Chapter 6 ICT
Chapter 6 ICT
6.1 Communication
There are several communication systems that make use of ICT technology.
For example: DTP: Desktop publishing software creates
» newsletters and posters layouts of text and media files for publishing
» websites in print or digital formats, such as
» multimedia presentations newspapers, magazines, brochures, ebooks,
blogs, and online publications.
» media streaming
» e-publications.
No direct communication
110
6.1 Communication
been taken specially or have been downloaded from the internet (with the
permission of the copyright holder). The following sequence is fairly typical of
how such a document would be produced on a computer system. The sequence is
not always necessarily in the order shown; it can vary depending on what already
exists or what needs to be created):
» First a word-processor application would be opened
» Photos could be obtained by:
– using a digital camera and taking photos
– searching for images/photos on the internet, or suitable photos could
already be stored on the hard drive or cloud
– using hard copy photos, which could be scanned in.
» If necessary, camera images would then be uploaded (either by connecting the
camera or camera memory card) to the computer via a USB port, or by using
Bluetooth connectivity).
» Photos from all selected sources would then be saved to a file on the HDD or SSD.
» When the user is finally ready to produce the document, the photos would be
imported from the file stored on the HDD/SSD.
» Once imported, photos would need to be cropped, edited and/or resized.
» Text would be typed in using a keyboard.
» Alternatively, any previously saved text would need to be imported.
» Photos need to be placed in their correct position and the text wrapped.
» Finally, the whole document would need to undergo proofreading for errors
and then saved, ready for printing.
Very often, other features, such as a spell checker, would be used to make sure
no mistakes had been made. Care needs to be taken when using a spell checker
for the following reasons: errors can't be deleted from a newspaper.
» The language used in checking the spelling could be different; for example,
British English and American English often have different spellings of words.
» Names or proper nouns might be highlighted as an error by the spell checker,
but may be acceptable.
» Similar sounding words need to be checked; for example, where, were or wear
all sound the same but have very different meanings – these will not be Link
picked up by the spell checker (but might be picked up by a grammar checker).
» The (correct) highlighted word may not exist in the spell checker dictionary. Other word-
processing features
could be used
Exercise 6a when producing the
Find out what other word-processing features would need to be used when newsletter or poster;
producing a newsletter or poster. For each feature identified, write down how you refer to Chapter 17
would use it to produce a professional-looking document. for more information.
A newsletter is a very useful method for getting important information to invaluable = useful
a target group. If, for example, you are doing a fundraising exercise, a well- use laser printer (better colored)
presented newsletter to accompany the fundraising would be invaluable.
Newsletters can be either printed out or available online as an e-publication (see
later in this chapter); the method used depends on who the target audience is.
With a printed document handed personally to somebody, you can be certain they
have seen the newsletter – but in both cases it is nearly impossible to be certain
that they have read it!
hard copy 111
for special targeted group - through a hard copy
6 ICT applications
TRUE CRIME
1 pm untill 4 pm.
new song.
No entry fee.
Refer to chapters in
Créche, reception tent, free
parking
the second half of
August 22nd 2022 this book wherever
necessary.
112
Posters may use plotters, use glossy papers .
could be hanging or distributed. 6.1 Communication
As with newsletters, posters can be printed out using high-quality printers or ADV
1- not necessarily need to
can be posted online. Printed posters can be any size. Large posters have the have computer or internet
advantage that they are eye-catching and usually very difficult to miss. They are connection.
used in many countries on the sides of roads so motorists see them on their way to 2- you have physical copy
work. By placing the posters in strategic positions, it is possible to target certain
people rather than the general public (for example, advertising expensive cars by DISADV
placing the posters on buildings or advertising hoardings in financial districts in 1- need to be distributed
1
big cities). The drawback is the cost of display (the advertising areas can only be by hand
2
rented) and that they are subject to weather conditions, so only have a limited life.
2- printing costs
Websites
Rather than producing newsletters and posters by printing them out, it is 3- restricted to small target
possible to use websites for advertising. This method of advertising requires audience
a company to either develop their own website or pay another company to
advertise on their website.
Using the first option may require the company to either employ a team of web
designers or go to a specialist company with experience in website design. It
may also be necessary to buy hardware and software to develop and store the develop website needs.
website. This method can therefore be expensive, but the cost does not stop
there. It will be necessary to use programmers to make sure that their website is
safe from hackers and from pharming attacks.
It has, however, become much easier and cheaper for individuals or small organisations small companies use
to create and host their own website, using off-the-shelf content management systems off-the-shelf content manager
system (CMS). CMS use
to organise content, and pay hosting fees to rent space on a web server. human-friendly interface rather
than needing to work directly with
The big advantage to websites is that they offer worldwide advertising capability code.
and there is no need to buy paper and other consumables, or pay people to
deliver newsletters or flyers. Before deciding which is the best way to advertise
their goods or services, companies have to weigh up the advantages and
disadvantages of both methods.
Websites tend to be used to advertise goods or services which require national
or international coverage. They can cover almost anything from car sales to
advertising a musician’s forthcoming album. The main reasons for using websites,
rather than newsletters or posters for advertising products and services, are
summarised in Table 6.1.
▼ Table 6.1 Advantages and disadvantages of using websites for communication V.I.
Advantages Disadvantages
» sound/video/animation can be added » websites can be hacked into and modified or viruses introduced
» links to other pages and websites can be » risk of potential pharming
added in hyperlinks and hot spots » it is necessary for the potential customers to have a computer and internet
» buttons to navigate/move around the connection
website, leading to more information » it is not as portable as a paper-based system (although with modern
» ‘hit counters’ allow the owner to see smartphones and phablets this is fast becoming untrue)
detailed information about how many » possible for customers to go to undesirable websites (either by accident or
people have visited the website as a result of a pharming attack) – this can lead to distrust from customers
» can be seen by a global audience » there is a need for the company to maintain the website once it is set up –
» cannot be defaced or thrown away this can be expensive
» it is much easier to update a website » because it is a global system, it is more difficult to target the correct
(and there is no need to do a reprint and audience using website advertising
then distribute the new version) » still need to find a way for people to find out about the website
113
6 ICT applications
Multimedia presentations
Presentations that use animation, video and sound or music are generally much
more interesting than static presentations done on slides or paper. produced: software package example
presentation software.
Presentations are produced using one of the many software packages on the
market and then used with a multimedia projector so that the whole audience use multimedia projector to display it
is able to see the presentation. There are many advantages and disadvantages for to audience.
this type of presentation, with some examples listed below.
Advantages of multimedia presentations
» use of sound and animation/video effects which are more likely to grab
the attention of the audience, and can make the presentation easier to
understand
» possible to have interactive hyperlinks built into the presentation; this
means the presentation could access a company’s website or even key
files stored on the cloud (such as video footage, images, spreadsheets
and so on)
» use of transition effects allow a presentation to display facts in a key or
chronological order
» can be interactive
» more flexible; because of the links to websites and other external systems
(for example, the cloud), the presentation can be tailored to suit a particular
audience.
Media streaming
Media streaming is when users watch movies/videos or listen to music on
devices connected to the internet. When using media streaming there is no need
to actually download and save the video or audio files.
Streaming is a continuous transmission of video or audio files from a remote Streaming: watch online (real time)
server where the files are stored. This means data is transmitted and played in
real time. In contrast, when downloading it is necessary for the user to store Downloading: - store file on device -
the entire file on the computer’s HDD or SSD before they can watch the video take up storage space - need
or listen to the music. This uses up valuable storage space and download times download time depending on
Internet speed
for a two-hour video can be up to one hour, depending on the internet speed
and the video quality.
With streaming, the file is sent as a series of packets of data. Each packet is
interpreted by the web browser. Streaming only works well if the internet speed
is stable, and at least 25 Mbits/second (for an HD video).
114
6.1 Communication
Because the playback of the media files is usually much faster than the rate
at which data is received over the internet, data packets are buffered in the
computer. Buffering makes sure the video plays back smoothly without freezing.
While the buffer is receiving data packets, it will be sending the data from the
previous data packets to the playback device. In this way, there appears to be
no gaps in the received data. Obviously, having a large buffer will considerably
reduce the possibility of freezing the play back.
Buffer: preloading data packet into a reserved
section of memory
Data Data Data or
packet packet packet Data packets being received A region of a memory used to temporarily store
9 8 7 data while it is being moved from one place to
another.
BUFFER
Data packets sent to Playback
playback device device
e-publications
Most material which is published on paper is also available in an electronic
format. For example:
» e-books
» digital magazines
» digital newspapers
» digital libraries.
115
6 ICT applications
Exercise 6c
Write down as many advantages and disadvantages you can think of for offering
customers e-publications rather than paper-based publications. Write a
paragraph describing each advantage and disadvantage.
Each tower transmits within its own cell. If you are driving a car and get to
the edge of a cell, the mobile phone signal starts to weaken. This is recognised
by the network and the mobile phone then picks up the signal in one of the
adjacent cells. If a person is making a call or sending a text to somebody in a
different country, then satellite technology is used to enable the communication
to take place.
Mobile devices either use a SIM (subscriber identity module) card to allow it
to connect to the mobile phone cellular network, or they use wireless internet
connectivity. Together they allow all of the following features:
» SMS (short message service) messaging
» phone calls
» Voice over Internet Protocol (VoIP) communication
» video calling
» internet access.
116
6.1 Communication
Phone calls
Link
Probably the most obvious use of a mobile phone is its ability to make a phone
call on the move. Because mobile phones are so small and they have their own For more information
power source, they are an ideal way of keeping in touch anywhere, provided there on the features of
is a network signal. Mobile phone networks are still not as stable as landline mobile phones, refer
systems and for that reason alone, landline phones are still in common use. back to Chapter 1.
Using mobile phones to make phone calls has the following advantages:
» There is no need to look for an operational public telephone in an emergency. small
» It is possible to conduct business or personal phone calls on the move. have their own power supply.
» It is easier to keep in contact with co-workers at the office no matter where
you are.
117
6 ICT applications
Internet access
Access to the internet from a mobile device is another valuable feature. Any
mobile device can connect to the internet either using a wireless broadband ▲ Figure 6.5 Cloud video
connection or via the mobile phone network. Due to the use of smaller screens, calling
internet pages displayed on mobile phones are often different to those
on desktop or laptop computers. Software detects which type of device is
connecting to a website, which then sends out the web page optimised for that Link
device. Mobile devices also have a built-in feature which automatically selects
wireless broadband connectivity (if possible), instead of the mobile phone See Chapter 4 for
more on Wi-Fi
network, when connecting to the internet. This has the following advantages:
networks.
» less expensive (mobile phone company ‘data plans’ often have a cap on how
much data can be downloaded, and charge for exceeding this maximum) how software shows web page
» lower power consumption (Wi-Fi routers are usually much closer than
mobile device first chooses wireless
the mobile phone towers; the longer the range, the greater the power broadband connectivity.
consumption) then
» quality of service (Wi-Fi usually offers greater bandwidth than the mobile it chooses mobile phone network.
phone network giving the possibility of downloading more data more quickly).
118
6.2 Modelling applications
119
6 ICT applications
All of these scenarios can be tested using a computer model. The design can then
be modified on the computer if any of the above scenarios caused the bridge to
fail. After a number of modifications, a final design will be decided on. To ensure
▲ Figure 6.7 Wind-tunnel
the computer model gives good results, a scale model of the bridge would then tests on a new bridge
be constructed and subjected to wind-tunnel (and other) trials. scale models = physical modeldesign
Similar methods are used when designing new buildings, particularly skyscrapers. - design computer model
Again, computer models are used, often in conjunction with wind-tunnel tests on - check scenarios and modify
a scale model. When testing the building using a computer model, a number of model
- final model is decided
scenarios need to be considered: when designing new buildings - build scale (physical model)
» what is the effect of natural phenomena, such as hurricane winds, flooding, - test physical model for other
trials (ex: wind-tunnel)
earthquakes and any other potentially damaging phenomena (wind movement
is a key issue with tall buildings; a 100-storey building may sway one metre to
the left and then one metre to the right, cycling every ten seconds, in strong
winds – can the building survive such movement, will such movement be
unpleasant or frightening to human occupants, and so on)
» the effect of a disaster, such as a fire – how does the structure stand up to
such scenarios?
» how is it possible to move people around the building efficiently (some large
structures have over 5000 people working in them and there is a need to
model elevator movements to move people efficiently)?
All of these scenarios can be tested using a computer model. The design
can then be modified on the computer if any of the above scenarios caused
120
6.2 Modelling applications
the building to fail to meet any of its design criteria. After a number of
modifications, a final design will be decided on. To ensure the computer model
gives good results, a scale model of the building is then constructed and it is
subjected to wind-tunnel trials:
Once a model exists which simulates the area where there is potential flooding, a
plan can be put forward to guard against future flooding. Data is continuously added
to the model once the flood defences have been put into place. This could result in
further flood defences being built, or modifications to the existing system.
121
6 ICT applications
Figure 6.9 shows the management of the flood protection system in the city of
Venice as an example.
Flooding of the city over many years has led to the building of a number of
flood barriers. It is useful to use computer models to understand how these
flood barriers will react to a range of possible flooding scenarios. It is possible
to try out several different solutions, using the model, before actually building
▲ Figure 6.9 Flood
any flood defences. Following the computer modelling results, Venice decided management barriers
to develop a computer-based system rather than build a manual flood defence
system. The main advantages of doing this are:
» Sensors could be used out in the bay area to monitor sea height and wave -data is more accurate
height (and possibly other factors, such as wind speeds); using sensors would
give a much faster response to any deteriorating conditions in the bay. -data taken more frequently
» Using a computer system is safer, since using humans to monitor conditions
could potentially put them at risk. -prediction made from data
is easily.
» Data collection is continuous and more accurate than manual measurements
(readings can also be taken more frequently). - people alerted faster
» Because of the faster response to changing conditions, city dwellers can be
warned well in advance of any flooding actually taking place.
» Data from the sensors could also be fed into the simulation modelling the
flood area; this could lead to further improvements as more data is gathered,
which means the simulation becomes closer to reality.
Traffic management prediction
Computer modelling can be used in traffic management. We will consider two
different situations.
Closure of motorway lanes
Repairs need to be made to part of the central barriers on an eight-lane motorway.
The company given the task of carrying out these repairs needs to model the
impact of the roadworks on the traffic flow. They have decided there are two ways
of controlling traffic which need to be modelled. The two models shown in Figure
6.10 will appear on the computer screens, representing the motorway lanes.
The company will run model ‘A’ and model ‘B’ using different traffic densities at
different times of the day to see which one allows for the best traffic flow. The
122
6.2 Modelling applications
model will also try out the effect of different speed limits through the roadworks.
They will also simulate the effects of a breakdown to see how this would impact
on the traffic flow. By changing conditions in the simulation, it becomes possible
to find an optimum design which allows the traffic to flow freely, but also allows
the repairs to be done as quickly as possible. This is considerably safer, cheaper and
much quicker than trying out different traffic closures on a real motorway.
Traffic light simulation
Figure 6.11 shows a second use of computer modelling in traffic management – a
set of traffic lights are to be modelled at a Y-junction.
accurately (that is, by comparing the model’s results with actual traffic flow
data) then different scenarios can be tried out. For example:
» varying the timing of the lights and observing how the traffic flow was affected
» changing the number of vehicles stopped at part of the junction and then
changing the timing of the lights to see how the traffic flow is affected
» increasing or decreasing traffic flow in all directions
» considering how emergency vehicles affect traffic flow at different times of the day.
How would the system work in real life? Link
» Sensors in the road gather data and count the number of vehicles at the junction.
Also refer to Section
» This data is sent to a control box or to a computer (it will need to be 6.10, which describes
converted first into a form understood by the computer). Analogue to digital the use of automated
» The gathered data is compared to data stored in the system (the stored data number plate
is based on model/simulation predictions which were used to optimise the recognition (ANPR)
traffic flow). systems – another
» The control box or computer ‘decides’ what action needs to be taken. way to carry out
» Signals are then sent out to the traffic lights to change their timing if necessary. traffic management.
Low
Low
2.3 inches rain
66mph gusts
am
e t Stre
J
High
Exercise 6d
Create a spreadsheet to do some personal financial modelling. Include the monthly income in one row and
then show all the monthly outgoings. For example:
A B C D E F G
Month 1 Month 2 Month 3 Month 4 Totals
Income ($):
Outgoings: food
cinema
clothes
other
savings
Extend the list as much as you want or change the outgoings to be more realistic if necessary. Insert some
values into the spreadsheet and then change a few values to see the effect on your finances. Add extra
columns or extra outgoings to extend the spreadsheet. Finally, try creating a graph of your income against
outgoings for each month and for a year (do a prediction for the year after four months, for example).
125
6 ICT applications
Exercise 6e
Here is a list of five simulations/models and also a list of five reasons why models are carried out. Try and
match the five simulations to the BEST REASON why that simulation would be done.
Simulation Reason
SIMULATING BRIDGE LOADING Take too long to get results back from real thing
126
6.3 Computer controlled systems
Robots are very good at repetitive tasks. However, if there are many different May June 2022
tasks to carry out (for example, making specialist glassware for some scientific
work), then it is often better to use human operators.
Advantages in using robots No need for protection clothing
» They can work in environments harmful to human operators.
» They can work non-stop (24/7). Can be used for transferring
» They are less expensive in the long term (although expensive to buy initially, large delicate items
they do not need wages).
» They have higher productivity (do not need holidays, etc.).
» They provide greater consistency (for example, every car coming off a
production line is identical). More accurate, precise
» They can do boring, repetitive tasks, leaving humans free to do other more engineering
skilled work (for example, quality control or design work).
» They can carry out different tasks by fitting them with different end-effectors
(attachments); for example, a spray gun, a welding gun, and so on.
The production line will be continuous, with various robots at each station given
a specific task. Using robots in this way leads to: Advantage
» faster operations (the number of cans of baked beans filled is 120 per minute)
» much greater productivity (the production can run 24 hours a day for every day)
» greater consistency (every can contains exactly the correct weight of baked beans)
» built-in quality control (automatic testing for foreign material, such as metal
filings, which would result in automatic rejection from the production line)
» reduced cost to the consumer (although initial robot arms are expensive, there
are far fewer staff in the factory who would need wages).
Let us take a closer view of how robots could be used in a bottling plant. It uses sensors
1- sensors to detect the
» Sensor 1 (a pressure sensor, light sensor or camera) detects the presence of a object (pressure, light and
bottle; this sensor is constantly sending signals back to the computer. camera)
» When the signal from sensor 1 indicates a bottle is present, the computer sends a 2- sensors to check the
signal to an actuator which opens a valve allowing liquid to flow into the bottle. filling liquid level
» Sensor 2 (a level sensor) is used to detect the correct liquid height in the
bottle; this sensor sends continuous signals back to the computer.
127
6 ICT applications
actuator
operating valve
valve
computer sensor 2
sensor 1
» When the signal from sensor 2 indicates the bottle is full, the computer sends
a signal to an actuator to close the valve.
» The computer then sends another signal to a second actuator which operates
a motor to move the conveyer belt to allow the next empty bottle to take its
correct position.
» The whole process is continuous until stopped for maintenance, errors
occurring or a change in the process.
Exercise 6f
Find out about five industrial processes that use production line control.
In each case, find out the functions of robots at each stage in the process.
In each case, find the advantages and disadvantages of using robots on the
production line
128
6.4 School management systems
black) on the rear of the card. The student would have to sign the card and also
write their unique student ID on the back of the card. The magnetic stripe would
Paul Smith-012 234 555
contain the name of the school, the name of the student, the student’s data of
birth and their unique ID (registration) number.
▲ Figure 6.15 Student
Each morning the student would arrive at school and swipe their ID card through registration card
a magnetic card reader. The data read would identify the student and the time
and date they entered the school’s premises. This data would now be stored on Morning : student arrive
a database. On leaving the school (either at lunchtime or at the end of the day), -swipe card
the ID card would again be swiped. This would now record the leaving time and magnetic card reader reach
date on the database. This would give a very comprehensive record of when the magnetic card stripe
student attended the school and the number of hours they attended. It would
also be a more secure method in the event of, for example, a fire. Using the student ID, time
paper-based system, a student could register then just go home, but with an ID data saved on database
card system, the student’s attendance would be known at all times. The school
would now be able to account for every student on the school premises. At the
end of a semester (or school year), the database could be interrogated and it leaving
would give an accurate attendance record for the student. This attendance record -swipe card
could then be sent out to parents or checked by teachers on a regular basis. -record leaving time and
also data can be analysed date and database
There are further functions that could be used such as:
» the use of a PIN to stop another student swiping in with the wrong card -This records when the
» the use of GPS tracking (see Section 6.11) so the exact whereabouts of a students attend school and
number of hours they attend
student would be known; this would require the addition of a chip in the
ID card so that the tracking system could identify them (see Section 6.11
for information on RFID) – however, there are privacy concerns surrounding
location tracking.
129
6 ICT applications
Computer-aided learning
Computer-aided learning (CAL) is the use of computer-based systems to assist in
the academic teaching of students. They are designed to enhance, and not replace,
traditional classroom teaching. Students would use computers as part of their
learning and complete online tests to monitor their performance. If a student
encounters a problem, CAL is not always able to help the student, however, and in
those cases, students would need to take steps to find additional help.
Advantages of using CAL to enhance the learning process
» Students can learn when they want to and at their own pace.
» It allows virtual reality (VR) learning to be used; with VR, the student is fully
immersed into the learning environment.
» The student can stop at any point and return later to continue where they left off.
» It is possible to re-take tests until the student reaches the required skills level.
» CAL can make learning more interactive.
» CAL makes use of various multimedia (for example, short video clips,
animation, music and interactive learning methods).
130
6.5 Booking systems
» The real goal of CAL is to stimulate student learning and not actually replace
teacher-based learning; CAL, if used properly, should be an integrated part of
the student’s learning process.
» CAL can make use of multiple-choice questions (MCQs) which can be marked
immediately by the computer system, giving instantaneous feedback to the
student; other assessment methods can be used, such as fill in the missing
words, crossword puzzles, linking correct terms to descriptions and gaming.
» It can deliver micro-learning; this is where a topic is broken down into small
modules which are easy to learn, and is when CAL is most effective.
» Very often there are no printed tickets, which saves postal costs and also
allows ‘impulse’ bookings only a few hours in advance.
» Online booking allows the use of modern smartphone and tablet Apps
technology; the customer is sent a QR code which contains all the booking
information necessary (this QR code is stored on the smartphone or tablet and
only needs to be scanned at, for example, the theatre or airport on arrival). ▲ Figure 6.16 Example
of a booking QR code
Disadvantages
» The setting up and maintenance of online booking systems is expensive.
» All customers using this service need access to a computer or mobile phone
and a reliable internet connection.
» It is often more difficult to cancel the booking and get your money back using
online systems.
» If the server is down for maintenance, or if the systems breaks down, it
becomes impossible to book seats by any method (temporary paper-based
systems cannot be used in case of the risk of double-booking occurring).
» If the websites are not well designed, it can be difficult to make exactly
the booking you want or can lead you to make mistakes; this is a particular
issue with flight bookings where correcting an error can cost the customer an
additional fee.
» Booking online does not allow you to build a personal relationship with a
travel agent who might offer free upgrades or special offers which may not be
available to online bookings.
>>puts customer at risk of pharming
The travel industry Transportation: flight, bus and train
Ex: book flight
As an example, we will consider booking a flight online. A form similar to the ------------------------
one shown in Figure 6.17 would appear on the screen. The user only needs to fill 1- make sure you have an interne
in the appropriate fields and the system will automatically search for available connection
flights, make bookings and transfer the funds from their bank account. Unless 2- log on to the company website
something goes wrong, there will be no need to talk to a human operator at any 3- open booking form
stage of the booking process. 4- user fill needed field in the form
5- system automatically search
available flights, and give list of
H&S them
flight booking 6- user choose one of available it
flights and confirm booking
7- user enter payment details
?
Schedule
Need help
Departing 13 JUN 2021 at Any time (type and amount) and confirm
If you need help using this part of the site, please
Returning 20 JUN 2021 at Any time
review our information about Flight booking.
Are you flexible by +/– 1 day?
8- system transfer booking money
My flight will be Return One way Multistop >
Route Don’t forget insurance to flight bank account
From Include low-cost airlines For peace of mind, we provide comprehensive online
travel insurance
To Direct flights only
Input: User will select the
requirements of the
Traveller(s)
Adult(s) Child(ren) Infants i Be informed
booking. E.g. date of
How can I get the cheapest deal?
1 0 0
• Saturday night stay
flights. Airports. Location
(2-11 years) (1 infant per
adult)
• Buy a return ticket etc.
• Book early
• Try different airports
Exercise 6g
Using the screenshot in Figure 6.17, describe the stages when a person logs on to
a flight booking website and makes a booking. Describe how the seats are booked,
how double-booking is prevented, how the customer’s tickets are produced and
how payment is made.
Also investigate the latest ways of creating e-tickets, such as using apps on
smartphones, and so on. Why are these new methods better than printing out a
confirmation email to act as the e-ticket?
11 12 13 14 15 16 17 6
5
8 9 10 18 1 7
4 9 2 8
3 7 11 12 13 14 15 16 17 0 2 9
6
2 5 8 9 10 18 1 2
2 10
1 9
E 1 3
4
6
7 11 12 13 14 15 16 17 20
2
23 E
10 18 1 2 24
2 5 8 9 19 2 2 25
1 4 7 10 11 12 13 14 15 16 0 23
D 3 6 9 17 1 2 1 2 D
2 5 7 8 8 19 2
24
25
4 6 23
C
1
2
3
3
4
5
UPPER CIRCLE 20
21
22
24
25
C
B 1 2 A B
1
A 12 13 14 15
8 9 10 11 16 1
7 7 1
6 11 12 13 14 15 16 8 19
5 9 10
4 7 8 17 1
8 1
20
21
6 10 11 12 13
3 5 7 8 9 14 15 9 2 22
2 4 5 6 0
21 23
1 3 4 17 18 19 20 21 22 16 22
E 2 16 23 24 17 E
3
3 14 15 2 5 1 8 23
1 2 1 16 17 18 19 20 21 22 26 19
D 1 1 12 15 23 2 2 7 D
C 1 0 1 1 2 13 14 4 25 28 C
B 1 B
01 26
A 1
DRESS CIRCLE A
29
9 30
8
8
9 27
28 31 The seating display at the
7
29
7 M W W 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W M
venue is shown on the screen
32
6
33
5
30
6
L 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 W W L
34
31
4
32
K 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 K
33
36
3
2
34
J 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 J
2
35
B B
1
A H 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 H A
G W 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 G on the screen display and then
F 1 2 3 4 5 6 7 16 17 18 19 20 21 W F clicks CONFIRM to go to the
E 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 E
D 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 D
next part of the process
C W W 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 C
B 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W B
A 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 A
» The customer then enters their personal details or indicates that they are a
returning customer (in which case the website being used will already have
their details).
» Payment method is then selected and payment made.
» The theatre seats are then booked in the customer’s name.
» The final details are again shown on the screen.
» An email is sent to the customer which may contain a QR code which contains
all their booking details (this acts as their e-ticket); the QR code is then
scanned at the venue.
» The database is finally updated with the booking transaction and the seats
are permanently confirmed as no longer available.
NORTH
SOUTH
The customer will need to select the event, the required day(s), number of
people and preferred seats. Because the seats are often sold in blocks, the Booking steps
database will be searched to see if there are any seats available on the chosen
date. Available seats will not show on the booking map, which is different to
the concert/cinema booking system. If there is availability, the customer will
be offered seats in the block. If the customer is happy with the option, they
simply confirm the booking and payment is made online. Confirmation will
be sent via email and/or possibly a QR code, which can be downloaded to the
customer’s smartphone; this QR code will act as their event ticket(s). Some
sporting events do not book seats (such as a golf tournament) in which case
the booking will simply be entry to the event.
The advantages and disadvantages of booking sports events online are the same
as for online booking of concert and cinema tickets.
One additional feature often offered with sporting events, is the ability to also
book flights and hotels if the event takes place overseas.
134
6.6 Banking systems
135
6 ICT applications
One common use of EFT is the payment of salaries to the staff of a company.
On the day when payments are made, the company informs the bank to transfer
money from their account into the bank accounts of their employees.
+$3000
Advantages of EFT
» It is a very secure payment method.
» It is a very quick payment method.
» It is less expensive than, for example, using cheques.
» The customer has the right to dispute an EFT payment for up to 60 days.
>>No need to hold cash (and reduce risk of mugging or cash stolen).
Disadvantages of EFT
» Once an amount has been transferred the bank cannot reverse a transaction
(requires a full dispute investigation).
» The customer needs to have funds available immediately (unlike when using a
Hodder Bank
cheque).
» It cannot guarantee the recipient (someone with a fake ID could collect the
money).
VALID
FROM
VISA
Credit/debit card transactions Chip
Many credit/debit cards are equipped with a chip as well as a magnetic stripe – ▲ Figure 6.22 Example of
the chip contains key information such as the PIN. credit/debit smart card
This system is designed to enhance security because it is better than relying only
on a signature. Paying for items using a chip and PIN card is a form of electronic
funds transfer (EFT). In this example, suppose a customer goes into a restaurant
to pay for a meal using a chip and PIN card:
» The PIN is entered using a keypad.
ex: pay for a meal in a restaurant
» The card is checked to see if it is valid (check on expiry date, whether stolen
card, etc.).
» The PIN is read from the chip on the card and is compared to the one just
keyed in.
» If they are the same, then the transaction can proceed.
137
6 ICT applications
Continue:
» If different, the transaction is terminated. customer pays for a meal in a restaurant
» The restaurant’s bank contacts the customer’s bank.
» A check is made on whether they have enough funds.
» If the card is not valid or there are not enough funds available, then the
transaction is terminated.
» If everything checks out OK then the transaction is authorised.
» An authorisation code is sent to the restaurant.
» The price of the meal is then deducted from the customer’s account.
» The same amount of money is then debited to the restaurant’s bank account.
» A receipt is produced as proof of purchase.
The advantages and disadvantages of credit cards and debit cards are shown in
Table 6.3.
▼ Table 6.3 Advantages and disadvantages of credit cards and debit cards
important
Type of card Advantages Disadvantages
Credit » there is customer protection if a » can be charged high interest rate
company stops trading or goods » annual fees often apply
>>can be do not arrive » easy to end up with credit damage
stopped » internationally accepted method as sums mount up
remotely if of payment » security risks when using credit
stolen » interest-free loan if money paid card online (see Chapter 8)
back within agreed time period
» can buy items online
Debit » money comes from customer’s » less customer protection than
current account, therefore no credit card if goods do not arrive must have money to direct pay
interest charges or company goes out of business
» safer than carrying cash » no credit allowed; customers
» can buy items online must have the funds available
>>can be stopped remotely if stolen » security risks when using debit
card online (see Chapter 8)
Cheques
Cheques are one of the oldest ways of paying somebody for services or goods.
Because it is a relatively expensive, slow and less secure way of making
payments, cheques are slowly being phased out.
The advantages and disadvantages of using cheques are shown in Table 6.4.
▼ Table 6.4 Advantages and disadvantages of using cheques
Important
Advantages Disadvantages
» more convenient and safer than cash » cheques are not legal tender and can be
» it is possible to stop payments if refused
necessary » it is a slow method of payment
» a cheque can be drawn any time (up to six » easier for fraudsters than credit card or
months after it was dated and signed) debit card payment methods
» cheques can be post-dated » relatively expensive payment method
» cheques can be traced if they are 'lost'
138
6.6 Banking systems
SIGNATURE
Magnetic Ink Character Recognition (MICR) Line
A.N. Other
cheque owner signature
In this method, cheques are cleared using an image-based system that speeds up
the cheque clearing process considerably. Hodder bank
When a cheque is paid in to a bank, an electronic image is made of the cheque using
OCR software. All of the bank details plus the sum of money to be paid are read. Smith bank
So, suppose someone uses a bank called Hodder Bank and they pay a cheque for
$50 to a company called H&S Ltd, who bank with the Smith Bank. How is the H&S
bank account credited with $50?
» The first step is called out clearing. At this stage, when Smith Bank are
presented with the cheque, a camera takes an image of the cheque and OCR
software turns this image into an electronic data format.
» Smith Bank uses this electronic data to create a digital record of the money to
be paid, the sort code on the cheque and the account number on the cheque.
» The cheque image and digital record are added to a file of other cheque
images paid in that day. There are a number of files made. Each file contains
all the cheque images and digital records for a particular bank. Therefore,
there will be a file for Hodder Bank created by Smith Bank containing cheque
data referring to Hodder Bank only; other banks will have their own files
created containing cheque data referring to their bank only.
» Smith Bank now sends all the files to a central facility. One of the files
contains all cheques relating to Hodder Bank. The central facility processes
this file in the following way:
– It breaks the file down into individual payment messages.
– It does a payment validation.
– It creates and sends a ‘request to pay’ message to Hodder Bank. This
includes a copy of the cheque images as well as the encoded information
(sort code, account number and payment amount).
» Hodder Bank receives a stream of ‘request to pay’ images and carries out
the transactions. A ‘no pay’ decision will be made if the person paying has
insufficient funds, if their account is blocked, if the cheque has not been
signed or if there is suspected fraud.
» Once a ‘pay’ or ‘no pay’ message has been received, the central facility routes
the ‘pay/no pay’ response to Smith Bank.
» All of this happens usually in less than 24 hours; still slow compared to card
payments, but much faster than the older paper-based method.
139
6 ICT applications
Internet banking
Because of the many similarities, internet banking is fully covered in Section 6.9
along with online shopping.
Use of 3D printers
3D printers were first introduced in Chapter 3. Their use in a number of fields is rapidly
progressing. One of the most innovative uses is in the field of medicine. The following
is just a small insight into the many developments taking place across the world.
Surgical and diagnostic aids
It is possible to print out anatomical parts using 3D printers. These are used as
an aid towards diagnosis and surgical procedures. The patient is scanned using:
» CT (computed tomography) – which involves producing images of the internal
parts of the body in a series of thin slices less than 0.1 mm thick, or Patient scanned using.
» MRI (magnetic resonance imaging) – this uses strong magnetic fields and
radio waves to produce a series of images of the internal organs in the body.
140
6.7 Computers in medicine
Advice
‘Biomimetic’ refers to the imitation of elements that occur in nature (such as
human cells) to create solutions to human anatomy problems.
‘Bio-inks’ are biological inks developed to work with 3D inkjet printers. By using
3D layering, they produce artificial live tissue. These biological inks are made up of ▲ Figure 6.25 Artificial
human cells and other materials (usually biopolymer gels). blood vessels produced
using 3D printing
Figure 6.25 shows a photograph of artificial blood vessels created from a 3D technique
printer.
141
6 ICT applications
Customised medicines
3D printing techniques now allow scientists to customise medicines to suit the
individual. This is known as patient-centric medicine. 3D printed medicines
are sometimes referred to as printlets (printed tablets). As newly developed
medicines are now very potent, and can have different effects on different people,
there is now a need to review the manufacturing methods used to produce them.
3D printing offers the possibility of creating personalised medicine which allows
automatically controlled release of the medicine into the patient. It even allows
multiple medicines, within a single printlet, to make fixed-dose combinations and
allows for the optimum release of each medicine into the body.
technology: vapour printing
3D printing achieves all this by adopting a new 3D inkjet technology, known as layering of multiple
vapour printing. This is a new technique where layering of multiple medicines can medicine I can be done by
be done by spraying them as a fine gas. The vapour printing process works by spraying them as fine gas
evaporating a powdered medicine and then combining it with nitrogen gas. The
resultant gas is then sprayed onto a cooled surface where it crystallises to form a
thin film. The building up of several of these thin films (using 3D printing) forms
the desired tablet with a carefully controlled geometry. Traditional medicines, in
tablet form, are formed by compression of the powder; each compressed tablet has
the same shape. By exploring the connection between geometry of the tablet and
the release of the medicine, it is possible to create the most effective medicine
release profile for each patient. Some of the advantages of this technology include:
» tailor-made medicines to suit the individual
» better control of medicine release into the body
» saves money (many modern medicines are very expensive)
» better targeting of the medicine so its effects can be optimised
» less chance of an overdose of the medicine, thus reducing harmful side-effects
(for example, chemotherapy medicines can have very unwelcome side-effects;
by reducing the release of the medicine to suit the individual, it will not only
work better but also cause fewer harmful side-effects).
Link
▲ Figure 6.26 Examples of 3D generated medicines in tablet form
Refer to Figure 2.36
in Chapter 2 to see
In the future it should be possible to send medicines to local pharmacies in the
how 3D printing uses
form of a blueprint; each blueprint would be custom-made for a patient. By CAD or blueprint
supplying the necessary materials, it would then be possible to print out the designs.
customised medicines for each patient using the blueprint.
142
6.8 Expert systems
Explanation
system
explain to the user the chain of reasoning used to arrive to a conclusion.
- Collection of facts •
User Inference Knowledge -Database to allow storage and retrieval.
interface engine base
allow non-expert
user to query
Rules -set of rules for making deduction of data
(question) expert
base - made of series of inference rules (if-then rules)
system.
▲ Figure 6.27 Expert system structure
-search engine
-apply inference rules for information that match user query. 143
6 ICT applications
Explanation system
» This informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
» For example, suppose the user was investigating a series of symptoms in a
patient and the expert system gave the diagnosis of mercury poisoning; the
explanation system would explain its reasoning with a statement such as
‘impaired vision, lack of coordination, weak muscles, slurred speech and the
patient used to work in a paint factory’. The user could then probe deeper
if necessary.
» The expert system will supply a conclusion and any suggested actions to
take; the important thing is it will also give the percentage probability of
the accuracy of its conclusions (for example, the following statement could
be made: ‘Based on the information given to me, the probability of finding
oil bearing rocks in location 123AD21G is about 21%’).
Inference engine
» This is the main processing element of the expert system.
» The inference engine acts like a search engine examining the knowledge base
for information/data that matches the queries.
» It is responsible for gathering information from the user by asking a series of
questions and applying responses where necessary; each question being asked
is based on the previous responses.
» The inference engine is the problem-solving part of the expert system, which
makes use of inference rules in the rules base.
» Because the knowledge base is a collection of objects and attributes,
the inference engine attempts to use information gathered from the
user to find an object that matches (making use of the rules base to
find a match).
Knowledge base
» The knowledge base is a repository of facts.
» It stores all the knowledge about an area of expertise obtained from a number
of expert resources.
» It is basically a collection of objects and their attributes (see the example in
Table 6.5).
144
6.8 Expert systems
146
6.8 Expert systems
disadvantage
is fairly simple, but some national and international routes can be very complex.
The inputs needed for the delivery system are: Exercise 6h
» the number of drop-off points and their location 1 Write down three
» the distance between the drop-off points advantages of
» the type of vehicle used using an expert
» delivery times expected at each drop-off point system in route
scheduling.
» layout of the road network.
2 Write down three
disadvantages of
using an expert
system in route
Exercise 6i scheduling.
56
24
B G
16
)
six
6(
11
18
E
5
10 5
19 H 21
A C J
8
8
5
10
F
16
16 10
D 26
I
The map above shows the distances between ten towns, in kilometres.
A delivery company has to deliver a parcel from town ‘A’ to town ‘J’.
Work out the shortest possible route the delivery van can take.
Exercise 6j
1 Write a sequence of instructions to show how the following expert systems
would be set up:
a identification of a chemical found at, for example, a crime scene
b a strategy game, such as chess
c engine diagnostics for a racing car.
2 Write a sequence of instructions to show how the following expert systems
would be used to:
a diagnose circuit board faults in television sets
b identify an ‘unknown’ chemical compound
c identify a new species of flower
d produce the best route for a delivery vehicle.
147
6 ICT applications
Exercise 6k
Which expert system terms are being described below?
1 A repository of facts made up of a collection of objects and their attributes.
2 It informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
3 It is made up of a user interface, explanation system and inference engine.
4 It contains a set of inference rules.
148
6.9 Computers in the retail industry
» Once the barcode has been found, the appropriate record is accessed.
» The price of the item is then found and sent back to the POS together with a
product description.
» The stock level for the item is found in the record and is reduced by one and
the new stock level is written back to the file.
– If the number in stock of the item is less than or equal to the
re-order/minimum number in stock, then the computer automatically orders - stock <= minimum
a batch of items from the suppliers (supplier information would be found - order item
on another file called the order file or supplier file – the barcode would be
the link between the two files).relationship
– Once goods have been ordered, the item is flagged on the file to indicate When goods are ordered, they
an order has been placed; this now prevents re-order action being triggered are flagged to prevent re-order.
every time this item is scanned until the new stock arrives.
– When new goods arrive, the barcodes on the cartons will be used to update when goods arrive barcode on
the stock files; also any flags associated with these goods will be removed cartoon will be used to
so that the stock checks can start to be made again. 1- update stock lite
» The above procedure is repeated until all the items in the customer’s basket/ 2- remove any flag
trolley have been scanned.
» When all the items have been scanned, the customer is given an itemised bill
showing a list (with prices) of everything they have bought.
» The computer also updates the files containing the daily takings. daily log file
» If the customer has a loyalty card, the system will also automatically update
their points total.
Most supermarkets now allow customers to scan their own items at special
checkouts; these basically work the same way as the normal POS terminals.
Electronic funds transfer at point-of-sale (EFTPOS)
When payment is made by card or electronic device (such as a mobile phone) at the
POS terminal, it is known as electronic funds transfer at the point-of-sale (EFTPOS).
The process of checking credit and debit cards at a supermarket EFTPOS is
much the same as was described for paying a restaurant bill in Section 6.6. The
communication between the supermarket EFTPOS terminals and the bank take
place through a secure connection over the internet.
We will consider payment by the following methods:
» chip and PIN
» contactless cards
» near field communication (NFC) devices.
Chip and PIN
The use of chip and PIN was discussed in Section 6.6. In the case of payment at
a supermarket, this is usually done by inserting the card into a reader and then
the procedure is identical to that described in Section 6.6. The reader makes a
connection with the chip embedded in the card. By entering the PIN, a customer Link
is carrying out a security check. The PIN and encrypted data from the chip is now
sent to the customer’s bank. If all security checks are OK (for example, a check For more on chip and
whether the card has been stolen and a check whether the expiry date has been PIN and contactless
exceeded) and the customer has sufficient funds, then an authorisation code is cards see Sections 6.6
and 2.2.
sent back to the terminal and the funds are transferred to the supermarket’s bank.
149
6 ICT applications
Contactless cards
The use of contactless card payments was discussed in Section 2.2, together with
their advantages and disadvantages.
Near field communication (NFC) devices
Near field communication (NFC) technology is discussed in more detail in
Section 6.10. When using NFC payment at a POS terminal the sequence of events
taking place is:
» The electronic device (for example, mobile phone) is held close to the NFC
reader (the terminal); this only works up to a distance of 5 cm, so the devices
need to be very close together.
» When the NFC (contactless) payment is initiated, the NFC terminal and
electronic device (smartphone) pass encrypted data back and forth to each
other to enable the payment to be made.
» This is very secure because NFC communications are encrypted and are
dynamic (which means encrypted data being shared changes every time a
transaction takes place).
» Mobile phone manufacturers use tokenisation to improve security. 1- user take photo of credit card
using smartphone camera
Use of tokenisation with mobile phones
Tokenisation is used when setting up a mobile wallet. The user takes a 2- details (card no, name of
photograph of their credit card using the smartphone’s camera. The details bank) are securely sent from
on the card (such as card number and name of bank) are securely sent by the smartphone manufacturer/
mobile wallet to the bank that
smartphone manufacturer/mobile wallet company to the bank that issued
issued the card
the card. The bank replaces the details on the card with a series of randomly
generated numbers (called tokens), which they send back to the mobile 3- Bank replace details on the
phone manufacturer, who then programs this random number into the user’s card with a random number
smartphone. This random number is then the one used for transactions. (token)
This means that retailers or other third parties involved in mobile wallet
transactions never have access to real credit card details – if their systems are 4- token sent back to mobile
hacked then the stored credit card details are not the real ones and therefore manufacturer who program
useless to the hackers. random number (token) into
user smartphone
Many smartphones are also protected by touch ID or face ID technology, which
means that even if the smartphone is stolen, the thief still cannot use the 5- random number (token) in
smartphone to make payments. used for transaction (not actual
data/ actual card number)
150
Tokenization: a process by which a piece of sensitive data, such as a credit card number, is replaced by a
surrogate/random value known as a token. Protect card data and increase security when paying.
6.9 Computers in the retail industry
» There are possible health risks associated with online shopping or banking
because of lack of exercise; if people physically go shopping then they are
getting some exercise.
» Security issues are a major concern (for example, hacking, stealing credit
card details, etc.) as are viruses and other malware (for example, phishing,
pharming, and so on).
» Accidentally using fraudulent bank or shopping websites is always a risk and
this is linked to security issues.
» It is necessary to have a computer and to pay for the internet to take part in
online shopping and banking.
» Unlike high-street shopping, it is only possible to see a picture of the goods,
(which might not portray the exact colour of an item of clothing, for example)
and nor can you try something on to see if it fits before buying them; you
also have to wait several days for the goods to arrive and returning goods may
be expensive and time consuming.
» Next-day delivery of individual items leads to more delivery traffic and pollution.
» High-street shops and banks are closing because of the increase in online
shopping and banking and this is leading to deserted high streets.
» Local independent retailers may lose out to huge multinational retail companies.
» It is easier to make errors with online banking and transfer money incorrectly
to different accounts.
Exercise 6l
1 Revisit the earlier sections of this chapter and other parts of the book.
Gather together your information and then write an article on the advantages
and disadvantages of shopping on the internet compared to shopping on
the high street.
Consider aspects such as convenience, costs and security.
2 Find out as many areas as you can in the retail industry that use barcodes
(including QR codes) and explain why barcodes are used. What other methods exist
which could replace barcodes? Why have these other methods not been adopted?
152
6.10 Recognition systems
FIRE Academy
Term 1 Week 4 (2022)
Tutor Group: 7AS
RC
FD
AE
BE
HK
TL
SM
AN
LN
AP
AR
SW
▲ Figure 6.31 Sample register which can be read by OMR - Pencil or pen marks are
The database can be searched or sorted to find data about the attendance of any scanned in by the OMR
student. (Optical Mark Reader).
Use of OMR to read multiple-choice question (MCQ) papers - scanner is used to scan
Completed multiple-choice forms can be scanned in using OMR. The forms have papers
timing marks down one side – these timing marks pass under the first column
sensor of the scanner. These marks indicate the position of each question on the - sensor is used to read
paper. Using OMR software, a template is created to map out the X-Y coordinates the marked answer (light
sensor)
153
- Form has timing marks ==> marks pass under scanner sensor ==> marks indicate position of each question paper
- using OMR software, template is created to map X-Y coordinates of each lozenge (filled or unfilled area)
- value is assigned to each lozenge
6 ICT applications
information on OMR sheet
(pre-printed form)
of each lozenge (area which is filled in by pencil/ink or left blank) – a value 1- lozenges
is then assigned to each lozenge. As each question is scanned, a light passes 2- details of the test
through the scanner which picks up the position of any lozenge which has been 3- Student/ person name
filled in by pencil/ink. The position of the filled in lozenges is compared to 4- Student/ person ID
5- Questions numbers
the corresponding coordinates on the ‘answer sheet template’. If the position 6- Center number
matches to the X-Y coordinates, then the answer is recorded as being correct. The 7- Center name
scanned results are exported to a database or spreadsheet. 8- Date of birth
If more than one lozenge is filled in for each question, then the OMR software Student information
simply discards that result. Marking MCQ sheets using OMR is much quicker
and more accurate than doing the task manually. Because the results are
automatically exported to a database or spreadsheet, it is much easier to analyse
the results.
Advantages of OMR devices
» It is a very fast way of inputting the results of a survey, etc. – the documents
are fed in automatically and there is no user input.
» Because there is no typing, they are more accurate than keying in the data.
» They are more accurate than OCR methods.
>>much easier to analyze results because data tied to database or
Disadvantages of OMR devices spreadsheet.
» The forms need to be carefully designed to make sure the marks/shading are
correctly positioned to gather accurate information. Link
» There can be problems if they have not been filled in correctly, and sometimes
have to be manually checked before being read – this is both time consuming A comparison
and expensive. between OCR and
OMR devices was
» They often only work with black pen or pencil.
covered in
» They are limited to the questions on the paper; it is not possible to get Section 2.2.4.
expansion to answers in a questionnaire, for example.
>>not suitable for text input
Barcode readers >>Have to use prepared forms which may be expensive
Please refer to Chapter 2 (Section 2.2.5) for information about barcode readers,
including their advantages and disadvantages.
QR code readers
Please refer to Chapter 2 (Section 2.2.6) for information about QR code readers,
including their advantages and disadvantages.
Optical character recognition (OCR) Scanned text is converted into a format which can be edited.
The uses, advantages and disadvantages of optical character recognition
(OCR) were discussed in Chapter 2 (Section 2.2.4). One important use of OCR
was in the clearing of bank cheques, as discussed in Section 6.6. However,
there is one additional, important application of OCR that should be
mentioned here.
Automated number plate recognition (ANPR) systems 1 ABC 234
Automatic number plate recognition (ANPR) systems are used to read the
number plates on cars in a number of applications.
▲ Figure 6.32 Sample
In the example that follows, we will describe how ANPR is used in a car vehicle with number
park to enable entry and exit to be automatically controlled by a computer plate
system.
Sensors are used to detect a car (if it's gone over the line) and a signal will be sent to a camera to take
154
a photo, the photo is sent to the microprocessor to extract the image of the number plate using OCR.
6.10 Recognition systems
example: using ANPR in car park.
Step 1
A sensor detects a vehicle and sends a signal to instruct a camera to capture
an image of the front of the vehicle (often an infrared camera is used to give a CCTV camera
clearer image and for use at night).
Camera
Car park
barrier - Sensor send signal to camera
- Sensor send signal to camera
- camera capture image of the front of vehicle
155
6 ICT applications
Disadvantages of ANPR
» There is a lack of manned security car park surveillance which could lead to could not prevent vandalism
or crime (less security)
vandalism (and other crimes) because nobody is checking on a regular basis;
CCTV is often used, but this is often just used ‘after the event’. - expensive: need to buy
» There could be invasion of privacy issues due to the recording of drivers’ cameras, sensors and programs
number plates.
» Damaged or very dirty number plates will not be recognised by the system.
» Number plate cloning; the ANPR system only recognises the number plate and
not the car, so it is possible for a car to be fitted with a cloned number plate
thus by-passing car park security, for example.
car may have a fake number plate.
Exercise 6m
Describe how automated number plate recognition (ANPR) systems can be used
in smart traffic management systems. Your description should include how ANPR
is used and how the data gathered by ANPR would be used in traffic management
control and monitoring.
First of all, we will consider the advantages and disadvantages of using RFID.
Advantages of RFID
» No line-of-sight contact is necessary; the tags can be read from a distance.
» It is a very robust and reliable technology.
» Tags are much more difficult to forge than barcodes; barcodes can be altered
or even damaged, but RFID tags are more robust and difficult to alter.
» RFID tags can reduce the number of staff needed in, for example, a warehouse
because tracking of items is automatic (thus reducing costs).
» It provides a very fast read rate (typically < 100 milliseconds to respond).
» It allows bi-directional data transfer (that is, it allows read and write
operations to take place).
» Bulk detection is possible (that is, detect several RFID tags at the same time).
156
6.10 Recognition systems
Disadvantages of RFID
» Tag collision – this is when the signals from two or more tags overlap,
interfering with each other.
» Because RFID uses radio waves, they are relatively easy to jam or interrupt.
» It is relatively easy to hack into the data/signal transmitted by the tag.
» Although there is a potential saving in staff wages, the initial cost of an RFID
system is more expensive than a comparable barcode system.
Tracking of stock
As mentioned in Chapter 2, RFID readers use radio waves to read and capture
information stored on a tag. Depending on the power of the radio waves used,
the tag can be read from several metres (for example, in livestock tracking) to
only a few millimetres (for example, in contactless card payments). The RFID tag
is made up of two components:
» a microchip that stores and processes information
» an antenna which is used to receive and transmit data/information.
The tags can be passive or active. Passive tags use the reader’s radio wave
energy to relay back the information, whereas active tags use a small embedded
battery to power the RFID. Passive tags are the most widely used because they
are smaller and cheaper to implement than active tags. Because active tags have
their own power supply, they can be read from up to 50 metres away.
RFID tag
reader
antenna
chip
computer
Tracking of stock using RFID involves either tracking of livestock (on a farm) or
goods in a shop, supermarket or distribution centre.
» Livestock tracking is used to:
– keep track of the whereabouts of every animal on a farm using active tags
– allow farmers to identify who owns an animal; particularly important where
animals graze freely on farms where it is possible for animals to stray into
neighbouring fields
– keep data about the animals on the tag (for example, medical history, date
of birth, identification (passport) number, and so on).
» Retail make use of RFID tags in the following ways:
– similar to barcodes, but can contain much more information and do not
require any manual scanning; details, such as price, description, and so on,
can all be stored on the tag and then automatically read at a checkout –
a big advantage is that several tags can be read at the same time, thus
speeding up the checkout process
157
6 ICT applications
158
6.10 Recognition systems
How smartphones use NFC to make payments was discussed in Section 6.9; the
following notes give some further information about how NFC works. There are
three distinct modes of operation with NFC:
» Peer-to-peer mode (used by smartphones):
– This allows two NFC-enabled devices to exchange information with
each other (for example, two smartphones sharing links, contacts and
photographs with each other by tapping them together).
– Both devices switch between being active (when sending data) and being
passive (when receiving data).
» Read/write mode:
– This is a one-way transmission of data.
– The passive device (for example, a tablet) links up with another device and
reads data from it.
– This is used, for example, when an active tag is sending out advertising
data to other devices.
» Card emulation mode:
– In this mode, an NFC device can function as a smart or contactless card.
– This allows the card to make payments (already discussed in Chapter 2).
– It is often used as way of entering public transport systems, where the card
is placed on an NFC reader to allow access to, for example, a metro system.
NFC has a range up to 5 cm and has a transmission rate of about 420 kilobits Both use wireless connection .
per second, which is much smaller than Wi-Fi or Bluetooth. However, NFC has
very fast connectivity since, unlike Bluetooth, there is no need to pair the two
devices connecting.
Radio-frequency Identification (RFID) systems communicate between
Biometric recognition systems an antenna or a reader and a tag attached to an object. while Bluetooth
Biometric recognitions systems include: technology is used to communicate between two Bluetooth-compatible
devices.
» face recognition
» iris and retina recognition
» finger and thumb recognition
» hand recognition
» voice recognition.
Face recognition, and finger and thumb recognition systems are covered in depth
in Chapter 8. Hand recognition (gesture control) and voice recognition systems
are covered Chapter 1.
The advantages and disadvantages of different biometric recognition systems are
covered in Table 8.3. For completeness, we will consider two additional examples
here: retina recognition and iris recognition.
Retina recognition
» The retina is the light-sensitive area at the back of the eye that has a unique
pattern of blood vessels.
» The retina cannot be seen without specialised equipment – this means it is a
secure technology, but more expensive to implement. -ADV: cannot be copied
» The special equipment is used to take an infrared photograph of the retina.
» It is quite invasive – the subject has to sit very still and stare directly into
the light source.
» It is slower to scan and verify. disadvantage: very intrusive
» It is only used in very specialised high-security settings.
159
6 ICT applications
Iris recognition
» The iris is the coloured part of the eye, surrounding the pupil.
» A digital camera is utilised which uses both visible and near infrared light to
take a sharp photograph of a person’s iris.
» The method produces a unique pattern of a person’s iris by locating and taking
an image of:
disadvantages:
– the centre of the pupil - expensive
– the edge of the pupil - very intrusive
– the edge of the iris - uses a lot of memory for the data to be stored Link
– the eyelids and eye lashes.
See Section 8.3 for
The system works with contact lenses and glasses, and for blind people. It is more on biometric
used as a method for uniquely identifying a person and, because of the speed of recognition systems,
verification (less than 5 seconds), is used a security system in the following areas: and Section 1.3 for
voice and gesture
» immigration control (in some countries)
recognition.
» some banks have introduced this in some branches as a security feature.
Global positioning systems (GPS) are used to determine the exact location of
a number of modes of transport (for example, aeroplanes, cars, ships, etc.). Cars
usually refer to GPS as satellite navigation systems (i.e. ‘satnav’).
Advice
While the term GPS is often used generically, it actually refers to a specific global
navigation satellite system (GNSS) owned and run by the USA. There are other
GNSS that perform the same function, including the Russian GLONASS and the
EU’s Galileo.
160
6.11 Satellite systems
Satellite 3
▲ Figure 6.37 Three satellite system
A1234
A1236
A1235
Exact location of the car
161
6 ICT applications
The following example shows how these layering techniques are used to produce
a visually effective answer to a query made in the GIS system:
State boundaries
+ National parks
and forests
+ Emission
monitoring
locations
Carrying out queries on GIS systems (in a method similar to internet searches)
will find data that matches the query. The data will be displayed in the form of
a diagram, map or set of tables. By zooming into the map, it is possible to find
finer details about the layering data used.
Examples of the use of GIS
» Emergency services use GIS to send the closest emergency personnel to a
location.
» Biologists and environmentalists use GIS to protect animal life and plants in
certain vulnerable areas (which meet a certain criteria after carrying out a
search on the database).
» Teachers can use GIS in their geography, science or engineering lessons.
162
6.11 Satellite systems
Advantages of GIS
» It allows geographical and thematic data of any kind to be combined in a way
which shows how they are connected to each other.
» It allows the handling and exploration of huge amounts of data (massive
number crunching).
» It allows data to be integrated from a wide range of very different sources
(which appear at first to be totally unconnected).
Disadvantages of GIS
» The learning curve on GIS software can be very long.
» GIS software is very expensive.
» GIS requires enormous amounts of data to be input (thus increasing the
chances of errors).
» It is difficult to make GIS programs which are both fast and user-friendly; GIS
requires very complex command language interfaces to work properly.
Satellites systems are used to transmit television, telephone and internet data
around the world. used to transmit data from one part of the planet to another
Advantages of media communication systems
» They have good global coverage (covers the majority of the Earth’s surface).
» They are cheaper, faster and safer than laying cables in difficult or
treacherous terrain.
» They have a very high bandwidth.
» It is relatively easy to expand the network (there are numerous companies
now manufacturing satellites for various uses).
» Security in satellite transmission is very good due to the fact that data is
coded and the receiver requires decoding equipment to read the data.
» During emergency situations it is relatively easy to move stations on the
ground from one place to another; satellites can also change their orbits if
necessary, using built-in boosters.
» They are well-suited for broadcasting, that is, one satellite signal being picked
up by many different receivers on the ground.
» Satellite receivers on the ground can be portable, enabling mobile
communication in very remote locations.
164
Exam-style questions
Exam-style questions
1 The managers of a company are concerned about illegal parking in their car
park. Drivers are parking their cars in the private car park and then walking
to the local football match. There have been a few instances of damage
to employees’ cars. A decision has been made to install a number plate
recognition system and barrier so they can control cars entering and leaving
the car park. Anyone visiting the company will need to register their car’s
number plate with the receptionist prior to their visit.
a Explain how this system could check that a car approaching the barrier
had been registered with the receptionist beforehand. [4]
b After a visitor parks their car, they have to report to the receptionist.
They are then given a badge which contains an RFID tag. The chip in
this tag is read to allow the visitor access to certain floors in the building.
Prior to this electronic system, badges contained a barcode. Discuss the
advantages and disadvantages of using RFID chips rather than barcodes
on visitor’s badges. [6]
c The company would like to offer visitors access to their facilities,
such as the restaurant, coffee shop and gift shop. Before arriving
at the company, visitors are sent a QR code which they can download
to their smartphone.
Describe how the visitor could use a QR code to find out more about
the company. [3]
d Payment at the restaurant is made using an NFC-enabled smartphone.
Explain:
i what is meant by NFC [2]
ii how the smartphone can be used to make payments. [3]
2 You have been asked by your teacher to use a word processor to create a
brochure for a new intake of pupils. The brochure will consist of:
» Images of the school taken from a digital camera.
» Printed archive photographs.
» Information about the school already stored in text files.
» Information to be typed directly into the brochure.
a Describe the steps which you will need to take to create the brochure. [6]
b When the brochure is being created, the word processing software
automatically checks the spelling of the text as it is typed in and may
suggest alternative words.
Explain why the suggestions may not always be appropriate. [3]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q7 a & b,
October/November 2019
165
3 Robots are being used in the oil industry to find new deposits under the
Earth’s surface.
a Give three advantages of using robots rather than humans when
searching for new oil deposits. [3]
b Give two disadvantages of using robots rather than humans. [2]
4 An automatic washing machine contains a device to read RFID chips sewn
into clothing. When an item of clothing is placed in the washing
machine it is scanned.
a Describe how the data is read from the RFID chip. [2]
b Explain the benefits of using RFID technology in a washing machine. [2]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q9,
May/June 2017
5 The city of Venice is in danger of being damaged due to rising sea levels.
A new computer controlled flood defence system is being planned. The
developers of the system are using a spreadsheet to model the plan.
a Give three reasons why computer models are used to simulate the flood
defence system. [3]
b The city uses a manual system for detecting flood waters.
This relies on people watching for the rising levels of water.
Explain why creating a computerised system is better than using the
manual system. [4]
c The developers have used the results from the model to choose a
computer controlled flood defence system. It will have a barrier which
can open or close.
Describe the role of the microprocessor in such a system. [5]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q10,
May/June 2017
166
9 Seven statements are shown on the left and seven computer terms are
shown on the right.
By drawing arrows, connect each description to the correct computer
term.[6]
Users watch movies or sound files on a Biomimetics
device connected to the internet; there is
no need to download the files first
167
168