ICT Notes (Theory)
ICT Notes (Theory)
An Operating System is a part of the computer model where it allows users to directly interact
with the computer there are 2 types of Operating Systems:
● Command Line Interface (CLI):
○ Type commands to directly tell what a computer to perform
○ Used by technicians
○ Can access everything on a computer system unlike GUI users who have only
access to what is presented on a screen.
■ Advantages:
● Knowing the correct commands can direct you anywhere on the
computer faster than GUI
● Uses much less RAM than any other interface
● Cheap monitors can be used
■ Disadvantages:
● Large number of commands must be memorized
● Commands must be typed without any error else the command
will fail
● Graphical User Interface (GUI):
○ Uses graphics to stand for the complicated commands
○ Screen divided into windows allow different things to run on each window
■ Advantages:
● Easy to use as not much IT knowledge is required
● Easy to explore
● Not having to learn complicated commands
● Good help facilities are provided by GUI
■ Disadvantages:
● Larger amount of hard disk space than other interfaces
● Requires more RAM
● GUI uses more power to display
● Experienced programmers may find GUI slow and CLI much more
comfortable
Laser Printers:
● Produce very high-quality hard copy output
● Print rate per page is fast if many pages are being printed
● Rely on large buffer memories – the data for the whole document is stored before pages
can be printed out
Advantages:
1. Printing is fast for high volume tasks, may be slightly faster than an Inkjet printer if less
documents are provided
2. Can handle large printing jobs
3. Quality is consistent
4. Toner cartridges last for longer than a normal ink cartridge
Disadvantages:
1. Expensive to buy
2. Color lasers tend to be more expensive
3. Produce ozone and volatile organic compounds because of their method of printing
4. These have been linked to several health hazards in an office environment
Inkjet Printers:
● Used for good quality hard copies of documents – although not as good as a laser
printer, it is significantly better than a Dot-Matrix printer
● Do not have large buffer memory so printing takes time
● Printer may pause if too much data is provided to it
Advantages:
1. High quality output
2. Cheaper than laser printers
3. Very lightweight and take up little space
4. Does not create any chemicals which could potentially harm someone
Disadvantages:
1. Output is slow if several copies are needed
2. Ink cartridges run out quickly so is not generally used for large printouts
3. Printing can smudge if the user is not careful
4. Can be expensive if the printer is used often
Main task is to It can only connect Each device has an Converts computer’s
receive data and the networks that use access control media digital signals into
send it to other the same way for address (MAC analogue for
devices handling messages Address) which transmission through
identifies it uniquely telephone lines
Information will They do this by Data sent will have a Reverses the process
always be received changing the form of MAC address which above (demodulation)
whether its relevant the message to suite tells the source and for a computer to
or not the different type of receiving device process the data
network
Dial up internet access Slowest type (60kbps), Telephone line gets tied up while a dial up
modem is in operation
Cable internet access Local cable television operator gives user access through cable
networks
Internet Intranet
Analysis:
1. Fact finding/collecting data from the current system
(Observation, Interviews, Questionnaires and looking at
existing paperwork)
2. Description of the current system
3. Identification of the errors in the current system
4. Agreeing with the objectives with the customer
5. Identifying and agreeing with the customer’s
requirements
6. Interpreting the customers requirements
7. Producing cost-benefit analyses
8. Producing a data flow diagram
Design:
Verification:
● Double data entry: Data is entered twice, sometimes by two different people. The
computer compares the two entries and pinpoints the similarities and differences
between the two entries
● Visual Check: Checking for errors by checking on a screen with the data in the original
document
Validation:
● Range check
● Length check
● Character/type check
● Format/Picture check
● Limit check
● Presence check
● Consistency check
● Digit Check
Implementation:
Security of data:
Phishing: Involves the fraudulent operation of emails.
Pharming: Involves installing malicious code onto the victims computer and running it.
Smishing: Phishing via SMS
txt Text
Non-unique records