ICT Theory (1)
ICT Theory (1)
Used to enter data or instructions into a computer Used to show the computer’s output in a form that is
directly. understood by a human.
Can send data to another device. but it can’t receive Can receive data from another device, but it can’t send
data from another device. data to another device.
Under
the control of the user or can be direct data Under the control of the computer.
entry.
More complex. Less complex.
RAM ROM
Volatile memory. Non-volatile memory.
Temporary memory device. Permanent memory device.
Can be written to and read from. Can only be read from but not written to.
Store data. programs or parts of the operating
system Stores the startup instructions when the computer is
that are currently in use. first switched
on.
Tends to have greater storage capacity. Lower storage capacity
Tablets * Very fast to switch on. * Have less storage capacity than laptops
* Have better battery life than laptops. and Pcs.
* Less heat 1s generated. * Expensive when compared to laptops.
CamScanner
Pointing Advantages Disadvantages Uses
devices “input"
* Doesn’t need a large desk area * Difficult to use if no flat surface * Moving and deleting files.
Mouse when compared to keyboard. readily available. * Controlling the position
» Faster way to choose an option » Difficult to use for people with of a pointer on the screen.
compared to keyboard. restricted hand movement.
* Needs less desk space than a e Needs training as it’s not * In some luxury cars to
Tracker ball mouse. standard equipment. select functions.
Easier to use than a mouse. * More expansive.
Rem ote * Operate devices from distance. | * Objects between the device and |« TV.
* Useful for people with walking | the remote control can prevent
control difficulties. its operation.
e Hard
to use if the user
has
disability in hand movement.
JO Stick e Control is more realistic than |« More difficult to control a « In video games.
y using a mouse. pointer using a joystick than * Flight simulators.
* Easier than keyboard to other pointing devices.
navigate the screen.
. Its faster to read text than to e Use up a lot of computer ¢ To input speech in
Microphone Sk memory. presentations.
Gra hic * More accurate in drawing than | ¢« More expensive than other e To input freehand
p using pointing devices. pointing devices. drawing.
tablet
Dicital * The image can be immediately | * Images often need to be * Taking pictures.
gl seen on the screen. compressed to reduce amount
camera of memory used.
* Allows image to be stored for | e Can be slow. ¢ Scan in documents and
Scanner further editing. convert them into a digital
format.
(%] CamScanner
Direct data Advantages Disadvantages Uses
entry (DDE)
Onptical * Faster data entry system than | ® Device has difficulty in reading | ® Processing of passport and
P manually typing data. handwriting. identity cards.
character * Errors are reduced as thereis | « Not a very accurate technique
d no manual input. to read text.
reaaer
(OCR)
Optic a] * Very fast way of inputting data. | ¢ If the marks don’t fill the space | ®* Multiple choice
* More accurate than keying in completely they may not be examination papers.
mark reade[‘ the data. read correctly. * School registers.
* More accurate than OCR. e If the marks are not dark
(OMR) enough they may not be read
correctly.
* Much faster than keying in data | « More expensive system than ¢ In supermarket.
Barcode manually. using keyboards. e libraries.
['eader ¢ Errors are reduced as there is « Barcodes can be more easily
no manual input. damaged compared to RFID.
chips and magnetic stripes.
Qlli Ck ¢ Can hold more data than ¢ Cam be used to transmit * Giving automatic access
traditional barcodes. malicious codes. to a website.
re spon Se * Faster and easier to scan. ¢ More than one QR format is
( QR) available.
Radio * Can store more data than ¢ Can hack into the data by the | ¢ Contactless payment.
barcode. fag. * (tag: contain Microchip
frequency * Allows greater security than « Initial cost is more expensive to store & transmit data
. . . barcode. than barcode. and Antenna to receive &
identification . Very fast read rate. « Tag collision may occur. transmit data)
(RFID)
: ¢ Much faster than keying in data | ¢ Data will be lost if its * ATM cards.
Magnetlc manually. damaged.
st ripe reader |* Errors are reduced as there is | » Doesn’t work at a distance.
no manual input.
: ¢ More secure than contactless as | * Ensure PIN isn’t read by * ATM cards.
Chlp and PIN must be typed. somebody else while typing.
PIN reader |+ More robust system than
magnetic stripe.
ContaCtleSS * Faster transaction than other * More expensive than normal e ATM cards.
payment methods. card.
card reader ¢ The card may be read
accidentally.
* Take more accurate readings ¢ Can give false results. * Temperature sensor.
Sensors than humans.
(%] CamScanner
Monitors Advantages Disadvantages Uses
CR’I‘ o Least expensive monitor to buy. | ¢ Heavyweight devices. ¢ Allow designs to be
e They allow the use of light * Have large footprint. created on screen with
pens. ¢ Consume more power. light pens.
Y * Lighter than CRT. * More expensive to buy than * Mobile phones. tablets
LCD /TFT e Less power consumption than CRT. and laptops use LCD
CRT. * Narrower angle of viewing screens.
e Sharper image than CRT. compared to CRT.
* Thinner and Lighter. * More expansive.
LED * Less power consumption.
* Run cooler.
o Sharper image.
Actuators ¢ They allow remote operation | ¢ Could go wrong. e Controlling robot arm.
of many devices.
(%] CamScanner
Magnetic Advantages Disadvantages Uses
media/storage
devices
Fixed
5
.
hard
o
* Large storage capacity.
* Fast data transfer rate.
* Noisy when compared to SSD.
* Have many moving parts
| * To store the operating
system.
dlSk drlve * Fast data access time. ““affect their reliability ™. * To store system software.
(HDD)
* Large storage capacity. ® Data transfer rate is not as fast | ®* To store backups.
Por:table .hard * Fast data transfer rate. as HDD. _ * To transfer data between
dlSk dnve e Fast data access time. * Have many moving parts. computers.
- * Huge storage capacity. * Very slow data access time. * To store backups.
Magne‘?lc * Fast data transfer rate. * They are affected by magnetic
tape drive |+ Cheaper per unit memory field.
than HDD.
Memory
.
cards ® -ciamiy —_
* Small and can be easily used. | * Lower storage capacity than
i
* To store photos on digital
Blu_ray * Greater storage capacity. * Most expensive optical device. | ®* To store HD movies and
* Faster data access time than games.
others. * To store backups.
* Faster data transfer rate than * File transfer between
others. different computers.
(%] CamScanner
Validation check Description Example
Checks if data is present and hasn’t A person’s ID may be required.
Pl'esence CheCk been left blank. If no data entered. an error message will be
produced.
Both use security when sending data Bluetooth is simpler to use and setup
Cost of Bluetooth is cheaper than Wi-Fi
(%] CamScanner
Network devices Function
¢ Allows a computer to be connected to a network.
Network interface ¢ Connects the MAC address of the computer.
card "NIC"
¢ Connects number of devices to form a network.
Hub * Broadcasts incoming data packets to every computer in the network.
Bridge ¢ Connects one LAN to another LAN that uses the same protocol.
e Used to connect different parts of a LAN so that they can function as a single LAN.
* Data packets are sent to the switch/hub and then passed to router.
IP address * Router inspects the IP address of the data packets sent to it.
"Internet protocol" » Router looks up the paths to get to that address using its routing table.
» Router then checks how busy the oaths are and identities the quickest path.
¢ Router is then able to route the data packets to reach the correct switch/hub.
¢ Switch/Hub sends the data packets to the destination computer.
Similarities Differences
Hub & Switch Hub & Switch
Both are used to connect devices to form a LAN. Security is lower in hubs.
Both use data packets. Switch uses MAC addresses to locate the destination of the device.
Both check/read the data packets. In a hub a data packet is sent to every device on the LAN.
Similarities Differences
Internet & Intranet Internet & Intranet
Both are networks. Internet public access.
Both are communication systems. Internet less secure.
Both use HTML to write the web pages. Internet wider range of resources.
Both use internet technologies. Internet information is less relevant/reliable.
(%] CamScanner
Website Definition
A web document written in HTML.
Webpage Features that can be inserted: text, image, videos & sound.
WebSit e It 1s a collection of webpages related together using hyperlinks.
Hypertext markup A mark-up language used to create webpages uses tags to format content.
language "HTML"'
s Information space that consists of massive collection of web pages all connected
WOl'ld WIde web together using hyperlinks, WWW is only part of the internet that can be accessed by
uwww " web browser.
(%] CamScanner
Security threats Definition Possible effects How to identify How to protect
Program that replicates itself. * Delete files. « Deletion of files without user's » Use up to date antivirus software.
Virus consent,
* Causes a computer to become |+ Don't use software from unknown
unresponsive. * Computer becomes sources.
o Causes software errors. unresponsive. o Scan email attachments.
* Random reboots. | & Use a firewall.
* Software errors.
Pharming A malicious code is installed on the * The creator of the malicious * Website's URL is incorrect. '+ Check the spelling of URL of the
user’s computer that redirects the user code can gain sensitive data. * If webpage is requesting personal | Website.
to a fake website designed to obtain o Credit card fraud. information and its URL starts | ® Checking that the URL contains https
sensitive data. with http instead of hitps or a locked padlock sign next it.
|* Usinguptodate anti-malware
software.
The illegal use of a credit or d;)il cardt_‘ * Card cloning.
(Eard _fl'aud * Shoulder surfing when vsing the
card.
* Key logging software.
* Phishing/smishing/
vishing/pharming.
(%] CamScanner
Security Definition Uses/Steps/Examples Advantages Disadvantages
measures
Authentication Refers to the ability of a user to prove who they
are, there are 3 common factors used in
Authentication methods include:
+ User IDs and passwords.
techniques authentication:
Something you know (password or PIN code)
* Biometrics.
» Zero login.
Something you have (mobile phone or tablet) 7 T .
Something which is unique to you (biometrics) : Sr:fi cl:r;s P,
» Physical tokens.
+ Electronic tokens.
¢ Two-factor authentication.
+ Digital certificates.
ID: identifier for the user. Methods to avoid password inferception:
User IDs & Password: a secret string of characters set by a user * Run up to date anti-spyware software.
Password to identify them to a computer system used as part * Change passwords on a regular basis.
of authentication system to improve security. v Use strong passwords.
Rules of strong passwords:
» At least | capital letter, | digit, | special
symbol and it should be at least 8 characters.
Systems that rely on certain unique physical Examples: » Biometrics is unique to each person. | » Slower method to enter system than
Biometrics characteristics of human beings to identify a user. * Fingerprint scans. | # Passwords can be forgotten. _ passwords.
* Retina scans. | » The user has to be present touse the | * Expensive to setup.
» Iris recognition. biometric system therefore more secure. | * Injuries to fingers can cause biometric
+ Face recognition. * Almost impossible to duplicate device to fail to recognize the user.
+ Voice recognition. biometrics.
PhySical tOkeflS ! A form of authentication that uses a hardware Steps: Security is enhanced as thief needs to |« If the token device is lost, the user will
| device that generates a one-time password (OTP), 1. The customer uses a physical token supplied by | have the token device, a cloned card and | not be allowed to access the system.
this OTP changes on a regular basis and is usvally the bank. the card's PIN.
only valid for less than a minute. 2. The customer inserts their debit card into the
top of the token device and the device either
recognizes the card as genuine or rejects it.
3. The device then asks the customer to press
"IDENTIFY" then enter their PIN.
4, A OTP is then generated and shown on the
device screen.
5, The customer goes back to their bank web page
and enters the generated OTP.
6. If correct, customer is given access to their
account.
Software installed on a user's device, such as a Steps:
Electronic smartphone that generates a OTP which valid for i The user installs the electronic token app on
their smartphone.
tokens less than one minute.
2. User opens the app when the website requests
the user to authenticate who they are.
3. The app generates a OTP which is valid for less
than one minute.
4. The vser enters this OTP when asked by the
website,
5. The website server runs the same software as
the app and will generate the same OTP.
6, Once the OTP is verified by the website, the
user will be allowed access.
A form of verification which requires two methods = Example 1:
Two-factor of authentication to verify a user, this makes it A code is sent to a device that is pre-set by the user, the
authentication harder for the hacker to access the system as it adds * system requires the user to input this code in order to
an extra level to hack. log-in.
Example 2:
The system requires the user to input log-in details from
a specific computer.
(%] CamScanner
Methods of researching Advantages Disadvantages
the current system
Observation * The system analyst obtains reliable data. * People may work in a different way when being watched.
* Enables the systems analyst to get a better overall view of the system. * The quality and accuracy of information is highly dependent on the skill of the
* Inexpensive method. observer.
' * More likely to get reliable data. * Time consuming to complete all the interviews.
Interviews + Allow lots of very detailed information to be gathered. » Expensive method due to system’s analyst time.
» Flexible as the systems analyst can change script to suit circumstances. » Interviewees may not be available at times to suit the analyst.
Questionnaires « Faster to complete all questionnaires. The questions are inflexible since they have to be general.
» Ttis a relatively inexpensive method. * Users tend to exaggerate their answers as they are anonymous.
* Individvals can remain anonymous. * As it's anonymous people may not take it seriously.
* Individuals can fill it in their own time.
# This method allows information to be obtained which wasn't » Time consuming to go through the documents.
EXflm]flatlon Df eXlstmg » possible by any of the other methods. » Expensive method as it is time consuming.
documents * Can see the scale of the problem easily.
| » Saves time as there could be copies of previous analysis.
and outputs of the current |* Tobe able to identify the input/output devices that are
needed for the new system.
system » To be able to identify the processing devices that are
needed for the new system.
¢ To be able fo identify the storage space that are
needed for new system.
: 2 + To meet all the needs of the customer.
User afld. l“fflrmatlfln * More efficiem_syslem is produced that does what the
requirements customer requires.
+ Reducing the costs if the new system matches the
existing hardware and software.
Input devices:
Identifyv hardware
. for . the new e N
Sy stem * Scanners.
» Touchscreen.
Output devices:
* 3D printer.
¢ Large monitors.
* Speakers.
Need for testing |+ To make sure that the database used in the system is robust (finalized and fully tested)when the system goes live.
| * To make sure that the correct data is stored in files by fully testing validation routines used, by making sure any data transferred from a paper-based system to an electronic
system has been done accurately.
| » To ensure the user screens are user friendly and that the correct output is associated with the inputs to the system.
(%] CamScanner
Implementation Definition Advantages Disadvantages Situation where method
mightbe used
The new system runs
Parallel running alongside the old system for a
+ If the new system fails, the old
system will still be
+ Expensive as extra staff is needed to
run both systems together.
* An organization with large amounts of data
which cannot afford to lose data.
time before + available as a backup. » Time consuming as data needs to be * An organization where the new system
the new system takes over # It is possible to gradually train entered into two systemns. needs to be fully tested.
completely. workers on the new
* System.
Replacing the old system with
Direct changeover the new system immediately.
Costs are less than parallel
running as less workers are
* This method can be disastrous if the
new system fails since the old the
* A small organization which can afford to
lose data.
needed. system is no longer * A small organization where system needs to
¢ The benefits of the new system * Available. be up and running very quickly.
are immediate.
* Saves time of implementing the
new systen.
New system is introduced part | If the new system fails, then * More expensive than direct changeover * An organization where there are clearly
Phased by part. most of the old system still in since it is necessary to evaluate each defined separate processes.
place. phase before * An organization where the new system
* Possible to ensure that the new * moving to the next stage. needs to be fully tested.
system works properly before * Very time consuming since each part
proceeding. needs to be fully evaluated before
proceeding.
‘Whole system is introduced in | » If the new system fails, only one * Takes time to implement the new * An organization where there are several
Pilot running one branch at a time. branch is affected. system for all branches in the branches all doing the same work.
* Possible to train staff in one area company. * An organization where the new system
only, which is faster and less needs to be fully tested.
costly than parallel running.
(%] CamScanner
Effects of Definition Uses Positive effects Negative effects Security issues | How fo protect
Microprocessor- against security
controlled devices issues
(smart devices)
i
Lifestyle, leisure time +e
They reduce the needv forpeopletodo |+ They
o can lead o
to urhealthy lifesyles
ey if the
and physical fitness (s m———— Ty tend o maepopleey e
(in home) el ¥ |+ Lacko exriv il e bocoming e .
* They give people more time for leisure * Potential
loss of household skills.
activities, bobbies, shopping and socialzing. | » There is the rek of cybersecuriy
threats as
* Coolkcers can be switched on whilst we are | infernet can be used in smart devices.
out o that we amrive home to 2 cooked meal. » Possible health issuss from the devices, e
* Automated burglar alarms give people a microwave leakage.
sense of secunity.
* Smart fridges can be used to improve
healthy lifsstyle
Social interactions + SN
Easierto make e new friends using chat | » ormiecp
Social isolatio do not meet face.to-
(in home) + Easierto find people who share similar | » A lack of socia interaction may make people
interests. ‘more anxious of meeting people in real life.
o Less expensive o keep in touch using VoIP | Paople behave differently when interacting
technology. ouline (they can be ruder or more aggressive).
s Cyberbullying.
Vehicles that rely on sensars, + Safer because human eror is removed, » Very expensive
system to set up.
Autonomous cameras, mucroprocessor and leadmgto fewer accidents. + Possibility
of hacking into the vehicle's control
(Driverless) vehicles | Movement,
actuorsto contl it
Microprocessors
* will
Betterfor the envirorment
operate more
because vehicles | - systen.
efficiently. + Software glitches could lead to potential
process the data received from » Can reduce traffic congestion. disasters.
cameras and sensors and send + Tncreased lane capacity (due to betier + Cameras need to be kept clean so that they do
siguals to ) braking and acceleration responses together | mot give false result,
actuators to perform physical with » Sensors could fail to fumetion in heavy snowfall
actions. » opfitized distance between vehicles). or blizzard conditions.
+ Can reduce travel time. + Reduction in the need for taxis could lead to
o Can self-park 5o it reduces the time to find 2 | unemployment.
parking spot. + Driver and passenger reluctance of the new
technology.
(%] CamScanner
Effects of ICT on health Caused by Ways of minimizing the health risk
» Staring at a computer screen for a long time.
Eyestrain / Headache ¢ Having incorrect lighting in the room.
* Take regular breaks.
* Make use of anti-glare screen.
* Sitting to close to a screen. ¢ Use flat screens (TFT/LCD/LED) to reduce the flicker.
¢ Using dirty screens. ¢ Improve the lighting in the room to match the brightness of the screen.
¢ Using flickering screens (CRT). * Turn the brightness down on the screen.
¢ Keep the screen clear of dust and dirt.
* Test eyesight regularly.
Back and neck problems + Sitting in front of a computer screen for long time in the same
position.
¢ Take regular breaks.
« Sit with the correct posture.
« Sitting in front of a computer for a long time in the wrong posture. » Use ergonomic chairs to give the correct posture.
* Do back and neck exercises.
« Use foot rests to improve posture.
» Use monitors that can tilt to reduce neck problems.
Repetitive Strain Injury (RSI) |** Constant tping on keyboard. ¢ Take regular breaks.
Holing a mouse with repetitive clicking on buttons. * Use an ergonomic keyboard/mouse.
o Use a wrist rest.
* Use a mouse rest.
¢ Exercise the hand and fingers.
¢ Use voice-activated software.
Heavy equq?me'nt'
H
falling
:
and 7 o S
¢ Placing devices near the
i
¢ Use strong desks and tables to support
CallSH]g l[l]lll‘y # Placing heavy equipment # Place devices in the middle of a table.
* on weak tables or shelves. o Use large and sturdy desks.
(%] CamScanner