Igcse Ict Chapter8 To 10 Notes
Igcse Ict Chapter8 To 10 Notes
Dina El-Akkad 83
ICT I.G.C.S.E.
8.1 Audience appreciation
When planning and creating ICT solutions the following should be considered:
The age of the target group
The experience of the audience
The expectations of the audience
Knowledge of the audience
Research needs to be done first to find out about the target audience. This could be done by:
Interviewing a cross section of the target group to find out how to engage the audience
Giving out questionnaires to people in the target group to find out their background, interests,
etc.
Carrying out market research – this could involve the two techniques described above, but
would involve a more sophisticated and in-depth analysis of the data received.
Multimedia used:
Use of sound, video and animation will always catch the attention of the audience but it is
important not to overdo it in case the message gets hidden because of too many distractions in
the presentation.
A young audience is more likely to respond o loud music and embedded video clips.
Complicated descriptions are often better explained using graphs and/or animations.
Length of presentation:
Long presentations will only work if they are interesting and engage audience.
A very young audience would quickly get bored and start to become restless.
Interactive presentation:
Asking questions or getting the audience to ‘try things is always a good strategy but always be
aware that not everyone wants to take part.
Examples used:
When using examples to illustrate ideas, remember to be understanding.
Dina El-Akkad 84
ICT I.G.C.S.E.
The audience may be the actual users of the ICT solution. Considerations to meet the audience
requirements in this case include:
how skilled is the workforce
how old is the workforce
are any of the staff disabled
Software piracy (illegal copies of software) is a big issue amongst software companies. To protect
software:
When software is being installed, the user will be asked to key in a unique product key which
was supplied with the original copy.
The user will be asked to agree to a licence agreement before the software continues to install.
The original software packaging often comes with a sticker informing the purchaser that it is
illegal to make copies of the software; the label is often in the form of a hologram indicating
that this is a genuine copy.
Some software will only run if the CD-ROM or DVD-ROM is actually in the drive.
Some software will only run if a dongle is plugged into one of the USB ports.
Dina El-Akkad 85
ICT I.G.C.S.E.
8.3 Legal, moral, ethical and cultural implications
Legal covers the law; whether an action is punishable by law. Example, copying software and
then selling it without permission of the copyright holders.
Morality governs the private and personal interactions between people and is usually determined
by the person concerned. Creating fake websites is not illegal provided the person who carries
out the act doesn’t try to gain from their actions – it is simply an immoral act since it can cause
distress o others.
Ethics governs professional interactions, for example, codes of behaviour practised by a society
or group of people sometimes going against an individual’s own sense of morality. If somebody
works for a software company and passes on some of the ideas to a rival company, this would be
regarded as unethical behaviour. Unless the software passed on is part of national security, then
it isn’t actually illegal to do so.
Culture refers to the attitudes, values and practices shared by a society or group of people.
Writing software games that make fun of religion could be seen by certain people as
unacceptable behaviour but some cultures would find it funny and wouldn’t understand why it
was seen as offensive.
Dina El-Akkad 86
ICT I.G.C.S.E.
Dina El-Akkad 87
ICT I.G.C.S.E.
9.1 Communication applications:
9.1.1 Flyers, posters, brochures and newsletters
Steps to produce such a document:
1. open word processor, DTP or presentation application
2. create frames, boxes and/or text boxes
3. take photos if necessary using a camera
4. upload the images from the camera or from a CD/DVD, scan photos, or download photos from
the internet.
5. save the photos to a file
6. import or copy and paste the photos into the document
7. edit the photos and import from a file or type any text required.
Posters are eye-catching and usually very difficult to miss. Posters are usually placed in strategic
positions to target certain people rather than the general public. Renting an advertising area is
expensive. Posters are subject to weather conditions.
Newsletters are often produced by companies or clubs. They contain local information which is
read by the company employees or club members. Example:
marriages, deaths, and births of employees, club members or their families
advertising by outside companies
news events, such as fundraising, etc.
9.1.2 Websites
Advantages:
Sound/video/ animation can be added.
Links to other websites/hyperlinks can be used.
Use of hotspots.
Buttons to navigate/move around the website leading to more information.
Hit counters to see how many people have visited the website.
Can be seen by a global audience.
Can’t be thrown away.
It is much easier to update a website.
Dina El-Akkad 88
ICT I.G.C.S.E.
Disadvantages:
Websites can be hacked into and modified or viruses introduced.
Risk of potential pharming.
Customers must have a computer and internet connection.
Possible for customers to go to undesirable websites by accident or as a result of a pharming
attack. This can lead to distrust from customers.
Maintain the website can be expensive.
Because it is a global system, it is more difficult to target the correct audience using website
advertising.
Disadvantages:
Equipment needed can be expensive.
Equipment failure can be a disaster when giving multimedia presentation.
Wherever the presentation is given there may need to be internet access.
There is a danger that the focus is on the multimedia presentation rather than the message/facts.
It is very easy to make bad presentation with too many animation effects and too much text or
images.
Paper-based presentation:
Advantages:
Disabled people don’t have to go the venue to see the presentation.
It is possible to print it out in Braille for blind people.
The recipient can read the presentation at any time they want.
The recipient have a permanent copy which they can refer to at any time.
Dina El-Akkad 89
ICT I.G.C.S.E.
Disadvantages:
The presentation needs to be distributed in some way.
There are no special effects (sound, video, animation)
There are printing costs (paper, ink, etc).
9.1.5 Cartoons:
With 3-D animation, objects are designed on a computer and a 3-D skeleton (framework or basic
structure) produced. The parts of the skeleton are moved by the animator using key frames (these
frames define the start point and end point to give a smooth animation effect). The difference in the
appearance of the skeleton in these key frames is automatically calculated by the software and is
known as tweening or morphing. The final stage is to make a realistic image by a technique
known as rendering.
Dina El-Akkad 91
ICT I.G.C.S.E.
9.3.2 Measuring a patient’s vital signs in a hospital:
Steps:
sensors read key vital signs (pulse rate, heart rate, temperature, blood pressure, respiration, etc.)
the data from sensors is converted into digital using an ADC
the data is stored in the computer’s memory
the computer compares the data from the sensors with the values stored in is memory (these will
be input by the nurse or doctor for a particular patient)
the results are output on a screen in the form of graphs and/or numerical readouts
an alarm is activated if any of the data is outside acceptable ranges
the system continues to measure the patient’s vital signs until the computer is turned off.
Data is either transferred to a CD/DVD or to a memory stick and taken away for further analysis or
the computer is connected to a mobile phone network and transmits the data back automatically to
the monitoring station.
Dina El-Akkad 93
ICT I.G.C.S.E.
9.5 Modelling applications
A computer model is the creation of a model of a real system in order to study the behaviour of the
system. The model is computer generated and based on mathematical representations.
The whole idea is to try to find out what mechanism control how a system behaves. This then
makes it possible to predict the behaviour of the system in the future and also see if it is possible to
influence this future behaviour.
Examples:
Flight simulators allow pilots to try their skills at flying a plane. If they crash on the simulator,
no actual damage is done.
Military operational research models for new weapons and tactics.
Simulation for nuclear reactors.
Ecological systems of the spread of diseases.
Extinction rates of endangered species.
Tuck shop modelling (Financial modelling)
Traffic light simulation
Dina El-Akkad 94
ICT I.G.C.S.E.
9.6 Manufacturing applications
A robot is a computer controlled mechanical device which is able to do variety of tasks.
Method 2:
Use of biometrics – fingerprints.
Advantages:
Fingerprints are unique
ID cards could easily be lost
ID cards could be affected by magnetic fields
It is easy to make copies of ID cards
Disadvantages:
It would take a long time to collect the initial fingerprints for every student in the school.
The equipment needed to take and read fingerprints is more expensive than magnetic stripe
reading equipment.
If a student cuts a finger, the fingerprint may not be identified by the system.
There are ‘invasion of privacy’ issues and some parents may object to having the fingerprints of
their children stored on a database.
Dina El-Akkad 95
ICT I.G.C.S.E.
9.7.2 Student performance
Teachers could make use of spreadsheets to monitor the performance of their students.
When using software to create timetables, it is easy to try ‘what it’ scenarios to ensure the most
efficient use of time is utilised.
Timetables can be produced to cover classes when teachers are absent.
Dina El-Akkad 96
ICT I.G.C.S.E.
9.9 Banking applications
9.9.1 Automatic teller machines (ATMs)
Disadvantages with ATMs:
they are often in places where theft can take place at night
‘bogus’ ATMs can be set up to gather information about the card and retain the card
some banks charge customers for the use of ATMs.
Dina El-Akkad 97
ICT I.G.C.S.E.
Disadvantages of online shopping and banking:
1. Security issues are a major concern. These include:
hacking, stealing credit card details
viruses and other malware (e.g. phishing, pharming, etc.)
2. Fewer social contacts.
3. It is necessary to have a computer and internet connection.
4. Do not get much exercise from not getting out.
5. Cannot inspect the goods you are going to buy properly.
6. Delivery times can be long.
7. You cannot pay with cash.
8. High street shops and banks are closing and this is leading to ‘ghost towns’ forming
With this system, there is no need to have a computer and it’s possible to talk to an actual human
being.
However, compared to internet banking, it can be much slower (there may be a long queue before
you can talk to somebody) and the options can be a little more complex to navigate. But it can also
be quicker if your computer isn’t switched on at the time and you only want a balance enquiry.
Dina El-Akkad 98
ICT I.G.C.S.E.
9.9.4 Chip and PIN
When paying for items using a chip and PIN card, electronic fund transfer (EFT) takes place.
Suppose a customer goes into a restaurant to pay for a meal using chip and PIN card:
1. The PIN is entered using a keypad.
2. The card is checked to see if it is valid.
3. The PIN is read from the chip on the card and compared to the one just keyed in.
4. If they are the same, then the transaction can proceed.
If this is the third attempt at entering the PIN, then the transaction is terminated.
5. The restaurant’s bank contacts the customer’s bank.
6. A check is made to see if the customer has enough funds.
7. If there aren’t enough funds available, then the transaction is terminated.
8. If everything is ok, then the transaction is authorised.
9. An authorisation code is sent to the restaurant.
10. The price of the meal is then deducted from the customer’s account.
11. The same amount of money is then added to the restaurant’s bank account.
12. A receipt is produced as proof of purchase.
Dina El-Akkad 99
ICT I.G.C.S.E.
8. At the paying bank’s clearing centre, the digital signature is first checked and then the
cheque is passed through their own reader/sorter machine to make sure data matches with
that on the IBDE file. It also sorts the cheques into branch order (using the sort code).
9. The paying bank checks to see if John has enough money in his account, etc. Based on this
information, Hodder Bank decides whether to pay John’s cheque to H&S Ltd or return it
unpaid to the Smith Bank.
Advantages:
Expert systems provide consistent answers.
Using expert system reduces the time to solve a problem.
Allows areas of the world access to expertise which they couldn’t normally afford.
Expert systems never forget to answer a question when determining the logic.
A less skilled work force is needed so saving money.
Dina El-Akkad 101
ICT I.G.C.S.E.
Disadvantages:
Expert systems tend to lack common sense in some of the decision-making processes.
Errors in knowledge base can lead to incorrect decisions being made.
It can be expensive to set up in the first place.
Considerable training is necessary to ensure the system is used correctly by the operators.
A 3-D printer can then reproduce a solid object showing the exact internal organs of the patient.
The doctor or surgeon can then show the patient exactly what is wrong and then show them what
procedures are required. They also help the surgeons in planning surgical procedures.
3-D printers produce hard nylon objects which are used in certain surgical planning. Tis reduces
the chance of any errors when the actual procedure is carried out.
Prosthetics
3-D printers are used to print out prosthetics (false arms, hands and legs) at a fraction of the cost
compared to existing methods.
On a daily basis, the borrowers file is checked by the computer to see which books are overdue.
The computer reads a record from the book file.
9.15.2 Cookies
9.15.3 Key logging
Dina El-Akkad 105
ICT I.G.C.S.E.
9.15.4 Employee call monitors
Employee call monitoring allows managers to listen in to employees’ telephone calls for the
following reasons:
to improve the employees performance (e.g. at a call centre)
allows the manager/supervisor to join in a call where necessary
can be used as a training tool
it allows a company who are concerned about security to monitor all calls
Uses:
cars to calculate routes
walkers to locate position on hills/mountains
runners to calculate distance run
farmers for tractor navigation/soil evaluation/livestock control/yield monitoring
satellite navigation systems for ships
tracking aircraft
Disadvantages:
If the maps are not kept up to date, they can give incorrect instructions.
Loss of satellites signals can cause problems.
Road closures due to accidents or road works can cause problems.
If an incorrect start point or end point is keyed in the system will give incorrect information.
Uses:
Emergency services to send the closest emergency personal to a location.
Biologists and environmentalists to protect animal life and plans in certain areas
Teachers in their geography, science or engineering lessons.
Acceptable language
List of unacceptable content to be used in emails, text messages and online forums:
obscene images
language that is regarded as abusive, profane (offensive), inflammatory (form of speech that is
used with the intent to stir up emotions), coercive (to make someone do something by using
force or threats), defamatory (say false things in order to make people have a bad opinion of
someone or something) or blasphemous (profane words and actions, especially when they are
connected to something religious)
racist, exploitative, violent messages
use of illegal materials in messages
Copyright
Emails are subject to copyright laws. It is important that the recipient checks before printing,
copying or forwarding an email if the sender has indicated that the message is confidential.
Netiquette
Netiquette is shortened from the phrase internet etiquette, which refers to the need to respect other
users’ views and display common courtesy when posting views in online discussion groups or when
sending out emails.
Web browsers use uniform resource locator (URLs) to access websites and retrieve file. The web
browser breaks up the URL into three parts:
Protocol://website address/path/filename
Example:
http://www.hoddereducation.co.uk/igcse_ICT
This is the
This is the web This is the file name
protocol used
server’s name used (often the web page)
The web browser translates the web server name into an IP address. The HTML is returned and is
shown as a correctly formatted page on the screen.
Features of blogs:
updated on a regular basis by the author
usually organised in reverse chronological order (most recent to least recent entry)
normally public – anyone can read them
entries normally come from a single author
other internet users can’t change blogs – they can only read them and comment
b-blog –short for business blogs – is used by business to promote themselves on the internet.
Wikis
Wikis are web applications or websites that allow users to create and edit web pages using any web
browser.
Features of wikis:
anyone can edit, delete or modify the content
many authors can be involved in a wiki
it is possible to organise a page any way that the author(s) wish(es)
shows / keeps track of all entries – i.e. it stores a document history
can be easily edited using a web browser
allows large documents to be seen by many people – it is easier than emailing several people,
Why are internet searches to find relevant information not always fast?
It is possible for millions of sites to be found matching a given criteria. Unless the user narrows
down their search criteria it can take a long time to find out exactly what they are looking for.
How can you evaluate the reliability of information found on the internet?
Anybody can set up a website so information is not necessarily reliable or accurate.
Some commercial websites will be biased to advertise their products.
If a website has excessive advertising it could be unreliable.
If the advertising on a website is related only to its own products it could be unreliable.
It is possible to use the final part of a URL to identify a website’s reliability – websites ending
with .ac and .gov are more likely to be reliable
endorsements - has the website been recommended by a trustworthy organisation?
If a website has testimonials, this can indicate reliability.
If the date of the last update was a long time ago it is likely to be unreliable or out of date.
links to and from the website - do the links reference websites that are decent, legal, honest and
reliable?
comparing the information on the website with information from other reliable websites or
textbooks.