Ict Notes New
Ict Notes New
42 or ia ni
ICT 0417
a
t
98 u pe gh
lis
12 e T S ir Theory
M
c
iv IC d
Pr e me
T
From Chapter 1 to 10
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 1 of 168
M
Page 2 of 168
Ca r.
m Mo
br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
Section 1
ICT Theory
42 or ia ni
1.3 Operating systems
1.4 Types of computer
a
t
1.5 Impact of emerging technologies
98 u pe gh
lis
Chapter 2 Input and output devices
12 e T S ir
2.1 Input devices and their uses
M2.2 Direct data entry (DDE) devices
c
2.3 Output devices and their uses
iv IC d
Chapter 3 Storage devices and media
Pr e me
t 3.3
Chapter 4
11 Networks and the effects of using them
br h
4.1 Networks
m Mo
Page 3 of 168
6.10 Expert systems
6.11 Computers in medicine
6.12 Computers in libraries
6.13 Computers in die retail industry
6.14 Recognition systems
6.15 Monitoring and tracking systems
42 or ia ni
6.16 Satellite systems
a
t
Chapter 7 Systems life cycle
98 u pe gh
lis
7.1 Analysis
7.2 Design
12 e T S ir
7.3 Development and testing
M7.4 Implementation
c
7.5 Documentation
iv IC d
7.6 Evaluation
Pr e me
t 8.2 E-safety
Security of data
8.3
Chapter 9 Audiences
g
09 at
Chapter 10 Communication
M
Page 4 of 168
1. Types and components of computer system
42 or ia ni
Hardware : is a Physical Components that makes a computer system
a
Software : is a general term of Programs that control the computer system
t
98 u pe gh
and processing data, there are two types
lis
12 e T S ir
Internal Hardware:
M
c
Motherboard
Random access memory (Ram) RAM
iv IC d
Read only memory (Rom)
Pr e me
Video Cards
Sound Cards
T
Internal Hard storage devices ROM
id am
t
(HDD & SSD) Video Card
11
br h
External Hardware:
m Mo
g
Monitor
09 at
Printer
M
Storage
Page 5 of 168
Internal hardware:
Motherboard:
Printed circuit board in all computers.
It allow the processor and other hardware to function and communicate with
each other
42 or ia ni
It is central to any computer system
All components plug into the motherboard
a
t
98 u pe gh
lis
(CPU) Central Processing Unit or (Microprocessor):
12 e T S ir
CPU is brain / heart of the computer and consists of :
M
o Control unit – Coordinates input and output devices and carries out
c
program instructions
iv IC d
o Arithmetic and logical Unit ( ALU) – performs calculations and logical
Pr e me
comparison
o Immediate access store ( IAS) – Holds data and program instructions in
T
current use
id am
t
CPU Interprets , execute the commands and handle calculations, data
11
processing and movement data to and from system memory
br h
m Mo
Volatile memory
Page 6 of 168
Video card:
Allow the computer to send graphical information to video display like monitor
or television, made of memory unit, cooling mechanism and connection to
display unit.
42 or ia ni a
t
98 u pe gh
Sound card :
lis
Integrated circuit to board to provide a computer with ability to produce
12 e T S ir
sounds
M
c
Internal Hard Disk Drive (HDD) / Solid State Drive (SSD):
iv IC d
Main internal storage
Pr e me
t
11
Software: there are two types of software (application & system)
br h
m Mo
create, save, edit the documents, copy and paste, importing photos, translate
etc…
M
Page 7 of 168
• Control and measuring software: designed to allow a computer or
microprocessor to interface with sensors to measuring temperature ,
control application like chemical process (pH)
42 or ia ni
or tablet
a
t
98 u pe gh
• Photo editing software : software allow editing digital photo stored in the
lis
computer
12 e T S ir
M
• Video editing software: software allow to manipulate videos and can do
c
editing, rearrange, adding, removing section, do color correction and
iv IC d
transition
Pr e me
to be changed
t
11
br h
• System software : Program that allow the hardware to run properly and allow the
m Mo
Source Code and the program after compilation called the Object code,
M
• Linkers: computer program that takes one or more object files produced by
compiler and combine them into a single program. Different pieces of code
called module and the linker put all together.
• Device driver: the name of software that enable one or more hardware
device to communicate with the operating system and without driver the
device unable to work.
Page 8 of 168
• Operating systems (OS): software running in the background of a computer
system , without operating system the computer will not user friendly, OS
allow:
• Input / Output operation
• User communicate with the computer
• Error handling
42 or ia ni
• Managing of security ( log in – password – user account )
a
t
98 u pe gh
• Utilities : software to carry out specific tasks on a computer, and to help to
lis
maintain and control computer recourses include :
12 e T S ir
• Antivirus, Anti-spyware, Backup files, Disk repair, File management,
M
c
Security , Screensavers, Disk defragmentation
iv IC d
Main components of computer system
Pr e me
t
1. Input devices
2. Output devices
11
3. Secondary storage devices
br h
m Mo
Boot files: Code tells the computer what to do when the first
start up referred as BIOS (Basic input/output system.
CMOS : Chip that BIOS stored the data ( date & time and
system configuration) in non-volatile chip called CMOS
(complementary metal oxide semiconductor) this is battery
powered
Page 9 of 168
Operating systems:
42 or ia ni
General tasks for Operating systems:
a
1. Controls operation of input & output & backing storage devices
t
98 u pe gh
2. Supervising running , loading, running and storage applications programs
lis
3. Deals with errors may occur in applications programs
12 e T S ir
4. Maintain security of computer system
5. Maintain computer log
M
c
6. Allow to communicate between the user and computer system
iv IC d
User Interfaces (2 types):
Pr e me
t
1. Command line interface (CLI) – used by programmers, analyst,
somebody need direct communication with the computer for
11
development. as MSDOS
br h
to know the computer works or who need to play games, handle the
g
09 at
Page 10 of 168
42 or ia ni a
t
98 u pe gh
lis
GUI
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
CLI
Types of computers
m Mo
g
09 at
Advantages Disadvantages
• Lower cost because spare parts and • Not portable.
connections tend to be standard • You need to copy files if you
• Better specification (fast processor..) do some work outside.
• No much heating • More complicated than
• Less damaged can be happened laptop
because fixed in one location
• Internet access is also stable because
not moved around
Page 11 of 168
2- Laptop / Notebook computer
Advantages Disadvantages
42 or ia ni
• Laptop in single unit then no trilling • Easier to steal.
a
wires • Battery is limited life.
t
98 u pe gh
• • Keyboard and pointing devices
lis
Can take full advantage of Wi-Fi.
• Lightweight. can sometimes be not suitable
12 e T S ir
• Low power consumption. to use.
• M
Portable, can be taken anywhere and
c
can connect with multimedia system
iv IC d
Pr e me
T
id am
t
3- Tablets
11
br h
m Mo
g
09 at
Page 12 of 168
4- Smartphone
Allow normal phone calls and also have OS ( iOS, Android, Windows)
functions of smartphone :
42 or ia ni
Send/receive email
a
t
98 u pe gh
Surf internet
lis
Global positioning system GPS
Calendar functions
12 e T S ir
Telephone banking using banking Apps
M
c
VIOP – voice over internet protocol using internet
Streaming of video
iv IC d
Streaming of music
Pr e me
Social networking
Instant message
T
id am
t Advantages Disadvantages
Easy to carry (very small in size The small screen make pages
11
br h
Used to make phone calls and also Small keyboard make difficult to
g
connect to internet while on move type things and slow also, but this
09 at
Page 13 of 168
4- Smartwatches
Allow users to wear a mini computer in their writs and have the functions of
smartphone
Some functions of smartwatches :
42 or ia ni
Internet connectivity , can browse& search ,
send email
a
t
Ability to make and take phone calls
98 u pe gh
lis
Messaging using text or video
Weather forecasting
12 e T S ir
Fitness and health monitoring capability
M
GPS , find location , using satnav , direction to
c
other location
iv IC d
Pr e me
Advantages Disadvantages
Same advantages of Same disadvantages of smartphone
T
smartphone
id am
11
Monitoring fitness and health empty battery.
br h
up to date update
During running loss of satellite can
Ca r.
make an issue
M
Page 14 of 168
Mainframe computer
Is used for large and very powerful computer system, and the main purpose
to run commercial applications such as banking, insurance where huge
amount of data.
42 or ia ni a
Main features of Mainframe computer:
t
98 u pe gh
They can have several CPUs.
lis
They have very fast processor speeds.
12 e T S ir
The can have support multiple operating
M
systems.
c
They can have huge amounts storage capacity.
iv IC d
They can have huge internal memories.
Pr e me
t
Impacts of Emerging Technologies:
11
Artificial Intelligence (AI)
br h
Vision enhancement
m Mo
Robotics
g
09 at
Quantum cryptography
Computer assisted translation ( CAT )
Ca r.
Page 15 of 168
Artificial intelligence (AI) biometric overcome this problem using
dynamic profiling , this is mean the person no worry to get his
fingerprint in exactly right place every time on the scanner
Facial-recognition system has the same problem ( wear glasses –
grown hair – has aged ) AI can overcome this problem
42 or ia ni a
Vision enhancement
t
98 u pe gh
lis
Low vision enhancement system ( LVES ) use video technology through
a headset connected to a computer, the system allow images to be
12 e T S ir
projected in from of the eyes, this bring the things closer by the user of
M
c
the system
Night vision enhancement ( NVE ) amplifies infrared light and visible light
iv IC d
so that the image can still be seen in the darkness ( military use this
Pr e me
technology
T
Robotics
id am
t
Robotics mostly used in manufacturing industry, like weld car bodies ,
11
spray body panels, fit items
br h
civilians.
Robots can perform many tasks:
Ca r.
Exploring (Volcanos)
Repetitive manufacturing job ( Cars )
Moving heavy objects
Surgical procedure
Page 16 of 168
Quantum cryptography
Cryptography is the science of making a message unintelligible to any
unauthorized user (hacker).
Quantum cryptography is based on the use of photons (light) and their
42 or ia ni
physical quantum properties
a
Send a message with complete privacy (encryption)
t
98 u pe gh
lis
Make it much more complex to decrypt, ( enable secure
12 e T S ir
communication
Computer-assisted translation ( CAT )
M
c
• When human translators use computer software to help in translation
iv IC d
process
Pr e me
t More accurate
11 Multilingual
br h
Quick translator
m Mo
g
09 at
hologram )
• Hologram use 2 regular 2D images to manipulate to produce 3d images
• Hologram have the following application:
Engineering design CAD
Architecture , ability to rotate design 360 degrees
Simulations
Medical imaging ( see inside organs as 3D )
Cinema ( special effects)
Gaming ( special effects)
Advertising
Holographic television expecting in 2025 without special glasses
Holographic computer memories ( new options of optical storage
Page 17 of 168
Optical computers ( speed will be faster )
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
Holography involves to use:
c
A source of laser light
iv IC d
Interference of light
Pr e me
Light diffraction
Light intensity recording
T
id am
t
11
br h
m Mo
Virtual reality
g
09 at
Page 18 of 168
Heritage ( to see the mountains)
Business ( Training course )
Real state ( people can look around the house )
Engineering ( to show how design of the building will look )
Media ( special effects of movies( The matrix ) )
42 or ia ni
Scientific visualization ( to see molecular structure in chemistry
a
t
98 u pe gh
lis
Impacts on everyday life:
12 e T S ir
Improved medical surgeons
Stronger building
M
c
More realistic education ( interactive learning environment)
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 19 of 168
2- Input and output devices
42 or ia ni a
t
1- Keyboards :
98 u pe gh
lis
Uses :
12 e T S ir
Input of data (text, number,..) into applications software
M
Typing commands to the computer ( Ctrl P + Ctrl S … )
c
Mostly QWERTY keyboard is used
iv IC d
Ergonomic keyboard is used to reduce the health-related problems
Pr e me
t
• Easy to use has limited arm/wrist use.
11
• Easier to do verification checks as • Slow method when compared
br h
• Large device.
g
09 at
2-Concept Keyboard
Ca r.
Page 20 of 168
2. Numeric keypads
Used to enter number only
USES:
Automatic teller machines (ATMs).
42 or ia ni
Mobile phones.
Point-of-sale (POS)
a
t
Chip and PIN devices when paying by credit/debit cards
98 u pe gh
lis
Fast entry of numeric data into a spreadsheet
12 e T S ir
Advantages Disadvantages
M
• Faster than standard keyboard • Sometimes have small keys, input
c
• Very easy to carry around more difficult.
iv IC d
• Sometimes the order of the
Pr e me
t
11
Pointing devices:
br h
m Mo
1- Mouse
g
09 at
USES:
Opening, closing and minimizing software.
Grouping, moving and deleting files.
Controlling the position of a pointer on the screen
Advantages Disadvantages
• Faster way than using a keyboard. • More difficult for people with
• Very quick way to navigate restricted hand
applications and internet • Easy to damage
• No need large desk area. • Difficult to use if no flat surface
Page 21 of 168
2- Touchpad
Used in many laptop as a pointing device
42 or ia ni
Advantages Disadvantages
• Faster than a keyboard • People with limited hand/wrist
a
t
• No need for a separate mouse. movement find the device difficult
98 u pe gh
lis
to use.
• Difficult to control when compared
12 e T S ir
to a mouse.
M • Difficult in certain operations such
c
as drag and drop.
iv IC d
Pr e me
T
id am
t
11
3-Tracker ball
br h
Uses
m Mo
(RSI)
09 at
Advantages Disadvantages
• Easier than a mouse. • Not supplied with computers as
• More accurate positioning. standard.
• More robust than a mouse. • User may need training
• Needs less desk space than a mouse
Page 22 of 168
4-Remote Control
Uses :
Televisions, satellite systems, most of systems
use remote controls.
Control multimedia systems.
42 or ia ni
Used in industrial applications to remotely
control processes.
a
t
98 u pe gh
Advantages Disadvantages
lis
• Operated from any reasonable • Difficult to use if the operator has
12 e T S ir
distance. limited hand/wrist movement.
• Some chemical processes are • It is easier to block the signal.
M
c
hazardous, can select operation
from distance
iv IC d
Pr e me
5-Joystick
T
id am
t
Uses :
11
Used in video/computer games.
br h
Used in simulators
m Mo
g
09 at
Advantages Disadvantages
Ca r.
Page 23 of 168
5-Driving wheel
Uses :
Used in video/computer games.
Used in simulators (car-driving
42 or ia ni
simulators)
Advantages Disadvantages
a
t
• Easier than a keyboard or • Expensive input device.
98 u pe gh
lis
joystick. • Movements too sensitive.
• Actual steering wheel and other
12 e T S ir
controls operate in real life.
M
c
iv IC d
Pr e me
6- Touchscreens
Uses :
T
id am
t Self-service
ATMs
11
br h
Point-of-sale terminals
Airports, railway stations, tourist
m Mo
offices
g
09 at
Advantages Disadvantages
• Faster entry. • Limited number of options
• Very easy method. available.
• User-friendly. • Can lead to problems.
• The screen can get very dirty,
reduce its responsiveness
Page 24 of 168
7- Scanners:
There are two types of scanner, The most common is
flatbed scanner, also barcode scanner is another type
Uses
• Scan documents.
42 or ia ni
• Scan in old/valuable documents/books.
• Scan in photographs.
a
t
• Scan in barcodes at POS terminals.
98 u pe gh
lis
Advantages Disadvantages
• Images can be stored for editing • Quality can be limited depend on
12 e T S ir
at a later date. resolution of the scanner.
M
• Much faster and more accurate. • Slow at scanning if color scanning
c
• Recovery damaged documents selected
iv IC d
and photographs.
Pr e me
T
id am
t
8- Digital Camera
11
Digital cameras replaced with traditional based film ,
br h
Advantages Disadvantages
• Easier to produce better-quality • The quality of photographs
photographs. depends on the number of pixels.
• Easier and faster to upload • Images compressed to reduce
photographs to a computer reader. the memory used.
• No need to print out photographs.
• Can store several hundred
photographs.
Page 25 of 168
9- Video Cameras
DV (digital video) cameras, store
compressed photo frames at speed of 25
MB per second this is known as (MOTION
JPEG)
42 or ia ni
Advantages of using DV cameras compared to traditional cameras
a
t
98 u pe gh
lis
• Much easier to manipulate video.
• DV format gives a very high quality of image
12 e T S ir
M
c
iv IC d
Pr e me
10- Microphone
T
Microphone connected directly with the computer,
id am
t
Sounds converted to an analogue signal then converted
11
into a digital signal
br h
Uses :
m Mo
Presentations.
g
Page 26 of 168
11-Sensors
Sensor is a device to input data into a computer, the data is physical
quantity like temperature, light, moister, this data is analogue in nature
Computer can read only digital data , then the data from sensor should
42 or ia ni
be converted to digital using an analogue digital converter ADC
a
t
Type of sensors:
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
Advantages Disadvantages
g
09 at
Page 27 of 168
12- Graphic Tablet
Used with stylus to produce freehand drawing
Uses
42 or ia ni
produce freehand drawings
a
Used in computer-aided design (CAD)
t
98 u pe gh
work
lis
12 e T S ir
M
Advantages Disadvantages
c
• Modify drawings before they are • More expensive than other
input. pointing devices.
iv IC d
• Very accurate method of drawing. • Takes time to produce a drawing
Pr e me
t expensive to produce.
• The touch screens are damaged
11 easily.
br h
m Mo
g
09 at
13- Webcams
Ca r.
M
Uses
Conversation while chatting online.
Video conferencing
Advantages Disadvantages
Immediate face-to-face video chat Very limited features and often
Contact with each other without poor quality.
traveling Need to be connected to the
computer.
Page 28 of 168
14- Light pens
Light pens contain sensors that send signals to a
computer whenever light changes are detected,
and only work with CRT monitor
42 or ia ni a
Uses :
t
98 u pe gh
• Selecting objects on CRT screens
lis
• Drawing on screen ( as example CAD Package)
12 e T S ir
M
c
Advantages Disadvantages
Greater accuracy than touch screen Problems with delay when
iv IC d
Small drawing on screen.
Pr e me
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 29 of 168
Direct data entry ( DDE ) devices:
Devices for reading information from cards
Magnetic stripe readers
Used to read information on the magnetic stripe
42 or ia ni
founded in back of credit/debit card
a
Uses:
t
98 u pe gh
On credit/debit cards for use at ATMs or EFTPOS
lis
(Electronic Funds Transfer at Point Of Sale)
12 e T S ir
terminals
Security devices to allow entry to buildings,
M
c
(as in hotel rooms)
iv IC d
Advantages Disadvantages
Pr e me
Securet
• Prevents access to restricted areas • Not human readable.
•
11
Not affected by oil, water, moisture
br h
• Very robust.
m Mo
g
09 at
Page 30 of 168
• Retailers will not access to the • Can take money twice.
customer’s card. • Transactions are a small
• The chip in the contactless
credit card responds with a
unique number used for that
transaction only.
42 or ia ni a
t
98 u pe gh
lis
Chip and PIN readers
Similar to smart card reader but used in EFTPOS terminal
12 e T S ir
Uses:
M
Payments using card in (restaurants, supermarkets,
c
travel, etc.).
iv IC d
Pr e me
Advantages Disadvantages
• More secure • Need to be careful to ensure PIN
T
id am
t
• More robust isn’t read by somebody else while
typing it in.
11
br h
m Mo
Page 31 of 168
Magnetic ink character recognition/reader (MICR)
Is as system to read characters printed in a special ink
Uses:
42 or ia ni
Used to process bank cheque in banking operation
a
using system called batch processing
t
98 u pe gh
lis
12 e T S ir
Advantages Disadvantages
M
• Offer greater security than OCR • Only certain characters can be read
c
• No manual input, so errors are and the number of different
iv IC d
reduced characters is very limited.
Pr e me
t
11
br h
Uses:
09 at
Advantages Disadvantages
• Very fast way of inputting the • The forms need to be carefully
results of a survey. designed and correctly positioned
• More accurate. which can make problem for result.
Page 32 of 168
Optical character recognition/reader (OCR)
The new system in processing of passport and id cards
Uses:
Processing of passports and identity cards
42 or ia ni
Converting printed documents to an editable
a
electronic format
t
98 u pe gh
Read car number plate
lis
Advantages Disadvantages
12 e T S ir
• Much faster data-entry system • Difficulty reading handwriting
M
• The number of errors is reduced • Not very accurate
c
• Can read handwriting
iv IC d
Pr e me
t
OCR OMR
11
br h
Because this method reads handwriting, it Since use shading to answer, the
is possible for customers to extend their information obtained is limited to the
m Mo
poor handwriting may cause reading OMR relies on simply detecting where
09 at
OCR is used for converting printed OMR simply reads the position of marks,
documents to an editable electronic so it is ideal for multiple-choice exam
format papers
OCR requires a complex recognition This method requires complex (and
system expensive) forms to be
completed; but the recognition system is
simpler than OCR
Fewer 'how to fill in' instructions are While this method requires more 'how to
needed for forms designed to be fill in' instructions, it is easier and faster
completed and then read by OCR for customers to complete OMR forms
than to complete OCR forms
While OCR is more accurate than data OMR is essentially a more accurate
entered into a computer by keyboard, method for reading data than OCR
there are still problems recognizing
all types of handwriting, leading to
inaccuracies
Page 33 of 168
Barcodes readers ( hand scanner )
Uses:
Supermarkets and shops
Libraries to keep track of books
Safety function - electrical equipment checking
42 or ia ni
regular basis.
a
t
Advantages Disadvantages
98 u pe gh
lis
• Much faster • Expensive system to administer.
• Way of recording data • Not foolproof.
12 e T S ir
• Allow automatic stock control. • Easily damaged than RFID tags or
M
• Trusted technology.
c
magnetic strips.
iv IC d
Pr e me
t
QR can hold over 7000 digits.
11
• Smartphone with camera can read QR code which
br h
Advantages
• No need to write down a key or
Ca r.
website
• QR can store the website address
M
Page 34 of 168
Output devices and their uses
CRT monitors
Cathode ray tube (CRT) monitors
Uses:
42 or ia ni
Output device
Used with light pens
a
t
98 u pe gh
lis
Advantages Disadvantages
• The angle of viewing is still better • Present a safety hazard if not
12 e T S ir
than with most TFT monitors supported properly
M
• They work with light pens in • Run very hot and can cause fires
c
CAD/CAM applications • They consume more power than
iv IC d
modern TFT
Pr e me
t
11
br h
Uses :
Output device
Ca r.
Laptop computers.
M
Advantages Disadvantages
• Lightweight • The angle of viewing a TFT is
• Produce less glare than CRT monitors fairly critical.
• Less radiation • Definition is sometimes not as
• Consume less power / don’t generate good as a CRT monitor.
much heat
Page 35 of 168
LCD and LED monitors
• CRT monitor almost gone
• Most monitors become LCD ( Crystal Liquid display / diode
42 or ia ni
technology
• Modern monitors are backlight using light emitting diode LED
a
t
which give the monitor better contrast and brightness
98 u pe gh
lis
• LED no need warm up to reach to full efficiency
• LED produce brighter light
12 e T S ir
• LED consume very little power / produce less heat
M
• OLED is new technology , which is very thin, flexible, lighter
c
iv IC d
Multimedia projectors
Pr e me
T
Uses :
id am
t
Training presentations
11
Advertising presentations
br h
Advantages Disadvantages
g
Page 36 of 168
Printers
Laser Printers
Produce high-quality, high-volume printing
42 or ia ni
Uses :
a
When low noisy required
t
98 u pe gh
lis
High-quality, high-volume printing
12 e T S ir
Advantages Disadvantages
M
c
• Low noisy • Color laser is expensive
• Fast if several copies • Produce ozone and volatile
iv IC d
• Handle very large print jobs organic compounds.
Pr e me
• High quality
• Long time toner
T
id am
t
11
Inkjet printers
br h
m Mo
Uses:
g
09 at
Advantages Disadvantages
• High-quality • Slow output if several copies
• Cheaper than laser printers. • Can't do large print jobs
• Very lightweight and a small • Printing can (smudge) if user is
• Don’t produce ozone and volatile not careful
organic compounds • Can be expensive
Page 37 of 168
Dot matrix printers
type of impact printer head is slow, noisy and the
output is not good
Uses:
42 or ia ni
Used in noisy environments
a
t
Advantages Disadvantages
98 u pe gh
lis
• Used in environments that would be • Very noisy
a problem to laser or inkjet printers • Actually cost more than an inkjet
12 e T S ir
• Carbon copies or multi-part outputs • Very slow, poor-quality printing
M
c
can be produced
• Very cheap
iv IC d
• Easy to use
Pr e me
T
3 D printers
id am
t
Primarily used in computer aided design CAD
11
applications, can produce
br h
solid objects
m Mo
g
09 at
Advantages Disadvantages
Ca r.
Page 38 of 168
Speakers
Uses :
• Output sound
• Play downloaded sound files
42 or ia ni
• Audio output helps disabilities user.
a
t
98 u pe gh
Wide Format Printer
lis
Used to produce large drawings e.g. blueprints of
12 e T S ir
buildings; are often used with CAD applications
M
Used to produce large pictures for use on
c
billboards or giant posters
iv IC d
They can also print on plastic coated paper
Pr e me
11
br h
m Mo
g
09 at
Control applications
Ca r.
42 or ia ni
microwave ovens to tell the
operator when the cooking
a
process is complete
t
98 u pe gh
lis
Lights The actuator is connected
to the switch that turns the
12 e T S ir
lights on or off
M Uses
c
• Security lights
• In glasshouses
iv IC d
Heaters Actuators are connected to
Pr e me
t
Uses
11 • Automatic washing
br h
m Mo
oven
• Control the heating in a central heating
Ca r.
system
M
Page 40 of 168
3- Storage devices and Media
42 or ia ni
Backing of data is refers to copy files or data to different medium ( disk, tape,
a
flash drive .. ) in case of problem with the main secondary storage device , and
t
98 u pe gh
copying should be in regular bases.
lis
12 e T S ir
M
Why back up data?
c
• To safeguard against loss of data due to the failure of the original
iv IC d
secondary storage
Pr e me
Type of access
m Mo
Serial access:
g
09 at
• When using serial access it is necessary to start from the beginning of the
Ca r.
file then access to each record ( like database including field , record and
M
Page 41 of 168
Direct access:
• Used with magnetic disks , optical media and solid state media
• The computer use key field to calculate where data should be stored
• Direct access much faster than serial access
• When updating files using direct access the old file or data written over
42 or ia ni
by new records
• Mostly used where data access speed is vital like controlling chemical
a
t
98 u pe gh
plants or online systems like booking air tickets or automatic stock
lis
control.
12 e T S ir
Secondary storage media:
M
c
The term byte is used to measure the size of memory or storage or file
size, and measured by KB, MB, GB and TB
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Magnetic
Optical
Solid state
Page 42 of 168
Magnetic storage media (Direct access)
Magnetic storage media depend on magnetic properties of certain
materials, data read using direct access
42 or ia ni a
1- Fixed/internal hard disk drive (HDD)
t
98 u pe gh
lis
Uses :
12 e T S ir
To store the operating systems, software
M
/data/files
c
To store applications software
Real-time systems ( robots, control of a
iv IC d
Pr e me
t
• Very fast data transfer and fast access • Easily damaged
times
11 • Have many moving parts
br h
be quite noisy
g
09 at
Page 43 of 168
Magnetic Tapes ( Serial Access )
Data is read from the tape using serial access , this way
is useless in real-time or online applications because is
very slow method
42 or ia ni
Uses:
a
t
In applications where batch processing is used, for example, clearing
98 u pe gh
lis
bank cheques, utility billing (gas, electricity, water)
Backup media
12 e T S ir
Used in long-term archiving of data.
M
c
Advantages Disadvantages
• Less expensive. • Very slow data access times.
iv IC d
• Very robust technology. • When updating, another tape is
Pr e me
t fields.
11
br h
m Mo
CD/DVD disks)
M
Page 44 of 168
1-CD-ROM and DVD-ROM
Uses:
CD-ROMs are used to store
42 or ia ni
music files, software, computer
a
games and reference software , they can't be written over
t
98 u pe gh
DVD-ROMs have much larger storage and used to store films and
lis
games
12 e T S ir
Advantages Disadvantages
M
c
• Store more data than floppy disks • The data transfer access time is
• Less expensive than hard disk slower than hard disks
iv IC d
Pr e me
t
R letter means the disk is recordable once only
11
br h
Uses:
Home recordings of music (CD-R) and
m Mo
g
films (DVD-R)
09 at
Advantages Disadvantages
• Cheaper than RW disks • CD-R/DVD-R can only be
M
Page 45 of 168
3- CD-RW and DVD-RW
RW means the disk is rewritable media
and can be written several times
Uses:
42 or ia ni
To record television programmers
a
Data can be added to at a later.
t
98 u pe gh
Used in CCTV systems
lis
Advantages Disadvantages
12 e T S ir
• Can be written over many times. • Relatively expensive.
M
• Can use different file formats • It is possible to accidentally
c
each time it is used. overwrite data.
iv IC d
Pr e me
4- DVD – RAM
T
id am
t
Uses:
and playback
g
09 at
Advantages Disadvantages
M
Page 46 of 168
5- Blu-ray discs
42 or ia ni
A blue laser, carry out read and write operations
Blu-ray can store up to five times more than DVD
a
t
98 u pe gh
lis
Uses:
12 e T S ir
Home video
M
Storing and playing back movies.
c
Data storage or backing up
iv IC d
Camcorder to store movie footage
Pr e me
Advantages Disadvantages
• Very large storage capacity • Expensive
T
• Very fast data transfer rate • Encryption problems
id am
t
• Data access speed greater than • Fewer movie titles on Blu-ray
11
other optical format
br h
m Mo
g
09 at
Ca r.
M
Page 47 of 168
Solid state storage media Solid (Direct access)
42 or ia ni
Lighter
a
Lower power consumption.
t
98 u pe gh
Run much cooler than HDDs
lis
Very thin.
12 e T S ir
Data access faster than HDD
M
c
iv IC d
1- Memory sticks/pen drives
Pr e me
Uses :
t
11
Transporting files between computers /
br h
backup
m Mo
Advantages Disadvantages
Ca r.
Page 48 of 168
2- Flash memory cards
42 or ia ni
Uses:
Storing photos on digital cameras
a
t
98 u pe gh
Used as mobile phone memory cards
lis
Used in MP3 players to store music files
12 e T S ir
Used as a backup store in hand-held
computer devices
M
c
iv IC d
Advantages Disadvantages
Pr e me
device
t • Lower storage capacity than
• Very robust.
11 hard disks.
br h
m Mo
g
09 at
Ca r.
M
Page 49 of 168
4- Networks and the effects of
using them
42 or ia ni
Computer Network:
A network is two or more computers or other device connected together so
a
t
that can exchange data, share resources and files. Network created using
98 u pe gh
lis
cables or wireless signal
12 e T S ir
Advantages of using Network:
M
c
Easily share files and data
Share resources (printers, internet..)
iv IC d
Communicate with other network users
Pr e me
t
Disadvantages of using Network:
11
Greater risk of hacker
br h
computers
M
Network Devices :
Hubs:
Hubs are hardware devices that
can have a number of devices or
computers connected to them to
make LAN and not very high
secure / suitable for home
network
Page 50 of 168
Switches
Similar to hub but more
efficient, connect a number of
devices or computers together
to form a LAN and more
42 or ia ni
secure
a
t
98 u pe gh
lis
Modem
12 e T S ir
M
• A device that converts analogue signal from telephone line to
c
digital signals which can be ready for the computer
• Also converts a computer’s digital signal into an analogue
iv IC d
Pr e me
t
up to 100 Megabits /s
11
br h
m Mo
g
09 at
Ca r.
M
Bridge:
Bridges are devices that connect
one LAN to another LAN that
uses the same
protocol
Page 51 of 168
Router:
• Connect network/computer to the internet
• Connect LAN/network together
• Transfer data between networks
• Router can connect two devices using cables
42 or ia ni
or wireless signal
a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Network interface card (NIC)
Pr e me
t
11
br h
m Mo
g
09 at
Ca r.
M
Other hardware
Gateway:
A gateway is a network point that
acts as an entrance to another
network
Page 52 of 168
Network cables:
Even most of computers systems is using Wi-Fi
still network cables used because they have some
advantages over Wi-Fi :
Faster data transfer rate
42 or ia ni
Can be more secure than wireless
networks
a
t
98 u pe gh
lis
Internet protocol (IP) and media access control ( MAC ) addresses
12 e T S ir
• Each device on the internet given unique address called internet
M
c
protocol (IP) address and the form is ( 109.108.158.1 )
• Home computer when connect to internet given IP assigned by ISP
iv IC d
(internet service provider )
Pr e me
t
Differences between IP and ( MAC ) addresses
11
br h
42 or ia ni
which due to disconnection
a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Bluetooth: is wireless networking technology designed for very short
Pr e me
range connections
T
id am
t
• Connecting wireless devices such as mouse, phone, which are very
11
close to a computer
br h
• Low-bandwidth
Page 54 of 168
Differences between Wi-Fi and Bluetooth
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
t
Suppose you asked to setup and configure small network, you have to do
11
br h
the following:
m Mo
to receive internet
connection
M
• Setting an IP account if
internet access is required
• Buy appropriate hardware
and make setup for all
hardware
• Configure all hardware with software correctly to allow wireless
connectivity
• Put all software into the server with its license
• Setup privilege (each user can access only on their own area)
• Setup network manager level of privilege to monitor the network
uses and can change the password
Page 55 of 168
Purchase hardware and software:
42 or ia ni
1-Hardware
Router to connect your LAN to the
a
t
internet
98 u pe gh
lis
12 e T S ir
Switch / to connect Network devices
M
c
Hub together using cables
iv IC d
Network to connect physical
Pr e me
cables connections
T
id am
t
Firewall
11 it can be hardware of
br h
Page 56 of 168
2- Software
Web to browse the internet
browser
42 or ia ni
E-mail to send and receive e-mail
a
including attachments
t
98 u pe gh
lis
Security Anti-virus /Spyware software
12 e T S ir
to protect your computer
M
c
from external threats
(Viruses / Hackers )
iv IC d
Pr e me
Network Environments
T
id am
t
(Local area networks (LANs) and Wide area networks (WANs):
11
br h
m Mo
close area.
Ca r.
Page 57 of 168
Wide area networks (WANs)
42 or ia ni
WAN is often created by joining several
a
LANs together
t
98 u pe gh
Router is used to connect LAN networks
lis
to form a WAN network
12 e T S ir
The most common example of WAN is Internet
M
c
iv IC d
Wireless LANs (WLANs)
Pr e me
t
Devices known as Access Points (AP) are
11
connected to wire network at fixed locations.
br h
Advantages Disadvantages
• All computers can access the • Security a big issue
same services and resources • Affect the signal by any problem.
(such as printers, scanners, • The data transfer rate is slower
internet) than in a wired LAN.
• Increased flexibility.
• Adding new computers and
devices is very easy
Page 58 of 168
Accessing the internet
42 or ia ni
Laptop computers smaller size compared to to use to navigate
a
desktop webpages
t
98 u pe gh
• Bigger screen compared • Processors are not as fast
lis
to tablet and mobile as desktop computers
12 e T S ir
phones
M • Stable internet • Should be connected to a
c
connection since the power supply all the times
Desktop
iv IC d
connection is normally • Not portable
Pr e me
wired
• Use of input devices
T
including pointing devices
id am
11
br h
move tablets
• Mobile : Always likely to • Touch screen may be
have a mobile all the difficult to use
Mobile Phones times • Limited battery life
• Mobile : can access
internet via mobile phone
network
Page 59 of 168
Internet and intranet:
• Internet :
Internet is public
Internet is network of networks
42 or ia ni
Internet is global
a
Internet has more information
t
98 u pe gh
than an intranet
lis
12 e T S ir
• Uses of internet:
M
c
Viewing webpages
Sending and receiving email messages
iv IC d
Communication using VIOP and Web video Conferencing
Pr e me
11
• Intranet :
br h
m Mo
organization ( private )
Intranet can be policed
Ca r.
/ managed
M
• Uses of Intranet:
Viewing internal webpages ( Company , School , …)
Internal e-mail and messing between workers
Sharing internal documents
Page 60 of 168
Network issues and communication
Security issues:
42 or ia ni
• Threats of data:
a
Data could be deleted,
t
98 u pe gh
lis
edited, corrupted or
replicated
12 e T S ir
Data could be passed to
M other people
c
Accessing your email
iv IC d
account
Pr e me
advantages disadvantages
• To protect vulnerable users • It would be extremely difficult
gaining access to undesirable and expensive to police the
websites internet
• To prevent illegal material be • Infrastructure and staff would
opened or shared by web users have required
• It will stop incorrect information • It is difficult to push roles in
being published on websites different countries
• This will be against freedom
Page 61 of 168
Reliability of information
Information on the internet is more up to date than in books.
It is much easier to get information from websites.
There is a big amount of information on the internet that is
42 or ia ni
easier to locate than using several books
Information could also be incorrect.
a
t
It is possible to get millions of hits, which may make it difficult
98 u pe gh
lis
to find the relevant information.
12 e T S ir
Unwanted of certain websites
M
Risk of finding undesirable websites.
c
Risk of connecting to websites that are not genuine, which
iv IC d
could lead to a number of problems.
Pr e me
Security risks.
T
Methods of Authentication (username and password)
id am
t
• Authentication: it technique to ensure only authorized users
Page 62 of 168
• At least one other keyboard character.
Strong password Exp. (Syl2@#TT90kj=0 )
Week password Exp.( white, ahmed ,,,, )
Viruses:
• Computer virus is a piece of programming code/ software which can
42 or ia ni
install and replicate itself on the computer system without the user’s
permission which can cause:
a
t
Crash the computer ( become slower)
98 u pe gh
lis
Can delete the files
Data files can be copied by hacker
12 e T S ir
Can stop the production
M
c
Antivirus software:
iv IC d
Antivirus software will check for virus attacks.
Pr e me
t
Any possible files or programs that are infected are put into
Encryption:
• Encryption is the process of
converting information into a
form that is meaningless to
anyone except holder of key.
Data is encrypted
If the data intercepted it then it prevents people from
understanding and reading the data
The person with the key is able to Decrypt and
understand the data
Page 63 of 168
Disadvantages:
Data can still be deleted from the system
Criminals can use encryption to keep incriminating
material secure
42 or ia ni
To avoid virus and spyware when using internet:
a
t
Don’t download any files from
98 u pe gh
lis
untrusted source
Don’t install illegal software
12 e T S ir
Don’t click any link from unknown
M
c
websites
Ensure antivirus is up-to-date
iv IC d
Always look at security indicator
Pr e me
t
computer.
11
br h
• Most of countries have some form of Data Protection Act, these are
g
Page 64 of 168
Network communication (A physical fax-Electronic faxing and email)
42 or ia ni
• Require fax machine and • Anyone can access fax
a
telephone line documents
t
Physical Faxing
98 u pe gh
• Number of recipient • The fax may be out of paper
lis
dialed before the of toner
12 e T S ir
documents copied and
sent
M
c
• Physical documents are
printed and can be signed
iv IC d
• Can send multiple • Attachments may include a
E-mail
Pr e me
attachments virus
• Can send to multiple • May receive SPAM
T
recipients in one message • May receive Phishing e-mail
id am
Laptop)
g
Electronic Fax
• No need to buy fax machine, ink or paper
• Electronic fax send to Email
Ca r.
Page 65 of 168
Network communication
Type of
Overview Hardware
communication
• Video conferencing uses
42 or ia ni
Video Conferencing both video and audio using
a
an internet connection
t
98 u pe gh
• It can be used for business
lis
meeting when people are in
12 e T S ir
different locations
c
iv IC d
Pr e me
t Microphone
11
br h
Advantages Disadvantages
m Mo
Page 66 of 168
Type of
Overview Hardware
communication
Audio conference can be done
Audio over the telephone network or
Conferencing using a computer making use of
42 or ia ni
VOIP
a
• The organizer of the phone
t
98 u pe gh
conference is given unique Pin which
lis
can be shared participants to join
Telephone (VOIP) –
12 e T S ir
they have to dial the conference
phone number then they would have Microphone – speakers
M enter a PIN
c
Web Web conferencing can be done using
iv IC d
Conferencing internet connection
• Very similar to video conferencing
Pr e me
• Business meetings
09 at
Page 67 of 168
5- The effects of using ICT
There are four main areas people losing their jobs:
1. Office work
42 or ia ni
2. Manufacturing
a
3. Shop work
t
98 u pe gh
lis
4. Banking
12 e T S ir
The effects of ICT on unemployment
M
c
Negative effects - job losses
iv IC d
Pr e me
Office Work:
T
id am
Page 68 of 168
Application software Effects
Can do formula to calculate automatically
42 or ia ni
payroll, salary calculation, wage slips,
a
number of hours worked
t
98 u pe gh
Spreadsheets Can do graph or charts
lis
As example: teachers can monitor the
12 e T S ir
progress of their students (results / marks /
M sort / chart ..)
c
This lead to reduction of staff
iv IC d
Easy to add and update personal data such
Pr e me
Manufacturing:
M
Page 69 of 168
How this change the way of people work?
People lost their job to robots
Robots can work in dirty or dangerous environment
Robots can move heavy lifting
Working environment clean and safe
42 or ia ni
Workers have had to retrain to gain the following new skills:
o Maintenance of the robots
a
t
98 u pe gh
o Quality control
lis
o Design and development
12 e T S ir
o Marketing
o Training other workers.
M
c
iv IC d
• Advantages of robots over humans
Pr e me
Higher productivity.
More consistent results
T
id am
t Work non-stop without breaks
11 They don’t get bored by repetitive tasks.
br h
• Positive effect
Although ICT led to people losing their jobs, also led to create new big list
of jobs:
Network managers
Computer technicians
Website designers
Systems analysts
Programmers
Computer engineers
Delivery drivers
Page 70 of 168
The effects of ICT on working patterns:
42 or ia ni
Staff usually work between 1 and 30 hours,
Part-time working someone can work fewer hours per day or
a
t
per week than full time
98 u pe gh
lis
Staff have ability to choose when can start
Flexible working and finish but must complete full day's
12 e T S ir
( Flexi-time) work
M This require agreement with employer
c
Full time job is divided between 2 workers
iv IC d
, one employee in the morning and the
Pr e me
Page 71 of 168
Microprocessor – controlled device in the home
Is a device that uses computer to control its functions, the devices fall
in main two categories:
42 or ia ni
Automatic washing machines
a
Microwave ovens
t
98 u pe gh
Cookers
lis
Automatic dishwashers
12 e T S ir
Robotic vacuum cleaners
M
Bread making machines
c
Smart fridge and freezer
iv IC d
Pr e me
This allow people to get on with other things while the device carries
out their tasks
T
id am
t
11
2- Other type of devices
br h
Alarm clocks
m Mo
Television sets
g
09 at
Advantages Disadvantages
Reduces number of manual task at Can lead to unhealthy life styles
home because readymade meal
Give people time to do some Tend to make people lazy since they
activities (shopping – hobbies ) while are depend on devices
devices cooking foods or washing
clothes
Page 72 of 168
Smartphone can make control to People become less fit if the people
switch on/off oven / central heating just lie around at home while the
devices carry out the tasks
Automatic burglar alarms give people Losing household skills
sense of security
42 or ia ni
Smart fridges and freezer can lead to
healthy lifestyle
a
t
98 u pe gh
lis
Advantages and disadvantages of other of microprocessor-controlled
12 e T S ir
devices ( not related to lifestyle )
M
c
Advantages Disadvantages
iv IC d
Save energy since the device can Some people not familiar with this
Pr e me
t
using QR codes instead of press receiver ) is very wasting of electricity
buttons manually
away )
g
09 at
Ca r.
M
Page 73 of 168
6- ICT Applications
Communication Applications
42 or ia ni
1- Paper Based : Flyers, Posters, Brochures and Newsletters
a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 74 of 168
2- Websites:
Companies uses websites
for advertising and
communicate the customers
Websites can easily updated
42 or ia ni
and can provide relevant
and up-to-date information
a
t
Websites can use for online shopping, research, social
98 u pe gh
lis
networking, banking..
12 e T S ir
Advantages
M
c
• Video/ sound can be added
• Can hyperlink to another websites
iv IC d
• Can have navigation buttons
Pr e me
11
br h
Disadvantages
m Mo
• Risk of pharming
09 at
3- Multimedia presentations:
Presentations that use animation, video and
sound or music are generally much more
interesting than a standard presentation
and can be displayed on the projector to
keep the audience see.
Page 75 of 168
Advantages:
• Video/ Sound/Music can be added
• Can add hyperlink to the presentation
• Can have transition effects
42 or ia ni
• Presentation can be interactive
a
t
Disadvantages:
98 u pe gh
lis
• It needs special equipment/ expensive
• Equipment failure can be disaster
12 e T S ir
• Wherever presentation you need internet connection
M
c
4- Music scores:
iv IC d
Music now can created and edited on the
Pr e me
slogan
t
11
br h
faster
Ca r.
• Solo music scores can be easily transformed into music for many
M
parts
• Software can automatically correct the music score
• Music can be played automatically as it is written
• Music notes are automatically printed out in the correct format
• Music scores can be saved for future editing
5- Cartoons:
• Animation can be created by using
hardware and software specially 3D
animation software to promote new
product
• Objects are designed on a computer
Page 76 of 168
• 3D skeleton produced
• The parts of this skeleton are moved by animator using key frames
• This frames define start point and end point
• The difference in the appearance of the skeleton in this key frames
automatically calculated which known as (twinning – morphing)
42 or ia ni
and the final stage known as (rendering).
• Cartoons can be created by freehand drawing
a
t
98 u pe gh
lis
12 e T S ir
6- Mobile phones:
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 77 of 168
Advantages of using corporate letterheads produced by a printing website:
42 or ia ni
• Advertising
• High impact than white paper
a
t
• Can make the company appear larger than it is.
98 u pe gh
lis
12 e T S ir
8- Data handling applications
M
c
Number of applications can make simple data handling technique:
iv IC d
• Surveys: information from surveys can be stored in a database
Pr e me
t
include contact names, numbers, email, address
11
• Clubs/ Society records : information for current members
br h
Measurement applications:
Measurement applications, using sensors and other electronic hardware.
Data convert from Analogue to Digital through (ADC) Analogue Digital
Converter
Page 78 of 168
Examples:
Weather stations
Scientific experiments
Measuring a patient’s vital signs on a hospital
42 or ia ni
Pollution monitoring
a
Burglar alarm systems
t
98 u pe gh
lis
1- Weather station:
12 e T S ir
Weather station setup up automatically to gather information from the
M
c
environment, variety of sensor can measure:
iv IC d
Rainfall
Pr e me
Temperature
Wind speed
T
id am
t
Wind direction
(Barometric) pressure ( air
11pressure )
br h
Humidity
m Mo
g
09 at
break
M
Page 79 of 168
2- Measuring a patient's vital signs in a hospital
Sensors read key vital signs (such as
pulse rate, heart rate, temperature,
blood pressure, respiration, etc.)
The data from the sensors is
42 or ia ni
converted into digital using an ADC.
The data is stored in the
a
t
98 u pe gh
computer’s memory.
lis
The computer compares the data
12 e T S ir
from the sensors with the values stored in its memory
The results are output on a screen in the form of graphs and/or
M
c
numerical readouts
An alarm is activated if any of the data is outside acceptable input
iv IC d
values
Pr e me
The system continues to measure the patient’s vital signs until the
computer is turned off.
T
id am
t
3- Measuring pollution in a river:
11
br h
The data from the sensors is converted into digital using an ADC and
g
sent to a computer
09 at
The oxygen levels and acidity levels are compared to the historical
M
Page 80 of 168
Advantages:
• The computer wouldn’t forget to take readings.
• The computer’s response time is much faster.
• Doctors, nurses, scientists etc. can get on with other tasks
42 or ia ni
while measurements are taken by computers
• Computers give 24-hour cover every day.
a
t
• More accurate reading
98 u pe gh
lis
• Readings can be taken more frequently
• Safer since is being measured take readings or a nurse looking
12 e T S ir
after a patient
M
c
• Computers can produce graphs automatically
• Cost saving as fewer staff are needed
iv IC d
Pr e me
Disadvantages:
• The computer is unable to respond to unusual circumstances.
T
id am
earlier.
• The microprocessor/computer will check whether the incoming
data is outside the given parameters and will take any
necessary action
Page 81 of 168
Some control application includes:
• Automatic washing machines.
• Automatic ovens/cookers.
• Central heating systems.
42 or ia ni
• Chemical plants (Petrochemicals).
• Glasshouse environment control.
a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
1- Automatic oven/cooker
11
br h
Page 82 of 168
2- Central heating systems
• A gas supply is used to heat water in a boiler.
• A valve on the gas supply is controlled by a microprocessor and
is opened if the heating levels need to be increased.
42 or ia ni
• A water pump is used to pump hot water around the central
heating system whenever the temperature drops below a
a
t
98 u pe gh
preset value
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
Only works if the temperature is above 70°C and the pH level is less than
Ca r.
3.5. Sensors are used as part of the control system. A heater is used to
heat the reactor and valves are used to add acid when necessary to
M
Page 83 of 168
pH is greater than 3.5, then a signal is sent to open a valve
and acid is added
pH is less than or equal to 3.5, then a signal is sent to close
this valve
The computer signals will be changed into analogue signals
42 or ia ni
using a DAC so that it can control the heaters
a
t
4- Glasshouse environment control:
98 u pe gh
lis
Five different sensors could be used here to control the glasshouse
12 e T S ir
environment; namely, Humidity, Moisture, Temperature, pH and
Light M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 84 of 168
M
Page 85 of 168
Ca r.
m Mo
5- Turtle graphics
br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
M
Page 86 of 168
Ca r.
m Mo
br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
Modeling applications
Spreadsheets :
• Business can use spreadsheets models to forecast
future profit or loss
42 or ia ni
• Due to use of formula business can adjust certain
a
values to see automatic change.
t
98 u pe gh
Flight simulator :
lis
• Pilots able to learn how to fly a plan using simulator
12 e T S ir
• The interface and control are the same real plan
M • Different conditions can be tested
c
• Reduced cost as plan will not be damaged
Building simulator:
iv IC d
• Before building are constructed, simulator take place
Pr e me
t earthquake or storm
11
Traffic Lights
br h
Page 87 of 168
Manufacturing applications:
Robotics:
• Robots are used in many areas of
manufacturing like, paint spraying
42 or ia ni
of car bodies, welding bodywork
a
on cars, manufacturing of
t
98 u pe gh
microchips, manufacturing
lis
electrical goods and automatic
12 e T S ir
warehouses.
M • Robots include (built-in)
c
microprocessors or linked to a
iv IC d
computer system
Pr e me
Advantages:
T
id am
Greater consistency
g
09 at
Page 88 of 168
1- School registration systems:
The traditional way for student's attendance consume 10 minutes
from each session the beginning. There are number of possible ways
of automating the registration
42 or ia ni
Method 1 :
a
t
Issue each student with an ID card.
98 u pe gh
lis
ID card contain a magnetic stripe
12 e T S ir
on the rear of the card.
The student would have to sign the
M
c
card and also write his unique
student ID on the back of the card.
iv IC d
The magnetic stripe would contain the name of the school
Pr e me
t
magnetic card reader.
The data now stored on a database.
11
br h
Method 2 :
09 at
use of biometrics.
M
Page 89 of 168
Advantages of finger print:
• Finger print are unique, impossible to sign in with another
fingerprint
• ID could be easily lost
• ID can be affected by magnetic field
42 or ia ni
• It is easier to make copy of ID card but you can’t with
fingerprint.
a
t
98 u pe gh
lis
Disadvantages of finger print:
• It would take long time to collect
12 e T S ir
• The equipment to take and read fingerprint is expensive more
M
c
than ID reader
• If the student cut his finger will prevent him to enter.
iv IC d
• May be the parents object to take finger print for their children
Pr e me
T
id am
t
2- Student performance:
• Teacher are able to enter students data ( grades /reports /
11
br h
Page 90 of 168
Booking systems:
Example uses :
42 or ia ni
Transport : Flight, Trains, Buses
a
Entertainment : Theater, Cinema, Stadium
t
98 u pe gh
lis
Accommodation: Hotels, Apartments, Villas
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 91 of 168
• The user selects their seat(s) by highlighting the actual seats on the
screen, display and then clicks CONFIRM to go to the next part of the
process.
• The database searched to check the availability of the selected seats
• If the seats are available, the total price is shown + the seat numbers
42 or ia ni
• If the customer is happy with this, they select CONFIRM on the
screen
a
t
98 u pe gh
lis
Advantages of online booking systems
Prevent double-booking.
12 e T S ir
The customer gets immediate feedback on the availability of
M
c
seats
The customer can make bookings at any time of the day.
iv IC d
The customer can receive any special offer by e-mail
Pr e me
t
No printed tickets which saves costs
Online booking allows to use modern smartphone and tablet
11
br h
apps technology.
Confirmation message sent once payment approved has been
m Mo
g
authorized
09 at
Ca r.
Page 92 of 168
Banking Applications
The application of computers in the banking sector have enhanced
productivity regarding account management in this part we will
consider:
1. The use of automatic teller
42 or ia ni
machine ATM
a
2. Internet banking
t
98 u pe gh
3. Telephone banking
lis
4. Chip and Pin technology
12 e T S ir
5. Clearing of cheques
M
6. Electronic fund transfer
c
iv IC d
Pr e me
t
11
br h
m Mo
g
09 at
Ca r.
M
Page 93 of 168
2- Internet Banking & Online shopping :
• Using internet banking requires good security. It allows the
transfer of sums of money between accounts, payment of bills,
42 or ia ni
ordering of statements, and so on.
• Online shopping and banking means that more and more people
a
t
are staying at home to buy goods and services
98 u pe gh
lis
Advantages of online shopping and banking
12 e T S ir
No need to travel / reducing costs and time-wasting.
M
c
Users have access to a worldwide market and can look for
products that are cheaper.
iv IC d
Disabled and elderly people can access any shop without to
Pr e me
leave home.
Shopping and banking can be done at any time 24/7
T
id am
The shops and banks save money , not having as many staff
g
09 at
Page 94 of 168
High street shops and banks are closing because of the increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
It is easier to make errors with online banking and transfer
money incorrectly to different accounts
42 or ia ni a
t
98 u pe gh
lis
Effects on companies due to the spread of online shopping and banking:
Companies can save cost by hiring fewer staff and no need to
12 e T S ir
have many shops or banks in high street.
M
c
Because the internet is global the potential customers is
increased.
iv IC d
Some will increase to retrain the staff and the need to employ
Pr e me
t
websites to enable online shopping and banking.
Because there is no interaction between customer and
11
br h
loss of customers.
Robberies are less because decreases of number of high street
g
09 at
banks.
Bank also need to employ fewer security staff which is
Ca r.
reducing cost.
M
3- Telephone Banking:
• Similar to internet banking but the difference is using telephone
rather than computer
• The sequence of using Telephone banking is :
• The customer keys in their account number
• They are requested to enter four-digits PIN or selected
numbers from their PIN
• The customer will hear list of options which might be
include:
Page 95 of 168
1. Press (1) for your balance
2. Press (2) to carry out a money transfer
3. Press (3) to pay a bill
4. Press (4) to talk for one of our representatives
• The customer will choose an option
42 or ia ni
• As the same Online Banking the customers are able to:
1. Check balance
a
t
2. Pay bill or transfer money to another account
98 u pe gh
lis
3. Talk to a bank representatives
12 e T S ir
4- Chip and PIN
M
c
Many credit cards equipped with Chip
& Magnetic strip which have key
iv IC d
information like PIN
Pr e me
t
customer go to restaurant to pay
bill for meal using a chip and PIN
11
card
br h
Page 96 of 168
11. The same amount is added to the restaurant bank
account
12. A receipt is produced as proof of purchase
42 or ia ni
5- Clearing of cheques :
a
t
Processing bank cheques uses batch processing
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
Expert systems:
c
Expert system is a computer software that attempts to act like a
iv IC d
human expert on a particular field.
Pr e me
Page 98 of 168
3. Inference engine - This acts rather like a search engine,
examining the knowledge base for information
that matches the user's query
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
Using an expert system:
id am
t
• The non-expert user queries the expert system. By asking a
11
question, or by answering questions asked by the expert system.
br h
Page 99 of 168
How to setup an expert system?
Data is gathered/collected from experts to create knowledge
base
The rules base is designed/create a based on the information
from the knowledge base.
42 or ia ni
A user interface screen is designed / created which would
provide the user with the ability to interact with the system
a
t
An explanation system is also developed
98 u pe gh
lis
The inference engine is designed / created as link between the
12 e T S ir
user interface and the knowledge base
The system is tested.
M
c
Experts are interviewed about how the expert system effective
iv IC d
Pr e me
Computers in medicine:
T
id am
t
1- Patient and pharmacy records:
history.
g
09 at
2- Monitoring patients:
• By connecting patient to computer system, to carry out
24/7 monitoring the computer can monitor:
Heart rate
Respiration
Brain activity
Blood/body temperature
Blood pressure
Blood sugar levels
Oxygen levels in the blood
42 or ia ni
• CT (computed tomography ) - which involves
producing images of the internal parts of the body
a
t
• MRI (magnetic resonance imaging) - this uses strong
98 u pe gh
lis
magnetic fields and radio waves to produce a series
of images of the internal organs in the body
12 e T S ir
M
c
Prosthetics:
• 3D printer can print
iv IC d
prosthetics (false arms,
Pr e me
t
11 o Tissue engineering:
br h
Computers in libraries:
42 or ia ni
• Computers are used in libraries to keep
a
track on which books have been
t
98 u pe gh
borrowed by which members.
lis
Database is used to store details of
12 e T S ir
book and members and usually
M
barcodes on the book
c
• Two files will exist which is ( Book file
iv IC d
and Borrowers' file)
• When borrowers take the book the
Pr e me
t
• The system will calculate “due back” date
11
• The borrowers library card contains a unique barcode and will be
br h
also scanned
m Mo
• Book file linked with borrowers file and two files updated
g
09 at
42 or ia ni
strip card
Some libraries also is using RFID
a
t
98 u pe gh
lis
Computers in the retail industry:
12 e T S ir
M
c
1- Automatic stock control system using barcodes:
• Barcodes allow quick
iv IC d
Pr e me
t
• Point of sale is the place a
at the POS
EPOS
Electronic Point Of Sale
2- Electronic fund transfer and Chip and Pin cards:
Already described
3- Internet shopping:
Already described
42 or ia ni
If less than the re-order level then the item is automatically re-
ordered
a
t
98 u pe gh
lis
Barcode used in the following applications:
Library book system
12 e T S ir
Administration systems
M
c
Passport / ID cards
Some burglar alarm systems
iv IC d
Equipment checking systems
Pr e me
t
Recognition systems:
11
Recognition systems are used directly to enter data into computer
br h
system.
m Mo
42 or ia ni
Automatic Number Plate Recognition (ANPR) System:
• Automatic number plate recognition (ANPR) systems are
a
t
98 u pe gh
used to read the number plates on cars, car parking is an
lis
example of ANPR as the following steps:
12 e T S ir
o STEP (1)
M Sensor detect vehicle and send signal to
c
microprocessor to instruct the camera to
iv IC d
capture image of the vehicle
Pr e me
o STEP (2)
An algorithm used to isolate number plate
T
The bright and contract of the number plate is
id am
t
adjusted to be clearly read
11 Each character is on the number plate is
br h
m Mo
segmented
Each character recognized by OCR software
g
09 at
42 or ia ni
The ticket is issued to the vehicle driver ,
a
shows date and time entering the car park
t
98 u pe gh
lis
o STEP (4)
12 e T S ir
When the vehicle driver returns to the car park
M they insert the ticket into a machine which
c
calculate charges
iv IC d
The payment registered on the database
Pr e me
42 or ia ni
2. Tracking released prisoners to
a
ensure they stay within an agreed
t
98 u pe gh
location ( Ankle mentoring)
lis
3. Monitoring customers buying patterns
12 e T S ir
M
2- Cookies:
c
When a user visit a website cookie is created to store the user
iv IC d
browsing, described in chapter 8
Pr e me
3- key logging:
T
id am
t
Software to monitor which keys has been pressed, hackers can
use this to obtain Password
11
br h
m Mo
1. To improve employees
performance ( call center)
2. Can be used as training tool
3. Manager/ supervisor can join to call where necessary
4. Allow to the companies aware about security to listen to
calls (Police)
The three types of call monitoring :
1. monitor : manger listen to employees
2. whisper: as a training tool
3. barge: manger join to call between employee and others
Satellite systems:
Page 107 of 168
Global positioning satellite (GPS) systems and satellite navigation
42 or ia ni
location
a
Walkers to locate position on
t
98 u pe gh
hills / mountains
lis
Used by runners to calculate
12 e T S ir
distance
M
c
• Four satellites must be visible to the driver
iv IC d
• Calculates the distance from the receiver to the satellite
Pr e me
t
Advantages:
speed cameras
The system can estimate the time of arrival.
Ca r.
Disadvantages:
Loss of satellite signals can cause problems
Maps should be kept up to date, they can give incorrect
instructions if not up-to-date
If an incorrect start point or end point is keyed in the
system will give incorrect information
42 or ia ni a
t
98 u pe gh
GIS uses:
lis
Road network
12 e T S ir
Teachers can use GIS in
M
geography, science lessons
c
Biologist use GIS to protect
iv IC d
animals life and plants
Pr e me
T
id am
t
3- Media communication systems:
11
br h
Fi, Satellite )
M
Analysis
42 or ia ni a
Collecting information about the current system and identify the problems
t
98 u pe gh
lis
Design
12 e T S ir
M
Designing a new system to correct the problems identified in the analysis stage
c
iv IC d
Development and Testing
Pr e me
t
11 Implementation
br h
m Mo
Documentation
Ca r.
M
Evaluation
Evaluate if the new system meets the requirements and client expectation
1- Analysis :
The basic step of analysis:
42 or ia ni a
t
Identify the problems with the current system
98 u pe gh
lis
12 e T S ir
M Agree the objective with the clients
c
iv IC d
Identify and agree customer requirements
Pr e me
T
id am
The first step in analysis stage is researching an existing system and there
are four common methods for fact finding:
42 or ia ni
• The analyst obtains reliable data • People uncomfortable being
• Possible to get an overall view watching, may can make in
a
t
of the system differed way
98 u pe gh
lis
• Inexpensive method • Workers may do some mistakes,
12 e T S ir
while watching may they will not
do it
M
c
iv IC d
2-Questionnaires
Pr e me
t
Advantages Disadvantages
11
• The questions can be answered • The number of returned
br h
m Mo
they want
• This method allow quick
M
analysis of data
42 or ia ni
to go deeply into specific aspects of the existing system
a
t
Advantages Disadvantages
98 u pe gh
lis
• Its open opportunity to • Time consuming
motivate interviewee to give • Expensive method ( by using
12 e T S ir
open and honest answer to the analyst time )
M • Interview can’t remain anonymous
c
analyst
• Open for more feed back
iv IC d
• Possible to modify question as
Pr e me
interview
T
id am
t
4. Looking at existing paperwork :
11
This method allow the analyst to see how the paper files are kept
br h
Advantages Disadvantages
Ca r.
42 or ia ni a
Example of reserving seat on a flight:
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
42 or ia ni a
The basic step of design:
t
98 u pe gh
lis
Design the data capture form / input forms
12 e T S ir
M
c
Design the screen layout
iv IC d
Pr e me
11
br h
42 or ia ni
1. Clear heading and instruction
a
t
98 u pe gh
2. Use of text boxes to collect
lis
information such as name, date of
12 e T S ir
birth, gender..
M
3. Use of tick box to make choice
c
easier
iv IC d
4. Clear fonts and text styles
Pr e me
t
11
Example of data about can manually completed for input later into the
br h
computer system:
m Mo
g
09 at
Ca r.
M
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
Form title
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Tick box /
Save/ Close / Radio button
Navigation button
Before entry form created, the database should be created and the
following details should be considered:
42 or ia ni
1. Text
a
2. Integer (numeric)
t
98 u pe gh
3. Boolean
lis
4. Data & Time
12 e T S ir
5. Object
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
42 or ia ni
4. Font color and size are clear
a
5. Output report should include report type ( header ,
t
98 u pe gh
lis
footer , fitting page correctly)
12 e T S ir
As Example of printed report :
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
Flow chart used to show data flow through a system and how
Ca r.
42 or ia ni
one medium to another, there are two ways for verification check:
a
• Double entry : data is entered twice, using two people,
t
98 u pe gh
lis
and is then compared
• Visual check : checking for errors by the person who is
12 e T S ir
entering the data; compare the entered data with the
M
c
original document
iv IC d
Pr e me
Validation:
T
id am
t
Is a process where data is checked to see if it satisfies certain criteria
11
when input into a computer
br h
m Mo
Validation technique:
g
09 at
Range check :
Ca r.
Look-up check :
• Check the data entered exists and stored in a table of data
• Example : check “ Training manager “ exists in the option”
Length check :
• Check the input data contains the required number of
character
42 or ia ni
Example: Person /employee name shouldn't have any numbers
a
t
98 u pe gh
Format / picture check :
lis
• Check the data in specific format
12 e T S ir
• Example : date should be in date format dd/mm/yyyy or
M identification number for a person xnnnnn ( single letter
c
followed by five digits)
iv IC d
Pr e me
Presence check :
• Check the data already present and not missed
T
id am
Consistency check :
g
Check digit :
• This is an extra digits added to the telephone number
• Example : if two number transposed during entry like ( 13597
instead of 13579
• Example : if number enter twice 13559 instead of 13579
• Example :if one number missing 1359 instead of 13579
File Structures:
Analyst should take the following into account :
• Field length
42 or ia ni
When producing a software for the new system it is very important to test
a
t
98 u pe gh
it thoroughly in order to:
lis
12 e T S ir
Make sure that meets the clients requirements
Remove any bugs or error from the system
M
c
Make sure that produces the required output
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
42 or ia ni
tested:
a
t
Create the file structure ( Field names, data type)
98 u pe gh
lis
Validation rules
12 e T S ir
User interface, check if the user interface is friendly
M
c
iv IC d
Pr e me
File structure
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
User interface
a
t
98 u pe gh
lis
Testing strategies:
12 e T S ir
Software is often developed in modular form. This method allows
M
c
the software to be broken down into smaller parts called module
this means each part developed separately.
iv IC d
Once the development of each module is completed, the whole
Pr e me
t
correctly before the system is implemented.
11
br h
Normal
Ca r.
Abnormal
M
Extreme
Live
c
iv IC d
Pr e me
T
id am
Normal: t
Data that is acceptable /reasonable and has an expected outcome;
11
br h
Extreme:
09 at
Abnormal:
Data outside the limits of acceptability, or the wrong type of data,
and should be rejected or cause an error message; values are not
allowed as example inputs for the month: -15 or -1 or any value
>12 or letters or non-integer 10.34 all abnormal
Live :
Data is entered into the new system and the results compared
with those produced from the existing system.
Direct
42 or ia ni
Direct changeovers
Old system stopped overnight
a
t
98 u pe gh
then replaced with the new
lis
Old System New System
system immediately
12 e T S ir
Advantages Disadvantages
M
c
• The benefits are immediate • May will be disaster if
• Cost are reduced because one system is new system failed
iv IC d
running
Pr e me
t
Parallel Parallel changeovers
11
Old system and new system
br h
New
Ca r.
System
Advantages Disadvantages
M
• If the new system fails the old • More expensive than direct,
system still running because extra staff needed
• Possible to train staff gradually • Time consuming since the
data entered into 2 systems
42 or ia ni
Old System
company before to introduce
a
for whole company
t
98 u pe gh
lis
New System
12 e T S ir
Advantages Disadvantages
M
• If the new system failed only one • It will take time to
c
part is affected implemented across all
iv IC d
• Possible to train staff one area departments
Pr e me
t
11
Phased
br h
Phased changeovers
Only one part from the system
m Mo
Old System
work satisfactory, then introduce
next part until to fully replaced
Ca r.
whole system
M
New System
Advantages Disadvantages
• If a part fails, can go to failure • More expensive than direct
point ( failure is not disaster ) because each phase will
• Possible to ensure the system evaluate separately
working properly before • Time consuming because each
expanding part will be evaluated
4- Documentation :
Page 127 of 168
When the system is fully developed amount of documentation needed. To
introduce for (the end user – people who may need to develop the system in
the future, there are two types of documentation:
User Documentation and Technical Documentation
42 or ia ni a
1- User documentation
t
98 u pe gh
lis
To help the user to learn how to use the new system
12 e T S ir
How to load/install/run the software
M
How to save files / search/sort data
c
How to do print outs
iv IC d
How to add, delete or amend records
Pr e me
11
Software requirements
br h
Tutorials
M
2- Technical documentation:
To help the programmers / analysts to repair and maintains the system and
can consist of any of :
Program listing/coding
Programming language used
Program flowcharts/algorithms
42 or ia ni
Software requirements
Minimum memory requirements
a
t
known ‘bugs’ in the system
98 u pe gh
lis
List of variables used (and their meaning/description)
File structures
12 e T S ir
Sample runs (with results and actual test data used)
M
c
Output formats
Validation rules
iv IC d
Meaning of error messages
Pr e me
5- Evaluation:
T
id am
t
The final stage of the system life cycle is to evaluate the system which has been
11
br h
implemented, the main purpose is to see if the new system resolved the issues
m Mo
of the previous system and met the requirements in the design stage and the
g
09 at
following list is some of the main evaluation points considered when evaluating
the new system:
Ca r.
The results from the evolution may due to two things happening:
42 or ia ni
•
a
Update of software because:
t
98 u pe gh
lis
• Feedback from end user
12 e T S ir
• Changes to the company structure that may need modification
• Changes in legislation that may require modifications to the
M
c
software
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Physical Security:
42 or ia ni
Health aspects:
a
Health and safety regulations advise that all computer systems have at least
t
98 u pe gh
moveable table and anti-glare screens, adjustable chairs and foot supports,
lis
suitable lighting and uncluttered work stations, and recommend frequent
12 e T S ir
breaks and frequent eye tests.
M
c
Health risk list:
iv IC d
Pr e me
Ways to eliminating or
Health risk
T
minimizing risk
id am
problem/strain
• Use foot rests to reduce position
m Mo
angle
M
42 or ia ni
screen for long time or
having incorrect lighting less
a
• Take a regular break
t
98 u pe gh
• Use screen anti-glare if the lighting in the
lis
room is not correct or use window blinds
12 e T S ir
to reduce sunlight reflecting from the
M screen.
c
• User should check his eyes on a regular
iv IC d
basis
Pr e me
t
lighting, screen
• User should check his eyes on a regular
reflections, flickering
11 basis
br h
screen.
m Mo
5) Ozon irritation :
09 at
Safety risks:
42 or ia ni
Health risk Ways to eliminating or minimizing
a
risk
t
98 u pe gh
lis
(1) Electrocution • Use residual current breaker RCB
• Check insulation on wires regularly
12 e T S ir
• Don’t allow drinks near to computers
M •
c
Check equipment on regular basis
iv IC d
(2) Trilling wires • Use cable ducts to keep the wires save
Pr e me
t possible
11
br h
hardware
falling and causing injury
g
42 or ia ni
any fabric, which can block ventilation holes
a
Don’t plug too many devices into an electric outlet socket -
t
98 u pe gh
overloading can cause a fire
lis
Make sure you exercise every hour to prevent health risk
12 e T S ir
M
c
E- Safety:
Refers to safety while using internet and devices (keep your data in safe
iv IC d
while using:
Pr e me
Mobile phone
Computer or tablet
T
id am
t
Games console
11
Wireless technology.
br h
m Mo
42 or ia ni
Only open emails from known
a
sources.
t
98 u pe gh
Only send email people you know
lis
Using social networking sites, instant messaging or chat room
12 e T S ir
M
c
You must be conscious when you are using social media networking
iv IC d
sites or chat room:
Pr e me
t
Be very careful with the language used in chat rooms
Always use a nickname and never use your real name
11
br h
Never arrange to meet anyone for the first time on your own
Always tell an adult first and meet the person in a public place
Ca r.
Security of data:
42 or ia ni
There are a number of security risks associated with any electronic device
a
as the following list:
t
98 u pe gh
lis
Hacking
12 e T S ir
Phishing
M
Smishing
c
Vishing
iv IC d
Pharming
Pr e me
Spyware
Viruses
T
id am
tSpam
Moderated and unmoderated forums
11 Cookies
br h
m Mo
g
09 at
Ca r.
M
42 or ia ni
Hacker can delete,
a
corrupt, edit, files or
t
98 u pe gh
change data or personnel
lis
information
12 e T S ir
Hacker can steel user identity
M
Hacker can stop production
c
iv IC d
Method to avoid or remove:
Pr e me
Using firewall
Using strong password
T
id am
t
Using protection software
Use user ID and password
11
br h
Use encryption
m Mo
g
09 at
(2) Phishing:
Ca r.
42 or ia ni a
Effects of Smishing :
t
98 u pe gh
The effects are similar to Phishing and
lis
Pharming where personnel details will
12 e T S ir
be obtained from users
M
c
Strategies to avoid smishing :
iv IC d
Double check the SMS message ,
Pr e me
4- Vishing:
g
09 at
What is Smishing? Short for voice mail phishing , uses voice mail
message to trick the user into calling the telephone number contained
Ca r.
5- Pharming:
What is pharming? Malicious code installed in the user computer to
direct the user to fake website
42 or ia ni
Some anti-spy software can identify and remove Pharming
a
code
t
98 u pe gh
Always double check the URL to see if is the same one you
lis
typed in
12 e T S ir
M
(6) Spyware and key-logging software
c
iv IC d
What is Spyware? : software to collect data by monitoring key presses
Pr e me
on the user’s keyboard, the data send back to the user who sent the
software.
T
id am
t
Effects of spyware:
Spyware gives the originator access to all data entered using a
11
br h
(7) Viruses:
What is the computer virus? : Program code or software which can
replicate or copy itself to do something like deleting or corrupt the
files or operating system
Effects of virus :
42 or ia ni a
Strategies to avoid viruses:
t
98 u pe gh
Install Ani-virus software and update regularly
lis
Don’t use any software from unknown source
12 e T S ir
Don’t open attached file by e-mail from unknown sender
M
Always backing up the files
c
iv IC d
(8) Spam:
Pr e me
t
Effect of spam e-mail :
11
br h
Set the protection filter level to high when you use junk mail
M
Moderated forums:
Refers to online discussion forum in which all the posts are
checked by an administrator before posting
42 or ia ni
Moderator can prevent spam, filter out any posts are
a
inappropriate, rude or offensive
t
98 u pe gh
lis
Unmoderated forums:
12 e T S ir
No one owns the internet
M
Not policed
c
iv IC d
(10) Cookies:
Pr e me
t
server to user’s computer:
11
br h
42 or ia ni
1. To examine the traffic between a user’s computer
a
t
98 u pe gh
2. Checks whether incoming or outgoing data meets a given set of
lis
criteria
12 e T S ir
3. If the data fails the criteria, firewall will block the traffic and give
M
the user a warning about security issue.
c
4. The firewall can be used to log all incoming and outgoing traffic
iv IC d
to allow later interrogation by the user.
Pr e me
Record Protocol:
This part of the communication can be used with or without
encryption, it contains data
42 or ia ni
being transferred over the
a
internet.
t
98 u pe gh
Handshake Protocol :
lis
It is a secure session
12 e T S ir
between user and website is established
M
c
Main differences between SSL and TLS:
iv IC d
It is possible to extend TLS by adding new authentication
Pr e me
methods.
TLS can make use of session caching, which improves the
T
id am
Session cashing:
The use of session caching can avoid the need to utilize so
much computer time for each connection. TLS can either
establish a new session or attempt to resume an existing
session
42 or ia ni
The science of encrypting and decrypting information is called
a
cryptography. In computing, unencrypted data is also known as
t
98 u pe gh
lis
plaintext, and encrypted data is called cyphertext.
The key used to encrypt is called encryption key and the key used
12 e T S ir
to decrypt called decryption key
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
42 or ia ni a
t
98 u pe gh
Digital certificates:
lis
• A digital certificate is a pair of files stored on a user’s
12 e T S ir
computer , each pair of files divided into:
M
c
A public key (which is known by anyone)
iv IC d
A private key (known to the computer user only).
Pr e me
information.
M
42 or ia ni
Passwords should be changed on a regular basis
If the password not matching with the user ID that access will
a
t
98 u pe gh
be denied.
lis
Many systems asking to enter password three times as a
12 e T S ir
maximum before user lock out.
It's important to prevent others people to gain access to your
M
c
password through spyware or viruses.
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
Biometrics:
Biometric is a method of authentication, it relies on certain unique
characteristics of human beings and examples include:
1. Fingerprint scans
2. Signature recognition
3. Retina scans
4. Iris recognition
5. Face recognition
6. Voice recognition
42 or ia ni
database, if they matched then access allowed
a
t
98 u pe gh
lis
Advantages:
12 e T S ir
Fingerprint for each person is unique and this technique will
M
improve the security since to be difficult to replicate person’s
c
fingerprint.
iv IC d
Other security devices such as (magnetic card) can be lost or
Pr e me
stolen
It's impossible to sign in by somebody else since the fingerprint
T
id am
11
br h
m Mo
Disadvantages:
g
09 at
Retina scans
Retina scans use infrared light to scan the
unique pattern of blood vessels in the
retina
It is very secure because no way to
duplicate blood vessels patterns
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
c
iv IC d
Pr e me
T
id am
t
11
br h
m Mo
g
09 at
Ca r.
M
42 or ia ni
shops, malls, restaurants, and hotels and it allows you to access the
a
Internet for free, there is always a risk that somebody is monitoring
t
98 u pe gh
internet usage in the area.
lis
12 e T S ir
M
Number of simple precautions users can take:
c
Always use varied and complex passwords.
iv IC d
Check the accuracy of bank accounts continually
Pr e me
t
Don’t provide personal information to any unsolicited requests for
11
information
br h
42 or ia ni
No need to carry memory sticks if you want to access your files
a
t
from home
98 u pe gh
lis
You don’t have to pay for large storage capacity on your
12 e T S ir
computer/tablet or mobile phone
Cloud will ensure that your files are backed up and will reduce
M
c
the possibility of losing data
Ability to synchronize files because automatically updated
iv IC d
across all devices
Pr e me
t
document
11
br h
42 or ia ni
will use or take part in the system
a
t
98 u pe gh
lis
The list of factors should be considered:
The age of the target group (the response is different between
12 e T S ir
children and mature)
M
c
The experience of the audience (between company manager and
school children)
iv IC d
The expectation of the audience ( If you advertise your business in
Pr e me
t
Knowledge of the audience (graduated in media would expect
11
different approach.
br h
m Mo
42 or ia ni
user (end user will be interested with features for each phone and
a
the price.
t
98 u pe gh
lis
12 e T S ir
M
The key factors when you are writing the presentation:
c
iv IC d
(1) Language used:
Pr e me
t
technical audience
11
br h
Use photos, video, sound and animation always will catch the
g
09 at
to videos clips.
M
42 or ia ni
(5) Examples used:
a
t
98 u pe gh
When using examples to illustrate ideas ( don’t give examples
lis
to meat products while your audience is vegetarian
12 e T S ir
M
c
iv IC d
Legal, moral, ethical, and cultural appreciation:
Pr e me
t
Software, Music CDs, videos, articles from magazines and books is
11
protected by copyright laws
br h
m Mo
It is illegal to:
g
09 at
license
Rent out a software package without permission
Use the name of copyrighted software without agreement
42 or ia ni a
Legal, moral, ethical, and cultural implication:
t
98 u pe gh
lis
12 e T S ir
Legal: covers the law; whether an action is punishable by law.
M
c
anything break the law is termed illegal
iv IC d
Morality: governs the private and personal interactions between
Pr e me
t
Ethics: governs professional interactions, for example, codes of
11
br h
Examples:
Copying software, and then selling it without the permission – illegal
A student has changed the contents of a company website without
permission – immoral
Writing computer games that make fun of a country’s religion -
Cultural
Using pictures in a document without acknowledging copyright –
(immoral)
Passing information to a rival company – Unethical
42 or ia ni
Should the internet be policed?
a
t
98 u pe gh
Arguments in favor of some form of internet control:
lis
12 e T S ir
It would prevent illegal material being posted on websites
People find it much easier to discover information (Ex. make a bomb)
M
c
By some control would prevent children and other vulnerable groups
from being subjected to undesirable websites.
iv IC d
By some control would stop incorrect information being published on
Pr e me
websites.
T
id am
t
Arguments against some form of internet control:
11
br h
42 or ia ni
Email is very popular for communication between people, however many
countries have laws to protects people against misuse of email.
a
t
98 u pe gh
lis
The following is some laws and guidelines for the countries and companies
12 e T S ir
they required:
M
c
It is important that emails are not
false or misleading subject lines
iv IC d
Pr e me
t postal address
11
br h
email to individuals
42 or ia ni
content must be • Abusive, profane, inflammatory
a
appropriate • Violent message
t
98 u pe gh
If the email is being • Use illegal material in messages
lis
sent to an employee
12 e T S ir
within a business the language must be formal
M
c
Copyright:
iv IC d
Pr e me
t
Recipient should check the email before copying or forwarding it
Some companies set out their rules for sending and receiving
11
br h
email
m Mo
g
09 at
Netiquette:
Ca r.
M
42 or ia ni a
Effects of spam email:
t
98 u pe gh
lis
If a spam email is part of a phishing scam then there is a
chance your details could be obtained.
12 e T S ir
The network could also become slower or unresponsive if
M
c
there is a lot of unnecessary traffic flooding the network.
iv IC d
Email group :
Pr e me
t
11 Strategies to prevent spam email:
br h
42 or ia ni a
t
Intranets:
98 u pe gh
lis
• Intranet is defined as a computer
12 e T S ir
network based on internet
M
technology but designed to meet
c
the internal needs for sharing
iv IC d
information within a single
Pr e me
organization
T
id am
t
Why intranets adopted rather than using the internet
11
br h
42 or ia ni
accessible.
a
t
98 u pe gh
lis
12 e T S ir
Advantages Disadvantages
M
• Files can be accessed from any • Files could be hacked
c
location though internet • Depend on quality of internet
iv IC d
• Users don’t have to carry storage connection due to fast or slow
Pr e me
t
11
br h
firewall
M
42 or ia ni
(HTTPS) recipient when data is being transferred
a
When the protocol changed to seen as
t
98 u pe gh
padlock symbol or letter “s” after http
lis
this is refer to “secure”
12 e T S ir
M
c
A web browser allows the user to display a
iv IC d
Uniform
Pr e me
webpage.
recourse A web browser will use URLs to access specified
locator (URL)
T
websites.
id am
& web
t URLs are represented by numbers
11
browser
(http://195.196.101.1) not user friendly.
br h
(http://www.MM .com/ict)
g
09 at
sound
M
http://www.MM .com/Esafety/ICTcourse .
Protocol://website address/Path/filename
The format is protocol://www.website address/path/filename,
website address :
1. domain host (WWW)
2. domain name ( name of website)
3. domain type (.com or .gov or .net or .org)
42 or ia ni
When entering URL or clicking the link address request made
a
Retrieve code from the server/resources then downloaded
t
98 u pe gh
lis
Interprets the code as a webpage or page resources to build the
web page
12 e T S ir
The web page is displayed
M
c
iv IC d
FTP is a network protocol when transferring
Pr e me
42 or ia ni
Internet possible to block certain websites but more difficult where
a
as in intranet easy to block certain websites
t
98 u pe gh
Internet can be accessed from anywhere but Intranet requires
lis
password and user ID entry
12 e T S ir
Internet access is open for hackers , but intranet is behind a firewall,
M
which gives some protection against hackers
c
Internet is public access, whereas intranets can be private access
iv IC d
Pr e me
logs
t Blog entries are in order (most recent
the internet.
09 at
offensive material.
M
c
iv IC d
Pr e me
T
id am
t
11 Similar to blogs but often used on social networking
br h
Microblogs
m Mo
42 or ia ni
a search engine to find specific data.
a
Normally keywords would be typed
t
98 u pe gh
lis
in to a search engine to find
particular information.
12 e T S ir
M
c
Search engines:
iv IC d
Search engines are useful if you don’t
Pr e me
t
to search
The more specific search you will get
11
accurate result
br h
Advantages:
Information on the internet is up-to-date
The internet limitless of information
Searching using a search engine is fast and easy.
People can look for information from home
Information on the internet is usually free of charge.
Pages on the internet can have multimedia elements , which
can make learning is interesting
42 or ia ni
It is too easy to be distracted when searching on the internet
a
There is always the risk of information overload if the user lacks
t
98 u pe gh
lis
the necessary experience
Some research skills are lost when using the internet as search
12 e T S ir
engines do all the work for you
M
c
iv IC d
Pr e me
t
Why internet search to find relevant information is not always fast?
Unless the user narrowing the criteria it will take long time to
11
br h
given criteria
09 at
If the user uncertain what he needs it will take long time to find
Ca r.
42 or ia ni a
1. Anyone can setup website, so information not necessarily reliable or
t
98 u pe gh
accurate.
lis
2. Some commercial web site will be based to advertise their products,
12 e T S ir
If the advertising only related to their own products It could be
M
unreliable
c
3. If the web site URL ending with .gov or .org … mostly is reliable
iv IC d
4. If you compare the information on the web site with the information
Pr e me
t
permit ) the website
6. Check if the website linked to reliable or unreliable web sites
11
br h
indicate reliability
g
8. If the last update was long time ago , this mean the information is
09 at
not reliable
Ca r.