Lgcse Ict Notes
Lgcse Ict Notes
o Hardware refers to the physical components of a computer system. Examples include the keyboard, mouse,
monitor, and printer (external hardware). Internal hardware includes the motherboard, CPU, RAM, ROM, graphics
card, sound card, and network interface card (NIC).
o Software refers to the programs that control the computer and process data. It is divided into applications
software and system software.
o Applications software provides services for the user to perform specific tasks, such as word processing,
spreadsheets, databases, video editing, and graphics editing. Apps and applets are also types of applications
software.
o System software provides a platform for other software to run and manages basic computer functions. Examples
include operating systems, compilers, linkers, and device drivers. Utility programs are software designed for
specific tasks like antivirus or file management.
● Main Components of Computer Systems:
o A typical system includes input devices, output devices, and secondary storage.
o Internal components are the CPU, internal hard disk drive or solid-state drive, RAM, and ROM.
o CPU (Central Processing Unit): Interprets and executes commands. It is usually a microprocessor containing
a control unit, arithmetic and logic unit (ALU), and registers.
o Internal Memory (RAM and ROM):
▪ RAM (Random Access Memory) is temporary, volatile memory used to store data and programs currently
in use. It can be read from and written to.
1
▪ ROM (Read-Only Memory) is permanent, non-volatile memory used to store configuration data and the
boot file (BIOS). The BIOS performs hardware checks and loads the operating system.
o Input and Output Devices: Input devices allow data entry (e.g., keyboard, mouse, sensors). Output devices
display results in a human-understandable format (e.g., monitor, printer). Some devices like touch screens can
be both.
o Backing Storage: Used for permanent storage of large amounts of data. It is non-volatile and has a larger
capacity but slower access time compared to RAM and ROM. Examples include HDDs, SSDs, and external drives.
Removable backing storage can be used for backups.
● Operating Systems: Software that manages the computer's basic functions, controls hardware, supervises program
execution, handles errors, maintains security, and provides a user interface.
o User Interfaces: Methods for users to interact with the computer.
▪ Command Line Interface (CLI): Requires typing commands; offers direct communication but is less user-
friendly.
▪ Graphical User Interface (GUI): Uses icons and visual elements; more user-friendly but uses more
memory.
▪ Dialogue-based User Interface: Uses voice commands (e.g., smart assistants, in-car systems).
▪ Gesture-based User Interface: Uses hand or body movements for interaction (e.g., in cars).
● Types of Computer:
o Desktop Computers: Non-portable, separate components (monitor, keyboard, mouse, processor unit).
Advantages include lower cost, easier upgrades, and better performance for the price. Disadvantages include
lack of portability and more wiring.
o Mobile Computers: Portable devices.
▪ Laptops (Notebooks): All components in one unit. Portable with Wi-Fi capabilities. Disadvantages include
ease of theft and limited battery life.
2
▪ Smartphones: Mobile phones with operating systems to run applications. Small, lightweight, with internet
access on the go. Disadvantages include small screens and keyboards for typing, and battery drain.
▪ Tablets: Use touch screen technology, no physical keyboard. Portable and fast to switch on.
Disadvantages can include expense and limited storage compared to laptops.
▪ Phablets: Hybrid devices between smartphones and tablets with larger screens than smartphones but
smaller than tablets.
o Main uses of mobile devices include entertainment, gaming, internet use, communication (email, VoIP,
messaging), navigation (GPS), banking, and controlling other devices.
● Emerging Technologies:
o Artificial Intelligence (AI): Machines or applications performing tasks requiring intelligence (e.g., language use,
facial recognition, operating machinery, data analysis). AI can lead to job losses but also improvements in safety
and quality.
o Extended Reality (XR): Umbrella term for immersive technologies.
▪ Augmented Reality (AR): Overlays virtual information onto the real world (e.g., in gaming, retail,
healthcare).
▪ Virtual Reality (VR): Takes the user into a simulated digital world using headsets (e.g., in military training,
education, healthcare, entertainment).
Practice Questions
Types and Components of Computer Systems
● Define the terms 'hardware' and 'software'.
● Describe the main components of a computer system, including the CPU, RAM, and ROM.
● Identify three types of input devices and three types of output devices.
3
● Compare the characteristics of desktop computers, laptops, and smartphones.
● Discuss the advantages and disadvantages of using different types of user interfaces (e.g., CLI, GUI).
● Give two examples of system software and two examples of applications software.
o Keyboards: Common for text entry. Relatively slow and prone to errors. Ergonomic keyboards can help prevent
RSI. Uses include data input and commands. Advantages: fast for new text, well-known, easy to use, aids
verification. Disadvantages: difficult for users with limited movement, slow compared to DDE, large size.
o Numeric Keypads: Used for entering numbers. Uses include ATMs, mobile phones, POS terminals, chip and PIN
devices, and spreadsheet entry. Advantages: faster for numeric data entry, portable. Disadvantages: small keys
can be difficult, number order can be unintuitive.
o Pointing Devices (Mouse, Touchpad, Trackerball): Control a pointer on the screen.
▪ Mouse: Uses buttons for selection and menus. Uses include opening/closing software, file management,
image editing, and navigation. Advantages: faster for choosing options, quick navigation. Disadvantages:
can be difficult with limited movement, easily damaged, needs a flat surface.
▪ Touchpad: Used on laptops, controlled by finger movement. Uses are the same as a mouse. Advantages:
integrated into laptops, aiding portability. Disadvantages: can be difficult for some users, harder to control
pointer, difficult for drag and drop.
▪ Trackerball: Ball on top or side for pointer control. Easier for users with limited movement. Uses include
alternative to mouse for RSI, industrial control, and luxury cars. Advantages: easier control, more
accurate, robust, less desk space. Disadvantages: not standard, user training may be needed.
4
o Remote Control: Operates devices using infrared signals. Uses include televisions, multimedia systems, and
industrial applications. Advantage: can be operated from a distance. Disadvantages: difficult for users with
limited movement, signal can be blocked.
o Joysticks and Driving Wheels: Used for gaming and simulators.
▪ Joystick: Controls a pointer, with buttons for actions. Advantages: easier navigation than keyboard, more
realistic control for some applications. Disadvantage: more difficult to control pointer than a mouse.
▪ Driving Wheel: Simulates steering, with pedals for acceleration/braking. Advantages: more natural control
for driving games/simulators, realistic experience. Disadvantages: expensive, can be too sensitive, lack of
feedback in some cases.
o Touch Screens: Users touch the screen to select options. Uses include self-service tills, ATMs, POS terminals,
public information systems, mobile devices, interactive whiteboards, and CBT. Can also be output devices.
Advantages: faster option entry, easy to use, user-friendly. Disadvantages: limited input options, can cause
strain with frequent use, screen can get dirty, security risk for data entry.
o Scanners: Enter information from hard copy into a computer. Flatbed scanners are common. Can be used with
OCR software. Uses include scanning documents and photos, archiving, and barcode scanning. Advantages:
images can be edited, faster and more accurate than typing with OCR, can recover damaged documents.
Disadvantages: quality can be limited by resolution, can be slow.
o Digital Cameras: Store images on memory cards. Images can be transferred to a computer. Uses include taking
photographs, data capture (e.g., reversing aids), medical diagnosis, and creating virtual reality tours.
Advantages: easier to produce good quality photos, faster to upload, no film development needed, memory
cards store many photos. Disadvantages: requires computer literacy, some artistry lost due to software
correction, images may need compression.
o Microphones: Input speech/sounds. Convert sound waves into an electric current. Uses include inputting sounds
for applications, voice-recognition software, sensors, and video-conferencing. Advantages: faster than typing for
text, real-time sound manipulation, improved safety in voice activation systems. Disadvantages: sound files can
be large, voice-recognition not always accurate.
5
o Sensors: Input data about physical quantities (e.g., temperature, light, pressure). Data is often analogue and
needs ADC conversion. Used in monitoring and control applications. Examples of uses include washing
machines, central heating, intruder alarms, and environmental monitoring. Advantages: more accurate readings,
continuous monitoring, immediate action/warning initiation, automatic systems reduce human intervention.
Disadvantages: faulty sensors can give spurious results, most require ADC conversion.
o Light Pens: Used with CRT monitors to select objects or draw on screen. Advantages: greater accuracy than
touch screens, small size, easy to use. Disadvantages: lag when drawing, only works with CRT monitors
currently, not very accurate for drawing, dated technology.
● Direct Data Entry (DDE) Devices: Input data with minimal human interaction.
o Card Readers:
▪ Magnetic Stripe Readers: Read information from magnetic stripes on cards. Uses include ATMs, EFTPOS
terminals, and security access. Advantages: fast, error-free, secure, prevents access to restricted areas,
robust. Disadvantages: data loss if stripe damaged, requires close contact, information not human-
readable.
▪ Contactless Debit Card Readers: Allow payment by holding the card near a terminal. Uses radio waves.
Advantages: faster transactions, uses encryption, no PIN typing errors, retailers don't access card info,
unique encrypted transaction number. Disadvantages: more expensive cards, potential for unauthorized
reading (though security measures exist), double charging risk, transaction limits, risk of unaware
transactions.
▪ Chip and PIN Readers: Card is inserted and PIN is entered on a keypad. Uses include payments at various
locations. Advantages: more secure than contactless, more robust than magnetic stripe cards.
Disadvantage: risk of PIN being observed.
o Radio Frequency Identification (RFID) Readers: Use radio waves to read tags. Tags have a microchip and
antenna. Uses include livestock tracking, retail (stock control), admission passes, and libraries. Advantages: no
line-of-sight needed, robust, fast read-rate, bidirectional data transfer, bulk detection. Disadvantages: tag
collision, easily jammed/interrupted, data can be hacked, more expensive than barcodes.
6
o Optical Mark Recognition/Reader (OMR): Reads marks made on forms. Uses include reading questionnaires,
multiple-choice exams, and voting papers. Advantages: very fast input, more accurate than keying data.
Disadvantages: forms must be carefully designed, problems if not filled correctly, may require manual checking.
o Optical Character Recognition/Reader (OCR): Converts text on hard copy documents into electronic form. Uses
include processing passports/ID cards, converting documents, ANPR systems, and digitizing historic documents.
Advantages: much faster than manual data entry, reduced errors. Disadvantages: difficulty reading some
handwriting, not always accurate.
o Barcode Readers: Read information from barcodes. Often built into POS terminals or handheld. Uses include
supermarkets (stock control, billing), libraries, and safety checks. Advantages: faster and fewer mistakes than
manual entry, can improve safety, allows automatic stock control, tried and trusted. Disadvantages: expensive
to administer, not foolproof (barcodes can be swapped), can be damaged.
o Quick Response (QR) Code Scanners (Readers): Read QR codes, which store more information than traditional
barcodes. Can be read by smartphone/tablet cameras with an app. Uses include advertising, providing access to
websites/phone numbers, storing boarding passes, linking to apps, Wi-Fi authentication, AR experiences, and
virtual online stores. Advantages: hold more information, fewer errors due to error checking, easier to read
(using cameras), easy to transmit, can be encrypted. Disadvantages: multiple formats, can transmit malicious
code (attagging).
● Output Devices: Show the result of computer processing or are part of a control system.
o Monitors (Screens):
▪ CRT Monitors: Older technology, less expensive, use an electron gun and phosphor screen. Uses primarily
in specialist areas like CAD with light pens. Advantages: wider viewing angles, allows use of light pens.
Disadvantages: heavy, large footprint, run hot, consume more power, can flicker.
▪ LED and LCD Screens:
▪ LED Screens: Made of tiny light emitting diodes. Used for large outdoor displays.
▪ LCD Screens: Made of tiny liquid crystals, require backlighting (often LEDs). Uses include main
output for computers, mobile devices, and touch screens. Advantages: efficient, low power,
lightweight, no screen burn-in, various sizes, no flickering, sharp image, low electromagnetic fields.
7
Disadvantages: inconsistent colour/contrast at angles, motion blur, lower contrast than CRT,
potential for stuck/weak pixels, uneven illumination.
o Touch Screen (as an output device): Displays options and responds to touch input. Uses include smartphones,
tablets, ATMs, ticket machines, and information kiosks. Advantages/Disadvantages are similar to touch screens
as input devices.
o Multimedia Projectors: Receive signals from devices and project a magnified image onto a screen. Work with a
remote control. Uses include training/advertising presentations and home cinema. Advantages: enables many
people to see a presentation, avoids need for networked computers. Disadvantages: images can be fuzzy,
expensive, can be difficult to set up.
o Printers: Produce hard copy output.
▪ Laser Printers: High-quality, fast printing for large volumes. Use a drum, toner, and fuser. Uses include
offices for low noise and high-volume printing. Advantages: fast for large jobs, handle large jobs,
consistently high quality, long-lasting toner cartridges. Disadvantages: only fast for multiple copies, colour
can be expensive, produce ozone and VOCs.
▪ Inkjet Printers: Good quality hard copies, print a bit at a time. Use a print head with nozzles and ink
cartridges. Ink droplets produced using thermal bubble or piezoelectric technology. Uses include low-
volume output and high-quality single pages/photos. 3D inkjet printers are also used. Advantages: high
quality, cheaper to buy than laser, lightweight, small footprint, do not produce ozone/VOCs.
Disadvantages: slow for multiple copies, cannot do large jobs (ink runs out), printing can smudge,
expensive ink cartridges.
▪ Dot Matrix Printers: Impact printers using a print head with pins and an inked ribbon. Slow, noisy, and
lower quality. Uses include noisy/dirty environments and applications requiring multi-part stationery or
continuous rolls. Advantages: can be used in difficult environments, produce carbon copies, cheap to run,
easy with continuous stationery. Disadvantages: very noisy, cost more initially than inkjet, slow, poor
quality.
o (Graph) Plotters: Output devices that draw continuous lines using pens. Produce vector graphic drawings. Used
with CAD/CAM. Some can cut material. Uses include architectural/engineering drawings and animation
8
characters. Advantages: very high quality, produce large/accurate drawings, print on various materials.
Disadvantages: very slow, expensive equipment/software, large footprint.
o 3D Printers: Used in CAD applications to produce solid objects layer by layer. Use materials like powdered resin,
metal, paper, or ceramic. Use additive manufacturing. Various types exist. Uses are rapidly expanding across
many industries.
Practice Questions
Input and Output Devices
● Describe how a magnetic stripe reader works.
● Explain the benefits of using a touch screen compared to a mouse in a public information kiosk.
● Compare the advantages and disadvantages of laser printers and inkjet printers.
● Identify the type of input device most suitable for reading marks on a multiple-choice answer sheet and justify your
choice.
● Give two uses of a sensor in a domestic appliance.
● Discuss the potential security risks associated with using contactless payment cards.
● State one advantage of using a digital camera over a traditional film camera.
9
o Hard Disk Drives (HDDs): One of the main methods for storing data, files, and software. Magnetic in nature. Can
be internal or external/portable. Data is stored on platters divided into tracks and sectors. Read/write heads
access the data. Advantages: large storage capacity, relatively inexpensive per byte, fast access compared to
optical/solid-state (older), non-volatile. Disadvantages: mechanical parts are susceptible to damage, slower
access than RAM, can be noisy, less portable than solid-state.
o Magnetic Tape Drives: Older storage method primarily used for backups and archiving large amounts of data.
Data is stored sequentially on magnetic tape. Advantages: very high storage capacity, low cost per byte, reliable
for long-term storage. Disadvantages: sequential access is slow, requires a tape drive, susceptible to
environmental conditions.
o Magnetic Stripes: Found on cards (credit, debit, ID). Store small amounts of data that can be read by a magnetic
stripe reader. Advantages: simple technology, inexpensive to produce cards and readers. Disadvantages: limited
storage capacity, data can be easily damaged by magnetic fields or scratching, not secure.
o CDs (Compact Discs): Store data that is read using a laser. Data is stored in pits and lands. Different types exist
(CD-ROM, CD-R, CD-RW). Uses: distributing software, music, and data. Advantages: relatively inexpensive to
produce, widely compatible. Disadvantages: lower storage capacity than DVDs/Blu-rays, susceptible to
scratches, can be slow to access data.
o DVDs (Digital Versatile Discs): Store more data than CDs using a shorter wavelength laser. Can be single or dual-
layer. Different types exist (DVD-ROM, DVD-R, DVD-RW). Uses: distributing movies, software, and data.
Advantages: higher storage capacity than CDs, widely compatible. Disadvantages: susceptible to scratches, can
be slower to access data than hard drives.
10
o Blu-ray Discs: Store significantly more data than DVDs using a blue-violet laser. Can be single or dual-layer.
Uses: high-definition movies, large data backups. Advantages: very high storage capacity, durable.
Disadvantages: more expensive than CDs/DVDs, not as widely compatible as CDs/DVDs.
o Optical Storage Devices (Drives): Read and write data to optical media (CD, DVD, Blu-ray). Use lasers.
Advantages: portable media, relatively inexpensive drives. Disadvantages: media can be damaged, slower
access than magnetic or solid-state storage.
● Solid-State Media and Solid-State Storage Devices:
o Solid-State Drives (SSDs): Use flash memory to store data. No moving parts. Data stored in cells (NAND flash)
which are accessed using control gate and floating gate transistors. Uses: main storage in modern computers
and tablets. Advantages: faster access times than HDDs, more durable (no moving parts), less power
consumption, silent operation, more portable than HDDs. Disadvantages: more expensive per gigabyte than
HDDs, can have a limited number of write cycles (though improving), data recovery can be more difficult if
damaged.
o USB Flash Drives (Pen Drives): Portable solid-state storage devices that connect via USB. Uses: transferring files,
backups. Advantages: portable, durable, easy to use, various storage capacities. Disadvantages: can be easily
lost, limited storage capacity compared to HDDs/SSDs, data can be corrupted if removed improperly.
o Memory Cards (SD, microSD, CFast, XD): Small solid-state storage used in digital cameras, smartphones, and
other portable devices. Uses: storing photos, videos, and data. Advantages: small size, portable, various
capacities. Disadvantages: require a card reader to access on a computer, can be easily lost or damaged, data
transfer speed varies.
● The Future of Storage Devices: Mentions emerging technologies that could impact storage, though specific details
are likely covered elsewhere or are beyond the core syllabus. Could include holographic storage, DNA storage, or
advancements in existing technologies.
Practice Questions
Storage Devices and Media
● Define 'volatile' and 'non-volatile' memory, providing an example of each.
11
● Describe how data is stored on a Hard Disk Drive (HDD).
● Compare the storage capacity and access speed of CDs, DVDs, and Blu-ray discs.
● Explain why Solid-State Drives (SSDs) are often used in modern laptops instead of HDDs.
o Network Devices:
▪ Routers: Connect different networks (e.g., a home network to the internet). Use IP addresses to forward
data packets.
▪ Hubs: Connect devices within a local network. Broadcasts data to all connected devices.
▪ Switches: Connect devices within a local network. Send data only to the intended recipient based on MAC
addresses.
▪ Bridges: Connect two separate networks or segments of a network.
▪ Network Interface Card (NIC): Allows a device to connect to a network. Each has a unique MAC address.
▪ Modem: Converts digital signals from a computer to analogue signals for transmission over telephone
lines, and vice versa. Used for internet access.
o Network Types:
▪ Local Area Network (LAN): Covers a small geographical area (e.g., home, office).
12
▪ Wide Area Network (WAN): Covers a large geographical area (e.g., cities, countries), often connecting
multiple LANs.
▪ Wireless Local Area Network (WLAN): A LAN that uses wireless communication (Wi-Fi).
▪ Wireless Personal Area Network (WPAN): Covers a very small area around a person, often using Bluetooth.
o Network Topologies: The physical or logical arrangement of devices on a network (e.g., bus, star, ring, mesh).
(Might be covered in more detail in the textbook but not explicitly in the syllabus snippets provided).
o Network Protocols: Rules and standards for communication over a network (e.g., TCP/IP, HTTP, FTP).
o Network Security: Protecting network resources and data from unauthorized access, use, disclosure, disruption,
modification, or destruction.
▪ Authentication: Verifying the identity of a user or device attempting to access a network. Methods include
passwords, physical tokens, electronic tokens, and biometrics.
▪ Firewalls: Hardware or software that filters network traffic to prevent unauthorized access.
▪ Encryption: Converting data into a code to prevent unauthorized understanding.
▪ Malware: Malicious software (e.g., viruses, worms, Trojans, spyware, adware) that can harm networks and
data. Antivirus software helps detect and remove malware.
▪ Hacking: Unauthorized access to computer systems or networks.
▪ Phishing/Smishing/Vishing/Pharming: Social engineering techniques used to trick users into revealing
sensitive information.
▪ Denial of Service (DoS) Attacks: Attempt to make a network resource unavailable to its intended users.
o Communication Methods:
13
▪ Email: Electronic messages sent over a network. Includes uses, constraints (legislation, acceptable
language, employer guidelines), security (copyright, unsolicited emails/spam, phishing), netiquette, and
managing emails (Cc, Bcc, forwarding, attachments).
▪ Voice over Internet Protocol (VoIP): Making voice calls over the internet. Can include video. Quality
depends on connection speed.
▪ Video Conferencing: Holding meetings with video and audio over a network. Requires appropriate
hardware.
▪ Web Conferencing (Webinars): Conducting presentations or meetings over the internet using multiple
computers. Can include slide presentations, screen sharing, whiteboards, and document sharing.
▪ Instant Messaging: Real-time text-based communication.
▪ Social Networking: Building online communities and sharing information. Includes creating profiles,
sharing content, messaging, and controlling privacy. E-safety is important.
▪ Forums: Online discussion boards. Can be moderated.
Practice Questions
Networks and the Effects of Using Them
● Define the terms LAN and WAN.
14
Chapter 5: The Effects of Using IT
This chapter examines the impact of Information Technology on individuals and society.
● Microprocessor-Controlled Devices: Devices containing embedded microprocessors that can be controlled by
smartphones, tablets, or phablets using an app and the internet.
o In the Home: Examples include smart appliances, heating systems, and security systems. Advantages can
include convenience and energy efficiency. Disadvantages can include potential security issues and dependency
on technology.
o In Transport Systems: Examples include engine management systems in cars, driverless vehicles, and intelligent
road signs. Advantages can include improved safety and efficiency. Disadvantages can include risks associated
with computer control and potential job losses for drivers.
● Potential Health Problems Related to the Prolonged Use of ICT Equipment:
o Repetitive Strain Injury (RSI): Pain and damage affecting muscles, tendons, and nerves caused by repetitive
tasks (e.g., typing). Ergonomic keyboards and proper posture can help.
o Back and Neck Strain: Caused by poor posture when using computers. Using ergonomic furniture and taking
breaks can help.
o Eyestrain and Headaches: Caused by prolonged screen use, poor lighting, and screen flicker (less common with
modern screens). Adjusting screen settings, lighting, and taking breaks can help.
o Other potential issues can include effects on sleep patterns due to screen use before bed.
o Minimizing health problems involves using ergonomic equipment, taking regular breaks, maintaining good
posture, and ensuring proper lighting.
Practice Questions
The Effects of Using IT
● Identify three potential health problems associated with the prolonged use of ICT equipment.
● Describe methods that can be used to minimise the risk of Repetitive Strain Injury (RSI).
15
● Explain how a microprocessor-controlled device in the home could improve energy efficiency.
● Discuss the potential advantages and disadvantages of using driverless vehicles in transport systems.
● State two ways that using a computer for long periods can cause eyestrain.
o Communication Media: Newsletters and posters (produced using word processors and often including images).
Multimedia presentations (using software to create presentations with animation, video, and sound). Media
streaming (watching/listening to media online without downloading, using buffering). E-publications (digital
versions of books, magazines, newspapers).
o Mobile Communication: Mobile phones using cellular networks and satellite technology. Features include SMS,
phone calls, VoIP, video calling, and internet access.
● Modelling Applications: Using computers to simulate real-world systems.
o Financial Modelling: Using spreadsheets to analyze financial data and predict outcomes (e.g., personal
budgeting).
o Civil Engineering/Bridge and Building Design: Using CAD software to design structures and model their behavior.
o Flood Water Management: Using computer models to simulate flood scenarios and design defense systems.
o Traffic Management: Using sensors and computer systems to monitor and control traffic flow (e.g., at junctions).
Can involve simulation to optimize traffic lights.
o Weather Forecasting: Using data from weather stations and complex computer models to predict weather
patterns.
● Computer Controlled Systems: Systems where computers or microprocessors control devices.
16
o Robotics in Manufacturing: Robots used for tasks like paint spraying, welding, and assembly. Controlled by
embedded microprocessors or computer systems. Can be programmed through instructions or by recording
human movements.
o Other examples might include climate control systems, security systems, and industrial process control.
● School Management Systems: Used to manage administrative tasks and student information in schools. Can
include student registration and performance tracking. Student registration can use ID cards (magnetic stripe) or
biometrics (fingerprints). Tracking student performance involves recording test results and behavioral data, often using
spreadsheets. Computer-aided learning (CAL) uses computer systems to assist teaching.
● Booking Systems: Allow users to book services (e.g., flights, events) online. Involves selecting options, checking
availability against a database, and making payments. Online systems offer advantages over manual systems.
● Banking Systems: Use ICT for various banking operations. Examples include ATMs, electronic funds transfer (EFT),
credit/debit card transactions (including chip and PIN and contactless), and internet banking. Internet banking offers
convenience but has security considerations.
● Computers in Medicine:
o 3D Printing: Used for creating prosthetic limbs and customized medicines (printlets). Allows for personalized
treatment and controlled medicine release.
o Expert Systems: Used for medical diagnosis.
● Expert Systems: Mimic the knowledge and expertise of a human expert in a specific field. Examples include medical
diagnosis, prospecting, and fault finding. Components include a user interface, explanation system, knowledge base,
and rules base. Advantages: high expertise and accuracy, consistent results, store vast amounts of data, fast response,
unbiased analysis. Disadvantages: require user training, high setup/maintenance costs, can give cold responses, only
as good as the data entered, users may assume they are infallible.
● Computers in the Retail Industry: ICT is used for various retail operations. Examples include barcode systems for
stock control and sales, EFTPOS terminals for card payments, and internet shopping. Advantages and disadvantages
exist for both businesses and customers in internet shopping.
17
● Recognition Systems: Use technology to identify objects or people.
o NFC (Near Field Communication): Allows short-range wireless communication between devices, often used for
contactless payments.
o Biometric Recognition: Uses unique biological characteristics for identification (e.g., fingerprint, iris, face
recognition). Offers high security but has privacy concerns and can be affected by physical conditions.
● Satellite Systems: Used for communication, navigation, and remote sensing.
o GPS (Global Positioning System): Uses satellites to determine a user's location. Used in navigation systems and
mobile devices.
o GIS (Geographic Information Systems): Systems for capturing, storing, analyzing, and managing geographically
referenced data. Used with GPS data for mapping and analysis.
o Media Communication: Satellites are used for broadcasting television and radio signals, and for internet
connectivity in remote areas.
Practice Questions
ICT Applications
● Describe the process of media streaming.
● Discuss the benefits and drawbacks of internet shopping for both businesses and customers.
18
● State one use of GPS technology.
o Methods of Analysis: Observing the current system, interviewing users and stakeholders, examining existing
documentation.
o Identifying Inputs, Outputs, and Processing: Determining what data goes into the system, what results are
produced, and how the data is transformed. Data flow diagrams (DFDs) can be used.
o Hardware and Software Requirements: Specifying the necessary hardware and software for the new system.
● Design Stage: Creating a detailed plan for the new system based on the analysis.
o File Structures: Designing how data will be organized and stored (e.g., in databases).
o Input and Output Formats: Designing the layout and content of data entry forms and reports.
o Screen and Report Layouts: Designing the visual appearance of user interfaces and generated reports.
o Validation Routines: Designing checks to ensure the accuracy and consistency of data input.
● Development and Testing Stage: Building the new system and thoroughly checking for errors.
o Development: Writing the program code and creating the system components. Can involve modular design.
19
o Test Strategies and Test Plans: Planning how the system will be tested, including defining test cases and
expected results.
o Use of Test Data: Using various data inputs, including live data, to test the system's functionality and
robustness.
● Implementation Stage: Putting the new system into use. Different methods exist:
o Direct Changeover: The old system is immediately replaced by the new one.
o Parallel Running: The old and new systems are run alongside each other for a period.
o Pilot Running: The new system is implemented in a small part of the organization first.
o Technical Documentation: Information for developers and maintenance personnel (e.g., system design, code
details).
o User Documentation: Manuals and guides for end-users on how to use the system.
● Evaluation Stage: Assessing how well the new system meets the original requirements and identifying any
shortcomings.
o Evaluation of New Solution: Checking if the system functions correctly and efficiently.
o Compare Solution to Original System: Assessing the improvements or changes compared to the old system.
Practice Questions
The Systems Life Cycle
● Identify the main stages of the systems life cycle.
● Describe one method used during the analysis stage of system development.
20
● Compare the direct changeover and parallel running methods of system implementation.
● Discuss the importance of testing a new computer system thoroughly before implementation.
o Preventing Unauthorized Access: Using locks, security guards, and surveillance systems to protect computer
equipment and server rooms.
o Protecting Hardware: Securing equipment to prevent theft or damage.
● E-safety: Protecting users from risks when using the internet and digital technologies.
o Risks: Cyberbullying, online predators, exposure to inappropriate content, identity theft, online fraud.
o Precautions: Using strong passwords, being cautious about sharing personal information online, understanding
and using privacy settings on social media, recognizing phishing attempts, reporting suspicious activity, using
parental controls and filtering software.
o Netiquette: Following good online manners and respecting other users.
o Access Levels: Granting different levels of access to data based on user roles or permissions.
o Encryption: Encoding data to make it unreadable to unauthorized individuals (covered in Chapter 4). Used for
securing emails and online transactions.
21
o Firewalls: Filtering network traffic (covered in Chapter 4).
o Malware: Protecting against viruses, worms, Trojans, spyware, and adware (covered in Chapter 4).
o Data Backups: Regularly copying data to prevent loss due to hardware failure, human error, or malicious
attacks.
o Digital Certificates and Secure Sockets Layer (SSL/TLS): Used to secure online communication and verify the
authenticity of websites. HTTPS indicates a secure connection.
o Biometric Security: Using unique biological characteristics for authentication (covered in Chapter 6).
o Card Security: Protecting information on magnetic stripe cards, chip and PIN cards, and contactless cards from
cloning and fraud.
o Pharming and DNS Spoofing: Redirecting users to fake websites to steal information.
o Key Logging Software: Records keystrokes to steal passwords and other sensitive information.
Practice Questions
Safety and Security
● Define 'e-safety'.
● Justify why using strong, unique passwords for online accounts is crucial.
22
Chapter 9: Audiences
This chapter emphasizes the importance of considering the target audience when developing ICT solutions.
● Audience Appreciation: Understanding the characteristics, needs, and expectations of the people who will use or be
affected by an ICT solution.
o Factors to Consider: Age of the audience, their experiences, expectations, and existing knowledge.
o Methods to Understand the Audience: Surveys, interviews, focus groups (likely covered in more detail in the
textbook, but not explicitly in snippets).
o Applying Audience Appreciation: Tailoring presentations, websites, software, or other ICT products to suit the
specific audience. This includes using appropriate language, multimedia, and examples.
● Software Copyright and Piracy:
o Software Copyright: Legal protection granted to software creators, giving them exclusive rights to copy,
distribute, and modify their software.
o Software Piracy: The illegal copying, distribution, or use of software. It is illegal to make and distribute copies,
use software on multiple computers without a license, use copyrighted code without permission, or rent out
software illegally.
o Protection Measures: Using product keys or unique reference numbers during installation, requiring users to
agree to license agreements, using holographic labels on physical copies, requiring the original media or a
dongle to run the software.
o Organizations like FAST, IIPA, and JIPA combat software piracy through legal means.
Practice Questions
Audiences
● Explain why it is important to consider the target audience when creating an ICT solution.
● Identify three factors about an audience that should be considered when designing a website.
23
● Define 'software copyright'.
o Characteristics, Uses, and Constraints: Emails are a common communication method. Constraints include legal
requirements (opt-in/out, clear subject lines, unsubscribe options, privacy policies, no address harvesting, valid
postal address). Acceptable language must be used, avoiding offensive or illegal content. Employers often have
guidelines on email use.
o Security: Email security involves protecting against hacking and unauthorized access. Using password-protected
accounts is important. Confidentiality must be maintained.
o Netiquette: Refers to the rules of polite behavior when using email and the internet. Guidelines include using
clear subject lines, being concise, proofreading, avoiding excessive formatting, and being mindful of the
recipient's time and resources.
o Making Copies: Cc (Carbon Copy) sends a copy to recipients visible to all. Bcc (Blind Carbon Copy) sends a copy
to recipients whose addresses are hidden from others.
o Language Used: Use clear, concise, and appropriate language. Avoid slang, jargon, and offensive terms.
o Attachments: Files sent with emails. Can pose security risks (e.g., viruses). File size limits exist. Alternatives for
large files include compression or using file transfer services.
o Spam: Unsolicited emails, often sent in bulk. Can be annoying or dangerous (viruses, phishing). Disadvantages
include wasting time, using bandwidth, and clogging inboxes. Mobile spam (m-spam) also exists.
● Effective Use of the Internet:
24
o Differences between the World Wide Web (WWW) and the Internet: The internet is a global network of
interconnected networks. The WWW is a collection of web pages accessed via the internet using web browsers
and protocols like HTTP.
o Intranets: Private networks based on internet technology, used within a single organization. Access is restricted,
they are generally more secure, and information is specific to the organization.
o Extranets: Extensions of intranets that allow controlled access to external users, such as trading partners.
▪ Blogs (Web Logs): Online journals updated regularly by a single author. Content is usually public and
cannot be changed by others. Microblogs are short posts often used on social networking sites.
▪ Wikis: Websites where multiple users can create and edit content using a web browser. They track
changes and are useful for collaboration.
o Forums: Online discussion boards, can be moderated. The internet can be seen as a large unmoderated forum.
o Social Networking: Platforms for building online communities based on shared interests. Users create profiles
and share content. Privacy settings are important.
o Internet Service Providers (ISPs): Companies that provide internet access, usually for a fee.
o Search Engines: Tools used to search for information on the internet. They use algorithms to index and retrieve
web pages based on keywords. Evaluating the information found is important.
o Internet Protocols: Rules for communication over the internet (covered in Chapter 4). Examples include
HTTP/HTTPS, FTP, TCP/IP.
o Internet Risks: Potential dangers of using the internet, including exposure to inappropriate material, cybercrime,
and security threats (covered in Chapter 8). Precautions and education are important.
Practice Questions
Communication
● Describe the features of an email application, including Cc and Bcc.
25
● Explain the difference between the World Wide Web (WWW) and the Internet.
● Define 'spam'.
● Discuss the risks associated with opening email attachments from unknown senders.
26