Igcse 0417 Ict Elkomy Notes
Igcse 0417 Ict Elkomy Notes
1:
now :https://t.me/igcse_files
Computer System
I.C.T.
Chapter 1
Computer System
Hardware
It is a general term for the physical components that make up a computer system.
Hardware can be either External or Internal.
Software
It is a general term for programs that control the computer system. There are two
types of software: Application and System.
Application
Software
They are programs that allow the user to do specific tasks.
System
Software
They are programs that allow the hardware to run properly and allow the user to
communicate with the computer.
Examples of system software are:
• Compiler
o It is a computer program hat translates a program written in a high level
programing language into machine code (code understood by the
computer) so that it can be interpreted by the computer to do specific
task.
o Examples of high-level languages include: C++, Java and Python.
• Linker
o It is a computer program that takes one or more files produced by a
compiler and combines them into a single program that can be run on a
computer.
o Many programming languages allow programmers to separate their
code and write them in different modules. This simplifies the
programming task since it allows the program to be broken up into
small sub tasks. However, at some point, it will be necessary to put all
the modules together to form the final program. This is the linker’s job.
• Device driver
o It the name given to software that enables one or more hardware
devices to communication with the computer’s operating system.
o Without drivers, a hardware device (for example, a printer) would be
unable to work with the computer.
o All hardware devices connected to a computer have associated drivers.
As soon as a device is plugged into the USB port of a computer, the
operating system looks for the appropriate driver.
• Operating System (OS)
o It is software running in the background of a
computer system and manages many of the
basic functions.
o Without the OS, most computers would be very
user-unfriendly and the majority of the users
would find it almost impossible to work with
computers.
o Examples: Windows, Linux, Android, etc.
• Utilities
o Utility programs are programs that help to manage, maintain and
control computer resources.
Main
/
Internal
Memory
Secondary
/Backing
storage
Output
devices
These are devices that are used to obtain output from the computer.
A monitor, a printer and a loudspeaker are all examples of output devices.
Secondary/backing
storage
These are devices that store data when the computer is switched off. Secondary
storage is non-volatile, so data that is stored on these devices remains there safely.
A hard drive, a CD-ROM, a floppy disc and a USB memory stick are all examples of
secondary storage devices.
1.
PC/Desktop
computers
PC/Desktop usually refers to a general-purpose computer
that is made up of a separate monitor, keyboard and
processor unit.
2.
Laptop
computers
Laptop refers to a type of computer where the monitor,
keyboard, touchpad and processor are all together in one
single unit. This makes them extremely portable.
3.
Smartphones
Smartphones allow normal phone calls to be made
but also have an operating system (such as iOS,
Android or Windows), allowing them to run a number
of computer applications.
They allow users to send/receive emails and
messages, use a number of Apps, use camera feature, MP3 and MP4 players (for
music and videos), and so on.
Smartphones communicate with the Internet either by using Wi-Fi hotspots or by
using 3G/4G/5G mobile phone networks.
Advantages of smartphones
• They are very small in size and lightweight – therefore very easy to carry (this
is more difficult with laptops as they are much bulkier and heavier).
• Can make phone calls as well as connect to the Internet while on the move.
• Because they can use Wi-Fi and mobile phone networks, they can be used
almost anywhere (this is not the case with laptops or PCs).
• They have hundreds of Apps (similar to tablets, but it is an advantage
compared to laptops)
• They have a reasonable battery life compared to laptops.
Disadvantages of smartphones
• The small screens make page difficult to read and small keyboards make
typing things in more difficult and slower (laptops and PCs have much bigger
screens and keyboards).
• Web browsing and photography can drain the battery quickly.
• Memory size in most phones isn’t very large when compared to laptops and
PCs – although it is comparable with tablets.
• Not all website features are compatible with smartphone operating systems.
• Because of their small size, it is much easier to lose a smartphone than
laptops or PCs.
4.
Tablets
Tablets are relatively new internet-enabled portable
computer. They work in a similar way to a smartphone.
Tablets use touch screen technology and don’t usually
have a conventional keyboard. Internet access is usually
through Wi-Fi or through 3G/4G/5G (mobile phone)
connectivity.
Chapter 2
Input Devices
Mouse
The mouse is an example of a pointing device. The user controls the position of a
pointer on the screen by moving the mouse around.
Uses
• Move a pointer on the screen to select items and
options from drop-down menus.
• Draw objects on the screen.
Advantages
• Faster entry of chosen options.
• Faster navigation.
• Smaller than keyboard.
Disadvantages
• Difficult to use for people with disabilities.
• Not suitable to enter text or numeric data.
Touchpad
A pointing device found on most laptops. Used
instead of a mouse since it takes up less
space.
Use
• Used with laptop computers instead of a
mouse.
Advantages
• Integrated within the laptop computer.
• Takes less space
Tracker
ball
This pointing device has a large ball that the user spins.
Uses
• For use by people with limited motor skills, e.g.
young children or people with disabilities.
• Used by people with disabilities or RSI.
Advantage
• Easier to use than a mouse.
Disadvantage
• Slower to use compared to a mouse.
Keyboard
Allows text (abc...), numbers (123...) and symbols (%$@...) to be entered into a
computer
Uses
• Entering text for word processing.
• Applications where text has to be created rather
than copied.
Advantages
• Allows accurate entry of data.
• Quick entry of original text.
Disadvantages
• Constant use can lead to Repetitive Strain Injury.
• Must learn how to type to achieve high input speed.
Numeric
keypad
A small keyboard that only has numbers.
Uses
• Applications where only numeric data is to be
entered.
• Inserting pin numbers for chip and pin
credit/debit cards.
• When using an ATM machine.
Advantages
• Small, compact and easy to carry.
• Easy to cover up when entering a PIN.
Disadvantage
• It is impossible to enter text.
Remote
control
Used to control devices remotely by emitting an infrared signal
to the external device.
Use
• To operate TVs, video players/recorders, DVD
players/recorders, satellite receivers, HiFi music
systems, data or multimedia projectors.
Advantages
• Operate devices from a distance.
• Useful for people with walking difficulties.
Disadvantage
• Not useful for people with disabilities or RSI.
• Objects between the device and the remote control can prevent its operation.
Joystick
Uses
• Used in video/computer games.
• Used in simulators (for example, flight simulators).
Advantages
• Easier than a keyboard to navigate the screen.
• Control is more realistic than using a mouse, for example.
Disadvantage
• More difficult to control a pointer than other pointing devices.
Driving
wheel
A driving (steering) wheel is an example of an input
device that is similar to a joystick in many ways. It
connects to a computer (or games machine) usually
through a USB port. The wheel allows you to
simulate the turning of a steering wheel, and there
are associated devices (such as buttons or pedals),
which allow you to accelerate and brake. Sensors
are used to pick up left/right movement so that the user gets the sensation of
steering a car on the road.
Uses
• Used in video/computer games.
• Used in simulators (for example, flight simulators).
Advantages
• Easier than a keyboard or joystick to control steering movements as it is more
natural.
• The ‘driving experience’ is nearer to how an actual steering wheel and other
controls operate in real life.
Disadvantages
• It can be rather expensive input device compared to mouse or joystick.
• Movements in the steering can be too sensitive, giving an unrealistic ‘feel’.
Touch
screen
Selecting from a limited list of options e.g. certain POS
uses such as cafes, tourist information kiosks, and public
transport enquiries.
Uses
• ATMs by bank customers.
• EPOS terminals in cafes and shops
• Tourist information and public-transport information.
Advantages
• Easier to select options than by using a mouse.
• Easier to use for people with disabilities.
Disadvantage
• RSI could result from continual use of a finger to select options.
Microphone
Microphones are devices that input sound to a computer.
Uses
• To input speech/sound to be used in various
applications (for example, in presentations).
• Input in voice-recognition software:
o The software converts the speech into text that
can be used in, for example, a word processor
or to input commands into a computer.
o To recognize commands. For example, some cars now have voice-
activated systems to switch on the lights, turn the radio volume up, etc.
• Microphones can also be used as a sensor to pick up sound.
• Used in video conferencing or Voice over Internet Protocol (VoIP)
applications.
Advantages
• Faster to read text than to type it in using a keyboard.
• It is possible to manipulate sound in real time using special software rather
than work on a recording done at some earlier stage.
• If used in a voice-activation system, it has the advantage of improving safety
(since the car driver, for example, doesn’t need to take their hands off the
wheel to operate a switch or alter the radio station, etc.).
Graphics
tablet
A graphics tablet is used with a stylus to produce
freehand drawings. The images produced can then be
stored in a file on a computer.
Uses
• Used to produce drawings, computer graphics,
etc.
• Used in computer-aided design (CAD) work.
• In countries where the written language uses
complex characters (for example, China and Japan), graphics tablets are
used as a form of input as it is faster than typing in the characters with a
keyboard.
Advantages
• More accurate in drawing than using a mouse.
• It is possible to modify drawings before they are input.
• They can record levels of pressure, unlike other point-and-click devices.
Disadvantages
• More expensive than other pointing devices.
• Menus are often not very user-friendly.
• Larger drawings (such as A4) are expensive to produce.
• The touch screens are damaged easily.
• It takes longer to produce a drawing using this equipment than doing it with
pen and paper.
Light
pen
A light pen is a device used as a pointing device or to
'write' on a CRT monitor.
Uses
• Selecting objects on CRT screens.
• Drawing on screen (for example, with CAD
packages).
Disadvantages
• Problems with lag when drawing on screen.
• Only works with CRT monitors.
• Considered an old technology.
Digital
camera
Digital cameras have largely replaced traditional film-based cameras. The images
are uploaded from the camera and stored in a file on the computer.
Advantages
• Better quality photographs than traditional
cameras.
• Memory cards can hold several hundred
photographs.
• Easier and faster to upload photographs to
computer rather than having to scan in hard
copies when using traditional methods.
• No need to develop film and print out photographs anymore, which saves
money.
Disadvantages
• More expensive than traditional cameras.
• Need to be computer literate in using the cameras properly. Also, the
transferring, storing and manipulating of the images via a computer requires
some understanding of how computer works.
• The resolution still isn’t as good as many expensive traditional cameras.
• Images often need to be compressed to reduce the amount of memory used.
Video
camera
Video cameras are used to input moving pictures, often pre-
recorded, into a computer. Video cameras are used widely for
security purposes.
Advantages
• Very high quality video output.
Webcam
Webcams are similar to video cameras but connected directly
to the computer (through a USB port or built in) and they
don’t have memory. Whatever information the webcam picks
up is transmitted directly to the computer. Many computer
systems now have webcams built in to their monitors as
standard.
Uses
• Many people use webcams as a more personal way of having a conversation
while chatting online.
• They are used to enable video conferencing to take place.
Advantages
• Elderly or disable people can stay in touch visually with relatives without
leaving their home.
• They can be online constantly.
Disadvantages
• Limited in their features (no zoom facility, for example).
• Poor quality.
• They need to be connected to the computer.
Scanners
Scanners are mainly used to input hard copy images into a computer.
Uses
• Scan in documents and convert into a format
for use in various software packages.
• Scan in photographs.
Advantages
• Allows images to be stored for further editing.
• Much faster and more accurate than typing in documents again.
Uses
• Inputting text to computer from a hard copy
paper.
• One of the most recent uses is the processing of passports and identity cards.
Advantages
• It is much faster data-entry system than manually keying in data.
• Since no manual data entry, errors are reduced.
Disadvantage
• Not a very accurate technique especially when it comes to reading
handwriting.
Uses
• OMR is mainly used to read questionnaires, multiple choice examination
papers and other types of form where responses are registered in the for of
shaded areas.
Advantages
• Very fast way of inputting the results of a survey, multiple choice examination
paper, etc.
Disadvantages
• The forms need to be carefully designed to make sure that the marks/shading
are correctly positioned to gather accurate information.
• There can be problems if the forms haven’t been filled in correctly; sometimes
they have to be checked manually before being read, which is both time
consuming and expensive.
Barcode
reader
Barcode readers are used to read information in the
form of a barcode. The readers are usually in the form
of barcode scanner and are often built into POS
terminals in supermarkets.
Advantages
• Much faster than keying in data manually and fewer mistakes will be made.
• If used as a way of recording data, they can improve safety.
• They allow automatic stock control.
• They are a tried and trusted technology.
Disadvantage
• Relatively expensive system to administer.
• Not foolproof (barcodes can be swapped around on items).
• Can be more easily damaged than RFID tags or magnetic strips.
Uses
• Livestock tracking (so that the whereabouts of each
animal on a farm is known; it also identifies which
farm owns the animal).
• Retail.
o Similar to barcodes but no scanning is
needed, as all information can be stored on
the tag.
o Several tags can be read at the same time,
thus speeding up the checkout process.
• Admission passes.
Advantages
• No line-of-sight contact is necessary as the tags can be read from a distance
of several meters. This is one advantage over the barcode system.
• Robust and reliable technology.
• Very fast read rate (takes less than 100 milliseconds to respond).
• Allows read and write operations to occur (Bidirectional data transfer).
• Several RFID tags can be detected at the same time.
Disadvantages
• Tag collision may occur. This can happen when the signals from two or more
RFID tags overlap or interfere with each other.
• Easy to interrupt or jam as RFID technology uses radio waves.
• Easy to hack into the data/signal transmitted by the tag.
• RFID is more expensive than the barcode system.
Uses
• On credit/debit cards for use at ATMs or
EFTPOS (Electronic Funds Transfer at Point Of
Sale) terminals.
• Security devices to allow entry to buildings, hotel rooms, etc.
Advantages
• Fast data entry compared with keying in with a keyboard or keypad.
Disadvantages
• If the magnetic stripe gets damaged, the data will be lost.
• Doesn’t work at a distance. The card needs to be in close contact with the
reader.
• Since the information is not human readable, this can be a disadvantage in
some applications.
Chip
and
PIN
Reader
Chip and PIN readers are used at EFTPOS
terminals. The device has a slot into which the
card is placed and the chip is read; the PIN is
entered using the keypad. The reader also has a
small screen which gives instructions to the
operator.
Uses
• Where payments are made using cards (restaurants, supermarkets, travel
agents, etc.).
Advantages
• More secure system (PIN typed in must match up with PIN stored on chip).
• More robust system than magnetic stripe cards.
Disadvantages
• Subject to fraud – need to be careful to ensure PIN isnt read by somebody
else while typing it in.
2.4 Sensors
A sensor is a device that measures and inputs physical quantities that is
continuously changing to a computer. Sensors are used in both monitoring and
control applications.
Advantages
• More accurate readings taken when compared to human operators.
• Readings are continuous – no break in the monitoring.
• Because it is continuous process, any necessary action (control system) or
warning (measurement system) will be initiated immediately.
• Systems can be automatic, removing the need for human intervention.
Disadvantages
• Faulty sensors can give false results.
Chapter 3
Output Devices
3.1 Monitors
CRT
monitor
Cathode Ray Tube (CRT) monitors are the least expensive type of monitor. They are
becoming extremely rare as TFT monitors are now taking over.
Uses
• They were used as the primary output device for
computers.
• They are used with light pens to allow designs to
be created easily on screen.
• Used in applications where more than one user
may need to view screen simultaneously such as in
design use, e.g. when several designers may need
to offer suggestions on a prototype.
Advantages
• Cheaper than TFT monitors.
• The angle of viewing is wider than most TFT monitors.
• They work with light pens in CAD applications
Disadvantages
• They tend to be rather heaving and present a safety hazard if not supported
properly.
• They produce more glare and more harmful radiations than other types of
monitors.
• They run very hot and cause fire if left unattended (especially as they get
older).
TFT
monitor
Thin Film Transistor (TFT) monitors are taking over from CRT
monitors as the main output device. One of the reasons for the
rapid development of laptop computers can be attributed to the
advancements made in TFT technology.
Advantages
• They are lightweight and don’t pose the same risks as CRT monitors
• They produce less glare than CRT monitors and also emit less radiations.
• They consume much less power and don’t generate as much heat as a CRT
monitor.
Disadvantages
• The angle of viewing for TFT is fairly critical. If several people are looking at
the screen at the same time, the image will not be clear to most of these
people.
• More expensive than CRT monitor.
LCD
monitor
The days of CRT monitors are almost gone. These days, most monitors and
television sets are made using Liquid Crystal Display/Diode (LCD) and Light Emitting
Diode (LED) technologies. These are simply a development of the TFT monitors.
LCD monitors have two main components, which are the front pixels and a
backlight.
The pixels are made of liquid crystal diodes, which are grouped together in threes
(one for red, one for green and one for blue). Because LCD doesn’t emit light, some
form of backlit technology needs to be used.
Traditional LCD monitors used cold cathode fluorescent lamps (CCFL) as the
backlighting method.
LED
monitor
The LED monitor uses the same technology as LCD but it is not backlit using CCFL,
instead, it uses light emitting diodes (LEDs) as backlight, which gives better contrast
and brightness. LED monitors have become increasingly more popular than the
traditional LCD monitor due to a number of advantages over older CCFL technology.
3.2 Printers
Laser
printer
Laser printers produce very high-quality hard-copy output. The print rate per page is
very quick if a large number of pages are being printed. They rely on large buffer
memories where the data for the whole document is stored before the pages can be
printed out.
Uses
• They are used where low noise is required (for
example, in an office).
• They are used where rapid, high quality and high
volumes of output are required (for example, most
offices and schools).
Advantages
• Printing is fast.
• High quality.
• Running cost for black and white printouts is cheaper than inkjet printers as
toner cartridges last for a long time.
Inkjet
printer
Inkjet printers are used to produce good quality hard
copies. Unlike laser printers, inkjet printers don’t have
large buffers, therefore printing is done a bit at a time.
This is why printing is sometimes paused since the
whole page can’t be stored in the buffer and it has to
wait for the computer to send more data.
Uses
• Used where low output volumes are required.
• If high-quality printing is required for single
pages (or only a small print job) then these printers are ideal (for example,
when producing photo-quality printouts)
Advantages
• High quality output.
• Cheaper to buy than laser printers (lower initial cost).
• Very lightweight and have a small footprint.
• Don’t produce ozone and volatile organic compounds, unlike laser printers.
Disadvantages
• Slow output (little buffer capacity to store the pages).
• Can’t do large print jobs (ink cartridges run out too quickly).
• High running cost, as the original ink cartridges are expensive to buy and run
out too quickly.
Uses
• They can be used in noisy environment (for
example, garage workshops) and in
applications where print quality is not that
important.
• They are used in applications where multi-part
stationery is used (for example, producing wage slips).
Advantages
• They can be used in environments that would be a problem to laser or inkjet
printers (for example, dusty/dirty or moist atmospheres).
• Carbon copies or multi-part outputs are produced.
• Low running cost.
• Easy to use if continuous stationery is required (for example, long print jobs
such as wages slips).
Disadvantages
• Very noisy – not good in an office environment.
• Higher initial cost than inkjet printer.
• Very slow.
• Low quality printing.
3-‐D
printer
3-D printers are primarily used in computer-aided design (CAD)
application. They are used to produce solid objects that
actually work. The following information describes some of the
features of 3-D printing:
• The solid object is built up using materials such as
powdered resin, powdered metal, paper or ceramic.
• 3-D printers use additive manufacturing. This means
that the object is built up layer by layer instead of the more traditional method
of subtractive manufacturing.
• Various types of 3-D printers exist. They range from the size of a microwave
oven up to the size of a small car.
Disadvantages
• The possibility of producing items that infringe others’ copyright.
• 3-D printing can lead to dangerous or illegal activities if it falls in the hands of
the wrong people. This technology can be used to produce dangerous items
(such as, weapons).
• Potential for job losses if this technology takes over from some types of
manufacturing.
Uses
• CAD applications where large printouts are
required such as A0
• To produce large printout of graphs.
Advantages
• Extremely large output can be produced.
• Very high quality output.
Disadvantage
• Very expensive.
• Slow in printing.
Multimedia
projector
Multimedia projector is a device that receives signals from a computer, television or
DVD player then magnifies and projects the source image on to a large screen. The
device usually works with remote control. but also use virtual mouse technology,
which actually becomes a cordless PC mouse with the same features as a mouse.
Most multimedia projectors take input from various types of video format.
Uses
• Training presentations.
• Advertising presentations.
• Home cinema systems (projecting the images
from a DVD or television).
Advantages
• Enables many people to see a presentation rather than crowding around a
small computer screen.
• Avoids the need for several networked computers (for example, when looking
at a video clip on an internet site – everybody can see the video on the large
screen rather than logging on to a number of computers).
Disadvantages
• Images can sometimes be fuzzy.
• Expensive to buy.
• Setting up projectors can be a little difficult.
Speakers
Speakers can be connected directly to a computer or are built into
the monitor or casing (as in a laptop computer). Digital data from
the computer is converted into analogue form (using a digital to
analogue converter – DAC) and the signal is amplified through the
speakers. A sound card interface is needed in the computer to
‘drive’ the speakers.
Uses
• Output sound from multimedia presentations.
• Play downloaded sound files.
• Audio output of text on the screen helps users with disabilities.
Motors
Motors provide movement.
Uses
• Used in automatic washing machines, cookers, water
pumps in central heating systems, and in automatic
glasshouses to open windows and switch on fans.
• Control of robot arms in industry.
• In computers to control fans, disk drives and DVD drives.
Buzzers
Buzzers provide noise/sound.
Uses
• Used in cookers and microwave ovens to the
operator when the cooking process is complete.
• Used in burglar alarm systems to warn of intruders.
Lights
Light bulbs are used to provide light, or to indicate
something.
Uses
• Security lights.
• In glasshouses to control the lighting conditions.
Heaters
They provide heat.
Uses
• Automatic washing machines to heat up the water if
necessary.
• Automatically control the temperature in an oven or
hot plate.
• Control the heating in a central heating system.
• Temperature control in an automatic glasshouse.
Chapter 4
Storage Devices
Uses
• To store the operating system, systems software
and working data/files.
• Storing applications software that needs fast
retrieval and storage of data.
• Used in real-time systems (for example, robots)
Disadvantages
• Can be easily damages if the correct shut down procedure is not carried out
or if it is hit.
• They have many moving parts when compared to Solid State Drives (SSDs).
• Their read/write operation can be quite noisy compared to SSDs.
Uses
• They can be used as backup systems to prevent
loss of data.
• They can be used to transfer data/files/software between computers.
Advantages
• They have a large memory capacity.
• Data transfer rate is very fast.
• Data access time is very fast.
• They can be used as a method of transferring information between
computers.
Disadvantages
• They can be easily damaged if dropped or subjected to a strong magnetic
field.
• An incorrect shutdown procedure could lead to loss of data.
Magnetic
tapes
A magnetic tape is a very thin strip of plastic that has
been coated in a magnetic layer. Data is read from the
tape using serial access. This type of storage is useless
in real-time or online applications (due to the very slow
data access speeds) and is best suited for offline or
batch processing.
Uses
• Used for backups of file servers for computer networks.
• Used in long-term archiving of data. Magnetic tapes have huge data
storage capacities and are know to be very stable,
which make them ideal for long-term storage.
• Used as a backup media since all the data needs
to be stored.
• Uses in applications where batch processing is
used, for example, clearing of bank cheques, utility
billing and producing pay slips. In these
applications there is no need for any specific processing order and speed of
data access is not essential.
Advantages
• They are less expensive than the equivalent hard disk.
• It is a very robust technology (they don’t deteriorate very much over time).
• They have a huge data storage capacity.
• The data transfer rate is fast (this should not be confused with data access
time, which is very slow for magnetic tape).
Disadvantages
• Very slow data access times (need to real all the earlier records on the tape
until the required record is found).
• They are affected by magnetic fields. A strong magnet can corrupt data stored
on the tape.
CD/DVD
disks
CDs and DVDs are described as optical storage devices. Laser light is used to read
data and to write data on the surface of the disk. CDs and DVDs can be categorized
as follows:
• R – write only once.
• ROM – can only be read.
• RW – can be written to or read from many
times.
CDs tend to be used for files smaller than 1Gb, which are too big for a floppy disc to
hold, for example music and general animation. DVDs are used to hold larger files
than CDs (several Gb) such as movie films. Both CDs and DVDs are portable i.e.
they can be transported from one computer to another.
Uses
• CD-ROMs are used to store music files, software, computer games and
reference software (such as an encyclopedia).
• DVD-ROMs have much larger storage and are used to store films, computer
data and ever-more sophisticated computer games.
• CD-ROMs and DVD-ROMs are used in applications where there is a real
need to prevent the deletion or overwriting of important data.
Advantages
• They hold far more data than floppy disks (one CD/DVD could replace several
floppy disks in some applications).
• They are less expensive than hard disk drive systems.
Disadvantages
• Data transfer rate is slower than for hard disks.
• Data access time is slower than for hard disks.
Disadvantages
• If the CD-R/DVD-R is finalized and an error in the
data has occurred, then the disk has to be
discarded since it can be no longer be written to.
• Space can be wasted if the CD-R/DVD-R was not
fully consumed before burning and finalizing it.
• Not all CD/DVD players can read CD-R/DVD-R.
Uses
• Used to record television programs (like video
recorder), which can be recorded over and over again.
• Used in CCTV systems.
Advantages
• Can be written over many times.
• Can use different file formats each time it is used.
Disadvantages
• Relatively expensive.
DVD-‐RAM
DVD-RAM uses a very different technology to CDs
and DVDs. They have the following features:
• DVD-RAMs allow for simultaneous read and
write operations to take place.
• They allow numerous read and write
operations (up to 100 000 times) and have
great longevity (over 30 years), which makes
them ideal for archiving.
Uses
• In recording devices such as satellite
receivers to allow simultaneous recording and playback.
• Used in camcorders to store movies.
Advantages
• They have a long life.
• Very fast access if the files are fairly small.
• Very large capacity (about 10 GB).
• They offer the ability to read data at the same time as data is being written.
• It is possible to do a rewrite operation over 100,000 times (compare this to the
RW format, which only allows for about 1,000 rewrites).
• Writing on DVD-RAMs is very reliable – they have built in verification software,
so the accuracy of the data is ensured.
• No need to finalize the disk.
Blu-‐ray
discs
Blu-ray discs are another example of optical storage
media. However, they are fundamentally different to
DVDs and CDs in their construction and in the way
they carry out read-write operations.
Uses
• Home vide consoles.
• Storing and playing back movies (one high-definition movie of two hours
duration uses up 25 GB of memory).
Advantages
• Very large storage capacity, therefore ideal for storing high-definition movies.
• Very fast data transfer rate.
• The data access speed is greater than with other optical media.
• Blu-rays discs automatically come with a secure encryption system, which
helps to prevent piracy and copyright infringement.
Disadvantages
• Relatively expensive.
• Encryption problems (which are used to stop piracy) when used to store
video.
All these optical storage media are used as backup systems (for photos, music and
multimedia files). This also means that CDs and DVDs can be used to transfer files
between computers. Manufacturers often supply their software using CDs and DVDs.
When the software is supplied in this way, the disk is usually in a read-only format.
The most common use of DVD and Blu-ray is the supply of movies or games. The
memory capacity of CDs isn’t big enough to store most movies.
Uses
• Transporting files between computers or
used as a backup store.
• Used as a security device to prevent
software piracy (known as a dongle).
Advantages
• Very compact and portable media.
• Very robust.
• Doesn’t need additional software to work on most computers.
• They are not affected by magnetic fields.
Disadvantages
• Can’t write-protect the data/files.
• Easy to lose (due to their small physical size).
• The user needs to be very careful when removing a memory stick from a
computer – incorrect removal (for example, when it is still doing a read/write
operation) will corrupt the data on the memory stick.
• Lower storage capacity compared to hard disk drives.
Advantages
• Very compact and can be easily removed and used in another device or for
transferring photos directly to a computer or printer.
• Very robust.
Disadvantages
• Expensive per gigabyte of memory when compared to hard disk drives.
• Have a finite life regarding the number of times they can be read from or
written to.
• Have a lower storage capacity than hard disks.
Advantages
• Customer/client files stored in the cloud can be accessed at any time, from
any device, anywhere in the world (provided internet access is available).
• There is no need for a customer/client to
carry an external storage device with them, or
even to use the same computer, to store and
retrieve data.
• The cloud provides the user with remote
backup of data with obvious advantages to
lower the risk of data loss problem.
• If a customer/client has a failure of their hard disk or backup device, cloud
storage will allow recovery of their data.
• The cloud system offers almost unlimited storage capacity.
Disadvantages
• Security aspects of cloud storage (data security and data loss).
• If the customer/client has a slow or unstable Internet connection, they could
have problems accessing or downloading their data/files from the cloud.
• Costs can be high if a large storage capacity is required. It can also be
expensive to pay for high download/upload data transfer limits with the
Internet service provider (ISP).
• The potential failure of the cloud storage company is always possible – this
poses a risk of loss of all backup data.
Data
security
Companies that transfer large amounts of confidential and sensitive data from their
own systems to a cloud service provider are effectively relinquishing/surrendering
control of their own data security. This raises a number of questions:
• What physical security exists regarding the building where the data is
housed?
• How good is the cloud service provider’s resistance to natural disasters or
power cuts?
• What safeguards exists regarding personnel who work for the cloud service
company? Can they use their authorization codes to access confidential data
for monetary purposes?
In other words, data security issue is concerned with physical security of the cloud
storage.
Data
loss
There is a risk that important and irreplaceable data could be lost from the cloud
storage facilities. Actions from hackers could lead to loss or corruption of data. Users
need to be certain that sufficient safeguards exist to overcome these potentially very
harmful risks.
All the above reasons have made individuals and companies nervous about using
cloud storage service providers. A ‘game’ between hackers and owners of online
service companies continues to simmer.
Chapter 5
Introduction to databases
1.
Numeric
Data
Numeric data simply means numbers. However, numbers come in a variety of
different types.
• Integers
An integer is a whole number - it has no decimal or fractional parts. Integers can be
either positive or negative.
Examples: 12, 45, 1274, 1000000, -3, -5735.
• Real Numbers
Real numbers include whole numbers (integers) and numbers with decimal/fractional
parts. Real numbers can be positive or negative.
Examples: 1, 1.4534, 946.5, -0.0003, 3.142.
• Currency
Currency refers to real numbers that are preceded by a currency symbol.
Examples: £12.45, -£0.01, €999.00, $5500.
• Percentage
Percentage refers to fractional real numbers that are followed by a percent symbol.
So, the real value 0.5 would be shown as 50%, the value 0.01 would be shown as
1% and the number 1.25 would be shown as 125%. Inside the computer the 50% is
stored as a real number: 0.5, But when it is displayed it is shown formatted as a
percentage.
Examples: 100%, 25%, 1200%, -5%.
2.
Alphanumeric/Text
Data
Alphanumeric (often simply called 'text') data refers to data made up of letters
(alphabet) and numbers (numeric). Usually symbols ($%^+@, etc.) and spaces are
also allowed.
Examples: DOG, "A little mouse", ABC123, [email protected].
3.
Date/Time
Data
Date (or time) data is usually formatted in a specific way. The format depends upon
the setup of the computer, the software in use and the user's preferences.
Date Examples: 25/10/2007, 12 Mar 2008, 10-06-08.
Time Examples: 11am, 15:00, 3:00pm, 17:05:45.
4.
Boolean/Logical
Data
Boolean data is sometimes called 'logical1 data (or in some software, 'Yes/No' data).
Boolean data can only have two values: TRUE or FALSE.
Note that TRUE and FALSE can also be shown as YES / NO, ON / OFF, or even
graphically as tick boxes (ticked / unticked).
Examples: TRUE, FALSE, YES, NO, ON, OFF.
Note that the telephone number in the example to the left has a data type of
alphanumeric. You might think that it should be numeric, however phone numbers
often have spaces, dashes, etc. which numeric data cannot have.
Record
A record is a group of related items of data, which together can be treated as a unit.
File
A file is an organized collection of related records
Field
name
A field name is the title given to each field and is always present at the top row of
table.
Flat-‐file
databases
A flat-file system refers to a database where all the date is held in a single table or
file. An example of a flat file database is given below.
Relational
databases
A relational database stores data in more than one linked table, stored in a file.
Relational databases are designed so that the same data is not stored many times.
Each table within a relational database will have a primary key. Most tables will have
a primary key field that holds unique data (no two records are the same in this field)
and is the field used to identify this record.
For this example, all the data associated with the customer is held in one file and all
the data associated with each job is held in another file. In order to create a
connection between the two sets of data, a relationship must be created by using
two key fields.
Foreign
keys
The foreign key is the destination point of the relationship. It remains a unique
identifier as regards the customer file but it may occur more than once in the job file
because the customer may have more than one job.
As you can see, the 'Customer ID' field acts as the primary key in the customer file
and foreign key in the job file, thus enabling a relationship between the two tables.
Relationships
A relationship is a term used with relational databases to indicate a link or
association between fields. The relationship between the tables can be:
• one-to-one
o Like the relationship between a person and their ID card. One person
has only one ID card and the ID card is associated only to one person.
• one-to-may
o Like the relationship between a father and his children. One father has
many children but each child only has one father.
• many-to-many
o Like the relationship between students and courses. One student can
take several courses and each course can be taken by several
students. Thus the relationship is many to many.
Visual
check
This is checking for errors by the person who is entering the data. They compare the
entered data with the original document (i.e, what is on the screen is compared to
the data on the original paper documents – note that this is not the same as
proofreading).
Chapter 6
Networks
Eng. Mustafa El-Komy 59 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Local&Area&Network&(LAN)&
It is a network that covers small geographic area, for example a building. A typical
LAN will consist of a number of computers and devices (for example, printers) that
are connected together to hubs or switches by cables.
Wireless&Local&Area&Network&(WLAN)&
WLANs are similar to LANs but there are no wires or cables. In other words, they
provide wireless communications over fairly short distances using radio or infrared
signals instead of cables. The main wireless technologies that are used to form a
WLAN are Bluetooth and Wi-Fi.
Eng. Mustafa El-Komy 60 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Advantages of connecting to a WLAN rather than to a LAN:
• Reduces cost of cables.
• Safer – won’t trip over wires.
• Easier to connect other devices to the network.
• Makes devices more portable within range of wireless access.
Wide&area&network&(WAN)&
WANs are used where computers or networks are
situated a long distance from each other geographically
(e.g. in a different city or country).
If a number of LANs are joined together using a router,
they can form a WAN.
The most common examples of WAN are the internet
and the network of ATMs used by banks.
Computer$
Data$packet$sent$ Data$sent$out$to$all$
to$network$ computers$on$the$
Computer$
HUB$ network$
Computer$
Eng. Mustafa El-Komy 61 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Switch&
Switches are similar to hubs but are more efficient and intelligent in the way that they
distribute data packets. As with hubs, they connect together a number of devices or
computers to form a LAN.
However, unlike a hub, the switch checks the data packet received and sends the
data to the appropriate computer(s)
only. This makes using a switch a more
secure way of distributing data.
How&does&the&switch&do&this?&
Each device or computer on a network has a media access control (MAC) address
that uniquely identifies it. Data packets sent to switches include the MAC addresses
of the devices that should receive the data. The switch inspects the data packets and
checks the destination MAC addresses so that the data is sent to the intended
recipients only.
&Bridge&
Bridges are devices that connect two similar LANs together. They are often used to
connect together different parts of a LAN so that they can function as a single LAN.
computer$ computer$
HUB/SWITCH$ HUB/SWITCH$
computer$ computer$
computer$ computer$
BRIDGE$
Eng. Mustafa El-Komy 62 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Router&
Routers are network devices that connect multiple
networks together.
Given this information, routers can connect:
• LANs to form a WAN
• Two WANS to form a bigger WAN
• LAN to a WAN
• LAN to the internet
For these tasks to be done, routers enable data packets to be routed between
different networks by a process called Routing.
computer$
HUB/SWITCH$ ROUTER$
computer$ internet!
computer$
!
Internet&Protocol&(IP)&address&
In order for the router to route the data packet to the correct destination, the router
should know the location of the destination router. This information is determined by
the IP address.
Think of it as if you want to send a letter to someone. For this letter to arrive
correctly, the envelope should include the address and the name of the recipient
before sending it to the post office.
Eng. Mustafa El-Komy 63 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Thus, the data packet should include the following data:
• IP address of the sender
• IP address of the receiver
• Message (Data)
&
Steps&for&Routing:&
1. Router receives and inspects the data packets sent to it from any computer on
any of the networks connected to it.
2. Router checks the destination’s IP address from the data packet against the
routing table.
3. The router is then able to route the data packet to reach the appropriate
destination router and then to the correct switch/hub (correct route).
4. In case of using a switch, the data packet will be delivered to the destination
device as switch checks the destination’s MAC address and forwards the data
packets to the intended device.
5. In case of using a hub, the data packet will be broadcasted to the whole
network.
In order for all routers on the internet to inspect the data packets in the same
way, they have to follow the same protocol.
A protocol is a set of rules that is agreed by both the sender and the
recipient.
Without following a specific protocol, data packets will not be delivered to
their intended destination correctly.
&
!
Eng. Mustafa El-Komy 64 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Firewall&
A firewall can be either hardware of software. It sits between the user’s computer
and an external network (for example, the internet),
and filters information coming in and out of the user’s
computer. Given this information, firewall can do the
following:
• Prevent access to certain undesirable websites;
the firewall can keep a list of all undesirable IP
addresses.
• Prevent hackers gaining access to the user’s
computer or network. This can be done by
blocking IP addresses, but it should be pointed out that hackers can still have
access to a computer if they are using an allowed computer.
• Warn the computer of any potential threat and thus prevents any malware
getting into the network.
User’s$ Firewall$
(software$ internet$
computer$
or$
hardware)$
Network&Interface&Card&(NIC)&
A network interface card (NIC) is needed to allow a device to be connected to a
network (for example, internet). It is usually part of the device hardware and usually
contains the MAC address generated at the manufacturing stage.
Comparison&between&WiFFi&and&Bluetooth&
• Wi-Fi offers much faster data transfer rates than
Bluetooth.
• Wi-Fi has a larger effective range than Bluetooth.
• Wi-Fi offers better security than Bluetooth.
• Usually Wi-Fi can connect more devices together than Bluetooth.
o Wi-Fi: Depending on the router used
Eng. Mustafa El-Komy 65 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
o Bluetooth: Maximum of 7
Eng. Mustafa El-Komy 66 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
&
Internet&vs.&Intranet&
Another concept exists which is the intranet.
The intranet is the name given to a private network that is accessible internally to
members of some company or organization. Intranets reside behind a firewall.
There are number of reasons for adopting Intranets rather than using the
internet:
• Intranets are safer since there is less chance of external hacking or viruses.
• Companies can ensure that the information available is specific to their needs.
• It is easier to send out sensitive messages in the knowledge that they will
remain within the company.
The following table shows the differences between the Internet and the Intranet:
Internet Intranet
The term Intranet comes from the
The term Internet comes from the
phrase: internal restricted access
phrase: international network
network
Covers topics of global or general Used to give local information relevant to
interest the company or organization
Can be accessed from anywhere in the Requires password and user ID entry
world provided the user has an ISP and can only be accessed from agreed
account computers
Open on an international scale, thus less
Safer than Internet
safety
Public access Private access
Website&
It is a collection of related webpages.
A website is typically identified by a common domain name (for example,
twitter.com) and published on at least one webserver.
Eng. Mustafa El-Komy 67 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
World&Wide&Web&(WWW)& &
WWW consists of massive collection of web pages all connected
together using hyperlinks. This means that World Wide Web is
only part of the Internet, which users can access by using web
browser.
The internet is the connection of all networks together, while the
World Wide Web is a way of making use out of this connection by
linking all webpages and websites together. The two terms WWW
and Internet are clearly not the same thing and should not be confused.
Webserver&
Web servers are computers that contain web pages.
Every webserver has an IP address (location on the
Internet) and possibly a domain name.
For example, if you enter the URL:
http://www.facebook.com/home.htm in your web browser, a
request is sent to the web server whose domain is
facebook.com. The web server (computer that has
Facebook service) then fetches the page named home.htm and sends it to the web
browser to be displayed.
Web&browser& &
A web browser is software that
allows a user to display a web
page on their computer screen.
They are able to translate HTML
code and show this translation.
Most of the web browsers have the
following features:
• They have a Home page.
• The ability to store a user’s favorite websites/pages.
• They can keep a history of websites visited by the user.
• They give the ability to go backward and forward through websites opened.
• They have hyperlinks that allow users to navigate between web pages.
Web browsers use uniform resource locators (URLs) to access websites, retrieve
files and so on.
The web browser contacts the Domain Name Server (DNS) to retrieve the IP
address of the intended website’s server to include it in the data packet before
sending it.
Eng. Mustafa El-Komy 68 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Protocol&
A protocol is a set of rules agreed by the sender and the recipient when the data
packets are transferred between devices.
The Internet Protocol (IP) is the protocol that handles the routing process. This
means that in order for all routers to route the data packets correctly, these routers
should follow the Internet Protocol to be able to inspect the data packets and
extract the IP address and MAC address of the destination device.
We have other protocols that are used in the internet:
• HTTP
• SSL
• HTTPS
• FTP
Hypertext&Transfer&Protocol&(http)&
Hypertext transfer protocol (http) is a set of rules that must be
obeyed when transferring data across the Internet. Requests
and responses are handled by this protocol.
Secure&Sockets&Layer&(SSL)&
SSL is a security protocol that allows data to be encrypted while being transmitted
over the Internet. Thus, making the process of data
transmission more secure.
Hypertext&Transfer&Protocol&Secure&(https)&
It has the same function of http but using SSL (or
encryption).
Because of encryption, it is slower to use https than http,
so it is usually only adopted when sensitive or private data is being transferred
across the Internet.
File&Transfer&Protocol&(ftp)&
It is the protocol used when transferring files from one
computer to another computer over the Internet.
Eng. Mustafa El-Komy 69 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
The URL is the unique address for a web page. The format of the URL is:
protocol://website address/path/filename
where:
• Protocol is usually http or https
• Website address:
o www
o domain name (name of website)
o domain type (.com, .org, .co, .net, .gov)
o sometimes a country code is given (.uk, .us)
• Path of the webpage
• Filename is the name of the webpage itself
Faxes&
There are two basic ways of sending a fax:
• Physical fax
• Electronic (Online) Faxing
Physical&Fax&&
Physical faxing requires the presence of a fax
machine, ink and paper. A typical fax machine
allows documents to be sent to another fax machine
using a normal telephone line.
Physical faxing can be quite a slow way to send a document if the fax line is busy
or if there are several pages to be sent.
Eng. Mustafa El-Komy 70 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Electronic&(Online)&Faxing&&
This is a more modern way to use
faxing which makes use of
computer technology and the
Internet.
To set up an account for
electronic faxing, a fax number as
well as an email address is needed. The fax is sent from a computer to the
recipient’s fax machine (if exists) as well as the recipient’s inbox.
Electronic faxing has the following advantages over the Physical faxing:
• Costs are reduced, as there is no need to buy a fax machine, ink or paper.
• Data transferred is encrypted, which enhances security.
• Transmissions are sent to an email account, which is password protected.
• There is no issue of a ‘busy signal’ prevent the fax being sent.
Eng. Mustafa El-Komy 71 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Electronic&mails&(emails)&
Emails can be sent to, or sent from, any device connected to the
Internet. Emails are very useful when sending attachments
and when sending messages to a group of people at the same
time.
In order to use the email services, Internet connection is needed
(an account with an ISP is needed). When sending an email, it
is necessary to include the email address (which must be
exact), a subject line and any attachments if needed.
Eng. Mustafa El-Komy 72 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Constraints&that&affects&the&use&of&email&
There are many rules we need to follow to ensure the security of the messages sent
and also to prevent people from writing things that are regarded unacceptable.
Some of these constraints are:
• Laws within a country
• Acceptable language
• Copyright
• Security and password protection
• Netiquette (Internet Etiquette)
• Local guidelines set by an employer
1. Laws&within&a&country&
Many countries have laws to protect people against the
misuse of emails.
The following are rules that most countries require
companies and individuals to follow when sending out
emails:
• Many countries require senders of emails to
obtain permission from the recipients before
sending emails to them (opt-in permission).
• A company or individual must have a clear way for recipients to avoid
receiving emails from them (opt-out).
• It is important that emails are not sent out with false or misleading
subject lines.
• Companies and organizations must make their privacy policy very clear
to subscribers.
• Many countries don’t allow companies or organizations to harvest
email addresses (this is the process of capturing lists of email
addresses)
2. Acceptable&language&
The language used by people when writing emails must lie
within an acceptable code of practice.
The following is a list of some unacceptable content to be used
in emails:
• Language that is regarded as abusive or profane.
• Racist, exploitative, violent messages.
• Use of illegal materials in messages.
• Pornographic images.
In many countries there are very stiff penalties for going outside the above
boundaries, and it is not regarded as adequate that recipient can simply delete
images or messages.
Eng. Mustafa El-Komy 73 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
3. Copyright&
Emails are subject to copyright laws. As with web pages, the copyright in an email is
determined by its content.
Printing, copying or forwarding emails is generally not considered a breach of
copyright unless the sender has indicated clearly that the message is confidential or
subjected to copyright law. It is important for the recipient to check this out before
forwarding it to somebody else.
Copyright should be checked whenever the sender’s email address is part of a
company’s name, for example [email protected]. Also, emails and attachments from
companies and organizations will usually contain a copyright statement to make it
clear that the content of the email falls under copyright law.
4. Security&and&password&protection&
It is very important to consider the security of emails to avoid hacking. The following
are some methods to increase the security of emails:
• Use strong passwords when logging onto your
email (for example, the name of your pet dog is a
weak password; strong passwords contain a
combination of letters, numbers and other
symbols: Aju123ass1RQ@J^@%@ would be
regarded as a strong password).
• Change passwords on a regular basis.
• Use spam filters to remove suspicious emails to a ‘junk folder’ or even to
block the email entirely.
• Run anti-virus and anti-spam software at all times on your computer to protect
against emails from unknown or malicious sources.
5. Netiquette&
Netiquette is a shortened form of Internet Etiquette,
which refers to the need to respect other users’
views and display common courtesy when posting
views in online discussion groups or when sending
out emails. The following are some rules of
netiquette:
• Don’t be abusive – don’t threaten people or
use personal violence.
• Don’t send spam – don’t repeatedly send somebody the same information.
• Be clear with your message – don’t waffle.
• Always check your spelling and grammar.
• Respect people’s privacy and don’t discuss or publish information that might
embarrass somebody.
• Don’t use CAPTIAL LETTERS to highlight comments.
Eng. Mustafa El-Komy 74 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
• Don’t plagiarize – always acknowledge quotes used in any messages you
write.
• Don’t use too many emoticons (emojis) as they might annoy your readers.
6. Local&guidelines&set&by&an&employer&
Sometimes an employer can set his/her own rules
of using emails, which may restrict the usage of
emails. An employer can simply announce that all
emails sent by the employees will get inspected
for example.
&
Email&groups&
An email group is simply formed by choosing a
name and then adding the needed email
addresses. After doing this, the added email
addresses can all be contacted together using the
name of the email group.
Email groups are used for number of purposes:
• It is easier to send out multiple emails if the
addresses are all grouped together under a
single name; the user only needs to use that single name in the “to” box to
send the email to the whole group.
• Companies and organizations can group people together for marketing
purposes, for example according to age, hobbies, favorite music and so on –
this means that each email can target specific group.
• “Spammers” can create email groups by buying addresses of people from
certain companies or from software that raids address books on computers or
email companies – this means that several thousand people can be sent
spam by simply pressing the <enter> key. (This is a malicious use for email
groups)
• Companies use email groups to set up meetings to ensure that everybody is
always invited to attend – it would be easy to forget someone if all email
addresses were typed in individually.
Eng. Mustafa El-Komy 75 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Video&conferencing&
Video conferencing is a communication method that uses
both video and sound and acts as a substitute for face-to-
face conferences between a number of people. It is carried
out in real time and makes use of some form of network.
Video conferencing requires the use of the following
hardware:
• webcams/video cameras
• large monitors/television screens
• microphones
• speakers
• router for the internet
Audio&conferencing&
Audio conferencing refers to meetings held between people
using sound (audio) equipment. The equipment used can be:
• Telephone
• Computer with built-in microphone and speakers
• Internet phone
The audio conference can be done over the telephone
network or over the Internet.
Eng. Mustafa El-Komy 76 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Audio conference over telephone network
Audio conferencing using over telephone network is also known as phone
conference.
The following steps show how to organize and actually conduct a phone conference:
1. The organizer of the phone conference is given two PINs by the phone
company.
o Personal PIN of the organizer (e.g. 2151)
o Participants’ PIN (e.g. 8422)
2. The organizer contacts all the participants and informs them of their PIN and
the date and time of the phone conference.
3. When the phone conference is about to start, the organizer dials the
conference phone number.
4. Once the organizer is connected, the organizer keys in his/her personal PIN
(2151 in this case).
5. The participants then call the same conference number to join in.
6. The participants then enter the PIN given to them by the organizer (8422 in
this case). Without this PIN, it will be impossible to join the phone conference.
Advantages of VoIP:
• It is either free (meaning that there is no telephone expenses included, only
the cost of using the Internet) if both of the talking computers have VoIP
telephones or user their plugged in/built in microphones and speakers, or at a
Eng. Mustafa El-Komy 77 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
local rate to anywhere in the world (when VoIP is used to communicate with a
mobile or land line telephone rather than another computer).
• A webcam can be used so that it becomes a type of video chat. As this
doesn’t have the sophistication of a videoconference, it is much cheaper.
Disadvantages of VoIP:
• Quality of the sound when using this technique is completely reliant on the
Internet connection. If the connection is not stable and fast, some problems
may occur like: drop out (loss of voice on occasions) and echoing (when the
user can hear their own voice being echoed back as they speak).
• Security issues.
Web&conferencing&
Web conferencing is simply having a conference by using
the Internet.
The only requirement is a computer and a stable Internet
connection. It is the same idea of using an application or
website (Whatsapp or Facebook for example) to have a
group chat, but of course in a more formal way.
The following are some features of web conferencing:
• Participants can leave or join the conference as they
wish.
• Sending instant messages is the main way of communication in web
conferences.
• It is possible to transmit images or videos using the webcam throughout the
conference.
• Documents can be shared by uploading them to the website/application
before the conference begins.
Eng. Mustafa El-Komy 78 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Mobile&Phones&and&Tablets&
Advantages:
• Very portable. They can be used
almost anywhere provided a mobile
phone network signal.
• A person is more likely to have a
mobile phone with them at all times.
• It is easier to use a mobile phone while
on the move than other devices.
Disadvantages:
• Expensive to use if Wi-Fi hot spot is not
available.
• Mobile phone screen sizes are smaller than other devices (tablets have larger
screens than mobile phones), which makes it harder to read web pages.
• Keyboards are small (Tablets have bigger keyboards compared to mobile
phones). Therefore, it is more difficult to type in messages or navigate web
pages.
• Not all websites are mobile friendly. This means that not all websites may be
accessible using a mobile phone (for tablets, it depends on the screen size).
• Signal is less likely to be as stable or reliable as a wired system (used by PCs
and laptops).
Laptops&
Advantages:
• Laptops are more portable than desktops.
• The keyboards on laptops are much better
than those on a mobile phone.
• Touchpads are much easier to use than
mobile phones when navigating web pages.
• Screen size is usually bigger than a mobile
and some tablets.
Disadvantages:
• Heavier and less portable than tablets or
mobile phones.
Eng. Mustafa El-Komy 79 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
• The keyboards on laptops are not as easy to use as a desktop.
• Touchpads on laptops are not as easy to use as a mouse when navigating
web pages.
• Screen size is not as large as that on a desktop computer.
• Laptops require expensive dongles to access phone networks.
• Processors used in laptops are not usually as powerful as those in desktops,
so access speed is not as quick.
Desktop&Computers&
Advantages:
• Tend to have faster processor than
other devices.
• Usually have a more stable and reliable
Internet connection as they use a wired
system rather than Wi-Fi.
• All web pages are accessible due to
larger screen size than other devices.
• Use of full-sized keyboard and pointing
devices. This makes web page
navigation much easier.
Disadvantages:
• Not very portable as the parts are separate and its size is large.
• Desktop computers require expensive dongles to access the phone network.
Eng. Mustafa El-Komy 80 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
1. Hacking!
Definition!
The act of gaining unauthorized access to a computer system.
Possible!effects!
• This can lead to identity theft or the misuse of personal information.
• Data can be deleted, changed or corrupted on a user’s computer.
Methods!to!help!remove!the!security!risk!
• Use of firewalls.
• Use of intrusion detection software.
• Encryption
• Authentication techniques
Encryption&
Encryption is the process of converting
information into a form that is meaningless to
anyone except holders of a 'secret key'.
Encryption is used primarily to protect data in
case it has been hacked or accessed
illegally. While encryption won’t prevent
hacking, it makes the data meaningless
unless the recipient has the necessary
decryption tools.
The following are the steps to send an encrypted message:
• Generate a secret 'key'.
• Give a copy of this key to the intended recipient. Make sure that nobody else
can get to the key.
• Encrypt the message using special encryption software and the secret key.
• Send the encrypted message using a public network like the internet.
• The recipient uses special decryption software and his copy of the secret
key to decrypt the message.
Authentication&techniques&
They are techniques to verify that data comes from a secure and trusted source OR
to verify that the person who’s accessing the data on a computer system is an
authorized user.
Authentication methods include:
• Digital certificates
• Passwords
• Magnetic stripes/id cards/passports
Eng. Mustafa El-Komy 81 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
• Biometrics
o Fingerprint scans
o Signature recognition
o Retina scans
o Iris recognition
o Face recognition
o Voice recognition
Digital!certificates!
!
A digital certificate is a pair
of files stored on a user’s
computer, which are used to
secure sensitive messages
and to protect the user from
harmful receiving harmful
data.
Each pair of files is divided
into:
• A public key (which is
known by anyone).
• A private key (known
to the computer user
only).
The Public Key is what its name suggests - Public. It is made available to everyone
via a publicly accessible repository or directory. On the other hand, the Private Key
must remain confidential to its respective owner. Because the key pair is
mathematically related, whatever is encrypted with a Public Key may only be
decrypted by its corresponding Private Key and vice versa.
For example, if Bob wants to send sensitive data to Alice, and wants to be sure that
only Alice may be able to read it, he will encrypt the data with Alice's Public Key.
Only Alice has access to her corresponding Private Key and as a result is the only
person with the capability of decrypting the encrypted data back into its original form.
As only Alice has access to her Private Key, it is possible that only Alice can decrypt
the encrypted data. Even if someone else gains access to the encrypted data, it will
remain confidential, as they should not have access to Alice's Private Key.
Eng. Mustafa El-Komy 82 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Magnetic!stripe!cards/id!cards/passports!
ID cards
Some ID cards also use holographic image (hologram).
These are designed to make forgery of the card more
difficult. Holographic images change colour or appear to
have a moving object when the image is viewed from
different angles. Another form of security is to have a
photographic image of the card user printed on the card
surface.
Passports
Many passports contain an RFID tag, a photograph
and a holographic image.
The following are the step when somebody
approaches passport control at an airport:
1. The passport page containing the photograph
is placed faced down on a reader.
2. Microchip is read by a reader and the facial
image on the passport is also scanned in.
3. The owner of the passport now looks up at a digital camera and a photograph
is taken.
4. The photograph is compared to the scanned facial image.
5. The data read from the microchip is also compared to data stored on a central
database.
Biometrics!
Biometrics relies on certain unique
characteristics of human beings; examples
include:
• Fingerprint scans.
• Signature recognitions.
• Retina scans.
• Iris recognition.
Eng. Mustafa El-Komy 83 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
• Face recognition.
• Voice recognition.
The following table shows the advantages and disadvantages of using different
biometric techniques:
Biometric
Advantages Disadvantages
technique
Fingerprint scans • One of the most developed • For some people it is very
biometric techniques. intrusive, since it is still
• Very high accuracy. related to criminal
• Very easy to use. identification.
• Relatively small storage • It can make mistakes if the
requirements for the is skin is damaged (e.g.
biometric data created. cuts).
Retina scans • Very high accuracy. • Very intrusive.
• There is no known way to • It can be relatively slow to
replicate a person’s retina. verify retina scan with
stored scans.
• Very expensive to set up
and install.
Iris recognition • Very high accuracy • Very intrusive.
• Verification time is • Uses a lot of memory for the
generally less than five data to be stored.
seconds. • Very expensive to set up
and install.
Face recognition • Non intrusive-method. • It is affected by changes in
• Relatively inexpensive lighting, the person’s hair,
technology. their age, and if the person
is wearing glasses.
Eng. Mustafa El-Komy 84 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
2. Phishing!
Definition:!
The action of attempting to get sensitive data from the user via email.
Possible!effects:!
• The creator of the email can gain personal data, such as bank account data or
credit card numbers, from the user.
• This can lead to fraud or identity theft.
Methods!to!help!remove!the!security!risk:!
• Many ISPs or web browsers filter out phishing emails.
• Users should always be cautious when opening emails or attachments.
• Don’t click on executable attachments that end in .exe, .bat, .com or .php.
3. Smishing!
Definition!
Short for SMS phishing. It uses the SMS
system of mobile phones to send out fake
text messages. It is very similar to phishing
as described earlier.
These scams often contain a URL or a telephone number embedded in the text
message. The recipient will be asked to log on to the website or make a telephone
call. If they do, they will be asked to supply personal details such as credit/debit card
numbers or passwords. As with phishing attacks, the text message will appear to
come from a legitimate source.
Most people believe that only computers are liable to security threats and that mobile
phones are not at risk. This makes smishing a particular dangerous security threat to
many people.
Eng. Mustafa El-Komy 85 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
Possible!effects!
Same as phishing
Methods!to!help!remove!the!security!risk!
Same as phishing
4. Pharming!
Definition!
This is malicious code installed on a user’s
computer or on a web server, the code will redirect
the user to a fake website without their knowledge
(the user doesn’t have to take any action, unlike
phishing).
Possible!effects!
• The creator of the malicious code can gain personal data such as credit/debit
card details from users when they visit the fake website. Usually the website
appears to be that of a well-known and trusted company.
• Pharming can lead to fraud or identity theft.
Methods!to!help!remove!the!security!risk!
• Some of the anti-spyware can identify and remove pharming code from a
user’s computer.
• The user should always be alert and look out for clues that they are being
redirected to another website.
5. Spyware!
Definition!
This is software that gathers data by spying on the user.
Possible!effects!
• Spyware gives the originator access to all data
entered using a keyboard on the user’s computer.
• The software is able to install other types of
spyware, read cookie data and also change a
user’s default browser.
Methods!to!help!remove!the!security!risk!
• Use anti-spyware software.
• Always be alert and check for clues that their keyboard activity is being
monitored.
Eng. Mustafa El-Komy 86 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
• Use pointing device (or touch screen) to select characters from a drop-down
list when entering a password (banks often do this).
6.&Virus&
Definition!
This is a program code or software that infects the
computer and causes damage to it.
The code can replicate/copy itself with the intention of
deleting or corrupting files on a computer.
Possible!effects!
• Viruses can cause the computer to ‘crash’, stop functioning normally or
become unresponsive (when the user gets the ‘not responding’ message).
• The software can delete files or data on a computer.
• The software can corrupt operating system files making the computer run
slowly.
Methods!to!help!remove!the!security!risk!
1. Install anti-virus software and update it regularly.
Running antivirus software in the background on a
computer will constantly check for virus attacks. All
antivirus software has the following common
features:
• They check software of files before they run
or loaded on a computer.
• They compare viruses against a database
of known viruses.
• They need to be kept up to date as new
viruses are constantly being discovered.
2. Avoid viruses when accessing the Internet:
• Avoid unknown suspicious-looking websites.
• Look for security indicators while accessing a website, like https or the
padlock symbol.
• Do not open emails from unknown sources.
• Scan attachments before downloading them.
• Copy and paste the URL into the address bar rather than just clicking on the
link in the email or from an advert.
3. Don’t use software from unknown sources.
4. Scan hardware devices for viruses when connected to the computer.
Eng. Mustafa El-Komy 87 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
7.&Spam&
Definition!
Often referred to as junk email. It is usually sent out to a
recipient who is on a mailing list or mailing group.
Spammers obtain these email addresses from:
• Chat rooms.
• Websites.
• Newsgroups.
• Viruses that have been set up to harvest a user’s
contacts list.
Possible!effects!
• It can lead to denial of services.
o Denial of services is basically an attack on a network that is designed
to slow the network down by flooding it with useless traffic.
• Spam can be linked to phishing attacks or even spread of computer viruses.
Methods!to!help!remove!the!security!risk!
• To obtain the maximum protection when using the ‘junk email filter’, set the
protection level to high or to safe lists only. Make sure that the junk mail filter
is kept up to date.
• Look out for check boxes that are already selected when items are bought
online. Companies sometimes add a check box (which is already selected) to
indicate that you have agreed to sell or give your email address to third party
users. Make sure that this check box is ‘unticked’ so that your email address
can’t be shared.
• Do not sign up to commercial mailing lists.
• Do not reply to an email or unsubscribe from a mailing list that you did not
explicitly sign up to in the first place.
8.&Moderated&and&unmoderated&forums&
A moderated forum refers to an online discussion forum in which all the posts are
checked by an administrator before they are allowed to be posted.
Many users prefer this type of forum, compared to an unmoderated one, as the
moderator can prevent spam and filter out any posts that are inappropriate, rude,
offensive or even those that wander off the main topic.
The Internet is clearly an unmoderated forum. No one owns the Internet, and it is
essentially not policed.
Eng. Mustafa El-Komy 88 Theory Notes
Eng.! Omar El Safty
joinCh.6:
now :https://t.me/igcse_files
Networks !
I.C.T.
!
This brings us to the argument of policing the Internet. As mentioned earlier, the
Internet doesn’t have any controlling body that ensures that it complies with certain
standards. As a result, many inappropriate sites exist.
There are many arguments in favor of having control and others against it.
As a result, the user should be cautious when using their credit card online.
Eng. Mustafa El-Komy 90 Theory Notes
Eng.! Omar El Safty
joinCh.7:
now :https://t.me/igcse_files
System Development Life Cycle
I.C.T.
Chapter 7
System Development Life
Cycle (SDLC)
Analysis
Evaluation
Design
Documentation
Development
&
Test
Implementation
7.1 Analysis
System analysis involves examining the existing system in details, in particular:
• Collecting information about the existing system.
• Describe the inputs, outputs and processing of the current system.
• Identifying problems with current system.
Having carried out these stages, the systems analyst then needs to:
• Identify and agree customer requirements for the new system.
• Identify suitable hardware and software for the new system
Observation
This method involves watching personnel using the
existing system to find out exactly how it works.
Advantages
• Enables the systems analyst to see the
process as a whole to get an overall view of
the system.
• The systems analyst obtains reliable data.
• A relatively inexpensive method.
Disadvantages
• People are generally uncomfortable being watched and may work in a
different way.
• If workers perform tasks that violate standard procedures, they may not do
this while being watched.
Interviews
The systems analyst can interview key people within the system to find out how it
works.
Advantages
• Flexible, the systems analyst can change script
to suit circumstances.
• Allow lots of very detailed information to be
gathered.
• More likely to get truthful responses.
Disadvantages
• It can be a rather time-consuming exercise.
• It is relatively expensive (use of system’s analyst time).
• Not possible if large groups of people are involved.
• The interviewee can’t remain anonymous with this method.
Questionnaires
This method involves distributing questionnaires to the workforce, clients or system
users to find out their views of the existing system and to find out how some of the
key tasks are carried out.
Disadvantages
• Workers may exaggerate their answers.
• The number of returned questionnaires if often low.
• The questions are rather inflexible since they have to be generic.
Advantages
• This method allows information to be obtained which wasn’t possible by any
of the other methods.
• Systems analysts can see for themselves how the paper system operates.
Disadvantage
• It can be very time-consuming.
• Because of the systems analyst’s time needed, it is a relatively expensive
method to use.
• Documents can sometimes be difficult to understand.
7.2 Design
Using the list of requirements, the design team (composed of system designers and
sometimes the systems analyst himself) now has to design the new system. The
design team needs to:
• Design data capture forms and screen layouts.
• Design reports layouts and screen displays.
• Design validation routines.
• Design the required data/file structures.
7.2.1
Designing
Data
Capture
Forms
for
Data
Input
To get data into a system is a two-part process:
• Data must first be 'captured'
(collected in a way that then
makes it easy to input)
• Data must be input into the
computer
The systems analyst selects a data
capture method and data input method
that best suit the requirements of the
new system.
Much of the data that enters computer
systems needs to be typed in. A well-
designed data capture form can make
this task easier and quicker.
Data capture forms should:
• Have all of the necessary fields.
• Have obvious places for user input (boxes, use of colour, etc.).
• Use appropriate controls (see right) for each field.
• Have text box controls that are the right size for the data.
• Have easy-to-understand instructions (if needed).
• Make good use of the screen area available.
As data is entered into the form, it needs to be checked for accuracy. Two
techniques help us do this: validation and verification.
Data
Validation
Techniques
Validation is a process where data is checked to see if it satisfies certain criteria
when input into a computer. A number of validation techniques exist.
Existence check Checks if data from a list has e.g. When signing up to a
been chosen and not left social networking website,
blank the country list may contain
existence check. If the user
doesn’t choose a country
from the list then an error
message will be displayed
Boolean check Checks that the input data is e.g. If a database admin
from only two options. wishes to restrict the users
to enter only ‘M’ or ‘F’ in the
Gender field, then the admin
should put Boolean check on
the Gender field that accepts
only characters ‘M’ or ‘F’
Check digit A validation check used in e.g. Validating the
barcodes to validate the correctness of a barcode
correctness of the barcode.
This is done by adding an
extra digit to the left that is
calculated from the rightmost
digits using some formula.
Visual
check
This is checking for errors by the person who is entering the data. They compare the
entered data with the original document (i.e., what is on the screen is compared to
the data on the original paper documents – note that this is not the same as
proofreading).
7.3.2
Testing
Software is often developed in modular form. This method allows the software to be
broken down into smaller parts (known as modules). Each part is developed
separately by a programmer (or team of programmers) and is then tested to see if it
functions correctly. Any problems resulting from the testing require the module to be
modified and then tested again.
Once the development of each module is completed, the whole system needs to be
tested (i.e., all modules functioning together). Even though each module may work
satisfactorily, when they are all put together there may be data clashes or
incompatibility, memory issues, etc.
All of this may lead to a need to improve the input and output methods, database,
validation and verification methods, etc., and then test everything fully again. It is a
very time-consuming process but it has to be as perfect as possible before the
system goes live.
To sum things up, there are two main testing strategies:
• Test each module.
• Test the whole system.
Testing will use many different types of test data, which will fall into one of four
categories:
• Normal.
• Abnormal.
• Extreme.
• Live.
Normal
data
This is data that is acceptable/reasonable and has an expected outcome. For
example, the month can be any whole number in the range of 1 to 12.
Abnormal
data
This is data outside the limits of acceptability,
Normal
or wrong type of data, and should be rejected
or cause an error message. For example, all
Extremes
the following values are not allowed as inputs
for the month:
• Negative numbers. Abnormal
Extremes
Abnormal
• Any value greater than 12.
• Letters or non-numeric data.
• Non-integer values (e.g., 3.5,10.75, etc.).
Extreme
data
This is data at the limits or acceptability. For example, the extreme values of month
can be either 1 or 12.
Live
data
Once the system has been fully tested, it is then tested with live data. Live data is
data with known outcomes. Live data is entered into the new system and the results
are compared with those produced from the existing system. Further modifications to
the software may be needed following this testing procedure.
The following table shows an example:
7.4 Implementation
After the system has been developed and tested the system analyst will want to get
the system up and running. There are four methods of implementation:
• Parallel running
• Direct Changeover
• Phase implementation
• Pilot running
7.4.1
Parallel
Running
The old and new systems run side by side for a time before the new system takes
over completely.
Old
System
New
System
Advantages
• If the new system fails, the old system will still be available as a backup.
• It is possible to gradually train staff.
Disadvantages
• More expensive than direct changeover as since extra staff is needed to run
both systems together.
• More time consuming than direct changeover since data needs to be entered
into two systems.
7.4.3
Phased
With phased implementation, only part of the new system is introduced and only
when it proves satisfactorily, the next part is introduced, and so on, until the old
system is fully replaced. For example, the production of invoices is done by the new
system whilst other aspects like payroll and processing of orders carries on as
before.
Advantages
• If the latest part fails, it is only necessary to go back in the system to the point
of failure; hence failure isn’t disastrous.
• It is possible to ensure that the system works properly before expanding.
Disadvantages
• More expensive than direct changeover since it is necessary to evaluate each
phase before moving to the next stage.
• Very time consuming since each part needs to be fully evaluated before
making any further changes to the system.
Old system
New system
7.5 Documentation
Once the new system is fully developed, a considerable amount of documentation
also needs to be produced for:
• The end-user.
• Specialists who may need to modify and develop the system further at some
later stage.
Thus, there are two types of documentation: User and Technical.
7.6 Evaluation
The purpose of an evaluation is to assess the system to see if it does what it was
supposed to do, that it is working well, and that everyone is happy with it in order to
carry out any maintenance if necessary.
When the new system is evaluated, the following questions will be asked: Is the
system:
efficient?
• Does it operate quickly, smoothly and with minimal waste?
• Is the system saving time, and resources?
easy to use?
• Are all of the system's users able to use the system easily and effectively?
• Can new staff understand and use the system with minimal training?
appropriate?
• Is the system suitable for the particular business / organization?
• Does the system actually meet the needs of the business / organization?
The following is a list of some of the techniques used to evaluate the new system:
• Comparing the final solution with the original task requirements.
• Identifying any limitations of the system.
• Identifying any necessary improvements that need to be made.
• Evaluating the user’s responses to using the new system.
Audience appreciation
When planning and creating ICT solutions, it is important to consider the audience
who will either use or take part in this solution in order to achieve better results.
These better results are in terms of:
• Users’ satisfaction.
• Users’ response and appreciation.
The following list shows a number of factors that should be considered:
• The age of the target group.
o Young children will have a different response compared to more
mature group of adults.
• The experience of the audience.
o A board of company directors would expect a different approach
compared to an audience composed of school children.
• The expectations of the audience.
o For example, if you are advertising or giving a presentation on a new
restaurant, an older audience would expect to see good waiter service;
whereas a group of students would be more interested in pizzas and
fast counter service.
• Knowledge of the audience.
o For example, graduates in maths would expect to see a different
approach to a solution than a group of history students.
When starting to look at the ICT solution, some or all of these factors need to be
taken into account. Some research needs to be done first to find out about the target
audience. This could be done by:
• Interviewing a cross section of the target group to find out how to engage the
audience.
• Giving out questionnaires to people in the target group to find out their
background, interests, and so on, so that the final solution can be tailored to
meet the full expectation of the audience.
• Carrying out market research – this could involve the two techniques
described above, but would certainly involve a more sophisticated and in-
depth analysis of the data received.
Legal
Anything that breaks the law is termed illegal.
Examples would include breaking the software copyright by, for
example, copying software and then selling it without the
permission of the copyright holders.
Morality
Morality covers the human desire to distinguish between right and wrong.
The only problem here is that culture can get in the way.
What may be immoral in some cultures is regarded as
acceptable practice in other cultures.
Note that, if something is immoral it doesn’t mean that it is
necessarily illegal (and vice versa).
For example, creating fake websites is not in itself illegal
(provided that the person who carries out the act doesn’t try to gain from their
actions), it is simply an immoral act since it can cause distress to others who aren’t
aware that it was simply a harmless prank. However, as soon as they try to obtain
personal and financial data then it becomes an illegal act.
Some people regard hacking as simply immoral. This again ceases to be true if the
act of hacking leads to breaking national security, or financial gain or leads to
revealing of personal information.
Ethics
Ethics governs professional interactions by a society or group of people (it
sometimes goes against an individual’s own sense of morality). Unethical behavior
is essentially breaking a code of conduct/ethics.
For example, if somebody works for a software company and passes on some of the
ideas to a rival company, this would be regarded as unethical behavior.
Culture
It refers to the attitudes, values and practices shared by a society or group of people.
The importance of culture is less clear-cut.
For example, writing software games that make fun of religion could be seen by
certain people as unacceptable behavior – but some cultures would find it funny and
would understand why it seen as offensive.
When writing computer games, for example, programmer need to be careful that
they don’t include items which some cultures would find offensive.
Chapter 8
Effects of using ICT
Software
piracy
It is illegal copies of software.
Software piracy is a considered to be a big issue
amongst software companies. They take many steps to
stop illegal copying of software and to stop illegal copies
being used once they have been sold. There are a
number of ways to protect software from software piracy and copyright infringement:
• When software is being installed, the user will be asked to enter a unique
product key, which was supplied with the original copy of the software.
• The user will be asked to click ‘OK’/’I AGREE’ or put a cross a box to agree to
the license agreement (which has the copyright rules) before the software
continues to install.
• The original software often comes with a sticker informing the purchaser that it
is illegal to make copies of this software. The label is often in the form of a
hologram indicating that his is a genuine copy.
• Some software will only run if the CD-ROM, DVD-ROM or memory stick is
actually in the drive. This stops illegal multiple use and network use of the
software.
• Putting digital signature on the CD/DVD itself, which prevents writers from
copying exactly.
• Some software will only run if a dongle is plugged into one of the USB ports.
Office work
By the introduction of computers and new
software, many tasks could be done by fewer
staff and in much shorter scale. Skills like filling
and carrying out numerical analysis manually
have effectively been replaced by sophisticated
software (word processors, spreadsheets and
databases). As a result, office work especially
payroll workers and typing pools have suffered from job losses.
Manufacturing
Job losses due to ICT have affected
industry even more than in the office
environment. The introduction of
machines and robots has revolutionized
how items (such as cars) are produced.
Car manufacturing is one of the biggest
fields that have experienced great job
losses as it makes considerable use of
robotics. One robot is capable of doing
the same tasks as a number of workers,
and as a result, the need for manual laborers has greatly reduced.
Positive
effects
While the introduction of new software packages and robots has clearly resulted in
staff reductions, the positive side is the need for better-trained people, the need
for trainers, and the creation of new ICT-related work.
Offices have become more pleasant and safer places to work (no noisy typewriters
or the dangers of heavy, overfilled filing cabinets), while the introduction of robots in
Part-‐time
working
It is working fewer hours per week than full-time staff. This can be either fewer hours
per day or fewer days per week.
Flexible-‐working
(flexi-‐time)
It is any working schedule outside the traditional working pattern. Flexi-time is the
ability to choose the start and finish times, but they must complete a full day’s work.
This requires agreement with the employer to ensure the office is operated at all
required times.
Job
sharing
With job sharing, a full-time job is divided between two part-time workers. For
example, one could work in the mornings and the other the afternoons – or one could
work Monday to Wednesday and the other from Wednesday to Friday. Both workers
are doing the same job, so one picks up the work where the other left off.
Compressed
hours
In compressed hours, an employee works their full hours for the week (40 hours for
example) but works for fewer days. For example, they may complete their 40 hours
in four days rather than the normal five days.
Disadvantages
• They can lead to unhealthy lifestyles because of the reliance on ready-made
meals, for example.
• They tend to make people rather lazy since there is a dependence on the
devices.
• People can become less fit if they just lie around at home while the devices
carry out many of the previous manual tasks.
• Tasks carried out by people in the past are now done by microprocessor-
controlled devices, which means there is a potential to lose these household
skills.
Eyestrain
Caused by staring at a computer screen for a long time or having incorrect lighting in
the room.
Headaches
Caused by staring at a computer screen for a long time or having incorrect lighting.
Heavy equipment • Use strong desks and tables to support heavy hardware
falling and causing • Use large desks and tables so that the hardware isn’t too
injury close to the edge where it can fall off
Fire risk • Have a fully tested CO2 dry fire estinguisher nearby (not
water estinguishers)
• Don’t overload sockets with too many items
• Don’t cover computers with paper or fabric (towels or
sheets) since these can either block ventilation holes
(causing computers to overheat) or there materials could
catch fire
• Ensure good ventialltion in the room to stop overheating
of hardware
• Make sure that the electrics used in the hardware is fully
maintained
• Change to low-voltage hardware wherever possible (e.g,
replace CRT monitors with LCD and LED monitors)
8.7 E-safety
Definition
of
Personal
Data
Personal data refers to any data concerning a living person who can be identified by
this data.
Examples of personal data include:
• Name.
• Address.
• Date of birth.
• Medical history.
• Banking details.
Some personal data is often referred to as
sensitive personal data and includes:
• Ethnic origins.
• Political views.
• Religion.
• Sexual orientation.
• Criminal activity.
Search
engines
Search engines are useful if you don’t know the URL
of the website or if you want to find some
information but don’t know here to look. Many
search engines exist, and they search for websites
using a variety of methods, but they all have on
common underlying feature: they use the words
entered in the search box and look up in their
database of webpages to find out which of them
match your search words/text.
Obviously, the more specific your search words/text, the more accurate the results
(know as ‘hits’) will be.
Once the information is found it can then be saved or used as follows:
• Saved as favourite and accessed when required.
• Adding hyperlinks in a document, so that his web page can be accesed when
required.
• Using ‘Print Screen’ (taking a screenshot) and then pasting the saved
information into a word processor page.
• Copy and pasting the information into another document (don’t forget to cite
the information to avoid plagiarism).
Blogs
Blogs (web logs) are personal internet journals where the
blogger will type in their observations on some topic (for
example, a review about the latest movie release) and perhaps
provide links to some relevant websites.
Blogs tend to range from minor projects (such as the
performance of an actor) through to important social issues.
However the comments made on blogs are not immune from
the law: bloggers can still be prosecuted for writing offensive material.
Features of blogs
• Entries normally come from a single author.
• Other internet users can only read and comment on the material on blogs.
• Public.
Microblogs
Microblogs are similar to blogs but are most often used on social networking sites to
make short, frequent posts. The posts can be done using instant messaging, emails
or other social networking vehicles (such as tweets). Social networking sites use
microblogs to allow members to update their personal profiles, for example (user
profiles on Facebook).
Wikis
Wikis are web applications or websites that allow users to
create and edit web pages using any web browser. They
are often described as ‘web pages with and <edit> button’.
Features of wikis
• Many authors can be involved in a wiki.
• Anyone can edit, delete or modify the content.
• Keeps track of all entries – i.e. it stores a document history.
• Allows large documents to be seen by many people – it is easier than
emailing several people.
Examples of wikis:
• Wikipedia
• Wikibooks
• Wikidata
• Wikimedia
• Wikisource
Advantages
• Information on the internet tends to be up-to-
date since it is quicker and easier to amend
web pages than, for example, to reprint books.
• The internet has vast, almost limitless, amounts
of information.
• Searching for information using a search engine is fast and easy.
• People can look for information in the comfort of their own home – there is no
need to travel to a library to find the required book(s).
• Most of the information on the internet is usually for free, unlike the
books/magazines.
• Pages on the internet can have multimedia files (for example, videos,
animations, cartoons, music and voiceovers) that make learning more
interesting and often make it easier to understand the topics.
Why
are
internet
searches
to
find
relevant
information
not
always
fast?
When using search engines, there is always the danger of information overload. It
is possible for millions of sites to be found matching the given criteria. Thus, unless
the user narrows down their search criteria, it can take a long time to find out exactly
what they are looking for. Also, if the user is uncertain of what needs to be asked, it
can also take a long time to obtain relevant information.
In addition, while search engine companies deny it, certain websites are placed at
the top of their lists. When a user keys in certain words, these websites in the list
always show up first in the search results and may not contain exactly what the user
is looking for.
Why
isn’t
it
always
easy
to
find
reliable
information
on
the
internet?
When using a search engine to find information on the internet, there is no guarantee
that the material returned is accurate or unbiased. Essentially, anybody is able to set
up website and write whatever they like without having to be first verified.
Consequently, the material can be inaccurate or unverified and it can also be biased
towards one way of thinking only. Unlike books, the material posted on websites
doesn’t have to be checked by other people to ensure it is correct. It is also possible
for search engines to suggest websites that are completely out of date so that the
information displayed on the webpages is no longer correct or relevant.
How to evaluate the reliability of information found on the internet?
Undesirable
Information
In addition to having websites that contain inaccurate information, there are also a
huge number of websites that contain highly offensive, or illegal material.
Many organizations such as schools, some governments (e.g. for religious reasons),
and also many parents, make use of web page filtering software. This software
attempts to prevent offensive and illegal material being accessed.
Even if filtering software is not installed on a computer, you can still take steps to
help you avoid these types of sites:
• Use the 'safe search' feature on search engines such as Google.
• Don't click the links that are shown in junk email (spam).
• Think carefully about the keywords that you use to search with.
ICT Applications
13
(June&2008)&
(June&2009)&
(June&2008)&
1
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
(Nov&2009)&
2
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
(Nov&2009)&
3
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
(Jun&10&V.1)&
(June&2009)&
87
(Jun&13&V.2)&
4
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
(Jun&10&V.1)&
(Specimen&2016)&
5
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
10
(Nov&11&V.1)&
6
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[6]
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[3]
7
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
13
(Specimen&2016)&
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[3]
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[2]
8
join now :https://t.me/igcse_files
Chapter Nine Classified Eng. Mostafa El-Komy
Eng. Omar El Safty
16 Define the term Holography, naming three applications that make use of holographic
9 images.
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[4]
17 There are areas outside manufacturing where robotics is evolving rapidly. Discuss.
.................................................................................................................................
.................................................................................................................................
.................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
[4]
.............................................................................................................................................
9
joinCh.10:
now :https://t.me/igcse_files
Banking Applications s
I.C.T.
Chapter 10
Banking Applications
Batch
Processing
Sometimes we have a lot of data to process and it is all of a similar form (e.g.
calculating the pay for 10,000 employees; the calculations we have to do for each
employee are very similar). In cases like this, we can prepare the data into a set or
'batch' and hand it over to the computer to be processed in one go. Once we have
prepared the batch of data, no user input is required - the computer works its way
through the data automatically.
This type of data processing is known as batch processing.
An advantage of this type of system is that the processing can occur when the
computer is not being used for anything else (e.g. overnight). The job is setup,
people go home, and when they return the next morning the work will be done.
Real-‐Time
Processing
Sometime we need to process data immediately - we cannot wait and process it later
(e.g. using batch processing). For example, if we want to book a seat on a flight, the
booking must be processed immediately. We can't put it in a pile and do it later,
because other people might be trying to book the same seat.
If an item of input data must be processed immediately, and the result is ready
before the next input data is accepted, this is known as a real-time system.
On-‐Line
Processing
An on-line system is one where the user is directly interacting with the computer - the
user is 'on-line' with the computer.
So, any system where the user is entering data directly into the computer must be an
online system. If data is being entered and then processed, it's an on-line processing
system.
1.
EFTPOS
Before going through the process of EFTPOS, we need to introduce two main
terminologies: Electronic Fund Transfer and Point of Sale.
Note that checking for reordering stock from suppliers is done before updating the
database with the new value of stock.
4. All cheques sent by CIB to the centralized clearing center are sent back to
CIB after processing them.
5. CIB then delivers all processed cheques to an exchange center.
6. The exchange center passes all cheques to their corresponding paying
banks (HSBC Bank in this case).
7. HSBC receives the cheque and sends it to its own clearing center to be
checked.
8. At HSBC’s clearing center, the digital signature is first checked and then the
cheque is passed through HSBC’s own MICR to scan the cheque and to
make sure that the data matches with that on the IBDE file.