0% found this document useful (0 votes)
9 views14 pages

ICT Theory (1)

The document provides a comprehensive overview of various input and output devices, their types, advantages, and disadvantages. It also discusses different memory types (RAM, ROM, HDD, SSD) and their characteristics, as well as user interface types and their pros and cons. Additionally, it covers validation checks used in data entry processes.

Uploaded by

dayagami675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

ICT Theory (1)

The document provides a comprehensive overview of various input and output devices, their types, advantages, and disadvantages. It also discusses different memory types (RAM, ROM, HDD, SSD) and their characteristics, as well as user interface types and their pros and cons. Additionally, it covers validation checks used in data entry processes.

Uploaded by

dayagami675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Input devices Output devices

Used to enter data or instructions into a computer Used to show the computer’s output in a form that is
directly. understood by a human.
Can send data to another device. but it can’t receive Can receive data from another device, but it can’t send
data from another device. data to another device.
Under
the control of the user or can be direct data Under the control of the computer.
entry.
More complex. Less complex.

RAM ROM
Volatile memory. Non-volatile memory.
Temporary memory device. Permanent memory device.
Can be written to and read from. Can only be read from but not written to.
Store data. programs or parts of the operating
system Stores the startup instructions when the computer is
that are currently in use. first switched
on.
Tends to have greater storage capacity. Lower storage capacity

Main/Internal memory Backing storage


Directly accessible by CPU Not directly accessible by CPU
Faster access speed Slower access speed
Lower storage Tends to have greater storage
RAM & ROM are fixed inside the computer Can either be fixed or it can be removable
Can be volatile (RAM) and non-volatile (ROM) Non-volatile
More expensive per unit storage Cheaper per unit storage
Stores bootup instructions and can hold data during Stores files and software
processing

Types of computer Advantages Disadvantages


* [ess chance to be stolen. = Not very portable.
Desktop computer
® | ess expensive to upgrade. * Consume more physical space.
= More data storage. = It needs constant power supply.
Lapto * Low power consumptions. * Easier
to lose/steal comparedto PCs.
P P * Low heat generation. * Have limited battery life.
* Can be used if there’s a power cut. * Not always possible to upgrade them.

Tablets * Very fast to switch on. * Have less storage capacity than laptops
* Have better battery life than laptops. and Pcs.
* Less heat 1s generated. * Expensive when compared to laptops.

Smartphones than laptops.


* More portable than laptops/PCs.
* Small kevboards
* Can use several apps. » Less storage capacity than laptops/PCs.
* Easier to use than laptops. * Easier to lose than laptops and PCs.

User interface Advantages Disadvantages


types
* Uses less memory
than GUIL * Commands
must be learnt and memorized
Command life * Requires less processing power than GUIL bv the user.
interface #» The user is in direct contact with the * Commands
must be typed in exactly.
computer. * Commands
must be tvped which takes
time.

Graphic user * No need to memorize


® More user friendly
than CLL
any commands. * Consumes more memory than CLI.
* Requires more processing power than
interface = Fewer errors are made. CLL
* Computer settings are protected from the
user.

Dialogue based * Very useful for people with disabilities.


* Can be used as a security feature to
* Can be too complex to setup.
® User needs to know which commands can
interface identify a person. be used.

* No physical contact required. * Only works near to the camera or sensor.


Gesture based * No training needed to interface with the * May only accept a limited number of
interface computer. movements.

CamScanner
Pointing Advantages Disadvantages Uses
devices “input"
* Doesn’t need a large desk area * Difficult to use if no flat surface * Moving and deleting files.
Mouse when compared to keyboard. readily available. * Controlling the position
» Faster way to choose an option » Difficult to use for people with of a pointer on the screen.
compared to keyboard. restricted hand movement.

Touchpad e Takes less physical space than


mouse.
« Difficult to control compared to
mouse.
e Moving and deleting files.
* Controlling the position
* More suitable if there 1s no flat * Difficult to use for people with of a pointer on the screen.
surface available. restricted hand movement.

* Needs less desk space than a e Needs training as it’s not * In some luxury cars to
Tracker ball mouse. standard equipment. select functions.
Easier to use than a mouse. * More expansive.

Other input Advantages Disadvantages Uses


devices
Keyboard * Easy way to input data.
* Allows to input variety of data.
e Slower method compared to
direct data entry devices.
¢ Input of data into
applications software.
¢ Fast entry of new text. e Large device which uses up ¢ Typing in commands to
desk space. the computer.
* Very easy to carry around. e Have small keys which can
Numeric * Faster than keyboards to input make nput more difficult.
e In ATMs to enter data.
¢ Fast entry of numeric data
keypad numbers. * Not used to enter text. into a spreadsheet.

Rem ote * Operate devices from distance. | * Objects between the device and |« TV.
* Useful for people with walking | the remote control can prevent
control difficulties. its operation.
e Hard
to use if the user
has
disability in hand movement.
JO Stick e Control is more realistic than |« More difficult to control a « In video games.
y using a mouse. pointer using a joystick than * Flight simulators.
* Easier than keyboard to other pointing devices.
navigate the screen.

Drivin * Easter than a keyboard to e More expansive compared to | ¢ In video games.


g control steering movements. mouse or joystick. * Flight simulators.
wheel
TO“ Ch * Easy method to choose options. | « Limited number of options. * In ATMs.
» Faster entry of options. e Screen can get dirty with * Mobile phones, tablets,
screen constant touching. phablets.

. Its faster to read text than to e Use up a lot of computer ¢ To input speech in
Microphone Sk memory. presentations.
Gra hic * More accurate in drawing than | ¢« More expensive than other e To input freehand
p using pointing devices. pointing devices. drawing.
tablet
Dicital * The image can be immediately | * Images often need to be * Taking pictures.
gl seen on the screen. compressed to reduce amount
camera of memory used.
* Allows image to be stored for | e Can be slow. ¢ Scan in documents and
Scanner further editing. convert them into a digital
format.

Light pen ¢ Greater accuracy than touch


screen.
e Problems with lag when
drawing on screen.
¢ Selecting/drawing objects
on CRT screens.

(%] CamScanner
Direct data Advantages Disadvantages Uses
entry (DDE)
Onptical * Faster data entry system than | ® Device has difficulty in reading | ® Processing of passport and
P manually typing data. handwriting. identity cards.
character * Errors are reduced as thereis | « Not a very accurate technique
d no manual input. to read text.
reaaer
(OCR)
Optic a] * Very fast way of inputting data. | ¢ If the marks don’t fill the space | ®* Multiple choice
* More accurate than keying in completely they may not be examination papers.
mark reade[‘ the data. read correctly. * School registers.
* More accurate than OCR. e If the marks are not dark
(OMR) enough they may not be read
correctly.
* Much faster than keying in data | « More expensive system than ¢ In supermarket.
Barcode manually. using keyboards. e libraries.
['eader ¢ Errors are reduced as there is « Barcodes can be more easily
no manual input. damaged compared to RFID.
chips and magnetic stripes.
Qlli Ck ¢ Can hold more data than ¢ Cam be used to transmit * Giving automatic access
traditional barcodes. malicious codes. to a website.
re spon Se * Faster and easier to scan. ¢ More than one QR format is
( QR) available.

Radio * Can store more data than ¢ Can hack into the data by the | ¢ Contactless payment.
barcode. fag. * (tag: contain Microchip
frequency * Allows greater security than « Initial cost is more expensive to store & transmit data
. . . barcode. than barcode. and Antenna to receive &
identification . Very fast read rate. « Tag collision may occur. transmit data)
(RFID)
: ¢ Much faster than keying in data | ¢ Data will be lost if its * ATM cards.
Magnetlc manually. damaged.
st ripe reader |* Errors are reduced as there is | » Doesn’t work at a distance.
no manual input.
: ¢ More secure than contactless as | * Ensure PIN isn’t read by * ATM cards.
Chlp and PIN must be typed. somebody else while typing.
PIN reader |+ More robust system than
magnetic stripe.
ContaCtleSS * Faster transaction than other * More expensive than normal e ATM cards.
payment methods. card.
card reader ¢ The card may be read
accidentally.
* Take more accurate readings ¢ Can give false results. * Temperature sensor.
Sensors than humans.

(%] CamScanner
Monitors Advantages Disadvantages Uses
CR’I‘ o Least expensive monitor to buy. | ¢ Heavyweight devices. ¢ Allow designs to be
e They allow the use of light * Have large footprint. created on screen with
pens. ¢ Consume more power. light pens.
Y * Lighter than CRT. * More expensive to buy than * Mobile phones. tablets
LCD /TFT e Less power consumption than CRT. and laptops use LCD
CRT. * Narrower angle of viewing screens.
e Sharper image than CRT. compared to CRT.
* Thinner and Lighter. * More expansive.
LED * Less power consumption.
* Run cooler.
o Sharper image.

Printers Advantages Disadvantages Uses


Lasel‘ ¢ Higher printing quality. e Higher initial cost. ¢ produce 500 high-quality
¢ Higher printing speed. flyers.

Illkj et ¢ Low initial cost. * High running cost. * Printing photographs.


¢ High printing quality. ¢ Can’t do large print jobs. ¢ colored high-quality
photo.
¥ = ¢ Best printer to work in dusty * Low printing speed. * produce a shop receipt.
Dot-matrix environment. e Low quality printing.
¢ Very cheap to run and * Very noisy.
maintain.

3D * Easier to produce customized | ® High initial cost. * produce a customized


items. e Can be used to produce solid object.
¢ Medical benefit. dangerous items. * Surgical equipment.

Other output| Advantages Disadvantages Uses


devices
Plotter e Large output can be produced. | ® Very high initial cost. * Producing architectural
¢ Very high-quality printing. ¢ Very slow at printing. drawings.

: ¢ Enables many people to see a | ® Expensive to buy. ¢ Home cinema system.


PI'OJ ector presentation. e Difficult to set up. e For presentation.
* Avoids the need for several
networked computers.
Spe akers * Very simple technology. e Can have large footprint. e Used in all phones

Actuators ¢ They allow remote operation | ¢ Could go wrong. e Controlling robot arm.
of many devices.

(%] CamScanner
Magnetic Advantages Disadvantages Uses
media/storage
devices
Fixed
5
.
hard
o
* Large storage capacity.
* Fast data transfer rate.
* Noisy when compared to SSD.
* Have many moving parts
| * To store the operating
system.
dlSk drlve * Fast data access time. ““affect their reliability ™. * To store system software.

(HDD)
* Large storage capacity. ® Data transfer rate is not as fast | ®* To store backups.
Por:table .hard * Fast data transfer rate. as HDD. _ * To transfer data between
dlSk dnve e Fast data access time. * Have many moving parts. computers.

- * Huge storage capacity. * Very slow data access time. * To store backups.
Magne‘?lc * Fast data transfer rate. * They are affected by magnetic
tape drive |+ Cheaper per unit memory field.
than HDD.

Solid state Advantages Disadvantages Uses


media/storage
devices
SSD * Faster data transfer than * More expensive per unit * To store the operating
HDD. memory. system.
* Faster data access time than | ®* HDD has greater longevity * To store system software
HDD. than SSD. and working files.
* [ ess power consumption
than HDD.
* Run quieter and lighter than
HDD.
P en * Very portable. e Easy to lose. * To store backups.
®* Not affected by magnetic * [ ower storage capacity than ® File transfer between
driv e/Memory field. HDD. different computers.
. * More expensive per unit
stick memory than HDD.

Memory
.
cards ® -ciamiy —_
* Small and can be easily used. | * Lower storage capacity than
i
* To store photos on digital

* More expensive per unit * To store backups.


memory HDD.

Optical Advantages Disadvantages Uses


media/storage
devices
_ * Less expensive than HDD. * Data transfer rate is slower e CD: to store music and
CD/DVD than HDD. software.
ROM ® Data access time is slower than | ®* DVD: to store movies.
HDD.
= * Cheaper than RW disks. * Not all CD/DVD drives can * File transfer between
CD /DVD R * Once burned they behave read them. different computers.
like ROM. e Archiving of data.
_ * Can be written over many * More expensive than ROM and | * To store data and
CD/DVD times. R formats. backups.
RW ® Files/data can be added ata | *® It can overwrite data * File transfer between
later stage. accidentally. different computers.
A e Can read and write data at * More expensive than other * To store backups.
DVD RAM the same time. CDs/DVDs. * File transfer between
different computers.

Blu_ray * Greater storage capacity. * Most expensive optical device. | ®* To store HD movies and
* Faster data access time than games.
others. * To store backups.
* Faster data transfer rate than * File transfer between
others. different computers.

(%] CamScanner
Validation check Description Example
Checks if data is present and hasn’t A person’s ID may be required.
Pl'esence CheCk been left blank. If no data entered. an error message will be
produced.

Lookup check Checks if value entered 1s available 1n a


limited list of items.
When registering a course in IGSES, the session
must be either June, Nov or Jan. no other entry
should be accepted.

To check if a student’s age 1s <18 and >0.


Range check * Checks whether numeric data is
within given values.
* Uses 2 boundaries.

* Checks whether numeric data is To check if a student’s age 1s <18.


Limit check within given values.
* Uses 1 boundary only.

Length check Checks if the input data contains the


required number of characters.
If a field needs 6 digits, then inputting 5 digits
should case an error message.
Checks that the mput data has
Type check appropriate data type.
A person’s age should be numeric integer not
alphanumeric.
Checks the data is in a specific format A date should be in the form of dd/'mm/vyyv.
Format check or fixed pattern.
It checks that a string of characters A name should not contain characters such as %.
Character check doesn’t contain any invalid characters
or symbols.

Check digit A validation check used 1n barcodes to


validate the correctness of the barcode.
Validating the correctness of a barcode.

Types of Definition Advantages Disadvantages


networks
Network that uses cables and
LAN "local covers small geographic
area network" area.

WLAN Network that uses wireless


communication to connect
¢ Reduces cost of cables.
Safer as users won't trip
¢ Less secure.
¢ The data transfer rate is
" Wireless local between devices in small over wires. slower than in LAN.
" geographic area. * Easier to connect other * Physical obstacles can affect
area network devices to the network. the signal.
e Network that covers large
WAN WId € geographic area.
area network"
Similarities Differences
Bluetooth & Wi-Fi Bluetooth & Wi-Fi
Both use wireless communication Wi-Fi has faster data transfer rate than Bluetooth
Both use radio waves for communication Wi-Fi has greater range of transmission than Bluetooth
Both allow several devices to be connected Wi-Fi connects more devices than Bluetooth

Both use security when sending data Bluetooth is simpler to use and setup
Cost of Bluetooth is cheaper than Wi-Fi

(%] CamScanner
Network devices Function
¢ Allows a computer to be connected to a network.
Network interface ¢ Connects the MAC address of the computer.
card "NIC"
¢ Connects number of devices to form a network.
Hub * Broadcasts incoming data packets to every computer in the network.

¢ Connects number of devices to form a network.


Switch ¢ Sends the data packets to the destination computer only.

Bridge ¢ Connects one LAN to another LAN that uses the same protocol.
e Used to connect different parts of a LAN so that they can function as a single LAN.

RO uter ¢ Connecting networks and devices to the internet.


¢ Storing computer addresses.
¢ Routing data packets.

Firewall o Blocks traffic that doesn't meet the criteria.


¢ Warns and prevents unauthorized access to the system.
¢ Can prevent viruses being transmitted.

¢ Monitors internet usage.


Internet service * Gives uses an IP address.
provider "ISP" * Provides security services.

* Data packets are sent to the switch/hub and then passed to router.
IP address * Router inspects the IP address of the data packets sent to it.
"Internet protocol" » Router looks up the paths to get to that address using its routing table.
» Router then checks how busy the oaths are and identities the quickest path.
¢ Router is then able to route the data packets to reach the correct switch/hub.
¢ Switch/Hub sends the data packets to the destination computer.

Similarities Differences
Hub & Switch Hub & Switch
Both are used to connect devices to form a LAN. Security is lower in hubs.
Both use data packets. Switch uses MAC addresses to locate the destination of the device.
Both check/read the data packets. In a hub a data packet is sent to every device on the LAN.

Similarities Differences
Internet & Intranet Internet & Intranet
Both are networks. Internet public access.
Both are communication systems. Internet less secure.
Both use HTML to write the web pages. Internet wider range of resources.
Both use internet technologies. Internet information is less relevant/reliable.

(%] CamScanner
Website Definition
A web document written in HTML.
Webpage Features that can be inserted: text, image, videos & sound.
WebSit e It 1s a collection of webpages related together using hyperlinks.

. Word/phrase/image when clicked links to another website or another portion in the


Hyperllnk same webpage.

Hypertext markup A mark-up language used to create webpages uses tags to format content.
language "HTML"'
s Information space that consists of massive collection of web pages all connected
WOl'ld WIde web together using hyperlinks, WWW is only part of the internet that can be accessed by
uwww " web browser.

Webserver Comput erns webpages, it has an IP address and a domain name.


that contai

A program that allows a user to view webpages.


Web browser Function: translates HTML. provides an address bar, provides navigation tools. records
user history & allows the use of multiple tabs.
A unique address for a resource located on the internet, the user-friendly version of the
Uniform resource IP address. http://www.cie.org uk/gcseict/giraffe html
" "
locator "URL protoc ol:nfl: =
domain type: org
country code: uk
path: gcseict
filename: giraffe html

Protocol Definition Uses


A set of rules agreed by the sender and
Protocol the recipient when data is transferred
between devices.
The main protocol that controls the * Accessing the WWW.
HyperteXt transmission of data to and from ¢ Transferring contents of a webpage to a
transfer protocol | webservers. gemom- e
"HTTP" ¢ Downloading from webserver.

Protocol used to control the transmission


HyperteXt of data to and from webservers but with
transfer protocol | encryption uses SSL.
a P Encryption: the process of scrambling
secure "HTTPS'" | characters of a message so that message
becomes meaningless to unauthorized
users, plain text is encryptedto cypher
text using an encryption algorithm and an
encryption key. cypher text is decrypted
back to plain text using decryption key.
A security protocol that uses encryption | ® Online banking.
Secu re SOCket to allow data to be exchanged securely ¢ Online shopping.
layer " SSL " between two devices over the internet. * Sending and receiving emails.
* Using cloud storage facilities.
Protocol used to transfer files from one * Transferring files.
File trflESfer = ;omputct to another over the internet. * Downloading from file servers.
teps:
pl‘OtGCOl FTP Download the FTP client program,
connect to the FTP server using the FTP
client program_ loginto the server using
FTP username and password, locate the
files on your computer, click upload
button on FTP client program and upload
the files to the folder.
. A set of rules that enables people to use e Video conferences.
Voice over the internetto make phone calls. g s——
internet protocol
'!VOIP "

(%] CamScanner
Security threats Definition Possible effects How to identify How to protect
Program that replicates itself. * Delete files. « Deletion of files without user's » Use up to date antivirus software.
Virus consent,
* Causes a computer to become |+ Don't use software from unknown
unresponsive. * Computer becomes sources.
o Causes software errors. unresponsive. o Scan email attachments.
* Random reboots. | & Use a firewall.
* Software errors.

Software that records the key presses


Spyware "key on the user's keyboard, this data is then
» Gives the originator the access
to all data entered by the user's
» Use up to date anti-spyware software.
| » Use pointing device instead of typing.
logging software" sent to the originator of the software. keyboards including sensitive
data.
| » Use a firewall.

Hacking -The process of gaining unauthorized


access {0 a computer system.
» Misuse of personal information.
* Data can be changed.
T- Use of firewalls.
* Use strong passwords.
* Data can be copied from a | # Use biometrics.
system.
* Data can be deleted.

The creator sends out a legitimate


Phishing looking email that contains a link when
» The creator of the email can
gain sensitive data.
+ Spelling or grammar mistakes in o Use spam filters,
text. |+ Don't click links from unknown
clicked it opens a fake website * Credit card fraud. * Email urges you for a quick sources.
designed to obtain sensitive data. reply. | # Never reveal personal details.
* Asking for personal details. * Report any suspicious activity.
The creator sends SMS to the user's
Smishing phone that contains a telephone number
¢ The creator of the SMS can gain * Spelling or grammar mistakes in | » Ignore text messages from numbers you
sensitive data. text. don't recognize.
to call or contains a link when clicked ¢ Credit card fraud. * Asking for personal details. * Report any smishing attempts.
it opens a fake website to obtain * SMS from unknown source. | ® Never click on links in text messages
sensitive data. * SMS sent at an unusual time. from unexpected people.

Vishing A voicemail message is used to trick


the user into calling the telephone
* Creator of vishing scam can
gain sensitive data.
o Asking for personal details.
+ Voicemail from unknown
| » Never reveal personal details over the
mobile phone.
number contained in the message, the ¢ Credit card fraud. telephone number. | » Ignore voicemail from unknown
user will be asked to supply personal * Voicemail has generic greetings. number.
data thinking they are talking to | » Report any vishing attempts.
somebody who works for a legitimate
company.

Pharming A malicious code is installed on the * The creator of the malicious * Website's URL is incorrect. '+ Check the spelling of URL of the
user’s computer that redirects the user code can gain sensitive data. * If webpage is requesting personal | Website.
to a fake website designed to obtain o Credit card fraud. information and its URL starts | ® Checking that the URL contains https
sensitive data. with http instead of hitps or a locked padlock sign next it.
|* Usinguptodate anti-malware
software.
The illegal use of a credit or d;)il cardt_‘ * Card cloning.
(Eard _fl'aud * Shoulder surfing when vsing the
card.
* Key logging software.
* Phishing/smishing/
vishing/pharming.

Shoulder surfing A form of data theft where criminals


steal card data from a victim when
* Somebody watching you typing |« When using ATMs, shield the keyboard
the card PIN by looking over with your other hand.
using it. your shoulder, | * When using a mobile device, never key
» Somebody listening in when you in data in a public place.
are giving credit or debit card | » Don’t speak card details into your
details over the phone. | smartphone in a public place.

Card cloning The copying of a credit or debit card


which uses a magnetic stripe, cloning
| » Use chip & PIN card instead of
magnetic stripe cards.
needs an electronic device known as a | * Do regular checks on your spendings
skimmer, skimmers can be placed in and check for any unusual activity with
ATM slots where they can read all data the bank.
from a card and then copying the data
to a fake card.

Junk email sent to large number of


Spam people, can be used for advertising.
» Can be used for spreading
malware.
* Incorrect grammar or spelling in | * Use spam filters,
the email. | # Delete or ignore messages from
» Malware: programs installed on » Email has generic greetings. | unknown sources.
user's computer with the aim of * Absence of logos in email. | * Delete accounts that you no longer use.
deleting, corrupting or
manipulating data illegally.

(%] CamScanner
Security Definition Uses/Steps/Examples Advantages Disadvantages
measures
Authentication Refers to the ability of a user to prove who they
are, there are 3 common factors used in
Authentication methods include:
+ User IDs and passwords.
techniques authentication:
Something you know (password or PIN code)
* Biometrics.
» Zero login.
Something you have (mobile phone or tablet) 7 T .
Something which is unique to you (biometrics) : Sr:fi cl:r;s P,
» Physical tokens.
+ Electronic tokens.
¢ Two-factor authentication.
+ Digital certificates.
ID: identifier for the user. Methods to avoid password inferception:
User IDs & Password: a secret string of characters set by a user * Run up to date anti-spyware software.
Password to identify them to a computer system used as part * Change passwords on a regular basis.
of authentication system to improve security. v Use strong passwords.
Rules of strong passwords:
» At least | capital letter, | digit, | special
symbol and it should be at least 8 characters.

Systems that rely on certain unique physical Examples: » Biometrics is unique to each person. | » Slower method to enter system than
Biometrics characteristics of human beings to identify a user. * Fingerprint scans. | # Passwords can be forgotten. _ passwords.
* Retina scans. | » The user has to be present touse the | * Expensive to setup.
» Iris recognition. biometric system therefore more secure. | * Injuries to fingers can cause biometric
+ Face recognition. * Almost impossible to duplicate device to fail to recognize the user.
+ Voice recognition. biometrics.

Zero login Method of login authentication that identifies a


user by combining both biometric data and
. Behavioral pattern examples:
+ How you walk.
« Enhanced security as it is difficult to |« User's privacy can be violated as
copy biometrics and behavioral patterns. | sensitive data is being recorded.
behavioral patterns without the need to supply any * Your typing speed. | » Easy and quick way to login to a | * Hackers may gain access of the user's
other security information. * Your normal location. system. sensitive data in case of a security
+ How you swipe the screen. | breach.
|« Expensive to setup.
| |V o :
3 : Security device that stores details on a magnetic | # They are easy to use. | # No encryption is used and the stripe
Magnetlc stnpe stripe to allow entry to a building. o Not an expensive technology. contents can be copied fairly easily.
cards I + Magnetic cards can be remotely | # The cards wear out with a lot of use.
deactivated. | o Magnetic readers often fail to read the
cards on first attempt.
Smart cards Security device that uses RFID technology. the ~ Steps: . o PIN can be used to verify the ownership | Possible to hack into the data
chip on the smart card can store data such as name, 1. The owner of the card walks up to a security of the card, thus can't be used if | transmitted by the tag.
security number, gender, date of birth and a PIN. gate and presents the smart card. stolen/lost. |« Smart cards are expensive to
2. RFID readers on either side of the gate scan the | o Very fast read rate. | manufacture than magnetic stripe
security data stored on the RFID tag. » More robust and reliable compared to cards.
3. The user will then be invited to enter a PIN on magnetic stripe cards. |» Possible to jam as RFIDs use radio
the keypad. waves.
4. If all details match, then access will be allowed. |

PhySical tOkeflS ! A form of authentication that uses a hardware Steps: Security is enhanced as thief needs to |« If the token device is lost, the user will
| device that generates a one-time password (OTP), 1. The customer uses a physical token supplied by | have the token device, a cloned card and | not be allowed to access the system.
this OTP changes on a regular basis and is usvally the bank. the card's PIN.
only valid for less than a minute. 2. The customer inserts their debit card into the
top of the token device and the device either
recognizes the card as genuine or rejects it.
3. The device then asks the customer to press
"IDENTIFY" then enter their PIN.
4, A OTP is then generated and shown on the
device screen.
5, The customer goes back to their bank web page
and enters the generated OTP.
6. If correct, customer is given access to their
account.
Software installed on a user's device, such as a Steps:
Electronic smartphone that generates a OTP which valid for i The user installs the electronic token app on
their smartphone.
tokens less than one minute.
2. User opens the app when the website requests
the user to authenticate who they are.
3. The app generates a OTP which is valid for less
than one minute.
4. The vser enters this OTP when asked by the
website,
5. The website server runs the same software as
the app and will generate the same OTP.
6, Once the OTP is verified by the website, the
user will be allowed access.
A form of verification which requires two methods = Example 1:
Two-factor of authentication to verify a user, this makes it A code is sent to a device that is pre-set by the user, the
authentication harder for the hacker to access the system as it adds * system requires the user to input this code in order to
an extra level to hack. log-in.
Example 2:
The system requires the user to input log-in details from
a specific computer.

Digital An electronic document sent with an electronic


message that is used to verify the identity of the
Items in digital certificate:
* Serial number.
certificate sender, contains a unique key used by sender and
receiver that allows computers to exchange
* Public key.
+ Digital signature.
information over the internet securely. o Valid from.
* Valid to.

(%] CamScanner
Methods of researching Advantages Disadvantages
the current system
Observation * The system analyst obtains reliable data. * People may work in a different way when being watched.
* Enables the systems analyst to get a better overall view of the system. * The quality and accuracy of information is highly dependent on the skill of the
* Inexpensive method. observer.

' * More likely to get reliable data. * Time consuming to complete all the interviews.
Interviews + Allow lots of very detailed information to be gathered. » Expensive method due to system’s analyst time.
» Flexible as the systems analyst can change script to suit circumstances. » Interviewees may not be available at times to suit the analyst.
Questionnaires « Faster to complete all questionnaires. The questions are inflexible since they have to be general.
» Ttis a relatively inexpensive method. * Users tend to exaggerate their answers as they are anonymous.
* Individvals can remain anonymous. * As it's anonymous people may not take it seriously.
* Individuals can fill it in their own time.
# This method allows information to be obtained which wasn't » Time consuming to go through the documents.
EXflm]flatlon Df eXlstmg » possible by any of the other methods. » Expensive method as it is time consuming.
documents * Can see the scale of the problem easily.
| » Saves time as there could be copies of previous analysis.

Systems analyst Importance Examples Advantages


Identify
ifv
inputs,
1
processing
. 1
|*¢ Helps
(5% the2%systems analyst to understand how the

and outputs of the current |* Tobe able to identify the input/output devices that are
needed for the new system.
system » To be able to identify the processing devices that are
needed for the new system.
¢ To be able fo identify the storage space that are
needed for new system.
: 2 + To meet all the needs of the customer.
User afld. l“fflrmatlfln * More efficiem_syslem is produced that does what the
requirements customer requires.
+ Reducing the costs if the new system matches the
existing hardware and software.
Input devices:
Identifyv hardware
. for . the new e N
Sy stem * Scanners.
» Touchscreen.
Output devices:
* 3D printer.
¢ Large monitors.
* Speakers.

| Identify software for the new + Operating system.


» Off the shelf software.
Off the shelf software:
¢ Cheaper to purchase as there are no development costs.
system ¢ Minimum training will be required.
+ Saves development time so can be used sooner.
» More reliable as the any errors will have been tested.
» More support as it has huge user-base.
Bespoke software:
+ Software 1s specially designed for the sports club so that it
meets their needs.
¢ Uses less memory as software only has the features needed
by the company.
¢ Easier to use as less functions in the software,
¢ Customized support from the systems analyst.
¢ Can be changed whenever the company needs a change.

Need for testing |+ To make sure that the database used in the system is robust (finalized and fully tested)when the system goes live.
| * To make sure that the correct data is stored in files by fully testing validation routines used, by making sure any data transferred from a paper-based system to an electronic
system has been done accurately.
| » To ensure the user screens are user friendly and that the correct output is associated with the inputs to the system.

" Testing the data structures.


Testlllg deSlgllS o Testing the file structures.
Aspects * Testing the input methods.
* Testing the output formats.
* Testing the validation rules.

Testing strategies » Testing each module separately.


« Testing each function in the module separately.
(for each aspect) o Testing the whole system (after integrating all modules together).

= B A list of all the tests to be performed.


TEStlBg p lan (ffll‘ « Identifying what data is to be tested.
each m(}dllle) | Identifying what type of test data to be used.
| » Identifying live data to be used.
o Identifying the expected outcomes from the testing.
| » Checking that actual outcomes match the expected ones.
Normal: This is data that is acceptable.
Testing data Abnormal: This is data outside the limits of acceptability.
Extreme: This is data at the limits of acceptability and should be accepted.
Live: This is actual data with known outcomes.

(%] CamScanner
Implementation Definition Advantages Disadvantages Situation where method
mightbe used
The new system runs
Parallel running alongside the old system for a
+ If the new system fails, the old
system will still be
+ Expensive as extra staff is needed to
run both systems together.
* An organization with large amounts of data
which cannot afford to lose data.
time before + available as a backup. » Time consuming as data needs to be * An organization where the new system
the new system takes over # It is possible to gradually train entered into two systemns. needs to be fully tested.
completely. workers on the new
* System.
Replacing the old system with
Direct changeover the new system immediately.
Costs are less than parallel
running as less workers are
* This method can be disastrous if the
new system fails since the old the
* A small organization which can afford to
lose data.
needed. system is no longer * A small organization where system needs to
¢ The benefits of the new system * Available. be up and running very quickly.
are immediate.
* Saves time of implementing the
new systen.
New system is introduced part | If the new system fails, then * More expensive than direct changeover * An organization where there are clearly
Phased by part. most of the old system still in since it is necessary to evaluate each defined separate processes.
place. phase before * An organization where the new system
* Possible to ensure that the new * moving to the next stage. needs to be fully tested.
system works properly before * Very time consuming since each part
proceeding. needs to be fully evaluated before
proceeding.
‘Whole system is introduced in | » If the new system fails, only one * Takes time to implement the new * An organization where there are several
Pilot running one branch at a time. branch is affected. system for all branches in the branches all doing the same work.
* Possible to train staff in one area company. * An organization where the new system
only, which is faster and less needs to be fully tested.
costly than parallel running.

Documentation _I;urpose This can consist of any of the following


Learn how to use a system, overcome errors in a | » Purpose of the system.
User documentation system. | » Limitations of the system.
| * Hardware and software requirements.
| * Sample runs.
| * Input format.
| » Output format.
' » How to load/install/ran the software.
» How to use the system.
| » How to save file,
| » How to print data.
» How to delete/edit records.
To help programmers and systems analysts to | * Purpose of the system.
Technical documentation make improvements to the system, repair the | * Limitations of the system.
system, and maintain the system. | » Hardware and software requirements.
| » Sample runs.
| » Input format.
| * Output format.
* Program listing.
| * Program algorithm.
* Program coding.
| » File structures.
* Validation routines.

(%] CamScanner
Effects of Definition Uses Positive effects Negative effects Security issues | How fo protect
Microprocessor- against security
controlled devices issues
(smart devices)
i
Lifestyle, leisure time +e
They reduce the needv forpeopletodo |+ They
o can lead o
to urhealthy lifesyles
ey if the
and physical fitness (s m———— Ty tend o maepopleey e
(in home) el ¥ |+ Lacko exriv il e bocoming e .
* They give people more time for leisure * Potential
loss of household skills.
activities, bobbies, shopping and socialzing. | » There is the rek of cybersecuriy
threats as
* Coolkcers can be switched on whilst we are | infernet can be used in smart devices.
out o that we amrive home to 2 cooked meal. » Possible health issuss from the devices, e
* Automated burglar alarms give people a microwave leakage.
sense of secunity.
* Smart fridges can be used to improve
healthy lifsstyle
Social interactions + SN
Easierto make e new friends using chat | » ormiecp
Social isolatio do not meet face.to-
(in home) + Easierto find people who share similar | » A lack of socia interaction may make people
interests. ‘more anxious of meeting people in real life.
o Less expensive o keep in touch using VoIP | Paople behave differently when interacting
technology. ouline (they can be ruder or more aggressive).
s Cyberbullying.

Security of data s be installed to o + e


* Malw Use different password
for

(in home) * with


Hackerssmartcandevices
commuicste remotely | * which
in your home.
Instel often
softwarecontain
updaes,
new
* Hackers can gain personal data about | security features.
you
* by backing into a central-heating
controller,it is possible for a hacker
to gain credit card information.
’ » Monitoring Centrolling |+ Controlling of trffic
will reduce traffic jams |» A hacker could gain access to the computerized
contr omng tl’anspfl“ of traffic oEnmnima}x and minimize everyone's )onr“::) time. a2 system and umm
+ Congestion zone + Transport systems are more efficient (as | If the computer system fails, then the whole
monitoring. more transport vehicles can use the transport | transport system could be broughtto 2
+ Automatic number » network, allowing for more regular + Standstill
recogaition (ANPR). | services). + Poorly designed systems could compromise
+ Automatic control of | » Traffic offences can be automatically safety.
traffic lights. penalized using ANPR. + ANPR systems mean that innocent people’s
+ Airtraffic control » Stolen cars and criminals can be spotted movements
can easily be tracked whic violates
systems. using ANPR. privacy.
. 1zed conirol systems mmimi
R
m‘ .

Vehicles that rely on sensars, + Safer because human eror is removed, » Very expensive
system to set up.
Autonomous cameras, mucroprocessor and leadmgto fewer accidents. + Possibility
of hacking into the vehicle's control
(Driverless) vehicles | Movement,
actuorsto contl it
Microprocessors
* will
Betterfor the envirorment
operate more
because vehicles | - systen.
efficiently. + Software glitches could lead to potential
process the data received from » Can reduce traffic congestion. disasters.
cameras and sensors and send + Tncreased lane capacity (due to betier + Cameras need to be kept clean so that they do
siguals to ) braking and acceleration responses together | mot give false result,
actuators to perform physical with » Sensors could fail to fumetion in heavy snowfall
actions. » opfitized distance between vehicles). or blizzard conditions.
+ Can reduce travel time. + Reduction in the need for taxis could lead to
o Can self-park 5o it reduces the time to find 2 | unemployment.
parking spot. + Driver and passenger reluctance of the new
technology.

(%] CamScanner
Effects of ICT on health Caused by Ways of minimizing the health risk
» Staring at a computer screen for a long time.
Eyestrain / Headache ¢ Having incorrect lighting in the room.
* Take regular breaks.
* Make use of anti-glare screen.
* Sitting to close to a screen. ¢ Use flat screens (TFT/LCD/LED) to reduce the flicker.
¢ Using dirty screens. ¢ Improve the lighting in the room to match the brightness of the screen.
¢ Using flickering screens (CRT). * Turn the brightness down on the screen.
¢ Keep the screen clear of dust and dirt.
* Test eyesight regularly.

Back and neck problems + Sitting in front of a computer screen for long time in the same
position.
¢ Take regular breaks.
« Sit with the correct posture.
« Sitting in front of a computer for a long time in the wrong posture. » Use ergonomic chairs to give the correct posture.
* Do back and neck exercises.
« Use foot rests to improve posture.
» Use monitors that can tilt to reduce neck problems.

Repetitive Strain Injury (RSI) |** Constant tping on keyboard. ¢ Take regular breaks.
Holing a mouse with repetitive clicking on buttons. * Use an ergonomic keyboard/mouse.
o Use a wrist rest.
* Use a mouse rest.
¢ Exercise the hand and fingers.
¢ Use voice-activated software.

Effects of ICT on physical safety Caused by Ways of protection


+ Touching bare wires. ¢ Check insulation on wires regularly.
Electrocution ¢ Spilling liquids near * Don’t allow liquids or drinks near
¢ electrical equipment. * Computers.
¢+ Use RCB.

Tripping and falling over trailing ¢ Presence of many trailing


* Cables.
* Use cable ducts to make the wires safe.
¢ Fix wires along walls and under carpets
wires * to prevent any contact between
* people and wires.
¢ Use wireless connections wherever
+ Possible.

Heavy equq?me'nt'
H
falling
:
and 7 o S
¢ Placing devices near the
i
¢ Use strong desks and tables to support

CallSH]g l[l]lll‘y # Placing heavy equipment # Place devices in the middle of a table.
* on weak tables or shelves. o Use large and sturdy desks.

Fire l'iSk * Overloading of * Have a fully tested CO?2 fire estinguisher


* Powersockets. * Nearby.
¢ Overheating of equipment. ¢ Don't overload sockets with too many
* Plugs.
« Don’t cover equipment.
« Use a cooling system.

(%] CamScanner

You might also like