KEMBAR78
My Notes | PDF | Computer Network | Printer (Computing)
0% found this document useful (0 votes)
11 views55 pages

My Notes

The document provides an overview of computer hardware and software components. It discusses the main internal and external components of a computer system including the central processing unit, memory, storage, and input/output devices. It also describes different types of computers like desktops, laptops, smartphones, and tablets. The document covers operating systems, data types, and summarizes key concepts like artificial intelligence and extended reality.

Uploaded by

Seif Mahmoud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views55 pages

My Notes

The document provides an overview of computer hardware and software components. It discusses the main internal and external components of a computer system including the central processing unit, memory, storage, and input/output devices. It also describes different types of computers like desktops, laptops, smartphones, and tablets. The document covers operating systems, data types, and summarizes key concepts like artificial intelligence and extended reality.

Uploaded by

Seif Mahmoud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 55

Chapter 1 (7 Pages)

1.1
Hardware: is the general term for the physical components that make up a typical
computer system.
Consists of: Internal & External
Software: is the general term used for the programs that control the computer system
and process data
Consists of: Application & System
Applications software: provides the services that the user requires to solve a given task
 Word processing
 Spreadsheet
 Database
System software: is the software designed to provide a platform on which all other
software can run.
 Operating System
 Linkers
 Device Drivers
Analogue Data: Data which is variable/continuous
Digital Data: Data which is discrete or 1,0
Computers doesn’t understand analogue data, so they need analogue to digital
converter (ADC) to be able to understand

1.2
Main Components of computer system consists of:
 Input devices
 Output devices

Page |1
 Secondary storage devices

Central processing unit (CPU): Part of computer that executes commands from
computer hardware and software.
CPU/Microprocessor: is made up of control unit, which controls input and output
devices.
Random Access Memory (RAM): is an internal chip where data is stored on it
temporarily.
Read Only Memory (ROM): Is memory used to store information which needs to be
permenant.
CMOS: Complemntary Metal oxide semiconductory (Batter Powered).

1.2
Backing Storage consists of:
 Hard Disk Drive (HDD)
 Solid State Drive (SSD)

Page |2
1.3
Operating Systems (OS): Allows the computer systems to function, and the user to
communicate with the computer systems.

Examples of User Interfaces:


Command Line Interface(CLI): requires a user to type in instructions/commands to
choose options from menus, open software, etc.
Graphical User Inerface(GUI): Allows the user to connect with the computer using Icons
rather than typing in command lines.
Dialouge Based User Interfaces: use the human voice to give commands to a computer
system.
Gesture Based Interface: rely on human interaction by the moving of hands, head or
even the feet.

1.4
Desktop: computer that is made up of separate monitor, keyboard, mouse and
processor unit.

Page |3
Laptop: Computer where the monitor, keyboard, pointing device and processor are all
together in one single unit.
SmartPhones: allow normal phone calls to be made, but also have an operating system
allowing them to run a number of computer applications.
Tablets: They work in a similar way to a smartphone. Tablets use touch screen
technology and do not have a conventional keyboard. The keyboard is virtual.
Advantage of desktops over Laptops:
 Easier, less expensive to buy and upgrade
 Tend to have better specifications
 Power consumption is not a problem as it is always conntected to a power supply
 Less likely to be damaged or stolen
 Internet access is more stable as it is wired.
DisAdvantage of desktops over Laptops:
 They are not portable
 More complicated components
 To send files, u have to copy files on a usb stick
Advantage of Laptops over Desktops:
 Portability
 Full advantage of wifi
 Everything is built in a single unit so no trip over wires
 Less space on desk
 They can link to any multimedia system
DisAdvantage of Laptops over Desktops:
 Easier to steal
 Limited battery life
 Keyboard and pointing device can be awkward to use
 Not always possible to upgrade them and can be expensive
Advantags of Smarthphones:
 Small and lightweight
 U can use them to make phone calls
 They can be used almost anywhere due to their portability and wifi
 Reasonable battery life

Page |4
DisAdvantages of SmartPhones:
 Small screen and keyboard
 Slower and difficult when typing things
 Searching and taking photos can drain batterly life
 Memory size is small
 Not all websites are compatible with smartphones
 Much easier to lose or get stolen
 Mobile network data can sometimes be slow in transferring data.
Advantags of tablets compared to laptops:
 Fast to switch on
 Fully portable
 Touch screen technology
 Doesn’t produce much heat
 Battery life is longer
 When power button is pressed it goes on standby but remains connected to
internet.
DisAdvantages of tablets compared to laptops
 Tend to be expensive
 Limited storage
 Typing on the touch screen can be slow and difficult
 Laptops support more file formats

1.5
Artificial Intelligence (AI): is a machine or application which carries out a task that
requires some degree of intelligence.
Negative impacts of AI:
 More dependency on AI technology
 Lead to higher unemployment
 Loss of skills
Extended reality (XR): refers to real and virtual combined environments.
Examples:
 Augmented Reality

Page |5
 Virtual Reality
 Mixed Reality

Chapter 2 (10 Pages)


2.1
Uses Of Keyboards:
 Input data to application software
 Type in command lines

Page |6
Advantages of Keyboards:
 Fast Entry method
 Well known method
 Easy to use
 Easier to do data verification checks
DisAdvantags of Keyboards:
 Can be difficult to use if the user have limited wrist use
 Slow method
 Uses a lot of desk space
Numeric keypad: is used to enter numbers only, used in ATMs, and POS
Advantages:
 Faster than keyboards in entering numeric data
 They are small in size
DisAdvantages:
 Small keys, difficult to input
 The orders of the numbers can be confusing
Mouse: user controls the position of a pointer on the screen by moving the mouse
around.
Advantages:
 Fast method for choosing options
 Very quick navigation
 Does not need large desk area
DisAdvantages:
 Can be difficult for people with restricted wrist movement
 Easy to be damaged
 Difficult to use on non-flat surfaces
Touchpad: The pointer is controlled by the user moving their finger on the touchpad
Advantages:
 Same as mouse in fastesness
 No need to buy a separated mouse

Page |7
DisAdvantages:
 Can be difficult for people with restricted wrist movement
 Can be more difficult to control the pointer
 Difficult to use when doing certain operations like: drag and drop
Remote Control: is used for the operation of other devices using infrared signals.
Advantages:
 Can be controlled from any reasonable distance unlike wired mouse for example
DisAdvantages:
 Can be difficult for people with restricted wrist movement
 Easier to block to signal
JoySticks: By gripping the stick, a pointer on the screen can be controlled. Buttons on
side used for selection.
Advantages:
 Easier than keyboard to navigate screen
 Control is more realistic in some applications
DisAdvantages:
 Difficult to control the screen pointer
Scanners: are used to enter information from hard copy into a computer.
Advantages:
 Images can be stored to be edited later
 Using OCR, can be more accurate
 possible to recover damaged documents and photographs by scanning and then
using appropriate software to produce an acceptable copy.
DisAdvantages:
 Quality can be limited
 Very slow at scanning
Digital Camera Advantages:
 Easier to produce high quality photos
 Easier and faster to upload photos to computer

Page |8
 Memory card can story thousands of photos

DisAdvantages:
 Understandment on how computer works needs to be there for transferring of
files
 Some artisity might be lost due to correction of smart softwares
 Images often needs to be compressed to reduce memory used size
Advantages of Microphones:
 Faster to type in text using voice than keyboard
 Improves safety
DisAdvantages:
 Can use a lot of memory
 Voice recognition softwares are not accurate as typing in
Sensors: A sensor is a device that inputs data to a computer; the data is a measurement
of some physical quantity that is continuously changing.
Type of Sensors:.
 Temperature
 Humidity
 Pressure
 Motion
 Light
 PH
 Sound
Advantages:
 More accurate readings
 Readings are continues, non-stop
 Systems can easily be automatic
DisAdvantages:
 Any problem in the sensors will give wrong results

Page |9
 Most sensors are analogue, therefore (ADC) needs to be used

2.2

Card Readers Types:


Magnetic Stripe Reader: These are used to read information on the magnetic stripe
found on the back of a credit or debit card.
Advantages:
 Fast Data Entry
 Error Free
 Secure
 Prevents access to restricted areas
 Not affected by oil, water or etc
 No moving parts
DisAdvantages:
 If it got damaged, data is lost
 Doesn’t work in a distance
 As its not human readable, it can be an disadv in some cases.

Contactless Debit Card Readers: allow customers to pay for items worth up to a certain
amount of money without entering their PIN.
Advantages:
 Faster transaction
 Uses 128-bit encryption, so more secure
 Do not have to worry about pin typing errors
 Retailers have no longer access to customer’s cards information
DisAdvantages:
 More expensive than debit/credit cards
 A thief with a suitable reader could monitor your contactless card transaction
while standing at the counter with you.
 Can take money twice

P a g e | 10
 Transcations are usually limited to certain amount of money
Radio frequency identification (RFID): readers use radio waves to read and capture
information stored on a tag.

Advantages:
 Tag can be read from a distance
 Very robust and reliable
 Very fast read rate
 Bulk detection is possible
 Bidirectional data transfer
DisAdvantages:
 Tag collision
 Easier to jam or interrupt
 Easy to hack into data transmitied by tag
 More expensive
Optical mark recognition (OMR): is a device which can read marks written in pen or
pencil on a form.
Optical character recognition (OCR): is the name given to a device that converts the
text on hard copy documents into an electronic form.
Barcode readers: are used to read information in the form of a bar code.
Quick response (QR): This is made up of a matrix of filled-in dark squares on a light
background.

2.3
Cathode ray tube (CRT) monitors: are the least expensive type of monitor, although
they are becoming increasingly rare as LCD monitors are now taking over.
Advantages:
 Seen in wider range angles
 They allow the use of light pen

P a g e | 11
DisAdvantages:
 They are heavy
 They can become very hot and cause fire
 They consume more power than LCD
 They can flicker, which can cause headaches
Advantages of LCD Screens:
 Low power usage
 Lightweight
 Doesn’t suffer from image burn in
 Screens can be in different sizes
 Do not suffer from flickering image
 High image resolution
 Produces low electromagnetic field
DisAdvantages:
 Colors and constrants can be bad from various angels
 Motion Blur
 Lower contrast
 Might have weak or stuck pixels
 May not uniformly illuminated from the back light

Printers Type:
Laser Printers: produce very high-quality hard copy output. The print rate per page is
very quick if a large number of pages are being printed.
Advantages:
 Printing fast
 Handle very large job prints
 Quality is constantly high
 Tone cardige lasts for a long time
DisAdvantages:
 Only fast if several copies were being made
 Color of laser printer tends to be more expensive
 They harm the ozone and organic environment

P a g e | 12
Inkjet printers: Are used to produce good-quality hard copies.
Advantages:
 High quality output
 Cheaper to buy than laser printer
 Very lightweight
 Do not produce ozonic or organic harmful stuff
DisAdvantages:
 Slow output for several copies were being made
 Cannot do large print jobs
 Can be expensive if used a lot
Dot matrix printers: Are a type of impact printer where a print head presses against an
inked ribbon.
Advantages:
 Can be used in enivorments which are harmful or dirty
 Carbon copies can be produced
 Very cheap to run and maintain
 Easy to use
DisAdvantages:
 Very noisy
 Costs more than inkjet printer initially
 Very slow
A (Graph) Plotter: Instead of toner or ink cartridges, plotters use a pen, pencil or marker
pen to draw multiple continuous lines, rather than a series of dots like a printer.
Advantages:
 Very high quality output
 Able to produce large drawings at high accuracy
 Able to print on variety of materials
DisAdvantages:
 Very slow
 Expensive
 Have large physical footprint

P a g e | 13
3D Printers: can produce solid objects that actually work. The solid object is built up
layer by layer.
Advantages:
 Manafacture of items became more easy
 Allows rapid prototypes as it prints quickly
 It costs less when compared to labor costs and other costs involved
 It benefits medically
 Parts for machinery that are no longer made could now be manufactured using
3D printers.
DisAdvantages:
 Can make copyright items
 Can lead to dangerous and illegal activity
 Potential for job loses

Chapter 3 (~ Pages)
3.1
Magnetic tape: is a very thin strip of plastic which is coated in a magnetic layer (iron
oxide). They are read from or written to by a read/write head in a magnetic tape storage
device.
Advantages:
 Less expensive than HDD
 Very robust techonology
 Huge data capacity
 The data transfer is actually fast
DisAdvantages:
 Very slow data access time
 When updating, another tape is needed to store final update version
 They r affected by magnetic fields

P a g e | 14
Hard disk drives (HDD): are still one of the most common methods used to store data
on a computer. Data is stored in a digital format on the magnetic surfaces of the hard
disks
Advantages:
 Very fast data transfer and access
 Very large memory
DisAdvantages:
 It can be easily damaged
 They have many moving parts
 It can be little noisy
Portable hard disk drives: are essentially HDDs external to the computer and can be
connected to the computer using one of the USB ports.
Advantages:
 Data access and transfer time is fast
 Large memory capacity
 They can be used to transfer files between computers
DisAdvantages:
 They can be easily damaged if fallen for example
 Less data transfer and access time than fixed HDD

3.2
Advantages of CD-R and DVD-R:
 Cheaper medium than RW disks.
 Once burned (and finalised) they behave like a ROM.
Disadvantages of CD-R and DVD-R:
 Can only be recorded once
 Not all CD/DVD players can read CD-R/DVD-R.
Advantages of CD-RW/DVD-RW:
 Can be written over many times.

P a g e | 15
 Can use different file formats each time it is used.
 Not as wasteful as R format because the files/data can be added at a later
Disadvantages of CD-RW/DVD-RW
 Can be relatively expensive media.
 Possible to accidentally overwrite data.

Advantages of CD-ROM/DVD-ROM
 They are less expensive than hard disk drive systems.

Disadvantages of CD-ROM/DVD-ROM
 The data transfer rate/data access time is slower than for hard disks.

P a g e | 16
Chapter 4 (3 Pages)
4.1
Network interface card (NIC): Allows a device to connect to a network.
Media access control (MAC) address: is a number which uniquely identifies a device
when it is connected to a network.
Whenever a computer connects to the internet it is given an internet protocol (IP)
address.
Data is moved around networks in the form of data packets.
Hubs: are hardware devices that can have a number of other devices connected to
them. They are used primarily to connect devices together to form a local area network
(LAN).
Switch: It stores the MAC addresses of all devices on the network. Each port on the
switch connected to a device will have a matching MAC address.
Bridges: are devices that connect one LAN to another LAN that uses the same protocol.
Routers: are used to route data packets from one network to another network, based
on IP addresses.
Both Wi-Fi and Bluetooth offer wireless communication between devices. They both
use electromagnetic radiation as the carrier of data transmission.
Cloud computing: is a method of data storage where data is stored on remote servers.
Advantages of cloud computing (storage):

P a g e | 17
 Data can be accessed anytime from any device
 There is no need to carry an external device with u
 Remote backup data in case of data loss
 Allowing recovery of data
 Offer almost unlimited storage free of price
Disadvantages of cloud computing (storage)
 Security might be hacked
 Slow or unstable internet can cause too much time of data acess
 High costs for high storage or high download
 Possible risk of failure and loss of data
Local area networks (LANs): are usually people within one building or geographically
near each other. A typical LAN will consist of a number of computers and devices which
will be connected to hubs or switches.
Wireless LANs (WLANs): are similar to LANs, but there are no wires or cables.
Wide area networks (WANs): are used where computers or networks are situated a
long distance from each other geographically.

4.2
Other types of authentication:
 zero login
 biometrics
 magnetic stripes
 smart cards
 physical tokens
 electronic tokens
Advantages of magnetic stripe cards
 They are easy to use.
 It is not an expensive technology.
 Magnetic cards can be remotely deactivated (if lost or stolen).
 The cards can be multi-purpose (for example, door key cards, network access)
 cards are used in vending machines to buy food or drink.

P a g e | 18
Disadvantages of magnetic stripe cards
 Less secure than, for example, biometric methods (no encryption)
 the stripe contents can be copied fairly easily.
 The cards wear out with a lot of use.
 Magnetic readers often fail to read the cards on first attempt.
Smart Cards: By inserting a tag (chip and antenna) into a security card, it can act as a
smart contactless card
Physical token: is a form of authentication in the form of a physical, solid object.
Video conferencing: is a communication method that uses both video and sound.
Advantages:
 Easier to access documents
 Hold meetings in short period of times
 Reduces costs as no traveling
 Better for the environment
 Connects people from the organization without being left out
DisAdvantages:
 Time loss, as lag in response or video
 Images quality can be lower
 Very expensive to set up in first place
 Time zone difference
 Demotivating stuff, as maybe one of their job perks is travelling
 The whole system relies on good network
Audio conferencing: refers to meetings held between people using audio (sound)
equipment.
Web conferencing: uses the internet to permit conferencing to take place.

P a g e | 19
Chapter 5 (4 Pages)
5.1
Advantages Of MicroProc mneesed-Devices on Our lifes:
 No longer need to do manual tasks
 Give people more time to do activities
 No longer need to stay at home while cooking or washing cloth
 Gives people sense of security
 Smart fridges can lead to more healthier lifestyle
DisAdvantages:
 Lead to unhealthy lifestyle, for wrong use
 Tend to make people more lazy
 Potential of losing household skills
 Risk of cyber security threats.
Data Security Issues: As people can communicate remotely to their home, therefore a
hacker. Which can allow a hacker to gain all personal information.
Positive Effects of Social Interactions:
 Easy to make new friends
 Easier to find people with same interests
 Less expensive to keep in touch
Negative Effects of Social Interactions:
 People do not meet face to face
 Lack of social interactions can make people more anxious
 People behave differently when communicating online
How to control transports?
 monitoring of traffic on motorways
 congestion zone monitoring
 automatic number plate recognition (ANPR)
 automatic control of traffic lights

P a g e | 20
 air traffic control systems
 railway signalling systems
Smart Motorways: Monitoring and control of the traffic and/or the information
displayed on the motorway signs is controlled by a central computer system.
Advantages:
 Reduces traffic jam and everyone’s journey time
 Became more efficient
 Traffic offenses can now be punished by ANPR
 Stolen cars can also be spotted by ANPR
 Reduces/Minimises human error
DisAdvantages:
 Hacker can gain access to the system and cause distruption
 If the system fails, the transport system will be standstill
 ANPR means even innocent people’s movement will be tracked
 Compromised safety due to poorly designed system
Autonomous Vehicles & How They Work: Cars/airplanes which are controlled/moved
robotcally.. Meaning they are controlled by a microprocessor which receives info from
the cameras, sensors, and compare it with preset values, and then take actions based
on the values.
Advantages:
 Human error is removed
 Better for the environment
 Reducing traffic problems
 Increases lane capacity
 Reduces travel time
 Auto Parking technology
DisAdvantages:
 Very expensive system
 Fear of hacking into the system
 Security and safety issues
 Need to make sure the systems are well maintained
 Need to accept the idea of the new technology

P a g e | 21
 Lead to unemployment as less taxis will be there
LiDaR (Light Detection and Ranging): uses lasers which build up a 3D image of the
surroundings.

Advantages of using autonomous trains:


 Improves the punctuality of the train
 Reduces running costs
 Improves safety, human error reduced
 Minimising energy consumption
 Possible to increase the frequency of the trains
 Easier to change trains schedule
DisAdvantages:
 Fear of hacking into the system
 System doesn’t work well with busy services
 High capital cost
 Ensuring passenger’s behavior is acceptable is not there
 Passenger acceptance of the new technology
 No drivers mean there will be a need for CCTV to monitor railway stations
Advantages of Autonomous Airplanes:
 Improve passenger comfort
 Reduces running costs
 Improves Saftey
 No longer need for the pilots cabins
DisAdvantages:
 Security aspects if no pilots on board
 Fear of hacking into the system
 Emergency situations can be difficult to deal with
 Passenger acceptance of the new technology
 Software glitches

5.2
Health Risks:

P a g e | 22
Back Neck Pain: Caused by sitting in front of computer screen for too long.
Ways to solve it:
 Correct posture
 Use foot rests
 Use adjustable screens and set for right height
Repetitive Strain Injury (RSI): Damage to wrists and fingers due to sitting too long on a
keyboard or mouse.
Ways to solve it:
 Ensure correct posture
 Wrist correct adjustable when using keyboard/mouse
 Take breaks
 Use voice activated software
 Use ergonomic Keyboards/Mouse
Eyestrain: Caused by looking at a computer screen for too long.
Ways to solve it:
 Change from CRT to LCD
 Take breaks
 Use anti-glare screens
 Get their eyes tested on regular basis at a doctor
Headaches: Caused by incorrect lighting, screen reflections, flickering screens, and so
on.

Ways to solve it:


 Use Anti-Glare Screens
 Take breaks
 Get their eyes tested on regular basis at a doctor
Ozone Damage/Irritation: Caused by laser printers in an office.
Ways to solve it:
 Proper venilization system
 Should be in a proper printing room
 Change to inkjet printers

P a g e | 23
Chapter 6 (14 Pages)
6.1
Communication systems that uses ICT:
 Newsletter/Posters
 Media streams
 Websites
 Multimedia presentations
 E-Publications

P a g e | 24
Newsletters and posters: Can be produced very easily using word processor.
Newsletters: Is a very useful method for getting important information to a target
group.
Posters: Are a good way of publicising, for example, a sporting event or an
advertisement for a forthcoming movie.
Websites: A company can develop their own websites and then adevertise on it rather
than using Posters/Newsletters.
Advantages:
 Sound/Video/Animation can be added
 Links to other pages can be added
 Buttons to navigate around
 It allows the owner to see how many people visited the website
 Can be seen by global audience
 Cannot be thrown away
 Much easier to update the website anytime

DisAdvantages:
 Can be hacked and modified
 Risk of pharming
 Customer should have a computer and internet access
 It is not as portable as a paper-based system
 Possible for customers to go to wrong websites, leading to distrust.
 More difficult to target a specific group
 Need to find a way for people to find their websites
Multimedia Presentation: Presentations that use animation, video and sound or music
are generally much more interesting than presentations done on slides or paper.
Advantages:
 Sound/Video/Animation can be added
 Possible to have interactive hyperlinks
 Use of transition effects

P a g e | 25
 More flexible

DisAdvantages:
 Expensive, as needs to have special equipment
 Danger the equipment might fall
 There might be the need of internet access
 Focus might be on the medium not the message
 Very easy to make bad presentations
Media streaming: is when users watch movies/videos or listen to music on devices
connected to the internet.
Buffering: makes sure the video plays back smoothly without freezing.
E-Publications: Most material which is published on paper is also available in an
electronic format.
Mobile phones communication: using towers inside many cells networked together to
cover large areas.
SIM (subscriber identity module) card: allow mobile phones to connect to the mobile
phone cellular network.
SMS or text messaging: Allows a very quick way of communicating with another person
by typing on a keyboard.
Voice over Internet Protocol (VoIP): is a method used to talk to people using the
internet.
Internet Access: Any mobile device can connect to the internet either using a wireless broadband
connection or via the mobile phone network.

Advantages:
 Less Expensive
 Lower power consumption
 Quality of service

6.2
Simulation: Is the creation of a model of a real system in order to study the behavior of the system.
Advantages of a model:

P a g e | 26
 Less expensive than building it
 Safer to use
 Try out various different scenarios
 Faster
DisAdvantages:
 A model is only as good as the programming or the data entered
 Costly option
 People interactions may not be positive
Bridge: When an engineer or architect designs a new building or bridge, it is necessary
to test the design long before any construction work is started.
Features of computer modelling:
 Possibility of zooming
 Design can be rotated
 Allows to detect any flaw in the design before being build
 Various scenarios can be tested on the design
Flood water management: uses computer modelling to perform a risk assessment to
identify sources of potential flooding.
How can a simulation be carried out?
Data is entered into the computer and the computer model is run. Once the designers are
satisfied that the model simulates the real situation, they start testing out various different
scenarios.

6.3
Robotics in manufacturing: Robots are used in many areas of manufacturing, from heavy
work right through to delicate operations.

Advantages:
 They can work in harmful environments
 They work 24/7
 Less expensive in long-term
 Higher productivity
 Great consistency
 They can do boring and repetitive tasks

P a g e | 27
DisAdvantages:
 Difficult to do unusual tasks
 Cause higher unemployment
 Risk of skills being lost
 Factories can be moved anywehere in the world causing unemployment
 Inital set-up and maintenance is expensive

6.4
Tasks needs to be done by school:
 registration and attendance records of students
 student performance
 computer-aided learning
How to make Registration and attendance records of students automated?
Method1:

 Give each student with an ID card.


 These contain a magnetic stripe on the rear of the card.
 The student would have to sign the card and also write their unique student ID on the back of
the card.
 Each morning the student would arrive at school and swipe their ID card through a magnetic
card reader.
 The data read would identify the student and the time and date they entered the school’s
premises.

Method2:
 Each student would have their fingerprints recorded.
 Their personal details (as in Method 1) plus fingerprints would be stored on a database.
 When a student entered the school premises, they would be asked to put their hand on a scanner which
would read their fingerprints.

P a g e | 28
Advantage of using method 2 than method 1:
 Fingerprints are unique
 ID cards can be lost
 ID cards can be affected by magnetic field
 It is much easier to clone the ID card
DisAdvantages:
 Long time to collect all fingerprints of students
 More expensive than using method 1
 If a student have their finger injured, it might not be read
 Invasion of privacy issues
Computer Aided learning (CAL): Students would use computers as part of their learning
and complete online tests to monitor their performance.
Advantages:
 Students can learn where and when they want to
 It allows VR to be used
 Students can stop at any point and continue where they were left at
 Its possible to take retests
 More interactive learning
 Makes use of various multimedia
 Its not for replacing teachers role, but to help and stimulate learning
 Can use MCQs, which can be marked immediately by the system
 Micro learning, dividing big topics to small parts
DisAdvantages:
 Expensive and time consuming
 Students can easily be distracted online
 It can lead to student isolation and no team work
 CAL cannot answer unusual questions

6.5

P a g e | 29
Online booking systems: rely on the ability to update files immediately, thus preventing
double-booking, which could happen if the system response time was slow.
Advantages:
 Prevents double booking
 Immediate feedback about availability of seats/rooms
 Booking can happen anytime in the day
 Inform customers on email about offers

DisAdvantages:
 Initial setting up and maintenance is expensive
 Customers needs access to computer/device & internet
 Its difficult to canc el the booking and get your money back
 System breaks down if server is down for maintenance
 If the website is badly designed, it will be difficult to book
 Booking online wont allow the business to build a customer relationship

6.6
Banking Applications: The use of computer technology has revolutionised how we all do
our banking transactions.
Types:
 the use of automatic teller machines (ATMs)
 electronic funds transfer (EFT)
 credit/debit card transactions
 cheque clearing
 internet banking
Advantalges Of ATMs:
 Possible to withdraw cash anytime
 Offer many bank services without going to the bank
 Possible to access account anywhere in the world

P a g e | 30
 Provides quick service
DisAdvantages:
 Often in places where it can be stolen
 Card cloning scams
 Some banks charge customers for using ATMs
 Cash withdrawal limits
 If the card is faulty, no transaction will happen
 Loss of personal touch
Electronic funds transfer (EFT): is a system that allows money transfer instructions to be sent
directly to a bank’s computer system. No actual money is transferred; the whole system relies on
electronic transfer of money between accounts.

Advantages:
 Very secure payment method
 Very quick payment method
 Less expensive
 The customer can dispute their money/ask their money back up to 60 days
DisAdvantages:
 Once transaction is made, no return back
 Needs to have funds
 Fake IDs can be used, and there wont be grauntee receipment

6.7
Patient and pharmacy records: Doctors and hospitals need to keep accurate records of all their
patients. This is essential to ensure correct diagnosis and treatment.

CT (computed tomography): which involves producing images of the internal parts of the body in
a series of thin slices less than 0.1 mm thick.

MRI (magnetic resonance imaging): this uses strong magnetic fields and radio waves to produce
a series of images of the internal organs in the body.

A 3D printer can then produce a three-dimensional representation of a patient’s internal organs,


blood vessels, major arteries, tumors and so on. The doctor or surgeon can use this to show the
patient exactly what is wrong and then show them what procedures are required.

Use of 3D Printer In:


 Prosthetics

P a g e | 31
 Artificial Blood Vessels
 Tissue engineering
 Customized Medicine
Customized Medicines: 3D printing techniques now allow scientists to customize medicines to suit
the individual.

Some Of Its Advantages:


 Designed medicines to meet individuals
 Better control of medicine release in the body
 Saves money
 Better targeting of medicine
 Less chance of an overdose

6.8
Expert System: A smart computer program, designed to copy the know-how of an expert in a
specific area

Advantages:
 High level of expertise
 High accuracy
 Ability to store vast amounts of ideas and facts
 Have multiple types of expertise
 Offer very fast response
 Provide unbiased reports/analaytics data
 Indicate probabilities of suggested solutions
DisAdvantages:
 Needs trainings to ensure correct use
 Set-Up and maintanence are high
 Tend to give cold/unapportiate responses
 They are only good as the informations entered to them
 User can make some dangerous assumption that it cannot be wrong
The expert systems include:

P a g e | 32
 User Interface
 Explanation system
 Inference engine
 Knowledge base
How to setup the expert system?
 Information is gathered
 Its put into the knowledge base of the engine
 Rule bases needs to be created
 Setting up the inference engine
 The user interface needs to be developed
 Testing

6.9
point-of-sale (POS): terminals which incorporate a barcode reader to scan the barcode
and retrieve the price of the article.

Advantages Of Chip & Pin Cards:


 More secure than magnetic stripe
 Quicker system and allows for contactless payments
DisAdvantages:
 Risk of fraud when enetering the pin
 Some countries does not accept it
Use of Tokenisation in mobile phones:

 Tokenisation is used when setting up a mobile wallet.

P a g e | 33
 The user takes a photograph of their credit card using the smartphone’s camera.
 The details on the card (such as card number and name of bank) are securely sent by the
smartphone manufacturer/mobile wallet company to the bank that issued the card.
 The bank replaces the details on the card with a series of randomly generated numbers (called
tokens),
 which they send back to the mobile phone manufacturer,
 who then programs this random number into the user’s smartphone.
 This random number is then the one used for transactions.

Internet banking: requires good online security. It allows the transfer of sums of money
between accounts, payment of bills, and etc.

Advantages Of Online Shopping/Banking:


 No longer need to travel to town centers and shops
 User have access to worldwide market
 Access any bank or shop without leaving home
 24/7 availability
 People can spend more time doing other things
 Less time consuming when paying bills or etc
 Saves time by not standing in queue
 No need for premises or lands or high level of workers for the business
DisAdvantages:
 Lack of socialization
 Lack of excersice, so possible health risks
 Security issues
 Using fake websites
 Necessary to have a device with internet access
 Next day delevry can cause more traffic and pollution
 Only possible to see picture of goods not in real life
 Street shops and banks are closing as there is no need for it
 Local shops/retialers might fail due to other multinational shops/retialers
 Risk of error, like transferring money to wrong account
Effects on company:
 Save costs as fewer staff and lands are needed
 Potential customer base increase

P a g e | 34
 Need to employ more staff in delivery department
 Cost of setting up and maintaining the websites
 Lead to drop to customer loayality as less customer interactions are there
 Robberies will decrease
 Banks employ fewer security staff

6.10
1. Optical Mark Recogniton:
 Read school registration
 Multiple choice questions papers
Advantages:
 Fast way inputting results of a survey
 More accurate than typing in the data
 More accurate than OCR methods
DisAdvantages:
 Forms needs to be carefully designed
 Problems if not filled correctly
 Often only work with black pen or pencil
 Limited to the questions on the paper
2. BarCode readers
3. QR Code Readers
4. OCR
5. ANPR: systems are used to read the number plates on cars
Advantages:
 Monitor the cars speed
 No need to employ car security guards
 Faster system
 Can easily control the car exit or entry to parks or private roads
 Used as security system
 Analyse driver behavior
 Automatically charge cars/motorist if they enter a congestion zone

P a g e | 35
DisAdvantages:
 Lack of manned security, which can lead to crimes
 Invasion of privacy issues
 Damaged or diry plated will not be recognized
 Number plate cloning
6. RFID
Advantages:
 Tags can be read from distance
 Very robust and reliable technology
 Tags are so hard to copy
 Reduce number of staff needed
 Provides very fast read rate
 Allows bi-directional data transfer
 Bulk detection
DisAdvantages:
 Tag collision
 Easy to jam or interrupt
 Easy to hack into and get data
 Intial cost of RFID system is expensive
Uses:
1. Tracking of Stock
2. Passports
3. Vehicles
7. Contactless credit/debit cards
8. Near Field Communication (NFC)
9. Biometric recognition systems:
 Retina & Iris Recognition
 Voice recognition
 Face recognition
 Hand/Fingerprint Recognition

P a g e | 36
6.11
Global positioning systems (GPS): are used to determine the exact location of
cars/ships/planes/etc.
Advantages:
 No use of paper maps
 Remove errors
 Estimate time of travel
 Possible to find fast route
 Can give useful information, like location of gas stations
DisAdvantages:
 Needs maps to be up to date for correct instructions
 Road closures can lead to problems in system
 If incorrect start-pont or end-point is entered, system will give incorrect info
Geographic information system (GIS): is a computer system that allows us to map,
model, query and analyse large amounts of data according to their location

Advantages:
 Allows u to mix and match different types of maps and data so u can see how
they relate to each others in terms of locations or theme
 Allows exploration of large amount of data
 Allows data to be intergrated from a wide range of very different sources
DisAdvantages:
 Learning curve can take so long
 Very expensive
 GIS requires large and huge amount of data as input
 Difficult to make both fast and user-friendly
Media communication Systems: refers to a method of delivering and receiving data/
information using telecommunications.
Advantages:
 Good global coverage
 Cheaper faster and safer

P a g e | 37
 High bandwitdth
 Easy to expand the network
 Security is very good as the data is coded
 Easy to move stations on the ground from one place to another
 Well suited for broadcasting
 Satellites receivers can be portable
DisAdvantages:
 Time delay in receipment of signals
 Signal received can be affected by bad weather
 Sun spot can affect the satellite prefotmance
 If they r not in a fixed position, they will need to be monitored and controlled to
ensure they remain in correct orbit.

Chapter 7 (5 Pages)
System Life Cycle:
Analysis  Design  Development/Testing  Implementation  Documentation 
Evaluation
Analysis:
The 4 methods of Analysis:
 Observation
 Questionnaires
 Interviews
 Looking at existing documents
Observation: Watching people using the system to know how it works
Advantages:

P a g e | 38
 Obtains reliable data
 Possible to get better overall view
 Inexpensive
 All inputs and outputs are seen
DisAdvantages:
 People can be uncomfortable being watched
 They may not do tasks while being watched
Interviews: Involves one-to-one questions to the user
Advantages:
 Motivate the interviewee to be open
 Allows the interviewer to get more feedback
 Possible to modify the questions for the interviewee
 Analyist can watch body language
DisAdvantages:
 Time consuming
 Expensive
 Interviewee cannot be annonymus
 Interviewee can give answers based on what the interviewer wanna hear
 Interviewees might not be available all the time
Questionnaires: Distribute questionnaires to the workforce and find out their view
about the system.
Advantages:
 Questions can be asked quickly
 Inexpensive
 Individuals can remain annonymus
 Allows for quick analyst of data
 Interviewees can fill it in their own free time
 Allows greater number of people to take place
DisAdvantages:
 Number of returned questionnaire can be low
 Not possible to ask a follow up question
 No way to clarify the reason behind the answer

P a g e | 39
 Users tend to exaggerate their answers as they are hidden
 Interviewees might not take it seriously
Analyst can use data flow diagram.

What
 What inputs takes place from the customer
 What outputs are produced
 What processing is done
 What storage is needed
User Requirements: Its written by the analyst with few techinal information to make
the user understand the analyst what it proposes.
Information Requirements: Info needed to support the business, about what the data is
and when the timing.
System Specification: The DFD and other information gathering processes allow the
analysis team to identify what hardware and software is needed to run the new system.

Design:
Data types and formats:
 Alphanumeric (A345FF)

P a g e | 40
 Character (X or D or A)
 Text (example_of_text)
 Boolean (Y or N)
 Numeric (12)
 Integer (234)
 Decimal (25.89)
 Currency ($129)
 Date/time (1/1/2023 or 9:56 AM)
Validation Types:
Range Check: Checks if data lies between upper and lower values (10-50)
Type/Character: Checks if the data is typed in correct type (Letters not numbers)
Length: Check if data contains the required amount of characters (password 8
characters)
Format: Checks if data was in correct format (dd/mmm/yyyy)
Presence: Checks if field was not left empty
Check Digit: Checks if there was an extra digit added
Input Formats (Data capture forms): used to input data into the computer and ensures
its in correct format. Either paper based or electronic based
Output Formats (Screen & Report Layouts): Part of any user interface which will be
done

Development & Testing: It is necessary to create the system and


fully test it.
Testing Design: How system will be tested
 Data structures: test all data in correct format.
 File Structures: test all file structures functions correctly.
 Input Format: How we can test that data is entered correctly to
system.
 Output Formats: How we can test the screen and reports
outputs are in correct format.
 Validation Rules: Test if all validation rules are working.

P a g e | 41
Type of data:
 Normal: Data is within the range
 Extreme: data is at the limits of the range
 Abnormal: Data is outside the limits of the range

Implementation:
Methods:
Direct: Old system is stopped and new system is introduced immediately
Advantages & DisAdvanatges:
o It can be disastrous if the new system failed
o Benefits are immediate
o Costs are reduced
Parallel: The old and new systems are running side by side
Advantages & DisAdvanatges:
o If new system failed, the old system is still running
o Possibily to gradually train staff
o More expensive than direct method
o More time consuming
Pilot: The new system is introduced in a part, to make sure its working, then
introduced to the rest
Advantages & DisAdvanatges:
o If new system failed, only one part is affected
o Possible to train staff in one area
o Costs less than parallel
Phased: Only a part of the new system is introduced.
Advantages & DisAdvanatges:
o If the new system latest part failed, It can be easy to check where the error
is
o More expensive than direct
o Very time consuming
o Possible to ensure the system is working properly

P a g e | 42
Documentation:
Technical Documentation: is designed to help programmers/analysts to make
improvements to the system or repair/maintain the system.
User Documentation: Designed to help the users to learn how to use the system.

Evaluation: Once a system is up and running it is necessary to do some evaluation and


carry out any maintenance if necessary.

Chapter 8 (4 Pages)
8.1
Physical safety: is concerned with the dangers that could lead to serious injuries or even
loss of life.
 Electrocution
 Fire Hazard
 Tripping hazard
 Personal Injury

8.2
Data Protection Act (DPA): This is legislation designed to protect individuals and to
prevent incorrect or inaccurate data being stored.

P a g e | 43
Personal Data: Refers to any data of a living person who can be identified from the data
itself.
E-Safety: to be the safe and responsible use of technology.

How to be safe in:


Internet:
 Make sure websites use https not http
 Only purchase items from secure websites
 Make sure the device is set to safe search when using search engine
 Be careful what and from where u download it
 Always remember to log out of sites when u finish using them
Sending & Receiving Emails:
 Open emails from known sources only
 Make sure your internet service provide has an effective email filtering
 Only reply to emails if you know the person who sent it
 Check email address to make sure its trusted not fake

Social Media:
 Do not publicly post stuff giving ur public information
 Do not send photos of urself to people u don’t know
 Always make sure u use private settings when u post pictures
 Important to make sure ur photos u post doesn’t link you to a place or address

Online Gaming:
 Predators and cyberbullying
 Use of webcams
 Voice masking technology
 Cyber attacks

8.3
Data Threats:
 Hacking

P a g e | 44
 Phishing
 Vishing
 Smishing
 Viruses
 Malware
 Card fraud
 Pharming
Phishing: The creator sends a legitment looking email to fool the user. Once user clicks
on the email he gets redirected to fake site, where he types his important personal login
credintals.
Smishing: SMS messages, to send out fake text messages. It is very similar to phishing.
Vishing: Another variation of phising is voice mail phising called vishing.
Pharming: A malicious code installed on the user’s computer, the code will always direct
user to fake sites.
Malware: One of biggest risks of breach to security of data on a computer system.

Its types:
 Worms
 Viruses
 Ransomware
 Adware
 Trojan horse
 Key loggers
Viruses: Program which replicated itself of intention of deleting or courrpting files
causing computer to malfunction.
Worms: Can self-replicate. Their intention is to spread to other computers and corrupt
whole networks.
Trojan horse: Is a malicious program which is often disguised as some legitimate
software, but contains malicious instructions embedded within it.
Key Logging Software: It gathers information by monitoring a user’s keyboard activities
carried out on their computer.
Adware: At its least dangerous, it will attempt to flood user with unwanted advertising.

P a g e | 45
Ransomware: Are programs that encrypt data on a user’s computer and ‘hold the data
hostage’.
Card Fraud: Illegal use of credit/debit card.
Shoulder Surfing: Data theft, which stands behind you while you enter your information
for example on an ATM.
Card Cloning: Is the copying of a credit or debit card which uses a magnetic stripe.
Authentication: Used to verify the data is coming from secure & trusted source.
Biometrics: Relies on unique characteristic of human being such as finger print or retina
scans.
Fingerprint scans: Images of fingerprints are compared against previously scanned
fingerprints stored in a database.
Face Recognition: Is used to identify somebody by their facial features.
Digital certificate: is a pair of files stored on a user’s computer – these are used to
ensure the security of data sent over the internet.
Secure sockets layer (SSL): is a type of protocol that allows data to be sent and received
securely over the internet.
Encryption: uses a secret key that has the capability of altering the characters in a
message.
Firewall: will help to keep potentially destructive forces away from a user’s computer,
by filtering incoming and outgoing network traffic.
Two-factor authentication: is a form of verification which requires two methods of
authentication to verify who a user is.

P a g e | 46
Chapter 9 (2 Pages)
9.1
You need to consider these factors when presenting to audience:
 Age
 Experience of the audience
 Expectations of the audience
 Knowledge of the audience
Key Factors when writing a presentation includes:
 Language used
 Need for multimedia
 Length of the presentation
 Need for audience participation
 Examples to illustrate/explain certain points
Audience Characteristics:
 Age range
 Income levels
 Interests
 Disabilities
Young Children Needs:
 Bright and cheerful colours
 Animation & Sound
 More pictures than text
 Large fonts & Simple Short Words
 Inlcude games if possible
 Must be an easy to use interface
Adults & Older Childreen Needs:

P a g e | 47
 Attractive display
 Intresting content
 Good mixture of text & images
 Use appropriate language levels
 Use bullet points to make content easier
Older People Needs:
 Different colors
 Large font size
 Easy to use interface
 Display is consistent from page to page
 Don’t use too much technical language

9.2
Software is protected by copyright.
So its illegal to:
 Make a software copy then sell it
 Use software on multiple computers
 Use coding from the software to ur own software
 Rent out the software package without permission
 Use the name of the software on another software without agreement to do so
Software piracy: is the illegal copying of software.
How to protect the software:
 Using product key activation
 If its in hard copy, use a form of hologram indicating it’s a real copy
 It will only run if the CD, DVD, or memory stick is in the drive
 It will run if a dongle was plugged into one of the usb ports

P a g e | 48
Chapter 10 (5 Pages)
10.1
Legislation: laws to protect people against the misuse of emails.
 Requires senders to obtain “opt-in”
 Emails are not sent out with false subject lines
 Valid postal address
 Many countries doesn’t allow companies to keep the customer’s emails
 Companies must make their privacy policy very clear to subscribers

P a g e | 49
 They must provide subscribers a clear way to unsubscribe
 Company must have a clear way to “opt-out”
Acceptable Language: The language used by people when writing emails should follow
an acceptable code of practice.
Guidelines set by an employer: Company publishes guidelines for their employees they
have to follow when using emails or other electronic communications.
Copyrights & security of emails: Just because it is relatively easy to forward an email
does not mean it is always legal to do so.
Methods to increase security of emails:
 Strong passwords
 Change passwords on regular basis
 Using spam filters
 Running anti-virus/spam on ur computer regularly
Passive Attacks: release of email materials without your consent
Active Attacks: Involves modification of your messages / involves viruses or phishing
attacks.
Netiquette: Internet Etiquette.

Like:
 Do not be abusive
 Do not send spam
 Be clear with your message
 Always check your spelling/grammer
 Respect people privacies
Email groups:
 Carbon Copies (CC)
 Blind carbon copies (BCC)
 Forwards
 Attachments

P a g e | 50
CC: Used to send a copy of an email to one or more recipients without them being the
primary recipients
BCC: allows you to send an email to multiple recipients without revealing their email
addresses to each other.
Spams:
 Wastes people’s time
 Annoys people
 Used up valuable bandwidth on internet
 Can be virus attached
 Clog up user’s inboxes

10.2
Internet is actually a concept rather than something tangible, WWW is only a part of
the internet where user can access using web browser software.
Internet:
 User can send/Receive emails
 Allows online chatting
 Makes use of transimission protocols and IP
 Worldwide collection of interconnected networks and devices
World Wide Web(WWW):
 Collection of multimedia web pages
 Uses Https protocls
 Uniform resource locators (URLs) are used to specify web pages locations
 Web recourse are accessed by web browsers
 WWW uses internet to access information from web servers
Intranet: An intranet is a private computer network that operates within an
organization or company, allowing employees to share information, collaborate, and
access resources such as documents and databases privately/securely.
Extranets: Part of intranet that allows it to be extended outside the organization.
Difference between Internet & Intranet:

P a g e | 51
 Internet comes from InterConnected Network
 Intranet comes from Internal Restricted Access Network
 Intranet gives local information to an organization, internet covers everything
 Possible to block sites using intranet, in internet its difficult
 Intranet requires a password and user ID and can only be accessed from agreed
points/devices
 Intranet is behind a firewall which gives some protection
 Information used in intranet is stored on local servers
Blogs: are personal internet journals where the writer (blogger) will type in their
observations on a topic.
Microblogs: are similar to blogs, but are most often used on social networking sites to
make short, frequent posts.
Wikis: are web applications or websites that allow any user to create and edit their web
pages using any web browser.
Social networking: sites focus on building online communities of users who share the
same interests and activities.
Moderated forum: refers to an online discussion forum in which all the posts are
checked by an administrator before they are allowed to be posted.
Unmoderated forums: Online discussion forum which all the posts are not checked.
Internet service provider (ISP): is a company that provides users with access to the
internet.
Web browser: is software that allows a user to display a web page on their computer
screen.
(protocol://website address/path/filename)
Protocols:
 Http or Https
Website address:
 Domain host
 Domain name
 Domain type
 Sometimes a country code

P a g e | 52
Path: Web page
File name: item on the web page
Search engines: are useful if you do not know the URL of the website, or if you want to
find some information but do not know where to look.
Advantages of using internet to find information:
 Tends to be up to date
 Has huge amount of nearly unlimited information
 Fast and easy
 No need to travel or go to libraries to find the info
 Pages on the internet can have multimedia elements
DisAdvantges:
 Info can be biased or incorrect
 Always risk of accessing inappropriate sites
 Easy to be distracted
 Risk of information overload
 Due to ease of copying content, there is risk of plagiarism
 Some research skills are lost

1. Verify the legitimacy of who wrote it


2. Check the info is it factually correct
3. Is the article objective? Biased?
4. Is the information dates?
5. Does the article cover all aspects?
6. Does the website look legitimate
Protocols: are sets of rules agreed by the ‘sender’ and ‘recipient’ when data is being
transferred between devices.
Hypertext transfer protocol (HTTP): is a set of rules that must be obeyed when
transferring website data across the internet.

File transfer protocol (FTP): is a network protocol used when transferring files from one
computer to another computer over the internet.

P a g e | 53
Secure Sockets Layer (SSL): is a protocol that allows data to be sent and received
securely over the internet.

P a g e | 54
P a g e | 55

You might also like