Unit 1 IT Revision Mat V1.2 2018
Unit 1 IT Revision Mat V1.2 2018
Other devices like personal computers connect to the servers via a range of means such as
Personal Computers
ethernet cables and wifi. Depending on the types if servers other computers can connect
Personal Computers are computers with a general purpose by installing new software
to them and access resources.
and different applications the device dance have a completely new function.
Personal Computers contain individual processors, ram and hard components along
They are similar to personal computers and commonly contain larger storage capacities
with disk components and expansion ports. This makes it extremely easy to upgrade
and higher amounts of memory. Examples of servers include web servers, mail
them to add capability’s to our devices such as replacing the hard disk to adding more
servers, file servers and print servers.
storage or adding graphics card to an expansion port to improve graphics processing
power.
Web Servers - manages access to web pages they store webpages and associated files.
When a client computer makes asks for a web page using a URL the web server locates
Uses
the correct file and sends them back to you.
Personal computers have a wide range of functions, they have a wide range of functions
there are some popular uses.
Mail servers - Manage access to emails, when you send an email it goes to an outbound
For example word processing, desktop publishing, and database
server then it is sent across a network and when a user logs into their computer and
Management systems as well as graphics, music and film editing.
email account the email is forward to their computer.
This is due to a wide availability of software, goods processing
capabilities and the range of available input devices. For
File Servers - Store your files such as word documents and
example a mobile device doesn’t use a keyboard and isn’t useful
spreadsheets which can be accessed by any computer the files
for word processing.
are stored on a server and become available when logging in
We use these devices for daily accessing the Internet and
this is cloud storage.
surfing the web. They come with networking capabilities and
Print servers - They operate by storing jobs on a server
computers require expensive graphics cards if used for
until you log into the printer and release the job.
gaming.
Unit 1
Digital Devices 1
Entertainment Systems
Mobile Devices
They are designed to entertain via watching listening and playing. They usually contain
good hard disks storage for TV/Films and music. They commonly have wifi connectivity A computing device are designed to be portable being compact light-weight and running
for streaming and downloading content. on battery and connect to wifi.
Examples of entertainment systems include digital media players, mp3 players & video They have devices which are System-on-a-Chip which are integrated on a single chip this
game consoles. chip has a GPU and a RAM and CPU. However they are very difficult to upgrade as all
the components are integrated.
All these devices are used for home entertainment. Digital devices allow us to stream
digital media such as films, tv, music and images from over a network. Uses
Mobiles are a massive part of peoples lives and are used for most tasks, like PCs they are
This can be done with devices such as Apple TV and Chrome Cast. Instead of streaming used for all kinds of tasks and functions can be changed by applications.
we download the media and play it off the hard disk.
Most people use mobiles for browsing the web, emailing, and playing games they are also
MP3 players are able to access thousands of songs and on MP4 player we are able to used for organisational functions.
video and other forms of auditory.
These devices daily have touchscreens and this makes them impractical for word
Video Game consoles allow you to play video games and even use the Internet to play processing as they don’t have keyboards and intensive tasks.
video games.
Multifunctional Devices
Digtial cameras are able to capture data such as video as digital data.
It does this by using a grid of photosensors that convert light into a digital pixel that
A multifunctional device is usually related to as MFD’s they are multifunctional
our computers can read and store the data is usually stored on memory cards we refer to
peripherals.
a camera as having Mega pixels are indervidual pixel of colour is used to record an
An Example is a device can both perform an input and an output such as a Printer/Fax
image.
even tho both functions are outputs. Printers can offer several functions such as scanning
and photocopying other examples include multifunctional printer, touchscreens and force-
20 megapixels is a higher quality image.
feedback games controllers.
Most digital cameras contain bullt in memory card slot. As the memory card is removable
Uses
it will allow you to transfer pictures to another device such as laptop.
A multifunctional printer can print copy and scan and are usually used in home and offices
Examples of digital cameras include digital still cameras and digital video cameras.
and saves money on separate devices.
Uses
Touchscreens are used on tablet devices and allow users to input without a keyboard or
mouse. The user uses the touchscreen to view and input input can be made with an
One use of digital cameras is to allow use to share them using
onscreen keyboard.
computers we often uploads pictures and videos to our social
network profiles we like to share and its also done through email.
Force-feedback controllers are used on games consoles and allow
We also edit and manipulate videos and pictures using
You to control the game and receive vibration output is designed
photoshop.
To make the experience more immersive. Such as when you
Fire a virtual gun you will receive feedback.
Unit 1
Digital Devices 2
Communication Device & Systems
Data Capture and collection systems
It has become essential for all of our
Data capture and collection systems input data computing systems to be able to talk to each other through
and store data through methods other than direct data entry. the internet or smaller networks.
This allows the data to be entered into a computer system directly during the data
capture stage so reduces the amount of human errors. Examples of data capture & Communication devices allow us to transmit data between device over a network in
collection systems include barcode scanners, optical mark readers (OMR) and magnetic various ways. Sometimes through wired cabling sometimes wireless.
ink character readers (MICR). Examples of communication devices include network interface cards (NIC), wireless
dongles and routers.
These devices are often used at EPOS tills in shop.
Barcodes - Scanners capture data reading widths of dark and light bars they are on Our devices are all used to transmit data over a network commonly the internet or a
the back of most products when the barcode is read then it matches it to the database and LAN.
returns the price of the item.
Network, interface cards for example allows to be transferred to and from a networked
OMR is used shops for inputting lottery tickets pre printed when are marks are placed on computer using a ethernet cable.
the form then the OMR devices detect the markings and see what number you have
ticked. Wireless dongles allow you to ether transfer data to a router wirelessly as part of a
mobile broadband network often integrated into a smartphone.
MICR - is used for verifying that cheques are legitimate. A special kind of magnetised
ink used on the bottom of a cheque MICR device reads the magnetic codes. A router directs data to its correct destination over a large network wherever two
networks meet a router is required to direct the data to its correct place.
Eduction and Training
Interactive whiteboards are used by teaches in order to support teaching in-front of a Personal
class. These interactive whiteboards are multifunctional as they can have input and output
commands. This is beneficial over using a traditional whiteboard as notes can be saved to Entertainment systems - are used everyday as personal computers and tablets to watch a
a centralised location and can be accessed by students outside of a class room and can be Films and TV. In particular internet streaming has changed the way we access TV and
edited. film. By playing them straight from the internet we can save disk space and makes
content cheaper. Video games consoles are very popular in the home they allow use to
VLE - Virtual Learning Environments are used in schools as websites it allows teachers play games with friends and family. The drawbacks are that the growth of piracy,
to upload resources and share presentations and worksheets so that they can share them where TV, Films, Music and Games are illegally transferred over the internet.
with students. This allows access to their learning at home so they can prepare for lessons
and exams and submit their work for assessment and allow students to take part in a Online Shopping and Banking - Another major way that personal computers are used
discussion. are for online banking. Online retail websites like Amazon allow use to purchase pretty
much anything. Most popular high street stores have a websites.
Online Learning - Online learning environments are websites such as BBC BITESIZE Online banking has allowed for us to manage our finances which include checking our
We access sites though the internet and on mobile devices which allow access to content bank statements and transferring money. We can all do this without ever needing to
such as animations as well as visual and audio explanations. visit a bank. OB is extremely helpful for disabilities who would have difficulty getting
to physical bank.
A type of detail camera called Web Cam is extremely popular
for live training and conference calling. Home appliances can be controlled by many aspects of a digital
device this is known as Ubiquitous Computing an example of
this is controlling our central heating systems and being
able to see our fridges when we are running low on food.
This offers great convents and helps reduce costs.
Unit 1
Using Digital Devices
1&2
Social Networking
We use devices to access social networking such as Facebook to socialise with friends. This allows us to create Networks of friends.
We are able to share life events and message people directly.
Social networking sites allow you to create or join a group to talk to people with similar interests. Their are many drawbacks such as
they can be seen to be distracting and can often affect productivity in the workplace.
Instant Messaging -allows us to hold real time text messages based conversations with others. In many cases it replaces SMS text
messaging many people use WhatsApp. This is because these apps make messaging much cheaper as they allow use to hold
conversations free of charge and allow use to attach files. Instant messaging is proprietary meaning you need the person to have the
same IM as for example iMessage can only be used with Apple Devices.
VoIP - Voice over Internet Protocol is a type fo software that allows you to have a real time voice and video conversation Skype is a
popular kind of software. We can commonly use personal computing devices to hold VoIP calls or mobile devices Smart TVs and games
consoles can use Skype. This has become more popular as an alternative to phone calls in recent years. This to do with the ability to
hold group conversations at a much cheaper price this makes it a great tool.
other reasons.
Organisational Use
EPOS - Electronic point of sale is computerised checkout tills For example barcode
readers are used to add new products to a sale, Optical mark readers use used to input
Businesses use digital devices to make themselves more efficient.
lottery tickets. Magnetic ink character readers are used to verify cheques and chip and
Administration - Businesses use spreadsheets and accounting software to manage their
pin devices both are used for making payments. We can also use mobile devices by using
finances by tracking there sales and expenditure. Most business will make use of
NFC such as Apple Pay. This has made the sales process much quicker and efficient.
personal computers to use software like word processing a desktop publishing. This
We now even have self service tills so companies can save money by employing less
might be producing a sale report or giving a presentation to investors. Thanks to
people.
servers which are communication devices we can share information through email or
over the LAN. This helps make businesses more productive as less time is spent
Stock Management - personal computers and servers are used by shops EPOS’s are
correcting human error as it is done via a computer.
also connected to databases and when an item is sold the information goes through a
database and server and reduces the stock level. A stock management server can be
Video Conferencing - There are a number of software packages that allow you to hold
connected to the internet so it orders new stock automatically. This saves time and
meetings over the Internet as opposed to face to face. It allows you to have voice and
money as business’ doesn’t have to employe people to manage stock and reduces the
video conversation. They software allows for people to take part in meetings and share
human error level and doesn’t make you
documents. This saves a business a lot of time as employees will not have to meet or
order products incorrectly.
be a the same location.
Retail Websites - most popular stores will have a online
Design & Manufacturing - The manufacturing and construction
website to sell products to run an online website you need a
industry uses CAD software which is computer aided design
Web server to host and needs a PC to update the site.
this is used in technical drawings this allows for detailed
drawings we can use detailed drawing to build things and
Print using a 3D printer to produce models.
Unit 1
Using Digital Devices
1&2
Creative Tasks
The creative industry has benefits from a lot of growth of digital devices.
3D graphics the video game and film industry make heavy use of personal computers for 3D graphics. These graphics are called
CG effects these 3D models are used in most films and are more flexible and 3d models made. Similarly the majority of high end
video games use 3D graphics. High end video have high end 3D graphics.
Photo/Video Editing - When we take photos and videos using digital cameras. Professional photographers now heavily use both
digital cameras and personal computers for this purpose such as fixing the lighting of a picture or the saturation or removing a red eye.
However photo editing has been subject top contriversy as we see unrealistic expectations of beauty particularly with young people. In
addition the movie industry is very reliant on these technologies most film is shot on digital cameras then the video is edited using a
personal computer.
Graphics Design - Logos leafless and brochures are all designed with graphics software and desktop publishing software.
Graphics designers used to do the majority of their work by hand and typing was positioned inderviually however now desktop
publishing software does it automatically, This is much more efficient than manual type sets which otherwise would be a painstaking
and we can also sending data of to a printer quickly.
with disabilities.
Printer - is a device used to produce physical copies documents used in computer
Microphone - An audio input that allows uses to input sound which is commonly used for
systems. A Braille embosser will print with dots in the paper so that people with Visual
holding VoIP conversations used for recording your voice.
impairments can read the document.
Webcams - A device for recording digital video for VoIP conversations.
Plotter - A type to printer that is designed to print out vector images which typically prints
in high quality. This is typically used to print out CAD designs.
Game Controller - Used to control video games in the form of a gamepad or joystick
these can contain. Force-feedback so the device rumbles.
Speakers - are a device used to produce audio output by converting
digital signals to analogue signals. It is commonly used to listen to
Sensor - This is an input device that takes readings from the
music and take part VoIP conversations. Headphones are
environment such as temperature or light an example could
auditory devices.
be a thermostat.
Actuator - An output that produces motion which we use to
Scanner - A device that converts documents into digital data
move things. They are commonly used as part of
It can be hard for scanning images for editing.
Ubiquitous Computing an actuator that turns the
heating on an off.
Graphics Tablet - A flat boarding pointing device known as a
stylus that allows a user to enter data much like they are using
pen and paper. They use it for producing logos.
Unit 1
Input & Output
Devices
Advantages Disadvantages
• HDDs offer a big storage capacity for a • HHDs have a relatively slow read and
low price 1 TB for £50 Hard Disk Drives
write speed than SSDs. Solid State Drives
These are commonly used as the primary storage devices in a computer system they can They are often uses as portable devices with a large capacity they are usually a primary
also be uses as an external storage device. storage device in laptops. SSDs are a form of flash memory. They store data on
semiconductors and the chips can be switched on and off sold state drives remember the data
• They HDDs
are alsoareconsidered
a form of reliable
magnetic method
storage devices
• Theymade of magnetic
also have a number materials
of movingthatparts
we call even after being turned off.
of storage methods
platters the Hardas Disk
they have
Drivea magnetises
long and demagnetises billions of tiny individual
which makes then easily damageable.
life span and It
platters. tend to to fail
registers out right.
as binary 1s are magnetised areas and 0s are demagnetise areas. Advantages Disadvantages
• SSDs have extremely fast read and write • SSDs are much more expensive 1tb will
speeds compared to hard disk drives cost £200 (£50)
• They also consume less power than • Due to this higher cost this means storage
HDDs this makes them very good for will generally have a much lower capacity
devices that run off batteries. than HDDs.
• As they have no moving parts they are • SSDs have a finite number of writes before
less likely to be damaged which they no longer work this means they will be
less useful for devices that a lot of writing
makesOptical Disks
USB Flash Drives like servers.
them useful
These devices involve a USB connector and flash memory in order
Unit 1 CDs and Blue Ray disks are all examples of optical disks used
for storing Music TV and Films, all of these different types of
to store data with portability in mind. They are commonly used for
transferring data between different computers.
Storage Devices disks are a form of optical disks, a light is bounced off the
disk and is read back differently depending on whether the light
bounces off a marked or non-marked area. Marked areas
USB flasherives use flash storage much like SSDs and so they
are 0s and non-marked areas are 1s.
store data the same way.
Advantages Disadvantages
• The vast majority of personal computers have optical disk
• An individual disk has a small storage capacity up to 50gb.
drives.
• USB flash drives are very • There a small storage media which makes them highly • Optical disks are easy to damage with scratches.
portable storage devices due to portable.
• They only have a finite number of writes 1000 times
their small size and light weight
they are easily connective.
• Due to the small size they can
easily be lost.
SD Cards
•Much like SSDs USB flash
drives have a finite amount of Secure Digital Card which is a very small memory card which is commonly used in digital camera and in mobile
writes however people don’t devices like smartphones because they are small enough to fit inside. USB flash drives store data in the same way as
usually write to USB flash SD cards.
drives often.
• • SD cards have a low storage capacity compared to other
• Much like SSDs because they • Compared to HDDs and SSDs SD cards are extremely small and portable even compared
to USB drives making it very easy to transfer data between
devices 32 - 64gb are common capacity’s.
no moving parts this makes USBs have a relitivly low
devices.
• There are a lot of vareitys in SD cards SD, SDHC, SDXS
storage. are common. There are other types of flash memory
them reliable and durable as • Again like other forms of flash storage they are reliable which can lead to compatibility issued with SD Card
they’re unlikely to be and wont break when bumped.
readers.
damaged by knocks.
• USB connectors in the device
are highly compatible.
Real time operating systems - This type of operating system monitors external events
and processes data as soon as it enters the computer system to allow the computer to
respond immediately to the input. Real time operating systems are embedded in devices
Data Processing
such as aeroplanes, traffic lights and automatic systems.
Manual Data Processing - involves an individual entering data into the computer
Single User, Single Task Operating Systems - A single user single task operating
themselves. This might be used by a hotel clerk entering customers booking details using
systems can only be used by one person at a time and complete one person
a keyboard or marking examination papers.
application. This was popular in older smartphones digital assistants like palm devices
this used a single user single task called Palm OS.
Automatic Data Processing - makes it easy for data to be inputted as its done
automatically. For example Smart monitors will input data about how much
Single User - Multi Tasking Operating Systems - This type of operating system is also
electricity and gas you were using and send it to energy companies so they can give you
designed for only a single users at a time however it can run multiple applications at
the correct bill. Optical mark readers in schools do this for registers.
once. Such as Windows 10 and MacOS. We commonly see this operating system on
Manual Automatic smartphones and computing devices.
• Human error - people are Multi-User Operating Systems - A multiuser operating system allows
prone to making mistakes many users to make use of a computer system and all of its
•
Data is accurately entered into
resources at the same time.
• Time Consuming - Takes a lot the system with out error
of time to input data. • Time & cost - data entry can Powerful servers, supercomputers and mainframes make use of
be done quickly without hiring Multiuser operating systems.
staff.
• Complex data - can be entered. • Learning Curve - New systems
• Reduced Training as staff are often require staff training.
used to manual systems
Unit 1
Data Processing &
Operating Systems
Role of Operating Systems
Accessable Devices
Networking - Much of your networking capabilities, including
Trackballs - Acts as an alternative to a mouse which sits within a
connecting to the internet is controlled and managed by your
holder that can be rotated in order to move there cursor on screen.
operating systems and example of this is a TCP/IP which are the protocols that are
fundamental to transferring data over a network.
Braille & Large Key Keyboards - Braille keyboards use braille on the keys. Larger keys
Security - Computer systems are vulnerable to numbers threats examples include
use larger sized keys.
viruses your computers often come with preinstalled with measures to protect
computers. Such as antivirus and firewall software as wells as users being
Touchscreens - While not strictly accessible touchscreens are better for selecting things
authenticated to gain access
on the screen.
Memory Management - Your operating system and different software applications running
all need to be loaded into the main memory in order for them to run. It then allocate
Braille Embossers - This is a printer that will output braille into paper aspired to standard
each of your applications memory to run and deallocate memory space when they
ink.
are no longer in use. If the memory fills up then your computer will use the hard drive to
create virtual space.
Screen Magnifiers - This usually attaches to an existing monitor and magnifiers the
Multitasking - When running several different applications at once the operating system
display output.
plays an important role in managing system resources as it assigns resources to
different tasks the operating system will assign small amounts of processor time to each
Eye Typer’s - these use cameras mounted on computers to track the eye movements of
applications.
users to control the computers.
Graphical User Interfaces Adaptive Interface
Most computers use use graphical user interfaces known as a GUI these operating systems Adapted or adaptive interfaces can alter its presentation to better support the user.
are known as MacOS, iOS and Windows 10. Windows operating systems can change colours, images, font sizes, cursor sizes etc.
This type of user interface is designed around icons and images commonly known as a Windows 10 can also alter its self for smartphone or computers.
Wimp Interface (Windows, icons, Menus & Pointers) We use a pointer to interact with the
interface.
Unit 1
Choices in User
Interface
Command line interfaces were heavily used in the past when computer weren’t powerful Menu Based Interfaces
enough they relied on the user inputting a string of text to get an action. However it is This type of user interface presents the user with a menu that contains a list of options the
still used for some experts particularly for maintaining a network the users find a CLI user uses to navigate in a various order by choosing relevant submenus in an order.
much more powerful and effaceient for completing tasks. Such as MS DOCs would You can use this type of interface at ATM machines at the bank and self service tills at the
require a command to change fonts and settings. supermarket and many fast food resultants have self service kiosks like these.
Pagefile is too small and can not support the main memory
•
Home Finance Software - Is used to manage your personal
accounts such as investments, income and expenditure.
effectively.
•
Educational Software - Software is used to learn new skills and
musical instruments common features include progress tracking
and quizzes.
•
Entertainment Software - is used to take part in leisure
activities for hobbies and amusement.
Unit 1 •
Communication Software - Allows user to communicate.
•
Email software - Is used to send electronic messages over the Internet common
Performance Of Operating
features include carbon copy address books and replies.
Utility Software
Systems & Application •
Web Browsing Software - is used to access webpages and then view them and navigate
• Is software which is important for maintaining and managing a them.
computer system. Each utility software is used for maintaining
performance and is designed for a specific task.
Software internet. •
VoIP Software - Allows users to hold realtime voice and video conversations over the
Unit 1
Application File Types
Application Software Choice, Image It is now common to see different applications loading different file types
Image File Types which are used by different applications. Some file type will have different file sizes and will
Different file types of images want different types of file formats and
& Video File Types, Application File
allow access to different features
need different formats depending on there intended use some need Types. such as being able to save and include macros.
high quality and some need to be able to be shared over the internet. • Word Processors - DOCX is the default file type for Microsoft Word 2007. It is replaced by
However different file formats can cause compatibility issues. the old DOC type. It can deliver much smaller file sizes and can suffer from less data
• BMP - This is an uncompressed format that has a 24-bit colour depth meaning it can display corruption. This is due to it being based on XLM which doesn’t corrupt and is compressible.
over 16 million colours. It is not able to be compressed so will have a large file size. These DOX also offers great security against Macro Viruses. DOCX can’t be opened in older
images are not shared on the web and most likely kept on a local server for storing original versions of work however is an open standard file type. RTF is a much older type which can
images. offer other formatting features and a low file size.
• JPG - Is a compressed file format which has a 24-bit colour even tho it has the same colour as
a BMP it is compressed using a lossy format making the file much smaller. Lossy compression • Spreadsheets - XLSX is a different file type for MS EXCEL it replaces the older file type
is a type of compression where data is removed during the compression process. Meaning XLS (same reason as DOCX & DOC). XLSM Stores Macros. A file type is that is also used
once you have saved a JPG it will always be a lower quailty. You can set the level of sometimes with spreadsheets is a CSV this stores no formatting just raw data on a single
compression. It is used for storing photos and is good for sharing them over the Internet and worksheet. File size will be small and works with any spreadsheet application when importing
offers a reasonable quality. data.
• GIF - Gifs are a compressed format that has an 8 bit colour depth and can only display 256 • Presentations - PPTX is the default file type or MSPPT 07 it replaces PPT and PPTM stores
different colours so file sizes will be very small. The compression it uses is lossless this means macros. PDF is commonly used with P-PT. They can be opened by most devices so expensive
it can be decompressed back to its original quality. The file size is small but has a very limited software isn’t needed. PDFs cant be edited once saved. Once presentation is complete it is
colours and is only useful for simple graphics like logos. useful but not during development it can’t display transitions.
• PNG - These can go up to 32-bit they don’t have any more colours than 24 bit but can store • Databases - ACCDB is the default file type for MS Access and replaces MDB it allows for
more transparency. It uses lossless compression file sizes can be quite low. many features, such as supporting multi-value fields, attached data and encryption. ACCDB
• SVG - This is a vector format this means it doesn’t store pixels as colour but as shapes and won’t work with older versions of Access. There is no significant effect on the file size
lines meaning it can be resized without becoming pixelated. They are used on webpages and it between ACCDB and MDB.
is an open standard file format which works with most vector graphics software and they can
only be used for simple images and can not have a very complex colour gradient so are only
useful for illustrations.
All software applications have a software licence to use the software you must purchase often struggle to manage.
the licence. Organisational Use of Emerging Technologies
Open Source Software - An open source software licence gives both users permission to use and • Businesses are under pressure keep up to date with technologies this can be every costly.
access the software and modify the code. The licence is simpler open source software is often free • Augmented Reality - The uses a computers to play a virtual images in the real world this can
to use and modify. The source code is available to modify to add or change features that suit the allow for targeted advertising. Some mobile apps use a basic form of this.
users needs. The software is used to maintained and made by a large community so there is a fast • Internet of Things - Time consuming tasking can be limited through IOT devices. Smart
cycle to updating and fixing security holes. It has better compatibility so you are less tied into sensors can be used to monitor things.
software. Development can be abandoned to by an author as they have no responsibility to • 3D Printing - Simplifying manufacturing of parts and products by printing them out from
maintain it. Maintaining updates can be difficult due to the fast update cycle. There are no design which we can use for producing models such as false teeth and car parts.
professional supports and documentation. This means people will have to rely on the community. • Advantages - Productivity - A lot of emerging technology in business
People will malicious intent can edit the code and use viruses. are designed around making tasks quicker to save time.
Proprietary Software - This gives the software licence to the end user for permission for • Reduce Errors - Many of these devices also aim to reduce human error
such IoT spotting if a warehouse temperature was too high.
them to use the software but it remains the intellectual property of the manufacturer this
means that you can’t edit the source code
• Disadvantages - Cost - As a business needs to constantly adopt new
technology to keep up with its competitors this can be expensive and a
Proprietary software comes with software updates and ongoing reliable bug fixes and big gamble but can save money in the long run.
software updates. The software is well supported their is usually good documentation. • Staff Training - Implementing new tech will need new staff training to
Proprietary software has a better UI. Licensing is much more restrictive ensure they can use it.
and the source code can be unavailable. You are reliant the
manufacture to make software updates which can take a long time
Factors Affecting the choice of IT system
which can affect productivity and security. Proprietary software
Emerging Technologies Digital Technology choice factors
often uses proprietary standards making it hard to switch to a
•different
Emerging Technologies Performance -Technology is advancing
software.
User Experience - The User experience is a feeling a person gets
at a rapid pace however we often don’t have the tech to keep up when using a device. When purchasing an IT system we want to
• Virtual Reality - The impact on performance means that it needs use it different reasons. The experience the user is looking for
powerful graphics processing capabilities and large main memory in order depends on their skill set.
to use. Video game console manufacturers are having to release upgraded consoles to provide VR Ease of Use - How simple and intuitive the device is to navigate and perform tasks. Such as an
capabilities to keep up. Unit 1 inexperienced user may choose a device that is easy to use.
Media Streaming - Home networking & internet connections are often not fast enough for Performance - How powerful the device is such as processing, memory, graphics and storage.
Software Licensing, Emerging
smooth media streaming. This is especially true for 4K content driven by emerging technologies Availability - How often the device can be used such as whether the device can always be on
in the TV industry, such as Ultra-HD TV screens.
Technologies, Factors Affecting theonline shop will want access 24/7.
such as an
Self-Driving Cars - Lidar sensors, mobile broadband communication & powerful processing are Choice of IT system
Accessibility - This is how available the device is to be used by someone with a disability. Such
all required for self-driving cars. Tesla said the computer used for their self-driving cars is 40 as someone with a impairment.
times more powerful than previously used. User Needs - This is about what actual tasks the user wants to perform using the IT system.
• By increasing power to keep up it has increased cost for newer technologies. Many devices are designed to meet specific users needs and are much better at meeting that
particular need.
• Personal use of emerging technologies -often change the way we live our lives such as when Specification - A list of components which are required of a computer system in order to allow it
the iPhone changed the way we communicate in 2007 which brought an MP3 player, internet to run and perform specific tasks someone who requires high performance features will need a
browsing, gaming and communication into one device. minimum requirement of specs.
• Smartwatches - are wearable devices which work like smartphones and often include health Compatibility - This is is whether a device can work with the current devices that you are using
functions. such as a new MacBook cant work with old style USB type A as it has USB - C ports.
• Smart Speakers - allow you to automate your home by speaking into the device to turn on the Connectivity - This is about how a device can connect to networks. Many devices can only
TV, Music System and control the central heating. connect wirelessly however some wireless devices can also use cables. For example a user who
• Self Driving Cars - Vehicles that can drive without human input is being developed they can only needs to connect to use the Internet will get a device that has wifi where as a business will
reduce road accidents and can save lives and reduce commute time. get one that can connect to their LAN with an ethernet.
compatible and stable. use it at home to connect PC to the internet. However Wifi is a great alternative at home.
• Migration - This is the process of moving existing data onto the new system such as Advantages - It is very reliable connection method unlike wifi it can’t be shared. It has a
software and files this can be every complicated but can be automated such as the good range of over 100 meters and transfers 1gbps and is extremely common in home
process on smartphones. computers.
• Timescales - The time it takes for the new system to be delivered. The lead time for a Disadvantages - Wifi offers limited physical wires running from your computer to the wall.
delivery, or if an item is not currently in stock, could mean it will take too long to You rarely find and ethernet port in a laptop. It can not transfer data over a overlong distance.
arrive to meet our needs. Fibre Optics Cable - is a connection method where data is transferred to through a pulse of light
• Performance - This is how fast can the computer complete tasks, boot up and whether and is reflected over a cable and provides super fast broadband.
it will freeze and crash. These factors can be bad for, Advantages - Exceptionally good data transfer speeds around
business and productivity so must be balanced against the cost. 100gbps which is the max fibre optical cable and has a range of
• Security - This is how safe a devices from viruses and malware 100kms. It is a very secure connection method and in not susceptible to interference.
for example windows PCs will morello to come under threat form Disadvantages - It is very expensive the cable isn’t very expensive
an attack than a Mac. however the equipment needed to run the network costs much more and makes it very costly.
Unit 1 Hackers
Implications of online communities Someone who gains unauthorised access to a computer
for individuals and organisations, system. Hackers also used programs that will automatically go
Replacement or integration with current systems - through a list of common passwords until it breaks into a system
with “Brute Force”. There are more technical methods which
Replacing one system with another can cause problems.
will require knowledge and understanding of flaws of a Computer operating System. However
This can lead to new systems causing people to struggle to use not all hacking is malicious though. So called “white hat hackers” test systems for security flaws
the system. When integrating the system it can cause big issues by attempting to gain access to help check the security procedures of an organisations.
with data being integrated into the new system and ensuring that it works The unauthorised access can be used to steal financial information in order to steal money from
this can be costly and time consuming and may lead to your online community being them or take personal information such as records. Hackers could uses private information for
inaccessible for some time while this takes place this can harm the reputation with customers blackmail which will harm an organisations reputation.
as they are frustrated about not being able to use it. Phishing
Productivity - Online communities should improve the productivity of a business and the links This is where emails are sent out from people pretending to be companies to gain financial
between employees and the business, this should make it cheaper and quicker to respond to requests information. This will usually be in the form of an email will take you to a websites which will look
and complaints. Online communities can be distracting to employees and can lead to loss of official and get you to fill out a form with your details which will be submitted to to user. Only a
productivity where they spend time on social media instead of working Also, where the business small percentage of people will fall for this.
relies on the online community, if it goes down this can harm productivity as employees won’t be able The goal of fishing is to usually obtain financial information and steal money form and individual
to perform their job. or organisation and can be impacted by a fraud personal data is stolen and used to sign up for loans.
Working Practices - where the implementation of online communities new guidelines must be Accidental Damage
implemented to ensure they are not misused, this can include handling personal information gathered Not all damage is malicious and could be done through human error and data is lost such as dropping
and even guidelines on use in personal time. This might require additional staff training to ensure that laptops and tablets, or spilling liquids or misplacing external storage device. All of these are done
employees are aware of practices and disciplinary procedures as a result of failing to follow the with no malicious intent but can have catastrophic consequences to the business as you could lose a
guidelines. massive amount of data.
Security - When a business uses an existing online community much of the security of users data is Individuals may lose data such as photos with emotional meaning or business could loose sales
handled. However there have been many examples of businesses that have had their profiles hacked records. It can be extremely expensive to recover such as using a specialist.
and misused or defaced by malicious users this can harm the businesses reputation. Good security
will prevent this being hacked. If a business makes its own community it will have a greater
responsibility of users personal information they must have strong levels of security of information.
Protecting Data Tools
Anti-Virus - The software is a utility program that is used to prevent malicious software from
infecting your computer. It does this by signature detection which identifies a pattern in the
malware code which acts like a finger print this acts like a finger-print. Anti-Virus Software Also
uses Heuristic Detection to identify malware even without signatures it does this by monitoring
the behaviour of programs. Common features are, Scheduled Scans - These can automatically
be set to run at specific times each day. Full Scans - initiated on demand for your entire hard
disk, specific folders or even external storage devices. On access scanning of all files opened on
a Hard Disk. It is not a perfect solution and can have many implications to using it such as, It has
to regularly be updated and maintained, there are thousands of new malware programs made each
day, it doesn’t offer total protection, there are security holes that they exploit and it can
significantly slow down a PC when it runs a scan.
Firewalls - This is a program or device that monitors incoming and outgoing network traffic and
block suspicious traffic it does this in many ways such as a packet filtering which inspects each
packet of data and compares it to predefined rules if it is flagged then it is prevented pass through
its like border security. Common Features are - filtering which only allows some traffic through
it is used for security and productivity purposes and it can be used for blocking certain websites
and controlling what programs can access it can also
monitors applications for listening to incoming connections and intruder
detection and stops hackers. The implications of using it are that it can
Passwords - Passwords are used to prevent unauthorised users slow down performance and can constantly drain resources from your
from gaining access to their file systems, software and user profiles computers, productivity can be impaired as content and tasks can be
so its important to keep passwords private. Having a good password blocked by a firewall causing employees to back doors to get around
reduces the chances of a hacker gaining access to your documents as firewalls which harm network security. Firewalls can’t prevent
hackers can crack a simple password in minutes a good password should
be 10 characters in length some uppercase and some lowercase with numbers and symbols. The same password Unit 1 internal attacks viruses can change the setting of a software a
software firewall to compromise your system.
shouldn’t be used for different websites and so most people use password lockers to remember Protecting Data Techniques,
all the unique
passwords they have. Protecting data Tools
Physical Access Control - Business can also use physical access card to protect their IT systems these are,
Access Cards - that can be scanned to unlock rooms and can be encoded only to work with certain rooms can Encryption - is where data is encoded to prevent unauthorised access.
be also used as a form of identification. Keypad Access Control - This is a system that requires a passcode in Stored data - known as data rest sometimes needs to be encrypted while
order to gain entry into a room. Biometric Access Control - A system that scans biometrics data to gain access it might feel secure on you computer then if someone gains access to it
to a room this might be fingerprint, iris or facial recognition to gain access. Electronic Locks - All the above they can read any data on the device. By encrypting confidential
methods require electronic locks to be used to lock and unlock doors. These systems are designed to protect IT documents it is adding an extra layer of security to it so they can’t be read even if
systems against malicious users. someone gains access to the computer. Stored data is usually encrypted using symmetric encryption also
Digital Certificates - Digital certificate are also known as public keys and it allows the user to authenticate known as a private key encryption where the same key is used to encrypt and decrypt data. The key is a
themselves and allows them to use secure encrypted communications over the Internet. These are used on https value of 128 and 256 bits and is applied to an encryption key is applied to convert the data into an encoded
sites where data is transmitted between you and it. To do this a business requires a digital certificate which can form known as cipher-text. The implications of this are if you lose the encryption key you will not be able
to ever decrypt you data back to the original plain text format and the data will be gone forever sharing the
be viewed by anyone. Their are different components to a digital certificate but the most important is a digital
encryption key can compromise security.
signature which verifies the senders identify and their public key which is used to encrypt data when sending it
Data During Transmission - When sending data it requires encryption when the data you are sending is
to the WBS
private and personal this is because it can be intercepted by malicious users for example banking details.
Protocols - are different methods of sending data when transmitting over a network there are security protocols
We encrypt data in transit using asymmetric encryption known as public key encryption with asymmetric
SSL (Secure Sockets Layer) and TLS (Transport Layer Security). The protocols provide a secure connection
encryption different keys are used to encrypt and decrypt data. When sending data to someone you find
between two computing devices so that data can be in a secure encrypted format over the Internet. This their public key and to the encryption algorithm to reduce the encode cipherer - text form of your data.
prevents them from being intercepted by malicious users. When the recipient wants to encrypt the data they will use their private key which is private to the
recipient. The implications are that if working with large quantities of data this can have a real impact on
your processing power and is more processor intensive than symmetric encryption.
Legislation and Codes of Practice - Their is now legislation to protect data and IT systems. Data
Protection Act (1998) - Protects how individuals data can be handled and used. Computer Misuse Act
(1990) - protects against the wilful harm & damage of IT systems and data. Information Commissioners
Office produces codes of practice for the data protection these are not laws but guidelines. ICO are
responsible to enforcing the Data Protection Act they codes not just for organisations bit for individuals so
they know there rights.
brought online and delivered via the post or electronically. E-tailers are online shops that sell us
goods and services such as amazon.
Advantages - Customers have a much wider range of choice as you can browse thousands of
options, Its easier for customers to find the products they want and can easily compare prices for Productivity - Online productivity services are websites and web apps that are used to
the same product from different sites. Customers can do their shopping where and when it suits complete work tasks more efficiently they are used for tasks like communicating and
them. Disadvantages - concerns that payments being taken without products/services being collaborating and working remotely. Cloud computing lets us access our work software
delivered particularly with online auction sites. The lack of regulations with products provided and storage and allows use to video conference and hold meetings remotely and use
online such as unlicensed medicine could put a persons health at risk.
remote desktop software. Advantages - Employees can work much more flexibly these
Financial Services - much of our finances are managed online thanks to online services we can
online services make it easy to work from outside the office as at home. Working
access our bank and our investment all from the comfort of our own home. Online banking
allows us to check balances, transfer funds, manage accounts and apply for loans we can also collaboratively using cloud computing as multiple uses work on the same document.
trade on the stock market. Advantages - Managing your finances can be done where ever you Disadvantages - If these companies internet or network connection goes down then this
are 24/7 this use full for the disabled and elderly that find it hard to get to the bank and users have can damage productivity as users cannot access online services. Online productivity
total awareness of their financial situation and can quickly spot cases of fraud. services make us constantly accessible which increases stress within staff.
Disadvantages - Many people have security concerns over there risk of hackers and malware Booking Systems - We can pre-book all sorts of services online it becomes less and less
stealing their financial information gaining access to their accounts. Websites offering financial common to actually book over the phone due to the convinces of online booking. We can
services may be based in places where their are not book anything online such as flights concerts and hotels with out having too physically
they are not properly governed so the service is not genuine contact the venue. Advantages - Customers can compare prices of booking quickly to
Education and Training - A big growth in online services such as find the best price. Business need less admin staff this saves money and time and the
Education and training which can provide people with professional
customers doesn’t need to travel to the
qualifications and wok based training such as health and safety.
venue to get the tickets this makes it much quicker and slows you
Distance learning qualifications provides you with access to tutorials
such as MOOCs which are websites run by universities to provide to book in. Disadvantages - Booking systems require electronic
free programs of learning. Advantages - learners can access a wider payment which could lead to fraud if intercepted or booked
Range of courses offering the ability to learn all kinds of skills that with dodgy site. Booking websites may not be legitimate and
may not be available in their area, it allows people to learn in the their so you may be paying money for a booking that you never
own time. Disadvantages - Many online course qualifications are not actually receive.
accredited which would make a degrees from an unaccredited
school worthless. Learners must be self motivated as no one checks
Unit 1
their progress. Features of Online Services, Uses of
Online Services
Use of Online Services
Transactional Data - A transaction is the act of buying or selling
something it is the data collected from a purchase, businesses store
that data in a database for different purposes. The sort of data that
has great value to an organisation as they know the number of items
purchased, prices, date and time, delivery tracking data. Business use this data to spot trends and
help admin track finances and helping with customer complaints customers and organisations can
News and Information - Most of our news is gathered through online services. We also track and help the delivery process giving customers piece of mind as they know when their
use the Internet for real time information this allows use to keep up to date with the latest parcel will arrive. Organisations and identify customer habitats in order to personalise their
events. News sites access the latest news on current events such as traffic reports and marketing and advertising homepages can be altered to show products they will be interested in
roadworks and weather forecasts. Advantages - Its much easier to keep informed and up and adverts can be targeted. While all of this transactional data is incredibly helpful to a business
to date on events then ever before as soon as any other major events and its easy to plan and often a customer however their are concerns of all this data being stored. Transactional data
trips as you can easily access travel and weather information. Disadvantages - It is could be hacked this could include personal data which you may not wish to fall into the wrong
difficult to identify news and information with large quantities of fake news. News can be hands, some people are not comfortable with things like customised pages based on prevues
released before parties who it concerns have found out. transactions.
Entertainment and Leisure - A major use of services is to entertain ourselves we use Targeted Marketing - Targeted marketing is all about advertising products online to customer
Video Streaming, Sites and allow us to access film and music. It also allows us to play most likely to purchase the product it is done buy using transactional data we see this targeted
advertising using many different places. Web pages can be customised to display products based
games against other people. Advantages - People can access huge variety of
on previous purchases, browsing history and profile information. Search engines use search terms
entertainment. Hundreds of thousands of songs are available at low costs. We can stream to display adverts and related products you may be interested in social media uses your profile
when ever we want rather than traditional TV style be set at times. Online games allow data to target advertising. This helps improves the quality off marketing this in turn helps
use to play with people from all around the world. Disadvantages - Children can access organisations advertise more efficiently and help individuals find products they will be interesting
inappropriate content easily as their is no water shed and we can be come very distracted in buying. Their are negative implications such as it leading to impulse purchases that people
with these on demand services meaning we can always find things to watch. might not be able to afford. Vulnerable people can be more easily to buy products that are
illegitimate as mentioned in transactional data is used to display adverts which could potentially
lead to embarrassing situations.
Collabrative Working - This is where multiple inderviuals can work together in real time
over the internet this is made possible by use of the cloud. Employees working together
to produce a document while still in different locations or countries. Employees working
together can share information and hold meetings can be held without wasting time and General Office Tasks - The completion of general office tasks such as producing reports
money on travel such as video conferencing. It benefits organisations as it saves time such as letters and emails. Other examples include accountancy applications for
money and travel and increase flexability. But the ngitiave implications are there needs to managing finances. Video conferencing is used for holding meetings with clients and
be restrictions in place when it comes to sharing documents to prevent people from colleagues remotely. The Advantages - office tasks can be completed much more
overwriting each other. Version control saves multiple versions of a document. Security efficiently for example mail merger tools this means it takes less to complete tasks. They
can be a concern also as data could be accessed by hackers such as stalling it and sharing also require less skill to operate and can perform a wider range of roles with in a business.
online. The use of online services for collaborative working lead to business being really The Disadvantages are employees need a much greater technical skill which can be costly
reliant on internet connections with out a connection productivity is really harmed. to train people and business need to employ IT staff which is costly.
Creative Tasks - Creative tasks are now very commonly performed on IT systems for
example computer aided design such as products and packaging for computer aided
design. Another area is in the graphics editing people use computers to create art work
and use soft was such as Photoshop. It is now common for most creative artwork to be
done on computers and is done using graphics tablets. Film and music editing industry
Features of IT Systems are used to make music and film. Advantages - its much easier to edit creative work such
Stock Control - All retailers and suppliers use IT systems to manage as CAD designs which allow changes
stock control they are linked to EPOS tills so when sales are made to be made so you don’t reed to redesign work from scratch. Design
the system will record the sales. There will be a minimum and creative work can easily be distributed electronically such as
maximum stock level or items and alerts for when stock is too high email, the Disadvantages are that work such as film editing
and too low so when a sale is made it is deducted automatically requires a large hard disk so to store the work. Illegally
from total amount they use JIT so when the level of stock meets a sharing this digitally stored work is violations of copy rights.
minimum amount it will order more this improves efficiency this is
an advantage this can also reduce wastage ands make it more Unit 1
efficient the disadvantages are that stock management control Uses of Online Services, Features of IT
systems are that staff need extra training and the stock levels are Systems
Advertising - Online advertising has given companies the
not always accurate due to theft and can lead to a business
ability to precisely target people who will have and interest in
running out of stock.
their products. Companies can use social media advertising where
companies can be display adverts. Its not just with online advertising
Data Logging - This is the collection of data over a periods of time. that IT systems are used though. Video adverts are often shared on
The sensors are connected to computers and designed to automatically Youtube in the hope that they will go viral to give huge exposure to the advert at low costs. Advantages -
collect the data it gathers from computer sensors data can be logged 24/7. Data loggers is used Business can advertise directly to people who have an interest in their advert. Successful viral advertising
in a wide range of industries such as health and it logs many factors such as vital signs and campaigns can allow business to reach huge audiences without the cost for distribution. Disadvantages -
alerts staff of changes in their conditions. The same thing happens on an aircraft this data is Online advertising has led to the growth of spam emails which try to promote the products and phishing emails that
recorded on a black box. Weather stations record data to predict wind speeds, temperature and try to trick you into reviling private information.
humidity and can be used in forecasting the future. The Advantages of this are Automated Manufacturing - We can produce designs using computer aided design software then we use computer aided
systems allow for logging without human intervention data can be logged with far greater manufacturing to manufacture the products with CAM machines. A good example of this is a 3D printer which
accuracy and for longer than a humans can and data can be logged over longer periods of time. can be used in production of action figures. It is also used to control robotic arms to produce car body shells
The Disadvantages of data logging can be done with a wireless connection however if The Advantages are computer aided manufacturing tasks so it doesn’t make human errors. Machinery’s
something goes wrong data logging will be lost and if it isn’t calibrated properly it will lead to doesn’t to take a break or make payment this saves businesses money making them more efficient. The
incorrect results. Disadvantages are people can lose their jobs as they are replaced, Initial cost of purchase is high but saves
money over a long period of time.
Data Analysis - Data gathered by logging needs to be analysed this allows trends and patterns Security - In our own home and in business IT systems are commonly used for security such as motion
to be spotted we use data mining which is a term we use to describe the analysis of extremely sensors and door sensors activate a digital control panel and will trigger and alarm when the sensors detect
large data. Data is analysed is used in many different applications for example in supermarket anything. We also see IT systems used for CCTV in cameras allowing the monitoring of RFID tags so they
loyalty schemes to allow businesses to analyse customer habits. We also see similar data know when an item is taken out of the store. Some people even use CCTV now in their own home these can
mining performed on sites like Amazon. This analysis products purchased and promotes often be linked to the Internet so the Internet can view the cameras remote such as white on holiday. The
products to you that it thinks you might like the Advantages are that it allows business to advantages are organisations require less actual staff as computers automate lots of checks they would
become more efficient in identifying weak performing employees or products and data can be otherwise perform. These systems makes the home much more secure from that of theft. The Disadvantages
are concerns over increased security this can make employees feel like they are constantly being watched and
outputted in formats to make it easier to read. Disadvantages are computers lack common
are untrue they can also provide a false sense of security which leads to people not taking security seriously
sense and analysis is only as good as the data itself. Stored data can be subject to threats such
enough.
as hackers.
As they rely so heavily on employees using these systems effectively.
• Ease of Use - Employees can be reluctant to use new technology system when
implemented. It will employ efficiency and reduce training.
• Performance - IT systems should allow employees to do their job quicker, poor IT Working Practice - How we go about performing our jobs has changed significantly due to IT
systems can lead to inefficiencies such as if a machine breaks down regularly. systems. One impact is the growth of employees working form home and on the road saving
• Availability - of resources can be improved by IT systems as employees can access their money in travel with video conferencing, remote desktop and the cloud we are able to work
efficiently away from the office. The downside is we are expected to be available 24/7 and we
work using cloud storage and work from home using remote desktops.
• Accessibility - IT systems can be difficult to access by users with disabilities are expected to respond to emails in our free time this is increasing stress for employees.
organisations will have to invest in adaptive technologies to ensure they are not
Staff Training - Due to IT systems changing the way we work staff often need to adapt to these
discriminating. changing roles. Many of the manual labour tasks have been replaced by machine so people need
Employee & Customer Needs - Employees want to be able to do their job more safely and technical training to adapt to new roles. Even employees that have good skills need ongoing
efficiently. We use communications tools like video conferencing & email, to make it more training to adapt to these new skills as systems are ever changing. If staff don’t ever receive the
efficient to share information. IT systems automate many tasks removing a lot of very right training they will be less productive for the business.
repetitive activities in manufacturing. IT systems have also had a big impact on how the
organisation meet customer needs User Support - The growth of IT system in the workplace has meant supporting these systems is
as social media has allowed for business to connect and extremely important. Many off-the-shelf software comes with documentation and support most
communicate with business identifying their needs and businesses maintain their own IT support staff who will help employees should their be technical
responding to the we also have email and online chat features problems with the company this means the issue it can be resolved quickly.
in a website to provide better customer support. Data Security - IT systems haver opened up a whole range of threats so its
analysis can identify how efficiently customers are important for business to keep personal data for individuals, customers, or
being dealt with by employees. employees they are legally required to keep data security from these
threats. Its often required to keep business IT systems safe so IT staff
are needed to maintain computers. Of course if a business doesn’t
do this they can be fined hundreds of thousands of pounds under
the data protection act and can have their reputation destroyed
and go out of business.
Unit 1
Impact of IT Systems, Data Sources
Data Sources
Costs - The efficiencies created by IT systems allow efficiencies Primary Data - This is data that has been gathered through original
to run with less staff as business can replace staff with large numbers research it is collected by individuals often in the forms of
of automated machinery. There are high costs with IT systems as they questionnaires interviews and sensor readings. There are benefits to
quickly become out of date and need to be replaced frequently and primary research such as its more up to date and is more likely valid.
support staff must be employed to maintain the system. We often need You can research it to find specific data you are looking for as secondary data might not answer
to purchase new systems to keep up to date Such as supermarkets you question, its more reliable you researched it yourself. Secondary data can be difficult to
implementing new EPOS technology and business will need to pay for staff training.
verify its accuracy.
Implementation - It takes time to implement new systems effectively
• Timescales - It will take time for delivery of the new system and installation of a new IT system Secondary Data - This is data collected by a third party and comes from a wide range of
sources scubas census data, text books and official statistics. The benefits are that it much
especially if it is bespoke could make replacements could take a long time this will reduce the efficiency.
• Testing - A new system must be tested in a wide range of conditions and situations to ensure the there are cheaper the data collected so you don’t need to pay for the data to be gathered its much quicker
no bugs in the system which will further slows down and take time for the system to become operational. to obtain and the research has already been done so it is available as soon as you need it. It is
• Downtime - Implementing a new system will mean that likely their will be a period of time where the old also subject to organisations individual bias as you didn’t collect it so you couldn't influence the
system is down and the new one is going live this could impact productivity. findings.
Replacement or Integration - Replacing or integrating a new system will usually involve some downtime Data Reliability - When gathering data you need to be reliable, particularly with the growth of
while the business switches to using the new system once the new system had been fitted their will likely be a the web this is why its so important to choose sources of information. For data to be reliable it
period of time when their are teething problems making the business do things in effectively. This is why must meet the criteria such as Completeness - of all data that is required for what you are
news systems are integrated in quite periods of time for the business so that the impact isn’t as bad. investigating is included. Accuracy - the data is consistent in the collection and could be
Productivity - In general IT systems are viewed as having a big positive impact on productivity with in the repeated with matching results, and the data gathered matches what was gathered at the source.
work places humans can be replaced by machine this means they can work 24/7 with out breaks or making If we use primary data we can be sure of it as we collected it ourselves and performed some
mistakes. CAD/CAM has replaced manual labour and EPOS has reduced mistakes. The negativity can be that surveys to gather the data. Avoid using jargon that could lose people interest and can cause
works may spend a lot of their time surfing the web while at work and means they are unproductive. If tech incorrect responses Avoid Bias in language and avoid leading questions closes questions to
fails as we are so reliant on it we will not be able to perform our jobs. make simple data so the results are accurate. Secondary data can be difficult to verify the
reliability so its important to ensure that the source of secondary data is trust worth. Such as
their being no bias and the collector has a strong reputations and it is kept up to date.
Data Collection Methods - when gathering primary data a common method is to perform a Numerical & Data Modelling
survey. Numerical Modelling - A numerical model is where math calculations are used to
Questionnaire - This involves a set of normally closed questions for statistical analysis, traditionally simulate a real-life system and can analyse the data to make future productions. We do his
this was done with paper now it can be done online The Pros of questionnaires are they can gather data when predicting the weather so we can forecast the weather can use previous data
from a large group of people in a short space of time which provides a lot more data to analyse. Every captured by sensors to make a prediction. We also do it with data on stock levels and
respondent answers the exact same question so it removes bias and due to it being done anonymously buying trends to offer the best products and pricing in order to maximise profit this can
which can lead to more test answers. The Cons are poorly worded questions can create bias results as hep a business to expand.
they can be misinterpreted it can be difficult to get in depth response rates are usually very poor is Data Modelling - Data modelling is a process used to plan the structure of a database
people sign or it.
which is usually made up of a number of tables with field names such as DOB, Phone
Focus Groups - this involves a group of people asked questions on a particular topic. This is a small
Number and certain data types. We have to ensure that we have all our data set up
group of about 8 questions are designed to be interactive and encourage to respond to each other the
pros are respondents are able to build on each others answers. It provides depth and detail so the quays
correctly to be efficient in storing, processing and extracting data.
of data. You can get responses from a wides group of people which makes the more cost effective and Presenting Data & Results
it allows you to alter questions to fit on going conversations. The Cons respondents can influence each Once we have stored the data we are able to organise it, extract data now we must present
others answers as it can be difficultly to go against the rest if the group, the data provided is quality and it to the end users this is done in two ways such as;
descriptive and non numerical. Assembling a group of people together can take some time to assemble Tabular - this is text presentation to provide precise details. It is useful for where we
and it isn’t always convent to attend. need to look up individual values and is better for qualitative data which can be turned
Interview - One-to-one meeting where and interviewer asks a single respondent in-order to gather into a chart.
information. This is often performed face-to-face however it can be Graphical - this dat that can be turned into a chart or diagram to be
performed the pros are interviews are very good for drawing out interpreted and is useful for revealing relationships between
detailed follow up questions the interviewer can ensure the person multiple values. Choice of presentation is personal and is only
fully understand the question. The cons are interviews take a long
time to gather a wide range of people. This means it isn’t cost
useful if it communicated what it was intended to so generally
effective where a large number of responses are required. Unit 1 where precision is important tabular is useful but
where spotting patterns is important graphical is better.
Much like focus groups data gathered is much more qualitative
and so is difficult to analyse.
Data Collection
Methods,
Processing & Presenting Data, Data
Collection Interfaces
Processing & Presenting Data
Data Collection Interfaces
Ensuring Data Accuracy - It is extremely important to ensure
data we use is accurate especially when processing data using a
Ease of use - A data collection and processing system requires
computer system. Computers don’t know if data is accurate or not
an easy to use interface this helps reduce the training required
so if data is bad the results will be bad this is known as Garbage In Garbage
and increase the adoption rate. For it to be easy and simple to use
Out. The problems with this are Incorrect stock levels can lead to businesses running out
it must have clear navigation between screens. That it has good clear labelling input boxes
of stock. Computers are not good at identifying inaccurate data this is validation and
so the user knows what to enter. This could be a drop down box or a box with similar data
verification.
entry limits.
Validation - doesn’t make the data accurate it is used for making sure that if you enter a
Accessibility - It is important for data processing ti be accessible to people with disabilities
date of birth you have entered in a date.
so they are still able to perform their job properly. To make the interface more accessible it
Verification - Verification is a check to ensure that data entered matches the original
should be kept clear, to ensure navigation and can be performed with different inputs, with
source. Such as a requesting the user to reread the data they have entered to ensure it
high contrast colours so key elements can be identified and it such have changing sizes and
matches the original source. This could be a double check which could mean the user has
fonts. These can aid individuals requirements.
to input the data twice to ensure that it matches the original data.
Error Reduction - The user interface should help reduce the number of errors and can help
Extracting and Sorting - Data gathered has been stored on a computer in a database and
it prevent confusion leading to mistakes such as not using poor labelling. There are other
can be sorted and easily access. To do this we use database management systems. Once
factors involved in reducing errors such as validation and verification and the format data
our data is stored in a organised way we can use queries to request the data and retrieve the
should be entered such as a telephone number will only allow numbers.
data we want. This is called SQL. Extracting - is the selecting of precise fields and can
Intuitiveness - A user interface that is intuitive can be easily understood with out training
apply filters from and extract the precise info action that we require. Sorting - after we
this is one with good labelling and clear navigations. Another good method is making the UI
have selected information, Sorting can be done according to any field. These functions
match the paper one that it is transferred from this way it will be simple for the inputter. If
make it much easier to use the data that we have gathered we use queries to quickly
the process is of collecting data is replacing an existing one it should have a similar feel
identify information.
making the UI match the old one so its more intuitive for the user.
Globalisation - Due to the rise of IT systems it can allowed people to become more
connected and has led to globalisation as more people can communicate over the world
Functionality - Their is certain functionality than an organisation will expect of it data instantly. Despite positives such as increased awareness of global cultures their are also some
collection this will usually involve performing queries to extract information and negatives such s more jobs are being outsources to other countries taking employment away
production of specific reports. The user interface will allow users to perform this function this is due to the tech aiding communication. It has also been linked to the lost of culture in
easily such as loading the menu of result to display in a format useful to the user. If it is counties and increased spread of disease.
difficult for a user to perform the required functionality to reduce or discourage then form
using the system. Freedom of speech - IT systems are a vehicle for freedom of speech however it can be
abused and used to bully people and abuse people it can also be can be offensive to other
Performance - Users want their data collection quickly to ensure they work efficiently people. Many sites have guidelines for what is acceptable such as not spreading racist
this is down to data being stored in and efficient manner and the computer being powerful comments or posting inappropriate images. Some sites may choose to delete offensive videos
enough to complete processing quickly. The user interface will have an impact on how or groups or pages. Some people feel this is a violation of freedom of speech.
quickly someone can input data to perform the tasks and prevent the user from getting lost
with in the system and reduces errors that will slow the user down. Acceptable Use - Tech has caused new issues in the workplace to arise such as employees
being distracted on computers with social media this can cause a drop in productivity as they
Compatibility - Data collection processes will need to be compatible with other systems are not doing their job. Many businesses have an acceptable use policy which informs users
so that data can be imported from one to another. An example would be to take data from of what they should and shouldn’t do on computers while at work such as not sending abusive
spreadsheets into a database system. So that we messages. They will also have these
can inform additional calculations and analysis or perhaps policies in place to avoid legal issues this includes not sharing
produces a graph from it this ensures compatibility by importing copyrighted material and not downloading files and harassing other
and exporting data as a .CSV. A CSV file is a generic file type users on emails and private messengers. The acceptable use
that works with almost all systems so has high compatibility. policy will include sanctions for a breach of policy
which might include suspension ,warnings and termination
Unit 1 of employment.
Open Accessibility Framework - A research group called AEGIS made the guidelines
framework to ensure IT systems are accessible.
Web Content Accessibility Guidelines - they have made new guidelines for making webpages
accessible to people with disabilities. The original version of this WCAG 1.0 was defined in
1999 with 14 guidelines but later they split 12 guidelines into four categories.
Perceivable - 4 Guidelines that cover presenting informations in a way that users can perceive
such as users having non text alternatives to content.
Operable - 4 guidelines that cover ensuring user interfaces and components being operable such
as having functionality available from using just a keyboard.
Understandable - 3 guidelines that cover making information understandable such as making
text rebate and making pages operating in predictable ways.
Robust - 1 Guideline that covers ensuring compatibility with user-agents including assistive
touch.