0% found this document useful (0 votes)
286 views

Igcse Ict Chapter8 To 10 Notes

The document discusses various communication applications for ICT including flyers, posters, brochures, newsletters, websites, multimedia presentations, paper-based presentations, music scores, and cartoons. Details are provided on the steps to create different printed materials and considerations for various digital communication methods.

Uploaded by

asfas asf as
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views

Igcse Ict Chapter8 To 10 Notes

The document discusses various communication applications for ICT including flyers, posters, brochures, newsletters, websites, multimedia presentations, paper-based presentations, music scores, and cartoons. Details are provided on the steps to create different printed materials and considerations for various digital communication methods.

Uploaded by

asfas asf as
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

ICT I.G.C.S.E.

Dina El-Akkad 83
ICT I.G.C.S.E.
8.1 Audience appreciation
When planning and creating ICT solutions the following should be considered:
 The age of the target group
 The experience of the audience
 The expectations of the audience
 Knowledge of the audience
Research needs to be done first to find out about the target audience. This could be done by:
 Interviewing a cross section of the target group to find out how to engage the audience
 Giving out questionnaires to people in the target group to find out their background, interests,
etc.
 Carrying out market research – this could involve the two techniques described above, but
would involve a more sophisticated and in-depth analysis of the data received.

8.1.1 Giving a sample presentation to an audience


Language used:
 No vulgarity or use of inappropriate language since this can easily offend people.
 The use of technical terms should be reserved for experienced or technical audience.

Multimedia used:
 Use of sound, video and animation will always catch the attention of the audience but it is
important not to overdo it in case the message gets hidden because of too many distractions in
the presentation.
 A young audience is more likely to respond o loud music and embedded video clips.
 Complicated descriptions are often better explained using graphs and/or animations.

Length of presentation:
 Long presentations will only work if they are interesting and engage audience.
 A very young audience would quickly get bored and start to become restless.

Interactive presentation:
 Asking questions or getting the audience to ‘try things is always a good strategy but always be
aware that not everyone wants to take part.

Examples used:
 When using examples to illustrate ideas, remember to be understanding.

Dina El-Akkad 84
ICT I.G.C.S.E.
The audience may be the actual users of the ICT solution. Considerations to meet the audience
requirements in this case include:
 how skilled is the workforce
 how old is the workforce
 are any of the staff disabled

8.2 Software copyright and privacy


When software is supplied on CD or DVD, there are certain rules that must be obeyed. It is illegal
to:
 make a software copy and then sell it or give it away
 use software on a network or used in multiple computers unless a licence has been acquired to
allow this to happen
 use coding from the copyright software in your own software and then pass this software on or
sell it as your own without the permission of the copyright holders
 rent out a software package without permission to do from the publishers
 use the name of copyrighted software on other software without agreement to do so.

Software piracy (illegal copies of software) is a big issue amongst software companies. To protect
software:
 When software is being installed, the user will be asked to key in a unique product key which
was supplied with the original copy.
 The user will be asked to agree to a licence agreement before the software continues to install.
 The original software packaging often comes with a sticker informing the purchaser that it is
illegal to make copies of the software; the label is often in the form of a hologram indicating
that this is a genuine copy.
 Some software will only run if the CD-ROM or DVD-ROM is actually in the drive.
 Some software will only run if a dongle is plugged into one of the USB ports.

Dina El-Akkad 85
ICT I.G.C.S.E.
8.3 Legal, moral, ethical and cultural implications
 Legal covers the law; whether an action is punishable by law. Example, copying software and
then selling it without permission of the copyright holders.

 Morality governs the private and personal interactions between people and is usually determined
by the person concerned. Creating fake websites is not illegal provided the person who carries
out the act doesn’t try to gain from their actions – it is simply an immoral act since it can cause
distress o others.

 Ethics governs professional interactions, for example, codes of behaviour practised by a society
or group of people sometimes going against an individual’s own sense of morality. If somebody
works for a software company and passes on some of the ideas to a rival company, this would be
regarded as unethical behaviour. Unless the software passed on is part of national security, then
it isn’t actually illegal to do so.

 Culture refers to the attitudes, values and practices shared by a society or group of people.
Writing software games that make fun of religion could be seen by certain people as
unacceptable behaviour but some cultures would find it funny and wouldn’t understand why it
was seen as offensive.

Dina El-Akkad 86
ICT I.G.C.S.E.

Dina El-Akkad 87
ICT I.G.C.S.E.
9.1 Communication applications:
9.1.1 Flyers, posters, brochures and newsletters
Steps to produce such a document:
1. open word processor, DTP or presentation application
2. create frames, boxes and/or text boxes
3. take photos if necessary using a camera
4. upload the images from the camera or from a CD/DVD, scan photos, or download photos from
the internet.
5. save the photos to a file
6. import or copy and paste the photos into the document
7. edit the photos and import from a file or type any text required.

Brochures are usually printed on glossy paper.

Posters are eye-catching and usually very difficult to miss. Posters are usually placed in strategic
positions to target certain people rather than the general public. Renting an advertising area is
expensive. Posters are subject to weather conditions.

Newsletters are often produced by companies or clubs. They contain local information which is
read by the company employees or club members. Example:
 marriages, deaths, and births of employees, club members or their families
 advertising by outside companies
 news events, such as fundraising, etc.

9.1.2 Websites
Advantages:
 Sound/video/ animation can be added.
 Links to other websites/hyperlinks can be used.
 Use of hotspots.
 Buttons to navigate/move around the website leading to more information.
 Hit counters to see how many people have visited the website.
 Can be seen by a global audience.
 Can’t be thrown away.
 It is much easier to update a website.

Dina El-Akkad 88
ICT I.G.C.S.E.
Disadvantages:
 Websites can be hacked into and modified or viruses introduced.
 Risk of potential pharming.
 Customers must have a computer and internet connection.
 Possible for customers to go to undesirable websites by accident or as a result of a pharming
attack. This can lead to distrust from customers.
 Maintain the website can be expensive.
 Because it is a global system, it is more difficult to target the correct audience using website
advertising.

9.1.3 Multimedia presentation


A multimedia projector is used so that the whole audience is able to see the presentation.
Advantages:
 Use of sound and animation/video effects which grab the attention of the audience.
 Use of transition effects allow a presentation to display facts in a chronological order.
 It is possible to have hyperlinks built into the presentation to access the company’s website or
files stored on the cloud.
 The presentation can be interactive.
 The presentation can be tailored to suit particular audience.

Disadvantages:
 Equipment needed can be expensive.
 Equipment failure can be a disaster when giving multimedia presentation.
 Wherever the presentation is given there may need to be internet access.
 There is a danger that the focus is on the multimedia presentation rather than the message/facts.
 It is very easy to make bad presentation with too many animation effects and too much text or
images.

Paper-based presentation:
Advantages:
 Disabled people don’t have to go the venue to see the presentation.
 It is possible to print it out in Braille for blind people.
 The recipient can read the presentation at any time they want.
 The recipient have a permanent copy which they can refer to at any time.

Dina El-Akkad 89
ICT I.G.C.S.E.
Disadvantages:
 The presentation needs to be distributed in some way.
 There are no special effects (sound, video, animation)
 There are printing costs (paper, ink, etc).

9.1.4 Music scores


The generation of music and the production of music scores can now be done by computer systems
with the appropriate software, for example:
 music scores can be generated from the music itself using software.
 software can automatically correct music notes in a score.
 there is no need to understand the music notation to write a music score.
 music notes are automatically printed out in the correct format.

9.1.5 Cartoons:
With 3-D animation, objects are designed on a computer and a 3-D skeleton (framework or basic
structure) produced. The parts of the skeleton are moved by the animator using key frames (these
frames define the start point and end point to give a smooth animation effect). The difference in the
appearance of the skeleton in these key frames is automatically calculated by the software and is
known as tweening or morphing. The final stage is to make a realistic image by a technique
known as rendering.

9.1.6 Business cards and letterheads


Many IT companies offer to produce business cards and letterheads to any design. The user
connects to an appropriate website and they will be given a number of business card templates. The
user chooses a template and keys in data such as:
 name of company
 contact details
 image wanted on the business card.

Advantages to a company in using corporate letterheads produced by a printing website:


 professionalism
 brand/company awareness
 advertising – the letterhead can contain many useful pieces of information to advertise the
company
 helps to make the company stand out
 can make the company appear larger than it is
Dina El-Akkad 90
ICT I.G.C.S.E.
9.2 Data handling applications:
A number of applications make use of simple data handling techniques, such as:
 surveys
 address lists
 clubs and society records
 school reports
 school libraries

9.3 Measurement applications


The computer reviews the data from the sensors (by comparing it to data stored) and updates its
files and/or gives a warning signal if the values are outside given parameters. No changes to the
process are made during monitoring.

Examples of measurement applications:


 weather stations
 scientific experiments (e.g. taking temperature measurements)
 measuring a patient’s vital signs on a hospital
 pollution monitoring
 burglar alarm system

9.3.1 Weather stations:


Weather stations are set up to automatically gather data from the environment. They use sensors to
measure:
 rainfall
 temperature
 wind speed
 wind direction
 air pressure
 humidity
The data needs to be gathered 24/7. This data help to predict the weather for the next few days or
take a more long-term view by looking at weather patterns.

Dina El-Akkad 91
ICT I.G.C.S.E.
9.3.2 Measuring a patient’s vital signs in a hospital:
Steps:
 sensors read key vital signs (pulse rate, heart rate, temperature, blood pressure, respiration, etc.)
 the data from sensors is converted into digital using an ADC
 the data is stored in the computer’s memory
 the computer compares the data from the sensors with the values stored in is memory (these will
be input by the nurse or doctor for a particular patient)
 the results are output on a screen in the form of graphs and/or numerical readouts
 an alarm is activated if any of the data is outside acceptable ranges
 the system continues to measure the patient’s vital signs until the computer is turned off.

9.3.3 Measuring pollution in a river:


Steps:
 the sensors are placed in at least two different positions so that a pollution comparison can be
made
 the data from the sensors is converted into digital using an ADC and sent to a computer
 the computer stores the received data
 the oxygen levels and acidity levels and light levels are compared to the historical data stored in
memory and they are also compared to pre-set levels stored in memory
 the oxygen and acidity levels from the different positions in the river are also compared to see if
they are similar – this is used to see if the source of the pollution can be found.

Data is either transferred to a CD/DVD or to a memory stick and taken away for further analysis or
the computer is connected to a mobile phone network and transmits the data back automatically to
the monitoring station.

9.4 Microprocessors in control applications


The computer reviews the data from the sensors (by comparing it to data stored in memory). But if
the values are outside the given parameters it takes action to try to get the values within acceptable
ranges.
Examples of control applications:
 automatic washing machines
 automatic ovens/cookers
 central heating systems
 chemical plants
 glasshouse environment control
Dina El-Akkad 92
ICT I.G.C.S.E.
9.4.1 Central heating systems:
 The required temperature is keyed in and this is stored in the microprocessor memory as pre-set
value
 The temperature sensor data is sent to an ADC to convert the analogue data into digital data.
 The digital data is constantly sent to the microprocessor.
 The microprocessor compares this data with the pre-set value.
 If the temperature reading is equal to the pre-set value then no action is taken.
 If the temperature reading is less than the pre-set value, then a signal is sent:
 to an actuator (via a DAC) to open the gas valve to the boiler
 to an actuator (via a DAC) to turn on the water pump.
 The process continues until the central heating is switched off.

Advantages of using sensors and computer systems to monitor / control processes:


 Computer readings are more accurate.
 Readings can be taken more frequently
 Humans can get tired and forget to take readings.
 Work 24 hours/7 days a week without taking breaks.
 Some processes are dangerous so it helps in preventing accidents.
 Employees are free to do other tasks.
 More than one variable can be measured at any one time.
 Results are analysed automatically / faster to react / charts are produced automatically.

Disadvantages of using a computer in Process control and data logging :


 The computer is unable to respond to unusual circumstances.
 High technical staff required to run the system.
 Computer equipment and measuring software can be expensive to purchase and set up.

Dina El-Akkad 93
ICT I.G.C.S.E.
9.5 Modelling applications
A computer model is the creation of a model of a real system in order to study the behaviour of the
system. The model is computer generated and based on mathematical representations.

The whole idea is to try to find out what mechanism control how a system behaves. This then
makes it possible to predict the behaviour of the system in the future and also see if it is possible to
influence this future behaviour.

Examples:
 Flight simulators allow pilots to try their skills at flying a plane. If they crash on the simulator,
no actual damage is done.
 Military operational research models for new weapons and tactics.
 Simulation for nuclear reactors.
 Ecological systems of the spread of diseases.
 Extinction rates of endangered species.
 Tuck shop modelling (Financial modelling)
 Traffic light simulation

Why are computer models done?


 They are less expensive than having to build the real thing (e.g. a bridge).
 It is often faster to do a simulation than the real thing. (e.g. climate change calculations,
population growth, etc.).
 On many occasions it is safer to run a simulation – some real situations are hazardous (e.g.
chemical processes).
 It is nearly impossible to try out some tasks in real life because of high risk involved or
remoteness (e.g. in outer space, under the sea, in nuclear reactors, crash testing cars, etc.).
 With simulations, various scenarios can be tried out in advance.

Limitations to using simulations:


 They can be very expensive to set up and often require specialist software to be written.
 They frequently require very fast processors.

Dina El-Akkad 94
ICT I.G.C.S.E.
9.6 Manufacturing applications
A robot is a computer controlled mechanical device which is able to do variety of tasks.

How to program a robot:


 The robot follows a program that contains a sequence of movements.
 A human operator leads the robot arm through a learning sequence. The robot repeats the
sequence later.

9.7 School management system


9.7.1 registration and attendance records of student
Method 1:
Issue each student an ID card containing a magnetic stripe. The student would have to sign the card
and also write his unique student ID on the card.
Each morning and on leaving the school, the student swipes the ID card through a magnetic card
reader.
Use of a PIN stops another student swiping in with the wrong card.
Use of GPS tracking helps in knowing the exact whereabouts of a student. This would require the
addition of a chip in the ID card.

Method 2:
Use of biometrics – fingerprints.

Advantages:
 Fingerprints are unique
 ID cards could easily be lost
 ID cards could be affected by magnetic fields
 It is easy to make copies of ID cards

Disadvantages:
 It would take a long time to collect the initial fingerprints for every student in the school.
 The equipment needed to take and read fingerprints is more expensive than magnetic stripe
reading equipment.
 If a student cuts a finger, the fingerprint may not be identified by the system.
 There are ‘invasion of privacy’ issues and some parents may object to having the fingerprints of
their children stored on a database.

Dina El-Akkad 95
ICT I.G.C.S.E.
9.7.2 Student performance
Teachers could make use of spreadsheets to monitor the performance of their students.

9.7.3 Exam timetables, Subject timetables and teacher substitution


Many factors have to be taken into account when producing timetables for each student:
 availability of teachers
 availability of rooms for each subject
 subject clashes
 number of hours for each subject

When using software to create timetables, it is easy to try ‘what it’ scenarios to ensure the most
efficient use of time is utilised.
Timetables can be produced to cover classes when teachers are absent.

9.8 Booking systems


9.8.1 Theatre and cinema booking systems
Online booking systems rely on the ability to update file immediately thus preventing double-
booking which could happen if the system response time was slow.
How a theatre booking system works:
 the customer clicks on the performance they wish to see
 a date and time is time is typed in
 the required number of seats is entered
 the seating display in the theatre is shown on the screen
 the user selects their seat(s) by highlighting the actual seats on the screen display and then clicks
CONFIRM to go to the next part of the process
 the database is then searched to check the availability of the selected seats
 if the seats are available the total price is shown
 if the customer is happy with this, they select CONFIRM on the screen
 the payment method is then selected and payment made
 an email is sent to the customer which they print out and is used as an e-ticket
 the database is finally updated with the transaction and the seats become no longer available.

9.8.2 Flight booking systems


Booking flights is slightly more complex since it involves choosing airport, departure date,
returning date, etc.

Dina El-Akkad 96
ICT I.G.C.S.E.
9.9 Banking applications
9.9.1 Automatic teller machines (ATMs)
Disadvantages with ATMs:
 they are often in places where theft can take place at night
 ‘bogus’ ATMs can be set up to gather information about the card and retain the card
 some banks charge customers for the use of ATMs.

9.9.2 Internet banking


Services available to customers using on-line banking:
 Transfer money between accounts
 Order a cheque book,
 Pay bills,
 Print statements,
 Change personal details,
 Look account transactions for a given period.

Services not available to customers using on-line banking:


 Withdraw cash.
 Deposit cash.

Advantages of online shopping and banking


1. No waste of time and money travelling long distances.
2. Greater choice of goods than local shops.
3. Shopping and banking can be done 24/7.
4. Disabled and elderly people don’t have to leave the house.
5. People can spend more time doing other things.
6. There are often long queues at the banks or checkouts at the shops
7. Many people find it less embarrassing to ask for a bank loan using the internet.

Dina El-Akkad 97
ICT I.G.C.S.E.
Disadvantages of online shopping and banking:
1. Security issues are a major concern. These include:
 hacking, stealing credit card details
 viruses and other malware (e.g. phishing, pharming, etc.)
2. Fewer social contacts.
3. It is necessary to have a computer and internet connection.
4. Do not get much exercise from not getting out.
5. Cannot inspect the goods you are going to buy properly.
6. Delivery times can be long.
7. You cannot pay with cash.
8. High street shops and banks are closing and this is leading to ‘ghost towns’ forming

Advantages to the bank/shop:


1. Fewer branches to maintain.
2. Because the internet is global, the potential customer base is increased.
3. Fewer cashiers needed so less spent on wages.
4. Less money spent on security staff.
5. Less actual cash handled so fewer robberies.

Disadvantages to the bank/shop:


1. Cost of setting up and maintaining of websites.
2. Cost of retraining the staff.
3. Lose customers due to lack of personal touch.

9.9.3 Telephone banking


The customer calls the bank using a telephone. Then
 the customer keys in their account number
 they are then requested to enter a four-digit PIN or selected numbers from PIN
 the customer will then hear various options
 the customer chooses one of the options

With this system, there is no need to have a computer and it’s possible to talk to an actual human
being.
However, compared to internet banking, it can be much slower (there may be a long queue before
you can talk to somebody) and the options can be a little more complex to navigate. But it can also
be quicker if your computer isn’t switched on at the time and you only want a balance enquiry.
Dina El-Akkad 98
ICT I.G.C.S.E.
9.9.4 Chip and PIN
When paying for items using a chip and PIN card, electronic fund transfer (EFT) takes place.

Suppose a customer goes into a restaurant to pay for a meal using chip and PIN card:
1. The PIN is entered using a keypad.
2. The card is checked to see if it is valid.
3. The PIN is read from the chip on the card and compared to the one just keyed in.
4. If they are the same, then the transaction can proceed.
If this is the third attempt at entering the PIN, then the transaction is terminated.
5. The restaurant’s bank contacts the customer’s bank.
6. A check is made to see if the customer has enough funds.
7. If there aren’t enough funds available, then the transaction is terminated.
8. If everything is ok, then the transaction is authorised.
9. An authorisation code is sent to the restaurant.
10. The price of the meal is then deducted from the customer’s account.
11. The same amount of money is then added to the restaurant’s bank account.
12. A receipt is produced as proof of purchase.

9.9.5 Clearing of cheques


Banks clear cheques using a centralized clearing centre.
Suppose John uses a bank called Hodder bank and pays a cheque for $50 to a company called H&S
Ltd who bank with Smith Bank.
1. The cheque is sent by the Smith Bank to a centralised clearing centre.
2. The cheque is processed by the clearing centre by first passing it through a reader/sorter
machine. The machine reads:
 the amount on the cheque
 the code line (containing account number, sort code and cheque number).
3. All the cheques are then sorted using their sort codes (unoque, six-digit numbers), ready for
sending to an exchange centre.
4. The data from the cheque which has been read is then converted into an encrypted file
known as IBDE (Inter-Bank Data Exchange) file.
5. Every IDBE is ‘signed’ with a digital signature so that the receiving bank can be sure that
the data hasn’t been tampered with.
6. Smith Bank delivers the cheque to an exchange centre.
7. The exchange centre then passes the cheque back to the paying bank (Hodder Bank in this
case) which then sends it to its own clearing centre.

Dina El-Akkad 99
ICT I.G.C.S.E.
8. At the paying bank’s clearing centre, the digital signature is first checked and then the
cheque is passed through their own reader/sorter machine to make sure data matches with
that on the IBDE file. It also sorts the cheques into branch order (using the sort code).
9. The paying bank checks to see if John has enough money in his account, etc. Based on this
information, Hodder Bank decides whether to pay John’s cheque to H&S Ltd or return it
unpaid to the Smith Bank.

A cheque may be returned unpaid if:


 the customer has not got enough money
 the cheque has not been signed, dated, or written correctly
 the cheque is fraudulent for some reason.

The whole process takes three working days.

9.9.6 Electronic funds transfer


Electronic funds transfer (EFT) is a system that allows money transfer instructions to be sent
directly to a bank’s computer system. No actual money is transferred.
Electronic Fund Transfer at Point-of-Sale (EFTPOS): when a credit/debit card is used to pay for a
purchase in a store.

Dina El-Akkad 100


ICT I.G.C.S.E.
9.10 Expert systems:
Expert systems are computer programs that attempt to replicate the performance of a human expert
on some specialized field. Examples:
 Mineral/Oil exploration
 Diagnosing a person’s illness
 Car fault diagnosis
 Chess games
 Tax and financial calculations
 Plant/animal/rock identification
 Construction industry to come up with cost of a new building.

An expert system consists of:


 Knowledge base that contains the data or facts provided by a human expert.
 Rules base which is a set of rules. They closely follow human-like reasoning.
 Inference engine to draw reasonable conclusions from rules.
 User interface which is how the computer interacts with the user.

How to set up an expert system:


 Experts in the field are interviewed to find out what is needed in the expert system.
 Data is then collected from these experts.
 A knowledge base is designed and then created.
 The rule base is designed and then created.
 An Inference engine is designed and then created.
 The user interface is designed and then created.
 The expert system is tested against known conditions and scenarios.
 It is also checked to see if it meets the original specification.
 Experts are interviewed about how effective it is before the expert system goes out on general
release.

Advantages:
 Expert systems provide consistent answers.
 Using expert system reduces the time to solve a problem.
 Allows areas of the world access to expertise which they couldn’t normally afford.
 Expert systems never forget to answer a question when determining the logic.
 A less skilled work force is needed so saving money.
Dina El-Akkad 101
ICT I.G.C.S.E.
Disadvantages:
 Expert systems tend to lack common sense in some of the decision-making processes.
 Errors in knowledge base can lead to incorrect decisions being made.
 It can be expensive to set up in the first place.
 Considerable training is necessary to ensure the system is used correctly by the operators.

Example of an expert system: oil prospecting


 An interactive user screen appears.
 Questions are asked about geological profiles.
 Answers to the questions and information about the geological profiles are typed in.
 The inference engine searches the knowledge base using the rule base.
 The system:
 suggests the probability of finding oil as an output
 indicates the probable depth of deposits
 makes predictions about geological deposits above the soil
 produces contour maps showing concentration of minerals, rocks, oil, etc.

9.11 Using 3-D printers in medicine:


Surgical and diagnostic aids
It is possible to print out anatomical parts using 3-D printers. These are used as an aid towards
diagnosis and surgical procedures. The patient is scanned using:
 CT (computed tomography)
or
 MRI (magnetic resonance imaging)

A 3-D printer can then reproduce a solid object showing the exact internal organs of the patient.
The doctor or surgeon can then show the patient exactly what is wrong and then show them what
procedures are required. They also help the surgeons in planning surgical procedures.
3-D printers produce hard nylon objects which are used in certain surgical planning. Tis reduces
the chance of any errors when the actual procedure is carried out.

Prosthetics
3-D printers are used to print out prosthetics (false arms, hands and legs) at a fraction of the cost
compared to existing methods.

Dina El-Akkad 102


ICT I.G.C.S.E.
Tissue engineering
Recent advances have allowed the 3-D printing of bio-compatible materials, cells and supporting
structures. 3-D bio-printing is used to produce multilayered skin tissue, bone tissue, heart/artery
grafts and tracheal splints.
The procedure involves making biological materials by diffusing cells into a bio-compatible
scaffold. The bio-printed tissue is then put into an incubator and the cell structure held within the
scaffold grows to form actual cellular tissue.

Design of medical tools and equipment


Medical equipment/tools produced using 3-D printers are produced much faster and much cheaper
than using traditional methods.
3-D printers create injection-moulding tools which allow several prototypes to be made within a
short time.
Traditional methods require aluminum moulds to be made which is slow and expensive process.

9.12 Computers in libraries:


Many libraries use barcodes on the books and on the borrower’s library card.
Some libraries use magnetic stripes on the borrower’s card.
Some libraries use RFID chips in their books.

Two files will exist: Book file and Borrower’s file.

On a daily basis, the borrowers file is checked by the computer to see which books are overdue.
The computer reads a record from the book file.

Dina El-Akkad 103


ICT I.G.C.S.E.
9.13 Computers in retail industry:
Automatic stock control system using barcodes
 The barcode on each item is scanned at the EPOS.
o If the barcode can’t be read, then the number is keyed in manually
 The barcode is searched for on the stock file record by record until a match is found.
 The record is accessed.
 The price and description of the product are sent back to the EPOS
 The stock level is found in the record and is reduced by 1and the new stock level is written back
to the file.
o If the number in stock of the item is less or equal to the re-order/minimum number in stock,
then an order is placed using the supplier file.
o Once goods have been ordered the item is flagged
o When new goods arrive, the stock file is updated and the flag removed
 The above is repeated until all the items have been scanned.
 The customer is given an itemised bill.
 The computer updates the file containing the daily takings.
 If the customer has a loyalty card, the system will automatically update the points total.

Dina El-Akkad 104


ICT I.G.C.S.E.
9.14 Recognition systems:
Automatic Number Plate Recognition (ANPR) System
ANPR systems are used to read the number plates on cars in a number of applications including car
parks to enable entry and exit to be automatically controlled by a computer system.
1. A sensor detects a vehicle and sends a signal to a microprocessor to instruct a camera to
capture an image of the front of the vehicle.
2.
i. An algorithm is used to locate and isolate the number plate from the image taken by the
camera.
ii. Each character on the number plate is then segmented.
iii. Each character is then recognised using OCR software.
iv. This text string is then stored on a database.
3. The car park barrier is raised and a ticket showing the date and time of entering is issued.
4. When the driver returns to the car park, the ticket is inserted into a machine which calculates
the car park charges. The payment is registered on the database. If the number plate is
recognised and payment has been made, the exit barrier is raised.

9.15 Monitoring and tracking systems:


9.15.1 Monitoring/tracking a member of the public
There are a number of reasons why a person may need to be tracked:
 the person may be an offender who is released from prison and his whereabouts is to be
known at all times
 an elderly person may need to be tracked to ensure their safety
 somebody taking part in a marathon to determine their position and their time to complete
the race.
An ankle monitor makes use of RFID technology by inserting a microchip into the device which is
strapped to the ankle.
It sends out at timed intervals radio frequency signals. These signals contain the person’s location
and the other data. The signals are picked up by a device in the person’s home. This unit uses
either landline or mobile phone network to rely the information back to a computer in the control
room. GPS monitoring is also used so that the person can be tracked outside their home.
CCTV cameras are also used to monitor people in streets and shopping malls in case of crime or
aby suspect activity.

9.15.2 Cookies
9.15.3 Key logging
Dina El-Akkad 105
ICT I.G.C.S.E.
9.15.4 Employee call monitors
Employee call monitoring allows managers to listen in to employees’ telephone calls for the
following reasons:
 to improve the employees performance (e.g. at a call centre)
 allows the manager/supervisor to join in a call where necessary
 can be used as a training tool
 it allows a company who are concerned about security to monitor all calls

Types of call monitoring:


1. monitor: allows the manager to listen in on calls. The line is muted.
2. whisper: allows the manager to speak to employees to help them with a call. Only the employee
can hear the manager’s voice.
3. barge: allows the manager to be heard by both the employee and the other person in the call.

9.16 Satellite systems:


9.16.1 Global positioning satellite (GPS) systems and satellite navigation
 At least 24 satellites in operation at a given time.
 Satellites transmit signals including distance and time to the
computers installed in the mode of transport.
 Computers receive and interpret these signals.
 Knowing their position on Earth depends on very accurate timing
using atomic clocks.
 The computer in the mode of transport calculates its exact position based on the information
from at least three satellites.
 Position of vehicle is within 1 metre.

Uses:
 cars to calculate routes
 walkers to locate position on hills/mountains
 runners to calculate distance run
 farmers for tractor navigation/soil evaluation/livestock control/yield monitoring
 satellite navigation systems for ships
 tracking aircraft

Dina El-Akkad 106


ICT I.G.C.S.E.
Advantages:
 The driver doesn’t have to consult paper maps, so it is safer.
 Can warn drivers about one way streets, street closures, etc.
 The system can estimate the time of arrival.
 The system can give useful information such as location of petrol stations.
 It is possible to program in the fastest route, route to avoid towns, etc.

Disadvantages:
 If the maps are not kept up to date, they can give incorrect instructions.
 Loss of satellites signals can cause problems.
 Road closures due to accidents or road works can cause problems.
 If an incorrect start point or end point is keyed in the system will give incorrect information.

9.16.2 Geographic information system (GIS)


The technology combines maps with computer graphics and databases.
GIS enables the following:
 combination of information into easily understood maps
 performance of complex analytical calculations and then presentation of the results in the form
of maps, tables and/or graphics
 Geographers, scientists and engineers are able to see the data in several different ways in order to
see patterns and relationships.
Carrying out queries on GIS systems (in a method similar to internet searches) will produce the data
which matches the query in the form of diagrams, maps, or set of tables.

Uses:
 Emergency services to send the closest emergency personal to a location.
 Biologists and environmentalists to protect animal life and plans in certain areas
 Teachers in their geography, science or engineering lessons.

9.16.3 Media communication systems


Communication media refers to methods of delivering and receiving data/information using
telecommunications, e.g., fibreoptics, copper cable and Wi-Fi. The global communication method
is the use of satellites. Satellites contain antennas, transponders (to allow receiving and sending of
data), solar panels (for power from the sun) and propulsion (to ensure the satellite is in the correct
orbit at all times). Satellites systems are used to transmit television, telephone and internet data
around the world. Cables would be too costly and there is the problem of signal deterioration.
Dina El-Akkad 107
ICT I.G.C.S.E.

Dina El-Akkad 108


ICT I.G.C.S.E.
10.1 Communication with other ICT users using email:
10.1.1 Constraints:
Laws
Most countries require companies and individuals to abide to the following rules when sending out
emails:
 many countries require senders of emails to obtain ‘opt-in’ permission before emails are sent out
 a company or individual must have a clear way for recipients to ‘opt-out’
 subject lines should not be false or misleading
 a valid postal address must accompany emails from companies or organisations
 companies must provide subscribers with a very clear way to unsubscribe from their listings
 companies and organisations must make their privacy policy very clear to subscribers
 many countries don’t allow companies or organisations to harvest email addresses (capture lists
of email addresses)

Acceptable language
List of unacceptable content to be used in emails, text messages and online forums:
 obscene images
 language that is regarded as abusive, profane (offensive), inflammatory (form of speech that is
used with the intent to stir up emotions), coercive (to make someone do something by using
force or threats), defamatory (say false things in order to make people have a bad opinion of
someone or something) or blasphemous (profane words and actions, especially when they are
connected to something religious)
 racist, exploitative, violent messages
 use of illegal materials in messages

Copyright
Emails are subject to copyright laws. It is important that the recipient checks before printing,
copying or forwarding an email if the sender has indicated that the message is confidential.

Netiquette
Netiquette is shortened from the phrase internet etiquette, which refers to the need to respect other
users’ views and display common courtesy when posting views in online discussion groups or when
sending out emails.

Dina El-Akkad 109


ICT I.G.C.S.E.
Rules of netiquette:
1. Don’t be abusive – don’ threaten people or use personal violence
2. Don’t send spam
3. Be clear with your message
4. Remember that posts can be read by anyone
5. Always check your spelling and grammar – have a good impression
6. Respect people’s privacy
7. Forgive people’s mistakes
8. Don’t use CAPITAL LETTERS to highlight comments – this is seen as shouting
9. Don’t plagiarise – always acknowledge quotes used in messages you write
10. Don’t use too many emotions as they might annoy the reader

10.1.2 Email groups:


Email groups are used for a number of purposes:
 it is easier for a user mails if the addresses are all grouped together under a single name.
 companies and organisations can group people together for marketing purposes.
 ‘spammers’ can create email groups by buying addresses of people from certain companies.
 Companies use email groups to set up meetings to ensure that everybody is invited to attend.

10.2 Effective use of the Internet:


10.2.1 General Internet terms:
Hypertext transfer protocol (hhtp and https)
http is a set of rules that must be obeyed when transferring data across the internet. If http is
omitted from the address, most web browsers default to http.
When some form of security (e.g. SSL or TLS) certification or encryption is used then the protocol
is changed to https. https is slower than http.

Web browsers and URLs


A web browser is software that allows a user to display a web page on their computer screen. They
translate the HTML from websites and show the result of the translation. Most web browsers share
the following features:
 ‘home’ page
 ability to store a user’s favourite websites/pages
 keep a history of the visited websites
 ability to go backward and forward though websites opened
 have hyperlinks
Dina El-Akkad 110
ICT I.G.C.S.E.

Web browsers use uniform resource locator (URLs) to access websites and retrieve file. The web
browser breaks up the URL into three parts:
Protocol://website address/path/filename
Example:

http://www.hoddereducation.co.uk/igcse_ICT

This is the
This is the web This is the file name
protocol used
server’s name used (often the web page)

The web browser translates the web server name into an IP address. The HTML is returned and is
shown as a correctly formatted page on the screen.

File transfer protocol (ftp)


FTP is a network protocol used when transferring files from one computer to another computer over
the internet.

10.2.2 Blogs, wikis and social networking sites:


Blogs
Blogs (web logs) are personal internet journals where the writer (or blogger) will type in their
observations on some topic (e.g. a political view) or perhaps provide links to some relevant
websites.
Blogs tend to range from minor projects where people just gossip about some topic (such as the
performance of an actor in a recent film) through to important subjects such as politics, advertising
products or raising awareness of a certain key event taking place.
The comments made on blogs are not immune from the law.

Features of blogs:
 updated on a regular basis by the author
 usually organised in reverse chronological order (most recent to least recent entry)
 normally public – anyone can read them
 entries normally come from a single author
 other internet users can’t change blogs – they can only read them and comment

Dina El-Akkad 111


ICT I.G.C.S.E.
Microblogs are similar to blogs but are most often used on social networking sites to make short,
frequent posts. The posts can be done using instant messaging, emails or other social networking
vehicles (such as tweets).

b-blog –short for business blogs – is used by business to promote themselves on the internet.

Wikis
Wikis are web applications or websites that allow users to create and edit web pages using any web
browser.

Features of wikis:
 anyone can edit, delete or modify the content
 many authors can be involved in a wiki
 it is possible to organise a page any way that the author(s) wish(es)
 shows / keeps track of all entries – i.e. it stores a document history
 can be easily edited using a web browser
 allows large documents to be seen by many people – it is easier than emailing several people,

Social networking sites


Social networking sites focus on building online communities of users who share the same interests
and activities. They enable people to share photos, videos and music, hobbies, favourite eating
places, and so on.

Features of social networking sites:


 each member is provided with free web space
 each member can build their own private and public profiles
 it is possible to upload contents such as text messages, photos and videos
 it is possible to ‘write on each other’s wall’
 members are given free instant messaging and video chatting
 it is possible to email other members within the community
 members can create pages where they can post photos, articles, and so on.
 It is possible to invite people to become friends
 members have control over who can access their private or personal data

Dina El-Akkad 112


ICT I.G.C.S.E.
10.2.3 Searching the Internet for information:
To locate the information:
1. type the URL if you know the name of the website
2. use a search engine if you don’t know the name of the website

Once the information is found it can then be saved or used as follows:


 saved as a favourite and accessed when required
 by adding hyperlinks in a document, so that this web page can be accessed when required
 by using ‘Print Screen’ and then pasting the saved information into a word processor page
 copy and pasting the information into another document
It is important to acknowledge your sources of information to avoid plagiarism and because the
information may be subject to copyright.

Advantages of the Internet as a source of information:


1. Information is up to date since it is quicker and easier to amend web pages than reprint books
2. The internet has vast amount of information
3. Searching for information using a search engine is fast and easy.
4. You can access the Internet from anywhere no need to travel to a library.
5. Information on the internet is usually free of charge
6. Pages on the internet can have multimedia elements that make learning more interesting.

Disadvantages of the Internet as a source of information:


1. The internet is no regulated – anything can be posted so information may be biased or totally
incorrect. Books usually undergo some form of review before being published.
2. There is always the risk of accessing inappropriate websites when using search engines.
3. It is easy to be distracted when searching the internet by computer games and social networking
sites.
4. There is always the risk of ‘information overload’ If the user lacks the experience when using
search engines.
5. Because it is very easy to copy material from the internet, there is huge risk of plagiarism.
6. Some research skills are lost when using the internet as search engines do all the work for you.

Why are internet searches to find relevant information not always fast?
It is possible for millions of sites to be found matching a given criteria. Unless the user narrows
down their search criteria it can take a long time to find out exactly what they are looking for.

Dina El-Akkad 113


ICT I.G.C.S.E.
While search engine companies deny it, certain websites are also placed at the top of their lists.
These websites in the list always show up first in the search results and may not contain exactly
what the user is looking for. Search engines also rank the time it takes to load up pages from
websites – the fastest are given priority when the results appear on the screen. So a user may not
find exactly what they are looking for when using the search engine.

Why isn’t it always easy to find reliable information on the internet?


Anybody is able to set up a website and write whatever they like without it having to be first
verified. Unlike books, the material posted on websites doesn’t have to be checked by other people
to ensure it is factually correct. It is also possible for search engines to suggest websites that are
completely out of date.

How can you evaluate the reliability of information found on the internet?
 Anybody can set up a website so information is not necessarily reliable or accurate.
 Some commercial websites will be biased to advertise their products.
 If a website has excessive advertising it could be unreliable.
 If the advertising on a website is related only to its own products it could be unreliable.
 It is possible to use the final part of a URL to identify a website’s reliability – websites ending
with .ac and .gov are more likely to be reliable
 endorsements - has the website been recommended by a trustworthy organisation?
 If a website has testimonials, this can indicate reliability.
 If the date of the last update was a long time ago it is likely to be unreliable or out of date.
 links to and from the website - do the links reference websites that are decent, legal, honest and
reliable?
 comparing the information on the website with information from other reliable websites or
textbooks.

WISHING YOU ALL THE BEST OF LUCK


LOVE YOU ALL :* :* :*
References:
Brown, G., Sargent, B. & Watson, D. (1995), Cambridge IGCSE ICT. London, UK: Hodder
Education.
Brown, G. and Watson, D., IGCSE Information and Communication Technology. London, UK:
Hodder Education

Dina El-Akkad 114

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy