Notes I Beg Save Me
Notes I Beg Save Me
NOTES
Hardware
is the general term for the physical components that make up a typical computer system
INTERNAL HARDWARE
» motherboard
» central processing unit (CPU)/processor
» random access memory (RAM)
» read-only memory (ROM)
» graphics card
» sound card
» network interface card (NIC)
» internal storage devices (hard disk drive and solid-state drive).
• input/output operations
• managing of security
digital data
data that computers can only understand data which is in a binary format, it can only have discrete,
discontinuous values
Analogue data
is physical data that changes smoothly from one value to the next
Central processing unit (CPU)/processor A central processing unit (CPU) or processor is an electronic circuit
board in a computer that can execute instructions from a computer program.
• arithmetic and logic unit (ALU) where arithmetic and logical operations are carried out
• control unit (CU) which takes instructions the decodes and executes the instructions.
User interfaces
GUI: allows the user to interact with a computer using pictures or symbols (icons) rather than having to
type in a number of commands its consists from WIMP (windows icons menu and pointing device) & touch
screens
CLI: requires a user to type in instructions to choose options from menus, open software
Gesture-based interfaces
rely on human interaction by the moving of hands, head or even the feet. Gesture recognition allows
humans to interface with a computer in a more natural fashion without the need for any mechanical
devices
Artificial intelligence
AI is a machine or application which carries out a task that requires some degree of intelligence
Examples
Disadvantages of AI
» could lead to many job losses in a number of areas (although it is true to say that new technical
jobs would also be created); many jobs could be lost in manufacturing, but other roles are likely to
be affected (such as bus, taxi, lorry and train drivers)
» dependency on technology and the inability to carry out tasks done by robots, for example, could
be an issue in the future
» loss of skills – even now, skills from previous generations have been lost as humans have been
replaced by machines and software applications.
Extended reality
» allow the user to experience the relationship between digital (virtual) and physical (real) worlds
» virtual information and objects are overlaid onto real-world situations
» the real world is enhanced with digital details, such as images, text and animation
» the user can experience the AR world through special goggles or via smartphone/phablet screens
» the user is not isolated from the real world and is still able to interact and see what is going on in
front of them
The features of virtual reality include:
» the ability to take the user out of the real-world environment into a virtual (unreal) digital
environment
» in contrast to AR, the user is fully immersed in a simulated digital world
» users must wear a VR headset or a head-mounted display which allows a 360° view of the virtual
world
» this technology can be used to good effect in: medicine (teaching operation procedures),
construction, engineering and the military.
Keyboard
Numeric keypads
Mouse
Touchpad
Trackball
Remote control
Joysticks
Driving Wheel
Touch screens(input & output device)
Scanners
Microphones
Graphics Tablet
Light pens
Digital Cameras
Video Cameras
Webcams
Card Readers
Magnetic stripe readers
Contactless debit card readers
Chip and PIN readers
readers use radio waves to read and capture information stored on a tag
Uses of RFID
» Livestock tracking
» Retail (it is similar to barcodes, but does not require any scanning; details such as price can be stored on
the tag and then automatically read at a checkout
» Admission passes
» Libraries (books can be tracked in and out automatically by readers at the library entrance; no need to
scan barcodes or use magnetic stripe cards, making the process quicker and more accurate)
Advantages of RFID
Disadvantages of RFID
» Tag collision (this is when the signals from two or more tags overlap, interfering with each other).
» Because RFID uses radio waves, they are relatively easy to jam or interrupt.
» RFID is more expensive than a comparable barcode system.
is a device which can read marks written in pen or pencil on a form. The places where the pen or pencil
marks can be made are clearly shown on the form
» The forms need to be carefully designed to make sure the marks/shading are correctly positioned to
gather accurate information.
» There can be problems if they have not been filled in correctly; sometimes they have to be manually
checked before being read, which is both time consuming and expensive
is the name given to a device that converts the text on hard copy documents into an electronic form. OCR
software converts this electronic data into a form that can then be used in various application packages
Uses of OCR
» One of the most recent uses is the processing of passports and identity cards.
» Converting hard copy documents into electronic form which can be stored on a computer.
» Used in automatic number plate recognition (ANPR) systems in car parks.
Advantages of OCR
Barcode reader
Barcode readers are used to read information in the form of a bar code
» Used in supermarkets and other shops where the goods are marked with a barcode; the barcodes are
used to give information about the product which enables automatic stock control
» Used in libraries to keep track of books on loan.
A QR code consists of a block of small squares (light and dark) known as pixels. It can presently hold up to
4296 characters and allows internet addresses to be encoded within the QR code
Uses of QR codes
» Used in advertising to contain data such as business addresses, phone numbers, email addresses and
website addresses
» Contain links to apps
» Wi-Fi authentication
» QR codes can be used to deliver augmented reality
Advantages of QR codes
Disadvantages of QR codes
Laser printer
Inkjet printer
Dot matrix printer
Graph plotter
Wide format printer
3D printer
3D printer
» Printing is fast
» They can handle very large print jobs.
» The quality is consistently high.
» Toner cartridges last for a long time
Disadvantages of laser printers
» High-quality output.
» Cheaper to buy than laser printers.
» Very lightweight and have a small physical footprint.
» Do not produce ozone and volatile organic compounds, unlike laser printers.
Disadvantages of inkjet printers
» Slow output if several copies are needed (little buffer capacity to store the pages).
» Cannot do large print jobs (ink cartridges run out too quickly).
» Can be expensive if used a lot
Advantages of dot matrix printers
» They can be used in environments which would be a problem for laser or inkjet printers
» Carbon copies or multi-part outputs can be produced.
» Very cheap to run and maintain.
» Easy to use if continuous stationery is required (for example, long print jobs such as wages slips).
Disadvantages of dot matrix printers
» ATMs at banks (where screen options displayed depend on previous input response).
» Ticket collection machines at theatres, cinemas and railway stations (again on-screen outputs will depend
on previous inputs).
is the hardware on which the data is actually stored (for example, a CD or a DVD)
storage device
is the hardware used to read from or write to the media (for example, a CD/DVD reader or writer)
Data transfer rate is the rate at which data can be sent from a storage device to a computer (or vice versa).
Data access time is the time it takes to locate specific data stored on the storage media.
Magnetic Tape
Uses
» Use in applications where batch processing is used (for example, clearing bank cheques)
» Used in long-term archiving of data; magnetic tapes have huge data storage capacities and are known to
be very stable, which makes them ideal for long-term storage.
» They are generally less expensive (per byte) than the equivalent hard disk drive.
» Very slow data access times (they use serial access, which means all the previous data needs to be read
until the required data is found)
» They are affected by magnetic fields; can corrupt data stored on the tape.
Characteristics
» Used in real-time systems (for example, robots, control of a chemical plant) and in online systems (for
example, booking airline tickets, automatic stock control (using EPOS)).
» They have a very fast data transfer rate and fast access times to data.
» They have many moving parts which can affect their overall reliability.
» Their read/write operation can be quite noisy when compared to solid-state drives
are essentially HDDs external to the computer and can be connected to the computer using one of the USB
ports
» The data access time and data transfer rate are very fast.
» As with fixed disk drives, they can be easily damaged if the user accidentally drops it or does not correctly
shut down the drive after use.
They rely on the optical properties of laser light, which is used to read data and to write data on the surface
of the disk
Types
CD
DVD
BLU-RAY DISCS
» Storing and playing back movies (one high definition movie of two hours duration uses up 25 GB of
memory).
» Very large storage capacity, therefore ideal for storing high definition movies.
» The data access speed is also greater than with other optical media.
» Blu-ray discs automatically come with a secure encryption system, which helps to prevent piracy and
copyright infringement.
» Encryption problems (which are used to stop piracy) when used to store video.
» Introduction of HD (high definition) DVD players has reduced the advantages of using Blu-ray disc
technology
Comparison between Hard disk drive (HDD) and Solid state drive (SSD)
The SSD is lighter in weight than the HDD therefore the laptop will be lighter and more portable
The speed of access in SSD is a lot quicker
The speed of data transfer in SSD is a lot quicker
There is less chance of the data becoming corrupted as it can save whilst the laptop is moving
It is a smaller device therefore the laptop will be smaller/thinner SSD
Uses less energy
Less chance of impact damage
Disadvantages of SSD
Less longevity
Not suitable for servers
» Very robust.
» The user needs to be very careful when removing a memory stick from a computer
Memory cards
The XD card
The SD card
is a type of very small card with a very high-capacity memory. SD cards are primarily used in portable
devices such as digital video recorders, digital cameras, audio players, smartphones and tablets
A CFast card
is a memory card format which was developed to allow solid state technology to be used in a very small
portable device.
It has no moving mechanical parts and does not need a battery to retain data.
CFast cards are primarily used as removable memory for higher-end digital photo and video cameras
» Very compact – can be easily removed and used in another device or for transferring photos directly
to a computer or printer.
» Because they are solid-state memories (and have no moving parts) they are very durable.
Cloud storage
Cloud: is a large group of remote networked servers which allows centralized data storage
Advantages Disadvantages
Easy to access data outside home. Risk of hacking.
Don’t have to pay for large computers / Risk of error by manufacturer leading to
mobile storage capacity. data loss.
Ability to synchronize files across Slower download / upload than storage
multiple devices. media.
Automatic backups. Loss of control of the data as the data is
controlled by a data storage provider.
Network Devices
1) Router observe any data packets sent to it from any computer on any of the networks
connected to it.
2) It holds the IPs and MACs addresses of all computer.
3) As the network has the same part of IP address the router sends the data packet to the
appropriate switch.
4) It will be delivered to the computer through the MAC address destination.
5) If the MAC address doesn’t match any device in the network it passes to another switch on
the same network.
6) Until appropriate device is found.
Router stores the Routing Table which contains the IP address of next router & the shortest distance
Data Packet
Its data transfer through a network.
Contain the following information:
o Some form of header to identify the data packets.
o Sender’s IP address.
o Receiver’s IP address.
o How many data packet make the whole message?
o Identify number of each packet.
Function:
Information allow the router to route a packet across a network to its correct destination.
Allow data packet to be collected in their correct order according to their identity number at
receiving station.
Advantages Disadvantages
Possible to held conference at short Potential time lag.
notice. Bad quality of image due to poor
Not travelling physically so it reduces internet connection.
costs of: Different time zone training people to
Travelling costs hotel accommodation. use the system can be both costly
Taking people away from their work. and time consuming.
Avoid going to unsafe places. Whole system relies on good internet
Access important documents while connection.
people are in their own building.
Audio conference
Meeting held between people using sound equipment.
Internet telephony (VOIP)
o VOIP stands for voice over internet protocol.
o Service which enables people to make phone calls over the internet.
Web conference
Use the internet to make conference to take place multiple computers are connected together
all connected by internet.
» shoulder surfing when using the card on any device that requires keyboard entries (for example, an
ATM or a handheld POS terminal)
» card cloning
Shoulder surfing
Shoulder surfing is a form of data theft where criminals steal personal information from a victim when
they are using a cash dispensing machine
» somebody listening in when you are giving credit or debit card details over the phone
» When using ATMs shield the keyboard with your other hand so that no-one can see which keys you
are pressing
» When using a mobile device (such as a smartphone, tablet or laptop) never key in data in a public
place
» If you are using a public place, make sure you are nowhere near security cameras which could record
passwords or other data about you
Card cloning
Card cloning is the copying of a credit or debit card which uses a magnetic stripe. Cloning of this type of
card employs an electronic device known as a skimmer
Retina scans uses infrared light to scan the unique pattern of blood vessels in the
retina (back of the eye)
the small padlock in the status bar at the top of the screen.
» online shopping/commerce
Firewalls
Firewall can be either software or hardware it is between the user computer and network
computer.
It filters information going in or out.
Tasks done by firewall
o Examine traffic between user computer and public network.
o Checks whether incoming or outgoing data meets a given set of criteria.
o If the data fails the criteria, the firewall will block the traffic and give the user a
warning there is a security issue.
o Prevent viruses or hackers entering the user computer network this can be done by
blocking IP address.
o User is warned if some software on their system is trying to access an external data
source.
Two-factor authentication
»passwords
» zero login
» biometrics
» magnetic stripes
» smart cards
» physical tokens
» electronic tokens.
Passwords
Zero login essentially relies on devices being smart and secure enough to instantly recognise a user by a
number of features based on:
» biometrics
» behavioural patterns
» Less secure than biometric methods (no encryption is used and the stripe contents can be copied fairly
easily).
» The cards wear out with a lot of use.
» Magnetic readers often fail to read the cards on first attempt.
Smart cards
By inserting a tag (chip and antenna) into a security card, it can act as a smart contactless card
A physical (or hardware) token is a form of authentication in the form of a physical, solid object.
Physical tokens contain
internal clocks and when a PIN and other authentication details are entered, then a one-time password
(OTP) is generated.
The OTP is shown on a small screen.
The code changes on a regular basis and is usually only valid for less than a minute
Electronic tokens
code generated by the website and the user app software to allow authentication
Digital certificates
Pair of files stored on a user’s computer used to secure data sent over the
internet.
Each pair is divided into:
Public key which is known by anyone.
Private Key known to computer user only.
Electronic conferencing
» video conferencing
» audio conferencing
» web conferencing.
» lifestyle
» leisure time
» physical fitness
» data security
» social interaction
E-Safety
» when using the internet
» sending and receiving emails
» taking part in social media
» online gaming.
Social media
» Do not publicly post or give out personal information to people you do not know
» Do not send out photos of yourself to people you do not know
» Always make sure you use the privacy settings when posting photos of yourself on social media sites,
so that only people you trust can see them.
» It is important that none of the photos you post can link you to a place or an address
Online gaming
» predators (people who prey on others who they see as vulnerable)
» cyberbullying
» use of webcams
Personal data
refers to any data concerning a living person who can be identified from the data itself or from the data
in conjunction with other information
Examples of personal data include:
» name
» address or email address
» an ID card number/passport number
» an IP address
1. Analysis
Conducting information about the current system by:
o Identifying input output and processing in the existing system
o Identify problems with the system
o Identify user and information requirements
Documentation
Copyright
Software piracy is the illegal copying of software.
There are a number of ways software is protected
» When software is being installed, the user may be asked to key in a unique reference number or
product key
» The user will be asked to click ‘OK’/’I AGREE’ or put a cross in a box to agree to the licence agreement
before the software continues to install.
» Some software will only run if the CD, DVD or memory stick is actually in the drive; this stops illegal
multiple use and network use of the software.
» Some software will only run if a dongle is plugged into one of the USB ports.
Netiquette
Netiquette is a shortened form of the phrase interNET etIQUETTE, which refers to the need to respect
other users’ views and display common courtesy when posting views in online discussion groups or
when sending out emails.
Rules of netiquette
1. Do not be abusive – do not threaten people or use personal violence.
2. Do not send spam – do not repeatedly send somebody the same information.
3. Remember that posts are public in most cases and can be read by anyone.
4. Always check your spelling and grammar – give a good impression.
5. Respect people's privacy and do not discuss or publish information that might embarrass somebody.
6. Do not use CAPITAL LETTERS to highlight comments – this is seen as ‘shouting’ in emails, text
messages and online forums.
7. Do not plagiarise – always acknowledge quotes used in any messages you write. Do not use too many
emoticons as they might annoy your readers.
Intranet
Private access only.
Used to give local information related to a company.
Possible to block certain websites.
Requires password and user ID.
Intranet is behind the firewall which gives some protection against hackers.
Can be accessed inside the organization only by the employees.
Extranet
Allows limited secure access to people working outside the company by accessing it using a username
and password.
Blogs, wikis, social networking sites and forums
Blogs
Web logs (blogs) are personal internet journals where the writer (blogger) will type in their observations
on a topic
Microblogs
are similar to blogs, but are most often used on social networking sites to make short, frequent posts
Features of blogs:
Wikis
Wikis are web applications or websites that allow any user to create and edit their web pages using any
web browser
Features of wikis:
» anyone can edit, delete or modify the content
» many authors can be involved in a wiki
» it is possible to organise a page any way the author(s) wish(es)
» shows/keeps track of all entries
» can be easily edited using a web browser
» allows large documents to be seen by many people
Forums
A moderated forum refers to an online discussion forum in which all the posts are checked by an
administrator before they are allowed to be posted.
o Is set of rules that must be obeyed when transferring data across the internet.
o When some form of security (SSL) encryption is being used http is changed to https
which means secure.
o It’s used when sensitive or private data is being transferred across the internet because
it’s slower.
ICT application
Communication
» newsletters and posters
» websites
» multimedia presentations
» media streaming
» e-publications.
Advantages and disadvantages of using websites for communication
Media streaming
when users watch movies/videos or listen to music on devices connected to the internet. When using
media streaming there is no need to actually download and save the video or audio files.
Streaming
is a continuous transmission of video or audio files from a remote server where the files are stored. This
means data is transmitted and played in real time.
e-publications
Most material which is published on paper is also available in an electronic format.
For example:
» e-books
» digital magazines
Modelling applications
Advantages of using models
» Using computer models is less expensive than having to build the real thing
» On many occasions it is safer to use a computer model (
» Computer modelling allows you to try out various different scenarios in advance.
» It is nearly impossible to try out some tasks in advance in real life because of the high risk involved or
the remoteness
» It is often faster to use a computer model than do the real thing
Booking systems
Online booking systems rely on the ability to update files immediately, thus preventing double-booking
Online booking systems are used in:
» the travel industry
» for concerts (theatre and music events)
» for cinema tickets
» when booking sporting events.
Advantages
» They prevent double-booking.
» The customer gets immediate feedback on the availability of seats and whether or not their booking
has been successful.
Disadvantages
» The setting up and maintenance of online booking systems is expensive.
» All customers using this service need access to a computer or mobile phone and a reliable internet
connection.
» It is often more difficult to cancel the booking and get your money back using online systems.
» If the server is down for maintenance
Customer Bank
Advantages Advantages
Saves time and cost of Saves cost of rent because of fewer
transportation branches
Available 24 hours Reduces costs of salaries
Suitable for physical disable people Wider range of customers
Can be accessed anywhere Less risk of physical robbery
Disadvantages Disadvantages
Risk of potential hacking or defraud Initial cost of creating secure website
Users need good internet Need to train employees
connection Cost of system maintenance
Higher risks of making mistakes
Advantages Disadvantages
ATMs are more widely available than Not all services are available in ATMs
bank branches There’s a daily limit which the
ATMs can work 24 hours a day while customer cannot exceed to withdraw
banks are closed cash
ATMs offer choice of language
Can Withdraw cash easily
Don’t have to wait in line in ATM
unlike bank branches
Online shopping
Customer Shop
Advantages Advantages
Saves time and cost of transportation Saves cost of rent
Available 24 hours Saves cost of salaries
Suitable for physical disabled More methods of advertisements
Can shop from abroad Wider range of customers
Wider variety of products Less risk of physical robbery
Easy to compare prices Disadvantages
Disadvantages Loss of customer loyalty
Risk of hacking and defraud Initial cost of secure website
Quality not guarantees Need to train employees
Cost of shipping
Difficult to refund
Needs internet connection & credit
card
Steps
1. Customer inserts card in the ATM
2. Customer is given the choice of language
3. Expiry date is read from the card then compared with today’s date to check if the card
is not expired
4. Customer enters PIN code using numeric keypad then compared to PIN stored on the
card to make sure if they are identical
5. Customer is given choice of transaction required
6. The bank computer is contacted to make sure that the card is not stolen
Cash withdraw Cash deposit Check balance
1. Customer enters amount 1. Customer enters the 1. Master file is searched to
of money required amount of money to be find the account number in
2. Master file in the bank deposited the bank account
computer is searched to 2. Master file in the bank corresponding balance is
find the account number account is searched to read from the master file
3. Customers account to find the account number 2. Balance is displayed
check if there are 3. Customer inserts the cash 3. Customer is asked if they
sufficient funds 4. Cash is counted want a receipt if yes receipt
4. Make sure that the 5. Master file in the bank is printed
amount within the daily account is updated by 4. Card is returned
limit increasing the account
5. If the amount is available balance of the customer
and doesn’t exceed the 6. Customer is asked if they
daily limit the transaction want a receipt if yes
is authorized receipt is printed
6. Master file is updated by 7. Card is returned
decreasing the account
balance of the customer
7. Customer is asked if they
want a receipt if yes
receipt is printed
8. Cash is output
9. Card is returned
Expert systems
have been developed to mimic the expertise and knowledge of an expert in a particular field
Examples include:
» prospecting for oil and minerals
» diagnostics (finding faults in a car engine, finding faults on a circuit board, etc.)
» medical diagnosis
» strategy games
Satellites systems
» global positioning systems and satellite navigation (GPS)
» geographic information systems (GIS)
» media communication systems (satellite television and satellite phones).