As Ict Notes Info2
As Ict Notes Info2
ICT: Information Communication Technology is the use of technology for the input,
processing, storage, and transfer of data and the output of information; for example,
traditional computers doing tasks such as sales processing by entering sales data to
produce output information such as an invoice.
A System: Any activity that involves the capture of data as input, the processing of
data into information and the production of information as output.
Input: The capturing of Data. Data is input via an input device such as a keyboard.
An ICT System: An ICT system is a system where the output from the systems goes
directly to a human being or into another ICT system. They are designed for and
used by people and are commissioned for a particular purpose.
How and Why we use ICT systems: Most modern organisations use ICT systems to
help them fulfil their goals, but the exact purpose of the ICT system depends on what
those goals are.
It is commonplace for many organisations to use ICT systems to produce
information that would traditionally have been produced by paper-based systems.
This might include receipts, invoices, sales, reports and wage slips.
How the DVLA check insurance and the MOT test certificates: When the customer
apples for a tax disk on the DVLA website the vehicle’s insurance will be
electronically checked with the Motor Insurance Database (MID). The database also
checks that the vehicle is insured and, if applicable, has a new-style MOT test
certificate.
Data: Data represents raw facts and figures or a set of values. A set of data might
consist of 2, 4, 3, 5, and 6. Another familiar set might be data collected from
examination results, such as 23, 45, 67, 98 and 78. Data itself has no meaning;
however, it can be input to a computer to be processed into information.
How Data can arise: Data can arise in many different forms including text, still and
moving images, numbers and sound.
Whatever the type of data being input, computers store and process this data
using binary numbers. A single unit of binary is called a ‘bit’ which stands for binary
digit. Computer memory is measured in bytes. One byte is made up of eight bits and
one byte can store one character; for example, the letter A is represented by
01000001.
Coding Data: Some data is coded on collection before being entered and this
changes the original data into a shortened version by assigning a code. This is
necessary in order to be able to process data effectively. Value judgements are a
good example, asking 100 people to rate a restaurant on a scale of 1 to 5, only a
single digit needs to be fed into the computer rather than asking them how good they
think that restaurant is which is time consuming and hard to enter as data. Another
example is changing gender to M for male and F for female.
DisAdv of Coding Data: When data is coded it loses some of its accuracy and it can
be difficult to remember the codes.
Bar Codes: A set of data that play a leading role in stock control and customer
ordering for web-based commerce in warehousing. The most common in the UK are
EAN 13 (European Article Number 13 digit) and EAN 18. A series of bars and
spaces represent the code numbers which are read by a bar-code scanner.
Barcodes are very versatile and have the advantage of being able to be read
from different angles and even when upside down. One of the key features is that an
automatic check is made for any data-entry errors using validation.
There are no details of the product stored in the number only a country of
origin and a sequence code.
Some examples of the application of barcodes are student cards, products in a
warehouse and supermarkets, etc. this might be when the products details are
identified from searching the company’s database after scanning at a point of sale.
The output will include the product description and price which will be shown on the
monitor and printed out on a receipt
Processing: The work the computer does on the data to convert it into information.
This might involve calculations, logical operations such as sorts and queries, etc.
processing is required to enable information to be produced from data.
Information: Data that has been processed into something meaningful. For example,
in a supermarket, the data scanned from a barcode is processed to produce a
receipt with the item names and prices included.
Examination results are another example; the raw examination marks could
have been entered in as data, the processing would involve converting those marks
to standardised scores and allocating the appropriate grade before presenting them
in graphical format as information. This information makes it easier to assess the
performance of the group than using the raw data.
Supermarket Loyalty Cards: Supermarket loyalty cards capture data when they are
used. The customer number, date and time of purchase and codes of products
bought are captured when the card is used at the checkout. The data can be
processed to provide information about purchasing habits, and the supermarket can
use that information when deciding what special offers to tempt you to spend more at
the store.
Quality of Information:
Accuracy: Thorough error checking and must take place and regular updates
must be applied if the information is to remain accurate.
Complete: If information is not complete then it loses value. i.e. if information
being produced about a householder for insurance purposes does not include
the amount of money the house is being insured for, then it is incomplete.
Up to date: Certain information only has value within a specific timescale, for
example, information on consumers’ tastes will invariably change and
organisations must ensure they have up-to-date information.
Reliable: Because of the lack of control on the content included on Internet
websites this can often reduce the value of the information obtained,
therefore, it needs to be obtained from a reliable source.
Relevancy: Information is only valuable to someone who has a use for it.
Timely: I
PEOPLE AND ICT SYSTEMS
ICT Systems – Design and Purpose: The systems that are used by organisations have been
designed to be used by people and commissioned for a particular purpose. It is important to
appreciate that different users have different needs. The client, end user and audience may
all have slightly different requirements from the system, and each of their requirements need
to be considered.
Characteristics of Users:
Physical Characteristics
Experience
Environment of use
Task to be undertaken
Age
User Interface: The link between the user and the technology that they are using; it involves
both hardware and software.
How Users Interact with ICT Systems: Users interact with ICT systems through the hardware
and software components of the user interface. Most standard systems rely largely on a
keyboard, mouse and monitor for their interface.
The most common interface type is the graphical user interface (GUI). The standard
convention of left-click to select and right-click for information and double-click to load means
that users can usually use the basic functions of software without too much difficulty,
especially if the icons are clear and well designed.
Graphical User Interface: The most common user interface used today; it uses icons or pictures
that are easily understood by the user and can be clicked using an input device.
WIMP – Windows, icons, menus and pointers: Most GUIs make use of these four basic features.
Menu-driven Interfaces: Menu-driven interfaces can be useful in situations where the user needs
to be restricted to a limited choice of actions. Originally menus were usually chosen by entering a
single number or letter chosen from a simple text-based list. For example, press 1 for sales and 2
for stock control. This method is still used for automated phone systems.
Command-Line Interfaces: Not used much by non-expert users, because they are more
difficult to learn to use than other types of interface. A CLI relies on a user typing in text-
based commands for the computer to execute, and so the user has to know the commands
in the first place.
Interface design for Effective Communication: The most important factor to bear in mind is
the principle of trying to make the interface fit the user rather than the other way around.
Interfaces that minimise the number of times a key is pressed or a mouse is clicked
also minimise the strain on the users’ wrists and fingers.
- Simulators used for training can have sensitive gloves that respond to touch, as if
the operator is taking part in a real event, such as a medical procedure.
- Multimedia Tools such as sound and video can be used to demonstrate features
of software, for instance by showing them what to do next rather than working it
out.
- Configuration of Interfaces: Some packages allow the user to configure the user
interface for themselves, by adding and deleting buttons from toolbars so that the
features they use are readily available.
- Keyboard shortcuts may be available as alternatives to menu commands,
speeding up the process for more experienced users.
The Need for the Provision of Appropriate Help and Support for Users:
• Tutorials: Multimedia presentations can provide tutorials to teach new skills, and
many excellent software training packages build in the user’s response to judge
whether the user is ready to move on.
o There are many tutorials provided by software houses, third parties and by
user groups that use multimedia facilities to support new users.
• Search facilities: The more traditional help supplied within programs can usually be
accessed in this way; the user types in the feature they need help with, or context-
sensitive help may be available, where the help information offered depends on what
the user was doing when they pressed the help button . For example, if the user was
trying to set up an input mask on a database management system, pressing help
would bring up an article on input masks.
• Hover Function: when the user moves the mouse over an unfamiliar control, the
name of that control appears, perhaps with a further button to click for more help.
ICT professionals: People working with ICT systems tend to have qualifications, such as
degrees or other technical qualification.
Computer Networking: Linking two or more computing devices together for the purpose of
sharing data, communicating, software and peripherals.
Local Area Network (LAN): A network that covers a single site and can be linked by the use
of cables. A school site is an example of a LAN.
Wide Area Network (WAN): A network that covers a large geographical area and could be
linked by cables, microwave or satellites. The Internet is an example of a WAN.
Metropolitan Area Network (MAN): A network that covers an area like a town or city and
could be connected by cables, microwave or satellites.
Intranet: A private network serving a single organisation, modelled after the Internet, allowing
users access to almost any information available on the network. Unlike the Internet,
intranets are typically limited to one organisation, with little or no access to outside users.
Limited areas of the intranet can also be linked to the Internet and the use of email
facilities to enable effective communication with customers and suppliers and others outside
the organisation.
Extranet: The part of an organisation’s network that can be made available to outside users,
for example, customers or suppliers, giving them limited access to company resources and
information.
Peer-to-Peer Networks:
• Two computers linked together so that they can share files and perhaps a printer. All
computers present in this network have similar rights.
• Each computer needs a network interface card and the connection is made either
using a crossover cable or wirelessly.
• The operating system can be used to define which resources are shared and a basic
network is in place.
• If more than two computers are involved, a hub could be used to provide the
connectivity.
• Each computer does not need its own printer, and files can be backed up from one
computer to another in case of equipment failure.
• The main computer connects to the Internet through an ADSL modem, and it is then
connected to a wireless router that connects the other computers via their wireless
network cards.
• A peer-to-peer network can use all the computers connected to it as workstations,
and so it is cheaper to set up than client/server network which needs a dedicated
server.
• Wireless networks does bring security risks, there are many documented cases of
networks unprotected by passwords and so accessible by the entire neighbourhood.
• Insufficient wireless security makes identity theft much easier to achieve.
Client-Server Networks:
• In larger organisations, the network is most likely to be server based. The server is a
powerful machine, usually built to a high specification, using good quality
components because it forms the basis of the entire network.
• The server needs a specialised network operating system that enables it to manage
complex sets of user rights and file permissions.
• Usually fitted with RAID drive systems to ensure that data remains available to the
network if a drive fails and its data becomes corrupt.
• The server is usually connected to one or more network switches. They can inspect
data packets as they are received and forward them efficiently to the connected
device they were intended for.
This conserves bandwidth and improves network performance compared to using a
hub.
Each client, or workstation, will need the client version of the network operating
system to be installed.
• The applications software is also installed on each workstation as this reduces
network traffic and load on the server – only the data files are called from the server
and the network traffic is greatly reduced.
Hub: A Small, simple network device that allows multiple computers to communicate. Hubs are an
inexpensive piece of equipment often found in home wired networks and small businesses.
Router: A hardware device (wired or wireless) that joins networks together at the network protocol
layer.
Network Switch: A hardware device that joins multiple computers together at the data link network
protocol layer.
Internet: A large group of interconnected computers around the world that allow the sending
and retrieval of information form one computer to another – a ‘network of networks’. The
availability of the internet has meant that users anywhere in the world can communicate with
each other in a matter of seconds by using electronic mail.
World Wide Web: A collection of multimedia resources accessible via the Internet. Web
browser software is used to access these files through HyperText Transfer Protocol (HTTP)
which most web browsers and hardware platforms support.
Web pages are usually written in HyperText Markup Language (HTML) and linked
together using hyperlinks, allowing users to navigate between pages in a site and between
one site and another.
De Facto Standard: A de facto standard is one where no formal agreement is in place, but a
particular standard has become the one that is most commonly used in practice. Hardware,
software, languages, protocols and formats that are widely used, but not endorsed by a
standards organisation, can be judged to be de facto standards, e.g. GIF format used for
pictures on webpages.
De Jure Standards: De jure standards are legally binding industry standards that all
manufacturers have to agree to work to. Though they place restrictions, they are beneficial
for both the manufacturers and the end users, e.g. wireless standard Wi-Fi, developed by
the IEEE.
SAFETY AND SECURITY OF ICT SYSTEMS
• Spyware:
o Software that obtains information about a person or organisation without their
knowledge or informed consent and reports such data back to a third party.
o Passwords for internet banking might be stolen, by monitoring keystrokes
made by the user when logging on to the banks website.
Reasons for Security Breaches:
• For the satisfaction of doing it – to try to show off to others and prove they are
skilled enough to breach security.
• Personal gain – for example, for a student to change their grades in an
examination to achieve university entry.
• Financial gain – if an individual were to change the bank accounts of a large
number of a large number of customers by small amounts and add them all to
their own account.
• Sabotage – to damage the reputation of a competitor’s organisation by
proving their security is weak.
Types of Threat:
• Data Access Threats – the data is accessed while being communicated
across a network illegally and is changed by individuals or organisations that
do not have access.
• Service Threats – designed to stop the data being used by the organisation it
belongs to by disrupting the normal running if the software being used.
Software Measures:
Allocation of user names and passwords, to control access and try to prevent
security attacks.
Control of access rights once a user has logged on – allowing only a read only
access or to add new data but not delete existing data.
Network security software to track down security abuses of the network – set
to record which user logged onto a specific computer at what time and date,
and when they logged out.
Software can also be set up to automatically save files every few minutes or
each time a new record is entered or insists data is saved. This prevents loss
of data caused by the user forgetting to save.
Data encryption can protect data that is being transmitted from one computer
to another.
Anti-virus software.
Firewalls should be in place to reduce the possibilities of the system being
attacked by unauthorised access.
Procedures:
It should be made clear to employees during induction training what their
responsibilities are as regards to data security and the penalties for breaking
these rules.
Security procedures should be part of the company’s ICT code of practice and
Training staff about these may reduce such security risks.
Breaches of security procedures should be covered by disciplinary
procedures.
Data Protection Act 1998: This Act regulates how personal data is used and protects data
subjects from the misuse of their personal data.
• If a data user wishes to store personal data about individuals, they must register with
the Information Commissioner, stating what data they want to hold, how long they
intend to keep it for what they intend to do with it, and who they might pass it on to.
• Data Subjects have the following rights:
o To see what data is being held about them (there may be a charge for this).
o To have any errors corrected.
o To refuse allow data to be processed for direct mail.
o To refuse to allow data sensitive data (e.g. political views, ethnic origins) to be
processed.
o To complain to the data protection commissioner about any abuse of the act.
o To claim compensation if they have been caused any damage by the misuse
of the act.
• Getting access to the data: on written request, you are entitled to be provided with a
copy of all the data an organisation holds about you. You must be able to prove your
identity by means of some form of identification.
• Exemptions to the Act:
o You cannot demand to see that data that might affect national security or
hinder police investigations.
o Some data has to be publicly available, and you cannot refuse to allow its
publication, e.g. the Electoral Roll.
• Role of the Information Commissioner:
o Enforcing and overseeing the Act.
o Raising awareness of the Act and its implications.
o Investigating complaints.
Computer Misuse Act: Under this act the unauthorised entry into ICT systems and
the introduction of viruses is made a criminal offense. The act identifies 3 specific
offences:
• Level 1 Offence - Unauthorised access to computer material (Data or
program), even just to prove that it is possible to gain access or just ‘look
around’ is a level 1 offence to attempt to gain access to a system for which
you are not authorised.
• Level 2 Offence – Unauthorised access with intent to commit or facilitate
commission of further offences: for example, obtaining personal data such as
Internet-banking passwords, which are then used to commit fraud.
• Level 3 Offence – Unauthorised modification of computer material: for
example, changing the account figures in a bank’s computer system or
introducing a computer virus to a system.
• What can happen to individuals under this law:
o Level 1 (basic offence): Maximum prison sentence of six months or a
maximum fine of £2,000 or both.
o Offences 2 and 3: Imprisonment for a term not exceeding five years, or
a fine, or both.
User Names and Passwords: Most organisations use this as a basis for security of
computers and networked systems. All employees have a user name and are expected to
change passwords on a regular basis. The password chosen is should be a mix of letters
and numbers and should not be easy to guess or written down on a scrap piece of paper.
Copyright, Designs and Patents Act, 1988: The current UK copyright law. This act applies to
computer software as well as non-ICT-related media like music and gives the creator control
over the ways in which their material may be used.
• The law covers the actual creation rather than the idea behind it. The idea for a piece
of software would not be protected, just the actual coding of the software written.
• A Single-User Licence: Allows the user to install the software on a single machine.
• A Multi-User Licence: Allows a number of installations, up to the maximum in the
agreement. For example, if you have a 25-user licence, the 26th person should be
denied access.
• A Site Licence: Allows any number of users within that site to use the software, but
forbids its use anywhere else.
PROCEDURES FOR BACKUP AND RECOVERY
Backup Strategies:
• What data needs to be backed up?
• How often does the data need to be backed up?
• When does the data need to be backed up?
• Which backup media will be used?
• Who will be responsible?
• Where will the data be stored?
• The person who is responsible for backup needs to assess what risks apply to
the data and how likely it is that the hazards creating those risks will take
place.
• They need to think about what the effect would be on the organisation if the
event occurred.
• Banks, airlines, insurance companies and hospital ICT systems are critical in
backup needs.
Restore Time
Time Taken to Storage Space
Type of Backup Required for
perform Backup Required
Backup
A long process as Large amounts of
A very quick
Full all data is backed storage space
method of restore
up required
More than Less than an Less storage space
incremental but can incremental but than a full backup
Differential
be quicker than a takes longer than a but more than an
full backup full backup incremental.
The least time The slowest restore Storage space is
Incremental
taken of the three speed of the three the lowest of the 3
There are still many things that human do better than computers, such as
understanding speech and recognising faces.
o Human beings use opinion, for example, within forecasting systems – this
does not always translate well with into an ICT system.
When a student watches a podcast on a topic being covered they may be able to
watch it over and over again and still not understand. There is not always a teacher
to ask or explain the topic in more detail to aid understanding.
New systems should always be tested, but as computer systems can be extremely
complex, it is almost impossible to test every single aspect of them, and errors may
not be spotted.
ICT cannot model opinions so the information produced is limited. ICT cannot
replicate people’s opinions; it can only put them into categories.
ICT does not provide the best solution in a particular set of circumstances. If the
amount of data to be handled is very small, it may take longer to set up a
spreadsheet or database than produce the information by hand with a pencil and a
calculator.
Types of Processing:
Batch: Where data is collected together in a group before processing takes place.
o Batch processing is best suited to regular jobs that happen at scheduled
times and involve large quantities of data.
o E.g. Payroll system – all the wages are calculated and the payslips are
output.
o E.g. Power supply bills for customers – readings are grouped together in a
batch and then processed when all of the readings have been taken.
Batch processing tends to have strong error-checking features built in, and so
information produced tends to be extremely accurate.
Tends to use fewer systems resources than interactive processing, as it does
not need a live connection between the computer and the user.
Interactive: The user reacts to prompts from the computer and the computer uses
these prompts to process data. The interaction occurs in real time and the input-
process-output is controlled by the user.
o The data is processed at the time it is input and output is immediate.
Transaction: Allows many users to access and update a system at apparently the
same time.
o Each transaction must be completed before the next transaction is begun.
o The main aim is to be able to work quickly with a large amount of different
transactions taking place.
o E.g. Travel booking system or when purchasing cinema tickets using the ICT
booking system.
Cultural Factors:
• Many people feel that sites such as YouTube and MySpace have made it
possible for lots of people to share their music, pictures and poetry with an
international audience.
• ICT can certainly improve the speed and amount of work that can be achieved
but does that mean that the culture of work and loyalty to a particular firm and
organisation can break down.
• Some jobs lack the personal contact that employment used to offer:
o Customers bank online and use ATMs rather than go into a bank and
speak to a real person.
o Teleworking means that more people can work from home, but also
means that friendships with colleagues and loyalty to a largely unseen
company may suffer
Economic Factors:
• Investing in new ICT systems can mean that the organisations can work more
efficiently, perhaps reducing costs as they need fewer staff and less office
space than they would have done without the computer equipment.
• Keeping up-to-date with ICT equipment is an expensive business for most
organisations, as technology changes so rapidly.
• Failure to embrace new technology is likely to render a business
uncompetitive and make it difficult to exist at all – few major ICT retailers
would consider not having a website or not using EFTPOS at their checkouts.
Many retailers have ceased to accept cheques, making card payment the only
alternative payment method.
Environmental Factors:
• Teleworking can reduce the number of journeys employees make to and from
work, and videoconferencing can reduce an organisation’s carbon footprint by
allowing meetings to take place between people anywhere in the world
without them leaving home.
• More work needs to be done in the field of recycling unwanted equipment.
With some printers now costing very little more than cartridges, it has become
uneconomical to repair equipment, and it just tends to be thrown away.
• Many environmentalists now feel that ICT equipment should be reused by
donating it to projects in the UK – The news three Rs:
o Reduce the amount of paper, ink and other consumables that you use.
o Reuse rather than just throw away computers, printers and other
hardware or donate to a suitable project around the globe.
o Recycle appropriately via the approved schemes under the WEEE
directive.
Ethical Factors:
• One issue is the wasting of company time by searching the Internet for non-
work related material or sending personal emails, which would go against the
company ICT code of practice – do they have the right to read emails sent to
and from their employees.
o Many companies regularly audit Internet use in their organisations to
try to make sure that their employees are using the web appropriately.
• Anyone can post information on the World Wide Web, websites, including
those that display photographs of children being bullied, provide information
that most people would feel should not be displayed.
o Should these sites be policed? If so by whom? Who should have the
power of censorship? Does anyone have the right to tell people what
they can and can’t see?
• Laws are different in different countries. Sites that may be legal and
acceptable in their own country may be considered neither by people in
another country.
o For example, many US states have made serious attempts to restrict
online gambling sites. Do they have the right to do that?
• Computers can be educational tools, but is it fair that some children from
poorer households have no access to the Internet or even a computer at
home? Does that put them at an educational disadvantage? How much more
at a disadvantage are children from developing countries who have no
computer access at all?
o The One Laptop per Child project aims to provide children in
developing countries with a laptop computer at a cost of less than
$100, and the charity is funded by donations.
Legal Factors:
• Any organisation should ensure that they follow all laws that govern the use of
ICT and allow for that in their budget.
• They must also ensure that procedures are in place and that adequate
training has been given to staff.
• The Data Protection Act, for instance, demands security of data and staff
members need to be trained to implement the act.
Social Factors:
• Teleworking has become a popular use of modern ICT systems, saving on
some of the costs of overheads for the employers and allows some flexibility
in work practice for the employee.
o Teleworkers are able to work at times that they find most suitable and
can work around the commitments they have in the home.
o However, Teleworkers can become isolated and may not feel as
though they are part of the workforce.
• A potential area for ICT to improve life in our society is Healthcare.
o Improvements in ICT programmes involve making use of research,
moving to electronic rather than paper-based prescriptions and setting
up a centralised system for patient records so that they can be
accessed at any time by any health professional.