Upload
maximilian-lindsey
View
215
Download
0
Embed Size (px)
Citation preview
Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques
What is ICT?
ICT is the use of technology for the input of data, storage, processing to change the data into information, transfer of data to other devices and the output of information.
‘Data’ is the raw facts and ‘information’ is the processed data. E.g.
NETWORKS – LANS and WANS
There are two types of network: Local Area Networks (LANs) and Wide Area Networks (WANs). Local area networks are located in a building or on a site and are usually hard wired, whereas WANS are linked across countries and continents and are usually communication networks.
Local area network-LAN-small-offices and schools. Wide area network-WAN-large-link together different places using internet connections. (wired or wireless)
ADVANTAGES• peripherals such as
printers can be shared amongst several users.
• Software can be shared amongst several users.
• Communication across network is fast + cheap
• Logon at any terminal and access work area
DISADVANTAGES• Setting up is very
expensive for equipment and cabling
• A fault with the server will prevent the whole network from working
• Security measures are needed to restrict access to network
• WANS are vulnerable to hackers and viruses.
SECURITY MEASURESSERIAL NUMBERS ALARMS DOORS FIRE PROTECTION LOCK AVOID BLINDS
JUST REMEMBER SADFLAB
BACKUPS
Backup – saving a second copy of a file in an alternative location (or storage media e.g. USB) so if the original file is lost or damaged it can be replaced from the backup. They should be kept secure-in locked fireproof rooms. (done daily)
CookiesA small text file that is stored on your computer when you visit some websites.A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when you revisit the site. The website reads the cookie and can then look up details such as you name, address, credit card number from their database. This saves you from having to re-enter your data every time you visit.
Passwords-series of characters typed in to prevent unauthorised access to a computer system. They should be changed frequently, be hard to
guess, mixture of letters/numbers and symbols.
Data storage RAM & ROM
RAM – Random Access Memory• Volatile memory within the PC• Lost when the computer is
turned off• Used to store programs which
are running
ROM – Read Only Memory• Permanent read only memory• Non volatile • NOT backing storage on hard disk
Operating SystemsSoftware which is needed to run your device (e.g. phone, tablet, PC) such as Windows, Linux, IOS8
Tasks carried out• Enable applications to run • Enables software to communicate with systems hardware • It manages system resources • Monitors the performance of system • Prompts error messages. • Multi tasking means an OS can run more than one program at a time • Determines the user interface (what it looks like)
Input Devices
Mouse Tracker ball
Keyboard Joystick
Graphics tablet/pads make drawing easier and more
accurate.
Bar code scanner
Touchscreen Optical Character recognition – scanners read text
Webcam Sensor e.g. pressure, thermistor
Optical Mark recognition – read lines in boxes e.g.
National lottery
Chip and PIN or magnetic strip credit cards
Storage Devices(used to save data onto)
Hard disk (main internal storage 20gb to a terabyte)
CD ROMS 650mb
DVD 17gb
Memory stick/flash drive/USB key
Input OutputProcess
ADVANTAGES / DISADVANTAGES COMPUTER BASED SYSTEMS
ADVANTAGES• Takes up less space • Searching is very quick • More than one person
can access the same data form their network PC.
• The data stays in the computers memory
• Fewer staff are needed to look after a computer system
• Reports can be generated very quickly-automated
DISADVANTAGES• Setting up is very
expensive • Computer systems need
people to maintain them
• POWER CUTS! • It is easy to hack into a
computer system. • Users will need training
and support to use them
How is data stored?
Biteach individual ‘1’ or ‘0’ is a bit-short for
binary digit
Byte 8 bits are a byte
Kilobyte 1024 bytes
Megabyte (Mb) 1,000,000 bytes
Gigabyte (Gb) 1,000,000,000 bytes
Terabyte (Tb) 1024 Gigabytes
Output Devices
Laser printer – high quality, fast but expensive
Inkjet printer - cheaper but lower quality and slower
Monitor Speakers
Plotter – giant printer for maps/blue prints
Headphones
CPU – central processing UnitThe brains of the computer which controls:
The input and output to the computerAll hardware attached to the systemThe flow of data within the system
Utility SoftwarePrograms that run alongside the operating system to carry out
supportive functions such as• Firewalls• Compression of files• System cleaning• Anti virus
User Interfaces• Command driven-blank screen and commands and code used. •Menu driven- headings and menus •Touchscreen on phones• Most common is GUI-graphical user interface-combines menu driven and icons- • GUI’s are known as WIMPS-windows, icons, menus, pointers
APPLICATION SOFTWARE Can be general purpose (e.g. ‘off the shelf’ Microsoft Office also called proprietary), bespoke (made for specific task e.g. BFL system, congestion charge system), hosted software (accessed online instead of downloaded e.g. google drive) and open source software (free and available to download, you can also modify it e.g. audacity)
Type of software Uses Example features ExamplesWord processing(JUST TEXT)
Write reports, essays, memos
Text formatting Justification Tables
Word
Desk Top Publishing(TEXT AND IMAGES)
Create posters, leaflets, magazines and newspapers
Formatting text boxes
Wrap text around images
Publisher
Presentation Present text and images online Slide transitions Hyperlinks Animation
PowerPoint
Spreadsheet Used to work out calculations Formulae Functions Graphs
Excel
Database Store large amount of data in a structured way
Data types Linking tables Queries Reports Validation
Access
Graphics Package Create and manipulate images Crop Curves, layering,
rotating Repeated patterns
and morphing
Serif drawPhotoshop
Web design software Implement websites Counters RSS feed
Dreamweaver
Audio player Listen to music Playlist Mute, play, pause
ITunesMedia player
Email Send electronic messages over the internet
Signatures CC (carbon copy) BCC (blind carbon
copy) Attachments
OutlookWeb based (Hotmail)
Types of software:Systems software – software used to enable the computer system to function e.g. operating system, utility software, driversApplications software (think Apps)– software that carries out tasks the user is interested in doing e.g. creating a graph, writing a report. Can be hosted (online like google drive), open source(free to download and modify like audacity) Bespoke (made for the purpose e.g. congestion zone software, BFL) or Off the shelf e.g. Microsoft office
Types of data processing• Real time processing - does it instantly (airplane)• Batch processing-all in one go (processing bills)• Transaction processing-one off specials
SYSTEMS LIFE CYCLEprocess followed when developing any new computer system
Feasibility study Carry out observation, interviews and view documentation to see if a new system is feasible
Analysis see what the problem is and define the desired outcomes and performance criteria
Design planning the structure of the new system, PRODUCING A TEST PLAN
Implementation creating the new system (e.g. making the database or spreadsheet)
Testing Data is input to carry out the testing against a plan to check expected results are the same as the actual results,
Evaluation Reviewing the effectiveness of the new system
User Training preparing staff to use the new system
Maintenance making any changes over time and fixing any bugs in the system
DTP SOFTWARE-is good because it creates professional looking documents and the layout can be changed more easily than word processors and the user can control the number of pages. Therefore select DTP for leaflets, magazines and anything where text and images are combined.
More tools & techniques Society’s use of IT
Legislation
Computer Misuse Act 1990 Copyright, design and Patents Act
The act was introduced in order to cover a host of computer crimes that are not covered in existing laws. It made the following illegal:• Deliberately planting a virus in a computer with the intention to cause damage.• Using computers in work time to carry out unauthorised work.• Copying computer programmes illegally.• Hacking into someone else’s system to view or change information.• Using computers for fraud, e.g. fictitious employees on payroll.
Covers a wide range of data files such as music, literature and software. The copying of files without the permission of the owner or copyright holder make it illegal to:1. Copy or download software, music films without permission.2. Install pirated software(s).3. Transmit software(s) over a telecommunications line, thereby creating a copy.4. Software licensing.5. Use software without a proper licence.
Data Protection Act 1998 – protecting people who have data held about them by businesses and organisations
Data Subjects:The living individuals who have personal data held about them on an ICT system. The Data Protection Act allows individuals to have access to information held about them on a computer and where appropriate to have it corrected or deleted. The Rights of Data Subjects• The right to compensation for unauthorised disclosure of data, inaccurate data and unauthorised access, loss or destruction of data.• The right to access the data held about them and to have it rectified or deleted, if inaccurate.What is exempt?Data on National Security, Tax information and Crime issues
The 8 principles of the Data Protection Act:1. Data shall be processed fairly and lawfully.2. Data shall be obtained only for one of more specific purposes and must not be processed in any other way.3. Data shall be adequate, relevant and not excessive in relation to the purpose.4. Data shall be accurate and where necessary up-to-date.5. Data should not be kept longer than necessary for the registered purpose.6. Data shall be processed in accordance with the rights of the data subject.7. Data shall be held securely.8. Data shall not be transferred to a country or territory outside of the EU unless there is adequate data protection legislation in operation.
How ICT has changed work patterns
- Communication online (email, videoconferencing, VOIP, instant messaging, smartphones)- No need for central offices - Less face to face communication with customers and other employees- Increased flexible hours- Hot-desking and working ‘on the move’ due to portable devices- Sharing resources (online storage)- Change in job roles (e.g. automation, robots)- Training/ retraining for new software/technology- Increased unemployment? E.g. robots, high street shops less popular than online
Communication and Entertainment ONLINE BEHAVIOUR
• WIFI – network that’s uses radio wave to enable connection to a LAN via a router
• Streaming - the media file is played directly from a media player – nothing is downloaded or stored e.g. Spotify, BBC iPlayer, 4OD
• Downloading - obtaining a file (music, video, software) by linking to another computer and transferring it to your machines via the internet. E.g. ITunes
• Phishing – sending emails • Cookies- a small text file that is stored on your computer when you
visit some websites. Used to remember settings from your last visit to a website.
• Virus- software program designed to copy itself over and over. Designed to deliberately harm, corrupt or delete files.
• Spyware- designed to track the adverts you click on then sent specific adverts to your browser
• Hacker – someone who gains unauthorised entry to computer systems
• Web log – or blog is a website used like a diary which people can read and add comments to
• Forum – website which allows others to write messages to one another, may be private or public
Behaving responsibly onlineNever meet someone you have met online in real life.Don’t open emails from unknown sources.Do not post videos/photos of yourself.Don’t accept friends on social networks unless you know them.Do not click on unknown web links/pop upsDon’t access inappropriate content onlineDon’t copy/misuse imagesDo not take place in cyberbullying/trollingNo defamatory statements
SOCIAL NETWORKING – Facebook, twitter, bebo
ADVANTAGESNo skill needed to set up a pageFreeKeep in touch with friend and familySpeak to people long distance easilyShare photographs/videos
DISADVANTAGESPeople can easily set up fake profiles and pretend they are someone elseLoss of privacyDigital footprint – you may regret the things you post in the futureCan be a distraction and timewaster!
Modelling - Using a spreadsheet model to simulate real life situations. E.g. financial modelling try out different scenarios and see what effect they would have without doing them in real life. E.g. ‘What would the effect of raising the price of a prom ticket by £2, would the school make a profit?’ Simulations are also used for aircraft, space shuttles and formulae 1 cars.
Advantages Disadvantages
No equipment is damaged The results depend on how good the model is in the first place
People aren’t put in danger Models and simulations can never completely recreate real-life situations
Expensive prototypes don’t need to be built Not every possible situation may have been included in the model
Time can be sped up or slowed down The equipment and software are expensive to purchase
Model ca be re-run numerous times Staff need to be trained how to use the software and equipment
Modifications can easily be made and tested quickly
Email - Sending an electronic message over the internet.Advantages of Email:• Message sent almost instantaneously.• Easy / convenient to send and receive information.• Allows attachments to be sent and received and these are in digital form.• Same message can be sent simultaneously to a number of people.• Can confirm delivery and / or that the mail has been read.
What is the internet?The Internet is basically a very big WAN. To connect you need a PC connected to a normal telephone line and a modem You use your modem to dial up a computer that is owned by an Internet Service providerYou need 2 pieces of software- email client and web browser. Internet has 2 main parts-WWW (world wide web) and email. Speed of access depends on 3 things- Modem speed-either 28kbps or 56kbps Telephone line-either ISDN or ADSL Volume of traffic-more people using the Internet, the slower the speed of access.
Http-hypertext transfers protocol-language that web uses. URL Uniform Resource Locator (web address www.amazon.co.uk)
UNIT 1: Systems and applications in ICT
Data logging – collecting or gathering data over a period of timeA sensor is used to collect data such as temperature, wind speed, patients in intensive care, traffic flow. Thermistor is the sensor used to take temperature.The logging interval is the period of time over which readings are taken.
ADVANTAGES- Can be used in remote or dangerous situations- Can be carried out 24 hours a day, 365 days of the year- Time intervals for collecting data can be very frequent and
regular, for example hundreds of measurements per second- No need to have a person present- More accurate as no likelihood of human error
DISADVANTAGES- If equipment breaks down or malfunctions no data will be collected- Equipment can be expensive for small tasks- Sensors must be carefully calibrated otherwise they could
take the wrong readings
Access to data•Serial access-records are stored one after another in creation order •Sequential access-records are stored one after another acc. to sensible order •Direct access-can go to record directly
Validation – checking data input into a computer system is sensible.
Verification – typing data into the system twice to double check what has been input matches, therefore is accurate (e.g. email addresses, changing passwords)
•Range check-checks data is in specified range •Presence check-makes sure data is present •Check digit-check that numerical data is accurate •Data type-checks that text is not where numbers are meant to be. •Validation problems- mistakes may be allowed if carried out wrong and only makes sure that data is right type-NOT ACCURATE.
•Proof reading-read it and make sure that its accurate •Double-entry-data entered twice and compared. Verification problems-double entry is time consuming-expensive and proof reading is time consuming and does not eliminate human error.
DATABASES
Record – store s all the information about one person or item in a database (one row in the table)
Field – one category in a record e.g.. Name, DOB or Phone number
Primary Key – unique identifier
Query – used to search the database
Mail merge – links a template document (e.g. letter in a word processor to a query or table in the database. Excellent to create a large volume of customised letters .
Collaborative Working
ADVANTAGES-Share ideas (2 heads are better than one)- Can work together on the same document via the internet- Project will be completed in a shorter time frame- Use each individuals skills to make up a strong team
DISADVANTAGES- The team may not work well together and members may fall out- Communication may be an issue