Sei sulla pagina 1di 218

ICT IGCSE Theory – Revision Presentation

Types and components of computer systems


• Define hardware as consisting of physical components of a computer system
• Identify internal hardware devices (e.g. processor, motherboards, random access
memory (RAM), read-only memory (ROM), video cards, sound cards and internal
hard disk drives.
• Identify external hardware devices and peripherals (such as monitors, keyboards,
mice, keyboards, printers as input and output devices and external storage devices in
general)
• Define software as programs for controlling the operation of a computer or processing
of electronic data
• Identify the two types of software – applications software and system software
• Define applications software (e.g. word processing, spreadsheet, database
management systems, control software, measuring software, applets and apps,
photo-editing software, video-editing software, graphics manipulation software)
• Define system software (e.g. compilers, linkers, device drivers, operating systems and
utilities)

1
ICT IGCSE Theory – Revision Presentation

Define hardware as consisting of physical components of a computer system

What is Hardware?
• Hardware are the physical components which make up the computer system.
• Each item of hardware have their specific roles in a computer system.
• Hardware components can either be internal or external.

2
ICT IGCSE Theory – Revision Presentation

Internal hardware devices

Central Processing Unit (CPU)


The CPU is the 'brain' of the computer. It is the device that carries
out calculations to complete software instructions.

Motherboard
The motherboard is circuit board which is connects to main
components of the computer system.

Memory
Any data or instructions that are to be processed by the CPU must
be placed into main memory.

3
ICT IGCSE Theory – Revision Presentation

Internal hardware devices

Graphic Video Cards


A graphics card is a device that attaches to the motherboard to
enable the computer to process and display graphics.

Sound Card
A sound card is a device that attaches to the motherboard to enable
the computer to input, process, and deliver sound

Internal Hard Disk


A hard disk drive is a hardware device that's used to store
information like software and files. The capacity of hard drive
ranges from GB to Tera Bytes.

4
ICT IGCSE Theory – Revision Presentation

Internal hardware devices

Network Card
A network card provides the computer with a network (internet
connection) either through wireless signals or a physical cable
connection.
Optical Disk Drive
The optical disk drive (CD/DVD/Blu-Ray) allows for optical disks to
run on the computer. Also some optical disk drives are able to write
“burn” data onto discs.

Power Supply
The power supply is connected to main power sources to give
power to the computer system. The power supply connects to all the
main components of the computer system including the
motherboard, hard drive, optical drives etc.

5
ICT IGCSE Theory – Revision Presentation

External hardware devices

Input Hardware Devices – Input data into a Computer


Examples
• Mouse
• Keyboard
• Microphone

Output Hardware Devices – Outputs data from a computer


Examples
• Monitor
• Speakers
• Printers

External Storage Devices – Provides external storage or backup solutions


Examples
• External Hard
drive

6
ICT IGCSE Theory – Revision Presentation

Computer Software

What is Software?

1. Software is a collection of instructions that can be ‘run’ on a computer. These


instructions tell the computer what to do.

2. Software is not a physical thing (but it can of course be stored on a physical


medium such as a CD-ROM), it is just a bunch of codes.

3. For a computer system to be useful it has to consist of both hardware and


software.

7
ICT IGCSE Theory – Revision Presentation

Applications Software and System Software

Application Software
Examples Application software are designed to allow users to
• Word Processor complete specific tasks. This may be to:
• Spreadsheet • Write a letter/Present information
• Databases
• Browse the internet
• Manipulate data in a spreadsheet or database
• Manipulate graphics, sound or video.
System Software
Examples System software are normally involved in the running
• Operating of the computer:
Systems • Operating systems to provide a user interface
• Device Drivers
• Utilities • Device drivers which allow hardware components to
(antivirus) work.
• Utility software which maintain the computer
performance.

8
ICT IGCSE Theory – Revision Presentation

Application Software Examples

Word Processing Spreadsheet Database


Used to prepare reports, Use to create to organise and Database is used to insert
school essays etc. manipulate numeric data. and organise data using
fields and records.

• Create New or edit • Use of various formulas to • Create a table so that


existing text documents. carry out set tasks: records can be inserted.
• Formatting tools • Sum, Max, Min, Average • Run queries using search
• Create font styles • Count, CountA criteria to find specific
• Importing tables/images • CountIf & SumIF data.
• Spell Check • Lookups • Create reports including
• Copy/Paste • IF and Nested Ifs labels from the search
• Find/Replace • Apply various formatting to criteria.
• Page layout cells/
• Create graphs (Ba/Pie charts)

9
ICT IGCSE Theory – Revision Presentation

Application Software Examples

Photo Editing Graphics Manipulation Video Editing


Used to edit digital images to Used to create and edit Used to edit and format video
either touch up or to apply bitmap and vector graphics. using various tools and
various formatting techniques.
techniques.

• Contrast/Brightness • Pixels in bitmap images • Split and Trim videos


• Use of layers can be changed to • Create split screens
• Filter tools produce a different image. • Rearranging order of clips.
• Lighting effects • Vector images use: • Transitions between clips
• Liquify (change features of • Lines (Fade)
a face) • Curves • Inserting Audio
• Brush tools • Text • Applying filters and using
• Clone/Stamp tool video enhancement
techniques

10
ICT IGCSE Theory – Revision Presentation

Application Software Examples

Apps (Phone Applications) Measuring and Control Software


Apps are the software which runs on mobile Measuring and control software which are
phones. They usually come with the phone or responsible for changing physical conditions in
can be downloaded and updated. an environment.

• Games (Angry Birds) Measuring


• Video/Music Streaming (YouTube) • Sensors take readings which are processed
• Social Media (Facebook, Twitter, by the computer or microprocessor.
Instagram)
• Communication (Whats App, Viber) Control Software
• Camera (Editing images) • By comparing sensor readings to a pre-set
• GPS (Satellite navigation) level the control software will decide on an
• Health/ Fitness output (For example to increase or decrease
the heat in a green house.

11
ICT IGCSE Theory – Revision Presentation

System Software Examples

Operating Systems Device Drivers

Manages computers functions Allows hardware devices to


including hardware devices run on the computer
(input/output). Also provides including printers, sound,
users with a GUI interface graphics and network cards.

System
Software

Utilities Compiler

Help to manage and Linkers Translates a program written


maintain computer In a specific language which
resources and Combines object files Can be understood by the
performance by produced by a complier into a computer.
running specific A single program.
tasks.

12
ICT IGCSE Theory – Revision Presentation

• Describe the central processing unit including its role


• Describe internal memory, i.e. ROM and RAM and the differences between them
• Define input and output devices and describe the difference between them
• Define secondary/backing storage

13
ICT IGCSE Theory – Revision Presentation

Describe the central processing unit including its role

• The CPU is the 'brain' of the computer.

• It is where all the searching, sorting, calculating


and decision making takes place.

• The speed of the CPU is measured in Gigahertz


(GHz).

• A 1 GHz CPU can carry out 1 billion instructions per


second!

• Intel and AMD are the most popular CPU brands.

14
ICT IGCSE Theory – Revision Presentation

Main Memory

Applications are installed in the Secondary Storage (Hard drive).

Temporary data from Applications in use are held in the Main Memory.

The CPU will first check the Cache for the required piece of the data so that it can
be processed.

If the data is not in the cache then the CPU will check the RAM and transfer data to
the CPU.

The Cache will then transfer the next piece of data from the RAM into Cache.

The CPU will again check the Cache for the next piece of data. This time the CPU will
be able to get the data from the Cache Memory.

15
ICT IGCSE Theory – Revision Presentation

Main Memory

16
ICT IGCSE Theory – Revision Presentation

Cache

• Cache is the fastest type of Memory.

• It is located between the processor and the RAM.

• Cache collects data from the RAM.

• Holds onto commonly used data.

• The Cache will automatically transfer the next set


of data from the RAM in to the Cache so that it
can be processed by the CPU.

17
ICT IGCSE Theory – Revision Presentation

RAM (Random Access Memory)

• RAM stands for Random Access Memory

• Temporary storage.
• Volatile
• Read and write.
• When the computer is turned off all data is lost

• Computer uses RAM:


• To store the current running programs.

18
ICT IGCSE Theory – Revision Presentation

ROM (Read Only Memory)

• ROM stands for Read Only Memory

• ROM is a built in memory that can not be changed


(Read Only).
• Permanent storage.
• non-volatile
• Read.
• When the computer switched off data will be
saved.

Computer uses ROM:


• Used to store the startup Programs ‘boot up’
instructions to start the computer

19
ICT IGCSE Theory – Revision Presentation

Input and Output devices

• Devices need to be connected to a computer to allow data to be inputted and


outputted.
• The general name for these extra devices is ‘peripheral devices’. They are usually
categorised into input devices, output devices and storage devices.

Input Output Storage

An input device is a device that can pass date into the computer
Devices that take data from the computer are known as output devices.

20
ICT IGCSE Theory – Revision Presentation

Define secondary/backing storage

•Backing storage is also known as secondary storage

•Backing storage is non-volatile which means that


data is not lost when computer is turned off.

•Backing storage is used to store data for a long time


(data can be read from and written to)

•Users tend to make copies of original files on


backing storage.

21
ICT IGCSE Theory – Revision Presentation

• Define and describe operating systems which contain a Command Line Interface
(CLI)
• Define and describe operating systems which contain a Graphical User Interface
(GUI)
• Describe the differences, including the benefits and drawbacks, between operating
systems which contain a CLI and those which contain a GUI

22
ICT IGCSE Theory – Revision Presentation

Role of an Operating System

An operating system is a system software that manages the general operation of a


computer system:
Allows users to
Provides security
load, run and
and prevents
store applications.
unauthorised
Also resolve errors
access to a system
occurring
applications
Helps the user interact
with the computer Role of an Decided what
through a user operating System should be loaded
interface. and deleted from
memory

Helping save,
organise, find and Manages input,
delete files output and backing
devices.

23
ICT IGCSE Theory – Revision Presentation

Example GUI Operating Systems

24
ICT IGCSE Theory – Revision Presentation

Graphical User Interface (GUI) WIMP


GUI (Graphical User Interface) is an user interface built around graphics.

Windows – areas Menus - lists of


for displaying options or
information applications users
can select from

GUI
Icons -small images Pointers –Mouse
used to represent pointer can be used
files/folders or to select and open
applications files/applications

• GUIs are quite easy to use due to the visual nature of


the interface
• The user has lots of visual clues as to what things do.

25
ICT IGCSE Theory – Revision Presentation

Graphical User Interface (GUI) Examples

26
ICT IGCSE Theory – Revision Presentation

Command Line Interface (CLI)

• CLI requires the user to enter command prompts to interact with the
computer.
• CLI are normally used by expert users as it allows them to is more
complicated to use.
• CLI and is not restricted to a number of predetermined options.

Example Command Prompts

ATTRIB: Displays or changes file attributes.


CD: Displays the name of current directory
CHKDSK: Checks a disk and displays a status
report
Copy: Copies one or more files to another
location
DIR: Displays a list of files and sub
directories

27
ICT IGCSE Theory – Revision Presentation

Main Differences between CLI and GUI

Graphical User Interface (GUI)


Advantages:
• The user does not need to learn any commands.
• The interface is easier to use.
• Can use a pointing device to clicks and select icons or menu options.
Disadvantages:
• Takes up more memory than a CLI interface.
• Requires an operating system to operate.
Command Line Interface (CLI)
Advantages:
• The user has more freedom to use specific command in interacting
with the computer.
• It is possible to alter computer settings.
Disadvantages:
• User needs to learn commands
• Commands must be typed in without errors.
• No visual aids.

28
ICT IGCSE Theory – Revision Presentation

• Describe the characteristics of a personal/desktop computer and its uses, both as a


standalone and networked computer
• Describe the characteristics of a laptop computer and what it is used for, both as a
standalone and networked computer
• Describe the characteristics of a tablet computer and what it is used for, including its
ability to use wireless technology or 3G/4G technology
• Describe the computer characteristics of a smartphone and what it is used for in
computing terms
• Describe the advantages and disadvantages of each type of computer

29
ICT IGCSE Theory – Revision Presentation

Describe the characteristics of a personal/desktop computer and its uses, both as


a standalone and networked computer

Desktop/Personal Computer

• Computers used to be huge and would sometime take


up the whole space of a room.
• In the 1980s (desktop/personal) computers were
created and were small enough to fit on desks.
• These computers were cheap and affordable for the
public.
• Desktop Computer normally have a separate monitor,
keyboard, mouse, speakers etc.
Standalone Networked
• Can be used as a standalone • Share resources
computer in your home for • Share files
personal or work use. • Shared Drives
• Tends to be connected to • Central Storage
own printer and internet • Online Gaming
connection.

30
ICT IGCSE Theory – Revision Presentation

Describe the characteristics of a laptop computer and what it is used for, both as a
standalone and networked computer

Laptop Computer

• Laptops refers to a computer where all the components


(monitor, keyboard etc.) are together on a single device.
• The main advantage of a laptop computer is that it is
portable and can connect wirelessly to network
connections.

Standalone Networked
Can be used for either personal • Connect to Internet
or work use. • Share resources
• Completing work • Share files
• Communication • Shared Drives
• Gaming • Central Storage
• Online Gaming

31
ICT IGCSE Theory – Revision Presentation

Describe the characteristics of a tablet computer and what it is used for, including
its ability to use wireless technology or 3G/4G technology

Tablet Computer

• Tablets are very similar to smart phones.


• They have an internet connection via a wireless
connection including 3G/4G.
• Tablets make use of touch screen technology to select
options on a menu or to select particular icons.
• Applications can be downloaded and installed.
• Sensors including speech recognition.

Wireless 3G/4G
Tablets are able to connect to 4G is a mobile communications
any wireless networks. standard intended to replace 3G,
allowing wireless Internet access
Users are able to use the at a much higher speeds.
internet as long as they are in
range. Would allow for internet
connection on the move.

32
ICT IGCSE Theory – Revision Presentation

Describe the computer characteristics of a smartphone and what it is used for in


computing terms

Smart Phone
• Smart phones can use traditional methods to make
phones calls and send messages using mobile network.
• Smart phones have operating systems which allows
them to run multiple applications.
• Like the Tablets Computers Smart Phones have many
features including:
• Touch Technology
• Internet connection (Wireless/3G/4G)
• Sensors
• Cameras
Use
• Send and receive emails
• Browse the internet
• Voice over Internet Protocol (Voip) – voice/video calls.
• Streaming music/video content
• Communication via social networking applications
• Global Positioning System – to help navigate

33
ICT IGCSE Theory – Revision Presentation

Describe the advantages and disadvantages of each type of computer

Type Advantages Disadvantages


Desktop/Personal • Always connected to the mains. • Not portable
Computer • Monitors can come in any sizes • Takes up more desk space.
• Can be upgraded and parts easily replaced. • Separate components like keyboard, mouse,
• Tend to have a higher specifications than laptop monitor, speakers etc.
computers. • Loose cables which could be trip hazards.
Laptop • Its portable due to small size and weight. • Limited battery life.
Computer • Battery can be recharged. • Laptops are difficult to repair and upgrade.
• Can connect wireless to internet. • Can be stolen or lost.
• No loose cables. All components connected • Some users find it difficult to use pointing
together. device.
Tablet • High definition anti glare display. • Limited memory compared to laptops.
Computer • Wireless , 3G/4G & Bluetooth connection. • Expensive to use 3G/4G internet
• Data can backed up or synchronised with other • Typing can be more difficult compared to a
devices. normal keyboard.
• Touch screen technology • Not all files are compatible with tablets.
• Battery life longer than a mobile phone.
Smart Phone • Small in size and easier to carry around. • Small screens make it difficult to read.
• Can be used whilst on the move using wireless • Battery life is short
or 3G/4G Connectivity. • Could be misplaced or stolen
• Touch screen technology • Limited storage/memory compared to other
types of computers.
• Slow data transfer rates

34
ICT IGCSE Theory – Revision Presentation

• Describe how emerging technologies are having an impact on everyday life (e.g.
artificial intelligence, biometrics, vision enhancement, robotics, quantum cryptography,
computer-assisted translation, 3D and holographic imaging, virtual reality

35
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Artificial intelligence (AI) is computer systems that can simulate human intelligence
(able to make decisions typically made by a human).

• The PR2 robot is being programmed to complete a number


of specific tasks just like a human.

• Deep Blue was a chess-playing computer developed by IBM.


It is known for being the first piece of artificial intelligence to
win both a chess game against a reigning world champion.

• Self-parking cars currently on the market are not completely


independent, but they do make parallel parking much easier.

• As seen in the movies AI could be potentially used in the military


and police force.
• However the issue would be whether a robot could demonstrate
empathy in certain situations.

36
ICT IGCSE Theory – Revision Presentation
Artificial intelligence (AI)

AI is being developed in the Impacts of AI on everyday life:


following areas:
• Accurate prediction of weather .
• Game Playing • Increased leisure time.
• Expert Systems • Safer transport.
• Languages • Increased Personal .
• Robotics
• Improved medical .

37
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Biometrics authentication is used as a form of identification which recognises


individuals body parts. Biometrics uses unique characteristics of the human which
means it can not be replicated by other people.
Finger Printing
• Staff can scan their finer prints to sign in and out of work.
• Police can use finger print to authenticate an individual’s identity.

Eye Recognition
• No physical contact is required to scan the iris which may be useful in some cultures.
• Immigration at airports use eye recognition to prevent people travelling with fraudulent
documentation.
Facial and voice recognition is also another form of biometrics. The main purpose of
biometrics is to improve security with regards to access to computer systems.

Impacts of Biometrics on everyday life:


• Better airport security.
• Increased building security.
• Reduced car theft.
• More secure mobile phones.
38
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Vision Enhancement uses video technology which is projected to the user though
the lens. The system can bring distant objects closer and into focus.

• The vision enhancement system amplifies infrared light so that an image can be
clearly seen even in darkness.

• Militaries across the world use this technology to complete missions and carry
out surveillance at night.

39
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Robotics are used commonly in the manufacturing industry typically completing


labour intensive jobs.

• Robots can be programmed to complete specific tasks or used manually.


• No human intervention is required once the robot has been programmed.
• Robots can complete tasks with more precision including robotic surgery.
• Robots can work in extreme conditions or environments.

How Are Robots Used in a Factory?


1. Lift heavy items into from place to
place
2. Assemble parts together to create
things
3. Join parts together using glue, or
by welding (melting metal)
4. Paint items

40
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Quantum Cryptography

Quantum cryptography (encryption) is an emerging technology that allows messages


and data to be sent with complete privacy.
Impacts of Quantum Encryption on everyday life:
1. Older methods of encryption were 1. Completely secure voting
based around mathematics but 2. Completely secure communication
quantum cryptography uses physics 3. Completely secure bank transfers
instead. 4. Completely secure personal information
2. In quantum cryptography, messages
are encrypted using photons. These
are tiny packets of light.

41
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Computer-assisted Translation

CAT is where a human translator uses computer software to help in the translation
process.

Examples of different types of CAT: Impacts of Computer Aided Translation on


1. Spell checkers everyday life:
2. Translation memory software 1. More accurate documents
3. Language search-engine software 2. A more multilingual society
3. Quicker and more efficient translations

42
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

3D and holographic imaging is a technology that allows 3D images to be


produced. A holographic image moves in the same way as the original image
in three dimensions (3D)
How Holograms are created:
Object beam Object
1. Splitting a laser beam.
Laser beam
2. Half the light (object beam) is reflected
of the object onto a photographic
plate .
Reference beam Mirror
3. The other half of the light (reference
beam) is reflected off a mirror onto the
same photographic plate .
Photographic
4. The hologram is produced when the plate
two light beams meet on the
photographic plate.

43
ICT IGCSE Theory – Revision Presentation

Impacts of 3D Imaging on everyday life:


• Improved security
• Better movie experiences
• Greater data storage

44
ICT IGCSE Theory – Revision Presentation

Emerging Technologies

Virtual reality is an artificial environment that is created with software. The


user will normally wear a head mounted display which will simulates their
physical presence in places in the real world or imagined worlds.

Uses:
1. Training: Allow professionals to conduct training in a virtual
environment without the threat of any physical harm.

2. Education: Looking inside of an ancient building or ruins

3. Computer Games: users are able to immerse themselves into a


gaming platform.

4. Sports: It is used as an aid to measuring athletic performance as


well as analysing technique

5. Construction: An organisation can not only render the resulting


structure in 3D but also experience them as they would in the real
world.

45
ICT IGCSE Theory – Revision Presentation

Equipment needed to create the virtual reality experience

• Eye Goggles
• Special Gloves
• Headphones
• Powerful Computer

Impacts of Virtual Reality on everyday


life:
•Improved medical surgeons
•Larger and stronger buildings
•More effective treatment of phobias
•Training in dangerous situations
•More realistic education

46
ICT IGCSE Theory – Revision Presentation
Input and output devices
• Identify input devices and their uses, e.g. keyboard, numeric keypad, pointing devices
(such as mouse, touchpad, tracker ball), remote control, joystick/driving wheel, touch
screen, scanners, digital cameras, microphone, sensors (general), temperature
sensor, pressure sensor, light sensor, graphics tablet, video camera, web cam

47
ICT IGCSE Theory – Revision Presentation

Input Devices in their Use

Input Devices allow data to be input into a computer.

Input Central
Processing Unit
Output
Devices (CPU) Devices

Storage

48
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Keyboard • Inputting data into • Easy and familiar to Slower method
applications use compared to
• Typing commands into • Fast entry of Text direct data entry.
a CLI Interface into a document

Numeric Inputting numeric data Straight forward to • Keys can be


Key Pad into: enter numeric data like too small.
• ATM pins or prices at a POS. • Difficult to type
• POS Terminals letters (older
• Chip and Pin Mobiles to
• Mobile Phones etc. text)

49
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Mouse To control the pointer on • Easy to navigate • Easily
the screen to: through menu Damaged
• Selecting Windows options • Flat surface
• Clicking Icons • Quicker to select an required.
• Menu Options option compared to
• Positioning Pointer using a keyboard.
Touch Pad • Used as a pointing • Is part of the • More difficult
device on a laptop. keyboard so no to use
need for separate compared to a
device. normal mouse.
Tracker Ball • Used by users who • Easier to use • Tend to be
tend to have limited compared to mouse more
motility in their wrist • More accurate expensive.
(RSI) positing of the • Not familiar to
pointer. users.

50
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Remote Used to control: • Can be used from a • Signal could be
Control • TV Channels and distance. blocked by
Menu options obstacles or
• Multimedia Systems walls.
• Industrial applications
Joystick • Used in computer • Easier to used • More difficult
games and simulators. compared to a to use
keyboard. compared to a
normal mouse.
Driving • Used by gamers in • Driving experience • More
Wheel computer games is more accurate expensive.
(Racing/Driving). than using • Movement
• Used in simulators. keyboards. could be too
sensitive

51
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Touch Used on: • Very easy to use • Options could
Screen • Mobile/Tablets and select options. be selected
• Point of Sale (POS) accidently.
• Interactive White • Screen can get
Boards dirty.
Scanners • Used to scan in • Copies can be • Quality is
documents or created. dependant on
photographs. resolution
settings.
Digital • Used to take • Higher Resolution • Transferring,
Cameras photographs and small images can be storing and
video clips. stored on memory editing images
• Data can be cards. can be
transferred to • No need to develop complicated
computers. film.

52
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Video Cameras • Used to record video • Can record in HD • HD movie take
footage. • Footage can be up a lot of
edited on a storage.
computer. • Cost of camera
Microphone • Used to input sound • Voice overs can be • Voice
into a computer. added to recognition is
• Used in voice presentations. not as accurate
recognition • Recorded audio can as typing text
applications. be typed directly into a
into Word Processor computer.
applications.
Graphics • Used with a stylus to • Very accurate • Longer to
Tablet draw free hand method of drawing produce
drawings which can be compared to a drawings
stored on a computer. pointer device. • Cost of tablet

53
ICT IGCSE Theory – Revision Presentation

Input Devices

Device Use Advantages Disadvantages


Web Cams • Used by users who • Allows for face to • Quality is
want to have a web face video chat. dependant on
conference (Skype • Can contact people internet
Call) without the need to connection
travel.

Light Pens • Used in CAD • More accurate than • Only used with
applications for touch screens CRT Monitors
drawing onscreen • Small in size • Dated
Technology

54
ICT IGCSE Theory – Revision Presentation

Input Devices : Sensors

A sensor is a device that converts a real world property into data that a
computer can process.
Sensor Example Use
Temperature Used in green houses to measure temperature
Light Umpires check light conditions in cricket match
Moisture To check the moisture in the soil in a green house
Water-Level Used in washing machine to measure water level
Proximity Used when parking cars to judge distance.
Movement Detects movement which could trigger an alarm
Pressure Used in burglar alarms

55
ICT IGCSE Theory – Revision Presentation

Input Devices : Sensors

Real world measurements


are collected as an analogue
signal from the sensor.
Data collected from Sensor is in
A computer only Analogue
understands digital signals.
ADC - Analogue-to-digital converter
An ADC (Analogue-to-digital Analogue Signal now can be
converter) is needed to understood by computers.
convert the signal so a
computer understands the
signal.

56
ICT IGCSE Theory – Revision Presentation

• Describe direct data entry and associated devices, e.g. magnetic stripe readers, chip
and PIN readers, Radio Frequency Identification (RFID) readers, Magnetic Ink
Character Reader (MICR), Optical Mark Reader (OMR), Optical Character Reader
(OCR), bar code reader
• Identify the advantages and disadvantages of any of the above devices in comparison
with others

57
ICT IGCSE Theory – Revision Presentation

Magnetic Strip Readers are used to read data found on magnetic stripes
found on the back of cards.

USE:
Bank Cards: Contains Account details
Arcade: Contains balance
Security/Hotel Rooms: Allows entry to specific room.
Gift Cards (Vouchers) – amount of vouchers

Advantages: Disadvantages
• Fast data entry • Stripe could become
compared to keyboard unreadable - scratched
• Secure/Error Free – No • Does not work at a
Typing distance
• Not effected by water • Easily Lost/misplaced
and robust if dropped
• Easily Updated

58
ICT IGCSE Theory – Revision Presentation

Chip and Pin Readers are used POS terminals to make a secure payment
using a debit or credit card.

USE:
Users can make payment at shops, restaurants by simply
inserting their credit/debit card into the chip and pin reader
and typing in their pin.

Advantages: Disadvantages
• Secure method of • The pin could be read by
payment compared to some one watching or use
swipe and contactless of mirrors.
method. • Fraudulent machines can
• Chip is less likely to be copy card details.
damaged compared to a
magnetic swipe.

59
ICT IGCSE Theory – Revision Presentation

Contactless Cards Readers are used by customers to pay for products at the
POS without the need to enter a PIN Number using RFID technology.
Transactions are normally restricted to a small amount (up to £20)
How it works
The payment terminal picks up a signal from the chip to
process and complete the transaction when the card is
within a few centimetres distance.
Advantages: Disadvantages
• Quicker Transaction • Less secure than chip and
meaning less time spent pin method.
at POS. • Anyone could use card
• Don’t have to use PIN if lost.
• Transaction data • It is easer for thieves to
(account details) is copy details of the card.
encrypted. • Only small payments can
be made

60
ICT IGCSE Theory – Revision Presentation
RFID
Radio Frequency Identification
RFID reads information stored on tags (small silicon chip that can be placed
on a sticker) using radio waves. RFID tags can be attached to objects or
animals/people.

USE:
• Track movement of animals (livestock) or people
• Stock Control: Scan stock items for quantity
• Airports: Track Luggage to make sure nothing is lost
• Contactless cards to make a payment
Advantages: Disadvantages
• Can read objects from a distance. • Radio symbols can be
• Can read in bulk jammed or hacked.
• Very fast reading – quick response • More expensive than a
• Allows read/write operations to barcode
take place • Tags could interfere
• Can read biometric readings with each other.

61
ICT IGCSE Theory – Revision Presentation
MICR
Magnetic Ink Character Reader
MICR is able to read characters printed in a special ink. These characters are
then converted into a form which could be understood by the computer

USE:
Used to process bank cheques. The characters at the
bottom of cheque which are printed in a special ink
are read by the Magnetic Ink Character Reader.
Advantages: Disadvantages
• No need to manually • More expensive than
enter text – less chance using a keyboard to
of human error. type manual data.
• Characters can not be • Limited amount of
altered. characters can be
• Characters can be read read.
even if they have been
written over.

62
ICT IGCSE Theory – Revision Presentation
OMR
Optical Mark Reader
OMR is able to read marks written in pen or pencil. The position of the mark
is stored in the computers memory.

USE:
Used to scan in marks from multiple choice exams, surveys,
and lottery tickets.

Advantages: Disadvantages
• Very fast method of • Forms have to be
inputting data as no user completed correctly to
has to manually enter avoid manual checks which
results. would waste time.
• More accurate than OCR
• Less chance of errors

63
ICT IGCSE Theory – Revision Presentation
OCR
Optical Character Reader
OCR scans text from hardcopies and converts it into an editable form which
can be used and edited in a range of software including word processors.

USE:
Used in Self-Immigration System at Airports.
Identity Cards
Students scanning text from books which can be
edited.
Advantages: Disadvantages
• Faster method of data • Not as accurate as
entry compared to the OMR reader
manually typing the • Unable to read
data. handwriting.
• Less chance of errors.

64
ICT IGCSE Theory – Revision Presentation

Barcode Scanners are used to scan bar codes which contains unique
information about a product including price.

USE:
Barcode readers are typically used at point-of-sale
(POS) in shops when customers are purchased goods.

Advantages: Disadvantages
• Far quicker and more • Barcode could be
accurate than typing in unreadable or
codes using a keypad. missing.
• Stock database can • Barcode could be
easily be updated with swapped.
new prices – barcodes • Can be an expensive
would not need to be system.
replaced.

65
ICT IGCSE Theory – Revision Presentation

• Identify output devices and their uses, e.g. CRT monitor, TFT/LCD monitor, IPS/LCD
monitor, LED monitor, touch screen (as an output device), multimedia projector, laser
printer, inkjet printer, dot matrix printer, wide format printer, 3D printer, speakers,
motors, buzzers, heaters, lights/lamps
• Describe the advantages and disadvantages of any of the above devices

66
ICT IGCSE Theory – Revision Presentation

Cathode Ray Tube (CRT) Monitor


Use: As primary output display for computers.

Advantage: Cheaper than other monitors and can be used with light pens.
Resolution is also very good.

Disadvantage: Size is bigger – requires more desk space.


Could be a safety hazard if not correctly supported.

Liquid Crystal Display (LCD) Monitor

Use: Have taken over from CRT as primary output display for computers. Also
primary output for monitors.
Flat Screen
Advantage: Smaller and lighter so less desk space required.
Consumes less power and does not generate as much heat as CRT monitors.

Disadvantage: Resolution may not be as good as a CRT monitor.

67
ICT IGCSE Theory – Revision Presentation

In-Plane Switching IPS/LCD Monitor

Use: IPS is generally used by creative professionals (professional graphic


artists).

Advantage: Has wide viewing angles by altering the direction of the pixels Flat Screen
within the display. Colour reproduction is better than other monitors.

Disadvantage: More expensive compared to other monitors.

Light-Emitting Diode LED Monitor

Use: LED monitors are generally used outdoors in store signs, destination
signs and billboards due to their level of brightness.

Advantage: LEDS produces better light which improves the colour definition Flat Screen
and can be used outdoors in different types of light. LED are also energy
efficient and can last along time.

Disadvantage: More expensive compared to other monitors.

68
ICT IGCSE Theory – Revision Presentation

Touch USE: Advantages Disadvantages


Screen A touch screen is a computer • No need for • Screen could become
display screen that is also an additional input damaged, dirty, less
input device. Users can devices. visible etc.
interact with the screen by • No need for • Difficult to input high
using their fingers or a special additional buttons. volumes of
stylus/pen. • Menus and interface information compared
• Mobile Phones/Tablets generally very easy to to using a keyboard.
• Terminals at use.
POS/Banks/Stations • Zoom in and rotation
is possible.

Projector USE: Advantages Disadvantages


Multimedia projectors are • Is able to project onto • Output resolution may
used when projecting signals a big screen allowing not be the same
from various (Computer, TV) more people to see quality as other
devices onto a large screen. the output. devices.
• Classrooms • Users can gather • Obstacles could affect
• Offices around one screen – block the projection.
• Training Presentations main focal point in • Expensive to buy and
• Home cinema systems classrooms. difficult to set up.

69
ICT IGCSE Theory – Revision Presentation

Inkjet USE: Advantages Disadvantages


Printer Inkjet printers are used when • Cheap high quality • Ink cartridge can run
low output volumes are printing. out quickly and be
required. • Cheaper to buy expensive to replace.
• Home use to print compared to laser • Slow printing
homework or single printers. compared to laser
pages/images. • Small in size – takes printer.
up less desk space.

Laser USE: Advantages Disadvantages


Printer Laser printers are used when • High quality printing • Laser printer is more
High output volumes are • Printing is fast expensive to buy.
required. especially when • Colour laser printers
• Schools printing in high are more expensive to
• Offices volumes. run compared to black
• Tonner lasts longer and white laser
than inkjet cartridge – printers.
cost effective.
• Prints quietly.

70
ICT IGCSE Theory – Revision Presentation

Dot Matrix USE: Advantages Disadvantages


Printer Dot Matrix is a type of • Not affected by • Very slow printing
printing which uses a print hot/dusty • Poor Quality printing
head which presses against environments. • Noisy compared to
an inked ribbon whilst • Can print carbon other printers.
moving back and forth. copies (useful when
• Shop receipts additional copies
• Airline tickets need to be signed).
• When duplicates (carbon • Cheap to run an
copies) are required. maintain.

Wide USE: Advantages Disadvantages


Format Wide Format printers are • High resolution • Generally expensive
Printer generally used when large printing compared to to buy and maintain.
format printing is required. laser and inkjet
• Banners printers.
• Billboards • Large printouts
• Signs • Companies are able to
• Posters print in house which is
• Photographs and Art cheaper than asking
another company to
print.

71
ICT IGCSE Theory – Revision Presentation

3D Printer USE: Advantages Disadvantages


3D Printers can produce solid • Products can be • Counterfeits products
objects by building layer upon customised . could be created.
layer. • Prototypes can be • Dangerous objects
• Prosthetic limbs created quickly. could be printed if
• Manufacturing Parts • Parts can be created used inappropriately.
• Medical Applications which are no longer • Very expensive
• Construction manufactured. printer.
• Fashion/Arts • Artificial organs can
be created.

Speakers USE: Advantages Disadvantages


Speakers are required to • Speakers can be used • Not as personal
output sound. Essential for wirelessly using compared to
video conferencing, movies, Bluetooth technology. headphones – can be
computer games etc. • Sounds can be heard by everyone.
amplified. • An underpowered
• Surround sounds amplifier playing at
systems to give a high volumes can
more realistic damage a speaker.
experience.

72
ICT IGCSE Theory – Revision Presentation

Actuators are part of the control process – digital signals are sent by the
computer to actuator to affect or control the real world.

Type Use
Motors • Washing machines
(Spins things • Control Fans
around) • Control Robot Arms in manufacturing

Buzzer • Used in burglar alarms


(Creates a noise) • Microwave ovens and other household appliances
• Sporting events/Game shows

Heater • Control heat in a central heating system


(Increases • Control heat in a green house
temperature) • Control heat in an oven

Lights • Security lights


(Creates light) • Car Dashboard – e.g. to alert driver of low fuel.
• Lights in greenhouse

73
ICT IGCSE Theory – Revision Presentation
Storage devices and media
• Identify storage devices, their associated media and their uses, e.g.
• Magnetic backing storage media: fixed hard disks and drives, portable and
removable hard disks, portable and removable hard drives, magnetic tape drives
and magnetic tapes, memory cards
• Optical backing storage media (CD/DVD/Blu-ray): CD ROM/DVD ROM, CD
R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray discs
• Solid state backing storage: solid state drives, flash drives (pen drive/memory
stick/USB stick)

• Describe the advantages and disadvantages of the above devices

74
ICT IGCSE Theory – Revision Presentation

What is Storage

• Secondary Storage devices ensures data is stored permanently so that it can be


used again at a later date.

• Storage medium is the name given to the device that actually holds the data.

• Sometimes the storage medium is fixed i.e.


magnetic coated disks build into hard drive.

• Sometimes the storage medium is removable


from the device i.e. CD ROM that can be taken out
of the drive.

Think about what we store:


Documents, Images, Video,
Music, Software, Games etc.

75
ICT IGCSE Theory – Revision Presentation

Data Storage Capacity

Floppy Disk Data storage devices have very


1.4MB different capacities. Over time the
CD-ROM
capacity has increased which has
700MB
allowed for more data to be stored:
DVD
4.7GB
Blu-Ray
25 GB – 128GB

Hard Drive
Increase in
8 TB
storage capacity

Magnetic Tape
Up to 185 TB

76
ICT IGCSE Theory – Revision Presentation

Type of Access

Serial (sequential Access)


• Files are stored one by one in a sequence
• Must search through the files one by one until you get to the one you
want.
• Example: VHS tape, Cassette Tape, Magnetic Tape

Start 1 2 3 4 5 6 7 8 9 End 10

Direct (Random Access)


• Stores files so that they can instantly be accessed
• No need to search through files to get to the one you want
• Example: DVD, CD ROM, Blu-ray, external hard drive, flash drive

Start 1 2 3 4 5 6 7 8 9 End 10

77
ICT IGCSE Theory – Revision Presentation

Main Memory Vs Backing Storage

Main Memory
• Sometimes known as Internal Memory or primary memory.
• Includes RAM and ROM
• Usually used to store data temporarily (in the case of RAM).
• Usually used to store data while it is being processed by the CPU.
• Is volatile – means data will be lost if computer is turned of.
Backing Storage
• Backing storage some known as secondary storage.
• Name for all other storage devices which are part of a computer
like hard drive.
• Usually used to store data over a long time.
• Usually used to store application software, operating system
software, files etc.
• Is Non-volatile - Means data will not be lost of computer is
turned off.

78
ICT IGCSE Theory – Revision Presentation Fixed Internal
Hard Drive
Magnetic Storage Devices

Use: Main backing storage device used by all


computers to store:
• Operating Systems & System Files
• Applications
• Files (Documents, Images, videos, audio etc.)

Access Type: Direct (Random Access) • Magnetic storage media


devices store data in the
Advantages: Disadvantages form of tiny magnetised
• Less likely to break as • More moving parts dots.
fixed. compared to solid state
• These dots are created,
• High storage capacities drives. read and erased using
compared to external • Incorrect shut down magnetic fields created by
drives. procedure could cause very tiny electromagnets.
• Fast data transfer rate. hard drive to
malfunction.

79
ICT IGCSE Theory – Revision Presentation
Portable
Magnetic Storage Devices Hard Drive
Use: This device connects to the computer using the
USB Port. External Hard drives are used to
store:
• Personal backup data.
• Transfer files between computers/devices

Access Type: Direct (Random Access) • Magnetic storage media


devices store data in the
Advantages: Disadvantages form of tiny magnetised
• Portable – transfer files • More prone to errors dots.
between computers. than fixed hard drive.
• These dots are created,
• High Storage capacity • Could be damaged if read and erased using
compared to optical incorrectly ejected magnetic fields created by
disks. from computer. very tiny electromagnets.

80
ICT IGCSE Theory – Revision Presentation
Magnetic
Magnetic Storage Devices Tapes
Use: • Large organisations make daily backups of
their networks on to Magnetic Tapes
• Long-term archiving of data.

Access Type: Serial • Magnetic storage media


devices store data in the
Advantages: Disadvantages form of tiny magnetised
• Huge storage capacity • Slower Access dots.
compared to fixed and Tape reader has to start at
the beginning of the tape and • These dots are created,
portable hard drives. read and erased using
• Stored away in a fire continue fast forwarding until
it gets to the piece of data magnetic fields created by
proof safe. very tiny electromagnets.
that needed.
• Robust – last for long
time

81
ICT IGCSE Theory – Revision Presentation
CD-ROM
Optical Media

Use: CD-ROM disks are read-only. CD-ROMs are


normally used to store:
• Audio CDs
• Software Applications
• Device Drivers

• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Hold more data than • Data transfer rate is
floppy disks. slower compared to • Data is read by
• Cheaper than hard other storage medium. bouncing the laser
drives and USBs. • Not Robust - easily be beam off the surface
• Compatible with audio damaged or scratched. off the medium.
systems.

82
ICT IGCSE Theory – Revision Presentation
DVD-Rom
Optical Media

Use: DVD-ROMs disks are read-only. DVD-ROMs are


normally used to store:
• DVD Movies
• Software Applications
• Computer Games

• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Hold more data than CD- • Data transfer rate is
ROMS. slower compared to • Data is read by
• Can store larger other storage medium. bouncing the laser
applications. • Have to buy a separate beam off the surface
• Videos is higher DVD player. off the medium.
resolutions.

83
ICT IGCSE Theory – Revision Presentation
Blu-Ray
Optical Media

Use: Blu-Ray disks uses a blue laser instead of red


laser used with CD/DVD ROMs. Blu-Ray disks
are normally used to stored:
• HD Movies
• Large Software/Game Applications
• In camcorders in cartridge form.

• Optical storage
Access Type: Direct devices save data as
Advantages: Disadvantages patterns or dots.
• Large storage capacity used • More expensive compared
to store HD video content. to other optical media. • Data is read by
• Access Speeds are greater • Separate player required – bouncing the laser
than other optical medium. more expensive.
• Secure Encryption System to • Not all movie titles beam off the surface
minimise chance of available on Blu-Ray. off the medium.
copyright.

84
ICT IGCSE Theory – Revision Presentation

Optical Media

R – Write once only


RW – Can be written to or read many times.
CD-R and DVD-R CD-RW and DVD-RW) DVD RAM
Overview CD-R and DVD-R are only CD-RW and DVD-RW DVD RAMS are used when
recordable once. Once allows for data to be data constantly needs to
the process has been written, erased and be re-written. DVD RAMS
finalised then the disks rewritten many times. can hold up to 10GB of
become Read Only. • Used in CCTV data and commonly used
• Backup of data • Record television in recording equipment.
• Audio CDS programs
Advantages • Cheaper than RW disks. • Can be reused many Long life, large capacity,
times. and can be rewritten
many times.
Disadvantages • Not compatible with all • Can be expensive. Not compatible with all
players. • Data could be playback formats.
• If disk has a burn error it overwritten. Can be expensive.
can not be used again.

85
ICT IGCSE Theory – Revision Presentation

Solid ‘state’

• Solid-state storage devices are based on electronic circuits with no moving parts.
• Solid-state storage devices store data using a special type of memory called flash
memory.
• USB/Memory Cards use Direct Access
Examples USB Memory Stick Memory Card
Uses: Used to transfer files/backup Used to store files on digital cameras,
(work) between computers. mobile phones and mp3 players.
Advantages • Portable & Small • Very small and can be removed
• Robust and placed in other devices.
• large capacities • Robust
• No need for additional
drivers/software
Disadvantages • Easy to loose • Smaller storage capacities.
• USB could be damaged if not • Quite expensive.
ejected correctly.

86
ICT IGCSE Theory – Revision Presentation

Backup

Backup means making one or more copies of your data in a different


storage medium.

Why?
• You could delete a file by accident
• Your computer could break down
• Your computer could get infected by a virus which could edit
data
• Your laptop is stolen or becomes damaged.
• Data could be corrupted by hackers.

• Most businesses use computers to store very important data (customer


records, financial information, designs for products, etc.)

• If this data is lost, then this would cause disruption to the business. Backing-
up business data is essential.

87
ICT IGCSE Theory – Revision Presentation

How are Backups created

Personal Backups:
• Burning files to a CD-R
• Copying files to an external hard-drive
• Copying files to a USB
• Copying the files to another computer on a network

Business Backups:
• Making copies of data very regularly (daily).
• Using large-capacity media such as magnetic tape
• Keeping old copies of backups, just in case.
• Automating the system so that nobody forgets to do
it!
• Keeping backup media off-site (in case of fire or theft)

88
ICT IGCSE Theory – Revision Presentation
Networks and the effects of using them
• Understand how a router works and its purpose
• Understand the use of other common network devices, including: network interface
cards, hubs, bridges, switches, modems
• Understand the use of WiFi and Bluetooth in networks
• Understand how to set up and configure a small network, including: access to the
internet, the use of a browser, the use of email, access to an ISP
• Understand the characteristics and purpose of common network environments, such
as intranets and the internet
• Understand the advantages and disadvantages of using different types of computer to
access the internet

89
ICT IGCSE Theory – Revision Presentation

Overview What is a Computer Network?


A network is two or more
Workstation
computers, or other electronic
devices, connected together so
that they can exchange data.

For example a network allows:

• Computers to share files


• Users to message each other
• Share Resources
Internet Router Switch
Network connections between
computers are typically created
using cables (wires) or via
wireless signals.

Wireless
Access Bridge
Point

Cables
Wireless
Switch
90
ICT IGCSE Theory – Revision Presentation

Overview

Advantages of using Networks


• Easily share files and data.
• Share resources such as printers and Internet connections.
• Communicate with other network users (e-mail, instant messaging,
video-conferencing, etc.)
• Store data centrally (using a file server) for ease of access and
back-up.
• Keep all of our settings centrally so we can use any workstation.

Disadvantages of using Networks


• Greater risk of hackers.
• Greater risk of viruses (spreading and disabling network).
• The significant cost of extra equipment.
• When the network is down computers can not be used as
standalone computers.
• Print queues can be long.

91
ICT IGCSE Theory – Revision Presentation

Understand how a router works and its purpose

Data Packets contain the R R


following information:
Router

• Header to identify Data S Switch


Packet.
Outgoing Data
• Sender and Receivers IP
address. S R Incoming Data

• Number of data packets Internet


making up the whole
message.

• Connects network/computers to the internet


• Connects LANs/networks together
• Transfers data between networks (Receives and Sends Data Packets)
• Router can connect to devices using cables or wireless signals.
• It stores information about which computer is connected to which
network

92
ICT IGCSE Theory – Revision Presentation

Understand how a router works and its purpose

Web Pages are stored on Web Servers. Web


Server
Webpages have unique IP address &
domain names to find/communicate R Router
with each other.
S
R R R Outgoing Data
Incoming Data

Internet
S R

Routers direct packets of data across


the internet to its destination. R R

Everything connected to the internet has an IP Address.

93
ICT IGCSE Theory – Revision Presentation

Common Network Devices

A Hub and a Switch both connect a number of computers together to make a LAN.

Switch Hub

Smart Device Dumb Device

Sends specific packets of data to Sends data packets to all the


specific computers on the LAN using workstations on the network which
workstations unique MAC addresses. causes network traffic.

More secure however more expensive Poor Security

Normally used in larger networks Only would be suitable for a small


found in schools, offices etc. home networks.

94
ICT IGCSE Theory – Revision Presentation

Common Network Devices: Switch

Switch Ports Workstation connect to switch ports. Each


Network Card has a unique address (MAC
1 2 3 4
ADDRESS) which switches can use to
identify a workstation.

2 2
You always start Switch Table
with an empty 1 S 3 1 3
Work
station
Mac S
switch table. Address
1 AA-AA-AA
The switch will 4 4
learn each 2 BB-BB-BB
workstations 3 Sending Packets of Data from Sending Packets of Data from
MAC address Workstation 1 – 2 Workstation 2 – 1
when it sends a 4
packet of data The switch will send data Now the switch table has the
across the packets to all computers MAC address for workstation 1
because it does not know the it is possible for workstation 2
network.
MAC address for Workstation 2. to send a direct pack of data.

95
ICT IGCSE Theory – Revision Presentation

Common Network Devices

Modems Analogue <<< Digital Modems convert analogue signals from a


telephone line to digital signals which can be
read by the computer.

The Modem also converts digital signals back


into analogue for transmission over telephone
Analogue >>> Digital lines.

Network Interface Card


Network Interface Card (NIC) allows you to
connect a device to the network. The NIC will
contain the MAC address which will be used to
identify the computer to the network.

Bridges
A bridge is used to connect two parts of a LAN network together
so they function as a single LAN. Two Switches can be connected
using a the Bridge Device.
Switch Bridge Switch

96
ICT IGCSE Theory – Revision Presentation

Understand the use of WiFi and Bluetooth in networks

• Limited area of network


• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/less secure
• Physical obstacles can interfere with signal/can
cause disconnection

WiFi is a wireless networking technology makes it possible to connect devices with a wireless connection to a
network or to a single computer .
• Reduced cost of cabling/Safer – won’t trip over wires
• Easier to connect other devices to the network
• Makes the computer portable as long as it’s within range of the wireless access point

• Very slow data transfer speeds


• Short distance of coverage/limited signal strength
• Greater risk of interception of data/less secure
• Supports a limited number of devices in a network

Bluetooth is a wireless networking technology designed for very short-range connections.


• Connecting wireless devices such as mouse, phone, headset to a computer which are close in proximity.
• Transferring files between devices.
• Printing Wirelessly from a Tablet or Mobile Phone.

97
ICT IGCSE Theory – Revision Presentation

WiFi is a technology which makes it possible to connect a device to a network or to a single


computer through wireless communications, for example:

• Laptops
Wi-Fi • Mobile Phones, PDAs and other handheld devices
• Large computers which are WiFi enabled.

Bluetooth is a wireless networking technology designed for very short-range connections


(typically just a few metres).
Typical uses of Bluetooth:
Bluetooth • Connecting wireless devices such as mouse, keyboard, headset to a computer.
• Transferring files between devices.
• Printing Wirelessly from a PDA or Mobile Phone.

Advantages of Wireless Technology: Disadvantage of Wireless Technology:


• Reduced cost of cabling • Limited area of network
• Safer – won’t trip over wires • Strength of signal is weaker
• Easier to connect other devices to the • Possible slow data transfer speeds
network • Easier to hack into/less secure
• Makes the computer portable as long as it’s • Physical obstacles can interfere with signal/can cause
within range of the wireless access point disconnection

98
ICT IGCSE Theory – Revision Presentation

Setting up a Network

ISP (Internet Service Provider)


Set up an account with an Internet Service Provider (ISP) to
receive an internet connection to your location
Web Browser: Router:
To connect your LAN to the Internet (WAN)
To browse the internet.
Switch/Hub:
Email: To connect Network Devices together using
cables.
To send email messages including Network Cables:
attachments to other users. To create physical connections.
Security: Firewall:
To keep network secure from external threats.
Anti Virus/Spyware software to protect your
computer from external threats Servers:
(Viruses/Hackers) To manage network functions such as network
security, network file storage, share resources
etc.

99
ICT IGCSE Theory – Revision Presentation

Common network environments

LAN • LAN is a Local Area Network


• LAN covers a small area (normally
confined to one building or within
a close proximity).
• LAN consists of number of
computers and devices that The most common
usually connect to a switch which examples of WAN is the
is connected to a router. internet.

WAN • A WAN is Wide Area Network is a


network that extends over a large
geographical area.

• A WAN is often created by joining


several LANs together.

• Routers are used to connect LAN


networks to form a WAN Network.

100
ICT IGCSE Theory – Revision Presentation

Common network environments

WLAN
• A wireless LAN (WLAN) is a LAN that uses
AP
radio signals (WiFi) to connect computers
instead of cables.

• Devices know Access Points (AP) are


connected to the wired network at fixed
AP
locations.

• These devices provide the wireless access


to devices on the network.

AP • It is much more convenient to use wireless


connections instead of running long wires
all over a building.

101
ICT IGCSE Theory – Revision Presentation

Intranets and the Internet

Internet • Internet is Public (available to all Typical uses of an internet would be:
users)
• Internet is network of networks • Viewing web pages
• Internet is global • Sending and receiving e-mail messages
• Internet has more information than • Sharing files
• Communicating using voice (VOIP)
an intranet and video (video-conferencing)
• Playing multi-player games
• Streaming Video/audio Content
• Online Shopping/Banking

Intranet • Intranet is within one organisation Typical uses of an intranet would be:
(Private)
• Intranets tend to be • Viewing internal web pages (e.g.
policed/managed company schools, university's etc.)
• Intranet has an extra layer of security • Internal e-mail and instant-
messaging between workers
• Data found in an intranet is likely to Sharing of internal documents

be more reliable/relevant than that
found on the Internet

102
ICT IGCSE Theory – Revision Presentation

Accessing the Internet

Device Advantages Disadvantages


laptop computers • More portable and smaller in size compared • Touch pad may be difficult to
to desktop computers. use to navigate webpages.
• Bigger screens compared to tablets and • Processors are not as fast as
phones. desktop computers.

Desktop • Stable internet connection since the • Has to be connected to a


connection is normally wired. power supply at all times.
• Use of input devices including pointing • Not portable.
devices to make navigation easier.

Tablets • Tablet: More portable than desktops/laptops • Signal strength dependant on


however less than phones. location.
• Smaller display screen.
• Mobile: Portable: Easy to carry around and • Not all websites designed to
use whilst on the move. be used by mobiles/tablets.
• Touch screen may be difficult
Smart Phones • Mobile: Always likely to have a mobile phone
to use.
at all times.
• Limited battery Life.
• Mobile: Can access internet via phone
networks (4G)

103
ICT IGCSE Theory – Revision Presentation

• Security issues regarding data transfer

• Network communication

104
ICT IGCSE Theory – Revision Presentation

Security Issues

How can hackers effect your network and data?


Hackers
Introduce of viruses & spyware to the Network.
Viruses Threat to Data:
Spyware • Data could be deleted, edited, corrupted or be replicated.
\ • Data could be sold or passed on to other people.

Phishing Threat to Network:


Pharming • Network may have to be shut down to quarantine virus.
• This could stop production and cost an organisation a lot of
money.

Should the Advantages Disadvantages


internet be • To protect vulnerable users gaining • It would be extremely difficult and expensive
policed? access to undesirable websites. to police the internet.
• To prevent illegal material (software, • Infrastructure including staff and offices would
videos) be openly posted and shared by have to be required.
web users. • Would be difficult to enforce different rules in
• To bring to justice those users who different countries.
continually misuse the internet for their • Could go against freedom of speech.
personal gain.

105
ICT IGCSE Theory – Revision Presentation

User Name & Passwords: Methods of Authentication (Network Security)

Authentication techniques are used to ensure only authorised users are able gain access to a
Network via User Names/Passwords, Biometrics, Swipe Cards, TAN, Two Factor authentication
etc.

Passwords are Disadvantages Avoiding password interception


a method of Passwords can be guessed especially Set strong passwords which include
authentication. • •
if they are simple. multiple characters such letters and
numbers.
• Passwords may be seen by others.
• Ensure password is regularly changed.
• Passwords can be stolen and used by
other people. • Avoid using the same passwords for all
of your accounts.
• Spyware could be used to logs key
presses to get passwords. • Install spyware software which will
block the installation of any key logging
• Passwords can be hacked by using software.
password generating software.

106
ICT IGCSE Theory – Revision Presentation

User Name & Passwords: Methods of Authentication (Network Security)

Setting a strong Password:


• Use at least 8 characters
• Includes letters and numbers
• Avoid using names or words which could be easily guessed.
• Use upper and lower case letters.

When users log onto to their online accounts they may also be asked for additional
information to verify their accounts.

Security Question:
• Users may be asked to answer security questions related to their
account.
• Typical questions includes mothers maiden name.

Personal Image:
• QNB (Qatar National Bank) require users to identify an image when
they log in on the website for online banking. .
• Users will have to confirm if the image shown is one they selected as
their account image.

107
ICT IGCSE Theory – Revision Presentation

Alternatives Methods of Authentication (Network Security)

Device Overview/Advantages
Biometrics • Biometrics use unique data.
• Finger Prints • Only the person with the biometric features can access the
• Retina Scan network.
• Iris Scans Can not copy/replicate biometric data
• Face Scans •
• Vocal Recognition

Magnetic Swipe • Swipe cards are used to gain access to the system by swiping the
Cards card into the reader.
• Swipe cards are quite easy to use and update.
• Could also be used to gain entry into a room (hotel room).

Transaction • TAN is used by online banking services.


authentication • User will insert their bank card into the TAN reader which will
number (TAN) then provide a code which will need to be entered to complete a
transaction.

Two factor • Two Factor Authentication involves the user typing in their
authentication password and then typing in a code.
• The code is sent to the registered phone number of the account
as a text.
• If an unauthorised attempt is made to log into an account then
the text message will alert the user.

108
ICT IGCSE Theory – Revision Presentation

Security issues regarding data transfer: Viruses & Spyware

A computer virus is a piece of programming code/software which can install and replicate it self
on to a computer system without the user’s permission. A computer virus can cause the
following problems.
1. Causes the computer to crash – become slower
2. Sometimes files can be deleted – leads to computer malfunction.
3. Data files can be copied by the hacker or the files could be corrupted.
4. Could stop production until the virus has been quarantined.

Spyware gathers data from computers without the user knowing. Spyware could
monitor key presses to gain personal information or passwords. This information
would be sent back to the hacker.

Installing anti virus and spyware software and the use of a firewall is not
enough to keep your computer safe. You also need to pay attention to the
following points.
• Do not download any files from untrusted sources including email attachments.
• Do not install illegal software onto your computer.
• Do not click on links from unknown websites.
• Do not connect storage devices (e.g. USB) from unknown sources.
• Ensure virus software is up to date and virus definitions are regularly updated.

109
ICT IGCSE Theory – Revision Presentation

Security issues regarding data transfer: Firewall

Prevents computer accessing Monitors and controls incoming


undesirable/unauthorised sites and outgoing data traffic.

Prevents unauthorised computers


using the internet accessing the
computer

Helps to prevent malware


(viruses) getting into
computer/from the internet

Keeps a list of undesirable sites/IP addresses


Keeps a list of acceptable sites/IP addresses

Warns you regarding threats/allows you


to accept/reject downloaded programs
110
ICT IGCSE Theory – Revision Presentation

Encryption

Encryption is the process of converting information into a form that is meaningless


to anyone except holders of a ‘key’.

1. Data is scrambled up (Data is


Encrypted).

2. If the data is intercepted it then it


prevents people from understanding
and reading the data.

3. The person with the key is able to


Decrypt and understand the data.

Disadvantages
• Data can still be deleted from system
• Criminals can use encryption to keep incriminating material secure

111
ICT IGCSE Theory – Revision Presentation

Proxy Server

Can be used to monitor Internet usage

Can block certain sites

Server passes on requests to the Internet


Passes the requested web pages to individual computers

Can cache/store the webpages

Can act as a buffer (between Internet and LAN)

Can act as a web server

112
ICT IGCSE Theory – Revision Presentation

Security issues regarding data transfer: Data Protection Act

Data protection Act applies to paper based or electronic forms of data stored on a computer.
The data protection act is to protect rights of the individual who the data is obtained from.
Web based business such as Amazon or Ebay store sensitive data about customers including
payment details. They would have to abide by the data protection act to keep the data secure.

Principles of the Data Protection Act

1. Data must be fairly and lawfully processed.


2. Data can only be processed for the stated purpose.
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they have
adequate protection.

113
ICT IGCSE Theory – Revision Presentation

Network communication
Type of Overview/Advantages Disadvantage
Communication
Physical Faxing • Requires a fax machine and a telephone line. • Anyone can access faxed
• Number of the recipient dialled before the documents.
document is copied and sent. • The fax may be out of paper or
• Physical documents are printed and can be ink (toner).
signed. • No notification of fax received.
Email • Can send multiple attachments. • Email attachments may include
Communication • Can send to multiple recipients in one viruses.
message. • May receive spam (unwanted
• Emails can be received instantly and accessed mail).
on many platforms including tablets and • May receive phishing (scam)
phones. emails to obtain personal data.
Electronic Faxing • Electronic Fax is sent via a internet connection.
• No need to buy a fax machine, ink or paper.
• Electronic Fax documents are sent to an email which will ensure the correct person
will receive the fax – less chance of document being intercepted.
• Electronic Fax's can also be sent directly to a fax machine.
• Send fax's from any location with an internet connection.
• No additional cost to send fax over internet network.

114
ICT IGCSE Theory – Revision Presentation

Network communication

Advantages and Disadvantages of using email compared with faxing


Fax Email
Advantages • Documents can be signed which are • Emails are password protected so less
legally accepted. likely chance of data being intercepted.
• Physical copies of documents can be • Emails can be received instantly.
sent and automatically printed. • Attachments can be edited and sent back.
• Can send to many recipients at the same
time.
Disadvantages • Data is more likely to be intercepted • Cant be used when documents need to be
once it is printed from the fax signed.
machine. • Viruses can be download from
• There could be delays in receiving attachments.
the fax due to a busy telephone line • Unwanted emails could be received
or lack of paper or ink. (Phishing/Spam).
• Fax can only be received during
office hours.
• Not everyone has a fax machine.

115
ICT IGCSE Theory – Revision Presentation

Network communication

Type of Communication Overview Hardware


Video • Video conferencing uses both video and sound • Web Camera
Conferencing using an internet connection.
• It can be used to have business meeting when
people are in different locations.

• Screen/Monitor
Advantages • No need to travel to have meetings which would cut down
on travelling costs (including flights and hotel) and
travelling time.
• Video conference can be held at short notice. Speaker
Facilitates long distance learning – students can access live •

lectures without travelling.

Disadvantages • Technical problems with the internet or hardware could


effect the quality of the video conference. • Microphone
• Set up costs to purchase hardware/software and to provide
relevant training to staff.
• Lack of personal contact you would have if it was a face to
face meeting.
• Different time zones could make it difficult to find to find a
suitable time to have a meeting.
• Not possible to sign documents.

116
ICT IGCSE Theory – Revision Presentation

Network communication

Type of Communication Overview Hardware


Audio- Audio conference can be done over the telephone network • Telephone
Conferencing or using a computer making use of VOIP.
1. The organiser of the phone conference is given a
unique Pin which can be shared participants.
2. For Participants to join they have to dial the
conference phone number. VOIP
3. Then they would have to enter a PIN. • Microphone
• Speakers
Web- • Web conference can be done using internet connection. • Same as
Conferencing • It is very similar to video conference as participants can video
hear audio and see a live video stream. conferencing.
• Participants can join the web conference by clicking on
the supplied link from the organiser. • Keyboard
• Participants can join and leave the web conference at could be use
any time. for IM.
• Instant messaging (IM) feature is available to
communicate with other participants.
• Participants can be given permission to speak and can
share content such as images, video or presentations.

117
ICT IGCSE Theory – Revision Presentation
The effects of using IT
• 5.1 Effects of IT on employment
• 5.2 Effects of IT on working patterns within organisations
• 5.3 Microprocessor-controlled devices in the home
• 5.4 Potential health problems related to the prolonged use of IT equipment

118
ICT IGCSE Theory – Revision Presentation

Effects of IT on employment

Areas of Increased Employment Areas of Increased Unemployment


Website designers: With a demand for Office Work:
companies to have a web presence website The use of applications such as
designers are required to set up and maintain spreadsheets, word processors and
the webpages. databases has improved the efficiency of
the office and also reduced the numbers
Delivery Drivers: With more shops opting to of workers required to complete set tasks.
have online presences dispatch departments
are required to deliver goods to customers.
Computer Programmers: Manufacturing:
With the increase use various devices In the manufacturing industry robots have
programmers are required to write operating replaced human workers. Robotics will
systems, applications and computer games. mainly complete the more labour
intensive tasks.
Network Managers: Retail:
In any place of work network computers is With more retail outlets opting for the
the norm. For a network to function network online route to target a wider customer
technicians and managers would have to be base this has meant more high street
present to maintain and to provide technical stores are closing down due to a lack of
support. demand and staff are losing their jobs.

119
ICT IGCSE Theory – Revision Presentation

Effects of IT on working patterns within organisations

The use of computers have changed the way we complete our work. Employees now don’t
necessarily have to be in the office to complete set tasks.
Remote Working: Employees are Advantages Disadvantages
able to access their office desktop
computer from a different location Employee Employee
(home).
• Do not have to make child care • Lack of interaction (including
arrangements – spend more social) with staff and
time with family. management.
• Employee can work at a • Employee could be easily
Use of Intranet: Employees can log convenient time for them. distracted working from
into an intranet to communicate • Save time/costs on travelling. home.
and access shared resources with • Could be overlooked for
Employer
other staff. promotion opportunities.
• No need to provide desk/office
space. Employer
Use of Internet: Employees can
check their emails or have web • Employees may be happier and • It could be harder to check
conferences with peers. productive working at home. what the employee is up to.

Use of Smart Phone: Phone calls


and emails can be diverted to
personal smart phone from office
accounts.

120
ICT IGCSE Theory – Revision Presentation

Effects of IT on working patterns within organisations

The introduction of ICT in the work places has allowed employees to work a more flexible time
rather than the rigid traditional office hours of 9-5. The four main types of Employee working
patterns are Full Time, Compressed, Part Time and Job Share.

Full Time:
• Employees will normally work
over 5 full days.
• Typically 9am till 4 or 5pm.
• Will complete between 35 –
40 hours a week.

Compressed Hours:
• Employee are still working
full time hours.
• However the same amount of
hours are completed over
less days.
• Employees will work more
hours in one day.

121
ICT IGCSE Theory – Revision Presentation

Effects of IT on working patterns within organisations

Part Time (flexi-Time):


• Employees who work less
hours over a week than a full
time employee.
• Part time staff can work
outside of the traditional
hours of work (evenings or
weekends).

Job Sharing:
• Full time job is divided
between two part time
employees.
• Both employees do the same
job – same responsibilities.
• One employee could work in
the morning and the other in
the afternoon or the first or
second part of the week.

122
ICT IGCSE Theory – Revision Presentation

Microprocessor-controlled devices in the home

Microprocessors are found in many household devices. These devices could either be labour-
saving devices, leisure or more for connivance.

Advantages Disadvantages
• Devices do much of the housework chores including: • People can become over reliant on
• Cooking Food these devices and can become lazy.
• Washing clothes or dishes
• Tasks do not need to be done manually which means: • Can lead to unhealthy eating due to
• Do not need to be in the house when food is cooking or dependency on ready meals.
clothes are being washed.
• More time to spend with family and friends. • Manual household skills are lost.
• More time for leisure activities or to complete work.
• Can encourage a healthy lifestyle because of smart fridges
analysing food ingredients.
• Do not have to leave home to get fit.
• Burglar alarm provides a sense of security.

123
ICT IGCSE Theory – Revision Presentation

Potential health problems related to the prolonged use of IT equipment


Health Risk and Reason Prevention
Repetitive Strain Injury (Fingers/Wrist) • Use of a wrist support when typing and
• From repetitive clicking of mouse and using a mouse.
continual typing.
Back Problems • Use of adjustable ergonomic chair.
• From sitting in same position all day or • Ensure the monitor is at eye level.
having a bad sitting posture.

Headaches/Eyestrain • The use of anti glare filter to reduce the


• From staring at screen continuously or screen reflection which could tire the eyes.
having bad lighting in the room. • Use of LCD screens over CRT due to
reduced amount of flickering.
Use of IT equipment to minimise the health risks:
• Use of ergonomic chairs which are adjustable to suit the needs of the user.
• Use of ergonomic designed work stations.
• Use of ergonomic keyboards.
• Use of voice-recognition software to reduce the amount of mouse clicking and typing.
Strategies to minimise the health risks:
• Take regular breaks – walk around and stretch muscles.
• Look away from the monitor at regular intervals

124
ICT IGCSE Theory – Revision Presentation

6.1 Communication applications


6.2 Data handling applications
6.3 Measurement applications
6.4 Microprocessors in control applications
6.5 Modelling applications
6.6 Applications in manufacturing industries
6.7 School management systems
6.8 Booking systems
6.9 Banking applications
6.10 Computers in medicine
6.11 Computers in libraries
6.12 Expert systems
6.13 Computers in the retail industry
6.14 Recognition systems
6.15 Monitoring and tracking systems
6.16 Satellite systems

125
ICT IGCSE Theory – Revision Presentation

6.1 Communication Applications

Paper Based
Types of Communication & Purpose Use of Computers
News Letter: Used by companies to communicate certain information to staff and • Save and insert pictures
customers. May contain information on recent events and identify success from clipart, Internet,
company may have experienced. scanned images & digital
camera.
Brochures/Leaflet: Can be used to advertise a company or to be informative. • Adjust the page layout.
Brochures are normally printed on glossy paper with a high quality finish. • Create and Insert
Tables/charts
Flyers: Informative document which can be distributed to promote or create • Formatting the layout of
awareness of an up and coming events. the document.
• Applying effects to
Posters: larger then flyers and are strategically positioned to promote and create images (crop, colour
awareness. Displayed on billboards, notice boards, buildings as part of an scale, rotate etc.)
advertising campaign to target a specific target audience. Text Formatting
• Font Style
• Bold
Advantages Disadvantages • Alignment (left, centre,
• Not necessary to have a computer or • These communication would mainly be right and fully justified)
internet connection. distributed by hand. • underline
• You have a physical copy of the • Printing costs • Italic
document. • Restricted to a smaller target audience. • colour

126
ICT IGCSE Theory – Revision Presentation

6.1 Communication Applications

Computer Based Cartoons (Animations)


Types of Communication & Purpose Animations can also
be created using
Websites specialist software
to promote new
• Companies use websites as a means to communicate with existing and products.
potentially new customers.
• Websites can be easily updated and can provide relevant and up to
date information. Music Scores
• Websites can be used to research, social network, online gaming or for
online shopping and banking. Music can now be
created and edited
Multimedia Presentations on computers. Can
• A common use for presentations is to provide training in businesses or be used as part of
places of education. The presentation will be a focal point on the adverts or slogans.
projector whilst the speaker is presenting.

Advantages Disadvantages
• Can include interactive elements • Websites can be hacked and
such as sound, video, animation and information may be altered.
hyperlinks. • Setting up website and maintaining
• Can be available on different would be expensive and would
platforms. require a special skill set.

127
ICT IGCSE Theory – Revision Presentation

6.1 Communication Applications

Mobile Based Voice Over Internet Protocol


(VoIP)
Types of Communication & Purpose
When voice calls
Phone Calls: Allows users to make a audio phone calls to each other from are taken place
any location within the network coverage area. over an internet
Text Messages: Allows user to send simple messages to each other even if connection (e.g.
the recipients phone is turned of or not within network coverage. Whatsapp, Viber).
Accessing the Internet: Email and social networking applications are now
available on mobile phones which makes it easier for users to stay in
contact with each other. Businesses can also use these apps to advertise
and communicate with customers.

Advantages Disadvantages
• Mobile phone is portable and can • Long distance calls or phones calls in
be used on the move. different countries could be expensive.
• Mobile phone contracts can offer • Mobile signal could be weak or non
free minutes and texts. existent in some places.

128
ICT IGCSE Theory – Revision Presentation

6.2 Data Handling Applications

Advantages of Data Handling Applications for Storing Data:


• Data can be updated, organised, sorted and searched in different ways.
• Data can displayed or printed in different formats.
• Data can be backed up or moved using storage media.
• Huge storage space not required (filing cabinets)

Address Lists Surveys School Records


Mobile phones include Information from Student records including
address books which surveys could be held assessment and behaviour
include contact names, on a database so that data. Also staff data could
numbers, email data could be analysed also be held on database
addresses etc. and queried.

Club/Society Records Libraries


Information on current members Information on current books
including names and contact details. which are available to borrow
Also members methods of payment and members of the libraries.
to pay membership fee.

129
ICT IGCSE Theory – Revision Presentation

6.3 Measurement applications

Role of Measurement Applications 1 - Input devices called


Sensors are placed to measure physical variables. The sensors feed data into the
data from sensors are measured in analogue. The computer.
analogue signal is then converted to a digital signal
using a convertor.

2 - The computer then


Examples processes the input data.
Weather Thermometer for measuring temperature
Stations Anemometer for measuring wind speed Sensor readings are compared to
Wind vane for measuring wind direction
Hygrometer for measuring humidity the preset values.
Barometer for measuring atmospheric pressure
Green Sensors are placed in the green house to measure
House whether plants are growing in the correct
conditions:
• Light, Moisture, Humidity, PH Levels 3 - As a result of the
processing, the computer can
Patients Sensors will be attached to the body to monitor: send a signal to the output
Vital Signs • heartbeat, blood pressure, temperature etc.
devices called actuators which
could change physical
conditions.

130
ICT IGCSE Theory – Revision Presentation

6.3 Measurement Applications

Why Use Computers to Measure Things?


• Computers do not require breaks .
• Readings are more accurate compared to
humans.
Data collected from • Readings are taking more frequently.
Sensors is in Analogue • Data can be analysed and compared with
existing data.
ADC - Analogue-to-digital converter • Automatic graphs can be created.
• Sensors can work in extreme conditions
Analogue Signal now can which could be dangerous for humans.
be understood by • People can complete other tasks whilst the
computers. systems works automatically.
• If human intervention is required then a
signal will be sent to the buzzer.

131
ICT IGCSE Theory – Revision Presentation

6.4 Microprocessors in Control Applications

Role of Microprocessor in Control Applications 1 - Input devices called


• Sensor readings are compared to the pre-set value which are sensors feed data into the
inputted by the user. computer.
• If sensor readings are below or higher then then the pre-set value
then a signal will be sent to the actuator to change the physical
conditions.
• Process is constantly will be repeated.
2 - The computer then
processes the input data.
Example Process Microprocessor Output
Green House Compares light, temperature, • Light on/off Sensor readings are compared to
moisture to Pre-set value. • Heater on/off the preset values.
• Motor
Sends signal to actuator is necessary. open/close
Process is constantly repeated windows
Patients Vital Compares Vital signs (heartbeat, blood • Buzzer will alert 3 - As a result of the
Signs pressure, temperature to Pre-set staff to any vital
value. signs which are processing, the computer can
below the send a signal to the output
Sends signal to actuator is necessary. expected values.
Process is constantly repeated devices called actuators which
could change physical
conditions.

132
ICT IGCSE Theory – Revision Presentation

6.4 Microprocessors in control applications

Green House (Temperature Example)

Less than < 20 Degrees


Send signals to
Motor to close
Window and Turn
1 – Input Heater ON
ADC Microprocessor
Sensors Preset:
Monitoring 20 Degrees
Continuously Process Send signals to
Repeated Motor to open
Window
More than > 20 Degrees

Examples in a Green House


• Light
• Moisture
• Humidity
• PH Levels

133
ICT IGCSE Theory – Revision Presentation

6.4 Microprocessors in Control Applications

Microprocessors Typical Exam Questions

Describe the role of the microprocessor in controlling the oven


temperature.
• Microprocessor switches heater on
• Microprocessor receives data from temperature sensor
• Temperature of oven is compared with pre-set value by microprocessor
• If higher microprocessor switches heater off
• If lower microprocessor leaves heater on

Describe how the microprocessor uses data from the light sensor in a
green house.
• Microprocessor compares light reading with preset value
• If lower than pre-set value microprocessor sends signal to switch on light bulb
• If higher than pre-set value microprocessor sends signal to switch off light bulb
• process is continuous/ monitoring of sensors is continuous

134
ICT IGCSE Theory – Revision Presentation

6.4 Microprocessors in Control Applications

Turtle Graphics

Tip: In this question you have to


write out the remaining steps.

1st: Work out how many more steps


you have to get around the shape. (8)
2nd : It is possible you may have to use
a repeat to draw the shape.
3rd: Remember to end the repeat.

135
ICT IGCSE Theory – Revision Presentation

6.4 Microprocessors in Control Applications

Turtle Graphics

A student wishes to use a floor turtle to draw this shape which has no two lines the same
length:

Name four different instructions which the turtle graphics software could use in order to
draw the shape. For each one explain the meaning of the instruction.

Tip: They may actual ask you to write


possible instructions and the
meanings to draw the shape shown.

136
ICT IGCSE Theory – Revision Presentation

6.5 Modelling Applications

A computer model is a model which would replicate (simulate) the functions of a


real system.

To save costs and time To train people how to


by testing a system use the system in a safe
before you build it. controlled environment.

e.g. Creating bridges e.g. Flight Simulators.

Why we use Computer Models?

To investigate the To make predictions of


capabilities of the system how the system would
in detail by interrogating operate in the future.
and manipulating the
computer model. e.g. Use of spreadsheets
to track profit/loss over
time
137
ICT IGCSE Theory – Revision Presentation

6.5 Modelling Applications


Type of Modelling Application
• Business used can use spreadsheets to forecast spreadsheet models
to forecast future profit or loss.
Spreadsheets • Due to the use of formulas business can adjust certain values to see
automatic changes in potential revenue.

• Pilots are able to learn how to fly a plane using a flight simulator.
• The controls and the interface is the same as real plane.
Flight • Different conditions can be tested.
Simulator • Reduced costs as a plane would not be damaged in the training.

• Before buildings are constructed simulations take place to ensure


Building they are fit for purpose.
Simulator • Simulations ensure the potential building could cope with physical
demands including earthquake/storm threats.

• A traffic light simulator looks at the flow of traffic (data captured from
sensors).
Traffic Lights • The simulator will adjust the lights to best control the flow of traffic.

138
ICT IGCSE Theory – Revision Presentation

6.6 Applications in Manufacturing Industries

Robots are used in manufacturing to help to improve productivity, consistency (in terms of final finish) and to
reduce overall running costs. Robots generally make the factory a much more safer environment for workers.
How Are Robots Used in a Factory?
1. Lift heavy items
2. Assemble parts together
3. Paint items (Spraying)
4. Manufacturing Microchips

Robots are programmed with a sequence of


Exact sequence of The robot is now able to carry out the
instructions. The programmer may guide the
movement is stored in same sequence of instructions over and
robot through each step physically or by
the memory. over again.
controlling the robot by remote.

Advantages Disadvantages
• Robots can work 24/7 with the same consistency and Robots cannot easily adapt to a situation which is beyond their
accuracy compared to humans. sequence of instructions.

• Robots can be more productive than humans. Robots can be expensive to buy and maintain.
• Robots can work in extreme conditions not suitable for Some workers may loose their jobs as robots can do more labor
humans. intensive jobs.

• Robots do not need to be paid. People are deskilled due to robots doing more complicated
jobs.

139
ICT IGCSE Theory – Revision Presentation

6.7 School Management Systems


School Management Systems are now usedof
Type in schools by staffApplication
Modelling to complete a number of tasks on a daily basis.

Learner • Teachers will be able to click on a particular class and complete the register.
Registration • Once this is saved then other users of the management system can see who has been
and Attendance register for that particular period.
• This is useful as it allows teachers to see who should be attending their lessons.
• Data of attendance can then be easily analysed.
Exam • Exam Timetables can be produced using management systems and teachers who are
Timetables not teaching could be easily allocated to invigilate exams.

Creating • Timetables can be produced using management systems.


Timetables or • They are generally quicker to create and less prone to errors compared to a paper
Cover based system.
• Timetables can also be produced cover classes when teachers are absent and lessons
need to be covered.
Learner • Teacher are able to log student data (grades/applications/reports/behaviour) into a
Performance school management system.
• This data is then available (central storage of data) to anyone other members of staff.
• The data can analysed and reports can be produced.
Benefits to • Parents are able to log in and access student reports online.
school/parents • They can be kept up to date about exam results and general student progress in
subjects.
• Also they can receive immediate feedback. There would be no need for printed
reports which would reduce costs.

140
ICT IGCSE Theory – Revision Presentation

6.8 Booking Systems

Online booking systems use real time processing which allows users to Input: User will select the
make and confirm bookings instantly. Once payment has been received
and booking is confirmed then booking can not be double booked. requirements of the
booking. E.g. date of flights,
Example Uses: Airports, Location etc.
Transport: Flight, Trains and Buses
Entertainment: Theatre, Cinema and Stadium Processing : involves
Accommodation: Hotels, Apartments and Villas
checking if bookings are
Advantages: Disadvantages possible (availability)
• User can check availability of tickets • It may be difficult to cancel a booking
and compare prices on comparison and get your money back.
websites.
• Online booking services have known Outputs:
• Confirmation message is sent to crash to high level of traffic to the booking confirmations
instantly once payment has been website.
authorised. /rejections
• You are unable to receive specific
• They prevent double booking as the advice on your booking if it is done alternatives/Payment
process is real time. This means if online.
somebody makes a booking then it
instantly becomes unavailable. • Websites may not be user friendly
• You may receive special offers if you and may make the booking process
regularly book using a particular more difficult.
booking website.

141
ICT IGCSE Theory – Revision Presentation

6.9 Banking Applications


Electronic Fund Transfer (EFT) allows money to be transferred electronically from one account to another.
An example of EFT is when an Employer pays their employees their salaries.

Employee 1
Business
+ £1500
Bank
EFT instruction to pay Employees
Account Employee 2
£4500 + £1500
-£4500 Employee 3
+ £1500
Advantages: Disadvantages
• No physical money is transferred which makes • Money could be transferred from the incorrect
the transfer more secure. account.
• Transfer of salaries can be regulated by the • Incorrect amount of money could be transferred
government (e.g. Used in Qatar to ensure by mistake.
employers are paying their employees on time). • If you have a poor credit rating then you may not
• Customers can set up standing orders (direct be declined to use EFT as a method of payment
debit) to pay bills on specific dates. (e.g. paying monthly for a mobile phone contract).

142
ICT IGCSE Theory – Revision Presentation

6.9 Banking Applications

Processing credit/debit card Transactions

Customer’s Bank (Card Holder’s Issuing Bank)


Merchants' Bank (Acquiring)

Funds are transferred


Checking Funds
Funds are not available

Transaction
Using details on the Declined. Card holder is paying by
card the Merchant’s Card.
bank contacts the card Card will be place in
holders bank to check chip and pin reader.
for sufficient funds to Merchant Card Holder Pin will be entered to
complete the proceed with
transaction. transaction.

143
ICT IGCSE Theory – Revision Presentation

6.9 Banking Applications

Clearing of Cheques

You receive a check


The cheque is then The cheque data is
from your employer
sent to a clearing sent electronically to
which you pay into
centre where it is the payers bank (the
your bank account. You sorted and cheque person who wrote
Employer
data is created. the cheque).

Money is received If funds are The payers bank


After 4 working
electronically from available then the checks for fraud and
days the person
the cheque payers money is sent also checks if
who paid in the
bank and deposited electronically to the
cheque should sufficient funds are
into the account of bank of the person available.
have access to
the person who paid who paid in the
the money.
in the cheque. cheque.

144
ICT IGCSE Theory – Revision Presentation

6.9 Banking Applications

ATM (Cash machines) can be used for various purposes (including cash withdrawal/deposit,
checking/printing statement).

The PIN number is Customer may be asked to select a language.


compared with the PIN
stored in the chip. If Pin
is the same then the The customer types in the PIN.
customer can Proceed. Cash Withdrawal
If Pin is correct then the customer will select a Cash Deposit
If not customer will be service. Check Balance
requested to re enter Print Statement
the Pin. Phone Topup
If customer selects the Cash Withdrawal then they
The customer’s account
are requested to select an amount to withdraw.
is checked to see if it has
sufficient funds. If there are sufficient funds and the amount is within
the card limit the required notes are issued.
The amount is also
checked against the card
limit or daily withdrawal Customer is requested if they would like a receipt.
limit. The card is then returned to the customer.

145
ICT IGCSE Theory – Revision Presentation

6.9 Banking Applications


Banking Advantages Disadvantages
Online Customers can now access their bank • Can be accessed from • Internet connection
Banking accounts online on secure websites using various platforms and required.
used 24/7 including
authentication techniques. Some banks have whilst on the move. • Less personable for
also developed online banking applications to those who would
allow customers to access their accounts via • Save time and costs- prefer direct
mobile phones and tablets. No Travelling or money communication with
spent on travelling or a bank representative
Customers can use the on-line banking parking. .
system to: • Your account could
• Check their balance and print statements • Statements can be be hacked or
• Manage direct debits downloaded from a passwords stolen
given time period. from key logging
• Transfer money internally and externally to software.
other accounts using EFT. • Several layers of
• Apply for loans or credit cards. authentication.

Phone Phone banking is very similar to online banking • Can talk directly to a • Call costs
in that customers can complete similar tasks. representative from • May be put on hold
Banking the bank. for a long time.
Customers will have to enter in their account Ask additional queries Call times (9am-5pm)
• •
details to authenticate them to the system. which are not available are not flexible.
Then they will have to select from various online.
options by the specified numbers keys.

146
ICT IGCSE Theory – Revision Presentation

6.10 Computers in Medicine

Type Use of Technology Advantages Disadvantages


Information • Keeping patient records in a • Computers can take more • Equipment could
Systems in database so correct diagnosis accurate an more frequent be expensive.
Medicine can be given according to readings of patients. • Training would be
patients medical history. • Computers can respond required.
• Monitoring patients (vital quicker to any changes in • Regular
signs) using measure and patients condition. maintenance of
control systems • Staff are available to the system would
• The use of expert systems to complete other tasks. be required.
diagnose an illness. • Data can be stored in • Systems could
central place. stop responding.
• Saving physical space
which would be required
to stored paper records.
3D printers • Surgical and Diagnostic Aids • Printing is relatively cheap. • Technology is still
• Prosthetics • Printing can be faster in the earl stages
• Tissue engineering compared to of development.
• Artificial blood vessels manufacturing parts. • Limited selection
• Designs of medical tools and of materials
equipment available.

147
ICT IGCSE Theory – Revision Presentation

6.11 Computers in Libraries

Computers are used in libraries to keep a track on which books have been borrowed by which
members. Databases software is typically used to store details of the books and the members.
Issuing of Books Advantages:
• Books and members can be identified by unique • Data from the books
barcodes which can be scanned in directly by and the members are
barcode scanners. entered quickly and
• When a book is taken out the bar code is scanned as more accurately
well as the barcode on the members card. compared to manual
• The due date is worked out by the date the book methods.
was issued.

Automatic Processing Advantages:


• The library’s database is checked on a daily basis to • Members would be
check which books are due. able to extend the
• Liberians can quickly check if a book is available to lease period on the
be borrowed or could provide specific dates to book borrowed
members when the book will be returned. online.
• Automatic emails could be sent to the members to
remind them of the due date.

148
ICT IGCSE Theory – Revision Presentation

6.12 Expert Systems

Expert systems are used to provide expert opinions without the need for the expert by using a
system allowing the user to query the knowledge base to find solutions to their problems.

User interface - Will allow user to knowledge base - Information is


interact with the system to receive developed by experts based on
feedback. a collection of facts and rules.
For example the user may be prompted to For Example a medical diagnosis expert
enter their symptoms for a medical issue. system would be developed by doctors.

User

User Inference
Knowledge base
Interface Engine

Inference Engine - The Inference engine will act as a search engine.


It will query the knowledge base to match the query of the user. Rules Base
Additional questions could be to user to provide a more specific
diagnosis

149
ICT IGCSE Theory – Revision Presentation

6.12 Expert Systems

Creating an Expert System

1. Data is gathered/collected from experts to create a knowledge base.


2. The rules base is designed/created based on the information from the knowledge base.
3. A user interface screen is designed/created which would provide the user with the ability to
interact with the system.
4. The inference engine is designed/created as link between the user interface and the
knowledge base.
5. The system is tested.

Examples

Car Diagnostic Expert System

Car engine will connected to the diagnostic expert system.


The expert system will automatically test certain functions
and provide feedback for repair.

150
ICT IGCSE Theory – Revision Presentation

6.13 Computers in the Retail Industry

POS (Point of Sale) is the place a transaction takes place. Customers can pay by cash or using
their debit/credit cards. Stock control systems can automatically update stock records when
items are purchased at the POS.

Bar code scanner -6


used to scan items purchased
at POS cans

Current Stock Level 6 Cans Purchased Current Stock Level 4


10 When goods are sold at the POS the stock
control system is automatically updated.

If Stock Falls Below 5


(Pre-set)
True: Reorder 10
Order is sent to the
Stock control system automatically suppliers.
updates the stock levels adding the The suppliers send a delivery (10 Suppliers address details
delivered goods. cans of beans) to the store. stored in database.

151
ICT IGCSE Theory – Revision Presentation

6.13 Computers in the Retail Industry

EFTPOS (Electronic Fund Transfer Point of Sale) is when a customer uses a card to complete a
transaction.
1. Customer gives bank card to cashier at POS.

2. The cashier enters the card in to the chip and pin reader
Pin entered has and confirms the value of the purchase.
to be correct for
the transaction 3. The customer is requested to enter their pin. If Pin
to continue. The matches the Pin stored on the chip then the transaction can
card will also be continue.
checked for
4. The shops computer will use the account details on the
validity (expiry If funds are not available a
chip to connect to the customers bank account and check
date/stolen). declined message will be
the balance.
sent to the stores
5. If funds are sufficient then the transaction will be computer. The cashier will
approved. then request for another
method of payment
6. The purchase amount is subtracted from the customer’s
account and deposited into the shops banks account.

7. Once the transaction is complete receipt will be printed.


The cashier will give the card and receipt to the customer.

152
ICT IGCSE Theory – Revision Presentation

6.13 Computers in the Retail Industry

Internet banking and shopping is becoming more popular to users due to the development of
the internet and the advancement of mobile internet technology.

Advantages Disadvantages
• Internet is now available on more platforms including • Online accounts could be hacked/cards
applications available on phones and tablets. details could be stolen.
• Internet can be accessed 24/7. • Users require a internet connection and
• No need to travel (saves money on travel/parking) need to be computer literate.
• Saves time (No need to que in the banks or shops) • Lack of socialising/exercising.
• Access to wide range of goods on the internet. • You can not see the goods before you
• Useful for individuals who find it difficult to travel and buy (try on clothes).
goods can be delivered directly to your home. • Delays in delivery.
• People can spend more time doing other leisure activities.

Effect on the company


• Less retail outlets required which means no rent or utility costs.
• Less staff required in retail outlets however specialist staff would have to be
employed to maintain the website and run the dispatch department.
• Online presence would attract more customers (Global).
• Lack of customer interaction.

153
ICT IGCSE Theory – Revision Presentation

6.14 Recognition Systems

Recognition Systems are used to directly enter data into a computer system. Recognition
systems tend to be more accurate and quicker method of entering data into a computer system
compared to manual methods.

MICR Magnetic ink which are found at the bottom of the checks
are scanned in to MICR (Magnetic Ink Character Reader).

Pencil or pen marks are scanned in by the OMR (Optical


OMR Mark Reader).

Scanned text is converted into a format which can be


OCR
edited.

Uses radio waves to capture and store information on a


RFID tag.

Sensors are used to detect a car (if its gone over the line)
Number Plates and a signal will be send to the microprocessor to take
the image of the number plate.

154
ICT IGCSE Theory – Revision Presentation

6.15 Monitoring and Tracking Systems

Reasons for Monitoring and Tracking Systems:


• Surveillance (Potential Criminals/Terrorists)
• Tracking released prisoners to ensure they stay within an agreed location(Ankle monitors)
• Monitoring customers buying patterns.

Key Logging Call Monitoring


Key logging software monitors which keys Calls can be monitored by police as part of
have been pressed. Passwords and personal surveillance operations.
details can be obtained for malicious Calls may also be monitored as training tool
purposes by hackers. in call centres to improve employees
performance the quality of the customer
service.

Cookies Number Plate Recognition


When a user visits a website a cookie is Number plates can be tracked by cameras
created which could store the user browsing situated in specific locations to keep track
preferences: of whereabouts of a specific individuals to
• Language settings whom the car is licenced too.
• Items in the shopping cart
• Links which have been click on
Cookies essentially leave an electronic
footprint on user browsing habits.

155
ICT IGCSE Theory – Revision Presentation

6.16 Satellite Systems

GPS (Global Positioning Systems)


GPS can determine a specific locations using satellite navigation systems.
• Cars, Ships, Planes can use GPS when navigating to specific locations.
• Walkers to locate position on hills/mountains.
• Used by runners to calculate distance.
Advantages: Disadvantages
• Drivers do not have to use maps • Loss of signal
• GPS can re-route and find quickest • Maps have to be updated (New roads
routes. may not be shown)
• Can provide useful locations of
amenities (e.g Petrol stations)

• Typically four satellites must be visible to the receiver.


• Calculates the distance from a receiver to the satellite.
• Calculates the position of the receiver.
156
ICT IGCSE Theory – Revision Presentation

6.16 Satellite Systems

GIS (Geographic Information System)


GIS allows for potential locations to be analysed based on specific queries.
GIS will allow users to see specific details on a location:
• Road Networks GIS will then combine these
• Community Services (e.g. Schools) specific details and allow the
• Environmental Features (e.g. Rivers) user to specify certain criteria
• Properties Details (e.g. rental about a particular location.
properties)

Business can use GIS to identify a suitable location for their


business taking into consideration:
• Road links which could be easily accessible for customers and
suppliers.
• Proximity of Customers to potential retail outlets.
• Availability of potential retail outlets mapped by the GIS to give
options to the business.
• Environmental features to avoid being close to flood risk zones.

157
ICT IGCSE Theory – Revision Presentation
The effects of using IT
• 7.1 Analysis
• 7.2 Design
• 7.3 Development
• 7.4Testing
• 7.5 Implementation
• 7.6 Documentation
• 7.7 Evaluation

158
ICT IGCSE Theory – Revision Presentation

Systems Analysts will review an existing system which is currently not meeting
expectations. The steps shown below will be followed to develop a new system
which is fit for purpose.

Analysis: Collecting information about the present system and identifying problems.

Design: Designing a new system to correct the problems identified in the analysis.

Development & Testing: Developing and testing new system.

Implementation: Replacing the old system with the new system.

Documentation: Creating technical and user documentation for new system.

Evaluation: Evaluating whether the new system meets the requirements of the
design requirements.

159
ICT IGCSE Theory – Revision Presentation

7.1 Analysis
Analysis techniques Advantages Disadvantages
Observation The use of the current system is • The analyst can obtain • Some employees may feel
observed to find out how it reliable information about uncomfortable being
works. the current system. observed
• Information will not be • Employees may perform
biased as it’s the analyst’s differently if they know
point of view. they being observed.
Interview People who use the system are • Can ask open ended • It can be a time
interviewed to get their questions to gauge to consuming process.
feedback. more feedback. • The interviewee cant
• Questions can be modified remain anonymous with
during interview. this method.

Questionnaire Questionnaires are distributed • Questionnaires can reach • Questionnaires may not
to employees/ customers to a larger audience. be completed accurately.
s • Questions can be • May not be all returned.
find out a range of opinions answered quickly using Can not expand or clarify

about the current system. tick boxes – cheaper answers to questions.
method of analysing.

Collecting Existing documentation for the • Analyst's can see how • It can be a time consuming
current system is analysed to current the paper system process.
Documents operates. • Due to the amount of time
identify what data is inputted Can obtain information required this is a costly

and outputted. critical to the system. method.

160
ICT IGCSE Theory – Revision Presentation

7.1 Analysis

Data which is inputted, Problems with the The requirements of the user
processed and outputted into current system are and the potential new system
the system are identified. identified. are identified.

Data may be paper based. What could be What is the new system meant
improved? to do?

New System Requirements Specification


• Once the systems analysts have completed the analysis stage of the systems life cycle they
should be fully aware of the limitations of the current system.

• The next step will be to design a new system (normally computer based) to resolve the
problems identified by the users and the systems analyst.

• The Requirements Specification will be created which will outline the required
improvements and expectations for the new system.

161
ICT IGCSE Theory – Revision Presentation

7.2 Design

Based on the information from the analysis stage a new system will be designed. The new
system will hope to resolve the issues identified in the current system.
Users should be able to interact with a system via a data capture form so is it easier and quicker
to input data.

On-screen forms should:


• Appropriate spacing for each field.
• Screen filled/not too much white space.
• Clearly defined input area for each field.
• An easy to read font/font size.
• A sensible font colour/background colour.
• Drop down lists and tick boxes.
• No overlapping of items.
• Navigation aids

Tick boxes/radio buttons Drop down lists to Buttons:


to enter choices choose an option • Go forward or
backwards
• Add, Save and
delete records

162
ICT IGCSE Theory – Revision Presentation

7.2 Design

Before a data input form can be created the database has to


be created. The following need to be considered:
• Type of data which will captured and inputted.
• Different tables which may be required and relationships
which could be established.
• Different fields (including Key) which would be required.
• Data types that would be required for each field
• Text
• Integer (numeric)
• Double
• Boolean (Yes/No)
• OLE Object (Image)

Paper Based Forms Must Include:


• Clear heading and instructions.
• Use of text boxes to collect information such as name,
DOB etc.
• Use of tick boxes to make choices easier (Gender).
• Clear fonts and text styles.

163
ICT IGCSE Theory – Revision Presentation
7.2 Design

• Data Validation checks whether the data entered data fulfils


specific criteria to ensure the data is valid.
• Different validation techniques can be used on different
fields depending on the type of data required for each field.

Presence Check To check if the data has been entered (is it present).
Range Check To check the data entered is in the correct range (Year 7 -12).

Length Check To check if item of text is too short or too long (check if full number has been entered).

Type Check To check if the type of data entered is correct (no letters in a numeric field).

Format Check To check if the data has been entered in the correct format (Date – DD/MM/YYYY)

Check digit The last one or two digits in a code are used to check the other digits are correct

Data Verification: Is a Proof Reading: Once data has Double Entry: The same data
method of double checking been entered it will be checked to is required to be entered
the data to see if it is see if it is correct (e.g. check is twice (e.g. type new
correct. name is spelt correctly). password twice).

164
ICT IGCSE Theory – Revision Presentation

7.3 Development and Testing

Development

Create the file structure: Validation Techniques: User Interface:

• Field Names • Validation rules will ensure • The user interface will allow
• (To store specific data) the correct data in entered the user to interact with the
• Set Specific Data Types into the fields. system and input data.

Each step in the development stage will be checked to ensure there


are no errors in the system.

• Validation rules will be checked to see if only the correct values


can be entered into the relevant fields.
• User Interface: Check to see if they are user friendly and to see if
the different components work (navigation buttons).
165
ICT IGCSE Theory – Revision Presentation

7.3 Development and Testing

Testing Testing take place to ensure all


components of the system are
Module 1 Module 2 Module 3 working correctly before the system
is implemented.
Modify if any Modify if any Modify if any
errors found errors found errors found
• Software systems are developed
Testing Testing Testing in Modular form which means
each part of the system is
developed separately by the
programmer.
Modules combined to make Full Program
• This allows each module of the
Modify if any errors found
system to be tested separately
Testing
once it has been developed.

• If errors are found in the


Modifications which could be made:

modules or full program then
Data/file structures
• Validation Rules then modifications will be made
• Input methods & output formats to the system.

166
ICT IGCSE Theory – Revision Presentation

7.3 Development and Testing

A typical test plan would include: Example: Test


• What is being tested
Scores
• The test data that will be used
• The expected outcome of the Test. 0 – 100% (Range)
Below are examples of three different types of test data that could be entered -10% Boundary
into the system. Once the system has been fully tested then live data (actual
0%
data that would be entered) will be entered into the system. Results are
compared to those produced from the current system. 5%

Normal
10% R
20%
Normal data – data within a (given) range
30% A
Example – 10% - 90%
40% N
Abnormal 50%
Abnormal data – data outside the range (limits) 60% G
Example – Less than 0% or more than 100% 70%
80%
E
Extreme
Extreme data – data on the boundaries of the range or at the limits of 90%
acceptability. 95%
Example – 0%-5% or 95-100% 100% Boundary
110%
167
ICT IGCSE Theory – Revision Presentation
7.4 Implementation

Advantages Disadvantages

Direct Changeover The existing system is • The whole system • If the new system fails
stopped and replaced by would have been then old system is not
the new system fully tested before it available to fall back
immediately. is implemented so to.
less chance of errors.
The data that was inputted • There may not be
into existing system is now • Costs are reduced as enough time to
inputted into the new only one system is provide training to
system. being used. Tasks are employees.
not duplicated.

Parallel Running The existing and new • If the new system • Tasks will be
system work together for a does not meet the duplicated as data is
period of time until the new requirements then inputted into both
system fully takes over. old system is still systems.
available.
Data is inputted into both • This will require more
systems whilst they are • Employees can be employees which will
running at the same time. trained gradually result in more costs
how to used the new (paying salaries) for
system. the employers.

168
ICT IGCSE Theory – Revision Presentation
7.4 Implementation
Advantages Disadvantages
Phased The new system is gradually • You only introduce a • Time consuming as
Implementation introduced. When parts of the new part of system if every part of the system
new system are working at a the current phase is which is implemented
satisfactory level then more working correctly. needs to be evaluated.
elements of the system are • If a part of the new
phased in. system does not meet • A number of training
the requirements then sessions would be
Eventually the old system will you can always go back required for employees
be phased out over a period to point of system when each step of the
of time. which was working. new system is
introduced.

Pilot Running The new system is • If the new system does • It could take a while for
piloted (trialled) in one part not meet the the whole system to be
(department) of an requirements then implemented across all
organisation. If the pilot is only one department departments.
successful then it will be is affected.
implemented across all • If the system fails in one
departments. • Training can take place department then
in one department at a modifications and
time. Then employees further training would
could be used in other be required resulting in
departments to help delays.
with training.

169
ICT IGCSE Theory – Revision Presentation

7.5 Documentation

There are two types of documentation that should be produced when creating a new system:
• User Documentation
• Technical Documentation

User Documentation Technical Documentation


The user documentation is intended to The maintainers are usually technical people,
help the users of the system. who need to know exactly how the system
works.
User documentation usually includes:
• List of minimum hardware and Technical documentation usually includes:
software required to use the system • Details of the hardware and software required
• How to install the system for the system
• How to start / stop the system • Details of data structures (data types, field
• How to use the features of the system names, etc.)
• Screenshots showing the system in • Details of expected inputs
typical use • Details of validation checks
• Example inputs and outputs • Details of how data is processed
• Explanations of any error • Diagrams showing how data moves through
messages that might be shown the system
• A troubleshooting guide • Flowcharts describing how the system works

170
ICT IGCSE Theory – Revision Presentation

7.6 Evaluation

The final stage of the system life cycle is to evaluate the new system which has been
implemented in full. The purpose of the evaluation is refer back to the requirements
specification to see whether the new system has resolved the issues of the previous
system and met the requirements stated in the design.

1 2 3
Identify any limitations
Compare the solution Evaluate the users’
and necessary
with the original task responses to the results
improvements to the
requirements. of testing the system.
system.

• After the evaluation is complete if there are any problems or


limitations with the system from a technical or user point of view then
the system analyst will refer back to the design stage of the systems
life cycle.
• Based on the feedback necessary adjustments could be made to
improve the overall efficiency and usability of the new system

171
ICT IGCSE Theory – Revision Presentation

What Does an Evaluation Look For?


• Efficient :
– Does it operate quickly, smoothly and with minimal waste?
– Is the system saving time, and resources?
• Easy to use:
– Are all of the system's users able to use the system easily and
effectively?
– b. Can new staff understand and use the system with minimal training?
• Appropriate :
– Is the system suitable for the particular business / organization?
– b. Does the system actually meet the needs of the business /
organization?

172 Back
ICT IGCSE Theory – Revision Presentation

How is a System Evaluated?


• Check against the Requirements Specification
• Check the Users' Responses

173
ICT IGCSE Theory – Revision Presentation

• 8.1 Physical Safety


• 8.2 e-Safety
• 8.3 Security of Data

174
ICT IGCSE Theory – Revision Presentation

8.1 Physical Safety

Electrocution from spilling drinks Fire from sockets being overloaded


• Ensure all drinks are kept away • Ensure plug sockets or extension
from the computers, ICT labs or cables are not overloaded.
office desks.

Physical Safety Risks

Equipment overheating Tripping over trailing cables


• Ensure ventilation in the room is • Ensure cable ducts are used to
good and equipment is not cover wires.
covered whilst in use. • Ensure cables are tucked away.

Strategies to minimise potential safety risks:


• Regular maintenance of equipment to check if it is passing safety standards.
• Regular check of the state of cables/plugs to ensure there is nothing exposed.
• Use of wireless connections to eliminate the use of cables.
• Ensure potential trip hazards are under desks (bags, plug sockets).

175
ICT IGCSE Theory – Revision Presentation

8.2 e-Safety

Why personal data should be


confidential and protected:

• Users can be stalked or even kidnapped –


Personal Data: How to avoid
status updates can alert people of your
location at a particular time. inappropriate disclosure
• Contact details (Phone • Details can be stolen, copied or pass on. of personal data:
number/email address) • Users could be blackmailed/ threatened
• Address Details into doing inappropriate things. • Ensure privacy setting in
• Personal Images • Customer details could be sold onto a third social media sites have
• Payment details including party. been activated.
card and bank details • Do not share data via
• Medical history social media or emails
• Political views with strangers.
• Family details • Do not post inappropriate
• Passwords images or content.

Discuss why e-safety is needed:


These days youngsters are not fully aware of the dangers the internet poses and
the potential risks they may put themselves under. For that reason eSafety
lessons are taking place in schools to educate young people about the potential
risks of using the internet appropriately so that they know how to stay safe
whilst being online.

176
ICT IGCSE Theory – Revision Presentation

8.2 e-Safety

Minimise the Potential Dangers

Personal Use of Internet • Only use trusted websites or those


recommended by teachers.
• General browsing – keeping up to date • Only use a student friendly search
with current affairs. engine with safety filters.
• Researching for school projects. • Restrict access to certain content via
• Online shopping/banking ISP or filtering software.

Use of Email • Only email people already known to


you or from your contacts list.
• To keep in touch with friends, family • Think before opening an email from
and co workers. an unknown person.
• To share information including • Be careful about emailing your
attachments - Images, Presentations etc. school’s name or a picture of
• To get in touch with organisations. yourself in school uniform.

177
ICT IGCSE Theory – Revision Presentation

8.2 e-Safety

Minimise the Potential Dangers

Use of Social Media • Know how to block and report


unwanted users in chat rooms.
• Personal Use: • Never give out any personal
• Share information about information online.
yourself to your friends and • Never arrange to meet strangers
followers. especially in a secluded place.
• Business Use: • Keep adults informed about your use
• Promotion/Awareness of social media.

Online Gaming • Never use real name when playing


games online.
• Online gaming is now very popular • Use appropriate language when
over many platforms. More games are using headsets and communicating
now providing multiplayer options with other gamers.
with some games. • Only play online with trusted
• Maps especially created for online friends.
gamers.

178
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Hacking?
Hacking
• To gain unauthorised access to a computer system
without the user knowledge or permission.

Effects of Hacking?
• To delete, corrupt, copy and edit files. Sensitive Data could be
sold to competitors.
• Identity theft – to steal users identity.
• To expose a company (for example wiki leaks).
• To cause disruption and stop production.

Strategies to prevent hacking to protect data


• Use of firewalls – sometimes part of the operating system.
• Use of strong passwords which are frequently changed.
• Use of protection software to detect and block possible
hacking attempts.
• Hire a professional hacker to test the weaknesses of your
system.

179
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is a computer virus ?


Computer Virus
A computer virus is a piece of programming code/software which
can install and replicate it self on to a computer system without
the user’s permission.

Effects of a computer virus ?


• Causes the computer to crash – become slower
• Sometimes files can be deleted – leads to computer malfunction.
• Data files can be copied by the hacker or the files could be
corrupted.
• Could stop production until the virus has been quarantined.

Strategies to prevent computer virus


• Install antivirus software and regularly update it.
Downloaded exe (executable)
• Do not use software or USB from unknown sources.
files could also be a virus when
• Be careful about clicking on links from untrusted
they are installed by double
websites.
clicking on them.
• Be careful about downloading attachments from
unknown email addresses.

180
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Spyware?
Spyware
Is a software which can monitor your use of the computer
(internet browsing) and monitor and log key pressed.

Effects of Spyware?
Spyware software will send the data back to person who planted
the spyware software on your computer. This could include
personal details like passwords and banking account information.

Spyware software could also install additional software to read


cookie data and change web browsing preferences.

Strategies to prevent Spyware


• The use of anti spyware software which is regularly
updated.
• The use of a pointing device to select characters when
entering sensitive data.

181
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Phishing?
Phishing
The recipient will receive an email which looks legitimate. The
email will normally request the user to update their details which
could be their password or payment details. To update the users
details they will have to click on a link which will take them to a
fake website.

Effects of Phishing?
The user will be tricked into entering their details into a fake
website. The sender of the initial email will have gained personal
details from the user. These details can be used fraudulently or
for identity theft.

Strategies to prevent Phishing


• Use a filter on your email account so that only emails
from an allowed users appear in your inbox.
• Always double check the URL and email address.

182
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Pharming?
Pharming
A malicious code installed onto a web server or computer will
redirect users to a fake website even though they have typed in a
legitimate URL address.

Effects of Pharming?
The fake website will look like the real website (websites tend to
look like a trusted websites to deceive the user). Users will be
tricked into entering their personal details. Like Phishing this can
lead to fraud or identity theft.

Strategies to prevent Pharming


• Anti spyware software could eliminate pharming code
from a computer.
• Always double check the URL to see if is the same one
you typed in.

183
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Smishing (SMS Phishing)?


Smishing
Users will receive fake SMS (text) messages claiming they have
won some sort of prize. Text message will appear to come from a
legitimate company. To claim the price users will have to call a
premium phone number or go to a website and give personal
details.

Effects of Smishing?
The effects are very similar to Phishing and Pharming where
personal details will be obtained from users. However users could
incur additional costs when they ring the premium number to
claim a prize.

Vishing: Uses a voice messages


Strategies to prevent Smishing which tricks users into calling a
• Double check the SMS message – check for spelling premium rate telephone. Voice
mistakes. mail may sound legitimate and
• Check the link of the website to see if it is legitimate? may request for user to update
• Contact your bank directly If you are requested to their details.
change some details.

184
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is Spam Email?


Spam Email
Spam (junk) email is sent out to recipients from a mailing list. The
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails.

Effects of Spam Email?


If a spam email is part of a phishing scam then there is a chance
your details could be obtained. The network could also become
slower or unresponsive if there is a lot of unnecessary traffic
flooding the network.

Strategies to prevent Spam Email


• Use a junk email filter to stop spam email coming into
the inbox.
• Do not sign up for any commercial mailing lists.
• Do not reply to spam email.
• Untick the check box if you are asked to give your
email to a third party.

185
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

What is credit card fraud? Credit Card Fraud


Online credit card fraud is when a user is tricked into giving their
personal and financial information. This could be via phishing,
pharming or the use of spyware software.

Effects of credit card fraud?


When a users account has been breached (credit/debit card
details have been obtained)then unauthorised purchases can be
made. Also money can be transferred out of the account.

Strategies to prevent credit card fraud.


• Have a strong password on your account.
• Ensure website has a secure connection.
• Install and update spyware software.
• Regularly check bank statement for any suspicious
activity.

186
ICT IGCSE Theory – Revision Presentation

Biometrics is aof
8.3 Security method
Data of authentication. It relies on unique characteristics of human beings.
Biometrics data is difficult to copy and requires the user to be present so that this method of
authentication can be used.

Advantage Disadvantage
Fingerprint Scans: • Very easy to use. • If the skin is damaged
Users will have press their finger • Very high accuracy. then it may be difficult
against the scanner. Finger prints • Small storage for the reader to read
are compared against those stored requirements for and recognise the
in the database. biometric data. fingerprint.
Retina/Iris Recognition: • Very high accuracy. • Very intrusive
Scans use infrared light to scan • No way to replicate a • Expensive to setup
unique patterns of blood vessels users retina. • Takes a while to scan.
in the retina.
Face Recognition: • Non-intrusive method • Physical features can
Physical facial features are • Cheap technology change over time with
scanned and compared to the age.
information held in the database.
Voice Recognition: • Non-intrusive method • Very low accuracy.
User will use speak which will • Cheap technology • Users voice could be
compare the voice to one held on • Verification is very affected by an illness.
the database. quick.

187
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

To protect your personal data from being obtained you need to be fully
aware of phishing, pharming and vishing scams. There are always signs
which should cast doubt to whether you should disclose your personal
information. Also the use of an updated spyware software would help
improve security on your computer.

Any attempt to obtain illegal information should be reported to the


authorities.

Why is it Used
Firewall • Firewall provides security to a computer or
network.
• Is located between the computer and internet
Users Firewall connection.
Computer (Hardware Internet • Firewalls will examine network traffic and block
or software) and alert users to potential risks.
Passwords and User Name
Passwords are a method of authentication. They are used frequently online when logging
onto user accounts. If passwords are breached then your account may be hacked. Details
could be shared with other users of the internet.

188
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

Encryption is the process of converting information into a form that is meaningless


to anyone except holders of a ‘key’.

Encryption Key 1 2 3 4 5 6 7 8 9 10 11 12 13
A B C D E F G H I J K L M
14 15 16 17 18 19 20 21 22 23 24 25 26
N O P Q R S T U V W X Y Z

Hello Data is Data is Hello


Encrypted 85121215 Decrypted

Data in scrambled into a meaningless Data is now in a


format. Even if it is intercepted it would format which can be
mean nothing to hackers. understood.

189
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

Issues Related to Security of Data


Cloud: Online storage medium used • Data has been lost in the past during a
to backup files. Files can be accessed routine backup.
from any device with an internet • Celebrity data has been hacked and shared
connection. including images.
• The security of the building where the
servers are held and access rights to
employees could effect the security of the
data.
Moderated Forums: Online Security of Forums:
discussion forum where all posts are
moderated by an administrator. Moderated forums are more secure than un-
moderated forums as posts are regularly
Un-Moderated Forums: No checked by the admin. Inappropriate posts
measures are place to moderate which could be offensive can be deleted.
posts by users.

Digital Certificates
They are used to verify the identity of the sender in an online business transaction. It
also provides the opportunity for the receiver to give an encrypted response.

190
ICT IGCSE Theory – Revision Presentation

8.3 Security of Data

Secure Socket Layer (SSL)


• Using a secure connection ensures data is kept safe when sending sensitive information.
• Secure websites encrypt information before sending it to others.
• Only the computer on the other end can read and understand the data.
• Websites which depend on security can have their websites reviewed and validated by
companies called certificate authorities. These reviews will ensure the website is secure.
Features of a web page that identify it as using a secure server
S will show after http in the URL address – for
example https://www.ebay.co.uk
Padlock will be shown on browser to show
users the webpage is secure.
Colour and company name will be shown in the
address bar in the colour green once it has
been validated by the certificate authorities as
being secure.

191
ICT IGCSE Theory – Revision Presentation

• 9.1 Audience Appreciation


• 9.2 Legal, Moral, Ethical and Cultural Appreciation

192
ICT IGCSE Theory – Revision Presentation

Audience Appreciation

It is very important to tailor an ICT solution to the proposed audience. A number of factors
need to be taken into consideration to ensure the ICT solution is suitable for its target audience.

The following methods can be used to find out more Once the ICT team are aware of
about the potential target audience. the customer needs then they
can take the following into
• Interviews
consideration:
• Questionnaires
• Market Research
Use of Language
Based on the research the ICT team will have a
clearer idea about the following factors: Use of colours

Usability

Target Audience Age Audience Experience Level of complexity


Audience
AudienceExpectations
Expectation Audience Knowledge Use of multimedia and
interactive content
193
ICT IGCSE Theory – Revision Presentation

Legal, Moral, Ethical and Cultural Appreciation

Copyright laws protect software in very much the same way as music CDs, Video etc. Software
Piracy is a continuous issue for software developers and measures have been put in place to
make it more difficult to use illegal copies of software.

It is illegal to: Measures from software developers to


prevent the use of illegal software:
• Make a software copy to sell or give away.
• Rent out software. Use of a Product Key when installing
• Use a software on a network on multiple software.
computers.
• Use name or branding of copyrighted
software on another software without
permission. Online Activation to ensure legitimate
• Using code from copyright software product key has been used.
without permission and then passing the
software on as your own to sell. Software CD/DVD must be in the drive
whilst software is being used.

Making users agree to terms of conditions


before installation of software.

194
ICT IGCSE Theory – Revision Presentation

Legal, Moral, Ethical and Cultural Appreciation

When creating an ICT solution consideration also has to be taken regarding legal, morality,
ethics and cultural issues.

Legal: Ensure copyright laws are abided by including not using any coding or branding from
existing copyrighted software.

Morality: To distinguish from right or wrong. Sometimes it may not be illegal to carry out an act
however it could be against your morals. For example setting up a fake website to deceive is
not illegal but questions your level of morality.

Ethics: Is to break a code of conduct. One example could be to leak information to a rival
software publisher or to the press about new software ideas.

Culture: When software is released in different cultures then care must be taken so that people
are not offended. For example certain use of words could be offence to one culture and not to
another. If certain computer games mock religion or cultural beliefs then again this could cause
offence.

195
ICT IGCSE Theory – Revision Presentation

Should the internet be policed?

The debate continues on to whether the internet should be policed. The following are some
reasons why some users of the internet believes the internet needs policing:

• Recent hacks on major co-operations (Sony/QNB)


• Sharing of terrorist material.
• Abuse in chat rooms, social media including Twitter.
• Grooming social media platforms.

Should the Advantages Disadvantages


internet be • To protect vulnerable users • It would be extremely difficult and
policed? gaining access to undesirable expensive to police the internet.
websites. • Infrastructure including staff and
• To prevent illegal material offices would have to be required.
(software, videos) be openly • Would be difficult to enforce different
posted and shared by web users. rules in different countries.
• To bring to justice those users • Could go against freedom of speech.
who continually misuse the
internet for their personal gain.

196
ICT IGCSE Theory – Revision Presentation

• 10.1 Communicate with other ICT users using email


• 10.2 Effective use of the internet

197
ICT IGCSE Theory – Revision Presentation

Communicate with other ICT users using email

Email is very popular form of communication between people. However many countries have
laws to protect people from the misuse of emails.

Below are some laws which companies and individuals have to follow when using email:

Ensuring emails do not have Organisations are required to


false or misleading subject ask for permission (opt in)
lines. before they can send emails to
individuals.
Organisations must include
valid postal address. There should be a clear way for
recipients to “opt out”
Organisations are not allowed
(unsubscribe) from receiving
capture and store lists of email
email.
addresses.

Organisations must ensure privacy policy are


clear and that subscribers are made aware of
such policies.

198
ICT IGCSE Theory – Revision Presentation

Communicate with other ICT users using email

Acceptable Language: Examples of using


• When sending an email the language and content inappropriate language:
within the email needs to be appropriate. • Abusive, racist,
• If the emails is being sent to an employee within threatening language.
a business then the language should be formal. • Obscene Images /
illegal content

Senders should consider what they write


as content in an email could be
misunderstood or taken out of context.

Senders should check for Netiquette: The rules of Avoid humor as some people
spelling and grammatical errors. may not understand the joke.
etiquette that apply when
communicating over
Respond quickly to an email Do not plagiarize and obey the
computer networks,
message. copyright law.
especially the Internet

Do not capitalize every thing.

199
ICT IGCSE Theory – Revision Presentation

Communicate with other ICT users using email

The content of an email can be protected by the copyright law. If the


sender of an email states the message is confidential then it is important
the email is not forwarded onto a third party. It could also be a case of
attachments being downloaded and also passed on.

Sometimes organisations will send an email with a copyright statement at


the bottom of the email.

If your email account is not secure then emails could be sent from You could also be at
your account without your permission or knowledge. risk due to email
scams
Your email account could be hacked due to the following reasons: (phishing/pharming).

Having a weak password Your email inbox could


also be jammed up by
Leaving your computer on and walking out of the
spam email.
room whilst being logged into your email.

Using your email on a shared computer with


multiple users.

200
ICT IGCSE Theory – Revision Presentation

Communicate with other ICT users using email

What is Spam Email? Strategies to prevent Spam


Email
Spam (junk) email is sent out to recipients from a mailing list. The
• Use a junk email filter to stop
email could be part of a phishing scam or could be to promote
certain products. They are basically unwanted emails. spam email coming into the
inbox.
• Do not sign up for any
Effects of Spam Email? commercial mailing lists.
If a spam email is part of a phishing scam then there is a chance • Do not reply to spam email.
your details could be obtained. The network could also become • Untick the check box if you are
slower or unresponsive if there is a lot of unnecessary traffic asked to give your email to a
flooding the network. third party.

Email Groups are contacts which are grouped together


So that emails can be sent to multiple recipients.

When sending an email to a group you would just have to


write the name of the group rather than writing
everyone's email address.

201
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Internet – Worldwide Collection of Networks:


• Browse the internet
• Social Networking & Communication
• Online shopping & banking
• Transfer files from computer to computer

World Wide Web (WWW):


• World Wide Web is part of the internet.
• Can be accessed using a web browser.
• Consists of a massive collection of webpages.

Intranet – Defined as a computer network based on


internet technology:
• Normally accessible by internal members of the company via a
username and password.
• Information is specific to the needs of the company.
• Less chance of external threats such hacking and viruses.

202
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

HyperText Transfer Is the rules which are followed when transferring information across
Protocol (HTTP) & the internet. Rules are agreed between the sender and recipient
(HTTPS) when data is being transferred.

Uniform Resource • A web browser allows the user to display a webpage. A web
Locator (URL) & Web browser will use URLs to access specified websites.
Browser • URLs are represented by numbers (http://100.100.100.1) however
it is not very user friendly.
• So therefore an alphanumeric format (http://www.yahmad.o.uk)
HTTP or HTTPS

Protocol:// Website Address /Path/Filename

http://www.yahmad.co.uk/Pages/Chapter18.html

203
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

File transfer Protocol


(FTP) FTP is a network protocol when
transferring files from one computer to
another over the internet. FileZilla is
popular FTP application which is used to
upload web pages so that they can be
hosted and viewed on the internet.

Internet Service
Provider (ISP) ISP is a company which provides internet
access to users. Normally the users would
have to pay a monthly fee. Broadband
connections tend to use fire-optic cables
for increased bandwidth.

204
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Cloud: Online storage medium used to backup files. Files can


be accessed from any device with an internet connection.
Data is saved on more than one server so in case of
maintenance or repair data is always accessible.

Advantages Disadvantages

• Files can be accessed from • Files could be hacked.


any location using an • Dependant on a good
internet connection. quality internet
• Users don’t have to carry connection to download
storage devices around and upload files.
with them. • Potential costs of using
• Offer backup solutions. cloud storage.
• Unlimited storage capacity.

205
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Search Engines

When using the internet you can either


type in a URL address or use a search
engine to find specific data. Normally key
words would be typed into a search engine
to find particular information.

The more detailed the search will result is


then the matches are likely to be more
accurate.

Advanced Search Criteria:


In many search engines you have the
option to have an advanced search.

206
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Blogs and Blogging • A blog is based on personal experiences and usually updated by
one author.
• Blog entries are in order (most recent entries are shown first).
• Blogs can not be changed by other users of the internet.
• Bloggers can be prosecuted for posting offensive material.

Wikis • A wiki is a collaboration from users (many authors) to create


content.
• Wikis can be edited by anyone (content can be edited or
deleted).
• Wikipedia is an example use of Wikis.

Social Networks • Social Networking sites allow users to interact and


communicate with each other.
• You can connect with people with similar interests.
• Users are able to share content such as photos, video and
status updates.

207
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Using the Internet


Advantages Disadvantages
• Regularly updated in real time. • Not regulated
• Vast amount of information. • Online threats (hacking/viruses/scams/
• Can find information using search engines. cyber bullying)
• Is available on many platforms. • Easily become distracted
• Web content can include text, images, video, • Sharing of illegal content
sounds, animations etc. • Exposure to inappropriate material
• Information may not be reliable

Why the internet is so popular? The internet has also evolved over the years with the
introduction of social networks, media streaming sites,
online shopping/banking.

• The internet is very accessible over various


platforms.
• Relatively cheap to use and sometimes free.
• Increase in bandwidth allows faster browsing and
download speeds.

208
ICT IGCSE Theory – Revision Presentation

Effective use of the internet

Why an internet search to • Due to amount of information available on the internet


find relevant information is it is difficult to find specific information quickly.
• Search engines will not necessarily post the website in
not always fast.
order of usefulness so you may have to look through
different websites to find your information.

• Content on the internet is not regulated. Any body can


make a website and post any content which is not
Why it is not always easy to factually correct.
find reliable information on • Wikis can be edited to contain false information.
the internet • Information may be biased depending on who was the
author.

How to evaluate the • Checking the websites URL address (ending in .gov or
reliability of information .ac more likely to be reliable)
found on the internet • Check links or endorsements from other websites.
• Check the last time the website was updated.

209
210
ICT IGCSE Theory – Revision Presentation

Web Development Layers

210
ICT IGCSE Theory – Revision Presentation

The Three Layers of Web Design


• Structure
• Style or Presentation
• Behaviors

211
ICT IGCSE Theory – Revision Presentation

The Three Layers of Web Design


• Content: Content and structure of webpage
• Presentation: Used for formatting & styles
• Behavior layer :For scripting/action/doing
something within the page

212
ICT IGCSE Theory – Revision Presentation

Structure or Content
• The structure or content layer of a web
page is the underlying HTML code of that
page. Like a house's frame creates a
strong foundation upon which the rest of
the house is built, so does a solid
foundation of HTML create a platform
upon which a website can be created.
HTML structure can consist of text or
images and it includes the hyperlinks that
visitors will use to navigate around that
web site.
213
ICT IGCSE Theory – Revision Presentation

Style or presentation layer


• The style or presentation layer dictates how a
structured HTML document will look to a site's
visitors. This layer is defined by CSS (Cascading Style
Sheets). These files contain styles that indicate how
the document should be displayed in a web browser.
On today's Web, the style layer can also include
Media Queries that can change a site's display based
on different screen sizes and devices.

214
ICT IGCSE Theory – Revision Presentation

Behavior
• The behavior layer is the layer of a Web page
that can respond to different user actions or
make changes to a page based on a set of
conditions. For most Web pages, the behavior
level would be the JavaScript interactions on
the page.

215
ICT IGCSE Theory – Revision Presentation

Why Should You Separate the Layers?


• When you're creating a web page, it is
desirable to keep the layers as separated as
possible. Structure should be confided to your
HTML, visual styles to the CSS, and behaviors to
any scripts that the site uses.

216
ICT IGCSE Theory – Revision Presentation

Some of the benefits of separating the layers


are:
• Shared resources: When you write an external CSS file or
JavaScript file, you can use that file by any page on your
web site
• Faster downloads: Once the script or stylesheet has
been downloaded by your customer the first time, it is
cached by their web browser. Because these shared
resources are now contained in cache, other pages that
are requested in the browser load more quickly,which
217
improves overall page speed and performance

217
ICT IGCSE Theory – Revision Presentation

• Accessibility : External style sheets and script files are


more accessible to people and to browsers.
• Backwards compatibility: When you have a site that is
designed with the development layers, it will be more
backwards compatible because browsers or device that
can't use certain CSS styles or which may have JavaScript
disabled can still view the HTML. Your web site can then
be progressively enhanced with features for the browsers
that support them.

218

Potrebbero piacerti anche