2
Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques What is ICT? ICT is the use of technology for the input of data, storage, processing to change the data into information, transfer of data to other devices and the output of information. ‘Data’ is the raw facts and ‘information’ is the processed data. E.g. NETWORKS – LANS and WANS There are two types of network: Local Area Networks (LANs) and Wide Area Networks (WANs). Local area networks are located in a building or on a site and are usually hard wired, whereas WANS are linked across countries and continents and are usually communication networks. Local area network-LAN-small-offices and schools. Wide area network-WAN-large-link together different places using internet connections. (wired or wireless) ADVANTAGES peripherals such as printers can be shared amongst several users. Software can be shared amongst several users. Communication across network is fast + cheap Logon at any terminal and access work area DISADVANTAGES Setting up is very expensive for equipment and cabling A fault with the server will prevent the whole network from working Security measures are needed to restrict access to network WANS are vulnerable to hackers and viruses. SECURITY MEASURES SERIAL NUMBERS ALARMS DOORS FIRE PROTECTION LOCK BACKUPS Backup – saving a second copy of a file in an alternative location (or storage media e.g. USB) so if the original file is lost or damaged it can be replaced from the backup. They should be kept secure- in locked fireproof rooms. (done daily) Cookies A small text file that is stored on your computer when you visit some websites. A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when Passwords-series of characters typed in to prevent unauthorised access to a computer system. They should be changed frequently, be hard to guess, mixture of letters/numbers and symbols. Data storage RAM & ROM RAM – Random Access Memory Volatile memory within the PC Lost when the computer is turned off Used to store programs which are running ROM – Read Only Memory Permanent read only memory Non volatile NOT backing storage on hard disk Operating Systems Software which is needed to run your device (e.g. phone, tablet, PC) such as Windows, Linux, IOS8 Tasks carried out • Enable applications to run • Enables software to communicate with systems hardware • It manages system resources • Monitors the performance of system • Prompts error messages. • Multi tasking means an OS can run more than one program at a time Input Devices Mouse Tracker ball Keyboard Joystick Graphics tablet/pads make drawing easier and more accurate. Bar code scanner Touchscreen Optical Character recognition – scanners read text Webcam Sensor e.g. pressure, thermistor Optical Mark recognition – read Chip and PIN or magnetic strip Storage Devices (used to save data onto) Hard disk (main internal storage 20gb to a terabyte) CD ROMS 650mb DVD 17gb Memory stick/flash drive/USB key Input Outpu t Proce ss ADVANTAGES / DISADVANTAGES COMPUTER BASED SYSTEMS ADVANTAGES Takes up less space Searching is very quick More than one person can access the same data form their network PC. The data stays in the computers memory Fewer staff are needed to look after a computer system Reports can be generated very quickly- automated DISADVANTAGES Setting up is very expensive Computer systems need people to maintain them POWER CUTS! It is easy to hack into a computer system. Users will need training and support to use them How is data stored? Bit each individual ‘1’ or ‘0’ is a bit-short for binary digit Byte 8 bits are a byte Kilobyte 1024 bytes Megabyte (Mb) 1,000,000 bytes Gigabyte (Gb) 1,000,000,000 bytes Terabyte (Tb) 1024 Gigabytes Output Devices Laser printer – high quality, fast but expensive Inkjet printer - cheaper but lower quality and slower Monitor Speakers Plotter – giant printer for maps/blue prints Headphones CPU – central processing Unit The brains of the computer which controls: The input and output to the computer All hardware attached to the system The flow of data within the system Utility Software Programs that run alongside the operating system to carry out supportive functions such as Firewalls Compression of files System cleaning Anti virus User Interfaces Command driven-blank screen and commands and code used. Menu driven- headings and menus Touchscreen on phones • Most common is GUI-graphical user interface-combines menu driven and icons- • GUI’s are known as WIMPS-windows, icons, menus, pointers APPLICATION SOFTWARE Can be general purpose (e.g. ‘off the shelf’ Microsoft Office also called proprietary), bespoke (made for specific task e.g. BFL system, congestion charge system), hosted software (accessed online instead of downloaded e.g. google drive) and open source software (free and available to download, you can also modify it e.g. audacity) Type of software Uses Example features Examples Word processing (JUST TEXT) Write reports, essays, memos Text formatting Justification Tables Word Desk Top Publishing (TEXT AND IMAGES) Create posters, leaflets, magazines and newspapers Formatting text boxes Wrap text around images Publisher Presentation Present text and images online Slide transitions Hyperlinks Animation PowerPoint Spreadsheet Used to work out calculations Formulae Functions Graphs Excel Database Store large amount of data in a structured way Data types Linking tables Queries Reports Validation Access Graphics Package Create and manipulate images Crop Curves, layering, rotating Repeated patterns and morphing Serif draw Photoshop Web design software Implement websites Counters RSS feed Dreamweaver Audio player Listen to music Playlist Mute, play, pause ITunes Media player Email Send electronic messages over the internet Signatures CC (carbon copy) Attachments Outlook Web based (Hotmail) Types of software: Systems software – software used to enable the computer system to function e.g. operating system, utility software, drivers Applications software (think Apps)– software that carries out tasks the user is interested in doing e.g. creating a graph, writing a report. Can be hosted (online like google drive), open source(free to download and modify like audacity) Bespoke (made for the purpose e.g. congestion zone software, BFL) or Off the shelf e.g. Microsoft office Types of data processing Real time processing - does it instantly (airplane) • Batch processing-all in one go (processing bills) • Transaction processing-one off SYSTEMS LIFE CYCLE process followed when developing any new computer system Feasibility study Carry out observation, interviews and view documentation to see if a new system is feasible Analysis see what the problem is and define the desired outcomes and performance criteria Design planning the structure of the new system, PRODUCING A TEST PLAN Implementation creating the new system (e.g. making the database or spreadsheet) Testing Data is input to carry out the testing against a plan to check expected results are the same as the actual results, Evaluation Reviewing the effectiveness of the new system User Training preparing staff to use the new system DTP SOFTWARE-is good because it creates professional looking documents and the layout can be changed more easily than word processors and the user can control the number of pages. Therefore select DTP for leaflets, magazines and anything where text and images are combined.

Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques What is ICT? ICT is the use of technology for the input of data,

Embed Size (px)

Citation preview

Page 1: Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques What is ICT? ICT is the use of technology for the input of data,

Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques

What is ICT?

ICT is the use of technology for the input of data, storage, processing to change the data into information, transfer of data to other devices and the output of information.

‘Data’ is the raw facts and ‘information’ is the processed data. E.g.

NETWORKS – LANS and WANS

There are two types of network: Local Area Networks (LANs) and Wide Area Networks (WANs). Local area networks are located in a building or on a site and are usually hard wired, whereas WANS are linked across countries and continents and are usually communication networks.

Local area network-LAN-small-offices and schools. Wide area network-WAN-large-link together different places using internet connections. (wired or wireless)

ADVANTAGES• peripherals such as

printers can be shared amongst several users.

• Software can be shared amongst several users.

• Communication across network is fast + cheap

• Logon at any terminal and access work area

DISADVANTAGES• Setting up is very

expensive for equipment and cabling

• A fault with the server will prevent the whole network from working

• Security measures are needed to restrict access to network

• WANS are vulnerable to hackers and viruses.

SECURITY MEASURESSERIAL NUMBERS ALARMS DOORS FIRE PROTECTION LOCK AVOID BLINDS

JUST REMEMBER SADFLAB

BACKUPS

Backup – saving a second copy of a file in an alternative location (or storage media e.g. USB) so if the original file is lost or damaged it can be replaced from the backup. They should be kept secure-in locked fireproof rooms. (done daily)

CookiesA small text file that is stored on your computer when you visit some websites.A cookie is used to remember settings from your last visit to a website. For example Amazon use cookies to help identify you when you revisit the site. The website reads the cookie and can then look up details such as you name, address, credit card number from their database. This saves you from having to re-enter your data every time you visit.

Passwords-series of characters typed in to prevent unauthorised access to a computer system. They should be changed frequently, be hard to

guess, mixture of letters/numbers and symbols.

Data storage RAM & ROM

RAM – Random Access Memory• Volatile memory within the PC• Lost when the computer is

turned off• Used to store programs which

are running

ROM – Read Only Memory• Permanent read only memory• Non volatile • NOT backing storage on hard disk

Operating SystemsSoftware which is needed to run your device (e.g. phone, tablet, PC) such as Windows, Linux, IOS8

Tasks carried out• Enable applications to run • Enables software to communicate with systems hardware • It manages system resources • Monitors the performance of system • Prompts error messages. • Multi tasking means an OS can run more than one program at a time • Determines the user interface (what it looks like)

Input Devices

Mouse Tracker ball

Keyboard Joystick

Graphics tablet/pads make drawing easier and more

accurate.

Bar code scanner

Touchscreen Optical Character recognition – scanners read text

Webcam Sensor e.g. pressure, thermistor

Optical Mark recognition – read lines in boxes e.g.

National lottery

Chip and PIN or magnetic strip credit cards

Storage Devices(used to save data onto)

Hard disk (main internal storage 20gb to a terabyte)

CD ROMS 650mb

DVD 17gb

Memory stick/flash drive/USB key

Input OutputProcess

ADVANTAGES / DISADVANTAGES COMPUTER BASED SYSTEMS

ADVANTAGES• Takes up less space • Searching is very quick • More than one person

can access the same data form their network PC.

• The data stays in the computers memory

• Fewer staff are needed to look after a computer system

• Reports can be generated very quickly-automated

DISADVANTAGES• Setting up is very

expensive • Computer systems need

people to maintain them

• POWER CUTS! • It is easy to hack into a

computer system. • Users will need training

and support to use them

How is data stored?

Biteach individual ‘1’ or ‘0’ is a bit-short for

binary digit

Byte 8 bits are a byte

Kilobyte 1024 bytes

Megabyte (Mb) 1,000,000 bytes

Gigabyte (Gb) 1,000,000,000 bytes

Terabyte (Tb) 1024 Gigabytes

Output Devices

Laser printer – high quality, fast but expensive

Inkjet printer - cheaper but lower quality and slower

Monitor Speakers

Plotter – giant printer for maps/blue prints

Headphones

CPU – central processing UnitThe brains of the computer which controls:

The input and output to the computerAll hardware attached to the systemThe flow of data within the system

Utility SoftwarePrograms that run alongside the operating system to carry out

supportive functions such as• Firewalls• Compression of files• System cleaning• Anti virus

User Interfaces• Command driven-blank screen and commands and code used. •Menu driven- headings and menus •Touchscreen on phones• Most common is GUI-graphical user interface-combines menu driven and icons- • GUI’s are known as WIMPS-windows, icons, menus, pointers

APPLICATION SOFTWARE Can be general purpose (e.g. ‘off the shelf’ Microsoft Office also called proprietary), bespoke (made for specific task e.g. BFL system, congestion charge system), hosted software (accessed online instead of downloaded e.g. google drive) and open source software (free and available to download, you can also modify it e.g. audacity)

Type of software Uses Example features ExamplesWord processing(JUST TEXT)

Write reports, essays, memos

Text formatting Justification Tables

Word

Desk Top Publishing(TEXT AND IMAGES)

Create posters, leaflets, magazines and newspapers

Formatting text boxes

Wrap text around images

Publisher

Presentation Present text and images online Slide transitions Hyperlinks Animation

PowerPoint

Spreadsheet Used to work out calculations Formulae Functions Graphs

Excel

Database Store large amount of data in a structured way

Data types Linking tables Queries Reports Validation

Access

Graphics Package Create and manipulate images Crop Curves, layering,

rotating Repeated patterns

and morphing

Serif drawPhotoshop

Web design software Implement websites Counters RSS feed

Dreamweaver

Audio player Listen to music Playlist Mute, play, pause

ITunesMedia player

Email Send electronic messages over the internet

Signatures CC (carbon copy) BCC (blind carbon

copy) Attachments

OutlookWeb based (Hotmail)

Types of software:Systems software – software used to enable the computer system to function e.g. operating system, utility software, driversApplications software (think Apps)– software that carries out tasks the user is interested in doing e.g. creating a graph, writing a report. Can be hosted (online like google drive), open source(free to download and modify like audacity) Bespoke (made for the purpose e.g. congestion zone software, BFL) or Off the shelf e.g. Microsoft office

Types of data processing• Real time processing - does it instantly (airplane)• Batch processing-all in one go (processing bills)• Transaction processing-one off specials

SYSTEMS LIFE CYCLEprocess followed when developing any new computer system

Feasibility study Carry out observation, interviews and view documentation to see if a new system is feasible

Analysis see what the problem is and define the desired outcomes and performance criteria

Design planning the structure of the new system, PRODUCING A TEST PLAN

Implementation creating the new system (e.g. making the database or spreadsheet)

Testing Data is input to carry out the testing against a plan to check expected results are the same as the actual results,

Evaluation Reviewing the effectiveness of the new system

User Training preparing staff to use the new system

Maintenance making any changes over time and fixing any bugs in the system

DTP SOFTWARE-is good because it creates professional looking documents and the layout can be changed more easily than word processors and the user can control the number of pages. Therefore select DTP for leaflets, magazines and anything where text and images are combined.

Page 2: Current & Emerging Technologies UNIT 1:Systems and applications in ICT Tools & Techniques What is ICT? ICT is the use of technology for the input of data,

More tools & techniques Society’s use of IT

Legislation

Computer Misuse Act 1990 Copyright, design and Patents Act

The act was introduced in order to cover a host of computer crimes that are not covered in existing laws. It made the following illegal:• Deliberately planting a virus in a computer with the intention to cause damage.• Using computers in work time to carry out unauthorised work.• Copying computer programmes illegally.• Hacking into someone else’s system to view or change information.• Using computers for fraud, e.g. fictitious employees on payroll.

Covers a wide range of data files such as music, literature and software. The copying of files without the permission of the owner or copyright holder make it illegal to:1. Copy or download software, music films without permission.2. Install pirated software(s).3. Transmit software(s) over a telecommunications line, thereby creating a copy.4. Software licensing.5. Use software without a proper licence.

Data Protection Act 1998 – protecting people who have data held about them by businesses and organisations

Data Subjects:The living individuals who have personal data held about them on an ICT system. The Data Protection Act allows individuals to have access to information held about them on a computer and where appropriate to have it corrected or deleted. The Rights of Data Subjects• The right to compensation for unauthorised disclosure of data, inaccurate data and unauthorised access, loss or destruction of data.• The right to access the data held about them and to have it rectified or deleted, if inaccurate.What is exempt?Data on National Security, Tax information and Crime issues

The 8 principles of the Data Protection Act:1. Data shall be processed fairly and lawfully.2. Data shall be obtained only for one of more specific purposes and must not be processed in any other way.3. Data shall be adequate, relevant and not excessive in relation to the purpose.4. Data shall be accurate and where necessary up-to-date.5. Data should not be kept longer than necessary for the registered purpose.6. Data shall be processed in accordance with the rights of the data subject.7. Data shall be held securely.8. Data shall not be transferred to a country or territory outside of the EU unless there is adequate data protection legislation in operation.

How ICT has changed work patterns

- Communication online (email, videoconferencing, VOIP, instant messaging, smartphones)- No need for central offices - Less face to face communication with customers and other employees- Increased flexible hours- Hot-desking and working ‘on the move’ due to portable devices- Sharing resources (online storage)- Change in job roles (e.g. automation, robots)- Training/ retraining for new software/technology- Increased unemployment? E.g. robots, high street shops less popular than online

Communication and Entertainment ONLINE BEHAVIOUR

• WIFI – network that’s uses radio wave to enable connection to a LAN via a router

• Streaming - the media file is played directly from a media player – nothing is downloaded or stored e.g. Spotify, BBC iPlayer, 4OD

• Downloading - obtaining a file (music, video, software) by linking to another computer and transferring it to your machines via the internet. E.g. ITunes

• Phishing – sending emails • Cookies- a small text file that is stored on your computer when you

visit some websites. Used to remember settings from your last visit to a website.

• Virus- software program designed to copy itself over and over. Designed to deliberately harm, corrupt or delete files.

• Spyware- designed to track the adverts you click on then sent specific adverts to your browser

• Hacker – someone who gains unauthorised entry to computer systems

• Web log – or blog is a website used like a diary which people can read and add comments to

• Forum – website which allows others to write messages to one another, may be private or public

Behaving responsibly onlineNever meet someone you have met online in real life.Don’t open emails from unknown sources.Do not post videos/photos of yourself.Don’t accept friends on social networks unless you know them.Do not click on unknown web links/pop upsDon’t access inappropriate content onlineDon’t copy/misuse imagesDo not take place in cyberbullying/trollingNo defamatory statements

SOCIAL NETWORKING – Facebook, twitter, bebo

ADVANTAGESNo skill needed to set up a pageFreeKeep in touch with friend and familySpeak to people long distance easilyShare photographs/videos

DISADVANTAGESPeople can easily set up fake profiles and pretend they are someone elseLoss of privacyDigital footprint – you may regret the things you post in the futureCan be a distraction and timewaster!

Modelling - Using a spreadsheet model to simulate real life situations. E.g. financial modelling try out different scenarios and see what effect they would have without doing them in real life. E.g. ‘What would the effect of raising the price of a prom ticket by £2, would the school make a profit?’ Simulations are also used for aircraft, space shuttles and formulae 1 cars.

Advantages Disadvantages

No equipment is damaged The results depend on how good the model is in the first place

People aren’t put in danger Models and simulations can never completely recreate real-life situations

Expensive prototypes don’t need to be built Not every possible situation may have been included in the model

Time can be sped up or slowed down The equipment and software are expensive to purchase

Model ca be re-run numerous times Staff need to be trained how to use the software and equipment

Modifications can easily be made and tested quickly

Email - Sending an electronic message over the internet.Advantages of Email:• Message sent almost instantaneously.• Easy / convenient to send and receive information.• Allows attachments to be sent and received and these are in digital form.• Same message can be sent simultaneously to a number of people.• Can confirm delivery and / or that the mail has been read.

What is the internet?The Internet is basically a very big WAN. To connect you need a PC connected to a normal telephone line and a modem You use your modem to dial up a computer that is owned by an Internet Service providerYou need 2 pieces of software- email client and web browser. Internet has 2 main parts-WWW (world wide web) and email. Speed of access depends on 3 things- Modem speed-either 28kbps or 56kbps Telephone line-either ISDN or ADSL Volume of traffic-more people using the Internet, the slower the speed of access.

Http-hypertext transfers protocol-language that web uses. URL Uniform Resource Locator (web address www.amazon.co.uk)

UNIT 1: Systems and applications in ICT

Data logging – collecting or gathering data over a period of timeA sensor is used to collect data such as temperature, wind speed, patients in intensive care, traffic flow. Thermistor is the sensor used to take temperature.The logging interval is the period of time over which readings are taken.

ADVANTAGES- Can be used in remote or dangerous situations- Can be carried out 24 hours a day, 365 days of the year- Time intervals for collecting data can be very frequent and

regular, for example hundreds of measurements per second- No need to have a person present- More accurate as no likelihood of human error

DISADVANTAGES- If equipment breaks down or malfunctions no data will be collected- Equipment can be expensive for small tasks- Sensors must be carefully calibrated otherwise they could

take the wrong readings

Access to data•Serial access-records are stored one after another in creation order •Sequential access-records are stored one after another acc. to sensible order •Direct access-can go to record directly

Validation – checking data input into a computer system is sensible.

Verification – typing data into the system twice to double check what has been input matches, therefore is accurate (e.g. email addresses, changing passwords)

•Range check-checks data is in specified range •Presence check-makes sure data is present •Check digit-check that numerical data is accurate •Data type-checks that text is not where numbers are meant to be. •Validation problems- mistakes may be allowed if carried out wrong and only makes sure that data is right type-NOT ACCURATE.

•Proof reading-read it and make sure that its accurate •Double-entry-data entered twice and compared. Verification problems-double entry is time consuming-expensive and proof reading is time consuming and does not eliminate human error.

DATABASES

Record – store s all the information about one person or item in a database (one row in the table)

Field – one category in a record e.g.. Name, DOB or Phone number

Primary Key – unique identifier

Query – used to search the database

Mail merge – links a template document (e.g. letter in a word processor to a query or table in the database. Excellent to create a large volume of customised letters .

Collaborative Working

ADVANTAGES-Share ideas (2 heads are better than one)- Can work together on the same document via the internet- Project will be completed in a shorter time frame- Use each individuals skills to make up a strong team

DISADVANTAGES- The team may not work well together and members may fall out- Communication may be an issue