ICT Notes EoY Exams
ICT Notes EoY Exams
1. Keyboards:
Uses:
Input of data into applications software
Typing in commands to the computer
Advantages:
Fast entry of new text into a document.
Easy to use for most people.
Easier to do verification checks as data is entered (can compare the source document with typed data on the screen).
Disadvantages:
It can be difficult to use if the user has limited arm/wrist use.
Slow method when compared to direct data entry.
It is a large device that uses up valuable desk space.
2. Numeric keypads:
Uses:
Automatic teller machines (ATMs), where the customer can key in their PIN, amount of money, etc.
Mobile phones allow phone numbers, etc., to be keyed in.
Point of sale terminals (POS)
Chip and PIN devices when paying by credit/debit cards.
Advantages:
Faster than standard keyboards when entering numeric data.
Because many are small devices, they are very easy to carry around.
Disadvantages:
Sometimes, they have small keys, which can make input more difficult.
Sometimes, the order of the numbers on the keypad is not intuitive.
3. Mouse:
Uses:
Opening, closing and minimizing software
Grouping, moving and deleting files.
Image editing, for example, controls the size and position of a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow selection.
Advantages:
It is a faster method for choosing an option than a keyboard.
It's a very quick way of navigating through applications and the internet.
Does not need a large desk area when compared to a keyboard.
Disadvantages:
More difficult for people with restricted hand/wrist movement than using a keyboard for data entry.
Easy to damage, the older type of mouse quickly becomes clogged up with dirt.
Difficult to use if no flat surface is readily available.
1
4. Touchpad:
Uses:
Opening, closing and minimizing software
Grouping, moving and deleting files.
Image editing, for example, controls the size and position of a drawing pasted into a document.
Controlling the position of a pointer on the screen to allow selection.
Advantages:
Faster than a keyboard for choosing options.
Used to navigate applications and the internet.
Integrated touchpad in the laptop, no need for a mouse
Disadvantages:
People with limited hand/wrist movement find the device difficult to use.
It can be more difficult to control the pointer when compared to a normal mouse.
Drag and drop operations are more complicated using a touchpad.
5. Tracker ball:
Uses:
A good alternative to a mouse for people with conditions such as RSI.
Used in an industrial control room environment.
Used in some luxury cars to select functions such as radio.
Advantages:
Does not need the same fine control as a mouse.
More accurately position the pointer on the screen.
They are more robust than a mouse, plus they require less wrist movement.
Disadvantages:
It is not supplied with the computer as a standard; therefore, it is more costly.
Users may need training because it is not standard equipment.
6. Remote Control:
Uses:
Televisions, satellite systems, DVD/Blu-ray players and Hi-Fi systems, to alter controls such as volume, on/off, etc.
Used to control multimedia systems.
Used in industrial applications to remotely control processes.
Advantages:
It can be operated from any reasonable distance.
In some conditions, e.g., in chemically hazardous environments, we can
control and measure from safe distances.
Disadvantages:
Difficult to use for people with limited hand/wrist movements.
Physical obstacles can easily block the signal.
7. Joysticks:
Uses:
Used in video games.
Used in simulators to mimic the actual controls.
Advantages:
It is easier than keyboards for screen navigation.
In some applications, the control is more realistic than using a mouse.
Disadvantages:
The on-screen pointer is more difficult to use.
8. Driving wheel:
Uses:
Used in video games, especially car racing games.
Used in simulators to mimic actual vehicle controls.
2
Advantages:
It's a more realistic experience than both mouse and joystick.
Easier than a keyboard or joystick to control steering movements.
Disadvantages:
It is a rather expensive input device as compared to a mouse or joystick.
Steering movements tend to be over-sensitive, which gives an unrealistic feel.
Unless it is an expensive simulator, feedback to the steering wheel is non-existent.
10. Scanners:
Uses:
Scanning documents and converting them into different formats
Scanning old documents to protect them in case the original is lost/damaged.
Scanning barcodes at POS terminals.
Advantages:
Images can be stored for editing later.
When used with OCR, much faster and accurate than typing the documents.
Possible to recover damaged documents by scanning and producing a copy.
Disadvantages:
Limited quality, depending on how good the scanner’s resolution is.
Fairly slow input method, especially if colour mode is selected.
12. Microphones:
Uses:
To input speech to be used in various applications, like voice recognition software.
As a sensor to pick up sound in an intruder alarm system.
3
Used in audio conferencing or VoIP applications.
Advantages:
It is faster to read text than it is to type it in.
Possible to manipulate sound in real time rather than working on a completed recording.
It improves security if used as an authentication system.
Disadvantages:
Sound files use up a lot of computer memory.
Reading data is more error-prone than typing in.
13. Sensors:
Uses:
Temperature sensors are used in central heating systems, ovens, glasshouses, etc.
Pressure sensors are used in intruder alarm systems and washing machines.
Light sensors are used in automatic glasshouses, doors, and streetlights.
Sound sensors are used in intruder alarm systems, monitoring liquid and powder flow in pipes.
Moisture sensors used in automatic glasshouses, environmental monitoring, and in some factories.
pH sensors are used in automatic glasshouses, chemical processes and environmental monitoring.
Advantages:
Readings are more accurate than human operators.
Are continuous (breakless monitoring), any action/warnings needed will be initiated immediately.
Automatic systems don’t need human intervention.
Disadvantages:
Faulty sensors can give spurious results.
Most sensors are analogue; therefore, they require conversion using Analogue to Digital Convertors.
4
2. Chip and PIN reader:
Uses:
Where payments are made using cards
Advantages:
It is more secure than contactless cards as the PIN acts as a second security layer.
More robust system than Magnetic Stripe Cards
Disadvantages:
Be very careful so the PIN isn’t seen by anyone while being typed in.
7. Barcode readers:
Uses:
Used in supermarkets for stock control.
In libraries, to keep track of books.
As a safety function to ensure checking of electrical equipment daily.
Advantages:
Much faster than manually keying in data.
Allow automatic stock control.
They are a tried and trusted technology.
Disadvantages:
Relatively expensive system to administer.
Not fool-proof, barcodes can be swapped between items.
Can be more easily damaged than RFID tags or magnetic stripes.
6
Very efficient, low power consumption.
Lightweight devices.
No flickering images.
Very sharp image resolution.
Disadvantages:
Colour and contrast from different angles are inconsistent.
Motion blur is a common issue.
Lower contrast than CRT monitors.
4. Multimedia projectors:
Uses:
Training presentations to allow the whole audience to see images.
Advertising presentations.
Home cinema systems.
Advantages:
More people can watch as they don’t have to crowd around a laptop.
Avoids the need for several networked computers.
Disadvantages:
Images can be fuzzy.
Expensive to buy.
Set-up can be complicated.
5. Laser printers:
Uses:
In uses where low noise is required.
If fast, high quality, high-volume printing is required.
Advantages:
Printing is fast so can handle very large print jobs.
Quality is consistently high.
Toner cartridges last for a long time.
Disadvantages:
They are only considerably fast if several copies are being made.
Colour laser printers are expensive to run.
They produce ozone and volatile organic compounds because of their printing method and toner.
6. Inkjet printers:
Uses:
Where low-output volumes are required.
Where high-quality printing is required for single pages.
7
Advantages:
High-quality output
Cheaper than laser printers and very lightweight
Don’t produce ozone and volatile organic compounds.
Disadvantages:
Slow output if many copies needed, hence can’t do large print jobs efficiently.
Printing can smudge if user isn’t careful.
Can be expensive if used a lot.
8. (Graph) Plotters:
Uses:
Producing architectural drawings
Producing engineering drawings
Drawing animation characters.
Advantages:
Very high-quality output.
can produce large and colour drawings very accurately.
Can print on a variety on materials.
Disadvantages:
Very slow printing.
Expensive equipment to purchase initially.
Have a very large physical footprint compared to a printer.
9. 3D printers:
Uses:
Custom-made prosthetic limbs.
In aerospace, if parts of the aircraft are made using 3d printers they can be very lightweight.
Making spare parts for items that aren’t now manufactured, e.g., parts of a vintage car.
Advantages:
Manufacturing objects has become much easier.
Even though the initial cost is high, it is still cheaper than the more conventional way.
Parts for machinery that aren’t available can be made.
Disadvantages:
Potential to make counterfeit items.
Could lead to manufacture of dangerous items by almost anyone.
Job loss potential.
10. Speaker:
Uses:
Used in all phones and most computers.
8
Helps visually impaired people.
Plays downloaded sound files.
Advantages:
Amplified sounds can be much louder than the original sound.
Amplified sounds can be enough to be heard by a huge crowd.
They are especially useful for blind people, for instance, reading e-books.
Disadvantages:
Speaker output can disturb irrelevant people in the same area, e.g., an office.
Sound quality is high only expensive speakers.
They take up a lot of desk space.
11. Actuators:
Uses:
Used to turn on motors, buzzers, and switches.
Allow a computer to control physical devices,
Advantages:
Allow remote operation of many devices.
Relatively inexpensive devices.
Disadvantages:
They are an additional device in the system that could go wrong.
As analogue devices, signals need to be converted using a DAC.
9
Fixed Hard Disks/Drives
Uses:
To store the OS, systems software and working data/files.
Used in real-time systems and in online systems.
Used in file servers for computer networks.
Advantages:
They have a very fast data transfer rate and fast access times to data.
They have a very large memory capacity.
Disadvantages:
It can be easily damaged.
They have many moving parts which affect overall reliability.
Their read/write operation can be quite noisy when compared to solid-state drives.
Floppy Disks
Uses:
Storing and transferring small files
Booting older computer systems
Software installation (historically)
Advantages:
Portable and lightweight
Rewritable
Cheap to produce
Disadvantages:
Very limited storage capacity (1.44 MB)
Easily damaged (magnetically or physically)
Obsolete in modern systems
10
CD-RW/DVD-RW ~ Read and Write
Uses:
Used to record television programs which can be recorded over, time and time again.
Used in CCTV systems.
It can be used as a backup device for files and data.
Advantages:
It can be written over many times.
You can use different file formats each time it is used.
It is not as wasteful as the R format because the files/data can be added later.
Disadvantages:
It can be expensive media.
Possible to accidentally overwrite data.
Blu-Ray Discs
The main differences between DVD and Blu-ray are:
1. Blu-ray uses a blue laser rather than a red laser. (The wavelength of blue light is 405nm, much smaller than the 650nm
red laser) This makes pits and lands much smaller, so they store five times more data than DVDs.
2. Blu-ray disks automatically come with a secure encryption system, which helps to prevent piracy and copyright
infringement.
3. The data transfer rate for a DVD is 10 Mbps, and for a Blu-ray disc, it is 36 Mbps.
Uses:
Home video consoles like for storing and playing movies
Computers can use this technology for data storage or backing hard drives.
Camcorders can use this media to store movies.
Advantages:
Very large storage capacity and very fast data transfer rate.
The data access speed is also greater than with other optical media.
Blu-ray discs automatically come with a secure encryption system.
Disadvantages:
Expensive discs.
Encryption problems when used to store videos.
Introduction of HD (high definition) DVD players has reduced the advantages of Blu-ray technology.
11
Solid-state drives (SSD)
Uses:
Storage device to store files, applications, OSs, and so on.
Advantages:
SSDs offer faster data access (0.1 ms vs 10 ms) and transfer speeds compared to HDDs.
SSDs consume less power and run cooler than HDDs.
This makes them more reliable, thinner, lighter, and suitable for portable devices like laptops.
Disadvantages:
SSD endurance - SSDs are conservatively rated at only 20GB write operations per day over three years.
More expensive than magnetic hard disks.
Smaller storage capacity than magnetic hard disks.
3. ICT Applications
Communication
Newsletters and posters
Paper-based communication is used to inform people about their interests.
Schools use these to inform parents about events/dates.
Advantages
o Released regularly.
o The recipients have a permanent copy.
Disadvantages
o Requires distribution, which is why there are printing costs, paper/ink.
o There are no special effects, sound/video/animation.
o The targeted audience may or may not receive the information.
Websites
Collection of webpages, text, graphics, video, and sound
Hosted on a web server on the internet.
Need to write code or use a web authoring application.
Hyperlinks to other pages can be added.
Interactive websites require programming knowledge.
Can use a camera, scanner, and microphone to input data.
Usually, hire space from the web hosting company.
Advantages
o Multimedia support like sound, video, and animation
o Navigation and hyperlinks to other pages/sites
o Visitor tracking and global advertising options
Disadvantages
o Can be hacked and modified, or viruses introduced.
o Need for a computer and internet connection and it needs regular maintenance once set up.
o Lack of portability compared with the paper-based system.
Multimedia Presentations
Uses a mixture of media to present information: animations, video, sound, transitions, hyperlinks.
Produced using software packages.
Used with a projector so a large audience can view.
Advantages
o Use of sound and animation/video effects
o Interactive/hyperlinks built into presentations.
o More likely to hold the audience’s attention.
Disadvantages
o Need for special equipment – expensive
o Distracts the audience from the sole content of the presentation.
o It is very easy to make a presentation with too many features.
Media streaming
Real-time transition of audio and video files over the internet
allows users to access content without downloading it to their devices.
popular services include Spotify, YouTube, and social media websites.
13
uses buffering, which makes sure the video plays back smoothly without freezing. While the buffer receives data
packets, it sends previously received ones to the playback device so that there are no gaps in the played data.
Advantages
o Users can access any information at any time and from any location.
o Offers an extensive library of content.
o Compared to traditional cable or satellite TV subscriptions, media streaming can be more cost-effective
Disadvantages
o Heavily relies on a stable and high-speed internet connection.
o Not all content is available on every streaming platform due to licensing agreements and exclusivity deals.
o You do not own any titles, so if it were to be removed by the service providers, you will lose access to it.
ePublications
digital versions of printed materials, such as eBooks, eMagazines, and eNewspapers.
It can be read on electronic devices.
Advantages
o aid portability
o they are often more affordable than paperback books.
o Offer interactive elements that enhance the reading experience.
Disadvantages
o reading from an electronic device for a prolonged time can cause eyestrain.
o ePublications lack the tactile experience and physical presence that some readers enjoy.
o compatibility issues can arise if the ePublications is in an unsupported format.
Mobile Communication
Mobile devices support many forms of communication, such as:
1. Short message service (SMS) messaging: permits extremely quick communication with another person via typing on a
keyboard (a mobile phone or tablet's keyboard is frequently virtual). Its benefit is that the recipient can get the text whenever
they choose without being available.
2. Phone calls: Making calls while on the go is among the most fundamental applications of a mobile phone. Mobile phones
are the perfect method to stay in correspondence anywhere there is a network signal because they are compact and have an
independent battery.
3. Voice over Internet Protocol (VoIP): a communication technique for Internet users. VoIP transforms sound captured by the
built-in mic of the cell phone into individual data packets that may be transmitted via the internet to their intended recipient.
4. Video calls: enables real-time video conversing between multiple participants with a camera-enabled device. Uses an
internet connection or cellular data. Software that may be used for video calling includes FaceTime, Skype, and Zoom.
5. Accessing the Internet: Another helpful feature is accessing the net from a mobile device. Any mobile device with a
wireless broadband connection or a mobile phone network can link to the internet.
Modelling Applications
Advantages of using models:
Using models is safer and less expensive than building or testing the real thing
They allow you to try out different scenarios in advance
14
Models are much faster to use than performing real-life tasks
Computer-controlled Systems
Robotics in manufacturing involves using automated machines to perform tasks such as assembly, welding, and
packaging. These robots are designed to mimic human actions with precision and speed, increasing productivity and
quality control. They offer benefits like enhanced worker safety, improved efficiency, and the ability to handle
repetitive tasks, revolutionizing the manufacturing industry.
Advantages: Disadvantages:
o Can work in dangerous or harmful o Struggle with unusual or unpredictable tasks
environments o Can lead to higher unemployment and
o Can operate continuously without breaks deskilling
o Lower running costs with fewer employees o High initial setup and maintenance costs
needed
Production line control: Computer-controlled systems in production line control involve using computers and
software to monitor, coordinate, and optimize manufacturing processes. These systems ensure efficient coordination of
machinery, manage inventory, track production metrics, and automate tasks. They enable real-time data analysis, error
detection, and adjustment, improving productivity, reducing downtime, and enhancing overall operational efficiency in
the production line.
Autonomous vehicles: Self-driving cars and drones guided by computer algorithms.
o enhance safety.
o reduce traffic congestion.
o increase fuel efficiency.
Advantages of using computer-controlled systems rather than humans:
o increased efficiency, productivity and greater consistency
o ability to work in any environment with reduced human error.
o can work with large or delicate items.
Disadvantages of using computer-controlled systems rather than humans:
o very high instalment and maintenance costs
o lack of flexibility
15
o requires costly backup systems.
Advantages: Disadvantages:
o Absenteeism can be addressed more o Operating the software will require
quickly. training.
o Parents are kept updated. o The initial cost of the software is very
o Reduced workload for teachers. high.
o Unauthorized access has to be prevented
due to personal information.
Learner’s performance
o Spreadsheets can be used to record students’ performances. It is easier to compare each other’s performances
and an individual student’s performance over the academic year.
Computer-aided learning
o The use of computer-based technologies to help students acquire academic material is known as computer-
aided learning (CAL). They are meant to supplement classroom instruction, not serve its purpose. Students
will take online assessments to track their progress while learning on computers. Although CAL cannot
consistently assist a student with an issue, in certain circumstances, students would need to get other aid.
Booking Systems
These web-based platforms and applications allow users to reserve and purchase tickets or services for various events and
industries. Some of the applications for online bookings include:
1. Travel industry: Booking flights, hotels, and holiday packages provides a convenient platform for travellers to plan and
book their trips.
2. Concerts: Reserving tickets for live music events allows music fans to secure their spot at popular concerts.
3. Cinemas: Booking movie tickets in advance enables cinemagoers to reserve seats and avoid queues.
4. Sporting events: Purchasing tickets for sports matches and competitions offers sports enthusiasts an easy way to attend their
favourite events.
Advantages: Disadvantages:
o Convenience and instant ticket confirmation o Potential technical issues and security
o Ability to compare prices and get personalized concerns
offers o Transaction fees and impersonal service
o Automated reminders and easy repeated o Dependent on stable internet and may cause
16
Banking Applications
Online banking systems depend on the ability to update files instantly to avoid double scheduling, which might occur
if the system reaction time is slow.
The use of computer technology has revolutionized how we do our banking transactions, for example:
o Internet banking
o The use of automated teller machines (ATMs)
o Chip and PIN technology.
Customer puts card into ATM Contact is made with bank’s computer
Advantages: Disadvantages:
o Available 24/7 for cash withdrawal and o Risk of theft and shoulder surfing
banking o Some banks charge fees for ATM use
o Access accounts from anywhere in the world o Withdrawal limits imposed
o Usually, faster service than bank queues
Advantages: Disadvantages:
o very secure and fast payment method o the bank transaction cannot be reversed
o less expensive than cheques without full dispute investigations.
o customers can dispute an EFT payment o customer needs to have funds available
within 60 days. immediately.
o cannot guarantee the recipient’s identity.
17
Credit/debit card transactions.
Several credit/debit cards come with a magnetic stripe and a chip, the chip houses essential data like the PIN. This technique is
intended to increase security because it is superior to a signature. A chip and PIN card to make purchases is an example of an
electronic funds transfer (EFT).
Advantages of credit cards: Disadvantages of credit cards:
o customer protection on undelivered goods. o high interest rates and annual fees.
o accepted internationally and online o risk of credit damage.
o interest-free loan if money is paid on time o security risks in online transactions
Advantages of debit cards: Disadvantages of debit cards:
o money deducted immediately, no interest o less protection if goods don’t arrive.
o safer than carrying cash. o no credit allowed; funds must be available
o can make online purchases. o security risks in online transactions
Cheques
Individuals and organizations use cheques as a form of payment. When issuing a cheque, the payer writes the recipient's name,
the payment amount, and the date on the cheque. The recipient then deposits or presents the cheque to their bank for
processing. The payer's bank verifies the fund’s availability, and upon clearance, the specified amount is transferred from the
payer's account to the recipient's account, completing the transaction.
Advantages: Disadvantages:
o more convenient and safer than cash o not legal tender and can be refused
o can be post-dated. o slow method of payment
o can be traced if they are lost. o expensive payment method
Internet Banking
Enable online access to banking services via a secure website or app, allowing for transfers, bill payments, account
management, and more.
Advantages: Disadvantages:
o convenient 24/7 access and easy management o security risks and fraud possibility
o visits to bank branches not required o requires a reliable internet connection.
o interest rates may be better. o physical cash cannot be deposited/withdrawn.
Computers in Medicine
Information Systems in Medicine
Patient records: Healthcare professionals maintain databases to communicate information between them and
pharmacists (for instance, to guarantee no medications are administered that interact dangerously with one another).
Pharmacy records: Pharmacy records maintain a comprehensive record of patient prescriptions. This includes details
like the prescribed medication, dosage, quantity dispensed, prescribing physician's information, and the date of
dispensing. These records help track medication usage and can be used to verify prescription accuracy and detect
potential drug interactions or allergies.
3D Printers
Using 3D printers in medicine:
o Prosthetics: 3D printers print out artificial body parts such as false teeth, artificial limbs, hearing aids, etc.
This is a less expensive method of replacing body parts.
o Tissue engineering: it is the field of combining cells, biomaterials, and engineering principles to create
functional tissues or organs, aiming to repair or replace damaged or diseased tissue in the human body.
o Artificial blood vessels are synthetic structures designed to mimic the function of natural blood vessels,
facilitating the flow of blood and nutrients throughout the body to support tissue repair and regeneration.
o Customized medicines are personalized drug formulations tailored to individual patients' specific needs. They
utilize advanced technology and precise measurements to create medications with accurate dosages and unique
compositions, optimizing treatment outcomes.
Expert Systems
It is an AI-based computer program that emulates the decision-making capabilities of human experts. It uses knowledge and
rules to provide accurate advice or solutions in a specific domain.
18
Examples include:
Diagnostics
Mineral prospecting
Tax and financial calculations.
Strategy games
Identification of plants, animals, and chemical compounds
Route scheduling for delivery vehicles
2. Explanation system
Informs the user of the reasoning behind the expert system’s conclusions.
It will supply a conclusion and any suggested actions to take.
It will also give the percentage probability of
the accuracy of its conclusions.
3. Inference engine
The main processing element of the system
It acts like a search engine examining the
knowledge base.
Responsible for gathering information.
This is the problem-solving part of the system.
Attempts to use information gathered from the
user to find a matching object.
4. Knowledge base
It is a repository of facts.
stores all the knowledge about an area of expertise.
a collection of objects and their attributes
5. Rules base
The rules base is a set of inference rules.
Used by the inference engine to draw conclusions.
They follow logical thinking.
19
Electronic funds transfer at Point of sale (EFTPOS) terminals: Devices for processing electronic payments; they allow
customers to make payments using debit or credit cards by securely transferring funds from their bank accounts. EFTPOS
terminals authenticate and authorize transactions in real-time, providing convenience and security for customers and businesses
during retail purchases.
The process of checking credit and debit cards at a supermarket EFTPOS is much the same as was described for paying a
restaurant bill in Section 6.6.
Some functions of EFTPOS include:
Use of chip and PIN cards:
o Enhance security with two-factor authentication.
o Require customers to enter a personal identification number (PIN)
Use of contactless cards:
o Allow for faster transactions.
o Enable customers to tap their card on the terminal.
Use of Near Field Communication (NFC):
o Facilitate payments through smartphones and other devices.
o Increase convenience for customers.
Communication between supermarket computers and bank computers:
o Share transaction details securely.
o Enable instant payment processing and verification.
Internet Shopping
Characteristics of Internet Shopping:
Online stores accessible through web browsers
A wide variety of products and services are available.
Convenient and often open 24/7
Advantages (To customer): Disadvantages (To customer):
access to the global market and compare products security and privacy concerns
worldwide with convenient home shipping cannot physically examine products before purchase.
all time shopping without waiting in queues shipping delays and extra costs
Advantages (To business): Disadvantages (To business):
targeted pricing and fast updates increased competition and digital fraud risks
cheaper advertising and larger customer base technical issues and deliver costs
increased profits from reduced staff fake reviews can harm reputation.
Recognition Systems
Optical Mark recognition (OMR) media in schools:
School registers: Paper-based registers are fed into OMR to be scanned and stored in a database.
Multiple-choice examination papers: The position of a mark is stored in a computer’s memory after being read by
the OMR, a device using a template that maps out the X-Y coordinates of each tablet (pen/pencil mark).
Used at POS terminals for scanning and reading the information stored in barcodes.
Many digital devices have OMR scanners, which may be used to scan QR codes.
Advantages: Disadvantages:
o very fast way of inputting the results of a o designing the forms is a very complex job.
survey. o there can be problems if they have not
o more accurate than keying in data been filled correctly.
o more accurate than OCR methods o often only work with black pens or pencils
Biometric recognition:
Usually refers to automated technologies for authenticating and verifying human body characteristics such as face, iris,
retina, finger, thumb, hand, and voice.
Advantages: Disadvantages:
o highly accuracy and very fast recognition o expensive setup and high memory usage
o easy to use and non-intrusive o can fail with voice changes or dirty skin
o vulnerable to voice recording misuse
Satellite Systems
Global Positioning Systems (GPS)
Used to determine the exact location of several modes of transport.
Cars usually refer to GPS as satellite navigation systems.
21
Satellites surrounding the Earth transmit signals to the surface.
Computers installed in the mode of transport receive and interpret these signals.
Knowing their position on the Earth depends on very accurate timing – atomic clocks are used in the satellites, which
are accurate to within a fraction of a second per day.
Each satellite transmits data indicating its position & time.
The computer on board the mode of transport calculates its exact position based on the information from at least three
satellites.
Fire:
ICT devices require electricity to charge or run; too many devices using a single socket can cause the plug socket to overload,
and heat is generated by too much electricity, causing the wiring to degrade and ignite a fire.
The causes and reduction tactics for fire include:
Socket overload: Ensure enough plug sockets in the room, do not plug too many devices into the same socket, and do
not leave devices plugged in and unattended.
22
Overheated equipment: Ensure that equipment is properly ventilated and not obstructed, keep flammable materials
away from heat sources, regularly check equipment for signs of wear or damage, use fire extinguishers in case of
emergencies, turn off or unplug devices when away from the location, do not cover any air vents on devices.
Trailing cables:
Devices can be plugged in using cables. Cables that are protruding can cause an accident; you can trip over a cable left out in a
location, and body damage can occur during a fall, for example, breaking bones, ligament damage, bruising, sprains, etc.
depending on the area fell on
Trailing cables causes and prevention strategies:
Unorganized/insecure cables: use cable ties to secure cables, keep cables packed correctly in, let us say, a table,
therefore not coming in the way of walking paths, use wireless devices where possible, and regularly inspect cables for
signs of wear or damage.
eSafety
Data Protection
The Data Protection Act (DPA) controls personal data collection, storage, and processing.
In the UK, the European Union’s General Data Protection Regulation (GDPR)
Protects personal data, whether stored on paper or a computer system.
23
Personal Data
Refers to information that can be used to identify an individual.
Examples
o Personal Name
o Address
o Date of birth
o A photograph in school uniform
o Medical history
Threats that can be avoided by protecting personal data:
o Identity theft
o Privacy breaches
o Misuse of the information
o Data be sold to third-party companies.
o Individuals could be held to ransom over personal data gathered.
o could be used to commit a physical crime.
How to avoid inappropriate data disclosure:
o Personal data must be kept confidential and protected through privacy settings on websites such as social
media or strong passwords on websites where personal data is held or used.
o Access to personal data should be limited to authorized individuals.
o Think before you post - consider what information could be gathered from your image or content.
o Check website details about the collection, storage, and use of personal data.
o Only access websites where personal data is used or viewed when on a secure, encrypted connection
eSafety
E-safety is knowing about and using the internet safely and responsibly.
It refers to when an individual is using the internet, email, social media, or online gaming.
E-safety refers to the individual knowing how to protect themselves from potential dangers and threats.
Safety Suggestions
The internet:
o Use trusted websites recommended by teachers or reputable sources.
o Utilize search engines that only allow access to age-appropriate websites and use filters to ensure inappropriate
content is not seen.
o Never reveal personal information
Email:
o Be aware of the potential dangers of opening or replying to emails from unknown people, including
attachments; potential dangers include phishing, spam.
24
o Ensure you know who the email is for when considering sending personal data or images via email, only with
people you know and not with identifiable content like school photos.
Social media:
o Know how to block and report people who send content or messages that are unwanted.
o Know where the privacy settings are to reduce the number of people who can see your posts or images.
o Be aware of the potential dangers of meeting online contacts face to face; do not meet anyone you do not
know; if you do, take an adult and meet publicly.
o Do not distribute inappropriate images and inappropriate language.
o Respect the confidentiality of personal data belonging to other people.
o Only accept friend requests from people you know.
o Parents should be aware of what you are doing online, discuss what you are doing online.
o Do not post images or details that can be used to locate you.
Online gaming:
o Do not use real names as usernames.
o Never share personal or financial details with other players
o Know how to block and report players for inappropriate messages or comments.
Sensitive Data is data that might result in loss of an advantage or level of security if disclosed to others. I.e., ethnicity,
religion, criminal record, etc. At the same time, personal data can be used to identify the user, i.e., passport number,
name, age, etc.
Security of Data
Threats
There are multiple methods by which data can be threatened, including:
Hacking: Unauthorized access to computer systems or networks to gain control, steal information, or cause damage,
thus leading to identity theft, privacy breaches, and misuse of data
Phishing: Deceptive emails or messages that are received from trusted sources to trick individuals into revealing
personal data
Pharming: Manipulation of DNS (Domain Name System) to redirect users to fraudulent websites, often to steal
personal data
Smishing: Phishing attacks carried out through SMS or text messages
Vishing: (aka voicemail phishing) Phishing attacks carried out through voice messages to trick users into calling the
telephone number contained in the message
Viruses and malware: Viruses are program codes that can replicate/copy themselves to cause data loss or corruption.
Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems or networks.
Card fraud: Unauthorized use of credit or debit card information for fraudulent purposes caused by shoulder surfing,
card cloning, or keylogging.
Keylogging: Malware that records keystrokes to steal passwords.
Trojan Horse: Malicious software disguised as legitimate software.
Virus: Self-replicating malware that attaches to clean files.
Worm: Standalone malware that spreads through networks.
Shoulder Surfing: Illegally observing someone’s screen/keyboard to steal data.
Protection of Data
Multiple techniques are implied for the protection of data, inclusive:
1. Biometrics:
Individuals' distinctive physical or behavioural traits, such as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to fake or duplicate, it offers a more secure form of identification.
How it works: Scans traits → compares to stored data → grants access if matched.
It is used in phone unlocking (e.g., Face ID), airport security, banking authentication.
More secure than passwords.
Biometric data cannot be reset if stolen.
2. Digital certificate:
25
A digital record that attests to a website's reliability and integrity. A digital certificate is used to provide safe
communication and to build confidence between parties. Identifier data, the entity's public key, and a third party's
digital signature are frequently found in digital certificates.
3. Secure Socket Layer (SSL):
A protocol that creates a secure connection between a client computer and a server. SSL ensures that information
communicated between a server and client stays private and cannot be intercepted or changed by unauthorized parties.
A website's identification for it is the S at the end of HTTP.
4. Encryption:
It is creating data in a format that cannot be read without a decryption key. Data on hard drives, emails, cloud storage,
and secure websites (HTTPS) are all protected by encryption. Without a decryption key, it assures that even if
unauthorized people obtain data, it cannot be decoded.
5. Firewall:
A firewall is a network security device that monitors and manages incoming and outgoing network traffic. Its goal is to
separate an internal network from other networks by filtering data according to established criteria. It assists in
preventing malware, unauthorized access, and other network risks.
6. Two-factor authentication:
A security mechanism that requests two different kinds of identification from users to confirm their identity. To
provide additional protection outside of just a username and password, 2FA was created. Typically, it combines
something that uniquely identifies a user, like biometric data, with something the user has, like a smartphone and a
token or something they know, like a password.
7. User ID and password:
A typical authentication technique uses a password plus a secret code (user ID) to identify. To strengthen data security,
user IDs and passwords restrict access to only authorized users. Using secure passwords and changing them frequently
is critical to ensure security. When creating passwords, it is advised to utilize a mix of uppercase, lowercase, digits, and
special characters.
5. Communication
Communication with Other ICT users Using E-mail
E-Mail
Uses:
Email is a technique of sending and receiving messages and files via the Internet.
It is employed in personal communication, business communications, and marketing.
Acceptable language must be used based on the email's recipient, for example, professional when composing a work-
related email.
Employers frequently establish requirements for professional language, substance, and email frequency.
Email security is critical to preventing sensitive data from being accessed or manipulated.
Netiquette is the proper conduct and politeness when using email.
o Do not be abusive.
o Do not send spam.
o Be clear and concise with your message.
o Remember that posts are usually public and can be read by anyone.
o Always check your spelling and grammar.
o Respect people's privacy and do not discuss or publish information that might embarrass somebody.
o Forgive people’s mistakes.
o Do not use CAPITAL LETTERS to highlight comments.
o Do not plagiarize.
26
o Do not use too many emoticons, as they might annoy your readers.
Email groups enable mass communication to a specific group of subscribers.
Spam
It is defined as any unwanted email delivered via the Internet. These can range from annoying to genuinely harmful, as they
may contain viruses.
The main disadvantages are:
wasting time
annoying people
using up valuable bandwidth on the internet, thus slowing it down
may have viruses or be a part of a phishing scam.
can take up significant space in user inboxes.
To minimize the spam, you receive:
use spam filters.
avoid disclosing your email address publicly.
do not click on links in spam emails or reply to them.
27
Uses of the Internet:
A vital communication tool that allows people to communicate via emails, instant messaging, and other means.
It acts as a massive database of information on almost any subject.
The Internet has transformed business by offering a platform for online purchasing, electronic payments, and digital
transactions, allowing enterprises to reach global consumers.
28
o allow for reader comments, facilitating some level of discussion.
o often focus on specific topics, such as food, travel, fashion, technology, or personal experiences
o also serve as a platform for sharing opinions or insights
Forum:
o an online discussion site where people can hold conversations in the form of posted messages.
o often organized around specific topics or interests and divided into categories known as threads.
o primarily focused on peer-to-peer interaction
o may require users to create an account before posting.
o can be moderated or unmoderated.
A moderated forum is an online discussion forum in which an administrator checks posts before they
are allowed to be posted.
The internet is a huge unmoderated forum. No one ‘owns’ the internet, and it is not policed.
Wiki:
o a type of website that allows users to add, remove, or edit content.
o designed to facilitate collaboration and knowledge sharing from many people.
o holds information on many topics which can be searched.
o posts are not in chronological order.
o structure is determined by the content or its users.
o The most famous wiki is Wikipedia, an online encyclopaedia.
o changes can be tracked and reverted if necessary, and the content is usually written in a neutral style.
Social networking:
o platforms where users can connect with others and share content.
o include platforms like Facebook, Twitter, Instagram, and LinkedIn
o require users to create a profile and allow them to share text, images, videos, and links.
o facilitate interaction, collaboration, and information sharing on a large scale.
o privacy settings allow users to control who can see their content.
29
o it is the location of the file or resource on the server.
o it can contain the name of the file or directory where the resource is located.
A URL looks like this:
o protocol://domain/path/filename
o E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a URL that consists of the HTTPS protocol, the
domain name "www.hoddereducation.co.uk", the path is “IGCSE” and the filename is “ICT”
A hyperlink is a word/phrase/image which references data that the reader can follow by clicking or tapping, usually
taking you to another web page.
A web browser is a software application used to locate, retrieve, and display content on the WWW, including web
pages, images, video, and other files.
Speed of Searching
Search engines may scan billions of online pages to locate matches to your search query in a fraction of a second.
Your internet connection and the effectiveness of the search engine's algorithms influence the speed.
Amount of Information
Because search engines can deliver a deluge of information, utilising particular and relevant search phrases is critical.
Adding quotation marks for specific phrases, "+" signs for required terms, and "-" signs for omitting terms can help
narrow the search.
30
Internet Protocols
Protocols are rules on which the sender and recipient agree when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is being accessed, entering http:// at the front of an address tells
the web browser that ‘HTTP rules’ for communication are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when transferring files from one computer to another over the internet.
It is like HTTP, but the protocol specifically transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to be sent and received securely over the internet.
31