Ict Notes 2345nn
Ict Notes 2345nn
er
ch
211 ea
84 T T
129 i IC
09 an
rgh
e r
ch
a
Te
Mi
T
IC
ed
i
h an
m
i r g
am
M
ed
m
oh
am
oh
.M
rM
M Scan Me
Mr
Page 1 of 90
Chapter 1: Types and components of computer
systems
Hardware: - General term for the physical components which make up a computer system
er
(i.e Mouse/Keyboard)
ch
Software: - General term for programs which control the computer system
Two types:-
211 ea
1. Systems software: Those allow the computer to run properly such as the OS
(Windows/IOS/Linux/etc...)
84 T T
2. Application software: Those which allow the user to accomplish specific tasks (i.e
spreadsheets/word processors/etc...)
129 i IC
1. CPU (Central Processing Unit):- Part of the computer which interprets and executes
the commands from software/hardware, as well as it does the mathematical
operations in a computer.
09 an h
CPUs used to be made up of many parts, but due to modern improvements, the CPU
has now become a microprocessor.
irg
CPUs are made out of two components:-
dM
The reason behind why they are used is due to their fast data access and data
transfer speed (to further learn about HDDs, check out the Chapter 3 summary)
oh
er
Stores data/files which are currently in use Stores items such as configuration data
ch
*Other types of internal computer hardware
211 ea
1. Motherboard: - Allows the processor and other computer hardware to function and
communicate. It sort of acts as a “hub” for all the devices connected to the computer
84 T T
2. Video Card:- Allows a computer to send digital data to a display device such as a
monitor
129 i IC
A video card has the following components:-
• Processing unit
• Memory unit (RAM)
• Cooling mechanism
09 an
• Connection to a display unit
h
3. Sound Card: - Integrated circuit that allows a computer to produce sounds via a
irg
speaker/headphone. It also allows the user to record microphone
This can happen through 2 ways:-
dM
*System Software
am
1. Compiler: - Computer program which translates HLL (Source code) to machine code
(object code)
oh
2. Linkers:- A program which combines a bunch of compiled files and joins them
together to make 1 program ]
.M
3. Driver:- Software which allows one or more hardware to communicate with the OS
4. Operating System:- Is the software running in the background of a computer
system, and manages many of the basic functions (See later)
Mr
5. Utilities:- Programs that have been designed to carry out specific tasks (Anti-
Virus/Anti-Spyware/Backup of files/etc...)
er
2. Spreadsheets: Used to manipulate and organize numerical data. It allows for
ch
features such as: (Use of formulas for calculations, ability to produce graphs, Ability
to do if functions and modelling)
3. Database: Used to organize, manipulate, and analyze data. It allows for features
211 ea
such as : (Carry out queries and produce reports, add/delete/modify data)
4. Control & Measuring software : Allow computer or microprocessor to interface with
84 T T
sensors so that it can: (Measure physical quantities, control applications by
comparing data with stored data or preset data)
5. Apps:- Type of software that runs on smartphones or tablets and includes: (Video
129 i IC
and music streaming/GPS/Camera facility)
6. Photo editing software: Allow user to manipulate photographs stored on a
computer, for example, you can: Crop/Change brightness/Resize/Combining
pictures together/etc...
09 an
7. Video editing software: Allows the user to manipulate videos and produce an
edited video, and includes: (Rearranging/Removing/Adding clips, Applying color
correction/Creating transitions)
h
irg
8. Graphics manipulation software: Allows bitmap and vector images to be changed,
by alternating lines, curves, and text.
dM
*Types of computers
1. PC/Desktop computers: Refers to a general purpose computer which is made of
me
separate components
Advantages Disadvantages
Spare parts tend to be standardized; resulting Not particularly portable
am
in lower cost
Better specifications Can be complex/clutter up desk space
Large casing allows good wasting of heat build Necessary to copy files if you want to do work
up somewhere else
oh
.M
2. Laptop computers: A type of computer where all the components are hooked up
together in one single unit
• Low weight
Mr
er
Link into any multimedia system Heat buildup not wasted as easily
ch
3. Tablets: Relatively new internet-enabled, touch friendly, portable computers. Here,
the tablet uses an on screen touch keyboard, and can connect to the internet using
211 ea
Wi-Fi or 3G/4G/5G
84 T T
Some features of the tablet are:-
• High-Definition Anti-Glare screens
• Front and back cameras
• Lightweight and long battery life
129 i IC
• Bluetooth connection
• Make use of backup storage facilities
Advantages
09 an
• Have a number of sensors to carry out multiple tasks (i.e Proximity sensor for
detecting how close a tablet is to the ear)
h
Disadvantages
irg
Fast switch-on time Limited memory capacity
Portable Can be expensive to run if 3G/4G/5G is
needed
dM
Don’t generate any heat Don’t support as many file types as other
computers
Can go on standby (stay connected but turned
off)
am
er
• Send/Receive E-Mails
ch
• GPS
• Internet surfing capabilities
211 ea
• Calendar
• Telephone banking
84 T T
• VoIP
• Streaming of videos/music
• Social network
129 i IC
• Instant messaging
Advantages
09 an h
Small in size and lightweight; makes them
Disadvantages
Small screens make it difficult to type and read
irg
portable
Can make phone calls and connect to the Web browsing/Photographing can drain the
internet battery rapidly
dM
Can be used anywhere due to Wi-Fi Small memory size in comparison to other
capabilities computers
Have hundreds of apps Easy to lose
Reasonable battery life Slow data transfer rate
me
• Weather forecast
• Fitness/Health programs
• GPS
Mr
Advantages Disadvantages
Very convenient since notifications are Large and bulky; making them uncomfortable
delivered to the user’s wrist
Very easy to use (Esp. for monitoring health Rather unattractive in their design
and fitness)
er
Can have more than 1 CPU
• Have fast processing speeds
ch
• Have multiple OS’
• Huge amounts of storage capacity
211 ea
• Huge internal memories
• Often operate through batch processing or time sharing
84 T T
*Emerging technology and their effect
1. Artificial Intelligence Biometrics: Artificial intelligence solves biometric problems such
129 i IC
as the need to place your finger correctly so a device can read it. It learns from
every scan a human does, and even if they change their look (i.e change their hair
color, cut it, get cut), it’ll still recognize them due to what it has learned.
ways:- 09 an
2. Vision enhancement systems: Used to enhance a person’s view of things, in two
h
• Low-Vision : Use video technology connected to headset so that the objects
irg
can be projected for the user
• Night Vision: Visible and infrared light are amplified so that the image can be
seen in apparent darkness
dM
3. Robotics: Used in many factories (car factories), to weld car bodies, fit items such as
windscreens, and do manual jobs (See chapter 5 summary)
me
Applications such as drones can be used to scout military bases, or take a closer
look at locations which experienced a phenomena
am
Another application is the use of robotic arms in surgery, where it allows the surgeon
to be more flexible and precise.
4. Quantum Cryptography: Science of making a message unreadable to any
oh
cryptography system. It is used in Fiber lines to protect data and make it secure
5. Computer-assisted Translation: This type of translation goes some way to
overcome word-to-word translation issues. It uses a particular type of translation
Mr
method to decrease the effect of this issue. To do this, it uses two tools
er
Holograms are used in the following applications:-
• Engineering
ch
• Architecture
• Simulations
211 ea
• Medical imagine
• Cinema
84 T T
• Gaming
• Advertisements
• Holographic televisions and computer memories
129 i IC
• Optical computers
09 an
7. Virtual reality: Artificial environment which allows you to get the feeling of reality
through the use of goggles and helmets.
rgh
Virtual reality is used in the following applications:-
• Military applications
Mi
• Education
• Healthcare
• Entertainment
ed
• Fashion
• Heritage
mm
• Business
• Real estate
• Engineering
a
• Sport
oh
• Media
• Scientific
.M
visualization
Mr
er
2-CLI:- Command Line Interface, allows the user to interact with the computer and
ch
operating system through typing a number of commands in order to allow it to perform
tasks. Users usually need to learn a number of commands in order to use it efficiently.
211 ea
Interface Advantages Disadvantages
CLI - User is in direct communication - User needs to learn a
84 T T
- User is not restricted to a number of number of commands
options - Commands need to be
- Possible to alter the configurational typed in
129 i IC
settings - Commands need to be
typed in correctly, or the task
won’t be performed
- Difficult to edit commands
GUI
09 an
- No need to learn commands
- More user friendly
h once typed in
- Takes up more space than
CLI
- Pointing device is simpler than typing in - User is limited to icons only
irg
commands - Needs an operating
system which uses up more
dM
memory
me
am
oh
.M
Mr
er
Most common input devices on computers, and have ergonomic keyboards for people who
have a risk of RSI.
ch
Uses Advantages Disadvantages
Input of data into app Fast entry Can be difficult to use with limited
211 ea
software arm movement
Typing in commands Easy to use Slow method compared to direct
84 T T
data entry
Easy to do verification check Large space
129 i IC
1. Concept Keyboard: uses icons and phrases instead of standard letters, usually used in
food restaurants:-
• Fast data entry
• Waterproof keyboard
09 an
• Tamper resistant preventing people from keying in corrupt information
2. Numeric Keypads:- Used to enter numbers only
h
irg
Uses Advantages Disadvantages
ATMS Faster than standard Small keys make it difficult to
keyboards input data
dM
Mobile phones Very easy to carry around Order of numbers can sometimes
POS be not intuitive
Chip and PIN
Fast data entry
me
*Pointing Devices
am
1. Mouse: User can control the position of by moving the mouse, and double clicking to
select items
oh
available
Controlling position of
pointer
er
More difficult to do functions such as drag and drop
ch
3. Tracker ball: controls the pointer on the screen by rotating a ball, used for people with
limited hand and arm movement
211 ea
Uses Advantages Disadvantages
84 T T
Where users have Doesn’t need fine control Not supplied with computers as a
disabilities standard
Control room environments Easier to use than mouse May need training before usage
Luxury cars More accurate in positioning
129 i IC
More robust
Less desk space needed than mouse
*Remotes
09 an h
Used to control operations of devices remotely through infrared signals
irg
Uses Advantages Disadvantages
Televisions/Satellite Operated from any Reasonable Difficult for people with restricted
systems/DVD players/hi-fi distance arm movement
dM
systems
Control multimedia systems Some processes (i.e chemical) Very easy to block signal due to
can be hazardous walls
Industrial applications to remotely
me
control processes
*Joysticks
am
Have similar functions to that of the mouse and tracker ball, by gripping the handle, you are
able to control the movement.
oh
er
Uses Advantages Disadvantages
PDAs /Self-Service/Information Fast data entry Limited options
ch
systems
ATMs/Point-of-Sale/Interactive Easy method for choosing Can lead to health problems
white boards options
211 ea
Computer-based training User friendly
As an output device
84 T T
*Scanners
129 i IC
Used to enter information from a hard copy to the computer through a light source
Uses Advantages Disadvantages
Convert documents into
formats of various
software
Scan in old documents
09 an
Images can be stored for editing
h
Much faster and more accurate
Limited quality depending on the
resolution
Fairly slow
and protecting than re-typing the documents
irg
original/keeping a copy.
Scan photographs Possible to recover damaged
docs
dM
Scan barcodes
*Digital Cameras
me
Are a replacement for traditional film cameras, and can have their files transferred
through:- Memory card/Connection through USB port/Wireless
am
(Note, the points in this table; if not clarified, will be a comparison between digital and
traditional cameras)
oh
Advantages Disadvantages
Produce better quality Need to be IT literate to use
photographs properly
.M
Advantages Disadvantages
Easier to manipulate video footage using specialist software Cost
er
High quality of images, which helps in editing
ch
*Microphone
211 ea
Used to input and manipulate sound on a computer
84 T T
Uses Advantages Disadvantages
Input sound in presentations Faster to read text than to type it Use up a lot of memory
Voice Recognition Software Possible to manipulate sound in real-time Not as accurate as typing
manually
129 i IC
Sensor to pick up sound Improving safety in cars; no need to
remove hands while operating the system
VoIP
*Sensors 09 an h
Analogue sensors detect data and have their data converted through an ADC (Analogue
irg
to Digital Converter), usually used in monitoring and control applications.
Advantages Disadvantages
dM
Automatic
am
*Graphics tablet
Used to produce freehand drawings
oh
er
More personal way of Can be left on constantly Very limited features
having conversations
ch
Enable video conferencing Allow people to keep contact Need to be connected to
with each other, without the computers
need to travel
211 ea
84 T T
*Light pens
Detect light changes are detected on CRT monitors
129 i IC
Uses Advantages Disadvantages
Selecting objects on CRT Greater accuracy than touch Lag problems
screens screens
Drawing on screen
09 an
Small
Easy to use technology
h Works with CRT monitors only
Not accurate
Dated technology
irg
*Direct Data entry devices
dM
2. Contactless card readers: Allows customers to pay up to 25$ without entering their PIN
.M
er
4. Terminal displays that money has been taken
ch
3. Chip and PIN readers:- Similar to smart card readers, and has a space where the card
can be inserted and a PIN is keyed in ( Only different than contactless in the way that a
211 ea
customer needs to input their PIN, and RF technology is not used)
Uses Advantages Disadvantages
84 T T
Where payment is done More secure than other systems Need to be careful that PIN is not
through cards only read by shoulder surfers
More robust than other systems
129 i IC
4. RFID readers:- Used to read and capture information stored on a tag
RFID Chips contain:- Microchip that stores data/Antenna used to receive and transmit
data
09 an
Tags are usually passive or batter powered. Either by using the reader’s Radio wave
h
energy to give back the info, or have an embedded battery.
irg
Uses Advantages Disadvantages
Livestock tracking No line of sight contact Tag collision (signals overlapping)
Retail Robust and reliable Easy to jam or interrupt
dM
Admission passes Fast read rate Easy to hack into their signal
Libraries Allows read and write operations as well More expensive than barcode
as being able to read many chips at once systems
me
5. MICR:- system which can read characters printed in special ink, at the bottom of a
cheque for example.
am
er
More accurate than manual Sometimes need to be checked
entry manually which is time and money
ch
consuming
More accurate than OCR
211 ea
7. OCR:- Takes scanned text and converts it to computer-readable form
Uses Advantages Disadvantages
84 T T
Processing passports and Much faster than manual entry Has difficulty reading handwriting
IDs
Reduction of errors Not a very accurate technique
129 i IC
Comparison between OCR and OMR
OCR OMR
errors 09 an
Possible for customers to extend answers
Can read handwriting- but can also cause
faster
Problems recognizing all handwritings More accurate
8. Barcode Readers:- Read information off of a barcode in POS terminals through barcode
me
scanners
Uses Advantages Disadvantages
Supermarkets and shops Faster than manual entry Expensive to admin
am
9. QR codes can contain more information than a barcode, and due to the development of
smart phones, they can be easily scanned through the embedded app. They can contain
multiple items, ranging from telephone numbers, to offers, and even locations.
Mr
er
Uses Advantages Disadvantages
Primary output display Angle of viewing better than Rather heavy and can cause
ch
device for computers most TFT monitors safety hazards
Used with light pens Work with light pens in CAD and Run very hot and can cause fires
CAM. if no ventilation is present
211 ea
Consume more power than
modern monitors
84 T T
Flicker; cause headaches and
vision problems
129 i IC
2. TFT monitors: - Usually the screen for laptop computers, makes use of pixels controlled
by microprocessors
Uses Advantages Disadvantages
Primary output device for
laptop computers and
other types
Integral part of laptop
09 an
Lightweight and don’t pose the
same hazards as CRT
h
Less glare than CRT and less
Viewing angle is critical to obtain
a clear image
heat
3. LCD/LED Monitors:-
me
To display output on the screen, it uses a form of backlit technology, as well as diodes to
make combinations of Red Green and Blue. There are many reasons why these kinds of
am
for making LCD screens. What this does is that it allows the screen to be bendable, meaning
that the viewing angle is improved. This also means that the user will be more comfortable
since they can suit the screen’s shape to their needs. If this technology is moved on to
phones, they will have the ability to bend around your wrist making them less lose-prone.
er
• Do not require backlighting
• Can be made into large thin sheets
ch
• Very large field of view
211 ea
4. Multimedia projectors: Used to magnify and project images on a screen that they receive
from a computer
84 T T
Uses Advantages Disadvantages
Training presentations Enables many people to see the Images can be fuzzy
same image
129 i IC
Ad presentations Avoids the need for more than 1 Expensive to buy/set up
computer
Home Cinema systems Setting them up can be complex
09 an
5. Laser printers: Produce very high quality hard-copy outputs at a very fast rate. Usually,
h
they rely on a buffer where data is stored before printing
irg
Uses Advantages Disadvantages
Where low noise is Fast Fast only when several copies
required are being made
dM
Where high quality, fast Can handle great amounts of Color printers can be expensive
printing is needed printouts
Consistently high quality Produce ozone and other organic
compounds
me
6. Inkjet Printers: Used to produce good quality hard copies, but at a slower rate due to
am
7. Dot Matrix Printers: impact printers, where a print head presses against inked ribbons
Uses Advantages Disadvantages
Noisy environments Used in environments where it is Very noisy
a problem for other types of
printers
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 18 of 90
Multi part stationary Carbon copies can be produced Cost more than inkjet initially
Where impact printers are Cheap to run and maintain Slow and has poor printing
valued quality
Easy to use if continuously
required
er
8. Speakers: - Connected directly into a computer to produce the sound at a higher volume
ch
from the computer itself
211 ea
Uses:-
• Output sound in presentations
84 T T
• Playing sound files
• Audio output for on-screen text
129 i IC
9. Actuators:- are devices which take orders and signals from a microprocessor and
convert them into a type of act.
Motors
Uses
Automatic washing
machines/central heating
systems/glasshouses
09 an h Lights
irg
Uses
Control of robot arms
Security lights
Computers; to control
Glasshouses
fans/disk drives
dM
Buzzers Heaters
Uses
me
10. 3-D Printers:- Used to produce solid objects that actually work by placing layer over
layer until the object is completed
.M
• Use additive manufacturing (aka they put layers over each other)
• Also use subtractive manufacturing to carve the object
• Direct 3-D printing Uses inkjet technology
• Binder 3D is similar to normal 3D, but with two passes instead of one (dry
powder then solid form)
• Newer technologies use lasers and UV-Light
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 19 of 90
Fields where 3-D printing can be used:-
• Making prosthetic limbs
• Making items which allow reconstructive surgery
er
• Aerospace, in making aero planes
• Fashion and art
ch
• Making parts for objects (usually cars) which are no longer in production
211 ea
Process for making a solid object in 3D printers
84 T T
1. Design is made using CAD software
2. Finalized drawing is imported into a software which prepares it for printing
3. 3-D printer is set-up to allow object to be made
4. Object is made layer by layer, and can range from minutes to hours depending on
129 i IC
the thickness
5. Object is removed from the printer, and prepared to wash away the excess
materials from it
Advantages
09 an h
Disadvantages
irg
Can manufacture any solid Potential to make items which do
product the user wants easily not stick to others’ copyright
Allows rapid prototyping If it falls in the hands of wrong
dM
er
Copying of data and transferring it to a different medium in case a problem happens to the
main storage device or the main files. (Ex. Storing server data on magnetic tape)
ch
*Reasons of backing up data:-
211 ea
• Safeguard data to save it from failure of data
• Safeguard data from hackers (corruption/deletion)
84 T T
• In case files need to be used somewhere else
Note: Data can still be effected by viruses even if backed-up
129 i IC
*Serial access: - Accessing each record until the wanted record is found
• When updating files; the original file is called the master file
•
• 09 an
The additional data added to the master file is called the transaction file
The updated tape is the new master file
Here’s how the process goes:-
h
irg
• Transaction File is stored in the same order as the Master File
• The file is added to the master file to make a new master file
dM
• The two records are compared and if there are new files on the transaction file, then
they are compared and the new files are transferred
• Process is repeated until a new updated master file is made
me
*Direct access: - Computer calculates where it should store the data and moves to the data
through its calculations, making the process much faster
am
er
access time/data dropped or
transfer rate subjected to strong
ch
magnetic fields
Transfer data Large memory
211 ea
between computers capacity
Method of
transferring data
84 T T
between computers
3. Magnetic Tapes: - Very thin strip of plastic coated with magnetic layer which is a set
129 i IC
of 1s and 0s. It uses serial access causing it to be nearly useless in real-time
Uses Advantages Disadvantages
Batch processing
processes (clearing
of cheques, utility
billing)
09 an
Generally less
expensive in
comparison to HDDs
h Slow data access
time
irg
Back-up media Robust technology Another tape is
needed when
updating data
dM
thin layer of metal alloy is light sensitive, and uses organic dye to store data.
DVDs have dual layering, and a red laser is uses to read the second layer through fractions
of millimeters
er
music/files/software/games floppy disks transfer rate/data
access rate
ch
DVD-ROM stores films/more Less expensive than
sophisticated files/software HDDs
211 ea
Both used in applications
where there is a need to
prevent deletion of data
84 T T
2. CD-R/DVD-R:- Recordable only once then become ROM
129 i IC
Uses Advantages Disadvantages
Home recordings of
music
Store data for later
use or transfer to
09 an
Cheaper than RW
4. DVD-RAM:-
• Use number of concentric tasks
.M
er
errors to happen)
• Come with secure encryption systems
ch
Uses Advantages Disadvantages
211 ea
Home video Store high-definition Expensive
consoles movies
84 T T
Storing and playing Fast data transfer Encryption problems
back movies rate
Data storage or Fastest data access Fewer movie titles
129 i IC
backup speed on blu-ray
Camcorders can use Come with secure
it encryption systems
• More reliable
• Lighter
• Don’t have to get up to speed
am
1. Memory sticks:- Store several gigabytes and are connected through USB ports
.M
er
Mobile phone Can be easily Have a finite life
memory cards removed
ch
In MP3 players to Very robust Lower storage
store music capacity than HDDs
Back-up source in
211 ea
computer held
devices
84 T T
129 i IC
09 an h
irg
dM
me
am
oh
.M
Mr
er
exchange data.
ch
Network allows computers to share files, resources.
A computer that is not connected to a network is known as Stand-alone computer. Network connections are
211 ea
created using cables (wires), radio signals or by satellite links.
Using a computer connected to a network, allows us to:
84 T T
• Easily share files and data.
• Share resources such as printer, scanner and internet connections.
• Communicate with other network users (email, video conferencing, chatting, etc).
129 i IC
• Store data centrally (by using server) for ease of access and backup.
• Keep all of our settings centrally we can use any work station (PC).
If we use a computer connected to the internet, we can:
09 an
• Make use of online services such as e-commerce (shopping), e-banking, etc.
• Get access to a huge range of information.
• Access forms of entertainment (games, music, videos, etc.)
h
• Join online communities (e.g., Facebook, MySpace, etc.).
irg
What are the disadvantages of a Network?
Using a computer connected to a Network means that:
dM
Server: Servers are special, powerful computers that provide services to the client computers.
.M
er
Local Area Network or LAN :
ch
Is usually within one building or not over a large geographical area. A LAN consists of a number of computers
and devices, e.g., printers, which will be connected to hubs or switches.
211 ea
Advantages
84 T T
• The sharing of resources (such as expensive peripherals and application software).
• Communication between users.
• A network Administrator to control and monitor all aspects of networking.
129 i IC
• E.g., changing password, monitoring internet, etc.
Disadvantages
Devices known as access points are connected into the wired network, at fixed locations.
Because of the limited range, most commercial WLANs need several access points, to permit uninterrupted
am
wireless communication.
The access point receives and transmits data between the WLAN and the wired network structure.
Advantages
oh
• All computers can access the same services and resources. E.g., printers, scanners, internet access,
etc.
.M
cabling is needed.
Disadvantages
• Security is a big issue, since anyone with a WLAN enabled laptop or computer, can access a network
if it can pick up a signal.
• There may be problems of interference, which can affect the signal.
• Data transfer is slower than LAN.
er
Advantages
ch
• A WAN is a network that extends over a large area.
• WAN can be connected using optical fibre cable, satellite link, radio signals, etc.
211 ea
Disadvantages
• Very expensive.
84 T T
• Limited access.
• Data access slows down if spread over huge area.
Write the difference between LAN and WAN.
129 i IC
LAN WAN
WAN covers wide geographical areas.
LAN is confined to a very small area. E.g. Between cities, countries and even
continents.
Usually located in a single building.
09 an
Uses cables, wireless, infra-red which are
usually queued by the organization.
h Usually located between many buildings and
countries.
It uses wireless, satellite links, which are globally
organized.
irg
We can restrict or block any websites. WAN has very fast speed.
Bluetooth is a wireless network technology designed for very short range connections (just a few metres).
The idea of Bluetooth is to get rid of all those cables, that connects our computer to peripheral devices such as
me
When devices are in range of Bluetooth devices, they detect each other and can be connected.
With this system, it is possible to create small home networks.
The range is however quite small (about 10 metres).
oh
er
• Wi-Fi system rely on some form of ‘AP’ (Access Point), which uses radio frequency technology to
enable the device to receive and send signals.
ch
• It is not a short form of wireless Fidelity.
• It is a trademark name for any product which is based on IEEE 802.11 standard.
• Wi-Fi hotspots are places where you can access Wi-Fi (free or paid).
211 ea
• They exist in public places such as airports, hotels, internet cafes’, etc.
• It is possible to log on to free Wi-Fi unless they are protected by password.
84 T T
• Software exists which can be loaded in a laptop which then searches for non-protected Wi-Fi
system.
• The practice of driving around in a car looking for these unsecured Wi-Fi hotspot is known as war
driving and possess a security risk.
129 i IC
Networking Hardware (Devices):
Modem
09 an
Modem means modulator and demodulator and is a device which converts a computers digital signal into
h
analogue signal and digital to analogue signal and transmission over existing telephone lines.
irg
Modems are used to allow computers to connect to network over long distances using existing telephone
networks.
dM
Dial-up modem operate at the speed of about 60 kilobits per second, which is very slow.
Modern broadband operate at 11,000 kilobits per second.
Hub
me
Hubs are hardware devices that can have a number of devices or computers connected to them.
Its main task is to take data which receives through one of the ports and then send out this data from all of the
am
ports.
Each computer or device will receive the data, whether it is relevant or not.
oh
er
The use of a switch is at the centre of star topology.
The switch has cables plugged into computers to connect to a network.
ch
A switch is a more intelligent device than a hub. If it receives a message, it checks who it is addressed and
only sends it to that specific computer.
211 ea
Because of this, networks that use switches are more secure than those that use hubs, but also a little more
expensive.
84 T T
Switch only sends packets of data to the computer, it reduces the amount of data on the network, thus
speeding up the network.
129 i IC
Bridges
09 an
Bridges are used to connect LANs together.
When one of the LAN sends a message, all the devices on the LAN receive the message.
h
This increases the amount of data flowing on the LAN.
irg
Often a large LAN is divided into a series of smaller LANs.
If a message is sent from one computer in a LAN to another computer in a different LAN, then the message
dM
Router
Routers are hardware devices that read the address information to determine the final destination of the
am
packets.
Each computer linked to the internet is given a number which is called Internet Protocol address (IP address).
oh
The packets contain details of the destination address of the network it is intended for.
Computers on the same network have the same first part of the IP address and this is used to locate a
particular network.
Mr
er
the LAN and internet connection.
ch
A firewall blocks un-authorised connections being made to your computer or a LAN.
Normal data is allowed through the firewall, e.g., Emails, Web pages, but all other data is blocked.
211 ea
84 T T
Inetrnet:
The internet is the world wide collection of networks which allows a user to send and receive emails, chat or
browse the World Wide Web (WWW).
129 i IC
WWW or web is the part of the internet which the user can access by using web browsers.
A web browser is a software that allows a user to access and interact with web pages and files on the web.
Web Page
09 an
Web pages are documents on a computer screen which may consist of text, pictures, sound, video, etc.
Web Site
h
irg
Web site consists of many of the web pages linked together. A web is made up of millions of websites and
web pages.
dM
e.g. www.google.com
The web site shows the hyperlink to allow user to navigate between web pages. These hyperlinks are often
shown as Blue underlined text or sometimes a small hand appears under a picture or under some text
me
er
Accessing the Internet:
An ISP is a company that provides access to the internet to the user and usually a paid service.
ch
When a user registers with an ISP, an account is set up and they are given login details which include
username and password.
211 ea
There are three common ways of accessing the internet offered by service providers.
84 T T
• Dial up internet access
• Cable internet access
• DSL (Digital Subscriber line)
129 i IC
Dial up internet access:
09 an
It is the slowest internet connection (60 kbps).
The user connects to the internet via telephone lines by dialing one of the number supplied from the ISP.
h
ISP contracts are usually for hours per month of internet access time and additional charges are incurred if this
is exceeded.
irg
A big disadvantage is that if the telephone line is tied up while a dial up modem is in operation.
dM
The fastest download speed can be obtained by using DSL broad band connection (about 11,000 kbps)
This is often offered through wireless interface which requires an access point and a router.
oh
Broadband has the advantage of always being on because it does not tie up the telephone line.
.M
Intranet:
An intranet is the name given to a private network that provides similar services to the internet like email,
Mr
er
• It is easier to send sensitive messages that will remain within the company.
Typical uses of intranet
ch
• Internal emails and instant messaging between the workers.
• Company’s workers or employees can view internal web pages only.
211 ea
• E.g., Company’s calender, Company’s strategies, etc
• Sharing of internal documents
84 T T
Difference between internet and intranet:
Internet Intranet
129 i IC
The term internet comes from the phrase The term intranet comes from the phrase ‘Internal
‘International Network’. restricted access network’.
Used to give local information relevant to the
Covers topics of global interest
company.
an ISP account.
09 an
It is difficult to block certain web sites from internet.
Can be accessed from anywhere provided user has
h
Will not give full protection against hackers and
Possible to block certain internet web sites using
intranet.
An intranet requires password entry and can only
be accessed from agreed points.
An intranet is behind the firewall which gives
irg
viruses. protection against hackers and viruses.
Information used in intranet is stored on local servers
Information cannot be stored on local server.
which makes it more secure from outside agencies.
dM
me
am
oh
.M
Mr
er
Authentication
ch
Authentication is usually used to verify that data comes from a trusted and secure source. Some of the forms
of authentication are:-
211 ea
• Digital certificates
• Biometrics
84 T T
• Magnetic stripe
In many applications, RFID chips and tags can be used to authenticate data, here’s an example of how it
occurs in passport control:-
129 i IC
Passport page containing data Photograph and data read are
such as photo and name is compared to those stored on
placed on the reader the central database
09 an h
irg
Microchip on the page is read Owner of passport looks at
by the RFID and so is the facial
dM
Running antivirus in the background on a computer keeps checking for virus attacks, and has the following
features and tasks:-
oh
• Any detected viruses are placed in quarantine and deleted or stay there until the user chooses to do
so
• Need to be kept up-to-date, since new viruses are always discovered
Mr
• Full system checks need to be done weekly, to make sure no viruses are dormant
er
3- Viruses from Hardware devices
ch
Always scan the device you are plugging into the computer before using it. In addition, don’t plug any device
you get into the computer, because it can be infected with a virus.
211 ea
Data protection acts
These acts are usually set by governments to protect citizens from their data being incorrectly or inaccurately
84 T T
stored. In many countries, failure to abide by these acts can lead to a fine, and sometimes an imprisonment
There are a number of ways to prevent data from being unlawfully taken:-
129 i IC
• Don’t leave personal info lying around on desks
• Lock filing cabinets at the ending of the day
• Do not leave data on an unattended computer monitor
• Use passwords and IDs
•
09 an
Make sure that info sent online is not sensitive
h
There are main principals for DPA, some of them are:-
irg
• Data must be lawfully obtained and processed
• Data can be processed for stated purposes only
• Data must be relevant and adequate
dM
In this way, a document is sent through a fax machine to another, by inputting the receiver’s fax number and
telephone line number. This can be a slow process if the line is busy, or many documents are being sent.
.M
Usually, E-Mailing would mean that an account’s address is used and a message with content and/or
Mr
attachments is sent to the address. Afterwards, the recipient will log into the account and read the message
er
• Agree a time and place for the conference
ch
• Delegates should log in to the conference beforehand
• Conference needs to be set-up beforehand
• Webcams should be placed in correct positions
211 ea
• Microphones should be placed between all delegates, so everyone is heard
• Important for one person to be the main contact, so that it could go smoothly
84 T T
Here are the peripherals needed to run a video conference
Hardware Software
129 i IC
Webcams Webcam/Microphone drivers: So that audio and video can be correctly
transferred to other delegates
Large monitors/Display Coder-Decoder/Compression-Decompression: the first one is used to code and
Microphones
Speakers
09 an
decode the data sent over, while the second is used to compress and
decompress the data so it can travel
Echo-Cancellation software: Allows communication to occur in real-time, and
synchronizes all the communication together
h
irg
There are some issues with video conferencing:-
dM
• Lag
• Jerking of images
• Can be very expensive to set up and maintain
• Time zones can cause an issue
me
• Reduces costs of Travelling/Accommodation/Need to travel away from work for 2-3 days
• Can be safer, since delegates might need to travel to insecure places
.M
Audio Conferencing
Usually, audio conferencing can be done through a telephone line or VoIP. As for VoIP, it can be done using
Mr
the drag and drop feature, and needs a solid and strong internet connection. Users who do not have internet
can also join using their telephone numbers.
Here is the process of audio conferencing:-
-Contact an audio conferencing provider for organizer’s PIN and participant’s PIN
-Give the PIN to each participant
-at the start of the conference organizer types in his PIN
-Each participant dials the number and enters the PIN
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 36 of 90
Web Conferencing
Web conferencing uses the internet and the WWW to permit a conference to take place in real-time. Usually,
it is used in the following applications:-
er
• Presentations
• Online education and training
ch
There is one requirement, which is high speed and stable internet. The organizer controls who can speak and
at which times, while the delegates have the
211 ea
Some of the features of web conferencing are:-
• Slide presentations can be posted during the conference
84 T T
• Possible to draw on a whiteboard using the mouse/keyboard
• Possible to transmit images while the conference is going on
• Documents can be shared by uploading them on the website, before the start of the conference
129 i IC
• Can communicate through audio/video/instant messaging
09 an h
irg
dM
me
am
oh
.M
Mr
er
• Manufacturing:- Robots replaced humans in many areas, especially
things like welding car bodies and spraying metal items
ch
• Shop work :- Online shopping has decreased the need for high street
branches
211 ea
• Banking:- Introduction of ATMs/Online banking decreased the need
84 T T
for high street branches
• Office work:- Databases/Spreadsheets/Word processors have taken
over the office tasks which needed staff to perform
129 i IC
*Negative effects (AKA job losses):-
1. Office work:- Robots and ICT have decreased the employment in
•
09 an
Administration/Human resources/Payroll
h
Word processors: - Since documents are now much easier to edit and
modify, less employees are needed for such a job. In addition, they are
irg
now stored in an electronic format which removes the need for space,
and can be saved on external servers known as cloud storages. This
dM
means that wages decrease, and less space is needed for file cabinets.
• Spreadsheets: - Payroll has become much easier to do, since macros or
functions can be used. This makes calculations, especially for wages,
much easier to do, since if you change a variable, the record will change
me
with it. In addition, graphs can be made to compare and see progress.
Lastly, conditional formatting, sorting, and using functions can all show
am
personnel, can be updated much easier through forms and reports. This
has led to a decrease in employees in the field of human resources.
.M
Mr
Through that, factories had to obtain the following skills: - Maintenance, quality
control, design, and development of robots. Marketing and training of other workers
er
ch
Advantages Disadvantages
Higher productivity Expensive to setup/maintain
211 ea
More consistent results Need to be reprogrammed for new tasks
84 T T
Work non-stop If an error happens, it’ll keep on happening
129 i IC
Don’t get bored
Don’t go on strike
• System analysts
• Programmers (for applications)
• Computer engineers
oh
er
2. Flexi-Time working: - With this working pattern, an employee can choose when
ch
and sometimes where they work. So long an employee completes a full day’s
working hours, the time and place do not matter. However, this requires an office to
be ready at all times
211 ea
3. Job-Sharing: - With this working pattern, the full week’s working hours are divided
between two employees (part-timers). Both do the same work, but one picks up
84 T T
where the other left
4. Compressed hours: - In this working pattern, employees work the same amount of
hours, but over a smaller amount of days. For example, an employee could work 40
129 i IC
hours in 4 days instead of 5 days.
Advantages which these working patterns resulted in:-
09 an
• Avoids rush-hour commuting
• Leads to a more contented staff; which won’t quit as easily
h
• The above point leads to less retirement, so the manager won’t have to spend time
irg
interviewing
• Flexi-Time allows longer opening hours
• Job-Sharing means that more people will have the same skill
dM
er
ovens/Cookers/etc..
2. Devices related to the home: - Alarms/Heating and conditioning
ch
systems/Entertainment systems/etc..
Here are some advantages/disadvantages towards the use of microprocessor devices
211 ea
which can change a person’s lifestyle
84 T T
Advantages Disadvantages
No need to stay at home to do manual tasks Can lead to unhealthy lifestyles due to
dependence on ready food
No longer need to stay home while food is Can lead to people becoming lazy
129 i IC
cooking/laundry is being washed
Give more leisure time for a person People can become less fit if they just lay
around doing nothing
On the other hand, here are some advantages/disadvantages which don’t necessarily
affect a person’s lifestyle
Advantages Disadvantages
me
Save energy since they can turn themselves Leads to a wasteful society; can be expensive
off and are much more efficient to repair these devices
Easy to program devices to do tasks (for People who don’t like using electronic devices
am
energy
.M
Mr
er
Flyers, Posters, Brochures and Newsletters:
ch
Flyers and posters are very easily created using some of the commonly
available software like Word Processing and Desktop publishing. Flyers
211 ea
and posters often contain photos which may have been taken or
downloaded from the internet.
84 T T
The following outlines the steps that are generally followed to make a
document on a computer:
1. Open one of the software as mentioned above
129 i IC
2. Create frames, boxes and/or text boxes
3. Take photos, if necessary using a camera
4. Upload the images from the camera/cd/DVD or downloaded photos from the internet
5. Save the photos to a file
6.
7. 09 an
Import or copy and paste the photos into the document
Edit the photos and import from a file or type any required text
h
Brochures are generally used to advertise a company or its products. While these can be prepared on a
irg
normal computer and printed on a laser printer, it is advisable to go to a specialist company who use
specialized computer and print the outputs on glossy paper resulting in a better final product.
Brochures could be offered to a specific audience by distributing them in a pre-studied area or to a much
dM
more general audience by inserting them into newspapers and such, the downside is that they might be
thrown away if they didn’t catch the reader’s eye.
Single sheets of a document are called as flyers or leaflets and booklets or multiple sheets of documents are
me
Newsletters are produced by companies or clubs using the methods mentioned above. They generally
contain local information which is read by company employees or club members. The content is specific to
the organization and may contain:
oh
4. marriages, deaths and births of employees or their family members, club members
Mr
er
Using the first option would mean hiring web designers and developers or
go to a company specialized in doing this kind of work. Add to it there are
ch
costs involved for purchasing the hardware and software to develop the
website, storage of the website, prevent the sight from being hacked by
employing IT security experts. However, the biggest advantage of a
211 ea
website is that the company gets worldwide audience and there is no
need to keep spending on paper, delivery of the leaflets and flyers, etc.
84 T T
There are pros and cons to both these options and it is company which has to take a call what suits best for
them
129 i IC
Advantages Disadvantages
Sound/video/animation can be added It becomes necessary for the customers to have a
computer and internet connection.
Can’t be defaced or discarded away 09 an h There is a risk of the websites being hacked and
modified or viruses and Trojans introduced
irg
Can be seen by a global audience There is a possibility for customers to go to undesirable
websites (due to accident or as a result of hacking)
dM
Links to other websites/hyperlinks can be made As it is a global system, it is very difficult to target the
right audience by advertising on the website
me
Buttons to navigate or move around the website which The website needs to be maintained once it is set up,
provides more information which can prove to be expensive
am
Use of hotspots
er
applications available in the market and then using a multimedia projector the
whole audience is able to see the presentation.
ch
211 ea
Advantages Disadvantages
The use of transition effects allows a presentation to Whenever the presentation is given it is necessary
display facts in a logical manner. to have internet access.
84 T T
It is possible to make them interactive or hyperlinks One needs special equipment which can prove to
built into the presentation, which means that the be expensive for many companies.
presentation could access the company’s website
or even key files stored on the cloud.
129 i IC
The presentation can be interactive. Equipment failure can prove to be disastrous when
giving multimedia presentations
Use of sound and animation or video effects are Often the presentation can turn out to be bad if it
more likely to grab the attention of the audience. contains too many animation effects and/or too
understand. 09 an
Moreover, this makes the presentation easier to
Advantages Disadvantages
The recipients can read the presentation at any There are no special effects like sound, video,
time as per their convenience and will always animation, etc.
have a permanent copy
am
Disabled people don’t have to go to the venue There are printing costs for paper, ink, etc.
to see the presentations
oh
Moreover, it is possible to print it out in braille for The presentation needs to be distributed
the benefit of blind people through some method
.M
Mr
er
through electronic effects machines
2. Music samplers and mixers allow the original tracks that were recorded
ch
earlier to be modified in any way one wants
3. Synthesizers combine simple wave forms to produce complex music
211 ea
creations
4. Electronic organs can mimic any other instrument
5.
84 T T
The music score can be generated from the music itself using software
6. Software can automatically correct music notes in a score
7. There is no real need to understand music notation to write a music score
8. Music notes are automatically printed out in the correct format.
129 i IC
Cartoons:
09 an
Animations can be created using computer software and hardware.
With 3-D animation, objects are designed on a computer and a 3-D
h
skeleton or framework or basic structure is produced. The parts of
the skeleton are moved by the animator using key frames (these
irg
frames define the starting point and ending point to give a smooth
animation effect). The difference in the appearance of the skeleton
on these key frames is automatically calculated by the software and
dM
Further, just like any form of communication, cartoons should not offend anybody and at the same time, it is
necessary to make sure that cartoons don’t become the main feature so that the actual message is lost.
Mobile Phones:
am
Mobile phones communicate by using towers inside many cells networked together to cover large areas. The
towers allow the transmission of data throughout the mobile phone network.
oh
Each tower transmits within its own cell; if you are driving a car and get to the edge of a cell, the mobile phone
signal starts to weaken. This is recognized by the network and the mobile phone then picks up the signal in
.M
one of the adjacent cells. If a person is making a call or sending a text to somebody in a different country then
satellite technology is used to enable the communication to take place.
Mobile phone technology can now be used by computers and tablets. A plug-in-device (using one the
Mr
available USB ports) or SIM (Subscriber Identity Module) card allows the computer to connect to the mobile
phone network. This then allows access to the internet.
1. The phone can be used to make phone calls from any location within the cellular
network.
2. It is easier to keep in contact with co-workers at the office no matter where you are.
3. There is no need to look for an operational public telephone in an emergency.
er
4. It is possible to conduct business or personal phone calls on the move.
ch
As they allow text messaging:
211 ea
2. They employ predictive texting where the system completes a word from the first few letters keyed
in e.g. Key in ‘compl’ and the phone completes the word as ‘complete’. This allows the system to
remember frequently used words – together they increase typing speed
84 T T
3. Text messages can be sent at any time of the day or night even if the recipient’s phone is switched
off.
Mobile phones allow access to the internet on the move using either the cellular network or a Wi-Fi ‘hot spot’.
129 i IC
Internet Telephony:
The most common form of internet telephony i.e., having a telephone conversation
09 an
via the internet is Voice over Internet Protocol (VoIP).
VoIP is a method to talk to people using the internet. The sound which is picked up
the computer microphone is converted into discrete digital packets in VoIP and sent
h
to their destination via the internet. The biggest advantages of VoIP is that it is either
irg
free (if both parties use computers to converse) or charged at a local rate to any call
in the world (when VoIP is used to communicate with a mobile or land line instead of a
computer). Of course, you will need a broadband connection to work in real time.
dM
The main problem is sound quality in the form of echoes and strange sounds.
Security is also a concern with VoIP, just as it is with other internet technologies.
One of the big advantage of VoIP is using it can be used as a video chat using the built-in webcam. While this
may not be a very sophisticated way of video chat, it is much cheaper as it uses the computer’s built-in
me
microphones, speakers and webcams. However, if you want to improve the video quality, use an expensive
webcam, which connects to the computer’s USB ports.
am
oh
.M
Mr
er
give a number of business card templates. The
user chooses a template and keys in data such as:
ch
• Name of the company
• Contact details
211 ea
• Image wanted on the business card
The final version of the business card is then
shown. The customer places their order and the
84 T T
business cards are printed and delivered.
Business cards are handed out to people as a form
of personal advertisement. The use of IT (in this case, a website) has made this a much easier task. Business
129 i IC
cards are less likely to be thrown away since they are seen as personal contact. It is also possible to include
additional information on the reverse of the card – this could be further advertising of the company’s products
or it could be advertising another company.
printer.
09 an
The same format used on the business cards can be adopted on a company letterhead. This helps to project
a corporate image. As with business cards, these pages can be printed on high quality paper using a laser
h
Flyers and brochures can be produced using the same design/logo so it becomes clear to the customer that
irg
all the3 communication has come from one company.
There are various advantages to a company in using corporate letterheads produced by a printing website:
dM
1. Legal reasons (it helps if there are any legal actions taken – legitimate documents using the company
letterhead is regarded as proof of actual communication).
2. Can make the company appear larger than it is (this could give a degree of confidence to potential
customers).
me
5. Brand/company awareness (advertises the company by using the same designs on all products).
6. Advertising (the letterhead can contain many useful pieces of information to advertise the
company).
oh
.M
Mr
er
Survey Results:
ch
Surveys are often used and collected by business organizations to find the requirements of the people and to
know if the people are satisfied with their service.
211 ea
Surveys are often carried out on paper and are filled by shading the circles or ticking boxes.
84 T T
This data is then analyzed by scanning them with an Optical Mark Reader (OMR).
When the data is inside the computer, it can be used for sorting searching, analyzing and finding results.
The benefits of using a computer to handle survey data are:
129 i IC
• Lesser errors
• Efficient and fast
•
•
Saves time and money
Fast result analysis
Address List:
09 an h
irg
Address lists are used to store details about friends, family, relatives or business contacts.
Some of such details stored in address lists are:
dM
• Name
• Address
• Telephone numbers
me
• E-mail address
• Pin code
Modern address lists are stored on computers or mobile phones and have a couple of advantages like:
am
• Seamless editing
• Groups can be created
• Easy searching
oh
er
Before the introduction of computers, vendors records were kept on paper, and were called Account’s
ch
ledger.
Such kind of paper-based records had several drawbacks such as:
211 ea
• They were challenging to update
• Difficult to back up
84 T T
• They can be easily damaged
• Manual entry errors are possible
• Now a day, spread sheets are used to store shop account records.
The advantages of using spreadsheets to do so are:
129 i IC
• Easy editing
• Easy to back up
•
•
Charts and graphs can be created
• Membership number
• Name
• Address
me
• Telephone Number
• E-mail address
• Membership subscription status. etc.
am
• Easy editing
• Easy searching
oh
Record Keeping:
Records can be kept using a spreadsheet or a database.
Mr
Advantages Disadvantages
Less office space would be required in the shop since no paper There would be a need to buy a computer and software to
records would need to be kept run the system
It would be quicker and easier to find details of a particular book or Time and effort would be required initially to transfer all the
find out whether or not it was in stock existing paper files to the database.
The system would be less expensive since it wouldn't be necessary
to employ somebody to do all the filing and searching
There would be fewer errors since no manual checking of paper files
would need to be done.
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 49 of 90
Measuring Applications
What are the measurement or measuring applications?
These types of applications involve use of various types of sensors and other hardware like microprocessors.
The sensors that are used generally take light intention, rate of rotation, temperature, etc. As the data is
er
usually in analogue form, they are sent to an Analogue to Digital Converter (ADC) to turn the data into digital
format. This conversion is necessary as microprocessors and computers only understand digital data.
ch
The term analogue means the data varies constantly and has no discrete values. For example, the height of
mercury in a thermometer to represents temperature.
211 ea
The term digital refers to discrete data which is made up of binary values 0 and 1. However, when you to
need control devices like pumps, heaters, valves, etc., the data or signals (i.e. a series of 1s and 0s) from the
84 T T
computer needs to be converted back to an analogue form (e.g. electric signals) using a Digital to Analogue
Converter (DAC).
After conversion of the data, the data is sent to microprocessor where it is processed. However, in measuring
129 i IC
applications, microprocessors are programmed to only review the data from the sensors (often comparing it
to the data which is stored in memory) and update their files and sometimes giving a warning signal if the
values are outside the given parameters. The microprocessor do not take any action to change any of the
data or conditions during the measurement process.
•
•
09 an
Common examples of measuring applications are:
h
Measuring a patient’s vital signs in a hospital
Monitoring of pollution
irg
• Weather stations
• Burglar alarm systems
dM
Weather Stations:
me
Weather stations are generally setup to automatically gather data from the environment. They are mostly
unmanned and use a variety of sensors to measure:
• Temperature
am
• Wind speed
• Rainfall
• Humidity
oh
forecasters to help predict the weather for the next few days or even take a more long-term view by looking
at past and current weather patterns.
Mr
• Sensors read key vital signs such as heart rate, temperature, blood pressure, respiration, pulse rate,
etc
er
• The data from the sensors are converted into digital format using an analogue to digital converter
(adc)
ch
• The data is stored in the computer’s memory
• The computer compares the data from the sensors with the values stored in its memory (these are
211 ea
usually fed in advance either by the nurse or doctor for a given patient)
• The results are displayed on a screen in the form of graphs and/or numerical readouts
• An alarm is activated if any of the data is outside acceptable input values
84 T T
• The system continues to measure the patient’s vital signs until the computer is switched off.
129 i IC
The below steps show how a computer can be used to measure pollution in a river:
• The sensors are placed in at least two different positions to do a pollution comparison at various
•
•
•
points
09 an
The data from the sensors are converted into digital form using an adc and sent to a computer
The computer stores the data received
h
The acidity levels and oxygen levels are compared with the historical data stored in computer
irg
databases and they are also compared with preset levels stored in the databases.
• The oxygen and acidity levels from the different positions in the river are also compared to see if
they are similar. This sometimes help to find the source of pollution.
dM
• The data stored in the computer can now be transferred either by copying this to a CD/DVD/USB
media and taken away for further processing and analysis or the computer can be connected to a
LAN/WAN network or internet and transmit the data back automatically to the monitoring station.
• Other types of sensors such as light sensors (to check whether there are solids or chemicals in the
me
water blocking out light) or temperature sensors (to check the temperature of water at different
points which might disturb the marine life in the river), can also be used.
Advantages Disadvantages
am
The computer’s response time is very fast (which is If the computer malfunctions or if there are frequent power
very important in the hospital monitoring system). cuts, then a computer cannot be used. Due to this, there
should be proper backup procedures in place to over this
eventuality.
oh
The computer does not forget to take readings. The computer cannot respond to unusual circumstances.
The staff can carry on with other tasks whilst the A student doing an experiment using a computer for
measurements are being taken automatically and measurement and analysis, may not learn as much using a
.M
er
An Analogue to Digital Converter (ADC) may be needed before the microprocessor or computer can process
the data.
ch
The microprocessor/computer will check whether the incoming data is outside the given parameters and will
take any necessary action. For example, a temperature sensor sends data to a computer which will then
211 ea
check whether the temperature is greater than the preset or stored value. If the temperature is greater than
the pre-set value, the computer will send a signal to switch off a heater. If the temperature is less than the
84 T T
pre-set value, the computer will send a signal to switch on a heater. Thus, the microprocessor/computer
takes some action which affects the input value it receives. By doing this, the microprocessor/computer is
controlling the application.
129 i IC
Describe the working of an Automatic oven/cooker
An automatic cooker/oven has temperature sensors and a number of controls to set the cooking time (i.e.,
when to switch the cooker/oven on and off). First of all, the start time and end time (or the actual cooking
09 an
time) are entered. Finally, the cooking temperature is selected.
The microprocessor checks the set time against the current time and when they are equal, the cooker/oven
heating elements are switched on. Once the cooker/over starts the cooking process, the microprocessor
h
then constantly checks the end time against the current time (the end time may be a pre-set value entered
irg
by the user or it may be a value calculated by the microprocessor, based on the cooking time entered); when
they are equal, the cooking process is stopped.
dM
The microprocessor checks the temperature data sent from a sensor and turns the heating element on if the
value is less than the preset value chosen by the user. If the temperature is greater than or equal to the
preset value, then the heating element is switched off by the microprocessor.
Once the cooking process is finished, the microprocessor sends a signal to a beeper to make a beeping sound
me
used to pump hot water around the central heating system whenever the temperature drops below a preset
value.
.M
• The required temperature is keyed in and this is stored in the microprocessor memory (this is called
preset value).
Mr
A certain chemical process only works if the temperature is above 70° C and the pH (acidity) level is than 3.5.
Sensors are used as part of the control system. A heater is used to heat the reactor and values are used to
add acid when necessary to maintain the acidity.
er
• Temperature and pH sensors read data from the chemical process
ch
• This data is converted to digital format using an ADC and is then sent to the computer
• The computer compares the incoming data with the preset values stored in the memory if the:
• Temperature is less than 70°C, a signal is sent to switch on the heaters
211 ea
• Temperature is greater than or equal to 70° C, a signal is sent to switch off the heaters
• pH is greater than 3.5, then a signal is sent to open a value and acid is added
84 T T
• pH is less than 3.5, then a signal is sent to close this value
• The computer signals will be changed into analogue signals using an DAC so that it can control the
heaters and values
• This continues as long as the computer system is activated.
129 i IC
4. Describe how microprocessors/computers are used to control a Glasshouse environment Control:
09 an
There are about five sensors to control a glasshouse environment namely humidity, moisture, temperature,
pH and light. Due to this, it is a quite a complex problem. For simplicity, let us consider only the humidity
sensor. This sends signal to an ADC which then sends a digital signal to the computer. This compares the
h
input with the stored or preset values and decides what action needs to be taken. If the humidity is greater
than the pre-set value, the computer sends a signal to a DAC to operate the motors to open windows thus
irg
reducing the humidity. If it is less than the pre-set value, the computer sends a signal to open values to spray
water into the air. If the reading is the same as the preset value, then no action is taken. The control process
continues as long as the system is switched on. On similar lines, the other four sensors work.
dM
The table below gives a list of possible sensors that might be used in various applications which involve
measurement of control.
me
Proximity/distance these tend to be another name for sensors such as infra-red, motion, etc.,
measuring the light levels in a glasshouse
Light measuring for light levels in a dark room (photography)
used with automatic doors
Mr
er
The idea behind developing the model is to try to find out what mechanisms control how a system behaves.
ch
This makes it possible to predict the behavior of the system in the future and also see if it is possible to
influence this future behavior.
211 ea
Computer models are used because they can help find a solution more quickly and can be considerably safer
while at the same time saving money and time.
84 T T
Traffic Light Simulation:
A set of traffic lights are to be modelled at a Y-junction:
129 i IC
In this computer model, it is necessary to consider:
How and what data needs to be collected?
The success (or failure) of a computer model depends on how realistic the model is. Hence, data needs to be
09 an
collected for a considerable period of time by watching traffic at the Y-junction. This is best done by using
induction loop sensors which count the number of vehicles at each junction. Collecting data manually is
possible but is prone to errors and is also difficult to do over an 18-hour period per day (for example). The
h
type of data that would need to be collected or considered for collection would be as follows:
irg
A count of the number of vehicles passing through the junction in all directions at all differing times of the day
The day of the week (weekends, bank holidays, public holidays, etc., can alter how the data need to be
dM
interpreted)
Data from the above list is entered into the computer database and the computer model is run. Once the
designers are satisfied that it simulates the real situation accurately (i.e., by comparing results obtained with
actual traffic flow from a number of data sets), then different scenarios can be tried out. For example:
oh
• Increase the number of vehicles stopped at part of the junction and then change the timing of the
lights to see how the traffic flow is altered
.M
• Sensors in the road gather data and count the number of vehicles at the junction.
• This data is sent to a control box or to a computer.
• The gathered data is compared to data stored in the system (the stored data is based on model
predictions which were used to optimize the traffic flow).
• The control box or computer ‘decides’ what action needs to be taken.
• Signals are sent out to the traffic lights to change their timing if necessary.
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 54 of 90
Why are computer models done (in general terms)?
• With computer models it is much easier to try out various scenarios in advance.
• Time scales are reduced by doing a computer model rather than the real thing (some applications
would take before a result is known e.g. climate change calculations, population growth, etc.).
• They are less expensive than having to build the real thing (e.g., a bridge!).
er
• On many occasions it is safer to run a computer model (some real situations are hazardous e.g.,
chemical processes).
ch
Other examples of computer models include: training pilots and drivers, running chemical and nuclear plants,
crash testing of cars, financial modelling, weather predictions, population growth and modelling queues at
211 ea
checkouts.
Manufacturing Applications
84 T T
Describe the use of computers in Manufacturing
Manufacturing uses ICT (i.e., automation) in a number of areas to improve productivity, reduce costs, improve
129 i IC
consistency and to make factories safer and more environmentally friendly.
One of the most common forms of automation is the use of robots.
Robotics
09 an
Robots are used in many areas of manufacturing, from heavy work to delicate operations. For example,
welding bodywork on cars, manufacturing of microchips, paint spraying of car bodies, automatic warehouses
and manufacturing electrical goods.
h
irg
Control of robots is either through embedded that is built-in microprocessors or linked to a computer
system. Programming of the robot to do a series of tasks is generally done in two ways:
dM
The robot is programmed with a sequence of instructions which allow it to carry out the series of tasks (e.g.
spraying a car body with paint).
Alternatively, a human operator manually carries out the series of tasks; this can be done in two ways. Here
me
OR
The worker straps sensors to his own arm and sprays the object; each movement is stored as a set of
instructions in a computer; the sensors send back information such as position relative to the object; arm
oh
rotation and son on – this information forms part of the instructions stored in the computer.
Whichever method is used, once the instructions have been saved, each series of tasks can then be carried
.M
out by a robot arm automatically. Each instruction will be carried out identically every time (e.g. assembling
parts in a mobile phone) giving a consistent product.
Mr
Robots are often equipped with sensors so they can gather important information about their surroundings
and also preventing them from doing ‘stupid things’ e.g. stopping a robot spraying a car if no car is present or
stop the spraying operation if the supply of paint has run out, etc.
Robots are very good at repetitive tasks. However, if there are many different tasks (e.g. making specialist
glassware for some scientific work) then it is often better to still use human operators.
er
They can cause higher unemployment
Higher productivity (don’t need holidays, etc.).
(replacing skilled labor).
ch
Since robots do many of the tasks once done
They can work non-stop (24/7). by humans, there is a real risk of certain skills
(such as welding) being lost.
211 ea
Greater consistency (e.g., every car coming off an
assembly line is identical). Because robots are independent of the skills
base, factories can be moved anywhere in the
They are less expensive in the long term (although
84 T T
world (again causing unemployment).
expensive to buy initially, they don’t need wages).
129 i IC
Describe School Registration Systems
09 an
The traditional way to record the registration and attendance of a student is to complete daily registers. This
is very time consuming since it is required a 10-minute session at the beginning and end of each day. It is also
prone to error if a student’s name is missed at some point during the registration process. However, it is now
h
possible to automate this process using computers and related software. Two methods are given below:
irg
Method 1
Issue each student with an ID card. This contains a magnetic stripe on the rear of the card. The student name
dM
and the unique student ID is written on the back of the card. The student has to sign the card. The magnetic
stripe contains the name of the school, the name of the student, the student’s date of birth and unique ID
(registration) assigned to the student.
Each morning the student has to swipe the ID card through a magnetic card reader on arriving at the
me
school. The data read would identify the student and the time and date the student entered the school’s
premises. This data would now be stored in a database. On leaving the school, the ID card has to swiped
again. This would now record the leaving time and date in the database. This would give a very
am
comprehensive record of when the student attended the school and the number of hours the student
attended. It would also be more secure method in the event of, say, a fire. The school would now be able to
account for every student currently showing as being present on the school premises. Using the paper-
based system, a student could register then just go home – with this ID card system, the student’s attendance
oh
the wrong card (2) use of GPS tracking so that the exact whereabouts of a student would be known. This
would require the addition of a chip on the ID card so that the tracking system could identify them. At the end
of a term (or school year), the database could be interrogated and it would give an accurate attendance
Mr
er
student would have unique fingerprints, this system would be very secure.
The date and time of entering or leaving the school would also be accurately recorded in the database.
ch
Advantages Disadvantages
It is much easier to ‘clone’ (i.e., to make copies) of ID
211 ea
It would take a long time to collect the initial
cards than it would be copy fingerprints (not impossible
fingerprints for every student in the school.
but very difficult).
Fingerprints are unique, so it would be impossible for a
84 T T
student to sign in pretending to be someone else (with There are ‘invasion of privacy’ issues and some
magnetic cards, a student could give his card to a friend parents may object to having the fingerprints of
and ask him/her to sign in for him/her) – this gives more their children stored in a database.
accurate data and improved security.
129 i IC
If a student cuts a finger, the fingerprint may not
ID cards could be easily lost – fingerprints are ‘part of
be identified by the system (which would
you’ so can’t be lost. prevent entry to the school).
ID cards could be affected by magnetic fields (e.g., by The equipment needed to take and read
• graphs and charts can be produced to show how the students compare to each other
• graphs and charts can also be used to show student progress over a given time period, use of ‘rolling
averages’ or trend lines can be used to monitor changes in performance.
me
• it is also possible to use ‘conditional formatting’ to show which students are performing badly (e.g. by
highlighting the results in red) or well (e.g., by highlighting results in green)
• using functions, such as sorting or averages, allows the teacher to quickly see which students are
doing particularly well and how they compare against the class average
am
• it also allows the teacher to easily see how they are performing against each other students in the
same subjects
• it is also very easy to import data into a report, e.g., summarising a student’s performance over the
oh
academic year.
.M
3. Explain the use of Computers and softwares for preparing Exam timetables, subject timetables and teacher
substitution
Timetables are often required for the following:
Mr
er
Tuesday Maths Geography lunch History English
Wednesday Geography Maths lunch Science Science
Thursday Science History lunch Geography Sport time
ch
Friday Geography History lunch Maths Art/Music
211 ea
Many factors have to be taken into account when producing timetables for each student:
84 T T
availability of rooms for each subject
availability of teachers
number of hours for each subject
129 i IC
making sure double lessons appear for certain practical subjects but ensuring this doesn’t happen with others
subject clashes (e.g. a student wishing to do German from a group containing History, German and English
09 an
finds this clashes with their Art/Music lessons and so they have to take Geography instead of German).
Timetables are also produced so that students know when to sit an exam. This allows them to schedule their
work correctly.
h
irg
The main advantages of using software to create timetables is that it is quicker and less prone to errors than
the older paper-based systems. It is also easier to try ‘what if’ scenarios to ensure the most efficient use of
time.
dM
Likewise, timetables can be produced to cover classes when teachers are absent. This is often done using
the main timetable software since each teacher is allocated a class or non-contact time for each of the
teaching periods. In the above example, a teacher would have either a class or a ‘free period’ for each 1.5-
hour session. The main subject specialty of each teacher is also stored so that a subject specialist can be used
me
er
3. Required number of seats is typed in
4. Seating chart is displayed on the screen
ch
5. User highlights the seats
6. Database is searched to check for availability
7. Total price and number of seats is shown
211 ea
8. Seats are set to be temporarily unavailable
9. Customer enters personal details
84 T T
10. Payment method is selected
11. Seats are booked under customer’s name
12. Final details and check is presented
13. E-Mail sent to the customer with tickets to print
129 i IC
14. Database is updated with transaction
15. Seats become permanently unavailable
Immediate feedback
09 an h Disadvantages
Setting-up/Maintaining these systems can be
expensive
Needs access to a computer with reliable internet
irg
connection
Always available Harder to cancel bookings
Special offers can be attached to the customer’s E- Impossible to book seats if servers are down
dM
Mail
Easier to browse seating plans Difficult to book what you exactly want/can lead
to mistakes
Can temporarily reserve seats Difficult to build a personal relationship with travel
agents who might give you free upgrades
me
*Banking applications
• Automatic Teller Machines (ATM)
Sequence of what happens at the ATM:-
oh
7. Card is returned
8. Money is deposited
er
5. Card is checked to see if the daily limit for transactions has been passed
6. Transaction confirmed
ch
7. Customer’s account is updated with new balance
Data that’s inputted/read by customer/ATM
1. Account number
211 ea
2. Sort code
3. Expiry date
84 T T
4. Amount to withdraw
5. PIN
6. Card limit
7. Choice of language
129 i IC
8. Receipt required (Y/N)
•
Advantages
09 an
Advantages/Disadvantages of ATM
• Internet Banking
me
As online banking and shopping increases, the effect on society is getting larger and larger, but this
impact has pros and cons. below is a comprehensive list of advantages/disadvantages for online
shopping and banking:-
am
Advantages Disadvantages
Reduces costs of travel Isolation/Lack of socialization due to no
communication
Can look for cheaper products; thus reducing time Health risks due to lack of exercise
oh
and price
Disabled/Elderly can access shops without the Security issues
need to travel
.M
online themselves
There are long queues at banks High street shops are closing
Shops save money by employing less employees Easier to make errors/incorrect transfer of money
er
out with the first point)
• Increased costs due to setting up and maintaining the website
• Very little to no customer-employee interaction
ch
• Decreased abundance of robberies
• Less security staff needed; decreased costs
211 ea
• Telephone banking process
84 T T
1. Customer keys in account number
2. PIN is requested
3. Customer is presented with various options
4. Customer chooses the wanted option
129 i IC
5. Customer can: Check their balance/Talk with representative/Pay bills or
transfer money
The advantages/disadvantages of telephone banking are similar to that in online,
terminated
8. Otherwise, transaction is completed
9. Authorization code sent to restaurant
oh
er
5. Exchange center gives cheque back to paying bank
6. Paying back sends cheque to its own clearing center, which checks for the digital signature
ch
then processes it through their sort/read machine.
7. Paying bank checks if their client has sufficient funds to pay for the object, as well as if it is
signed, dated, written, and is genuine
211 ea
8. Based on the information, the paying bank chooses whether they should send the cheque
unpaid or not. This should be done on the morning of the next day
84 T T
9. A cheque can be returned unpaid because:
A. Client does not have sufficient funds
B. Cheque was not signed/dated/written correctly
C. It is fraudulent
129 i IC
• Process of clearing of digital cheques
(The same process is followed as above, but with these differences)
1. Details of the amount and payee are sent electronically
09 an
2. The sort code, account number, unique coding number or UCN is encoded as text
3. The check details and encoded MICR are read using OCR and stored
h
• Electronic Funds Transfer
irg
This allows money transfer instructions to be directly sent to the receiving bank, without the
need of clearing centers. However, actual money is not transferred, and the process is fully
dM
electronic
me
am
oh
.M
Mr
er
• Explanation system is developed
• Input and output screens are designed
ch
• Expert system is trusted with known situations
• Experts are interviewed to test and give feedback
211 ea
Advantages Disadvantages
84 T T
Provide consistent answers and are not affected by Lack of common sense
emotion
129 i IC
Less time consumption Errors in knowledge base will lead to a wrong solution
er
• Monitoring patients
• Diagnosis using expert systems
ch
• 3-D printers in surgeries
Patient/Pharmacy records
211 ea
In hospitals, accessing a patient’s record can be the difference between life and death, so it
is very important to keep them up to date, in addition, pharmacies are able to prescribe the
84 T T
correct medications through them. Here are some types of information which a patient’s
record might contain:-
129 i IC
Unique ID Name Address Date of birth Gender Medical history
Blood group Known allergies Doctor Current treatment Current diagnosis Additional info
Monitoring Patients
09 an
Connecting a computer to a patient means that they can be monitored all the time, and can
give doctors and nurses valuable information about the patient’s current state. Some of the
items a computer can monitor are:-
h
irg
Hear rate Respiration Brain activity Blood temperature
Body temperature Blood sugar level Blood pressure Oxygen level
dM
to an actual hand. However, this field still has a long way to go.
• 3-D printers are being used to make tissues, such as cells, skin layers, bone tissue, and
even heart grafts. They use biological materials and put them in the form of layers.
• Lastly, 3-D printers are being used to make medical equipment, which can take a long
oh
time to make in the traditional way. Thus, it also reduces the costs needed to make
these equipment.
.M
Mr
er
Book’s File
ch
Barcode Book title Author’s name Date published Unique book ID Borrower’s ID
211 ea
Borrower’s File
84 T T
details borrowed book book ID
Process:-
129 i IC
1. System calculates due back date based on date the book was taken
2. Book file and borrower’s file are linked and updated
3. Due back date is saved in borrower’s file
4.
5.
6.
7.
System sets a reminder
09 an
Computer reads record of book file daily and compares it to borrower’s file
h
Letter or E-Mail is sent if the due back date is near or exceeded
Process is repeated
irg
*Computers in Retail (barcode stock control)
dM
Barcodes are usually used at EPOS terminals, and in stock control to update data through
purchases. Barcodes can also be used in the following fields as well:-
1. Library book system
me
2. Administration systems
3. Passports/ID cards
4. Burglar alarm
am
er
5. Barcode is searched for in stock file
6. Once barcode is found, the record is associated
ch
7. Price of item is found and displayed
8. Stock level is reduced
211 ea
9. Procedure is repeated
10. Customer gets an itemized bill, and if they have a loyalty card, computer updates it
84 T T
11. Computer updates file with all the daily takings
129 i IC
These systems are used to read number plates off of cars, in the following process:-
1. Sensor detects car approaching, and sends a signal
to the microprocessor to capture a picture
character single-handedly
09 an
2. An algorithm is used to isolate each character on
the number plate, then OCR is used to reach each
h
3. After all of this occurs, the barrier is raised and the
irg
car is allowed to go through, while the machine
gives them a ticket
dM
4. When the car comes back from the park, the user
inserts the ticket
5. The system activates again, and if the plate number is similar to that stored earlier, it will
allow them to go through the gate
me
There are many reasons behind why someone would be tracked, some of them are:-
1. The person might be an offender who was recently released from prison, and their
oh
3. The person may be competing in a marathon, and their whereabouts or position need to be
known, so that the finish time can be recorded
4. An ankle monitor can use an RFID chip, which are tamper proof, to see if a person has
stepped out of their designated space or tried to remove the monitor. This is commonly used
Mr
with people who have committed crimes which are not prison-worthy, or they are put on a
rehab
er
3. As a training tool
4. Allows security-concerned companies to monitor all calls
ch
5. To make sure employees represent the company well
There are 3 types of call monitors, which are:-
211 ea
1. Monitor: Allows manager to listen to the call
84 T T
2. Whisper: Allows manager to listen and talk to employee only
3. Barge: Allows manager to listen and be heard by both employee and the receiver
*Satellite systems
129 i IC
GPS systems and satellite navigation
Is used to determine the exact location of kinds of transport. The system uses at least 3
Advantages
09 an
satellites, and a sat-nav system to measure the distance between the vehicle and the
location, as well as giving instructions to reach the destination.
h
Disadvantages
irg
Driver does not have to look at maps Can give false info if not up-to-date
dM
System can warn driver about Loss of satellite signals can cause problems
me
Estimated time for arrival If you key in incorrect locations, the system will respond
am
er
Performance of complex analytical calculations and then present them in form of maps
• Geographers, scientists, and engineers are able to see the data in several different
ch
ways.
Uses:-
211 ea
• Emergency services use them to send personnel to the closest emergency center
• Biologists and environmentalists use GIS to protect animal life
84 T T
• Teachers can use it in geography/science/engineering lessons
129 i IC
Media Communication Systems:-
Usually, satellites are used in multimedia such as televisions, where data is sent through a
09 an
radio wave frequency to the satellite, and the satellite takes it then converts it to a different
frequency and relays the data back to the location it was sent from. Cables would cost too
much, due to the long distances, so satellites are used instead
h
irg
dM
me
am
oh
.M
Mr
er
When a system is regarded inadequate for the task, a system analyst is brought in to
review the current system and suggest a number of improvements.
ch
*Analysis
211 ea
1. Research the current system and collect data
2. Describe the current system
84 T T
3. Identify the problems
4. Agree the objectives and identify then interpret the requirements with the customer
5. Produce a cost-benefit analysis and identify software/hardware needed
129 i IC
6. Produce a data flow diagram
Note: Stage 2-6 are identified as a feasibility study:-
1. Terms of reference
A. Objectives
B. Boundaries
C. Constraints
09 an h
irg
2. Description of the current system
A. Identify the problems
B. Project the costs
dM
3. Criteria
A. Essential requirements
B. Desirable features
me
4. Proposed solution
A. Development plan
B. Cost-Benefit Analysis
am
er
Observation: Watching • Gives reliable data • People will be
personnel using the existing • Possible to get an uncomfortable being
system and finding out the
ch
overall view of the watched
problem system • Workers will do things
• Inexpensive method that they don’t usually
211 ea
do, to impress the
observer/give a good
84 T T
image
Questionnaires:- Distributing • Can be answered • Number of returned
forms to see how the staff do quite quickly forms is usually low
some of the work • Inexpensive method • Questions will be
129 i IC
• Recipients remain inflexible
anonymous • No immediate way of
• Gives quick analysis of clarifying
*Design
• Make data capture forms
oh
er
answer
Make use of text boxes Make use of drop-down/combo boxes
ch
Make use of character boxes (surnames, Make use of radio/tick boxes to make
telephone numbers, etc..) limited choices easier
211 ea
Make use of printed text boxes for easy Have automatic validation of data
input of date of births
Make use of tick boxes to make limited Include navigation buttons
84 T T
choices easier
Make sure there is sufficient space for Have double data entry boxes
writing (verification purposes)
129 i IC
Use clear fonts and clear text colors
er
1. Double entry : Data is entered twice using two people at a time
2. Visual check: The person types in the data, and then compares it to the
ch
source of the data to see if there are any mistakes
Validation: A process where data is checked to see if it meets a certain criteria
211 ea
Validation check Description Examples
84 T T
Range check Checks if the data is within acceptable A person age should be in
values. the range 0 to 150
129 i IC
Length check Checks if the input data contains the If the field is six inputting 5
required number of characters will be an error
Character/type
check
09 an
Checks if the input data does not contain
h
invalid characters
A person height should
only contain digit
irg
Format check Check that the data in a specific format In the form dd/mm/yyyy
dM
Presence check Checks if the data is actually present and The field can not be left
has not been missed out empty required field.
am
Consistency check Checks if fields corresponds with each If Mr has been typed into a
other field title then the gender
must contain M
oh
Check digit Looks at an extra digit which is calculated •If two digits has
.M
er
ch
211 ea
84 T T
129 i IC
Designing a strategy plan:-
1.
2.
09 an h
Make sure it meets the customer’s requirements
Remove any bugs
irg
3. Make sure it produces the correct, already known, output
4. Check if the software doesn’t crash under certain conditions
dM
*Development
1. At this stage, if there are any files contained, then their structure has to be
me
they are working. For example, you need to see how the inputs will be
placed on the screen, and how they will be presented as outputs. Finally, the
interface should be checked to see if it is user friendly.
.M
Testing strategies
Mr
er
• Live: Data which is tested and it’s outputs are already known
• Abnormal : Data out of the range (Ex. 101 when the range is 0-100)
ch
• Extreme: Data on the boundaries of the range (Ex. 100 when the range is 0-100)
• Normal : Data that is within the range and not on boundaries (Ex. 2 when the range
211 ea
is 0-100)
84 T T
*Implementation
Method Description Advantages/Disadvantages
129 i IC
Direct New system is implemented Can be disastrous if system fails
overnight and old system is Immediate benefits
wiped out Reduced costs (less workers
needed)
Parallel
09 an
Old and new system run
together
h Less likelihood of malfunction
(system would’ve been tested)
Old system can be relied on
Gradually trains staff
irg
Expensive (more workers needed)
Time consuming (data needs to be
inputted twice)
dM
*Documentation
.M
• Program listing
• Programming language
• Flowchart/algorithm
• List of variables
• File structure
• Purpose of the system/program
• Input format or example
• Output format or example
• Hardware requirements
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 74 of 90
• Software requirements
• Sample runs/test runs
• Known bugs/possible errors
• Validation rules
er
User Documentation (made to help the user figure out the program) contains:-
• How to load software/install/run software
ch
• How to save a file
• How to search
• How to sort
211 ea
• How to print
• How to add records
• How to delete/edit records
84 T T
• Purpose of the system/program
• Input format or example
• Output format or example
• Hardware requirements
•
129 i IC
Software requirements
• Sample runs
• Error messages
• Error handling
• Tutorials
•
09 an
Troubleshooting guide/Contact details/help line/FAQ
*Evaluation
me
been met
• Identify any limitations of the new system so that system works without problems
• Identify any further improvements to the new system
• Analyze feedback from users of the new system to see how well they are coping with the
oh
new system/ to see how well the new system works and so that user’s needs are taken
into account.
.M
• Compare test results from the new system with the old system
Mr
*Physical Security
er
Health Aspects
ch
Risk Cause Ways of minimizing
211 ea
Back and Neck pain Sitting for long periods in the -Regular Breaks
same position -Foot rests
84 T T
-Sit in correct posture
-Use tilted screens
RSI Continuous use of keyboards -Use ergonomic equipment
and mice -Use your wrist properly while
129 i IC
working
-Sit in correct posture
-Use voice activated software
Eyestrain Staring at a computer screen -Insure there is no screen
09 an
for too long/Incorrect lighting
h flicker
-Switch to LCD monitors
-Anti-Glare screens
-Test your eyes regularly
irg
Headaches Incorrect Lighting / Flickering / -Anti-Glare
Reflections screens/Windows
-Regular breaks
dM
Safety Aspects
am
er
• Do not send photos of yourself
ch
• Maintain your privacy settings
• Make sure the websites you visit are secured
211 ea
• Use websites recommended by teacher
• Open E-Mails from known sources
84 T T
• Be Vigilant (keeping careful watch for possible danger or difficulties.)
• Block suspicious people
• Use a nickname/Keep private data secrete
129 i IC
• Never enter private rooms
• Never arrange to meet people on your own/Always tell an adult when your
meeting someone
•
09 an
Use appropriate language and respect people
er
-Intrusion detection software
-Using passwords/IDs
ch
Phishing -Personal data can be gained -ISPs/Web browsers filter out phishing emails
-Fraud/Identity theft -Being cautious
-Do not click on executable attachments
211 ea
(.exe/.bat/etc..)
Pharming -Personal data can be gained (Credit card -Anti-Spyware software
84 T T
details when using a fake website) -Be alert/Look for clues
-Fraud/Identity theft
Spyware -Gives access to all data entered by -Anti-Spyware
keyboard -Be alert/Check for clues
129 i IC
-Other spyware can be installed -Use an on screen keyboard when entering
important info
Viruses -Can cause computer to stop functioning -Anti-Virus software
- Deletion/Corruption/Editing of data -Do not use software from unknown sources
Spam
-Clogging up inbox
09 an
-Can cause computer to ‘crash’
-Denial of services
h
-Can lead to other risks like viruses
-Do not open suspicious attachments
-Use a spam filter and set the protection to a high
level
-Block images in HTML messages
irg
-Look out for already checked checkboxes
-Do not sign up to commercial mailing lists
-Do not reply to unsolicited messages
dM
*Cookies
.M
1. Firewall
• Examines traffic between computer and network
er
• Checks if data meets a certain criteria, and filters it out if it doesn’t
• Records all incoming/outgoing traffic
ch
• Can prevent hackers/viruses
• Cannot prevent individuals from using modems to access internal networks
211 ea
• Cannot control carelessness
•
84 T T
Can be disabled on stand-alone computers
2. Security protocols
A. SSL: Protocol which allows data to be sent and received SECURLY over the
129 i IC
internet. HTTPS shows the user that SSL is being used on that specific website
B. TLS: Is a similar more recent type of security which provides: Encryption,
Authentication, and Data Integrity; in a more effective way than SSL.
09 an
TLS is designed to prevent third party hacking through two ways:
h
-Record protocol: Can be used with or without encryption
irg
-Handshake protocol: Allows the user and website to authenticate each
other, in addition to using encryption techniques.
dM
It is a fact that TLS separates the handshaking process from the record protocol
From there, a new session can be opened, or an already existing one can be
modified.
3. Encryption
oh
them unreadable.
• The recipient can only access the data if they have the same key
Mr
er
• Digital certificates are attached to show that the info comes from a trusted
ch
source.
211 ea
Digital certificates Contain:-
1- Email address
84 T T
2- Digital certificate owner
3- Serial number
4- Expiry date
5- Public key
129 i IC
6- Authority of digital certificate
being stolen.
09 an
• Passwords are a number of letters and numbers used to secure data from
h
• Strong passwords should contain: Uppercase/Lowercase letters, Numbers,
irg
signs, etc...
• A maximum number of tries is allowed before the user is blocked out
dM
There are many reasons why a Credit Card may experience Fraud:-
me
2. Breaking of passwords
3. Visiting a fake website and entering your details
4. Using wireless internet access with no password
oh
5. Carelessness of the user (leaving personal info without anyone monitoring it)
6. Hacking of the organization/bank which withholds the info of the credit card
.M
Mr
er
Fingerprint Scan - Most developed biometric technique - Very intrusive
- Very high accuracy - Can make mistakes if the skin is damaged
ch
- Easy to use
- Small storage requirements
211 ea
Signature - Non-intrusive - Problems may arise if users do not sign with
Recognition - Requires very little time to identify the same name
- Low-cost - High error rate
84 T T
Retina Scan - Very high accuracy - Very intrusive
- Can’t be replicated - Slow to verify scans with stored ones
- Expensive to set-up/maintain
Iris recognition - Very high accuracy - Very intrusive
129 i IC
- Less than 5 seconds needed to verify - Uses a good amount of memory
- Expensive to set-up/maintain
Face recognition - Non-Intrusive - Affected by lighting or change of facial
Voice recognition
- Inexpensive
- Non-intrusive 09 an
- Less than 5 seconds needed to verify
- Inexpensive
h characteristics
- Can be replicated through recording
- Low accuracy
- A change in a person’s voice can make it
malfunction
irg
dM
me
am
oh
.M
Mr
er
There are many factors to consider when presenting something specific while appreciating
the audience, here are some of them :-
ch
1. Age: Young children like animations and pictures, while adults may like something
more informative and formal.
211 ea
2. Experience of the audience: - For example, a group of school teenagers would
expect a different presentation than that for a group of directors or managers.
84 T T
3. Expectations of the audience: - If you’re advertising a new product, a car for
example, adults would expect a presentation about the car’s features and
comfortability, while children would be more interested in the car’s looks and speed.
129 i IC
4. Knowledge of the audience: - For example, Physics graduates would expect a
different approach that Chemistry graduates during a presentation about Science.
To achieve the best presentation possible, research must be done in order to reach a
*Factors of a presentation
Language Multimedia
me
• Sound/Video/Animation will
am
Length
Mr
Examples Interactiveness
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 82 of 90
Always make your speech matching to the factors listed below: -
1. How old are the audience
er
2. How skilled are the audience (dependent)
3. Do the staff have any problems (Disabilities, ethical problems, religious problems,
ch
etc...?)
Note: Go to pages 163,164, and 165 for an example about Audiences.
211 ea
*Copyright and privacy
84 T T
Whenever purchasing a copyrighted software (on a CD for example), it is illegal to:-
1. Make a copy of the software and sell it as your own or give it away
129 i IC
2. Use the software multiple times on different networks (unless specified you can do
so)
3. Use coding of the software in your own software
09 an
4. Rent out a software package without permission
5. Use the name of the software on other software without agreement
h
Software privacy has been a big problem on the internet, so companies have taken extra
irg
steps to stop copies from being used after they’ve been sold:-
1. The user will need to put in a PRODUCT KEY in order to use the software
dM
2. The user will need to AGREE to certain conditions and rules, which if disobeyed, will
cause the user to face major consequences
3. Original packaging comes with a sticker saying that it is illegal to copy the software.
4. Some software will not work without the CD-ROM/DVD-ROM/Memory Stick being
me
plugged in
5. Some software will only run if a dongle is plugged in.
am
*Legal/Moral/Ethical/Cultural implications:-
oh
Word Definition
Legal Covers the law, whether or not it is
punishable by the law
.M
All of these factors differ, for example, anything that the law prohibits is deemed illegal, and
punishable by the law itself. As for moral acts, these depend on the person, and not on the
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 83 of 90
law or on a group, however, culture can get in the way. What may be immoral to many
people, is permitted in some cultures, and vice versa.
For example, cows are usually slaughtered for their meat, however, in India, cows are a
very sacred animal. There is a very thin line between immorality and illegal acts. For
er
example, giving information from your company to its rival is deemed immoral, but is not
necessarily illegal
ch
*Policing of the internet
211 ea
Arguments For Arguments Against
Prevents illegal material from being posted Material published is already available on
84 T T
other sources
Can shield people from having to discover Would be difficult to enforce rules on a global
information with serious consequences scale
129 i IC
Would prevent children and other vulnerable Would go against freedom of information and
groups from unwanted material speech
Would stop incorrect info from being published Many comments posted are already illegal,
and rules already exist to deal with them
er
A. Laws
• Many countries require users to obtain permission before sending E-Mails
ch
• Never send an E-Mail with a misleading subject title
• If you are sending as a company, a valid postal address MUST accompany
211 ea
the message
84 T T
• Many countries DO NOT allow companies to harvest (collect) E-Mail address
lists
• Privacy policies must be made clear to a company’s subscribers
129 i IC
• Companies must provide subscribers with a way to unsubscribe from their E-
Mails
• Companies and individuals must have clear ways for the user to opt-out
(Exit)
B. Acceptable Language
09 an h
• You can LIE but only within an acceptable range
irg
• Obscene images/Offensive/Exploitive/Profane/Abusive messages (etc..)
are not allowed
dM
C. Copyright
Even though they are E-Mails, copyright still applies to them. You may think that the
am
forward button is just a simple click, with no consequences, but that is not always the
case. Many companies are very strict about the copyright policies of their
attachments and messages. You are not supposed to forward a message unless
oh
you or the recipient are responsible for doing so. Other than that, forwarding of
copyrighted messages is PROHIBITED, and will be met with great consequences.
.M
er
• Don’t send spam
• Be clear in your messages
ch
• Remember that your posts are read by everyone, so be understanding
•
211 ea
Check spelling and grammar ALWAYS
• Respect people’s privacy and do not discuss delicate matters
•
84 T T
Forgive people for their mistakes
• Do not use CAPITAL letters, as they may be viewed as screaming
• Do not plagiarize
129 i IC
• Do not use to many Emoticons
It is important to note that these points can show who you are as a person to the
general public, and give a first impression to anyone unknown to you. Usually, sticking
*Spam
09 an
to these rules will give a good first impression about yourself.
h
irg
Spam E-Mails are any unsolicited messages that are sent to you, and can range from being
annoying to being extremely dangerous, depending on the weight of the situation. There
are many disadvantages behind spam, with some of them being:-
dM
Spam doesn’t only affect computers, but can also reach out to mobile phones, through SMS
spam or ‘Spasms’ , which charge the user a specific amount of money every time they
oh
• Easier to send multiple E-Mails to the same addresses if they are all grouped under
the same name.
Mr
*The internet
er
the internet has enabled people to do many different things, some of them being: Send and
ch
receive E-Mails, Transfer files, Chat online, Browse the WWW.
It is important to note that the WWW is only part of the internet, and while you use a web
browser to open web pages, the browser only allows you to access the WWW which is
211 ea
based on the HTTPS.
84 T T
*Intranets
Is a computer network based on internet technology, but designed to meet internal needs
129 i IC
for organizations/companies/private groups/etc... This means that it is not available to
the general public, and is protected by a FIREWALL
5. Possible to create Extranets to extend intranets, but give them the same
advantages as intranets
am
More difficult to place protection since it is on a Resides behind a firewall which protects it from
global scale malicious code
Publicly accessed Privately accessed
Mr
*Cloud Storage
Data is stored on an offsite server, in many different servers. This is done so that when a
server is repaired, the data would stay there. This is known as Data Redundancy
Types of Clouds:-
IGCSE Exam Code: 0417 Done By:
Computer Eng. Mr. Mohammed Mirghani Gaffar- ICT Teacher
*British Educational Schools* - SIA – Kiebeda –KICS – ABC - General Science - KDS- Holm School - New Horizon
–Avinash – Challenge - Didy Antoun –Nile Valley Schools -
All rights reserved © Year 2020-2022 - NO COPIES
Tel: 0912984211 –0922984211-0910898080-0121024442
Page 87 of 90
1. Public Cloud :- Customer and provider are from different companies
2. Private Cloud :- Customer and provider are integrated and act as a single entity
3. Hybrid Cloud: - Combination of the two previous clouds, where some data resides in
the private cloud, and less sensitive data resides in the public cloud.
er
Advantages Disadvantages
Data is accessed at any time Some of its security aspects are not very
ch
strong
No need for the customer to carry an external Needs strong and fast internet connection to
storage device access properly
211 ea
Provides the user with data backup Can be costly if large space is needed
Allows recovery of data in case the storage Potential fail of a cloud storage company is
84 T T
device fails always possible – can lead to major losses
Offers almost unlimited storage capacity
129 i IC
*General internet terms
HTTP(S): Rules of communication which must be obeyed when transferring data over the
09 an
internet. If the S or a green padlock is beside it, this means that the source is secured.
h
Web Browsers: Allow the user to view webpages by translating the HTML code from
websites and showing the results
irg
They can have the following features:-
1. Home page
dM
2. Favorite websites/pages
3. History
4. Can go backward and forward
me
• Website address
-Domain host : WWW
.M
er
Blogs: an author writes their opinion about a certain topic, and may provide links to certain
websites to support his conclusion. Users can then comment on the blogs, and give their
ch
opinions as well
211 ea
It is worth knowing that blogs are NOT IMMUNE from the law.
84 T T
Some features of a blog:-
• Updated regularly
•
129 i IC
Organized in reverse chronological order (newest to oldest)
• Public
• Come from one author
•
09 an
Other users cannot edit blogs
MicroBlogs are similar to blogs, but are much shorter and more frequent. They are similar to
h
posts on social media, especially apps like Twitter or Facebook.
irg
B-Blogs are similar to blogs, but used by businesses to promote their product
dM
Wikis: - Web pages which can be edited by any user through any browser. Usually used
to give information about a certain topic (i.e. Wars and their dates)
Social Networking Sites:- Applications which focus on building online communities, and
allow users to share photos, videos, music, hobbies, favorite eating places, etc...
.M
*Search engines
er
Allows you to search up data, without knowing the URL. They use words entered in a box,
and look them up in their knowledge base then do a cross search. The more specific your
ch
search is, the less hits you’ll get.
Once information is found, it can be saved in the following ways:-
211 ea
• Favorited
84 T T
• Adding hyperlinks to a document
• Using “print screen”
• Copy and pasting it
129 i IC
Advantages Disadvantages
Info is up to date and easier to find Anything can be posted on a webpage
Vast, limitless amounts of info Risk of accessing inappropriate websites
Fast and Easy
search results, and are given the greater priority compared to others.