(C) P. Meakin 1998-2004












Name

 

Group

 









This product is licenced to St. Mary Redcliffe and Temple CE School .

Use and reproduction of this booklet is permitted within the institution named above, subject to the restrictions set out in the online licence agreement. All other rights are reserved by the author.

Contents








TopicSectionTopicSection
Information1Control Programs26
Information Systems2Data Protection27
Hardware3Copyright28
Input Devices4Hacking29
Output Devices5Health & Safety30
Storage Devices6Security31
Processing7Backups32
Software8Viruses33
Word Processing9Validate & Verify34
Desktop Publishing10Data Collection35
Graphics11Simulation & Models36
Databases12User Interfaces37
Spreadsheets13Algorithms & Charts38
Charting14Programming39
Web Design15Data Transfer40
Multimedia16Social Issues41
Operating Systems17Banking42
Other Software18Supermarkets43
Comms Methods19Systems Lifecycle44
Computer Networks20Analysis45
The Internet21Design46
E-Commerce22Implementation47
Global ICT Services23Testing48
Data Logging24Evaluation49
Control25Documentation50




This booklet contains all 50 revision summaries from the GCSE ICT Companion 04.

1. Information

1. Data is raw figures, text etc. which have no meaning by themselves.
 
2. Information is data that has been placed in a context so that it has a meaning to a human being.
 
3. Computers do not process information, they process data.
 
4. Data can become information when it is given a context : Information = Data + Context
 
5. 

Information can be qualitative or quantitative :

Quantitative Quantitative information is information which can be accurately measured against a scale.
Qualitative Qualitative information is information which involves an element of judgement or opinion.
 
6. Knowledge is the information, skills and experiences that have been learned by a human. New knowledge can be created from existing information by applying logical rules to the information : Knowledge = Information + Processing
 
7. Coding or encoding information is converting information into data so that it can be stored and processed.
 
8. Most computers store data digitally. Numbers are stored as binary patterns (0s and 1s) and characters and symbols are represented using a standard coding system such as ASCII.
 
9. Information can be presented in different ways. How you choose to present information will depend upon :
  • The purpose that the information is being used for.
  • Who the information is being presented to.
  • What facilities you have to help you present the information.
 
10. If an audience has special needs then the method of presenting information must be tailored to these.
 
11. Information systems present information on an output device.

2. Information Systems

1. 

Information is stored by many organisations and companies such as banks, hospitals, libraries and schools.

 
2. An information system performs a particular task using information.
 
3. Information systems can be either manual (e.g. a filing cabinet) or computerised.
 
4. A computerised information system consists of everything needed to perform a particular task using information. This will include hardware, software and the people who use the system.
 
5. Any information system can be described in terms of this model containing input, processing, output and storage stages.

  • Input : Information going into an information system.
  • Processing : Organisation and manipulation of data by an information system.
  • Output : Information produced by an information system.
  • Store : The ability to remember information temporarily or permanently.
 
6. Some information systems also incorporate feedback. Feedback occurs when the outputs of an information system affect the inputs :

Feedback usually occurs in control systems and when turnaround documents are used.

 
7. The main reasons for choosing to use a computerised information system instead of a manual information system are :
  • Storage : Computerised systems can store vast amounts of data in small spaces and retrieve this data very quickly.
  • Processing : Computerised systems can manipulate and analyse data very quickly and accurately.
  • Networking : Data can be quickly and easily passed around the world electronically and shared between different companies.
 
8. Some possible reasons for choosing to use a manual information system rather that a computerised system are :
  • For small information systems many of the advantages of a computerised system are not important.
  • The cost of purchasing a computerised system may outweigh its advantages.
  • Users of an existing manual system may not want to change to a new computerised system.

3. Hardware

1. 

A computer system will input, process and then output data.

 
2. A computer system consists of the computer and other hardware devices that are used with the computer.
 
3.  A hardware device is an electronic or electro-mechanical device such as a keyboard or monitor which forms part of a computer system.
 
4. The devices connected to the computer can be divided up into three different classes : Input Devices, Output Devices and Input/Output Devices.
 
5. Devices connected to a computer are often known as peripherals.
 
6. Computer hardware is not very useful by itself. Software is required to tell the hardware what to do.
 
7. Computer systems are designed to be expanded, but a typical computer will have these items inside it when it is purchased :
  • A microprocessor that can carry out arithmetic and logical operations on data.
  • Some RAM that will store temporarily the programs and data that the user is currently working with.
  • Some ROM to store the BIOS program that is run when the computer is first turned on.
  • A hard disk drive that will store the programs that the user has installed and any files that he has created.
  • A floppy disk drive and CD-RW or DVD drive that can be used to install software and to transfer files from one computer to another.
  • A modem that can be used to send data over a telephone line to access the Internet.
 
8. There are three different types of computer. They are :

Type Description
Microcomputer/PC A single user computer which contains a microprocessor.
Minicomputer A medium sized computer system used by 1 to 20 users.
Mainframe A very powerful computer which may be used by hundreds of users.
 
9. A supercomputer is a very powerful, very expensive mainframe containing hundreds of microprocessors.
 
10. There are four different types of microcomputer. They are :

Type Description
Desktop A general purpose computer which can be connected to many peripherals.
Laptop A small computer which is portable, battery powered and incorporates a computer and common peripherals in one device.
Palmtop or PDA A very small computer which is handheld and can fit in a pocket. Often supplied with organiser software such as a diary and address book.
Games Console A microcomputer designed specifically to play computer games.
Embedded System A computer system that forms part of a larger device such as a car and can only be used for one specific purpose.

4. Input Devices

1. 

An input device transfers data from the outside world into a computer.

 
2. There are two different categories of input device. They are :

  • Manual Input Devices : User must enter data into the computer by hand.
  • Direct Data Entry (DDE) Devices : Transfers information automatically from a source document such as a form or barcode into the computer.
 
3. Important criteria for comparing input devices are : suitability to application, input speed, cost and reliability.
 
4. There are many different input devices available. The key features of each input device are outlined in the table below.

Manual Input Devices
Input Device Example Use Advantage Disadvantage
QWERTY Keyboard Word processing. Typists can use with ease to enter any textual data. Relatively slow.
Concept Keyboard Children's toys, tills in restaurants / pubs. Can be operated by novices or people who can not manage a normal keyboard. Needs to be customised for each application.
Touch Screen Information system in tourist office window. Can be used where a mouse or keyboard might get wet or dirty. Tiring to keep touching screen.
Light Pen Drawing on screen. Cheap to manufacture. Extremely inaccurate and awkward to use.
Mouse Moving a pointer on screen. Easy for novices to use for drawing or to choose options off the screen. Requires a lot of space to use.
Tracker Ball Moving a pointer on screen. Does not need as much space as a mouse. Not as intuitive to use as a mouse.
Touch Pad Moving a pointer on screen. Does not need as much space as a mouse. Not as intuitive to use as a mouse.
Joystick Playing games or controlling robots. Allows fast, natural directional interaction needed for games. Not as accurate as a mouse for selecting options from screen.
Graphics Tablet Producing technical drawings. Allows digitising of images with great accuracy. Expensive unless you use it a lot.
Scanner Transferring printed images onto a computer. Cheap and fast method of getting graphics into a computer. Images take up a lot of storage space.
Digital Camera Including photographs in newsletters and DTP work. No film required, no delay getting negatives processed. Camera can only store a limited number of images, resolution is usually not very good.
Video Capture Reads still or moving video images into computer. e.g. Video Digitiser, Webcam. Can capture moving images. Captured video files require a lot of storage space.
Voice Recognition (Microphone) Telephone banking, automatic dictation. Can be operated by inexperience users, can be used remotely by telephone. Can only understand a few words or one person.
MIDI Input and output of music via instruments. Quicker and easier than entering music through computer keyboard. Instruments and computer require MIDI ports.
Remote Control Operating a TV from remote location. More convenient than having to move to TV to operate it. Can be lost, some controls do not work all functions of device.
Biometric Devices Security applications where a person must be identified by fingerprint/iris e.g. passport. More reliable identification than password, signature etc. People are worried about personal data stored about them being misused.
Sensors Control systems. Many types available, automatic input of physical quantities. May require calibration.
Direct Data Entry (DDE) Devices
Input Device Example Use Advantage Disadvantage
Barcodes Supermarket stock control. Quick and easy to enter data under non-ideal condition, cheap to print bar-codes. Only numbers can be stored in bar-codes.
Magentic Ink Character Recognition Reading information from cheques. Very fast and secure : numbers can not be changed by overwriting and not damaged by folding. Expensive to buy reader and ink.
Magnetic Stripe Codes Used to store a small amount of information on the back of credit cards Simple and cheap to produce. Can be damaged by magnetic fields or scratching.
Smart Cards Petrol station points cards, satellite TV decoder cards, debit cards. Can store a lot of information. People worried about what information could be stored.
Optical Mark Recognition Marking exam scripts, lottery tickets. Fast and accurate. Instructions have to be followed exactly by person marking the form.
Optical Character Recognition Used to read printed text into the computer, reading postcodes to sort letters. Fast method of reading text into a computer. Not 100% accurate, OCRed documents must be checked manually.

5. 

A turnaround document is a document which :

  • Has some information printed onto it by a computer.
  • Has more information added to it by a human.
  • Is fed back into a computer to transfer the added information into the computer.
 
6. 

A Portable Data Entry Terminal (PDET) is a handheld computer that can be used to enter data into a computer system as an alternative to a turnaround document.

5. Output Devices

1. 

An output device takes data from the computer and converts this into information in a form which is normally understandable by humans.

 
2. Soft copy output devices produce temporary output, whereas hard copy output devices produce permanent output.
 
3. There are two types of Visual Display Unit (VDU). They are desktop monitors which use a cathode ray tube like a television and liquid crystal displays. Important factors when selecting a VDU are size, resolution and cost.
 
4. Printers or plotters are hard copy output devices. Printers are either impact printers (produce output by striking a ribbon) or non-impact printers.
 
5. The table below compares the main types of printers and plotters.

Comparisons of Printers and Plotters
Type Cost Speed Quality Graphics Paper Colour Fonts
Dot Matrix £100 + 300 cps Poor Yes Continuous or Sheets Poor Lots with Software
Laser £80-£15000 Mainly £600 8-100 ppm Excellent Yes Sheets Very Expensive Lots
Ink Jet £30+ 8-24 ppm Excellent Yes Sheets Yes Lots
Thermal Built into other devices (cheap). 3 ppm Poor Yes Roll of Special Paper No Lots
Plotter £700-£5000+ Very Slow Excellent Yes Large Sheets e.g. A4-A0 Yes Draw as Graphics

Abbreviations : PPM = pages per minute, CPS = characters per second

 
6. Speakers can produce sound output such as music or synthesised speech.
 
7. MIDI instruments can be controlled by a computer. Music can be played back through up to 16 instruments simultaneously.
 
8.  Microfilm is a special type of photographic film which can store images at greatly reduced sizes (about 1/50th of the original size). In the past documents were stored on microfilm but it is rarely used now.
 
9. MIDI instruments can be controlled by a computer. Music can be played back through up to 16 instruments simultaneously.
 
10. A wide variety of control devices such as motors, lights and pumps can be switched on and off by a computer.

6. Storage Devices

1. Computerised information systems have to store programs and data.
 
2. 

A storage device stores programs and data either temporarily or permanently.

 
3.  

The capacity of a storage device is described in terms of bits, bytes, kilobytes, megabytes and gigabytes.

Unit Equivalent To
1 BitA single storage location which can hold either a 0 or a 1.
1 Byte8 Bits
1 Kilobyte (Kb)1024 Bytes
1 Megabyte (Mb)1024 Kilobytes
1 Gigabyte (Gb)1024 Megabytes
 
4. There are two different types of storage device :
  • Immediate access store holds programs and data that the user is currently working with.
  • Backing store keeps data and programs when the computer is turned off.
 
5. 

Immediate access store is also known as main store or primary store. Backing store is also known as secondary store.

 
6.  Immediate access store can be either ROM or RAM :
  • Read Only Memory (ROM) : Contents are kept when computer is turned off (non-volatile) but can not be altered.
  • Random Access Memory (RAM) : Contents are lost when computer is turned off (volatile) and can be altered by the user.
 
7. 

ROM is used to store the BIOS program in a microcomputer and the programs that run embedded systems. RAM is used to store programs and data the user is currently working with.

 
8.  

There are many different types of backing storage device. The main ones are :

Types of Backing Storage Device
Type Examples Common Applications
Magnetic Disk Floppy Disk Transporting files, small backups.
Hard Disk Running software, storing data files.
Zip/Jaz Transporting big files, medium size backups.
Optical Disk CD-ROM Distributing software, multimedia products.
CD-R Permanent backups, small volume distribution.
CD-RW Temporary backups.
DVD-ROM High quality digital films.
DVD-RAM Backup of moderate volumes of data.
Magnetic Tape High volume backups, batch processing.
Flash Memory Transferring files, storage in compact devices.
 
9. To select an appropriate storage device for a task several different criteria should be considered :
  • What the maximum storage capacity of the device is.
  • How much the device costs per megabyte (Mb) of storage space.
  • How quickly the data stored on the device can be accessed.
  • Whether the device can store data whilst the computer is turned off.
  • Whether the data stored on the device can be changed or not.
  • Whether the storage device can be used to transfer data from one computer to another or not (is it portable?).
  • The method used to store the data e.g. electronically, magnetically, optically.
 
11. 

The table below compares the main types of storage device.

Device Capacity Cost per Mb Transfer Speed (capacity per second) Direct or Serial Access Stores Data when Computer Switched Off Can Have Data Written to It Portable
Immediate Access Store
RAM 32Mb to 1024Mb 35p 500Mb to 1500Mb Direct No Yes No
ROM 1Kb to 64Mb 35p 500Mb to 1500Mb Direct Yes No No
Backing Store
Floppy Disk 1.44Mb 17p 0.2Mb Direct Yes Yes Yes
Hard Disk 40Gb to 300Gb 0.05p 40Mb to 100Mb Direct Yes Yes No
Zip / Jaz 100Mb to 2Gb 1p 0.5Mb to 8Mb Direct Yes Yes Yes
Optical Disk 650Mb to 17Gb 0.02p 3Mb to 22Mb Direct Yes Depends on Type Yes
Magnetic Tape 20Gb to 400Gb 0.03p 5Mb to 60Mb Serial Yes Yes Yes
Flash Memory 16Mb to 1024Mb 20p 0.4Mb to 10Mb Direct Yes Yes Yes
 
12. 

Caching is a technique used to speed up access to data stored on a backing storage device. A cache is a part of a computer's RAM that is set aside to store copies of frequently used sectors on a backing storage device such as a hard disk drive so that they can be accessed more quickly.

 
13. Backing storage devices can be accessed using one of three access methods :
  • Direct Access : The drive head can move directly to any record/file on the device so locating data is very fast. All types of disk are direct access. Used for transaction processing.
  • Serial Access : The drive head must read through all of the data that comes before the record/file to be loaded so locating data is slow. Only magnetic tapes are serial access. Used for batch processing.
  • Sequential Access : Identical to serial access, but records/files are stored in a particular order.
 
14.  Data can be compressed before it is stored so that it will use up less storage space.
 
15.  Compression is the act of reducing the size of a file without losing any of the data it contains. Decompression is the act of returning a compressed file to its original size and format. A file that has been compressed must be decompressed before it can be used.
 
16.  How much a file size is reduced by when it is compressed will depend upon the type of data that is stored in the file and the method used to compress the file. Important applications of compression are distributing software, hard disk compression and data transmission.
 
17.  Common file processing techniques include sorting and merging :
  • Sorting is arranging the records in a file into a particular order.
  • Merging is combining the contents of two files into one file. The simplest method of merging two files together is to take the contents of one file and add them to the end of the other. This is known as appending.

7. Processing

1. 

Processing is the act of doing something (e.g. organising and manipulating) with data to produce output.

 
2. Processing is carried out by a microprocessor. Microcomputers usually contain one microproccesor. Minicomputers and mainframe computers may contain more microprocessors. Together all of the microprocessors in a computer are known as the Central Processing Unit (CPU).
 
3. There are three different types of processing. They are batch, transaction and real time.
 
4. This table compares the different types of processing.

Comparison of Processing Methods
Comparison Batch Transaction Real Time
Identifying Features Input data is collected into batches in a transaction file which is sorted and validated before being processed with the old master file to produce a new master file. The master file is always kept up to date. Transactions are placed in a transaction queue and processed in the order that they are added to the queue. Data is processed extremely quickly to meet a real world deadline.
Example Applications 1. Payroll
2. Printing Bills
3. Multiple Choice Exams
1. Ticket Booking
2. Seat Booking
3. Stock Control
4. Banking
1. Missile Guidance
2. Nuclear Reactors
3. Chemical Processes
Speed of Response No data is processed until a complete batch is collected. It may be a long time e.g. a day before data is processed. Under normal loads data is processed within a few seconds. Under heavy loads processing times can be longer. Data processed very quickly to meet a real world deadline. Processing often appears to be instant.
Storage Media Used A serial access medium such as magnetic tape. A direct access medium such as magentic disk. Usually immediate access store.
Cost

8. Software

1. A piece of software is a computer program which has been written to carry out a particular task.
 
2. 

Software programs are originally produced in a programming language.

 
3.  Software is usually classified as being either systems software or application software.
4. Systems software controls the operation of a computer. The operating system and utility programs are systems software.
 
5. 

Application software is software that is written to solve a particular problem or carry out a particular job. Application software can be either generic or application specific :

Generic A generic package is a package that can be put to a wide variety of uses. The most common generic software packages are : word processors, desktop publishers, graphics packages, spreadsheets and databases.
Application Specific An application specific package is produced to perform one specific task. For example a program written to produce invoices and manage stock levels for a garage.
 
6. If you need a piece of software that will perform a specific task then you will have to choose from one of three options :
  • Off-the-shelf : If a package already exists that performs exactly the task that you need then you can buy it "off-the-shelf" from a shop.
  • Customise a Generic Software Package : Modify a generic package such as a database to carry out the task.
  • Custom Written Software : Pay a computer programmer to write a new piece of software to perform the task.
 
7. To select a piece of software for a particular job it is useful to draw up a set of comparison criteria, based upon what you need the software to do.

9. Word Processing

1. A word processing package is used to prepare and edit text.
 
2. The most important features of a word processor package are listed in this table.

Page Layout
Orientation Which way round the paper is printed on (portrait or landscape).
Margins The gaps between the text and the edge of the page.
Header and Footer Text which appears at the top and bottom of each page.
Columns Pages can be divided into columns for producing leaflets, newsletters etc.
Text Styles
Fonts Different styles of text.
Font Size Text can be printed at many different sizes.
Font Style Styles such as bold, underline and italic can be applied to text.
Alignment Text can be lined up on the left, right or center of the page or be fully justified.
Editing Text
Copy / Cut and Paste Blocks of text can be duplicated or moved using the copy, cut and paste options.
Search and Replace A word or phrase can be automatically replaced with another wherever it occurs.
Text Analysis
Spell Check The spelling in a document can be automatically checked and corrections suggested.
Thesaurus A thesaurus will suggest alternative words with the same meaning as a word that you have typed in.
Grammar Checker A grammar checker will examine the structure of any text you have typed.
Templates
Templates Templates let you store favourite document layouts to reuse.
Other Features
Tables Tables can be used to set data out neatly in rows and columns.
Bullets & Numbering Bullets and numbers can be used to present lists of data.

3. A form letter produced in a word processor can be linked to a database of names to produce mail merged letters.
 
4. A desktop publisher (DTP) package is an alternative package which can be used instead of a word processor when more sophisticated features are required.

10. Desktop Publishing

1. Desktop Publishing (DTP) software is used to produce professional-looking documents such as reports, books, posters or leaflets.
 
2. A DTP package gives you much more control over the layout of pages in a document than a word processor would.
 
3. In addition to the tools provided by a word processor, most DTP packages will provide the tools detailed in this table.
 
 
Page Layout Pages are set out using text and picture frames. Text frames can be linked in any order to produce complicated layouts.
Fonts and Styles Text can be made to follow unusual paths and be displayed with shadows and in a range of special effects.
Drawing Tools Basic drawing tools such as lines, shapes and borders will be provided.
Importing Pictures and Text Information produced in other packages such as a word processor, spreadsheet or graphics package can be put into documents created by a DTP package.
Clipart A clipart gallery will contain thousands of useful pictures which can be incorporated into documents.
Accurate Positioning Grids and guidelines can be used to position objects very accurately on the page.
 
4. Many desktop publishers include wizards. A wizard is an interactive tool that guides the user through a potentially complex task. Using a wizard lets the user complete a common task more quickly and straightforwardly than starting from scratch.

11. Graphics

1. There are three different types of computer graphics packages which can be used to produce images. They are painting packages, drawing packages and computer aided design (CAD) packages.
 
2. Many specialist hardware devices such as scanners, digital cameras, high resolution monitors, plotters and printers are available to assist in the production of computer graphic images.
 
3. This table compares the three different types of computer graphics packages.

Comparison of Graphics Packages
Comparison Painting Drawing CAD
Image Storage Method Images are made up of thousands of small dots called pixels. The colour of each pixel is stored in a file known as a bitmap. This makes image files very large and difficult to edit. Two dimensional images are stored as groups of objects. This makes image files small and easy to edit. Three dimensional images are stored as groups of objects. Images are easy to edit and can be viewed from any position.
Tools 1. Palette
2. Freehand Brush
3. Straight Lines
4. Shapes
5. Text
6. Flood Fill
7. Zoom
As for a painting package, but :

1.No Flood Fill
2.Probably No Freehand Brush

Objects can be :

1.Moved
2.Resized
3.Deleted
4.Grouped
5.Accurately Positioned
As for a drawing package, but all tools will work with 3D objects and be more accurate. Many CAD packages can also :

1.Store Libraries of Components
2.Cost Designs
3.Control Computer Assisted Manufacturing (CAM) equipment
Advantages 1. Cheap to purchase.
2. Easy to use.
1.Easier to edit images.
2.Images can be resized without becoming jagged/pixelated.
3.Image file size is small.
1.Can produce 3D designs.
2.Many highly sophisticated tools for designers.
Disadvantages
1.Image files are very large.
2.Difficult to edit images.
3.Resizing images produces jagged/pixelated results.
1.Unlike a CAD package only works with 2D images .
1.Very expensive to purchase.
2.Training is required to make good used of a CAD package.
Cost

12. Databases

1.  A database is a computerised record-keeping system.
 
2.  Databases let you search through large quantities of data very quickly to answer questions.
 
3.  Data stored in a database must have a standard, regular structure.
 
4. 

It is likely that you will encounter two different types of database package :

Flat File A flat file database package will only let you store one file/table in each database you create.
Relational A relational database will let you create many files/tables to represent different types of objects within each database you create. Links or relationships can be established between the different files in a database.
Relational databases are considerably more sophisticated than flat file databases.
 
5.  A field is a single item of data stored in a database such as age or car registration number. Each field is identified by a field name.
 
6.  A record is a collection of fields that store all of the information about a person or thing.
 
7.  A file (or table) is a collection of records, each of which has the same structure.
 
8.  The structure of a record refers to :
  • The names of the fields in the record.
  • The data types of the fields in the record.
  • The lengths of the fields in the record.
 
9.  The data type of a field determines what information can be stored in the field. Example data types are alphabetic, date and boolean.
 
10.  Fields can be either fixed or variable length.
 
11.  Data that is stored in a database is often coded to reduce the amount of storage space it requires and speed up data entry.
 
12.  Usually one particular field of each record contains an item which is used to identify the record. This field is called the key field. The value in the key field must uniquely identify each record.
 
13.  Forms can be used to create a user interface that makes it easier for a database user to enter and access data.
 
14.  Many databases will validate data as it is entered to check that the data is sensible, but not that it is correct. Validation checks such as presence checks, type checks, length checks and format checks can be used.
 
15.  A query is used to search the data in a database to locate records that match conditions entered by the user.
 
16.  A report is used to display data stored in a database. A report will let you decide which fields to display, where to display them, what statistics to calculate from the data and how to sort and group records. Reports can be either tabular or columnar.
 
17.  The records in a database can be sorted into any order to make the information that is stored easier to use.
 
18.  A macro is a short sequence of instructions that will automate a task. People who make databases often create macros to simplify the use of a database. Macros are often executed when users click on buttons on forms.
 
19.  Data can be imported into and exported from a database using a standard file format such as CSV or TSV.
 
20.  Relational databases have two important advantages over flat file databases. They are :
  • Control Over Redundant Data : Wherever possible data is only stored once, so storage space is not wasted
  • Data Consistency : Because each data item is stored only once it is not possible for the same item to store two different values, hence the data will always be consistent.
 
21.  It is important that you design and test properly any database that you create.

13. Spreadsheets

1.  A spreadsheet is a package used for performing calculations and drawing graphs.
 
2.  A spreadsheet is divided into cells. Rows run across the screen and columns run down the screen. Each cell has a name called a cell reference. A group of cells is known as a range.
 
3.  Numbers, labels and formulas are the three different types of information that you can put into a cell.
 
4.  Formulas such as =A1+B1, =A7*A8/100 can be used to get the spreadsheet to perform calculations.
 
5.  Functions such as SUM, MIN, RAND can perform calculations on ranges of data.
 
6.  Most spreadsheets contain many functions. They are divided up into classes such as mathematical, financial, statistical, condition and database functions.
 
7.  You can replicate (copy) formulas using Fill Down, Fill Right and Copy and Paste. Relative references change as they are copied. Absolute references do not change as they are copied.
 
8.  A series of numbers such as 1,3,5,7 can be generated using fill series.
 
9.  A condition function like IF can use data in the spreadsheet to make a decision.
 
10.  Database lookup functions can search through a table in a spreadsheet as if it were a database.
 
11.  Data in a spreadsheet can be sorted into a particular order.
 
12.  Data in spreadsheet cells can be formatted (e.g. bolded, underlined, left and right justified). Numbers can be formatted to fixed numbers of decimal places or to be displayed as currency.
 
13.  Extra rows and columns can be added to a spreadsheet and unwanted ones can be deleted. The width of columns and height of rows can be adjusted to fit the data in them.
 
14.  Spreadsheet data can be used to plot graphs.
 
15.  Some spreadsheets will let you create macros to automate common tasks.
 
16.  Some spreadsheets can validate data as is entered to ensure it is sensible.
 
17.  Typical applications of spreadsheets include simulations, optimisation and book-keeping.
 
18.  Spreadsheet can be used to answer what-if problems of the form "what would happen to X if y changed ?".
 
19.  Spreadsheets are useful because, once you have set up the formulas, they will carry out calculations quickly without making calculating errors. The results of spreadsheets calculations can be presented more neatly than handwritten ones and as charts. If you change any data the calculations will be automatically carried out again, so spreadsheets are particularly useful if the data is likely to change or if the same calculations have to be performed on several sets of data. For some very complicated simulations it would be impossible to perform all the necessary calculations by hand.
 
20.  It is important that you design and test properly any spreadsheets that you create. Comparing the output of a spreadsheet with manual calculations using the data or noting the effects of changing the data in the spreadsheet are both methods of testing a spreadsheet.

14. Charting

1. Numerical information can usually be more easily understood if it is presented as a chart (or graph).
 
2. Charts can be created in a specialised charting package or a spreadsheet.
 
3. The most popular types of chart are :

Type Use
Pie Chart Shows how a quantity is divided up between a number of options.
Line Chart Shows how a continuous quantity changes over time.
Bar Chart Shows how frequently a particular option is selected from a list.
Scatter Graph Used to investigate relationships between two sets of data.
 
4. A chart should have a main title and titles on the X and Y axis.
 
5. The scales on the axis are usually set automatically by the charting package but can be adjusted.
 
6. A legend can be use to identify two sets of data plotted on the same chart.

15. Web Design

1. The World Wide Web (or simply Web) is the most popular service on the Internet.
 
2. Each site on the World Wide Web is identified by a unique address called a Uniform Resource Locator or URL.
 
3. A web site is made up of pages. Pages are joined together by hyperlinks.
 
4. To view a web site you need to use a web browser package.
 
5. Web pages are stored in a language called HTML. To produce a web page you can either write the HTML code yourself or use a web design package.
 
6. The structure of a web site refers to the organisation of the pages at the site and which pages are linked to which other pages.
 
7. Usually all of the pages that are part of a web site have the same page layout. They will share a common background, colour scheme, text styles etc.
 
8. It is possible to choose the fonts that you want to use on a web page, but these may not be present on every computer. Often special text styles are used instead.
 
9. Images can be included in web pages. These need to be fairly small so that they do not take too long to download. Images on web pages are usually stored in compressed GIF or JPEG format.
 
10. Hotspots can be created on images. A hotspot is an area of an image which acts as a hyperlink.
 
11. Tables can be included in web pages. They are often used to create complicated page layouts such as multi-column pages.
 
12. A page can be divided up into frames so that the contents of one section of the page can be changed independently of the other section(s).
 
13. A form can be included on a web site. The form can be filled in by a person visiting the site and the information entered on it can be sent back to the page's owner.
 
14.  Advanced tools such as Javascript, Java and Video can be used to enhance the appearance of a web page.
 
15. Whilst you are developing a web site you will probably store it on the hard disk of your computer. When it is complete you will need to upload it onto a web server so that other people can access it. File Transfer Protocol (FTP) is usually used for this purpose.

16. Multimedia

1.  Multimedia means that information is conveyed using more than one method, e.g. text, sound, video and pictures.
 
2.  Multimedia applications place extra demands on computer hardware. Most multimedia computers need to have :
  • A sound card.
  • A fast microprocessor.
  • Quite a lot of RAM.
 
3.  Multimedia applications are usually supplied on optical disks such as CD-ROM.
 
4.  Common uses of multimedia applications are :
  • Reference CD-ROMs such as encyclopaedias.
  • The Internet, in particular the World Wide Web.
  • Presentations such as training materials.
  • Computer games.

17. Operating Systems

1.  The operating system (OS) is a computer program which controls the entire operation of the computer. It is the most important piece of systems software.
 
2.  MS-DOS®, Windows 2000® and UNIX are operating systems.
 
3.  The operating system will determine the type of user interface and types of processing a computer can use.
 
4.  All operating systems perform these tasks :
  • Managing communications between computer and connected peripherals.
  • Providing a user interface.
  • Allocation of computer memory.
  • Organising data on backing storage devices.
 
5.  Data saved on a backing storage device is usually organised hierarchially in a directory tree. Files are created within directories. Directories can also be created within other directories. A directory inside another directory is a subdirectory.
 
6.  There are three types of advanced operating system that can perform additional functions. These are :

Type Use
Network OS Network operating systems allow users to communicate with other computers on a network to perform tasks such as loading files and sending email. A network operating system must also control computer security. Measures such as username and password logons and logs will be used.
Multi-Tasking OS Multi-tasking (or multi-programming) operating systems appear to be capable of carrying out more than one task at a time. Each task is allocated very small slices of processor time in turn. The different tasks can be allocated different priorities. The main task the user is interacting with is known as the foreground job and other less urgent tasks are known as background jobs. Tasks with higher priorities will be allocated more processor time.
Multi-User OS Multi-user operating systems allow more than one user to work on a mainframe computer at the same time. Each user is allocated a small slice of processor time in turn.
 
7.  Operating systems are also sometimes classified according to the types of processing they can carry out. These additional classifications are :

Classification Description
Batch A batch operating system can perform batch processing of data.
Interactive An interactive operating system carries out a dialogue with the user by the user entering commands and the computer responding. Interactive operating systems can carry out transaction processing.
On-Line An on-line operating system allows the user of a computer to interact directly with another central computer. On-line operating systems are commonly used by transaction processing systems that require many users at different computers to interact with a central computer.
Real Time A real time operating system can perform real time processing of data. This means it can process data extremely quickly to meet a real world deadline.
 
8.  A particular operating system might fall into several categories. For example it could be a multi-tasking, network, interactive OS.

MS-DOS® and Windows® 2000 are registered trademarks of Microsoft Corporation in the United States and other countries.

18. Other Software

1. Games are programs which let people play in situations that they are unlikely to encounter in everyday life :
  • Games can be played on desktops, laptops, PDAs, games consoles and even cellular telephones.
  • Modern games are supplied on CD-ROM or DVD and need a fast processor and a lot of RAM to run.
  • Games can be played across the Internet with other people.
  • Some people are worried about the social effects of games such as lack of exercise, reduced socialising and exposure to violence.
 
2. Computer software can assist with teaching and learning :
  • Computer Aided Learning (CAL) systems teach a user by presenting him or her with material to learn then assessing how well the material has been understood.
  • Home/Distance Learning systems allow people to study at home using the world wide web and email.
  • Using computers to assist learning allows learners to progress at their own pace and to work where and when it suits them.
 
3. A Geographical Information System (GIS) presents stored data graphically on a map so that it is easy to analyse and interpret. The most popular type of GIS is Satellite Navigation (SatNav) software that is used to direct a driver to his destination.
 
4. An expert system is an artificially intelligent computer system that stores and can apply knowledge about a particular area of human expertise :
  • The knowledge is stored in a knowledge base in the form of rules.
  • An inference engine will apply the stored knoweldge to problems posed by the user.
  • Most expert systems work by asking the user questions and analysing the responses to these questions.
  • Example applications of expert systems are medical diagnosis and technical customer support.

19. Comms Methods

1. Communicating is tranferring information from one person or location to another.
 
2. There are different methods of communcation. The best method to use on a particular occasion will depend upon the type of information being sent, how quickly it must arrive, what equipment is available and how much you are prepared to pay to send the information.
 
3. Communication methods can be classified as being broadcast or private :
  • Private systems are used for private communications between a small number of people.
  • Broadcast systems allow one person to send the same information to lots of people at the same time.
 
4. Common communication methods are :

Private Communications Systems
Method Details Advantage Disadvantage
Post Letters and parcels are delivered by hand using a sorting system.
  1. Almost anyone, anywhere in the world can send and receive a package.
  2. Parcels can be sent in the post.
It can take a long time to receive a package sent by post.
Telephone Used for instant voice communications. Telephones are connected to network by cables.
  1. You can communicate instantly with another person, anywhere in the world.
  2. A telephone conversation is interactive.
  1. Packages can not be sent by telephone.
  2. There is no permanent record of what you have said or heard.
Cellular Telephone Telephone system where phones are connected by radiowaves and can be used anywhere there is a transmitter.
  1. Can be used anywhere there is a transmitter.
  2. Easy to get hold of someone if he carries phone with him.
  1. Poor quality sound transmission.
  2. Slow data transmission.
Fax Used to send copies of documents from one location to another.
  1. Documents sent quickly between locations.
  2. Permanent record of communication.
  1. Quality of printed copy not very good.
  2. Fewer people have access to a fax machine.
Email Allows computer users to send messages and documents electronically.
  1. Any sort of information (e.g. text, video) can be sent.
  2. Information sent by email arrives very quickly.
  1. Not many people have access to email.
  2. Parcels can not be sent by email.
Video Conferencing Transmits live video pictures between users of the telephone system or over the Internet.
  1. Allows people to communicate in a conference without having to travel.
  2. Some information can be better represented visually.
  1. Quality of images often not very good.
  2. Specialised equipment required for high quality transmission.
Teleconferencing Allows many people to take place in the same telephone call simultaneously to hold a meeting.
  1. Allows people to communicate in a conference without having to travel.
  1. Sometimes it is better to meet people as information can not always be conveyed easily by talking. e.g. images, demonstrations
Broadcast Communications Systems
Method Details Advantage Disadvantage
Teletext Sends text and simple graphical information as pages to a television.
  1. Can be viewed on most modern televisions.
  2. Teletext is free to use.
  1. Limited number of pages to look at.
  2. Information can only be sent one way.
Digital TV Sends pictures in widescreen format to televisions.
  1. More channels than analogue TV.
  2. Less interference than analogue TV.
  3. Extra services such as television Internet, pay-per-view.
Have to purchase a new TV or set top box to use.
 
5. Increasingly different communication systems are being integrated together. For example a digital television may incorporate a modem so that you can send email and access the Internet.

20. Computer Networks

1.  A computer network is a group of computers which are connected together to allow communication between them.
 
2.  Computers connected to a network are known as stations.
 
3.  The speed at which a network or connection can transmit data is commonly referred to as its bandwidth.
 
4.  Computer networks are classified as being either Local Area Networks (LANs) or Wide Area Networks (WANs). Important properties of LANs and WANs are :

Properties of LANs Properties of WANs
Covers a small area, usually just one site. Covers a large area, often linking together several sites.
Computers connected by Network Interface Card and cables. Computers connected by modems and telephone lines, ISDN, broadband or similar.
Fast transmission of data. Slow transmission of data.
 
5. 

Computers can be connected to a WAN using a modem and telephone line, a terminal adaptor and ISDN channel or broadband :

Information about Modem Information about ISDN Information about Broadband
Converts digital data produced by a computer into an analogue signal so that it can be transmitted over a telephone line. Converts the received analogue signal back into digital data at the other end of the line. A terminal adaptor transmits data digitally along an ISDN channel. Data can be sent down several ISDN channels simultaneously. A high speed connection usually made using either ADSL and a telephone line or a cable TV connection and a cable modem.
Speed : Up to 56KBps. Speed : 64KBps per channel. Speed : 560KBps to 2048KBps.
Advantages of Modem Advantages of ISDN Advantages of Broadband
Can connect anywhere there is a telphone line. Faster transmission of data than using a modem and telephone line. The fastest transmission speed (ten times quicker than a modem).
Pay for how much you use it, so cheapest if not used very much. Faster connection when logging on than using a modem and telephone line. Pay a fixed monthly fee, then can use it as much as you want.
 
6. 

Access to shared resources such as printers and file storage space can be controlled using either a central server based system or a decentralised peer-to-peer system.

Properties of Peer-to-Peer Properties of Server Based
In a peer-to-peer system there is no central control over access to network resources. Any computer can access the file storage space and printers connected to any other computer. In a server based system access to file storage space is controlled by a file server which you must log on to before using a computer. A printer server computer will queue and then print documents.
 
7.  The network topology describes the physical layout of the computers on a network and the interconnections between them. The four most common network topologies are bus, ring, star and hierarchical.

Type Image Details
Bus/Line Each computer linked to one main cable. Cheap and easy to set up as needs least cable. If any cable breaks no computers can use network.
Ring Each computer is connected to the two computers on either side of it. The last computer is linked to the first to form a ring. If cable breaks anywhere no computers can use network.
Star All communication takes place via a central computer. If central computer fails no computers can use network. If one cables breaks only the computer connected to that cable is affected.
Hierarchical Network organised in different layers each of which is a separate section linked to network by hub/switch. If an independent network section fails the others continue to function.
 
8.  Data sent around a network goes through a transmission medium. This could be wired or wireless. The most common media are :

Wired
Copper Cable Reasonably fast transmission, extra connections easily added. Data corrupted by electrical interference.
Optical Fibre Very fast data transmission as light through glass cable. Secure and not vulnerable to interference.
Wireless
Radio Slower than wired media but very easy to add or move computers as no wiring.
Microwave Joins two sites in a WAN. Must have line-of-sight and be within 30 miles.
Satellite Expensive but versatile. Can transmit data quickly anywhere in world there is satellite coverage.
Infra-Red Very slow transmission by invisible light through air. Used for inter-device communication not networking.
 
9.  Hubs and switches can be used to break a network up into sections so that if a cable fails the effects are less widespread than if a cable fails in a network that was not broken up. The main cable running through the network is known as the backbone.
 
10.  Two networks of the same type can be connected together using a bridge. Networks of different types must be connected using a gateway. In complex networks suchs as the Internet where data can travel from one computer to another down many different paths a router determines which way to send it.
 
11.  Computers connected to a network are more vulnerable to security threats than stand-alone computers. This is beacuse data on one computer can be accessed from another, transmitted data can be intercepted, it is hard to control physical access and viruses can travel through networks. Extra security measures are implemented on networked computers, usually by a network operating system. Suitable meaures include user names and passwords, file access rights, logs, encryption and firewalls.
 
12.  Advantages of networking a group of computers together include :
  • Sharing of expensive resources such as printers reduces cost.
  • Files stored on a file server can be accessed and used from any station.
  • Access to a centralised database of information is possible.
  • Email can be used to communicate between users of computers.
 
13.  Disadvantages of networking a group of computers together include :
  • The initial outlay on network interface cards, cables etc. can be expensive.
  • The failure of a network cable or server might cause the whole network to stop functioning.
  • Viruses could be transmitted over the network.
  • Unless appropriate security measures are taken it could be easier to steal or destroy data stored on a networked computer.

21. The Internet

1.  The Internet is the largest WAN in the world.
 
2.  The Internet is made up of many individual computers and smaller networks known as subnets.
 
3.  To connect to the Internet you need :
  • A multimedia computer or suitable Digital TV control box.
  • A telephone line or cable TV connection.
  • Communications hardware such as a modem or an ADSL modem.
  • Software to access services such as a web browser and electronic mail software.
  • A subscription to an Internet Service Provider.
 
4.  The two most common methods of connecting to the Internet are using a modem and telephone line or a broadband connection. Other methods such as ISDN are also available.

Information about Modem Information about Broadband
Connects using a modem and telephone line at speeds up to 56.6KBps. Can be used anywhere there is a 'phone line. Must dial-up before use. Cost around 2p/min or £12/month. Suits infrequent users. A high speed connection usually made using either ADSL and a telephone line or a cable TV connection and a cable modem. Speed ranges from 560KBps to 2048KBps. Always connected to Internet. Only available to about 85% of UK. Fixed cost of £15+ per month. Suits frequent users.
Advantages of Modem Advantages of Broadband
Can connect anywhere there is a telphone line. The fastest transmission speed (ten times quicker than a modem).
Pay for how much you use it, so cheapest if not used very much. Pay a fixed monthly fee, then can use it as much as you want.
 
5.  The most important services that are provided on the Internet are listed below :
 
 
Service Details
Electronic Mail Using electronic mail (email) you can send messages and computer files to any Internet user around the world.
  • Each user has a unique address such as john@heathtrading.co.uk
  • Files such as word processed documents can be sent with an email as an attachment.
  • Messages are stored in a mailbox. They can be put into folders such as Inbox and Outbox.
  • You can automatically reply to an email you have received or forward an email you have received to another person.
  • An address book stores the email addresses of people you email regularly so you don't have to remember them.
  • An email can be sent to many people simultaneously. A stored list of people to send an email to is known as a mailing list.
  • A digital signature can be added to an email so the recipient can verify the identity of the sender.
  • Advantages : Email can arrive more quickly than post and information can be sent more cheaply by email than by most other methods. You can read your email from any computer.
  • Disadvantages : Less people have access to email than to post, packages can't be sent by email, viruses can spread through email and SPAM email can be a nuisance.
World Wide Web The Word Wide Web (WWW or web) is a vast collection of information on many subjects which anyone can read and add information to.
  • The web is made up of many sites, each identified by an address (or URL). A site is made up of pages.
  • Information on a site can include text, images, sound and video.
  • A hyperlink is text or a picture that when clicked on takes you to another web page.
  • To access web pages you need to use a web browser package.
  • A web browser lets you view web pages, navigate (move) between pages, keep a list of your favourite sites, remember sites you have visited recently (your history), and provide feedback to a site through forms.
  • Copies of recently visted web pages may be stored on your hard disk drive so that they can be redisplayed quickly. This is known as caching.
  • A search engine is a web site that you can use to seach other web pages for information on a particular topic.
  • Your home page is the page that is displayed when you load your web browser.
  • A web portal is a page that acts as a starting point to obtain information from the world wide web.
  • Web sites are defined is a language called Hypertext Markup Language (HTML).
  • The web can be used for many purposes such as research, advertising, distributing software, customer support and e-commerce.
  • Advantages : Large amount of information, information can be up-to-date, multimedia information.
  • Disadvantages : Information may be unreliable as quality of source not known, can be too much information, not everyone can use the web.
USENET Newsgroups Newsgroups provide a discussion forum on which people can ask questions which other users can respond to and on which notices of general interest can be posted.
  • A program called a news reader is required to access USENET.
  • There are many newsgroups, each of which is dedicated to a particular topic.
  • Advantages : One message will be read by many people who are interested in a topic, good way to communicate with people who know about a topic.
  • Disadvantages : Some newsgroups overtaken by SPAM messages, difficult to know true source of a message.
Internet Relay Chat Internet Relay Chat (IRC) let users "chat" to each other over the Internet.
  • A chat is in the form of text rather than speech.
  • Chatting is interactive as users have the oppportunity to immediately respond to messages from other users.
  • Advantages : An interactive system.
  • Disadvantages : Must be logged on at same time as other users to chat, people can disguise their true identities.
File Transfer Protocol File Transfer Protocol (FTP) is used to retrieve files over the Internet.
  • Some FTP servers require you to enter a username and password others let you access files anonymously.
  • FTP is also used to upload files to the Internet such as a web site you have created.
  • Alternatively files can be downloaded using the World Wide Web.
Broadcasting Radio and low quality television pictures can be broadcast over fast broadband Internet connections.
  • You need a broadband connection to access these services. A modem and telephone line is too slow.
  • Advantages : Can watch/hear any program anywhere, big range of programs, easy and cheap to set up as a broadcaster.
  • Disadvantages : Quality of pictures not very good, skills and hardware required to received broadcasts.
 
6.  Nobody controls the information that is on the Internet so unsuitable material such as pornography and racist abuse can be found. Filtering can be used to try and prevent access to this material.
  • Advantages : Can prevent access to unsuitable material.
  • Disadvantages : Can sometimes let unsuitable material through, may block useful sites.
 
7.  A private network within a company that provides facilities such as web sites and email is known as an Intranet. An Intranet can be connected to the Internet through a firewall.
 
8.  Here are some advantages of the Internet :
  • An incredible range of information can be obtained through the world wide web and USENET.
  • Information can be instantly updated on the Internet.
  • Information can be accessed and sent quickly and conveniently using the Internet.
  • The Internet brings people across the world closer together.
 
9.  Here are some disadvantages or limitations of the Internet :
  • You can not know who has put information onto the Internet, why they have put it there or whether it is true or false.
  • The slow speed at which the Internet can be accessed by a modem places limitations on the types of information that can be sent via the Internet.
  • There are some concerns over how securely information can be sent over the Internet.
  • Many people don't have access to the Internet.

22. E-Commerce

1.  Electronic Commerce or e-commerce is the buying and selling of goods over the Internet.
 
2.  Electronic commerce has become popular due to the growth in the number of Internet users and the development of the world wide web.
 
3.  Companies which only sell goods on the Internet are known as e-businesses.
 
4.  A company that is involved in e-commerce must set up a website and register its address. Appropriate methods of payment collection, order delivery and advertising must also be developed.
 
5.  The costs of setting up an e-commerce web site can be high as computer hardware must be purchased and a web site must be developed.
 
6.  The act of buying a product is known as a transaction. E-commerce transactions can be carried out very cheaply because there is very little human involvement. A transaction involves the selection of goods, the transfer of payment and the despatch of the goods.
 
7.  Examples of e-commerce businesses include :

Online Banking Customers manage their accounts on the Internet. Cash can be taken out at ATMs.
Ticket Booking Tickets can be booked online. Availability and prices can be easily checked.
Auctions Items can be auctioned online. Internet auctions can attract more bidders than ordinary auctions.
Car Importing Cars can be purchased from other European countries for importing into the UK. Cars bought abroad can be cheaper than cars bought here.
Books and CDs Online book and music shops can offer a wider range of products than actual shops.

 
8.  Security is an important issue when goods are purchased on the Internet.
  • It is important to check that a website you are buying from is run by a reputable company.
  • Credit card details should be encrypted before they are transmitted so that they can not be stolen by hackers.
  • As e-commerce web sites are often linked to a company's other computer systems, it is vital that these systems are also secure.
 
9.  Benefits of e-commerce to the customer are :
  • A customer can shop from home. There is no need to go out so time spent shopping can be reduced.
  • It is easy to compare product descriptions and prices from different companies.
  • E-commerce creates more competition between companies which means lower prices.
  • Specialist products which are not usually available on the high street can be found.
 
10.  Benefits of e-commerce to a business are :
  • A company can sell its goods in a larger market place if it trades on the Internet so it has more potential customers.
  • The cost of selling goods is lower because the sales process is highly automated.
  • An e-commerce website can be open all day every day with miminal human involvement.
 
11.  E-commerce will never completely replace traditional shops because :
  • Some people do not have the skills or equipment to access the Internet.
  • Some people enjoy shopping and treat a visit to the shops as a leisure activity.
  • Some people are concerned about the security of e-commerce transactions and so are unwilling to buy on the Internet.
  • Some purchases such as clothing are highly personal and people like to try out items before they buy them.
  • To engage in some activities such as having a haircut you have to visit a real building.

23. Global ICT Services

1. A service is something that you can buy which does not exist as an object.
 
2. Haircuts, operations, legal advice and secretarial services are example of services.
 
3. A service which processes information using an information system and can be provided from anywhere in the world is known as a Global ICT Service.
 
4. For global ICT services, the location of the service purchaser and the service supplier is irrelevant. They can be located anywhere in the world.
 
5. A global ICT service takes some information from you, processes it in some way and then returns the outputs of this processing to you.
 
6. The information to be processed by a global ICT service (inputs) are usually sent to the service supplier electronically (e.g. by FAX, email) by the service purchaser. It is then processed by the service supplier. The results of processing (outputs) are are returned electronically to the service purchaser.
 
7. 

This table lists some example global ICT services :

Service Details Inputs Outputs  
Secretarial
Services
A secretary anywhere in the world can receive rough notes or sound recordings of information by email and turn this into a professionally presented document. Rough
Notes
Typed
Document
Bulk Data
Entry
Large volumes of data can be entered into computer databases in foreign countries and then sent to the UK. Workers in some countries will do this in return for lower wages than workers in the UK. Completed
Data
Collection
Forms
Data
in
Database
Web
Design
A plan describing the layout of a web site together with information to be contained on the web site can be collected in one country and emailed to a web designer in another country who can produce the web site. Specification
For
Web Site
Web
Site

24. Data Logging

1.  Data logging is the automatic collection and recording of data as it is produced.
 
2.  A data logging system consists of some sensors, an interface, a computer and software to record data.
 
3.  A sensor is a device which measures a physical quantity such as the temperature and then sends a voltage to the computer representing the quantity measured.
 
4.  Sensors can be either digital or analogue :
  • Digital sensors are either on or off.
  • Analogue sensors produce a varying voltage which depends on the quantity measured.
 
5.  Example sensors are heat sensors, light sensors, pressure pads and buttons.
 
6.  An interface is positioned between the sensors and the computer. It performs two tasks :
  • It protects the computer from potentially dangerous voltages produced by sensors.
  • Using an analogue-to-digital converter (ADC) it converts the analogue voltages produced by sensors into digital signals that a computer can process.
 
7.  When an analogue sensor is first connected to an interface it may need to be calibrated. Calibration matches sensor voltages with units that humans can understand. During calibration two sensor voltages are matched to known units. Using this information any voltage produced by the sensor can be converted into units that a human can understand.
 
8.  Data logging software will take readings from the sensors at fixed intervals over a specified time period. Later the software will analyse the data which may be output as a table or a graph.
 
9.  If the sensors can not be located by the computer that will analyse the data then a remote data logging system can be used. There are two different types of remote data logging systems :
  • Transmission : Data is transmitted by a medium such as a telephone line or radio transmission from the sensors to the computer.
  • Storage & Collection : Data is stored by the sensors in RAM in a small device called a data logger which can be collected at a later date and taken to the computer to transfer the data.
 
10.  Advantages of data logging systems over manual data collection methods :
  • Measurements always taken at the right time.
  • No errors in the measurements.
  • Data logging systems can be placed where humans can't go.
  • Graphs and analysis can automatically be performed on the data.
 
11.  The main disadvantage of a data logging system is the initial purchase cost.
 
12.  Often the readings taken by a data logging system are used to turn devices such as heaters and lamps on and off. Such systems are known as control systems.

25. Control

1.  A computer control system is a computerised system designed to control a process.
 
2.  A control system consists of some sensors, devices, an interface, a computer and software to control the system.
 
3.  A control system gathers data using sensors. Using an algorithm the system will decide when to turn devices on and off based upon the information provided by the sensors.
 
4.  A sensor measures a physical quantity such as the temperature and then sends a voltage to the computer representing the quantity measured.
 
5.  Example sensors are heat sensors, light sensors, pressure pads and buttons.
 
6.  A device can be used to make changes to the real world environment that a control system operates in. Devices are also known as actuators.
 
7.  Example devices are buzzers, motors, pumps, lamps and liquid crystal displays.
 
8.  An interface is positioned between the sensors and the computer. The interface contains two important components :
  • An Analogue to Digital Converter (ADC) which changes the analogue voltages produced by the sensors into digital signals that the computer can process.
  • A Digital to Analogue Converter (DAC) which changes the digital signals that the computer produces into analogue voltages which can control the devices.
 
9.  The control software uses an algorithm to decide when to turn the devices on and off based upon the inputs from the sensors. The algorithm is usually planned as a flowchart and then entered into the computer using a programming language.
 
10.  Feedback occurs when the preious outputs from a control system change the inputs, usually to keep the system in a stable state.
 
11.  Information about the current status of the sensors in a control system is often presented to a computer by the interface as a byte of data. Each bit in the byte represents the current state of one digital sensor, with a 0 indicating the sensor is off and a 1 indicating the sensor is on. Devices can be activated/deactivated by the computer setting bits associated with the devices to 0 (off) or 1 (on).

 
12.  Advantages of computer control systems over manual systems :
  • Faster response time.
  • Low operating costs (fewer wages to pay).
  • Very reliable. A control system will not get tired or make mistakes.
 
13.  The main disadvantages of computerised control systems are :
  • High initial costs of design and purchase of system and training.
  • Jobs lost when new system introduced.
  • System will fail if the program that controls it has not been designed properly. If no-one notices this then it could be dangerous.
 
14.  A computerised control system that is built into another machine is known as an embedded control system. Embedded control systems can be found in burglar alarms, environmental control systems, VCRs, refrigerators and cars amongst many other machines.
 
15.  Computer Assisted Manufacturing (CAM) is the use of computers to manufacture products. CAM systems control CNC devices such as lathes and milling machines to make items. Often the design of the item to be made is produced in a CAD package and transferred electronically to a CAM system to be made. This is known as CAD/CAM.
 
16.  Robots are computer-controlled devices that are capable of motion and can perform a variety of tasks. Robots can be used in situations that are dangerous to humans. They can perform repetitive tasks highly accurately. Robots allow products to be made cheaply but have caused some people to lose their jobs.
 
17.  The flow of traffic around a town can be monitored and controlled by a computerised system :
  • The sequence of traffic lights at a road junction can be controlled by a computerised system.
  • The sequence of traffic lights at different road junctions can be co-ordinated to improve traffic flow.
  • Congestion charging systems can charge drivers for the journeys they make.
  • Entry to car parks and charging can be managed by a computerised system.
  • Satellite Navigation (SatNav) systems can give a driver instructions to tell him how to get to his destination.

26. Control Programs

1.  Robots can be used to carry out many tasks such as welding, exploring and operating in dangerous environments.
 
2.  Robots must be programmed to carry out a particular task.
 
3.  A common type of robot which is found in schools is the turtle.
 
4.  A turtle is usually programmed in a high level language called Logo.
 
5.  Most turtles will understand these commands :
  • PENDOWN
  • PENUP
  • FORWARD
  • BACK
  • LEFT
  • RIGHT
 
6.  The REPEAT command can be user to write programs more efficiently.

27. Data Protection

1. 

Organisations can store and process data more easily and quickly using computerised information systems.

 
2. Because it is easy to process and share information using computers the privacy of the individual might be affected.
 
3. The Data Protection Act 1998 places obligations on organisations that store data and gives some basic rights to individuals about whom data is stored. It replaced the Data Protection Act 1984.
 
4. The Information Commissioner is responsible for enforcing the Act.
 
5. The Act uses these definitions :
 
 
Personal Data  Information about a living individual who can be identified.
Data Subject An individual who is the subject of personal data.
Data Controller A person or organisation that stores personal data.
 
6. An organisation that wants to store personal data on computer must notify the Information Commissioner who will create an entry in the Data Controller Register.
 
7.  Organisations storing personal data in structured manual systems do not have to notify the Commissioner but must obey the rules set out by the Act.
 
8. It is a criminal offence punishable by an unlimited fine to store personal data on computer without registering, unless an exemption applies.
 
9. Organisations storing personal data must obey these eight principles. Personal data shall :
  1. be processed fairly and lawfully
  2. be processed only for limited purposes
  3. be adequate, relevant and not excessive in relation to the purpose for which they are held
  4. be accurate and up to date
  5. be held no longer than is necessary
  6. be processed in line with a data subject's rights
  7. be kept securely
  8. not be transferred to countries that don't have similar data protection laws to the UK.
 
10. An individual about whom personal data is stored has these seven rights :
  1. A subject is entitled to view any data that a data controller stores about him.
  2. A data controller must correct or delete any data about a data subject which is inaccurate.
  3. A data subject may prevent processing which could cause damage or distress.
  4. A data subject may prevent processing for direct marketing purposes.
  5. A data subject may demand that any decision which will significantly affect him is not taken solely on the basis of automatic processing.
  6. If a data subject is not happy with the way he has been treated by a data controller then he can complain to the Information Commissioner.
  7. If a data subject suffers actual loss as a result of the use of inaccurate data then he can claim compensation from the responsible data controller.
 
11. Some data is exempt from the Act. This means that parts of the Act do not apply to the data. Data can be either completely exempt or partially exempt.
 
 
Exemptions
Complete Exemptions Partial Exemptions
Access Exemptions Disclosure Exemptions Storage Exemptions
Completely exempt data can be stored without the controller having to register with the Commissioner. The data subject has no right of access to the data. In some circumstances data can be disclosed legally to a party not listed in the register entry. The data can be kept for any length of time.
1. Data held for domestic purposes.
2. Information about national security.
1. Data about the health of a patient.
2. Data about a pupil at a school.
1. Disclosure to prevent crime or for tax purposes.
2. When a court orders that the data should be disclosed.
Data used solely for historical, statistical or research purposes.
 
12. There are a number of limitations to the Data Protection Act :
  1. The Act does not provide individuals with a method to find out who stores data about them.
  2. There are many exceptions of data which are not covered by the act.
  3. Organisations are free to pass on information about you to other organisations so long as they tell you.
13. A code of practice is a set of guidelines that a person employed in a particular job is expected to follow. A code of practice can set out specific procedures that employees should follow to ensure that they obey the law and conduct themselves in an appropriate way.

28. Copyright

1. The Copyright, Designs and Patents Act 1988 governs the illegal duplication of computer software.
 
2. Copying computer software without the permission of the author is illegal. A person who does this is commiting piracy and is known as a pirate.
 
3. In some European countries it is estimated that each legally sold software package is copied illegally an average of seven times.
 
4. Computer software companies rely on the income from the sale of software packages. Illegal copying of software reduces this income and may result in fewer new packages being developed.
 
5. There are three different offences created by the act :
 
 
Offence Penalty
Unauthorised copying of software. Large fine and a prison sentence of up to two years.
The sale of software that is known to be copied. Large fine and a prison sentence of up to two years.
Provision of software or hardware designed to copy a particular package. Fine of up to £2000 and a prison sentence of up to six months.
 
6. Despite the fact that copying software is illegal many people choose to break the law. Therefore software houses use other methods as well to try and prevent piracy :
  1. Copy Protection methods such as entering a unique code to use a software package and dongles make it harder to copy software.

  2. Licence Agreements restrict the use that a person may make of a software package. A licence agreement is a legal contract between the person who buys a software package and the company that developed and sells it. It states what the person who has purchased the software may do with it. A network or multi-user licence agreement grants permission for one copy of a software package to be installed on many computers.

29. Hacking

1. The Computer Misuse Act 1990 governs the unauthorised use of computer systems.
 
2. Gaining unauthorised access to a computer system is known as hacking and a person who does this is a hacker.
 
3. In many cases a person who tries to gain unauthorised access to a computer belonging to an organisation actually works for the organisation.
 
4. After gaining unauthorised access to a computer system a hacker may attempt to steal, change or destroy stored data.
 
5. The Act created three specific offences :
 
 
Offence Penalty
Unauthorised access to computer material. Fine of up to £2000 and a prison sentence of up to six months.
Unauthorised access with an intent to commit further offences. Large fine and a prison sentence of up to five years.
Unauthorised modification of computer material. Large fine and a prison sentence of up to five years.
 
6. Sensible organisations do not rely on the law to protect them from hackers. They take appropriate measures to reduce the likelihood of a hacker accessing or damaging data :
  1. Security measures such as passwords and logs can be used to monitor access to a computer system.
  2. Regular backups are taken so that damaged or changed data can be recovered.
 

30. Health & Safety

1.  Many jobs involve using a computer for a long time :
  • Computer programmers use programming languages to develop new software.
  • Call center workers retrieve and store information in databases.
  • Office workers use a variety of software packages.
 
2.  Using a computer for a long time can affect a person's health. Incorrect use of computer equipment can also pose a threat to safety.
 
3.  The main risks that workers using computers face are :
  • Eyes can be strained by prolonged viewing of a computer monitor.
  • Repetitive strain injuries can occur in the wrist if a keyboard is used without regular breaks.
  • The back and neck can be affected if a computer system is badly positioned or a chair is badly adjusted.
  • Badly designed jobs and software can create stress in employees.
  • Badly maintained electrical equipment can cause electric shocks or fire.
 
4.  By taking appropriate measures such as these, the risks can be reduced :
  • The monitor should be correctly adjusted and room lighting should be checked.
  • Regular breaks should be taken away from the computer.
  • The computer, chair and desk should be adjusted to suit the user.
  • An upright seating position should be maintained.
  • Jobs should be designed to be achieveable and incorporate a variety of tasks.
  • Electrical equipment should be regularly tested.
  • Early symptoms of illness should be regularly checked for.
  • Vision should be tested regularly.
 
5. 

The safe use of computer workstations in the workplace is governed in the UK by :

  • The 1974 Health and Safety at Work Act, and
  • The Health and Safety (Display Screen Equipment) Regulations 1992.
  • Many of the measures listed above are required by these regulations.

31. Security

1. Data security is the application of safeguards to protect data from accidental or malicious modification, destruction or disclosure.
 
2. 

There are four main threats to the safety of data. These are :

Threats to Data Safety
Accidental Damage Media storing data can be easily damaged by poor storage conditions, flood, fire etc. Users can accidentally change or delete the wrong data.
Data Theft Confidential data can be stolen and sold.
Hacking Hackers can gain unauthorised access to a computer system.
Computer Viruses Computer viruses can deliberately delete or damage data.
 
3. 

Organisations which store important data take appropriate security measures to reduce the risk of data loss or theft. Possible measures include :

Computer Security Measures
Safe Storage of Data Using high quality media and storing data in appropriate conditions reduces the risk of accidental damage.
Limiting Physical Access It is possible to limit access to some computer systems physically using locks, swipe cards etc. This can reduce the risk of unauthorised personnel accessing or damaging data.
User Names and Passwords The use of a user name and password system can restrict who can access what data on a computer system.
Biometric Measures Biometric systems can identify people by recognising one of their unique physical characteristics.
File Access Rights File access rights specify what actions a user can take on a file or directory. Example access rights are read only, change and append.
Logs When a user name and password system is in use a log can be kept of who has done what on a computer system. This may deter unwanted activity and will help track down anyone who has made unauthorised used of a computer.
Encryption Encryption is converting data into an apparently meaningless form so that it can not be read by unauthorised users.
Backups A backup is an extra copy of data. If the original data is damaged then the backup can be used to recover the correct data.
Virus Checks Using a virus checker to identify viruses before they infect a computer can reduce the risks of a virus destroying data.
Firewalls A firewall is device or program that monitors and restricts the data that flows between a home computer or private network and a public network such as the Internet.
Digital Signature A digital signature is a binary code that uniquely identifies a person. Digital signatures are used to identify who sent an email and check the email has not been altered.
 
4. Which security measures to use for a particular computer system will depend upon :
  • How important the data is.
  • How confidential the data is.
  • How likely it is that someone will want to steal, change or destroy the data.
 
5. If the stored data relates to identfiable individuals then a company must keep data secure to comply with the Data Protection Act.

32. Backups

1. Organisations employee many security measures to guard against loss or corruption of data but this can never be completely prevented so backups are kept.
 
2. A backup is an extra copy of data which is stored in case the original copy is damaged. If the original copy is damaged then the data can be restored from the backup.
 
3. 

Organisations should have a backup strategy which details how data will be backed up. The strategy should include :

  • How often should data be backup up ?
  • When should data be backed up ?
  • What storage medium should the backups be stored on ?
  • Where should backups be stored ?
  • Should backed up data be compressed ?
  • Who will carry out the backup procedure ?
  • What will happen if data is lost ?
  • How many copies to keep ?
 
4. 

How backups are produced often depends upon the type of processing that is in use :

Backups by Type of Processing
Batch Processing Backups are kept using the Ancestral or Grandfather-Father-Son system.
Transaction Processing Periodically a copy of the master file called a file dump is made. Recent transactions are stored in a transaction log file.
Real-time Processing A lot of backup hardware is employed to reduce the risk of failure.
 
5.  An archive is a file containing old data which is no longer used but which must be kept. Archive files are often kept under the same conditions as backups.

33. Viruses

1. A virus is a program which :
  • Can make copies of itself without the user knowing it is doing this.
  • Only spreads when the user carries out an action such as running a program or opening an email.
  • Does something annoying or destructive.
  • Tries to hide itself so the user can not delete it.
 
2. A worm is a special type of virus that can spread through a network like the Internet without a user doing anything.
 
3. A computer "catches" a virus when a program to which the virus has attached itself is used. The virus will copy itself onto the computer's hard disk.
 
4. Likely sources of viruses include floppy disks, CD-ROMs and the Internet. Viruses which spread on the Internet by attaching themselves to emails can spread very quickly.
 
5. Viruses are usually introduced onto a computer system accidentally by a user who does not realise what he is doing. Deliberately introducing a virus onto a computer system is an offence under the Computer Misuse Act 1990.
 
6. There are many thousands of viruses each of which do slightly different things. Possible actions include wasting hard disk space, deleting files and displaying annoying messages.
 
7. Viruses can not damage computer hardware. They can however affect the software that is needed to use the hardware.
 
8. Several measures can be taken to avoid, detect and remove viruses from a computer system :
  • Use only floppy disks and CD-ROMs from respectable sources.
  • Be careful about downloading programs from the Internet.
  • Use a virus checker program to detect and delete viruses.
  • Use a firewall to stop your computer being accessed by other computers or people over the Internet.

34. Validate & Verify

1. It is very easy to accidentally enter incorrect data into a computer system.
 
2. Processing incorrect inputs will produce incorrect outputs. This results in the acronym GIGO which stands for Garbage In Garbage Out.
 
3. Validation and verification checks can be used to reduce the likelihood of incorrect data being stored by a computer system.
 
4. A validation check is an automatic check made by a computer to ensure that any data entered into the computer is sensible.
 
5. 

Common validation checks are :

Validation Checks
Presence Check Checks that data has been entered into a field and that it has not been left blank. e.g. check that a surname is always entered into each record in a database of addresses.
Type Check Checks that an entered value is of a particular type. e.g. check that age is numeric.
Length Check Checks than an entered value e.g. surname is no longer than a set number of characters.
Range Check Checks that an entered value falls within a particular range. For example the age of a person should be in the range 0 to 130 years.
Format Check Checks that an entered value has a particular format or pattern. e.g. a new-style car registration number should consist of a letter followed by 1 to 3 numbers followed by 3 letters.
Table Lookup Check Checks that an entered value is one of a pre-defined list of valid entries which should be allowed.
Check Digit A check digit is a digit attached to the end of a string of digits. It is calculated from the other digits and used to help ensure that the whole string is inputted correctly.
Parity Check Used in data communications to ensure that data is not corrupted when it is sent down a transmission medium such as a telephone line.
 
6. If data is entered into an information system in batches from documents then two additional validation checks can be used. These attempt to identify if any document is missed out or entered twice. They are :
  • Batch Total : A count of the number of documents that data is to be entered from.
  • Hash Total : A value calculated by adding together all of the entries in a chosen field on each document.

The totals are calculated by the user before data is entered and by the computer after it is entered. If the user and computer calculated totals differ then an error is identified.

 
7. A verification check ensures that data is correctly transferred into a computer from the medium that it was originally stored on.
 
8. 

Common verification checks are :

Verification Checks
On Screen Entered data is displayed and the user is prompted to confirm that it matches the data on the input form.
Dual Input Data is entered twice and the two data sets compared. If there are any differences then the data is checked by the user and corrected.
 
9. Neither validation checks nor verification checks can test whether or not the data entered into a computer is correct.

35. Data Collection

1. A data collection form (or data capture form) is used to gather information that will be entered into an information system.
 
2. 

Data collection forms should be designed so that :

  • They can be easily and correctly completed by the person filling them in, and,
  • So that the information on them can be quickly and accurately transferred into the information system by a computer operator.
 
3. 

Following these guidelines will help to ensure that data collection forms are well designed :

  1. Titles and clipart should be used to make it obvious what the purpose of the form is.
  2. Language should be kept simple to avoid the possibility of confusion.
  3. Clear instructions about what data is required and how it should be written down should be provided.
  4. Instructions should tell the person completing the form what to do with the form when it is completed.
  5. Input boxes should be drawn on the form. The person completing the form will be forced to write one letter in each box. This should make the form easier to read and ensure that the person completing the form does not write down more data than can be stored on the computer.
  6. All questions should be relevant.
  7. Tick boxes should be used where possible. These speed up input and ensure that the person completing the form can only choose a valid option.
  8. A section should be added to the form so that the organisation that is collecting the form can keep track of what has been done with the information on it.
 
4. Direct data entry devices can be used to speed up the entry of data from a data collection form and can also improve the accuracy of the input process.
 
5. Appropriate direct data entry methods include Optical Mark Recognition and Optical Character Recognition.
 
6. 

A turnaround document is a document which :

  • Has some information printed onto it by a computer.
  • Has more information added to it by a human.
  • Is fed back into a computer to transfer the added information into the computer.
 
7. Questionnaires are used to gather opinions from a large number of people. Most questionnaires ask multiple choice questions as the answers to these can be automatically input into a computer using an optical mark reader. The results from the questionaires can be analysed to produce charts and tables.

36. Simulation & Models

1. A computer simulation is a computer program which attempts to duplicate or forecast the behaviour of a real life system.
 
2. A simulation is a simplified model of the real life system.
 
3. 

Simulations are used for three reasons :

  • Cost : It can be much cheaper to simulate something than to actually do it.
  • Safety : Some things are very dangerous. Simulating them is safer than actually doing them.
  • Feasibility : Some things are just not possible but we can simulate what they would be like.
 
4. 

Simulations function using variables and rules :

  • Variables : Variables are things in a simulation that can change.
  • Rules : Rules determine how the variables in the model are changed and how they affect each other.
 
5. The mathematical calculations that make a simulation work are known as a model.
 
6. Some simulations require specialised input and output devices.
 
7. 

Spreadsheet software can be used to simulate situations which involve calculations :

  • The numbers typed into the spreadsheet are the variables in the simulation.
  • The formulae which perform the calculations are the rules of the simulation.
 
8. 

Flight Simulators are used to train pilots. Specialised input and output devices are required to operate the simulator. Rules and variables will be used to mimic the operation of a real aircraft.

 
9. A virtual reality (VR) system places the user of a computerised simulation in an artifically created environment. By using sophisticated computer graphics, three dimensional VR headsets and a data glove the user can almost come to believe that the artificially created environment is real. Applications of virtual reality systems include a virtual office, training and recreational gaming.
 
10. Other example uses of simulations include computer games, science experiments, weather forecasting and economic modelling.
 
11. 

Simulations do not copy every aspect of a real life simulation, and so the results produced by a simulation can not always be relied on to accurately predict the behaviour of the real life system :

  • Incorporating all the factors that affect a simulation would make it very difficult and expensive to produce the simulation. The number of variables and rules involved would be massive.
  • Some situations that could occur in real life are so unlikely to happen that the designer of a simulation would probably not think of including the situations in the simulation.
 
12. 

Because of the limitations of a simulation, the results produced by a simulation are often tested in the real world. This is especially important when the simulation relates to safety matters.

37. User Interfaces

1. A user interface is the method by which a human and a computer system exchange information and instructions.
 
2. When you select a software package to use you will base you decision on what the software can do and the quality of the user interface. These points will help you assess the quality of the interface :

  1. What type (Command, Menu, GUI) of interface is it ?
  2. How easy is it to use for novice users ?
  3. How easy is it to use for experienced users ?
  4. Can actions be carried out quickly ?
  5. How easy to understand are error messages ?
  6. What help facilities are provided ?
  7. Is there a tutorial ?
  8. Do many other programs use a similar user interface ?
  9. What are the minimum and recommended hardware requirements to use the interface ?
 
3. User interfaces are usually classified as being one of three different types :

Types of User Interface
TypeDescription AdvantageDisadvantage
Command Line The user interacts with the computer by typing commands. An experienced user who knows a package well can enter commands quicker than he could select options using lots of menus. It is very difficult to remember all the possible commands and exactly how they should be typed.
Menu Driven The user interacts with the computer by selecting options from a menu. The user does not need to remember and type lots of commands. You may have to switch screens to access a menu.
GUI The user interacts with the computer by using a pointing device. Most operations in a GUI are self-explanatory so inexperienced users find them relatively easy to use. GUIs can take up a lot of memory and need to be run on a fast computer. If you have a slow computer, a GUI may work slowly or not at all.
 
4. The most common type of GUI is the Windows, Icon, Menu and Pointer (WIMP) system. The important components of a WIMP system are :
  • Window : An area of the screen which is used to display a particular program or piece of work.
  • Icon : An informative picture / symbol displayed on the screen which the user chooses to select an action.
  • Menu : A list of options which the user can pick from.
  • Pointer : A symbol such as an arrow which is moved by a pointing device and can be used to select objects.
 
5. Most GUIs are WYSIWYG. This stands for What You See Is What You Get.
 
6. A speech driven user interface is controlled by a user speaking commands. The commands are input using a microphone and voice recognition. Speech driven user interfaces can be used when you need your hands for something else, are easy to learn to use, and can not cause repetitive strain injuries. In-car mobile telephones often have a speech driven interface.
 
7. 

When you design a user interface you need to follow appropriate guidelines such as :

Positioning Position items in a logical order on the screen. Usually the user will read the screen from the top down and from left to right, so information should be positioned in this order. Related pieces of information (e.g. surname, forenames) should be grouped together.
Consistency Make each screen that the system displays similar to the others. e.g. always use the same colour background, the same style of writing for prompts, always put the titles and any icons in the same place on the screens.
Cluttering Do not clutter the screen by putting too much information on it.
Colour Use colour to highlight - red is often used for warnings. Flashing symbols can attract a user's attention.
Sound Sound can be used to alert users to urgent events such as an error occurring.
Help Include appropriate help information with the system so that the user can discover how to use the system and overcome any problems he encounters.
Language Use simple language. This is particularly important if the system is aimed at young people.
Input Devices Choose appropriate input devices. e.g. mouse, keyboard, bar code scanner.
 
8. For some applications such as flying an aircraft a special purpose user interface incorporating specialised input and output devices is required.

38. Algorithms & Charts

1. An algorithm is a description of how to carry out a process. An algorithm lists the steps that must be followed to complete the process.
 
2. When a computer carries out an algorithm the computer is said to execute or run the algorithm. Algorithms are entered into a computer using a programming language.
 
3. A flowchart consists of a sequence of instructions linked together by arrows to show the order in which the instructions must be carried out.
 
4. 

These symbols are used to produce flowcharts :

 
5. A system flowchart shows in general terms the operations that will be performed on information in an information system. The arrows on a system flowchart show the direction that data will flow in around the system.
 
6. 

These symbols are used to produce system flowcharts :

 

39. Programming

1. A program is a sequence of instructions which tells the computer hardware how to carry out a particular job.
 
2. A computer programmer will follow the systems life cycle when writing a program and will make use of tools such as flowcharts to design the program.
 
3. Programs can be written using either a low level language or a high level language.
 
4. 

There are two low level languages. They are machine code and assembly language.

 
5. 

A computer can only execute (carry out) a program which is written in machine code.

 
6. 

An assembly language is a set of simpler instructions (or mnemonics) which correspond to the machine code instructions that a computer understands.

 
7. High level languages use instructions which are much more like written English than assembly language or machine code instructions. Each high level instruction can do the job of many low level instructions.
 
8. There are many different high level languages such as C++, COBOL, Logo and BASIC. Different languages were developed for the production of different types of program and for different users.
 
9. 

High level language programs must be translated into machine code before they can be used. This is done automatically by a piece of software known as a compiler or by an interpreter.

 
10. 

This table lists some of the advantages of using low level languages and high level languages to produce programs :

Advantages of High Level Languages Advantages of Low Level Languages
Instructions are much easier to remember and use than low level language instructions.

High level programs are much easier to understand than low level language ones.

Fewer instructions are required to write a program than when using low level language.

A program can usually be developed much more quickly using a high level language than a low level language.

A program written in a high level language on one type of computer can usually be converted to operate on another type of computer quite easily. This is known as portability.

Programs written in a low level language usually take up less storage space and execute more quickly than programs written in a high level language.

40. Data Transfer

1. It is useful to be able to transfer data between two different packages. If this is possible then the user can create documents containing a variety of different types of data. e.g. graph, text, picture.
 
2. Data can be transferred between packages using either copy and paste or standard file formats.
 
3. The process of saving a file from a package in a standard file format is known as exporting.
 
4. The process of loading a file stored in a standard file format into a package is known as importing.
 
5. The importance of storing information in a standard format has grown as more people use the Internet. People view images and exchange music and video using standard formats such as JPEG, MP3 and MPEG. If there were no standards this would not be possible.
 
6. The two standard file formats for files containing writing are text files and Rich Text Files (RTF). Rich Text Files preserve more information about the layout of a document than text files can.
 
7. The two standard file formats for data files are Comma Separated Value (CSV) and Tab Separated Value. These two formats can store the records that are held in a database but can not store other information such as any queries that have been defined.
 
8. The three most common standard file formats for graphics files are bitmap, GIF and JPEG. Bitmap files are usually large and the bitmap format used differs between computers with different operating systems. GIF files take up less space. JPEG files are the most compact format but some detail can be lost from images saved as JPEG files. GIF and JPEG formats are used to store images on the Internet.
 
9. There are three standard file formats for storing and transferring sound and video files. These are :
  • MPEG : Stores video in a highly compressed form.
  • MP3 : Stores music in a highly compressed form (around 1/12th the size of a standard music file).
  • MIDI : Stores the musical notes that make up a piece of music.

Music and videos are often exchanged over the Internet as MP3 and MPEG files. It is illegal to exchange copyright material in this way.

41. Social Issues

1. The impact on society of the use of computerised information systems is known as the Information Revolution.
 
2. 

This table summarises some of the most significant changes that have occurred as a result of the use of information technology.

Lifestyles + Increased automation at work and home allows more leisure time.
Internet makes rich variety of information available to everyone at home.
Internet enhances freedom of information in authoritarian countries.
Cheap and easy to keep in touch with people throughout world (Global Village).
Biometric national identity cards could help trace criminals and terrorists.
Internet, e-commerce and teleworking can help support small communities.
Computer systems can assist people with special needs.
Home learning and computer aided learning systems can help people learn at their own pace.
- More time spent on computer, less time spent socialising.
Violent computer games may affect behaviour.
Lack of control over the content of material on the Internet.
Easy for organisations to store lots of info about you (big brother) including biometric data.
Many of our daily activities depend on computers. What would happen if these systems stopped working?
Employment + New interesting, well paid jobs created in IT industry.
Teleworkers can work from home.
Many lost jobs would have been lost to lower wage economies anyway.
E-commerce encourages trade between different countries (globalisation).
- Jobs lost in manufacturing as control systems introduced.
Retraining required for many workers.
Many teleworkers now work longer hours.
Environment + Data logging systems can monitor the state of the environment.
Electronic storage and transmission of data can reduce the demand for paper and trees.
Teleworking means less people travel to work, so less petrol used.
Computerised processes often produce less pollution than equivalent mechanical ones.
- Increased demand for electricity produces pollution from generation.

42. Banking

1. 

Most people keep money in a bank account because it is safer and more convenient to keep money at a bank than as cash. You can also earn interest on money in a bank.

 
2. People use their bank accounts to :
  • Withdraw and deposit money.
  • Pay for purchases and services.
  • Make regular payments of bills etc.
  • Accept regular payments of items such as wages.
 
3. Banks use computerised information systems to manage accounts because :
  • A large bank may have several million accounts to manage.
  • Computerised systems can store vast amounts of data in a small space.
  • Using a WAN account information can be made available worldwide.
  • Account information can be retrieved very quickly using transaction processing.
  • A large number of automatic transfers and regular payments could not be completed manually.
  • Many measures can be used to keep computerised data secure.
 
4. 

Important features of a bank account are :

Debit Card A card which can be used to pay for goods and services. Information about the account that the card relates to is stored on the card using a magnetic stripe. Newer cards are smart cards and also store data in RAM.
Credit Card Similar to a debit card, but you do not have to pay for items that you purchase with a credit card immediately.
ATM Automatic Teller Machines (ATMs) can be used to widthdraw money from an account and to access other services. To use an ATM a debit or credit card must be inserted into the machine and a password known as a PIN muct be typed on a keyboard. An ATM uses a modem and telephone line to communicate with a bank's central computer.
EFTPOS Electronic Funds Transfer at Point Of Sale (EFTPOS) is the method used to pay for items that are purchased with a debit or credit card. At a shop an EFTOS terminal is used to make a sale. The card is swiped through a reader which reads account information from the magenetic stripe. This information together with the amount to pay is sent using a modem to a bank's central computer so that the money can be immediately transferred from the purchaser's bank account to that of the seller. A voucher is printed showing details of the sale.
Cheques Cheques can be used to pay for goods and services. A customer must write payment details onto a cheque to use it. Information about the account that the cheque should be paid from is printed on the cheque using MICR. The process of transferring money from one bank account to another when payment has been made by cheque is known as clearing, and can take up to seven days.
Statements Each account holder receives a statement periodically which lists the transactions on his account. Database queries are used to select the information to print on a statement. Because many statements have to be produced they are printed on very fast laser printers.
BACS

The Bankers Automatic Clearing System (BACS) is used by companies to automatically transfer money from one bank account to another. A computer equipped with a modem is used to send details of payments to the bank's computer. Most people have their wages paid to them by BACS.

Standing Orders and Direct Debits Standing orders and direct debits can be used to make automatic regular payments of bills. Every day a query extracts the list of payments to be made on that day from an accounts database and the payments are made automatically.
 
5. Some banks let customers access their accounts using the World Wide Web on the Internet. This is known as Internet or Online Banking. Customers can check their accounts, transfer money and make payments online. Security is vital so username and password logins, encryption and logs are used.

43. Supermarkets

1. 

Supermarkets sell products to customers. The customers select their goods themselves and then take them to a till to pay for them.

 
2. 

A supermarket needs an information system which can :

  • Accurately calculate the cost of a customer's purchases.
  • Try to ensure that the store does not run out of products that customers want to buy.
  • Take the payment for goods from customers.
 
3. 

Information about the products that a supermarket sells will be stored as a file in a database. The products file in the stock database will probably contain at least these fields :

Fields in the Products File of the Stock Database
Product CodeItem NameStock LevelRe-Order Level
Order QuantityPriceCategorySupplier Code
 
4. Each product is uniquely identified by a product code which is printed on the product in human readable form and as a barcode in machine readable form. The product code contains information about the country of origin and manufacturer of a product together with a unique product number, but not the price of the product. It is used as the key field in the products file.
 
5. The products file in the stock database will be updated by transaction processing to ensure that it always contains uptodate information about products and stock levels.
 
6. Items must be paid for at a computerised till, known as an Electronic Point of Sale (or EPOS) terminal :
  • The tills are connected to the computer storing the stock database by a LAN.
  • When an item is sold its barcode is scanned at the till and the product details including price are looked up in the products file. If the barcode on the product can not be scanned the checkout operator will enter the product code using a keyboard.
  • The barcode number is validated using a check digit to reduce the likelihood of a number being entered incorrectly.
  • After an item is sold the stock level of the item is automatically decreased.
  • After all of a customers purchases have been entered into the till the customer receives an itemised receipt and can choose to pay by cash, cheque or EFTPOS.
 
7. When a product's stock level falls before its re-order level the product will be automatically reordered by the computer system. A database query will be used to select products which need reordering. Orders could be sent to suppliers by email over the Internet, by post or by FAX.
 
8. Using a computerised information system to automatically monitor stock levels and re-order products when they are required is known as stock control.
 
9. The stock level field in the database stores how many units of a product should be in stock. Sometimes this number may differ from the actual number of units that are in stock. This could occur because of theft or checkout operator error resulting in products being removed from the store without the database being updated.
 
10. A periodic stock check is made so that differences between the actual stock levels and the stock levels stored in the database can be identified. To carry out a stock check the number of items of a product that are on the shelf are counted and the database stock level is updated to match the actual stock level. A stock check is carried out using a small portable computer with a barcode reader.
 
11. A loyalty card is a card issued to a customer of a particular supermarket. A loyalty card contains a unique number which identifies the customer who it belongs to. The number is stored on a magnetic stripe. Whenever the customer shops at the supermarket the computer system stores a record of what he purchases. This record of the types of goods that a customer purchases is used to send targetted advertisements to customers. Customers who use a loyalty card usually earn a small discount on the cost of their purchases.
 
12. Many supermarkets now provide an Internet shopping facility so that customers can order goods over the Internet and have them delievered to their homes.

44. Systems Lifecycle

1. The systems lifecycle is the set of stages that are followed when an information system is developed.
 
2. 

There are five stages in the systems lifecycle :

Five Stages of the Systems Lifecycle
Analysis Analysis is the process of deciding what (if anything) an information system should do.
Design Design is the process of deciding how you will set up your information system using the software packages you choose.
Implementation Implementation is using appropriate software packages to create the system you have designed.
Testing Testing is trying out your system to see if it works properly or not.
Evaluation Evaluation is reviewing your work to see if you have achieved the goals that you set out in the analysis.

45. Analysis

1. Analysis is the process of deciding what (if anything) an information system should do.
 
2. 

An analysis should include these three steps :

Feasibility Study
Breaking Down The System Into Tasks
Requirements Specification
 
3. The purpose of the feasibility study is to determine whether or not a new information system should be created to solve a problem. Interviews, questionnaires, observation and examining documentation can be used to find out about any existing system which can then be described using system flowcharts. The advantages of a new system should be explained and a decision taken on whether or not to develop a new system.
 
4. Top down design should be used to break up the new information system into a number of small tasks which can be tackled separately.
 
5. 

The requirements specification should set out what the new system will do. It is used to inform the design process and to evaluate the work that has been done once the information system has been created. A separate requirements specification should be created for each task you have identified. Each requirements specification should include these five sections :

Introduction
Outputs
Inputs
Desired Outcomes
Alternative Methods

46. Design

1. Design is the process of deciding how you will set up your information system using the software packages you choose.
 
2. A good design will consider alternative possibilities at every stage and justify the decisions that are made.
 
3. 

The design of an information system can be broken down into four smaller steps :

Selecting Software
Selecting Hardware
Planning
Test Plans
 
4. In the software selection you must decide which software packages to use to create your information system. You should identify the activities that you need to carry out, determine how well two or three packages can perform these activities and then make a justified choice of package. One possible way of writing up your software selection is to draw up a table.
 
5. If you have a choice of different hardware devices then you will need to select the most appropriate devices. For example would an ink jet printer or a laser printer be better for a particular job ?
 
6. The items to include in a plan will depend upon the type of task that is being tackled.
 
7. The test plan should explain how you will test whether or not the information system you create meets the desired outcomes you listed in the analysis. The tests you carry out can be absolute or subjective and should use typical, extreme and erroneous test data. The test plan should include an explanation of each test and the expected outputs that each test should produce.
  • Typical Data : Typical, everyday data which your information system should work with.
  • Extreme Data : Data which is acceptable but is on the edge of the boundaries for which an information system should work.
  • Erroneous Data : Data which should not work with you information system. A good information system will display an error message when erroneous data is entered and will not crash.

47. Implementation

1. Implementation is using appropriate software packages to create the system that you have designed.
 
2. During the implementation you must collect evidence to show that you have used the software available with an appropriate degree of skill. This evidence will usually take the form of printouts.
 
3. Printouts should be obtained at various levels of development of the information system to show how it was built up. All printouts must be annotated to explain what they mean.
 
4. You may decide to change your design during the implementation. If you do this then you must explain why the changes have been made.
 
5. If you create a system for a real company you will need to manage the changeover from an older exsiting system to the new one. Four methods can be used for this :

MethodBrief Details
Direct The old system is scrapped and replaced completely by the new system.
Parallel Data is processed by both the old and new systems at the same time until it is certain that the new system works properly.
Phased The new system replaces the old system in one area. When it is believed that the new system works properly it gradually replaces the old one in other areas.
Pilot A small amount of data is processed by both the old and new systems at the same time until it is believed that the new system works properly.
 
6. Training is instructing users how to use a new system. This could done through meetings, informally or by using a user guide.

48. Testing

1. Testing is trying out your system to see whether or not it works as you said it should in the desired outcomes section of the analysis.
 
2. You must collect evidence to show that you have carried out every test in your test plan. The results of these tests must be annotated to explain whether or not the actual results match the expected results set out in the test plan.
 
3. If a test is not passed then you should explain why and if possible correct the problem and then carry out the test again.
 
4. It is very useful if you produce a summary of the results of your testing.

49. Evaluation

1. The purpose of the evaluation is to review the information system that you have created and decide whether or not it is a good solution to the problem set at the start or the project.
 
2. The evaluation must be produced with reference to the original statement of the problem, and the desired outcomes set out in the analysis.
 
3. You must explain which requirements have or have not been met and how well the requirements are met. Possible improvements to the system can be suggested.

50. Documentation

1. A new computer system can be supplied with three different types of documentation. They are a user guide, system documentation and on-screen help.
 
2. A user guide explains how to use an information system. It is intended to be read the user(s) of the information system.
 
3. You should produce a user guide whenever you develop an information system which will be used by other people.
 
4. The user guide should explain how to use your information system, not how to use the software packages that you have created the system with.
 
5. Possible sections to include in a user guide are hardware and software requirements, installing, loading, saving, backing up, troubleshooting and contents together with instructions on what to do with the system when it is loaded.
 
6. System documentation describes the results of the analysis and design of the system, the test plan, and shows how the system has been implemented. It is intended to be read by someone who has to maintain a system, to fix bugs in it that were not found during testing or to add new features to it.
 
7. System documentation includes items such as the results of the feasibility study, a system flowchart, plans for record structures in a database and listings of programs or macros.
 
8. A help system explains how to use a software package on the screen. New software packages are provided with help systems in addition to or instead of a user guide.
 
9. A help system can have several advantages over a printed user guide. These include lower production costs, more extensive information, the use of sound and animations, a search facility, context sensitivity and Internet updates.

GCSE ICT Companion 04 - (C) P Meakin 2004