Turbolearn Notes
Turbolearn Notes
Hardware
Hardware is the general term for the physical components of a computer
system.
Internal hardware
External hardware
Examples of hardware:
Keyboard
Mouse
Camera
Motherboard
Printer
Page 1
Created by Turbolearn AI
Motherboard:
Allows the processor and other computer hardware to function and
communicate.
Acts as a 'hub' to which other computer devices connect.
Random Access Memory (RAM):
Internal chip where data is temporarily stored when running applications.
Contents are lost when the computer is turned off.
Stores data, files, or parts of the operating system currently in use.
Read-Only Memory (ROM):
Stores information that needs to be permanent.
Information is not lost even when the power is turned off.
Central Processing Unit (CPU)/Processor:
Has two units:
Arithmetic and Logic Unit (ALU)
Control Unit (CU)
Graphics Card:
Allows the computer to send graphical information to a video display
device.
Usually connects to the motherboard.
Sound Card:
Provides the computer with the ability to produce sounds.
Internal Hard Disk Drive/Solid-State Drive (HDD/SSD):
Backing storage.
Network Interface Card (NIC):
Allows a computer or other device to connect to a network.
Can be wired or wireless.
Software
Software refers to the programs that control the computer system and
process data.
Application software
System software
Application Software
Page 2
Created by Turbolearn AI
Application software provides the services that the user requires to solve
a given task.
Examples:
Word processing
Spreadsheet
Database (management system)
Control and measurement software
Apps and applets
Video editing
Graphics editing
Audio editing
Computer-Aided Design (CAD)
System Software
System software consists of programs that allow the hardware to run
properly and allow the user to communicate with the computer.
Examples:
Page 3
Created by Turbolearn AI
CPU
The CPU (Central Processing Unit) is the part of the computer that
interprets and executes commands from the computer hardware and
software.
Internal Memory
Input/Output Device
Backing Storage
Backing storage includes internal Hard Disk Drives (HDD) or Solid-State
Drives (SSD).
Operating Systems
Operating systems are specialized software that allows users to
communicate with computer systems.
Page 4
Created by Turbolearn AI
User Interfaces
Different types of user interfaces include:
Gesture-Based Interfaces
Page 5
Created by Turbolearn AI
Rely on human interaction through the movement of hands, head, or even feet.
Uses techniques known as computer vision and image processing.
Desktop Computers
Made up of separate monitor, keyboard, mouse, and processor unit.
Mainly used in offices, businesses, for educational purposes, and for gaming.
Mobile Computers
Types of mobile computers:
Laptop computers
Smartphones
Tablets
Phablets
Light weight
Low power consumption
Low heat output
Advantages of Laptops
Page 6
Created by Turbolearn AI
Portable.
Less room on the desk.
Full advantage of WIFI features.
Can link to multimedia systems.
Disadvantages of Laptops
Limited battery life.
Can be easily stolen.
The keyboard and pointing device may be awkward to use.
Not always possible to upgrade.
Smartphones
Key Features:
Advantages of Smartphones
Small in size and light weight.
Can be used for internet and phone calls.
Reasonable battery life.
Contain sensors.
Disadvantages of Smartphones
Small font to read.
Slower typing.
Web browsing can drain the battery.
Not all websites’ features can be accessed by smartphones.
Can be easily stolen.
Page 7
Created by Turbolearn AI
Tablets
Work in a similar way to smartphones.
Have a virtual keyboard.
Advantages of Tablets
Fast to switch on.
Fully portable.
Easy touch screen technology.
Can use several apps as standard.
Disadvantages of Tablets
Limited memory.
Expensive.
Touch screen is error-prone.
Can’t support all file formats.
Phablets
Hybrid between a tablet and a smartphone.
Have much larger screens than smartphones but are smaller than tablets.
Artificial Intelligence
Page 8
Created by Turbolearn AI
Negative Impact of AI
Could lead to human job loss.
Loss of skills.
Inability to carry out tasks done by robots.
Extended Reality
Extended Reality (XR) encompasses real and virtual combined
environments.
Examples:
Page 9
Created by Turbolearn AI
Keyboard
Most common method of data entry.
Frequent use of a keyboard can cause Repetitive Strain Injury (RSI).
Ergonomic keyboards can help to overcome this problem.
Advantages
Fast and well-known method.
Easy to use.
Easy for verification.
Disadvantages
Difficult for people with limited arm/wrist movement.
Slow method compared to DDE.
Takes up desk space.
Numeric Keypads
Used to enter numbers only.
Used in Automatic Teller Machines (ATMs) and Point of Sale (POS) terminals.
Advantages
Faster than standard keyboards.
Small keypads are easier to carry around.
Disadvantages
Small keys make input difficult.
The order of the numbers on the keypad is not intuitive.
Page 10
Created by Turbolearn AI
Pointing Devices
Mouse
The user controls the position of a pointer on the screen by moving the mouse
around.
Uses of a mouse:
Opening software
Grouping files
Image editing
Controlling the pointer
Advantages
Disadvantages
Easy to damage.
Difficult for people with limited wrist movement.
Difficult to use if no flat surface is readily available.
Touchpad
Used as a pointing device in many laptop computers.
The pointer is controlled by the user moving their finger on the touchpad.
Same function as a mouse.
Advantages
Tracker Ball
Page 11
Created by Turbolearn AI
Similar to a mouse, except that a ball is on the top or the side of the device.
Easier to use for people with limited hand/wrist movement.
Industrial control
Luxury cars
People with RSI
Advantages
Disadvantages
Remote Control
Used for the operation of other devices using infrared signals.
Television
Multimedia control
Industrial applications to remotely control processes
Advantages
Disadvantages
Page 12
Created by Turbolearn AI
Joystick
Similar functions to a mouse and a tracker ball.
Uses of a joystick:
Advantages
Disadvantages
Driving Wheel
Input device that is similar to a joystick.
Advantages
Disadvantages
Page 13
Created by Turbolearn AI
The user can choose an option by simply touching a button/icon on the screen.
ATMs
POSs
Public information systems
Mobile phones/tablets
Computer-Based Training (CBT)
Self-service
Advantages
Disadvantages
Scanners
Used to enter information from hard copy.
The most common type is the flatbed scanner.
Produce computer-readable images.
Uses of scanners:
Scan documents
Scan photographs
Scan ancient books for protection
Scan in barcodes at POS terminals
Advantages
Page 14
Created by Turbolearn AI
Disadvantages
Quality can be limited depending on how good a resolution the scanner is.
Can be slow at scanning.
Digital Cameras
Replaced traditional film-based cameras.
The images are stored on a memory card (solid-state memory) and can be
transferred to a computer.
Can be transferred to the computer by: connecting the camera using a USB
port, directly reading the memory card, using wireless data transfer.
Advantages
Easier to produce better-quality photographs.
Faster and easier to upload photos.
No need to develop film and print out photographs.
Memory cards can store many thousands of photographs.
Disadvantages
Need to be computer literate to use the cameras properly.
There is some artistry lost because clever software now corrects errors in the
photographs.
Images have to be compressed to reduce memory storage.
Microphones
Page 15
Created by Turbolearn AI
Built into the computer or are external devices connected through the USB port
or using Bluetooth connectivity.
Uses of microphones:
Input speech
Input voice recognition software
Used as a sensor to pick up sound
Use in VOIP
Advantages
Faster to read in text than to type it in using a keyboard.
It is possible to manipulate sound in real-time using special software.
Used in voice activation systems.
Disadvantages
Sound files can use up a lot of computer memory.
Voice-recognition software is not as accurate as typing in manually.
Sensors
Sensors are devices that input data to a computer; the data is a
measurement of some physical quantity that is continuously changing.
Advantages
More accurate readings are taken when compared to human operators.
Readings are continuous.
Systems can be automatic, removing the need for human intervention.
Disadvantages
Page 16
Created by Turbolearn AI
Light Pens
Used with computers as an input device.
Only work with CRT monitors.
Allowing light pens to operate with LCD monitors are still at the development
stage.
Disadvantages
Problems with lag when drawing on the screen.
Only works with CRT monitors
Not that accurate when drawing.
Rather dated technology.
Card Readers
Page 17
Created by Turbolearn AI
Advantages
Disadvantages
Process:
Advantages
Faster transaction
The contactless card system uses 128-bit encryption systems to protect the
data.
No typing errors
Retailers no longer have access to the customer’s credit/debit card information.
Page 18
Created by Turbolearn AI
Disadvantages
Payments by cards
Advantages
Disadvantages
Page 19
Created by Turbolearn AI
Use radio waves to read and capture information stored on a tag from a
distance.
The RFID tag is made up of two components:
A microchip that stores and processes information
An antenna which is used to receive and transmit data/information
The tags can be passive or battery-powered.
Passive tags use the reader’s radio wave energy to relay back the
information.
Battery-powered tags use a small embedded battery to power the RFID.
Active tags have their own power supply; they can be read from up to 50
meters away.
Passive tags are cheaper.
Uses of RFID:
Livestock tracking
Retail
Admission passes
Libraries
Automobile
Passports
Tracking of stock:
Keep track of the whereabouts of every animal on a farm using active tags.
Allow farmers to identify who owns an animal.
Keep data about the animal on the tag.
Advantages
Disadvantages
Page 20
Created by Turbolearn AI
Tag collision.
Radio technology is easy to jam.
Easy to hack.
Easy to jam or interrupt.
More expensive.
Advantages
Disadvantages
The forms need to be carefully designed to make sure the marks are correctly
positioned to gather accurate information.
There can be problems if they have not been filled in correctly.
Only works with a black pen or pencil.
Limited to the questions on the paper.
They have to be manually checked before being read (can be expensive and
time-consuming).
Uses of OCR:
Page 21
Created by Turbolearn AI
Advantages
Disadvantages
Barcode Readers
Read information in the form of a bar code.
Handheld scanners or wands.
Advantages
Much faster than keying in data manually, and fewer mistakes will be made.
If used as a way of recording safety testing of components.
They allow automatic stock control.
They are a tried and trusted technology.
Disadvantages
Expensive system.
Not foolproof.
Can be easily damaged.
Page 22
Created by Turbolearn AI
Uses of QR:
Advertising products
Giving automatic access to a website or contact telephone number
Wi-Fi authentication
Can be used to deliver augmented reality
Storing boarding passes electronically at airports and train stations
Process:
Advantages
Disadvantages
Page 23
Created by Turbolearn AI
Monitors (Screens)
CRT Monitors
Cathode Ray Tube (CRT) monitors are the least expensive type of
monitor.
Becoming rare.
The screens are usually very large to enable complex diagrams to be created.
Use with a light pen.
Only used for Computer-Aided Design (CAD).
Advantages
The screen can be clearly seen at a wider range of viewing angles.
Allow light pen.
Disadvantages
Heavy.
Heat up easily and can cause fire.
Consume more power.
Have a flicker screen.
LED Screens
Made up of tiny light-emitting diodes (LEDs).
Only red, green, and blue.
Can control brightness with current.
Many monitors and television screens are advertised as LED when in fact they
are LCD screens which are backlit using LEDs.
LCD Screens
Page 24
Created by Turbolearn AI
Advantages
Low power consumption.
Light weight.
Sharp image resolution.
No screen flickers.
Produce low electromagnetic fields compared to CRT monitors.
Disadvantages
Motion blur.
Lower contrast than CRT monitors.
Weak and stuck pixels.
The LCD panel may not be uniformly illuminated by the back light.
Page 25
Created by Turbolearn AI
Smartphone, tablet
ATMs at banks
Ticket collections
Information spread
Advantages
Faster entry of options than using a keyboard or mouse.
Very easy method for choosing options.
User-friendly method – no training necessary in its use.
Option to expand the size of the display if necessary.
Disadvantages
Limited number of options available.
Not very good if large amounts of data are being input or output.
Easier for a third party to track a user’s interactions.
Dirty screen.
Multimedia Projectors
Receive signals that can be either analogue or digital.
The signal source is usually from a computer, television, or DVD player.
Training presentations
Advertising
Home cinema
Advantages
Many people can see easily.
Avoids the need for several networked computers.
Disadvantages
Page 26
Created by Turbolearn AI
Printers
Laser Printers
Produce very high-quality hard copy output.
Rely on large buffer memories where the data for the whole document is stored
before pages can be printed out.
Use positively-charged toner (powdered ink).
Office environment
Fast, high-quality printing required
Advantages
Fast printing for more pages.
They can handle very large print jobs.
The quality is consistently high.
Toner cartridges last for a long time.
Disadvantages
Slow printing for fewer copies.
Colour laser printers tend to be expensive to run.
Produce ozone and organic compounds.
Inkjet Printers
Used to produce good-quality hard copies.
Do not have large buffer memories; therefore, printing is paused sometimes.
Contain an ink cartridge or cartridges.
Page 27
Created by Turbolearn AI
Advantages
High-quality output.
Cheaper to buy than laser printers.
Very lightweight and have a small physical footprint.
Do not produce ozone and volatile organic compounds.
Disadvantages
Slow output if several copies are needed.
Cannot do large print jobs (ink runs out quickly).
Printing can ‘smudge’ if the user is not careful.
Can be expensive if used a lot.
Advantages
Carbon copies or multi-part outputs can be produced.
Very cheap to run and maintain.
Easy to use if continuous stationery is required.
Disadvantages
Page 28
Created by Turbolearn AI
(Graph) Plotters
Output device.
Work very differently to printers.
Use a pen, pencil, or marker pen to draw multiple continuous lines.
Produce vector graphic drawings and are often used in conjunction with CAD
and CAM.
Uses of plotters:
Advantages
Very high-quality output.
Able to produce large, monochrome, and colour drawings to a high accuracy.
Able to print on a variety of materials.
Disadvantages
Very slow at printing.
Expensive equipment (and software) to purchase initially.
Have a very large physical footprint compared to a printer.
3D Printers
Primarily used in computer-aided design (CAD) applications.
Based on inkjet and laser printer technology and can produce solid objects that
actually work.
A solid object is built up layer by layer using materials such as powdered resin.
Uses of 3D printers:
Page 29
Created by Turbolearn AI
Prosthetic limbs can be made to fit exactly on the injured body part.
Making items to allow precision reconstructive surgery.
Making wings and other airplane parts using 3D technology.
Making parts for items no longer in production.
Advantages
Easier manufacturing.
Printing is cheaper.
Medical benefits are emerging.
Disadvantages
Easily be copyrighted.
All new technologies in the hands of the wrong people can lead to dangerous
situations.
Job losses if this technology takes over from some types of manufacturing.
Speakers
Output devices that produce sound.
The digital data is first passed through a Digital-to-Analogue Converter (DAC),
where it is changed into analogue voltage.
Speakers
Convert electrical current into sound.
Electric current is passed through an amplifier.
The amplified current is fed to a loudspeaker where it's converted into sound.
Page 30
Created by Turbolearn AI
Uses of Speakers
Used in all phones and built-in to most computers.
Outputs sound from multimedia presentations.
Helps visually impaired people.
Plays downloaded sound files.
Advantages of Speakers
Sounds amplified through speakers can be much louder than the original.
Everyone in a large room can hear.
Can create a good atmosphere when making a presentation.
Help visually impaired people.
Very simple technology.
Disadvantages of Speakers
Speaker output can be disturbing to others.
High quality sound can be expensive.
Speakers can take up a lot of desk space.
Actuators
Necessary for control devices.
Uses of Actuators
Control motors, pumps, switches, buzzers, and so on.
Allow a computer to control physical devices that normally require analogue
inputs.
Advantages of Actuators
Page 31
Created by Turbolearn AI
Disadvantages of Actuators
An additional device in the system that could go wrong.
Usually analogue devices, computer signals need to be converted using a DAC
to enable computer control.
Magnetic Media
Magnetized to represent a binary 1-value and demagnetized to represent a
binary 0-value.
Allows a huge amount of data to be stored.
Page 32
Created by Turbolearn AI
Effect of Latency
The time it takes for a specific block of data on a data track to rotate
around to the read/write head. Causes messages such as: ‘Please wait’ or,
at its worst, ‘not responding’.
Page 33
Created by Turbolearn AI
Designations
Page 34
Created by Turbolearn AI
Uses of CD-RW/DVD-RW
Record television programs.
Used in CCTV systems.
Can be used as a backup device for files and data.
Advantages of CD-RW/DVD-RW
Can be written over many times.
Can use different file formats each time.
Not as wasteful as R formats.
Page 35
Created by Turbolearn AI
Disadvantages of CD-RW/DVD-RW
Expensive.
Accidently overwrite data.
Uses of CD-rom/DVD-rom
Permanent method of data storage.
Store music files and to store software, computer games and reference
software.
Much larger storage and is used to store films.
Advantages of CD-rom/DVD-rom
Less expensive than hard disk drive system.
Disadvantages of CD-rom/DVD-rom
The data transfer rate/data access time is slower than for hard disks.
Blu-ray Discs
Optical storage media.
Read from or written to using a Blu-ray optical storage device.
Use blue laser to carry out read-write operation.
Pits and lands can be much smaller.
Stores data 5 times more.
Automatically come with a secure encryption system which helps to prevent
piracy and copyright infringement.
Can be single layered or double layered.
Page 36
Created by Turbolearn AI
Solid-State Technology
Solid-state technology removes latency because all the data is retrieved at the
same rate.
Does not rely on magnetic properties and they have no moving parts.
Devices that use solid-state technology are often referred to as flash memories
or flash drives.
Uses of SSDs
Rapidly taking over from HDDs as the main type of backing storage.
Enabled laptop computers to become thinner and much lighter.
Advantages of SSDs
More reliable.
Lighter.
Less power consumption.
Much cooler than HDDs.
No moving parts.
Data transfer rate and data access time is faster than HDD.
Page 37
Created by Turbolearn AI
Disadvantages of SSDs
SSD endurance for only 3 years.
Longevity of the technology.
Pen Drives
Portable devices that use SSD technology.
Connect to the computer through a USB port.
Any device that uses solid-state technology can be referred to as a flash drive.
Pen drive (memory stick) is a flash drive with a USB connector.
Portable.
Use as back up devices.
Robust.
Does not need additional software to work on most computers.
They are not affected by magnetic fields.
Memory Cards
Makes use of solid-state technology.
Come in various memory sizes.
Page 38
Created by Turbolearn AI
Storing photos.
Mobile phone card memories.
Backing storage for computer device.
Compact.
Durable.
Hold large amount of data.
Digital devices can read and write memory cards.
Page 39
Created by Turbolearn AI
If the NIC card is replaced, the MAC address will also change.
Also known as physical address.
Useful when trying to identify network faults because they never change.
Data Packets
Page 40
Created by Turbolearn AI
The data sent are splitted up into small packets and transmitted separately.
All the information in the data packet headers allows the data packets to be
reassembled in their correct order.
Hubs
Hardware devices that can have a number of other devices connected to them.
Hubs can form a LAN.
Hub will take a data packet received at one of its ports and broadcast it to every
device connected to it (local area network).
Use data packet.
Have unnecessary traffics.
Not very secure.
Switches
Intelligent version of hubs.
Stores the MAC addresses of all devices on the network.
Contain look up table.
More secure than hubs.
Do not waste bandwidth.
Uses data packet.
Bridges
Page 41
Created by Turbolearn AI
Devices that connect one LAN to another LAN that uses the same protocol.
To form one single LAN.
Bridges cannot communicate with other external networks.
Routers
Used to route data packets from one network to another network, based on IP
addresses.
Contain routing table (store on router’s RAM).
Used to join LAN to the internet.
Bluetooth
A band of 79 different frequencies.
With 2.45GHz.
Automatically detect and connect to each other but do not interfere with other
devices.
Bluetooth picked random channel to pair, if the channel is being used,
Bluetooth will choose another channel.
The devices constantly change the channels they are using spread-spectrum
frequency hopping to reduce the risk of interference.
Uses key encryption to create a secure WPAN.
Page 42
Created by Turbolearn AI
WIFI
Have frequency of 2.4-5 GHz.
Offers much faster data transfer rates, better range and better security than
Bluetooth.
The access point (Ap) can be connected up to 100m away.
Page 43
Created by Turbolearn AI
Network Types
Local area network (LAN)
Wireless local area network (WLAN)
Wide area network (WAN)
Advantages of LAN
Allow the sharing of resources such as hardware and software.
Easy communication between users of the LAN.
Use a network administrator that ensures security and use of the LAN is
constantly monitored.
Disadvantages of LAN
Easier spread of viruses throughout the whole network.
Queues for shared resources.
Slower access to external networks.
No use if the main server breaks down.
Page 44
Created by Turbolearn AI
Used where computers or networks are situated a long distance from each
other geographically.
A number of LANs are joined together using a router, then they can form a
WAN.
A typical WAN will consist of end systems and intermediate systems.
End system – the connection ended.
Intermediate system – connection continued.
Passwords
Uses When
When accessing your email account.
When carrying out online banking.
Accessing social networking sites.
Change passwords on a regular basis in case it has come into the possession of
another user illegally or accidentally.
Page 45
Created by Turbolearn AI
Biometrics
Behavioral patterns
Biometrics includes:
Fingerprints recognition
Face recognition
Voice recognition
Page 46
Created by Turbolearn AI
Smart Cards
A tag of (chip and antenna) can act as a smart contactless card.
Can be read from a distance.
Use of RFID technology.
Physical Tokens
A form of authentication in the form of a physical, solid object.
Contain internal clocks and when a PIN and other authentication details are
entered, then a one-time password (OTP) is generated.
Electronic Tokens
Software installed on a user’s device.
The app generates a one-time password (OTP) which is valid for less than a
minute.
User enters this OTP when prompted by the website, together with some other
form of authentication.
Both the server and smartphone have synchronized clocks, they will generate
the same numbers.
Anti-Malware Software
Page 47
Created by Turbolearn AI
Loaded onto a computer and then run to allow all software and devices to be
scanned for viruses.
Running anti-virus software in the background on a computer will constantly
check for virus attacks.
Needs to be kept up to date because new viruses are constantly being
discovered.
Full system checks need to be carried out once a week.
Electronic Conferencing
Video conferencing
Audio conferencing
Web conferencing
Video Conferencing
Communication method that uses both video and sound.
A substitute for face-to-face conferences between a number of people.
Carry out in real time with a form of network.
Page 48
Created by Turbolearn AI
Audio Conferencing
Meetings held between people using audio (sound) equipment.
Can be done over the standard telephone network.
Page 49
Created by Turbolearn AI
The organizer of the phone conference is given two PINs by the phone
company.
The organizer dials the conference phone number and, once they are connected,
keys in their personal PIN.
The participants then call the same conference number with participant’s PIN to
join in.
The only problem with audio conferencing is the drop of sound quality.
Web Conferencing
Page 50
Created by Turbolearn AI
Allows:
Organizer can decide on who can speak at any time using the control panel on
their computer.
Delegates can post comments using instant messaging for all delegates to see
at any time.
Labour-Saving Devices
Page 51
Created by Turbolearn AI
Washing machines
Microwaves
Ovens
Dishwashers
Fridge
Freezers
Other Devices
Alarm clocks
Television sets
Central heating and air-conditioning systems
Home entertainment systems
Mobile phones and tablets
Page 52
Created by Turbolearn AI
Change gear
Apply the brakes
Turn the steering wheel
ICT Applications
Websites
Requires a company to either develop their own website or pay another
company to advertise on their website.
Easier and cheaper for individuals or small organizations to create and host
their own website.
Multimedia Presentations
Page 53
Created by Turbolearn AI
Media Streaming
Users watch movies/videos or listen to music on devices connected to the
internet.
No need to actually download videos/ music.
Buffering makes sure the video plays back smoothly without freezing.
While the buffer is receiving data packets, send previous data to the streaming
device for smooth no gap streaming.
Having a large buffer will considerably reduce the possibility of freezing the
play back.
Page 54
Created by Turbolearn AI
E-Publications
Available in an electronic format.
Examples
E-books
Digital magazines
Digital newspapers
Digital libraries
Publication can be downloaded to a device connected to the internet where it
can be read.
Have the advantage that pages can be expanded in size and it is possible to
include media, which would be impossible with the more traditional paper-
based publications.
Usually cheaper than their paper-based counterparts.
Mobile Communication
Communicate by using towers inside many cells networked together to cover
large areas.
Mobile devices either use a SIM (subscriber identity module) card to allow it to
connect to the mobile phone cellular network.
Phone Calls
Page 55
Created by Turbolearn AI
Internet Access
Any mobile device can connect to the internet either using a wireless
broadband connection or via the mobile phone network.
Software detects which type of device is connecting to a website, which then
sends out the web page optimized for that device.
Computer Modelling
Simulation is the creation of a model of a real system in order to study the
behaviour of the system.
Model is computer-generated and is based on mathematical representations.
Page 56
Created by Turbolearn AI
Weather Forecasting
Page 57
Created by Turbolearn AI
Robotics in Manufacturing
Control of robots is either through embedded (built-in) microprocessors or
linked to a computer system.
Each series of tasks can then be carried out by a robot arm automatically.
Each instruction will be carried out identically every time.
Equipped with sensors so they can gather important information about their
surroundings and prevent them from doing ‘stupid things’.
Page 58
Created by Turbolearn AI
Computer-Aided Learning
Use of computer-based systems to assist in the academic teaching of students.
Does not replace the traditional teaching.
Students would use computers as part of their learning and complete online
tests to monitor their performance.
Page 59
Created by Turbolearn AI
Students can learn when they want to and at their own pace.
Allow virtual reality.
Student can stop at any point and return later to continue where they left off.
Possible to retake tests.
Make learning more interactive.
Use of multimedia.
Make use of multiple-choice questions (MCQs) which can be marked
immediately by the computer system.
Can deliver microlearning.
Page 60
Created by Turbolearn AI
Prevent double-booking.
Customer gets immediate feedback on the availability of seats and whether or
not their booking has been successful.
Can make bookings at any time of the day.
Easier to browse the seating plans.
Possible to ‘reserve’ a seat for a period of time.
Online booking allows the use of modern smartphone and tablet Apps
technology.
Page 61
Created by Turbolearn AI
Banking Applications
Page 62
Created by Turbolearn AI
Advantages of EFT
Very secure payment method.
Quick payment method.
Is less expensive than, for example, using checks.
Disadvantages of EFT
Once an amount has been transferred the bank cannot reverse a transaction.
The customer needs to have funds available immediately.
It cannot guarantee the recipient.
Page 63
Created by Turbolearn AI
Checks
Relatively expensive, slow and less secure way of making payments.
Page 64
Created by Turbolearn AI
Checks are cleared using an image-based system that speeds up the check
clearing process considerably.
An electronic image is made of the check using OCR software. All of the bank
details plus the sum of money to be paid are read.
Uses this electronic data to create a digital record of the money to be paid, the
sort code on the check and the account number on the check.
The check image and digital record are added to a file of other check images
paid in that day.
Now sends all the files to a central facility.
The central facility processes the files by:
Breaks the file down into individual payment messages
Does a payment validation
Sends a ‘request to pay’ message (includes a copy of the check images as
well as the encoded information)
Receives a stream of ‘request to pay’ images and carries out the
transactions. A ‘no pay’ decision will be made if the person paying has
insufficient funds, if their account is blocked, if the check has not been
signed or if there is suspected fraud.
This happens usually in less than 24 hours.
Computers in Medicine
3D Printers
3D printers are now being used to print out prosthetics.
Customized Medicines
3D printing techniques now allow scientists to customize medicines to suit the
individual.
This is known as patient-centric medicine.
Make fixed-dose combinations and allows for the optimum release of each
medicine into the body.
Expert Systems
Page 65
Created by Turbolearn AI
Page 66
Created by Turbolearn AI
The image shows the main components that form an expert system including the
user interface, inference engine, explanation system, knowledge base, and rules
base. Each component has its own role to play in contributing to how the overall
system functions and behaves.
User Interface
The expert system interacts with a user.
Allows interaction through dialogue boxes, command prompts or other input
methods.
Only ask yes/no questions based on previous response.
Explanation System
Explain the reasoning behind the conclusion.
The expert system will supply a conclusion and any suggested actions to take
(show probability statistics).
Inference Engine
Main processing element of the expert system.
Acts like a search engine examining the knowledge base for information/data
that matches the queries.
Responsible for gathering information from the user by asking a series of
questions and applying responses where necessary.
The problem-solving part of the expert system, which uses the rule base.
Page 67
Created by Turbolearn AI
Knowledge Base
A repository of facts.
Knowledge about an area of expertise obtained from a number of expert
resources.
A collection of objects and their attributes.
Rules Base
A set of inference rules.
Inference rules are used by the inference engine to draw conclusions (close to
human reasoning).
Usually involving a series of ‘IF’ statements.
Page 68
Created by Turbolearn AI
Page 69
Created by Turbolearn AI
Read/Write Mode
Page 70
Created by Turbolearn AI
Page 71
Created by Turbolearn AI
Recognition Systems
Advantages of ANPR
Automatically monitor average speed of vehicles over a stretch of road
No need for car park employees
Faster system than having to check a ticket at the exit
Used to automatically control the entry and exit to a car park or private roads
Can be used as a security system;
Can be used to analyze driver behavior for transport planning
Can be used in inner-city congestion charging systems
Disadvantages of ANPR
Page 72
Created by Turbolearn AI
Lack of manned security car park surveillance can lead to other crimes
Could be invasion of privacy issues due to the recording of drivers’ number
plates
Damaged or very dirty number plates will not be recognized by the system
Only recognizes the number plate and not the car could be number plate
cloning
Process of ANPR
Sensor detects a vehicle and sends a signal to instruct a camera to capture an
image of the front of the vehicle.
Algorithm is used to locate and isolate the number plate from the image taken
by the camera. This algorithm also takes into account the size of the number
plate and any damage or orientation.
The brightness and contrast of the number plate is first adjusted to read clearly.
Each character is then recognized using OCR software. The characters are
converted into a string of editable text by the software.
This text string is then stored on a database.
The car park barrier is raised and the motorist is issued with a ticket. The ticket
shows the date and time of entering the car park.
When the motorist returns to the car park, they insert their ticket into a machine
which calculates the car park charges. The payment is registered on the
database.
If the number plate is recognized, the exit barrier is raised.
Retina Recognition
Scan the unique pattern of blood vessels
Secure technology, but more expensive to implement
Special equipment is used to take an infrared photograph of the retina
The subject must stay very still to identify
Slower to scan and verify
Only used in very specialized high-security settings
Iris Recognition
Page 73
Created by Turbolearn AI
Satellites
Page 74
Created by Turbolearn AI
Advantages of GIS
Allows geographical and thematic data of any kind to be combined
Allows the handling and exploration of huge amounts of data
Allows data to be integrated from a wide range of very different sources
Disadvantages of GIS
Learning curve on GIS software can be very long
Expensive
Require a lot of data input
Increasing the chances of errors
Difficult to make GIS programs which are both fast and user-friendly
Requires very complex command language interfaces to work properly
Page 75
Created by Turbolearn AI
The image below shows the general lifecycle that many systems go through:
Page 76
Created by Turbolearn AI
The systems development life cycle includes seven stages: Analysis, Design,
Development/Testing, Implementation, Documentation, and Evaluation. These stages
are repeated iteratively to improve and refine the system.
Observation
Involves watching personnel using the existing system to find out exactly
how it works.
Advantages of observation
Obtains reliable data
Possible to get a better overall view of the system
All inputs and outputs of the current system are seen
Relatively inexpensive method
Disadvantages of observation
Page 77
Created by Turbolearn AI
Participants may feel uncomfortable being watched and may work differently
(Hawthorne effect)
Workers may not perform tasks that contravene standard procedures while
being watched
Interviews
Advantages of Interviews
Opportunity to motivate the interviewee into giving open and honest answers
More feedback from the interviewee
Questions can be extended
Can watch body language and facial expressions
Disadvantages of Interviews
Time-consuming exercise
Expensive to hire interviewers
Interviewee cannot remain anonymous
Interviewee can give answers they think the interviewer wants to hear
Interviewees may not be available at times to suit the analyst
Questionnaires
Advantages of Questionnaires
Can be answered fairly quickly
Inexpensive method
Individuals can remain anonymous if they want
Allows for a quick analysis of the data
Interviewees can fill in questionnaire in their own time
Allows a greater number of people to take part
Disadvantages of Questionnaires
Page 78
Created by Turbolearn AI
User Requirements
User requirements are written by the analyst for customers in natural
language with very few technical details or jargon. These describe what
the analyst thinks the customer does with their system.
Information Requirements
A systems analyst turns the information and user requirements into a
functional requirements specification. This depends on who the
customers, vendors, and employees are.
Page 79
Created by Turbolearn AI
Hardware
Identification and justification of which input devices and output devices are
needed
Software
Identification and justification of which application and system software are
needed
Storage
Size of storage and type of storage required
Data Types
Large field lengths for small characters are a waste of speed.
Validation Routines
Validation routines are automatic checks carried out by the computer as
part of its programming to ensure data entered satisfies certain criteria.
Key Considerations
Designed carefully to ensure the format of the data matches the application's
needs.
Can be paper-based or electronic-based.
Paper-Based Forms
Page 80
Created by Turbolearn AI
Test Strategies
Modular Development: Software developed in smaller modules, tested
separately.
Iterative Testing: Problems found during testing require module modification
and retesting.
System-Wide Testing: Once all modules are complete, the entire system is
tested as a whole.
Input/Output Improvement: Testing may reveal the need to improve input and
output methods.
Page 81
Created by Turbolearn AI
System Implementation
Direct Changeover
The old system is stopped overnight, and the new system is introduced
immediately.
Benefits are immediate.
Reduced costs
Staffs must be fully trained
If the new system fails, the old system is no longer available.
Parallel Running
The old and new systems are run side by side for a time before the new
system takes over altogether.
If the new system fails, the old system is still available as a backup.
Possible to gradually train staff.
More expensive and time-consuming (data needs to be entered into two
systems)
Pilot Implementation
Page 82
Created by Turbolearn AI
Phased Implementation
Only part of the new system is introduced.
If the latest part fails, it is only necessary to go back in the system to the point
of failure.
More expensive than direct because it is necessary to evaluate each phase
before moving to the next stage
Time consuming.
It is possible to ensure the system works properly before expanding
Documentation
A considerable amount of documentation needs to be produced.
Documentation is needed for future modifications or development, and for the
end-users.
Technical Documentation
Designed to help programmers/analysts to make improvements or repairs.
Contains:
Program coding
Program language used
Program flowcharts
System flowcharts
Minimum memory requirement
Known ‘bugs’ in system
Input formats
Lists of variables used
File structures
Output formats
Validation rules
Page 83
Created by Turbolearn AI
User Documentation
Designed to help users learn how to use the software or system.
Consists of:
How to use the system
Error handling
Help lines
FAQ
Tutorials
Glossary of items
Shared Features
Purpose of the system/program/software
Limitations of the system
Hardware requirements
Software requirements
Sample runs
Meaning of error messages
Input formats
Output formats
Evaluation
Once a system is up and running, it is necessary to do some evaluation and
carry out any maintenance if necessary
Can lead to a redesign of part of the system if there is strong evidence to
suggest that changes need be made
Evaluate a solution
Page 84
Created by Turbolearn AI
Physical Safety
Concerned with the dangers that could lead to serious injuries or even loss of
life
Electrocution
Cause:
Spilling liquids/drinks on electric equipment
Exposed wires/damaged insulation
Unsafe electrical equipment
Unsafe electrics (e.g., wall sockets) in the office
Prevention:
Do not allow drinks to be taken into the computer room
Check all wires regularly
Ensure all equipment is checked by a qualified electrician regularly
Use an RCB (residual current breaker)
Fire Hazard
Page 85
Created by Turbolearn AI
Cause:
Overloaded wall sockets
Overheating of computer equipment
Exposed wires causing a short circuit
Prevention:
Increase the number of wall sockets
Do not cover the cooling vents on computer equipment
Clean out dust accumulation in computers
Make sure all equipment is fully tested regularly
Ensure good room ventilation
Use low-voltage equipment wherever possible
Have fire extinguisher ready
Tripping Hazard
Cause:
Trailing wires on the floor
Damaged carpets and other flooring
Prevention:
Use cable ducts to make the wires safe
Cover exposed wires and hide wires under desks
Use wireless connectivity wherever possible
Personal Injury
Cause:
Heavy equipment unstable or falling from desks
Desks collapsing under weight
Prevention:
Use desks strong enough to take the weight of the computer equipment
Use large desks and tables
Data Protection
The Data Protection Act (DPA) is legislation designed to protect
individuals and to prevent incorrect or inaccurate data being stored.
Page 86
Created by Turbolearn AI
Personal Data
Refers to any data concerning a living person who can be identified from
the data itself.
Examples:
Name
Address
Email address
Date of birth
Banking details
E-Safety
Page 87
Created by Turbolearn AI
Social Media
Do not publicly post or give out personal information to people you do not
know
Do not send out photos of yourself to people you do not know
Always make sure you use the privacy settings when posting photos of yourself
on social media sites
Always maintain privacy settings to stop ‘non-friends’ from contacting you
Avoid using, or forwarding messages containing, inappropriate language.
Block or report anybody who acts suspiciously or uses inappropriate language
Always use a nickname for gamming accounts
Never arrange to meet anyone on your own, always tell an adult first and meet
the person in a public place
Always respect people’s confidentiality
Page 88
Created by Turbolearn AI
Online Gaming
Risks:
Predators
Cyberbullying
Use of webcams
Voice-masking technology
Hacking
The act of gaining unauthorized/illegal access to a computer system,
leading to identity theft or misuse of personal information, data deletion,
changes, or corruption.
Protection:
Use of firewalls
Use of strong (frequently changed) passwords and user IDs
Use of anti-hacking software
Phishing
The creator sends out legitimate-looking emails to target users,
redirecting them to fake websites or tricking them into giving personal
data.
Smishing
Short for ‘SMS phishing,’ it uses the SMS system of mobile phones to send
out fake text messages.
Page 89
Created by Turbolearn AI
Vishing
Voicemail phishing, another variation of phishing, uses a voicemail
message to trick the user into calling the telephone number contained in
the message
Pharming
Malicious code installed on a user’s computer or on a web server that
redirects the user to a fake website without their knowledge.
Risks:
Personal data theft
Fraud or identity theft
Prevention:
Use anti-spyware software.
Be alert for clues of redirection.
Page 90
Created by Turbolearn AI
Malware is one of the biggest risks to the integrity and security of data on
a computer system.
Viruses
Programs or program code that copies itself with the intention of deleting
or corrupting files and causing the computer to malfunction, needing an
active host program.
Effects:
Computer ‘crash’
Stop responding
Delete files or data
Corrupt operating system files
Transmission:
Email attachments
Infected websites
Infected software downloads
Prevention:
Install anti-virus software and update it regularly
Don’t use software from unknown sources
Be careful when opening emails or attachments
Worms
Page 91
Created by Turbolearn AI
Trojan Horse
Adware
Hard to remove.
Ransomware
Encrypts data on a user’s computer and ‘holds the data hostage’ until a
ransom is paid.
Page 92
Created by Turbolearn AI
Shoulder Surfing
A form of data theft where criminals steal personal information from a
victim when they are using a cash dispensing machine or giving
credit/debit card details over the phone.
Card Cloning
The copying of a credit or debit card using a magnetic stripe via a
skimmer. The data is copied to the magnetic stripe of a fake card. Cloning
of smart card is known as a shimmer.
Prevention:
Regularly check spending and query any unusual activity
Protection of Data
Authentication
Used to verify that data comes from a secure and trusted source and
strengthens internet security along with encryption.
Biometric Authentication
Digital Certificates
Page 93
Created by Turbolearn AI
A type of protocol that allows data to be sent and received securely over
the internet.
Encryption
Page 94
Created by Turbolearn AI
Makes the data meaningless unless the recipient has the necessary decryption
tools.
Uses a secret key that has the capability of altering the characters in a message.
If this key is applied to a message, its content is changed, which makes it
unreadable unless the recipient also has the same secret key (encryption key)
When this secret key is applied to the encrypted message, it decodes it,
allowing it to be read.( decryption key)
When a message undergoes encryption it is known as cypher script; the
original message is known as plain text
Important for:
Due to the risks of pharming, hacking or spyware
Encryption of emails
Data stored on the cloud
Firewalls
Two-Factor Authentication
Methods:
Passwords and pins
Logged in devices
Biometrics
Users should:
Run anti-spyware software
Change passwords regularly
Type in their password twice when being created
Audiences
Page 95
Created by Turbolearn AI
Audience Characteristics
Age range
Income levels
Interests
Disabilities or impairments
Page 96
Created by Turbolearn AI
Income
Essential for marketing
Interests
Know the interests of target audience
Disabilities
Large font size for visually impaired
Young Children
Bright colours
Animation and sounds
More picture than text
Large font and simple short words
Include games where possible
Must be an easy-to-use interface
Older People
Page 97
Created by Turbolearn AI
Contrasting colours
Larger font size
Easy-to-use interface
Make the display consistent from page to page
Do not use too much technical language
Illegal Activities
Making and selling software copies
Using software on a network or multiple computers
Using coding from copyrighted software in your own software
Renting out a software package without permission
Using the name of copyrighted software on other software without agreement
Email Laws
A company or individual must have a clear way for recipients to 'opt out'.
Companies must provide subscribers with a very clear way to unsubscribe from
their listings.
Emails should not have false or misleading subject lines.
Many countries don’t allow companies to harvest email addresses.
Page 98
Created by Turbolearn AI
Employer Guidelines
Companies publish guidelines regarding the use of emails and other electronic
communications.
Guidelines may specify which company devices are allowed for sending and
receiving emails.
Employees should only assume they can use a company’s email system for
business use.
It must be clear what email content is not permitted.
Staff need to be aware of the method and duration of storing emails.
Incoming emails should only be read by the recipient.
Security Measures
Use strong passwords when logging into your email account.
Change passwords regularly.
Use spam filters.
Run anti-virus and anti-spam software.
Email Attacks
Passive Attacks: Releasing email material to other users without your consent.
Active Attacks: Modifying your messages or denial of service.
Page 99
Created by Turbolearn AI
Netiquette
Netiquette: A short form of internet etiquette.
It refers to the need to respect other users’ views and display common courtesy
when posting views in online discussion groups or when sending out emails.
Rules of Netiquette
Do not be abusive.
Do not send spam.
Be clear and succinct with your message.
Always check your spelling and grammar.
Respect people's privacy.
Do not use CAPITAL LETTERS to highlight comments.
Do not plagiarize.
Do not use too many emoticons.
Email Operations
Email Groups
Facilitate sending multiple emails by grouping addresses under a single name.
Companies use email groups for marketing purposes and to set up meetings.
Email Options
Carbon Copy (Cc): All recipients can see all other recipients.
Blind Carbon Copy (Bcc): Bcc address details are invisible to everyone
receiving the email, apart from the Bcc recipient (used as a security measure).
Forward: Should be treated with care, as some ISPs have spam filters based on
email volumes.
Attachments: Treat with caution due to potential malicious content and size
limits.
Spam
Page 100
Created by Turbolearn AI
Disadvantages of Spam
Wastes time.
Annoys people.
Uses up bandwidth.
May contain viruses or be part of a phishing scam.
Clogs inboxes.
Internet
A worldwide collection of interconnected networks using transmission
control protocol (TCP) and internet protocol (IP).
Intranets
An internal restricted access network used for sharing information within
an organization.
Page 101
Created by Turbolearn AI
Extranets
Allows intranets to be extended outside the organization, giving external
users controlled access to some information.
Blogs
Web logs or personal internet journals updated regularly by the author.
Wikis
Web applications or websites that allow any user to create and edit web
pages using a web browser.
Page 102
Created by Turbolearn AI
Each member has free web space and can build their own profile.
Users can upload content, write on each other’s walls, and use instant
messaging and video chatting.
Members control access to their personal data.
Forums
An online discussion forum.
Web Browsers
Page 103
Created by Turbolearn AI
URLs
Search Engines
Look up words entered in the search box in their database of web pages
to find matching results.
Page 104
Created by Turbolearn AI
Internet Protocols
Page 105
Created by Turbolearn AI
Sets of rules agreed by the 'sender' and 'recipient' when data is being
transferred between devices.
Secure Sockets Layer (SSL): Protocol for sending and receiving data securely
over the internet.
Page 106