Text
Text
IT UNIT-3 Notes
Topic 12: Manipulating Data
Data Integrity:
1. What is e-commerce?Ans- The buying and selling of goods and services using
computer systems. such as over the internet.
7. What is metadata?
Ans- Details or information that describe other data to provide deeper meaning or
understanding.
8. What are validation rules?Ans- Validation rules provide restrictions to the data
that can be entered to ensure any data that is entered is reasonable. While
validation does not prevent data from being incorrect, it does reduce the potential
scope of any errors in the data.
9. What is structured query language (SQl)?Ans- Structured query language (SQL) is
a widely used programming language used for manipulating and maintaining data.
Big Data: 1. What is Big Data?Ans- Big Data refers to extremely large and complex
data sets generated by modern computer systems. Traditional tools struggle to
manage it, but it can offer valuable insights, making it a key focus for many
organizations.
2. What are the characteristics of Big Data (The Five Vs)?Ans- There are five key
concepts when dealing with Big Data. which are referred to as the "five Vs':
volume. velocity. variety. veracity and value.
VolumeBig Data involves huge and ever-growing amounts of data from sources like
social media and transactions. This creates big challenges for storing and
processing the data.
VelocityBig Data is created at very high speeds. For example, platforms like
Facebook and X (Twitter) generate millions of posts and likes every minute.
VarietyBig Data comes from many sources and in different formats:Structured –
Neatly organized, like in databases.Unstructured – Includes messy data like images,
videos, or free text.Semi-structured – Not fully organized, but includes some tags
or labels to help process it.
VeracityData quality can vary. Since Big Data comes from many sources, some of it
(like social media) may be inaccurate, biased, or misleading. Ensuring data is
reliable is a major challenge.
ValueDespite the challenges, Big Data can be very useful. It helps companies
understand customer behavior, improve services, and make better business decisions.
3. What is latency?Ans- The delay between requesting and receiving data.
4. What is data mining?Ans- Data mining extracts useful information from data using
techniques like clustering, classification, and regression. It often uses machine
learning and AI to find hidden insights.
5. What does the term data warehousing mean?Ans- Data warehousing collects and
stores raw data from various sources in one central place. It combines internal and
external data to give a unified view, making it easier for decision-makers to
access and analyze information.
6. What are data analytics?Ans- Data Analytics helps organizations use data and
statistics to gain insights, make predictions, and support decision-making. Common
tools include reports, charts, machine learning, text analysis, and data security.
There are three main types:
Descriptive Analytics: Summarizes past data to understand what happened and why.
Helps identify good practices or errors.
Predictive Analytics: Uses past data to forecast future events and outcomes. For
example, predicting food shortages due to weather changes.
Prescriptive Analytics: Suggests actions to take based on predictions to get the
best results, like buying extra supplies before a shortage.
7. What are the use of big data by individuals, organisations and society?Ans- Big
Data is widely used by individuals, organizations, and society. It powers
personalized ads, product recommendations, and helps detect problems in areas like
finance, influencing many parts of our daily lives such as:
• Healthcare
• Personalised treatment plans
• Accelerate drug discovery and developement.
• Track and manage public health threats
• Infrastructure planning
• Predictive maintenance
• Traffic management and urban planning
• Utility infrastructure optimisation
• Transportation
• Public transportation optimisation
• Fuel efficiency and emission reduction
• Fraud detection
• Pattern recognition
• Behaviour analysis
• Real-time monitoring
Topic 13: Enabling Technologies
Encryption
Role of IT systems
1. What is the role of IT systems in organisations?Ans- IT systems are essential
for modern businesses and organisations, as they support and enhance virtually
every aspect of operations. From monitoring production processes to providing
employees with access to vital business information, IT systems ensure
organisations operate efficiently and effectively.
A core role of IT systems is operational support. They enable the smooth completion
of everyday tasks for management, employees, and customers, helping organisations
achieve key goals such as improving efficiency, boosting productivity, enhancing
decision-making, facilitating communication and collaboration, reducing costs,
increasing profits, improving customer service, and maintaining security and
compliance.
To deliver effective operational support, IT systems are applied across many
critical business areas:
• Automation: IT automates repetitive or simple tasks like data entry,
report generation, and basic customer service processes, freeing employees for more
strategic work and improving both organisational efficiency and customer
experience.
• Monitoring and Maintenance: IT systems continuously monitor performance
and identify issues early, preventing downtime, data loss, and operational
disruptions.
• Customer Service: Tools such as self-service portals, chatbots, and
online knowledge bases automate and improve customer interactions, enabling
customers to resolve common issues independently and reducing support workload.
• Data Management and Analysis: Organisations use IT systems to collect,
store, and analyse data, gaining insights that help optimise operations, reduce
costs, and improve products and services.
• Resource Management: Enterprise Resource Planning (ERP) systems
integrate finance, human resources, supply chain, and other functions into a
centralized system for better resource allocation and operational control.
• Collaboration: IT provides platforms for communication and teamwork,
enabling employees to work together effectively regardless of location. Cloud-based
tools support real-time document sharing and co-authoring, enhancing productivity.
• Communication Tools: Email, instant messaging, and video conferencing
software keep teams connected and support flexible communication styles tailored to
different needs and locations.
• Enterprise Social Media and Networks: Social platforms encourage
informal communication, cross-department collaboration, and idea sharing, fostering
innovation and stronger employee engagement.
• Project Management Software: These tools help teams plan, organise,
assign tasks, track progress, and meet deadlines, ensuring projects stay on
schedule and resources are used efficiently.
• Knowledge Management: Systems such as Document Management Systems
(DMS), Content Management Systems (CMS), and knowledge repositories store,
organise, and provide easy access to information, supporting informed decision-
making and consistent operations.
• Product Development: IT supports all product development stages—from
ideation and design to development, testing, manufacturing, and user feedback—
helping organisations innovate and maintain competitiveness.
• Service Delivery: IT systems streamline service delivery through
automation, data management, and workflow optimisation, allowing organisations to
efficiently reach and serve customers at scale.
In summary, IT systems are indispensable for organisations, providing the
infrastructure and tools needed to operate effectively, adapt to change, and
achieve strategic objectives in today’s competitive environment.
2. What is transaction processing, and how is it used in organisations?Ans-
Transaction processing (TP) refers to the management of individual tasks that
involve changes to data within a system, usually related to financial transactions
or product management such as stock or inventory control. The key aim of TP is to
maintain data integrity by ensuring each task is completed accurately and reliably.
Transactions are typically short-lived, self-contained events interacting with
larger systems like databases. For example, when a purchase is made on an e-
commerce website, the stock quantity is updated immediately to provide correct and
current availability information to other customers.
In organisations, transaction processing is applied in various critical areas:
Electronic Point of Sale (EPOS)Modern retail stores, cafes, and restaurants use
EPOS systems instead of traditional cash registers. EPOS integrates sales
processing and inventory management by linking customer transactions to back-office
systems. It allows quick payments via cash, card, or smartphones, while
automatically updating stock levels and triggering reorders when inventory is low.
EPOS also collects sales data to provide insights into popular products and
improves customer experience through features like self-service checkouts and
loyalty programs.
Order ProcessingOrder processing is a common form of transaction processing used in
e-commerce and ticketing systems. Each order must follow the ACID principles to
ensure reliability:
Atomicity: The transaction is treated as a whole unit, either fully completed or
not at all.
Consistency: The system transitions between valid states, e.g., validating payment
before updating stock.
Isolation: Concurrent orders don’t interfere with each other, ensuring accurate
stock handling.
Durability: Once confirmed, transaction data is permanently saved, even in case of
system failure.
Financial SystemsFinancial transaction processing relies heavily on maintaining
data integrity and security. With the rise of digital payments, these systems must
operate 24/7 with high availability and handle large transaction volumes,
especially during peak periods like holidays. They must also incorporate strong
security measures to prevent fraud and comply with financial regulations, which
adds complexity to system design.
Bacs Payment Schemes Limited (Bacs) Bacs Payment Schemes Limited (Bacs) is a UK-
based organisation that manages major payment systems, mainly direct debits and
direct credits. Direct debits allow companies to take regular payments from
customers’ bank accounts (e.g., utility bills), while direct credits transfer money
directly into accounts (e.g., salaries). Similar organisations exist elsewhere,
such as ACH in the USA and SEPA in the EU.
3. What is customer relationship management (CRM)?Ans- Customer relationship
management (CRM) systems are software tools that help businesses manage
interactions with customers and stakeholders. They use databases and other tools to
provide targeted support, improve customer experience, boost engagement, and
increase profits.
4. How and why do organisations use customer relationship management (CRM) systems?
Ans- Businesses use customer relationship management (CRM) systems to better
understand and engage with their customers. These systems help improve marketing,
sales, and service by turning customer data into useful insights. Here’s how
they’re used effectively:
Synchronise marketing events CRM systems help companies plan and coordinate
marketing activities across different platforms. They allow businesses to schedule
campaigns such as social media posts, emails or SMS messages from within the
system. CRM tools also integrate with external platforms so the same message can be
automatically shared across all channels.
Loyalty schemes CRM systems work closely with EPOS and inventory databases to
support loyalty schemes. These systems track transactions and trends both at a
general and individual level. Customers earn points based on purchases, which can
be exchanged for discounts or rewards. CRM also allows personalised offers, such as
sending a voucher for a breakfast cereal the customer has previously bought,
encouraging repeat business.
Buying trends CRM systems provide insight into sales data. This helps companies
decide how much stock to order, when to promote products, and which customers to
target. These insights help in making strategic decisions that improve efficiency
and sales.
Customer service CRM allows companies to personalise customer interactions, such as
sending birthday greetings or follow-up emails after purchases. The system also
tracks customer issues, ensuring timely and satisfactory responses to queries or
complaints.
Customer retention Retaining customers is vital for long-term success. CRM systems
help maintain relationships by drawing on data from across the business. They
support customers with relevant offers or assistance, increasing the chance of
repeat custom and positive word-of-mouth.
Upselling CRM tools identify patterns in customer behaviour. For example, if a
customer buys a laptop, the system may recommend accessories like a case or mouse.
These suggestions often lead to impulse buys, boosting overall profits.
5. How are management information systems (MIS) used in organisations?Ans-
Management information systems (MIS) are systems and processes that support the
operations of an organisation by providing managers with the information they need
to effectively run the organisation and make data-driven decisions. MIS has three
main functions, these are:
Record keeping MIS gathers data from various internal sources like transactional
systems (e.g. EPOS, CRM), employee databases, financial records, and operational
systems, and combines it with external data such as market research, industry
reports, government databases, and competitor analysis. The data is processed
through tasks like validation, cleansing, and aggregation to make it useful. MIS
handles structured, semi-structured, and unstructured data, simplifying complex
information and presenting it in an easy-to-understand way for users.
Decision-makingEffective decision-making is supported through high-quality data
that gives detailed insights that can be used as actionable knowledge. An effective
MIS should provide users with mechanisms for retrieving information in an effective
and efficient manner. Common tools include the use of query cools. search engines.
dashboards and reporting interfaces that allow users to access relevant information
based on their needs and preferences. Information retrieval systems are designed to
provide users with quick access to up-to.<face and accurate data to support
decision-making.
Project managementMIS supports project management by integrating with project
software to provide data-driven insights. This helps organisations focus projects
better, identify product issues for process improvements, spot potential risks
early, and enable effective contingency planning.
6. What are intelligent transportation systems (ITS), and how are they used?Ans-
Intelligent transportation systems (ITS) improve public and private transport by
using sensors, cameras, and monitoring tools to collect real-time data on traffic,
accidents, road closures, and weather. Analyzing this data helps identify
bottlenecks, demand levels, and predict issues, enabling better planning and real-
time adjustments. Key points of ITS are:
Scheduling and route planning ITS uses advanced routing algorithms that consider
real-time traffic, road conditions, and restrictions to find the most efficient
routes, reducing travel time and fuel use. This benefits logistics and on-demand
transport like taxis. For public transport, ITS enables:
• Dynamic scheduling: Adjusts bus and train times based on passenger
numbers and congestion to reduce wait times.
• Demand-responsive scheduling: Creates flexible routes based on real-
time passenger demand, avoiding empty stops.
• Incident management: Quickly updates schedules to minimize disruptions
from accidents or events.
Timetabling The algorithms in the systems can be used to predict future patterns
and demand. For example. using historical data and machine learning. the system may
identify specific areas of a city with high demand at the beginning or end of the
working day; so more buses at more regular intervals are required in those areas at
those times. It may also anticipate future demand. such as a steady increase in use
of a specific route which may suggest that this demand will continue to increase in
the future.
LocationsITS makes use of location-based services to collect and analyse location
data to generate insights into travel patterns, traffic flows and user behaviour.
It collects this data through:
• User-generated data: Anonymized speed and location info from smartphone
apps helps map real-time traffic.
• Community reports: Updates from the public and media share info on
accidents and road closures.
• Sensors and cameras: ITS partners with agencies to gather data from
traffic sensors and CCTV.
This combined data gives a detailed view of current traffic conditions.
Fleet ManagementITS uses GPS and telematics to track vehicle location, speed, and
driving behavior in real time. This helps logistics companies monitor fleets,
ensure safe driving, and make quick decisions on routing and scheduling based on
current demand. It's especially useful for handling sensitive or fragile cargo.
7. What are expert systems, and how are they used in organisations?Ans- Expert
systems are IT systems designed to assist decision-making in specialised fields
like medicine or technical support. They work using a knowledge base (facts and
rules from human experts) and an inference engine (which processes that information
to suggest solutions).
These systems operate within a narrow scope, focusing on specific tasks—for
example, recommending medication based on symptoms. Unlike AI or machine learning,
expert systems don’t learn from new data; they rely on fixed, pre-programmed
knowledge and rules.
In organisations, expert systems help solve complex problems by simulating expert
reasoning, offering consistent and efficient decision support in areas such as
diagnostics, troubleshooting, and compliance checking.
Operational issues
8. What operational issues do organisations face, and how do these issues impact IT
systems and users?Ans- Organisations face a variety of operational issues that can
significantly impact their IT systems and users. These include governance, risk
management, system transitions, maintenance, and data handling. Each area poses
specific challenges that, if not addressed, can disrupt productivity, data
security, and overall business continuity.
IT Governance and PolicyIT governance refers to the structures and processes that
ensure IT supports organisational goals, mitigates risks, and complies with laws.
It aligns IT strategy with business objectives and ensures legal and regulatory
compliance.Key components include:
• Strategic Alignment – Ensuring IT investments support the
organisation’s goals.
• Risk Management – Identifying and preparing for potential IT threats.
• Resource Management – Efficient use of technology and human resources.
• Performance Measurement – Using metrics to monitor IT success.
• Legal Compliance – Meeting data protection, privacy, and cybersecurity
standards.
IT policies guide user behaviour, define roles and responsibilities, and outline
how critical decisions (like server replacement) are made.
Business Continuity and Disaster Recovery
Business continuity planning prepares an organisation to operate during disruptions
(e.g. cyberattacks or system failures). It includes procedures to maintain
services, protect customers, and minimise financial loss.
Disaster recovery focuses on restoring systems and data after a major failure. It
includes:
• Recovery objectives (RTOs and RPOs)
• Backup strategies
• Role assignments and emergency protocols
Together, these plans reduce downtime, maintain trust, and ensure compliance with
regulations.
Risk ManagementRisk management involves identifying threats (e.g. cyberattacks,
human error), assessing their impact, and developing mitigation strategies. This
may involve:
• Upgrading security systems
• Enhancing data recovery measures
• Integrating risk controls into other policies (like disaster recovery)
Good risk management protects systems and supports decision-making.
User Policy (Acceptable Use Policy - AUP)This outlines how staff may use IT
resources (e.g. internet, email, software). It defines:
• Acceptable and unacceptable behaviour
• Handling of sensitive data
• Consequences for policy breaches
The AUP ensures security and maintains professional standards.
Managing IT ChangeoverWhen replacing or upgrading systems, changeovers must be
carefully managed to minimise risk:
• Phased: Introduce the new system gradually by department or module.
Lower risk but slower.
• Direct (Big Bang): Full switch to the new system at once. Quick but
riskier.
• Parallel: Run both systems temporarily to verify new system
reliability. Safer but resource-heavy.
• Pilot: Test the system in a limited area or group. Useful for
identifying issues before full rollout.
Each method is chosen based on risk, scale, and criticality of the system.
System MaintenanceMaintenance ensures systems remain reliable and up to date:
• Perfective: Adds improvements or features based on feedback or
strategy.
• Adaptive: Updates systems due to external changes (e.g. regulations or
new hardware).
• Corrective: Fixes bugs and restores normal operations. Usually reactive
and followed by regression testing to avoid new issues.
Data ArchivingData archiving stores older data that’s not actively used but still
needed. Benefits include:
• Meeting legal data retention requirements
• Supporting disaster recovery
• Providing data for analytics and audits
• Reducing the load on active systems
It helps organisations stay compliant and efficient.
Disaster Recovery PlanningA solid disaster recovery plan includes:
• Inventory of Critical Data – Knowing what needs to be backed up.
• Recovery Objectives – Setting timelines (RTOs) and data loss tolerances
(RPOs).
• Risk Analysis – Identifying threats, assessing their impacts, and
creating mitigation strategies.
• Team Roles – Assigning responsibilities during recovery efforts.
• Communication Plans – Ensuring clear contact procedures internally and
externally.
• Training & Drills – Preparing staff to act effectively during real
incidents.
The plan must be regularly reviewed and approved by senior management to remain
relevant.
In summary, managing IT within an organisation is complex. Governance, planning,
change management, maintenance, and disaster recovery all contribute to ensuring
systems are secure, users are supported, and the organisation remains operational
and compliant.
Topic 14: Using IT systems in organisations
Project management
1. Why is project management necessary when developing IT systems?Ans- Project
management is essential when developing IT systems due to the complexity and scale
of such projects. IT projects involve many aspects that need constant monitoring.
Failure in one area can affect overall quality, deadlines, and costs. The fast-
changing nature of IT means that clients often change requirements, making
management vital to avoid missed deadlines and increased expenses.
Managing a ProjectManaging an IT project involves coordinating multiple stages and
stakeholders. The project manager ensures stakeholders are involved appropriately
and manages client expectations by balancing their needs with available resources
like time, budget, and staff.
Key Features of Project Management:
Complexity ManagementBreaks down complex tasks into manageable parts, ensuring each
is planned, executed, and monitored effectively.
Resource AllocationEnsures effective use of human resources, hardware, time, and
budget. The project manager assigns tasks and allocates resources efficiently.
Risk MitigationIdentifies potential risks and prepares contingency plans. Common
risks include:
• Changing requirements (e.g., feature creep)
• Technical issues (e.g., hardware failures or data breaches)
• Human factors (e.g., misconfiguration or staff absence)
• Wider issues (e.g., pandemics, legislation changes)
Quality AssuranceOversees all stages to ensure the project meets agreed standards
and specifications.
Communication and CollaborationCoordinates communication among developers,
designers, testers, and stakeholders to ensure goals and expectations are clear.
Change ManagementManages evolving requirements and incorporates them with minimal
disruption, supporting staff through transitions.
Scheduling and DeadlinesMaintains timelines to ensure fast delivery (time to
market), helping the organisation remain competitive.
2. What are the key characteristics of a successful IT project?Ans- IT projects
vary in focus, from large-scale hardware rollouts to small software solutions.
Regardless of scale, the following characteristics are essential for success:
Clear Objectives Well-defined objectives guide planning, execution, and evaluation.
Using SMART objectives ensures goals are specific, measurable, achievable,
relevant, and time-bound.
Effective Stakeholder Engagement Stakeholders—those affected by or interested in
the project—must be involved throughout. Their feedback and support help guide the
project and ensure smooth adoption.
• Internal stakeholders: Team members, users, managers.
• External stakeholders: Clients, customers, community members,
regulatory bodies.
Detailed Planning A successful project has a comprehensive plan detailing scope,
deliverables, timelines, resources, risks, and quality standards. Realistic
scheduling and budgeting are critical.
Skilled Team The team should have the right skills and experience. The project
manager should assign tasks that match team members’ abilities and ensure
motivation and commitment.
Adaptability Plans should be flexible to accommodate changing requirements and
technologies, while keeping project goals intact and limiting feature creep.
Effective Communication Clear communication among team members, stakeholders, and
leadership ensures alignment, issue resolution, and expectation management.
Scheduled meetings and progress updates are key.
Quality Focus Quality must be maintained throughout the project. The project
manager defines quality standards and ensures best practices are followed to meet
expectations.
Risk Management Risk plans should identify, analyse, prioritise, and address
potential risks. Proactive management helps reduce negative impacts on the project.
Continuous Improvement Ongoing reviews during and after the project help identify
lessons learned and successes to improve future projects.
On-Time and On-Budget Meeting deadlines and budget constraints is vital. The
project manager must track progress, monitor spending, and take corrective action
when necessary.
3. What are SMART targets?Ans- SMART targets are an approach to setting goals and
objectives for a project in a way that ensures they can be used effectively to
monitor and evaluate the project. SMART targets must be:
Specific - the goal must be clear and well defined so that it can be more easily
tracked and assessed.
Measurable - there must be some way to quantify or measure success/progress of work
towards the goal.
Achievable - it is important to ensure that the goal can be achieved. It is often
helpful to break tasks down into smaller, more manageable sub-tasks. However, a
project manager should be careful not to subdivide a target so much that the team
loses sight of the overall objectives of the project.
Relevant - each target should align with the overall project aims. If it is not
clear how a target links. try rephrasing it or provide additional information to
relevant stakeholders to make sure they know the purpose of the target.
Time-bound - every target should have a clear and appropriate deadline. Open-ended
tasks result in a lack of urgency or focus. Unrealistic timelines place team
members under too much pressure. resulting in low morale and increased errors.
4. What tools are commonly used to manage projects, and how are they used
effectively?Ans- The most commonly used tools for project management are:
1. Nodes and Gantt Charts
2. Critical Path Analysis (CPA)
3. Precedence Tables
Nodes and Gantt ChartsNodes and Gantt charts are key project management tools used
together for planning and tracking.
• Nodes represent key milestones, events, or deliverables in a project.
Each node marks a significant point of progress or completion.
• Gantt charts visually display the project timeline, showing the start
and end dates of tasks as horizontal bars. They make it easy to see task durations,
dependencies, overlapping tasks, and overall progress.
How do draw Gantt charts: Edexcel AL - A2 - Unit 3 - Topic 15: System
development : How to Do a Gantt Chart Correctly in Exam
Critical path analysisCritical path analysis identifies the sequence of tasks that
must be completed on time to meet the project deadline. It helps project managers
prioritize essential tasks and allocate resources accordingly. Tasks not on the
critical path can have some flexibility (slack) and be adjusted without affecting
the overall schedule.
To perform a critical path analysis. the project manager must:
1. Identify all the individual tasks needed to complete the project.
2. Estimate the time it will take to complete each task (duration).
3. Identify any dependencies between tasks (e.g. back-end database must be
completed before integration testing for the e-store can begin).
4. Present the tasks using a suitable diagram (e.g. Gantt chart. arrow
diagram method).
5. Work out the longest sequence of casks that are dependent on each other
- this is the critical path.
Once the critical path analysis is complete, the project manager should continue to
refer to it and refine it throughout the project.
1. The project manager should allocate slack to tasks that are not on the
critical path. These tasks have some flexibility and can be delayed or rescheduled
without affecting the final deadline.
2. Progress on all tasks should be monitored, but special attention must
be given to those on the critical path, as any delays here can directly impact the
overall schedule.
3. If delays happen, the project manager must assess how they affect the
timeline and update the project plan accordingly. This might involve moving
resources from less critical tasks to keep the critical ones on track.
4. In the case of major issues, the project manager should first try
adjusting deadlines for non-critical tasks. If that’s not enough, they may need to
negotiate new deadlines with the client, or in serious situations, consider
changing the project scope.
How to draw CPA diagrams:
Edexcel AL - A2 - Unit 3 - Topic 15: System development : How to draw CPA Digrams
with Revision
Edexcel AL - A2 - Unit 3 - Topic 15: System development : CPA Digram question -
2020 Unit 4 paper
Precedence Tables
A precedence table is a helpful tool used to schedule and organize tasks in a
project. It shows the order in which tasks must be done and highlights any
dependencies between them. This helps project managers understand the overall
timeline, spot possible bottlenecks, and focus resources on the most important
tasks.
The table usually includes task duration, start and end times, and which tasks must
be done first. This allows managers to see which tasks are critical to keeping the
project on schedule.
Key Features of a Precedence Table
• Tasks: Each row represents one specific task in the project.
• Precedence: Shows which tasks must be completed before another can
begin (dependencies). Example: If Task 4 has precedence 2, 3 – then Tasks 2 and 3
must be done before Task 4 starts.
• Duration: The estimated time (usually in days) to complete each task.
Early Start (ES): The earliest a task can begin, based on its dependencies.
• Early Finish (EF): ES + Duration – the earliest a task can be
completed.
• Late Start (LS): The latest a task can start without delaying the
entire project.
• Late Finish (LF): LS + Duration – the latest a task can finish without
delay.
• Slack: The flexibility or "buffer" time for a task (Slack = LS – ES).
Example of a Precedence Table:
Task Precedence Duration (days) Early Start (ES) Early Finish (EF) Late Start
(LS) Late Finish (LF) Slack
1. Gather requirements and planning – 5 0 5 0 5 0
2. Content audit and revision 1 7 5 12 9 16 4
3. Information architecture development 1 8 5 13 8 16 3
4. Wireframing and prototyping 2, 3 10 13 23 19 29 6
5. Visual design and branding 2, 3 12 13 25 21 33 8
6. Front-end development 4, 5 15 23 38 32 47 9
7. Back-end development and integration 4, 5 18 23 41 34 52 11
8. Content migration and integration 2 8 28 36 45 53 17
9. Testing and quality assurance 6, 7, 8 8 38 46 47 55 9
10. Launch and deployment 9 3 46 49 55 58 9
5. How to fill a pert diagram?Ans- Edexcel IT - A2 - Unit 3 - Topic 15: System
development: How to fill a PERT DIAGRAM easily
Waterfall method
1. What is waterfall methodology?Ans- The waterfall development methodology is a
traditional, linear approach to project management where each phase must be
completed before moving to the next. It is best suited for small or simple projects
with clearly defined and stable requirements. Changes are difficult to accommodate
once the project has started. For example, upgrading office network infrastructure
is ideal for the waterfall method, while complex software development projects are
not.
2. What is the concept of the waterfall development methodology, and what are its
key features?Ans- The Waterfall methodology is a structured and linear approach to
system development. It breaks the project into clear, separate phases, and each
must be completed before the next begins. This makes it ideal for projects with
well-defined requirements that are unlikely to change.
Key Phases and Activities of the Waterfall Methodology:
Requirements Gathering and AnalysisThis phase involves identifying the system's
goals and what users need it to do.
• Stakeholders (like managers and future users) are consulted.
• Requirements are collected via interviews, surveys, or observation.
• Information is analyzed for trends, gaps, or conflicting needs.
• A strong, skilled project team is assembled based on project
requirements.
System DesignOnce the requirements are clear, the system’s structure, appearance,
and functionality are planned.
• UX/UI Design: Ensures the system is easy and enjoyable to use.
• Wireframes/Prototypes: Rough visual layouts used to test ideas early.
• Visual Design: Focuses on the final look, branding, and usability.
• Accessibility: Ensures everyone, including users with disabilities, can
use the system.
• Network/System Diagrams: Maps out hardware and infrastructure setup.
• Flowcharts: Visually shows data flow and logic, helping explain complex
systems.
ImplementationThis is where the actual system is built based on the design
documents.
• Coding: Developers write the system’s software.
• Building Infrastructure: Hardware is assembled and configured.
• Database Creation: Databases are designed and connected to the system.
• Interface Development: User interfaces are created with accessibility
in mind.
• Documentation: User manuals and technical guides are prepared for both
users and support staff.
Testing and DebuggingAfter development, the system is tested to find and fix any
problems.
• Unit Testing: Checks individual pieces of code for correct behavior.
• Integration Testing: Ensures that different parts of the system work
together.
• System Testing: The entire system is tested in real-world scenarios.
• Acceptance Testing: Stakeholders test the system to confirm it meets
their needs.
• All results are documented for tracking and quality assurance.
Installation (Deployment)The finished system is transferred from the developer’s
environment to the real-world environment.
• Hardware Installation: Physical devices are set up on-site.
• Cloud Configuration: Cloud services are connected and tested.
• Software Deployment: Software is installed and configured on target
machines.
• Training: Users are trained based on their roles. IT staff receive more
in-depth system training.
MaintenanceAfter the system goes live, ongoing support is provided.
• Bug Fixes: Unexpected problems are reported and resolved.
• Performance Optimization: The system is fine-tuned for better
efficiency.
• Security Updates: Regular updates keep the system protected from new
threats.
• New Features: As business needs evolve, new functions can be added
without rebuilding the entire system.
• Documentation Updates: All changes are reflected in updated user and
technical manuals.
3. What are the main phases involved in the waterfall development method?Ans- The
waterfall methodology consists of six sequential, self-contained phases:
1. Requirements Gathering/Analysis – Define what the system must do and
identify any constraints by consulting stakeholders.System Design – Create detailed
plans for the system's visual and technical components based on the requirements.
2. Implementation – Develop the system using the designs, which may
involve coding, configuring software, or upgrading infrastructure.
3. Testing – Verify that the system works correctly, is reliable, and
meets the defined requirements.
4. Deployment – Release the system to users for real-world use.
5. Maintenance – Monitor and support the system post-deployment, including
fixing bugs and making updates.
Agile approach
1. What is the concept of the agile development methodology, and what are its key
features?Ans- Agile is a modern project management and software development
approach that emphasizes flexibility, continuous improvement, and early delivery of
working software. Unlike the traditional Waterfall model, which completes the
entire system in one go, Agile delivers the product in small, usable parts,
allowing teams to adapt and improve over time.
Key Features of the Agile Methodology:
Iterative and Incremental Development
• Agile projects are iterative, meaning the product is reviewed and
refined regularly.
• They are also incremental, where new features and improvements are
added gradually.
• This ensures the system constantly evolves based on user feedback and
changing needs.
Fast and Frequent Delivery
• Agile delivers working versions of the system early and often, even if
they include only basic features.
• This helps end users start using the system sooner and provide real-
world feedback.
Same Core Activities, Different Process
• Activities like UX/UI design, coding, and testing are still part of
Agile.The main difference is how and when they are performed — not all at once, but
continuously throughout the project.
User Involvement and Feedback
• Agile relies heavily on regular communication with stakeholders and
users.
• Feedback is used to guide development and adjust priorities, ensuring
the final product matches user needs.
Flexibility and Adaptability
• Agile allows changes to be made even late in the project.
• This makes it ideal for large and complex projects where requirements
may evolve over time.
2. What are the benefits and challenges of using an agile approach?Ans- Benefits of
Agile:
• Faster time to market: By focusing on fewer features at a time, working
parts of the system can be delivered much sooner. This allows real users to test
the system early and give feedback.
• Greater flexibility: Since changes are small and frequent, it’s easier
to adapt quickly to new requirements or market shifts without restarting the entire
project.
• Improved product quality: Continuous testing, feedback, and refinements
help catch and fix problems early, leading to a better final product.
• Higher team morale: Agile promotes teamwork and collaboration, which
often results in more motivated and engaged team members.
Challenges of Agile:
• Cultural shift required: Moving from a traditional, structured method
to Agile can feel uncertain and unstructured, making the transition difficult.
• Uncertain timelines: Since priorities are based on ongoing feedback, it
can be hard to predict exactly when the project will finish or what the next focus
will be.
• Needs strong communication: Agile depends heavily on open and frequent
communication within the team and with stakeholders to succeed.
3. What are the main phases involved in the agile approach to development?Ans- The
Agile approach has similar phases to the waterfall method, but focuses on small,
continuous improvements and revisits each phase repeatedly in every iteration. The
key phases in each Agile iteration are:
1. Requirements: At the start of the project, overall requirements are
set. Then before each iteration, these are reviewed and refined to decide what
specific features or changes will be worked on next.
2. Plan: There’s a broad plan made at the beginning of the project, but
it’s less detailed than traditional methods. Before each iteration, the team
creates a focused plan outlining the features they aim to deliver during that
cycle.
3. Design: Agile uses user-centered design, prioritizing what users need.
Designs are created “just-in-time” — only what’s needed for the upcoming iteration,
keeping things flexible and efficient.
4. Develop: The team works on small, incremental changes identified during
planning and design. Since the updates are small, they can be delivered quickly.
5. Release: At the end of each iteration, the new version is released to
users. The team monitors how it performs and gathers feedback before starting the
next cycle.
TrainingTraining is the process where machine learning models learn from data. The
dataset is typically split into two parts:
• Training set: This larger portion teaches the model by helping it find
patterns and adjust its decision-making. For example, in spam detection, the model
compares its prediction to the actual label and learns from the difference.
• Test set: This smaller, unseen portion is used after training to
evaluate how well the model performs. If results are poor, the model may be refined
and retrained until it achieves the desired accuracy.
Predictions
Once you are satisfied that the model is working as expected, it can be applied to
new data to make predictions. For example, identifying cars and pedestrians in
images from a self-driving car. or determining if a comment on social media is
positive. negative or neutral.
5. What are the potential impacts and possibilities of machine learning?Ans-
Machine learning has many potential applications. Beyond using numerical data for
classification, as seen in the iris plant example, it offers powerful tools that
can significantly impact individuals and organisations. These tools are as
follows:
Natural language processing (NLP) NLP focuses on enabling computers and humans to
interact using everyday language. It helps machines understand, interpret, and
generate human language meaningfully by considering context and regional language
variations. This improves accuracy compared to traditional word-by-word input
methods.
Key Applications of NLP:
• Search Engines: NLP improves search results by helping engines
understand user intent better.
• Virtual Assistants: When combined with speech recognition, NLP enables
assistants like Siri and Alexa to understand accents, grammar variations, and non-
standard questions.
• Automated Language Translation: NLP enhances translation quality by
using large datasets to produce translations closer to those of native speakers,
moving beyond literal word-for-word translation.
• Chatbots for Customer Service: NLP improves chatbot quality and
responsiveness, especially for common or simple queries. This allows human agents
to focus on complex or critical issues, leading to better customer service.
Speech recognition Speech recognition has been used for interacting with computers
since the 1980s and 1990s, originally focused on accessibility and limited
automation like phone helplines. As computing power, data availability, and
algorithms advanced, its use became more widespread. Early systems required users
to train the software with voice samples, which was time-consuming and often
inaccurate. Today, tools like Apple’s Siri and Amazon’s Alexa use large datasets
and natural language processing to greatly improve the accuracy and quality of
speech recognition.
2. What are the uses of Virtual reality? Ans- The immersive quality of VR offers a
variety of applications beyond entertainment, including:
• Education: Enables students to experience content in engaging ways,
such as exploring historical sites or underwater environments.Training: Provides a
safe space to practice high-risk skills, like pilots handling emergencies or
doctors performing surgeries.
• Design and Engineering: Allows architects and engineers to visualize
and interact with 3D models of buildings before construction, helping to identify
and fix design flaws early.
3. What is Augmented Reality? And what are its uses?
Ans- Unlike virtual reality, which aims to completely immerse a user in a simulated
environment, augmented reality (AR) aims to blend the virtual and real worlds by
superimposing computer-generated content on elements of the real world captured
through a digital device. For example, some retailers offer an AR feature that lets
you select products, like chairs or tables, and see how they look in your room
before buying them. Other examples include:
• Education: supporting skill development, such as maintenance, by adding
virtual tags or labels to items to help users identify and learn about components.
• Navigation: augmented maps that overlay information and directions onto
buildings and roads as you explore.
• Entertainment: interactive games where digital elements merge with the
real world, creating unique experiences.
5. What technology and infrastructure enable and support the IoT?Ans- The Internet
of Things (IoT) relies on a range of technologies and IT infrastructure to function
effectively. These can be broadly grouped into four key areas: sensors, networks,
embedded systems, and storage.
SensorsSensors are essential for collecting real-world data and converting it into
digital signals. They monitor environmental or object-specific conditions like
temperature, motion, humidity, or heart rate.
• Examples include temperature sensors in homes or biometric sensors in
fitness trackers.
• Sensors are the foundation of IoT, enabling everyday objects to become
data-generating smart devices.
NetworksIoT devices rely on network infrastructure to transmit data between
sensors, systems, and devices.
• Networks can be wired or wireless, and common types include broadband,
public Wi-Fi, 4G LTE, and 5G.
• The choice of network depends on factors like range, bandwidth, power
use, and scalability.
• Constant connectivity is often required for IoT systems to be
effective.
Embedded SystemsEmbedded systems are specialised computing units integrated into
IoT devices.
• They typically include a microprocessor or microcontroller, memory, and
communication modules.
• These systems perform specific tasks, such as controlling a washing
machine or monitoring steps in a fitness tracker.
• They are compact, energy-efficient, reliable, and form the "things" in
the IoT.
StorageIoT devices generate massive amounts of data that must be stored and managed
efficiently. This includes:
• Sensor data (e.g., temperature, location)
• Multimedia data (e.g., images, audio)
• Log data (e.g., system status, errors)
• User data (e.g., preferences, settings)
There are four main types of storage used in IoT systems:
1. Edge storage: Data is stored/processed locally on the device or nearby
gateway—ideal for real-time applications and reducing network load.
2. Cloud storage: Centralised storage with high scalability and
accessibility.
3. Fog computing: Decentralised mini-data centres located near the devices
for faster response and lower latency.
4. Hybrid storage: A combination of edge, fog, and cloud storage to
balance performance, security, and cost.
Together, these components enable the IoT to function efficiently, delivering
automation, insights, and smart capabilities across various domains.
6. What are the potential security issues related to the IoT?Ans- The Internet of
Things (IoT) presents several security risks due to its interconnected devices and
the sensitive data they collect and transmit. The following are key security
concerns associated with IoT systems:
Privacy ConcernsIoT devices often gather personal data, such as location, health
metrics, and behavior patterns. If this data is accessed without authorization, it
can lead to:
• Privacy breaches
• Identity theft
• Threats to personal safety
Mitigation: Use strong encryption and access controls to protect data privacy.
Data IntegrityTampering with IoT-generated data can cause severe consequences. For
example:
• False industrial readings may disrupt processes.
• Incorrect health data can delay critical treatments.
Mitigation: Implement data validation and integrity checks to detect and prevent
errors or manipulation.
Unauthorised AccessIoT devices are often targeted by cybercriminals using
vulnerabilities like:
• Weak passwords
• Outdated firmware
• Unpatched software
Mitigation: Use strong authentication, keep software updated, and apply security
patches regularly. Many embedded systems lack automatic updates, making this an
ongoing challenge.
Denial of Service (DoS) AttacksA DoS attack floods networks or devices with
excessive traffic, causing slowdowns or outages. IoT systems are especially
vulnerable due to their reliance on constant communication.
Mitigation:
• Use network segmentation to isolate secure areas
• Apply traffic filtering to control data flow
• Enable rate limiting to prevent overload
Insecure Communication ChannelsIoT devices often use unencrypted channels (like
public Wi-Fi or Bluetooth), which can expose data to interception.
Mitigation:
• Use encryption protocols like SSL/TLS or IPsec
• Avoid connecting to unsecured public networks (e.g., cafes, malls,
hotels)
By addressing these concerns with proactive security measures, individuals and
organisations can better protect their IoT systems and the valuable data they
manage.
7. How can high-level plans for IoT solutions be produced?Ans- To produce high-
level plans for an IoT solution, identify the goals and how tasks will generate
data. Consider the components, systems, and required processes. Create a written
plan detailing needs, followed by an information flow diagram illustrating the
design.
Example – Smart Home:Components: Smart thermostats, door locks, cameras, lights,
motion sensors.Description: Devices communicate wirelessly via a central hub
connected to the internet and a smartphone app for remote control. The Wi-Fi is
secured with a passkey. Short-term data is stored on the hub and devices, while
long-term data is backed up to the cloud for analytics and tracking.
Exam Practice: