You are on page 1of 40

CORE TOPIC: PROJECT MANAGEMENT

Techniques for managing a project


The Five System Development Cycle
Designing
Implementing
Testing, evaluating and maintaining

2
2
2
4
5
6

CORE TOPIC: COMMUNICATIONS SYSTEMS

the functions performed within the communication systems in passing messages between source
and destination, including:
examples of communication systems
transmitting and receiving in communication systems
communication protocols, including:
strategies for error detection and error correction
network topologies, including:
functions performed by the following hardware components used in communication systems:
other information processes in communication systems
issues related to communication systems

CORE TOPIC : INFORMATION SYSTEMS & DATABASES


non-computer methods of organising including:
computer based methods of organising, including:
the logical organisation of flat-file databases, including:
linking tables using primary and foreign keys
databases, including:
storage and retrieval
other information processes for database information systems
issues related to information systems and databases

7
7
9
10
11
11
12
13
14

14
15
16
16
17
17
19
19
20

OPTION TOPIC : TRANSACTION PROCESSING SYSTEMS

21

OPTION STRAND: MULTIMEDIA SYSTEMS

30

Characteristics of Multimedia Systems


Examples of Multimedia Systems
Displaying In Multimedia Systems
Other Information Processes in Multimedia Systems
Issues Relating To Multimedia Systems

30
32
32
33
35

characteristics of transaction processing systems


types of transaction processing systems
storing and retrieving in transaction processing systems
other information processes in transaction processing systems
issues related to transaction processing systems

21
23
25
27
28

Information Processes and Technology- Trial Study Guide Georgia Wahib

CORE TOPIC: PROJECT MANAGEMENT

Key
Advantages // disadvantages

Techniques for managing a project


communication skills necessary for dealing with
others
understand the communication skills required to manage a system development
project, such as:
active listening
Listening to people is the main source of critical information required
for a project to run smoothly. Listening is not the same as hearing; to
listen requires attention and involvement
conflict resolution
Need to manage conflict so that issues are resolved appropriately for
all concerned, and in the best interests of the project
negotiation skills
Negotiation should be a friendly exchange where differences are
argued logically and in a reasoned manner. This can even prevent
situations leading towards conflicts
interview techniques
Involves carefully preparation, implementation, and follow-up
team building
1. Forming Team members are only just getting to know each other
2. Storming People are beginning to feel comfortable with each other
3. Norming Team members now recognise their differences
4. Performing The team is now operating as an effective, productive
unit
project management tools, including:
Gantt charts
- Time and resources scheduling
- Presents a sequential breakdown of individual tasks and shows the relationship
between them
- Shows the expected duration of tasks
- A time scale should be shown, including dates and milestones
Scheduling of tasks
- Can be done in a Gantt chart
- Keeps track of time for different stages of development
- Keeps track of deadlines and milestones
- Helps save money so the project doesnt go overtime and the company will not have
to compensate for finishing the project after the final deadline
Journals and diaries
- The journal is a detailed record of when happened at each meeting, how tasks have
been allocated and when tasks are/to be completed. The diary is a record of
appointments, events and meetings.
The Five System Development Cycle
Understanding the problem

approaches to identify problems with existing systems, including:

interviewing/surveying users of the information system


- It is the primary tool to identify user needs, experiences and new ideas to improve
the system. The larger the sample, the more accurate it is.

interviewing/surveying participants

Information Processes and Technology- Trial Study Guide Georgia Wahib

Participants in existing systems will have an understanding of the part of the system
they work in. They can identify problems, ideas to solve it and provide details on the
info processes occurring.

analysing the existing system by determining:


- how it works
- what it does
- who uses it
requirements reports
- The requirement report is a statement about the need for a new system.
- It outlines the aims and objectives of the new system and how it will help the
organisation.
- The requirement report is based on data collected from the participants.
- It must match the goals of the organisation to ensure that management is satisfied
with the solution.
- The requirement report also provides an overview of the new system in terms of the
data/information, information processes and information technology to be used.
- The requirement report is used to develop potential solutions to the problem.

Planning

a feasibility study of proposed solutions, including:


Economic feasibility the cost of the new system is compared to the economic
benefits of introducing the new system. The factors to be considered when
determining the economic feasibility include:
Development costs purchase of hardware and software, cost of
development team, infrastructure costs, training costs, conversion costs
Operational costs maintenance and repair costs, software licenses and
upgrades, wages of participants, consumables
Benefits cost reductions, increased profits, increased sales, increased
efficiency
Cost-benefit analysis has the money been well spent, is there good
return on the investment, when will the new system pay for itself.
Technical feasibility Determine whether the required information technology
exists and what demands will be placed on the new system. These questions can
be asked to determine the solutions technical feasibility:
Does the organization have the necessary technology?
Is the required technology readily available?
Are the users qualified to use the technology?
Will the technology work with existing and emerging technologies?
Operational feasibility Determine whether the new system will meet the
current goals and will have enough support to be implemented successfully. The
new system must be supported by the management and existing employees.
These questions can be asked to determine the solutions operational feasibility
Is the new system supported by management and employees?
Will the nature of work change for participants?
Do the participants possess the necessary skills to operate the new
system?
How are the end users affected by the new system?
Scheduling determine the timeframe by which the new system must be
operational. These questions can be asked to determine the solutions schedule
feasibility:
How long will it take to acquire the hardware and software?
How long will it take to employ new staff?
How long will it take to retrain existing staff?
What are the consequences If the project runs over time?
Can all the deadlines be met?

Information Processes and Technology- Trial Study Guide Georgia Wahib

choosing the most appropriate solution


choosing the appropriate development approaches
Traditional SDLC (left). Important because it
results in an information system that is efficient and
error free. Each stage needs to be completed and it
builds up on the conclusion of the previous stage
Outsourcing This involves using another
company to develop or support parts of the system.
This can be a more cost-effective method especially
where specialized skills may be required only for the
development or support and are not required by the
organization once the system has been implemented.
Prototyping A limited model of the system is developed to demonstrate the
system to users and participants. It should give an accurate simulation of the
new system and so must meet the needs and requirements of this system. The
prototype will evolve as the system requirements are adjusted. It is suitable for
the development of the new system for systems which rely on a useful interface
but with little internal logic
Customization An existing system is customized to suit the specific needs and
requirements. This may involve altering hardware and software components to
reduce costs. Off the shelf hardware and software would be used for this system
Participant development the person who will use the system is the same
person who develops it. There will be very little consultation and detailed
documentation is not required. off the shelf software is used to develop the
system, often making use of a wizard or guided process. If a small business
cannot afford a professional solution, this is a no-frills method to achieve a newsystem.
Agile methods this method does not follow the structured development
process as it can often be too rigid and cumbersome. The emphasis is on the
development team and customer involvement to ensure that there is early and
continuous delivery of software. A repetitive approach is used to develop the
system until the software is ready for release. Agile means being able to quickly
change direction even late in the development. Constant attention to technical
excellence and good design enhances agility.
compare traditional, iterative and agile system development approaches
Iterative: Iterative development is a way of breaking down the software
development of a large application into smaller chunks. In iterative development,
feature code is designed, developed and tested in repeated cycles.

Designing

tools used in designing, including:

context diagrams

Information Processes and Technology- Trial Study Guide Georgia Wahib

Context diagrams are used to represent a


summary of an entire information system.
Context diagrams show where the
information system interfaces with the
environment.

data flow diagrams


Data flow diagrams represent the information system as a number of sub processes
that together constitute the single process of a context diagram. They describe the
movement and changes in data between processes. All process must have a
different set of inputs and outputs.
A data flow diagram shows
The input for the system (source)
Processes performed by the system
The inputs to each process
The data/information produced by each
process
Output from the system (destination or
sink)
Storage

decision trees
Diagrammatic way of representing all possible
combinations of decisions (branches) and their resulting
actions. The actions are listed right of the branches.
decision tables
decision tables represent all possible conditions and the
actions that will result. The table is divided vertically into
conditions and actions, and horizontally into the rules that are
based on combinations of the conditions.
data dictionaries
Data Dictionaries contain a comprehensive description of each
field in the database. This commonly includes field name,
number of characters (field width), data type, data format (the number of decimal
places), a description of the purpose of each field and an example.

Storyboards
Storyboards are the tools used for designing the user interface provided by the
system. They document the layout of elements found on each screen as well as the
links between screens. The representation of each interface should be detailed
enough for the reader to identify the purpose, contents and design elements.
Implementing

an implementation plan that details:


Participant training - How, when and where will they be trained?
The method for conversion - Can the old system be operational until the new
system is fully ready to be operated?

Information Processes and Technology- Trial Study Guide Georgia Wahib

Parallel conversion The old system and the new system operate side
by side until the new system has proven to be satisfactory. This is the
safest method but is costlier. It allows the participant and users to get
used to the new system and to check its output. However, it created
duplications of data, additional workload for staff and all staff need to be
trained before implementation. Data can be protected while both systems
are running at the same time, as it is easy to return to the old system if

the new system has problems.

Direct conversion The existing system is fully discarded and the new
system over completely over a very short period of time (such as a
weekend). This method is used when the system is fairly standard, when
implementation time is minimal or when it is not possible for both systems
to operate at the same time. Neither system works during the conversion
stage, so it is done at a quiet tome. Participants must be fully trained
before conversion. The old system can not be used easily as a back and so

this method is not always practical.

Pilot conversion One part of the new is introduced for a small number
of users. These users learn to use the system and evaluate it. If there are
no problems the system is implemented across the whole organisation. If
the new system fails, only a small part of the organisation is affected. This
method can be used as the final acceptance testing of the system.

Phased conversion One part of the system (subsystem) is introduced


after the other until the complete system is integrated. Each module is
tested individually and the staff develop confidence in the new system.
Often the system is still under development if this method is used. If the
new system fails, only one module if affected and it is east to fall back to
the precious point. This allows participants to evaluate the new system
and train others in its use without the problems of direct conversion.

How the system will be tested - Is sample data available? Hardware, software
and the overall running of the system should be tested.
Conversion of data for the new system - Is there data currently available
that the new system needs to run? How long will data conversion take? How
accurately can data be converted? Will the existing system remain operational?

Testing, evaluating and maintaining

testing and evaluating the solution with test data such as

Information Processes and Technology- Trial Study Guide Georgia Wahib

Volume data - Volume data is test designed to ensure the system can process
large amounts of data. A query in a database may have to process millions of
records
Simulated data Simulated data aims to test the performance of the system
under simulated conditions such as performing different tasks at the same time
or the system having to respond to a large number of request.
Live data Live data is the actual data processed by operating system. Live
testing takes place once the system has been installed to ensure it is operating
as expected.

compare the new system to the old and evaluate whether the requirements have been
met

Core Topic: Communications Systems

communication systems as being those systems which enable users to send and receive
data and information
the framework in which communication systems function, demonstrated by the following
model

the functions performed within the communication systems in passing messages between
source and destination, including:

Message Creation
The message is compiled at the source in preparation for sending. This
takes place using the software.
Organisation of packets at the interface between source and
transmitter
As the message descends the layers of protocols, it is wrapped with a
header and trailer, which contains data relevant to the protocol (address
and error checking). There will be multiple independent headers and
trailers.
Signal generation by the transmitter
The transmitter is the physical hardware the encodes the data onto the
medium creating the signal.
The transmitter represents individual bits as a wave (which is determined
by the rule of the TL protocol).
Transmitters and receivers are contained in the same hardware device.
Hardware is controlled by protocols at the transmission level.
Transmission
Transmission occurs as the signal travels through the medium. Each bit or
pattern bits move from the sender to the receiver as a particular
waveform.
Synchronising the exchange
Common clocks are used to sync the exchange to ensure that each
waveform (data packet) is detected by the receiver. The receiver is able to

Information Processes and Technology- Trial Study Guide Georgia Wahib

decode the signals whilst the transmitter keeps sending it. Two preambles
are used to help sync the clocks.
Addressing and routing
Data packets (forming a single file) pass through many different links. For
each communication link, each packet will ascend its protocol level until it
reaches the addressing and routing of protocol and then descend the level
as it is prepared for transmission down the next path.
Error detection and correction
As messages descend the levels prior transmission; many protocols
calculate checksums or CRC values and include them in the headers and
trailers. The receiver recalculates the value for data detection.
Security and management Many protocols restrict messages based on user
names and passwords and others encrypt messages during transmission.

the roles of protocols in communication

handshaking and its importance in a communications link


- Protocol is a formal set of rules that must be agreed to ensure successful and
efficient data transfer.
- Handshaking occurs when two or more devices agree on protocols to ensure
successful communication. It commences when one device desires to communicate
with another and is successful when a connection is made
Functions performed by protocols at different levels
Application Level
HTTP, SMTP, SSL.
- Communication Control and Addressing Level
TCP, IP, TCP/IP
Transmission Level
Ethernet, token ring,

examples of communication systems

teleconferencing systems
A multi-location, multi-person, synchronous meeting where audio, video and/or
other is communicated in real time to all participants.
Purpose
To exchange info among several people in multiple locations using I.T.
(internet).
Participants
Business people, educators, students
Data/Information
Video, text (numeric), audio and graphics
Information Technology
Computer, video camera, microphone (headset), speakers, Internet
connection, large monitors/data projectors, web conference software,
teleconferencing server.
Transmitting and receiving data
Raw video is collected and fed, in real time, through a software-based
codec. The video is compressed, transmitted to Chat and Video server
(determines transmission speed, frame rate and resolution). Video is
transmitted as data packets, which is then decompressed and displayed.
Advantages of Teleconferencing
Systems
Simulates face to face meeting
without the required

Disadvantages of
Teleconferencing Systems
Requires high-speed data
connection for anything more

Information Processes and Technology- Trial Study Guide Georgia Wahib

unnecessary travel which


absorbs time and energy
Increased productivity and less
time wasted
Provides the ability for all
managers to contribute to
decisions
No additional hardware and
software required other than a
conference phone and a highspeed broadband connection
Reduction in costs due to
decreased travel and
accommodation bills
Achieve world-wide connectivity

than jerky frame by frame video


signal
It removes interpersonal
relationships and inhibits the
development of new ones
Difficult to maintain connection
during long phone calls
Reduces personal contact

messaging systems, including:


Email the use of computers to send and receive text messages or documents
addressed to individual people or locations. Messages are exchanged between
hosts using the Simple Mail Transfer Protocol (SMTP) with software programs
called mail transport agents. Users can download their messages with standard
protocols such as the Post Office Protocol (POP) or Internet Message Access
protocol (IMAP).
Voice Mail - is a computerised method of storing and forwarding spoken
messages. It combines the voice recording feature of a telephone answering
machine with the editing and forwarding concepts of an email system.
Voice over Internet Protocol (VoIP) VoIP transfers voice calls over the
Internet. A broadband Internet connection Is used to transfer the digitised
messages representing speech that comprise telephone calls using IP. It is
possible to transfer voice over the Internet using an Internet connection
combined with a microphone, speaker and a free instant messaging application.
VoIP connections can be made to any normal phone across the world.
Advantages of VoIP
Disadvantages of VoIP
Low-cost long distance calls
Poor quality audio and
disruptions can occur
No added cabling required

Emergency calls cannot be


VoIP calls can originate from
made using a VoIP connection
anywhere with an internet
Broadband Internet connections
Connection.
are not always available
Voicemail and conference calls
can be added

other systems dependent on communication technology such as:


E-commerce Financial transactions that occur over an electronic network are
examples of electronic commerce (or e-commerce). The advantages of ecommerce include the following:
It provides a means of developing new ways to do business
A business can remain small yet increase turnover without increasing
costs
The time needed to obtain goods and services is reduced.
It creates new markets in wider geographical locations.
EFTPOS (Electronic Funds Transfers at Point of Sale) - EFTPOS is a
standard equipment to electronically pay for goods with debit or credit cards.

Information Processes and Technology- Trial Study Guide Georgia Wahib

Both customers and merchants are charged each transaction. Merchants are in
charge of filling ATMs with cash.
Electronic (Internet) banking Internet backing allows customers to pay bills,
check account history and back balance information and transfer money
between accounts from work, home or wherever they can access the internet.
Most banks and financial institutions encourage customers to use internet
banking. To access Internet banking the customer must be connected to the
Internet and have a username and password form the financial institution.
Advantages include; always available, reduction of time and cost
Disadvantages include; not available for computer illiterate people or
without computers; phishing, malicious software to record key stroke;
identity theft

transmitting and receiving in communication systems


Transmission media, including:
- Wired transmission
Twisted pair Twisted pair cable is made from two strands of insulated
copper wire. These strands are twisted around each other to minimise
electrical inference but this does not completely protect against and as
result the signal can be lost. This type of cable is inexpensive and widely
used in telecommunications although it is relatively slow.
Inexpensive, readily available // Susceptible to electromagnetic
interference, lower bandwidth, bad over long distances
Coaxial cable Coaxial cable is created by encasing insulated copper
wire in a protective coat of mesh. Coaxial cable is a more reliable data
carrier but is more expensive and less flexible. Coaxial cable can carry one
signal at a time whereas a broadband coaxial cable can carry multiple
signals at one time, including audio and video transmission. Coaxial cable
was designed to support Ethernet-type networks, permit high data rates
and provide extra protection from electrical interference.
Less susceptible to EMI, more durable and faster data rates than TP,
available // More expensive, bulkier and less flexible than Twisted
Pair, slower data rates.
Optic Fibre Optic fibre cable is made of a thin fibre of clear glass
surrounded by a layer of plastic. Data is sent as pulses of light. Optic fibre
can transmit faster and is more reliable, but is expensive to make and
repair. Unlike copper cable, fibre optic cable is not susceptible to loss of
signal strength over distance. Because light is not appreciably affected by
electromagnetic fields, a signal in a fibre optic cable is not affected by
interference. Optic fibre provides greater security as it is difficult to tap
into.
Higher data rates over greater distances; immune to EMI;
lightweight; secure // Expensive in cost & service; specialised
installation
- Wireless transmission
Microwave Microwave stations transmit by line of sight and need to be
places within 40-50 kilometres of each other with no obstruction between
them. This is because microwaves need to travel in line of sight and
cannot bend around corners or the Earths curvature. Microwave is used to
relay wireless signals over a large distance, so the stations are located at
high positions such as on top of buildings or mountains. The transponders
receive the signal, amplify it and transmit it to the next transponder.
Microwave systems transmit voice and data through the atmosphere as
super high frequency radio waves.
Accurate, fast // Expensive, line of sight
Satellite To avoid some of the limitations of microwave earth stations
communication companies have added microwave stations in the sky.

10

Information Processes and Technology- Trial Study Guide Georgia Wahib

Communications satellites are microwave relay stations in geostationary


orbit around the Earth (uplink), amplify it and retransmit the signal back to
Earth (downlink) at a different frequency. The Global Positioning Satellite
(GPS) system uses a network of satellites that orbit the Earth to form a
complete grid. The signals transmitted to Earth and received by navigators
are used to locate places on the Earth.
Fast speeds, long distance // expensive, complex to set up and
maintain
Radio - A signal is sent through the air and is received via radio
depending on the signal being sent.
Inexpensive for receivers; portability; readily available // Security;
costly for transmitters; interference; low speed transfer
Infrared Infrared waves occur above microwaves and below visible light.
Infrared waves travel in straight lines hence a direct line of sight is
required between the source and the destination. Infrared is only used
over short distances. Remote controls use infrared technology. Infrared is
portable and no antenna is required. However, it only operates over a
short distance and is sensitive to the orientation of the transmitter to
receiver.
Wireless features in devices; cheap; readily available // Short range;
limited bandwidth; line of sight limitation.
for a given scenario, choose and justify the most appropriate transmission media

communication protocols, including:

application level protocols


HTTP (Hypertext transfer protocol). This is the common
protocol used in web browsers to communicate and receive web
pages from web servers.
SMTP (Simple Mail Transfer Protocol). SMTP is a protocol that
is used for sending e-mail messages from a mail client to a mail
server. The messages are retrieved by using wither POP or IMAP.
When setting up the email software, the POP or IMAP and SMTP
need to be configured to ensure messages can be transmitted and
received over the Internet.
SSL (Secure Sockets Layer). SSL is a protocol that uses two keys
to encrypt data so that private documents can be transmitted via
the Internet. SSL is supported by most browsers so that websites
can obtain private information such as credit card numbers. SSL
URLs start with https:
communication control and addressing level protocols
TCP (Transmission control protocol). TCP/IP are responsible
with correct transfer of data via internet. TCP requires IP, but not
vice versa. When errors are encountered, the packet is discarded.
TCP checks for errors using the checksum method. TCP packets or
segments contain 576 bytes (20 bytes for each header and trailer
and 536 bytes of data).
IP (Internet Protocol). IP sends data packets from sender to
receiver. It doesnt guarantee its arrival nor acknowledge it. No
error checking is performed on data. It is designed to work on all
networks and hardware. It specifies the format of packets, also
called datagrams, and the addressing scheme. It allows you to
address a package and drop it in the system, but there is no direct
link between you and the recipient. A router is used to determine
the next path (avoiding problem areas).

transmission level protocols

11

Information Processes and Technology- Trial Study Guide Georgia Wahib

Token Ring. A token, which is a special bit pattern, travel around the
nodes or a ring topology comprising a local area network. To send a
message, a computer catches the token as It passes by, attaches a
message to it and then lets it continue to travel around the network.
When the message has been delivered to its destination, the token is then
passed to the next device in the network. No collisions occur using token
passing.
Ethernet. Ethernet operates at the transmission level. It is built into the
hardware devices or NICs used to transmit and receive. Ethernet uses a
system called CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) to deal with collisions when messages are sent at the same
time. If two nodes attempt to transmit at the same time, a collision
occurred. This collision is detected by all participating nodes. After a
random time, interval, the node will try to resubmit the message. If
collisions continue to occur, the time intervals will gradually be increased
until the message is successfully transmitted.
strategies for error detection and error correction
Parity Checking.
Parity bits are single bits added after the data so the total number of 1s is either
even or odd. During handshaking, even or odd is decided. It is used for
asynchronous transmission. Errors with corruption of even number of 1s are
undetectable.
(or you could go more complicated )
Seven bits represent the normal ASCII character set when an eight-bit byte is
used in a computer. The eighth bit can be used to check whether that byte has
been received correctly by using the concept of parity. It works as follows
The originating computer counts the number of 1s in each transmitted
byte and determines whether there is an odd or even number
The eighth bit in the byte is then used to produce a byte with an even
number of 1s if even parity is set or with an off number of 1s if odd parity
is set in the protocol governing the particular communication session.
During handshaking the sender and receiver decided whether odd or even
parity will be used. If any single bit is corrupted during transmission, then the
receiver will detect the error. Problems with parity checking include the
following:
It can detect one error but assumes all is well even if there are two errors
or a multiple of two errors in the one byte.
If two bits flip value, then the parity check will not alert the receiver.
Any byte with an even number of errors will slip through.
Checksum.
Checksum is the count of the number of bits in a data packet that is included at
the end of the packet to allow the receiver to determine whether the packet is
erroneous or not. The accuracy depends on the length of the data packet and
length of checksum. It cant detect area of the error.
(or you could go more complicated )
A checksum can be created during data transmission to detect errors. In this
process the numeric value of all the bytes are added as if they were integers.
The resulting sum will be sent as a binary integer along with the message in the
header or trailer. The receiver also calculates a checksum value and if the sent
value does not agree, then an error is detected. The position of the error is not
known, however.
Problems with checksum include the following
If even numbers of bits flip value, then the error will not be detected.
An error will not be detected if the message package is corrupted in such a
way that the checksum remains the same.

12

Information Processes and Technology- Trial Study Guide Georgia Wahib

Cyclic Redundancy Check. CRC are performed at the transmission level. The
CRC values are performed by the hardware. Both checksums and the CRC values
are included in the header or trailer of the message packet. CRC values are
calculated using division. This technique works as follows:
The checksum number is substituted into a formula and a sixteen-bit or
thirty-two-bit remainder is calculated.
Once the data has reached its destination the received checksum is put
through the same process.
If the remainder produced is identical to the one received then the data
has been correctly received, otherwise a retransmission is requested. This
process gives the receiving computer the ability to check that the
checksum has also been received correctly.
CRCs are able to detect most of the common types of transmission errors.

network topologies, including:

Star Topology
- All nodes connect to a hub (usually a switch) via their own
cable. For wireless LANs, a WAP (Wireless Access Point) is
used.
- Nodes dis/connected without affecting other nodes; Issues
more easily identified // More cabling required; if a fault
occurs at the hub, the network is down.

Bus Topology
- A bus topology (as shown below) is one of the simplest
designs in networking. A common cable, called a bus,
connects all the nodes in bus topology. All nodes on the
network receive data transmitted on a bus network, but
only the node to which it is addressed accepts and
processes the data.
- Less cabling, easier to implement // Cant
accommodate lots of nodes; Break in the backbone disables the whole network;
Collusions can occur when data is sent simultaneously.

Ring Topology
A ring topology network (as shown below) consists of a
number of nodes connected to a closed loop, so that
each of the stations on the network is physically
connected to two other stations. A node may be a
single computer or a device used to attach many
computers to a common ring. Data packets circulate
the ring in one direction. Each node receives data from
one node and transmits it to the next node. If the cable
is broken at any point, then the entire network is disabled.
No data collusion, cheaper without needing a hub // If a cable is broken, a node is off
or added/removed, the network is disabled.
Hybrid Topology
One transmission between any two nodes with bus as
backbone for stars (usually)
Used when different types of networks are required //
expensive, errors are more difficult to detect
wireless networks
Wireless networks use radio or microwaves, not cables.

13

Information Processes and Technology- Trial Study Guide Georgia Wahib

Problems in maintaining signal quality and concerns about electromagnetic radiation


has been a common issue since their introduction.
However, with wireless modems today, these problems have largely been
rectified, by changing the frequency that modems operate on, from other
household electrical items.
- Cables arent required; allowing use of portable devices // Disconnections are more
common; quality of transmission is not as high; devices not Wi-Fi-enabled cant
connect; be intercepted by hackers.
functions performed by the following hardware components used in communication systems:
hubs and switches
Hubs - Multi-port dumb device that provides a central connection point to all
nodes. It transmits the received data to all nodes, slowing down the network.
However, it is cheaper. It is half-duplex, making it inefficient under high network
traffic
Switches - Intelligent device which sets up a direct connection between a sender
and receiver. It identifies the destination of the data and sends it. They can
simultaneously send and receive data to multiple pairs of nodes. This reduces
network traffic, making it have faster data transfer speeds. Additionally, it has better
security and reduces data collusions.
Routers
Directs data between networks with similar protocols. A router looks at the datas
destination and determines the quickest path, rerouting around problem areas. It
can translate one protocol into another. This overcomes I.T compatibility issues. It
connects networks as it reduces data collusion.

Modems
Modems are used to connect a computer to their local ISP to provide internet access
to a household or network. It connects through USB, Ethernet or wireless
connections to the computer.
bridges and gateways
Bridges are used to connect two LANs together in a simple network topology which
use the same protocol to communicate.
Gateways provide the ability for one protocol to talk to a different one (protocol
conversion). They are more complex than bridges and will translate data in one
protocol to another protocol for transmission.
Network Interface Cards (NIC)
It is a small chip on the motherboard that allows for wireless/wired network. It
breaks down communication into binary and reassembles binary into more complex
data.
mobile phones
It uses radio waves to T&R data to and from the base station in each cell. They
provide portable access to text and video messaging, e-commerce and social
networking sites
cables
Transmission medium made of copper or fibre optic glass. They use EM or light
pulses, respectively to transmit 1s and 0s from a transmitter to a receiver
wireless access points
A central node (hub) to connect wireless nodes to a wireless LAN. It sends and
receives data to all wireless nodes and requires encryption for security. The WAP
must be physically connected to the LAN to allow wireless nodes to access wired
nodes on the network.
Devices can be added without cabling // small range for wireless signal, suffers
interference from bad weather
bluetooth devices
For short-range transmission, replacing cables that connect portable devices. It is
available in mobile phones, PDAs, computers, etc. The physical distance between

14

Information Processes and Technology- Trial Study Guide Georgia Wahib

Bluetooth devices depend on the power of the transmitter in each device. Error
checking is present in each data packet.
other information processes in communication systems

collecting, such as

the phone as the collection device with voice mail

EFTPOS terminal as a collection device for electronic banking


- A keypad/board is used to collect data from the user. The EFTPOS terminal then
collects data from the main bank server and displays it

processing, including:

encoding and decoding analog and digital signals


- Encoding organises data into form suitable for transmission along the
communication medium
- Decoding changes organisation of received data into form suitable for subsequent
info processes
- Digital data Data that is represented using whole distinct numbers
Digital signal digital data is encoded onto an analogue wave
- Analogue data Continuous data that usually originates from the real world
Analogue signal analogue data is encoded onto an analogue wave.
- Analogue data to analogue signal E.g. telephone conversations the system
encodes speech and transmits it from sender to receiver.
- Digital data to analogue signal A series of 1s and 0s is converted into a series
of waves. E.g. a modem modulates digital data into an analogue wave and when
transmission is received, another modem demodulates it to be suitable for computer
use.
- Digital data to digital signal A series of 1s and 0s is transmitted by sending it
through a channel of on and off EM pulses. Nodes in a network can communicate.
E.g. Digital data is encoded by a computer and decoded by another computer in a
LAN.
- Analogue data to digital signal The analogue wave is encoded to a series of 0s
and 1s through sampling with ADCs (sound cards, TV cards, scanners, cameras).

formation of data packets


- A packet is the unit of data that is routed on a network. The structure depends on
the type of packet it is and the protocol used. It has a header, a payload and a trailer

Routing
- Selecting paths in a network along which network traffic is sent. It is performed for
many kinds of networks and maintains no permanent link. This improves security
and is more efficient

encryption and decryption


error checking
(Already
covered)
- parity bit
check
- check sum
- cyclic redundancy check (CRC)
issues related to communication systems

security
Issue of the expanding internet

Globalization
Large companies can take advantage, moving forward, while smaller companies
may not be able to take advantage of this process.

changing nature of work


May result in isolation, and need for new skills

interpersonal relationships
Due to electronic communication, misunderstandings may arise.

e-crime

15

Information Processes and Technology- Trial Study Guide Georgia Wahib

Identity theft, phishing and spam

legal

Copyright and ownership issues


virtual communities
E.g. online dating sites, where there are major negative aspects

Core Topic : Information Systems & Databases


information systems
An iformation syste

the characteristics of an information system, namely:

the organisation of data into information


- Data must be organised before it can be stored and
analysed by the information system. Organising may
require sorting, summarising or classifying. Data in an
information system is organised into data structures using
such organisational methods as data dictionaries.

the analysing of information to give knowledge


- Knowledge from accessing information is the purpose of an
information system. The information must be analysed in
order for this to be achieved. Information systems provide
a range of tools for the analysis of data, such as tables,
queries and reports. People make decisions based on the
information they receive from an information system.
database information systems (examples)

school databases holding information on teachers, subjects, classrooms and


students
Environment: School community (students, staff, parents), authorities (BOS,
government), any organisation, business or individual that receives information
generated by the school or supplies data for the system.
Purpose: To maintain the efficient operation of the school, personnel, resources
and administration tasks. To provide information on student enrolments, subject
selections and assessments for both school staff and educational authorities.
Data/Information: Information on people and resources, library loans, staff
information, student and teacher timetables, student marks and grades.
Participants: Office staff, teachers and library staff who enter data
Information technology:
Hardware: Computers, barcode readers, scanners
Software: Operating system, spreadsheet and word processor applications,
database
Information processes: Cover the seven processes; collecting, organising,
analysing, storing and retrieving, processing, transmitting and receiving,
displaying.

the Roads and Traffic Authority holding information on automobiles and holders
of drivers licence
- Environment: New South Wales; vehicle owners, government (NSW department of
transport), police and courts.
- Purpose: To manage registration of all drivers and motor vehicles in NSW. To provide
information to drivers/applicants on matters such as licensing, vehicle registration, etc.
as well as statistical information to government and other authorities.
- Data/information: Drivers details (contact, payment, driving history, license
information), vehicle details (registration numbers, make of car, etc.)

16

Information Processes and Technology- Trial Study Guide Georgia Wahib

Participants: Data entry operators, administration staff at offices, police department


Information technology:
o Hardware: Computers, cameras, barcode scanners, networking between
computers
o Software: Operating system, database software
Information processes: Cover the seven processes; collecting, organising, analysing,
storing and retrieving, processing, transmitting and receiving, displaying.

video stores holding information on borrowers and video


Environment: Staff, customers around the area, suppliers, other chain stores, head
office.
Purpose: Allowing customers to hire videos for a period of time, keeping an accurate
record of rentals and stock.
Data/Information: Customer details, current loans and overdue items, rental records
(in stock/on loan), rental fees, video details, barcodes, receipts
Participants: Staff, head management
Information technology:
Hardware: Computers, barcode scanners

Software: Operating system, database software

Information processes: Cover the seven processes; collecting, organising, analysing,


storing and retrieving, processing, transmitting and receiving, displaying

Organisatio
nal Method
Manual

Computerbased

Advantages

Disadvantages

-Does not require a computer,


a power supply or batteries
-Highly portable, weighs very
little, fits inside a bag (mostly)
-No special skills/training
needed to use them
-Considerably faster
-Data does not have to be in a
set order
-Data management is much
easier
-Data can be easily
exchanged between
applications and over
networks

-Very inflexible layout


-Access is usually by one
method only
-Usually only one person can
access the data at any one
time
-Data can only be accessed if
you have a computer-less
portable
-Training is usually required
-Exchange of data with other
computers creates problems
of security and confidentiality

non-computer methods of organising including:

telephone books
- Subscribers surnames are sorted alphabetically. Searching for the persons name
retrieves their phone number

card based applications


- Library. Books card sort by book, author card sort by author, borrower card.

It is cheaper as it doesnt require computer hardware and software, Highly


portable, No specific skills or training required // Requires larger amounts of physical
storage space, One person only can access it at one time, Takes longer to organise,
analyse, manipulate and retrieve the data
computer based methods of organising, including:

flat-file systems

17

Information Processes and Technology- Trial Study Guide Georgia Wahib

organises data into a single table


and is suitable for many small
applications. Flat file databases
organise data using data structures
called files, records, fields, and
characters. Only allows you to use
and manage one database at a time.
A file is a block of data
A record is a collection of facts about one specific entry in a database
A field is a specific category of data in a database
A character is the smallest unit of data that people can use

database management systems


- is a software package that allows users to access a database so they can enter,
maintain and view the data. The data is independent from the DBMS. In a DBMS,
data is organised into tables, viewed in forms, retrieved using queries and displayed
in reports. A DBMS manipulates the data in many different ways, such as sorting and
searching. A DBMS allows you to simultaneously manage and use several separate
databases. It allows you to build relationships between the data in different
databases. A DBMS is the software package that makes the flat file and relational
databases.

Hypermedia
- A combination of media whose locations are linked electronically to provide an easy
way to navigate between the documents. It is used a lot on the internet.
Hypermedia-based data organising systems are not as simple to create as flat file
databases and generally have limited data processing capabilities. Hypertext is a
system that allows documents to be cross-linked in such a way that the user can
move from one document to another by clicking on a text link. The author of the
hypertext must specify the location of the information accessed by each link. If
another computer is the destination of the link, that computer is called a node
- Data is easily exchanged between applications and over network, much faster
processing, can be easily edited, large storage of data is possible, can be accessed
by many at one time if required // Expensive hardware and software have to be
purchased, vulnerable to viruses and hackers, staff need to be trained to use it
the logical organisation of flat-file databases, including:
A file is a block of data
A record is a collection of facts about one specific entry in a database
A field is a specific category of data in a database. A key field is a field
that uniquely identifies a specific record. Every record must use the same
field as its key field and no two key fields can contain identical data.
A character is the smallest unit of data that people can use

the logical organisation of relational databases, including:

Relational databases organise data using a serious of related tables. The


organisation of data in a relational database involves a schema

schemas (An organised plan of the entire database


showing how and where the data is found, descriptions of the
data and the datas logical relationships.) as consisting of:
- entities: a specific thing about which an information system
collects and processes data. In a database of students, each
student is an entity.
- attributes: a defined property of an entity. Attributes are the
columns in a relationship table shown in list view. It is a field
copied from a parent database.

18

Information Processes and Technology- Trial Study Guide Georgia Wahib

relationships: the way in which entities


are related to each other. The key field is
used to link entities.

one to one: each record in the first


entity is related to exactly one record
in the second entity. Eg. One primary
school teacher is assigned to one class

one to many: each record in the first


entity relates to many records in the
second entity. Eg. A high school
teacher is assigned to many classes.

many to many: Each record in the


first entity relates to many records in
the second entity, and each record in
the second entity is related to many records in the first entity. Eg. Each student
studies many subjects and many students study each subject.

tables as the implementation of


entities consisting of:
- Information about entities is displayed in a
table
- Attributes: A column of the table is the
attribute of the entity and represents the
field.
- Records: A row in the table is called a tuple of an entity and represents a record.
-

linking tables using primary and foreign keys


- Keys are fields that are used to sort and retrieve information. Usually, each key
holds a unique item that applies to only one record. When the records are sorted,
the key is used so that not all the data has
to be
read or retrieved.
- Primary Key: a field that stores data that
uniquely identifies the record. Usually an
ID number.
Primary key must be on the one side of
one>many, both sides of
one>one.

Secondary Key: a field that contains


useful items of data often
used in searches.
Unlike other keys, secondary keys are not always unique.
Foreign Key: an attribute which is the primary key for another table.
Foreign keys are copies of primary keys in another entity (table).
Single Key: a field in which each item of data is unique

create a schematic diagram for a scenario where the data is to be organised into a
relational database

19

Information Processes and Technology- Trial Study Guide Georgia Wahib

A schema shows the


organisational structure of a
database. It should show the
entities (the tables in the
database), and their
characteristics (i.e. their
properties/attributes/fields). It
should clearly identify the primary key in each table and the links and
relationships between tables.

choose and justify the most appropriate type of database, flat-file or relational, to organise
a given set of data

databases, including:

data dictionaries to describe the characteristics of data including:


- field name: the name of the field as it appears in the database. Should be carefully
selected to avoid confusion.
- data type. Includes;
Alphanumeric (Text)
Numeric (Numbers)
Boolean (T/F, Y/N)
Date data (dd/mm/yy)
Time data (hh/mm)
Calculation (Formula used)
- data format: any special formatting applied to the field. Shows how the data is to
be displayed. Eg. Number of decimal places, DD/MM/YYYY.
- field size: the number of characters allowed for a given field. The field size can be
used to determine the storage space required. If field sizes are kept to a reasonable
size, the database will work more efficiently.
- description: a simple description of field contents. It specifies the content of the
field.
- example: a typical field entry. It illustrates possible valid content.

schematic diagrams that show the relationships between entities


- Schematic diagrams are graphical tools that are used to describe the database and
help in the development of a relational database. They identify the entities and
show the relationships between them. They help to identify what data in excluded or
included from an entity.

normalising data to reduce data redundancy


Normalisation is the process of organising data into tables so that the results of
using the database are unambiguous and as intended. It is a refinement process
that aims to reduce data redundancy. Normalisation results in a database that is
more efficient but more complex because data is separated into more tables.
For example, Table 2.2 is used to
keep track of customer purchases
and the price of the products. If you
deleted a customer, you would also
delete a price. Normalising would
solve this problem by dividing this
table into two tables: a table about
each customer and a product they had bought and a table about each product
and its price. Making additions or deletions to either table would not affect the
other
The degree of normalisation has been defined in terms of forms, such as:
First Normal Form (1NF). Each filed in a table contains different
information. Eg separate name into first and last names. Basic level.

20

Information Processes and Technology- Trial Study Guide Georgia Wahib

Second Normal Form (2NF). No field values can be derived (got) from
another field. Eg if have DOB dont need year of birth.
Third Normal Form (3NF). Each non-keyfield should be a direct description
of the primary key field. You must place any fields that do not relate
directly to the primary key into another table. This will avoid the repetition
of data.

the logical organisation of hypermedia, including:

nodes and links


- A link, or hyperlink, is indicated by a highlighted
item (usually an underlined word or a graphic) that
allows the electronic connection. The author of the
hypertext must specify the location of the
information accessed by each link. If another
computer is the destination of the link, that
computer is called a node (a device in a network).

Hypermedia is a combination of
media whose locations are linked
electronically to provide an easy way
to navigate between the information.
Hypertext is a system that allows
documents to be cross-linked in such
a way that the user can move from
one document to another by clicking
on a link

uniform resource locators


is the address of the file or resource on the web. The main parts of the URL are the:
protocol
the transfer method used to access a particular resource on the
Web. It identifies the format and method of transmission to be
used. In most cases the protocol will be http:// (hypertext transfer
protocol).
Domain
address of the specific computer where the resource is located,
such as www.hi.com.au. It is the name for the website on the
Internet. The domain name can be replaced by the IP address.
file path
the full path to the file to be retrieved. It may be a simple filename,
or it may be a directory path, such as atlas/about.htm. The
domain name and the file path are separated by a forward slash (/).
metadata such as HTML tags
Hypertext markup language is a set of special
instructions (called tags) that indicate how parts of
a document on the Web will be displayed and
navigated. A HTML tag is an instruction in HTML.

storage and retrieval

tools for database storage and retrieval, including:

selecting data from a relational database using QBE and SQL


- Structured Query Language (SQL) is a programming language that uses a set of
common commands to extract information from databases. Commands include;
SELECT: The data to be
displayed
FROM: The source of the data
WHERE: The query
ORDER BY: The order in which
the results are to be displayed

21

Information Processes and Technology- Trial Study Guide Georgia Wahib

Query By Example (QBE)is a visual method


for specifying a query. Often search criteria
are entered into fields within what appears to
be an empty record. It lists the fields and
prompts and the operator enters the search
conditions. If the search of a database
involves two or more entities, it is called a
relational query.
- Relational Operators are characters or symbols indicating the relationship
QBE
between two expressions. Wildcard characters represent one or more unknown
characters. * represents any number of characters whereas a ? substitutes for
only one.
Type
Operator
Description
Example
Relation
>
Greater than
A>B
al
>=
Greater than or equal to
A >= B
<
Less than
A<B
<=
Less than or equal to
A <= B
=
Equal to
A=B
<>
Not equal to
A <> B
Contains
Expression contains criteria
ABB contains A
Does not
Expression does not contain
ABB does not
contain
criteria
contain A
Is blank
Data entry in field is empty
Surname is blank
Is not blank
Data entry is present in field
Surname is not
blank
Begins with
Data entry begins with criteria
Surname begins
with A
Ends with
Data entry ends with criteria
Surname ends
with A
-

Logical Operators are used to combine queries so that a search is carried out on
one ore more fields. AND requires both to be true, OR requires either the first or
second query to be true.
Logical
AND
Both expressions must be true
A AND B
OR
At least one expression must be
A OR B
true
NOT
All expressions must be false
A NOT B

other information processes for database information systems

displaying

reporting on relevant information held in a database


- A report is the formatted and organised presentation of data. Examples of reports
are mailing labels, invoices, sales summaries and telephone lists. A DBMS allows
complete control in the design of a report in either a tabular layout (displays data
with the fields extending across the page) or a column layout (displays data with the
fields going down the page).

constructing different views of a database for different purposes


- Different views of a database are obtained using a form. A form is used to view,
enter, and change data in a table. The layout of the form can be changed. The user
can position fields, headings, instructions and graphics on the form. A well-designed
form provides information explaining the required data and any rules that apply to
particular fields. Forms are used to display information for different purposes
design and create screens for interacting with selected parts of a database and justify
their appropriateness
- headings that identify the purpose of the report
- layouts, such as tabular or column, that efficiently present the information

22

Information Processes and Technology- Trial Study Guide Georgia Wahib

text that is balanced on the page either vertically or horizontally


styles that are consistent throughout the report and with its purpose
columns that have clear and descriptive headings
white space that is appropriately used to improve readability
page numbers and the date included in the header or footer.

issues related to information systems and databases

acknowledgment of data sources


Data is protected by copyright regardless of where it is obtained. Permission
must be sought before the information can be used in a publication. The
Copyright Act 2001 includes the replication and communication of all data types
(text, number, images, video and audio) including the Internet, websites and
written publications.
the Freedom of Information Act
allows individuals to find out what data is being kept on them in both
government and other organisations. However, there are some exemptions.
privacy principles
The collection of large amounts of data into centralised databases and the
sharing of data between databases raise important questions about how private
this information can remain secure. Pressure from external
organisations/individuals has forced most organisations to adopt various codes
of practice to protect the privacy of individuals whose data they hold. Codes of
practice may include:
There must be not information systems using personal data that are kept
secret from the public
People have the right to inspect and correct data concerning them that is
in ISs
Personal information must not be used for any other purpose other than
that for which it was collected (without prior consent)
Only authorised people with a genuine need should be able to access and
use any personal data.
quality of data
Accuracy of data is achieved by data validation which involves checking for data
entry errors. Data Verification involves checking data for accuracy and integrity
accuracy of data and the reliability of data sources
Every database will contain errors like incorrect addresses, incorrect birth dates.
Data can become incorrect or damaged.
current and emerging trends in the organisation, processing, storage and retrieval of data,
such as:
Data Warehousing
the collection and storage of large amounts of data from a range of
sources, in order to support the future decisions of management. This data
is often historic (business data from the previous years, for example) and
is organised into a data warehouse. A data warehouse is a large separate
combined copy of different databases used by an organisation. It includes
historical data, which is used to analyse the activities of the organisation.
Data Mining - the process of discovering non-obvious patterns within large
collections of data
This is a process of integrating large amounts of data, and by using
specialised software, attempts to find hidden patterns in warehouse data.
These previously unknown relationships among the data can be used to
guide decision making and predict future behaviour patterns for example,

23

Information Processes and Technology- Trial Study Guide Georgia Wahib

retail companies can find customers with common interests and habits,
thus increasing potential marketing strategies.
(Online Analytical Processing) OLAP
Online analytical processing is a technique for providing business decision
makers with statistical evidence, largely based on past trends, upon which
they can make intelligent decisions. OLAP aims to provide this critical
information visually, online, as needed and as quickly as possible. OLAP
tools organise and combine multiple databases into multidimensional
structures known as data cubes (however, it may have more than 3
dimensions).
(Online Transaction Processing) OLTP
Databases that allow transactions to be processed immediately by remote
users are known as online transaction processing systems. Completing an
online purchase over the Internet is a common example of a transaction
performed by an OLTP system. Such transactions must occur in close to
real time. OLTP commonly involves many different database systems
communicating to complete a single transaction. E.g. Internet purchase
involves about 2 banks plus maybe PayPal as well as the sellers system.
Many OLTP systems include transaction monitoring software, whose
central task is to direct, manage and control operation as they are
performed by the various systems involved in each transaction.

Option Topic : Transaction Processing Systems


characteristics of transaction processing systems

a transaction
a series of events important to an organisation that involve a request, an
acknowledgement, an action and an outcome
Either complete success or complete failure (leading to rollback)
Ensure events occur successfully events send response to show success or
failure to determine whether to commit or rollback. The events then send
acknowledgement of performing request

the components of a transaction processing system, including:

purpose
- An information system that collects, stores, modifies & retrieves the transactions of
organisations

data
- The type of data (stock numbers, prince in currency, PIN) and the range of
acceptable data input for normal transactions.
- Stored in DBs & transformed into info through info processes. Possible integrity issue
resolved by transaction log. Additional data used to record details of each
transaction

information technology
- Hardware (such as server machines, storage & communication devices, transmission
media, backup devices, client apps and collection devices) and software (DBMS
software (& log), client apps (interface for participants in client-server network),
proprietary software apps, transaction processing monitors) need to work together
to be both reliable and accurate.

Processes
- Determined as either batch or real-time, a range of processes may be performed on
the data (stock control, register cash total etc.)

Participants
- People who perform the transaction processing within the business (those who
restock shelves, checkout).

24

Information Processes and Technology- Trial Study Guide Georgia Wahib

batch transaction processing the collection and storage of data for processing
at a scheduled time or when there is sufficient data
Involves the collection and storage of data (such as
the details associate with a person buying a
toaster from a store) for processing at a scheduled
time or when sufficient data has accumulated.
Many TPS operate as batch systems, since
immune processing is either not feasible or simply
not required.

real time transaction processing the immediate processing of data


Involves the processing of the data
immediately after the event occurs and the
online database is updated straight away.
Many TPSs operate in real-time, since they
require interaction between the user and the people from the environment.

the significance of data validation in transaction processing


Data validation is used to check the entry of
Data Validation
data. A well-designed TPS checks each
A check, at the time of data collection,
transaction for easily detectable errors, such as
to ensure the data is reasonable and
missing data, data values that are obviously too
meets certain criteria
high or too low, data values that are
inconsistent with other data in the database,
Data Verification
and data in the wrong format.

Data verification is used to maintain the


integrity of data over time. If a customer moves
address, the change must be reflected in the
data.

A check to ensure the data collected and


stored matches and continues to match
the source of the data

the historical significance of transaction processing as the first type of


information systems
Transaction processing was the first type of information system. TPSs were first
used in 1951 when the electronic computer became available for business use.
The first commercially available electronic computer was called UNIVAC
(Universal Automatic Computer) in 1951. It was designed by John Presper Eckert
and John William Mauchly. The first UNIVAC was delivered to the U.S. Bureau of
Census. It could process both numerical and alphabetical calculations with ease.
UNIVAC was used by organisations to batch process business transactions, such

25

Information Processes and Technology- Trial Study Guide Georgia Wahib

as paying employees and recording customer purchases and payments. These


initial applications of a TPS are still important today.
Summary: 1st one was UNIVAC in 1951 by John Presper Eckert and John William
Mauchly. It was used by organisations to batch process transactions (e.g.
recording customer purchases). These initial functions are still important today.
types of transaction processing systems

web-based
Reservation systems
These are used in many businesses to put
aside a service or product for a customer.
The process is as follows;
1. Collect and store details of required
service
2. Confirm availability of service and
temporarily reserve service
3. Collect and store customer details
4. Collect payment details as required
5. Process and store payment as required
6. If successful then commit reservation
permanently
7. Create and display confirmation to a customer.

non web-based
Point of Sales
POS terminals are used by retail stores to sell goods
and services. In large retail organisations, POS
terminals send inventory data to a
central computer when the sale is
made. The central computer is
usually a mainframe or mid-range
computer that does the processing
for the entire chain. If the POS
terminal immediately processes the
transaction data, it minimises the costs of batch handling. To accomplish
this centralised processing of the transaction data, the data is converted
to a form that can be easily transmitted through a communication system.

Library Loans

A library loan system is used to keep track of items borrowed from the library. When a person
borrows a book, the librarian scans the barcode on the persons member-ship card and the
barcode on the book. This information and the date are immediately recorded on the library
database. The library loan system completes each transaction in real time.

on-line real time


batch

26

Information Processes and Technology- Trial Study Guide Georgia Wahib

The generation of bills


Organisations create a bill, or invoice, for
goods or services that have been supplied
to a customer. They usually generate a
group of bills at a scheduled time. This
enables the user to effectively manage his
or her time and results in less disruption to
the main database. Bill generation is not
done immediately but as a group.
Cheque clearance
A cheque is a written order asking the bank to pay a certain amount of
money to a particular person. When a cheque is issued to a person, he or
she deposits it into a bank account. However, the money cannot be
withdrawn until the cheque has been cleared. Cheque clearance involves
checking that the person who wrote the cheque has enough money in his
or her account to cover the cheque. It usually takes three working days.
The cheques are cleared as a group during the banks quiet period of the
day. Cheque clearance involves batch processing.

systems that appear real time, responding as the transactions occur, but where
the actual updating is batch processed, such as credit card transactions
Credit card transactions (real time)
Done at EFTPOS terminals. The retailer sends the credit slips to the bank in
a group and does not send each credit slip individually. Similarly, the POS
credit card sales transactions are not processed immediately but are
stored for later processing. In either case, credit card sales transactions
are processed as a batch.
All credit card transactions involve at least 4 significant parties;
Customers who are card holders, merchants who are generally retailers,
card issuers who manage the customer side of transactions and
acquirers who manage the merchant side of transactions.
General sequence of events that occurs to process credit card
transactions.
1. Customer gives merchant permission to access credit in their
account to pay for goods or services. For card present transactions
handing over the card and signing verify that permission has been
given. For card not present transactions, such as telephone and
mail order, the verbal or written order are sufficient verification

27

Information Processes and Technology- Trial Study Guide Georgia Wahib

2. Merchant creates and transmits transaction details either


manually or electronically to their acquirer. This can occur
via EFTPOS terminal, manually by written voucher or over
the Internet via a payment gateway.
3. The acquirer receives the transaction and determines the
card issuer. The transaction details are then forwarded
electronically to the card issuer.
4. The card issuer checks the customer has sufficient credit
remaining to cover the transaction and reserves these
funds. An authorization code is sent back to the acquirer.
5. The acquirer receives the authorization code and
electronically forwards it back to the merchant. On
EFTPOS terminals the word APPROVED is commonly
displayed. For manual transactions, approval is given over
the phone.
6. Merchant receives approval message generates a receipt
and hands it to the customer. If customer is present, then
they first sign the merchants copy of the receipt and the
merchant verifies the signature against the signature on
the card. The receipt includes a unique number that
identifies the transaction within the merchant, acquirer
and issuers systems.
7. The card issuer transfers the funds out of their account
and forwards he funds to the acquirer. Often many
transactions re batch processed together hence and
single large transfer takes place together with details of individual
transactions.
8. The acquirer deposits the value of each of their merchants
transactions into each merchants account. In most cases this occurs
each evening to finalize the days transactions.

storing and retrieving in transaction processing systems

storage of digital data in databases and files


TPSs need to have reliable backup and recovery measure so as to reduce the
possibility of data loss or corruption due to:
System Failure
Human Error
Hardware Failure
Incorrect Data
Program Errors
Computer viruses
Natural disasters

retrieval of stored data to conduct further transaction processing such as


printing invoices

systems to store paper records of transactions


Document Imaging
Documents scanned and saved as images
Cannot be searched
Cannot be edited
Identical to original but in digital form
Saves storage space

28

Information Processes and Technology- Trial Study Guide Georgia Wahib

Separate indexing systems are required to access the scanned documents


as searches cannot be done on the text contained in them
Optical Character Recognition (OCR)
Pages containing text are scannes and saved as image files
Character recognition software then processes the images to identify the
different shapes of all the characters
When a character is recognized, it is held in a document file
This file can be opened by a word processing applications
Electronic Documents
Widely used
Supports hyperlinks

data backup and recovery, including:

grandfather, father, son


- Grandfather, father, son is a traditional system of
backups
that stores the latest backup and the two previous ones.
Each time a new backup is made it becomes the son, and
the previous
Son becomes the Father and the previous Father becomes
the
Grandfather and the previous Grandfather is either
archived or recycled.

off-site storage
- Offsite refers to a location which is physically separated from the
main
system, and hence, off-site storage is storage of data on magnetic disks or
Removable hard disks at an Employee house etc.

secure on-site storage


- On-site refers to a location is that is physically close to the system and is, therefore,
secure.
- On-site storage refers to the storage of data through the use of hard disks etc.
- Secure on-site storage provides faster access to the backup data but requires extra
precaution and is riskier than off site storage.

full and partial backups


- A Full Backup involves copying all files. It is usually done weekly or monthly
- A Partial Backup involves copying files that have been created or changed since
the last backup, which reduces the backup time tremendously and therefore can be
done daily.
- Partial backups are broken up into;
Differential: All the files that have changed since the last full backup
Incremental: All the files that have changed since the last full or partial
backup

recovery testing
Recovery testing is the process of testing a backup after is has been made by
restoring files into a temporary directory

29

Information Processes and Technology- Trial Study Guide Georgia Wahib

Backward recovery undoes unwanted changes. If a system fails in the middle of


processing a transaction, it removes all evidence of the transaction.
Forwards recovery recreates lost data by using a transaction log containing
backup records including some of the lost processing information.
suitable media
Examples of storage media include;
Floppy disk
Magnetic disks
CDs
DVDs
Hard disks
Zip disks
Magnetic tape
Its slow and sequential but it is inexpensive and often used for
backups
specialised backup software
Specialised backup software provides considerable control over the backup and
restoration processes by;
Combining full and partial backup procedures
Providing backups of selected files
Selecting files for backup by date/size/type
Providing optimal compression
Providing unattended backup
Scheduling backups, encrypting backups and logging backups
transaction logs
It records all the essential data for each transaction, such as data values, time of
transaction and terminal number
documenting backup and recovery procedures
Various backup media used to maintain many backup copies made at different times
so systems data can recover to different past states. Personnel responsible must
document when, what & how of backup & storage media used, verification & storage
location.

Mirroring
Writing data to two drives simultaneously (100% redundancy) & allows for fast
recovery (hot swapping). Fault tolerance, but doesnt protect from total system
failure

Rollback
- A roll back is the process of converting the current system back to its old system, or
going from a son backup and loading a father.
updating in batch systems (no considerable user interaction):

historical significance
- Paper record systems were collected in batch and transactions were updated on a
fixed basis.
- When punched cards/tape was only available, updating was considerably timely and
expensive

limitations of batch processing


- Usually time-consuming due to use of sequential storage

technology required
- Hardware includes large storage capacity media (must be sequential)
- Software does not have to allow for online work or a simple user interface as only
well trained and experienced participants use it.

steps in a batch update


- In batch updating:
1. The data is first collected, and sorted then stored into a transaction file.
2. Once there is enough in the transaction file, the batch is run.
3. The master file is updated with the new transactions.

30

Information Processes and Technology- Trial Study Guide Georgia Wahib

suitable applications
- Paper-based collection, off-line systems, bulk generation
updating in on-line real time systems:

relevance and impact


- immediate update of data (current), record locking required, immediate feedback if
error, multiple users simultaneously process transactions

technology required
- Hardware includes large storage capacity media (must be direct access so response
time is very quick
- Software must enable online work for multiple simultaneous use (provide access to
an online database)
- Software must include a user friendly interface as many participants will use it

hardware requirements large secondary storage


- Fast communication links, fast processor, direct access storage devices, client-server
system, user friendly interface and input hardware (barcode scanner, ATMs, EFTPOS
terminals, PCs)

software requirements (on-line database) with user friendly interface


- software to enable simultaneous transactions and real time validation

steps in on-line real time processing


- In real-time updating:
1. The data is entered and processes immediately.
2. The transaction is then sent to the transaction file.
3. At the same time, the data is also sent to the master file.

suitable applications
- high demand for TP as hardware & software expensive, on-line & web-based apps

other information processes in transaction processing systems

collecting in transaction processing:


hardware, including:
- Automatic Teller Machines (ATM)
o An ATM is a banking terminal for common transactions
- barcode readers
o Barcode readers are used in retail industries to collected product
information and point of sale
o The reflected light off the barcode lines identifies the product.
- Radio Frequency Identification (RFID) tags
o RFID tags uniquely identify resources.
o RFID readers transmit frequency specific to antenna of passive RFID tags
to power it.
o Tag responds by transmitting stored ID back to reader.

collection from forms


- A form is a document used to collect data from a person
- Paper Form - Written on to provide data and then processed
- Onscreen Form - Usually completed for data entry to populate DBs
- Web Form - For users wanting to purchase products off the internet

screen design for on-line data collection


- Drop down menus, radio buttons, command buttons, check boxes
- Use of colour, alignment, white space, images etc

web forms for transaction processing (real time and batch)


- validate data in DL page if possible (reduce data transferred. Feedback)
- design so transmission of data needed for validation occurs prior next form
(submit)
- software tech works properly
- security of personal info (encryption, SSL)
issues related to transaction processing systems
changing nature of work and the effect on participants, including:

31

Information Processes and Technology- Trial Study Guide Georgia Wahib

the automation of jobs once performed by clerks


Automation of jobs refers to the use of information technology to perform tasks once
done by people
- Workers are required to learn new skills and complete ongoing training or face being
replaced by a more skilled worker
- This can either result in extra stress on workers or increased happiness
- Information systems can expand the scope and significance of a users job or they
can reduce it (affects meaning of work)

shifting of workload from clerks to members of the public


- TPSs allow every user with access to a terminal to enter and retrieve data, which is
what a clerk would have done
the need for alternative procedures to deal with transactions when the TPS is
not available
Blackouts or breakdowns can completely disable some TPSs and businesses must
plan for such times.
Non-computer procedures must be in place, and these must have been checked
and tested
the importance of data in transaction processing, including:

data security
- Data security protects a systems data against accidental or deliberate damage
Passwords and biometric methods (fingerprints etc)
Encryption
Firewalls

data integrity
Data integrity is the reliability of data, it involves accuracy, currency and relevance
of the data
In real time transaction processing, data integrity is achieved when the ACID test is
passed;
Atomicity occurs when all of the steps involved in a transaction are
completed successfully as a group. If any step fails, no other step should
be completed. If the first step succeeds, then the second step must
succeed; otherwise, the entire transaction is abandoned. If some
operations succeed and others fail, there is no atomicity
Consistency occurs when a transaction successfully transforms the
system and the database from one valid state to another. Consistency in a
TPS stems from the correct application programming, such as always
debiting and crediting the same amount.
Isolation occurs if a transaction is processed concurrently with other
transactions and still behaves as if it were the only transaction executing
the system. Transactions must not interfere with each others database
updates
Durability occurs if all the changes that a transaction makes to the
database become permanent when the transaction is committed.

data quality
How reliable & effective data is to an organisation.
Issues when survey not completed truthfully or trying to combine data from different
systems.
- Effectiveness of info in data mining & OLAP reduced
control in transaction processing and the implications it has for participants in
the system
Controlling transaction processing starts with collecting and includes the way the TPS
manipulates the data and the way errors are corrected.
People should not become completely dependent on a TPS. They need to maintain
control over their organisations operations

32

Information Processes and Technology- Trial Study Guide Georgia Wahib

Due to the immense volume of data errors are caused, and if no control measures
are taken these errors will be unnoticed and have dire effects on the transaction, the
transaction system and the organisation.
current and emerging trends in transaction processing
o Data Warehousing
the collection and storage of large amounts of data from a range of sources,
in order to support the future decisions of management. This data is often
historic (business data from the previous years, for example) and is organised
into a data warehouse. A data warehouse is a large separate combined copy
of different databases used by an organisation. It includes historical data,
which is used to analyse the activities of the organisation.
o Data Mining - the process of discovering non-obvious patterns within large
collections of data
This is a process of integrating large amounts of data, and by using
specialised software, attempts to find hidden patterns in warehouse data.
These previously unknown relationships among the data can be used to guide
decision making and predict future behaviour patterns for example, retail
companies can find customers with common interests and habits, thus
increasing potential marketing strategies.
o (Online Analytical Processing) OLAP
Online analytical processing is a technique for providing business decision
makers with statistical evidence, largely based on past trends, upon which
they can make intelligent decisions. OLAP aims to provide this critical
information visually, online, as needed and as quickly as possible. OLAP tools
organise and combine multiple databases into multidimensional structures
known as data cubes (however, it may have more than 3 dimensions).
o (Online Transaction Processing) OLTP
Databases that allow transactions to be processed immediately by remote
users are known as online transaction processing systems. Completing an
online purchase over the Internet is a common example of a transaction
performed by an OLTP system. Such transactions must occur in close to real
time. OLTP commonly involves many different database systems
communicating to complete a single transaction. E.g. Internet purchase
involves about 2 banks plus maybe PayPal as well as the sellers system.
Many OLTP systems include transaction monitoring software, whose central
task is to direct, manage and control operation as they are performed by the
various systems involved in each transaction.

33

Information Processes and Technology- Trial Study Guide Georgia Wahib

OPTION STRAND: MULTIMEDIA SYSTEMS


Characteristics of Multimedia Systems
multimedia systems information systems that include combinations of the
following media, including:
- text and numbers
a sequence of symbols that conveys a meaning. Alphanumeric
information, usually stored in ASCII form.
- audio
digital reproduction of sound, usually stored in analog or digital format.
- images
Pictures such as photographs, paintings or drawings. A pixel, or picture
element is the smallest part of the screen that can be controlled by the
computer. Total number of pixels is called a resolution. There are 2 types
of images:
Bit-mapped graphics treat each pixel on the screen individually and
represent this by bits in memory.
Vector graphics are made up of objects, such as straight line, a
curve, or a shape.
- animation
movement of a graphic. It is the result of still images, or frames,
presented in rapid succession. Each frame used in an animation sequence
is called a cell. Animated GIF and Quicktime are the common formats.
- video
a data type utilised in multimedia presentation, consisting of an
animation sequence and its associated sound. Usually stored as .mp3 or
Quicktime file.
- hyperlinks
Hypertext allows the user to navigate through the multimedia product by
cross-linking pages, allowing non-linear movement from one document to
another.
A hyperlink is the highlighted item that allows electronic connection;
providing interactivity
the differences between print and multimedia, including:
- different modes of display
Print media is limited to hard copy, such as books, newspapers,
magazines and posters. However, multimedia can be implemented for
computer use, wireless handheld devices, PC/TV combinations and a host
of other diverse applications.
- interactivity and involvement of participants in multimedia systems
Interactivity means that the user is able to make an immediate response
to what is happening and modify the processes. Effectively, there is a
dialogue between the user and the computer or communications device
and the data access and transfer can be non-linear.
- ease of distribution
Multimedia can be distributed in a large range of ways, including CDs,
DVDs, Internet downloads and purchases, as well as the created and use
of customer profiles where suggestions can be made for other likely
preferred multimedia titles.
- authority of document

34

Information Processes and Technology- Trial Study Guide Georgia Wahib

books or other printed media normally bring with them the authority and
credibility of the author, thus a well-known and credentialed author will
generally produce authoritative and accepted documents. However, a
multimedia work will often have a number of contributors, may not have
an editor to supervisor, thus no single author will engender the same
degree of authority over the work
the demands placed on hardware by multimedia systems, including:
- primary and secondary storage requirements as a result of
bit depth and the representation of colour
Bit
Num Relations
data
Dep ber
hip
Increased bit depth will improve
th
Of
colour and image quality at the
Tones
expense of increased storage
1
2
21 = 2
requirements
sampling rates of audio data
2
4
22 = 4
3File Size
8 (Image)
23 = 8
Increased sampling rates will
Horizontal*Vertical*Bit Depth
improve audio quality at the
expense of increased storage
8*1024 (1kb)
requirements
e.g.
- processing as a result of:
600*400*1
= 31.25kb
video data and frame rates
8*1024
Higher frame rates will improve
video quality at the expense of
increased processing power
File Size (Audio)
requirements
(SampleRate* SampleSize*Time)*2
File size is calculated by multiplying
e.g.
the frame rate by the time in
(44000*16*180)*2
seconds, then multiplying that
= 254 016 000 bits
value by the #le size of each frame
= 31 752 000 bytes (divide by 8)
image processing, including morphing
= 30.28 Mb (divide by 1 Mil)
and distorting
Image processing can adjust images to suit a certain need but will
require significant processing power to do so
animation processing, including tweening
Animation processing can create animated video but will require
significant processing power to do so
Tweening will require even more power, as it is a more advanced
method that will place more stress on processing
- display devices as a result of:
pixels and resolution
Display devices with a sufficient pixel resolution are required to
view images and video correctly and in high quality
the variety of fields of expertise required in the development of multimedia
applications, including:
- content providers
people who provide the material for the multimedia product
- system designers and project managers
System designers
Identify purpose of the system, decide feasibility, determine
hardware and software and overall design
Leadership skills needed
Project managers
Develop the project plan and ensure it is followed on time and on
budget
Communication and negotiation skills needed

35

Information Processes and Technology- Trial Study Guide Georgia Wahib

those skilled in the collection and editing of each of the media types
Text writers selected on ability and knowledge of subject matter
Graphics illustrators and animators who use software to create figures
Audio need technical skills to mix different digital audio clips and
creativity to create sound effects
Video camera operator, sound engineer, actors and director (who
approves set design, costumes, camera angles, lighting, editing)
those skilled in design and layout
Graphic designers improve the readability of multimedia by organising
layout of screen, adjusting colour and size.
those with technical skills to support the use of the information technology being
used
Ensure the final system will operate correctly on user screens
Tasks include;
Limiting the size of the multimedia product to the total size of CDROM
Coding of interactive elements of presentation
Copy protection and product registration to reduce likelihood of
illegal copies being made

Examples of Multimedia Systems


the major areas of multimedia use, including:
- education and training
Multimedia better maintains a users interest
Computer based training - a type of multimedia product used for
education and training
The interactive nature of multimedia makes it an effective educational
tool
- leisure and entertainment
Games;
Online allows many plays to enter a virtual simulated world hosted
on a powerful server
Simulation games mimic real situations through quality animation
- information provision, such as information kiosk
Information Kiosks Touchscreen and secured PC so users can make
selections to filter content e.g. in shopping malls as a directory to provide
location and information about each store.
- virtual reality and simulators such as flight simulators
Virtual reality is the use of computer modelling and simulation to enable a
person to interact with an artificial environment
An example would be flight simulators which are used to train airline
pilots
- combined areas such as educational games
System must be built to accommodate for people with low IT skills
Should restrain from textual information as it is required to find a middle
ground between education and entertainment
advances in technology which are influencing multimedia development, such
as:
- increased storage capacity allowing multimedia products to be stored at high
resolutions
multimedia can be stored with ease and at high resolutions (e.g. DVDs
with more realistic images high definition)
- improved bandwidth allowing transmission of higher quality multimedia
Media is able to be transferred at increasingly fast speeds as internet
bandwidth (speeds) increase
- improved resolution of capturing devices

36

Information Processes and Technology- Trial Study Guide Georgia Wahib

such as digital cameras and camcorders (better quality images and video
capturing)
- increases in processing power of CPUs
Increased CPU processing power allows media to be rendered more
quickly and allows for viewing of higher quality media
- improved resolution of displays
so displays are more realistic and of higher quality
- new codecs for handling compression of media while improving quality.
New codecs decrease file sizes through compression of media and provide
a lower level of data loss in doing so, maintaining or increasing the quality
of the media output
Displaying In Multimedia Systems
hardware for creating and displaying multimedia
- screens including;
CRT (Cathode Ray Tubes) displays
Beam of electrons glow on phosphor coated screen to create image
In decline because of new screens that are lighter in weight, use
less desk space and have higher resolution
LCD (Liquid Crystal Display) displays
Electric current changes position of liquid crystals, creating the
image
Plasma displays
Heated gases emit U.V. light which glows on phosphor coated
screen to create image
Used for large advertising displays and home theatre
Touch screens
Sensor panel detects electrical disturbances to determine where
touch occurred
Used in ATMs, game consoles, tablet PC, information kiosk
Good for public areas mouse and keyboard not damaged
LCD screens can be converted into touch screens
- digital projection devices
Halogen light globe projects image onto screen
Either through a transparent image and then a lens (used in
homes)
Or reflects light of a smaller image and then lens (cinemas)
- speakers, sound systems
Analog device converting alternating current into sound waves (electrical
to sound)
The electromagnet vibrates rapidly back-and-forth, in turn making the
speaker cone vibrate, compressing the air, creating sound waves
- CD, DVD and video tape players
Stores digital data on spiral track composed of pits and lands
CDs have a single track; DVDs have more densely packed tracks
Read head generates laser beam which is reflected as fluctuations from
the pits on the spinning disk. A sensor translates this into an electrical
signal, representing the stored sequence of bits.
DVDs can be double sided and dual layered = large storage capacity =
ideal for distributing multimedia
Quality of CD and DVD data is maintained after copying
Video Tape Players stores analog data on long strip of magnetic tape
wound on reels. Quality reduces after copying
- Head-up displays and head-sets

37

Information Processes and Technology- Trial Study Guide Georgia Wahib

HUD (heads up displays) and headset is visual display in the form of


glasses where the user sees everything projected in 3D or they can be
little projectors which reflect their light onto glass
software for creating and displaying multimedia
- presentation software
A presentation consists of a series of slides which may contain text,
graphics, animation, audio and video
MS PowerPoint, Apple iWork Keynote, OpenOffice Impress
- software for video processing
Allows video to be captured, imported and edited (special effects, text
overlays, transitions, cut and paste, etc.)
Compresses the original video source to a more efficient file size
Adobe Premiere, Windows Movie Maker, Corel VideoStudio
- authoring software
create a multimedia production which incorporates several different types
of media elements
Articulate Quizmaker, NeoSoft NeoBook, Adobe Flash CS4
- animation software
Create, edit and publish 2D and 3D animations
CoffeeCup GIF Animator, Toon Boom Studio, Xara3D
- web browsers and HTML editors
Web Browsers allow users to navigate and explore the web by viewing
HTML documents and using search engines
HTML editors;
Create and edit HTML files
Notepad, Adobe Dreamweaver, MS FrontPage

Other Information Processes in Multimedia Systems


processing:
- the integration of text and/or number, audio, image and/or video
Multimedia software is used to integrate text, number, image, animation,
audio and video data.
- compression and decompression of audio, video and images
Lossy or lossless compression
Uses CODECs (Compression Decompression) to reduce file sizes
Quality may be reduced with lossy compression
Processing (decompressing) may take longer with lossless compression
- hypermedia the linking of different media to one another
Hypermedia: The linking of data typeso Eg. The user clicks a link that opens a
popup with a video
Hypertext is text that links to other media such as web pages or screens
organising presentations using different storyboard layouts, including:
- linear
Sequentially Organised
-

Hierarchical
Top-down design that categorises pages
non-linear
Allows users to connect from the homepage to a series of linked
pages which then further connect to a number of
other pages
a combination of these
Combines aspects of two or more common types of
structures

38

Information Processes and Technology- Trial Study Guide Georgia Wahib

storing and retrieving:


- the different file formats used to store different types of data
JPEG, GIF, PNG and BMP for images
BMP Bitmap
JPEG Joint Photographic Experts Group
GIF Graphics Interchange Format
PNG Portable Network Graphics
MPG, Quicktime, AVI and WMV for video and animations
AVI Audio Video Interleave
MPEG Moving Picture Experts Group Video
FLV Flash Video
Quicktime
WMV Windows Media Video
MP3, Wav, WMA and MID for audio
MP3 MPEG3 Layered Audio
WAV WAVE Audio
WMA Windows Media Audio
MIDI Musical Instrument Digital Interface
SWF for animations
SWF Small Web Format
- compression and decompression
Compression is used to lower file sizes while stored
Lossy or lossless compression makes a difference in the amount of
space that will be taken up by the
file (lossy less space used, lossless more space used)
Decompression is required to bring the files to a computer readable state
collecting:
- text and numbers in digital format
ASCII characters are inputted as a series of 1s and 0s through a
keyboard
- audio, video and images in analog format
Lights
Photocells
Record
- methods for digitising analog data.
Analog audio through a microphone
Analog video through a video camera or film scanner
Analog image through an optical scanner or a camera
Issues Relating To Multimedia Systems
copyright: the acknowledgment of source data and the ease with which digital data
can be modified
- All works which are not the intellectual property of the author should be cited and
referenced to the original source
- Data can be very easily copied and modified and it must be made sure that such
procedures are allowed within the customers rights to use the software
appropriate use of the Internet and the widespread application of new developments
- The freedom that is given to users on the Internet is incredibly vast but must be
used for the correct purposes
Illegal activity, such as piracy, child pornography and the selling of illegal
substances and objects are still illegal on the Internet

39

Information Processes and Technology- Trial Study Guide Georgia Wahib

The development of technology has allowed the internet to become a source of


information as well as an area for development of new features
The internet is now host to cloud storage, online applications and much
more o It has developed to include new functionality
the merging of radio, television, communications and the Internet with the increase
and improvements in digitisation
- The merging of these services allows greater access for individuals
VoIP allows users with internet access to have a phone service even
though they may not have a phone line
Streaming and Video on Demand allows access to television or radio
broadcasts via the internet
the integrity of the original source data in educational and other multimedia systems
- Content derived from variety of sources makes it difficult to test accuracy
- Data integrity is a measure of how correctly and accurately data achieves its
purpose
- If education is the aim, then accuracy of data is vital
Integrity is judged on completeness of info and how well it matches other
sources
- If information is the aim (e.g. multimedia kiosk), then integrity judged by ease of use
and honesty
Accuracy is important, but no need to check with other sources
- If the aim is entertainment, integrity is judged by speed, reliability, variety
The entertainment product must remain enjoyable
- If the aim is training simulation/VR, integrity is judged by how closely presentation
matches reality
The simulation must give realistic experience or it is of little value
current and emerging trends in multimedia systems, such as;
- virtual worlds
Virtual Augmented Reality (Google Glasses)

40

You might also like