Ict Notes q1
Ict Notes q1
Ict Notes q1
ICT Year 9
M r s . M a r w a E l h o u r y
E d i t e d f o r Y e a r 9 b y : M s . N o u r h a n A b d u l l a h
Information Communication Technology Year 9
Chapter 1
Types and components of a computer system
Hardware:
Hardware: All the physical parts that make up the computer system.
Hardware can be either external or internal.
Examples of External Hardware / peripherals
Keyboard, Mouse, Monitor, Webcam, Microphone, Printer, Digital Camera
and Scanner
Examples of Internal Hardware
Motherboard.
Random access memory (RAM).
Read-only memory (ROM).
Video cards.
Sound cards.
Internal storage devices: hard disk drive (HDD) and solid state drive (SSD).
Other Examples of Internal Computer Hardware
Random access memory (RAM)
Read-only memory (ROM)
Internal hard disk drive/solid state drive (HDD/SSD)
Network interface card (NIC)
Software
Definition:
Programs for controlling the operation of a computer or processing of electronic
data.
Types of Software:
1- Application Software:
- Programs that allow the user to do specific tasks.
1
Information Communication Technology Year 9
2- System Software:
Programs that allow the hardware to run properly and allow user to
communicate with the computer.
Software running in the background of a computer system.
Without the OS, most computers would be very user-unfriendly and the
majority of users would find it almost impossible to work with computers on
a day-to-day basis.
Examples of System Software:
Operating Systems
Compilers/Interpreter
Linkers
Device drivers
Utilities
- Software that has been designed to carry out specific tasks on a computer.
- Essentially, they are programs that help to manage, maintain and control
computer resources.
2
Information Communication Technology Year 9
3
Information Communication Technology Year 9
RAM
Random Access Memory
Data is temporarily stored when running applications.
This memory can be written to and read from.
Contents are lost when power to the computer is turned off.
4
Information Communication Technology Year 9
ROM
Read Only Memory.
Holds instructions that need to be permanent such as BIOS.
Data cannot be altered and can only be read from.
Contents are not lost when the computer is turned off.
-
Smaller than RAM.
ROM is needed on boot up.
Operating Systems
Types of interfaces:
1. Command Line Interface (CLI)
2. Graphical user interface (GUI)
5
Information Communication Technology Year 9
6
Information Communication Technology Year 9
Rotating where you use two fingers one finger moves up and the other
finger moves down to rotate the object such as an image.
Swiping where you swipe your finger over the touch screen to turn over a
page of a document.
7
Information Communication Technology Year 9
GUI
The end-
how the computer works.
A person who uses the computer to run software or play games or
store/manipulate, photographs, for example.
Compare and contrast CLI and GUI
Post GUI allows the use of pinching, scrolling, and expanding.
Post GUI allows the use of touch screen but a CLI does not allow for this.
Icons speed up finding instructions, CLI you have to type out the commands
in full.
No editing in CLI.
If a mistake is made in CLI it could have major consequences whereas GUI
has less impact.
Due to graphics GUI uses a lot of memory, CLI is a lot smaller program.
Loss of memory slows down the operations of the computer.
GUI cannot operate properly if memory is low.
8
Information Communication Technology Year 9
Types of Computers
Personal Computers (PCs) or Desktop Computers
General purpose computer.
Laptop Computers
Monitor, keyboard, pointing device and processor are all together in one
single unit.
Laptops use rechargeable batteries when used away from a power supply.
9
Information Communication Technology Year 9
Tablets
Internet-enabled portable computer.
Internet access is usually through Wi-Fi or 3G/4G/5G (mobile phone)
connectivity.
Are equipped with a series of sensors including cameras, microphones,
accelerometers and touch screens.
10
Information Communication Technology Year 9
Phablet
Designed as a hybrid between tablet and
smartphone.
Have slightly smaller screens than tablets.
Smartphones
Allow normal phone calls to be made but also have an operating system.
Use a camera feature (to take photos or videos), MP3/4 players.
Communicate with the internet either by using Wi-Fi hot spots or by using
3G/4G/5G mobile phone networks.
11
Information Communication Technology Year 9
Chapter 2
Input and Output Devices
Input Devices
Definition:
Hardware devices that allow data to be input
into a computer.
Types of Input Devices:
Manual Input Devices - data entered by hand
Direct Data Input Devices - data entered by a
machine/computer
Sensors - collect data automatically
12
Information Communication Technology Year 9
Keyboards
The most common type of input device.
Keyboards are used to enter text into word-processed documents, numbers
into spreadsheet.
Typing in commands to the computer (eg. Ctrl-P to print out)
Ergonomic keyboards are designed to reduce health problems linked with
typing. (RSI).
13
Information Communication Technology Year 9
Numeric Keypad
Used where only numeric data is to be entered (although some have a
function key to allow input of alphabetic characters)
Examples: ATM, Telephones, and Chip and PIN devices to enter PIN and
the amount of money.
Pointing Devices
1- Mouse
The left mouse button is used to make selections.
The right mouse button is used to display a dropdown menu.
A scroll button/wheel is used to help move quickly through long documents.
Optical mouse - movement is detected by reflected light rather than the
position of a moving ball
Cordless or wireless mouse (which transmits signals to a USB wireless
receiver plugged into the computer.
14
Information Communication Technology Year 9
performance.
2- Touchpad
Used on laptop computers.
15
Information Communication Technology Year 9
3- Trackerball
The pointer is moved on the screen by rolling your hand over the ball.
Used by people with poor motor skills such as the very young or people with
disabilities.
Used in some luxury cars to select functions such as radio, telephone, music,
satnav and so on.
Remote Control
Use infrared signals.
Used in TVs, video players/recorders, DVD players/recorders, satellite
receivers, Hi-Fi music systems and multimedia projectors.
Used in industrial applications to remotely control processes, stop and start
machinery, etc
16
Information Communication Technology Year 9
Joystick
The stick moves on-screen in the same way as a mouse, and buttons are used
to select items.
Used for playing computer games.
Used in simulators (e.g. flight simulators) to mimic actual controls.
Used in car driving simulators
Driving Wheel
Connects to a computer (or games machine), usually through a USB port.
Allows you to simulate the turning of a steering wheel, and there are
associated devices (such as buttons or pedals) which allow you to accelerate
and brake
Sensors are used to pick up left/right movement
Used in video/computer games (for example, car-racing games).
Used in simulators (for example, car-driving simulators) to mimic actual
vehicle controls.
17
Information Communication Technology Year 9
Touch Screens
Can detect the presence and location of a touch to the screen.
Touch screens can be found in information kiosks, all-in-one computers,
tablet computers, PDAs, ATMs, Point of Sale Terminals, satellite navigation
systems, Interactive white boards, petrol stations, Computer-based training
(CBT) and smartphones.
Scanners
Used to scan in hard copy documents to convert them into a digital format.
Used to scan non-digital photographs to be stored on computer. Scan in
barcodes at POS terminals.
Graphics Tablet
Used to draw or write on using a pen-like device called a stylus.
Used for inputting freehand drawings.
Used for retouching digital photographs.
They are used in computer aided design (CAD) work.
18
Information Communication Technology Year 9
Note:
The computer-aided design (CAD) is used in the design and development of new
products in a variety of applications both at home and on a commercial/industrial
basis, e.g architecture, car/vehicle design, construction and digital circuits.
Microphones
Input sound is analogue signal and then converted into a digital signal.
Used to input sounds/speech into the computer to be used in different ways
(Presentations, Voice Recording, Special Effects in Movies etc).
Used in video conferencing or Voice over Internet Protocol (VoIP).
Digital Camera
Produce photos that can be transferred to a computer or to print out directly.
Most digital cameras also allow you to capture short video clips.
Connected to the computer using USB port or wireless data transfer (Wi-Fi
or Bluetooth).
19
Information Communication Technology Year 9
Web Cam
Can take both still and video images.
Used to conduct simple videoconferencing.
Used to allow people to view the traffic in local road systems.
Used for chatting online.
Video Camera
Many digital cameras are capable of taking moving images.
These cameras are often referred to as DV (digital video) cameras.
They store compressed photo frames at a speed of 25 MB per second this
is known as Motion jpeg.
Light Pen
Used as an alternative input device to a mouse or graphics tablet.
Used for producing freehand drawings directly on a screen or editing
existing drawings.
Selecting objects on CRT screens.
Drawing on screen (e.g, with CAD packages).
20
Information Communication Technology Year 9
21
Information Communication Technology Year 9
22
Information Communication Technology Year 9
Output Devices
Definition:
Hardware devices that allow information to be output from a computer.
Types of Output Devices:
Monitors (screens).
Printers.
Control Devices.
Audio Devices.
CRT Monitors
CRT stands for Cathode Ray Tube.
Used with light pens.
TFT Monitors
TFT stands for Thin Film Transistor.
The screen is made up of thousands of tiny pixels.
Each pixel has three transistors red, green and blue.
Used in laptop computers.
23
Information Communication Technology Year 9
Multimedia Projectors
Used for training presentations.
Teaching, advertising presentations, etc.
They can also be used to provide a larger picture from televisions and
video/DVD players.
24
Information Communication Technology Year 9
Laser Printers
They use a Buffer Memory which stores the information for the whole
document before the pages can be printed out.
Used for networks, which require rapid, high quality and high volume
printing.
Used where low noise is required.
Uses toner to transfer the print image to plain paper.
Inkjet Printers
25
Information Communication Technology Year 9
Plotters Printers
Ideal for printing designs, plans, and maps.
Ideal forprinting out designs that have been produced using CAD software.
Ideal for printing out large printouts, for example on A0-sized paper.
3D Printers
Used in COMPUTER-AIDED DESIGN (CAD) applications
The solid object is built up layer by layer using materials such as powdered
resin, powdered metal, paper or ceramic powder.
26
Information Communication Technology Year 9
Chapter 3
Backing up of data
What is backing up of Data?
Backing up refers to the copying of files and data to a different medium
(disk, tape, flash drive, cloud storage) in case of a problem with the main
storage device.
Why back up data?
Data could be lost due to failure of the original storage device.
Hackers could be responsible for the corruption or even loss of data.
Backups are also made in case the files need to be used elsewhere.
Data could be accidentally amended or overwritten on original medium.
Data could be maliciously deleted from original medium.
Why backups do not necessarily protect against viruses?
The virus could attach itself to the files which could mean that the backups
were also affected.
Secondary storage media
Most computers have backing storage as well as main/internal memory
(RAM/ROM).
Why backing storage is needed.
If computer is switched off, work in RAM is lost but backing storage stores
data for future use
More likely that data is accidentally deleted in RAM
Operating system may be so large that it is physically impossible for ROM
to store it.
27
Information Communication Technology Year 9
They can be attached to and used Their use with lots of different
by any computer that has a USB computers can mean there is a
(Universal Serial Bus) port. danger of viruses being
The data access time and data transferred.
transfer rate is very fast. It can be easily damaged.
Holds large amount of data They are more expensive than
compared to CD/DVD. other forms of removable media,
such as CDs or DVDs
28
Information Communication Technology Year 9
Magnetic Tapes
Very thin strip of plastic that has been coated in a magnetic layer.
Data is read from the tape using serial access.
This type of storage is useless in a real-time or online applications due to the
very slow data access speeds.
29
Information Communication Technology Year 9
CD ROM (Compact Disk Read Only Memory) & DVD ROM (digital versatile
disk read only memory)
Optical disks are read-only memory (ROM).
They cannot be written over.
Can only be read.
Uses:
CD-ROMs are used to store: music files, software, computer games
DVD-ROMs have much larger storage
Advantages of CD ROM/DVD ROM Disadvantages of CD ROM/DVD
ROM
Once written, the data cannot be Data transfer rate and access rate
erased and this makes it useful are lower than for a hard disk.
for the distribution of software. The media can be unreadable if
Cheaper to buy than hard disk scratched.
drives.
30
Information Communication Technology Year 9
Uses
Used to transfer data from one computer to another.
Used for home recordings of music (CD-Rs) and films (DVD-Rs).
Used in applications where it is necessary to prevent the deletion or over-
writing of important data).
31
Information Communication Technology Year 9
Blu-ray
Blue laser, rather than a red laser, is used to carry out read and write
operations
Blu-ray can store up to five times more data than a normal DVD
32
Information Communication Technology Year 9
Uses
33
Information Communication Technology Year 9
Uses
Transporting files between computers.
Used as a backup store.
Used as a security device to prevent software piracy (known as a dongle).
34
Information Communication Technology Year 9
Chapter 4
Networks and the Effects of using them
What is a network?
A network is two or more computers that are linked together so that they are
able to share resources. (eg. Printer, scanner, data, software and internet
connection)
Network Devices
Hubs
Hardware devices.
Can have a number of devices/computers connected to them
Used to connect together a number of devices to form a LAN
Switches
Hardware devices.
Can have a number of devices/computers connected to them.
Work in a more efficient way compared to hubs.
Can direct data to specific computers or devices.
Each device or computer on a network has a media access control (MAC)
address.
A more secure way of distributing data compared
to hubs.
35
Information Communication Technology Year 9
Bridges
Connect one LAN to another LAN that uses the same protocol (
communication rules)
Directs data packets to specific networks
Usually has only two ports
Routers
Connect the LAN to the internet /WAN
Allow private networks to be connected together
Every computer on the same network has the same part of an internet
protocol (IP) address.
36
Information Communication Technology Year 9
Other Hardware
Many computer systems use Wi-Fi, network cables are still used because:
Faster data transfer rates than wireless.
Can be more secure than wireless networks
Types of Cables:
Copper Cables
Fibre Optics Cables
Advantages of fibre optics compared to copper cables:
Offers higher data transfer rates
Better security
37
Information Communication Technology Year 9
Bluetooth
Bluetooth sends and receives radio.
Devices using Bluetooth automatically detect and connect to each other, but
they do not interfere with other devices because each communicating pair
uses a different channel.
Wi-Fi
Wi-Fi sends and receives radio waves in several different frequency bands.
Like Bluetooth, each band is also further split into channels.
Wi-Fi is best suited to operating full-scale networks because:
o it offers much faster data transfer rates
o better range and better security than Bluetooth
A Wi-Fi enabled device (such as a computer or smartphone) can access for
example, the internet wirelessly at any access point (A
100 meters away.
The advantages and disadvantages of using Bluetooth or WiFi
Bluetooth is more useful when transferring data between two devices
whereas WiFi is more suited to full scale networks
Bluetooth does not buffer
Cost of Bluetooth is cheaper than WiFi
The devices connected via Bluetooth should be near to each other whereas
WiFi has a larger range
WiFi has better security than Bluetooth
Bluetooth has a shorter password
Bluetooth devices are battery operated which needs to be replaced or
recharged but WiFi do not necessarily use batteries.
38
Information Communication Technology Year 9
Network types
Local Area Network (LAN).
2. Wireless Local Area Network (WLAN).
3. Wide Area Network (WAN).
39
Information Communication Technology Year 9
40
Information Communication Technology Year 9
41
Information Communication Technology Year 9
42
Information Communication Technology Year 9
Chapter 5
Systems Life Cycle
The systems life cycle is a series of stages that are worked through during the
development of a new IT system or the improvement of an existing one.
Stages of Systems Analysis and Design:
1- Analysis
43
Information Communication Technology Year 9
44
Information Communication Technology Year 9
Interviews
Involves a one-to-one question-and-answer session between the analyst and
the employee/customer.
Advantages Disadvantages
Questionnaires
Involves sending out questionnaires to the work force and/or to customers to
find out their views of the existing system and find out how some of the key
tasks are carried out.
Advantages Disadvantages
The questions can be answered fairly The number of returned questionnaires
quickly can be low; not always a popular
It is a relatively inexpensive method method
(only need to produce questionnaires) Users tend to exaggerate their
Individuals can remain anonymous if responses as they are anonymous
they want (therefore give more Because anonymous, the interviewees
truthful answers) may not take it seriously
45
Information Communication Technology Year 9
Design Stage
A list of design tasks:
Designing data capture forms (these are forms used for the input of data).
Designing screen layouts (these are part of the user interface).
Designing output forms and reports.
Producing systems
Validation
Validation is a process where data is checked to see if it satisfies certain criteria
when input into a computer.
Verification
Verification means to check that the data on the original source document is
identical to the data that you have entered into the system or object
document.
There are two ways that verification checks are carried out:
Double data entry
Data is typed in twice by one typist or data is typed in by two operators and
computer compares versions.
46
Information Communication Technology Year 9
Visual check
This is the checking for errors by comparing entered data on the screen with
the data in the original document.
Verification is needed for the following reasons
Data may be entered/copied inaccurately
Check needs to be carried out to ensure accurate data entry
Development Stage
Stages of Development are:
Creating a file structure to store data and testing it
Create validation rules to make sure the data entered is sensible, and testing
them
Create a user-interface to allow data to be entered into the system, and
testing it.
Create output forma and testing them
47
Information Communication Technology Year 9
Testing Stage
Test designs cover how a system is to be tested and how we can ensure the
following aspects can be achieved.
The purpose of test data is to make sure that:
Inputs to the system are valid
Outputs from the system are accurate
Outputs are presented clearly
Implementation Stage
Implementation means that old system is replaced by the new system.
Documentation
Two types of documentation
User documentation
Technical Documentation
Purpose of User documentation
Designed to help the user understand how the new system works
Designed to help the user to learn how to use the new system
Technical documentation may be too complex for the user to understand
Designed to help the user deal with problems
Evaluation
To evaluate the system, the analyst will:
Compare the final solution with the original requirement
Identify any limitations in the system
Identify any necessary improvements that need to be made
48
Information Communication Technology Year 9
49
Information Communication Technology Year 9
Chapter 6
Safety and Security
Physical safety
Safety issues
Physical safety is concerned with the dangers that could lead to serious
injuries or even loss of life.
There are a number of safety issues that can arise from using ICT devices.
Usually caused by accidents.
Some of these safety issues include:
o Electrocution
o Tripping over wires and cables
o Fires
o Heavy equipment falling injuring users
Electrocution
Causes
Spilling liquids/drinks on electric equipment
Exposed wires/damaged insulation
Unsafe electrical equipment
Prevention
Do not allow drinks to be taken into the computer room
Check all wires on a regular basis and renew wires if there is any sign of
damaged insulation
Ensure all equipment is checked by a qualified electrician on a regular basis
50
Information Communication Technology Year 9
Fire hazard
Causes
Overloaded wall sockets (several items plugged into one wall socket)
Overheating of computer equipment (due to poor heat dissipation)
Exposed wires causing a short circuit
Prevention
Increase the number of wall sockets and do not use too many extension
blocks
Do not cover the cooling vents on computer equipment
Clean out dust accumulation in computers to prevent overheating
Make sure all equipment is fully tested on a regular basis
Tripping hazard
Causes
Trailing wires on the floor
Damaged carpets and other flooring
Prevention
Use cable ducts to make the wires safe
Cover exposed wires and hide wires under desks
Personal injur
Causes
Heavy equipment unstable or falling from desks
Desks collapsing under weight/desks not designed to take the weight
Prevention
Use desks strong enough to take the weight of the computer equipment
Use large desks and tables so that hardware is not too close to the edge
where it could fall off
51
Information Communication Technology Year 9
Data protection
Main principles of data protection acts
Data must be fairly and lawfully processed.
Data can only be processed for the stated purpose.
Data must be accurate.
Data must not be kept longer than necessary.
Data must be kept secure.
There are general guidelines about how to stop data being obtained unlawfully:
Do not leave personal information lying around on a desk when not attended
Lock filing cabinets at the end of the day or when the room is unoccupied
Use passwords and user IDs, which should be kept secure; passwords should
be difficult to guess/break and should be changed frequently (see earlier
notes on passwords)
Personal Data
Refers to any data concerning a living person who can be identified either
from the data itself or from the data in conjunction with other information
Examples of personal data include:
name
address or email address (such as [email protected])
an ID card number/passport number
an IP address
date of birth
banking details
Photographs of the individual (for example, in full school uniform).
52
Information Communication Technology Year 9
E-Safety
What is E-Safety?
Refers to the benefits, risks and responsibilities when using ICT.
It is often defined to be the safe and responsible use of technology
However, e-safety is as much about user behaviour as it is about electronic
security. In particular:
when using the internet
sending and receiving emails
taking part in social media
online gaming.
Using the internet
The following is a list of the precautions that can be taken to minimize the
potential danger when using the internet:
When using the internet make sure that the websites being used can be
trusted.
Only purchase items from websites that offer secure, encrypted connections.
When using search engines, always make sure the device settings are set to
53
Information Communication Technology Year 9
Online gaming
Online gaming has increased over the last few years because of better internet
connections, more sophisticated mobile devices (phones and tablets) and greater
realism in recent games.
54
Information Communication Technology Year 9
Security of data
Data threats
Security risks associated with any electronic device that connects to a network
(internet or mobile phone networks) are:
hacking
phishing
vishing
smishing
pharming
viruses
malware
card fraud
Hacking
This is the act of gaining unauthorise access to a computer system or
network without legal authorisation
Possible effect:
This can lead to identity theft or the misuse of personal information
55
Information Communication Technology Year 9
Phishing
Description:
Legitimate-looking emails sent to a user
As soon as recipient opens/clicks on link in the email/attachment
The user is directed to a fake website without their knowledge
To obtain personal/financial information/data
Possible effect:
Creator of the email can gain personal data such as
bank account data
credit card numbers
Identity theft
Methods to prevent phishing:
Many ISPs or web browsers filter out phishing emails
Users should always be cautious when opening emails or attachments
for example
Note:
Phishing emails often look legitimate by copying large companies, such as
online stores, to try to convince users that the email is totally authentic
56
Information Communication Technology Year 9
Viruses
A virus is a piece of software/program code that infects a computer
Attaches itself to files
And has the ability to replicate itself
Viruses need an active host program on the target computer or an operating
system that has already been infected, before they can actually run and cause
harm
Possible effect:
Causes computer to crash/shut down
It can delete/corrupt data/files
Causes the computer operations to run slowly
Makes software/OS unusable
Fills up the computer memory/hard disk
Can corrupt/erase contents of hard disk
57
Information Communication Technology Year 9
58
Information Communication Technology Year 9
59