SlideShare ist ein Scribd-Unternehmen logo
1 von 68
ICT Revision
Unit 1 – Introducing ICT
UNIT 1.1 – Computer Systems
A computer system is composed of the hardware and software components.
The three main stages that is involved in information processing:
 Input: it is how the data is captured.
 Processing: the system is performing a task based on the program using the
data.
 Storage: the program is stored in the system.
 Output: the results/outcome from the computer system.
Hardware
Hardware: the physical component that forms a computer system.
Examples of a hardware:
 Mouse
 Monitor
 Printer
 Microprocessor (a chip that contains CPU, central processing unit)
Motherboard: It is the main circuit board of a computer. It contains the CPU,
memory chips and various connections.
Backing storage: The hard – drive.
Video card: A circuit board that generates a video output.
Sound card: A circuit board that deals with the input and output of the sound.
Internal memory: The ROM (read-only memory) and RAM (randon-access
memory)
Storage
ProcessingInput Output
Software:
Software: A program/ set of instructions that the processors run in order
to carry out the task that the user requires.
There are two types of software: Operating system and applications software
Operating system:
It controls and manages the computer, i.e. Windows, Linux.
Application software:
It is computer program that is designed to carry out specific tasks, i.e. Microsoft Word,
Methods of processing:
Interactive processing It response to the input of the user. Most home computer
uses interactive processing.
Real-time processing It allows carrying out several tasks at once. For example,
running a word processor and spreadsheet software at
the same time.
Online processing It is when the computer is working via an Internet
connection.
Multi-user system It allows many users to log in at once. For example, a
website allows several users at once to book tickets.
Internal memory:
There are two types of memory: ROM and RAM
ROM: Read - only memory, it is a permanent memory and will not
be lost in a power cut. It is non-volatile. It contains information
that allows a operating system to be loaded into the RAM from
the backing storage (i.e. hard drive). The data cannot be
written into it.
RAM: Random-access memory, it is the memory that could be read
from, or written into it. There is both volatile and non-volatile
RAM memory. Volatile memory will be lost if the power is not
supplied into it; while non-volatile memory requires power to
change its content. It is a temporary store of data.
Input/Output devices:
Input device: It allows data to be entered into the computer system. For
example, QWERTY/Concept keyboard, a computer mice.
Output device: It allows results of the data processing to be displayed. This
includes a speaker, monitor, printer etc.
UNIT 1.2 – The Operating System
Most operating system has an user interface.
User interface: The way the user interacts with the computer.
Most computer nowadays use a GUI
Graphical User Interface: It is an interface with icons, windows, menus, pointers
etc. It is easy to use and versatile.
However, it is cumbersome as the user has to remember
what all the features mean, i.e. icons.
Features of a GUI:
 Icon
 Icon size
 Menu
 Submenu
 Pointer
 Buttons
 Hyperlinks/ hotspot
 Window
 Close
 Minimize / Maximize
 Restore
 Resize
 Toolbar
 Scroll bar
 Dialogue box
 Drag and drop
 Screen resolution
 Desktop contrast
 Adjust volume
 Set date and time
Menu user-interface: it allows users to choose from a restricted list of options.
File path: it is the address to specifies exactly where the file is
stored.
File extension: it is a code that defines the type of the file.
File name rules:
- Some operating system prohibits the use of symbols or special characters.
- Keep them short.
- Put file extensions, so that the system could open and use the relevant program
to open the file.
Encoding data:
To reduce the file size, codes are used to replace the original data.
Encoding: replacing data with a code that shortens it, i.e. replacing male
with M.
 Quicker and easier input.
 Makes it easier for retrieving data.
 Reduce error
 Less disk space required to store the file.
Dialogue box: It is a small secondary window that displays
information to the user. The simplest form involves an
alert message and an acknowledgement such as “OK”.
Computer system errors:
File corruption: the data in the file is unreadable. This happens as the
file is changed or damaged in some way so that it
cannot be opened by the original software.
Freezing: The computer stops responding to commands.
We can use the task manager (Ctrl+Alt+Del) which
allows the user to close the package. It occurs as the
computer is running low at hard-drive space or RAM.
Error messages: They are messages that contains the error information
and the instructions that the user should follow.
Storage full: It occurs as the computer is running low at storage
space. The system is likely to slow down and freezes.
We could delete files, archive them or copy them into a
removable memory.
Printers: This involves i.e. paper jams. We can switch the printer
off, then remove any jammed paper.
Obtaining help for an error:
We could use:
 On-site technician/support service: they usually need the details of the
problem, then discuss the possible solution for the user. They could also arrange a
visit from an engineer. Some service also has a remote access to your computer to
fix/find more about the problem.
 Internet research: this is ideal for working from home. Many bulletin boards
offers simple solution to the problem. Some software houses have support sections.
We could also pay a visit to the local computer shop.
UNIT 1.4 – Input and output devices
There are many types of input devices:
 Keyboards
Concept keyboard: Each key presents a specific data, i.e. apple, milk, they
are simple to use and avoids error by restricting choices
to a limited number of options.
 Mouse
Optical mouse: It uses a light beam instead of a rolling ball. It does not
need a mouse pad and does not clog dirts into it.
 Microphones
 Digital (video) camera
 Touch screen
Some touch screens need a stylus, some only needs your fingertip.
 Magnetic strip
It stores a limited amount of data. It is commonly found at the back of the
plastic card.
 Sensors
 Automatic data-capture devices
It reduces mistakes and speed up data entry.
 Bar code reader
A bar code is a printed pattern of black lines that represents a number. The bar
code reader has a checking facility, which is based on calculation. The bar
code reader checks it against the last number in the barcode. If it doesn’t, it
beeps and the operator manually enters the number. It is commonly used in
supermarkets and library.
 OMR
Optical mark recognition, the data is entered as the user shades in the boxes
on a printed sheet. The sheet is scanned for the position of the mark.
 OCR
Optical character recognition, this scans a printed document and convert it
into text characters. It can also reads a handwritten form. The form usually
contains boxes so that the writing can be seen clearly.
There are also many types of output devices:
 Monitor
The image on the screen is made up of pixels. Higher the pixels gives a more
detailed display.
 Printer
Inkjet printer involves ink sprayed on the paper. It is cheap to buy but the ink
is expensive. Laser printers uses a powdered toner. It produces an excellent
quality print and it is cheaper to print a page than an inkjet printer. However, it
is expensive to buy.
It also has a buffer, which is a memory store for the document. It frees up
computer memory so that the computer continues to work at a good speed.
Buffer: temporary storage areas in the printer which hold the data
waiting to be printed.
 Speaker
Some computers have an internal speak that produces low quality output (i.e. a
beep).
 Digital projector
It is ideal to project a large image of the computer output. It is very expensive
and is likely to fail if it is not shut down properly.
 Plotters
It draws complex outlines, i.e. engineering drawing. Some plotters also cuts
out the sheet material.
 Actuators
They are devices that performs an action in response to a signal from the
computer, i.e. the motor in a computerized arm.
UNIT 1.5 – Storage devices and media
Units of storage:
Byte 1B
Kilobyte Over 1000B
Megabyte Over 1000KB
Gigabyte Over 1000MB
Terabyte Over 1000GB
Backing up:
To avoid data being lost as it is stolen/deleted/corrupted, we use back up copies.
Backing up: Copies of data stored in case the original is stolen/ becomes
corrupted.
Types of storage:
Hard drive:
- It can store a lot of data.
- It is robust
- It is fast
- It is reliable
- BUT, it takes up a lot of physical space.
Optical drives/media:
- For example, a CD or a DVD
- Laser beams are used to write/read data from them.
Flash memory:
- They are small.
- BUT easy to lose and damaged.
Magnetic cartridges:
- I.e. DAT, tape drives
- Often used in server back up.
Specialist storage media:
Virtual Memory:
 This involves using a hard drive as a temporary store rather than using RAM. This
makes the computer behaves as it would have more RAM in it.
Online storage:
 It has the advantage that is away from main computer. This makes data easily
accessible anywhere with an Internet connection. It is also safe in case of fire and
flood.
 It also has security risks – we have to trust the company that holds our data.
Storing and sharing photographs:
 Some websites allows us to share/store photographs online.
 We can choose to keep photographs private or allow others to see them.
UNIT 1.6 – Communication networks and entertainment
Network:
- It is a group of computers connected together.
World Wide Web (www): It is a system of Internet servers that supports a
collection of web pages on the Internet which
hyperlink to each other.
- The development of broadband allows people a high-speed Internet access at a
fairly low cost.
- The Internet allows businesses to advertise their products and services via e-
commerce. This means they can reach a wider range of customer, or even sell
its goods internationally.
- It allows people to entertain themselves by playing games or downloading
music or videos.
- BUT, it increases the chance of damage of data caused by virus.
Local Area Network (LAN): It is a network connecting computers in the same
area/room/building. It connects computers in a
limited range. It could be done either by cable or
through wireless technology.
Wide Area Network (WAN): A network that covers a geographical area larger
than a single building. It uses telephone and
cable networks, or satellites to transmit data. It
could be in a national or global range.
Communication methods:
Telephone:
Mobile phones are convenient, but they cost more to make a call than using a land
line. They can also send out SMS (text messages).
VoIP:
Voice over Internet Protocol. These phones uses Internet to transfer voice messages
to other users. These calls are free.
Email:
They are messages that are sent to other person’s email address. They arrive quickly
and are cheap to send.
Fax:
They are less commonly used now. This involve scanning a document and sending the
image to the other fax machine using telephone lines. The advantage is that neither of
the user needs a computer.
Internet connections:
Some computers use a dial-up connection, which uses connection tied up with
telephone line. Most areas in the UK, telephone exchanges have been adapted to
deliver a broadband connections.
Modem: Electronic devices which connects computers via a telephone
line. It converts analogue data into digital data, or vice versa.
Digital Signal: Signals that take only two values, on or off, in binary.
Analogue Signal: Electrical signals that varies continuously.
Wireless technologies, such as Bluetooth or WiFi, are used.
Bluetooth basically involves two devices connecting together instead of using a cable.
WiFi is used to connect devices to communication network.
Bandwidth measures the internet connection speed:
Bandwidth: The rate at which data can be transferred. If the bandwidth is
too slow, data is transferred very slowly.
Broadband has a much higher bandwidth than narrow band, giving a faster data
transfer rate.
Mobile broadband connection involves the use of a dongle with a SIM card.
Dongle: A small piece of hardware that connects a computer’s USB port.
SIM Card: Subscriber Identity Module Card, it is a small electronic that
is inserted into the mobile phone that provides an unique ID for
that phone.
Server are used to manage computer networks.
 File servers: it manages the files stored on the network.
 Printer servers: it manages printers and print jobs sent to them.
 Web servers: it manages files that make up the webpage.
 Email servers: it manages the email messages for distribution for users.
There are different types of entertainment system:
TV (Terrestial, Digital, Cable, Broadband)
Terrestial TV are connected to an aerial. Digital television are connected to a set-top
box or a digital TV. Cable TV companies offers TV services delivered using network
of underground cables. We can also now watch TV or radios on our computers using
the broadband Internet service.
Home entertainment:
We can store up TV programmes in hard drives, as they are delivered digitally.
Integrated Entertainment System: Systems that combine a range of devices
offering visual, video, musical, audio and
gaming entertainment.
I.e., a TV which is connected to gaming console, video player etc.
Music and film downloads:
We can now download musics and videos online to our computers.
UNIT 2 – System Life Cycle
A system life cycle shows how a system changes.
It is the series of cycle that a newly implemented system has to go through.
Stages in the system life cycle includes:
Feasibility study It is an investigation that is carried out by a system
analyst to spot out main problems in the existing
system. It then see whether it is technically and
economically possible to solve the problem using a
computer based solution.
Analysis System analysts investigate the existing system to
identify the exact problem. Variety of ways, such as
interviews and questionnaires, are used to gather
information. A reasonable sample size should be used.
Bigger the sample size gives a higher reliability, but
also a higher cost.
Design It outlines how the new system is able to solve the
problem. It also specifies how the system is to be
constructed, and how it is tested using a test plan.
It includes the information about:
Input and Output devices
Data storage
User Interface
Backup and recovery procedures
Security measures
It also draws up a testing plan.
Implementation It is setting up the system so that it meets the design
specification. It should follow the plan for
construction, and tests should be done following the
test plan. Any improvement changes at this stage
should also be documented.
At the end of the implementation stage, there should
be a working system, and documented changes that
were made to the system.
Testing It ensures mistakes are corrected before moving onto
the next stage. It is important to keep a record of the
test. User testing, more known as beta testing, should
also be documented.
User training and
documentation
The system analyst should decide how the training
should be done, based on different types (i.e.
experienced or novice) users.
The system should also be documented on how it
works and what the structure is.
Evalutation (& monitor) It is looking at the system carefully to see whether the
system meets the performance criteria from the
analysis stage, and judge how successful the new
system has meet them. If the performance criteria is
not met, it will examine the cause and look at what can
be done to meet them.
Maintenance This involves monitoring the system closely to see if it
continues to perform at an acceptable standard. This
involves spotting errors that are not originally
discovered, or adding/editing features of the system
(i.e. changing VAT rate from 15% to 17.5%). Updates
usually comes from patches. Or otherwise, the cycle
starts again if the user thinks it should be completely
redesigned or replaced.
Patches:
They are a piece of code that updates a software
package.
Planning for construction:
 Time planning: It is setting a time limit to complete each of those tasks tem is
finished on time.
 System design: It is the exact design tasks on how the system would be
completed. It works out how the system will meet the performance criteria, and
the user interface would be.
 Functional design: To decide what software would be the best to construct
the system.
 Interface design:
 Hardware: The analyst should outline how the user could use the
user interface using input and output devices.
 Screen layouts: The layout of the interface should take care of what
users there are. This involves choosing the right font style and size, colours
so that it is easy to read.
 Design Sheets: There should be designs for all screens in the system,
and it should be documented what each object (i.e. icons) does.
Finding good quality information:
- CD ROMS/DVD packages are accurate as these data are checked before they
are published.
- Specialist magazines are available and they have good comparison between
different products.
- WiKi could be edited by everyone so it is not accurate.
 We should always compare data between different sources. This will allow us to
know whether it is accurate or biased.
 Check the publication date to know whether it is outdated or not.
UNIT 3.1 – Application Software
Application software are designed to carry out user-related tasks. They are task
specific.
Task specific: It has a number of features that carries out particular jobs.
Word Processor Microsoft Word, OpenOffice Writer
Desktop Publishing Software Microsoft Publisher, Adobe InDesign, Serif
PagePlus
Presentation Software Microsoft PowerPoint, OpenOffice Impress,
StarImpress, GoogleDoc Presentation
Graphics Software Photoshop, GIMP
Web-design software Dreamweaver, Frontpage
Spreadsheet Software Microsoft Excel
Database Microsoft Access
Web browser Internet Explorer, Mozilla Firefox
Many software shares common features, known as generic features.
This includes:
- Help
- Edit text size
- Copy
- Cut
- Paste
Open source & proprietary software
Open Source: The software code is freely available to be used, copied and
edited.
For example, Linux operating system.
Proprietary Software: It is the software that we pay to use, however we are not
given the access to the code and not permitted to change
the code. For example, Microsoft Windows.
Advantage of open source software Advantage of proprietary software
It is free It usually has a good service and follow-
up support
The code is developed
collaboratively, which means that the
new features and bug fixing can be
done quickly
It comes with automatic updates
It could be customized for specific
application
The code is more robust and reliable as
the company takes the liability of it.
There are different types of installations:
Hosted software: They are stored online but users can use them with an
Internet connection.
Locally-installed software: These software are installed within the computer system.
Hosted applications
Advantages Disadvantages
Low start-up cost: little storage in the
computer is required
Users have to be online to use it
Does not require updates: this is done
centrally within the server
Depend on the Internet connection
Backup is done automatically by the
software developer.
Lack of control and security over stored
data.
Can be accessed anywhere in the world
with Internet connection
Locally-installed applications
Advantages Disadvantages
User has more control over the data. Involves a large start-off cost
Does not rely on the Internet connection:
it has full functionality even if it is
offline
Users have to download updates.
Uses a lot of the computer memory.
UNIT 3.2 – Word Processing and desktop publishing
Word processor: A type of application software used to create text
documents.
Desktop publishing: It is also known as DTP. It is a type of application
which creates printed material containing text and
images.
The common features between both includes:
- Edit Text
- Columns
- Spelling & Grammar Check
Choosing between word processor and DTP:
Word Processor is ideal for:
 If the document does not need to look professional
 Simple layout
 (Text only)
 I.e., a letter
DTP is ideal for:
 Create a professional looking document
 Images and logos have to be more accurately placed for appearance.
 Organising large amount of photographs
 (Documents containing both pictures and texts)
 I.e., a leaflet/poster
UNIT 3.3 – Presentation Software
Presentation Software: It is software that used to create slideshows. Text,
graphics, videos and sound can be used.
Features of presentation software:
 Insert slide
 Enter or edit text
 Insert pictures
 Insert buttons
 Create hyperlinks
 Adding animation to slides
(It can make the presentation attractive. Timings can also be used to trigger
different transitions and animations.)
- Presentations can be viewed either on screen, or on paper.
- It can be viewed on a monitor, or projected into a large screen.
- Paper handouts can also be created for the members of the audience.
Professional looking presentation
- They should use a consistent colour scheme and a simple layout.
- We could also use a template with text frames and title.
UNIT 3.4 – Graphics production and image manipulation
Graphics/Image Manipulation Software:
They are used to create and draw images, as well as editing images and photos.
For example, Adobe Photoshop
Common features includes:
- Cropping a photo
- Changing the colour tone
- Changing the image size so that it is easier to be transferred
- Clearing up marks that appears on a scanned document
The tools in a image manipulation software includes:
 Brush/Airbrush
 Shading
 Text box
 Layering
 Filters
Filter: It is a process that changes the appearance of the image. Filters
are often used to create specific effects, i.e. blur, pixelate and
adding brush strokes.
Drawing storage:
Drawings are either stored in bitmap or vector.
Bitmap: The graphic is stored using a series of coloured dots. This kind
of drawings is large.
 Resolution is the amount of pixels making up the image.
More pixels used in the image, sharper the image. But also more file size is
used.
Vector: The image is stored as coordinates and equations. For example,
a red circle is stored as a circle equation and coordinate of the
centre. It is much easier to be edited, and does not affect image
quality if it is resized.
UNIT 3.5 – Web design
A website is a collection of web pages, linked together using hyperlinks.
Before we create a web page, we should first sketch out the outlines and structures of
each page, and specific where does the hyperlink leads to.
Most websites are designed using a template/ master page.
- This is what the majority of the web pages are based on. Usually the template
contains a menu/navigation bar. We can identify which areas of each page is
part of the template, as they appear on each page.
Features of a web design software:
- It is able to add text, pictures etc.
- Convert our websites into HTML format, a standard code for our web
browsers to understand.
- Using master pages and templates.
Things that could be included in a webpage
Master pages: they are pages containing objects that need to appear on all
pages. They save a lot of effort and are very consistent.
Templates: they are partially-completed pages. We just have to edit the
heading/change the texts etc.
Marquee: an effect that makes text scroll across.
RSS Feed: it allows people to subscribe to our website.
Hyperlinks: it links different web pages together.
Animation: they are moving images.
Forms: they capture information from users.
Hotspots: they are hyperlinks on an image.
Navigation bar: Menu of hyperlinks on each page of a website.
Counters: To see how many visitors have viewed the website.
Flash:
- It is application software that is used to create effects for websites, i.e. a
moving icon, short movie or rotating photo. The most common software
package for flash is Adobe Flash.
Publishing website onto the Internet:
- We can first use our web browser to view the webpage, and see if all the
hyperlinks work.
- We need to then upload the webpage into an online server.
HTML (Hypertext Mark-Up Language):
- Most of the web-design software has a code view (editing HTML code) and
design view (WYSIWYG)
- “What you see is what you get”
 It is a term that describes software that allows user to view something very
similar to the end result while the document is being edited.
 Some web developers develop websites using WYSIWYG editor, then
remove unwanted code in HTML editor to reduce file size.
UNIT 3.6 – Software for audio, DVD and video players
Features of a media player:
- Listen to audio.
 Play/Start
 Stop
 Pause
 Forward
 Backward
 Volume Adjustment
 Mute
- Watch movies.
- Create playlists
Play lists: A list of songs selected from a library.
Media files can either be downloaded or streamed.
Downloading media files:
It is any piece of music that we have transferred from an online website to local
computer. We can pay and download these music from websites i.e. Apple iTunes,
Amazon MP3.
Streaming:
Streaming: Multimedia content is played back to the end user whilst it is
still being downloaded.
It allows us to watch the video/listen to the music before it is fully downloaded.
UNIT 3.7 – Transferring data between application
Some application software has the ability to transfer data from one application to
another. This is done by either import or export tool.
Import: Transferring a file that was created in one application software
package into applications software that is currently open.
Export: Preparing a file that is currently open so that it can be opened in
different application software.
Examples of transferring data:
 Documents with an extension of .doc can be saved into .html files so that it could
be used by other web design softwares.
 Images created from Adobe Photoshop with a file extension of .psd can be stored
as .jpg so that they could be opened by other image editing software.
 Spreadsheet files can also be stored in .csv (Comma Separated Values) so that it
can be opened by other application software, i.e. Microsoft Word.
UNIT 3.8 – Designing documents using accepted layout
When we create a document, we should consider the layout of it by considering:-
 So that it could be read easily.
 Fit for purpose.
 Relevant to your audience.
There are some rules in different types of documents:
Printed Letters: It contains the address of the recipient and the sender,
the date and sign off. It is found in designated place of
the page.
Posters and flyers: It uses a short title. Avoid using many different colours,
fonts and effects. This makes it cluttered and difficult to
read.
Web page: It should be clearly labeled so that the user can read it at
a glance on which page they are on. It should also
contain a navigation bar, which is found on same
location of each page.
Presentations: Do not include too much texts on a page. We should
stick to a small number of bullet points. We should also
use images and multimedia to add interest.
- Many documents have an accepted layout, i.e. a business letter. Many word
processors, i.e. Microsoft Word, usually provides templates for a variety of
document types.
UNIT 4.1 – Application Software 2 – Spreadsheet and Modelling Software
Spreadsheets and databases are types of applications software used to store,
manipulate, ouput information and data.
Spreadsheet is:
 A program that can display and store data in a structured way.
 Documents that stores data in rows and columns, and allow the data to be
analysed using formulae.
Spreadsheet could:
 Record data
 Sort out data
 Search for particular data
 Perform calculations based on data
 Produce graphs and charts
- Spreadsheet is made up of tables. Rows and columns divides the table into
individual cell.
 Thus, data are stored in individual cell.
 Cell references (with letter and number) can be used to identify individual
cell in the spreadsheet table.
 We can include cell references from other files, i.e.
[football.xls]Sheet1’!E26.
We can use …. to make the spreadsheet look more presentable:
 Font size and style
 Text alignment
 Merging Cells
 Cell shading and borders
 Gridlines
 Column and row width
Difference between data and information:
Data: They have no context. They are simply raw words and figures.
For example, A, M, 3.259
Information: Combined data which gives a meaning.
A spreadsheet cell can contain one of these three data types:
Data types: Descriptions of the types of data being stored in the cell, i.e.
text, numbers and dates.
- Numerical Data: I.e., integers, fractions, decimal numbers, time, dates,
percentages, currency.
- Text (Alphabetical data): I.e., Names, titles, songs
- Formulas: They allow calculations to be displayed within the cell.
Formulae and functions
Functions: Mathematical operations performed on the value in a cell, for
example =SUM and =AVERAGE.
There are different types of functions:
SUM They add a long list of numbers. =SUM(D12:D18)
MIN Finding the minimum value of
the list.
=MIN(D12:D18)
MAX Finding the maximum value of
the list.
=MAX(D12:D18)
AVERAGE Finding the mean of the list of the
number.
=AVERAGE(D12:D18)
ROUND Rounding a number to a specified
number of digits.
=ROUND(D1,3)
Rounds it to 3 digits.
ROUND UP Rounding a number UP. =ROUNDUP(D1,3)
Rounds it up to 3 digits.
RANK Tells you the position of one
number within a sequence of
number.
=RANK(D4,D4:D9)
Tells you the position of cell D4 in
the list from D4 to D9
COUNT Counting the number of cells
with numerical values.
=COUNT(D1:D10)
Counting number of cells from the
list from D1 to D10.
LOOKUP Looks up for a value/data in an
array (a type of table)
=LOOKUP(“banana”,A2:A6,B2,B6)
Looks up for the data “banana” from
the list from A2 to A6, then displays
data from B2 to B6.
Other function includes:
IF: An IF statement asks a question, then returns a response if the
answer is yes, and another if the answer is no.
For example:
IF(apple price<banana price, “UNDER”,”OVER”)
Explaination:
If the apple price is lower than the banana price, display “UNDER”, or otherwise
display “OVER”
Relative and absolute cell references
Relative cell references: Where the program does not exactly store the
address of the cell, but store the position of the
cell relative to the cell containing the formula.
Absolute cell references: The actual cell location is stored, and is
unaffected by the location of the cell containing
the formula. It is the opposite to relative cell
reference.
For example:
If we type a formula at E19, displaying results of =SUM(D19:D23), when we move
the formula to E20, the relative cell reference will change the formula to
=SUM(D20:D24). If we use =SUM(D$19:D$23), it remains unaffected.
Charts and graphs:
There are different types of charts and graphs.
Bar chart  It has category
plotted at the x-
axis, and values
on the y-axis.
 It displays
discrete data.
Line Graph  Rather than
category, it has
values in the x-
axis.
Scattergram  It shows the
relationship
between two
data.
 Trend line is
added to show
the relationship
more clearly.
Pie Chart  It shows the
proportional of
a category to a
total.
Chart titles, labels and keys
Every chart and graphs must have a:
 Chart title
 Key (legend) that explains what each symbol/colour represents
 Axis titles
 Axis scales
Modelling:
Model: Mathematical representation of the reality.
- Input values are processed using different formulas to produce an output.
- It can carry out What-if analysis.
What-if analysis:
Step 1: Reduce/increase a variable (i.e. changing the selling price of pizza)
Step 2: Check the result
Step 3: Make adjustment until the result is correct.
- Using what-if analysis, the user can see how the input values affects the output
values.
UNIT 4.2 – Databases
Database: Collection of data or records stored in tables.
Datatypes:
AutoNumber Unique number that is automatically-generated for each
data.
Number Numerical values, i.e. integers or decimals.
Text/Alphabetic Short values containing text and numbers.
Currency Monetary values, i.e. $23
Data/Time Data and time
Object/Image Files such as images.
Boolean/Logical Yes/No values
Limited choice Where values are limited into a drop-down list.
Memo Text and numbers. It is possible to store a large number of
characters. It can be used in “Notes” or “Description”
field.
There are two types of database:
Flat file database: A database with just one table of data.
Relational database: A database containing two or more tables that are linked to
each other. This overcomes problems of data redundancy, resulting in fewer entry
errors and reduced storage spaces.
Flat File Database:
- The simpliest form of database.
- A table of data.
- It could be created in all database programs or most spreadsheets.
Relational Database:
- It stores data in separate tables.
- Data are linked together using key fields.
- Reduces data redundancy.
- It is easy to change or update information, as we only need to change one table.
Key fields: They are also known as primary keys (i.e. AutoNumber). It is a field in
the table which uniquely identifies each record in that table.
Fields: Column headings in the database tables. Fields are part of a record.
Records: They are rows in a database table. They hold all of the information
about one subject.
Data redundancy: When the same data is stored more than once in the database.
They are also known as data duplication.
Data Validation:
Data validation can be used to reduce data entry errors. They check the data whether
it is sensible or not.
 Presence check:
They check if a field is left blank. It stops us moving on until the field has been
entered a value.
 Look-up list:
It checks the data against a list of pre-set values, for example a field may only allow
“Male” or “Female”.
 Type check:
It checks if the data are all in the same type. For example, data with specific length, or
in a specific format (one letter followed by three numbers) etc.
 Range check:
It checks the data if it lies within a range. For example, inserting an age within 0-100.
 Check digit:
It carries out a calculation based on the number entered, and check the result is what
is expected. It is used in bar-code scanning.
Data Verification:
It makes sure the data that is entered is the same as the original data.
 Proofreading:
A person reads the data onto the system, and compares it to the original data. Any
incorrect data will be corrected.
 Double entry:
The data is entered twice. The computer then compares two sets of data to see
whether they are identical or not.
Form:
Form: It is a tool that simplifies data entry.
- It can be used to enter or edit data.
- It is clearly designed and user-friendly.
- It is linked to the table.
- It contains text boxes, tick boxes or lists for user to choose from.
Advantage of a form:
 In a relational database, it allows you to enter data into more than 1 table in a
single form.
 It has a simple layout compared to a table.
 We can add extra text to a form to make it more user-friendly.
Sorting and filters:
Database records can be sorted and filtered.
Sorting: It allows data to be organized into an order.
- I.e., in alphabetical, ascending or descending order.
Filtering: It selects information on one particular type of data.
- I.e., only display data with price <$60.
Searching in a database:
We can use query to search a database.
Query: It is a list of the things you want the database to look for.
- We can use search criteria, then the database returns with a list only with the
results we are looking for.
Search criteria (Operator):
= Equal to
< Less than
> Greater than
< > Not equal to
<= Less than or equal to
>= Greater than or equal to
* Wildcard search
OR Finding data that satisfies either of the conditions.
For example, finding First Name = “Boris” OR “Cherie”
AND Finding data that satisfies all of the conditions.
For example, finding First Name = “Boris” AND >$50
NOT Finding data that does not satisfies the condition.
For example, finding people with the name NOT Boris or with
money more than >$50
NOT (First Name= “Boris”) AND Value >$50
Wildcard search:
- We can use it when we only know part of the data.
- * denotes any numbers or characters.
- ? denotes only one number or character
- I.e., writing Be* instead of Betty; writing Bett? Instead of Betty.
Reports:
It shows result of the data based on our preferences (i.e. we select which fields to be
searched/displayed).
There are two types of report:
Record format report:
It displays data completely separately. I.e., a letter that displays your water bill and
address separately.
Column-format report:
It displays data in a big table. It displays all the information under the field.
This form of report is useful if we want to compare different data.
Mail merging:
It allows data stored in a database to be transferred into another application software.
 It is importing data.
 It inserts data that is created using a different software application.
Process involved in mail merge:
Step 1: Organise the data in the database into fields.
Step 2: Write the document with details missing. Replace them with key field
names.
Step 3: Merge the data into the document.
UNIT 5 – Using the web
UNIT 5.1 – Web browsing and e-mail
Web brower: Application software that displays web pages.
- It reads the HTML code and display the web page in the right way.
Features in the web browser:
Stop It stops loading the page.
Refresh It updates and reloads the web page.
Home Page It is the web page that would be accessed once the web
browser is opened.
Web Address It is space where we type in the exact URL address of a
webpage.
Bookmarks The browser could save URL addresses so that we don’t have
to type them next time.
Phishing Filter It tells the user if the website is trying to get their personal
information.
Pop-up blocker It prevents the web page opening up new windows that
displays advertisement.
Common types of websites:
 Search engine:
Examples include: Google, Yahoo!, Ask.com.
- It works by searching through all the webpages in the Internet, then make a
central index of words and sentences on each webpage.
- As we type in a word or phrase that to be searched, it looks it up against the
central database, then returns with a list of results with all websites that
contains that word or phrase.
- Different search engines provides different search results, as they uses a
different indexing methods.
Search criteria:
Search criteria Example Meaning
AND search: simply
type in the search
terms.
Ipod walkman Results containing “Ipod”
AND “walkman”
NOT search: involves
using the minus (-)
sign before a search
term
MP3 Player - ipod Results with all containing
“MP3 Player” except
“ipod”
OR search: it displays
results that contain
either of the words
Ipod OR walkman Results with either “Ipod”
or “walkman” are
displayed
Exact phrase: putting
it into quotes
“apple ipod” Results that contains
exactly “apple ipod”
Wildcard search:
Using an asterisk
before or after a
search term
Ipod* Results starting with the
word “Ipod”, i.e. Ipod
touch, Ipod nano, Ipod
mini
 Wiki:
They are websites which allow users to freely create and edit webpage content.
For example: Wikipedia
Internet Service Provider (ISP):
It is a company that provides people with Internet access.
- It usually charges a monthly fee.
- They also sometimes provide additional service, i.e. web mail, web hosting.
 Web mail are sometimes provided. They are email service provided by your ISP.
 Hosting websites: Some ISPs provide a free storage space which allows us to
upload our webpages into the Internet.
E-mail:
They are electronic mail.
- We need an email account to send or receive emails.
 They can be obtained by either our ISP, or any web-based email service.
- It sends a message from a computer to another.
- E-mail addresses are unique.
Features of an email:
From Some email editing software allows us to send and receive
from more than one email account. We can specify the
email to be sent using a specific account by entering our
email address.
To We can enter one or more than one email addresses that we
want our message to be sent to. We need to separate
different email addresses using a comma or a semi-colon.
Cc Carbon copy. This sends the message to someone that are
not directly affected by the message.
Bcc Blind carbon copy. A copy of the email will be sent to that
address, but other recipient does not know this.
Subject It make others clear as they know what is the email about.
Attachments As only text are allowed in the main body, we can insert
images and videos using attachments. They don’t open
automatically unless we download them.
Received e-mail
Reply We can send a reply message back to the “From” address.
Reply to all It sends message back to all the addresses in the From, To
and Cc section.
Forward It sends the message to another address. We can add
comments before the email message.
Others
Signature This is an automatically added message to every email
message. Common signature includes the contact details.
Body It contains the actual message of the email.
Managing the address book:
Address books allow us to store email addresses.
- So that we don’t have to type in their email address next time.
- We can also add new contacts, edit or delete different contacts.
Mailing lists:
It is the group of email-address.
 The coordinator could add/remove/edit addresses in the mailing list.
Folders in an e-mail software:
Sent items Contains copies of emails that we’ve sent.
Drafts Contains all the mail that we have started to write but have
not been sent.
Outbox E-mails that are completed and are pending to be sent.
They often store emails that are written in an offline
device, and sends out email once they have an Internet
connection.
Junk Mail Contains email that are recognized as junk or spam.
Deleted items Contains email that are deleted. This folder is emptied
automatically.
Junk Mail: Also known as “spam”. They are emails that or not welcomes
or solicited, and are often sent in bulk. They are usually in a
commercian nature.
Spam filters: Software that redirects emails that appear to be junk or spam
into designated junk email folder.
- To prevent normal email redirected into the junk folder, we can add the sender
to a list of safe senders.
Instant messaging:
Real-time text conversation between two or more people who are online.
- We know the recipient is online, when email doesn’t.
UNIT 5.2 – Web logs, social networking and forums
Web logs: It is usually abbreviated to “blogs”. These are websites which
people or organizations write entries about a recent event or
particular subject.
Different types of blogs:
 Personal blogs
They are websites which a person writes about his personal events, sort of an
online diary.
 Corporate blogs
It contain updates on what a company has been doing, i.e. a recent event or a
opening of a new store. It keeps customers updated, and might find out customer
opinions using the comments posted in it.
 News and views
Blogs created that update people with news on a specific topic, i.e. BBC Climate
Change.
 Micro blogs
Users write a short update on what they are doing, known as “Tweets”. They have
a character limit. This results in a blog made up of many “tweets” that looks like a
running commentary of someone’s life.
Features of a blog:
 Recent entry
The most recent entry of the blog must be at the top of the page. The date of the
entry is also clearly marked.
 Blog post
It is the context of the entry. Images may be added and enlarged once they are
clicked.
 Comments
Visitors may leave comments about an entry.
 Other
This includes the vote function where visitors click to vote.
Social networking
Social networking: contacting other people to meet out, or to find out
other’s interest.
- They are websites where individuals or organizations each have a profile and
link to other users.
- The link could be based on real friendship, common interest or similar
background.
- Examples includes Facebook, MySpace
It usually contains:
 An email service
 Instant messaging
 Ways that publish original material
 Forum or groups for people with certain interest
 Sharing files and links
 Creating a profile
 Uploading videos/photos
 Adding personal details, such as name, age, town of birth, schools.
- We can also search for other users in a social networking website.
This can be done by typing their name, username, email address, or by
location or interest that we share.
Some social networking sites requires a plug-in in order to upload files onto it.
Plug in: A small application software that you download using an
Internet browser. Each plug-in has a specific feature or function
of the Internet browser, i.e. Adobe Flash plug-in enables us to
view animation online.
Pros and cons of social networking software:
Advantages Disadvantages
We can keep people in contact in a
country, or even a world-wide scale.
Identity theft, we put ourselves at risk
when we put in too much information.
A place where we can publish our work Friends may lie about themselves.
Raising awareness for different
charities/organisations
Some potential employers may look at
your profile to make decisions.
Dangers / risks of social networking websites
Privacy:
We can select what kind of information are displayed by changing our privacy setting.
Abusing social networking sites:
There have been cases where people pretend to be someone when they are not.
For example;
Creating an account under someone else’s name, and posting information that
damages their reputation.
Viruses and hacking:
Some hackers hack into social networking sites to get sensitive personal information
i.e. credit card details.
Forums:
Forum Also known as a “message board”. An online discussion
website consisted of user-generated content.
- Users could post comments in an open conversation.
- Different forums discuss particular areas of common interest.
Podcast:
Podcast: Audio or video files downloaded from the Internet, normally
updated daily or weekly.
- They are mainly used for education, business and recreation purposes.
Difference between a podcast and downloads:
Podcasts are normally a part of a series made available for download on a regular
basis, often daily or weekly. Some podcasts could detect newer version as we’re
subscribed to it.
UNIT 6 – Data logging and control software
Data logging: The process of collecting data over a period of time.
- Data is collected using an input sensor. It works by converting environmental
signal (i.e. tempature) into electrical energy, in either analogue or electrical
signal.
Sensors: Device that detects physical quantities, then converts it into
electrical signal in either analogue or digital form.
Data in data logging are captured in every logging interval over a logging period.
Logging interval: The length of time between recording each
measurement.
Logging period: The total length of time that data is being recorded.
Advantage of data logging:
It could:
- Run 24 hours a day, 365 days a year.
- It is cheaper to use computer logging than manual logging.
- Takes accurate and consistent reading – it eliminates human error.
- Take readings in a very short time interval – i.e. 1/100 seconds.
- Capture data in hazardous environment – i.e. inside a volcano, Mars
- Immediately analyse and respond to the data – i.e. switching on heater once
the room temperature falls to 22C.
- Automatically presents data as graphs and tables.
- Log data from many sensors at a time.
However:
- Expensive set-up cost
- Failure sensor are unrecognizable
- If equipment fails, data may be lost
UNIT 6.2 – Control Software
Control Software: Software used to programme robots and devices with
instructions so that they can act remotely or
automatically.
- The control system is a software which is used to control a piece of equipment.
There are two types of control system:
Dedicated control system:
- Basic programs that carries out pre-programmed tasks, i.e. a traffic light.
Computer-controlled system:
- It uses computer to control the output device (i.e. motor), and the computer
reacts dependent on the data, i.e. a computer-controlled heater.
Feedback Loop:
Feedback:
The way that output influences the input.
- In a feedback loop, information is
sent from a sensor to control the
output of a device.
UNIT 6.3 – Mobile Technologies
There are many ways of communication using mobile technologies:
Laptops:
Also called notebooks, which is a personal computer small enough to be carried
around. They have built in keyboards, mouse and screen.
Smart mobile phones:
Also known as smartphones, which are phones that offers features found in personal
computer, such as Internet access, email and some application software.
Common features found in a smart mobile phone:
- Internet access
- Emails that automatically downloads to the phone when it is received.
- A calendar
- An address book
- Application software, i.e. word processing and spreadsheet software
- Large memory, and option to insert external memory card
- Digital camera
Advantages Disadvantages
Portable Easily tracked (privacy)
Able to communicate with others using
ICT anywhere with networking
Easy to lose these devices
Small in size Network is unavailable in some locations,
i.e. mountainous areas.
Wireless Application Protocol (WAP):
Wireless Application Protocol (WAP):
A technology that enables mobile-phone users to view phone-friendly versions of
websites on a phone screen.
- Other than ordinary website view, it displays a simplified view of the website
on our phones.
Convenience imposed by mobile technologies:
Nowadays, mobile technologies have found usage in many aspects, such as
Computer
Phone
Navigation (Global Positioning System, GPS)
Electronic organizers
Satellite Navigation Systems
A Global Positioning System (GPS) consists of 24 satellites. The GPS device receives
signals from at least three satellite to work out their position (triangulation). It uses
the NAVSTART satellites, which orbits around the Earth.
UNIT 7 – Implication of ICT for society
UNIT 7.1 – Legal issues relating to the use of ICT
Despite ICT brings in a lot of advantages, for instance affecting how business run,
more things could be done in our leisure time etc., ICT has an impact on the
environment and everyone’s privacy.
As a result, laws are set up to control how ICT are used.
The Data Protection Act controls the use of private data.
- It protects the data subject that the organization possess.
- The organizer, aka data holder, are entitled to comply with this law, which is
enforced by the Information Commissioner.
- If the data holder wish to pass your data onto a third party, they must ask for
your permission.
- Each organizer must appoint a data controller, person who makes sure the
rules regarding personal data are complied.
Data Protection Act: A law designed to protect the privacy of
personal information.
Data subjects: People about whom data is stored about.
Data users: People or organizer that store personal data.
Information Commissioners: The government department that enforces the
Data Protection Act 1998.
Data controller: The person in an organization who is
responsible for ensuring the Data Protection Act
1998 is followed.
The 8 Principles of the Data Protection Act 1998:
The law states that the data must be:
 Fairly and lawfully processed.
 Processed for limited purposes.
 Adequate, relevant and not excessive.
 Accurate and up-to-date.
 Not kept for longer than it is necessary.
 Processed in line with your rights.
 Secure.
 Not transferred to other countries without adequate protection.
Exemptions of the law:
There are some cases where the law does not apply.
Exemptions:
Situations where the Data Protection Act 1998 does not apply.
Examples include:-
- Data that put national security at risk.
- Data which must be made available to public.
- Information for personal use within families.
- Information needed to prevent and detect crimes.
- Information needed for tax assessment.
Computer Misuse Act 1990:
This is a law which prevent unauthorized access to computers. It copes with the
problem of computer hackers and viruses.
Viruses: Pieces of computer code that can reproduces themselves by
copying into other files. They could cause damage to our files,
or stop programs running properly.
Hacking: Accessing a computer system that you are not authorized to use.
It is an offence under the Computer Misuse Act 1990.
There are three types of offences:
Level 1: Accessing to a computer system, software or data that you are
not authorized to.
Level 2: Unauthorized access with the intent to commit fraud or theft.
Level 3: Unauthorized modification to a computer system. This includes
implanting a computer virus.
 The British Computer Society (BCS) aims to help people to understand the
responsibility they have when storing personal data.
 They created the Personal Data Guardianship Code to help data
handlers to follow the Data Protection Act 1998.
 It suggests a person in the organization to take five main duties:
Accountability: ensures the data is handled properly.
Visibility: stating how the data will be used.
Consent: ensures the organization have gained permission before
accessing or sharing their personal data.
Access: makes sure only the right person sees the data.
Stewardship: makes sure the right amount of data is possessed, and
deleted once it is no longer needed.
Copyright and Patents Act 1998
They are there to protect our intellectual property.
Intellectual Property: Ideas or creations such as software or music that can be
protected by copyright.
Copyright legislations also applies to software. When we buy a software, we are
buying the “right” to use it.
Software license: A legal agreement stating how a piece of software may
be installed or used.
There are different types of license:
Single-user license: Allows to install and use the software in one computer.
Multi-use license: It states how many copied may be installed. It is
commonly used in businesses.
Site license: They allow software to be installed in any computers
within the site, i.e. education packages in the school.
Shareware license: They usually come with a short trial period, then
restrictions are imposed to it. We have to pay for it to
get the restrictions removed.
Freeware: Also known as public domain software. We can use the
software without paying for it.
Plagiarism and copyright
Plagarism: Copying a piece of writing, music or other intellectual property
from someone else and presenting it as your own work.
- We should always only select the parts of the material that we want.
- We should also always quote our data to prove that we have not cheated.
Copyright: A legal right given to someone who creates documents, pictures
or music. It means other people cannot use that work without
the permission of the copyright owner.
- Materials with a copyright will be marked with a © sign.
Music downloads:
A music bought and sold commercially is subject to copyright. This means we can
only use these music for personal use, not the permission to pass to someone else.
- It is illegal to upload music onto a peer-to-peer website.
Peer-to-peer website: It is also called a P2P site. A website where people
upload music and video so that other people can
download it, usually illegally.
UNIT 7.2 – Social and economic issues relating to the use of ICT
The use of ICT has influenced and changed a lot of pattern in our modern society.
 Industrial/ Manufacturing application:
- The introduction of CAD (Computer-aided design) allows designers to draw
their products on screen.
- The data from CAD is directly fed into the machine to produce the product,
known as CAM (Computer-assisted manufacturing).
- JIT (Just-in-time production) can be implemented as the use of ICT enables us
to order components as quickly as possible.
- Automated stock control manages the stock level, once it falls into certain
level it order goods automatically.
CAD: Computer-aided design. Uses a computer to produce
drawings of the design of a product. It may also be used for
automatic calculation of weights, strengths etc.
CAM: Computer-assisted manufacturing. Often uses output from
CAD packages. It uses computers to control the tools that
manufacture or assemble the products.
- People may be deskilled, as the machine is replacing the role of a worker.
- Some products are not suitable to be automatically manufactured.
 Commerce
E-commerce: It uses the Internet for commercial tasks such as selling
goods or services.
- Some businesses use the Internet instead of a traditional shop to reduce cost.
- E-commerce is convenient as people hasn’t got to travel to the business,
instead they can do it wherever with an Internet access.
 Changing the pattern of employment due to increased use of ICT:
After the introduction of ICT, some jobs have been created and some have been lost.
Examples includes: typewriter replaced by word processor; web administrator is
introduced as ICT is implemented.
 Teleworking:
Teleworking: Working from home using a networked computer rather than
travelling to a place of work every day.
 Social and personal effect of ICT:
After the implementation of ICT, it has changed how we behave in the society.
- More choices of communication.
- Personal websites allow us to let the world know what we up to.
- Instant messaging allow us to chat with a friend whilst working with others.
- Keep in touch with old friends.
- Politicians and celebrities can keep their message in the eyes of the public
using Internet.
However
- More difficult to relax and get away from pressure from daily life, as there are
so many ways to communicate.
 Equality of computer access and ICT skills:
- ICT and mathematical skills have been listed by the government as a basic
skills that all students will need.
- Computer for Pupils scheme aims to help some of the most disadvantaged
secondary-school children.
- One Laptop per child scheme is researching ways to provide computer access
to children in developing countries.

Advantage Disadvantage
- It reduces the time to travel.
- It reduces the money spent on
travelling.
- Wider range of employment as
we don’t have to live near the
work.
- Business reduces cost by using
less office space.
- Feel isolated
- Less able to discuss work problems
- Distractions
 Accessibility:
- People who are visually impaired can zoom and make the display bigger.
- Computers also allow us to change the colour of background and text.
- Specialist input devices: eye-tracking device, foot-operated mouse
UNIT 7.3 – Political, ethical and environmental issues relating to the use of ICT
National database:
- The DNA Database:
The UK police keeps a national DNA database.
They hold samples collected from crime scenes, and samples from individuals
in police custody.
 The European Court of Human Rights state that the store of DNA from
innocent people is illegal.
- National Identity Card:
The card holds biometric data and fingerprints to identify individual people.
Security and privacy:
- People are worried about privacy:
Data loss
Fear of identity theft
Use of CCTV:
CCTV Also known as the closed circuit television. It is an unmanned,
remotely mounted video camera system which is used to transmit live
pictures back to a television screen where developments can be
recorded and monitored.
Other means of society surveillance:
- The government wants to allow MI5 to monitor personal phone calls, emails
and web-browsing.
- The government hopes to spend £12 billion on a database to monitor personal
communication for every person in the UK.
- Some MPs are worried the cost and the ethical factors of it.
Advantage Disadvantage
Identify crime suspect “Big Brother” surveillance society
Deter crimes May be used for political purposes
Makes people feel safer
ICT to monitor environment:
As ICT has the ability to store and process huge amount of information very quickly:
- Ideal for collecting data about weather and climate.
- Predict the weather based on the collected data
- Help predict events such as flood, earthquakes, hurricanes and tornadoes
 Easier for us to prepare for natural disaster
Sustainability and recycling:
ICT can:
- Manage resources such as energy and raw materials
- Design and monitor an energy-efficient building.
- Control systems, such as heat system.
Impact of ICT on different population:
Makes people in the world easier to communicate:-
- As information flows through freely and quickly, the government cannot use
propaganda to broadcast biased information.
UNIT 8 – Using ICT responsibly
8.1 Health Issues for computer users
…………………………………………………………………………………………
There are many types of risks involved with ICT:
Eye problem It is caused by long time focusing on the screen.
Having screen glare and poor quality image on older
monitors make eyes hard to focus.
 They should use suitable resolution and brightness.
Users should also take regular eye test to check if their
eyes are healthy.
Wrist problem
RSI – Repetitive Strain
Injury
It is the aches, pains and muscle or tendon damage caused
by overuse of a keyboard and mouse.
 They should adopt a correct gesture when using
keyboard.
Stress The workers will have a high amount of stress if their work
are monitored closely.
 They should manage stress level appropriately.
Back and neck
problems
It is the pain and problems caused by sitting in the same
position for a very long time.
 They should sit correctly. Using an adjustable chair will
help. Our eyes must be in level with the screen. Feets
should be resting comfortably on the floor, and screens
can also be tilted.
Tripping As electrical cables sometimes run for a long distance in
offices, they may be easily tripped. Additional sockets
could be installed for this problem.
Heat As computer produces huge amount of heat, it is essential
to open windows and so that air could circulate around the
room. We could always use air conditioning. Switching
computers off could also save energy too!
Electrical safety Every electrical equipment should be checked for electrical
safety – this checks whether wires and plugs are damaged.
It reduces risks of electric shock and fire. Carbon dioxide
fire extinguisher should be used – indicated with a black
stripe.
 Surge: a sudden increase of voltage. Surge protector
plugs protects computer from voltage surges.
 UPS: Uninterruptable power supply: This means when
power fails, it provides power so that computers could
be switched off safely.
Hygiene Computers should be kept clean.
 Food and drinks don’t mix! They should be kept away
from computers.
 Wash your hands regularly.
 Specialist keyboard wipes could be used to keep
keyboard clean.
Lighting The lightings should be carefully designed so that it does
not cause glare and reflection on the screen – which causes
eye strain.
Blinds could be installed to block out sunlight. Diffused
lighting is likely to cause glare and reflection than normal
fluorescent tubes.
UNIT 8.2 – Responsible behavior online
Keeping yourself safe:
Online users usually create avatar and user names to represent themselves:
Avatar: A picture that you choose to represent yourself online. It is
safer than using a real picture of yourself.
- Never give your address, phone number or even full name for people you met
online.
- When we meet “online friends” in real life, meet them in a public place.
Grooming: A criminal offence where a person gradually builds up a young
person’s confidence online. They may then ask the young
person to meet them in person.
Respecting others:
As Internet is so free that everyone can view posts and comments, we may regret what
we have said in the past.
Cyber bullying:
Using computers and mobile phones in ways that make another person unhappy or
uncomfortable.
- It makes people feel impossible to escape.
When you get bullied:
- Tell an adult, i.e. teachers or parents.
- As cyber bullying leaves a trail of proof, save text messages and IM
conversations. Tale screenshots of it so that it is easier to tackle them.
- As the bully wants a reaction – so that they feel they look clever and funny, if
we don’t give them reaction, they feel bored and move on.
E-mails:
There are two types of junk email:
Chain emails: E-mails that encourage you to make lots of copies and send
them to everyone in your address book, making the chain
longer. Sometimes they threaten you that bad things would
happen if you break the chain.
Flaming emails: E-mails that contains angry and abusive messages.
Filtering contents:
Some organizations use content-filtering software which they restrict people
accessing to “hate website”, such as violence, pornography. Some systems also filter
certain words in email – they are usually reviewed by the system manager before they
decide whether they are passed on or not.
UNIT 9 – Collaborative working
UNIT 9.1 – Principles and processes of collaborative working
…………………………………………………………………………………………
Collaborative working: where people work together to reach a common goal.
When several people are working on a document, usually a house style is agreed
before the work starts.
House style: an agreed set of layout and format rules that might involve logo
placement, fonts, colour schemes etc.
It is often known as recursive process, where each person works in a chain to improve
and refine until everyone is happy about it.
Recursive: A process that is repetitive, for example where a document is
revised, edited and proofread to improve the final product.
When everything is agreed, the artwork is sent to publishing, i.e. being printed.
Artwork: The version of a document that is sent to a printer. It includes
the text of the document, not just the pictures and photographs.
Group plan:
A group plan is essential to reduce conflict and increase consistency.
- Everyone has their own opinions.
- The plan is the best way to achieve a common goal, as it takes everyone into
account.
- The plan has a milestone on it.
Milestone: Key points that must be reached by a certain date if a project is
to be completed on time.
Deadline: An established date by which tasks have to be completed.
Project Management:
It makes sure that a project is completed on time, within the budget, and it meets all
overall objectives.
Communication:
It makes the group members aware of other people’s work schedule, and meetings
could be syndronised. It also allow more discussions and opinions to be heard.
- The introduction of ICT has broaden the way that we could communicate. It
also enable us to communicate much more quicker than we used to.
 Emails:
They are not expensive and are quicker than a traditional letter. They are
very popular way of exchanging information and sending files from one
member to the another.
 Instant messaging:
It allows two or more online user to have a text conversation in real time.
They can also transfer files. Nowadays most IM software also allows voice
and video chat.
 Chat room:
People can log onto the chat room and type and read messages from others.
Companies nowadays use it for customer support.
 Voice over Internet Protocol (VoIP):
A method of using Internet technologies to make phone calls.
It is a way that transmit the sound of voices over the Internet. They allow
us to make phone calls without paying the telephone company. It cuts
down phone call bills.
Good project management:
All projects need:
 Agreed list of who is responsible for each one.
 Clear schedule on milestones.
 A list of resources, such as software and hardware, that is needed for each task.
 Agreed budget that must be kept to.
 A method of managing it, such as project management software.
 A final deadline for the project.
Project Management Software:
It is a computer program to help plan projects and resources.
- It allows project managers to keep track of the project.
- Gantt chart is often used to display time limit per milestone.
Gantt chart: Diagrams that show a schedule of individual tasks as they occur
over the period of time during which the project is developed.
Workflow management software:
It is a computer program that help a business to manage the flow of a project.
- It passes data to people who needed it within the project.
- It helps managers to keep track of the progress, and model possible effects.
- It helps the business to organize resources effectively.
A Good Team:
- Other members should review and criticize others’ work.
- Constructive criticism allows you to review and make your ideas better.
- Good communication.
- Planned meetings
- Minutes should be written in meetings and a conclusion should also be written
into it.
Videoconferencing:
Using ICT to hold virtual meeting with two-way video and audio transmitted in real
time.
 It saves time and money as team members are not required to travel for a meeting.
 Saves money for an expensive meeting rooms.
 Arranged quickly.
 Still also allow people to see body languages and emotions.
However
 Needs high bandwidth.
 Cannot interact in the same way as a traditional meeting.
 Team members cannot talk at once.
Teleconferencing:
Using ICT to hold a virtual meeting using text and sound but not video.
 Needs less bandwidth.
 Only allow one person talking at a time.
Bulletin board:
Online discussion spaces where people can post messages and get responses from
other people.
The use of virtual learning environments encourages teachers and students to work
collaboratively, as they could access school materials from home.
Files
File permissions are used to control access of a file in the network.
- The actions that users are allowed to perform on a file, for example read only
or read/write.
 Network management software keeps track on who has worked on a file.
Intranet: A network within an organization, which looks like a website but only
available within the company.
Wikis: They are web pages that allow people to read them to edit or add
content into them.
Collaborative documents:
 Most word processors have “comment” feature that add comment to a document.
 It also set to track changes: when the document is edited, the edited part will
display a different colour; deleted texts have a line across them instead of being
vanished.
Sharing files:
We have to ensure no one works on an out-of-date file.
Version controls: A system put in place to make sure that people working
collaboratively do not use old versions of a document by
mistake.
- I.e., adding a version number or date of file name.
Back ups:
It ensures a secure copy of the data exists if the original one is accidentally corrupted
and deleted.
 Usually back ups are stored in removable medias, away from main computers.
 Online storage space can also be used.
Home collaborative working:
Remote access: The ability for users to log on to a network from a
location outside the building where the network is.
 Useful when people is working outside the office.
 Imposes security risks.
 A secure, reliable network is needed so that files that is worked at home
are backed up and uploaded regularly.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Beginning computer basics
Beginning computer basics Beginning computer basics
Beginning computer basics
 
Chapter01Introducing Hardware
Chapter01Introducing HardwareChapter01Introducing Hardware
Chapter01Introducing Hardware
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 Exercises0417 IGCSE ICT Chapter 1 Exercises
0417 IGCSE ICT Chapter 1 Exercises
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Cpu presentation
Cpu presentationCpu presentation
Cpu presentation
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Input and output devices ppt
Input and output devices pptInput and output devices ppt
Input and output devices ppt
 
Basics of Computer.ppt
Basics of Computer.pptBasics of Computer.ppt
Basics of Computer.ppt
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
The Inside of a Computer
The Inside of a ComputerThe Inside of a Computer
The Inside of a Computer
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
 
Computer Components
Computer ComponentsComputer Components
Computer Components
 
Basic of computer
Basic of computerBasic of computer
Basic of computer
 
Monitor troubleshooting
Monitor troubleshootingMonitor troubleshooting
Monitor troubleshooting
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Ms word 2010
Ms word 2010Ms word 2010
Ms word 2010
 

Andere mochten auch

Tourism revision
Tourism revisionTourism revision
Tourism revisioncpugh5345
 
Cells and cell specialization
Cells and cell specializationCells and cell specialization
Cells and cell specializationSophia Butler
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionSnowfairy007
 
AQA AS ICT INFO1 Revision
AQA AS ICT INFO1 RevisionAQA AS ICT INFO1 Revision
AQA AS ICT INFO1 RevisionSnowfairy007
 
English GCSE Revision Tips
English GCSE Revision TipsEnglish GCSE Revision Tips
English GCSE Revision TipsN Jones
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)NILISSL
 
Specialized Cells, Biology
Specialized Cells, BiologySpecialized Cells, Biology
Specialized Cells, Biologyfatimaalzahraa
 
Robogals SINE 2017 - Event management
Robogals SINE 2017 - Event managementRobogals SINE 2017 - Event management
Robogals SINE 2017 - Event managementKelvin Lam
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excelsam ran
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMridul Bansal
 

Andere mochten auch (16)

GCSE ICT
GCSE ICTGCSE ICT
GCSE ICT
 
AQA Computer science easter revision
AQA Computer science easter revisionAQA Computer science easter revision
AQA Computer science easter revision
 
ICT revision
ICT revisionICT revision
ICT revision
 
Specialised Cells
Specialised CellsSpecialised Cells
Specialised Cells
 
Tourism revision
Tourism revisionTourism revision
Tourism revision
 
Cells and cell specialization
Cells and cell specializationCells and cell specialization
Cells and cell specialization
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
 
AQA AS ICT INFO1 Revision
AQA AS ICT INFO1 RevisionAQA AS ICT INFO1 Revision
AQA AS ICT INFO1 Revision
 
English GCSE Revision Tips
English GCSE Revision TipsEnglish GCSE Revision Tips
English GCSE Revision Tips
 
Worksheet2
Worksheet2Worksheet2
Worksheet2
 
Gcse pe revision booklet
Gcse pe revision bookletGcse pe revision booklet
Gcse pe revision booklet
 
Information communication technology (ict)
Information communication technology (ict)Information communication technology (ict)
Information communication technology (ict)
 
Specialized Cells, Biology
Specialized Cells, BiologySpecialized Cells, Biology
Specialized Cells, Biology
 
Robogals SINE 2017 - Event management
Robogals SINE 2017 - Event managementRobogals SINE 2017 - Event management
Robogals SINE 2017 - Event management
 
Teaching Excel
Teaching ExcelTeaching Excel
Teaching Excel
 
MS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATIONMS EXCEL PPT PRESENTATION
MS EXCEL PPT PRESENTATION
 

Ähnlich wie GCSE ICT Revision

Ähnlich wie GCSE ICT Revision (20)

Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
_What is Hardware_ ,details, perform(2023) .pdf
_What is Hardware_ ,details, perform(2023) .pdf_What is Hardware_ ,details, perform(2023) .pdf
_What is Hardware_ ,details, perform(2023) .pdf
 
Ipc 01
Ipc 01Ipc 01
Ipc 01
 
Computer Organization
Computer OrganizationComputer Organization
Computer Organization
 
Computer Organization
Computer OrganizationComputer Organization
Computer Organization
 
Hardware pt 2
Hardware pt 2Hardware pt 2
Hardware pt 2
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
 
CT01 Computer Basics
CT01 Computer BasicsCT01 Computer Basics
CT01 Computer Basics
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
A+ hand out
A+ hand outA+ hand out
A+ hand out
 
Computer systems for school kids
Computer systems for school kidsComputer systems for school kids
Computer systems for school kids
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Lec 2
Lec 2Lec 2
Lec 2
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
K K
K KK K
K K
 
Hardware
HardwareHardware
Hardware
 
Lecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating SystemsLecture 2 - Computer Hardware & Operating Systems
Lecture 2 - Computer Hardware & Operating Systems
 
Icdl Medual 1
Icdl Medual 1Icdl Medual 1
Icdl Medual 1
 
002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf002_Fundamentals of Computer.pdf
002_Fundamentals of Computer.pdf
 

Mehr von Kelvin Lam

Robogals SINE 2018 - Building an effective team
Robogals SINE 2018 - Building an effective teamRobogals SINE 2018 - Building an effective team
Robogals SINE 2018 - Building an effective teamKelvin Lam
 
Robogals SINE 2018 - Public Speaking Workshop
Robogals SINE 2018 - Public Speaking WorkshopRobogals SINE 2018 - Public Speaking Workshop
Robogals SINE 2018 - Public Speaking WorkshopKelvin Lam
 
Robogals SINE 2018 - Managing Vision & Purpose Seminar
Robogals SINE 2018 - Managing Vision & Purpose SeminarRobogals SINE 2018 - Managing Vision & Purpose Seminar
Robogals SINE 2018 - Managing Vision & Purpose SeminarKelvin Lam
 
Robogals SINE 2017 - Collaboration
Robogals SINE 2017 - CollaborationRobogals SINE 2017 - Collaboration
Robogals SINE 2017 - CollaborationKelvin Lam
 
Robogals SINE 2017 - STEM Workshop Communication Essentials
Robogals SINE 2017 - STEM Workshop Communication EssentialsRobogals SINE 2017 - STEM Workshop Communication Essentials
Robogals SINE 2017 - STEM Workshop Communication EssentialsKelvin Lam
 
ETOPS - Extended Twinned Engine Operations
ETOPS - Extended Twinned Engine OperationsETOPS - Extended Twinned Engine Operations
ETOPS - Extended Twinned Engine OperationsKelvin Lam
 
Pantograph Failure & Analysis
Pantograph Failure & AnalysisPantograph Failure & Analysis
Pantograph Failure & AnalysisKelvin Lam
 
Pantograph II - Failure Analysis, Monitor & Testing Regime
Pantograph II - Failure Analysis, Monitor & Testing RegimePantograph II - Failure Analysis, Monitor & Testing Regime
Pantograph II - Failure Analysis, Monitor & Testing RegimeKelvin Lam
 
Pantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlPantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlKelvin Lam
 
A2 Chemistry Unit 5
A2 Chemistry Unit 5A2 Chemistry Unit 5
A2 Chemistry Unit 5Kelvin Lam
 
A2 Chemistry Unit 4
A2 Chemistry Unit 4A2 Chemistry Unit 4
A2 Chemistry Unit 4Kelvin Lam
 
Injection Moulding
Injection MouldingInjection Moulding
Injection MouldingKelvin Lam
 
Introduction to Amateur Radio
Introduction to Amateur RadioIntroduction to Amateur Radio
Introduction to Amateur RadioKelvin Lam
 
The electric motor
The electric motor The electric motor
The electric motor Kelvin Lam
 
How does a jet engine work
How does a jet engine workHow does a jet engine work
How does a jet engine workKelvin Lam
 
Elasticity - AS Economics
Elasticity - AS EconomicsElasticity - AS Economics
Elasticity - AS EconomicsKelvin Lam
 
Air traffic control & air navigation
Air traffic control & air navigationAir traffic control & air navigation
Air traffic control & air navigationKelvin Lam
 

Mehr von Kelvin Lam (17)

Robogals SINE 2018 - Building an effective team
Robogals SINE 2018 - Building an effective teamRobogals SINE 2018 - Building an effective team
Robogals SINE 2018 - Building an effective team
 
Robogals SINE 2018 - Public Speaking Workshop
Robogals SINE 2018 - Public Speaking WorkshopRobogals SINE 2018 - Public Speaking Workshop
Robogals SINE 2018 - Public Speaking Workshop
 
Robogals SINE 2018 - Managing Vision & Purpose Seminar
Robogals SINE 2018 - Managing Vision & Purpose SeminarRobogals SINE 2018 - Managing Vision & Purpose Seminar
Robogals SINE 2018 - Managing Vision & Purpose Seminar
 
Robogals SINE 2017 - Collaboration
Robogals SINE 2017 - CollaborationRobogals SINE 2017 - Collaboration
Robogals SINE 2017 - Collaboration
 
Robogals SINE 2017 - STEM Workshop Communication Essentials
Robogals SINE 2017 - STEM Workshop Communication EssentialsRobogals SINE 2017 - STEM Workshop Communication Essentials
Robogals SINE 2017 - STEM Workshop Communication Essentials
 
ETOPS - Extended Twinned Engine Operations
ETOPS - Extended Twinned Engine OperationsETOPS - Extended Twinned Engine Operations
ETOPS - Extended Twinned Engine Operations
 
Pantograph Failure & Analysis
Pantograph Failure & AnalysisPantograph Failure & Analysis
Pantograph Failure & Analysis
 
Pantograph II - Failure Analysis, Monitor & Testing Regime
Pantograph II - Failure Analysis, Monitor & Testing RegimePantograph II - Failure Analysis, Monitor & Testing Regime
Pantograph II - Failure Analysis, Monitor & Testing Regime
 
Pantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction ControlPantograph I - Analysis on Pantographs & Traction Control
Pantograph I - Analysis on Pantographs & Traction Control
 
A2 Chemistry Unit 5
A2 Chemistry Unit 5A2 Chemistry Unit 5
A2 Chemistry Unit 5
 
A2 Chemistry Unit 4
A2 Chemistry Unit 4A2 Chemistry Unit 4
A2 Chemistry Unit 4
 
Injection Moulding
Injection MouldingInjection Moulding
Injection Moulding
 
Introduction to Amateur Radio
Introduction to Amateur RadioIntroduction to Amateur Radio
Introduction to Amateur Radio
 
The electric motor
The electric motor The electric motor
The electric motor
 
How does a jet engine work
How does a jet engine workHow does a jet engine work
How does a jet engine work
 
Elasticity - AS Economics
Elasticity - AS EconomicsElasticity - AS Economics
Elasticity - AS Economics
 
Air traffic control & air navigation
Air traffic control & air navigationAir traffic control & air navigation
Air traffic control & air navigation
 

Kürzlich hochgeladen

Optical Fibre and It's Applications.pptx
Optical Fibre and It's Applications.pptxOptical Fibre and It's Applications.pptx
Optical Fibre and It's Applications.pptxPurva Nikam
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptxmary850239
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSyedNadeemGillANi
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17Celine George
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 

Kürzlich hochgeladen (20)

Optical Fibre and It's Applications.pptx
Optical Fibre and It's Applications.pptxOptical Fibre and It's Applications.pptx
Optical Fibre and It's Applications.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptxSOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
SOLIDE WASTE in Cameroon,,,,,,,,,,,,,,,,,,,,,,,,,,,.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 

GCSE ICT Revision

  • 1. ICT Revision Unit 1 – Introducing ICT UNIT 1.1 – Computer Systems A computer system is composed of the hardware and software components. The three main stages that is involved in information processing:  Input: it is how the data is captured.  Processing: the system is performing a task based on the program using the data.  Storage: the program is stored in the system.  Output: the results/outcome from the computer system. Hardware Hardware: the physical component that forms a computer system. Examples of a hardware:  Mouse  Monitor  Printer  Microprocessor (a chip that contains CPU, central processing unit) Motherboard: It is the main circuit board of a computer. It contains the CPU, memory chips and various connections. Backing storage: The hard – drive. Video card: A circuit board that generates a video output. Sound card: A circuit board that deals with the input and output of the sound. Internal memory: The ROM (read-only memory) and RAM (randon-access memory) Storage ProcessingInput Output
  • 2. Software: Software: A program/ set of instructions that the processors run in order to carry out the task that the user requires. There are two types of software: Operating system and applications software Operating system: It controls and manages the computer, i.e. Windows, Linux. Application software: It is computer program that is designed to carry out specific tasks, i.e. Microsoft Word, Methods of processing: Interactive processing It response to the input of the user. Most home computer uses interactive processing. Real-time processing It allows carrying out several tasks at once. For example, running a word processor and spreadsheet software at the same time. Online processing It is when the computer is working via an Internet connection. Multi-user system It allows many users to log in at once. For example, a website allows several users at once to book tickets.
  • 3. Internal memory: There are two types of memory: ROM and RAM ROM: Read - only memory, it is a permanent memory and will not be lost in a power cut. It is non-volatile. It contains information that allows a operating system to be loaded into the RAM from the backing storage (i.e. hard drive). The data cannot be written into it. RAM: Random-access memory, it is the memory that could be read from, or written into it. There is both volatile and non-volatile RAM memory. Volatile memory will be lost if the power is not supplied into it; while non-volatile memory requires power to change its content. It is a temporary store of data. Input/Output devices: Input device: It allows data to be entered into the computer system. For example, QWERTY/Concept keyboard, a computer mice. Output device: It allows results of the data processing to be displayed. This includes a speaker, monitor, printer etc.
  • 4. UNIT 1.2 – The Operating System Most operating system has an user interface. User interface: The way the user interacts with the computer. Most computer nowadays use a GUI Graphical User Interface: It is an interface with icons, windows, menus, pointers etc. It is easy to use and versatile. However, it is cumbersome as the user has to remember what all the features mean, i.e. icons. Features of a GUI:  Icon  Icon size  Menu  Submenu  Pointer  Buttons  Hyperlinks/ hotspot  Window  Close  Minimize / Maximize  Restore  Resize  Toolbar  Scroll bar  Dialogue box  Drag and drop  Screen resolution  Desktop contrast  Adjust volume  Set date and time Menu user-interface: it allows users to choose from a restricted list of options. File path: it is the address to specifies exactly where the file is stored. File extension: it is a code that defines the type of the file.
  • 5. File name rules: - Some operating system prohibits the use of symbols or special characters. - Keep them short. - Put file extensions, so that the system could open and use the relevant program to open the file. Encoding data: To reduce the file size, codes are used to replace the original data. Encoding: replacing data with a code that shortens it, i.e. replacing male with M.  Quicker and easier input.  Makes it easier for retrieving data.  Reduce error  Less disk space required to store the file. Dialogue box: It is a small secondary window that displays information to the user. The simplest form involves an alert message and an acknowledgement such as “OK”. Computer system errors: File corruption: the data in the file is unreadable. This happens as the file is changed or damaged in some way so that it cannot be opened by the original software. Freezing: The computer stops responding to commands. We can use the task manager (Ctrl+Alt+Del) which allows the user to close the package. It occurs as the computer is running low at hard-drive space or RAM. Error messages: They are messages that contains the error information and the instructions that the user should follow.
  • 6. Storage full: It occurs as the computer is running low at storage space. The system is likely to slow down and freezes. We could delete files, archive them or copy them into a removable memory. Printers: This involves i.e. paper jams. We can switch the printer off, then remove any jammed paper. Obtaining help for an error: We could use:  On-site technician/support service: they usually need the details of the problem, then discuss the possible solution for the user. They could also arrange a visit from an engineer. Some service also has a remote access to your computer to fix/find more about the problem.  Internet research: this is ideal for working from home. Many bulletin boards offers simple solution to the problem. Some software houses have support sections. We could also pay a visit to the local computer shop.
  • 7. UNIT 1.4 – Input and output devices There are many types of input devices:  Keyboards Concept keyboard: Each key presents a specific data, i.e. apple, milk, they are simple to use and avoids error by restricting choices to a limited number of options.  Mouse Optical mouse: It uses a light beam instead of a rolling ball. It does not need a mouse pad and does not clog dirts into it.  Microphones  Digital (video) camera  Touch screen Some touch screens need a stylus, some only needs your fingertip.  Magnetic strip It stores a limited amount of data. It is commonly found at the back of the plastic card.  Sensors  Automatic data-capture devices It reduces mistakes and speed up data entry.  Bar code reader A bar code is a printed pattern of black lines that represents a number. The bar code reader has a checking facility, which is based on calculation. The bar code reader checks it against the last number in the barcode. If it doesn’t, it beeps and the operator manually enters the number. It is commonly used in supermarkets and library.  OMR Optical mark recognition, the data is entered as the user shades in the boxes on a printed sheet. The sheet is scanned for the position of the mark.  OCR Optical character recognition, this scans a printed document and convert it into text characters. It can also reads a handwritten form. The form usually contains boxes so that the writing can be seen clearly.
  • 8. There are also many types of output devices:  Monitor The image on the screen is made up of pixels. Higher the pixels gives a more detailed display.  Printer Inkjet printer involves ink sprayed on the paper. It is cheap to buy but the ink is expensive. Laser printers uses a powdered toner. It produces an excellent quality print and it is cheaper to print a page than an inkjet printer. However, it is expensive to buy. It also has a buffer, which is a memory store for the document. It frees up computer memory so that the computer continues to work at a good speed. Buffer: temporary storage areas in the printer which hold the data waiting to be printed.  Speaker Some computers have an internal speak that produces low quality output (i.e. a beep).  Digital projector It is ideal to project a large image of the computer output. It is very expensive and is likely to fail if it is not shut down properly.  Plotters It draws complex outlines, i.e. engineering drawing. Some plotters also cuts out the sheet material.  Actuators They are devices that performs an action in response to a signal from the computer, i.e. the motor in a computerized arm.
  • 9. UNIT 1.5 – Storage devices and media Units of storage: Byte 1B Kilobyte Over 1000B Megabyte Over 1000KB Gigabyte Over 1000MB Terabyte Over 1000GB Backing up: To avoid data being lost as it is stolen/deleted/corrupted, we use back up copies. Backing up: Copies of data stored in case the original is stolen/ becomes corrupted. Types of storage: Hard drive: - It can store a lot of data. - It is robust - It is fast - It is reliable - BUT, it takes up a lot of physical space. Optical drives/media: - For example, a CD or a DVD - Laser beams are used to write/read data from them. Flash memory: - They are small. - BUT easy to lose and damaged. Magnetic cartridges: - I.e. DAT, tape drives - Often used in server back up.
  • 10. Specialist storage media: Virtual Memory:  This involves using a hard drive as a temporary store rather than using RAM. This makes the computer behaves as it would have more RAM in it. Online storage:  It has the advantage that is away from main computer. This makes data easily accessible anywhere with an Internet connection. It is also safe in case of fire and flood.  It also has security risks – we have to trust the company that holds our data. Storing and sharing photographs:  Some websites allows us to share/store photographs online.  We can choose to keep photographs private or allow others to see them.
  • 11. UNIT 1.6 – Communication networks and entertainment Network: - It is a group of computers connected together. World Wide Web (www): It is a system of Internet servers that supports a collection of web pages on the Internet which hyperlink to each other. - The development of broadband allows people a high-speed Internet access at a fairly low cost. - The Internet allows businesses to advertise their products and services via e- commerce. This means they can reach a wider range of customer, or even sell its goods internationally. - It allows people to entertain themselves by playing games or downloading music or videos. - BUT, it increases the chance of damage of data caused by virus. Local Area Network (LAN): It is a network connecting computers in the same area/room/building. It connects computers in a limited range. It could be done either by cable or through wireless technology. Wide Area Network (WAN): A network that covers a geographical area larger than a single building. It uses telephone and cable networks, or satellites to transmit data. It could be in a national or global range.
  • 12. Communication methods: Telephone: Mobile phones are convenient, but they cost more to make a call than using a land line. They can also send out SMS (text messages). VoIP: Voice over Internet Protocol. These phones uses Internet to transfer voice messages to other users. These calls are free. Email: They are messages that are sent to other person’s email address. They arrive quickly and are cheap to send. Fax: They are less commonly used now. This involve scanning a document and sending the image to the other fax machine using telephone lines. The advantage is that neither of the user needs a computer. Internet connections: Some computers use a dial-up connection, which uses connection tied up with telephone line. Most areas in the UK, telephone exchanges have been adapted to deliver a broadband connections. Modem: Electronic devices which connects computers via a telephone line. It converts analogue data into digital data, or vice versa. Digital Signal: Signals that take only two values, on or off, in binary. Analogue Signal: Electrical signals that varies continuously. Wireless technologies, such as Bluetooth or WiFi, are used. Bluetooth basically involves two devices connecting together instead of using a cable. WiFi is used to connect devices to communication network.
  • 13. Bandwidth measures the internet connection speed: Bandwidth: The rate at which data can be transferred. If the bandwidth is too slow, data is transferred very slowly. Broadband has a much higher bandwidth than narrow band, giving a faster data transfer rate. Mobile broadband connection involves the use of a dongle with a SIM card. Dongle: A small piece of hardware that connects a computer’s USB port. SIM Card: Subscriber Identity Module Card, it is a small electronic that is inserted into the mobile phone that provides an unique ID for that phone. Server are used to manage computer networks.  File servers: it manages the files stored on the network.  Printer servers: it manages printers and print jobs sent to them.  Web servers: it manages files that make up the webpage.  Email servers: it manages the email messages for distribution for users. There are different types of entertainment system: TV (Terrestial, Digital, Cable, Broadband) Terrestial TV are connected to an aerial. Digital television are connected to a set-top box or a digital TV. Cable TV companies offers TV services delivered using network of underground cables. We can also now watch TV or radios on our computers using the broadband Internet service. Home entertainment: We can store up TV programmes in hard drives, as they are delivered digitally. Integrated Entertainment System: Systems that combine a range of devices offering visual, video, musical, audio and gaming entertainment. I.e., a TV which is connected to gaming console, video player etc.
  • 14. Music and film downloads: We can now download musics and videos online to our computers.
  • 15. UNIT 2 – System Life Cycle A system life cycle shows how a system changes. It is the series of cycle that a newly implemented system has to go through. Stages in the system life cycle includes: Feasibility study It is an investigation that is carried out by a system analyst to spot out main problems in the existing system. It then see whether it is technically and economically possible to solve the problem using a computer based solution. Analysis System analysts investigate the existing system to identify the exact problem. Variety of ways, such as interviews and questionnaires, are used to gather information. A reasonable sample size should be used. Bigger the sample size gives a higher reliability, but also a higher cost. Design It outlines how the new system is able to solve the problem. It also specifies how the system is to be constructed, and how it is tested using a test plan. It includes the information about: Input and Output devices Data storage User Interface Backup and recovery procedures Security measures It also draws up a testing plan.
  • 16. Implementation It is setting up the system so that it meets the design specification. It should follow the plan for construction, and tests should be done following the test plan. Any improvement changes at this stage should also be documented. At the end of the implementation stage, there should be a working system, and documented changes that were made to the system. Testing It ensures mistakes are corrected before moving onto the next stage. It is important to keep a record of the test. User testing, more known as beta testing, should also be documented. User training and documentation The system analyst should decide how the training should be done, based on different types (i.e. experienced or novice) users. The system should also be documented on how it works and what the structure is. Evalutation (& monitor) It is looking at the system carefully to see whether the system meets the performance criteria from the analysis stage, and judge how successful the new system has meet them. If the performance criteria is not met, it will examine the cause and look at what can be done to meet them. Maintenance This involves monitoring the system closely to see if it continues to perform at an acceptable standard. This involves spotting errors that are not originally discovered, or adding/editing features of the system (i.e. changing VAT rate from 15% to 17.5%). Updates usually comes from patches. Or otherwise, the cycle starts again if the user thinks it should be completely redesigned or replaced. Patches: They are a piece of code that updates a software package.
  • 17. Planning for construction:  Time planning: It is setting a time limit to complete each of those tasks tem is finished on time.  System design: It is the exact design tasks on how the system would be completed. It works out how the system will meet the performance criteria, and the user interface would be.  Functional design: To decide what software would be the best to construct the system.  Interface design:  Hardware: The analyst should outline how the user could use the user interface using input and output devices.  Screen layouts: The layout of the interface should take care of what users there are. This involves choosing the right font style and size, colours so that it is easy to read.  Design Sheets: There should be designs for all screens in the system, and it should be documented what each object (i.e. icons) does. Finding good quality information: - CD ROMS/DVD packages are accurate as these data are checked before they are published. - Specialist magazines are available and they have good comparison between different products. - WiKi could be edited by everyone so it is not accurate.  We should always compare data between different sources. This will allow us to know whether it is accurate or biased.  Check the publication date to know whether it is outdated or not.
  • 18. UNIT 3.1 – Application Software Application software are designed to carry out user-related tasks. They are task specific. Task specific: It has a number of features that carries out particular jobs. Word Processor Microsoft Word, OpenOffice Writer Desktop Publishing Software Microsoft Publisher, Adobe InDesign, Serif PagePlus Presentation Software Microsoft PowerPoint, OpenOffice Impress, StarImpress, GoogleDoc Presentation Graphics Software Photoshop, GIMP Web-design software Dreamweaver, Frontpage Spreadsheet Software Microsoft Excel Database Microsoft Access Web browser Internet Explorer, Mozilla Firefox Many software shares common features, known as generic features. This includes: - Help - Edit text size - Copy - Cut - Paste Open source & proprietary software Open Source: The software code is freely available to be used, copied and edited. For example, Linux operating system. Proprietary Software: It is the software that we pay to use, however we are not given the access to the code and not permitted to change the code. For example, Microsoft Windows.
  • 19. Advantage of open source software Advantage of proprietary software It is free It usually has a good service and follow- up support The code is developed collaboratively, which means that the new features and bug fixing can be done quickly It comes with automatic updates It could be customized for specific application The code is more robust and reliable as the company takes the liability of it. There are different types of installations: Hosted software: They are stored online but users can use them with an Internet connection. Locally-installed software: These software are installed within the computer system. Hosted applications Advantages Disadvantages Low start-up cost: little storage in the computer is required Users have to be online to use it Does not require updates: this is done centrally within the server Depend on the Internet connection Backup is done automatically by the software developer. Lack of control and security over stored data. Can be accessed anywhere in the world with Internet connection Locally-installed applications Advantages Disadvantages User has more control over the data. Involves a large start-off cost Does not rely on the Internet connection: it has full functionality even if it is offline Users have to download updates. Uses a lot of the computer memory.
  • 20. UNIT 3.2 – Word Processing and desktop publishing Word processor: A type of application software used to create text documents. Desktop publishing: It is also known as DTP. It is a type of application which creates printed material containing text and images. The common features between both includes: - Edit Text - Columns - Spelling & Grammar Check Choosing between word processor and DTP: Word Processor is ideal for:  If the document does not need to look professional  Simple layout  (Text only)  I.e., a letter DTP is ideal for:  Create a professional looking document  Images and logos have to be more accurately placed for appearance.  Organising large amount of photographs  (Documents containing both pictures and texts)  I.e., a leaflet/poster
  • 21. UNIT 3.3 – Presentation Software Presentation Software: It is software that used to create slideshows. Text, graphics, videos and sound can be used. Features of presentation software:  Insert slide  Enter or edit text  Insert pictures  Insert buttons  Create hyperlinks  Adding animation to slides (It can make the presentation attractive. Timings can also be used to trigger different transitions and animations.) - Presentations can be viewed either on screen, or on paper. - It can be viewed on a monitor, or projected into a large screen. - Paper handouts can also be created for the members of the audience. Professional looking presentation - They should use a consistent colour scheme and a simple layout. - We could also use a template with text frames and title.
  • 22. UNIT 3.4 – Graphics production and image manipulation Graphics/Image Manipulation Software: They are used to create and draw images, as well as editing images and photos. For example, Adobe Photoshop Common features includes: - Cropping a photo - Changing the colour tone - Changing the image size so that it is easier to be transferred - Clearing up marks that appears on a scanned document The tools in a image manipulation software includes:  Brush/Airbrush  Shading  Text box  Layering  Filters Filter: It is a process that changes the appearance of the image. Filters are often used to create specific effects, i.e. blur, pixelate and adding brush strokes. Drawing storage: Drawings are either stored in bitmap or vector. Bitmap: The graphic is stored using a series of coloured dots. This kind of drawings is large.  Resolution is the amount of pixels making up the image. More pixels used in the image, sharper the image. But also more file size is used. Vector: The image is stored as coordinates and equations. For example, a red circle is stored as a circle equation and coordinate of the centre. It is much easier to be edited, and does not affect image quality if it is resized.
  • 23. UNIT 3.5 – Web design A website is a collection of web pages, linked together using hyperlinks. Before we create a web page, we should first sketch out the outlines and structures of each page, and specific where does the hyperlink leads to. Most websites are designed using a template/ master page. - This is what the majority of the web pages are based on. Usually the template contains a menu/navigation bar. We can identify which areas of each page is part of the template, as they appear on each page. Features of a web design software: - It is able to add text, pictures etc. - Convert our websites into HTML format, a standard code for our web browsers to understand. - Using master pages and templates. Things that could be included in a webpage Master pages: they are pages containing objects that need to appear on all pages. They save a lot of effort and are very consistent. Templates: they are partially-completed pages. We just have to edit the heading/change the texts etc. Marquee: an effect that makes text scroll across. RSS Feed: it allows people to subscribe to our website. Hyperlinks: it links different web pages together. Animation: they are moving images. Forms: they capture information from users. Hotspots: they are hyperlinks on an image. Navigation bar: Menu of hyperlinks on each page of a website. Counters: To see how many visitors have viewed the website.
  • 24. Flash: - It is application software that is used to create effects for websites, i.e. a moving icon, short movie or rotating photo. The most common software package for flash is Adobe Flash. Publishing website onto the Internet: - We can first use our web browser to view the webpage, and see if all the hyperlinks work. - We need to then upload the webpage into an online server. HTML (Hypertext Mark-Up Language): - Most of the web-design software has a code view (editing HTML code) and design view (WYSIWYG) - “What you see is what you get”  It is a term that describes software that allows user to view something very similar to the end result while the document is being edited.  Some web developers develop websites using WYSIWYG editor, then remove unwanted code in HTML editor to reduce file size.
  • 25. UNIT 3.6 – Software for audio, DVD and video players Features of a media player: - Listen to audio.  Play/Start  Stop  Pause  Forward  Backward  Volume Adjustment  Mute - Watch movies. - Create playlists Play lists: A list of songs selected from a library. Media files can either be downloaded or streamed. Downloading media files: It is any piece of music that we have transferred from an online website to local computer. We can pay and download these music from websites i.e. Apple iTunes, Amazon MP3. Streaming: Streaming: Multimedia content is played back to the end user whilst it is still being downloaded. It allows us to watch the video/listen to the music before it is fully downloaded.
  • 26. UNIT 3.7 – Transferring data between application Some application software has the ability to transfer data from one application to another. This is done by either import or export tool. Import: Transferring a file that was created in one application software package into applications software that is currently open. Export: Preparing a file that is currently open so that it can be opened in different application software. Examples of transferring data:  Documents with an extension of .doc can be saved into .html files so that it could be used by other web design softwares.  Images created from Adobe Photoshop with a file extension of .psd can be stored as .jpg so that they could be opened by other image editing software.  Spreadsheet files can also be stored in .csv (Comma Separated Values) so that it can be opened by other application software, i.e. Microsoft Word.
  • 27. UNIT 3.8 – Designing documents using accepted layout When we create a document, we should consider the layout of it by considering:-  So that it could be read easily.  Fit for purpose.  Relevant to your audience. There are some rules in different types of documents: Printed Letters: It contains the address of the recipient and the sender, the date and sign off. It is found in designated place of the page. Posters and flyers: It uses a short title. Avoid using many different colours, fonts and effects. This makes it cluttered and difficult to read. Web page: It should be clearly labeled so that the user can read it at a glance on which page they are on. It should also contain a navigation bar, which is found on same location of each page. Presentations: Do not include too much texts on a page. We should stick to a small number of bullet points. We should also use images and multimedia to add interest. - Many documents have an accepted layout, i.e. a business letter. Many word processors, i.e. Microsoft Word, usually provides templates for a variety of document types.
  • 28. UNIT 4.1 – Application Software 2 – Spreadsheet and Modelling Software Spreadsheets and databases are types of applications software used to store, manipulate, ouput information and data. Spreadsheet is:  A program that can display and store data in a structured way.  Documents that stores data in rows and columns, and allow the data to be analysed using formulae. Spreadsheet could:  Record data  Sort out data  Search for particular data  Perform calculations based on data  Produce graphs and charts - Spreadsheet is made up of tables. Rows and columns divides the table into individual cell.  Thus, data are stored in individual cell.  Cell references (with letter and number) can be used to identify individual cell in the spreadsheet table.  We can include cell references from other files, i.e. [football.xls]Sheet1’!E26. We can use …. to make the spreadsheet look more presentable:  Font size and style  Text alignment  Merging Cells  Cell shading and borders  Gridlines  Column and row width Difference between data and information: Data: They have no context. They are simply raw words and figures. For example, A, M, 3.259 Information: Combined data which gives a meaning.
  • 29. A spreadsheet cell can contain one of these three data types: Data types: Descriptions of the types of data being stored in the cell, i.e. text, numbers and dates. - Numerical Data: I.e., integers, fractions, decimal numbers, time, dates, percentages, currency. - Text (Alphabetical data): I.e., Names, titles, songs - Formulas: They allow calculations to be displayed within the cell. Formulae and functions Functions: Mathematical operations performed on the value in a cell, for example =SUM and =AVERAGE. There are different types of functions: SUM They add a long list of numbers. =SUM(D12:D18) MIN Finding the minimum value of the list. =MIN(D12:D18) MAX Finding the maximum value of the list. =MAX(D12:D18) AVERAGE Finding the mean of the list of the number. =AVERAGE(D12:D18) ROUND Rounding a number to a specified number of digits. =ROUND(D1,3) Rounds it to 3 digits. ROUND UP Rounding a number UP. =ROUNDUP(D1,3) Rounds it up to 3 digits. RANK Tells you the position of one number within a sequence of number. =RANK(D4,D4:D9) Tells you the position of cell D4 in the list from D4 to D9 COUNT Counting the number of cells with numerical values. =COUNT(D1:D10) Counting number of cells from the list from D1 to D10. LOOKUP Looks up for a value/data in an array (a type of table) =LOOKUP(“banana”,A2:A6,B2,B6) Looks up for the data “banana” from the list from A2 to A6, then displays data from B2 to B6.
  • 30. Other function includes: IF: An IF statement asks a question, then returns a response if the answer is yes, and another if the answer is no. For example: IF(apple price<banana price, “UNDER”,”OVER”) Explaination: If the apple price is lower than the banana price, display “UNDER”, or otherwise display “OVER” Relative and absolute cell references Relative cell references: Where the program does not exactly store the address of the cell, but store the position of the cell relative to the cell containing the formula. Absolute cell references: The actual cell location is stored, and is unaffected by the location of the cell containing the formula. It is the opposite to relative cell reference. For example: If we type a formula at E19, displaying results of =SUM(D19:D23), when we move the formula to E20, the relative cell reference will change the formula to =SUM(D20:D24). If we use =SUM(D$19:D$23), it remains unaffected.
  • 31. Charts and graphs: There are different types of charts and graphs. Bar chart  It has category plotted at the x- axis, and values on the y-axis.  It displays discrete data. Line Graph  Rather than category, it has values in the x- axis. Scattergram  It shows the relationship between two data.  Trend line is added to show the relationship more clearly. Pie Chart  It shows the proportional of a category to a total.
  • 32. Chart titles, labels and keys Every chart and graphs must have a:  Chart title  Key (legend) that explains what each symbol/colour represents  Axis titles  Axis scales Modelling: Model: Mathematical representation of the reality. - Input values are processed using different formulas to produce an output. - It can carry out What-if analysis. What-if analysis: Step 1: Reduce/increase a variable (i.e. changing the selling price of pizza) Step 2: Check the result Step 3: Make adjustment until the result is correct. - Using what-if analysis, the user can see how the input values affects the output values.
  • 33. UNIT 4.2 – Databases Database: Collection of data or records stored in tables. Datatypes: AutoNumber Unique number that is automatically-generated for each data. Number Numerical values, i.e. integers or decimals. Text/Alphabetic Short values containing text and numbers. Currency Monetary values, i.e. $23 Data/Time Data and time Object/Image Files such as images. Boolean/Logical Yes/No values Limited choice Where values are limited into a drop-down list. Memo Text and numbers. It is possible to store a large number of characters. It can be used in “Notes” or “Description” field. There are two types of database: Flat file database: A database with just one table of data. Relational database: A database containing two or more tables that are linked to each other. This overcomes problems of data redundancy, resulting in fewer entry errors and reduced storage spaces. Flat File Database: - The simpliest form of database. - A table of data. - It could be created in all database programs or most spreadsheets. Relational Database: - It stores data in separate tables. - Data are linked together using key fields. - Reduces data redundancy. - It is easy to change or update information, as we only need to change one table.
  • 34. Key fields: They are also known as primary keys (i.e. AutoNumber). It is a field in the table which uniquely identifies each record in that table. Fields: Column headings in the database tables. Fields are part of a record. Records: They are rows in a database table. They hold all of the information about one subject. Data redundancy: When the same data is stored more than once in the database. They are also known as data duplication. Data Validation: Data validation can be used to reduce data entry errors. They check the data whether it is sensible or not.  Presence check: They check if a field is left blank. It stops us moving on until the field has been entered a value.  Look-up list: It checks the data against a list of pre-set values, for example a field may only allow “Male” or “Female”.  Type check: It checks if the data are all in the same type. For example, data with specific length, or in a specific format (one letter followed by three numbers) etc.  Range check: It checks the data if it lies within a range. For example, inserting an age within 0-100.  Check digit: It carries out a calculation based on the number entered, and check the result is what is expected. It is used in bar-code scanning.
  • 35. Data Verification: It makes sure the data that is entered is the same as the original data.  Proofreading: A person reads the data onto the system, and compares it to the original data. Any incorrect data will be corrected.  Double entry: The data is entered twice. The computer then compares two sets of data to see whether they are identical or not. Form: Form: It is a tool that simplifies data entry. - It can be used to enter or edit data. - It is clearly designed and user-friendly. - It is linked to the table. - It contains text boxes, tick boxes or lists for user to choose from. Advantage of a form:  In a relational database, it allows you to enter data into more than 1 table in a single form.  It has a simple layout compared to a table.  We can add extra text to a form to make it more user-friendly. Sorting and filters: Database records can be sorted and filtered. Sorting: It allows data to be organized into an order. - I.e., in alphabetical, ascending or descending order. Filtering: It selects information on one particular type of data. - I.e., only display data with price <$60.
  • 36. Searching in a database: We can use query to search a database. Query: It is a list of the things you want the database to look for. - We can use search criteria, then the database returns with a list only with the results we are looking for. Search criteria (Operator): = Equal to < Less than > Greater than < > Not equal to <= Less than or equal to >= Greater than or equal to * Wildcard search OR Finding data that satisfies either of the conditions. For example, finding First Name = “Boris” OR “Cherie” AND Finding data that satisfies all of the conditions. For example, finding First Name = “Boris” AND >$50 NOT Finding data that does not satisfies the condition. For example, finding people with the name NOT Boris or with money more than >$50 NOT (First Name= “Boris”) AND Value >$50 Wildcard search: - We can use it when we only know part of the data. - * denotes any numbers or characters. - ? denotes only one number or character - I.e., writing Be* instead of Betty; writing Bett? Instead of Betty.
  • 37. Reports: It shows result of the data based on our preferences (i.e. we select which fields to be searched/displayed). There are two types of report: Record format report: It displays data completely separately. I.e., a letter that displays your water bill and address separately. Column-format report: It displays data in a big table. It displays all the information under the field. This form of report is useful if we want to compare different data. Mail merging: It allows data stored in a database to be transferred into another application software.  It is importing data.  It inserts data that is created using a different software application. Process involved in mail merge: Step 1: Organise the data in the database into fields. Step 2: Write the document with details missing. Replace them with key field names. Step 3: Merge the data into the document.
  • 38. UNIT 5 – Using the web UNIT 5.1 – Web browsing and e-mail Web brower: Application software that displays web pages. - It reads the HTML code and display the web page in the right way. Features in the web browser: Stop It stops loading the page. Refresh It updates and reloads the web page. Home Page It is the web page that would be accessed once the web browser is opened. Web Address It is space where we type in the exact URL address of a webpage. Bookmarks The browser could save URL addresses so that we don’t have to type them next time. Phishing Filter It tells the user if the website is trying to get their personal information. Pop-up blocker It prevents the web page opening up new windows that displays advertisement. Common types of websites:  Search engine: Examples include: Google, Yahoo!, Ask.com. - It works by searching through all the webpages in the Internet, then make a central index of words and sentences on each webpage. - As we type in a word or phrase that to be searched, it looks it up against the central database, then returns with a list of results with all websites that contains that word or phrase. - Different search engines provides different search results, as they uses a different indexing methods.
  • 39. Search criteria: Search criteria Example Meaning AND search: simply type in the search terms. Ipod walkman Results containing “Ipod” AND “walkman” NOT search: involves using the minus (-) sign before a search term MP3 Player - ipod Results with all containing “MP3 Player” except “ipod” OR search: it displays results that contain either of the words Ipod OR walkman Results with either “Ipod” or “walkman” are displayed Exact phrase: putting it into quotes “apple ipod” Results that contains exactly “apple ipod” Wildcard search: Using an asterisk before or after a search term Ipod* Results starting with the word “Ipod”, i.e. Ipod touch, Ipod nano, Ipod mini  Wiki: They are websites which allow users to freely create and edit webpage content. For example: Wikipedia Internet Service Provider (ISP): It is a company that provides people with Internet access. - It usually charges a monthly fee. - They also sometimes provide additional service, i.e. web mail, web hosting.  Web mail are sometimes provided. They are email service provided by your ISP.  Hosting websites: Some ISPs provide a free storage space which allows us to upload our webpages into the Internet.
  • 40. E-mail: They are electronic mail. - We need an email account to send or receive emails.  They can be obtained by either our ISP, or any web-based email service. - It sends a message from a computer to another. - E-mail addresses are unique. Features of an email: From Some email editing software allows us to send and receive from more than one email account. We can specify the email to be sent using a specific account by entering our email address. To We can enter one or more than one email addresses that we want our message to be sent to. We need to separate different email addresses using a comma or a semi-colon. Cc Carbon copy. This sends the message to someone that are not directly affected by the message. Bcc Blind carbon copy. A copy of the email will be sent to that address, but other recipient does not know this. Subject It make others clear as they know what is the email about. Attachments As only text are allowed in the main body, we can insert images and videos using attachments. They don’t open automatically unless we download them. Received e-mail Reply We can send a reply message back to the “From” address. Reply to all It sends message back to all the addresses in the From, To and Cc section. Forward It sends the message to another address. We can add comments before the email message. Others Signature This is an automatically added message to every email message. Common signature includes the contact details. Body It contains the actual message of the email.
  • 41. Managing the address book: Address books allow us to store email addresses. - So that we don’t have to type in their email address next time. - We can also add new contacts, edit or delete different contacts. Mailing lists: It is the group of email-address.  The coordinator could add/remove/edit addresses in the mailing list. Folders in an e-mail software: Sent items Contains copies of emails that we’ve sent. Drafts Contains all the mail that we have started to write but have not been sent. Outbox E-mails that are completed and are pending to be sent. They often store emails that are written in an offline device, and sends out email once they have an Internet connection. Junk Mail Contains email that are recognized as junk or spam. Deleted items Contains email that are deleted. This folder is emptied automatically. Junk Mail: Also known as “spam”. They are emails that or not welcomes or solicited, and are often sent in bulk. They are usually in a commercian nature. Spam filters: Software that redirects emails that appear to be junk or spam into designated junk email folder. - To prevent normal email redirected into the junk folder, we can add the sender to a list of safe senders. Instant messaging: Real-time text conversation between two or more people who are online. - We know the recipient is online, when email doesn’t.
  • 42. UNIT 5.2 – Web logs, social networking and forums Web logs: It is usually abbreviated to “blogs”. These are websites which people or organizations write entries about a recent event or particular subject. Different types of blogs:  Personal blogs They are websites which a person writes about his personal events, sort of an online diary.  Corporate blogs It contain updates on what a company has been doing, i.e. a recent event or a opening of a new store. It keeps customers updated, and might find out customer opinions using the comments posted in it.  News and views Blogs created that update people with news on a specific topic, i.e. BBC Climate Change.  Micro blogs Users write a short update on what they are doing, known as “Tweets”. They have a character limit. This results in a blog made up of many “tweets” that looks like a running commentary of someone’s life. Features of a blog:  Recent entry The most recent entry of the blog must be at the top of the page. The date of the entry is also clearly marked.  Blog post It is the context of the entry. Images may be added and enlarged once they are clicked.  Comments Visitors may leave comments about an entry.  Other This includes the vote function where visitors click to vote.
  • 43. Social networking Social networking: contacting other people to meet out, or to find out other’s interest. - They are websites where individuals or organizations each have a profile and link to other users. - The link could be based on real friendship, common interest or similar background. - Examples includes Facebook, MySpace It usually contains:  An email service  Instant messaging  Ways that publish original material  Forum or groups for people with certain interest  Sharing files and links  Creating a profile  Uploading videos/photos  Adding personal details, such as name, age, town of birth, schools. - We can also search for other users in a social networking website. This can be done by typing their name, username, email address, or by location or interest that we share. Some social networking sites requires a plug-in in order to upload files onto it. Plug in: A small application software that you download using an Internet browser. Each plug-in has a specific feature or function of the Internet browser, i.e. Adobe Flash plug-in enables us to view animation online. Pros and cons of social networking software: Advantages Disadvantages We can keep people in contact in a country, or even a world-wide scale. Identity theft, we put ourselves at risk when we put in too much information. A place where we can publish our work Friends may lie about themselves. Raising awareness for different charities/organisations Some potential employers may look at your profile to make decisions.
  • 44. Dangers / risks of social networking websites Privacy: We can select what kind of information are displayed by changing our privacy setting. Abusing social networking sites: There have been cases where people pretend to be someone when they are not. For example; Creating an account under someone else’s name, and posting information that damages their reputation. Viruses and hacking: Some hackers hack into social networking sites to get sensitive personal information i.e. credit card details. Forums: Forum Also known as a “message board”. An online discussion website consisted of user-generated content. - Users could post comments in an open conversation. - Different forums discuss particular areas of common interest. Podcast: Podcast: Audio or video files downloaded from the Internet, normally updated daily or weekly. - They are mainly used for education, business and recreation purposes. Difference between a podcast and downloads: Podcasts are normally a part of a series made available for download on a regular basis, often daily or weekly. Some podcasts could detect newer version as we’re subscribed to it.
  • 45. UNIT 6 – Data logging and control software Data logging: The process of collecting data over a period of time. - Data is collected using an input sensor. It works by converting environmental signal (i.e. tempature) into electrical energy, in either analogue or electrical signal. Sensors: Device that detects physical quantities, then converts it into electrical signal in either analogue or digital form. Data in data logging are captured in every logging interval over a logging period. Logging interval: The length of time between recording each measurement. Logging period: The total length of time that data is being recorded. Advantage of data logging: It could: - Run 24 hours a day, 365 days a year. - It is cheaper to use computer logging than manual logging. - Takes accurate and consistent reading – it eliminates human error. - Take readings in a very short time interval – i.e. 1/100 seconds. - Capture data in hazardous environment – i.e. inside a volcano, Mars - Immediately analyse and respond to the data – i.e. switching on heater once the room temperature falls to 22C. - Automatically presents data as graphs and tables. - Log data from many sensors at a time. However: - Expensive set-up cost - Failure sensor are unrecognizable - If equipment fails, data may be lost
  • 46. UNIT 6.2 – Control Software Control Software: Software used to programme robots and devices with instructions so that they can act remotely or automatically. - The control system is a software which is used to control a piece of equipment. There are two types of control system: Dedicated control system: - Basic programs that carries out pre-programmed tasks, i.e. a traffic light. Computer-controlled system: - It uses computer to control the output device (i.e. motor), and the computer reacts dependent on the data, i.e. a computer-controlled heater. Feedback Loop: Feedback: The way that output influences the input. - In a feedback loop, information is sent from a sensor to control the output of a device.
  • 47. UNIT 6.3 – Mobile Technologies There are many ways of communication using mobile technologies: Laptops: Also called notebooks, which is a personal computer small enough to be carried around. They have built in keyboards, mouse and screen. Smart mobile phones: Also known as smartphones, which are phones that offers features found in personal computer, such as Internet access, email and some application software. Common features found in a smart mobile phone: - Internet access - Emails that automatically downloads to the phone when it is received. - A calendar - An address book - Application software, i.e. word processing and spreadsheet software - Large memory, and option to insert external memory card - Digital camera Advantages Disadvantages Portable Easily tracked (privacy) Able to communicate with others using ICT anywhere with networking Easy to lose these devices Small in size Network is unavailable in some locations, i.e. mountainous areas.
  • 48. Wireless Application Protocol (WAP): Wireless Application Protocol (WAP): A technology that enables mobile-phone users to view phone-friendly versions of websites on a phone screen. - Other than ordinary website view, it displays a simplified view of the website on our phones. Convenience imposed by mobile technologies: Nowadays, mobile technologies have found usage in many aspects, such as Computer Phone Navigation (Global Positioning System, GPS) Electronic organizers Satellite Navigation Systems A Global Positioning System (GPS) consists of 24 satellites. The GPS device receives signals from at least three satellite to work out their position (triangulation). It uses the NAVSTART satellites, which orbits around the Earth.
  • 49. UNIT 7 – Implication of ICT for society UNIT 7.1 – Legal issues relating to the use of ICT Despite ICT brings in a lot of advantages, for instance affecting how business run, more things could be done in our leisure time etc., ICT has an impact on the environment and everyone’s privacy. As a result, laws are set up to control how ICT are used. The Data Protection Act controls the use of private data. - It protects the data subject that the organization possess. - The organizer, aka data holder, are entitled to comply with this law, which is enforced by the Information Commissioner. - If the data holder wish to pass your data onto a third party, they must ask for your permission. - Each organizer must appoint a data controller, person who makes sure the rules regarding personal data are complied. Data Protection Act: A law designed to protect the privacy of personal information. Data subjects: People about whom data is stored about. Data users: People or organizer that store personal data. Information Commissioners: The government department that enforces the Data Protection Act 1998. Data controller: The person in an organization who is responsible for ensuring the Data Protection Act 1998 is followed.
  • 50. The 8 Principles of the Data Protection Act 1998: The law states that the data must be:  Fairly and lawfully processed.  Processed for limited purposes.  Adequate, relevant and not excessive.  Accurate and up-to-date.  Not kept for longer than it is necessary.  Processed in line with your rights.  Secure.  Not transferred to other countries without adequate protection. Exemptions of the law: There are some cases where the law does not apply. Exemptions: Situations where the Data Protection Act 1998 does not apply. Examples include:- - Data that put national security at risk. - Data which must be made available to public. - Information for personal use within families. - Information needed to prevent and detect crimes. - Information needed for tax assessment.
  • 51. Computer Misuse Act 1990: This is a law which prevent unauthorized access to computers. It copes with the problem of computer hackers and viruses. Viruses: Pieces of computer code that can reproduces themselves by copying into other files. They could cause damage to our files, or stop programs running properly. Hacking: Accessing a computer system that you are not authorized to use. It is an offence under the Computer Misuse Act 1990. There are three types of offences: Level 1: Accessing to a computer system, software or data that you are not authorized to. Level 2: Unauthorized access with the intent to commit fraud or theft. Level 3: Unauthorized modification to a computer system. This includes implanting a computer virus.  The British Computer Society (BCS) aims to help people to understand the responsibility they have when storing personal data.  They created the Personal Data Guardianship Code to help data handlers to follow the Data Protection Act 1998.  It suggests a person in the organization to take five main duties: Accountability: ensures the data is handled properly. Visibility: stating how the data will be used. Consent: ensures the organization have gained permission before accessing or sharing their personal data. Access: makes sure only the right person sees the data. Stewardship: makes sure the right amount of data is possessed, and deleted once it is no longer needed.
  • 52. Copyright and Patents Act 1998 They are there to protect our intellectual property. Intellectual Property: Ideas or creations such as software or music that can be protected by copyright. Copyright legislations also applies to software. When we buy a software, we are buying the “right” to use it. Software license: A legal agreement stating how a piece of software may be installed or used. There are different types of license: Single-user license: Allows to install and use the software in one computer. Multi-use license: It states how many copied may be installed. It is commonly used in businesses. Site license: They allow software to be installed in any computers within the site, i.e. education packages in the school. Shareware license: They usually come with a short trial period, then restrictions are imposed to it. We have to pay for it to get the restrictions removed. Freeware: Also known as public domain software. We can use the software without paying for it.
  • 53. Plagiarism and copyright Plagarism: Copying a piece of writing, music or other intellectual property from someone else and presenting it as your own work. - We should always only select the parts of the material that we want. - We should also always quote our data to prove that we have not cheated. Copyright: A legal right given to someone who creates documents, pictures or music. It means other people cannot use that work without the permission of the copyright owner. - Materials with a copyright will be marked with a © sign. Music downloads: A music bought and sold commercially is subject to copyright. This means we can only use these music for personal use, not the permission to pass to someone else. - It is illegal to upload music onto a peer-to-peer website. Peer-to-peer website: It is also called a P2P site. A website where people upload music and video so that other people can download it, usually illegally.
  • 54. UNIT 7.2 – Social and economic issues relating to the use of ICT The use of ICT has influenced and changed a lot of pattern in our modern society.  Industrial/ Manufacturing application: - The introduction of CAD (Computer-aided design) allows designers to draw their products on screen. - The data from CAD is directly fed into the machine to produce the product, known as CAM (Computer-assisted manufacturing). - JIT (Just-in-time production) can be implemented as the use of ICT enables us to order components as quickly as possible. - Automated stock control manages the stock level, once it falls into certain level it order goods automatically. CAD: Computer-aided design. Uses a computer to produce drawings of the design of a product. It may also be used for automatic calculation of weights, strengths etc. CAM: Computer-assisted manufacturing. Often uses output from CAD packages. It uses computers to control the tools that manufacture or assemble the products. - People may be deskilled, as the machine is replacing the role of a worker. - Some products are not suitable to be automatically manufactured.  Commerce E-commerce: It uses the Internet for commercial tasks such as selling goods or services. - Some businesses use the Internet instead of a traditional shop to reduce cost. - E-commerce is convenient as people hasn’t got to travel to the business, instead they can do it wherever with an Internet access.  Changing the pattern of employment due to increased use of ICT: After the introduction of ICT, some jobs have been created and some have been lost. Examples includes: typewriter replaced by word processor; web administrator is introduced as ICT is implemented.
  • 55.  Teleworking: Teleworking: Working from home using a networked computer rather than travelling to a place of work every day.  Social and personal effect of ICT: After the implementation of ICT, it has changed how we behave in the society. - More choices of communication. - Personal websites allow us to let the world know what we up to. - Instant messaging allow us to chat with a friend whilst working with others. - Keep in touch with old friends. - Politicians and celebrities can keep their message in the eyes of the public using Internet. However - More difficult to relax and get away from pressure from daily life, as there are so many ways to communicate.  Equality of computer access and ICT skills: - ICT and mathematical skills have been listed by the government as a basic skills that all students will need. - Computer for Pupils scheme aims to help some of the most disadvantaged secondary-school children. - One Laptop per child scheme is researching ways to provide computer access to children in developing countries.  Advantage Disadvantage - It reduces the time to travel. - It reduces the money spent on travelling. - Wider range of employment as we don’t have to live near the work. - Business reduces cost by using less office space. - Feel isolated - Less able to discuss work problems - Distractions
  • 56.  Accessibility: - People who are visually impaired can zoom and make the display bigger. - Computers also allow us to change the colour of background and text. - Specialist input devices: eye-tracking device, foot-operated mouse
  • 57. UNIT 7.3 – Political, ethical and environmental issues relating to the use of ICT National database: - The DNA Database: The UK police keeps a national DNA database. They hold samples collected from crime scenes, and samples from individuals in police custody.  The European Court of Human Rights state that the store of DNA from innocent people is illegal. - National Identity Card: The card holds biometric data and fingerprints to identify individual people. Security and privacy: - People are worried about privacy: Data loss Fear of identity theft Use of CCTV: CCTV Also known as the closed circuit television. It is an unmanned, remotely mounted video camera system which is used to transmit live pictures back to a television screen where developments can be recorded and monitored. Other means of society surveillance: - The government wants to allow MI5 to monitor personal phone calls, emails and web-browsing. - The government hopes to spend £12 billion on a database to monitor personal communication for every person in the UK. - Some MPs are worried the cost and the ethical factors of it. Advantage Disadvantage Identify crime suspect “Big Brother” surveillance society Deter crimes May be used for political purposes Makes people feel safer
  • 58. ICT to monitor environment: As ICT has the ability to store and process huge amount of information very quickly: - Ideal for collecting data about weather and climate. - Predict the weather based on the collected data - Help predict events such as flood, earthquakes, hurricanes and tornadoes  Easier for us to prepare for natural disaster Sustainability and recycling: ICT can: - Manage resources such as energy and raw materials - Design and monitor an energy-efficient building. - Control systems, such as heat system. Impact of ICT on different population: Makes people in the world easier to communicate:- - As information flows through freely and quickly, the government cannot use propaganda to broadcast biased information.
  • 59. UNIT 8 – Using ICT responsibly 8.1 Health Issues for computer users ………………………………………………………………………………………… There are many types of risks involved with ICT: Eye problem It is caused by long time focusing on the screen. Having screen glare and poor quality image on older monitors make eyes hard to focus.  They should use suitable resolution and brightness. Users should also take regular eye test to check if their eyes are healthy. Wrist problem RSI – Repetitive Strain Injury It is the aches, pains and muscle or tendon damage caused by overuse of a keyboard and mouse.  They should adopt a correct gesture when using keyboard. Stress The workers will have a high amount of stress if their work are monitored closely.  They should manage stress level appropriately. Back and neck problems It is the pain and problems caused by sitting in the same position for a very long time.  They should sit correctly. Using an adjustable chair will help. Our eyes must be in level with the screen. Feets should be resting comfortably on the floor, and screens can also be tilted. Tripping As electrical cables sometimes run for a long distance in offices, they may be easily tripped. Additional sockets could be installed for this problem. Heat As computer produces huge amount of heat, it is essential to open windows and so that air could circulate around the room. We could always use air conditioning. Switching computers off could also save energy too! Electrical safety Every electrical equipment should be checked for electrical safety – this checks whether wires and plugs are damaged. It reduces risks of electric shock and fire. Carbon dioxide fire extinguisher should be used – indicated with a black stripe.  Surge: a sudden increase of voltage. Surge protector plugs protects computer from voltage surges.  UPS: Uninterruptable power supply: This means when power fails, it provides power so that computers could be switched off safely.
  • 60. Hygiene Computers should be kept clean.  Food and drinks don’t mix! They should be kept away from computers.  Wash your hands regularly.  Specialist keyboard wipes could be used to keep keyboard clean. Lighting The lightings should be carefully designed so that it does not cause glare and reflection on the screen – which causes eye strain. Blinds could be installed to block out sunlight. Diffused lighting is likely to cause glare and reflection than normal fluorescent tubes.
  • 61. UNIT 8.2 – Responsible behavior online Keeping yourself safe: Online users usually create avatar and user names to represent themselves: Avatar: A picture that you choose to represent yourself online. It is safer than using a real picture of yourself. - Never give your address, phone number or even full name for people you met online. - When we meet “online friends” in real life, meet them in a public place. Grooming: A criminal offence where a person gradually builds up a young person’s confidence online. They may then ask the young person to meet them in person. Respecting others: As Internet is so free that everyone can view posts and comments, we may regret what we have said in the past. Cyber bullying: Using computers and mobile phones in ways that make another person unhappy or uncomfortable. - It makes people feel impossible to escape. When you get bullied: - Tell an adult, i.e. teachers or parents. - As cyber bullying leaves a trail of proof, save text messages and IM conversations. Tale screenshots of it so that it is easier to tackle them. - As the bully wants a reaction – so that they feel they look clever and funny, if we don’t give them reaction, they feel bored and move on.
  • 62. E-mails: There are two types of junk email: Chain emails: E-mails that encourage you to make lots of copies and send them to everyone in your address book, making the chain longer. Sometimes they threaten you that bad things would happen if you break the chain. Flaming emails: E-mails that contains angry and abusive messages. Filtering contents: Some organizations use content-filtering software which they restrict people accessing to “hate website”, such as violence, pornography. Some systems also filter certain words in email – they are usually reviewed by the system manager before they decide whether they are passed on or not.
  • 63. UNIT 9 – Collaborative working UNIT 9.1 – Principles and processes of collaborative working ………………………………………………………………………………………… Collaborative working: where people work together to reach a common goal. When several people are working on a document, usually a house style is agreed before the work starts. House style: an agreed set of layout and format rules that might involve logo placement, fonts, colour schemes etc. It is often known as recursive process, where each person works in a chain to improve and refine until everyone is happy about it. Recursive: A process that is repetitive, for example where a document is revised, edited and proofread to improve the final product. When everything is agreed, the artwork is sent to publishing, i.e. being printed. Artwork: The version of a document that is sent to a printer. It includes the text of the document, not just the pictures and photographs. Group plan: A group plan is essential to reduce conflict and increase consistency. - Everyone has their own opinions. - The plan is the best way to achieve a common goal, as it takes everyone into account. - The plan has a milestone on it. Milestone: Key points that must be reached by a certain date if a project is to be completed on time. Deadline: An established date by which tasks have to be completed.
  • 64. Project Management: It makes sure that a project is completed on time, within the budget, and it meets all overall objectives. Communication: It makes the group members aware of other people’s work schedule, and meetings could be syndronised. It also allow more discussions and opinions to be heard. - The introduction of ICT has broaden the way that we could communicate. It also enable us to communicate much more quicker than we used to.  Emails: They are not expensive and are quicker than a traditional letter. They are very popular way of exchanging information and sending files from one member to the another.  Instant messaging: It allows two or more online user to have a text conversation in real time. They can also transfer files. Nowadays most IM software also allows voice and video chat.  Chat room: People can log onto the chat room and type and read messages from others. Companies nowadays use it for customer support.  Voice over Internet Protocol (VoIP): A method of using Internet technologies to make phone calls. It is a way that transmit the sound of voices over the Internet. They allow us to make phone calls without paying the telephone company. It cuts down phone call bills.
  • 65. Good project management: All projects need:  Agreed list of who is responsible for each one.  Clear schedule on milestones.  A list of resources, such as software and hardware, that is needed for each task.  Agreed budget that must be kept to.  A method of managing it, such as project management software.  A final deadline for the project. Project Management Software: It is a computer program to help plan projects and resources. - It allows project managers to keep track of the project. - Gantt chart is often used to display time limit per milestone. Gantt chart: Diagrams that show a schedule of individual tasks as they occur over the period of time during which the project is developed. Workflow management software: It is a computer program that help a business to manage the flow of a project. - It passes data to people who needed it within the project. - It helps managers to keep track of the progress, and model possible effects. - It helps the business to organize resources effectively. A Good Team: - Other members should review and criticize others’ work. - Constructive criticism allows you to review and make your ideas better. - Good communication. - Planned meetings - Minutes should be written in meetings and a conclusion should also be written into it.
  • 66. Videoconferencing: Using ICT to hold virtual meeting with two-way video and audio transmitted in real time.  It saves time and money as team members are not required to travel for a meeting.  Saves money for an expensive meeting rooms.  Arranged quickly.  Still also allow people to see body languages and emotions. However  Needs high bandwidth.  Cannot interact in the same way as a traditional meeting.  Team members cannot talk at once. Teleconferencing: Using ICT to hold a virtual meeting using text and sound but not video.  Needs less bandwidth.  Only allow one person talking at a time. Bulletin board: Online discussion spaces where people can post messages and get responses from other people. The use of virtual learning environments encourages teachers and students to work collaboratively, as they could access school materials from home.
  • 67. Files File permissions are used to control access of a file in the network. - The actions that users are allowed to perform on a file, for example read only or read/write.  Network management software keeps track on who has worked on a file. Intranet: A network within an organization, which looks like a website but only available within the company. Wikis: They are web pages that allow people to read them to edit or add content into them. Collaborative documents:  Most word processors have “comment” feature that add comment to a document.  It also set to track changes: when the document is edited, the edited part will display a different colour; deleted texts have a line across them instead of being vanished. Sharing files: We have to ensure no one works on an out-of-date file. Version controls: A system put in place to make sure that people working collaboratively do not use old versions of a document by mistake. - I.e., adding a version number or date of file name. Back ups: It ensures a secure copy of the data exists if the original one is accidentally corrupted and deleted.  Usually back ups are stored in removable medias, away from main computers.  Online storage space can also be used.
  • 68. Home collaborative working: Remote access: The ability for users to log on to a network from a location outside the building where the network is.  Useful when people is working outside the office.  Imposes security risks.  A secure, reliable network is needed so that files that is worked at home are backed up and uploaded regularly.