IT CourseBook Complete
IT CourseBook Complete
i
Paul Long, Sarah Lawrey and Victoria Elis
r
;ÿ
Cambridge International
Vi
i:;i AS and A Leve!
IT
Coursebook ,
i-
V
•V
;ÿ}
v:V
: |
|v
CAMBRIDGE
IA W UNIVERSITY PRESS
f
CAMBRIDGE
UNIVERSITY PRESS
20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1
Printed in Spain by GraphyCems
A catalogue record for this publication is available from the British Library
Ali questions and answers provided have been written by the authors. In examinations, the way
marks are awarded may be different.
Throughout this book we have used specific brand names to illustrate points in examples. Please note
that the examples used do not constitute an exhaustive list, and other brand names are available and
should be considered.
Contents
Content
How to use this book: a guided tour iv
Introduction vi
1 Data, information, knowledge and processing 1
2 Hardware and software 23
3 Monitoring and control 54
4 E-safety and health and safety 61
5 The digital divide 71
6 Using networks 78
7 Expert systems 95
8 Spreadsheets 102
9 Database and file concepts 136
10 Sound and video editing 175
11 Emerging technologies 188
12 The role and impact of IT in society 200
13 Networks 210
14 Project management 232
15 System life cycle 249
16 Graphics creation 270
17 Animation 280
18 Mail merge 285
19 Programming for the web 295
Glossary 308
Answers 313
Acknowledgements 333
Index 334
"
Learning objectives
By the end of this chapter, you will be able to:
Learning Objectives
- setthe scene of each chapter; help with navigation
Data: raw numbers, letters, symbols, sounds or images
without meaning through the book and give a reminder of what's
Information: data with context and meaning important about each topic.
Knowledge: information to which human experience has
been applied
\
TASK
Key Terms
Look at the BBC website www.bbc.co.uk - identify
- clear and straightforward explanations are
which data is static and which data is dynamic (updates
provided for the most important words in each automatically).
topic..
Task
o DISCUSSION POINT
Some people get a little confused with dynamic data
- exercises for the student to test their knowledge
and understanding.
because they think it can be any data that changes at any
time. For example, some people think that any website
includes dynamic data. However, if you look at QUESTION
http://www.bbc.co.uk/contact the information on this page
A company creates websites using style sheets.
is mainly static with links to other pages. Although it can be
changed, it can only be done by changing the actual 1 Identify one item of data that will be used by the
data on the page, whereas dynamic data changes company.
because the original source has changed. If you look 2 Describe how this item of data can become
at www.bbc.co.uk/click, you will see that most of the information.
information on this page is sourced from programme
3 Describe the term knowledge.
schedules and programme information which will be stored
in another database - this makes it dynamic data because it
will update when a new programme has been shown.
Questions
- supporting questions that the
student should be
Extension activities and Discussion points able to answer to demonstrate understanding at
- additional lesson activities. this level..
How to use this book: a guided tour
© Remember
JavaScript is a programming language that can
EXAMPLE
be used to add interactivity to web pages. Its The confectionary shop could use various indirect
code can be integrated into a HTML file to: create sources including:
buttons, create text boxes, change content etc.
It can be integrated with a range of other web- • giving out a survey to customers who have
based programming languages such as PHP. purchased sweets from the other shops (the price
JavaScript is often use with HTML forms, where was given to the customer for the purpose of
it can validate data or perform actions such as selling the sweet which may have been a different
when a button is pressed. date or may have been discounted)
• looking at till receipts from the shop (the price
Remember was printed on the till receipt for the purpose of
- these are pieces of vital information to remind providing proof of purchase, not for identifying
you about key facts and highlight important points. prices)
o Tin Examples
Take a blank notepad and draw a shape in the bottom - offer students contextualised explanation
right-hand corner, then draw the same shape but in a
slightly different position on the next page. Repeat this on a of critical points
number of pages. You can then create a basic animation by
flicking through the page of the book.
Tip
- quicksuggestions to help you to understand
important concepts.
Review Questions
1 Give an example of data (1).
2 Describe the term knowledge (1).
A news and sports website includes both static and dynamic data.
3 a Compare static and dynamic data (4).
b Identify and describe two factors that affect the quality of information on the website (4).
c Give an example of coded data related to the news and sports website (1).
Users can pay for premium services on the website using their credit card. Review Questions
4 a Explain why the website uses https at the beginning of the website address instead - final set of questions
of http (4).
to test student
b Describe symmetric encryption (1).
comprehension and to
The journalists working for the website encrypt their emails. give any extension tasks.
c Describe how asymmetric encryption is used with emails (2).
When the users subscribe to premium features, they have to choose a password.
d Describe how verification can be used when entering the password (1).
There is a form on the website that can be used to submit news stories. When data is entered
onto the form, it is validated.
5 a Describe the purpose of validation (1).
b Using an example related to submitting a news story, identify and describe one method
of validation (3).
Introduction
This full-colour, illustrated textbook has been written by experienced authors specifically for the
Cambridge International AS and A Level Information Technology syllabus (9626).
The qualification replaces A-Level Applied ICT. The new syllabus develops a broad range of IT skills.
Throughout the book there are examples of IT in practice, tasks for students to complete, discussion E
points or extension exercises to provoke further thought and discussion and questions that will
test students’ knowledge and understanding. Whenever a task is presented, we would encourage ;
students to carry it out before progressing further.
The syllabus defines three assessment objectives: A01 Recall, select and communicate knowledge
and understanding of IT, A02 Apply knowledge, understanding and skills to produce IT-based
!
solutions and A03 Analyse, evaluate, make reasoned judgements and present conclusions. Each
chapter defines a set of learning objectives which closely match these assessment objectives and
a series of key concepts (hardware and software, network, the internet, system life cycle, new i
technologies) recur throughout the syllabus. This coursebook has been written to reflect these, in
particular in the following chapters: the impact of information technology (Chapter 12); hardware
and software (Chapter 2); network (Chapter 13); the internet (Chapters 4 and 19); system life cycle
(Chapter 15); new technologies (Chapter 11). It is not necessary to work through the book in order
:
from start to finish.
The content of the syllabus is geared towards current practice and practical applications of
computers in everyday life. To reflect this, the practical elements of the book are not concerned
with, for example, providing step-by-step advice on howto use particular software, but rather with
helping students to discover what is available and have the confidence to apply their knowledge to
different types of software. This will help to prepare students for the many different aspects of using
computers that they will encounter in life, and notjustforan exam.
i
!
VJU-
I
TIL I
TIL
I
;IE"
na ii ilin
n
i
I
I
» s
i Li a
i e « lift
5E Ijj I
i
E
A L‘ a
j i il
% I. , /klÿ'l iO
Chapter 1
Data, information, knowledge
and processing
!
By the end of this chapter, you will be able to:
I r
I
*
I
Cambridge International AS and A level IT
*1 359 Price in
also not known whose
address it is.
This is a currency value
Pakistani but it is not known what
Rupees the price is for, so it is
still data.
The data P952BR could have several meanings. It could Data Context Meaning
possibly be: P952BR A product A product code for a can
• a product code code of noodles.
• a postal /ZIP code @bbcclick A Twitter The Twitter address
handle for the BBC’s weekly
• a car registration number.
technology show, Click,
As it is not known what the data means, it is meaningless. which is worth watching
on BBC World News and
BBC2 to keep up to date
DISCUSSION POINT with technology._
When answering a question such as ‘Give one item of data’, 359 Price in The price of a mobile
do not try to explain what the data means because it then
becomes information. Just give the raw numbers, letters,
Pakistani phone cover.
symbols or image. rupees
Chapter 1: Data, information, knowledge and processing
* **
Information Knowledge
lOOkm/h is the speed Travelling at 120km/h on
limit on expressways in expressways in Pakistan
Pakistan. is illegal. _
A red traffic light means
a car should stop.
Figure 1.03 - A good example of static data.
•Weather
• Rainfall
**3
be costly and can also be
slow in remote areas.
It is more likely to be The data may have been
accurate because time will produced very quickly and
have been taken to check so may contain errors.
the information being
published, as it will be
Updated: 0900 on Wed 23 Dec 2015 available for a long period
Get detailed forecast map for City of London of time.
Figure 1.04 - This weather map, from the Met Office Table 1.01 - Static and dynamic information sources.
website, is an example of dynamic data.
DISCUSSION POINT
Some people get a little confused by dynamic data
because they think it can be any data that changes at
• live sports results on a website (when a goal is any time. For example, some people think that any
scored, the scores will update on the website) website includes dynamic data. However, if you look at
www.aljazeera.com/contactus, the information on this
• news feeds on a mobile phone app (when the news page is mainly static, with links to other pages. Although
is changed in the main database, the news feed will it can be changed, it can only be done by changing the
be updated on the phone) actual data on the page, whereas dynamic data changes
because the original source has changed. If you look at
• availability of tickets for a concert (when somebody www.aljazeera.com/programmes, you will see that most of
books a ticket, the ticket is no longer available) the information on this page is sourced from programme
schedules and programme information, which will be stored
• product prices for a till/point of sale (if a price is in another database. This makes it dynamic data because it
reduced or increased in the database, this new will update when a new programme is scheduled.
price will be used the next time the barcode is
scanned)
• train expected arrival times (these will update
automatically based on the train’s position) TASK
• profit for a product in a spreadsheet (profit = price Look at the Ai Jazeera website www.aljazeera.com and
- cost so when either the price or cost changes,
identify which data is static and which data is dynamic
(updates automatically).
then the profit changes too)
Chapter 1: Data, information, knowledge and processing
Direct data source Data collected from an indirect data source (secondary
source) already existed for another purpose. Although it
k
The sports shop could use various indirect sources
to find out what other shops are charging for
• j
?! trainers including:
• carrying out a survey of customers who have
purchased trainers from the other shops (the price
was originally given to the customer for the purpose
Figure 1.05 - Direct data source. of selling the trainers which may have been given
on a different date to when it is now being used or it
Data collected from a direct data source (primary
may have been discounted at the time)
source) must be used for the same purpose for whichI • looking at till receipts from the shop (the price is
was collected. It is often the case that the data will have printed on the till receipt for the purpose of providing
been collected or requested by the person who intends to proof of purchase, not for identifying prices).
use the data. The data must not already exist for another
purpose though. When collecting the data, the person
collecting should know for what purpose they intend to
use the data. TASK
Which of the following are direct data sources and which
are indirect data sources?
Data Reason collected Reason used
A sports shop wants to find out what other shops Names To record their To contact
are charging for trainers. There are various direct and email membership members by email
sources that this data can be collected from. These addresses of and to be able to to see if they will
could include: members of a contact them. donate some
political party money.
• visiting the other shops and noting down the prices Employee To identify when To allow a police
• visiting the other shops’ websites and noting down attendance employees officer to check an
the prices dates and attended work employee’s alibi if
times and to calculate a crime has been
• carrying out a survey of other shop owners to ask their their wages. committed.
prices (although they are unlikely to want to give these). Flight times To compare To decide the best
and prices the prices and flight to use for a
from airline times for a trip to trip to Florida.
Indirect data source websites Florida.
Names, ages Fora national To allow a marketing
and addresses census. company to find out
of people which areas have the
highest population
of children.
4 Weather To record the To showthe current
measurements current weather. temperature and
from a weather rainfall on a website.
station
Figure 1.06 - Indirect data source.
Cambridge International AS and A level IT
o DISCUSSION POINT
Remember that direct data is usually used by the person The spreadsheet below is used to calculate the area of a
that collected it and for the purpose they collected it.
driveway.
However, it’s also possible for a person to collect data
from an indirect (secondary) source. For example, if a ABC
journalist is writing a news article and bases his story on 1 Area calculator
existing news articles, then he has used indirect sources 2 Length = 3m
rather than interviewing the people involved in the original 3 Width = 5m
story.
4 Area - 15 m2
Advantages and disadvantages of gathering 4 Identify one item of data that is static.
data from direct and indirect data sources 5 Identify one item of data that is dynamic.
The general rule is that data collected directly for the The builder using the spreadsheet needs to know the
purpose for which it is intended is more likely to be length and width of a driveway for a customer.
accurate and relevant than data that is obtained from
existing data (indirect source). 6 Identify one direct source the builder could use to
find the length and width.
7 Identify one indirect source the builder could use to
find the length and width.
Direct data source Indirect data source
8 Give one advantage of using the direct source instead
The data will be relevant Additional data that is not of the indirect source to find the length and width.
because what is needed required will exist that may
has been collected. take time to sort through
and some data that is
required may not exist. 1.03 Quality of information
The original source is The original source may The quality of information is determined by a number of
known and so can be not be known and so it attributes.
trusted. can’t be assumed that it is
reliable. Accuracy
It can take a long time to The data is immediately Information that is inaccurate is clearly not good enough.
gather original data rather available. Data must be accurate in order to be considered of good
than use data that already quality. Imagine being told that you need to check in at the
exists. airport 45 minutes before the flight leaves, so you turn up
A large sample of statistical If statistical analysis is at 18:10 for a 19:05 flight only to find that you were actually
data can be difficult required, then there are supposed to check in one hour early.
to collect for one-off more likely to be large
purposes. samples available.
The data is likely to be Data may be out of date
up to date because it has because it was collected at Examples of inaccurate information include:
been collected recently. a different time.
• decimal point in the wrong place, for example
Bias can be eliminated by Original data may be $90.30 instead of $903.00 could suggest a product
asking specific questions. biased due to its source. is much cheaperthan it really is
The data can be collected The data is unlikely to be in
and presented in the the format required, which • misspelling such as ‘stair’ instead of ‘stare’, where
format required. may make extracting the words have completely different meanings
data difficult. • misplaced characters, such as a licence plate of
BW9EP3T instead of BW93PET.
Table 1.02 - Direct and indirect data sources.
Chapter 1: Data, information, knowledge and processing
Relevance
Information must be relevant to its purpose. Having
additional information that is not required means that A person orders a pizza. They ask for a large
the user has to search through the data to find what is pepperoni to be delivered. They forgot to say what
actually required. type of base they wanted and where it should be
delivered to. The pizza company does not have
enough information to fulfil the order.
A traveller needs to catch a train from Bhopal to
Kacheguda. They phone up to find out the time of
Examples of irrelevant information include:
departure and arrival, but they have to listen to all
• being given a bus timetable when you want to the times of the stations in between before they get
catch a train the arrival time at Kacheguda.
• being told the rental price of a car when you want
to buy the car Completeness
• a user guide for a mobile phone that All information that is required must be provided in order
includes instructions on how to assemble for it to be of good quality. Not having all the information
a plug. required means it cannot be used properly.
Age
Information must be up to date in order to be useful. A person has booked their car in for a service over the
Old information is likely to be out of date and phone. The mechanic tells them the name of the street
therefore no longer useful. When using indirect data but doesn’t give the building number.
sources, always check when the information was
produced.
TASK
Look at the invitation below.
RSVP
encrypting data
J
KEYTERMS
Coding data
Using numbers for international dialling codes:
You are probably very familiar with coding data
already. When you send a text message or instant • 44 = Great Britain
message you probably code your data. You might use
• 33 = France
codes like:
• 49 = Germany
• LOL = laugh out loud • 34 = Spain
• ROFL= roll on floor laughing
• 93= Afghanistan
• FYI =foryour information
• BTW = by the way • 971= United Arab Emirates
• 2= to • 81= Japan
• 4=for Using abbreviations for international vehicle
• BRB= be right back. registration plates:
In a similar way, data stored on a computer can be coded. • GB = Great Britain
Coding is the process of representing data by assigning a
• F= France
code to it for classification or identification.
• D = Germany (Deutschland)
Often genders are coded as M for male and F for female.
Clothing can be coded by the type, size and colour: • E = Spain (Espana)
Presentation Data can be presented in small The disadvantages of coding can be summarised as
spaces, such as on labels or when shown in Table 1.04.
listing large amounts of data.
Storage Less storage space is required
Limited codes There may not be enough codes available
because less characters are used to
to use, meaning that more letters or
store the data.
numbers need to be added. For example,
Speed of input Data can be input more quickly with international vehicle registration
because only a few numbers or codes, E is already used for Spain and
letters need to be input instead of so Egypt has to use ET and Ecuador has
whole words or phrases._ to use EC. Now that Egypt has taken ET,
Processing Processors can process data more Ethiopia can’t use it and so has to use ETH.
quickly because they only have to Interpretation Codes may be difficult to interpret. For
process the coded data instead of example, with international vehicle
the whole word or phrase. registration codes, somebody might
Validation It’s possible to validate data by checking look at ET and assume it is Ethiopia or
it is a particular length or within a look at S and assume it is Spain. It’s
certain range or matching other rules. even more difficult when considering
For example, an international vehicle international dialling codes that are
registration code must be a maximum represented by numbers.
of three letters and not contain any Similarity Some letters and numbers can be difficult
numbers or symbols. to distinguish such as 0 and 0 or Z and
Confidentiality Sometimes data can be coded so 2, especially if handwritten. With codes,
that it only makes sense to people it’s difficult to guess what the value might
who know what the codes mean. be and so mistakes can occur. At least
Consistency If the correct codes are used then with words it’s possible to guess what the
data will be input consistently badly written letter might be.
without spelling errors, making it Efficiency If a user inputting codes does not know
easier to be searched or summarised. what code to use, then they will not be
able to enterthe data efficiently. Instead
Table 1.03 - Advantages of coding. they will have to look up the code.
Missing It’s possible that some information gets lost
information during the process of coding. For example,
TASK
if devices on a network are coded as L for
Create a coding system for clothing that includes the type
laptop, P for printer, D for desktop computer
of clothing, size, colour and other information that you
and M for mobile phone, then information
think is relevant. Show it to a friend. Can they interpret
about whether or not the mobile phone or
the code efficiently? Did you have any duplicate codes?
Do you think the sizes would be understood by potential laptop is touch screen is lost.
customers?
Table 1.04 - Disadvantages of coding.
Cambridge International AS and A level IT
TASK 084 104 101 032 098 105 103 032 098
Create a coding system for the names of people in your 097 100 032 119 111 108 102 033
class. Show it to a friend. Can they interpret the code Visit the website www.unicode.org/charts or www.
efficiently? Did you have any duplicate codes? unicode-table.com.
Choose a language script and then choose a short
sentence (less than ten words). Encode your sentence
into UNICODE. Now show the Unicode to a friend
Encoding data and see if they can convert it back into the original
When data is encoded, it is stored in a specific format. sentence.
Computers do not recognise text, sound and images in the
same way we do. Computers use binary digits which are Is
and Os. One means on and zero means off. A typical binary
number would look like this: 11011010. Therefore, data Images
needs to be encoded into a format which the computer Encoding is also used to store images. At the most
understands. Codecs are programs that are used to basic level, images are encoded as bitmaps. A
encode data for images, audio and video. The codecs are Microsoft Windows bitmap includes the following
also needed to read the data. data when encoding an image (this is not the
complete list):
Text
Text is encoded as a number that is then represented by • width of bitmap
a binary number. A common encoding method is ASCII • height of bitmap
(American Standard Code for Information Interchange). • bit count which represents number of colours:
ASCII consists of 256 codes from 0 to 255. Here is a subset 1= monochrome
of the ASCII code table: 4 =16 colours
8 = 256 colours
Character Decimal number Binary number 16 = 65536 colours
@ 64 01000000 24= 16 million colours
A 65 01000001 • compression type (no compression, eight-bit
B 66 1000010 run-length encoding or four-bit run-length
C
encoding)
67 1000011
a 97 01100001
• horizontal resolution in pixels per metre
• vertical resolution in pixels per metre
b 98 01100010
• raster data (the actual shape of the image
c 99 01100011
in pixels).
Table 1.05 - ASCII code table.
For the raster data, we will assume a monochrome
image (black and white). Each bit will represent either
There are other encoding methods, too, such as extended
a black or white pixel. A byte consists of eight bits and
ASCII which allows for more characters to be used,
so will represent eight pixels. The encoding starts from
particularly for international languages. Other encoding
the bottom left of the image, works to the right-hand
methods include Unicode and EBCDIC but you don’t need
side and then up to the next row and again from left to
to learn about these.
right.
TASK
Visit the website www.ascii-code.com and look at the
ASCII code table. What sentence does the following ASCII First
code represent?
Figure 1.10 - Empty raster grid.
Chapter 1: Data, information, knowledge and processing
As the image gets bigger, it takes up a lot of storage sample rate, the higher the quality of the music, but also
space. Therefore a method called run-length encoding the more storage that is required. Each sample is stored
(RLE) can be used to reduce the amount of storage space as binary data. The sample rate is measured in hertz (Hz).
that is used. This is known as compression. RLE takes Typically, music on a CD will use a sample rate of 44.1kHz
consecutive values and combines them together. At a (kilohertz) whereas a simple telephone call would find 8 kHz
basic level, the image above has ten black pixels in a row. sufficient.
Instead of storing ten separate pixels, RLE would store the
The bit depth is the number of bits (Is and Os) used for
quantity and colour, for example ten x black or ten x 1111.
each sound clip. A higher bit depth will give a higher quality
Sometimes when files are compressed, they use lossy sound. CDs use a bit depth of 16 which means 16 bits (Os
compression, which means some of the original data is and Is) are used. 16 bits gives 65536 combinations of binary
removed and the quality is reduced. For example, Figure storage.
1.11 shows how the quality of an image can be reduced if
The bit rate is the number of bits that are processed every
lossy compression is used.
second. It is measured in kilobits per second (kbps). The
bit rate is calculated using this calculation:
Isiupu Current save settings bit rate = sample rate x bit depth x number of channels
TASK file size (in bits) =1411200 x 210 = 296 352 000
Images can be encoded into a variety of different file (296 megabits)
types. Find out what the purpose of each of the following There are eight bits in a byte and we use bytes to
file types is: measure storage, so the file size in bits is divided by
• JPEG/JPG (Joint Photographic Experts Group) eight:
• GIF (Graphics Interchange Format)
file size (in bytes) = 296 352, 000 + 8 = 37044000
• PNG (Portable Network Graphics)
megabytes =37 MB (megabytes)
• SVG (Scalable Vector Graphics)
Sound TASK
When sound is encoded, the sample rate, bit depth and Calculate the file size of a sound file with the following
bit rate are stored. When sound is recorded, it is converted properties:
from its original analogue format into a digital format, which • sample rate =8 000 bps
is broken down into thousands of samples per second.
• bit depth = 16
The sample rate, also known as the frequency, is the • channels = L
number of audio samples per second. The higher the
Cambridge International AS and A level IT
The encoding method above does not compress the file • 1024 x 768 (Extended Graphics Array (XGA) - often used
and a typical storage format is WAV (Waveform Audio File with digital projectors)
Format), which is used on PCs. Flowever, music files are • 1280 x 720 (Wide Extended Graphics Array (WXGA) -
often compressed to allow for efficient streaming across wide screen)
the internet and to enable lots of music files to be stored • 800 x 600 (Super Video Graphics Array (SVGA)) !
on a single storage medium. Compression reduces the file
• 480 x 320 (useful for mobile phones where the screen is
size. smaller and internet bandwidth could be low).
There are two types of compression: lossy compression The bit rate for videos combines both the audio and
and lossless compression. Lossless compression reduces frames that need to be processed every second. The
the file size without losing any quality, but it can only bit rate is the number of bits that need to be processed
reduce the file size by about 50%. every second. A higher frame rate requires a higher bit
Lossy compression reduces the file size by reducing the rate.
bit rate, which means that some of the quality is lost.
Most human ears won’t be able to detect the loss in Video settings
quality, but an experienced musician would notice. When
compressing an audio file, it is possible to choose the bit
Width: 1 1280 | pixels
rate. A bit rate of 128 kbps is equivalent to what would be
Height: 1 720 | pixels
heard on the radio. Bit rate: 1 8000 | kbps
Frame rate: 1 24 | fps
Audio settings
A CD file originally has a bit rate of 1.4 Mbps Audio format: 1 128 kbps, 48kHz, stereo
(1411200 bps). This is reduced to 128 kbps (128 000
kbps). The original file size was 37 MB. To calculate Estimated file size: 58.14 MB per minute of video
the change in file size, divide by the original bit rate
Figure 1.12 - Video and audio settings.
and multiply by the new bit rate.
Compressed file size = 37 1411200 x 128000 A one hour, eight-bit HD video with 24 fps would require
= 3.36MB. 334 GB (gigabytes) of storage. This would be far too
much data to download or even broadcast. Therefore,
In this example, the file size has been reduced to
compression is required. Compression usually involves
approximately 10% of the original size.
reducing the:
• resolution
Video • image size or
When video is encoded it needs to store images as • bit rate.
well as sound. Images are stored as frames. A standard These all result in lossy compression. A common lossy
quality video would normally have 24 frames per second compression format is MP4, which is a codec created
(fps). High definition (HD) uses 50 fps and 60 fps. The by MPEG (Moving Pictures Expert Group). There are also
higher the number of frames per second, the more lossless compression methods such as digital video
storage that is required, but the higher quality the video (DV).
will be.
The size of the image is also important. A HD video will
have an image size of 1920 pixels wide and 1080 pixels TASK
high. The higher the image size, the more storage that is Edit a short video using video editing software. Try saving
required. Other common resolutions include: it with different resolutions, different frame rates and
different audio formats. Compare the file sizes of each
• 7680 x 4320 (8K/ ultra high definition) video file that is created.
• 3840 x 2160 (4K/ ultra high definition)
Chapter 1: Data, information, knowledge and processing
Advantages and disadvantages Audio Interchange File Format (AIFF) or Advanced Audio
of encoding data Coding (AAC) audio files)
Data has to be encoded in order to be stored and • quality of images, sound and videos is lost when files are
processed by a computer system. It is essential that data compressed using lossy compression
is encoded into binary digits (Is and Os). • text that has been encoded using ASCII or UNICODE needs
to be decoded using the correct format when it is opened.
One purpose of encoding data is often to reduce the file
If some international characters have been included using
size. The advantages of reducing the file size include:
UNICODE and the file is opened as an ASCII file, then the
• enabling real-time streaming of music and video over international characters will not be recognised.
restricted bandwidth (e.g. home broadband, mobile
broadband)
TASK
• reducing the time taken to download files
Compare the file types that can be opened and saved
• faster downloading of websites with images, music using different graphics software packages.
or video
• enabling more music and video to be stored on CDs,
DVDs, flash memory and other storage media.
Encryption
Another purpose of encoding is to enable different formats
One specific type of encoding is encryption. This is when
to be used. The advantages of different formats for images
data is scrambled so that it cannot be understood. The
include:
purpose of encryption is to make the data difficult or
• formats such as PNG and GIF enabling transparent impossible to read if it is accessed by an unauthorised user.
backgrounds Data can be encrypted when it is stored on disks or other
• formats such as GIF allowing animated images storage media, or it can be encrypted when it is sent across
• formats such as JPG allowing a very large colourdepth, a network such as a local area network or the internet.
meaning that the image will be of high quality Accessing encrypted data legitimately is known as decryption.
• formats such as bitmap image file (BMP) including
all the original uncompressed data so that the Caesar cipher
image is of the highest possible quality and can be A cipher is a secret way of writing. In other words it is
manipulated a code. Ciphers are used to convert a message into an
• formats that are designed for specific software such as encrypted message. It is a special type of algorithm which
Paint Shop Pro and Photoshop containing layers which defines the set of rules to follow to encrypt a message.
allow for various adjustments to be made to the image Roman Emperor Julius Caesar created the Caesar cipher
and being able to enable or remove those layers so that he could communicate in secret with his generals.
• vector formats such as SVG storing the shapes rather The Caesar cipher is sometimes known as a shift cipher
than the pixels so that graphics can be enlarged and because it selects replacement letters by shifting along
reduced without loss of quality due to pixelation. the alphabet.
The main disadvantage of encoding data is the variety of
encoding methods, resulting in a large variety of file types.
Problems include:
In this example the alphabet is to be shifted by three
• the required codecs may not be installed and so a file (+3) letters so that A = D, B = E and so on:
cannot be saved in the desired format
• the necessary codecs must be installed, in order to open Original Q S v.
o DISCUSSION POINT
Symmetric encryption
This is the oldest method of encryption. It requires both I
the sender and recipient to possess the secret encryption
and decryption key. With symmetric encryption, the
secret key needs to be sent to the recipient. This could be
done at a separate time, but it still has to be transmitted
whether by post or over the internet and it could be
intercepted.
Sender Recipient
i
6EB69570
Helene’s
public key
Normal web pages that are not encrypted are fetched and
transmitted using Hypertext Transfer Protocol (HTTP).
Anybody who intercepts web pages or data being sent
08E03CE4 over HTTP would be able to read the contents of the web
page or the data. This is particularly a problem when
sending sensitive data, such as credit card information or
usernames and passwords.
Helene Hypertext Transfer Protocol Secure (HTTPS) is the
\ r
Hello
Vh=ÿ"?
m
encryption standard used for secure web pages. It uses
Secure Sockets Layer (SSL) or Transport Layer Security
Decrypt
Helene! (TLS) to encrypt and decrypt pages and information sent
Helene’s
and received by web users. This is the encryption method
private key
that is used by banks when a user logs onto online
Figure 1.16 - Asymmetric encryption example. banking. A secure web page can be spotted by its address
beginning with https:// and in addition some browsers
When encrypted data is required by a recipient, the display a small padlock.
computer will request the digital certificate from the
sender. The public key can be found within the digital
certificate. A https://app.kashflow.eom/#dashboard
Asymmetric encryption is used for Secure Sockets
Figure 1.17 - The ‘s’ after ‘http’ and the padlock indicate
Layer (SSL) which is the security method used for
that this is a secure website.
secure websites. Transport Layer Security (TLS) has
superseded SSL but they are both often referred to as
SSL. Once SSL has established an authenticated session, When a browser requests a secure page, it will check the
the client and server wilt create symmetric keys for faster digital certificate to ensure that it is trusted, valid and that
secure communication. the certificate is related to the site from which it is coming.
The browser then uses the public key to encrypt a new
symmetric key that is sent to the web server. The browser
TASK and web server can then communicate using a symmetric
Watch the video about SSL at encryption key, which is much faster than asymmetric
http://info.ssl.com/article.aspx?id=10241. encryption.
Hard disk
Disk encryption will encrypt every single bit of data stored The web browser requests the certificate from the
on a disk. This is different to encrypting single files. In web server.
order to access any file on the disk, the encryption key will 1Browser requests certificate
Web browser Web server
be required. This type of encryption is not limited to disks
and can be used on other storage media such as backup
tapes and Universal Serial Bus (USB) flash memory. It is Figure 1.18 - Asymmetric cryptography.
particularly important that USB flash memory and backup
tapes are encrypted because these are portable storage The web browser then uses the web server’s public
media and so are susceptible to being lost or stolen. If key to encrypt a new symmetric key and sends that
the whole medium is encrypted, then anybody trying encrypted symmetric key to the web server. The
Cambridge International AS and A level IT
web server uses its own private key to decrypt the 256-bit AES encryption it is virtually impossible for
new symmetric key. somebody to decrypt the data and so it is effectively
protected from prying eyes.
Web Browser
New
symmetric Encrypt
© DISCUSSION POINT
Kev Most Wi-Fi access points and Wi-Fi routers use encryption.
Server's This serves two purposes. The first is to only allow people
who know the ‘key’ (usually a password) to access the
public key
network, so that any unauthorised users cannot gain
6EB69570 access. The second is to encrypt the data, so that it cannot
08E03CE4 be understood by somebody ‘snooping’ on the Wi-Fi
network.
Wi-Fi networks are particularly susceptible to ‘snooping’
because no wires are required to connect to the network.
Web Server It is possible to sit in a car outside somebody’s house
and see the Wi-Fi network. The ‘key’ stops that person
New from accessingthe network and also stops that person
symmetric
l.e,
Decrypt from understanding the data that is moving around the
Server's network.
private key Did you know that if you access a public Wi-Fi hotspot that
is ‘open’ and therefore not encrypted that anybody with
Figure 1.19 - Secure website identification.
the right software can see what you are sending over the
network, including your emails? This applies to laptops,
The browser and web server now communicate tablets and mobile phones or any other device using public
using the same symmetric key. Wi-Fi.
Encryption Decryption
Validation
Validation takes place when data is input into a computer
system. The purpose is to ensure the data is sensible and When filling in a 'contact us’ form on a website, it is
conforms to defined rules. A railway season ticket will have essential that an email address is entered.The following
an expiry date. The season ticket is valid until it expires. would be valid if only a presence check is carried out:
Once it expires it is invalid. The rule here is that the date
• a
the season ticket is used must be before its expiry date.
• a@b
When data is validated, if it conforms to the rules then it
• [email protected]
will be accepted. If it does not conform to the rules, then
• @
it will be rejected and an error message will be presented.
Validation does not ensure that data is correct. • 372823
Notice that none of these are correct but they pass
the rule that data must be present.
TASK
Create a flow chart to describe the process of validation.
You should include the following: Range check
• Start A range check ensures that data is within a defined range.
• End A limit check has a single boundary. This could be the
• Input of data highest possible value or the lowest possible value.
• Error message A range check includes two boundaries, which would be
• Data accepted
the lower boundary and the upper boundary. The following
symbols are used when comparing with a boundary:
• Data rejected
• Validation decision > greater than
There are a variety of different validation checks that < less than
can be used to check whether data is acceptable.
These different checks are the different types of rules >= greater than or equal to
that are used. <= less than or equal to
Presence check
A presence check is used to ensure that data is entered. If An opinion poll is taken and asksforthe respondent’s
data is entered, then it is accepted. If data is not entered, age. The respondents have to be at least 18 years old.
then the user will be presented with an error message The lower boundary is 18. There is no upper boundary,
asking them to enter data. so this is a limit check. This could be written as:
© • Please fill in the mandatory fields.
Age >= 18
Letters representing grades for an exam are
Login to your account Register new account entered. Only the letters A-E are valid grades. The
grade must be less than F. The upper boundary is E.
There is no lower boundary, so this is a limit check.
This could be written as:
ZipGodB*
Grade < F
BBSIB ESI The number of students in a class must be between
5 and 28. The lower boundary is 5 and the upper
boundary is 28, so this is a range check. This could
be written as:
Number of students >= 5 and <=28
Figure 1.21- Required data on a website.
Cambridge International AS and A level IT
Data that is within the boundaries is valid. Data that Format check
is outside the boundaries is invalid. Data that is A format check ensures data matches a defined format. It
valid and within the boundaries is not necessarily is sometimes known as a picture check and the data has
correct. A grade of C could be entered when a to follow a pattern.
grade A should have been entered. C is valid but
incorrect.
Data that is of the correct data type is valid. Data that Data that matches the pattern is valid. Data that is valid
is valid and of the correct data type is not necessarily and of the defined format is not necessarily correct. An
correct. A date of birth of 28/12/2087 could be entered. email address of fdc@jb meets the rules above but is
The date is valid because it is a date data type, but it is clearly incorrect.
clearly incorrect.
Lookup check
Length check A lookup check tests to see if data exists in a list. It is
A length check ensures data is of a defined length or similarto referential integrity in Chapter9, but uses a list
within a range of lengths. defined within the validation rule.
Visual checking
6 Calculate the remainder (modulo 10) of result (5)
above: 89 MOD 10 = 9. A method of verification can be for the user to visually
check that the data entered matches the original source.
7 Subtract (6) above from 10: 10 - 9 = 1. This can be done by reading the data displayed on
The result of the algorithm is 1. screen and comparing it with the original data. If the data
matches, then it has passed the verification process. If it
Invalid example
does not match, then it has failed the verification process
In this example, the ISBN has been entered and needs to be re-entered. Visual checking does not
incorrectly as two numbers have been transposed ensure that the data entered is correct. If the original data
(7 and 3) accidentally: 978095374041-1.
is wrong, then the verification process may still pass.
1 Add all the digits in even numbered positions For example, if the intended data is ABCD but ABC is on
together (978095374041) :7 + 0 + 5 + 7 + 0 +l= 20. the source document, then ABC will be entered into the
computer and verified, but it should have been ABCD in the
2 Multiply result (1) above by 3: 20 x 3 = 60.
first place.
3 Add all the digits in odd numbered positions
together (978095374041) : 9 + 8 + 9 + 3 + 4 + 4 = 37. Double data entry
4 Add results (2) and (3) together: 60 + 37 = 97. Another method of verification is to input data into
the computer system twice. The two items of data are
5 Divide the result (4) above by 10: 97 +- 10 = 9.7.
compared by the computer system and if they match, then
6 Calculate the remainder (modulo 10) of result (5) they are verified. If there are any differences, then one of
above: 97 MOD 10=7. the inputs must have been incorrect.
7 Subtract (6) above from 10: 10-7 = 3.
The validation rule is that a person’s gender must 15 Describe the purpose of verification.
be a single letter. N is entered. This passes the 16 Identify three methods of validation.
validation check but is clearly incorrect. When 17 Explain using examples why validation and
verified using double entry, the user enters N first verification do not ensure data is correct.
followed by M the second time. The verification
process has identified the error.
However, it is still possible that the user could enter 1.06 Summary
N twice and both the validation and verification
processes would fail. Information has context and meaning so a person
knows what it means. The quality of information can be
affected by the accuracy, relevance, age, level of detail
Proofreading and completeness of the information. Proofreading is the
process of checking information.
Proof reading is the process of checking information.
For example, when this book was written it was Data are raw numbers, letters, symbols, sounds or
checked for spelling errors, grammar errors, formatting images without meaning. Knowledge allows data to be
and accuracy. Proof reading can take place for a interpreted and is based on rules and facts. Static data
document or when data is input. When proof reading does not normally change. Dynamic data updates as a
a document, it is best to have a proof reader who is result of the source data changing. Data collected from a
different from the original author of the document, direct data source (primary source) must be used for the
as they will be able to check the work objectively and same purpose for which it was collected. Data collected
identify errors. However, it is also possible for the from an indirect source (secondary source) already existed
original author to proof read their own document, but for another purpose.
they may not notice some of their own errors. When Coding is the process of representing data by assigning
data is input, it is usually proof read by the person a code to it for classification or identification. Encoding
inputting the data. is the process of storing data in a specific format.
Encryption is when data is scrambled so that it cannot be
understood.
TASK Validation ensures that data is sensible and allowed.
Check the information below by proof reading it. Validation checks include a presence check, range check,
I were walking along the road yesterday wen I spotted type check, length check, format check and check digit.
a dog without a lead I called the dog but it did not Verification is the process of checking data has been
respond, the dog ran away; transferred correctly. Verification can be done visuatty or
by double data entry.
Cambridge International AS and A level IT
Review questions
1 Give an example of data. [1]
2 Describe the term knowledge. [1]
A news and sports website includes both static and dynamic data.
3a Compare static and dynamic data. [4]
3b Identify and describe two factors that affect the quality of information on the website. [4]
3c Give an example of coded data related to the news and sports website. [1]
Users can pay for premium services on the website using their credit card.
4a Explain why the website uses https at the beginning of the website address instead of
http. [4]
4b Describe symmetric encryption. [1]
When the users subscribe to premium features, they have to choose a password.
4d Describe how verification can be used when entering the password. [1]
There is a form on the website that can be used to submit news stories. When data is entered
onto the form, it is validated.
5a Describe the purpose of validation. [1]
5b Using an example related to submitting a news story, identify and describe one method of
validation. [3]
r *' KTj
T r
wWHfc I
j
l[iHli :
SI"
* #/
_
23
Chapter 2
Hardware and software
Learning objectives
By the end of this chapter, you will be able to:
m define hardware
evaluate internal and external hardware devices
explain the purpose of and evaluate storage devices
explain the purpose of input and output devices
evaluate input, storage and output devices for a given task
define soft ware
evaluate different types of soft ware
explain the purpose of system soft ware
evaluate application software
evaluate user interfaces
evaluate mental models
describe utility soft ware
compare custom-written and off -the-shelf soft ware
describe and evaluate a compiler and interpreter
ainiH
Cambridge International AS and A level IT
2.01 Hardware
Q Remember
The central processing unit (CPU) is the brain of a
1 KEY TERMS computer. It is the part of the computer that carries out
calculations, executes instructions and processes data. It
Hardware: a physical component of a computer system includes the arithmetic logic unit (ALU) and control unit (CU).
Device: a hardware component of a computer system
consisting of electronic components
Output device: a device used to communicate data or The ALU performs calculations and logical operations. The
information from a computer system CU runs the fetch-execute cycle which fetches instructions
Storage device: a device used to store data onto a storage from memory and executes them.
medium
Input data is taken from input devices (such as a
Input device: a device that allows data to be entered into a
computer system
keyboard) or storage and processed by the CPU, which
Storage medium: the medium On which data is stored
produces output data that can be stored or sent to an
output device (such as a monitor).
Volatile: data is lost when there is no power
Non-volatile: data remains When there is no power CPUs usually consist of multiple cores. Each core is
a separate processor, so a quad-core CPU has fpur
processors. Processors are measured by the number
Hardware of instructions they can process per second (hertz). A
3 GHz (gigahertz) processor can process up to 3 billion
© Remember
An item of hardware is a physical component that forms
part of a computer system. Items of hardware are often
instructions per second.
Motherboard
known as devices because they comprise electronic
components. Hardware devices can be internal to the
computer system (such as the central processing unit,
memory or motherboard) or they can be external to the
computer system (such as the monitor, keyboard or mouse). iv
Hardware is categorised into input, output and storage SB&
devices. Input devices allow data to be sent to a
computer (e.g. keyboard). Output devices allow the
v
communication of data/information from a computer (e.g.
monitor). Storage devices store data onto a storage
medium so that it can be used at a later time.
W
Internal hardware devices
Central processing unit
Figure 2.02 - A motherboard.
© Remember
The motherboard is a printed circuit board (PCB) which
connects the main components of a computer. Some
of these components may be an integral partofthe
motherboard. Such components can include Universal
Serial Bus (USB) ports, a network port and an integrated
graphics card. A motherboard will always include the main
bus which is used to transfer data between hardware
components.
Figure 2.01 - A central processing unit.
i
Chapter 2: Hardware and software
© Remember
Random access memory (RAM) is memory that is used
to store currently active programs and data. The more
A graphics card is also known as a video card, display
adapter or graphics adapter. It is a printed circuit board
that connects to one of the motherboard’s expansion
RAM that is available to the computer, the more data and slots. Its purpose is to generate the signals needed to
programs can be used at the same time. display the output image from the computer. Often the
graphics adapter is integrated into the motherboard and
does not require a separate card. However, by using a
This is particularly important in multitasking separate card, the graphics performance can be improved
environments, when several programs may be open at the as a separate processor can be used for graphics (a
same time. graphics processing unit).
When the RAM becomes full, programs or data that are
no longer active will be removed to make space for new
programs or data. Ifthe RAM becomes full and there are
no inactive programs or data to remove, then an area of
secondary storage (e.g. hard disc drive (HDD) or solid state
drive (SSD)) known as virtual memory is used to expand
the amount of memory available to the CPU. Virtual
memory is very slow because secondary storage access
times are thousands of times slower than RAM access
times.
RAM is volatile, which means the content of the memory
is lost if there is no power to the RAM. When you are using
a computer and experience a power cut, this is why the
data you are currently using is lost unless it has recently
been saved to secondary storage. Figure 2.03 - A graphics card.
Read only memory Graphics cards include a variety of options for output.
Read only memory (ROM) is memory that, once it has been Standard video graphics array (VGA) output to a monitor
written to, can no longer be changed. It is permanent and it is achieved through the RGB port which transmits red,
is non-volatile, which means that when there is no power green and blue signals to the monitor in an analogue
to the computer, the contents of the ROM will be retained. format. High definition display is achieved through a
This is because it is powered by a small long-life battery. high-definition multimedia interface (HDMI) port. Another
option is Digital Video Interface (DVI) which supports high
resolution displays using digital signals.
and a single input for line level devices (blue socket). If Attachment (SATA) or Integrated Drive Electronics (IDE)
higher quality or surround sound is required, then it is cable.
usually necessary to have a separate sound card which
connects to one of the motherboard’s expansion slots.
This will enable multiple outputs for front, rear, centre and
sub-woofer speakers.
n
Hard disk drive
A hard disk drive (HDD) is the most common form of
secondary storage for a computer due to its relatively low 1>
DISCUSSION POINT
Do you know where the phrase ‘my computer has crashed’
v» comes from? It relates to when the read-write head crashes
into a platter and causes damage to the hard disk, meaning
that data and programs can no longer be retrieved.
Monitor
TASK
Although not an essential part of every computer
Have a look at the inside of an old computer. Identify system, a monitor is certainly an essential part of most
each of the main components that can be seen on the computer systems as it enables the user to visualise the
motherboard, the hardware devices that are connected output. It is connected to the computer using one of the
to it and any available connection ports.
ports on a graphics card. Monitor sizes are measured
diagonally and, apart from some very old ‘legacy’
monitors, they now have flat screens which minimalise
External hardware devices the amount of desk space that is used and they are
Cloud light enough to be mounted on a wall or a desk using a
bracket or on a shelf.
Cloud computing is a term that refers to anything where
computing services are hosted over the internet and A monitor will be limited by its resolution. This is
not in the same physical location as the computer being the number of pixels it can display and is measured
used. Data is stored on banks of servers that are accessed horizontally by vertically. For example, a high definition
remotely. The physical devices that store the data are (HD) monitor can display 1920 x 1080 pixels. Some monitors
owned by a hosting company rather than the person or also include a touch interface (known as a touch screen),
organisation using the data. which means that the user can select items by directly
interacting with the display on the screen. These are often
When data is stored in the cloud, the hosting company
integrated into tablet computers and mobile phones.
takes all responsibility for storing the data, managing the
data, securing the data and backing up the data, so that
Keyboard
people or organisations no longer have to be concerned
with this. As the data is stored remotely, it also means that
it can be accessed at any time in any place, so people do
* 't o
not have to be sitting at a specific computer or within an
organisation to access that data. •M
/ X
A *r
r- u
to X NX
'A A.
vi<S
Examples of cloud storage for personal use include: > V
• OneDrive 1
o’
• Google Drive
9-
• Dropbox -r A
• Box Figure 2.06 - A Chinese keyboard.
Mouse
A mouse is a pointing device which allows objects to be
selected and manipulated on the screen. The mouse
controls a pointer which is displayed on the screen. When
the mouse is moved, the pointer moves and objects
iU,
f *
such as menus can be selected on the screen using one
of the mouse buttons. Like a keyboard, a mouse can be
connected using a USB port, by wireless Bluetooth or by
other wireless technology.
Printer
A printer produces a hard copy (printout) from a
computer usually onto paper. A simplex printer can print
on a single side of paper, whereas a printer with a duplex Figure 2.07 - Modern inkjet plotter.
unit can print on both sides of each sheet of paper.
Some printers include additional functions such as a
scanner. Speakers
Speakers are used to provide sound output from a
Laser printer computer. These can be as simple as a pair of stereo
A laser printer negatively charges a cylindrical drum speakers or full surround sound.
which then attracts electrically charged toner (powdered
ink). The toner is then heated so that it melts onto the
paper. TASK
Find out the difference between mono sound, stereo
Inkjet printer sound, 5.1surround sound, 6.1 surround sound and 7.1
Cartridges full of ink in four different colours (black, cyan, surround sound.
magenta, yellow) are used to ‘squirt’ ink onto the paper to
form the required printout.
Plotter Webcam
In the 1990s, a plotter used to ‘plot’ lines onto large sheets A webcam is a camera that is connected to the computer
of paper by moving the paper backwards and forwards for the purpose of capturing still or moving images while
and drawing using pens to create vector drawings. Today, using the computer. It will not be as high quality as a
plotters are inkjet printers designed to be used with large dedicated digital camera or digital video camera. It will
sheets of paper, typically A2, A1 and AO. If only black and usually have an integrated microphone for capturing
white printouts are required, then light-emitting diode sound. Its main purpose is for users to engage in online
(LED) plotters are much faster and have cheaper running video chat or video conferences. They can also be used as
costs than inkjet plotters. security cameras.
Chapter 2: Hardware and software
r
character recognition (OCR) to recognise the text. Some Magnetic ink is used to print numbers at the bottom of
flat-bed scanners include an automatic document feeder checks. The numbers are printed using the MICR E-13Bor
(ADF) that enables documents with multiple pages to be CMC-7 font. The ink contains iron oxide which means that
scanned in one operation. it is easily detected when using a magnetic ink character
reader (MICR) and the characters can be understood.
It is important that mistakes aren’t made and so MICR
provides a much better level of accuracy than OCR.
s
An optical character reader (OCR) is a device that
enables characters on a document to be identified
and understood by the computer as letters, numbers,
characters and words. This isn’t really a device in itself,
but is a scanner combined with software that performs
optical character recognition (also OCR). The picture of the \
document is analysed and characters are recognised by
the software and turned into a document so that the text
can be searched or edited.
Barcode reader
A barcode reader is used to detect the width of lines and
gaps that form a barcode. A laser beam is shone onto the
barcode and a photodiode is used to measure the amount
of light that is reflected back. Black lines will not reflect
any light but white gaps will. A barcode represents letters
and numbers which usually identify something, such as
A a book or other product. The barcode scanner usually
includes its own hardcoded circuitry so that it can send
the letters and numbers directly to the computer without
Magnetic ink
the need for additional software.
Figure 2.09 Checkbook with magnetic ink.
Chapter 2: Hardware and software
A pen drive is a nickname for a USB flash drive. It is a small Find out about the next advancement in optical storage,
the holographic versatile disc (HVD).
data storage device about the size of a thumb which
stores data on flash memory and includes an integrated
USB interface. The USB interface means that the flash
drive is recognisable on all computers with a USB port Memory card
and therefore data can be transported easily between A memory card is flash memory on a small card. They are
computers. Flash memory is very fast and so the limiting typically used in digital cameras, digital video cameras
factor is the speed of the USB port. As a flash drive does and mobile phones. They take up very little space so are
not have any moving parts it is safe to transport, although well suited to fitting into a small device, as well as being
its size means that it can be easily lost. It also does not rely portable so that data can be transferred to a computer.
on magnetising and therefore is not susceptible to damage There are many different formats of cards, but most
if it comes in contact with a strong magnetic field. devices favour Secure Digital (SD) and microSD cards.
MicroSD cards are only 15 x 11 x 0.1mm in size.
Portable hard disk drive
Hard disk drives were introduced earlier in this chapter. As
well as an internal HDD, it is possible to have an external TASK
HDD. An external HDD can be connected to the computer Categorise each of the internal and external hardware
using a USB or External Serial Advanced Technology devices into input, output and storage devices.
Attachment (eSATA) port. An external HDD can store
a lot more data than a USB flash drive, but it is more
susceptible to damage due to it having moving parts and
its vulnerability to strong magnetic fields.
Storage devices
• when using a database, each new record or change Compact Digital versatile Blu-ray
to a record will be saved to the database in secondary disc (CD) disc (DVD) disc
storage
• the user may want to back up thedata so that a spare Capacity 700 MB 4.7 GB 25 GB
copy is available. (single
layer)
Other reasons for secondary storage include:
Original Music Films HD films
• each program will be stored on secondary storage ready purpose
to be loaded into RAM when the program is opened
• the computer will use secondary storage to save a Table 2.02 - Types of optical storage.
virtual memory file which extends the amount of RAM
available, albeit making the virtual part of the memory In addition to distributing music and films, optical storage has
very slow. been a popular medium to distribute software due to the low
cost of each disc, the fact that read-only versions of each disc
Magnetic tape drive exist and the low cost of posting them. Using recordable and
Magnetic tape is used for backing up and archiving data. rewriteable versions of optical discs makes them suitable for
Data is stored serially which means one item after another. backups and archives. It is quickerto restore a single file from
The tape is wound through the tape drive and as it an optical disc backup ratherthan a tape backup because
winds through data is written to it. The low cost and high the file can be accessed directly ratherthan havingto read
capacity of tapes makes them ideal for backing up and through a whole tape. This also makes optical discs more
archiving data because the data is simply stored in suitable for archived data because files can be found quickly.
a sequential manner. The capacity of optical discs is much less than tapes, which
When retrieving data, it does take a while to find the means they are only suitable for backing up a selection of
data that is required because the tape has to be files rather than the whole of secondary storage.
wound to the exact position where the data is
stored. This makes it unsuitable for everyday use. Hard disk drive
Backups and archives are not intended for everyday HDDs were introduced earlier in this chapter. Their principal
use. If data does need to be restored from backup, purpose is to act as the main secondary storage device for
it may take a while but it is at least available when a computer. Data and programs are stored on the HDD so
needed. If the whole of a computer’s secondary that they can be accessed as and when required. External
storage needs to be restored, then this can be done HDDs can also be used to back up data (although this is
by reading the tape sequentially. an expensive way of doing it) or to transfer data to another
computer. Moving parts within a HDD make it vulnerable to
Tapes are ideal for backing up the whole of secondary
damage if dropped.
storage for a computer or server because they can hold
several terabytes (TB) of data. In 2014, Sony developed a
Solid state drive
tape capable of storing 185TB of data.
SSDs were introduced earlier in this chapter. Similar to a
HDD, a SSD can store the data and programs that are used
TASK
by a computer. SSDs are faster than HDDs, but also more
expensive. SSDs require less power than a HDD so they are
Find out how the grandfather-father-son backup
often used in tablet computers and high-end laptops to
rotation system works using magnetic tapes. How many
tapes would be needed if the monthly backups were
extend the battery life. Storing the operating system and
kept for three months at a time? programs that are used most on a SSD instead of a HDD
will significantly improve the performance of a computer.
Optical TASK
Optical storage was introduced earlier in this chapter Compare the prices of SSDs and HDDs. Work out an
under the heading Blu-ray. In 2015, there were three main approximate cost per megabyte (MB) for each.
types of optical storage.
Chapter 2: Hardware and software
Cost of purchase The cheapest cost More expensive per MB Usually a subscription Designed for
per MB for everyday than a hard disk (e.g. charge that varies portability and so
storage (e.g. $0.06 per $0.10 per GB). depending on cost per MB varies
GB). supplier. depending on size.
Running Requires constant Does not require Running costs are Power only required
cost / power supply of electricity constant source of included within a when in use.
consumption when the disk is spinning power as only needed subscription charge. Portability means that
but if not in use can be when in use. they may get damaged
temporarily turned off. and need replacing.
Moving parts mean that
it may fail in the future.
Speed of access Depends on SATA Up to 30% faster Depends on Depends on whether
connection used. access speed than broadband using USB 2 or USB
hard disk. bandwidth of user 3 ports. USB 3 offers
and that offered by faster data transfer
supplier. than USB 2.
Interoperability If internal, can only If internal, can only Can logon from any Can be connected to
be used in device be used in device device including any device with a USB
connected to unless connected to unless mobile devices. port.
moved permanently, moved permanently,
but if external can be but if external can be
used in any device with used In any device :
a USB port. with a USB port.
Typical use In a desktop computer. Laptop and tablet Collaboration with For transferring data
computers. other users, backups, between devices.
sharing of files and
general storage.
o TIP
Input devices allow data to be sent to a computer (e.g.
Figure 2.11 - IPOS diagram.
Data that has been stored can also be processed and then
output from the computer.
keyboard). Output devices allow the communication of
data/information from a computer (e.g. monitor). When
data is input into a computer, it is processed and then
either output from the computer or stored for later use as
EXAMPLE
J
Multiple choice answers from an examination are
shown in Figure 2.11and is known as an input-process-
output-storage (IPOS) diagram. scanned using an OMR and the answers for each
student are stored. Once all the answers have been
'
scanned, the stored answers are checked and the It may be important to know who or what needs the
marks calculated for each student. The marks are device and you should refer to the school in your answer:
printed out. • It’s important to know the data is being backed
Figure 2.12 shows this process. up from servers because this tells you that a large
capacity will be required.
Multiple choice
answers Irom
Answers stored
(Process)
Answers checked
(Process)
Results Printed
(Process)
• Knowing the data is a backup means you know
OMR (Input)
immediate access to the data is not essential.
t I
1
Itoragr
Results printed
on printer
• The fact that data has to be kept off site is essential
because this means the device used must be able
to be moved away from the school.
Figure 2.12 - Multiple choice IPOS diagram.
Here is an example of how the question could be
answered:
Answer: An external HDD is lightweight and
Evaluate different input, storage or output portable meaning that it will be easy for the school
devices for a given task to take the backup off site.
Based on your understanding of a variety of input, storage As the HDD contains moving parts, the heads could
and output devices, you will now need to evaluate the crash causing data to be lost when transporting it off site.
suitability of a device for a given task. When evaluating,
you need to consider both the reasons why the device The HDD will have a reasonably large capacity which
would be suitable and also the reasons why the device could be around 8TB. This may be enough to store all
of the data from a small school’s server, but a larger
a
would not be suitable. You should then make a conclusion.
In real life, this is what you would do to advise somebody school would require more than one external HDD.
which device they should use. As it is a school, some of the data being backed up is
likely to be personal data which must be kept secure
You could also be asked to evaluate the use of a given
according to the Data Protection Act. When taking the
device for a given task. In this situation, you would only
data offsite, it is possible that it could be lost orstolen
need to give positive reasons why that device would be
due to its size. However, encryption could be used to
suitable.
make the data unreadable if it was lost or stolen.
When analysing and evaluating, you should consider
Storing the backup on a single external HDD means
which features of the device make it suitable for the
that it would have to come back to the school each
specific task that has been presented to you. To do this, day, which defeats the object of keeping it off site.
you will need to identify the important aspects of the task
Therefore, several external HDDs would be required
and relate the useful features of the device to each aspect
to ensure that there is always a backup offsite and
of the task.
this could become very expensive.
In conclusion, although the external HDD can be taken
offsite, I would suggest that it is not suitable due to the
cost of multiple drives and because the capacity may
Question: A school needs to back up data from its not be sufficient. Using tapes would be more cost-
servers every day and keep the backup data offsite. effective and would overcome the cost issue.
Evaluate the use of an external hard disc drive for Note how the answer makes reference to the
this task. scenario and links to the features of an external HDD.
The first thing you should do is identify the important
aspects of the scenario that will give you clues as to
whether the external HDD is suitable or not: TASK
A school needs to back up data from its servers every Analyse and discuss the use of the following devices for
day and keep the backup data off site. Evaluate the each scenario given. Remember that you only need to
use of an externalhard drive forthis task. give positive reasons.
-——==22*!
I
Chapter 2: Hardware and software
System software
Device Scenario Programs that are designed to maintain or operate the
Plotter An architect is preparing drawings for a new house computer system are known as system software. The
that is to be built. Different colours will be used to software that operates the computer hardware is known
identify electricity, water and gas services. as the operating system. Programs that are used to
Digital An employee travels regularly as part of maintain a computer system (e.g. anti-malware software)
camera her job. She is required to keep a record of are known as utility software.
expenses and to email copies of all receipts to
the finance department. Operating systems
Pen
drive
A church records the preacher’s talk each week.
The computer that is used is not connected to the
internet, butthetalk needs to be uploaded to a
Q Remember
An operating system manages the hardware within a
website after the church service. computer system. When a computer is turned on and
after the Basic Input/Output System (BIOS) has loaded,
Turn your answers into evaluations by also looking at the operating system is the first piece of software that will
reasons why each device would not be suitable for each toad. It sits between hardware and applications software
task and give a conclusion. and manages any communication between the two.
QUESTIONS
Application
1 Define the term hardware.
2 Describe the role of the central processing unit (CPU).
3 Describe the role of a graphics card.
4 Contrast random access memory (RAM) and a
storage device.
5 Compare and contrast a digital camera to a scanner.
6 Evaluate the suitability of an optical mark reader
(OMR) and an optical character reader (OCR) for Hardware
marking exam papers.
o
• sending error messages or status messages to
applications or users
TIP • dealing with user logons and security.
Software is also known as programs, such as word
processing, spreadsheet, anti-malware or operating
TASK
system. Each program consists of programming code
which gives instructions to the computer in order to Microsoft Windows is an example of an operating system.
carry out a task. The code that is passed to the hardware Find at least two other operating systems used by
is in binary format which consists of instructions in the desktop computers and at least three operating systems
form of lots of ones and zeros (e.g. 101011101110). used by mobile phones or tablets.
Cambridge International AS and A level IT
Application Compiler
Operating system
Executable file (object file)
Execution
by CPU
Interpreters
Figure 2.14 - Device driver.
Interpreters also translate a program written in a high-
level programming language into machine code, but
Utilities use a different method, instead of translating the whole
Utilities are part of system software. They are designed to source code at once, it is translated one line at a time.
perform functions which maintain the computer system. This can be less efficient than a compiler because
Utilities are discussed later in this chapter. it takes time to do the translating as the program is
being executed and also because statements within
Compilers programming loops (e.g. FOR, REPEAT, WHILE) have to be
A compilertranslates a program written in a high-level analysed each time round.
programming language into machine code which a
Interpreters are often used to translate macros or
computer can understand. The file containing the
application-based script languages (e.g. Visual Basic
machine code is known as an executable file because it
for Applications), which can be particularly useful
can be executed by the processor. It can also be referred
when a document needs to be opened on a variety of
to as the object file. The original high-level programming
operating systems. Interpreters are also used when
language file is known as the source file.
testing programs so that parts of the program can
When a program is compiled, the whole source code is be executed without having to compile the whole
translated into the executable file at once and can then program.
Chapter 2: Hardware and software
o DISCUSSION POINT
Java uses both a compiler and an interpreter. The original
Not all modules are always needed and a linker is able to
select which modules will form part of the executable file.
Video editing software same time. During an audio conference it can be difficult to
know whose turn it is to speak. Video conferencing expands
Q Remember
When videos are recorded, they are known as 'raw1 video
upon audio conferencing by including real-time video of the
people involved in the conference.
files (footage). There are many enhancements that can be
Email clients provide users with a larger range of
made to a raw video file and this is where video editing
software comes in useful. features than webmail and enable emails to be read and
composed while offline. This can be useful when no fixed
internet connection is available and 3G/4G coverage is
Features of video editing software include:
poor or non-existent.
• importing or capturing raw video Features of email clients include:
• clipping the beginning and end of a video
• clipping sections within a video • address book of contacts
• adding titles to the beginning or credits at the end • ability to send and receive emails
• overlaying videos with text or images • signatures
• speeding up or slowing down footage • prioritising of emails
• rotating footage • delayingdelivery of emails
• using more than one video track • delivery and read receipts
• transitioning between clips (e.g. fade) • rules that can be applied to email messages (e.g. moving
• add backing music, narration or other sound messages that contain a specific subject to a specific
folder)
• using picture-in-picture to show two video clips at once.
• using more than one email account at once
Video editing software does have some downsides and • adding attachments to messages
these include:
EH • digital signatures and encrypted messages
• usingupalotofprocessingtime • integration with a calendar
• requiring a large amount of RAM • inviting contacts to a meeting in the calendar and
• importing raw video files can take a long time receiving responses.
• encoding the final video takes a very longtime.
You will learn more about video editing in Chapter 10. TASK
Ifyou are unfamiliar with any of the features above, then
Communications software find out more about them. There are several freeware
email clients that you could download and use.
Q Remember
Communications software can covera range of tasks
Web authoring software
including instant messaging, audio conferencing, video
conferencing and email.
Q Remember
due to the need for more processing power or
Control software is used for controlling devices that are
not part of the computer system. Measuring software is
used to measure values in the real world.
accurate input devices such as a mouse and
keyboard.
Apps are also available over the internet and usually exist
within web pages. For example, webmail is an app that
m
allows a user to manage their emails. Other examples
include online games, online office software (e.g. Office
An automated house would require control software 365), content management systems, online banking and
to turn lights on and off, open a garage door, turn online shopping.
on the heating, open blinds and sound a burglar
alarm. The measuring aspect of the software would Applets
measure the level of light and time of day and turn An applet is a small program that is designed to carry out a
on the lights when appropriate. It would also detect specific task. An applet cannot run on its own but must be
whether security sensors were triggered before executed from within another piece of software. Applets
sounding the burglar alarm. Heating would only be are often known as add-ins, add-ons or extensions. They
turned on based on the measurement of the current can carry out additional tasks that the original software is
temperature. not capable of doing or they can simplify tasks within the
original software.
Control and measuring software is used in a wide variety
of situations including automated features of cars (e.g. TASK
automatic windscreen wipers), science experiments, Explore some of the extensions available to Google
weatherstations, pollution management and traffic lights. Chrome and add-ins available to Microsoft Excel.
Measuring software will measure values from sensors
including:
Evaluate application software for a given
• pressure (amount of pressure applied) task
• moisture Based on your understanding of a variety of software
• temperature applications, you will now need to evaluate the
Cambridge International AS and A level IT
A separate worksheet can be used to store a table However, spreadsheets can also be used to
of tariffs and another worksheet for the customer create graphs of the stock and the graphs can
interface. be customised in more detail when using a
spreadsheet such as deciding on axis
Chapter 2: Hardware and software
Graphical user interface GUIs are intuitive to use which means they are easy to
learn because commands are represented by pictures and
0 menus provide options that can be selected. However,
Edit View Window Help
they can be restrictive for some technical users who need
®
Open From Acrobat.com... ' 1©®
29
to carry out unusual tasks.
£5 Create PDF Online...
M Save Ctrl+S
Save As... Shift+Ctrl+S Dialogue interface
A dialogue interface refers to using the spoken word to
Figure 2.21 - Graphical user interface.
communicate with a computer system. A user can give
commands using their voice and the computer system
The most common type of interface that we use is can respond by carrying out an action or with further
a graphical user interface (GUI). GUIs are found on information using a synthesised voice.
desktop computers, tablet computers, mobile phones,
televisions, set-top boxes, photocopiers and some in-car
entertainment systems.
GUIs can include some or all of the elements shown in Give me directions
Table 2.04. to the Taj Mahal
entertainment systems and curtains. With entertainment One of the biggest problems with gesture interfaces is
systems such as televisions, the user does not have to accuracy. In order for a gesture interface to be effective,
find a remote control to use and anybody in the room can it needs to accurately interpret the movements made
give the command to increase the volume or change the by the human user. Tracking individual fingers, arms,
channel. eyeballs and legs requires highly accurate cameras or
sensors. This is why many virtual reality applications still
The main problem with this type of interface Is the
use sensors attached to various parts of the body in order
computer system’s ability to recognise the spoken word.
to improve accuracy. It can also be very difficult to control
Many things can make it difficult for the computer to
a pointer when a finger is in mid-air rather than when
understand, including accents, different voices, stammers
firmly fixed to a touch screen or holding a mouse.
and background noise (e.g. a car’s engine). Dialogue
interfaces also require the user to know what commands
are understood by the computer system as otherwise Colour, layout, font size, quantity of
the system will not know how to respond. Some dialogue information and controls in user interface
interfaces will give prompts telling the user from which design
options they can choose. Systems are not intelligent When designing a user interface, it is very important
enough to simply understand requests in any format that to ensure that it is accessible and efficient for the user.
the user chooses. Therefore the colour, layout, font size, quantity of
information and controls need to be considered when
Gesture-based interface designing the interface.
Gesture-based interfaces will recognise human motion.
Colour
This could include tracking eyes and lips, identifying hand
signals or monitoring whole body movement. Text must be legible. This means using a light font on a
should all be next to each other and inputs about contact Controls
details should be together. There should be sufficient Controls are used on forms. Table 2.05 shows some of the
space separating objects on the screen so that the user controls that are available to a user.
can identify those objects clearly, but at the same time
it’s important to try to fit all related objects on the screen
Mental models
together.
A mental model is a person’s understanding of how
Prompts for text boxes or other inputs should always be something works. That understanding may be different for
just above or to the left of those inputs when working different people depending on the different experiences
with languages that read from left to right. Similarly, text each person has had in life and the assumptions they
should be left aligned, numbers right aligned and decimals make about how something works.
aligned on the decimal point. Instructions should always
be at the beginning of a form or just before each input,
whereas confirmation and cancel buttons should be at the
end of a form. A person understands that a professional soccer
Essential information should always be displayed in player in a top league earns a lot of money. They
a prominent position. Additional information such as therefore may assume that all sportsmen in the top
detailed help can be available through a hyperlink or pop¬ leagues get paid a lot of money. But it may be that
up message, but should not use up valuable space on the cricket players and bowls players get paid a lot less.
main interface.
When it comes to designing an interface, the person is
Font size the user. The user has their own understanding of how a
The standard size of font for reading is 11 or 12 points computer system and its interface works and will make
which is legible for most users. This should be used their own assumptions based on their own experience.
wherever possible, with titles in slightly larger fonts. It The more experience a user has had with a computer,
is important that the font size is consistent throughout the more easily they will learn new interfaces and new
the interface so that it does not confuse users. A larger systems. But it is not just their computer experiences
font size should be used for young children. One of the that matter. Life experiences are also important.
biggest problems with interfaces is that they can vary
based on the size of screen and so what looks good
on a desktop monitor may not look good on a mobile
phone. It’s therefore important to test the interface on A mental model of how to access a paper document
a variety of screen sizes to see what happens to the may be something like:
legibility. Fonts that are too large take up too much 1 Find the appropriate filing cabinet.
space on screen meaning that not all information can
2 Find the appropriate folder from the folders stored
be seen at once, whereas fonts which are too small
in alphabetical order.
make reading difficult and so slow down productivity.
If all the required information cannot fit on one screen, 3 Look through the folder until the document is found.
then the information should be separated into more This concept has therefore been used for accessing
than one page.
documents on a computer system:
1 Find the appropriate storage area (e.g. My
Quantity of information
Documents, My Pictures, Shared Documents).
If too much information is provided to a user, then this
can cause information overload and may mean that much 2 Find the appropriate folder (usually stored in
of it is ignored. A user can typically remember seven alphabetical order but this can be changed).
items of information, so you should try to keep this as a 3 Look through the folder until the document (file)
maximum number of icons or inputs that are grouped is found (the order is dependent on the user’s
together. If necessary, more than one page/screen of preference, which is how a paper folder would work,
information should be used with forward and backward too).
buttons.
Chapter 2: Hardware and software
1
are text and cannot be edited by the user.
label 1
Iabel2
Iabel3
Text boxes Text boxes are an area where the user can enter text such as nisiix]
their surname or credit card number. Errors can easily be made Texl
by the user when entering data into a text box, such as spelling
things incorrectly.
Tick boxes Tick boxes (also known as check boxes) allow the user to select
from a set of options. The user can choose as many options that a Cheeked
apply. For example, when printing, a user can choose to collate Q Tristate / Indeterminate
documents and to print on both sides. f~l Unchecked
Option buttons Option buttons (also known as radio buttons) differ from tick
boxes in that only one option in a group can be selected at Yes
once.
O No
Figure 2.26 - Option button.
Drop-down Drop-down boxes aHow a user to select from a list that appears
boxes when the drop-down box appears on screen. Only one option can
| List item 3
List item 1
!H
m
be chosen. The user can usually start typing the option so that it is List item 2
List item 3
found more quickly. Drop-down boxes are more appropriate than List item 4 5J
option buttons when there are a large number of options to choose
from, as the drop-down box doesn’t take up as much space on the Figure 2.27 - Drop-down box.
screen.
Address 3 London
2.03 Utility software which folders and files will be backed up and can usually
decide where the backup will be stored.
G KEY TERMS
used but haven’t been deleted when a program has been customised to the needs of the client and will meet the
uninstalled or a user profile removed. requirements of the client.
When software already exists and is purchased online or
from a shop, it is known as off-the-shelf software. The
software will have been written for a general purpose
12 List two utilities.
that is likely to be useful to a large market. Anybody can
13 Describe the role of anti-virus software. purchase the software for a specified price.
Review questions
Geraldine has purchased a new computer. It includes a motherboard, CPU and RAM.
1 a Describe the purpose of a motherboard. [1]
1 b Some of the data needs to be available when the computer is turned off. Identify a
suitable device that will fulfil this function. [1]
1 c Explain why Geraldine will need a graphics card. [2]
Geraldine has been advised that she should keep a backup of the data stored on her computer.
2 Givereasonsfortheuseofcloudstorageforthispurpose. [4]
Chapter 2: Hardware and software
A local council with over 500 employees and several servers backs up its data using magnetic
tape. :
3 Explain why magnetic tape is used for this backup. [6]
The council needs some new software for waste management that will link in with their website
where residents can log problems such as missed collections.
5 Evaluate the use of a custom-written software solution for this purpose. [6]
The council uses video editing software to prepare public information videos.
6 a Identify two features of video editing software. [2]
6 b Give two examples of how the council could use those two features. [2]
Chapter 3
w
Chapter 3: Monitoring and control
© TIP
We can represent this as a flowchart:
Q Remember
Control technologies use sensors to automatically control
Microprocessor compares
value to a pre-set range
This is an example of a control system at work. It is a control Motion sensors are not error proof and can sometimes
system as an action is triggered to control an element of the cause a false alarm to sound.
system as a result of the monitoring that is taking place. A
m
monitoring system outputs results in a different way. Rather
than an action being triggered, the results of the readings
taken from the monitoring can be output in the form of
graphs or charts. This allows the readings to be compared
and any patterns ortrends to be identified. This information
can then be used to inform any future decision making.
Monitoring systems can be used in scientific experiments.
The experiments are often left to run for periods of time,
with a monitoring system taking readings at regular
intervals. The readings are then output and can be
analysed. This kind of technology removes then need for a
human to regularly take the readings. This means that the
readings can be taken over long periods of time and can
Figure 3.01 - Passive infrared sensor in a security system.
often be more accurate if taken by a system.
There are a range of different sensors that we need to be
able to define. We also need to describe how they are TASK
used in monitoring and control technologies and evaluate Find out how passive and active motion sensors can be
using these technologies in our everyday lives. combined to create a security system that is less prone
to error.
Motion sensors
A motion sensor detects movement. It can do this either
passively or actively. A passive motion sensor reads Motion sensors can be used in lots of other monitoring
the energy in its surrounding environment and detects and control systems. These include:
changes caused by movement. An active motion sensor • CCTV systems, to manoeuvre the camera to the direction
emits energy into the surrounding environment to of motion that is detected
detect any movement. An example of a passive motion • opening and closing automatic doors
sensor is a passive infrared sensor. This is a sensor that
• automaticaltyturninglightsonoroffin a room when a
detects the presence of infrared energy if it appears in its
person enters or leaves
surrounding environment. An example of an active motion
• automatically turning water taps on or off
sensor is a microwave sensor. This is a sensor that emits
microwaves and detects the changes in the reflection it • automated barriers in a car park.
receives back when bouncing off nearby objects.
Passive infrared sensors are commonly used in security
systems. These sensors are normally wall mounted in the
corner of a room. As an intruder walks in front of a sensor,
the sensor detects the infrared energy emitted by the
intruder. The detection of infrared energy by the sensor
can then trigger an alarm to sound.
Active motion sensors can also be used in security
m m
systems. A microwave sensor continuously emits
microwaves into a room. As an intruder walks through
a
the microwaves, they will be reflected back much more ' V
quickly to the sensor and it will detect the change. This
change in reflection of the microwaves can then cause an
alarm to sound. Figure 3.02 - CCTV security cameras.
.
Chapter 3: Monitoring and control
Temperature sensors
Temperature sensors monitor and measure the
temperature of an environment. They do this by
measuring how much heat is present. Temperature
Figure 3.05 - A submarine cockpit. sensors are used in a great number of control
systems, many of them in our home appliances. These
include:
Moisture and humidity sensors • Washing machine and dishwasher. A temperature
Humidity sensors monitor and measure the humidity sensor is used in a washing machine and a dishwasher
that is in the air. To monitor the humidity they measure to measure the temperature of the water. A
both the moisture and temperature in the air. The microprocessor in the washing machine or dishwasher
percentage of moisture present in the air at a certain will receive the data sent by the temperature sensor and
temperature is expressed as the level of humidity. can trigger an action to heat up or cool down the water
Humidity sensors normally use capacitive measurement. if necessary.
This type of measurement uses two electrical conductors
• Dryer. A temperature sensor is used in a dryer to
that have a non-conductive film separating them.
measure the temperature of the hot air flowing into the
Moisture collects on the film and changes the level
dryer. A microprocessor in the dryer will receive the data
of voltage between the electrical conductors. The
sent by the temperature sensor and can trigger an action
measurement of the change in voltage is converted into a
to heat up or cool down the air if necessary.
measurement of humidity.
• Refrigerator and freezer. A temperature sensor is used
Humidity sensors can be used both in the home and in a refrigerator or freezer to measure the ambient
the workplace to monitor and control humidity levels, temperature inside. A microprocessor in the refrigerator
including: or freezer will receive the data sent by the temperature
sensor and can trigger an action to heat up or cool down
• Wine cellars. The humidity level in the atmosphere of
a wine cellar is very important. Too much or too little
the air if necessary.
humidity can cause the wine to spoil. The humidity level
needs to be kept at a constant and correct level in order
TASK
to keep the wine at its best.
Can you think of any other appliances in your home that
• Meteorological stations. They are used to help monitor
may use a temperature sensor as part of a monitoring
and predict weather conditions by measuring humidity
and control system?
levels.
• Controlling allergies. An atmosphere that is high in
humidity can encourage the growth of bacteria and
mould. This can trigger allergies. Humidity sensors can Light sensors
be used to monitor and control the level of humidity in Light sensors monitor and measure light. There are
a room. different types of light sensor and they measure light in
• Manufacturing. In the manufacturing of many products different ways. The most common type of light sensor is a
the level of moisture in the atmosphere is very photoresistor. This type of light sensor will change
important. If humidity is too high or too low it could its resistance when light shines on and is normally used
adversely affect the product. to measure the intensity of light. This is important in
Chapter 3: Monitoring and control
devices such as digital cameras or street lights. The can make a system more reliable than one operated by
camera can adjust the level of flash needed depending humans.
on the level of light currently detected by the light sensor. By using a sensor or a number of sensors in a monitoring
A street light can detect when it gets dark enough to or control system, multiple readings can be taken in
need to switch the light on. quick succession. It would require people to perform
the same function, and so these people can be made
available to perform other tasks. The computer system
will make decisions based on the data it is given. It will
act logically on these decisions in the way it has been
programmed. This can be beneficial as the decisions
made and actions taken will be consistent. If a human
performed the same decision-making process, external
factors may affect the decision they make, for example
how tired they are. This could cause inconsistency in
the decision-making process and actions taken. This can
sometimes be a disadvantage and a computer system
/ may not be able to react to an unexpected event that
f a human would be able to assess and make a decision
about.
A monitoring system uses sensors to take readings and sensors and light sensors. There are a number of other
mostly outputs them in graphs and charts, or a simple sensors that you may have researched including sound
printout. A control system uses sensors to take readings sensors and gas sensors.
and an action can be triggered if a reading is, for example, The use of monitoring and control systems can be very
outside an acceptable range. beneficial. They can keep us safe from the need to
There are a wide range of sensors used in monitoring and monitor dangerous environments and they can carry out
control systems. These include motion sensors, pressure monitoring on a more continuous basis, as well as having a
sensors, moisture and humidity sensors, temperature higher degree of accuracy.
Review questions
1 Define the term sensor. [2]
2 Describe two types of sensor that can be used in a security system. [4]
3 Explain two benefits of using sensors to monitor the environment in a nuclear
plant. [4]
4 Evaluate the use of monitoring and control systems in household
appliances. [6]
5 Explain how a monitoring and control system could be used to create an environmentally
friendly office building. [4]
D
*
%
its
Chapter 4
1
E-safety and health and safety
explain why e-safety is necessary and why data should be kept confidential
describe how personal data can be gathered by unauthorised persons and how we can protect against this
describe a number of malware issues
describe potential health and safety issues relating to using computers
\ c,
#
'4# 4
i
Cambridge International AS and A level IT
face criminal proceedings. Even if the abuse isfrom an record of it and will still own the data or image you have
anonymous source, it is easy to trace from where the posted.
messages or images have been sent.
• Make sure that the passwords you have set on your Revealing personal data can lead to identity theft or
social networking accounts are strong. This means they fraud. A person stealing your identity is able to steal your
should be unusual and contain a mixture of numbers, money, borrow money in your name, and even commit
punctuation and letters (both lowercase and capitals) crimes usingyour identity. This may result in you being left
if possible. If someone else posts something abusive without any money or savings but, even worse, may result
usingyour account, it is difficult to prove that it was not in false imprisonment for crimes you did not commit. It is
you who did it. For this reason, make sure you sign out of therefore extremely important to keep any personal data
your account when you are not using it. This will prevent safe to avoid such consequences.
a person picking up your phone or using your personal As our personal data is very valuable, some individuals will
computer (PC) and gaining access to your account. go to great measures to try and obtain it. There are four
• Think twice before you post anything online. Once you main methods that unauthorised persons will exploit to
have posted it you cannot take it back again. Even if collect your personal data. These are phishing, pharming,
you delete it, the social networking site will still have smishing and vishing.
PayPal
Problem with your account, rectify now to prevent deactivation!
Dear PayPal User,
Your PayPal account has generated some critical errors on our system. If this problem is
not corrected, we will be forced to shut down your account. You are required to correct this
problem immediately to prevent your account from being deactivated.
During our verification procedures we encountered a technical problem caused by the fact
that we could not verify the information that you provided during registration. Most of your
data in our database were encrypted to an unreadable format and could not be recovered
due to system errors. Because of this, your account will not be able to function properly and
will lead to account de-activation. We urgently ask you to re-submit your information so that
we could fully verify your identify, otherwise your PayPal account will be shut down until you
pass verification process.
Verification of your Identity will further protect your account against possible breach of
security. We urgently ask you to follow the link above to correct this problem as soon as
you have read this message. Your PayPal account security is our concern. We are very
sorry for the inconveniences this might have caused you.
Phishing The user will continue using the website as they normally
would, unaware of the redirection, and enter their
Q Remember
Phishing is when an unauthorised person attempts to
personal details that will then be stolen.
A particularly big case of pharming occurred in 2004, when
gather personal data, such as passwords and credit card
a German teenager hijacked eBay’s domain and redirected
details, by disguising themselves as a trustworthy person
or organisation. thousands of eBay users to a fraudulent site.
There are measures that can be taken to protect against
Phishing is normally carried out via electronic pharming:
communication, such as email. The email will look • Users should check if the website looks the same as
legitimate and will normally encourage a person to click when they last visited it.
on a link in the email. When the link is clicked it will take
• Users should look for the padlock security symbol
the user to a website that will ask them for their personal used to signify the HTTPS, showing that the website
details. This will be a fake website and the personal is secure, before enteringany personal and financial
details will then be stolen and used in criminal activity. details.
Phishing emails will usually contain text that will express • Usersshould run regularscansoftheircomputerwith
the need for urgent attention to a matter, for example anti-virus software that is designed to detect pharming
asking a user to cancel a subscription to a service or they programs.
will be charged, or to verify their identity to clear up a
possible security attack on their account. Phishing can
Smishing
also be an email simply asking for banking details.
Phishing gets its name from the reference to fishing for a
person’s data using bait (the legitimate looking email). ‘Ph’ Q Remember
Smishing is short for SMS phishing. It is similar to
replaced the ‘f in reference to a name given to early hackers phishing, but it is carried out using SMS text messaging
known as breaks. Phishing has been around since 1995, but rather than email.
it didn’t become an issue until about ten years later.
There are measures that can be taken to protect against An SMS text message is sent to a user that will ask them to
phishing: telephone a number or click on a link. When that number
• Users should make sure that they are cautious when is telephoned, the person receiving the call will attempt
clicking any links in an email. to get personal details from the caller. The caller could
• Usersshould question whether they know the sender of also be charged a great deal of money for the call. When
the email and only open links from known senders. a link is clicked malware is downloaded onto the user’s
• Users should check the URL that they are being linked phone. The malware can be used to collect the user’s data
to, to see if it is legitimate. This can be done by hovering to commit identity fraud and theft. It can also make the
over the link and lookingto see if the address is the real device part of a bot network. At a later stage the device
address of the site, for example www.paypal.com would could then be used to launch a denial of service attack.
be legitimate but www.paipal.com would be identified The link could also take the user to a legitimate looking
as fake because of the spelling mistake. website, as it does in phishing, and cause the user to give
away their personal details.
• Another thing that should raise suspicion is any spelling
or grammatical errors in the email content. Smishing will often entice a user into telephoning a number
or clicking the link by advising them of a profitable gain
Pharming they will receive if they do so, for example a voucher or a
Q Remember
gift card that will give them money off a product or service.
Most major web browsers have built in phishing protection will then pick up the telephone to call their bank, but the
that can help to alert a user to a possible phishing issue. line is actually still being held by the scammer. The victim
Mobile phones are not equipped in the same way. thinks they have called their bank, but it is still the scammer,
and the victim gives them their personal details, thinking
There are measures that can be taken to protect against
they are giving them to their bank.
smishing:
Unfortunately, it is often the elderly and the vulnerable
• Users should be very cautious in telephoning any that are targeted for vishing.
numbers they are sent in an SMS message.
• Users should be very cautious when clicking on any links There are measures that can be taken to protect against
in messages. vishing:
• Users should not install any applications from senders • People should exercise caution when any institution
they do not know. contacts them, especially when they ask for personal
• If a user receives a suspicious message from someone details. If in doubt hang up and call them back on a
they do know, they should check with the person that number that is known.
they have actually sent that message. • People should never give out any personal details
• Users should be wary of numbers that do not look like regarding a security issue with their account. A bank
usual mobile numbers, such as '5000’. will prevent any kind of attack on an account without
• Users can add security software to their mobile to help needing assistance from the account holder.
detect any malware.
DISCUSSION POINT
Dear Walmart shopper, Many banks will not take responsibility, and are not held
Congratulations you have responsible by the authorities, for vishing scams. This
is because the victim gives their personal data for the
just won a $1000 Walmart account to be accessed, so the money is not directly stolen.
Gift Card. Click here to Do you think it is right that the banks are not responsible
claim your gift. for refunding the money?
Vishing
Malware can take many forms and we are going to look at
m Remember a number of them.
Vishing is short for voice phishing. It is the act of using
a telephone call to try and scam a user into giving their
personal data. The scammer will usually pretend that Trojan horse
they area legitimate business calling the person. A Trojan horse is a malicious computer program that
disguises itself as another application, such as a game or
The person who is vishing will either say they are alerting a utility program. When the application is run, the Trojan
the victim to an issue with their account, or advising the horse will act as a computer virus would, deleting and
victim of a profitable gain. They will often ask the victim corrupting files in the computer system.
subtle questions to get the personal data they want. The term Trojan horse comes from Greek mythology.
One tactic vishers will sometimes resort to, is that when A wooden horse was given as a peace offering to the
the victim become a little suspicious and wants to call their people of the city of Troy. The Trojan horse was in fact
bank to check if the call is legitimate, the scammer will not a container that held a number of Greek soldiers who,
hang up when the victim tries to call their bank. The victim when night fell, climbed out of the Trojan horse, opened
Cambridge International AS and A level IT
the city to the rest of the soldiers who were able to In certain circumstances, adware can be bundled in with
conquer the city of Troy. legitimate software downloads. This means that you may
end up with the software on your computer without actually
A malware Trojan horse works in a similar way. It looks
harmless, like an application that would be desirable, but asking to download it. This can happen when the software
is being downloaded, as you may be given the chance to
it hides a malicious program.
customise what is downloaded. For example, there may be
a hidden option to download a task or search bar that is
Worms added into your current internet browser. You can customise
A computer worm is a small computer program that uses the download and uncheck the box so that you do not
computer networks and finds security holes to replicate get the adware, but if you do not know to do this you may
itself. They can exploit a security hole in a piece of download it unknowingly. Once downloaded, the adware
software or operating system. While replicating they will can prove difficult to delete. It may not act maliciously, but
often clog up network bandwidth and can make things run will often serve as a method of advertising for the company,
slowly. ortry to get you to use their search function.
COMPUTER BLOCKED
This computer has been blocked to Americans by the US Government Firewall
——
HAS BEEN RECORDED has been located on your computer of these retail locations:
a ransom in order to regain access to their computer • A user should never open a program unless they know it
system. Some ransomware programs will completely is legitimate.
lock a user’s system and some will encrypt all of the • A user should have a firewall in place that is monitoring
files on their system in a way that renders them useless. their internet traffic.
Ransomware will normally try to enter a system in a similar • A user should regularly run an anti-virus check and
way to a Trojan horse. malware detection software on their computer
The message or ransom with which the user is presented system, to detect the presence of any malware. Any
will often imitate a law enforcement agency. It will falsely anti-virus or malware detection program should be
claim that the system has been used for illegal activity kept up to date in order to detect newly developed
and that a ransom must be paid to regain access to the malware.
system. • A user should not open any attachments to emails from
unknown users.
How can malware be avoided? • user should use open Wi-Fi points with extreme
A
caution as anybody could be connected to them.
Remember
Malware can be very difficult to remove from a computer
system. It can often take numerous scans from anti-virus 4.03 Health and safety
software, as well as the use of various malware removal
programs, depending on the type of malware infecting As well as the e-safety issues that can occur when using a
the system. computer system, there are also health and safety issues
to be aware of. A computer user should understand what
There are a number of measures that can be taken to the risks are, how they are caused and what they can do to
avoid malware: prevent them occurring.
Cambridge International AS and A level IT
i
What potential safety issues could arise? Electric shock can Caution should be taken
occur if a user touches when handling any electrical
Safety issue Prevention
wires. It can also wires. All wires should
Fire can occur when A computer should be used in occur if wires are repaired if they look worn and
computers overheat. a room that is fairly cool and worn or haven’t been should have regular electrical
This could also well ventilated. If a number of checked. checks.
happen because of an computers are in a room it is
overloaded plug socket. advisable that the room has air Electric shock can also Liquids should be kept away
conditioning to keep it cool. occur if liquids are spilt from electrical devices.
on an electrical device,
In case of a fire occuring, a especially a loose
C02 fire extinguisher should connection.
be in any room that has a
computer.
Table 4.02 - Potential safety risks associated with using IT.
Plug sockets should not
have too many devices
plugged into them, 4.04 Summary
especially devices that
require a lot of power. Personal data is very valuable and precious and for that
reason should be kept confidential and safe. It is important
There can be trailing Make sure wires are secured in
wires, especially when some way, such as by a cable that a person knows how to keep themselves safe when
plug sockets are not management system that will
online so that they are not exploited or have their personal
near to computer clip all cables together and data stolen.
systems. A person could make them less of a risk. There are a number of ways that personal data can be
trip over these wires. collected, including phishing, pharming, smishing and
Spilt drinks can cause a Eating and drinking at a vishing. There are also a number of malware issues a
computer to short and computer should be avoided person can encounter when online, including Trojan
when food is trapped in where possible. horses, worms, spyware, adware, rootkit, malicious bots
a keyboard it can cause and ransomware.
difficulties in using the A user should be very cautious when providing any personal
computer, or even start data online. They should only do this when they are certain
a fire. that the receiver is completely legitimate. A user should make
Cambridge International AS and A level IT
sure they are cautious about any attachments or applications As well as e-safety issues when using a computer, there
they open, and any links they click. They should not open any are also a number of health and safety issues. A user
of these if they are not from a known user. should understand how to prevent these from occurring.
Review questions
1 Explain the difference between phishing and pharming. [6]
2 Describe the term ransomware. [2]
3 Describe the term malicious bot. [3]
4 Discuss the need to keep personal data confidential. [6]
5 Describe two health issues relating to using a computer and suggest how each can be
prevented. [4]
6 Describe two safety issues relating to using a computer and suggest how each can be
prevented. [4]
D
ml
i
JCi »
Chapter 5
The digital divide
mil
By the end of this chapter you will understand:
* i \
Cambridge International AS and A level IT
5.01 What is the digital divide? regular access to modern technology, and those who
have the necessary skills to make good use of the
technology. At an international level, the digital divide
describes the difference between developed and
Demographic: a particular section ofa population developing countries.
Economic: relating to a country in terms of their production
and consumption of goods and services
Broadband: a method of faster data transmission that can
carry several channels of data at once 5.02 What can cause a digital
infrastructure: the physical structures that are needed for a
service or operation
divide?
Ecommerce: business that is conducted electronically There are many factors that can create a digital divide and
Bandwidth: the amount of data that can be transmitted at they can do this for a great number of reasons.
Onetime
Q Remember
Many people believe that the digital divide refers merely
compared to those who live in cities.
People who live in cities have much greater access to high¬
to internet access, but it can refer to access to several speed broadband. This mainly occurs for two reasons:
forms of modern technology, including telephones,
television, personal computers (PCs) and the internet. • The infrastructure needed is mostly in place and
just needs to be improved or expanded in order to
7. provide high-speed broadband services. Therefore,
iy id «
People who live in rural areas have less access to
high-speed broadband. This is mainly because the
5
1 "xedII
c
O
I
dem(KjfchicCbuntries
Connects codjmunlpatlons
>
referred describes
ready whether
infrastructure is not in place to provide the high-speed
access, therefore the cost of building the required
Figure 5.01- Terms connected to the digital divide. infrastructure would be very expensive. As the
concentration of people living in a rural area is much
less than in a city, the amount of potential customers is
All countries experience a digital divide at one level or far fewer. This means that it would take a lot longer, if
another. At a national level, the digital divide describes ever, to recuperate the costs of building the infrastructure.
the difference between those in the population who have For this reason, many broadband companies do not
Chapter 5: The digital divide
look to provide high-speed access to people in the of Africa, India and south Asia. These are areas that
countryside. consist of countries that are less industrially developed.
This means that the experience of using the internet, in This is possibly because the less developed countries are
terms of speed, differs greatly between a user in a city having to use their financial resources to provide more
and a user in a rural area. Because of this people living in important services and do not have the funds available
to concentrate on the development of their technology
rural areas may find that they are not able to use internet
services such as film and television streaming because services. The start-up costs for these countries to build
they cannot get an internet connection that will support it. the infrastructure would be very great. This could put
Even if they are able to get a connection that will support them at both a competitive and economic disadvantage.
streaming, they may be limited to standard, rather than They may not have the ability to trade using modern
high definition, quality, as this would be the only capability technologies and therefore cannot access the same
of the connection. customer and supplier base as businesses in developed
countries. It may also affect the level of education that
Another service that can be affected depending on a can be provided as there may be a wealth of information
person’s location is access to mobile telephone internet unavailable to them that is accessed using the internet.
services. Their location will determine whether their This can have an impact on both the education and the
connection is 3G or 4G, or if they can get any connection skill level of people in those countries and prevent them
at all. from competing on an international level.
2G technology allowed people to make telephone calls and
send text messages, but accessing the internet was very Socio-economic groups
slow and cumbersome. The invention of the 3G network The rich/poor digital divide can also occur in more
made it possible for users to access the internet with their developed countries. Richer people are able to afford
mobile telephone at a reasonable speed. The development access to high-speed internet connections and expensive
of 4G has made internet access using mobile devices much advances in technology. The poorer members of society
quicker. The ‘G’ refers to the generation of network presently may not be able to afford access to these services and
available. The availability of 4G and also 3G will depend on levels of technology. This can have an impact on their
whether a person lives in a city or a rural location. level of education and ecommerce, essentially creating a
greater divide. A great number of companies are moving
their business to the internet and new businesses are being
Remember
The availability and speed of the different networks again
developed that operate using only the internet. There is
depends on infrastructure. A frequency band is used to a wealth of information available to users of the internet
provide network coverage. The strength and speed of and avast social network exists. The inability to access the
coverage will often depend on how close together the internet creates a significant divide between rich and poor
network masts are, with those closer together providing people and between countries across the world.
better coverage at a greater speed.
rr K
W i
180%
100%
mw. >*
\
ft
160% !• .
140%
120% r
0%
No data
health assessments and diagnoses. Additionally, The digital divide causes many problems for the UK,
many hospitals and clinics provide information on both as a country and for its population:
websites about their quality of care and allow out¬
• Many organisations are moving their facilities online.
patients to book appointments online. For example, banks have closed branches, preferring
However, the digital divide exists in the UK and in to offer online and telephone banking instead.
several ways. For example: Those in the population who do not have access to
suitable technology will find themselves increasingly
• In 2015 the country’s Office for National Statistics
(ONS) reported that 11% (5.9 million) of the
isolated from these necessary day-to-day services.
country’s adult population had never used the • Many goods and services are cheaper online. It has
internet. Many of these adults were aged 75 and been estimated that those households that cannot
over. In the same year the Royal Geographical afford internet access also pay $560 a year more for
Society reported that 39% of people without everyday items than those who shop online.
internet access were aged 65 or over.
• For people with no, or limited, access to technology,
• The ONS found that only 68% of adults with it is often harder to find employment in the modern
physical impairments were recent internet users, world.
compared with 92% of those who were not
• Access to modern technology can help with a
disabled. Sometimes this was due to a lack of,
person’s education. Those people without access
suitable facilities being available, such as a braille
may feel they miss out on opportunities to learn or
keyboard for a visually impaired user.
practise skills.
• The UK suffers a divide caused by the cost of
services. Although mobile network coverage is
extensive, many mobile phone payment packages
are broken down into call usage and data usage.
Less wealthy people often cannot afford large data The digital divide in South Africa
costs, and so their internet access is restricted. South Africa is a good example of a country that is
Similarly, broadband access is priced according trying to decrease the digital divide. In 1995, a mere
to speed and usage. People with limited financial 0.7% 100 000 half space of the country’s population
resources can only afford slower broadband had internet access and modern technologies. South
speeds and restricted data use, which also limits Africa is a very complex society, with some areas and
access to the internet. The Royal Geographical socio-economic groups far worse off than others.
Society found that 49% of the population with In recent years the country has experienced great
little or no internet access belong to the lowest UK internalturmoil and social change, but is now growing
socio-economic groups. in stability.
• In 2013 a report by the British Computing Society Between 2000 and 2003, the government funded
found that less than 16% of people working as a drive to place computers in schools. However,
IT specialists were women. However, ICT usage despite large uptake, still only around 40% of
between men and women was found to be roughly schools have computers, with less than one-third of
equal in some areas, such as online shopping and schools using computers for teaching and learning.
banking. In 2010 it was estimated that 24% of the population
• The UK government has committed to bringing fast had internet access. By 2014, that percentage rose to
broadband access to 95% of the country by 2017. just under 49%, around 25 million people, as South
However, many users in rural areas will still not Africans have embraced the benefits of being online.
have broadband access by then. The digital divide has fallen dramatically, but mainly
because of growth in some areas of the country. The
• 70% of people living in provided accommodation
challenge for South Africa is to extend this usage into
have no internet access, and 38% of people not
those areas that have lagged behind in development.
online are also unemployed.
Cambridge International AS and A level IT
Singapore still does experience a digital divide. Access to technology, or often a lack of it, is one of the
The country benefits from having a government biggest contributors to the digital divide. Flaving a digital
that recognises the difficulties the digital divide device that is connected to the internet allows access to
brings and is working on initiatives to help reduce educational resources, ecommerce, online banking and
the divide. Subsidy programmes have allowed entertainment, amongst other things. Many people who
students to purchase computers fortheir homes do have access are being encouraged to allow their older
at a far cheaper price than normal. The subsidies technologies to be refurbished and given to those who
also extend to broadband connection. Flowever, currently have no access.
subsidised connections are limited to 1Mbps, For those who do not understand how to use the
far slower than that enjoyed by many other technologies available, there are courses being run in
households, creating a divide. many areas to help people learn the skills needed. There
Another factor, like many other developed are also many countries that are funding community
countries, is that Singapore has an aging teaching programs, especially for those in poorer areas.
population. As a result, government initiatives In less developed countries there is a drive to set up
have seen plans put in place to provide medical cybercafes to make technologies available to communities
care at home through the use of technology. and increase their chance of a better education and
Retirement villages are being built incorporating access to facilities such as ecommerce.
technology. Sensors can monitor a patient’s health
The digital divide will exist in many different ways for a
and doctors can take advantage of the high-speed
long time yet but each initiative that is put into place will
broadband to make video conference calls to
help to close that divide a piece at a time. There is hope
check in and look over the elderly, who find travel
that this will eliminate a culture of digital divide and create
to a clinic difficult.
a culture of digital inclusion.
Additionally, initiatives have seen many public
buildings, such as libraries and community centres,
offering free internet access to the elderly in the TASK
hope of encouraging them to get online. The
Plan a letter that could be sent to a government official
country sees the internet as integral to economic
about the digital divide in your country. Make at least
and social success and is striving to reduce the gap two suggestions about how the gap could be closed.
for all its population.
5.04 Summary
5.03 The future The digital divide is the technology divide between
The digital divide tends to increase when new countries, demographic groups and economic areas. It is a
technologies become available. Younger generations technical, social and economic issue about the availability
tend to embrace technology more quickly than older and use of modern technologies. It refers to more than
generations. As new technology is usually initially just the internet and can include technologies such as
expensive, it is taken up more quickly by those who have telephones, televisions, PCs and the internet.
Chapter 5: The digital divide
The digital divide can occur for many reasons, including A divide can occur between countries that are more
a person’s age, status and location. There are many developed and those that are less developed, between
things that can be affected by the digital divide, including people who live in cities and those that live in rural
a person’s access to ecommerce, their education, areas, between different socio-economic groups and
employment opportunities and entertainment amongst those that have higher and lower performing
experiences technologies.
Review questions
1 Describe the term ‘digital divide’. [3]
2 Discuss the impact of the digital divide on countries that are less developed. [8]
3 Describe two strategies that could be put in place to reduce the digital divide. [4]
IWIMMI
/
M
\rJ
. J L, L
[
Chapter 6: Using networks
Q Remember
The way a network is designed is called its architecture.
than individual licences. This
also means that software
updates would only need to
A network’s architecture can be described by its
geographical and physical nature, and by how data is be run on the server.
stored and accessed on it. Communications can be A high amount of
sent from one computer to network traffic may
Local area networks (LANs) and wide area another. cause a network to
networks (WANs) run slowly and cause
frustrating delays.
ERMS
Printers can be shared. This
Local area network (LAN): a network that covers a small means that a number of
geographical area users can share resources in
Wide area network (WAN): a network that covers a large a company or home, rather
geographical area than requiring their own.
An internet connection can
We can describe a network by its geographical and physical be shared, allowing each user
architecture. This creates two categories of network: on the network to access the
internet.
• local area network (LAN)
° wide area network (WAN). Table 6.01 - Advantages and disadvantages of a network.
Cambridge International AS and A level IT
n
Computer
X this way.
The use of a LAN and a WAN can be compared using
several different factors.
The terms LAN and WAN describe the geographical
architecture of a network and how it is physically
structured. They do not describe how data is stored and
accessed. The two architectures for storing and accessing
data on a network are:
• client-server
• peer-to-peer.
n
Client-server and peer-to-peer networks
Server
Server: a computer on a network which provides resources
Figure 6.01- A basic structure for a LAN. that can be used by client devices
Client: a computer that is connected to a server
Peer: a computer in a network that is not connected to a
server and does not control another computer
A LAN is a network that is restricted to a small
geographical area. LANs are usually found in homes,
schools, universities and small businesses.
A client-server network uses a dedicated computer to
A WAN is a network that covers a larger geographical area. store data, manage resources and control user access.
A WAN may be contained within a country or can spread This computer is known as a server. The server acts as
across several countries. Organisations such as banks, a central point on the network that other computers
police forces and hospitals use WANs to share data. The connect to. A computer that connects to the server to
internet is a global WAN. Several LANs can be connected access the data and resources it manages is known as a
togetherto form a WAN. A business that has several client.
Computer Computer
TJ
Server Server
s virtual.
o
Many organisations now use an intranet. For example,
schools use a virtual learning environment (VLE) to
Remember
provide teaching and learning resources to students. The
The internet is a global network made up of
VLE is an intranet.
interconnected networks and individual computers. This
global network allows users to access online facilities
Q Remember
Intranets are used to increase efficiency because
such as electronic Communication, information sharing,
data storage, banking, video and music streaming and
social networking.
all information is stored centrally and can be easily
accessed,
The beginnings of the internet were quite different from
how it is now. In the 1950s and 1960s, the United States
Additionally, unlike when browsing the internet, only
government formed several organisations whose purpose
information relevant to the organisation is available. An was to develop new technology. One organisation was the
intranet is for internal use only. This increases security and
Advanced Research Projects Agency (ARPA). As projects
confidentiality as only users within the organisation can
developed, employees at ARPA became frustrated at the
access information on the intranet.
lack of computing power available to them. At the time,
There may be times when an organisation will want to only a handful of powerful computers were available
allow users that are currently external to the organisation across the country. These were often at locations far away
Although many of the computers connected to the
internet can act as a server, most act as clients. The
majority of data is held on web servers that are accessed
by individual computers.
The widespread nature of the internet means that it has
r- no centralised control. No one company or organisation
runs or has authority over the internet, although various
independent organisations control aspects of it:
• The Internet Corporation for Assigned Names and
\Y Numbers (ICANN) regulates domain names and their
suffixes, such as .com, .co.uk, .in, .sa, ,ae and .cn.
• The Internet Engineering Task Force (IEFT) devises and
administers internet standards, such as protocols that
Figure 6.05 - The internet connects the world. govern communication.
• The World Wide Web Consortium (W3C) attempts to
enforce agreement from organisations to adopt new
from the researchers who needed them. The invention standards.
of packet switching allowed the creation of computer
• Telecommunications companies own the infrastructure
networks. Taking advantage of this communication that the internet uses for communication.
breakthrough, ARPA created ARPANET, a network of
computers that could share data and computing
power. Q Remember
The tack of authority means that the information the
The 1970s saw the introduction of the protocol, TCP/IP. internet carries is of mixed value. Information can be
This allowed separate networks to connect to each other, useful and correct, it can also be inaccurate, out of date
forming the basis for the internet. The term ‘internet’ or completely incorrect. Some information is deliberately
originates from ‘inter-network’, meaning a network that designed to mislead.
was formed from the joining of networks.
The 1990s saw a huge increase in the size of the internet The internet is constantly changing and evolving. For example:
and its purpose, as many commercial, educational and • Every day, newly bought devices connect to it.
home users took advantage of the facilities available • The internet is expandinggeographically as remote
online. Today, the number of users and devices on the regions are connected through the installation of cables
internet runs into billions. It has become like a backbone, orthrough satellite communication.
the purpose of which is to allow communication and • The data it holds constantly changes as organisations
sharing of data on a global scale. add, edit and delete data from their websites, and social
networking users add and remove data.
Characteristics of the internet • Newer technologies allow the range of facilities to
Any device connected to the internet forms part of the expand. For example, the introduction of broadband
internet. To connect to the internet we need to use connections has encouraged the growth of internet-
an internet service provider (ISP). ISPs use public based, on-demand television services.
telephone systems, underwater cables, microwave
transmissions via satellites and radio waves to provide The huge scale and size of the internet means that using
connections. it has many benefits and drawbacks for organisations,
businesses and individuals.
Data and information is held and distributed by content
T
providers. A content provider is an organisation, group or
company that offers content on web pages, for example DISCUSSION POINT
text, images, sound and video, or web-based services, What would your life be like if you did not havethe internet?
for example streaming media, gaming, shopping and What would be different? Would it be better or worse?
electronic communication.
Cambridge International AS and A level IT
Global audience. The internet is worldwide, therefore Unsavoury behaviour. One serious problem with the internet is
contributors have a global audience. that it allows people to interact anonymously with other people.
Users are unsure with whom they are really communicating.
This means that people can make up fake identities in order to
cyberbully, intimidate, steal and commit abuse.
Immediate transmission of information. Users can Hacking. Some users may use the internet to attempt to gain
send messages immediately across the world. access to other users' computers. This is often in an attempt
Postings on news sites and social media can be seen to steal personal data or to crash websites. Protection against
immediately by an audience. hacking can be expensive to an organisation. _
Immediate availability of services. Users can quickly Viruses. An organisation or individual will need to protect their
access services such as to bank online, book medical computer against viruses. A virus is malicious software installed
appointments, pay bills and book tickets for transport on a computer without consent or knowledge. Removal of a
and for leisure. virus can be a difficult job. __
International ecommerce. Users have access to online Identity theft through phishing and pharming. Phishing uses
shops 24 hours a day and products from all over fake emails pretending to be from an organisation. Phishing
the world. Companies can also market products to emails deceive users into giving their personal data by tricking
consumers nationally and internationally. them into following a link to a fake website. The website asks
them to enter personal details. Once gathered, this data is
used for criminal activities. Pharming works in a similar way.
When users attempt to visit a known website, they are instead
directed to a fake website that looks just like the real one.
The cost of identity theft to individuals and businesses can be
enormous.
Entertainment. Products such as software, music, Unsuitable material. The free nature of the internet means that
films and books can be purchased and immediately unsuitable content is present, such as pornography, graphic
downloaded. Users can play online games, or join in violence, promotion of terrorism, torture and physical and
multiplayer games over the internet. written abuse. Social networking allows anyone to publicly
abuse friends, colleagues, celebrity figures and people in the
news, often with little consequence to the offender.
Free education. Many free onlinetutorials and Spamming. The ease of communication means that anyone
educational resources are available to help people can generate and transmit unwanted emails to millions of
learn new skills or knowledge. users. It is estimated that 69% of emails sent in 2014 were
spam. _
Social networking. The internet allows families, Online addiction. Some people have difficulty separating
friends, organisations and businesses to regularly virtual environments from reality. Others find virtual worlds,
communicate, share and engage in social activities. such as those in massively multiplayer online role-playing
games (MMORPGs) more alluring and comforting than the
real world. They feel safer and happier in these environments
than they do in real life. This can lead to social isolation and
insecurity.
Up-to-date news. News stories on the internet can
be read as soon as they are published.
6.03 The World Wide Web Berners-Lee proposed a system for a more
efficient communication system forCERN that
o KEY TERMS
6.04 Communication using to each other privately as well as posting on each other’s
profile.
the internet
Voice over IP (VOIP) technologies allow users to have
The internet is for communication. It allows users to voice communications, just as if they were using a
communicate in several ways, including: telephone system. Instead of using an analogue telephone
• instant messaging (IM) transmission, the user’s voice is recorded by the computer
• voice over IP (VOIP) and transmitted digitally to the recipient. The VOIP system
can work internally across a network, or externally by
• news services.
making use of the internet to carry the data transmission.
Instant messaging (IM) is a form of communication
that allows real-time text transmission over a network, VOIP has advantages over traditional analogue
often the internet. Depending on the type of IM service, telephone systems. When the system is run by using
messages are either transmitted once a message is an organisation’s LAN, calls within the organisation will
composed and sent by the user, or transmitted character be free. Extra VOIP phones can be added to a network,
by character as the user types. Some services allow files to simply by connecting a new phone to a network point or
be transferred and conversations to be saved. by adding it to a wireless network. However, if a network
is experiencing heavy traffic, voices can become garbled,
IM is now a feature of many social networking sites, distorted or missing altogether.
allowing users to chat online instead of posting messages
on their profile page. Many organisations see IM as a An example of a VOIP service is Skype. Users can make
valuable tool for customer interaction, for example calls using the Skype application on the internet.
support helplines. This can be especially useful where News services are organisations that collect and
a support technician needs to give instructions to a broadcast news stories for subscribers. Users can sign up
customer. The customer can read (and reread) and follow for news alerts using a smartphone application. Some
the instructions in their own time. services allow news stories to be filtered out so that only
Users of IM often see it as an equivalent or alternative news that covers topics a user is interested in is sent to
to text messaging used on smartphones. They their smartphone. Others broadcast headline news to
make use of text speak (where common words subscribers.
and expressions are abbreviated), for example LOL An example of a news service is Google News. Users can
(laughing out loud), and emoticons to reduce typing subscribe and receive news stories on a daily basis, often
and speed up replies. in the categories of their choice.
An example of an IM service is the private messaging All of these services are available because of packet
system available on Facebook. Users can send messages switching technology.
::
:
£ gDQ
A
Figure 6.06 - Many social networking services now offer an Figure 6.07 - Users can subscribe to news services to
instant messaging feature. receive news stories in the category of their choice.
Chapter 6: Using networks
Q Remember
A mobile network is a wireless WAN that uses radio to
while on the move,
often through the use of
smartphones.
transmissions.
Mobile networks have grown hugely in popularity, with Table 6.08 - Advantages and disadvantages of mobile
many users now accessing the internet through 3G or networks.
Cambridge International AS and A level IT
N
sending posts frequently during the day, often via a mobile
network.
TASK
Find out what further developments are in progress for i*
mobile networks.
At the appointed time and date, users follow the link over analogue copper wire. This is usually with
and log on using the access code. They can now watch transmission speeds of up to 64 Kbps per channel. Two
and participate in the conference. Participants may channels could also be used in parallel to send data at
watch a demonstration of a product or read a document up to 128 Kbps. ISDN was popular in the 1990s and early
onscreen, but will not require a web camera themselves 2000s but has largely been replaced by much faster
to do this. Web conferences can also be just text based, ADSL and SDSL networks. However, ISDN is still used in
where participants will use a messaging facility to areas where ADSL and SDSL technology has yet to be
communicate. implemented.
There are a number of checks that need to be performed Asynchronous Digital Subscriber Line (ADSL) technology,
before a web conference goes ahead: also known as broadband, is now the most common type
of connection to the internet. It has typical transmission
• Similar checks to a video conference will need to be
performed for the internet connection, microphone and speeds of around 100 Mbs. ADSL is used in homes and
a web camera if used. businesses to deliver reliable, high-speed connections.
Asynchronous means that download and upload speeds
• In some web conferences, participants may want to
are different. This means that ADSL works by unevenly
share documents. Most web conferencing software will
splitting the balance between download and upload
allow participants to do this. This will either be through
documents being preloaded into an online meeting
speeds. Most homes and businesses will download more
data from the internet than they upload to it. As a result,
room, or by a linksentin a messaging facility duringthe
ADSL download speeds are usually far greater than upload
web conference. A test may need to be carried out on
whether the preloaded documents can be accessed, or speeds.
that the text facility can be used. Synchronous Digital Subscriber Line (SDSL) technology
uses the same data transmission technology as
Using networks in video and web ADSL. However, this time the download and upload
conferencing transmission rates are balanced and equal. SDSL is used
The wide-scale use of video conferencing and web by organisations that upload and download equivalent
conferencing would not be possible without the use of amounts of data.
networks. The use of packet switching enables video and Mobile devices such as smartphones make use of 3G/4G
sound transmissions to be broken down into packets, just technology to allow users to use video conferencing
like any other type of data, to be transmitted. The resulting when travelling, or when access to a LAN is not
packets can be easily and swiftly transmitted across possible.
networks and the internet
For a video conference to successfully take place, the
Video and web conferences held internally within video and audio signals must be transmitted over a
organisations will make use of that organisation’s LAN. network. Video signals require high volumes of data
The LAN may be wired or wireless. To connect externally, transmission. The higher the resolution of the video,
the conferences will also need to make use of a WAN or the more data that needs transmission, and the greater
the internet. the traffic that is placed on a network. High traffic
Video and web conferencing requires a reasonable data can lead to disruption or interruption of the video
transmission speed; The higher the required quality of conference.
video and sound, the higher the transmission speed that To overcome this problem, video conferencing uses
is required. As a result, for video or web conference over a software called codecs. Codec is an abbreviation of
WAN, one of four types of connection is usually used: the words 'coder’ and ‘decoder’. At the sender’s end,
• Integrated Services Digital Network (ISDN) the ‘coder’ element of the codec takes the video and
audio signals and compresses them to reduce their file
• Asynchronous Digital Subscriber Lines (ADSL)
size. Reducing the file size means less data needs to be
• Synchronous Digital Subscriber Lines (SDSL)
transmitted, reducing network traffic and the possibility
• 3G/4G mobile networks. of disruption to the conference. At the receiver’s end, the
Integrated Services Digital Network (ISDN) is a networking ‘decoder’ decompresses the video and audio signals so
technology that allows data to be transmitted digitally that they can be played.
!
Cambridge International AS and A level IT
The same codec must be used at both the source and conferencing does require high-speed data transmission.
the destination of the data transmission. Different codecs High levels of network traffic can more frequently interfere
compress and decompress in different ways, therefore with, degrade or interrupt video transmissions. This leads
are incompatible with each other. As a result, several users to return to more reliable voice-only methods.
codec standards exist. The H.264 codec is one of the most It could be argued that video conferencing is helping
common and is used not only for video conferencing, to widen the digital divide. Many older users are wary
but also with DVDs and YouTube videos. Other codecs for of technology. They are afraid of the complexity of
video conferencing include H.261 and H.263+. video conferencing, opting for more traditional voice
communication methods that are familiar and comfortable.
The impact of video conferencing
Video conferencing has not yet directly had an impact on
law. However, legislation has been implemented in several
countries that allows a witness to give testimony via video
Digital divide: the separation between those that have access conferencing. This process is reserved for witnesses who
to technologies and the internet and those that do not may be psychologically upset by having to attend court,
Teleworking: working from home using technologies to keep especially those that may have to face someone who has
in contact with an employer subjected them to physical assault or abuse.
In some countries, such as the United States, video
conferencing allows defendants to make initial court
© Remember
Improvements in internet and communication
technologies have led to affordable high-speed
appearances without having to leave jail. This saves travel
expense and increases safety to the public as suspects
remain in custody.
connections at home and at work. These high-speed
connections can usually handle video transmissions. The In the UK, several police forces have implemented video
introduction of4G mobile networks mean that mobile conferencing as a way of conducting interviews more
devices are also capable of high-speed connections. quickly. An interviewer may be based at one police
station, but can interview suspects and witnesses at other
stations, without having to travel to each site.
Additionally, many computing devices now feature inbuilt
video conferencing equipment. Smartphone, laptops Video conferencing has had an impact on education
and tablets generally have microphones, speakers and and the way that students learn. Ratherthan listening
cameras, along with the network connectivity needed to a teacher, or reading a book or web page, video
for video conferencing. Free software allows cheap video conferencing is used to engage students. Video
conferencing. conferencing allows students to participate in
conversations and share ideas with fellow students at
As a result, an increasing number of users have now taken
to using video conferencing as a method of communication
and are enjoying the benefits it brings. Those users who
live at a distance from friends and relatives have especially
taken to this technology as it allows them to see, as well
as hear, their loved ones. Users with hearing and speaking
impairments enjoy video conferencing as it enables them
to communicate using sign language.
A growing example of a video conferencing software
that people use is Apple’s FaceTime. Users that have an
iPhone can use the inbuilt FaceTime software application
to communicate with each other using video conferencing
However, the general public has yet to fully embrace
this technology. Many users feel self-conscious and
uncomfortable in front of a camera. Even though Figure 6.09 - Video conferencing is used in some courts to
connection speeds have improved greatly, video allow witnesses to testify without being in the courtroom.
Chapter 6: Using networks I
schools and universities in other parts of the world. This In some countries medical practices have introduced
can lead to unexplored perspectives about subjects being video conferencing to help doctors and nurses keep in
shared and argued in live debates, resulting in wider, more touch with patients who have physical impairments, and
Considered points of view, especially when the students for those in remote areas where travelling may be difficult
are from differing cultures. or dangerous. In such situations video conferencing can
Speaking to industry and subject experts often engages bring comfort to a patient, especially the elderly, who
and interests students in a topic. Video conferencing allows might not otherwise have much human contact.
experts to give talks and lectures without having to travel to Sometimes the best way to do business is in a face-to-face
a school. Sometimes a talk can be given to more than one meeting. Email and telephone provide useful media for
school at a time, allowing many students to benefit from the arranging and making business deals, but when it comes
experience. This is especially useful to schools in remote, to agreements of great value, people tend to prefer to do
isolated areas where travel would be difficult or expensive. business in person. Meeting someone in person helps to
Universities make heavy use of video conferencing. The promote goodwill, friendship and trust,
technology allows lecturers to teach courses at several However, face-to-face meetings are not always possible. For
universities, while being based atone. Sharing of such example, time constraints or cost of travel may make them
expertise is becoming more common, especially in impossible. Video conferencing has provided a possible
subjects where finding a lecturer for a course has been solution to these situations. It allows people to have face-
difficult. Additionally, video conferencing allows lecturers to-face meetings without having to leave the office. This
to hold a lecture for students while away on research or at saves travel expenses and it also allows for more efficient
conferences. use of an employee’s time, as hours are spent working and
Medicine and medical care are areas where video not travelling.
conferencing continues to be of growing usefulness. Video conferencing has also helped to facilitate the growth
Consultants and physicians in different hospitals are able in teleworking. Employee who work regularly from home
to discuss a patient’s case and help to offer a diagnosis. can sometimes feel cut off from their employer. Teleworkers
External hardware components such as ultrasound that use video conferencing tend to feel happier and
imaging devices and video endoscopes can be connected less isolated from theiremployerand co-workers.
and images from them shared in the video conference, Companies that have regional offices are finding that video
helping consultants at other locations to help assess a conferencing brings unexpected benefits. Many companies
patient’s condition. This has the dual benefit of reducing that regularly use video conferencing to communicate
travelling costs for consultants and increasing efficiency as with their regional offices find that employees in those
consultants can see more cases in any given time period. offices feel more involved with the organisation, increasing
employee satisfaction and productivity.
**
head office can deliver a training programme via a
situations where a live broadcast might not otherwise be A LAN is a network that is geographically small in area.
possible. They are usually found in homes, schools and small
Another aspect to consider is press video conferencing. businesses.
With businesses and organisations taking advantage of A WAN is a network that is geographically large in area.
the global audience the internet permits, it is becoming The largest and most common WAN is the internet. The
increasingly common to hold international press internet is the network infrastructure, whereas the World
conferences. These conferences are often held to launch Wide Web is the web pages of content we can view using
new products or to make statements about political the internet, an ISP and a web browser. The internet is
affairs. Press video conferencing allows journalists to used for communication in various different ways. These
participate without actually having to attend. include IM, VOIP, news services, video conferencing
and web conferencing. Video conferencing has had
an impact on many areas of society, such as personal
* DISCUSSION POINT
Can you think of any other ways that video conferencing
could be used in our lives?
communications, court cases, business, education,
medicine and media. These impacts have been both
positive and negative.
A client-server network has servers that run the network
centrally. Each computer that is part of the network is
called a client. A peer-to-peer network does not have
6.07 Summary servers. No single computer has control over another in
this network.
Stand-alone computers that are connected together
create what is called a network. There are different types A VPN is a method of allowing a remote computer to
of networks that can be categorised by their geographical connect securely to a private network using external
and physical structure ortheir method for data storage. resources.
Review questions
1 Describe the difference between a LAN and a WAN. [4]
2 Explain what is meant by an intranet and how it could be used in an organisation. [4]
3 Explain the advantages and disadvantages of a VPN. [4]
4 Describe the difference between the internet and the World Wide Web. [2]
5 Identify four pieces of hardware that could be used when video conferencing. [4]
6 Discuss the impact of video conferencing on education. [6]
gvssjk i
OV
P
sSr
95
Chapter 7
Expert systems
Learning objectives
By the end of this chapter, you will be able to:
describe the components of an expert system and how expert systems can be used
explain how expert systems produce possible solutions, including the process of forward and backward chaining
analyse the use of diff erent processing systems
explain how master and transaction files are used
©
O *
W
A
*
Cambridge International AS and A level IT
Expert systems use a knowledge base and a set of rules Once the knowledge base is built, it can be used by the
to provide a diagnosis or a recommended course of expert system to inform the questions it needs to ask and
action. They can be used to solve complex problems by assist in providing the results.
reasoning, using the knowledge base they are given. Part of the knowledge base is the rules base. The rules
Expert systems gather data by asking the user questions base is a set of rules that will be used to produce an
aboutthe problem. An initial set of questions can lead output or decision by the expert system. These rules are
to further questions depending on the user’s responses. used by the inference engine as a base for reasoning, to
The expert system reasons what questions it needs to obtain a solution to a problem ora decision. Each rule
ask, based on the knowledge it is given. It will use the will contain two parts, the IF and the THEN. A rule can
responses from the userto rule out various possibilities also have multiple IF parts that will be joined together by
that will allow it to eventually reach a decision or Boolean operators includingAND and OR.
diagnosis. Most expert systems will have a knowledge based editor
The concept of an expert system was first developed built into them. This allows the knowledge base to be
in the 1970s by Edward Feigenbaum, who founded checked for errors and edited ad updated when needed.
the knowledge-based system laboratory at Stanford Inference engine
University. Expert systems are thought to be
among the first truly successful forms of artificial
Remember
intelligence.
The inference engine is the part of the expert system that
We rely on expert systems to help us with knowledge makes judgements and reasoning usingthe knowledge
and understanding in a particular field. We use them in base and user responses. It is designed to produce
reasoning based on a set of rules.
the same way as we do certain experts in our lives. For
example, we will go to see a doctor if we have a health
problem or we will go to see a car mechanic if our car It will ask the user questions, and based on their answer,
it will follow a line of logic. This may then lead to further
will not start. We can use an expert system in a similar
way, it will ask us questions about our health problem or questions and eventually a final result.
car problem and provide us with a diagnosis or course The inference engine is mostly a problem-solving tool. It
of action. organises and controls steps to solve the problem. To do
Chapter 7: Expert systems
fiVffcl choices
o DISCUSSION POINT
Discuss the impact of people having the ability to self-
Data about each employee’s working hours can
be stored in batches until the employees need to
receive their pay. The data can then be processed
to calculate the pay due for each employee and
diagnose their medical issues using an expert system. a payslip can be output to show this. It is not
Chapter 7: Expert systems
necessary to have an employee’s pay calculated transaction is processed in turn, this avoids a seat
until they are due to be paid, so the processing on the aeroplane being double-booked. Once
to do this can be run when the factory isn’t in a seat has been allocated to a transaction, until
operation, for example late at night. This will free that transaction is completed that seat cannot
up the processing power of the system to perform be booked by anyone else. This is because their
othertasks during the day. transaction will not be processed until the previous
one is completed. The same would occur with a
concert ticket booking system.
Q Remember
The master file will store all of the more permanent
key field, as the data is processed by the system. In a batch
processingsystem, the transaction files are stored until a
suitable time is available to update the master files. The
data about the customer or the employee. Data stored
in master files is normally more permanent in nature. system will then run through each transaction file and match
it to the correct master file in order to update the master.
© Remember
Transaction files are useful as they can act as an audit
trail for a company to see what updates have been made
time system processes data immediately.
Master files store more permanent data about a subject,
for example an employee or a customer. Transaction files
to the master file at various times.
are used to update master files.
Chapter 7: Expert systems
Review questions
1 Describe the components of an expert system, [6]
2 Explain two uses of an expert system, [4]
3 Describe two advantages and one disadvantage of an expert system. [6]
4 Describe the difference between an online and a real-time processing system. [4]
5 Define the term 'master file'. [2]
+n
• /e 38,
32,7
9 f
a ±1-41 4S \
Chapter 8
102
Spreadsheets
Learning objectives
By the end of this chapter, you will be able to:
m create a spreadsheet
format a spreadsheet
create formulae and use functions within a spreadsheet
use validation rules within a spreadsheet
test validation rules
test a spreadsheet model and evaluate the effectiveness of test plans
verify and validate data entry
search for data within a spreadsheet
sort data in a spreadsheet
import and export data to and from a spreadsheet
analyse and select the most appropriate type of graph or chart
create a graph or chart in a spreadsheet
describe the characteristics of modelling soft ware
analyse the need for computer models
evaluate the eff ectiveness of spreadsheet models
describe the advantages and disadvantages of using a model to create and run simulations
evaluate the use of simulations
Chapter 8: Spreadsheets
BikeHireCosts : X V fx Mou
Q Remember
Spreadsheets are used to manipulate numbers,
A B c
perform calculations, present summary data and make 19 Cosrof bike hire
predictions.
20
21
Type
Mountain
\ Per Day
$ 10.00
103
EXAMPLE Now you can see the effect of having added the new
row.
This workbook contains four worksheets - one
for each country. Each worksheet shows the
A B C D
sales made in that country. The currently active
1
worksheet is for sales in Germany.
2
A B c D E
3
1 City Sales Model Fuel type Cost per litre 4
2 Berlin 3,272 Mondeo Diesel $ 1.25
3 Hamburg 1,208 Saab 9-3 Petrol $ 1.17 5
China Pakistan Dubai Germany
6
7
Figure 8.04 - Worksheets.
8
TASK
CD 8.02 Worksheets
Explore the way worksheets have been used in CD 8.02 Rows and columns can be resized. Rows can be made
Worksheets. taller or shorter and columns can be made wider or
narrower. Rows are resized to enable different sizes of
text to fit or to allow multiple lines of text within one
104 cell or row. Columns are resized to allow more data
to fit in the column or to save space by narrowing the
Manipulate rows and columns column.
It is possible to add rows and columns by inserting them.
Rows are inserted above existing rows and columns are
inserted to the left of existing columns. Rows and columns
can also be deleted. EXAMPLE
iL
Insert ?
3
O Shift cells right
5
4 O Shift cells down O
5 O Entire column 7
6 | OK || Cancel |
7
8
A B D EXAMPLE 105
1 In this example, the worksheet is protected to the
2 extent that no changes can be made to any data
and no data can be selected. No columns can be
3
added and no rows can be added. Cells and rows
4 cannot be formatted. This is useful if the whole
worksheet contains just output data ora data table.
5
6 Protect Sheet ?
£4
Figure 8.09 - Hidden column. Allow all users of this worksheet to:
52
c Select locked cells A
C Select unlocked cells
Format cells
I I Format columns
£1
Cl Format rows
TASK £4 C Insert columns
£2
I | Insert rows
CD 8.01 Rows and columns C Insert hyperlinks
Open CD 8.01 Rows and columns. C Delete columns
21 C Delete rows v
1 Insert a row above row 5.
2 Delete column C. 12 OK Cancel
3 Increase the height of row 1.
4 Decrease the width of column B.
5 Hide rows 2 and 3.
Figure 8.11 - Worksheet protection.
Cambridge International AS and A level IT
It is also possible to protect a worksheet but allow the user Cells can also be protected so that the formula cannot
to change certain cells within that worksheet This enables a be seen by a user. This may be used to prevent users from
developer to protect all the formatting, titles and structure seeing how certain confidential calculations are made but
but allow the user to enter and change input data. To do still letting them seethe results of the calculation based
this, cells that are allowed to be edited must be unlocked on changing input data.
prior to protecting the worksheet It is then necessary to
protect the sheet but allow unlocked cells to be selected.
0 Protect worksheet and contents of locked cells Figure 8.15 - Formula hidden.
Password to unprotect sheet:
Format a spreadsheet
Commission fx 10%
TASK A I B I C I D I E I F
_
decimal places. What happens?
10 Change cell C6 to be currency in Japanese yen with
two decimal places. What happens? <;j
D
3 87.23 The cells below have been emphasised as indicated.
4 18.5 A B C
5 23.56 1 colour of text
2
6 34.23472
3 shading of cell
Figure 8.20 - Decimal point alignment problem. 4
5 cell borders
Unlike a word processor, it is not possible to change
6
the alignment to be by the decimal point. Therefore,
the number of decimal places needs to be made 7 merging 2 cells together
equal. 8
3 87.230
Comments
4 18.500 Spreadsheets can contain a lot of data and some of it may
5 23.560 need additional information to explain what it is. However,
there may not be space for that information or it may be
6 34.235
too confusing to include the information with the data.
Therefore comments can be added to cells that can be S3
Figure 8.21- Decimal point alignment problem
seen when selected.
solved.
g I; 1 1
g
6 Change the titles in B? to B5 to he right aligned. 1 T
1 M ‘0
S £ Z>
2 Japan Paul Long: 2 4 1
After extra time
3 Macedonia 3 0 0
Cell emphasis
Cell emphasis is about changing a cell so that it stands out
from the others. There are lots of ways this can be done,
including changing data to be bold, italic, underlined,
in a different font and in a different font size.
4 United State:
5 Pakistan
6 Ukraine
oo « s 2 a 3 2 2
Quottlonnilro
i « « «
space at the edge and provide more space Figure 8.25 - A formula.
on the paper for printing. _
Header Information can be included at the top and Relative cell references
and footer bottom of each printed spreadsheet. This
Relative cell referencing is used when you want the
could include the title and author of the
content of a cell to change based on its relation to its
document, page number, file name and date.
row and column position. Often the formulae being used
Table 8.01 - Formatting pages. are performing the same calculation for a whole row or
column. When this happens, it is possible to replicate the
formula rather than typing it in each time.
TASK
O CD 8.09 Page formatting
Open CD8.09 Page formatting which currently requires
20 pages to print. This spreadsheet lists the number of hours it takes 1
1 Add a header of 'Chapter 8 figure list’. to produce a promotional leaflet, the cost to be
2 Remove gridlines from printing and also on the sheet charged for the leaflet and the quantity to be
view. produced. The total to be charged is then calculated
3 Remove row and column headings from printing. by multiplying the cost (C4) by the quantity (D4).
4 Add a footer of “Page # of n” where # is the current
page number and n is the total number of pages. A B c D E
3 Job Hours Cost Quantity Total
5 Change the settings described above so that the
document fits onto just three pages. 4 A5 Leaflet 1
1 $ 12.50 | 3 =C4*D4
5 A4 Leaflet 15 $ 18.75 1
6 A3 Leaflet 2.5 $ 25.00 2
The cell references used in the formula in the previous Absolute cell references
example were relative cell references. This is because they
point to another cell in a position relative to the current TASK
position. When referring to C4, it is pointing to a cell that
is two columns to the left of column E. When referring to
O CD 8.10 Absolute references
E4 it is pointing to a cell that is one column to the left of Open CD 8.10 Absolute references and use the worksheet
column E. Therefore, when the formula is replicated down Absolute 1, which is similar to the example used for
relative cell references. The cost is calculated by
to rows 5 and 6, the references continue to point to the
multiplying the hourly rate in Bl by the number of hours
same columns.
in B4.
1 Replicate (copy) the formula from C4 to C5 and C6.
2 What has gone wrong?
3 Why has it gone wrong?
DISCUSSION POINT
The same process happens when copying formulae
across a spreadsheet. The formula in B3 calculates
the number of kilometres travelled. When it has been Absolute referencing is used when you do not want a cell
replicated to columns C and D, instead of the row reference to change when other cells are filled in, or when
numbers changing, the column letters change. B2 is replicating formulae.
referring relatively to one row above and Bl is referring
relatively to two rows above. To stop a row from being changed, a $ symbol must be put
before the row number. So C5 would become C$5. This
makes the row an absolute reference but B is still relative.
A B C D
1 Start distance 38029 38098 39273
2 End distance 38087 39137 39410
TASK
3 Distance travelled =B2-B1 =C2-C1 =D2-D1
CD 8.10 Absolute references
Figure 8.28 - Replication across. Continuing with CD 8.10 Absolute references and the
worksheet Absolute 1:
4 Change the formula in C4 to be =B$1*B4.
5 Replicate (copy) the formula from C4 to C5 and C6.
Formulae can be used to retrieve a value from 6 Examine the formulae in C5 and C6.
another worksheet. To do this you should include 7 Which cell references have changed and which have
the name of the worksheet before the cell not?
reference.
1
When referring to a named cell, whenever it is replicated it Figure 8.30 - Total tax charged name range.
will still point to the same named cell.
EXAMPLE
DISCUSSION POINT
When a range of vertical cells has been named, it is
Se' CD 8.11 Tax rate
possible to make reference to any individual cell in that
CD 8.11 Tax rate contains a named cell of ‘Taxrate’ range by using the name of the range, as long as the
which is cell Bl. The formula in C4 is =B4*TaxRate reference is being made in the same row.
A B C A B C D
1 Tax rat© 0.15
1 Tax rate 0.15 2
3 Product Cost Tax Cost inc tax
2 4 6x4 frame 12 =B4*TaxRate =Cost+TaxCharged
5 5x7 frame 15 =B5*TaxRate =Cost+TaxCharged
3 Product Cost Tax 6 10 x 8 frame 18 =B6*TaxRate =Cost+TaxCharged
7 12x8 frame 21 =B7*TaxRate =Cost+TaxCharged
1
4 6 x 4 frame
5 5x7frame
12
15
=B4*TaxRate
=B5*TaxRate
Figure 8.31 - Same row named range.
F
Cambridge International AS and A level IT '
Functions
TASK A function is a ready-made formula representing
O CD 8.11Tax rate a complex calculation, for example =SUM(A5:B10)
Open CD 8.11Tax rate. or =AVERAGE(cost). It is a reserved word within the
1 Change the formula in C4 so that it uses a named spreadsheet software that processes a series of pre¬
range for the cost. defined formulae.
2 Replicate this formula to C5:C7.
3 Use a named range to calculate the total cost in B8.
4 Name the range for cost including tax.
Summary functions
5 Use a named range to calculate the total cost
including tax in D8. Table 8.02 shows some of the summary functions.
A B C D E F G H I
1 Student Mark 1 Mark 2 Mark 3 Mark 4 Total Average Minimum Maximum
2 Name 1 98 40 36 84 =(B2+C2+D2+E2) =F2/4
3 Name 2 31 67 61 77 =SUM(B3:E3) =AVERAGE(B3:E3) =MIN(B3;E3) =MAX(B3:E3)
4 Name 3 62 58 29 38 =SUM(B4:E4) =AVERAGE(B4:E4) =MIN(B4:E4) =MAX(B4:E4)
5 Name 4 64 83 85 27 =SUM(B5:E5) =AVERAGE(B5:E5) =MIN(B5:E5) =MAX(B5:E5)
6 Name 5 87 45 64 42 =SUM(B6:E6) =AVERAGE(B6:E6) =MIN(B6.E6) =MAX(B6:E6)
7 Name 6 93 58 43 73 =SUM(B7:E7) =AVERAGE(B7:E7) =MIN(B7:E7) =MAX(B7:E7)
8 Name 7 99 29 55 92 =SUM(B8:E8) =AVERAGE(B8:E8) =MIN(B8:E8) =MAX(B8:E8)
9 Name 8 57 58 44 93 =SUM(B9:E9) =AVERAGE(B9:E9) =MIN(B9:E9) =MAX(B9:E9)
10 Name 9 45 43 98 55 =SUM(B10:E10) =AVERAGE(B10:E10) =MIN(B10:E10) =MAX(B10:E10)
TASK EXAMPLE
A B c D E
1 Original number Integer Round Round up Round down
2 25817.32817 =INT(A2) =ROUND(A2,3) =ROUNDUP(A2,2) =ROUNDDOWN(A2,4)
Rounding functions 3 3852.876985 =INT(A3) =ROUND(A3,3) =ROUNDUP(A3,2) =ROUNDDOWN(A3,4)
=INT(A4) =ROUND(A4,3) =ROUNDUP(A4,2) =ROUNDDOWN(A4,4)
Numbers can be rounded to whole numbers or decimal 4
5
928.2341
0.03256 =INT(A5) =ROUND(A5,3) =ROUNDUP(A5,2) =ROUNDDOWN(A5,4)
places. Table 8.03 shows the functions that can be
used. Figure 8.33 - Rounding functions.
Function Purpose Example You can also see the results of the calculations
INTEGER Returns the =INT(A2) made by the functions:
whole number
A B c L
value of a 1 Original number Integer Round Round up Round down
decimal number 2 25817.32817 25817 25817.328 25817.33 25817.3281
(the value before 3 3852.876985 3852 3852.877 3852.88 3852.8769
4 928.2341 928 928.234 928.24 928.2341
the decimal 5 0.03256 0 0.033 0.04 0.0325
point).
ROUND Rounds a =ROUND(A2,3) Figure 8.34 - Rounding values.
numbertothe
nearest decimal
place specified.
This example TASK
rounds the value Create a new spreadsheet and experiment with the four
in B2 to three rounding functions using different values for decimal
decimal places. places.
ROUNDUP Rounds a =ROUNDUP(A2,2)
o
number up to
the nearest
decimal place DISCUSSION POINT
specified. This What happens if you change the number of decimal
example rounds places to a negative number? How does this relate to
up the value rounding to significant figures? Notice how -1 rounds
in B2 to two to tens, -2 rounds to hundreds and -3 rounds to
EXAMPLE TASK
O CD 8.16 Date and time
CD 8.15 Powers
Explore CD 8.16 Date and time.
CD 8.15 Powers raises the numbers in column A to
the power given in row 1. Text functions
A B c D Calculations can be performed on text to extract parts
1 Original number Power 2 Power 3 Power 4 of text, join text together, calculate the length of text or
2 4 =POWER(A2,2) =A2A3 =POWER(A2,4)
3 3 =POWER(A3,2) =A3A3 =POWER(A3,4)
change the case of text.
4 7 =POWER(A4,2) =A4A3 =POWER(A4,4)
Function Purpose Example
Figure 8.35- Powers. CONCATENATE Joins together text CONCATENATE
values. (A1,B1,C1)
=A1&B1&C1
TASK
=A1 & & B1 &
CD 8.15 Powers & Cl & ".it.com”
Open CD 8.15 Powers which contains random values for LEFT Extracts the furthest =LEFT(A1,4)
the number to be raised and random values for the power. left characters.
1 Create a function in B8 that raises the value in A4 to
YEAR Extracts the furthest =RIGHT(A1,2)
the power given in B7. Do not use any numbers, only
use cell references. right characters.
2 Using absolute cell referencing where needed, copy the LEN Calculates the =LEN(A1)
function from B8 across the row and down the column. length of a string.
You should not need to change any cell references if UPPER Converts text into =UPPER(A1)
you have used absolute references properly. uppercase.
LOWER Converts text into =L0WER(A1)
Date and time functions
lowercase.
Calculations can be performed on dates and times. Table 8.05 - Text functions.
Lookup functions
A B
Lookup functions will look up a value in a table and return Enter the number
another value in the same row or column. VLOOKUP is 1 of the month:
used to look for a value in a column and return a value 2 2
from the same row. HLOOKUP is used to look for a value 3
in a row and return a value from the same column.
4 3 Letter code: Feb
The VLOOKUP function uses the syntax: 5 Month: Febuary
=VLOOKUP(Search Value, Lookup Table, Column, Match) 6 Francais: Fevrier
Search Value is the value being looked up in the table. Figure 8.38 - Number worksheet.
Lookup Table is the range of celts that define the location
of the table. Column is the number of the column that These are the VLOOKUP functions that were used:
should be returned as the result in the matching row of
the value that was found. Match defines whether an exact A B
match should be found - TRUE for approximate match or Enter the number
1 of the month:
FALSE for exact match.
2 2
3
4 3 Letter code: =VLOOKUP(A2, Months!A2:D13,2,FALSE)
5 Month: =VLOOKUP(A2, Months!A2:Dl 3,3,FALSE)
6 Francais: =VLOOKUP(A2, Months!A2:D13,4,FALSE)
O CD 8.17 Months
CD 8.17 Months contains a table in the worksheet Figure 8.39 - Lookup functions.
1
‘Months’ that lists the numbers that represent
months, the three-letter shortened version of each
month’s name, the full name of each month and the VLOOKUP functions can also be replicated in the same
French name of each month. way as any other function. The main problem with this
though is that the lookup table cell references will change
A B c D as they are copied down the rows.
1 Number 3 Letter Month Francais
2 1 Jan January Janvier
3 2 Feb Febuary Fevrier
March Mars TASK
4 3 Mar
5 4 Apr April Avril CD 8.18 VLookup price categories
6 5 i May May Mai Open CD 8.18 VLookup price categories which calculates
7 6 Jun June Juin the prices of tickets purchased for a show.
8 7 Jul July Julliet 1 Look at the lookup table on the Ticket
9 8 Aug August Aout Categories worksheet. It shows the prices for
9 Sep September Septembre
each category.
10
2 Look at the function in C2 on the Ticket Sales
11 10 Oct October Octobre
worksheet. Describe what this function is doing.
12 11 i Nov November Novembre
3 Replicate the function from C2 down the column.
13 12 Dec December Decembre
4 What has gone wrong?
5 Why has it gone wrong?
Figure 8.37 - Lookup table.
\
the VLOOKUP function. Row is the number of the row that
A B should be returned as the result in the matching column of
the value that was found.
12 Mark \ Grade
13 0 U
14 24 E
t? CD 8.20 HLookup
15 30 D
CD 8.20 HLookup lists products and their prices and
16 36 C the discounts that are currently being applied to
each of those products. The function used in D2 for
17 42 B the Discount Rate is:
18 48 A =HLOOKUP(C2,DiscountRates,2,FALSE)
Figure 8.40 - Non-matching VLOOKUP table. The discount rate code (C2) is looked up in the
named range DiscountRates (B13:F14) and the
Each student’s marks are entered in cells B2 to corresponding rate in the second row of the table is
BIO which has been named ’Mark’. The VLOOKUP returned as the discount rate.
Chapter 8: Spreadsheets
A B C D E F Conditional functions
l Product Price Discount rate Discount Discounted value Discounted price
2 Product 1 $ 101.96 B 30% $ 30.59 $ 71.37 The functions you have seen so far will always perform
3 Product 2 $ 99.51 A 40% $ 39.80 $ 59.71 their calculation. However, a conditional function will only
4 Product 3 $ 142.15 C 20% $ 28.43 $ 113.72
5 Product 4 $ 186.94 B 30% $ 56.08 $ 130.86 perform the calculation if certain criteria are met.
6 Product 5 $ 171.80 D 10% $ 17.18 $ 154.62
7 Product 6 $215.88 B 30% $ 64.76 $ 151.12
8 Product 7 $ 213.39 E 5% $ 10.67 $ 202.72
9 Product8 $ 222.17 A 40% $ 88.87 $ 133.30
10 Product 9 $199.98 C 20% $ 40.00 $ 159.98
11 Product 10 $ 86.40 E 5% $ 4.32 $ 82.08
12 O CD 8.23 IF functions
13 Code A C D E
14 Rate 40% 30% 20% 10% 5% CD 8.23 IF functions contains a simple quiz that asks
users what the capital city of a country is. If the user
Figure 8.42 - Hlookup.
gives the correct answer then they are told “Well
done” otherwise they are told “Oops”.
Nested formula
A nested formula is one which can include more than one A B c D
1 What is the Capital of China? Beijing
function or formula. Each nested formula or function is 2 I =IF(B l - 'Beijing","Well done’V'Oops")
surrounded by brackets and will be calculated before the
formula or function surrounding it is completed. Figure 8.44 - Capital quiz.
*
decisions are made based on more than one item of
DISCUSSION POINT data, in which case a nested IF function is the only
More than one criterion can be used by using AND or OR possible option.
within the condition element of the IF function.
Nested IF
It is possible to have an IF function nested within another CD 8.24 Photo frames
IF function. This can be useful if there are two or more
Open CD 8.24 Photo frames which shows the
alternative outputs. Sometimes the same result can be
charges made for a photo frame with a standard
achieved with a lookup function.
embossing or a gold embossing. The user can select
Standard or Gold embossing and the quantity to
purchase. The price can be determined by this
algorithm:
A B C D E F G
1 Embossing Photo price 5+ photos 15+ photos
C3, a COUNTIF function is used to count only those
2 Standard $ 1.00 $ 0.80 1 $ 0,70 ] students who achieved a Pass.
3 Gold $ 1.80
4
5 Embossing: Standard
6 Quantity: 5
A B C D E
7 Unit price: =IF( _ -’Gold", ,IF y<5,B2,IF <15/ , )
1 Maths
8 Total price: $ 4.00
2 Student Mark Grade
Figure 8.47 - Nested IF for unit price. 3 Matthew 91 Distinction
4 Elijah 89 Distinction
5 Caleb 51 Pass
6 Joshua 38 Fail
Conditional statistical functions 7 Huan 92 Distinction
You have already been introduced to the SUM 8 Junayna 42 Pass
function and the AVERAGE function. Both of these 9 Yuki 32 Fail
10 Menekse 54 Pass
have similar functions that will only perform that
11
function if a certain condition is met. There is also a 12 Total students
count function that will only count items that meet 13 Passes |=CQUNTIF(C3:C10,"Pass")
certain criteria. 14 Fails
15 Distinctions
AVERAGEIF Calculates =AVERAGEIF(J3:J200,”>0”) Open CD 8.26 Member ratings which shows how many
meetings each member of a club has attended. Members
the average Only finds the average of who have attended 50 meetings or more are awarded
of all values
positive numbers. “Gold member” status.
that meet 1 Use a function in B13 to calculate how many
a criterion members have Gold member status.
within a range. 2 Use a function in B14 to calculate the total number of
meetings that have been attended by Gold members.
Table 8.07 - Conditional statistical functions.
DISCUSSION POINT
Error messages must clearly tell the user what they have
In this spreadsheet, the user is asked to enter a done wrong and what they should do to put it right. An
person’s gender. They have two valid options - 'Male’ or error message that simply says ‘Error’ or ‘Invalid Data’ is
‘Female’. The user has accidentally entered 'Mai’ which not helpful to the user.
is not a valid option. An error message has appeared
telling the user what to do to fix the problem.
The validation rules that can be used in spreadsheet software
include lookup in list, range, type (integer and real) and length.
A B C A range check can be set up with the following properties:
1 Gender: Mai
• between two values
Wrong gender • equal to a value
3 • not equal to a value
4 © Please only enter Male or Female
• greater than a value
5 ir'l'dry II Cancel Help • greaterthanorequaltoavalue
6 • less than a value
• less than or equal to a value.
Figure 8.49 - Male/female validation fail.
Apply these changes to all other cells with the same settings
Maximum:
m
Clear All OK Cancel
99 SB|
l~l Apply these changes to all other cells with the same settings
The rule ensures that the only data that can be Figure 8.51 - Range validation.
entered must exist in the list that contains ‘Male’
and ‘Female’. It is a lookup in list method of
validation.
TASK
O CD 8.27 Physics results
Open CD 8.27 Physics results which is ready for students’
TASK marks to be entered for tests 1, 2 and 3.
Create a hew spreadsheet. 1 Create validation rules that only allow the entry of marks
1 Create a validation rule that will only allow the entry up to and including the maximum marks for each test.
of ‘Junior’, ‘Intermediate’ or ‘Senior’. 2 The validation rule should also ensure that negative
2 Set up an appropriate error message. numbers cannot be entered.
Chapter 8: Spreadsheets I
r
TASK
When a tester runs a test plan, there will bean additional
Generate test data that will test the following rules, You
should use a table with three columns: test data value,
cotumn called ‘Actual result’ where the results of the test
type of test data and expected result. Ensure you cover will be entered.
all four types of test data.
• input value is a whole number <1000
TASK.
• input value is a decimal >25
• input value is between 100 and 200 O CD 8.28 Test results
• input value = PASS or FAIL (there are no extreme tests Open CD 8.28 Test results and run the tests from the
for this) example above.
• input value exists in list Junior, Intermediate, Senior 1 Record the results in CD 8.28 Test results.
(there are no extreme tests for this) 2 If a test fails, record what happened.
Cambridge International AS and A level IT
TASK
CD 8.29 Invoices and CD 8.30 Test plan
Open CD 8.29 Invoices and CD 8.30 Test plan and complete the test plan with at least six other tests. Calculate the expected
result using traditional methods and then enter the input data and compare with the actual result.
Test data input value Type of test data Expected result Actual result
Quantity for Product 3 on Invoice worksheet = 36 Valid VAT for Product3 on
Cost for Product 3 on Invoice worksheet = $1,345.00 Invoice worksheet =
$9,684.00
VAT rate on Data worksheet = 20%
Test plans are often written during the design stage you should verify that the data has been input correctly
of a system life cycle. At this point, cell references by comparing what has been entered with the original
are unlikely to be known. Therefore, cell references source.
can be replaced with a description of the input. It
must be clear to the tester where to input the test
Filter data
data.
When there is a lot of data listed in a spreadsheet,
users may want to view just some of that data. This can
Verify data entry be achieved by filtering the data that is required. The
In Chapter 1you learned that data that has been validated term filter is used to relate to the user’s mental model.
is not necessarily correct. It is therefore necessary to When coffee is filtered, the granules are left in the filter
verify data. When inputting data into a spreadsheet, while the flavoured drink flows through the filter.
/
X A B
1 Title _\X First Name -
C
Surname
D
Membership status »
E
] Gender -
67 Dr Forename 141 Surname 141 ll Patron
111 Dr Forename 57 Surname 57 Full Male
TASK
m
O CD 8.08 Member list
Open CD 8.08 Member list and apply the following
filters:
1 People with a membership status of Full.
2 People who do not want to be emailed.
\ 3 People who have been a member for one year.
4 People who are either Full or Patron members.
Figure 8.52 - Coffee filter paper in use.
Chapter 8: Spreadsheets
In the task above, the last filter that you applied was to Special text filters can be applied as shown in Table 8.09.
find members who were either Full or Patron members.
This uses a Boolean operator known as OR. It means that Filter Purpose Example
either condition can be true. Other Boolean operators
include AND and NOT. Contains Selects data in Contains ‘CFT will select
a column that all data in a column where
includes the CH exists anywhere within
EXAMPLE text specified. each data item.
This filter shows members who have NOT lapsed Chicken, Reach, Church
their membership: and Ache would all be
included, but not Card.
Custom AutoFilter ?
Starts with Selects data in Starts with 'CFF will select
Show rows where:
Membership Status
a column that all data in a column
does not contain v Lapsed Vl starts with the where the data starts
• And fit text specified. with CH.
.0 [
Use ? to represent any single character
Chicken and Church would
Use * to represent any series of characters all be included, but not
OK Cancel
Reach, Ache or Card.
Ends with Selects data in Ends with ‘CH’ will select
Figure 8.54- NOT. a column that all data in a column
ends with the where the data ends with
This filter will show members who have five or more text specified. CH.
years of membership AND less than seven years of
membership: Church and Reach would
be included but not
Custom AutoFilter ? Chicken, Ache or Card.
Show rows where:
Number of Years Table 8.09 - Text filters.
is greater than or equal to
<§> And Ofir
v 5
- Filters that find a range of data can be used with numbers,
is less than
BE v
dates and times as shown in Table 8.10.
Use ? to represent any single character
Use * to represent any series of characters
E000 Cancel
I Filter Purpose Example
Greater than Selects data in a column >10
Figure 8.55 -AND.
that is greater than the
Lists 11 but
value specified.
not 9 or 10.
This is the result of the filter:
L E G
Less than Selects data in a column <10
Title First Name - Surname •| Membership status • Gender •Oo not email - Number of year-.i
13 Mrs
•
Forename 3 Surname 3 Full Female FALSE that is less than the value
Forename 50 Surname 50 Full Male FALSE 5 Lists 9, but not
37
Forename 7 Surname 7 :Full
ime 90 lapsed Male
FALSE
FALSE
5
6
specified. 10 or 11.
38 Miss Forename 10 Surname 10 Full Female TRUE 6
Mr Forename 110 Surname 110 Full FALSE 6
50
52
Forename 24 Surname 24 Patr
Forename 69 Surname 69 Full Male
FALSE
FALSE
5
6
Greater than Selects data in a column >=10
53 Mr Forename 15 Surname IS Junior TRUE 5
58 Mr Forename 129 Surname 129 lapsed 5 or equal to that is greater than or equal
61 Mr Forename 133 Surname 133 Patron FALSE 6
Forename 122 Surname 122 lapsed
lapsed
FALSE
FALSE
5
6
to the value specified.
78 Forename 14 Surname 14
83 Mr Forename 108 Surname 108 Patron Male FALSE 5
88 Mr
114 Mr
Forename 37
Forename 48
Surname 37
Surname 48
Full
Full
Male
Male
FALSE
FALSE
5
5
Less than or Selects data in a column <=10
128 Mr Forename 89 Surname 89 Lapsed Male FALSE 5
132 Mr Forename 78 Surname 78 Full Male FALSE 6 equal to that is less than or equal
146 Mr Forename 70 Surname 70 Full Male FALSE 6
to the value specified.
Figure 8.56 - AND result.
Table 8.10 - Filtering for a range.
Cambridge International AS and A level IT
TASK TASK
O CD 8.31 USA addresses O CD 8.32 Instructors
Open CD 8.31 USA addresses and apply the following Within your spreadsheet software, open CD 8.32
filters: Instructors and select options which will cover the
1 State is Arizona ‘Az’ OR California 'CA'. following:
2 City starts with ‘San’. 1 This is a delimited file that is separated by commas.
3 Company ends with ‘Inc’. 2 The file has data headers in the first row.
4 Company includes 3 The Date of Birth should be in date format with no time.
5 Position is <=10. 4 The charge should be in currency.
6 Position is >10 AND <=50. 5 Use the find and replace option in the Weekends
7 State is NOT = ‘FL’ AND NOT = 'OH. column only to replace 1with ‘Yes’ and 0 with ‘No’.
CD 8.33 Driving school.accdb
Within your spreadsheet software, open CD 8.33 Driving
school.accdb and import the Learner table.
Sort data
It is possible to sort data into ascending or descending
order. If only a selection of columns are sorted, then only
the data within those columns will be sorted. To keep all
data in each row together, do not highlight the data. To DISCUSSION POINT
TASK
It’s not just text and numbers that can be sorted into O CD 8.31 USA addresses
order. Dates and times can also be sorted. Open CD 8,31 USA addresses and export it to the
following formats:
Import and export data • CSV
• TXT
Data can be imported from other formats such as a
• PDF
comma separated values (CSV) file, text (TXT) file or from
• Open Document Spreadsheet (ODS) - works with
a database. When importing, you should already have Open Office
the spreadsheet software open and open the file to be • Web page (HTML).
imported from within the spreadsheet software. You will View the files that you have exported the data to and
often have to ensure that when opening you have selected note how the data has been stored.
the option to show all files.
Chapter 8: Spreadsheets
Figure 8.57 - Monthly sales bar chart. Figure 8.59 - Kerslake Hospital line graph.
, »-%-->= .
The comparative line graph on the worksheet Waiting When selecting which type of graph or chart to produce,
List compares the waiting times of three hospitals you should consider the general rules shown in Table 8.11.
over a four-year period with the target waiting time
of 2.5 hours. Notice how the y-axis scale has intervals Type of graph / chart Purpose
of 0.5 hours, the maximum value for the y-axis scale Bar/ column chart Used to show a single series of
is 5.0 and the minimum value forthey-axis scale is 1.5. data in columns or rows.
Waiting times 2012-2015 Comparative bar/ Used to compare more than
5.0 column chart one series of data in columns
4.5
or rows.
Line graph Used to show how a single
series of data changes over a
2.5
period oftime. _
2.0
1.5 Comparative line Used to compare how more
2014 2015
graph than one series of data changes
Year
over a period oftime._
•Kerslake Hospital Bore Hospital •Uptown Hospital Target
Pie chart Used to show the proportion
Figure 8.60 - Hospital waiting times comparative line that is used by each item of data.
graph.
Table 8.11 - Rules for selecting type of graph or chart.
Pie charts are used to show proportional data. This differs Create a graph or chart
from bar charts or line graphs because instead of showing When creating a graph or chart, you should ensure that it
the actual values, the proportion or percentage of each is labelled appropriately.
data item is shown.
Label Purpose
Title A brief overview of what the graph or
chart is showing. _
Legend A key to show what the colours used
O CD 8.35 Graphs and charts
The worksheet Head Prefect in CD 8.35 Graphs and
represent. _
Value axis Each of the axes (usually x and y) should
charts contains a pie chart showing the proportion include the values including any units.
of votes received for each student standing in an Category axis Each of the axes should include a title
election for head prefect of a school. Notice how a to state what the data represents.
legend is not necessary because each legend has Percentages When using a pie chart, the
been labelled with the name of the data item. Each percentages may need to be displayed
segment has also been labelled with the percentage
of the total vote that each data item represents:
for each segment. _
Segment label Instead of a legend, each segment in
Adrian a pie chart could be labelled with its
Smith Votes for Head Prefect
5%
description.
Segment value As well as, or instead of the percentage,
each segment in a pie chart could be
Zee Dass
18%
labelled with its quantity. _
Kristoff Scale The interval between each value on an
Shwarz
35% axis.
James Dolphin
42% Axis scale The maximum value to be used on an
maximum axis.
Axis scale The minimum value to be used on an
minimum axis.
Figure 8.61 - Head prefect pie chart.
Table 8.12 - Labelling graphs and charts.
Chapter 8: Spreadsheets
‘
TASK TASK
CD 8.25 Maths results CD 8.35 Graphs and charts
Open CD 8.25 Maths results. Open CD 8.35 Graphs and charts.
1 Create a bar chart to show the marks for each student. 1 Copy the graph Monthly sales 2015.
2 Include a title and axis titles. 2 Open a word processor or presentation software.
O CD 8.27 Physics results 3 Select the option to paste as a link (you may find this
under paste special).
Open CD 8.27 Physics results.
4 Ensure that the link option is selected and the object
1 Enter some marks for each student for each test.
type (graph) is identified.
2 Create a comparative bar chart to show the marks for
5 Save this new document and close it.
each student in each of the tests 1, 2 and 3.
6 Change some of the data in the Monthly sales
3 Include a title and axis titles.
worksheet.
4 Include a legend for the tests.
7 Save the spreadsheet.
5 Change the y-axis maximum scale value to be 50.
8 Reopen the new document you created and check
6 Change the y-axis scale to have intervals of 5.
that the graph has changed to reflect the updated
CD 8.36 School attendance data in the spreadsheet.
Open CD 8.36 School attendance.
1 Create a comparative line graph to show the
attendance of each of year 1and year 2 over the
period of the year compared with the target.
2 Label the chart appropriately.
3 Adjust the y-axis scale and maximum scale values 6 Identify and give reasons for the most appropriate
appropriately. type of chart or graph to show the number of missed
4 Include a legend.
refuse collections shown in the table below:
5 Change the line type of the target series to be dashed.
O CD 8.08 Member list Year Vesey New Hall Trinity
Open CD 8.08 Member list 2010 2502 4571 3271
1 Open the worksheet Pie Chart. Change ‘Count of
Membership Status' to 'Count of membership status’, 2011 2786 5728 3102
‘Membership Status’ to ‘Membership status’ and 2012 1987 5645 2905
‘Grand Total’ to ‘Grand total’.
2013 2057 4972 2647
2 Create a pie chart to show the proportion of members
for each status.
3 Give the chart a sensible title. 7 Identify and give reasons for the most appropriate
4 Add the percentages and membership statuses to the type of chart or graph to show the data shown in the
pie chart segments. table below:
CD 8.20 HLookup
Open CD 8.20 HLookup. Student Markl Mark 2 Mark 3 Mark 4 Average
1 Create an appropriate chart to show the products, Namel 98 40 36 84 65
original price and discounted price.
Name 2 31 67 61 77 59
2 Label the chart appropriately.
Name 3 62 58 29 38 47
Name 4 64 83 85 27 65
A chart can be created in a spreadsheet and then used Name 5 87 45 64 42 60
within other software by copying the graph and pasting Name 6 93 58 43 73 67
it into the other software, such as word processing for a
report, or presentation software for a presentation. It is Name 7 99 29 55 92 69
also possible to link the exported chart to the original Name 8 57 58 44 93 63
spreadsheet data so that if the data changes within the Name 9 45 43 98 55 60
spreadsheet then the chart will update in the software to
which it has been exported.
Cambridge International AS and A level IT
Q Remember
A model is a computer representation of a real-world
loops, the starting speed of the carriage, length
of each section and the weight of each carriage.
Calculations will be used to define rules such
process. A model is created through mathematical analysis as the amount of friction and how that will slow
of the real-world process. Modelling software is used carriages down, the effect of gravity on carriages
to create a model. Spreadsheets can be used to create
as they move up and down and the g-force that will
computerised models, but there are also custom-written
solutions that are used to model specific processes. be experienced by passengers. What-if questions
could be asked such as 'What would happen if we
increased the starting speed by 2 km/h?’ or 'What
would happen if we increased the initial drop by
5 km?’ The effect of these changes in variables can
A network simulator such as Cloonixcan be used then be modelled.
to model a computer network. The software will be
able to produce a diagrammatic view of the devices
connected to the computer network. It will be possible
to identify the Internet Protocol (IP) addresses used TASK
on the network and how they are assigned through a Experiment with the digital single-lens reflex (DSLR)
Dynamic Host Configuration Protocol (DHCP) server. camera simulator at http://camerasim.com/apps/
Wireless networks can be added and security can be camera-simulator/ by changing the variables and seeing
configured to see what the effects will be. Devices can what the end results are.
be connected to specific switches and the throughput
of data traffic can be analysed.
The need for computer models
Computer Aided Design (CAD) enables designers to There are a variety of reasons why models might be used,
produce a model of a physical object. This could include including training, forecasting and construction. Whatever
a kitchen, a building, a motor vehicle or an aeroplane. the reason, a model must be able to answer what-if
CAD software can include features such as viewing an questions.
object in two dimensions (2D) or three dimensions Models can be used for the purpose of training people to
(3D), manipulating objects within the model, adding use equipment. This could range from learning to drive a
or removing objects, viewing the model from different forklift truck to flying an aeroplane or operating a nuclear
angles, applying different effects such as colour and power plant. Models are used for training because there
lighting, and focusing on specific features such as the is less risk of injury to the trainees and instructors than
electrical cabling or heating system within a building. learning in a real environment. When learning to drive a
Modelling software will include some essential features: forklift truck, the trainee may make a mistake by lifting a
load too high and toppling the truck. In real life this could
• the ability to change variables within the software cause serious injury as well as costing money in terms of
• asking what-if questions to see what the result of repairs, but using a model removes both of these risks.
changing variables might be Costs are saved because real equipment does not suffer
• formulae and functions to carry out the mathematical wear and tear, fuel is not required to operate machinery
calculations that form the basis of the model and instructors do not need to be present all of the time.
• automatic recalculation of formulae and functions It is also possible to test the trainee in unpredictable
Chapter 8: Spreadsheets
situations such as turbulence for an aeroplane or driving a • instant, automatic recalculation of formulae, functions and
heavy goods vehicle on ice. Unpredictable situations that graphs/charts to answer what-if questions immediately
would happen in real life can also be removed for trainees • conditional formatting to highlightthe effects
when they first start learning so they can focus on basic • goal-seek to find out what variables need to be changed
controls. to achieve a given outcome.
Models can also be used for forecasting. One of the most
common models forthis purpose is weather forecasting.
Patterns that have happened in the past can be analysed
along with current data to predict what the weather might Some examples of what-if questions in a financial
be in the future. Businesses and governments use financial spreadsheet model might include:
modelling to predict what might happen to profits orthe • What happens to the total income for the month if
economy. It is too risky for a business to make sudden we increase the selling price by 20%?
changes in the marketplace without testing them out with a
model first. A variety of what-if questions can be asked using • What happens to our costs if we use a different
a model to determine how to make the most profit. Variables supplier for one of our parts?
that could be changed include selling prices, adjusting the • What happens to our total expenditure forthe next
quantity of products to supply at any given time, times of year five years if we move to new premises?
to sell products and the effect of weather on seasonal sales.
Some examples of goal-seek questions might
Constructing buildings, kitchens, gardens, motor vehicles include:
and other objects can be a very costly process. It is
• What price do we need to sell at in order to sell
important to get it right first time as any adjustments that
5000 items per month?
have to be made in the real world will incurfinancial costs.
Models help to experiment with different designs to see • How many items do we need to sell to break even
which look is most aesthetically pleasing and which ones (zero profit and zero loss)?
react best to environmental conditions. When designing a
kitchen using modelling software, variables such as lighting, Other advantages of spreadsheet models include the
worktops, cupboard doors, position of units, flooring and ability to share the spreadsheet with colleagues easily so
tiling can be changed to see which configuration looks the that many people can experiment with the model, and
best. Cupboards, drawers, dishwashers and cookers can be the fact that most organisations already own spreadsheet
opened to see if they use the space efficiently. The angle of software which reduces the need fortrainingand
view can be changed in a 3D environment to see what the
purchase costs.
kitchen might look like from a variety of angles.
Spreadsheets do have their limitations though. They are
only as accurate as the formulae and functions that are
Evaluating the effectiveness of spreadsheet the rules that represent the real world. Unless extremely
models complex rules are used, then a spreadsheet model will
o
! TIP
Spreadsheet models are mainly used for financial forecasting,
never be an accurate representation. These complex rules
require mathematical and computer expertise in order
to set them up and it can take a very long time to create
but there are a lot of other models that can be used.
models that are truly representative of the real world.
Spreadsheets can only be used to simulate numbers, but
cannot simulate the effect on objects.
There are a variety of tools within a spreadsheet that can
be used to help with modelling:
• variables which can be changed to ask what-if questions 8 Identify three characteristics of modelling software.
• formulae and functions which define the rules of the 9 Describe, using examples, how a spreadsheet
model could be used to model the costs or savings to an
• graphs and charts which can show a graphical organisation of moving premises.
representation of the forecast
Cambridge International AS and A level IT
Comments can be added to cells. Conditional formatting should be used to test validation rules. Verification
can be used to format cells based on their content. is the process of checking data has been transferred
A worksheet can be set up to print on a specific size of correctly.
paper, with a header/footer and set margins. It can also Data can be selected using filters. Data can be sorted into
be specified to fit on a set number of pages. ascending or descending order. Data can be imported into
Formulae are basic arithmetic calculations and functions a spreadsheet from another data source or exported so it
are ready-made formulae representing complex can be used in other software. Graphs and charts can be
calculations. Functions can include summary functions, used to analyse data.
rounding functions, date/time functions, lookup functions Models represent real world processes for training,
and conditional functions. Absolute cell references do forecasting and construction. Spreadsheets can
not change when replicated and relative cell references be used for financial forecasting and other models
change when replicated. that rely on mathematical analysis. Simulations use
Validation rules can be used to ensure that data is computerised models to predict how real-life systems
sensible and allowed. Valid, invalid and extreme data might behave.
Review questions
The spreadsheet below shows cars that are owned by a driving school. It calculates the fuel type
of each car, the cost per litre of each fuel type and the cost per gallon.
A B C D E F
1 Registration Make Model Fuel type Cost per litre Cost per litre
2 BX56JWL Ford Mondeo Diesel $ 1.25 $ 5.69
3 BX56JWM Saab Saab 9-3 Petrol $ 1.17 $ 5.32
4 BX56JWN Land Rover Discovery Diesel $ 1.25 $ 5.69
5 BX56JWP Smart Smart Car LPG $ 0.85 $ 3.87
6 i 8X56JWR Ford Mondeo Petrol $ 1.17 $ 5.32
7 | BX56JWS Saab Saab 9-3 Diesel $ 1.25 s 5.69
8
9 Fuel type Cost per litre
10 Diesel $ 5.69
11 Petrol
1 1.17
12, LPG $ 5.69
Formulae and functions have been used in the spreadsheet. There are 4.55 litres in a gallon.
1 b i Describe a formula. [1]
1 b ii Write the formula used in F2. [1]
1 b iii Describe a function. [1]
1 b iv Identify the type of formula used in E2. [1]
The driving school would like to see all their petrol cars but not the other cars.
2 a Explain how the driving school could see all their petrol cars but not the other cars
without losing any data. [2]
Chapter 8: Spreadsheets
2 b Explain how the fuel types could be identified quickly using a different colour for each
without changing them all one by one. [2]
Absolute and relative cell referencing have been used within the spreadsheet.
3 Using examples, explain how absolute and relative cell referencing have been used. [4]
The spreadsheet model is going to be used to calculate the costs of using each car.
4 a Describe three advantages of using a spreadsheet to model the costs of using each
car. [3]
4 b Describe one disadvantage of using a spreadsheet to model the costs of using each
car. [1]
The driving school is considering purchasing a simulator to help students to learn to drive.
5 Give reasons for the use of a simulator for this purpose. [4]
m
2? 23>K
05
BE5 23»/„ ,8%
0
to] toi /
EE0 45%
iHf Hf
ro
a 1
0
Mil
2
IK
Z \ •
IE ?]9fS # dg
Learning objectives
By the end of this chapter, you will be able to:
S3
£2
Chapter 9: Database and file concepts
9.01 Create a database Within a table are rows known as records. Each record
is an entity which is a set of data about one single thing
(person, place, object or event). In the example above, the
data about Marc Wenger is a single record/entity.
Database: ; structured method of storing data
Each entity has categories of information. These
Table: a set of similar data (about people, places, objects or
categories are known as attributes or fields. In the
events)
example above Customer ID, Contact forename,
Record: a common word for entity
Contact surname and Street address are all field/attribute
Entity: a set of data about one thing (person, place, object or
names.
event)
Attribute: a category of information within an entity One of the fields will be known as the primary key. The
Field: a common word for attribute primary key contains a unique value for each record. This
Primary key: a field that contains the unique identifier for a record means that each value can only exist once in that table so
Database management system: software used to manage a it is possible to identify each record using the primary key.
database In the example above, Customer ID is the primary key.
Relationship: the way in which two entities in two different
tables are connected
Foreign key: a field in a table that refers to the primary key in
another table
Q Remember
The software that is used to manage the database is
called a database management system (DBMS).
Normal form: the extent to which a database has been normalised Sometimes, this is referred to as a relational database
Index: a list of keys or keywords which identify a unique record management system (RDBMS) as it is managing a
and can be used to search and sort records more quickly database that includes relationships.
Entity relationship diagram: a diagram that represents the
relationships between entities
Flat file: a database stored in a single table
TASK
Compound key: two or more fields that form the primary key
CD 9.01 Sales processing.mdb
Referential integrity: data in the foreign key of the table on
the many side of a relationship must exist in the primary key of Open CD 9.01 Sales processing.mdb and then open the
the table on the one side of a relationship table Product.
Query: a question used to retrieve data from a database 1 Identify four field names in the Product table.
Parameter: data used within the criteria for a query 2 Identify the primary key in the Product table.
3 How many records are in the Product table?
4 Identify two other tables within the database.
Introduction to databases
Data types and field sizes
Remember
A database is a structured method forstoring data in
sets of tables. Each table contains similar data about
people, places, objects or events.
o DISCUSSION POINT
You should read the section about data types in Section
9.03 below.
EXAMPLE
Figure 9.01 from CD 9.01 Sales processing.mdb Each field in a table will have a data type assigned to it.
contains data about customers (people): Data types include:
Customer ID Contact Forename » Contact Surname * Street Address
1Reina Wolchesky 305 W Washington St • text
2 Marc Wenger 33 Harrison Ave
3 Damion Matkln 5830 Downing St *-d • alphanumeric
4 Lucius Winchester 670 S Barrington Rd
5 Petra Mcnichol 670 S Barrington Rd • numeric (integer/decimal)
6 Katina Ramano 580 Fountain Ave
• date/time
Figure 9.01 - Customer table. • Boolean.
Cambridge International AS and A level IT
TASK
9.01 Sales processing.mdb
Open CD 9.01 Sales processing.mdb and explore the
Sales Rep ID *
1
Last Name * First Name
Davolio
» Job Title
Sales Representative Msÿ
- Employee ID*
2
Order Date -
28/05/2015]
contains basic information about their name
but their full employee details are stored in
2 1 22/05/2015 a separate table called Employee. Each sales
3 5 06/05/2015 representative only has one employee record and
4 3 05/04/2015 each employee record can only refer to one sales
5 7 06/05/2015 rep record.
+
Customer ID »t Contact Forename » Contact Surname
1 Reina Wolchesky
-
+ 2 Marc Wenger __ One-to-many
+ 3 Damion Matkin
+
A one-to-many relationship is when each record
4 Lucius Winchester
+ 5 Petra Mcnichol in one table can connect to many (zero or more)
+ 6 Katina Ramano records in another table. A foreign key will exist
within the table on the many side of the
Figure 9.04- Foreign key. a) Order table; b) Customer
relationship and will connect to a primary
table.
key in the one side of the relationship. This is
the most common type of relationship within
In the Order table, the foreign key is Customer ID relational databases.
which connects to the primary key Customer ID
in the customer table. For Order Number 4, the
Customer ID 3 is looked up in the Customer table to
find Damion Matkin.
Product ID » Product Name Category ID The Order table stores data about the orders that are
+ 1
1 Chat 1
placed including which products are being sold. It
+ 2 Chang 1
+ _3| Aniseed Syrup 2j has a field called Product IDs which lists the products
+ 4 Chef Anton's Cajun Seasoning 2 being sold on each order. Each order can have many
+ 5; Chef Anton's Gumbo Mix 2 products. Each product can exist on many orders.
+ 6 Grandma's Boysenberry Spread 2
+ 7 Uncle Josefs Organic Dried Pears 7
There are many Orders to many Products.
+ 8 Northwoods Cranberry sauce 2
+ 9 Mishi Kobe Niku 6
+
+
+
10 Ikura
11 1 Queso Cabrales
12| Queso Manchego La Pastora
8
4
4
O DISCUSSION POINT
The problem with the many-to-many relationship is that it
Category ID * Category Name » Description is not possible to store single data items within the foreign
11 Beverages _ Soft drinks, coffee, teas, beers and ales
2 Condiments Sweet and savory sauces, relishes, spreads and seasoning
key. In the Order and Product example, the Product ID field
_ 3i Confections Desserts, candies and sweet breads contains more than one Product ID per Order and this causes
4 Dairy Products Cheeses
5 Grains/Cereals Breads, crackers, pasta and cereal a problem of non-atomic data, breaking the rules of first
6 Meat/Poultry Prepared meats normal form which you will learn about later in this chapter.
7 Produce Dried fruit and bean curd
8 Seafood Seaweed and fish
TASK
CD 9.01 Sales processing.mdb
Order
bA Product
o DISCUSSION POINT
If you don’t have a unique index or a primary key as the
TASK
BOOK AUTHOR
Sales Rep [j-\ Employee
Figure 9.11 - Relationships.
Figure 9.08 - One-to-one relationship.
Cambridge International AS and A level IT
o DISCUSSION POINT
Different RDBMSs use different symbols. For example,
Branches
© BranchJD
© Address_/D
© Bank_/D
© Branch_ Type code
Microsoft Access uses the infinity symbol for the many side Branch_Details
of a relationship.
Product
I
Customers
© CustomerJD
Product ID © AddressJD
Product Name © BranchJD
Personal_Details
Supplier ID Category Contact.Details
oo
Category ID Si CategorylD
Quantity Per Unit CategoiyName
Unit Price Description
Units In Stock
Ret_Account_Types Accounts Transactions
Reorder Amount
© Account_Type_Code © Account_Number © TransactionJD
Units On Order Account_Type_Description -|-o< © Accounl_Status_Code © Account_Number
e.g. Checking, Savings etc.
Reorder Level © Accounl_Type_Code © MerchantJD
o< ©
© CustomerJD Transaction_Type_Code
Discontinued Current_Balance Transaction_Date_Time
Other RDBMSs may use two symbols at each end of the Figure 9.14 - Bank relationships.
relationship. For example, 0:1or 0| could be used to depict
;
that there can be between zero and one related record on
that side of the relationship, whereas 1:1 or || could be used
to depict that there must be exactly one related record on
that side of the relationship. CD 9.02 Sales processing2.mdb
SL
r EL
One Many IT"
(Optional) (Compulsory)
r
EL
sr
Many O One
(Optional) (Compulsory)
Figure 9.15 - ERD Implemented.
Figure 9.13 - Alternative symbols.
0:M orO<can be used to depict between zero and many
related records and 1:M or |<can be used to depict that
at least one record must be used on the many side of the TASK
relationship. Draw ERDs to represent the following relationships:
1 One Airline Seat to one Customer.
2 One House to many Occupants.
An ERD will usually have more than just two tables. The 3 Many Coaches to many Drivers,
ERD in Figure 9.14 shows the relationships that exist within Draw an ERD to represent a library model. Within the
a bank. library, there are several books. There may be many
copies of the same book which are known as book copies.
Each branch of the bank can have many customers. Each customers can loan a book copy, a customer can have 1
customer can have many accounts. Each account can many loans but a loan will be for just one customer. Each
have many transactions taking place. Each account can loan will be for one book copy, but over a period oftime
be of only one type but each type of account can exist as each book copy, can be loaned out many times.
many accounts.
Chapter 9: Database and file concepts
TASK
Resolve the following many-to-many relationships and
KITCHEN PART KITCHEN UNIT suggest attribute names for all three tables:
Part ID Unit ID
Description Description • many Orders to many Products
Cost Height • many Hire Car to many Drivers
• many Authors to many Books
Figure 9.17 - Kitchen. • many Students to many Classes
• many Employees to many Skills
In this example, each kitchen unit can include many • many Doctors to many Patients.
kitchen parts. As each kitchen part can be used for
many kitchen units, a LINK table is required.
The difference between a flat file and a
KITCHEN KITCHEN
ASSEMBLY
KITCHEN
UNIT
relational database
PART
A flat file is a database that consists of a single table with
Part ID
Description +—4, Assembly
Pari ID
ID Unit ID
I tescription
no relationships. It is like looking at all the data in a single
Cost Unit ID Height
Quantity
worksheet in a spreadsheet. It is called ‘flat’ because it
only has two dimensions - fields and records.
Figure 9.18- Kitchen resolved.
The flat file below stores data about driving lessons, the cars used and the learners taking the lessons.
LESSON
Lesson Lesson Time Registration Make Model Reg Transmission Forename Surname Telephone
ID Date Slot Year
Start
1 27/08/2013 08:00 BR54URS Vauxhall Astra 2011 M Aimee Fenson 0555555 777
2 28/08/2013 08:00 BD05ABC Nissan Almera 2012 A Roger Drake 0555 555 555
3 31/08/2013 11:00 BD05ABC Nissan Almera 2012 A Roger Drake 0555 555 555
4 31/05/2014 16:00 BC53PRS Mini Cooper 2013 M Aimee Fenson 0555555 777
5 01/06/2014 16:00 BR54URS Vauxhall Astra 2011 M Aimee Fenson 0555555 777
6 29/08/2013 19:00 BC53PRS Mini Cooper 2013 M Salty Mastock 0555 555 777
The data about the car is repeated and the data about the learner driver taking lessons is also repeated. This
example only contains a small amount of redundant data, but imagine if data about the distance each car had
travelled was stored, or the full address of the learner and their date of birth.
In the flat file example box, the data about cars was very Relational databases are used to reduce redundancy.
similar to a table you would find in a relational database. Where data is likely to be repeated if stored in a single flat
However, with larger flat files there is a problem when all the file then it is preferable to store this data in a set of related
data is in one table because there will be redundant data. tables. For example, a relational database about a library
Redundant data is data that is unnecessarily repeated. would include separate tables for books, borrowers and
Redundant data uses up additional memory. It can also loans. Flat files are used when processing speed is essential.
cause problems with inconsistency and maintaining the Data is likely to have been stored in a relational database
flat file. If Aimee Fenson changes her telephone number, originally but exported to a flat file for processing. Flat files
then it will need to be changed for every lesson that would be used in transactional processing systems such as
Aimee has taken. If some are missed, then there will be when processing monthly salary payments by updating the
inconsistent data, meaning that a search will not produce master payment file from employee transactions such as
accurate results because Aimee has more than one phone hours worked and expenses claimed.
number. When a new lesson is entered, all the details of Links are created between the tables which means data
the car and the learner have to be entered rather than just can be looked up from one table to another. This takes
their primary keys. This can lead to further inconsistent time and expertise to plan in order to ensure that it is all
data and errors. set up correctly. It also means that processing time can be
Flat files do have their uses though. They are often simple a bit slower, especially when there are large data sets. It is
to set up as sometimes data can be entered into the possible to share a relational database across a network
file without needing to set up data types, field sizes or or even the internet and apply security permissions to
relationships. They can be shared easily through email and each table so that different types of users can access
across the internet because the data is not dependent upon different tables. This is not possible with a flat file as it is all
specific file types or software. It is also easy to add additional in one table. Queries can be created that enable data to be
information to a flat file because it’s a simple case of adding searched and sorted efficiently using a relational database
new columns. As all the data is in one single table, it is also and they can also join data together from related tables.
very quick for the computer to process the data. It’s also possible to produce detailed and customised
Relational databases are more useful when data needs reports of the data stored within a relational database.
to be managed properly. They resolve the problems of Relational databases are also flexible because additional
inaccurate data, inconsistencies and redundant data by fields and tables can be added without disturbing the rest
using related tables. of the data.
Chapter 9: Database and file concepts
The flat file in the previous example could be stored in a relational database as a set of three tables:
LESSON
Lesson ID Lesson Date Time Slot Start Registration Learner ID
1 27/08/2013 08:00 BR54URS
2 28/08/2013 08:00 BD05ABC
3 31/08/2013 11:00 BD05ABC
CAR
ID Registration Make Model Reg Year Transmission
2 BR54URS Vauxhall Astra 2011 M
4 BC53PRS Mini Cooper 2013 M
5 BD05ABC Nissan Almera 2012 A
LEARNER
Learner Forename Surname Address 1 Address 2 Post Gender Telephone Mobile Licence Number
ID Code
9 Sally Mastock 15 Cloud Kingston- KI8 F 0555555555 0777777777 MAST9999999SA9XX
Road Upon-Hull 6GU
10 Aimee Fenson 23Yandle Shrewsbury KN3 F 0555 555 556 0777777778 FENS9999999AI9XX
Lane 7YY
11 Roger Drake 19 Spion Liverpool L15 M 0555 555557 0777777779 DRAK9999999RA9XX
Kop 9PL
Table 9.01 further examines the types of searches and queries that can be applied to flat files and those that can be
applied to relational databases.
Table 9.01 - Types of searches and queries that can be applied to flat file databases and relational databases.
Cambridge International AS and A level IT
Import data
Data can be imported from text files so that data that has
been created in another system or for another purpose Figure 9.19 is a RTF file with field headings as the
can be used within the database. The text files must be top row of the table.
structured in such a way that fields can be recognised ID | Loan date |Return date | Student IP| Copy ID |
and records can be separated. Comma separated values
1 12/11/2010 29/11/2010 9 21
(CSV) is a common format used for this purpose. Fields 2 12/11/2010 24/11/2010 3 22
are separated by commas, records are separated by 3 05/01/2011 01/02/2011 4 23
line breaks and speech marks are used to identify text. 4 01/02/2011 9 17
The use of a separation character means that the field Figure 9.19 - RTF file.
lengths are delimited, which means each field can be any
length.
TASK
CD 9.03 Book
This is a CSV file for books. The first row contains CD 9.04 Student
the field names. Create a new database and import the following files:
“ID”,”Book title”,”Genre”,"Reading • CD 9.03 Book (file includes row headings)
age”,"ISBN”,’’Author” • CD 9.04 Student.
m 2,’’Hidden Gold”,’’Mystery",10,”0-342-92763-X”,”J T
King”
3,’’Fearless”,’’Action",14,"0-250-34751-9”,”K
The first step in creating a database is to create the file
that will be used. Other steps can then include creating:
• tables
Lawrence”
• relationships
• forms
CSV is only one common format. Text files (TXT) can also • reports.
be used. Text files can be formatted in exactly the same
way as a CSV file or they can use different characters to
separate fields. They can also be structured to have fixed TASK
length fields, which means spaces are used to fill the CD 9.03 Book
gaps.
CD 9.05 Student
CD 9.06 Copy
CD 9.07 Loan
This is a fixed length field text file for students. Create a new databasecalled CD 9.15 My library that will be
used to store information about books in a school library.
1 Smith Larry 9F 1 Cteate a new database file.
2 Import the files:
2 Nyakatawa Paul 9B
a CD 9.03 Book
3 Kalsi Waheed 10R b CD 9.05 Student
c CD 9.06 Copy
4 Woolfenden Howard 11M
d CD 9.07 Loan.
5 Patel Poonam 9N 3 Check the data types for each field in each table and
change if necessary.
4 Check the field lengths for each field in each table
Some DBMSs allow data to be imported from rich text and change if necessary (do not leave them as 256
format (RTF) files. The data must be in a table within the characters in length).
RTF file.
i
Chapter 9: Database and file concepts
Keys
The Order Line table below shows the products and
Primary key
quantities ordered for each order. As long as each order
A primary key is a unique identifier for each record in a only includes each Product on one Order Line, then
table. Therefore, the field used for the primary key must the combination of Order Number and Product ID is
contain unique values and not have any repeating values. unique.
Examples of primary keys could include:
Order Number Product ID Quantity
• registration plate for a car
1 1 1
• student number for a student
• product code for a product. 1 2 2
2 3 1
It is important that data within primary keys never
changes as it can be used within a relationship. Therefore, 2 3 1
some fields that may appear on the surface to be suitable 3 4 1
as a primary key may not be suitable in the long run. For 4 5 1
example, a registration plate for a car can be changed in 4 6 1
some countries. For this reason, it is always best to use
5 5 1
separate ID fields as primary keys.
5 6 2
Foreign key
A foreign key is a field in a table that refers to the primary
key in another table. It is used to create the relationship
The Order Line table below shows the products and
between the two tables. The foreign key must always have
quantities ordered for each order. As long as each order
the same data type and field size as the primary key it is
only includes each Product on one Order Line, then
linking to. The foreign key must always be on the many
the combination of Order Number and ProductID is
side of the relationship. The foreign key will always link to
unique.
a single primary key field.
Cambridge International AS and A level IT
I
Customer
Customer ID Contact Contact Surname
Forename In the Order table below, Customer ID 5 does
1 Reina Wolchesky not exist in the Customer table. This means that
2 Marc Wanger the Order table does not contain referential
3 Damion Matkin integrity because the related customer does
4 Lucius Winchester not exist.
5 Petra Mcnichol
Order
6 Katina Ramano
Leslie Cackowski Order Number Customer ID Order Date
7
8 Cristopher Wiget 1 2 28/05/2015
2 1 22/05/2015
Figure 9.20 - Foreign key. 3 5 06/05/2015
Customer
Customer ID Contact Contact Surname
TASK Forename
marketing _ Title
Employee ID
Mark 100 Lists all students who
achieved 100 marks ran *
Mark <50 Lists all students who
achieved less than 50
Field: Last Name
Table: Sales Reo
Sort:
First Name
Sales Reo
Job Title
5ales Reo 1
Show: 0 0 LI
marks
.
Criteria: 'Sales Representative'
on
TASK
Complex queries
Complex queries are queries that have more than
Figure 9.26 - Product Category. one criterion. They use either the AND or OR Boolean
operators. If all specified criteria need to be satisfied, then
The CategoryName has been included from the the AND operator is used. If any one of the specified criteria
Category table which is related to the Product Table needs to be satisfied, then the OR operator is used.
through the Category ID.
Complex queries are not restricted to just two criteria.
They can have as many criteria as necessary for the query.
The complex query Eyes = Blue AND Shoe Size = 8 would return the following:
The following nested query uses a combination of AND and OR and includes more than two criteria:
Sex = F AND (Eyes = Blue OR Eyes = Brown) AND Height < 1.5
These are the results of the nested query:
Surname Forename Height Shoe Size Eyes Nationality Occupation Sex
Greer Wendy 1.85 7 Blue British Firefighter F
Pearce Madison 1.85 8 Blue American Musician F
Gardiner Felicia 1.85 9 Blue South African Waitress F
Ivanova Sofia 1.65 8 Brown Russian Road sweeper F
TASK
9.02 Sales processing 2.mdb
Open CD 9.02 Sales processing 2.mdb, identify which query is most suitable and then create queries for the following:
1 All customers from Texas (TX) or Illinois (IL).
2 All customers who would like to receive marketing and live in Ohio (OH).
3 All products priced at least $50 with no units in stock, showing the Product Name and Supplier’s Company Name.
4 All products over $30 supplied by companies in Germany.
5 All products under $30 supplied by companies in Denmark or Sweden.
6 A list of all products where the Units in Stock is less than or equal to the Reorder Level and the Units on Order is zero.
Cambridge International AS and A level IT
~
r-
w
r».
America
Belgium
England
9
8
20
7
1
4
2
7
16
France 6 4 2
© DISCUSSION POINT
In order to set this up, it is necessary to identify
which fields will be used as row headings,
A nested query is effectively a query that has multiple
criteria and is equivalent to using AND. However, they can which fields will be used as column headings
be used to make very complex queries easier to follow and and which field the summary of data will be
setup by breaking down the individual steps required to used for:
create the query. There are also occasions when a nested
query is necessary to achieve the desired results, such as
creating a cross-tab query based on two or more tables. | Nationality |Sex1 |Sex2 |Sex3 |
Nationality 1 Count (Surname)
Nationality 2
Nationality 3
Nationality 4 |
TASK Figure 9.29 - Cross-tab wizard.
CD 9.02 Sales processing 2.mdb
Open CD 9.02 Sales processing 2.mdb, identify which This can also be seen in the configuration settings
query is most suitable and then create a query based on where the data is grouped by nationality and sex
the existing query “Qry Products over $75” that will show as row and column headings and the surname is
those products in the Meat/Poultry category. counted:
Chapter 9: Database and file concepts
:
Qry People Summary Nationality and Gender - n x
3 The number of products in each category (the
People
HeiflM category names must be showing so you will need to
Shoe Size
Eye*
join the Product and Category tables first).
Nationality
Occupation
4 The total price of each product in each category.
ID
Nationality Sex : Surname Total Of Surname: Surname
People People People
Group By Group By j Count | Count
Crosstab: Row Heading Column Heading Value Row Heading Using simple, complex, nested and summary
queries
Figure 9.30 - Cross-tab configuration. Simple queries should be used when only one criterion is
You will notice that a new calculated field of “Total required, such as Gender = Male.
of Surname” has been added that counts the total Complex queries should be used when more than one
number of people. This is not essential unless the criteria are required, such as Gender = Male AND Country =
overall totals are required. Israel, or Gender = Male OR Country = Israel.
A nested query can be used in the following situations:
Static parameters
TASK
So far all the queries you have used include static
9.12 People.mdb parameters. The parameters are the values used within
Open CD 9.12 People.mdb and create cross-tab queries the criteria. Each time the query is run, the values of the
to show: parameters will not change.
1 The number of people of each gender with eyes of
each colour.
2 The number of people of each occupation (no need to
have a column grouping).
3 The number of people of each genderwith each shoe The query for all customers from Texas (TX) or
size. Illinois (IL) had static parameters of TX and IL. These
values do not change
O CD 9.02 Sales processing 2.mdb
Open CD 9.02 Sales processing2.mdb and create
cross-tab queries to show:
Dynamic parameters
1 The number of suppliers in each country.
Dynamic parameters allow the values within the criteria
2 The number of customers in each state.
to be chosen at the time of running the query. This can
Cambridge International AS and A level IT
i
. m
Static parameter values should be used when those
parameter values will not change, no matter how many
Figure 9.31 - Dynamic query. times the query is used. For example, if you wanted to
search a table on a regular basis for all customers based in
The criterion of [Please enter state] will be a prompt China, then you would use a static parameter query with
to the user to enter the state. This is what the the criterion of Country = “China". Dynamic parameters
prompt looks like when the query is run: should be used when the user is likely to want to change the
value each time the query is run. For example, if you wanted
Enter Parameter Value • a query that would enable you to search for a specific
product code, but that product code could be different
Please enter state each time, then you would use a dynamic query with the
criterion of Product Code = [Please enter product code],
OK Cancel
Perform calculations within a database
Within a database, calculations can be performed on
Figure 9.32 - Parameter.
fields. This can be done within forms, reports and queries.
If the user enters AZ then all the customers in Within a form, a text box can be added to the form which
Arizona will be listed:
includes the calculation. As with spreadsheets, the
calculation must start with the equals (=) sign.
Contact Forename * Contact Surname * Telephone »
Prince Kauk 623-581-7435
Oanny Dales 602-225-9543
Lucas Santellana 602-225-3469
Sabrina Deppert 602-954-4343
In the Order Form from CD 9.02 Sales processing
* 2.mdb, the Total Price for each order line has been
Figure 9.33 - Arizona. calculated by multiplying the Quantity by the
Unit Price. The Order Total has been calculated
by adding up all the Quantities multiplied by their
Dynamic parameters can be used with ranges (<, >, <=,
corresponding Unit Prices.
>=) and Boolean operators (NOT, AND, OR). They can also
be used alongside static parameters within a complex The calculation for Total Price is = [Quantity] * [Unit
query. Price]
Chapter 9: Database and file concepts
I
The calculation for Order Total is = SUM ([Quantity] * 5 Qiy Pioiiucti left to StH - X
‘
[Unit Price])
V PiodurtlD
Product ll»m«
Category ID
m Order Form X Quantity Per untt
Unit Mu
Unit! in Stock
Order Form
Uniu On Order
T|
Order Number 1
Product Horn* Reorder level
Customer ID 20
0 0 0 0
Order Date 28/05/2015
Notes
Chang
1
2
$18.00
$19.00
$18.00
$38.00
been added that the total must be greater than zero.
Here is an extract of the result of the query:
© DISCUSSION POINT
In some database management systems, such as Microsoft TASK
Access, calculated fields such as Total Price cannot be used CD 9,02 Sales processing 2.mdb
in a SUM function. Therefore, the SU M has to use the full
Open CD 9.02 Sales processing 2.mdb and create a query
calculation rather than simply referring to =SUM([Total
Price]). to calculate the new Units In Stock when the Units On
Order are added to the current Units In Stock.
Penalty Fee
£140,000.00
1.65
£2,310.00
- a
Navigation buttons allow the user to browse through kÿCD 9.14 Library.mdb
records by choosing the next record, previous record, first Evaluate the data entry form from CD 9.14 Library.mdb.
record in a file or last record in a file.
Radio buttons
Book title tSJiifthb
Radio (option) buttons allow a user to select one mutually
Reading age
exclusive option. D-32I-9356M
MLatnw*
Export data
In the same way that data can be imported from
common formats, it can also be exported to common 9.02 Normalisation to third
formats. This allows data to be used by other users who
either do not have DBMS software or do not know how normal form
to use it. It can also be used to transfer data to other
systems.
Normalisation: process of structuringdata in a database
Table
Data in tables can be exported as a delimited file in CSV
format, as fixed length fields in text format or as a table Normalisation is the process of structuring data within
within a RTF file. It is sensible to save the field names when a database. The process starts with a flat file and finishes
saving to CSV or text files. with a set of related tables. It is a formal method of
ensuring that each table is structured correctly and does
Query not contain redundant data. There are stages throughout
Data from queries can be exported in the same way as the process known as normal forms. Each normal
tables, but only the data that meets the criteria of the form measures the extent to which the data has been
query will be exported. normalised.
When describing tables, the following conventions will be
Report used:
Reports include formatting, so the best method of export TABLENAME
is to a RTF file which will include all the original formatting. Primary Kev
Data that is exported from a report to a text file will lose its Attribute 1
formatting. Attribute 2
TABLENAME (Primary Key. Attribute 1, Attribute 2)
Table names will be in capitals, primary keys will be
TASK
underlined and all attributes will be listed below the table
CD 9.01 Sales processing.mdb name or within brackets.
Open CD 9.01 Sales processing.mdb and export the
following:
1 The Customer table in CSV format.
Unnormalised form
2 The UK Sales Reps query in fixed length fields text Data in unnormalised form (ONF) is a flat file. It will contain
format. non-atomic data, repeating groups of data and possibly
3 The Categories of Products report in RTF format. redundant data. Non-atomic data is where a field contains
more than one item of data.
Chapter 9: Database and file concepts :
This table contains fields that are repeated for each record:
Surname Forename Subject 1 Subject 2 Subject 3 Subject 4
Jones Ifor Welsh English History 161 g
:
Rushton Ken Politics Literature Philosophy Physics
Smallwood Steven Maths Physics German
The Subject field has been repeated. This can be a problem when trying to search for all students studying the same
subject or when a student only studies one subject (leaving several blank) or when a student needs to study a fifth
subject.
This table contains more than one set of data fora group of fields:
Each student is borrowing more than one book and so the fields Book, Date Out and Date Due contain more than
one set of data per record. This could also be classed as non-atomic data as there is more than one data item per
field.
£gHrvgftPa* i:j~
ORDER
Order Date
Customer ID
Second normal form
Customer Name
Data in second normal form (2NF) must have no
Customer Address
partial key dependencies. This means that no non-key
Product Code
fields can be dependent upon part of a primary key.
Description
This therefore only applies to tables with compound
Quantity
keys because they are the only tables that can have
Price
partial keys. Dependencies exist when the data is
Chapter 9: Database and file concepts
TASK
Normalise the table of ingredients below to 2N F:
RECIPE-INGREDIENT (Recipe ID. Ingredient ID. Ingredient TASK
Name, Measure, Quantity) Normalise the table of students below to 3NI :
Recipe Ingredient Ingredient Measure Quantity STUDENT (Student ID. Forename, Surname, Class,
ID ID Name Teacher Forename, Teacher Surname)
1 B Flour Grams 200 Student Forename Surname Class Teacher Teacher
1 D Eggs Eggs 2 ID Title Surname
1 K Water Tablespoons 2 1 Hayley Barrow 3 Mrs Stokes
2 C Milk Millilitres 250 2 Harriet Chew l Miss Spicer
2 B Flour Grams 100 3 Jessica Lang 3 Mrs Stokes
Cambridge International AS and A level IT
TASK
The PROJECT table below contains details of the employees working on projects for clients. It is currently in ONF. Normalise
the data to 3NF.
PROJECT
Description
Start Date
End Date
Client ID
Company
Contact Name
Employee ID
Employee Name
Employee Hours
Here is an example of the data:
Description Start Date End Date Client Company Contact Employee Employee Employee
ID Name ID Name Hours
Barton 28/2/15 31/12/16 512 Barton Jerry PK32 Fred Havers 1052
Towers Estates Dean Janice Spring
JH45 575
Haywood 31/3/15 15/6/15 987 Haywood Peter JH45 Janice Spring 153
Manor Estates Gates Mike Rawson
YR27 372
o DISCUSSION POINT
There are also fourth (4NF) and fifth normal forms (5NF)
The database will perform better if it is normalised
because searches can be carried out on indexed fields
and data can be looked up from related tables. However,
as well as another one called Boyce-Codd Normal Form
(BCNF). However, these have little relevance to a designer
each lookup does take time to perform and will use up
of a database and are used mainly in higher academic processor time, which means that some queries that
studies. require access to more than one table may be slow.
As tables no longer contain redundant data, maintenance
tasks such as rebuilding indexes can be completed more
quickly. However, it can be difficult to understand the
Advantages and disadvantages of data stored in each table because foreign keys consisting
normalisation of numbers or codes are used and they mean very little
Normalisation removes duplicate data from a database. to the user. This means that the user will need to build
Not only does this reduce the size of the database, it also queries to look up data from related tables. These
removes the potential for errors and inconsistencies. queries can be quite complex and require expertise from
Data that is duplicated may be edited for one record but the user.
not another, meaning that it becomes inconsistent. This
causes problems when searching for matching data. The database becomes more flexible in that it is easy to
add new fields to tables without affecting other columns
ibaseand file concepts
*
and it is easy to add new tables without affecting • what sort order to use when displaying data
existing tables. Having smaller tables also means that relationships to othertables
data can fit onto one screen or one page more easily total number of records
because there are fewer fields and security permissions validation rules that apply based on multiple fields
can be applied to individual tables. However, it is within the table
also necessary to design the database properly and permissions and security as to which users can
to understand the process of normalisation. This is
access the table.
a high level skill that requires a database designer to
understand the real world data structures and represent
them in a relational database. An average user would
not be able to do this.
6 Identify two characteristics of data in INF. Attribute Data Type Field Size Format
7 Describe one characteristic of data in 3NF. Product Code Alphanumeric 6 XX99XX
8 Explain two advantages of normalisation. Description Alphanumeric 20
Category Integer 4 9999
Code
Price Decimal 3.2 $999.99
9.03 Data dictionary
Product
Validation Rule
Type
Format Must be
Error
Message
Please
m
database Code in the enter a
format code that
of two is two
A data dictionary is a document or file that describes the letters, letters, two
structure of the data held within the database. It is known two numbers,
as metadata which means ‘data about data’. It is a tool numbers, two letters
that is used by database developers and administrators. It two
wilt include the following items: letters
Description Presence Must be Please
• data about fields:
present enter a
field names to identify each field
description
• data types, such as text, integer, date/time
Category Look up in Must Please
field size, such as the length of a text field or the
Code List exist in enter a
maximum value of a numeric field
Category category
format of fields Code in code that
• default values which are values a field is set to be Category exists in the
initially when a new record is created table category list
primary keys, compound keys and foreign keys Price Range Between Enter
indexed fields which improve search times 0.01 and a price
• validation rules that restrict data entry for that 999.99 between
field 0.01 and
• data about tables: 999.99
• the primary key of the table
•
•
-
Jane Atkins
M
Female
o DISCUSSION POINT
Some people get confused with telephone numbers
W6749PR because the word ‘number’ is used. However, a telephone
O’Connor number is actually a set of digits. The number data types
[email protected] cannot include the spaces or hyphens or brackets which
00 44208 5555555 are often used within telephone numbers. The number
data types also cannot start with a zero because numbers
cannot start with a zero. Arithmetic calculations can be
Numeric performed on numbers but not on telephone numbers.
Therefore telephone numbers are stored as text.
Numbers can be stored in two main formats which are
integer and real. Try typing this telephone number into a spreadsheet (without
using spaces) and see what happens: 00442085555555
Integers are whole numbers. These can be negative or
If this was a number it would actually be 442 085 555 555
positive but must not contain decimals.
which is 442 billion, 85 million, 555 thousand, 5 hundred
Real numbers can contain decimals. They can be positive and fifty-five.
or negative.
%
Chapter 9: Database and file concepts
Date/time Microsoft Access you wilt notice that this data type is
This data type is used to store dates and times. The referred to as the Yes/No data type.
number data type cannot be used because it works in 10s,
100s, 1000s, but a date/time data type will be able to work
with days, months, years, hours, minutes and seconds. It
will also enable dates and times to be sorted into a logical
o DISCUSSION POINT
Data is only a Boolean data type if the two possible
order.
answers are TRUE/FALSE or YES/NO. Boolean/logical data
types do not include data like ‘M’ or ‘F’ for Male or Female.
These are actually text data types. Just because there are
two possible answers for the data does not mean that it is
a Boolean.
Dates can be formatted in a variety of ways such as:
18/7/1965
18-07-65
18th July 1965 Select appropriate data types
July 18, 1965 You will need to know how to choose an appropriate
data type for a given situation. You will also need to be
However, they are always stored in the same way: day 18, able to select appropriate data types when creating
month 7, year 1965. The symbols (such asth,/ and -) are spreadsheets and databases. The following guidelines
not stored. They are just displayed. should help you:
software. They store the essential data but will not include
File Type of data Standards organisation
any formatting.
type
PNG Compressed ISO The two main file formats used within databases are CSV
raster and TXT. These were described earlier in this chapter in
graphics with the section about importing data.
transparency
support Indexed sequential access
ePub E-book International Digital Many years ago, data was often stored on tape, which required
Publishing Forum records to be written one after another onto the tape. This
was known as storing the data serially. To access the data, all
XML Extensible World Wide Web Consortium
the records would need to be read from the first onwards until
Markup (W3C)
the required record was found or until the end of the file was
Language
reached. It could take a very longtime to read through a whole
MPEG Compressed Developed by the Moving table of data and so indexed sequential files were developed.
video Picture Experts Group (MPEG)
and standardised by the ISO. Indexed sequential files still store records one after each
other but they are sorted into an order based upon a field. For
example, data about customers might be sorted into surname
order or customer ID order. Sequential files are particularly
Generic file formats useful when data is being batch processed such as when gas
Generic file formats enable data to be transferred between bills are beinggenerated and the master customer file will be
software. Data can be exported from software to a generic processed in order of customer ID and any transaction files
file format and generic file formats can be imported into will also be processed in order of customer ID.
Here is an example of part of a master customer file showing the customers, the date the current meter reading was
taken, the previous meter reading (amount of gas used) and the current meter reading:
Customer ID Surname Date of reading Previous reading Current reading
10 Black 12/1/16 32721 34872
11 Brown 15/12/15 02717 03281
12 White 8/1/16 47270 48572
13 Green 8/1/16 21827 23593
Here is an example of part of a transaction file that will be processed to update the master customer file with new
gas meter readings:
However, when reading the data, it was still necessary to directly access that record without having to read
read the whole file serially from the beginning because through other records.
there was no way of knowing where each record was
stored. Indexed sequential files are stored in exactly the Hierarchical database management
same way as sequential files but the file also has an index
systems
based on the field used to sort the file. A field with an
The hierarchical database model was created in the 1960s
index is known as a secondary key. The index fite stores
and is not commonly used today. The model relies upon a
each secondary key value and the address in storage (e.g.
tree structure where each parent branch is the one side of
tape or disk) where the first record containing that value is
a relationship and each child branch is the many side of a
stored.
relationship. The tree structure can only deal with one-
The index is small enough to store in main memory to-many relationships and can only work in one direction.
and so all that needs to be done to find a record is to Hierarchical databases are only suitable for models which
search the index, find the location in storage and then have a strict hierarchy.
read the records from that point until the record is
One such hierarchy is the file system used within
found.
computer systems. The file system may look something
like this:
Computer
If Employee ID is the secondary key, then an system
index will exist with Employee ID as one column
and the storage address as the other column. HDD SSD
Rather than storing every single Employee ID,
the index may store every tenth Employee ID for
example.
Paul's
documents
Sarah's
documents
Program
files
Windows d
Employee ID Storage address Text book Text book Microsoft System
0001 A8FB2DC3
0011 9AEB08E3 Church Work Adobe Resources
0021 8C4DDDF5
Community Personal Logs
Using MISs
Q Remember
A management information system (MIS) provides
Marketing managers can analyse how effective
a marketing campaign was by comparing sates
figures during an advertising campaign with sales
summary information to managers to enable them to
make decisions. The MIS will collate data from a database figures outside the advertising campaign. This
and present it in the form of reports and charts. These will help them to decide whether to run similar
reports and charts can be produced within the database campaigns in the future.
system itself or they may be part of an additional piece of
software that is used to analyse the data.
QUESTIONS
The additional software is likely to collate data from
12 Explain why generic file types are needed.
more than one database and interconnect the data
from those databases to produce reports that analyse 13 Describe the steps involved to find a file using
all the data together. When additional software is indexed sequential access.
used to collate data from more than one database, 14 Explain why direct access is used for databases in
it is often referred to as an executive information preference to indexed sequential access.
system (EIS). 15 Describe two features of management information
systems (MISs).
A MIS has the following essential features:
• data is collated from databases and other sources
• data is interconnected from different sources
• data is analysed to provide the data that is required by 9.05 Summary
management A database contains structured data in tables which
• summary reports and charts are produced for managers consist of records and fields. Data in fields has a type
that will help with decision making. assigned to it, such as text, alphanumeric, integer/decimal,
The reports and charts are created by people, but once date/time or Boolean.
they are created they can be reused as the data changes A flat file is a single table and has no relationships.
within the data sources. It’s important that the reports Relationships connect entities (tables) together and
and charts provide information that managers need. can be one-to-one or one-to-many. Hierarchical
Chapter 9: Database and file concepts
databases are based on a tree structure to deal with Indexed sequential access involves the use of an index
one-to-many relationships. Relationships are to determine where to start searching a file for a record.
depicted in an entity relationship diagram (ERD). Direct file access involves using a hashing algorithm to find
A primary key is a unique identifier for a record, a the location of a record in a file.
compound key is a primary key consisting of more than Normalisation is the process of structuring data within
one field and a foreign key relates to a primary key in a database and is measured using normal forms. A data
another table. dictionary, known as metadata, describes the structure of
Referential integrity ensures that data exists in a related the data held within the database.
table. Validation rules can be used to ensure that data Data entry forms are used for inputting data into a
is sensible and allowed. Verification is the process of
database. Data can be imported into a database from
checking data has been transferred correctly.
another data source or exported so it can be used in other
Simple queries use one criterion to search for data software. Different software applications require different
and complex queries use two or more criteria. Summary data types in order to store data.
queries can be used to find statistical information
Proprietary file formats are developed by manufacturers
from a database. Static parameters are used in queries for their own software and open-source formats are
when the value of the parameter does not change and
developed for use by any software.
dynamic parameters are used when the user is likely
to want to change the value each time the query A management information system (MIS) provides summary
is run. information to managers to enable them to make decisions.
Review questions
A website accepts donations for charities. Each donor may make several donations to one or
more charities. This information is stored in a relational database.
la Identify three tables that should be used within the database. [3]
lb Describe two relationships that would be used within the database. [2]
lc Explain how referential integrity is important to this database. [2]
An apartment complex stores data about its customers, their bookings and the rooms they are
staying in. The entity relationship diagram (ERD) is shown below:
Apartment Booking
Customer
m
t
/
r
itik
Chapter 10
1
i
t
/
It /
175
Learning objectives
By the end of this chapter, you will understandhow to:
edit a video clip in various ways to meet the requirements of its audience and purpose
edit a sound clip in various ways to meet the requirements of its audience and purpose
describe how video and sound editing features are used in practice
compress video and sound files for different media
1 w f
II M
y
Cambridge International AS and A level IT
10.01 Video editing software Setting an aspect ratio is determined by the media you are
creating the video for. 16: 9 is the current high-definition
Most video editing software will have similar features. standard fortelevision and monitors, and photography
The level and complexity to which these features can often uses 4 : 3 or 3 : 2 aspect ratios.
be used may differ between the software available.
A resolution can also be set for a video. The resolution
Some will allow simple effects and editing to take
is the number of pixels horizontally compared to the
place. Some will allow much more complex effects to
number of pixels vertically. The current resolution for high
be added and editing to take place. Most software has
definition is 1920 p x 1080 p. This means that each frame
a similar set-up in that they have a preview pane to
in a video has 2 073600 pixels.
view the video creation progress and an area where
the editing takes place, often referred to as the Setting an aspect ratio and resolution can be done when
timeline. initially setting up the video project. It can also beset
OftOWWWWMO
IS
Figure 10.01 - Layout of a video editing program, Windows Movie Maker. The preview pane is the black space on the left and
the timeline the large white space to the right.
Chapter 10: Sound and video editing
o ViMMltriUll o
A K X |S| % -ilia
ass“sgr £“:ir L&J
oaoo.oo/ockoo.oo
or changed when rendering a video file at the end of a trim and then highlighting the video to this point, either
project. from the start of the clip, or the end, depending on what
you need to remove. When the trim/cut tool is clicked, it
will remove the highlighted part of the video. The tool can
TASK
also work by dragging the clip from the start or the end,
Change the aspect ratio to each of thesettings available to the point you want to trim to. Some software will allow
in your software package. What effect does this have on you to set a start point and an end point for a clip and will
the preview parte? remove any video that is not within this.
Once you have trimmed the video clips you may want to
join several clips together. Joining together video clips
Trimming a video dip and joining
can be done by dragging video clips in the timeline next
clips together to each other. Clips can also have transition effects
When we trim video clips we cut out parts of the video. applied to make the change between clips more visually
This is mostly from the start or the end of the video. interesting. Joining together clips is done to create effects
Trimming video dips is an essential skill to have when such as jump cuts for action scenes, to start new scenes
editing videos. For a video to be well edited, video or to sometimes imply that time has passed by in the
trimming needs to be a key focus for the project. video.
TIP
TASK
Trimming videos is done to create more concise videos that Import two video clips into your video editing
do not continue for too long, and become boring as a result. software. Trim the start and finish of your video clips
to a suitable point, then join them together. Apply a
suitable transition effect between one video clip to
To trim a video, there is normally a ‘trim/cut’ tool. This is; the other.
often used by simply finding the point in the clip you need
Cambridge International AS and A level IT
|a'u “ -
My Movie Movie Maker X
| rum O
- Set start point Stilt point C.CCi
U X
Save Cancel
Set end point Endpoint 9,31s
turn
CO;W.JO-Uft09.W (3
Item 1 d 1 tea!
----
)
178
-I
Background color *
.A
A
41ii
SegoeUl * -SB • At Transparency
QCOPJ
. A' A’ ti) Start time: rMm **i (*» * _*
ih _
.
Paste B / A mm Edit 4'
- Outline Out i O'
.3
A My Movie
IM
My Movie
0G00.KK»I6.W (3
TT*
Item I cfi
Creating text-based slides and credits effects have to be very carefully timed with what is being
Text-based slides in videos are often used for a title slide said so as not to distract the viewer from the experience.
at the start of a video, or credits at the end of a video to
show who was involved. They were also used throughout
old movies, before sound was part of films, to show what TASK
had been said by a character. Text-based slides can also Add a caption over part of your video to explain what is
be used at the beginning of videos in order to establish any currently on the screen.
background information that may be importantfor the video.
Text-based slides are often created by having a still
image or block of colour as the background. Text is then Adding animation and effects
layered on top of this to give the information needed. Animation and effects can be added as a transition
between video clips and text-based slides. They can be
added to the text on text-based slides and for captions
TASK
and subtitles. They can also be added to the video
Add a text-based slide to the start of your video. clips themselves to change the overall look of the clip.
Introduce the theme or topic of your video on the slide. The animations and effects available can differ greatly
Experiment With any effects available to display the text
between different software, but most have a standard
on the slide.
set including effects such as fading and adding filters.
Adding fade effects to video clips allows for calm,
smooth transitions. It can be used to overlay two
Adding captions and subtitles video clips, which is often used to convey something
Adding captions and subtitles are often done to provide a happening simultaneously. However, mostly it is used
message, emphasise a point or to help the hard of hearing. simply to either gently establish a scene or close one.
This are created by using text, and sometimes visual effects, A slow fade in an action scene could be unsuitable and
that is displayed over a number of frames in the video. These ruin the action effect. However, if it is a scene that has
-
[T'u >11 Tut Tools My Movif •Movie Miker
Animations vtsueiEHerts ©
: / A
- A' A'
Av Transparency
*11*
A"-;
lert Tut duration: :: •
i — H.-i 4
M
A My Movie
00.08.23/00;16. W Q
& ---
-
Figure 10.05 - Example of a caption added over a video clip.
Cambridge International AS and A level IT
-ftSilBhlntii
BPRHBPBEt Apply |«ctl
:
AMyMovI*
Nature is beautiful
oftoau/oftt6.w E
<i !ÿ
C.cl'cnlcl; «S>
---
Figure 10.06 - An example set of filters available in a video editing program. A sepia tone effect has been applied to the
video. This can make it look older.
a solemn note, a fade can be used to enhance that placing the image onto the video’s timeline. A time can then
feeling. Animation effects can be used to create different be set for the length of time the image needs to be displayed.
feelings and provoke different emotions about a video.
The still image may take up the frame or just be part of
the overall view. Having a still image as part of a frame is
TASK what is often done in news programmes. The news anchor
reads the news and has a still image off to the side giving
Add a filter to your first Video to change the overall look.
some context to the story.
Create a credits slide at the end of your movie. Add a
fade effect from your final video clip to your credits. Inserting still images is done in videos for many reasons, such
as adding visual cues in news programmes, to show a close-
up still of a product in advertising campaigns or referencing
Extracting a still image from a video clip something in a review video on media such as YouTube.
Video footage can often contain some frames that would
make excellent still images. Therefore, we may want to take Adding and removing sound from a video clip
one individual frame and extract it as a still image. It would Adding sound to a video clip is often done by importing
then be more like a digital photograph. Editing software will the sound clip and dragging or placing it onto the timeline
often allow you to navigate through the video to a certain of the project. The sound timeline can be separated from
frame and extract that frame to save as an individual image. the video timeline in most editing software. Sound clips
This can be called taking a snapshot in some software, are often added to videos to provide a sound track, a
extracting an image or taking a picture in others. voice-over or to add sound effects to the video.
Removing sound from a video clip in most software is a
Inserting a still image into a video clip simple process. It often requires clicking on the sound
Inserting a still image into a video is usually done by clip, and either pressing the delete key, dragging it
importing the image into the software, then dragging or off the timeline entirely or right clicking and selecting
Chapter 10: Sound and video editing
: U "> < * Video Tool* Mllllt Tooli IWIbOll My Movit •Movie Mik«r
VIJUII effect* Projirt View o
- rrH““ BBJinej.?
f Web wm video ®TUI«
,U.| Cepllon
® Credit» •
EÿIH AL IV *—»
mfi
Nature is beautiful
00c 11.00/00:16.84 0
«« I 1 »ÿ
Figure 10.07 - Example of a sound dip in a video. The sound clip can be seen in green under the video timeline.
TASK
TASK
Highlight part of your video and experiment with
Add a soundtrack to your video. Make the soundtrack changing the speed of the video for that part. What effect
start after your title slide and end when your movie does this have on your video clip? Does it change what
does. You could try adding a second sound clip and the clip shows? Does it make is funnier? Does is make it
have a different soundtrack on your video for your more sad?
credits.
video, the format can be very important. For example could not view videos on websites using them. With the
on YouTube, a social networking video website, you popularity of the iPad growing so much, websites began
cannot just upload any format you want to. It needs to to change their video file formats so that iPad users were
adhere to their rules, so that people can actually watch able to view them.
the video on YouTube from many different devices. Ultimately the format that you export a video to should
match what is allowed by the media you want to work with.
Q Remember
Some formats allow for higher quality but create larger TASK
file sizes and some formats compress video files greatly,
losing much of their quality in the process. MP4 is a Try exporting a video clip into different file formats,
common file format that will compress a large video file Compare the exported files to see what differences can
but retain quite a lot of its quality. be seen between the clips.
m. m # II "In 9 -57 -54 -51 -48 -45 -42 -j ClickTo Start Monitorial -18 -IS -12 -8 -6 -3
0.5- Ilk
=
__
0.(
-0 5T
-1.0
f
Project Rate (Hz): Snap To: Selection Start: o End Length Audio Position:
i 44100
I Off |00 h 00 m 00.000 s- |00 h 00 m 00.000 s7 |o 0 h 0 0 m 0 0.0 0 0 s’-
Stopped.
Figure 10.08 - Example of sound editing software called Audacity. The sound clip imported has two different tracks.
Chapter 10: Sound and video editing
may again differ between the different software available. highlighting the section of the dip that needs to be
Most software has a similar set-up in that it has a way to removed and selecting ‘delete’.
view different tracks in the sound dip. Each track is often
In the same way that video clips can be joined together,
represented as a sound wave.
sound clips can be too. Multiple sound clips can be
To be able to edit sound in the software package, any clips imported, edited and placed straight after the previous
to be included must first be imported into the software. clip. The software will continue from one clip onto the
next. Effects, such as fading, can also be applied between
Trimming audio clips and joining clips together the clips when joining them together.
Trimming audio clips is used in orderto remove
unwanted parts of the clip. This can sometimes be done TASK
to synchronise the sound clip with a video clip. If you’ve
Import two sound clips into suitable sound editingsoftware
already trimmed part of the video, you’d also need to trim Trim each a section off each clip and join them together.
the equivalent audio section in order for the video and the
sound to end together.
To trim an audio clip you simply find what you want to trim Fading in and fading out an audio clip
and then a use ‘cut/trim’ tool to remove the unwanted Like video clips, sound clips can be faded in and out. This
parts. This is often done in sound editing software by often involves the end of one clip becoming quieter and the
15 30
-1
45
2 (Stereo) Recorc
1:00
-|
1:15
( Speakers (Realtek High Definit
1:30 1:45 2:(M)
-1 2:15 2:30 2:45 3:00 3:15
I
iP||Pi|P|P
1,0
r
X) Sleep Awa
Stereo, 44100Hz
0.5-
I
J|||||l 11|. L| iil||iJ J, l{|||| I 1 1 1
J
32-bit float
Mute ! Solo
if
+ 0.0-
9 J
I 111 .'J
yuiim
1 R -0.5- i
9 Mi ii,II. u
-1.0 i
1.0
0.5-
E
0.0-
-0.5-
-1.0
Project Rate (Hz): Snap To: Selection Start: « End Length Audio Position:
44100 Off 2j|0 0h01m59.7 97 s'' |0 0h03ml6.3 20 s'' |o 0 h 0 0 m 0 0.0 0 0 s”
Stopped.
Figure 10.09 - Example of the end of a sound clip highlighted ready to be removed.
Cambridge International AS and A level IT
start ofthe next beginning quietly and getting louder. If a dip is squeaky effects that could be created in speeding the
faded in itwill start quietly and get louder. If a clip is faded out track up.
it will start at a louder volume and get quieter. This is done in
order to create a gradual transition and gentler start to a clip
TASK
that is more pleasant to listen to, rather than just starting a clip
at full volume. Imagine a host on a radio show about to play a Experiment with changing the speed and the pitch ofthe
loud song. Without a fade-in effect, the song would just burst sound clip you have created. What effect does this create
for your sound clip?
into sound and could shock listeners. Instead, it is much more
enjoyable to get a gradual transition over a couple of seconds
to allow listeners to readjust in their own time.
Adding or adjusting reverberation
Fading in or out is normally an effect that can be applied
to an audio track. Normally the part ofthe track that
Reverberation, often shortened to reverb, is the effect
that is created on sound when it repeatedly bounces
needs to be faded is selected and a fade effect can be
applied. You can often choose what volume the clip will back off a surface. In an auditorium, the sound from
be at the start ofthe fade and what it will be at the end of a music band will bounce off all the walls. When this
the fade. You can also often choose how long you want a effect is layered on top of each other, by bouncing
fade effect to last in terms of time. For example, apply a off multiple surfaces, reverberation is created.
fade-out effect to the last 10 seconds of a sound clip. Reverberation is noticed most when a band stops
playing but the sound ofthe guitar and the singer
can still be heard. It lingers on for a time. Adding
TASK reverberation onto a sound track can create a similar
Fade in the start ofthe sound dip you have created for effect. It adds a type of echo onto the section of the
5 seconds, then fade it out at the end for 10 seconds. track selected in order to create a reverberation effect.
This effect can be enhanced and made very obvious,
or can be decreased and made more subtle if you feel
Altering the speed of a sound dip it is too much.
and changing the pitch Most sound editing software will have a reverberation
Altering the speed of a sound clip is similar to altering the effect that can be applied to the sound track. The effect
speed of a video clip. The section ofthe clip to be altered of this can normally be altered, by imitating things such
is highlighted and an effect is applied to the clip to speed as making it sound like the clip is recorded in a large
it up or slow it down. The speed can often be set very auditorium.
accurately with an input method allowing a value to be
entered. Changing the speed of a sound clip has a similar Overdubbing a sound dip with a voice-over
effect to changing the speed of a video clip. It also alters Overdubbing a sound clip is often done to provide a
the mood and emotion felt when listening to the clip. voice-over without removing the noise from the clip
that is already there, such as background noise. This
© Remember
Issues can arise when speeding up or slowing down
sound clips. When playing back a sped up dip the sound
is done to allow many of the originally recorded
sounds to remain, otherwise it becomes a less
interesting clip without some background noise
can appear very high pitched and squeaky. When playing to accompany it.
back a slowed down clip the clip can sound deep and Overdubbing is can be when presenting news dips, using
have too much bass to it.
a translator, reviewing entertainment or just giving extra
information such as in nature documentaries. To overdub,
To counter this, some software is able to allow you you must record an entirely new soundtrack of just the
to adjust the pitch ofthe recording while altering the voice-over work. Once that is recorded it is imported into
speed. This will change the level ofthe sound track to the software as a separate track. This track can then be
be higher or lower in pitch, changing the notes to be edited separately to the other sound track and the two
higher or lower as a result. You may want to lower the can be exported together at the end to create a single
pitch on a sound clip that is sped up to counter the sound file.
Chapter 10: Sound and video editing
I “kÿ'l 9 -S*—84—S1 -48 -42-ÿeick to 'start Monlorlnoÿt -18 -IS -12 -9 -6 -3 o'
II m M
P -S7 -54 -51 -46 -45 -42 -39 -36 -33 -30 -27 -24 -21 -18 -IS -12 -9 -6-3o'
5= _ _
+
?- ITS -W * 4>) "
0 fJHW o o
IMME
-iv'
•30
- —
•y
| [
T
. .
[speakers
? .
Microphone (Realtek High Defi
.v..v 45
1 2 (Stereo) Recorc
1.-00 1:15
| H>) (Realtek high Definit
' m »
Project Rate (Hz): Snap To: Selection Start: o End Length Audio Position.
44100 Off [oo h 0 0 m 0 0.0 0 0 |00 h 03 m 20.542 s’* |0 0 h 0 0 m 00.000
Stopped.
185
Figure 10.10 - Example of inputting values to change the speed of a sound clip.
nj II 9 I V?R -57 -54 -51 -48 -45 -42 -Sÿcjick to Start Monitoring jit -I8 -15 -12 -9 -6 -3 0
mj M
\LP I I | -57-54 -51-48-45 -42 -39 -38-33-30-27 -24 -21 -18-18-12—8—*
-
\
9 t 4>) l O ft -W|AIHU[ o o <S)| Q
MME | yP |Miaophone (Realtek HighJffl Iz./su D. 1 I rn>1L- I'D...IllL y1
Reverb ©
-15 0 15 30 2:30 2: *f°. ,3B». ,
Stereo. 44100Hz
32-bit float
Mute Solo
0.5- Pre -delay (ms): 10
1 0
o + 0.0- Reverberance (%): 50
i o-
L
0
R -0.5- Damping (%): 50
i 0
-1.0
1.0
Tone Low (%): 100
i 0
0.5-
Tone High (%): 100 g 0
E
0.0- 1
Wet Gain (dB): -1 : 0
-0.5-
Dry Gain (dB): *1
i 0
.
-1.0 Stereo Width (%): 100
0
wet Only
< I. m r
Project Rate (Hz): Snap To: Selection Start. o End Length Audio Position:
44100 -r | Off |00 h 02 m 4 3.864 s* |00 h 03 m 15.528 s* |0 0 h 00 mOO.OOO
Stopped.
Figure 10.11 - Example of a reverberation effect that can be applied to a sound track.
Cambridge International AS and A level IT
Binary values
TASK i 7ÿ
Record a voice-over to introduce your sound clip. Z X 10
0 X
Import this into your sound file and apply it to start
at the beginning and lay over the start of your sound
clip.
-1
Z \
Exporting sound clips in different file The sample resolution refers to the number of bit values
formats the sample can be taken on. This can also be referred to as
Like video clips, sound clips can be exported in different the sample depth. In a very simple example, a 2-bit sample
file formats. This will again depend on the desired quality resolution would have four possible binary values. These
of the final track and the media it will be used for. would be 11, 10,01 and 00. A sound wave for this can be
seen in Figure 10.12.
Q Remember
MP3 is a common sound file format. It is a formatthat
This level of depth would create a very low quality
recording and is not sufficient for most recordings. The
higher the sample resolution, the higher the quality
allows most of the quality of the sound file to be retained,
of the file and the more accurate the file will be. It
but compresses the file to make it smaller.
will, however, also increase the size of the audio file
because more data is having to be stored. Digital audio
This means the file is easier to steam or download from is normally found in two different sample resolutions:
music or podcast sites. It is possible to export a sound file 8-bit and 16-bit. 8-bit sampling can sample 256 different
without compressing it. This can be done with file formats values. This would still produce quite low quality
such as .wav. audio. 16-bit sampling can sample over 65000 different
values. This is a higher quality than any human ear can
recognise.
TASK
Research further file formats such as Ttac, .wma and 10.03 Summary
.alac. How are they different? What kind of compression
do they use? What can they be used for? Most video and sound editing software that is available
have very similar features. The level and complexity to
which these features can be used may differ between the
Sampling rate and resolution software available.
The sampling rate is the number of samples of the There are many different features that can be used
recorded sound taken in a second. The sample rate to edit a video. In most cases, you will need to set
is normally measured in hertz (Hz) or kHz (1000 Hz). A the aspect ratio and the resolution of the video, then
sample rate of 40 Hz would mean that 40 000 samples of export the video in a suitable format at the end. The
the sound are taken in a second. editing that happens between this will depend on the
The more samples taken in a second, the higher the effect you wish to create and the software you are
quality of the sound file. Therefore, the lower the using.
amount of samples taken, the lower the quality of There are many different features that can be used to edit
the track. When the sample rate goes beyond 50 kHz sound. In most cases, you will need to import the sound
it is thought that the human ear will not be able to ctip(s) into the software to be edited, then export them
recognise any further quality in the track. The standard in a suitable format at the end. The editing that happens
sampling rate used by most digital recording equipment between this will depend on the effect you wish to create
is 48 kHz. and the software you are using.
Chapter 10: Sound and video editing
Review questions
1 Describe how changing the speed of a video clip can be used to effect the mood or emotion
of the clip. [4]
2 What is a frame in a video file? [2]
3 What is a track in a sound file? [2]
4 Describe how overdubbing is used in sound tracks. [4]
5 Explain what is meant by sample rate. [4]
'
j|9in
[r-iif *>
2J1
• ft?)
r" ' ., -
PJP*
''I
*-•
7
fm wt
>r>; *y
.
•&
«M'
£
ISIV gfer%vf £g
-
.*
'
-1
•iWil L-
earning objectives
By the end of this chapter, you will be able to:
describe a wide range of emerging technologies, including how they work and what they are used for
evaluate the impact of emerging technologies on individuals, organisations, the environment and medicine
discuss the advantages and disadvantages of storing data in the cloud
>>
y
Chapter 11: Emerging technologies
• In China, it has recently been used to create houses 11.03 Fourth generation
using large-scale printers.
and fifth generation cellular
• It has been used by the National Aeronautics and
Space Administration (NASA) to print different tools
communications
and automobile parts, and spare parts for vehicles in Cellular communication is progressing through different
space. generations. Initially we had first generation (1G), then
These examples show that 3D printing has a great potential: second generation (2G). This developed into third
generation (3G) and now that has advanced into fourth
• Using a 3D printer to build houses could mean that generation (4G) and fifth generation (5G). All of the names
in the event of a natural disaster, which left many refer to the generation of wireless communications that
civilians homeless, the affected people could quickly be the technology has gone through. 3G developed in the late
rehoused. 1990s and early 2000s. This has more recently developed
• In medicine a big issue is often the long waiting lists for into4G and we are now starting to see 5G.
organs. In the future this may not be an issue as organs
may be printed on demand. Individuals may not have to
worry about theirshort life expectancy or if an organ will
be a blood match.
© Remember
The aim of each different generation development is
to improve the speed and capability of the wireless
• In space, a team may not need to abort its mission if part connection. It is only data that is carried by the later
of the spacecraft becomes broken. It could print out a generations though, as voice is still mostly carried using
spare part using a 3D printer and replace the broken part. 2G technology.
People felt that the speeds reached by 3G technology The development from 3G to 4G technology and further
were better, but that speed and access could still be developments into 5G technology will enable a number of
improved regarding the internet and mobile devices. This advancements. These may include:
encouraged the development of 4G technology, the 4th
generation of mobile communication standard.
• greater speed in internet access
• faster loading speeds of applications, such as maps
The development of 4G technology provided two main • the ability to have multiple people in video conferencing
benefits, increased upload and download speeds and calls
reduced latency. 4G technology is approximately five times
• more effective location services to allow for real-time
(and sometimes more) faster than 3G technology. This
updates, such as traffic and weather
meant that the speed at which files could be downloaded
was significantly increased. This increase in speed
• the ability to stream high-definition (HD).
meant that files could be downloaded in a much faster The development of 4G (and in the future 5G) technology
time. Typically with 3G technology, a 2GB file could take can affect the use of mobile devices in many ways. With the
approximately 30 minutes to download. However with 4G increased speeds and reduced latency of the technology,
technology that download time could be potentially cut organisations can make use of mobile technologies in
to approximately 3-4 minutes. This significantly improved their business. This means that workers could be travelling
the experience of mobile devices and internet usage for around meeting clients and having meetings and still keep
the user. in touch with each other and the organisation through the
use of applications such as video conferencing facilities on
The deduction in latency with the development of 4G
mobile devices. They could also use their mobile device as a
technology also improved the experience of using mobile
navigation device to aid theirtravel.
devices. The reduction in latency means that 4G enabled
devices get a quicker response time to the requests The development of 5G technology could influence key
made by their mobile device. The quicker response time areas of society, such as medicine. It will be critical in
improves the experience of streaming online video and enabling specialist doctors around the world to watch
playing online games using mobile devices. and advise in an operation on a patient located in a
completely different place. This would mean that the
Access to 4G technology is still limited in many areas.
best medical attention could be accessible to a person,
Many countries are trying to build the infrastructure to
no matter where they are in the world, as long as the
provide as wide a coverage as possible to enable a 4G
technology needed is available. The doctor would not
signal to be accessed.
need to travel to perform the surgery and may be better
prepared and more rested as a result.
© DISCUSSION POINT
Find out what developments are being made in your 11.04 Artificial intelligence
country to make4G technology accessible.
One of the earliest pioneers of artificial intelligence was
Alan Turing. During World War II he cracked the Enigma
code, the code generated from the Enigma machine used
The race to develop the next mobile communication
by the German army to communicate, and decrypted
standard, 5G technology, is well underway. 5G technology
German messages. He became intrigued by the possible
is set to dramatically affect the use of mobile internet. In
intelligence of machines. This came from the notion of
order to provide 5G access there is a major restructure
providing machines with heuristic knowledge to enable
occurring on parts of the radio network that is used to
them to make decisions in a way more like humans.
transmit data. This restructure is reported to allow data
to be transmitted approximately 100 times faster. In a test
of 5G by Samsung in 2013, a high definition movie could
be downloaded in less than 30 seconds. It is thought that
Q Remember
Artificial intelligence is when a computer is able to make
5G technology has the potential to eventually provide decisions based upon stimuli, much as a human would.
Artificial intelligence is very hard to create. Some say that
much faster speeds than this, speeds of approximately it is not at all possible to have a computer think like a
800 Gbps, meaning that 30 high definition movies could be human being. Artificial intelligence systems are made by
downloaded in a single second! programming rules to be obeyed.
Cambridge International AS and A level IT
True artificial intelligence can also be learnt from actions However, artificial intelligence is not without its issues:
taken and modifying behaviour based on them. This can
give the illusion that a computer can think; but in fact it is
• In the case of self-driving cars, there is a debate about
who should pay in the event of an accident on the road,
still responding to programmed elements.
where the self-driving car is at fault. Should the user
A simple example of artificial intelligence is an opponent have to pay? Should the company who made the car
in a game of Tic-Tac-Toe/Noughts and Crosses. If you were have to pay? This issue is as yet unresolved.
to place an ‘X’ in two corners, a computer would know • Voice activated systems are improving, but they still
to place its ‘O’ in-between your ‘X’s, in order to prevent suffer from lots of input errors. If artificial intelligence is
you from winning. This is a very low-level example of dependent on a voice-activated system, it will be limited
artificial intelligence. A well-known example of artificial by the ability of this system.
intelligence is the computer system Deep Blue. Deep • Artificial intelligence is only as good as its programming.
Blue is a computer that plays chess. The more chess If there are errors in the programs that allow the
Deep Blue played, the better it became at chess. This is intelligence to be created, then it will not operate
because it was able to learn from the errors it made in correctly.
previous chess games and become a better chess player
as a result. It became so intelligent that it was the first
computer ever to beat a world chess champion at the
V m
*
j
game. * r.
• Some people feel that their human rights are being that a reasonable computer, or console, can be used
violated through the collection and use of their alongside cloud computing to perform tasks far beyond
biological data for security reasons. They feel that it is a the capabilities of the computer on its own.
huge invasion of their privacy to have this kind of data There are issues with cloud computing:
stored and used in this way.
• A big issue is security. If someone hacked into one of
the services for file management and started reading
ni1
Cheek-In [ÿ] 4, people’s files, this could reveal personal details that could
be used for acts such as credit card or even identity theft.
• Another concern is the need for a constant internet
connection. This is not an issue for some. However, not
everyone has a connection all day or even just one that
does not get interrupted periodically. This is an even
•• 4 bigger issue when you consider that the provider you
choose might have a power outage, which means that
Mat
Figure 11.04 - A biometric passport control system.
even if you did have a perfect internet connection, you
still would not be able to access your files. Therefore it
is important to regularly synchronise the files from the
cloud with the files on the computer or device, to make
sure that the data is always accessible.
11.07 Cloud computing
© Remember
Cloud computing is where a collection of servers are
used to store or process data instead of doing this on your
own computer. Your computer simply needs an internet
6 t *,
connection in order to communicate with the bank of
servers. A
A number of uses have been developed for cloud
computing:
IQ
Figure 11.05 - Data from many different computers and
• There are many online services that provide cloud devices can be uploaded into the cloud.
computing services, most of them emerging in the late
2000s. Providers include Dropbox, Google Drive and
Microsoft’s OneDrive, along with many others. These
11.08 Computer-assisted
services allow you to upload your own files and manage translation
them. This means that you can be away from your
computer and still be able to access those files through
the online service.
Q Remember
Computer-assisted translation tools work by giving
• Data can be uploaded onto a cloud from numerous the software either a document or a string of text. The
software then removes anything that is not text, such as
mobile devices. This means the data can then be
pictures or tables, and simply takes what is left over and
accessed by each device that has access to the cloud. translates it into the language of choice.
This is a great way of sharingfiles between yourown
personal devices and with others. There are some well-known computer-assisted translation
• Cloud computing can also be used to process data. tools, such as Google Translate.
The game Crackdown 3 uses cloud computing to
Access to computer-assisted translation can have its
outsource the calculations needed to be able to render
benefits:
the destruction of very large buildings. Therefore a
high-quality effect can be achieved, while not affecting • When in a foreign country, as long as an internet
the performance of the console too much. This means connection is available, a person can quite quickly and
Chapter 11: Emerging technologies
easily translate words and phrases by entering them into One of the largest issues with holographic data storage
a site such as Google Translate. This can improve their is the cost. The drive to read the data costs thousands of
ability to communicate with people in that country. dollars and each medium used to store the data will cost
• It can be used to translate whole documents and hundreds.
websites into a language of choice, quickly making it Fourth generation optical media refers to the next
possible to read them. generation of the traditional optical media we know about,
There can be issues with computer-assisted translation: at present. The third generation of optical media allowed
the storage of HD video, with the ability to store data files of
• Sites such as Google Translate are designed to give around 400GB. The fourth generation will bring about the
direct translations, rather than the meaning behind potential to hold up to 1TB of data on optical media. This
the sentence. This means that if you enter a French will be done by using smaller pits and lands (the indents
sentence, the structure is kept the same when it is made on the disk to record data), and using more layers.
translated into English, which can break the grammar.
As an example ‘the blue car1, when in French, might be
directly translated as ‘the car blue’ in English. There 11.10 Holographic imaging
are, however, more sophisticated computer-assisted Holographic imaging, sometimes known as holography, is
translation tools than many of the web-based services, the ability to make holograms. A hologram is a 3D image
which are designed to overcome this issue, such as that is created with photographic projections. A hologram
OmegaT or memoQ. is a free-standing 3D image that you can see around. It
• One of the biggest issues is being able to restructure does not need to mimic depth like a 3D image or virtual
grammar across translations, picking the correct reality. In time, it may become possible to transmit a
meaning of a word that has multiple uses, and also hologram electronically to special devices in our home or
handling issues where there is no actual translation for workplace. Think of the possibilities this could create!
the word in question.
Bj
11.09 Holographic and fourth DISCUSSION POINT
How could the introduction of holograms that can be
generation optical data storage transmitted into our home change the way we live?
o Remember
The traditional methods of data storage, magnetic and
optical, rely on each bit of data being stored as magnetic
11.11 Quantum cryptography
Quantum cryptography is thought to be one of the safest
or optical changes on the surface of the medium.
Holographic data storage works by recording data
ways to encrypt data. Most encryption methods use
throughout the volume of the medium. mathematics and algorithms to encrypt data. Quantum
cryptography uses physics.
Holographic data storage is a developing medium of high
capacity data storage.
Magnetic and optical storage methods store data in a
Q Remember
The process of encryption is carried out in a similar way to
linear way: each bit is placed side by side. Holographic mathematical algorithms, in that it uses a key. This key is
data storage can store bits in parallel, meaning many bits generated using photons, which are tiny packets of light.
The key scrambles the data.
are stored layer upon layer.
Holographic data storage can be beneficial as it can The data will then be transmitted using fibre optic cable.
provide companies with the ability to archive vast The reason the encryption is much safer is because it is
amounts of data fora long period of time. This is because much more difficult to crack the key. In a normal key, a
this medium will degrade a lot less than others. Many mathematic algorithm would be used, but a human could
argue, though, that this benefit may not be completely actually manage to recreate this algorithm and decrypt
worthwhile. Technology develops and moves on so the message. The key in quantum cryptography is made
rapidly that in years to come the technology to read the up of a stream of light particles that individually vibrate in
holographic storage may no longer be available. all different directions. Creating these different vibrations
Cambridge International AS and A level IT
is called polarising. Once transmitted, the light particles Robots can cause issues:
will then be passed through a filter that will reverse the
polarisation and unscramble the data.
• Many people get angry when humans are replaced by
robots to do certain tasks. This takes away jobs from
When the tight photons are polarised, it is not possible people, and often their livelihood.
to accurately measure their activity, it is only possible by • Many people get scared by the ability of robots, especially
using a device to reverse the polarisation. This is what when they are equipped with artificial intelligence. They
makes quantum cryptography a very safe method for fearthat robots could begin to overpower human beings.
data transmission. • Robots cannot respond with any kind of emotion and
At present, quantum cryptography has been successful can only carry out the task(s) that they are programmed
over short distances of around 60 km, but it is yet to prove to do. They can become a little more sophisticated
it can be used without error over longer distances. if they are programmed with a level of true artificial
intelligence. With this, they may be able to respond to
learned situations and experiences and provide a more
11.12 Robotics human-like response.
© Remember
Robotics is the creation of computers that perform tasks
that humans cannot or are less efficient at performing.
m: il'n
The word robot itself has a Slavic origin, robota, which means
slave or work. A robot works by having a processor that
controls its movement. This can be a set task, for example
it *
I &'*ÿ
moving an arm forwards and backwards, repeatedly, or 1“ t 6.
its action can depend upon the environment it is in. This
LA
requires sensors to be attached to the robot and they feed
data back to the processor so it can decide what to do next.
I
© Remember
Robots are heavily used in manufacturing, for example
moving items down a conveyor belt or moving heavy
Figure 11.06 - A robot arm at work in a factory.
•
dangerous atmosphere, such as in a chemical factory.
They can provide great entertainment value and can be
used for many everyday tasks.
0
Figure 11.07 -QR code.
Chapter 11: Emerging technologies
QR codes can be used to provide information in a variety Smartwatches are not as popular. This is mainly due
of ways: to their price, but they perform similar functions to
fitness devices, as well as allowing you to pair them
• Some gyms have QR codes on the equipment to show with your smartphone. Currently a range of companies
you how to use them, as well as providing information
make smartwatches, including Microsoft, Apple, Sony,
about what muscle groups are being used.
Motorola and Pebble. Products such as Google Glass
• They can be used on foods to share more about the also count as wearable technology. These headsets can
company who makes the product, or about the product send the wearer news updates, incoming messages and
itself and its nutritional information. information about where they are and directions for
• They are used for marketing purposes. They are printed where they’re going.
in magazines or other advertising outlets to attract a user
into scanning them and viewing the marketing material. There are also some wearable technology T-shirts, often
displaying either a message or a .gif type image that
• They are an easy way of giving the user the choice to
learn more about the product, instead of overloading moves, such as an equaliser for music. These serve no
function otherthan to look stylish and fashionable.
the product packaging itself with information.
• They can be used as a triggerto open different applications. There can be issues with wearable technologies:
They can also register data within the application.
• They are easily subject to moisture, especially fitness
However, QR codes have several issues: devices, and this could affect the operation of the
technology. This could break devices if they are not
• As they are based on image processing, the QR code can
protected or built for dealing with it. They need to be
only be scanned if there is enough light for the code to
carefully designed and be able to deal with this potential
be fully recognised by the camera.
issue, which may increase the cost.
• Companies have to be very careful about QR codes
• Another problem is with connectivity. Using Bluetooth ..
being distorted when they are resized, as the image may
and wireless networks to send data back and forth
not be exactly the same as before and therefore will not
does mean that people may try to hack the connection
scan and link to the information.
and gain access to private information and documents.
• They may require less text placed on a product. However,
they need ample space so as notto interfere with the
recognition of the code. Any text or image that is too
close to the code can make the code very hard to read.
• As QR codes often act as a link, if you do not have a
t SL
stable internet connection, then you may not be able to
access the linked information.
Q Remember
Wearable technology can take many forms. However, there
are two major forms with which most people are currently
familiar. These are fitness devices and smartwatches. Figure 11.08 - A range of smartwatches that are available.
SPIV"
Cambridge International AS and A level IT
There is a constant race to create the next better, more Discarding technology into landfill is bad for the
efficient, more glamorous, more functional technology. environment. If people choose to do this the amount
This means that more and more technologies are of landfill created will be great. Some countries have
emerging all the time. As a result many technologies, such incentives in place to recycle old technology and
as mobile devices, have become far more throwaway this can discourage people from discarding the old
than they were. The desire to have the newest technology technologies into landfill and having a negative impact
encourages people to discard the items they have in on the environment.
favour of the functionality and services provided by that
new technology. This creates a problem with how to deal
with the technology that is being discarded. 11.18 Summary
Technology is constantly developing and affecting our life
V in a variety of ways.
From faster internet speeds, more accurate and safer
/ systems, to enhanced enjoyment through improved
entertainment, technology is having an impact on
areas of our lives such as sport, manufacturing and
medicine.
y
*
Figure 11.09 - The Samsung Gear virtual reality experience.
Review questions
1 Discuss the impact 3D printing has on medicine. [8]
2 Evaluate the impact of artificial intelligence being used to create self-driving cars. [8]
3 Discuss the impact of emerging technologies on our personal entertainment. [8]
V
Chapter 12
The role and impact of IT in society
Learning objectives
By the end of this chapter, you will be able to:
m explain how technology is used in e-business and evaluate the impact of technology on e-business, society and learning
evaluate the impact of digital currency
discuss how organisations mine data
evaluate how social networking has changed social patterns
describe video conferencing and the hardware and software used
describe web conferencing and the hardware and software used
discuss the advantages and disadvantages of video conferencing on employers and employees
discuss the advantages and disadvantages of web conferencing on employers and employees
describe teleworking
discuss the effects of teleworking on employers and employees
Chapter 12: The role and impact of IT in society
Q Remember
Information technology has caused the rise of online
personal details and use their login details (or set up new
ones) to access their online account using the app.
shopping by providinga more convenient platform on which Online banking services now allow people to check their
to sell items toa customer or purchase items asa customer. bank account quickly using technology. They can carry out
most banking services online, such as:
One of the main advantages of this is how quickly the
• checkingtheir bank balance
customer is able to receive products. Online shopping
has become even more popular with the rise of smart • viewing bank statements
devices, because of applications that allow you to order • setting up direct debits
anything online by using your phone, regardless of where • applying for loans and overdrafts
you are. This is even more convenient for the customer as • paying bills
they could be out shopping, not able to find their product • transferring money between accounts.
in store, but able to order it from the online store straight
To be able to use services such as these, people would
away from their phone.
previously have needed to go into a bank branch. Often
Online shopping can be better for the environment, as they would only have one or two local bank branches, so
less vehicles may be used as people are not driving to their choice may have been limited if they wanted their
shops. This will depend on whether the amount of people branch to be close to home. Also, those people that live in
travelling to the shops is reduced by people shopping remote locations may have had to travel a great distance in
online. Some people argue that the amount of vehicles order to get to a bank. The introduction and developments
on the road that are delivering the online shopping does in online banking have allowed people to have more choice
not make it much better for the environment. It is also over which bank to choose and saves people a lot of time
very difficult for people to see the quality of products in using banking services. There are many benefits brought
online or check the size of them. This can mean that many about by online banking, these include:
- - 53
--
• Needing to visit a branch less as many services can be check the security of any online website that you use to
used online. carry out any financial transactions.
• Avoiding queues in bank branches.
•
•
The ability to use banking services 24 hours a day,
7 days a week.
Using banking services without leaving home.
o
I TIP
The simplest way to check that the website has a secure
• Viewing transaction online without needing to wait for protocol is by looking for https:// at the start of a website
paper statements to be delivered. address, or the security padlock symbol.
see how much stock for a product a business currently While digital currency can quickly overcome the issue of
has in its stock room or warehouse. This system can then exchange rates, it has a level of anonymity that appeals
also be programmed to reorder stock when it gets below a to criminals. It is used in a lot of transactions involving
certain level. This means that a business does not need to criminal activity, especially on the dark web (a collection
manually count and reorder stock when it is running out. of websites that will not appear when using search engines
As new stock comes into the warehouse, the barcode on and hide the IP address of the server that runs them). This
the product can be scanned and the total stored for that is because it is far less likely for the criminal to be traced as
product will be updated. This means that the business the transaction is anonymous.
can measure how much new stock has arrived in the
Digital currencies can also fluctuate a great deal more
warehouse and add it to the previous total. than most standard currencies. This could result in a
By automatically monitoring stock, a company can great amount of money being made for those people who
perform checks to see whether the stock the system invested by using the currency at the right time, but also
shows they should have actually matches the physical a great deal of money being lost by those people who
stock they have manually counted. If the two stock levels invested at the wrong time.
do not match, for example the physical stock level is lower
ft
than the one shown on the system, this could highlight
possible theft from the store. The business could then
monitor this to establish how and why it is occurring. r
Automatic stock control can be carried out in two ways. The
stock control system could be real-time or batch. If it is a
real-time system it will process each addition or deduction
A
to stock as it is sold or enters the warehouse. This type of 1
1
stock control system is used by businesses such as large V- * 203
supermarkets. This is because they sell large volumes of
stock and need to restock regularly. A stock control system
can also be batch. In this kind of system each item of stock
sold, when scanned, is recorded in a database in a file
called a transaction file. At a suitable time, normally during
an off peak period for the business, for example when it is Figure 12.02 - The currency symbol that is used for the
closed, the transaction files will be processed and a master digital currency Bitcoin.
file in the database will be updated.
TASK
12.06 Digital currency Research two further digital currencies.
Digital currencies are an internet-based form of money.
They have a value that can fluctuate much like normal
currency. However, they can be used instantly and without
12.07 Data mining
the need for exchange rates. This can be seen as beneficial Data mining is the act of sorting through large sets of data
when tradinginternationally. to identify patterns and establish relationships. The goal
of mining data is to extract information from sets of data
that can be used to inform and instruct future decisions,
Q Remember
The simplest way to check that the website has a
by identifying past and present trends.
Data mining normally involves analysing data in different on many different topics so that other people can post
ways. These include: replies. Many people use this to get advice on a variety of
subjects and areas of interest. The forms of communication
• Anomaly detection - identifying unusual data that may in each of these services is slightly different and allows for
require further investigation.
different forms of expression. Most have developed to try
• Association rule - finding relationships between variables. and cater for people who want different things from social
This is how recommendation services work forshopping networking websites. Access to social media sites can be an
sites. issue because content disseminated can be inaccessible, for
• Cluster detection - identifying groups and subgroups example, frequent hashtags, abbreviations or acronyms are
in data. not easily decipherable for people with certain disabilities.
• Classification - classifying data into existing groups or
There is also a great concern for young children growing
categories. This is how a spam filter works for an email.
up, who see these sites, and the communication that
• Regression - creating predictive models based on a range takes place on them, as normal. There is a fear that
ofvariables.
this will leave them unable to recognise social cues
Data mining is a huge step forward for businesses. If they and body language, harming their ability to socialise
are able to predict what will be wanted beforehand, they are properly. It is also easier for them to access, or be
able to make the most profit by changing what they offer targeted by, inappropriate content or communication.
early, to easily meet the new demand.
TASK
Research how websites track your online activity
r
and use it to target you with advertising on social
network sites.
as Open Diary, LiveJournal and Blogger all launching during To carry out a video conference, a range of equipment is
1998 to 1999. Blogging started as the work of one person on needed. This includes:
a single topic. These were often quite personal, such as an
individual opinion on changes in their industry, or something
• a computer system
more personal, such as events in their life. • a web cam
• a microphone
Bloggingthen became even more popular and the amount
• speakers
of authors and subjects increased. Blogging, in fact, has
• a good broadband connection
become so universal as a form of social networking that it
has expanded into several formats. Microblogging is a new • video conferencing software.
format of blogging and is carried out on sites such as Twitter, Specialist video conferencing systems can be purchased
Facebook and Tumblr. Microblogging is when people use that incorporate all the equipment needed to make a
short and frequent posts to inform their followers about video conferencing call.
what they are doing. Video blogs or ‘vlogs’ have become a
Video conferencing has a range of advantages and
popular video format on sites such as YouTube. The content
disadvantages as shown in Table 12.01.
is the same as a normal blog but, with the added visual and
audio cues, points can be presented more coherently. This Advantages Disadvantages
can feel more personal as the person is vocally describing Employers do not need A video conferencing
their passion for a subject. Blogging has become such a huge to pay expenses for system that is suitable for
part of social interaction that some people are able to make employees to travel to business use can be very
money through it orturn it into an actual business. meeting venues._ costly to buy initially.
The effects of these forms of social networking have Meetings can be carried Employees may be in
their benefits and drawbacks. The ability to find others out, without the need to different time zones and
who think as you do can be a comfort to people because travel, between employees this could mean that some
humans like to feel part of a group. Followers of certain from many different employees will need to be
social media figures describe themselves as fans, and offices. present for the conference
can feel as if they are friends. Flowever, those figures outside working hours.
have sometimes abused this by launching online People can be seen as well It may not be possible to
hate campaigns against those with whom they have as heard, so additional see all people involved in
disagreements, rallying support from otherfans. This has conversation aspects can the meeting at the same
also happened in reverse, with some people attacking be seen, such as body time, using the camera.
others even without the public figure wanting them to do language. This would not happen in a
so, because of a public disagreement between the two. face to face meeting.
Social networking has brought the world together in many
Documents can be shown, If any person’s equipment
different ways. At the same time, it has also created some
shared and emailed. breaks down they are
very large divides. The anonymity that people are able to
This can encourage the not able to be part of the
have online, if they choose to, can cause them to do or say
generation of ideas from meeting and may miss
things that they would never do in a face-to-face situation.
employees. _ vital contribution.
It is also nearly impossible to delete data from the internet
once it is published, so once someone has posted text, A very reliable and fast
photos or videos to a social networking site, it is extremely internet connection is
difficult forthem to take it back. required to effectively carry
out a video conference.
This can be an extra cost.
12.09 Video conferencing
Table 12.01 -Advantages and disadvantages of video
Video conferencing is when computers are used to provide
conferencing.
a video link between two or more people. Previously
people made conference calls by logging into a telephone Ultimately, a business will need to look at the benefits of
based system and several people could speak on a using video conferencing against the drawbacks of not
telephone call at any one time. Video conferencing aims to meeting face to face. Video conferencing may mean global
provide this same service, but with the added addition of meetings between employees are much easier to organise
video, so people can see each other as they speak. and cost less because of the lack of travel. Flowever, the
Cambridge International AS and A level IT
distractions in their home and their productivity may of the officials judging the match. Some feel this is a
suffer as a result. welcome addition to the game as it can help the decision
making process become more accurate. Some feel that
If an employee can work from home, this can save on
the system used is not very accurate and will often provide
costs as they will not need to travel to their place of work
incorrect outcomes as a result.
every day. Reducing this travel can also have a positive
effect on the environment as not as much fuel is being
used by transport, so, in this way, the carbon footprint is TASK
lowered. However, the employee will need to use extra
Research the use of Hawk-Eye in tennis.
electricity being at home all day, so the effect may be
countered by this, thus harming the environment.
Teleworking has a number of advantages and
disadvantages for an employer. If an employer does not 12.14 Technology in medicine
have as many employees in an office at any one time, In medicine, technology has given us the ability to monitor
they may be able to have a smaller building, less facilities patients and make sure they are healthy. We’re able to
and use less energy. This will reduce costs forthem, quite measure their heart rate, analyse DNA samples to see if
considerably in some cases. However an employer may an infection is present, and even use technology to train
feel that they have less control over their employees doctors and nurses in how to perform certain procedures
as they cannot see them to monitor how much they through simulations.
are working. They may also have to worry about the
confidentiality of any sensitive documents. They will need Technology has enabled many advancements to occur
to rely on an employee to store and them safely if they in medicine. It is now possible to provide people with
have them in their home or another location. artificial limbs that can be controlled through the use of
a manufacturing
Manufacturing uses robotics to create assembly lines of
products such as cars, where heavy elements like the
Codecademy for learning computer coding, or offering
accredited courses on websites such as Coursera and
Udacity. This means that people can now gain access to
teaching often without a fee, other than the cost of their
chassis are moved to an area where humans can then fit
internet connection. This also means they are able to
items to them to build a car. This has meant that humans
learn at their own pace and in their own time. With sites
can be removed from working on the more dangerous
such as YouTube, they also have a greater level of visual
elements of manufacturing. By using robotics in
aids available when learning. The quality of the resources
manufacturing, it is possible to create a more consistent available through these sites can often differ greatly. There
and accurate product. This is because the robot can be is also no governing body looking at the level of teaching
programmed to produce a product and will do this to the that is taking place, as there often is with schools. This
same standard repeatedly. A human may differ in their means it may be difficult and time-consuming for a person
standard of production depending on the mood they are to pick through all the tutorials they can find to get one
in or how tired they feel that day. Also, if a manufacturing that is of a high quality. It could also mean that a person
system is completely robotic, it can run for much longer could use a tutorial that teaches them incorrectly.
periods of time and will not require the same level of
rest as a human. With the correct level of maintenance, One of the biggest online learning methods is through
robotic manufacturing could be set to run for 24 hours a the use of massive open online courses (MOOC). These
are courses that are not limited in the number of people
day.
that can access them and have open access using the
Some feel that the introduction of robotics into web. MOOCs are mostly free and will be used by a large
manufacturing has resulted in a loss of jobs for people. number of learners of a topic at any one time. They will
This has often created animosity toward the use of often include filmed lectures and other resources, and
robotics in manufacturing, despite their benefits. Also, have forums that can be used to interact with other
if a company cannot afford the robotic equipment, learners and the educators. MOOCs allow people in similar
this can sometimes put them at a competitive industries to learn more about their industry from other
disadvantage against those companies in their people within that industry. They allow this to happen at
industry that can. the convenience of the learner.
Chapter 12: The role and impact of IT in society
Online courses can vary a lot in terms of quality, cost Information technology has helped with the rise of online
and the subjects offered. Whether it is for self-interest or shopping by providing a more convenient platform on
accreditation, it is often much easierto learn at your own which to sell items to a customer or purchase items as a
pace and in your own time. It can sometimes be difficult customer. Online shopping has also become even more
to find the exact course you want as there are so many popular with the rise of smart devices. This is because
available. Another issue with online learning is finding there are applications available that allow you to order
effective teachers that are able to break down problems anything online, using your phone, regardless of where
and help students in the process. This is partly because of you are.
the difficulty in finding someone who is capable, but also Online banking is growing, with many banking services
it can be because of the way how the customers want to now being available online.
learn. Do they prefer to be lectured or do they want a small
bit of information a nd then be set off on a piece of work Digital currencies are an internet-based form of money.
and learn as they go? The currency with which most people are familiar is
Bitcoin.
Q Remember
One of the greatest benefits of people being able to learn
Data mining involves finding trends and then applying a
theory to new data sets in order to try and validate the
through the use of technology is that it is easier for people changes that are occurring. The overall goal is to be able
to improve themselves or help their own career. to predict changes before they actually occur.
The use of social networking is ever growing. It has
12.17 Summary had both a positive and a negative effect on our social
An e-business is one that performs either all or the patterns, bringing us closer together, yet creating issues in
majority of their business online. They use a variety of our lives at the same time.
technologies to carry out their business transactions Technology can be used to enhance learning in a great
online. E-business is constantly growing as it has many way. Education is now more accessible than ever with a
benefits to both the business and the customer. variety of free and paid-for courses available online.
Review questions
1 Explain what is meant by a digital currency. [3]
2 Discusstheimpactofonlineshoppingforthecustomer. [6]
3 Evaluate the effect that social networking has had on our social patterns. [6]
4 Explain what is meant by data mining. [4]
5 Describe two benefits of software-based training. [4]
Hi
aajM
§2!
i
p 1
» I
-08
Si
.
I
Chapter 13: Networks
data packet that it receives and sends the data packet to the device can transmit data to the wireless access point,
desired port where it will be transferred to the next device. which will then either send the data on to the switch or
directly to another wireless enabled device that is using
Hub the same wireless access point. Similarly, data that is
transmitted from elsewhere in the network can be sent to
a wireless access point to be transmitted wirelessly to a
wireless enabled device.
ff
t *:
Computer]
J
power source and receives data packets from an incoming
network cable. It will then retransmit those data packets
along its outgoing network cable. This is necessary when
long cable lengths are required (typically over 100 m)
and the signal would not be strong enough to reach the
destination on its own. A similar degradation of signal
happens with wireless access points and so wireless
iiia:!!:! repeaters carry out the same function with wireless signals.
Gateway
A gateway connects two networks of a different type. It
Figure 13.05 - Domestic router. is typically used as a router to connect a LAN to a WAN.
When data leaves one network to move onto another
A router is often used as the gateway to a network and network, it must passthrough the gateway.
in most cases connects the local area network (LAN) to
the internet via an internet service provider (ISP). An ISP Bridge
is wide area network (WAN) that provides a connection A bridge connects two physically separate LANs of the
to the internet. A router’s role is to determine the most same type together so that devices on one LAN can
efficient route to use to transfer data to its destination, communicate with devices on the other LAN.
and in order to do this it needs to store the addresses of all
devices connected to it. In domestic use, a router is often Firewall
combined with a switch and wireless access point. A firewall prevents external users gaining unauthorised
access to a computer system. It is usually positioned at
the gateway to a network and will examine alt incoming
data to determine if it should be allowed. Data that is
i!
Computer |
not allowed will be prevented from gaining access to the
Switch network. A firewall can also prevent certain types of data
P
| Computer Router |-/l\-1 WAN |
from exiting a network. As well as preventing unauthorised
users from gaining access, a firewall can prevent malicious
data packets from causing disruption to a computer
Figure 13.06 - Router. system such as a denial of service (DOS) attack.
A firewall is often configured as part of a router but it can
Repeater also be software that is installed on a proxy server or
individual computers. A proxy server would sit between
the gateway and the LAN so that data cannot pass
through to the network without being examined by its
firewall software. Firewall software can also be installed on
individual computers in order to prevent any unauthorised
access or malicious attack from within a network.
i
g/
Servers
A server is a computer on a network which provides
resources that can be used by client devices. Individual
servers or groups of servers can perform a variety of
functions depending on how they are configured.
fete
A file server’s role is to make files available for users on
Figure 13.07 - Repeater. the network. These files might be for individuals who
Cambridge International AS and A level IT
have access to their own user area for file storage or they it’s actually the number of bits per second that the line is
may be files that are shared between groups of users. capable of transmitting, rather than the actual speed of
Depending on the permissions given to each user or group transmission. It is therefore the maximum possible speed
of users, files can be created, read, modified and deleted. of data transfer. The transmission speed is often referred
to as the bit rate.
TASK
Explore the files available on your school’s file server.
Find out what documents are available to you and what
permissions you have. Ask your teacher or technician A 1Gbps line in a network is capable of
what other documents are available to other user groups transmitting a maximum of 1billion bps. A
and the permissions that they have. 38 Mbps fibre optic internet connection from an
ISP is capable of transmitting a maximum of 38
million bits per second. If a computer within the
A print server deals with all the print jobs on a network. network is downloading data from the internet,
Each time a client computer sends a request for printing, then the maximum transmission speed is 38 Mbps
it will be added to the queue on the print server. The print and not 1Gbps as the connection to the ISP is a
server will then deliver each print job in turn to the printer. bottleneck.
There may be several printers that are managed by the
print server. Some client computers or users may be given
priority and so may be able to jump the queue. It’s also
possible for the print server to charge users for each print DISCUSSION POINT
job, which is usually done by reducing the number of print Note that bits are different to bytes. There are eight bits in
credits available to the user. a byte. Therefore, a bandwidth of 32 Mbps is actually four
megabytes per second.
A mail server receives and sends all emails for an
organisation. The mail server can be part of a LAN or a
WAN. Incoming emails are checked for viruses, phishing
or spam and then sent to the user’s mailbox. When a TASK
user sends an email the mail server will either direct it to
Find out what bandwidth your school has for its
another user within the organisation or send it on to the connection to the internet and compare that with the
internet for delivery to another mail server. bandwidth you have at home.
An application server delivers software to client
computers. This can be done by the clients accessing the
software direct from the server or by the server managing Bit streaming
the installation of the software onto each client computer. A bit stream is a series of bits which represent a stream of
A proxy server deals with all requests to the internet. It data transmitted at one time. Although it usually refers to
sits between the LAN and the gateway. It will check that communications, it can also apply to data in memory or
each request is allowed and filter out any undesirable storage.
requests such as pornographic websites. It will also store In networking, streaming takes place when video or
web pages in a cache which will speed up the time it takes audio files are sent to a receiving device for viewing or
for a user to receive a web page. A proxy server often also listening to without downloading a file to save in storage.
includes firewall software. With a video, the first few seconds consisting of several
frames will be sent to fill a buffer (a temporary area of
Bandwidth and bit rate storage) which can then be watched at the receiving
Bandwidth measures the range of frequencies available
device. As the frames within the buffer are viewed, they are
on a communications channel. This defines its capacity.
removed so that more frames can be added to the buffer
to keep it full.
Bandwidth is measured as a frequency range in kilohertz
(kHz) or as a transmission rate in bits per second (bps). A buffer is used to keep the video running smoothly.
Although the bandwidth is often thought of as a speed, Without a buffer, any data congestion would be noticed by
Chapter 13: Networks
Receiver
O DISCUSSION POINT
A byte stream is a bit stream that consists of bytes. It is also
known as an octet.
Infrared
Infrared is the communication method used by most
remote control devices. It is cheap to produce and a
well-recognised standard method of transmitting simple
commands. It works by transmitting electromagnetic
radiation that is just past the red end of the visible Figure 13.11 - Fibre optic strands.
light spectrum, so it cannot be seen by the human
eye. It does not have a very high bandwidth and so is Because they suffer hardly any degradation of
only suitable for transmitting small amounts of data. signal, they can be used over large distances,
It can also be affected by sunlight, meaning that the including in LANs where copper cable limits are
transmission of data is not always successful. Infrared typically 100 m. They are also used in aircraft
requires line of sight between the sending and receiving where weight is an important factor, because they
devices so it cannot bend around corners but it can are lighter than copper cables. The lack of
reflect off light surfaces. Infrared wilt only work for short degradation of signal means that they are suitable
distances. for passing data across the globe as well as
throughout towns and cities. ISPs often use a method
Infrared can also be used by mobile phone devices to act
called fibre to the cabinet (FT TC) to provide
as a remote control and is used within active sensors,
internet connectivity to homes. With FTTC, fibre
which were introduced in Chapter 3.
optics are used to connect a communications exchange
to a cabinet in the street and the last portion of the
Fibre optic connection to the house is by copper cable. In the
Fibre optics are fine strands of glass that transmit data UK in 2015, Virgin Media were able to offer bandwidths of
as light. As the strands are very fine, a large number can 200 Mbps using this method.
Chapter 13: Networks
• ‘smart’ televisions which use services from the internet by a RFID reader and the parcel’s location is updated in a
and so require a connection to a LAN that is connected database. The RFID reader will be continuously sending
to the internet interrogation signals through its antenna to identify the
• printers that can be located anywhere in a room, without location of any RFID tags. These types of tags are also
having to run additional cables used by shops as security tags prior to a product being
• ‘casting’ of a devices screen to anotherdevice wirelessly. purchased.
Typically this could be casting a laptop’s display to
a projector or casting a mobile phone’s display to a
r
television
• smart home devices.
Antenna
\
The main advantage of Wi-Fi is that devices can
connect to a LAN without the need for cables which
can be costly to install, unsightly and a potential
>/)
hazard. This means devices can use any location Reader
Vi
V
Investigate screen casting methods including Miracast,
Chromecast, AirPlay and AllShare.
Radio
.1*
Bluetooth and Wi-Fi both use radio waves. Another
transmission method that uses radio waves is radio¬
frequency identification (RFID). RFID uses electromagnetic
\t
fields to identify and track small RFID chips. One use of RFID
is to monitor the location of parcels from a distribution
warehouse to the delivery point. Each parcel can have a
RFID tag that is unique to the parcel. As it moves through
the warehouse and onto a delivery van, the tag is read Figure 13.13 - Contactless payment.
Chapter 13: Networks
Wireless Application
Less frequencies are available to wireless communication Presentation
methods than to copper cable, which means there is
Session
less bandwidth available. Wireless transmission is also
susceptible to interference from other wireless devices, Transport
including conflicting wireless access points, baby Network
monitors and even microwave ovens. This interference
Data Link
causes lost data packets which reduces the transmission
rate. Obstacles such as walls and ceilings can reduce the Physical
strength of a wireless signal, which means there is even Figure 13.15 - ISO OSI 7 layer model.
less bandwidth available the further away a device is from
a wireless access point.
POP
Post office protocol (POP) defines the rules for email
Optical
client software to retrieve emails. The main method that
As fibre optics are not susceptible to electrical is applied is to connect to an email server, download all
interference, it is far less likely that data packets will messages and store them on the client computer and then
be lost, meaningthat the total bandwidth available is delete the messages from the server. POP also supports
considerably higher than with copper cables. encrypted transmission of emails. POP is part of the
application layer of the OSI model.
What a protocol is and different
types of protocols IMAP
A communication protocol is a set of rules that ensure Internet message access protocol (IMAP) is an alternative
data is transferred between devices correctly. These rules method for email client software to retrieve emails.
are required so that a variety of devices and applications Instead of downloading the email and then deleting it
can communicate together successfully. A protocol from the server, its default mode is to leave the email on
defines the method of addressing to use, the type of error the server and download a copy to the client. This means
checking to be used, how sending devices will indicate the emails can still be accessed from a remote location.
the start and end of a message, how a receiving device IMAP also supports multiple folders on a server whereas
will confirm it has received a message and any data POP only supports a single folder on the server. IMAP is
compression methods to be used. part of the application layer of the OSI model.
.
• SMTP
PPP
rate.
4 Explain why a buffer is needed when streaming.
• Telnet
5 Identify three types of switching used for the delivery
• UDP
of data through a network.
6 Describe two advantages of fibre optics for the
transmission of data.
7 Identify two different ways in which Bluetooth could
BitTorrent protocol be used.
The BitTorrent protocol specifies how multiple downloads
8 Describe three disadvantages of Wi-Fi.
can take place from the same file source concurrently.
Several clients (peers) download portions of the file. The 9 Explain why bandwidth is important during a video
conference.
peers then connect to each other directly to send and
receive those portions of the file between themselves. 10 Compare and contrast the POP and IMAP protocols.
This reduces the bandwidth required by the original host
of the file and can increase download speeds for clients
downloading large files.
The protocol only works effectively if there are lots of
peers downloading the same file, as without lots of peers 13.02 Network security
there are less opportunities to receive portions of the file. Security issues
To download a file using BitTorrent, clients need client
software such as pTorrent. To provide a file for download,
a server must run a tracker which coordinates all the
peers. Malware: malicious software
Spyware: malicious software that records what a user is doing
A torrent is a metadata file which identifies the locations on a computer system
(Uniform Resource Locators (URLs)) or trackers which
Cambridge International AS and A level IT
o TIP
When computers are connected together through
or usernames and passwords. Once a username and
password is ascertained by the spyware, the perpetrators
can log onto the network as that user. Another problem
for networked computers is that spyware can collect
networks, there are increased security risks due to access
being available from other computers. data and then transmit it to another server so that the
perpetrator can access that information. If a key logger is
used, then every keystroke made by a user is recorded and
Unauthorised access this could include confidential data.
Commonly known as hacking, unauthorised access
takes place when a person or device gains access to a Denial of service attack
computer network without permission. Hackers can guess A denial of service (DoS) attack is designed to send more
usernames and passwords to gain access to a network, requests to a serverthan it can deal with. These are
particularly when users set up weak passwords. Once a easy to launch and difficult to track. They are carried
hacker has access, they can read data on the system. This out to cause disruption to an organisation’s network or
data may be confidential to people or to the organisation. website and often result in users not being able to use
The hacker may also make changes to the data, such as the network and customers not being able to access the
changing payment details, or the hacker might destroy data website. Website attacks are measured in requests per
deliberately to cause harm to the organisation or individual. second (RPS) and it can only take around 50 RPS to cripple
a website. Network attacks are measured in gigabits
Malware per second (Gbps) and it can only take around 20 Gbps
Malware is a word used to describe any software that is of data to make a network unusable. DoS attacks are
designed to cause damage. In relation to networks, the not designed to gain access to data, but purely to cause
main problems are viruses and spyware. Viruses copy disruption. A DoS attack can last for hours, days or weeks.
themselves automatically to other devices and so the
DoS attacks involve the perpetrator using a single internet
connectivity of a network makes the spread of viruses
more likely. Viruses are designed to cause damage to data connection to overload the target, but distributed denial
or cause problems to the operation of a computer system. of service (DDoS) attacks use multiple connections
Parasitic viruses attach themselves to files on a computer distributed across the internet. These are much more
system and are triggered by certain events such as a date
difficult to defend because they are coming from so many
and time. Macro viruses attach themselves to macros that different locations.
are part of macro-enabled documents. Email viruses arrive The motivations of perpetrators of DoS attacks can be
as attachments to emails and are triggered by the user pure vandalism (cyber vandalism) or it could be as part of
opening the attachment. Unique to networks are worms an activist campaign (hacktivism) to express criticism of,
which spread automatically through networks. Worms or displeasure with, an organisation.
don’t require files to attach to as they create their own
executable file. Trojan horses are malicious programs that
disguise themselves as normal software, but if they are run TASK
they will actually cause damage. Trojans are often found on Find out how the hacktivist group Anonymous used
websites when a user tries to download some illegal music DoS attacks against ISIS websites and social media in
or films and they end up downloading a Trojan instead. February 2015.
The most common access rights that are given are: It’s possible for hackers to try and guess usernames and
passwords and so a password should be strong enough to
• create (C): users can create new items of data
prevent a hacker from guessing it. Hacking software can
• read (R): users can read existing data be used to try different passwords in order to gain access
• update (U): users can make changes to data and so security measures should be put into place to lock
• delete (D): users can delete data. a user account if a password has been entered incorrectly
a certain number of times. It is essential that a user selects
a password that is secure and is less likely to be guessed.
Users also need to be careful that potential hackers
A school or college may give the following access (including co-workers) aren’t looking overtheir shoulder
rights to users: to try and see what is being typed in. One of the biggest
• visitors: access to internet services only problems with passwords is that a user must be able to
remember it. If the user writes the password down then it
• individual users: CRUD access to all data in their
can easily be stolen. If a user uses the same password for
own user area
several accounts then, once it is known for one account,
• students: R access to a shared area for educational it can be used by hackers for another account. This leads
resources and executable access to software that to another problem: when a user has several passwords
has been allocated to them for several accounts it is difficult to remember which ones
• teachers: CRUD access to the shared area for have been used, especially if the user is required to change
educational resources for their department and CRUD their password on a regular basis.
access to a staff shared area for their department
• staff: R access to a whole school staff shared area
TASK
of information about the school
Research what makes a good password. Define a set of
• head teacher’s secretary: CRUD access to the rules for a password that is not too restrictive on users
whole school staff shared area but also ensures that the password is secure.
• network administrators: CRUD access to the whole
network.
Websites may be restricted based upon each It’s also possible to disable accounts at certain times
student’s age. Software can be restricted so that of day so that users who work from 9 a.m. to 5 p.m. can
some software is only available to authorised users, only access their accounts during that time and this
such as the school’s management information system prevents somebody from trying to use their account
which is only available to staff. Some email accounts outside those hours. Security measures can also be
may be shared between users such as the main put into place to ensure that certain user accounts
incoming inbox being shared between administrative can only be accessed from specific computers. This
staff. can be limiting if a user genuinely needs to use a
non-authorised device for their user account, but it
also prevents hackers from trying to gain access from
In order to gain these access rights it is necessary for
anywhere within the network or even anywhere on the
a user to identify themselves. This is usually done by
internet. This can be especially useful if users are given
entering a user ID, but other methods can be used such
access from home, where they can be limited to using
as an email address, swipe card, NFC using a phone
approved devices.
or card or biometric methods. A user ID on its own
is weak because this would often be known by other Where security is critical, two-factor authentication (2FA)
people. It is for this reason that a user is also expected to can be used which requires two security components to
authenticate themselves using a password or personal gain access. This can be as simple as using a swipe card
identification number (PIN) to prove they are who they and a PIN but it can also include more complex methods.
claim to be. It’s also possible that a physical login device The user could also be issued with a token which could
such as a swipe card or phone could be stolen and be a small device that generates one-time passcodes or
so these should also be used in partnership with an a USB key that includes a secret token stored on it. One
authentication method. of the downsides of requiring a swipe card or token is
Cambridge International AS and A level IT
that the user must always have it available, which means Fingerprints and retina scans are tried and tested
carrying it around. It can also be lost or stolen. methods and are known to be very secure. Each person
has a unique fingerprint and retina pattern that can
TASK confirm their identity. There are concerns about whether
fingerprints are the right method to use as they can also
Find out about how Vasco’s DIGIPASS tokens work. You
could work as a group so that each person finds out be used for identifying criminals. However, if people aren’t
about each different DIGIPASS token and then reports carrying out criminal acts, then they shouldn’t have any
back to the rest of the group. concerns. The difficulty arises when corrupt governments
use these methods to track individuals who might be
opposed to their regime. If a person had to provide their
Mobile phone 2FA involves the system sending a one-time fingerprint every time they used public transport or
passcode by text message to the user’s mobile phone, entered a building, then it would be very difficult to avoid
which the user has to enter to confirm it is them trying to being monitored.
access the system. This is often used by banks to confirm Facial recognition is a developing field of study and is
the user’s identity before setting up a transfer of money to being used within some applications. Microsoft’s Windows
another account. The main advantages of mobile phone 10 includes a feature that will detect a user and log them
2FA are that each code that is issued is for a single use and on automatically when they sit in front of their computer.
the user is likely to always have the mobile phone available. Voice recognition has never been an ideal security method
However, not all users may have a mobile phone and the as there are so many parameters that can change, such
phone must have enough battery charge and be in range of as a person having a cold that affects their speech,
a mobile network in order to receive the text message. Text background noise or the potential fora voice to be
messages also cost money for an organisation to send and recorded and played back.
there may be a delay in the user receiving the text message.
Biometric security can be used as a 2FA method by
Biometric methods requiring both biometric security and a password.
However, as biometrics used for security should be
Biometrics are biological characteristics that can be
measured. Biometric security uses these biological unique to each human being, it isn’t actually necessary to
characteristics to authenticate a user’s identity. The require a password. Users can both identify themselves
biological characteristic has to be unique to each user in and confirm their identity using biometric security. This
order to be able to authenticate the user. Characteristics method is also user proof in that fingers or eyes can’t be
forgotten as an ID card or password can be.
used for biometric security include retina recognition,
facial recognition, fingerprints and voice recognition.
Firewalls
Networks that have access to a WAN or the internet have
two-way traffic into and out of the network. A firewall
controls what data can flow into and out of the network.
A firewall may be part of a router or it may be software
installed on a server that sits between the network and
the gateway. It is effectively a barrier between the network
and external data traffic.
am§ lit
Firewalls include an access control list (ACL) that uses
a technique called packet filtering. An ACL controls
which data packets are allowed through the firewall.
The ACL will include a set of rules that determine
which protocols, port numbers, source addresses and
destination addresses are allowed or not allowed. If data
packets are not allowed, then they will be dropped. For
example, if the ACL includes a rule to block FTP, then
all data packets for port 21 (the FTP listening port) will
Figure 13.16 - Fingerprint security image. be dropped. The ACL can also include rules that direct
Chapter 13: Network:
certain traffic to specific destinations. For example, In a network, backup processes should be set to run
requests for website data into the network would be automatically and regularly. The more regularly a backup
directed to the web server on listening port 80. Another process is run, the more storage that will be required
rule in the ACL could be that requests for access on for the backup data. However, if a backup process is run
certain ports are only allowed from predefined IP less regularly, then there will be more new data that has
addresses on the internet. This could be used to control not been secured in case of a problem. In a network
devices that have virtual private network (VPN) access or environment, backups are usually stored on tapes or
devices that could be used to initiate Telnet sessions to remotely at another location. That location might be a
administer the network. server at another organisation or it might be servers in the
'cloud’, which are effectively internet-based storage.
A firewall often includes a proxy server. The proxy
server makes requests to the internet on behalf of client Storing data remotely has advantages which include not
computers within the network. If a client wants to request having to change tapes each day and the data being away
a website, then the request will be sent to the proxy server from the original in case of fire or flood. However, it also means
and the proxy server will then fetch the website and return that the data is ‘connected’ and part of a network which could
it to the client. Any requests for data from the internet also suffer a security breach. Storing data on tapes means that
or from outside the network must be made through the the tapes have to be changed each day and then relocated to
proxy server. a secure location away from the main servers.
Some data packets may be disguised and so proxy
Encryption
firewalls include an application layer which can block
specific content such as malware or block content that Encryption is the process of changing the data so that if it is
is misusing a protocol. The application layer firewall will accessed without authorisation, then it will be unreadable.
perform a deep inspection of data packets to check for This is done by using an algorithm to change the cipher.
any malicious commands, executable programs or other Although encryption can stop a hacker from reading data,
inconsistencies. it does not stop a hacker from destroying data and it does
not stop malware. However, it is important when data is
Firewalls offer a certain level of protection from hackers beingtransmitted, particularly if that data is sensitive and if
and malware, but it all depends on how the firewall has the data is being passed through an open network such as
been configured. If the ACL is configured to block all a Wi-Fi hotspot or the internet.
data packets except those which are deemed safe, then
the network will be very secure, but it can also cause When data has been encrypted, only the intended
inconvenience when users legitimately try to transmit recipients will be able to decipher (decrypt) it using a
or receive data that has not been configured as safe. On decipher algorithm. Random encryption keys are used to
the other hand, if the ACL is configured to allow all data encrypt the data so that the same algorithm is not used
packets except those which are deemed unsafe, then each time. Therefore, anybody trying to intercept the data
there are more opportunities for hackers and malware not only needs to be able to view the data, but must also
to sneak into the network. A healthy balance needs to be have access to the decryption key.
found between security and usability.
Backup
EXAMPLE
J
A backup is a copy of the original data. A backup is 0
required if something goes wrong and the original data
is either damaged or lost. In the event of a problem with
r Public key
*
is essential when recovering from an attack. A backup Joseph * Analiese
can also be used to restore data when non-malicious
destruction of data has occurred, such as a file becoming Private key
corrupt or physical storage media being destroyed by fire
or water. Figure 13.17 - Public key encryption.
Cambridge International AS and A level IT
Public key encryption is a method used whereby are authorised to gain entry. Physical locks can be used
the recipient doesn’t know the decryption key to on server room doors to prevent unauthorised access to
use. In this example, if Joseph wants to send secure those rooms. These can be key locks, swipe card locks or
data to Analiese, his computer will use Analiese’s numerical code locks. This type of security should also be
public key to encrypt the data. Analiese will then applied to backup tapes, which should be stored in a safe
use her private key to decrypt the data. This means that is kept offsite.
that the decryption key does not need to be sent to Main servers should be protected against electrical
the recipient. Even if somebody knows the public surges. This can be done using extension leads that offer
key, they cannot work out what the private key is. surge protection, but most servers will be protected
by uninterruptible power supply (UPS) units which are
basically battery packs that will provide power in the event
Websites that use encryption for passing data will use of a power cut, but will also ensure that the power supply
the HTTPS protocol rather than the HTTP protocol. Email is uniform.
protocols can also use encrypted protocols, as can many Server rooms should be located in areas that are
other protocols. protected from fires and floods. This should include
providing additional fire protection, such as a server
Malware security (anti-virus and anti-spyware) room with fireproof doors, carbon dioxide fire
Anti-virus software now tends to be referred to as anti¬ extinguishers and putting backup tapes in fireproof
malware software as it deals with other threats, such as safes. Server rooms should not be located on the
adware and spyware, as well as viruses. Together, these ground floor, which can be susceptible to floods, and
threats are known as malware. Anti-malware software they should be away from any water pipes that could
has two main functions. The first is an anti-virus monitor potentially burst.
that is continually monitoring the system for malware. If
the anti-virus monitor detects any unusual behaviour or Data protection act principles
tell-tale signs of malware, then it will prevent that malware
A data protection act can be used to protect people
from being executed so that it cannot cause damage to
about whom data is stored. They are known as
files or programs. The second function is to check for
data subjects. It is not in place to protect general
malware that may already be on a system. This is usually
information.
known as scanning the system. If any malware is found,
then the user will usually be given the option to disinfect In the United Kingdom, the Data Protection Act of
the malware, put it into quarantine or ignore it. Ignoring it 1998 includes the following principles which state that
is very dangerous because it means the malware will be information about data subjects must be:
executed and may have unexpected results. Disinfecting
• used fairly and lawfully
the malware is the safest option as it completely removes
the malware from the system, but it does mean that
• used for limited, specifically stated purposes
any data or program that included the malware will be • used in a way that is adequate, relevant and not
excessive
deleted. The compromise is to put the malware into
quarantine. This is a safe area where the malware cannot • accurate
be executed, but the data or program remains isolated • kept for no longer than is absolutely necessary
until it can be checked more thoroughly. • handled according to people’s data protection rights
• kept safe and secure
Physical security methods • not transferred outside the European Economic Area
Physical security methods are about protecting computer without adequate protection.
equipment. This can include standard methods that are
used to secure other equipment and buildings or specialist
physical devices that are designed to protect computer TASK
equipment. Find out what the principles of data protection law are in
Security guards can be used to verify every person who your country or another country.
enters a building or specific rooms to ensure that they
}
The need for a data protection act Data users should only store data for as long as is
Data protection law is required in order to protect data necessary. This means that they should remove data
subjects and the information that is held about them. when it is not needed any more. Data subjects have a
People have a right to know what information is being right to expect that their data will be kept secure. It is
stored and that it is stored accurately. therefore the responsibility of data users to put security
measures in place, as described earlier in the chapter. If
To process data fairly, data subjects must be informed if data is lost, damaged or accessed unlawfully, then the
information is collected about them and they must give data user could be prosecuted for not providing adequate
their permission for this to be done. It is also expected security.
that data subjects should be made aware of the purpose
for which information stored about them is used.
Organisations that use this data (data users) must ensure
that they only use the data for that purpose and that they
inform the relevant governing body of why that data is
o DISCUSSION POINT
European countries have to follow a European directive
being stored. (Directive 95/46/EC) which imposes data protection
requirements upon member countries. As part of this,
Data subjects expect that enough information will
the European Union requires that any data transferred
be stored about them by data users in order to carry outside the European Economic Area is only transferred
out necessary data processing. For example, if salary to countries which have adequate data protection so that
payments are being made to employees, then the data subjects remain protected. This has caused all sorts
employees would expect their employer to keep records of problems for multinational companies such as Facebook
of any tax that has been deducted and any tax allowances and Google who store data on servers in the cloud, which
can often be servers in the United States of America
that should be applied. Data subjects also expect that only
where data protection laws do not meet European Union
necessary and relevant data will be stored about them, as requirements. Facebook currently store European users’
they have a right to privacy. For example, person applying data in Ireland, which is a member of the European Union.
for a travel pass for public transport would not expect the It can be very complicated for multinational companies
transport authority to be storing information about their to comply with such regulations that vary from country to
mental health. country in a world that is globally connected.
13.03 Satellite communication from the internet to the client and uses a public switched
telephone network (PSTN) connection for the client to
systems upload data. This means that uploading data can be very
slow because of the limitations of the telephone network.
The other method is to use two-way satellite broadband,
Satellite: an object in space that follows an orbital path which allows the client to upload data directly to the satellite
GPS: global positioning system which uses satellites to as well as to receive data from the satellite. However, this
determine the current location requires more expensive equipment that is able to transmit
microwaves to space as well as to receive them.
The bandwidth available for the end users of satellite
Satellites are objects in space that follow an orbital broadband is not as high as other broadband connections,
path. A satellite is different to a satellite dish. In satellite such as fibre optic, but it is improving. Satellite broadband
communications, a satellite in space will send microwave also tends to be far more expensive than fibre optic and
signals to a satellite receiving dish on earth. There are asymmetric digital subscriber line (ADSL) broadband and
three different levels or orbit used by satellites: users usually have to pay higher premiums if they are using
• low earth orbit (LEO) at 500-1500 km from earth a lot of data.
requiring 40-80 satellites for global coverage
• medium earth orbit (MEO) at 5000-12 500 km from earth TASK
requiring 8-20 satellites for global coverage Investigate the satellite broadband options available in
• geostationary earth orbit (GEO) at fixed points 35 800 km your country and compare the prices, bandwidth and
from earth requiringjust three satellites for global coverage. download limits with cabled alternatives.
In Motion
Television and radio broadcasting
In Motion
Television and radio can be broadcast to end users
by radio waves, cables or satellite. As radio waves are
dependent on the frequencies available, they are limited
to the number of channels that can be offered. Cable
broadcasts are limited to areas where cables are installed.
Satellite broadcast systems are able to offer far more
Figure 13.18 - The three different orbits used by satellites. channels because of being able to broadcast over a larger
range of frequencies using microwaves.
• Receiver
13.04 Summary Wi-Fi and radio are all methods of transmitting data
wirelessly.
A variety of components are required to connect devices
together in a network, both physically and wirelessly. Communication protocols are required so that a variety
Servers provide resources that can be used by client of devices and applications can communicate together
devices. Switching methods are used to transmit data successfully. The BitTorrent protocol specifies how
packets from the sender to the receiver. multiple downloads can take place from the same file
source concurrently.
Streaming takes place when video or audio files are sent
to a receiving device for viewing or listening without When computers are connected together, there is an
downloading a file to save in storage. Bandwidth measures increased security risk from unauthorised access, malware
the range of frequencies on a communications channel in and denial of service attacks. Security measures need
to be put in place and include access rights, biometric
kHz and defines the transmission rate in bps. Bandwidth
is important when content needs to be accessed in real methods, firewalls, backups, encryption and physical
time or within a time limit. The bandwidth will be affected security methods.
by the type of transmission media used, such as cables, A data protection act is used to protect people
wireless and optical. about whom data is stored. They are known as data
Optical communications, including infrared, fibre subjects.
optic and laser, use light to transmit data. Bluetooth,
Review questions
m Levi wants to set up a home network in his one-bedroom apartment. He will be using a desktop
PC, a laptop, a mobile phone and a printer.
la Identify the physical component that will connect Levi’s network to the internet. [1]
lb Describe three other physical network components that Levi will need within the network.
[3]
Levi will be using his laptop and mobile phone to stream music and videos. He also participates
in live video conferences for some of his university lectures.
2 Explain the importance of bandwidth to Levi. [4]
Levi wants to download an item of freeware from the World Wide Web.
5a Explain how Levi can take precautions against malware when downloading
freeware. [4]
5b Describe two other ways in which matware could infect Levi’s computer. [2]
Chapter 13: Networks
Levi is able to access his university network from home using a fingerprint recognition device.
6a Suggest with reasons two different access rights that Levi might have to the university
network. [2]
6b Explain why the fingerprint device is all that is required for him to access the network. [2]
Learning objectives
By the end of this chapter, you will be able to:
\\r
i
»•
Chapter 14: Project management
Q Remember
Every project needs to be managed properly in order to
Execution
Once all plans are in place and the start date arrives,
the project can commence. It is critical that the plan is
ensure deadlines are met, resources are available and
everybody knows what they are doing. followed so that resources are used at the appropriate
times. Any delays to a task can have a knock-on effect to
successor tasks. The project manager will be expected to
Traditional project phases
communicate roles and responsibilities to team members
Planning Monitoring and set interim targets for each member to achieve within
Initiation and and Closing the timescales of the overall plan.
design controlling
K
Executing must monitor the progress and control what is happening.
They will be responsible for ensuring tasks are completed
Figure 14.01 - Project stages. on time and rescheduling any tasks if there are delays. The
project manager will need to monitor the performance of
Conception and initiation team members to ensure they are carrying out their agreed
roles effectively. The project manager will need to monitor
During the conception and initiation stage, the initial ideas
fora project are identified and goals set. Key stakeholders
expenditure and compare it against the budget to ensure that
are identified and decisions are made as to whether it is
overspends don’t occur and keep a close eye on the scope of
the project to make sure it doesn’t extend beyond its agreed
appropriate to undertake a project or not by conducting a
boundaries. There should be regular project review meetings
feasibility study. The feasibility study wilt determine whether
where key stakeholders can discuss the progress of the project.
or not the project is of benefit to an organisation based on
At times, the project plan will need to be adjusted, so there
resources, time and finance. Requirements for the project
is regular iteration between the execution, monitoring and
will be identified so that all stakeholders are aware of the
control, and planning phases as shown in Figure 14.01.
expectations of the project. Objectives of the project, its
scope, risks, approximate budget and approximate timescales
will be defined and agreed with all stakeholders. Closure
When the project is ready to complete, a handover will take
Planning place from the project team to the client. Contracts will be
There is a common phrase, ‘failing to prepare is preparing terminated, which means some people may need to be
to fail’. This is very true in all parts of life, but particularly deployed elsewhere or may need to look for alternative
with project planning. It is essential that the project employment. Resources that have been assigned to the
is planned well so that all stakeholders know their project will be released. A review of the project will take
responsibilities during all stages. A comprehensive budget place between the client and the project management
will be formulated along with details of timescales for the team, where requirements will be evaluated and successes
progress of the project. Milestones will be set, by which will be celebrated. The client will be expected to sign off the
time certain aspects of the project must be complete. Tasks project as completed, so that it is clear there is no further
that have to be completed between each milestone will be work to carry out and closure will have been achieved.
Cambridge International AS and A level IT
Desktop Personal
Desktop project management software requires Personal project management software is typically used
installation to a specified computer or set of computers. by home users for small projects such as managing a
Licences are required for each installation and this will building extension or planning a holiday. It will be
Chapter 14: Project management
single-user software and include a simpler interface that 14.03 Project management
a non-experienced project manager is able to use. ft will
include basic features such as a timeline/calendar, task software
management and resource planning, but it won’t include
any collaboration features or complex features required by
larger organisations. Critical path: the tasks which must be completed on time for
a project to complete on time
Collaborative
Collaborative project management systems are used by
several users at once. There may be several sub-project Planning
managers who are responsible for updating different Most of the planning involved using project management
parts of the plan both duringthe planning stage and software is concerned with scheduling tasks and
when monitoring and controlling. This type of software is allocating resources to those tasks. However, key
often web-based or delivered on a client-server itiodel, milestones can be identified in advance. These are
with project and task information being stored on a when crucial points in the project should be reached,
central server. Some client-server tools include a desktop so tasks should be scheduled to meet these milestones.
application for detailed project management and a web Documents that are likely to be required can be allocated
interface for other project team members to access when to milestones, such as success criteria and specifications.
required. Templates can be used for setting up an initial project
plan. These templates can be provided by the software or
they could be templates that are created based upon an
TASK organisation’s previously successful projects. Through the
Copy the table below on a separate sheet and complete use of project templates, company standards can be set
it with the advantages and disadvantages of each type of up for the way projects should be planned, so employees
project management software. have a common, collaborative and recognisable structure.
Type of software Advantages Disadvantages
Desktop Scheduling of tasks
Web-based Tasks are jobs that need to be completed as part of the
Single-user project. Project management software will enable a project
Personal manager to create a Gantt chart to show an overview of
the tasks that need completing on a timeline. Tasks will
Collaborative
be assigned an estimated number of hours or days that
they will take to complete, together with a deadline for
completion. The project manager will be able to identify
which tasks are dependent upon other tasks and so cannot
start until those other tasks have been completed. Tasks
DISCUSSION POINT
In groups, research the different types of project
can be delegated to other members of the team and
management software available in each category. One prioritised to identify which should be completed first.
person should choose one piece of software from each Team members will be able to record how many hours
category. Report back to your group on costs, features and have been spent on each task and identify when the task
any overlaps with other categories. is complete. Milestones can be identified for crucial points
of the project and these can be highlighted. The project
manager will be able to see an overall calendar of all tasks
that need to be completed, together with calendars for
each team member that is responsible for those tasks.
2 Contrast two advantages of web-based project
management software with two disadvantages
of single-user desktop project management Allocation of resources
software. Resources can be equipment, property or people that are
required to complete a task. These resources will need to
Cambridge International AS and A level IT
be defined within the project management software and team member knows what modifications have been
their availability can be identified so the project manager made and which is the latest version of the document.
knows when they can be utilised. Costs can be assigned The software can email team members to inform them
to any resource, so the project manager can see how their when changes to documents have been made or display
use will affect the budget. Resources can then be assigned an alert on their project dashboard, their home page for
to tasks and a number of hours or days be assigned to the the project management software. This is a much more
use of that resource. The software will help the project controlled manner of dealing with documents than the
manager to avoid resource conflicts and also identify nightmare of email attachments and mixed revisions.
clearly situations where team memberscould experience • Discussions/forums: these can be set up for tasks,
overload. This is when they have too many tasks to documents or milestones so that discussions between
complete during a period of time. team members can be held. This is particularly useful
when all team members are not available at the same
time. Team members will be able to see comments
Costings and suggestions that have been made by others
All resources will have costs allocated to them, so the and respond to them. Email notifications of new
project manager will be able to calculate the total cost of contributions to discussions can be sent or alerts can be
each task based on how many hours each resource is used displayed on project dashboards.
for each task. The software can be used to keep a record
• Progress: the software can inform team members and
of any expenses incurred by team members and account the project manager of progress that is being made.
for these in the overall costs. Daily, weekly, monthly or Team members can update tasks to show how near
custom analysis of expenditure and its comparison to the to completion they are and this progress can be fed
budget can be provided. The software can report on the into the whole project plan. If changes are made to the
total costs for each individual resource or set of resources. project timeline, automated email notifications can be
The costings information will be able to be exported sent out to all affected team members.
to common formats such as spreadsheets for further
manipulation and analysis.
Decision making
All communications within the project management
Communications software can be logged and tracked so that if decisions
Project management software can offer a large variety have been made, then it is possible to clearly identify who
of communication tools which help team members to made each decision and for what reasons. If problems
collaborate throughout the whole project: or issues have been experienced, then these will be
highlighted by the software and decisions can be made as
• Calendars: each team member will have a calendar to what adjustments need to be made, such as changing
showing what they are doing at any time. These can be the timeline or allocating additional resources. These
synchronised with third-party calendars, such as Google, issues can also be monitored to check on progress of the
iCal or Outlook, so that each member’s availability resolution.
is always up to date. This enables meetings to be
scheduled with each team member. Documents can Graphs, charts and reports can be used to analyse the
be attached to these meetings so that they are readily budget, scheduling and task progress. Comparisons
available to each participant. can be made between the plan and what is actually
• Instant messaging/ video chat/ video conferencing: happening during the execution of the project, and then
these tools will enable team members who are working decisions can be made to make changes if necessary. The
remotely from each other to communicate in real time software can show how much time was spent on each task
so that they can share ideas and discuss progress. compared to how much time was planned for that task, so
that lessons can be learned for future tasks that are similar
• Shared documents: all documents should be stored in a
in nature.
central repository so that they are available to the team
members who require access to them. Documents can The software will identify a critical path, which will show
be assigned to tasks, resources or milestones so that all tasks that must complete on time if the project is to
they are available at the right time to the right people. meet its deadline. This can then be monitored closely
Changes to the documents can be tracked so that each and delays can be anticipated in advance and resources
jpter 14: Project management
diverted to critical tasks if necessary. The software will seconds to boil the kettle is longer than the 60
show an overview of the availability of resources and seconds it takes to do the three parallel tasks.
the time allocated to each and their respective costs, so
that the project manager is able to reallocate them as Sequential tasks cannot be carried out at the
necessary. same time because they are dependent upon
other tasks completing first. For example, boiling
the kettle is dependent upon the kettle being
filled with water and so cannot start until the
3 Explain how project management software can be kettle is filled with water. In this case, the kettle
used for allocating resources to tasks. being filled with water is a predecessor to boiling
the kettle.
Thetotal length of the critical path is calculated by
14.04 Critical path analysis adding up all the sequential tasks plus the longest
of each of the parallel sets of tasks. In this case
that is 15 + 180 + 10 + 5 + 10 = 220 seconds, which
\Mi TERM
is the shortest time it will take to complete the
Predecessor: a task in a project that must be completed project. If any of the tasks on the critical path takes
before another task can start longerthan planned, then the whole project will be
delayed.
A critical path analysis (CPA) finds a project’s critical path.
The critical path identifies which tasks must complete on Some tasks aren’t critical and have what is known as float
time in order for the whole projectto complete on time, time. The float time is the time an activity can be delayed
and defines the minimum time in which the project can be without affecting the rest of the project.
completed.
In the example CPA for making a cup of tea, getting the
milk out of the fridge has a float time of 120 seconds as
it can be delayed this long before it would catch up with
milestone 4.
Figure 14.02 shows a CPA for making a cup of tea.
Boil kettle TASK
Fill 180
kettle Interpret the CPA in Figure 14.03 for building an extension
Put milk .p. Stir
@3 15
x r-' into cup into cup tea to a house.
Put tea 10 5 10
(D Erect roof Tile roof
in cup Put sugar Get milk 4
TO, 5
in cup out offffridg
10 Digfor Install
25
® foundations foundations ®TSfe-<2< windows
5 2 20 3
Figure 14.02 - CPA for cup of tea. 10 r„,! electrics
Plumbing fix 7
The circles represent milestones in the project and 2nd fix Paint Plaster
are numbered for identification purposes. The tasks d>electrics 8
walls
6
3 2 4
are represented by arrows. The numbers next to
Figure 14.03 - CPA for extension.
each task represent the number of seconds the task
will take. For example, pouring water into the cup 1 Identify the longest task.
will take 10 seconds. 2 Flow many milestones are there?
3 Which tasks are dependent upon the bricks being
Some tasks can be completed in parallel to other laid?
tasks. For example, boiling the kettle can take 4 Which tasks can run parallel to installing the
place at the same time as putting tea in the cup, windows?
putting sugar in the cup and getting milk out of the 5 Flow many days is the critical path?
fridge. Where there are parallel tasks, the longest 6 Which tasks form the critical path?
timeline forms the critical path. In this case, 180
Cambridge International AS and A level IT
TASK
Complete a CPA for the following scenario:
Task Days Dependencies
Task Days Dependencies A 3
A 3 B 5
B 2 A C 4
C 6 A D 18 A
D 1 B E 16 B
E 3 C F 12 C
G 7 E, F
F 5 D
H 11 D.G
G 4 E,F
2 H
H 3 G
2 G
J 3 G
First, add any tasks to the diagram that have no 14.05 Gantt charts
predecessors. A Gantt chart is used to show the start and finish
dates of each task, the predecessors for each task, the
©— progress of each task and the current position within the
project. Tasks are listed with their start and finish dates.
Figure 14.04 - CPA part 1. A bar will represent each task. Each bar can be shaded
in to show the percentage of the task that has been
Then add on any tasks that are dependent on completed. Arrows are used to show which tasks are
task A. dependent upon other tasks. A line or other indicator
can be used to show the current position (time) within
2
B, the project. It’s also possible to identify the resources
2
required, usually by listing the person responsible for
OS 1
.c each task.
{>
3 Creating a Gantt chart follows a similar process to creating
a CPA. In addition to knowing the list of tasks, how long
Figure 14.05 - CPA part 2.
each task will take and which tasks are dependent upon
predecessors, you will also need to know the start date of
Continue task by task until there is a completed
the first task and the resources that are allocated to each
diagram.
task.
Chapter 14: Project management
1
EXAMPLE
w
Figure 14.07 shows a Gantt chart for developing a book.
G*nTT
pro/ril
2015 2016
i
Ty*i T r
Marne 1 eeqin dalfej End dale Coordinator Duration
Apr! Ml km WBU l 'MPH :l
i
Odobei January
i
Fetnnry
i
March
Indering
14/12/15
14/12/15
22/01/16
22/01/16
Proofreader
Proofreader s
3;
Final compilation 25/01/16 02/02/16 Typesetter
Printing 03/02/16 11/02/16 Pnnter
•• Shipping 12/02/16 24/03/16 Distributor 30
o
DISCUSSION POINT
Figure 14.08 is the PERT chart that has been generated from the Gantt chart using the GanttProject software.
Author writing Copy Editing Typesetting
- -
Final compilation Printing Shipping
Start: 06/04/15 Start: 02/11/15 Start: 14/12/15 Start: 25/01/16 Start: 03/02/16 Start: 12/02/16
End: 31/10/15 End: 12/12/15 End: 23/12/15 End: 03/02/16 End: 12/02/16 End: 25/03/16
Duration: 150 Duration: 30 Duration: 7 Duration: 7 Duration: 7 Duration: 30
Indexing
Start: 14/12/15
End: 23/01/16
Duration: 30
TASK
CD 14.01 House extension.gan
Interpret the Gantt chart in Figure 14.09 for building a house extension. The Gantt chart is saved as CD 14.01 House extension.
gan and was created using GanttProject, which can be used to open the files.
GÿnTT « 2015
project
i i i 1 I I I l I I
Begin dale j End dale
7eek 36 Week 37 Week 38 Week 39 Week 40 Week 41 Week 42 Week 43 Week 44 Week 45 Wteek46 Week 47
Name Predecessors] Duration] Coordinator
-•1.09/15
- Dig for foundations 02/09/15
Lay foundations 09/09/15
08/09/15
10/09/15 0
5 Ground Works
2 Ground Works
lAja/io 07,00/16 1.109/15 28/00/16 OSMO/lfi 12/10/15 19/10/15 .25/ 0/15 02/11/15 OQ/lt/10 15/11/16
o DISCUSSION POINT
Figure 14.10 is the resources chart for the house extension project. You can see when each resource will be being used, with gaps for
weekends.
GÿnTT 2015
project l I I I I
/eek 36 Week 37 Week 38 Week 39 Week 40 Week 41 Week 42 Week 43 Week 44 Week 45 Week 46 Week 47
Name Default role 1/08/15 O/Ad/IS I4SSU/15 2IA1D/I5 28*»/16 05/10/15 12/10/15 10/10/15 20/10/15 02/11/15 00/11/lfl 10/11/15
®-
•Plumber undefined 1= 1=1
o-
•Roofer undefined i—i i—i erf
®-
•Brick Layer undefined
®- ® Electrician undefined i—i
®- ® Groundworks undefined cm
*>•
• Decorator undefined
Window installers undefined
• theft of data
TASK • corruption of data
Complete a Gantt chart for the following scenario • loss of key personnel.
commencing on 1April 2017.
Some of these risks involve people who could deliberately
Task Days Dependencies cause problems. These people are known as perpetrators.
A 3 Each risk will then be quantified in terms of its likelihood
B 5 on a scale from 0.0 to 1.0, where 0.0 represents it never
C 4 happening to 1.0 which represents it as being almost
D 18 A inevitable.
E 16 B
F 12 C Within an organisation, there will be a number of business
G 7 E, F activities that are carried out. Each business activity will
H 11 D, G need to be identified. The impact of that business activity
2 H not being able to take place then needs to be analysed. The
impact for each activity not being able to take place will
be measured on a scale from 0.0 to 1.0 where 0.0 means
that there is no impact to 1.0 meaning that the impact is
absolutely critical to the aims of the organisation.
Impacts could include:
14.06 Disaster recovery • loss of revenue
management • damage to organisation’s image
Sometimes disasters occur, such as a power cut, flood, • penalty fees
fire, theft of data, malware, corruption of data, loss of • cost of recovery
network admin password or loss of the network manager. • effect on other business activities.
When this happens it is necessary to recover from the
From this analysis, activities can be categorised, for
disaster. A disaster recovery plan (DRP) is needed for
example:
such events so that recovery can be completed as quickly
and effectively as possible, minimising disruption to the • activities which must continue
organisation. • activities which could be scaled down
• activities which could be suspended.
Risk assessment Analysis of the impacts should also cover how the impact
Risk assessment involves identifying the potential risks changes over different time periods, for example in the
to an organisation, analysing the potential impact to the first hour, 24 hours, 48 hours, week etc.
organisation and the likelihood of each risk occurring. This The overall risk to an organisation of each potential
is often carried out alongside a systematic process known
as business impact analysis (BIA), which quantifies the
disaster/risk can now be quantified by multiplying the
likelihood by the impact:
impact of a disaster in terms of financial and non-financial
costs. Risk = Likelihood x Impact
A risk assessment will identify a number of potential This will now show which risks are the most important to
hazards including: guard against and ensure that recovery plans are robust.
This can be done for each risk, for each business activity
• power cut or for a combination of each.
• fire
• flood
• denial of access to premises TASK
• malware Search the web for risk analysis templates and investigate
• unauthorised access to data the sorts of risks to which organisations are susceptible.
Cambridge International AS and A level IT
Types of prototyping
Evolutionary/incremental prototyping Initial requirements
This type of prototyping takes an iterative approach
in that requirements are specified, an initial prototype
Rapid prototype
is developed, the prototype is reviewed and then
requirements are clarified and the prototype is improved
based on feedback.
Client feedback
Initial requirements
Specify final requirements
n
development has taken feedback can sometimes Requirements
place. last too long if the user is
regularly wanting changes
to be made to the latest Design
By listening to feedback
prototype. _
The initial costs of
Q
from end users, developing a prototype Implementation
the developers will
have a much better
are high compared with
traditional designs.
1
understanding of what the
users are expecting and so
a better quality solution
Verification
n
Maintenance
will be provided.
Table 14.01 - Advantages and disadvantages of prototyping. Figure 14.17 - Waterfall method.
Chapter 14: Project management
The high level of user Requirements are not Users who are not involved
involvement means that clearly specified from the in the JAD approach may
the end solution is more outset and so the final be disappointed that they
likely to be suitable for the solution may not meet didn’t have a say in the
end users, who will also the entire needs of the process and the system
have ownership of the organisation. may not meet their specific
solution. needs.
Users are often not sure Users are required Table 14.02 - Advantages and disadvantages of RAD.
of what the requirements throughout the whole
of a system should be process and they also have
from the outset and their normal day jobs to
so the evolutionary do. This can lead to work 6 Compare and contrast evolutionary and throwaway
approach of RAD enables overload or the need for prototyping.
the requirements to temporary staff.
7 Describe joint application development.
evolve.
Cambridge International AS and A level IT
Benefits Drawbacks
Expensive prototypes are Both CAD and CAM have
¥ r/J
not always necessary as
users can experience 3D
led to the loss of jobs and
the need for reskilling of
models, and stress testing employees.
can be carried out on these
H 3D models.
CAD drawings can be Testing using a model will
Figure 14.18 - Motor vehicle design. modified and enhanced never provide the same
without manufacturing results as testing using the
CAD uses vector graphics to create objects in two cost until a final version is manufactured product
dimensions (2D) or three dimensions (3D). Due to the completed. and so at least one
manufacturing nature of CAD, it is common to use 3D manufactured prototype
tools. A plan view is often used in 2D and the CAD software is required before mass
will render a 3D view, which can be viewed from any angle production.
and zoomed in or out. Objects can be stretched, resized
A list of required materials Although a user can
and moved and properties such as material and colour
can be produced from experience a 3D model, it
can be changed.
the CAD drawings is not the same as walking
Object libraries will be available within CAD software so automatically. through a real building or
that the user can select standard objects. For example, if holding a real product.
designing a house, an object library could include steel CAD models can be CAD software i$ very
beams, walls, paving slabs, windows and doors. Other viewed from many angles complex and so highly
applications for CAD/CAM include: by rotating the model and trained staff are required
• landscaping elements can be magnified to use it.
• vehicle manufacturing by zooming in.
Benefits Drawbacks
Components that have Initial costs of purchasing 8 Describe how CAD could be used to design an
been designed once can CAD software can be high. extension to a house.
be reused. 9 Give one disadvantage of GAM.
CAD requires fewer Designs developed with
designers than traditional CAD will include errors
drafters and so is cheaper made by the designer 9 Summai
for business. as the software is not
intelligent enough to The five stages of project management include conception
know when the wrong and initiation, planning, execution, monitoring and
materials have been control, and closure.
used. Different types of project management software include
CAM enables products Designers are limited desktop, web-based, single-user and collaborative.
to be mass-produced to using vector objects Project management software can be used for planning
consistently. based on geometrical the project, scheduling tasks, allocating resources,
modelling. budgeting, communicating and making decisions.
CAM is more precise than Critical path analysis identifies which tasks must complete
manufacturing on time in order for the whole project to complete on time.
by hand and can deal Gantt charts show start and finish dates of tasks, allocated
with tiny measurements. resources, predecessors, progress and the current
Manufacturer’s drawings position within the project.
can be created seamlessly.
CAM removes the need
Disaster recovery management involves writing a
disaster recovery plan in case there is a disaster. Disaster
m
recovery plans should include an assessment of risks,
for manual labour and
so reduces costs for
methods of securing the risks, methods of recovery and
business. plans fortesting the recovery methods work.
Prototyping is a 'mock-up’ of a software solution in a
Table 14.03 - Benefits and drawbacks of CAD and CAM. primitive form and can be evolutionary/incremental or
throwaway/rapid. Rapid application development uses
prototyping to develop a system in a very short time
frame. The waterfall method of development identifies
TASK
user requirements at the start of the project, similar to
Find out how CAD/CAM is used in dentistry and the system life cycle. Computer-aided design is the use of
prosthetics. computers to design physical products and computer-aided
manufacturingturns those designs into physical products.
Review questions
A landscape gardening company has commissioned a software development company to
develop a new piece of software that can be used by customers to view a model of what their
new garden might look like. A project manager has been appointed to oversee the project.
1 Identify four stages of project management that will be coordinated by the project
manager. [4]
Cambridge International AS and A level IT
The project manager has the option of using critical path analysis (CPA) and a Gantt chart for
planningthe timescales of the project.
4a Compare CPA with a Gantt chart. [2]
4b Identify two features available in a Gantt chart that are not shown on CPA. [2]
An evolutionary prototype approach will be used during the design and development of the
software.
5a Define the term ‘prototype’. [1]
5b Evaluate the reasons for the project manager choosing an evolutionary approach. [4]
:ti
By the end of this chapter, you will be able to:
An alternative way of asking this question would be: requirements of the organisation as a whole and the
information that is required for decision making. If end
Please list any information you would like to be users are being interviewed, then the questions need
included on the school report. to be aimed at finding out what the users need to make
This would make it very difficult to quantify the their jobs more efficient. Interviews don’t have to be
responses and analyse the findings as each with individual users. They can take place with groups
respondent would give very different answers. By of users or focus groups that represent user groups or
providing the list, the analyst is able to give the customers.
respondents a starting point. The logistics of each interview also needs to be planned.
It can sometimes be difficult to find a time when both
the analyst and the client are available, especially if the
A mixture of multiple choice questions, opinion ratings
client has a busy schedule. Honesty is important during
and open questions should be used. This will provide
interviews so that the analyst can get an accurate picture
a balance of quantitative analysis of closed questions
of how tasks are completed. This can sometimes be
and a qualitative analysis of open questions where users
difficult to achieve as end users may not want to admit to
are able to suggest alternative ideas to those presented
taking shortcuts in their tasks or not carrying out tasks to
by the questionnaire. Questions should also be written
the best of their ability. In these situations, anonymous
in a way which does not threaten users and the way
questionnaires can get more honest responses. With
they currently do their work. Users should be given the
interviews, the analyst has to be involved with every
opportunity to return their questionnaires anonymously
interview and this can result in a lot of time being used
because that means more honest answers are likely to
up early in the project.
be given.
Observation
DISCUSSION POINT
Observation involves the analyst watching the
Questionnaires should ideally be completed online. This processes that take place within an organisation to
means that the results are immediately stored and readily find out how everyday tasks are completed. This can
available for detailed analysis in the form of graphs and involve sitting with users to understand the tasks they
tables. Filters can be applied to the results and responses have to complete, with an opportunity to ask questions
can be compared based on the answers given to another of the users to elicit further information that could be
question. For example, a filter could be applied to compare
needed for a requirements specification. This can
the responses of all males who work part-time compared
with males who work full-time. give a very good understanding of the current input
data, processing methods and output information.
Other options can include wandering around an office
throughout the day to see how information is shared
Interviews amongst users.
Interviews involve a direct conversation between the
One disadvantage of this method is that when users
analyst and the client. Where there is a single end user or are being observed, they may do things differently from
small group of end users then interviews are the perfect normal or they may be more efficient and so this does
solution, because questions can be asked of the users and not give the analyst a true picture of what is happening.
a conversation can take place which can expand upon
The analyst needs to be able to identify how long tasks
answers that are given with follow-up questions searching
genuinely take and any inefficiencies that could be
for further detail. Even in large organisations, interviews
improved upon. By observing users directly, the analyst
can still be used with key stakeholders or representatives
can get first-hand experience of the inefficiencies and
of user groups. can plan to overcome these. Of course, some users may
Questions to be asked during interviews should be not like being watched and this may cause them some
planned and designed to elicit the required information stress, which means they don’t perform as they would do
from the client. The questions will vary depending on normally. Although this method can take up a lot of time,
who is being interviewed. If management are being it is the most insightful method of finding out how an
interviewed, then the questions will focus on the organisation works.
Cambridge International AS and A level IT
m
client. needed to run
J\ Specifies the
data structure to
needed to run
the system.
be used.
Table 15.01- The different types of specification.
Figure 15.01 - Receipt.
Requirements specification
1 Identify the output information that is included on the A requirements specification is a contract between the
receipt. developer and the client. It will specify exactly what the
2 Identify any calculations that are likely to have taken client needs the system to do so that the developer can
place on the receipt. produce a system that meets the client’s needs. The
3 Identify which information is likely to be the same analyst will usually write the requirements specification in
for all receipts and which information is likely to be consultation with the client who will approve it.
different for each receipt.
A requirements specification should include:
The analyst will need to see examples of any documents • the purpose of the system
that show output information or give an indication of what • the main objectives of the system
data is being collected for input to a system. The analyst • data that must be output from the system (e.g. invoices,
can sometimes also identify processes that take place by sales reports)
looking at documents. It’s also possible to estimate the • data that needs to be input to the system to generate the
amount of data that is likely to be required if the volume of outputs, including any screens or data collection forms
documents is known. • validation and verification that is needed for input data
This method is not to be used on its own but must be • processes that need to take place to convert inputs into
used in conjunction with other analysis methods, as it outputs or to store data
is difficult to identify the processes just by looking at • data that need to be stored
documents. Examination of the documents also only • functional requirements such as performance measures
shows data that is currently output and doesn’t give the • deadlines for each milestone within the project.
analyst an opportunity to find out what additional data
an organisation might need or what data the organisation
does not need. This information can be found out by
following up document analysis with interviews. Here is an extract from a requirements specification
for a new town council website. The extract shows
The content of specifications specific data that is required on the home page in
There are three types of specification used within the life addition to that which will have been specified for all
cycle. These can be summarised as shown in Table 15.01. pages:
Chapter 15: System life cycle
• Quick links data structures will be and how the system will work. It is
• Show list of links editable by content manager intended to give the user an idea of what the system will
• Initially to be: look like before it is developed so that the user’s feedback
• How can I get involved? (go to Consultations) can be incorporated into the final designs. The developer
• How can I stand for council? (go to Elections will then follow the designs.
arrangements)
• When is the next steering group meeting? (go to Later in this chapteryou will learn how to design:
Meetings)
• flowcharts
• When will I be able to vote for councillors? (go to
Key dates) • data flow diagrams
• What powers does the Town Council have? • data collection forms
• How do I report a problem? (go to City Council • screen layouts
sub-page) • validation routines
• When can I vote for councillors? (go to Elections • data dictionary.
2016 arrangements)
In addition to this, a design specification will include:
• News list
• Picture, news title, date (taken from list of news) • house style (logos, colours, fonts, styles, sizes)
• Button:view all news • screen sizes
* To show latest four news articles • connectivity diagram to show links between screens
• What’s on list
• Picture, event title with hyperlink, date and
• purpose of calculations.
time (taken from List of events, Key dates and
Meetings)
• Button: view all events
1 Identify five stages in the system life cycle.
• Button: view all key dates
• To show next four events. 2 Explain why interviews are better than
questionnaires for smaller groups of users.
3 State the purpose of the system specification.
System specification
A system specification lists all the software and
hardware that is needed for the new system. The software
needs to be identified first as the hardware will depend 15.02 Design
upon what software is needed. Only software that is
needed to run the system shoutd be specified. There may
be different software identified for different types of users DFD: data flow diagram which shows how data moves around
and for servers. a system
System flowchart: an overview of how a system works in a
Once the software is known, the minimum hardware
diagrammatic format
required to run thatsoftware can be identified. In addition
to this, the analyst needs to consider how much storage
space is going to be required forthe data being used by
the system. The analyst will probably also recommend Diagrams can be used to describe how a current
system works (during analysis) orthey can also be used
higher than minimum specifications so that the system
to demonstrate how a new system will work (during
functions at a reasonable speed. These specifications will
include the processing power and the amount of memory design).
required. External hardware components that are needed
should also be specified and these should be based upon Data flow diagram
the requirements of the user. A data flow diagram (DFD) shows how data flows
throughout a system. It is not about the order of
Design specification processes, it is purely about the data flows. The
The design specification is produced by the designer elements shown in Table 15.02 are used within
and is an illustration of how the system will look, what the a DFD.
Cambridge International AS and A level IT
DFDs can exist at many levels. At level 0, or context level, To create a level 0 DFD, you should identify the external
the diagram will show the whole system and the data entities and the data flows between the external
flows between the whole system and any external entities, entities and the system. It is important to remember
such as customers, suppliers, members, guests etc. that it is the data flow that is being represented and not
physical objects. Each data flow will be in one direction
only.
Guest
TASK
A
& A% Create a level 0 DFD for the scenario below.
®-S A car hire company accepts bookings of cars by
8
ri
(
Bill telephone. A credit card payment for the deposit is taken
from the customer at the time of booking. When the
customer arrives to collect the car, they have to provide
details of their driving licence, which are stored by the
Hotel car hire company. The car hire company will provide the
booking
system customer with details of the insurance and breakdown
services for the car. The customer must pay the remainder
of the hire cost before taking the car. The customer will be
Figure 15.06 - Level 0 DFD.
presented with an invoice showing the payments made.
This DFD shows the system as the hotel booking
system. It shows the guest as an external entity. It
then shows the four items of data that flow between
The next level is a level 1DFD. This shows the flow of
the guest and the booking system.
data within part of a system, or if the system is small
Chapter 15: System life cycle
System flowchart
A system flowchart shows the processes that take place
Figure 15.07 is a level 1DFD for the hotel booking within the system and the decisions that are made. It
system. Any other aspects of the hotel system are focuses on the logic of the system, rather than the data
considered to be external entities. within the system. A flow chart can represent a whole
system or just part of a system. The elements shown in
- Guest Table 15.03 are used within a flowchart.
s IE
1 Element Purpose Symbol
Hotel booking system £i
Bill
I Terminator The start and
Online booking end of the
1
Check room Activate Produce I VII
flowchart.
availability key card
Bar
bill expenditure
Is
postcode
No Ask guest Postcode
>-»• to check message TASK
v valid?/ postcode
*
EXAMPLE
W
dissatisfied, 5 = neither satisfied or dissatisfied, 10 = very Figure 15.15 - Poorly designed form.
satisfied).
Cambridge International AS and A level IT
05/09/2013
O 1 Hour
O 2 Hours
O 3 Hours
When designing a screen it is good practice to follow the Main Menu Clear
L
Arial, bold, 20,
principles below:
t
Button to Button to
black, yellow
background
• use colour sparingly and appropriately; different return to clear screen
colours could be used for questions and responses or main menu
for different types of data; colours that the user expects
should be used, for example green is usually seen as a * Instructions in Arial, 14, black 800 x 600 screen
positive colour and red as a negative colour Figure 15.17 - Screen design.
• ensure all fonts are used with consistency
• avoid clutteringthe screen with too much information, Validation routines
but at the same time try to fit all information that
needs to be viewed at the same time on a single screen
TASK
• ensure the font style and size are legible
Revise validation routines from Chapter 1. Complete the
• if the screen requires user input: following table.
• include instructions about howto complete the form
identify which questions must be answered and Validation type Description Example
which are optional Presence
provide enough space for each answer Range
use tick boxes for multiple choice lists that can have Type
more than one response Length
use drop-down boxes (combo boxes) or option Format
buttons (radio buttons) for multiple choice lists that
can only have one response.
When designing a screen or collection form, it is only Validation rules should be used wherever possible and
necessary to indicate where questions and responses be appropriate in order to reduce the number of possible
will go, the types of response options and the styles input errors. They only need to be used for input data so
Chapter 15: System life cycle
4 Identify the purpose of a data flow diagram Valid (also called Data that will be accepted by the
(DFD). normal data) validation rule.
5 Identify one rule for data flows within a level 1 Invalid (also called Data that will not be accepted by
DFD. abnormal or the validation rule.
6 Describe the difference between a tick box and erroneous data)
an option button. Extreme valid (also Data that will only just be accepted
called extreme by the validation rule because it is
data) at the limit of acceptability.
Extreme invalid Data that will only just not be
15.03 Development and testing accepted by the validation rule
KEY TERMS
because it is just beyond the limit
of acceptability.
Test data: data that will be used fortesting a system
Table 15.04 -Types of test data.
Alpha testing: initial testing of the software by a limited group
of people
Beta testing:a sample of users test a pre-release version of
the software
Black box testing: testing of inputs and outputs to a system To test the validation rule that gender must be ‘M’ or
or part of a system with no consideration forthe workings of
‘F’, the following test data could be used.
the system
White box testing: testing the whole system in terms
of structure and logic covering all paths through the
Type of test data Data
system Valid (normal) M,F
Invalid (abnormal or erroneous) B
meets the criteria of the query and only just fails to meet there may be knock-on effects to other parts of the
the criteria of the query. Where there is more than a single system.
criterion, data should also be selected that only meets Beta testing is used when software is being made
part of the criteria in case both parts have not been set up
available to a large number of customers. Beta testers
correctly.
will be real customers who have been selected to test
an early release of the application. Beta testing only
takes place after alpha testing has been completed.
Alpha testing is planned and structured using test data
The following data for records could be used to to follow all pathways through the software but beta
test the query for males over the age of 50 testing involves customers using the software in a real
(including 50). world environment using real data. As bugs are found
.
within a beta version, new beta versions will be released
Record for further testing before a final version is released for
number Gender Age Reason sale.
1 M 65 Both criteria met
2 F 25 Both criteria not met Black box testing and white box testing
3 M 25 Gender part met, age Black box testing involves selecting input data and
part not met checking that the expected output data matches the
4 F 65 Gender part not met, actual output data, with no knowledge or understanding
age part met of what happens inside the black box. The black box
could be the whole system or part of a system. White box
5 M 50 Age part only just met testing involves the same process of input and output
6 M 49 Age part only just not data but the internal structure and logic of the program
met are known to the tester.
White box testing usually takes place with small program
modules and is carried out by the software developers
The more criteria that are used and the more possibilities who coded the programs. They will do this to ensure
for extremes, then the more records that will be required that each module works in the way it was intended, and
to test the query fully.
because they know the inner workings of the module they
can test pathways that a black box tester would not know
about. The testing will be focused on whether detailed
TASK
designs, such as validation rules, have been developed
Data is stored about cars, including their make,
correctly.
model, registration number, transmission (automatic
or manual), colour, distance travelled and year of Black box testing usually involves testing the whole
registration. Select test data that could be used to test system or user testing. It can be carried out by
the query to find all automatic transmission cars that specialist testers or, in the case of user testing, by the
were registered before 2016. intended users. No knowledge of programming or the
way the system works is required. The testing will be
focused on ensuring the requirements specification has
Alpha testing and beta testing been met.
Alpha testing is carried out by the developers or a
specialised team of testers before a system is delivered
to the user. This usually takes place close to the end of The importance of testing and having a test
the development stage when the application is nearly plan
ready for the user. Alpha testing can take a long time Testing is necessary because no programmer or
because each time an error is found, testing has to be developer is perfect and errors are to be expected. These
repeated when the error has been corrected and errors need to be found and rectified. It is important to
Cambridge International AS and A level IT
The extract below from a test plan, tests the input of data where the date must be between 1/1/17 and 31/12/17.
The reason the test for 31/12/17 failed to be accepted may be because <31/12/17 was used in the validation rule
rather than <=31/12/17. Similarly, the reason 31/12/16 failed to generate an error message may be because >=
31/12/16 was used in the validation rule rather than >31/12/16.
ensure that the system is error free so that the users can Test plans
use the system knowingthat it will work reliably and A test plan will identify what is being tested, the type of
behave as expected. Although it’s almost impossible to test, the input data that should be used to test it, the
ensure a system is completely free of errors, a test plan expected result of the test and space to record the actual
can help to minimise the number of errors by ensuring result. Each test will be numbered.
that all pathways through a system and types of data
have been tested.
A test plan will identify all the tests that are needed for TASK
every input, every button, every link, every report, every Create a test plan to test the input of data for a character
screen and all other elements of a system. The test code between the letters D and P.
plan will include different types of test data, including
valid, invalid and extreme, so that inputs are tested to
their limits. Without this planning, important parts of As well as inputs, it is important to test that all
testing would be missed out and errors could be left calculations work as expected. Each input for a
undiscovered. The plan will also cover all the user’s calculation will need to be identified and an expected
requirements and ensure that they are tested. result determined.
Direct changeover
Direct changeover is when a date is chosen forthe old
7 Describe the purpose of using extreme test data. system to stop running and the new system to start
8 Describe two differences between alpha and beta running. The systems do not run at the same time and
testing. there is a clear break from the old system to the new
9 Explain black box testing. system. Data will need to be transferred from the old
10 Explain the importance of having a test plan. system to the new system before the new system can be
used.
Phased implementation
L5.04 Installation With phased implementation, parts of the new system will
This section hasthe title 'installation', however, the term be introduced one at a time. This often takes place when
'implementation' can also be used. Implementation can there is a large system with lots of functionality that can
have two meanings within the system life cycle and is be easily separated into sections. The old system will run
often understood to be the development stage where the until a date that has been agreed, at which point part of
design is implemented. the old system will be retired and part of the new system
There are four different methods of installing (implementing)
will start running. After a while, another part of the old
system will be retired and another part of the new system
a new system which can be remembered as the 4 Ps:
will start running. This will continue until the complete
• parallel new system is fully running.
• plunge (direct)
• phased Pilot implementation
• pilot.
Pilot implementation takes place when part of an
organisation starts to use the new system while the rest of
Parallel running
the organisation continues to use the old system. The new
Parallel running is when a new system and an old system system is effectively being beta tested by the pilot group
are run at the same time. On an agreed date, the new
who may also be able to deliver training to the rest of the
system will become live but the old system will continue to
organisation when the system goes fully live.
run. Data will need to be duplicated from the old system to
the new system. New data will need to be input into both
systems and output will be produced from both systems. Implementation method
This will continue until the organisation is confident that The most suitable changeover method will always
the new system is running satisfactorily. be dependent upon the individual circumstances
Cambridge International AS and A level IT
surrounding a new system. Factors that will need to be • number of users in the organisation
taken into account will include: • the size of the new system.
• how critical the system is to the running of the organisation The advantages and disadvantages of each method is
• cost shown in Table 15.05.
e
amount currently in stock.
Not enough items in stock
OK
Microsoft Access On the Order details form you have Check the invoice has been
ticked the Paid box before the dispatched. If it has, then tick
Invoice cannot be paid if not dispatched Invoice has been dispatched. the Invoice dispatched box.
TASK
Find a user manual for an electronic device or appliance 14 Give three sections you would expect to find in user
at home. Identify the different sections that are used and documentation.
compare them with those listed above.
15 Describe the purpose of a glossary in user
documentation.
16 Give a situation when technical documentation
Why technical and user documentation is would be needed.
needed
Technical documentation is required so that anybody
carrying out future maintenance on the system will be 15.06 Evaluation and
able to understand how the system was developed
and how it is configured. It is unlikely that the person
maintenance
carrying out future maintenance is part of the original Evaluation
development team and so will not be familiar with the When a system has been developed and installed, the
system without the technical documentation. Even if it is whole process will be evaluated. This is sometimes
the same person or team carrying out the maintenance, referred to as a review. The evaluation will consider how
they will need the documentation to remember the the project team and end users worked together so that
structure of the system. lessons can be learned for future projects.
User documentation is needed so that the user Users will be given questionnaires to find out what they
can learn how to use the new system or look up think of the new system and how they feet it is improving
how certain features are supposed to work. The their workflow (or not). Selected users will also be given
troubleshooting section will be important for the user specific tasks to complete that will be observed to see
to understand what has caused an error to occur and whether the new system is living up to its expectations.
what they need to do in order to stop the error from Some users will also be interviewed about their
occurring. interaction with the new system.
Chapter 15: System life cycle
The most important question to be asked will be customer contact. The system only allows for the
whether the system meets the user requirements. Each contact details of one person to be stored. Many
requirement will be considered in turn to determine if it users of the accounts application have requested
has been fulfilled. If it hasn’t been fulfilled, then actions that the system be adapted to store details of
will be set to rectify the situation in the long run. The multiple contacts for each customer and that
efficiency of the new system will also be discussed. Users contacts who should receive invoice payment
will have been given an opportunity to feed back on how reminders are identified within the software so that
well the new system is working forthem and if there are they go to the right person.
any problems. It is expected that the new system will work
more efficiently than the old system. However, if there are
problems that need addressing, then actions will be taken. Adaptive
The requirements specification should have specified how Systems need to adapt to changes. There could be changes
easy the new system should be to use. This can be rather to internal procedures within an organisation or changes
subjective and so it is difficult to measure. Again, feedback over which the organisation has no control. For example,
will have been gained from users as to how well they have new government legislation could be introduced to which
adapted to the new system and how easy or not they find the system has to adapt. It’s necessary to adapt to changes
it to use now they are using it regularly. If there are issues so that the system continues to work effectively and
regarding ease of use, then plans can be made to simplify doesn’t produce incorrect outputs. It’s important that the
any processes by adding additional features to the software system enables an organisation to comply with new laws.
if necessary. There is also a need to adapt to new technology such as a
new operating system or a new web browser.
There will also be an opportunity for users to make
suggestions for future improvements or additions to the
system.
Review questions
Thornhill Estates runs several hotels. It would like a new software solution to manage room
bookings, dinner reservations and purchases across all its hotels. It has asked a software
developer to produce the software for them. The software developer will follow the system life
cycle.
la State one purpose of analysis in the system life cycle. [1]
lb Give two reasons why questionnaires would be appropriate for researching how bookings
are currently managed at the hotel. [4]
lc State three other methods that could be used to research the current booking system. [3]
The designer will create a design specification based on the requirements specification.
3a Identify three factors that should be considered when designing a screen layout. [3]
3b Using an example, show how a validation rule could be designed forthe hotel booking
system. [3]
3c Apart from keyboards, mice and monitors, discuss three external hardware components that
will be needed by the hotel system. [3]
Chapter 15: System life cycle
The system will be installed in a pilot approach and user documentation will be provided to the
hotel staff.
5a Give reasons forthe pilot approach of installation forthe hotel system. [4]
5b Explain why the user documentation should include troubleshooting and glossary
sections. [4]
5c Give four reasons why the hotel system may require maintenance in the future. [4]
••
••
*• •• •
•V*
•• ft •
. •
§
••
t
••
?>•• ••
•••;
•• k •• %
Chapter 16
Graphics creation
Learning objectives
By the end of this chapter, you will be able to:
.
! ;1KT
TIP
Vector: an image that uses geometric points and shapes. A bitmap image is made up of small squares called pixels.
Calculations are used to draw the image Each pixel can have one colour. If you change the size of the
Bitmap: an image made up of small squares, called pixels. image, the pixels are enlarged or made smaller. By enlarging
Each individual pixel can only be one colour the pixels you pixelate an image, and it goes blurry.
Pixel: a small square of one colour These are combined to
create a bitmap image
Q Remember
A vector image is created using shapes and coordinates.
Mathematical formulae and calculations are used to draw the
image and fill areas with colour. If you change the size of the
image, the computer recalculates and redraws it. This means
.
it does not go blurry (pixelate). The image itself is not saved.
Only instructions on how to create the image are saved. For
example, coordinates fora line and a calculation fordrawing
the line are stored, includingthe colour, width etc. Figure 16.03 - A bitmap image.
kAA. - X* .£.4 A
speech bubbles. They could be used, for example, to images to both improve the image and make the image
create a logo or an animation where characters can be look worse. For example, in magazines, photos may be
drawn using a graphics tablet. edited (airbrushed) to make people appear thinner or to
remove blemishes, such as wrinkles and spots.
my •
\ 1
A
\
'll l
TASK
Open some of the images you have stored on your
computer or on your account. Are they a bitmap or a
vector image? Try enlarging them. Do they pixelate?
Software exists that can turn bitmaps into vectors, Vector images can be used on their own or added to
and vectors into bitmaps. For example, if you scan a a bitmap image. For example in the meme shown in
document, you can vectorise it. Most image manipulation Figure 16.07, vector text has been added to the bitmap
software has this option. photo.
These are just two examples of how image manipulation
Use and impact of image editing on society can be used. Each have their positive and negative sides.
This section will explain some of the tools available to In the first example in Figure 16.06, the company may
manipulate images. These tools can be used to edit increase sales by showing a perfect model. However, the
image is not real and people may strive to achieve this independently without affecting other elements of the
impossible vision. This can contribute to mental health image. You can also add effects, such as transparency, to
problems. Memes can be used to draw attention to an one part of your image.
advert or create humorous effects, but they can also be
used negatively, to make fun of people and situations and TASK
may be used without the consent of the person in the
image. O CD 16.01 Background
Open CD 16.01 Background in your image manipulation
software. You may need to convert this to a different file
type depending on the software you are Using. Add a
DISCUSSION POINT new layer to this image and use the drawing tools to add
Look at a magazine, newspaper or book and the images shapes, lines etc. to the image. Use the drawing tools to
inside it. How do you think the images might have been draw a new tree or flower or other feature. Change the
manipulated? Does this add to the publication? Why have shapes, move them, delete them, and the background
they edited them? layer should not change. Add further layers with
additional shapes or objects.
tools’ tick box or option in the menu system to let you (it may be in a toolbox or in a menu). It may look similar to
access these controls. You can then use the handles in the the symbol in Figure 16.08.
corner or edge of the item to change its size and orientation.
TASK
U
CD 16.02 Bench Figure 16.08 - Crop symbol.
O CD 16.01 Background Highlight the area of the image that you want to keep.
Insert the bench from CD 16.02 Bench into the Press enter to complete the crop.
background on CD 16.01 Background. Resize the bench
and move it into a suitable position.
TASK
CD 16.01 Background
Selection tools Using CD 16.01 Background, crop the bottom layer of
A selection tool lets you access, edit and manipulate soil from the image and the top of the sky above the
just one part of an image. You can choose which parts to clouds. Make sure you havethe correct layer selected
before you begin, otherwise you will crop the wrong
change. There may be a range of different tools that you
image.
can access depending on your software. For example:
To select multiple areas, you usually need to hold down • Fill with gradient: choose two colours and the colour will
the Shift, or Ctrl key at the same time as making the gradually grade from the first to second.
selections. • Fill with pattern: select from a range of patterns to fill a
When making your selection, make sure you are on the shape. You can usually choose a colour as well.
correct layer. If not, then you will be selecting that area There may be a range of other fill tools, depending on your
of a different layer, which will not give you the image software, that you can experiment with to see what they
required. do.
TASK
TASK
CD 16.01 Background
O CD 16.01 Background
Use a selection tool on CD 16.01 Background. Select one
Use a fill tool to change the colour of the sky, trees and
of the trees. Create a new instance of this object (copy mountains in CD 16.01 Background. Make sure you have
and paste it into a new layer), then use the transform the correct layer selected first. Change the fill colour of
tools to adjust its position and size. Repeat this with the the bench by use a fill pattern or gradient.
bench.
Node editing
Node editing lets you adjust a shape by manipulating the
Crop tools angles used to create it. Some software refers to nodes as
Cropping lets you select only part of an image to keep and paths. Figure 16.09 shows the node manipulation symbols
removes everything else. To do this, select the crop tool that appear.
Chapter 16: Graphics creation
*‘
,ai extension and CorelDraw may provide a .cdr. These file
types are not always compatible with other software.
To change the file format, you can either:
TASK
Fix text to a path Look at the different file types available in your software.
Research for what these are used. Save your image using
As well as adding text to an image, you can design a path different file types. Make sure you change the filename
for text to follow, so it can curve, spiral or do whatever you on each one so you do not accidentally overwrite your
want it to do. image. Compare the file sizes and the quality of the
The path, or shape, for the text to follow needs to be images you have saved.
drawn first. Make sure this path is selected and when you
click on the text tool you should be able to click on the
path. When you type, the text will follow the path.
TASK
A computer programmer has set up a company called
TASK Stars. They would like a logo created to put on their
website, business cards and promotional material for the
CD 16.01 Background
company. Design and create a vector logo for Stars.
Draw a curved line, similar to that in Figure 16.10, above
the trees in CD 16.01 Background. Give the image a
title. Adjust the text size, colour etc. so it fits in with the
scene.
4 What is a layer?
5 What are the three different selection tools?
Figure 16.10 - Curved line. 6 What does grouping objects do?
Cambridge International AS and A level IT
TASK TASK
16.03 New York 16.06 Doorway
16.04 Helicopter 16.07 Landscape
Open CD 16.03 New York and CD 16.04 Helicopter. Add Create a new bitmap image file and insert CD 16.06
further copies of the helicopter onto the New York image in Doorway and CD 16.07 Landscape. Place the CD 16.06
the same layer. Select all of these layers (you may need to Doorway layer on top of CD 16.07 Landscape. Put a mask
use the Shift or Ctrl button to select more than one), then over the doorway opening, so the landscape is visible
group or merge the layers into one layer. You should now be through the doorway (you can choose to leave or mask
able to move them together. the wall).
Chapter 16: Graphics creation
Tools to improve parts of an image • Blur: this tool reduces the focus on areas of the image.
There are a number of tools that you can use to edit parts You can adjust the strength of the blur, then drag the
of a bitmap image: tool over the area of the image you want to blur.
• Distort: this tool allows you to change the perspective
• Blend: using this you can blend different layers of an image, or part of an image. For example, if a
together by changing the opacity (transparency). If the
photo has distorted perspective, using a lens correction
foreground and background are different colours, the
distortion can realign the image.
blend tool can create a gradient blend of these colours.
There are a range of different blend techniques from • Sharpen: this tool improves, or increases, the contrast
between colours. For example, an edge between a
which you can choose, for example a 'hard light’ option
light and dark area can be sharpened to make it more
will bring dark elements to prominence.
defined.
• Replicate: This may also be known as a clone tool. With
this you can make an identical copy of part of an image.
For example, if you have a tree that you would like to TASK
duplicate, by using this tool you can 'paint’ a copy of 16.08 Fruit bowl
the tree in a different place without having to trace the Open CD 16.08 Fruit bowl. Use the sharpen, distort and
outline and copy it. blur tools to alter the image, f or example, you could
• Retouch: the clone tool can be included as a retouch make the fruit the focus by increasing the contrast and
tool, but there are often others such as a healing brush blurring other elements. You could also use other tools
and patch tools. These apply the pixels from one area mentioned above, for example the done tool, to add
of an image to another area. For example, a smooth more fruit to the image.
area of skin on a photo of a person can be used to cover
blemishes by applying the pixels from the smooth area.
Adjusting colours
An entire image, or just part of one, can be converted
TASK
from colour into black and white, or duotone. The
Find and save a photo of a person (it could be an image colour is usually applied by adding a new layer on top
of yourself). Use the clone stamp tool to add more hair. of the image and this is then adjusted, for example
Use the retouch to remove any flaws or remove items by choosing a black and white, or more commonly,
such as jewellery by using the skin to cover the area.
greyscale option.
Duotone involves selecting a colour, which is then applied
to your image, again by adding it to a layer. To do this,
Remove red eye
choose a duotone option (this may be in the menu
The red eye tool will automatically remove a red eye effect
options). You can select two colours, for example black
caused by a photo flash. Once you have selected the red
and red. You may then have an option to adjust the extent
eye tool, simply draw a box across (or click on) the red
of each colour. The result will be the original image made
pupil. You may need to do it more than once to get the
up of just these two colours and their shades.
whole area. The tools uses the other colours from the eye
to fill in the pupil. It is also possible to change an image to black and white,
then add a duotone, which changes the impact because
it is being applied to grey as opposed to a range of many
TASK
colours.
Take a photo of a person, using a flash, which results in
a red eye effect or find a photo which is affected by red Opacity means a lack of transparency, that is how solid
eye. Use the remove red eye tool to correct the image. and un-see-through the image is. Opacity is a percentage,
which represents how transparent an image is. For
example, 20% opacity means that the image is 80%
Filters transparent. This can be added as a mask to the entire
A filter can be used to add effects to an image or to change image, ora small area of an image can be selected (using
a small element of it. There are numerous filter tools you an appropriate selection tool) and then the opacity can be
can use: altered just in this area.
Cambridge International AS and A level IT
279
Review questions
1 Describe the difference between a bitmap and a vector graphic. [4]
2 Explain why a bitmap image pixelates when increased in size. [2]
3 Explain why a vector image does not pixelate when increased in size. [1]
4 A fashion magazine is published, aimed at teenagers between the ages of 13 and 16. They
are considering the use of image manipulation software to alter the appearance of the
models and clothes in the magazine. Evaluate the use of image manipulation software in
this magazine. [9]
I II
I
Chapter 17
Animation
Learning objectives
By the end of this chapter, you will be able to:
create an animation
place objects and images
use frames and key frames
use timings and layers
manipulate objects (show, hide, move and resize)
understand and use tweening (motion and shape)
understand and use morphing
add text
change the opacity of objects and text
r,
B
VA
Chapter 17: Animation
m Layer
An animation is made up of layers which each has its own
animation schedule. For example, in Figure 17.04, the
Figure 17.02 - A book with the pages being flicked.
Tree 1and Flower 1appear in frames 1to 7, but frames
8 to 14 no longer have the Tree. By using layers, you can
Each of these pages, or individual images, is called a
independently manipulate different parts of an image.
frame. A computer animation is made up of a series of
Flower 1
TASK
Figure 17.04 - Example timeline. 1 Using animation software, draw a stick person, as
described above. Make sure each part of the person is
The numbers on the top row in Figure 17.04 represent the in its own, appropriately named, layer.
frame numbers. A frame that is grey, for example frame 2 Draw an underwater scene, with rocks, seaweed,
1for Tree, has an image in it for that layer. A frame that fish etc. Make sure each component has its own
is white, for example frame 8 for Tree, does not have an layer.
image in it for that layer.
I
TASK
17.02 Summary
1 Create a shape tween that changes a red square into The numbers on the top row in Figure 17.04 represent the
a blue circle. frame numbers. A frame that is grey, for example frame
2 Create a shape tween that changes a rain cloud into a 1for Tree, has an image in it for that layer. A frame that
sun. is white, for example frame 8 for Tree, does not have an
3 Draw a scene that shows the changes during a year,
image in it for that layer.
for example a river and forest showing a) lush green
sunny days, b) leaves changing to red and orange A tween creates a smoother animation as the computer
and falling, c) a frozen river with barren trees, d) new calculates the changes. A motion tween is used to move
growth emerging. objects. A shape tween, or morphing, allows an object
to change into a different object. A shape tween can also
allow colour change.
Review questions
1 Describe how layers are used in an animation. [2]
2 Explain the difference between a key frame animation and an animation using tweens. [4]
3 Define the term morphing. [1]
i
285
Chapter 18
Mail merge
Learning objectives
By the end of this chapter, you will be able to:
EXAMPLE
Mail merge: the automatic addition of data, such as names
and addresses, from a source file into a master document, 18.01 Learner letter
such as a letter
CD 18.01 Learner letter is a master document. It is a
Source file: the file containing the data that will be merged
letter written to learner drivers in a driving school.
into the master document
The words in italics are the data that needs to
Master document: the main document that will be used for
all records
be inserted about each learner driver and will be
obtained from the data source.
Field: a category of information
Prompt: a question asked to the user which requires a Pass 1'* Driving School
response
Date will go here
Filter: selecting records from the source file based on
Full name of recipient will go here
conditions Full address of recipient will go here
Dear forename
We are conducting an annual check of our records. Could you please confirm that your
18.01 Mail merge telephone number is telephone and your mobile number is mobile.
We would be grateful if you could email us at [email protected] with your email address.
Q Remember
A mail merge is the automatic process of merging data,
Yours sincerely
Sincerly
TASK
Create a master document that will be used to write to
Carlos customers of IT Distribution Inc. The letter should be in a
xxxxxxxxxxxx xxxxxxxxxxxx
xxxxxxxxxxx xxxxxxxxxxx standard letter format including space for the recipient’s
August 2005 August 2005 August 2005
Please come in our slore in xxxxxx lo Please come in our slore in xxxxxx to Please come in our slore in xxxxxxx lo
often prizes each worth $250. The survey is available
claim your price. James lhank you for claim your price. Carlos lhank you for claim your price. Louis lhank you for
being a loyal customer. being a loyal customer. being a loyal customer. online and is available for two months from the date of
Sincerly Sincerly Sincerly the letter.
Merged documents
Figure 18.01 - Mail merge documents.
Create a source file
Create a master document structure A source file contains the data that will be included in
A master document is the main letter, email, memo, fax or each mail merged document. It usually consists of names
other document that will be sent to all recipients from the and addresses and other information about the people to
data source. whom a letter will be written.
EXAMPLE
Link a master document to a source file
The master document needs to know from where it will
18.02 Drivingschool.mdb get its data. Therefore, the master document needs to be
linked to the data source.
CD 18.02 Driving school.mdb contains a table called
Learner which includes the names, addresses,
telephone numbers and mobile numbers of learner EXAMPLE
drivers in a driving school.
18.01 Learner letter
Forename • Surname • Address I Address 2 • Postcode • Gend • Telephone • Mobile •
Patricia Thomas 896 Windsor Street Birmingham B21 4BR F 0555 555 555 0777 777 726 18.02 Drivingschool
Wendy Carolan 22 Gate2 Way York HH6Y72 F 0555 555 556 0777 777 725
Roger Harrison L
12 DeelTrod Lane Holyhead HH7 6YT M 0555 555 557 0777 777 724
Sally
Claire
jStnyttie
Charkley
23 Hapstead Grove
14 Green Lane
Stevenage
Stowbridge
HR5 3RD
HT6 8TN
F
F
0555 555 558 0777 777 723
0555 555 559 0777 777 722
CD 18.01 Learner letter has been linked to the
Learnertable in CD 18.02 Drivingschool.
Figure 18.03 - Source file.
Select Table
• CD 18.04 Student I OK I
We would be grateful If you could email us at [email protected] with your email address.
Ben Dean
Yours sincerely
Senior Instructor
replaced with data from the Learner table. Figure 18.07 - Merge preview.
Chapter 18: Mail merge
Create prompts
Master documents are often used several times and on OK Cancel
many different occasions. There may be some data that
needs to be included within the master document that is
not part of the data source but will change each time the Figure 18.10 - Prompt.
mail merge is run. A prompt can be given to the user that
asks the user what that data should be.
o DISCUSSION POINT
Microsoft Word uses rules to control the way the mail
merge works. Fill-In is one of these rules. It is most
EXAMPLE
commonly used to ask for one item of data that will be the
same for every letter. However, by deselecting ‘Ask once’, it
18.11 Learner letter with fill-in prompt is possible to have a different response for every recipient.
CD 18.11 Learner letter with fill-in prompt asks the
user to enter the name of the senior instructor who
will sign the letter.
TASK
SÿCD 18.08 New class
Insert Word Field: Ask
Open the master document CD 18.08 New class to which
Prompt: you have added merge fields. Add a Fill-In prompt for the
Which senior instructor will sign the letter? name of the Head of Year.
Open the letter that you wrote for IT Distribution Inc.
before you completed the mail merge process. Add a
Fill-In prompt for the date until which the survey will be
Default fill-in text: available.
* dpar*7«/in!*fMl vrttf)
(will <K»t
Open the master document CD 18.08 New class to which
you have added merge fields. Instead of a Fill-In prompt,
add an Ask prompt for the name of the Head of Year and
• £
•
li.ln<MLv UXIMI
assign a bookmark. Insert references to the bookmark at
I "«<ÿ•» I the end of the document where the Head of Year will sign
htt I i’iI , WIIIUI J j i i uu.i > •i«s J>2. and a new sentence that will inform the parents who the
Head of Year will be.
Figure 18.13 - Reference point.
18: Mail merge
“
And
0
v]
ffwtdar
Data Updat'd a
Companion:
equal to
tail than EI - Data sources are often fixed and cannot be changed.
Therefore, any data manipulation may need to take place
in the merge master document. The IF...THEN...ELSE rule
£i«ar AII m 11 CWWI |
can be used to insert text conditionally based upon data
Figure 18.17 - Filter.
within the data source.
291
This will work fine for situations where there are only two Error-free accuracy
alternatives. However, when more than two alternatives are There are a number of checks that should be carried out
required, a different method needs to be used. One option is to before completing a mail merge:
use a series of IF...THEN...ELSE rules to cover each eventuality.
• run a spell checker and grammar checker on the master
document
• visually check for any errors on the master
Some records may not have the gender recorded. document
In this situation, the letter should state ‘your gender • visually check for any errors on the preview or merged
is not recorded in our records - please confirm your documents
gender’. There are now three options: F, M or [blank] • check that the correct records have been included in the
in CD 18.15 Learner letter with three conditions. filter.
ELSE cannot be used because it would apply the Even if a spell checker has been run, there are errors
second outcome to both of options two and three. that will not be spotted. These can include words that
In Figure 18.21, three separate IF...THEN...ELSE rules sound the same but are spelt differently, for example
have been used without defining the ELSE part. stationery and stationary. The spell checker will not be
:
Our records show that your gender is { IF { MERGEFIELD Gender } = "M" "Male"H IF {
MERGEFIELD Gender } = "F" "Female"H IF { MlERGEFIELD Gender ) = "not recorded in our records -
able to identify problems with layout, such as spaces
please confirm your gender"). that are missing or have been added by mistake. Errors in
names are not spotted by a spelt checker and field codes
Figure 18.21 - Separate IFs.
will not be checked by the spell checker. A visual check
will also be required to see if all merge fields have been
The other option is to use a nested IF...THEN. . .ELSE rule. included.
This involves using another IF...THEN...ELSE rule as the
292 ELSE part of the original IF...THEN...ELSE rule. This can only
be manipulated in field code view.
CD 18.16 Learner letter with nested conditions has Pass 1“ Driving School
used a NESTED IF by enteringthe IF...THEN...ELSE 19 August 2015
rules within the ELSE parts of previous rules.
t<For«name»«Surname»
«Address_l»
Our records show that your gender ]$_{ IF { MERGEFIELD Gender ) "M" "Male" "{ IF { «Address_2»
MERGEFIELD Gender ) = "F" "Female" "not recorded in our records •please confirm your gender" )").
«Post_Code»
We are conducting a anual check of our record. Could you please conflrrrUhat you're
It achieves the same outcome as the previous telephone number is «Telephone» and you're mobile number is lnMobltt» \
example, but is a bit more complex. The speech We wood be greatful if you could email us at [email protected] with your email address.
marks need to be in exactly the right places, as do
Yours sincerely
the curly brackets.
Ben Deane
Senior Instructor
© DISCUSSION POINT
Figure 18.23 - Errors.
It’s possible to use AND or OR operators within the IF- Some errors have been spotted by the grammar
THEN...ELSE rule. It’s also possible to include text from files and spell checkers: 'a anual’ should be 'an annual’,
as the outcome or pictures as the outcome. You may want
to research how these can be achieved.
‘wood’ should be ‘would’ and ‘greatful’ should be
‘grateful’.
Chapter 18: Mail merge
PaulKrlstal
886 Yatch Road
Watchet Variable fields
JS8 4RB
One method of deciding which records will be included from
Dear Paul
the data source is to use a filter. Another method is to use a
We are conducting a anuffij check of our record. Could you please confirm that you're rule, which is a merge field code that will control which records
telephone number is 0555 555 511 and you're mobile number is 0777 777 720 .
will be omitted. The rule is called Skip If and this will omit the
Figure 18.24 - Merge errors.
record from the mail merge if the conditions are met.
The criteria for the filter are that letters should be \T'CD 18.19 Learner letter with selection codes
sent to male learners whose records haven’t been
CD 18.19 Learner letter with selection codes includes 293
updated since 1August 2015. This should mean
a Skip If rule that states that if the gender field is I
letters going to 11 learners. However, only four
equal to "M” then the record should be skipped.
letters will be produced.
M 0555 555 511 0777 777 720 KR!S9999999PA9XX 5/24/2014 Eield name:
M 0555 555513 0777 777 718 SARR9999999DA9XX 5/24/2014
M 0555 555 516 0777 777 715 DRAK9999999RA9XX 5/24/2014
Gender V/
Gender v Telephone I Mobile Licence number | Date updated v [ A rule is inserted into the document.
M 0555 555 557 0777 777 724 HARI9999999RA9XX 6/8/2015
{ SKIPIF { MERGEFIELD GENDER } = "m" [Pass 1st Driving School
M 0555 555 511 0777 777 720 KRIS9999999PA9XX 5/24/2014
M 0555 555 512 0777 777 719 SMIT9999999SA9XX 6/8/2014
M 0555 555 513 0777 777 71 8 SARR9999999DA9XX 5/24/2014 Figure 18.28 - Skip If code.
M 0555 555 516 0777 777 715 DRAK9999999RA9XX 5/24/2014
M 0555 555 517 0777 777 714 BLAC9999999SA9XX 6/8/2014
M 0555 555 518 0777 777 713 DREW9999999JA9XX 6/8/2014 The rule should always be inserted at the beginning
M
M
0555 555 519
0555 555 523
0777 777 712
0777 777777
BROW9999999DA9XX
PETE9999999PA9XX
6/8/2014
6/8/2014
of the document. When using Microsoft Word,
M 0555 555 525 0777 777 775 HARR9999999PA9XX 6/8/2014 you will need to complete the merge to see which
M 0555 555 526 0777 777 774 LANT9999999PE9XX 5/6/2014
records have been skipped as they will still show
Figure 18.26 - Filter correction. when previewing the merge.
Cambridge International AS and A level IT
Review questions
Service to You is a company that carries out car servicing at the customer’s home address. They
store details in a database of the services they have carried out and when the next service is
due. When a customer’s car is due a service, Service to You use mail merge to write a letter to the
customer to let them know.
la Describe the term mail merge. [2]
lb Describe the steps involved in creating a set of mail merged letters. [6]
I
•iir*
i
"
11
£]•
%
tr
I*
Cambridge International AS and A level IT
O CD 19.01Task!
19.01 JavaScript O CD 19.02 Task 2
• Open CD 19.01 Task 1using a basic text editor such as
Q Remember
JavaScript is a programming language that can be used to
notepad. Inside the script tags add code to output “Flello
World” onto the web page using document .write.
add interactivity to web pages. Its code can be integrated • Open CD 19.02 Task 2 using a basic text editor. A
into a HTML file to: create buttons, create text boxes, change paragraph has been given the ID ‘paragraph!. Inside
296
content etc. It can be integrated with a range of other web- the script tags add code to output “Hello World” into
based programming languages such as PHP. JavaScript is paragraphl.
often use with HTML forms, where it can validate data or • Add further paragraphs, change the text format for
perform actions such as when a button is pressed. these in HTML and use JavaScript to write sentences
in each paragraph.
TASK
Find a website that has functionality (such as a form Working with variables
with a button). What tasks does this button perform? A variable is:
• a space in memory
JavaScript can be added to a HTML document. It is • given a name
recognised by starting and ending the JavaScript code • where you can store data
with a script tag. For example, • where you can change that data.
<script> For example, you could create a space in memory called
Your JavaScript code would go here ‘name’ and you could store the name ‘Luca’ in there. You
could later change it and store ‘Katerina’. You can check
</script> what is stored there by asking what is stored in ‘name’. The
computer would tell you ‘Katerina’.
Outputting data
To write an output to a text page, you can use the code
document .write ( theOutput) . For example,
Declaration
A variable declaration tells the program that you need
<script> a space in memory and what its identifier will be. An
document .write ("Hello world") example variable declaration in JavaScript is:
</script> var name,-
Chapter 19: Programming for the web
Var’ tells JavaScript that you are creating a variable. Data types are not declared when declaring a variable,
‘name’ is the name of this variable. it is assumed when a value is given to the variable. For
example,
Assignment
var name;
Assignment means adding a value to that variable. For
example, name could be of any data type. But if instead we put,
The name of the variable comes first and '=’ can be read as the name is now a string.
word 'becomes’. This is the assignment operator. "Luca" is For example in
what is being stored. Luca is in speech marks (" ") because it
is a string (seethe section ‘Data types’). For example, var age,-
age = 18; age could be of any data type. But if instead we put,
This time the variable is called age, and the number 18 has var age = 0;
In an arithmetic calculation, you do not need to deal with Operator Function Explanation Example
numbers, you can use variables instead. For example, (5 < 6)
OR Is true if one
var firstNumber = 10; or both of the (7 < 10)
var secondNumber = 20; conditions Both are true, so
are true. If the result is true.
var result = firstNumber + both are false,
secondNumber; it is false. (5 > 6) ||
(7 < 10)
Table 19.03 - shows the comparison operators.
The second
Operator Function Example is true, so the
> Greater than 5 > 6; result is true.
! NOT Replaces 1(5 < 6)
This is false.
a true with This is false
< Less than 5 < 6;
false, or a because 5<6 is
This is true. false with true, but the I
Greater than or 5 >= 6; true. will change this
equal to This is false. to false.
<= Less than or 5 <= 5;
Table 19.04 - Logical operators.
equal to This is true.
Equal to 5 == 6; Logical and comparison operators are used in conjunction
with a conditional statement or a loop.
This is false.
Equal to and of 5 === "5"; To output the result of a logical or comparison operator,
298
insert the operation into an output statement. For example,
the same data This is false because
type the first is a number, the document. write (10 < 6);
second a string. You will learn more about these in later sections.
!= Not equal to 5 != 6;
*
what you have done. To add a comment, write //, then
anything after will be a comment. Forexample,
DISCUSSION POINT
When might you need to alter words in a program? Have you var count = 0; //number to act as
ever needed to capitalise text? Have you ever had to extract //counter in loop
some letters or parts of a word? Why was this needed?
while (count <= 12) { //loop 0 to 12
//displaying square numbers
Comments document .write (count * count);
A comment is text that you add to your code, which the //output square numbers
interpreter (the software that runs your program) does not
run. Comments can be used to make notes about how
count++; //increment counter
Conditional statements
TASK
A conditional statement lets you specify which, if any,
1 Create a program that stores the first name, second
statements are to be run.
name and age of a person. Output these in a
sentence, for example Roberto Mantovani you are 20
years old. If
2 Create a program that stores the first name and if checks a condition. If it is true, the first block of code
second name of a person in variables. Combine and is run:
output the first two letters of their first name with the
first two letters of their second name. if (5 < 6) {
message = "Yes it is!";
Arrays
An array is a data structure that allows you to store The code allocating text to message is only carried out if
multiple values under one name. It is often represented 5 is less than 6.
as a table, with each value given a number with which to
access it (known as the array index). For example,
Else
var colours = ["orange", "purple", An else gives you an option to run code if the condition
"green", "yellow", "grey"]; is false:
This code declares an array, called colours, with five if (5 < 6) {
elements. These are shown as a table in Table 19.06.
message = "Yes it is!";
Index 0 1 2 3 4 }else{
Value orange purple green yellow grey message = "No it isn't!";
Table 19.06 - An array. }
Elements can be extracted from this array. For example, If 5 is not less than 6, then the second block of code will be
the code below would store purple in myPavColour: run and the message will be "No it isn't!".
var myFavcolour = colours [1];
Elements can be replaced in this array. For example, the Else if
code below will replace ‘yellow’ with ‘pink’: Else if allows you to have multiple conditions that you
set different outcomes. You can have as many else if
to
colours [3] = "pink"; conditions as you need, and can also combine them with
Elements can be added to this array. For example, the an else:
code below will make a new index, 5, and put ‘blue’ if (5 < 6) {
in it:
message = "Yes it is!";
colours.push("blue");
}else if (5==6) {
The length of the array can be found. For example, the
code below will return 5: message = "They're the same";
TASK }
Create an array that stores the names of ten different
films. Output each of these films, in turn, on a web page. Switch
Each film should be on a new line. Combining multiple if s can get difficult to manage. A
switch statement is more efficient as it does not
Chapter 19: Programming for the web
var count; In this example, 0*0 will always be output, then the value of
for (count in film){ count is checked and it decides if the loop will run again.
positions in the program. Rather than rewriting the code It will return false, because not all elements in numbers
(which gives more opportunity for errors), just call the are equal to 10.
function.
TASK
Write code that checks if every number stored in an
1 Create a function for each of the three tasks you
array is greater than 0:
created at the end of the ‘Conditional statements’
section. Make sure each one has its own function, function isGreaterThanO (item,
then call these functions. index, array) {
2 Create a function that takes four numbers as
return (item > 0);
parameters. Find the largest of these numbers and
output it in an appropriate sentence. };
3 Edit the function you created for task 2 and make it
find the smallest number. var numbers = [-1, 0, 5, 10],-
var everyCheck = numbers.
every (isGreaterThanO) ,-
Iterative methods
An iterative method is a function (or task) that is repeated, Some
for example applied to each element in an array.
The some method checks if at least one item meets the
condition:
Every
This iterative method will check every element in an array function equalTen(item, index,
array) {
against a condition. It will return true if every item meets
the condition or false if at least one element does not
meet it.
return (item == 10); Q
};
The code below creates a function called isTen. Inside
var numbers = [10, 20, 30, 40, 50,
the function declaration is (item, index, array).
60];
These apply to the array being used and provide the value
(e.g. 10), the index (e.g. 0) and the array (e.g. numbers) to var someCheck = numbers.
the function: some (equalTen) ,-
function isTen(item, index, array) { This time, the method will return true, because at least
return (item == 10);
one of the elements is equal to 10.
}; Filter
An array (numbers) is declared, and then the function The filter method will return an array with all the
isTen is applied to the array using the every method: elements that meet the criteria:
var numbers = [10, 20, 30, 40, 50, 60]; function lessThirtyFive(item, index,
array) {
var everyCheck = numbers.
every (isTen); return (item <= 35);
This code: };
• declares an array called numbers var numbers = [10, 20, 30, 40, 50,
60];
• calls an every method and sends the array elements
usingthe code function (item, index, array) var filterArray = numbers.
• the condition is item == 10 filter (lessThirtyFive);
• the result of this is returned and stored in the variable This time, the method will return [10, 20, 30] because
everyCheck. these are all the elements that are less than, or equal to, 35.
Cambridge International AS and A level IT
The code states that when the button is clicked, the document.write (obj .options [obj.
JavaScript function outputMessageOwill be called. selectedlndex] .text);
Prompt
A prompt box allows a user to enter some text, and gives
them the option of ok and cancel. If ok is selected, then
Q Remember
When creating web pages, there are a range of tools
and protocols that can be used to add any required
the text input is stored into a variable. interactivity. When deciding which tool, or protocol, you
are going to use, consider the appropriateness to the
e.g.
context and the users.
var answer = prompt("What day is it?")
Chapter 19: Programming for the web
Review questions
1 Izabella is creating a web page for her business. She has been told to use JavaScript to make
her web page better. Explain, using an example, how she could make use of JavaScript and
the benefits it could have. [4]
2 Describe what an array is. [3]
3 Explain the benefits of using a function. [3]
4 Describe how JavaScript can validate data entry. [3]
I
Glossary
s>
:
Actuator: this is a type of motor that controls a CAM: computer-aided manufacture
mechanism or system
Cell: a rectangle within a spreadsheet where data can
Alignment: positioning text so that it is in line, for example be positioned; the geographical area covered by a radio
on the left, right or centre transmitter
Alpha testing: initial testing of the software by a limited Chaining: combining together instructions
group of people
Circuit switching: a single communication path is opened
Analogue: this is the smooth stream of data that we for the duration of data transmission
process on a daily basis Client: a computer that is connected to a server
Animation: a series of images played one after another to Closure: completion of a project
simulate movement
Cloud computing: using remote servers hosted on the
Array: a data structure that can store multiple items under internet to store data
one identifier
Coding: representing data by assigning a code to it for
Artificial intelligence: computer systems that perform classification or identification
tasks that normally require human intelligence
Collaboration: working together
Assignment: providing a value to a variable
Compiler: translates high-level programming language
Attribute: a category of information within an entity into an executable file in machine code
Bandwidth: the range of frequencies available for Composite key: two or more fields that form the primary
a communication method which determines the key
transmission rate; the amount of data that can be
Conception: start of a project
transmitted at one time
Condition: a statement that can be evaluated as true or
Beta testing: a sample of users test a pre-release version false, for example5 >6
of the software
Confidential: needs to be kept secret
Biometrics: the measurement of a person's physical
characteristics; unique physical characteristic of a person Construct: a control structure, such as a loop or a
that can be used by a computerfor identification purposes conditional statement
Critical path: the tasks which must be completed on time
Bitmap: an image made up of small squares, called pixels.
for a project to complete on time
Each individual pixel can only be one colour
Custom-written: software that is written especially to
Bit rate: the number of bits that can be transferred per second
meet the requirements of a client
Black box testing: testing of inputs and outputs to a
Data: raw numbers, letters, symbols, sounds or images
system or part of a system with no consideration for the
without meaning
workings of the system
Database: a structured method of storing data
Bluetooth: a short range wireless communication
standard Database management system: software used to manage
a database
Bridge: connects two LANs
Data dictionary: metadata (information) about the
Broadband: a method of faster data transmission that can database
carry several channels of data at once
Datatype: the type of data being stored, for example a
CAD: computer-aided design number, string (text)
Glossary
Demographic: a particular section of a population Foreign key: a field in a table that refers to the primary key
in another table
Design specification: illustration of how the system will
look, what the data structures will be and how the system Formula: a mathematical calculation using+, -, x or-s-
will work Frame: one screen, or page, where an image is drawn. A
Device: a hardware component of a computer system series of these frames are played one after the other to
consisting of electronic components create the animation
DFD: data flow diagram which shows how data moves Function: a separate piece of code that has an identifier
around a system and performs a task, it can be called from elsewhere
Diagnosis: identifying a problem or illness by analysis of in the code and returns a value; a ready-made formula
the symptoms representing a complex calculation
Digital divide: the separation between those that have Gantt chart: a chart used for planning a project
access to technologies and the internet and those that do not Gateway: connects two different types of networks
Direct data source: data that is collected for the purpose GPS: global positioning system which uses satellites to
for which it will be used determine the current location
DPI/dots per inch: the resolution of an image Hardware: a physical component of a computer system
Dynamic data: data that changes automatically without Heuristic: discovering knowledge through experience
user intervention
HTTPS: hypertext transfer protocol secure
Ecommerce: business that is conducted electronically
Hub: connects devices on a network in a passive manner
Economic: relatingto a country in terms of their
production and consumption of goods and services
Encoding: storing data in a specific format
Humidity: the amount of water in the atmosphere
Hyperlink: a link that can be clicked to locate to another B
place in a document, or a different document entirely
Encryption: scrambling data so it cannot be understood
Identifier: a name given to a variable or function
without a decryption key so that it is unreadable if
intercepted Import: to bring in data from another application
Entity: a set of data about one thing (person, place, object Indirect data source: data that was collected for a
or event) different purpose (secondary source)
Entity relationship diagram: a diagram that represents Information: data with context and meaning
the relationships between entities
Infrared/IR: a wave of light that is invisible to the naked
Execution: the development stage of a project human eye, emitted by an object; used by remote
controls
Export: to prepare data for use in another application
Infrastructure: the physical structures that are needed for
Fibre optic: a fine strand of glass that transmits data as
a service or operation
light beams
Input device: a device that allows data to be entered into
Field: a category of information; a common word for
a computer system
attribute; an individual item of data in a database, for
example forename Internet service provider/ISP: A company that provides
access to the internet
Filter: selecting records from the source file based on
conditions; an effect, often colour related, that can be Interpreter: translates high-level programming language
applied to a clip into machine code one line of source code at a time
Firewall: prevents external users gaining unauthorised Iteration: a loop, to repeat
access to a computer system Key: a sequence or algorithm used to encrypt or decrypt
Flat file: a database stored in a single table data
Cambridge International AS and A level IT
Key frame: a frame that has a change in the animation, for Normal form: the extent to which a database has been
example a drawing has changed, or the start or end of a normalised
tween
Normalisation: process of structuring data in a
Knowledge: information to which human experience has database
been applied
Object: an image, or combination of images, that is
LAN: local area network which connects devices in a manipulated as one item
single building or area
Off-the-shelf: general purpose software available to a
Laser: an intense beam of light used for transmitting data large market
Layer: an object or image given its own timeline for Opacity: the lack of transparency in an image, or part of
independent manipulation an image
Legitimate: looks like the real standard a document would Operating system: software that manages the hardware
have within a computer system
Mail merge: the automatic addition of data, such as Operator: a symbol, or set of symbols that performs an
names and addresses, from a source file into a master image
document, such as a letter
Orientation: the direction of text, for example horizontal
Maintenance: changes made to a system after its or vertical
implementation
Output device: a device used to communicate data or
Malicious code: code that is intended to harm a information from a computer system
computer
Packet: a set of bits which represent data to be
Malware: malicious software transmitted
Management information system: a system that provides Packet switching: data that is broken down into packets
summary data for management to enable them to make are sent through different routes and reassembled by the
decisions recipient
Master document: the main document that will be used Parameter: data used within the criteria fora query
for all records
Peer: a computer in a network that is not connected to a
Message switching: a method of transmitting data server and does not control another computer
through intelligent nodes
Photoresistor: this is a light controlled resistor
Microprocessor: an integrated circuit used in monitoring
and control technologies Piezoresistance: a specific level of electrical charge that is
linked to a specific level of resistance or pressure
Microwave: an electromagnetic wave of energy
Pitch: the highness or lowness of a tone
Model: a representation of a process
Pixel: a very small square of one colour that is illuminated
Morphing: another term for shape tweening. One image on a display screen. These are combined to create a
changes into another image bitmap image
Network: a set of computers and devices connected Pixelate: when a bitmap image is enlarged, the pixels are
together so they can communicate and share enlarged and become visible causing the image to appear
resources blurry
Network architecture: the design of a network Predecessor: a task in a project that must be completed
NFC: near field communication before another task can start
NIC: network interface card which connects the Primary key: a field that contains the unique identifier for
motherboard of a device to a network cable a record
Non-volatile: data remains when there is no power Private key: used in encryption to decrypt data
Glossary
Prompt: a question asked to the user which requires a Static data: data that does not normally change
response Storage device: a device used to store data onto a storage
Proof reading: checking information manually medium
Protocol: a set of rules that ensure data is transferred Storage medium: the medium on which data is stored
between devices correctly
Streaming: a method of displaying sound or video without
Prototype: a 'mock-up' of a software or manufactured waiting for the whole file to be downloaded
solution
Switch: connects devices on a network in an active
Public key: used in encryption to encrypt data manner
Query: a question used to retrieve data from a System flowchart: an overview of how a system works in
database a diagrammatic format
RAD: rapid application development System specification: the hardware and software needed
to run the system
Record: a common word for entity
Referential integrity: data in the foreign key of the Table: a set of similar data (about people, places, objects
or events)
table on the many side of a relationship must exist
in the primary key of the table on the one side of a TCP/IP: a communication protocol used by the internet
relationship
Teleworking: working from home using technologies to
Relationship: the way in which two entities in two keep in contact with an employer
different tables are connected
Test data: data that will be used for testing a system
Rendering: combining the effects created in a video file to
create an output video file
Repeater: amplifies the signal on a network cable
Track: a single audio section in a sound or video file
Transaction: a collection of data that is exchanged; the
action of buying or selling an item or service
m
Requirements specification: what a user needs a new
Transition: the movement from one clip to the next
system to do
Tunnelling protocol: a tunnel between two points on a
Resolution: the number of pixels per measurement of the
network that is governed by a set of rules
image, for example DPI
Tween: an animation where the start and end points are
RFID: radio-frequency identification
set. The computer generates the actual changes to make
Router: a switch which can forward data to the correct the animation smooth
location in the most efficient manner
User interface: communication between the user and the
Satellite: an object in space that follows an orbital path computer system
Sensor: a device that records data about the surrounding Utility software: software that performs some sort of
physical environment maintenance on the computer system
Server: a computer on a network which provides Validation: the process of checking data matches
resources that can be used by client devices acceptable rules
Simulation: using a model to predict real-life behaviour Variable: a space in memory that is given an identifier
where data can be stored and changed
Software: programs which give instructions to the
computer Vector: an image that uses geometric points and shapes.
Calculations are used to draw the image
Source file: the file containing the data that will be merged
into the master document Verification: ensuring data entered into the system
matches the original source
Spyware: malicious software that records what a user is
doing on a computer system Verify: to check that data matches the original data
Cambridge International AS and A level IT
Virus: software that replicates itself between computer White box testing: testing the whole system in terms of
systems and is designed to cause disruption to a structure and logic covering all paths through the system
computer system
Wi-Fi: wireless Ethernet which allows devices on a LAN to
Volatile: data is lost when there is no power connect wirelessly
WAN: wide area network which connects devices that are Wireless access point: connects Wi-Fi enabled devices to
geographically remote a network
Web browser: a software application for retrieving and WNIC: wireless network interface card which enables a
presenting information on the World Wide Web device to use Wi-Fi
Bj
Answers
Chapter 1- Data, information, type but it may be that the date should have been
29/1/03). Data can be checked against the source,
knowledge and processing but the source maybe incorrect (e.g. the name I
‘Siohan’ is written on the original source and is
1 For example 000000 (there must be no explanation,
visually checked to have been entered as ‘Siohan’,
just the data).
but the actual spelling should have been ‘Siobhan’).
2 For example, context is added to 000000 because
we are told it is a colour code. Meaning is added by
Review questions
telling us it is the colour code for black.
1 E.g. 573dds [1]. If further explanation given then 0
3 Knowledge is applying experience to information so
marks.
that the information can be interpreted.
2 Either of the following [1]: Understanding
4 Area calculator, Length =, Width=, Area=, m, m2 information [1] a person’s experience/learning [1],
(not 3, 5 or 15).
3a Any combination of the following [4]: Static data
5 15 (not 3, 5). does not change [1] whereas dynamic data changes
6 Measure it himself. automatically [1],
7 Accept measurements given by the customer. Static data can get out of date [1] whereas dynamic
data updates when the data source is updated [1].
8 He can rely on the measurements he has taken
himself to be accurate. Static data can be viewed offline [1] whereas
dynamic data requires network connectivity [1].
9 Accuracy, relevance, age, level of detail, Static data is more likely to be accurate [1] whereas
completeness. dynamic data may contain errors if produced
10 The user guide could be written for an old operating quickly [1].
system that has since been updated.
3b Any two of the following [4]: accuracy [1] data that
11 Saving storage space, enables validation, can help contains errors is not of good quality [1],
with presentation of lists, speed of input, speed of Relevance [1] data must be useful for the purpose it
processing, confidentiality. will be used [1].
12 Computers can only understand on and off (1 and Age [1] data must be up to date [1].
0), so text needs to be encoded into a standard
character set that uses numbers represented by Level of detail [1] too much detail makes it difficult
binary. to find the required information [1],
13 Sample rate, bit depth, number of channels. Completeness [1] missing data such as a postcode
for an address [1].
14 WELL DONE.
3c E.g. FT for full-time [1].
15 To ensure data that is input matches the source
data. 3d The video will be downloaded over the internet [1]
so file size needs to be reduced as bandwidth will
16 Presence, range, type, length, format, check digit, be limited [2].
lookup.
3e Any three from the following [1]: Width/height/
17 Data can match the rules but still be incorrect (e.g. resolution; frame rate; audio sample rate; audio bit
date of birth of 29/1/13 matches the rule of a data depth; audio channels; compression.
Cambridge International AS and A level IT
3f Any of the following [4]: Image size, the wider and picture. A digital camera is mainly used to take
taller the image the higher the file size. photographs, whereas a scanner is mainly used
to digitise 2D documents. A digital camera can
4a Any combination of the following [4]: Credit card zoom into objects, whereas a scanner can only
information is sensitive [1] because it could be take images at a set distance. A digital camera uses
used for fraud [1] HTTPS is an encrypted method a focal point, whereas a scanner takes an even
of passing information over the web [1] which will focus across the whole document. A digital camera
mean the credit card information will be scrambled captures an image in one go, whereas a scanner has
[1] and unusable by anybody without a key [1]. to digitise an image by moving across it.
4b The sender and receiver use the same encryption/ 6 An OMR will be able to read multiple choice
decryption key [1]. answers that have been completed in specified
positions and will read them accurately with very
4c Any two of the following [2]: The sender uses the little margin of error. An OCR would also be able
public key of the recipient to encrypt the message to read multiple choice answers, but the process
[1] The message is sent in an encrypted format would be slower using a conventional scanner. An
[1] The recipient uses their private key to decrypt OMR would not be able to read written answers
the message [1] The sender and recipient need to to questions as it relies on marks being given. An
exchange digital certificates [1]. OCR could read written answers to questions and
turn them into text, but poor handwriting could be
4d Either of the following [1]: The user could be asked illegible and the OCR would not be able to interpret
to enter their password twice [1] the user could type the answers.
their password and then visually check it [1],
In conclusion, a specially designed scanner that
5a To ensure that data matches a given set of rules [1], can detect when it needs to read lozenge marks
for multiple choice answers combined with more
5b Any of the following [3]: E.g. presence check [1] detailed scanning for OCR of text would be suitable.
to ensure news story [1] is present [1]. E.g. format 7 System software maintains or operates the
check [1] to ensure email address [1] contains @ computer system whereas application software
symbol [1]. carries out tasks for the user.
8 Allocating memory to software; sending data
Chapter 2 - Hardware and and instructions to output devices; responding
Software to input devices such as when a key is pressed;
opening and closing files on storage devices;
1 A physical com ponent of a computer system. giving each running task a fair share of processor
2 Carries out calculations/logical operations; time; sending error messages or status messages
executes instructions; processes data. to applications or users; dealing with user logins
and security.
3 Generates signals needed to display output to a
monitor. 9 Users are usually already familiar with word
processing software so they can create a
4 RAM is volatile meaning that data is lost when website quickly using tools with which they have
power is disconnected, whereas storage is experience. However, some tools required for
non-volatile so data is retained when power website features will not be available, for example
is disconnected. RAM stores currently active forms validation, and so the web page will be
programs and data, whereas storage stores both limited to the capability of the word processor.
active and non-active programs and data. RAM is Web authoring software can be quite complex
much faster than storage devices; storage devices to use but there are plenty of user friendly
can store more data than RAM. applications available to use now. Web authoring
5 Both a digital camera and a scanner can take software will include specialist tools such as
pictures of objects and turn them into a digital setting up the website structure and creating a
navigation bar automatically, whereas using a Review questions
word processor will require a lot of work to set up
la Connects the main components of the computer
all the navigation on each page. Web authoring
software will include a file transfer feature to together [1],
publish and update the information, whereas in a lb HDD orSSD [1].
word processor this would have to be done using lc Any from [2]: So she can connect a monitor to the
separate file transfer software. In conclusion, computer [1] in order to see the display output that
although web authoring software can take a while is generated from the computer [1].
to master, it is the only suitable tool for creating
a full website because of the specialist features it 2 Any combination of the following [4]: She can
includes. purchase as little or as much backup storage as
necessary [1] based on the amount of data she has
10 To carry out additional tasks that the original stored [1]; the back-up process can be automated
software is not capable of doing, to simplify tasks [1] as long as she is always connected to the internet
that are complex using the original software. [1]; she will not need to transport data off-site [1]
11 Light text on a dark background or vice versa, because it will already be off-site in the cloud [1],
such as white on dark blue, should be used 3 Any combination of the following [6]: Magnetic
so that users can easily read the text against tape can store several terabytes of data [1] which
the background; bright colours can be used to is required for all the servers [1] and user data from
highlight important information so that the user’s 500 employees [1], Magnetic tape is small and
attention is drawn to it; colours in the user’s lightweight which means it is portable [1] so it can
mental model should be used appropriately, such be taken off-site [1] so it is not at the same location
as green for go or yellow for warning, so that the as the original data [1], Magnetic tape is the
user is not confused by colours they expect to cheapest storage medium [1] meaning that several
mean something different. tapes can be used [1] to backup data using a tape
rotation system [1].
12 Anti-virus; backup; data compression; disk
defragmentation; format; file-copying; deleting. 4 Any combination of the following [4]: The surveys
could use multiple choice questions [1] which can
13 To stop viruses or malware from being executed be read by an optical mark reader by identifying the
and causing damage to files and programs. dark areas [1], There will be lots of surveys [1] and
an OMR will have an automatic document feeder to
14 Software that already exists and is readily available
input all the surveys in one go [1],
to be purchased.
5 Any combination of the following [6]: Custom-
15 The client has to wait a longtime for it to be written software will meet all of the requirements
: developed; it is expensive because the client for waste management [1] because it is written
has to cover the whole development cost; especially for the council [1]. Custom software
the software won’t have been used by other can be designed especially to be compatible with
customers before so bugs are likely to be found existing systems [1] such as the web interface used
when the software is used; the only support by residents [1]. Custom-written software will be
available will be from the company that very expensive [1] compared with off-the-shelf
developed the software. software [1], The council will have to wait a few
months [1] for the system to be developed for them
16 To translate source code into object code ready for
[1], There may be very good alternative off-the-
execution.
shelf solutions [1] which would be able to be used
17 When testing a program, an interpreter can instantly [1] at a much lower cost [1] and with a lot
translate just the code that is being tested which of support available [1], In conclusion, the council
saves translation time; source code can be should investigate existing off-the-shelf solutions
translated into object code for more than one before committing to the cost and development
operating system. time of a custom written solution [1].
Cambridge International AS and A level IT
6a Both of the following [2]: Videos can be clipped [1]; The information will be relevant, clear, organised
Titles can be added [1], and presented in a structured and coherent format.
6b Both of the following [2]: The council could remove
Level 2 [3-4 marks]
parts of the raw footage that contained mistakes
[1]; The council could put a title of the information Candidates will address a limited range of
video at the beginning [1]. household appliances and look at their use in terms
of monitoring and controls systems, although
development of some of the points will be limited.
Chapter 3 - Monitoring and control There will be a conclusion. For the most part the
Review questions information will be relevant and presented in a
structured and coherent format.
1 Any combination of the following [2]:
Level 1[1-2 marks]
• An input device that records data about the Candidates may only give reference to a single
environment or surroundings.
household appliance, with limited reference to
• Automatically inputs the data into a computer
monitoring and control systems. Answers may be
system to be processed.
simplistic with little or no relevance.
• Can monitor a range of aspects such as light,
temperature, pressure, moisture and humidity. 0 marks for a response with no valid comments.
2 Any two of the following [4]: Possible points:
• An infrared (motion) sensor can be used . .. • Increased safety for appliances.
• ... monitors infrared energy emitted and can • Appliances can be made more efficient.
detected an increase from an intruder.
• A pressure sensor (switch) can be used ... • It may be possible to remotely control devices.
• ... can sense a change in weight of an intruder 5 Any combination of the following [4]:
entering a building.
• Motion sensors could be used to control light
3 Any two from the following [4]: systems ...
• Sensors can be placed in areas that are • ... this would mean that lights would turn off
dangerous for a human to enter ... automatically when a room is unused, making it
more energy efficient.
• this means that crucial elements of the
...
system, such as areas of radiation, can be • Temperature sensors could be used to control
measured and controlled from a safe distance. the air conditioning system ...
• Sensors can take readings 24/7 ... • the system could be turned off when the
...
room reaches the desired temperate and
• ... this means that humans do not need to
be present in the plant at all time to monitor turned back on again when it falls outside
processes and can just be alerted to a crisis of this, making it more energy efficient.
situation, should one arise. • Pressure sensors could be used on
• Sensor readings will have a higher level of windows ...
accuracy and consistency . . . • this would detect if a window is open and
...
• ... in an environment where the accuracy of turn off an air conditioning system to save
readings is paramount due to safety, this is energy if it is.
vital.
Level of response:
4
Chapter 4 - E-safety and health
Level 3 [5-6 marks] and safety
Candidates will address a range of household
Review questions
appliances and evaluate their use in terms of
monitoring and controls systems. The points raised 1. Mention six points from the following (maximum
will be justified. There will be a reasoned conclusion. four marks for each term) [6]:
t
Answers
• A legitimate-looking email is sent to the user. Candidates may only give reference to a single
• The email contains a link for the user to click. aspect of safety. Answers may be simplistic with
• The link will redirect the user to a legitimate- little or no relevance.
looking website. 0 marks for a response with no valid comments.
• The website will request personal data that will Possible points:
be stolen when entered.
Pharming
• Personal data is very valuable and for this reason
people will put a lot of effort into stealing it.
• Maliciouscode is installed on the user’s hard • perpetrator can steal a person’s identity
A
drive or server. through collecting their personal data/identify
• A user will type in a common web address, but fraud.
will be redirected to a fake website instead. • person could also suffer personal attacks such
A
as blackmail or cyberbullying if they reveal, or
• Unaware, the user enters their personal
have stolen, certain personal information that
details in the fake website and the details are
could be used against them.
stolen.
• Even small amounts of data released on social
2. Any two of the following two points [2j: media over a period of time can be pieced
together for criminal activity.
• It restricts a user’s access to the files on their
computer. 5. Any two of the following injuries and prevention
• restricts the files access to the files either by
It methods [4]:
locking the system or encrypting the files.
• A ransom message will appear when access is
attempted requesting payment for access.
• Repetitive strain injury can occur from repetitive
moments such as clicking a mouse ...
• this can be prevented through the use of
...
support devices such as wrist rests.
m
3. Answer must include the following points [3j:
• Carpel tunnel syndrome can occur through
• It is a bot that is automated to carry out a simple repetitive or continual movements ...
or repetitive task. • ... this can be prevented by taking regular
• tasks it carries out will be party to criminal
The breaks in work sessions/varying the position
activity, such as bombarding mail boxes with used for work.
SPAM email. • Back ache can occur from poor posture .. .
4. Level of response: • this can be prevented by sitting on an
...
adjustable chair with added support.
Level 3 [5-6 marks] • strain can occur as a result of looking at a
Eye
Candidates will discuss in detail the need to keep monitor for long periods of time ...
personal data safe. The points raised will be • this can be prevented by using any
...
settings a monitor has to aid prevention/
justified. There will be a reasoned conclusion.
focussing on points away from the screen
The information will be relevant, clear, organised
periodically.
and presented in a structured and coherent
format.
• Deep vein thrombosis can occur when
pressure is put on the legs from sitting for
Level 2 [3-4 marks] long periods ...
Candidates will provide limited discussion of points • ... this can be prevented by standing regularly
and moving around periodically.
about keeping personal data safe, the development
of some of the points will be limited. There will be 6. Any two of the following safety issues and
a conclusion. Forthe most part the information prevention methods [4j:
will be relevant and presented in a structured and • Fire can occur from equipment overheating/
coherent format. overloaded socket ...
Cambridge International AS and A level IT
... this can be prevented by keeping the room Level 1[1-2 marks]
well ventilated. Candidates may only give reference to a single
... this can be prevented by not plugging in too aspect of the digital divide. Answers may be
many devices to a socket, especially those that simplistic with little or no relevance.
require lots of power.
Trailing wire can cause injury to a person who 0 marks for a response with no valid comments.
trips over them ... Possible points:
... this can be prevented by securing wires in a
cable management system.
• Can prevent access to further education such as
online courses and training.
Electric shock can occur from spilt drinks/
touching wires together ...
• affect entertainment experiences if
Can
connections are too slow.
... this can be prevented by not eating or
drinking at a computer.
• prevent effective communication.
Can
• ... WAN normally has a lower rate of data on education. The points raised will be justified.
transfer, up to 200Mb. There will be a reasoned conclusion. The
information will be relevant,dear, organised and
2. Any four of the following points [4]:
presented in a structured and coherent format.
• It is a privately owned network that uses Level 2 [3-4 marks]
internet technologies.
• is used internally within an organisation.
It Candidates will provide limited discussion of
• It often accessed using a webpage. points about the impact of video conferencing
• It can provide services such as news on education. The development of some of the
updates, file sharing and instant messaging. points will be limited. There will be a conclusion.
• It can provide access to training materials for For the most part the information will be relevant
employees. and presented in a structured and coherent
format.
3. Choose four of the following points (at least one
advantage and one disadvantage) [4]:
Level 1[1-2 marks]
• Uses an additional level of security when Candidates may only give reference to a single
transmitting data ...
aspect of video conferencing and its use in
• ... this means that the user can feet education. Answers may be simplistic with little or
their personal data is safer when being no relevance.
transmitted.
0 marks for a response with no valid comments.
• They use the infrastructure that is already in
place ... Possible points:
• ... this means that there is little additional cost to
setting up a VPN. • Learners can participate in conversation with
... other learners world wide.
• this can mean that the performance of the
infrastructure is outside the control of the • learners can speakto and listen to industry
individual or organisation. experts without the need for travel.
• They require a higher level of expertise to set up • Learners can benefit from watching
international lectures to experience a range of
teaching methods.
• ... if this expertise is not present it may need to
be purchased. • Experts can instruct those in training in
important educational training, such as medical
4. Answer must include both of the following [2]: procedures.
• The internet is the physical infrastructure of the
largest WAN.
• The WWW is a collection of webpages that Chapter 7 - Expert systems
contain text, images, videos and sounds.
Review questions
5. Any combination of four from the following [4]:
l. Any six points from the following (2 marks
• Desktop computer/laptop/mobile device maximum per component) [6]:
• Webcam
• Microphone • The knowledge base .. .
• Monitor • ... a database that allows the storage and
• Speakers retrieval of the knowledge gathered from
• Network infrastructure. experts.
6. Level of response: • ... contains both factual knowledge and
heuristic knowledge.
Level 3 [5-6 marks] • The inference engine .. .
Candidates will discuss in detail a range of • ... the component that makes judgements and
points about the impact of video conferencing carries out reasoning.
Cambridge International AS and A level IT
*
• ... based upon a set of rules and follows a line of • ... this means they can only provide a
logic. logical answer to a question and not a
• ... chains together IF-THEN rules to form a line of creative one.
reasoning. • Errors may be present in the knowledge
• ... can use eitherforward chaining or backwards bases .. .
chaining to draw a conclusion. • ... this can result in incorrect conclusions being
• User interface...
The drawn.
• ... is the method used by the user to interact 4. Choose four from the following points [4]:
with the system.
2. Two expert systems and its use from the
• An online processing system processes data in
transactions ...
following [4]:
• whereas a real-time processing system
...
• As a medical diagnosis tool ... process data as soon as it is input.
• ... it can help a doctor narrow down a diagnosis • Online processing systems are often used
by providing a list of possible diagnoses from in booking systems, where all the data for
the symptoms. the transaction can be collected and then
• a car mechanical diagnosis tool ...
As processed ...
• ... a car mechanic can connect a car • whereas real-time processing systems are
...
electronically to the system and all elements of used when the immediacy of the data is vital,
the car can be tested to find the fault. such as air traffic control systems.
• As a telephone helpdesk ... 5. Any combination of two from the following points [2]:
• ... to help narrow down the reason for a
customer’s call to direct them to the right • A collection of fields about a main element of a
m person.
• a troubleshooting tool ...
As
• ... can obtain a description of a fault that has
occurred with hardware, such as a printer, and
•
data system.
Stores all of the more permanent data about the
customer/employee.
• A transaction file is normally used to update a
provide a diagnosis and information on how to master file.
fix the error.
3. Any combination of four from the following Chapter 8 - Spreadsheets
(advantages) [4]:
1 The named range can be referenced directly by
• They can help provide information that is name instead of by cell references; it can be used
outside a user’s knowledge and experience ... as an absolute reference when replicating a lookup
• ... this can help a user solve a problem that function.
they may not have the knowledge to do so
otherwise. 2 A formula is a simple calculation using basic
• They will not forget to ask question or be subject arithmetic of +, -, x, -*•, whereas a function is a
to other human errors .. . predefined complex calculation that can be called
• this means that all the data required to
... by name and includes a series of formulae of which
draw a conclusion can be obtained and will be the user is unaware.
consistent.
• They do not require a human to be present to 3 The user could read each cell in a row and compare
answer questions ... each cell with the source data. When finished
• this means they can be made available to
... reading the row, the user would move to the next
use 24/7. row and repeat the process.
Any combination of two from the following
4 When formulae and functions are replicated, absolute
(disadvantages) [2]:
cell references remain the same, whereas relative cell
• They are not able to use common sense ... references change in relation to the row or column.
5 A tax rate could be stored in a single cell. A set of prices lbi Either of the following [1]: Arithmetic calculation [1]
would be stored in a column. When calculating the plus, minus, divide, multiply [1],
tax to be applied to the first price in the column, the
lbii E2*4.55 [1],
price would be a relative reference (e.g. B3) and the tax
rate would be an absolute reference (e.g. $F$1). These lbiii Any of the following [1]: Complex calculation [1]
two references would be multiplied together and then reserved word in spreadsheet [1] ready-made
replicated down the spreadsheet. B3 would change to formula [1J.
B4, B5 and so on as it is replicated to each row below, lbiv Lookup or vlookup or hlookup or index [1].
but $F$1would remain thesame.
2a Two of the following [2]: Select column D [1] apply a
6 Line, because it shows how data has changed over filter [1] of fuel type = petrol [1].
a period of time.
2b Any two of the following [2]: Apply conditional
7 Pie, because it is showing each piece of data in formatting [1] to fuel type column [1] where
proportion to the rest of the data. diesel, petrol and Ipg are each set to a different
colour [1],
8 The ability to change variables within the
software; asking what-if questions to see what the 3 Any combination of the following [4]: Relative
result of changing variables might be; formulae referencing used for cost per gallon [1] so when
and functions to carry out the mathematical the formula is replicated [1] it refers to the cost per
calculations that form the basis of the model; litre on the next row down [1], Absolute referencing
automatic recalculation of formulae and functions; used for the fuel type table [1] within the lookup
rules that define how the model behaves; layers function for cost per litre [1] so that when replicated
of abstraction so that different parts of the model down the lookup function keeps referencing the
can be viewed and analysed separately. fuel type table [1],
9 Variables can be used to change the rental costs; 4a Any three of the following [3]: Variables can be used to
formulae and functions can be used to calculate change the distances travelled [1] what-if questions can
the total cost of each of the premises; graphs can be asked such as “what will be the cost if the car travels
be used to show the distances from important 300 miles?” [1] formulae and functions can be used to
locations for each of the premises; goal-seek can calculate the total cost [1] graphs and charts can be
be used to find out what the rental cost would used to compare the costs of each car [1] formulae
need to be to match the current costs; conditional and functions will automatically recalculate so results
formatting could be used to show the cheapest and can be seen instantly [1] conditional formatting can
most expensive options. be used to show cars that cost a specific amount [1]
goal-seek can be used to find out the optimum speed
10 Fuel costs can be saved by not havingto fty real
to travel at [1].
aircraft; wear and tear of aircraft does not take place
during training which saves on maintenance costs; 4b Any one of the following [1]: The model will only
instructors do not need to be present for all training be as good as the rules [1] the speed the car is
sessions; unforeseen or dangerous circumstances travelling at will need to be taken into account [1]
can be invoked to test the pilot’s reaction without unforeseen circumstances such as traffic jams will
experiencing the real danger. affect the costs [1],
11 The learner driver does not get to experience the 5 Any combination of the following [4]: Dangers
real reaction of a car; the simulator is only as good such as hazards, other cars, pedestrians etc can
as the model it is based upon meaning that the be avoided [1] because the simulator can model
simulator will not react exactly the same as a car these instead of using the real road [1], Learners do
would. not always need to have an instructor present [1]
because the simulator does not pose any danger
[1]. Learners can experience circumstances they
Review questions
may not normally encounter [1] such as a child
la Horizontal set of cells [1] e.g. for one car [1], running into the road [1] because these can be
Cambridge International AS and A level IT
2a Both of the following [2]: Apartment ID [1] ; • ... this can be used to pass time quickly in a
Customer ID [1]. scene.
• ... it can add a comedy effect to certain
2bi Alphanumericortextorstring[l]. actions.
2e Any three of the following [6]: Field names [1] to • a single audio section in a sound file.
identify each field [1]; validation rules [1] to restrict • they can be layered together to create a more
data entry for each field [1]; relationships [1] complex/interesting sound file.
between each table [1]; primary keys [1] which are 4. Any four of the following points [4]:
unique to each table [1]; data types [1] to define
the type of data that is stored in each field eg • It provides a voice over ...
alphanumeric [1]. • ... without removing the noise or sound in the
clip that is already present.
3 All of the following [4]: STUDENT (Student ID, • voice over is recorded as a spate track ...
The
Forename, Surname, Address 1, Address 2, Address • ... it is then layered over the original sound
3, ZIP, Telephone, Tutor Group) [1], clip.
TUTOR (Tutor Group, Forename, Surname) [1] 5. Answer must include all four of the following points
LOAN (Book ID, Student ID, Return Date) [1] [4]:
BOOK (Book ID, Title) [1]. • The number of samples taken of recorded
sound ...
4 Both of the following [2]: Proprietary formats are • ... normally per second.
used by manufacturers of software applications • It is measured in Hz or kHz.
for their applications only [1] whereas open-source • A sample rate of 20 Hz means that 20,000
file formats can be used by any application that samples were taken in a second.
supports them [1],
Chapter 11 - Emerging
Chapter 10 - Sound and video technologies
editing
Review questions
Review questions
1. Level of response:
Level 3 [6-8 marks]
1. Choose any fourof the following [4]:
Candidates will discuss in detail a range of points
• If the time of the video is sped up, this can create relevant to the impact 3D printing has had on
a rushed effect ...
Cambridge International AS and A level IT
medicine. The points raised will be justified. There Level 1[1-2 marks]
will be a reasoned conclusion. The information will Candidates may only give reference to a single
be relevant, clear, organised and presented in a
aspect of artificial intelligence and self-driving
structured and coherent format.
cars. Answers may be simplistic with little or no
Level 2 [3-5 marks] relevance.
Candidates will provide limited discussion of 0 marks for a response with no valid comments.
points relevant to the impact 3D printing has had
Possible points:
on medicine, the development of some of the
points will be limited. There will be a conclusion. • It can make the experience of travellingfrom
Forthe most part the information will be relevant one place to another a more pleasurable
and presented in a structured and coherent experience.
format. • can increase the level of safety on the roads
It
because a computer can have a faster reaction
Level 1[1-2 marks]
time to safety issues that may occur.
Candidates may only give reference to a single • It can affect the current legislation and
aspect of 3D printing in medicine. Answers may be insurance process in place for driving a car on
simplistic with little or no relevance. the road.
0 marks for a response with no valid comments. • More powerful algorithms will cost more to
develop, so this could add to the digital divide.
Possible points: • Some decisions can be more ethical rather than
• Used to create casts for broken bones that are a logical, such as would a person swerve to avoid
lot more flexible that conventional casts. a pedestrian if it meant putting themselves in
• Used to create complex and intricate prosthetic danger, in comparison to how a computer would
limbs that have improved the mobility of the react to this.
user. 3. Level of response:
• Used to create artificial organs and blood Level 3 [6-8 marks]
vessels allowing access to replacements without
the need for others to have suffered loss. Candidates will discuss in detail a range of points
• artificial organs created are not subject to
The about the impact of emerging technologies on our
life expectancy or blood type. personal entertainment. The points raised will be
justified. There will be a reasoned conclusion. The
2. Level of response:
information will be relevant, clear, organised and
Level 3 [6-8 marks] presented in a structured and coherent format.
Candidates will discuss in detail a range of Level 2 [3-5 marks]
points about the impact of artificial intelligence
Candidates will provide limited discussion of points
being used to create self-driving cars. The points
about the impact of emerging technologies on
raised will be justified. There will be a reasoned
our personal entertainment, the development of
conclusion. The information will be relevant, clear,
some of the points will be limited. There will be
organised and presented in a structured and
a conclusion. Forthe most part the information
coherent format.
will be relevant and presented in a structured and
Level 2 [3-5 marks] coherent format.
Candidates will provide limited discussion of points Level 1[1-2 marks]
about the impact of artificial intelligence being
Candidates may only give reference to a single
used to create self-driving cars, the development
aspect of emerging technologies and personal
of some of the points will be limited. There will be
entertainment. Answers may be simplistic with little
a conclusion. Forthe most part the information
or no relevance.
will be relevant and presented in a structured and
coherent format. 0 marks for a response With no valid comments.
Answers
1. Choose from any three of the following points [3]: Candidates will discuss in detail the effect that
social networking has on our social patterns.
• It is an internet based form of money. The points raised will be justified. There will be
• It is a currency that can be used a reasoned conclusion. The information will be
internationally...
relevant, clear, organised and presented in a
• ... without the need for exchange rates. structured and coherent format.
• A good example would be bitcoin/litecoin.
• They are often anonymous in their use, so Level 2 [3-4 marks]
cannot be tracked.
Candidates will provide limited discussion of points
2. Level of response: about the effect that social networking has on our
Level 3 [5-6 marks] social patterns, the development of some of the
points will be limited. There will be a conclusion.
Candidates will discuss in detail the impact of For the most part the information will be relevant
online shopping for the customer. The points and presented in a structured and coherent format.
raised will be justified. There will be a reasoned
conclusion. The information will be relevant, clear, Level 1[1-2 marks]
organised and presented in a structured and Candidates may only give reference to a single
coherent format. aspect of social networking. Answers may be
Level 2 [3-4 marks] simplistic with little or no relevance.
Candidates will provide limited discussion of 0 marks for a response with no valid comments.
points about online shopping, the development
Possible points:
of some of the points will be limited. There will be
a conclusion. For the most part the information • Many forms of social networking now exist to
will be relevant and presented in a structured and suit the individual.
coherent format. • They have allowed many people to stay in touch
Level 1[1-2 marks] over long distances, with greater ease.
• There is concern that young people may see the pixelating until the full transmission rate is available
way many act on social media and believe this is again, even if it was only for a split second. A buffer
normal behaviour. downloads parts of the video in advance of it being
• Some believe this had led to greater issues such watched so the user is always watching video that
as online bullying. has already been downloaded while the next part
of the video is added to the buffer.
4. Any combination of fourfrom the following points [4]:
5 Packet switching; message switching; circuit
• Sorting through large sets of data ... switching.
• ... to identify patterns and trends.
• ... to establish relationships between the 6 Fibre optic strands are very fine so lots can be
data. fitted into a small space to enable more data to be
• Extracting information from sets of data to transmitted at once; fibre optics carry data at the
inform and instruct future decisions. speed of light, meaning there is negligible latency;
• Can involve three stages, exploration, validation light signals in fibre optics are not susceptible to
and deployment. interference or hacking.
• Used to try and predict changes before they occur. 7 Hands-free operation in a car/headset; linking to a
5. Any combination of four from the following smartwatch; linking to biometric devices; streaming
points [4]: videos to a display; streaming music to speakers;
transferring files.
• Learners can learn at their own pace ...
• ... this means that they may have more confidence 8 Wi-Fi is susceptible to interference from other radio
and can revisit areas with which they struggle. devices and microwaves; Wi-Fi signals deteriorate
• Training can be given in many forms, such as over distance, especially when transmittingthrough
text based, videos and podcasts ... walls and other obstacles; Wi-Fi can be easily
• ... this can help allow for different learning styles intercepted and hacked if encryption is not set up
between people. correctly.
• A bespoke course can be created depending on 9 A video conference is a live transmission of data
a learner’s needs ... and so it is critical that the data arrives in real time.
...
• this can be automated by the software The bandwidth needs to be sufficient to provide a
adapting the training to weaknesses highlighted transmission rate capable of transmitting the video
by the learner. and audio immediately. If the transmission rate is
• Software can be designed to automatically mark insufficient, then there will be delays in the delivery
any assessment ... of the video and audio, or parts of video and audio
• ... this can provide the learners with instant will be missing.
feedback. 10 Both IMAP and POP allow emails to be downloaded
to client email software; POP removes the email
Chapter 13 - Networks from the server by default when it has been
downloaded, whereas IMAP leaves a copy of the
1 It boosts a signal along a network cable by receiving
email on the server; IMAP supports multiple folders
data packets and then retransmitting them.
on the server, whereas POP only supports one
2 File server; print server; mail server; application folder on the server.
server; proxy server.
11 Unauthorised access; DoS attack; malware.
3 Bandwidth measures the frequencies available
12 The user would be expected to log on using
on a communications channel in Hz, whereas bit
their username/banking number and password/
rate measures the amount of data that can be
PIN; the user could provide additional personal
transferred in bps.
information such as specific characters from
4 A buffer is used to keep a video running smoothly. their mother’s maiden name; the user could be
Without a buffer, any data congestion would be asked to put their debit card into a card reader
noticed by the video pausing, missing out frames or and provide a code issued by the card reader;
Answers
a Short Message Service (SMS) text message 2 Any combination of the following [4]: Levi will need
that contains a number the user enters into the sufficient bandwidth to stream the music and
bank account website could be sent to the user's video without it being interrupted. [1] If there is
mobile phone. insufficient bandwidth then there will be gaps in
13 Backups are a second copy of data and are only the music or videos or distortion [1] that will ruin
needed if the original data is damaged. The original his listening or viewing experience [1], For the
data will still be available and hackers could still video conferencing, he needs enough bandwidth
gain unauthorised access. to receive both the audio and video streams
synchronised together [1] and live so that he can
14 Data must be used fairly and lawfully; used for participate in real-time [1], If there isn’t sufficient
limited, specifically stated purposes; used in a bandwidth then he will receive the audio and video
way that is adequate, relevant and not excessive; after it happened [1] and if he tries to respond it will
accurate; kept for no longer than is absolutely not be at the right time [1],
necessary; handled according to people’s data
protection rights; kept safe and secure; not 3 All of the following [4]: If Levi wants to use a wired
transferred outside the European Economic Area connection then his desktop computer will have to
without adequate protection. be nearthe switch [1] which is probably part of the
router and must be by the telephone connection
15 Information about salary scales must be accurate [1]. This may not be a suitable location. If he
so that the employee gets paid the correct amount;
uses it somewhere else then a long cable will be
information about next of kin details must be up to required [1] which could be unsightly, could be a
date in case of an injury.
trip hazard and he may not be allowed to fix cables
16 Subscription costs are expensive compared with to the walls of the apartment [1],
other broadband options; there is a latency so it is 4a A set of rules used for communication in
not suitable for real-time applications; bandwidth
networks [1],
is lower than other broadband options; the
equipment is costly to set up. 4b Both of the following [2]: it sends requests to a web
server to view a page [1] and sends that page back
17 Some channels will be subscription only and so the
to the browser [1].
satellite television networks will want to ensure that
only those viewers that have paid for a subscription 4c Either of the following [1]: IMAP or POP [1],
are able to access those channels. 5a All of the following [4]: Levi should check the
18 GPS can provide an exact location on earth legitimacy of the site and download links [1] to
which can be useful for identifying where the check that they are genuine [1], Levi should have
nearest emergency vehicle is to an emergency; anti-malware software installed [1] that will prevent
GPS can identify an exact location in order to any malware from infecting his computer [1],
automatically add geotagging information to a 5b Any two of the following [2]: Malware could be
photograph; GPS can identify an exact location attached to a file on a USB stick or other portable
on a map so a driver is always aware of their
memory that Levi uses [1]. Levi could open an
current position when driving to a destination.
infected attachment from an email [1], Levi could
open a macro that is infected with malware [1],
Review questions
6a Two of the following [2]: Levi could have full
la Either of the following [lj: Router [1] or Gateway [1], create, read, update and delete access to his own
lb Any three of the following [3]: Switch or Hub user documents because they belong to him [1].
to connect the devices together using cables Levi could have read-only access to documents
[lj; wireless access point to provide a wireless provided by his lecturers so he can view them
connection for the laptop and mobile phone [lj; but not change them [1], Levi could have create,
NIC to connect the desktop PC to the network [lj; read and update access to files for a project he
wireless NIC to enable the laptop and mobile phone is working on with a group of other students so
to connect wirelessly [lj. they can collaborate together [1], Levi might
Cambridge International AS and A level IT
have no access permissions to printers while 4 Power cut; fire; flood; denial of access to premises;
working from home so that he doesn’t send lots malware; unauthorised access to data; theft of data;
of documents to be printed [1]. corruption to data; loss of key personnel.
6b Both of the following [2]: Levi’s finger print will be 5 Recovery procedures are not used very often, if at
unique so it will identify who he is to give him access all, so they need to be tested to ensure they work; if
rights [1] and it will confirm that it is Levi because he they don’t work, then disaster recovery won’t work
is the only person with his finger print [1]. and that could shut down an organisation.
7a Any two of the following [4]: Levi will have access
6 Evolutionary prototyping develops each prototype
to more channels [1] because there is a higher
further, whereas throwaway prototyping
bandwidth available with satellite television [1]. involves disposing of the prototype. Evolutionary
Levi will be able to access subscription channels
prototyping involves refining user requirements
[1] because he will have a set-top-box capable of
after each evolution of the prototype and
decrypting the signal [1],
throwaway prototyping also involves refining
7b Any one of the following [1]: The satellite dish requirements after the prototype is developed.
will need to be installed [1] and he may not have Both methods involve producing a basic version of
permission to install it in his apartment [1], If what the user interface will look like. Both methods
weather conditions are bad then the broadcast involve getting feedback from the user early during
may be interrupted [1] meaning he cannot watch the project.
the television channels properly [1],
7 JAD involves both users and developers working
together to develop a working prototype, with the
Chapter 14 - Project management user being able to refine the design and layout as
development progresses. Software application
i During monitoring and control of the execution, frameworks are used to develop the prototype and
resources may become unavailable, timescales may end solution.
not be met and the budget may be exceeded. If this
happens, plans will need to be revised to allocate 8 A library of objects (e.g. walls, windows) could
different resources, adjust timescales and adjust be used to design the model; 3D views could be
expenditure. used to see what the extension will look like from
a variety of angles; windows and doors can be
2 Web-based software can be used by multiple users added to the design and their size and position
at once, whereas single-user desktop software is altered; the colour of walls can be experimented
only available to one user; web-based software with until the right one is found; different lighting
can be used by any device, whereas desktop options can be experimented with to give the right
software can only be used by the device(s) on which amount of light.
it is installed; web-based software can be used 9 Loss of jobs; imperfect testing; not the same as a
for collaboration, whereas single-user desktop prototype; highly trained staff required; initial costs
software can only be used by one person. of purchasing software; still prone to human error;
limited to vector objects.
3 Resources will have been defined within the
software, including their availability and costs.
The project manager can then select available Review questions
resources and allocate them to tasks where
they are required. Allocation of already assigned 1 Conception/initiation; planning; execution;
resources at specified times will be prevented by monitoring/control. [4]
the software. The project manager will be able to 2a A large team is likely to require sub-project
assign an amount oftimetoeach resource for each managers who will need to update different parts of
task. The project manager will be able to see the the plan at different stages of the project; members
costs involved for each resource and how much of the team will be able to use a web interface
each task will cost. to update their progress; access will be available
from any computer which is important for a large information from the user; questionnaires take time
team who may be working in different places; to create and are unnecessary when a small group
team members can collaborate on documents of users can all be interviewed.
throughout the project; each team member will 3 To identify the hardware and software required to
be using the same version of the software so there operate the developed system.
won’t be compatibility issues.
2b Personal; desktop; single-user. [1] 4 To show the data flows within a system.
3 The software will provide an option to define 5 Each data flow must have a process attached to it.
resources; availability of each resource can be A data flow cannot move directly from one external
identified; costs can be assigned to each resource; entity to another or from one data store to another
resources can be allocated to individual tasks; or between an external entity and a data store.
resource conflicts and overload can be 6 A tick box allows more than one response, whereas
highlighted. [3] an option button only allows one response.
4a Both charts can show the critical path; both charts
7 To test that a validation rule accepts data that is only
show the length of time each task takes; both
just acceptable and to test that it produces an error
charts show predecessors/dependencies. [2] message for data that is only just unacceptable.
4b Resource allocation; start/finish dates; task 8 Alpha testing is carried out by the development
progress. [2] team, whereas beta testing is carried out by users;
5a A ‘mock-up’ of a software solution; partially alpha testing is planned and structured, whereas
completed product used forevaluation/ beta testing is ordinary everyday use; alpha testing
feedback. [1] uses test data, whereas beta testing uses real data.
5b Evolutionary prototyping develops each prototype 9 Tester will use input data to test part of a system
further whereas throw-away prototyping involves or a whole system and check the expected
disposing of the prototype so the prototype results against actual results without knowing or
can grow rather than having to start again. understanding the code inside the black box.
Evolutionary prototyping involves refining
user requirements after each evolution of the
10 A test plan will identify all the tests that are needed
for every input, every button, every link, every
prototype which will enable the landscape
report, every screen and all other elements of a
gardening company to better understand their
system. The test plan will include DIFFERENT types
own requirements as the prototype develops.
of test data including valid, invalid and extreme
The landscape gardening company can canvass
so that inputs are tested to their limits. Without
opinion from customers on what the user interface
this planning, important parts of testing would be
will look like. The project team can get feedback
missed out and errors could be left undiscovered.
from the landscape gardening company early
The plan will also coverall the user’s requirements
during the project. [4]
and ensure that they are tested.
6 Paving slabs; shed; borders; flowers; trees; shrubs;
garden furniture; soil; grass; hedge; wait. [3] 11 Parallel; direct; phased; pilot.
12 If it would be too costly or take too long to input
Chapter 15 - System life cycle data into both systems, then direct would be more
appropriate.
1 Feasibility; analysis; design; implementation/
13 If there are a lot of users, then pilot changeover
development/coding/programming; testing;
will enable training to take place in stages rather
installation/changeover/implementation;
than all at once; if the new system is not very big
maintenance.
and doesn’t have features that can be separated,
2 The analyst can expand upon questions that have then pilot could be used instead of trying to phase
been asked during the interview to gain further something that can’t be broken into parts.
Cambridge International AS and A level IT
14 Cover, contents, introduction, hardware/ 4b Beta testing requires a very large user base and
software requirements, instructions, glossary, usually applies to off-the-shelf software whereas
troubleshooting, index. the hotel system will need to be used consistently
by all staff within all the hotels. [2]
15 To give definitions of any technical terms used in
the user documentation. 4c It’s needed to check that the system can cope with
16 When a system requires maintenance. invalid data and reject it appropriately without
system errors occurring. [2]
17 Working relationship; efficiency of system; bugs 5a There are tots of hotels so one hotel could pilot the
or errors in the system; ease of use of the system; system and identify any problems which could be
possible improvements to the system. rectified before the system is installed in other hotels.
18 If a bug or error is found within a system. Only a small group of staff need to be trained in how
to use the system initially at the one hotel. The hotel
that pilots the system could be used to train staff
Review questions
from the other hotels how to use the new system. [4]
la To find out how the current system works; to find
5b Troubleshooting will show common errors and how
out the requirements of the client. [1]
to solve them so if the staff come across one of
lb There will be lots of staff in several hotels so these errors they can find out what to do. Glossary
there won’t be time to interview them all but will include definitions of technical terms used in
questionnaires can get information from all staff; the documentation so if staff don’t understand a
the data will need analysing and so the questions term in the documentation they can look it up. [4]
can be written in a way that will gather responses in
5c Errors may need correcting; the system may need
a structured manner. [4]
i lc
2
Interviews; observation; document analysis. [3]
To identify what the client needs the new system to
to be adapted due to organisational or external
changes; to prevent problems from occurring; to
improve on the software. [4]
do. [1]
3a Use of colour; consistent use of fonts; avoiding Chapter 16 - Graphics creation
clutter; legibility of fonts; instructions to the user;
optional vs compulsory questions; sufficient space 1 An image made up of pixels. It pixelates when it is
for answers; tick boxes or drop down boxes or enlarged too much.
option buttons for multiple choice lists. [3] 2 An image stored as coordinates and equations. It is
3b Example should identify the input data, type of recalculated then displayed. It does not pixelate.
validation, rule and error message. For example,
3 Image manipulation can be used to make people
Number of nights, Type check, Must be numeric,
look worse, make fun of people, be negative or give
Please enter a numeric value. [3]
false impressions that people believe.
3c Printerto print invoices forthe customer; barcode
scanner to read barcodes on customer booking 4 Parts of an image, or an object, that can be built up
printout or mobile phone display; magnetic stripe on top of each other to create the final image.
/ smart card reader/writer to initiate room keys; 5 Lasso, marquee, magnetic lasso.
touch screen for the point of sale terminal in the bar
and restaurant. [3] 6 Combines the objects into one object that can then
be manipulated.
4a White box testing requires understanding of the
module or system being tested whereas black box 7 It lets you apply a technique to just part of an image.
testing only requires input data and output data to
8 The colours in the image will be replaced with
be used; white box testing is usually carried out by
the developer whereas black box testing is usually
shades of red and blue.
carried out by the user or specialist testers. [4] 9 A selection tool (lasso, magic wand, magnetic lasso).
Answers
- :ÿ IT::
Acknowledgements
;;
The authors and publishers acknowledge the following Opener 9 Sergey Nivens/ Shutterstock; Chapter OpenerlO
sources of copyright material and are grateful for the Don Farrall/Getty Images; Chapter Opener 11 Anthony
permissions granted. While every effort has been made, it Harvie/Getty images; Fig.11.01 Trevor Williams/Getty
has not always been possible to identify the sources of all Images; Fig.11.02 Bloomberg/Getty Images; Fig.11.03
the material used, or to trace all copyright holders. If any Sean Gallup/Getty Images; Fig.11.04 ERIC PIERMONT/
omissions are brought to our notice, we will be happy to Getty Images; Fig.11.05 Aaltazar/Getty Images; Fig.11.06
include the appropriate acknowledgements on reprinting. YASUYOSHI CHIBA/Getty Images; Fig.11.07 Bloomberg/
Getty Images; Fig.11.08 Neiison Barnard/Getty Images;
Cover image: wu kailiang/Aiamy Stock Photo; Chapter
Chapter Opener 12 violetkaipa/Getty Images; Fig.12.01
Opener 1 agsandrew/ Shutterstock; Fig.1.01 MBI/Alamy
Stock Photo; Fig.1.03 CBW/Alamy Stock Photo; Fig.1.04 Met
KTSDESIGN/Getty Images; Fig.12.02 Ramon Espelt
Office © Crown copyright; Fig.1.05 Montgomery Martin/ Photography/ Getty Images; Fig.12.03 LaraBelova/Getty
Images; Fig.12.04 Monty Rakusen/Getty Images; Chapter
Aiamy Stock Photo; Fig.1.06 Anatolii Babii/Alamy Stock
Opener 13 Ivlina De La O/Getty Images; FigJ.3.01 vtls/
Photo; Fig.1.13 RT Image/Ala my Stock Photo; Fig.1.21
Shutterstock; Fig.13.02 Jelena83/Getty Images; Fig.13.04
AngelSID/Shutterstock; Chapter Opener 2 Sergey Nivens/
luxxtek/Getty Images; Fig.13.06 Noraznen Azit/Getty
Shutterstock; Fig.2.01 Robert Lucian Crusitu/Shutterstock;
Images; Fig.13.07 umbertoleporini/Getty images, Fig.13.11
Fig.2.02 BonDSO/ Shutterstock; Fig.2.03 vetkit/
asharkyu/Shutterstock; Fig.13.13 Alexandr Spatari/Getty
Shutterstock; Fig.2.04 hadescom/ Shutterstock; Fig.2.05
Images; Fig 13.14 Editorial Image, LLC/Alamy Stock Photo;
nistor razvan/Getty Images; Fig.2.06 yclinf/Getty Images;
Fig.13.16 Peshkova/ Shutterstock; Chapter Opener 14
Fig.2.07 Moreno Soppeisa/ Shutterstock; Fig.2.08 pryzmat/
Hero Images/Getty Images; Fig.14.18 Mikhail Bakunovich/
Shutterstock; Fig.2.09 Steven Puetzer/Getty Images;
Shutterstock; Chapter Opener 15 MimaCZ/Getty Images;
Fig.2.10 Pakawat Suwannaket/Shutterstock; Chapter
Fig.15.01 Piinthpics/Alamy Stock Photo; Chapter Opener 16
Opener 3 lucapierro/ Getty Images; Fig.3.01 Federico
artishokcs/Getty Images; Fig.16.01 lilu330/ Shutterstock;
Rostagno/Getty Images; Fig.3.02 Oli Scarff/Getty Images;
Fig.16.03 Yadid Levy/ Aiamy Stock Photo; Fig.16.04 Dincer
Fig.3.03 Balancici/Getty Images; Fig.3.04 Bloomberg/
Dokumcu/Shutterstock; Fig.16.05 Wavebreakmedia Ltd/
Getty Images; Fig.3.05 Goodshoot/Getty Images; Fig.3.06
Aiamy Stock Photo; Fig.16.06 kris mercer/Alamy Stock
TORU YAMANAKA/Getty Images; Chapter Opener 4
Photo; Fig.16.07 petoei/Shutterstock; Fig.16.08 Creative
wkl003mike/Shutterstock; Fig.4.04 Science Photo Library/
Stall/Shutterstock; Fig.16.09 DesignPrax/ Shutterstock;
Getty Images; Chapter Opener 5 Aeriform/Getty Images;
Chapter Opener 17 Shivendu Jauhari/Getty Images;
Fig.5.01 Kheng Guan Toh/Shutterstock; Fig.5.02 created
Fig.17.02 Brian A Jackson/Shutterstock; Fig.17.03 Karl
by Jeff Ogden (W163) for Wikipedia, using dated by the
Van Ginderdeuren/Buiten-beeld/Minden Pictures/Getty
International Telecommunications Union (ITU); Chapter
Images; Chapter Opener 18 Yagi Studio/Getty Images;
Opener 6 KTDESIGN/ SCIENCE PHOTO LIBRARY/Getty
Chapter Opener 19 Mclek/Shutterstock
Images; Fig.6.05 Rawpixel Ltd/Getty Images; Fig.6.06
Lewis Mulatero/Getty Images; Fig.6.07 Dan Kitwood/Getty On CD-ROM (landscape) Iilu330/Shutterstock; (bench)
Images; Fig.6.08 John Fedele/Getty Images; Fig,6.09 Brian NokHoOkNoi/Shutterstock; (New York City) Songquan
Brainerd/Getty Images; Fig.6.10 Monty Rakusen/Getty Deng/Shutterstock; (helicopter) Zooner GmbH/Alamy
Images; Chapter Opener 7 KrulUA/Getty Images; Fig.7.01 Stock Photo; (frog) David Cook/blueshiftstudios/Alamy
© NHS Choices; Chapter Opener 8 Gregor Schuster/ Stock Photo; (doorway) Valery Sidelnykov/ Shutterstock;
Getty Images; Fig.8.52 PhotoCuisine RM/Alamy Stock (mountains) Peter Haigh/Alamy Stock Photo; (fruit)
Photo; Fig. 8.62 ORLANDO SIERRA/Getty Images; Chapter pilipphoto/Shutterstock; (houses) JeniFoto/Shutterstock.
Index
absolute references, 112-14, 116 black box test, 261 CPA (critical path analysis), 237-9, 247-8
access rights, 222, 223, 230, 242 blog, 204-5 CPU (central processing unit), 24-5,
ACL (access control list), 224-5 Bluetooth, 197,217-8,221, 230 35-6,52 f
ADF (automatic document feeder), 30 Blu-ray, 31-3, 52 cryptography, 14, 15, 195, 196 88
ADSL (asynchronous digital subscriber BMP (bitmap image file), 13 CSV (comma separated values), 126, 146, lit
lines), 91,228 Boolean, 137-8, 159, 167, 172, 297 160, 168, 170, 287
adware, 49, 66, 69, 226 Boolean operators, 96, 125, 152, 156 CU (control unit), 24
Al (artificial intelligence), 96, 191-2, bot, 66, 70
196,199 broadband, 72-6, 91, 111, 205-6, 228 data:
algorithm, 13-14, 19-20, 120, 189, 195 buffer, 214-5, 219, 221 allowance, 219
ALU (arithmetic logic unit.), 24 byte, 10-11, 214-5 compression, 49, 52, 220
analogue, 11, 25,55 dictionary, 165-6, 168, 173-4, 253,
analysis 6, 236, 241, 251 CAD (Computer Aided Design), 130, 246-8 259,265
mathematical, 130, 134 Caesar cipher, 13-14, 16 mining, 203-4, 209
animation, 179, 272,281-4 Cailliau, Robert, 87 Data Protection Act, 34, 226, 227, 230
anti-spyware, 226 CAM (computer-aided manufacture), DBMS (database management system), 39,
anti-virus, 49, 51, 52, 64, 67, 226 246-7 42-3, 137-8, 146, 149, 157, 160, 171
app, 37, 41, 52,87, 198, 201 camera, 28, 56, 59, 92-3, 130, 192-3, 196-8 decryption, 14-16, 195, 225-6, 228
application layer, 220-1, 225 accurate, 45 design specification, 250, 252-3, 268
application server, 79, 81, 214 digital video, 28, 31 device driver, 36, 52
application software, 37-43, 52 CD (compact disc), 11, 31-2 DFD (data flow diagram), 253-5, 260
array, 296-7, 300, 302-4 CD-ROM, 3 diagnosis, 75, 93, 96-8, 100, 192
ASCII {American standard code for cell, 89, 103-10, 113, 123, 127 digital currency, 203,209
information interchange), 10, 13, 221 cellular communication, 190 digital divide, 72-7, 92
aspect ratio, 176-7, 186 chaining, 96-7, 100 direct data source, 3, 5, 6, 21
attribute, 137, 139, 143, 160, 165-6, chart, 56, 127-9, 172, 233, 236 document analysis, 252
168, 259 circuit, 55,211,212,215 DOS (denial of service), 213, 222
audio clips, 183 closure, 233, 247 DRP (disaster recovery plan), 241-2, 247
augmented reality, 192-3 cloud, 27, 33, 189, 194, 225, 227, 234, 274 duplex unit, 28
cloud storage, 27,52,254 DVI (digital video interface), 25
backup, 31-4, 49, 82, 225, 230, 242, 265 Code Red, 66 dynamic data, 3-4, 21, 22
bandwidth, 72, 74, 214-7, 218, 221, codec, 10, 12-13, 91-2 dynamic parameter, 155, 156, 160, 173
228, 230 coding system, 9, 10
broadband, 33 Colossus, 14 EBCDIC (extended binary coded decimal |8
higher, 219 colour gradients, 274, 278-9 interchange code), 10, 221
restricted, 13
barcode, 4, 19, 30-1, 196, 202-3, 219
compiler, 36-7, 51-2
complex query, 152, 154-5
e-business, 201, 209
ecommerce, 72-4, 76-7 1is
batch, 98, 100, 170, 203 compression, 10-13, 68, 168-9, 186, 275, email encryption, 16
BCNF (Boyce-Codd Normal Form), 164 278-9 encoding, 8, 10, 13, 16, 21, 40
Berners-Lee, Tim, 87 computer-assisted translation, Enigma machine, 14, 191
beta test, 260, 261, 263 194, 195 entity, 137, 139, 141, 143
binary, 10, 11, 13 conception, 233, 247 ERD (entity relationship diagram), 137,
biometric, 193, 211, 224
BIOS (Basic Input/Output System), 35
confidential data, 62, 69, 105, 106, 222
confidentiality, 9, 84, 207
141-2, 173, 265
expansion cards, 25,212
8
bit rate, 11-12, 169, 211, 214, 219 consistency check, 18-19 expert system, 96-101, 192 ;
888.
Bitcoin, 203, 209 construct, 296, 301 export, 126, 160, 181-2, 186, 275
bitmap, 10, 39, 169, 271-2, 276, 278-9 control technologies, 55-7, 59 external hard drive, 31-2, 34
BitTorrent protocol, 221, 230 corrupt data, 211 extranet, 83-84, 234
filter data, 124 index, 48, 137,141, 171, 173, 265, 300, MICR (magnetic ink character reader),
financial modelling, 131 303-4 30,52
fingerprint, 15,193, 231, 224 indirect data source, 2, 3, 5-7 microphone, 25, 28, 43, 90-2, 205-6
firewall, 67, 211, 213-14, 224-5, 230, 242 inference engine, 100 microprocessor, 55, 58
application layer, 225 infrared, 309 MicrOSD card, 31
proxy, 225 infrastructure, 72-73, 85, 191 microwave, 55-6, 81, 217, 228
flash memory drive, 52 physical, 87 MIS (management information
flat file, 137, 143-5, 160, 172 input device, 24, 33, 35, 41, 45, 52, 55, 59 systems), 172-3
flowchart, 55, 253, 255-6 interface, 25, 27, 43-48, 50, 52, 234-35, mobile network, 89-92, 224
foreign key data, 148 243-45 commercial, 74
foreign key value, 139 internet connection, 73, 79, 81, 90-91, mobile network coverage, 75
format check, 18, 21 194, 206, 208, 214 monitoring and control technologies,
forward chaining system, 97 interpreter, 36-37, 51-52, 299 55-7,59
FTP (file transfer protocol), 221 interview, 92, 96, 250-53, 268 MOOC (massive open online courses), 208
FTTC (fibre to the cabinet), 216 intranets, 83-84, 94, 234 morphing, 281, 283-4
IP address, 203 motherboard, 24-7,52, 211-12
Gantt chart, 233, 235, 238-9, 241, 247-8 ISDN (integrated services digital motion tween, 283-4
gateway, 211, 213-14, 220, 224 network), 91 mp3, 13, 169, 186
GEO (geostationary earth orbit), 228 ISO (international organization for mp4, 12, 169, 182
GIF (graphics interchange format), 11, standardization), 169-70, 220 MPEG (Moving Pictures Experts Group), 12,
13,278 ISP (internet service provider), 84-5, 169-70
GPS (global positioning system), 228-9 94,213-14 MTD (maximum tolerable downtime), 242
graphics card, 25, 27, 35, 52 iteration, 233, 243, 296, 303, 306
integrated, 24 nanotechnology, 207
grouping, 273, 276, 279 JavaScript, 296-7, 304-6 network architecture, 79
GUI (graphical user interface), 44, 52, 244 JPEG (Joint Photographic Experts Group)/ network connection, 4, 234
JPG, 11,13, 169, 278 network security, 221
hacker, 64, 202, 218, 222-3, 225 news, 4, 22, 83, 86, 88, 180, 253
HD (high definition), 12, 25, 27, 73, 176, key card, 254-55 NFC (nearfield communication), 211,
191, 197 key field, 100,159-60,171 218-19, 223
HDD (hard disc drive), 25-6, 31-2, 34, 49, key frame, 281-3 NHS (National Health Service), 74, 98
52, 171 key logger, 66, 222 NIC (network interface card), 211, 212
HDMI (high-definition multimedia knowledge base, 3, 96-7, 100 node editing, 274
interface), 25 non-volatile, 25-6, 31, 310, 314
health and safety, 62, 67 LAN (local area network), 79-81, 83, 91, 94, normal form, 137, 160-5, 173
hologram, 195 211, 213-14, 216, 218-20 first (INF), 140, 161
hotspot, 16, 217, 225 laser, 28-9, 30, 31, 41, 217, 230 second (2NF), 162
HTML (hypertext markup language), 41, layer, 13, 195, 220, 273-84 third (3NF), 160, 163
168, 304 LED (light-emitting diode), 28 normalisation, 160,164-5, 173
HTTP (hypertext transfer protocol), 15, length check, 18, 21
221,226, 229 LEO (low earth orbit), 228 Object code, 52
HTTPS (hypertext transfer protocol link editor, 37 OCR (optical character reader), 30, 35, 52
secure), 8, 15, 64, 202, 203, 221, 226 linkers, 37, 52 off-the-shelf, 51
hub, 211-3 OMR (optical mark reader), 30, 33-5,
hyperlink, 45-6, 87, 253, 265 magnetic tape drive, 32 52-3
mail merge, 286-94 one to many, 139-40, 172
IDE (integrated drive electronics), 26 mail server, 214 one-to-one, 139, 141, 172
identification number, 19, 211 malicious bots, 66, 69 ONF (unnormalised form), 160
identifier, 296 malicious code, 62, 64 online banking, 15, 41, 76, 189, 201-2,
unique, 137, 147, 173 malware, 49, 64-7, 221-2, 225-6, 230, 241 209,227
IM (instant messaging), 40, 83, 88, many-to-many, 140, 143 online courses, 208-9
204, 236 memory card, 31, 33, 52 online shopping, 41, 75, 201, 209
IMAP (internet message access mental model, 46, 48, 124 impact of, 209
protocol), 220 MEO (medium earth orbit), 228 opacity, 276-8, 281,283-4
Cambridge International AS and A level IT
operating system, 26, 32, 35-7, 48-50, RAD (rapid application development), smishing, 63-5, 69
52, 66 243-5, 247 SMS (short message service), 64, 65
operator, 14, 152, 292, 297-9 radio button, 47, 159, 258, 305-6 social network, 62-3, 66, 73, 85-8, 182,
arithmetic, 297 radio waves, 81, 85, 212, 218, 228, 231 204-5, 209
assignment, 297 RAM (random access memory), 25, 32, 35, sound card, 25, 52
conditional, 291 52 sound clip, 11, 87, 180-6
logical, 298 range check, 17, 21, 122 slowing down, 184
optical communication, 216, 230 ransomware, 66-7, 69 sound track, 180,184-5, 187
optical storage methods, 195 raster, 10, 169-170 source file, 36-7, 286-8, 294, 309-11
output device, 24, 33-5, 52 ROMS (relational database management), spam, 86, 214
overdubbing, 184, 187 137 spyware, 49, 66, 69, 221-2, 226
recovery management, 242 SSD (solid state drive), 25-6, 32, 52, 171
packet switch, 84-5,88, 91, 211, 215 recovery testing, 242 SSL (secure sockets layer), 8
parallel running, 263 referential integrity, 18, 148-9,159-60, 173 static data, 3, 21
parameter, 155-6,173, 224, 302 relational database, 139-140, 143, 144-7, static parameter, 155, 156, 173
dynamic, 155-6, 160, 173 165 STB (set top box), 44, 228
static, 155-6, 173 relative cell, 134 stem cell technology, 189
peer, 80-3, 94, 221 repeater, 211, 213, 221 stock control system, 99, 203
pen drive, 31-3, 35 multi-port, 212 storage, 24, 31,33, 35
pharming, 63-4, 69-70,86 reverberation (reverb), 184-5 string manipulation, 298-9
phishing, 63-5, 69-70, 86, 214 RFID (radio frequency identification), 211, SVG (scalable vector graphics), 11
photoresistor, 58 218-19, 311 SVGA (super video graphics array), 12
piezoresistance, 57 RGB port, 25 swipe card, 223, 226
PIN (personal identification number), 28, risk assessment, 241, 247 switch, 211-16,300-6
223, 326 RLE (run-length encoding), 11 system flowchart, 253, 255
336 pixelation, 13, 219, 272 robotics, 196, 208, 283 system software, 35, 52
platter, 26 ROM (read only memory), 25, 52 system specification, 250, 252-3, 259
plotter, 28-9, 35 rotation, 273, 283
PNG (portable network graphic), 11, 13, router, 44, 211, 213, 215-16, 224 TCP/IP (transmission control protocol/
169-70, 278 RPO (recovery point objective), 242 internet protocol), 84-5, 220-1
POP (post office protocol), 220 RSI (repetitive strain injury), 27, 68 telecommunications, 85
predecessor, 79, 237-40, 247 test data, 123-4, 260-2
pressure sensor, 57, 60 sample rate, 11, 186-7 extreme, 263
primary key, 137, 139-41, 143-4, 147-8, sample resolution, 186 invalid, 269
160, 162-3, 165, 173-4 SATA (serial advanced technology test plan, 123-4, 261-3
printer: attachmeilt), 26 effectiveness of, 123
colour laser, 29 sat nav (satellite navigation), 229 three-dimensional (3D) printing, 189
dot matrix, 28-9 satellite, 81, 85, 228-9, 231 TIFF (tagged image file format), 278
inkjet, 28-9 SD (secure digital), 31 timeline, 176-7, 180, 235-6, 281-2
large-scale, 190 SDSL (synchronous digital subscriber TLS (transport layer security), 15
laser, 28-9 lines), 91 token, 223
simplex, 28 security cameras, 28 transition, 176-9, 184
private key, 14-16, 201, 214, 226 security method, 15, 222-30, 242 transport layer, 220-1
proofreading, 234 security system, 56 trap errors, 304, 306
proprietary file formats, 169, 173 seeders, 221 Trojan, 65, 67, 69, 222
prototype, 243-4, 248 sensor, 41, 45, 55-6, 59-60, 76, 196 tunnelling protocol, 83
manufactured, 246 moisture and humidity, 58, 60 Turing, Alan, 191
proxy server, 213-14, 225 server, 80-2, 94, 213-14 tween, 281-4
public key, 14-16, 201, 225-6 session layer, 220 type check, 18, 21
shape tween, 283-4
QR (quick response), 31, 196 simulation, 3, 132-4, 135, 207 ultra-high definition, 197-8
QR codes, 196-7 smartphones, 59, 74, 82, 87-92, 189, Unicode, 10, 13
quantum cryptography, 195-6 197, 234 UPC (unique product code), 19-20
questionnaire, 110, 250-1, 253, 256, 268 smartwatches, 197, 326 URL (uniform resource locator), 64, 75, 221
i
Index
USB (Universal Serial Bus), 15, 24, 31, 33, VGA (video graphics array), 12, 25 waterfall method, 244-5, 247
\
212, 223 video conference, 28, 90-4, 93, 205-6, 230 WAV (waveform audio file format), 12
USB port, 27-8, 31, 33 virtual reality, 45, 195, 198-9 web browser, 15, 37, 65, 87, 94, 168,
utilities, 36, 49-52 vishing, 63, 65, 69 221, 267
Visual Basic, 36 webcam, 28, 52, 90, 205-6
validation, 9, 16-21, 41, 103, 121-3, VLE (virtual learning environment), 84 webmail,40-l
149-50, 227 voice over, 180, 184, 186 white box testing, 260-61
validation routines, 253, 258 voice recognition, 193, 224 Wi-Fi, 211-12, 217-18, 221, 230
validation rules, 121-3, 149-50, 165, 173, VOIP (voice over internet protocol), 40, WIMP (windows icons menus
258-62,265,268 88, 94 pointers), 44
valid data, 20 volatile, 25, 312 wireless communication method,
variable, 38, 42, 130-2, 204, 293, VPN (virtual private network), 83-4, 217, 219-20
296-302, 306 94, 225 WNIC (wireless network interface card),
vector, 28, 271-2, 276, 279, 281 211-12
vector graphics, 39, 169, 246, 271-2, 279 WAN (wide area network), 79-81, 211, WYSIWYG (what you see is what you
verification, 16, 20-2, 134, 173, 244, 252 213-14, 220, 224 get), 41
337
1
i
if
- - - : :.:-:::::::'&?»&i£:;;:::
—
::ÿ: : !
X
i
a
i:
3
I
a
i
I
i
8
a
;
I
i
1
.
a:
%
KX
i
a
&
a
I
B
;iX
X
x:
.
a
i
a
I
I
1
xx
i
Ss
I
a
,
V:A
m
&
i
m
m
W:
ax
ax
a
I 'M
1
1
g
a-
i
s
&
m
m
a
a
1
as
m
I
i
«ax
XXX
1;
%
aaa: ;x; X xxx: x ?: V:::}V;a::aav:a:” • -aaxaxia