IGCSE ICT Theory Notes
IGCSE ICT Theory Notes
Hardware is the physical components of a computer system. There are two categories of Hardware:
EXTERNAL HARDWARE:
○ Keyboard
○ Mouse
○ Camera
○ Monitor
○ Printer
○ Plotter
INTERNAL HARDWARE:
○ Motherboard
▪ A printed Circuit board found in all computers.
▪ Connects the processor and other computer hardware, allowing them to communicate.
▪ Consists of a sheet of non-conductive material like hard plastic.
▪ Thin layers of copper or aluminum are printed onto this sheet which form the circuits b/w diff. components.
▪ Also contains: several sockets + slots to connect the other components.
○ Graphics Card
▪ Allows computer to send graphical info to a video display monitor, television, or projector.
▪ It connects to the motherboard.
▪ Made up of :
- A processing unit
- A memory unit (mostly RAM)
- A cooling mechanism (mostly a heat sink)
- Connections to a display unit. (monitor, TV, projector)
○ Sound Card
▪ An integrated circuit board that provides a computer w/ the ability to produce sounds.
▪ Can be heard through speakers or headphones.
▪ Also allow user to record sound input via microphone connected to computer.
▪ Also allow user to manipulate sound stored on a disk.
Software is the programs that control the computer system and process data.
Applications software provides the services that the user requires to solve a particular task.
System software is designed to provide a platform on which all other software can run.
The two main categories are:
APPLICATIONS SOFTWARE :
○ Word Processing
▪ To manipulate a text document, like essays or reports.
▪ Text is entered using keyboard.
▪ Software provides tools for copying, deleting & diff. formatting.
▪ Functions include:
- Creating, editing , saving & manipulating text.
- Copy and paste functions.
- Spell checkers and thesaurus.
- Importing img. into structured page format.
- Translate into foreign language.
○ Spreadsheet
- Used to organise & manipulate numerical data.
- Numbers are organized on a grid of lettered columns & numbered rows.
- The grid is made of cells and each cell is identified by its unique combination e.g. B6.
- Functions include:
□ Use of formulae to perform calculations.
□ Ability to produce graphs.
□ Ability to do modelling and 'what if' calculations.
○ Video editing
- Allows a user the ability to manipulate videos to produce new video.
- Enables addition of titles, colour correction, altering/adding sound to og video.
- Includes :
□ Rearranging, adding and/or removing sections of video clips and/or audio clips.
□ Applying colour correction, filters and other video enhancements
□ Creating transitions b/w clips in the video footage.
○ Audio editing
- Allows user to edit, manipulate and generate audio data on computer.
- Allows user to alter
□ Length of track.
□ Start/Stop time of track.
□ Conversion b/w audio file formats.
□ Volume of track.
□ Fading in/out.
□ Combine multiple sound tracks.
□ Noise reduction.
□ To create another version of the sound track (e.g. a continuous loop or ringtone).
○ Graphics Editing
- Allows bitmap & Vector images to be changed.
- Software chosen depending on format of og image.
- Bitmap :
□ Made up of pixels which contain info abt img brightness and colour.
□ Its graphics editors can change pixels to produce diff. image.
- Vector :
□ Its graphic editors operate in a different way & don’t use pixels.
1. Types and Components of a computer system Page 5
□ Its graphic editors operate in a different way & don’t use pixels.
□ This software manipulates lines, curves, text to alter the stored img as required.
SYSTEMS SOFTWARE
○ Compilers
- Computer program that translates high-level language (HLL) into machine code to be directly used by computer to do needed task.
- Og program called source code & code after compilation called object code.
- Once a program is compiled, the machine code can be used over and over to perform same task without recompilation.
- HLL includes Java, Python, Visual Basic, Fortran, C++ and Algol
○ Linkers
- Also known as Link editor.
- Combines object files produced by compiler into a single program.
- E.g. programmers write diff. pieces of codes (modules) separately to simplify programming task to be more manageable. Linkers combine
said modules to create the final program.
○ Device drivers
- Enables several hardware devices to communicate with O.S.
- Without them hardware devices (e.g. printers) wouldn't be able to work w/ computers.
- All hardware devices connected to computers have a driver.
- When device is plugged into computer, O.S looks for a driver for it, and gives error message if a driver not found.
- E.g. of hardware devices that need drivers : Printers, Mouse, CD driver, Memory sticks.
ANALOGUE DATA
○ Physical data that changes from one value to the next smoothly, unlike the
discrete steps by digital data.
○ It is found in the real world.
○ If sent to a computer it has to be converted to digital data first using a
Analogue to Digital convertor (ADC) because computers understand
data in binary form.
○ Infinite values can exist between 2 values.
DIGITAL DATA
BIOS:
○ ROM contains some coding known as the boot file which tells computer what to do when it first starts up.
○ Often referred to as BIOS (basic input/output system)
○ When computer turned on, it carries out a hardware check to find if all devices are present and functional.
○ Then loads up the Operating System into the RAM
○ It stores the date, time and system configuration in non-volatile chip called a CMOS (complementary metal oxide semiconductor) which is
usually battery powered
INPUT DEVICES:
○ Hardware that allow data to be entered into a computer
○ Use either manual entry (Keyboard or a mouse) or direct data entry (sensors or optical character readers)
○ These devices turn input into a form which computer can understand like a mouse turns hand movements into cursor movements
○ Sometimes data has to go through an ADC before the computer can make any sense of it
OUTPUT DEVICES:
○ When a human operator wants to see results of computer processed data, the computer sends the data to an output device
○ Output device shows computers output in a way humans can understand like text on a printer or moving images on a monitor
Differences :
○ Sometimes devices can act as both input and output like a touch screen or a DVD writer/player but most are only capable of one.
Comparison:
OS
To enable computers to function and allow users to communicate with computer systems, special software called operating systems (OS) have been
developed.
General tasks include:
○ Control of operation of input, output & backing storage devices
○ Supervising loading, running & storage of app programs
○ Dealing w/ errors in apps
○ Maintaining security of whole computer system
○ Maintaining computer log (it details computer usage)
○ Allowing comm. b/w user & computer system (user interface)
User Interfaces :
Command Line interface (CLI)
○ Requires user to type in instructions to choose option from menus, open software, e.t.c
○ Often number of commands need to be typed in, for example, to save or load a file
○ User has to learn number of commands to carry out basic operations
○ Its slow, having to key in these commands every time an operation has to be carried out
○ Advantage that user is in direct communication w/ computer & not restricted to a number of pre-determined options
○ For example windows has a CLI called 'command prompt' and to open desktop folder %windir%\explorer.exe C:\Users\YourName
\Desktop command is required
Gesture-based interfaces
○ Rely on human interaction by moving of hands, head or even feet
○ Allows humans to interface w/ a computer in more natural way w/o need for any mechanical devices
○ Uses techniques knows as computer vision & image processing
Example: to carry out certain function in car following gestures can be used.
1. Types and Components of a computer system Page 14
○ Example: to carry out certain function in car following gestures can be used.
□ moving the foot under the rear bumper of the car automatically opens the boot lid
□ moving a hand near a window switch automatically opens a window
○ Either a sensor or a camera is used to pick up the gesture & a signal is sent to an on-board computer to carry out the required action
○ Eliminates need for an array of buttons & dials on dashboard
Types:
Desktop Computers
○ Refers to a general purpose computer
○ Made up of separate monitor, keyboard, mouse & processor unit
○ Distinguished from others by the fact that its several separate components making it not very portable
Mobile Computers
○ They are a group of computers that are more portable than desktop computers
○ Have 4 categories:
▪ Laptop Computers
□ Refers to computers where the monitor, keyboard, pointing device and processor are all together in one single unit making them very portable
▪ Smartphones
□ Allow normal phone cal.ls to be made but also have an OS (like ios, android, windows)
□ OS allows it to run several apps
□ They communicate w/ internet by using Wi-Fi hotspots or by using 3G/4G/5G mobile phone networks
□ Advantages of smartphones:
Very small in size and lightweight thus very easy to carry and have at all times.
can use them to make phone calls, but also connect to the internet while on the move
b/c they use Wi-Fi and mobile phone networks they can be used almost anywhere
They have apps which make use of sensor data provided by the smartphone, for instance location data for maps
They have a reasonable battery life compared to laptops
□ Disadvantages of smartphones:
The small screens and keyboards make pages difficult to read
It is more difficult & slower when typing things in
Web browsing and photography can quickly drain the battery
Memory size in most phones is not very large when compared to laptops and desktops
Not all website features are compatible with smartphone operating systems
easier to lose a smartphone or for it to be stolen due to its size
The data transfer rate using mobile phone networks can be slower than with Wi-Fi, making streaming of video or music, problematic
▪ Tablets
□ Work in a similar way to a smartphone
□ becoming an increasingly used
□ use touch screen technology and do not have a conventional keyboard.
□ keyboard is virtual; (part of the touch screen) & keys are activated by simply touching them with a finger or a stylus
□ possible to buy tablet cases which contain a normal-sized keyboard
□ Internet access is usually through Wi-Fi or 3G/4G/5G (mobile phone) connectivity
□ Like smartphones, tablets are equipped with a series of sensors which include camera, microphone, accelerometer and touch screen.
□ The typical features of tablets are identical to those of a smartphone
□ Some of the latest smartphones have been designed as a hybrid between a tablet and a smartphone; these are referred to as a phablet.
□ They have larger screens than smartphone but smaller than a tablet
□ All the features of a smartphone also apply to phablets together with the typical features of a tablet
Artificial intelligence
○ AI is a machine or application which carries out a task that requires some degree of intelligence. For example:
▪ the use of language
▪ recognising a person’s face
▪ the ability to operate machinery, such as a car, aeroplane, train, and so on
▪ analysing data to predict the outcome of a future event, for example weather forecasting
○ AI duplicates human tasks which require decision-making and problem-solving skills
○ could lead to unemployment
○ However, the positive side includes improvements in safety and quality of services and products
• Keyboards
○ connected to computer via USB or wireless connection. In case of tablets and mobile phones, the keyboard is often virtual or a type of
touchscreen technology.
○ When character on keyboard is pressed, its converted to a digital signal, which the computer interprets
○ relatively slow method of data entry and also prone to errors
○ frequent use can lead to injuries, such as repetitive strain injury (RSI) in the hands and wrists
○ How it works?
▪ There is a membrane or circuit board at the base of the keys.
▪ In Figure 2.3, the ‘H’ key is pressed and this completes a circuit as shown
▪ The CPU in the computer can then determine which key has been pressed
▪ The CPU refers to an index file to identify which character the key press represents.
○ Uses:
▪ Input of data into applications software (like text into word processors numbers into spreadsheets).
▪ Typing in commands to the computer (Like Prnt, Ctrl+P to print ).
○ Advantages
▪ Fast entry of new text into a document
▪ Well-known method.
▪ Easy to use for most people
▪ Easier to do verification checks as data is entered (can immediately compare the source document with typed data on the screen).
○ Disadvantages
▪ Can be difficult to use if the user has limited arm/wrist use
▪ Slow method when compared to direct data entry (like Optical Mark Recognition)
▪ Fairly large device that uses up valuable desk space.
• Numerical Keypads
○ used to enter numbers only (although some have a function key to allow alphabetic
characters to be input)
○ Uses:
▪ Automatic teller machines (ATMs), where the customer can key in their PIN,
amount of money, etc.
▪ Mobile phones to allow phone numbers, etc. to be keyed in.
▪ Point of sale terminals (POS) in case the barcode reader fails to read the
barcode
▪ Chip and PIN devices when paying by credit/debit cards (key in PIN,
amount of money, etc.)
▪ Fast entry of numeric data into a spreadsheet.
○ Advantages:
▪ Faster than standard keyboards when entering numeric data
▪ Because many are small devices (mobile phones) they are very easy to carry
around
○ Disadvantages:
▪ Sometimes have small keys which can make input more difficult
▪ Sometimes the order of the numbers on the keypad is not intuitive.
• Mouse
○ User controls the position of a pointer on the screen by moving the mouse around
○ Some have a scroll button, which speeds up the process of moving through a document.
○ usually two buttons which have different functions;
▪ left button is used to select items by double clicking
▪ right button brings up drop-down menus
• Optical Mouse and Wireless Mouses
○ movement is detected by reflected light rather than the position of a moving ball in optical
○ transmits signals to a USB wireless receiver plugged into the computer in wireless
○ in use on modern computers
○ advantage of an optical mouse is it has no moving parts and it also does not pick up any dirt
○ makes it more robust and improves its performance because the older type of mouse can ‘skid’ on certain surfaces reducing the control of
the pointer
○ Uses of Mouses:
▪ opening, closing and minimizing software
▪ grouping, moving and deleting files
▪ image editing, like, controlling size & position of a drawing pasted in document
▪ controlling position of a pointer on screen to allow selection from menu
▪ selecting an icon
▪ for scrolling up and down/left and right.
○ Advantages of Mouse:
▪ Faster method for choosing an option compared to keyboard.
▪ Very quick way of navigating through apps and the internet
▪ Does not need a large desk area compared to keyboard.
○ Disadvantages of Mouse:
▪ Can be more difficult for people with restricted hand/wrist movement than using a keyboard for data entry
▪ Easy to damage, and older type of mouse quickly becomes clogged up with dirt
▪ Difficult to use if no flat surface readily available (like on an aeroplane)
• Trackpad
• Trackerball
○ similar to a mouse, except that a ball is on the top or the side of the device
○ user controls the pointer on the screen by rotating the ball with their hand
○ Some trackerballs have two buttons, same function as mouse buttons
○ If third button, its equivalent to a double click
○ Uses:
▪ Can be a good alternative to a mouse for people with conditions such as RSI
▪ Used in an industrial control room environment where it is faster than a mouse to navigate through process screens
▪ Used in some luxury cars to select functions such as radio, telephone, music, satnav and so on
○ Advantage:
▪ Does not need the same fine control as a mouse
▪ Easier to use than a mouse if operator has problems with their wrist or hand
▪ More accurate positioning of the pointer on screen than mouse
▪ more robust than a mouse
▪ less desk space than mouse or keyboard.
○ Disadvantages:
▪ Not supplied with the computer as standard, therefore more costly
▪ User may need training because it is not standard equipment.
• Remote Control
• Joysticks
• Touch Screens
• Scanner
○ used to enter information from hard copy into a computer
○ most common type is the flatbed scanner (see Figure 2.14), which is made up of a glass panel and lid
○ hard copy document or photo is scanned by a light source and produces a computer-readable image
○ image can then be manipulated using a drawing package
○ Uses:
▪ Scan in documents and convert into a format for use in various software packages
▪ Scan in old/valuable documents/books, (protecting originals & producing records in case the paper copies are lost/destroyed)
▪ Scan in photographs (for non- digital camera, photographs are still printed on paper, requiring conversion to computer format for
storage)
▪ Scan in barcodes at POS terminals
○ Advantages:
▪ Images can be stored for editing at a later date
▪ When used with OCR, much faster and more accurate (no typing errors) than typing in documents again
▪ possible to recover damaged documents and photographs by scanning in and then using appropriate software to produce an acceptable
copy
○ Disadvantages:
▪ Quality can be limited depending on resolution the scanner is capable of (most scanners have a range of resolutions you can choose
from)
▪ can be fairly slow at scanning, especially if the colour scanning mode is chosen or if the chosen scanning resolution is high.
• Digital Camera
○ Image Storage: Photos are saved on a memory card.
○ Transfer Methods: Images can be transferred by:
• Memory card reader
• USB connection
• Wireless (Wi-Fi or Bluetooth)
○ Post-Transfer Options: Once uploaded, images can be printed, used in slideshows, added to documents, or shared online.
○ Uses:
▪ Photography: Captures higher-quality images than smartphones due to advanced lenses and software.
▪ Data Capture: Used in cars (e.g., reversing cameras) for situational awareness.
▪ Dental Use: Helps dentists with diagnosis and color matching for fillings.
▪ Virtual Reality: Creates VR tours for houses, historical sites, and industrial locations.
○ Advantages:
▪ Higher Quality: Digital cameras make it easier to capture better-quality images.
▪ Quick Uploads: Photos can be directly uploaded to a computer without scanning.
▪ Cost & Eco-Friendly: No film development needed, saving money and reducing environmental impact.
▪ Ample Storage: Memory cards hold thousands of photos, no need for physical film.
○ Disadvantage:
▪ Computer Skills Required: Users need basic computer literacy for transferring, storing, and editing photos.
▪ Loss of Artistry: Software auto-corrects errors, reducing creative control.
▪ Memory Use: Images can be large, often needing compression to save storage space.
Sensors Overview
• Definition: Devices that input data to a computer by measuring changing physical quantities (e.g.,
temperature, light).
• Analogue to Digital Conversion (ADC): Necessary because computers only process digital data (1s and
0s).
Types of Sensors & Applications
• Temperature: Used in washing machines, heating systems, glasshouses, ovens.
• Pressure: Used in alarms, washing machines, robotics, environmental monitoring.
• Light: Used in glasshouses, automatic doors, alarm systems, street lighting.
• Sound/Acoustic: Used in alarms, liquid/powder monitoring.
• Humidity/Moisture: Used in glasshouses, factories, environmental monitoring.
• pH: Used in glasshouses, chemical processes, environmental monitoring.
Advantages of Using Sensors
• Accuracy: More accurate than human readings.
• Continuous Monitoring: No gaps in data collection.
• Immediate Action: Prompt response in control or monitoring systems.
• Automation: Reduces human involvement, useful in hazardous or precise environments.
Disadvantages of Using Sensors
• Faulty Readings: Errors can occur if sensors are damaged or dirty.
• Analogue Data: Requires ADC for compatibility with digital systems.
• Definition: Devices that input data into a computer with minimal human
interaction.
• Example: Barcode readers, where the only action required is pointing the
reader at the barcode.
• Automatic Data Transfer: Data is transferred to the computer automatically
after detection.
Barcode Readers
• Definition: Barcode readers scan information stored in the form of a barcode. These readers are often integrated
into POS terminals or handheld scanners.
• Uses:
○ Supermarkets for automatic stock control and itemized billing.
○ Libraries for tracking books on loan.
○ Safety function in companies for regular electrical equipment checks.
• Advantages:
○ Faster than manual data entry with fewer errors.
○ Automatic stock control.
○ Trusted technology.
• Disadvantages:
○ Expensive to administer.
○ Barcodes can be swapped, causing issues.
○ Easier to damage than RFID tags or magnetic stripes.
QR Code Scanners
• Definition: QR codes are a type of barcode made of dark squares on a light background. They can store
more information than regular barcodes and can be scanned using smartphones and tablets.
• Description: QR codes consist of small squares (pixels) and can hold up to 4296 characters or 7089 digits,
which is much more than a regular barcode's 30 digits. The three large corner squares help with alignment.
• Uses:
○ Advertising products (e.g., web addresses, contact info).
○ Storing boarding passes electronically.
○ Wi-Fi authentication by storing network details.
○ Delivering augmented reality (AR) experiences.
○ Virtual online stores using QR codes for product delivery.
• Advantages:
○ Can hold more information than barcodes.
○ Fewer errors due to built-in error-checking.
○ Easier to read with smartphone cameras.
○ Can be encrypted for protection.
○ Easy to transmit via text messages or images.
• Disadvantages:
○ Multiple QR formats exist.
○ Potential for malicious code (attagging) embedded in the QR code, which can harm the user’s device or
direct them to a fake website.
Output Devices are devices that display or present the results of computer
processing in a way that can be understood by humans. Common output devices
include:
• Monitors (displays on screen)
• Printers (printed on paper)
Some output devices are used in control systems, where the computer sends signals
to control or influence a process, often used in automated systems or machinery.
CRT Monitors (Cathode Ray Tube Monitors): These are now becoming rare due to the widespread use of LCD
monitors but are still used in some specialized applications.
Uses of CRT Monitors:
• Specialized Areas: Primarily used in fields like Computer-Aided Design (CAD), where large screens are
required for complex diagrams.
• Light Pens: CRT monitors can be used with light pens, which allows designs to be created directly on the
screen.
Advantages of CRT Monitors:
• Wide Viewing Angles: The screen can be viewed clearly from a wider range of angles compared to many
LCD monitors.
• Light Pen Compatibility: Suitable for applications like CAD/CAM, where precision drawing is needed.
Disadvantages of CRT Monitors:
• Heavy and Bulky: CRT monitors are heavy and take up significant space on a desk, making them less
practical for general use.
• High Power Consumption: They consume more power compared to LCD monitors.
• Heat Generation: CRT monitors generate a lot of heat, which can be a fire hazard if left unattended,
especially as they age.
• Flickering: Prolonged use of CRT monitors can cause flickering, leading to headaches and eye strain.
Multimedia Projectors
Multimedia projectors display signals (usually digital) from sources like computers, TVs, or DVD players on a
large screen. They often come with a remote control that acts as a virtual mouse, enabling users to control presentations
from a distance.
Uses:
• Training: Displaying presentations for large audiences.
• Advertising: Showing large images or videos at exhibitions.
• Home Cinema: Projecting DVD or TV content at home.
Advantages:
• Enables group viewing without needing multiple screens.
• Allows people to see videos or presentations on one large screen.
Disadvantages:
• Image quality can sometimes be fuzzy.
• Expensive and difficult to set up.
Laser Printers
Laser printers produce high-quality printouts quickly, especially for large print jobs. They use a detailed process
involving a charged drum, toner, and heated rollers to transfer ink onto paper.
Uses:
• Used in offices where low noise is required.
• Ideal for fast, high-quality, high-volume printing.
Advantages:
• Fast printing (particularly for large jobs).
• High, consistent print quality.
• Long-lasting toner cartridges, making them cost-effective for high-volume printing.
Disadvantages:
• Slower for small print jobs compared to inkjet printers.
• Colour laser printers are expensive to operate.
• They can emit ozone and volatile organic compounds, potentially causing health hazards in enclosed spaces.
Inkjet Printers
Inkjet printers produce high-quality hard copies and are commonly used for tasks requiring good print quality.
They work by spraying ink droplets onto the paper, with two main technologies: thermal bubble and piezoelectric.
They can be used for photo-quality prints but are slower for high-volume printing due to limited buffer memory.
Uses:
• Ideal for low-output volumes or single-page, high-quality print jobs (e.g., photo prints).
• 3D inkjet printers are used in industry for prototyping.
Advantages:
• High-quality output.
• Affordable compared to laser printers.
• Compact and lightweight.
• No emissions of ozone or volatile organic compounds, unlike laser printers.
Disadvantages:
• Slow output for large print jobs.
• Ink cartridges deplete quickly, making them unsuitable for high-volume printing.
• Prone to smudging if not handled carefully.
• Expensive ink cartridges for frequent use.
(Graph) Plotters
Plotters are output devices that use pens, pencils, or markers to draw continuous lines on large sheets of paper. They
are commonly used for vector graphic drawings in CAD (computer-aided design) and CAM (computer-aided
manufacturing). Some plotters can also cut materials by replacing the pen with a cutting blade.
Uses:
• Producing architectural and engineering drawings.
• Drawing animation characters.
Advantages:
• High-quality output with precise accuracy.
• Capable of producing large, monochrome and color drawings.
• Can print on various materials such as aluminum, cardboard, plastic, and wood.
Disadvantages:
• Slow printing process.
• Expensive initial purchase cost, though low running costs.
• Large physical footprint compared to typical printers.
3D Printers
3D printers use computer-aided design (CAD) applications to create solid objects by building them layer by layer. This
process, known as additive manufacturing, contrasts with traditional subtractive methods, where material is removed to form the
object. Various types of 3D printers exist, from small ones like microwave ovens to larger models the size of a small car.
Technology Behind 3D Printing:
• Direct 3D Printing: Utilizes inkjet technology where the print head moves left to right and also up and down, layer by
layer, to create the object, often with layers less than 0.1 mm thick.
• Binder 3D Printing: A two-pass method where dry powder is sprayed first, followed by a binder (glue) to form each
layer.
• Laser/UV 3D Printing: Newer technologies that use lasers or UV light to harden liquid polymers, expanding the types
of objects that can be created.
Examples of 3D Printing:
• Alloy wheel made with binder 3D printing from powdered metal (Figure 2.36).
• Prosthetic limbs that can be made to fit the exact shape of the injured body part.
• Precision parts for aerospace, fashion, and art creations.
Uses of 3D Printers:
• Medical applications: Prosthetics, artificial organs, and precision-made items for reconstructive surgery.
• Manufacturing: Custom parts for items that are no longer produced (e.g., vintage cars).
• Aerospace: Lightweight, precision parts for airplanes.
• Fashion and Art: New creative designs.
• Rapid Prototyping: Quick conversion of designs into working prototypes.
How 3D Printers Create Objects:
1. Design Creation: A CAD model is created.
2. Preparation: The model is converted into a format the printer understands.
3. Layer-by-Layer Printing: The object is built up, often using materials like plastic or metal powder.
4. Post-Processing: The object is cleaned, with excess materials or supports removed.
5. Curing: Some objects may need time to harden or cure after printing.
Advantages of 3D Printers:
• Customization: Users can create their own designs and manufacture customized products.
• Rapid Prototyping: Quick production of prototypes for testing or development.
• Cost Efficiency: Lower cost for small-scale and mass production compared to traditional manufacturing.
• Medical Benefits: Precision in creating medical items such as prosthetics and artificial organs.
• Replacement Parts: Enables the creation of parts for outdated or rare machinery.
2. Input and Output Devices Page 59
• Replacement Parts: Enables the creation of parts for outdated or rare machinery.
Disadvantages of 3D Printers:
• Counterfeit Risks: The ability to easily replicate objects could lead to counterfeiting and copyright infringement.
• Illegal Uses: The technology could be misused to create dangerous or illegal items.
• Job Losses: Automation through 3D printing could lead to a reduction in jobs in certain manufacturing sectors.
This technology is rapidly advancing and has the potential to revolutionize various industries, offering faster production times,
more customization, and even significant medical advancements. However, as with any disruptive technology, it also raises
concerns about misuse and job displacement.
Speakers
Speakers are output devices that convert digital data into sound. Here's how the process works:
1. Digital to Analog Conversion: The digital data (binary data) is passed through a Digital-to-Analog Converter
(DAC), which converts it into an electric current.
2. Amplification: The electric current generated by the DAC is very small, so it passes through an amplifier, which
increases the current enough to drive the speaker.
3. Sound Production: The amplified current is fed into the speaker, where it is converted into sound.
How Speakers Work:
• A coil of wire is wrapped around an iron core (making it a temporary electromagnet when an electric current flows
through it).
• A permanent magnet is positioned nearby.
• As the electric current fluctuates, the electromagnet moves towards or away from the permanent magnet, causing the iron
core to vibrate.
• The cone (usually made of paper or synthetic material), attached to the iron core, vibrates and produces sound waves.
Uses of Speakers:
• Found in phones, computers, and other multimedia devices.
• Used for audio output in multimedia presentations.
• Helpful for visually impaired individuals when used with speech generation software to read text aloud.
• Used to play downloaded sound files.
Advantages of Speakers:
• Loud sound output is essential in environments where many people need to hear (e.g., conferences).
• Can enhance atmosphere during presentations.
• Simple technology and can be very effective for communication.
Disadvantages of Speakers:
• Can disturb others in quiet environments (e.g., offices).
• High-quality speakers can be expensive.
• Some speakers can take up a lot of space on a desk.
Actuators
An actuator is a mechanical or electromechanical device that translates computer signals into physical movement.
For example, actuators can control devices like conveyor belts or valves. A common example of an actuator is a
solenoid, which uses an electrical signal to produce linear motion.
How Solenoids Work:
• A coil is energized by a current, generating a magnetic field.
• A plunger (e.g., a metal bar) inside the coil moves when the current is applied, creating linear motion that
can be used to operate physical devices like switches or valves.
Uses of Actuators:
• Controlling motors, pumps, switches, and other mechanical devices.
• Used in systems where analog inputs need to be controlled by a computer.
Advantages of Actuators:
• They allow remote operation of devices, which is critical for safety in environments like nuclear reactors.
• Cost-effective compared to other control devices.
Disadvantages of Actuators:
• They are an additional part of the system and can potentially fail.
• As most actuators are analog devices, a DAC is needed to convert digital signals into a form that can
control them.
What?
○ Storage devices are non-volatile secondary storage
○ Storage medium
▪ the physical device on which the data is actually stored (e.g. a CD).
▪ It’s a physical device that receives and retains electronic data
○ Storage device
▪ the hardware used to read data from or write data to the medium (e.g. CD
reader/writer).
▪ It can read and write data to and from a storage medium
○ There are 3 types of storage device/medium:
▪ Magnetic
▪ Optical
▪ Solid-State
What?
○ Uses properties of magnetism to store data
○ One of the oldest known methods to store data
○ 2 most common types are Magnetic Tape Drives and HDDs
How?
○ An iron oxide coating is magnetised
○ Magnetised = binary 1-value
○ Demagnetised = binary 0-value
Advantages:
○ Each magnetised area v.small so huge amount of data can be stored
○ Magnetic State of Iron Oxide is permanent unless written over again
What?
○ Consist of reels of plastic tape coated in a magnetic oxide layer (e.g. iron oxide).
○ The 1s and 0s, have different magnetic signatures, allowing a read/write head to read and write
data.
How?
○ The tape moves over the read/write head
○ The head is a tiny, induced magnet that can magnetise the tape (to write data) or become ‘excited’
when magnetised tape passes over it (to read data).
Uses:
○ In applications where batch processing is used (e.g. clearing bank cheques, utility billing, etc.). In
these applications there is no need for any specific processing order and speed of data access is not
essential.
○ Used as a backup media where vast amounts of data need to be stored. Data transfer rate is the
○ Used in long-term archiving of data; magnetic tapes have huge data storage capacities and are rate at which data can be
known to be very stable, which makes them ideal for long-term storage. sent from a storage device
Advantages: to a computer (or vice
○ Generally less expensive (per byte) than the equivalent hard disk drive. versa). Data access time is
○ Very robust technology (they do not deteriorate much over time and remain stable). the time it takes to locate
○ They have a huge data storage capacity. specific data stored on the
○ The data transfer rate is actually fast (not to be confused with data access time). storage media.
Disadvantages:
○ Very slow data access times (they use serial access, which means all the previous data needs to be
read until the required data is found) - the data transfer rate is still high.
○ When updating, another tape is needed to store the final updated version; this requires the use of a
master tape (the original tape) and a transaction tape (contains all the changes to be made) to produce
a new master tape. This is clearly a slow way of updating data, and can also introduce errors,
which is why magnetic tapes are no longer a common method of storing data.
○ They are affected by magnetic fields; a strong magnet (e.g.. in a loudspeaker) can corrupt data
stored on the tape.
What?
○ Essentially HDDs external to the computer and can be connected to the computer using one
of the Usb ports.
○ In this way, they can be used as a backup device or another way of transferring files between
computers.
Uses:
○ They can be used as backup systems to prevent loss of data.
○ They can be used to transfer data/files/software between computers.
○ Same as HDDs
Advantages:
○ The data access time and data transfer rate are very fast.
○ They have a large memory capacity.
○ They can be used as a method of transferring information between computers.
Disadvantages:
○ As with fixed disk drives, they can be easily damaged if the user accidentally drops it or does
not correctly shut down the drive after use.
○ Data transfer rate is not as fast as for fixed hard drives.
What?
○ Optical media devices use lasers to read and write data onto plastic (polycarbonate) disks. The
media (disks) rely on the optical properties of certain chemical dyes and metal alloys to enable
the storage of 1s and 0s.
○ The data on the storage medium is read by bouncing the laser beam off the surface of the
medium. If the beam hits a dot it is reflected back differently to how it would be if there were
no dot. This difference can be detected, so the data can be read.
What?
○ They are optical media that can be read from or written to by optical storage devices.
○ Laser light alters the optical properties when writing data
○ Can be designated as one of three:
▪ R - write only once
▪ RW - can be written to or read from many times
▪ ROM - read only
Hardware?
○ Use a thin layer of metal alloy or a light-sensitive organic dye coating to store the data
○ Both use a single, spiral track, that runs from the center of the disk to the edge
○ When disk spins, an optical head in the drive unit moves to the start of the track
○ The laser beam follows the spiral track from the centre moving outwards
○ The read/write head does not actually touch the surface.
○ It is divided into sectors, allowing direct access of data.
○ The outer part of the disk runs faster than the inner part of the disk
How it works?
○ The data is stored on the surface in pits (low points) and lands (high points) - the lands are the
gaps between pits.
○ A red laser is used to read and write the data.
○ The depth of pits is only 20% the wavelength of the laser light used to read the disk
○ The wavelength of the reflected laser light is slightly different to the original wavelength (due to the
pits and lands) causing destructive interference – this allows the pits and lands to be read and
converted to binary data.
How DVD is different - Dual-Layering:
○ One main difference is the potential for dual-layering which increases the storage capacity - there
are two individual recording layers
○ Two layers of a standard DVD are joined together with a transparent (polycarbonate) spacer.
○ A very thin reflector also sandwiched between the 2 layers
○ Reading and writing of the second layer done by red laser focusing at a fraction of a mm
difference compared to the first layer
How DVD is different - Standard:
○ Standard DVDs still have larger storage capacity than CDs as the pit size and track width are
smaller, thus more data space on DVD surface
○ DVDs use lasers with wavelength of 650 nanometers; CDs use lasers with wavelength of 780
nanometers - the shorter the wavelength of the laser light, the greater the storage capacity of the
medium.
CD-ROM/DVD-ROM
Uses:
○ These optical disks are read-only memory (ROM) which means they cannot be written over and
can only be read. They are a permanent method of data storage.
○ CD-ROM is used to store music files and to store software, computer games and reference
software (such as an encyclopedia).
○ DVD-ROM has much larger storage and is used to store films; but now it is increasingly used
to store computer data and the evermore sophisticated games.
○ CD-ROMs and DVD-ROMs are used in applications where there is a real need to prevent
the deletion or overwriting of important data.
Advantages:
○ They are less expensive than hard disk drive systems.
Disadvantages:
○ The data transfer rate/data access time is slower than for hard disks.
What?
○ An Optical storage media but different than DVDs in their construction and way to carry out
read/write operations.
○ Blu-ray discs are read from or written to using a Blu ray optical storage device.
Differences between DVD and Blu-ray:
○ Use blue laser light. This light has a shorter wavelength(405 nm) than red laser light (650 nm),
thus increasing the storage capacity when compared to DVDs.
○ Using blue laser light means that the pits and lands can be much smaller; consequently, Blu-ray
can store up to five times more data than normal DVD.
○ Single-layer Blu-ray discs use a 1.2 mm thick polycarbonate disk; however, dual-layer Blu-
ray and normal DVDs both use a sandwich of two 0.6 mm thick disks (i.e. 1.2 mm thick).
○ They come with built-in secure encryption systems that help to prevent piracy and copyright
infringements.
○ The data transfer rate for a DVD is 10 Mbps and for a Blu-ray disc it is 36 Mbps (this
equates to 1.5 hours to store 25 GB of data).
Comparison of the capacity and interactivity of DVDs and Blu-ray discs:
○ Blu-ray devices allow greater interactivity than DVD devices. For example with Blu-ray, it is
possible to:
▪ record high definition television programmes
▪ skip quickly to any part of the disc
▪ create playlists of recorded movies and television programmes
▪ edit or re-order programmes recorded on the disc
▪ automatically search for empty space on the disc to avoid over-recording
▪ access websites and download subtitles and other interesting features.
Comparison of CD, DVD and Blu-ray
Disk Type Laser Color Wavelength of Disk Construction Track pitch
laser light (distance b/w)
CD red 780 nm single 1.2 mm Polycarbonate layer 1.60 µm
DVD (dual) red 650 nm two 0.6 mm Polycarbonate layers 0.74 µm
Blu-ray (single) blue 405 nm single 1.2 mm Polycarbonate layer 0.30 µm
Blu-ray (dual) blue 405 nm two 0.6 mm Polycarbonate layers 0.30 µm
3. Storage devices and media Page 72
Blu-ray (dual) blue 405 nm two 0.6 mm Polycarbonate layers 0.30 µm
What?
○ Solid-state media eliminates the issue of latency (as in HDDs) as it retrieves all data at the same rate
○ non-volatile, rewritable storage media
○ often referred to as flash memories or flash drives
○ They don’t rely on magnetic properties and have no moving parts
○ Most common types store data by controlling the movement of electrons within NAND chips to create and
read 1s and 0s in a massive grid in a very tiny space.
○ Data is stored as 0s and 1s in millions of tiny transistors (at each junction one transistor is called a floating
gate and the other is called a control gate) within the chip.
○ They can operate at speeds much greater than HDDs or Optical disk drives but still operate at speeds
lower than RAM.
Floating Gate and Control Gate Transistors:
○ Floating gate transistors and control gate transistors use CMOS and NAND technology.
○ Flash memories make use of a grid; at each intersection on the grid there is a floating gate and a control gate
arranged as follows:
○ A dielectric coating separates the two transistors, which allows the floating gate transistor to retain its charge
(which is why the memory is non-volatile).
○ The floating gate transistor has a value of 1 when it is charged and a value of 0 when it is not.
○ To program one of these ‘intersection cells’ a voltage is applied to the control gate and electrons from the
electron source are attracted to it.
○ But due to the dielectric coating, the electrons become trapped in the floating gate. Therefore, we have control
over the bit value stored at each intersection.
What?
○ Solid-state technology is used to create secondary storage devices known as solid-state drives
(SSDs).
○ Solid-state drives have revolutionized computers over the last few years, and they are rapidly taking
over from HDDs as the main type of backing storage.
○ have enabled laptop computers to become thinner and much lighter.
○ given rise to the development of smartphones and tablets
Uses:
○ Same as HDDs
Advantages:
○ they are more reliable (no moving parts to go wrong)
○ they are considerably lighter (which makes them suitable for laptops)
○ they do not have to ‘get up to speed’ before they work properly
○ they have a lower power consumption
○ they run much cooler than HDDs (both these points again make them very suitable for laptop
computers)
○ because of no moving parts, they are very thin
○ Allow for permanent deletion of data
○ SSD data access time is only 0.1 milliseconds compared to 10 milliseconds for HDD
○ data transfer speed for SSDs is also much faster than for HDDs.
Disadvantages:
○ the longevity of the technology - Most solid-state storage devices are conservatively rated at only 20
GB write operations per day over a three-year period, this is known as SSD endurance.
○ The memory chips in SSDs have a limited number of write cycles – this can lead to
unrecoverable data loss
○ Although data access is very fast, the rewriting of data can be slower than HDDs as SSDs
need to delete old data first before writing the new data
○ They are more expensive to buy (per GB) than HDDs
○ If the controller chip, memory cache or one of the NAND memory chips are damaged, it may
be impossible to recover the data
What?
○ small portable devices that make use of solid-state technology
○ connect to the computer through a USB port.
○ Pen drives are examples of USB flash drives which draw their power from the
computer via the USB connection.
○ Some devices combine the functionality of a portable media player with USB flash
storage; such devices require a battery to play music on the go
○ any device that uses solid-state technology can be referred to as a flash drive; a pen drive
(memory stick) is a flash drive with a USB connector.
○ In other words, a pen drive is a type of flash drive with a particular purpose.
Uses:
○ Transporting files between computers
○ using as a backing store.
○ Used as a security device to prevent software piracy (known as a dongle).
Advantages:
○ Very compact and portable media.
○ Very robust.
○ Does not need additional software to work on most computers.
○ They are not affected by magnetic fields.
Disadvantages:
○ Cannot write protect the data/files by making it ‘read-only’.
○ Easy to lose (due to the small physical size).
○ The user needs to be very careful when removing a memory stick from a computer –
incorrect removal (for example, while it is still doing a read/write operation) will corrupt the
data on the memory stick and make it useless.
What?
○ memory card makes use of solid-state technology
○ can be inserted into a device which can read the card or allow data to be written to the card
○ cards come in various memory sizes.
○ many available memory card formats, for example:
▪ SD cards (secure digital card)
□ type of removable memory card
□ designed for use in digital cameras
□ can be written to or read from the camera or other suitable XD card reader
▪ XD cards (extreme digital cards)
□ type of very small card with a very high-capacity memory
□ primarily used in portable devices such as digital video recorders, digital cameras, audio
players, smartphones and tablets
▪ CFast card (compactfast card)
□ was developed to allow solid state technology to be used in a very small portable device
□ no moving mechanical parts and does not need a battery to retain data
□ primarily used as removable memory for higher-end digital photo and video cameras
Uses:
○ Storing photos on digital cameras.
○ Used as mobile phone memory cards.
○ Used in MP3 players to store music files.
○ Used as a backing store in hand-held computer devices
Advantages:
○ Very compact – can be easily removed and used in another device or for transferring photos
directly to a computer or printer.
○ Because they are solid-state memories (and have no moving parts) they are very durable.
○ They can hold large amounts of data.
○ Digital devices, such as compact cameras and smartphones, are able to read and write to memory
cards, allowing the user to transport large collections of photographs, songs or information with
them.
Disadvantages:
○ Expensive per gigabyte of memory when compared to hard disk drives.
○ Have a lower storage capacity than hard disks.
○ Have a finite life regarding number of times they can be read from or written to.
○ Memory cards, specifically the micro SD card, are the smallest storage devices available; this
means they are more likely to be lost, stolen or damaged.
○ Not all computers come with memory card readers built in; users will often be required to purchase
a card reader or USB converter to view the data on a memory card.
3. Storage devices and media Page 77
a card reader or USB converter to view the data on a memory card.
Future
○ both the CD and DVD are showing signs of becoming obsolete
○ computer systems now come only with USB connectors and no internal DVD or CD drive
○ main method of transferring files between devices has become the flash memory
○ Many people now store all their music in the following ways:
▪ on hard disk drive systems (set up as sound systems)
▪ in MP3 format on portable devices
▪ using the cloud to store all their files so they can access their music from anywhere in the world
▪ by streaming their music from the internet; provided the user has an internet connection, they can access
music through any receiving device.
Future of Movies
○ streaming is becoming increasingly more common
○ television sets are now set up as smart televisions – this means it is now possible to simply stream movies or
television programmes on demand
○ meaning DVD and Blu-ray players are no longer needed
○ MAC addresses are useful in identifying network faults since they uniquely identify each device connected
to the network
Internet protocol (IP) address
○ Whenever a device connects to the internet, it is given an Internet Protocol (IP) address supplied by
Internet Service Provider.
○ This will change each time a user connects (website servers keep the same IP value since they don’t log
off the network and are always connected) unlike the MAC address which remains constant
○ Protocols are necessary since they define the rules agreed by senders and receivers of data when
communicating over the internet.
○ There are presently two type of IP address:
▪ IPv4: this is based on 32 bits and is written as four groups of 8 bits (32 bits), for example:
254.25.28.77
▪ IPv6: since IPv4 no longer offers sufficient unique addresses on the internet as it continues to
expand, IPv6 is now being adopted; this uses 128 bits written as eight groups of four hexadecimal
digits, for example: A8FB:7A88:FFF0:0FFF:3D21:2085:66FB:F0FA
4. Networks Page 80
digits, for example: A8FB:7A88:FFF0:0FFF:3D21:2085:66FB:F0FA
Data packets
○ Data moved round networks is split up into data packets; each data packet travels from ‘A’ to ‘B’
independently.
○ The data packet has a header and a trailer.
○ The trailer indicates the end of the data packet and also contains an error-checking mechanism.
○ The header contains the following items:
▪ sender’s IP address
▪ receiver’s IP address
▪ sequence number (so packets can be reassembled in the correct order)
▪ packet size (number of bytes)
▪ number of packets in the whole message.
○ When a router receives a data packet, it checks the recipient IP address against a routing table and
determines the next stage in its journey.
4. Networks Page 81
Network Interface Card
Wednesday, January 29, 2025 3:46 PM
Hubs:
○ hardware devices that can have a number of other devices connected to them.
○ usually found in local area networks (LANs)
○ They deliver all data packets received by a network to all devices on the network.
○ Thus, switches are more secure than hubs (because only the intended device is sent the data) and
do not waste bandwidth (because network traffic is reduced)
Hubs vs Switches
○ hubs and switches are used to exchange data within their own local area networks. They are
unable to exchange data with outside networks (such as the internet)
○ In summary:
▪ both a hub and a switch are used to connect devices in a LAN
▪ both hubs and switches use data packets
▪ hubs send data packets to every device on the network; whereas switches send data packets
to a specific device only
▪ security is lower with hubs than with switches
▪ a switch uses a look-up table to determine the destination device
▪ switches use MAC addresses to locate the destination device.
○ Bridges
4. Networks Page 82
▪ a switch uses a look-up table to determine the destination device
▪ switches use MAC addresses to locate the destination device.
○ Bridges
▪ Bridges are used to connect a LAN to another LAN that uses the same protocol.
▪ They allow separate LANs to be joined to form a single LAN. Bridges cannot
communicate with external networks.
4. Networks Page 83
Routers
Thursday, January 30, 2025 11:32 AM
What?
○ used to route data packets from one network to another network using IP
addresses.
○ Routers are used to join a LAN to the internet or to other external networks
○ When a data packet is received, the router inspects the IP address of the
recipient and determines whether the data packet is intended for its own network
or for another network; if the IP address indicates another network, the data
packet is sent to the next router.
○ Routers use a routing table that contains information about the router’s immediate
network and information about routers in the immediate vicinity helping them deal
with each packet
○ Routers don’t store MAC addresses; only IP addresses are stored
○ Many modern broadband routers combine the function of a router and a switch.
4. Networks Page 84
4. Networks Page 85
Bluetooth And Wi-Fi
Thursday, January 30, 2025 11:45 AM
Both Wi-Fi and Bluetooth offer wireless communication between devices. They
both use electromagnetic radiation as the carrier of data transmission.
Bluetooth
How Bluetooth Works:
1. Pairing (Key Matching Encryption)
▪ When two Bluetooth devices want to connect, they go through a
pairing process.
▪ The devices exchange a temporary key (a short-term encryption
code) to establish a secure connection.
2. Encryption & Secure Connection
▪ Once paired, Bluetooth encrypts the data using the temporary key.
▪ After encryption is confirmed, a long-term key replaces the
temporary one to keep the connection secure.
▪ This means hackers can’t easily intercept the data being transferred.
3. Data Transfer in a WPAN (Wireless Personal Area Network)
▪ A WPAN (Wireless Personal Area Network) is a small, private
network created between the connected devices.
▪ Devices can send and receive files, music, calls, or commands
within this secure connection.
4. Channel Hopping
▪ Once Connected Bluetooth switches between the 79 channels in the
2.4 GHz band to avoid interference with other devices.
▪ It also improves security by making it harder for hackers to intercept
▪ Also prevents signal overlap (like a room full of people all talking)
▪ This is known as spread-spectrum frequency hopping
Uses are:
○ when transferring data between two or more devices which are very close
together (less than 30 m distance)
○ when the speed of data transmission is not critical
for low-bandwidth applications (for example, when sending music files
4. Networks Page 86
○ for low-bandwidth applications (for example, when sending music files
from a mobile phone to a headset).
Wi-Fi
How?
○ Wi-Fi uses radio waves to send and receive data wirelessly in different
frequency bands
○ When you open/request something, it sends the signal to the router and
then the router does its thing
○ 2.4 GHz = longer range, 5 GHz = faster speeds, 6 GHz = ultra-
fast
○ Like Bluetooth, each band is also further split into channels
○ best suited to operating full-scale networks because it offers much faster
data transfer rates
Wi-Fi vs Bluetooth
○ Wi-Fi is best suited to operating full-scale networks because it offers much
faster data transfer rates, better range and better security than Bluetooth.
○ A Wi-Fi enabled device can access, for example, the internet wirelessly at
any access point (AP) or ‘hot spot’ up to 100 m away.
○ can connect many devices to a network at the same time
4. Networks Page 87
Cloud Computing (Storage)
Thursday, January 30, 2025 12:25 PM
What?
○ Cloud storage is a method of data storage using physical remote servers. The data is
frequently stored on more than one server in case maintenance/ repairs need to be
carried out (this is called data redundancy).
○ There are 3 common types of cloud storage:
▪ Public Cloud
□ Owned by a cloud company (e.g., Google Drive, Dropbox,
OneDrive
□ Used by multiple businesses/individuals
□ Accessible via the internet from anywhere
▪ Private Cloud (Exclusive & Secure)
□ Owned by a single company or organization
□ Runs on dedicated servers (not shared with others)
□ Usually protected by a firewall for better security
□ Example: A bank storing customer transactions on its own private servers
▪ Hybrid Cloud (Best of Both)
□ Mix of public and private clouds
□ Sensitive or critical data is kept in a private cloud
□ Less sensitive data is stored in a public cloud
□ Example: A hospital stores patient records in a private cloud but keeps
general medical research in a public cloud.
Advantages:
○ Client files stored in the cloud can be accessed at any time, from any device,
anywhere in the world, provided internet access is available
○ There is no need for a customer/client to carry an external storage device with
them, or even use the same computer, to store and retrieve information
The cloud provides the user with remote backup of data to alleviate data loss/disaster
4. Networks Page 88
○ The cloud provides the user with remote backup of data to alleviate data loss/disaster
recovery
○ If a customer/client has a failure of their hard disk or backup device, cloud storage
will allow recovery of their data
○ The cloud system offers almost unlimited storage capacity (at a price!)
Disadvantages:
○ Security aspects of storing data in the cloud
○ If the customer/client has a slow or unstable internet connection, they could have
problems accessing or downloading their data/files
○ Costs can be high if a large storage capacity is required; also high
download/upload data transfer limits with the customer/client Internet Service
Provider can be expensive
○ Potential failure of the cloud storage company is always possible – this poses a risk
of loss of all backup data
Advantages of Buying cloud storage as a user:
○ You do not need to carry memory sticks around with you if you want to access your
files away from home.
○ You do not have to pay for large storage capacity on your computer/tablet or
mobile phone.
○ Because the cloud is controlled by external companies, they will ensure that your files
are backed up and therefore reduce the possibility of losing irreplaceable data.
○ The ability to synchronise (sync) files ensures they are automatically updated across
all devices.
○ Cloud storage is also ideal for collaboration purposes; it allows several users to edit
and collaborate on a single file or document – there is no need to worry about
tracking the latest version or which user made the changes.
Security worries:
○ Data Security:
▪ What physical security exists in the building housing the servers?
▪ How well protected are the servers against natural disasters or power cuts?
How secure is the data with regards to personnel who work for the cloud
4. Networks Page 89
▪ How secure is the data with regards to personnel who work for the cloud
provider?
○ Data Security:
▪ There have been cases of data loss through hacking (these breaches include the
leaking of Facebook accounts in 2019 and Capital One bank had 80,000
banks accounts hacked in 2019)
4. Networks Page 90
Network Types
Thursday, January 30, 2025 1:48 PM
4. Networks Page 91
Local Area Networks (LAN)
Thursday, January 30, 2025 1:51 PM
What?
○ Covers a small area (like a home, school, or office).
○ Uses wired (Ethernet) or wireless (Wi-Fi) connections.
○ Consist of a number of computers and devices (for example,
printers) which will be connected to hubs or switches.
○ One of the hubs or switches will usually be connected to a router to
allow the LAN to connect to external networks, such as the internet.
Advantages:
○ The sharing of resources, such as hardware (e.g. a colour laser
printer) and applications software (word)
○ Better communication between users of the LAN
○ A network administrator can control and monitor all aspects of the
network (e.g. changing passwords, monitoring internet use and so
on)
Disadvantages:
○ Easier spread of viruses throughout the whole network
○ Queues can form for shared resources (such as a printer), which
can be frustrating
○ Slower access to external networks, such as the internet
○ Increased security risk when compared to stand-alone computers
○ If the main server breaks down, in many types of network
structures, the network will no longer function properly
4. Networks Page 92
Wireless Local Area Network
(WLAN)
Thursday, January 30, 2025 2:01 PM
What?
○ A type of LAN that uses Wi-Fi instead of cables.
○ Allows wireless devices (laptops, phones, tablets) to connect.
○ Uses a Wi-Fi router or access point to send signals.
○ APs, are connected into a wired network at fixed locations
Access Points (AP):
○ An Access Point (AP) is a device that provides Wi-Fi by connecting to a wired
network (LAN) and broadcasting a wireless signal.
○ So it basically Expands Wi-Fi Coverage within a LAN
○ In home networks, the Wi-Fi router acts as both a router and an access point
○ In large networks (like schools, offices, malls, airports), multiple access points are
placed around the building so devices can stay connected while moving.
○ APs use either spread-spectrum technology (which is a wideband radio frequency
with a range of about 30 to 50 metres) or infrared, but this has a very short
range (about 1–2 metres) and is easily blocked, and therefore infrared has limited
use.
4. Networks Page 93
4. Networks Page 94
Wide Area Networks (WAN)
Thursday, January 30, 2025 2:22 PM
What?
○ Covers a large area (city, country, or even the whole world).
○ Uses telecom services (fiber optics, satellites, telephone lines, mobile
data).
○ The largest WAN is the internet.
○ if a number of LANs are joined together using a router, then they
can
○ The network of ATMs (automated teller machines) used by banks
is one of the most common examples of the use of a WAN. form
a WAN
○ Due to the large geographical distances, WANs make use of the
public communications infrastructure (e.g. telephone lines and
satellites)
○ but sometimes use private dedicated lines if greater security is
needed.
○ A typical WAN will consist of end systems and intermediate
systems:
4. Networks Page 96
Authentication Methods
Thursday, January 30, 2025 2:31 PM
Many aspects of security (such as hacking, phishing, pharming and viruses) are covered
in depth in Chapter 8 (Section 8.3). This section covers some of the more general aspects
of internet security, together with how we use networks to communicate
4. Networks Page 97
4. Networks Page 98
Passwords
Thursday, January 30, 2025 2:32 PM
4. Networks Page 99
Zero Login and Biometrics
Thursday, January 30, 2025 2:49 PM
How?
○ The cards have a magnetic stripe on the reverse side(made up of
tiny magnetic particles on a plastic film)
○ Each particle can act as a north-pole or a south-pole (which
corresponds to the two binary values of 0 and 1)
○ stripe is read by swiping it through a card reader. Data such as
name, ID number, sex, and date of birth may be contained on a
magnetic stripe when used as a security device to allow entry to a
building, for example.
○ Some ID cards also use a holographic image (hologram) to make
forgery difficult
○ Another form of security is to etch the card users face onto the
card. This way stolen cards cannot be used as they don’t match the
perpetrator
Advantages:
○ They are easy to use.
○ It is not an expensive technology.
○ Magnetic cards can be remotely deactivated (if lost or stolen).
○ The cards can be multi-purpose (for example, door key cards,
network access cards or used in vending machines to buy food or
drink).
Disadvantages:
○ Less secure than, for example, biometric methods (no encryption is
used and the stripe contents can be copied fairly easily).
○ The cards wear out with a lot of use.
○ Magnetic readers often fail to read the cards on first attempt.
What?
○ By inserting a tag (chip and antenna) into a security card, it can act as a smart
contactless card
○ it can be read from a distance and does not have to be swiped through a card
reader
○ The chip on the smart card can store data such as name, security number, sex,
date of birth and a PIN
○ If the card is in a wallet or a pocket as the owner of the card walks up to a
security gate, readers on either side of the gate quickly scan the security data
stored on the RFID tag embedded in the card. The user will then be invited to
enter a PIN on the keypad. If all details match, then access will be allowed.
What?
○ a form of authentication in the form of a physical, solid object.
○ user’s interaction with a login system is used to prove that the user has possession
of the token.
○ Physical tokens contain internal clocks and when a PIN and other authentication
details are entered, then a one-time password (OTP) is generated.
○ The OTP is shown on a small screen. The code changes on a regular basis and
is usually only valid for less than a minute.
○ This clearly enhances security, because a thief needs to have in their possession: the
token device, a cloned card and the PIN to allow them to gain access.
○ This is a classic example of a multi-factor authentication method. There are two
types of physical tokens:
▪ a disconnected physical token – this is the type described above, where a
separate device is used, requiring the user to key in data manually using a
keypad
▪ a connected physical token – this type of token transmits the generated one-
time password directly to a computer through a USB connection; the user
does not need to manually enter data.
What?
○ software installed on a user’s device, such as a smartphone.
○ If a user wants to log onto a website requiring electronic tokens when the website
asks for the token the user can enter the OTP which is valid for less than a
minute received on the software on his phone to authenticate herself
○ The website server runs the same software as the app. Because both the server and
smartphone have synchronised clocks, they will generate the same numbers. Once
the OTP and other form of authentication are verified by the website, the user will
be allowed access.
What?
○ It is a type of anti-malware software
○ Used to protect devices against a possible virus attack
○ It should be loaded onto a computer and then run to allow software and devices to
be scanned for viruses
○ a virus check should be carried on a device before transferring data or software to
it.
○ Running it in the background will have it constantly check for virus attacks
○ Most anti software have the common features:
▪ They check software or files before they are run or loaded on a computer.
▪ Anti-virus software compares a possible virus against a database of known
viruses.
▪ They carry out heuristic checking – this is the checking of software for types
of behaviour that could indicate a possible virus; this is useful if software is
infected by a virus not yet on the database.
▪ Any possible files or programs which are infected are put into quarantine
which:
□ allows the virus to be automatically deleted, or
□ allows the user to make the decision about deletion (could be a false
positive and is one of the drawbacks of anti-virus software).
▪ Anti-virus software needs to be kept up to date because new viruses are
constantly being discovered.
▪ Full system checks need to be carried out once a week, because some viruses
lie dormant and would only be picked up by this full system scan.
What?
○ a communication method that uses both video and sound
○ substitute for face-to-face conferences between a number of people
separated by distance (diff. part of country or overseas)
○ carried out in real time and makes use of some form of network
○ Basic hardware needs are:
▪ webcams
▪ large monitors/television screens
▪ microphones
▪ Speakers
○ Few items to consider when conference is about to begin:
▪ It is essential to agree a time and date for the conference to take
place.
▪ The delegates in each conference room must log into the video-
conference system.
▪ The video-conference set-up needs to be checked before the meeting
goes live.
▪ Webcams need to be placed so that all the delegates in the room are
within visual contact (the webcams will capture the images and then
transmit them to the other delegates).
▪ Microphones need to be placed centrally so that all of the delegates
can speak – the sound is picked up by the microphones and is
transmitted to the other delegates through their speakers.
▪ It is important for one person to be the main contact in each
conference room to make sure each delegate is able to be heard; this
is particularly important if more than two video-conference rooms
are linked up at the same time.
4. Networks Page 112
are linked up at the same time.
○ Software also plays an important role:
▪ Webcam and microphone software drivers
□ sometimes referred to as hardware drivers
□ It is vital that the correct software is used to ensure that the
webcam and microphone transmit their images and sound to the
other delegates
▪ CODEC
□ CODEC can stand for Coder - Decoder or
Compression - Decompression
□ first is used to encode or decode the digital data stream to allow
data to be transmitted (encoded) and played back (decoded)
□ second is used to compress the data before it is transmitted and
then decompress it again at the receiving conference room
▪ Echo cancellation software
□ allows talking to take place in real time and permits the
synchronisation of communication
□ Microphones can pick up sound from the speakers (creating
an echo)
□ this software copies received signals and checks for parts of the
signal that reappear but are delayed slightly
□ The reappearing parts are removed from the signal (the echo is
removed
Advantages:
○ As people are in their own building, it is much easier to access important
documents or bring in ‘experts’ at key parts of the conference
○ It is possible to hold conferences at short notice (a conference date can be
set up within a few hours as no person needs to travel very far)
○ Not travelling physically to meetings reduces costs:
▪ reduced travelling costs
no need to pay for hotel accommodation or venue hire
4. Networks Page 113
▪ no need to pay for hotel accommodation or venue hire
▪ it also reduces the cost of taking people away from their work
(they're still paid their wage while not in office) for two or three
days to travel
○ It may be better to use video conferencing than have delegates travel to
potentially unsafe places around the world.
○ It is better for the environment – less travel means less pollution.
○ It connects people in an organisation who might be otherwise left out, for
example, people not based at the headquarters.
Disadvantages:
○ There is potential time lag in responses/delays when talking.
○ Images can jerk – usually due to poor internet/network performance or
poor bandwidth.
○ It can be very expensive to set up in the first place (both the hardware
and the software are expensive to purchase and get set up correctly).
○ There can be problems if the delegates live in different countries where the
time zone differences are large.
○ Training people to use the system correctly can be both costly and time
consuming.
○ It can be demotivating for staff if they believe that one of the ‘perks’ of
their job is international travel.
○ The whole system relies on a good network connection – if it breaks
down or the signal strength is diminished in any way, then the video
conference can be almost unusable.
What?
○ Audio conferencing refers to meetings held between people using audio (sound)
equipment.
○ can be done over the standard telephone network (a phone conference)
○ procedure to be carried out during a phone conference is:
▪ The organiser of the phone conference is given two PINs by the phone
company. One PIN is the personal PIN (e.g. 2151) given to the
organiser and the second PIN is the participant’s PIN (e.g. 8422)
▪ The organiser contacts all of the participants and informs them of their PIN
and the date and time of the phone conference.
▪ When the phone conference is about to start, the organiser dials the conference
phone number and, once they are connected, keys in their personal PIN
(2151 in this case)
▪ The participants then call the same conference number to join in – once they
get through they each input the PIN given to them by the organiser (8422
in this case). Without this PIN, it would be impossible to join the phone
conference.
○ Equipment for audio conference over a telephone is just a telephone
○ also possible to hold an audio conference using a computer, as long as a
microphone and speakers are connected
○ This makes use of Voice over Internet Protocol (VoIP)
○ also possible to connect an internet telephone, which usually plugs into the router or
other internet device
○ In this case equipment can include:
▪ a computer (with built-in microphones and speakers)
▪ external microphone and/or speakers
▪ an internet phone
▪ a standard phone.
○ Using VoIP allows an organiser to create a group of people to take part in the
conference call.
○ When the conference is to take place, the organiser clicks on the required group
and the conference is initiated.
○ VoIP allows communication using voice, instant messaging and video (by using an
attached webcam)
If some of the users do not have an internet connection or do not have access to a
What?
○ often referred to as a webinar or webcasts
○ uses the internet to permit conferencing to take place.
○ Multiple computers are used with this system, all connected over the internet
○ carried out in real time
○ allows the following types of meeting to take place:
▪ business meetings to discuss new ideas
▪ presentations
▪ online education or training
○ only requirement is a computer and a high-speed, stable internet connection
○ To carry out web conferencing each user either:
▪ downloads an application
▪ logs on to a website from a link supplied in an email from the
conference organiser
○ Delegates can leave or join the conference as they wish
○ organiser can decide on who can speak at any time using the control panel
on their computer
○ if a delegate wishes to speak, they raise a flag next to their name
○ Delegates can post comments using instant messaging for all delegates to see
at any time
○ Some of the main features include:
▪ Slide presentations using presentation software can be posted on the
conference website in advance of the meeting.
▪ The host’s computer screen can be shared for live presentations, or
other live demonstrations.
▪ It is possible for any delegate to draw or write on a ‘whiteboard’
using their own keyboard or mouse.
4. Networks Page 117
using their own keyboard or mouse.
▪ It is possible to transmit images or videos using the webcam throughout
the conference.
▪ Documents can be shared by first uploading them to the website
before the conference begins.
▪ it is possible to chat verbally or by using instant messaging throughout
the conference.
Using microprocessor-controlled devices in the home can have positive and negative effects on our:
○ lifestyle
○ leisure time
○ physical fitness
○ data security
○ social interaction
Many common household devices are now fitted with microprocessors to control a large number of their functions. The
devices fall into two main groups:
○ Labor-saving devices (group 1):
○ labor-saving device allows people to get on with other things while the device carries out their tasks
▪ automatic washing machines
▪ microwave ovens
▪ cookers
▪ automatic dishwashers
▪ robotic vacuum cleaners
▪ bread-making machines
▪ smart fridges and freezers
○ Other devices (group 2):
○ Microprocessors within the second group of devices make them easier to use and gives them additional features, such as
‘intelligent tuning’ in television sets
▪ alarm clocks
▪ television sets
▪ central heating and air-conditioning systems
▪ home entertainment systems
▪ mobile phones and tablets
the effects of microprocessor-controlled labor-saving devices on a person’s lifestyle,
leisure time and physical fitness:
some of the more general ways in which all microprocessor controlled devices can affect our lives. This table includes devices
which are not necessarily labour-saving, and simply use microprocessors to improve their functionality:
Using IT equipment for long periods of time can impact on a user’s health. Table 5.7 considers the most common health risks
and shows ways to eliminate or reduce the risk.
There are several communication systems that make use of ICT technology. For example:
○ newsletters and posters
○ websites
○ multimedia presentations
○ media streaming
○ e-publications.
How?
○ Newsletters and posters can be produced very easily using, most commonly, a word processor
○ Often, the newsletter or poster will have photos which have been taken specially or have been downloaded
from the internet (with the permission of the copyright holder).
○ The following is fairly typical of how such a document would be produced on a computer system. (No
order):
▪ First a word-processor application would be opened
▪ Photos could be obtained by:
□ using a digital camera and taking photos
□ searching for images/photos on the internet
□ or suitable photos could already be stored on the hard drive or cloud
□ using hard copy photos, which could be scanned in.
▪ If necessary, camera images would then be uploaded (either by connecting the camera or camera
memory card) to the computer via a USB port, or by using Bluetooth connectivity).
▪ Photos from all selected sources would then be saved to a file on the HDD or SSD.
▪ When the user is finally ready to produce the document, the photos would be imported from the file
stored on the HDD/SSD.
▪ Once imported, photos would need to be cropped, edited and/or resized.
▪ Text would be typed in using a keyboard.
▪ Alternatively, any previously saved text would need to be imported.
▪ Photos need to be placed in their correct position and the text wrapped.
▪ Finally, the whole document would need to undergo proofreading for errors and then saved, ready
for printing.
○ Very often, other features, such as a spell checker, would be used to make sure no mistakes had been
made.
○ Care needs to be taken when using a spell checker for the following reasons:
▪ The language used in checking the spelling could be different; for example, British English and
American English often have different spellings of words.
▪ Names or proper nouns might be highlighted as an error by the spell checker, but may be acceptable.
▪ Similar sounding words need to be checked; for example, where, were or wear all sound the same
but have very different meanings – these will not be picked up by the spell checker (but might be
picked up by a grammar checker).
▪ The (correct) highlighted word may not exist in the spell checker dictionary.
Newsletters
○ very useful method for getting important information to a target group
○ for example, you are doing a fundraising exercise, a well presented newsletter to accompany the
fundraising would be invaluable.
○ can be either printed out or available online as an e-publication
○ the method used depends on who the target audience is
○ With a printed document handed personally to somebody, you can be certain they have seen the newsletter
○ in both cases it is nearly impossible to be certain that they have read it
○ A few of the common guidelines to produce an attractive newsletter include:
Do not try and squeeze too much information onto one page.
6. ICT Applications Page 129
▪ Do not try and squeeze too much information onto one page.
▪ Use very clear, easy-to-read fonts (for example, Arial or Trebuchet MS) and use a suitable font
size (11-, 12- or 14-point font size).
▪ Decide on whether to use columns (a useful feature if there are diagrams and photos).
▪ Avoid using capital letters as this appears to be ‘shouting’!
▪ Use bold text in headings rather than underlining text.
▪ Use real photos rather than clip art to make the newsletter more interesting.
Posters
○ good way of publicising
○ for example, a sporting event or an advertisement for a forthcoming movie.
○ A sporting event poster would need to include at least the following information:
▪ what the event is and where it will take place
▪ date, time and place of event
▪ admission fees (if any)
▪ contact details
▪ other information (such as whether there will be facilities for people with disabilities)
○ The movie poster would need to include:
▪ an image taken from the movie to give some idea of the type of movie (that is, comedy, horror,
science fiction, and so on)
▪ the date of release
▪ a list of the main characters.
○ posters can be printed out using high-quality printers or can be posted online
○ Printed posters can be any size.
○ Large posters have the advantage that they are eye-catching and usually very difficult to miss.
○ They are used in many countries on the sides of roads so motorists see them on their way to work
○ By placing the posters in strategic positions, it is possible to target certain people rather than the general
public
○ The drawback is the cost of display (the advertising areas can only be rented)
○ and that they are subject to weather conditions, so only have a limited life.
What?
○ Rather than producing newsletters and posters by printing them out, it is possible to
use websites for advertising.
○ This method of advertising requires a company to either
▪ develop their own website
▪ or pay another company to advertise on their website
○ Using the first option
▪ may require the company to either employ a team of web designers or go to a
specialist company with experience in website design.
▪ Might need to buy hardware and software to develop and store the website.
▪ This method can therefore be expensive.
▪ programmers will be needed to secure their website from hackers and from
pharming attacks.
○ It has, however, become much easier and cheaper for individuals or small
organisations to create and host their own website, using off-the-shelf content
management systems to organise content, and pay hosting fees to rent space on a
web server.
○ The main reasons for using websites, rather than newsletters or posters for
advertising products and services:
▪ Advantages
□ sound/video/animation can be added
□ links to other pages and websites can be added in hyperlinks and hot
spots
□ buttons to navigate/move around the website, leading to more
information
□ ‘hit counters’ allow the owner to see detailed information about how
many people have visited the website
6. ICT Applications Page 131
many people have visited the website
□ can be seen by a global audience
□ cannot be defaced or thrown away
□ it is much easier to update a website (and there is no need to do a
reprint and then distribute the new version)
▪ Disadvantages
□ websites can be hacked into and modified or viruses introduced
□ risk of potential pharming
□ it is necessary for the potential customers to have a computer and internet
connection
□ it is not as portable as a paper-based system (although with modern
smartphones and phablets this is fast becoming untrue)
□ possible for customers to go to undesirable websites (either by accident or
as a result of a pharming attack) – this can lead to distrust from
customers
□ there is a need for the company to maintain the website once it is set
up – this can be expensive
□ because it is a global system, it is more difficult to target the correct
audience using website advertising
□ still need to find a way for people to find out about the website
What?
○ Presentations that use animation, video and sound or music are generally much
more interesting than static presentations done on slides or paper.
○ produced using one of the many software packages on the market
○ used with a multimedia projector so that the whole audience is able to see the
presentation
Advantages
○ use of sound and animation/video effects which are more likely to grab the
attention of the audience, and can make the presentation easier to understand
○ possible to have interactive hyperlinks built into the presentation; this means the
presentation could access a company’s website or even key files stored on the cloud
(such as video footage, images, spreadsheets and so on)
○ use of transition effects allow a presentation to display facts in a key or
chronological order
○ can be interactive
○ more flexible; because of the links to websites and other external systems (for
example, the cloud), the presentation can be tailored to suit a particular audience.
Disadvantages
○ a need to have special equipment which can be expensive
○ danger that equipment could fail while giving multimedia presentations
○ there may need to be internet access
○ danger when using multimedia in presentations that the focus is on the medium (that
is, the multimedia presentation) rather than the message or facts
○ very easy to make a bad presentation with too many animation effects and too much
text or images.
What?
○ when users watch movies/videos or listen to music on devices connected to the
internet
○ no need to actually download or save
○ Streaming is a continuous transmission of video or audio files from a remote server
where the files are stored
○ data is transmitted and played in real time
○ when downloading it is necessary for the user to store the entire file on the
computer’s HDD or SSD first, using up storage and download times.
○ With streaming, the file is sent as a series of packets of data. Each packet is
interpreted by the web browser.
○ Streaming only works well if the internet speed is stable, and at least 25
Mbits/second (for an HD video)
Buffering
○ Because the playback of the media files is usually much faster than the rate at
which data is received over the internet, data packets are buffered in the computer
○ Buffering makes sure the video plays back smoothly without freezing
○ While the buffer is receiving data packets, it will be sending the data from the
previous data packets to the playback device
○ While the buffer is receiving data packets, it will be sending the data from the
previous data packets to the playback device
○ Obviously, having a large buffer will considerably reduce the possibility of freezing
the play back
What?
○ Most material which is published on paper is also available in an electronic format.
For example:
▪ e-books
▪ digital magazines
▪ digital newspapers
▪ digital libraries
○ the publication can be downloaded to a device connected to the internet where it can
be read
○ Moving between pages is usually done by swiping a finger across the screen
○ have the advantage that pages can be expanded in size and it is possible to include
media
○ Specific devices, such as the Kindle, have been developed to allow a library of e-
books to be stored on the device
○ use a white background with black text to fully replicate reading a normal book
○ no printing costs are incurred, e-publications are usually cheaper
Mobile phones communicate by using towers inside many cells networked together to
cover large areas
The towers allow the transmission of data throughout the mobile phone network
How?
○ Each tower transmits within its own cell. If you are driving a car and get to
the edge of a cell, the mobile phone signal starts to weaken.
○ This is recognised by the network and the mobile phone then picks up the
signal in one of the adjacent cells.
○ If a person is making a call or sending a text to somebody in a different
country, then satellite technology is used to enable the communication to take
place.
What?
○ Mobile devices either use a SIM (subscriber identity module) card to allow it
to connect to the mobile phone cellular network, or they use wireless internet
connectivity
○ Together they allow all of the following features:
▪ SMS (short message service) messaging
▪ phone calls
▪ Voice over Internet Protocol (VoIP) communication
▪ video calling
▪ internet access.
What?
○ Because mobile phones are so small and they have their own power source, they
are an ideal way of keeping in touch anywhere, provided there is a network signal.
○ Mobile phone networks are still not as stable as landline systems and for that reason
alone, landline phones are still in common use
○ Using mobile phones to make phone calls has the following advantages:'
▪ There is no need to look for an operational public telephone in an emergency.
▪ It is possible to conduct business or personal phone calls on the move.
▪ It is easier to keep in contact with co-workers at the office no matter where
you are.
Any mobile device can connect to the internet either using a wireless broadband connection
or via the mobile phone network
Due to the use of smaller screens, internet pages displayed on mobile phones are often
different to those on desktop or laptop computers
Software detects which type of device is connecting to a website, which then sends out the
web page optimised for that device
Mobile devices also have a built-in feature which automatically selects wireless broadband
connectivity (if possible), instead of the mobile phone network, when connecting to the
internet. This has the following advantages:
○ less expensive (mobile phone company ‘data plans’ often have a cap on how much
data can be downloaded, and charge for exceeding this maximum)
○ lower power consumption (Wi-Fi routers are usually much closer than the mobile
phone towers; the longer the range, the greater the power consumption)
○ quality of service (Wi-Fi usually offers greater bandwidth than the mobile phone
network giving the possibility of downloading more data more quickly)
COMPUTER MODELLING
A simulation is the creation of a model of a real system in order to study the behaviour
of the system
The model is computer-generated and is based on mathematical representations.
The whole idea is to
○ try and find out how a system behaves
○ predict the behaviour of the system in the future
○ see if it is possible to influence this future behaviour
Advantages of using models
○ Using computer models is less expensive than having to build the real thing (for
example, a bridge!).
○ On many occasions it is safer to use a computer model (some real situations are
hazardous, for example, chemical processes).
○ Computer modelling allows you to try out various different scenarios in advance.
○ It is nearly impossible to try out some tasks in advance in real life because of the
high risk involved or the remoteness (for example, in space, under the sea, in
nuclear reactors, when crash testing cars, etc.).
○ It is often faster to use a computer model than do the real thing (some applications
would take years before a result was known, for example, climate change
calculations, population growth, etc.)
Disadvantages of using models
○ A model is only as good as the programming or the data entered; the simulation will
depend heavily on these two factors.
○ Although building the real thing can be expensive, sometimes computer modelling is
also a very costly option, and the two costs need to be compared before deciding
which to use.
○ People’s reactions to the results of a simulation may not be positive; they may not
trust the results it produces (there will always be a difference between the results
from modelling and reality)
6. ICT Applications Page 143
from modelling and reality)
Examples where computer modelling is used include:
○ personal finance
○ bridge and building design
○ flood water management
○ traffic management
○ weather forecasting.
The Figure below uses a spreadsheet to model the sales of a tuck shop in a school.
When an engineer or architect designs a new building or bridge, it is necessary to test the
design long before construction
3D computer modelling is used to try out a number of scenarios to ensure the final design
meets critical criteria
Simulation of the final structure is often done as a combination of computer modelling and
wind-tunnel tests on scale models of the final designs.
when building a bridge, the modeller has to consider a number of scenarios:
○ the amount of traffic that might be caught in a traffic jam on the bridge in the event of
an accident; this could lead to very heavy loading on the bridge structure
○ the effects of strong winds; can the bridge design withstand the worst-case scenario?
○ the effect of earthquakes; is the bridge earthquake-proof?
○ the effect of tidal waves and ice floes during extreme weather conditions; can the pillars
supporting the bridge withstand these conditions?
○ the effects of vibrations – there have been cases over the years where bridges have
collapsed due to, for example, wind causing the bridge to sway at its ‘natural
frequency’.
All of these scenarios can be tested using a computer model
The design can then be modified on the computer if any of the above scenarios caused the
bridge to fail.
To ensure the computer model gives good results, a scale model of the bridge would then be
constructed and subjected to wind-tunnel (and other) trials
Similar methods are used when designing new buildings, particularly skyscrapers.
when testing a building, a number of scenarios need to be considered:
○ The effect of natural phenomena such as
▪ hurricane winds
▪ Flooding
▪ Earthquakes
▪ any other potentially damaging phenomena
wind movement is a key issue with tall buildings
6. ICT Applications Page 146
▪ wind movement is a key issue with tall buildings
□ a 100-storey building may sway one metre to the left and then one metre to
the right, cycling every ten seconds, in strong winds
□ can the building survive such movement, will such movement be unpleasant or
frightening to human occupants, and so on)
○ the effect of a disaster, such as a fire – how does the structure stand up to such
scenarios?
○ how is it possible to move people around the building efficiently (some large structures
have over 5000 people working in them and there is a need to model elevator movements
to move people efficiently)?
All of these scenarios can be tested using a computer model
The design can then be modified on the computer if any of the above scenarios caused the
building to fail.
To ensure the computer model gives good results, a scale model of the building would then be
constructed and subjected to wind-tunnel (and other) trials
Computer modelling provides the following features:
○ It is possible to zoom into images so that fine details can be seen.
○ The design can be rotated in a number of different ways to allow different views of the
design to be made.
○ Building a bridge or building is expensive and dangerous if the final design had a
serious flaw; modelling should allow any potential design flaws to be detected before any
construction starts.
○ Various scenarios can be tried out to see the effect on the design (see earlier list of
scenarios).
What?
○ Flood water management uses computer modelling to perform a risk assessment to identify sources of potential flooding, the
extent of flooding and how any mitigation or protection measures could work.
○ Computer models are used to predict water levels, water flows and potential flood depths.
Input to the system could include:
○ cross-section of rivers and sea inlets (for example, bottlenecks)
○ dimensions of any bridges, weirs or sluices in the flood area
○ factors that can affect water flow rates (for example, tides are affected by the time of year and by strong winds)
○ boundary conditions (for example, upstream flows into rivers and downstream water levels)
○ the start and finishing date for the simulation
○ calibration data (observation of actual flooding in the past).
Once a flood simulation model is created, a plan can be made to prevent future floods.
After defences are built, new data is added to the model, possibly leading to more defences or changes to the current system.
Over years of flooding, many barriers were built. Computer models help predict how these barriers will react to different flood
scenarios, allowing various solutions to be tested before building anything. Based on modeling, Venice chose a computer-based
flood system instead of a manual one, due to its advantages.
Advantages of computer-based flood system over a manual one:
○ Sensors could be used out in the bay area to monitor sea height and wave height (and possibly other factors, such as
wind speeds); sensors would give a much faster response to any deteriorating conditions in the bay.
○ Using a computer system is safer, since using humans to monitor conditions could potentially put them at risk.
○ Data collection is continuous and more accurate than manual measurements (readings can also be taken more frequently).
○ Because of the faster response, city dwellers can be warned well in advance of any flooding.
○ Data from the sensors could also be fed into the simulation modelling the flood area; this could lead to further
improvements as more data is gathered, which means the simulation becomes closer to reality.
○
Computer modelling can be used in traffic management. We will consider two different
situations.
Closure of motorway lanes
• Repairs are needed on the central barriers of an eight-lane motorway.
• A company must model how these roadworks will affect traffic flow.
• Two traffic control methods are being considered and need to be simulated.
• These two models will be shown on computer screens to represent the motorway
lanes.
• Models A and B will be tested with various traffic densities at different times of
day.
• Different speed limits through the roadworks will also be simulated.
• The effect of a vehicle breakdown will be included in the simulation.
• Changing conditions helps find the best traffic flow and quickest repair setup.
• This method is safer, cheaper, and faster than testing on a real motorway.
Traffic Light Simulation
• Figure 6.11 shows a second use of computer modelling in traffic management – a
set of traffic lights are to be modelled at a Y-junction.
Robots are widely used in manufacturing for both heavy and delicate tasks.
Examples include:
• Car body paint spraying
• Car bodywork welding
• Microchip manufacturing
• Electrical goods production
• Stock movement in automated warehouses.
Robots are controlled via embedded microprocessors or connected computer systems.
Programming methods:
1. The robot is directly programmed with a sequence of instructions for tasks (e.g.,
paint spraying).
2. A human performs the task manually, and the robot learns by:
○ i. Being guided by the human, with each movement recorded.
○ ii. Using sensors strapped to the human’s arm to record detailed movement
data, like position and rotation.
Once instructions are saved, the robot arm automatically carries out tasks identically each
time (e.g., assembling TV parts), ensuring a consistent product.
Robots use sensors to gather information about their surroundings, preventing errors,
such as:
• Stopping if no car is present for spraying
• Halting the operation if the paint supply runs out.
Robots excel at repetitive tasks but are less effective for complex or varied tasks (e.g.,
making specialist glassware), where human operators are often better.
Disadvantages of using robots:
• They can work in hazardous environments for humans.
• They operate 24/7 without rest.
• Long-term cost-effective (no wages, though expensive to buy).
• Higher productivity (no need for holidays).
• Greater consistency in tasks (e.g., identical cars on a production line).
6. ICT Applications Page 157
• Greater consistency in tasks (e.g., identical cars on a production line).
• Handle boring, repetitive tasks, freeing humans for skilled work (e.g., quality
control, design).
• Can perform various tasks by using different attachments (e.g., spray gun, welding
gun).
Disadvantages of using robots:
• Robots struggle with "unusual" or one-off tasks (e.g., custom glassware).
• They can lead to higher unemployment by replacing skilled labor.
• Certain skills (e.g., welding) may be lost due to robot usage.
• Factories can be moved globally, causing unemployment in certain areas.
• Initial setup and maintenance of robots can be costly.
Teachers can use spreadsheets to track student performance efficiently by recording test
results over a term or year. Here are some of the key benefits of using spreadsheets in
this context:
• Track individual performance: Teachers can easily monitor each student's progress
and compare their performance against other students in the same subject.
• Data import: Spreadsheets allow easy integration of data into reports, helping
teachers create summaries of a student's performance over the academic year. This
makes it easier to analyze and communicate progress.
School management systems are useful for recording students' performance, which
includes both academic achievement and behavior. To generate an end-of-term or end-
of-year report, the system requires access to data such as:
• Exam and test results in all subjects studied during the term or year
• Behavioral data, including attendance records and the number of times a student
was in detention
• CAT scores, which are standardized test results used to measure students against a
set standard.
After processing the data, the system could produce:
• The average grades for all students in a class
• Class and year group reports showing both academic and behavioral performance
Online booking systems rely on the ability to update files immediately, thus preventing
double-booking, which could happen if the system response time was slow.
They are used in:
• The travel industry
• For concerts (theatre and music events)
• For cinema tickets
• When booking sporting events
Advantages:
• Prevents double-booking by updating files immediately.
• Provides immediate feedback on availability and booking status.
• Allows customers to make bookings at any time of the day.
• Enables booking companies to send special offers via email.
• Makes it easier to browse seating plans and select the best seats available.
• Allows seat reservation for a specific period, giving customers time to
finalize their decision.
• Eliminates postal costs by reducing the need for printed tickets, and
facilitates impulse bookings.
• Uses smartphone and tablet apps for easy booking with QR codes,
which can be scanned on arrival.
Disadvantages:
• Setting up and maintaining the system is expensive.
• Customers need access to a computer or mobile phone and a reliable
internet connection.
• Cancelling bookings and getting refunds can be more difficult.
• If the server is down, no bookings can be made, and temporary paper-
based systems cannot prevent double-booking.
• Poorly designed websites can make booking difficult or lead to errors,
especially with flights where corrections may incur extra costs.
• Online bookings may not allow customers to build personal relationships
with travel agents, potentially missing out on free upgrades or special
offers.
Concert, theatre, and cinema bookings use the same system since they all involve choosing
seats in a building.
The example assumes the customer is booking a music concert at a seated venue.
The customer must first log on to the event’s booking website.
○ Customer selects the performance
○ enters date/time and number of seats.
○ A seating plan is shown
○ they choose seats and click CONFIRM.
○ The system checks seat availability in the database.
○ If available, the seat numbers and total price are shown.
○ If accepted, customer clicks CONFIRM again.
○ Seats are now temporarily marked as unavailable.
○ Customer enters personal details or logs in as a returning user.
○ Payment method is selected and transaction completed.
○ Seats are officially booked in the customer’s name.
○ Final details are displayed
○ an email is sent with a QR code as the e-ticket.
○ The database is updated to show seats as permanently booked.
○
Booking a sporting event is very similar to the example below. Again, depending on the
event, the online booking system will show a seating plan.
The use of computer technology has revolutionized how we all do our banking
transactions.
In this section, we will consider:
○ the use of automatic teller machines (ATMs)
○ electronic funds transfer (EFT)
○ credit/debit card transactions
○ cheque clearing
○ internet banking.
Electronic funds transfer (EFT) allows money to be moved between accounts using
computer systems.
No physical cash is involved.
The bank’s computer system automatically transfers the specified amount when an EFT
instruction is received.
A common use of EFT is paying staff salaries.
On payday, the company instructs the bank to transfer money from its account to
employees’ accounts.
Many credit/debit cards are equipped with a chip as well as a magnetic stripe – the
chip contains key information such as the PIN.
Designed for better security than relying on just a signature
Used for paying at places like restaurants
Payment is made using a chip and PIN debit/credit card
This is a form of electronic funds transfer (EFT), where money is moved directly
between bank accounts through secure electronic instructions
example, suppose a customer goes into a restaurant to pay for a meal using a chip and
PIN card:
• Customer enters PIN on keypad
• Card is checked for validity (expiry, stolen, etc.)
• Entered PIN is compared to PIN stored on card chip
• If PINs match, transaction continues; if not, it stops
• Restaurant’s bank contacts customer’s bank
• System checks if there are sufficient funds and if card is valid
• If checks fail, transaction is terminated
• If all checks are successful, transaction is authorized
• Authorization code is sent to the restaurant
• Money is deducted from customer’s account
• Same amount is credited to restaurant’s account
• Receipt is printed as proof of purchase
Credit card Advantages
• Customer protection if company shuts down or goods don’t arrive
• Accepted internationally as a payment method
• Interest-free loan if repaid within the agreed period
• Can be used to buy items online
Credit card Disadvantages
• High interest rates may be charged
• Annual fees often apply
6. ICT Applications Page 182
• Annual fees often apply
• Easy to build up debt and damage credit
• Security risks when used online (e.g., data theft)
Debit card Advantages
• Money is taken directly from the customer’s current account, so no interest is
charged
• Safer than carrying cash
• Can be used to buy items online
Debit card Disadvantages
• Less customer protection compared to credit cards if goods do not arrive or
company goes out of business
• No credit allowed; customers must have the funds available
• Security risks when using debit cards online
Database usage
• Accurate Records: Doctors and hospitals need to maintain precise patient records
for correct diagnosis and treatment.
• Medical History: An up-to-date medical history is vital for the diagnosis process.
• Data Sharing: Databases enable data sharing between medical practitioners and
pharmacies to ensure safe prescriptions, such as avoiding dangerous drug
interactions.
Benefits of Database
• Quick Access: Databases allow quick searches for patient records, which is crucial
in emergencies.
• Efficiency in Medication: Prescriptions can be sent directly to pharmacies via
email, eliminating the need for paper prescriptions.
Data Required on a Patient Database:
• Unique identification number
• Name and address
• Date of birth
• Gender
• Medical history (e.g., recent medicine/treatment)
• Blood group
• Known allergies
• Doctor's details
• Current treatment
• Current diagnosis
• Additional information like X-rays, CT scans, etc.
Their use in a number of fields is rapidly progressing. One of the most innovative uses is
in the field of medicine. The following is just a small insight into the many developments
taking place across the world.
3D bio-printing involves using bio-inks to create artificial cells and tissues within a 3D
printed object.
This process is complex and requires collaboration among biologists, medical engineers,
physicists, and other specialists.
It has already been successfully used to produce multi-layered skin tissue, bone tissue,
heart/artery grafts, and tracheal splints.
While there is still a lot of research to be done, the goal of growing replacement organs
using cells from the patient is becoming increasingly feasible due to advancements in 3D
printing technology.
One type of tissue engineering involves 3D printing artificial blood vessels using
human cells.
These bio-printed blood vessels mimic the function and structure of natural
blood vessels.
Biomimetic blood vessels are created using 3D printing technology combined
with bio-inks, making them highly functional and similar to natural vessels.
Expert systems have been developed to mimic the expertise and knowledge of an expert in
a particular field. Examples include:
• Prospecting for oil and minerals
• Diagnostics (e.g., car engine or circuit board faults)
• Medical diagnosis
• Strategy games (e.g., chess)
• Tax and financial planning
• Route scheduling for delivery vehicles
• Identification of plants, animals, and chemical compounds
Advantages of Expert Systems:
1. High level of expertise
2. High accuracy
3. Consistent results
4. Ability to store vast amounts of knowledge
5. Traceable logical solutions and diagnostics
6. Can have multiple types of expertise
7. Fast response time (quicker than human experts)
8. Unbiased reporting and analysis
9. Provides the probability of the solution being correct
Disadvantages of Expert Systems:
1. Requires considerable user training
2. High setup and maintenance costs
3. Responses can be “cold” and may not be suitable in certain situations (e.g.,
medical)
4. The quality depends on the input data
5. Users may mistakenly assume the system is infallible
User interface
• is the way an expert system interacts with the user.
• Interaction can happen through dialogue boxes, command prompts, or other input
methods.
• The system usually asks yes/no questions.
• Each question depends on the responses given to previous questions.
explanation systems
• It explains how the expert system reached its conclusion and what actions it
recommends.
• For example, if the system diagnoses mercury poisoning, it might explain that this is
due to symptoms like impaired vision, weak muscles, slurred speech, etc., and the
patient's past work in a paint factory.
• The user can dig deeper into the explanation if needed.
• The system also gives the probability of how accurate its conclusion is.
• For instance, it might say there's a 21% chance of finding oil in a certain location
based on the input data.
Interference engine
• This is the main processing part of an expert system.
• It works like a search engine, examining the knowledge base for information that
matches user queries.
• It gathers data from the user by asking a series of questions.
• Each question is based on answers given to earlier questions.
• It is the problem-solving part of the system and uses inference rules stored in the
rules base.
• The knowledge base contains objects and their attributes, and the inference engine tries
6. ICT Applications Page 197
• The knowledge base contains objects and their attributes, and the inference engine tries
to match user responses to one of these objects using the rules base.
knowledge base
• A knowledge base is a collection of facts used by the expert system.
• It contains all the expert knowledge gathered from various expert sources in a specific
field.
• This knowledge is stored as a collection of objects and their attributes.
Information needs to be gathered from human experts or sources like textbooks, research
papers, or the internet.
This information is used to populate the knowledge base, which must be created first.
A rules base needs to be developed, consisting of inference rules that the inference engine
can use to draw conclusions.
The inference engine must be set up as it’s the main processing element, responsible for
making reasoned conclusions based on the knowledge base.
A user interface must be developed to facilitate communication between the user and the
expert system.
After setup, the system needs to be fully tested by running it with known outcomes to
compare results and make necessary changes.
Computers are used in the retail industry at point-of-sale (POS) terminals, where they
are also used in the automatic stock control systems.
What?
• Barcodes are present on most products sold in shops for quick identification of
product details.
• They are scanned by a barcode reader to retrieve product information.
• Supermarkets use POS terminals that incorporate barcode readers.
• The barcode reader scans the barcode and retrieves the price of the item.
• The system also updates its files by relaying information back to the computer
system.
Barcode Structure
• Barcodes consist of alternating dark and light lines of varying thickness.
• Underneath the barcode, there is usually a number with four parts:
1. Country code
2. Manufacturer’s code
3. Product code
4. Check digit
• The check digit is used for error validation, ensuring no errors occurred during the
barcode reading process.
Automatic Stock Control System with Barcodes and POS Terminals
• Barcodes attached to all items in the supermarket.
• Each barcode is linked to a stock file, containing details like price, stock levels, and
product description, with the barcode acting as the primary key.
• Customer shopping process:
• Customer brings their trolley/basket to the POS terminal.
• Barcode of each item is scanned; if unreadable, the EPOS operator enters
the number manually.
• Barcode search is conducted on the stock file for a match.
• Once a match is found, the appropriate record is accessed.
• Price and product description are sent back to the POS.
• Stock level is reduced by one, and the updated stock level is written back to the
6. ICT Applications Page 205
• Stock level is reduced by one, and the updated stock level is written back to the
stock file.
• Re-order process:
• If stock is low (less than or equal to re-order number), the computer
automatically orders items from suppliers.
• Supplier information is stored in the order file (linked with barcodes).
• An order flag is placed on the item’s file to prevent duplicate orders until stock
arrives.
• When new stock arrives, barcodes on cartons update stock files and remove
the order flag.
• Final steps:
• The process repeats until all items in the basket are scanned.
• Itemized bill with prices is given to the customer.
• Daily takings are updated in the files.
• If the customer has a loyalty card, their points total is automatically updated.
How?
• The chip and PIN method is used by inserting the card into a reader.
• The procedure involves:
• Reader connection with the chip embedded in the card.
• Entering the PIN for a security check.
• Encrypted data from the chip and PIN are sent to the customer’s bank.
• Security checks include verifying if the card is stolen or expired.
• If the checks are OK and there are sufficient funds, an authorization code is
sent back to the terminal.
• The funds are transferred to the supermarket’s bank.
Advantages
• Chip and PIN is more secure than magnetic stripe cards because the PIN must
match the one stored on the chip.
• It is quicker, as it allows for contactless payments and doesn’t need an internet
connection to start the transaction.
• No Bank Contact for Initial Transaction unlike for magnetic stripe cards
Disadvantages
• The risk of fraud when typing in the PIN – the customer needs to be careful to
ensure the PIN is not being read by somebody else while typing it in.
• Some countries do not accept chip and PIN cards.
The use of contactless card payments was discussed in Section 2.2, together with their
advantages and disadvantages.
When using NFC payment at a POS terminal the sequence of events taking place is:
• NFC payment involves holding an electronic device close to the POS terminal
(within 5 cm).
• The NFC terminal and the device exchange encrypted data back and forth, when
payment is initiated
• The communication is secure, with dynamic encryption changing for each
transaction(which means encrypted data being shared changes every time a
transaction takes place)
• Mobile phone manufacturers use tokenisation to improve security.
What?
• Internet banking enables users to manage their bank accounts online.
• Users can perform tasks like transferring money between accounts, paying bills,
and ordering bank statements.
• It’s especially useful for people who cannot visit a bank during regular hours or
who find it hard to travel.
• Online shopping and banking allow people to stay at home and still purchase goods,
manage finances, and book services like holidays.
• These services only require a computer with internet access and a form of electronic
payment (e.g., debit or credit card).
• There are both advantages and disadvantages to internet banking and shopping,
which are becoming more evident as usage increases.
• The effects of these technologies on society are growing, especially with more people
relying on them.
• Since many of the pros and cons overlap between online banking and shopping,
they are considered together.
Advantages of online shopping and banking
• No need to travel, which saves time, money (e.g. fuel, fares), reduces congestion
and pollution.
• Access to a global market makes it easier to find cheaper goods and a wider
variety.
• Very beneficial for elderly people and those with disabilities who can’t easily go out.
• Services are available 24/7, which is convenient for people with busy schedules.
• Saves time that can be spent on other activities (e.g. online grocery shopping).
• Paying bills online is faster than doing it by post or in person.
• Some users feel more comfortable applying for loans online rather than in person.
• Internet banking avoids long queues at banks.
• Businesses save money on staff and building costs, which may lead to cheaper
prices or better interest rates for customers.
6. ICT Applications Page 215
prices or better interest rates for customers.
Disadvantages of online shopping and banking
• Can lead to social isolation and less physical activity.
• Health concerns due to less movement and exercise.
• Security risks like hacking, phishing, and malware.
• Risk of using fake or fraudulent websites.
• Requires a computer or device and a stable internet connection.
• Can’t physically inspect or try on items before buying; delivery takes time and
returns can be a hassle.
• Increased delivery traffic adds to pollution.
• High-street shops and banks are closing, damaging local economies.
• Small, local retailers struggle to compete with large online companies.
• Easier to make costly mistakes, such as sending money to the wrong account.
Effects on companies due to the spread of online shopping and banking
• Companies save money by hiring fewer staff and needing fewer physical branches.
• They gain access to a global customer base via the internet.
• Extra costs arise from staff retraining and expanding delivery departments.
• Setting up and maintaining websites also adds to expenses.
• Less customer interaction can reduce loyalty and satisfaction.
• Fewer high-street banks mean fewer robberies.
• Banks can cut back on security staff, reducing costs.
Please refer to Chapter 2 (Section 2.2.5) for information about barcode readers,
including their advantages and disadvantages.
Please refer to Chapter 2 (Section 2.2.6) for information about QR code readers,
including their advantages and disadvantages.
What?
• ANPR systems are used to read the number plates of cars.
• They have various applications, including controlling entry and exit in car parks
through an automated system.
Process Example
In the example that follows, we will describe how ANPR is used in a car park to
enable entry and exit to be automatically controlled by a computer system.
1. Detection and Image Capture:
• A sensor detects a vehicle and sends a signal to the camera to capture an
image of the vehicle's front.
• An infrared camera is often used to capture clearer images, especially at
night.
2. Image Processing:
i. An algorithm locates and isolates the number plate from the image, accounting
for size, damage, or orientation.
ii. The brightness and contrast of the number plate are adjusted for clarity. The
characters are then segmented.
iii. Each character is recognized using OCR software, converting it into an
editable text string.
iv. The text string is stored in a database.
3. Entry and Ticket Issuance:
• After processing, the car park barrier is raised, and the motorist is issued a
ticket with the date and time of entry.
4. Exit and Payment Verification:
• When the motorist returns, they insert the ticket into a machine, and the car
park charges are calculated and registered in the database.
• At the exit, the ANPR system reads the number plate, checks the database,
and raises the barrier if payment is confirmed.
6. ICT Applications Page 224
and raises the barrier if payment is confirmed.
Advantages of ANPR
• Traffic Management: Can monitor the average speed of vehicles over a stretch of
road, aiding in smart traffic management systems.
• Cost-saving: Eliminates the need for car park security guards, reducing costs.
• Efficiency: Faster than manually checking tickets at exits, linking payment to the
vehicle's number plate.
• Access Control: Enables automatic control of entry and exit to car parks or private
roads.
• Security: Helps prevent illegal parking and unauthorized access to private car parks.
• Driver Behavior Analysis: Can analyze driver behavior (route choice and
destinations) for transport planning.
• Congestion Charging: Can be used in congestion charging systems to automatically
charge vehicles entering a congestion zone while allowing permitted vehicles (e.g.,
emergency, buses, electric vehicles) without charge.
Disadvantages of ANPR
• Lack of Manned Surveillance: Absence of regular human security could lead to
increased vandalism or other crimes, as CCTV is typically used only after incidents
occur.
• Privacy Concerns: The recording of number plates may raise invasion of privacy
issues.
• Recognition Issues: Damaged or dirty number plates may not be correctly
recognized by the system.
• Number Plate Cloning: ANPR systems only recognize the number plate, not the
car itself, making it possible for a vehicle to bypass security using a cloned number
plate.
• Components: RFID tags consist of a microchip (stores and processes information) and
an antenna (receives/transmits data).
• Types of tags:
• Passive tags: Use the reader’s radio wave energy to transmit information; more
common, smaller, and cheaper.
• Active tags: Have a battery to power the tag and can be read from up to 50
meters away.
• Reading distance:
• Passive tags: Typically have a shorter range (a few millimetres).
• Active tags: Can be read from several metres away (e.g., used in livestock
tracking).
• Livestock Tracking:
• Purpose:
○ Track the whereabouts of animals on a farm using active tags.
○ Identify animal ownership, particularly in cases where animals roam freely on
large farms.
○ Store data on each animal’s tag, such as medical history, birth date,
identification number, etc.
• Retail Use:
• Comparison to Barcodes:
○ RFID tags can hold much more information and don't require manual
scanning.
○ Can store details like price, description, etc.
○ Tags can be read simultaneously, speeding up the checkout process.
• Distribution Centres:
○ Tags help easily locate items by storing their exact warehouse location.
• Tracking from Warehouse to Customer:
○ RFID allows for automatic tracking of items throughout the supply chain.
Customers can be updated on the status of their orders at all stages.
6. ICT Applications Page 229
○ Customers can be updated on the status of their orders at all stages.
Passive Tags: No power supply; they rely on energy from the RFID scanner to function.
Function: When presented to an RFID scanner, the chip broadcasts its stored information to
the computer.
Security Features:
• Can contain security data like photographs and fingerprints, making identity falsification
difficult.
• The data is encrypted, enhancing the security of the system.
Range: RFID in passports can be read from up to six metres, which poses a security risk.
• Mitigation: The risk is reduced by encrypting the data.
Parking Access: RFID tags control access to secure, private car parks.
Weigh Stations: Used in lorries and delivery vans to ensure vehicles are not overweight.
Toll Roads: Tags are attached to the windscreen; transponders read the tag at barriers,
allowing tolls to be paid automatically without stopping.
Car Production: RFID tags track a vehicle's progress through the assembly process.
GPS is used to find the exact location of transport modes like aeroplanes, cars, and ships.
In cars, it's often called a satellite navigation system (satnav).
Satellites orbiting Earth constantly send signals with their position and exact time.
GPS receivers in vehicles pick up these signals and use the data from at least 3 satellites
to calculate their precise location.
Satellites use atomic clocks, accurate to a billionth of a second, to maintain time precision.
Car satnavs also contain stored road maps, combining this with GPS to:
• Show exact position on the map
• Provide spoken directions (e.g. “Take the next left”)
• Display the car’s route and movement visually on a screen
Advantages of GPS and satnav
• Safer driving – no need to use paper maps while driving.
• Reduces navigation errors – can warn about one-way streets, road closures, etc.
• Provides estimated time of arrival (ETA).
• Allows users to customize routes – e.g. avoid towns, take the fastest route.
• Gives additional useful info – like locations of petrol stations, services, etc.
Disadvantages of GPS and satnav
• Outdated maps can lead to incorrect directions.
• Basic systems may not account for temporary road closures (e.g. accidents or
construction).
• Signal loss (e.g. in tunnels or remote areas) can interrupt navigation.
• User input errors (e.g. wrong start or destination) result in misleading routes.
A computer system that allows users to map, model, query, and analyze large amounts of
data based on location.
Allows users to:
• Create interactive queries
• Edit map data
• Analyze spatial information (i.e. how objects relate and fit together in space)
Combines maps, computer graphics, and databases to present data.
Enables:
• Amalgamation of information into easily understood maps
• Performing complex analytical calculations and presenting results as maps, tables,
graphics, or combinations
• Professionals (geographers, scientists, engineers) to view data in different ways to
identify patterns and relationships
• Use of anything that can be placed on a map as a GIS data source
The following example shows how these layering techniques are used to produce a visually
effective answer to a query made in the GIS system:
In this chapter we will consider the stages and processes involved when replacing computer
systems, from analysis of an existing system right through to evaluation of the new system.
Suppose a company wants to replace the current system (used for several years) with a
new one.
What would Initiate this need to upgrade i.e. Why?
○ The existing computer equipment is now obsolete (it cannot be repaired anymore).
○ Changes to laws or taxes requiring radical overhaul of software.
○ More suitable hardware is now available to improve efficiency and reliability.
○ There is a need to expand the company. etc.
These changes involve an ICT solution so a systems analyst needs to be brought in. Who
will first, analyze the current system to suggest improvements
Improvements need to be costed and their advantages reported back to the company’s
management team.
Once a new system is decided and tested it is installed
It needs to be fully evaluated and any changes made where necessary.
Therefore, a cycle of events take place until a fully-working system is signed off and
handed over to the management team.
This whole process is called the systems life cycle.
The first stage in the process is the analysis of the current system. Figure 7.2 shows the
stages in analysis.
There are four methods used to research the current system. The four methods used are:
○ observation
▪ Description
□ This involves watching personnel using the existing system to find out
exactly how it works
▪ Advantages
□ The analyst obtains reliable data
□ It is possible to get a better overall view of the system
□ Relatively inexpensive method because it only involves the analyst
□ All inputs and outputs of the current system are seen
▪ Disadvantages
□ People are generally uncomfortable being watched and may work in a
different way (known as the Hawthorne effect)
□ If workers perform tasks that contravene standard procedures, they may
not do this while being watched
○ questionnaires
▪ Description
□ This method involves a one to-one question-and-answer session between
the analyst and the user. It is a good method if the analyst wants to
probe deeply into one specific aspect of the existing system.
▪ Advantages
□ It gives the opportunity to motivate the interviewee into giving open and
honest answers to the analyst’s questions
□ The method allows the analyst to probe for more feedback from the
interviewee (questions can be extended)
□ It is possible to modify questions as the interview proceeds and ask
questions specific to the interviewee
□ Analyst can watch body language and facial expressions
Disadvantages
7. The Systems life cycle Page 249
▪ Disadvantages
□ It can be a rather time consuming exercise
□ It is relatively expensive (team of interviewers and analyst needed)
□ The interviewee cannot remain anonymous with this method, and may
hide information or not be honest with their answers
□ Interviewee can give answers they think the interviewer wants to hear
□ Interviewees may not be available at times to suit the analyst
○ interviews
▪ Description
□ This method involves distributing questionnaires to the workforce, clients or
system users to find out their views of the existing system and to find out
how some of the key tasks are carried out.
▪ Advantages
□ The questions can be answered fairly quickly
□ It is a relatively inexpensive method (only need to produce questionnaires)
□ Individuals can remain anonymous if they want (therefore give more
truthful answers)
□ Allows for a quick analysis of the data
□ Interviewees can fill in questionnaire in their own time
□ Allows a greater number of people to take part
▪ Disadvantages
□ The number of returned questionnaires can be low; not always a popular
method
□ The questions are rather rigid because they have to be generic; it is not
possible to ask follow-up questions
□ No immediate way to clarify a vague answer to a question; it is not
possible to expand their answers
□ Users tend to exaggerate their responses as they are anonymous
□ Because anonymous, the interviewees may not take it seriously
○ examination of existing documents
▪ Description
□ This method allows the analyst to see how existing files are kept, look at
7. The Systems life cycle Page 250
□ This method allows the analyst to see how existing files are kept, look at
operating instructions and training manuals, check the accounts, etc. This
allows the analyst to get some idea of the scale of the problem, memory
size requirements, type of input/ output devices needed, etc.
▪ Advantages
□ This method allows information to be obtained which was not possible by
any of the other methods
□ The analyst can see for themselves how the current system operates
▪ Disadvantages
□ It can be a very time consuming exercise
□ Because of the analyst’s time needed, it is a relatively expensive method
to use
The DFD and other information gathering processes allow the analysis team to identify
what hardware and software is needed to run the new system.
Identify and justify hardware
○ Identification and justification of which input devices are needed might be, for
example:
▪ barcode readers
□ using barcode readers avoids the need to manually input data about
goods, which is more efficient, less error-prone and less expensive in the
long run
▪ scanners
□ these could be used if it is necessary to convert any existing paper
documents into an electronic format during the implementation stage
▪ touch screens
□ this may be the best and most cost-effective way of gathering
information from a business customer, for example, and to ensure an
employee does not miss any important data during a customer
conversation
○ Identification and justification of which output devices are needed; for example:
▪ 3D printer
□ if the company are manufacturing toys, for example, it is much more
cost-effective to do a ‘one off’ using a 3D printer than making a toy
in the conventional way
▪ very large 60” monitors
□ the company may be using CAD software and the need for very
large, expensive monitors, may be justifiable
▪ speakers
□ the company may employ people with disabilities, so the need for verbal
outputs from the computer may be a necessary requirement
Identify and justify software
7. The Systems life cycle Page 254
Identify and justify software
○ Identification and justification of which software is required; for example:
▪ operating system
□ which operating system is the most appropriate to meet the company needs
▪ applications software
□ off-the-shelf software
which would save a lot of development time and costs, but may
require compromises in how the company runs; off-the shelf
software (such as Word or Excel)
also has a huge user-base in case of problems and a minimum of
training will be required, because the software is well known–
□ bespoke software (written specifically for the company)
this will require considerable time and money to develop, but will
exactly meet the company’s requirements;
it will also require considerable training in using software unknown
to the employees, and there will be no user base to seek help (they
will have to rely on the software development technical team, which
could be expensive)
○ Storage requirements also need to be considered; for example:
▪ size of storage
□ how many bytes of storage are required for the systems to run now,
and in the future
▪ type of storage
□ which storage type is the most suitable for the company: hard disk
drives, solid-state drives or even magnetic tape drives) – the choice
could depend on:
data access and data write speeds
number of read-write operations (there is still some doubt about the
longevity of SSD if it has to endure large numbers of read-
write operations
type of access – can it be serial access to the data (all read in
order) or does it need to be direct (no need to read all the data in
7. The Systems life cycle Page 255
order) or does it need to be direct (no need to read all the data in
order)
if huge amounts of storage are required and data access time is
not that important, magnetic tape may still be the best option.
Once the analysis of the existing system has taken place, and the systems analyst has a
better idea of the scale of the problem, then the next stage in the process is design. Figure
below summarizes the design stage.
○ Please note that the field lengths given in this table are just ‘possible’ values.
When assigning field length, it is important to give a good estimate to save
7. The Systems life cycle Page 260
When assigning field length, it is important to give a good estimate to save
memory.
Validation is the process where data entered into a computer is checked to see if it satisfies
certain criteria.
It is an automatic check carried out by the computer as part of its programming.
For example, validation criteria could be that only positive numbers entered, or eight
characters must be entered; any data failing these criteria should be rejected.
Validation is not a check on whether the data is correct or accurate; it is only a check to
see if it is reasonable.
There are a number of validation routines that can be used. Some of the more common
ones are:
○ Range
▪ This checks to see if the data input lies between an acceptable upper value and
an acceptable lower value
▪ Limiting a temperature range from 10 to 50 degrees Celsius
○ Type/Character
▪ This checks to see if the data entered is of the correct type (i.e. letter or
number only)
▪ A person’s name should not contain numbers A person’s height should not
contain letters
○ Length
▪ This checks to see if the data input contains only the required number of
characters
▪ If a password contains eight characters, then an input with seven characters
or nine characters, for example, should produce an error message
○ Format
▪ This checks to see if the data input is in the correct format
▪ Ensures the date is entered in a format such as dd/mm/yyyy (e.g.
10/12/2023)
○ Presence
This checks that data has been entered into a field and it has not been left
7. The Systems life cycle Page 262
▪ This checks that data has been entered into a field and it has not been left
empty
▪ For example, when using an online form, a person’s telephone number may
be a ‘required field’; if no data is entered, this should give rise to an error
message
○ Check digit
▪ This is an extra digit added to a number which has been calculated from the
other digits
▪ Check digits can identify three types of error:
□ if two digits have been transposed during input; for example, 13597
instead of 13579
□ an incorrect digit has been entered; for example, 13559 instead of
13579
□ a digit has been missed out or extra digit added; for example, 1359 or
135799 instead of 13579
□ (in all three cases, the check digit (usually the last digit) would not be 9
if an error had been made)
Data capture forms are often used to input data into a computer.
These forms ensure data is input into the computer in the correct format.
They need to be designed very carefully to ensure that the format of the data matches, for
example, the database where the data is being stored.
Data capture forms will be either paper-based or electronic-based depending on the
application.
Paper-based forms need to:
○ have a heading to make the purpose of the form clear
○ make it clear to the person filling in the form where they must place their answers
○ make use of text boxes which will limit the amount of information collected
○ make use of character boxes for data such as surnames, telephone numbers, and so
on (each box allows one character only)
○ make use of printed text boxes to allow for easy input of items such as date of birth
○ make use of tick boxes to make choices easier (such as sex – male or female)
○ make sure there is sufficient space to write answers
○ make use of clear fonts and clear text colors to ensure the form is easy to read
A computer-based data capture form is slightly different. These often have the following
features:
○ use of text boxes to capture key data clearly
○ use of on-screen help when completing the form
○ use of drop-down/combo boxes where there are limited choices
use of radio buttons and tick boxes requiring a single click of a mouse to select
7. The Systems life cycle Page 264
○use of radio buttons and tick boxes requiring a single click of a mouse to select
○automatic validation of data as it is entered
○control buttons (such as next form, clear entry, save, etc.)
○double entry boxes (with verification rules) to check correctness of key data (for
example, when keying in an email address).
In the car sales example shown above, the following differences could be used with a
computer-based data capture form:
○ registration number: same as paper-based form
○ make of car: make use of a drop-down box as there are a limited number of
manufacturers
○ model of car: same as paper-based form
○ date first registered: use of drop-down boxes for day, month and year
○ price: use boxes as shown but include a validation check
○ new or used: use of tick box or radio button to indicate option
○ other features: a back and forward button (to complete details of all cars), and a
save button when the form is complete for each car.
The output from any system needs careful consideration because this is part of any user
interface, and is the result of some form of processing. Screen outputs should be designed:
○ to make sure the size of all the output fields is correct
○ so that any instructions/descriptions are clear
○ so that the full screen is utilized (avoiding large areas of ‘nothing’)
○ so that colors and fonts (size and type) make the output clear.
If the output is on paper, then consideration must also be given to the type of output. Items
such as:
○ headers and footers
○ fitting the page correctly
○ whether it should be in colour, and so on, all have to be carefully planned.
Reports (often the output from a database search) should clearly show all the fields that
were included in the search criteria. The output is usually in the form of a table – the
example below outputs a list of all sales managers over 40.
Once the design stage is completed, it is then necessary to create the system and fully test it. This section
considers some of the development stages and testing strategies which are often adopted by systems
analysts.
○ If the system contains files (for example, a database) then the file structure would need to be
finalised at this stage for example,
▪ what type of data is being stored in each field
▪ length of each field
▪ which field will be the key field
▪ how will the data files be linked, etc.
○ Once the file structure has been determined it is then created and needs to be fully tested to make
sure it is robust when the system actually goes live
○ .To ensure correct data is stored in files (etc.) certain techniques need to be adopted to ensure the
data populating the files/database is at least of the right type and that it conforms to certain rules.
▪ Validation routines and verification methods are used to ensure this happens.
▪ Again, these routines have to be fully tested to ensure they do trap unwanted data, but also to
make sure any data transferred from a paper-based system to an electronic system has been
done accurately.
○ Obviously, any system being developed will have some form of user interface.
▪ The types of hardware have already been considered; how these are used to actually interface
with the final system now needs to be identified.
▪ For example, how the screens (and any other input devices) will be used to collect the data
and the way the output will be presented.
▪ If specialist hardware is needed (for example, for people with disabilities) then it will be
necessary to finalize how these devices are used with the system when it is implemented.
▪ This will be followed by thorough testing to ensure the user screens are user friendly and that
the correct output is associated with the inputs to the system.
Once the testing designs and strategy have been determined, it then becomes necessary to formulate a test plan for
each module. The test plan should include:
○ a list of all the tests to be performed
○ what data is to be used in the testing
○ what type of testing the data is designed to check (i.e. normal, abnormal or extreme – see below)
○ what live data should be used
○ what the expected outcomes are from the testing
○ do the actual outcomes match what is expected?
Three types of data: (The example we will use is inputting a date into a database field. The entered data must take
the format dd/mm/yyyy and all data must be numeric)
○ normal
▪ this is data which is acceptable/valid and has an expected (known) outcome
▪ for example, the month can be any whole number in the range 1 to 12
○ extreme
▪ this is data at the limits of acceptability/validity
▪ for example, the month can be either of the two end values i.e. 1 or 12
○ abnormal
▪ this is data outside the limits of acceptability/validity and should be rejected or cause an error message
▪ for example, none of the following values are allowed as inputs for the month:
▪ any value less than 1 (for example, 0, −1, −15, etc.)
▪ any value greater than 12 (for example, 32, 45, etc.)
▪ letters or other non-numeric data (for example, July, etc.)
▪ non-integer values (for example, 3.5, 10.75, etc.).
Live data
○ Once a system has been fully tested, it is then tested with live data.
○ This is data with known outcomes.
○ Live data is entered into the new system and the results compared with those produced from the existing
system.
If the two outcomes do not match, then further modifications to the system may be needed.
7. The Systems life cycle Page 273
○ If the two outcomes do not match, then further modifications to the system may be needed.
Once the system is fully tested, the next stage is to fully implement it. Some of the stages in this process are
shown below:
Implementation Methods:
○ Direct
▪ Design of method
□ With this method the old system is stopped overnight and the new system introduced
immediately
▪ Advantages and disadvantages of the method
▪ This method can be disastrous if the new system fails because the old system is no longer available
▪ The benefits are immediate
▪ Costs are reduced (because only one system is used there is no need to pay for two sets of staff)
○ Parallel
▪ Design of method
□ With this method, the old and new systems are run side by side for a time before the new
system takes over altogether
▪ Advantages and disadvantages of the method
□ If this new system fails, the old system is still available as a backup
□ It is possible to gradually train staff
□ It is more expensive than direct because extra staff are needed to run both systems together
□ It is also more time consuming than direct because data needs to be entered into two systems
7. The Systems life cycle Page 275
□ It is also more time consuming than direct because data needs to be entered into two systems
○ Pilot
▪ Design of method
□ With this method, the new system is introduced into one branch or office of the company
and its performance assessed before being introduced elsewhere in the company
▪ Advantages and disadvantages of the method
□ If the new system fails, only one part is affected; the remainder is unaffected
□ It is possible to train staff in one area only, which is much faster and less costly than
parallel
□ The costs are also less than parallel because only one part of the system is being used in the
pilot warehouse
○ Phased
▪ Design of method
□ With this method, only part of the new system is introduced and, only when it proves to
work satisfactorily, is the next part introduced, and so on, until the old system is fully
replaced
▪ Advantages and disadvantages of the method
□ If the latest part fails, it is only necessary to go back in the system to the point of failure;
hence failure is not disastrous
□ More expensive than direct because it is necessary to evaluate each phase before moving to the
next stage
□ Very time consuming because each part needs to be fully evaluated before making any
further changes to the system
□ It is possible to ensure the system works properly before expanding
Once the new system is fully developed, a considerable amount of documentation also needs to be produced for:
○ people who may need to modify or develop the system further at some later stage
○ the end-user
There is some overlap between the two types of documentation, but the basic requirements are shown below.
Technical documentation
○ Technical documentation is designed to help programmers/analysts to make improvements to the system or
repair/maintain the system.
○ This can consist of any of the following:
▪ program listing/coding
▪ programming language used
▪ program flowcharts/algorithms
▪ system flowcharts
▪ purpose of the system/program/software
▪ limitations of the system
▪ input formats
▪ hardware requirements
▪ software requirements
▪ minimum memory requirements
▪ known ‘bugs’ in the system
▪ list of variables used (and their meaning/description)
▪ file structures
▪ sample runs (with results and actual test data used)
▪ output formats
▪ validation rules
▪ meaning of error messages.
User documentation
○ User documentation is designed to help users to learn how to use the software or system.
○ This can consist of any of the following:
▪ how to load/install/run the software
how to save files
7. The Systems life cycle Page 277
▪ how to save files
▪ how to do a search
▪ how to sort data
▪ how to print out
▪ how to add, delete or amend records
▪ the purpose of the system/program/software package
▪ limitations of the system
▪ screen layouts (input format)
▪ print layouts (output format)
▪ hardware requirements
▪ software requirements
▪ sample runs (with results and actual test data used)
▪ error handling/meaning of errors
▪ troubleshooting guide/help lines/FAQs (frequently asked questions)
▪ how to log in/log out
▪ tutorials
▪ error messages/meaning of error messages
▪ glossary of terms.
Once a system is up and running it is necessary to do some evaluation and carry out any maintenance if necessary.
The following is a list of some of the things to be considered when evaluating how well the new system has worked; this can
ultimately lead to a redesign of part of the system if there is strong evidence to suggest that changes need be made.
○ Compare the final solution with the original task requirements.
○ Identify any limitations of the system.
○ Identify any necessary improvements that need to be made.
○ Evaluate the users’ responses to using the new system.
○ Compare test results from the new system with results from the old system.
○ Compare performance of the new system with performance of the old system.
○ Observe users performing set tasks (compare old with new).
○ Measure the time taken to complete tasks (compare old with new).
○ Interview users to gather responses about how well the new system works.
○ Give out questionnaires to gather responses about the ease of use of the new system
Overall, is the new solution:
○ more efficient? (this might mean ‘more efficient to use’ or ‘more efficient for the business
○ easy to use
○ appropriate for the task it was designed for?
Some results from the evaluation may lead to two things happening:
○ update of hardware because
▪ of feedback from end-users
▪ new hardware comes on the market, necessitating change
▪ changes within the company require new devices to be added or updated.
○ update of software because
▪ of feedback from end-users
▪ changes to the company structure or how the company works that may require modifications to the software
▪ changes in legislation that may require modifications to the software.
What?
• Definition: Any data related to a living person who can be identified:
• From the data alone, or
• From the data combined with other available information.
• Example:
• “Peter Smith has long purple hair and lives at 40 Green Street”
→ Clearly identifies the individual.
• Examples of personal data include:
• Name
• Address or email address (e.g., myname.lastname@mycompany.com)
• ID card number / Passport number
• IP address
• Cookie ID
• Advertising identifier on a mobile phone
• Date of birth
• Banking details
• Photographs of the individual (e.g., in full school uniform)
• Sensitive personal data requires extra protection due to its potentially high impact on
an individual’s privacy.
• Examples of sensitive personal data include:
• Ethnicity or race
• Political views
• Membership of a political party
• Membership of a trade union
• Religion/philosophical beliefs
• Sexual orientation/gender
• Criminal record
• Medical history
• Genetic data/DNA
8. Safety and Security Page 285
• Genetic data/DNA
• Biometric data
• Protection Measures of sensitive personal info
• Confidentiality: Ensure sensitive data remains private and secure.
• Encryption: Encrypting data protects it from unauthorized access, particularly
if it is accidentally disclosed.
• Preventive Measures: Ensure data is stored and transmitted in ways that
minimize the risk of accidental or malicious disclosure, including securing it
from hackers.
•
E-safety is about ensuring safe and responsible behavior when using technology. It
focuses not only on electronic security but also on how users interact with technology.
Key areas of e-safety include:
• Using the Internet: Ensuring safe browsing, avoiding malicious sites, and protecting
personal information.
• Sending and Receiving Emails: Being cautious with attachments, links, and
avoiding phishing scams.
• Social Media: Protecting privacy settings, being mindful of what is shared, and
avoiding cyberbullying.
• Online Gaming: Understanding risks like cyberbullying, inappropriate content, and
ensuring secure communication with others.
Emails:
• Open Emails From Known Sources:
• Only open emails or attachments from trusted sources.
• Email Filtering:
• Ensure your ISP has effective email filtering to send emails from unknown
sources to your spam folder.
• Verify Email Authenticity:
• Only reply to emails if you know the sender or are 100% certain the
organization is genuine.
• Check Email Addresses:
• Verify email addresses and ensure they match the official website of the
company (e.g., customer_accounts@gmail.com is suspicious, while
customer_accounts@amazon.com is likely legitimate).
• Be Cautious with Personal Data:
• Do not reply with personal information or the name of your school/college.
• Avoid Sending Personal Photos:
• Never send photos, especially in school uniform, which could reveal your
identity.
• Beware of Scams:
• Watch out for phishing and pharming scams (see Section 8.3).
• Password Protection:
• Protect your email account by using strong, hard-to-guess passwords and
changing them regularly.
• Careful When Forwarding Emails:
• Be cautious when forwarding emails (see Chapter 10).
• Manually Type Email Addresses:
• Type email addresses manually to avoid errors or fraudulent addresses.
• Avoid Clicking Hyperlinks:
• Don’t click on links in emails, as they could be phishing scams.
8. Safety and Security Page 289
• Don’t click on links in emails, as they could be phishing scams.
• Unsubscribe Links:
• Be cautious with unsubscribe links; they could be fraudulent.
• Use Bcc for Multiple Recipients:
• Use the Bcc box when sending to multiple recipients to protect everyone’s
privacy; send the email to yourself in the To box.
○
Risks:
• Predators:
• Some users may prey on others they see as vulnerable.
• Cyberbullying:
• Electronic communication may be used to intimidate or threaten others.
• Use of Webcams:
• The risks of using webcams in online games are significant, as personal
images can be misused.
• Voice-Masking Technology:
• Technology that disguises voices, making it hard to determine a person's real
age, sex, or accent.
• Cyber Attacks:
• Online games can be a source of viruses, phishing, and spyware that can
infect your computer or mobile device.
• Violence in Games:
• Some games may contain violent content that could potentially influence players'
behavior in real life.
Safety tips:
• Never share personal information, including your real name, with anyone while
gaming.
• Stay cautious of any attempt to gain personal details during gaming sessions.
• Be aware of the potential for inappropriate behavior or harmful content in games.
Definition: Smishing is a type of phishing attack carried out through SMS (text
messages) on mobile phones.
Method:
• A fake SMS message is sent.
• It usually contains a URL or phone number.
• The user is prompted to click the link or call the number.
• They are then asked to provide personal details, such as:
○ Credit/debit card numbers
○ Passwords
○ Bank account information
Deceptive Tactics:
• The message often appears to come from a trusted source (e.g., a bank or delivery
service).
• It might claim:
○ You’ve won a prize
○ There's an urgent banking issue
○ You need to confirm an order
Danger:
• Many people wrongly believe only computers are vulnerable to security threats.
A variation of phishing
Uses a voicemail message
Tricks the user into calling a telephone number
User is asked to supply personal data
The attacker pretends to be from a legitimate company
What?
• Stand-alone viruses that self-replicate
• Spread to other computers and corrupt whole networks
• Do not need an active host program to do damage
• Stay inside applications and move through networks
• Spread due to security failures in networks
• Often arrive as email attachments
• Only one user opening a worm-infected email can infect the entire network
Precautions
• Same as for viruses: avoid suspicious emails, don’t install unknown software
• Run an up-to-date anti-virus program
Key Difference from Viruses
• Worms spread without user action
• Viruses require the user to initiate them
Example
• “I love you” worm – affected almost every email user, disrupted phone and TV
networks
• More dangerous than viruses due to rapid, autonomous spread
What?
○ Trojan Horse
• Malicious program disguised as legitimate software
• Replaces all or part of real software to cause harm to the user’s system
• Must be executed by the end-user to work
○ How It Spreads
• Comes as email attachments or via infected websites
• Common trick: fake anti-virus pop-up offering a “free trial”
• Once run, malware is activated
○ After Installation
• Gives cyber criminals access to:
– IP addresses
– Passwords
– Personal data
• Often installs spyware (e.g., keyloggers) or ransomware
○ Security Note
• Firewalls and antivirus may not stop it if the user approves its execution
• Trojans rely on tricking the user, not exploiting software vulnerabilities
What?
• Type of spyware that monitors a user’s keyboard activity
• Records keystrokes and stores them in a file, which is then emailed to
cybercriminals
• Designed to capture personal data like:
– Bank account numbers
– Passwords
– Credit/debit card details
Detection and Prevention
• Anti-spyware software can detect and remove key loggers
• Banks combat key loggers by asking for different parts of a password during
each login (e.g., specific characters)
• Drop-down boxes are used to select data on-screen (making it hard for key
loggers to capture)
Advanced Key Loggers
• Some screen recorders capture random screenshots, bypassing typical key logging
methods.
What?
• Type of malware designed to display unwanted advertising
• At its least harmful, redirects browsers to fake websites with promotional ads or
creates pop-ups
• Can appear in the browser’s toolbar, redirecting search requests
Potential Risks
• Can highlight weaknesses in a user’s security defenses
• Difficult to remove, often evading anti-malware software
• Can hijack browsers, setting its own default search settings and requests
What?
• Programs that encrypt data on a user’s computer, holding it hostage until a
ransom is paid
• Cybercriminals wait for the ransom money before sending decryption keys,
sometimes causing considerable damage
How It Works
• Locks the computer screen, restricting access and encrypting all data
• May be installed via Trojan horses or social engineering
• Waits before encrypting or demands immediate ransom
• Difficult to reverse damage once executed
Prevention
• Use standard security methods, such as avoiding phishing emails
• Regular backups of key files to prevent paying the ransom
What?
• A form of data theft where criminals steal personal information by observing the
victim when entering sensitive data (e.g., at an ATM, POS device, or using a
smartphone)
Examples
• Watching while you enter data (e.g., PIN)
• Listening in when providing card details over the phone
• Sophisticated methods such as using digital cameras to capture key presses
Prevention
• Shield the keyboard when using ATMs, use mirrors to check for people behind
you
• Avoid public places when entering data on mobile devices
• Avoid security cameras in public places and use biometrics (e.g., Touch ID or
Face ID) on smartphones or tablets
Authentication is used to verify that data comes from a secure and trusted source.
Along with encryption it strengthens internet security.
We will be considering all of the following methods to protect the security of data:
○ biometrics
○ digital certificates
○ secure sockets layer (SSL)
○ encryption
○ firewalls
○ two-factor authentication
○ user ID and password.
• Fingerprint scans:
• Images of fingerprints are compared to previously scanned fingerprints stored in a
database.
• The system compares unique patterns of ‘ridges’ and ‘valleys’.
• Advantages:
• Fingerprints are unique, improving security as they are hard to replicate.
• Unlike magnetic cards, fingerprints cannot be lost or stolen.
• It’s impossible to ‘sign in’ for someone else because fingerprints are unique to one
person.
• Fingerprints cannot be misplaced, as everyone has them.
• Disadvantages:
• It is relatively expensive to install and set up.
• Damaged fingers (due to injury) may affect scanning accuracy.
• Some people may see it as an infringement on civil liberties.
• Face recognition:
• Used to identify someone by their facial features.
• Commonly used in modern smartphones for identifying the phone owner and
authorizing purchases.
• How it works:
• The position of various facial features is calculated by the software.
• These values are then compared to values stored in a database.
• If the values match, the face is recognized.
• Data used to identify a face:
• Distance between the eyes.
• Width of the nose.
• Shape of the cheekbones.
• Length of the jawline.
• Shape of the eyebrows.
• Potential limitations:
• Can be ‘fooled’ by wearing spectacles or changing hairstyle/color.
• Technology is improving to address these issues.
• Digital certificate: A pair of files stored on a user’s computer used to ensure the security
of data sent over the internet.
• Components of digital certificate:
• Public key: Accessible by anyone.
• Private key: Known only to the computer user.
• Use case:
• Example: When sending an email, a digital certificate is attached to secure the
message.
• The recipient can verify that the message comes from a known or trusted source by
viewing the public key information (usually in the email attachment).
• Parts of a digital certificate:
• Sender’s email address.
• Name of the certificate owner.
• Serial number.
• Expiry date (valid date range).
• Public key (used for encrypting messages and for digital signatures).
• Digital signature of the certificate authority (CA), such as VeriSign.
• Security management:
• Operating systems and web browsers maintain lists of trusted certificate authorities
(CAs).
What?
• Used primarily to protect data in case it has been hacked or accessed illegally.
• Does not prevent hacking but makes data meaningless without the necessary
decryption tools.
• Uses a secret key that alters the characters in a message, making it unreadable
unless the recipient has the same secret key.
• Encryption key: Used to encrypt (encode) the message.
• Decryption key: Used to decrypt (decipher) the message.
• When encrypted, the message is known as cipher text, and the original message is
known as plain text.
Applications of Encryption:
• Protecting data on HDDs or SSDs:
○ Data encryption is essential due to risks of pharming, hacking, spyware, and other
forms of malware.
If data is accessed illegally, it will be unreadable to cybercriminals.
8. Safety and Security Page 324
○ If data is accessed illegally, it will be unreadable to cybercriminals.
• Encryption of emails:
○ Protects sensitive information from being read by unauthorized individuals.
○ Encrypted messages are meaningless without the decryption key.
○ Prevents hackers from accessing email content, attachments, or even the whole email
account if they gain unauthorized access.
• Firewall Types:
• Can be either software or hardware.
• Function:
• Sits between the user's computer and an external network (like the internet).
• Filters incoming and outgoing network traffic.
• Helps protect the computer from potentially destructive forces.
• User Control:
• Users can set the criteria for allowing or denying access to the computer.
• Firewall Tasks:
• Examines traffic between the user’s computer (or internal network) and a public
network (e.g., the internet).
• Checks data to see if it meets a given set of criteria.
• Blocks traffic that fails the criteria and gives the user (or network manager) a
warning.
• Logs traffic to allow later interrogation by the user or network manager.
• Prevents access to undesirable sites by maintaining a list of undesirable IP
addresses.
• Prevents viruses or hackers from entering the user’s computer or network.
• Warns the user if software is trying to access an external data source (e.g.,
automatic software updates), allowing the user to allow or deny the access.
• Firewall Types:
• Hardware: Located between the computer and the internet connection, often referred
to as a gateway.
• Software: Installed on the computer, sometimes as part of the operating system.
• Authentication:
• Refers to the process of verifying the identity of a user.
• Common authentication factors:
○ Something you know: (e.g., a password or PIN code)
○ Something you have: (e.g., a mobile phone or tablet)
○ Something unique to you: (e.g., biometrics)
• Two-factor authentication:
• A verification method that requires two authentication factors.
• Used mainly for online purchases (e.g., when using a credit/debit card).
• Example of two-factor authentication:
Kate logs into a website using her username and password (Step 1).
She receives an eight-digit PIN (one-time passcode) via email or text message to her
registered mobile phone (Step 2).
Kate enters the PIN into her computer, completing the authentication process and being
authorized to make the purchase.
Using the definitions of authentication at the start of this section, the mobile phone is
something she has and the password/PIN code is something she knows.
• Passwords:
• Used to restrict access to data or systems.
• Should be:
○ Hard to guess or break.
○ Changed frequently to maintain security.
• Common uses of passwords on the internet:
• Accessing email accounts.
• Performing online banking or shopping.
• Logging into social networking sites.
• Protecting Passwords
• Use anti-spyware software to prevent password theft via spyware.
• Change passwords regularly in case they are compromised.
• Avoid easy-to-guess passwords (like pet names or favorite colors).
• Passwords are classified as:
▪ Strong – hard to guess or break.
▪ Weak – easy to guess or break.
• Creating strong but memorable passwords:
▪ Use memorable phrases to generate strong passwords.
▪ Example: "The 3rd planet is Earth: the 8th planet is Neptune" becomes
T3piE:t8piN.
• Strong passwords should contain:
▪ At least one capital letter.
▪ At least one number.
▪ At least one special character (e.g., @, *, &, #).
• Examples:
▪ Strong: Sy12@#TT90kj=0
▪ Weak: GREEN
• When typing a password, it usually appears as asterisks (****) to prevent others from
seeing it.
8. Safety and Security Page 330
seeing it.
• If the password doesn't match the user name, access is denied.
• Systems often require the password to be entered twice during creation to check for input
errors (verification check).
• Users are usually given a limited number of attempts (typically 3) to enter the correct
password.
• After the allowed attempts, the system will lock the user out until they reset their password.
• If a user forgets or needs to reset a password, an email with a reset link is sent as a
security precaution against unauthorized access.
• Passwords should be changed regularly to prevent misuse by others or hackers.
• Protect passwords from spyware or viruses.
• Accessing online services (e.g., bank websites) usually requires both a username and
password, adding an extra layer of security.
When planning and creating ICT solutions, it is important to consider the audience
who will either use or take part in the solution. We are going to use two different
examples to show what could be meant by audience appreciation:
○ In the first example, we are going to consider using presentation software to
make a presentation for an audience.
○ In the second example, we are going to consider the general audience
requirements when developing a new website
In this example, the ICT solution is a presentation aimed at a specific audience, using
presentation software.
When writing a presentation, you need to consider all of the following factors:
○ The age of the target group (young children will have a different appreciation and
response compared to a more mature group of adults).
○ The experiences of the audience (a board of company directors would expect a
different approach compared to an audience composed of teenage school children).
○ The expectation of the audience (for example, if you are advertising or giving a
presentation on a new restaurant, an older audience might expect to see fine wines
and good waiter service; whereas a group of students might be more interested in
pizzas and fast counter service).
○ Knowledge of the audience (for example, graduates in math would be more
comfortable seeing equations in a presentation than a group of history students)
To find out about the characteristics of your audience, some of the market research
techniques you might use are:
○ interviewing a cross section of the target group to find out how to engage the audience
○ giving out questionnaires or online surveys to people in the target group to find out
their background, interests, and so on, so that your solution can be tailored to meet
the full expectation of the audience.
Giving a sample presentation to an audience:
○ A phone company has decided to produce two presentations, using an ICT solution,
regarding the sales and features of the four different mobile phones they market and
sell:
▪ one presentation is to be given to the mobile phone sales team who will receive
different bonus payments depending on the phone sold
□ the sales team, will have technical knowledge and will be interested in the
profitability of each sale.
▪ a second presentation is to be given to a potential group of mobile phone
customers
□ end-users will only be interested in the price and the features found on
each phone
Key factors when writing the presentations include:
○ the language used
○ the need for multimedia
○ the length of the presentation
○ the need for audience participation (an interactive approach)
○ the examples used to illustrate certain points
○ you could determine the characteristics of the audience who are likely to use the new website by:
▪ interviewing a cross section of the target group
▪ giving out questionnaires or surveys to people in the target group to find out their background,
interests, age range, and so on
▪ analysing this data and drawing conclusions about the audience
Needs of the audience
○ it is necessary to understand their specific needs in a bit more depth, to ensure the final product is fit
for purpose
Why we need to consider the needs of our audience:
○ If the audience is made up of older people, or people with disabilities, who have sight problems, then it is
important to make sure the website has clear to-read fonts.
○ Complex language can be a real turn off to children or for people who have English as their second
language; the text needs to be clear and easy to read for these reasons.
○ It is necessary to hold the attention of the users, otherwise they will give up using the website.
○ Good, attractive screen designs will attract users to the website.
○ Keeping interfaces clear and easy to use keeps people engaged.
○ Lots of typing can be very frustrating, as can badly designed websites where the user seems to go
‘round in a big circle’.
○ If you know your audience and understand their needs before starting to develop the new ICT solution,
then it is far more likely to be successful.
Software copyright
○ Software is protected by copyright laws in much the same way as music CDs, movies, and articles from magazines
and books are protected.
○ When software is supplied on CD, DVD or online there are certain rules that must be obeyed. It is illegal to:
▪ make a software copy and then sell it or give it away to a friend or colleague
▪ use software on a network or on multiple computers unless a license has been acquired to allow this to happen
▪ use coding from the copyright software in your own software and then pass this software on or sell it as your
own without the permission of the copyright holders
▪ rent out a software package without permission to do so from the publishers
▪ use the name of copyrighted software on other software without agreement to do so.
Software Piracy
○ Software piracy(copying of software) is illegal and companies take many steps to protect their products.
○ The installer will be asked to agree to certain conditions or to methods that require the original software to be present
for it to work:
▪ When software is being installed, the user will be asked to key in a unique reference number or product key (a
string of letters and numbers) that was supplied with the original copy of the software (for example: 4a3c 0efa
65ab a81e).
▪ The user will be asked to click ‘OK’/‘I AGREE’ or put a cross in a box to agree to the license agreement
before the software installs.
▪ The original software packaging often comes with a sticker informing the purchaser that it is illegal to make copies
of the software; the label is often in the form of a hologram indicating that it is a genuine copy.
▪ Some software will only run if the CD-ROM, DVD-ROM or memory stick is actually in the drive; this
stops illegal multiple use and network use of the software.
▪ Some software will only run if a dongle (allows wireless communications with devices, can also be used to protect
software) is plugged into one of the USB ports.
○ The Federation Against Software Theft (FAST) was set up in the UK many years ago to protect the software
industry against piracy. They prosecute organisations and individuals who are involved in any copyright infringements -
similar organisations exist in many countries
The language used by people when writing emails should follow an acceptable code of
practice.
Unacceptable content not to be used in emails, text and online forums:
○ obscene images
○ language that is regarded as abusive, profane, inflammatory, coercive, defamatory
or blasphemous
○ racist, exploitative or violent messages
○ use of illegal materials or messages
It is essential that anyone writing emails, or posting messages on bulletin boards, etc. is
aware of the above constraints.
Companies must set guidelines that all employees should follow when sending out emails
and they need to enforce these rules or face potential legal action.
The rules and guidelines should cover:
○ All employees should only assume they can use a company’s email system for
business use; it is up to companies to decide if personal emails should be permitted
on their systems
○ Companies may specify which company devices are allowed to be used for sending
and receiving emails
○ The acceptable style and tone of emails should be made clear (see sections on
acceptable language and netiquette); there needs to be a company standard style
when sending emails
○ It must be made clear what email content is not permitted
○ Employees should be told to only use their own accounts when sending emails (and
these accounts should be password protected)
○ There must be clear rules regarding confidentiality of information and that all staff
must be aware of their contractual obligations
○ Staff need to be aware of the method and duration of storing emails
○ Incoming emails should only be read by the recipient; they can only be read by
another member of staff if so nominated
○ The company policy on how to deal with and prevent viruses (and other security
threats) must be clearly laid out (these could include use of anti-virus software,
filtering of incoming and outgoing email traffic, use of auto-responders when staff
are not in work, and so on)
○ Monitoring of emails may be carried out and staff must be aware that the company
has the right to read all emails
○ Suitable ongoing training will take place to ensure staff follow company policy at all
times and that the company policy on emails will be enforced at all times
Emails, as with any electronic material, are subject to copyright laws. This includes attachments
so it may break copyright laws if any attachments are forwarded or printed; the user needs to check first if it is
legal to do this
It is generally not considered a breach of copyright unless the sender has indicated clearly that the message is
confidential or the subject of copyright law
Most companies or organisations will clearly set out their policies on sending emails and the material that they
contain.
When sending emails as a company employee, email addresses should contain the company name (e.g.
A.N.User@company_name.com).
Emails and attachments from companies and organisations will usually contain some copyright statement, such as:
○ Any dissemination or copying of this email or attachment is strictly prohibited unless you are the intended
recipient or are responsible for delivering the message to the intended recipient. If you have received this email
in error, please let us know and then delete the original email and any attachments .
Netiquette (Internet etiquette) refers to the need to respect other users’ views and display common courtesy when
posting views in online discussion groups or when sending out emails.
As they cannot see your facial expressions or body language, what may have been intended to be humorous could
offend somebody if they misunderstood your message, and they could draw the wrong conclusions.
The rules of netiquette include:
1. Do not be abusive – do not threaten people or use personal violence.
2. Do not send spam – do not repeatedly send somebody the same information.
3. Be clear and succinct with your message – do not waffle.
4. Remember that posts are public in most cases and can be read by anyone.
5. Always check your spelling and grammar – give a good impression.
6. Respect people's privacy and do not discuss or publish information that might embarrass somebody.
7. Forgive people’s mistakes – do not be compelled to respond to an error.
8. Do not use CAPITAL LETTERS to highlight comments – this is seen as ‘shouting’ in emails, text
messages and online forums.
9. Do not plagiarise – always acknowledge quotes used in any messages you write.
10. Do not use too many emoticons as they might annoy your readers.
Internet:
○ word internet comes from Interconnected Network
○ it is basically a worldwide collection of interconnected networks
○ a concept rather than something tangible
○ but it relies on a physical infrastructure that allows networks and individual devices to connect to other networks and
devices
Intranets
○ = A private club where only employees can enter
○ Many companies use an intranet as well as the internet
○ Definition
▪ a computer network based on internet technology but designed to meet the internal needs for sharing
information within a single organisation or company
○ Access is usually confined to a company or organisation
○ Intranets reside behind a firewall and are only accessible:
▪ internally to members of the company, or
▪ to people given various levels of access who are external to the company
○ There are a number of reasons for adopting intranets rather than using the internet:
▪ Intranets are safer because there is less chance of external hacking or viruses.
▪ It is easier to prevent external links to, for example, certain websites.
▪ Companies can ensure that the information available is specific to their internal audience’s needs.
▪ It is easier to send out sensitive messages in the knowledge that they will remain within the company.
▪ Intranets offer better bandwidth than the internet, therefore there are fewer connection limits than with the
internet (that is, the number of bits per second that can be transmitted are usually higher within an
intranet).
Extranet:
○ =A guest pass that lets certain outsiders access specific areas of the club but not everything
○ also possible to create extranets that allow intranets to be extended outside the organisation
○ same advantages as an intranet
○ Examples:
▪ Online Banking
▪ trading partners to have controlled access to some information (commercially-sensitive information is
password protected)
Blogs
○ Web logs (blogs)
○ personal internet journals where the writer (blogger) will type in their observations on
a topic (e.g. a review about a movie) and perhaps provide links to some relevant
websites.
○ Blogs tend to range from minor projects (a performance) through to important social
issues.
○ the comments made on blogs are NOT immune from the law; bloggers can still be
prosecuted for writing offensive material
○ Features of blogs:
▪ updated on a regular basis by the author
▪ usually organized in reverse chronological order (most recent to least recent)
▪ normally public – anyone can read them
▪ entries normally come from a single author
▪ other internet users cannot change blogs – they can only read them
○ Microblogs are similar to blogs, but are most often used on social networking sites to
make short, frequent posts.
○ instant messaging, emails or use other social networking vehicles (such as tweets)
○ Another version is a b-blog - short for business blog - which is used by businesses
to promote themselves on the internet.
Wikis
○ web applications or websites that allow any user to create and edit their web pages
using any web browser
○ They support hyperlinks and uses a very simple syntax (known as wiki markup) to
create pages
○ They have often been described as ‘web pages with an button’
Features of wikis:
10. Communication Page 361
○ Features of wikis:
▪ anyone can edit, delete or modify the content
▪ many authors can be involved in a wiki
▪ it is possible to organise a page any way the author(s) wish(es)
▪ shows/keeps track of all entries - that is, stores a document history
▪ can be easily edited using a web browser
▪ allows large documents to be seen by many people - it is easier than emailing
several people.
Social networking sites
○ focus on building online communities of users who share the same interests and
activities.
○ enable people to share photos, videos and music, hobbies, favourite eating places, and
so on
○ members do this by creating public profiles and thus form relationships with other
users
○ Features of social networking sites:
▪ Each member is provided with free web space.
▪ Each member can build their own private and public profiles.
▪ It is possible to upload content such as text messages, photos and videos.
▪ It is possible to ‘write on each other’s walls’.
▪ Members are given free instant messaging and video chatting.
▪ It is possible to email other members within the community.
▪ Members can create pages where they can post photos, articles, and so on.
▪ It is possible to invite people to become friends.
▪ Members have control over who can access their private or personal data.
Forums
○ moderated forum refers to an online discussion forum in which all the posts are
checked by an administrator before they are allowed to be posted
○ Many users prefer this type of forum, as the moderator can not only prevent spam,
but can also filter out any posts that are inappropriate, rude or offensive, or even
those that wander off the main topic
The internet is essentially a huge unmoderated forum. No one ‘owns’ the internet,
10. Communication Page 362
○ The internet is essentially a huge unmoderated forum. No one ‘owns’ the internet,
and it is essentially not policed
○ only real safeguards are a voluntary cooperation between the users and the network
operators
○ However, most social forums or networking groups on the internet have a set of rules
or protocols that members are requested to follow or they will be deleted
This section will consider how it is possible to access the internet and use some of its
features:
○ Internet Service Providers (ISP)
○ Web addresses, URLs, hyperlinks and web browsers
What?
○ a company that provides users with access to the internet
○ normal to pay a monthly fee for this service
○ When a user registers with an ISP, an account is set up and they are given login
details that include a user ID and password
○ An ISP has the equipment and telecommunications lines required to access the
internet – usually broadband connections which, in many cases, use fibre optic
cables
Web Browsers
○ software that allows a user to display a web page on their computer screen
○ They interpret or translate the HTML from websites and show the result of the translation
○ This can often be in the form of videos, images or sound.
○ Most web browsers share the following features:
▪ They have a home page.
▪ They have the ability to store a user’s favourite websites/pages (known as bookmarks).
▪ They keep a history of the websites visited by the use (known as user history).
▪ They allow users to navigate backwards and forwards through websites.
▪ They have hyperlinks that allow users to navigate between web pages; these hyperlinks are shown as
blue_underlined_text or use a small picture, such as a pointed finger
Opening a website via a URL
○ the URL contains the protocol, site address and file name. If you type in:
https://www.hoddereducation.co.uk/ to a web browser, you will go to the home page for the website.
○ If you know the URL for a page within the website, you can type the full entry into the web browser to get
a particular page.
▪ For example, if you want the IGCSE ICT page within the website, you could type in the full URL:
https://www.hoddereducation.co.uk/cambridge-igcse-it to get to the page
○ It is also possible to search through the website using the navigation tools until you find the web page you are
looking for
Opening a website via a search engine
○ useful if:
▪ you do not know the URL of the website,
▪ or if you want to find some information but do not know where to look
○ Many search engines exist, and they search for websites using a variety of methods
○ they all have one common underlying feature: they look up the words entered in the search box in their
database of web pages to find out which of them match the search string or criteria
○ The more detailed or specific your search string, the more accurate the results (known as ‘hits’) will be.
○ The more specific your search the less hits so more refined results
They can be further refined via the advanced search option
10. Communication Page 367
○ They can be further refined via the advanced search option
○ Once the information is found it can then be saved or used as follows:
▪ saved as a favourite and accessed when required
▪ added as a hyperlink in a document
▪ an image of web page can be saved by using ‘Print Screen’ in Windows (or the equivalent – it
varies between operating systems) and then pasted into a word-processor page
▪ information from the web page can be copied and pasted the into another document.
○ It is very important to acknowledge your sources of information when using information from a website in
your own work to:
▪ avoid plagiarism
▪ because the information will be subject to copyright.
Advantages and disadvantages of using the internet to find information
○ Advantages of using the internet to find information
▪ Information on the internet tends to be up to date because it is quicker and easier to amend web pages
than it is to, for example, reprint books.
▪ The internet has vast, almost limitless, amounts of information.
▪ Searching for information using a search engine is fast and easy.
▪ People can look for information in the comfort of their own home – there is no need to travel to a
library to find required books.
▪ Information on the internet is essentially free of charge.
▪ Pages on the internet can have multimedia elements (for example, videos, animations, cartoons and
music/voiceovers) that make learning more interesting and often makes it easier to understand the topics.
○ Disadvantages of using the internet to find information
▪ The internet is not regulated – anything can be posted on a web page and, consequently, information
may be biased or totally incorrect (books, on the other hand, usually undergo some form of review
before being published).
▪ There is always the risk of accessing inappropriate websites when using search engines; these can take
many forms and can be very distressing to certain people.
▪ Easier to be distracted when searching on the internet – users can find computer games or enter social
networking sites instead of doing their work.
▪ the risk of ‘information overload’ if the user lacks the necessary experience or expertise when using
search engines.
▪ Because it is very easy to copy material from the internet, there is a huge temptation to plagiarise
material;more likely than books.
10. Communication Page 368
material;more likely than books.
▪ Some research skills are lost when using the internet as search engines do all the work for you.
Why internet searches are not always a fast way of finding information?
○ Information overload: Millions of matching websites can appear.
○ Need for specific searches: Broad searches take longer to find exact results.
○ Unclear queries: If the user is unsure what to ask, finding relevant information takes time.
○ Time-Consuming Process
○ search engines have to decide what they think is the most appropriate result for a search query
○ Exactly how each search engine decides on the rank of their search results is kept top secret
○ engines also rank the time it takes to load up pages from websites – the fastest are given priority when the results appear
on the screen
○ search results may not always contain exactly what the user is looking for – more appropriate websites might be hidden
deep within the search results
○ All of this means that the user may not find exactly what they are looking for when using the search engine. It is
common to assume that if the first page of search results does not contain what the user was looking for then it does not
exist
○ It might be that the search engine misunderstood what the user was looking for – or it might have listed the correct
website on the eleventh page of search result
There are six criteria to consider when evaluating information found on the internet:
1. Is it possible to verify the legitimacy of who wrote the material posted on the website? Does the information come from a reliable
source that can be verified?
2. Is there a way to check if the information is factually correct; can it be verified from another source; is it grammatically correct
and free of spelling mistakes?
3. Is the article objective? Is there any evidence of bias (for example, does it contain links to organisations to support the ‘bias’ in
the article and does it contain any advertising which reinforces the bias in the article)?
4. Is the information dated? When was it last reviewed and by whom?
5. Does the article cover all aspects and are all the arguments fully supported either by information supplied or references to
external experts, or external links to well-respected organisations (such as universities)?
6. Does the website look legitimate? Do all the links in the website still work?
Protocols are sets of rules agreed by the ‘sender’ and ‘recipient’ when data is being transferred between devices.
Hypertext transfer protocol (HTTP)
○ a set of rules that must be obeyed when transferring website data across the internet.
○ When a web page is being accessed, entering http:// at the front of an address tells the web browser that ‘http rules’ for
communication are to be obeyed
○ If HTTP is omitted from the address, most web browsers now default to HTTP
○ When some form of security (for example, SSL) certification or encryption is used (see below) then the protocol is changed to
HTTPS (this is often seen along with the padlock symbol )
○ The letter ‘S’ in https refers to secure(d).
File transfer protocol (FTP)
○ a network protocol used when transferring files from one computer to another computer over the internet
○ is similar to HTTP, but the protocol is specifically for the transfer of files.
○ Web browsers can be used to connect to an FTP address, for example: ftp://username@ftp.example.gov/
Secure sockets layer (SSL)
○ a protocol that allows data to be sent and received securely over the internet
○ SSL is designed to work with communication protocols like HTTP and FTP. When used with HTTP, a user logs onto a
website as normal, but SSL encrypts the data - only the user’s computer and the web server are able to make sense of what is
being transmitted
○ a user will know if SSL is being applied when they see HTTPS, or the small padlock in the status bar at the top of the screen
Unfortunately, the internet does contain inappropriate material, some of which is criminal in nature.
Many users seem to think that because the internet is not policed, then they are unlikely to be prosecuted. This is of course untrue.
To prevent inappropriate material finding its way on to the internet, should there be some form of control?
YES:
○ It would prevent illegal material being posted on websites. People find it much easier to discover information, which can have serious
consequences (for example, how to be a hacker); although this can be found in books, it is much easier for a novice to find the required
information using a search engine.
○ Some form of control would prevent children and other vulnerable groups being subjected to undesirable websites, including criminal material.
○ Some form of control would stop incorrect information being published on websites.
NO:
○ Material published on websites is already available from other sources
○ It would be very expensive to 'police' all websites and users would have to pay for this somehow.
○ It would be difficult to enforce rules and regulations on a global scale, as different countries have different laws.
○ It can be argued that policing the internet would go against freedom of information/speech.
○ Many topics and comments posted on websites are already illegal and laws already exist to deal with the offenders.
○ Who is to decide what is illegal or offensive? Many things are only offensive to certain people (for example, religious comments) but not
necessarily to the majority.
There are additional precautions that can be taken:
○ ISP companies give the ‘bill payers’ some control over what can be accessed. It is possible for concerned parents, for instance, to put filters
onto the central router. This can prevent unnamed devices from accessing the internet through their router, or prevent named devices from
gaining access to certain websites.
○ Similarly, mobile phone companies offer a similar service and can block access to certain websites. It is not fool-proof, but is an additional
safety net.
○ Schools and textbooks can also play their part by educating users about the correct use of the internet – what to look out for and what
precautions to take. Teachers are an excellent source of information; if a student wishes to access a new website, it is always worth checking with
the teacher first to see if it is safe to go online and access the website.