ICT Theory
ICT Theory
Data:
Information:
It has a meaning to it
Data sources:
Data is collected from an original source; no need to request data from a third party
Data is collected for a specific task and is used for that specific task
Questionnaire
Interview
Data logging and sensors
Observations
Survey
Advantages:
Accurate
Relevant (up to date)
Original source of data is known; trusted data
Only data that is needed is collected; no extra data
Can sell this data to other organisations
Less chance of sampling bias
Disadvantages:
Data is collected for a specific task BUT is not used for that specific task
Electoral register
Organisations collecting personal data & then selling this data to
other organisations
Advantages:
Disadvantages:
Quality of information:
Accuracy
Information needs to be accurate
Relevance
Information needs to relevant to its purpose
There shouldn’t be any extra and irrelevant information
Age
Information must be up to date
Level of detail
Information needs sufficient detail
Not too much or too little
Completeness of the information
All required information must be provided
(Data can be encrypted when stored on
storage mediums or sent across networks)
Encryption:
Methods of encryption:
Symmetric encryption:
Advantages:
Can encrypt and decrypt large amounts of data quickly
Easy to use
Less processing power needed
Disadvantages:
Private key transportation; can be intercepted
May not use digital certificates
Two types:
Advantages:
Encrypts data
Provides confidentiality, integrity and authentication (CIA)
Prevents phishing
Allows online payments
No need specialised software
Has a digital certificate
Disadvantages:
May slow down sites as it uses server resources
Proxy caching problems
Expensive to buy and setup trusted SSL certificate
SSL certificates expire; needs renewal
Client-server communication:
Advantages:
Users without decryption permissions cannot access files; they
receive restricted access notification
Users with decryption permissions are able to access files
without any restrictions
Disk stays encrypted; even if moved to a different computer
Any files can be encrypted
Disadvantages:
If decryption password is lost, access to files are lost
If O.S fails, access to files are lost
If O.S is reinstalled, data is deleted
HTTPs:
Email encryption:
Validation:
Presence check:
Range check:
Limit check:
Type check:
Length check:
Lookup check:
Check digit:
Verification:
Checking that the data entered has been copied correctly from the data source
Visual checking:
Hash total:
Control total:
Even parity:
(Odd parity check does the same, except it uses odd number of 1’s instead of even)
Checksum:
Data processing:
Batch processing:
Any updates needed to be made to the master file are stored in the
transaction file
Transaction file is validated
Transaction file is sorted so that it’s in the same order as the master
file
The batch process moves through the transaction files and finds the
corresponding record in the master file with the same primary key
Transaction file and master file are merged
This continues until all records in the master file have been copied to
the new version
Process algorithm:
Repeat
Advantages:
Disadvantages:
Uses:
Advantages:
Disadvantages:
Uses:
Advantages:
Disadvantages:
Uses:
Census
Transaction processing
Batch processing
Industry statistics
Consumer statistics
Characteristics:
Disadvantages:
Supercomputers:
Large computers with parallel processing to complete highly complex tasks quickly
Uses:
Quantum mechanics
Weather forecasting
Climate research
Characteristics:
Longevity
Supercomputers are very expensive; need to be useful for several years
Ability to upgrade by adding more processors & memory
Heat maintenance
Requires cooling system
Either air cooling or liquid cooling
Performance metrics: FLOPS
Floating point operations per second
Can be unreliable as the complexity of instructions can vary according to which
benchmark program is used
Measured by the >quadrillions in floating point numbers
Used where complex calculations are executed
Does not take into account CPU clock speed, bus speed and amount of RAM
Fault tolerance
Operating system
Type of processor
Advantages:
Disadvantages:
Very expensive
Expensive software
Support specialists required
Occupies large space
Generates lots of heat; cooling systems expensive
Requires large and fast storage drives
System software:
Operating system:
Device drivers:
Translators:
Translates a program written in high level programming language into machine code
that a computer can understand
A program that translates source code into machine code all at once
It creates an executable file
As it is an executable file, it can only run on the operating system for
which the compiler has compiled it for
(E.g. a program compiled for windows won’t work on macOS)
After compilation is complete, the compiler produces an error
message (if any) to help programmers debug the program
Interpreters:
Linkers:
Utility software:
Anti-virus:
Backup:
Disk defragmentation:
Disk formatting:
File management:
File-copying utilities creates a new file which has the same content as an
existing file
Deleting files removes a file from a computer's file system
Deleting utilities deletes locked files permanently
Custom written software and off-the-shelf software:
Advantages:
Disadvantages:
Expensive
Testing is limited to what the programmers think is required
Support is limited to the team of programmers only
Can take a long time to develop the software
There will be a lot of bugs as it has not been tested so thoroughly
Advantages:
Disadvantages:
Proprietary software:
User interfaces:
Advantages:
Disadvantages:
Advantages:
User friendly
No commands to remember
Easier and faster
Exchange data between applications
Help facilities
Disadvantages:
Advantages:
Disadvantages:
Background noise
Speech impediment, e.g. stuttering
Computers ability to detect different accents/voices
Cannot understand commands in any format; needs specific
commands
May require training to use
Advantages:
Disadvantages:
Calibration:
The process of testing and modifying a sensor to make sure that it is taking the
correct readings
To make sure that data collected by a sensor is accurate, it is calibrated
Importance of calibration:
1. Calibration reference
The calibration reference is a sensor that is known to be calibrated
The reading from a sensor is compared to the calibration reference
sensor to see if both readings are same
2. Physical reference
A ruler can be used to see if an object that should trigger a proximity
sensor does so from the correct distance
Characteristic curve:
This graph maps out the sensor’s response in comparison to an ideal response
1. Offset
Sensor readings are higher or lower than ideal reference
2. Sensitivity
Sensor readings change over a range at a different rate to the ideal
reference
3. Linearity
Sensor readings are directly proportional to the ideal reference
Types of calibration:
3. Multipoint calibration
Similar to two point calibration; just uses more than two readings
Increases accuracy
Can calibrate non-linear sensors
Sensor uses:
Control system:
The main components in a control system are sensors, microprocessors and actuators
Microprocessor:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Greenhouse
Central heating / air conditioning
Burglar alarms
Traffic control (traffic lights)
Car park barriers
Smart homes
Wireless Sensor and Actuator Networks
Chapter 5: eSecurity
Personal data:
Strong passwords
Encrypt personal data
Firewall & Anti-virus
Biometrics
Only visit websites that have SSL
Don’t open email attachments from a stranger
Remove geotags from photos posted on social media
Use secure privacy controls
Report and block suspicious users
Use a VPN
1. Phishing 3. Vishing
2. Smishing 4. Pharming
Phishing:
Prevention:
The user is asked to phone a number/ reply to the text/ click on a link.
Prevention:
Vishing:
The victim is told that there is fraudulent activity in their account and they
need to provide their personal details to resolve this issue
Uses VOIP
Fraudsters use psychology to trick victims
Relies on user giving out their personal details over the phone
Tries to obtain personal details
Prevention:
Prevention:
Malware:
Types of malwares:
Use:
Consequences
Trojan:
When Trojan file is opened, it releases another type of malware, e.g. virus…
Use:
Consequences
Preventions:
Worm:
Preventions:
Spyware:
Key logger records the keystrokes and sends this back to the hacker
Spywares are downloaded unknowingly when using the internet – such as pop up
advertisements or downloading free apps
Preventions:
Adware:
Targeted marketing
Consequences
Preventions:
Rootkit:
Use:
Spy
Unconsented remote access
Gain personal details
Crime and cyber attacks
Consequences
Preventions:
Strong passwords
Download software from reputable sites
Don’t insert a random USB into a computer
Keep operating system up to date, or re-install it
Malicious bot:
They are like worms: they can replicate and spread themselves
Spam bot
Zombie bot
Chatter bot
File sharing bot
Consequences
Ransomware:
Usually asks victim to pay ransom to regain access; if not paid then data may be
deleted forever
Ransomwares can either lock the system or encrypt all the files
Ransomwares enters a computer in a similar way to Trojan (infected emails and websites)
Use:
Consequences
Preventions:
It is the divide between people and regions that have access to aspects of modern
technology and information, and those with restricted or no access
People with physical and
mental disabilities This technology includes phones, TVs, computers and internet
constitute to the digital
divide
It is also the divide between those who have skills, knowledge and abilities to use
these technologies and those who don’t
The digital divide can also exist because of the availability of high and low
performance computers as well as wireless connections
People in urban and rural areas The effects of digital divide in all
Tech educated and tech uneducated people areas include inequality of access
to all types of internet services
Old and young people
More and less industrially developed areas/countries
Socio-Economic groups
The divide between countries (developed and developing) is called the global digital divide
The quality and price of connection to the internet varies between countries
Causes:
Effects:
Causes:
Effects:
Causes:
Young people grew up with technology; older people feel they are too old
and may be unwilling to learn
Older people may have no interest in using technology
Older people may lack confidence in using technology as they witnessed the
world before the invention of technology; may prefer to use older and more
“comfortable” methods, such as postal services or libraries instead of the
internet
Effects:
Older people may stick with using older norms, which is increasingly
becoming outdated
As people become older, their mobility decreases; not being able to use
technology may make them feel isolated
Causes:
Effects:
Socio-economic groups:
Causes:
The poor cannot afford to buy high performance hardware and good
internet connection
The poor cannot afford education needed to learn new technology
Lower income people are buying smartphones, but there are rising data
plans (mobile data - 4G) prices
Effects:
User interface
Knowledge base
Knowledge base editor
Inference engine
Explanation system
User interface:
Knowledge base:
A software that enables engineers to edit facts and rules within the
knowledge base
Inference engine:
Forward chaining:
Explanation system:
Advantages:
Disadvantages:
Absolute cell reference is when the cell reference stays constant but the cell referred
to it is changing
Locks in the reference to a specific cell regardless of where the formula is replicated
Useful when you want to maintain a consistent reference to a specific cell
Relative cell reference is when the cell reference changes when the cell it is referred
to is changing
When formulas are replicated, the cell reference in the formula will be adjusted to
reflect the new location of the formula
Useful when you want to apply the same formula to difference cells within a
spreadsheet, and have the cell references automatically adjusted to reflect the new
location of the formula
Validation rules:
(Click here)
Testing spreadsheets:
Make a table with the columns: test, test data, actual result, expected result and
comments on comparison of actual result
Test data can be normal, abnormal and extreme
Test (all) functions/validation rules by changing some values in the table
Calculate the expected result using a calculator
Run each test
Identify if there are any differences between the actual results and expected results
Sorting data:
Pivot tables:
Macros:
Used to automate repetitive or complex operations, saving time and improving efficiency
Record a macro
Then carry out the tasks to automate how you normally would while the macro is
recording
Stop recording the macro
Assign a button to the macro
To run the macro, press the button you have assigned the macro to, and the task you
carried out will be executed automatically and quickly
Advantages of spreadsheet:
Disadvantages of spreadsheet:
Type of scenario analysis that allows you to explore the potential outcome of different
hypothetical situations
It involves changing one or more variable, and how these changes affects the outcome
Two types:
I. Scenario manager
Predicting the result of changing data
Go to data tab, select what-if analysis and click scenario manager
Add a new scenario
Select which cell value to change
Then type the value you want to replace the cell value with
When scenario is shown, any outcome that changed will be seen
II. Goal seek
Finds the input value for a target value you want
E.g. how many products to be sold to get a profit of $5,000
Absolute and relative cell reference makes sure you only increment the parts of the
formula you need
Cell protection makes sure the cells you want aren’t changed by accident
User interface to input values into the model
Macros makes it easier to automate repetitive and complex tasks
Automatic calculation when values are changed
Conditional formatting to highlight specific values matching a criteria
Graphs to detect trends
What if analysis –scenario manager and goal seek
The need for computer models:
However:
Researchers will need to know how to apply simple and complicated modelling
techniques
Models cannot always recreate a real world experiment
Researchers will need specialist knowledge of (field of study related to question) to carry out test
efficiently
Not every variable may be included in the model, leading to inaccurate results
Training costs money
Over simplification of assumptions ≈ reduced training time ≈ false sense of security
Advantages:
Disadvantages:
Relationships:
One-to-one relationship:
Both tables have only one record on either side of the relationship
One-to-many relationship:
A table contains individual records that each relate to many records in the related
table
Many-to-many relationship:
Advantages:
Simple to design
Easy to use; sorting and filtering is simple
Requires little design knowledge
Information can be added as necessary
Disadvantages:
Data redundancy
Very little security
When two flat files are merged, relevant data needs to be copy pasted
When two or more flat files contain same fields, if data is changed in one
then the other has to be manually updated – hard to update
Relational database:
Incorporates a number of tables with methods for the tables to work together
Designing a relational database depends on the ability to establish a relational
model which describes how data is organised, in terms of data structure, integrity,
querying, manipulation and storage
Has primary and foreign keys to create a link
Advantages:
No data redundancy
Better security and easier to update
Records can easily be joined by the indexed values
Integrity constraints can be established to ensure that table relationships are
valid
Disadvantages:
Key fields:
Primary key:
Compound key:
A primary key that combines more than one foreign key to make a unique
value
Referential integrity and its importance:
Go to query design
Select the table
Select fields to be used
(What questions tells you to do: sort, show, criteria, etc.)
Reports are created
Save and run the query from queries
Go to query wizard
Click on simple query wizard
Select the table and fields to be used
Assign a name to the query
Go to query design view (and do what questions says; sort, show, criteria, etc.)
Save and run the query
A fixed query
Every time the query is run, it searches for the same data
If different data is to be searched, the user would have to go to query design view
and change data criteria
For example, to get gender, you would have to put criteria as either “M” or “F”
Text boxes
Data entry boxes must be just as long
enough to fit data
Must take into account data type –
Boolean requires radio buttons
whereas date requires drop down
menu
White space
The 3 buttons on the bottom (help,
save and reset) are free marks
Fields that must be filled in should
have an * after the field name, e.g. Name *
Switchboard:
(Appropriate title)
Format →
Normalization:
Disadvantages:
Data dictionary:
(TABLE NAME)
Field Name Field Type Field length Format Type of Key Validation
(number of records)
File formats:
Records can be found randomly using an index, without searching the entire file
Indexes can be searched, allowing the database to access the records it needs only
Searches uses an index; narrows down the records to be searched
E.g. if u need a word beginning with G, all words beginning with A-F are ignored
Then that section of the file is searched sequentially to find the record required
It is limited by using only one type of relationship – confined to specific usage flexible models
Primary
parent record
Features:
Use:
Advantages of database:
Disadvantage of database: