ICT - Z Notes
ICT - Z Notes
ICT - Z Notes
CIE – IGCSE
Winter 2013
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
1
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
2
Software
Programs that control computer systems
Set of instructions that make the computer system do something
You cannot physically touch software
Relates to ideas and instructions for using physical objects
Two types of softwares:
System Software
Programs that allow the hardware to run properly
Control computer's hardware and application program
Communicate with user
E.g. Operating system
Application software
Programs that allow the user to do specific task
Design to carry out tasks
Can be general purpose software or custom made software (specialist software)
E.g. Spread sheets, databases, word processing
Zubair Junjunia
3
Backing store
Stores data/information and programs not being used at current time
Backing store device = reader or recorder e.g. Hard disk drive
Backing store media = hardware containing data e.g. Hard disk
CPU
Processing done by central processing unit
Three main components
o Control unit - coordinates input and output devices and carries out program instructions
o Arithmetic and Logical Unit (ALU) - performs calculations and logical comparison: A < B?
o Immediate access store (IAS) - holds data and program instruction in current use
Microprocessor
Used instead of CPU
Single integrated circuit
Zubair Junjunia
4
Main memory
Stores all data: application software, operating system, data files
Also known as primary memory and immediate access store (IAS)
Consists of ROM and RAM
Both RAM and ROM are integrated chips
RAM
Random access memory (RAM) is an internal chip where data is stored temporarily
Memory can be written to and read from
RAM usually larger than ROM (except washing machines)
Stores anything that needs to be changed
All program and data being used are on RAM
Contents lost when computer is turned off
Referred to as volatile memory
ROM
Read only memory (ROM) is memory used to store permanent information
Used to contain configuration data for a computer etc.
Chips cannot be altered, only read from
Data not lost when computer is turned off
Referred to as non-volatile memory
BIOS
ROM contains boot file, referred to as BIOS (basic input/output system)
Tells computers what to do when it first starts
BIOS carry out hardware check when computer is turned on
Then it loads operating system into RAM
BIOS stores date, time and system configuration in a non-volatile chip called CMOS (complementary
metal oxide semiconductor), which is usually battery powered
Operating system
Enables users to communicate with computer systems
Controls operation of input, output and backing storage device
Supervises loading, running and storage of application program
Deals with error in application programs
Maintains security of whole computer system
Maintains a computer log
Main types of user interfaces: Command Line Interfaces (CLI) and Graphical User Interface (GUI)
Zubair Junjunia
5
Advantages
Easy to use
Easy to explore and find your way around the system
Do not have to learn complicated commands
Exchange data between different softwares
Good help facilities provided with GUIs
Disadvantages
Larger amount of hard disk space than other interfaces
Significantly more memory (RAM) to run than other interface type
GUI use more processing power than other types of interfaces
GUI can be slow for experienced programmers to use, they find CLI much faster
Advantages
Knowing the correct commands, this can be much faster than any other interface type
Uses much less memory (RAM) than any other interface type
Low resolution, cheap monitors can be used
CLI does not require Windows to run
Disadvantages
Can be confusing
Commands have to be typed precisely, if there is a spelling error the command will fail
If you mistype an instruction, it is often necessary to start all over again
Large number of commands need to be learned
Zubair Junjunia
6
Types of Computers
PC/Desktop Computers
Refers to general purpose computers
PC refers to IBM compatible computers, distinguishing them from the Macs
Made up of separate monitor, keyboard, mouse and processing unit
Advantages
Spare parts standardized results in low costs
Tend to have better specifications
Large casing allows good dissipation of heat build up
Disadvantages
Not portable since they are not made up of separate components
Wiring clutters up desk space
Necessary to copy files as they aren't portable
Laptop (Notebook)
Refers to computers where monitor, keyboard, pointing device and processor together in a single
unit.
Extremely portable systems
o Low weight
o Low power consumption
Processor doesn't generate too much heat
Advantages
Portable because monitor, pointing device, keyboard, processor and backing store units are together
in one box.
No trailing wires
Full advantage of Wi-Fi
Can link into any multimedia system
Disadvantages
Easy to steal
Limited battery; need to carry charger
Keyboard and pointing device awkward to use
Heat dissipation is difficult due to laptop structure
Zubair Junjunia
7
Netbooks
Computer that can almost fit onto a hand
Smaller version of a laptop
Used to be known as a palmtop
Advantages
Portable because monitor, pointing device, keyboard, processor and backing store units are together
in one box.
No trailing wires
Full advantage of Wi-Fi
Can link into any multimedia system
Disadvantages
Easy to steal
Limited battery; need to carry charger
Keyboard and pointing device awkward to use
Heat dissipation is difficult due to structure
Don't have optical drives
Keyboards are 80% the size of laptop keyboard
Advantages
Can be used anywhere due to their size
Light weight and more portable than laptops
Disadvantages
Difficult to enter text quickly
Limited capabilities due to software and operating systems
Zubair Junjunia
8
Advantages
Can do very large due to feature listed above
Used in time sharing systems
Capable of very large number crunching
Disadvantages
Needs to be permanently housed in a large room
Very expensive to maintain and operate
Zubair Junjunia
9
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
10
Inputs
Keyboards
QWERTY- layout
Ergonomic- reduces health related problems
Uses
Keyboards are used to input data into application
software
Also used to for typing commands to the computer
(Ctrl+P)
Advantages
Enables fast entry of new text into a document
Well tried technology and well known method of entry
Most people find them easy to use
Easy to do verification check as data is entered, as it appears on the screen simultaneously
Disadvantages
Users with limited arm/wrist use can find keyboards hard to use
Entering data is slow when compared to direct data entry (e.g. Optical mark recognition)
They use up desk space as they are quite large
Concept keyboard
Uses icons or phrases instead of standard letters
A single key represents an item on the keyboard
Uses
Used in: Fast food restaurants, offices and shops
Advantages
Enables fast data entry (there is no need to type in whole commands)
Waterproof, useful in a restaurant environment
They are tamperproof, preventing people from keying in information (which could corrupt the
system)
Zubair Junjunia
11
Numeric Keypads
A numeric keypad is used to enter numbers only
Although some have function key to allow input of alphabetical
characters
Uses
Used in Automatic teller machines (ATMs), where customers can
key in their personal identification number (PIN), or an amount
of money
Used to key in phone numbers into telephones
Electronic point of sale (EPOS) terminals have numeric keypads in case the barcode reader fails
Used in Chip and PIN devices to key in PIN, or amount of money
Used to enable fast entry of numeric data into a spread sheet
Advantages
Numeric keypads are faster than standard keyboards for entry of numeric data
Since many are small devices (e.g. mobile phones), they are easy to carry around
Disadvantages
Can be difficult to use due to the very small keys
Difficult to use for entering text
Sometimes the order of the numbers isn’t very intuitive
Mice
An example of a pointing device
The ball underneath the mouse is used to detect movement
The left button is for selecting by double on it and the right is to bring
drop-down menus
There is usually a scroll button which speeds up the process of moving
through a document
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the size and position of the image)
Used for controlling the position of a pointer on the screen to allow:
o Selection from a menu
o Selecting an icon
o Scrolling up/down and right/left
Zubair Junjunia
12
Advantages
Faster to select an option by a mouse than a keyboard
Enables rapid navigation through applications and the internet
Mice are small and don’t take much area
Disadvantages
People with restricted hand/wrist movement can find it hard to operate a mouse
Easily damaged and can easily be clogged up with dirt
They are hard to use if there is no flat surface available
Touchpads
Touchpads are used in many laptop computers as a pointing device
The pointer is controlled by the user moving their
finger on the touchpad
Uses
Used for opening, closing and minimising software
Used for grouping, moving and deleting files
Useful when editing images (e.g. controlling the
size and position of the image)
Used for controlling the position of a pointer on the
screen to allow:
o Selection from a menu
o Selecting an icon
Advantages
Faster to select an option by a touchpad than a keyboard
Enables rapid navigation through applications and the internet
Since the touchpad is integrated into the laptop computer, there is no separate mouse, aiding
portability
They can be used when no flat surfaces are available
Disadvantage
People with limited hand/wrist movement can find touchpads hard to use
It can be more difficult to control the pointer when compared to a mouse
They are more difficult when doing operations such as ‘drag and drop’
Zubair Junjunia
13
Tracker balls
Tracker balls are similar to a mouse except that it has a ball on the top of the device
Users control the pointer on the screen by rotating the ball
Uses
Have the same pointing/cursor control capability as a mouse
Used in applications where the user has a disability (RSI)
Used in a control room environment, where it is faster than a mouse to
navigate through process screens and more robust than a mouse
Advantages
Tracker balls don’t need the same fine control as a mouse
People with limited hand/wrist movement find easier to use than a mouse
The pointer can be positioned more accurately on the screen than with a mouse
They take less desk space than mice since they are stationary
Disadvantages
Tracker balls are not supplied with the computer as standard, so they are more expensive
User may need training since they are not standard equipment
Remote Controls
A remote control is used to control the operation of other devices
remotely by using infra-red signals
Uses
In home entertainment devices such as Televisions, DVD
player/recorder and satellite system
Used to control multimedia systems
Used in industrial applications to remotely control processes, stop and
start machinery
Advantages
Enable devices to be operated from any distance, which is useful for people with disabilities
Some chemical processes are hazardous, so it is safer to operate equipment from a distance
Disadvantages
People with limited hand/wrist movement can find them hard to use
The signal between the control and the device can be easily blocked
Zubair Junjunia
14
Joysticks
By gripping the stick, a pointer on the screen can be controlled
Buttons are used to make selections
Uses
Video/computer games are often controlled by joysticks
They are used in simulators to mimic actual controls
Advantages
Easier to navigate round a screen compared to a keyboard
Control is in three dimension
Disadvantages
More difficult to control the on-screen pointer with a joystick than with other devices such as mice
Touchscreens
User can choose an option by simply touching a button/icon on the screen
The selection is automatically made without the need for any
pointing device
Use
Used for service tills e.g. petrol stations
Used where selections are made on a screen e.g. ATMs, public
information systems, airports and railway stations
Used in PDA’s
Used in Interactive white boards
Used in computer based training (CBT)
Advantages
Enable faster entry of options than a keyboard or a mouse
Very easy to choose options
User friendly method for inputting data
They are tamperproof, preventing people from keying in information (which could corrupt the
system)
Disadvantages
There is a limited number of options available
Using touchscreens often can lead to health problems e.g. (straining of arm muscles and RSI)
The screen can get very dirty with constant touching
Zubair Junjunia
15
Uses
Credit and debit cards have magnetic stripes that are used
by ATMS or EFTPOS (electronic funds transfer point of
sale) terminal
Security cards for entering building e.g. hotel rooms
Travel systems e.g. train and underground tickets
Advantages
Data entry is fast compared with keying in using a keyboard or keypad
System is error free, no typing involved
Information is secure since there is no typing and the information can’t be read directly by a person
Can prevent access to restricted/secure areas
Magnetic stripes are unaffected by oil water and moisture
No moving parts therefore physically robust
Disadvantages
If the magnetic stripe is damaged the data is lost
Card needs to be in close contact with the reader
Since the information is not human readable, they need to find a way to show the information to the
customer (e.g. hotel room number not printed on cards)
Uses
Loyalty cards, ID cards and public transport passes
Can be used to track customer/passenger movement
Used with a satellite system to decode program signals
Used for electronic passports and driving licences
Advantages
Some smart cards are used instead of money
The chip on the card does not need to be in contact with the reader
Data is more secure since it’s easier to copy data of magnetic stripe than on a chip
Zubair Junjunia
16
Disadvantages
If the card is lost information stored on the chip could be used for identity theft
Uses
Chip and PIN readers are used where payments are made using cards
e.g. travel agents
Advantages
Provide a more secure payment system than requiring a signature or using magnetic stripe, since the
PIN typed in must match up with the PIN stored on the chip
Provide a more robust system than magnetic stripe since the chip does not need to be in contact
with the reader
Disadvantages
Customer needs to be careful when typing in the PIN so nobody reads it giving an opportunity for
Fraud
Scanners
Used to enter information on hardcopy e.g. text documents
Uses
Used to scan in documents and convert them into a format for
use in various software packages
Old and valuable documents and books can be scanned,
protecting the original copies from damage
Non-digital photographs can be scanned for storing on a
computer
Advantages
Images can be stored for editing at a later date
Scanners are much faster and more accurate than typing in documents again
It is possible to recover damaged documents and photographs by scanning them and then using
appropriate software to produce an acceptable copy
Disadvantages
The quality can be limited depending on how good the scanner resolution is
Zubair Junjunia
17
Barcode readers
Used to read information in the form of a barcode
Handheld scanners or wands are very common for reading barcodes
Uses
Used in supermarkets and other shops where the goods are marked
with a barcode
Used in libraries to scan users library card and barcodes on books
(in order to keep track of books on loan)
Used as a safety function in many companies to ensure that
electrical equipment is checked on a regular basis
Advantages
Faster than keying in information, and fewer mistakes are made
Used as a way of recording data, can improve safety
Barcodes enable automatic stock control
Barcode scanning is a tried and trusted technology
When an item price is changed, only the central database needs to be updated, there is no need to
change the prices individually on each item
Disadvantages
Barcode scanning is an expensive system to administer since every item in the shops needs a
barcode and every barcode needs to be entered on the system. Also there is a need to invest in the
computer technology together with staff training, which can all be expensive
The system is not fool proof- barcode can be swapped around on items
OMR Devices
Optical mark recognition is a system which can read marks written in pen or pencil
Uses
OMR devices are used to read questionnaires, multiple choice
examinations papers and other types of forms in the form of lines
or shaded areas
Advantages
A very fast way of inputting results of a survey
Since there is no typing, it is more accurate than keying in data
OMR is more accurate than OCR
Zubair Junjunia
18
Disadvantages
Forms need to be carefully designed to make sure that the marks/shadings are correctly positioned
to gather accurate information
There can be problems if forms aren’t filled correctly, sometimes they have to be checked manually
before being read by an OMR, this is both time consuming and expensive
OCR readers
Optical Character recognition is a software that takes scanned text and converts it into a computer
readable form
Uses
Processing of passports and Identity cards
OCR is used when scanning documents to modify them using a
suitable software
Advantages
Much faster data entry system than manually keying in data
Since there is no manual data entry, the number of errors is reduced
Disadvantages
The system has difficulty reading handwriting
It is still not a very accurate technique
MICR Device
Magnetic ink character recognition is a system which can read
characters printed in a special ink
Uses
Used to process cheques in banking operations – cheque is
read using a batch processing method
Advantages
MICR offers great security than OCR since the oriented
characters cannot be altered
There is no manual input, thus errors are reduced
If somebody writes over the magnetic ink characters it can still be read
Disadvantages
Only certain characters can be read and the number of different characters is very limited
It is a more expensive method than other methods used for direct data entry
Zubair Junjunia
19
Digital Cameras
Photographs are stored in memory
They can be easily transferred to a computer using a USB
Uses
Digital cameras can produce photographs for direct transfer to
a computer or to print out
Digital cameras allow short video clips to be produced
Photographs can be uploaded directly into application
software such as word processor
Advantages
Easier to produce better quality photographs than with a tradition camera
Easier and faster to upload photographs to a computer
There is no need to develop film and print out photographs (saves paper and no longer needs the
chemicals to produce photographs from films)
Easy to delete an image from the memory if it’s not satisfactory
The memory card can store several hundred photographs
Disadvantages
The camera user needs to be computer literate to use the camera properly
There is some artistry lost since clever software corrects errors in the photographs
The resolution is not yet as good as traditional cameras
Images often need to be compressed to reduce the amount of memory used
It is possible to fill up computer memory very quickly with several photos of the same subject(in
order to find the perfect snap shot)
Webcams
Connected directly to a computer via a USB port
Uses
While chatting online webcams can be used to have
conversations
Used to enable video conferencing to take place
Advantages
Can be left on constantly and activated when required
Allow people to keep in contact with each other without the need
to travel, particularly useful for disabled or elderly people
Disadvantages
Webcams have limited features and the picture is often of poor quality
They need to be connected to a computer
Zubair Junjunia
20
Microphones
Can be connected directly to a computer
Sounds can be inputted and manipulated
Uses
Microphones are used to input speech/sounds to be used in
various applications
They are used in voice recognition software- for conversion
of speech into text, and recognition of commands
Advantages
Faster to read in text than to type it using a keyboard
Possible to manipulate sound in real time using special
software
If used in a voice activation system, this has the advantage of improving safety
Disadvantage
Sound files can use up a lot of computer memory
Voice recognition software isn’t as accurate as typing in manually
Sensors
Type of sensor Applications
Temperature Automatic washing machines, central heating systems, automatic green
houses, ovens
Pressure Burglar alarm systems , robotics, environmental monitoring , Automatic
washing machines
Light Automatic doors, street lighting control , Burglar alarm systems, automatic
greenhouses
Sound Burglar alarm systems, monitoring liquid and powder flow in pipes
Humidity/moisture Automatic greenhouses, environmental monitoring, factories where moisture
levels are crucial
pH Automatic greenhouse, chemical processes, environmental monitoring
Advantages
Readings by sensors are more accurate than taken by humans
Readings are continuous, there is no break in monitoring
Because it is a continuous process any necessary action or warning will be initiated immediately
The system can be automatic, removing the need for human intervention, this is particularly
important if the process is hazardous
Disadvantages
Faulty sensors can give spurious results
Zubair Junjunia
21
Graphic tablets
A graphic tablet is used with a stylus to produce freehand drawings
Uses
Graphics tablets are used to produce drawings,
computer graphics
In countries where characters are complex e.g. japan
they are used as a form of input
They are used in computer aided design (CAD) work
Advantages
It is possible to modify drawings before they are input
They offer an accurate method of drawing
Disadvantages
They are more expensive than other pointing devices
Light Pens
Contain sensors that send signals to a computer
whenever light changes are detected
Uses
Light pens are used for selecting objects on CRT
screens
They are used for drawing on screens e.g. with a (CAD
package)
Advantages
Light pens are more accurate than touchscreens
They are small, so can be used where space is an issue
They are easy to use
Disadvantages
There are problems with lag when drawing on screens
Only work with CRT monitors at the moment
They are not very accurate when drawing
Output Devices
Hardware devices that allow data to be output from a computer
Some hold data temporarily e.g. a monitor
Some produce permanent output in the form of a hardcopy e.g. a printer
Zubair Junjunia
22
CRT Monitors
Cathode Ray Tube monitors
Least expensive type of monitor, becoming rarer as TFT monitors take over
Come in various sizes
Picture created is made up of tiny dots (red green or blue), the intensity of
the colour of the dot determines the colour perceived by the eye
Uses
Primary output device for computers, user can immediately see what they are typing in
Used with light pens to allow designs to be created on screen
Advantages
Produce higher quality images than TFT monitors
Angle of viewing is better than a TFT monitor
They work with light pens in CAD and CAM applications (Computer Aided Design/Manufacturing)
Disadvantages
Tend to be heavy, weight hazard if not supported properly
Run very hot, can cause fires if left unattended – especially if they are old
Consume more power than TFT monitors
They can flicker, this leads to headaches and eyesight problems with prolonged use
TFT Monitors
Thin Film Transistor monitors
Taking over from CRT monitors as the main output device
The progress in TFT technology is one of the reasons for the rapid
development of laptop computers
The screen is made up of thousands of tiny pixels which are made up
of transistors controlled by a microprocessor.
o Each pixel has three transistors-red, green or blue; the
intensity of each determines the colour of the pixel seen.
Uses
Primary output device for computers, user can immediately see what they are typing in
Integral part of laptop computers
Advantages
Lightweight, so no weight hazards like CRT monitors
Less glare produced than in CRT monitors; also emit less radiation
Consume much less power and generate less heat than CRT monitors
Zubair Junjunia
23
Disadvantages
Angle of viewing is critical, image appears unclear if viewed slightly from the side
o This is an issue if several people are looking at the screen at the same time
The definition is sometimes not as good as CRT monitors
They cannot yet be used with light pens, so cannot be used in CAD
Laser Printers
Produce very high-quality hard copy output
Print rate per page is fast if a large number of pages are being
printed
Rely on large buffer memories – the data for the whole document is
stored before pages can be printed out
Uses
Used where noise levels need to be kept low e.g. in an office
The best option for fast, high quality, high volume printing
Advantages
Printing is fast for high volumes, slightly faster than inkjet if only a few pages are to be printed
Can handle very large print jobs
Quality is consistently high
Toner cartridges last for a long time; laser printers can be a cost effective option if colour outputs are
not required
Disadvantages
Expensive to buy
Only really fast if several copies are being made
Colour laser printers tend to be expensive to run since four cartridges are needed as well as diffuser
kits, etc.
Produce ozone and volatile organic compounds because of their printing method and type of toner/ink
used
o These have been linked to health hazards in the office
Inkjet Printers
Used to produce good quality hard copies – the quality is not as good as
in laser printers but much better than that of dot matrix printers
Do not have large buffers like laser printers, so printing is done a bit at a
time
o This is why printing is sometimes paused – the whole page can’t
be stored in the buffer, it has to wait for the computer to send
more data
Zubair Junjunia
24
Uses
Used where low volume outputs are needed
Ideal for high quality printing for small print jobs or single pages e.g. for photo quality printouts
Advantages
High quality output
Cheaper to buy than laser printers
Very lightweight and take up little space (small footprint)
Do not produce ozone and volatile organic compounds, unlike laser printers
Disadvantages
Output is slow if several copies needed – there is little buffer capacity to store the pages
The ink cartridges run out too quickly to be used for large print jobs
Printing can smudge if the user is not careful
Can be expensive to run if they are used a lot – original ink cartridges are expensive
3D Inkjet Printers
A new type of printer that produces solid 3D models using
modified inkjet technology called tomography
Very thin layers of fine powder (plaster, resin, starch) are
bonded together as a 3D model is slowly built up
Items produced are known as prototypes
Uses
Used to produce prototypes which actually work from CAD packages, photograph images, stored
drawings etc.
Scale models are produced in colour before the real thing is manufactured
The ultimate objective is to produce organic objects using this layering technology (such as
replacement human organs)
Advantages
Save a lot of money, other methods of making prototypes are very time consuming and expensive
The powders used can often be ground up and reused
Physical scale models are produced with working parts, which gives a better idea of how the end
product will look
Disadvantages
Expensive to buy
Slow at producing their output
End product is sometimes a little rough, often further work needs to be done
Zubair Junjunia
25
Uses
Can be used in noisy environments e.g. garage workshops
Can be used in applications were the print quality is not very
important
Advantages
Can be used in environments which would be a problem for laser and inkjet printers – dusty, dirty or
moist atmospheres
Carbon copies or multi-part outputs can be produced
Very cheap to run and maintain
Easy to use if continuous stationary is required e.g. long print jobs such as wage slips
Disadvantages
Very noisy – not good in an office environment
Cost more than an inkjet printer to buy
Very slow
Printing is of poor quality
Graph Plotters
Devices that produce hard copies but operate in a different way to printers.
Not limited to normal printer paper size and are capable of producing
highly accurate, very large drawings and posters
The most common types are pen plotters, electrostatic(similar
method to laser printers) and inkjet plotters
o With pen plotters, coloured pens are controlled by a
computer and the paper can move backwards and forwards
to allow accurate shapes to be drawn
Uses
Used to produce large drawings e.g. blueprints of buildings; are often used with CAD applications
Used to produce large pictures for use on billboards or giant posters
o They can also print on plastic coated paper
If the pens are replaced by cutting tools, it is possible to make large signs
Advantages
Can produce huge printouts
Print quality is extremely high
Zubair Junjunia
26
Disadvantages
Slow in operation
Expensive to buy and maintain
Speakers
Can be connected directly to a computer or are built into the
monitor or casing (as in laptop computers)
Uses a digital to analogue converter (DAC) to convert digital data
from the computer to analogue from so the speakers can process
it; the signal is then amplified through the speakers.
Uses
Used to output sound from multimedia presentations
Used in home entertainment centres
They can help blind people through audio output of text on the
screen (together with speech generation software)
Used to play downloaded sound files
Advantages
Usually long lasting and durable (if operated within their intended power levels)
Often provided with the computer/laptop although these may not be the best quality
Disadvantages
Can take up a lot of desk space, compared to headphones
Can distract people around you, everyone can hear what you are playing
May not be able to hear the full sound spectrum, this requires multiple speakers
Multimedia Projectors
Receive analogue and digital signals, although most
modern projectors only work with digital inputs
The signal source is usually from a computer, television
or DVD player
The image from the source is magnified and projected
onto a large screen
The devices usually work with a remote control, but can
also use virtual mouse technology – cordless PC mouse
(has a laser pointer)
o It is then possible to direct the presentation without being tied to the computer
o Most multimedia projectors take input from various types of video format e.g. PAL, NTSC or
SECAM
Zubair Junjunia
27
Uses
Used for training presentations ( allows the whole audience to see the images from a computer)
Also used for advertising presentations (shown at exhibitions, shopping malls etc.)
Home cinema systems (projecting the images from a DVD or television) use multimedia projectors
Advantages
Enables many people to see a presentation rather than all of them crowded around a small computer
screen
Avoids the need for several networked computers
o e.g. when looking at a video clip on the internet, everybody can see the video on the large
screen rather than logging on to a number of computers
Disadvantages
Images can sometimes be fuzzy
Expensive to buy
Setting up projectors can be a little difficult
Control Devices
Another type of output device
Used to control processes when combined with sensor input devices
Actuators
Transducers that are used to take signals from a computer and convert them into some form of motion
e.g. operating motors, pumps, switches and valves
Digital signals are sent from the computer to an actuator to operate a device
Conversion of the digital signal to analogue is required first (using a DAC)
Motors
Turned on or off by the actuator
Uses
Used in many domestic appliances
o Automatic washing machines (to make the drum
rotate)
o Cookers (to switch on fans)
o Water pumps in central heating systems
o Automatic greenhouses to open windows and
switch on fans
Used to control robot arms in the industry
Operate fans, disk drives and DVD drives in computers
Zubair Junjunia
28
Buzzers
Switched on or off by the actuator
Uses
Used in cookers and microwave ovens to tell the operator when the cooking process is complete
Used in burglar alarm systems to warn if intruders are present
Lights
The actuator is connected to the switch that turns the lights on or off
Uses
Security lights
Used in greenhouses to control the lighting conditions
Heaters
Actuators are connected to switches which turn the heater on or off
Uses
Used in automatic washing machines, cookers and central heating systems
Used in automatic greenhouses to control the temperature
Zubair Junjunia
29
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
30
Types of access
Serial access
This type of access is the slower type because you have to go through everything one by one until
you reach what you want.
If you want to watch a show that you recorded earlier, you have to rewind / fast-forward through all
other shows until you find it. (can’t just skip)
The good thing is that when this type of access needs updating you can easily just add another tape
and merge the old one with the new.
Zubair Junjunia
31
Direct access
Computer uses a key field to calculate where data has been stored
It is then able to access the data directly from the calculated position
Access is much faster than with serial access
Used in applications where access speed is vital
When updating media which uses direct access, the new data is written to the next available location
and its position is calculated using the built-in algorithm
Magnetic
Fixed Hard Disk
Available on all computers and is the main method used for data storage.
Uses a read/write head to write and read data from it
Disk surface coated in magnetic film, storage is done by altering binary codes to 1 or 0s.
Uses
Used to store operating systems and working data
Used for storing application software
Real time systems and online systems used fixed hard drives
Used in file servers for computer networks
Advantages
Very fast data transfer rate and fast access times to data
Have very large memory capacities
Disadvantages
Can be easily damaged
They lack portability
Zubair Junjunia
32
Uses
Can be used as backup systems to prevent loss of data
Can be used to transfer data, files and software between computers
Advantages
Data access time and transfer rate is very fast
Large memory capacities
Can be used to transfer information between computers
Disadvantages
Can be easily damaged
Advantages
Using a CD to store a small file is often regarded as wasteful
It is a very simple technology and are also extremely cost
Disadvantages
Very low memory capacity
Old technology – not compatible with modern computer
Slow data transfer
Not very robust
Magnetic tapes
Thin strip of plastic which is coated in a magnetic layer
Read and written by read/write head
Uses
Application where batch processing is used
Used as a backup media
Advantages
Generally less expensive and very robust technology
Data transfer rate is fast
Zubair Junjunia
33
Disadvantages
Access time is very slow
When updating another tape is needed
Uses
Store music files and software.
Very large storage capacity and are used to store films.
Advantages
Holds more data than floppy disks
Less expensive than hard disk drives
Disadvantages
Data transfer rate and data access time are slower
Uses
They are used for home recording of music (CD-Rs) and films (DVD-Rs)
They are used to store data for later use
Used in applications where it is necessary to prevent the deletion or over-writing of important data.
Advantages
Cheaper than RW disks
Once burned (and finalized) they are like ROM
Disadvantages
Can only be reordered once
Not all CD/DVD players and can read CD-R
Zubair Junjunia
34
Uses
CD-RWs and DVD-RWs are used to record radio and television programs
They are used in closed circuit television (CCTV) systems
Advantages
Can be re used many times
Different file formats can be used each time
Less wasteful than R format since files or data can be added at a later stage
Disadvantages
Relatively expensive media
Possible to accidentally overwrite
DVD-RAM
Recent addition to optical media group
Unlike other CD and DVD formats, DVD-RAMs have several discrete concentric tracks rather than a
single spiral track
Gives them advantage that writing and reading can occur at the same time
Makes it possible to watch an already recorded television program at the same time as a different
program is being recorded
Recording layer is made from similar phase-changing material to that used in RW technology
Shiny and dull marks represent data to a computer where they are interpreted
Uses
DVD-RAMs are used in recording devices such as satellite receivers to allow simultaneous recording
and playback
They are used in camcorders to store films
Zubair Junjunia
35
Advantages
Have a long life (30 years)
Can be re written on more than the DVD-RWs (100,000 times)
Very reliable as they have built in verification software to ensure accuracy of data
Access is very fast
No need to finalize the disk
Very large capacities
Ability to read and write data at the same time
Disadvantage
DVD-RAMS are not as compatible as R or RW, many systems will not recognize this format
More expensive than DVD-RW
Blu-ray disks
Uses
Blu-ray disks are used in home video consoles
Used for storing and playing back films
PCs can use this technology for data storage or backing up hard drives
Camcorders can use this media to store film footage
Advantage
Very large storage capacity
Data transfer rate is very fast
Data access speed is faster than with other optical media
Disadvantage
Disks are relatively expensive
Blu-ray disks still have encryption problems
Solid state
Solid state systems control the movement of electrons within a microchip: if the transistor conducts
a current, this is equivalent to a 1, otherwise it is a 0
Have no moving parts, consume much less power and are extremely robust
Used primarily as removable storage devices and are collectively known as flash memory
Zubair Junjunia
36
Uses
Used to transport files between computers
Used as a security device – a dongle – to prevent software piracy
Advantage
Very compact and portable media
Very robust
Disadvantage
Not possible to write protect the data and files
Small physical size and are easy to lose.
Uses
Used to store photos on digital cameras
Mobile phones use them as memory cards
Used in MP3 players to store music
Used as a backup in hand held devices
Advantages
Very compact
Very robust
Disadvantages
Very expensive per Gb of memory when compared to hard drive disks
Has a finite life in terms of the number of times they can be read from or written to
Lower storage capacity than hard disk
Zubair Junjunia
37
Portability
Very portable Flash memory cards
Memory sticks/pen drives
All the CDs and DVDs
Less portable Portable hard disks
While some tapes are small others are large
Not portable Fixed hard disks
Zubair Junjunia
38
Robustness
Very robust Memory sticks/pen drives
Flash memory cards
Robust but might CD-ROM, DVD-ROM
damage in some CD-R, DVD-R
circumstances HD-DVD, Blu-ray
Robust but may CD-RW, DVD-RW
lose data if DVD-RAM
wrongly used BD-RE (Rewritable Blu-ray)
Portable hard drive
Magnetic tape
Very fragile if Fixed hard drive
moved
Cost
Low cost CDs, DVDs
HD-DVD/Blu-Ray
Medium Cost DVD-RAM
Memory sticks/Pen drives
Flash memory cards
Expensive Magnetic tape
Portable hard drives
Fixed hard drives
Zubair Junjunia
39
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
40
COMPUTER NETWORKS
Common types of networks
File servers: allow users to save and load data/files
Applications servers: deal with distribution of applications software
Printer servers: ensure printing from devices on the network is done in a queue
Proxy servers: used as a buffer between WANs and LANs
Advantages
Work well under heavy loading.
Zubair Junjunia
41
Disadvantages
If fault in wiring between two computers then whole network will fail.
Adding a new device or computer to the network can be difficult since it has to be placed between
two existing devices.
Bus networks
Each computer or device is connected to a common central line.
Data travels along central line until it reaches the computer or device that requires
it.
The ends of the line have terminators to prevent signal bounce, which would cause
data interference.
Advantages
Easy to add a new computer or device to the network
If one device or computer fails, does not affect the rest of the network.
Doesn’t need a hub or a switch and also requires less cabling - saves on costs.
Disadvantages
Difficult to isolate any fault on the network
If central line has a fault then whole network fails.
Becoming an increasingly outdated topology for network design
Performance worsens noticeably as more and more devices/computers are added.
Star networks
Each computer or device connected via central hub or switch.
Data sent to the hub which then sends out data along every cable to every
computer or device
Advantages
If one computer or device fails, then the rest of the network is unaffected.
Problems on the network are easy to identify and work can fixed without affecting
rest of the network.
Easy to expand the network
Disadvantages
If the central hub breaks down, the whole network crashes.
Tree network
A tree network has a central line connecting together a series of star networks
The server is also connected to this central line.
Because of its flexibility, and the fact that it has the advantages of both bus and
star networks, this topology is becoming increasingly popular.
Zubair Junjunia
42
The advantages and disadvantages are the same as for bus and star networks.
Advantages
All computers can access the same services and resources
No cabling is involved
The system is more flexible
Adding new computers and devices is very easy
Cost is reduced and safety is improved
Disadvantages
Security is an issue
Problems and interference can affect the signal
The data transfer is slow than in the wired LAN
Wi-Fi
Any system which allows you to connect to a network or computer through wireless communication
Examples :
o WLANs
o PDAs
o Laptop computers
o Peripheral devices such as printers
Wi-Fi Hotspots
Wi-Fi systems rely on AP (radio frequency technology) to enable the device to receive and send
signals
Wi-Fi hotspots are places where you can access Wi-Fi (free or paid)
Hotspots are found in public places like Airports, hotels and cafés
War driving: The act of driving and searching for unsecured Wi-Fi hotspots
This gives a risk to the Wi-Fi system
Bluetooth
Bluetooth is an example of wireless personal area networking (WPAN) technology
Spread spectrum transmission (radio waves) is used to provide wireless links between to devices
such as mobile phones and allow connection to the internet
A small home network can be created with this system
Zubair Junjunia
43
Network Devices
Modems
It stands for modulator demodulator.
Converts computer’s digital signals (modulates it) into analogue for transmission through telephone
lines.
Reverse this process- analogue signal from a telephone line into digital for a computer to process the
data. (demodulates it)
The main use it to connect to computer networks over long distances using existing telephone lines.
Types of Modems
Dial-up modems: operate at 60 kilobits/sec (slow compared to modern standards)
(ADSL) asymmetric digital subscriber line modems operate at 11,000 kilobits/sec.
Asymmetric: faster at downloading than uploading
They don’t tie up the line while accessing the internet, which allows simultaneous internet access
and usage of telephone.
Cable modems: allow cable TV users to receive TV signals as well as internet access.
Network Hubs
They are devices that can have multiple devices connected to them.
Main task is to receive data from different ports and send it to each device
The information will be received to the device whether its relevant, or not
Zubair Junjunia
44
Switches
More efficient than hubs in distributing data.
Each device has an access control media address MAC which identifies it uniquely
MAC is a number unique to each device connected to the network (like fingerprints)
Data sent will have a mac address which tells the source and receiving device.
Bridges
It connects 2 different types of networks together e.g. a bus and star network
It can only connect networks that use the same way for handling messages
They do this by changing the form of message to suite the different type of network
Routers
Acts like a bridge, yet can link between two or more networks
Makes decisions on messages being passed between the networks
Formats the messages making it suitable for the new network
Reads information about the message and decides where the message should go and the best route
for it to get there
Used to provide a connection between a network and the internet
You need an ISP account to have access to the internet (internet server provider)
Internet
The Internet is a worldwide collection of networks.
It allows for web browsing, gaming, file sharing, video and email.
User can access by web browser.
Websites
Web is made up of millions of websites and web pages
Web pages are documents on a computer screen containing various multimedia and text, pictures
A website consists of many of these pages linked together
Zubair Junjunia
45
Cable internet Local cable television operators gives user access through cable networks
access (cable
modem)
Internet access via Fastest download speed connections (at least 11000kbps)
DSL (broadband
modem)
Intranet
It is an internal website that is setup internally for companies and can be accessed by employees for
the purpose of standard documents or information and many items of information and data.
Benefits
Safer and less chance of hacking
Possible to prevent employees from accessing unwanted sites
Companies ensure that info. available is specific to their needs
Easier to send sensitive messages that remain within a company
Zubair Junjunia
46
Network Security
User IDs
To log on to a network, a user must type in a user ID
User ID assigns user privilege once user logs in
The top level privilege for a network is an administrator:
o Able to set passwords and delete files from server etc.
User privilege may only allow to access their own work area
Passwords
After typing in user ID, the user will be requested to type in their password.
Generally, it is a combination of letters and numbers
Passwords are shown as stars (***) so nobody overlooking can see it.
Many systems ask for password to be typed in twice as a verification check, in case of input errors
To help protect the system, user is has a finite number of attempts.
If password is forgotten, administrator has to reset it
If password is forgotten on a website, it will be sent to your e-mail
Encryption
The conversion of data to code by encoding it
Done by using encryption software
Since data is encoded, it appears meaningless to a hacker
This technique does not prevent illegal access
Necessary to use decryption software to decode the data
Used to protect sensitive data e.g. banking details
Encryption keys are complex algorithms which makes codes almost unbreakable
Zubair Junjunia
47
Authentication techniques
These are the ways in which a computer user can prove who they are
Most systems adopt following logics:
o Something you know – password/pin
o Something belonging to you – bank card
o Something unique to you – your fingerprint
At least two of these are needed to prove who you are
Communication Methods
Fax (Facsimile)
A system that scans documents electronically and converts them into a bit map image (a bit is a
binary digit and is a 1 or a 0)
Then transmitted as a series of electrical signals through the telephone network
Receiving fax machine converts the electronic image and prints it out on paper
It is also possible to generate fax signals from a computer to allow documents to be sent to a fax
machine
This saves printing out the document first and then passing it through the fax machine
Fax/modem software in the computer converts the image into a form fax machines can recognized
Email
Another method for sending text and attachments from one computer to another over a network
Advantages
Speed of sending and receiving replies is quick
Low cost (no stamps, paper etc.)
Not needing to leave home to send the mail
Disadvantages
Possibility of virus threats and hacking
Need for the email address to be correct
Inability to send bulky objects via emails
Video Conferencing
This is a method of communication between people at 2 or more separate locations
It is done in real time and makes use of LAN, if internal, or WAN if through the internet.
Uses hardware like; webcam, microphones, speakers and monitors
It also uses special software like CODEC converts and compresses analogue data into digital data to
send down digital lines.
Zubair Junjunia
48
How it works
Delegates at one end speak into a microphone and look into the webcam.
The other delegates can see them and hear them using speakers and monitors,
However there are several problems with these as the conference call often lags and quality is not
always high.
Also, as travelling tickets increase in price, terrorists can use this way of communicating with each
other, increasing risk.
VOIP
VOIP (Voice over internet protocol) is a method used to talk to people over internet
VOIP converts sound (picked up by a microphone) into discrete digital packets that can be sent to a
destination via internet
The biggest advantage is that it is free and can be used all over the world
The biggest disadvantage is that sound quality is usually bad.
Security Issues
Identity and service theft
Viruses and malware
Spamming (sending junk mail)
Phishing attacks (the act of sending an email to a user falsely claiming to be an established legitimate
enterprise in an attempt to scam user in different ways
Zubair Junjunia
49
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
50
DATA TYPES
Data: simply any numbers, letters or symbols that can be entered into a computer system
Data stored on computers = digital (for storage & manipulation)
Physical measurements of continuously varying data (real world) = analogue
Stored in logical sequence (allow access and/or search)
Types of Data
Numeric
Integers - Whole numbers (no decimals)
E.g. amount of people
Real numbers- Numbers that have a decimal part
E.g. person’s height
Alphanumeric
Can have alphabets and numerical characters
Usually symbols ($%^+@, etc.) and spaces are also allowed.
If they are needed for calculations then they are numeric if not then they can be alphanumeric
E.g. (Dog, ABC123, [email protected])
Logical/Boolean
Can only have two values TRUE or FALSE
Used when carrying out a search in a database or on the internet.
Examples: Yes or No, True or False, On or off
Zubair Junjunia
51
Currency
Real numbers that are formatted in a specific way.
Usually currency is shown with a currency symbol and two decimal places.
Examples : £12.45, $5500
Data Structures
File- full set of data
Record(row)-set of data associated with a single object or person
Field(cell)-Each item of data for a record is stored in a field
Key Field/Primary Field-
o Each primary key is unique and is used to locate a record in a file
o First field of the set of data (table)
Zubair Junjunia
52
Type of Files
Sequential
Records are stored in order of the key
Easier to use and find things
Serial
In order of how they were inputted
Difficult to find record you are looking for
Index can be created to allow records to be stored randomly. Index will be in order and indicate
where the record can be found.
Enabling rapid look-ups which is called direct file access
File Maintenance
Updates
Change one or more items of data not the whole record.
E.g. Student changes form
Insertions
Inserting a new record
E.g. A new student joins the school
Deletions
Delete a whole record
E.g. Student leaves the school
Databases
A collection of information which is structured in some way to permit manipulation and searching of
data
Uses
To promote data consistency
Zubair Junjunia
53
Data duplication is reduced – only one copy of each data item needs to be kept
Relatively easy to expand
Security of data easier to monitor and maintain
Types of Databases
Flat file
Only contains a single table of data
All the data stored in this one place
Disadvantage = repeated data
Wastes space and a pain to update
Takes time to input, typing the same data over and over (and mistakes may be made)
Relational
Consists of a no. of separate tables which are related and each table contains a primary key field that
is also a field in at least one other table.
Connected by links called relationships
Foreign Key – when a key field from one table appears in a different table
Advantages:
o Faster data retrieval because of links between tables
o Easy expansion of the database
o Only need to change data in one table
Zubair Junjunia
54
Zubair Junjunia
55
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
56
Software Protection
Installed software will require a unique reference number
User will have to accept license agreement
Holograms are used to indicate software is original
Software may only run if CD-ROM or DVD-ROM is actually in the drive
Some software will only run if a memory stick is plugged in USB ports
Prevention of Viruses
Anti-virus software - Detects and then removes or isolates and use firewalls
Do not use illegal software
Only download from reputable sites
Zubair Junjunia
57
Hacking
Hackers are people who get into your computer system without having the rights
o Some prove that a system is vulnerable - maybe employed to test
o Some want to steal data
o Alter or destroy data
o For fun or a challenge
Effects on People:
People need to be retrained due to new technology
Cleaner working environment, robots complete dirty manual tasks
De-skilling of workforce
Computers can now do tasks that required high skill level
Safer working environment
Fewer manual tasks such as heavy lifting
Effect on Companies:
Can employ less people
Robots do not take holiday, get sick or need breaks
Greater consistency in products made
Zubair Junjunia
58
Advantages
No need to travel, which saves money on fuel and time spent shopping
Access to worldwide market
Disabled and elderly have access to all shops
Can be done 24/7, all day every day
Have more time to do more leisure activities
Disadvantages
Lack of socialization
Health risks - Lack of exercise, obesity
Security risks - hacking, viruses, fraud
Need specific hardware and access to internet
Not possible to see or try on goods
High street shops and banks are having to close
Effects on Companies
Companies can save cost by employing fewer staff and having less shops
Customer base can be increased
Suffer different costs
o Re-train staff
o More staff in dispatch departments
o Website costs
Could lead to drop in customer loyalty
o Lead to loss of customers
o Lack of personal service
Zubair Junjunia
59
For Policing
Prevent illegal material being posted
People can easily find info on how to become hackers or make bombs etc.
Prevent children from accessing undesirable websites
Could reduce the amount of incorrect information
Against Policing
Material already available in other sources i.e. books
Very expensive
Users would have to fund
Difficult to enforce rules
Against freedom of information
Laws already exist to deal with perpetrators
Microprocessors at home
Nowadays common household items are fitted with microprocessors
Controls many functions
Zubair Junjunia
60
Disadvantages:
o More wasteful society - devices thrown away if they fail, not economic to repair
o Leaving on standby wastes resources
Reliability of information
Undesirability of certain websites
Security issues
Other internet issues
Reliability of information
Information is more likely to be up to date than in books, since websites can be updated very quickly
Much easier to get information from websites- search engines link key words together and find info.
that matches the criteria
Vast amount of information on the internet- easier to locate than using indices in books
Information on the internet however may be incorrect, inaccurate or even biased- it does not go
through any checking process
Information overload can make it difficult for the user to find relevant info.
Security issues
Phishing
Phishing is a fraudulent operation involving the use of emails
The creator sends out a legitimate looking email hoping to gather personal and financial information
from the recipient of the email
The message appears to be from a legitimate source (e.g. a famous bank)
When the user clicks on the link they are sent to a spoof website
They will be asked for personal info e.g. credit card details, PINs
This could lead to identity theft
ISPs attempt to filter out phishing emails
Zubair Junjunia
61
Pharming
Pharming is a scam in which malicious code is installed on a computer hard disk or a server
This code can misdirect users to fraudulent websites without their knowledge
Phishing requires an email to be sent to every person who has been targeted, while pharming does
not require emails to be sent out to anyone
Pharming can target a larger group of people more easily
Spam
Spam is electronic junk mail and is a type of advertising from a company sent out to a target mailing
list
It is harmless but can clog up networks and slow them down
It is more of a nuisance than a security risk
Many ISPs are good at filtering out spam
It is often necessary to put a legitimate email address into a contact list to ensure wanted emails are
not filtered out by mistake
Spyware
Spyware is software that gathers user info. through their network connections without them being
aware that this is happening
Once spyware is installed, it monitors all key presses and transmits the info. back to the person who
sent out the spyware
This software can install other spyware software, read cookies and change the default home page or
web browser
Anti-spyware can be used to search out thus software and correct the corruption
Zubair Junjunia
62
They remember who the user is and send messages such as “Welcome Sarah” each time they log
onto the website
They recognize the user’s buying preferences e.g. if a user buys CDs, pop ups related to their buying
habits will appear on the user’s screen each time they visit the website
Without cookies, web server would have no way of knowing that the user had visited website before
Internet developments
Blogs
Personal internet journals where the writer posts their observations on a topic
No training is needed to do this
Blogs range from minor projects (e.g. people gossiping about a topic) to important subjects such as
politics or advertising products
Comments are not immune from the law
Bloggers can be prosecuted for offensive comments
Wikis
Software allowing users to easily create and edit web pages without using any web browser
A wiki will support hyperlinks and has a very simple syntax (language rules) for creating pages
Wikis are described as ‘web pages with an edit button’
Anyone can uses wikis- content should be treated with caution
Example of a wiki: Wikipedia
Zubair Junjunia
63
Folksonomies
Folksonomies are closely related to tagging and mean ‘the management of people’
Tagging is a type of social bookmarking
A user can tag any web page with words that describe its contents
In folksonomies the visual representation is a tag cloud- this is a sequence of words of different sizes
that represent popular tags by showing them in a larger font size e.g. Flickr
Safety aspects
Safety hazard Ways of eliminating or minimizing hazard
Electrocution Use a residual circuit breaker (RCB)
Check insulation on wires regularly
Do not allow drinks near computers
Check equipment regularly
Trailing wires (trip hazard) Cable ducts- make wires safe
Cover wires/tuck them away
Use wireless connections
Heavy equipment falling Strong desk/tables to support heavy hardware
Use large desks and tables so that hardware doesn’t fall off edge
Fire risk Have a CO2 fire extinguisher nearby
Don’t cover equipment vents- can cause equipment to overheat
Make sure hardware is fully maintained
Do not overload sockets with too many items
Zubair Junjunia
64
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
65
Multimedia presentations
Uses a mixture of media to present information: animations, video, sound, transitions, hyperlinks
Produced using software packages
Used with a projector so large audience can view
Advantages:
o Use of sound and animation/video effects
o Interactive/hyperlinks built into presentations
o More likely to hold audience’s attention
Disadvantages:
o Need for special equipment – expensive
o May require internet access
Paper-based presentations
It is always possible to produce presentations in hardcopy format
Advantages:
o Disabled people do not have to go to the venue to see the presentation
o It is possible to print it out in Braille for the benefit of blind people
o The recipients have a permanent copy, which they can refer to at any time they want
Disadvantages:
o The presentation needs to be distributed in some way
o There are no special effects
Sound/video/ animation
o There are printing costs
Paper/ink/etc.
Zubair Junjunia
66
Websites
Collection of webpages, text, graphics, video and sound
Hosted on a web server on the internet
Need to write code or use a web authoring application
Hyperlinks to other pages can be added
Interactive websites require programming knowledge
Can use a camera, scanner, microphone to input data
Usually hire space from web hosting company
Advantages:
o Ability to add sound/video/ animation
o Links to other websites/hyperlinks
o The use of hot spots
o Buttons to navigate/move around the website
o Hit counters to see who has visited the websites
Disadvantages:
o Can be hacked and modified or viruses introduced
o Need for a computer and internet connection
o Lack of portability compared with paper based system
o Need to maintain website once it is set up
Zubair Junjunia
67
Music production
Music samplers and mixers allow original tracks that were recorded in a studio to be modified
Electronic instruments can play back through electronic effects machines
Synthesisers combine simple wave forms to produce complex music creations
Electronic organs can mimic any other instrument
Music scores can be generated from music itself using software
Software can automatically correct music notes in a score
There is no need to understand music notation to write a music score
Music notes are automatically printed out in the correct format
Cartoon animations
Animations can be produced using computer hardware and software
With 3D animations objects are designed on a computer and a 3D skeleton is produced
Parts of the skeleton are moved by the animator using key frames
The difference in appearance of the skeleton in these key frames is automatically calculated by the
software and is known as tweening or morphing
The final stage is to make a realistic image by a technique known as rendering
Zubair Junjunia
68
Zubair Junjunia
69
School Reports
Database applications such as SIMS store large amounts of data which can be used to create annual
and termly school reports
Things able to be gathered from here are:
o Data individual to student – tests/exam results
o Student progress – target grades being met or not
o Number of absences – create a percentage of amount of days attended school
o Teacher comments – adds comments on to report
Zubair Junjunia
70
Rules
Data must be fairly and lawfully processed
Data can only be processed for the stated purpose Data must be adequate, relevant and not
excessive
Data must be accurate
Data must not be kept longer than necessary
Data must be kept secure
Data must not be transferred to another country unless they have adequate protection
Guidelines
Don’t leave personal information lying around
Lock all filing cabinets when leaving an office
Do not leave computer without locking or logging off
Protect passwords
Change passwords regularly
Do not fax or email anything of sensitive nature.
Record keeping
Record keeping is keeping files and information in a simple database and stored in electronic format
It is used to make it easy to contact the customers and make it far more easy to search
Advantages:
o Less room would be used up in the shop since no paper records
o Quicker and easier to find details
o Less expensive. Not necessary to employ somebody to file and search
o Fewer errors due to no manual checking of paper files
Disadvantages:
o Buy a computer and software
o Would take time to transfer paper files to database.
Zubair Junjunia
71
Modelling applications
A simulation is the creation of a model of a real system on order to study the behavior of the system
The model is computer generated and is based on mathematical representations
The idea is to try and find out what mechanisms control how a system behaves and consequently
predict the behavior of the system in the future and also see if it is possible to influence the future
behavior
Computer models have the advantage that they save money, can help find a solution more quickly,
and can be considerably safer
Examples of a modelling application are:
o Tuck shop model
o Traffic light simulation
Types of Processing
Batch Processing
Number of tasks are collected together over a set period of time
Job then loaded into a computer system and processed all at once
Once the batch processing starts, no user interaction is needed
This type of processing can be done where there are no time constraints
A big advantage of batch processing is that job can be processed when the computer system is less
busy (e.g. at night) so use of resources is optimized
Used in billing systems, payroll systems and processing of bank checks
Zubair Junjunia
72
Control Applications
Turtle Graphics
Based on computer language called LOGO and is now usually known as turtle graphics
It is the control of the movement of a ‘turtle’ on a computer screen by a number of key instructions
which can be typed in
The use of ‘repeat’ instructions makes a piece of code more efficient
Command Meaning
FORWARD 𝑥 Move 𝑥 cm forward
BACKWARD 𝑥 Move 𝑥 cm backward
LEFT 𝑑 Turn left through 𝑑 degrees
RIGHT 𝑑 Turn right through 𝑑 degrees
REPEAT 𝑛 Repeat next set of instructions 𝑛 times
ENDREPEAT Finish the repeat loop
PENUP Lift the pen up
PENDOWN Lower the pen
Zubair Junjunia
73
Monitoring Examples
Monitoring a patient’s vital signs in a hospital
Sensors read key vital signs (such as pulse/heart rate, temperature, blood pressure, respiration, etc.)
The data from the sensors is converted into digital using an ADC
The data is stored in the computer memory
The computer compares the data from the sensor with the values stored in its memory
The results are output on a screen in the form of graphs and/or digital read-outs
An alarm is activated if any of the data is outside acceptable parameters
The system continues to monitor the patient until the computer is turned off
Zubair Junjunia
74
Electronic timing
Manual timings using stop watches are useful at sports days as minimal error is made and accepted
At athletics meets more accuracy is needed so a computer is used
o Computerized start/timer/stop all used
o Start and stop actions are supplied by sensors
o Cable from the gun at the start line
o Light sensors at the finish line
GPS – Global Positioning System
o Relies on time taken for signal to get to GPS from satellites - must be accurate
Controlling Examples
A greenhouse environment
Temperature controlled the same as central heating system
Humidity must also be controlled
o Humidity sensor tells computer how humid it is
o Computer then makes a decision to turn the water supply to sprayers
Zubair Junjunia
75
Chemical process
A certain chemical process only works if the temperature is above 70°C and the pH (acidity) level is less
than 3.5. Sensors are used as part of the control system. A heater is used to warm the reactor and valves
are used to add acid when necessary to maintain the acidity. The following description shows how the
sensors and computer are used to control this process
Washing Machines
Have a microprocessor in them which contains the software which controls the washing machine
Appling the factors
o Inputs
Pressure sensor on the door to detect if open or closed
Sensor to detect if the required level of water is in
Temperature sensor to check temperature
o Outcome
Clothes have been washed
Zubair Junjunia
76
o Outputs
Heater
Motor to spin drum
Lights on machine to show user stage the cycle is at
Actuators to turn the inlet valves on to allow hot and cold water into the machine
Actuator to turn the outlet valve on to let the water out of the machine when the
wash is complete
An actuator to control the pump
o Processing
Software to make decisions which will allow the clothes to be washed
o Time taken before next inputs
Timer as part of the software
Time different cycles (when to add soap/conditioner/etc.)
Time delay in measuring temperature. Needs to be time for changes to
have effect.
o Unmanageable situations
Door may not be shut. Needs to draw users attention, usually a buzzer and light
Zubair Junjunia
77
Robotics
Robots are used in many areas of manufacturing, from heavy work right through to delicate
operations e.g. car bodies, welding bodywork, manufacturing of microchips etc.
Control of robots is either through embedded microprocessors or linked to a computer system
Programming of the robot to do a task is generally done in two ways:
o The robot is programmed with a sequence of instructions which allow it to carry out a series
of tasks
o Alternatively, a human operator manually carries out a series of tasks and how each task is
done is relayed back to the robot (embedded processor) or controlling computer. The
sequence of instructions is remembered so that the robot can automatically carry out each
task identically each time (e.g. assembling parts in a television)
Robots are often equipped with sensors so they can gather important information about their
surroundings
Sensors also prevent them from doing ‘stupid things’, such as stopping a robot spraying a car if no
car is present, or stopping the spraying operation if the supply of paint has run out etc.
Robots are very good at repetitive tasks
However, if there are many different tasks (e.g. making specialist glassware for some scientific work)
then it is often better to still use human operators
Advantages
Robots can work in environments harmful to human operators
The can work non-stop (24/7)
They are less expensive in the long term (they don’t need wages) however they are expensive to buy
initially
Productivity is higher, since they do not need holidays, are not ill etc.
There is greater consistency – every car coming off a production line is identical
They can do boring, repetitive tasks, leaving humans free to do more skilled work
Zubair Junjunia
78
Disadvantages
Robots find it difficult to do ‘unusual’ tasks (e.g. one-off glassware for a chemical company)
They replace skilled labor, leading to unemployment
Since robots do many of the tasks once done by humans, there is a risk of de-skilling
Because robots are independent of the skills base, factories can be moved anywhere in the world,
again causing unemployment
Billing systems
Because companies send out their bill/invoices on a pre-determined date, all the information is
gathered together and then processed in one go (batch).
Consider an electricity billing system:
The inputs are: customer details (address), charge per KW (unit) of power, previous readings, new
readings taken from the electricity meter, bank account details (if using direct debit), etc.
The processing done is calculation of: number of units of electricity used (i.e. new reading minus old
reading), customer’s cost (i.e. units used times charge per unit), monthly payments made (if using
direct debit), outstanding amount owed or carried over to next bill, etc.
The outputs are: bill showing all the details, updating of customer file, production of request for
payment if not done through direct debit, etc.
Zubair Junjunia
79
Zubair Junjunia
80
Banking applications
The use of computer technology has revolutionized how we do our banking transactions, for
example:
o Internet banking
o The use of automated teller machines (ATMs)
o Chip and PIN technology
Zubair Junjunia
81
Library systems
Many library systems are computer controlled
They usually involve the use of barcodes on the books being borrowed and on the borrower’s library
card
The following describes a computerized library system based on barcodes
There are two files:
o Book file, containing fields for example: barcode, book title, name of author etc.
o Borrower’s file, containing fields for example: borrower’s number, borrower’s name etc.
When a borrower takes out a book, the book’s code is scanned. The book details are then found on
the book file
The borrower’s library card barcode is then scanned for the borrower’s unique number. The book file
is linked to the borrower’s file and both files are updated to indicate which book has been borrowed
and when it is due back
Zubair Junjunia
82
On a daily basis, the borrower’s file is interrogated by the computer to see which books are overdue
for return:
o The computer reads a record from the book file
o It compares the date due back with the current date
o If the date due back is less than (or equal to) the current date (i.e. earlier date)…
o …using the barcode number of the book…
o …the book file is linked to the borrower’s file…
o …and the corresponding record is read from the borrower’s file
o The customer details are then found and a letter or email is automatically sent out
o The next record in the book file is then read…
o …until the whole file has been checked
Expert systems
These systems have been developed to mimic the expertise and knowledge of an expert in a
particular field
Examples include:
o Diagnosing a person’s illness
o Diagnostics (finding faults in a car engine, finding faults on a circuit board, etc.)
o Prospecting for oil and minerals
o Tax and financial calculations
o Chess games
o Identification of plants, animals and chemical compounds
o Road scheduling for delivery vehicles
Zubair Junjunia
83
Advantages
Expert systems provide consistent answers
They never ‘forget’ to answer a question when determining the logic
Using expert systems reduces the time taken to solve a problem
A less skilled worker force is needed, which gives the potential of saving money, but also allows areas
of the world access to expertise which they could not normally afford
Disadvantages
They tend to lack common sense in some of the decision-making processes
Errors in the knowledge base can lead to incorrect decisions being made
It can be expensive to set up in the first place
Considerable training is necessary to ensure the system is sued correctly by the operators
Zubair Junjunia
84
Definitions
Knowledge base
This is a database designed to allow the complex storage and retrieval requirements of a
computerized knowledge-based management system (in support of an expert system)
Inference engine
This is software that attempts to derive answers from the knowledge base using a form of reasoning
It is how expert systems appear to use human-like reasoning when accessing information from the
knowledge base in an effort to find a conclusion to a given problem
The inference engine is a type of reasoning engine
Rules base
This is made up of a series of ‘inference rules’ (e.g. IF the country is in South America AND the
language used is Portuguese THEN the country must be Brazil)
These inference rules are used by the inference engine to draw conclusions
They closely follow human-like reasoning
Zubair Junjunia
85
INFORMATION AND
COMMUNICATION
TECHNOLOGY
Zubair Junjunia
86
Zubair Junjunia
87
Analysis Stage
The basic steps in the analysis stage can be summarized as follows:
1. Fact finding/collecting data from the current system
2. Description of the current system – establishing the inputs, outputs and processing being done
3. Identification of the problems with the current system
4. Agreeing the objectives with the customer
5. Identifying and agreeing the customer’s requirements
6. Interpreting the customer’s requirements
7. Producing a cost-benefit analysis
8. Producing a data flow diagram
Zubair Junjunia
88
Zubair Junjunia
89
Design stage
Once the analysis has taken place and the systems analyst has some idea of the scale of the problem
and what needs to be done, the next stage is to design the key parts of the recommended system
A list of tasks is summarized here
o Designing data capture forms/input forms
o Designing screen layouts
o Designing output forms and reports
o Producing systems flowcharts and/or pseudo code
o Selecting and designing validation rules that need to be used
o Selecting the most appropriate data verification methods
o Designing and agreeing the file structures and tables
o Selecting and designing the hardware requirements
o Selecting and designing the software requirements
o Producing algorithms or program flowcharts
o Designing a testing strategy/plan
Verification
A way of preventing errors when data is copied from one medium to another
Two common ways verification checks are carried out:
o Double entry: in this method, data is entered twice, using two different people. The
computer compares the two entries, either after data entry or during the data entry process,
and identifies any differences
o Visual check: this is the checking for errors by comparing entered data on the screen with
the data in the original document (not the same as proof reading)
Validation
Process where data is checked to see if it satisfies certain criteria when input into a computer, for
example to see if the data falls within accepted boundaries
Zubair Junjunia
90
Limit Check Similar to range check except that Input data must be > 10
only one of the limits (boundaries) is
checked
Presence Check Checks if data is actually present and In an electronic form, a person’s
has not been missed out telephone number may be a required field
and if no data is present this should give
rise to an error message
Consistency Checks if fields correspond (tie up) If ‘Mr’ has been typed into a field called
Check with each other title then the gender field must contain
either ‘M’ or ‘Male
Check Digit Look at an extra digit which is Check digits can identify three types of
calculated from the digits of a error:
number and then put on the end of If two digits have been inverted
the number during input
An incorrect digit entered twice
A digit missed out altogether
Development stages
If the system contains files (e.g. a database) then the file structure needs to be finalized at this stage
(e.g. what type of data is being stored in each field, length of each field, which field will be the key
field, how the data files will be linked, etc.)
Once the file structure has been determined, it is then created and fully tested to make sure it is
robust when the system actually goes live
Since it is important that the correct data is stored in files, there are certain techniques that need to
be adopted to make sure the data populating the file/s and database/s is at least of the right type
and that it conforms to certain rules
Validation routines and verification methods are used to ensure this happens
Again, routines have to be fully tested to ensure they trap unwanted data but also to make sure any
data transferred from a paper-based system to an electronic system has been done accurately
Any system being developed will have some form of user interface.
The types of hardware were chosen in the design stage.
How these are used to interface with the final system now needs to be identified, for example how
the screens will be used to collect the data and the way the output will be presented.
If specialist hardware is needed (e.g. for people with disabilities), then it will be necessary to finalize
how these devices are used with the system when it is implemented.
This will be followed by thorough testing to ensure the user screens are user friendly and that the
correct output is associated with the inputs to the system.
Zubair Junjunia
91
Testing strategies
Testing of each module needs to be done to ensure each one functions correctly on its own.
Once the development of each module is completed, the whole system needs to be tested (i.e. all
modules functioning together).
Even though each individual module may work satisfactorily, when they are all put together there
may be data clashes, incompatibility and memory issues, etc.
All of this may lead to a need to improve the input and output methods, file and database structures,
validation and verification methods, etc.
Then the system will need to be fully tested again.
It is a very time-consuming process but the system has to be as perfect as possible before it goes live.
Testing will use many different types of data, which will fall into one of three categories: normal,
extreme or abnormal.
Let us suppose one of the fields in a database is the date and this must be in the form dd/mm/yyyy,
where each element of the date must be numeric:
o Normal: this is data which is acceptable/valid and has an expected (known) outcome, e.g.
the month can be any whole number in the range 1 to 12.
o Extreme: this is data at the limits of acceptability/validity, e.g. the month can be either of
the two end values i.e. 1 or 12.
o Abnormal: this is data outside the limits of acceptability/validity and should be rejected or
cause an error message. For example, all the following values are not allowed as inputs for
the month:
Negative numbers (e.g. -1,-15)
Any value greater than 12 (e.g. 32, 45)
Letters or other non-numeric data (e.g. July)
Non-integer values (e.g. 3.5, 10.75)
Zubair Junjunia
92
Implementation
Once the system is fully tested, the next stage is to fully implement it.
We will now consider changeover to the new system in more depth.
There are four common methods used for changing over from the old system to the new system.
Each one has advantages and disadvantages which need to be weighed up before the most
appropriate method is chosen for a particular application.
Zubair Junjunia
93
Zubair Junjunia
94
Documentation
Once the new system is fully developed, a considerable amount of documentation needs to be
produced
a) For the end user
b) For people who may need to modify or develop the system further at some later stage
There is some overlap between the two types of documentation, but the basic requirements are
shown below.
User documentation
User documentation is designed to help users to learn how to use the software or system.
This can consist of any of the following:
o the purpose of the system/program/software package
o how to log in/log out
o how to load/run the software
o how to save files
o how to do a search
o how to sort data
o how to do printouts
o how to add, delete or amend records
o screen layouts (input)
o print layouts (output)
o hardware requirements
o software requirements
o sample runs (with test data and results)
o error handling/meaning of errors
o troubleshooting guide/help lines/FAQs
o tutorials
95
Technical documentation
Technical documentation is designed to help programmers and analysts who need to make
improvements to the system or repair/maintain the system.
This can consist of any of the following:
o purpose of the system/program/software
o program listing/coding
o programming language used
o flowchart/algorithm
o input formats
o hardware requirements
o software requirements
o minimum memory requirements
o known bugs in the system
o list of variables used (and their meaning/description)
o file structures
o sample runs (with test data and results)
o output formats
o validation rules
o meaning of error messages
Zubair Junjunia
96
Evaluation
Once a system is up and running it is necessary to do some evaluation and carry out any
maintenance, if necessary.
The following is a list of some of the things considered when evaluating how well the new system has
worked. This can ultimately lead back to a re-design of part of the system if there is strong evidence
to suggest that changes need be made.
To evaluate the system, the analyst will:
o compare the final solution with the original requirement
o identify any limitations in the system
o identify any necessary improvements that need to be made
o evaluate the user’s responses to using the new system
o compare test results from the new system with results from the old system
o compare the performance of the new system with the performance of the old system
o observe users performing set tasks, comparing old with new
o measure the time taken to complete tasks, comparing old with new
o interview users to gather responses about how well the new system works
o give out questionnaires to gather responses about the ease of use of the new system
Some results from the evaluation may require changes to either hardware or software. Hardware
may need to be updated because:
o of feedback from end users
o new hardware comes on the market, making change necessary
o there are changes within the company which require new devices to be added or updated
Software may need to be updated because:
o of feedback from end users
o changes to the company structure or how the company works may need modifications to
the software
o changes in legislation may need modifications to the software
Zubair Junjunia