Lesson6 0417 ICT
Lesson6 0417 ICT
6.1 Communication
There are several communication systems that make use of ICT technology.
For example:
» newsletters and posters
» websites
» multimedia presentations
» media streaming
» e-publications.
110
been taken specially or have been downloaded from the internet (with the
permission of the copyright holder). The following sequence is fairly typical of
how such a document would be produced on a computer system. The sequence is
not always necessarily in the order shown; it can vary depending on what already
exists or what needs to be created):
» First a word-processor application would be opened
» Photos could be obtained by:
– using a digital camera and taking photos
– searching for images/photos on the internet, or suitable photos could
already be stored on the hard drive or cloud
– using hard copy photos, which could be scanned in.
» If necessary, camera images would then be uploaded (either by connecting the
camera or camera memory card) to the computer via a USB port, or by using
Bluetooth connectivity).
» Photos from all selected sources would then be saved to a file on the HDD or SSD.
» When the user is finally ready to produce the document, the photos would be
imported from the file stored on the HDD/SSD.
» Once imported, photos would need to be cropped, edited and/or resized.
» Text would be typed in using a keyboard.
» Alternatively, any previously saved text would need to be imported.
» Photos need to be placed in their correct position and the text wrapped.
» Finally, the whole document would need to undergo proofreading for errors
and then saved, ready for printing.
Very often, other features, such as a spell checker, would be used to make sure
no mistakes had been made. Care needs to be taken when using a spell checker
for the following reasons:
» The language used in checking the spelling could be different; for example,
British English and American English often have different spellings of words.
» Names or proper nouns might be highlighted as an error by the spell checker,
but may be acceptable.
» Similar sounding words need to be checked; for example, where, were or wear
all sound the same but have very different meanings – these will not be Link
picked up by the spell checker (but might be picked up by a grammar checker).
» The (correct) highlighted word may not exist in the spell checker dictionary. Other word-
processing features
could be used
Exercise 6a when producing the
Find out what other word-processing features would need to be used when newsletter or poster;
producing a newsletter or poster. For each feature identified, write down how you refer to Chapter 17
would use it to produce a professional-looking document. for more information.
TRUE CRIME
1 pm untill 4 pm.
new song.
No entry fee.
Refer to chapters in
Créche, reception tent, free
parking
the second half of
August 22nd 2022 this book wherever
necessary.
112
Advantages Disadvantages
» sound/video/animation can be added » websites can be hacked into and modified or viruses introduced
» links to other pages and websites can be » risk of potential pharming
added in hyperlinks and hot spots » it is necessary for the potential customers to have a computer and internet
» buttons to navigate/move around the connection
website, leading to more information » it is not as portable as a paper-based system (although with modern
» ‘hit counters’ allow the owner to see smartphones and phablets this is fast becoming untrue)
detailed information about how many » possible for customers to go to undesirable websites (either by accident or
people have visited the website as a result of a pharming attack) – this can lead to distrust from customers
» can be seen by a global audience » there is a need for the company to maintain the website once it is set up –
» cannot be defaced or thrown away this can be expensive
» it is much easier to update a website » because it is a global system, it is more difficult to target the correct
(and there is no need to do a reprint and audience using website advertising
then distribute the new version) » still need to find a way for people to find out about the website
113
Multimedia presentations
Presentations that use animation, video and sound or music are generally much
more interesting than static presentations done on slides or paper.
Presentations are produced using one of the many software packages on the
market and then used with a multimedia projector so that the whole audience
is able to see the presentation. There are many advantages and disadvantages for
this type of presentation, with some examples listed below.
Advantages of multimedia presentations
» use of sound and animation/video effects which are more likely to grab
the attention of the audience, and can make the presentation easier to
understand
» possible to have interactive hyperlinks built into the presentation; this
means the presentation could access a company’s website or even key
files stored on the cloud (such as video footage, images, spreadsheets
and so on)
» use of transition effects allow a presentation to display facts in a key or
chronological order
» can be interactive
» more flexible; because of the links to websites and other external systems
(for example, the cloud), the presentation can be tailored to suit a particular
audience.
Media streaming
Media streaming is when users watch movies/videos or listen to music on
devices connected to the internet. When using media streaming there is no need
to actually download and save the video or audio files.
Streaming is a continuous transmission of video or audio files from a remote
server where the files are stored. This means data is transmitted and played in
real time. In contrast, when downloading it is necessary for the user to store
the entire file on the computer’s HDD or SSD before they can watch the video
or listen to the music. This uses up valuable storage space and download times
for a two-hour video can be up to one hour, depending on the internet speed
and the video quality.
With streaming, the file is sent as a series of packets of data. Each packet is
interpreted by the web browser. Streaming only works well if the internet speed
is stable, and at least 25 Mbits/second (for an HD video).
114
Because the playback of the media files is usually much faster than the rate
at which data is received over the internet, data packets are buffered in the
computer. Buffering makes sure the video plays back smoothly without freezing.
While the buffer is receiving data packets, it will be sending the data from the
previous data packets to the playback device. In this way, there appears to be
no gaps in the received data. Obviously, having a large buffer will considerably
reduce the possibility of freezing the play back.
BUFFER
Data packets sent to Playback
playback device device
e-publications
Most material which is published on paper is also available in an electronic
format. For example:
» e-books
» digital magazines
» digital newspapers
» digital libraries.
115
Exercise 6c
Write down as many advantages and disadvantages you can think of for offering
customers e-publications rather than paper-based publications. Write a
paragraph describing each advantage and disadvantage.
Each tower transmits within its own cell. If you are driving a car and get to
the edge of a cell, the mobile phone signal starts to weaken. This is recognised
by the network and the mobile phone then picks up the signal in one of the
adjacent cells. If a person is making a call or sending a text to somebody in a
different country, then satellite technology is used to enable the communication
to take place.
Mobile devices either use a SIM (subscriber identity module) card to allow it
to connect to the mobile phone cellular network, or they use wireless internet
connectivity. Together they allow all of the following features:
» SMS (short message service) messaging
» phone calls
» Voice over Internet Protocol (VoIP) communication
» video calling
» internet access.
116
Phone calls
Link
Probably the most obvious use of a mobile phone is its ability to make a phone
call on the move. Because mobile phones are so small and they have their own For more information
power source, they are an ideal way of keeping in touch anywhere, provided there on the features of
is a network signal. Mobile phone networks are still not as stable as landline mobile phones, refer
systems and for that reason alone, landline phones are still in common use. back to Chapter 1.
Using mobile phones to make phone calls has the following advantages:
» There is no need to look for an operational public telephone in an emergency.
» It is possible to conduct business or personal phone calls on the move.
» It is easier to keep in contact with co-workers at the office no matter where
you are.
117
Internet access
Access to the internet from a mobile device is another valuable feature. Any
mobile device can connect to the internet either using a wireless broadband ▲ Figure 6.5 Cloud video
connection or via the mobile phone network. Due to the use of smaller screens, calling
internet pages displayed on mobile phones are often different to those
on desktop or laptop computers. Software detects which type of device is
connecting to a website, which then sends out the web page optimised for that Link
device. Mobile devices also have a built-in feature which automatically selects
wireless broadband connectivity (if possible), instead of the mobile phone See Chapter 4 for
more on Wi-Fi
network, when connecting to the internet. This has the following advantages:
networks.
» less expensive (mobile phone company ‘data plans’ often have a cap on how
much data can be downloaded, and charge for exceeding this maximum)
» lower power consumption (Wi-Fi routers are usually much closer than
the mobile phone towers; the longer the range, the greater the power
consumption)
» quality of service (Wi-Fi usually offers greater bandwidth than the mobile
phone network giving the possibility of downloading more data more quickly).
118
119
All of these scenarios can be tested using a computer model. The design can then
be modified on the computer if any of the above scenarios caused the bridge to
fail. After a number of modifications, a final design will be decided on. To ensure
▲ Figure 6.7 Wind-tunnel
the computer model gives good results, a scale model of the bridge would then tests on a new bridge
be constructed and subjected to wind-tunnel (and other) trials. design
Similar methods are used when designing new buildings, particularly skyscrapers.
Again, computer models are used, often in conjunction with wind-tunnel tests on
a scale model. When testing the building using a computer model, a number of
scenarios need to be considered:
» what is the effect of natural phenomena, such as hurricane winds, flooding,
earthquakes and any other potentially damaging phenomena (wind movement
is a key issue with tall buildings; a 100-storey building may sway one metre to
the left and then one metre to the right, cycling every ten seconds, in strong
winds – can the building survive such movement, will such movement be
unpleasant or frightening to human occupants, and so on)
» the effect of a disaster, such as a fire – how does the structure stand up to
such scenarios?
» how is it possible to move people around the building efficiently (some large
structures have over 5000 people working in them and there is a need to
model elevator movements to move people efficiently)?
All of these scenarios can be tested using a computer model. The design
can then be modified on the computer if any of the above scenarios caused
120
the building to fail to meet any of its design criteria. After a number of
modifications, a final design will be decided on. To ensure the computer model
gives good results, a scale model of the building is then constructed and it is
subjected to wind-tunnel trials:
Once a model exists which simulates the area where there is potential flooding, a
plan can be put forward to guard against future flooding. Data is continuously added
to the model once the flood defences have been put into place. This could result in
further flood defences being built, or modifications to the existing system.
121
Figure 6.9 shows the management of the flood protection system in the city of
Venice as an example.
Flooding of the city over many years has led to the building of a number of
flood barriers. It is useful to use computer models to understand how these
flood barriers will react to a range of possible flooding scenarios. It is possible
to try out several different solutions, using the model, before actually building
▲ Figure 6.9 Flood
any flood defences. Following the computer modelling results, Venice decided management barriers
to develop a computer-based system rather than build a manual flood defence
system. The main advantages of doing this are:
» Sensors could be used out in the bay area to monitor sea height and wave
height (and possibly other factors, such as wind speeds); using sensors would
give a much faster response to any deteriorating conditions in the bay.
» Using a computer system is safer, since using humans to monitor conditions
could potentially put them at risk.
» Data collection is continuous and more accurate than manual measurements
(readings can also be taken more frequently).
» Because of the faster response to changing conditions, city dwellers can be
warned well in advance of any flooding actually taking place.
» Data from the sensors could also be fed into the simulation modelling the
flood area; this could lead to further improvements as more data is gathered,
which means the simulation becomes closer to reality.
Traffic management
Computer modelling can be used in traffic management. We will consider two
different situations.
Closure of motorway lanes
Repairs need to be made to part of the central barriers on an eight-lane motorway.
The company given the task of carrying out these repairs needs to model the
impact of the roadworks on the traffic flow. They have decided there are two ways
of controlling traffic which need to be modelled. The two models shown in Figure
6.10 will appear on the computer screens, representing the motorway lanes.
The company will run model ‘A’ and model ‘B’ using different traffic densities at
different times of the day to see which one allows for the best traffic flow. The
122
model will also try out the effect of different speed limits through the roadworks.
They will also simulate the effects of a breakdown to see how this would impact
on the traffic flow. By changing conditions in the simulation, it becomes possible
to find an optimum design which allows the traffic to flow freely, but also allows
the repairs to be done as quickly as possible. This is considerably safer, cheaper and
much quicker than trying out different traffic closures on a real motorway.
Traffic light simulation
Figure 6.11 shows a second use of computer modelling in traffic management – a
set of traffic lights are to be modelled at a Y-junction.
accurately (that is, by comparing the model’s results with actual traffic flow
data) then different scenarios can be tried out. For example:
» varying the timing of the lights and observing how the traffic flow was affected
» changing the number of vehicles stopped at part of the junction and then
changing the timing of the lights to see how the traffic flow is affected
» increasing or decreasing traffic flow in all directions
» considering how emergency vehicles affect traffic flow at different times of the day.
How would the system work in real life? Link
» Sensors in the road gather data and count the number of vehicles at the junction.
Also refer to Section
» This data is sent to a control box or to a computer (it will need to be 6.10, which describes
converted first into a form understood by the computer). the use of automated
» The gathered data is compared to data stored in the system (the stored data number plate
is based on model/simulation predictions which were used to optimise the recognition (ANPR)
traffic flow). systems – another
» The control box or computer ‘decides’ what action needs to be taken. way to carry out
» Signals are then sent out to the traffic lights to change their timing if necessary. traffic management.
Weather forecasting
Weather stations are set up to automatically gather data from the environment.
They are usually automatic and use a variety of sensors to measure:
» rainfall
» temperature
» wind speed
» wind direction
» barometric pressure (air pressure)
» humidity.
The data needs to be gathered every hour of every day of the week. This data
can then be input into a model which simulates weather patterns. By running
the computer model, weather forecasters can predict the weather for the
next few days or even longer. The foundation for weather models are complex
mathematical equations that represent air movement and how heat and moisture
are exchanged in the atmosphere. In a model, the atmosphere is divided up into
a three-dimensional grid. The data from the weather stations is input into the
appropriate grid and the model is run forward in time to make predictions.
» Data is input into the model and a prediction of the weather for the next few
days is made.
» At the end of the weather forecast period, the model compares its weather
forecast with the actual weather that occurred.
» The model ‘learns’ from previous weather situations; improvements to how it
predicts weather are constantly made.
» The new data is then input into the model, and a weather forecast for the
next few days is made.
» A very powerful computer is needed to run this model, since it has to ‘number
crunch’ vast amounts of data.
Weather modelling is often shown in animated format where cloud, rain, sun
and wind are projected on top of a map of the country and shown in real time
(Figure 6.12).
124
Low
Low
2.3 inches rain
66mph gusts
tream
Jet S
High
Exercise 6d
Create a spreadsheet to do some personal financial modelling. Include the monthly income in one row and
then show all the monthly outgoings. For example:
A B C D E F G
Month 1 Month 2 Month 3 Month 4 Totals
Income ($):
Outgoings: food
cinema
clothes
other
savings
Extend the list as much as you want or change the outgoings to be more realistic if necessary. Insert some
values into the spreadsheet and then change a few values to see the effect on your finances. Add extra
columns or extra outgoings to extend the spreadsheet. Finally, try creating a graph of your income against
outgoings for each month and for a year (do a prediction for the year after four months, for example).
125
Exercise 6e
Here is a list of five simulations/models and also a list of five reasons why models are carried out. Try and
match the five simulations to the BEST REASON why that simulation would be done.
Simulation Reason
SIMULATING BRIDGE LOADING Take too long to get results back from real thing
126
Robots are very good at repetitive tasks. However, if there are many different
tasks to carry out (for example, making specialist glassware for some scientific
work), then it is often better to use human operators.
Advantages in using robots
» They can work in environments harmful to human operators.
» They can work non-stop (24/7).
» They are less expensive in the long term (although expensive to buy initially,
they do not need wages).
» They have higher productivity (do not need holidays, etc.).
» They provide greater consistency (for example, every car coming off a
production line is identical).
» They can do boring, repetitive tasks, leaving humans free to do other more
skilled work (for example, quality control or design work).
» They can carry out different tasks by fitting them with different end-effectors
(attachments); for example, a spray gun, a welding gun, and so on.
The production line will be continuous, with various robots at each station given
a specific task. Using robots in this way leads to:
» faster operations (the number of cans of baked beans filled is 120 per minute)
» much greater productivity (the production can run 24 hours a day for every day)
» greater consistency (every can contains exactly the correct weight of baked beans)
» built-in quality control (automatic testing for foreign material, such as metal
filings, which would result in automatic rejection from the production line)
» reduced cost to the consumer (although initial robot arms are expensive, there
are far fewer staff in the factory who would need wages).
Let us take a closer view of how robots could be used in a bottling plant.
» Sensor 1 (a pressure sensor, light sensor or camera) detects the presence of a
bottle; this sensor is constantly sending signals back to the computer.
» When the signal from sensor 1 indicates a bottle is present, the computer sends a
signal to an actuator which opens a valve allowing liquid to flow into the bottle.
» Sensor 2 (a level sensor) is used to detect the correct liquid height in the
bottle; this sensor sends continuous signals back to the computer.
127
actuator
operating valve
valve
computer sensor 2
sensor 1
» When the signal from sensor 2 indicates the bottle is full, the computer sends
a signal to an actuator to close the valve.
» The computer then sends another signal to a second actuator which operates
a motor to move the conveyer belt to allow the next empty bottle to take its
correct position.
» The whole process is continuous until stopped for maintenance, errors
occurring or a change in the process.
Exercise 6f
Find out about five industrial processes that use production line control.
In each case, find out the functions of robots at each stage in the process.
In each case, find the advantages and disadvantages of using robots on the
production line
128
Method 1
Issue each student with an ID card. These contain a magnetic stripe (shown in FIRE-Academy
black) on the rear of the card. The student would have to sign the card and also
write their unique student ID on the back of the card. The magnetic stripe would
Paul Smith-012 234 555
contain the name of the school, the name of the student, the student’s data of
birth and their unique ID (registration) number.
▲ Figure 6.15 Student
Each morning the student would arrive at school and swipe their ID card through registration card
a magnetic card reader. The data read would identify the student and the time
and date they entered the school’s premises. This data would now be stored on
a database. On leaving the school (either at lunchtime or at the end of the day),
the ID card would again be swiped. This would now record the leaving time and
date on the database. This would give a very comprehensive record of when the
student attended the school and the number of hours they attended. It would
also be a more secure method in the event of, for example, a fire. Using the
paper-based system, a student could register then just go home, but with an ID
card system, the student’s attendance would be known at all times. The school
would now be able to account for every student on the school premises. At the
end of a semester (or school year), the database could be interrogated and it
would give an accurate attendance record for the student. This attendance record
could then be sent out to parents or checked by teachers on a regular basis.
There are further functions that could be used such as:
» the use of a PIN to stop another student swiping in with the wrong card
» the use of GPS tracking (see Section 6.11) so the exact whereabouts of a
student would be known; this would require the addition of a chip in the
ID card so that the tracking system could identify them (see Section 6.11
for information on RFID) – however, there are privacy concerns surrounding
location tracking.
Method 2
A second method could make use of biometrics. Each student would have their
fingerprints recorded. Their personal details (as in Method 1) plus fingerprints
would be stored on a database. When a student entered the school premises,
they would be asked to put their hand on a scanner which would read their
fingerprints. Because each student has unique fingerprints, this system would
be very secure. As with Method 1, the date and time of entering or leaving the
school would be accurately recorded on the database.
Advantages of this method compared to use of magnetic ID cards
» Fingerprints are unique, so it would be impossible for a student to sign in
pretending to be someone else (with magnetic cards, a student could give
their card to a friend and ask them to sign in for them) – this gives more
accurate data and improved security.
» ID cards could easily be lost – fingerprints are ‘part of you’ so cannot be lost.
» ID cards could be affected by magnetic fields (for example, by being placed
close to a mobile phone) which would stop them working properly.
» It is much easier to ‘clone’ (make copies of) ID cards than it would be to copy
fingerprints (not impossible but very difficult).
129
Student performance
Teachers could make considerable use of spreadsheets to monitor the
performance of their students. Essentially, spreadsheets could record the test
results of each student over a term/year. This would allow a teacher to easily see
how they were performing against other students in the same subjects. It would
also be easy to import data into a report, for example, summarising a student’s
performance over the academic year.
School management systems are used to record the performance of students.
Performance can consist of both academic achievement and behaviour. To
produce an end-of-term or end-of-year report, the system would need to have
access to the following data:
» student’s exam and test results in all subjects studied over the term/year
» behavioural data (this would include attendance records and, for example,
number of times the student was in detention)
» CAT scores (these are standardisation test results to enable each student to be
measured against a standard).
Computer-aided learning
Computer-aided learning (CAL) is the use of computer-based systems to assist in
the academic teaching of students. They are designed to enhance, and not replace,
traditional classroom teaching. Students would use computers as part of their
learning and complete online tests to monitor their performance. If a student
encounters a problem, CAL is not always able to help the student, however, and in
those cases, students would need to take steps to find additional help.
Advantages of using CAL to enhance the learning process
» Students can learn when they want to and at their own pace.
» It allows virtual reality (VR) learning to be used; with VR, the student is fully
immersed into the learning environment.
» The student can stop at any point and return later to continue where they left off.
» It is possible to re-take tests until the student reaches the required skills level.
» CAL can make learning more interactive.
» CAL makes use of various multimedia (for example, short video clips,
animation, music and interactive learning methods).
130
» The real goal of CAL is to stimulate student learning and not actually replace
teacher-based learning; CAL, if used properly, should be an integrated part of
the student’s learning process.
» CAL can make use of multiple-choice questions (MCQs) which can be marked
immediately by the computer system, giving instantaneous feedback to the
student; other assessment methods can be used, such as fill in the missing
words, crossword puzzles, linking correct terms to descriptions and gaming.
» It can deliver micro-learning; this is where a topic is broken down into small
modules which are easy to learn, and is when CAL is most effective.
» Very often there are no printed tickets, which saves postal costs and also
allows ‘impulse’ bookings only a few hours in advance.
» Online booking allows the use of modern smartphone and tablet Apps
technology; the customer is sent a QR code which contains all the booking
information necessary (this QR code is stored on the smartphone or tablet and
only needs to be scanned at, for example, the theatre or airport on arrival). ▲ Figure 6.16 Example
of a booking QR code
Disadvantages
» The setting up and maintenance of online booking systems is expensive.
» All customers using this service need access to a computer or mobile phone
and a reliable internet connection.
» It is often more difficult to cancel the booking and get your money back using
online systems.
» If the server is down for maintenance, or if the systems breaks down, it
becomes impossible to book seats by any method (temporary paper-based
systems cannot be used in case of the risk of double-booking occurring).
» If the websites are not well designed, it can be difficult to make exactly
the booking you want or can lead you to make mistakes; this is a particular
issue with flight bookings where correcting an error can cost the customer an
additional fee.
» Booking online does not allow you to build a personal relationship with a
travel agent who might offer free upgrades or special offers which may not be
available to online bookings.
H&S
flight booking
?
Schedule
Need help
Departing 13 JUN 2021 at Any time
If you need help using this part of the site, please
Returning 20 JUN 2021 at Any time
review our information about Flight booking.
Are you flexible by +/– 1 day?
My flight will be Return One way Multistop >
Route Don’t forget insurance
From Include low-cost airlines For peace of mind, we provide comprehensive online
travel insurance
To Direct flights only
Traveller(s)
Adult(s) Child(ren) Infants i Be informed
132
Exercise 6g
Using the screenshot in Figure 6.17, describe the stages when a person logs on to
a flight booking website and makes a booking. Describe how the seats are booked,
how double-booking is prevented, how the customer’s tickets are produced and
how payment is made.
Also investigate the latest ways of creating e-tickets, such as using apps on
smartphones, and so on. Why are these new methods better than printing out a
confirmation email to act as the e-ticket?
11 12 13 14 15 16
17 1 6
5 9 10 8 8 19 7
4 20 8
3 7 11 12 13 14 15 16 9
6 17 1 21
2 5 9 10 8 8 1 22 10
9
E 1 4 7 12 13 14 15 16 20 23 E
3 6 10 11 17 18 21 24
2 5 8 9 19 2 22 25
4 7 12 13 14 15 16 0 23
D
1 3 6 9 10 11 17 1 21 D
2 5 7 8 8 1 22 24
25
4 6 9 2 23
C
1
2
3
3
4
5
UPPER CIRCLE 0
21
22
24
2 5
C
B 1 2 A B
1
A 13 14 1512
9 10 11 16 1
7 8 7 1
8 1
6 13 14 1512
5 9 10 11 16 1 9 2
4 7 8 7 18 0
21
6 11 12 13 10 19
3 5 7 8 9 14 15 20 22
2 4 5 6 21 23
3 20 21 22 19 16
E 1 2 4 16 17 18 23 24 17 22 E
3 14 15 25 2 18 23
1 2 2 13 19 20 21 22
16 17 18 6 2 19 D
D 1 11 14 15 23 2 72
C 0 1 2 13 4 25 8 C
B 1 01
1 1
26 B
A 1
DRESS CIRCLE A
29
9 30
8
8
9 27
28 31 The seating display at the
7
29
7 M W W 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W M
venue is shown on the screen
32
6
33
5
30
6
L 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 W W L
34
31
4
32
K 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 K
33
36
3
2
34
J 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 J
2
35
B B
1
A H 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 H A
G W 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 G on the screen display and then
F 1 2 3 4 5 6 7 16 17 18 19 20 21 W F clicks CONFIRM to go to the
E 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 E
D 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 D
next part of the process
C W W 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 C
B 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W B
A 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 A
» The customer then enters their personal details or indicates that they are a
returning customer (in which case the website being used will already have
their details).
» Payment method is then selected and payment made.
» The theatre seats are then booked in the customer’s name.
» The final details are again shown on the screen.
» An email is sent to the customer which may contain a QR code which contains
all their booking details (this acts as their e-ticket); the QR code is then
scanned at the venue.
» The database is finally updated with the booking transaction and the seats
are permanently confirmed as no longer available.
NORTH
SOUTH
The customer will need to select the event, the required day(s), number of
people and preferred seats. Because the seats are often sold in blocks, the
database will be searched to see if there are any seats available on the chosen
date. Available seats will not show on the booking map, which is different to
the concert/cinema booking system. If there is availability, the customer will
be offered seats in the block. If the customer is happy with the option, they
simply confirm the booking and payment is made online. Confirmation will
be sent via email and/or possibly a QR code, which can be downloaded to the
customer’s smartphone; this QR code will act as their event ticket(s). Some
sporting events do not book seats (such as a golf tournament) in which case
the booking will simply be entry to the event.
The advantages and disadvantages of booking sports events online are the same
as for online booking of concert and cinema tickets.
One additional feature often offered with sporting events, is the ability to also
book flights and hotels if the event takes place overseas.
134
135
One common use of EFT is the payment of salaries to the staff of a company.
On the day when payments are made, the company informs the bank to transfer
money from their account into the bank accounts of their employees.
Company’s Employee’s
account accounts
+$5000
+$3000
Advantages of EFT
» It is a very secure payment method.
» It is a very quick payment method.
» It is less expensive than, for example, using cheques.
» The customer has the right to dispute an EFT payment for up to 60 days.
Disadvantages of EFT
» Once an amount has been transferred the bank cannot reverse a transaction
(requires a full dispute investigation).
» The customer needs to have funds available immediately (unlike when using a
Hodder Bank
cheque).
» It cannot guarantee the recipient (someone with a fake ID could collect the
money).
VALID
FROM
VISA
Credit/debit card transactions Chip
Many credit/debit cards are equipped with a chip as well as a magnetic stripe – ▲ Figure 6.22 Example of
the chip contains key information such as the PIN. credit/debit smart card
This system is designed to enhance security because it is better than relying only
on a signature. Paying for items using a chip and PIN card is a form of electronic
funds transfer (EFT). In this example, suppose a customer goes into a restaurant
to pay for a meal using a chip and PIN card:
» The PIN is entered using a keypad.
» The card is checked to see if it is valid (check on expiry date, whether stolen
card, etc.).
» The PIN is read from the chip on the card and is compared to the one just
keyed in.
» If they are the same, then the transaction can proceed.
137
Cheques
Cheques are one of the oldest ways of paying somebody for services or goods.
Because it is a relatively expensive, slow and less secure way of making
payments, cheques are slowly being phased out.
The advantages and disadvantages of using cheques are shown in Table 6.4.
▼ Table 6.4 Advantages and disadvantages of using cheques
Advantages Disadvantages
» more convenient and safer than cash » cheques are not legal tender and can be
» it is possible to stop payments if refused
necessary » it is a slow method of payment
» a cheque can be drawn any time (up to six » easier for fraudsters than credit card or
months after it was dated and signed) debit card payment methods
» cheques can be post-dated » relatively expensive payment method
» cheques can be traced if they are 'lost'
138
Hodder Bank
DATE 1st Feb 2020
H&S Ltd
SIGNATURE
A.N. Other
In this method, cheques are cleared using an image-based system that speeds up
the cheque clearing process considerably.
When a cheque is paid in to a bank, an electronic image is made of the cheque using
OCR software. All of the bank details plus the sum of money to be paid are read.
So, suppose someone uses a bank called Hodder Bank and they pay a cheque for
$50 to a company called H&S Ltd, who bank with the Smith Bank. How is the H&S
bank account credited with $50?
» The first step is called out clearing. At this stage, when Smith Bank are
presented with the cheque, a camera takes an image of the cheque and OCR
software turns this image into an electronic data format.
» Smith Bank uses this electronic data to create a digital record of the money to
be paid, the sort code on the cheque and the account number on the cheque.
» The cheque image and digital record are added to a file of other cheque
images paid in that day. There are a number of files made. Each file contains
all the cheque images and digital records for a particular bank. Therefore,
there will be a file for Hodder Bank created by Smith Bank containing cheque
data referring to Hodder Bank only; other banks will have their own files
created containing cheque data referring to their bank only.
» Smith Bank now sends all the files to a central facility. One of the files
contains all cheques relating to Hodder Bank. The central facility processes
this file in the following way:
– It breaks the file down into individual payment messages.
– It does a payment validation.
– It creates and sends a ‘request to pay’ message to Hodder Bank. This
includes a copy of the cheque images as well as the encoded information
(sort code, account number and payment amount).
» Hodder Bank receives a stream of ‘request to pay’ images and carries out
the transactions. A ‘no pay’ decision will be made if the person paying has
insufficient funds, if their account is blocked, if the cheque has not been
signed or if there is suspected fraud.
» Once a ‘pay’ or ‘no pay’ message has been received, the central facility routes
the ‘pay/no pay’ response to Smith Bank.
» All of this happens usually in less than 24 hours; still slow compared to card
payments, but much faster than the older paper-based method.
139
Internet banking
Because of the many similarities, internet banking is fully covered in Section 6.9
along with online shopping.
Use of 3D printers
3D printers were first introduced in Chapter 3. Their use in a number of fields is rapidly
progressing. One of the most innovative uses is in the field of medicine. The following
is just a small insight into the many developments taking place across the world.
Surgical and diagnostic aids
It is possible to print out anatomical parts using 3D printers. These are used as
an aid towards diagnosis and surgical procedures. The patient is scanned using:
» CT (computed tomography) – which involves producing images of the internal
parts of the body in a series of thin slices less than 0.1 mm thick, or
» MRI (magnetic resonance imaging) – this uses strong magnetic fields and
radio waves to produce a series of images of the internal organs in the body.
140
Advice
‘Biomimetic’ refers to the imitation of elements that occur in nature (such as
human cells) to create solutions to human anatomy problems.
‘Bio-inks’ are biological inks developed to work with 3D inkjet printers. By using
3D layering, they produce artificial live tissue. These biological inks are made up of ▲ Figure 6.25 Artificial
human cells and other materials (usually biopolymer gels). blood vessels produced
using 3D printing
Figure 6.25 shows a photograph of artificial blood vessels created from a 3D technique
printer.
141
Customised medicines
3D printing techniques now allow scientists to customise medicines to suit the
individual. This is known as patient-centric medicine. 3D printed medicines
are sometimes referred to as printlets (printed tablets). As newly developed
medicines are now very potent, and can have different effects on different people,
there is now a need to review the manufacturing methods used to produce them.
3D printing offers the possibility of creating personalised medicine which allows
automatically controlled release of the medicine into the patient. It even allows
multiple medicines, within a single printlet, to make fixed-dose combinations and
allows for the optimum release of each medicine into the body.
3D printing achieves all this by adopting a new 3D inkjet technology, known as
vapour printing. This is a new technique where layering of multiple medicines can
be done by spraying them as a fine gas. The vapour printing process works by
evaporating a powdered medicine and then combining it with nitrogen gas. The
resultant gas is then sprayed onto a cooled surface where it crystallises to form a
thin film. The building up of several of these thin films (using 3D printing) forms
the desired tablet with a carefully controlled geometry. Traditional medicines, in
tablet form, are formed by compression of the powder; each compressed tablet has
the same shape. By exploring the connection between geometry of the tablet and
the release of the medicine, it is possible to create the most effective medicine
release profile for each patient. Some of the advantages of this technology include:
» tailor-made medicines to suit the individual
» better control of medicine release into the body
» saves money (many modern medicines are very expensive)
» better targeting of the medicine so its effects can be optimised
» less chance of an overdose of the medicine, thus reducing harmful side-effects
(for example, chemotherapy medicines can have very unwelcome side-effects;
by reducing the release of the medicine to suit the individual, it will not only
work better but also cause fewer harmful side-effects).
Link
▲ Figure 6.26 Examples of 3D generated medicines in tablet form
Refer to Figure 2.36
in Chapter 2 to see
In the future it should be possible to send medicines to local pharmacies in the
how 3D printing uses
form of a blueprint; each blueprint would be custom-made for a patient. By CAD or blueprint
supplying the necessary materials, it would then be possible to print out the designs.
customised medicines for each patient using the blueprint.
142
Explanation
system
Rules
base
143
User interface
» This is the method by which the expert system interacts with a user.
» It allows interaction through dialogue boxes, command prompts or other input
methods.
» The questions being asked usually only have yes/no answers and are based on
the responses to previous questions.
Explanation system
» This informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
» For example, suppose the user was investigating a series of symptoms in a
patient and the expert system gave the diagnosis of mercury poisoning; the
explanation system would explain its reasoning with a statement such as
‘impaired vision, lack of coordination, weak muscles, slurred speech and the
patient used to work in a paint factory’. The user could then probe deeper
if necessary.
» The expert system will supply a conclusion and any suggested actions to
take; the important thing is it will also give the percentage probability of
the accuracy of its conclusions (for example, the following statement could
be made: ‘Based on the information given to me, the probability of finding
oil bearing rocks in location 123AD21G is about 21%’).
Inference engine
» This is the main processing element of the expert system.
» The inference engine acts like a search engine examining the knowledge base
for information/data that matches the queries.
» It is responsible for gathering information from the user by asking a series of
questions and applying responses where necessary; each question being asked
is based on the previous responses.
» The inference engine is the problem-solving part of the expert system, which
makes use of inference rules in the rules base.
» Because the knowledge base is a collection of objects and attributes,
the inference engine attempts to use information gathered from the
user to find an object that matches (making use of the rules base to
find a match).
Knowledge base
» The knowledge base is a repository of facts.
» It stores all the knowledge about an area of expertise obtained from a number
of expert resources.
» It is basically a collection of objects and their attributes (see the example in
Table 6.5).
144
We will now consider three examples which make use of expert systems.
145
Input screen
146
is fairly simple, but some national and international routes can be very complex.
The inputs needed for the delivery system are: Exercise 6h
» the number of drop-off points and their location 1 Write down three
» the distance between the drop-off points advantages of
» the type of vehicle used using an expert
» delivery times expected at each drop-off point system in route
scheduling.
» layout of the road network.
2 Write down three
disadvantages of
using an expert
system in route
Exercise 6i scheduling.
56
24
B G
16
)
six
6(
11
18
E
5
10 5
19 H 21
A C J
8
8
5
10
F
16
16 10
D 26
I
The map above shows the distances between ten towns, in kilometres.
A delivery company has to deliver a parcel from town ‘A’ to town ‘J’.
Work out the shortest possible route the delivery van can take.
Exercise 6j
1 Write a sequence of instructions to show how the following expert systems
would be set up:
a identification of a chemical found at, for example, a crime scene
b a strategy game, such as chess
c engine diagnostics for a racing car.
2 Write a sequence of instructions to show how the following expert systems
would be used to:
a diagnose circuit board faults in television sets
b identify an ‘unknown’ chemical compound
c identify a new species of flower
d produce the best route for a delivery vehicle.
147
Exercise 6k
Which expert system terms are being described below?
1 A repository of facts made up of a collection of objects and their attributes.
2 It informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
3 It is made up of a user interface, explanation system and inference engine.
4 It contains a set of inference rules.
148
» Once the barcode has been found, the appropriate record is accessed.
» The price of the item is then found and sent back to the POS together with a
product description.
» The stock level for the item is found in the record and is reduced by one and
the new stock level is written back to the file.
– If the number in stock of the item is less than or equal to the
re-order/minimum number in stock, then the computer automatically orders
a batch of items from the suppliers (supplier information would be found
on another file called the order file or supplier file – the barcode would be
the link between the two files).
– Once goods have been ordered, the item is flagged on the file to indicate
an order has been placed; this now prevents re-order action being triggered
every time this item is scanned until the new stock arrives.
– When new goods arrive, the barcodes on the cartons will be used to update
the stock files; also any flags associated with these goods will be removed
so that the stock checks can start to be made again.
» The above procedure is repeated until all the items in the customer’s basket/
trolley have been scanned.
» When all the items have been scanned, the customer is given an itemised bill
showing a list (with prices) of everything they have bought.
» The computer also updates the files containing the daily takings.
» If the customer has a loyalty card, the system will also automatically update
their points total.
Most supermarkets now allow customers to scan their own items at special
checkouts; these basically work the same way as the normal POS terminals.
Electronic funds transfer at point-of-sale (EFTPOS)
When payment is made by card or electronic device (such as a mobile phone) at the
POS terminal, it is known as electronic funds transfer at the point-of-sale (EFTPOS).
The process of checking credit and debit cards at a supermarket EFTPOS is
much the same as was described for paying a restaurant bill in Section 6.6. The
communication between the supermarket EFTPOS terminals and the bank take
place through a secure connection over the internet.
We will consider payment by the following methods:
» chip and PIN
» contactless cards
» near field communication (NFC) devices.
Chip and PIN
The use of chip and PIN was discussed in Section 6.6. In the case of payment at
a supermarket, this is usually done by inserting the card into a reader and then
the procedure is identical to that described in Section 6.6. The reader makes a
connection with the chip embedded in the card. By entering the PIN, a customer Link
is carrying out a security check. The PIN and encrypted data from the chip is now
sent to the customer’s bank. If all security checks are OK (for example, a check For more on chip and
whether the card has been stolen and a check whether the expiry date has been PIN and contactless
exceeded) and the customer has sufficient funds, then an authorisation code is cards see Sections 6.6
and 2.2.
sent back to the terminal and the funds are transferred to the supermarket’s bank.
149
Contactless cards
The use of contactless card payments was discussed in Section 2.2, together with
their advantages and disadvantages.
Near field communication (NFC) devices
Near field communication (NFC) technology is discussed in more detail in
Section 6.10. When using NFC payment at a POS terminal the sequence of events
taking place is:
» The electronic device (for example, mobile phone) is held close to the NFC
reader (the terminal); this only works up to a distance of 5 cm, so the devices
need to be very close together.
» When the NFC (contactless) payment is initiated, the NFC terminal and
electronic device (smartphone) pass encrypted data back and forth to each
other to enable the payment to be made.
» This is very secure because NFC communications are encrypted and are
dynamic (which means encrypted data being shared changes every time a
transaction takes place).
» Mobile phone manufacturers use tokenisation to improve security.
150
» There are possible health risks associated with online shopping or banking
because of lack of exercise; if people physically go shopping then they are
getting some exercise.
» Security issues are a major concern (for example, hacking, stealing credit
card details, etc.) as are viruses and other malware (for example, phishing,
pharming, and so on).
» Accidentally using fraudulent bank or shopping websites is always a risk and
this is linked to security issues.
» It is necessary to have a computer and to pay for the internet to take part in
online shopping and banking.
» Unlike high-street shopping, it is only possible to see a picture of the goods,
(which might not portray the exact colour of an item of clothing, for example)
and nor can you try something on to see if it fits before buying them; you
also have to wait several days for the goods to arrive and returning goods may
be expensive and time consuming.
» Next-day delivery of individual items leads to more delivery traffic and pollution.
» High-street shops and banks are closing because of the increase in online
shopping and banking and this is leading to deserted high streets.
» Local independent retailers may lose out to huge multinational retail companies.
» It is easier to make errors with online banking and transfer money incorrectly
to different accounts.
Exercise 6l
1 Revisit the earlier sections of this chapter and other parts of the book.
Gather together your information and then write an article on the advantages
and disadvantages of shopping on the internet compared to shopping on
the high street.
Consider aspects such as convenience, costs and security.
2 Find out as many areas as you can in the retail industry that use barcodes
(including QR codes) and explain why barcodes are used. What other methods exist
which could replace barcodes? Why have these other methods not been adopted?
152
FIRE Academy
Term 1 Week 4 (2022)
Tutor Group: 7AS
RC
FD
AE
BE
HK
TL
SM
AN
LN
AP
AR
SW
The database can be searched or sorted to find data about the attendance of any
student.
Use of OMR to read multiple-choice question (MCQ) papers
Completed multiple-choice forms can be scanned in using OMR. The forms have
timing marks down one side – these timing marks pass under the first column
sensor of the scanner. These marks indicate the position of each question on the
paper. Using OMR software, a template is created to map out the X-Y coordinates
153
Barcode readers
Please refer to Chapter 2 (Section 2.2.5) for information about barcode readers,
including their advantages and disadvantages.
QR code readers
Please refer to Chapter 2 (Section 2.2.6) for information about QR code readers,
including their advantages and disadvantages.
Optical character recognition (OCR)
The uses, advantages and disadvantages of optical character recognition
(OCR) were discussed in Chapter 2 (Section 2.2.4). One important use of OCR
was in the clearing of bank cheques, as discussed in Section 6.6. However,
there is one additional, important application of OCR that should be
mentioned here.
Automated number plate recognition (ANPR) systems 1 ABC 234
Automatic number plate recognition (ANPR) systems are used to read the
number plates on cars in a number of applications.
▲ Figure 6.32 Sample
In the example that follows, we will describe how ANPR is used in a car vehicle with number
park to enable entry and exit to be automatically controlled by a computer plate
system.
154
Step 1
A sensor detects a vehicle and sends a signal to instruct a camera to capture
an image of the front of the vehicle (often an infrared camera is used to give a
clearer image and for use at night).
Camera
Car park
barrier
Step 2
i An algorithm is used to locate and isolate the number plate from the image
taken by the camera. This algorithm also takes into account the size of the
number plate and any damage or orientation. 1ABC234
ii The brightness and contrast of the number plate is first adjusted
(this ensures that the characters can be clearly read). 1ABC234
Each character on the number plate is then segmented.
iii Each character is then recognised using OCR software. The characters are 1ABC234
converted into a string of editable text by the software.
iv This text string is then stored on a database.
Step 3
Once all of this has happened, the car park barrier is raised and the motorist is
issued with a ticket. The ticket shows the date and time of entering the car park.
Step 4
When the motorist returns to the car park, they insert their ticket into a machine
which calculates the car park charges. The payment is registered on the database.
The motorist then drives to the exit barrier and the ANPR system again reads the
number plate and checks its database. If the number plate is recognised (and
payment made), the exit barrier is raised.
Advantages of ANPR
» It can be used to automatically monitor average speed of vehicles over a
stretch of road; this can be used in smart traffic management systems (see
also Section 6.2).
» There is no need to employ car park security guards, which saves money.
» It is a much faster system than having to check a ticket at the exit; car parks
can issue tickets on entry, but this ticket is simply used for payment purposes
by the motorist before leaving the car park and is not used at the exit since
payment will now be linked to the number plate on the car.
» It can be used to automatically control the entry and exit to a car park or
private roads.
155
Disadvantages of ANPR
» There is a lack of manned security car park surveillance which could lead to
vandalism (and other crimes) because nobody is checking on a regular basis;
CCTV is often used, but this is often just used ‘after the event’.
» There could be invasion of privacy issues due to the recording of drivers’
number plates.
» Damaged or very dirty number plates will not be recognised by the system.
» Number plate cloning; the ANPR system only recognises the number plate and
not the car, so it is possible for a car to be fitted with a cloned number plate
thus by-passing car park security, for example.
Exercise 6m
Describe how automated number plate recognition (ANPR) systems can be used
in smart traffic management systems. Your description should include how ANPR
is used and how the data gathered by ANPR would be used in traffic management
control and monitoring.
First of all, we will consider the advantages and disadvantages of using RFID.
Advantages of RFID
» No line-of-sight contact is necessary; the tags can be read from a distance.
» It is a very robust and reliable technology.
» Tags are much more difficult to forge than barcodes; barcodes can be altered
or even damaged, but RFID tags are more robust and difficult to alter.
» RFID tags can reduce the number of staff needed in, for example, a warehouse
because tracking of items is automatic (thus reducing costs).
» It provides a very fast read rate (typically < 100 milliseconds to respond).
» It allows bi-directional data transfer (that is, it allows read and write
operations to take place).
» Bulk detection is possible (that is, detect several RFID tags at the same time).
156
Disadvantages of RFID
» Tag collision – this is when the signals from two or more tags overlap,
interfering with each other.
» Because RFID uses radio waves, they are relatively easy to jam or interrupt.
» It is relatively easy to hack into the data/signal transmitted by the tag.
» Although there is a potential saving in staff wages, the initial cost of an RFID
system is more expensive than a comparable barcode system.
Tracking of stock
As mentioned in Chapter 2, RFID readers use radio waves to read and capture
information stored on a tag. Depending on the power of the radio waves used,
the tag can be read from several metres (for example, in livestock tracking) to
only a few millimetres (for example, in contactless card payments). The RFID tag
is made up of two components:
» a microchip that stores and processes information
» an antenna which is used to receive and transmit data/information.
The tags can be passive or active. Passive tags use the reader’s radio wave
energy to relay back the information, whereas active tags use a small embedded
battery to power the RFID. Passive tags are the most widely used because they
are smaller and cheaper to implement than active tags. Because active tags have
their own power supply, they can be read from up to 50 metres away.
RFID tag
reader
antenna
chip
computer
Tracking of stock using RFID involves either tracking of livestock (on a farm) or
goods in a shop, supermarket or distribution centre.
» Livestock tracking is used to:
– keep track of the whereabouts of every animal on a farm using active tags
– allow farmers to identify who owns an animal; particularly important where
animals graze freely on farms where it is possible for animals to stray into
neighbouring fields
– keep data about the animals on the tag (for example, medical history, date
of birth, identification (passport) number, and so on).
» Retail make use of RFID tags in the following ways:
– similar to barcodes, but can contain much more information and do not
require any manual scanning; details, such as price, description, and so on,
can all be stored on the tag and then automatically read at a checkout –
a big advantage is that several tags can be read at the same time, thus
speeding up the checkout process
157
158
How smartphones use NFC to make payments was discussed in Section 6.9; the
following notes give some further information about how NFC works. There are
three distinct modes of operation with NFC:
» Peer-to-peer mode (used by smartphones):
– This allows two NFC-enabled devices to exchange information with
each other (for example, two smartphones sharing links, contacts and
photographs with each other by tapping them together).
– Both devices switch between being active (when sending data) and being
passive (when receiving data).
» Read/write mode:
– This is a one-way transmission of data.
– The passive device (for example, a tablet) links up with another device and
reads data from it.
– This is used, for example, when an active tag is sending out advertising
data to other devices.
» Card emulation mode:
– In this mode, an NFC device can function as a smart or contactless card.
– This allows the card to make payments (already discussed in Chapter 2).
– It is often used as way of entering public transport systems, where the card
is placed on an NFC reader to allow access to, for example, a metro system.
NFC has a range up to 5 cm and has a transmission rate of about 420 kilobits
per second, which is much smaller than Wi-Fi or Bluetooth. However, NFC has
very fast connectivity since, unlike Bluetooth, there is no need to pair the two
devices connecting.
Biometric recognition systems
Biometric recognitions systems include:
» face recognition
» iris and retina recognition
» finger and thumb recognition
» hand recognition
» voice recognition.
Face recognition, and finger and thumb recognition systems are covered in depth
in Chapter 8. Hand recognition (gesture control) and voice recognition systems
are covered Chapter 1.
The advantages and disadvantages of different biometric recognition systems are
covered in Table 8.3. For completeness, we will consider two additional examples
here: retina recognition and iris recognition.
Retina recognition
» The retina is the light-sensitive area at the back of the eye that has a unique
pattern of blood vessels.
» The retina cannot be seen without specialised equipment – this means it is a
secure technology, but more expensive to implement.
» The special equipment is used to take an infrared photograph of the retina.
» It is quite invasive – the subject has to sit very still and stare directly into
the light source.
» It is slower to scan and verify.
» It is only used in very specialised high-security settings.
159
Iris recognition
» The iris is the coloured part of the eye, surrounding the pupil.
» A digital camera is utilised which uses both visible and near infrared light to
take a sharp photograph of a person’s iris.
» The method produces a unique pattern of a person’s iris by locating and taking
an image of:
– the centre of the pupil
– the edge of the pupil
– the edge of the iris Link
– the eyelids and eye lashes.
See Section 8.3 for
The system works with contact lenses and glasses, and for blind people. It is more on biometric
used as a method for uniquely identifying a person and, because of the speed of recognition systems,
verification (less than 5 seconds), is used a security system in the following areas: and Section 1.3 for
voice and gesture
» immigration control (in some countries)
recognition.
» some banks have introduced this in some branches as a security feature.
Global positioning systems (GPS) are used to determine the exact location of
a number of modes of transport (for example, aeroplanes, cars, ships, etc.). Cars
usually refer to GPS as satellite navigation systems (i.e. ‘satnav’).
Advice
While the term GPS is often used generically, it actually refers to a specific global
navigation satellite system (GNSS) owned and run by the USA. There are other
GNSS that perform the same function, including the Russian GLONASS and the
EU’s Galileo.
160
Satellite 1
Exact location
of transport
Satellite 2
Satellite 3
▲ Figure 6.37 Three satellite system
A1234
A1236
A1235
Exact location of the car
161
The following example shows how these layering techniques are used to produce
a visually effective answer to a query made in the GIS system:
State boundaries
+ National parks
and forests
+ Emission
monitoring
locations
Carrying out queries on GIS systems (in a method similar to internet searches)
will find data that matches the query. The data will be displayed in the form of
a diagram, map or set of tables. By zooming into the map, it is possible to find
finer details about the layering data used.
Examples of the use of GIS
» Emergency services use GIS to send the closest emergency personnel to a
location.
» Biologists and environmentalists use GIS to protect animal life and plants in
certain vulnerable areas (which meet a certain criteria after carrying out a
search on the database).
» Teachers can use GIS in their geography, science or engineering lessons.
162
Advantages of GIS
» It allows geographical and thematic data of any kind to be combined in a way
which shows how they are connected to each other.
» It allows the handling and exploration of huge amounts of data (massive
number crunching).
» It allows data to be integrated from a wide range of very different sources
(which appear at first to be totally unconnected).
Disadvantages of GIS
» The learning curve on GIS software can be very long.
» GIS software is very expensive.
» GIS requires enormous amounts of data to be input (thus increasing the
chances of errors).
» It is difficult to make GIS programs which are both fast and user-friendly; GIS
requires very complex command language interfaces to work properly.
163
Satellites systems are used to transmit television, telephone and internet data
around the world.
Advantages of media communication systems
» They have good global coverage (covers the majority of the Earth’s surface).
» They are cheaper, faster and safer than laying cables in difficult or
treacherous terrain.
» They have a very high bandwidth.
» It is relatively easy to expand the network (there are numerous companies
now manufacturing satellites for various uses).
» Security in satellite transmission is very good due to the fact that data is
coded and the receiver requires decoding equipment to read the data.
» During emergency situations it is relatively easy to move stations on the
ground from one place to another; satellites can also change their orbits if
necessary, using built-in boosters.
» They are well-suited for broadcasting, that is, one satellite signal being picked
up by many different receivers on the ground.
» Satellite receivers on the ground can be portable, enabling mobile
communication in very remote locations.
164
Exam-style questions
1 The managers of a company are concerned about illegal parking in their car
park. Drivers are parking their cars in the private car park and then walking
to the local football match. There have been a few instances of damage
to employees’ cars. A decision has been made to install a number plate
recognition system and barrier so they can control cars entering and leaving
the car park. Anyone visiting the company will need to register their car’s
number plate with the receptionist prior to their visit.
a Explain how this system could check that a car approaching the barrier
had been registered with the receptionist beforehand. [4]
b After a visitor parks their car, they have to report to the receptionist.
They are then given a badge which contains an RFID tag. The chip in
this tag is read to allow the visitor access to certain floors in the building.
Prior to this electronic system, badges contained a barcode. Discuss the
advantages and disadvantages of using RFID chips rather than barcodes
on visitor’s badges. [6]
c The company would like to offer visitors access to their facilities,
such as the restaurant, coffee shop and gift shop. Before arriving
at the company, visitors are sent a QR code which they can download
to their smartphone.
Describe how the visitor could use a QR code to find out more about
the company. [3]
d Payment at the restaurant is made using an NFC-enabled smartphone.
Explain:
i what is meant by NFC [2]
ii how the smartphone can be used to make payments. [3]
2 You have been asked by your teacher to use a word processor to create a
brochure for a new intake of pupils. The brochure will consist of:
» Images of the school taken from a digital camera.
» Printed archive photographs.
» Information about the school already stored in text files.
» Information to be typed directly into the brochure.
a Describe the steps which you will need to take to create the brochure. [6]
b When the brochure is being created, the word processing software
automatically checks the spelling of the text as it is typed in and may
suggest alternative words.
Explain why the suggestions may not always be appropriate. [3]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q7 a & b,
October/November 2019
165
3 Robots are being used in the oil industry to find new deposits under the
Earth’s surface.
a Give three advantages of using robots rather than humans when
searching for new oil deposits. [3]
b Give two disadvantages of using robots rather than humans. [2]
4 An automatic washing machine contains a device to read RFID chips sewn
into clothing. When an item of clothing is placed in the washing
machine it is scanned.
a Describe how the data is read from the RFID chip. [2]
b Explain the benefits of using RFID technology in a washing machine. [2]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q9,
May/June 2017
5 The city of Venice is in danger of being damaged due to rising sea levels.
A new computer controlled flood defence system is being planned. The
developers of the system are using a spreadsheet to model the plan.
a Give three reasons why computer models are used to simulate the flood
defence system. [3]
b The city uses a manual system for detecting flood waters.
This relies on people watching for the rising levels of water.
Explain why creating a computerised system is better than using the
manual system. [4]
c The developers have used the results from the model to choose a
computer controlled flood defence system. It will have a barrier which
can open or close.
Describe the role of the microprocessor in such a system. [5]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q10,
May/June 2017
166
9 Seven statements are shown on the left and seven computer terms are
shown on the right.
By drawing arrows, connect each description to the correct computer
term.[6]
Users watch movies or sound files on a Biomimetics
device connected to the internet; there is
no need to download the files first
167
168