Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views31 pages

ICT Notes EoY Exams

The document provides an overview of various input and output devices used in computing, detailing their uses, advantages, and disadvantages. It covers devices such as keyboards, mice, scanners, and printers, explaining how they facilitate user interaction with computers and the processing of data. Additionally, it discusses direct data entry devices like magnetic stripe readers and QR code scanners, highlighting their efficiency and security features.

Uploaded by

zayan0903
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views31 pages

ICT Notes EoY Exams

The document provides an overview of various input and output devices used in computing, detailing their uses, advantages, and disadvantages. It covers devices such as keyboards, mice, scanners, and printers, explaining how they facilitate user interaction with computers and the processing of data. Additionally, it discusses direct data entry devices like magnetic stripe readers and QR code scanners, highlighting their efficiency and security features.

Uploaded by

zayan0903
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

ICT Notes

1. Input & Output Devices


Input Devices and Their Uses
 An input device is any hardware device that allows a user to enter data or instructions into a computer directly.
 An input device can send data to another device, but it cannot receive data from another device.
 Input devices are necessary for a computer to receive commands from its users and data to process; they are under the
user's control or can be direct data entry.
Input devices can be complicated because they must ensure the user can interact with the computer correctly.

1. Keyboards:
Uses:
 Input of data into applications software
 Typing in commands to the computer
Advantages:
 Fast entry of new text into a document.
 Easy to use for most people.
 Easier to do verification checks as data is entered (can compare the source document with typed data on the screen).
Disadvantages:
 It can be difficult to use if the user has limited arm/wrist use.
 Slow method when compared to direct data entry.
 It is a large device that uses up valuable desk space.

2. Numeric keypads:
Uses:
 Automatic teller machines (ATMs), where the customer can key in their PIN, amount of money, etc.
 Mobile phones allow phone numbers, etc., to be keyed in.
 Point of sale terminals (POS)
 Chip and PIN devices when paying by credit/debit cards.
Advantages:
 Faster than standard keyboards when entering numeric data.
 Because many are small devices, they are very easy to carry around.
Disadvantages:
 Sometimes, they have small keys, which can make input more difficult.
 Sometimes, the order of the numbers on the keypad is not intuitive.

3. Mouse:
Uses:
 Opening, closing and minimizing software
 Grouping, moving and deleting files.
 Image editing, for example, controls the size and position of a drawing pasted into a document.
 Controlling the position of a pointer on the screen to allow selection.
Advantages:
 It is a faster method for choosing an option than a keyboard.
 It's a very quick way of navigating through applications and the internet.
 Does not need a large desk area when compared to a keyboard.
Disadvantages:
 More difficult for people with restricted hand/wrist movement than using a keyboard for data entry.
 Easy to damage, the older type of mouse quickly becomes clogged up with dirt.
 Difficult to use if no flat surface is readily available.

1
4. Touchpad:
Uses:
 Opening, closing and minimizing software
 Grouping, moving and deleting files.
 Image editing, for example, controls the size and position of a drawing pasted into a document.
 Controlling the position of a pointer on the screen to allow selection.
Advantages:
 Faster than a keyboard for choosing options.
 Used to navigate applications and the internet.
 Integrated touchpad in the laptop, no need for a mouse
Disadvantages:
 People with limited hand/wrist movement find the device difficult to use.
 It can be more difficult to control the pointer when compared to a normal mouse.
 Drag and drop operations are more complicated using a touchpad.

5. Tracker ball:
Uses:
 A good alternative to a mouse for people with conditions such as RSI.
 Used in an industrial control room environment.
 Used in some luxury cars to select functions such as radio.
Advantages:
 Does not need the same fine control as a mouse.
 More accurately position the pointer on the screen.
 They are more robust than a mouse, plus they require less wrist movement.
Disadvantages:
 It is not supplied with the computer as a standard; therefore, it is more costly.
 Users may need training because it is not standard equipment.

6. Remote Control:
Uses:
 Televisions, satellite systems, DVD/Blu-ray players and Hi-Fi systems, to alter controls such as volume, on/off, etc.
 Used to control multimedia systems.
 Used in industrial applications to remotely control processes.
Advantages:
 It can be operated from any reasonable distance.
 In some conditions, e.g., in chemically hazardous environments, we can
control and measure from safe distances.
Disadvantages:
 Difficult to use for people with limited hand/wrist movements.
 Physical obstacles can easily block the signal.

7. Joysticks:
Uses:
 Used in video games.
 Used in simulators to mimic the actual controls.
Advantages:
 It is easier than keyboards for screen navigation.
 In some applications, the control is more realistic than using a mouse.
Disadvantages:
 The on-screen pointer is more difficult to use.

8. Driving wheel:
Uses:
 Used in video games, especially car racing games.
 Used in simulators to mimic actual vehicle controls.
2
Advantages:
 It's a more realistic experience than both mouse and joystick.
 Easier than a keyboard or joystick to control steering movements.
Disadvantages:
 It is a rather expensive input device as compared to a mouse or joystick.
 Steering movements tend to be over-sensitive, which gives an unrealistic feel.
 Unless it is an expensive simulator, feedback to the steering wheel is non-existent.

9. Touch screen (as an input device):


Uses:
 Automatic teller machines (ATMs) to choose from on-screen options.
 Point of sale terminals such as in restaurants.
 Interactive whiteboards in education.
Advantages:
 Faster entry of options than using a keyboard or mouse.
 User-friendly method – no training necessary in its use.
 Option to expand the size of the display if necessary.
Disadvantages:
 A limited number of input options are available.
 Can lead to problems if an operator uses system frequently (arm muscle strain, RSI, etc.).
 The screen can get very dirty with constant touching.

10. Scanners:
Uses:
 Scanning documents and converting them into different formats
 Scanning old documents to protect them in case the original is lost/damaged.
 Scanning barcodes at POS terminals.
Advantages:
 Images can be stored for editing later.
 When used with OCR, much faster and accurate than typing the documents.
 Possible to recover damaged documents by scanning and producing a copy.
Disadvantages:
 Limited quality, depending on how good the scanner’s resolution is.
 Fairly slow input method, especially if colour mode is selected.

11. Digital Cameras:


Uses:
 Data-capture device, e.g., as a reversing aid in cars.
 Dentistry, to help capture pictures for better diagnosis.
 The creation of virtual reality tours around houses, buildings, etc.
Advantages:
 Better-quality photographs than traditional cameras, higher resolution.
 Uploading photo to a computer is faster than scanning hard copies.
 Store and capture huge quantities of photographs quickly.
 Unwanted images can quickly be deleted from a memory card.
Disadvantages:
 Need to be computer literate to know proper use.
 Loss of artistry due to clever software doing all the work.
 Images need to be compressed to reduce the amount of memory used.

12. Microphones:
Uses:
 To input speech to be used in various applications, like voice recognition software.
 As a sensor to pick up sound in an intruder alarm system.

3
 Used in audio conferencing or VoIP applications.
Advantages:
 It is faster to read text than it is to type it in.
 Possible to manipulate sound in real time rather than working on a completed recording.
 It improves security if used as an authentication system.
Disadvantages:
 Sound files use up a lot of computer memory.
 Reading data is more error-prone than typing in.

13. Sensors:
Uses:
 Temperature sensors are used in central heating systems, ovens, glasshouses, etc.
 Pressure sensors are used in intruder alarm systems and washing machines.
 Light sensors are used in automatic glasshouses, doors, and streetlights.
 Sound sensors are used in intruder alarm systems, monitoring liquid and powder flow in pipes.
 Moisture sensors used in automatic glasshouses, environmental monitoring, and in some factories.
 pH sensors are used in automatic glasshouses, chemical processes and environmental monitoring.
Advantages:
 Readings are more accurate than human operators.
 Are continuous (breakless monitoring), any action/warnings needed will be initiated immediately.
 Automatic systems don’t need human intervention.
Disadvantages:
 Faulty sensors can give spurious results.
 Most sensors are analogue; therefore, they require conversion using Analogue to Digital Convertors.

14. Light pens:


Uses:
 Selecting objects on CRT screens
 Drawing on screens
Advantages:
 Greater accuracy than touch screens
 Small makes them portable and capable of being used in small spaces.
 Easy-to-use technology.
Disadvantages:
 Lagging problems while drawing on the screen.
 It only works with CRT monitors.
 Rather outdated technology.

Direct Data Entry & Associated Devices


1. Magnetic Stripe Readers:
Uses:
 On credit/debit card for use at ATMs
 Security device to allow entry to buildings, hotels, etc.
Advantages:
 Faster and error-free unlike manual data input.
 Secure information isn’t in human-readable form.
 Robust, there are no moving parts.
Disadvantages:
 If the card is damaged, the data is lost.
 Doesn’t work at a distance.
 As the information isn’t human-readable, this can be a disadvantage in some cases.

4
2. Chip and PIN reader:
Uses:
 Where payments are made using cards
Advantages:
 It is more secure than contactless cards as the PIN acts as a second security layer.
 More robust system than Magnetic Stripe Cards
Disadvantages:
 Be very careful so the PIN isn’t seen by anyone while being typed in.

3. Radio Frequency Identification (RFID) reader:


Uses:
 Livestock tracking
 Admission passes.
 Library books, to acknowledge the books which have been borrowed.
Advantages:
 Very robust and reliable technology.
 Very fast read rate so bulk detection is possible.
 Bidirectional data transfer.
Disadvantages:
 Because they are based on radio waves, tag collision occurs, and they are easy to jam/interrupt.
 Easy to hack into the signal.
 RFID is more expensive than a comparable barcode system.

4. Optical Mark Reader/Recognition (OMR):


Uses:

Used in MCQs checking.

Used in reading voting papers.
Advantages:
 Very fast way of inputting survey results.
 It is more accurate because there is no human intervention.
 More accurate than OCR methods.
Disadvantages:
 Designing the forms can be complicated to ensure the marks are correctly positioned.
 If there are problems, they need to be manually checked, which can be time-consuming.

5. Optical Character Recognition/Reader (OCR):


Uses:

Processing passports and identity cards.

Converting hard copy documents into electronic form, like digitizing historic documents.

Used in automatic number plate recognition (ANPR) systems.
Advantages:
 It is a much faster data entry system than manual typing.
 No human intervention, its error free.
Disadvantages:
 System has difficulty in reading different handwritings.
 Still not a very accurate technique.
6. Magnetic Ink Character Recognition (MICR):
Uses:

Reading cheques in banks

Processing financial documents

Verifying the authenticity of printed characters
Advantages:
 High accuracy in reading characters
 Fast processing of large volumes
5
 Secure and difficult to forge
Disadvantages:
 Requires special ink and fonts
 Expensive equipment
 Limited to specific applications

7. Barcode readers:
Uses:
 Used in supermarkets for stock control.
 In libraries, to keep track of books.
 As a safety function to ensure checking of electrical equipment daily.
Advantages:
 Much faster than manually keying in data.
 Allow automatic stock control.
 They are a tried and trusted technology.

Disadvantages:
 Relatively expensive system to administer.
 Not fool-proof, barcodes can be swapped between items.
 Can be more easily damaged than RFID tags or magnetic stripes.

8. Quick response (QR) code scanner :


Uses:
 used in advertising to contain information about the advertising company.
 Wi-Fi authentication
 Used in restaurants, you can see the menu by scanning.
Advantages:
 hold much more information than normal barcode.
 fewer errors than with barcodes.
 QR codes are easier to read because the cameras can even read them on a smartphone.
 It is possible to encrypt QR codes.
Disadvantages:
 More than one QR format is available.
 QR codes can be used to transmit malicious data.

Output Devices and Their Uses


1. Cathode ray tube (CRT) monitors:
Uses:
 Their large screens allow complex diagrams to be created in Computer-aided design.
 Used with light pens to allow designs to be created.
Advantages:
 Can be seen at a wider range of angles, unlike LCDs.
 Allow the use of light pens.
Disadvantages:
 They are very heavy and bulky.
 Much more power demanding than LCDs and they risk overheating and fire if left unattended.
 Their flickering can lead to headaches.

2. Liquid Crystal Display (LCD) screens:


Uses:
 Main output device for modern computers.
 Mobile phones, laptops, video games use LCD screens.
Advantages:

6
 Very efficient, low power consumption.
 Lightweight devices.
 No flickering images.
 Very sharp image resolution.
Disadvantages:
 Colour and contrast from different angles are inconsistent.
 Motion blur is a common issue.
 Lower contrast than CRT monitors.

3. Touch screen (as an output devices):


Uses:
 ATMs
 POS terminals
 Information kiosks.
Advantages:
 Don’t need additional input devices.
 They are very interactive; you can swipe and click to interact.
 They add a high-tech feel to devices and interfaces.
Disadvantages:
 They tend to get dirty with frequent use.
 Frequent use results in straining of arm muscles, RSI, etc.
 If large amounts of data are input/output, they aren’t very accurate, and the interface isn’t very fast.

4. Multimedia projectors:
Uses:
 Training presentations to allow the whole audience to see images.
 Advertising presentations.
 Home cinema systems.
Advantages:
 More people can watch as they don’t have to crowd around a laptop.
 Avoids the need for several networked computers.
Disadvantages:
 Images can be fuzzy.
 Expensive to buy.
 Set-up can be complicated.

5. Laser printers:
Uses:
 In uses where low noise is required.
 If fast, high quality, high-volume printing is required.
Advantages:
 Printing is fast so can handle very large print jobs.
 Quality is consistently high.
 Toner cartridges last for a long time.
Disadvantages:
 They are only considerably fast if several copies are being made.
 Colour laser printers are expensive to run.
 They produce ozone and volatile organic compounds because of their printing method and toner.

6. Inkjet printers:
Uses:
 Where low-output volumes are required.
 Where high-quality printing is required for single pages.

7
Advantages:
 High-quality output
 Cheaper than laser printers and very lightweight
 Don’t produce ozone and volatile organic compounds.
Disadvantages:
 Slow output if many copies needed, hence can’t do large print jobs efficiently.
 Printing can smudge if user isn’t careful.
 Can be expensive if used a lot.

7. Dot matrix printers:


Uses:
 Used in environments where noise isn’t a major issue.
 Carbon copies or multi-part outputs can be produced.
 Widely used in till receipts.
Advantages:
 Can be used in varying environments unlike laser/inkjet printers.
 Carbon copies or multi-part outputs can be produced.
 Very cheap to maintain and good for long-term use.
Disadvantages:
 Very noisy
 Initial cost is more than an inkjet printer.
 Very slow, poor-quality printing.

8. (Graph) Plotters:
Uses:
 Producing architectural drawings
 Producing engineering drawings
 Drawing animation characters.
Advantages:
 Very high-quality output.
 can produce large and colour drawings very accurately.
 Can print on a variety on materials.
Disadvantages:
 Very slow printing.
 Expensive equipment to purchase initially.
 Have a very large physical footprint compared to a printer.

9. 3D printers:
Uses:
 Custom-made prosthetic limbs.
 In aerospace, if parts of the aircraft are made using 3d printers they can be very lightweight.
 Making spare parts for items that aren’t now manufactured, e.g., parts of a vintage car.
Advantages:
 Manufacturing objects has become much easier.
 Even though the initial cost is high, it is still cheaper than the more conventional way.
 Parts for machinery that aren’t available can be made.
Disadvantages:
 Potential to make counterfeit items.
 Could lead to manufacture of dangerous items by almost anyone.
 Job loss potential.

10. Speaker:
Uses:
 Used in all phones and most computers.

8
 Helps visually impaired people.
 Plays downloaded sound files.
Advantages:
 Amplified sounds can be much louder than the original sound.
 Amplified sounds can be enough to be heard by a huge crowd.
 They are especially useful for blind people, for instance, reading e-books.
Disadvantages:
 Speaker output can disturb irrelevant people in the same area, e.g., an office.
 Sound quality is high only expensive speakers.
 They take up a lot of desk space.

11. Actuators:
Uses:
 Used to turn on motors, buzzers, and switches.
 Allow a computer to control physical devices,
Advantages:
 Allow remote operation of many devices.
 Relatively inexpensive devices.
Disadvantages:
 They are an additional device in the system that could go wrong.
 As analogue devices, signals need to be converted using a DAC.

2. Storage Devices and Media


Backing-Up Data
 Backing up refers to copying files or data into a different medium in case of damage or loss of original copy.
Why do we back up data?
 To safeguard against loss of data.
 To safeguard against damages caused by hackers.
 In case files need to be sent elsewhere, to protect the original format of files.
 Backups can be stored online for easy access.

Magnetic Backing Storage Media


 Holds data magnetically.
 The surface area of the media is magnetised so that it can hold bits of data.
 The device that reads media can also read the bits held on the surface area.

Magnetic tape drives


Uses:
 used in applications where batch processing is used.
 used as a backup media where vast amounts of data need to be stored.
 used in long-term archiving of data, they have huge data storage capacities and are known to be very stable.
Advantages:
 They are less expensive than hard disk drives.
 It is a very robust technology.
 Huge data storage capacity with a fast data transfer rate.
Disadvantages:
 Prolonged data access times (uses serial access).
 When updating, another tape is needed to store the final updated version.
 They are affected by magnetic fields; a strong field can corrupt data stored on the tape.

9
Fixed Hard Disks/Drives
Uses:
 To store the OS, systems software and working data/files.
 Used in real-time systems and in online systems.
 Used in file servers for computer networks.
Advantages:
 They have a very fast data transfer rate and fast access times to data.
 They have a very large memory capacity.
Disadvantages:
 It can be easily damaged.
 They have many moving parts which affect overall reliability.
 Their read/write operation can be quite noisy when compared to solid-state drives.

Portable Hard Disk Drives


Uses:
 Can be used as a backup system to prevent data loss.
 It can be used to transfer data/files/software between computers.
Advantages:
 Data access time and data transfer rate are very fast.
 It has a very large memory capacity.
 It can be used as a method of transferring information between computers.
Disadvantages:
 Easily damaged if user accidentally drops it or does not correctly shut down the drive after use.
 The data transfer rate is not as fast as for fixed hard disk drives.

Floppy Disks
Uses:
 Storing and transferring small files
 Booting older computer systems
 Software installation (historically)
Advantages:
 Portable and lightweight
 Rewritable
 Cheap to produce
Disadvantages:
 Very limited storage capacity (1.44 MB)
 Easily damaged (magnetically or physically)
 Obsolete in modern systems

Optical Media and Optical Storage Devices


 Holds data by burning ‘dots’ onto the surface with a high-powered laser.
 The data that reads the media can read the data by shining a lower-powered laser over the dots.

CD-R/DVD-R ~ Write Once Only


Uses:
 Home recordings of music and (CD-R) and films (DVD-R).
 Used to store data to be kept for later use or transferred to another computer.
Advantages:
 Cheaper medium than RW disks.
 Once burned (and finalised), they behave like a ROM.
Disadvantages:
 It can only be recorded once; if an error occurs, then the disk must be thrown away.
 Not all CD/DVD players can read CD-R/DVD-R.

10
CD-RW/DVD-RW ~ Read and Write
Uses:
 Used to record television programs which can be recorded over, time and time again.
 Used in CCTV systems.
 It can be used as a backup device for files and data.
Advantages:
 It can be written over many times.
 You can use different file formats each time it is used.
 It is not as wasteful as the R format because the files/data can be added later.
Disadvantages:
 It can be expensive media.
 Possible to accidentally overwrite data.

CD-ROM/DVD-ROM ~ Read Only Memory


Uses:
 Cannot be written over and can only be read. Permanent storage method.
 CD-ROM is used to store music files and to store software, computer games and reference software.
 DVD-ROM has much larger storage and is used to store films.
 Used in applications where there is a real need to prevent deletion or overwriting of important data.
Advantages:
 They are less expensive than hard disk drive systems.
 They are very portable as they are small and light.
 Data stored on them is read-only, so it cannot be accidentally overwritten.
Disadvantages:
 Hold far less data than hard disk drives or memory sticks.
 Very slow data transfer rate and data access times, as compared to hard disk drives.
 You cannot add your files to the disks because they are both read-only.

Blu-Ray Discs
The main differences between DVD and Blu-ray are:
1. Blu-ray uses a blue laser rather than a red laser. (The wavelength of blue light is 405nm, much smaller than the 650nm
red laser) This makes pits and lands much smaller, so they store five times more data than DVDs.
2. Blu-ray disks automatically come with a secure encryption system, which helps to prevent piracy and copyright
infringement.
3. The data transfer rate for a DVD is 10 Mbps, and for a Blu-ray disc, it is 36 Mbps.

Uses:
 Home video consoles like for storing and playing movies
 Computers can use this technology for data storage or backing hard drives.
 Camcorders can use this media to store movies.
Advantages:
 Very large storage capacity and very fast data transfer rate.
 The data access speed is also greater than with other optical media.
 Blu-ray discs automatically come with a secure encryption system.
Disadvantages:
 Expensive discs.
 Encryption problems when used to store videos.
 Introduction of HD (high definition) DVD players has reduced the advantages of Blu-ray technology.

Solid State Backing Storage


 Holds data on devices that do not have any moving parts.

11
Solid-state drives (SSD)
Uses:
 Storage device to store files, applications, OSs, and so on.
Advantages:
 SSDs offer faster data access (0.1 ms vs 10 ms) and transfer speeds compared to HDDs.
 SSDs consume less power and run cooler than HDDs.
 This makes them more reliable, thinner, lighter, and suitable for portable devices like laptops.

Disadvantages:
 SSD endurance - SSDs are conservatively rated at only 20GB write operations per day over three years.
 More expensive than magnetic hard disks.
 Smaller storage capacity than magnetic hard disks.

Hard Disk Drives (HDD)


Uses:
 Storage device to store files, applications, operating systems, and backups.
Advantages
 Offers larger storage capacity than SSDs
 More budget-friendly for high storage needs
 Suitable for long-term data storage
Disadvantages
 Slower data access and transfer speed
 Heavier with damage-prone moving parts
 Consumes more power and generates heat

Pen drives (Memory sticks)


Uses:
 Transporting files between computers or using them as a backing store.
 Used as a security device to prevent software piracy (known as a dongle).
Advantages:
 Very compact and portable media.
 Very robust also unaffected by magnetic fields.
 Does not need additional software to work on most computers.
Disadvantages:
 Cannot protect the data/files by making it ‘read-only.’
 Easy to lose (due to the small physical size).
 The user needs to be very careful when removing a memory stick from a computer - incorrect removal will corrupt the
data on the memory stick and make it useless.

Flash Memory cards.


Different types of memory cards:
» SD cards (secure digital card; widely used in portable devices).
» XD cards (extreme digital card; found in older digital cameras).
» CFast card (compact, fast card; designed for high-speed data transfer in professional cameras).
Uses:
 Storing photos on digital cameras.
 Used as mobile phone memory cards.
 Used in MP3 players to store music files.
 Used as a backing store in hand-held computer devices.
Advantages:
 Very compact, so can easily be carried around in smartphones and cameras.
 Because they have no moving parts, they are very durable.
 They can hold large amounts of data.
Disadvantages:
12
 Expensive per gigabyte of memory when compared to HDDs even when they have lower storage than hard disks.
 Have a finite life regarding the number of times they can be read from or written to.
 Users must often purchase a card reader or USB converter to view the data.

3. ICT Applications
Communication
Newsletters and posters
 Paper-based communication is used to inform people about their interests.
 Schools use these to inform parents about events/dates.
 Advantages
o Released regularly.
o The recipients have a permanent copy.
 Disadvantages
o Requires distribution, which is why there are printing costs, paper/ink.
o There are no special effects, sound/video/animation.
o The targeted audience may or may not receive the information.
Websites
 Collection of webpages, text, graphics, video, and sound
 Hosted on a web server on the internet.
 Need to write code or use a web authoring application.
 Hyperlinks to other pages can be added.
 Interactive websites require programming knowledge.
 Can use a camera, scanner, and microphone to input data.
 Usually, hire space from the web hosting company.
 Advantages
o Multimedia support like sound, video, and animation
o Navigation and hyperlinks to other pages/sites
o Visitor tracking and global advertising options
 Disadvantages
o Can be hacked and modified, or viruses introduced.
o Need for a computer and internet connection and it needs regular maintenance once set up.
o Lack of portability compared with the paper-based system.

Multimedia Presentations
 Uses a mixture of media to present information: animations, video, sound, transitions, hyperlinks.
 Produced using software packages.
 Used with a projector so a large audience can view.
 Advantages
o Use of sound and animation/video effects
o Interactive/hyperlinks built into presentations.
o More likely to hold the audience’s attention.
 Disadvantages
o Need for special equipment – expensive
o Distracts the audience from the sole content of the presentation.
o It is very easy to make a presentation with too many features.

Media streaming
 Real-time transition of audio and video files over the internet
 allows users to access content without downloading it to their devices.
 popular services include Spotify, YouTube, and social media websites.

13
 uses buffering, which makes sure the video plays back smoothly without freezing. While the buffer receives data
packets, it sends previously received ones to the playback device so that there are no gaps in the played data.
 Advantages
o Users can access any information at any time and from any location.
o Offers an extensive library of content.
o Compared to traditional cable or satellite TV subscriptions, media streaming can be more cost-effective
 Disadvantages
o Heavily relies on a stable and high-speed internet connection.
o Not all content is available on every streaming platform due to licensing agreements and exclusivity deals.
o You do not own any titles, so if it were to be removed by the service providers, you will lose access to it.

ePublications
 digital versions of printed materials, such as eBooks, eMagazines, and eNewspapers.
 It can be read on electronic devices.
 Advantages
o aid portability
o they are often more affordable than paperback books.
o Offer interactive elements that enhance the reading experience.
 Disadvantages
o reading from an electronic device for a prolonged time can cause eyestrain.
o ePublications lack the tactile experience and physical presence that some readers enjoy.
o compatibility issues can arise if the ePublications is in an unsupported format.

Comparison of Posters and E-publications


Posters
 Printed and displayed in physical locations.
 Static and cannot be updated once printed.
 Limited in design features (no animation/sound)
 Audience must be physically present to see them.
E-publications
 Digital format, often accessed via websites or email.
 Can be updated quickly and easily.
 Supports multimedia (videos, sound, interactive links)
 Wider reach as they can be viewed anywhere online.

Mobile Communication
Mobile devices support many forms of communication, such as:
1. Short message service (SMS) messaging: permits extremely quick communication with another person via typing on a
keyboard (a mobile phone or tablet's keyboard is frequently virtual). Its benefit is that the recipient can get the text whenever
they choose without being available.
2. Phone calls: Making calls while on the go is among the most fundamental applications of a mobile phone. Mobile phones
are the perfect method to stay in correspondence anywhere there is a network signal because they are compact and have an
independent battery.
3. Voice over Internet Protocol (VoIP): a communication technique for Internet users. VoIP transforms sound captured by the
built-in mic of the cell phone into individual data packets that may be transmitted via the internet to their intended recipient.
4. Video calls: enables real-time video conversing between multiple participants with a camera-enabled device. Uses an
internet connection or cellular data. Software that may be used for video calling includes FaceTime, Skype, and Zoom.
5. Accessing the Internet: Another helpful feature is accessing the net from a mobile device. Any mobile device with a
wireless broadband connection or a mobile phone network can link to the internet.

Modelling Applications
Advantages of using models:
 Using models is safer and less expensive than building or testing the real thing
 They allow you to try out different scenarios in advance

14
 Models are much faster to use than performing real-life tasks

Disadvantages of using models:


 a model cannot be completely reliant as the output is entirely based on the input.
 frequently, computer modelling can be a very costly option.
 human reluctance is a common problem in this technology.
Some of the applications of computer modelling include:
1. Personal finance: Computer modelling helps people plan their finances. It can simulate different situations like investment
options or retirement plans. This helps individuals make better financial decisions.
2. Bridge and building design: Engineers use computer models to test how bridges and buildings will react to forces. This
helps ensure safety, strength, and better design before construction starts.
3. Flood water management: Computer modelling is used to predict how water will move during floods. It helps plan flood
barriers and emergency responses, reducing damage to communities.
4. Traffic management: Traffic flow can be studied using computer models. These models help design better roads, manage
traffic lights, and reduce traffic jams.
5. Weather forecasting: Weather models simulate the atmosphere to predict future conditions like rain, wind, or storms. They
help meteorologists give accurate forecasts and issue safety warnings.
 Advantages of using computer modelling rather than humans:
o Provides more precise and accurate results than human-based methods, reducing errors and increasing
reliability.
o Can analyse large amounts of data and perform complex calculations faster than humans.
o Reusable and updated easily, reducing need for repetitive manual analysis and lowering costs in the long run.
 Disadvantages of using computer modelling rather than humans:
o May overlook nuanced factors or intangible elements that humans can consider, leading to potential gaps or
inaccuracies in the analysis.
o Based on assumptions and simplifications, introducing a level of uncertainty.
o Their programmed algorithms and data inputs bind models. They may struggle to adapt to unforeseen
circumstances or rapidly changing conditions that humans can more readily navigate and respond to.

Computer-controlled Systems
 Robotics in manufacturing involves using automated machines to perform tasks such as assembly, welding, and
packaging. These robots are designed to mimic human actions with precision and speed, increasing productivity and
quality control. They offer benefits like enhanced worker safety, improved efficiency, and the ability to handle
repetitive tasks, revolutionizing the manufacturing industry.
 Advantages:  Disadvantages:
o Can work in dangerous or harmful o Struggle with unusual or unpredictable tasks
environments o Can lead to higher unemployment and
o Can operate continuously without breaks deskilling
o Lower running costs with fewer employees o High initial setup and maintenance costs
needed
 Production line control: Computer-controlled systems in production line control involve using computers and
software to monitor, coordinate, and optimize manufacturing processes. These systems ensure efficient coordination of
machinery, manage inventory, track production metrics, and automate tasks. They enable real-time data analysis, error
detection, and adjustment, improving productivity, reducing downtime, and enhancing overall operational efficiency in
the production line.
 Autonomous vehicles: Self-driving cars and drones guided by computer algorithms.
o enhance safety.
o reduce traffic congestion.
o increase fuel efficiency.
 Advantages of using computer-controlled systems rather than humans:
o increased efficiency, productivity and greater consistency
o ability to work in any environment with reduced human error.
o can work with large or delicate items.
 Disadvantages of using computer-controlled systems rather than humans:
o very high instalment and maintenance costs
o lack of flexibility
15
o requires costly backup systems.

School Management Systems


Computer-controlled School Management Systems: Comprehensive software applications that automate administrative
tasks, such as attendance tracking, grading, scheduling, and student information management, improving educational
institutions' efficiency, accuracy, and organization.

 Advantages:  Disadvantages:
o Absenteeism can be addressed more o Operating the software will require
quickly. training.
o Parents are kept updated. o The initial cost of the software is very
o Reduced workload for teachers. high.
o Unauthorized access has to be prevented
due to personal information.

 Learner registration and attendance


o ID cards with magnetic tapes: The students will have to swipe their ID cards, which contain the student’s
name, school’s name, date of birth and the registration ID when they enter and leave the school; this way, time
is saved, and the attendance is more accurate.
o Biometrics: Every student’s fingerprint is stored on a database along with their personal information, the
students must put their finger on a fingerprint scanner to enter or leave the school premises.

 Advantages of biometrics over magnetic ID cards


o Unique fingerprints disable attendance forgery.
o Portability makes them easy to lose.
o Easy to be stolen due to small size and ID cards can be easily cloned.

 Disadvantages of biometrics over magnetic ID cards


o It is time-consuming for all fingerprints to be individually collected.
o Expensive equipment is required to read fingerprints.
o If the finger is cut/damaged, the fingerprint will not be readable, and access will be denied.
o There is an invasion of privacy in storing fingerprints on a school database.

 Learner’s performance
o Spreadsheets can be used to record students’ performances. It is easier to compare each other’s performances
and an individual student’s performance over the academic year.

 Computer-aided learning
o The use of computer-based technologies to help students acquire academic material is known as computer-
aided learning (CAL). They are meant to supplement classroom instruction, not serve its purpose. Students
will take online assessments to track their progress while learning on computers. Although CAL cannot
consistently assist a student with an issue, in certain circumstances, students would need to get other aid.

Booking Systems
These web-based platforms and applications allow users to reserve and purchase tickets or services for various events and
industries. Some of the applications for online bookings include:
1. Travel industry: Booking flights, hotels, and holiday packages provides a convenient platform for travellers to plan and
book their trips.
2. Concerts: Reserving tickets for live music events allows music fans to secure their spot at popular concerts.
3. Cinemas: Booking movie tickets in advance enables cinemagoers to reserve seats and avoid queues.
4. Sporting events: Purchasing tickets for sports matches and competitions offers sports enthusiasts an easy way to attend their
favourite events.

Advantages: Disadvantages:
o Convenience and instant ticket confirmation o Potential technical issues and security
o Ability to compare prices and get personalized concerns
offers o Transaction fees and impersonal service
o Automated reminders and easy repeated o Dependent on stable internet and may cause
16
Banking Applications
 Online banking systems depend on the ability to update files instantly to avoid double scheduling, which might occur
if the system reaction time is slow.
 The use of computer technology has revolutionized how we do our banking transactions, for example:
o Internet banking
o The use of automated teller machines (ATMs)
o Chip and PIN technology.

Automated Teller Machines (ATMs)


Automated teller machines (ATMs) are places where customers can get cash (or carry out certain other banking activities, such
as ordering a statement) using their credit or debit card.

Sequence at ATM What goes on behind the scenes

Customer puts card into ATM Contact is made with bank’s computer

PIN is checked to see if it is correct.


Card is checked to see if it is valid.
PIN is entered using the keypad
The transaction is closed if the card is stolen or the number of PIN attempts
allowed is exceeded.

Several options are given change PIN, pay in


cheques, pay a bill, see balance, get money

The customer selects the cash option &


several cash options are shown

The customer’s account is accessed to see if they have sufficient funds, it is


The customer accepts one of the options or checked to see if they are withdrawing more than their daily limit.
types in a different amount If the limit is not exceeded and all other checks are OK, then the transaction
is authorized, and the machine then counts out the cash

The customer is asked if they want a receipt

The card is returned

Money is dispensed Customer’s account is updated

 Advantages:  Disadvantages:
o Available 24/7 for cash withdrawal and o Risk of theft and shoulder surfing
banking o Some banks charge fees for ATM use
o Access accounts from anywhere in the world o Withdrawal limits imposed
o Usually, faster service than bank queues

Electronic Funds Transfer (EFT):


It is possible to send money transfer instructions directly to a bank's computer system via electronic funds transfer (EFT)
technology. The system depends on electronic money transfers between accounts; no cash is moved. The computer system
automatically moves the requested amount from one account to another when it receives an EFT command.

 Advantages:  Disadvantages:
o very secure and fast payment method o the bank transaction cannot be reversed
o less expensive than cheques without full dispute investigations.
o customers can dispute an EFT payment o customer needs to have funds available
within 60 days. immediately.
o cannot guarantee the recipient’s identity.

17
Credit/debit card transactions.
Several credit/debit cards come with a magnetic stripe and a chip, the chip houses essential data like the PIN. This technique is
intended to increase security because it is superior to a signature. A chip and PIN card to make purchases is an example of an
electronic funds transfer (EFT).
 Advantages of credit cards:  Disadvantages of credit cards:
o customer protection on undelivered goods. o high interest rates and annual fees.
o accepted internationally and online o risk of credit damage.
o interest-free loan if money is paid on time o security risks in online transactions
 Advantages of debit cards:  Disadvantages of debit cards:
o money deducted immediately, no interest o less protection if goods don’t arrive.
o safer than carrying cash. o no credit allowed; funds must be available
o can make online purchases. o security risks in online transactions

Cheques
Individuals and organizations use cheques as a form of payment. When issuing a cheque, the payer writes the recipient's name,
the payment amount, and the date on the cheque. The recipient then deposits or presents the cheque to their bank for
processing. The payer's bank verifies the fund’s availability, and upon clearance, the specified amount is transferred from the
payer's account to the recipient's account, completing the transaction.
 Advantages:  Disadvantages:
o more convenient and safer than cash o not legal tender and can be refused
o can be post-dated. o slow method of payment
o can be traced if they are lost. o expensive payment method

Internet Banking
Enable online access to banking services via a secure website or app, allowing for transfers, bill payments, account
management, and more.
 Advantages:  Disadvantages:
o convenient 24/7 access and easy management o security risks and fraud possibility
o visits to bank branches not required o requires a reliable internet connection.
o interest rates may be better. o physical cash cannot be deposited/withdrawn.

Computers in Medicine
Information Systems in Medicine
 Patient records: Healthcare professionals maintain databases to communicate information between them and
pharmacists (for instance, to guarantee no medications are administered that interact dangerously with one another).
 Pharmacy records: Pharmacy records maintain a comprehensive record of patient prescriptions. This includes details
like the prescribed medication, dosage, quantity dispensed, prescribing physician's information, and the date of
dispensing. These records help track medication usage and can be used to verify prescription accuracy and detect
potential drug interactions or allergies.

3D Printers
 Using 3D printers in medicine:
o Prosthetics: 3D printers print out artificial body parts such as false teeth, artificial limbs, hearing aids, etc.
This is a less expensive method of replacing body parts.
o Tissue engineering: it is the field of combining cells, biomaterials, and engineering principles to create
functional tissues or organs, aiming to repair or replace damaged or diseased tissue in the human body.
o Artificial blood vessels are synthetic structures designed to mimic the function of natural blood vessels,
facilitating the flow of blood and nutrients throughout the body to support tissue repair and regeneration.
o Customized medicines are personalized drug formulations tailored to individual patients' specific needs. They
utilize advanced technology and precise measurements to create medications with accurate dosages and unique
compositions, optimizing treatment outcomes.

Expert Systems
It is an AI-based computer program that emulates the decision-making capabilities of human experts. It uses knowledge and
rules to provide accurate advice or solutions in a specific domain.

18
Examples include:
 Diagnostics
 Mineral prospecting
 Tax and financial calculations.
 Strategy games
 Identification of plants, animals, and chemical compounds
 Route scheduling for delivery vehicles

Components of an Expert System


1. User Interface
 This is the only thing that the end user sees.
 Allows the user to interact with the system.
 Often requires training to operate effectively.

2. Explanation system
 Informs the user of the reasoning behind the expert system’s conclusions.
 It will supply a conclusion and any suggested actions to take.
 It will also give the percentage probability of
the accuracy of its conclusions.
3. Inference engine
 The main processing element of the system
 It acts like a search engine examining the
knowledge base.
 Responsible for gathering information.
 This is the problem-solving part of the system.
 Attempts to use information gathered from the
user to find a matching object.
4. Knowledge base
 It is a repository of facts.
 stores all the knowledge about an area of expertise.
 a collection of objects and their attributes
5. Rules base
 The rules base is a set of inference rules.
 Used by the inference engine to draw conclusions.
 They follow logical thinking.

How an expert system is used to produce possible solutions.


Below is an example of how an expert system works to diagnose a medical issue:
 The interactive screen asks questions for the doctor to answer using a keyboard or a touch screen.
 The inference engine compares the symptoms with the knowledge base, using the rule base to find matches.
 The system suggests the possible illness with a probability of each, cures, and recommendations on the next step.
 The explanation system will explain how that diagnosis was suggested.

Computers in the Retail Industry


Point of sale (POS) terminals: Computerized systems used at checkout counters to handle purchases and oversee stock. It is
extensively used in retail stores to process sales transactions. They enable quick and secure payment processing through
various methods, including cash, credit/debit cards, mobile payments, and digital wallets. POS terminals calculate totals,
generate itemized receipts, update inventory, and provide real-time sales data for effective business management.
 Some features include:
o update stock files immediately.
o track inventory levels in real-time.
o prevent stock discrepancies and ensure accurate records.
o monitor inventory levels and reorder when stock is lower than a predefined value.
o streamline supply chain management and minimize stockouts.

19
Electronic funds transfer at Point of sale (EFTPOS) terminals: Devices for processing electronic payments; they allow
customers to make payments using debit or credit cards by securely transferring funds from their bank accounts. EFTPOS
terminals authenticate and authorize transactions in real-time, providing convenience and security for customers and businesses
during retail purchases.
The process of checking credit and debit cards at a supermarket EFTPOS is much the same as was described for paying a
restaurant bill in Section 6.6.
Some functions of EFTPOS include:
 Use of chip and PIN cards:
o Enhance security with two-factor authentication.
o Require customers to enter a personal identification number (PIN)
 Use of contactless cards:
o Allow for faster transactions.
o Enable customers to tap their card on the terminal.
 Use of Near Field Communication (NFC):
o Facilitate payments through smartphones and other devices.
o Increase convenience for customers.
 Communication between supermarket computers and bank computers:
o Share transaction details securely.
o Enable instant payment processing and verification.

Internet Shopping
Characteristics of Internet Shopping:
 Online stores accessible through web browsers
 A wide variety of products and services are available.
 Convenient and often open 24/7
Advantages (To customer): Disadvantages (To customer):
 access to the global market and compare products  security and privacy concerns
 worldwide with convenient home shipping  cannot physically examine products before purchase.
 all time shopping without waiting in queues  shipping delays and extra costs
Advantages (To business): Disadvantages (To business):
 targeted pricing and fast updates  increased competition and digital fraud risks
 cheaper advertising and larger customer base  technical issues and deliver costs
 increased profits from reduced staff  fake reviews can harm reputation.

Recognition Systems
Optical Mark recognition (OMR) media in schools:
 School registers: Paper-based registers are fed into OMR to be scanned and stored in a database.
 Multiple-choice examination papers: The position of a mark is stored in a computer’s memory after being read by
the OMR, a device using a template that maps out the X-Y coordinates of each tablet (pen/pencil mark).
 Used at POS terminals for scanning and reading the information stored in barcodes.
 Many digital devices have OMR scanners, which may be used to scan QR codes.

 Advantages:  Disadvantages:
o very fast way of inputting the results of a o designing the forms is a very complex job.
survey. o there can be problems if they have not
o more accurate than keying in data been filled correctly.
o more accurate than OCR methods o often only work with black pens or pencils

Optical Character Recognition (OCR)


 Automatic Number Plate Recognition (ANPR) systems:
o The sensor sends a signal to instruct a camera to capture an image of the front of the vehicle.
o An algorithm is used to locate and isolate the number plate from the image taken by the camera.
o The brightness and contrast of the number plate are first adjusted. Each character on the number plate is then
segmented.
20
o Each character is then recognized using OCR software. The characters are converted into a string of editable
text by the software.
o This text string is then stored in a database.
o A barrier is raised, and the motorist is issued with a ticket. The ticket shows the date and time of entering the
car park.
o When the car returns to the car park, they insert their ticket into a machine that calculates their charges and
registers the payment into the database.
 Advantages:  Disadvantages:
o Automates vehicle monitoring and parking o Privacy concerns over data collection
control o Dirty or damaged plates cannot be recognized
o Reduces number of staff and speeds up o Vulnerable to cloned plates bypassing security
processing
o Used for congestion charging and security

RFID in tracking stock:


 Tracking of stock using RFID involves either tracking livestock (on a farm) or goods in a shop, supermarket, or
distribution centre.
 RFID in passports:
o The data on the RFID chip is read when the passport is scanned.
o Your photo is clicked and compared to the RFID chip image.
o If face recognition passes, some checks are made to ensure you are eligible to enter the country, and if you are,
the gate opens automatically.
 RFID in automobiles:
o Tags allow or deny access to parking in a secure, private car park.
o RFID tags in lorries and delivery vans can be used at weigh stations to ensure the vehicle is not carrying too
much weight.
o RFID tags can be used on a car production line to track its progress through assembly.
 RFID in contactless payments:
o The embedded chip on credit/debit cards and the antenna enables customers to wave their card over a reader at
the point-of-sale terminals to make payments.
o Smartphone apps can also be used to make contactless payments.
 Advantages:  Disadvantages:
o No line-of-sight needed, fast and reliable o Signal interference (tag collision) issues
o Difficult to forge, reduces staffing costs o Susceptible to jamming and hacking
o Supports bulk detection and bi-directional data o Higher initial costs than barcodes

Near Field Communication (NFC):


 Enables short-range wireless communication between devices.
 Allows payment using a smartphone.
 Advantages:  Disadvantages:
o Convenient and secure method of payment o Limited range
o allows for contactless transactions. o compatibility issues with some devices

Biometric recognition:
 Usually refers to automated technologies for authenticating and verifying human body characteristics such as face, iris,
retina, finger, thumb, hand, and voice.
 Advantages:  Disadvantages:
o highly accuracy and very fast recognition o expensive setup and high memory usage
o easy to use and non-intrusive o can fail with voice changes or dirty skin
o vulnerable to voice recording misuse

Satellite Systems
Global Positioning Systems (GPS)
 Used to determine the exact location of several modes of transport.
 Cars usually refer to GPS as satellite navigation systems.
21
 Satellites surrounding the Earth transmit signals to the surface.
 Computers installed in the mode of transport receive and interpret these signals.
 Knowing their position on the Earth depends on very accurate timing – atomic clocks are used in the satellites, which
are accurate to within a fraction of a second per day.
 Each satellite transmits data indicating its position & time.
 The computer on board the mode of transport calculates its exact position based on the information from at least three
satellites.

Satellite Navigation (satnav):


 Used to determine the exact location of a car.
 The computers onboard can be used to show directions to a destination.
Advantages: Disadvantages:
 Helps drivers focus by reducing the need to check  Outdated maps can give wrong directions
paper maps  Road closures or loss of satellite signals cause
 Alerts about speed limits and important warnings problems
 Shows fastest routes and nearby petrol stations  Incorrect start or end points lead to inaccurate
information

Geographic Information Systems (GIS)


 Used to capture, manage, analyse, and display geographically referenced information.
 Use to determine the distance between two places.
 Used to find the nearest petrol station or restaurant, etc.
 To protect animal and plant life in certain vulnerable places.
 It can be used in geography, science, or engineering lessons.
Advantages: Disadvantages:
 Combines different geographical and thematic data  Long learning curve for software
 Handles and explores large amounts of data  Expensive to buy and maintain
 Integrates data from varied sources  Requires huge data input

Media Communication Systems


 Using satellite signals for communication.
 Used by media companies when sending stories/videos/pictures from remote locations.
Advantages: Disadvantages:
 Wide global coverage with high bandwidth  Signal delays and weather interference
 Cheaper and faster than cables in tough terrain  Affected by sunspot activity
 Easy to expand and secure with coded data  Requires regular monitoring to maintain orbit

4. Safety & Security


Physical Safety
Electrocution:
ICT devices require electrical power to charge or run; the electrical device can cause electrocution, caused by the electric
current moving through a body, causing fatal injuries and/or death.
There are multiple causes for electrocution, including:
 Contact between liquid substances and electronic devices: Keep liquids away from electrical equipment.
 Open cables: Ensure that cables are entirely insulated and packed and use circuit breakers or fuses to prevent
electrical overload.

Fire:
ICT devices require electricity to charge or run; too many devices using a single socket can cause the plug socket to overload,
and heat is generated by too much electricity, causing the wiring to degrade and ignite a fire.
The causes and reduction tactics for fire include:
 Socket overload: Ensure enough plug sockets in the room, do not plug too many devices into the same socket, and do
not leave devices plugged in and unattended.
22
 Overheated equipment: Ensure that equipment is properly ventilated and not obstructed, keep flammable materials
away from heat sources, regularly check equipment for signs of wear or damage, use fire extinguishers in case of
emergencies, turn off or unplug devices when away from the location, do not cover any air vents on devices.

Trailing cables:
Devices can be plugged in using cables. Cables that are protruding can cause an accident; you can trip over a cable left out in a
location, and body damage can occur during a fall, for example, breaking bones, ligament damage, bruising, sprains, etc.
depending on the area fell on
Trailing cables causes and prevention strategies:
 Unorganized/insecure cables: use cable ties to secure cables, keep cables packed correctly in, let us say, a table,
therefore not coming in the way of walking paths, use wireless devices where possible, and regularly inspect cables for
signs of wear or damage.

Heavy falling equipment:


Devices have varying levels of weight, and if a device falls on you, it could cause injury; any device should be placed in a
secure location, like a PC on a solid desk and not near the edge.
Causes and reduction tactics for falling equipment:
 Improperly secured equipment: Ensure that equipment is properly secured and stable. Regularly check the stability
of locations containing devices.
 Equipment on unstable surfaces: Keep equipment away from edges and other potential hazards and regularly inspect
equipment and locations containing devices for signs of wear or damage.

eSafety
Data Protection
The Data Protection Act (DPA) controls personal data collection, storage, and processing.
 In the UK, the European Union’s General Data Protection Regulation (GDPR)
 Protects personal data, whether stored on paper or a computer system.

The Data Protection ACT (DPA)


 Personal data must be processed lawfully and transparently.
 Data should only be used for the purpose it was collected.
 Data must be accurate and kept up to date.
 Data should not be stored longer than necessary.
 Data must be protected from unauthorized access or breaches.

Principles of the Data Protection Act


 Data must be processed lawfully, fairly, and transparently, with clear consent from the individual.
 Data should only be collected for specific, explicit, and legitimate purposes.
 Organizations should only collect and retain the minimum personal data necessary for their stated purpose.
 Data should be accurate and up-to-date, and reasonable steps must be taken to rectify or erase inaccurate information.
 Personal data should not be kept longer than necessary and should be securely deleted when no longer needed.
 Organizations must protect personal data against unauthorized or unlawful processing, accidental loss, destruction, or
damage.

Why is data protection legislation required?


 Protecting Individual Rights: Data protection legislation safeguards individuals' right to privacy and control over
their personal information.
 Preventing Misuse of Personal Data: It helps prevent unauthorized access, identity theft, fraud, and other forms of
data misuse.
 Promoting Trust: Data protection laws build trust between individuals and organizations by ensuring their personal
information is handled responsibly.
 Encouraging Responsible Data Handling: Legislation promotes responsible data collection, storage, and processing
practices among organizations.
 Enabling Data Subject Rights: Legislation grants individuals rights such as access to their data, right to rectification,
erasure, and objection to processing.

23
Personal Data
 Refers to information that can be used to identify an individual.
 Examples
o Personal Name
o Address
o Date of birth
o A photograph in school uniform
o Medical history
 Threats that can be avoided by protecting personal data:
o Identity theft
o Privacy breaches
o Misuse of the information
o Data be sold to third-party companies.
o Individuals could be held to ransom over personal data gathered.
o could be used to commit a physical crime.
 How to avoid inappropriate data disclosure:
o Personal data must be kept confidential and protected through privacy settings on websites such as social
media or strong passwords on websites where personal data is held or used.
o Access to personal data should be limited to authorized individuals.
o Think before you post - consider what information could be gathered from your image or content.
o Check website details about the collection, storage, and use of personal data.
o Only access websites where personal data is used or viewed when on a secure, encrypted connection

eSafety
 E-safety is knowing about and using the internet safely and responsibly.
 It refers to when an individual is using the internet, email, social media, or online gaming.
 E-safety refers to the individual knowing how to protect themselves from potential dangers and threats.

The Need for eSafety


 Awareness that personal information should not be shared freely.
 Awareness of how to act online and avoid falling victim creates a safe and respectful environment.
 Identify and avoid online frauds, phishing attempts, and fraudulent websites that may try to trick them into sharing
personal or financial information.
 Mindful of online behaviour and interactions, protecting your digital reputation, which can have long-term
consequences in your personal and professional life.
 Control privacy settings on social media platforms, limiting who can access/view personal information and posts.
 Avoid encountering explicit or harmful content online, reducing the risk of exposure to inappropriate material or online
predators.
 Engage in online gaming responsibly, avoid sharing personal details, and behave respectfully towards other players.
 Protecting devices from malware, viruses, and other online threats, preventing data loss, privacy breaches, or device
damage.
 Develop responsible online behaviours, promoting respectful conduct while interacting with others online.
 Maintain a healthy balance between online and offline lives, reducing the risk of addiction, mental health issues, or
negative impacts on relationships and self-esteem.

Safety Suggestions
 The internet:
o Use trusted websites recommended by teachers or reputable sources.
o Utilize search engines that only allow access to age-appropriate websites and use filters to ensure inappropriate
content is not seen.
o Never reveal personal information
 Email:
o Be aware of the potential dangers of opening or replying to emails from unknown people, including
attachments; potential dangers include phishing, spam.

24
o Ensure you know who the email is for when considering sending personal data or images via email, only with
people you know and not with identifiable content like school photos.
 Social media:
o Know how to block and report people who send content or messages that are unwanted.
o Know where the privacy settings are to reduce the number of people who can see your posts or images.
o Be aware of the potential dangers of meeting online contacts face to face; do not meet anyone you do not
know; if you do, take an adult and meet publicly.
o Do not distribute inappropriate images and inappropriate language.
o Respect the confidentiality of personal data belonging to other people.
o Only accept friend requests from people you know.
o Parents should be aware of what you are doing online, discuss what you are doing online.
o Do not post images or details that can be used to locate you.
 Online gaming:
o Do not use real names as usernames.
o Never share personal or financial details with other players
o Know how to block and report players for inappropriate messages or comments.
 Sensitive Data is data that might result in loss of an advantage or level of security if disclosed to others. I.e., ethnicity,
religion, criminal record, etc. At the same time, personal data can be used to identify the user, i.e., passport number,
name, age, etc.

Security of Data
Threats
There are multiple methods by which data can be threatened, including:
 Hacking: Unauthorized access to computer systems or networks to gain control, steal information, or cause damage,
thus leading to identity theft, privacy breaches, and misuse of data
 Phishing: Deceptive emails or messages that are received from trusted sources to trick individuals into revealing
personal data
 Pharming: Manipulation of DNS (Domain Name System) to redirect users to fraudulent websites, often to steal
personal data
 Smishing: Phishing attacks carried out through SMS or text messages
 Vishing: (aka voicemail phishing) Phishing attacks carried out through voice messages to trick users into calling the
telephone number contained in the message
 Viruses and malware: Viruses are program codes that can replicate/copy themselves to cause data loss or corruption.
Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems or networks.
 Card fraud: Unauthorized use of credit or debit card information for fraudulent purposes caused by shoulder surfing,
card cloning, or keylogging.
 Keylogging: Malware that records keystrokes to steal passwords.
 Trojan Horse: Malicious software disguised as legitimate software.
 Virus: Self-replicating malware that attaches to clean files.
 Worm: Standalone malware that spreads through networks.
 Shoulder Surfing: Illegally observing someone’s screen/keyboard to steal data.

Protection of Data
Multiple techniques are implied for the protection of data, inclusive:
1. Biometrics:
 Individuals' distinctive physical or behavioural traits, such as fingerprints, faces, or irises, can be used for access
control and verification. Since biometric data is hard to fake or duplicate, it offers a more secure form of identification.
How it works: Scans traits → compares to stored data → grants access if matched.
 It is used in phone unlocking (e.g., Face ID), airport security, banking authentication.
 More secure than passwords.
 Biometric data cannot be reset if stolen.
2. Digital certificate:

25
 A digital record that attests to a website's reliability and integrity. A digital certificate is used to provide safe
communication and to build confidence between parties. Identifier data, the entity's public key, and a third party's
digital signature are frequently found in digital certificates.
3. Secure Socket Layer (SSL):
 A protocol that creates a secure connection between a client computer and a server. SSL ensures that information
communicated between a server and client stays private and cannot be intercepted or changed by unauthorized parties.
A website's identification for it is the S at the end of HTTP.
4. Encryption:
 It is creating data in a format that cannot be read without a decryption key. Data on hard drives, emails, cloud storage,
and secure websites (HTTPS) are all protected by encryption. Without a decryption key, it assures that even if
unauthorized people obtain data, it cannot be decoded.
5. Firewall:
 A firewall is a network security device that monitors and manages incoming and outgoing network traffic. Its goal is to
separate an internal network from other networks by filtering data according to established criteria. It assists in
preventing malware, unauthorized access, and other network risks.
6. Two-factor authentication:
 A security mechanism that requests two different kinds of identification from users to confirm their identity. To
provide additional protection outside of just a username and password, 2FA was created. Typically, it combines
something that uniquely identifies a user, like biometric data, with something the user has, like a smartphone and a
token or something they know, like a password.
7. User ID and password:
 A typical authentication technique uses a password plus a secret code (user ID) to identify. To strengthen data security,
user IDs and passwords restrict access to only authorized users. Using secure passwords and changing them frequently
is critical to ensure security. When creating passwords, it is advised to utilize a mix of uppercase, lowercase, digits, and
special characters.

5. Communication
Communication with Other ICT users Using E-mail
E-Mail
Uses:
 Email is a technique of sending and receiving messages and files via the Internet.
 It is employed in personal communication, business communications, and marketing.
 Acceptable language must be used based on the email's recipient, for example, professional when composing a work-
related email.
 Employers frequently establish requirements for professional language, substance, and email frequency.
 Email security is critical to preventing sensitive data from being accessed or manipulated.
 Netiquette is the proper conduct and politeness when using email.
o Do not be abusive.
o Do not send spam.
o Be clear and concise with your message.
o Remember that posts are usually public and can be read by anyone.
o Always check your spelling and grammar.
o Respect people's privacy and do not discuss or publish information that might embarrass somebody.
o Forgive people’s mistakes.
o Do not use CAPITAL LETTERS to highlight comments.
o Do not plagiarize.
26
o Do not use too many emoticons, as they might annoy your readers.
 Email groups enable mass communication to a specific group of subscribers.

Guidelines set by employers:


 It is up to companies to decide if personal emails should be permitted on their systems.
 Companies may specify which company devices are allowed to be used.
 There needs to be a company standard style when sending emails.
 It must be made clear what email content is not permitted.
 Employees should be told only to use their accounts when sending emails.
 There must be clear rules regarding the confidentiality of information.
 Staff need to be aware of the method and duration of storing emails.
 Incoming emails should only be read by the recipient.
 Company policy on how to deal with and prevent viruses must be laid out.
 Monitoring of emails may be carried out, and staff must be aware that the company has the right to read all emails.
 Suitable ongoing training will take place to ensure staff always follow company policy.

Carbon Copies (Cc) and Blind Carbon Copies (Bcc)


 Carbon copies are used to send the email to multiple recipients.
 Blind carbon copies are made to send the email to multiple recipients without them acknowledging that it has been sent
to other recipients.
 Forward enables users to send an already existing email to a new recipient.
 To attach files to be sent with an email, we make use of Attachments.

Spam
It is defined as any unwanted email delivered via the Internet. These can range from annoying to genuinely harmful, as they
may contain viruses.
The main disadvantages are:
 wasting time
 annoying people
 using up valuable bandwidth on the internet, thus slowing it down
 may have viruses or be a part of a phishing scam.
 can take up significant space in user inboxes.
To minimize the spam, you receive:
 use spam filters.
 avoid disclosing your email address publicly.
 do not click on links in spam emails or reply to them.

Effective Use of the Internet


Characteristics of the Internet:
 Allows individuals from all around the world to connect and chat with one another instantaneously.
 It runs on a distributed network design, which means a single central authority does not control it.
 It is used for transmitting data in a variety of formats, such as text, photos, audio, and video.

27
Uses of the Internet:
 A vital communication tool that allows people to communicate via emails, instant messaging, and other means.
 It acts as a massive database of information on almost any subject.
 The Internet has transformed business by offering a platform for online purchasing, electronic payments, and digital
transactions, allowing enterprises to reach global consumers.

Advantages of the Internet:


 Users get access to vast information, helping to learn
 Allows real-time communication worldwide for people and businesses
 Makes many tasks easier, increasing simplicity and efficiency

Disadvantages of the Internet:


 Risks to data security and personal privacy like identity theft
 Spread of fake news, propaganda, and misinformation
 Digital divide worsens due to unequal internet access

The differences between the internet, intranet, and extranet:


 Definition:
o The Internet is a vast network of linked computer networks and gadgets that communicate with one another
using the Internet Protocol Suite (TCP/IP).
o The intranet is a secure network that operates within an organization using internet technologies and protocols,
such as TCP/IP.
o Extranets are managed private networks that can give access to third-party users and give users, such
as partners, suppliers, or clients, safe access to a portion of the intranet.
 Accessibility:
o The Internet is open and accessible to the public, allowing users to access a wide range of information,
services, and resources worldwide.
o Intranets are restricted to internal users and typically secured by firewalls and other security measures to
maintain the security of critical corporate data.
o Extranet provides authorized external users only limited access, in contrast to the internet, which is public, or
the intranet, which is entirely restricted. To access the extranet, these users need a secure login.
 Purpose:
o The Internet acts as a hub for intercultural dialogue, the sharing of knowledge, and access to a range of
Internet resources, including websites, email, social media, online shopping, and more.
o An intranet's main goal is to make it easier for employees to communicate, work together, and share
information.
o Extranets make it easier for external stakeholders to collaborate and communicate with a company. It enables
the organization and its reliable clients or partners to share information, documents, and resources securely.
Many use the terms “Internet” and “World Wide Web” interchangeably. However, they cannot be used in the same context:
- The internet refers to the global network of computers and other devices connected through routers and servers. However,
the World Wide Web is a collection of websites and webpages accessed via the Internet.
 Blog:
o It is a website or section of a website that continually shares new information, frequently written informally or
conversationally, like a journal.
o usually presented in a reverse chronological manner
o usually managed by individuals or small groups

28
o allow for reader comments, facilitating some level of discussion.
o often focus on specific topics, such as food, travel, fashion, technology, or personal experiences
o also serve as a platform for sharing opinions or insights
 Forum:
o an online discussion site where people can hold conversations in the form of posted messages.
o often organized around specific topics or interests and divided into categories known as threads.
o primarily focused on peer-to-peer interaction
o may require users to create an account before posting.
o can be moderated or unmoderated.
 A moderated forum is an online discussion forum in which an administrator checks posts before they
are allowed to be posted.
 The internet is a huge unmoderated forum. No one ‘owns’ the internet, and it is not policed.
 Wiki:
o a type of website that allows users to add, remove, or edit content.
o designed to facilitate collaboration and knowledge sharing from many people.
o holds information on many topics which can be searched.
o posts are not in chronological order.
o structure is determined by the content or its users.
o The most famous wiki is Wikipedia, an online encyclopaedia.
o changes can be tracked and reverted if necessary, and the content is usually written in a neutral style.
 Social networking:
o platforms where users can connect with others and share content.
o include platforms like Facebook, Twitter, Instagram, and LinkedIn
o require users to create a profile and allow them to share text, images, videos, and links.
o facilitate interaction, collaboration, and information sharing on a large scale.
o privacy settings allow users to control who can see their content.

The Functionality of the Internet


 Internet service providers (ISP): A company that provides internet access. Typically, a monthly fee is charged for
this service. Users' accounts are created when registering with an ISP and acquiring login information such as user ID
and password.
 Uniform Resource Locator (URL): The address of a web page on the WWW. It is a text-based address that uniquely
identifies the location of any resource available on the internet. The three main components are:
 Protocol:
o It is the communication protocol used to transfer data between the client and the server.
o E.g. HTTP, HTTPS, FTP, and others
 Domain:
o it is the name of the server where the resource is located.
o it can be a name or an IP address.
 Webpage/file name:

29
o it is the location of the file or resource on the server.
o it can contain the name of the file or directory where the resource is located.
 A URL looks like this:
o protocol://domain/path/filename
o E.g. https://www.hoddereducation.co.uk/IGCSE/ICT is a URL that consists of the HTTPS protocol, the
domain name "www.hoddereducation.co.uk", the path is “IGCSE” and the filename is “ICT”
 A hyperlink is a word/phrase/image which references data that the reader can follow by clicking or tapping, usually
taking you to another web page.
 A web browser is a software application used to locate, retrieve, and display content on the WWW, including web
pages, images, video, and other files.

Use of Search Engines


There are two fundamental methods for obtaining information via the Internet. The first method is to enter the URL if you
know the website's address. If you do not know where to look, the second option is to employ a search engine to locate the
information you seek.
 Advantages of using the Internet to find information
o Information is usually up to date and easy to amend
o Vast amounts of information available quickly via search engines
o Accessible from home, often free, with multimedia for better learning
 Disadvantages of using the Internet to find information
o Unregulated content means anything can be posted
o Risk of accessing inappropriate websites
o Easy to get distracted and lose research skills due to search engines

Speed of Searching
 Search engines may scan billions of online pages to locate matches to your search query in a fraction of a second.
 Your internet connection and the effectiveness of the search engine's algorithms influence the speed.

Amount of Information
 Because search engines can deliver a deluge of information, utilising particular and relevant search phrases is critical.
 Adding quotation marks for specific phrases, "+" signs for required terms, and "-" signs for omitting terms can help
narrow the search.

Finding Relevant and Reliable Information


 The search engine algorithm determines the relevancy of information by considering parameters such as keyword
frequency & page quality.
 Reliable information is often obtained from recognized sources such as educational, government, or well-known
industry websites.

Evaluating Information Found on the Internet


 Although the internet provides much information, not all are genuine or dependable.
 Consider the source's reputation and trustworthiness when determining the information's dependability.
 Check the accuracy of information by comparing it to other reliable sources.
 Assess whether the information is skewed, keeping an eye out for views pushing a particular point of view.
 Check if the material is current, as obsolete information might be deceptive.

30
Internet Protocols
Protocols are rules on which the sender and recipient agree when data is exchanged between devices.
1. Hypertext transfer protocol (HTTP): when a web page is being accessed, entering http:// at the front of an address tells
the web browser that ‘HTTP rules’ for communication are to be obeyed.
2. Hypertext transfer protocol secure (HTTPS): A secure version of HTTP that encrypts data for security.
3. File transfer protocol (FTP): network protocol used when transferring files from one computer to another over the internet.
It is like HTTP, but the protocol specifically transfers files.
4. Secure sockets layer (SSL): a protocol that allows data to be sent and received securely over the internet.

Risks of Using the Internet


 Inappropriate and unlawful content: The internet may attract people to potentially dangerous or illegal materials.
 Data restriction: Parental, educational, and ISP restrictions can all be used to restrict access to specific information or
websites.

31

You might also like