My Notes
My Notes
1.1
Hardware: is the general term for the physical components that make up a typical
computer system.
Consists of: Internal & External
Software: is the general term used for the programs that control the computer system
and process data
Consists of: Application & System
Applications software: provides the services that the user requires to solve a given task
Word processing
Spreadsheet
Database
System software: is the software designed to provide a platform on which all other
software can run.
Operating System
Linkers
Device Drivers
Analogue Data: Data which is variable/continuous
Digital Data: Data which is discrete or 1,0
Computers doesn’t understand analogue data, so they need analogue to digital
converter (ADC) to be able to understand
1.2
Main Components of computer system consists of:
Input devices
Output devices
Page |1
Secondary storage devices
Central processing unit (CPU): Part of computer that executes commands from
computer hardware and software.
CPU/Microprocessor: is made up of control unit, which controls input and output
devices.
Random Access Memory (RAM): is an internal chip where data is stored on it
temporarily.
Read Only Memory (ROM): Is memory used to store information which needs to be
permenant.
CMOS: Complemntary Metal oxide semiconductory (Batter Powered).
1.2
Backing Storage consists of:
Hard Disk Drive (HDD)
Solid State Drive (SSD)
Page |2
1.3
Operating Systems (OS): Allows the computer systems to function, and the user to
communicate with the computer systems.
1.4
Desktop: computer that is made up of separate monitor, keyboard, mouse and
processor unit.
Page |3
Laptop: Computer where the monitor, keyboard, pointing device and processor are all
together in one single unit.
SmartPhones: allow normal phone calls to be made, but also have an operating system
allowing them to run a number of computer applications.
Tablets: They work in a similar way to a smartphone. Tablets use touch screen
technology and do not have a conventional keyboard. The keyboard is virtual.
Advantage of desktops over Laptops:
Easier, less expensive to buy and upgrade
Tend to have better specifications
Power consumption is not a problem as it is always conntected to a power supply
Less likely to be damaged or stolen
Internet access is more stable as it is wired.
DisAdvantage of desktops over Laptops:
They are not portable
More complicated components
To send files, u have to copy files on a usb stick
Advantage of Laptops over Desktops:
Portability
Full advantage of wifi
Everything is built in a single unit so no trip over wires
Less space on desk
They can link to any multimedia system
DisAdvantage of Laptops over Desktops:
Easier to steal
Limited battery life
Keyboard and pointing device can be awkward to use
Not always possible to upgrade them and can be expensive
Advantags of Smarthphones:
Small and lightweight
U can use them to make phone calls
They can be used almost anywhere due to their portability and wifi
Reasonable battery life
Page |4
DisAdvantages of SmartPhones:
Small screen and keyboard
Slower and difficult when typing things
Searching and taking photos can drain batterly life
Memory size is small
Not all websites are compatible with smartphones
Much easier to lose or get stolen
Mobile network data can sometimes be slow in transferring data.
Advantags of tablets compared to laptops:
Fast to switch on
Fully portable
Touch screen technology
Doesn’t produce much heat
Battery life is longer
When power button is pressed it goes on standby but remains connected to
internet.
DisAdvantages of tablets compared to laptops
Tend to be expensive
Limited storage
Typing on the touch screen can be slow and difficult
Laptops support more file formats
1.5
Artificial Intelligence (AI): is a machine or application which carries out a task that
requires some degree of intelligence.
Negative impacts of AI:
More dependency on AI technology
Lead to higher unemployment
Loss of skills
Extended reality (XR): refers to real and virtual combined environments.
Examples:
Augmented Reality
Page |5
Virtual Reality
Mixed Reality
Page |6
Advantages of Keyboards:
Fast Entry method
Well known method
Easy to use
Easier to do data verification checks
DisAdvantags of Keyboards:
Can be difficult to use if the user have limited wrist use
Slow method
Uses a lot of desk space
Numeric keypad: is used to enter numbers only, used in ATMs, and POS
Advantages:
Faster than keyboards in entering numeric data
They are small in size
DisAdvantages:
Small keys, difficult to input
The orders of the numbers can be confusing
Mouse: user controls the position of a pointer on the screen by moving the mouse
around.
Advantages:
Fast method for choosing options
Very quick navigation
Does not need large desk area
DisAdvantages:
Can be difficult for people with restricted wrist movement
Easy to be damaged
Difficult to use on non-flat surfaces
Touchpad: The pointer is controlled by the user moving their finger on the touchpad
Advantages:
Same as mouse in fastesness
No need to buy a separated mouse
Page |7
DisAdvantages:
Can be difficult for people with restricted wrist movement
Can be more difficult to control the pointer
Difficult to use when doing certain operations like: drag and drop
Remote Control: is used for the operation of other devices using infrared signals.
Advantages:
Can be controlled from any reasonable distance unlike wired mouse for example
DisAdvantages:
Can be difficult for people with restricted wrist movement
Easier to block to signal
JoySticks: By gripping the stick, a pointer on the screen can be controlled. Buttons on
side used for selection.
Advantages:
Easier than keyboard to navigate screen
Control is more realistic in some applications
DisAdvantages:
Difficult to control the screen pointer
Scanners: are used to enter information from hard copy into a computer.
Advantages:
Images can be stored to be edited later
Using OCR, can be more accurate
possible to recover damaged documents and photographs by scanning and then
using appropriate software to produce an acceptable copy.
DisAdvantages:
Quality can be limited
Very slow at scanning
Digital Camera Advantages:
Easier to produce high quality photos
Easier and faster to upload photos to computer
Page |8
Memory card can story thousands of photos
DisAdvantages:
Understandment on how computer works needs to be there for transferring of
files
Some artisity might be lost due to correction of smart softwares
Images often needs to be compressed to reduce memory used size
Advantages of Microphones:
Faster to type in text using voice than keyboard
Improves safety
DisAdvantages:
Can use a lot of memory
Voice recognition softwares are not accurate as typing in
Sensors: A sensor is a device that inputs data to a computer; the data is a measurement
of some physical quantity that is continuously changing.
Type of Sensors:.
Temperature
Humidity
Pressure
Motion
Light
PH
Sound
Advantages:
More accurate readings
Readings are continues, non-stop
Systems can easily be automatic
DisAdvantages:
Any problem in the sensors will give wrong results
Page |9
Most sensors are analogue, therefore (ADC) needs to be used
2.2
Contactless Debit Card Readers: allow customers to pay for items worth up to a certain
amount of money without entering their PIN.
Advantages:
Faster transaction
Uses 128-bit encryption, so more secure
Do not have to worry about pin typing errors
Retailers have no longer access to customer’s cards information
DisAdvantages:
More expensive than debit/credit cards
A thief with a suitable reader could monitor your contactless card transaction
while standing at the counter with you.
Can take money twice
P a g e | 10
Transcations are usually limited to certain amount of money
Radio frequency identification (RFID): readers use radio waves to read and capture
information stored on a tag.
Advantages:
Tag can be read from a distance
Very robust and reliable
Very fast read rate
Bulk detection is possible
Bidirectional data transfer
DisAdvantages:
Tag collision
Easier to jam or interrupt
Easy to hack into data transmitied by tag
More expensive
Optical mark recognition (OMR): is a device which can read marks written in pen or
pencil on a form.
Optical character recognition (OCR): is the name given to a device that converts the
text on hard copy documents into an electronic form.
Barcode readers: are used to read information in the form of a bar code.
Quick response (QR): This is made up of a matrix of filled-in dark squares on a light
background.
2.3
Cathode ray tube (CRT) monitors: are the least expensive type of monitor, although
they are becoming increasingly rare as LCD monitors are now taking over.
Advantages:
Seen in wider range angles
They allow the use of light pen
P a g e | 11
DisAdvantages:
They are heavy
They can become very hot and cause fire
They consume more power than LCD
They can flicker, which can cause headaches
Advantages of LCD Screens:
Low power usage
Lightweight
Doesn’t suffer from image burn in
Screens can be in different sizes
Do not suffer from flickering image
High image resolution
Produces low electromagnetic field
DisAdvantages:
Colors and constrants can be bad from various angels
Motion Blur
Lower contrast
Might have weak or stuck pixels
May not uniformly illuminated from the back light
Printers Type:
Laser Printers: produce very high-quality hard copy output. The print rate per page is
very quick if a large number of pages are being printed.
Advantages:
Printing fast
Handle very large job prints
Quality is constantly high
Tone cardige lasts for a long time
DisAdvantages:
Only fast if several copies were being made
Color of laser printer tends to be more expensive
They harm the ozone and organic environment
P a g e | 12
Inkjet printers: Are used to produce good-quality hard copies.
Advantages:
High quality output
Cheaper to buy than laser printer
Very lightweight
Do not produce ozonic or organic harmful stuff
DisAdvantages:
Slow output for several copies were being made
Cannot do large print jobs
Can be expensive if used a lot
Dot matrix printers: Are a type of impact printer where a print head presses against an
inked ribbon.
Advantages:
Can be used in enivorments which are harmful or dirty
Carbon copies can be produced
Very cheap to run and maintain
Easy to use
DisAdvantages:
Very noisy
Costs more than inkjet printer initially
Very slow
A (Graph) Plotter: Instead of toner or ink cartridges, plotters use a pen, pencil or marker
pen to draw multiple continuous lines, rather than a series of dots like a printer.
Advantages:
Very high quality output
Able to produce large drawings at high accuracy
Able to print on variety of materials
DisAdvantages:
Very slow
Expensive
Have large physical footprint
P a g e | 13
3D Printers: can produce solid objects that actually work. The solid object is built up
layer by layer.
Advantages:
Manafacture of items became more easy
Allows rapid prototypes as it prints quickly
It costs less when compared to labor costs and other costs involved
It benefits medically
Parts for machinery that are no longer made could now be manufactured using
3D printers.
DisAdvantages:
Can make copyright items
Can lead to dangerous and illegal activity
Potential for job loses
Chapter 3 (~ Pages)
3.1
Magnetic tape: is a very thin strip of plastic which is coated in a magnetic layer (iron
oxide). They are read from or written to by a read/write head in a magnetic tape storage
device.
Advantages:
Less expensive than HDD
Very robust techonology
Huge data capacity
The data transfer is actually fast
DisAdvantages:
Very slow data access time
When updating, another tape is needed to store final update version
They r affected by magnetic fields
P a g e | 14
Hard disk drives (HDD): are still one of the most common methods used to store data
on a computer. Data is stored in a digital format on the magnetic surfaces of the hard
disks
Advantages:
Very fast data transfer and access
Very large memory
DisAdvantages:
It can be easily damaged
They have many moving parts
It can be little noisy
Portable hard disk drives: are essentially HDDs external to the computer and can be
connected to the computer using one of the USB ports.
Advantages:
Data access and transfer time is fast
Large memory capacity
They can be used to transfer files between computers
DisAdvantages:
They can be easily damaged if fallen for example
Less data transfer and access time than fixed HDD
3.2
Advantages of CD-R and DVD-R:
Cheaper medium than RW disks.
Once burned (and finalised) they behave like a ROM.
Disadvantages of CD-R and DVD-R:
Can only be recorded once
Not all CD/DVD players can read CD-R/DVD-R.
Advantages of CD-RW/DVD-RW:
Can be written over many times.
P a g e | 15
Can use different file formats each time it is used.
Not as wasteful as R format because the files/data can be added at a later
Disadvantages of CD-RW/DVD-RW
Can be relatively expensive media.
Possible to accidentally overwrite data.
Advantages of CD-ROM/DVD-ROM
They are less expensive than hard disk drive systems.
Disadvantages of CD-ROM/DVD-ROM
The data transfer rate/data access time is slower than for hard disks.
P a g e | 16
Chapter 4 (3 Pages)
4.1
Network interface card (NIC): Allows a device to connect to a network.
Media access control (MAC) address: is a number which uniquely identifies a device
when it is connected to a network.
Whenever a computer connects to the internet it is given an internet protocol (IP)
address.
Data is moved around networks in the form of data packets.
Hubs: are hardware devices that can have a number of other devices connected to
them. They are used primarily to connect devices together to form a local area network
(LAN).
Switch: It stores the MAC addresses of all devices on the network. Each port on the
switch connected to a device will have a matching MAC address.
Bridges: are devices that connect one LAN to another LAN that uses the same protocol.
Routers: are used to route data packets from one network to another network, based
on IP addresses.
Both Wi-Fi and Bluetooth offer wireless communication between devices. They both
use electromagnetic radiation as the carrier of data transmission.
Cloud computing: is a method of data storage where data is stored on remote servers.
Advantages of cloud computing (storage):
P a g e | 17
Data can be accessed anytime from any device
There is no need to carry an external device with u
Remote backup data in case of data loss
Allowing recovery of data
Offer almost unlimited storage free of price
Disadvantages of cloud computing (storage)
Security might be hacked
Slow or unstable internet can cause too much time of data acess
High costs for high storage or high download
Possible risk of failure and loss of data
Local area networks (LANs): are usually people within one building or geographically
near each other. A typical LAN will consist of a number of computers and devices which
will be connected to hubs or switches.
Wireless LANs (WLANs): are similar to LANs, but there are no wires or cables.
Wide area networks (WANs): are used where computers or networks are situated a
long distance from each other geographically.
4.2
Other types of authentication:
zero login
biometrics
magnetic stripes
smart cards
physical tokens
electronic tokens
Advantages of magnetic stripe cards
They are easy to use.
It is not an expensive technology.
Magnetic cards can be remotely deactivated (if lost or stolen).
The cards can be multi-purpose (for example, door key cards, network access)
cards are used in vending machines to buy food or drink.
P a g e | 18
Disadvantages of magnetic stripe cards
Less secure than, for example, biometric methods (no encryption)
the stripe contents can be copied fairly easily.
The cards wear out with a lot of use.
Magnetic readers often fail to read the cards on first attempt.
Smart Cards: By inserting a tag (chip and antenna) into a security card, it can act as a
smart contactless card
Physical token: is a form of authentication in the form of a physical, solid object.
Video conferencing: is a communication method that uses both video and sound.
Advantages:
Easier to access documents
Hold meetings in short period of times
Reduces costs as no traveling
Better for the environment
Connects people from the organization without being left out
DisAdvantages:
Time loss, as lag in response or video
Images quality can be lower
Very expensive to set up in first place
Time zone difference
Demotivating stuff, as maybe one of their job perks is travelling
The whole system relies on good network
Audio conferencing: refers to meetings held between people using audio (sound)
equipment.
Web conferencing: uses the internet to permit conferencing to take place.
P a g e | 19
Chapter 5 (4 Pages)
5.1
Advantages Of MicroProc mneesed-Devices on Our lifes:
No longer need to do manual tasks
Give people more time to do activities
No longer need to stay at home while cooking or washing cloth
Gives people sense of security
Smart fridges can lead to more healthier lifestyle
DisAdvantages:
Lead to unhealthy lifestyle, for wrong use
Tend to make people more lazy
Potential of losing household skills
Risk of cyber security threats.
Data Security Issues: As people can communicate remotely to their home, therefore a
hacker. Which can allow a hacker to gain all personal information.
Positive Effects of Social Interactions:
Easy to make new friends
Easier to find people with same interests
Less expensive to keep in touch
Negative Effects of Social Interactions:
People do not meet face to face
Lack of social interactions can make people more anxious
People behave differently when communicating online
How to control transports?
monitoring of traffic on motorways
congestion zone monitoring
automatic number plate recognition (ANPR)
automatic control of traffic lights
P a g e | 20
air traffic control systems
railway signalling systems
Smart Motorways: Monitoring and control of the traffic and/or the information
displayed on the motorway signs is controlled by a central computer system.
Advantages:
Reduces traffic jam and everyone’s journey time
Became more efficient
Traffic offenses can now be punished by ANPR
Stolen cars can also be spotted by ANPR
Reduces/Minimises human error
DisAdvantages:
Hacker can gain access to the system and cause distruption
If the system fails, the transport system will be standstill
ANPR means even innocent people’s movement will be tracked
Compromised safety due to poorly designed system
Autonomous Vehicles & How They Work: Cars/airplanes which are controlled/moved
robotcally.. Meaning they are controlled by a microprocessor which receives info from
the cameras, sensors, and compare it with preset values, and then take actions based
on the values.
Advantages:
Human error is removed
Better for the environment
Reducing traffic problems
Increases lane capacity
Reduces travel time
Auto Parking technology
DisAdvantages:
Very expensive system
Fear of hacking into the system
Security and safety issues
Need to make sure the systems are well maintained
Need to accept the idea of the new technology
P a g e | 21
Lead to unemployment as less taxis will be there
LiDaR (Light Detection and Ranging): uses lasers which build up a 3D image of the
surroundings.
5.2
Health Risks:
P a g e | 22
Back Neck Pain: Caused by sitting in front of computer screen for too long.
Ways to solve it:
Correct posture
Use foot rests
Use adjustable screens and set for right height
Repetitive Strain Injury (RSI): Damage to wrists and fingers due to sitting too long on a
keyboard or mouse.
Ways to solve it:
Ensure correct posture
Wrist correct adjustable when using keyboard/mouse
Take breaks
Use voice activated software
Use ergonomic Keyboards/Mouse
Eyestrain: Caused by looking at a computer screen for too long.
Ways to solve it:
Change from CRT to LCD
Take breaks
Use anti-glare screens
Get their eyes tested on regular basis at a doctor
Headaches: Caused by incorrect lighting, screen reflections, flickering screens, and so
on.
P a g e | 23
Chapter 6 (14 Pages)
6.1
Communication systems that uses ICT:
Newsletter/Posters
Media streams
Websites
Multimedia presentations
E-Publications
P a g e | 24
Newsletters and posters: Can be produced very easily using word processor.
Newsletters: Is a very useful method for getting important information to a target
group.
Posters: Are a good way of publicising, for example, a sporting event or an
advertisement for a forthcoming movie.
Websites: A company can develop their own websites and then adevertise on it rather
than using Posters/Newsletters.
Advantages:
Sound/Video/Animation can be added
Links to other pages can be added
Buttons to navigate around
It allows the owner to see how many people visited the website
Can be seen by global audience
Cannot be thrown away
Much easier to update the website anytime
DisAdvantages:
Can be hacked and modified
Risk of pharming
Customer should have a computer and internet access
It is not as portable as a paper-based system
Possible for customers to go to wrong websites, leading to distrust.
More difficult to target a specific group
Need to find a way for people to find their websites
Multimedia Presentation: Presentations that use animation, video and sound or music
are generally much more interesting than presentations done on slides or paper.
Advantages:
Sound/Video/Animation can be added
Possible to have interactive hyperlinks
Use of transition effects
P a g e | 25
More flexible
DisAdvantages:
Expensive, as needs to have special equipment
Danger the equipment might fall
There might be the need of internet access
Focus might be on the medium not the message
Very easy to make bad presentations
Media streaming: is when users watch movies/videos or listen to music on devices
connected to the internet.
Buffering: makes sure the video plays back smoothly without freezing.
E-Publications: Most material which is published on paper is also available in an
electronic format.
Mobile phones communication: using towers inside many cells networked together to
cover large areas.
SIM (subscriber identity module) card: allow mobile phones to connect to the mobile
phone cellular network.
SMS or text messaging: Allows a very quick way of communicating with another person
by typing on a keyboard.
Voice over Internet Protocol (VoIP): is a method used to talk to people using the
internet.
Internet Access: Any mobile device can connect to the internet either using a wireless broadband
connection or via the mobile phone network.
Advantages:
Less Expensive
Lower power consumption
Quality of service
6.2
Simulation: Is the creation of a model of a real system in order to study the behavior of the system.
Advantages of a model:
P a g e | 26
Less expensive than building it
Safer to use
Try out various different scenarios
Faster
DisAdvantages:
A model is only as good as the programming or the data entered
Costly option
People interactions may not be positive
Bridge: When an engineer or architect designs a new building or bridge, it is necessary
to test the design long before any construction work is started.
Features of computer modelling:
Possibility of zooming
Design can be rotated
Allows to detect any flaw in the design before being build
Various scenarios can be tested on the design
Flood water management: uses computer modelling to perform a risk assessment to
identify sources of potential flooding.
How can a simulation be carried out?
Data is entered into the computer and the computer model is run. Once the designers are
satisfied that the model simulates the real situation, they start testing out various different
scenarios.
6.3
Robotics in manufacturing: Robots are used in many areas of manufacturing, from heavy
work right through to delicate operations.
Advantages:
They can work in harmful environments
They work 24/7
Less expensive in long-term
Higher productivity
Great consistency
They can do boring and repetitive tasks
P a g e | 27
DisAdvantages:
Difficult to do unusual tasks
Cause higher unemployment
Risk of skills being lost
Factories can be moved anywehere in the world causing unemployment
Inital set-up and maintenance is expensive
6.4
Tasks needs to be done by school:
registration and attendance records of students
student performance
computer-aided learning
How to make Registration and attendance records of students automated?
Method1:
Method2:
Each student would have their fingerprints recorded.
Their personal details (as in Method 1) plus fingerprints would be stored on a database.
When a student entered the school premises, they would be asked to put their hand on a scanner which
would read their fingerprints.
P a g e | 28
Advantage of using method 2 than method 1:
Fingerprints are unique
ID cards can be lost
ID cards can be affected by magnetic field
It is much easier to clone the ID card
DisAdvantages:
Long time to collect all fingerprints of students
More expensive than using method 1
If a student have their finger injured, it might not be read
Invasion of privacy issues
Computer Aided learning (CAL): Students would use computers as part of their learning
and complete online tests to monitor their performance.
Advantages:
Students can learn where and when they want to
It allows VR to be used
Students can stop at any point and continue where they were left at
Its possible to take retests
More interactive learning
Makes use of various multimedia
Its not for replacing teachers role, but to help and stimulate learning
Can use MCQs, which can be marked immediately by the system
Micro learning, dividing big topics to small parts
DisAdvantages:
Expensive and time consuming
Students can easily be distracted online
It can lead to student isolation and no team work
CAL cannot answer unusual questions
6.5
P a g e | 29
Online booking systems: rely on the ability to update files immediately, thus preventing
double-booking, which could happen if the system response time was slow.
Advantages:
Prevents double booking
Immediate feedback about availability of seats/rooms
Booking can happen anytime in the day
Inform customers on email about offers
DisAdvantages:
Initial setting up and maintenance is expensive
Customers needs access to computer/device & internet
Its difficult to canc el the booking and get your money back
System breaks down if server is down for maintenance
If the website is badly designed, it will be difficult to book
Booking online wont allow the business to build a customer relationship
6.6
Banking Applications: The use of computer technology has revolutionised how we all do
our banking transactions.
Types:
the use of automatic teller machines (ATMs)
electronic funds transfer (EFT)
credit/debit card transactions
cheque clearing
internet banking
Advantalges Of ATMs:
Possible to withdraw cash anytime
Offer many bank services without going to the bank
Possible to access account anywhere in the world
P a g e | 30
Provides quick service
DisAdvantages:
Often in places where it can be stolen
Card cloning scams
Some banks charge customers for using ATMs
Cash withdrawal limits
If the card is faulty, no transaction will happen
Loss of personal touch
Electronic funds transfer (EFT): is a system that allows money transfer instructions to be sent
directly to a bank’s computer system. No actual money is transferred; the whole system relies on
electronic transfer of money between accounts.
Advantages:
Very secure payment method
Very quick payment method
Less expensive
The customer can dispute their money/ask their money back up to 60 days
DisAdvantages:
Once transaction is made, no return back
Needs to have funds
Fake IDs can be used, and there wont be grauntee receipment
6.7
Patient and pharmacy records: Doctors and hospitals need to keep accurate records of all their
patients. This is essential to ensure correct diagnosis and treatment.
CT (computed tomography): which involves producing images of the internal parts of the body in
a series of thin slices less than 0.1 mm thick.
MRI (magnetic resonance imaging): this uses strong magnetic fields and radio waves to produce
a series of images of the internal organs in the body.
P a g e | 31
Artificial Blood Vessels
Tissue engineering
Customized Medicine
Customized Medicines: 3D printing techniques now allow scientists to customize medicines to suit
the individual.
6.8
Expert System: A smart computer program, designed to copy the know-how of an expert in a
specific area
Advantages:
High level of expertise
High accuracy
Ability to store vast amounts of ideas and facts
Have multiple types of expertise
Offer very fast response
Provide unbiased reports/analaytics data
Indicate probabilities of suggested solutions
DisAdvantages:
Needs trainings to ensure correct use
Set-Up and maintanence are high
Tend to give cold/unapportiate responses
They are only good as the informations entered to them
User can make some dangerous assumption that it cannot be wrong
The expert systems include:
P a g e | 32
User Interface
Explanation system
Inference engine
Knowledge base
How to setup the expert system?
Information is gathered
Its put into the knowledge base of the engine
Rule bases needs to be created
Setting up the inference engine
The user interface needs to be developed
Testing
6.9
point-of-sale (POS): terminals which incorporate a barcode reader to scan the barcode
and retrieve the price of the article.
P a g e | 33
The user takes a photograph of their credit card using the smartphone’s camera.
The details on the card (such as card number and name of bank) are securely sent by the
smartphone manufacturer/mobile wallet company to the bank that issued the card.
The bank replaces the details on the card with a series of randomly generated numbers (called
tokens),
which they send back to the mobile phone manufacturer,
who then programs this random number into the user’s smartphone.
This random number is then the one used for transactions.
Internet banking: requires good online security. It allows the transfer of sums of money
between accounts, payment of bills, and etc.
P a g e | 34
Need to employ more staff in delivery department
Cost of setting up and maintaining the websites
Lead to drop to customer loayality as less customer interactions are there
Robberies will decrease
Banks employ fewer security staff
6.10
1. Optical Mark Recogniton:
Read school registration
Multiple choice questions papers
Advantages:
Fast way inputting results of a survey
More accurate than typing in the data
More accurate than OCR methods
DisAdvantages:
Forms needs to be carefully designed
Problems if not filled correctly
Often only work with black pen or pencil
Limited to the questions on the paper
2. BarCode readers
3. QR Code Readers
4. OCR
5. ANPR: systems are used to read the number plates on cars
Advantages:
Monitor the cars speed
No need to employ car security guards
Faster system
Can easily control the car exit or entry to parks or private roads
Used as security system
Analyse driver behavior
Automatically charge cars/motorist if they enter a congestion zone
P a g e | 35
DisAdvantages:
Lack of manned security, which can lead to crimes
Invasion of privacy issues
Damaged or diry plated will not be recognized
Number plate cloning
6. RFID
Advantages:
Tags can be read from distance
Very robust and reliable technology
Tags are so hard to copy
Reduce number of staff needed
Provides very fast read rate
Allows bi-directional data transfer
Bulk detection
DisAdvantages:
Tag collision
Easy to jam or interrupt
Easy to hack into and get data
Intial cost of RFID system is expensive
Uses:
1. Tracking of Stock
2. Passports
3. Vehicles
7. Contactless credit/debit cards
8. Near Field Communication (NFC)
9. Biometric recognition systems:
Retina & Iris Recognition
Voice recognition
Face recognition
Hand/Fingerprint Recognition
P a g e | 36
6.11
Global positioning systems (GPS): are used to determine the exact location of
cars/ships/planes/etc.
Advantages:
No use of paper maps
Remove errors
Estimate time of travel
Possible to find fast route
Can give useful information, like location of gas stations
DisAdvantages:
Needs maps to be up to date for correct instructions
Road closures can lead to problems in system
If incorrect start-pont or end-point is entered, system will give incorrect info
Geographic information system (GIS): is a computer system that allows us to map,
model, query and analyse large amounts of data according to their location
Advantages:
Allows u to mix and match different types of maps and data so u can see how
they relate to each others in terms of locations or theme
Allows exploration of large amount of data
Allows data to be intergrated from a wide range of very different sources
DisAdvantages:
Learning curve can take so long
Very expensive
GIS requires large and huge amount of data as input
Difficult to make both fast and user-friendly
Media communication Systems: refers to a method of delivering and receiving data/
information using telecommunications.
Advantages:
Good global coverage
Cheaper faster and safer
P a g e | 37
High bandwitdth
Easy to expand the network
Security is very good as the data is coded
Easy to move stations on the ground from one place to another
Well suited for broadcasting
Satellites receivers can be portable
DisAdvantages:
Time delay in receipment of signals
Signal received can be affected by bad weather
Sun spot can affect the satellite prefotmance
If they r not in a fixed position, they will need to be monitored and controlled to
ensure they remain in correct orbit.
Chapter 7 (5 Pages)
System Life Cycle:
Analysis Design Development/Testing Implementation Documentation
Evaluation
Analysis:
The 4 methods of Analysis:
Observation
Questionnaires
Interviews
Looking at existing documents
Observation: Watching people using the system to know how it works
Advantages:
P a g e | 38
Obtains reliable data
Possible to get better overall view
Inexpensive
All inputs and outputs are seen
DisAdvantages:
People can be uncomfortable being watched
They may not do tasks while being watched
Interviews: Involves one-to-one questions to the user
Advantages:
Motivate the interviewee to be open
Allows the interviewer to get more feedback
Possible to modify the questions for the interviewee
Analyist can watch body language
DisAdvantages:
Time consuming
Expensive
Interviewee cannot be annonymus
Interviewee can give answers based on what the interviewer wanna hear
Interviewees might not be available all the time
Questionnaires: Distribute questionnaires to the workforce and find out their view
about the system.
Advantages:
Questions can be asked quickly
Inexpensive
Individuals can remain annonymus
Allows for quick analyst of data
Interviewees can fill it in their own free time
Allows greater number of people to take place
DisAdvantages:
Number of returned questionnaire can be low
Not possible to ask a follow up question
No way to clarify the reason behind the answer
P a g e | 39
Users tend to exaggerate their answers as they are hidden
Interviewees might not take it seriously
Analyst can use data flow diagram.
What
What inputs takes place from the customer
What outputs are produced
What processing is done
What storage is needed
User Requirements: Its written by the analyst with few techinal information to make
the user understand the analyst what it proposes.
Information Requirements: Info needed to support the business, about what the data is
and when the timing.
System Specification: The DFD and other information gathering processes allow the
analysis team to identify what hardware and software is needed to run the new system.
Design:
Data types and formats:
Alphanumeric (A345FF)
P a g e | 40
Character (X or D or A)
Text (example_of_text)
Boolean (Y or N)
Numeric (12)
Integer (234)
Decimal (25.89)
Currency ($129)
Date/time (1/1/2023 or 9:56 AM)
Validation Types:
Range Check: Checks if data lies between upper and lower values (10-50)
Type/Character: Checks if the data is typed in correct type (Letters not numbers)
Length: Check if data contains the required amount of characters (password 8
characters)
Format: Checks if data was in correct format (dd/mmm/yyyy)
Presence: Checks if field was not left empty
Check Digit: Checks if there was an extra digit added
Input Formats (Data capture forms): used to input data into the computer and ensures
its in correct format. Either paper based or electronic based
Output Formats (Screen & Report Layouts): Part of any user interface which will be
done
P a g e | 41
Type of data:
Normal: Data is within the range
Extreme: data is at the limits of the range
Abnormal: Data is outside the limits of the range
Implementation:
Methods:
Direct: Old system is stopped and new system is introduced immediately
Advantages & DisAdvanatges:
o It can be disastrous if the new system failed
o Benefits are immediate
o Costs are reduced
Parallel: The old and new systems are running side by side
Advantages & DisAdvanatges:
o If new system failed, the old system is still running
o Possibily to gradually train staff
o More expensive than direct method
o More time consuming
Pilot: The new system is introduced in a part, to make sure its working, then
introduced to the rest
Advantages & DisAdvanatges:
o If new system failed, only one part is affected
o Possible to train staff in one area
o Costs less than parallel
Phased: Only a part of the new system is introduced.
Advantages & DisAdvanatges:
o If the new system latest part failed, It can be easy to check where the error
is
o More expensive than direct
o Very time consuming
o Possible to ensure the system is working properly
P a g e | 42
Documentation:
Technical Documentation: is designed to help programmers/analysts to make
improvements to the system or repair/maintain the system.
User Documentation: Designed to help the users to learn how to use the system.
Chapter 8 (4 Pages)
8.1
Physical safety: is concerned with the dangers that could lead to serious injuries or even
loss of life.
Electrocution
Fire Hazard
Tripping hazard
Personal Injury
8.2
Data Protection Act (DPA): This is legislation designed to protect individuals and to
prevent incorrect or inaccurate data being stored.
P a g e | 43
Personal Data: Refers to any data of a living person who can be identified from the data
itself.
E-Safety: to be the safe and responsible use of technology.
Social Media:
Do not publicly post stuff giving ur public information
Do not send photos of urself to people u don’t know
Always make sure u use private settings when u post pictures
Important to make sure ur photos u post doesn’t link you to a place or address
Online Gaming:
Predators and cyberbullying
Use of webcams
Voice masking technology
Cyber attacks
8.3
Data Threats:
Hacking
P a g e | 44
Phishing
Vishing
Smishing
Viruses
Malware
Card fraud
Pharming
Phishing: The creator sends a legitment looking email to fool the user. Once user clicks
on the email he gets redirected to fake site, where he types his important personal login
credintals.
Smishing: SMS messages, to send out fake text messages. It is very similar to phishing.
Vishing: Another variation of phising is voice mail phising called vishing.
Pharming: A malicious code installed on the user’s computer, the code will always direct
user to fake sites.
Malware: One of biggest risks of breach to security of data on a computer system.
Its types:
Worms
Viruses
Ransomware
Adware
Trojan horse
Key loggers
Viruses: Program which replicated itself of intention of deleting or courrpting files
causing computer to malfunction.
Worms: Can self-replicate. Their intention is to spread to other computers and corrupt
whole networks.
Trojan horse: Is a malicious program which is often disguised as some legitimate
software, but contains malicious instructions embedded within it.
Key Logging Software: It gathers information by monitoring a user’s keyboard activities
carried out on their computer.
Adware: At its least dangerous, it will attempt to flood user with unwanted advertising.
P a g e | 45
Ransomware: Are programs that encrypt data on a user’s computer and ‘hold the data
hostage’.
Card Fraud: Illegal use of credit/debit card.
Shoulder Surfing: Data theft, which stands behind you while you enter your information
for example on an ATM.
Card Cloning: Is the copying of a credit or debit card which uses a magnetic stripe.
Authentication: Used to verify the data is coming from secure & trusted source.
Biometrics: Relies on unique characteristic of human being such as finger print or retina
scans.
Fingerprint scans: Images of fingerprints are compared against previously scanned
fingerprints stored in a database.
Face Recognition: Is used to identify somebody by their facial features.
Digital certificate: is a pair of files stored on a user’s computer – these are used to
ensure the security of data sent over the internet.
Secure sockets layer (SSL): is a type of protocol that allows data to be sent and received
securely over the internet.
Encryption: uses a secret key that has the capability of altering the characters in a
message.
Firewall: will help to keep potentially destructive forces away from a user’s computer,
by filtering incoming and outgoing network traffic.
Two-factor authentication: is a form of verification which requires two methods of
authentication to verify who a user is.
P a g e | 46
Chapter 9 (2 Pages)
9.1
You need to consider these factors when presenting to audience:
Age
Experience of the audience
Expectations of the audience
Knowledge of the audience
Key Factors when writing a presentation includes:
Language used
Need for multimedia
Length of the presentation
Need for audience participation
Examples to illustrate/explain certain points
Audience Characteristics:
Age range
Income levels
Interests
Disabilities
Young Children Needs:
Bright and cheerful colours
Animation & Sound
More pictures than text
Large fonts & Simple Short Words
Inlcude games if possible
Must be an easy to use interface
Adults & Older Childreen Needs:
P a g e | 47
Attractive display
Intresting content
Good mixture of text & images
Use appropriate language levels
Use bullet points to make content easier
Older People Needs:
Different colors
Large font size
Easy to use interface
Display is consistent from page to page
Don’t use too much technical language
9.2
Software is protected by copyright.
So its illegal to:
Make a software copy then sell it
Use software on multiple computers
Use coding from the software to ur own software
Rent out the software package without permission
Use the name of the software on another software without agreement to do so
Software piracy: is the illegal copying of software.
How to protect the software:
Using product key activation
If its in hard copy, use a form of hologram indicating it’s a real copy
It will only run if the CD, DVD, or memory stick is in the drive
It will run if a dongle was plugged into one of the usb ports
P a g e | 48
Chapter 10 (5 Pages)
10.1
Legislation: laws to protect people against the misuse of emails.
Requires senders to obtain “opt-in”
Emails are not sent out with false subject lines
Valid postal address
Many countries doesn’t allow companies to keep the customer’s emails
Companies must make their privacy policy very clear to subscribers
P a g e | 49
They must provide subscribers a clear way to unsubscribe
Company must have a clear way to “opt-out”
Acceptable Language: The language used by people when writing emails should follow
an acceptable code of practice.
Guidelines set by an employer: Company publishes guidelines for their employees they
have to follow when using emails or other electronic communications.
Copyrights & security of emails: Just because it is relatively easy to forward an email
does not mean it is always legal to do so.
Methods to increase security of emails:
Strong passwords
Change passwords on regular basis
Using spam filters
Running anti-virus/spam on ur computer regularly
Passive Attacks: release of email materials without your consent
Active Attacks: Involves modification of your messages / involves viruses or phishing
attacks.
Netiquette: Internet Etiquette.
Like:
Do not be abusive
Do not send spam
Be clear with your message
Always check your spelling/grammer
Respect people privacies
Email groups:
Carbon Copies (CC)
Blind carbon copies (BCC)
Forwards
Attachments
P a g e | 50
CC: Used to send a copy of an email to one or more recipients without them being the
primary recipients
BCC: allows you to send an email to multiple recipients without revealing their email
addresses to each other.
Spams:
Wastes people’s time
Annoys people
Used up valuable bandwidth on internet
Can be virus attached
Clog up user’s inboxes
10.2
Internet is actually a concept rather than something tangible, WWW is only a part of
the internet where user can access using web browser software.
Internet:
User can send/Receive emails
Allows online chatting
Makes use of transimission protocols and IP
Worldwide collection of interconnected networks and devices
World Wide Web(WWW):
Collection of multimedia web pages
Uses Https protocls
Uniform resource locators (URLs) are used to specify web pages locations
Web recourse are accessed by web browsers
WWW uses internet to access information from web servers
Intranet: An intranet is a private computer network that operates within an
organization or company, allowing employees to share information, collaborate, and
access resources such as documents and databases privately/securely.
Extranets: Part of intranet that allows it to be extended outside the organization.
Difference between Internet & Intranet:
P a g e | 51
Internet comes from InterConnected Network
Intranet comes from Internal Restricted Access Network
Intranet gives local information to an organization, internet covers everything
Possible to block sites using intranet, in internet its difficult
Intranet requires a password and user ID and can only be accessed from agreed
points/devices
Intranet is behind a firewall which gives some protection
Information used in intranet is stored on local servers
Blogs: are personal internet journals where the writer (blogger) will type in their
observations on a topic.
Microblogs: are similar to blogs, but are most often used on social networking sites to
make short, frequent posts.
Wikis: are web applications or websites that allow any user to create and edit their web
pages using any web browser.
Social networking: sites focus on building online communities of users who share the
same interests and activities.
Moderated forum: refers to an online discussion forum in which all the posts are
checked by an administrator before they are allowed to be posted.
Unmoderated forums: Online discussion forum which all the posts are not checked.
Internet service provider (ISP): is a company that provides users with access to the
internet.
Web browser: is software that allows a user to display a web page on their computer
screen.
(protocol://website address/path/filename)
Protocols:
Http or Https
Website address:
Domain host
Domain name
Domain type
Sometimes a country code
P a g e | 52
Path: Web page
File name: item on the web page
Search engines: are useful if you do not know the URL of the website, or if you want to
find some information but do not know where to look.
Advantages of using internet to find information:
Tends to be up to date
Has huge amount of nearly unlimited information
Fast and easy
No need to travel or go to libraries to find the info
Pages on the internet can have multimedia elements
DisAdvantges:
Info can be biased or incorrect
Always risk of accessing inappropriate sites
Easy to be distracted
Risk of information overload
Due to ease of copying content, there is risk of plagiarism
Some research skills are lost
File transfer protocol (FTP): is a network protocol used when transferring files from one
computer to another computer over the internet.
P a g e | 53
Secure Sockets Layer (SSL): is a protocol that allows data to be sent and received
securely over the internet.
P a g e | 54
P a g e | 55