0% found this document useful (0 votes)
8 views24 pages

Ict Notes

Uploaded by

anzala kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views24 pages

Ict Notes

Uploaded by

anzala kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Made by Manas Mokashi

ICT NOTES

Hardware refers to the physical components of a computer system. It can be divided into
three main categories:

1. Internal Components:
o CPU: The brain of the computer.
o Processor: Circuit that processes information.
o Motherboard: Connects all components for communication.
2. Internal Memory:
o RAM: Fast, temporary working memory.
o ROM: Stores start-up instructions.
3. Hardware Components:
o GPU: Processes images and video.
o Sound card: Manages audio.
o NIC: Provides network connection. (
o Storage Devices: Permanent data storage (e.g., hard drive, USB).
o Input Devices: For user input (e.g., mouse, keyboard).

Software refers to the programs that control hardware. It is categorized into:

1. Application Software:
User-selected software for specific tasks. Examples include:
o Word Processing: Text creation/editing
o Spreadsheets: Data organization/analysis
o Database Management: Data storage/retrieval
o Control/Measurement: Uses sensors for system control
o Media Editing (Video/Graphics/Audio): Modifying media files
o Computer-Aided Design (CAD): 2D/3D design and modeling
2. System Software:
Essential for running the system and managing resources. Includes:
o Operating Systems (OS): Manage hardware, software, security, and errors.
o Compilers: Convert programming languages into machine code.
o Linkers: Combine object files into executable programs.
o Device Drivers: Control hardware and peripherals.
o Utilities: Maintain and optimize system performance.

1
Made by Manas Mokashi

Operating Systems
An OS manages hardware, software execution, input/output devices, and system security,
providing a platform for running applications.

User Interfaces (UI): The OS provides diverse ways for users to interact with the system,
each with its pros and cons:

1. Command Line Interface (CLI):


o Advantages:
 Low resource usage.
 Efficient for automating tasks.
 Faster for experienced users to type commands.
o Disadvantages:
 Requires users to remember commands.
 Prone to typing errors.
 Less intuitive for beginners.
2. Graphical User Interface (GUI):
o Advantages:
 Intuitive and easy for inexperienced users.
 Visual information is easy to understand.
 No need for prior knowledge of commands.
o Disadvantages:
 Uses more system resources.
 Can be slower for repetitive tasks.
 Frustrating when navigating through complex menus.
3. Dialogue-based Interface:
o Advantages:
 Accessible for users with disabilities.
 Simple and intuitive.
o Disadvantages:
 Privacy concerns with voice control.
 May not always be dependable.
4. Gesture-based Interface:
o Advantages:
 Immersive and fast for certain tasks.
 Accessible for users with disabilities.
o Disadvantages:
 Prone to recognition errors.
 Can lead to discomfort with prolonged use.
 Limited support for some systems.

Analogue & Digital Data

 Analogue Data: Continuous and smooth data (e.g., sound waves).


o Advantages: Can represent subtle changes.

2
Made by Manas Mokashi

o Disadvantages: Prone to quality loss during storage or transmission. Needs


conversion to digital for processing by computers.
 Digital Data: Represented in binary (1s and 0s), easily stored, processed, and
transmitted.
o Advantages: Precise and maintains quality during storage or transmission.
o Disadvantages: Limited to discrete values, requires conversion for use with
analogue devices.

1. Central Processing Unit (CPU)

 Key terms:
o Fetch-Execute Cycle: The process of fetching, decoding, and executing
instructions.
o ALU (Arithmetic Logic Unit): Performs calculations.
o Control Unit: Directs operations.
o Cache & Registers: Temporary storage areas for fast access.
 Advantages: High-speed data processing.
 Disadvantages: Requires high power consumption and generates heat.

2. Internal Memory

 Key terms:
o RAM (Random Access Memory): Volatile, temporary storage for active
processes.
o ROM (Read Only Memory): Non-volatile memory for permanent system
instructions (e.g., BIOS).
 RAM:
o Advantages: Fast access, read/write capabilities, improves performance.
o Disadvantages: Loses data when power is off.
 ROM:
o Advantages: Permanent storage, non-volatile, essential for booting.
o Disadvantages: Limited storage capacity cannot be altered.

3. Input Devices

 Key terms:
o Devices like Keyboard, Mouse, Scanner, Microphone, and Touchscreen
allow user interaction with the computer.
 Advantages:
o Keyboard: Common, easy to use.
o Mouse: Intuitive, fast for navigation.
o Touchscreen: Space-saving, intuitive.
 Disadvantages:
o Keyboard: Slow for large data entry, causes repetitive strain injury (RSI).
o Mouse: Requires a flat surface, can be difficult for users with disabilities.
o Touchscreen: Prone to smudging, less precise.

3
Made by Manas Mokashi

4. Output Devices

 Key terms:
o Monitor, Printer, Speakers, and Multimedia Projectors display processed
data.
 Advantages:
o LCD/LED Monitors: Low power consumption, clear display.
o Laser Printer: High-speed, cost-efficient for large volumes.
o Speakers: Enhances multimedia experience.
 Disadvantages:
o Monitors (CRT): Bulky, high-energy consumption.
o Inkjet Printer: Slow, ink can smudge.
o Speakers: Quality varies, high-end models are expensive.

5. Storage Devices

 Key terms:
o Magnetic Storage (e.g., HDD): Uses magnetic fields to store data.
o Solid-State Storage (e.g., SSD, USB): Stores data in electronic circuits.
o Optical Storage (e.g., CD, DVD): Uses lasers to read/write data.
 Advantages:
o Magnetic Storage: High capacity, low cost per GB.
o Solid-State Storage: Faster, no moving parts, portable.
o Optical Storage: Inexpensive, widely compatible.
 Disadvantages:
o Magnetic Storage: Prone to mechanical failure, noisy.
o Solid-State Storage: High cost, limited write cycles.
o Optical Storage: Low capacity, easily scratched.

6. Direct Data Entry Devices

 Key terms:
o Devices like Magnetic Stripe Readers, RFID Readers, and Barcode
Scanners automate data entry with minimal human input.
 Advantages:
o Fast and accurate data capture.
o Secure for sensitive applications (e.g., credit card readers).
 Disadvantages:
o Magnetic Stripe: Can be damaged, requires close contact.
o RFID: Susceptible to signal interception.
o Barcode: Requires line-of-sight, can be easily damaged.

4
Made by Manas Mokashi

7. Cloud Storage

 Key terms:
o Cloud Storage: Stores data on remote servers accessible via the internet.
 Advantages:
o Scalable storage, automatic backups, and remote access from any device.
 Disadvantages:
o Security risks, ongoing costs, and reliance on internet.

Desktop Computers

 Definition: A desktop computer is stationary, traditionally consisting of a separate monitor,


computer, keyboard, and mouse. It is more powerful and upgradeable compared to mobile
computers.
 Uses: Commonly used for office tasks (word processing, email), education (online learning,
research), and entertainment (gaming, streaming).
 Advantages: More powerful, upgradable.
 Disadvantages: Not portable.

Mobile Computers

 Definition: A mobile computer is portable, integrating a monitor, computer, and keyboard


(e.g., laptops, smartphones). Typically, less powerful, with a focus on battery life and
portability.
 Types: Laptop, smartphone, tablet/phablet.
 Uses: Office work (remote access, mobile payments), education (e-books, note-taking),
entertainment (gaming, streaming), and controlling smart devices (drones, home systems).
 Advantages: Portability, flexibility, multi-functionality.
 Disadvantages: Limited expandability, lower performance, shorter battery life.

Emerging Technologies

Artificial Intelligence (AI)

 Definition: AI enables machines to simulate human-like intelligence, learning, deciding, and


acting autonomously.
 Types:
o Weak AI: Designed for specific tasks.
o Strong AI: Performs any intellectual task a human can do.
 Advantages: Increases efficiency, accuracy, and scalability.
 Disadvantages: Job losses, potential bias, ethical concerns.

Extended Reality (XR)

 Definition: Blends the virtual and real world, enhancing immersion through technologies like
virtual reality (VR) and augmented reality (AR).
 Types:
o VR: Immerses users in a fully simulated environment.
o AR: Overlays digital information onto the real world.

5
Made by Manas Mokashi

 Uses: Applied in gaming, education, architecture, medicine, and retail for improved
visualization.
 Disadvantages: Potential for addiction and excessive screen time.

Network Hardware

1. Router

 Definition: Directs data packets between networks, such as routing internet traffic to the
correct devices on a home network.
 Functions: Connects LANs to the internet (WAN), assigns IP addresses, and prioritizes data
traffic to maintain stable connections.

2. Data Packets

 Definition: Small chunks of data broken down for transmission over the internet. Consists of
a header (source/destination IP), payload (actual data), and trailer (error checking).

3. IP Address

 Definition: A unique identifier for devices communicating over the internet.


 Types:
o IPv4: 32-bit address providing over 4 billion unique addresses.
o IPv6: 128-bit address, providing a vast number of unique addresses.

4. Network Interface Card (NIC)

 Definition: Enables a computer to connect to a network, either wired or wireless, allowing


data transmission.

5. Hub

 Definition: Connects multiple devices in a network by broadcasting data to all devices, which
can lead to inefficiencies.

6. Switch

 Definition: Connects multiple devices in a network and forwards data only to the intended
recipient using MAC addresses, improving network efficiency.

7. MAC Address

 Definition: A unique, static identifier assigned to devices for communication on a LAN. It


consists of 48 bits and cannot change.

8. Bridge

 Definition: Connects two LANs, creating a larger network, unlike switches or hubs that
manage devices within a single LAN.

6
Made by Manas Mokashi

Wireless Networks

1. Wi-Fi

 Definition: A wireless networking standard allowing devices to connect to the internet via a
wireless access point (WAP).
 Advantages: Portability, cost-effective, widely compatible.
 Disadvantages: Slower than Ethernet, less secure, range limitations.

2. Bluetooth

 Definition: Wireless technology for direct communication between two devices.


 Advantages: Low power consumption, ideal for personal devices.
 Disadvantages: Short range (30m), slow data transfer, security risks.

Cloud Computing

1. Cloud Storage

 Definition: Remote storage of data accessible via the internet.


 Types:
o Public Cloud: Provider and customer are separate entities.
o Private Cloud: Managed within the same organization.
o Hybrid Cloud: Combines public and private cloud services.
 Advantages: Accessible from anywhere, scalable storage, reduced data loss risk.
 Disadvantages: Requires internet access, vulnerable to security breaches, dependency on
service providers.

Network Environments

1. Internet

 Definition: A global network of interconnected LANs forming a wide area network (WAN),
used to access the World Wide Web.

2. Intranet

 Definition: A private network within an organization, offering secure internal resources and
information sharing.

3. Extranet

 Definition: An extension of an intranet allowing external authorized users access to specific


resources.

7
Made by Manas Mokashi

Network Types

1. Local Area Network (LAN)

 Definition: A network covering a small geographic area.


 Advantages: Centralized management, secure, shared resources.
 Disadvantages: Prone to hardware failures and network attacks.

2. Wireless Local Area Network (WLAN)

 Definition: A LAN where devices connect wirelessly via Wi-Fi.


 Advantages: Flexible, easy to extend coverage.
 Disadvantages: Limited range, security risks, interference issues.

3. Wide Area Network (WAN)

 Definition: A network covering large geographic areas, connecting multiple LANs via routers
and telecommunication lines.

Data Transfer

 Network Issue: Sharing data over a network poses security risks such as unauthorized access
and data manipulation.
 Security Risks:
o Hackers: Exploit network vulnerabilities to access or steal data.
o Insider Threats: Employees compromising security, intentionally or unintentionally.
o Social Engineering: Manipulating users to give away sensitive information or install
malware.
o Unencrypted Transfers: Data transferred without encryption, making it vulnerable.
o Weak Encryption: Outdated encryption protocols.
o Insecure Protocols: Using insecure protocols like HTTP instead of HTTPS.

Passwords

 Definition: A digital lock that prevents unauthorized access.


 Best Practices:
o Use a mix of upper/lower case letters, numbers, symbols.
o Change passwords periodically.
o Keep passwords secure using anti-spyware software.

Authentication

 Definition: Verifies that a user is authorized to access a system.


 Methods:
o Biometrics (Zero Login): Uses fingerprint or face recognition, convenient but less
secure if compromised.
o Magnetic Stripes: Simple but prone to wear and easier to copy.
o Smart Cards: Secure with embedded microchip, but more expensive.

8
Made by Manas Mokashi

o Physical Tokens: Generate one-time passwords (OTP), very secure but inconvenient.
o Electronic Tokens: OTPs generated by apps, secure and convenient.

Anti-Malware Software

 Definition: Protects devices from malicious software such as viruses, spyware, and spam.
 Functions:
o Scans files and attachments for malware.
o Regularly updates to block new threats.
o Quarantines infected files and uses heuristic checking to identify potential threats.

Electronic Conferencing

1. Video-Conferencing

 Definition: Real-time audio and visual communication between remote participants.


 Uses: Staff meetings, presentations.
 Advantages: Cost-effective, environmentally friendly, convenient.
 Disadvantages: High initial equipment cost, time zone issues, requires strong internet
connection.

2. Audio-Conferencing

 Definition: Real-time audio-only communication using phone lines or VoIP.


 Advantages: Cheaper than video conferencing, easier to use.
 Disadvantages: Lack of visual cues, poor audio quality, not ideal for collaboration.

3. Web-Conferencing

 Definition: Real-time communication over the internet for large groups, typically used for
webinars and lectures.
 Advantages: Pre-shared slides, instant messaging, screen sharing.
 Disadvantages: Technical issues, security concerns, information overload.

1. Microprocessor

 An integrated circuit that contains a CPU and executes instructions. Devices with
microprocessors are vulnerable to hacking, allowing unauthorized control of smart home
systems and monitoring user behavior.

2. Monitoring & Controlling Devices

 Usage: Control systems like heating, security alarms, and entertainment.


 Impact:
o Advantages: Automates tasks, provides convenience, and supports fitness tracking.
o Disadvantages: Leads to tech dependency and may result in a sedentary lifestyle.

3. Social Interactions

 Positive: Cheaper communication and easier social connections.

9
Made by Manas Mokashi

 Negative: Risk of social isolation and anxiety due to reduced face-to-face interaction.

4. Transport Monitoring

 Applications: Traffic management, ANPR, and railway signaling.


 Advantages: Reduces human error and enhances efficiency.
 Disadvantages: Vulnerable to cyberattacks and privacy concerns.

5. Autonomous Vehicles

 Rely on microprocessors, sensors, and cameras.


 Advantages: Environmentally friendly, safer, and reduces congestion.
 Disadvantages: Prohibitive cost, security concerns, and potential job loss.

Health Issues from IT Usage

1. Repetitive Strain Injury (RSI)

 Definition: Damage from prolonged keyboard and mouse use.


 Prevention: Correct posture, wrist supports, regular breaks, and ergonomic equipment.

2. Back/Neck Problems

 Causes: Long sitting sessions.


 Prevention: Use adjustable chairs, take breaks, and utilize footrests.

3. Eye Strain

 Causes: Extended screen time and poor lighting.


 Prevention: Regular breaks and anti-glare filters.

4. Headaches

 Causes: Poor lighting and screen flicker.


 Prevention: Frequent breaks and eye tests.

Communication Media

 Definition: Tools and channels for sharing information between a sender and a receiver. It
can be electronic (e.g., websites, multimedia presentations) or physical (e.g., newsletters,
posters).

Types of Communication Media:

1. Newsletters:
o Periodic publications, often distributed via email or print.

10
Made by Manas Mokashi

o Advantages: Cost-effective, measurable, targeted, increases brand awareness.


o Disadvantages: Low engagement, potential to be blocked by SPAM filters, limited
interactivity.

2. Posters:
o Visual presentations for promoting events/products.
o Advantages: Cost-effective, wide reach, long shelf life.
o Disadvantages: Limited information, lack of interactivity, can be removed.

3. Websites:
o Online platforms for information and services.
o Advantages: Media-rich, global audience, easy navigation.
o Disadvantages: Can be hacked, expensive maintenance.

4. Multimedia Presentations:
o Combine text, images, audio, and video for engaging information delivery.
o Advantages: Interactive, visually appealing.
o Disadvantages: Requires specific equipment, risk of distracting visuals.

5. Audio & Video:


o Sound recordings (e.g., podcasts) and moving images (e.g., YouTube videos).
o Suitable for entertainment, education, and promotional content.

6. Media Streaming:
o Real-time transmission of audio and video.
o Popular services: Spotify, Netflix, YouTube.

7. E-Publications:
o Digital versions of printed materials, offering portability and adjustable text size.

Mobile Communication

 Definition: Transmitting information between people and devices using radio waves.
Smartphones connect via SIM cards and enable features such as SMS messaging, phone
calls, VoIP, internet access, mobile payments, and camera functions.

Computer Modeling

 Definition: Simulating real-life systems using a computer to study behavior in different


scenarios.
 Applications: Personal finance, building design, flood management, traffic management,
weather forecasting.
 Advantages: Cost-effective, safer, faster, allows testing before construction.
 Disadvantages: Models may lack accuracy, potential for human error in design.

Computer-Controlled Systems

 Definition: Systems that use computers and software to manage processes or devices.
 Advantages: Increased efficiency, precision, ability to operate in hazardous environments.

11
Made by Manas Mokashi

 Disadvantages: High initial costs, job displacement, dependency on reliable


software/hardware.

Robotics

 Definition: Robots carry out tasks using programmed instructions. They are categorized as
dumb (fixed instructions) and smart (adaptive).
 Applications: Industry (quality control), transport (warehouse work), agriculture (planting),
medicine (rehabilitation), and domestic (meal preparation).
 Advantages: Efficiency, precision, ability to operate in dangerous environments.
 Disadvantages: Prohibitive costs, potential job displacement, limited capabilities.

School Management Systems

A school management system is a software solution designed to centralize and streamline


administrative tasks in schools, enhancing efficiency through centralized data storage. Key
processes include:

 Registration & Attendance: IT systems facilitate methods like magnetic stripe cards or
biometrics for tracking attendance, making the process faster and more accurate.
 Recording Learner Performance: Teachers can analyze data to identify strengths and
weaknesses, inform teaching strategies, and provide progress reports.
 Computer-Aided Learning (CAL): CAL enhances traditional teaching by allowing personalized
student development and providing interactive revision resources.

Advantages:

 Streamlined administration and record-keeping.


 Improved communication among teachers, students, and parents.
 Centralized access to information and resources.
 Data-driven insights for better decision-making.
 Quick access to information in emergencies.
 Identification of attendance patterns to tackle truancy.

Disadvantages:

 Cost and complexity of transition.


 Required training for staff.
 Dependence on technology and potential data security concerns.

Online Booking Systems

An online booking system enables customers to purchase tickets for events over the internet.
Common industries include travel, music, film, and sports.

Advantages:

 Convenient 24/7 access.

12
Made by Manas Mokashi

 Instant ticket confirmation.


 Ability to compare prices.
 Promotions and personalized offers.
 Automation of reminders.
 Frees staff for other tasks.

Disadvantages:

 Potential technical issues and downtime.


 Security and privacy concerns.
 Transaction and booking fees.
 Impersonal customer service.
 Risk of job loss for staff.

Process of Online Booking:

1. User selects a film and date.


2. System displays available times and seating.
3. Customer confirms selection and payment.
4. Confirmation and e-ticket are sent via email.

Banking Applications

ATMs (Automatic Teller Machines)

ATMs provide customers with 24/7 access to banking services, including withdrawing cash,
depositing funds, checking balances, and paying bills.

Advantages:

 Convenient and accessible banking services.


 Reduced waiting time and global access.

Disadvantages:

 Cash withdrawal limits and risks of theft or fraud.


 Limited services compared to bank branches.

EFT (Electronic Funds Transfer)

EFT allows for the electronic transfer of money between accounts, commonly used for salary
deposits and bill payments.

Advantages:

 Fast, efficient, and reduces paperwork.


 Lower transaction costs.

13
Made by Manas Mokashi

Disadvantages:

 Risk of online fraud and requires an internet connection.

Internet Banking

Definition: Internet banking is a secure online platform for managing bank accounts through
a website or mobile app. It allows users to conduct transfers, pay bills, and manage accounts
conveniently.

Advantages:

 24/7 access
 Easy account management
 Reduces need for branch visits, saving time and money
 Potentially better interest rates
 Security of transactions

Disadvantages:

 Requires a reliable internet connection


 Increased risk of fraud
 Possibility of errors in transaction details
 Physical cash cannot be deposited/withdrawn

Computers in Medicine

Information Systems: Designed to collect, store, process, distribute, and use information in
healthcare settings, such as accessing patient records and scheduling appointments.

3D Printers: Machines that create three-dimensional objects from digital files, with
applications in medicine including:

 Custom prosthetics tailored to patients


 Tissue engineering to create functional tissues
 3D printed blood vessels
 Customized medicines

Expert Systems

Definition: An expert system mimics human knowledge and experience to solve problems or
answer questions.

Examples:

 Equipment troubleshooting and repair


 Technical support
 Medical diagnosis systems

14
Made by Manas Mokashi

Key Characteristics:

1. Knowledge Base: A database of facts that generates rules for problem-solving and
decision-making.
2. Rule Base: A set of rules or logic applied to the knowledge base for specific
problems.
3. Inference Engine: A program that applies the rules to the knowledge base facts to
solve problems.
4. Interface: A method for users to interact with the system and provide input.
5. Explanation System: Offers reasoning behind decisions or recommendations and
provides a percentage probability of accuracy.

Advantages:

 Consistent results
 Faster responses
 Ability to store copious amounts of data
 Unbiased decisions

Disadvantages:

 Quality is dependent on the data entered


 Responses may lack human emotion
 Requires training for effective use.

Computers in Retail Industry

POS & EFTPOS:

 Point of Sale (POS): Terminals that read barcodes for automatic stock control.
 EFTPOS: Allows electronic payments through cards and devices, including methods
like Chip and Pin, and contactless payments.

Internet Shopping:

 Advantages: Time-saving, access to a wide variety of products, easier price


comparison, and potential cost savings.
 Disadvantages: Security concerns, inability to physically inspect products, delivery
delays, and impersonal customer service.

Recognition Systems

Optical Mark Recognition (OMR): Detects marked areas on paper for data collection (e.g.,
multiple-choice exams).

Optical Character Recognition (OCR): Converts printed or handwritten text into digital
format, useful for digitizing documents and reading number plates.

15
Made by Manas Mokashi

RFID & NFC

RFID: Uses radio waves to identify and track objects, with applications in stock tracking and
identification systems.

NFC: A subset of RFID that allows communication between devices in close proximity,
often used in contactless payments.

Satellite Systems

GPS: A satellite system for tracking exact locations, using orbiting satellites for signal
transmission. It has a wide coverage area but requires a direct line of sight.

GIS: A geographic information system for storing and analyzing geographic data, useful in
various applications such as emergency services and environmental monitoring.

Media Communication

Definition: Involves creating, transmitting, storing, and delivering media content via
satellites. It enables global broadcasting and communication but can be affected by weather
and requires maintenance.

Research Methods

Research methods are techniques used by systems analysts to evaluate the current IT system.
They help identify areas for improvement. The four main research methods include:

1. Observation: Watching users interact with the system to understand its functionality.
o Advantages: Reliable, inexpensive, provides a comprehensive view.
o Disadvantages: Users may alter behavior when observed.

2. Questionnaires: Structured sets of questions aimed at gathering user feedback.


o Advantages: Quick, inexpensive, can be anonymous.
o Disadvantages: Cannot ask follow-up questions, may have low response rates.

3. Interviews: One-on-one sessions for in-depth discussions about user experiences.


o Advantages: Allows for observation of non-verbal cues, fosters open expression.
o Disadvantages: Time-consuming, lack of anonymity.

4. Looking at Existing Systems: Reviewing current documents and processes.


o Advantages: Provides unique insights not available through other methods.
o Disadvantages: Can be time-consuming and costly.

Analyzing the Current System

Key aspects to analyze include:

 Inputs: Data entered into the system.


 Outputs: Data produced by the system.

16
Made by Manas Mokashi

 Processing: Operations performed on the inputs.


 Problems: User issues with the current system.
 User Requirements: Needs from the new system.
 Information Requirements: Data the new system must process.

Data Flow Diagrams (DFDs) help visualize the system’s inputs, outputs, and processing. A
requirements specification outlines how the new system will function.

Hardware and Software Selection

Analysts must identify suitable hardware and software, considering factors like compatibility,
cost, functionality, and ease of use, ensuring choices align with user needs.

Testing Strategies

Test strategies ensure that all parts of a system work correctly. Testing involves:

 Evaluating data structures, file structures, input/output formats, and validation routines.
 Creating a test plan with test data, expected outcomes, actual outcomes, and remedial
actions.

System Implementation

After testing, system implementation involves:

 Data Transfer: Moving data from the old system to the new one.
 Changeover Methods:
o Direct Changeover: Immediate replacement of the old system with the new one.
o Parallel Running: Both systems operate simultaneously for a period.
o Pilot Running: Implementing the new system in a small, controlled environment.
o Phased Implementation: Gradually replacing parts of the old system.

Documentation

 Technical Documentation: Detailed information for developers, covering system functions,


limitations, code, data structures, and validation routines.
 User Documentation: Instructions for end-users on operating the system, including setup,
usage, and troubleshooting.

Evaluation of the Solution

To evaluate a system, assess:

 Efficiency: Analyze resource usage, time, and cost.


 Ease of Use: Evaluate user-friendliness and accessibility.
 Appropriateness: Compare the solution with original requirements and gather user
feedback.

Identify limitations based on these evaluations and recommend improvements to enhance the
system.

17
Made by Manas Mokashi

Email:

 Definition: A method for exchanging messages and files over the internet.
 Main Uses: Personal communication, professional correspondence, and marketing.
 Company Guidelines: Include the purpose of emails, acceptable language, and email
security measures (e.g., anti-virus software).
 Acceptable Language: Use professional tone; avoid offensive language, illegal
material, and ensure clear subject lines.

Need for Security:

 Protect sensitive information with strong passwords, spam filters, and antivirus
software.

Netiquette:

 Internet etiquette that emphasizes respect and consideration for others online,
including clear and respectful communication.

Email Groups:

 Allow mass communication to defined recipients, but can also be exploited by


spammers.

Key Email Operations:

 CC (Carbon Copy): Additional recipients see all email addresses.


 BCC (Blind Carbon Copy): Additional recipients do not see other email addresses.
 Forward: Sending an existing email to a new recipient.
 Attachments: Files sent with the email message.

Spam:

 Definition: Unwanted, unsolicited emails often containing ads or phishing attempts.


 Detection: Signs include spelling errors, generic greetings, requests for personal
information, and spam folder storage.
 Prevention: Use spam filters, avoid sharing personal information, and refrain from
replying to spam.

The Internet:

 Definition: A network of networks enabling information sharing, email


communication, and various online interactions.

Blogs, Forums & Wikis:

18
Made by Manas Mokashi

 Blogs: Personal journals, regularly updated, often allowing comments.


 Forums: Online discussion platforms for posted messages around specific topics,
moderated or unmoderated.
 Wikis: Collaborative platforms where users can edit and add content.

Social Networks:

 Platforms like Facebook and Instagram for users to connect and share content, often
requiring profile creation.

Internet Service Providers (ISPs):

 Companies that provide internet access to users and businesses.

Web Browsers:

 Software for locating and displaying web content, featuring bookmarks and history.

URLs:

 Human-readable addresses for websites, replacing complex IP addresses (e.g.,


www.savemyexams.com).

Search Engines:

 Tools for locating web pages related to user queries, functioning through crawling,
indexing, and ranking.

Evaluating Information:

 Assess reliability based on source credibility, bias, and up-to-datedness.

Risks of the Internet:

 Discussions on policing the internet for inappropriate content versus freedom of


speech.

Internet Protocols:

 Definition: Rules for communication on a network.


 Key Protocols:
o HTTP/HTTPS: Protocols for web data transfer, with HTTPS providing
encryption.
o FTP: For file transfers between computers.
o SSL/TLS: Security protocols ensuring secure communication over the
internet, commonly used in online transactions.

19
Made by Manas Mokashi

Physical Safety

 Definition: Physical safety refers to creating a secure environment while using technology,
addressing risks that could lead to severe injury or death.
 Common Safety Risks:
o Electrocution: Prevent by keeping liquids away from electrical equipment, ensuring
cables are insulated, and using non-conductive materials.
o Fire Hazards: Avoid overloading sockets by using surge protectors and ensuring
adequate plug availability.
o Equipment Overheating: Ensure proper ventilation, keep flammable materials away
from heat sources, and regularly check for equipment damage.
o Trip Hazards: Secure cables with ties, keep them away from walkways, and consider
wireless devices to minimize cables.

Data Protection

 Data Protection Act (DPA): A law that safeguards personal data from misuse, with some
exemptions (e.g., domestic use, law enforcement).
 Data Protection Principles:
1. Fair Processing: Clear communication about the purpose of data collection.
2. Specified Purposes: Data must be used only for the purposes initially stated.
3. Adequate and Relevant: Only necessary data should be collected.
4. Accuracy: Data must be kept accurate and updated as needed.
5. Retention: Data should not be kept longer than necessary.
6. Rights Compliance: Individuals must have access to their personal data upon
request.

Personal and Sensitive Data

 Personal Data: Any information that can identify an individual (e.g., name, address, date of
birth).
 Sensitive Data: A specific category of personal data requiring stricter protection (e.g.,
medical history, racial origin).

E-Safety

 Definition: E-safety involves using the internet safely and responsibly.


 Importance:
o Protects personal information and prevents cyberbullying.
o Guards against online scams and helps maintain a positive digital reputation.
o Ensures privacy and control over personal data.
o Prevents exposure to inappropriate content and promotes responsible digital
citizenship.

Safe IT Practices

 Using the Internet: Utilize trusted websites and avoid sharing personal information.
 Email Safety: Be cautious with emails from unknown senders and refrain from sharing
personal data.

20
Made by Manas Mokashi

 Social Media: Use privacy settings, block/report unwanted contacts, and avoid posting
location details.
 Online Gaming: Use anonymous usernames, never share personal or financial information,
and report inappropriate behavior.

Hacking

 Definition: Hacking involves unauthorized access to computer systems or networks to


control, steal information, or cause damage. A hacker exploits technical vulnerabilities.
 Common Vulnerabilities:
o Unpatched software
o Outdated anti-malware
o Weak passwords
 Effects: Hacking can lead to data breaches, malware installation, data loss, identity theft, and
monetary loss.
 Prevention:
o Use strong passwords
o Implement two-factor authentication
o Install anti-malware software
o Use firewalls

Phishing

 Definition: Phishing is a form of social engineering that involves sending fraudulent emails to
obtain personal information.
 Effects: Can result in unauthorized access to personal data, identity theft, and fraudulent
activities on bank accounts.
 Prevention:
o Anti-spam filters
o Training staff to recognize fraudulent emails
o User access controls to prevent opening potentially harmful files

Pharming

 Definition: Pharming redirects users from legitimate websites to fraudulent ones to steal
sensitive information.
 Effects: Can lead to unauthorized access to personal data and identity theft.
 Prevention:
o Keep anti-malware software updated
o Regularly check URLs
o Ensure the padlock icon is visible in the browser

Smishing and Vishing

 Smishing: Involves SMS messages to trick individuals into sharing sensitive information.
 Vishing: Involves fraudulent phone calls impersonating legitimate companies.

21
Made by Manas Mokashi

 Effects: Can lead to unauthorized access to personal data and identity theft.
 Prevention: Similar measures as those for phishing, including awareness and education.

Viruses and Malware

 Malware: Software created to harm computer systems, causing issues like file deletion,
corruption, and system slowdown.
 Types of Malware:
o Computer Virus: Self-replicating program that can corrupt files.
o Trojan: Disguised as legitimate software, containing harmful code.
o Spyware: Monitors user activities and gathers sensitive information.
 Prevention:
o Proper coding practices
o Up-to-date anti-malware software
o Firewalls
o User education

Card Fraud

 Threat: Fraudsters gain illegal access to credit/debit cards via shoulder surfing, card cloning,
and keylogging.
 Prevention:
o Covering PINs during entry
o Using chip-enabled cards
o Regular anti-virus scans to detect keyloggers

Protection of Data

 Secure Storage: Data should be stored in an encrypted format and protected using
authentication.
 Methods:
o Biometrics
o Digital certificates
o Secure Socket Layer (SSL)
o Encryption
o Firewalls
o Two-factor authentication

Biometrics

 Definition: Authentication using unique human characteristics like fingerprints or facial


recognition.
 Benefits: Unique to individuals, difficult to replicate, reduces risks like shoulder surfing.
 Drawbacks: Intrusive data collection, potential recognition issues, and discomfort with data
storage.

Digital Certificates

 Definition: Digital files proving identity in encrypted communication.

22
Made by Manas Mokashi

 Contents: Include public key, subject information, issuer information, validity period, and
digital signature.

Secure Socket Layer (SSL)

 Definition: A protocol that encrypts data transmitted over the internet to prevent
interception.
 Usage: Commonly used to protect online transactions.

Encryption

 Definition: The process of converting plain text into ciphered text for secure storage,
utilizing complex algorithms.

Firewall

 Definition: A barrier that filters network traffic, preventing unauthorized access.


 Types: Hardware firewalls protect networks; softw
 are firewalls protect individual devices.

Two-Factor Authentication (2FA)

 Definition: A security measure requiring two forms of identification for access, adding an
extra security layer beyond passwords.

Passwords

 Definition: Digital locks preventing unauthorized access, often stored as encrypted text.
 Security Practices: Strong passwords and regular changes are crucial for security.

Copyright

 Definition: Legal protection for intellectual property under the Copyright, Designs & Patents
Act, making unauthorized copying or distribution illegal.
 Prohibited Actions: Copying, issuing, or renting original works without permission.

Software Piracy

 Definition: Illegal copying and distribution of software.


 Prevention Methods: Use of product keys, license agreements, and holograms to validate
software authenticity.

 There are six categories of validation which can be conducted on fields and data
types, these are
o Range check
o Length check
o Type check
o Presence check
o Format check

23
Made by Manas Mokashi

o Check digit

24

You might also like