Professional Documents
Culture Documents
1-Give advantages of using sensors rather than entering the data manually.
3- Identify the risks to the data stored on a computer when connected to the internet
and for each give the actions that can be taken to reduce the risk.
Risk Action
Hackers Firewall
Passwords
Encryption
Install operating system security updates
Change default settings on routers
Identity theft / Anti-Adware / spyware / phishing
phishing / Dont reply to suspicious emails
spyware
Viruses Install anti-virus software
Update regularly
Treat unknown files / email attachments
with caution
Use a browser add-on to block known
attack sites
Benefit Explanation
Wired generally Better performance when
faster/bigger playing games
bandwidth than
wireless
Wired more Less risk of interference (from
reliable/stable other devices)
Wired not affected by Can be further away from the
walls etc. router
Wired simple to Very easy for beginners to set
configure up
5-Identify the advantages of buying clothes online rather than visiting a shop.
No need to leave home / travel to shops / take children shopping
No queuing
Online discounts / special offers / lower overheads passed to customers
Available 24/7
Know instantly if in stock
Immediate confirmation
Comparing prices with other retailers
Wider range of retailers/stock available
Ability to search for items
6-Identify the disadvantages of buying childrens clothes online rather than visiting a
shop.
7- Give facilities that could be provided on the website to help potential customers.
For each facility, give an advantage to the company and an advantage to the customer.
8-When a product is ordered online the customers data is kept in a database. What are
the legal impacts on the website?
Students:
can collect homework
can submit homework
Notice boards
Administration e.g. absence recording, pupils marks
Teachers:
Central area for accessing student data
Notice boards
Central area for administration documents
Central area for educational information
Can post homework for students
When researching:
Should consider that not all information found on the internet is accurate
Check the reliability and validity of the author / use reliable websites
Compare information from several sources
Use websites recommended by teachers / other reliable people / trusted organizations
Recognize that some information may be biased
Consider relevance of the information provided
13-Identify the positive effects on organizations resulting from the widespread use of
ICT.
14-Identify the negative effect on organizations resulting from the widespread use of
ICT.
15-ICT has also impacted on society. One effect is a widening gap between
Information rich and information poor societies.
Discuss the factors that have contributed to this widening gap
16-Identify the device that can be used for both input and visual output
B! j2D? F 8a
Password 6 characters min length
Includes upper/lower case
Includes symbols/punctuation
Includes letters and numbers
Word not related to user / random (mix of characters)
Includes spaces
19- State the ways in which access rights impact upon the user.
23-Identify the precautions that should be taken to help stay safe on the internet.
Dont give out personal information, unless you are sure of the recipient
Use copy lists with care
Use social networking sites with care
Make use of privacy settings (public/private) / use block lists / filters
Dont post pictures/text detailing your location
Dont link to friends of friends.
Be careful about arranging physical meetings
Downloading:
Entire video must be saved on users computer system initially
Often very large files
Need large storage
Can view whenever user wants
Can keep the files for as long as they want
May be able to edit
Dont need to have internet access once saved
Streaming:
Dont have to store the files on computer
Can start watching as soon as streaming begins
Must view when being streamed
Need internet access
Rely on good signal
Quality may be affected by buffering
Control software
Install a firewall: A shield that will prevent hackers / prevents the network being 'seen'
Accessing data from outside the network / Access via the internet
27- Stored data are vulnerable. Define the risks and actions regarding it.
Risk Method
Anti-virus software / antimalware
Virus / malware Treat unknown files / email
attachments with caution
Backup
Accidental deletion / Access rights
accidental damage / Password on files
accidental corruption Read only files
File recovery software
Backup
Malicious damage Access rights
Password on files
Physical problems
Backup
E.g. fire, flood
Hardware or software
malfunction (must be Backup
specific item)
Teachers job changed due to new methods, e.g. availability of information requiring
facilitation of learning
CAL / Learning platforms / use of VLE
Interactive white boards/ other new technology in classrooms
Management Information systems
32- Discuss the benefits and other drawbacks of the lack of internet regulation.
Benefits: All information is open to the world via the internet so any corruption done by
organization or authority can be easily found out and they cant hide it. When bad things
happen people can write blogs on the web, communicate with people who have the same
thoughts and take action and steps accordingly. People are open to share their opinion on
the internet and say what they feel, there is no restriction applied on their subject of
speech. They can express their mood with people and be open-minded with the world to
share their expressions.
Drawbacks: Information found on the internet is not reliable due to any regulation. Fake
and phishing sites have a tendency and chance to be established on the internet and
victimize other people. Inappropriate information is spread throughout the internet which
is prohibited for some countries but they are not being maintained. Anonymity in the
internet opens a road of communication between criminals and terrorists.
Easy to lose
Can easily transfer/pick up viruses
Corrupt if incorrectly disconnected
Item/product number
Item/product code
Item/product ID
Item/product reference
Country of origin
Product ID/info
Manufacture Id
Check digit
Barcode input> Information sent to database> Item found> Price identified> Price
displayed> Receipt printed
Reason Extension
Better encryption/ you can read a magnetic
More difficult to steal data from a chip
stripe on a tape reader/PIN is needed
Data can be more easily updated on a chip / Has built in processing power/ greater
updated during transaction memory/storage
More difficult to corrupt data/damage a Chip protected by plastic coating/ magnetic
chip stripe affected by stray fields/ scratches
44- How a network can be configured so that the files accessed can be maintained
according to users relevancy?
Suitable lighting
Wrist rests
Adjustable chairs/chairs with lumbar support/ergonomic furniture or chairs
Swiveling/adjustable screens
Screen glare shields
Foot rests
Ergonomic mouse
RCD/Residual current device
Posture:
Adjust chairs to suit them/ sit with correct posture
Adjust angle/height of monitor
Eye Strain:
Adjust brightness/contrast of screen
Adjust font/icon size
Regularly focus on distant objects
Position monitor to reduce reflection / adjust blinds to reduce reflection
Sit at a suitable distance from monitor
Attending regular eye examinations
47- What are the rights people have on Data Protection Act that a company regulates?
Employee Company
Is a security method
Prevents unauthorized access to the router/gateway/modem/ network / Wi-Fi connection
Key is used to encrypt data (during transmission across the network)
54- What factors should be considered before copying info from the internet?
55- What actions should be taken when using info from the internet?
CAL:
Learners working independently / at own pace / in own time / may be outside school
Use for reinforcement / drill and practice / instant feedback
Control technology:
Provides hands on experience / analysis of data
Simulations:
Safely carry out experiments / vary situations
VLE:
Access to materials
Upload work
Download assignments
Communication methods:
Emailing teachers
58- What facilities are used to make find a desired file easily?
59- Give the solutions to back-pain and RSI due to computer usage.
Backache:
- Ergonomic / adjustable furniture
- Adjust seat angle / height / Lumbar adjustment
- Foot / neck / back rests
- Correct posture in chair
RSI:
60-(a) Customers of a shopping website enters their info in an online form which is
automatically saved into the websites database. What is the benefit of this type of
data capture for the website?
60-(b) What are the benefits of the customers due to their info being saved?
Dont need to re-enter data (personal details)/ fewer data entry errors
Can take advantage of one click ordering
Can be sent offers/promotions
61- How a person can track the delivery route of their online ordered product?
They use the order number of their transaction to view the route of delivery
62- How an online shopping site could use the data of their customers transaction log?
Technical problems may occur / have to be able to connect reliably to the internet
Physical items cant readily be exchanged
Time differences may be an issue
Difficult to study body language / eye contact difficult
Team building / social interaction is more difficult
Concern:
May access inappropriate sites
May illegally download music / videos
May download malware
May meet unpleasant characters in chat rooms / be subject to cyber bullying May pass on
personal information
May become addicted to internet activity
Steps:
Use parental control software
Use antivirus software
Restrict / block access to sites via functionality of web browser / filter software / ISP /
blacklist
Password protect the administrative account
68- The use of computers and other digital devices has both positive and negative
effect on peoples lifestyle.
Discuss the positive and negative effects of digital devices on peoples lifestyles.
Positive Impact:
Technology is improving many aspects of everyday life e.g. communication must have
skills to benefit
Communication improves contact with family and friends
Can make friends with people from different backgrounds using chat rooms / SNS
Technology use linked to improvement in reading skills / hand eye coordination
Technology offers wider educational opportunities
Availability of valuable sources of information online e.g. health information / fitness
information / exercise techniques / government websites
Can work from home / changes in working patterns
Negative Impact:
Time spent on computer rather than socializing / leads to lack of social skills
Time spent on computer rather than exercising / could lead to health issues
Time spent on entertainment / games rather than doing homework / work
Health problems arising from using computers e.g. back problems / RSI
May lose sleep as technology takes over life / addictive / may lead to problems at work /
school
70- The network administrators of a community centre are concerned about the
security of data on the network.
Describe the concerns that the network administrators may have and identify steps
they can take to reduce the risks to the security of data.
Concerns:
- Unauthorized access to data e.g. hackers
- Accidental loss of data
- Malicious damage
- Virus infection
- Physical problems e.g. natural disaster
- Hardware malfunction
RAM ROM
RAM is volatile must be constantly refreshed ROM is permanent
/ lost when computer is switched off
RAM can be read and written to ROM is read only / only EPROM can be
erased
RAM is faster than ROM ROM is cheaper / Less expensive than RAM
RAM microchips are supplied as modules ROM microchips are installed in the
(several chips on a small board) plugged motherboard
into the motherboard
72- A message is displayed on the screen-Printer is out of paper. How this message
is generated.
The sensor in the printer detects there is no paper, then it sends signal to the OS, then OS
generates the message that is displayed on the screen.
74- How settings can be adjusted for the visually impaired ones
Screen resolution
Display settings / brightness
Font size / icon size
Use magnifier / zoom in
Use narrator / audio description
Speech recognition
Enlarged On-screen keyboard
Calibrate color / change color scheme
Adjust thickness of blinking cursor
Adjust thickness of focus rectangle
Adjust thickness of windows border
Mouse settings
75- How anti-virus works?
Compare files coming into the computer against known virus codes (signatures) / database
of virus files
Monitors programs for suspicious behavior
Quarantines / flags as dangerous
Scans computer / media for malicious files alerts user if issues identified
Save a file to a central location so all have access / can make changes
Use network messaging system to provide comments securely
Will have access to the same software version no compatibility issues
Can use collaboration / team-working software to maintain document honesty / control
multiple accesses
Can use version control / logging software to keep track of versions / changes
78- How checkboxes in a list can be used to search desired object quickly
80- Many students at the college have mobile devices such as smartphones or tablet
Computers. Some staff believe that using these devices enhances learning, others
disagree. Discuss the advantages and disadvantages of allowing students to use mobile
devices in the college.
Advantages
Will be able to use the device as a research tool / search internet.
Students can access the internet anywhere on the site / not necessarily restricted to a
classroom / not all rooms have computers.
Students can access the internet in their free time not just during lesson.
Can carry on using device at home.
May have office applications installed which can be used to make notes.
College may not have enough / many computers.
Data can be transferred to cloud storage.
Have friends as contacts so can share resources
Many education apps available to aid learning.
Can take advantage of QR codes on learning materials from published resources in college.
Disadvantages
May use device at an inappropriate time.
May use device for inappropriate actions.
82- Advantage of using design view in web designing rather than code view
86- Advantages of using digital reference books rather than hard copy books.
87- Advantage of computerized data logging rather than manual data logging.
Advantage
Human comfort / safety for employees cold / raining outside, spoil meal times,
unsociable hours, less dangerous, cannot work 24/7 etc.
More Accurate / more precise readings Reduced / no human error
Cheaper save on wages
Consistent time after time / day after day
Faster / Quicker
Disadvantage
Equipment failure - data logging equipment / transmitting of data / ICT equipment failure
Costs high initial set up cost / more expensive to buy equipment and set up
A series of digital media files. Often released episodically. Often downloaded through web
/ downloaded to a computer/mobile device to watch/listen to.
The ages of five people in a house are 73, 56, 47, 33, 12
More robust
Shock resistant
Portable
Thinner / lighter
Better quality
Less glare / reflection
Mesh Network
Topology
92- Why passwords should be changed regularly and why passwords must be entered
twice.
Someone who have known the password or seen to enter wont have access anymore
Twice input is needed to resolve data entry mistake and for verification
Hardware: Modem / ISDN (Integrated Services Digital Network) / Router / Modem cable /
WiFi / NIC.
Software: Communication software / Browser software / Driver software for hardware.
Receipt printer
Screen
Keypad
Weighing scales
Barcode reader
Card reader
Customer: Shorter queues / itemized bills / accurate bills / quicker data entry
Shops: Less crime / increased security
Automatic stock order
Up to date sales information/ buying patterns
Fewer staff; Fewer errors / more accurate
Quicker as the data is entered by sensors / reader
More profit as less time needed for large amount of customers
Easier to change product details
No need to price products
Input and output control; Error handling; Resource allocation; Providing a User Interface;
Allows user to command the computer; File handling
IP Address Format
IPv4 (Internet protocol version 4) is a 32-bit IP address grouped by 8 bits and represented in
decimal format known as dotted decimal notation. Each bit in the octet has a value, where
0 value 255.
Network Host
32 Bits
192 168 0 10
8 Bits each
103- What is the purpose of a server, router, wireless access point.
Hand-held scanner: Reads the image while being dragged over it.
Flatbed scanner: The image is laid flat on the scanners surface.
Sheet-fed scanner: Reads the image as the paper goes through the sheet feeder.
106- Difference between OCR Versus MICR.
It is affected by electromagnetic radiation and the data can be copied and edited.
Sensors are used to input environmental data such as light intensity, pressure and
temperature.
Each sensor detects only one type of data.
Sensors usually produce a low analogue voltage which must be converted to a digital signal
for the computer using an ADC.
Touch-tone telephone: It makes a different beep depending on the button pressed. On the
end of the line, a computer inputs the beep and determines which button has been
pressed.
Microphone is the basic means of audio input.
Voice recognition software enables the computer to know who is talking but not what has
been said.
Speech recognition is often used for voice command systems. The speaker is identified and
spoken words recognized as commands.
Natural language processing uses speech recognition to interpret natural language. It can
be used to dictate a letter or give instructions to computer.
Speech synthesis is when a computer reproduces a human speech. The voice is computer
generated, most likely by a text-reading program that reads aloud an electronic
document.
Ad: People speak to the computer and do not need to learn to operate the keyboard.
Dis: Voice and speech recognition software has to be trained to recognize each persons
speech. This can be lengthy process.
Voice and speech recognition is not accurate because people pronounce words differently.
112- Types of monitors and their description.
Visual Display Unit (VDUs) vary with different styles and resolution along with color and
quality.
(Picture element/ pixels are not same as screen dots, because some software packages
use pixels that are bigger than the resolution.
Graphics card are video/ display cards built into the system unit, it controls the signals
going to the monitor. High quality graphics card can produce clear graphics very quickly.
Cathode Ray Tube (CRT): They are bulky, heavy power consuming and gets heated up
quickly.
Liquid Crystal Display (LCD): They are flat and lighter than CRT. They are compact and
consume less power compared to CRT.
Plasma Display: They have clear graphics and bright output.
Electroluminescent Displays: They have potential to support very large flexible displays.
Touch Screen: It has two-way interface, so it can be used as both input and output device.
The touch screen is classified by two types:
The capacitive touch screen detects position of the skin touching it where the screen has
been discharged. The upper layer is made up of glass.
The resistive touch is made up of soft layer and they detect it by the changes in electric
charge when internal charged and conductive layers are pressed together. It works with
anything including skin.
Multimedia Projector: They are used to display image on a larger separate screen for view
of larger audience.
Interactive Whiteboard: They are large, touch-sensitive panels. Some use touch screen
technology but others use optical curtains which operates by detecting breaks in the
curtain.
Dot-matrix is an impact printer with print head that is a matrix of steel pins. The pins
strike a carbon ribbon making patterns of dot on the paper. (Monochrome)
Inkjet printers spray tiny dots of ink into the paper. They produce good quality output
and are quieter. (Monochrome and color)
Laser printers use laser light to make patterns on a drum. The drum transfers ink to the
paper and then the heating fuses the ink and paper together. They are more expensive
than inkjet with excellent quality and faster output. (Monochrome and color)
Thermal printers use heated wires to mark dots on the surface of a heat-sensitive paper.
Advantages of printers:
A printout is useful if no computer is available.
Disadvantages:
Printing is slow and expensive compared with electronic communications.
Paper is bulky and deteriorates in storage.
Printed materials are more difficult to access and distribute, e.g. digital photos can be
emailed and viewed on a multimedia projector .
A plotter draws lines on paper using colored pens. A flatbed/ roller bed plotter holds the
paper still while the pens move. Other plotters move the pens from left to right while the
paper moves forwards and backwards. An upright plotter uses very long sheets of paper.
Plotters are used in computer-aided design. Plotters are usually more expensive to buy
and slower than printers, but much larger sheets can be printed.
Many computers have speakers. Headphones are two small speakers built into a headset.
Sound is needed, for example, to play music and for speech synthesis (computer produces
human speech).
Sound cards
A sound card controls all input and output of audio. Audio input through a microphone
and output through speakers are usually analogue and the sound card handles their
conversion into digital signals processed by the computer. It also handles digital audio
input, e.g. from multimedia applications.
In control applications, computers make events happen using actuators, e.g. heaters and
motors. A buzzer is an actuator that, for example, warns when the microwave has cooked
our dinner. Actuators can perform physical tasks such as controlling a robot or operating a
digger. This can be dangerous for people if their presence is not detected by the
computer.
Bit (binary digit) patterns in memory and on backing storage represent, e.g. characters,
numbers, graphics and sounds. A byte stores 8 bits, each of which can be either 1 or 0.
Different computers access one, two, four or more bytes of data at a time. If a computer
can read/write four bytes at once, this is 32-bit computing.
Flash memory is a type of ROM that can be written to and read from and is used for the
BIOS (basic input/output system) in PCs. This makes sure the computer starts up as it
should and that all the parts of the computer work together.
A magnetic tape stores a great quantity of data but read/write is slow because it is serial
access the tape is read from the beginning to find the data needed. Magnetic tape
cartridges are often used for backup.
Applications software
Control software
Control software is used to monitor and control external devices, e.g. robots, and ICT
systems, for purposes such as air conditioning in large buildings. Computers do this using
sensors and actuators. Sensors are devices that can measure variables such as pressure,
temperature and humidity. Actuators make changes under the control of the computer
some examples are motors, pumps and heaters.
Educational software
A wide range of educational software supports teaching and learning, e.g. Star French
helps you learn French, and Spex Classic helps with teaching design and technology
Narrowband users dial up their ISP using a telephone. Data is transmitted at speeds up
to 56 Kbps. This is slow but inexpensive.
Broadband is data transmission using:
ADSL (Asymmetric Digital Subscriber Line), which provides speeds up to 100Mbps and a
continuous connection to the Internet;
Cable technology;
Mobile telephone networks, e.g. 3G.
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of rules used on the
Internet to define how computers communicate with each other. It is a universal standard
that enables hardware and different operating systems to communicate.
Each computer on the Internet has a unique IP (Internet Protocol) address, e.g.
196.161.232.4. The IP address could be static (it remains the same every time you
connect) or it could be dynamic (it changes each time you connect).
The Internet and the Web are not the same. The Internet is the network and the Web is
the multimedia services that run on it.
Advantages of Static IP -
Disadvantages -
Security Computers having Dynamic IP address have relatively lower security risk (as
your computer is assigned a new IP address each time you log on).
Lower cost -Cost effective as compared to the static kind of address
Automatic network configuration The user does not have to do the network
configuration. That is taken care of.
Cookies are saved on your hard disk by websites and contain personal information that can
be accessed by the website.
Use a cookie manager to block cookies or remove them using a browser.
Employees each have their own swipe card and their unique employee number is recorded
on it. The amount of hours they work is recorded on the swipe card by recording when
they arrive (clock in) and when they leave (clock out). All this information is input into
the ICT system each day.
Validation checks are made on all the data input and the validated data is written to the
unsorted transaction file. Data that does not change every week is saved on the old
master file.
The payroll program matches an employees transaction file record with the
corresponding old master file record. The hours worked are calculated from the clock in
and clock out times on the sorted transaction file. The hourly rate of pay is found on the
old master fi le so that gross pay can be calculated. Tax details on the old master file are
used to calculate deductions from the gross pay to arrive at net pay. The cumulative totals
on the master file are amended (updated); e.g. the tax paid will be added to the total tax
paid this year, and a new master file record is created. Backups of files are
automatically generated so that corresponding copies of the sorted transaction files and
old master files can be used to restore the current files. The ancestral backup system can
be used to provide three levels of backup.
Validation checks help ensure that data is reasonable.
Chapter 12: Applications a and effects of ICT
Payroll is a batch processing system because:
All the data to be processed is available before processing begins.
There is no need to process the data immediately.
The system can be run off line.
Performance of staff can be monitored by checking the number of items sold at each
checkout.
Rate of sales can be used to increase stock of popular goods.
Pattern of sales can show what needs to be stocked at certain times of the year.
Extent of theft from the supermarket can be calculated.