ICT Notes Chapter 1 To 10

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 115

`

I.G.C.S.E. SECTION

Paper 1
June 2016

Dina El-Akkad
ICT I.G.C.S.E SECTION

Contents

Chapter 1 Types and components of a computer system Page 2

Chapter 2 Input and output devices Page 13

Chapter 3 Storage devices and media Page 34

Chapter 4 Networks and effects of using them Page 42

Chapter 5 Systems life cycle Page 56

Chapter 6 The effects of using ICT Page 68

Chapter 7 Safety and security Page 73

Chapter 8 Audiences Page 83

Chapter 9 ICT applications Page 87

Chapter 10 Communication Page 108

Dina El-Akkad 1
ICT I.G.C.S.E SECTION

Dina El-Akkad 2
ICT I.G.C.S.E SECTION
1.1 Hardware:
Hardware is a general term for the physical components that make up a computer system, for
example keyboard, mouse, etc. Hardware can be either external or internal.
Peripheral devices: devices other than the CPU.

Internal Computer Hardware:

Central Processing Unit (CPU): The CPU interprets and executes the commands from the
computer hardware and software. It is part of the motherboard.
A microprocessor is a single integrated circuit found in PCs and many household devices.
The CPU is made up of:
 a Control Unit: controls the input and output devices
 an Arithmetic and Logic Unit (ALU): carries out calculations and make logic decisions
 Immediate Access Store (RAM)

Motherboard:
The motherboard is a printed circuit board found in all computers. The motherboard
allows the processor and other computer hardware to function and communicate with
each other. It acts as a kind of ‘hub’ that other computer devices connect to. It
contains several sockets and slots to connect the other components.

Random Access Memory (RAM)


1. Data can be written to and read from at high speed.
2. RAM is a volatile store (Information is lost when the power is switched off).
Uses: Stores programs and data in current use.

Read Only Memory (ROM)


1. ROM can be read at high speeds but nothing can be written on it.
2. ROM is non-volatile.
Uses: Used to store programs essential for the running of the computer. Programs that might be
stored on ROM include:
 BIOS (Basic Input/Output System) which carries out a hardware check when the computer
is turned on then loads the operating system into the RAM.
 Program cycles in a washing machine.
CMOS (Complementary Metal Oxide Semiconductor): battery powered non-volatile chips used
by the BIOS to store date and time.
Dina El-Akkad 3
ICT I.G.C.S.E SECTION
Video Card
Video cards are usually made up of:
 a processing unit
 memory unit (usually RAM)
 a cooling mechanism
 connections to a display unit

Sound Card
Sound cards use two basic methods to translate digital data into analogue signals needed for
speakers:
 FM synthesis mimics different musical instruments according to built-in formulas
 wavetable synthesis relies on recordings of actual instruments to produce sound.

1.2 Software:
Software is a general term for the programs that control the computer system. There are two types
of software: application and system.
a) Application Software: Programs that allow the user to do specific tasks. For example:
 Word processor is used to manipulate text documents.
 Spreadsheet is used to organise and manipulate numerical data.
 Database management system is used to organise, manipulate and analyse data.
 Control and measuring software
 Apps (short for Applications) refers to the type of software that runs on mobile phones or
tablets.
 Photo editing software
 Video editing software
 Graphics manipulation software

Dina El-Akkad 4
ICT I.G.C.S.E SECTION
b) System Software: Programs that allow the hardware to run properly and allow the user to
communicate with the computer. For example:
 Operating systems

 Utilities help to manage, maintain and control computer resources. Examples:


o antivirus
o anti-spyware
o backup of files
o disk repair
o screensavers

 Device drivers allow hardware devices to communicate with the operating system.

 Compiler translates a program written in high-level language into machine code to be


understood by the computer.

 Linkers are used to put all the modules together to form a final program.

1.3 Operating systems:


Tasks for a typical operating system:
 control the operation of the input, output and backing storage devices
 supervising the loading, running and storage of application programs
 maintaining security of the whole computer system
 maintaining a computer log (which details computer usage)
 allowing communication between the user and the computer system (user interface)

Dina El-Akkad 5
ICT I.G.C.S.E SECTION
1.3.1 User interfaces:
Command line interfaces (CLIs):
CLIs require a user to type in instructions in order to choose option, open software, etc.

CLI is used by programmes, analysts and technicians to have direct communication with a
computer to develop new software, locate and remove errors, and so on.

Graphical User Interface (GUIs):


One of the most common GUIs is windows icons menu and pointing device (WIMP). Windows
create a border to the information. Icons represent files. Menus allow users to make choices and a
pointer to select choices.

Touch screen phones use post-WIMP interaction, where fingers are in contact with the screen
allowing actions such as rotating.

GUI is used by the end-user who doesn’t have great knowledge of how a computer works.

Interface Advantages Disadvantages


CLI 1. The user is in direct communication with 1. The user has to learn the commands.
the computer. 2. All commands need to be typed in which
2. The user is not restricted to a number of takes time and can be error-prone.
predetermined options. 3. Each command must be typed using the
3. It is possible to alter computer correct format.
configuration settings. 4. It is more difficult to edit once commands
are entered.

GUI 1. The user doesn’t need to learn any 1. It uses up more computer memory than a
commands. CLI interface.
2. It is more user-friendly; icons are used to 2. The user is limited to the icons provided
represent applications. on the screen.
3. A pointing device is used to click on an
icon to launch the application – this is
simpler than typing.

Dina El-Akkad 6
ICT I.G.C.S.E SECTION
1.4 Types of Computers:
1.4.1 Personal Computers (PCs) / Desktop Computers:
They are general purpose computers made up of separate components. Spare
parts are often cheap because they are standardised.

Advantages of desktop computers compared to laptop computers:


1. Spare parts are cheaper.
2. The desktop tends to have a better specification for a given price.
3. Power consumption is not critical since they plug straight into a wall socket and the larger
casings allow a better dissipation of heat.
4. Being fixed in one location, there is less likelihood of them being damaged.
5. Internet access is more stable since they are not moved around.

Disadvantages of desktop computers compared to laptop computers:


1. They are not portable since they are made of separate components.
2. It is necessary to copy files when you want to do some work elsewhere.
3. Many components so clutters up the desk space.

1.4.2 Laptops / Notebook Computers:


The key features in a laptop are:
 low weight (to aid portability)
 low power consumption (and also long battery life)
 a processor that does not generate too much heat (cooling is very
important).

Advantages of laptop computers compared to desktop computers:


1. They can be taken anywhere since all the components are all together in one single unit.
2. Because everything is in one single unit, there are no trailing cables.
3. They can take full advantage of Wi-Fi.
4. Since they are portable, they can link into any multimedia system.

Disadvantages of laptop computers compared to desktop computers:


1. Since they are portable, they are easier to steal.
2. They have a limited battery life, so the user may need to carry a heavy adaptor.
3. The keyboards and pointing devices can sometimes be awkward to use.

Dina El-Akkad 7
ICT I.G.C.S.E SECTION
1.4.3 Tablets
Internet access is usually through Wi-Fi or 3G/4G (mobile phone) connectivity.
Features of tablets:
 high-definition, anti-glare displays
 front- and back-facing cameras
 lower weight and longer battery life than laptops
 Bluetooth connection to printers and other devices
 flash (solid state) memory and cloud storage facilities to backup and synchronise data
sources
 sensors to carry out the following functions:
o proximity sensors to detect if a device is close to the ear to block unintended touches
o accelerometer, which detects movement and orientation of the device
o can use speech-recognitions systems.

Phablet: A hybrid between tablet and smartphone.

Advantages of tablets compared to laptops:


1. very fast to switch on.
2. fully portable.
3. touch-screen technology means they are simple to use and don’t need any other input device.
4. don’t generate any heat - they use solid state technology.
5. battery life of a tablet is a lot longer.
6. when the power button is pressed it goes into standby but remains connected to the internet, so
the user still hears alerts when emails are received

Disadvantages of tablets compared to laptops:


1. They often have limited memory or storage compared to a laptop.
2. They can be expensive to run if the internet is being accessed frequently via 3G/4G mobile phone
networks.
3. Typing on a touch screen can be slow and error-prone compared to a standard keyboard.
4. Transferring of files often has to be done through an ‘Apps store’.
5. Laptops support more types of file format than tablets, and also run more types of software.

Dina El-Akkad 8
ICT I.G.C.S.E SECTION
1.4.4 Smartphones
Internet access is either by using Wi-Fi or 3G/4G (mobile phone) connectivity.

Advantages of smart phones:


1. They are very small in size and light in weight.
2. Can use them to make phone calls as well as connect to the internet while on the move.
3. Because they use Wi-Fi and mobile phone networks, they can be used almost anywhere.
4. They have hundreds of Apps – this is similar to tablets but it is an advantage over compared to
laptops.
5. They have a reasonable battery life compared to laptops.

Disadvantages of smart phones:


1. Small screens make pages difficult to read and small keyboards make typing difficult and slow.
2. Web browsing and photography can drain the battery quickly.
3. Memory size in most phones isn’t very large when compared to laptops and PCs – although it is
comparable to tablets.
4. Not all website features are compatible with smartphone operating systems.
5. Because of its small size it is much easier to lose (or for it to be stolen) a smartphone than laptops
or PCs.
6. The data transfer rate using mobile phone networks is slower than with Wi-Fi.

1.4.5 Smartwatches
Whatever is available on a smartphone is available on a smart watch.

Advantages of a smartwatch over a smartphone:


1. notifications are delivered straight to the user’s wrist
2. easy to use for monitoring fitness and health regimes

Disadvantages of a smartwatch over a smartphone:


1. large and bulky which can make them uncomfortable to wear
2. unattractive in design

Dina El-Akkad 9
ICT I.G.C.S.E SECTION
1.4.6 Mainframe Computers:
The main features of mainframe computers are:
 they can have several CPUs
 they have very fast processor speeds
 they can support multiple operating systems
 they have huge amounts of storage capacity
 they have huge internal memories (several hundred gigabytes of RAM)
 they often operate using time sharing or batch processing

Uses of mainframe computers:


 banking
 insurance companies
 government departments

1.5 Impact of emerging technologies:


1.5.1 Artificial intelligence (AI) biometrics:
AI biometrics uses dynamic profiling so a person doesn’t have to worry about getting their finger in
exactly the right place every time on the scanner. The system learns from the different alignments
and is therefore still able to match the fingerprints to those stored on a database.
Computerised facial-recognition systems are confused by soft biometric changes like growing facial
hair or wearing glasses. New systems use AI to learn from scanning a number of faces and pick out
these soft biometric features.

1.5.2 Vision enhancement:


Low-vision enhancement systems (LVES) use video technology through a headset connected to a
computers. The system allows images to be projected inside the headset in front of the eyes. This
brings the objects closer for examination by the user of the system.

Night vision enhancement (NVE) amplifies infrared light and visible light so that an image can
still be seen in apparent darkness. The military use this technology to carry out surveillance at
night.

Dina El-Akkad 10
ICT I.G.C.S.E SECTION
1.5.3 Robotics:
They are used in car factories to weld cars bodies, spray body panels and fit items
such as windscreens.

Drones are unmanned flying devices that are used by both military and civilians.
The military have used drones in reconnaissance missions for a number of years.
Civilians use include surveying the landscape in 3-D for use with GPS, investigating
weather phenomena or search and rescue /fire fighting in natural disasters.

Robotic surgery allows surgeons to perform complex procedures with more precision.
With this technique, surgeons use robotics equipped with a camera arm and several
interactive mechanical arms.

1.5.4 Quantum cryptography:


Cryptography (encryption) is the science of making a message not understood by
hackers.

Quantum cryptography is based on the use of photons (light) and their physical
quantum properties to produce a virtually unbreakable cryptography system. This
helps protect the security of data being transmitted over fibre-optic cables. It is based
on the laws of physics rather than mathematics.

1.5.5 Computer-assisted translation (CAT):


CAT uses two tools:
 terminology databases – linguistic databases that grow and ‘learn’ from translations being
carried out.
 translation memories – these automatically insert known translations for certain words,
phrases or sentences.
While not perfect, they are certainly more accurate than existing free online translators.

Dina El-Akkad 11
ICT I.G.C.S.E SECTION
1.5.6 3-D and holographic imaging:
Holography is a technology that allows 3-D images (known as holograms to be produced).
The technology involves the use of:
 a source of laser light
 interference of light
 light diffraction, and
 light intensity recording.

As a holographic image is rotated, it appears to move in the same way as the original object, thus
appearing to be in three dimensions (3-D).

Holograms have the following applications:


 engineering design (CAD)
 architecture (ability to rotate design through 360 degrees)
 simulations
 cinema (special effects)
 gaming (special effects)
 advertising
 holographic televisions (expected by around 2025, these should give a full 3-D experience
without the need of special glasses)
 optical computers (these will operate at speeds that are trillions of times faster than current
technology computers).

1.5.7 Virtual reality:


Virtual reality is an artificial environment created by software. The user makes use of data goggles,
sensor suits, data gloves or helmets to get a feeling of reality.
Virtual is used in:
 military applications (e.g. training to use a new tank)
 education (e.g. looking inside an ancient building as part of a history lesson)
 entertainment (e.g. games where gloves, goggles or helmets are worn to give realism to the
scenario)
 engineering (e.g. seeing how new designs will look)
 media (e.g. special effects in films)
 scientific visualisation (e.g. looking at molecular structures in chemistry).

Dina El-Akkad 12
ICT I.G.C.S.E SECTION

Dina El-Akkad 13
ICT I.G.C.S.E SECTION
2.1 Input devices and their uses
An Input device is a peripheral device which accepts data and sends it to the central processing
unit.
2.1.1 Keyboards:
Most data for computers is still typed on keyboards. Most keyboards use the QWERTY layout.
Typing data takes a long time and prone to mistakes (transcription errors).

Ergonomic keyboards are designed to reduce the health-related problems associated with standard
keyboards, such as repetitive strain injury (RSI).

The Concept Keyboard use icons or phrases instead of standard letters. They are
often used in fast food restaurants to make ordering easier.

Numeric keypads are used with applications where only numeric data is to be entered.
Uses:
1. Automatic teller machines (ATMs) to key in PIN, amount of money, etc.
2. Mobile phones
3. Point-of-sale (POS) terminals in case the barcode reader fails to read the barcode
4. Chip and PIN devices when paying by credit/debit cards

2.1.2 Pointing Devices:


Mouse:
The scroll button speeds up the process of moving through a document.
Optical mouse: The movement is detected by reflected light rather than the position of a moving
ball. It is robust because it has no moving parts and it doesn’t pick up any dirt.
Cordless or wireless mouse: transmits signals to a USB wireless receiver plugged into the
computer.

Uses of a Mouse:
1. Opening, closing and minimising software.
2. Moving and deleting files.
3. Image editing, for example, controlling the size and position of a drawing pasted into a
document.
4. Controlling the position of a pointer on the screen to allow selection from a menu or an icon.

Dina El-Akkad 14
ICT I.G.C.S.E SECTION
Touch Pad:
Touch pads are common with laptop computers.

Advantages:

1. Faster than a keyboard for choosing options.

2. No need for a separate mouse which aids portability and removes the need for a flat surface.

Disadvantages:

1. People with limited hand/wrist movement find the device difficult to use.

2. Controlling the pointer with a mouse is easier.

3. Operations like drag and drop are not easy with a touch pad.

Tracker ball:
It is like an upside down mouse. The ball is rotated by the user but in this case the
‘mouse’ stays still.

Uses of a Tracker ball:


1. people with limited motor skills, e.g. young children or people with disabilities.
2. much less space is needed than the mouse so often seen with laptops.
3. used in some luxury cars to select functions such as radio.

Advantages:
1. Doesn’t need the same fine control as a mouse.
2. Easier to use than a mouse if the operator is disabled.
3. More accurate positioning of the pointer than a mouse.
4. More robust than a mouse.
5. Need less desk space than a mouse or keyboard.

Disadvantages:
1. Not supplied with computers as standard, therefore more costly.
2. User may need training since it isn’t standard equipment.

Dina El-Akkad 15
ICT I.G.C.S.E SECTION
2.1.3 Remote Control:
Uses:
1. Remote controls are used to operate TVs, video players/recorders, DVD players/recorders,
satellite receivers, HIFI music systems, data or multimedia projectors.
2. They are used in industrial applications to remotely control processes, e.g. stop and start
machines.

Advantages:
1. Remote controls enable devices to be operated from a distance, which is useful for people with
disabilities.
2. Some chemical processes are hazardous, so it is safer to operate equipment from a distance.

Disadvantages:
1. People with limited hand/wrist movement can find them hard to use.
2. The signal between the control and the device can be easily blocked.

2.1.4 Joysticks:
A joystick is similar to a mouse and a tracker ball. Whenever the stick is moved, the
cursor moves in a similar direction on the screen.
Uses of a joystick:
1. Used in video/computer games
2. Used in simulators (for example, flight simulators) to mimic actual controls.

Advantages:
1. It is easier to navigate round a screen using a joystick rather than a keyboard.
2. Control is in three dimensions.

Disadvantage:
It is more difficult to control the on-screen pointer with a joystick than with a mouse.

Driving wheel
Uses of a driving wheel:
1. Used in video/computer games (for example, car racing games)
2. Used in simulators (for example, car-driving simulators) to mimic actual controls.

Dina El-Akkad 16
ICT I.G.C.S.E SECTION
Advantages:
1. Easier than a keyboard or joystick to control steering movements; it is more natural
2. The driving experience is nearer to how an actual steering wheel operates in real life.

Disadvantage:
1. more expensive than a mouse or joystick.
2. movements in the steering can be too sensitive, giving an unrealistic feel.

2.1.5 Touch screens:


A selection is made from a menu with limited options on the screen by touching part of
it. They are useful for users not used to keyboards.

Uses of a Touch screen:


1. Interactive white boards used for education are large touch screens.
2. Touch screens are used where selections are made on screen, for example ATMs, point of sale
terminals (e.g. at restaurants), public information systems at airports, railway stations, tourist
offices.
3. Personal digital assistants (PDAs), mobile phones, tablet PCs and satellite navigation systems use
touch screens.
4. Touch screens are used in computer base training (CBT) where selections are made in answering
on screen testing.

Advantages:
1. Touch screens enable fast entry of options.
2. It is user friendly method of inputting data, so no training is necessary.
3. Touch screens are tamper proof, preventing people from keying in information which could
corrupt the computer system.

Disadvantages:
1. There is a limited number of options to choose from.
2. Using touch screens frequently can lead to RSI.
3. The screen can get very dirty with constant touching.

Dina El-Akkad 17
ICT I.G.C.S.E SECTION
2.1.6 Scanners:
Uses:
1. Scan photographs and pictures for use in desktop publishing.
2. Scan part of a design to be used with CAD.
3. Used with OCR software to recognize different characters to be used with a word processor.
4. Scan in barcodes at POS terminals.

Advantages:
1. Images can be stored for editing at a later date.
2. Much faster than typing in documents again and no typing errors.
3. It is possible to recover damaged documents and photographs using appropriate software.

Disadvantages:
1. Quality can be limited depending on the resolution of the scanner.
2. They can be fairly slow at scanning.

2.1.7 Digital Cameras:


The images are stored on a memory card (solid state memory) and can be transferred to a
computer by:
 directly reading the memory card be a card reader attached to a computer or printer
 connecting the camera to the computer using a USB port
 using wireless data transfer (Wi-Fi or Bluetooth)

Uses:
1. Digital cameras produce photographs for transfer to a computer directly or to print out by
connecting directly to a printer.
2. Many digital cameras also allow short video clips to be produced.
3. Photographs can be uploaded directly into applications software such as desktop publishers.

Advantages:
1. Easier to produce better-quality photographs than with a traditional camera.
2. Easier and faster to upload photographs to a computer.
3. There are no expensive developing costs.
4. The memory cards can store several hundred photographs.

Dina El-Akkad 18
ICT I.G.C.S.E SECTION
Disadvantages:
1. The higher the resolution the more memory is needed to store it.
2. Some cameras compress the images, reducing quality.
3. The camera user needs to be computer literate.

Video Cameras:
They are used to input moving pictures, often pre-recorded, into a computer. A video digitiser
converts an analogue video signal into a digital signal in the computer’s memory.

2.1.8 Microphone:
The input sound is converted to an analogue signal and then converted into a digital signal. The
computer’s sound card acts as an analogue to digital converter.

Uses:
1. Microphones are used to input speech for multimedia presentation software and web pages.
2. Input in voice recognition software. The software converts the speech into text that can be used
in a word processor or to input commands into a computer
3. Used as sensors to pick up sound in a burglar alarm system.
4. Used in video conferencing or Voice over Internet Protocol (VOIP)

Advantages:
1. Faster to read text than to type it using a keyboard.
2. If used in a voice-activation system, like in a car, it improves safety.

Disadvantage:
1. Voice recognition software is not as accurate as using a keyboard.
2. Sound files can use up a lot of computer memory.

2.1.9 Sensors:
A sensor is a device which inputs continuously changing physical measurements to a computer.
The information from analogue sensors needs to be converted into a digital form so computers can
understand. This is done using an analogue to digital converter (ADC).

Dina El-Akkad 19
ICT I.G.C.S.E SECTION
Sensors are used in monitoring and control applications. When monitoring, the data sent to the
computer is often transferred directly to a spreadsheet package (for example, taking measurements
in a scientific experiment, measuring atmospheric pollution, etc.).

Type of sensor Applications


Temperature Automatic washing machines, central heating systems,
automatic greenhouses, ovens
Pressure Burglar alarm systems, washing machines, robotics, environmental monitoring
Light Automatic greenhouses, automatic doors, burglar alarm systems,
street light control
Sound Burglar alarm systems, monitoring liquid and powder flow in pipes
Humidity/moisture Automatic greenhouses, environmental monitoring, factories where moisture
levels are crucial (e.g. manufacture of microchips, paint spraying)
pH Automatic green houses, chemical processes, environmental monitoring

Advantages:
1. More accurate readings taken when compared to human operators.
2. Readings are continuous – no break in monitoring.
3. Because it is a continuous process, any necessary action (control system) or warning (monitoring
system) will be initiated immediately.
4. Some processes are dangerous so it helps in preventing accidents.

Disadvantage:
Faulty sensors can give wrong results.

2.1.10 Graphics Tablet (digitisers):


A graphics tablet is used with a stylus to produce freehand drawing.
Uses:
1. Input freehand drawings.
2. In countries where the written language uses complex characters.
3. Used in CAD work.

Advantages:
1. It is possible to modify drawings before they are input.
2. They offer a very accurate method of drawing.
3. The can record levels of pressure.
Dina El-Akkad 20
ICT I.G.C.S.E SECTION
Disadvantages:
1. They are more expensive than other pointing devices such as a mouse.
2. It takes longer to produce a drawing than doing it with pen and paper.
3. Menus are often not very user-friendly.
4. Larger drawings are expensive to produce.
5. The touch screens are damaged easily.

2.1.11 Web Cameras (web cams):


A web camera is simply a digital camera that is used to capture still images and video
images. These images can then be transmitted to a computer where they are stored in a
suitable graphics format. If required, pictures can be used on a website.

Uses:
1. Chatting online.
2. Video conferencing.

Advantages:
1. They can be left on constantly, only being activated as required.
2. They allow people to keep in contact with each other without the need to travel.

Disadvantages:
1. They are often with poor quality.
2. They need to be connected to the computer.

2.1.12 Light Pens:


A light pen is a pen-shaped input device, held in the hand, which can detect the
presence or absence of light. A cursor can be moved by touching the screen with a
light pen.

Uses:
1. Light pens are used for selecting objects on CRT screens.
2. Drawing applications where a graphics tablet might be too big.

Advantages:
1. Greater accuracy than touch screens.

Dina El-Akkad 21
ICT I.G.C.S.E SECTION
2. Small so can be used where space is an issue.
3. Easy-to-use technology.

Disadvantages:
1. Problems with lag when drawing on screen.
2. Only work with CRT monitors.
3. Not that accurate when drawing.

2.2 Direct data entry (DDE) Devices


2.2.1 Devices for reading information from cards
Magnetic Strip(e) readers:
The stripe contains useful information, for example: account number, sort code, expiry
date and start date.

Uses:
1. Credit and debit cards have magnetic stripes that are used by ATMs or EFTPOS (electronic funds
transfer point of sale) terminals.
2. Security cards for entry to buildings, hotel rooms, etc.
3. Train and underground tickets use magnetic stripes.

Advantages:
1. Information can be input into the system quicker than typing.
2. More accurate than typing data manually.
3. Data is hidden from sight with a stripe, so is more secure than a printout.
4. Prevents access to restricted/secure areas.
5. Magnetic stripes are unaffected by oil, water, moisture, etc.
6. No moving parts – so physically very robust.

Disadvantages:
1. If the magnetic stripe get damaged (e.g. due to exposure to a strong magnetic field or excessive
use) the data is lost.
2. The card needs to be in close contact with the reader.
3. The information is not human readable.

Dina El-Akkad 22
ICT I.G.C.S.E SECTION
Contactless card readers:
Contactless debit or credit cards allow customers to pay for items worth up to $25 without entering
their PIN.

Advantages:
1. Faster transaction
2. Customers do not have to worry about incorrectly typing the PIN.
3. Retailers no longer have access to the customer’s credit/debit card information.

Disadvantages:
1. They are more expensive than normal credit/debit cards.
2. Can take money twice if the customer uses it as a chip and PIN card.
3. Transactions are usually limited to a small maximum value.
4. Transactions have been carried out without the card holder being aware of this while they were
just standing in the payment queue.

Chip and PIN reader:


These are a type of smart card readers, but tend to be used at EFTPOS terminals. They are
similar to the contactless system, except for two points:
1. The customer has to key in their PIN to make a transaction.
2. The cards do not make use of RF technology.

Uses:
Chip and PIN readers are used where payments are made using cards.

Advantages:
1. They allow secure transactions to take place, as without the PIN the transaction cannot proceed.
2. Chips are more robust than magnetic strips since the chip does not need to be in contact with the
reader.

Disadvantages:
1. If the customer forgets their PIN, the transaction has to be cancelled.
2. The card holder can be seen entering the PIN code.

Dina El-Akkad 23
ICT I.G.C.S.E SECTION
2.2.2 Radio frequency identification (RFID) readers
The RFID tag is made up of two components:
 A microchip that stores and processes information
 An antenna that is used to receive and transmit data.

Uses:
1. Livestock tracking
2. Retail – several tags can be read at the same time, thus speeding up the checkout process.
3. Admission passes
4. Libraries – books can be tracked in and out automatically by readers at the library entrance.

Advantages:
1. The tags can be read from a distance.
2. It is a very robust and reliable technology.
3. Very fast read rate.
4. Bidirectional data transfer.
5. Bulk detection is possible.

Disadvantages:
1. Tag collision
2. Radio waves are easy to jam or interrupt.
3. It is easy to hack into the data.
4. RFID is more expensive than barcode system.

2.2.3 Magnetic Ink Character Recognition (MICR)


MICR is a system that can read characters oriented in a special ink.

Uses of MICR:
MICRs are used to process cheques in banking operations. The cheques are gathered
together and then read using a batch processing method.

Advantages of MICR:
1. Cheques are difficult to forge.
2. Cheques can be read even if they have been overwritten.
3. There is no manual input, thus errors are reduced.

Dina El-Akkad 24
ICT I.G.C.S.E SECTION
Disadvantages of MICR:
1. The equipment needed is very expensive.
2. Only certain fonts are accepted.

2.2.4 Optical Mark Recognition/Reader (OMR):


An OMR is used to input pen or pencil marks on a form. The position of the mark is stored in the
computer’s memory after being read by the OMR device.

Uses of OMR:
1. Multiple choice examination papers correction.
2. School registration forms.

Advantages:
1. No time wasted in typing.
2. More accurate than keying in the data.
3. OMR is more accurate than OCR.

Disadvantages:
1. The forms need to be carefully designed.
2. Forms are sometimes difficult to be filled.

2.2.5 Optical Character Recognition/Reader (OCR)


Optical character recognition (OCR) is the name given to software that takes scanned
text and converts it into a computer readable form.
Uses:
1. processing of passports and identity cards.
2. scanning in documents so that they can be modified using a word processor package.

Advantages:
1. No time wasted in typing.
2. More accurate than keying in the data.

Disadvantages:
1. The system still has difficulty reading handwriting.
2. It is still not a very accurate technique.

Dina El-Akkad 25
ICT I.G.C.S.E SECTION
2.2.6 Bar code readers:
The bar code readers are usually in the form of a barcode scanner and are often
built into POS terminals in supermarkets. Hand-held scanners or wands are used
if portability is required.

Uses of bar codes:


1. Printed on goods in supermarkets.
2. To identify library books.
3. Luggage handling systems in airports.

Advantages of using bar codes:


1. No repeated typing of prices so eliminates typing errors and wrong pricing.
2. No time wasted in typing so no long queues.
3. An itemized receipt is produced without having to type item description.

Disadvantages of using bar codes:


1. Relatively expensive system to administer.
2. Can be more easily damaged than RFID tags or magnetic strips.
3. Only numbers can be coded in this way.

Quick Response (QR) codes


Normal bar codes can hold up to 30 digits, QR codes can hold over 7000 digits.
Advantages:
1. There is no need for a user to write down or key in a website address.
2. QR codes can store URLs that appear in magazines, trains, buses or even business
cards, providing a very effective method of advertising.

Dina El-Akkad 26
ICT I.G.C.S.E SECTION
2.3 Output Devices and their uses
Output devices provide results in a suitable form after data processing. In many cases this will be
in the form of a hard copy (e.g. printed paper from a printer) or soft copy (e.g. output on a screen).

2.3.1 Monitors:
CRT (Cathode Ray Tube) Monitors:
CRT monitors use an electron gun to fire against a phosphor screen, which creates a picture that is
made up of tiny dots. Each dot is coloured red, green or blue - the intensity of each coloured dot
makes up the vast range of colours interpreted by the eye.

Uses:
1. Where space is not a problem.
2. They are used with light pens to allow designs to be created on screen.
3. Where more than one user may need to view screen simultaneously such as in design use, e.g.
when several designers may need to offer suggestions on a prototype.

Advantages:
1. The angle of viewing is still better than with most TFT monitors.
2. They work with light pens in CAD/CAM applications.

Disadvantages:
1. They are heavy and present a safety hazard if not supported properly.
2. They run very hot and can cause fires.
3. They consume more power than modern TFT monitors.
4. They can flicker, which can lead to headache and eyesight problems with prolonged use.

TFT (Thin Film Transistor) Monitors:


The screen is made up of thousands of tiny pixels, which are made up of transistors controlled by a
microprocessor. Each pixel has three transistors, coloured red, green or blue.

Uses of TFT monitors:


1. laptops.
2. small offices where space is limited.

Dina El-Akkad 27
ICT I.G.C.S.E SECTION
Advantages:
1. TFT monitors are lighter in weight.
2. They produce less glare and also emit less radiation.
3. They consume much less power and do no generate as much heat.
4. TFT monitors saves a lot of desk space.

Disadvantage of TFT over CRT:


1. The image appears unclear when viewed from the side.
2. The definition is sometimes not as good as CRT monitors.

IPS (In-Plane Switching)/LCD monitors:


IPS technology is the highest performance panel technology available for LCD displays. The
specifications and details of IPS panel technology are considered best for high accuracy in colour,
contrast, and wide viewing angles.

LCD (Liquid Crystal Diode) and LED (Light Emitting Diode) monitors:
Modern LCD monitors are backlit using LED technology. This gives the image better contrast and
brightness.
LEDs have become popular because:
1. LEDs reach their maximum brightness almost immediately.
2. LEDs give a whiter light, which sharpens the image and makes the colours appear more vivid.
3. Monitors using LED technology are very thin.
4. LEDs last almost indefinitely.
5. LEDs consume very little power.

2.3.2 Multimedia Projector:


It displays data from computers, pictures from televisions and video/DVD
recorders. Multimedia projectors usually work with a remote control, but can
also use a cordless mouse.

Uses:
1. training presentations,
2. advertising presentations,
3. home cinema systems.

Dina El-Akkad 28
ICT I.G.C.S.E SECTION
Advantages:
1. They enable many people to see a presentation rather than all of them crowding round a small
computer screen.
2. They avoid the need for several networked computers.

Disadvantages:
1. Images can sometimes be fuzzy.
2. They are expensive to buy.
3. Setting up projectors can be little difficult.

2.3.3 Printers:
Laser Printer:
They rely on large buffer memories where the data for the whole document is stored
before the pages can be printed out,

Uses:
1. Most networked systems: low noise.
2. Most offices and schools: rapid, high quality and high volume of output.

Advantages of Laser printers:


1. They are very fast.
2. They give very high quality output.
3. They can handle very large print jobs.
4. Toner cartridges last for a long time, so laser printers can be a cost effective option if colour
outputs are not required.

Disadvantages of Laser printers:


1. Only really fast if several copies are being made.
2. Colour laser printers are expensive to run.
3. They produce ozone and volatile organic compounds that have been linked to health hazards in
the office.

Dina El-Akkad 29
ICT I.G.C.S.E SECTION
Inkjet Printer:
Inkjet printers don’t have large buffers, therefore printing is done bit by bit.

Uses of Inkjet printers:


1. They are used in applications which require portability and low volume output and changing
cartridges is not an issue, e.g. small offices.
2. They are used in applications which requires very high quality output and where speed is not an
issue, e.g. Digital camera applications.
3. 3-D inkjet printers are used in industry to produce prototypes.

Advantages of Inkjet printers:


1. They are cheaper to buy than laser printers.
2. The output is of high quality.
3. They are lightweight and take up little space.
4. They do not produce ozone and volatile organic compounds, unlike laser printers.

Disadvantages of Inkjet printers:


1. They are quite expensive to run, because the ink cartridges are expensive to buy.
2. The output is slow if several copies are needed, as there is a little buffer capacity to store the
pages.
3. Can’t do large print jobs because ink cartridges run out too quickly.

Dot matrix Printer:


They are impact where a print head presses against an inked ribbon.

Uses:
1. in noisy environments and in applications where print quality is not that important.
2. where multi-part stationery is used. For example, wage slips.

Advantages:
1. They are robust printers so can be used in dusty, dirty or moist atmospheres.
2. Carbon copies or multi-part outputs can be produced.
3. They are very cheap to run and maintain.
4. They are easy to use if continuous stationery is required such as wage slips.

Dina El-Akkad 30
ICT I.G.C.S.E SECTION
Disadvantages:
1. They are very noisy and so not good in an office environment.
2. They cost more than an inkjet to buy.
3. They are very slow and the printing is of poor quality.

3-D Printers:
3-D printers are primarily used in CAD applications. 3D printing is regarded as being possibly the
next ‘industrial revolution’ since it will change the manufacturing methods in many industries.
They are based on inkjet and laser technology and can produce solid objects which actually work.
The solid object is built up layer by layer using materials such as powdered resin, powdered metal,
paper or ceramic powder.

The following describes some of the features of 3D printing:


 Various types of 3D printers exist; they range from the size of a microwave oven up to the size
of a small car.
 3D printers use addidtive manufacturing (i.e. the object is built up layer by layer.
 Direct 3D printing uses inkjet technology; a print head can move left to right as in a normal
printer. However, the print head can also move up and down to build up the layers of an object.
 Binder 3D printing is similar to direct 3D printing. However, this method uses two passes for
each of the layers; the first pass sprays dry powder and then on the second pass a binder (a type
of glue) is sprayed to form a solid layer.
 Newer technologies are using lasers and UV light to harden liquid polymers; this further
increases the diversity of products which can be made.

Uses:
1. prosthetic limbs made to exactly fit the recipient
2. items to allow precision reconstructive surgery (e.g. facial reconstruction following an accident);
the parts made by this technique are more precise in their design since they are made from exact
scanning of the skull
3. in aerospace, manufacturers are looking at making wings and other parts using 3D technology;
the bonus will be lightweight precision parts
4. in fashion and art – 3D printing allows new creative ideas to be developed
5. making parts for items no longer in production, e.g. suspension parts for a vintage car.

Dina El-Akkad 31
ICT I.G.C.S.E SECTION
2.3.4 Speakers:
Speakers can be connected directly to a computer or are built into the monitor
or casing (as in a laptop computer). They output sounds that are produced by,
or have been stored on, the computer. Digital data from the computer is
converted into analogue form using a digital to analogue converter (DAC). The signal is then
amplified through the speakers.

Uses:
1. Speakers are required to play sound files attached to multimedia presentations and websites.
2. Speakers are used with home entertainment systems.
3. They can help blind people (together with speech generation software) through audio output of
text on the screen.
4. They are used to play downloaded sound files.

2.3.5 Control applications:


Control devices are used to control processes in conjunction with sensor input devices.
Actuators
Actuators are transducers and are used to take signals from a computer and convert them into some
form of motion, for example operating motors. Conversion of the digital signals form the computer
to analogue is required (using a DAC).

Motors
The motor is turned on or off by the actuator.
Uses:
1. Motors are used in many domestic appliances, such as automatic washing machines, cookers,
water pumps in central heating systems and automatic greenhouses to open windows and switch
on fans.
2. In industry, they are used to control robot arms.
3. In computers, they operate fans, disk drives and DVD drives.

Buzzers:
The buzzers are switched on or off by the actuator.
Uses:
1. Buzzers are used in cookers and microwave ovens to tell the operator when the cooking process
is complete.
2. They are used in burglar alarm systems to warn if intruders are present.
Dina El-Akkad 32
ICT I.G.C.S.E SECTION
Lights:
The actuator is connected to the switch that turns the lights on or off.
Uses:
1. They are used for security lights.
2. Lights are used in greenhouses to control the lighting conditions.

Heaters:
Actuators are connected to switches which turn the heater on or off.
Uses:
1. Automatic washing machines to heat up water.
2. Automatically control the temperature in an oven.
3. Control the heating in a central heating system.
4. Temperature control in an automatic glasshouse.

Dina El-Akkad 33
ICT I.G.C.S.E SECTION

Dina El-Akkad 34
ICT I.G.C.S.E SECTION
3.1 Backing up data:
3.1.1 What is a Backing up of data?
Backing up refers to the copying of data to a different medium. Backing up data should be regular.
Many computer systems can be set to backup files automatically on a regular basis.
Cloud storage companies use magnetic tapes or hard disk drives to backup clients’ data on a regular
basis.
The backups are often stored in a different place to the main storage.

3.1.2 Why Back up data?


 To safeguard against loss of data due to failure of the original secondary storage device due to
hardware failure, problems caused by files being overwritten accidentally or possible corruption
of files.
 To safeguard against damage caused by hackers.
 Backups are also made in case the files need to be used elsewhere; this protects the originals
against possible corruption or loss.
 Backups don’t guard against the effect of a virus.

3.2 Types of access:


3.2.1 Serial access: The process of locating a record by reading through all the previous records so
slow.
It is used in applications where speed of access isn’t important. For example, in utility biling,
clearing bank cheques or producing pay slips.

3.2.2 Direct access (Random access): Storing or retrieving data items without the need to read
through any other stored data items so fast.
It used in applications where data access is vital. For example, in real-time operations such as
controlling a chemical plant or online systems such as booking air tickets.

3.3 Secondary storage media:


Secondary storage devices ensure that data is stored permanently so that it can be used again at a
later date.
Storage sizes or file sizes are measured in kilobytes, megabytes, gigabytes and terabytes.

1KB = 103 bytes 1MB = 106 bytes 1GB = 109 bytes 1TB = 1012 bytes

Dina El-Akkad 35
ICT I.G.C.S.E SECTION
3.3.1 Magnetic Storage Media
Fixed/internal Hard disk drive (HDD):
Uses:
1. Storing operating system.
2. Storing application software, e.g., spreadsheets.
3. On-line and real time processes requiring direct access, e.g., booking air-line tickets, robots, etc.
4. Used in file servers with computer networks.

Advantages:
1. They have very fast data transfer rate and fast access times to data.
2. They have very large memory capacities.

Disadvantages:
1. They can be easily damaged if he correct shut down procedure is not carried out.
2. Their read/write operation can be quite noisy compared to SSDs.
2. They lack portability

Portable Hard discs:


Uses:
1. Portable hard disks can be used as back-up systems to prevent loss of data.
2. They can be used to transfer data, files and software between computers.

Advantages:
1. They have very fast data transfer rate and fast access times to data.
2. They have very large memory capacities.
3. They can be used as a method of transferring information between computers.

Disadvantages:
They can be easily damaged if dropped. Also, incorrect shut-down procedure could lead to loss of
data.

Dina El-Akkad 36
ICT I.G.C.S.E SECTION
Magnetic Tapes:
Uses:
1. Tapes are used in a variety of batch processing applications such as clearing bank cheques, utility
billing and producing payslips.
2. Tapes are used for backups of file servers for computer networks.
3. Used in long term archiving of data.

Advantages:
1. They are less expensive than the equivalent-capacity hard disk.
2. It is a very robust technology.
3. They have a huge data storage capacity.
3. The data transfer rate is fast.

Disadvantages:
1. Access time is very slow.
2. When updating another tape is needed.
3. They are affected by magnetic fields.

3.3.2 Optical storage media:


a) CD/DVD disks:
CDs (Compact Discs) are used for files smaller than1Gb such as music and general animation.
DVDs (Digital Versatile Discs) are used to hold very large files (several Gb) such as movie films.
Both CDs and DVDs are portable and can store computer data. They have high storage capacity so
produce high quality pictures and sound needed with multimedia applications.
DVDs have higher storage capacity than CDs.

CD ROM / DVD ROM:


Data can only be read from the discs.

Uses:
1. CD-ROMs are used to store music files, software, computer games and encyclopaedias
2. DVD-ROMs have much larger storage and are used to store films and arcade games.
3. CD-ROMs and DVD-ROMs are used in applications where there is a real need to prevent the
deletion or overwriting of important data.

Dina El-Akkad 37
ICT I.G.C.S.E SECTION
CD R / DVD R:
Disks can be written to only once.

Uses:
1. They are used for home recordings of music (CD-Rs) and films (DVD-Rs).
2. They are used to store data to be kept for later use or to be transferred to another computer.
3. They are used in applications where it is necessary to prevent the deletion or overwriting of
important data.

Advantages:
1. Cheaper than RW disks.
2. Once burned they are like a ROM.

Disadvantages:
1. Disks can only be recorded once, so if an error occurs then the disk has to be thrown away.
2. Not all CD/DVD players can read CD-R/DVD-R.

CD RW / DVD RW:
Disks can be updated.

Uses:
1. They are used to record radio and television programmes, but can be recorded over time and time
again.
2. They are used in closed circuit television (CCTV) systems.

Advantage:
Can be written over many times.

Disadvantages:
1. Can be relatively expensive.
2. It is possible to accidently overwrite data.

Dina El-Akkad 38
ICT I.G.C.S.E SECTION
b) DVD RAM:
Same properties as DVD RW but quicker access and data can be overwritten more easily.

Uses:
1. Recording devices such as satellite receivers.
2. In some camcorders to record movies

Advantages:
1. They have a greater capacity than CD/DVDs.
2. Writing and reading can occur at the same time.
3. They can be overwritten more times compared with the RW format.
4. Long life – about 30 years.
5. No need to finalise the disk.

Disadvantages:
1. They are not compatible with most DVD players.
2. They are more expensive than other types of DVD media.
3. They have been superseded by newer technologies such as solid state memories.

c) Blu-ray:
Blu-rays are used for storing films (movies). 25Gb equates to 2 hrs HDTV, 13hrs standard
definition TV. It is possible to playback video on a disc while simultaneously recording HD video.

Uses:
1. Home video consoles
2. Storing and playing HD movies
3. Used in many camcorders
4. Will be used for storage of PC data or backing up hard drives.

Advantages:
1. Largest storage capacity of optical media (25 Gb, 50 Gb, 100 Gb).
2. Data transfer rates are high.
3. Access speeds are higher with blu-ray players than with other optical devices.
4. Blu-ray discs automatically come with a secure encryption system, which helps to prevent piracy.

Dina El-Akkad 39
ICT I.G.C.S.E SECTION
Disadvantage:
1. Relatively expensive.
2. There are fewer movie titles on blu-ray format.

3.3 Solid state storage media:


Solid State Drives (SSD)
Solid state drives (SSD) are rapidly taking over from HDDs.

Advantages:
1. They are more reliable (no moving parts to go wrong)
2. They are lighter (which makes them suitable for laptops)
3. They have a lower power consumption.
4. They run much cooler than HDD
5. They are very thin.
6. Data access is faster than HDD.

Disadvantage:
Most solid state storage devices are rated at only 20GB write operations per day over a three-year-
period – this is known as SSD endurance.

Memory Sticks/ Pen drives:


They can store up to several gigabytes of data. They are connected to a
computer through the USB port and power to operate them is drawn from
the host computer.

Uses:
1. They are used to transport files from computer to computer. USB Pen drive

2. They are used to take backups of data.


3. They are used as a security device - a dongle - to prevent software piracy.

Advantages:
1. Very compact and portable media.
2. Very robust.
3. Doesn’t need additional software to work on most computers.
4. They are not affected by magnetic media.

Dina El-Akkad 40
ICT I.G.C.S.E SECTION
Disadvantages:
1. Can’t write protect the data.
2. Easy to lose.
3. The user needs to be very careful when removing a memory stick from a computer.

Flash memory cards:


Uses:
1. Storing photos on digital cameras.
2. Used in mobile phones to store phone numbers, photographs, etc.
3. They are used in MP3 players to store music. Digital camera Flash memory card
4. Used as a backup store in hand-held computer devices.

Advantages:
1. Very compact and portable media.
2. Very robust.

Disadvantages:
1. Expensive per gigabyte of memory compared to hard disk drives.
2. Have a finite life regarding the number of times they can be read from or written to.
3. Have a lower storage capacity than hard disks.

Dina El-Akkad 41
ICT I.G.C.S.E.

Dina El-Akkad 42
ICT I.G.C.S.E.
A network is a series of computer systems that are linked together so that they are able to share
computing power or storage facilities. The link may be between computers in the same building or
between computers in different parts of the country or even in different parts of the world.

4.1 Networks:
4.1.1 Network devices:
Modems
A modem (modulator demodulator) is a device that converts a computer’s digital signal into an
analogue signal for transmission over an existing telephone line and back again.
Dial-up modems operate at transmission speeds of about 60 kilobits per second, which is extremely
slow.
Modem broadband or ADSL (asymmetric digital subscriber line) modems operate at up to 100
Mbits/second when using fibre-optic cables and 20 Mbits/second when using copper cables.
ADSL modems allow telephone conversations and internet traffic to occur at the same time because
of the of the wide bandwidth signal used.
Cable modems allow cable television providers to offer internet access as well as receiving
television signals.

Hubs:
A hub is a device that can have a number of other devices or computers connected to it
to form a LAN. It does not read any of the data in the packets which arrive from a computer, but
just sends them on to all the computers on the network, including the one that sent it. Using a hub
is not a very secure or efficient method of data distribution.

Switches:
Switches connect a number of devices together to form a LAN. Switches are
able to look at a data packet, target the computer for which it is intended, and send it. This helps to
speed up data transmission in a network. Each device has a media access control (MAC) address
which identifies it uniquely. Data packets sent to switches will have a MAC address identifying the
source of the data and additional address identifying each device that should receive the data.

Bridges:
Bridges are devices that connect one LAN to another LAN that uses the same protocol. A large
network can get very busy. A bridge allows a large network to be segmented and stops unnecessary
traffic being passed around the network.

Dina El-Akkad 43
ICT I.G.C.S.E.
Routers:
Routers enable data packets to be routed between the different networks to join a LAN to a WAN.
Broadband routers sit behind a firewall.
The router’s main function is to transmit internet and transmission protocols between two networks
and allow private networks to be connected together.
Packets of data contain the following information:
 header to identify the data packet
 the sender’s IP address
 the receiver’s IP address
 how many data packets make up the whole ‘message’
 the identity number of each packet

When a router receives a packet of data, it checks the destination IP address against the stored
routing table. The routing table stores the MAC address of the device, the assigned IP address and
the lease time the IP address is assigned for. The bits forming the destination IP address in the data
packet are used to point to the correct route. The packet is sent to a number of routers until it
reaches its final destination.

Other hardware
Gateways:
A gateway is a network point (or node) that acts as an entrance to another network. If a network
node needs to communicate outside its network, it needs to use a gateway.

Network Interface Card (NIC):


The NIC enables the computer to link to the cable or to radio waves used to communicate across the
network. It is usually part of the device and contains the MAC address.

Network cables
Network cables have the following advantages over Wi-Fi:
 faster data transfer rates
 can be more secure than wireless networks.

Dina El-Akkad 44
ICT I.G.C.S.E.
4.1.2 Internet Protocol (IP) and Media Access Control (MAC) addresses:
Each device on the internet is assigned for each internet session by the ISP a unique address known
as IP address.
The IP address gives the location of a device on the internet whereas the MAC address identifies the
device connected to the internet.

4.1.3 Wi-Fi and Bluetooth:


Wi-Fi:
A wireless transmitter (WAP) receives information from a network via its connection (e.g. a
broadband connection if the internet is used). This transmitter converts the received information
into radio waves and then transmits them.
A device (e.g. a computer) receives the radio waves via an installed wireless adaptor which allows it
to download the information from the data source.
A Wi-Fi enabled device can access the internet wirelessly at any access point (AP) or hotspot up to
100 m away.

Bluetooth:
Bluetooth sends and receives radio waves in band of 79 different frequencies (known as channels).
Devices using Bluetooth automatically detect and connect to each other. Each communicating pair
uses different channel.
Bluetooth creates a secure Wireless Personal Area Network (WPAN) based on key encryption.

Uses of Bluetooth:
 when transferring data between two or more devices that are very close together (<30 meters
distance)
 When the speed of data transmission is not critical
 For low-bandwidth applications (for example, when sending music files from a mobile phone to
a headset).

Features Bluetooth Wi-Fi


Transmission frequency used 2.4 GHz 2.5, 3.6, 5.0 GHz
Data transfer rate (maximum) 25 Mbits/second 250 Mbits/second
Maximum effective range (meters) 30 m 100 m
Maximum number of devices Up to 7 Depends on the router used
connected

Dina El-Akkad 45
ICT I.G.C.S.E.
4.1.4 How to set up and configure a small network:
 Purchase of software and hardware (switches, network cables, a router, a firewall, servers, etc)
 Set up an IP account if internet access is required
 Set up the system to allow wireless connectivity
 Configure all the hardware and software
 Ensure a high-speed broadband connection exists
 Put the common software onto a server and ensure that the network licence allows network users
to use the software
 Set up privileges so that each user can only access their own area or common shared area
 Set up a network-manager-level of privilege to monitor network usage, change passwords, etc.

4.1.5 Internet, Intranets and extranets:


Internet:
The Internet is an international network of computers that allows users to use email, browse the
World Wide Web or to chat either by text or by voice.
The world wide web (WWW or web) is the part of the Internet which the user can access by way of
a web browser. A web browser is a software that allows the user to display and interact with pages
and files from the web. To find anything you need the help of a program called a search engine
which searches incredibly quickly through the Internet to find websites that contain information
about what you have asked for. The website shows hyperlinks to allow users to navigate between
webpages.

Each webpage has a unique address that helps web browsers to find them. The address is known as
the Uniform Resource Locator (URL).

Internet service provider (ISP)


An ISP is a company that provides users with access to the Internet, usually for a fee.

There are three common ways of accessing the internet offered by service providers:
 dial-up access
 cable internet access
 digital subscriber line (DSL) (broadband) internet access.

Dina El-Akkad 46
ICT I.G.C.S.E.
Intranet:
Many companies use an Intranet as well as the Internet. An Intranet is ‘a computer network based
on internet technology that is designed to meet the internal needs for sharing information within a
single organisation.

Intranets reside behind a firewall and are only accessible:


 internally to members of the company, or
 to people given various levels of access who are external to the company.

There are a number of reasons for adopting Intranets rather than using the Internet:
 It is safer since there is less chance of external hacking or viruses.
 It is possible to prevent employees from accessing unwanted websites
 Companies can ensure that the information available is specific to their needs.
 It is possible to create extranets that allow intranets to be extended outside the organisation but
with the same advantages as an intranet.

It is now worth comparing the Internet with Intranets:


 The term ‘Internet’ comes from the phrase International Network.
 The term ‘Intranet’ comes from the phrase Internal Restricted Access Network.
 An Intranet is used to give local information relevant to the company whereas the Internet
covers topics of global interest.
 It is possible to block out certain Internet sites using an Intranet. This is much more difficult to
do from the Internet.
 An Intranet requires password entry and can only be accessed from agreed points, whereas the
Internet can be accessed from anywhere provided the user has an ISP account.
 An Intranet is behind a firewall, which gives some protection against hackers, viruses and so on.
This is much more difficult to do with Internet access since it is more open on an international
scale.
 The Internet can be public access, whereas Intranets tend to be private access.

Dina El-Akkad 47
ICT I.G.C.S.E.
4.1.6 LANs and WANs:
Local Area Networks (LANs):
These systems are usually within one building. Computers and devices are connected to hubs or
switches.
Advantages:
1. Sharing of resources (such as expensive peripherals and applications software).
2. Ease of communication between users.
3. A network administrator to control and monitor the network (e.g. change passwords, monitor
internet use, etc.).

Disadvantages:
1. Easier spread of viruses.
2. Printer queues can be frustrating.
3. Slower access to the internet.
4. Increased security risks when compared to stand-alone computers.
5. If the main server breaks down, the network will no longer function.

Wireless Local Area Networks (WLANs):


A WLAN behaves like a LAN but has no wires or cables. This gives users the mobility to move
around within a broad coverage area and still be connected to the network.
Because of the limited range, most commercial LANs need several Aps.
Advantages:
1. All computers can access the same resources such as printers from anywhere within range of the
Aps.
2. As there is no cabling there is a safety improvement and increased flexibility.
3. Adding new computers and devices is easy and the cost is reduced since extra cabling isn’t
needed,

Disadvantages:
1. Security can be a big issue since the signal can be picked up.
2. There may be problems of interference, which can affect the signal.
3. The data transfer rate is slower than in wired LAN.

Dina El-Akkad 48
ICT I.G.C.S.E.
Wide Area Network s (WANs):
The computers and terminals forming part of the network can be spread around the world. External
communication links such as satellites, microwaves or telecommunication links are used to connect
the network. The connection must normally be paid for because the links are external.

4.1.7 Accessing the Internet:


Mobile phones and tablets:
Advantages of using mobile phones:
 Very portable
 A person is more likely to have a mobile phone all times
 It is easy to use a mobile phone while on the move

Disadvantages of using mobile phones:


 Expensive to use if Wi-Fi hot spot not available
 The displays on mobile phones are smaller than on other devices
 Keyboards are very small
 Not all websites are mobile-friendly
 Signal less likely to be as stable or reliable as wired system

Laptops and Desktop computers:


 The screen size of laptops is usually bigger than a mobile but it is not usually as large as that on a
desktop computer.
 Laptops and desktops require expensive dongles to access phone networks.
 Processors used in laptops are not usually as powerful as those in desktops, so access speed is
not as quick.
 Laptops are more mobile than desktops but heavier and less portable than tablets or mobile
phones.
 Touchpads on laptops are not as easy to use as a mouse when navigating web pages, but much
easier than mobile phones.
 The keyboards on laptops are not as easy to use as a desktop but are much better than those on a
mobile phone.
 Desktops usually have a more stable and reliable Internet connection since they use a wired
system rather than Wi-Fi.

Dina El-Akkad 49
ICT I.G.C.S.E.
4.2 Network issues and communication:
4.2.1 Network Security:
Should the internet be policed?
Arguments is favour of some form of control
 It would help to prevent illegal material being posted on websites.
 Most of the information can be found in books but it is much easier to find the information using
a search engine.
 It would prevent children being subjected to undesirable websites.
 It would help to stop incorrect information being published on websites.

Arguments against some form of control


 Material published on the internet is already available from other sources.
 It would be very expensive to 'police' all the websites.
 Policing can go against freedom of information.
 It would be difficult to enforce rules on a global scale.
 Laws already exist to deal with those who post illegal material/comments on websites.

Reliability of Information from the Internet:


√ Information is more likely to be up to date than in books, since websites can be updated very
quickly.
√ It is much easier to get information from websites using search engines.
√ There is a vast amount of information on the Internet.
x Information on the Internet may be incorrect, inaccurate or even biased since it does not go
through any checking process.
x It is possible to get thousands of hits, which may make it difficult to find the information
relevant to the user’s search.

Undesirability of certain websites


 There is a risk of finding undesirable websites.
 There is a risk doubtful websites which are not genuine and could lead to a number of problems
such as undesirable web links, security risks, etc.
 Security risks are a very large problem.

Dina El-Akkad 50
ICT I.G.C.S.E.
Security issues:
Ways of protecting passwords:
 Run anti-spyware software
 Change passwords regularly
 Passwords should not be easy to guess. Strong passwords should contain:
o at least one capital letter
o at least one numerical value
o at least one other keyboard character (such as @, &)

4.2.2 Authentication:
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Some forms of authentication include:
 user IDs and passwords

 digital certificates
A digital certificate is a pair of files stored on a user’s computer – these are used in the security
of data sent over the internet. Each pair of files is divided into a public key and a private key.

 biometrics
Biometrics relies on certain unique characteristics of human beings; examples include:
fingerprint scans, signature recognition, retina scans, iris recognition, face recognition, voice
recognition.

 magnetic stripe cards - contactless cards - ID cards with holographic image


Many passports contain an RFID tag/chip, a photograph and a holographic image.

4.2.3 Viruses:
A virus is a self-replicate program that corrupts a computer system. A virus attaches itself to files,
leading to:
 computer crashes
 loss of files - system files when lost computer malfunctions.
 corruption of the data stored on files.

Dina El-Akkad 51
ICT I.G.C.S.E.
Antivirus software:
 they check software or files before they are run or loaded on a computer.
 antivirus software compares a possible virus against a database of known viruses.
 they check software for types of behaviour that could indicate a possible virus (heuristic
checking)
 any possible files or programs that are infected are put into quarantine.
 antivirus software needs to be kept up to date.
 Full systems checks need to be carried out regularly.

Avoiding viruses when accessing the internet


 Avoid unknown or suspicious-looking websites.
 Look for security indicators such as https or the padlock symbol.
 Don’t open emails from unknown sources.

Viruses from hardware devices:


It is possible to pick up viruses from any device plugged into your computer.

4.2.4 Data Protection Act (DPA):


1. Data must be fairly and lawfully processed.
2. Data can only be processed for the stated purpose.
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject’s rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they also have adequate protection.

Dina El-Akkad 52
ICT I.G.C.S.E.
4.2.5 Network Communication:
Emails and Faxes:
Electronic mail is a method of sending messages from one terminal to another via a
communication link.
Advantages of using e-mail:
1. Message sent instantaneously.
2. The same message can be sent to many recipients at the same time.
3. No need to leave house to send e-mail.
4. E-mails can be read from any location.
5. Replies to e-mails are quick.
6. Can send file attachments.
7. Low cost, since stamps, paper and envelopes are not needed.

Disadvantages of using e-mail:


1. Spam forms 85% of all e-mails in the world.
2. Might pass on viruses.
3. Cannot send physical objects.
4. Have to have a computer with an Internet connection.
5. Cannot send original of signatures.

Faxes (Facsimile):
i) Physical fax:
A fax machine is like a long distance photocopier. The document is put into the fax machine at one
end and a copy comes out of a fax machine at the other end. The original is first scanned with a
beam of light and then converted into electronic signals that can be passed along telephone lines.

ii) Electronic faxing:


Electronic faxing makes use of computer technology and the internet.

Comparison of traditional faxes and emails:


Traditional faxes:
 Can be seen by anyone in the company.
 Signatures on faxes are accepted legally.
 If the telephone line is busy a fax cannot be sent.
 Slow process if several documents are to be sent, since each document needs to be scanned
before it is transmitted.

Dina El-Akkad 53
ICT I.G.C.S.E.

Emails:
 More secure than faxes because password protected.
 No need to print the document so saving cost and environmentally friendly.
 The document is usually of a better quality
 Documents received in emails can be modified
 It is much easier to send to multiple recipients at the same time
 People are more likely to have access to email accounts than a fax machine

Video conferencing is a communication method that uses both video and sound. It is carried out in
real time and makes use of some form of network. The basic hardware includes:

Hardware needed:
 Microphones
 Web Cams
 Speakers
 Large monitors/television screens

Software needed:
 Webcam and microphone software drivers
 CODEC: coder–decoder or compression-decompression
 echo cancellation software.
Advantages of Video conferencing:
1. Conferences can be called at short notice.
2. Cost is reduced:
 Reduced travelling costs
 No need to pay for hotel accommodation
3. Don’t have to carry documents to conference.
4. Employees will not travel to unsafe places around the world.

Disadvantages of Video conferencing:


1. Delays when talking.
2. People like personal contact.
3. Time differences between countries is an issue,
4. Training people to use the system correctly can be costly and time consuming.
5. Can be very expensive to set up.
Dina El-Akkad 54
ICT I.G.C.S.E.
Audio conferencing:
Audio conferencing refers to meetings held between people using audio equipment. The equipment
used can be the telephone , a computer, (with built-in microphones and speakers) or an internet
phone.
Phone conference is audio conferencing done over the telephone network.

Voice over Internet protocol (VOIP) is a method used to talk to people using the Internet. One of
the big advantages is that it is either free or at a local rate to anywhere in the world. The main
problems are usually sound quality (echo and ‘weird sounds’ are both common faults).
The security issues over VOIP are:
 identity theft
 viruses and malware (malicious software)
 spamming (sending junk mail)
 phishing attacks (the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private information
that will be used for identity theft).

Web conferencing:
Web conferencing (webinar) uses the internet to permit conferencing to take place. Multiple
computers are connected to the internet. As with video conferencing it is carried out in real time
and allows the following type of meetings to take place:
 business meetings to discuss new ideas
 presentation
 online education or training

Web conferencing links into video conferencing and audio conferencing through the use of
webcams and built in microphones and speakers.

Dina El-Akkad 55
ICT I.G.C.S.E.

Dina El-Akkad 56
ICT I.G.C.S.E.
A systems analysis team is brought in to review an existing system and suggest a number of
improvements.

System Development Life Cycle:


SDLC is a systematic series of action by which system analysts approach their goal to install
a new or revised system. The steps involved in systems analysis are:
 Analysis
 Design
 Development and testing
 Implementation
 Documentation
 Evaluation

Dina El-Akkad 57
ICT I.G.C.S.E.
5.1 Analysis:
The analysis stage involves examining the existing system in detail. The basic steps can be
summarised as follows:
1. Research or collect data from the current system
2. Describe of the current system – establishing the inputs, outputs and processing being
done
Feasibility study

3. Identify of the problem with the current system


4. Agree the objectives with the clients
5. Identify and agree customer requirements
6. Interpret customer requirements
7. Produce a cost-benefit analysis
8. Identify suitable hardware and software
9. Produce a data flow diagram

Collection of Information / Fact finding / Information gathering: is concerned with researching


about the existing system. We need to find how things are done at the moment before we can
suggest an improvement. The four common methods used in fact finding are:

1. Observation: to watch the daily work of the personnel.


Advantages:
i. No planning is necessary and it doesn’t involve working with other people.
ii. It is possible to see exactly what is done.
iii. It is a relatively inexpensive method.
Disadvantages:
i. People are uncomfortable being watched and may work in a different way.
ii. If workers perform tasks that violate standard procedures, they may not do this while being
watched.

2. Interview: Involves a one-to-one question-and-answer session between the analyst and the
employee/customer.
Advantage: The questions do not have to be fixed in advance; the analyst can change them
according to the answers the interviewees give.
Disadvantages:
i. Interviewing takes a lot of time.
ii. It is relatively expensive, due to the use of the analyst’s time.
iii. The interviewee cannot remain anonymous.

Dina El-Akkad 58
ICT I.G.C.S.E.
3. Workers and/or customers filling questionnaires to gather facts in a fast way.
Advantages:
i. These are much less time-consuming than interviews.
ii. Individuals can remain anonymous if they want.
iii. It is relatively inexpensive method.
Disadvantages:
i. Often the number of returned questionnaires is low.
ii. Analyst can’t change questions halfway through.
iii. There is no immediate way to clarify a vague or incomplete answer to a question.

4. Looking at existing paperwork: All documents that are used within a system need to be
examined. The documents may be, for example, bills, invoices, letters, order forms, payslips,
etc. The analyst will be looking for answers to questions such as: How is the data collected?
What data is collected? What happens to this data after it has been collected?
Advantages:
i. The analyst can see for themselves how the paper system operates.
ii. A lot can be discovered about an organisation by examining the documents that it uses.
Disadvantages:
i. It can be very time consuming.
ii. Because of the analyst's time, it is a relatively expensive method.
iii. The documentation is often difficult to understand, so it may be necessary to ask someone to
explain it. This means that we are back to the interview again.

5.2 Design:
Having analysed the existing system, the next stage is to design the key parts of the recommended
system. A list of tasks is summarized here:
 Design the data capture forms / input forms
 Design screen layouts
 Design the outputs in the form of screen displays and printed reports
 Producing system flowcharts and/or pseudo code
 Select/design validation rules that need to be used
 Design the file structures and tables (field names, field types, field lengths, field
description, selection of key field, how the data files will be linked, etc)
 Produce any algorithms or program flowcharts
 designing a testing strategy plan

Dina El-Akkad 59
ICT I.G.C.S.E.
5.2.1 Data capture forms:
These forms allow the data to be input into the system.

Paper-based forms need to:


 have a heading to make the purpose of the form clear
 make it clear to the person filing the form where they must place their answers
 make use of text boxes, which will limit the amount of information collected
 make use of character boxes where each box allows one character only
 make use of tick boxes to make choices easier
 make sure there is sufficient space to write answers
 use clear fonts and clear text colours to ensure the form is easy to read.

Computer-based data capture forms have the following features:


 use of text boxes to capture key data clearly
 use of on-screen help when completing the form
 use of drop-down/ combo boxes where there are limited choices
 use of radio buttons and tick boxes, requiring a single click of a mouse to select
 automatic validation of data as it is entered
 control buttons (such as next form, clear entry, save, etc.)
 double entry boxes (with verification rules) to check correctness of key data.
 Buttons to aid navigation

Navigation aids:
 Back/previous record button
 Forward/next record button
 New record button
 Submit/save button
 First record button
 Last record button
 Exit button/return to homepage button
 Move to top of page if long form
 Search facility

Dina El-Akkad 60
ICT I.G.C.S.E.
5.2.2 Screen displays and printed reports:
Screen outputs should be designed:
 to make sure the size of all the output fields is correct
 so that any instructions/descriptions are clear
 so that the full screen is utilised
 so that colours and fonts make the output clear.

5.2.3 System flowcharts:


System flowcharts are used to show how data flows through a system and also how decisions are
made. They make use of special symbols.

5.2.4 Data Verification:


Verification is a way of preventing errors when data is copied from one medium to another. There
are two common ways:

(a) Visual check:


This is checking for errors by comparing entered data on the screen with the data in the original
document.
(b) Double-data entry:
Data is entered twice, using two people. The computer compares the two entries, either after data
entry or during the data entry process, and identifies any differences.

5.2.5 Data Validation:


It is the process of checking, by the computer, of data at the input stage to detect any data that is
incomplete or unreasonable. For example,

(a) Range Check:


Checks whether data is within given/acceptable values.
Example: A person's age should be in the range>0 but <150.

(b) Limit check:


Similar to range check except that only one of the boundaries is checked.

(c) Length Check:


Checks if the input data contains the required number of characters.

Dina El-Akkad 61
ICT I.G.C.S.E.
Example: If a field needs six digits then inputting a five- or seven-digit number, should cause an
error message,

(d) Character/type Check:


Checks that the input data does not contain invalid characters.
Example: A person's name should not contain any numbers.

(e) Format / Picture Check:


Each position within a data item is tested against the item’s pattern to ensure that only valid values
are present.
Example: Date should be in the form dd/mm/yyyy.

(f) Presence Check: checks that the data has been entered.

(g) Consistency Check: checks to see that fields match each other.
Example:
If 'Mr' has been typed into a field called title then the gender field must contain either 'M' or 'Male'

(h) Lookup list Check:


The computer-based system can check the input data against known values by looking up a record
in the files to ensure that the input is valid.

(i) Check Digit:


It is an extra digit appended to a code number. The digit is generated from the code number itself
by applying an algorithm to it.
Check digits can identify three types of error:
 if two digits have been inverted during input, e.g. 13597 typed in instead 13579.
 an incorrect digit entered twice, e.g. 13559 typed in instead of 13579.
 a digit missed out altogether, e.g. 1359 typed in instead of 13579.

5.2.6 File structures:


The fields used in the files need to take the following into account:
 field length
 field name (suitable names should be chosen)
 data type.
A data dictionary is used to show suitable field names. An example of a data dictionary:

Dina El-Akkad 62
ICT I.G.C.S.E.
Field name Field length Field type Suitable validation
check
product_code 8 Alphanumeric length check
manufacturer_year 4 Numeric range check
product_name 20 Alphanumeric None
colour 2 Alphanumeric look-up check

5.2.7 Design and testing strategy/plan:


It is necessary to produce a testing strategy or plan to ensure all the possible scenarios have been
tested.

5.3 Development and Testing:


Once the design stage is completed, it is then necessary to create the system and fully test it.

5.3.1 Development:
After the data structures have been designed, they will need to be created using the software or
programming language recommended by the systems analyst. The programmer will produce the
program code needed to solve the problem.

5.3.3Testing strategies:
After testing each module the whole system is tested. Even though each individual module may
work satisfactory, when they are all put together there may be data clashes, etc.
A system is tested by using both test data and live data.

Test data: Types of test data:


 Normal data is data that is acceptable or valid to the system.
 Extreme data are the values at either end of the acceptable range.
 Abnormal data is data which is not acceptable or valid.
 Live data: This is data that has been used in the existing system. It will be used because
the outputs are already known.

As a result of testing, data/file structures, validation routines, input methods, output formats may
need to be amended/improved.

Dina El-Akkad 63
ICT I.G.C.S.E.
5.4 Implementation:
After the system is fully tested, the systems analyst will want to get the system up and running. His
next steps will be
 to train staff on the new system,
 transfer paper files or electronic files to the new system and
 choose a method of changeover to the new system.

Methods of changeover:
1. Direct changeover:
New system replaces the existing system immediately. This method can only be used when the new
system has been thoroughly tested. Once the old system is closed down it cannot be reintroduced.
Advantages:
i. The benefits are immediate.
ii. Costs are reduced – since only one system is used there is no need to pay for two sets of staff.
iii. There is less likelihood of malfunction since the new system will have been fully tested.

Disadvantages:
i. If there are problems, there is no backup system.
ii. It can be difficult to make improvements to the new system and keep it working.

2. Parallel running:
The old and new systems are run side by side for a time before the new system takes over
altogether.
Advantages:
i. If the new system fails, the old system is still available as a backup.
ii. Staff can be trained to use the new system gradually.

Disadvantages:
i. Two sets of workers have to be paid to keep both system running.
ii. It takes a lot longer to fully implement than direct changeover.

3. Pilot running:
Pilot running is the method adopted by large organisations. The new system is implemented in one
branch of the organisation whilst the other branches continue with their existing system. Workers
from other branches can be taught on the new system before it is introduced to their branch.

Dina El-Akkad 64
ICT I.G.C.S.E.
Advantages:
i. If the system does not work properly, not all branches are affected.
ii. The later branches benefit by learning from the mistakes made in earlier branches.
iii. The costs are less than parallel running.

Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. It is more expensive than direct changeover, since each pilot scheme needs to be evaluated before
the next stage is introduced.

4. Phased implementation:
Phased Implementation involves the introduction of the new system one part at a time. When the
system is working perfectly another aspect can be moved onto the new system until all aspects have
been transferred to the new system.
Advantages:
i. If the latest part fails, it is only necessary to go back in the system to the point of failure.
ii. Workers have time to get used to the new system.
iii. Don’t have to pay two sets of staff.

Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. If the new system doesn’t work properly, it is not possible to fall back on the old system.
iii. It is more expensive than direct changeover, since it is necessary to evaluate each phase before
moving to the next stage.

5.5 Documentation:
5.5.1 User Documentation:
It is provided to help users operate the new system. It is written in non technical terms. It includes:
 Purpose of the system
 Limitations of the system
 Hardware and software requirements
 Input and output formats
 How to save files, do a search, sort data, etc
 Sample runs
 Error messages
 Trouble-shooting guide
Dina El-Akkad 65
ICT I.G.C.S.E.
 Frequently Asked Questions
 Tutorials

5.5.2 Technical Documentation:


It is designed to help programmers and analysts who need to make improvements to the system or
repair/maintain the system. It will include:
 Purpose of the system
 Limitations of the system
 Program listing/coding
 Programming language used
 Program flowcharts
 System flowcharts
 Hardware and software requirements
 File structures
 Known bugs in the system
 Sample runs (with test data and results)
 List of variables
 Validation routines

5.6 Evaluation:
After the system has been developed, tested and implemented, it must be evaluated. There are a
number of stages in the evaluation process.
A system is usually evaluated against a set of criteria:
 Is the system reliable?
 Does the system do what it was intended to do?
 Is the system easy to use?
 Is the new system efficient?
 Is the solution appropriate?

Evaluation of a new system is done by:


 Comparing the solution with the original task requirements;
 Identifying any limitations to the system;
 Identifying any necessary improvements;
 Obtaining feedback from users;
 Using test results;
 Comparing the performance of the new system with performance of the old.
Dina El-Akkad 66
ICT I.G.C.S.E.
Some results from the evaluation may require changes to either hardware or software.
Hardware may need to be updated because:
 of feedback from end users
 new hardware comes on the market, making change necessary
 there are changes within the company which require new devices to be added or updated.

Software may need to be updated because:


 of feedback from end users
 changes to the company structure or how the company works may need modifications to the
software
 changes in legislation may need modifications to the software.

Dina El-Akkad 67
ICT I.G.C.S.E.

Dina El-Akkad 68
ICT I.G.C.S.E.
The four main areas where ICT has had an effect on employment include:

 Manufacturing – robots have replaced human workers

 Shop work – online shopping has reduced the need for high street shops

 Banking – the introduction of ATMs and online banking has led to the closure of many branches
 Office work – spreadsheets, word processors and databases have taken over many of the tasks
carried out by office staff.
6.1 The effects of ICT on employment:
6.1.1 Negative effects – job losses:
The introduction of ICT systems – whether to improve efficiency, reduce costs or improve safety –
has led to redundancies in many areas of industry and commerce.
Office work:
By introducing computer system and new software, the work could be done by fewer staff and in a
much shorter time scale. This could lead to many redundancies and the need for the remaining staff
to retrain.

Manufacturing:
Car manufacturing makes use of robotics. Robots are capable of carrying out the following tasks:
 spraying the bodies with paint
 assembling all the body parts
 assembly of the engine and transmission
 fitting the windscreens.

Fitting seats, dashboards and interior trim are usually carried out by a skilled worker.

Factory workers have had to retrain to gain the following new skills:
 maintenance of the robots
 quality control
 design and development
 marketing
 training other workers.

Dina El-Akkad 69
ICT I.G.C.S.E.
Advantages of robots over humans:
 Higher productivity.
 More consistent results.
 They work non-stop without breaks.
 They don’t get bored by repetitive tasks.
 They don’t go on strike.

Disadvantages of robots over humans:


 Robots are expensive to purchase and set up in the first place.
 They often need to be reprogrammed for every new task they have to carry out, which can be
expensive and time-consuming.
 If an error occurs in the robot’s programming, or it develops a mechanical problem, a number of
production errors will occur until the fault has been identified.

6.1.2 Positive effects:


Offices have become more pleasant and safer places to work (no noisy typewriters or the dangers of
heavy, overfilled filing cabinets), while the introduction of robots in manufacturing has led to a
cleaner, safer and quitter working environment.

There has been a large increase in job opportunities in some areas, for example:
 network managers and computer technicians
 website designers
 programmers to write operating systems, application software and computer games.
 computer engineers (who build and maintain computer systems)
 delivery drivers to deliver goods to customers.

6.2 The effects of ICT on working patterns:


The introduction of ICT into the workplace has led to a number of changes in working patterns for
staff.
Part-time working:
Staff work between 1 and 30 hours a week (for example); or someone who works fewer hours per
week than full-time staff – this can be either fewer hours per day or fewer days per week.

Flexible working (flexi-time):


Flexi-time is the ability to choose the start and finish times, but they must complete a full day’s
work.
Dina El-Akkad 70
ICT I.G.C.S.E.

Job sharing:
With job sharing, a full time job is divided between two part-time workers. Both workers are
doing the same job; one picks up the work where the other left off.

Compressed hours:
In compressed hours, an employee works their full hours for the week but works fewer days.

Different work patterns leads to more contented staff because:


 They can work hours that suit their lifestyle or home circumstances.
 It can allow them to avoid rush –hour commuting in the morning and evening.

Employers see advantages in these work patterns because:


 a contented workforce is more likely to stay in the job thus reducing training cost for new staff.
 flexi-time allows them to remain open for longer hours
 job sharing ensures the company has more than one person with a particular skill set
 compresses hours often lead staff to be more focused in their work
 varied work patterns give more flexibility during busy times and during staff sickness.

6.3 Microprocessor-controlled devices in the home:


The devices fall into two main categories:
Labour-saving devices
 automatic washing machines
 microwave ovens
 cookers
 automatic dishwashers
 robotic vacuum cleaners
 bread-making machines
 smart fridges and freezers

Other types of devices


 alarm clocks
 television sets
 central heating and air conditioning systems
 home entertainment systems.

Dina El-Akkad 71
ICT I.G.C.S.E.
Advantages of microprocessor-controlled labour-saving devices:
 People no longer have to do manual tasks at home.
 There is no longer a need to stay home while food is cooking or clothes are being washed.
 They give people more time for leisure activities, hobbies, shopping and socialising.
 It is possible to control ovens and central heating systems using smart phones while the owner is
out.
 Automated burglar alarms give people a sense of security as they give a very sophisticated level
of intruder warning at all times.
 Smart fridges and freezers can lead to more healthy lifestyles (they can automatically order fresh
food from supermarkets using their internet connection) as well as prevent food waste.

Disadvantages of microprocessor-controlled labour-saving devices:


 Labour-saving devices can lead to unhealthy lifestyles.
 They tend to make people lazy since there is dependence on the devices.
 People can become less fit if they just lie around at home while the devices carry out many tasks.
 People may lose their household skills.

Advantages of other microprocessor-controlled devices:


 Microprocessor-controlled devices save energy since they can switch themselves off after
inactivity for a certain time period.
 It is easy to program these devices to do tasks.

Disadvantages of other microprocessor-controlled devices:


 The devices lead to a more wasteful society as once a circuit board fails the device is just thrown
away.
 Some people can find them complex to operate.
 Leaving devices on stand-by is very wasteful of electricity.

Dina El-Akkad 72
ICT I.G.C.S.E.

Dina El-Akkad 73
ICT I.G.C.S.E.
7.1 Physical security:
7.1.1 Health aspects:

Health risk Solution


Back and neck problems/ strain  use fully adjustable chairs to give the correct
posture
 use foot rests to reduce posture pain
 use screen that can be tilted to ensure the
neck is at the correct angle
 take regular breaks
Repetitive Strain Injury (RSI) - damage to  use a wrist rest when using a mouse or
fingers and wrists keyboard
 use ergonomic keyboards
 use voice-activated software instead of
mouse and keyboard
 take regular breaks
Eyestrain (caused by staring at a computer  use an anti-glare screen or use window blinds
screen too long or bad lighting in the room)  have eyes tested regularly
 take regular breaks
 ensure that there is no screen flicker
Headaches  use an anti-glare screen or use window blinds
 have eyes tested regularly
 take regular breaks
Ozone irritation (dry skin, respiratory problems,  ensure proper ventilation
etc.) - this is caused by laser printers in an office  house laser printers in a designated printer
room
 change to inkjet printers

Dina El-Akkad 74
ICT I.G.C.S.E.
7.1.2 Safety aspects:
Electrocution:
 use an RCB (residual current breaker)
 check insulation on wires regularly
 don’t allow drinks near computers
 check equipment on a regular basis

Fire risk:
 ensure good ventilation in the room
 have a fully tested Co2/dry fine fire extinguisher nearby
 fire exits must be kept clear at all times and not blocked by equipment
 electrical sockets should not be overloaded
 reduce voltage requirements - LCD screens instead of CRT monitors
 cables are not to be coiled – the heat generated may be sufficient to start a fire

Tripping wires (trip hazard):


 avoid trailing cables by creating ducts and/or covering cables with carpets
 tuck wires behind furniture to keep them out of the way
 use wireless connections when possible

Heavy equipment falling and causing injury:


 use strong desks and tables to support heavy hardware
 use large desks and tables so that hardware isn’t too close to the edge where it can fall off

Dina El-Akkad 75
ICT I.G.C.S.E.
7.2 E-safety:
E-safety refers to safety when using the internet, i.e. keeping personal data safe and applies to any
of the following devices:
 mobile phones
 computer or tablet
 game console
 wireless technology

Examples of personal data include:


 name
 address
 date of birth
 medical history
 banking details.

Some personal data is often to as sensitive personal data and includes:


 ethnic origin
 political views
 religion
 sexual orientation
 criminal activity.

Dina El-Akkad 76
ICT I.G.C.S.E.
Some e-safety issues:
 don’t give out any personal information to people who are unknown to you especially online.
 don’t sent people photos of yourself – either online or via a mobile phone - unless a person is
known to you.
 always maintain your privacy settings on whatever device is being used online or during
communications.
 when accessing the internet make sure the websites being visited can be trusted by looking for
https or the padlock sign. When using search engines, always make sure the device settings are
set to ‘safe search’.
 only use websites recommended by teachers and only use a learner-friendly search engine.
 only open emails from known sources.
 only email people you know.
 it is extremely important to be vigilant when using social networking sites, instant messaging or
chat rooms:
o block or report anybody who acts suspiciously or who uses inappropriate language
o be very careful with the language used in chat rooms
o always use nickname and never use real name
o keep private and personal data secret
o don’t enter private chat rooms – stay public
o never arrange to meet anyone for the first time on your own
o always tell an adult first and meet in a public place
o avoid misuse of images
o always use appropriate language
o always respect people’s confidentiality

It is also important to be careful when using online gaming since it carries its own risks. Some of
the known risks reported over years include:
 violence in the game itself, which can lead to violent behaviour in reality
 predators
 cyber bullying
 use of webcams
 voice-masking technology
 viruses, phishing or spyware are examples of problems associated with certain online gaming.

Dina El-Akkad 77
ICT I.G.C.S.E.
7.3 Security of data:
7.3.1 Hacking
Hacking is the act of gaining unauthorised access to a computer system.
Effects of hacking:
 identity theft or misuse of personal information
 data can be deleted, changed or corrupted on a user’s computer
To protect against hacking:
 use of firewalls
 use of strong passwords and user IDs
 use of intrusion detection software
 use of user IDs and passwords

Encryption makes files unreadable if accessed illegally but it does not prevent hacking.

7.3.2 Phishing
The creator sends out legitimate-looking emails to target users. As soon as the recipient clicks on a
link in the email or attachment, they are sent to a fake website or they are fooled into giving
personal data in replying to the email. The email often appears to come from a trusted source, such
as a bank.

Effects of phishing:
 The creator of the email can gain personal data, such as bank account data or credit card
numbers, from the user.
 This can lead to fraud or identity theft.

To protect against phishing:


 Many ISPs or web browsers filter out phishing emails.
 Users should always be cautious when opening emails or attachments.
 Don’t click on executable attachments that end in .exe

Smishing uses the SMS system of mobile phones to send out fake text messages.

Vishing uses a voice mail message to trick the user into calling the telephone number contained in
the message.

Dina El-Akkad 78
ICT I.G.C.S.E.
7.3.3 Pharming
This is malicious code installed on a user’s computer or on a web server. The code will redirect the
user to a fake website without their knowledge.
Effects of pharming:
 The creator of the malicious code can gain personal data, such as bank account data or credit
card numbers, from users when they visit the fake website.
 Pharming can lead to fraud or identity theft.

To protect against phishing:


 Some anti-spyware software can identify and remove pharming code from a user’s computer.
 The user should always be alert and look out for clues that they are being redirected to another
website.

7.3.4 Spyware and key-logging software


Spyware is a software that gathers user information through the network connections without the
user being aware that this is happening.
To protect against spyware:
 Use anti-spyware software to reduce the risk.
 The user should always be alert and look out for clues that their keyboard activity is being
monitored.
 Enter passwords by selecting characters from a drop-down menu using a pointing device

7.3.5 Spam
Spam, often referred to as junk email, is usually sent out to a recipient who is on a mailing list or
mailing group. While spam is rarely a security risk, it can lead to denial of services. Denial of
services is an attack on a network that is designed to slow the network down by flooding it with
useless traffic. Spam can be linked to phishing attacks or even the spread of computer viruses.

Spam prevention techniques:


 When using the ‘junk email filter’ set the protection level to high or to safe lists only.
 Block images in HTML messages.
 Look out for check boxes that are already selected when items are bought online; companies
sometimes add a check box to indicate that you have agreed to sell or give your email address to
third party users.
 Do not sign up to commercial mailing lists.
 Unsubscribe from a mailing list that you did not sign up to.
Dina El-Akkad 79
ICT I.G.C.S.E.
While some regard spam as a cheap way of advertising to many people at the same time, the main
disadvantages are:
 It uses people time
 It generally annoys people
 It uses up valuable bandwidth on the internet, slowing it down
 It can have viruses attached or even be part of a phishing scam
 It can clog up users’ inboxes

Spam can also affect mobile phones through text messaging and sometimes referred to as ‘spasms’.

7.3.6 Moderated and unmoderated forums


A moderated forum refers to an online discussion forum in which all the posts are checked by an
administrator before they are allowed to be posted.
The internet is essentially an unmoderated forum. No one owns the internet, and it is essentially
not policed. However, most social forums or networking groups on the internet have a set of rules
or protocols that members are requested to follow or they will be deleted.

7.3.7 Cookies
Cookies are small amounts of text that are sent and received through the web browser as we search
or visit internet sites. Cookies track the pages you have visited and save these on your computer
with information about you.
Cookies can be useful if you visit a website frequently and do not wish to enter your login details
each time, but they allow websites you have not visited to know which webpages you have viewed.

7.4 Additional security of data online:


7.4.1 Firewalls
A firewall can be either software or hardware (gateway). It sits between user’s computer and an
external network and filters information coming in and out of the user’s computer. Users on stand-
alone computers can choose to disable the firewall, leaving their computer open to harmful traffic
from the internet.

Tasks carried out by a firewall:


 examines the traffic between a user’s computer and a public network
 checks whether incoming or outgoing data meets certain criteria
 prevents access to certain undesirable websites; the firewall can keep a list of all undesirable IP
addresses.
Dina El-Akkad 80
ICT I.G.C.S.E.
 helps prevent viruses or hackers gaining access to the user’s computer or network by blocking IP
addresses but hackers can still have access if they are using an allowed computer
 the user is warned if some software on their system is trying to access an external data source

7.4.2 Security protocol


Secure Socket Layer (SSL) is a type of protocol that allows data to be sent and received securely
over the internet.
When a user logs on to a website, SSL encrypts the data. A user will know if SSL is being applied
when they see https or the small padlock in the status bar.

7.4.3 Encryption
Encryption is the name given to the converting of data (plain text) into a code (cypher script) by
scrambling it. Even if a hacker gains access to the data he will not be able to understand it. The
key used to encrypt (or encode) the message is known as the encryption key; the key used to
decrypt (or decipher) the message is known as the decryption key.

7.4.4 Authentication
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Digital certificates
A digital certificate is a pair of files stored on a user’s computer. Each pair of files is divided into:
 a public key
 a private key

When sending an email, the message is more secure by attaching a digital certificate made up of six
parts:
 the sender’s email address
 the name of the digital certificate owner
 a serial number
 expiry date
 public key
 digital signature of certificate authority (CA)
Operating systems and web browsers maintain lists of trusted CAs.

Passwords
Biometrics
Dina El-Akkad 81
ICT I.G.C.S.E.
Online credit fraud
Online credit card fraud happens for the following reasons:
 hackers gaining access to a user’s computer through the use of spyware, phishing or pharming.
 the breaking of passwords
 sometimes the URL is altered very slightly in the email and the user ends up visiting a fake
website so it is better to type in the URL.
 it is relatively easy to tap in to wireless networks without password protection
 Wi-Fi hotspots in public places are not secure
 cloud and some retail companies are targets for hackers

Cloud security
Several computer manufacturers encourage customers to store or backup their files on a medium
known as the cloud. Users purchase cloud storage and can then access all their files from any
device anywhere in the world.
Advantages:
 no need to carry memory sticks
 no need to pay for large storage capacity on your computer
 cloud companies ensure that your files are backed up
 the ability to synchronise (sync) files ensures they are automatically updated across all devices
 allows several users to edit and collaborate on a single file

Data security:
Companies that transfer vast amount of confidential data from their own systems to a cloud service
provider are relinquishing control of their own data security.

Data loss:
There is a risk that important and irreplaceable data could be lost from cloud storage facilities.

Dina El-Akkad 82
ICT I.G.C.S.E.

Dina El-Akkad 83
ICT I.G.C.S.E.
8.1 Audience appreciation
When planning and creating ICT solutions the following should be considered:
 The age of the target group
 The experience of the audience
 The expectations of the audience
 Knowledge of the audience
Research needs to be done first to find out about the target audience. This could be done by:
 Interviewing a cross section of the target group to find out how to engage the audience
 Giving out questionnaires to people in the target group to find out their background, interests,
etc.
 Carrying out market research – this could involve the two techniques described above, but
would involve a more sophisticated and in-depth analysis of the data received.

8.1.1 Giving a sample presentation to an audience


Language used:
 No vulgarity or use of inappropriate language since this can easily offend people.
 The use of technical terms should be reserved for experienced or technical audience.

Multimedia used:
 Use of sound, video and animation will always catch the attention of the audience but it is
important not to overdo it in case the message gets hidden because of too many distractions in
the presentation.
 A young audience is more likely to respond o loud music and embedded video clips.
 Complicated descriptions are often better explained using graphs and/or animations.

Length of presentation:
 Long presentations will only work if they are interesting and engage audience.
 A very young audience would quickly get bored and start to become restless.

Interactive presentation:
 Asking questions or getting the audience to ‘try things is always a good strategy but always be
aware that not everyone wants to take part.

Examples used:
 When using examples to illustrate ideas, remember to be understanding.

Dina El-Akkad 84
ICT I.G.C.S.E.
The audience may be the actual users of the ICT solution. Considerations to meet the audience
requirements in this case include:
 how skilled is the workforce
 how old is the workforce
 are any of the staff disabled

8.2 Software copyright and privacy


When software is supplied on CD or DVD, there are certain rules that must be obeyed. It is illegal
to:
 make a software copy and then sell it or give it away
 use software on a network or used in multiple computers unless a licence has been acquired to
allow this to happen
 use coding from the copyright software in your own software and then pass this software on or
sell it as your own without the permission of the copyright holders
 rent out a software package without permission to do from the publishers
 use the name of copyrighted software on other software without agreement to do so.

Software piracy (illegal copies of software) is a big issue amongst software companies. To protect
software:
 When software is being installed, the user will be asked to key in a unique product key which
was supplied with the original copy.
 The user will be asked to agree to a licence agreement before the software continues to install.
 The original software packaging often comes with a sticker informing the purchaser that it is
illegal to make copies of the software; the label is often in the form of a hologram indicating
that this is a genuine copy.
 Some software will only run if the CD-ROM or DVD-ROM is actually in the drive.
 Some software will only run if a dongle is plugged into one of the USB ports.

Dina El-Akkad 85
ICT I.G.C.S.E.
8.3 Legal, moral, ethical and cultural implications
 Legal covers the law; whether an action is punishable by law. Example, copying software and
then selling it without permission of the copyright holders.

 Morality governs the private and personal interactions between people and is usually determined
by the person concerned. Creating fake websites is not illegal provided the person who carries
out the act doesn’t try to gain from their actions – it is simply an immoral act since it can cause
distress o others.

 Ethics governs professional interactions, for example, codes of behaviour practised by a society
or group of people sometimes going against an individual’s own sense of morality. If somebody
works for a software company and passes on some of the ideas to a rival company, this would be
regarded as unethical behaviour. Unless the software passed on is part of national security, then
it isn’t actually illegal to do so.

 Culture refers to the attitudes, values and practices shared by a society or group of people.
Writing software games that make fun of religion could be seen by certain people as
unacceptable behaviour but some cultures would find it funny and wouldn’t understand why it
was seen as offensive.

Dina El-Akkad 86
ICT I.G.C.S.E.

Dina El-Akkad 87
ICT I.G.C.S.E.
9.1 Communication applications:
9.1.1 Flyers, posters, brochures and newsletters
Steps to produce such a document:
1. open word processor, DTP or presentation application
2. create frames, boxes and/or text boxes
3. take photos if necessary using a camera
4. upload the images from the camera or from a CD/DVD, scan photos, or download photos from
the internet.
5. save the photos to a file
6. import or copy and paste the photos into the document
7. edit the photos and import from a file or type any text required.

Brochures are usually printed on glossy paper.

Posters are eye-catching and usually very difficult to miss. Posters are usually placed in strategic
positions to target certain people rather than the general public. Renting an advertising area is
expensive. Posters are subject to weather conditions.

Newsletters are often produced by companies or clubs. They contain local information which is
read by the company employees or club members. Example:
 marriages, deaths, and births of employees, club members or their families
 advertising by outside companies
 news events, such as fundraising, etc.

9.1.2 Websites
Advantages:
 Sound/video/ animation can be added.
 Links to other websites/hyperlinks can be used.
 Use of hotspots.
 Buttons to navigate/move around the website leading to more information.
 Hit counters to see how many people have visited the website.
 Can be seen by a global audience.
 Can’t be thrown away.
 It is much easier to update a website.

Dina El-Akkad 88
ICT I.G.C.S.E.
Disadvantages:
 Websites can be hacked into and modified or viruses introduced.
 Risk of potential pharming.
 Customers must have a computer and internet connection.
 Possible for customers to go to undesirable websites by accident or as a result of a pharming
attack. This can lead to distrust from customers.
 Maintain the website can be expensive.
 Because it is a global system, it is more difficult to target the correct audience using website
advertising.

9.1.3 Multimedia presentation


A multimedia projector is used so that the whole audience is able to see the presentation.
Advantages:
 Use of sound and animation/video effects which grab the attention of the audience.
 Use of transition effects allow a presentation to display facts in a chronological order.
 It is possible to have hyperlinks built into the presentation to access the company’s website or
files stored on the cloud.
 The presentation can be interactive.
 The presentation can be tailored to suit particular audience.

Disadvantages:
 Equipment needed can be expensive.
 Equipment failure can be a disaster when giving multimedia presentation.
 Wherever the presentation is given there may need to be internet access.
 There is a danger that the focus is on the multimedia presentation rather than the message/facts.
 It is very easy to make bad presentation with too many animation effects and too much text or
images.

Paper-based presentation:
Advantages:
 Disabled people don’t have to go the venue to see the presentation.
 It is possible to print it out in Braille for blind people.
 The recipient can read the presentation at any time they want.
 The recipient have a permanent copy which they can refer to at any time.

Dina El-Akkad 89
ICT I.G.C.S.E.
Disadvantages:
 The presentation needs to be distributed in some way.
 There are no special effects (sound, video, animation)
 There are printing costs (paper, ink, etc).

9.1.4 Music scores


The generation of music and the production of music scores can now be done by computer systems
with the appropriate software, for example:
 music scores can be generated from the music itself using software.
 software can automatically correct music notes in a score.
 there is no need to understand the music notation to write a music score.
 music notes are automatically printed out in the correct format.

9.1.5 Cartoons:
With 3-D animation, objects are designed on a computer and a 3-D skeleton (framework or basic
structure) produced. The parts of the skeleton are moved by the animator using key frames (these
frames define the start point and end point to give a smooth animation effect). The difference in the
appearance of the skeleton in these key frames is automatically calculated by the software and is
known as tweening or morphing. The final stage is to make a realistic image by a technique
known as rendering.

9.1.6 Business cards and letterheads


Many IT companies offer to produce business cards and letterheads to any design. The user
connects to an appropriate website and they will be given a number of business card templates. The
user chooses a template and keys in data such as:
 name of company
 contact details
 image wanted on the business card.

Advantages to a company in using corporate letterheads produced by a printing website:


 professionalism
 brand/company awareness
 advertising – the letterhead can contain many useful pieces of information to advertise the
company
 helps to make the company stand out
 can make the company appear larger than it is
Dina El-Akkad 90
ICT I.G.C.S.E.
9.2 Data handling applications:
A number of applications make use of simple data handling techniques, such as:
 surveys
 address lists
 clubs and society records
 school reports
 school libraries

9.3 Measurement applications


The computer reviews the data from the sensors (by comparing it to data stored) and updates its
files and/or gives a warning signal if the values are outside given parameters. No changes to the
process are made during monitoring.

Examples of measurement applications:


 weather stations
 scientific experiments (e.g. taking temperature measurements)
 measuring a patient’s vital signs on a hospital
 pollution monitoring
 burglar alarm system

9.3.1 Weather stations:


Weather stations are set up to automatically gather data from the environment. They use sensors to
measure:
 rainfall
 temperature
 wind speed
 wind direction
 air pressure
 humidity
The data needs to be gathered 24/7. This data help to predict the weather for the next few days or
take a more long-term view by looking at weather patterns.

Dina El-Akkad 91
ICT I.G.C.S.E.
9.3.2 Measuring a patient’s vital signs in a hospital:
Steps:
 sensors read key vital signs (pulse rate, heart rate, temperature, blood pressure, respiration, etc.)
 the data from sensors is converted into digital using an ADC
 the data is stored in the computer’s memory
 the computer compares the data from the sensors with the values stored in is memory (these will
be input by the nurse or doctor for a particular patient)
 the results are output on a screen in the form of graphs and/or numerical readouts
 an alarm is activated if any of the data is outside acceptable ranges
 the system continues to measure the patient’s vital signs until the computer is turned off.

9.3.3 Measuring pollution in a river:


Steps:
 the sensors are placed in at least two different positions so that a pollution comparison can be
made
 the data from the sensors is converted into digital using an ADC and sent to a computer
 the computer stores the received data
 the oxygen levels and acidity levels and light levels are compared to the historical data stored in
memory and they are also compared to pre-set levels stored in memory
 the oxygen and acidity levels from the different positions in the river are also compared to see if
they are similar – this is used to see if the source of the pollution can be found.

Data is either transferred to a CD/DVD or to a memory stick and taken away for further analysis or
the computer is connected to a mobile phone network and transmits the data back automatically to
the monitoring station.

9.4 Microprocessors in control applications


The computer reviews the data from the sensors (by comparing it to data stored in memory). But if
the values are outside the given parameters it takes action to try to get the values within acceptable
ranges.
Examples of control applications:
 automatic washing machines
 automatic ovens/cookers
 central heating systems
 chemical plants
 glasshouse environment control
Dina El-Akkad 92
ICT I.G.C.S.E.
9.4.1 Central heating systems:
 The required temperature is keyed in and this is stored in the microprocessor memory as pre-set
value
 The temperature sensor data is sent to an ADC to convert the analogue data into digital data.
 The digital data is constantly sent to the microprocessor.
 The microprocessor compares this data with the pre-set value.
 If the temperature reading is equal to the pre-set value then no action is taken.
 If the temperature reading is less than the pre-set value, then a signal is sent:
 to an actuator (via a DAC) to open the gas valve to the boiler
 to an actuator (via a DAC) to turn on the water pump.
 The process continues until the central heating is switched off.

Advantages of using sensors and computer systems to monitor / control processes:


 Computer readings are more accurate.
 Readings can be taken more frequently
 Humans can get tired and forget to take readings.
 Work 24 hours/7 days a week without taking breaks.
 Some processes are dangerous so it helps in preventing accidents.
 Employees are free to do other tasks.
 More than one variable can be measured at any one time.
 Results are analysed automatically / faster to react / charts are produced automatically.

Disadvantages of using a computer in Process control and data logging :


 The computer is unable to respond to unusual circumstances.
 High technical staff required to run the system.
 Computer equipment and measuring software can be expensive to purchase and set up.

Dina El-Akkad 93
ICT I.G.C.S.E.
9.5 Modelling applications
A computer model is the creation of a model of a real system in order to study the behaviour of the
system. The model is computer generated and based on mathematical representations.

The whole idea is to try to find out what mechanism control how a system behaves. This then
makes it possible to predict the behaviour of the system in the future and also see if it is possible to
influence this future behaviour.

Examples:
 Flight simulators allow pilots to try their skills at flying a plane. If they crash on the simulator,
no actual damage is done.
 Military operational research models for new weapons and tactics.
 Simulation for nuclear reactors.
 Ecological systems of the spread of diseases.
 Extinction rates of endangered species.
 Tuck shop modelling (Financial modelling)
 Traffic light simulation

Why are computer models done?


 They are less expensive than having to build the real thing (e.g. a bridge).
 It is often faster to do a simulation than the real thing. (e.g. climate change calculations,
population growth, etc.).
 On many occasions it is safer to run a simulation – some real situations are hazardous (e.g.
chemical processes).
 It is nearly impossible to try out some tasks in real life because of high risk involved or
remoteness (e.g. in outer space, under the sea, in nuclear reactors, crash testing cars, etc.).
 With simulations, various scenarios can be tried out in advance.

Limitations to using simulations:


 They can be very expensive to set up and often require specialist software to be written.
 They frequently require very fast processors.

Dina El-Akkad 94
ICT I.G.C.S.E.
9.6 Manufacturing applications
A robot is a computer controlled mechanical device which is able to do variety of tasks.

How to program a robot:


 The robot follows a program that contains a sequence of movements.
 A human operator leads the robot arm through a learning sequence. The robot repeats the
sequence later.

9.7 School management system


9.7.1 registration and attendance records of student
Method 1:
Issue each student an ID card containing a magnetic stripe. The student would have to sign the card
and also write his unique student ID on the card.
Each morning and on leaving the school, the student swipes the ID card through a magnetic card
reader.
Use of a PIN stops another student swiping in with the wrong card.
Use of GPS tracking helps in knowing the exact whereabouts of a student. This would require the
addition of a chip in the ID card.

Method 2:
Use of biometrics – fingerprints.

Advantages:
 Fingerprints are unique
 ID cards could easily be lost
 ID cards could be affected by magnetic fields
 It is easy to make copies of ID cards

Disadvantages:
 It would take a long time to collect the initial fingerprints for every student in the school.
 The equipment needed to take and read fingerprints is more expensive than magnetic stripe
reading equipment.
 If a student cuts a finger, the fingerprint may not be identified by the system.
 There are ‘invasion of privacy’ issues and some parents may object to having the fingerprints of
their children stored on a database.

Dina El-Akkad 95
ICT I.G.C.S.E.
9.7.2 Student performance
Teachers could make use of spreadsheets to monitor the performance of their students.

9.7.3 Exam timetables, Subject timetables and teacher substitution


Many factors have to be taken into account when producing timetables for each student:
 availability of teachers
 availability of rooms for each subject
 subject clashes
 number of hours for each subject

When using software to create timetables, it is easy to try ‘what it’ scenarios to ensure the most
efficient use of time is utilised.
Timetables can be produced to cover classes when teachers are absent.

9.8 Booking systems


9.8.1 Theatre and cinema booking systems
Online booking systems rely on the ability to update file immediately thus preventing double-
booking which could happen if the system response time was slow.
How a theatre booking system works:
 the customer clicks on the performance they wish to see
 a date and time is time is typed in
 the required number of seats is entered
 the seating display in the theatre is shown on the screen
 the user selects their seat(s) by highlighting the actual seats on the screen display and then clicks
CONFIRM to go to the next part of the process
 the database is then searched to check the availability of the selected seats
 if the seats are available the total price is shown
 if the customer is happy with this, they select CONFIRM on the screen
 the payment method is then selected and payment made
 an email is sent to the customer which they print out and is used as an e-ticket
 the database is finally updated with the transaction and the seats become no longer available.

9.8.2 Flight booking systems


Booking flights is slightly more complex since it involves choosing airport, departure date,
returning date, etc.

Dina El-Akkad 96
ICT I.G.C.S.E.
9.9 Banking applications
9.9.1 Automatic teller machines (ATMs)
Disadvantages with ATMs:
 they are often in places where theft can take place at night
 ‘bogus’ ATMs can be set up to gather information about the card and retain the card
 some banks charge customers for the use of ATMs.

9.9.2 Internet banking


Services available to customers using on-line banking:
 Transfer money between accounts
 Order a cheque book,
 Pay bills,
 Print statements,
 Change personal details,
 Look account transactions for a given period.

Services not available to customers using on-line banking:


 Withdraw cash.
 Deposit cash.

Advantages of online shopping and banking


1. No waste of time and money travelling long distances.
2. Greater choice of goods than local shops.
3. Shopping and banking can be done 24/7.
4. Disabled and elderly people don’t have to leave the house.
5. People can spend more time doing other things.
6. There are often long queues at the banks or checkouts at the shops
7. Many people find it less embarrassing to ask for a bank loan using the internet.

Dina El-Akkad 97
ICT I.G.C.S.E.
Disadvantages of online shopping and banking:
1. Security issues are a major concern. These include:
 hacking, stealing credit card details
 viruses and other malware (e.g. phishing, pharming, etc.)
2. Fewer social contacts.
3. It is necessary to have a computer and internet connection.
4. Do not get much exercise from not getting out.
5. Cannot inspect the goods you are going to buy properly.
6. Delivery times can be long.
7. You cannot pay with cash.
8. High street shops and banks are closing and this is leading to ‘ghost towns’ forming

Advantages to the bank/shop:


1. Fewer branches to maintain.
2. Because the internet is global, the potential customer base is increased.
3. Fewer cashiers needed so less spent on wages.
4. Less money spent on security staff.
5. Less actual cash handled so fewer robberies.

Disadvantages to the bank/shop:


1. Cost of setting up and maintaining of websites.
2. Cost of retraining the staff.
3. Lose customers due to lack of personal touch.

9.9.3 Telephone banking


The customer calls the bank using a telephone. Then
 the customer keys in their account number
 they are then requested to enter a four-digit PIN or selected numbers from PIN
 the customer will then hear various options
 the customer chooses one of the options

With this system, there is no need to have a computer and it’s possible to talk to an actual human
being.
However, compared to internet banking, it can be much slower (there may be a long queue before
you can talk to somebody) and the options can be a little more complex to navigate. But it can also
be quicker if your computer isn’t switched on at the time and you only want a balance enquiry.
Dina El-Akkad 98
ICT I.G.C.S.E.
9.9.4 Chip and PIN
When paying for items using a chip and PIN card, electronic fund transfer (EFT) takes place.

Suppose a customer goes into a restaurant to pay for a meal using chip and PIN card:
1. The PIN is entered using a keypad.
2. The card is checked to see if it is valid.
3. The PIN is read from the chip on the card and compared to the one just keyed in.
4. If they are the same, then the transaction can proceed.
If this is the third attempt at entering the PIN, then the transaction is terminated.
5. The restaurant’s bank contacts the customer’s bank.
6. A check is made to see if the customer has enough funds.
7. If there aren’t enough funds available, then the transaction is terminated.
8. If everything is ok, then the transaction is authorised.
9. An authorisation code is sent to the restaurant.
10. The price of the meal is then deducted from the customer’s account.
11. The same amount of money is then added to the restaurant’s bank account.
12. A receipt is produced as proof of purchase.

9.9.5 Clearing of cheques


Banks clear cheques using a centralized clearing centre.
Suppose John uses a bank called Hodder bank and pays a cheque for $50 to a company called H&S
Ltd who bank with Smith Bank.
1. The cheque is sent by the Smith Bank to a centralised clearing centre.
2. The cheque is processed by the clearing centre by first passing it through a reader/sorter
machine. The machine reads:
 the amount on the cheque
 the code line (containing account number, sort code and cheque number).
3. All the cheques are then sorted using their sort codes (unoque, six-digit numbers), ready for
sending to an exchange centre.
4. The data from the cheque which has been read is then converted into an encrypted file
known as IBDE (Inter-Bank Data Exchange) file.
5. Every IDBE is ‘signed’ with a digital signature so that the receiving bank can be sure that
the data hasn’t been tampered with.
6. Smith Bank delivers the cheque to an exchange centre.
7. The exchange centre then passes the cheque back to the paying bank (Hodder Bank in this
case) which then sends it to its own clearing centre.

Dina El-Akkad 99
ICT I.G.C.S.E.
8. At the paying bank’s clearing centre, the digital signature is first checked and then the
cheque is passed through their own reader/sorter machine to make sure data matches with
that on the IBDE file. It also sorts the cheques into branch order (using the sort code).
9. The paying bank checks to see if John has enough money in his account, etc. Based on this
information, Hodder Bank decides whether to pay John’s cheque to H&S Ltd or return it
unpaid to the Smith Bank.

A cheque may be returned unpaid if:


 the customer has not got enough money
 the cheque has not been signed, dated, or written correctly
 the cheque is fraudulent for some reason.

The whole process takes three working days.

9.9.6 Electronic funds transfer


Electronic funds transfer (EFT) is a system that allows money transfer instructions to be sent
directly to a bank’s computer system. No actual money is transferred.
Electronic Fund Transfer at Point-of-Sale (EFTPOS): when a credit/debit card is used to pay for a
purchase in a store.

Dina El-Akkad 100


ICT I.G.C.S.E.
9.10 Expert systems:
Expert systems are computer programs that attempt to replicate the performance of a human expert
on some specialized field. Examples:
 Mineral/Oil exploration
 Diagnosing a person’s illness
 Car fault diagnosis
 Chess games
 Tax and financial calculations
 Plant/animal/rock identification
 Construction industry to come up with cost of a new building.

An expert system consists of:


 Knowledge base that contains the data or facts provided by a human expert.
 Rules base which is a set of rules. They closely follow human-like reasoning.
 Inference engine to draw reasonable conclusions from rules.
 User interface which is how the computer interacts with the user.

How to set up an expert system:


 Experts in the field are interviewed to find out what is needed in the expert system.
 Data is then collected from these experts.
 A knowledge base is designed and then created.
 The rule base is designed and then created.
 An Inference engine is designed and then created.
 The user interface is designed and then created.
 The expert system is tested against known conditions and scenarios.
 It is also checked to see if it meets the original specification.
 Experts are interviewed about how effective it is before the expert system goes out on general
release.

Advantages:
 Expert systems provide consistent answers.
 Using expert system reduces the time to solve a problem.
 Allows areas of the world access to expertise which they couldn’t normally afford.
 Expert systems never forget to answer a question when determining the logic.
 A less skilled work force is needed so saving money.
Dina El-Akkad 101
ICT I.G.C.S.E.
Disadvantages:
 Expert systems tend to lack common sense in some of the decision-making processes.
 Errors in knowledge base can lead to incorrect decisions being made.
 It can be expensive to set up in the first place.
 Considerable training is necessary to ensure the system is used correctly by the operators.

Example of an expert system: oil prospecting


 An interactive user screen appears.
 Questions are asked about geological profiles.
 Answers to the questions and information about the geological profiles are typed in.
 The inference engine searches the knowledge base using the rule base.
 The system:
 suggests the probability of finding oil as an output
 indicates the probable depth of deposits
 makes predictions about geological deposits above the soil
 produces contour maps showing concentration of minerals, rocks, oil, etc.

9.11 Using 3-D printers in medicine:


Surgical and diagnostic aids
It is possible to print out anatomical parts using 3-D printers. These are used as an aid towards
diagnosis and surgical procedures. The patient is scanned using:
 CT (computed tomography)
or
 MRI (magnetic resonance imaging)

A 3-D printer can then reproduce a solid object showing the exact internal organs of the patient.
The doctor or surgeon can then show the patient exactly what is wrong and then show them what
procedures are required. They also help the surgeons in planning surgical procedures.
3-D printers produce hard nylon objects which are used in certain surgical planning. Tis reduces
the chance of any errors when the actual procedure is carried out.

Prosthetics
3-D printers are used to print out prosthetics (false arms, hands and legs) at a fraction of the cost
compared to existing methods.

Dina El-Akkad 102


ICT I.G.C.S.E.
Tissue engineering
Recent advances have allowed the 3-D printing of bio-compatible materials, cells and supporting
structures. 3-D bio-printing is used to produce multilayered skin tissue, bone tissue, heart/artery
grafts and tracheal splints.
The procedure involves making biological materials by diffusing cells into a bio-compatible
scaffold. The bio-printed tissue is then put into an incubator and the cell structure held within the
scaffold grows to form actual cellular tissue.

Design of medical tools and equipment


Medical equipment/tools produced using 3-D printers are produced much faster and much cheaper
than using traditional methods.
3-D printers create injection-moulding tools which allow several prototypes to be made within a
short time.
Traditional methods require aluminum moulds to be made which is slow and expensive process.

9.12 Computers in libraries:


Many libraries use barcodes on the books and on the borrower’s library card.
Some libraries use magnetic stripes on the borrower’s card.
Some libraries use RFID chips in their books.

Two files will exist: Book file and Borrower’s file.

On a daily basis, the borrowers file is checked by the computer to see which books are overdue.
The computer reads a record from the book file.

Dina El-Akkad 103


ICT I.G.C.S.E.
9.13 Computers in retail industry:
Automatic stock control system using barcodes
 The barcode on each item is scanned at the EPOS.
o If the barcode can’t be read, then the number is keyed in manually
 The barcode is searched for on the stock file record by record until a match is found.
 The record is accessed.
 The price and description of the product are sent back to the EPOS
 The stock level is found in the record and is reduced by 1and the new stock level is written back
to the file.
o If the number in stock of the item is less or equal to the re-order/minimum number in stock,
then an order is placed using the supplier file.
o Once goods have been ordered the item is flagged
o When new goods arrive, the stock file is updated and the flag removed
 The above is repeated until all the items have been scanned.
 The customer is given an itemised bill.
 The computer updates the file containing the daily takings.
 If the customer has a loyalty card, the system will automatically update the points total.

Dina El-Akkad 104


ICT I.G.C.S.E.
9.14 Recognition systems:
Automatic Number Plate Recognition (ANPR) System
ANPR systems are used to read the number plates on cars in a number of applications including car
parks to enable entry and exit to be automatically controlled by a computer system.
1. A sensor detects a vehicle and sends a signal to a microprocessor to instruct a camera to
capture an image of the front of the vehicle.
2.
i. An algorithm is used to locate and isolate the number plate from the image taken by the
camera.
ii. Each character on the number plate is then segmented.
iii. Each character is then recognised using OCR software.
iv. This text string is then stored on a database.
3. The car park barrier is raised and a ticket showing the date and time of entering is issued.
4. When the driver returns to the car park, the ticket is inserted into a machine which calculates
the car park charges. The payment is registered on the database. If the number plate is
recognised and payment has been made, the exit barrier is raised.

9.15 Monitoring and tracking systems:


9.15.1 Monitoring/tracking a member of the public
There are a number of reasons why a person may need to be tracked:
 the person may be an offender who is released from prison and his whereabouts is to be
known at all times
 an elderly person may need to be tracked to ensure their safety
 somebody taking part in a marathon to determine their position and their time to complete
the race.
An ankle monitor makes use of RFID technology by inserting a microchip into the device which is
strapped to the ankle.
It sends out at timed intervals radio frequency signals. These signals contain the person’s location
and the other data. The signals are picked up by a device in the person’s home. This unit uses
either landline or mobile phone network to rely the information back to a computer in the control
room. GPS monitoring is also used so that the person can be tracked outside their home.
CCTV cameras are also used to monitor people in streets and shopping malls in case of crime or
aby suspect activity.

9.15.2 Cookies
9.15.3 Key logging
Dina El-Akkad 105
ICT I.G.C.S.E.
9.15.4 Employee call monitors
Employee call monitoring allows managers to listen in to employees’ telephone calls for the
following reasons:
 to improve the employees performance (e.g. at a call centre)
 allows the manager/supervisor to join in a call where necessary
 can be used as a training tool
 it allows a company who are concerned about security to monitor all calls

Types of call monitoring:


1. monitor: allows the manager to listen in on calls. The line is muted.
2. whisper: allows the manager to speak to employees to help them with a call. Only the employee
can hear the manager’s voice.
3. barge: allows the manager to be heard by both the employee and the other person in the call.

9.16 Satellite systems:


9.16.1 Global positioning satellite (GPS) systems and satellite navigation
 At least 24 satellites in operation at a given time.
 Satellites transmit signals including distance and time to the
computers installed in the mode of transport.
 Computers receive and interpret these signals.
 Knowing their position on Earth depends on very accurate timing
using atomic clocks.
 The computer in the mode of transport calculates its exact position based on the information
from at least three satellites.
 Position of vehicle is within 1 metre.

Uses:
 cars to calculate routes
 walkers to locate position on hills/mountains
 runners to calculate distance run
 farmers for tractor navigation/soil evaluation/livestock control/yield monitoring
 satellite navigation systems for ships
 tracking aircraft

Dina El-Akkad 106


ICT I.G.C.S.E.
Advantages:
 The driver doesn’t have to consult paper maps, so it is safer.
 Can warn drivers about one way streets, street closures, etc.
 The system can estimate the time of arrival.
 The system can give useful information such as location of petrol stations.
 It is possible to program in the fastest route, route to avoid towns, etc.

Disadvantages:
 If the maps are not kept up to date, they can give incorrect instructions.
 Loss of satellites signals can cause problems.
 Road closures due to accidents or road works can cause problems.
 If an incorrect start point or end point is keyed in the system will give incorrect information.

9.16.2 Geographic information system (GIS)


The technology combines maps with computer graphics and databases.
GIS enables the following:
 combination of information into easily understood maps
 performance of complex analytical calculations and then presentation of the results in the form
of maps, tables and/or graphics
 Geographers, scientists and engineers are able to see the data in several different ways in order to
see patterns and relationships.
Carrying out queries on GIS systems (in a method similar to internet searches) will produce the data
which matches the query in the form of diagrams, maps, or set of tables.

Uses:
 Emergency services to send the closest emergency personal to a location.
 Biologists and environmentalists to protect animal life and plans in certain areas
 Teachers in their geography, science or engineering lessons.

9.16.3 Media communication systems


Communication media refers to methods of delivering and receiving data/information using
telecommunications, e.g., fibreoptics, copper cable and Wi-Fi. The global communication method
is the use of satellites. Satellites contain antennas, transponders (to allow receiving and sending of
data), solar panels (for power from the sun) and propulsion (to ensure the satellite is in the correct
orbit at all times). Satellites systems are used to transmit television, telephone and internet data
around the world. Cables would be too costly and there is the problem of signal deterioration.
Dina El-Akkad 107
ICT I.G.C.S.E.

Dina El-Akkad 108


ICT I.G.C.S.E.
10.1 Communication with other ICT users using email:
10.1.1 Constraints:
Laws
Most countries require companies and individuals to abide to the following rules when sending out
emails:
 many countries require senders of emails to obtain ‘opt-in’ permission before emails are sent out
 a company or individual must have a clear way for recipients to ‘opt-out’
 subject lines should not be false or misleading
 a valid postal address must accompany emails from companies or organisations
 companies must provide subscribers with a very clear way to unsubscribe from their listings
 companies and organisations must make their privacy policy very clear to subscribers
 many countries don’t allow companies or organisations to harvest email addresses (capture lists
of email addresses)

Acceptable language
List of unacceptable content to be used in emails, text messages and online forums:
 obscene images
 language that is regarded as abusive, profane (offensive), inflammatory (form of speech that is
used with the intent to stir up emotions), coercive (to make someone do something by using
force or threats), defamatory (say false things in order to make people have a bad opinion of
someone or something) or blasphemous (profane words and actions, especially when they are
connected to something religious)
 racist, exploitative, violent messages
 use of illegal materials in messages

Copyright
Emails are subject to copyright laws. It is important that the recipient checks before printing,
copying or forwarding an email if the sender has indicated that the message is confidential.

Netiquette
Netiquette is shortened from the phrase internet etiquette, which refers to the need to respect other
users’ views and display common courtesy when posting views in online discussion groups or when
sending out emails.

Dina El-Akkad 109


ICT I.G.C.S.E.
Rules of netiquette:
1. Don’t be abusive – don’ threaten people or use personal violence
2. Don’t send spam
3. Be clear with your message
4. Remember that posts can be read by anyone
5. Always check your spelling and grammar – have a good impression
6. Respect people’s privacy
7. Forgive people’s mistakes
8. Don’t use CAPITAL LETTERS to highlight comments – this is seen as shouting
9. Don’t plagiarise – always acknowledge quotes used in messages you write
10. Don’t use too many emotions as they might annoy the reader

10.1.2 Email groups:


Email groups are used for a number of purposes:
 it is easier for a user mails if the addresses are all grouped together under a single name.
 companies and organisations can group people together for marketing purposes.
 ‘spammers’ can create email groups by buying addresses of people from certain companies.
 Companies use email groups to set up meetings to ensure that everybody is invited to attend.

10.2 Effective use of the Internet:


10.2.1 General Internet terms:
Hypertext transfer protocol (hhtp and https)
http is a set of rules that must be obeyed when transferring data across the internet. If http is
omitted from the address, most web browsers default to http.
When some form of security (e.g. SSL or TLS) certification or encryption is used then the protocol
is changed to https. https is slower than http.

Web browsers and URLs


A web browser is software that allows a user to display a web page on their computer screen. They
translate the HTML from websites and show the result of the translation. Most web browsers share
the following features:
 ‘home’ page
 ability to store a user’s favourite websites/pages
 keep a history of the visited websites
 ability to go backward and forward though websites opened
 have hyperlinks
Dina El-Akkad 110
ICT I.G.C.S.E.

Web browsers use uniform resource locator (URLs) to access websites and retrieve file. The web
browser breaks up the URL into three parts:
Protocol://website address/path/filename
Example:

http://www.hoddereducation.co.uk/igcse_ICT

This is the
This is the web This is the file name
protocol used
server’s name used (often the web page)

The web browser translates the web server name into an IP address. The HTML is returned and is
shown as a correctly formatted page on the screen.

File transfer protocol (ftp)


FTP is a network protocol used when transferring files from one computer to another computer over
the internet.

10.2.2 Blogs, wikis and social networking sites:


Blogs
Blogs (web logs) are personal internet journals where the writer (or blogger) will type in their
observations on some topic (e.g. a political view) or perhaps provide links to some relevant
websites.
Blogs tend to range from minor projects where people just gossip about some topic (such as the
performance of an actor in a recent film) through to important subjects such as politics, advertising
products or raising awareness of a certain key event taking place.
The comments made on blogs are not immune from the law.

Features of blogs:
 updated on a regular basis by the author
 usually organised in reverse chronological order (most recent to least recent entry)
 normally public – anyone can read them
 entries normally come from a single author
 other internet users can’t change blogs – they can only read them and comment

Dina El-Akkad 111


ICT I.G.C.S.E.
Microblogs are similar to blogs but are most often used on social networking sites to make short,
frequent posts. The posts can be done using instant messaging, emails or other social networking
vehicles (such as tweets).

b-blog –short for business blogs – is used by business to promote themselves on the internet.

Wikis
Wikis are web applications or websites that allow users to create and edit web pages using any web
browser.

Features of wikis:
 anyone can edit, delete or modify the content
 many authors can be involved in a wiki
 it is possible to organise a page any way that the author(s) wish(es)
 shows / keeps track of all entries – i.e. it stores a document history
 can be easily edited using a web browser
 allows large documents to be seen by many people – it is easier than emailing several people,

Social networking sites


Social networking sites focus on building online communities of users who share the same interests
and activities. They enable people to share photos, videos and music, hobbies, favourite eating
places, and so on.

Features of social networking sites:


 each member is provided with free web space
 each member can build their own private and public profiles
 it is possible to upload contents such as text messages, photos and videos
 it is possible to ‘write on each other’s wall’
 members are given free instant messaging and video chatting
 it is possible to email other members within the community
 members can create pages where they can post photos, articles, and so on.
 It is possible to invite people to become friends
 members have control over who can access their private or personal data

Dina El-Akkad 112


ICT I.G.C.S.E.
10.2.3 Searching the Internet for information:
To locate the information:
1. type the URL if you know the name of the website
2. use a search engine if you don’t know the name of the website

Once the information is found it can then be saved or used as follows:


 saved as a favourite and accessed when required
 by adding hyperlinks in a document, so that this web page can be accessed when required
 by using ‘Print Screen’ and then pasting the saved information into a word processor page
 copy and pasting the information into another document
It is important to acknowledge your sources of information to avoid plagiarism and because the
information may be subject to copyright.

Advantages of the Internet as a source of information:


1. Information is up to date since it is quicker and easier to amend web pages than reprint books
2. The internet has vast amount of information
3. Searching for information using a search engine is fast and easy.
4. You can access the Internet from anywhere no need to travel to a library.
5. Information on the internet is usually free of charge
6. Pages on the internet can have multimedia elements that make learning more interesting.

Disadvantages of the Internet as a source of information:


1. The internet is no regulated – anything can be posted so information may be biased or totally
incorrect. Books usually undergo some form of review before being published.
2. There is always the risk of accessing inappropriate websites when using search engines.
3. It is easy to be distracted when searching the internet by computer games and social networking
sites.
4. There is always the risk of ‘information overload’ If the user lacks the experience when using
search engines.
5. Because it is very easy to copy material from the internet, there is huge risk of plagiarism.
6. Some research skills are lost when using the internet as search engines do all the work for you.

Why are internet searches to find relevant information not always fast?
It is possible for millions of sites to be found matching a given criteria. Unless the user narrows
down their search criteria it can take a long time to find out exactly what they are looking for.

Dina El-Akkad 113


ICT I.G.C.S.E.
While search engine companies deny it, certain websites are also placed at the top of their lists.
These websites in the list always show up first in the search results and may not contain exactly
what the user is looking for. Search engines also rank the time it takes to load up pages from
websites – the fastest are given priority when the results appear on the screen. So a user may not
find exactly what they are looking for when using the search engine.

Why isn’t it always easy to find reliable information on the internet?


Anybody is able to set up a website and write whatever they like without it having to be first
verified. Unlike books, the material posted on websites doesn’t have to be checked by other people
to ensure it is factually correct. It is also possible for search engines to suggest websites that are
completely out of date.

How can you evaluate the reliability of information found on the internet?
 Anybody can set up a website so information is not necessarily reliable or accurate.
 Some commercial websites will be biased to advertise their products.
 If a website has excessive advertising it could be unreliable.
 If the advertising on a website is related only to its own products it could be unreliable.
 It is possible to use the final part of a URL to identify a website’s reliability – websites ending
with .ac and .gov are more likely to be reliable
 endorsements - has the website been recommended by a trustworthy organisation?
 If a website has testimonials, this can indicate reliability.
 If the date of the last update was a long time ago it is likely to be unreliable or out of date.
 links to and from the website - do the links reference websites that are decent, legal, honest and
reliable?
 comparing the information on the website with information from other reliable websites or
textbooks.

WISHING YOU ALL THE BEST OF LUCK


LOVE YOU ALL :* :* :*
References:
Brown, G., Sargent, B. & Watson, D. (1995), Cambridge IGCSE ICT. London, UK: Hodder
Education.
Brown, G. and Watson, D., IGCSE Information and Communication Technology. London, UK:
Hodder Education

Dina El-Akkad 114

You might also like