ICT Revision Guide
ICT Revision Guide
What is a computer?
A computer is an electronic machine that inputs data, processes it under the control of a stored program,
and outputs information. While the data is being processed, data can be retrieved from or saved on backing
storage.
Data is raw, unprocessed information. Information is data that people understand. In order to understand
data, you may have to interpret it:
The number 30112012 is data that can be interpreted as:
Chapter 1: Hardware
A date 30/11/2012
A sum of money $301,120.12
The interpreted data, that is the date or the sum of money, is the information.
Data output
1
Page 1 of 40
Games console a PC designed for playing games, e.g. Xbox. Has these features:
Graphics displayed very quickly
Chapter 1: Hardware
Processors
A processor or microprocessor is built into a microchip that also has memory and other components built
into it. The microchip itself is often referred to as the processor. If there is more than one processor built
into the microchip, then the microchip is referred to as the processor and processors built into it are
referred to as cores.
An important feature of a processor is the speed at which it processes
instructions. If you have more and faster cores, with a larger on-board
cache, applications will run more quickly.
Here is a microprocessor description: Intel Core 2 Duo E8600 Processor
(3.33GHz, 1333MHz FSB, 6MB cache). This has two cores and their speed
is 3.33GHz. The front side bus (FSB) transfers data between the processor
and memory at a speed of 1333MHz. A 6MB cache of RAM memory is
built into the microprocessor.
2
Page 2 of 40
Input devices
Keyboards
A QWERTY keyboard is used with most PCs and laptops. To use a
keyboard efficiently, you need to know the layout and be able to touch-
type. Numeric keyboards only have keys to input numbers and special
Chapter 1: Hardware
characters. An example of a numeric keypad is an automated teller
machine (ATM), also known as a cashpoint.
Figure 1.3 An automated teller
Pointing devices machine (ATM) or cashpoint showing
the numeric keypad
Compared with a keyboard, pointing devices make it easier to point and
click but are harder to use to input text.
Tracker ball like an upside-down ball mouse with the ball on the
top. Move the ball with your thumb.
Trackpad a pad below the space bar on a laptop. Move your fingers Figure 1.4 Graphics tablet and puck
across its surface and the pointer moves on the screen. being used to trace a drawing
3
Page 3 of 40
Hand-held scanner reads the image while being dragged over it.
Flatbed scanner the image is laid flat on the scanners surface.
Sheet-fed scanner reads the image as the paper goes through the
sheet feeder.
Scanners may read only particular types of image, e.g. a bar code
scanner.
Figure 1.5 A bar code scanner
MICR is used to input specially shaped characters printed in magnetic ink. Forms can be pre-printed with
data which can be read by a computer, but printing in magnetic ink is more expensive.
OCR vs MICR
OCR and MICR both read printed characters.
TOP TIP
When you describe the
difference between two
OCR uses reflected light while MICR uses magnetic field patterns.
technologies, each point you
OCR recognises handwriting and different types of printed text but make should mention both
MICR only recognises specially shaped characters. technologies.
Figure 1.6 MICR uses uniquely shaped characters printed in magnetic ink
4
Page 4 of 40
Smart cards
A smart card is a plastic card with a microprocessor chip embedded in it.
Bank and credit cards are usually smart cards, i.e. Chip and PIN (personal identification number) cards.
They are used to pay for goods in shops and to withdraw cash at cashpoints. Cashpoints are specialised
computer terminals with a small screen, numeric keyboard and smart card reader.
Oyster cards are smart cards in widespread use in London to pay for travel. They are preloaded with cash
credits online.
Smart cards can also be affected by electronic radiation and can be copied or edited but they are generally
more secure than data recorded on a magnetic stripe.
A digital video camera or camcorder records moving images with sound. Recordings can be saved on a
Chapter 1: Hardware
memory card or built-in hard disk, and input to a computer.
A webcam is a digital video camera used to view a remote location over the Internet. This may be for
security purposes, interest or communication. Recordings can be made. Simple webcams have a fixed
position but some webcams allow the user to turn them.
Biometric scanners
A biometric scanner reads a persons unique physical characteristics to
identify them, e.g. face recognition. Biometric scanners can be used to
control entry to buildings and used in place of car keys. Although
identification is not entirely accurate, the use of biometric scanners
Figure 1.7 A biometric scanner using
minimises the risk of fraud and theft. fingerprints
5
Page 5 of 40
A touch-tone telephone makes a different beep depending on the button pressed. On the other end of
the line, a computer inputs the beep and determines which button has been pressed. You may then listen
to a voice response from the computer.
Natural language processing uses speech recognition to interpret natural language, e.g. spoken
English. You could use natural language processing to dictate a letter or give instructions to a computer.
Remote control
Remote controls are used to control TVs and garage doors and
inaccessible or hidden devices. However, if the handset is lost or damaged,
the device may not be useable.
Monitors
Monitors or visual display units (VDUs) come in different styles with different screen resolutions, colour
quality and clarity.
LCD (liquid crystal display) monitors have flat screens and are more compact than CRT (cathode ray tube)
monitors. They consume less power than CRTs.
A monitor screen is made up of many dots (pixels or picture elements). The dots are so tiny you do not
usually see them. A screen has a resolution of 1280 by 1024 if there are 1280 dots across the screen,
and 1024 from top to bottom. Higher quality screens display more dots.
The graphics card (or video card) is housed in the system unit and controls the screen display. Higher
quality cards have more colours and produce clearer graphics more quickly.
Touch screen
A touch screen is used for output and input. You touch the screen to control the computer. Touch screens
are mainly used with tablets and smartphones. There is no need for a keyboard but inputting text is slower.
Multimedia projector
A multimedia projector projects the image displayed on a computer screen onto a larger, separate screen,
which can be seen more clearly by a large audience. Interactive whiteboards are large, touch-sensitive
panels used as screens for multimedia projectors. This technology is used in school classrooms and at home
Chapter 1: Hardware
to watch movies and play computer games.
Printers
Printed output is called printout or hard copy.
Some dot-matrix printers are impact printers with a print head that is
a matrix of steel pins. The pins strike a carbon ribbon making patterns
of dots on the paper.
Inkjet printers spray tiny dots of ink onto the paper. Inkjet printers
are non-impact dot matrix printers and are quieter. They produce high-
quality output in monochrome or colour.
Figure 1.9 Enlarged dot-matrix
Laser printers are widely used but are more expensive to buy than printing produced by an inkjet printer
showing how the dots form characters
inkjet printers. Quality is excellent and they print quickly in
monochrome or colour.
Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.
Printers use different types of paper, for example:
Photo-printers
Photo-printers are used to print digital photographs. A digital camera is connected to the printer or the
cameras memory card is read in the printer. Pictures can be printed without using a computer.
Advantages of printers:
A printout is useful if no computer is available.
Disadvantages:
Printing is slow and expensive compared with electronic communications.
Paper is bulky and deteriorates in storage.
Printed materials are more difficult to access and distribute, e.g. digital photos can be emailed and viewed on a
multimedia projector.
Plotters
A plotter draws lines on paper using coloured pens. A flatbed plotter holds the paper still while the
Chapter 1: Hardware
pensmove. Other plotters move the pens from left to right while the paper moves forwards and
backwards.An upright plotter uses very long sheets of paper. Plotters are used in computer-aided
design. Plotters are usually more expensive to buy and slower than printers, but much larger sheets
canbe printed.
8
Page 8 of 40
Speakers
Many computers have speakers. Headphones are two small speakers built into a headset. Sound is needed,
for example, to play music and for speech synthesis.
Sound cards
A sound card controls all input and output of audio. Audio input through a microphone and output
through speakers are usually analogue and the sound card handles their conversion into digital signals
processed by the computer. It also handles digital audio input, e.g. from multimedia applications.
Sound cards have features such as:
Polyphony plays more than one sound or voice independently at the same time.
Output through one or more sound channels, e.g. mono, stereo (2 channels), or quadraphonic
(4channels).
Chapter 1: Hardware
Improves the clarity of compressed audio files, e.g. mp3.
Built-in memory for faster sound processing. Sound cards are built into or
USB, optical and other ports to connect to DVD recorders and other plugged into the motherboard of
a PC, or can be external devices
devices.
that plug into a USB port.
MIDI (Musical Instrument Digital Interface) to connect to electronic
instruments.
Actuators
In control applications, computers make events happen using actuators, e.g. heaters and motors. A buzzer
is an actuator that, for example, warns when the microwave has cooked our dinner. Actuators can perform
physical tasks such as controlling a robot or operating a digger. This can be dangerous for people if their
presence is not detected by the computer.
9
Page 9 of 40
A desktop PC is used for office work at an Estate Agent.
a) State one input device needed and explain why it is needed. TOP TIP
b) State one output device needed and explain why it is needed. Relate your answers to the
context, i.e. the Estate Agent.
c) The office is cramped and the manager purchases an MFD to replace
the photocopier.
i. Name three other hardware devices an MFD replaces.
ii. State one advantage and one disadvantage of purchasing the MFD.
Answers
a) There are several correct answers, e.g. a digital camera is used to take digital pictures of houses for sale to
upload to the Estate Agents website.
b) There are several correct answers, e.g. a colour printer is used to print details of houses for sale to be
given to customers.
c) i. Printer; scanner; fax machine.
ii. There are several correct answers. For example: Advantage: MFDs are more compact than the
individual devices replaced. Disadvantage: If the MFD breaks down this has more impact on office
work than if an individual device is not working.
Chapter 1: Hardware
Exam-Style Questions
1. A printer is a type of: 5. Other than the keyboard, name an input device you
A processor would use to:
B input device a) Select from a menu. (1 mark)
C software b) Convert a page of printed text to a file that can
be word processed. (1 mark)
D output device (1 mark)
6. State whether each of the following is used for
2. Which of these devices is not used to control a
input or output or both. Explain your answers.
screen pointer?
a) Printer (2 marks)
A a mouse
b) Game console (2 marks)
B a trackpad
C a webcam 7. Smart phones have touch screens.
D a joystick (1 mark) a) Explain why a smart phone has a touch
screen. (1 mark)
3. Which type of computer is the most portable?
b) State two uses of a smart phone other than
A supercomputer making phone calls. (2 marks)
B desktop c) Explain why some smart phones connect to
C mainframe external keyboards. (1 mark)
D tablet (1 mark) 8. The resolution of a monitor screen is changed from
4. A biometric scanner controls access to a secure 1280x1024 to 800x600. State one change you
warehouse. One advantage is: would see on the screen display. (1 mark)
A No one can get into the warehouse 9. A student owns a desktop computer and a tablet
B No need to carry a swipe card computer. Explain why. (3 marks)
C Biometric scanners always recognise banned
users
D Identity theft is difficult (1 mark)
10
Page 10 of 40
Memory
A computers main memory is RAM and ROM.
Flash memory in the computer
Comparison of RAM and ROM
RAM ROM Flash memory is a type of ROM
that can be written to and read
Can be written to and read from. Can only read from. from and is used for the BIOS
Holds programs being run and data Stores programs and data permanently. (basic input/output system) in
being processed. PCs. This makes sure the computer
starts up as it should and that all
Volatile it is cleared when the Non-volatile it retains what is stored the parts of the computer work
computer is switched off. when the computer is turned off. together.
RAM microchips are supplied as a ROM microchips are installed in the
module (several chips on a small motherboard.
board) plugged into the motherboard.
11
Page 11 of 40
Flash memory
Memory sticks store up to 32 GB of data and plug into the USB port on a computer. Memory sticks are
sometimes called USB sticks, pen drives and USB pens. They are:
Inexpensive
Small
Lightweight
Chapter 2: Backing storage and memory
Hard disks
A magnetic hard disk stores 500 GB of data or more. On each surface,
the data is stored in concentric tracks and there is a read/write head that
moves in/out to the track where the data is saved.
Types of hard disk:
Figure 2.1 The inside of fixed hard
disk with moveable heads Internal hard disks are built into computers.
External hard disks are portable and often connected to a computer by
TOP TIP
Do not confuse the hard disk
USB.
Data can be read from but not written to CD-ROM and DVD-ROM. Often used for movies.
12
CD-RW and DVD-RW can be rewritten repeatedly up to 1000 times.
Page 12 of 40
Worked Example
TOP TIP
You need to make backups
of your own work and do
1. Give one reason why a backup is taken. this systematically. Apply the
2. Name two types of backing storage media used for backup. theory to your practice.
Answers
1. So you have a copy in case your work is corrupted or lost.
2. Magnetic tape cartridge, external hard disk.
3. In an accessible location near to the computer, in a fireproof safe in the same building, in another city.
13
Page 13 of 40
1. Which of these provides the largest storage 6. Describe two differences between
capacity? RAM and ROM. (2 marks)
A 5 GB 7. Describe two differences between a USB memory
B 128 MB stick and a hard disk. (2 marks)
C 1 TB
D 20Kb (1 mark)
2. A memory stick stores 2 GB of data. How many CDs
TOP TIP
When you are asked to describe the differences
are needed to store the same data? between two technologies, each point you make
A 4 should mention both technologies.
B 3
C 6
8. Many people think main memory and the hard disk
D 2 (1 mark)
are the same. Describe how they are similar, and
3. A DVD is an example of: how they are different. (4 marks)
Chapter 2: Backing storage and memory
A a hard disk
B RAM
C an optical disk
TOP TIP
Many people wrongly use the term memory
D flash memory (1 mark) when referring to both the hard disk and main
memory. Try to avoid such misconceptions and
4. Which of the following is storage media?
demonstrate you understand why they arise.
A CD
B DVD drive
C a kilobyte 9. Why is a hard disk with fixed read/write heads likely
D printer (1 mark) to access data faster than a hard disk with moveable
heads? (1 mark)
5. Preparing backup storage media so that it can store
your files is known as:
A formatting
B optical storage
C backup
D storage capacity (1 mark)
14
Page 14 of 40
Applications software
Chapter 3: Software
Office productivity software, presentation software and project Integrated software has several
management software applications bundled into one
package (e.g. Microsoft Office).
Office productivity software helps you do office tasks and includes: Data is transferred more easily
between the different applications,
Word processing software, e.g. Microsoft Word. Helps you prepare e.g. an Excel spreadsheet can be
documents that include text and pictures. You can edit the text, change copied into a Word document.
the font and size, check your spelling and grammar, print, and save and
retrieve documents.
Using a search engine, e.g. Google, you can search the Web by entering keywords.
Email is accessed using:
an email client running on your own computer, e.g. Microsoft Outlook.
webmail, that is, email accessed using a web browser.
Web authoring software, e.g. Adobe Dreamweaver, is used to create and update websites. A website is a
structured collection of web pages written in HTML (Hypertext Markup Language).
Audio editing software, e.g. Audacity, is used to create and edit music and sounds. You can record live
music and input digital sound files, insert voiceovers, and change pitch and tempo.
Control software
Chapter 3: Software
Control software is used to monitor and control external devices, e.g. robots, and ICT systems, for purposes
such as air conditioning in large buildings. Computers do this using sensors and actuators. Sensors are
devices that can measure variables such as pressure, temperature and humidity. Actuators make changes
under the control of the computer some examples are motors, pumps and heaters.
Educational software
A wide range of educational software supports teaching and learning, e.g. StarFrench helps you learn
French, and SpexClassic helps with teaching design and technology.
Providing a user interface so that you can interact with the computer.
File handling. File-handling software, e.g. Windows Explorer, enables you to format disks, create new files
and folders, and rename, save, open, delete and copy them.
16
Page 16 of 40
User interfaces
An OS can have a:
Graphical user interface (GUI), e.g. Windows. Figure 3.1 A command-line user interface
GUIs are more user-friendly. You do not have to
remember complex instructions or menu options.
Chapter 3: Software
window, the toolbar includes the File, Edit and
View menus. In the View menu, if you point at
Sort by, a sub-menu appears.
Open (activate) a process, e.g. by pointing at an icon and double-clicking the left-hand mouse button.
Move an icon, e.g.by pointing at an icon, holding down the left button, dragging it to the required
location and releasing the button.
Window size and position can be adjusted, e.g. drag the bottom right-hand corner of a window to
change its size and drag the title bar to move it around the screen. The minimize button removes the
window from the screen but does not close it; the maximize button makes the window occupy the whole
screen.
17
Page 17 of 40
Files are grouped into folders. The route to a file is called its path, e.g. C:\Users\Documents\chapter3.
doc. This means that on the hard disk C: in the folder Users, in the sub-folder Documents there is a
file named chapter3 which is a word processor file.
TOP TIP
Do not format the hard disk
In Windows Explorer, to move or copy a file, select the file, drag it over
another folder and drop it. To delete a file, right-click on the filename
and select Delete.
in your computer as this will
delete all the files on it. You can set the properties of a file, e.g. read-only. A read-only file can
only be opened but cannot be altered.
Software licensing
Software is copyrighted. It is illegal to use it without a software licence. Types of license are:
Open source. Licences are free and you have access to the source code and are allowed to modify it.
Shareware is licensed software that is initially free to try out. However, you must pay for a licence if you
Chapter 3: Software
Creative Commons licences help software producers communicate the rights they keep for themselves
and the rights they give to others.
Worked Example
Answers
a) Any reasonable answer, e.g. word processor, database, spreadsheet, email.
b) Operating system.
c) It would be illegal to play the game without a license that allows this. The license will tell Steven what use
he can make of the software, e.g. he can only install it on one computer and make one back up.
d) Any reasonable answer, e.g. run disk defragmenter.
18
Page 18 of 40
1. What type of software is used to prepare a talk to 5. Which of the following would it be illegal to copy
be given to a large audience? and give to a friend?
A Spreadsheet A Software with a Creative Commons
B Desk Top Publishing Attribution licence
C Email B Public domain software
D Presentation (1 mark) C licensed software
D open source software (1 mark)
2. You receive an email from one friend and send it to
another friend. This is known as: 6. Describe two tasks that could be done using audio
A deleting editing software. (2 marks)
B attaching 7. a) Name one example of an integrated software
package. (1 mark)
C forwarding
b) Name two different applications integrated
D replying. (1 mark)
within the package. (2 marks)
3. Which of the following is not applications software:
8. Describe how you would format a USB memory
A operating system stick using a GUI. (4 marks)
B word processing
C video editing
D web authoring (1 mark)
TOP TIP
When you are asked to describe a process, make
4. Which of the following is false? sure each step in the process is in the right order
A A folder may contain sub-folders. and clearly described.
B A folder may contain files.
Chapter 3: Software
C mybudget.xls is a spreadsheet file. 9. a) Describe two tasks carried out by the operating
D A file contains folders. (1 mark) system. (2 marks)
b) Describe what the operating system would do if
five programs wanted to use at the same time a
processor with four cores. (1 mark)
19
Page 19 of 40
Networks
A network is two or more connected computers that can share resources and communicate.
Connects computers across a small to medium-sized geographical area, e.g. an office, school or campus.
Shares resources, e.g. hardware and data.
Enables communication between computers connected to it, e.g. using instant messaging.
Is administered centrally.
Most LANs are client/server networks. Client computers (or network stations) are the computers
connected to the network. Clients communicate with each other through the server. The server has a faster
processor, more RAM and more backing storage than client computers. A large LAN may have several
servers. For instance, a file server may look after the organisation of the files on the network; a database
server hosts a database management system and a database on the network.
A peer-to-peer LAN does not use a server. Every computer communicates directly with the other
computers on the network. Because of performance limitations, it is limited to small networks of fewer than
10 computers.
55
Page 20 of 40
Users access rights can be administered centrally, e.g. the marketing staff can access their own files, but not the
files of the human resources staff.
The network can be maintained from any network station, e.g. if a password has been forgotten, it can be reset.
Security can be administered centrally, e.g. automatic backups and virus protection.
Disadvantages
The initial set-up costs can be higher because a server and network cabling are needed.
Viruses are more easily spread across networks.
Routers which enable several computers to communicate at the same time through a wireless access
point.
WLANs are slower than cabled LANs and are used where it is impractical to
use a cabled LAN, e.g. in the home. The range of a WLAN can be limited,
TOP TIP
Encryption is encoding data so
e.g. because of impenetrable walls. The range can be extended using a more that it cannot be understood
up-to-date wireless router or a wireless signal booster. by someone who does not
have the encryption key.
Connection to a WLAN is limited to authorised users by a WEP (Wired
Equivalent Privacy) key, which must be entered before connection. WEP encrypts data on the network, but
has been superseded by WPA (Wi-Fi Protected Access), which provides stronger encryption.
Wireless access points are installed in Bluetooth
public places, e.g. railways stations, Bluetooth is a form of wireless
enabling widespread access to the communication designed to
Internet. enable devices that are within 10
meters of each other, e.g. a laptop
and a smartphone, to
Wide area network (WAN)
communicate. Data is transferred
A WAN connects computers across a at a rate of 720 Kbps.
large geographical area, e.g. a city or
Figure 9.1 A bluetooth enabled watch
that connects to your smartphone internationally. Information is
transmitted in many ways; e.g. using fibre optic cables and satellites.
56
Page 21 of 40
LAN LAN
LAN
LAN LAN
LAN
United Kingdom
Figure 9.2 A wide area network (WAN)
The Internet
The Internet consists of many linked but independently maintained and administered networks. Each
network on the Internet is responsible for formulating its own policies, procedures and rules.
To connect to the Internet using a PC, you need an Internet Service Provider (ISP). You also need a web
browser, email and other software that allows you to use the services and facilities available on the
Internet; and a modem (modulator/demodulator) which converts the digital signals from a computer into
analogue signals that can be transmitted over a telephone line.
Bandwidth is the volume of data that can be transmitted over a network connection.
Narrowband users dial up their ISP using a telephone. Data is transmitted at speeds up to 56 Kbps. This
is slow but inexpensive.
Figure 9.3 A web page accessed using the Microsoft Internet Explorer browser
Access information and join discussions, e.g. using newsgroups and forums.
Watch TV and listen to the radio.
Access customer support, e.g. FAQs or download a service guide for a printer.
Build your own website.
Finding information on the Web
You can search for and access information by:
Surfing: navigate by clicking on hyperlinks, enter a web address or use a search engine.
Using a directory, e.g. Yahoo! Directory shows a list of broad categories available, e.g. Arts and
Humanities, broken down into subcategories. When you select a category, a list of subcategories is
displayed. You select deeper and deeper until you find the information you want.
Using a search engine, e.g. www.google.co.uk. Type in the address or use the search facilities built into
the browser, then enter keywords.
Using a web bot. Bot is short for robot, and a web bot is software that can run automatically on the Web
for searching and alerting you to items of interest.
Intranet
An intranet is a local version of the Internet used within an organisation. Intranets provide many of the
services available over the Internet, e.g. email, chat, websites and search, but only for authorised users
within the organisation.
If an organisation has an intranet and allows secure access by people working off site, e.g. at home, it is
referred to as an extranet.
A VPN (Virtual Private Network) is a private, secure connection that runs across the Internet. Its purpose is similar
to an extranet but network traffic will be encrypted and Internet protocols such as TCP/IP may not be used. It can be
thought of as a separate pipe inside the Internet.
59
Page 24 of 40
Webmail, e.g Hotmail. This runs within a browser and you log on to a website to retrieve your email.
Access to email is slower than using an email client and there is a more restricted range of features,
An email client, e.g. Microsoft Outlook, is software that runs on your computer and enables you to send
and receive email. An email client tends to run more quickly than webmail and it will have a wider range
of customisable options, but it has to be installed and can be more complex to use.
Sending email
To create a new email message in Microsoft Outlook, with the Inbox open on screen, click on the New
button in the toolbar.
In the To... field, enter the email address of the person you are sending it to, or click on the To... field and
select an address from the Contacts.
In the Cc... field, enter the addresses of people the email will be copied to.
If you want to send a copy of the email to someone and want to hide this from the other recipients, enter
their email address in the Bcc... field.
In the Subject field, enter a phrase that describes what your email is about.
Enter your message.
Attach any files to be sent with the email, e.g. a spreadsheet file.
Press Send and your email is placed in the Outbox.
If you have a permanent connection to the Internet, the message will automatically be sent. Otherwise
click on the Send/Receive button in the toolbar.
60
Page 25 of 40
Online shopping
You can order goods online and pay for them using a credit or debit card. The goods are delivered by post to
the address you specify.
Online shopping can be convenient:
A mailing list uses email. Members send and receive messages from the list. Not all groups are open to
everyone.
61
Page 26 of 40
A chatroom is a group of people communicating with one another interactively in real time. Some
chatrooms discuss specific topics, but many chatrooms cover a range of subjects.
Instant messaging enables you to chat privately with another person. Messages are sent immediately.
Chapter 9: Communications, networks, the Internet and email
Video conferencing
Video conferencing enables users to see and speak to each other at a distance, e.g. using Skype. It can be
one to one or involve several people communicating at the same time. Video camera systems can be simple
webcams or may be able to zoom in and out. The display could be on one or more monitors or a large screen.
Web 2.0
Web 2.0 describes a trend towards collaboration and sharing between web users. These web services are
associated with Web 2.0:
Social networking where you can interact with a circle of friends, those with similar interests or a
wider community, e.g. Facebook.
YouTube enables members to upload videos and allows anyone to view and comment on them.
Worldisround encourages world travellers to upload and share pictures and add commentary to make a
record of their experiences for friends and family at home.
iTunes and Spotify sell digital music which can be downloaded. Users can organise and browse their
music collections.
Blogs are online diaries with narrative, pictures and hyperlinks. Anyone can set up a blog on almost any
topic, e.g. hollywoodlife.com is a celebrity news blog.
Wikis enable you to describe and comment on topics in collaboration with other web users, e.g.
Wikipedia is an online encyclopedia. Anyone can contribute but this is moderated so that what is
available is often written by experts.
Internet security
There are many threats from the Internet.
Threat Protection
Hacking is unauthorised access to your computer or Use a username and password. Dont give these to
files and to your personal information, e.g. email and anyone and dont write them down.
bank accounts.
62
Page 27 of 40
A virus is malicious software installed on a computer Use antivirus software which checks for viruses and
without the users consent. Viruses can be attached to removes them, e.g. McAfee VirusScan. Treat files from
emails and downloaded with software. unknown sources with caution.
Phishing is an attempt to find out personal information Look for spelling and grammar errors, which are unlikely
in order to carry out identity theft and fraud, e.g. you in an email from a bank.
receive an email asking you to access your online bank by Suspect a phishing attack when you receive an email
clicking on a hyperlink in the email. However, the link claiming to be from a bank, as they do not usually send
takes you to a fraudulent website where you enter your unsolicited emails.
username and password. These are stolen and used to
take money from your bank account. Check that you have an account with the bank.
If you are worried your bank is really trying to contact
you, break the connection with the email then contact the
bank directly.
Remember that you are unlikely to win a competition you
havent entered!
Pharming is an attempt to collect personal information Detect and destroy spyware using antivirus software and
when users connect to legitimate websites. Spyware specialised programs, e.g. Spybot Search & Destroy.
installed on a users computer logs their personal
information as they enter it.
Adware is unsolicited advertising which often generates Block adware and pop-ups in a browser or using antivirus
pop-up adverts. software and specialised programs, e.g. Spybot Search &
Destroy.
Access to inappropriate information, e.g. children Use parental control (or filter) software to restrict
accessing pornography. childrens access to inappropriate information, e.g.
CYBERsitter. Features are:
Access to some web addresses, searches on some
keywords and sending some personal information are
blocked.
The URLs visited are recorded.
Parents are notified by email that blocking is occurring.
Parents are able to change filter settings over the Internet.
Cookies are saved on your hard disk by websites and Use a cookie manager to block cookies or remove them
contain personal information that can be accessed by the using a browser.
website.
63
Page 28 of 40
Sincerely,
Brintons Bank Online Account Security.
Brintons Bank plc and Brintons Bank Scotland plc are authorised and
regulated by the Financial Services Authority and signatories to the
Banking Codes. FSA authorization can be checked on the FSAs Register at
www.fsa.gov.uk/register. Brintons Bank plc and Brintons Bank Scotland
plc are members of the Financial Services Compensation Scheme and the
Financial Ombudsman Service. Brintons Bank plc.
What you see on the Web is not always what it seems. To be safe and sure that information is reliable, you should
always ask yourself:
Can I trust the source of the information?
Is the evidence from a primary source or are they reporting someone elses account?
Is the source sufficiently knowledgeable?
Is the information likely to be biased or unreliable in some way? Why?
Why am I being asked for personal information?
Will providing this information put me at risk?
Worked Example
a) Explain why using Fido as a password is not good a) Fido is not a strong password as it could
security. easily be guessed by someone who knows
Julie.
b) Give an example of a stronger password and
explain why it is stronger. b) F2i8D67o would be a stronger password
because: it includes upper case and lower
c) Describe two precautions Julie should take to case alphabetic characters and numbers; and
protect her password. it is much longer.
c) Julie should not tell anyone else her
password and she should not write it down.
64
Page 29 of 40
1. A company has four workstations linked by network 6. You receive an email asking you to connect to an
cables to a server. What type of network is this? online bank by clicking on a link in the email. What
A client/server could you do to protect yourself from this phishing
attack? (2 marks)
B extranet
C WAN 7. A home network provides Internet access for two
laptops and a desktop PC.
65
Page 30 of 40
ICT systems
Employees each have their own swipe card and their unique employee number is recorded on it. The
amount of hours they work is recorded on the swipe card by recording
when they arrive (clock in) and when they leave (clock out). All this
information is input into the ICT system each day.
TOP TIP
Validation checks help ensure
that data is reasonable.
Validation checks are made on all the data input and the validated data
is written to the unsorted transaction file. Data
Employee
that does not change every week is saved on the old swipe cards
master file.
77
Page 31 of 40
a seat has been booked the flight information and Flight information
and booking program
booking file must be updated immediately so that
further enquiries show the seat is booked.
Data backup is provided by having two hard disks with the flight information and booking file saved on
both of them. Any changes made to one file are made to the other at the same time. This ensures the file is
available if one disk becomes faulty. This technique is known as disk mirroring.
An online booking system is a real-time processing system because the data input must be processed
before any further input and the output will influence further input.
receipt. Beeper
Computer-aided manufacture (CAM) is the use of a computer to control manufacture. CAM software
generates instructions for the control of CNC (Computerised Numerical Control) machines, e.g.
computerised lathes for turning and drilling.
CAD/CAM systems combine computer-aided design (CAD) and computer-aided manufacturing (CAM).
Engineers use CAD/CAM to create product designs, and then to control the manufacturing process so
products are more consistent.
Computer-aided engineering (CAE) systems analyse engineering designs produced by CAD systems,
and simulate a variety of conditions to see if the design actually works. CAE features are found in many
CAD packages.
Chapter 12: Applications and effects of ICT
Process control is the use of computers to monitor manufacturing processes and to take corrective
action to prevent malfunction; for example, ensuring the temperature is at the right level using sensors.
Robots can be used for assembling cars and welding and can perform physical tasks that could be
dangerous for humans. Robots can be programmed to do tasks using programming languages or using
teach and learn methods,
where the robot is Projection screen
physically moved through
the actions you want it to Projectors
do, and the computer
Cockpit
converts these into a
program, which enables
Trainee pilots seat
the task to be repeated.
Weather forecasting
Weather forecasts are based on data collected using weather stations, weather balloons and satellites:
Weather stations are groups of sensors that collect information about the current weather. They may
have sensors for wind speed and direction, air pressure, temperature and rainfall. The data that is logged
is collected on a computer over a network. As well as being used for forecasting, they can also help
councils and motorists plan for bad weather conditions.
80 Weather balloons have a more complex and varied set of instruments than weather stations.
Page 34 of 40
Logistics
Logistics software is used to plan and control the effective delivery and
storage of goods and services between the point of origin and the point Figure 12.8 A roadside weather
of consumption in order to meet customer requirements. station
Computer-assisted learning (CAL) software helps students learn. CAL provides immediate feedback;
enables students to recognise their weaknesses and improve; displays encouraging messages; and can be
accessed using a VLE. Drill and practice programs help students consolidate learning. Tutorial
software introduces and teaches new material to students. Simulations model real-life situations so the
software can be used in the classroom without risk or wastage.
School information and management systems (SIMS) are widely used to help with the day-to-day
running of schools. They can produce class lists, create timetables, provide automatic reporting, improve
communications quality, provide fast access to information and produce statistics and accounting
information automatically.
Libraries use ICT systems to: keep records of books that have been borrowed; provide online searchable
catalogues; provide access to electronic books; keep records of borrowers; and send reminders to
borrowers who have not returned books.
Law enforcement
The police use ICT systems to help fight crime. National databases help the police identify offenders.
Other uses of ICT by the police include: managing cases and preparing reports; analysing statistics;
tracking criminals who have been tagged; developing contacts with police worldwide; profiling of
potential criminals; and accessing information remotely through wireless network links on police cars.
Law firms use ICT to create legal document templates, find information about past judgements, and
obtain information about legislation in other countries.
81
Page 35 of 40
Magnetic resonance imaging (MRI) and computer axial tomography (CAT) scanners produce
images that can be viewed in 3-D.
Medical expert systems analyse questions input by a practitioner and provide decision-making support
and suggest alternative diagnosis or treatment.
Chapter 12: Applications and effects of ICT
Using telemedicine, patients can visit a doctor online and doctors can treat their patients at a distance.
Entertainment and leisure
The Internet can be used to communicate with friends and family with webcams and video calls.
Computer games of all genres provide entertainment and can be used on a PC or on a games console.
Using media streaming, you can listen to music, watch TV and watch videos on desktop PCs and mobile
devices.
Personal performance during sport can be monitored by mobile devices using satellite navigation, and
recorded for later analysis.
Social impact
The widespread use of ICT has a significant impact on society, e.g. there is a digital divide because some
people have easy access to ICT while others do not.
Employment
Employment opportunities have changed:
There are fewer unskilled jobs, e.g. assembly lines with robots now assemble cars.
The skills needed for some jobs have changed, e.g. administrators previously used typewriters but
now use word processors. Workers in almost every industry at almost every level have experienced
changes in skill requirements.
Jobs have been created in the ICT industry, e.g. in programming, website design and manufacturing,
and jobs have been created indirectly, e.g. in video production.
How people do their jobs has changed, e.g. a teacher can have an entire class work through resources
on a VLE and provide much less input during the lesson, although considerably more planning and
preparation may be needed beforehand.
Teleworking is more common. Instead of going to the office, teleworkers can work from home and
communicate with the office online. They avoid the expense and time of commuting. However,
teleworkers can miss social interaction with colleagues, and being at home can be distracting. There is a
lack of access to the specialist facilities and advice available at work. Companies can employ teleworkers
who live a long way away, even in another country. Less floor space is needed at the office, and there is
82
Page 36 of 40
Companies have improved global communications, both within their own organisations and with other
companies, to facilitate international trade. The use of online communication tools has minimised the
need for employees to travel overseas.
Employees health can be affected by intense and prolonged computer use. Possible problems are:
Privacy
Privacy refers to the right of individuals to determine what information is stored about them and how that
information is used. Problems arise because businesses, organisations and governments hold personal
information which is easily copied and transmitted across international networks.
Different countries have different regulations. In the UK, the Data Protection Acts (1984 and 1998) set
out principles for handling personal information. Data must be:
83
Page 37 of 40
Software piracy which is the copying, downloading, use or sale of software without an appropriate
license.
Copyright violation which occurs when, e.g. music or pictures, are copied or downloaded without an
appropriate licence.
Criminal hackers who gain unauthorised access to an ICT system in order to steal, alter or destroy data,
e.g. they might steal money by transferring it from one bank account to another. Ethical hackers are
employed by an organisation to attempt to gain access to an organisations ICT systems in order to alert
them to vulnerabilities that can be exploited by criminal hackers.
Identity theft where someone pretends to be you in order to commit fraud, e.g. buy goods in your name.
Chapter 12: Applications and effects of ICT
Phishing attacks involve sending unsolicited emails inviting you to a response which involves entering
your username, password and other personal details, e.g. you receive an email which seems to be from
your bank asking you to use a hyperlink in the email to access your bank account. You click on the link
and are directed to a fake website and are asked to enter your bank account details. Criminals use these
details to steal money from your bank account. To avoid this type of scam, do not use the link in the
email.
Security
Security is important in ensuring privacy, data integrity and preventing computer crime.
Physical safeguards include:
File access rights which allow access to particular files to those people
who need it and block others.
Be polite and reasonable. If you feel you are the victim of cyber bullying seek help. Dont bully others.
Use secure wireless networks wherever possible.
Worked Example
Answers
a) For students, there are many advantages of using a VLE. Two of these are:
Students can access learning resources on the VLE at any time, at home or at school.
Students can view their grade profile so they can see the progress they are making.
b) For teachers, there are many advantages of using a VLE. Two of these are:
Learning resources are more organised and are more easily shared.
Students work submitted online can be marked and feedback given online.
c) Teachers may prefer not to use a VLE in the classroom because e.g.:
There is not always adequate network access.
Some activities do not require electronic resources, e.g. sport.
85
Page 39 of 40
1. Which security precaution would help protect you 6. What information is stored in a bar code?
from a virus attached to an email? A The price
A username and password B The product code
B file access rights C The description
C virus scanner D The number of the checkout (1 mark)
D transaction log (1 mark)
7. ICT has had an impact on individuals and society.
2. Which technology is used when you pay for goods a) Describe the impact of ICT on people at home.
at a checkout using a credit card? (2 marks)
A VLE b) Describe the impact of ICT on education.
B CAD/CAM (2 marks)
C EFTPOS c) Describe the impact of ICT on people at work.
D ATM (1 mark) (2 marks)
Chapter 12: Applications and effects of ICT
86
Page 40 of 40