ICT NOTES BEFORE CIEs 2024
ICT NOTES BEFORE CIEs 2024
COMPILER: A language translator (compile & convert high language to low level (machine language)
LINKER: computer program that takes one or more object files produced by a compiler
CLI Command Line Interface (Direct communication with computer (development etc)
GUI Graphical user interface (use computer to run computer: games etc)
DIALOGUE-BASED USER INTERFACES use the human voice to give commands to a computer
system
GESTURE-BASED INTERFACES rely on human interaction by the moving of hands, head or even
the feet
Virtual Keyboard: Tablets use touch screen technology and do not have a conventional keyboard
o The magnetic stripe contains useful information, such as: account number, sort code, expiry
date and start date.
o Some ID cards also use a holographic image (hologram). These are designed to make forgery of
the card more difficult
The contactless card system uses 128-bit encryption systems to protect the data
Chip and PIN readers are similar to smart card readers but are used at EFTPOS terminals
A QR code consists of a block of small squares (light and dark) known as pixels. It can presently hold up
to 4296 characters (or up to 7089 digits) and allows internet addresses to be encoded within the QR
code. This compares to the 30 digits which is the maximum for a barcode
QR codes can be used to deliver augmented reality by helping an AR system to determine the
positions of objects in three-dimensional space.
QR code can use on virtual online stores, where a gallery of product information and QR codes are
presented to the customer, for example, on a train station wall
QR codes can be used to transmit malicious codes; known as attagging. Because there are a large
number of free apps available to a user for generating QR codes, that means anyone can do this.
Printers
3D Printer’s
3D printers use additive manufacturing (i.e. the object is built up layer by layer)
Subtractive manufacturing (i.e. removal of material to make the object)
Direct 3D printing uses inkjet technology; a print head can move left to right as in a normal printer
Binder 3D printing is similar to direct 3D printing, but this method uses two passes for each of the
layers; the first pass sprays dry powder, then, on second pass, a binder (glue sprayed) to form a solid
Tissue engineering (using 3d Bio-link printing): Recent advances have allowed the 3D printing of bio-
compatible materials, cells and supporting structures
CT (computed tomography) which involves producing images of the internal parts of the body in a
series of thin slices less than 0.1 mm thick, or
MRI (magnetic resonance imaging) this uses strong magnetic fields and radio waves to produce a
series of images of the internal organs in the body.
3D printing techniques now allow scientists to customize medicines to suit the individual.
Magnetic taps data transfer rate is actually fast (this should not be confused with data access time which
is very slow for magnetic tapes)
Data transfer rate is the rate at which data can be sent from a storage device to a computer (or vice
versa). Data access time is the time it takes to locate specific data stored on the storage media
In Hard disk (Latency is defined as the time it takes for a specific block of data on a data track to rotate
around to the read/write head)
SSD: Latency is a major issue in HDDs as described earlier. Solid-state technology removes this issue
because all the data is retrieved at the same rate
DVD technology is slightly different to that used in CDs is dual-layering which considerably increases the
storage capacity.
IPv4 is based on 32 bits (254.25.28.77) 4 separate groups with dot (.) of 8x4 bits become 32 bits
IPv4 is based on 128 bits (254.25.28.77) 8 separate groups with (:) of 16x8 bits become 128 bits
For data transfer IP Packets of data will usually have a header which contains:
SWITCHES are more secure than hubs (because only the intended device is sent the data)
BRIDGES are devices that connect one LAN to another LAN that uses the same protocol
ROUTERS are used to route data packets from one network to another network
Wi-Fi is best suited to operating full-scale networks because it offers much faster data transfer rates,
better range and better security using ACCESS point (router) than Bluetooth
Voice over Internet Protocol (VoIP): most common forms of internet telephony
Cloud computing is a method of data storage where data is stored on remote servers
Data Redundancy: The same data is stored on more than one server for cloud computing
o The customer inserts their debit card into the top of the token device (first authentication step) and
the device either recognizes the card as genuine or rejects it.
o The device then asks the customer to press ‘IDENTIFY’ and then enter their PIN (2nd auth. step).
o A one-time password is then shown on the device screen – this is usually an eight-digit code.
o The customer now goes back to their bank web page and enters the eight-digit code.
o They are now given access to their account
Electronic tokens Electronic (software) tokens are software installed on a user’s device, such as a
smartphone.
NFC
Near Field Communication is a short-range wireless technology that allows your phone to act as a
transit pass, credit card, or data transfer device. Mobile phone manufacturers use tokenisation to
improve security
Tokenisation is used when setting up a mobile wallet. The user takes a photograph of their
credit card using the smartphone’s camera.
Many smartphones are also protected by touch ID or face ID technology, which means that even
if the smartphone is stolen, the thief still cannot use the smartphone to make payments
MALWARE is one of the biggest risks to the integrity and security of data on a computer system
Video Conference using (web came, CODEC & ECO cancellation software)
Audio conferencing can be done over the standard telephone network (often referred to as a phone
conference)
Web conferencing (often referred to as a webinar or webcasts) uses the internet to permit conferencing
to take place
Buffering makes sure the video plays back smoothly without freezing.
Media Streaming there is no need to actually download and save the video or audio files
LiDaR:
Autonomous trains make use of a system called LiDaR (Light Detection and Ranging) help control the
train and maintain safety
SIMULATION is the creation of a model of a real system in order to study the behavior of the system.
The model is computer-generated and is based on mathematical representations.
Examples where computer modelling is used include:
» personal finance
» bridge and building design
» flood water management
» traffic management
» weather forecasting.
Centralized clearing of bank cheques
It is a much quicker system than the previous method used to clear banks cheques
The first step is called out clearing.
At this stage, when Smith Bank are presented with the cheque, a camera takes an image of the
cheque and OCR software turns this image into an electronic data format
Geographic information system (GIS) is a computer system that allows us to map, model, query and
analyse large amounts of data according to their location
Expert system components: The inference engine searches the knowledge base using the rules base
and the final conclusion by expert system would be: it is a WHALE.
One method the analyst can use is a DATA FLOW DIAGRAM (DFD) for visual representation of the
information flow through a process or system. DFDs help you better understand process or system
operations to discover potential problems, improve efficiency, and develop better processes
DFD for flight booking process, we can get the following information:
what inputs take place during the customer enquiry
(customer flight details, such as names of passengers, passport numbers, dates of flight, and so on)
what outputs are produced (on-screen and e-ticket (QR code) sent to customer’s smartphone)
what processing is done (check flights, process customer data, access booking database
what storage may be needed (a database is needed to store all the flight booking details)
SYSTEM SPECIFICATION The DFD and other information gathering processes(analysis) allow the analysis
team to identify what hardware and software is needed to run the new system.
TECHNICAL DOCUMENTATION is designed to help programmers/analysts to make improvements to the
system or repair/maintain the system
USER DOCUMENTATION is designed to help users to learn how to use the software or system.
PROTOCOLS are sets of rules agreed by the ‘sender’ and ‘recipient’ when data is being transferred
between devices.
File transfer protocol (FTP) is a network protocol used when transferring files from one computer to
another computer over the internet
Secure Sockets Layer (SSL) is a protocol that allows data to be sent and received securely over the internet