1 / 44

I.C.T. Paper 1

I.C.T. Paper 1. Basic computer process. Input. Process. Output. Keyboard Mouse Scanner Digital camera Light pen Graphics tablet Sensors. Monitor Speaker Plotter Printer. Backing store. Hard disc Floppy disc CDRW Flash memory. Embedded. Palmtop. Laptop. Microcomputer.

marion
Download Presentation

I.C.T. Paper 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. I.C.T. Paper 1

  2. Basic computer process Input Process Output • Keyboard • Mouse • Scanner • Digital camera • Light pen • Graphics tablet • Sensors • Monitor • Speaker • Plotter • Printer Backing store • Hard disc • Floppy disc • CDRW • Flash memory

  3. Embedded Palmtop Laptop Microcomputer Mainframe Types of computers

  4. Networks Computers linked together Shared files Email Share programs Share printers and disc

  5. Advantages of a Computer • Faster processing • Saves on storage space • Password protection to files Disadvantages • Initial cost of purchasing computers • Over reliance if a power cut • Staff retraining

  6. Country of origin Check digit Makes sure the barcode is scanned in correctly and details of the correct product is displayed Manufacturers Code Product Code Exam hint! Make sure you say CODE not Name. e.g. Manufacturers code NOT Manufacturers Name

  7. Input and output devices at the POS INPUT OUTPUT NOT till, cashbox, microphone

  8. Master file Transaction File Updated master file

  9. Advantages of POS • Faster service at POS • Fewer mistakes • Itemised bills • Variety of ways to pay • BuyOneGetOneFree Disadvantages • Power cuts • Damaged barcodes causes delays • Embarrassment with faulty card readers

  10. Loyalty cards • Retain customers • Sales patterns • List of spending habits Other data entry methods in shops Touch sensitive screens OCR PDET Kimball tags

  11. Online shopping Beware! credit card fraud • Buy goods online 24 hours a day 365 days a year • No needing to travel so save time

  12. E-commerce Online shopping What does a company need? Advantages • Internet Service Provider • Database of stock • Web page • Secure electronic payment For company Reach wider market • For customer • 24 hour / 365 day shopping • Don’t have to leave home (disabled) • Savings on travel and time costs What does the customer need? I S P Credit or debit card

  13. Disadvantages of online shopping • Credit card fraud • Hacking • Spreading a virus

  14. Bank of Monee Date…… Pay…………………… Amount……………….. ………………………… A N Other 46-45-90 37465327 102201 Banking ·         Cheque processing ·         EFTPOS ·         ATMs ·         Credit cards ·         Debit cards ·         Smart cards Banking Electronic Funds Transfer at Point Of Sale MICR Magnetic Ink Character Recognition. Bank Sort Code Account No Cheque No

  15. Automatic Teller Machines Services available at an ATM ·         Cash ·         Change PIN No ·         Check balance ·         Transfer money between accounts ·         Printed mini statement ·         Order cheque books and statements ·         Select language. ·         Order theatre tickets ·         Deposit cash Advantages of ATMs; For the customers ·         Provide 24-hour services ·         Access ATM’s in many locations ·         Cuts down on queues in banks / faster service for customers (Not shorter queues at the ATM) For the bank ·         Save on staffcosts ·         Allows staff to concentrate on other work e.g. selling mortgages or other ·         Services/increase sales ·         Increased security • Problems which could occur when customers use ATMs • ·         Could be attacked/security • ·         Could forget PIN • ·         Wrong amount of money issued • ·         Card could be retained • Card might get damaged

  16. Card crimes Prevention Stealing cards at ATMs Do not write down PIN numbers Do not let anyone see you typing in your Pin number Stealing debit and credit cards Photos on cards Lower amount that can be spent with cards before seeking authorisation Details of stolen cards on POS Creditcard fraud on the Internet and their misuse Use agreed words on some sites Use a secure service Encryption Card copying Programmable smart cards to make data difficult to copy Use of holograms to make cards difficult to copy. Account No Spending limit Cards Credit Cards Debit cards Smart cards

  17. Online banking Homebanking Customers can access their bank account details from home across the Internet Advantages ·      Customers don’t have to leave home/ saves time ·         Savings on postal or travel costs ·         Transfer money or pay bills from home ·         Pay bills anytime ·         Instant balances Problems ·  Hacking of credit card / debit card details by unauthorised people who might misuse the data. · Have to pay telephone charges whilst online. · Lack of personal contact; - may not understand the system and you have no one to help.

  18. Online booking systems • Allow Internet users to check the availability of and book things like: • Theatre, cinema and concert tickets • Seats on coaches, trains and aeroplanes • Hotel rooms • An online booking system is essentially a web site that can be used to access a remote database

  19. The Internet A network of networks • What do you need to get the Internet • A computer with a modem and access to a telephone line is needed. • Faster connection is possible with a special type of digital telephone line called an ISDN line which doesn’t need a modem. • Broadband: Very high speed digital lines • Find an Internet Service Provider (ISP)

  20. Email Sending messages to other internet users Teleconferencing Communicate visually with other Internet users. E-commerce Buy goods Tele-banking Manage banking transactions, pay bills, transfer money between accounts etc Web publishing Create and administer your own websites for specialist interests, etc... Chat lines Send messages on-line to some strange people. Broadcasting Music and video Downloading Software, drivers and other files Services available on the Internet:

  21. Browsers • To browse or ‘surf’ the Internet a browser program is required • use search engines to search for information by entering keywords

  22. Messages sent -between two computer -across networks -across the Internet Emails • Address books list of email addresses • Attachment a stored file which is attached to a • message and sent with it • Carbon copy emails an email is sent to more than one person at the same time

  23. Advantages of email Sending and receiving is faster More secure because password protected and unlikely to get lost People do not have to be in to receive it One letter can be sent to many users mailboxes at the same time Messages are dated when sent and received and an automatic response given.

  24. Dangers of the Internet • Hackers • Firewall software • Viruses • Often spread via e-mail • Virus checking programs • Don’t open emails from people you don’t know • Undesirable material • Software to block sites • Adult supervision • Filtered service from ISP • Paedophiles • Do not give personal details to strangers • Do not go into private rooms with strangers • Never arrange to meet anyone you chat to.

  25. Disadvantages of the Internet • Much of the information isn’t checked and may be incorrect or irrelevant • A large amount of undesirable material, such as pornography, is readily available • Messages sent across the Internet can be easily intercepted and are open to abuse by others • Large telephone bills can easily be run up • Too much time spent on the Internet could result in a lack of face-to-face interaction with others and a loss of social skills • Going on-line runs the risk of hackers or viruses being able to damage your computer

  26. Code of conduct when using networks • Do not tell anyone your password • Change password regularly • Virus scan all discs • Do not misuse the Internet e.g email, chat rooms • No hacking • Do not steal hardware / software

  27. 8 User Interfaces • The human computer interface is what allows the user to communicate with the computer and is often called simply the user interface. • The three main types of user interface are; • Command-driven e.g. DOS • Voice • Graphical or GUI.

  28. Graphical User Interface GUI • W indows • I cons • M enus • P ointers • On screen assistants • On lineTutorial • Favourite settings

  29. OtherApplications Software Wordprocessing; Entering and processing text using a computer Letters Desktop publishing software In addition to bold, underline, italic etc it has images such as clipart , wordart, shading effects, rotating text and frames such as text boxes. Posters School projects Multimedia Can handle sound and video files Animation and transition effects School presentations e.g. showing previous school trips to parents Web publishing software *sound files video files *has hyperlinks to other pages School website

  30. Databases and Files Keyfield is the field that uniquely identify a record

  31. Data Information Knowledge • is raw facts and figures • is processed data • is derived from information which has rules applied to it DATA Information Knowledge

  32. ID Number Name Postcode Date of Birth Cost Y/N Data types Integer number String String Date Real or Currency Boolean

  33. Saves memory • Faster to type in • Less chance of errors Coded Data

  34. Errors Typing in wrong character Abaerun • Hte instead of The • 123456 132465 Typing in wrong order

  35. Checking Data for Errors Verification ‘Process of checking that data has been copied over correctly from one medium to another’ These can only be checked by Double entry keying in and cross checking a careful visual check Process of checking data is LEGAL and VALID Validation Range checks Between 1 and 999 Format checks 99/99/99 Check digits

  36. Protecting data • 1. Physical protection of the data. • Keep BACKUP copies in a safe place • Put the write protect notch on your disc/ make hard discs read only • Keep copies in fireproof boxes or computer discs in fireproof rooms. • Lock computers to desk

  37. Spreadsheets • Advantages of a spreadsheet • Accuracy of calculations • ‘What if’ investigations • Draw graphs and other output forms • Save the formulas and data • Automatic recalculation if data changes NOT does calculations for you!!!

  38. Software protection of data • A. Unauthorised Access/ hacking • 1.Hierarchy of Passwords Identification User Name Authentication Password Authorisation What files you can see and what your allowed to do • Read only write only or read and write • 2. Encryption • Coding data at on end sending it and decoding it at other end. • 3. Voice / hand prints To access rooms 4. Smart cards To access rooms and computers • B Spreading of viruses • Write protect media so can’t be written onto • Don’t copy illegal software • Use a virus scanning software and virus eradication program. Make sure this is kept up to date with the latest virus definitions and fix tools • Don’t download from the Internet straight onto hard disk

  39. USING A COMPUTER FOR DATALOGGING AND CONTROL Write a sequence of steps needed to keep the temperature of the greenhouse between 200 C and22 0 C, and keep it there, using only the heater and thermostat. • If temp on thermostat > 220 C turn off heater • If temp on thermostat < 200 C turn on heater • If temp between 200 C and 220 C do nothing / leave alone • Advantages of datalogging • 24 hours/365 day monitoring • Human do not have to be there • Accurate readings • Accurate recordings • Types of sensors • Heat • Light • Pressure • Moisture

  40. Employment issues • New Jobs e.g. programmers • Retraining e.g. accountants using spreadsheets • Jobs lost e.g. filing clerks • Teleworking • ‘working from home using computer networks’ • Saves travel time • Saves journey to work costs • Don’t lose skilled labour • Flexible working hours • Savings on office space and rents

  41. Health Hazards Back Ache Epileptic fit RepetitiveStrain Injury Radiation Eye Strain Poor circulation Sick Building Syndrome Headaches

  42. Prevention Air conditioning Shading from sunlight blinds etc. Adjustable chairs Take regular breaks Foot rests Screen filters to reduce glare and flicker Wrist rests Take regular breaks Walk around

  43. Wireless Applications Protocol Mobile phones • Advantages • Use anywhere • Don’t have to be attached to a landline • Services • Text messages • Voice mail • Alarm clock • Games • To do list • Calendar • Send Photos • Disadvantages • No service • Battery fails/ no credits • Fined if used while driving • Potential health risk • Get mugged

  44. Interactive digital TV • Pay to view (sport / films) • Games • Email • Interactive choice • Televoting • Teleshopping • Book holidays • Email Back to START

More Related