Ict cpt-3 PDF
Ict cpt-3 PDF
LDDDDLD
0111101
Barcodes are most commonly found at the checkout in supermarkets. There are
1
The barcode has been read, then what happens?
» the barcode number is looked up in the stock database ; this key field uniquely identifies
» when the barcode number is found, the stock item record is looked up
» the price and other stock item details are sent back to the checkout
» the number of stock items in the record is reduced by 1 each time the barcode
is read
» this new value for number of stock is written back to the stock item record
» the number of stock items is compared to the re-order level; if it is less than
» once an order for more stock items is generated, a flag is added to the record
» when new stock items arrive, the stock levels are updated in the database.
» possible to check customer buying habits more easily by linking barcodes to,
2
» the customer is given an itemised bill
QR codes can hold considerably more information than the more conventional
Description of QR codes
» A QR code consists of a block of small squares (light and dark) known as pixels.
It can presently hold up to 4296 characters (or up to 7089 digits) and also
» The three large squares at the corners of the code function as a form of
alignment; the remaining small corner square is used to ensure the correct size
and correct angle of the camera shot when the QR code is read.
Uses of QR codes:
» advertising products
Uses of QR codes:
» point the phone or tablet camera at the QR code
» the app will now process the image taken by the camera, converting the
» the browser software on the mobile phone or tablet automatically reads the
data generated by the app; it will also decode any web addresses contained
3
within the QR code
the phone/tablet.
» There will be fewer errors; the higher capacity of the QR code allows the use
» QR codes are easier to read; they don’t need expensive laser or LED scanners like barcodes – they can be
there are a large number of free apps available to a user for generating QR
codes, that means anyone can do this. It is relatively easy to write malicious
code and embed this within the QR code. When the code is scanned, it is
possible the creator of the malicious code could gain access to everything on
the user’s phone (for example, photographs, address book, stored passwords,
and so on). The user could also be sent to a fake website or it is even possible
4
Digital cameras
Digital cameras have essentially replaced the more traditional camera
» remove ‘red eye’ when the flash gun has been used
» and so on.
But the drawback is often inferior lens quality and limited memory for the storage
of photos. But this is fast changing and, at the time of writing, many smartphones
Keyboards:
Keyboards are by far the most common method used for data entry. They are
5
used as the input devices on computers, tablets, mobile phones and many other
electronic items.
Microphones:
Microphones are either built into the computer or are external devices connected through the USB port or using
Bluetooth connectivity. A microphone can convert sound waves into an electric current. The current produced is
converted to a digital format so that a computer can process it or store it.
Optical mouse:
An optical mouse is an example of a pointing device. It uses tiny cameras to take 1500 images per second.
Unlike an older mechanical mouse, the optical mouse can work on virtually any surface.
Benefits of an optical mouse over a mechanical mouse
Most optical mice use Bluetooth connectivity rather than using a USB wired connection. While this makes the
mouse more versatile.
2D and 3D scanners:
Scanners are either two dimensional (2D) or three dimensional (3D).
2D scanners
These types of scanner are the most common form and are generally used to input hard copy (paper)
documents. The image is converted into an electronic form that can be stored in a computer.
Computers equipped with optical character recognition (OCR) software allow the scanned text from the
document to be converted into a text file format.
This means the scanned image can now be edited and manipulated by importing it into a word processor.
If the original document was a photograph or image, then the scanned image forms an image file such as JPEG.
6
3D scanners
3D scanners scan solid objects and produce a three-dimensional image. Since solid objects have x, y and z
coordinates, these scanners take images at several points along these three coordinates. A digital image which
represents the solid object is formed.
Application of 2D scanners at an airport:
2D scanners make use of OCR technology to produce digital images which represent the passport pages.
Because of the OCR technology, these digital images can be manipulated in a number of ways.
At many airports the two-dimensional photograph in the passport is scanned and The two digital images are
compared using face recognition/detection software.
Key parts of the face are compared.stored as a JPEG image.
The face in Figure 3.30 shows several of the positions used by the face recognition software. Each position is
checked when the software tries to compare two facial images. Data, such as:
When the image from the passport and the image taken by the camera are
compared, these key positions on the face determine whether or not the two images represent the same face.
7
8