An embedded computer is a single chip that contains all of the elements that are essential for any computer
All of the following contain an embedded computer: x x x x
telephones televisions cameras washing machines
Palmtop Personal Digital Assistant (PDA)
A PDA was originally developed as an electronic organizer. PDAâ€™s are now available with cut down versions of the main Office software, e.g. Microsoft Word. Palmtops have a built in keyboard, PDAâ€™s do not.
A portable Personal Computer.
A Personal Computer (PC). The desktop PC Microcomputer has a central processing unit housed in a metal or plastic case (often called a tower unit). A keyboard and mouse are usually used to input data and a monitor to output the data.
Mainframes are large, powerful computers that can carry out many different tasks for many different people at the same time. They are used by large companies such as:
x x x
Banks - for managing thousands of customers accounts each day Airlines - for dealing with bookings, tickets, cancellations etc Police - for storing and processing all of the data collected each day about crimes.
Basic Computer Process
Advantages of a computer • • •
Disadvantages of a computer • • •
Faster processing Saves on storage space Password protection to files
Initial cost of purchasing computers Over reliance if a power cut Staff retraining
Raw facts and figures e.g. 21041926. Can be taken from readings from a sensor or survey.
Processed data with a meaning e.g. 21/04/1926 is the Birth date of Queen Elizabeth II
Derived from information which has rules applied to it e.g. 21/04/1926 is the Birth date of Queen Elizabeth II, so I will have to send her a card this month.
GIGO = garbage in garbage out (if incorrect data is entered into the computer, incorrect data will come out) Data can be coded and validated
Houses coded as
TR = terraced DT = detached SD = semi detached
M = Male F = Female
Advantages of coding data; x x x
it takes up less memory on disc it is faster to type in it is easier to do searches on standardised data.
Advantages of using a computer to process data x x
x x x
Improved speed of access to data Faster processing/search/sorts A variety of output formats available e.g. printed reports, mail merged documents. Etc. Easy to transfer data Improved variety of services Increased security Saves on storage/office space
Disadvantage x x
Initial cost of purchasing the computer Over reliance e.g. if there is a power cut you cannot use it.
Errors that can occur Transcription /typing errors
typing in the wrong character by accident egg 2 instead of a 7
i.e. keying in, in wrong order
Data entered in wrong format
e.g. date is 2002/ 09.11 instead of 11/09/02
egg 56789 instead of 57689
We use validation techniques to cut down errors Validating data â€˜Validation is the process of ensuring data is valid and legalâ€™
When creating fields in a file the user often puts controls over the way in which data is entered. This ensures that; * data is entered into the correct format * data is sensible * reduces the risk of mistakes on data entry
Validation type Range checks
Explanation Data is between stated ranges
Format checks Presence checks
Dates There must be a character present in a particular place e.g. the first 2 letters must be SC No added to a code
Example Membership No must be between 1 and 1000 12/04/03 SC6785
A database is an organised collection of related files of data A file is an organised collection of related records A record is a collection of related fields
Also known as a PRIMARY KEY
A field is a collection of related data
Advantages of a spreadsheet • • • • •
NOT does calculations for you!!!
Accuracy of calculations ‘What if’ investigations Draw graphs and other output forms Save the formulas and data Automatic recalculation if data changes
Simulation model -
A program that models a real world situation
Virtual reality Advantages
Computer have to calculate many large
Not 100% accurate
Requires powerful computers and
Display as graphics
Dangerous and expensive to do test in real life
Basically, all computer control means is using a computer to control the action or movement of an object / system. For example, a burgalar alarm. A computer uses the following control port to monitor and control a house hold security system
0 means when something is OFF 1 means when something is ON
motor to close shutters
sensor on front door
Everything is OFF
This is what would happen to the display of bits in the following situations:
a) A burglar has stepped onto the pressure mat 0 1
b) A burglar has opened the front door 0 0
The alarm and pressure mat would be triggered.
The siren and sensor on front door would be triggered.
c) If the burglar stands on the pressure mat and opens the front door, the alarm light would come on and the siren would come on and the window shutters would close. 0 1
Advantages of data logging • • • •
24 hours/365 day monitoring Human do not have to be there Accurate readings Accurate recordings
Theatre and, concert tickets, holidays, flights etc, can be booked using the Internet. Agencies and the home user can now access remote online databases for their computer enquiry and booking system. People can search for holidays etc. to suit their requirements and make provisional or firm bookings.
Advantages to the online booker x
Services are available 24 hours a day
Alternatives can be proposed if first choice not available
Access to data on a wide range of holidays including special offers.
Bookings are instantaneous so little possibility of overbooking because once a seat or holiday is provisionally booked this will appear on the database.
‘Computers linked together’ By joining computers together to form a network, they are able to share one printer. This means that more money can be spent buying a better quality printer and that the printer is being used much more of the time. As well as sharing hardware, a network allows computers or users to share software and data. Data can be transmitted very quickly between networked computers. A computer connected to a network is known as a 'work-station' or ‘terminal’.
PRINTER CD ROM SERVER
There are different ‘sizes’ of network depending on how far the computers are that you want to link together.
Local Area Network (LAN). - used when computers are close together, in a single office or two buildings that are separated by a road. A file server is often used to store each person's data files. This means that people can log onto any machine on the network and access their files. They are not restricted to just one machine. Another advantage of having all of the files stored in one place is that a back up copy of every user’s files can be made easily. To log onto a LAN, you usually need a user name and password. The user name identifies you to the file server so that it can 'serve' you the correct files. The password ensures that the user name really does belong to you. The school uses a LAN. Think about how you use the computers in school. You can access your files and print anywhere!
Wide Area Network (WAN) – used to connect computers across the country / world. Many modern companies have offices, shops or factories in various locations around the country, and for large corporations, across the world. Even though staff work in different places, they often need to be able to access the same information no matter where they are. Computers on LANs in one building can be connected to computers on LANs in another building usually through the telephone system, often using a modem. They can also be connected via fibre optic cables, microwave links or satellite. By linking LANs together, the network is no longer local to one building; it is now spread over a wide area. It is known as a Wide Area Network (WAN) Did you know that the largest WAN in existence is the Internet?
Advantages of a network Share printers and other peripherals Email Share programs Share data files
Disadvantages of a network Open to hacking Spreading of viruses If file server crashes no one can use the network. Needs extra staff to maintain the network.
Bus This is one method of connecting computers together and is the simplest one to connect together. A single cable joins all of the workstations, printer, file server and other components together. At each end of the bus is a 'terminator'. This is a piece of hardware which prevents signals bouncing back and forth (echoes).
Advantages x x x x
Easy to install Easy to add extra workstations Uses less cable than a Star network Best choice for temporary networks
x x x x x
If there is a problem with the central cable, the entire network stops working If there are a lot of workstations on the network, data can travel slowly. Data collisions can happen as the network becomes busy Low security - every workstation can see all of the data in the network Limited cable length and a maximum number of workstations
Ring In a ring network layout, all of the computers are connected to one another in a circle. The data passes from one computer to the next one and then all the way around the ring layout until it reaches the destination computer. Advantages x x x
Transmission of data is fairly simple as it only travels in one direction No data collisions Extra computers can be added easily with little effect on performance although you have to shut down the network to be able to do this.
Disadvantages x x x
If a single machine is switched off, the network doesn't work If a cable breaks, the network doesn't work Data must pass through every computer until it reaches its destination. This can make it slower than other network layouts. If there are any problems with the network, they can be difficult to identify the cause.
Star In a star network layout, each workstation is connected by its own cable directly to the server. Star networks are usually the layout of choice in schools and offices because they tend to be the most reliable of the topologies. Advantages x
Star networks are very reliable. If one connection fails, it does not affect other users Very few data collisions as each workstation has its own cable to the server Good security - no workstation can interact with another without going through the server first
x x x
The most expensive network layout to install because of the amount of cables needed Installing the network usually needs experts to set it up Extra hardware such as hubs and switches may be needed If the server crashes or stops working then nobody will be able to access their files or use the network.
*PAPER 2 SPECIAL TOPIC*
A knowledge-based system which attempts to replace a human 'expert' in a particular field. It diagnoses problems and gives advice on that the cause of those problems are. They can also give advice on solutions.
The system will consist of; 1. Knowledge database â€“ large database 2. Inference Engine - a set of rules for making deductions from the data (inference engine) 3. User Interface with facilities for searching the knowledge database
There are special high level languages used to program expert systems e.g. PROLOG
Example of an Expert System A medical diagnosis expert system (e.g. MYCIN) would have information about diseases and their symptoms, the drugs used in treatments etc. A patient is asked by a doctor about symptoms and the replies are input to the expert system. The computer searches its database, uses its rules and makes suggestions about the disease and its treatments. Sometimes probabilities are assigned to diagnoses. The computer does not take the place of the doctor but can be used to help the doctor make decisions.
Medical screening for cancer and brain tumors
Matching people to jobs
Other Examples of Expert Systems
Training on oil rigs
Diagnosing faults in car engines
Legal advisory systems
1. The computer can store far more information than a human.
1. Over reliance upon computers
2. It can draw on a wide variety of sources such as knowledge from books, case studies
2. Some â€˜expertsâ€™ could lose their jobs or not be given training if computers are available to do the job.
3. The computer does not 'forget' or make mistakes. 4. Data can be kept up-to-date. 5. The expert system is always available 24 hours a day and will never 'retire'. 6. The system can be used at a distance over a network. So rural areas or even poorer third world countries have access to experts. 7. Provides accurate predictions with probabilities of all possible problems with more accurate advice. 8. Some people prefer the privacy of talking to a computer.
3. Lacks the 'human touch'! â€“ lack of personal contact 4. Dependent upon the correct information being given if data or rules wrong
*PAPER 2 SPECIAL TOPIC* Robots are used in factories to produce goods. A robot can be defined as a device that has been programmed to carry out repetitive mechanical tasks. There are many different types and shapes available, but each has the same basic features; Â™ Sensors that collect input information Â™ Microprocessor to process the information Â™ Actuators, which produce movement
Carry out undersea maintenance for oil rigs Pack goods, e.g. put bottles in boxes
Space exploration vehicles
Produce cars, fix windscreens, spray paint, welding
Robots can be used to:
Move goods, such as car parts, rolls of newsprint, around factories
Intelligent wheelchairs for disabled people Security devices in homes and factories and offices Testing equipment such as the lifespan of computer keyboards
There are many other applications for robots Advantages of using robots: 1. Robots can carry out monotonous, repetitive tasks, lift heavy weights 2. Reduce wage costs as robots replace workers; it is estimated that one robot replaces six workers 3. The quality of the work does not vary 4. A robot can work for 24 hours a day, they do not need rests and never go on strike 5. Robots can work in places that are dangerous to humans, e.g. in darkness, in low and high temperatures, in radioactive environments, deep under the sea 6. A robot can work much faster than a person
Disadvantages of using robots: 1. People lose their work 2. Robotic systems are expensive to buy and to set up
An embedded system has a board with a ROM chip which has a stored specialpurpose application program which controls a machine. This program is run continuously as long as the system is switched on.
Input data may be received from sensors; the program processes the data and may send output signals to control the machine.
Washing machines, microwaves, traffic lights, are all examples of embedded systems. They all have programs stored on ROM controlling their actions.
*PAPER 2 SPECIAL TOPIC* Item stock level is how many of the item are available in a shop. There are several reasons why shops need to keep count of how much stock they have:
To ensure that there aren't too many items in stock - they can turn bad or be out of date; Not enough space to store reserves; Ensure that too much money has not been tied into stock Ensure that enough stock is available
Shops know how many of a particular item they usually sell and it must be ensured that enough are available. A good stock control system can keep track of how many of each item are in stock, when and how many to order and the best or least selling items. A sales terminal, where the barcode of each item is scanned, can keep count of how many of each item is sold and as they are sold the stock level is immediately changed. The system can also see when items need to be reordered and count how many need to be ordered. Sophisticated systems can automatically prepare an invoice to the shop headquarters on electronic form using EDI (Electronic Data Interchange). Companies can accept an order over the phone or by post - someone would have to enter the data into a computer; or they could receive an e-mail via the internet. The information on the order is verified and validated before it is processed. When goods are delivered, the customer is sent an invoice. As the invoice is processed the stock levels are updated.
Inputs Barcode reader scans at the sales terminal. PDET - Portable Data Entry Terminal to count how many of each item are left on the shelves by making an occasional stock check. A stock system is a combination of real time process and batch-processing. A sales terminal system keeps count of the stock available in real time - the situation can be checked at any time to see what is in stock. The system prepares an order of what needs to be ordered using batch-processing, which is sent at particular occasions.
Lists of how many of each item are in stock. A list of the items to be ordered. Electronic order to be sent using Electronic Data Interchange. Sales patterns.
Advantages 1. 2. 3. 4.
Keeps the latest count of the items in stock. Warns when to reorder. Prepares and sends orders automatically. Purchase and sell goods on-line.
Disadvantages 1. Barcode needed on each item. 2. Installation cost.
Diagrams to show how automatic stock control works:
It contains details of all transactions that have occurred in the last period of processing.
Kept up to date by applying the transaction file.
*PAPER 2 SPECIAL TOPIC*
It is now possible to make book a holiday, a seat on a train or bus, a flight, a room in a hotel, or a theatrical performance on-line! Travel agents have computers in every branch or shop which are all connected with one central administrator where all bookings are recorded (multi-access system). A flight can be easily booked on the internet therefore avoiding the need for the customer to fill in forms. Theatres use computer systems to record seat bookings where the customer phones in their request for the theatre to then enter the booking into their system.
• The customer must enter details to make a booking, e.g. name, address, date, numbers etc. This data can be entered on a terminal computer (multi-access system), into an electronic form on a web page, on a paper form, or by typing directly while the customer is on the phone.
• The data is validated during the process to ensure that it is correct and makes sense. The computer will find whether there is a vacancy for the booking, and if so will record the details of the booking in the database.
• A booking must be recorded and processed immediately so that the same place or seat cannot be taken by anyone else. • This is called real time transaction processing. Credit or debit cards are used to pay for on-line or phone bookings.
• Receipts are printed and given to the customer as proof to confirm the booking and to record details. This may be in the form of a receipt, or e-mail if the booking was made on the internet. A voucher with the customer's details is printed.
Security Obligations Secure pages are used to transfer information over the internet, so that personal data cannot be seen or stolen by anyone else.
Advantages of booking systems 1. Using a computer reduces the enormous workload of processing paper documents
Disadvantages of booking systems
2. Bookings can be made or recorded via the internet
1. A number of people were unsure to start with about transferring their personal information over the internet due to the possibility of it being intercepted by someone. This is now virtually impossible due to the encryption of secure pages
3. A computer system can process a pile of data rapidly
2. No proof of a site's authenticity e.g. bogus merchants
4. The data is validated at the time
5. Immediate notification if the booking has been made
x x x
Businesses record bookings on the computer system Customers can order by phoning the business or booking on-line Information regarding the items booked and the customer's information is validated Secure pages are used to transfer booking information over the internet
POS = Point Of Sale
The POS is essential to the operation of the supermarket. It is here that the customers pay for the goods. It is here that the shop sales information is recorded. It is here that the information on what each customer buys regularly is collected.
Supermarket Stock Control The task of recording and maintaining stock levels is called stock control. A stock control system must keep an up-to-date record of all the stock held and place orders for fresh deliveries if stock runs low. Importance of Stock Control - Adequate stocks must be maintained to supply a customer with goods with minimum delay. If customers find goods are regularly out of stock they will go elsewhere. - To keep business expenses to a minimum, goods must not be overstocked. By keeping stocks to a minimum, a business can limit the amount of money invested in stock and also reduce the risk of stock deteriorating before it can be sold. Minimum stock levels also reduce storage costs such as warehousing, heating, lighting and security. The Process 1. When an item is scanned at the point of sale terminal (POS) the bar code number is passed to the computer which then searches for the details of the item in the database. 2. Once the data has been found it is passed back to the POS where it appears on the customers receipt. Some of the fields in the database are for reference and would hold data describing the item and its price. 3. Other fields such as how many there are left in stock would be updated constantly as the items are sold.
The master file holds all of the information about each product in the supermarket. The above example shows what would happen to the master file is 20 Heinz Baked Beans were sold in one day.
Sales Transaction File
This diagram shows how the stock system works and when the master files are updated.
Sort into stock order file
Sorted Sales Transaction
Master File Update Master
Re order List
Updated Master File
The master files must be backed up so that no data on the products is lost if there is a system failure of some sort.
Information on goods is held on the bar-code. Stock control depends on what comes from the bar-code reader. Scanner is located at the POS. Reads information fast and accurately. Hand scanners used by shop staff – now also for customers (self service).
Scanning and typing in codes are the most common ways of entering data at the POS. Other methods of entering data in shops: OMR (Optical Mark Reader) sheets for ordering stock Portable Data Entry
Portable Data-Entry Terminal: a calculator-sized device with a built in bar code reader attached The PDET can be connected to a computer and data downloaded at the POS. It also makes it easier for shop assistants to perform a manual stock-check, which takes place from time to time so that the computer's view of stock levels is compared with real-life (if they differ, it is probably down to shop-lifting); speeding up data-entry and reducing mistakes means that fewer staff are needed, with less disruption to customers. e.g., Sainsbury’s Kimball tags e.g. Clothes shops Pre-punched tags affixed to goods, containing the size and style data that speed up inventory control. Small, rectangular cardboard tags which are removed from garments at the POS and placed temporarily on a spike near the till; at the end of the day all the Kimball Tags are collected, and placed in a card-reader to input the data (e.g. Product-Code) into a computer to update the stock database for purposes of stock-control. Touch sensitive menus or screens – these are used at the self – service checkout or in fast food restaurants.
Shopping for food is an important part of e-commerce. You can shop quickly without moving from your home. Goods are collected from the shelves and sent to the customer. The customer pays with a plastic card (EFT – Electronic Funds Transfer).
1. As the customer selects the goods they are placed in a 'virtual trolley' and goods that are bought regularly are highlighted on the list which makes shopping easier. 2. The goods are delivered from the shop to the customer. 3. When shopping on-line payment can be made through Electronic Funds Transfer (EFT) which is again very convenient for the customer. A secure payment service is used to ensure there is no misuse of credit cards over the Internet. Online Shopping SUPERMARKETS For the customer The advantages for the customer shopping for food on-line are: Customers can shop every day of the year and at any hour of the day or night. Goods will be sent directly to the customer. Very convenient system for elderly people or anyone who has difficulty moving or lifting heavy goods. No waiting by the POS when the shop is busy. The disadvantage to the customer is that you cannot see the goods so as to make sure they are of the best quality, or fresh.
For the supermarket The disadvantage to the supermarket is that they have to invest in refrigerated vans, which can carry the goods in top condition to the customer.
Online Shopping GENERAL RETAIL
For company Reach wider market For customer • • •
24 hour / 365 day shopping Don’t have to leave home (disabled) Savings on travel and time costs
There is a danger of debit / credit card numbers being intercepted by hackers during transmission and used to make unauthorised purchases. Criminals can set up fake web sites offering goods or services often using the name of a genuine company. This can lead to people spending money on goods they will never receive as well as damaging the reputation of a genuine business.
Involves the following: x x x x x x x
Cheque processing EFTPOS â€“ Electronic Funds Transfer Point Of Sale ATMs Credit cards Debit cards Smart cards Home banking/ telebanking
Cheque Processing A cheque is a paper form that is issued by a bank that an account holder can use to authorise payment to another person or organisation. An account holder must write these details on the cheque for the payment to be authorised: x
the name of the person or organisation that it is payable to
the amount that it is for in figures and in writing
What a cheque looks like Branch
Bank of Monee Date…… Pay…………………… Amount……………….. ………………………… A N Other 46-45-90
The numbers at the bottom of the cheque are written in special magnetic ink. These are: 1. The amount the cheque is for is keyed in manually by a data input operator and printed on each individual cheque in magnetic ink. 2. The amount in words acts as a check if the figures are hard to read. The magnetic ink enables the cheques to be read very quickly, in batches, by a special reader. This process is called MICR or Magnetic Ink Character Recognition. A cheque guarantee card usually accompanies cheque payment. The card number is written by a retailer on the back of a cheque and guarantees that the bank will honour cheques up to a certain limit irrespective of the account holder's balance. When the cheque is paid in at a bank it undergoes a chain of processing events and only then is money transferred from one bank account to another. The method of processing the cheque is called cheque clearing. This normally takes several days.
Advantages of the DEBIT CARD
People do not have to carry cash – use card to pay. Money is transferred straight to the shop’s bank account using EFT.
Disadvantages of the DEBIT CARD
Not all shops have a POS terminal so can’t always pay by card. The information on the magnetic strip can be damaged by the use of strong magnets.
The money on a cash card can be spent at any retailers with the equipment to read the card. Money can also be transferred directly from one card to another using a special electronic wallet that resembles a pocket calculator.
Smart cards are plastic card that contains a microprocessor with a memory.
Smart cards programmable cards
The memory can store much more information than a magnetic stripe on the back of a credit or debit card.
Unlike a credit or debit card that creates a computer record of who the transaction was made by, a cash card does not and is therefore anonymous.
Access to the cash on plastic smart cards can be protected by locking it with a 4 digit PIN. Retailers like smart cash cards because they offer the following advantages: * * *
Accuracy - mistakes can't be made with change Efficiency - don't have to waste time counting and handing out change Security - this would be vastly increased if there was no need for cash. Robbers would have to become IT experts.
Stucture of an email address @Service provider.country or organisation another@Yahoo.co.uk firstname.lastname@example.org
What do you need to access email. Email provider or ISP with a central mailbox facility. User account or mailbox with user ID User password
Advantages of electronic mail
1. Advantages over the telephone x People don't have to be in. The receiving computer will store the message until the receiver wishes to read their mail. x One letter can be sent to several users’ mailboxes at the same time. x Letters can be printed out so you have a hardcopy. x Can store the message for future use or edit it and return to sender x More confidential than fax systems
Initial cost of buying hardware and software if only use it infrequently Possible way of spreading viruses Can’t send parcels.
2. Over the post x Security - Messages are automatically dated when sent and when received and read. - Less likely to be lost and backup copies can be kept. - Restricts unauthorised access with a good password system. x Will not be delayed by postal strikes or transport breakdowns so important contracts tenders can't be lost. x Faster delivery speeds (instantaneous). Delivers at weekends and evenings. x Once the hardware is installed Email is cheaper than the post (no stamp cost). 3. Over sending discs through the post. x Disc will need an operator at the other end to load it. x Disc can get lost in the post or damaged. x Still have delays in receiving the disc.
Advantages of the INTERNET • Easy communication with other people • Valuable learning resource because Internet skills will be needed for jobs in the future • Enables more people to work from home • A vast amount of information can be accessed • Up-to-date information can be accessed on-line without the need to await publication • Publishing documents on the Internet saves paper • A valuable resource for companies to advertise and conduct business
Disadvantages of the Internet • Much of the information isn’t checked and may be incorrect or irrelevant • A large amount of undesirable material, such as pornography, is readily available • Messages sent across the Internet can be easily intercepted and are open to abuse by others • Large telephone bills can easily be run up • Too much time spent on the Internet could result in a lack of face-to-face interaction with others and a loss of social skills • Going on-line runs the risk of hackers or viruses being able to damage your computer
Electronic Commerce - To most us this means selling goods and services over the Internet. Selling over the Internet offers many advantages for customers and retailers. Advantages x x x x x x x
Can buy 24 hours a day, 365 days a year No need to handle cash since all transactions are made using cards the transactions are automatic, saving staff costs the process is almost paperless the customer can print off an on screen receipt the delivery process can often be tracked online goods are often discounted because of lower retail costs
An electronic means of payment. e.g credit card or secure site.
A web page
An ISP (Internet Service Provider)
To establish an Ecommerce facility a firm would need the following;
A database of stock
The process of EFTPOS at the till: The retailer's main computer stores the stock control database that provides the electronic cash registers with data about each product. It also stores information about all completed transactions. 1. At the checkout, the operator scans the bar code of each item individually. 2. The stock file is queried using the item's code which retrieves the record for that item. 3. The price and description are displayed on the checkout monitors for the customer and operator to see. 4. The price of the item is added to the total and also printed on the till receipt. 5. The quantity of stock for that item is decremented by one. Automatic stock levels are maintained in this way. A minimum re-order level may be set so that the retailer may be alerted to items that fall below this level and a new order can be sent to their supplier. The retailer's card voucher (above) has the following details printed on it on completion of the transaction: x Date and time of transaction x Merchant Id x Transaction code x The amount to be paid x The card number, expiry date and issuing bank (payment by Switch)
Storage Sizes Bit
Binary digit â€“ 0, 1 8 bits make 1 byte 1024 bytes make 1 Kilobyte
1024 Kilobytes make 1 Megabyte
1024 Megabytes make 1 Gigabyte
Random Access Memory - temporary memory It is wiped clean when the power is switched off
Read Only Memory - permanent memory It is not lost when the power is switched off
Backing Storage Secondary (Backing) Storage Speed is less important than large storage capability. The most frequently used backing storage media are... * magnetic tape * magnetic disk * optical drives (CD-ROM ; DVD) Magnetic media Commonly used for backup and archiving Fast storage and access to data. Not portable Magnetic Hard Disk Stores more data than a floppy and is more robust. 50Gb. 1.44 mg Portable. Easily damaged Floppy disk Magnetic Tape
Portable Special ZIP drive needed. Up to 250 Mb on one disc. (temporary, fast access e.g. storing web pages
Optical Disks CD-ROM/ DVD/ CDRW
Laser technology is used to read data. Stores more data portable. Expensive.
Large data files can be compressed for storage to save disk space Benefits of using ICT to help learning
x x x x x x
Work can be edited Faster access to data. Work can be printed out in a variety of ways Accuracy of work is likely to be greater. Graphical interfaces more attractive so improved concentration span Programs are more interactive so different ways of learning.
DATA TYPES ID Number Integer Number
Date Of Birth Date
Cost Real or Currency
Data Transmission Post
Development in telephone communications Fax Data electronically transmitted over the telephone line. You don’t need the Internet or a computer to do this. Do not confuse this with email. It uses paper rather than electronic storage.
Mobile phones 1. WAP (wireless applications protocol) Phones -
Mobile phones that receive the Internet
2. Other Services available on most phones x x x x x
x x x x
Real-time talk Text messages Voice mail Alarm clock/time Reminders/ to do list
Advantages of mobile phone 1. Don’t have to be attached to a land line 2. Use out in remote areas
Change ring tone Record greeting message Display photos/ pictures on screen Radio
Disadvantages of using mobile phones 1. No service 2. No battery/ run out of credits 3. Fined if used when driving 4. Run up large phone bills 5. Get mugged
Video Conferencing (Tele-conferencing). With a small video camera fixed to your microcomputer, your image can be sent down the network to another user (and vice versa). Audio signals can also be sent. This means you can see and talk to another user if you have a microphone. Companies can set up meetings with eyeball-to-eyeball communication between people who are not in the same room, building or even country! Advantages
x x x
Saving in time Savings travel costs Encourages ‘teleworking’
The pictures are of poor quality but with fast broadband connection the quality will improve
Features of software you need to know in detail x x x x x Spellchecker Checks for spelling mistakes
Mail merge Online thesaurus Online dictionary Headers and footers Pagination
compares word with online dictionary suggests alternative words does word counts add to users own dictionary grammar checks
Canâ€™t check x x x x x x x x
Foreign words Common names Mixture of No and words e.g. postcodes. Words such as there and their which have different meanings. Inserts fields from a separate database into predefined positions in a prepared WP document displays alternative words of similar meaning e.g. good, better, great
look up meaning of words
enables same text at top or bottom of every page automatically
automatic numbering of pages by computer DTP
The human computer interface is what allows the user to communicate with the computer and is often called simply the user interface. The three main types of user interface are; 1. Command-driven 2. Menu-driven 3. Graphical or GUI (Graphical user interface)
Most modern micro computers operate through a GUI
Terms such as WIMP (windows, icons, menus, pointer) or 'desktop environment' are commonly used to describe these interfaces.
The user interface is the part of the system that communicates with the user usually via a screen. The main features of such interfaces are; W
To allow multitasking and display file structure
Are symbolic representations of files
To list appropriate facilities
To select and choose the command or facility you want.
Windows display the file structure and enable all file within a folder to be displayed on screen other windows can also be displayed on screen at the same rime. Windows can be easily opened or closed using pointers. Modern computers also desktop features such as; x x x x
On screen help Customised user environments-favourites On screen assistants Tutorials
Advantages of a GUI • •
Don’t have to remember commands Intuitive easy to learn
Disadvantages of a GUI • •
Takes up memory Slows down processing
Voice recognition Microphone used to receive speech input. Speakers used for speech output. This is a VOICE driven system can help disabled people. The human factor is very important in the design of these systems and recent interest in expert systems and artificial intelligence has made Braille keyboards These are special keyboards such features as Natural language for blind or partially blind people interfaces more common place making machine human interfaces more user friendly. OCR Optical Character Recognition Some hand-held computers allow users to 'write' on the Problems: screen; scanning document x Users may speak different languages; x
local accents may not be recognised;
Some words sound the same - two, to, too
OMR Optical Mark Recognition e.g. lottery tickets, school registers
Cause Damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time. Fitting due to flickering screens.
Wrist and feet supports
Exposure of radiation from monitors.
Looking at bright screens for too long.
Looking at bright screens for too long. Staring at the same place.
Screen filters/ take breaks Take regular breaks/ screen filters Take regular breaks
Repetitive strain injury
Circulation problems Back problems
‘Sick building’ syndrome
Due to a poor posture or an awkward position while sitting at a computer. General health problems e.g. skin irritation, hypersensitivity reactions; eye irritation due to design flaws in the heating, ventilation, lighting and air conditioning systems.
Screens to reduce screen flicker
Use adjustable chairs Better ergonomic design including lighting to reduce glare
Changes in working practises
Employment issues x Redundancies; some manual jobs have been lost x Some staff have needed retraining e.g. accountants need to use spreadsheets; typists use word processing packages; managers use database packages. etc. x New jobs have been created e.g. computer programmers, systems analysts
Changes in working practises x x x x x x x x
Use email Use the Internet Saving backups Virus scan discs Use of smart cards Use of software packages Videoconferencing Lack of personal contact
Teleworking - ‘People who work from home using computer networks’ Advantages to EMPLOYEES
Advantages to EMPLOYERS
Savings in journey to work time
Savings on office space
Savings in travel cost
More flexible working hours
Retain skilled staff due to maternity or who have children at home – flexible working hours.
Loss of personal contact with colleagues
Initial cost of providing the hardware.
Cut down on absences due to babysitting problems
Computer crimes 1. Hacking - unauthorised access to confidential data Passwords which restrict access to data files
Encryption of files. If these are transmitted remember the receiving end must also have the codes to de crypt the data.
Backup procedureskeep multiple copies off site; in fireproof boxes; see files for GFS etc
Restrict physical access to files e.g. smart cards to control entrance to rooms, voice or hand prints; retina scans; write protect notches on discs etc.
2. Spreading a computer virus These are programs introduced into computer systems which destroy or alter files by rewriting over data or by copying themselves over and over again until computer system is full and cannot continue.
Use diskless workstations on networks Control access to portable media and do not let users use own disk etc on the organisations system.
Use a virus scanning software and virus eradication program. Make sure this is kept up to date with the latest virus definitions – available from the Internet.
Don’t copy illegal software
Don’t’ download unknown programs from the Internet straight to hard disc. Only use reputable sources.
Write protect media so can’t be written onto
3. Computer fraud – white-collar crime (NOT ’fraud’ by itself) x x x x x x x
Bogus data entry when entering data Bogus output -output may be destroyed to prevent discovery of fraudulent data entry or processing Alteration of files e.g. employee alters salary rate or hours worked Program Patching – introduction of an additional subroutine or code e.g. channel funds into a fictitious account or transmit codes to get free telephone calls Suspense accounts rejected or unreconciled accounts may be redirected into a colluding account. Blackmailing with threat of virus Deliberate data destruction to cause havoc and financial loss to a competitor
Monitor all programs and users actions should be monitored and logged. All users should be identifiable and all files capable of being audited keep online transaction logs
Companies must implement security procedures
Divide up programming tasks so no one programmer has responsibility for writing a program common in banks.
Control access to hardware and software.
Auditing procedures to detect fraud
Often companies are unwilling to disclose crimes against them because
Computer crime is often relatively easy because
It could lead to loss of public confidence in the security of the data. Often their own security teams can be involved and this would again question their efficiency.
Users do not have a great deal of technical knowledge x Many external auditors do not have the expertise to trace programs but rely on printouts.
4. Software piracy is illegal copying but users do not get any technical support or upgraded versions. 5. Physical theft of computer equipment – use locking devices – restrict access to rooms with smart cards, hand or voice prints, retina scans 6. Deliberate theft of files- keep back up files - offsite - and in fireproof containers
The Computer Misuse Act 1990 makes it illegal to... x x x x
Gain unauthorised access to a computer's software or data (hacking) - including the illegal copying of programs. Gain unauthorised access to a computer's data for blackmail purposes. Gain unauthorised access to a computer's data with the intention of altering or deleting it. This includes planting viruses. copying programs illegally (software piracy)
A conviction may lead to a fine and a 5-year prison sentence.
Copyright Laws 1. It is illegal to copy a program from one floppy disc to another without the permission of the legal copyright owner 2. It is illegal to copy one program into more than one computer without a licensing agreement. Types of copyright crime Illegal copying: software piracy Purchasing one legal copy and loading it into several computers memory Transmitting software over telecommunications thus creating a copy. Software piracy is the unlawful copying, distribution and use of software. Each copy of software that is purchased is licensed for use on one machine.
NEVER use software brands e.g.
Microsoft Word PowerPoint Excel Access Publisher
= = = = =
Word Processor Presentation Software Spreadsheet Software Database Software Desk Top Publishing Software
NEVER use answers such as quicker, better, faster â€“ unless you extend your answer with an explanation.
Year 11 Paper 1 Revision Topics to Learn 1) Retail POS System e‐Commerce – buying and selling online – how this is set up 2) Banking ATM e‐Banking – how this is set up 3) Working GUI Changes in working practices – ‘electronic office’ ICT used to do most jobs Teleworking‐ working at home Computer crimes‐ how to prevent each one Changes in work practice Codes of conduct Health & Safety 4) At Home Applications used Television services – teletext (published not interactive) interactive services eg internet, email, booking tickets, games, voting etc Control systems – alarms and greenhouse 5) At School Applications used Uses of ICT in school by students, teachers and admin staff
Year 11 Paper 2 Revision Topics to Learn 1) Applications (Most of these will definitely be on your exam!) For each of the set systems: understanding what the system is, look at input, output and processing involved. Also learn about advantages and disadvantages of each system i Robotic and embedded control, ii Automatic stock control and order processing, iii Expert systems in medicine, iv Booking systems 2) Data and Information Information Processing Cycle, data collection and data logging‐ learn case studies of a commercial greenhouse and computerised weather station Computer security – physical methods and using software Data storage systems Legislation – Computer Misuse Act and Copyright Law Data Protection Act 1998 – Learn 8 principles and exceptions to the law 3) Database Data storage Learn definitions of Field, Record, File Data Types eg text or string, integer, real, currency, date, Boolean etc. Fixed length and variable length fields Validation and Verification – methods for both 4) Hardware Types of computer RAM and ROM Bits and bytes, also memory sizes in kilobytes, megabytes and gigabytes Storage devices‐magnetic, optical and flash Input devices eg mouse, keyboard, digital camera, scanner, microphone etc Output devices eg printer, speaker, monitor, graph plotter etc 5) Networks Types of networks – LAN and WAN, also understand peer to peer and client server systems Advantages and disadvantages of a network Network topologies ‐ Bus, Star and Ring set ups – set up, advantages and disadvantages of each Backup systems and security used for networks 6) Software Application software eg word processor, DTP, database, spreadsheet, graphics etc Systems software eg operating system and GUI Operating system – what is it and what are its main functions? Learn different types of operating systems eg realtime and realtime transaction processing Different user interfaces eg GUI, MS DOS, voice recognition, tetramouse, OMR, OCR 7) Systems Analysis Analysis > systems design > Implementation > Testing > Maintenance > Evaluation (Learn all!) Methods of implementation – direct, parallel running, pilot and phased Remember all stages of your Year 11 Project where you were a systems analyst
Definitions for GCSE ICT You need to learn many definitions ‘word for word’ Account number Found at the bottom of a cheque and read by MICR. It is the personal account number of the account holder or holders. Eg 37465327 Actuator In process control to carry out control actions on the process under control. If the actuator is analogue, a digital‐to‐analogue converter is required. Address book List of email addresses Administrator Person whose job it is to ‘look after’ and administer a network. They will have top level of access and give access rights to each user using ‘hierarchy of passwords’ Analogue data Can vary continuously within a range of values. Analogue sensors Measure variations in a control system eg air pressure, temperature, wind speed, moisture Analysis Part of systems analysis. Analysis of existing data and data processing involved in a system. ADSL ‘Asymmetric Digital Subscriber Line’ another name for broadband connection to the internet. Don’t really need to learn this, just call it a broadband connection Alteration of files Part of ‘computer fraud’ eg employee alters salary rate or hours worked. ALU ‘Arithmetic and Logic Unit’ which performs the calculations and logical operations on data in a computer ATM Automated Teller Machine or Cashpoint machine, or ‘hole in the wall’ Attachment Send a previously saved file with an email Auditing procedures Monitoring of processing activity to detect fraud. Authorisation What files you can see on a network and what you are allowed to do on the network Authentication Password on a network. Backing storage Sometimes called ‘secondary storage’ Storage capacity on a computer Backing storage media The most frequently used backing storage media are magnetic tape, magnetic disk, optical drives (CD‐ROM, DVD) Backup Security method to save files from a network or PC in case files get lost, become corrupted or in case of criminal activity. BACS ‘Bankers Automated Clearing Service’ This is one method of using EFT (Electronic Funds Transfer). Wages are usually paid through this method into an employee’s bank account. Barcode Used in supermarket POS system. Contains country of origin code, manufacturers code, product code and check digit. NOT price. It is scanned with a laser scanner and each time check digit performs calculation to check barcode and number are correct. Also used in library system. Barcode reader Using a small laser data from a barcode can be read and input to a computer. Used for POS and in libraries Batch processing Data or programs are collected grouped and processed at a later stage eg system payroll, stock control and billing systems Batch total This is like hash totals but uses the number of records in processing run eg payroll Bit Binary digit 0 1 Blackmail Can be part of computer crime after hacking into private files Bogus data entry Entering extra data to a system to cause computer fraud. Bogus output Output may be destroyed to prevent discovery of fraudulent data entry or processing Booking System System for making bookings eg theatre and concert tickets, holidays, flights
Boolean Braille keyboards
Data type in a database which involves use of Yes/No or Y/N Keyboards for partially sighted or blind. They have raised Braille letters on keys. Branch number Found at the bottom of a cheque and read by MICR. It is a code for a bank branch eg 46‐45‐90 Broadband Gives the fastest connection to the internet. ADSL line. It allows music and films to be downloaded. Bulletin board A forum to communicate with other people with a similar identity. It can be work related, education related or fun related eg football bulletin board. You can post emails as a new topic or add a ‘thread’ to an existing topic. Bus or Ethernet Workstations are connected to the main fileserver by cable and data can travel network in both directions to reach various nodes in the network Byte 8 bits CAD ‘Computer Aided Design’ Can be used by architects to design a house, it needs a very fast high spec computer. Software has specialist features eg 2D to 3D conversion, ‘walk through’, rotation and zoom. Designs can go into CAM software programs. CAD/CAM lathe Embroidery machines or lathes in DT CAL ‘Computer assisted learning’ Software programs designed to help with interactive learning eg spelling programs, online tutorials, distance learning, special needs software. Calculated Data type in database where a calculation is performed, eg automatically works out age from date of birth CAM ‘Computer Aided Manufacture’ Can be used with controlled cutting machines, which can cut materials eg clothes in clothing industry Carbon copy emails Send a copy of an email to more than one person at a time. Groups of people can receive one email in this way. Card copying Crime of copying or ‘cloning’ somebody else’s credit card to make illegal payments. Carpal tunnel syndrome RSI or ‘repetitive strain injury’ It starts as a tingling or numbness you've had for months in your hand and wrist. Suddenly, a sharp, piercing pain shoots through the wrist and up your arm. This is a painful progressive condition caused by compression of a key nerve in the wrist. Chat line Allows ‘real time chat’ with anyone else who is on the internet at the time. There are dangers from paedophiles and also of giving out too much personal information. CD‐ROM Stores data up to 700Mb CDRW CD re‐write disks Check digits Used to check a barcode and to make sure it is correct. A small calculation is carried out each time a laser scanner scans a barcode. This is a validation type. Cheque clearing This is the method of processing a cheque. It normally takes several days. Cheque number Found at the bottom of a cheque and read by MICR. It is the identification number of an individual cheque. Eg 102201 Cheque processing A cheque is a paper form that is issued by the bank that an account holder can use to authorise payment to another person or organisation. An account holder must write these details on the cheque for the payment to be authorised. Client server network There is one fileserver which stores files and/or programs to be accessed by other terminals. COM ‘Computer Output on Microfilm/Microfiche’ Output documents greatly reduced on film. Needs a special reader to read them. Eg old newspapers in a library Compression Large data files can be compressed for storage to save disk space. Compressed
Computer fraud Computer Misuse Act 1990 Computer programmer
Controller Control signals Control Unit Copyright Laws CPU Credit card
Credit card fraud Currency Data Database
Data capture Data logging
Data Protection Act 1998 Dates Debit card
files need to be decompressed therefore the need for a decompression program to be present when viewing files Using a computer system to commit the crime of fraud. Sometimes this is known as ‘white‐collar crime’ Makes it illegal to hack into data, use computer’s data for blackmail, altering or deleting data after hacking into a system and copying programs illegally. Can lead to 5 year prison sentence. Someone who writes code in different computer languages to create new programs or change computer programs. Will work as part of systems analysis process. Keyboard containing a continuous surface that can be defined as anywhere from 1 to 256 keys. A wide variety of overlays are available from third‐party manufacturers. One use of concept keyboards is to facilitate access to a computer for the disabled. Involves data from sensors, which will be sent to a computer program and activate an external device eg a motor if needed. The software allows a flow chart of the system to be created. Eg burglar alarms, environmental control of central heating or greenhouse A technique to prevent network crime. Access to a network controlled through password system, and also by using security devices like fingerprint/ hand scans, face, retina, iris scans, and access with smart card. In process control a dedicated computer or a microprocessor‐based circuit Computers in control systems will send out control signals to activated devices. ‘Actuators’ The Control Unit controls all operations inside the computer and controls the step by step running of programs. Makes it illegal to copy programs, to copy to more than one computer without a licensing agreement. ‘Central Processing Unit’ the ‘brain’ of the computer It lets you borrow money so cash does not have to be in the account at the time of purchase. Used instead of cash or cheques to buy goods. People using credit cards do not need to pay for their goods or services until the end of the month. Crime involving stealing details from someone else’s credit card to make illegal payments. This is most widely used on the internet. Data type in a database eg £ or $ Raw facts and figures, ‘meaningless’ on their own ‘A database is an organised collection of related files of data’. Software used to store data. It has searching and sort facilities. It allows export to other software eg spreadsheet. It is used to do a mail merge. Data captured or collected for a database eg questionnaires, barcodes, surveys, forms, data logging etc. The automatic recording of data as it is produced – eg temperature readings, voltage levels, humidity levels These are recorded by an electronic device using sensors Makes holders or data responsible for holding that data. They must comply with the 8 principals of the act. There are exemptions eg tax office, doctor/dentist/ national insurance, DVLC etc Data type in database. Usually we format to ‘short date’ eg dd/mm/yyyy validation should make sure it is uk and not us date. Cash does have to be in the account at the time of purchase. The transaction amount is transferred electronically from the card holder’s bank account to the retailer’s bank account a few days later.
Dialup Digital camera Digital data Digital interactive television Digital sensors Direct Disclosure of crimes Disk cache Diskless workstations
Divide up programming tasks DTP
DVD E‐commerce EFT EFTPOS Email Embedded computers EPOS Encryption Ergonomic
Ethernet or Bus network Expert System
‘DTP’ Software that has features of word processor but extra features to handle clipart, wordart, shading effects etc. Better for documents that add text and pictures eg Posters, birthday cards, calendars Old fashioned internet connection through telephone line at slow speed of 56k. Phone could not be used at same time as internet is being used. Photos can be downloaded from the camera and saved on computer Can only have distinct values eg ‘on’ or ‘off’ on a light switch Services available through a television eg TV channels, pay to view movies, email, book holidays, play games, teleshopping and teleshopping Measures on or off states eg circuit complete or circuit broken Strategy for changeover in implementation stage of systems analysis. It means dropping the old system and moving over directly to the new system. Often companies will not disclose computer crimes against them for fear of undermining public confidence in them Temporary, fast access eg storing web pages ‘Dumb’computers on a network that have no hard drive, or facility to use a disk, eg floppy, CD, DVD. This prevents a virus being introduced to the network. Processing is carried out independently in more than one location, but with shared and controlled access to some common facilities eg databases in libraries So no one programmer has responsibility for writing an overall program. This is common when working in banks. Helps with security. ‘Desktop Publishing’ Software that has features of word processor but extra features to handle clipart, wordart, shading effects etc. Better for documents that add text and pictures eg Posters, birthday cards, calendars A DVD disk holds 4.7Gb of data ‘Electronic Commerce’ or online buying and selling ‘Electronic Funds Transfer’ Way banks move money electronically between one bank and another over computer networks. ‘Electronic Funds Transfer Point of Sale’ A system where banks can move money between one bank and another electronically over computer networks. An electronic message transfer system Devices with computer technology inside of them. Many household devices eg washing machine, television, burglar alarm etc. ‘Electronic Point of Sale’ where the POS system has an electronic terminal so a customer can pay by debit card. Coding data at one end, sending it and decoding it at the other end Design where things are built to shape the human body. Ergonomic design used in offices and work places helps reduce illnesses like RSI and ‘sick building’ syndrome. Workstations are connected to the main fileserver by cable and data can travel in both directions to reach various nodes in the network A knowledge based system that attempts to replace a human expert in a certain field. A user interface links user questions to an inference engine (rule based system), which interrogates the database of knowledge to provide results. Used at times in hospitals to support doctors. A private network that can be accessed from the Internet using a username and password – eg accessing school network from home Last stage of systems analysis. Look at outcomes of new system, how staff have responded, customer satisfaction and involves keeping logs of breakdowns and errors. Evaluation could prove a new system is unsatisfactory.
Face recognition Favourites Fax
Feasibility study Field File Fileserver
Fingerprints Fixed length field/record Flash drive
Format controls FTP Gigabyte GIGO Graphics tablet Graph plotter GUI Hacking Hash totals
HCI Headers and footers Hierarchy of passwords
Security to give biometric access to a computer room. Involves scanning the features of the face. A place in the web browser to save favourite websites. It stores the url and acts as a short cut to the websites. Data electronically transmitted over a telephone line. You don’t need the internet or computer to do this. Do not confuse with email. It uses paper rather than electronic storage Part of systems analysis. Involves investigating options and producing a feasibility report. It should contain costs and benefits of the whole system. A collection of related data in a database An organised collection of related records in a database This is a computer attached to a network that has the primary purpose of providing a location for the shared storage of information (such as documents, sound files, photographs, movies, images, databases, ect.) that can be accessed by the workstations that are attached to the network. Security to give biometric access to a computer room. Involves scanning fingerprints. Each field in database of fixed length and each record a fixed number of fields Another name for a memory stick. A newer form of temporary storage, more robust and holds a lot more than a floppy. Works with flash memory. Typically can be 2 or 4 Gb. 1.44Mb Portable and easily damaged. Please note hardly used these days. Lots of new PCs don’t include floppy drives and people use memory sticks rather than a floppy. Preparing data so that it shows correctly in a database or spreadsheet eg short date = dd/mm/yyyy. Also make sure set for UK format and not American format ie mm/dd/yyyy Set these up when creating files eg enter number as 99.99 or date as ‘short date’ dd/mm/yyyy ‘File Transfer Protocol’ is the protocol that lets you upload and download files for a website. 1024Mb, a thousand million bytes ‘Garbage in garbage out’ used to explain setting op a database correctly. If poorly set up, poor results come out. Used for graphics packages to give a more natural ‘feel’. User draws on tablet and results appear on screen. Eg could be used for tracing maps Used to produce high quality graphics for CAD. See also ‘Plotter’ Graphical User Interface (remember ‘WIMP’ Windows, Icons, Menus and Pointer) eg Microsoft Windows XP or Vista Accessing a network or data without permission. Another name for ‘unauthorised access’ Formed by adding together a series of records. During processing the computer will add up the field numbers and compare it with the stored total if they do not match an error has occurred. ‘Human‐computer interface’ means the ways in which a human communicates with the computer via a user interface. Enables same text at top or bottom of every page automatically Access to a network by using username and password. Also each user is only allowed to use the software or get access to files that they need to use. An administrator will have top level of access. Customers can access their bank account details from home across the internet.
‘Hypertext Transfer Protocol’ is the protocol that allows you to communicate with the internet and view websites. Human‐computer (HCI) means the ways in which a human communicates with the computer via interface a user interface. Illegal software Software you have not bought and do not have a licence to use. Licence could now be out of date, making the software now illegal. Immediate Access Store Or ‘Main Memory’ holds the programs currently or awaiting execution Implementation Stage in systems analysis where new system is introduced. It can involve different changeover strategies eg direct, parallel running, pilot and phased Information Processed data Integer In database whole numbers data type eg 256. Used for keyfields Interactive processing The user has to be present and program cannot proceed until there is input from the user eg menu on ATM Interactive services Such as those found on the internet allow you to send back information. Internet A Wide Area Network or ‘Network of Networks’ or ‘Global Network of Computers’ Intranet An internal private network eg a school network Iris scan Security to give biometric access to a computer room. Involves scanning the iris of the eye. Not to get confused with ‘retinal scan’ which scans another part of the eye. ISDN ‘Integrated Services Digital Network’ a faster than ‘dialup’ connection for the internet 112k (56k for dialup). Don’t need to learn what it stands for just learn ISDN. ISP Internet Service Provider‐ company that provides communication software for internet access and services eg Freeserve, AOL, Pipex, Demon, Virgin etc. Itemised bill A printed bill given at supermarket for example. It gives lots of information eg date of purchase, name of cashier, how paid, change given, card number, VAT number, cost of each item, total. Joystick Used on PCs mainly for games playing Keyboard Allows characters to be input into a computer Keyfield Uniquely identifies an individual record in a database Kilobyte 1024 bytes, a thousand bytes Kimball tags Pre‐punched tags affixed to goods in a clothes shop for example, contains size and style data that speed up stock control. They are small, rectangular cardboard tags, removed at POS and tags might be placed on a spike near the till. At the end of the day the tags are collected and placed in a card reader to input data. Knowledge Information which has rules applied to it LAN Local Area Network‐a smaller network contained within a room or building eg a school network Laptop computer Portable computer much favoured by businessmen, but used by all sorts of people today Light pen User writes on screen with a pen, Used for some graphics CAD or art packages Loyalty card Given out by supermarkets to give points, offers or cash gifts to loyal customers. Used by stores to retain customers, find out about sales patterns and to target customers Magnetic Hard Disk Fast storage and access to data. Stores more data than a floppy and is more robust. Typically could store 50Gb of data. Magnetic strip A card with data recorded onto a magnetic strip, are swiped through a card reader, and data is read off it Magnetic tape Commonly used for backup and archiving. Used to backup a network automatically.
Mainframes Main memory Maintenance
Mark‐sense reader Master file Megabytes Memory stick Micro computers MICR MIDI input Modelling Modem Monitor
Monitor Mouse Multimedia
Multi‐access on‐line Multiprogramming Multi tasking Network Network topologies Newsgroup
Offline processing OMR
Inserts fields from a separate database, into predefined positions, into a word processed document. It allows the same document to be sent to many different people. Large central computers (size of rooms) to run a large wide area network (WAN) Or ‘Immediate Access Store’ holds the programs currently or awaiting execution An essential part of systems analysis. When the new system is in full operation it must be reviewed at regular intervals to monitor performance. Documentation has to be kept up to date. Changes might need to be made if eg the government introduces new tax laws. OMR eg school register, exam multiple choice questions and lottery Permanent file kept up to date by applying transaction file 1024k, a million bytes A newer form of temporary storage, more robust and holds a lot more than a floppy. Works with flash memory. Typically can be 2 or 4 Gb. The more old fashioned name for a PC Magnetic Ink Character Recognition eg used by banks to read cheques Musical Instrument Digital Interface. Recording the sound patterns of musical notes using different instruments. Using a spreadsheet to perform ‘what if’ type investigations. If numbers or values change, what will be the results? A device needed for analogue to digital conversion and back again ie modulate and demodulate. Screen displays composed of a large number of pixels which display dots in different colours. High powered graphics are used if a graphics card is fitted. Some have TFT (Thin Film Transistor) screens, LCD Liquid crystal display and thin plasma screens. All network programs and users actions should be monitored and logged. This is part of auditing procedures to try and stop computer fraud and misuse. Used on PCs. Directs a screen pointer. Used in a GUI (WIMP) environment Can handle sound and video files. Animation and transition effects, automatic timing effects. Used in presentations, but also applied to televisions and computers. Many users linked by workstations to a central computer such as in a network. Holiday or airline booking, one user is locked out to prevent double booking Ability to run many programs apparently at the same time eg In mainframe computers each job is allocated ‘time slice’ in turn The ability to hold several programs in RAM at one time but the user switches between them eg using GUIs Computers which are linked together How we arrange our network A forum to communicate with other people with a similar identity. It can be work related, education related or fun related eg football bulletin board. You can post emails as a new topic or add a ‘thread’ to an existing topic. A device connected to a network, such as a computer or router Optical Character Recognition eg scans words and converts to text on computer. Used on palm tops, and used to copy hand written gas and electricity metre readings for billing purposes. Processing which is done away from PC eg batching together clock cards, filling in OMR cards Optical Mark Recognition eg school register and lottery Sometimes called
Online booking system Online dictionary Online processing Online thesaurus Operating systems
Optical disks Pagination Palmtop computer Parallel running
PDET Peer to peer network Phased
PIN Plotter Portable media POS Presence checks Printer Program Patching RAM Random file Range checks Real Realtime
‘mark‐sense’ Might be used for theatre and concert tickets, holidays and flights. They can be booked through the internet. Look up meanings of words Processing performed under direct control of CPU whilst user remains in communication with the computer Displays alternative words of similar meaning eg good, better, great An operating system is a program or set of programs which control the hardware and allow user programs to run. They should be reliable, efficient, small and maintainable Laser technology is used to read data Automatic numbering of pages by computer, used in Word processor or DTP A very small portable computer designed to be used in the palm. Smaller than a laptop. Strategy for changeover in implementation stage of systems analysis. It means running the old system alongside the new system. Eventually if the new system proves successful the old system will be dropped after many checks. Portable Data Entry a calculator sized device that reads bar codes All stations in network have equal status. All terminals usually intelligent and so applications may be stored on different computers and accessed by all. Strategy for changeover in implementation stage of systems analysis. It can be used with direct or parallel running changeover. Only some files eg some customer accounts should be computerised to check the system. Devices that can be connected to a computer and controlled by it. These can be input or output devices. Strategy for changeover in implementation stage of systems analysis. It can be used with direct or parallel running changeover. It means only using a small part of company or organisation to test the new system eg accounts department only ‘Personal Identification Number’ used to authorise a transaction using an ATM (Automated Teller Machine), or at POS using ‘chip and pin’ system. A type of very large printer used for posters and architects drawings. Used with CAD. Peripheral storage devices like floppy disk, CD writer, DVD writer, memory stick, ZIP streamer, portable hard drive. Point Of Sale involves scanning barcodes with a laser scanner eg used at supermarkets There must be a character present in a particular place on a database. . This is a validation type. Used to create ‘hard copy’ Laser printer good quality and quiet, Inkjet printer cheaper slow, can use colour Introduction of an additional subroutine or code eg channel funds into a fictitious account or transmit codes to get free telephone calls ‘Random Access Memory’, memory used ofr temporary storing programs and data. It is wiped clean when the power is switched off. In database gives very fast access. To individual records without having to access other records first eg car registration or train timetables Data is between stated ranges eg must be between 1 and 1000. This is a validation type. In database number data type with decimal points eg 4.5 This means being online at the same time eg chat lines work in realtime where both people are online at the same time, where email does not have to involve
realtime communication. Email can be received and sent at any time without the receiver having to be online at the time. Realtime systems Control where data from sensors is processed immediately. Timing is critical, a ‘matter of life and death’ eg air traffic control, nuclear power plants, oil refining, chemical processing Realtime transaction Transactions completed online eg holiday and airline booking systems. Timing is not critical like in realtime systems. If two users are booking same thing one will be locked out to stop double booking Record A collection of related fields in a database Repetitive strain injury ‘RSI’ can be caused by constant use of a computer. Usually affects wrists or neck. Retinal scan Security to give biometric access to a computer room. Involves scanning the retina of the eye. Not to get confused with ‘iris scan’ which scans another part of the eye. Ring network The Cambridge ring has no host computer and none of the nodes need to have overall control of access to the network. Messages in the ring flow in one direction from node to node. Messages addressed from one node to another are passed around the ring until the receiving node is ready to receive it. ROM ‘Read Only Memory’ is a permanent non volatile memory which stores programs which cannot be overwritten. They can be ‘read only’ and are not lost when power is switched off eg system programs, GUI RSI ‘Repetitive strain injury’ can be caused by constant use of a computer. Usually affects wrists or neck. Scanner Scans and inputs images from a printed sheet. Hand held or flat‐bed. Search engine Allows you to search www for any topic, and each page has links to another and so on. Secondary storage Sometimes called ‘backup storage’. Storage capacity on a computer Sensor input Digital readings eg light, heat movement, heart beat are measured and sent as analogue signals to be used as input for a control system Sequential file In database sorted in order of the keyfield file Serial file In database unsorted file usually a temporary file ‘Sick building’ syndrome An illness caused by working in an environment with poor ergonomic design and lighting with a lot of glare. Simulation Model Software that represents a real life situation. Sometimes used if dangerous in real life eg training pilots, or if its expensive eg economic forecasting Single‐user on‐line Provides for interaction between the job and the user, which may influence the course of processing eg word processor Sound output Using speakers, useful for music, voices and sound effects for games. Also used on MIDI keyboards Spellchecker Compares words with an online dictionary and suggests alternative words. It does word counts and allows users to add words to the dictionary. It does grammar checks. Star network Each node is connected to a CPU at the centre. Popular topology for a WAN. Messages pass through host which interconnects different devices on the network. The central host switches messages point to point. Stock Control The task of recording and maintaining stock levels String In database text data type Smart Cards Programmable plastic cards ‐ they have chip on front of them. Can be used for security to give access to a computer room. Smart cards are also being used for various payment systems as an alternative to cash eg Mondex. Speakers For sound output, useful for music, voices and sound effects for games. Also used on MIDI keyboards. Used with teleconferencing
Software piracy Store card
System design Technical documentation Teletext
Touch sensitive menus or screens Transaction file
Transcription errors Transposition errors URL User documentation Validation Variable length fields
Virtual reality input Virus
Software used as a calculator. Stores formulas and data.It allows ‘what if’ calculations, and a variety of output formats eg graphs It can be used to do mail merges Illegal copying of software A type of credit card which belongs to a large store. Customers can use this to buy goods electronically at POS. Eg a Burton’s store card, or a Marks & Spencers’ store card. Analysing a process or procedure to find a better way of making it work. This involves analysis, systems design, implementation, testing, maintenance, evaluation. A person who does this job is a ‘systems analyst’ Stage of systems analysis which involves detailed design of proposed new system. Documents on how technicians should maintain a new system after implementation in systems analysis. Information service using adapted television sets. The information is broadcast along the normal television signal. BBC teletext is called Ceefax. The system is free but is non‐interactive. A computer attached to a network that is used to enter data to a network. It can be a PC or a ‘dumb’ machine that just allows data to be typed into the network. This is an essential part of systems analysis. Programs are tested individually and whole system interaction is tested to. If modifications are made to a new system there will be re‐testing too. Used in places like McDonalds, where all of the prices can be input into POS by pressing a coloured key for each item bought. A temporary file for storing data. It contains detail of all transactions that have occurred in the last period of processing eg a file in a supermarket showing a day’s takings at POS. Typing errors, typing wrong character by accident Keying in wrong order eg 56789 instead of 57689 ‘Uniform Resource Locator’ just another name for a web address, which begins with www. Documents on how users should use a new system after implementation in systems analysis 'The process of ensuring data is valid and legal' Making sure that data is sensible – eg within a defined range <10 Each field in database of different lengths with each field terminated by a marker (*) and each record terminated by a marker. Can contain a different number of fields 'The process of ensuring data has been copied over correctly from one medium to another' Double checking that data has been entered correctly – eg proof reading, being asked to enter password TWICE to make sure it has been typed correctly Sometimes called ‘Tele‐conferencing’ With a small video camera fixed to your PC your image can be sent down the network to another user (and vice versa). Audio signals can also be sent. This means you can see and talk to another user if you have a microphone. Companies set up meetings with eyeball‐to‐eyeball communication between people who are not in the same building or even the same country. Hardware devices eg digital glove are worn by the user, whose movements are sensed and used as input. A VR helmet may be used. A program introduced into a computer with the intention of causing damage or inconvenience eg the Melissa virus
Virus definitions Virus eradication Virus scanning Voice recognition Voice prints WAN
WAP Web cam Web publishing software ‘White collar crime’
WIMP Word Word processing Write protect WWW Unauthorised access ZIP
The latest definitions of viruses available to keep virus scanning software up to date After finding any viruses present on your computer or network, this part of the software will remove them all. Software that searches a computer or network for viruses. For it to be effective it should be updated with latest ‘virus definitions’ Using a microphone to receive speech input, and speakers for speech output, this is a voice driven user interface. Security to give biometric access to a computer room. Involves scanning voice patterns. Wide Area Network‐ ‘a network of networks’ bigger networks covering cities or linking various external networks via gateways eg internet or multi‐national companies ‘Wireless applications protocol’ Mobile phones that receive the internet Allows video conferencing across the internet Software used to build websites and to upload finished web pages through FTP into web space. It includes lots of word processing features and ability to add graphics and hyperlinks. This is another name for ‘computer fraud’. It could be committed by anyone who uses a network and suggests that its hard to know often who to suspect. Sometimes its an employee with a grudge against the company or institution. Short for Windows, Icons, Menus and Pointer, and is an easier way to remember the main features of a GUI (Graphical User Interface) NB not the software! Largest number of bits a processor can handle at one time eg a 64 bit processor can handle 64 bits Software application to enter and process text. Good for text based documents eg letter, essay Media that can be read only and cannot be written onto ‘World Wide Web’ Part of the internet that allows you to browse websites, that usually begin with ‘www’ Accessing a network or data without permission. Another name for ‘hacking’ Portable special ZIP drive needed. Up to 250Mb on one disc.
Tips for GCSE ICT Exam Dates The dates for the WJEC GCSE ICT exams are as follows: 1) Paper 1 = Monday 21st June 2010 at 9.15 am Higher Paper (A*‐D) = 1 hour 30 minutes Foundation Paper (C‐G) = 1 hour 2) Paper 2 = Monday 28th June 2010 at 1.40 pm Higher Paper (A*‐D) = 1 hour 30 minutes Foundation Paper (C‐G) = 1 hour NB Don’t plan on just revising for each exam separately. There is a certain amount of overlap between the knowledge needed for both papers. You need to revise for Papers 1 and 2 in their entirety and don’t just revise for Paper 1 for the first exam, and for Paper 2 for the second exam. You could for example find questions on data and information, databases, data logging, spreadsheets, software, networks, control etc. on both or either of the papers. Use the Revision notes provided mainly for each exam when the exam is coming, but also look at the Revision notes for the other paper too. (Not in as much detail though!) Important 1) Don’t ever answer questions with one word answers, ‘faster’ ‘quicker’ or ‘more efficient’. You must explain fully what you mean or no marks will be given. Eg A broadband internet connection is faster than either a ‘dial up’ or ISDN connection. A person can usually get their money quicker by going to an ATM to get cash, than going to the bank and queuing up. Doing a search on a database is usually a more efficient way of finding a particular record than searching through paper files in a filing cabinet. 2) On Paper 2 you must learn all of the systems in the ‘Applications’ section in detail. These are robotic and embedded control, automatic stock control and order processing, expert systems in medicine, booking systems. You can guarantee that there will be a number of questions on the paper for these topics. These are specialist topics on Paper 2 for this year. Concentrate in each system at understanding what the system is, look at input, output and processing involved. Also learn about advantages and disadvantages of each system.
Published on Apr 19, 2010