0% found this document useful (0 votes)
215 views168 pages

Ict Notes New

r. M The document summarizes key components of a computer system in 3 paragraphs or less: 1. Hardware includes physical components like the motherboard, CPU, RAM, ROM, video/sound cards, and internal storage drives. Software includes operating systems and application programs that control the computer and allow users to perform tasks. 2. Internal hardware components communicate via the motherboard and allow the CPU to process data. RAM is volatile memory that stores temporary data while ROM contains permanent instructions. External components include monitors, keyboards, mice, and printers. 3. There are two main types of software: application software for specific tasks like documents, spreadsheets, databases, and system software that

Uploaded by

wynterflorence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views168 pages

Ict Notes New

r. M The document summarizes key components of a computer system in 3 paragraphs or less: 1. Hardware includes physical components like the motherboard, CPU, RAM, ROM, video/sound cards, and internal storage drives. Software includes operating systems and application programs that control the computer and allow users to perform tasks. 2. Internal hardware components communicate via the motherboard and allow the CPU to process data. RAM is volatile memory that stores temporary data while ROM contains permanent instructions. External components include monitors, keyboards, mice, and printers. 3. There are two main types of software: application software for specific tasks like documents, spreadsheets, databases, and system software that

Uploaded by

wynterflorence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 168

IGCSE

42 or ia ni
ICT 0417
a
t
98 u pe gh
lis
12 e T S ir Theory
M

c
iv IC d
Pr e me
T

From Chapter 1 to 10
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Mr. Mohammed Mirghani


Cambridge ICT Specialist
Private Tutor 0912984211

Page 1 of 168
M

Page 2 of 168
Ca r.
m Mo
br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
Section 1
ICT Theory

Chapter 1 Types and components of a computer system


1.1 Hardware and software
1.2 Main components of a computer system

42 or ia ni
1.3 Operating systems
1.4 Types of computer

a
t
1.5 Impact of emerging technologies

98 u pe gh
lis
Chapter 2 Input and output devices

12 e T S ir
2.1 Input devices and their uses
M2.2 Direct data entry (DDE) devices

c
2.3 Output devices and their uses
iv IC d
Chapter 3 Storage devices and media
Pr e me

3.1 Backing up of data


3.2 Types of access
T
Secondary storage media
id am

t 3.3

Chapter 4
11 Networks and the effects of using them
br h

4.1 Networks
m Mo

4.2 Network issues and communication


g
09 at

Chapter 5 The effects of using ICT


5.1 The effects of ICT on employment
Ca r.

5.2 The effects of ICT on working patterns


M

5.3 Microprocessor-controlled devices in the home


5.4 Potential health problems related to the prolonged use of ICT equipment

Chapter 6 ICT applications


6.1 Communication applications
6.2 Data handling applications
6.3 Measurement applications
6.4 Microprocessors in control applications
6.5 Modeling applications
6.6 Manufacturing applications
6.7 School management systems
6.8 Booking systems
6.9 Banking applications

Page 3 of 168
6.10 Expert systems
6.11 Computers in medicine
6.12 Computers in libraries
6.13 Computers in die retail industry
6.14 Recognition systems
6.15 Monitoring and tracking systems

42 or ia ni
6.16 Satellite systems

a
t
Chapter 7 Systems life cycle

98 u pe gh
lis
7.1 Analysis
7.2 Design

12 e T S ir
7.3 Development and testing

M7.4 Implementation

c
7.5 Documentation
iv IC d
7.6 Evaluation
Pr e me

Chapter 8 Safety and security


8.1 Physical security
T
id am

t 8.2 E-safety
Security of data
8.3

11 8.4 Additional security of data online


br h
m Mo

Chapter 9 Audiences
g
09 at

9.1 Audience appreciation


9.2 Legal, moral, ethical and cultural appreciation
Ca r.

Chapter 10 Communication
M

10.1 Communication with other ICT users using email


10.2 Effective use of the internet

Page 4 of 168
1. Types and components of computer system

Hardware and Software:

42 or ia ni
 Hardware : is a Physical Components that makes a computer system

a
 Software : is a general term of Programs that control the computer system

t
98 u pe gh
and processing data, there are two types

lis
12 e T S ir
Internal Hardware:
M

c
 Motherboard
 Random access memory (Ram) RAM
iv IC d
 Read only memory (Rom)
Pr e me

 Video Cards
 Sound Cards
T
 Internal Hard storage devices ROM
id am

t
(HDD & SSD) Video Card

11
br h

External Hardware:
m Mo


g

Monitor
09 at

 Keyboard Sound Card Solid State Drive


 Mouse
Ca r.

 Printer
M

 Storage

Hard Disk Drive Motherboard

Page 5 of 168
Internal hardware:
Motherboard:
 Printed circuit board in all computers.
 It allow the processor and other hardware to function and communicate with
each other

42 or ia ni
 It is central to any computer system
 All components plug into the motherboard

a
t
98 u pe gh
lis
(CPU) Central Processing Unit or (Microprocessor):

12 e T S ir
 CPU is brain / heart of the computer and consists of :
M
o Control unit – Coordinates input and output devices and carries out

c
program instructions
iv IC d
o Arithmetic and logical Unit ( ALU) – performs calculations and logical
Pr e me

comparison
o Immediate access store ( IAS) – Holds data and program instructions in
T
current use
id am

t
 CPU Interprets , execute the commands and handle calculations, data

11
processing and movement data to and from system memory
br h
m Mo

Random Access Memory (RAM):


g
09 at

 Data stored temporarily


 This memory can be Written and Read
Ca r.

 Content lost when computer is turned off


M

 Volatile memory

Read only memory (ROM):


 To store permanent information
 Only read
 Data cannot be changed or lost when the power off
 Non-volatile memory
 Used to store BIOS instructions

Page 6 of 168
Video card:
 Allow the computer to send graphical information to video display like monitor
or television, made of memory unit, cooling mechanism and connection to
display unit.

42 or ia ni a
t
98 u pe gh
Sound card :

lis
 Integrated circuit to board to provide a computer with ability to produce

12 e T S ir
sounds
M

c
Internal Hard Disk Drive (HDD) / Solid State Drive (SSD):
iv IC d
 Main internal storage
Pr e me

 The main advantage is fast data transfer


 Magnetic in nature and one from the methods to store the information
T
id am

t
11
Software: there are two types of software (application & system)
br h
m Mo

Application software: Program that allow the user to do specific task:


g
09 at

• Word processor: software to manipulate text documents, the user can


Ca r.

create, save, edit the documents, copy and paste, importing photos, translate
etc…
M

• Spreadsheet: software to manipulate numerical data in columns and rows,


use formula to carry out calculations, create graph and modeling the
calculations.

• Database: software to organize, manipulate, analyze data, each database


consists of one or more tables, and can carry out query, add modify data
and create report.

Page 7 of 168
• Control and measuring software: designed to allow a computer or
microprocessor to interface with sensors to measuring temperature ,
control application like chemical process (pH)

• Apps ( applications) software: it is applications which run on mobile phones

42 or ia ni
or tablet

a
t
98 u pe gh
• Photo editing software : software allow editing digital photo stored in the

lis
computer

12 e T S ir
M
• Video editing software: software allow to manipulate videos and can do

c
editing, rearrange, adding, removing section, do color correction and
iv IC d
transition
Pr e me

• Graphics manipulate software : software allows bitmap and vector images


T
id am

to be changed
t
11
br h

• System software : Program that allow the hardware to run properly and allow the
m Mo

user to communicate with the computer


g
09 at

• Compiler : computer program that translate program written in high level


language as a whole into machine code, the original program called the
Ca r.

Source Code and the program after compilation called the Object code,
M

Examples of high level language is Java, Python, C++ , Fortran .

• Interpreter: computer program that translate program written in high level


language , translation as one statement at a time ( step by step )

• Linkers: computer program that takes one or more object files produced by
compiler and combine them into a single program. Different pieces of code
called module and the linker put all together.

• Device driver: the name of software that enable one or more hardware
device to communicate with the operating system and without driver the
device unable to work.

Page 8 of 168
• Operating systems (OS): software running in the background of a computer
system , without operating system the computer will not user friendly, OS
allow:
• Input / Output operation
• User communicate with the computer
• Error handling

42 or ia ni
• Managing of security ( log in – password – user account )

a
t
98 u pe gh
• Utilities : software to carry out specific tasks on a computer, and to help to

lis
maintain and control computer recourses include :

12 e T S ir
• Antivirus, Anti-spyware, Backup files, Disk repair, File management,
M

c
Security , Screensavers, Disk defragmentation
iv IC d
Main components of computer system
Pr e me

Computer system consists of:


T
id am

t
1. Input devices
2. Output devices

11
3. Secondary storage devices
br h
m Mo

Internal hardware devices:


g
09 at

1. The central processing unit (CPU)


2. Internal hard disk drive
Ca r.

3. Random access memory ( RAM)


M

4. Read only memory ( ROM) :

 Boot files: Code tells the computer what to do when the first
start up referred as BIOS (Basic input/output system.
 CMOS : Chip that BIOS stored the data ( date & time and
system configuration) in non-volatile chip called CMOS
(complementary metal oxide semiconductor) this is battery
powered

Page 9 of 168
Operating systems:

Operating systems: to enable computer system to function and allow users to


communicate with computer systems

42 or ia ni
General tasks for Operating systems:

a
1. Controls operation of input & output & backing storage devices

t
98 u pe gh
2. Supervising running , loading, running and storage applications programs

lis
3. Deals with errors may occur in applications programs

12 e T S ir
4. Maintain security of computer system
5. Maintain computer log
M

c
6. Allow to communicate between the user and computer system
iv IC d
User Interfaces (2 types):
Pr e me

• User Interface (2 types):


T
id am

t
1. Command line interface (CLI) – used by programmers, analyst,
somebody need direct communication with the computer for

11
development. as MSDOS
br h

2. Graphical User Interface ( GUI) – used by end-user who doesn’t need


m Mo

to know the computer works or who need to play games, handle the
g
09 at

pointing device .. as Windows


Ca r.
M

Page 10 of 168
42 or ia ni a
t
98 u pe gh
lis
GUI

12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h

CLI
Types of computers
m Mo
g
09 at

1- PC ( personal computer /desktop computers)


Ca r.
M

Advantages Disadvantages
• Lower cost because spare parts and • Not portable.
connections tend to be standard • You need to copy files if you
• Better specification (fast processor..) do some work outside.
• No much heating • More complicated than
• Less damaged can be happened laptop
because fixed in one location
• Internet access is also stable because
not moved around

Page 11 of 168
2- Laptop / Notebook computer

Advantages Disadvantages

42 or ia ni
• Laptop in single unit then no trilling • Easier to steal.

a
wires • Battery is limited life.

t
98 u pe gh
• • Keyboard and pointing devices

lis
Can take full advantage of Wi-Fi.
• Lightweight. can sometimes be not suitable

12 e T S ir
• Low power consumption. to use.
• M
Portable, can be taken anywhere and

c
can connect with multimedia system
iv IC d
Pr e me
T
id am

t
3- Tablets

11
br h
m Mo
g
09 at

Advantages compared to laptops Disadvantages compared to


laptops:
Ca r.

• Very fast to switch on • Less storage space and memory


M

• Fully portable, small, light can be • Typing in touch screen can be


carried any where slow and can have some errors
• Built in camera & video • Transferring files has to be done
• Touchscreen , no need input device through App store
• Long battery life • Laptops support type file format
• Can use several Apps as standard more than tablets
(example : MP4 player)
• Don’t generate any heat
• When power button is pressed it
will be standby but remain
connected to the internet

Page 12 of 168
4- Smartphone
Allow normal phone calls and also have OS ( iOS, Android, Windows)

functions of smartphone :

42 or ia ni
 Send/receive email

a
t

98 u pe gh
Surf internet

lis
 Global positioning system GPS
 Calendar functions

12 e T S ir
 Telephone banking using banking Apps
 M

c
VIOP – voice over internet protocol using internet
 Streaming of video
iv IC d
 Streaming of music
Pr e me

 Social networking
 Instant message
T
id am

t Advantages Disadvantages
 Easy to carry (very small in size  The small screen make pages
11
br h

and lightweight difficult to read


 
m Mo

Used to make phone calls and also Small keyboard make difficult to
g

connect to internet while on move type things and slow also, but this
09 at

 Used anywhere sine have Wi-Fi solved in large screen


  Web browsing can consume
Ca r.

Have hundreds of Apps


 Have reasonable battery life battery quickly
M

compared to laptop  Memory is not large when you


compare with laptop
 Not all websites compatible with
smartphone operating system
 Easier to lose or stolen since
small size
 The data transfer rate using
mobile phone networks is slower
with Wi-Fi

Page 13 of 168
4- Smartwatches
Allow users to wear a mini computer in their writs and have the functions of
smartphone
Some functions of smartwatches :

42 or ia ni
 Internet connectivity , can browse& search ,
send email

a
t
 Ability to make and take phone calls

98 u pe gh
lis
 Messaging using text or video
 Weather forecasting

12 e T S ir
 Fitness and health monitoring capability
M
 GPS , find location , using satnav , direction to

c
other location
iv IC d
Pr e me

Advantages Disadvantages
 Same advantages of  Same disadvantages of smartphone
T
smartphone 
id am

t Smartphones are large and bulky.


 It can wear in wrists  Problem with battery failure or

11
 Monitoring fitness and health empty battery.
br h

regimes  Unattractive design


m Mo

 The software for GPS needs to kept


g
09 at

up to date update
 During running loss of satellite can
Ca r.

make an issue
M

 During running sunlight can make it


unreadable

Page 14 of 168
Mainframe computer
Is used for large and very powerful computer system, and the main purpose
to run commercial applications such as banking, insurance where huge
amount of data.

42 or ia ni a
Main features of Mainframe computer:

t
98 u pe gh
 They can have several CPUs.

lis
 They have very fast processor speeds.

12 e T S ir
 The can have support multiple operating
M
systems.

c
 They can have huge amounts storage capacity.
iv IC d
 They can have huge internal memories.
Pr e me

 They often operate using time sharing or batch processing


T
id am

t
Impacts of Emerging Technologies:

11
 Artificial Intelligence (AI)
br h

 Vision enhancement
m Mo

 Robotics
g


09 at

Quantum cryptography
 Computer assisted translation ( CAT )
Ca r.

 3-D and holographic imaging


 Virtual reality
M

Artificial intelligence AI biometrics:


 Biometric technology use unique characteristic of particular part of
the body comprising facial recognition, iris scan, retina scan,
fingerprint scan, etc
 The problem with biometric technology that many fingerprint
identification systems falsely reject a person's fingerprints , when
scan checked in database no matched found

Page 15 of 168
 Artificial intelligence (AI) biometric overcome this problem using
dynamic profiling , this is mean the person no worry to get his
fingerprint in exactly right place every time on the scanner
 Facial-recognition system has the same problem ( wear glasses –
grown hair – has aged ) AI can overcome this problem

42 or ia ni a
Vision enhancement

t
98 u pe gh
lis
 Low vision enhancement system ( LVES ) use video technology through
a headset connected to a computer, the system allow images to be

12 e T S ir
projected in from of the eyes, this bring the things closer by the user of
M

c
the system
 Night vision enhancement ( NVE ) amplifies infrared light and visible light
iv IC d
so that the image can still be seen in the darkness ( military use this
Pr e me

technology
T
Robotics
id am

t
 Robotics mostly used in manufacturing industry, like weld car bodies ,

11
spray body panels, fit items
br h

 Robots appearing in many areas in our lives


m Mo

 One application used in drones (flying devices) used by military and


g
09 at

civilians.
 Robots can perform many tasks:
Ca r.

 Dangerous jobs ( bomb disposal )


M

 Exploring (Volcanos)
 Repetitive manufacturing job ( Cars )
 Moving heavy objects
 Surgical procedure

Impacts of Robots on everyday life


 Increased personnel time
 Increased manufacturing efficiency
 Much faster than human and less expensive
 Robotics replace human in some auto jobs
 Safer since robots can work in dangerous places

Page 16 of 168
Quantum cryptography
 Cryptography is the science of making a message unintelligible to any
unauthorized user (hacker).
 Quantum cryptography is based on the use of photons (light) and their

42 or ia ni
physical quantum properties

a
 Send a message with complete privacy (encryption)

t
98 u pe gh
lis
 Make it much more complex to decrypt, ( enable secure

12 e T S ir
communication
Computer-assisted translation ( CAT )
M

c
• When human translators use computer software to help in translation
iv IC d
process
Pr e me

• Reduce translation time but may be not 100% accurate


T
Impacts on everyday life
id am

t More accurate

11  Multilingual
br h

 Quick translator
m Mo
g
09 at

3-D and holographic imaging


Ca r.

• Holography is a technology makes images appear as 3D ( known as


M

hologram )
• Hologram use 2 regular 2D images to manipulate to produce 3d images
• Hologram have the following application:
 Engineering design CAD
 Architecture , ability to rotate design 360 degrees
 Simulations
 Medical imaging ( see inside organs as 3D )
 Cinema ( special effects)
 Gaming ( special effects)
 Advertising
 Holographic television expecting in 2025 without special glasses
 Holographic computer memories ( new options of optical storage

Page 17 of 168
 Optical computers ( speed will be faster )

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
Holography involves to use:

c
 A source of laser light
iv IC d
 Interference of light
Pr e me

 Light diffraction
 Light intensity recording
T
id am

t
11
br h
m Mo

Virtual reality
g
09 at

Artificial environment that users can interact with


Ca r.

General equipment to use Virtual Reality


M

Eye goggles – gloves – headphones – sensor - powerful computer

Used in the following areas/ uses:

 Military applications – training pilots


 Education – training surgeons
 Healthcare ( as diagnostic tool )
 Entertainment ( games when wear gloves with helmet , with sound to
make very real
 Fashion show to see the clothes on people

Page 18 of 168
 Heritage ( to see the mountains)
 Business ( Training course )
 Real state ( people can look around the house )
 Engineering ( to show how design of the building will look )
 Media ( special effects of movies( The matrix ) )

42 or ia ni
 Scientific visualization ( to see molecular structure in chemistry

a
t
98 u pe gh
lis
Impacts on everyday life:

12 e T S ir
 Improved medical surgeons
 Stronger building
M

c
 More realistic education ( interactive learning environment)
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 19 of 168
2- Input and output devices

Input devices and their used:

42 or ia ni a
t
1- Keyboards :

98 u pe gh
lis
Uses :

12 e T S ir
 Input of data (text, number,..) into applications software
 M
Typing commands to the computer ( Ctrl P + Ctrl S … )

c
 Mostly QWERTY keyboard is used

iv IC d
Ergonomic keyboard is used to reduce the health-related problems
Pr e me

like ( carpal tunnel syndrome – RSI )


Advantages Disadvantages
T
• Fast text entry into the document • Can be difficult to use if the user
id am

t
• Easy to use has limited arm/wrist use.

11
• Easier to do verification checks as • Slow method when compared
br h

the data is entered. with direct data entry


m Mo

• Large device.
g
09 at

2-Concept Keyboard
Ca r.

 Uses icons instead of standard letters ,


M

 Often used in fast food restaurants one


item (example ice cream)
 Fast data entry.
 The keyboards are waterproof.
 Certain applications.
 Tamper resistant

Page 20 of 168
2. Numeric keypads
Used to enter number only

USES:
 Automatic teller machines (ATMs).

42 or ia ni
 Mobile phones.
 Point-of-sale (POS)

a
t
 Chip and PIN devices when paying by credit/debit cards

98 u pe gh
lis
 Fast entry of numeric data into a spreadsheet

12 e T S ir
Advantages Disadvantages
M
• Faster than standard keyboard • Sometimes have small keys, input

c
• Very easy to carry around more difficult.
iv IC d
• Sometimes the order of the
Pr e me

numbers on the keypad isn’t


intuitive.
T
id am

t
11
Pointing devices:
br h
m Mo

1- Mouse
g
09 at

By moving mouse around, you can control the


position of the pointer on the screen
Ca r.
M

USES:
 Opening, closing and minimizing software.
 Grouping, moving and deleting files.
 Controlling the position of a pointer on the screen

Advantages Disadvantages
• Faster way than using a keyboard. • More difficult for people with
• Very quick way to navigate restricted hand
applications and internet • Easy to damage
• No need large desk area. • Difficult to use if no flat surface

Page 21 of 168
2- Touchpad
Used in many laptop as a pointing device

42 or ia ni
Advantages Disadvantages
• Faster than a keyboard • People with limited hand/wrist

a
t
• No need for a separate mouse. movement find the device difficult

98 u pe gh
lis
to use.
• Difficult to control when compared

12 e T S ir
to a mouse.
M • Difficult in certain operations such

c
as drag and drop.
iv IC d
Pr e me
T
id am

t
11
3-Tracker ball
br h

Uses
m Mo

 Used in applications where the user has disability


g

(RSI)
09 at

 Used in a control room /faster than a mouse


Ca r.

 Used in some luxury cars to select functions such


as radio, telephone, music
M

Advantages Disadvantages
• Easier than a mouse. • Not supplied with computers as
• More accurate positioning. standard.
• More robust than a mouse. • User may need training
• Needs less desk space than a mouse

Page 22 of 168
4-Remote Control
Uses :
 Televisions, satellite systems, most of systems
use remote controls.
 Control multimedia systems.

42 or ia ni
 Used in industrial applications to remotely
control processes.

a
t
98 u pe gh
Advantages Disadvantages

lis
• Operated from any reasonable • Difficult to use if the operator has

12 e T S ir
distance. limited hand/wrist movement.
• Some chemical processes are • It is easier to block the signal.
M

c
hazardous, can select operation
from distance
iv IC d
Pr e me

5-Joystick
T
id am

t
Uses :

11
 Used in video/computer games.
br h

 Used in simulators
m Mo
g
09 at

Advantages Disadvantages
Ca r.

• Easier than a keyboard to • More difficult to control the on-


M

navigate the screen screen pointer


• Control is more realistic than
using a mouse

Page 23 of 168
5-Driving wheel
Uses :
 Used in video/computer games.
 Used in simulators (car-driving

42 or ia ni
simulators)
Advantages Disadvantages

a
t
• Easier than a keyboard or • Expensive input device.

98 u pe gh
lis
joystick. • Movements too sensitive.
• Actual steering wheel and other

12 e T S ir
controls operate in real life.
M

c
iv IC d
Pr e me

6- Touchscreens
Uses :
T
id am


t Self-service
 ATMs
11

br h

Point-of-sale terminals
 Airports, railway stations, tourist
m Mo

offices
g
09 at

 Personal digital assistants (PDAs), mobile phones and satellite


navigation systems
Ca r.

 Interactive white boards in education.


M

 Computer-based training (CBT) - on-screen testing.


 Used as an output device

Advantages Disadvantages
• Faster entry. • Limited number of options
• Very easy method. available.
• User-friendly. • Can lead to problems.
• The screen can get very dirty,
reduce its responsiveness

Page 24 of 168
7- Scanners:
There are two types of scanner, The most common is
flatbed scanner, also barcode scanner is another type
Uses
• Scan documents.

42 or ia ni
• Scan in old/valuable documents/books.
• Scan in photographs.

a
t
• Scan in barcodes at POS terminals.

98 u pe gh
lis
Advantages Disadvantages
• Images can be stored for editing • Quality can be limited depend on

12 e T S ir
at a later date. resolution of the scanner.
M
• Much faster and more accurate. • Slow at scanning if color scanning

c
• Recovery damaged documents selected
iv IC d
and photographs.
Pr e me
T
id am

t
8- Digital Camera
11
Digital cameras replaced with traditional based film ,
br h

now the images stored digitally on solid state


m Mo

memory , and can be transferred to computer by:


g
09 at

 Directly reading the memory card.


Ca r.

 Connecting to the computer using a USB port.


M

 Using wireless data transfer (Wi-Fi or Bluetooth).

Advantages Disadvantages
• Easier to produce better-quality • The quality of photographs
photographs. depends on the number of pixels.
• Easier and faster to upload • Images compressed to reduce
photographs to a computer reader. the memory used.
• No need to print out photographs.
• Can store several hundred
photographs.

Page 25 of 168
9- Video Cameras
DV (digital video) cameras, store
compressed photo frames at speed of 25
MB per second this is known as (MOTION
JPEG)

42 or ia ni
Advantages of using DV cameras compared to traditional cameras

a
t
98 u pe gh
lis
• Much easier to manipulate video.
• DV format gives a very high quality of image

12 e T S ir
M

c
iv IC d
Pr e me

10- Microphone
T
Microphone connected directly with the computer,
id am

t
Sounds converted to an analogue signal then converted

11
into a digital signal
br h

Uses :
m Mo

 Presentations.
g

 Input in voice-recognition software


09 at

 As a sensor to pick up sound.


Ca r.

 Used in video conferencing or Voice over Internet Protocol


Advantages Disadvantages
M

• Faster to read text instead using • Sound files is big.


keyboard • Voice-recognition software not
• Manipulate sound. accurate
• Voice-activation system, Advantage
of improving safety. – driving cars

Page 26 of 168
11-Sensors
 Sensor is a device to input data into a computer, the data is physical
quantity like temperature, light, moister, this data is analogue in nature
 Computer can read only digital data , then the data from sensor should

42 or ia ni
be converted to digital using an analogue digital converter ADC

a
t
Type of sensors:

98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo

Advantages Disadvantages
g
09 at

• More accurate than human • Faulty sensors can give spurious


operators. results
Ca r.

• Readings are continuous - no break


M

• Any necessary action or warning will


be initiated immediately
• Systems can be automatic, removing
the need for human intervention.

Page 27 of 168
12- Graphic Tablet
Used with stylus to produce freehand drawing

Uses

42 or ia ni
 produce freehand drawings

a
 Used in computer-aided design (CAD)

t
98 u pe gh
work

lis
12 e T S ir
M
Advantages Disadvantages

c
• Modify drawings before they are • More expensive than other
input. pointing devices.
iv IC d
• Very accurate method of drawing. • Takes time to produce a drawing
Pr e me

• Can record levels of pressure. • Menus not very user-friendly.


• Larger drawings (such as A4) are
T
id am

t expensive to produce.
• The touch screens are damaged
11 easily.
br h
m Mo
g
09 at

13- Webcams
Ca r.
M

Uses
 Conversation while chatting online.
 Video conferencing

Advantages Disadvantages
 Immediate face-to-face video chat  Very limited features and often
 Contact with each other without poor quality.
traveling  Need to be connected to the
computer.

Page 28 of 168
14- Light pens
Light pens contain sensors that send signals to a
computer whenever light changes are detected,
and only work with CRT monitor

42 or ia ni a
Uses :

t
98 u pe gh
• Selecting objects on CRT screens

lis
• Drawing on screen ( as example CAD Package)

12 e T S ir
M

c
Advantages Disadvantages
 Greater accuracy than touch screen  Problems with delay when
iv IC d
 Small drawing on screen.
Pr e me

 Easy-to-use  Only works with CRT monitors.


 Not accurate when drawing.
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 29 of 168
Direct data entry ( DDE ) devices:
Devices for reading information from cards
Magnetic stripe readers
Used to read information on the magnetic stripe

42 or ia ni
founded in back of credit/debit card

a
Uses:

t
98 u pe gh
 On credit/debit cards for use at ATMs or EFTPOS

lis
(Electronic Funds Transfer at Point Of Sale)

12 e T S ir
terminals
 Security devices to allow entry to buildings,
M

c
(as in hotel rooms)
iv IC d
Advantages Disadvantages
Pr e me

• Fast data entry • If the magnetic stripe gets


• Error free damaged the data is lost.
T
• • Doesn’t work at a distance.
id am

Securet
• Prevents access to restricted areas • Not human readable.

11
Not affected by oil, water, moisture
br h

• Very robust.
m Mo
g
09 at

Contactless card readers


Ca r.

Contactless debit or credit cards allow customers to pay


M

for items worth up to $25 without entering their PIN


The steps are taken to pay :
 Costumers look out for the contactless symbol on
the payment terminal
 The shop assistant enter the amount
 The reader inform the customer to present contactless card
 The customer hold the card in front of the reader
 The terminal display the card has been read
Advantages Disadvantages
• Faster transaction. • More expensive than normal cards.
• Encryption. • A thief with a suitable reader could
• No typing errors. monitor contactless card transaction

Page 30 of 168
• Retailers will not access to the • Can take money twice.
customer’s card. • Transactions are a small
• The chip in the contactless
credit card responds with a
unique number used for that
transaction only.

42 or ia ni a
t
98 u pe gh
lis
Chip and PIN readers
Similar to smart card reader but used in EFTPOS terminal

12 e T S ir
Uses:
M
 Payments using card in (restaurants, supermarkets,

c
travel, etc.).
iv IC d
Pr e me

Advantages Disadvantages
• More secure • Need to be careful to ensure PIN
T
id am

t
• More robust isn’t read by somebody else while
typing it in.
11
br h
m Mo

Radio frequency identification (RFID) readers


g
09 at

Use radio waves to read and capture information stored on tag


RFID tag is made up of two components:
Ca r.

 A microchip stores and processes information


M

 An antenna receive and transmit data


Uses:
 Livestock tracking ( each animal in farm will be known)
 Retail ( like barcode but without scanning )
 Admission passes (parks RFID cards )
 Libraries ( book can tracked )
Advantages Disadvantages
• No direct line • Tag collision.
• Very robust, • Easy to jam or interrupt.
• Very fast read rate and reuse. • Easy to hack.
• Bulk detection is possible • More expensive than barcode
(hundred tags/s . system

Page 31 of 168
Magnetic ink character recognition/reader (MICR)
Is as system to read characters printed in a special ink

Uses:

42 or ia ni
 Used to process bank cheque in banking operation

a
using system called batch processing

t
98 u pe gh
lis
12 e T S ir
Advantages Disadvantages
M
• Offer greater security than OCR • Only certain characters can be read

c
• No manual input, so errors are and the number of different
iv IC d
reduced characters is very limited.
Pr e me

• The magnetic ink characters can • More expensive


still be read even if somebody
T
writes over them
id am

t
11
br h

Optical Mark recognition / Reader (OMR) Read


m Mo

Read marks written in pen or pencil


g

Uses:
09 at

 Read questionnaires, multiple-choice examination papers


Ca r.

and other forms


M

Advantages Disadvantages
• Very fast way of inputting the • The forms need to be carefully
results of a survey. designed and correctly positioned
• More accurate. which can make problem for result.

Page 32 of 168
Optical character recognition/reader (OCR)
The new system in processing of passport and id cards
Uses:
 Processing of passports and identity cards

42 or ia ni
 Converting printed documents to an editable

a
electronic format

t
98 u pe gh
 Read car number plate

lis
Advantages Disadvantages

12 e T S ir
• Much faster data-entry system • Difficulty reading handwriting
M
• The number of errors is reduced • Not very accurate

c
• Can read handwriting
iv IC d
Pr e me

Comparison between OCR and OMR


T
id am

t
OCR OMR
11
br h

Because this method reads handwriting, it Since use shading to answer, the
is possible for customers to extend their information obtained is limited to the
m Mo

answers to questions choices offered in each question


g

poor handwriting may cause reading OMR relies on simply detecting where
09 at

errors marks have been made on a page; the


position of the marks is compared to
Ca r.

a template stored in memory


M

OCR is used for converting printed OMR simply reads the position of marks,
documents to an editable electronic so it is ideal for multiple-choice exam
format papers
OCR requires a complex recognition This method requires complex (and
system expensive) forms to be
completed; but the recognition system is
simpler than OCR
Fewer 'how to fill in' instructions are While this method requires more 'how to
needed for forms designed to be fill in' instructions, it is easier and faster
completed and then read by OCR for customers to complete OMR forms
than to complete OCR forms
While OCR is more accurate than data OMR is essentially a more accurate
entered into a computer by keyboard, method for reading data than OCR
there are still problems recognizing
all types of handwriting, leading to
inaccuracies

Page 33 of 168
Barcodes readers ( hand scanner )
Uses:
 Supermarkets and shops
 Libraries to keep track of books
 Safety function - electrical equipment checking

42 or ia ni
regular basis.

a
t
Advantages Disadvantages

98 u pe gh
lis
• Much faster • Expensive system to administer.
• Way of recording data • Not foolproof.

12 e T S ir
• Allow automatic stock control. • Easily damaged than RFID tags or
M
• Trusted technology.

c
magnetic strips.
iv IC d
Pr e me

Quick response (QR) code


• Is made of matrix of filled in dark square on light
T
background, normal barcode can have 30 digits but
id am

t
QR can hold over 7000 digits.

11
• Smartphone with camera can read QR code which
br h

can be website link or advertising


m Mo
g
09 at

Advantages
• No need to write down a key or
Ca r.

website
• QR can store the website address
M

on business card or on the


magazine, train, bus

Page 34 of 168
Output devices and their uses
CRT monitors
Cathode ray tube (CRT) monitors
Uses:

42 or ia ni
 Output device
 Used with light pens

a
t
98 u pe gh
lis
Advantages Disadvantages
• The angle of viewing is still better • Present a safety hazard if not

12 e T S ir
than with most TFT monitors supported properly
M
• They work with light pens in • Run very hot and can cause fires

c
CAD/CAM applications • They consume more power than
iv IC d
modern TFT
Pr e me

• They can flicker, can lead to


headaches and eyesight problems
T
id am

t
11
br h

Thin film transistor (TFT) monitors


m Mo

Made up of thousands of tiny pixels.


g
09 at

Uses :
 Output device
Ca r.

 Laptop computers.
M

Advantages Disadvantages
• Lightweight • The angle of viewing a TFT is
• Produce less glare than CRT monitors fairly critical.
• Less radiation • Definition is sometimes not as
• Consume less power / don’t generate good as a CRT monitor.
much heat

Page 35 of 168
LCD and LED monitors
• CRT monitor almost gone
• Most monitors become LCD ( Crystal Liquid display / diode

42 or ia ni
technology
• Modern monitors are backlight using light emitting diode LED

a
t
which give the monitor better contrast and brightness

98 u pe gh
lis
• LED no need warm up to reach to full efficiency
• LED produce brighter light

12 e T S ir
• LED consume very little power / produce less heat
M
• OLED is new technology , which is very thin, flexible, lighter

c
iv IC d
Multimedia projectors
Pr e me
T
Uses :
id am

t
 Training presentations

11
 Advertising presentations
br h

 Home cinema systems


m Mo

Advantages Disadvantages
g

• Many people can see a presentation • Images can sometimes be fuzzy


09 at

without crowding • Expensive


Ca r.

• No networked computers • Setting little difficult to setup


M

Page 36 of 168
Printers
Laser Printers
Produce high-quality, high-volume printing

42 or ia ni
Uses :

a
 When low noisy required

t
98 u pe gh
lis
 High-quality, high-volume printing

12 e T S ir
Advantages Disadvantages
M

c
• Low noisy • Color laser is expensive
• Fast if several copies • Produce ozone and volatile
iv IC d
• Handle very large print jobs organic compounds.
Pr e me

• High quality
• Long time toner
T
id am

t
11
Inkjet printers
br h
m Mo

Uses:
g
09 at

 Low volumes are required


 For single pages are ideal
Ca r.

 3-D inkjet printers to produce prototypes


M

Advantages Disadvantages
• High-quality • Slow output if several copies
• Cheaper than laser printers. • Can't do large print jobs
• Very lightweight and a small • Printing can (smudge) if user is
• Don’t produce ozone and volatile not careful
organic compounds • Can be expensive

Page 37 of 168
Dot matrix printers
type of impact printer head is slow, noisy and the
output is not good

Uses:

42 or ia ni
 Used in noisy environments

a
t
Advantages Disadvantages

98 u pe gh
lis
• Used in environments that would be • Very noisy
a problem to laser or inkjet printers • Actually cost more than an inkjet

12 e T S ir
• Carbon copies or multi-part outputs • Very slow, poor-quality printing
M

c
can be produced
• Very cheap
iv IC d
• Easy to use
Pr e me
T
3 D printers
id am

t
Primarily used in computer aided design CAD

11
applications, can produce
br h

solid objects
m Mo
g
09 at

Advantages Disadvantages
Ca r.

• The manufacturing of items much easier • None original items


M

than ever before • Dangerous or illegal activities.


• Take a short length of time for designs to • Due to job losses
be converted into working prototypes
• less costs
• Medical benefits , producing artificial
organs, prosthetics and medical
products ,tissue engineering, artificial
blood vessels, designs of medical tools.
• Parts for machinery manufactured using
3D printers

Page 38 of 168
Speakers
Uses :
• Output sound
• Play downloaded sound files

42 or ia ni
• Audio output helps disabilities user.

a
t
98 u pe gh
Wide Format Printer

lis
 Used to produce large drawings e.g. blueprints of

12 e T S ir
buildings; are often used with CAD applications
M
 Used to produce large pictures for use on

c
billboards or giant posters
iv IC d
 They can also print on plastic coated paper
Pr e me

 The most common types are pen plotters


Advantages Disadvantages
T
id am

 Can produce huge printouts


t  Slow in operation
 Print quality is extremely high  Expensive to buy and maintain

11
br h
m Mo
g
09 at

Control applications
Ca r.

Actuators • Used to take signals from a


M

computer and convert them


into a form of motion as
example operating motor,
pumps and valves
• Usually convert from digital to analogue
(DAV)
Motors Turned on or off by the actuator
Uses
• Automatic washing machines , cookers , water
pumps in central heating systems, and in
automatic glasshouses to open windows and
switch on fans
• Control of robot
Page 39 of 168
• In computers to control fans, disk drives and
DVD drives
Buzzers Turned on or off by the actuator
Uses
• Used in cookers and

42 or ia ni
microwave ovens to tell the
operator when the cooking

a
process is complete

t
98 u pe gh
lis
Lights The actuator is connected
to the switch that turns the

12 e T S ir
lights on or off
M Uses

c
• Security lights
• In glasshouses
iv IC d
Heaters Actuators are connected to
Pr e me

switches that turn the


heater on or off
T
id am

t
Uses
11 • Automatic washing
br h
m Mo

machines to heat up the water


• Automatically control the temperature in an
g
09 at

oven
• Control the heating in a central heating
Ca r.

system
M

• Temperature control in an automatic


glasshouse

Page 40 of 168
3- Storage devices and Media

Backing of data concept:

42 or ia ni
Backing of data is refers to copy files or data to different medium ( disk, tape,

a
flash drive .. ) in case of problem with the main secondary storage device , and

t
98 u pe gh
copying should be in regular bases.

lis
12 e T S ir
M
Why back up data?

c
• To safeguard against loss of data due to the failure of the original
iv IC d
secondary storage
Pr e me

• To safeguard damage caused by hackers


• Backup can be made to use the files elsewhere
T
id am

• Backup also taken to protect data files from virus


t
11
br h

Type of access
m Mo

Serial access:
g
09 at

• When using serial access it is necessary to start from the beginning of the
Ca r.

file then access to each record ( like database including field , record and
M

file ) then run until to the required record found


• This way used in magnetic tape and very slow form of data access
• This way used when speed of access is not important ( as example utility
billing, clearing bank cheques, or producing pay slips)

Page 41 of 168
Direct access:
• Used with magnetic disks , optical media and solid state media
• The computer use key field to calculate where data should be stored
• Direct access much faster than serial access
• When updating files using direct access the old file or data written over

42 or ia ni
by new records
• Mostly used where data access speed is vital like controlling chemical

a
t
98 u pe gh
plants or online systems like booking air tickets or automatic stock

lis
control.

12 e T S ir
Secondary storage media:
M

c
The term byte is used to measure the size of memory or storage or file
size, and measured by KB, MB, GB and TB
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Three different types of storage media:

 Magnetic
 Optical
 Solid state

Page 42 of 168
Magnetic storage media (Direct access)
Magnetic storage media depend on magnetic properties of certain
materials, data read using direct access

42 or ia ni a
1- Fixed/internal hard disk drive (HDD)

t
98 u pe gh
lis
Uses :

12 e T S ir
 To store the operating systems, software
M
/data/files

c
 To store applications software
 Real-time systems ( robots, control of a
iv IC d
Pr e me

chemical plants) and online systems


 Used in File Servers for computer networks
T
Advantages Disadvantages
id am

t
• Very fast data transfer and fast access • Easily damaged
times
11 • Have many moving parts
br h

• Very large capacities • Their read/write operation can


m Mo

be quite noisy
g
09 at

2- Portable hard disk drives


Ca r.

Connected to a computer using USB ( Universal


M

Serial Bus) port


Uses:
 Backup systems
 Transfer data between computers
Advantages Disadvantages
 Access time of data is very fast • Easily damaged if dropped or
 Large memory capacity subjected to a strong
 Transferring data between computers magnetic field; an incorrect
shut-down procedure could
also lead to loss of data

Page 43 of 168
Magnetic Tapes ( Serial Access )
Data is read from the tape using serial access , this way
is useless in real-time or online applications because is
very slow method

42 or ia ni
Uses:

a
t
 In applications where batch processing is used, for example, clearing

98 u pe gh
lis
bank cheques, utility billing (gas, electricity, water)
 Backup media

12 e T S ir
 Used in long-term archiving of data.
M

c
Advantages Disadvantages
• Less expensive. • Very slow data access times.
iv IC d
• Very robust technology. • When updating, another tape is
Pr e me

• Huge data storage capacity. needed.


• The data transfer rate is fast. • They are affected by magnetic
T
id am

t fields.

11
br h
m Mo

Optical storage media


g
09 at
Ca r.

CD/DVD disks)
M

Laser light is used to read data and write


( R - Write once only) – (ROM - only read ) – ( RW - written or read
many times)
DVD have different technology from CD to increase storage capacity

Page 44 of 168
1-CD-ROM and DVD-ROM

Uses:
 CD-ROMs are used to store

42 or ia ni
music files, software, computer

a
games and reference software , they can't be written over

t
98 u pe gh
 DVD-ROMs have much larger storage and used to store films and

lis
games

12 e T S ir
Advantages Disadvantages
M

c
• Store more data than floppy disks • The data transfer access time is
• Less expensive than hard disk slower than hard disks
iv IC d
Pr e me

2- CD-R and DVD-R


T
id am

t
R letter means the disk is recordable once only

11
br h

Uses:
 Home recordings of music (CD-R) and
m Mo
g

films (DVD-R)
09 at

 Store data to use later or to be transferred to another computer


Ca r.

Advantages Disadvantages
• Cheaper than RW disks • CD-R/DVD-R can only be
M

• Once burned they are like a ROM recorded on once.


• Not all CD/DVD players can read
CD-R/DVD-R

Page 45 of 168
3- CD-RW and DVD-RW
RW means the disk is rewritable media
and can be written several times
Uses:

42 or ia ni
 To record television programmers

a
 Data can be added to at a later.

t
98 u pe gh
 Used in CCTV systems

lis
Advantages Disadvantages

12 e T S ir
• Can be written over many times. • Relatively expensive.
M
• Can use different file formats • It is possible to accidentally

c
each time it is used. overwrite data.
iv IC d
Pr e me

4- DVD – RAM
T
id am

t
Uses:

11 In recording devices such as satellite


br h

receivers to allow simultaneous recording


m Mo

and playback
g
09 at

 Used in camcorders to store movies


Ca r.

Advantages Disadvantages
M

• Long life • Not as compatible as R or RW


• A rewrite operation over 100000 format
times • Expensive.
• Writing on DVD-RAMs is very
reliable
• Very fast access
• No need to finalize the disk
• Very large capacity
• Ability to read data at the same
time written

Page 46 of 168
5- Blu-ray discs

The main differences are:

42 or ia ni
 A blue laser, carry out read and write operations
 Blu-ray can store up to five times more than DVD

a
t
98 u pe gh
lis
Uses:

12 e T S ir
 Home video
 M
Storing and playing back movies.

c
 Data storage or backing up

iv IC d
Camcorder to store movie footage
Pr e me

Advantages Disadvantages
• Very large storage capacity • Expensive
T
• Very fast data transfer rate • Encryption problems
id am

t
• Data access speed greater than • Fewer movie titles on Blu-ray

11
other optical format
br h
m Mo
g
09 at
Ca r.
M

Page 47 of 168
Solid state storage media Solid (Direct access)

Solid State drives (SSD)


There are some advantages of using SSD rather than HDD
 More reliable

42 or ia ni
 Lighter

a
 Lower power consumption.

t
98 u pe gh
 Run much cooler than HDDs

lis
 Very thin.

12 e T S ir
 Data access faster than HDD
M

c
iv IC d
1- Memory sticks/pen drives
Pr e me

Store several gigabytes of data and use the


solid state technology
T
id am

Uses :
t
11
 Transporting files between computers /
br h

backup
m Mo

 Security device to prevent software piracy ( dongle)


g
09 at

Advantages Disadvantages
Ca r.

• Very compact and portable media • Can’t write-protect the data/files


M

• Very robust • Easy to lose


• Doesn’t need additional software • The user needs to be very
to work on most computers careful when removing a
• Not affected by magnetic fields memory stick from a computer -
• Small incorrect removal may damage
the port and memory stick

Page 48 of 168
2- Flash memory cards

42 or ia ni
Uses:
 Storing photos on digital cameras

a
t
98 u pe gh
 Used as mobile phone memory cards

lis
 Used in MP3 players to store music files

12 e T S ir
 Used as a backup store in hand-held
computer devices
M

c
iv IC d
Advantages Disadvantages
Pr e me

• Very compact and can be easily • Expensive per gigabyte.


removed and used in another • Have a limited life.
T
id am

device
t • Lower storage capacity than
• Very robust.
11 hard disks.
br h
m Mo
g
09 at
Ca r.
M

Page 49 of 168
4- Networks and the effects of
using them

42 or ia ni
Computer Network:
A network is two or more computers or other device connected together so

a
t
that can exchange data, share resources and files. Network created using

98 u pe gh
lis
cables or wireless signal

12 e T S ir
Advantages of using Network:
M

c
 Easily share files and data
 Share resources (printers, internet..)
iv IC d
 Communicate with other network users
Pr e me

 Store data centrally by using file server


 Keep all setting centrally
T
id am

t
Disadvantages of using Network:
11
 Greater risk of hacker
br h

 Greater risk of viruses


m Mo

 Cost of extra equipment


g
09 at

 Printer fast developing


 When the computer is down computers can’t use as standalone
Ca r.

computers
M

Network Devices :

Hubs:
Hubs are hardware devices that
can have a number of devices or
computers connected to them to
make LAN and not very high
secure / suitable for home
network

Page 50 of 168
Switches
Similar to hub but more
efficient, connect a number of
devices or computers together
to form a LAN and more

42 or ia ni
secure

a
t
98 u pe gh
lis
Modem

12 e T S ir
M
• A device that converts analogue signal from telephone line to

c
digital signals which can be ready for the computer
• Also converts a computer’s digital signal into an analogue
iv IC d
Pr e me

signal for transmission by telephone line.


• Dial-up modems, transmission speed 60 kb/s
T
• ADSL (asymmetric digital subscriber line) modems operate at
id am

t
up to 100 Megabits /s

11
br h
m Mo
g
09 at
Ca r.
M

Bridge:
Bridges are devices that connect
one LAN to another LAN that
uses the same
protocol

Page 51 of 168
Router:
• Connect network/computer to the internet
• Connect LAN/network together
• Transfer data between networks
• Router can connect two devices using cables

42 or ia ni
or wireless signal

a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Network interface card (NIC)
Pr e me

Allow to connect device to the network


T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Other hardware

Gateway:
A gateway is a network point that
acts as an entrance to another
network

Page 52 of 168
Network cables:
Even most of computers systems is using Wi-Fi
still network cables used because they have some
advantages over Wi-Fi :
 Faster data transfer rate

42 or ia ni
 Can be more secure than wireless
networks

a
t
98 u pe gh
lis
Internet protocol (IP) and media access control ( MAC ) addresses

12 e T S ir
• Each device on the internet given unique address called internet
M

c
protocol (IP) address and the form is ( 109.108.158.1 )
• Home computer when connect to internet given IP assigned by ISP
iv IC d
(internet service provider )
Pr e me

• This IP can use instead of using full URL ( http://109.108.158.1)


T
id am

t
Differences between IP and ( MAC ) addresses

11
br h

• MAC Address is used to ensure the physical address of computer. It


m Mo

uniquely identifies the devices on a network.


g
09 at

• While IP address are used to uniquely identify the connection of


network with that device take part in a network.
Ca r.
M

Wi-Fi and Bluetooth


Both provide wireless communication and
uses radio signals

Wi-Fi: is wireless networking technology


make it possible to connect devices
with a wireless connection to a network or to a single computer
• Easier to connect many devices to the network
• Better range up to 100 m
• Reduced cost of cabling / better security/ needs password
Page 53 of 168
• Limited area of network
• Strength of signal is weaker
• Possible slow data transfer speeds
• Easier to hack into/Less secure
• Sometimes physical devices can interfere with signal

42 or ia ni
which due to disconnection

a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Bluetooth: is wireless networking technology designed for very short
Pr e me

range connections
T
id am

t
• Connecting wireless devices such as mouse, phone, which are very

11
close to a computer
br h

• Transferring files between devices


m Mo

• Printing wirelessly from a Tablet or Mobile phone


g

• Very slow data transfer speed


09 at

• Short distance of coverage, less than 30 meters distance


Ca r.

• Less secure since no password required


• Support limited number of devices
M

• Low-bandwidth

Page 54 of 168
Differences between Wi-Fi and Bluetooth

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me

How to configure small network:


T
id am

t
Suppose you asked to setup and configure small network, you have to do
11
br h

the following:
m Mo

• Setup an account with ISP


g
09 at

(Internet service provider )


Ca r.

to receive internet
connection
M

• Setting an IP account if
internet access is required
• Buy appropriate hardware
and make setup for all
hardware
• Configure all hardware with software correctly to allow wireless
connectivity
• Put all software into the server with its license
• Setup privilege (each user can access only on their own area)
• Setup network manager level of privilege to monitor the network
uses and can change the password

Page 55 of 168
Purchase hardware and software:

42 or ia ni
1-Hardware
Router to connect your LAN to the

a
t
internet

98 u pe gh
lis
12 e T S ir
Switch / to connect Network devices
M

c
Hub together using cables
iv IC d
Network to connect physical
Pr e me

cables connections
T
id am

t
Firewall
11 it can be hardware of
br h

software , to protect the


m Mo

network against hacking


g
09 at
Ca r.
M

Server to manage network


functions such as network
security, network file
storage, share recourses ,
etc.

Page 56 of 168
2- Software
Web to browse the internet
browser

42 or ia ni
E-mail to send and receive e-mail

a
including attachments

t
98 u pe gh
lis
Security Anti-virus /Spyware software

12 e T S ir
to protect your computer
M

c
from external threats
(Viruses / Hackers )
iv IC d
Pr e me

Network Environments
T
id am

t
(Local area networks (LANs) and Wide area networks (WANs):
11
br h
m Mo

Local area networks (LANs)


g

 Covers small area (one building) or within


09 at

close area.
Ca r.

 LAN consists of number of computers and


devices that usually connect to a switch/Hub
M

which is connected to the router


Advantages Disadvantages
• Sharing of resources (printer, • Easier spread viruses to whole
internet.. ) network.
• Ease of communication • Printer fast developing
between users. • Slower access to external networks
• A network administrator to • Increased security risk when
control and monitor all aspects compared to stand-alone
of the network computers

Page 57 of 168
Wide area networks (WANs)

 Used where computers or networks are


situated a long distance from each other

42 or ia ni
 WAN is often created by joining several

a
LANs together

t
98 u pe gh
 Router is used to connect LAN networks

lis
to form a WAN network

12 e T S ir
 The most common example of WAN is Internet
M

c
iv IC d
Wireless LANs (WLANs)
Pr e me

 (WLANs) are similar to LANs but there are no


wires or cables
T
id am

t
 Devices known as Access Points (AP) are

11
connected to wire network at fixed locations.
br h

 These devices provide wireless access to


m Mo

devices on the network.


g

 It is much more convenient to use wireless


09 at

connections instead of running long wires all


Ca r.

over the building


M

Advantages Disadvantages
• All computers can access the • Security a big issue
same services and resources • Affect the signal by any problem.
(such as printers, scanners, • The data transfer rate is slower
internet) than in a wired LAN.
• Increased flexibility.
• Adding new computers and
devices is very easy

Page 58 of 168
Accessing the internet

Device Advantages Disadvantages


• More portable and • Touch pad may be difficult

42 or ia ni
Laptop computers smaller size compared to to use to navigate

a
desktop webpages

t
98 u pe gh
• Bigger screen compared • Processors are not as fast

lis
to tablet and mobile as desktop computers

12 e T S ir
phones
M • Stable internet • Should be connected to a

c
connection since the power supply all the times
Desktop
iv IC d
connection is normally • Not portable
Pr e me

wired
• Use of input devices
T
including pointing devices
id am

t to make navigation easier

11
br h

• More portable than • Signal strength dependent


m Mo

Tablets laptop and desktop but on location


g
09 at

less than mobile phones • Smaller display screen


• Mobile : portable : easy • Not all websites designed
Ca r.

to carry around while you to be used by mobile or


M

move tablets
• Mobile : Always likely to • Touch screen may be
have a mobile all the difficult to use
Mobile Phones times • Limited battery life
• Mobile : can access
internet via mobile phone
network

Page 59 of 168
Internet and intranet:
• Internet :
 Internet is public
 Internet is network of networks

42 or ia ni
 Internet is global

a
 Internet has more information

t
98 u pe gh
than an intranet

lis
12 e T S ir
• Uses of internet:
M 

c
Viewing webpages
 Sending and receiving email messages
iv IC d
 Communication using VIOP and Web video Conferencing
Pr e me

 Playing multiplayer games


 Streaming Video / Audio content
T
id am

t  Online Shopping/ Banking

11
• Intranet :
br h
m Mo

 Intranet is within one


g
09 at

organization ( private )
 Intranet can be policed
Ca r.

/ managed
M

 Intranet is more secure


 Data on the intranet is more reliable and relevant to the
organization than which on the internet

• Uses of Intranet:
 Viewing internal webpages ( Company , School , …)
 Internal e-mail and messing between workers
 Sharing internal documents

Page 60 of 168
Network issues and communication

Security issues:

• How hackers can affect your data and network

42 or ia ni
• Threats of data:

a
 Data could be deleted,

t
98 u pe gh
lis
edited, corrupted or
replicated

12 e T S ir
 Data could be passed to
M other people

c
 Accessing your email
iv IC d
account
Pr e me

 Carrying out online banking


T
• Threats of network:
id am

t  Network could be shut down or infected by virus

11  Could stop production , cost a lot of money


br h
m Mo
g
09 at

Should internet be policed?


Ca r.
M

advantages disadvantages
• To protect vulnerable users • It would be extremely difficult
gaining access to undesirable and expensive to police the
websites internet
• To prevent illegal material be • Infrastructure and staff would
opened or shared by web users have required
• It will stop incorrect information • It is difficult to push roles in
being published on websites different countries
• This will be against freedom

Page 61 of 168
Reliability of information
 Information on the internet is more up to date than in books.
 It is much easier to get information from websites.
 There is a big amount of information on the internet that is

42 or ia ni
easier to locate than using several books
 Information could also be incorrect.

a
t
 It is possible to get millions of hits, which may make it difficult

98 u pe gh
lis
to find the relevant information.

12 e T S ir
Unwanted of certain websites
M
 Risk of finding undesirable websites.

c
 Risk of connecting to websites that are not genuine, which
iv IC d
could lead to a number of problems.
Pr e me

 Security risks.
T
Methods of Authentication (username and password)
id am

t
• Authentication: it technique to ensure only authorized users

11are able to gain access to the network via Username/Password


br h

or Biometrics, Magnetic Card, Digital certificates..etc.


m Mo
g
09 at

ID and Password as authentication method:


 Password can be guessed especially if week password.
Ca r.

 Password can be seen by others


M

 Password can be stolen and used by others


 Spyware may be used to get the password
 Password can be hacked by using password generating software

Some ways to protect your password:


 Run anti-spyware software
 Change passwords on a regular basis
 Passwords should not be easy to guess or break, Strong
passwords should contain:
• At least 8 characters, one capital letter.
• At least one numerical value.

Page 62 of 168
• At least one other keyboard character.
 Strong password Exp. (Syl2@#TT90kj=0 )
 Week password Exp.( white, ahmed ,,,, )
Viruses:
• Computer virus is a piece of programming code/ software which can

42 or ia ni
install and replicate itself on the computer system without the user’s
permission which can cause:

a
t
 Crash the computer ( become slower)

98 u pe gh
lis
 Can delete the files
 Data files can be copied by hacker

12 e T S ir
 Can stop the production
M

c
Antivirus software:
iv IC d
Antivirus software will check for virus attacks.
Pr e me

 They check software or files before they are run or loaded


T
 Checking of software and indicate a possible virus.
id am

t
 Any possible files or programs that are infected are put into

11quarantine that allows automatically deleted or ask the user to


br h

make the decision about deletion.


m Mo

 Antivirus software should up to date


g
09 at

 Full system should checks once a week.


Ca r.

To avoid virus look at security indicator https or padlock symbol


M

Encryption:
• Encryption is the process of
converting information into a
form that is meaningless to
anyone except holder of key.

 Data is encrypted
 If the data intercepted it then it prevents people from
understanding and reading the data
 The person with the key is able to Decrypt and
understand the data
Page 63 of 168
Disadvantages:
 Data can still be deleted from the system
 Criminals can use encryption to keep incriminating
material secure

42 or ia ni
To avoid virus and spyware when using internet:

a
t
 Don’t download any files from

98 u pe gh
lis
untrusted source
 Don’t install illegal software

12 e T S ir
 Don’t click any link from unknown
M

c
websites
 Ensure antivirus is up-to-date
iv IC d
 Always look at security indicator
Pr e me

https or padlock symbol


 It is possible to pick up virus from any device plugged into your
T
id am

t
computer.

11
br h

Data Protection Act ( DPA ) :


m Mo

• Most of countries have some form of Data Protection Act, these are
g

designed to protect individuals and to prevent incorrect or inaccurate


09 at

data being stored


Ca r.
M

(8) Principals of the Data Protection Act :


1. Data must be fairly and lawfully processed
2. Data can be only processed for the stated purpose
3. Data must be adequate, relevant and not excessive.
4. Data must be accurate.
5. Data must not be kept longer than necessary.
6. Data must be processed in accordance with the data subject's rights.
7. Data must be kept secure.
8. Data must not be transferred to another country unless they also
have adequate protection

Page 64 of 168
Network communication (A physical fax-Electronic faxing and email)

Type of communication Overview / Advantages Disadvantages

42 or ia ni
• Require fax machine and • Anyone can access fax

a
telephone line documents

t
Physical Faxing

98 u pe gh
• Number of recipient • The fax may be out of paper

lis
dialed before the of toner

12 e T S ir
documents copied and
sent
M

c
• Physical documents are
printed and can be signed
iv IC d
• Can send multiple • Attachments may include a
E-mail
Pr e me

attachments virus
• Can send to multiple • May receive SPAM
T
recipients in one message • May receive Phishing e-mail
id am

t • Email received instantly


• Can access through any
11
br h

platform (mobile – IPad-


m Mo

Laptop)
g

• Send via internet connection


09 at

Electronic Fax
• No need to buy fax machine, ink or paper
• Electronic fax send to Email
Ca r.

• Can also send to fax machine


M

• Can send from any location have internet connection


• No additional cost to send fax through internet

Page 65 of 168
Network communication

Type of
Overview Hardware
communication
• Video conferencing uses

42 or ia ni
Video Conferencing both video and audio using

a
an internet connection

t
98 u pe gh
• It can be used for business

lis
meeting when people are in

12 e T S ir
different locations

c
iv IC d
Pr e me

Web Camera| Screen


|Speakers|
T
id am

t Microphone

11
br h

Advantages Disadvantages
m Mo

• Much easier to access important • Technical problems with the


g
09 at

documents or bring “experts”. internet can affect the quality


• It is possible to hold conferences • Setup cost and purchase hardware
Ca r.

at short notice. • Lack of personnel contact


M

• Not travelling to meetings • Different time zone could difficult


reduces costs: to find suitable time
 Reduced travelling costs. • Not possible to sign document
 No need to pay for hotel
accommodation.
 Reduces transportation.
 When have delegates need
travel to unsafe places
around the world.

Page 66 of 168
Type of
Overview Hardware
communication
Audio conference can be done
Audio over the telephone network or
Conferencing using a computer making use of

42 or ia ni
VOIP

a
• The organizer of the phone

t
98 u pe gh
conference is given unique Pin which

lis
can be shared participants to join
Telephone (VOIP) –

12 e T S ir
they have to dial the conference
phone number then they would have Microphone – speakers
M enter a PIN

c
Web Web conferencing can be done using
iv IC d
Conferencing internet connection
• Very similar to video conferencing
Pr e me

as the participants can see Video


and hear Audio
T
id am

t • Participants can join to the


conference by clicking on the link

11 provided by the organizer.


br h

• Instant message available to


m Mo

communicate with another Web Camera|Screen


g

• Business meetings
09 at

participants |Speakers| Microphone


• Presentations. • Participants can be given
Ca r.

• Online education / permission to speak and can share


training contents
M

Page 67 of 168
5- The effects of using ICT
There are four main areas people losing their jobs:
1. Office work

42 or ia ni
2. Manufacturing

a
3. Shop work

t
98 u pe gh
lis
4. Banking

12 e T S ir
The effects of ICT on unemployment
M

c
Negative effects - job losses
iv IC d
Pr e me

Office Work:
T
id am

Many of manual jobs no longer needed as example typing, filing


t
documents, and data entry because the computer changed the way of this
jobs
11
br h

• Daily task carried out by (Administration department - Human


m Mo

resources department – Payroll department)


g
09 at

• By introducing computer systems the work done by fewer staff in


short time
Ca r.
M

Three types of software the most impact in offices:


Word processors – Spreadsheets – Databases

Application software Effects


 Easier to modify and update the documents
 No need to file big amount of documents in
Word processors cabinets, all stored electronic format
 Only print document when required , this
save money and ink
 This lead to reduction of staff

Page 68 of 168
Application software Effects
 Can do formula to calculate automatically

42 or ia ni
payroll, salary calculation, wage slips,

a
number of hours worked

t
98 u pe gh
Spreadsheets  Can do graph or charts

lis
 As example: teachers can monitor the

12 e T S ir
progress of their students (results / marks /
M sort / chart ..)

c
 This lead to reduction of staff
iv IC d
 Easy to add and update personal data such
Pr e me

as salaries/address/phone number .. , this


Databases task usually by (Human recourse)
T
id am

t  Workers need to retrain to use database as


it is difficult to use
11
br h

 This lead to reduction of staff


m Mo
g
09 at
Ca r.

Manufacturing:
M

Many companies are using robots for production such as manufacturing of


cars, this change the way of people work, robot can do the following tasks:

1. Spraying the bodies with paint


2. Assembly all the bodies parts
3. Assembly the engine and transmission
4. Fitting the windscreen

Page 69 of 168
How this change the way of people work?
 People lost their job to robots
 Robots can work in dirty or dangerous environment
 Robots can move heavy lifting
 Working environment clean and safe

42 or ia ni
 Workers have had to retrain to gain the following new skills:
o Maintenance of the robots

a
t
98 u pe gh
o Quality control

lis
o Design and development

12 e T S ir
o Marketing
o Training other workers.
M

c
iv IC d
• Advantages of robots over humans
Pr e me

 Higher productivity.
 More consistent results
T
id am


t Work non-stop without breaks

11 They don’t get bored by repetitive tasks.
br h

 They don’t go on strike.


m Mo

• Disadvantages of robots over humans


g
09 at

 Expensive to purchase and setup first time


Ca r.

 Often need to be reprogrammed for every new task


M

 production errors may occur

• Positive effect
Although ICT led to people losing their jobs, also led to create new big list
of jobs:
 Network managers
 Computer technicians
 Website designers
 Systems analysts
 Programmers
 Computer engineers
 Delivery drivers

Page 70 of 168
The effects of ICT on working patterns:

Work pattern Change

42 or ia ni
 Staff usually work between 1 and 30 hours,
Part-time working someone can work fewer hours per day or

a
t
per week than full time

98 u pe gh
lis
 Staff have ability to choose when can start
Flexible working and finish but must complete full day's

12 e T S ir
( Flexi-time) work
M  This require agreement with employer

c
 Full time job is divided between 2 workers
iv IC d
, one employee in the morning and the
Pr e me

other in the afternoon or one from


Job sharing Monday to Wednesday lunchtime and the
T
id am

t other one from Wednesday to Friday


lunchtime

11  Both workers working with the same job


br h
m Mo

 Worker can work full hours (40 hours) in


Compressed hours
g

fewer days like 4 days


09 at
Ca r.
M

Page 71 of 168
Microprocessor – controlled device in the home
Is a device that uses computer to control its functions, the devices fall
in main two categories:

1- Labour – saving devices:

42 or ia ni
 Automatic washing machines

a
 Microwave ovens

t
98 u pe gh
 Cookers

lis
 Automatic dishwashers

12 e T S ir
 Robotic vacuum cleaners
M
 Bread making machines

c
 Smart fridge and freezer
iv IC d
Pr e me

This allow people to get on with other things while the device carries
out their tasks
T
id am

t
11
2- Other type of devices
br h

 Alarm clocks
m Mo

 Television sets
g
09 at

 Central heating and air conditioning systems


 Home entertainment systems
Ca r.
M

Advantages and disadvantages of microprocessor-controlled labor-


saving devices

Advantages Disadvantages
Reduces number of manual task at Can lead to unhealthy life styles
home because readymade meal
Give people time to do some Tend to make people lazy since they
activities (shopping – hobbies ) while are depend on devices
devices cooking foods or washing
clothes

Page 72 of 168
Smartphone can make control to People become less fit if the people
switch on/off oven / central heating just lie around at home while the
devices carry out the tasks
Automatic burglar alarms give people Losing household skills
sense of security

42 or ia ni
Smart fridges and freezer can lead to
healthy lifestyle

a
t
98 u pe gh
lis
Advantages and disadvantages of other of microprocessor-controlled

12 e T S ir
devices ( not related to lifestyle )
M

c
Advantages Disadvantages
iv IC d
Save energy since the device can Some people not familiar with this
Pr e me

switch off themselves technology , it will be difficult to use


It is easy to program the device by Leaving devises on stand-by like TV +
T
id am

t
using QR codes instead of press receiver ) is very wasting of electricity
buttons manually

11 Some electronic devices can’t repair


br h

specially circuit board ( just thrown


m Mo

away )
g
09 at
Ca r.
M

Page 73 of 168
6- ICT Applications

 Communication Applications

42 or ia ni
1- Paper Based : Flyers, Posters, Brochures and Newsletters

a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 74 of 168
2- Websites:
 Companies uses websites
for advertising and
communicate the customers
 Websites can easily updated

42 or ia ni
and can provide relevant
and up-to-date information

a
t
 Websites can use for online shopping, research, social

98 u pe gh
lis
networking, banking..

12 e T S ir
Advantages
M

c
• Video/ sound can be added
• Can hyperlink to another websites
iv IC d
• Can have navigation buttons
Pr e me

• Can have hit counter


• Seen by global audience
T
id am

t • Much easier to update

11
br h

Disadvantages
m Mo

• Websites can be hacked


g

• Risk of pharming
09 at

• You should have a computer and internet


Ca r.

• It's not portable like paper-based



M

Website maintain is expensive


• Because its global, difficult to target the correct audience

3- Multimedia presentations:
Presentations that use animation, video and
sound or music are generally much more
interesting than a standard presentation
and can be displayed on the projector to
keep the audience see.

Page 75 of 168
Advantages:
• Video/ Sound/Music can be added
• Can add hyperlink to the presentation
• Can have transition effects

42 or ia ni
• Presentation can be interactive

a
t
Disadvantages:

98 u pe gh
lis
• It needs special equipment/ expensive
• Equipment failure can be disaster

12 e T S ir
• Wherever presentation you need internet connection
M

c
4- Music scores:
iv IC d
Music now can created and edited on the
Pr e me

computer systems with the appropriate


software including mixing, creating music
T
id am

slogan
t
11
br h

Features of music scores technology:


m Mo

• The music score can be generated from the music played


g

• The editing/correcting of the music score in a different key is


09 at

faster
Ca r.

• Solo music scores can be easily transformed into music for many
M

parts
• Software can automatically correct the music score
• Music can be played automatically as it is written
• Music notes are automatically printed out in the correct format
• Music scores can be saved for future editing

5- Cartoons:
• Animation can be created by using
hardware and software specially 3D
animation software to promote new
product
• Objects are designed on a computer
Page 76 of 168
• 3D skeleton produced
• The parts of this skeleton are moved by animator using key frames
• This frames define start point and end point
• The difference in the appearance of the skeleton in this key frames
automatically calculated which known as (twinning – morphing)

42 or ia ni
and the final stage known as (rendering).
• Cartoons can be created by freehand drawing

a
t
98 u pe gh
lis
12 e T S ir
6- Mobile phones:
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

7- Business cards and letterheads:


• Business card and letterhead help to
give corporate image
• Many companies offer templates to
produce business cards and letterhead
through websites
• Business card can be handed out to
people
• Business card have the same design for flyers/ brochures

Page 77 of 168
Advantages of using corporate letterheads produced by a printing website:

• Professionalism ( credibility of the company)


• Branding /company awareness
• Proof of actual communication

42 or ia ni
• Advertising
• High impact than white paper

a
t
• Can make the company appear larger than it is.

98 u pe gh
lis
12 e T S ir
8- Data handling applications
M

c
Number of applications can make simple data handling technique:
iv IC d
• Surveys: information from surveys can be stored in a database
Pr e me

so the data can be analyzed and queried


• Address lists : Mobile phones include address books which
T
id am

t
include contact names, numbers, email, address

11
• Clubs/ Society records : information for current members
br h

including names and contact details which will be easy to


m Mo

search, contact, send reminder


g

• School records: Students records including assessments,


09 at

behavior also staff record could be stored into database.


Ca r.

• School libraries : information for the current books including


M

borrowing details and members of the libraries can be stored


on the database

 Measurement applications:
Measurement applications, using sensors and other electronic hardware.
Data convert from Analogue to Digital through (ADC) Analogue Digital
Converter

Page 78 of 168
Examples:
 Weather stations
 Scientific experiments
 Measuring a patient’s vital signs on a hospital

42 or ia ni
 Pollution monitoring

a
 Burglar alarm systems

t
98 u pe gh
lis
1- Weather station:

12 e T S ir
Weather station setup up automatically to gather information from the
M

c
environment, variety of sensor can measure:
iv IC d
 Rainfall
Pr e me

 Temperature
 Wind speed
T
id am

 t
Wind direction
 (Barometric) pressure ( air
11pressure )
br h

 Humidity
m Mo
g
09 at

Why use computers for measuring?


• Computers do not require a
Ca r.

break
M

• Reading are more accurate


compared to human
• Readings are taking more
frequently
• Data can be analyzed and compared with the existing data
• Automatic graph can be created
• Sensors can work in dangerous conditions which cannot do
by human
• People can complete other task while system working
automatically

Page 79 of 168
2- Measuring a patient's vital signs in a hospital
 Sensors read key vital signs (such as
pulse rate, heart rate, temperature,
blood pressure, respiration, etc.)
 The data from the sensors is

42 or ia ni
converted into digital using an ADC.
 The data is stored in the

a
t
98 u pe gh
computer’s memory.

lis
 The computer compares the data

12 e T S ir
from the sensors with the values stored in its memory
 The results are output on a screen in the form of graphs and/or
M

c
numerical readouts
 An alarm is activated if any of the data is outside acceptable input
iv IC d
values
Pr e me

 The system continues to measure the patient’s vital signs until the
computer is turned off.
T
id am

t
3- Measuring pollution in a river:
11
br h

 The sensors are placed in at least two different positions


m Mo

 The data from the sensors is converted into digital using an ADC and
g

sent to a computer
09 at

 The computer stores the received data


Ca r.

 The oxygen levels and acidity levels are compared to the historical
M

data stored in memory


 The oxygen and acidity levels from the different positions in the river
are also compared to see if they are similar

Page 80 of 168
Advantages:
• The computer wouldn’t forget to take readings.
• The computer’s response time is much faster.
• Doctors, nurses, scientists etc. can get on with other tasks

42 or ia ni
while measurements are taken by computers
• Computers give 24-hour cover every day.

a
t
• More accurate reading

98 u pe gh
lis
• Readings can be taken more frequently
• Safer since is being measured take readings or a nurse looking

12 e T S ir
after a patient
M

c
• Computers can produce graphs automatically
• Cost saving as fewer staff are needed
iv IC d
Pr e me

Disadvantages:
• The computer is unable to respond to unusual circumstances.
T
id am

• Computer equipment and measuring software can be expensive


t
• The student will not learn as much using a computer system.
11
• Power cut
br h
m Mo

 Microprocessors in control applications


g
09 at

• Sensors send data to the microprocessor or computer then


Ca r.

compares the incoming data to stored values or data entered


M

earlier.
• The microprocessor/computer will check whether the incoming
data is outside the given parameters and will take any
necessary action

Page 81 of 168
Some control application includes:
• Automatic washing machines.
• Automatic ovens/cookers.
• Central heating systems.

42 or ia ni
• Chemical plants (Petrochemicals).
• Glasshouse environment control.

a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
1- Automatic oven/cooker
11
br h

• An automatic cooker/oven has


m Mo

temperature sensors and a number of


g
09 at

controls to set the cooking time.


• The microprocessor checks the set time
Ca r.

against the current time and when they


M

are equal, the cooker/oven heating


elements are switched on.
• Once the cooker/ oven starts the cooking
process, the microprocessor then constancy
checks the end time against current time,
when they are equal, the cooking process is
stopped.
• The microprocessor checks the temperature data sent from a
sensor and turns the heating element on if the value less than
the pre-set value chosen by the user.

Page 82 of 168
2- Central heating systems
• A gas supply is used to heat water in a boiler.
• A valve on the gas supply is controlled by a microprocessor and
is opened if the heating levels need to be increased.

42 or ia ni
• A water pump is used to pump hot water around the central
heating system whenever the temperature drops below a

a
t
98 u pe gh
preset value

lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g

3- Chemical Process Control


09 at

Only works if the temperature is above 70°C and the pH level is less than
Ca r.

3.5. Sensors are used as part of the control system. A heater is used to
heat the reactor and valves are used to add acid when necessary to
M

maintain the acidity.

How is sensors and computer used to control?


1. Temperature and pH sensors read data from the chemical process
2. This data is converted to digital then sent to the computer
3. The computer compares the incoming data with preset values stored
in memory if the:
 Temperature is less than 70°C, a signal is sent to switch on
the heaters
 Temperature is greater than or equal to 70°C, a signal is sent
to switch off the heaters

Page 83 of 168
 pH is greater than 3.5, then a signal is sent to open a valve
and acid is added
 pH is less than or equal to 3.5, then a signal is sent to close
this valve
 The computer signals will be changed into analogue signals

42 or ia ni
using a DAC so that it can control the heaters

a
t
4- Glasshouse environment control:

98 u pe gh
lis
Five different sensors could be used here to control the glasshouse

12 e T S ir
environment; namely, Humidity, Moisture, Temperature, pH and
Light M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 84 of 168
M

Page 85 of 168
Ca r.
m Mo
5- Turtle graphics

br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
M

Page 86 of 168
Ca r.
m Mo
br h
id am
g
Pr e me
iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
 Modeling applications
 Spreadsheets :
• Business can use spreadsheets models to forecast
future profit or loss

42 or ia ni
• Due to use of formula business can adjust certain

a
values to see automatic change.

t
98 u pe gh
 Flight simulator :

lis
• Pilots able to learn how to fly a plan using simulator

12 e T S ir
• The interface and control are the same real plan
M • Different conditions can be tested

c
• Reduced cost as plan will not be damaged
 Building simulator:
iv IC d
• Before building are constructed, simulator take place
Pr e me

to make sure the building fit the requirements


• Simulations can ensure the building could cope with
T
id am

t earthquake or storm

11
 Traffic Lights
br h

• Traffic light simulator look at the flow of traffic ( data


m Mo

captured from the sensor


g
09 at

• The simulator will adjust the best control for the


flow of traffic
Ca r.
M

Page 87 of 168
 Manufacturing applications:
Robotics:
• Robots are used in many areas of
manufacturing like, paint spraying

42 or ia ni
of car bodies, welding bodywork

a
on cars, manufacturing of

t
98 u pe gh
microchips, manufacturing

lis
electrical goods and automatic

12 e T S ir
warehouses.
M • Robots include (built-in)

c
microprocessors or linked to a
iv IC d
computer system
Pr e me

Advantages:
T
id am

t  Work in a bad environments


 Work non-stop (24/7)
11  Less expensive
br h

 Don’t need holidays, etc.)


m Mo

 Greater consistency
g
09 at

 NO boring, repetitive tasks


Disadvantages:
Ca r.

 Difficult to do ‘unusual’ tasks.


M

 Cause higher unemployment.


 There is a real risk of certain skills being lost
 Set-up and maintenance is expensive

 School management systems:


• Registration and attendance records of the students
• Student performance
• Organization of school exams
• Creation of timetables
• Teacher substitution

Page 88 of 168
1- School registration systems:
The traditional way for student's attendance consume 10 minutes
from each session the beginning. There are number of possible ways
of automating the registration

42 or ia ni
Method 1 :

a
t
 Issue each student with an ID card.

98 u pe gh
lis
 ID card contain a magnetic stripe

12 e T S ir
on the rear of the card.
 The student would have to sign the
M

c
card and also write his unique
student ID on the back of the card.
iv IC d
 The magnetic stripe would contain the name of the school
Pr e me

and other details, date of birth.


 Each morning the student should swipe his ID card using
T
id am

t
magnetic card reader.
 The data now stored on a database.
11
br h

 On leaving the school he will swipe card again


m Mo
g

Method 2 :
09 at

 A second method could make


Ca r.

use of biometrics.
M

 Each student would have their


fingerprint taken and store on a
database.
 When the student enter the
school he would asked to put his
finger on a scanner to read his
fingerprint

Page 89 of 168
Advantages of finger print:
• Finger print are unique, impossible to sign in with another
fingerprint
• ID could be easily lost
• ID can be affected by magnetic field

42 or ia ni
• It is easier to make copy of ID card but you can’t with
fingerprint.

a
t
98 u pe gh
lis
Disadvantages of finger print:
• It would take long time to collect

12 e T S ir
• The equipment to take and read fingerprint is expensive more
M

c
than ID reader
• If the student cut his finger will prevent him to enter.
iv IC d
• May be the parents object to take finger print for their children
Pr e me
T
id am

t
2- Student performance:
• Teacher are able to enter students data ( grades /reports /
11
br h

applications / behavior) into the school management system


m Mo

• This data stored in central storage which will be available for


g

any one from the staff


09 at

• The data can be analyzed and make a report.


Ca r.

3- Exam timetables, subject timetables and teacher substitution


M

• Timetable can created


• Exams scheduling
• Subject scheduling
• Producing
cover/substitution plans
for teachers who are
absent.

Page 90 of 168
 Booking systems:
Example uses :

42 or ia ni
 Transport : Flight, Trains, Buses

a
 Entertainment : Theater, Cinema, Stadium

t
98 u pe gh
lis
 Accommodation: Hotels, Apartments, Villas

12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Theatre and cinema booking systems


(How the system works)
• The customer clicks on the performance they wish to see.
• A date and time is typed in
• The required number of seats is also entered.
• The seating display in the theatre is shown on the screen.

Page 91 of 168
• The user selects their seat(s) by highlighting the actual seats on the
screen, display and then clicks CONFIRM to go to the next part of the
process.
• The database searched to check the availability of the selected seats
• If the seats are available, the total price is shown + the seat numbers

42 or ia ni
• If the customer is happy with this, they select CONFIRM on the
screen

a
t
98 u pe gh
lis
Advantages of online booking systems
 Prevent double-booking.

12 e T S ir
 The customer gets immediate feedback on the availability of
M

c
seats
 The customer can make bookings at any time of the day.
iv IC d
 The customer can receive any special offer by e-mail
Pr e me

 Easier to browse the seating plans to choose the best seats


available.
T
id am

t
 No printed tickets which saves costs
 Online booking allows to use modern smartphone and tablet
11
br h

apps technology.
 Confirmation message sent once payment approved has been
m Mo
g

authorized
09 at
Ca r.

Disadvantages of online booking systems


 Setup and maintenance is expensive.
M

 Service need a computer and internet


 Difficult to cancel the booking and get your money back
 If the server is down or systems breaks down, it will impossible
to book seats.
 If the websites are not well designed, it is difficult to make
exactly the booking
 Booking online does not allow to build a personal relationship
with the travel

Page 92 of 168
 Banking Applications
The application of computers in the banking sector have enhanced
productivity regarding account management in this part we will
consider:
1. The use of automatic teller

42 or ia ni
machine ATM

a
2. Internet banking

t
98 u pe gh
3. Telephone banking

lis
4. Chip and Pin technology

12 e T S ir
5. Clearing of cheques
M
6. Electronic fund transfer

c
iv IC d
Pr e me

1- Automatic teller machines (ATMs)


ATM cash machines can be used for various purposes including ( cash
T
withdrawal / deposit / checking / printing statement)
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 93 of 168
2- Internet Banking & Online shopping :
• Using internet banking requires good security. It allows the
transfer of sums of money between accounts, payment of bills,

42 or ia ni
ordering of statements, and so on.
• Online shopping and banking means that more and more people

a
t
are staying at home to buy goods and services

98 u pe gh
lis
Advantages of online shopping and banking

12 e T S ir
 No need to travel / reducing costs and time-wasting.
M

c
 Users have access to a worldwide market and can look for
products that are cheaper.
iv IC d
 Disabled and elderly people can access any shop without to
Pr e me

leave home.
 Shopping and banking can be done at any time 24/7
T
id am

 Shopping from the supermarket probably took up a lot of time


t
than online.
11
 No face-to-face discussion with staff.
br h

 Internet banking saves time.


m Mo

 The shops and banks save money , not having as many staff
g
09 at

working for them


Ca r.

Disadvantages of online shopping and banking


M

 There is the possibility of isolation and lack of socialization


because people stay at home.
 Health risks associated with online shopping or banking (lack of
exercise).
 Security issues.
 It is necessary to have a computer and to pay for the internet
 Unlike high street shopping, it is only possible to see a picture
of the goods, which might not portray the exact color of a
dress.

Page 94 of 168
 High street shops and banks are closing because of the increase
in online shopping or banking and this is leading to ‘ghost
towns’ forming
 It is easier to make errors with online banking and transfer
money incorrectly to different accounts

42 or ia ni a
t
98 u pe gh
lis
Effects on companies due to the spread of online shopping and banking:
 Companies can save cost by hiring fewer staff and no need to

12 e T S ir
have many shops or banks in high street.
M

c
 Because the internet is global the potential customers is
increased.
iv IC d
 Some will increase to retrain the staff and the need to employ
Pr e me

more staff in dispatch department


 More cost will be added to setting up and maintaining of
T
id am

t
websites to enable online shopping and banking.
 Because there is no interaction between customer and
11
br h

employee this can lead to drop loyalty of customers and cause


m Mo

loss of customers.
 Robberies are less because decreases of number of high street
g
09 at

banks.
 Bank also need to employ fewer security staff which is
Ca r.

reducing cost.
M

3- Telephone Banking:
• Similar to internet banking but the difference is using telephone
rather than computer
• The sequence of using Telephone banking is :
• The customer keys in their account number
• They are requested to enter four-digits PIN or selected
numbers from their PIN
• The customer will hear list of options which might be
include:

Page 95 of 168
1. Press (1) for your balance
2. Press (2) to carry out a money transfer
3. Press (3) to pay a bill
4. Press (4) to talk for one of our representatives
• The customer will choose an option

42 or ia ni
• As the same Online Banking the customers are able to:
1. Check balance

a
t
2. Pay bill or transfer money to another account

98 u pe gh
lis
3. Talk to a bank representatives

12 e T S ir
4- Chip and PIN
M

c
Many credit cards equipped with Chip
& Magnetic strip which have key
iv IC d
information like PIN
Pr e me

• What is happening when the


T
id am

t
customer go to restaurant to pay
bill for meal using a chip and PIN
11
card
br h

1. The PIN is entered using a keyboard


m Mo

2. The card is checked if it is valid


g
09 at

3. The PIN is read from the chip on the card and


Ca r.

compared to the one entered in


4. If the same, the transaction can proceed
M

5. If three times PIN attempt to enter, the transaction


terminated.
6. The restaurant’s bank contact to the customer’s
bank
7. The check is made on whether they have enough
funds
8. If everything checks out (OK) then the transaction is
authorized
9. An authorization code sent to the restaurant
10. The price of the meal deducted from the customer
account

Page 96 of 168
11. The same amount is added to the restaurant bank
account
12. A receipt is produced as proof of purchase

42 or ia ni
5- Clearing of cheques :

a
t
Processing bank cheques uses batch processing

98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Electronic Fund Transfer (EFT)

Electronic Fund Transfer (EFT) allow money to be transferred


electronically from one account to another, an example of EFT is when
an employer pays their employees their salaries

• No actual money is transferred; the whole system relies on


electronic transfer of money between accounts. When an
EFT instruction is received, the computer system
Page 97 of 168
automatically transfers the specified amount from one
account to another

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M
 Expert systems:

c
Expert system is a computer software that attempts to act like a
iv IC d
human expert on a particular field.
Pr e me

Examples of using Expert System:


T
id am

 Diagnosing a person’s illness


t
 Diagnostics, finding faults in a car engine.
11
 Helping to discover locations to drill for water / oil
br h

 Strategy games (chess)


m Mo

 Identification of items such as plants / animals/ rocks


g
09 at

 Road scheduling for delivery vehicles.


 Providing financial advice
Ca r.
M

Elements of expert system


An expert system is made up of three parts:

1. User interface - allow a non-expert user to query (question)


the expert system, and to receive advice.
2. Knowledge base - collection of facts and rules. The
knowledge base is created from information provided
by human experts

Page 98 of 168
3. Inference engine - This acts rather like a search engine,
examining the knowledge base for information
that matches the user's query

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
Using an expert system:
id am

t
• The non-expert user queries the expert system. By asking a

11
question, or by answering questions asked by the expert system.
br h

• The inference engine uses the query to search the knowledge


m Mo

base and then provides an answer or some advice to the user.


g
09 at
Ca r.
M

Page 99 of 168
How to setup an expert system?
 Data is gathered/collected from experts to create knowledge
base
 The rules base is designed/create a based on the information
from the knowledge base.

42 or ia ni
 A user interface screen is designed / created which would
provide the user with the ability to interact with the system

a
t
 An explanation system is also developed

98 u pe gh
lis
 The inference engine is designed / created as link between the

12 e T S ir
user interface and the knowledge base
 The system is tested.
M

c
 Experts are interviewed about how the expert system effective
iv IC d
Pr e me

 Computers in medicine:
T
id am

t
1- Patient and pharmacy records:

11 • By keeping data of patient records in a database, correct


br h

digenesis can be given according to patient's medical


m Mo

history.
g
09 at

• Database allow to easy and quick search for patient records


• The data can be , patient ID , name , address, date of birth,
Ca r.

gender, medical history, blood group


M

2- Monitoring patients:
• By connecting patient to computer system, to carry out
24/7 monitoring the computer can monitor:
 Heart rate
 Respiration
 Brain activity
 Blood/body temperature
 Blood pressure
 Blood sugar levels
 Oxygen levels in the blood

Page 100 of 168


3- Using expert system to diagnose patients:
 One of the common use to diagnose illness in patients.
Already discussed before
4- Using 3-D printers in medicine:
 Surgical and diagnostic aids: the patient is scanned using:

42 or ia ni
• CT (computed tomography ) - which involves
producing images of the internal parts of the body

a
t
• MRI (magnetic resonance imaging) - this uses strong

98 u pe gh
lis
magnetic fields and radio waves to produce a series
of images of the internal organs in the body

12 e T S ir
M

c
 Prosthetics:
• 3D printer can print
iv IC d
prosthetics (false arms,
Pr e me

hands, and legs)


T
id am

t
11 o Tissue engineering:
br h

• Produce multilayered skin tissue, bone tissue,


m Mo

heart/artery grafts and tracheal splints


g
09 at

o Design of medical tools and equipment


Ca r.

• 3-D printers used as part of the


M

product development cycle for


medical tools
• 3D printer allow several
prototype to be made within
short time

Advantages of using 3D printer to design medical tools:


• Development time is faster
• Development cost is reduced

Disadvantages of using 3D printer to design medical tools:

Page 101 of 168


• Technology still in early stage
• Limited selection of material available

 Computers in libraries:

42 or ia ni
• Computers are used in libraries to keep

a
track on which books have been

t
98 u pe gh
borrowed by which members.

lis
Database is used to store details of

12 e T S ir
book and members and usually
M
barcodes on the book

c
• Two files will exist which is ( Book file
iv IC d
and Borrowers' file)
• When borrowers take the book the
Pr e me

barcode first scanned then the book


T
details are found on the book file
id am

t
• The system will calculate “due back” date

11
• The borrowers library card contains a unique barcode and will be
br h

also scanned
m Mo

• Book file linked with borrowers file and two files updated
g
09 at

• The date of due back is saved in the borrower’s file


Ca r.
M

• On daily bases the borrower's file is reviewed by the computer to


check due back date and what happened if the borrower’s
overdue the date ,the sequence will be :
 The computer reads a record from the book file
 The corresponding record read from the borrower's
file
Page 102 of 168
 It compares due back date with current date
 The borrower's details found and E-mail or letter
send automatically to send
 The next record again read until to finish all records
 barcode not only the system but it can be magnetic

42 or ia ni
strip card
 Some libraries also is using RFID

a
t
98 u pe gh
lis
 Computers in the retail industry:

12 e T S ir
M

c
1- Automatic stock control system using barcodes:
• Barcodes allow quick
iv IC d
Pr e me

identification of product details


once the barcode has been
T
scanned by a barcode reader
id am

t
• Point of sale is the place a

11 transaction take place and the


br h

customer can pay by cash or can


m Mo

use debit/credit card


g
09 at

• Stock control system can


automatically update stock
Ca r.

records when item is purchased


M

at the POS
EPOS
Electronic Point Of Sale
2- Electronic fund transfer and Chip and Pin cards:
Already described

3- Internet shopping:
Already described

How barcodes are used to automatically control stock levels in a supermarket.


 Barcode is scanned at the POS/barcode number entered manually

Page 103 of 168


 Barcode is searched for in the stock file until the record is found
 Details of the product are read
 Stock level of the item reduced by 1
 New stock level written back to the file
 Item is flagged to state order in place

42 or ia ni
 If less than the re-order level then the item is automatically re-
ordered

a
t
98 u pe gh
lis
Barcode used in the following applications:
 Library book system

12 e T S ir
 Administration systems
M

c
 Passport / ID cards
 Some burglar alarm systems
iv IC d
 Equipment checking systems
Pr e me

 Automatic stock control systems


T
id am

t
 Recognition systems:
11
 Recognition systems are used directly to enter data into computer
br h

system.
m Mo

 Recognition systems tend to be more accurate and quicker


g
09 at

method of entering data into a computer system compared to


manual system.
Ca r.
M

• MICR: magnetic ink character recognition the number on


the bottom of the check is scanned by MICR reader
• OMR: optical mark reader:
o Pencil or pen mark scanned by OMR
• OCR: scanned text is converted into format which can be
edited
• RFID : radio frequency identification
o Use radio waves to capture and store information on
a tag
• Sensor plats: Sensors used to detect car and signal will be
send to the microprocessor to take the image for the
number plate
Page 104 of 168
• Multiple-choice question (MCQ) papers
o Multiple-choice form is using OMR and compare the
position filled by pen with the original answer

42 or ia ni
 Automatic Number Plate Recognition (ANPR) System:
• Automatic number plate recognition (ANPR) systems are

a
t
98 u pe gh
used to read the number plates on cars, car parking is an

lis
example of ANPR as the following steps:

12 e T S ir
o STEP (1)
M  Sensor detect vehicle and send signal to

c
microprocessor to instruct the camera to
iv IC d
capture image of the vehicle
Pr e me

o STEP (2)
 An algorithm used to isolate number plate
T
 The bright and contract of the number plate is
id am

t
adjusted to be clearly read
11  Each character is on the number plate is
br h
m Mo

segmented
 Each character recognized by OCR software
g
09 at

then character converted into a string of


Ca r.

editable text by the software


 This text string stored in the database
M

Number plate is segmented


Page 105 of 168
o STEP (3)
 Once step (1) and (2) happened the car park
barrier is raised

42 or ia ni
 The ticket is issued to the vehicle driver ,

a
shows date and time entering the car park

t
98 u pe gh
lis
o STEP (4)

12 e T S ir
 When the vehicle driver returns to the car park
M they insert the ticket into a machine which

c
calculate charges
iv IC d
 The payment registered on the database
Pr e me

 The driver then drives to exit the barrier and


the ANPR again reads the number plate
T
id am

t  If the number plate is recognized and payment


is done the barrier is raised
11
br h
m Mo
g
09 at
Ca r.
M

Page 106 of 168


 Monitoring and tracking systems:
1- Monitoring /tracking a member of the public:
Why the person may need to be tracked?
1. Potential Criminal/Terrorists

42 or ia ni
2. Tracking released prisoners to

a
ensure they stay within an agreed

t
98 u pe gh
location ( Ankle mentoring)

lis
3. Monitoring customers buying patterns

12 e T S ir
M
2- Cookies:

c
When a user visit a website cookie is created to store the user
iv IC d
browsing, described in chapter 8
Pr e me

3- key logging:
T
id am

t
Software to monitor which keys has been pressed, hackers can
use this to obtain Password
11
br h
m Mo

4- Employee call monitors


g

Employee call monitors allow


09 at

managers listen to calls of


Ca r.

employees for some reasons:


M

1. To improve employees
performance ( call center)
2. Can be used as training tool
3. Manager/ supervisor can join to call where necessary
4. Allow to the companies aware about security to listen to
calls (Police)
The three types of call monitoring :
1. monitor : manger listen to employees
2. whisper: as a training tool
3. barge: manger join to call between employee and others
 Satellite systems:
Page 107 of 168
Global positioning satellite (GPS) systems and satellite navigation

1- Global positioning satellite (GPS) can determine specific location


using satellite navigation systems:
 Cars, Ships, Plans can use GPS when navigating specific

42 or ia ni
location

a
 Walkers to locate position on

t
98 u pe gh
hills / mountains

lis
 Used by runners to calculate

12 e T S ir
distance
M

c
• Four satellites must be visible to the driver
iv IC d
• Calculates the distance from the receiver to the satellite
Pr e me

• Calculates the position of the receiver


T
id am

t
Advantages:

11  Drivers doesn’t have to use maps.


br h

 GPS can re-rout to find quickest routes


m Mo

 The system can warn the driver about the location of


g
09 at

speed cameras
 The system can estimate the time of arrival.
Ca r.

 The system can also give useful


M

information such as location of petrol


stations

Disadvantages:
 Loss of satellite signals can cause problems
 Maps should be kept up to date, they can give incorrect
instructions if not up-to-date
 If an incorrect start point or end point is keyed in the
system will give incorrect information

Page 108 of 168


2- Geographic information system (GIS):
Geographic information system (GIS) is a computer system that allows
us to map, model, and query and analyze
large amounts of data according to their
location

42 or ia ni a
t
98 u pe gh
GIS uses:

lis
 Road network

12 e T S ir
 Teachers can use GIS in
M
geography, science lessons

c
 Biologist use GIS to protect
iv IC d
animals life and plants
Pr e me
T
id am

t
3- Media communication systems:
11
br h

Communication media is the methods of delivering


m Mo

and receiving information using telecommunication


g

 There are many media to send and receive


09 at

information (Fiber Optics, Copper Cables, Wi-


Ca r.

Fi, Satellite )
M

 Satellitia can send signal from part to another


any wherein long distance on the earth
 Once the data received from the earth by the
satellite, send back to earth and collected by
dish
 Satellites systems are used to transmit
television, telephone and internet data
around the world

7- System life cycle

Page 109 of 168


The main stages of system life cycle to develop a new computer
system:

Analysis

42 or ia ni a
Collecting information about the current system and identify the problems

t
98 u pe gh
lis
Design
12 e T S ir
M
Designing a new system to correct the problems identified in the analysis stage

c
iv IC d
Development and Testing
Pr e me

Developing and testing new system


T
id am

t
11 Implementation
br h
m Mo

Replacing old system with the new system


g
09 at

Documentation
Ca r.
M

Writing technical and user documentation for the new system

Evaluation
Evaluate if the new system meets the requirements and client expectation

1- Analysis :
The basic step of analysis:

Page 110 of 168


 Research to collect data from the current
system

 Describe the current system (establishing input


and outputs and processing

42 or ia ni a
t
 Identify the problems with the current system

98 u pe gh
lis
12 e T S ir
M  Agree the objective with the clients

c
iv IC d
 Identify and agree customer requirements
Pr e me
T
id am

t  Interpret customer requirements


11
br h
m Mo

 Produce a cost- benefits analysis


g
09 at

 Identify suitable hardware and software


Ca r.
M

 Produce a data flow diagram

The first step in analysis stage is researching an existing system and there
are four common methods for fact finding:

Page 111 of 168


1- Observation
 Watching personnel using the existing system to find out how it
works
Advantages Disadvantages

42 or ia ni
• The analyst obtains reliable data • People uncomfortable being
• Possible to get an overall view watching, may can make in

a
t
of the system differed way

98 u pe gh
lis
• Inexpensive method • Workers may do some mistakes,

12 e T S ir
while watching may they will not
do it
M

c
iv IC d
2-Questionnaires
Pr e me

 By distributing questionnaires to the workforce, clients or users to


write their view for the existing system
T
id am

t
Advantages Disadvantages
11
• The questions can be answered • The number of returned
br h
m Mo

quit quickly questionnaires often low


• Inexpensive method • The questions not flexible
g
09 at

• Individuals can be anonymous if • Not immediate way


Ca r.

they want
• This method allow quick
M

analysis of data

Page 112 of 168


3- Interviews
 This method involves one to one question and answer between
analyst and employee or /customer and good if the analyst want

42 or ia ni
to go deeply into specific aspects of the existing system

a
t
Advantages Disadvantages

98 u pe gh
lis
• Its open opportunity to • Time consuming
motivate interviewee to give • Expensive method ( by using

12 e T S ir
open and honest answer to the analyst time )
M • Interview can’t remain anonymous

c
analyst
• Open for more feed back
iv IC d
• Possible to modify question as
Pr e me

interview
T
id am

t
4. Looking at existing paperwork :

11
 This method allow the analyst to see how the paper files are kept
br h

and look at operating instructions and training manuals and get


m Mo

some idea about scale of the problems of existing system


g
09 at

Advantages Disadvantages
Ca r.

• Allow the analyst to collect • It can be time consuming process


M

information which can’t be • Costly method because the


collected by another method amount of time needed
• The analyst can see how the
paper system operate

Page 113 of 168


Data Flow Diagram (DFD):
 DFD help the analyst by showing the data flows input and output
requirements, processing and type of data storage needed.

42 or ia ni a
Example of reserving seat on a flight:

t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.

DFD used to describe:


M

 The need to identify inputs, outputs, processing of the current


system.
 The need to identify problems with the current system
 The need to identify the user and information requirements for the
new system
 System specification :
 Identify and justify suitable hardware for the new system
 Identify and justify new software for the new system.

Page 114 of 168


2- Design:
Next stage is to design a new system based on the information from
analysis system.

42 or ia ni a
The basic step of design:

t
98 u pe gh
lis
 Design the data capture form / input forms

12 e T S ir
M

c
 Design the screen layout
iv IC d
Pr e me

 Design outputs in the form of screen displays


T
id am

t and the printed report

11
br h

 Produce system flowcharts


m Mo
g
09 at

 Design validation rules that need to be used


Ca r.
M

 Design / agree on file structures

 Produce any algorithms or program flowchart


 Design a testing strategy / plan

Page 115 of 168


• Data capture forms:
This form allow to enter the data into the system either paper-passed
or electronic passed form must include:

42 or ia ni
1. Clear heading and instruction

a
t
98 u pe gh
2. Use of text boxes to collect

lis
information such as name, date of

12 e T S ir
birth, gender..
M
3. Use of tick box to make choice

c
easier
iv IC d
4. Clear fonts and text styles
Pr e me

5. Make sure there is sufficient space to input data or answer the


question
T
id am

t
11
Example of data about can manually completed for input later into the
br h

computer system:
m Mo
g
09 at
Ca r.
M

On screen forms should have:


 Appropriate spacing for each field
 Screen filled/not too much white space
 Clearly defined input area for each field

Page 116 of 168


 An easy to read font/font size
 A sensible font color and background color
 Drop down list and tick boxes
 No overlapping items
 Navigation buttons

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
Form title
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at

Drop down list: to


choose option
Ca r.
M

Tick box /
Save/ Close / Radio button
Navigation button

Before entry form created, the database should be created and the
following details should be considered:

Page 117 of 168


• Type of data which will be captured
• Different tables and its relationships
• Different fields including keys
• Data types for each field :

42 or ia ni
1. Text

a
2. Integer (numeric)

t
98 u pe gh
3. Boolean

lis
4. Data & Time

12 e T S ir
5. Object
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 118 of 168


Screen display and printed reports:
The output from should be designed:
1. Make sure all the output fields is correct
2. Instructions or description are clear
3. Avoid large area without nothing

42 or ia ni
4. Font color and size are clear

a
5. Output report should include report type ( header ,

t
98 u pe gh
lis
footer , fitting page correctly)

12 e T S ir
As Example of printed report :
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo

System flow chart:


g
09 at

 Flow chart used to show data flow through a system and how
Ca r.

decision are made by using special symbols to represent input /


M

output/ processing/ decision and data storage.


 System analysts use this chart to show overall the proposed
system.

Page 119 of 168


Verification:
Verification is a way of preventing errors when data is copied from

42 or ia ni
one medium to another, there are two ways for verification check:

a
• Double entry : data is entered twice, using two people,

t
98 u pe gh
lis
and is then compared
• Visual check : checking for errors by the person who is

12 e T S ir
entering the data; compare the entered data with the
M

c
original document
iv IC d
Pr e me

Validation:
T
id am

t
Is a process where data is checked to see if it satisfies certain criteria

11
when input into a computer
br h
m Mo

Validation technique:
g
09 at

 Range check :
Ca r.

• Check weather data within given acceptable value


M

• Example : check person age >0 and <150

 Look-up check :
• Check the data entered exists and stored in a table of data
• Example : check “ Training manager “ exists in the option”

 Length check :
• Check the input data contains the required number of
character

Page 120 of 168


• Example : If a field needs six digits inputting five or seven
digit number , should cause a problem

 Character type check :


• Check input data doesn’t contain invalid characters

42 or ia ni
Example: Person /employee name shouldn't have any numbers

a
t
98 u pe gh
 Format / picture check :

lis
• Check the data in specific format

12 e T S ir
• Example : date should be in date format dd/mm/yyyy or
M identification number for a person xnnnnn ( single letter

c
followed by five digits)
iv IC d
Pr e me

 Presence check :
• Check the data already present and not missed
T
id am

t • Example : in some forms telephone # required if not entered


the system give error message
11
br h
m Mo

 Consistency check :
g

• Check if the fields correspond with each other


09 at

• Example : If Mr. typed in a field the gender should be Male (M)


Ca r.
M

 Check digit :
• This is an extra digits added to the telephone number
• Example : if two number transposed during entry like ( 13597
instead of 13579
• Example : if number enter twice 13559 instead of 13579
• Example :if one number missing 1359 instead of 13579

File Structures:
 Analyst should take the following into account :
• Field length

Page 121 of 168


• Field name ( suitable names )
• Data type
 A data dictionary is used to show suitable field names

Design and testing strategy plan:

42 or ia ni
When producing a software for the new system it is very important to test

a
t
98 u pe gh
it thoroughly in order to:

lis
12 e T S ir
 Make sure that meets the clients requirements
 Remove any bugs or error from the system
M

c
 Make sure that produces the required output
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at

Example of data dictionary


Ca r.
M

Page 122 of 168


3- Developing and testing:
Developing:
Once design stage is completed, the system should be created and fully

42 or ia ni
tested:

a
t
 Create the file structure ( Field names, data type)

98 u pe gh
lis
 Validation rules

12 e T S ir
 User interface, check if the user interface is friendly
M

c
iv IC d
Pr e me

File structure
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

User interface

Page 123 of 168


42 or ia ni
Validation rules

a
t
98 u pe gh
lis
Testing strategies:

12 e T S ir
 Software is often developed in modular form. This method allows
M

c
the software to be broken down into smaller parts called module
this means each part developed separately.
iv IC d
 Once the development of each module is completed, the whole
Pr e me

system needs to be tested


 Testing take place to ensure all components of system are working
T
id am

t
correctly before the system is implemented.

11

br h

Four category of testing :


m Mo
g
09 at

 Normal

Ca r.

Abnormal
M

 Extreme
 Live

Page 124 of 168


42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

Normal: t
 Data that is acceptable /reasonable and has an expected outcome;
11
br h

for example, the Month in the range 1 to 12


m Mo
g

Extreme:
09 at

 Data at the limits of acceptability, for example, the extreme values


Ca r.

of month can be either 1 or 12


M

Abnormal:
 Data outside the limits of acceptability, or the wrong type of data,
and should be rejected or cause an error message; values are not
allowed as example inputs for the month: -15 or -1 or any value
>12 or letters or non-integer 10.34 all abnormal

Live :
 Data is entered into the new system and the results compared
with those produced from the existing system.

Page 125 of 168


4- Implementation stage:
There are four common methods used for changing over from the old system
to the new system:

 Direct

42 or ia ni
Direct changeovers
 Old system stopped overnight

a
t
98 u pe gh
then replaced with the new

lis
Old System New System
system immediately

12 e T S ir
Advantages Disadvantages
M

c
• The benefits are immediate • May will be disaster if
• Cost are reduced because one system is new system failed
iv IC d
running
Pr e me

• Less possibility of a malfunction of the


system once new system tested
T
id am

t
 Parallel Parallel changeovers

11
 Old system and new system
br h

running side by side for a time Old


m Mo

until new system take over System


g
09 at

New
Ca r.

System
Advantages Disadvantages
M

• If the new system fails the old • More expensive than direct,
system still running because extra staff needed
• Possible to train staff gradually • Time consuming since the
data entered into 2 systems

Page 126 of 168


 Pilot Pilot changeovers
 The new system introduced
in one branch or a part of

42 or ia ni
Old System
company before to introduce

a
for whole company

t
98 u pe gh
lis
New System

12 e T S ir
Advantages Disadvantages
M
• If the new system failed only one • It will take time to

c
part is affected implemented across all
iv IC d
• Possible to train staff one area departments
Pr e me

• The cost will be less than parallel


T
id am

t
11
 Phased
br h

Phased changeovers
 Only one part from the system
m Mo

introduce when its proved to


g
09 at

Old System
work satisfactory, then introduce
next part until to fully replaced
Ca r.

whole system
M

New System

Advantages Disadvantages
• If a part fails, can go to failure • More expensive than direct
point ( failure is not disaster ) because each phase will
• Possible to ensure the system evaluate separately
working properly before • Time consuming because each
expanding part will be evaluated

4- Documentation :
Page 127 of 168
When the system is fully developed amount of documentation needed. To
introduce for (the end user – people who may need to develop the system in
the future, there are two types of documentation:
User Documentation and Technical Documentation

42 or ia ni a
1- User documentation

t
98 u pe gh
lis
To help the user to learn how to use the new system

12 e T S ir
 How to load/install/run the software
 M
How to save files / search/sort data

c
 How to do print outs
iv IC d
 How to add, delete or amend records
Pr e me

 The purpose of the system/ program/ software package


 Limitations of the system
T
id am

 tScreen layouts / Print layouts


 Hardware requirements

11
 Software requirements
br h

 Sample runs (with results and actual test data used)


m Mo

 Error handling/meaning of errors


g
09 at

 Troubleshooting guide/help lines/FAQs


 How to log in/log out
Ca r.

 Tutorials
M

 Error messages/meaning of error messages


 Glossary of terms.

2- Technical documentation:
To help the programmers / analysts to repair and maintains the system and
can consist of any of :

 Program listing/coding
 Programming language used
 Program flowcharts/algorithms

Page 128 of 168


 Systems flowcharts
 Purpose of the system/program/software
 Limitations of the system
 Input formats
 Hardware requirements

42 or ia ni
 Software requirements
 Minimum memory requirements

a
t
 known ‘bugs’ in the system

98 u pe gh
lis
 List of variables used (and their meaning/description)
 File structures

12 e T S ir
 Sample runs (with results and actual test data used)
M

c
 Output formats
 Validation rules
iv IC d
 Meaning of error messages
Pr e me

5- Evaluation:
T
id am

t
The final stage of the system life cycle is to evaluate the system which has been
11
br h

implemented, the main purpose is to see if the new system resolved the issues
m Mo

of the previous system and met the requirements in the design stage and the
g
09 at

following list is some of the main evaluation points considered when evaluating
the new system:
Ca r.

 Compare the final solution with the original task requirements


M

 Identify any limitations of the system


 Identify any necessary improvements needs
 Evaluate the user’s responses
 Compare results from new system with old system
 Compare performance of new system with old system
 Interview users to gather responses about new system
 Give out questionnaires to gather responses about the ease of use of the
new system.

The results from the evolution may due to two things happening:

Page 129 of 168


Update of hardware because:
• Feedback from end user
• New hardware comes in the market
• Changes within the company require new devices to be added of
updated

42 or ia ni

a
Update of software because:

t
98 u pe gh
lis
• Feedback from end user

12 e T S ir
• Changes to the company structure that may need modification
• Changes in legislation that may require modifications to the
M

c
software
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 130 of 168


8- Safety and security

Physical Security:

42 or ia ni
Health aspects:

a
Health and safety regulations advise that all computer systems have at least

t
98 u pe gh
moveable table and anti-glare screens, adjustable chairs and foot supports,

lis
suitable lighting and uncluttered work stations, and recommend frequent

12 e T S ir
breaks and frequent eye tests.
M

c
Health risk list:
iv IC d
Pr e me

Ways to eliminating or
Health risk
T
minimizing risk
id am

t • Use fully adjustable chairs to give the


(1) Back and neck
11 correct position
br h

problem/strain
• Use foot rests to reduce position
m Mo

Cause by sitting in front of a


problem
g

computer screen for long


09 at

• Use screens that can be tilted to


period in the same position.
ensure your neck is at the correct
Ca r.

angle
M

(2) Repetitive strain • Ensure correct position is maintained


• Make proper use of a wrist rest when
injury / RSI :
using a mouse or a keyboard
Damage fingers or rest by
• Take regular break and do some
using continuous keyboard or
exercise
mouse click buttons
• Use ergonomic keyboard
• Use voice- activated software

Page 131 of 168


Health risk Ways to eliminating or minimizing
risk
(3) Eyestrain : • Ensure there is no screen flicker which can
Caused by looking at the lead to eye problems
• Change screen to LCD which flicker are

42 or ia ni
screen for long time or
having incorrect lighting less

a
• Take a regular break

t
98 u pe gh
• Use screen anti-glare if the lighting in the

lis
room is not correct or use window blinds

12 e T S ir
to reduce sunlight reflecting from the
M screen.

c
• User should check his eyes on a regular
iv IC d
basis
Pr e me

(4) Headaches : • Use anti-glare screen or window blinds to


Caused by incorrect cut out reflections
T
• Take a regular break
id am

t
lighting, screen
• User should check his eyes on a regular
reflections, flickering
11 basis
br h

screen.
m Mo

• Proper ventilation should exist to remove


g

5) Ozon irritation :
09 at

Caused by laser printer the ozone gas as quickly.


• Laser printers should be housed in a
Ca r.

in the office area


designated printer room
M

• Change to the other type of printer if


necessary

Page 132 of 168


Safety aspects:
Safety concerned with dangers that could lead to series injury or loss of life

Safety risks:

42 or ia ni
Health risk Ways to eliminating or minimizing

a
risk

t
98 u pe gh
lis
(1) Electrocution • Use residual current breaker RCB
• Check insulation on wires regularly

12 e T S ir
• Don’t allow drinks near to computers
M •

c
Check equipment on regular basis
iv IC d
(2) Trilling wires • Use cable ducts to keep the wires save
Pr e me

• Cover wires under table


• Use wireless connection wherever
T
id am

t possible

11
br h

(3) Heavy equipment • Use strong desks and tables to support


m Mo

hardware
falling and causing injury
g

• Use large desk and tables so that


09 at

hardware isn't too close to the edge,


Ca r.

where it can fall off


M

(4) Fire Risk • Have Co2/dry fire extinguishers


• Don’t cover equipment
• Make sure electrics used in hardware is
fully maintained
• Ensure good ventilation in the room
• Don’t overload socket with many items
• Change to low voltage hardware if
possible
Strategy to minimize safety risks to check in a regular basis:

Page 133 of 168


 Check the state of the wires and cables and plugs and make sure the
plug is not broken or damaged.
 Make sure any drinks are well away from the computer
 Fix wires along wall or behind the desks wherever possible
 Don’t cover the computer with paper, plastic, tissue paper, towels or

42 or ia ni
any fabric, which can block ventilation holes

a
 Don’t plug too many devices into an electric outlet socket -

t
98 u pe gh
overloading can cause a fire

lis
 Make sure you exercise every hour to prevent health risk

12 e T S ir
M

c
E- Safety:
Refers to safety while using internet and devices (keep your data in safe
iv IC d
while using:
Pr e me

 Mobile phone
 Computer or tablet
T
id am

t
 Games console

11
 Wireless technology.
br h
m Mo

• Personal data like ( name , Birth


g
09 at

date , address , medical history,


banking details
Ca r.

• Some personnel data referred to as (Sensitive personnel data )


M

includes ethnic origin, political views, religion, sexual orientation,


criminal activity

Some idea of E-safety issues:


 Don’t give out any personal information to people who are
unknown to you.
 Don’t send people photos of yourself - either online or via a
mobile phone unless the person known to you.
 Always maintain your privacy settings

Page 134 of 168


 When accessing the internet make
sure the websites being visited can
be trusted
 Only use recommended websites by
teachers

42 or ia ni
 Only open emails from known

a
sources.

t
98 u pe gh
 Only send email people you know

lis
 Using social networking sites, instant messaging or chat room

12 e T S ir
M

c
You must be conscious when you are using social media networking
iv IC d
sites or chat room:
Pr e me

 Block or report anybody who acts suspiciously or who uses


inappropriate language
T
id am

t
 Be very careful with the language used in chat rooms
 Always use a nickname and never use your real name
11
br h

 Keep private and personal data secret


m Mo

 Don’t enter private chat rooms, stay public


g
09 at

 Never arrange to meet anyone for the first time on your own
 Always tell an adult first and meet the person in a public place
Ca r.

 Avoid the misuse of images


M

 Always use appropriate language


 Always respect people’s

Some risks from playing online games:


 Violence in the game, can lead to
violent behavior in reality
 Predators (animal that eats other
animals)
 Cyber-bullying
 Use of webcams
 Voice-masking technology to change voice or age or accent.
Page 135 of 168
 Online games is a source of cyber-attack like (viruses –
phishing – spyware )

Security of data:

42 or ia ni
There are a number of security risks associated with any electronic device

a
as the following list:

t
98 u pe gh
lis
 Hacking

12 e T S ir
 Phishing
 M
Smishing

c
 Vishing

iv IC d
Pharming
Pr e me

 Spyware
 Viruses
T

id am

tSpam
 Moderated and unmoderated forums

11 Cookies
br h
m Mo
g
09 at
Ca r.
M

Page 136 of 168


(1) Hacking:
What is hacking? : Unauthorized access to the computer system
without permission
Effects of hacking :

42 or ia ni
 Hacker can delete,

a
corrupt, edit, files or

t
98 u pe gh
change data or personnel

lis
information

12 e T S ir
 Hacker can steel user identity
M
 Hacker can stop production

c
iv IC d
Method to avoid or remove:
Pr e me

 Using firewall
 Using strong password
T
id am

t
 Using protection software
 Use user ID and password
11
br h

 Use encryption
m Mo
g
09 at

(2) Phishing:
Ca r.

What is phishing ? : a method of trying to gather personal


M

information using deceptive e-mails and websites by sending request


from bank or a note from someone in their company.
Effects of phishing:
 The sender can gain personnel data such as credit card
number, this can lead to fraud or theft.
Method to avoid or remove:
 Many ISP or web browsers filter phishing e-mail.
 User always be cautious when opening email or attachment.
 Don’t click on executable files attachment end with exe,
com, php, bat as example.
Phishing example:
Page 137 of 168
M
Ca r.

Page 138 of 168


m Mo
br h
id am
g
Pr e me

(3) Smishing ( SMS phishing ):


iv IC d
09 at T M
12 e T S ir
98 u pe gh
t c
42 or ia ni a
11 lis
t
What is Smishing? : Uses SMS system of mobile phones to send out
Fake text message which often including URL or telephone number
The user will be asked to log into the website or make telephone call
and supply personnel information like credit card number and
password (example : you won a prize or contact with your)

42 or ia ni a
Effects of Smishing :

t
98 u pe gh
 The effects are similar to Phishing and

lis
Pharming where personnel details will

12 e T S ir
be obtained from users
M

c
Strategies to avoid smishing :
iv IC d
 Double check the SMS message ,
Pr e me

check for spelling mistakes


 Check the link of the website
T
id am

 Contact your bank directly if you are requested to change


t
some details
11
br h
m Mo

4- Vishing:
g
09 at

What is Smishing? Short for voice mail phishing , uses voice mail
message to trick the user into calling the telephone number contained
Ca r.

in the message, The user will be asked to provide personnel data


M

5- Pharming:
What is pharming? Malicious code installed in the user computer to
direct the user to fake website

Page 139 of 168


Effects of pharming :
 The creator of malicious code can gain personnel data like bank
account information, this can lead to fraud or theft.

Strategies to avoid pharming :

42 or ia ni
 Some anti-spy software can identify and remove Pharming

a
code

t
98 u pe gh
 Always double check the URL to see if is the same one you

lis
typed in

12 e T S ir
M
(6) Spyware and key-logging software

c
iv IC d
What is Spyware? : software to collect data by monitoring key presses
Pr e me

on the user’s keyboard, the data send back to the user who sent the
software.
T
id am

t
Effects of spyware:
 Spyware gives the originator access to all data entered using a
11
br h

keyboard on the user's computer.


m Mo

 The software is able to install other spyware, read cookie data


g
09 at

and also change a user's default browser


Ca r.

Strategies to avoid spyware:


M

 Use anti-spy software


 The user should always alert and check any activity on the
keyboard monitored.
 Enter password by using drop-down menu to reduce risk

(7) Viruses:
What is the computer virus? : Program code or software which can
replicate or copy itself to do something like deleting or corrupt the
files or operating system
Effects of virus :

Page 140 of 168


 Viruses can crash the computer , stop
functioning or run slowly
 Viruses can delete files or data
 Viruses can corrupt the operating
system files

42 or ia ni a
Strategies to avoid viruses:

t
98 u pe gh
 Install Ani-virus software and update regularly

lis
 Don’t use any software from unknown source

12 e T S ir
 Don’t open attached file by e-mail from unknown sender
M
 Always backing up the files

c
iv IC d
(8) Spam:
Pr e me

What is Spam? Often referred as junk mail, it will send to recipients


T
from mailing list
id am

t
Effect of spam e-mail :
11
br h

 It can lead to Denial of services attack (DoS attack, by flooding


m Mo

network with useless traffic which slow the network down.


g
09 at

Strategies to avoid Spam:


Ca r.

 Set the protection filter level to high when you use junk mail
M

filter to have maximum protection


 Make sure the junk mail filter is kept up to date
 Block images in HTML messages
 Look out for check boxes that are already selected when items
are bought online
 Do not sign up to commercial mailing lists
 Do not reply to an email or unsubscribe from a mailing list that
you did not explicitly sign up

Page 141 of 168


(9) Moderated and unmoderated forums:

Moderated forums:
 Refers to online discussion forum in which all the posts are
checked by an administrator before posting

42 or ia ni
 Moderator can prevent spam, filter out any posts are

a
inappropriate, rude or offensive

t
98 u pe gh
lis
Unmoderated forums:

12 e T S ir
 No one owns the internet
M
 Not policed

c
iv IC d
(10) Cookies:
Pr e me

What is Cookies? Small files or code that are


T
stored on a user’s computer. Sent by web
id am

t
server to user’s computer:

11
br h

 The data can be retrieved and


m Mo

used to customize the web page


g
09 at

for each individual


 Like if you buy a book online
Ca r.

cookies remember the type of the book


M

 The data gathered by cookies from anonymous user


profile and does not contain personnel data like password
or bank card details

Additional security of data online:


1. Firewalls
2. Security protocols
3. Encryption
4. Authentication

Page 142 of 168


(1) Firewalls:
 Can be Hardware or Software
 Its sites between the user’s computer and external network

Tasks which can be carried out by firewalls:

42 or ia ni
1. To examine the traffic between a user’s computer

a
t
98 u pe gh
2. Checks whether incoming or outgoing data meets a given set of

lis
criteria

12 e T S ir
3. If the data fails the criteria, firewall will block the traffic and give
M
the user a warning about security issue.

c
4. The firewall can be used to log all incoming and outgoing traffic
iv IC d
to allow later interrogation by the user.
Pr e me

5. Criteria can be set so that the firewall prevents access to certain


undesirable sites
T
id am

6. it is possible for firewalls to help prevent viruses or hackers


t
entering the network
11
br h

7. The user is warned if some software on their system is trying to


m Mo

access an external data source


g
09 at

(2) Security protocols


Ca r.

Two forms of security protocols


M

 Secure Sockets Layer (SSL)


 Transport Layer Security (TLS)

1- Secure Sockets Layer (SSL)


 SSL type of protocol that allows data to be sent and received
securely over the internet
2- Transport Layer Security (TLS)
 TLS is a form of protocol that ensures the security and privacy of
data between devices and users over the internet.
 Designed to provide encryption, authentication and data
integrity
Page 143 of 168
TLS is formed of two layers:

 Record Protocol:
This part of the communication can be used with or without
encryption, it contains data

42 or ia ni
being transferred over the

a
internet.

t
98 u pe gh
 Handshake Protocol :

lis
It is a secure session

12 e T S ir
between user and website is established
M

c
Main differences between SSL and TLS:
iv IC d
 It is possible to extend TLS by adding new authentication
Pr e me

methods.
 TLS can make use of session caching, which improves the
T
id am

t overall performance compared to SSL.


 TLS separates the handshaking process from the record
11
br h

protocol (layer), which holds all the data.


m Mo
g
09 at
Ca r.
M

Session cashing:
The use of session caching can avoid the need to utilize so
much computer time for each connection. TLS can either
establish a new session or attempt to resume an existing
session

Page 144 of 168


(3) Encryption:
 Encryption is used to protect data in case it has been hacked or
accessed illegally
 Encryption is the method by which information is converted into
secret code that hides the information's.

42 or ia ni
 The science of encrypting and decrypting information is called

a
cryptography. In computing, unencrypted data is also known as

t
98 u pe gh
lis
plaintext, and encrypted data is called cyphertext.
 The key used to encrypt is called encryption key and the key used

12 e T S ir
to decrypt called decryption key
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Page 145 of 168


(4) Authentication:
 Authentication is used to verify that data comes from a secure
and trusted source, its working with encryption (digital
certificate, passwords, biometrics and their authentication roles).

42 or ia ni a
t
98 u pe gh
Digital certificates:

lis
• A digital certificate is a pair of files stored on a user’s

12 e T S ir
computer , each pair of files divided into:
M

c
 A public key (which is known by anyone)
iv IC d
 A private key (known to the computer user only).
Pr e me

• When sending an email, the


T
id am

t message is made more secure by

11 attaching a digital certificate.


br h

When the message is received,


m Mo

the recipient can verify that it


g
09 at

comes from a known or trusted


source by viewing the public key
Ca r.

information.
M

The digital certificate is made up of six parts:

 The sender’s email address


 The name of the digital certificate owner
 A serial number
 Expiry date ( validity of certificate)
 Public key
 Digital signature of certificate authority (CA)

Page 146 of 168


Passwords
 Strong passwords should contain upper case and lower case
characters, as well as numbers and other keyboard symbols as
example: R_tool$29/!

42 or ia ni
 Passwords should be changed on a regular basis
 If the password not matching with the user ID that access will

a
t
98 u pe gh
be denied.

lis
 Many systems asking to enter password three times as a

12 e T S ir
maximum before user lock out.
 It's important to prevent others people to gain access to your
M

c
password through spyware or viruses.
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Biometrics:
Biometric is a method of authentication, it relies on certain unique
characteristics of human beings and examples include:

1. Fingerprint scans
2. Signature recognition
3. Retina scans
4. Iris recognition
5. Face recognition
6. Voice recognition

Page 147 of 168


Fingerprint scans
Images of fingerprints are compared against
previously scanned fingerprints stored in a

42 or ia ni
database, if they matched then access allowed

a
t
98 u pe gh
lis
Advantages:

12 e T S ir
 Fingerprint for each person is unique and this technique will
M
improve the security since to be difficult to replicate person’s

c
fingerprint.
iv IC d
 Other security devices such as (magnetic card) can be lost or
Pr e me

stolen
 It's impossible to sign in by somebody else since the fingerprint
T
id am

match one person only


t
 Fingerprint can’t be misplaced; a person always has them.

11
br h
m Mo

Disadvantages:
g
09 at

 Expensive to install and set up


 If a person’s fingers are damaged through an injury, this can
Ca r.

have an effect on the scanning accuracy


M

 Some people may regard it as an infringement of civil liberties

Retina scans
 Retina scans use infrared light to scan the
unique pattern of blood vessels in the
retina
 It is very secure because no way to
duplicate blood vessels patterns

Page 148 of 168


Comparison between six common biometric techniques

42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11
br h
m Mo
g
09 at
Ca r.
M

Online credit Fraud:


 Hackers access to the computer through the use of spyware (phishing
or pharming) , the user can be tricked into giving personal and
financial details that enable the hacker to gain full access to a user’s
account.
 By breaking of passwords through a number of techniques if
passwords are weak or no encryption is used.

Page 149 of 168


 Always type in a web address or URL rather than copy and paste it
from an email or other website.
 If you are using wireless network, it is very important to access
through password.
 Public Wi-Fi can be found in popular public places like airports, coffee

42 or ia ni
shops, malls, restaurants, and hotels and it allows you to access the

a
Internet for free, there is always a risk that somebody is monitoring

t
98 u pe gh
internet usage in the area.

lis
12 e T S ir
M
Number of simple precautions users can take:

c
 Always use varied and complex passwords.
iv IC d
 Check the accuracy of bank accounts continually
Pr e me

 Only provide personal information on sites that have ((https)) in the


T
web address
id am

t
 Don’t provide personal information to any unsolicited requests for

11
information
br h

 Don’t open emails or attachments from unknown senders


m Mo

 Delete any messages from your spam folder on a regular basis


g
09 at

 Report any suspicious phishing activity to the company that is used


by the perpetrator
Ca r.

 Only download software from sites that can be trusted.


M

Page 150 of 168


Cloud Security:
Cloud is an online storage medium used to backup files, files can
be accessed from any device with an internet connection.

Advantages from using cloud:

42 or ia ni
 No need to carry memory sticks if you want to access your files

a
t
from home

98 u pe gh
lis
 You don’t have to pay for large storage capacity on your

12 e T S ir
computer/tablet or mobile phone
 Cloud will ensure that your files are backed up and will reduce
M

c
the possibility of losing data
 Ability to synchronize files because automatically updated
iv IC d
across all devices
Pr e me

 Cloud storage is ideal for collaboration purposes, it allows


T
several users to edit and collaborate on a single file or
id am

t
document

11
br h

Issues related to security of data:


m Mo

 Data has been lost in the past during routine backup


g
09 at

 Celebrity data has been hacked


Ca r.

and shared including images


 The security of the building where
M

the server are held and accesses


rights to employees could affect
the security of the data.

Page 151 of 168


9- Audiences
Audience appreciation
When planning or creating ICT solution, you have to consider audience who

42 or ia ni
will use or take part in the system

a
t
98 u pe gh
lis
The list of factors should be considered:
 The age of the target group (the response is different between

12 e T S ir
children and mature)
M

c
 The experience of the audience (between company manager and
school children)
iv IC d
 The expectation of the audience ( If you advertise your business in
Pr e me

a restaurant older people expect coffee or tea but children expect


T
pizza or fast food )
id am

t
 Knowledge of the audience (graduated in media would expect

11
different approach.
br h
m Mo

How to find audience target:


g
09 at

 Interviewing the target group to find out how to engage the


audience
Ca r.

 Giving out questionnaires to people in the target group to find


M

out their background, interests, and so on


 Carrying out market research by using interviewing and
questionnaires techniques

Giving a sample presentation to an audience


Consider Mobile Phone Company decided to do two presentations, one for
sales and features of the 4 different mobile phones the market and sell:

Page 152 of 168


1. One presentation to sales team who will receive bonus for the
phone sold (they will be interested with technical knowledge and
profitability of each sale).

2. Other presentation for the potential group of customers or end-

42 or ia ni
user (end user will be interested with features for each phone and

a
the price.

t
98 u pe gh
lis
12 e T S ir
M
The key factors when you are writing the presentation:

c
iv IC d
(1) Language used:
Pr e me

 No vulgarity or use inappropriate language , it can offend people


 The use of technical terms should be only for experienced or
T
id am

t
technical audience

11
br h

(2) Multimedia used:


m Mo

 Use photos, video, sound and animation always will catch the
g
09 at

attention of the audience


 A young audience is more likely high music and sound in addition
Ca r.

to videos clips.
M

 Complicated description better to use graph or animation or


both

(3) Length of presentation:


 Long presentation will only work if they are interesting and
engage the audience
 A very young audience quickly will get bored.

Page 153 of 168


(4) Interactive presentation:
 Asking questions but be careful because not everyone wants to
take part

42 or ia ni
(5) Examples used:

a
t
98 u pe gh
 When using examples to illustrate ideas ( don’t give examples

lis
to meat products while your audience is vegetarian

12 e T S ir
M

c
iv IC d
Legal, moral, ethical, and cultural appreciation:
Pr e me

Software copyright and privacy


T
id am

t
Software, Music CDs, videos, articles from magazines and books is

11
protected by copyright laws
br h
m Mo

It is illegal to:
g
09 at

 Make a software copy and then sell it


Ca r.

 Use software on a network or in multiple computers without a


M

license
 Rent out a software package without permission
 Use the name of copyrighted software without agreement

Ways to protect software installation:


 Before installation of software the user will be asked to enter
Product key
 The user will be asked OK/I Agree to the license agreement before
installation

Page 154 of 168


 The original software always come with the sticker informing the
purchaser it is illegal to make copy ( hologram form)
 Some software required to be original CD/DVD available in the drive
 Some software run only if dongle is plugged into USB port

42 or ia ni a
Legal, moral, ethical, and cultural implication:

t
98 u pe gh
lis
12 e T S ir
 Legal: covers the law; whether an action is punishable by law.
M

c
anything break the law is termed illegal
iv IC d
 Morality: governs the private and personal interactions between
Pr e me

people and is usually determined by the person concerned, the


human desire to distinguish between write or wrong
T
id am

t
 Ethics: governs professional interactions, for example, codes of
11
br h

behavior practiced by a society or group of people sometimes going


m Mo

against an individual’s own sense of morality


g
09 at

 Culture: refers to the attitudes, values and practices shared by a


Ca r.

society or group of people


M

Examples:
 Copying software, and then selling it without the permission – illegal
 A student has changed the contents of a company website without
permission – immoral
 Writing computer games that make fun of a country’s religion -
Cultural
 Using pictures in a document without acknowledging copyright –
(immoral)
 Passing information to a rival company – Unethical

Page 155 of 168


 Adel a programmer , uses some of software routines from his day job
when writing computer games – Unethical
 Ali is a programmer and has some of his software written overseas,
but only pays low wage to do the work – immoral

42 or ia ni
Should the internet be policed?

a
t
98 u pe gh
Arguments in favor of some form of internet control:

lis
12 e T S ir
 It would prevent illegal material being posted on websites
 People find it much easier to discover information (Ex. make a bomb)
M

c
 By some control would prevent children and other vulnerable groups
from being subjected to undesirable websites.
iv IC d
 By some control would stop incorrect information being published on
Pr e me

websites.
T
id am

t
Arguments against some form of internet control:
11
br h

 Material published on websites is already available from other sources.


m Mo

 It would be very expensive to police all websites


g
09 at

 It would be difficult to enforce rules and regulations on a global scale.


 It can be argued that policing would go against freedom of information
Ca r.

 Many topics and comments posted on websites are already illegal


M

and laws already exist


 Who is to decide what is illegal or offensive, many things are only
offensive to certain people but others NO

Page 156 of 168


10 - Communication
Communication with other ICT users using email:

42 or ia ni
Email is very popular for communication between people, however many
countries have laws to protects people against misuse of email.

a
t
98 u pe gh
lis
The following is some laws and guidelines for the countries and companies

12 e T S ir
they required:
M

c
It is important that emails are not
false or misleading subject lines
iv IC d
Pr e me

Organizations must include valid


T
id am

t postal address

11
br h

Organizations not allowed to capture


m Mo

or store list of email address


g
09 at

Organizations required to ask


Ca r.

permission before they can send


M

email to individuals

They should be clear with recipients


to unsubscribe from receiving email

Organizations must insure privacy


policy are clear and that subscribers
are made aware of such policies

Page 157 of 168


Acceptable language:
 When sending an email
Example of using inappropriate language:
the language and • Absence images

42 or ia ni
content must be • Abusive, profane, inflammatory

a
appropriate • Violent message

t
98 u pe gh
 If the email is being • Use illegal material in messages

lis
sent to an employee

12 e T S ir
within a business the language must be formal
M

c
Copyright:
iv IC d
Pr e me

 Copying or forwarding email is legal unless the sender indicate


clearly that the message is confidential
T
id am

t
 Recipient should check the email before copying or forwarding it
 Some companies set out their rules for sending and receiving
11
br h

email
m Mo
g
09 at

Netiquette:
Ca r.
M

Senders should consider Avoid humor as some


what they write as content Netiquette is the rules people may not
in an email could be of etiquette that apply understand the joke
misunderstood or taken when communication
out of context over computer Do not plagiarize and
networks especially obey the copyright law
Sender should check for internet
spelling and grammatical Do not chaptalize all
error text
Respond quickly to an
email message

Page 158 of 168


Spam:
What is spam email?
Spam or junk email is sent out to the recipients from mailing list, the
email could be part of phishing scam or to promote certain product,
usually unwanted email

42 or ia ni a
Effects of spam email:

t
98 u pe gh
lis
 If a spam email is part of a phishing scam then there is a
chance your details could be obtained.

12 e T S ir
 The network could also become slower or unresponsive if
M

c
there is a lot of unnecessary traffic flooding the network.
iv IC d
Email group :
Pr e me

 Are contacts grouped together to send email to multiple


recipients
T
id am

t
11 Strategies to prevent spam email:
br h

• Use a junk email filter to stop spam email


m Mo

coming into the inbox.


g
09 at

• Do not sign up for any commercial mailing lists.


• Do not reply to spam email.
Ca r.

• Untick the check box if you are asked to give


M

your email to a third party.

Effective use of the internet:


The internet:
Internet is a world wide collection of networks that
allows users to:
 Send and receive e-mail
 Chat online
 Transfer files from computer to computer
 Browse the web

Page 159 of 168


WWW (World Wide Web):
 Is a part of the internet
 Collection of web pages has been based on the hyper text
transfer protocol (http)
 Can access by web browser

42 or ia ni a
t
Intranets:

98 u pe gh
lis
• Intranet is defined as a computer

12 e T S ir
network based on internet
M
technology but designed to meet

c
the internal needs for sharing
iv IC d
information within a single
Pr e me

organization
T
id am

t
Why intranets adopted rather than using the internet
11
br h

 Intranets are safer, less chance of hacking/viruses.


m Mo

 It is possible to prevent external links


g
09 at

 Companies can ensure that the information available is specific


to their needs.
Ca r.

 It is easier to send out sensitive messages


M

 Intranets offer better bandwidth than the internet


 It is possible to create extranets that allow intranets to be
extended outside the organization

Page 160 of 168


 Online storage medium used to backup files.
Cloud Storage  Files can be accessed from any device with
an internet connection.
 Data is saved on more than one server so in
case of maintenance or repair data is always

42 or ia ni
accessible.

a
t
98 u pe gh
lis
12 e T S ir
Advantages Disadvantages
M
• Files can be accessed from any • Files could be hacked

c
location though internet • Depend on quality of internet
iv IC d
• Users don’t have to carry storage connection due to fast or slow
Pr e me

devices around them download


• Offer backup solutions • Potential cost of cloud storage
T
• Unlimited storage capacity
id am

t
11
br h

There are three common systems:


m Mo

1. Public cloud: Storage environment where the client and cloud


g
09 at

storage provider are different companies


2. Private cloud: Storage provided by a company protected by
Ca r.

firewall
M

3. Hybrid cloud: Combination of the two previous, sensitive data


will be stored in private cloud and less sensitive data will be
stored in public could

Page 161 of 168


General internet terms:
 Is a set of rules which are followed when
Hypertext transfer transferring information across the internet?
protocol (HTTP) &  Rules are agreed between the sender and

42 or ia ni
(HTTPS) recipient when data is being transferred

a
 When the protocol changed to seen as

t
98 u pe gh
padlock symbol or letter “s” after http

lis
this is refer to “secure”

12 e T S ir
M

c
 A web browser allows the user to display a
iv IC d
Uniform
Pr e me

webpage.
recourse  A web browser will use URLs to access specified
locator (URL)
T
websites.
id am

& web
t  URLs are represented by numbers

11
browser
(http://195.196.101.1) not user friendly.
br h

 Therefore an alphanumeric format


m Mo

(http://www.MM .com/ict)
g
09 at

 Web browser translate HTML from websites to


show the result, it can be images, videos, or
Ca r.

sound
M

http://www.MM .com/Esafety/ICTcourse .

Protocol://website address/Path/filename
The format is protocol://www.website address/path/filename,
website address :
1. domain host (WWW)
2. domain name ( name of website)
3. domain type (.com or .gov or .net or .org)

Page 162 of 168


4. sometimes includes country code like kw, eg or uk ..
5. path which is a webpage
6. filename is the item on the webpage

What is the process a web browser to load a web page?

42 or ia ni
 When entering URL or clicking the link address request made

a
 Retrieve code from the server/resources then downloaded

t
98 u pe gh
lis
 Interprets the code as a webpage or page resources to build the
web page

12 e T S ir
 The web page is displayed
M

c
iv IC d
 FTP is a network protocol when transferring
Pr e me

File transfer files from one computer to another over the


Protocol (FTP) internet.
T
id am

t  FileZilla is popular FTP application which


issued to upload webpages so that they can
11
br h

be hosted and viewed on the internet.


m Mo
g
09 at
Ca r.

Internet  ISP is a company which provides internet


M

Service access to users.


Provider (ISP)  Normally the users would have to pay a
monthly fee.
 Broadband connections tend to use fire-
optic cables for increased bandwidth.

Page 163 of 168


What are the differences between the internet and an intranet?
 Internet is " international network"
 Intranet is "internal restricted access"
 Internet covers topics of global or general interest, whereas Intranet
is used to give local information relevant to the organization

42 or ia ni
 Internet possible to block certain websites but more difficult where

a
as in intranet easy to block certain websites

t
98 u pe gh
 Internet can be accessed from anywhere but Intranet requires

lis
password and user ID entry

12 e T S ir
 Internet access is open for hackers , but intranet is behind a firewall,
M
which gives some protection against hackers

c
 Internet is public access, whereas intranets can be private access
iv IC d
Pr e me

Blog: web  A blog is based on personal experiences


T
and usually updated by one author.
id am

logs
t  Blog entries are in order (most recent

11 entries are shown first).


br h

 Blogs cannot be changed by other users of


m Mo
g

the internet.
09 at

 Bloggers can be prosecuted for posting


Ca r.

offensive material.
M

Wikis  A wiki is a collaboration from users (many


authors) to create content.
 Wiki is can be edited by anyone (content
can be edited or deleted).
 Wikipedia is an example use of Wikis

Social Social Networking sites allow users to interact and


Networks communicate with each other.
Page 164 of 168
The features of social networking sites:
 You can connect with people with similar interests.
42 or ia ni a
t
98 u pe gh
lis
12 e T S ir
M

c
iv IC d
Pr e me
T
id am

t
11  Similar to blogs but often used on social networking
br h

Microblogs
m Mo

sites to make short, frequent posts.


g

 The posts can be done using instant messaging,


09 at

emails or other social networking (such as tweets).


Ca r.

 Very difficult to customize


M

b-blog  Another version short for business blog which is used


by businesses to promote themselves on the internet.

Page 165 of 168


Searching the internet for information

There are two ways to find the information:


 When using the internet you can
either type in a URL address or use

42 or ia ni
a search engine to find specific data.

a
 Normally keywords would be typed

t
98 u pe gh
lis
in to a search engine to find
particular information.

12 e T S ir
M

c
Search engines:
iv IC d
 Search engines are useful if you don’t
Pr e me

know the URL


 Search engines using variety of methods
T
id am

t
to search
 The more specific search you will get
11
accurate result
br h

 You can narrowing your search by typing


m Mo

(+) between words (ICT+past+paper+2019)


g
09 at

 You will find thousands of hits, then you can save it


Ca r.
M

Using the internet

Advantages:
 Information on the internet is up-to-date
 The internet limitless of information
 Searching using a search engine is fast and easy.
 People can look for information from home
 Information on the internet is usually free of charge.
 Pages on the internet can have multimedia elements , which
can make learning is interesting

Page 166 of 168


Disadvantages:
 Anything can be posted on a web page and information may be
incorrect.
 There is always the risk of accessing inappropriate websites

42 or ia ni
 It is too easy to be distracted when searching on the internet

a
 There is always the risk of information overload if the user lacks

t
98 u pe gh
lis
the necessary experience
 Some research skills are lost when using the internet as search

12 e T S ir
engines do all the work for you
M

c
iv IC d
Pr e me

Effective use of internet:


T
id am

t
Why internet search to find relevant information is not always fast?
 Unless the user narrowing the criteria it will take long time to

11
br h

find the relevant information


m Mo

 It is possible to find millions of relevant web sites matching with


g

given criteria
09 at

 If the user uncertain what he needs it will take long time to find
Ca r.

the relevant information


M

Why it is not always easy to find reliable information on the internet?


 Content on the internet is not regulated.
 Anybody can make a website and post any content which is not
factually correct.
 Wikis can be edited to contain false information.
 Information may be biased depending on who was the author.

Page 167 of 168


How can you evaluate the reliability of information found on
the internet?

42 or ia ni a
1. Anyone can setup website, so information not necessarily reliable or

t
98 u pe gh
accurate.

lis
2. Some commercial web site will be based to advertise their products,

12 e T S ir
If the advertising only related to their own products It could be
M
unreliable

c
3. If the web site URL ending with .gov or .org … mostly is reliable
iv IC d
4. If you compare the information on the web site with the information
Pr e me

in the book, this will help to show if the information reliable or no .


5. It is good idea to see if responsible bodies endorsed ( support and
T
id am

t
permit ) the website
6. Check if the website linked to reliable or unreliable web sites
11
br h

7. Check if the website have a testimonials or recommendation this can


m Mo

indicate reliability
g

8. If the last update was long time ago , this mean the information is
09 at

not reliable
Ca r.

9. If the author of the website is good credential, then the information


M

is more likely reliable

Page 168 of 168

You might also like