Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
ICT IGCSE Theory – Revision Presentation
What is Hardware?
• Hardware are the physical components which make up the computer system.
• Each item of hardware have their specific roles in a computer system.
• Hardware components can either be internal or external.
2
ICT IGCSE Theory – Revision Presentation
Motherboard
The motherboard is circuit board which is connects to main
components of the computer system.
Memory
Any data or instructions that are to be processed by the CPU must
be placed into main memory.
3
ICT IGCSE Theory – Revision Presentation
Sound Card
A sound card is a device that attaches to the motherboard to enable
the computer to input, process, and deliver sound
4
ICT IGCSE Theory – Revision Presentation
Network Card
A network card provides the computer with a network (internet
connection) either through wireless signals or a physical cable
connection.
Optical Disk Drive
The optical disk drive (CD/DVD/Blu-Ray) allows for optical disks to
run on the computer. Also some optical disk drives are able to write
“burn” data onto discs.
Power Supply
The power supply is connected to main power sources to give
power to the computer system. The power supply connects to all the
main components of the computer system including the
motherboard, hard drive, optical drives etc.
5
ICT IGCSE Theory – Revision Presentation
6
ICT IGCSE Theory – Revision Presentation
Computer Software
What is Software?
7
ICT IGCSE Theory – Revision Presentation
Application Software
Examples Application software are designed to allow users to
• Word Processor complete specific tasks. This may be to:
• Spreadsheet • Write a letter/Present information
• Databases
• Browse the internet
• Manipulate data in a spreadsheet or database
• Manipulate graphics, sound or video.
System Software
Examples System software are normally involved in the running
• Operating of the computer:
Systems • Operating systems to provide a user interface
• Device Drivers
• Utilities • Device drivers which allow hardware components to
(antivirus) work.
• Utility software which maintain the computer
performance.
8
ICT IGCSE Theory – Revision Presentation
9
ICT IGCSE Theory – Revision Presentation
10
ICT IGCSE Theory – Revision Presentation
11
ICT IGCSE Theory – Revision Presentation
System
Software
Utilities Compiler
12
ICT IGCSE Theory – Revision Presentation
13
ICT IGCSE Theory – Revision Presentation
14
ICT IGCSE Theory – Revision Presentation
Main Memory
Temporary data from Applications in use are held in the Main Memory.
The CPU will first check the Cache for the required piece of the data so that it can
be processed.
If the data is not in the cache then the CPU will check the RAM and transfer data to
the CPU.
The Cache will then transfer the next piece of data from the RAM into Cache.
The CPU will again check the Cache for the next piece of data. This time the CPU will
be able to get the data from the Cache Memory.
15
ICT IGCSE Theory – Revision Presentation
Main Memory
16
ICT IGCSE Theory – Revision Presentation
Cache
17
ICT IGCSE Theory – Revision Presentation
• Temporary storage.
• Volatile
• Read and write.
• When the computer is turned off all data is lost
18
ICT IGCSE Theory – Revision Presentation
19
ICT IGCSE Theory – Revision Presentation
An input device is a device that can pass date into the computer
Devices that take data from the computer are known as output devices.
20
ICT IGCSE Theory – Revision Presentation
21
ICT IGCSE Theory – Revision Presentation
• Define and describe operating systems which contain a Command Line Interface
(CLI)
• Define and describe operating systems which contain a Graphical User Interface
(GUI)
• Describe the differences, including the benefits and drawbacks, between operating
systems which contain a CLI and those which contain a GUI
22
ICT IGCSE Theory – Revision Presentation
Helping save,
organise, find and Manages input,
delete files output and backing
devices.
23
ICT IGCSE Theory – Revision Presentation
24
ICT IGCSE Theory – Revision Presentation
GUI
Icons -small images Pointers –Mouse
used to represent pointer can be used
files/folders or to select and open
applications files/applications
25
ICT IGCSE Theory – Revision Presentation
26
ICT IGCSE Theory – Revision Presentation
• CLI requires the user to enter command prompts to interact with the
computer.
• CLI are normally used by expert users as it allows them to is more
complicated to use.
• CLI and is not restricted to a number of predetermined options.
27
ICT IGCSE Theory – Revision Presentation
28
ICT IGCSE Theory – Revision Presentation
29
ICT IGCSE Theory – Revision Presentation
Desktop/Personal Computer
30
ICT IGCSE Theory – Revision Presentation
Describe the characteristics of a laptop computer and what it is used for, both as a
standalone and networked computer
Laptop Computer
Standalone Networked
Can be used for either personal • Connect to Internet
or work use. • Share resources
• Completing work • Share files
• Communication • Shared Drives
• Gaming • Central Storage
• Online Gaming
31
ICT IGCSE Theory – Revision Presentation
Describe the characteristics of a tablet computer and what it is used for, including
its ability to use wireless technology or 3G/4G technology
Tablet Computer
Wireless 3G/4G
Tablets are able to connect to 4G is a mobile communications
any wireless networks. standard intended to replace 3G,
allowing wireless Internet access
Users are able to use the at a much higher speeds.
internet as long as they are in
range. Would allow for internet
connection on the move.
32
ICT IGCSE Theory – Revision Presentation
Smart Phone
• Smart phones can use traditional methods to make
phones calls and send messages using mobile network.
• Smart phones have operating systems which allows
them to run multiple applications.
• Like the Tablets Computers Smart Phones have many
features including:
• Touch Technology
• Internet connection (Wireless/3G/4G)
• Sensors
• Cameras
Use
• Send and receive emails
• Browse the internet
• Voice over Internet Protocol (Voip) – voice/video calls.
• Streaming music/video content
• Communication via social networking applications
• Global Positioning System – to help navigate
33
ICT IGCSE Theory – Revision Presentation
34
ICT IGCSE Theory – Revision Presentation
• Describe how emerging technologies are having an impact on everyday life (e.g.
artificial intelligence, biometrics, vision enhancement, robotics, quantum cryptography,
computer-assisted translation, 3D and holographic imaging, virtual reality
35
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
Artificial intelligence (AI) is computer systems that can simulate human intelligence
(able to make decisions typically made by a human).
36
ICT IGCSE Theory – Revision Presentation
Artificial intelligence (AI)
37
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
Eye Recognition
• No physical contact is required to scan the iris which may be useful in some cultures.
• Immigration at airports use eye recognition to prevent people travelling with fraudulent
documentation.
Facial and voice recognition is also another form of biometrics. The main purpose of
biometrics is to improve security with regards to access to computer systems.
Emerging Technologies
Vision Enhancement uses video technology which is projected to the user though
the lens. The system can bring distant objects closer and into focus.
• The vision enhancement system amplifies infrared light so that an image can be
clearly seen even in darkness.
• Militaries across the world use this technology to complete missions and carry
out surveillance at night.
39
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
40
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
Quantum Cryptography
41
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
Computer-assisted Translation
CAT is where a human translator uses computer software to help in the translation
process.
42
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
43
ICT IGCSE Theory – Revision Presentation
44
ICT IGCSE Theory – Revision Presentation
Emerging Technologies
Uses:
1. Training: Allow professionals to conduct training in a virtual
environment without the threat of any physical harm.
45
ICT IGCSE Theory – Revision Presentation
• Eye Goggles
• Special Gloves
• Headphones
• Powerful Computer
46
ICT IGCSE Theory – Revision Presentation
Input and output devices
• Identify input devices and their uses, e.g. keyboard, numeric keypad, pointing devices
(such as mouse, touchpad, tracker ball), remote control, joystick/driving wheel, touch
screen, scanners, digital cameras, microphone, sensors (general), temperature
sensor, pressure sensor, light sensor, graphics tablet, video camera, web cam
47
ICT IGCSE Theory – Revision Presentation
Input Central
Processing Unit
Output
Devices (CPU) Devices
Storage
48
ICT IGCSE Theory – Revision Presentation
Input Devices
49
ICT IGCSE Theory – Revision Presentation
Input Devices
50
ICT IGCSE Theory – Revision Presentation
Input Devices
51
ICT IGCSE Theory – Revision Presentation
Input Devices
52
ICT IGCSE Theory – Revision Presentation
Input Devices
53
ICT IGCSE Theory – Revision Presentation
Input Devices
Light Pens • Used in CAD • More accurate than • Only used with
applications for touch screens CRT Monitors
drawing onscreen • Small in size • Dated
Technology
54
ICT IGCSE Theory – Revision Presentation
A sensor is a device that converts a real world property into data that a
computer can process.
Sensor Example Use
Temperature Used in green houses to measure temperature
Light Umpires check light conditions in cricket match
Moisture To check the moisture in the soil in a green house
Water-Level Used in washing machine to measure water level
Proximity Used when parking cars to judge distance.
Movement Detects movement which could trigger an alarm
Pressure Used in burglar alarms
55
ICT IGCSE Theory – Revision Presentation
56
ICT IGCSE Theory – Revision Presentation
• Describe direct data entry and associated devices, e.g. magnetic stripe readers, chip
and PIN readers, Radio Frequency Identification (RFID) readers, Magnetic Ink
Character Reader (MICR), Optical Mark Reader (OMR), Optical Character Reader
(OCR), bar code reader
• Identify the advantages and disadvantages of any of the above devices in comparison
with others
57
ICT IGCSE Theory – Revision Presentation
Magnetic Strip Readers are used to read data found on magnetic stripes
found on the back of cards.
USE:
Bank Cards: Contains Account details
Arcade: Contains balance
Security/Hotel Rooms: Allows entry to specific room.
Gift Cards (Vouchers) – amount of vouchers
Advantages: Disadvantages
• Fast data entry • Stripe could become
compared to keyboard unreadable - scratched
• Secure/Error Free – No • Does not work at a
Typing distance
• Not effected by water • Easily Lost/misplaced
and robust if dropped
• Easily Updated
58
ICT IGCSE Theory – Revision Presentation
Chip and Pin Readers are used POS terminals to make a secure payment
using a debit or credit card.
USE:
Users can make payment at shops, restaurants by simply
inserting their credit/debit card into the chip and pin reader
and typing in their pin.
Advantages: Disadvantages
• Secure method of • The pin could be read by
payment compared to some one watching or use
swipe and contactless of mirrors.
method. • Fraudulent machines can
• Chip is less likely to be copy card details.
damaged compared to a
magnetic swipe.
59
ICT IGCSE Theory – Revision Presentation
Contactless Cards Readers are used by customers to pay for products at the
POS without the need to enter a PIN Number using RFID technology.
Transactions are normally restricted to a small amount (up to £20)
How it works
The payment terminal picks up a signal from the chip to
process and complete the transaction when the card is
within a few centimetres distance.
Advantages: Disadvantages
• Quicker Transaction • Less secure than chip and
meaning less time spent pin method.
at POS. • Anyone could use card
• Don’t have to use PIN if lost.
• Transaction data • It is easer for thieves to
(account details) is copy details of the card.
encrypted. • Only small payments can
be made
60
ICT IGCSE Theory – Revision Presentation
RFID
Radio Frequency Identification
RFID reads information stored on tags (small silicon chip that can be placed
on a sticker) using radio waves. RFID tags can be attached to objects or
animals/people.
USE:
• Track movement of animals (livestock) or people
• Stock Control: Scan stock items for quantity
• Airports: Track Luggage to make sure nothing is lost
• Contactless cards to make a payment
Advantages: Disadvantages
• Can read objects from a distance. • Radio symbols can be
• Can read in bulk jammed or hacked.
• Very fast reading – quick response • More expensive than a
• Allows read/write operations to barcode
take place • Tags could interfere
• Can read biometric readings with each other.
61
ICT IGCSE Theory – Revision Presentation
MICR
Magnetic Ink Character Reader
MICR is able to read characters printed in a special ink. These characters are
then converted into a form which could be understood by the computer
USE:
Used to process bank cheques. The characters at the
bottom of cheque which are printed in a special ink
are read by the Magnetic Ink Character Reader.
Advantages: Disadvantages
• No need to manually • More expensive than
enter text – less chance using a keyboard to
of human error. type manual data.
• Characters can not be • Limited amount of
altered. characters can be
• Characters can be read read.
even if they have been
written over.
62
ICT IGCSE Theory – Revision Presentation
OMR
Optical Mark Reader
OMR is able to read marks written in pen or pencil. The position of the mark
is stored in the computers memory.
USE:
Used to scan in marks from multiple choice exams, surveys,
and lottery tickets.
Advantages: Disadvantages
• Very fast method of • Forms have to be
inputting data as no user completed correctly to
has to manually enter avoid manual checks which
results. would waste time.
• More accurate than OCR
• Less chance of errors
63
ICT IGCSE Theory – Revision Presentation
OCR
Optical Character Reader
OCR scans text from hardcopies and converts it into an editable form which
can be used and edited in a range of software including word processors.
USE:
Used in Self-Immigration System at Airports.
Identity Cards
Students scanning text from books which can be
edited.
Advantages: Disadvantages
• Faster method of data • Not as accurate as
entry compared to the OMR reader
manually typing the • Unable to read
data. handwriting.
• Less chance of errors.
64
ICT IGCSE Theory – Revision Presentation
Barcode Scanners are used to scan bar codes which contains unique
information about a product including price.
USE:
Barcode readers are typically used at point-of-sale
(POS) in shops when customers are purchased goods.
Advantages: Disadvantages
• Far quicker and more • Barcode could be
accurate than typing in unreadable or
codes using a keypad. missing.
• Stock database can • Barcode could be
easily be updated with swapped.
new prices – barcodes • Can be an expensive
would not need to be system.
replaced.
65
ICT IGCSE Theory – Revision Presentation
• Identify output devices and their uses, e.g. CRT monitor, TFT/LCD monitor, IPS/LCD
monitor, LED monitor, touch screen (as an output device), multimedia projector, laser
printer, inkjet printer, dot matrix printer, wide format printer, 3D printer, speakers,
motors, buzzers, heaters, lights/lamps
• Describe the advantages and disadvantages of any of the above devices
66
ICT IGCSE Theory – Revision Presentation
Advantage: Cheaper than other monitors and can be used with light pens.
Resolution is also very good.
Use: Have taken over from CRT as primary output display for computers. Also
primary output for monitors.
Flat Screen
Advantage: Smaller and lighter so less desk space required.
Consumes less power and does not generate as much heat as CRT monitors.
67
ICT IGCSE Theory – Revision Presentation
Advantage: Has wide viewing angles by altering the direction of the pixels Flat Screen
within the display. Colour reproduction is better than other monitors.
Use: LED monitors are generally used outdoors in store signs, destination
signs and billboards due to their level of brightness.
Advantage: LEDS produces better light which improves the colour definition Flat Screen
and can be used outdoors in different types of light. LED are also energy
efficient and can last along time.
68
ICT IGCSE Theory – Revision Presentation
69
ICT IGCSE Theory – Revision Presentation
70
ICT IGCSE Theory – Revision Presentation
71
ICT IGCSE Theory – Revision Presentation
72
ICT IGCSE Theory – Revision Presentation
Actuators are part of the control process – digital signals are sent by the
computer to actuator to affect or control the real world.
Type Use
Motors • Washing machines
(Spins things • Control Fans
around) • Control Robot Arms in manufacturing
73
ICT IGCSE Theory – Revision Presentation
Storage devices and media
• Identify storage devices, their associated media and their uses, e.g.
• Magnetic backing storage media: fixed hard disks and drives, portable and
removable hard disks, portable and removable hard drives, magnetic tape drives
and magnetic tapes, memory cards
• Optical backing storage media (CD/DVD/Blu-ray): CD ROM/DVD ROM, CD
R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray discs
• Solid state backing storage: solid state drives, flash drives (pen drive/memory
stick/USB stick)
74
ICT IGCSE Theory – Revision Presentation
What is Storage
• Storage medium is the name given to the device that actually holds the data.
75
ICT IGCSE Theory – Revision Presentation
Hard Drive
Increase in
8 TB
storage capacity
Magnetic Tape
Up to 185 TB
76
ICT IGCSE Theory – Revision Presentation
Type of Access
Start 1 2 3 4 5 6 7 8 9 End 10
Start 1 2 3 4 5 6 7 8 9 End 10
77
ICT IGCSE Theory – Revision Presentation
Main Memory
• Sometimes known as Internal Memory or primary memory.
• Includes RAM and ROM
• Usually used to store data temporarily (in the case of RAM).
• Usually used to store data while it is being processed by the CPU.
• Is volatile – means data will be lost if computer is turned of.
Backing Storage
• Backing storage some known as secondary storage.
• Name for all other storage devices which are part of a computer
like hard drive.
• Usually used to store data over a long time.
• Usually used to store application software, operating system
software, files etc.
• Is Non-volatile - Means data will not be lost of computer is
turned off.
78
ICT IGCSE Theory – Revision Presentation Fixed Internal
Hard Drive
Magnetic Storage Devices
79
ICT IGCSE Theory – Revision Presentation
Portable
Magnetic Storage Devices Hard Drive
Use: This device connects to the computer using the
USB Port. External Hard drives are used to
store:
• Personal backup data.
• Transfer files between computers/devices
80
ICT IGCSE Theory – Revision Presentation
Magnetic
Magnetic Storage Devices Tapes
Use: • Large organisations make daily backups of
their networks on to Magnetic Tapes
• Long-term archiving of data.
81
ICT IGCSE Theory – Revision Presentation
CD-ROM
Optical Media
• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Hold more data than • Data transfer rate is
floppy disks. slower compared to • Data is read by
• Cheaper than hard other storage medium. bouncing the laser
drives and USBs. • Not Robust - easily be beam off the surface
• Compatible with audio damaged or scratched. off the medium.
systems.
82
ICT IGCSE Theory – Revision Presentation
DVD-Rom
Optical Media
• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Hold more data than CD- • Data transfer rate is
ROMS. slower compared to • Data is read by
• Can store larger other storage medium. bouncing the laser
applications. • Have to buy a separate beam off the surface
• Videos is higher DVD player. off the medium.
resolutions.
83
ICT IGCSE Theory – Revision Presentation
Blu-Ray
Optical Media
• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Large storage capacity used • More expensive compared
to store HD video content. to other optical media. • Data is read by
• Access Speeds are greater • Separate player required – bouncing the laser
than other optical medium. more expensive.
• Secure Encryption System to • Not all movie titles beam off the surface
minimise chance of available on Blu-Ray. off the medium.
copyright.
84
ICT IGCSE Theory – Revision Presentation
Optical Media
85
ICT IGCSE Theory – Revision Presentation
Solid ‘state’
• Solid-state storage devices are based on electronic circuits with no moving parts.
• Solid-state storage devices store data using a special type of memory called flash
memory.
• USB/Memory Cards use Direct Access
Examples USB Memory Stick Memory Card
Uses: Used to transfer files/backup Used to store files on digital cameras,
(work) between computers. mobile phones and mp3 players.
Advantages • Portable & Small • Very small and can be removed
• Robust and placed in other devices.
• large capacities • Robust
• No need for additional
drivers/software
Disadvantages • Easy to loose • Smaller storage capacities.
• USB could be damaged if not • Quite expensive.
ejected correctly.
86
ICT IGCSE Theory – Revision Presentation
Backup
Why?
• You could delete a file by accident
• Your computer could break down
• Your computer could get infected by a virus which could edit
data
• Your laptop is stolen or becomes damaged.
• Data could be corrupted by hackers.
• If this data is lost, then this would cause disruption to the business. Backing-
up business data is essential.
87
ICT IGCSE Theory – Revision Presentation
Personal Backups:
• Burning files to a CD-R
• Copying files to an external hard-drive
• Copying files to a USB
• Copying the files to another computer on a network
Business Backups:
• Making copies of data very regularly (daily).
• Using large-capacity media such as magnetic tape
• Keeping old copies of backups, just in case.
• Automating the system so that nobody forgets to do
it!
• Keeping backup media off-site (in case of fire or theft)
88
ICT IGCSE Theory – Revision Presentation
Networks and the effects of using them
• Understand how a router works and its purpose
• Understand the use of other common network devices, including: network interface
cards, hubs, bridges, switches, modems
• Understand the use of WiFi and Bluetooth in networks
• Understand how to set up and configure a small network, including: access to the
internet, the use of a browser, the use of email, access to an ISP
• Understand the characteristics and purpose of common network environments, such
as intranets and the internet
• Understand the advantages and disadvantages of using different types of computer to
access the internet
89
ICT IGCSE Theory – Revision Presentation
Wireless
Access Bridge
Point
Cables
Wireless
Switch
90
ICT IGCSE Theory – Revision Presentation
Overview
91
ICT IGCSE Theory – Revision Presentation
92
ICT IGCSE Theory – Revision Presentation
Internet
S R
93
ICT IGCSE Theory – Revision Presentation
A Hub and a Switch both connect a number of computers together to make a LAN.
Switch Hub
94
ICT IGCSE Theory – Revision Presentation
2 2
You always start Switch Table
with an empty 1 S 3 1 3
Work
station
Mac S
switch table. Address
1 AA-AA-AA
The switch will 4 4
learn each 2 BB-BB-BB
workstations 3 Sending Packets of Data from Sending Packets of Data from
MAC address Workstation 1 – 2 Workstation 2 – 1
when it sends a 4
packet of data The switch will send data Now the switch table has the
across the packets to all computers MAC address for workstation 1
because it does not know the it is possible for workstation 2
network.
MAC address for Workstation 2. to send a direct pack of data.
95
ICT IGCSE Theory – Revision Presentation
Bridges
A bridge is used to connect two parts of a LAN network together
so they function as a single LAN. Two Switches can be connected
using a the Bridge Device.
Switch Bridge Switch
96
ICT IGCSE Theory – Revision Presentation
WiFi is a wireless networking technology makes it possible to connect devices with a wireless connection to a
network or to a single computer .
• Reduced cost of cabling/Safer – won’t trip over wires
• Easier to connect other devices to the network
• Makes the computer portable as long as it’s within range of the wireless access point
97
ICT IGCSE Theory – Revision Presentation
• Laptops
Wi-Fi • Mobile Phones, PDAs and other handheld devices
• Large computers which are WiFi enabled.
98
ICT IGCSE Theory – Revision Presentation
Setting up a Network
99
ICT IGCSE Theory – Revision Presentation
100
ICT IGCSE Theory – Revision Presentation
WLAN
• A wireless LAN (WLAN) is a LAN that uses
AP
radio signals (WiFi) to connect computers
instead of cables.
101
ICT IGCSE Theory – Revision Presentation
Internet • Internet is Public (available to all Typical uses of an internet would be:
users)
• Internet is network of networks • Viewing web pages
• Internet is global • Sending and receiving e-mail messages
• Internet has more information than • Sharing files
• Communicating using voice (VOIP)
an intranet and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking
Intranet • Intranet is within one organisation Typical uses of an intranet would be:
(Private)
• Intranets tend to be • Viewing internal web pages (e.g.
policed/managed company schools, university's etc.)
• Intranet has an extra layer of security • Internal e-mail and instant-
messaging between workers
• Data found in an intranet is likely to Sharing of internal documents
•
be more reliable/relevant than that
found on the Internet
102
ICT IGCSE Theory – Revision Presentation
103
ICT IGCSE Theory – Revision Presentation
• Network communication
104
ICT IGCSE Theory – Revision Presentation
Security Issues
105
ICT IGCSE Theory – Revision Presentation
Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.
106
ICT IGCSE Theory – Revision Presentation
When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.
Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.
Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.
107
ICT IGCSE Theory – Revision Presentation
Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the
• Retina Scan network.
• Iris Scans Can not copy/replicate biometric data
• Face Scans •
• Vocal Recognition
Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).
Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.
108
ICT IGCSE Theory – Revision Presentation
A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.
Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.
Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.
109
ICT IGCSE Theory – Revision Presentation
Encryption
Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure
111
ICT IGCSE Theory – Revision Presentation
Proxy Server
112
ICT IGCSE Theory – Revision Presentation
Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.
113
ICT IGCSE Theory – Revision Presentation
Network communication
Type of Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or
• Physical documents are printed and can be ink (toner).
signed. • No notification of fax received.
Email • Can send multiple attachments. • Email attachments may include
Communication • Can send to multiple recipients in one viruses.
message. • May receive spam (unwanted
• Emails can be received instantly and accessed mail).
on many platforms including tablets and • May receive phishing (scam)
phones. emails to obtain personal data.
Electronic Faxing • Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.
114
ICT IGCSE Theory – Revision Presentation
Network communication
115
ICT IGCSE Theory – Revision Presentation
Network communication
• Screen/Monitor
Advantages • No need to travel to have meetings which would cut down
on travelling costs (including flights and hotel) and
travelling time.
• Video conference can be held at short notice. Speaker
Facilitates long distance learning – students can access live •
•
lectures without travelling.
116
ICT IGCSE Theory – Revision Presentation
Network communication
117
ICT IGCSE Theory – Revision Presentation
The effects of using IT
• 5.1 Effects of IT on employment
• 5.2 Effects of IT on working patterns within organisations
• 5.3 Microprocessor-controlled devices in the home
• 5.4 Potential health problems related to the prolonged use of IT equipment
118
ICT IGCSE Theory – Revision Presentation
Effects of IT on employment
119
ICT IGCSE Theory – Revision Presentation
The use of computers have changed the way we complete our work. Employees now don’t
necessarily have to be in the office to complete set tasks.
Remote Working: Employees are Advantages Disadvantages
able to access their office desktop
computer from a different location Employee Employee
(home).
• Do not have to make child care • Lack of interaction (including
arrangements – spend more social) with staff and
time with family. management.
• Employee can work at a • Employee could be easily
Use of Intranet: Employees can log convenient time for them. distracted working from
into an intranet to communicate • Save time/costs on travelling. home.
and access shared resources with • Could be overlooked for
Employer
other staff. promotion opportunities.
• No need to provide desk/office
space. Employer
Use of Internet: Employees can
check their emails or have web • Employees may be happier and • It could be harder to check
conferences with peers. productive working at home. what the employee is up to.
120
ICT IGCSE Theory – Revision Presentation
The introduction of ICT in the work places has allowed employees to work a more flexible time
rather than the rigid traditional office hours of 9-5. The four main types of Employee working
patterns are Full Time, Compressed, Part Time and Job Share.
Full Time:
• Employees will normally work
over 5 full days.
• Typically 9am till 4 or 5pm.
• Will complete between 35 –
40 hours a week.
Compressed Hours:
• Employee are still working
full time hours.
• However the same amount of
hours are completed over
less days.
• Employees will work more
hours in one day.
121
ICT IGCSE Theory – Revision Presentation
Job Sharing:
• Full time job is divided
between two part time
employees.
• Both employees do the same
job – same responsibilities.
• One employee could work in
the morning and the other in
the afternoon or the first or
second part of the week.
122
ICT IGCSE Theory – Revision Presentation
Microprocessors are found in many household devices. These devices could either be labour-
saving devices, leisure or more for connivance.
Advantages Disadvantages
• Devices do much of the housework chores including: • People can become over reliant on
• Cooking Food these devices and can become lazy.
• Washing clothes or dishes
• Tasks do not need to be done manually which means: • Can lead to unhealthy eating due to
• Do not need to be in the house when food is cooking or dependency on ready meals.
clothes are being washed.
• More time to spend with family and friends. • Manual household skills are lost.
• More time for leisure activities or to complete work.
• Can encourage a healthy lifestyle because of smart fridges
analysing food ingredients.
• Do not have to leave home to get fit.
• Burglar alarm provides a sense of security.
123
ICT IGCSE Theory – Revision Presentation
124
ICT IGCSE Theory – Revision Presentation
125
ICT IGCSE Theory – Revision Presentation
Paper Based
Types of Communication & Purpose Use of Computers
News Letter: Used by companies to communicate certain information to staff and • Save and insert pictures
customers. May contain information on recent events and identify success from clipart, Internet,
company may have experienced. scanned images & digital
camera.
Brochures/Leaflet: Can be used to advertise a company or to be informative. • Adjust the page layout.
Brochures are normally printed on glossy paper with a high quality finish. • Create and Insert
Tables/charts
Flyers: Informative document which can be distributed to promote or create • Formatting the layout of
awareness of an up and coming events. the document.
• Applying effects to
Posters: larger then flyers and are strategically positioned to promote and create images (crop, colour
awareness. Displayed on billboards, notice boards, buildings as part of an scale, rotate etc.)
advertising campaign to target a specific target audience. Text Formatting
• Font Style
• Bold
Advantages Disadvantages • Alignment (left, centre,
• Not necessary to have a computer or • These communication would mainly be right and fully justified)
internet connection. distributed by hand. • underline
• You have a physical copy of the • Printing costs • Italic
document. • Restricted to a smaller target audience. • colour
126
ICT IGCSE Theory – Revision Presentation
Advantages Disadvantages
• Can include interactive elements • Websites can be hacked and
such as sound, video, animation and information may be altered.
hyperlinks. • Setting up website and maintaining
• Can be available on different would be expensive and would
platforms. require a special skill set.
127
ICT IGCSE Theory – Revision Presentation
Advantages Disadvantages
• Mobile phone is portable and can • Long distance calls or phones calls in
be used on the move. different countries could be expensive.
• Mobile phone contracts can offer • Mobile signal could be weak or non
free minutes and texts. existent in some places.
128
ICT IGCSE Theory – Revision Presentation
129
ICT IGCSE Theory – Revision Presentation
130
ICT IGCSE Theory – Revision Presentation
131
ICT IGCSE Theory – Revision Presentation
132
ICT IGCSE Theory – Revision Presentation
133
ICT IGCSE Theory – Revision Presentation
Describe how the microprocessor uses data from the light sensor in a
green house.
• Microprocessor compares light reading with preset value
• If lower than pre-set value microprocessor sends signal to switch on light bulb
• If higher than pre-set value microprocessor sends signal to switch off light bulb
• process is continuous/ monitoring of sensors is continuous
134
ICT IGCSE Theory – Revision Presentation
Turtle Graphics
135
ICT IGCSE Theory – Revision Presentation
Turtle Graphics
A student wishes to use a floor turtle to draw this shape which has no two lines the same
length:
Name four different instructions which the turtle graphics software could use in order to
draw the shape. For each one explain the meaning of the instruction.
136
ICT IGCSE Theory – Revision Presentation
• Pilots are able to learn how to fly a plane using a flight simulator.
• The controls and the interface is the same as real plane.
Flight • Different conditions can be tested.
Simulator • Reduced costs as a plane would not be damaged in the training.
• A traffic light simulator looks at the flow of traffic (data captured from
sensors).
Traffic Lights • The simulator will adjust the lights to best control the flow of traffic.
138
ICT IGCSE Theory – Revision Presentation
Robots are used in manufacturing to help to improve productivity, consistency (in terms of final finish) and to
reduce overall running costs. Robots generally make the factory a much more safer environment for workers.
How Are Robots Used in a Factory?
1. Lift heavy items
2. Assemble parts together
3. Paint items (Spraying)
4. Manufacturing Microchips
Advantages Disadvantages
• Robots can work 24/7 with the same consistency and Robots cannot easily adapt to a situation which is beyond their
accuracy compared to humans. sequence of instructions.
• Robots can be more productive than humans. Robots can be expensive to buy and maintain.
• Robots can work in extreme conditions not suitable for Some workers may loose their jobs as robots can do more labor
humans. intensive jobs.
• Robots do not need to be paid. People are deskilled due to robots doing more complicated
jobs.
139
ICT IGCSE Theory – Revision Presentation
Learner • Teachers will be able to click on a particular class and complete the register.
Registration • Once this is saved then other users of the management system can see who has been
and Attendance register for that particular period.
• This is useful as it allows teachers to see who should be attending their lessons.
• Data of attendance can then be easily analysed.
Exam • Exam Timetables can be produced using management systems and teachers who are
Timetables not teaching could be easily allocated to invigilate exams.
140
ICT IGCSE Theory – Revision Presentation
Online booking systems use real time processing which allows users to Input: User will select the
make and confirm bookings instantly. Once payment has been received
and booking is confirmed then booking can not be double booked. requirements of the
booking. E.g. date of flights,
Example Uses: Airports, Location etc.
Transport: Flight, Trains and Buses
Entertainment: Theatre, Cinema and Stadium Processing : involves
Accommodation: Hotels, Apartments and Villas
checking if bookings are
Advantages: Disadvantages possible (availability)
• User can check availability of tickets • It may be difficult to cancel a booking
and compare prices on comparison and get your money back.
websites.
• Online booking services have known Outputs:
• Confirmation message is sent to crash to high level of traffic to the booking confirmations
instantly once payment has been website.
authorised. /rejections
• You are unable to receive specific
• They prevent double booking as the advice on your booking if it is done alternatives/Payment
process is real time. This means if online.
somebody makes a booking then it
instantly becomes unavailable. • Websites may not be user friendly
• You may receive special offers if you and may make the booking process
regularly book using a particular more difficult.
booking website.
141
ICT IGCSE Theory – Revision Presentation
Employee 1
Business
+ £1500
Bank
EFT instruction to pay Employees
Account Employee 2
£4500 + £1500
-£4500 Employee 3
+ £1500
Advantages: Disadvantages
• No physical money is transferred which makes • Money could be transferred from the incorrect
the transfer more secure. account.
• Transfer of salaries can be regulated by the • Incorrect amount of money could be transferred
government (e.g. Used in Qatar to ensure by mistake.
employers are paying their employees on time). • If you have a poor credit rating then you may not
• Customers can set up standing orders (direct be declined to use EFT as a method of payment
debit) to pay bills on specific dates. (e.g. paying monthly for a mobile phone contract).
142
ICT IGCSE Theory – Revision Presentation
Transaction
Using details on the Declined. Card holder is paying by
card the Merchant’s Card.
bank contacts the card Card will be place in
holders bank to check chip and pin reader.
for sufficient funds to Merchant Card Holder Pin will be entered to
complete the proceed with
transaction. transaction.
143
ICT IGCSE Theory – Revision Presentation
Clearing of Cheques
144
ICT IGCSE Theory – Revision Presentation
ATM (Cash machines) can be used for various purposes (including cash withdrawal/deposit,
checking/printing statement).
145
ICT IGCSE Theory – Revision Presentation
Phone Phone banking is very similar to online banking • Can talk directly to a • Call costs
in that customers can complete similar tasks. representative from • May be put on hold
Banking the bank. for a long time.
Customers will have to enter in their account Ask additional queries Call times (9am-5pm)
• •
details to authenticate them to the system. which are not available are not flexible.
Then they will have to select from various online.
options by the specified numbers keys.
146
ICT IGCSE Theory – Revision Presentation
147
ICT IGCSE Theory – Revision Presentation
Computers are used in libraries to keep a track on which books have been borrowed by which
members. Databases software is typically used to store details of the books and the members.
Issuing of Books Advantages:
• Books and members can be identified by unique • Data from the books
barcodes which can be scanned in directly by and the members are
barcode scanners. entered quickly and
• When a book is taken out the bar code is scanned as more accurately
well as the barcode on the members card. compared to manual
• The due date is worked out by the date the book methods.
was issued.
148
ICT IGCSE Theory – Revision Presentation
Expert systems are used to provide expert opinions without the need for the expert by using a
system allowing the user to query the knowledge base to find solutions to their problems.
User
User Inference
Knowledge base
Interface Engine
149
ICT IGCSE Theory – Revision Presentation
Examples
150
ICT IGCSE Theory – Revision Presentation
POS (Point of Sale) is the place a transaction takes place. Customers can pay by cash or using
their debit/credit cards. Stock control systems can automatically update stock records when
items are purchased at the POS.
151
ICT IGCSE Theory – Revision Presentation
EFTPOS (Electronic Fund Transfer Point of Sale) is when a customer uses a card to complete a
transaction.
1. Customer gives bank card to cashier at POS.
2. The cashier enters the card in to the chip and pin reader
Pin entered has and confirms the value of the purchase.
to be correct for
the transaction 3. The customer is requested to enter their pin. If Pin
to continue. The matches the Pin stored on the chip then the transaction can
card will also be continue.
checked for
4. The shops computer will use the account details on the
validity (expiry If funds are not available a
chip to connect to the customers bank account and check
date/stolen). declined message will be
the balance.
sent to the stores
5. If funds are sufficient then the transaction will be computer. The cashier will
approved. then request for another
method of payment
6. The purchase amount is subtracted from the customer’s
account and deposited into the shops banks account.
152
ICT IGCSE Theory – Revision Presentation
Internet banking and shopping is becoming more popular to users due to the development of
the internet and the advancement of mobile internet technology.
Advantages Disadvantages
• Internet is now available on more platforms including • Online accounts could be hacked/cards
applications available on phones and tablets. details could be stolen.
• Internet can be accessed 24/7. • Users require a internet connection and
• No need to travel (saves money on travel/parking) need to be computer literate.
• Saves time (No need to que in the banks or shops) • Lack of socialising/exercising.
• Access to wide range of goods on the internet. • You can not see the goods before you
• Useful for individuals who find it difficult to travel and buy (try on clothes).
goods can be delivered directly to your home. • Delays in delivery.
• People can spend more time doing other leisure activities.
153
ICT IGCSE Theory – Revision Presentation
Recognition Systems are used to directly enter data into a computer system. Recognition
systems tend to be more accurate and quicker method of entering data into a computer system
compared to manual methods.
MICR Magnetic ink which are found at the bottom of the checks
are scanned in to MICR (Magnetic Ink Character Reader).
Sensors are used to detect a car (if its gone over the line)
Number Plates and a signal will be send to the microprocessor to take
the image of the number plate.
154
ICT IGCSE Theory – Revision Presentation
155
ICT IGCSE Theory – Revision Presentation
157
ICT IGCSE Theory – Revision Presentation
The effects of using IT
• 7.1 Analysis
• 7.2 Design
• 7.3 Development
• 7.4Testing
• 7.5 Implementation
• 7.6 Documentation
• 7.7 Evaluation
158
ICT IGCSE Theory – Revision Presentation
Systems Analysts will review an existing system which is currently not meeting
expectations. The steps shown below will be followed to develop a new system
which is fit for purpose.
Analysis: Collecting information about the present system and identifying problems.
Design: Designing a new system to correct the problems identified in the analysis.
Evaluation: Evaluating whether the new system meets the requirements of the
design requirements.
159
ICT IGCSE Theory – Revision Presentation
7.1 Analysis
Analysis techniques Advantages Disadvantages
Observation The use of the current system is • The analyst can obtain • Some employees may feel
observed to find out how it reliable information about uncomfortable being
works. the current system. observed
• Information will not be • Employees may perform
biased as it’s the analyst’s differently if they know
point of view. they being observed.
Interview People who use the system are • Can ask open ended • It can be a time
interviewed to get their questions to gauge to consuming process.
feedback. more feedback. • The interviewee cant
• Questions can be modified remain anonymous with
during interview. this method.
Questionnaire Questionnaires are distributed • Questionnaires can reach • Questionnaires may not
to employees/ customers to a larger audience. be completed accurately.
s • Questions can be • May not be all returned.
find out a range of opinions answered quickly using Can not expand or clarify
•
about the current system. tick boxes – cheaper answers to questions.
method of analysing.
Collecting Existing documentation for the • Analyst's can see how • It can be a time consuming
current system is analysed to current the paper system process.
Documents operates. • Due to the amount of time
identify what data is inputted Can obtain information required this is a costly
•
and outputted. critical to the system. method.
160
ICT IGCSE Theory – Revision Presentation
7.1 Analysis
Data which is inputted, Problems with the The requirements of the user
processed and outputted into current system are and the potential new system
the system are identified. identified. are identified.
Data may be paper based. What could be What is the new system meant
improved? to do?
• The next step will be to design a new system (normally computer based) to resolve the
problems identified by the users and the systems analyst.
• The Requirements Specification will be created which will outline the required
improvements and expectations for the new system.
161
ICT IGCSE Theory – Revision Presentation
7.2 Design
Based on the information from the analysis stage a new system will be designed. The new
system will hope to resolve the issues identified in the current system.
Users should be able to interact with a system via a data capture form so is it easier and quicker
to input data.
162
ICT IGCSE Theory – Revision Presentation
7.2 Design
163
ICT IGCSE Theory – Revision Presentation
7.2 Design
Presence Check To check if the data has been entered (is it present).
Range Check To check the data entered is in the correct range (Year 7 -12).
Length Check To check if item of text is too short or too long (check if full number has been entered).
Type Check To check if the type of data entered is correct (no letters in a numeric field).
Format Check To check if the data has been entered in the correct format (Date – DD/MM/YYYY)
Check digit The last one or two digits in a code are used to check the other digits are correct
Data Verification: Is a Proof Reading: Once data has Double Entry: The same data
method of double checking been entered it will be checked to is required to be entered
the data to see if it is see if it is correct (e.g. check is twice (e.g. type new
correct. name is spelt correctly). password twice).
164
ICT IGCSE Theory – Revision Presentation
Development
• Field Names • Validation rules will ensure • The user interface will allow
• (To store specific data) the correct data in entered the user to interact with the
• Set Specific Data Types into the fields. system and input data.
166
ICT IGCSE Theory – Revision Presentation
Normal
10% R
20%
Normal data – data within a (given) range
30% A
Example – 10% - 90%
40% N
Abnormal 50%
Abnormal data – data outside the range (limits) 60% G
Example – Less than 0% or more than 100% 70%
80%
E
Extreme
Extreme data – data on the boundaries of the range or at the limits of 90%
acceptability. 95%
Example – 0%-5% or 95-100% 100% Boundary
110%
167
ICT IGCSE Theory – Revision Presentation
7.4 Implementation
Advantages Disadvantages
Direct Changeover The existing system is • The whole system • If the new system fails
stopped and replaced by would have been then old system is not
the new system fully tested before it available to fall back
immediately. is implemented so to.
less chance of errors.
The data that was inputted • There may not be
into existing system is now • Costs are reduced as enough time to
inputted into the new only one system is provide training to
system. being used. Tasks are employees.
not duplicated.
Parallel Running The existing and new • If the new system • Tasks will be
system work together for a does not meet the duplicated as data is
period of time until the new requirements then inputted into both
system fully takes over. old system is still systems.
available.
Data is inputted into both • This will require more
systems whilst they are • Employees can be employees which will
running at the same time. trained gradually result in more costs
how to used the new (paying salaries) for
system. the employers.
168
ICT IGCSE Theory – Revision Presentation
7.4 Implementation
Advantages Disadvantages
Phased The new system is gradually • You only introduce a • Time consuming as
Implementation introduced. When parts of the new part of system if every part of the system
new system are working at a the current phase is which is implemented
satisfactory level then more working correctly. needs to be evaluated.
elements of the system are • If a part of the new
phased in. system does not meet • A number of training
the requirements then sessions would be
Eventually the old system will you can always go back required for employees
be phased out over a period to point of system when each step of the
of time. which was working. new system is
introduced.
Pilot Running The new system is • If the new system does • It could take a while for
piloted (trialled) in one part not meet the the whole system to be
(department) of an requirements then implemented across all
organisation. If the pilot is only one department departments.
successful then it will be is affected.
implemented across all • If the system fails in one
departments. • Training can take place department then
in one department at a modifications and
time. Then employees further training would
could be used in other be required resulting in
departments to help delays.
with training.
169
ICT IGCSE Theory – Revision Presentation
7.5 Documentation
There are two types of documentation that should be produced when creating a new system:
• User Documentation
• Technical Documentation
170
ICT IGCSE Theory – Revision Presentation
7.6 Evaluation
The final stage of the system life cycle is to evaluate the new system which has been
implemented in full. The purpose of the evaluation is refer back to the requirements
specification to see whether the new system has resolved the issues of the previous
system and met the requirements stated in the design.
1 2 3
Identify any limitations
Compare the solution Evaluate the users’
and necessary
with the original task responses to the results
improvements to the
requirements. of testing the system.
system.
171
ICT IGCSE Theory – Revision Presentation
172 Back
ICT IGCSE Theory – Revision Presentation
173
ICT IGCSE Theory – Revision Presentation
174
ICT IGCSE Theory – Revision Presentation
175
ICT IGCSE Theory – Revision Presentation
8.2 e-Safety
176
ICT IGCSE Theory – Revision Presentation
8.2 e-Safety
177
ICT IGCSE Theory – Revision Presentation
8.2 e-Safety
178
ICT IGCSE Theory – Revision Presentation
What is Hacking?
Hacking
• To gain unauthorised access to a computer system
without the user knowledge or permission.
Effects of Hacking?
• To delete, corrupt, copy and edit files. Sensitive Data could be
sold to competitors.
• Identity theft – to steal users identity.
• To expose a company (for example wiki leaks).
• To cause disruption and stop production.
179
ICT IGCSE Theory – Revision Presentation
180
ICT IGCSE Theory – Revision Presentation
What is Spyware?
Spyware
Is a software which can monitor your use of the computer
(internet browsing) and monitor and log key pressed.
Effects of Spyware?
Spyware software will send the data back to person who planted
the spyware software on your computer. This could include
personal details like passwords and banking account information.
181
ICT IGCSE Theory – Revision Presentation
What is Phishing?
Phishing
The recipient will receive an email which looks legitimate. The
email will normally request the user to update their details which
could be their password or payment details. To update the users
details they will have to click on a link which will take them to a
fake website.
Effects of Phishing?
The user will be tricked into entering their details into a fake
website. The sender of the initial email will have gained personal
details from the user. These details can be used fraudulently or
for identity theft.
182
ICT IGCSE Theory – Revision Presentation
What is Pharming?
Pharming
A malicious code installed onto a web server or computer will
redirect users to a fake website even though they have typed in a
legitimate URL address.
Effects of Pharming?
The fake website will look like the real website (websites tend to
look like a trusted websites to deceive the user). Users will be
tricked into entering their personal details. Like Phishing this can
lead to fraud or identity theft.
183
ICT IGCSE Theory – Revision Presentation
Effects of Smishing?
The effects are very similar to Phishing and Pharming where
personal details will be obtained from users. However users could
incur additional costs when they ring the premium number to
claim a prize.
184
ICT IGCSE Theory – Revision Presentation
185
ICT IGCSE Theory – Revision Presentation
186
ICT IGCSE Theory – Revision Presentation
Biometrics is aof
8.3 Security method
Data of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.
Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.
Voice Recognition: • Non-intrusive method • Very low accuracy.
User will use speak which will • Cheap technology • Users voice could be
compare the voice to one held on • Verification is very affected by an illness.
the database. quick.
187
ICT IGCSE Theory – Revision Presentation
To protect your personal data from being obtained you need to be fully
aware of phishing, pharming and vishing scams. There are always signs
which should cast doubt to whether you should disclose your personal
information. Also the use of an updated spyware software would help
improve security on your computer.
Why is it Used
Firewall • Firewall provides security to a computer or
network.
• Is located between the computer and internet
Users Firewall connection.
Computer (Hardware Internet • Firewalls will examine network traffic and block
or software) and alert users to potential risks.
Passwords and User Name
Passwords are a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked. Details
could be shared with other users of the internet.
188
ICT IGCSE Theory – Revision Presentation
Encryption Key 1 2 3 4 5 6 7 8 9 10 11 12 13
A B C D E F G H I J K L M
14 15 16 17 18 19 20 21 22 23 24 25 26
N O P Q R S T U V W X Y Z
189
ICT IGCSE Theory – Revision Presentation
Digital Certificates
They are used to verify the identity of the sender in an online business transaction. It
also provides the opportunity for the receiver to give an encrypted response.
190
ICT IGCSE Theory – Revision Presentation
191
ICT IGCSE Theory – Revision Presentation
192
ICT IGCSE Theory – Revision Presentation
Audience Appreciation
It is very important to tailor an ICT solution to the proposed audience. A number of factors
need to be taken into consideration to ensure the ICT solution is suitable for its target audience.
The following methods can be used to find out more Once the ICT team are aware of
about the potential target audience. the customer needs then they
can take the following into
• Interviews
consideration:
• Questionnaires
• Market Research
Use of Language
Based on the research the ICT team will have a
clearer idea about the following factors: Use of colours
Usability
Copyright laws protect software in very much the same way as music CDs, Video etc. Software
Piracy is a continuous issue for software developers and measures have been put in place to
make it more difficult to use illegal copies of software.
194
ICT IGCSE Theory – Revision Presentation
When creating an ICT solution consideration also has to be taken regarding legal, morality,
ethics and cultural issues.
Legal: Ensure copyright laws are abided by including not using any coding or branding from
existing copyrighted software.
Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an act
however it could be against your morals. For example setting up a fake website to deceive is
not illegal but questions your level of morality.
Ethics: Is to break a code of conduct. One example could be to leak information to a rival
software publisher or to the press about new software ideas.
Culture: When software is released in different cultures then care must be taken so that people
are not offended. For example certain use of words could be offence to one culture and not to
another. If certain computer games mock religion or cultural beliefs then again this could cause
offence.
195
ICT IGCSE Theory – Revision Presentation
The debate continues on to whether the internet should be policed. The following are some
reasons why some users of the internet believes the internet needs policing:
196
ICT IGCSE Theory – Revision Presentation
197
ICT IGCSE Theory – Revision Presentation
Email is very popular form of communication between people. However many countries have
laws to protect people from the misuse of emails.
Below are some laws which companies and individuals have to follow when using email:
198
ICT IGCSE Theory – Revision Presentation
Senders should check for Netiquette: The rules of Avoid humor as some people
spelling and grammatical errors. may not understand the joke.
etiquette that apply when
communicating over
Respond quickly to an email Do not plagiarize and obey the
computer networks,
message. copyright law.
especially the Internet
199
ICT IGCSE Theory – Revision Presentation
If your email account is not secure then emails could be sent from You could also be at
your account without your permission or knowledge. risk due to email
scams
Your email account could be hacked due to the following reasons: (phishing/pharming).
200
ICT IGCSE Theory – Revision Presentation
201
ICT IGCSE Theory – Revision Presentation
202
ICT IGCSE Theory – Revision Presentation
HyperText Transfer Is the rules which are followed when transferring information across
Protocol (HTTP) & the internet. Rules are agreed between the sender and recipient
(HTTPS) when data is being transferred.
Uniform Resource • A web browser allows the user to display a webpage. A web
Locator (URL) & Web browser will use URLs to access specified websites.
Browser • URLs are represented by numbers (http://100.100.100.1) however
it is not very user friendly.
• So therefore an alphanumeric format (http://www.yahmad.o.uk)
HTTP or HTTPS
http://www.yahmad.co.uk/Pages/Chapter18.html
203
ICT IGCSE Theory – Revision Presentation
Internet Service
Provider (ISP) ISP is a company which provides internet
access to users. Normally the users would
have to pay a monthly fee. Broadband
connections tend to use fire-optic cables
for increased bandwidth.
204
ICT IGCSE Theory – Revision Presentation
Advantages Disadvantages
205
ICT IGCSE Theory – Revision Presentation
Search Engines
206
ICT IGCSE Theory – Revision Presentation
Blogs and Blogging • A blog is based on personal experiences and usually updated by
one author.
• Blog entries are in order (most recent entries are shown first).
• Blogs can not be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.
207
ICT IGCSE Theory – Revision Presentation
Why the internet is so popular? The internet has also evolved over the years with the
introduction of social networks, media streaming sites,
online shopping/banking.
208
ICT IGCSE Theory – Revision Presentation
How to evaluate the • Checking the websites URL address (ending in .gov or
reliability of information .ac more likely to be reliable)
found on the internet • Check links or endorsements from other websites.
• Check the last time the website was updated.
209
210
ICT IGCSE Theory – Revision Presentation
210
ICT IGCSE Theory – Revision Presentation
211
ICT IGCSE Theory – Revision Presentation
212
ICT IGCSE Theory – Revision Presentation
Structure or Content
• The structure or content layer of a web
page is the underlying HTML code of that
page. Like a house's frame creates a
strong foundation upon which the rest of
the house is built, so does a solid
foundation of HTML create a platform
upon which a website can be created.
HTML structure can consist of text or
images and it includes the hyperlinks that
visitors will use to navigate around that
web site.
213
ICT IGCSE Theory – Revision Presentation
214
ICT IGCSE Theory – Revision Presentation
Behavior
• The behavior layer is the layer of a Web page
that can respond to different user actions or
make changes to a page based on a set of
conditions. For most Web pages, the behavior
level would be the JavaScript interactions on
the page.
215
ICT IGCSE Theory – Revision Presentation
216
ICT IGCSE Theory – Revision Presentation
217
ICT IGCSE Theory – Revision Presentation
218