ICT Notes Chapter 1 To 10
ICT Notes Chapter 1 To 10
I.G.C.S.E. SECTION
Paper 1
June 2016
Dina El-Akkad
ICT I.G.C.S.E SECTION
Contents
Dina El-Akkad 1
ICT I.G.C.S.E SECTION
Dina El-Akkad 2
ICT I.G.C.S.E SECTION
1.1 Hardware:
Hardware is a general term for the physical components that make up a computer system, for
example keyboard, mouse, etc. Hardware can be either external or internal.
Peripheral devices: devices other than the CPU.
Central Processing Unit (CPU): The CPU interprets and executes the commands from the
computer hardware and software. It is part of the motherboard.
A microprocessor is a single integrated circuit found in PCs and many household devices.
The CPU is made up of:
a Control Unit: controls the input and output devices
an Arithmetic and Logic Unit (ALU): carries out calculations and make logic decisions
Immediate Access Store (RAM)
Motherboard:
The motherboard is a printed circuit board found in all computers. The motherboard
allows the processor and other computer hardware to function and communicate with
each other. It acts as a kind of ‘hub’ that other computer devices connect to. It
contains several sockets and slots to connect the other components.
Sound Card
Sound cards use two basic methods to translate digital data into analogue signals needed for
speakers:
FM synthesis mimics different musical instruments according to built-in formulas
wavetable synthesis relies on recordings of actual instruments to produce sound.
1.2 Software:
Software is a general term for the programs that control the computer system. There are two types
of software: application and system.
a) Application Software: Programs that allow the user to do specific tasks. For example:
Word processor is used to manipulate text documents.
Spreadsheet is used to organise and manipulate numerical data.
Database management system is used to organise, manipulate and analyse data.
Control and measuring software
Apps (short for Applications) refers to the type of software that runs on mobile phones or
tablets.
Photo editing software
Video editing software
Graphics manipulation software
Dina El-Akkad 4
ICT I.G.C.S.E SECTION
b) System Software: Programs that allow the hardware to run properly and allow the user to
communicate with the computer. For example:
Operating systems
Device drivers allow hardware devices to communicate with the operating system.
Linkers are used to put all the modules together to form a final program.
Dina El-Akkad 5
ICT I.G.C.S.E SECTION
1.3.1 User interfaces:
Command line interfaces (CLIs):
CLIs require a user to type in instructions in order to choose option, open software, etc.
CLI is used by programmes, analysts and technicians to have direct communication with a
computer to develop new software, locate and remove errors, and so on.
Touch screen phones use post-WIMP interaction, where fingers are in contact with the screen
allowing actions such as rotating.
GUI is used by the end-user who doesn’t have great knowledge of how a computer works.
GUI 1. The user doesn’t need to learn any 1. It uses up more computer memory than a
commands. CLI interface.
2. It is more user-friendly; icons are used to 2. The user is limited to the icons provided
represent applications. on the screen.
3. A pointing device is used to click on an
icon to launch the application – this is
simpler than typing.
Dina El-Akkad 6
ICT I.G.C.S.E SECTION
1.4 Types of Computers:
1.4.1 Personal Computers (PCs) / Desktop Computers:
They are general purpose computers made up of separate components. Spare
parts are often cheap because they are standardised.
Dina El-Akkad 7
ICT I.G.C.S.E SECTION
1.4.3 Tablets
Internet access is usually through Wi-Fi or 3G/4G (mobile phone) connectivity.
Features of tablets:
high-definition, anti-glare displays
front- and back-facing cameras
lower weight and longer battery life than laptops
Bluetooth connection to printers and other devices
flash (solid state) memory and cloud storage facilities to backup and synchronise data
sources
sensors to carry out the following functions:
o proximity sensors to detect if a device is close to the ear to block unintended touches
o accelerometer, which detects movement and orientation of the device
o can use speech-recognitions systems.
Dina El-Akkad 8
ICT I.G.C.S.E SECTION
1.4.4 Smartphones
Internet access is either by using Wi-Fi or 3G/4G (mobile phone) connectivity.
1.4.5 Smartwatches
Whatever is available on a smartphone is available on a smart watch.
Dina El-Akkad 9
ICT I.G.C.S.E SECTION
1.4.6 Mainframe Computers:
The main features of mainframe computers are:
they can have several CPUs
they have very fast processor speeds
they can support multiple operating systems
they have huge amounts of storage capacity
they have huge internal memories (several hundred gigabytes of RAM)
they often operate using time sharing or batch processing
Night vision enhancement (NVE) amplifies infrared light and visible light so that an image can
still be seen in apparent darkness. The military use this technology to carry out surveillance at
night.
Dina El-Akkad 10
ICT I.G.C.S.E SECTION
1.5.3 Robotics:
They are used in car factories to weld cars bodies, spray body panels and fit items
such as windscreens.
Drones are unmanned flying devices that are used by both military and civilians.
The military have used drones in reconnaissance missions for a number of years.
Civilians use include surveying the landscape in 3-D for use with GPS, investigating
weather phenomena or search and rescue /fire fighting in natural disasters.
Robotic surgery allows surgeons to perform complex procedures with more precision.
With this technique, surgeons use robotics equipped with a camera arm and several
interactive mechanical arms.
Quantum cryptography is based on the use of photons (light) and their physical
quantum properties to produce a virtually unbreakable cryptography system. This
helps protect the security of data being transmitted over fibre-optic cables. It is based
on the laws of physics rather than mathematics.
Dina El-Akkad 11
ICT I.G.C.S.E SECTION
1.5.6 3-D and holographic imaging:
Holography is a technology that allows 3-D images (known as holograms to be produced).
The technology involves the use of:
a source of laser light
interference of light
light diffraction, and
light intensity recording.
As a holographic image is rotated, it appears to move in the same way as the original object, thus
appearing to be in three dimensions (3-D).
Dina El-Akkad 12
ICT I.G.C.S.E SECTION
Dina El-Akkad 13
ICT I.G.C.S.E SECTION
2.1 Input devices and their uses
An Input device is a peripheral device which accepts data and sends it to the central processing
unit.
2.1.1 Keyboards:
Most data for computers is still typed on keyboards. Most keyboards use the QWERTY layout.
Typing data takes a long time and prone to mistakes (transcription errors).
Ergonomic keyboards are designed to reduce the health-related problems associated with standard
keyboards, such as repetitive strain injury (RSI).
The Concept Keyboard use icons or phrases instead of standard letters. They are
often used in fast food restaurants to make ordering easier.
Numeric keypads are used with applications where only numeric data is to be entered.
Uses:
1. Automatic teller machines (ATMs) to key in PIN, amount of money, etc.
2. Mobile phones
3. Point-of-sale (POS) terminals in case the barcode reader fails to read the barcode
4. Chip and PIN devices when paying by credit/debit cards
Uses of a Mouse:
1. Opening, closing and minimising software.
2. Moving and deleting files.
3. Image editing, for example, controlling the size and position of a drawing pasted into a
document.
4. Controlling the position of a pointer on the screen to allow selection from a menu or an icon.
Dina El-Akkad 14
ICT I.G.C.S.E SECTION
Touch Pad:
Touch pads are common with laptop computers.
Advantages:
2. No need for a separate mouse which aids portability and removes the need for a flat surface.
Disadvantages:
1. People with limited hand/wrist movement find the device difficult to use.
3. Operations like drag and drop are not easy with a touch pad.
Tracker ball:
It is like an upside down mouse. The ball is rotated by the user but in this case the
‘mouse’ stays still.
Advantages:
1. Doesn’t need the same fine control as a mouse.
2. Easier to use than a mouse if the operator is disabled.
3. More accurate positioning of the pointer than a mouse.
4. More robust than a mouse.
5. Need less desk space than a mouse or keyboard.
Disadvantages:
1. Not supplied with computers as standard, therefore more costly.
2. User may need training since it isn’t standard equipment.
Dina El-Akkad 15
ICT I.G.C.S.E SECTION
2.1.3 Remote Control:
Uses:
1. Remote controls are used to operate TVs, video players/recorders, DVD players/recorders,
satellite receivers, HIFI music systems, data or multimedia projectors.
2. They are used in industrial applications to remotely control processes, e.g. stop and start
machines.
Advantages:
1. Remote controls enable devices to be operated from a distance, which is useful for people with
disabilities.
2. Some chemical processes are hazardous, so it is safer to operate equipment from a distance.
Disadvantages:
1. People with limited hand/wrist movement can find them hard to use.
2. The signal between the control and the device can be easily blocked.
2.1.4 Joysticks:
A joystick is similar to a mouse and a tracker ball. Whenever the stick is moved, the
cursor moves in a similar direction on the screen.
Uses of a joystick:
1. Used in video/computer games
2. Used in simulators (for example, flight simulators) to mimic actual controls.
Advantages:
1. It is easier to navigate round a screen using a joystick rather than a keyboard.
2. Control is in three dimensions.
Disadvantage:
It is more difficult to control the on-screen pointer with a joystick than with a mouse.
Driving wheel
Uses of a driving wheel:
1. Used in video/computer games (for example, car racing games)
2. Used in simulators (for example, car-driving simulators) to mimic actual controls.
Dina El-Akkad 16
ICT I.G.C.S.E SECTION
Advantages:
1. Easier than a keyboard or joystick to control steering movements; it is more natural
2. The driving experience is nearer to how an actual steering wheel operates in real life.
Disadvantage:
1. more expensive than a mouse or joystick.
2. movements in the steering can be too sensitive, giving an unrealistic feel.
Advantages:
1. Touch screens enable fast entry of options.
2. It is user friendly method of inputting data, so no training is necessary.
3. Touch screens are tamper proof, preventing people from keying in information which could
corrupt the computer system.
Disadvantages:
1. There is a limited number of options to choose from.
2. Using touch screens frequently can lead to RSI.
3. The screen can get very dirty with constant touching.
Dina El-Akkad 17
ICT I.G.C.S.E SECTION
2.1.6 Scanners:
Uses:
1. Scan photographs and pictures for use in desktop publishing.
2. Scan part of a design to be used with CAD.
3. Used with OCR software to recognize different characters to be used with a word processor.
4. Scan in barcodes at POS terminals.
Advantages:
1. Images can be stored for editing at a later date.
2. Much faster than typing in documents again and no typing errors.
3. It is possible to recover damaged documents and photographs using appropriate software.
Disadvantages:
1. Quality can be limited depending on the resolution of the scanner.
2. They can be fairly slow at scanning.
Uses:
1. Digital cameras produce photographs for transfer to a computer directly or to print out by
connecting directly to a printer.
2. Many digital cameras also allow short video clips to be produced.
3. Photographs can be uploaded directly into applications software such as desktop publishers.
Advantages:
1. Easier to produce better-quality photographs than with a traditional camera.
2. Easier and faster to upload photographs to a computer.
3. There are no expensive developing costs.
4. The memory cards can store several hundred photographs.
Dina El-Akkad 18
ICT I.G.C.S.E SECTION
Disadvantages:
1. The higher the resolution the more memory is needed to store it.
2. Some cameras compress the images, reducing quality.
3. The camera user needs to be computer literate.
Video Cameras:
They are used to input moving pictures, often pre-recorded, into a computer. A video digitiser
converts an analogue video signal into a digital signal in the computer’s memory.
2.1.8 Microphone:
The input sound is converted to an analogue signal and then converted into a digital signal. The
computer’s sound card acts as an analogue to digital converter.
Uses:
1. Microphones are used to input speech for multimedia presentation software and web pages.
2. Input in voice recognition software. The software converts the speech into text that can be used
in a word processor or to input commands into a computer
3. Used as sensors to pick up sound in a burglar alarm system.
4. Used in video conferencing or Voice over Internet Protocol (VOIP)
Advantages:
1. Faster to read text than to type it using a keyboard.
2. If used in a voice-activation system, like in a car, it improves safety.
Disadvantage:
1. Voice recognition software is not as accurate as using a keyboard.
2. Sound files can use up a lot of computer memory.
2.1.9 Sensors:
A sensor is a device which inputs continuously changing physical measurements to a computer.
The information from analogue sensors needs to be converted into a digital form so computers can
understand. This is done using an analogue to digital converter (ADC).
Dina El-Akkad 19
ICT I.G.C.S.E SECTION
Sensors are used in monitoring and control applications. When monitoring, the data sent to the
computer is often transferred directly to a spreadsheet package (for example, taking measurements
in a scientific experiment, measuring atmospheric pollution, etc.).
Advantages:
1. More accurate readings taken when compared to human operators.
2. Readings are continuous – no break in monitoring.
3. Because it is a continuous process, any necessary action (control system) or warning (monitoring
system) will be initiated immediately.
4. Some processes are dangerous so it helps in preventing accidents.
Disadvantage:
Faulty sensors can give wrong results.
Advantages:
1. It is possible to modify drawings before they are input.
2. They offer a very accurate method of drawing.
3. The can record levels of pressure.
Dina El-Akkad 20
ICT I.G.C.S.E SECTION
Disadvantages:
1. They are more expensive than other pointing devices such as a mouse.
2. It takes longer to produce a drawing than doing it with pen and paper.
3. Menus are often not very user-friendly.
4. Larger drawings are expensive to produce.
5. The touch screens are damaged easily.
Uses:
1. Chatting online.
2. Video conferencing.
Advantages:
1. They can be left on constantly, only being activated as required.
2. They allow people to keep in contact with each other without the need to travel.
Disadvantages:
1. They are often with poor quality.
2. They need to be connected to the computer.
Uses:
1. Light pens are used for selecting objects on CRT screens.
2. Drawing applications where a graphics tablet might be too big.
Advantages:
1. Greater accuracy than touch screens.
Dina El-Akkad 21
ICT I.G.C.S.E SECTION
2. Small so can be used where space is an issue.
3. Easy-to-use technology.
Disadvantages:
1. Problems with lag when drawing on screen.
2. Only work with CRT monitors.
3. Not that accurate when drawing.
Uses:
1. Credit and debit cards have magnetic stripes that are used by ATMs or EFTPOS (electronic funds
transfer point of sale) terminals.
2. Security cards for entry to buildings, hotel rooms, etc.
3. Train and underground tickets use magnetic stripes.
Advantages:
1. Information can be input into the system quicker than typing.
2. More accurate than typing data manually.
3. Data is hidden from sight with a stripe, so is more secure than a printout.
4. Prevents access to restricted/secure areas.
5. Magnetic stripes are unaffected by oil, water, moisture, etc.
6. No moving parts – so physically very robust.
Disadvantages:
1. If the magnetic stripe get damaged (e.g. due to exposure to a strong magnetic field or excessive
use) the data is lost.
2. The card needs to be in close contact with the reader.
3. The information is not human readable.
Dina El-Akkad 22
ICT I.G.C.S.E SECTION
Contactless card readers:
Contactless debit or credit cards allow customers to pay for items worth up to $25 without entering
their PIN.
Advantages:
1. Faster transaction
2. Customers do not have to worry about incorrectly typing the PIN.
3. Retailers no longer have access to the customer’s credit/debit card information.
Disadvantages:
1. They are more expensive than normal credit/debit cards.
2. Can take money twice if the customer uses it as a chip and PIN card.
3. Transactions are usually limited to a small maximum value.
4. Transactions have been carried out without the card holder being aware of this while they were
just standing in the payment queue.
Uses:
Chip and PIN readers are used where payments are made using cards.
Advantages:
1. They allow secure transactions to take place, as without the PIN the transaction cannot proceed.
2. Chips are more robust than magnetic strips since the chip does not need to be in contact with the
reader.
Disadvantages:
1. If the customer forgets their PIN, the transaction has to be cancelled.
2. The card holder can be seen entering the PIN code.
Dina El-Akkad 23
ICT I.G.C.S.E SECTION
2.2.2 Radio frequency identification (RFID) readers
The RFID tag is made up of two components:
A microchip that stores and processes information
An antenna that is used to receive and transmit data.
Uses:
1. Livestock tracking
2. Retail – several tags can be read at the same time, thus speeding up the checkout process.
3. Admission passes
4. Libraries – books can be tracked in and out automatically by readers at the library entrance.
Advantages:
1. The tags can be read from a distance.
2. It is a very robust and reliable technology.
3. Very fast read rate.
4. Bidirectional data transfer.
5. Bulk detection is possible.
Disadvantages:
1. Tag collision
2. Radio waves are easy to jam or interrupt.
3. It is easy to hack into the data.
4. RFID is more expensive than barcode system.
Uses of MICR:
MICRs are used to process cheques in banking operations. The cheques are gathered
together and then read using a batch processing method.
Advantages of MICR:
1. Cheques are difficult to forge.
2. Cheques can be read even if they have been overwritten.
3. There is no manual input, thus errors are reduced.
Dina El-Akkad 24
ICT I.G.C.S.E SECTION
Disadvantages of MICR:
1. The equipment needed is very expensive.
2. Only certain fonts are accepted.
Uses of OMR:
1. Multiple choice examination papers correction.
2. School registration forms.
Advantages:
1. No time wasted in typing.
2. More accurate than keying in the data.
3. OMR is more accurate than OCR.
Disadvantages:
1. The forms need to be carefully designed.
2. Forms are sometimes difficult to be filled.
Advantages:
1. No time wasted in typing.
2. More accurate than keying in the data.
Disadvantages:
1. The system still has difficulty reading handwriting.
2. It is still not a very accurate technique.
Dina El-Akkad 25
ICT I.G.C.S.E SECTION
2.2.6 Bar code readers:
The bar code readers are usually in the form of a barcode scanner and are often
built into POS terminals in supermarkets. Hand-held scanners or wands are used
if portability is required.
Dina El-Akkad 26
ICT I.G.C.S.E SECTION
2.3 Output Devices and their uses
Output devices provide results in a suitable form after data processing. In many cases this will be
in the form of a hard copy (e.g. printed paper from a printer) or soft copy (e.g. output on a screen).
2.3.1 Monitors:
CRT (Cathode Ray Tube) Monitors:
CRT monitors use an electron gun to fire against a phosphor screen, which creates a picture that is
made up of tiny dots. Each dot is coloured red, green or blue - the intensity of each coloured dot
makes up the vast range of colours interpreted by the eye.
Uses:
1. Where space is not a problem.
2. They are used with light pens to allow designs to be created on screen.
3. Where more than one user may need to view screen simultaneously such as in design use, e.g.
when several designers may need to offer suggestions on a prototype.
Advantages:
1. The angle of viewing is still better than with most TFT monitors.
2. They work with light pens in CAD/CAM applications.
Disadvantages:
1. They are heavy and present a safety hazard if not supported properly.
2. They run very hot and can cause fires.
3. They consume more power than modern TFT monitors.
4. They can flicker, which can lead to headache and eyesight problems with prolonged use.
Dina El-Akkad 27
ICT I.G.C.S.E SECTION
Advantages:
1. TFT monitors are lighter in weight.
2. They produce less glare and also emit less radiation.
3. They consume much less power and do no generate as much heat.
4. TFT monitors saves a lot of desk space.
LCD (Liquid Crystal Diode) and LED (Light Emitting Diode) monitors:
Modern LCD monitors are backlit using LED technology. This gives the image better contrast and
brightness.
LEDs have become popular because:
1. LEDs reach their maximum brightness almost immediately.
2. LEDs give a whiter light, which sharpens the image and makes the colours appear more vivid.
3. Monitors using LED technology are very thin.
4. LEDs last almost indefinitely.
5. LEDs consume very little power.
Uses:
1. training presentations,
2. advertising presentations,
3. home cinema systems.
Dina El-Akkad 28
ICT I.G.C.S.E SECTION
Advantages:
1. They enable many people to see a presentation rather than all of them crowding round a small
computer screen.
2. They avoid the need for several networked computers.
Disadvantages:
1. Images can sometimes be fuzzy.
2. They are expensive to buy.
3. Setting up projectors can be little difficult.
2.3.3 Printers:
Laser Printer:
They rely on large buffer memories where the data for the whole document is stored
before the pages can be printed out,
Uses:
1. Most networked systems: low noise.
2. Most offices and schools: rapid, high quality and high volume of output.
Dina El-Akkad 29
ICT I.G.C.S.E SECTION
Inkjet Printer:
Inkjet printers don’t have large buffers, therefore printing is done bit by bit.
Uses:
1. in noisy environments and in applications where print quality is not that important.
2. where multi-part stationery is used. For example, wage slips.
Advantages:
1. They are robust printers so can be used in dusty, dirty or moist atmospheres.
2. Carbon copies or multi-part outputs can be produced.
3. They are very cheap to run and maintain.
4. They are easy to use if continuous stationery is required such as wage slips.
Dina El-Akkad 30
ICT I.G.C.S.E SECTION
Disadvantages:
1. They are very noisy and so not good in an office environment.
2. They cost more than an inkjet to buy.
3. They are very slow and the printing is of poor quality.
3-D Printers:
3-D printers are primarily used in CAD applications. 3D printing is regarded as being possibly the
next ‘industrial revolution’ since it will change the manufacturing methods in many industries.
They are based on inkjet and laser technology and can produce solid objects which actually work.
The solid object is built up layer by layer using materials such as powdered resin, powdered metal,
paper or ceramic powder.
Uses:
1. prosthetic limbs made to exactly fit the recipient
2. items to allow precision reconstructive surgery (e.g. facial reconstruction following an accident);
the parts made by this technique are more precise in their design since they are made from exact
scanning of the skull
3. in aerospace, manufacturers are looking at making wings and other parts using 3D technology;
the bonus will be lightweight precision parts
4. in fashion and art – 3D printing allows new creative ideas to be developed
5. making parts for items no longer in production, e.g. suspension parts for a vintage car.
Dina El-Akkad 31
ICT I.G.C.S.E SECTION
2.3.4 Speakers:
Speakers can be connected directly to a computer or are built into the monitor
or casing (as in a laptop computer). They output sounds that are produced by,
or have been stored on, the computer. Digital data from the computer is
converted into analogue form using a digital to analogue converter (DAC). The signal is then
amplified through the speakers.
Uses:
1. Speakers are required to play sound files attached to multimedia presentations and websites.
2. Speakers are used with home entertainment systems.
3. They can help blind people (together with speech generation software) through audio output of
text on the screen.
4. They are used to play downloaded sound files.
Motors
The motor is turned on or off by the actuator.
Uses:
1. Motors are used in many domestic appliances, such as automatic washing machines, cookers,
water pumps in central heating systems and automatic greenhouses to open windows and switch
on fans.
2. In industry, they are used to control robot arms.
3. In computers, they operate fans, disk drives and DVD drives.
Buzzers:
The buzzers are switched on or off by the actuator.
Uses:
1. Buzzers are used in cookers and microwave ovens to tell the operator when the cooking process
is complete.
2. They are used in burglar alarm systems to warn if intruders are present.
Dina El-Akkad 32
ICT I.G.C.S.E SECTION
Lights:
The actuator is connected to the switch that turns the lights on or off.
Uses:
1. They are used for security lights.
2. Lights are used in greenhouses to control the lighting conditions.
Heaters:
Actuators are connected to switches which turn the heater on or off.
Uses:
1. Automatic washing machines to heat up water.
2. Automatically control the temperature in an oven.
3. Control the heating in a central heating system.
4. Temperature control in an automatic glasshouse.
Dina El-Akkad 33
ICT I.G.C.S.E SECTION
Dina El-Akkad 34
ICT I.G.C.S.E SECTION
3.1 Backing up data:
3.1.1 What is a Backing up of data?
Backing up refers to the copying of data to a different medium. Backing up data should be regular.
Many computer systems can be set to backup files automatically on a regular basis.
Cloud storage companies use magnetic tapes or hard disk drives to backup clients’ data on a regular
basis.
The backups are often stored in a different place to the main storage.
3.2.2 Direct access (Random access): Storing or retrieving data items without the need to read
through any other stored data items so fast.
It used in applications where data access is vital. For example, in real-time operations such as
controlling a chemical plant or online systems such as booking air tickets.
1KB = 103 bytes 1MB = 106 bytes 1GB = 109 bytes 1TB = 1012 bytes
Dina El-Akkad 35
ICT I.G.C.S.E SECTION
3.3.1 Magnetic Storage Media
Fixed/internal Hard disk drive (HDD):
Uses:
1. Storing operating system.
2. Storing application software, e.g., spreadsheets.
3. On-line and real time processes requiring direct access, e.g., booking air-line tickets, robots, etc.
4. Used in file servers with computer networks.
Advantages:
1. They have very fast data transfer rate and fast access times to data.
2. They have very large memory capacities.
Disadvantages:
1. They can be easily damaged if he correct shut down procedure is not carried out.
2. Their read/write operation can be quite noisy compared to SSDs.
2. They lack portability
Advantages:
1. They have very fast data transfer rate and fast access times to data.
2. They have very large memory capacities.
3. They can be used as a method of transferring information between computers.
Disadvantages:
They can be easily damaged if dropped. Also, incorrect shut-down procedure could lead to loss of
data.
Dina El-Akkad 36
ICT I.G.C.S.E SECTION
Magnetic Tapes:
Uses:
1. Tapes are used in a variety of batch processing applications such as clearing bank cheques, utility
billing and producing payslips.
2. Tapes are used for backups of file servers for computer networks.
3. Used in long term archiving of data.
Advantages:
1. They are less expensive than the equivalent-capacity hard disk.
2. It is a very robust technology.
3. They have a huge data storage capacity.
3. The data transfer rate is fast.
Disadvantages:
1. Access time is very slow.
2. When updating another tape is needed.
3. They are affected by magnetic fields.
Uses:
1. CD-ROMs are used to store music files, software, computer games and encyclopaedias
2. DVD-ROMs have much larger storage and are used to store films and arcade games.
3. CD-ROMs and DVD-ROMs are used in applications where there is a real need to prevent the
deletion or overwriting of important data.
Dina El-Akkad 37
ICT I.G.C.S.E SECTION
CD R / DVD R:
Disks can be written to only once.
Uses:
1. They are used for home recordings of music (CD-Rs) and films (DVD-Rs).
2. They are used to store data to be kept for later use or to be transferred to another computer.
3. They are used in applications where it is necessary to prevent the deletion or overwriting of
important data.
Advantages:
1. Cheaper than RW disks.
2. Once burned they are like a ROM.
Disadvantages:
1. Disks can only be recorded once, so if an error occurs then the disk has to be thrown away.
2. Not all CD/DVD players can read CD-R/DVD-R.
CD RW / DVD RW:
Disks can be updated.
Uses:
1. They are used to record radio and television programmes, but can be recorded over time and time
again.
2. They are used in closed circuit television (CCTV) systems.
Advantage:
Can be written over many times.
Disadvantages:
1. Can be relatively expensive.
2. It is possible to accidently overwrite data.
Dina El-Akkad 38
ICT I.G.C.S.E SECTION
b) DVD RAM:
Same properties as DVD RW but quicker access and data can be overwritten more easily.
Uses:
1. Recording devices such as satellite receivers.
2. In some camcorders to record movies
Advantages:
1. They have a greater capacity than CD/DVDs.
2. Writing and reading can occur at the same time.
3. They can be overwritten more times compared with the RW format.
4. Long life – about 30 years.
5. No need to finalise the disk.
Disadvantages:
1. They are not compatible with most DVD players.
2. They are more expensive than other types of DVD media.
3. They have been superseded by newer technologies such as solid state memories.
c) Blu-ray:
Blu-rays are used for storing films (movies). 25Gb equates to 2 hrs HDTV, 13hrs standard
definition TV. It is possible to playback video on a disc while simultaneously recording HD video.
Uses:
1. Home video consoles
2. Storing and playing HD movies
3. Used in many camcorders
4. Will be used for storage of PC data or backing up hard drives.
Advantages:
1. Largest storage capacity of optical media (25 Gb, 50 Gb, 100 Gb).
2. Data transfer rates are high.
3. Access speeds are higher with blu-ray players than with other optical devices.
4. Blu-ray discs automatically come with a secure encryption system, which helps to prevent piracy.
Dina El-Akkad 39
ICT I.G.C.S.E SECTION
Disadvantage:
1. Relatively expensive.
2. There are fewer movie titles on blu-ray format.
Advantages:
1. They are more reliable (no moving parts to go wrong)
2. They are lighter (which makes them suitable for laptops)
3. They have a lower power consumption.
4. They run much cooler than HDD
5. They are very thin.
6. Data access is faster than HDD.
Disadvantage:
Most solid state storage devices are rated at only 20GB write operations per day over a three-year-
period – this is known as SSD endurance.
Uses:
1. They are used to transport files from computer to computer. USB Pen drive
Advantages:
1. Very compact and portable media.
2. Very robust.
3. Doesn’t need additional software to work on most computers.
4. They are not affected by magnetic media.
Dina El-Akkad 40
ICT I.G.C.S.E SECTION
Disadvantages:
1. Can’t write protect the data.
2. Easy to lose.
3. The user needs to be very careful when removing a memory stick from a computer.
Advantages:
1. Very compact and portable media.
2. Very robust.
Disadvantages:
1. Expensive per gigabyte of memory compared to hard disk drives.
2. Have a finite life regarding the number of times they can be read from or written to.
3. Have a lower storage capacity than hard disks.
Dina El-Akkad 41
ICT I.G.C.S.E.
Dina El-Akkad 42
ICT I.G.C.S.E.
A network is a series of computer systems that are linked together so that they are able to share
computing power or storage facilities. The link may be between computers in the same building or
between computers in different parts of the country or even in different parts of the world.
4.1 Networks:
4.1.1 Network devices:
Modems
A modem (modulator demodulator) is a device that converts a computer’s digital signal into an
analogue signal for transmission over an existing telephone line and back again.
Dial-up modems operate at transmission speeds of about 60 kilobits per second, which is extremely
slow.
Modem broadband or ADSL (asymmetric digital subscriber line) modems operate at up to 100
Mbits/second when using fibre-optic cables and 20 Mbits/second when using copper cables.
ADSL modems allow telephone conversations and internet traffic to occur at the same time because
of the of the wide bandwidth signal used.
Cable modems allow cable television providers to offer internet access as well as receiving
television signals.
Hubs:
A hub is a device that can have a number of other devices or computers connected to it
to form a LAN. It does not read any of the data in the packets which arrive from a computer, but
just sends them on to all the computers on the network, including the one that sent it. Using a hub
is not a very secure or efficient method of data distribution.
Switches:
Switches connect a number of devices together to form a LAN. Switches are
able to look at a data packet, target the computer for which it is intended, and send it. This helps to
speed up data transmission in a network. Each device has a media access control (MAC) address
which identifies it uniquely. Data packets sent to switches will have a MAC address identifying the
source of the data and additional address identifying each device that should receive the data.
Bridges:
Bridges are devices that connect one LAN to another LAN that uses the same protocol. A large
network can get very busy. A bridge allows a large network to be segmented and stops unnecessary
traffic being passed around the network.
Dina El-Akkad 43
ICT I.G.C.S.E.
Routers:
Routers enable data packets to be routed between the different networks to join a LAN to a WAN.
Broadband routers sit behind a firewall.
The router’s main function is to transmit internet and transmission protocols between two networks
and allow private networks to be connected together.
Packets of data contain the following information:
header to identify the data packet
the sender’s IP address
the receiver’s IP address
how many data packets make up the whole ‘message’
the identity number of each packet
When a router receives a packet of data, it checks the destination IP address against the stored
routing table. The routing table stores the MAC address of the device, the assigned IP address and
the lease time the IP address is assigned for. The bits forming the destination IP address in the data
packet are used to point to the correct route. The packet is sent to a number of routers until it
reaches its final destination.
Other hardware
Gateways:
A gateway is a network point (or node) that acts as an entrance to another network. If a network
node needs to communicate outside its network, it needs to use a gateway.
Network cables
Network cables have the following advantages over Wi-Fi:
faster data transfer rates
can be more secure than wireless networks.
Dina El-Akkad 44
ICT I.G.C.S.E.
4.1.2 Internet Protocol (IP) and Media Access Control (MAC) addresses:
Each device on the internet is assigned for each internet session by the ISP a unique address known
as IP address.
The IP address gives the ___location of a device on the internet whereas the MAC address identifies the
device connected to the internet.
Bluetooth:
Bluetooth sends and receives radio waves in band of 79 different frequencies (known as channels).
Devices using Bluetooth automatically detect and connect to each other. Each communicating pair
uses different channel.
Bluetooth creates a secure Wireless Personal Area Network (WPAN) based on key encryption.
Uses of Bluetooth:
when transferring data between two or more devices that are very close together (<30 meters
distance)
When the speed of data transmission is not critical
For low-bandwidth applications (for example, when sending music files from a mobile phone to
a headset).
Dina El-Akkad 45
ICT I.G.C.S.E.
4.1.4 How to set up and configure a small network:
Purchase of software and hardware (switches, network cables, a router, a firewall, servers, etc)
Set up an IP account if internet access is required
Set up the system to allow wireless connectivity
Configure all the hardware and software
Ensure a high-speed broadband connection exists
Put the common software onto a server and ensure that the network licence allows network users
to use the software
Set up privileges so that each user can only access their own area or common shared area
Set up a network-manager-level of privilege to monitor network usage, change passwords, etc.
Each webpage has a unique address that helps web browsers to find them. The address is known as
the Uniform Resource Locator (URL).
There are three common ways of accessing the internet offered by service providers:
dial-up access
cable internet access
digital subscriber line (DSL) (broadband) internet access.
Dina El-Akkad 46
ICT I.G.C.S.E.
Intranet:
Many companies use an Intranet as well as the Internet. An Intranet is ‘a computer network based
on internet technology that is designed to meet the internal needs for sharing information within a
single organisation.
There are a number of reasons for adopting Intranets rather than using the Internet:
It is safer since there is less chance of external hacking or viruses.
It is possible to prevent employees from accessing unwanted websites
Companies can ensure that the information available is specific to their needs.
It is possible to create extranets that allow intranets to be extended outside the organisation but
with the same advantages as an intranet.
Dina El-Akkad 47
ICT I.G.C.S.E.
4.1.6 LANs and WANs:
Local Area Networks (LANs):
These systems are usually within one building. Computers and devices are connected to hubs or
switches.
Advantages:
1. Sharing of resources (such as expensive peripherals and applications software).
2. Ease of communication between users.
3. A network administrator to control and monitor the network (e.g. change passwords, monitor
internet use, etc.).
Disadvantages:
1. Easier spread of viruses.
2. Printer queues can be frustrating.
3. Slower access to the internet.
4. Increased security risks when compared to stand-alone computers.
5. If the main server breaks down, the network will no longer function.
Disadvantages:
1. Security can be a big issue since the signal can be picked up.
2. There may be problems of interference, which can affect the signal.
3. The data transfer rate is slower than in wired LAN.
Dina El-Akkad 48
ICT I.G.C.S.E.
Wide Area Network s (WANs):
The computers and terminals forming part of the network can be spread around the world. External
communication links such as satellites, microwaves or telecommunication links are used to connect
the network. The connection must normally be paid for because the links are external.
Dina El-Akkad 49
ICT I.G.C.S.E.
4.2 Network issues and communication:
4.2.1 Network Security:
Should the internet be policed?
Arguments is favour of some form of control
It would help to prevent illegal material being posted on websites.
Most of the information can be found in books but it is much easier to find the information using
a search engine.
It would prevent children being subjected to undesirable websites.
It would help to stop incorrect information being published on websites.
Dina El-Akkad 50
ICT I.G.C.S.E.
Security issues:
Ways of protecting passwords:
Run anti-spyware software
Change passwords regularly
Passwords should not be easy to guess. Strong passwords should contain:
o at least one capital letter
o at least one numerical value
o at least one other keyboard character (such as @, &)
4.2.2 Authentication:
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Some forms of authentication include:
user IDs and passwords
digital certificates
A digital certificate is a pair of files stored on a user’s computer – these are used in the security
of data sent over the internet. Each pair of files is divided into a public key and a private key.
biometrics
Biometrics relies on certain unique characteristics of human beings; examples include:
fingerprint scans, signature recognition, retina scans, iris recognition, face recognition, voice
recognition.
4.2.3 Viruses:
A virus is a self-replicate program that corrupts a computer system. A virus attaches itself to files,
leading to:
computer crashes
loss of files - system files when lost computer malfunctions.
corruption of the data stored on files.
Dina El-Akkad 51
ICT I.G.C.S.E.
Antivirus software:
they check software or files before they are run or loaded on a computer.
antivirus software compares a possible virus against a database of known viruses.
they check software for types of behaviour that could indicate a possible virus (heuristic
checking)
any possible files or programs that are infected are put into quarantine.
antivirus software needs to be kept up to date.
Full systems checks need to be carried out regularly.
Dina El-Akkad 52
ICT I.G.C.S.E.
4.2.5 Network Communication:
Emails and Faxes:
Electronic mail is a method of sending messages from one terminal to another via a
communication link.
Advantages of using e-mail:
1. Message sent instantaneously.
2. The same message can be sent to many recipients at the same time.
3. No need to leave house to send e-mail.
4. E-mails can be read from any ___location.
5. Replies to e-mails are quick.
6. Can send file attachments.
7. Low cost, since stamps, paper and envelopes are not needed.
Faxes (Facsimile):
i) Physical fax:
A fax machine is like a long distance photocopier. The document is put into the fax machine at one
end and a copy comes out of a fax machine at the other end. The original is first scanned with a
beam of light and then converted into electronic signals that can be passed along telephone lines.
Dina El-Akkad 53
ICT I.G.C.S.E.
Emails:
More secure than faxes because password protected.
No need to print the document so saving cost and environmentally friendly.
The document is usually of a better quality
Documents received in emails can be modified
It is much easier to send to multiple recipients at the same time
People are more likely to have access to email accounts than a fax machine
Video conferencing is a communication method that uses both video and sound. It is carried out in
real time and makes use of some form of network. The basic hardware includes:
Hardware needed:
Microphones
Web Cams
Speakers
Large monitors/television screens
Software needed:
Webcam and microphone software drivers
CODEC: coder–decoder or compression-decompression
echo cancellation software.
Advantages of Video conferencing:
1. Conferences can be called at short notice.
2. Cost is reduced:
Reduced travelling costs
No need to pay for hotel accommodation
3. Don’t have to carry documents to conference.
4. Employees will not travel to unsafe places around the world.
Voice over Internet protocol (VOIP) is a method used to talk to people using the Internet. One of
the big advantages is that it is either free or at a local rate to anywhere in the world. The main
problems are usually sound quality (echo and ‘weird sounds’ are both common faults).
The security issues over VOIP are:
identity theft
viruses and malware (malicious software)
spamming (sending junk mail)
phishing attacks (the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private information
that will be used for identity theft).
Web conferencing:
Web conferencing (webinar) uses the internet to permit conferencing to take place. Multiple
computers are connected to the internet. As with video conferencing it is carried out in real time
and allows the following type of meetings to take place:
business meetings to discuss new ideas
presentation
online education or training
Web conferencing links into video conferencing and audio conferencing through the use of
webcams and built in microphones and speakers.
Dina El-Akkad 55
ICT I.G.C.S.E.
Dina El-Akkad 56
ICT I.G.C.S.E.
A systems analysis team is brought in to review an existing system and suggest a number of
improvements.
Dina El-Akkad 57
ICT I.G.C.S.E.
5.1 Analysis:
The analysis stage involves examining the existing system in detail. The basic steps can be
summarised as follows:
1. Research or collect data from the current system
2. Describe of the current system – establishing the inputs, outputs and processing being
done
Feasibility study
2. Interview: Involves a one-to-one question-and-answer session between the analyst and the
employee/customer.
Advantage: The questions do not have to be fixed in advance; the analyst can change them
according to the answers the interviewees give.
Disadvantages:
i. Interviewing takes a lot of time.
ii. It is relatively expensive, due to the use of the analyst’s time.
iii. The interviewee cannot remain anonymous.
Dina El-Akkad 58
ICT I.G.C.S.E.
3. Workers and/or customers filling questionnaires to gather facts in a fast way.
Advantages:
i. These are much less time-consuming than interviews.
ii. Individuals can remain anonymous if they want.
iii. It is relatively inexpensive method.
Disadvantages:
i. Often the number of returned questionnaires is low.
ii. Analyst can’t change questions halfway through.
iii. There is no immediate way to clarify a vague or incomplete answer to a question.
4. Looking at existing paperwork: All documents that are used within a system need to be
examined. The documents may be, for example, bills, invoices, letters, order forms, payslips,
etc. The analyst will be looking for answers to questions such as: How is the data collected?
What data is collected? What happens to this data after it has been collected?
Advantages:
i. The analyst can see for themselves how the paper system operates.
ii. A lot can be discovered about an organisation by examining the documents that it uses.
Disadvantages:
i. It can be very time consuming.
ii. Because of the analyst's time, it is a relatively expensive method.
iii. The documentation is often difficult to understand, so it may be necessary to ask someone to
explain it. This means that we are back to the interview again.
5.2 Design:
Having analysed the existing system, the next stage is to design the key parts of the recommended
system. A list of tasks is summarized here:
Design the data capture forms / input forms
Design screen layouts
Design the outputs in the form of screen displays and printed reports
Producing system flowcharts and/or pseudo code
Select/design validation rules that need to be used
Design the file structures and tables (field names, field types, field lengths, field
description, selection of key field, how the data files will be linked, etc)
Produce any algorithms or program flowcharts
designing a testing strategy plan
Dina El-Akkad 59
ICT I.G.C.S.E.
5.2.1 Data capture forms:
These forms allow the data to be input into the system.
Navigation aids:
Back/previous record button
Forward/next record button
New record button
Submit/save button
First record button
Last record button
Exit button/return to homepage button
Move to top of page if long form
Search facility
Dina El-Akkad 60
ICT I.G.C.S.E.
5.2.2 Screen displays and printed reports:
Screen outputs should be designed:
to make sure the size of all the output fields is correct
so that any instructions/descriptions are clear
so that the full screen is utilised
so that colours and fonts make the output clear.
Dina El-Akkad 61
ICT I.G.C.S.E.
Example: If a field needs six digits then inputting a five- or seven-digit number, should cause an
error message,
(f) Presence Check: checks that the data has been entered.
(g) Consistency Check: checks to see that fields match each other.
Example:
If 'Mr' has been typed into a field called title then the gender field must contain either 'M' or 'Male'
Dina El-Akkad 62
ICT I.G.C.S.E.
Field name Field length Field type Suitable validation
check
product_code 8 Alphanumeric length check
manufacturer_year 4 Numeric range check
product_name 20 Alphanumeric None
colour 2 Alphanumeric look-up check
5.3.1 Development:
After the data structures have been designed, they will need to be created using the software or
programming language recommended by the systems analyst. The programmer will produce the
program code needed to solve the problem.
5.3.3Testing strategies:
After testing each module the whole system is tested. Even though each individual module may
work satisfactory, when they are all put together there may be data clashes, etc.
A system is tested by using both test data and live data.
As a result of testing, data/file structures, validation routines, input methods, output formats may
need to be amended/improved.
Dina El-Akkad 63
ICT I.G.C.S.E.
5.4 Implementation:
After the system is fully tested, the systems analyst will want to get the system up and running. His
next steps will be
to train staff on the new system,
transfer paper files or electronic files to the new system and
choose a method of changeover to the new system.
Methods of changeover:
1. Direct changeover:
New system replaces the existing system immediately. This method can only be used when the new
system has been thoroughly tested. Once the old system is closed down it cannot be reintroduced.
Advantages:
i. The benefits are immediate.
ii. Costs are reduced – since only one system is used there is no need to pay for two sets of staff.
iii. There is less likelihood of malfunction since the new system will have been fully tested.
Disadvantages:
i. If there are problems, there is no backup system.
ii. It can be difficult to make improvements to the new system and keep it working.
2. Parallel running:
The old and new systems are run side by side for a time before the new system takes over
altogether.
Advantages:
i. If the new system fails, the old system is still available as a backup.
ii. Staff can be trained to use the new system gradually.
Disadvantages:
i. Two sets of workers have to be paid to keep both system running.
ii. It takes a lot longer to fully implement than direct changeover.
3. Pilot running:
Pilot running is the method adopted by large organisations. The new system is implemented in one
branch of the organisation whilst the other branches continue with their existing system. Workers
from other branches can be taught on the new system before it is introduced to their branch.
Dina El-Akkad 64
ICT I.G.C.S.E.
Advantages:
i. If the system does not work properly, not all branches are affected.
ii. The later branches benefit by learning from the mistakes made in earlier branches.
iii. The costs are less than parallel running.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. It is more expensive than direct changeover, since each pilot scheme needs to be evaluated before
the next stage is introduced.
4. Phased implementation:
Phased Implementation involves the introduction of the new system one part at a time. When the
system is working perfectly another aspect can be moved onto the new system until all aspects have
been transferred to the new system.
Advantages:
i. If the latest part fails, it is only necessary to go back in the system to the point of failure.
ii. Workers have time to get used to the new system.
iii. Don’t have to pay two sets of staff.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. If the new system doesn’t work properly, it is not possible to fall back on the old system.
iii. It is more expensive than direct changeover, since it is necessary to evaluate each phase before
moving to the next stage.
5.5 Documentation:
5.5.1 User Documentation:
It is provided to help users operate the new system. It is written in non technical terms. It includes:
Purpose of the system
Limitations of the system
Hardware and software requirements
Input and output formats
How to save files, do a search, sort data, etc
Sample runs
Error messages
Trouble-shooting guide
Dina El-Akkad 65
ICT I.G.C.S.E.
Frequently Asked Questions
Tutorials
5.6 Evaluation:
After the system has been developed, tested and implemented, it must be evaluated. There are a
number of stages in the evaluation process.
A system is usually evaluated against a set of criteria:
Is the system reliable?
Does the system do what it was intended to do?
Is the system easy to use?
Is the new system efficient?
Is the solution appropriate?
Dina El-Akkad 67
ICT I.G.C.S.E.
Dina El-Akkad 68
ICT I.G.C.S.E.
The four main areas where ICT has had an effect on employment include:
Shop work – online shopping has reduced the need for high street shops
Banking – the introduction of ATMs and online banking has led to the closure of many branches
Office work – spreadsheets, word processors and databases have taken over many of the tasks
carried out by office staff.
6.1 The effects of ICT on employment:
6.1.1 Negative effects – job losses:
The introduction of ICT systems – whether to improve efficiency, reduce costs or improve safety –
has led to redundancies in many areas of industry and commerce.
Office work:
By introducing computer system and new software, the work could be done by fewer staff and in a
much shorter time scale. This could lead to many redundancies and the need for the remaining staff
to retrain.
Manufacturing:
Car manufacturing makes use of robotics. Robots are capable of carrying out the following tasks:
spraying the bodies with paint
assembling all the body parts
assembly of the engine and transmission
fitting the windscreens.
Fitting seats, dashboards and interior trim are usually carried out by a skilled worker.
Factory workers have had to retrain to gain the following new skills:
maintenance of the robots
quality control
design and development
marketing
training other workers.
Dina El-Akkad 69
ICT I.G.C.S.E.
Advantages of robots over humans:
Higher productivity.
More consistent results.
They work non-stop without breaks.
They don’t get bored by repetitive tasks.
They don’t go on strike.
There has been a large increase in job opportunities in some areas, for example:
network managers and computer technicians
website designers
programmers to write operating systems, application software and computer games.
computer engineers (who build and maintain computer systems)
delivery drivers to deliver goods to customers.
Job sharing:
With job sharing, a full time job is divided between two part-time workers. Both workers are
doing the same job; one picks up the work where the other left off.
Compressed hours:
In compressed hours, an employee works their full hours for the week but works fewer days.
Dina El-Akkad 71
ICT I.G.C.S.E.
Advantages of microprocessor-controlled labour-saving devices:
People no longer have to do manual tasks at home.
There is no longer a need to stay home while food is cooking or clothes are being washed.
They give people more time for leisure activities, hobbies, shopping and socialising.
It is possible to control ovens and central heating systems using smart phones while the owner is
out.
Automated burglar alarms give people a sense of security as they give a very sophisticated level
of intruder warning at all times.
Smart fridges and freezers can lead to more healthy lifestyles (they can automatically order fresh
food from supermarkets using their internet connection) as well as prevent food waste.
Dina El-Akkad 72
ICT I.G.C.S.E.
Dina El-Akkad 73
ICT I.G.C.S.E.
7.1 Physical security:
7.1.1 Health aspects:
Dina El-Akkad 74
ICT I.G.C.S.E.
7.1.2 Safety aspects:
Electrocution:
use an RCB (residual current breaker)
check insulation on wires regularly
don’t allow drinks near computers
check equipment on a regular basis
Fire risk:
ensure good ventilation in the room
have a fully tested Co2/dry fine fire extinguisher nearby
fire exits must be kept clear at all times and not blocked by equipment
electrical sockets should not be overloaded
reduce voltage requirements - LCD screens instead of CRT monitors
cables are not to be coiled – the heat generated may be sufficient to start a fire
Dina El-Akkad 75
ICT I.G.C.S.E.
7.2 E-safety:
E-safety refers to safety when using the internet, i.e. keeping personal data safe and applies to any
of the following devices:
mobile phones
computer or tablet
game console
wireless technology
Dina El-Akkad 76
ICT I.G.C.S.E.
Some e-safety issues:
don’t give out any personal information to people who are unknown to you especially online.
don’t sent people photos of yourself – either online or via a mobile phone - unless a person is
known to you.
always maintain your privacy settings on whatever device is being used online or during
communications.
when accessing the internet make sure the websites being visited can be trusted by looking for
https or the padlock sign. When using search engines, always make sure the device settings are
set to ‘safe search’.
only use websites recommended by teachers and only use a learner-friendly search engine.
only open emails from known sources.
only email people you know.
it is extremely important to be vigilant when using social networking sites, instant messaging or
chat rooms:
o block or report anybody who acts suspiciously or who uses inappropriate language
o be very careful with the language used in chat rooms
o always use nickname and never use real name
o keep private and personal data secret
o don’t enter private chat rooms – stay public
o never arrange to meet anyone for the first time on your own
o always tell an adult first and meet in a public place
o avoid misuse of images
o always use appropriate language
o always respect people’s confidentiality
It is also important to be careful when using online gaming since it carries its own risks. Some of
the known risks reported over years include:
violence in the game itself, which can lead to violent behaviour in reality
predators
cyber bullying
use of webcams
voice-masking technology
viruses, phishing or spyware are examples of problems associated with certain online gaming.
Dina El-Akkad 77
ICT I.G.C.S.E.
7.3 Security of data:
7.3.1 Hacking
Hacking is the act of gaining unauthorised access to a computer system.
Effects of hacking:
identity theft or misuse of personal information
data can be deleted, changed or corrupted on a user’s computer
To protect against hacking:
use of firewalls
use of strong passwords and user IDs
use of intrusion detection software
use of user IDs and passwords
Encryption makes files unreadable if accessed illegally but it does not prevent hacking.
7.3.2 Phishing
The creator sends out legitimate-looking emails to target users. As soon as the recipient clicks on a
link in the email or attachment, they are sent to a fake website or they are fooled into giving
personal data in replying to the email. The email often appears to come from a trusted source, such
as a bank.
Effects of phishing:
The creator of the email can gain personal data, such as bank account data or credit card
numbers, from the user.
This can lead to fraud or identity theft.
Smishing uses the SMS system of mobile phones to send out fake text messages.
Vishing uses a voice mail message to trick the user into calling the telephone number contained in
the message.
Dina El-Akkad 78
ICT I.G.C.S.E.
7.3.3 Pharming
This is malicious code installed on a user’s computer or on a web server. The code will redirect the
user to a fake website without their knowledge.
Effects of pharming:
The creator of the malicious code can gain personal data, such as bank account data or credit
card numbers, from users when they visit the fake website.
Pharming can lead to fraud or identity theft.
7.3.5 Spam
Spam, often referred to as junk email, is usually sent out to a recipient who is on a mailing list or
mailing group. While spam is rarely a security risk, it can lead to denial of services. Denial of
services is an attack on a network that is designed to slow the network down by flooding it with
useless traffic. Spam can be linked to phishing attacks or even the spread of computer viruses.
Spam can also affect mobile phones through text messaging and sometimes referred to as ‘spasms’.
7.3.7 Cookies
Cookies are small amounts of text that are sent and received through the web browser as we search
or visit internet sites. Cookies track the pages you have visited and save these on your computer
with information about you.
Cookies can be useful if you visit a website frequently and do not wish to enter your login details
each time, but they allow websites you have not visited to know which webpages you have viewed.
7.4.3 Encryption
Encryption is the name given to the converting of data (plain text) into a code (cypher script) by
scrambling it. Even if a hacker gains access to the data he will not be able to understand it. The
key used to encrypt (or encode) the message is known as the encryption key; the key used to
decrypt (or decipher) the message is known as the decryption key.
7.4.4 Authentication
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Digital certificates
A digital certificate is a pair of files stored on a user’s computer. Each pair of files is divided into:
a public key
a private key
When sending an email, the message is more secure by attaching a digital certificate made up of six
parts:
the sender’s email address
the name of the digital certificate owner
a serial number
expiry date
public key
digital signature of certificate authority (CA)
Operating systems and web browsers maintain lists of trusted CAs.
Passwords
Biometrics
Dina El-Akkad 81
ICT I.G.C.S.E.
Online credit fraud
Online credit card fraud happens for the following reasons:
hackers gaining access to a user’s computer through the use of spyware, phishing or pharming.
the breaking of passwords
sometimes the URL is altered very slightly in the email and the user ends up visiting a fake
website so it is better to type in the URL.
it is relatively easy to tap in to wireless networks without password protection
Wi-Fi hotspots in public places are not secure
cloud and some retail companies are targets for hackers
Cloud security
Several computer manufacturers encourage customers to store or backup their files on a medium
known as the cloud. Users purchase cloud storage and can then access all their files from any
device anywhere in the world.
Advantages:
no need to carry memory sticks
no need to pay for large storage capacity on your computer
cloud companies ensure that your files are backed up
the ability to synchronise (sync) files ensures they are automatically updated across all devices
allows several users to edit and collaborate on a single file
Data security:
Companies that transfer vast amount of confidential data from their own systems to a cloud service
provider are relinquishing control of their own data security.
Data loss:
There is a risk that important and irreplaceable data could be lost from cloud storage facilities.
Dina El-Akkad 82
ICT I.G.C.S.E.
Dina El-Akkad 83
ICT I.G.C.S.E.
8.1 Audience appreciation
When planning and creating ICT solutions the following should be considered:
The age of the target group
The experience of the audience
The expectations of the audience
Knowledge of the audience
Research needs to be done first to find out about the target audience. This could be done by:
Interviewing a cross section of the target group to find out how to engage the audience
Giving out questionnaires to people in the target group to find out their background, interests,
etc.
Carrying out market research – this could involve the two techniques described above, but
would involve a more sophisticated and in-depth analysis of the data received.
Multimedia used:
Use of sound, video and animation will always catch the attention of the audience but it is
important not to overdo it in case the message gets hidden because of too many distractions in
the presentation.
A young audience is more likely to respond o loud music and embedded video clips.
Complicated descriptions are often better explained using graphs and/or animations.
Length of presentation:
Long presentations will only work if they are interesting and engage audience.
A very young audience would quickly get bored and start to become restless.
Interactive presentation:
Asking questions or getting the audience to ‘try things is always a good strategy but always be
aware that not everyone wants to take part.
Examples used:
When using examples to illustrate ideas, remember to be understanding.
Dina El-Akkad 84
ICT I.G.C.S.E.
The audience may be the actual users of the ICT solution. Considerations to meet the audience
requirements in this case include:
how skilled is the workforce
how old is the workforce
are any of the staff disabled
Software piracy (illegal copies of software) is a big issue amongst software companies. To protect
software:
When software is being installed, the user will be asked to key in a unique product key which
was supplied with the original copy.
The user will be asked to agree to a licence agreement before the software continues to install.
The original software packaging often comes with a sticker informing the purchaser that it is
illegal to make copies of the software; the label is often in the form of a hologram indicating
that this is a genuine copy.
Some software will only run if the CD-ROM or DVD-ROM is actually in the drive.
Some software will only run if a dongle is plugged into one of the USB ports.
Dina El-Akkad 85
ICT I.G.C.S.E.
8.3 Legal, moral, ethical and cultural implications
Legal covers the law; whether an action is punishable by law. Example, copying software and
then selling it without permission of the copyright holders.
Morality governs the private and personal interactions between people and is usually determined
by the person concerned. Creating fake websites is not illegal provided the person who carries
out the act doesn’t try to gain from their actions – it is simply an immoral act since it can cause
distress o others.
Ethics governs professional interactions, for example, codes of behaviour practised by a society
or group of people sometimes going against an individual’s own sense of morality. If somebody
works for a software company and passes on some of the ideas to a rival company, this would be
regarded as unethical behaviour. Unless the software passed on is part of national security, then
it isn’t actually illegal to do so.
Culture refers to the attitudes, values and practices shared by a society or group of people.
Writing software games that make fun of religion could be seen by certain people as
unacceptable behaviour but some cultures would find it funny and wouldn’t understand why it
was seen as offensive.
Dina El-Akkad 86
ICT I.G.C.S.E.
Dina El-Akkad 87
ICT I.G.C.S.E.
9.1 Communication applications:
9.1.1 Flyers, posters, brochures and newsletters
Steps to produce such a document:
1. open word processor, DTP or presentation application
2. create frames, boxes and/or text boxes
3. take photos if necessary using a camera
4. upload the images from the camera or from a CD/DVD, scan photos, or download photos from
the internet.
5. save the photos to a file
6. import or copy and paste the photos into the document
7. edit the photos and import from a file or type any text required.
Posters are eye-catching and usually very difficult to miss. Posters are usually placed in strategic
positions to target certain people rather than the general public. Renting an advertising area is
expensive. Posters are subject to weather conditions.
Newsletters are often produced by companies or clubs. They contain local information which is
read by the company employees or club members. Example:
marriages, deaths, and births of employees, club members or their families
advertising by outside companies
news events, such as fundraising, etc.
9.1.2 Websites
Advantages:
Sound/video/ animation can be added.
Links to other websites/hyperlinks can be used.
Use of hotspots.
Buttons to navigate/move around the website leading to more information.
Hit counters to see how many people have visited the website.
Can be seen by a global audience.
Can’t be thrown away.
It is much easier to update a website.
Dina El-Akkad 88
ICT I.G.C.S.E.
Disadvantages:
Websites can be hacked into and modified or viruses introduced.
Risk of potential pharming.
Customers must have a computer and internet connection.
Possible for customers to go to undesirable websites by accident or as a result of a pharming
attack. This can lead to distrust from customers.
Maintain the website can be expensive.
Because it is a global system, it is more difficult to target the correct audience using website
advertising.
Disadvantages:
Equipment needed can be expensive.
Equipment failure can be a disaster when giving multimedia presentation.
Wherever the presentation is given there may need to be internet access.
There is a danger that the focus is on the multimedia presentation rather than the message/facts.
It is very easy to make bad presentation with too many animation effects and too much text or
images.
Paper-based presentation:
Advantages:
Disabled people don’t have to go the venue to see the presentation.
It is possible to print it out in Braille for blind people.
The recipient can read the presentation at any time they want.
The recipient have a permanent copy which they can refer to at any time.
Dina El-Akkad 89
ICT I.G.C.S.E.
Disadvantages:
The presentation needs to be distributed in some way.
There are no special effects (sound, video, animation)
There are printing costs (paper, ink, etc).
9.1.5 Cartoons:
With 3-D animation, objects are designed on a computer and a 3-D skeleton (framework or basic
structure) produced. The parts of the skeleton are moved by the animator using key frames (these
frames define the start point and end point to give a smooth animation effect). The difference in the
appearance of the skeleton in these key frames is automatically calculated by the software and is
known as tweening or morphing. The final stage is to make a realistic image by a technique
known as rendering.
Dina El-Akkad 91
ICT I.G.C.S.E.
9.3.2 Measuring a patient’s vital signs in a hospital:
Steps:
sensors read key vital signs (pulse rate, heart rate, temperature, blood pressure, respiration, etc.)
the data from sensors is converted into digital using an ADC
the data is stored in the computer’s memory
the computer compares the data from the sensors with the values stored in is memory (these will
be input by the nurse or doctor for a particular patient)
the results are output on a screen in the form of graphs and/or numerical readouts
an alarm is activated if any of the data is outside acceptable ranges
the system continues to measure the patient’s vital signs until the computer is turned off.
Data is either transferred to a CD/DVD or to a memory stick and taken away for further analysis or
the computer is connected to a mobile phone network and transmits the data back automatically to
the monitoring station.
Dina El-Akkad 93
ICT I.G.C.S.E.
9.5 Modelling applications
A computer model is the creation of a model of a real system in order to study the behaviour of the
system. The model is computer generated and based on mathematical representations.
The whole idea is to try to find out what mechanism control how a system behaves. This then
makes it possible to predict the behaviour of the system in the future and also see if it is possible to
influence this future behaviour.
Examples:
Flight simulators allow pilots to try their skills at flying a plane. If they crash on the simulator,
no actual damage is done.
Military operational research models for new weapons and tactics.
Simulation for nuclear reactors.
Ecological systems of the spread of diseases.
Extinction rates of endangered species.
Tuck shop modelling (Financial modelling)
Traffic light simulation
Dina El-Akkad 94
ICT I.G.C.S.E.
9.6 Manufacturing applications
A robot is a computer controlled mechanical device which is able to do variety of tasks.
Method 2:
Use of biometrics – fingerprints.
Advantages:
Fingerprints are unique
ID cards could easily be lost
ID cards could be affected by magnetic fields
It is easy to make copies of ID cards
Disadvantages:
It would take a long time to collect the initial fingerprints for every student in the school.
The equipment needed to take and read fingerprints is more expensive than magnetic stripe
reading equipment.
If a student cuts a finger, the fingerprint may not be identified by the system.
There are ‘invasion of privacy’ issues and some parents may object to having the fingerprints of
their children stored on a database.
Dina El-Akkad 95
ICT I.G.C.S.E.
9.7.2 Student performance
Teachers could make use of spreadsheets to monitor the performance of their students.
When using software to create timetables, it is easy to try ‘what it’ scenarios to ensure the most
efficient use of time is utilised.
Timetables can be produced to cover classes when teachers are absent.
Dina El-Akkad 96
ICT I.G.C.S.E.
9.9 Banking applications
9.9.1 Automatic teller machines (ATMs)
Disadvantages with ATMs:
they are often in places where theft can take place at night
‘bogus’ ATMs can be set up to gather information about the card and retain the card
some banks charge customers for the use of ATMs.
Dina El-Akkad 97
ICT I.G.C.S.E.
Disadvantages of online shopping and banking:
1. Security issues are a major concern. These include:
hacking, stealing credit card details
viruses and other malware (e.g. phishing, pharming, etc.)
2. Fewer social contacts.
3. It is necessary to have a computer and internet connection.
4. Do not get much exercise from not getting out.
5. Cannot inspect the goods you are going to buy properly.
6. Delivery times can be long.
7. You cannot pay with cash.
8. High street shops and banks are closing and this is leading to ‘ghost towns’ forming
With this system, there is no need to have a computer and it’s possible to talk to an actual human
being.
However, compared to internet banking, it can be much slower (there may be a long queue before
you can talk to somebody) and the options can be a little more complex to navigate. But it can also
be quicker if your computer isn’t switched on at the time and you only want a balance enquiry.
Dina El-Akkad 98
ICT I.G.C.S.E.
9.9.4 Chip and PIN
When paying for items using a chip and PIN card, electronic fund transfer (EFT) takes place.
Suppose a customer goes into a restaurant to pay for a meal using chip and PIN card:
1. The PIN is entered using a keypad.
2. The card is checked to see if it is valid.
3. The PIN is read from the chip on the card and compared to the one just keyed in.
4. If they are the same, then the transaction can proceed.
If this is the third attempt at entering the PIN, then the transaction is terminated.
5. The restaurant’s bank contacts the customer’s bank.
6. A check is made to see if the customer has enough funds.
7. If there aren’t enough funds available, then the transaction is terminated.
8. If everything is ok, then the transaction is authorised.
9. An authorisation code is sent to the restaurant.
10. The price of the meal is then deducted from the customer’s account.
11. The same amount of money is then added to the restaurant’s bank account.
12. A receipt is produced as proof of purchase.
Dina El-Akkad 99
ICT I.G.C.S.E.
8. At the paying bank’s clearing centre, the digital signature is first checked and then the
cheque is passed through their own reader/sorter machine to make sure data matches with
that on the IBDE file. It also sorts the cheques into branch order (using the sort code).
9. The paying bank checks to see if John has enough money in his account, etc. Based on this
information, Hodder Bank decides whether to pay John’s cheque to H&S Ltd or return it
unpaid to the Smith Bank.
Advantages:
Expert systems provide consistent answers.
Using expert system reduces the time to solve a problem.
Allows areas of the world access to expertise which they couldn’t normally afford.
Expert systems never forget to answer a question when determining the logic.
A less skilled work force is needed so saving money.
Dina El-Akkad 101
ICT I.G.C.S.E.
Disadvantages:
Expert systems tend to lack common sense in some of the decision-making processes.
Errors in knowledge base can lead to incorrect decisions being made.
It can be expensive to set up in the first place.
Considerable training is necessary to ensure the system is used correctly by the operators.
A 3-D printer can then reproduce a solid object showing the exact internal organs of the patient.
The doctor or surgeon can then show the patient exactly what is wrong and then show them what
procedures are required. They also help the surgeons in planning surgical procedures.
3-D printers produce hard nylon objects which are used in certain surgical planning. Tis reduces
the chance of any errors when the actual procedure is carried out.
Prosthetics
3-D printers are used to print out prosthetics (false arms, hands and legs) at a fraction of the cost
compared to existing methods.
On a daily basis, the borrowers file is checked by the computer to see which books are overdue.
The computer reads a record from the book file.
9.15.2 Cookies
9.15.3 Key logging
Dina El-Akkad 105
ICT I.G.C.S.E.
9.15.4 Employee call monitors
Employee call monitoring allows managers to listen in to employees’ telephone calls for the
following reasons:
to improve the employees performance (e.g. at a call centre)
allows the manager/supervisor to join in a call where necessary
can be used as a training tool
it allows a company who are concerned about security to monitor all calls
Uses:
cars to calculate routes
walkers to locate position on hills/mountains
runners to calculate distance run
farmers for tractor navigation/soil evaluation/livestock control/yield monitoring
satellite navigation systems for ships
tracking aircraft
Disadvantages:
If the maps are not kept up to date, they can give incorrect instructions.
Loss of satellites signals can cause problems.
Road closures due to accidents or road works can cause problems.
If an incorrect start point or end point is keyed in the system will give incorrect information.
Uses:
Emergency services to send the closest emergency personal to a ___location.
Biologists and environmentalists to protect animal life and plans in certain areas
Teachers in their geography, science or engineering lessons.
Acceptable language
List of unacceptable content to be used in emails, text messages and online forums:
obscene images
language that is regarded as abusive, profane (offensive), inflammatory (form of speech that is
used with the intent to stir up emotions), coercive (to make someone do something by using
force or threats), defamatory (say false things in order to make people have a bad opinion of
someone or something) or blasphemous (profane words and actions, especially when they are
connected to something religious)
racist, exploitative, violent messages
use of illegal materials in messages
Copyright
Emails are subject to copyright laws. It is important that the recipient checks before printing,
copying or forwarding an email if the sender has indicated that the message is confidential.
Netiquette
Netiquette is shortened from the phrase internet etiquette, which refers to the need to respect other
users’ views and display common courtesy when posting views in online discussion groups or when
sending out emails.
Web browsers use uniform resource locator (URLs) to access websites and retrieve file. The web
browser breaks up the URL into three parts:
Protocol://website address/path/filename
Example:
http://www.hoddereducation.co.uk/igcse_ICT
This is the
This is the web This is the file name
protocol used
server’s name used (often the web page)
The web browser translates the web server name into an IP address. The HTML is returned and is
shown as a correctly formatted page on the screen.
Features of blogs:
updated on a regular basis by the author
usually organised in reverse chronological order (most recent to least recent entry)
normally public – anyone can read them
entries normally come from a single author
other internet users can’t change blogs – they can only read them and comment
b-blog –short for business blogs – is used by business to promote themselves on the internet.
Wikis
Wikis are web applications or websites that allow users to create and edit web pages using any web
browser.
Features of wikis:
anyone can edit, delete or modify the content
many authors can be involved in a wiki
it is possible to organise a page any way that the author(s) wish(es)
shows / keeps track of all entries – i.e. it stores a document history
can be easily edited using a web browser
allows large documents to be seen by many people – it is easier than emailing several people,
Why are internet searches to find relevant information not always fast?
It is possible for millions of sites to be found matching a given criteria. Unless the user narrows
down their search criteria it can take a long time to find out exactly what they are looking for.
How can you evaluate the reliability of information found on the internet?
Anybody can set up a website so information is not necessarily reliable or accurate.
Some commercial websites will be biased to advertise their products.
If a website has excessive advertising it could be unreliable.
If the advertising on a website is related only to its own products it could be unreliable.
It is possible to use the final part of a URL to identify a website’s reliability – websites ending
with .ac and .gov are more likely to be reliable
endorsements - has the website been recommended by a trustworthy organisation?
If a website has testimonials, this can indicate reliability.
If the date of the last update was a long time ago it is likely to be unreliable or out of date.
links to and from the website - do the links reference websites that are decent, legal, honest and
reliable?
comparing the information on the website with information from other reliable websites or
textbooks.