As Ict Revision Notes
As Ict Revision Notes
As Ict Revision Notes
Table of Contents
Networks....................................................................................................2
Data............................................................................................................8
ICT Laws & Legislation..............................................................................13
Software...................................................................................................16
Hardware..................................................................................................21
Feasibility..................................................................................................25
Jobs in ICT.................................................................................................26
Software Development............................................................................27
Threats......................................................................................................32
Security.....................................................................................................33
Virtual Reality...........................................................................................36
Processing.................................................................................................38
Memory....................................................................................................39
Internet & Communications.....................................................................40
Unions.......................................................................................................42
CAD / CAM................................................................................................43
Operating System.....................................................................................44
Errors........................................................................................................45
Photos / Images........................................................................................46
TCP / IP.....................................................................................................48
Barcode / RFID..........................................................................................49
1
Networks
Advantages of a Network
LAN
WAN
Hub
File Server
Switch
2
Firewall
3
To communicate with each PC
A wireless modem may be used
o To connect directly to the ISP / Internet
Appropriate software / drivers will be required
Bus Network
Star Network
4
Adding new nodes to a Network
Bus
o New computers connected directly / by its own cable
To the bus backbone
Star
o New computers connected directly / by its own cable / wirelessly
To the central / controlling computer
Ring
o New computers added by splitting existing connection between two
nodes
New computer connected between these existing connections
Cable Failure
Star Network
o Each node is directly connected to the hub / server by a cable
o Failure of a cable will only affect the node connected by the cable
o All other nodes will be able to communicate via the hub
Bus Network
o All nodes are connected to a backbone
o Failure of the backbone will affect the rest of the network
o Failure of a cable connecting a node to the backbone will only affect
that node
Wi-Fi
Wi-Fi enables two or more devices to connect (wirelessly) for data sharing
A computer with a Wi-Fi network card
o Can connect wirelessly to a wireless router
o Over a limited distance (60m /90m)
A Wi-Fi network can either be open (anyone can use them)
o Or closed (password is needed)
An area with wireless access is called a wireless hotspot
No cabling required
o Saves installation cost and time
Computers on the network are not restricted to a physical location
o They can be used anywhere there is network coverage
5
Router / hub
o To communicate directly to the Internet connection
o To communicate directly with each computer / node
Adapter / network card in each computer / WiFi / Bluetooth / transceiver
o To enable the PC to send / receive data without a physical
connection / send data to the router
o Software drivers for the wireless router / wireless adapters
To configure / install the router / adapters
o A micro filter
To separate data signal from voice signal
ISP
o To provide access to the WWW
IP Address
A unique number
o Assigned to any device / computer connected to the Internet
IP address consists of four sets of numbers
o Separated by full-stops / periods
E.g. 123.45.67.254
The computer processes this as a 32-bit pattern / four octets
First octet identifies the network
Last octet identifies the actual computer on the network
SMS
6
Bluetooth
7
Data
Data
Information
Knowledge
Direct Data Source has been created for a specific purpose and used for that
purpose
E.g. purpose of a questionnaire is to gather data about eating habits
Indirect Data Source is used for a purpose for which it was not originally
intended
Membership details could used for a survey / passed to a third party for
example
Benefits
o Can be very cost effective
Data has already been collected / processed / paid for
o Should be immediately available
As data has already been collected using the data source
Drawbacks
o The source was designed for a different purpose
May not provide exactly the data required / additional filtering
or processing may be required
Distributing Information
Using a website
o With graphical / multimedia / interactive representations of the
information
o Visitors will be directed to the website via search engines
Or they can go directly to the website using its URL
8
Using an online bulletin board / message board / forum / social networking /
blogging / VLE / podcasts
o Where information can be posted / threads created
o And readers can post responses or to post new messages
Quality of Information
Being up to data
Relevance
Effective presentation
Complete
Accurate
Quality of Information
Hardware costs
o The cost of purchasing / leasing computers / peripherals
o The cost of consumables
Software costs
o The cost of purchasing application software licences / the operating
system
9
Personnel
o Employing / training someone to develop the application / input
data / run reports
Validation
Data Verification
10
o Proofreading
User must confirm that the data is as intended by clicking the
Save button
Access Rights
Data Encryption
Input
o The cash card is inserted
o PIN is entered
o Menu choice is selected
o Amount is entered or selected
Output
o Instructions / menu choices are displayed on ATM screen
o Receipt may be printed
o Sum of money is issued
Processing
o Customer’s data is retrieved from the banks database
o PIN is validated
o Amount is checked against the customers balance
o Amount is deducted from the customers balance
Storage
o Customer data is stored in the cash card
o Customers details are stored in the banks database
o Details of the transaction are stored in the banks database
Feedback
11
o The amount is instantly deducted from the customers balance
o If the card is invalid / incorrect PIN / withdrawal amount is not
possible an error message appears on the ATM screen
12
ICT Laws & Legislation
DPA
13
Computer Misuse Act
Plagiarism
The vast amount of material on the internet has greatly increased the
incidence of plagiarism
Information about almost any topic can be obtained with a few clicks of the
mouse via search engines
Most of the information is free
Many people are tempted to “cut and paste” material and pass it off as their
own
This is difficult to detect as this involves tracking down the source of the
plagiarised material
Such a problem that universities use special software to detect plagiarism
Copyright, Designs and Patents Act
o Makes plagiarism illegal
14
Censorship
15
Software
Off-the-shelf Software
Obtaining Software
In-house development
o Purpose-built / tailored / bespoke software
o Could be developed ‘in-house’
o By ICT specialists / programmers
Within the business
Outsourcing
o Purpose-built / tailored / bespoke software
o Could be ‘outsourced’
To ICT specialists
Outside the business
E.g. A Software House
16
Presentation Software
Creating
o Standard slide tempaltes are available
o User defined templates can be created
o Multimedia content can be added to each slide
Such as text / images / graphics / movies / sound / other
objects e.g. buttons
o Effects can be applied to slide components
Entrance, emphasis, exit animations
Presenting
o The slide show can be set to run automatically
Controlled by the presenter using mouse / cursor keys
o Transition effects can be applied to slide
o Audience hand-outs, outlines and speakers’ note can be produced
17
Search Engine
HTML
Programming language
o Controls the appearance of a web page / tells the browser how to
display a web page
Uses special tags
o To specify the structure of the web page / header / body
o To specify the content / multimedia elements / text / images / tables
o To set attributes such as fonts / background colour
o And hyperlinks / navigation buttons
18
Hyper Text Mark-up Language
A language / has a syntax
A HTML file is created for each individual web page
HTML commands take the forms of tags
The head tag describes / identifies the website / page
The body tag specifies the content of the web page / what will be displayed in
the browser
Text can be formatted – fonts, sizes, colours
Multimedia content can be inserted – graphics / images / sounds / movies
Links can be inserted – to other pages / multimedia objects
The structure of a page can be controlled by templates / tables / CSS
MP4 Technology
RTF documents can be read by most word processors and operating systems
Various text formatting properties
o Such as bold characters and different typefaces
o As well as document formatting / structures / tables
o Are encoded in a standard way
Reports
19
Spreadsheet Functions
20
Hardware
Data Projector
CD-R
Laser is used
o Heats areas of an organic dye layer
o Permanently change the reflectivity of those areas
A lower powered laser reads the data
o By detecting alternating regions of heated and unaltered dye
CD-RW
A laser is used
o To temporarily modify the phase change properties of a dye
o Between crystal phase (erased) and amorphous phase (recorded)
A laser detects the difference between resulting light and dark areas
Can be rewritten to 1000 times or more
o Allows users to keep the most up to date data on the disk
Suitability for backups
o CD-RW is portable
And can be removed to a safe location
o The data can be copied onto the CD-RW as it is writable
So the backup data can be copied to it
o A CD-RW can be reused for multiple backups
As the backup can be erased and new data written (rewritable)
o CD-RW has enough capacity
For small / medium databases
21
o May not have enough capacity
For large databases
Blue-Ray
Advantages
o The format was developed for high-definition video (HD) and for
storing large amounts of data
Permitting high definition audio and video
Providing clearer pictures with improved colour and vividness
Disadvantages
o Blue-ray is a new / emerging technology
Players and discs are still relatively expensive
Range of films is restricted
Touch Screen
Speech Input
A microphone
o Attached to a soundcard
Used to capture speech
The signal is converted from analogue to digital
o Using sampling
The digital signal is compared to a database of sounds
o For a matching pattern
Of frequencies / wavelengths
22
Speech Input compared to a Touch Screen
Advantages
o No special ICT skills required, just spoken commands
o The user can control the system from a distance
o Can be designed only to respond to certain people’s voices
o Can be adapted for remote activation e.g. by phone
o More suitable for people with disabilities
Disadvantages
o Can be complicated / time consuming to calibrate / set up
o Could be activated by extraneous sounds e.g. background noise
o May fail to respond to the user if they have a cold for example
o May respond to a word not intended as a command
Sensor
Actuator
Robots
23
Welding components together
Testing of safety of goods
o E.g. car crashes / dummies
24
Feasibility
Technical Feasibility
Legal Feasibility
Will the proposed system comply with all relevant legislation such as the Data
Protection Act?
Social Feasibility
Economic Feasibility
Operational Feasibility
Schedule Feasibility
25
Jobs in ICT
Programmer
Technicians
Installs hardware
Installs and configures software
Maintains ICT systems
Liaise with / support users
Troubleshoot / monitor ICT system
Perform backups
26
Software Development
Observation
o Benefits
The working of the system can be studied at first hand
o Drawback
Users may ‘act up’ under observation
Questionnaire
o Benefits
Same set of questions can be given to a large cross section of
users at the same time
Anonymous process may encourage honest answers
o Drawbacks
The questions are set beforehand and a question cannot be
changed in the light of the user’s response
Interviews
o Benefits
Can be fine tuned for the particular user / follow up questions
can be asked
o Drawbacks
Users may ‘act up’ under the pressure of an interview
May be difficult to select the users to interview
Design Stage
Implementation Stage
System is developed
o From the technical specification
Software / code produced
Installation of the new system
Testing of the overall system
Staff training
Changeover
o Data conversion
27
Testing
Technical Documentation
User Documentation
28
DFD
Application Testing
Acceptance Testing
29
o Using real world scenarios / data
The users report back / provide feedback on any problems
Eventually, the users sign off the software / complete the contract
Alpha and beta testing may be used
Parallel Changeover
Pilot Changeover
Direct Changeover
Phased Changeover
Evaluation of Software
30
The effectiveness of the software
o Is the system cost effective?
o Does the system perform its tasks efficiently / meet benchmarks?
31
Threats
Worm
Macro Virus
Logic Bomb
32
Security
Firewall
Proxy Server
HTTPS
A protocol
When a user connects to a website via HTTPS a secure session is created
The website uses encryption
o For sensitive data such as bank details
Using a digital certificate
Has a private key restricted to the owner
Public key given to the user
The website must have a Secure Socket Layer (SSL) Certificate
o Which must be verified / trusted
Example:
o PayPal
Safeguards the buyer’s and seller’s bank details
Buyer and seller must each have a PayPal account
PayPal transfers money from the buyers account to the sellers
account
So that the buyers confidential details are withheld
from the seller and vice versa
33
Username & Password
On-line Security
PayPal
o Method sending and receiving money online / over the internet
o It is a secure method
o Acts as an intermediary between buyer and seller
So that the buyers details are withheld from the seller
o It is set up using an email address and a password
o Money is transferred through PayPal accounts, not ordinary bank
accounts
o Transaction fee may be charged
HTTPS
o Hypertext Transfer Protocol Secure
o A protocol
Providing secure / safe internet transactions
Via a secure website
o It is used when the information being communicated is sensitive /
confidential
Such as credit / debit card details
o Uses encryption
So that the information being transferred back and forth is
encoded
o And will be meaningless to any unauthorised parties
34
Online Banking – Security Risks
Identity fraud
o Personal / banking details keyed in during a transaction may be
intercepted and used for unauthorised purchases / keystroke logging
Phishing / fraudulent emails
o User asked to supply personal / banking detail by a bogus email
Viruses
o May be downloaded while using on-line banking
35
Virtual Reality
Virtual Reality
Allows the user to interact with an environment that exits only inside a
computer / an artificial environment is created
Uses immersive technologies
o Such as head-mounted displays / virtual reality helmets / special
gloves
o Or a special room whose walls consist of screens / simulators
The computer creates a three-dimensional environment
o From numerical data / sensors
o Which sense the user’s reactions and motions
The user can modify the synthetic environment
o Creating the illusion of bing part of the real environment / receive
feedback
Real-time processing is required
Benefits
o Procedures can be repeated
At any time
Many times
o Variations / emergencies can be programmed in
o New techniques can be practiced
o Feedback provided on the users performance
o Minimises human risk from real life situations
Simulator
36
How ICT is used in a simulator
Computer software generates 3D images of what the user can see (weather,
landscape etc.)
o Projects them onto a special screen / dome
Actuators move hydraulic / electromechanical legs
o To recreate things such as pitch / acceleration / deceleration
Sensors are used to detect use response
o Such as response times / metabolic readings
Virtual reality helmets / gloves with sensors may be used
37
Processing
Batch Processing
38
Memory
Hard Disk
ROM
RAM
Cache Memory
39
Internet & Communications
Internet – Communicating
Email – Group
40
Email – Draft
Video Conferencing
Hardware
o Web cam
o Microphone
o Loudspeaker
o High resolution screen / data projector
o High bandwidth cable / connection
Software
o Communication software enable the sending and receiving of data
over telephone
o Image compression / decompression software to reduce file sizes
during transmission
41
Unions
ISO
42
CAD / CAM
43
Operating System
Enables the user to perform more than one task / program at a time
Each task may have its own window
Each task can be totally independent of each other
The tasks may be dependent e.g. they may share data
The OS must keep track of where the user is in these tasks
o Enable them to go from one to the other without losing data
The OS allocates storage and other resources accordingly
In pre-emptive multitasking, the OS allocates CPU time slices to each program
/ task
In co-operative multitasking, each program has use of the CPU for as long as
it needs
Multi-User OS
44
Errors
Errors
Transposition error
o The order of data / information has been switched
Transmission error
o The data has not been sent successfully / fully
Omission error
o Data has been omitted during transmission / data is missing
Check Digit
45
Photos / Images
JPEG / JPG
o Method of compressing full-colour or grey-scale images
o Uses image compression
o This reduces file size
o Possible expense of image quality / lossy compression
Degree of ‘lossiness’ can be varied
Greater degree of compression, smaller the file size
Greater the reduction in quality
o Can handle over 16 million colours
BMP / Bitmap
o Non-compression method
o A bitmap file represents pixels in a grid
o Each pixel in the photograph
Represented using 8 / 16 / 24 / 32 bits (colour depth)
For grayscale / coloured images
o All detail in the image is stored / no compression
Resulting in large file sizes
o The more bits, the greater the resolution
Larger the file size
PNG
o Open-source format
o Supports true colour (16 million colours)
o Lossless / no compression
o A lossless compression method
o Supports indexed colours / grey-scale / RGB / millions of colours
o Uses progressive rendering
The contents of a file become apparent earlier in the load
process
o Uses an alpha channel which enables multiple levels of opacity
46
o Uses gamma correction to control how an image will appear on
different types of display
o Include file integrity checks to minimise problems while downloading
or transferring PNG files
o
GIF
o This is a method of compressing colour or grey-scale images
o Bitmap image format
o It is an 8-bit format
Supports 256 colours
o Uses compression for colour depth
o Stores pixel data
Transferring a Photo
47
o Image can be sharpened for example
Blemishes / dirt marks can be removed / blurred / cloned out
48
TCP / IP
TCP / IP
TCP layer
o Supports the transfer of files between computer systems
o Controls security / permission issues
o Can handle file transfer between different computers (different
character sets, end of line conventions)
o Splits data into packets
o Allocates an address to each packer
IP layer
o Responsible for transferring packets of data from node to node
o Forwards each packet using its address
o Responsible for verifying the correct delivery of data
o Detects errors or lost data
TCP / IP
TCP layer
o Enables two hosts to establish a connection and exchange data
o It is responsible for reliability and correct delivery
o It converts a message into data packets
Containing a header / sequence number / destination address
That are transmitted over the network to the destination
computer
And then reassembled so that the message can be read by the
recipient
IP layer
o Responsible for routing data packets from node to node
o It forwards each packet using its destination address (the IP number)
o Packets of the same message may be sent by different routes
By routers / switches
49
Barcode / RFID
Barcode
RFID
50
RFID over Barcodes
51