securely over the
Internet
• When the URL starts with "https" this webpage is secured by SSL and a padlock is displayed
in the browser
16) FTP:
• File Transfer Protocol
• set of rules for transferring files between a file server and a user’s computer (client)
r
• online at the same time
he
• using the same program
te i
42 to st an
• where they can all see and hear each other
ac
98 u ali rgh
18) Discuss the benefits and drawbacks to the company of using video-conferencing.
Benefits
i
•
•
•
pe M
Can call meetings at short notice
Employees save time travelling
No hotel expenses
ed
• No need to transport/carry equipment/lots of documents
• i
suitable in bad weather conditions
11 r
c
Pr T m
Drawbacks
S
T
• Takes time/costs money to be trained
oh
•
t
• problems in internet connection may interrupt the meeting/lag between video and audio
ge
i
M
• participants can only hear each other as it uses mobile phones / telephones and mobile
/telephone networks
• the organizer of the conference is given 2 PINs by the phone company (one for the organizer
and one for the participants)
• at the time of the conference the organizer dials the conference phone number and enters
his PIN to start the conference
• then the participants dial the same number and enter their PINs to join the conference
9 of 22 Mr Mohammed Mirghani ICT Teacher
Mr.Mohammed Mirghani Cambridge ICT Specialist Private Tutor 0912984211
22) Virus
• A program that can replicate itself
r
• and attaches itself to other programs
he
• Can delete or corrupt data stored on the computer
te i
•
42 to st an
Can slow down computer performance / fill up memory
ac
98 u ali rgh
23) Hacking
• Unauthorized access to a computer system
• to misuse data (steal, change, delete)
i
• for identity theft
pe M
ed
24) How to avoid hacking:
i
11 r
Authentication
c
Pr T m
• Making sure that the person using the computer is who he claims to be (ensuring the
IC am
v
ge
• ID card
• Biometrics
m
• Zero login (devices can detect changes in user behavior; login from new device /
strange location and checks with the owner that he/she is attempting to access
the account)
• Physical token (one-time passcode is generated and sent on numerical display
device)
• Electronic token (one time passcode that is generated and sent to a trusted
device such as a mobile phone)
• Digital certificate
28) Phishing
• Sending fake e-mails
r
• identical to the bank's e-mails (looks legal)
he
•
te i
requesting personal confidential information in reply to the email
42 to st an
• or containing a link to direct the user to a fake website to enter personal confidential
ac
information
98 u ali rgh
• leading to identity theft
29) Smishing
i
•
•
Short for SMS phishing
pe M
Sending fake SMS on a mobile phone , it often contains a URL or a telephone number inside
the text message
ed
• The recipient will be asked to log on to the website or make a phone call, and asked to
i
supply personal details such as card number / password
11 r
c
Pr T m
IC am
30) Vishing
S
• used to leave voicemails that trick the user into providing personal sensitive
information
12 e
M
31) Pharming
09 a
•
r.
•
i
• to collect confidential personal information entered like passwords, banking information, etc
•
id
33) SPAM
• Electronic junk mail sent randomly,
• often unwanted advertising,
• fills up mail inbox preventing important messages from being received
• may contain viruses, spyware or phishing attacks
Chapter 3
1) Give three advantages of using robots to carry out the task.
• Robots can work in environments where humans would have difficulty
• Robots can work 24/7
• Robots are not paid/no salaries
• Productivity is higher
• Fewer mistakes are made/greater accuracy
•
r
More consistent production
•
he
Allow humans to do more skilled work/other tasks
te i
42 to st an
ac
2) Give three disadvantages of using robots to carry out the task.
98 u ali rgh
• Expensive to maintain/repair
• Expensive to purchase
•
i
Replace labour, leads to unemployment
•
•
•
Manual skills are lost
pe M
Can not react to any unexpected condition
ed
Training workers who will be still present after robots are introduced
11 r
c
Pr T m
home.
S
•
M
• warm/cool house
ge
i
M
onlifestyle.
br
• When the driver returns they insert their ticket to calculate the charge
6) Global Positioning Systems (GPS)
• System used to detect the position of the user
• by calculating the distance between the receiver (user’s device) and three or four satellites
r
• Adds layers of data to maps
he
• Allows the user to model and analyze data according to location (in order to take decisions)
te i
42 to st an
• Allows users to create interactive queries
ac
• Users can edit map data
98 u ali rgh
8) Virtual Reality
• 3-D Artificial environment created by software
i
•
• pe M
It uses goggles, suits, helmets and gloves to interact
It gives the human the feeling of reality by simulating senses such as vision, hearing, touch and
smell
ed
9) Augmented Reality
i
11 r
•
c
Pr T m
Virtual objects overlaid on real world environments (use a photo as an item in a search engine)
IC am
Advantages:
12 e
Disadvantages:
br
12) Discuss the advantages and disadvantages of using online booking systems.
Advantages
r
There are more booking lines than in a manual booking system
•
he
The customer needs to add an email address therefore special offers/promotions
te i
can besent from time to time
42 to st an
• Easier to reserve seats than in a manual booking system
ac
• E-tickets can be produced therefore less chance of tickets being lost in the post.
98 u ali rgh
Disadvantages
i
• The customer needs an email address
•
•
pe M
The customer needs a debit/credit card
Requires the customer to have a smartphone for e-tickets
ed
• Customers need an internet connection
• Expensive to set up/maintain
i
11 r
c
Pr T m
internet banking.
12 e
M
Advantages
t
09 a
• Disabled people do not have to travel to the bank in order to carry out transactions
• 24/7 banking
br
• People can spend more time doing other activities rather than travelling to the bank
• Less physical robberies
m
Disadvantages
Ca
• Less physical banks which means that people have to travel further to go to the bank
• Health risks with using the computer
• Security is an issue as transactions are carried out over the internet
• The user needs a reliable internet connection
• More risk of pharming / phishing/fraud
• Easier to make errors whilst using internet banking e.g. incorrect input
• If the internet connection drops during a transaction, then there may be issues
Health
Cause Prevention
problems
• Use anti-glare screen
• Use flat screens
Staring at computer screens for a
Eye strain • Improve surrounding lighting
long time
• Reduce screen brightness
r
• Maintain sufficient distance
he
between screen and eyes
te i
42 to st an
• Take regular breaks
ac
• Sit in an upright position
Sitting in a wrong position in front
98 u ali rgh
Back pain • Use ergonomic chair
of the computer for a long time
• Take regular breaks
• Sitting on an adjustable chair
Neck pain
i
Looking up or down at the screen
Take regular breaks
pe M
Long use of mouse
•
•
•
Use wrist rest
Use ergonomic mouse
ed
(pain in wrist)
• Take regular breaks
Repetitive i
Long use of keyboard • Use ergonomic keyboard
11 r
c
Pr T m
(pain in thumb)
M
i
M
r
• Some situations will be very difficult to test in real life
he
te i
42 to st an
Disadvantages
ac
• Models can only test situations which are expected / in reality some situations might
98 u ali rgh
come up that were not expected
• Humans in a model will not react the same way they will do in a real life dangerous
situation
i
•
• pe M
Creating models consume time, delay in start of creating the real thing
Models usually require specialist / specialist software to be done (cost
ed
17) Copyright law
• i
A law to prevent software from being sold, copied, distributed or updated any without its
11 r
c
Pr T m
• Only use the data for the reasons given to the owner
ge
19) Netiquette
• Short for internet etiquette, set of rules that need to be respected when communicating
br
• Don’t send spam or repeatedly send the same information to the same
Ca
person
• Respect peoples’ privacy, don’t share personal information about anyone
without permission
• Don’t use capital letters; it’s considered shouting
• Don’t plagiarize, always acknowledge source of any information / quotations /
images used
• Check spelling and grammar, gives a good impression
• Posts made are usually public so be careful of any comments being shared
• Don’t send inappropriate content, disturbing for others and not respectful
• When sending emails confirm the recipient to make sure the email is not
delivered to someone else
Chapter 7
r
he
te i
42 to st an
ac
98 u ali rgh
i
pe M
ed
11 r
c
Pr T m
IC am
S
T
oh
12 e
M
t
09 a
r.
• Questions about the ... (depending on the application) are asked by the system
M
• Answers to these questions are entered by the user through the input screen (inputs depend on
id
the application)
• Inference engine uses the information in the knowledge base and rules base to find results
br
• The results will be output to the user on the output screen (suggested/possible/probable ...
(depending on the application) are displayed on the screen)
m
• The explanation system will explain how the expert system arrived at its conclusio
Ca
Chapter 5
1) Discuss advantages and disadvantages of relational database compared to flat file
database
Advantages of Relational database:
r
• Easier to edit/add/delete recordsk
he
• Complex queries can be carried out using several tables
te i
42 to st an
• Separate passwords can be assigned for separate tables (better security)
ac
• Less inconsistency of data
98 u ali rgh
• Easier to expand
i
•
•
•
Easier to understand/use pe M
All records are stored in one table.
11 r
c
Pr T m
IC am
2) Verification checks
S
• Double data entry: User enters data twice and computer compares the two entries to make
T
oh
identical.
t
09 a
3) Proof-reading:
r.
v
ge
• Reading the document after typing to check for spelling, grammar, punctuation mistakes
M
4) Validation Checks
br
• Range
m
• Length
• Format
Ca
• Lookup
• Type/Character
• Presence
r
6) Describe how you could replicate a function in cell C4 till C15
he
te i
• Click on the cell/C4
42 to st an
• Move to the bottom right hand side of the cell
ac
• Drag down the fill handle/double click on drag handle
98 u ali rgh
• Drag the handle to C15
7) Formula vs function
i
Formula:
pe M
• Can be simple calculations/mathematical operations
ed
• Can be easily typed by user
• Can contain a function i
11 r
c
Pr T m
Function:
IC am
8) Naming cells/ranges:
t
09 a
• Don’t have to set absolute cell manually (a names range will not change when replicating)
M
id
br
10) Class:
• It is defined in a stylesheet using a dot (e.g. .right)
• It is used in adding or changing properties without having to create new style
11) Gutter
• Extra margin on one side to allow for binding or stapling a book
12) Widow
• When the last line of a paragraph is separated on the next page
13) Orphan
• When the first line of a paragraph is separated on the previous page
r
he
te i
42 to st an
14) Corporate house style
ac
98 u ali rgh
• It is way a company is presented to customers; including color scheme, font, logo, etc.
• These items are applied to all company’s documents, presentations, webpages, e-mails…
Benefits:
i
•
•
•
Consistency
Brand recognition pe M
Reduces time spent in formatting documents
ed
• Reduce errors of typing/forgotten elements
i
11 r
c
Pr T m
IC am
means all files are saved in same folder means files are not saved in same folder
Files should be saved in one folder to be ready Will only work on one computer as other
12 e
for publishing the website (should be relative not computers will not have the same file path
M
absolute)
09 a
r.
v
ge
i
M
id
br
m
Ca
A file format used for text that contains formatting; can contain
.rtf Rich text format tables, images, etc
r
can be opened in any word processor
he
te i
42 to st an
A file format used for plain text that contains no formatting, no
ac
images or tables
98 u ali rgh
.txt Text file
can be imported into any text editor/ word processing/DTP
package
i
Comma Separated
pe M A file format used to hold tabular data, e.g. spreadsheet or
database table. It stores it as a text file using commas (or semi-
ed
.csv colons) to separate data items.
Values
i
11 r
c can be imported into any spreadsheet or database
Pr T m
IC am
Markup Language
T
.htm HyperText Markup
oh
i
M
r
he
te i
42 to st an
ac
98 u ali rgh
i
pe M
ed
11 r
c
Pr T m
IC am
S
T
oh
12 e
M
t
09 a
r.
v
ge
i
M
id
br
m
Ca