0% found this document useful (0 votes)
15 views45 pages

Year 10 ICT Integrated E Note

The document outlines a Year 10 ICT scheme of work for the first term, detailing weekly topics including computer components, input/output devices, storage media, and networking. Each week has specific lesson objectives and content, focusing on hardware and software components, their functions, and differences. The curriculum culminates in a mid-term examination and revision sessions before final exams.

Uploaded by

adewalezoey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views45 pages

Year 10 ICT Integrated E Note

The document outlines a Year 10 ICT scheme of work for the first term, detailing weekly topics including computer components, input/output devices, storage media, and networking. Each week has specific lesson objectives and content, focusing on hardware and software components, their functions, and differences. The curriculum culminates in a mid-term examination and revision sessions before final exams.

Uploaded by

adewalezoey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

SUBJECT: ICT CLASS: YEAR 10 BRITISH

DATE: SEPT 16TH, 2023


SCHEME OF WORK

WEEKS TOPICS

1 Types and Components of a computer system

2 Input and output devices

3 Storage devices and media

4 Networks and Effects of using them

5 Mid-Term Examination

6 Network issues and communication

7 Mid-Term Break

8 Document production 1

9 Document Production II

10 DOCUMENT PRODUCTION III

11 DOCUMENT PRODUCTION IV

12 Revision

13 Examination

DESCRIPTION
TERM: FIRST TERM
WEEK: 1
TOPIC: Types and Components of a computer system
LESSON OBJECTIVES: At the end of the study, students will be able to;
● Identify the main components of a general-purpose computer: central processing
unit, main/internal memory (including ROM and RAM), input devices, output
devices and secondary/backing storage
● Identify operating systems, including those which contain a graphical user
interface, a command line interface
CONTENT

Types and Components of a computer system


Hardware
● Hardware refers to the physical components of a computer system
● These components can be internal or external

Internal Components
● Central Processing Unit (CPU): the computer's "brain" that performs calculations,
processes instructions, and controls other components
● Processor: a chip inside the CPU that carries out instructions from a program
● Motherboard: the main circuit board that connects all internal components

Internal Memory
● Random Access Memory (RAM): temporary storage for running programs and
data; it is volatile, meaning data is lost when the computer is turned off
● Read-Only Memory (ROM): permanent storage for essential data, like the
computer's BIOS; it is non-volatile, meaning data is retained even when the
computer is turned off

Hardware Components
● Graphics card: processes images and videos for display on a monitor
● Sound card: processes audio for output through speakers or headphones
● Network Interface Card (NIC): enables connection to a network, such as the
internet
● Camera: captures images or video for input into the computer
● Internal/external storage devices: stores data permanently, such as hard drives
or USB flash drives
● Input devices: allow users to enter data, like keyboards and mice
● Output devices: display or produce results, like monitors and printers

Software
● Software refers to programs that control the operation of a computer or the
processing of electronic data

Application Software
● Application software provides the services that users require to solve a task
● E.g.:
○ Word processing: creating and editing text documents
○ Spreadsheet: organising and analysing data in a grid format
○ Database management systems: storing, retrieving and managing data in
databases
○ Control/measurement: uses sensors to measure and control a system
○ Applets and apps: specialised software for specific tasks
○ Video editing: creating and modifying video files
○ Graphics editing: creating and modifying images
○ Audio editing: creating and modifying sound files
○ Computer Aided Design (CAD): designing and modelling objects in 2D or
3D

System Software
● System software provides the services that the computer requires to operate e.g.
○ Compilers: translating high-level programming languages into machine
code
○ Linkers: combining object files into a single executable program
○ Device drivers: controlling hardware components and peripherals
○ Operating systems: managing the computer's resources and providing a
user interface
○ Utilities: tools for maintaining and optimising the computer's performance

Analogue & Digital Data


● Analogue data is continuous and varies smoothly over time
● Digital data is discrete and represented in binary form (0s and 1s)

Differences between Analogue & Digital Data


● Analogue data can have any value within a range, while digital data has a limited
set of values
● Digital data is less prone to noise and distortion compared to analogue data
● Digital data can be easily manipulated, stored, and transmitted by computers

Converting Analogue to Digital Data


● Analogue data must be converted to digital data so it can be processed by a
computer
● This process is called analogue-to-digital conversion (ADC) and is performed by
an analogue-to-digital converter

Converting Digital to Analogue Data


● Digital data must be converted to analogue data so it can be used to control
devices
● This process is called digital-to-analogue conversion (DAC) and is performed by
a digital-to-analogue converter

Central Processing Unit (CPU)


● The Central Processing Unit (CPU) is the computer's "brain" responsible for
processing instructions entered into the computer
● The CPU processes instructions and performs calculations in order to produce
an output

CPU Functions
● Fetches instructions from memory
● Decodes the instructions to determine the required operation
● Executes the operation
● Stores the result back in memory or sends it to an output device

CPU Components
● The CPU is made up of 3 main components:
○ Arithmetic Logic Unit (ALU)
○ Control Unit (CU)
○ Registers

Memory
Memory is used to store data and instructions temporarily for the computer to process

Characteristics of ROM and RAM

ROM RAM

Non-volatile (retains data when Volatile (loses data when


Volatility
powered off) powered off)

Read-only (data cannot be Read-write (data can be


Access
modified) modified)

Stores essential instructions (e.g. Stores data and instructions in


Main Purpose
BIOS) use by CPU
Differences between ROM and RAM
● ROM is non-volatile, while RAM is volatile
● ROM is read-only, while RAM is read-write
● ROM stores essential instructions, while RAM stores data and instructions
currently in use

Evaluation:

1. List 7 differences between the RAM and a ROM


2. Explain the following with four examples each:

Input, output, processing , and storage devices.


DESCRIPTION
TERM: FIRST TERM
WEEK: 2
TOPIC: Input and output devices
LESSON OBJECTIVES: At the end of the study, students will be able to;

CONTENT

Input Devices
Characteristics of Input Devices
● Input devices: allow users to enter data or instructions into a computer system
e.g.:
○ Keyboard
○ Mouse
○ Scanner
○ Microphone
○ Touch screen

Differences between Input & Output Devices


● Input devices send data or instructions to the computer, while output devices
receive data from the computer
● Input devices are used for user interaction and data entry, while output devices
display or produce the results of data processing

Input Device Use Advantages Disadvantages


Fast and The steeper
Keyboard & Entering text and accurate input for learning curve,
Numeric Keypad numbers experienced repetitive strain
users injury

Navigate and interact Requires flat


Intuitive and
Pointing Devices with computer surface, the strain
precise control
interfaces on the wrist

Convenient, no
Control devices from
direct physical Limited range, may
Remote Control a distance, e.g., TVs
contact is require line-of-sight
and media players
needed

Enhances
Expensive, limited
Joystick/Driving Simulation and gameplay
use outside of
Wheel driving games experience,
gaming, bulky
realistic control

Direct interaction with Intuitive, no need The screen may get


Touch Screen the screen using for a separate dirty, less precise
fingers or a stylus pointing device than a mouse

Accurate
Capture images and Quality depends on
Scanners and reproduction,
convert them into resolution, which
Cameras easy to share
digital format can be expensive
and store

Capture a sound for


Hands-free input May pick up
recording or
Microphone can be used for background noise,
communication
voice recognition the quality varies
purposes
Sensors detect
Can automate
changes in the May require
Sensors and tasks, provides
environment; light calibration, affected
Light Pen real-time
pen interacts with by the environment
information
screens

Exam Tip
● Note that a mouse isn't built into a laptop - instead, it would be another pointing
device e.g. trackpad
● All the devices listed here are input devices. Some people think microphones and
webcams are output devices
Direct Data Entry

Direct Data Use Advantages Disadvantages


Entry Device

Reading information
Data can be easily
Magnetic stored on magnetic Fast, simple to use,
erased, and limited
Stripe Reader stripes, e.g., credit reliable
storage capacity
cards, ID cards

Chip and PIN Processing debit and Secure, quick Requires PIN input,
Reader credit card transactions transaction, reduced potential for
in stores fraud risk skimming

Reading information No line-of-sight is


The expensive
from RFID tags, e.g., needed, multiple
RFID Reader system, and potential
inventory tracking, tags are read
privacy concerns
access control simultaneously

OMR (Optical Reading marked areas Fast processing, Limited to specific


Mark on forms, e.g., reduced human forms, cannot read
Recognition) multiple-choice exams error handwriting
The fast and
OCR (Optical Converting printed text Can struggle with
accurate,
Character into digital text, e.g., complex layouts, font
searchable digital
Recognition) digitising books dependent
text

Scanning barcodes to Requires


Barcode Fast and accurate,
retrieve product line-of-sight, limited
Reader low cost
information and prices data storage

Requires a
Scanning QR codes for
Can store more smartphone or
QR Scanner information retrieval or
data, versatile uses specific scanner,
linking to websites
quality dependent

Output Devices
Characteristics of Output Devices
● Output devices: display or produce the results of data processing from a
computer system e.g.:
○ Monitor
○ Printer
○ Speakers
○ Projector

Differences between Input & Output Devices


● Input devices send data or instructions to the computer, while output devices
receive data from the computer
● Input devices are used for user interaction and data entry, while output devices
display or produce the results of data processing

Output
Use Advantages Disadvantages
Device
Displaying
Real-time display, Power consumption,
Monitor computer-generated visual
adjustable settings potential glare
information on a screen

Touch Displaying visual information Susceptible to


Intuitive,
Screen and allowing user interaction smudges, potential
space-saving
(Output) with the screen calibration issues

Projecting
Multimedi Requires darkened
computer-generated images Large display, good
a room, expensive
and videos onto a larger for presentations
Projector bulbs
surface

Fast, high-quality Expensive initial


Laser Printing high-quality text and
prints, lower cost cost, limited to flat
Printer graphics quickly
per page surfaces

Slower, higher cost


Inkjet Printing text and graphics Lower initial cost,
per page, ink may
Printer using liquid ink high-quality prints
smudge

Printing text and simple


Dot Matrix graphics using a print head Low cost, can print Noisy, low print
Printer that strikes an ink-soaked multi-part forms quality
ribbon

Creating large-format
High accuracy, can
graphics, such as Slow, expensive,
Plotter print on various
architectural plans and large size
materials
engineering designs

Creating three-dimensional Customisable


Limited materials,
3D Printer objects by adding material designs, rapid
slow process
layer by layer prototyping
Range of sizes and Can be
Converting digital audio
Speaker power outputs, power-hungry, the
signals into sound
immersive audio sound quality varies

Converting electrical signals Requires power,


Precise movement,
Actuator into physical movement, e.g., potential
programmable
motors and valves in robotics mechanical wear

Evaluation
Differences between Input & Output Devices
What is direct data entry?
DESCRIPTION
TERM: FIRST TERM
WEEK: 3
TOPIC: Storage devices and media
LESSON OBJECTIVES: At the end of the study, students will be able to;

CONTENT

Storage
Characteristics of Backing Storage
● Backing storage: long-term storage used to store data, files, and programs when
not in use e.g.:
○ hard disk drives (HDD)
○ solid-state drives (SSD)
○ USB flash drives
○ optical discs (CDs, DVDs)
● Backing storage is typically slower than internal memory but has a larger
capacity
● It is non-volatile, meaning it retains data when the computer is powered off

Differences between Backing Storage & Internal Memory

Backing Storage Internal Memory

Long-term storage of files, Temporary storage of data and essential


Function
programs, and data instructions while the computer is running

HDD, SSD, USB flash


Examples drives, optical discs (CDs, RAM, ROM
DVDs)
Access
Slower Faster
Speed

Capacity Larger Smaller

Non-volatile (retains data


Volatility RAM: volatile, ROM: non-volatile
when powered off)

Storage Media

Storage
Examples Use Advantages Disadvantages
Media

Slower access time,


Hard disks, Long-term data High
Magneti moving parts,
storage, backup, capacity, low
c Drives susceptible to
Magnetic tape and archiving cost per GB
magnets

Data storage, audio, Portable, Limited capacity,


Optical CD, DVD,
video, and software durable, low susceptible to
Discs Blu-ray
distribution cost scratches

Memory
cards (SD,
Fast data storage
Solid-St xD, Fast access More expensive,
for portable devices
ate time, no limited write cycles
and modern
Media CFast), USB moving parts
computers
Drives, Solid
State Drives

Evaluation
Differences between Backing Storage & Internal Memory
TERM: FIRST TERM
WEEK: 4 $ 5
TOPIC: Types and Components of a computer system
LESSON OBJECTIVES: At the end of the study, students will be able to;

CONTENT

Common Network Devices


Network Interface Cards (NICs)
● Network Interface Cards (NIC) allow an electronic device to be connected to a
network
● Network Interface Cards are connected to the motherboard but in most modern
systems are usually integrated
● Each network interface card has a unique identifier which is known as a media
access control address or MAC address which is created during the
manufacturing process
● Wireless Network Interface Cards (WNIC) are the same as a NIC but use
wireless connectivity to connect devices to networks
● A MAC address is a 48 bit hexadecimal code where 12 hexadecimal characters
are grouped in pairs

● The general format for a MAC address is that each pair of hexadecimal digits are
separated by a “-”
● An example of a MAC address:
○ Microsoft has an OUI of 00-15-5D,
○ a new laptop straight out of a Microsoft production line could have a MAC
address of “00-15-5D-45-1B-3F”

Wi-Fi & Bluetooth


● Bluetooth is a wireless communication technology that allows devices to be
connected within a maximum range of about 30 meters
● Before communication can happen, two devices connect using a process called
“pairing” to establish a secure connection
● When two devices pair, they both exchange a cryptographic key. Both these keys
are used to generate a secret shared key which is used to encrypt the data
between the two devices and create a Wireless Personal Area Network (WPAN)
● Bluetooth operates using a frequency range of around 2.4Ghz
● Connected devices continuously change their transmitting frequency between 79
different channels to avoid interference and improve the reliability of the
connection. This is known as the frequency hopping spread spectrum (FHSS)
● Bluetooth may be preferred over Wi-Fi when:
○ File transfer required between two close-range devices such as a laptop
and smartphone without the need for internet connectivity
○ Streaming audio from a smartphone to another wireless device such as a
speaker or headphones
○ Connecting to a car system allows for music streaming and hands-free
calling
○ When low power communication is required
● Wi-Fi is also a wireless communication technology that allows devices to be
connected up to a range of about 100 meters depending on the standard that is
being used
● Wi-Fi operates across the 2.4Ghz and 5Ghz frequency ranges and although
5Ghz is faster, the 2.4 GHz range is preferred as the lower frequencies often
travel further and penetrate obstacles more easily
● Similar to Bluetooth bands are split into channels
● Wi-Fi-enabled devices connect to a network by connecting to a hotspot or
wireless access point (WAP) also referred to as an access point (AP)
● Wi-Fi may be preferred over Bluetooth when:
○ High speed data transfer is required
○ Long range communication is required
○ Many devices are needed to be connected at the same time

Similarities between Bluetooth and Wi-FI


● Use radio waves for wireless technologies
● Can connect multiple devices
● Support encryption for secure connections
● Based on industry standards that are universally accepted
● It can be used to connect Internet of Things (IoT) devices and applications

Differences between Bluetooth and -Wi-Fi


Bluetooth Wi-Fi

30 (based on a standard consumer grade


Maximum number of
7 router with high end options providing
connections
substantially more)

Transmission frequency 2.4Ghz 2.4Ghz, 5Ghz

Maximum range
30 meters 100 meters (depending on obstructions)
(meters)

Maximum transfer
speed
3 Mbytes /
75 Mbytes / Sec
Sec
(Depending on the
standard being used)

Cloud Computing
● Cloud computing is a method where data is stored on remote servers and
accessed through the internet
● Local storage refers to a storage device that is connected to the computer
● The three types of cloud storage are:
○ Public Cloud - The customer and the cloud storage provider are different
companies
○ Private Cloud - The customer and the cloud storage provider are a single
organisation
○ Hybrid Cloud - Combines both public and private cloud options and allows
for sensitive data to remain private whilst providing public cloud services
for less sensitive information
● Cloud data is duplicated and stored on other servers to ensure data availability
during system failures, upgrades and maintenance periods

Advantages of Cloud storage


● Scalability
○ As the business requirements change the customer can scale services up
or down to meet their needs
● Cost saving
○ Cloud storage eliminates the need for a business to purchase expensive
equipment for infrastructure and maintenance which can result in
significant cost savings
● Accessibility
○ Cloud services are available globally and allow both remote working and
data sharing
● Reliability
○ Cloud computing providers offer high levels of uptime ensuring that
services are always available for its users
● Storage Space
○ Cloud services can offer an almost unlimited amount of storage
● Backup and recovery
○ If a customers machine or storage device fails, a backup of the data from
the cloud will allow for recovery
● File Synchronisation
○ Files can be synced across multiple devices
● Convenience
○ A user does not need to carry storage devices around with them as all
data is stored on the cloud

Disadvantages of Cloud Storage


● Internet Connection
○ A stable internet connection is required to use cloud storage
● Security
○ Storing data in the cloud may be vulnerable to security breaches
● Dependency
○ The user is dependent on the storage provider for the availability and
reliability of its services
● Ceases to trade/dissolve
○ Should the company dissolve or cease to change, all cloud data may be
lost
● Cost
○ As the amount of storage or bandwidth required increases, the service
may become expensive over time

Internet
● The Internet is a very large global network that consists of many other
interconnected networks
● The world wide web is the vast collection of web pages that can be accessed
using a web browser
● The world wide web allows you to access information by using the internet
Exam Tip
● You must be very clear about the difference between the World Wide Web and
the Internet

Characteristics of the Internet


● Open
○ The Internet is an open network meaning anyone with access can access
the same resources and information as everybody else
● Decentralisation
○ The Internet is a decentralised network with no owner, controller or
governing body. Instead, it is made up of vast numbers of interconnecting
networks that operate independently but work together to provide
communication
● Global Reach
○ The internet is a global network meaning that people from all over the
world can communicate with each other in real-time
● Accessibility
○ The Internet is available to anyone who has a suitable device and access
to any one of the interconnected networks

The Internet has many uses and plays a critical role in our lives. This can include;

● Education and training


● Social Networking
● Online shopping
● Entertainment
Intranet
● Intranets operate in a similar way to the Internet and although they are still
networks, they are usually private and are used to send information securely and
safely
● Unlike the Internet which is a global network accessible by all, access to an
organisation’s Intranet is restricted and only accessible to authorised users such
as employees

● Intranets have many advantages over the internet such as:


○ Better bandwidth than the internet
○ Data is kept within the organisation
○ Less chance of hacking and attacks
○ Administrators can manage access to external sites and links

Characteristics of an Intranet
● Private
○ An intranet is a private network that is accessible to employees within a
company or organisation
● Security
○ An intranet is usually behind a firewall to ensure security and that only
authorised users can access it
● Sharing and Communication
○ An Intranet allows for document sharing and the use of collaboration tools
between users. It can also allow the use of email and video calling to
enable efficient communication within the organisation
● Customisation
○ An intranet can be customised to meet the specific requirements of the
business such as navigation and subject content as well as the service
being able to be scaled up as the business grows
● Users will require a username and password to access the Intranet

Extranet
● An extranet is a private Intranet that also allows access by selected parties that
reside outside of the organisation. These parties, for example, maybe customers,
key stakeholders or clients
● External users will have an authorisation level once they have successfully
logged in which will determine which resources they may access

● Similarities between the Internet, Intranet and extranet are as follows:


○ They are all web based technologies
○ They allow users to access information remotely
○ They all use client server architecture
○ They all use security measures such as authentication and encryption
○ They all promote and facilitate information and resource sharing
● Differences between the internet, intranet and extranet are as follows:
○ The internet is a global network whereas an intranet/extranet is a private
network contained within an organisation
○ The use of the internet covers a wide range of purposes whereas an
intranet/extranet is designed for specific users and purposes
○ Much of the information is publicly available whereas an intranet/extranet
is not
○ The internet is not owned solely by one person or organisation whereas
intranets/extranets are owned usually by the organisation
LAN
● Local Area Networks (LANs) are networks that are usually contained within a
single building or small geographical location
● A LAN is made up using hubs and/or switches which will connect several devices
together
● It is common for one hub or switch to be connected to a router which will allow
the LAN connectivity to other outside networks such as the internet
● A LAN can offer many advantages such as:
○ Centralised management - A LAN allows centralised management of
updates, backups and software installations.
○ Security - A LAN can secure its devices with the use of firewalls, antivirus
software and other security features to prevent unauthorised access
○ File Sharing and Collaboration - A LAN allows users on the network to
share resources such as printers and other peripherals. This also allows
the users of the network to collaborate and share files and folders
● Disadvantages of a LAN include:
○ If hardware fails, the network may not function properly or even at all
○ Networks are more prone to attacks than standalone computers
○ Access to data and peripherals can be slow depending on network traffic
○ Maintenance - LAN networks require maintenance to ensure that software
is up to date, upgrades and backups which can be costly

WAN
● Wireless LANs (WLANs) are Local Area Networks that allow devices to connect
wirelessly rather than using physical cables
● Wireless Access Points (WAPs) are connected to an existing wired network
which provides a means to connect wirelessly
● Wireless Access Points use spread spectrum technology that has a range of
around 30 to 50 metres compared to Infrared which has a range of around 3
metres
● WLANs are often used when it is not practical to use cable or devices that will
access the network do not have Ethernet ports
● WLANs support a vast range of devices such as smartphones and laptops and
are very popular in public areas such as shopping malls
● Advantages of a WLAN include:
○ Mobility - WLAN allows users to connect anywhere that is in the range of a
Wireless Access Point (WAP) without the need for additional hardware or
wiring.
○ Flexibility - WLANS can be used in a variety of environments both indoors
and out making them highly flexible
○ Scalability - As the requirements change, additional Wireless Access
Points can be added relatively easily resulting in additional users being
able to use the network or increased network coverage
○ Wireless devices have access to peripherals such as printers
● Disadvantages of a WLAN include:
○ Coverage - WLANS are limited in their coverage and can be further
affected by walls and other structures
○ Bandwidth - Bandwidth speeds can become an issue in high traffic areas
○ Interference - WLANs can sustain interference from other devices which
can affect performance and connectivity
○ Security - WLANs can be vulnerable to security threats due to wireless
signals being intercepted

Security Issues

When moving electronic data from one place to another, there are different types of
security concerns to consider:

Data interception can occur when an unauthorised user intercepts data being
transferred.

Two common methods are:

Packet sniffing

Man in the middle attack

Encryption can be broken if it is not strong

Using HTTP instead of HTTPS protocols when dealing with sensitive information

Depending on whether the data being sent is sensitive will depend on the level of
security needed to ensure it stays safe

All types of information will need to be transferred from one place to another at some
point but typical examples may include:

User credentials when logging into online banking

Medical records being passed from a hospital to a GP


Student details from one school to another

Criminal records and details

When dealing with personal or sensitive data it is essential that not only is it protected
from hackers but also that it is protected from accidental disclosures such as:

Sending an email with sensitive information to the wrong person

Losing a device that has sensitive data stored

Shared access misconfigurations allow unauthorised users access to sensitive data

Passwords
● Passwords are a common form of security and are often accompanied by a
username or email address
● This type of security is often seen when accessing online banking, virtual
learning environments, email accounts and many more
● There are many ways to enhance the security of your password such as the
following:
○ Ensure that the password is changed regularly in case it has been
obtained illegally or accidentally
○ Ensure that the password uses a combination of uppercase, lowercase,
numbers and symbols to make the password more difficult to guess
○ iloveict is a weak password
○ 1lov3ICT# is a strong password
● Passwords should not contain personal information related to you such as your
date of birth, your name or the name of your pet
● Anti spyware software can be run regularly to ensure that your information
including your password is not being passed to an unauthorised third party user

Authentication
● There are also other forms of authentication aside from passwords that utilise
what is known as “zero login”
● This aims at removing or reducing the need for the user to manually input their
details and instead rely on the system to verify the users credentials
automatically
● One such type is known as biometrics where the user's fingerprints or facial
features are scanned to provide unique biometric information to authenticate the
user's details.
● Newer methods of zero login types of authentication include the use of networks,
location, device data and human behavioural patterns to recognise users
automatically.
● Although these methods offer many advantages there are some concerns that
need to be taken into consideration. They include:
○ What personal data is being collected?
○ Is the collected data being kept securely?
○ Will it log in and out at the correct times?

Magnetic Stripe Cards


● Magnetic stripe cards are a form of card that stores the user’s data on a
magnetic strip usually on the reverse side
● The user scans the card through a reader where the details stored on the card
are compared to the details stored within the system. It the data from the card
matches the data that is store on the system the user is authenticated and
granted access
● The advantages to use magnetic stripe cards include:
○ Widely used and accepted
○ Cheap
○ Simple to use
○ A single card can serve multiple purposes within an organisation such as
doors, purchasing food from canteens and accessing IT equipment
● Disadvantages to magnetic stripe cards include:
○ Some cards use a holographic or photographic ID to detect forged or
stolen copies
○ The card can may need to be scanned multiple times before the user is
accepted and authenticated
○ Cards can become damaged or wear out over time (especially with
constant use)
○ Cards can be easily cloned

Smart Cards
● Smart Cards are cards that contain a chip and can be used as contactless
● The card does not need to be inserted or swiped through a machine and can be
detected from a short distance away
● Personal identification information can be stored on the card such as name,
address, date of birth and/or banking information
● The information on the card is encrypted which means it can only be read by
authorised devices
● Often the card will require a personal identification number (PIN) which is needed
to access the information, providing an additional layer of security
● Advantages of smart cards include:
○ Durable
○ Use for a wide range of applications (Payments, Access Control, Storing
personal data
○ Enhanced security (Compared to standard cards)
● Disadvantages of smart cards include:
○ Risk of loss
○ Initial Infrastructure requirements
○ More expensive compared to traditional cards

Physical Tokens
● A Physical Token enables authentication with the use of a small physical device
● To access a system that uses a physical token, a user will enter their username
and password into the system, and then enter the security code generated by the
token
● The physical token can be directly connected to the device that the user is trying
to access or the physical token will generate one time password (OTP) which is
then entered into the system manually
● To obtain a one time password (OTP) the user will enter their personal
identification number (PIN) and any other authentication requirements into the
physical token device. If all requirements are satisfied then an internal clock will
be used to generate the one time password (OTP) which is displayed on its
screen
● To enhance security, the one time password (OTP) changes frequently and each
code will only be valid for a short period of time (usually within 1 minute)
● Advantages of physical tokens include:
○ Offline authentication
○ Portable
● Disadvantages of physical tokens include:
○ Cost
○ Loss or theft of the physical token
○ Physical dependance

There are two typical of physical token:

● Disconnected physical token


○ When using a disconnected physical token, a separate device is used to
generate the one time password (OTP) which the user will then enter into
the system manually
● Connected physical token
○ When using a connected physical token, the one time password (OTP) is
generated and passed to the system automatically though a physical
connection and does not require to user to enter the password manually
Electronic tokens
● Electronic Tokens are a form of application software that is installed on a user's
device (usually smartphone) to allow them to authenticate their details and allow
them to access a secure website
● A user must download and register the electronic token software app prior to
accessing the secure website
● As the website prompts for authentication, the user will open the app that will
provide a one time passcode (OTP) which will be entered into an entry box on
the website along with other forms of authentication such as a username and
personal identification number (PIN)
● Both the web server and the smartphone application have synchronised clocks
which will generate identical numbers and should the authentication details
match, the user will be granted access to the website
● The above explanation is just one method of authentication when using
electronic tokens. Another method is as follows:
○ The website will prompt the user for their username and password
○ Upon successful credentials the website will generate a code
○ The code is then entered into the application software on the users phone
which will generate another code
○ The generated code from the application software is then entered into an
entry box on the website
○ Should all authentication methods pass successfully, the user is granted
access to the website

Anti-malware
● Anti-Malware (also known as Anti Virus software) is designed to protect devices
against viruses and malicious software
● Anti-malware has 3 mains purposes, detect, prevent and remove malicious
software
● Anti-Malware is installed onto a computer system and will operate in the
background
● Common features of Anti-Malware software include the following:
○ Comparing the scanned files against a large database of known threats
○ Real-time scanning
○ Regular updates to gather an up to date list of known threats
○ Quarantine of infected files
■ Quarantining files allows threats to be automatically deleted
■ Allows the user to determine if the file is a legitimate threat and not
a false positive
○ Scanning external storage media such as USB flash drives to prevent
viruses from being loaded onto the computer system
■ The scanning of downloaded software to ensure that it is free from
any threats
○ Heuristic checking
■ This is the identification of potential threats within a file from
behavioural patterns and characteristics rather than just relying on
a database of known viruses

Microprocessor Controlled Devices


A microprocessor is a small computer chip that can be used to control devices. It is
made up of a central processing unit (CPU), memory, and input/output (I/O) devices.
The CPU is responsible for carrying out instructions, the memory stores data, and the
I/O devices allow the microprocessor to communicate with the outside world.

Microprocessor controlled devices are used in a wide variety of applications, including:

● Household appliances, such as washing machines, refrigerators, and ovens


● Office equipment, such as printers, scanners, and photocopiers
● Industrial machineries, such as robots and assembly lines
● Transportation, such as cars, aeroplanes, and trains
● Medical devices, such as pacemakers and insulin pumps

Impact of Microprocessors on Home Life


● Positive effects on lifestyle, leisure, physical fitness, and data security include:
○ Convenience
■ Devices such as smart thermostats, lights, and appliances can be
controlled remotely, saving time and effort
■ People have more time to spend on the things they want
■ Smart fridges automatically order fresh food and therefore reduce
food waste
○ Fitness tracking
■ Devices like smart watches monitor physical activity and health
data, encouraging healthier lifestyles
○ Security
■ Smart security systems provide real-time surveillance, adding an
extra layer of protection to homes
● Negative effects include:
○ Privacy risks
■ These devices can be vulnerable to hacking, risking the security of
personal data
○ Social interaction
■ Over-reliance on these devices can decrease face-to-face
interaction, impacting social skills
○ Physical fitness
■ Despite fitness tracking, sedentary behaviour may increase due to
the convenience of smart devices

Impact of Microprocessors on Transport


● Positive effects on data security, autonomous vehicles, and transport safety
include:
○ Efficiency
■ Autonomous vehicles optimise routes, reducing travel time and fuel
consumption
○ Safety
■ Advanced safety features, like automatic braking and lane assist,
can reduce accidents
○ Data security
■ Real-time tracking and encryption help protect against theft or loss
● Negative effects include:
○ Privacy issues
■ Data collected by these vehicles could be misused or hacked
○ Job losses
■ Autonomous vehicles could replace jobs in transport industries,
leading to unemployment
○ Safety risks
■ Malfunctions in autonomous vehicle systems could lead to
accidents

Evaluation:

Health Issues When Using Computers


Common health issues related to extensive ICT use include:

● Repetitive Strain Injury (RSI)


○ A condition affecting muscles and nerves, often caused by repetitive
movements and overuse
● Back problems
○ Poor posture while using devices can lead to back pain and other related
issues
● Eye problems
○ Strain and fatigue from staring at screens for long periods can harm vision
● Headaches
○ Overuse of ICT devices can cause headaches, usually due to eye strain or
poor posture

Health Issue Causes Prevention Strategies

Repeated physical movements


Repetitive Regular breaks, ergonomic
do damage to tendons, nerves,
Strain Injury equipment, and correct typing
muscles, and other soft body
(RSI) techniques.
tissues.

Back Poor posture, particularly when Correct posture, ergonomic


problems using devices for long periods. furniture, and regular movement.

Prolonged screen time leads to Regular breaks from the screen,


Eye digital eye strain, characterised appropriate screen brightness, and
problems by dryness, irritation, and blurred maintaining an appropriate distance
vision. from the screen.

Factors such as poor posture, Regular breaks, maintaining good


Headaches eye strain, or stress from posture, and ensuring proper screen
overuse of devices. brightness.

Evaluation
Explain ways to eradicate security issues
Explain the types of network with their advantages and disadvantages
Differentiate between an intranet and extranet
DESCRIPTION
TERM: FIRST TERM
WEEK: 8-9
TOPIC: Document Production
LESSON OBJECTIVES: At the end of the study, students will be able to;
● Create and edit a document
● Creating a Table
● Formatting a Table
● Create and Edit headers & footers

CONTENT

Create or Edit a Document


Enter and Modify Text and Numbers
● To create a document, you first enter text and numbers into it
● Text and numbers can be modified by adding, deleting, or changing characters
as needed

Editing Techniques for Text and Numbers


● Highlight: Use the mouse to select the text or numbers you want to manipulate
● Delete: Remove the selected text or numbers from the document
● Move: Cut or copy the selected text or numbers, then paste it into a new location
● Cut, Copy, and Paste: Cut removes the selection from its original location, copy
makes a duplicate, and paste inserts the cut or copied material
● Drag and Drop: Click on the selected material, hold the mouse button down,
move the cursor to the desired location, and then release the mouse button

Placing Objects into the Document


● You can add objects such as text, images, screenshots, shapes, tables, graphs
or charts, spreadsheet extracts, and database extracts into your document
● These objects can come from a variety of sources, and you can adjust their size
and position in your document

Wrapping Text Around Objects


● You can arrange your text to wrap around tables, charts, or images in a variety of
ways, including:
○ Above: The text appears above the object
○ Below: The text appears below the object
○ Square: The text forms a square around the object
○ Tight: The text closely wraps around the object, following its shape

Tables
Creating a Table
● Tables are created by specifying the desired number of rows and columns
● This can typically be done through a menu option or a shortcut in most word
processing software

Placing Text or Objects on a Table


● You can add text or objects such as images or graphs into the cells of a table
● Just click on the cell and start typing or paste the object

Editing a Table and Its Contents


● Tables can be edited in several ways:
○ Insert rows and columns: Add more rows or columns to your table
○ Delete rows and columns: Remove unnecessary rows or columns
○ Merge cells: Combine two or more cells into one

Formatting a Table
● Tables can be formatted to improve readability and visual appeal. Here are a few
options:
○ Set horizontal cell alignment: Choose whether the text is aligned to the
left, right, centre, or justified within a cell using the normal alignment
options
○ Set vertical cell alignment: Set text to align at the top, middle, or bottom of
a cell
○ Show or hide gridlines: Display or hide the lines that make up the table


○ Wrap text within a cell: Make text automatically move to the next line when
it reaches the edge of a cell
○ Shading/colouring cells: Apply a colour to the background of a cell


○ Adjust row height and column width: Change the size of the cells in your
table to better fit your content
Headers & Footers
Headers and Footers are areas at the top (header) and bottom (footer) of a page in a
document where you can add text or graphics

Creating and Editing Headers & Footers


● Headers and footers are areas at the top and bottom of a page in a document
● You can add or edit content in these areas as required
Aligning Contents of Headers & Footers
● The contents of headers and footers can be aligned consistently within a
document
● They can be aligned to the left margin, right margin, or centred within margins

Placing Text & Automated Objects in Headers & Footers


● You can insert text and automated objects into headers and footers
● These objects can include file information, page numbering, total number of
pages, date, and time
Evaluation
Create a student registration form document
Design your reading timetable using tables
DESCRIPTION
TERM: FIRST TERM
WEEK: 10-11
TOPIC: Document Production
LESSON OBJECTIVES: At the end of the study, students will be able to;
● Know how page layout works
● Creating a Table
● Create and Edit Lists
● Edit Page Layout and page setup
● Use find and replace
● Use bookmarks
● Pagination & Margins

CONTENT

Page Layout in Documents


Line Spacing and Paragraph Settings
● Line spacing can be set to single, 1.5 times, double, or multiple
● Additional space can also be added
before and after paragraphs

Setting Tabulation
● Tabulation options include left, right,
centred, and decimal tabs
● Special paragraph formats include
indented paragraphs and hanging
paragraphs
Text Enhancement
● Text can be enhanced using bold, underline, and italic
● Superscript and subscript options are available for specialised text, and changes
in case can be made

Creating or Editing Lists


● Lists can be bulleted or numbered for organisation and clarity
● These list formats can be easily created and modified in a document
Editing Page Layout
● Page layout can be customised, including the page size and orientation, page
margins, number of columns, and column width

Evaluation

Create a document using landscape orientation


● Spacing between columns can be adjusted
● Different types of breaks can be set or removed, such as page breaks, section
breaks, and column breaks

Find & Replace


What is Find and Replace?
● The Find and Replace function is a useful tool to quickly locate and change
specific words or phrases in a document
Case Matching
● The function can be set to match the case of the word or phrase, making the
search case-sensitive
● This means that 'Word' and 'word' would be considered different

Whole Word Matching


● The Find and Replace function can also be set to match whole words only
● This prevents partial matches from being considered, such as 'cat' in 'catalogue'

Bookmarks
What is a Bookmark?
● A Bookmark is a tool used in digital documents to mark a specific place for easy
navigation in the future

Adding Bookmarks
● Adding bookmarks can be done by selecting the text you want to bookmark, and
then choosing the 'Add Bookmark' option from the menu
Deleting Bookmarks
● Bookmarks can be deleted through the 'Bookmark' menu
● Just select the bookmark you wish to delete and choose the 'Delete' option
Using Hyperlinks with Bookmarks
● Hyperlinks can be linked to bookmarks, making it easy to navigate to a specific
spot in a document from anywhere within the document

Pagination & Margins


Purpose of Setting Page, Section, and Column Breaks
● Page, section, and column breaks allow for better organisation and control over
the layout of your document
● A page break starts a new page, a section break allows for different formatting in
separate parts of the document, and a column break starts a new column (if your
document is divided into columns)

Purpose of Setting Gutter Margins


● Gutter margins provide extra space on the sides of a page
● They are particularly useful in printed documents to allow for binding without
obscuring text

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy