Professional Documents
Culture Documents
Longman IGCSE chp12-13
Longman IGCSE chp12-13
Payroll
One of the oldest and most common commercial applications of ICT is payroll
processing. Every company or business has to pay its employees.
The information about an employee that is input to the ICT system each day is :
• Employee number
• Clock-in time
• Clock-out time
Validation checks are made on all the data input to the ICT system. Invalid data must
be corrected before further processing, but data that has been successfully validated is
written to the unsorted transaction file. The unsorted transaction file contains only
the data saved on it day-by-day. This is the data about employees that changes from
day to day.
The data that does not change so frequently is saved on the old master file. There is
one record on the old master file for each employee. The records are sorted and sorted
in employee number order. A record on the old master file contains :
• Employee number
• Employee name
• Address and other contact details
• Hourly rate of pay
• Details of the tax to be paid
• Cumulative totals of the tax paid during the current tax year
• Employee’s bank account details
For each employee, the record on the transaction file and the record on the old master
file must be quickly matched so that all the data for an employee is available when the
payroll program is run. It is important to have both files in the same order because
they are serial files, that is, records are read in order from the beginning of the file to
the end. More accurately, the sorted transaction file and old master file are sequential
files due to the records are stored on the key field.
Backups of files for security purposes can be generated as a consequence of the need
to create a new master file each time the payroll program is run. The ancestral
backup system normally provides three levels of for backup; however, this could be
extended to four or more levels.
Son New master file – will become the old master file the next payroll
program is run
Father Old master file – stored securely but accessibly – possible on site
Grandfather Previous old master file – stored securely – probably off site
The system described above is a known as a batch processing system because the
data captured can be divided into batched before processing. It is characteristic of
batch processing that all the data to be processed is available before processing begins
and that there is no need to process the data immediately file generations. The
system can be run offline, that is, it is not interactive.
Direct access (or random access) means that any record on the file can be read
without having to read previous records. Consequently, direct access to a record is
usually must faster than serial access.
Any changes that are made to the file are made on both disks at the same time. This
technique is known as finger printing. It ensures that if one disk becomes faulty
there is an exact copy of the file immediately available on the other disk.
An online booking system such as the one described above is an example of a real-
time processing system. It is so called because processing is in real time; that is, as
data is input it is processed, before any further input can be processed. A real-time ICT
system must be fast enough to ensure that input can be processed immediately so that
the results can influence any further input.
The system can be also be used to determine the extent of the theft from the
supermarket and improve security. ICT systems for stock control allow managers to
monitor stock levels very closely and to exercise greater control over the business. This
allows the manager to increase the profitability of the business and improve customer
service. Prices can be kept lower and customer service is quicker due to the speed of
the PoS terminals.
Banking
Banks use ICT for storing customer information, processing transactions and in almost
all aspects of banking operations. Many banks also offer home or internet banking.
Cheque processing
Everyday millions of cheques are written worldwide. This method of payment, through
decreasing in use, is still an important way of paying for goods and services,
Using an ATM
To use an ATM, a customer must have an ATM card issued by a bank. This card stores
the customer’s account number. Debit and credit cards can be used in ATMs.
The use of debit and credit cards and EFT is a step towards the ‘cashless society’.
They are issued by banks or by independent companies such as Visa, Master Card or
American Express.
Smart cards are predicted to be the means by which most payments will be made in
the near future. Smart cards have a microchip built into them. It can provide better
security. Microchips also have a larger memory capacity than magnetic stripes do.
Eventually microchips on smart cards will store biometric data such as voiceprints,
fingerprints and retinal scans etc.
The input devices required for a CAD system include alight pen or digitizing tablets for
drawing. A special printer or plotter is required for printing detailed design
specifications on large sheets of paper.
There are many types of CAD software that are used to design products, buildings and
parts in the automotive, aerospace and consumer electronics industries. Eg. CATIA,
CADdy.
CAM software generates instructions for the computerized control of machines. These
CNC (computerized numerical control) machines include computerized lathes for
turning and drilling and machines for cutting and polishing large stones for building
purposes.
CAD/CAM systems
These systems are used integrate design and manufacturing Engineers use the systems
to create product designs, and then to control the manufacturing process. Eg.
SolidWorks and MasterCAD. They can create drawings, model trajectories of cutting
tools, and develop numeric control programs. They support 3D modeling, sheet-metal
punching and bending, and plasma and laser cutting.
Education
Computer-assisted learning (CAL) (or computer-aid instruction (CAI) can be
generally described as the use of ICT to help students further their knowledge of a
particular subject area.
CAL programs fall into three categories :
• Drill and practice – The computer generates questions in a random order
chosen from a stored set, and the student is required to answer them. Some
programs keep scores and enable the student’s progress to be tracked.
• Tutorials –The computer acts like a tutor and allows students to move at their
own pace.
The law
Law enforcement
ICT system are an important tools for the police and law enforcement officers in their
fight against crime. Police and other law enforcement officers also use the computers
available in local police departments for a wide range of functions such as :
• Preparing reports
• Tracking the history of telephone calls from a particular address
• Managing cases
• Tracking paroles (criminals who have been released before the end of the jail
term because of good conduct)
• Profiling – if a witness sees but cannot identify a criminal, the police can use
appropriate software to compose a picture of the alleged criminal, based on the
witness’s description.
• Fingerprinting – a device attached to a computer is used to digitize and store an
individual’s fingerprint.
• Holding equipment inventories.
Law firms
ICT usage in law films falls into two main categories : business management and
practice management.
Patient monitoring
Patient monitoring system help doctors treat patients by providing a 24hour service and
reducing false alarms. Some surgery patients an very ill patients must be continuously
monitored in an intensive care unit.
Magnetic resonance imaging (MRI)
MRI scan the body using very large magnets. A patient on a table is moved into a large
magnetic machine, which scans a small area at a time and sends the image to a MRI
computer.
MRI images are excellent for showing abnormalities of the brain such as strokes,
tumours, infections and haemorrhages, and can be used to detect diseases of the neck
and spine.
Example of expert system : Quick Medical Reference (QMR), Mycin and Dendral.
Telemedicine
Patients can visit a doctor online and doctors can treat their patients at a distance.
Doctors are able to send x-ray to radiologists hundreds of miles away, and transmit
video images of patients to specialists for instant consultations. Doctors can match their
patients’ radiographic information with data in a distance laboratory to help determine
diagnosis and treatment.
Besides giving invaluable help to patients, the Internet also allows to search for
internet sites that help them stay informed and involved with health care topics. Eg.
www.vh.org, home.po.com and etc.
Job creation
The introduction of ICT systems has directly and indirectly been responsible for many
new jobs. Job created directly in the ICT industry are in area such as research, design,
manufacturing, sales, training, programming, communications, education and
consultancy. Job created indirectly include those in the areas of video and CD
production, and the production of magazines and books.
• A journalist can sit on a train or a bus and complete an article using a laptop
while on the way t work, instead of having to be at a desk in the newspaper’s
offices.
• A teacher can have an entire classes on a CAL package and provide very little
input during the session.
• A police officer can access information on criminals and stolen vehicles from a
police car, instead of having to go back to the police station to do this.
• Workers can telecommute instead of having travel to work every day.
Telecommuting
Many workers now work at home some or all of the time, and communicate with the
office using a network such as the Internet. This is called telecommuting.
• Managers may feel they do not have sufficient control over what workers are
doing during working hours.
• Workers may not be available when the company tries to contact them.
Organisations in the UK that store personal information must by law keep to these
principles. These principles require that :
• Data must be fairly and lawfully processed.
• Data must be used only for its intended purpose.
• The data collected must be adequate for its intended purpose, relevant to it and
should not be excessive.
• It must be kept up-to-date and complete.
• The data must not be kept for longer than is necessary.
• The data must be processed in line with your rights, for example, unauthorized
people should not be given access to it.
• The data must be stored securely and protected from unauthorized access and
use.
Computer crime
Software piracy
It is the unauthorised copying, using or selling of software without an appropriate
licence. It includes copying CDs with software on them, and downloading and installing
software without paying the licence fee. These activities are effectively software theft.
Copyright violation
Using the Web you can download music, pictures, animated graphics, video and books,
as well as software. The copyright to some of this material is restricted to its owners.
They may sell you the right to copy it but if you copy it without permission this is
effectively theft.
Hacking
It means gaining unauthorised access to an ICT system, and an individual who does
this referred to as a hacker. The reasons why criminally minded hackers gain
unauthorized access to ICT systems include :
• To steal data
• To alter data or destroy data, by deleting or by installing a virus to destroy or
corrupt it.
• To steal money by transferring it from one account to another using EFT.
Identity theft
When you are connected to the Web, spyware may be installed on your computer
without your knowledge. This would send information about your computer to others
who may have malicious intent.
Security
Security precautions are needed to prevent physical access and access via software and
networks.
Physical safeguards
This deal with the protection of hardware and software from the accidental or malicious
damage or destruction, for example :
• Access control to ICT rooms using locks that are opened using entry codes,
swipe cards, or biometrics such as fingerprints and retinal scans.
• Access monitoring using CCTV cameras so that those entering and leaving
ICT rooms can be recorded.
• Data security can be ensured by taking regular backups and storing these in a
fireproof safe, in another building or in another location.
• Protect hardware from fire, floods, theft and malicious damage by locating
it in buildings and areas where such problems can be reduced.
• Further precautions to protect hardware from theft include : installing burglar
alarms attaching to individual computers in addition t those already used for the
building; and using CCTV cameras in ICT rooms to discourage inappropriate use
of computer equipment.
• Make detailed contingency plans and disaster recovery arrangements so
that ICT systems continue operating with a minimum of disruption and recovery
is swift.
Software safeguards
• Use of ICT systems and networks is restricted to those who have valid
usernames and passwords.
• Access level permissions that allow access to the data to the minimum
number of people who need it.
• File-level passwords that restrict access to individual files to those who have
appropriate access permissions and passwords.
• Use of a virus scanner to prevent viruses entering the system.
• Use of a firewall. This is a program or hardware device or combination of both
that filters the information coming through the internet connection into a
computer or network, to prevent unauthorized users from gaining access.
• Establishing transaction logs to automatically track alternations to ICT
systems.
• Data encryption is used so that if data is access by unauthorised persons, it
cannot be understood. Encrypted data is scrambled during storage and
transmission so that it cannot be understood by someone without the encryption
key to unscramble it.
Assessment requirement
There are two tiers of entry : the foundation tier and the higher tier. You cannot be
entered for both at the same time. The purpose of having two tiers of entry is so that
assessment is appropriate to your ability.
If you are entered for the foundation tier you could be awarded grades C to G; and if
you are entered for the high tier you could be awarded grades A* to D. A* is the
highest grade awarded and G is the lowest.
You will sit a written examination and do coursework, and these must be written in
English. The written examination is 70% of the total mark, and the coursework 30%.
Examination
• The written examination is 1.5 hours in length and there is a different paper for
each tier; however, up to half the questions are common to both tiers.
• The questions are ‘short-answer questions’, that is, you will not be asked to
write essays.
• The questions are structured, that is, they are broken down into several straight
forward steps, each one building on the next, to guide you through the question.
The purpose of an exam is to test your knowledge and understanding. If you do not
know your subject, then you cannot expect to do well. Preparation for the exam begins
on the first day of the course.
• Try not to miss lessons. If you do, catch up with the work quickly.
• Keep all the notes you write and the work you do.
• Do all your homework to your best standard.
• Learn your work as you progress.
Revision
Start revising in good time and plan your revision carefully. Try to allocate set times
each week when you will revise for your IGCSE ICT exam. A useful revision technique
is to repeatedly revise, condense and learn. Read through your notes and all the work
you have done, as you revise your knowledge, take a brief note of all the topics.
Practice for the exam by doing questions of the kind you will meet in exams. It is likely
that similar questions will appear on the exam papers you will take.
Revise those topics where you have weaknesses again. You can make extra notes on
them if you need to. Do more practice questions in these topic area until you are
confident you understand what is required.
Try to complete some of the specimen examination papers under exam conditions in
the time allowed for them. This will give you some idea of how fast you will have to
work in the exam. If you find you are short of time, plan ahead and use your time
effectively.
Exam techniques are common sense methods to help you communicate what you
know more effectively. They are not magic, and using exam techniques will not make
up for lack of through preparation or ignorance.
• Start work as soon as you are allowed to.
• Read the instructions at the start of the exam very carefully, and do what you
are asked.
• In any exam, you should first make sure you know which questions you are
expected to answer.
• Next, work out how much time you are can spend on each question.
• Attempt all the questions you are expected to answer.
• Make sure you read the question thoroughly. Read questions slowly and
carefully.
• You should always give as much detail as possible in the space provided.
• If you give answers such as ‘quicker’, ‘easier’, ‘cheaper’ or ‘more efficient’, you
are unlikely to given marks unless you clearly say what is quicker, etc. or why it
is quicker.
• You will only given credit for relevant answers.
• Pay attention to your spelling, punctuation and grammar.
• Never leave an exam before the end. Spend all the time allowed to you to do
the exam answering questions or checking your answers.
Coursework
Everyone does a project (15%) and set tasks based on a case study (15%). The
coursework must be your own work and should be completed and arrive in London
before a date set each year by Edexcel.
The project
For the project, you identify a problem that can be solved using ICT and build an ICT
system to solve it. The problem will be rated as either ‘standard’ or ‘extension’.
Extension problems are more substantial than standard problems and provide more
opportunities for you to show that you can use complex features of the software.
The project can use any software but typically candidates use DTP (chp4), spreadsheet
(chp5) or database (chp6) software.
• Managing book loans from a library using a database.
• Organising theatre bookings using a spreadsheet.
• Writing a school web site.
You write a report about your project. There should be a contents page at the
beginning of your report and you should number the pages. The report must be
presented under the following headings and you are given a mark under each heading.
The maximum marks for these headings add up to a total of 40 and this is scaled to
give a mark out of 15%.
Heading Maximum
mark
Identify 5
Analyse 9
Design 9
Implement 12
Evaluate 5
Total 40
What you should include under the headings is the written or printed evidence
described below :
Identify
• Clearly describe the problem you will solve.
• State the objective or design criteria.
• Consider alternative solutions and justify the method you choose.
• Describe how your new ICT system will help solve the problem.
• State the user who would use your solution. For eg., it is better to refer to ‘the
owner of the shop’ than ‘my brother Anil’.
Analyse
• Describe the software and hardware you will use, and justify your choices.
• Describe the input data, how this is collected, and how it is entered into the
computer.
• Describe the file and data structures to be used.
• Describe arrangements for verification and validation.
• Describe the output data. Consider different forms of output and how these
might be displayed.
• Describe how the input data is manipulated to get the output data.
• Describe the flow of data through the ICT system. Eg. Flowchart.
• Describe how the data is backed up and other security arrangements.
Design
• Prepare an initial design.
• Prepare a final design. You design should be broken into manageable steps.
• Include a comprehensive plan how you will test your ICT system.
Implement
• Provide evidence that your design has been put into practice, and that it has
solved the problem.
• Test your ICT system following your test plan, and correct any errors you find.
• Evidence should include printout from your ICT system.
• You should show where the ICT system you have implemented differs from your
final design, and explain why you made changes.
Evaluate
• Remember that you should evaluate the ICT system that you have implemented,
not your experience of producing it.
• Evaluate your ICT system against your design criteria or objectives. State
whether each criteria has been achieved and give reasons.
• Demonstrate your ICT system to the user, and provide evidence you have done
this.
• Suggest how your system might be changed or developed in the future.