Ict Notes q1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

IGCSE

ICT Year 9

M r s . M a r w a E l h o u r y
E d i t e d f o r Y e a r 9 b y : M s . N o u r h a n A b d u l l a h
Information Communication Technology Year 9

Chapter 1
Types and components of a computer system
Hardware:
Hardware: All the physical parts that make up the computer system.
Hardware can be either external or internal.
Examples of External Hardware / peripherals
Keyboard, Mouse, Monitor, Webcam, Microphone, Printer, Digital Camera
and Scanner
Examples of Internal Hardware
Motherboard.
Random access memory (RAM).
Read-only memory (ROM).
Video cards.
Sound cards.
Internal storage devices: hard disk drive (HDD) and solid state drive (SSD).
Other Examples of Internal Computer Hardware
Random access memory (RAM)
Read-only memory (ROM)
Internal hard disk drive/solid state drive (HDD/SSD)
Network interface card (NIC)
Software
Definition:
Programs for controlling the operation of a computer or processing of electronic
data.
Types of Software:
1- Application Software:
- Programs that allow the user to do specific tasks.
1
Information Communication Technology Year 9

Examples of Application software:


Word Processor.
Spreadsheet.
Database.
Presentation.
Web browser.

2- System Software:
Programs that allow the hardware to run properly and allow user to
communicate with the computer.
Software running in the background of a computer system.
Without the OS, most computers would be very user-unfriendly and the
majority of users would find it almost impossible to work with computers on
a day-to-day basis.
Examples of System Software:
Operating Systems
Compilers/Interpreter
Linkers
Device drivers
Utilities
- Software that has been designed to carry out specific tasks on a computer.
- Essentially, they are programs that help to manage, maintain and control
computer resources.

2
Information Communication Technology Year 9

Examples of utilities include:


Antivirus
Anti-spyware
Backup of files
Application Software
Word processing application.
Spreadsheet applications.
Database applications.
Video editing software.
Graphics manipulation software.
Audio editing software.

Main components of computer system

3
Information Communication Technology Year 9

Central processing unit (CPU)


Single integrated circuit.
Contained on the motherboard.
Interprets and executes the commands from the computer hardware and
software.
The CPU is made up of:
A control unit, which controls the input and output devices.
An arithmetic and logic unit (ALU), which carries out calculations and
makes logical decisions.
Immediate access store.

RAM
Random Access Memory
Data is temporarily stored when running applications.
This memory can be written to and read from.
Contents are lost when power to the computer is turned off.

Large (4GB or more in a typical computer).


RAM is needed during processing / storing data.

4
Information Communication Technology Year 9

ROM
Read Only Memory.
Holds instructions that need to be permanent such as BIOS.
Data cannot be altered and can only be read from.
Contents are not lost when the computer is turned off.
-
Smaller than RAM.
ROM is needed on boot up.

Operating Systems
Types of interfaces:
1. Command Line Interface (CLI)
2. Graphical user interface (GUI)

Command Line Interface (CLI)


Features of CLI:
Command Line Interface does not
make use of images, Icons or graphics.
Users have to type in commands to
carry out operation.( e.g copy, delete a
file).
Important that users understand how a
computer works.

5
Information Communication Technology Year 9

Advantages and Disadvantages of CLI


Advantages Disadvantages

The User has direct User must remember complex


communication with computer. commands.
Has a wider range of commands Lots of typing needed for quite
to use. simple tasks.
It is possible to alter computer Have to remember the exact path
configuration settings. and name of application.
Incorrect commands can affect
the operation of the computer.

Graphical User Interface (GUI)


Features of GUI
Graphical user interfaces are called WIMP.
Window an area on the screen that displays
information for a specific program
Icons - small picture/image, used as a
shortcut to a program/application
Menus - allow a user to make selections from
a list
Pointer - used to select menu options, icons,
and close or open windows
Post-WIMP Interface
Used in portable devices such as mobile phones, PDA's and tablets.
Icons and menus are used to input commands.
Uses more than one finger as the input device together with a touch screen.
Features Post-WIMP Interface
Pinching where you pinch your fingers together to zoom out or spread
them further apart to zoom in.

6
Information Communication Technology Year 9

Rotating where you use two fingers one finger moves up and the other
finger moves down to rotate the object such as an image.
Swiping where you swipe your finger over the touch screen to turn over a
page of a document.

Advantages and Disadvantages of GUI


Advantages Disadvantages

Less chance of user input Uses up considerably more


errors. computer memory than CLI
Quicker to input commands. interface.
User restricted to pre-
commands. determined options.
Easier to edit action. Not in direct contact with
More user-friendly; icons OS/computer.
used to represent Can be slower for
applications. experienced programmers to
use.
Can be slower to run as
graphics have to be
loaded/larger program.

7
Information Communication Technology Year 9

Who would use each type of interface?


CLI
A programmer.
Analyst.
Technician.
Basically somebody who needs to have direct communication with a
computer to develop.
New software, locate errors and remove them, initiate memory dumps
(contents of the computer memory at some moment in time), and so on

GUI
The end-
how the computer works.
A person who uses the computer to run software or play games or
store/manipulate, photographs, for example.
Compare and contrast CLI and GUI
Post GUI allows the use of pinching, scrolling, and expanding.
Post GUI allows the use of touch screen but a CLI does not allow for this.
Icons speed up finding instructions, CLI you have to type out the commands
in full.
No editing in CLI.
If a mistake is made in CLI it could have major consequences whereas GUI
has less impact.
Due to graphics GUI uses a lot of memory, CLI is a lot smaller program.
Loss of memory slows down the operations of the computer.
GUI cannot operate properly if memory is low.

8
Information Communication Technology Year 9

Types of Computers
Personal Computers (PCs) or Desktop Computers
General purpose computer.

Made up of separate monitor, keyboard, mouse and


processor unit.

Advantages of Desktop Compared to Disadvantages of Desktop Compared


Laptop to Laptop

The large casing allows good Desktops are not particularly


dissipation of any heat build-up. portable.
Internet access is also more It is necessary to copy files,
stable since they are not moved when you.
around (the user will always Want to do some work
have the same data transfer rate). elsewhere.
Lower chance of it being
stolen/lost.

Laptop Computers
Monitor, keyboard, pointing device and processor are all together in one
single unit.
Laptops use rechargeable batteries when used away from a power supply.

9
Information Communication Technology Year 9

Advantages of Laptop compared to Disadvantages of Laptop compared


desktop computers to desktop computers

Much smaller and lighter than The keyboards and pointing


desktop so easily transportable. devices can sometimes be
Since they are portable, they can difficult to use.
link into any multimedia system They have limited battery life so
(e.g. Projector). the user may need to carry a
Can be used even if the heavy adaptor.
power cut. Since they are portable, they are
easy to steal!

Tablets
Internet-enabled portable computer.
Internet access is usually through Wi-Fi or 3G/4G/5G (mobile phone)
connectivity.
Are equipped with a series of sensors including cameras, microphones,
accelerometers and touch screens.

10
Information Communication Technology Year 9

Advantages of Tablets Disadvantages of Tablets

Very fast to switch on. Typing on a touch screen can be


Fully portable they are so slow and error prone compared
lightweight that they can be to a standard users
carried anywhere. Laptops tend to support more
Touch-screen technology means types of file format than tablets,
and are also better equipped to
need any other input devices. run different types of software.
Battery life of a tablet is a lot
longer.

Phablet
Designed as a hybrid between tablet and
smartphone.
Have slightly smaller screens than tablets.

Smartphones
Allow normal phone calls to be made but also have an operating system.
Use a camera feature (to take photos or videos), MP3/4 players.
Communicate with the internet either by using Wi-Fi hot spots or by using
3G/4G/5G mobile phone networks.

11
Information Communication Technology Year 9

Chapter 2
Input and Output Devices

In this chapter you will learn about:


Input devices
Uses of each device

Advantages of each device


Disadvantages of each device
Direct data entry (DDE) devices
Output devices
Uses of each device
Advantages of each device
Disadvantages of each device.

Input Devices
Definition:
Hardware devices that allow data to be input
into a computer.
Types of Input Devices:
Manual Input Devices - data entered by hand
Direct Data Input Devices - data entered by a
machine/computer
Sensors - collect data automatically

12
Information Communication Technology Year 9

Keyboards
The most common type of input device.
Keyboards are used to enter text into word-processed documents, numbers
into spreadsheet.
Typing in commands to the computer (eg. Ctrl-P to print out)
Ergonomic keyboards are designed to reduce health problems linked with
typing. (RSI).

Advantages of Keyboard Disadvantages of Keyboard

Text appears on the screen as It is a slow method for entering


you type so can easily be large amounts of text when
checked for accuracy. compared to direct data entry
(e.g. optical mark recognition)
Most computers come with them Typing for a long time can cause
so there is no extra hardware to repetitive strain injury (RSI).
buy. Fairly large and take up desk
space.
Fast entry of new text into a
Users with arm/wrist problems
document.
can find keyboards hard to use.
Easy to use for most people.

13
Information Communication Technology Year 9

Numeric Keypad
Used where only numeric data is to be entered (although some have a
function key to allow input of alphabetic characters)
Examples: ATM, Telephones, and Chip and PIN devices to enter PIN and
the amount of money.

Pointing Devices
1- Mouse
The left mouse button is used to make selections.
The right mouse button is used to display a dropdown menu.
A scroll button/wheel is used to help move quickly through long documents.
Optical mouse - movement is detected by reflected light rather than the
position of a moving ball
Cordless or wireless mouse (which transmits signals to a USB wireless
receiver plugged into the computer.

14
Information Communication Technology Year 9

Advantage of an optical mouse


Has no moving parts.

performance.

2- Touchpad
Used on laptop computers.

15
Information Communication Technology Year 9

3- Trackerball
The pointer is moved on the screen by rolling your hand over the ball.
Used by people with poor motor skills such as the very young or people with
disabilities.
Used in some luxury cars to select functions such as radio, telephone, music,
satnav and so on.

Remote Control
Use infrared signals.
Used in TVs, video players/recorders, DVD players/recorders, satellite
receivers, Hi-Fi music systems and multimedia projectors.
Used in industrial applications to remotely control processes, stop and start
machinery, etc

16
Information Communication Technology Year 9

Joystick
The stick moves on-screen in the same way as a mouse, and buttons are used
to select items.
Used for playing computer games.
Used in simulators (e.g. flight simulators) to mimic actual controls.
Used in car driving simulators

Driving Wheel
Connects to a computer (or games machine), usually through a USB port.
Allows you to simulate the turning of a steering wheel, and there are
associated devices (such as buttons or pedals) which allow you to accelerate
and brake
Sensors are used to pick up left/right movement
Used in video/computer games (for example, car-racing games).
Used in simulators (for example, car-driving simulators) to mimic actual
vehicle controls.

17
Information Communication Technology Year 9

Touch Screens
Can detect the presence and location of a touch to the screen.
Touch screens can be found in information kiosks, all-in-one computers,
tablet computers, PDAs, ATMs, Point of Sale Terminals, satellite navigation
systems, Interactive white boards, petrol stations, Computer-based training
(CBT) and smartphones.

Scanners
Used to scan in hard copy documents to convert them into a digital format.
Used to scan non-digital photographs to be stored on computer. Scan in
barcodes at POS terminals.

Graphics Tablet
Used to draw or write on using a pen-like device called a stylus.
Used for inputting freehand drawings.
Used for retouching digital photographs.
They are used in computer aided design (CAD) work.

18
Information Communication Technology Year 9

Note:
The computer-aided design (CAD) is used in the design and development of new
products in a variety of applications both at home and on a commercial/industrial
basis, e.g architecture, car/vehicle design, construction and digital circuits.
Microphones
Input sound is analogue signal and then converted into a digital signal.
Used to input sounds/speech into the computer to be used in different ways
(Presentations, Voice Recording, Special Effects in Movies etc).
Used in video conferencing or Voice over Internet Protocol (VoIP).

Digital Camera
Produce photos that can be transferred to a computer or to print out directly.
Most digital cameras also allow you to capture short video clips.
Connected to the computer using USB port or wireless data transfer (Wi-Fi
or Bluetooth).

19
Information Communication Technology Year 9

Web Cam
Can take both still and video images.
Used to conduct simple videoconferencing.
Used to allow people to view the traffic in local road systems.
Used for chatting online.

Video Camera
Many digital cameras are capable of taking moving images.
These cameras are often referred to as DV (digital video) cameras.
They store compressed photo frames at a speed of 25 MB per second this
is known as Motion jpeg.

Light Pen
Used as an alternative input device to a mouse or graphics tablet.
Used for producing freehand drawings directly on a screen or editing
existing drawings.
Selecting objects on CRT screens.
Drawing on screen (e.g, with CAD packages).

20
Information Communication Technology Year 9

Direct data entry and associated devices


Data is contained on a machine-readable card or form.
Data can be input directly into the computer by the input device.
Magnetic Stripe Readers Uses:
Used to read information on the magnetic stripe found on, for example, the
back of a credit or debit card
The stripe contains data such as card number, expiry date and type of card.
Used for reading data off credit/debit cards by ATM, EFTPOS (Electronic
Funds Transfer Point of Sale) terminals.
Used in ID cards to gain access of buildings and rooms.

Chip Readers and PIN Pads


The main use of chip and PIN is to read carddetails (credit card account
information) when making purchases for goods where the cardholder is
present to input the PIN to be verified as the true owner of the card.
The chip contains data such as card number, expiry date, type of card, PIN
and security number.

21
Information Communication Technology Year 9

Contactless card Readers


Contactless debit or credit cards allow customers to pay for items worth up to $25
without entering their PIN.
Have a small chip that emits radio waves embedded in them.
The card is held within a few centimetres of the payment terminal to pay for an
item.

Bar Code Reader (1D)


Used to look up the item details in a database.
Item details include: the country of origin, the manufacturer, the name of the
product and the price.
Used in different applications such as supermarkets where goods are marked
with a barcode, warehouse stock control systems, recording books loaned to
members in a library and luggage labelling at airports.

22
Information Communication Technology Year 9

Output Devices
Definition:
Hardware devices that allow information to be output from a computer.
Types of Output Devices:
Monitors (screens).
Printers.
Control Devices.
Audio Devices.

CRT Monitors
CRT stands for Cathode Ray Tube.
Used with light pens.

TFT Monitors
TFT stands for Thin Film Transistor.
The screen is made up of thousands of tiny pixels.
Each pixel has three transistors red, green and blue.
Used in laptop computers.

23
Information Communication Technology Year 9

LCD and LED Monitors


Most monitors and television sets these days are made using LIQUID
CRYSTAL DISPLAY/DIODE (LCD) technology.
Modern LCD monitors are back lit using LIGHT EMITTING DIODE
(LED) technology.
Before the use of LEDs, LCD monitors used a cold cathode fluorescent lamp
(CCFL) as the backlighting method.

Multimedia Projectors
Used for training presentations.
Teaching, advertising presentations, etc.
They can also be used to provide a larger picture from televisions and
video/DVD players.

24
Information Communication Technology Year 9

Laser Printers
They use a Buffer Memory which stores the information for the whole
document before the pages can be printed out.
Used for networks, which require rapid, high quality and high volume
printing.
Used where low noise is required.
Uses toner to transfer the print image to plain paper.

Inkjet Printers

Do not have large buffers.


Used in digital camera applications which require
high quality output and speed is not an issue.
A printer that sprays tiny droplets of ink directly onto the paper.

Dot Matrix Printers


Used in offices and factories where multi-part stationery and continuous
stationery printouts are needed and noise is not an issue
Used to print out invoices in warehouses, car part
stores, and garages.

25
Information Communication Technology Year 9

Plotters Printers
Ideal for printing designs, plans, and maps.
Ideal forprinting out designs that have been produced using CAD software.
Ideal for printing out large printouts, for example on A0-sized paper.

Wide format printers


Used for wide printouts (e.g. maps, posters and plans)
Can use laser or inkjet technology and are expensive specialist printers.

3D Printers
Used in COMPUTER-AIDED DESIGN (CAD) applications
The solid object is built up layer by layer using materials such as powdered
resin, powdered metal, paper or ceramic powder.

26
Information Communication Technology Year 9

Chapter 3
Backing up of data
What is backing up of Data?
Backing up refers to the copying of files and data to a different medium
(disk, tape, flash drive, cloud storage) in case of a problem with the main
storage device.
Why back up data?
Data could be lost due to failure of the original storage device.
Hackers could be responsible for the corruption or even loss of data.
Backups are also made in case the files need to be used elsewhere.
Data could be accidentally amended or overwritten on original medium.
Data could be maliciously deleted from original medium.
Why backups do not necessarily protect against viruses?
The virus could attach itself to the files which could mean that the backups
were also affected.
Secondary storage media
Most computers have backing storage as well as main/internal memory
(RAM/ROM).
Why backing storage is needed.
If computer is switched off, work in RAM is lost but backing storage stores
data for future use
More likely that data is accidentally deleted in RAM
Operating system may be so large that it is physically impossible for ROM
to store it.

that with RAM.

27
Information Communication Technology Year 9

Types of Backing Storage Devices


Backing storage devices are either internal or external (i.e. plug-in devices) to the
computer, and are one of three types:
Magnetic
Optical
Solid State Examples of Storage Devices
Magnetic Optical Solid State
Fixed Hard Disk CD/DVD ROM CD/DVD R Pen drive
Portable Hard Disk CD/RW DVD/RW Flash Memory Card
Magnetic Tape DVD RAM Blue-Ray Disk Solid State Drive

Fixed Hard Disks


Used to store operating systems, applications software, and personal files.
Used in real-time systems (e.g. robots)
Used for online processes, e.g personal website, booking airline tickets,
automatic stock control.
Used in file servers for networks.
Portable Hard Disks
Advantages of Portable Hard Disks Disadvantages of Portable Hard Disks

They can be attached to and used Their use with lots of different
by any computer that has a USB computers can mean there is a
(Universal Serial Bus) port. danger of viruses being
The data access time and data transferred.
transfer rate is very fast. It can be easily damaged.
Holds large amount of data They are more expensive than
compared to CD/DVD. other forms of removable media,
such as CDs or DVDs

28
Information Communication Technology Year 9

Magnetic Tapes
Very thin strip of plastic that has been coated in a magnetic layer.
Data is read from the tape using serial access.
This type of storage is useless in a real-time or online applications due to the
very slow data access speeds.

Advantages of Magnetic Tapes Disadvantages of Magnetic Tapes

Generally less expensive than They are not suitable for an


the equivalent capacity hard disk application that requires fast
drive. access to data because the speed
Very large storage capacities. of access is low.
Tapes can be easily stored in a A special drive is required to
safe place. read and write to them.

29
Information Communication Technology Year 9

CD ROM (Compact Disk Read Only Memory) & DVD ROM (digital versatile
disk read only memory)
Optical disks are read-only memory (ROM).
They cannot be written over.
Can only be read.

Uses:
CD-ROMs are used to store: music files, software, computer games
DVD-ROMs have much larger storage
Advantages of CD ROM/DVD ROM Disadvantages of CD ROM/DVD
ROM

Once written, the data cannot be Data transfer rate and access rate
erased and this makes it useful are lower than for a hard disk.
for the distribution of software. The media can be unreadable if
Cheaper to buy than hard disk scratched.
drives.

CD R (CD recordable)/DVD R (DVD recordable)

CD-ROM or DVD-ROM once it has been finalized


Which means that the CD/DVD cannot have any additional data written to it

30
Information Communication Technology Year 9

Uses
Used to transfer data from one computer to another.
Used for home recordings of music (CD-Rs) and films (DVD-Rs).
Used in applications where it is necessary to prevent the deletion or over-
writing of important data).

Advantages of CD R/DVD R Disadvantages of CD R/DVD R

Cheaper than RW discs and Data cannot be erased.


Hard Disk Drives. If an error occurs during
Physically impossible to and must be thrown away
accidentally delete important (wasted).
information stored on them.

CD-RW and DVD-RW


-writable media and can be written
over several times.
Uses
Used in applications which require the updating of information.
Used to record television programmes and can be recorded over many times.
Used in Closed Circuit Television (CCTV) to allow security to keep an eye
on businesses and what is happening on the streets.

31
Information Communication Technology Year 9

Advantages of CD-RW and DVD-RW Disadvantages of CD-RW and DVD-


RW

CD-RWs and DVD-RWs can be More expensive to buy than


re-used many times. CD/DVD-R disks.
It is possible to accidentally
Not as wasteful as the R overwrite data (since RW disks
format. Even if burning fails, the can be updated).
disk can still be recorded on later Discs may stop working due to
and not thrown away. the repetitive erasing and writing

DVD RAM (Digital Versatile Disk Random Access Memory)


Use a number of concentric tracks.
Allows simultaneous read and write operations.
Allow numerous read and write operations.
Have great longevity.
Can be written to and read from many times.

Advantages of DVD RAM Disadvantages of DVD RAM

They have a greater capacity They are relatively expensive,


than CD/DVDs. costing about 4 times as much as
They have quicker access than a DVD-RW disk.
DVD RW

Blu-ray
Blue laser, rather than a red laser, is used to carry out read and write
operations
Blu-ray can store up to five times more data than a normal DVD

32
Information Communication Technology Year 9

Uses

Home video consoles.


Storing and playing back high-definition movies.

Advantages of Blu-ray Disadvantages of Blu-ray

Huge storage capacity than other Blu-Ray Disks are very


optical media.( e.g Perfect for expensive compared to other
high definition movies). types of disk.
Faster data transfer rate than Only work in Blu-Ray
with other optical media drives/players which are
The data access speed is greater expensive.
than with other optical media.
Blu-ray discs automatically
come with a secure encryption
system, which helps to prevent
piracy and copyright
infringement

Memory sticks/Pen drives


Store several gigabytes of data.
Use the solid state technology.
Connected to a computer through the USB port.
Power to operate them is drawn from the host computer.
Most operating systems recognize these storage media.
Which means no additional software is needed to operate them.

33
Information Communication Technology Year 9

Uses
Transporting files between computers.
Used as a backup store.
Used as a security device to prevent software piracy (known as a dongle).

Advantages of Memory sticks Disadvantages of Memory sticks

Can be used in any device with a Easy to lose


USB port Can't write-protect the data/files.
Small so easily portable. Lower storage capacity
Cannot be scratched like optical compared to hard disks.
media.

34
Information Communication Technology Year 9

Chapter 4
Networks and the Effects of using them
What is a network?
A network is two or more computers that are linked together so that they are
able to share resources. (eg. Printer, scanner, data, software and internet
connection)
Network Devices
Hubs
Hardware devices.
Can have a number of devices/computers connected to them
Used to connect together a number of devices to form a LAN

Switches
Hardware devices.
Can have a number of devices/computers connected to them.
Work in a more efficient way compared to hubs.
Can direct data to specific computers or devices.
Each device or computer on a network has a media access control (MAC)
address.
A more secure way of distributing data compared
to hubs.

35
Information Communication Technology Year 9

Bridges
Connect one LAN to another LAN that uses the same protocol (
communication rules)
Directs data packets to specific networks
Usually has only two ports

Routers
Connect the LAN to the internet /WAN
Allow private networks to be connected together
Every computer on the same network has the same part of an internet
protocol (IP) address.

How a router routes data packets


Inspects the data packets received
Checks the destination IP address using the stored routing table
It uses a routing table which lists all the different routes to other networks
Uses the IP address to work out the best route sends the data packet to the
next router.

36
Information Communication Technology Year 9

Other Hardware
Many computer systems use Wi-Fi, network cables are still used because:
Faster data transfer rates than wireless.
Can be more secure than wireless networks
Types of Cables:
Copper Cables
Fibre Optics Cables
Advantages of fibre optics compared to copper cables:
Offers higher data transfer rates
Better security

Wi-Fi and Bluetooth


Both Wi-Fi and Bluetooth offer wireless
communication between devices.
They both use electromagnetic radiation as
the carrier of data transmission.

37
Information Communication Technology Year 9

Bluetooth
Bluetooth sends and receives radio.
Devices using Bluetooth automatically detect and connect to each other, but
they do not interfere with other devices because each communicating pair
uses a different channel.
Wi-Fi
Wi-Fi sends and receives radio waves in several different frequency bands.
Like Bluetooth, each band is also further split into channels.
Wi-Fi is best suited to operating full-scale networks because:
o it offers much faster data transfer rates
o better range and better security than Bluetooth
A Wi-Fi enabled device (such as a computer or smartphone) can access for
example, the internet wirelessly at any access point (A
100 meters away.
The advantages and disadvantages of using Bluetooth or WiFi
Bluetooth is more useful when transferring data between two devices
whereas WiFi is more suited to full scale networks
Bluetooth does not buffer
Cost of Bluetooth is cheaper than WiFi
The devices connected via Bluetooth should be near to each other whereas
WiFi has a larger range
WiFi has better security than Bluetooth
Bluetooth has a shorter password
Bluetooth devices are battery operated which needs to be replaced or
recharged but WiFi do not necessarily use batteries.

38
Information Communication Technology Year 9

Cloud computing (storage)


Cloud computing is a method of data storage where data is stored on remote
servers there may be thousands of servers in many different locations.
The physical environment of the cloud servers is owned and managed by a
hosting company.
Advantages of cloud computing Disadvantages of cloud computing
(storage) (storage)
Customer/client files stored in the If the customer/client has a slow or
cloud can be accessed at any time, as unstable internet connection, they
long as internet access is available. could have many problems accessing
There is no need for a customer/client or downloading their data/files.
to carry an external storage device Costs can be high if a large storage
with them. capacity.
The cloud provides the user with
remote backup of data.

Network types
Local Area Network (LAN).
2. Wireless Local Area Network (WLAN).
3. Wide Area Network (WAN).

39
Information Communication Technology Year 9

Local area networks (LANs) and wide area networks (WANs)


LAN
Local Area Network
Covers a small area/one building
A school network is a LAN
Consist of a number of computers and
devices (for example, printers) that are
connected to hubs or switches to allow
the LAN to connect to the internet then
becomes part of a WAN.

Wide area networks (WANs)


Covers a large geographical area
Consists of connected LANs
usually make use of some public communications network (such as
telephone lines or satellites)
but they can use dedicated or leased communication lines, which can be less
expensive and also more secure (less risk of hacking)
Example of WAN
The Internet
The network of ATMs (automated teller machines) used by banks
Network issues and communicationPasswords
Uses of Passwords
accessing your email account
carrying out online banking
accessing social networking sites

40
Information Communication Technology Year 9

Ways to Protect Passwords


Run anti-spyware software
Change passwords on a regular basis
Passwords should not be easy to guess or break
Difference between a weak password and a strong password
Example of week password 111.
Weak password is easy to guess.
Weak passwords consist of all letters or all digits or all digits with one
letter/all letters with one digit.
Weak password is one that has few characters.
Weak password has repeated characters.
Weak password has characters next to each other on a QWERTY keyboard.
Weak passwords are ones that are similar to the user name.
Weak passwords are passwords that relate to the user.
Example of strong password Green_513@#
Strong password is difficult to guess.
Strong password uses mixture of upper case letters, digits and punctuation
marks.

41
Information Communication Technology Year 9

Anti-malware software (anti-virus software)


Viruses
A virus is a piece of software/program code that infects a computer.
Attaches itself to files.
And has the ability to replicate itself.
Effects of a virus
Causes computer to crash/shut down.
It can delete/corrupt data/files.
Causes the computer operations to run slowly.
Makes software/OS unusable.
Fills up the computer memory/hard disk.
Can corrupt/erase contents of hard disk.
How can a system be protected from viruses?
Don't use disks/CDs/DVDs/memory sticks from unknown sources.
Open emails attachments from known sources.
Use up-to-date anti-virus software.
Only download software from trusted websites.
Scan the pen-drive as it is inserted into his computer.

42
Information Communication Technology Year 9

Chapter 5
Systems Life Cycle

The systems life cycle is a series of stages that are worked through during the
development of a new IT system or the improvement of an existing one.
Stages of Systems Analysis and Design:

1- Analysis

43
Information Communication Technology Year 9

Analyze the current system


There are four methods used to research the current system.
Observation
Questionnaires
Interviews
Examination of existing documents.
There are four common methods used to collect information (fact finding) about
the existing system:
Observation
Involves watching personnel using the existing system to find out exactly
how it works.
Advantages Disadvantages

The analyst obtains reliable data. People are generally


It is possible to get a better uncomfortable being watched
overall view of the system and may work in a different way
Relatively inexpensive method
because it only involves the
analyst

44
Information Communication Technology Year 9

Interviews
Involves a one-to-one question-and-answer session between the analyst and
the employee/customer.
Advantages Disadvantages

It gives the opportunity to It can be a rather time consuming


motivate the interviewee into exercise
giving open and honest answers It is relatively expensive (team of
interviewers and analyst needed)
The method allows the analyst to Interviewee can give answers
probe for more feedback from the they think the interviewer wants
interviewee (questions can be to hear
extended)

Questionnaires
Involves sending out questionnaires to the work force and/or to customers to
find out their views of the existing system and find out how some of the key
tasks are carried out.

Advantages Disadvantages
The questions can be answered fairly The number of returned questionnaires
quickly can be low; not always a popular
It is a relatively inexpensive method method
(only need to produce questionnaires) Users tend to exaggerate their
Individuals can remain anonymous if responses as they are anonymous
they want (therefore give more Because anonymous, the interviewees
truthful answers) may not take it seriously

45
Information Communication Technology Year 9

Looking at existing paperwork / Examining Documents


Allows the analyst to see how the paper files are kept, look at operating
instructions and training manuals, check the accounts, etc.
Advantages Disadvantages

Information can be obtained Time consuming to go through


which is not possible using other the documents
methods. Expensive method as the analyst
Can see the scale of the problem will have to spend time going
easily. through document.

Design Stage
A list of design tasks:
Designing data capture forms (these are forms used for the input of data).
Designing screen layouts (these are part of the user interface).
Designing output forms and reports.
Producing systems
Validation
Validation is a process where data is checked to see if it satisfies certain criteria
when input into a computer.
Verification
Verification means to check that the data on the original source document is
identical to the data that you have entered into the system or object
document.
There are two ways that verification checks are carried out:
Double data entry
Data is typed in twice by one typist or data is typed in by two operators and
computer compares versions.

46
Information Communication Technology Year 9

Visual check
This is the checking for errors by comparing entered data on the screen with
the data in the original document.
Verification is needed for the following reasons
Data may be entered/copied inaccurately
Check needs to be carried out to ensure accurate data entry

Development Stage
Stages of Development are:
Creating a file structure to store data and testing it
Create validation rules to make sure the data entered is sensible, and testing
them
Create a user-interface to allow data to be entered into the system, and
testing it.
Create output forma and testing them

A well designed input screen should have:


Appropriate spacing for each field.
Buttons to go forward/backwards.
Drop down lists to choose an option.
Button to save data/submit/accept.
Tick boxes/radio buttons to enter choices.
An easy to read font/font size.
A sensible font colour/background colour.
No overlapping of items.

47
Information Communication Technology Year 9

Testing Stage
Test designs cover how a system is to be tested and how we can ensure the
following aspects can be achieved.
The purpose of test data is to make sure that:
Inputs to the system are valid
Outputs from the system are accurate
Outputs are presented clearly
Implementation Stage
Implementation means that old system is replaced by the new system.
Documentation
Two types of documentation
User documentation
Technical Documentation
Purpose of User documentation
Designed to help the user understand how the new system works
Designed to help the user to learn how to use the new system
Technical documentation may be too complex for the user to understand
Designed to help the user deal with problems
Evaluation
To evaluate the system, the analyst will:
Compare the final solution with the original requirement
Identify any limitations in the system
Identify any necessary improvements that need to be made

48
Information Communication Technology Year 9

Hardware may need to be updated because:


of feedback from end users
new hardware comes on the market, making change necessary
there are changes within the company which require new devices to be
added or updated.
Software may need to be updated because:
of feedback from end users
Changes to the company structure or how the company works may need
modifications to the software
Changes in legislation may need modifications to the software.

49
Information Communication Technology Year 9

Chapter 6
Safety and Security
Physical safety
Safety issues
Physical safety is concerned with the dangers that could lead to serious
injuries or even loss of life.
There are a number of safety issues that can arise from using ICT devices.
Usually caused by accidents.
Some of these safety issues include:
o Electrocution
o Tripping over wires and cables
o Fires
o Heavy equipment falling injuring users
Electrocution
Causes
Spilling liquids/drinks on electric equipment
Exposed wires/damaged insulation
Unsafe electrical equipment
Prevention
Do not allow drinks to be taken into the computer room
Check all wires on a regular basis and renew wires if there is any sign of
damaged insulation
Ensure all equipment is checked by a qualified electrician on a regular basis

50
Information Communication Technology Year 9

Fire hazard
Causes
Overloaded wall sockets (several items plugged into one wall socket)
Overheating of computer equipment (due to poor heat dissipation)
Exposed wires causing a short circuit
Prevention
Increase the number of wall sockets and do not use too many extension
blocks
Do not cover the cooling vents on computer equipment
Clean out dust accumulation in computers to prevent overheating
Make sure all equipment is fully tested on a regular basis
Tripping hazard
Causes
Trailing wires on the floor
Damaged carpets and other flooring
Prevention
Use cable ducts to make the wires safe
Cover exposed wires and hide wires under desks
Personal injur
Causes
Heavy equipment unstable or falling from desks
Desks collapsing under weight/desks not designed to take the weight
Prevention
Use desks strong enough to take the weight of the computer equipment
Use large desks and tables so that hardware is not too close to the edge
where it could fall off

51
Information Communication Technology Year 9

Data protection
Main principles of data protection acts
Data must be fairly and lawfully processed.
Data can only be processed for the stated purpose.
Data must be accurate.
Data must not be kept longer than necessary.
Data must be kept secure.
There are general guidelines about how to stop data being obtained unlawfully:
Do not leave personal information lying around on a desk when not attended
Lock filing cabinets at the end of the day or when the room is unoccupied
Use passwords and user IDs, which should be kept secure; passwords should
be difficult to guess/break and should be changed frequently (see earlier
notes on passwords)
Personal Data
Refers to any data concerning a living person who can be identified either
from the data itself or from the data in conjunction with other information
Examples of personal data include:
name
address or email address (such as [email protected])
an ID card number/passport number
an IP address
date of birth
banking details
Photographs of the individual (for example, in full school uniform).

52
Information Communication Technology Year 9

E-Safety
What is E-Safety?
Refers to the benefits, risks and responsibilities when using ICT.
It is often defined to be the safe and responsible use of technology
However, e-safety is as much about user behaviour as it is about electronic
security. In particular:
when using the internet
sending and receiving emails
taking part in social media
online gaming.
Using the internet
The following is a list of the precautions that can be taken to minimize the
potential danger when using the internet:
When using the internet make sure that the websites being used can be
trusted.
Only purchase items from websites that offer secure, encrypted connections.
When using search engines, always make sure the device settings are set to

Only use websites recommended by teachers, parents or from trusted


sources.
Be careful what you download; is the material potentially harmful? Could it
be malware?

53
Information Communication Technology Year 9

Sending and receiving emails


The following list highlights some of the dangers when sending and receiving
emails.
Only open emails or attachments from known sources.
Only reply to an email if you know the person who sent it.
Think carefully before replying to an email and never include the name of
your school/college, or any personal data that could identify you.
Never send photos of yourself.
Social media
Do not publicly post or give out personal information to people you do not
know, including email addresses or house addresses, because this could be
used to find information about you or carry out identity theft.
Do not send out photos of yourself to people you do not know.
Particular care should be taken not to post photos of yourself in some form
of school uniform.
-
and also make sure you control who has access to your profile.

Online gaming
Online gaming has increased over the last few years because of better internet
connections, more sophisticated mobile devices (phones and tablets) and greater
realism in recent games.

54
Information Communication Technology Year 9

Security of data
Data threats
Security risks associated with any electronic device that connects to a network
(internet or mobile phone networks) are:
hacking
phishing
vishing
smishing
pharming
viruses
malware
card fraud
Hacking
This is the act of gaining unauthorise access to a computer system or
network without legal authorisation
Possible effect:
This can lead to identity theft or the misuse of personal information

Methods to prevent hacking:


Use of firewalls
Use of strong (frequently changed) passwords and user IDs
Use of anti-hacking software
Use of user IDs and passwords
Note:
it makes the data unreadable to the
hacker but the data can still be deleted, altered or corrupted

55
Information Communication Technology Year 9

Phishing
Description:
Legitimate-looking emails sent to a user
As soon as recipient opens/clicks on link in the email/attachment
The user is directed to a fake website without their knowledge
To obtain personal/financial information/data

Possible effect:
Creator of the email can gain personal data such as
bank account data
credit card numbers
Identity theft
Methods to prevent phishing:
Many ISPs or web browsers filter out phishing emails
Users should always be cautious when opening emails or attachments

for example
Note:
Phishing emails often look legitimate by copying large companies, such as
online stores, to try to convince users that the email is totally authentic

56
Information Communication Technology Year 9

Viruses and malware


Malware is one of the biggest risks to the integrity and security of data on a
computer system.
Many software applications, such as anti-virus, are capable of identifying
and removing most of the forms of malware.
There are many forms of malware.

Viruses
A virus is a piece of software/program code that infects a computer
Attaches itself to files
And has the ability to replicate itself
Viruses need an active host program on the target computer or an operating
system that has already been infected, before they can actually run and cause
harm
Possible effect:
Causes computer to crash/shut down
It can delete/corrupt data/files
Causes the computer operations to run slowly
Makes software/OS unusable
Fills up the computer memory/hard disk
Can corrupt/erase contents of hard disk
57
Information Communication Technology Year 9

Methods to prevent viruses


Install and run anti-virus software and update it regularly

Be careful when opening emails or attachments from unknown senders

Antivirus Software Features


Check software or files before they are run on a computer
Compares a possible virus against a database of known viruses
Carry out heuristic checking
checking of software for types of behaviour that could indicate a
possible virus, useful if software is infected by a virus not yet on the
database
Any possible files or programs that are infected are put into quarantine that:
allows the virus to be automatically deleted, or
allows the user to make the decision about deletion
How the antivirus software works during the scan.
Detects a potential virus
Compares the virus coding with its database
Alerts the user of the potential virus
It asks the user if the file can be deleted or not
Deletes the file and virus
Isolates / quarantines the infected files on the hard disk ... so they cannot
infect the computer
Dis-infects / cleans the file
How can a system be protected from viruses?
Don't use disks/CDs/DVDs/memory sticks from unknown sources

58
Information Communication Technology Year 9

Open emails attachments from known sources


Use up-to-date anti-virus software
Only download software from trusted websites
Scan the pen-drive as it is inserted into his computer
Avoid opening spam emails
Ways the computer can become infected with a virus:
Clicked on / opened a spam email
Opened / downloaded the email attachment / embedded image
Clicked on / opened a spam email
Clicked on a link to a website within the email
Opening software from a portable device / medium
Running it without being checked by up to date anti-virus software
Sharing a portable device / medium
But not checking it with an up to date anti-virus software before opening

59

You might also like