Zee Notes Ict
Zee Notes Ict
ZNOTES.ORG
CAIE IGCSE
ICT (0417)
SUMMARIZED NOTES ON THE SYLLABUS
Computer Systems
Used instead of CPU
Single integrated circuit
Processing done by central processing unit Stores data/information & programs not being used at
Three main components: current time
Control unit - coordinates input and output devices Backing store device = reader or recorder
and carries out program instructions Example: Hard disk drive
Arithmetic and Logical Unit (ALU) - performs Backing store media = hardware containing data
calculations and logical comparison: A < B? Example: Hard disk
Can be used like a PC and/or a Smartphone A part of a person’s body is used to identify that individual
Advantages: Can be:
Small light & portable Fingerprints
Built in cameras for photos & videos Retina
Touchscreen can be used with a stylus pen Iris
Long battery life Face
Disadvantages: Voice
Less storage spaces These are all unique to everyone thus can be used as an
Lacks power of laptop/PC authentication technique
Digital keyboard can be di cult to use Must be added initially to a system to use as identi cation
Touchscreen may be di cult to use for detailed work Impacts on everyday life:
Better security at the airport since most use at least
one form of biometric check if not more
Smartphone Increased security in certain places as only authorized
personnel can gain entry
Modern phones that can perform similar tasks to all the Reduced vehicle theft since newer car doors come
above with a ngerprint lock on the door handle
Main use of smartphones is social media & day-to-day More secure mobile devices as most now have some
planning sort of biometrics integrated into them
Use varies from person to person
Advantages:
Smallest lightest most portable Vision Enhancement
Integrated/virtual keyboard
Often the least expensive device LVES: low vision enhancement systems: video projected
More practical for day-to-day use inside a headset in front of the user’s eyes. Brings the
Disadvantages: objects closer for the viewer.
Small screen may be di cult to use NVE: Night vision enhancement: ampli es visible and
Not as powerful as other devices infrared light. Light passed through image intensi er tube
Often has the lowest battery life where light is converted to electrons, then ampli ed
Small size makes it easy to steal/lose (increase in no.) and then light up screen with phosphor
dust.
1.5. Impact of Emerging Technologies
Robotics
This is technology that is being newly developed
These can have several impacts on our society Programmed machinery widely used to do physically
demanding tasks
Can be automated or manually operated
Arti cial Intelligence (AI)
Used to perform several tasks:
Dangerous jobs such as bomb disposal
Technology that focuses on creating a computer system
Exploring extreme environments such as volcanoes
that can closely mimic or simulate human intelligence
Repetitive manufacturing jobs such as welding
AI can be used to:
Moving heavy objects such as large engines
Enhance video games and computer tactics
Impacts on everyday life:
Help decision making steps in expert systems
Increased personal time since robots can take over
Make robots to imitate human behaviour
domestic chores
Understand di erent human languages
Increased manufacturing e ciency since robots are
Impact on everyday life:
much faster and less expensive than human labour
Can be used to accurately predict hazardous weather
Unemployment as robots replace humans in
conditions and signal warnings automatically
autonomous jobs
Take over menial tasks for humans; increasing our
Safer working environments since robots can perform
leisure time
tasks that are too dangerous for humans
Can be used for safer automated travel; cars that can
drive and park by themselves
Increases home safety by being able to tell the
Quantum Cryptography
di erence between owner & intruder; call authorities
automatically Technology that allows messages and data to be sent with
Improved medical care as decision making skills and complete privacy; basically, advanced encryption
precision can be enhanced Older encryption is based on mathematics, but this new
tech uses physics
Makes it much more complex to decrypt
Biometrics
A remote control is used to control the operation of other They are tamperproof, preventing people from
devices remotely by using infra-red signals keying in information (which could corrupt the
Uses system)
In home entertainment devices such as Televisions, Disadvantages
DVD player/recorder and satellite system There is a limited number of options available
Used to control multimedia systems Using touchscreens often can lead to health problems
Used in industrial applications to remotely control e.g. (straining of arm muscles and RSI)
processes, stop and start machinery The screen can get very dirty with constant touching
Advantages
Enable devices to be operated from any distance,
which is useful for people with disabilities Scanners
Some chemical processes are hazardous, so it is safer
to operate equipment from a distance Used to input information on hardcopy e.g. text document
Disadvantages Uses
People with limited hand/wrist movement can nd Used to scan in documents and convert them into a
them hard to use format for use in various software packages
The signal between the control and the device can be Old and valuable documents and books can be
easily blocked scanned, protecting the original copies from damage
Non-digital photographs can be scanned for storing on
a computer
Joystick Advantages
Images can be stored for editing later
Scanners are much faster and more accurate than
typing in documents again
It is possible to recover damaged documents and
photographs by scanning them and then using
appropriate software to produce an acceptable copy
By gripping the stick, a pointer on the screen can be Disadvantages
controlled The quality can be limited depending on how good the
Buttons are used to make selections scanner resolution is
Uses
Video/computer games are often controlled by
joysticks Digital Cameras
They are used in simulators to mimic actual controls
Advantages
Easier to navigate round a screen compared to a
keyboard
Control is in three dimensions
Disadvantages
More di cult to control the on-screen pointer with a Photographs are stored in memory
joystick than with other devices such as mice They can be easily transferred to a computer using a USB
Uses
Digital cameras can produce photographs for direct
Touch Screen transfer to a computer or to print out
Digital cameras allow short video clips to be produced
User can choose an option by simply touching a Photographs can be uploaded directly into application
button/icon on the screen software such as word processor
The selection is automatically made without the need for Advantages
any pointing device Easier to produce better quality photographs than with
Use a tradition camera
Used for service tills e.g. petrol stations Easier and faster to upload photographs to a
Used where selections are made on a screen e.g. computer
ATMs, public information systems, airports and There is no need to develop lm and print out
railway stations photographs (saves paper and no longer needs the
Used in PDA’s chemicals to produce photographs from lms)
Used in Interactive white boards Easy to delete an image from the memory if it’s not
Used in computer-based training (CBT) satisfactory
Advantages The memory card can store several hundred
Enable faster entry of options than a keyboard/mouse photographs
Very easy to choose options Disadvantages
User friendly method for inputting data
The camera user needs to be computer literate to use Type of sensor Applications
the camera properly Automatic washing machines, central
There is some artistry lost since clever software Temperature heating systems, automatic green
corrects errors in the photographs houses, ovens
The resolution is not yet as good as traditional
Burglar alarm systems, robotics,
cameras
Pressure environmental monitoring, Automatic
Images often need to be compressed to reduce the
washing machines
amount of memory used
It is possible to ll up computer memory very quickly Automatic doors, street lighting
with several photos of the same subject (to nd the Light control, Burglar alarm systems,
perfect snap shot) automatic greenhouses
Burglar alarm systems, monitoring
Sound
liquid and powder ow in pipes
Video Camera Automatic greenhouses,
Humidity/moisture environmental monitoring, factories
DV (digital video) camera store compressed photo frames where moisture levels are crucial
at 25 MB/s – motion jpeg.
Automatic greenhouse, chemical
Light turned into electronic signal through light sensitive pH
processes, environmental monitoring
sensors and automatically converted to a digital le
format.
Advantages
Advantages
Readings by sensors are more accurate than taken by
Easy to edit footage in a video editing.
humans
High quality video captured, therefore
Readings are continuous, there is no break in
Disadvantages
monitoring
Storage medium (Memory cards) more expensive to
Because it is a continuous process any necessary
buy than lms.
action or warning will be initiated immediately
The system can be automatic, removing the need for
Microphone human intervention, this is particularly important if the
process is hazardous
Disadvantages
Faulty sensors can give spurious results
Graphic Tablet
Sensors
Connected directly to a computer via a USB port The device has a slot where the card is placed, and the
Uses chip is read
While chatting online webcams can be used to have A small screen is part of the reader which gives
conversations instructions to the operator
Used to enable video conferencing to take place Uses
Advantages Chip and PIN readers are used where payments are
Can be left on constantly and activated when required made using cards e.g. travel agents
Allow people to keep in contact with each other Advantages
without the need to travel, particularly useful for Provide a more secure payment system than requiring
disabled or elderly people a signature or using magnetic stripe, since the PIN
Disadvantages typed in must match up with the PIN stored on the chip
Webcams have limited features and the picture is Provide a more robust system than magnetic stripe
often of poor quality since the chip does not need to be in contact with the
They need to be connected to a computer reader
Disadvantages
2.2. Direct Data Entry & Associated Customer needs to be careful when typing in the PIN,
so nobody reads it giving an opportunity for Fraud
Devices
Magnetic Stripe readers Radio Frequency Identi cation (RFID) Readers
IPS/LCD Monitor
Front layer made from liquid crystal diodes; grouped Receive analogue and digital signals, although most
together to form pixels (RGB or RGBY-more vivid colours) modern projectors only work with digital inputs
Receive analogue and digital signals, although most The signal source is usually from a computer, television,
modern projectors only work with digital inputs or DVD player
IPS (In-plane switching) is the technology used in LCD The image from the source is magni ed and projected
monitors. onto a large screen
Advantages The devices usually work with a remote control, but can
Colour can be seen accurately from di erent viewing also use virtual mouse technology – cordless PC mouse
angles (has a laser pointer)
No lightening on touching It is then possible to direct the presentation without
Disadvantages being tied to the computer
Expensive Most multimedia projectors take input from various
High power consumption types of video format e.g. PAL, NTSC or SECAM
Slow response time Uses
Note: Old LCD monitors used CCFL (cold cathode Used for training presentations (allows the whole
uorescent lamp) technology to light up the screen. audience to see the images from a computer)
Also used for advertising presentations (shown at Used to produce good quality hard copies – the quality is
exhibitions, shopping malls etc.) not as good as in laser printers but much better than that
Home cinema systems (projecting the images from a of dot matrix printers
DVD or television) use multimedia projectors Do not have large bu ers like laser printers, so printing is
Advantages done a bit at a time
Enables many people to see a presentation rather Therefore, printing is sometimes paused – the whole page
than all of them crowded around a small computer can’t be stored in the bu er, it must wait for the computer
screen to send more data
Avoids the need for several networked computers Uses
e.g. when looking at a video clip on the internet, Used where low volume outputs are needed
everybody can see the video on the large screen Ideal for high quality printing for small print jobs or
rather than logging on to several computers single pages e.g. for photo quality printouts
Disadvantages Advantages
Images can sometimes be fuzzy High quality output
Expensive to buy Cheaper to buy than laser printers
Setting up projectors can be a little di cult Very lightweight and take up little space (small
footprint)
Do not produce ozone and volatile organic
Laser Printer compounds, unlike laser printers
Disadvantages
Output is slow if several copies needed – there is little
bu er capacity to store the pages
The ink cartridges run out too quickly to be used for
large print jobs
Printing can smudge if the user is not careful
Can be expensive to run if they are used a lot –
Produce very high-quality hard copy output original ink cartridges are expensive
Print rate per page is fast if many pages are being printed
Rely on large bu er memories – the data for the whole
document is stored before pages can be printed out Dot Matrix Printer
Uses
Used where noise levels need to be kept low e.g. in an
o ce
The best option for fast, high quality, high volume
printing
Advantages
Printing is fast for high volumes, slightly faster than A type of impact printer
inkjet if only a few pages are to be printed A print head made up of a matrix of pins presses against
Can handle very large print jobs an inked ribbon
Quality is consistently high Uses
Toner cartridges last for a long time; laser printers Can be used in noisy environments e.g. garage
can be a cost-e ective option if colour outputs are not workshops
required Can be used in applications were the print quality is
Disadvantages not very important
Expensive to buy Advantages
Only fast if several copies are being made Can be used in environments which would be a
Colour laser printers tend to be expensive to run since problem for laser and inkjet printers – dusty, dirty or
four cartridges are needed as well as di user kits, etc. moist atmospheres
Produce ozone and volatile organic compounds Carbon copies or multi-part outputs can be produced
because of their printing method and type of toner/ink Very cheap to run and maintain
used Easy to use if continuous stationary is required e.g.
These have been linked to health hazards in the o ce long print jobs such as wage slips
Disadvantages
Very noisy – not good in an o ce environment
Inkjet Printer Cost more than an inkjet printer to buy
Very slow
Printing is of poor quality
Speakers
Devices that produce hard copies but operate in a
di erent way to printers
Not limited to normal printer paper size and can produce
highly accurate, very large drawings and posters
The most common types are pen plotters, electrostatic
(similar method to laser printers) and inkjet plotters
With pen plotters, coloured pens are controlled by a
computer and the paper can move backwards and
forwards to allow accurate shapes to be drawn Can be connected directly to a computer or are built into
Uses the monitor or casing (as in laptop computers)
Used to produce large drawings e.g. blueprints of Uses a digital to analogue converter (DAC) to convert
buildings; are often used with CAD applications digital data from the computer to analogue from so the
Used to produce large pictures for use on billboards speakers can process it; the signal is then ampli ed
or giant posters through the speakers.
They can also print on plastic coated paper Uses
If the pens are replaced by cutting tools, it is possible to Used to output sound from multimedia presentations
make large signs Used in home entertainment centres
Advantages They can help blind people through audio output of
Can produce huge printouts text on the screen (together with speech generation
Print quality is extremely high software)
Disadvantages Used to play downloaded sound les
Slow in operation Advantages
Expensive to buy and maintain Usually long lasting and durable (if operated within
their intended power levels)
Often provided with the computer/laptop although
3D Printer these may not be the best quality
Disadvantages
Can take up a lot of desk space, compared to
headphones
Can distract people around you, everyone can hear
what you are playing
May not be able to hear the full sound spectrum, this
requires multiple speakers
A new type of printer that produces solid 3D models using
modi ed inkjet technology called tomography
Very thin layers of ne powder (plaster, resin, starch) are
Actuators
bonded together as a 3D model is slowly built up
Items produced are known as prototypes A type of controlling device
Uses Transducers that are used to take signals from a
Used to produce prototypes which work from CAD computer and convert them into some form of motion e.g.
packages, photograph images, stored drawings etc. operating motors, pumps, switches and valves
Scale models are produced in colour before the real Digital signals are sent from the computer to an actuator
thing is manufactured to operate a device
The ultimate objective is to produce organic objects Conversion of the digital signal to analogue is required
using this layering technology (such as replacement
rst (using a DAC)
human organs)
Advantages
Save a lot of money, other methods of making Motors
prototypes are very time consuming and expensive
The powders used can often be ground up and reused
Physical scale models are produced with working
parts, which gives a better idea of how the product will
look
Disadvantages Turned on or o by the actuator
Expensive to buy Uses
The letter ‘R’ means the disc is recordable only once and Shiny and dull marks represent data to a computer where
then it becomes ROM they are interpreted
Use a thin layer of an organic dye as the recording media Uses
DVDs also use an additional silver alloy or gold re ector DVD-RAMs are used in recording devices such as
Laser beam produces heated spots and unheated spots satellite receivers to allow simultaneous recording
Uses and playback
They are used for home recording of music (CD-Rs) They are used in camcorders to store lms
and lms (DVD-Rs) Advantages
They are used to store data for later use Have a long life (30 years)
Used in applications where it is necessary to prevent Can be re written on more than the DVD-RWs (100,000
the deletion or over-writing of important data times)
Advantages Very reliable as they have built in veri cation software
Cheaper than RW disks to ensure accuracy of data
Once burned (and nalized) they are like ROM Access is very fast
Disadvantages No need to nalize the disk
Can only be reordered once Very large capacities
Not all CD/DVD players and can read CD-R Ability to read and write data at the same time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many
CD-RW/DVD-RW systems will not recognize this format
More expensive than DVD-RW
‘RW’ means that these disks are re-writable media can be
written over several times
Unlike CD-R/DVD-R they don’t become ROMs Blu-Ray Discs
The recording layer uses a special phase-changing metal
alloy Uses
The alloy can switch between crystalline and amorphous Blu-ray disks are used in home video consoles
(non-crystalline) phases, thus changing its re ectivity to Used for storing and playing back lms
light, depending on the laser beam power PCs can use this technology for data storage or
Spots are produced which can be read by a laser backing up hard drives
System allows data to be written, erased and re-written Camcorders can use this media to store lm footage
many times Advantage
Uses Very large storage capacity
CD-RWs and DVD-RWs are used to record radio and Data transfer rate is very fast
television programs Data access speed is faster than with other optical
They are used in closed circuit television (CCTV) media
systems Disadvantage
Advantages Disks are relatively expensive
Can be re used many times Blu-ray disks still have encryption problems
Di erent le formats can be used each time
Less wasteful than R format since les or data can be 3.3. Solid State Backing Storage
added at a later stage
Disadvantages
Solid state systems control the movement of electrons
Relatively expensive media
within a microchip: if the transistor conducts a current,
Possible to accidentally overwrite
this is equivalent to a 1, otherwise it is a 0
Have no moving parts, consume much less power and are
extremely robust
DVD-RAM
Used primarily as removable storage devices and are
collectively known as ash memory
Recent addition to optical media group
Unlike other CD and DVD formats, DVD-RAMs have
several discrete concentric tracks rather than a single
Solid State Drives
spiral track
Gives them advantage that writing, and reading can occur
Supports reading/writing data & maintains stored data in
at the same time
a permanent state even without power
Makes it possible to watch an already recorded television
Functions much like a hard drive but di erent tech
program at the same time as a di erent program is being
Built with an array of semiconductors that form its
recorded
memory and operated using an integrated circuit
Recording layer is made from similar phase-changing
Uses
material to that used in RW technology
Used to store operating systems and working data
Used for storing application software
They are devices that can have multiple devices Laptop computers
connected to them Peripheral devices such as printers
Main task is to receive data from di erent ports and send Wi-Fi Hotspots
it to each device Wi-Fi systems rely on AP (radio frequency technology)
The information will be received to the device whether its to enable the device to receive and send signals
relevant, or not Wi-Fi hotspots are places where you can access Wi-Fi
(free or paid)
Hotspots are found in public places like Airports,
Bridges hotels, and cafés
War driving: The act of driving and searching for
It connects 2 di erent types of networks together e.g. a unsecured Wi-Fi hotspots
bus and star network This gives a risk to the Wi-Fi system
It can only connect networks that use the same way for
handling messages
They do this by changing the form of message to suite the Bluetooth
di erent type of network
Bluetooth is an example of wireless personal area
networking (WPAN) technology
Switches Spread spectrum transmission (radio waves) is used to
provide wireless links between to devices such as mobile
More e cient than hubs in distributing data phones and allow connection to the internet
Each device has an access control media address MAC A small home network can be created with this system
which identi es it uniquely Uses
MAC Address: a number unique to each device connected Transfer photos from camera to mobile phone
to the network (like ngerprints) Wirelessly connect di erent external devices
Data sent will have a mac address which tells the source
and receiving device
4.4. Accessing the Internet
4.3. Wi-Fi & Bluetooth Type of server that acts as a bu er between a WAN and a
LAN
Retrieves web pages and passes them onto the computer
Wi-Fi
that made a request
Any system which allows you to connect to a network or Stores any page retrieved on the server, which means
computer through wireless communication that when a di erent computer requests the same page it
Examples: would be available
WLANs Speeds up the browsing process
PDAs
Websites Intranet
Web is made up of millions of websites and web pages Like the internet but only accessible to speci c users
Web pages are documents on a computer screen Basically, a private internet where outsiders cannot
containing various multimedia and text, pictures connect to it
A website consists of many of these pages linked together Uses of an Intranet:
Web Browsing
Email
Uniform Resource Locator (URL) File Sharing
Schools: share information and learning resources
Web browsers use URLs to retrieve les with students
They are multiple ways of locating on the internet Businesses: share private information within a large
Standard form: 4 numbers e.g. 194.106.220.19 company securely
Alphanumeric form:
protcol://web address/path/ lename
Where; Protocol is usually http Comparing Internet & Intranet
Site address consists of: computer name, domain
name, domain type, and country code Internet Intranet
Path is the web page Phrase Internal Restricted
Filename is the item on the page International Network
Origin Access Network
Purpose Globally share data Privately share data
4.6. Email Speci c company or
Audience Wide range of people
organisation
A method for sending text and attachments from one
Anywhere if you are Only from within the
computer to another over a network Access
connected company
Advantages
Speed of sending and receiving replies is quick
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail Local Area Networks (LAN)
Disadvantages
Possibility of virus threats and hacking Not over a large geographical area (e.g. in one building)
Need for the email address to be correct Typical LAN will consist of several computers and devices
Inability to send bulky objects via emails Devices and computers will be connected to hubs or
switches
One of the hubs or switches will usually be connected to a
4.7. Internet Service Provider (ISP) router/modem to allow LAN to connect to the internet
In doing so it then becomes part of a wide area network
These are companies that provide users with access to Advantages
the internet The sharing of resources
Provider in return for these services is charged a monthly Communication between users
or annual fee Network administrator can control and monitor all
After paying this fee, a username and password are aspects of the network
issued which can be used to connect to the internet Disadvantages
Easier spread of viruses throughout the whole
4.8. Common Network Environments network
Development of printer queues
Slower access to external networks e.g. internet
Internet
Increased security risk
A worldwide collection of networks and computers that If main server breaks down, usually the networks will
have joined together no longer function
Uses of the Internet:
Web Browsing
Email
Wireless LANs (WLANs)
File Sharing
Do not involve any wiring or cabling
Entertainment
Provide wireless network connection overs a short
Video Conferencing
distance
Online Banking
They use radio or infrared signal's instead of cables
Advertising & Blogging
Devices known as Access Points (APs) are used for a
Social Media
larger range
WAN is formed by several LANs being connected through Uses Wi-Fi to connect to the
Larger screen than
a router or a modem internet which is less reliable
smartphones
Some companies set up Private WANs, it is expensive than wired
however it comes with a more enhanced security On-screen keyboards larger Screens are smaller than
It is common to use an Internet service provider (ISP) for than those on smartphones those on laptops & desktops
connections to the internet and communicate via this On-screen keyboard is not
network system easy to type on
Additional hardware is needed for a WAN: Routers,
modems and proxy servers MOBILE PHONES
Could reduce the amount of incorrect information Passports: Have an RFID chip on it that
Against Policing:
Material already available in other sources i.e. books responds to a signal sent by a RFID reader that sends
Very expensive information about the passport holder to the computer
Users would have to fund system
Di cult to enforce rules
Physical Tokens: A security token
Against freedom of information
Laws already exist to deal with perpetrators (sometimes called an authentication token) is a small
hardware device that the owner carries to authorize access
to a network service. The device may be in the form of a
Inappropriate Websites smart card or may be embedded in a commonly used object
such as a key fob.
Risk of nding undesirable websites
Risk of doubtful websites which are not genuine Retina Scans: Scans the
They could lead to problems such as undesirable web
links, security risks unique pattern of blood vessels in the eye of a user using an
unperceived beam of low-energy infrared light into a person's
4.11. Password Interception eye as they look through the scanner's eyepiece.
Guidelines
in the Home Working with poor room lighting Use TFT rather than CRT
Computer screen glare/ icker Use anti-glare screens
Positive e ects Negative e ects Dirt can cause eye strain Ensure good room lighting
Lead to more leisure time No direct light on screen
since devices can be Unhealthy diets Clean dirt
programmed to do tasks
People become lazy and rely
More time to socialize
on devices 6. ICT Applications
Becoming very sophisticated
Dependency on technology
and can make use of
embedded web technology
increases 6.1. Communication Applications
More wasteful society since
Save energy - switch o
devices thrown away if they
Newsletters
automatically
fail, not economic to repair
Paper-based communication used to inform people about
Easier to program device their interests
Leaving on standby wastes
rather than set timings & Schools use these to inform parents about events/dates
resources
dates manually Advantages
Released regularly
5.4. Potential Health Problems The recipients have a permanent copy
Disadvantages
Requires distribution
Repetitive Strain Injury (RSI)
There are no special e ects; sound/video/animation
This is when joints such as the shoulder, wrist or ngers There are printing costs; paper/ink
swell, causing pain
Damage gets worse if left untreated
Can lead to hand/arm immobility
Mobile Phones
Music Scores
Wireless devices that allow users to make phone calls
Music samplers and mixers allow original tracks that were from anywhere with cell reception
recorded in a studio to be modi ed They connect to the telephone system using radio signals
Electronic instruments can play back through electronic This requires them to be in range of a mobile tower
e ects machines Used for communication via
Synthesizers combine simple wave forms to produce Phone calls
complex music creations Text messaging
Electronic organs can mimic any other instrument Social Media
Music scores can be generated from music itself using
software
Software can automatically correct music notes in a score
There is no need to understand music notation to write a Internet Telephony/VOIP
music score
Music notes are automatically printed out in the correct VOIP (Voice over internet protocol) is a method used to
format talk to people over internet
VOIP converts sound (picked up by a microphone) into
discrete digital packets that can be sent to a destination
via the internet
Cartoons
Publications Advantages
Faster to get results
Business Cards: Fewer errors
Miniature printed documents that provide information It is easier to do statistical analysis
about the business/organisation Less expensive to carry out; requires fewer people
Usually printed on thick cards Online questionnaires
Easily distributable to potential clients Usually use radio buttons
Information includes company logo, services, address, No data preparation needed
contact numbers, email, website Results sent directly to database for analysis
Gives a professional impression
Letterheads:
Found at the top of o cial printed documents to be
mailed to clients or for internal use Address Lists
Makes it clear to reader who the sender is
Information includes company logo, name, address, An address book on a computer or mobile phone might have
contact numbers a contact’s home address, phone number, email address,
Gives a professional impression personal information like the date of birth etc.
Easy to reply to
Flyers:
Generally printed on single sheets of A4 paper
Handed out directly to people for promotions
Cheap to produce and easily distributable (locally)
Information includes company logo, promoted product
or service, contact details
Makes it easier to target a speci c audience Clubs & Society Records
Brochures:
Also called lea ets & are like yers Need to keep a record on members usually in a database
Di erence is that they are often folded into sections Usually payment details, contact details and interests
Left on counters for pick up rather than handed out It makes it easy to match people with interests and send
Information includes company logo, promoted product information about what they are interested in
or service, contact details This can be done my using mail merging
Makes it easier to target a speci c audience Easy to check memberships and send out reminders
It is important to follow the data protection act
All data handling starts with data collection Database applications such as SIMS store large amounts
Data capture forms can be used for many applications of data which can be used to create annual and termly
Decide what needs to be collected and then what school reports
questions should be used to collect it Things able to be gathered from here are:
Paper or electronically Data individual to student – tests/exam results
Rules for creating forms Student progress – target grades being met or not
Make them look o cial Number of absences – create a percentage of amount
Spaces should be thought about giving enough space of days attended school
for answers Teacher comments – adds comments on to report
Restrict the amount of possible answers, do not use
open questions
If open questions are used limit the amount of space
6.3. Measurement Applications
available for answers
Sensors are used to send data to a computer where the
Asking for ‘Name’ needs to be carefully thought about
data is processed
Are you asking for sensitive information?
The computer simply reviews the data from the sensors
People may not feel comfortable being truthful
(by comparing it to data stored in memory) and updates
What names do you want?
its les and/or gives a warning signal if the values are
First name, family name etc.
outside given parameters
Date of Birth
No changes to the process are made
What format do you want it in?
Examples:
Give instructions about how to answer questions
Scienti c experiments
How will the data be collected?
Weather stations
Paper surveys are scanned using OMR or OCR
Digital data: discrete, xed value (used by computers) Sensors read key vital signs (such as pulse/heart rate,
Analogue data/signals: continuous value that varies temperature, blood pressure, respiration, etc.)
smoothly The data from the sensors is converted into digital using
Analogue device = measure length, weight, an ADC
temperature etc. The data is stored in the computer memory
E.g. Thermometer – represents temp. by the height of The computer compares the data from the sensor with
the liquid column the values stored in its memory
Sensors: measure physical and analogue qualities The results are output on a screen in the form of graphs
Analogue data from sensors needs to be converted into and/or digital read-outs
digital data using an analogue to digital data converter An alarm is activated if any of the data is outside
(ADC) so that the computer can understand and process acceptable parameters
the data from the sensors The system continues to monitor the patient until the
If the computer sends signals to motors, valves, etc. then computer is turned o
this data also needs to be converted to analogue using a
digital to analogue converter (DAC) so that the computer
can e ectively control these devices
Advantages of Using Computers in
Measurement
Analogue to Digital Converter (ADC)
The computer will not forget to take readings
Used when you want to attach an analogue input device to The computer’s response time is much faster, which is
a digital device such as a computer. particularly important in the patient monitoring example
This is so the analogue data can be Doctors, nurses, scientists, etc. can all get on with other
understood/processed by the computer since computers tasks while the monitoring is done automatically
only work w/digital data Computer give 24 hours cover every day (i.e. 24/7)
E.g. When processing data sent from a sensor The readings will tend to be more accurate
Readings can be taken more frequently if they are done
by a computer and sensors
It could also be safer if whatever is being monitored may
Digital to Analogue Converter (DAC) have potential hazards (e.g. children falling into the river
whilst attempting to take readings)
Used when you want to attach an analogue output device
to a digital device such as a computer
E.g. If the computer is being used to control a device
(motor/valve) the device will be controlled by variable Disadvantages of Using Computers in
voltages; the DAC will be used to send out analogue
signals Measurement
Computer then decides to turn the water supply to bodies, welding bodywork, manufacturing of microchips
sprayers etc.
Windows also operated by the computer Control of robots is either through embedded
Need to nd the balance of how often to have windows microprocessors or linked to a computer system
open Programming of the robot to do a task is generally done in
Blinds that can be computer controlled two ways:
Light sensor measures light intensity The robot is programmed with a sequence of
When sun is strong the computer actuates electric instructions which allow it to carry out a series of tasks
motors which close blinds Alternatively, a human operator manually carries out
Control in glasshouse is more likely to be used in a series of tasks and how each task is done is relayed
commercial areas or large glasshouses not in gardens back to the robot (embedded processor) or controlling
computer. The sequence of instructions is
6.5. Modelling Applications remembered so that the robot can automatically carry
out each task identically each time (e.g. assembling
parts in a television)
A mathematical computer model is created to manipulate
Robots are often equipped with sensors so they can
variables and see real time changes in terms of gures.
gather important information about their surroundings
Used to nd how mechanisms control a system.
Sensors also prevent them from doing ‘stupid things’, such
Advantages:
as stopping a robot spraying a car if no car is present, or
Cheaper than building physical system to test
stopping the spraying operation if the supply of paint has
Safer than building system and experimenting
run out etc.
Easier to experiment with various scenarios
Robots are very good at repetitive tasks
Quicker as no need to build system
However, if there are many di erent tasks (e.g. making
Near-impossible tests involving space and volcanic
specialist glassware for some scienti c work) then it is
scenarios can be modelled risk-free
often better to still use human operators
What if analysis can be conducted that allow a certain
gure to be computed by letting the computer change
other variables that a ect the value needed to be set.
Advantages
E.g.
Robots can work in environments harmful to human
operators
The can work non-stop (24/7)
They are less expensive in the long term (they don’t need
wages) however they are expensive to buy initially
Productivity is higher, since they do not need holidays, are
not ill etc.
There is greater consistency – every car coming o a
production line is identical
They can do boring, repetitive tasks, leaving humans free
to do more skilled work
Disadvantages
Biometrics: Every student’s ngerprint is stored on a Customer clicks on performance they wish to see
database along with their personal information, the They enter date and time of performance and required
students must put their nger on a ngerprint scanner number of seats
to enter or leave the school premises. A seating display at theatre is then shown on screen and
user clicks where they want to sit
Advantages Disadvantages Database searched to check availability of selected seats.
Fingerprints are unique, so If seating plan shown on screen, this isn’t required
another student can’t give Collecting every student’s If seats available, seat numbers are shown together with
their attendance for ngerprint initially is time- total price
somebody else, like with an ID consuming. If customer is happy with this, they select ‘con rm’
card. The seats are now temporarily set at ‘no longer available’
Fingerprint scanners are The customer then enters their personal details or
ID cards can be lost, whereas indicates that they are a returning customer
more expensive than
ngerprints can’t be. They select a payment method and make the payment
magnetic stripe readers.
The theatre seats are then booked in the customer’s
Magnetic elds can a ect an Damages on the nger will
name
ID card. deny access.
The nal details are shown on the screen, together with a
There is an invasion of privacy reference number
Copies of ID cards can be
in storing ngerprints on a An email is sent to the customer which they print out as
made easily.
school database. their proof of purchase. In some cases, this also acts as
their printed ticket when they go to the theatre – an e
Learner performance ticket
Spreadsheets can be used to record students’ The database is updated with the transaction
performances. It is easier to compare each other’s
performances and an individual student’s
performance over the academic year.
Disadvantages
Advantages
Organising examinations No double booking as very Set-up and Maintenance
Makes sure that the students are enrolled for the right minimal delay. expensive
exams.
Immediate booking and Computer and reliable
Prints the exam timetables.
selection of seats internet access required
Allots examination rooms and the invigilator.
Gathers the results and puts them into the student Sever crashes can result in
Bookings can be made any
database. the bookings completely
time
Creating timetables and managing teaching stopping
cover/substitution Digital ticket; printing and Need for website to be well
Considers the student’s choices, availability of postage costs designed to ensure ease of
teachers and rooms, subject clashes and the number reduced/eliminated use
of hours needed for each subject to produce accurate QR codes for authentication; No special relation built with
timetables that can easily be made changes to and no need for human, can use booking agent who can give
cover with teacher to be substituted. scanner; reduced costs special promotions etc.
School management systems:
in booking seats if the response is not immediate then can
Advantages Disadvantages cause problems like double booking)
Absenteeism can be Operating the software will
addressed more easily. need some training.
The initial cost of the software Real-time Process Control
Parents are kept updated.
is expensive.
Unauthorised access will have An example of online processing
Reduced workload for Very di erent to real-time (transaction) processing
to be prevented as there is
teachers. System usually involves sensors and feedback loops
lots of personal information.
In real-time process control, physical quantities are
They are helpful for the
continually monitored and input is processed su ciently
decision making of the
quickly to in uence the input source
administration department
The use of computer technology has revolutionized how The readings are constantly compared with the pre-
we do our banking transactions, for example: set values, if the values aren’t in the prescribed range,
Internet banking the medical sta s are noti ed.
The use of automated teller machines (ATMs) Hospital management system: All the above-mentioned
Chip and PIN technology points come under the hospital management system
which holds all of them, and can be used to access data
from all the departments.
Expert systems:
Automated teller machines (ATMs) The interactive screen asks a series of question for
the doctor to answers, using a keyboard or a touch
Automated teller machines (ATMs) are places where screen.
customers can get cash (or carry out certain other The inference engine compares the symptoms with
banking activities such as order a statement) using their the knowledge base, using the rule base to nd
credit or debit card matches
The system suggests the possible illness with a
What goes on behind the
Sequence at ATM probability of each, cures and recommendations on
scenes
the next step to be taken.
Customer puts card into Contact is made with bank’s The explanation system will explain how that
ATM computer particular diagnosis was suggested.
PIN is checked to see if it is Using 3D printers in medicine:
PIN is entered using the correct Surgical and diagnostic aids: A CT or MRI is used to
keypad Card is checked to see if it is produce images of the internal parts of the body. A 3D
valid printer can then be used to reproduce the internal
A number of options are organs as a solid object.
given: change PIN, top up Prosthetics: 3D printers are used to print out arti cial
mobile, see balance, get body parts such as false tooth, arti cial limbs, hearing
money aids, etc. This is a less expensive method of replacing
The customer selects the body parts.
cash option & several cash Tissue engineering: Used to produce layers of cells to
options are shown replace damaged tissues.
Design of medical tools and equipment: Tools can be
The customer’s account is
made faster and with reduced costs. They can also be
The customer accepts one of accessed to see if they have
made changes to easily, whereas it wasn’t the same
the options or types in a su cient funds, it is checked to
with traditional methods.
di erent amount see if they are withdrawing
more than their daily limit
The customer is asked if they 6.11. Computers in Libraries
want a receipt
Many library systems are computer controlled
The card is returned Transaction is okay
They usually involve the use of barcodes on the books
Money is dispensed Customer’s account is updated being borrowed and on the borrower’s library card
The following describes a computerized library system
6.10. Computers in Medicine based on barcodes
There are two les:
Patient records: Database that holds patient details and Book le, containing elds for example: barcode, book
can be accessed from any computer within the hospital title, name of author etc.
intranet. Borrower’s le, containing elds for example:
Patient identi cation: Barcodes on wristbands of the borrower’s number, borrower’s name etc.
patients can be used to access their patient record. When a borrower takes out a book, the book’s code is
Pharmacy records: scanned
Generates labels for drugs The book details are then found on book le
Checks if the patient is allergic to a particular drug. The borrower’s library card barcode is then scanned for
Patient monitoring: the borrower’s unique number
Sensors measure changes in temperature, heart rate, The book le is linked to the borrower’s le and both les
breathing rate, brain activity, blood pressure, blood are updated to indicate which book has been borrowed
sugar levels and oxygen levels in the patient’s body. and when it is due back
The analogue signals from the sensors are converted The borrower’s le is interrogated daily by the computer
into digital signals using an analogue to digital to see which books are overdue for return:
converter. The computer reads a record from the book le
Graphs are produced to show trends over time. It compares the date due back with the current date
If the date due back is less than (or equal to) the Disadvantages
current date (i.e. earlier date) …
…using the barcode number of the book… They tend to lack common sense in some of the decision-
…the book le is linked to the borrower’s le… making processes
…and the corresponding record is read from the Errors in the knowledge base can lead to incorrect
borrower’s le decisions being made
The customer details are then found and a letter or It can be expensive to set up in the rst place
email is automatically sent out Considerable training is necessary to ensure the system
The next record in the book le is then read… is sued correctly by the operators
…until the whole le has been checked
Automatic stock control systems rely on the use of You can shop 24/7
barcodes Shop from any part of the world
Barcodes now appear on most products sold in shops You save the travelling costs of going for shopping
They allow quick identi cation of product details once the Disadvantages
barcode has been scanned by a barcode reader Quality isn’t assured
Supermarkets use electronic point of sale (EPOS) People are worried about giving their card details
terminals, which incorporate a barcode reader that scans online.
the barcode, retrieve the price of the article and relay Packing and postal charges are added
information back to the computer system allowing it to Personal services that you get from stores are
update its les missed.
Barcodes are made up of alternating dark and light lines Returning the products is harder
of varying thickness No relaxation that you get from actual shopping
A number underneath the barcode usually consists of four Bogus sites are present where you pay and never
parts: country code, manufacturer’s code, product code, receive the product
and a check digit To seller:
The check digit is a form of validation which is used to Advantages
make sure no errors occurred during the reading of the No need to pay rents
barcode No xed working hours
Every time the barcode is read, this calculation is Less/no shoplifting
performed to ensure that it has been scanned correctly Sell goods to customers anywhere in the world
Cheaper to contact customers (via e-mail)
Site warehouse where rental is cheap
Sell goods 24/7
Electronic Funds Transfer at Point of Sale (EFTPOS) Disadvantages
ICT knowledge needed to set up website
Many credit cards are equipped with a chip as well as a Unemployment
magnetic stripe – containing the PIN Business abroad is lost if the prices are cheaper
This system is designed to enhance security since it is there
better than relying only on a signature At times of network failures, there will be no
When paying for items using a chip and PIN card, a form access
of electronic funds transfer (EFT) takes place Not everybody can access the internet, so a few
customers are lost
Paying for a meal example
Customer’s personal data can be hacked
Waiter inserts card into chip and PIN reader Postal charges discourage people at times
Restaurant’s bank contact customer’s bank
Card is checked to if valid 6.14. Recognition Systems
If card is stolen or expired, then transaction is terminated
Customer enters PIN using keypad Automatic Number Plate Recognition (ANPR) systems:
PIN is read from chip on card and is compared to one just A sensor sends signals to a microprocessor, which
keyed in instructs a camera to capture the front of a vehicle.
If they are the same, the transaction can proceed OCR software is used to read the number plate from
Check is then made on whether they have enough funds the image. The characters are then converted to text
If there are not enough funds available, transaction is format in order to store it in a database
terminated. Otherwise, transaction is authorized Processing of cheques:
Authorization code is sent to restaurant The value of a cheque is printed in special ink
Price of meal is deducted from customer’s account containing iron particles when a cheque is presented.
Same amount of money is credited to restaurant’s bank MICR is used to read the characters at the bottom of
account the cheque.
Receipt is produced as proof of purchase A batch processing method is then used to process all
the cheques at the end of a speci c time period.
OMR media in schools:
School registers: Paper-based registers are fed into
Internet Shopping
OMR to be scanned and are then stored on a
database.
Online shopping: Shopping over the internet.
Multiple-choice examination papers: The position of a
To customer:
mark is stored in a computer’s memory after being
Advantages
read by the OMR device using a template that maps
Cheaper goods (the company doesn’t have to pay
out the X-Y coordinates of each lozenge (pen/pencil
rent for stores and doesn’t need more employees)
mark).
Wide range of products
RFID in passports:
Delivery at your doorstep
The data on the RFID chip is read when the passport is Car park management: the system reads the
scanned. registration number and if allowed into the car park,
A photo of you is clicked which is then compared with the barrier is raised.
the image stored in the RFID chip. Electronic toll collection: the system recognizes the
If the face-recognition passes, some checks are made vehicle and deducts the fare accordingly.
in turn to make sure you are eligible to enter the
country, and if you are, the gate opens automatically.
RFID in contactless payments:
The embedded chip on credit/debit cards and the Cookies
antenna enable customers to wave their card over a
reader at the point of sale terminals to make Cookies are small les sent to a user’s computer via their
payments web browser when they visit certain websites
Smartphone apps can also be used to make They store information about the users and this data is
contactless payments. accessed each time they visit the website
For example:
They remember who the user is and send messages
6.15. Monitoring & Tracking Systems such as “Welcome Sarah” each time they log onto the
website
Public monitoring/tracking: They recognize the user’s buying preferences e.g. if a
Ankle monitor: uses RFID chip to give out the person’s user buys CDs, pop ups related to their buying habits
location and other details. It is tamper proof and will will appear on the user’s screen each time they visit
alert authorities if tried to remove. the website
Phone call tracking: the service provider tracks the Without cookies, web server would have no way of
calls and the exact position from which they were knowing that the user had visited website before
made For this reason, cookies could be used to monitor one’s
Worker monitoring/tracking: Workers are internet activity
monitored/tracked in the following ways:
Supermarket workers: have the number of items
passing through the tills over a period of time
6.16. Satellite Systems
monitored.
Internet use is monitored by network managers: they Global Positioning Systems (GPS)
can check sites visited and time spent on that site
during working hours. Used to determine the exact location of several modes of
Emails can be read: Employers can check that no transport
personal mails are sent during o ce hours. Cars usually refer to GPS as satellite navigation systems
Delivery drivers: Their location can be tracked using Satellites surrounding the Earth transmit signals to the
GPS systems. It can also be checked if they are surface
following the shortest route and aren’t speeding. Computers installed in the mode of transport receive and
Key logging: Software that records the keys pressed by a interpret these signals
user on the keyboard. They are used to nd username Knowing their position on the Earth depends on very
and passwords of a user. accurate timing – atomic clocks are used in the satellites
Employee call monitors: Allows the employer to listen to which are accurate to within a fraction of a second per
employee’s telephone calls. There are three ways it can day
be used: Each satellite transmits data indicating its position & time
Monitor: The manager/supervisor can listen to calls The computer on board the mode of transport calculates
without the employee or the customer’s awareness. its exact position based on the information from at least
Whisper: The manager can help the employee with the three satellites
call, but the customer can’t hear the manager speak.
Barge: Both the employee and the customer can hear
the manager
Satellite Navigation
Employee call monitors: Allows the employer to listen to
employee’s telephone calls. Call monitors can be used:
Used to determine the exact location of a car.
to improve the employee’s performance
The computers onboard can be used to show
to allow the manager/supervisor to join a call where
directions to a destination.
necessary
as a training tool
Uses of Automatic Number Plate Recognition (ANPR)
systems: Geographic Information Systems (GIS)
Tra c enforcement: the system can check if a vehicle
is taxed, recognize cars parked illegally, cars speeding Used to capture, manage, analyse and display
or going through red lights so a ne can be imposed. geographically referenced information.
Use to determine distance between two places. 4 Common Methods of Fact Finding
Used to nd the nearest petrol station or restaurant,
etc. Observation
To protect animal and plant life in certain vulnerable
places. Involves watching personnel using the existing system to
Can be used in geography, science or engineering nd out exactly how it works
lessons. Advantages
The analyst obtains reliable data
It is possible to see exactly what us being done
It is a relatively inexpensive method
Media Communication Systems Disadvantages
People are generally uncomfortable being watched
Using satellite signals for communication. and may work in a di erent way
Used by media companies when sending If workers perform tasks that violate standard
stories/videos/pictures from remote locations. procedures, they may not do this while being watched
Questionnaires
Advantages
It allows information to be obtained which was not
possible by any of the other methods
The analyst can see for themselves how the paper Character/type Check: Checks that the input data does not
system operates contain invalid characters
It allows the analyst to get some idea of the scale of E.g. A person’s name should not contain any numbers,
the problem, memory size requirements, type of but a person’s height should only contain digits
input/output devices needed Format/picture Check: Checks that data is in a speci c
Disadvantages format
It can be very time consuming E.g. Date should be in the form dd/mm/yyyy
Because of the analyst’s time, it is a relatively Limit Check: Similar to range check except that only one of
expensive method the limits (boundaries) is checked
E.g. Input data must be > 10
7.3. Design Presence Check: Checks if data is actually present and
has not been missed out
E.g. In an electronic form, a person’s telephone
Once the analysis has taken place and the systems
number may be a required eld and if no data is
analyst has some idea of the scale of the problem and
present this should give rise to an error message
what needs to be done, the next stage is to design the key
Consistency Check: Checks if elds correspond (tie up)
parts of the recommended system
with each other
A list of tasks is summarized here
E.g. If ‘Mr’ has been typed into a eld called title then
Designing data capture forms/input forms
the gender eld must contain either ‘M’ or ‘Male
Designing screen layouts
Check Digit: Look at an extra digit which is calculated from
Designing output forms and reports
the digits of a number and then put on the end of the
Producing systems owcharts and/or pseudo code
number
Selecting and designing validation rules that need to
E.g. Check digits can identify three types of error:
be used
If two digits have been inverted during input
Selecting the most appropriate data veri cation
An incorrect digit entered twice
methods
A digit missed out altogether
Designing and agreeing the le structures and tables
Selecting and designing the hardware requirements
Selecting and designing the software requirements 7.4. Development & Testing
Producing algorithms or program owcharts
Designing a testing strategy/plan Once the design stage is completed, it is then necessary
to create the system and fully test it
This section considers some of the development stages
and testing strategies which are often adopted by system
Veri cation analysts
How these are used to interface with the nal system now chosen for a particular application
needs to be identi ed, for example how the screens will
be used to collect the data and the way the output will be
presented
If specialist hardware is needed (e.g. for people with
disabilities), then it will be necessary to nalize how these
devices are used with the system when it is implemented
This will be followed by thorough testing to ensure the
user screens are user friendly and that the correct output
is associated with the inputs to the system
Testing of each module needs to be done to ensure each The old system is stopped overnight and the new system
one functions correctly on its own introduced immediately
Once the development of each module is completed, the Advantages
whole system needs to be tested (i.e. all modules The bene ts are immediate
functioning together) Costs are reduced - since only one system is used
Even though each individual module may work there is no need to pay for two sets of sta
satisfactorily, when they are all put together there may be There is less likelihood of a malfunction since the new
data clashes, incompatibility and memory issues system will have been fully tested
All of this may lead to a need to improve the input and Disadvantage
output methods, le and database structures, validation This method can be disastrous if the new system fails
and veri cation methods
Parallel Running
Then the system will need to be fully tested again
It is a very time-consuming process but the system must The old and new systems are run side by side for a time
be as perfect as possible before it goes live before the new system takes over altogether
Testing will use many di erent types of data, which will Advantages
fall into one of three categories: normal, extreme or If the new system fails, the old system is still available
abnormal as a back-up
Let us suppose one of the elds in a database is the date It is possible to train sta gradually
and this must be in the form dd/mm/yyyy, where each Sta have time to get used to the new system
element of the date must be numeric: Disadvantage
Normal: this is data which is acceptable/valid and has It is more expensive than direct changeover, since
an expected (known) outcome, e.g. the month can be extra sta are needed to run both systems together
any whole number in the range 1 to 12
Extreme: this is data at the limits of Pilot Implementation
acceptability/validity, e.g. the month can be either of
the two end values i.e. 1 or 12 The new system is introduced into one part of the
Abnormal: this is data outside the limits of company (e.g. into a warehouse of a supermarket) and its
acceptability/validity and should be rejected or cause performance assessed
an error message Advantages
For example, all the following values are not allowed If the new system fails, only one part of the company is
as inputs for the month: a ected
Negative numbers (e.g. -1, -15) It is possible to train sta in one area only, which is
Any value greater than 12 (e.g. 32, 45) much faster and less costly than parallel running
Letters or other non-numeric data (e.g. July) The costs are also less than parallel running, since
Non-integer values (e.g. 3.5, 10.75) only one part of the system is being used in the pilot
Disadvantage
It is more expensive than direct changeover, since
7.5. Implementation each pilot scheme needs to be evaluated before the
next stage is introduced
Once the system is fully tested, the next stage is to fully
implement it Phased Implementation
We will now consider changeover to the new system in
more depth Initially, only part of the new system is introduced
There are four common methods used for changing over Only when it proves to work satisfactorily is the next part
from the old system to the new system introduced, and so on, until old system is fully replaced
Each one has advantages and disadvantages which need Advantages
to be weighed up before the most appropriate method is
If the latest part fails, it is only necessary to go back in User documentation is designed to help users to learn
the system to the point of failure, hence failure is not how to use the software or system
disastrous This can consist of any of the following:
It is possible to ensure the system works properly the purpose of the system/program/software package
before expanding how to log in/log out
Disadvantages how to load/run the software
This is more expensive than direct changeover, since how to save les
it is necessary to evaluate each phase before moving how to do a search
to the next stage how to sort data
how to do printouts
how to add, delete or amend records
screen layouts (input)
Comparing Changeover Methods print layouts (output)
hardware requirements
Changeover method Direct Parallel Pilot Phased software requirements
Relative costs Low High Medium Medium sample runs (with test data and results)
Input needed by the user Medium High Low Medium error handling/meaning of errors
Input needed by systems troubleshooting guide/help lines/FAQs
Low* Low Medium Medium tutorials
team
Impact of failure High Low Low Medium
7.7. Evaluation
7.6. Documentation Once a system is up and running it is necessary to do
some evaluation and carry out any maintenance, if
Once the new system is fully developed, a considerable necessary.
amount of documentation needs to be produced This is done to ensure the e ciency of the system, the
For the end user ease of use of the system, and the appropriateness of the
For people who may need to modify or develop the system.
system further at some later stage The following is a list of some of the things considered
There is some overlap between the two types of when evaluating how well the new system has worked.
documentation, but the basic requirements are shown This can ultimately lead back to a re-design of part of the
below system if there is strong evidence to suggest that changes
need be made.
To evaluate the system, the analyst will:
compare the nal solution with the original
Technical Documentation
requirement
identify any limitations in the system
Technical documentation is designed to help
identify any necessary improvements that need to be
programmers & analysts who need to make
made
improvements or repair/maintain to the system
evaluate the user’s responses to using the new system
This can consist of any of the following:
compare test results from the new system with results
purpose of the system/program/software
from the old system
program listing/coding
compare the performance of the new system with the
programming language used
performance of the old system
owchart/algorithm
observe users performing set tasks, comparing old
input formats
with new
hardware requirements
measure the time taken to complete tasks, comparing
software requirements
old with new
minimum memory requirements
interview users to gather responses about how well
known bugs in the system
the new system works
list of variables used (and their meaning/description)
give out questionnaires to gather responses about the
le structures
ease of use of the new system
sample runs (with test data and results)
Some results from the evaluation may require changes to
output formats
either hardware or software. Hardware may need to be
validation rules
updated because:
meaning of error messages
of feedback from end users
new hardware comes on the market, making change
necessary
User Documentation there are changes within the company which require
new devices to be added or updated
Software may need to be updated because: If personal data is leaked (data breach), the following can
of feedback from end users occur:
changes to the company structure or how the Identity theft
company works may need modi cations to the Bank fraud
software Damages to personal property
changes in legislation may need modi cations to the Kidnapping (if kidnappers get access to the victim’s
software address.
Etc.
8.1. Physical Safety unintentionally. Electronic data is at risk due to: hacking,
viruses, spyware, phishing, pharming, Smishing, vishing,
ransomware (A malicious program that encrypts data on
Ways of eliminating or minimizing a computer system and demands for a ransom to provide
Safety hazard
hazard and decrypt the data), spam, moderated and un-
Use a residual circuit breaker moderated forums, cookies, etc.
(RCB), Check insulation on wires If a student shares a photograph of themselves in their
Electrocution from
regularly, Do not allow drinks near school uniform on social media, then paedophiles, child
spilling drinks
computers, Check equipment predators, kidnappers, etc. can physically reach the
regularly student. This should not be done
Cable ducts- make wires safe,
Tripping over trailing
Cover wires/tuck them away, Use
wires
wireless connections
Internet Safety
Strong desk/tables to support
heavy hardware, Use large desks
Heavy equipment falling To keep personal data safe, one must:
and tables so that hardware
Not give unknown people (on the internet) personal
doesn’t fall o edge
information or send pictures of oneself to them.
Have a CO2 re extinguisher Maintain privacy settings to control which cookies are
nearby, Don’t cover equipment on their computer
Fire risk from
vents- can cause equipment to Use learner friendly search engines and websites
overloading sockets or
overheat, Make sure hardware is recommended by your educational institution, e.g.
equipment overheating
fully maintained, Do not overload znotes.org
sockets with too many items The website being accessed is from a trusted source,
or has a padlock symbol/ https protocol (s for secure):
8.2. E-Safety
E-safety refers to the safety of data and personal
information while using the internet.
E-safety is required to make sure a user’s personal
information is not made vulnerable and even leaked to
hacker’s for e.g., which can lead to identity fraud, bank A/C
issues, etc.
Personal Data
Preventing Phishing, Pharming & Smishing Spam is electronic junk mail and is a type of advertising
from a company sent out to a target mailing list
User education Harmless but can clog up networks and slow them down
Set up anti-malware and anti-spyware software It is more of a nuisance than a security risk
Enabling protocols such as SPF and DKIM Many ISPs are good at ltering out spam, and prevent the
Do not download random .exe (executable le formats), user from getting these spam emails.
.php, .bat, .com etc. It is often necessary to put a legitimate email address into
Users should be alert and look out for clues when being a contact list to ensure wanted emails are not ltered out
redirected to other websites. by mistake
Therefore, technology enables unauthorised users to gain
access to otherwise inaccessible information. Encryption
If a person on the internet is asking for personal
information, or to meet in real life or acting suspicious, The conversion of data to code by encoding it
9. Audience
Potential Problems
9.1. Audience Appreciation If products are not built towards a speci c audience well
then problems may arise
Knowing Your Audience An older audience may not be able to understand or read
text due to poor font design
When designing ICT solutions, you must consider A younger audience may not be able to understand
audience certain text due to complex wording & structure
There are 4 main characteristics of an audience Several audiences may just not nd content interesting
Age: since it is not relevant enough to them
Can a ect audience’s interests in your product Several audiences may not nd content attractive enough
Large fonts and colours attract children and thus not purchase or use it at all
More stylish and trendy layout attracts young adults Younger & older audience may not understand how to use
Gender the product due to lack of simple instruction
Design product for a speci c gender
Younger girls are often attracted to pink
Males generally prefer blue spectrum 9.2. Legal, Moral, Ethical & Cultural
Income Appreciation
Knowing this will help in attractive pricing strategies
Promoting certain products are targeted for people
Copyright Legislation
within a speci c range of incomes
Interests A law that protects books, music art and other media that
Can help with advertising content are written is copyright law
Content that meets the exact description of audience’s It is an automatic right and does not need applying for
interest is more likely to attract them to your product
The person who owns the rights must be asked before
it can be used again
Software is a speci c thing created and written on a
Audience Needs computer
Needs to be protected as it is so easy for people to
After nding out about your targeted audience you need copy
to aim to meet those demands This is a way of protecting software from being used
Developers of the ICT product must ensure that they meet without permission
as many of these needs as possible Users create a license which determines the terms
Common Needs for Common Audiences: and conditions
Audience Needs
Bright/cheerful colours Copyright Laws
Animations/sounds/pictures
Less text It is not legal to make a copy of software, then sell it or
Young children Simple wording give it away to other people
Software cannot be used on a network unless a network
Large text
license has been acquired
Games/activities Not legal to use coding from software in your own
Easy to use software without permission
Attractive/stylish colours Renting out software without permission is illegal
Interesting content It is illegal to use the name of copyrighted software
Teens & adults Balance of pictures and text without permission
Clear fonts
Bullet points
Contrasting/easy-to-read colours Software Protection
Include clear instructions
Installed software will require a unique reference number
Use slightly larger font sizes User will have to accept license agreement
Seniors
Fewer technical terms Holograms are used to indicate software is original
Consistent design Software may only run if CD-ROM or DVD-ROM is actually
Easy to use in the drive
Some software will only run if a memory stick is plugged Copyright laws apply to text in emails. Forwarding a block
in USB ports of text or an image without the copyright owner’s
permission, it would be illegal.
HyperText Transfer Protocol (HTTP): A protocol that is These sites focus on building online communities of users
followed between the sending and receiving devices when who share the same interests
data is being transferred using the internet. Enable people to share photos of themselves, their
HyperText Transfer Protocol secure variant (HTTPS): favourite music and videos, what they like to do, what they
HTTP that is followed when data being transferred is like to eat etc.
encrypted.** Example: Facebook
Hyperlink: Data that redirects the user to another These are becoming the modern way of interacting
webpage/section of same webpage/ le when clicked. socially
File Transfer Protocol(FTP): Used to upload website les to They allow people to communicate across the world and
the web hosting space. To upload these les successfully, share their interests and views with many people.
the user needs:
An FTP client 10.3. Information on the Internet
Login details to the web hosting server (host and port
used, username and password for FTP.
Information is more likely to be up to date than in books,
since websites can be updated very quickly
Much easier to get information from websites- search
Cloud storage: engines link key words together and nd information that
matches the criteria- cause for popularity
The storage of data (remotely) on the internet. Vast amount of information on the internet- easier to
This data is accessible by the user with the requirement of locate than using indices in books
an appropriate authentication technique (e.g. user ID and Information on the internet however may be relevant or
password). correct, not reliable, inaccurate or even biased- it does
not go through any checking process
Information overload can make it di cult for the user to
nd relevant information
Search Engine: Ensure use of reliable websites that properly cite all their
sources
A search Engine is used to nd information on the internet Always look for primary sources of information & form
without knowing the (Uniform Resource Locator) of the own conclusions
webpage holding the information. Do not quote/use secondary often biased opinions or
gossip
Do your research
Blog
11. File Management
Personal internet journals where the writer posts their
observations on a topic
No training is needed to do this 11.1. Manage Files E ectively
Blogs range from minor projects (e.g. people gossiping
about a topic) to important subjects such as politics or Extension
Full form Used for/in:
advertising products name
Comments are not immune from the law Stylesheets in
Bloggers can be prosecuted for o ensive comments css Cascading Stylesheet
webpages
Comma Separated
csv Store tabular data
Value
Wiki gif
Graphics Interchange
Moving images
Format
Software allowing users to easily create and edit web Hypertext Mark-up
pages without using any web browser htm Webpages
(Language)
A wiki will support hyperlinks and has a very simple syntax Joint Photographic
(language rules) for creating pages jpg Standard for images
Experts Group
Wikis are described as ‘web pages with an edit button’
Documents to be
Anyone can use wikis- content should be treated with Portable Document
pdf circulated over the
caution Format
internet/email
Example of a wiki: Wikipedia
Portable Network
png Compressed images
Graphic
Word processed
Social Networking rtf Rich Text Format
documents
txt Text (File) Simple Text les
14. Styles
several tables grouped together to from a link, thus
preventing unnecessary repetition of data.
Primary key: The key eld of a table which is unique and
Several organisations use a ‘corporate house style or identi es each record
corporate branding, which is used to print on websites, Foreign key: The eld linked to the primary eld of the
visiting cards, letters, etc. It refers to a speci c style of table linked to through a relationship
fonts and formats used in the making of ICT solutions by
organisations. Relational database Flat- le database
A corporate house style when used e ectively identi es Complex queries can be
Poor at complex queries
the users of the style. carried out
Consistent styles enable users to associate a particular Better security Poor at limiting access
organisation with a style and also show consistency in the Harder to update, so
ICT solutions created by the organisation Cater for future requirements
inherently ine cient
Data is only stored once Potential duplication
15. Proo ng Require more planning Easy to design
Non-unique records
plan must be justi ed to be apt for the model. E.g. all the name.
mathematical operations must be tested in a model that Nested formulae/function: A formula/function used
relies on calculations. inside a formula/function as an argument
De nitions:
Testing: Checking if the designed model delivers the
18.2. Test the Data Model
expected outcome when tested with data.
Test data: The input data used for testing model.
A model prepared needs to be tested before being used
Expected outcome: The output a model is supposed to
to ensure that all results computed are accurate. The test
give with the test data.
plan must be justi ed to be apt for the model. E.g. all the
Actual outcome: The output a model actually gives the
mathematical operations must be tested in a model that
user when the test data is input.
relies on calculations.
De nitions:
18. Data Analysis Testing: Checking if the designed model delivers the
expected outcome when tested with data.
Test data: The input data used for testing model.
18.1. Create a Data Model Expected outcome: The output a model is supposed to
give with the test data.
Charts: A graphical representation of (usually tabulated) Actual outcome: The output a model actually gives the
data user when the test data is input.
Accurate data ensures the results obtained by the
processing of data is relevant, which is essential to the
usability of the model 19. Website Authoring
Formulae are mathematical operators de ned by the user
to perform a function, whereas functions are prede ned
19.1. Web Development Layers
logical and mathematical operations a user can use in a
spreadsheet
Content/Structure layer: Holds the content of the
Mathematical operations are performed in the order
webpage structure.
PEMDAS (Parenthesis [Brackets] Exponents Multiplication Presentation layer: The layer responsible for the
Division Addition Subtraction). Brackets are used to formatting of a webpage(s) or elements (using a
notate data used by a function, e.g. =SUM (A2:A10). stylesheet).
Relative cell referencing is made when the cell reference Behaviour layer: scripting language of a web page or an
is supposed to change when the cell it is referred to in is individual element
changing. It aids more e cient designing of models.
Absolute cell referencing is made when the cell
referenced stays constant when the cell it is referred to in 19.2. Create a Webpage
is changing. This aids the preparation of a model when a
set of data is constantly being referred to throughout the Tables make the basic structure of a webpage and
model. Cell reference or relative cell reference describes organise page layout.
how far away a cell or group of cells is from some other Anchor: An element in a webpage that creates a hyperlink
cell in the same spreadsheet. Basically, the cell’s address between a source anchor and a destination anchor. These
A model prepared needs to be tested before being used can be used to link 2 resources together.
to ensure that all results computed are accurate. Relative le paths are used for attached stylesheets as
De nitions: the stylesheet is going to be stored on a server in the
Cells: A space for data to be entered a table; a box same directory as the webpage, and not where it an
formed by the intersection of columns and rows absolute le path says.
Rows: Horizontal boxes that divide the table in De nitions:
segments Relative le path: A path referring to a le in the same
Columns: Vertical boxes that divide the table in directory relative to the page the reference is made in.
segments Absolute le path: The full path of a le, which is not
Sheets: A table of data relative to anything, whereas relative links only point
Tabs: A module of a database program that holds the to a le or a le path, the browser then redirects the
tables on the computer, user to that location on the current site.
Pages: Full pieces of papers that contain information Absolute paths always include the domain name of
held on one sheet of paper. the website
Ranges: A group of cells in a table These should not be used to refer to locally saved
Named cell: A cell in a table that is given a name (like webpages as the computer the webpage is stored
‘pro t margin’) and can be referred to using that on (the server) is not the same as where the
name. webpage was developed and thus an absolute le
Named range A group of cells in a table that are given path would point to the wrong address.
a name (like ‘Pricing’) and can be referred to using that
19.3. Use stylesheets To upload and publish content on a website using FTP, a
user must have:
FTP client software
CSS (cascading stylesheet) is a text-based language which
All les in one folder
is attached to webpages to set their format. CSS les have
Host Name/URL/IP address for ftp
a “.css” extension
Host port to be used for upload
These should be attached using relative le paths as they
Username and password
are stored along with the webpage and thus can be linked
The test plan used to test a webpage must be justi ed
relative to them.
based on the elements being tested. E.g. If hyperlinks are
Internal CSS have more preference over Inline CSS
being tested, it makes to check if all the hyperlinks are
If several external stylesheets are attached to one web
redirecting the user to the correct webpage/ section of
page, the stylesheet attached last (at the bottom of that
webpage.
part of the code) is given preference over the other
attached ones).
CAIE IGCSE
ICT (0417)