100% found this document useful (8 votes)
12K views

Complete IGCSE ICT Revision Notes

Complete IGCSE ICT Revision Notes

Uploaded by

Qutub Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (8 votes)
12K views

Complete IGCSE ICT Revision Notes

Complete IGCSE ICT Revision Notes

Uploaded by

Qutub Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

ICT Theory Revision Notes

Chapter 1:
Hardware: Physical Software: Programs
components that make that control the
up a computer. computer system.

Application: Allow users


Internal: Internal External:External to do specific tasks. System: Allow
components: components: Hardware to Function.
Eg: Word, Spreadsheet,
Motherboard, RAM, Keyboard, mouse, Database, Photo editing Complier, Linker, Device
ROM, HDD/SDD, Video Scanner, Web cam, and video editing driver, OS, Utilities.
& sound card. Mic,Acutator, Printer. software’s.

SSD:
Advantages: Disadvantages:

1. Faster Data Access Time. 1. Expensive.


2. Faster Data Transfer Time. 2. Offers less storage compared to HDD.
3. Lightweight – Portable.
4. Less Power Consumption.

HDD:
Advantages: Disadvantages:

1. Cheap. 1. Slow Data Access Time.


2. Offers more storage. 2. Slow Data Transfer Time.
3. Heavier than SDD.
4. More power consumption.

CPU (Central Processing Unit): Part of the computer that interprets and executes
commands from the computer hardware & software.
Operating Systems (OS): Systems that that enable computer system to work and allow user
communication with the computer.
Functions:
1. Controls input, output & storage devices.
2. Deals with errors in computer system.
3. Maintains security of computer.
4. Allowing user communication with computer.
User interface: Used By: Advantages: Disadvantages:

GUI (Graphical Gamer, - User friendly. - User is not in direct


User Interface) Photo editor, - No need to learn commands. communication.
Web surfer. - Time saving. - Restricted to a number of
options.
- Uses a lot of memory.
- Need’s an OS.

CLI (Command Programmer, - User is in direct communication. - Not User friendly.


Line Interface) Analyst, - Not restricted to a number of options. - Need to learn accurate
Technician. - Uses less memory. commands.
- Doesn’t need an OS. - Takes too much time.

Emerging Technologies:
AI Biometrics (Artificial Intelligence):
It is a technology that transforms biometrics into a readable code making it easier for the computer
to understand.

E.g.: Fingerprint, Voice recognition, Facial recognition, Iris recognition, etc.

3D & Holographic Imaging:


A technology that allows 3-D images to be produced using lights.

Used: Engineering designs, Architecture, Simulations, Medical Imaging, Gaming etc.

VR (Virtual reality):
A technology that produces an artificial environment using goggles, sensors, lights, etc.

Used: Military, Education, Advertising, Gaming, Property real estate, etc.

Robotics:
A technology that uses machines to perform tasks done by humans.

Used: Military (Drones), Medical, Industries, Factories, etc.


Types of computers:
Advantages: Disadvantages:

PC/Desktop: 1.Large storage capacity. 1. Not portable.


2.Easy to Upgrade. 2. Takes up desk space.
3.Easy to Repair. 3. Needs separate Hardware.
4.Big Monitors. 4. Trailing wires.
5.Faster processing speed.

Laptop: 1. Portable. 1.Easier to get stolen.


2. No trailing wires. 2.Limmited Battery life.
3. All in one Hardware. 3.Keyboard and mouse is slow.

Tablets: 1.Poratble. 1. Easy to loose/get stolen.


2.Fast to Switch on. 2.Limited memory.
3.Longer battery life. 3. Slow and error prone typing.
4. Don’t generate heat. 4. Doesn’t support many file formats.

Smart Phones: 1.Poratble. 1. Easy to loose/get stolen.


2.Longer battery life. 2.Limited memory.
3. Fast to switch on. 3. Slow – error prone typing.
4. Can make phone calls. 4. Small screen.

Smart Watches: 1.Portable. 1. Easy to loose/get stolen.


2.Easy to measure fitness. 2.Small in size – not readable.
3. Custom strap designs. 3.Cannot run heavy computer apps.

Mainframe Computers: 1.Fast processor speeds. 1.Expensive.


2.Large storage capacity. 2.Not user friendly.
3.Supports multiple OS’s. 3. Needs a lot of air-conditioned space.

Types of Computers ADV & DI-ADV Series:


Most Common:

ADVANTAGES: DISADVANTAGES:

Portable. Get Stolen/Lost

Large Storage. Limited Storage.

Longer Battery Life. Shorter Battery Life.

Faster Processing Speed. Slower Processing Speed.

Small = Less Space Needed. Small = Small Screen/Keyboard causing typing errors.

Big – Screen/Keyboard. Big – More space Needed.

Least Common:
Chapter 2:
Input Devices:
Advantages: Disadvantages:
Keyboard: 1.Fast Data Entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2. Slower than DDE devices.
3.Easy verification checks. 3.Takes up desk space.

Concept Keyboard: 1.Fast Data Entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2.Slower than DDE devices.
3.Waterproof (best in restaurants).

Numeric Keyboard: 1.Fast numeric data entry. 1.Difficult to use for people with RSI.
2.Easy to use. 2.Slower than DDE devices.
3.Portable. 3.Limited to Numeric Data.

Mouse: 1.Faster to select options. 1.Difficult to use for people with RSI.
2.Small – doesn’t take desk space. 2.Difficult to use on rough surface.
3.Portable. 3.Fragile – Easily damaged.
4.Quick Navigation.

Touch Pad: 1. Faster to select options. 1.Difficult to use for people with RSI.
2.Small – doesn’t take desk space. 2.Slow Navigation.
3.Portable. 3.Cannot do drag and drop tasks.
4.Works on any surface.

Tracker Ball: 1. Faster to select options. 1.Expensive.


2.Small – doesn’t take desk space. 2.Need to be Device Literate.
3.Portable.
4.Easy for people with RSI.

Digital Cameras: 1.Portable. 1.Easy to loose/get stolen.


2.Fast upload speed. 2. Need to know how to upload pics.
3.Accurate. 3.Pictures often need compression.
4.Environmentally friendly.

Web Cams: 1.No need to charge. 1.Needs a USB port to connect.


2.Connected at all times. 2.Often poor quality.

Joysticks: 1.Realistic controls. 1. Difficult to use for people with


2.Easy Navigation. RSI.
2. Not portable.

Scanners: 1.Accurate. 1.Big - Takes up desk space.


2.Scans can be converted to any 2.Slow.
file type. 3.Not portable.
4.Needs accurate positioning.

Microphones: 1.Enhances voice quality. 1.Voice can echo.


2. Can use it for dictating texts 2.Cannot detect different dialects of
rather than typing. languages.
Input Devices ADV – DIADV Series:
Most Common:

ADVANTAGES: DISADVANTAGES:
Fast : Data Entry/Select Options. Slower than DDE Devices.
Easy to use. RSI.
Small – Less space needed. Big – More space needed.
Cheap. Expensive.
Accurate. Poor Quality.
User friendly. Needs Computer literacy.

Least Common:

Advantages: Disadvantages:
Sensors: 1.Accurate readings taken. 1.Job loss.
2.Continious readings taken. 2.Expensive maintenance.
3.Cost saving – no need people.

Role Of 1.Data form the sensors are compared to pre – set values.
Microprocessor in 2.The Pre-set value is set to show (_________________) (Depends on Question & Sensor).
Robots: 3.If the Values are Same or Lower: It Signals the actuator (What happens_______________).
4.If the Values are Higher: (What happens______________________).
5.The process keeps continuing.

Type of Sensor: Function:

Temperature: Do detect temperature – room temp, outside temp, etc.

Pressure: Used to in washing machines, robots, etc.

Light: Used in streetlight control, Solar lights, etc.

Sound: Used in burglar alarm systems, fire alarms etc.

Humidity: Used to detect level of humidity.

pH: Used to detect pH level, soils, greenhouses, etc.

Proximity: Sensor to detect movement. Used in Auto – Cars.

Motion: Functions when motion is detected. Example light automatically opens when a motion is detected.

Infra – Red: Emits and detects IR radiation in order to find out certain objects/obstacles in its range.

CO2: Detects levels of air pollution in the air.


Output Devices:
Monitors: Advantages: Disadvantages:
CRT: 1.Curved screen gives better angle for 1.Extreme Heat Generation.
viewing. 2.Extreme Power Consumption.
2.Cheap. 3.Gives headaches and eyestrains.
3.Usable with light pens. 4.Needs a lot of desk space.

TFT: 1.Lightweight. 1.Poor angle of viewing.


2.Less Power Consumption. 2.Expensive.
3.Less desk space needed. 3.Generates heat.

LCD & LED: 1. Good display quality. 1.Expensive.


2.Low power consumption. 2.Hard to maintain.
3.Less heat generation.
4.Less desk space needed.

Printers: Advantages: Disadvantages:


Ink jet: 1.Good quality printouts. 1.Slow.
2.Cheap. 2.Expensive cartridges.
3.Lightweight. 3.Can’t do large printing operations.
4.Produces Coloured printouts.
Laser: 1.Fast printing. 1.Expensive coloured laser printers.
2.Cheap Cartridges. 2.Heavy.
3.Long lasting cartridges. 3.Health and environment hazard.
4.Can do large printing operations.
Dot Matrix: 1.Can produce carbon copies. 1.Very Noisy.
2.Cheap maintenance. 2.Very slow.

3D: 1. Can create customizable items. 1.Expensive device.


2.Mass production reduces material waste. 2.Expensive materials.
3.Often material can be used reused. 3.Can be used for illegal production.

Graph plotters: 1.Extremely high-quality printing. 1.Expensive price and maintenance.


2.Can produce huge printouts. 2.Slow.
Multimedia 1.Many people can see instead of crowding 1.Expensive.
projectors: around at one computer. 2.Needs smooth surface for display.
2.Saves money. 3.Needs distance for large display.
3.No trailing wires. 4.Poor quality display.

Speakers: 1.Many people can hear at once. 1.Disturbs people around.


2.Enhances sound quality. 2.Expensive installation & maintenance.

Actuators. Output Devices ADV – DIADV Series:


Most Common:

ADVANTAGES: DISADVANTAGES:

Cheap: Initial & Maintenance. Expensive: Initial & Maintenance.

Less power consumption More power consumption


Less heat generation. More heat generation.

Small – Less space needed/Portable. Big – More space needed/Not Portable.

Fast. Slow.

Quality & Silent. Poor Quality & Noisy.

Friendly: User/Environment. Needs Literacy/Not environmentally friendly.


DDE (Direct Data Entry):
Magnetic Stripe Readers: Least Common:

Steps:
1. User looks for magnetic card reader.
2. User then swipes the card.
3. Terminal display will indicate whether card has been read.

Advantages: Disadvantages:
1.Fast Data entry. 1.If magnetic stripe is damaged, data is lost.
2.Secure. 2.Doens’t work at a distance.
3.Robust. 3.Effected by magnetic fields.
4.Error free.

Information stored in Magnetic Stripe:

1.Account Number.
2. Sort Code.
3. Expiry Date.
4. Issue Date.

Contactless Card Readers:


Steps:
1. User looks for contactless card reader.
2. Shopkeeper enters payment amount.
3. User brings the card near reader.
4. Reader picks up signal and extracts data.
5. Terminal display will indicate whether card has been read.

Advantages: Disadvantages:
1.Fast Data entry/Transactions. 1.Expensive.
2.Secure. (Uses high level encryption and has an encrypted 2.Limited Transaction Amount. (e.g.: up to $25).
unique number).
3.Robust.

Chip and PIN Readers:


Steps:
1. User looks out for Chip and Pin reader. 4. Reader deducts the payment amount.
2. User inserts card into the reader slot. 5. Screen indicates card has been read.
3. User enters PIN using keypad. 6. A receipt is produced after card is taken out.

Advantages: Disadvantages:
1.Faster than paying manual cash. 1.Doesn’t work at a distance.
2.Secure. (Uses unique PIN). 2.Slower than contactless cards.
3.Robust. 3.PIN can be read by people around.
MICR (Magnetic Ink Character Recognition):
Steps: Cheque Clearance:

1.Cheque is scanned using MICR. 1. Cheque is scanned using MICR.


2. Each character produces a unique signal. 2. Signature gets checked.
3. The signals are read by the MICR. 3. Date on the cheque is checked.
4. Amount of money is checked.
5. User is checked.

Advantages: Disadvantages:
1.Secure. 1.Expensive.
2.Readable characters. 2.Effected by magnetic fields.
3.No manual input, reduced errors.

Information stored in the Magnetic Ink:

1. Account Number.
2. Cheque Number.
3. Sort code.

RFID (Radio Frequency Identification):


Steps:
1. The chip is brought near the RF scanner. 3. The antenna reads data from the tag.
2. The scanner emits RF waves to read data from 4. The antenna transmit data to the scanner.
the antenna. 5. The scanner transmits data to the computer.

Advantages: Disadvantages:
1.Fast Reading rate. 1.Tag collisions.
2.Robust. 2.Expensive.
3.Can be read from a Distance. 3.Not secure. Hack-able.
4.Larger storage capacity.
5.Can be updated easily.

Barcode Readers:
Steps:
1.The Barcode is brought near the scanner.
2. The scanner uses laser light to read the code.
3. Information in bar code is transmitted to the scanner.
4. The scanner transmits information to computer/terminal display.

Advantages: Disadvantages:
1.Fast Reading Rate. 1.Not Robust. (Easily Damaged)
2.Reliable. 2.Not secure.
3.Uses a unique number. 3.Barcode is fragile. (If barcode is damaged the reader will not
4. Cheap. be able to read).
QR code Readers:
Advantages: Disadvantages:
1.Secure. 1.Slow.
2.More storge capacity compared to Barcode. Holds up 2.Not Robust. (Easily Damaged).
to 7000 digits. 3.QR code is fragile. (If QR code is damaged the QR scanner
3.Effective way of advertising. will not be able to read).

Advantages: Disadvantages:
OMR (Optical mark reader): 1.Faster than keying in data. 1.Froms need to be carefully
2.Accurate than keying in data. designed.
Reads the positions of marked 2.Prone to errors.
Lozenges

OCR (Optical character reader): 1.Faster than keying in data. 1.Not Accurate.
2.Reduced Errors since no manual 2.System has difficulties reading
Reads characters/writings. input. handwritings.

Direct Data Entry Devices ADV – DIADV Series:


Most Common:

ADVANTAGES: DISADVANTAGES:

Fast Data Entry. Slower than…

Secure. Not Secure.

Robust. Not Robust (Damaged Easily).

Reduced Errors/Accurate. (No manual input). Error prone. (Manual input).


Works at a distance. Doesn’t work at a distance.

Cheap. Expensive.

Large Storage. Less storage.


Not effected by magnetic fields. Effected by magnetic fields.
Least Common:
Chapter 3:
Serial Access: Direct Access:
In this method data is accessed step by step In this method data is accessed randomly and
until required data is found. to the point.

Used: Old magnetic tapes, Video Cassettes. Used: HDD, CD, DVD, Blu Ray.

Magnetic Storage Devices:

Uses: Advantages: Disadvantages:


Fixed/Internal HDD: 1.To store OS’s. 1.Fast data transfer rate. 1.Not Robust.
2.To store application 2.Large memory 2.Have many moving parts.
software’s. capacities. 3.Noisy read/write
operations.
Portable HDD: 1.Backup data. 1.Fast data transfer rate. 1.Not Robust.
2.Transfer data between 2. Large memory 2.Effected by magnetic
computers. capacities. fields.
3.Cheap.

Magnetic Tapes: 1.Batch processing apps. 1.Fast data transfer rate. 1.Effected by magnetic
2.Large organizations. 2. Large memory fields.
capacities. 2.Slow data ACCESS TIME.
3.Cheap.
4.Robust.

Optical Storage Media/Devices:


➢ ROM = Read Only. (Once)
➢ R= Write Only. (Once)
➢ RW= Read & Write. (Multiple times)
➢ RAM = Written Only. (Multiple times)

CD: - Less Storage capacity compared to DVD.

DVD: - Higher Storage capacity compared to CD.

Uses: Advantages: Disadvantages:


CD ROM: 1.Light storage. 1.Cheap. 1.Not Robust.
2.Audio files. 2.Holds more data than floppy disks. 2.Slow data transfer rate.

DVD ROM: 1.Large storage. 1.Cheap. 1.Not Robust.


2.Movie files. 2.Holds more data than CD ROM. 2.Slow data transfer rate.
3.HD Videos. 3.Needs a sperate DVD player.

DVD RAM: 1.Recording 1.Holds more data. 1.Expensive.


equipment. 2.Robust. 2.Not compatible with all play
3.Rewritten many times. back formats.
Uses: Advantages: Disadvantages:
CD R, DVD R: Backup data. 1.Cheap. 1.Not compatible with all play back
2.Portable. formats.
2.Cannot be reused if has an error.
CD RW, DVD RW: Record Programs. 1.Can be reused many times. 1.Expensive.
2.Portable. 2.Data can be overwritten.

Blu Ray: HD Movies. 1.Fast data transfer rate. 1.Expensive.


Large Software’s. 2.Large storage capacity. 2.Rare.

Solid State Storage:

Advantages: Disadvantages:
SSD: 1.No Moving Parts. 1.Expensive.
2.Light weight. 2.Rare.
3.Less power consumption. 3.Less storage.
4.Fast.
USB (Memory Sticks): 1.Portable. 1.Easy to lose.
2.Robust. 2.Gets damaged if no ejected properly.
3.Large Storage Capacity.
4.Fast.

Flash Memory Cards: 1.Portable. 1.Less storage capacity.


2.Robust. 2.Expensive.
3.Fast.

Storage Devices Comparison:

Speed: Storage
All Solid-State Storage Devices. Fixed HDD.
Fixed HDD. Portable HDD.
Portable HDD. Magnetic Tape.
Blu – Ray. USB & Flash memory cards.
All CD & DVD’s. Blu – Ray.
Magnetic Tape. DVD-ROM.
DVD – R & RW.
DVD-RAM.
All CD’s.
Portability: Cost:
Flash memory cards. Magnetic Tape.
USB. Portable & Fixed HDD.
All CD’s, DVD’s & Blu-Ray. Flash Memory Cards.
Portable HDD. USB.
Magnetic Tape. Blu-Ray.
Fixed HDD/SSD. DVD – RAM.
DVD’s.
CD’s.
Chapter 4:
PC PC
Bridge
PC Hub/Switch Router Router Hub/Switch
PC
PC PC

Network 1 Internet Network 2

Transfer of Data from One Network to Another:


1. Starting computer first detects location of designated computer through the router. Router finds IP
address that is stored on a routing table.
2. Then data is sent from senders’ computer to the sender’s hub/switch.
3. Sender’s hub/switch sends data to the router. Then router forwards data to the designated network’s
router.
4. Router forwards data to the designated hub/switch.
5. Hub/switch send data to designated computer.

How a Router Forwards Data Packets:


1. Router reads address on the data packet.
2. Router obtains IP Address of the designated computer from routing table.
3. Router checks the internet traffic on each path.
4. Router uses the quickest path.

Network Security:
➔ How security can be improved in a wi-fi network?
1. Use a strong password.
2. Use WPA Encryption.
3. Uses a wireless network security software.

➔ What is ISP?
1. Internet service provider.
2. Provides Web space.
3. Provides Storage space on cloud.
4. Provides Internet from a Router.

➔ What are the advantages and disadvantages of policing the internet?

Advantages: Disadvantages:

1. Reduced illegal businesses. 1. Expensive.


2. Remove Dark web. 2. Hard.
3. Reduced cyber bullying/bad 3. Restricted freedom of speech.
words/cyber racism.
4. Copy right laws are reinforced.
IP Address vs Mac Address:
IP address gives the location of a device on the internet.
Mac address identifies the device connected to the internet.

IP address of a device can change.


Mac address of a device can’t change.

Wi-Fi vs Bluetooth:
Feature/Comparison: Bluetooth: Wi-Fi:

Data Transfer Rate: 25Mpbs. 250Mpbs – Faster.


Signal Range: 10m. 100m – Further.
Security: 128 bits. 256 Bit – Secure.
Max no. of connected devices: 7. 255 – More Devices.
Power Consumption: Less – Less Power. More.
Signal Reliability: Not interrupted as much – Can be interrupted.
Reliable Signals.
Cost: Cheaper. Expensive.

Internet vs Intranet:
Intranet: Internet:

1. Restricted Access/Limited users. 1. Unlimited users.


2. Restricted/Limited Information. 2. Unlimited Information.
3. Private- Within Organization. 3. Public- World Wide.
4. Policed/Managed. 4. Not Monitored.
5. Has rules. 5. No rules.

Email vs Fax:
Email:
Advantages: Disadvantages:

1. Secure.(Password Protected) 1. Needs Internet.


2. No need to print. (Env Friendly) 2. Needs Device.
3. Easier. 3. Can be modified and copied easily over
4. Faster. the internet.

Fax:
Advantages: Disadvantages:

1. No need Internet. 1. Slow. (Sometimes telephone line gets


2. Signatures are legally accepted. busy)
3. Can’t be modified or copied as its not 2. Poor Quality.
connected to internet. 3. Not secure. (Confidential info can be
read by person behind)
4. Need to be literate to use Fax.
5. Not Env Friendly. (Needs paper)
Key Terms:
Blog: Wiki: VOIP:
1. Website/Webpage. 1. Website or database. 1. Voice Over Internet
2. Editable by owner 2. Editable by Protocol.
only. everybody. 2. Communication
3. Written informally. method through
online telephone calls.

Chapter 5:
Part Time: Hired for less time than a normal employee.
Job Sharing: Doing the same job at different times.
Flexible Time: Work full hours at any time they want.
Compressed Hours: Working full hours in a shorter duration.

Micro processing Devices:


Advantages: Disadvantages:
1.More leisure/free time. 1.Laziness.
2.Esier. No need to do manual tasks. 2.Expensive.
3.Faster. 3.Loss of skill.
4.Safer. 4.Fatigue.
Role Of 1.Data form the sensors are compared to pre – set values.
Microprocessor 2.The Pre-set value is set to show (_________________) (Depends on Question & Sensor).
in Robots: 3.If the Values are Same or Lower: It Signals the actuator (What happens_______________).
4.If the Values are Higher: (What happens______________________).
5.The process keeps continuing.

ICT Problems & Solutions:


Image: Problem: Solution:
Organize Cables.
Trailing Wires Use wireless technology.
Use Cable Ducts:
No liquids near computers.
Electrocution Use an RCB.
Check equipment regularly.
Use RCB.
Fire by Socket Overload Use One Plug Per Socket.
Keep a CO2 Extinguisher.
Fire by Overheating Use keyboard covers.
Use Fans.
Use Ergonomic Keyboard &
RSI mouse.
Use Hand Rest.

Use Adjustable Chairs.


Back & Neck Problems Use Back Rests.

Use Antiglare Screens.


Eyestrain & Headaches Take Regular Breaks.
Ensure Correct Lightings.
Chapter 6:
Online Systems vs Manual: (Online Banking, Booking, Shopping, etc.)

➔ ADV & DI-ADV Series:


Effect of online facilities on companies:
ADVANTAGES: DISADVANTAGES:
• Reduced wage bills. (No need staff).
Saves Travelling costs. Need internet. • Internet is global so customers can
increase quickly.
Saves Time as no manual work involved. Security issues.
• Costs apply to maintain online services.
Open 24/7. Not sure of quality. • Decreased street robberies.

Online stuff can happen anywhere. Tax/Delivery Charges.

Online stuff can happen any time.

Faster.

Expert Systems:
➔ How to set up an expert system? ➔ Using an Expert System (Basic Steps):
1. Experts are interviewed. 1. An interactive user interface is used.
2. Knowledge base is designed. 2. User interface asks questions.
3. Rule base is designed. 3. User answers questions.
4. Explanation form/system is designed. 4. The inference engine compares answers
5. Expert system is tested. to questions with the facts stored in the
knowledge base using the rules base.
5. The system suggests possible solutions.

Robots:
Advantages: Disadvantages:

1. Accurate/consistent. 1. Expensive Initial cost.


2. Can work in hazardous conditions. 2. Expensive Maintenance cost.
3. Work 24/7. 3. Loss of job for labor.
4. Reduced Wage bills.

Measurement Applications:
Steps of how Sensors Take Readings in Measurement Applications:

1. Sensor takes readings.


2. Data collected (in analogue form)from sensor is converted to digital form using ADC. Microprocessors
3. Digital Data is sent to microprocessor. and computers
4. Microprocessor compares data with pre-set values and simply reviews is. only understand
digital data.
Measurement application Uses:

1. Weather Stations.
2. Measuring Patients vital signs.
3. Measuring pollution in rivers.

Advantages: Disadvantages:

1. Accurate readings. 1. Expensive Initial cost.


2. Reduced wage bills.(less staff) 2. Expensive Maintenance cost.
3. Faster response time. 3. Unable to respond to unusual
4. Operates 24/7. situations.
Control Applications:
Steps of how Sensors Take Readings in Measurement Applications:

1. Sensor takes readings.


2. Data collected (in analogue form)from sensor is converted to digital form using ADC.
3. Digital Data is sent to microprocessor.
4. Microprocessor compares data with pre-set values.
5. Microprocessor checks weather it is in given parameters… if not, computer will signal
actuators to do the necessary.
Measurement applications do nothing
Control application Uses:
while control applications act.
1. Automatic washing machines & ovens/cookers.
2. Central heating systems.
3. Chemical plants.
4. Glasshouse environment.

Advantages: Disadvantages:

1. Accurate readings. 1. Expensive Initial cost.


2. Reduced wage bills.(less staff) 2. Expensive Maintenance cost.
3. Faster response time. 3. Unable to respond to unusual situations.
4. Operates 24/7. 4. Loss of job for labor.

Banking Applications:
Steps for Cash Width drawl: Behind The Scenes:
Card is first inserted, and PIN is entered. Computer is contacted and PIN is checked.

Many Options Appear – Customer chooses cash width


drawl, and many cash amount options are shown.

Customer chooses amount of money. Card and account are checked (Expiry date,
weather reported stolen and amount of cash
available)
With drawl is proceeded and asked for receipt.

Card returned, money and receipt given. Account is updates.

Traffic light simulation:


How it works using sensors:

1. Sensors in the roads gather data and count the number of vehicles at the junction.
2. Data is converted to digital for using ADC.
3. Data is then sent to a computer.
4. Data is then compared to pre-set values.
5. The computer decides what action need to be taken.
6. Actuators are signaled accordingly.
Computers in Medicine:
Use of 3D printers in medicine:

1. Surgical and Diagnostic Aids.


2. Prosthetics.
3. Tissue Engineering.
4. Design of medical tools and equipment.

How a 3D printer can create a prosthetic hand:

1. Hand is scanned by CT, MRI Scanner or X -ray.


2. The digital copy of the hand is loaded into the software.
3. Software divides digital copy into 100 layers.
4. 3D printer prints layer by layer using Plastic/Resin.

Computerised Timetabling Systems:


Advantages:

1. Less error prone.


2. Quicker to find clashes.
3. Quicker to find needed data.
4. Quicker to make changes.

Computers in Libraries:
Computer Processing involved when a book is borrowed:

1. Barcode on the book is first scanned & book details are found in the book file.
2. System then calculates return date for book.
3. Then the barcode on the borrowers ID Card is scanned. (Sometimes Biometric information also).
4. Return date for book is saved in the borrower’s file.

Computer Processing involved when a book is returned:

1. The books accession number is checked.


2. Borrowers ID is checked.
3. Computer verifies return date.

Computers in Retail Industries:


How barcodes are used to automatically control stock in supermarkets:

1. customer looks out for EPOS terminal.


2. Cashier scans the barcodes on all items.
3. The barcode then gets searched for in the stock file record.
4. Once the barcode has been found and read, the price and description are sent to the EPOS.
If the number in stock of the item is less than the minimum value, the computer
automatically orders a batch of that item from suppliers.
5. Process continues until the customer’s basket is empty.
6. An itemised bill is then produced showing the item description with prices.

ANPR (Automatic Number Plate Recognition):


How ANPR systems are used in car parks:

1. Proximity sensor detects vehicle and signals the microprocessor which then signals the actuator
(camera) to take a picture of the front of the vehicle.

2. An algorithm is then used to isolate the number plate from the image. (The algorithm involves
cropping, enhancing renders (brightness, color, contrast) and segmentation of each number).
3. The car park barrier is then raised, and a ticket is given.

4. At time of leaving the car park, the ANPR system again reads the number plate and checks
weather it matches the one stored in the database.

Call Monitoring:
Types of Call Monitoring:

1. Monitor: This allows the manager/boss to listen to discussion between the employee and
customer. (In this case the call is muted so neither of them will be able to know of their presence)
2. Whisper: This allows the boss to help the employee speak (Only employee can hear the voice).
3. Barge: This allows both the employee and customer to be heard by the boss/manager.

Satellite Systems:
GPS (Global Positioning Satellite):

➔ How does satellite navigation system work?


1. Destination is input by driver.
2. 3 to 4 satellites detect exact location of vehicle and destination.
3. Algorithm calculates quickest route and considers traffic.
4. GPS determines shortest distance.

Advantages: Disadvantages:

1. Safer (System warns driver about 1. If the maps are not updated, they can
speeding cameras & street closures) give incorrect information.
2. System can estimate arrival time. 2. Loss of satellite signals can cause
3. System can tell fastest route. problems.

GIS (Geographic Information System):

➔ How GIS can be used: ➔ Where GIS is used:


1. It can be used with GPS. 1. Protection of animal life in certain
2. It can layer a map with other data. areas.
3. It can combine maps, graphics, and 2. Teachers use it in geography,
databases. engineering, or science lessons.
4. It allows users to create interactive 3. Prospecting minerals.
queries. 4. To map landmarks.

Chapter 7:

Analysis

Evaluation Design

Development
Documentation
and Testing

Implementation
Analysis:
Basic Steps is Analysis stage:
1. Research/collect data form the existing 5. Agree to client’s requirements.
system. 6. Interpret requirements.
2. Describing the existing system. 7. Produce a cost-benefit analysis.
3. Identify the problems with the current 8. Identify suitable hardware and
system. software.
4. Agree on the objectives with the client. 9. Produce a data flow diagram(DFD).

Feasibility Study Stages:

Includes: Objectives, Includes: Requirements


Terms: Criteria:
boundaries, constraints. and desired features.

Includes: Identifying Proposed Solution: Includes: Development


System Description:
problems and costs. plan, Cost-benefit analysis.

Methods of Research:
Method: Advantages: Disadvantages:
Observation: 1. Cheap. 1.People may feel uncomfortable and
2. Reliable. may act in a different way.

Questionnaires: 1.Cheap. 1.Returned questionnaires are often low.


2.Quick. 2.Can’t clarify doubts.
3.Quick analysis. 3.Can’t express yourself as much as you
are limited to options in MCQ’s.

Interviews: 1.Honest opinions. 1.Slow.


2.Opportunities to express your answers. 2.Expensive.
3.Easier to extend and modify questions. 3.Employee can’t stay anonymous.

Looking at existing 1.Can obtain all sorts of information. 1.Slow.


paperwork. 2.Analyst gains a better idea of the system. 2.Expensive.

Design:
Design Stage Tasks:
1. Design Data Capture Forms.(DFD) 5. Design validation rules.
2. Design screen layouts. 6. Design and agree on file structures.
3. Design Outputs in the form of reports or 7. Design and produce necessary algorithms.
screen displays. 8. Design a testing strategy/plan.
4. Produce a Data Flow Chart or pseudo code.

Data Capture Forms:

Paper Based Forms: Computer Based Forms:


Includes: Title, Text Boxes (Limiting Answers), Includes: Text Boxes, on screen Help, drop down
Character Boxes, Tick Boxes (MCQ’s) , Readable menus (MCQ’s), control buttons (i.e., Save, next),
font. auto validation, double data entry.
Verification:

Verification is a way of preventing errors when data is copied from one medium to another.

2 Verification Methods:

1. Double Data Entry. 2. Visual Check.

Validation:

Validation is a process where data is checked to see if it satisfies certain criteria’s.

Validation Check: For what:


Range Check: Check weather data is in given range, e.g.: <10

Look – up Check: Checks weather data entered, exists in a table.

Length Check: Checks weather data has required number of characters, e.g., 3 no. and 2 words.

Type Check: Check weather data contains valid characters.

Format Check: Checks weather data is in correct format. E.g., Text, Numeric

Check Digit: Checks numerical data validity.

Presence Check: Checks weather data present hasn’t been missed out.

Consistency Check: Checks weather data relates to the field.

File Structures:
File Structures Take the Following into Account:

1. Field Length.
2. Field Name.
3. Data Type.

Development and Testing:


Development Stage Tasks:
1. File Structures are finalized and tested.
2. Validation & verification methods are used and tested.
3. How the hardware will function with the final system. Hardware is tested.

Testing strategies:
1. Normal: Reasonable data (E.g., Between 1 – 20 : If result is 2-19)
2. Extreme: Data at the boundaries (E.g., Between 1-20: If result is 1 or 20)
3. Abnormal: Data outside limits or wrong type of data. (If text is entered instead of numbers)
4. Live: Data with known outcomes.
Implementation:
Implementation Stage Tasks:
1. Staff is trained on the new system.
2. Files are transferred to new system. (By scanning, keying & downloading information).
3. Changeover to new system. (Direct, Parallel running, Pilot running, Phased implementation).

Changeover Methods:

Method: Advantages: Disadvantages:


Direct: New system is 1.Cheap. 1.If system fails, the whole
introduced immediately. 2.Quick Benefits. method would be useless as old
system is no longer available.
2.Staff have to work hard to
learn new system.
Parallel: The old and new 1.If new system fails, old system is still 1.Expensive.
system run side by side until available for backup. 2.Time consuming.
the new one takes over. 2.Staff can get gradual training.

Pilot: New system is 1.If new system fails, only part is 1.Time consuming.
introduced to one are for trial affected, old system remains in other
and assessed before it gets areas.
introduced everywhere. 2.Cheap.
3.Possible to train staff in one area only
(Cheaper, Quicker).

Phased: New system is 1.If latest part fails, you only have to go 1.Expensive.
introduced in parts until the back to point if failure, remaining parts 2.Time consuming.
old system is fully replaced. are unaffected.

Documentation:
User Documentation: Technical Documentation:
Helps users to learn how to use the system. Helps analysts to maintain/improve the system.
Includes: Includes:
1. How to run the software. 1. Program codes.
2. How to save files. 2. Program language.
3. How to search. 3. Program algorithms.
4. How to print. 4. System flowcharts.
5. Purpose of the system. 5. Purpose of the system.
6. Tutorials. 6. Requirements. (Hardware/Software/memory)

Evaluation:
Evaluation Stage Tasks:
1. Compare the final solution with original task.
2. Identify any limitation.
3. Identify necessary improvements.
4. Compare performance of old and new system.
5. Evaluate user’s responses of new system.
Chapter 8:
Phishing: Fraudulent practice of sending emails.
Smishing: Fraudulent practice of sending text messages.
Vishing: Fraudulent practice of making phone calls.
Pharming: Fraudulent practice of directing users to fake websites.

Internet Safety:
E-Safety:

➔ E-Safety refers to the safety when using the internet & how to keep personal data safe.
➔ Personal Data:
o Name. o Medical History.
o Address. o Bank details.
o DOB.
➔ Sensitive Data:
o Ethnic Origin. o Religion.
o Nationality. o Political Views.
o Gender.

Online Safety Rules:

1. Don’t Give out Personal Information. 5. Only open Known Emails.


2. Don’t Give out Personal Photos. 6. You should know how to block and report.
3. Maintain your Privacy Settings. 7. Always use Appropriate Languages.
4. Visit (i.e., https) Trusted Websites.

Gaming safety Rules:


1. Don’t get addicted to games. 4. Don’t Open your Camera.
2. Don’t play violent games. 5. Use Voice Masking Software.
3. Don’t Cyber Bully.

Security of Data:
Hacking:
What: Prevention:

Gaining unauthorized access to a computer 1. Use firewall.


system. 2. Use strong passwords.

Viruses:
What: Prevention:

A program code that can replicate itself 1. Use Antivirus software.


and corrupt files. 2. Always open known things.
Spam:
What: Prevention:

Junk Email sent out to recipients by 1. Use Junk Email Filter.


spammers to obtain their personal details 2. Use Spam Filter.
and credentials. 3. Don’t open unknown things.

Cookies:
Small files or codes that are stored on a user’s computer.

Security Techniques:
Firewalls:

What: Tasks:

A software (part of OS) or hardware 1. Examines Internet Traffic.


(Gateway) that filters information coming in 2. Filters Information.
and out. 3. Blocks Hackers from gaining access.
4. Blocks Unknown websites.

Security Protocols:

> Sets of rules used by the computers to communicate with each other across a network.
o SSL (Secure Sockets Layer): It is a type of protocol that allows data to be sent and
received securely over the internet.
o TLS (Transport Layer Security): It is a type of recent protocol that allows data to be
sent and received securely between devices and users while communicating over
the internet.
▪ TLS is formed in two layers:
▪ Record Protocol: Contains data being transferred over the internet.
▪ Handshake Protocol: Secure session between user and website.

Differences Between TLS & SSL


1. TLS can be extended.
2. TLS uses session caching.
3. TLS can separate Record Protocol and Handshake Protocol.

Encryption:
What: Usage:

1. Scrambling of data. 1. Secures Data Transfer.


2. Has an encryption key. 2. Protects sensitive and personal data.
3. Decryption key is needed.
4. Language can’t be read by humans.

Authentication:

1. Passwords: A readable scrambled code for the user to use to access his personal things.
2. Digital Certificates: They are a pair of files stored on a computer. Used for secure transfer
of data over the internet. Each file is divided into (Public Key) & (Private Key).
3. Biometrics: An authentication Method which relies on unique human features.
Moderated and Unmoderated Forms:
Online Internet Monitored Prevent Filter
Discussion Spam Posts
Moderated:

Unmoderated:

Chapter 9:
Factors for Audience Appreciation:
Factors:

1. Age 4. Job Profession


2. Gender 5. Expectation
3. Experiences
Research Methods:

1. Interviews. 3. Surveys.
2. Questionnaires. 4. Market Research.

Software Copyright and Privacy:


Software Piracy:

What: Prevention:

1. Illegal copying of software’s. 1. Keep Product Key safe.


2. Illegally downloading software’s. 2. Keep Hologram safe.
3. Illegally selling software’s. 3. Use a Dongle.
4. Use CD-ROM or DVD-ROM.

Implications:
1. Legal 3. Ethics
2. Morality 4. Culture:

Chapter 10:
Netiquettes:
1. Don’t Spam.
2. Don’t plagiarize.
3. Don’t be abusive.
4. Don’t use Capital Letters.
5. Use correct spellings and grammar.
Internet vs World Wide Web:
The Internet: Allows users to:
1. Send & Receive Emails. 3. Transfer files.
2. Chat online. 4. Browse the world wide web.

The World Wide Web:


1. Accessed by a web browser. 3. Has been created based on http.
2. Consists of many web pages. (Hypertext Transfer Protocol).
General Internet Terms:
Protocols:

➢ Http (Hyper-Text Transfer Protocol): is a set of rules followed when transferring data
across the internet that are agreed by the sender and receiver.

➢ Https (Hyper-Text Transfer Protocol Secure): is a set of rules followed when transferring
data across the internet that are agreed by the sender and receiver. This is when
encryption, SSL or TLS is used, takes more time than http.

➢ Ftp (File Transfer Protocol): Is a network protocol used when transferring files from one
computer to another.

➢ Smtp (Simple Mail Transfer Protocol): Protocol used when transferring Emails.

Web Browsers and URLs:

Web Browser is a software that allows user to display web pages on their computer screen.
Features:
1. Have a home page. 4. Have ability to choose favorite web
2. Have hyperlinks (allow navigation) pages.
3. Have search history. 5. Have undo and redo options.

URL (Uniform Resource Locator) is a link that gives the address of a webpage.
Basic Format of an URL:
Protocol://Website Address/Path/File Name

Information on the Internet:


Advantages: Disadvantages:

1. Most information is up to date. 1. Information may be wrong.


2. Limitless amounts available. 2. Filled with inappropriate advertisements.
3. Searching is Fast and Easy. 3. Easy to get distracted (Games).
4. No need to go to a library for a book. 4. Information Overload.
5. Have videos, animations, make learning fun. 5. Huge risk of plagiarism.
6. Research skills from books are lost.
Reliability:

1. Observe final part of the URL. 4. Check date of last update.


2. Too many ads are unreliable. 5. Check if elders recommend the website.
3. Check website if it has links to other 6. Check author credentials.
unreliable websites.

Cloud Storage:
Public Cloud: This is a storage environment in where the customer/client and provider are
different companies.
Private Cloud: This is a storage environment in where the customer/client and provider
operate as a single entity behind a firewall.
Hybrid Cloud: Combination of public and private cloud where some data is in public and
some in private cloud.
Advantages: Disadvantages:

1. Accessed anytime. 1. Unsecure.


2. Accessed anywhere. 2. Need interne to access.
3. Accessed from any device. 3. Costly if more storage is needed.
4. Provides almost unlimited storage. 4. Risk of losing all backup data.

Blogs, Wikis, Social Networking Sites:


Features of Blog: Features of Wiki:

1. Public, readable by anyone. 1. Public, readable by anyone.


2. Not editable. 2. Editable by anyone.
3. Entries only come from a single author. 3. Entries come from many authors.
4. It is a website/webpage. 4. It is a website/webpage.

Features of Social Networking Sites:

1. Public, readable by anyone.


2. Everyone has their own web space/profile.
3. Possible to invite people to become friends.
4. Free Instant messaging.
5. You can control who visits your web space/comment.
6. It is a website/webpage/application.
Chapter 11:
Generic File Type: It is an accessible file format that allows your file to be opened on any
platform.
Common Generic:
Image Files:
JPG: Joint Photographic Expert Group. (Uses lossy compression)

PNG: Portable Network Graphics. (Uses lossless compression)

GIF: Graphics Interchange Format. (Limited to 256 colors)

PDF: Portable Document Format.

MP4: Moving Picture Experts Group Layer 4.

Text Files: Audio Files:


CSV: Comma Separated Value. MP3: Moving Picture Experts Group Layer 3.

TXT: Text File Extension.

RTF: Rich Text Format.

Compressed Files: Web Authoring Files:


RAR: Roshal Archive. CSS: Cascading Stylesheet.

ZIP: Zone Improvement Plan. HTML: Hyper Text Markup Language.

Chapter 15:
Validation Check: For what:
Range Check: Check weather data is in given range, e.g.: <10

Look – up Check: Checks weather data entered, exists in a table.

Length Check: Checks weather data has required number of characters, e.g., 3 no. and 2 words.

Character Check: Check weather data contains valid characters.

Format Check: Checks weather data is in correct format. E.g., Text, Numeric

Check Digit: Checks numerical data validity.

Presence Check: Checks weather data present hasn’t been missed out.

Consistency Checks weather data relates to the field.


Check:
Chapter 18:
Flat-File Databases: A database that stores its data in one table organized in columns (fields)
and rows (records).

Advantages: Disadvantages:
1. Less time needed to set up. 1. Takes up storage.
2. Easier to make. 2. Inconsistent.
3. Cheap.

Relational Databases: A database that stores its data in more than one linked table. They are
designed so that data is not stored many times.

Advantages: Disadvantages:
1. Less storage Needed. 1. Takes Time to Set up.
2. Better Security. 2. Costly.
3. Consistency.

Query Searches:
1. If you want 2 or more values: “ABC” Or “DEF”
2. If you don’t want to include: Not “ABC”
3. If it Includes ABC in its name: *ABC*
4. Ranges:
• Below: <123
• Above: >123
• And Below: <=123
• And Above: >=123

Creating a New Field: (Basic Format)


New Name: [Existing Field name] – or + or * or / [Existing Field name]

Chapter 20:
Absolute referencing: $A$12 (Before each value)

Basic Formulas
+ Addition
- Subtraction
* Multiplication
/ Division
^ To the Power
Complex Formulas and Functions
=SUM Adds 2 or more numbers together.
=AVERAGE Finds the average/mean.
=MAX Finds the highest Value.
=MIN Finds the lowest Value.
=INT Rounds the number to nearest whole.
=ROUND Round the number to whatever value.
=COUNT Counts the number of numeric values.
=COUNTA Counts the number of numeric & text values.
=COUNTIF Counts the number of given condition.
=IF To display something for a condition.

Nested Formulas and Functions


=SUMIF Adds all values of a condition.

Example: Add all the years of experiences for programmers only. (There are a
number of engineers, doctors, directors, programmers. All with their own experiences)

Lookups
=LOOKUP Looks up a value from somewhere. (useless)
=HLOOKUP Looks up a value from a horizontal table.
=VLOOKUP Looks up a value from a vertical table.

Chapter 21:

Presentation Layer: Content Layer: Behaviour Layer:


-Formatting Webpages or -To enter content. Found in -To enter scripting
individual element. Found in HTML. (Actual Page where info will language.
CSS. (Where coding is used, behind be displayed)
the scenes) • Image effects.
• Texts. • Pop ups.
• Tags/DIV tags. • Images/Videos.
• Text (using */ “”) • Audio.
• Table formatting. • Hyperlinks.
Commands:
Name: Tags Used:
Comment: Starts with: <!-- Ends with: -->

Heading: <head> </head>


Title: <Title> </Title>
Body: <Body> </Body>
Paragraph Style: <p> </p>
Heading Styles: (6) <h1> </h1> All the way to <h6> </h6>
Bold: <b> </b>
Italic: <i> </i>
Superscript: <sup> </sup>
Subscript: <sub> </sub>
Lists: <li> </li>
Bulleted Lists: <ul> </ul>
Caption: <caption> </caption>
Table: <table> </table>
Table Row: <tr> </tr>
Table Data in a row: <td> </td>
Header in a Table: <thead> </thead>
Body in a Table: <tbody> </tbody>
Footer in a Table: <tfoot> </tfoot>
Insert Video File: <video> </video>
Insert Audio File: <audio> </audio>

Source: <source src= “” type=””>

You might also like