ict theory

248
Input and Output Devices

Upload: hari-shankar

Post on 07-Dec-2015

32 views

Category:

Documents


0 download

DESCRIPTION

GCSE ICT CIE exam board revision notes

TRANSCRIPT

Page 1: ICT Theory

Input and Output Devices

Page 2: ICT Theory

Input Devices

Ways of putting data INTO a computer

Keyboard

Mouse

Microphone

Scanner

Page 3: ICT Theory

Keyboards

Normal

Concept

Ergonomic

Page 4: ICT Theory

Keyboards

Advantages

Fast data entry

Proven technology

Easy to use

Disadvantages

Can be difficult for people with disabilities

Relatively slow

Big

Page 5: ICT Theory

Numeric Keypads

Keypads to enter numbers

Used at ATMs, POS

Advantages

Small and easy to use

Disadvantages

Keys may be too small for some people

No text entry

Page 6: ICT Theory

Mice

Used to point at stuff on screen

Cordless, optical mice are normal now

Advantages

Easy and intuitive to use

Disadvantages

Can be difficult for people with poor motor skills

Page 7: ICT Theory

Tracker Ball

Advantages

Easier to use than normal mouse with poor motor skills

More accurate positioning of screen pointer

Disadvantages

Not standard issue – Training may be required

Bigger than a normal mouse

Page 8: ICT Theory

Joystick

Advantages

Intuitive control

Uses 3 dimensions

Disadvantages

Cant do the job of a mouse

Page 9: ICT Theory

Touch Screens

Advantages

Don’t need a mouse

Very easy to use

Disadvantages

Limited options

RSI

Need to be cleaned regularly

Page 10: ICT Theory

Magnetic Stripe Readers

Reads the black stripe on a credit card

Advantages

Fast Data entry – Faster than typing

Secure – no-one can see the data

Disadvantages

Black Stripe needs to be undamaged

Card needs to be near card reader

Page 11: ICT Theory

Smart Card Reader

Different from stripe reader

Card does not get swiped

Reads a chip in the car

Advantages

Can be used instead of money

Disadvantages

More difficult to replace

Page 12: ICT Theory

Input Devices(2)

Page 13: ICT Theory

Chip and Pin Readers

Owner has to enter a secret number

Advantages

More secure – signatures are easy to copy

Disadvantages

Must not let anyone know the PIN

Page 14: ICT Theory

Scanners

Scan documents – produce a digital copy

Advantages

Images can be stored in the computer

Can email the images

Disadvantages

Trade-off between quality and file size

Page 15: ICT Theory

Barcode Readers

Instead of typing the number – read the stripes

Advantages

Much faster – more accurate than typing the number

Disadvantages

Expensive to buy the equipment.

Page 16: ICT Theory

OMR devices

Optical Mark Recognition

Advantages

Can mark multiple choice exam papers quickly

Disadvantages

Forms need to be carefully designed

Forms need to be filled in accurately

Page 18: ICT Theory

MICR Devices

Magnetic Ink Character Recognition

Used to process Cheques

Advantages

Error free, no handwriting

Disadvantages

Can only read certain characters

Page 19: ICT Theory

Digital Camera

Advantages

Easier to use than traditional cameras

Cheaper – no film to process

Do it all at home

Disadvantage

Requires ICT skills

Loss of artistry

Page 20: ICT Theory

Webcams

Advantages

Cheap

Allow easy access to internet communications

Disadvantages

Security

Poor picture

Page 21: ICT Theory

Microphones

Used to record sound

Advantages

They can enable you to record sound

Disadvantages

They don’t make ice-cream

Page 22: ICT Theory

Sensors

Smoke, heat, pressure, humidity, speed……

Advantages

More accurate than a person taking the reading

24X7

Safer than manually reading the temperature at the bottom of an erupting volcano

Disadvantages

Bad sensor – bad results

Page 23: ICT Theory

Graphics Tablet

Advantages

Makes computer drawing easier

More accurate than a mouse

Disadvantages

Expensive

Page 24: ICT Theory

Light Pen

You can point to stuff on a monitor

Advantages

You can point to stuff on a monitor

Disadvantages

Software can be slow – lag

Not accurate

Old technology

Page 25: ICT Theory

Output devices

Page 26: ICT Theory

Output devices Screen or monitor

Printer

Speakers

Multimedia projector

Plotter

Control device (e.g., robot arm, motor, light, etc.)

Page 27: ICT Theory

Screens/monitors

LCD (liquid crystal display)

CRT (cathode ray tube)

Used to output information that is not needed permanently

Page 28: ICT Theory

CRT Monitors

Cathode Ray Tube monitors

Advantages

Better image than TFT

Wider viewing angle

Disadvantages

Very heavy

Use more power

Page 29: ICT Theory

TFT Monitors

Thin-film transistor Monitors.

Advantages

Thinner

Less energy than CRT

Disadvantages

Poorer image than CRT

Page 30: ICT Theory

Multimedia Projector

Can project computer output on a large screen.

Advantages

Can project computer output on a large screen.

Disadvantages

Expensive to buy

Fuzzy image

Difficult setup

Page 31: ICT Theory

Printers Used to output

information as hard copy (i.e. printed on paper)

Ink-jet printers – cheap to buy but expensive to run

Laser printers – more expensive to buy but cheaper to run

Dot matrix printers – ideal for multi-part printouts

Page 32: ICT Theory

Laser Printers

Fast, high quality, high volume print.

Advantages

Fast, high quality, high volume

Disadvantages

Expensive to buy

Page 33: ICT Theory

Inkjet Printers

Advantages

Cheap alternative to a laser printer with high quality

Disadvantages

Slower than Laser printer

Page 34: ICT Theory

3D Inkjet Printer

Uses inkjet technology to create 3D models.

Advantages

Save a lot of money creating prototypes

Disadvantages

Expensive to buy

Page 35: ICT Theory

Dot Matrix Printer

Advantages

Can be used in dusty environments

Uses continuous stationery

Disadvantages

Poor print quality

Very noisy

Page 36: ICT Theory

Speakers Used to output the sound/music

after processing/storage by the computer

Page 37: ICT Theory

Plotters Used to output scale drawings (e.g., maps

and plans)

Can print on much larger paper (e.g., A0)

Used by architects, engineers, patternmakers, etc.

AdvantagesVery large, very highest quality outputDisadvantagesVery expensive to buyVery, very slow

Page 38: ICT Theory

Actuators Used to control devices

Can turn devices such as switches, motors, pumps, etc., on and off

They respond to signals sent by the computer

Page 39: ICT Theory

Motors, buzzers, heaters and lights/lamps

Motors:

Used to turn valves

Can turn watering systems on/off

Can close/open windows

Can turn drums of washing machines

Page 40: ICT Theory

Motors, buzzers, heaters and lights/lamps

Buzzers:

Act as warning signs

Used to tell when a process has finished

Washing machines make a buzz when they have finished

Page 41: ICT Theory

Motors, buzzers, heaters and lights/lampsHeaters:

Can be controlled bysignals from a computer

Can be found in cookers, washing machines,dishwashers,greenhouses, etc.

Page 42: ICT Theory

Motors, buzzers, heaters and lights/lampsLights/lamps:

Can be used with sensors to turn lights on when light level falls

Can be used to provide artificial light in greenhouses

Page 43: ICT Theory

STORAGE DEVICESAND MEDIA

Page 44: ICT Theory

Storage Devices

Methods of access

Serial access (like a cassette tape)

Start at the beginning and read until you find your data.

Direct Access(cd or dvd)

Go straight to your data

Page 45: ICT Theory

Backup Storage Media

Magnetic

Optical

Solid State

Page 46: ICT Theory

ROM and RAM Used to hold data

(program instructions and data it is currently processing)

Stored in chips

Contents of memory are available immediately

Two types ROM and RAM

Page 47: ICT Theory

ROM (Read Only Memory)

Non volatile – does not lose contents when power is turned off

Contents cannot be altered by the user

Used to hold instructions needed to start the computer (i.e. the boot program)

Page 48: ICT Theory

RAM (Random Access Memory)

Temporary – the contents are continually changing

Volatile – loses contents when power is turned off

Contents can be altered by the user (i.e. it is read/write)

Stores data while the power is supplied

Page 49: ICT Theory

Backing/secondary storage devices and media

Used for the storage of data and programs not needed instantly by the computer

Used to take backups (i.e. copies) for security purposes

Data is usually backed up on Magnetic Tape or CD or DVD

Page 50: ICT Theory

Memory stick/pen drives/USB drives Small and portable

Large storage for size

Very reliable

Can easily be lost

Slow transfer rate\

Connections can wear out

Page 51: ICT Theory

Magnetic fixed hard disk drives

Advantages

Very high storage capacity

Very high access speed

Very high transfer rate (i.e. speed of reading/copying data)

Most computers come with one

Disadvantages

Easily Damaged and not portable

Page 52: ICT Theory

Portable hard drivesAdvantages

Can be removed from the computer

Useful for backup copies

Useful for transferring files between computers

Usually attached via a USB port

Disadvantages

Easily Damaged

Page 53: ICT Theory

Magnetic tapesAdvantages

Used for backing up large amounts of data

Huge storage capacity

Takes time for data to be found on a tape so not much use except for backup

Disadvantages

Serial Access (slow)

Easily Damaged

Page 54: ICT Theory

Optical drives Use removable media (i.e. CD or

DVD)

Can be used for backups

DVD used for films

CD used for music or software

Blu-ray used as an alternative to DVD as it has a much larger storage capacity

Page 55: ICT Theory

CD drives/mediaCD ROM(Compact disk read only memory):

used mainly for transfer of software

data can only be read

storage capacity of 700 Mb

data transfer speeds lower than for a hard diskCD RW (CD Rewritable):

allows data to be stored over and over again

smaller transfer rate than a hard drive

not as robust as a hard drive

Page 56: ICT Theory

CD drives/media continued

CD R (CD Recordable) Can only be recorded onto once Can be used for archive versions of data

Page 57: ICT Theory

DVD drives/mediaDVD-ROM

Can only be read

Higher storage capacity compared to CDs

Used for movies, multimedia programs, etc.

Drives can also read CDs

Page 58: ICT Theory

DVD drives/mediaDVD RAM Allows repeated storage like hard disk Fast transfer rate Quite expensive compared with other

methods

DVD R Can only be recorded onto once Ideal for TV recordings where you do not

want to record over them

Page 59: ICT Theory

DVD drives/media continuedDVD+RW Are read/write Sometimes called DVD

burners Ideal for data that needs

continual updating

Page 60: ICT Theory

Storage Devices

Blu-Ray Discs

Advantages Much higher storage capacity than DVD Used to store high definition video

Disadvantages

Expensive

Need Blu Ray drive to read them

Page 61: ICT Theory

Storage Devices

DVD-RAM

Advantages

Allow reading and writing SIMULTANEOUSLY

Used in satellite recorders

Disadvantages

Relatively expensive

Not as compatible as DVD

Page 62: ICT Theory

Solid state backingstorage/memory

Is the smallest form of memory

No moving parts so very robust

Flash memory card drives and cards

Thin cards used in digital cameras

Can be used in MP3 players

Page 63: ICT Theory

Storage Devices

Flash Memory Cards

EEPROMs – Electrically Eraseable Programmable Read Only Memory

Advantages

Very small so very portable

Robust

Disadvantages

Expensive

Page 64: ICT Theory

Solid state backingstorage/memory

Consists of:

Memory sticks/pen drives

Flash memory cards

Page 65: ICT Theory

Computernetworks

Page 66: ICT Theory

What is a computer network?

A network is two or more computers that are linked together so that they are able to share resources.

Page 67: ICT Theory

Resources which can beshared include

Hardware - printers, scanners, storage, etc.

Software – need only be installed on one computer

Data (e.g. database files)

An Internet connection

Page 68: ICT Theory

Network Types

LAN – Local Area Network

Inside a building

WAN – Wide Area Network

Between countries

Page 69: ICT Theory

LANs and WANs

Local area networks:

Confined to a small area

Usually located in a singlebuilding

Use cable, wireless, infra-redand microwave links which are usually owned by the organization

Less expensive to build as equipment is owned by the organization so no rental of lines and equipment needed

Wide area networks:

• Cover a wide geographical area (e.g. between cities, countries and even continents) in lots of different buildings, etc.

• Uses more expensive telecommunication links that are supplied by telecommunication companies

• More expensive to build as sophisticated communication systems are used and rental of lines and equipment needed

Page 70: ICT Theory

WLAN Stands for wireless local

area network

Is a LAN where all the devices on the network communicate wirelessly

Advantages

A network without wires

Disadvantages

Security (viruses, hackers)

Interference

Page 71: ICT Theory

Wi Fi

Connecting without wires to a network

e.g. In a café

Bluetooth (mobile phone)

WAN via a wireless router

Page 72: ICT Theory

Network topology Is the way the devices are

arranged in a network

In a wired network, it shows how the computers are connected together

In a wireless network it shows how the computers communicate with each other

Page 73: ICT Theory

Network topologiesThe three main network topologies are:

Ring

Bus

Star

Tree

Page 74: ICT Theory

The Ring Topologies

Advantages

Easy to set up

Fast

Disadvantages

Any fault and whole network is dead

Page 75: ICT Theory

The bus topology A backbone cable is usually

used

Advantages

A small amount of cable is needed

Simple to install

Easy to add extra devices

Disadvantages

Slow for larger networks

Reliance on the backbone cable

Page 76: ICT Theory

The star topology Uses a central connection point

This can be a server or a hub/switch

Advantages

Easy to add extra computers without disturbing the network

Disadvantages

They use a lot of wire

They depend on the centraldevice

Fault tolerant

Page 77: ICT Theory

The tree topology Combines bus and star

topologies

Advantages

Good for widely spread networks

Disadvantages

If a bus cable failed, the computers in a single star could still communicate

Not suitable for small networks as it uses too much cable

Page 78: ICT Theory

Network Devices

Modems (modulate demodulate)

Translates analog to digital, digital to analog

Used to connect computers to networks across dial-up(not digital) telephone lines

Page 79: ICT Theory

Networks

Network Traffic

All data in a network is sent as PACKETS.

All communication is broken down to packets.

Each packet contains a source address, destination address and the data.

All network devices in the world have a unique MAC address.

Page 80: ICT Theory

Network devicesA hub:

is used to join computers in a network

allows the connection of cables

allows the sharing of files and Internet access

Page 81: ICT Theory

Network Devices

Network Hubs

Connect multiple devices to one network connection

HUBNETWORKCONNECTION

SERVER

A hub has no intelligence

Page 82: ICT Theory

Network devicesA switch:

is a similar device to a hub but more intelligent

can look at a packet of data to decide where it should go

reduces the number of packets of data on a network which speeds the network up

Page 83: ICT Theory

Network Devices

Network Switch

Connect multiple devices to one network connection

SwitchNETWORKCONNECTION

SERVER

A switch has intelligence

Page 84: ICT Theory

Network devicesA router:

can be wired or wireless

is used to join several networks together

is often used to connect several computers in the home to the Internet

Page 85: ICT Theory

Network devices A network interface

card:

prepares data for sending over the network

sends the data

controls the flow of data

Page 86: ICT Theory

Network Devices

Network Bridge

Makes a connection between two LANs.

Packets are sent to the relevant LAN

All devices on each LAN see all packets.

Page 87: ICT Theory

Accounts HUB

Marketing HUB

Sales HUB

Router

Only relevant packets are routed to each device.

Page 88: ICT Theory

HTTP Proxy Servers

Server between the internet and a LAN.

All internet traffic goes through the Proxy Server.

Emails and web searches are filtered

Performs virus checking

Page 89: ICT Theory

Proxy Server

The Internet

All QP Computers

Page 90: ICT Theory

Authentication

Ensuring only authorised people access the network Username/passwords

Biometrics

Digital signatures

This is a special code used to check that electronic media (e.g. Emails) are really from the person they say they are from

Page 91: ICT Theory

Encryption

Data being transported across a network is encrypted at the source and decrypted at the destination using a key. Hackers cannot steal the data.

Encrypt data using key

Encrypted Data

Decrypt using same key.

Page 92: ICT Theory

Methods of Communication

Page 93: ICT Theory

Network Communcation

Networking computers and other devices allow improved communication between people using services such as:

1.Fax

2.Email

3.Teleconferencing/Video Conferencing

Page 94: ICT Theory

Fax

A fax machine scans paper documents and converts them into digital format.

The digital version is then converted into analogue format and sent over an ordinary telephone line to another fax machine.

The fax machine at the receiving end converts the analogue information back into digital format and reproduces an exact hard copy of the original document.

Page 95: ICT Theory

Fax – advantages…

Unlike emails, faxes do not spread viruses

Faxes cannot be hacked

Faxed signed documents are legally acceptable.

Page 96: ICT Theory

Fax - disadvantages…

Faxes are usually printed in areas that are accessible by others

Printer jams waste time

The receivers fax machine might not be on or out of paper

Information sent is a hard copy and therefore cannot be editted.

Page 97: ICT Theory

E-mail Used to send messages from one computer to

another

Can be sent between computers on a local area network (LAN) or between computers on the Internet

Page 98: ICT Theory

Email – advantages… Some advantages of e-mail:

Arrives at its destination in at most a few hours

Send and receive e-mail anywhere in the world, at any time

One e-mail message can be sent to a group of people

Registered e-mail can be sent

Can be cheaper than sending mail through the post

Can attach a file

Page 99: ICT Theory

E-mail - disadvantages Some workers receive

so many e-mails that they are unable to answer them all

Computer viruses are often sent by e-mail

Can send junk mail just as with conventional post

Page 100: ICT Theory

Video/Tele Conferencing

The use of a computer to send sound and video images from one computer to another in real time.

Page 101: ICT Theory

Video/Tele Conferencing

• Input/Output Devices needed:• Microphones to capture speech• Headphones or speakers to hear the speech• A web cam is needed to capture images of

themselves• A monitor/screen is used to view the video

images

Page 102: ICT Theory

Advantages of Videoconferencing

You can communicate with other people over long distances and see them as well as hear them

Videoconferencing is more personal than just a telephone call

Businesses can use videoconferencing to hold meetings in which many people can be involved

There is less need for people to travel

Page 103: ICT Theory

Disadvantages of videoconferencing

The hardware and software needed are very expensive

Not many people have videoconferencing systems

ISDN lines are needed which are expensive to set-up and use

There is no substitute for a face-to-face meeting.

Page 104: ICT Theory

Data types

Page 105: ICT Theory

Data types Logical/Boolean

Alphanumeric/text

Numeric (real and integer)

Date

Page 106: ICT Theory

A database is made up of tables

Tables are made up from records

Records are made up from fields

Fields have different data types

Page 107: ICT Theory

Data typesLogical/Boolean:

Can have only one of two values

Examples include: true/false, 1 or 0, Yes or No

Alphanumeric text:

Alphanumeric refers to letters, numbers and all other characters you see on the keyboard

Text is just the letters on the keyboard

Page 108: ICT Theory

Data types

Numeric (real and integer)

Real numbers contain numbers after the decimal point

Integers are whole numbers which can be positive, negative or zero

Page 109: ICT Theory

Data typesDates:

There are lots of different ways of representing a date

Examples include:dd/mm/yy,mm/dd/yy,yyyy-mm-dd

Page 110: ICT Theory

Some important database terms

Field – an item of data. Surname would be a field.

Record – the detail relating to a single thing or person. A record consists of fields.

File – a collection of related records.

Table – used to hold data with each row (other than the first) representing a record and the columns representing fields.

Page 111: ICT Theory

More important termsKey field:

A piece of data in a database that is unique to a particular record

In a school database a pupil number would be unique and therefore could be used as the key field

Page 112: ICT Theory

Tables Consist of rows

and columns

The first row contains the field names

Following rows contain the records

Columns contain database fields

Page 113: ICT Theory

Relational databases Data is stored in

more than one table

Tables are linked

Most commercial databases are relational databases

Foreign key is a field of one table which is also the key field of another

Page 114: ICT Theory

The problems with flat-file systems

Data redundancy – data is duplicated so more data needs to be entered than is needed

When a record is deleted then lots of data which may still be useful is deleted

Page 115: ICT Theory

The advantages of relational databases

Time is saved by not having to type as much data

Entering less data means fewer typing errors

Data redundancy is reduced

Page 116: ICT Theory

Systems analysis and designVALIDATION AND VERIFICATION

Page 117: ICT Theory

Valid data Data that is valid is allowable

Valid data has to obey certain rules

Data can be incorrect yet still be valid

Page 118: ICT Theory

Data can be valid and incorrect

Example:

A person has a date of birth 19/12/87

A user enters it incorrectly as 19/12/78

Both are valid as dates

Yet one is incorrect

Page 119: ICT Theory

Two techniques for reducing errors

Verification

Validation

Page 120: ICT Theory

Verification Checks that errors are not

introduced by the user during typing

Checks data entered is the same as on a source document (e.g., order form, application form, etc.)

Page 121: ICT Theory

Two methods of verification

Visual comparison – checking what has been typed in against the source of the data

Double entry of data – two people enter the same data – only if both sets of data are the same will it be accepted

Page 122: ICT Theory

Validation checks include

Data type checks – is data entered the right type for the field (e.g., letters are not entered into a numeric field)?

Presence checks – has a field been left empty?

Length and format checks – is data of the right length and the right combination of characters for a field (e.g., code FF019J has length 6 characters with first two letters, the next three numbers and the last a letter)?

Boolean checks – data is either: True or False, Y or N

Consistency checks – checks to see if the data in one field is consistent with the data in another field

Page 123: ICT Theory

Check digits

Added to important numbers such as bank account numbers, International Standard Book Numbers (ISBNs).

Added at the end of the block of digits

Used in a calculation using all the digits to check that all the digits have been entered correctly

Page 124: ICT Theory

Keeping data safeand secure

Page 125: ICT Theory

Software copyright theftCopyright is the right given to

software developers to protect them against having their work copied.

Page 126: ICT Theory

Software copyright Software being copied or given to

others

Using the name of copyrighted software without permission

Using the software on a network of more computers than you have paid for

Software being copied, amended and then passed off as your own

Page 127: ICT Theory

Computer viruses Install anti-virus software

Do not open email fileattachments unless youknow who they are from

Do not allow anyone toattach portable drivesor memory sticks withoutscanning them for viruses first

Do not load illegal games/software/music as these often contain viruses

Page 128: ICT Theory

Keeping data safe and secure

Passwords and usernames/user-IDs

Levels of access: only certain staff can access very personal details (e.g., medical records)

Firewalls – to prevent hackers

Encryption – to prevent unauthorized access

Use of anti-virus software – to ensure viruses do not enter the computer system

Page 129: ICT Theory

Keeping hackers out Hacking is the process of

accessing a computer system without permission

Most hackers use the Internet to hack into networks

Page 130: ICT Theory

http://us.fotolia.com/id/6457669

Protecting against hackers using a firewall

Looks at the data coming in from the Internet (i.e. the grey arrows)

If it is allowable it lets it through (i.e. the green arrows)

If not it is rejected by the firewall (i.e. the red wall shown here)

In this way it stops hackers

Page 131: ICT Theory

Protecting data from unauthorized access

Use usernames (user-IDs) and passwords

Use encryption when data is stored or transmitted (e.g. over the Internet)

Users must remember to log off when away from their computer

Page 132: ICT Theory

Protecting data from unauthorized accessUse physical methods to prevent access to computers or computer room such as:

Keypads to gain access to rooms

Biometric access to rooms and computers using fingerprinting or retinal scanning

Page 133: ICT Theory

Encryption Scrambles data

before sending or storing data

Used when banking or credit card details are sent over the Internet

If data is intercepted or stolen, it cannot be understood

Page 134: ICT Theory

The Effects of Using ICT

Page 135: ICT Theory

Social Divide

On one side – those who have the technology

On the other side – those who do not

Page 136: ICT Theory

Employment

Technology leads to unemployment ?

Robots can do many dangerous manual tasks:

Paint sprayingAssembly line construction

Page 137: ICT Theory

Employment

Technology creates unemployment?

Automated Warehouse

No people

Page 138: ICT Theory

Employment

Technology causes unemployment?

Printing was slow, highly skilled and used very nasty chemicals.

Page 139: ICT Theory

Employment

Technology causes unemployment?

Now printing uses software requiring no special skills and uses no nasty chemicals

Page 140: ICT Theory

Employment

Technology creates jobs

People are needed to design, build and program the robots

Printers re-train to use publishing software

Software and hardware needs to be designed and created to run the automated warehouse

There is always a net gain of jobs when new technology is introduced.

Page 141: ICT Theory

Effects of introducing new technology

Retraining to use the new technology – e.g. printers

Machines now do the dirty, unpleasant and dangerous jobs

Skilled jobs become unskilled – e.g. printers

Fewer repetitive, manual jobs

Page 142: ICT Theory

Advantages to Companies

Reduced labour costs

Higher productivity – robots don’t need breaks

Greater consistency in the quality of work – e.g. every car is the same

Page 143: ICT Theory

Microprocessor

Page 144: ICT Theory
Page 145: ICT Theory

What are Microprocessors?

Page 146: ICT Theory

Microprocessors in the Home

Page 147: ICT Theory

Microprocessors in the Workplace

Page 148: ICT Theory

Microprocessors in Everyday Life

Page 149: ICT Theory

Advantages

More leisure time as the devices do the work

People can meet other people while the dishwasher is on

People are becoming more technology-aware

DVD players are plugged into the internet

Page 150: ICT Theory

Disadvantages

People become too dependent on technology

TV dinners – unhealthy, convenience food

People become lazy

Society becomes more wasteful of energy

Technology illiterate people get left behind

Page 151: ICT Theory

Information from the Internet

Page 152: ICT Theory

Can you trust it?

NO!

Page 153: ICT Theory

Quality of Internet Information

ReliabilityUndesirability of certain

websitesSecurity issues (personal

and national)Other issues

Page 154: ICT Theory

Reliability of Information

Web info is more up-to-date than books and can be easily updated

Search engines, e.g.

Make it very easy to find information

Page 155: ICT Theory

However….

Information on the Internet can be:

Unreliable

Inaccurate

Not up-to-date

Biased

As there is no checking process.

Page 156: ICT Theory

Undesirability of certain websites

There is always a risk of coming across undesirable websites

Some weblinks may take you to undesirable websites

Security risks are high

Who decides what is undesirable?

Page 157: ICT Theory

Security Issues

Viruses

Phishing – Fraud by email – tempting you to go to a website and give away personal information

Page 158: ICT Theory

Phishing Example

Page 159: ICT Theory

Pharming

Fraud where users are re-directed to a fraudulent website usually by a virus.

Panix - In January of 2005, someone fraudulently changed the DNS address for the domain panix.com, a New York State Internet service provider.

Ebay (Germany) - In September 2004, a teenager in Germany managed to hijack the domain for eBay.de.

Page 160: ICT Theory

SPAM

Unsolicited email

We all get them. Get rich quick, get a green card, Viagra etc………………….

Some ISPs filter them out. Some mail systems have facilities to do your own filtering.

Page 161: ICT Theory

SpywareSoftware which gathers information from your computer.

Like a virus but its purpose is to steal credit card details, email lists or use webcams and broadcast on the internet.

Page 162: ICT Theory

Cookies

Not biscuits

When I log onto the Amazon website it displays my name. A cookie is used.

Amazon creates a cookie on my machine which the website reads from.

Is a “Cookie” spyware??

Page 163: ICT Theory

Use of Cookies

Cookies are very small

Websites use them to display targeted advertising e.g. latest Blu-Ray discs

Cookies enable a website to know if you have used their website before.

Cookies are easily removed from your computer.

If a website can create a cookie, it can create anything.

Page 164: ICT Theory

Effect of ICT on Society

Page 165: ICT Theory

Employment Over the years, the introduction of ICT

has affected employment. Key areas are:

Manufacturing

Warehousing

Other labour intensive areas

Page 166: ICT Theory

Manufacturing Many tasks in manufacturing have now been

automated with robots that are controlled by computers.

For example, most cars are now mostly constructed using robots. The robots can screw and weld parts together, lift heavy objects easily and paint the car body.

Page 167: ICT Theory

Warehousing

This is where items on an order list can be collected automatically by special robots. The humans then just have to send the order to the customer.

Page 168: ICT Theory

Labour Intensive Work Other work can also be done by

machines. A good example is printing newspapers and magazines. This used to be a very manual job but can now be automated with machines.

Page 169: ICT Theory

Advantages of using Robots and other Machines

Productivity is increased – this means that more work can be done in a shorter time

You don’t have to pay the robot wages

They do not need to take breaks

There is also less chance of human errors

The work is consistent – the quality is always the same

It is safer to use robots for dangerous heavy work

Page 170: ICT Theory

Disadvantages of robots and other machines

Robots and large manufacturing machines are expensive to buy in the first place

De-skilled workforce – since some of the highly skilled jobs are now done by robots and other machines, the jobs that are left for people to do require less skills and qualifications

Increased unemployment

Page 171: ICT Theory

Online shopping and banking

What is it? This is where you visit a special website (like

Amazon) in order to buy items. You search for the item you like, click ‘buy’ and then enter your delivery address and your credit card details. After a short time the item you bought is delivered to your house.

Page 172: ICT Theory

Online shopping and banking

Advantages You don’t have to leave your house to do it so

you save time and money travelling

There are a wide range of products because you can get them from all over the world

The products are cheaper because the company selling them does not have to pay for a shop, so they save money on rent, heating, lighting, staff etc

You can shop at any time because the website is available 24/7

Page 173: ICT Theory

Online shopping and banking Disadvantages

Fraud – it is possible (although unlikely) that your credit card details could be stolen and then used by someone else to buy other things. It is unlikely because on most websites the information is encrypted which means that it is converted to a special code that only the customers computer can understand

Page 174: ICT Theory

Online shopping and banking

Disadvantages You might become lazy or lonely because of a

lack of social interaction with other people

There could be an increase in the health risks associated with using computers

You cannot try out the product before you buy it

You have to have a computer and internet connection

Page 175: ICT Theory

Online Banking What is it?

This is a service provided by banks to allow people to work with their bank accounts using an internet website.

Because they deal with money and personal details, online bank websites need to be secure so they are always encrypted. Also, users have to put in a username, password and often another secret code to log in.

Page 176: ICT Theory

Online Banking Advantages

Online banks have the same type of advantages as online shops like no need to travel, saves time and fuel etc

It is also available 24/7

You can get up-to-the-minute information about your account

Page 177: ICT Theory

Online Banking Disadvantages

Same type of disadvantages as with online shopping

Security is particularly important as the website deals with lots of money and so extra login details are normally required etc

Page 178: ICT Theory

Effects on BusinessCustomers using online shopping and

banking also has an effect on businesses and companies. They can save on the costs of staff and

buildings for their shops/branches

Over the internet they have access to more customers

They do have to pay to set the online sites up

They might have to employ or train more staff to do other jobs like deliveries and fixing the website

Page 179: ICT Theory

The effects of using ICTINTERNET SHOPPING

Page 180: ICT Theory

Internet/online shopping and searching for products on websites

Many people search for and order services and products using the Internet

Online stores have databases of their goods and services which you can access

You can browse or search for a specific thing

Page 181: ICT Theory

Internet/online shopping Purchasing goods and services using

the Internet

Customers browse online catalogues

They add goods to their virtual shopping basket/trolley

They go to the checkout

They then enter their card (debit or credit) details and other details, which are encrypted for security reasons

Page 182: ICT Theory

Advantages of online shopping to customers

Page 183: ICT Theory

Disadvantages of online shopping to customers

Page 184: ICT Theory

Advantages of online shopping to the store

Page 185: ICT Theory

Disadvantages of online shopping to the store

Page 186: ICT Theory

Online booking services Low cost airlines and ease of

booking mean many people book flights and hotels direct

Can get impartial reports from others about resorts and hotels

Can book car rental

Page 187: ICT Theory

Advantages of booking online

Book from the comfort of your home

More time to look for holidays than when at a travel agent

Make savings when booking direct because no travel agent commission to pay

Read reports of people who have been on the same holiday that we intend to book

Arrange our own travel and accommodation

Find out about the resort before you go

Page 188: ICT Theory

Disadvantages of booking online

You have to enter credit/debit card details and these may not be kept safe

People could hack into the site and know you were away and burgle your house

There is no personal service like at a high street travel agent

You could easily enter the wrong information and book the wrong flights

Page 189: ICT Theory

Verification of bookings You are responsible for

entering booking details

You need to carefully verify data entered

This is done by a visual check (i.e., proof reading)

http://www.fotolia.com/id/14190586

Page 190: ICT Theory

Verification of a bookingNeed to check:

Credit card number entered is correct by comparing it again with the number on the actual card

Card expiry date

All the fields that should have data in them contain data

All the name and address details are correct – this is particularly important with flight tickets where the name on the passport has to match the name on the ticket

Passport numbers against the numbers on the actual passports

Page 191: ICT Theory

Internet Developments

Page 192: ICT Theory

Social Networking

A social network site allows you to post messages, upload pictures and stories on to your own personal page. This is then viewed by friends, family and colleagues.

Page 193: ICT Theory

Blogs

A Blog is a shortened form of the words Web Log.

A blog is a web site that is intended to offer and opinion or stories of what is happening to the author.

They started out

as personal diaries.

Page 194: ICT Theory

Wikis

Wikis are software that allow users to create and edit web pages. They are often known as web pages with an edit button.

Wikis should be treated with caution as anyone can edit them. One famous one is Wikipedia.

Page 195: ICT Theory

Digital Media Sharing Websites

Digital Media Sharing Websites allow you to upload and share videos on host websites.

An example of this is Youtube

Page 196: ICT Theory

Folksonomies

A way of adding a tag or classification to data of a particular type.

For example http://www.delicious.com/?view=hotlist

Page 197: ICT Theory

Expert Systems

Page 198: ICT Theory

What are they? An expert system is a computer system

that has been programmed with the knowledge of real human experts. It can then be given a situation and it can use logic to apply the knowledge as if it were a real expert.

For example, a computer chess game is a type of expert system. It has been programmed with moves that real chess players have made and it can use the rules of the game to choose the best move to make when it is it’s turn.

Page 199: ICT Theory

Examples Diagnosing illness (the system acts like a doctor

and has the knowledge of expert doctors programmed into it)

Mineral prospecting – this means looking for oil and other minerals like chalk, limestone and other rocky type things. Experts like geologists are used to program the system. The system can then help people to decide where to dig in order to find oil quickly.

Page 200: ICT Theory

Examples Other diagnosis like finding faults with car

engines or circuit boards (the system has the knowledge of mechanics and electronic engineers)

Chess games

Calculating tax – tax experts are used to program the system to help people to work out how much money they owe the government in tax

Page 201: ICT Theory

Why do we have them?

We have expert systems to help us. For example, knowledge that experts have can be saved in the system to be used even when they are not available (perhaps the experts are in a different place or even dead).

Page 202: ICT Theory

Why do we have them? They can save time – a doctor might be

able to diagnose an illness quicker because he or she can use the expert system to help. This would be quicker than looking up in a book.

They can also help people to do jobs in which they are not an expert. For example you might be able to find out what is wrong with your car by using an expert system.

Page 203: ICT Theory

How do they work? Expert systems follow these steps when they are

working: The ES asks the user questions about the problem.

These questions appear on the screen and the user types in the answers. This is the USER INTERFACE. The questions are about the symptoms of the problem.

The ES uses the answers. An INFERENCE ENGINE searches the KNOWLEDGE BASE using the RULE BASE.

The ES then suggests possible answer to the problem.

Page 204: ICT Theory

How do they work? For example, with diagnosing a fault

with a car, the user will type in things that the car does or does not do like ‘Does the car start?’

The ES will use the answers to the questions to perform its searches and then come up with a list of possible or suggested faults with the car.

Page 205: ICT Theory

Some Disadvantages It might be expensive to set up because it is

complicated and you need to get the real expert opinions.

It is not a person and so does not have common sense. This means that the person reading the suggestions (output) needs to check the answers are sensible in the situation.

You might need to be trained to use it, which could be expensive.

Page 206: ICT Theory

The ways in which ICT is used: Expert systems

Page 207: ICT Theory

Expert systems An ICT system that thinks and

behaves like a human expert in a certain field

These are systems that can be used to mimic a human expert

They use artificial intelligence to make decisions based on answers to questions

Page 208: ICT Theory

Components Knowledge base – set of knowledge

about a particular field/subject

Inference engine – a set of rules on which the decisions made by the system are based - these rules are applied to the knowledge base

User interface – the way the expert system communicates with the user - it presents the user with questions and allows them to type in the answers

Page 209: ICT Theory

Applications of expert systems

Doctors – for medical diagnosis

Geologists – to help them find the best place to look for minerals or oil

Accountants – for giving tax advice to individuals/companies

Car engine fault diagnosis

Page 210: ICT Theory

Medical diagnosis Enables a doctor to make an

accurate diagnosis

Gives a doctor the the knowledge and decision-making ability of a consultant in the field

Enables a patient to be put on the correct treatment without delay

Page 211: ICT Theory

Prospecting for minerals/oil Can take geological

information from maps to create the knowledge base

Use knowledge base and apply the rules in the inference engine to it

The user can enter locations using the user interface

The expert system will suggest the most likely places where minerals/oil could be found

Page 212: ICT Theory

Giving tax advice to companies/individuals Tax is complex

Companies and individuals want to legally minimize the tax they pay

Expert systems ask a series of question to arrive at an expert decision

Page 213: ICT Theory

Advantages and disadvantagesof expert systems

Advantages

Fewer mistakes – they do not forget things

Less time to train – human experts take a long time to train

More expertise than a single expert – systems based on expertise of many experts

Always asks the questions that a human expert may forget to ask

Cheaper – don’t have the wage costs of a human expert

Disadvantages

Fewer mistakes – they do not forget things

Less time to train – human experts take a long time to train

More expertise than a single expert – systems based on expertise of many experts

Always asks the questions that a human expert may forget to ask

Cheaper – don’t have the wage costs of a human expert

Page 214: ICT Theory

Systems analysis and designVALIDATION AND VERIFICATION

Page 215: ICT Theory

Valid data Data that is valid is allowable

Valid data has to obey certain rules

Data can be incorrect yet still be valid

Page 216: ICT Theory

Data can be valid and incorrect

Example:

A person has a date of birth 19/12/87

A user enters it incorrectly as 19/12/78

Both are valid as dates

Yet one is incorrect

Page 217: ICT Theory

Two techniques for reducing errors

Verification

Validation

Page 218: ICT Theory

Verification Checks that errors are not

introduced by the user during typing

Checks data entered is the same as on a source document (e.g., order form, application form, etc.)

Page 219: ICT Theory

Two methods of verification

Visual comparison – checking what has been typed in against the source of the data

Double entry of data – two people enter the same data – only if both sets of data are the same will it be accepted

Page 220: ICT Theory

Validation checks include

Data type checks – is data entered the right type for the field (e.g., letters are not entered into a numeric field)?

Presence checks – has a field been left empty?

Length and format checks – is data of the right length and the right combination of characters for a field (e.g., code FF019J has length 6 characters with first two letters, the next three numbers and the last a letter)?

Boolean checks – data is either: True or False, Y or N

Consistency checks – checks to see if the data in one field is consistent with the data in another field

Page 221: ICT Theory

Check digits

Added to important numbers such as bank account numbers, International Standard Book Numbers (ISBNs).

Added at the end of the block of digits

Used in a calculation using all the digits to check that all the digits have been entered correctly

Page 222: ICT Theory

Systems Analysis

Page 223: ICT Theory

We Are Learning To

Explore the different stages of the Systems Lifecycle

Identify and describe in detail what happens at each of the different stages.

Page 224: ICT Theory

Systems Analysis What is it?

Systems Analysis and Design is the process we use in business to make sure that when we do a new project for a customer we deliver the correct thing at the end.

To do this we have to: investigate the problem

ask the customer questions

design the solution to the problem using the answers to the questions and the investigation to help us get it right

In ICT we are talking about designing new computer programs or systems.

The process involves several different stages.

Page 225: ICT Theory

Analysis

This is where we (the systems analyst) do two things. We find out exactly how the old or

existing system works. This is because we can’t replace it with a new system if we don’t know how the old one works.

We find out how the customer wants to improve on their existing system. Normally someone who wants to buy a new computer system is in some way unhappy with the old one.

Page 226: ICT Theory

Analysis

How do we do this? There are 4 ways that we perform analysis, they

are Observation, Questionnaires, Interviews and Looking at existing documents. We need to know about all of these.

Page 227: ICT Theory

Analysis

Observation – This is where the systems analyst simply watches people doing their work using the old system.

Advantages You can see exactly what is going on

It does not cost much money

The information is reliable

Disadvantages Some staff don’t like being watched and so they might be

uncomfortable. This means that they might not do everything in the normal way.

Page 228: ICT Theory

Analysis Questionnaires – This is where the systems analyst

creates a list of questions about the old system and gives them to many employees to answer.

Advantages Making questionnaires does not cost much money

The questions can be answered quite quickly: many people can give you their answers all at the same time.

The people answering the questions may not need to give their names (they are anonymous)

A computer can be used to check the answers

Disadvantages People might not take them seriously and give silly answers or not give in the

papers at all (if it is anonymous)

The questions are fixed – if you were with the person answering, you might think of another question to ask them based on their answer. With a questionnaire you cannot ask new questions like this

Page 229: ICT Theory

Analysis

Interviews – This is where the analyst has a face to face conversation with the customer to ask them about the old system and the way it works.

Advantages You can ask extra questions based on the answers given – the questions are

flexible

You can ask questions that have much longer answers than on a questionnaire to give in depth knowledge

Disadvantages It takes a long time as the analyst has to sit with each person individually

This makes it expensive too as it takes up a lot of the analyst’s time

Obviously, the person being interviewed cannot be anonymous

Page 230: ICT Theory

Analysis

Looking at existing paperwork – this is where the systems analyst collects examples of all the different printouts that come from the old system and then looks at them very closely.

Advantages There is some information that can only be collected in this way

It also gives the analyst information about how many prints the system produces

Disadvantages For looking in detail to be done properly, a lot of time must be taken

This means that it can be quite an expensive method of doing analysis

Page 231: ICT Theory

Design

This is where the person doing the design (could be the systems analyst or could be a new person - the system designer it depends on the size of the project), takes the results of the analysis and designs a new way of solving the problem. There are many things that need to be designed.

Data capture forms

Screen layouts for input screens

Output forms and reports

System Flow Charts

Page 232: ICT Theory
Page 233: ICT Theory

Design

Data capture forms

These are the paper forms that are used to gather the data that is to be input into the new system

Page 234: ICT Theory

Design

Screen layouts for input screens

These are the designs of the screen displays that users of the system will see and use

Page 235: ICT Theory

Design

Output forms and reports

When the computer is asked for information by the user, the screen display it shows is called an output form, and the way this form looks has to be designed.

The users can also ask the computer for printed output and these are called reports. The layout of the reports (i.e. The columns that are shown, the width of the columns, the column titles, the colour of the writing etc) all have to be designed.

Page 236: ICT Theory

Design

System Flow Charts

This is a description of how the system will work that uses special flow chart symbols (or shapes). Part of a flow chart might look like this:

Page 237: ICT Theory

Design

Select the hardware that is needed

The designer will also have to decide which type of computers will be needed for the new system. He or she will need to say how large the hard disks will need to be, how much memory the computer will need, how big the screen will be, the type of processors the computers will need etc.

Page 238: ICT Theory

Design

Select any software that is needed

As well as writing new programs (or applications) some projects can be completed by using software that already exists.

For example a person who needed to do the accounts for their business could use a spreadsheet package. So selecting software is also something a designer might do. Also doing the new project might mean the a new operating system is required (e.g. a newer version of Windows).

Page 239: ICT Theory

Design Design the test plan

Every type of computer system will need to be tested to check that it works properly.

To do the testing properly to make sure everything is tested, there must be a plan that says which tests are needed and what we expect the result to be.

For each of the tests, the designer has to decide on which data is to be typed in as part of the test.

There are 3 types of test data: Normal

Extreme

Abnormal

Page 240: ICT Theory

Design Design the test plan

Normal – Normal data is data that we expect the system to allow. For example, if there were a box to type in the year group, any number between 1 and 13 should be allowed. If any of these values is not allowed then the test has failed.

Extreme – Extreme data is the two values at the upper and lower limits of the range so in the example of year groups, the extreme data would be 1 and 13. They should be allowed by the system.

Abnormal – Abnormal data is data that the system should not allow at all. In our example any number greater than 13 or less than 1 should not be allowed. The number 25 would be abnormal data in this case and should be rejected by the system.

Page 241: ICT Theory

Design

Verification and Validation Rules Another thing the designer must design is the verification

and validation rules.

These are the checks that the system uses on the data that is entered.

The tests in the above section are designed to test whether the validation rules are working properly.

Page 242: ICT Theory

Design

Verification and Validation Rules Validation

This is where the computer checks to see if the data that is entered is valid.

Valid means that the data is allowable and sensible.

IT CANNOT CHECK THAT THE DATA IS CORRECT, because it doesn’t already know the correct values.

There are many types of validation rule (see sheet), but the main ones are Length Check, Range Check and Presence Check.

Page 243: ICT Theory

Design

Verification and Validation Rules Verification

This is a process that can be used to check if information is correct when it is entered into a computer system. There are two ways of doing this:

Double entry – this is where the computer asks the user to enter the same data twice. The computer compares the two and if they are the same it says the data is correct or incorrect.

Visual Check – often data entered into a computer is copied from somewhere else like a piece of paper, for example an application form on paper will be copied into a computer system. A visual check is where a person compares the information on the original paper with the information that has been entered. When errors are spotted they are corrected.

Page 244: ICT Theory
Page 245: ICT Theory

Development

This is where the system that has been designed is made. Computer programmers (the people that write programs) will create any databases that are needed, the screen layouts, the reports, all the calculations and the verification and validation routines.

Page 246: ICT Theory

Testing

Once the development (or parts of the development) is finished, they will be tested using the test plan that was designed in the design stage.

Sometimes when the system is very large, it will be tested in smaller pieces before being put together.

Otherwise the tests would be very long and confusing.

Page 247: ICT Theory

Implementation

This is where the completed and tested system is finally given to the customer.

There are 4 ways of doing this: Direct

Parallel

Pilot

Phased.

Each of them has their own advantages and disadvantages (see sheet).

This is sometimes called changeover as the customer has to change over from the old system to the new one.

Page 248: ICT Theory