Igcse Ict Textbook 1
Igcse Ict Textbook 1
Information and
Communication
Technology
Endorsed by
University of Cambridge
International Examinations
Information and
Communication
Technology
Graham Brown
and David Watson
Acknowledgements
The authors would like to thank the following for their assistance, patience, understanding and proofreading: Tracy Brown,
Philippa Brown, Laura Brown, Jenna Brown, Karla Brown, John Reeves, Brian Sargent and Stuart Morris.
Images: SnowAngel Graham Brown, Snowball.jpg Graham Brown, Trees.jpg Graham Brown. Chapter 10
page 125: Snowman Karla Brown, Six trees Graham Brown.
p. 1 tr iStockphoto.com/Dennys Bisogno, tl istockphoto.com/Nicholas Monu, br iStockphoto.com/bluestocking/Uyen
Le, bl Ronen/iStockphoto.com; p. 3 tr iStockphoto.com/Dennys Bisogno, tl istockphoto.com/Nicholas Monu,
l Godfried Edelman/istockphoto.com; p. 5 Photodisc/Getty Images; p. 6 t Photodisc/Getty Images, c Sirin Buse/
istockphoto.com, b iStockphoto.com/bluestocking/Uyen Le; p. 7 DreamPictures/The Image Bank/Getty Images; p. 8 t
Ingram Publishing, b Dmitriy Melnikov Fotolia.com; p. 9 t Cindy England/istockphoto.com, c George
Clerk/istockphoto.com, b www.purestockx.com; p. 10 Dmitry Vinogradov/istockphoto.com; p. 11 t Mariano
Ruiz/istockphoto.com, b kmit Fotolia.com; p. 12 t jerges/istockphoto.com, b Thinkstock/Jupiterimages/Getty Images;
p. 13 t Brand X/Getty Images, c Photodisc/Getty Images, b lauriek/istockphoto.com; p. 14 t Jostein
Hauge/istockphoto.com, b Martin Firus/istockphoto.com; p. 15 t Royalty-Free/Corbis, b thumb/istockphoto.com;
p. 16 t Reproduced by permission of Scantron Corporation. Copyright Scantron Corporation. All rights reserved, b Access
IS, UK; p. 17 tl Access IS, UK, tr Beaconstox/Alamy, cl 216Photo/iStockphoto.com, bl Juanmonino/istockphoto.com, tr
Beaconstox/Alamy; p. 18 t Michal Mrozek/iStockphoto.com, b Photodisc/Getty Images; p. 19 BMPix/istockphoto.com;
p. 20 t fotoIE/istockphoto.com, b asterix0597/istockphoto.com; p. 21 Ingram Publishing; p. 22 t LoopAll
Fotolia.com, b Konstantin Shevtsov Fotolia.com; p. 23 t Murat BAYSAN Fotolia.com, bl & r Z Corporation; p. 24
Ted Foxx/Alamy; p. 25 t Mike McCune/iStockphoto.com, c Ronen/iStockphoto.com, b Andrey Turchaninov/
istockphoto.com; p. 26 Tomasz Zachariasz/istockphoto.com; p. 27 t Andrew Lambert Photography/Science Photo Library,
c Yury Kosourov/istockphoto.com, b Oliver Leedham/Alamy; p. 30 t rocksunderwater/istockphoto.com, b Long
Ha/istockphoto.com; p. 31 fotoIE/istockphoto.com; p. 32 brentmelissa/iStockphoto.com; p. 33 peregrina/
istockphoto.com; p. 34 imagebroker/Alamy; p. 35 Tatiana Popova/istockphoto.com; p. 36 scubabartek/istockphoto.com;
p. 41 sambrogio/istockphoto.com; p. 42 t Thinkstock/Jupiterimages/Getty Images, c Dino Ablakovic/istockphoto.com,
b Norman Chan/istockphoto.com; p. 58 l Tootles Fotolia.com, photodisc/Getty Images, r photodisc/Getty Images;
p. 87 David R. Frazier Photolibrary, Inc/Alamy
t = top, b = bottom, l = left, r = right, c = centre
Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education
cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web
page by typing in the address of the home page for a website in the URL window of your browser.
Hachette UKs policy is to use papers that are natural, renewable and recyclable products and made from wood grown in
sustainable forests. The logging and manufacturing processes are expected to conform to the environmental regulations of the
country of origin.
Orders: please contact Bookpoint Ltd, 130 Milton Park, Abingdon, Oxon OX14 4SB. Telephone: (44) 01235 827720. Fax: (44)
01235 400454. Lines are open 9.005.00, Monday to Saturday, with a 24-hour message answering service. Visit our website at
http://www.hoddereducation.co.uk.
Graham Brown and David Watson 2010
First published in 2010 by
Hodder Education, an Hachette UK Company
338 Euston Road
London NW1 3BH
Impression number
Year
5 4 3 2 1
2013 2012 2011 2010
All rights reserved. Apart from any use permitted under UK copyright law, no part of this publication may be reproduced or
transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or held within any
information storage and retrieval system, without permission in writing from the publisher or under licence from the Copyright
Licensing Agency Limited. Further details of such licences (for reprographic reproduction) may be obtained from the Copyright
Licensing Agency Limited, Saffron House, 610 Kirby Street, London EC1N 8TS.
Cover photo Digital Vision
Illustrations by Barking Dog Art
Typeset in 11pt Galliard by Pantek Arts Ltd
Printed in Italy
A catalogue record for this title is available from the British Library
ISBN 978 0 340 983829
Contents
Introduction
Part 1
Chapter 1 Types and components of computer systems
1.1
1.2
1.3
1.4
2
2
3
5
Input devices
Output devices
Control devices
8
8
21
26
28
3.1
3.2
3.3
Backing up data
Types of access
Backing storage media
28
29
29
37
4.1
4.2
4.3
4.4
4.5
4.6
4.7
37
37
41
43
45
46
48
Introduction
Common types of network
Network devices
The internet
Intranets
Network security
Communication methods
50
5.1
5.2
5.3
5.4
5.5
Introduction
Types of data
Data structures
Databases
Analogue and digital data
50
50
54
54
57
59
6.1
6.2
6.3
6.4
6.5
6.6
6.7
59
59
60
61
65
67
68
Introduction
Software copyright
Viruses and hacking
Effects of ICT on society
Information from the internet
Internet developments
Health and safety issues
71
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14
71
71
73
75
77
80
81
85
86
86
88
89
91
92
Introduction
Communications applications
Satellite and mobile network communications
Data handling applications
Modelling applications
Types of processing
Control applications
Robotics
Batch processing applications
Automatic stock control system
Online booking systems
Banking applications
Library systems
Expert systems
vi
Introduction
Analysis stage
Design stage
Development and testing
Implementation
Documentation
Evaluation
94
94
94
95
97
98
100
101
Part 2
Chapter 9 Communication
104
9.1
9.2
9.3
9.4
9.5
9.6
9.7
9.8
9.9
9.10
9.11
9.12
104
104
105
106
107
108
110
111
112
113
113
114
Using email
Opening your mailbox
Organising your mail
Email etiquette
Sending an email
Receiving an email
Managing your contacts
Sending a file using email
Receiving and saving a file using email
Using the internet
Opening a website from a URL
Using a search engine
117
10.1
10.2
10.3
10.4
10.5
10.6
117
118
120
120
122
125
Contents
10.7
10.8
10.9
10.10
10.11
10.12
10.13
10.14
10.15
10.16
10.17
10.18
10.19
10.20
126
129
130
131
133
134
135
137
139
140
143
147
148
150
151
11.1
11.2
11.3
11.4
11.5
11.6
11.7
11.8
151
153
156
158
161
171
173
176
Chapter 12 Integration
178
12.1
12.2
12.3
12.4
12.5
12.6
12.7
12.8
178
178
179
179
180
182
182
182
183
13.1
13.2
183
184
Saving documents
Printing data and documents
187
14.1
14.2
14.3
14.4
14.5
14.6
14.7
14.8
187
189
204
205
210
212
217
218
vii
227
15.1
15.2
15.3
15.4
15.5
15.6
15.7
15.8
15.9
15.10
227
230
232
234
236
243
245
250
255
262
269
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
16.9
269
269
276
280
282
283
287
288
288
Index
viii
Introduction
Format text using pre-defined styles
Opening existing webpages and enhancing text
Working with styles
Creating a cascading stylesheet
Working with lists
Working with colour
Using hyperlinks
Using tables
Using images
What is a presentation?
Using the master slide
Creating slides
Creating a chart
Adding presenter notes
Using images
Transitions between slides
Animation effects
Saving and printing a presentation
292
Introduction
Aims
This book has been written to provide the
knowledge, understanding and practical skills that
you need for the Cambridge IGCSE in Information
and Communication Technology. This book,
together with the accompanying CD and image for
scanning, provides:
practice examination questions for the theory
elements of the course
practice tasks which offer guidance on how to
answer questions for the practical parts of the
course
activities which allow students practice in answering
questions for the practical parts of the course
source data files for the tasks and activities
hints and tips for the practical papers
suggestions for possible teaching methods.
Although it has been written with the CIE syllabus
in mind, it can also be used as a useful reference text
for other practical ICT qualifications at GCSE and
other equivalent Level 2 courses.
Examination questions
For the theory section, there are examination-style
questions on the CD, together with model answers,
all in portable document format (.pdf). For the
practical section, the examination-style questions
appear as activities in the book, with the model
answers on the CD. Two practice examination
papers also appear on the CD.
Tasks
These are examination-style questions in the practical
section (which often include the use of source files
from the CD for the practical tasks) that are answered
within the chapter. The text demonstrates the
techniques used to solve the task and gives some
example answers. These provide easy-to-follow step-bystep instructions, so that practical skills are developed
alongside the knowledge and understanding.
Activities
These are examination-style questions in the practical
section, usually at the end of a chapter or section for
the students to answer. These often include the use of
source files from the CD. Model answers for each
activity are available in portable document format
(.pdf) on the CD.
Exercises
In the theory section, these are short exercises for
the students to complete in order to confirm their
understanding of the concepts covered in a section
or chapter.
Hints
These give hints, tips, shortcuts and advice on
examination techniques.
HTML markup
All html markup appears in a blue,
proportionally spaced font.
Cascading stylesheets
All cascading stylesheet markup
appears in a red proportionally
spaced font.
Text colours
Some words or phrases within the text are printed
in red. Definitions of these terms can be found in
the glossary.
In the practical section, words that appear in blue
indicate an action or location found within the
software package, for example Select the Home tab.
In the database sections of the book, words in
orange show field names.
ix
PC users
From the Start button,
select the Computer
option and locate the
CD drive, which may be
called drive D: or E:.
For the purposes of this
section, we will assume
that it is called drive E:.
If your machine has a
different drive for the
CD letter, adapt these
instructions accordingly.
Locate the Chapter
source files folder, which can be found
at E:\Resources\Chapter source files. To
locate an individual file, such as the image
SNOWBALL.JPG used in Chapter 10, use the path
E:\Resources\Chapter source files\Chapter 10\
Snowball.jpg.
It may be better to copy the contents
of this folder into a new folder on your
local machine or network drive. Open
each file as you wish to use it. Select the
Office button, and then Save As to
save a new copy with an amended filename. You
may need to change the file permissions of these files
to read/write to enable you work on them; however,
check with your network administrator before
attempting to make these changes.
MAC users
Double click on the CD icon on the desktop. Use
Finder to navigate to the location for the new folder,
then create a new folder (<Apple>+<Shift>
+<N>). With Finder, choose the CD and select all
files
(<Apple>+<A>)
and
copy
them
(<Apple>+<C>). Go to the new folder using Finder
and paste the files (<Apple>+<V>).
Introduction
Save the file with the same file name using the
Office button and Save. This will ensure that the file
is saved in .csv format.
xi
Part 1
CHAPTER
printer
mouse
The central processing unit (CPU) is the part of the computer which interprets and
executes the commands from the computer hardware and software. CPUs used to be
made up of discrete components and numerous small integrated circuits, which were
combined together on one or more circuit board/s. However, due to modern
manufacturing techniques, the term microprocessor is now used instead of CPU.
This is a single integrated circuit (see Figure 1.2) which is at the heart of most PCs
and is also found in many household devices and equipment where some control or
monitoring is needed (e.g. the engine management system in a car).
The internal hard drive is the computers main memory; this is where the
applications software, disk operating system and data files are stored. The main
advantage of these memories is the fast data transfer/access times and their large
capacity to store data (this is discussed further in Chapter 3).
Random access memory (RAM) is an internal chip where data is temporarily
stored when running applications. This memory can be written to and read from.
Since its contents are lost when power to the computer is turned off, it is often
referred to as a volatile or temporary memory.
Read only memory (ROM) is a memory used to store information that needs to
be permanent. It is often used to contain, for example, configuration data for a
computer system. These chips cannot be altered and can only be read from (hence
their name). One of the main advantages is that the information stored on the ROM
chip is not lost even when power is turned off to the computer. They are often
referred to as non-volatile memories.
It is worth noting that ROM also contains some coding known as the boot file.
This code tells the computer what to do when it first starts up; it is often referred to as
the BIOS (basic input/output system). When the computer is turned on, the BIOS
carries out a hardware check to find out if all the devices are present and whether they
are functional. Then it loads the operating system into the RAM. The BIOS stores the
date, time and system configuration in a non-volatile chip called a CMOS
(complementary metal oxide semiconductor), which is usually battery powered.
Computer users need to be able to communicate with the operating system this is
called the user interface. There are two main types of user interfaces: command
line interfaces (CLIs) and graphical user interfaces (GUIs).
The above statements show how complex it is just to carry out a fairly
straightforward operation using CLI.
In recent years, devices such as touch screen phones use post-WIMP interaction,
where fingers are in contact with the screen. This allows actions such as pinching
and rotating, which would be difficult to do using a single pointer and device such
as a mouse.
PC/desktop computers
PC/desktop usually refers to a general purpose computer which is made up of
separate monitor, keyboard, mouse and processor unit (see Figure 1.1). The term
PC (personal computer) usually refers to computer systems which are IBMcompatible, thus distinguishing them from, for example, Macintosh systems.
It is worth making a comparison here with laptop computers:
Advantages
Disadvantages
Desktops are not particularly portable since they are made up of separate
components.
All the components need to be hooked up by wiring, which can be quite complex
and clutters up the desk space.
Because they are not particularly portable, it is necessary to copy files, etc. when
you want to do some work elsewhere (e.g. at home).
5
Laptop computers
Laptop (or notebook) refers to a type of computer where the monitor, keyboard,
pointing device and processor are all together in one single unit. This makes them
extremely portable systems.
The key features you would expect to find in a laptop are:
low weight (to aid portability)
low power consumption (and also long battery life)
a processor that does not generate too much heat (cooling is very important).
Advantages
They are very portable, since the monitor, pointing device, keyboard, processor
and backing store units are all together in one single box.
There are no trailing wires, etc. because everything is in one single unit.
They can take full advantage of WiFi (see discussion in Chapter 4).
Since they are portable, they can link into any multimedia system.
Disadvantages
Netbooks
Netbook is a term used to describe a computer that can almost fit onto a hand and
is a smaller version of a laptop. These used to be known as palmtop computers, but
this term now generally applies to much smaller devices which use touch screens and
often a stylus to key in data (see below).
Advantages
Netbook computers have many of the features of laptops and therefore have similar
advantages and disadvantages.
Disadvantages
In addition to the disadvantages listed above for laptops:
netbooks dont have optical drives
the keyboards are only about 80 per cent the size of laptop keyboards
they lack some of the features found in larger machines, principally due to the
size constraints and to the fact that they are cheaper to purchase.
Disadvantages
Mainframe computers
Mainframe computer is a term used for a large, very powerful, computer system.
The name comes from the days when the individual components were housed in
large (often room-sized) frames.
Uses
Their main purpose is to run commercial applications, such as banking and
insurance, where huge amounts of data need to be processed each day.
The main features of main frame computers are as follows.
They can have several CPUs.
They have very fast processor speeds.
They can support multiple operating systems.
They have huge amounts of storage capacity.
They have huge internal memories (e.g. several hundred Gbyte of RAM).
They often operate using time sharing or batch processing (see Chapter 7).
Advantages
Due to the features listed above, they can be used to do very large jobs which
require large memories and very fast processor time.
They are used in time-sharing systems to allow users to be given a time slice of
the very powerful facilities afforded by a mainframe system.
They are capable of very large number crunching, and so can deal with very
complex mathematical functions (e.g. fractals) which would be very time
consuming using, for example, a PC.
Disadvantages
CHAPTER
Keyboards
These are the most common input devices and are used to input text, numbers and
instructions into the computer. Most use the QWERTY layout (this name comes
from the keys on the top row, which spell out QWERTY).
Ergonomic keyboards have also been developed recently. These are designed to
reduce health-related problems associated with the standard keyboard (e.g. carpal
tunnel syndrome or repetitive strain injury (RSI) see Section 6.7).
Uses
Keyboards are used to input data into applications software (e.g. text into word
processors, numbers into spreadsheets, etc.).
They are also used for typing in commands to the computer (e.g. Prnt Scrn,
Ctrl+P to print out, etc.)
Advantages
Disadvantages
Users with limited arm/wrist use can find keyboards hard to use.
Entering data using a keyboard is slow when compared to direct data entry
(e.g. optical mark recognition).
Keyboards are fairly large devices that use up valuable desk space.
Advantages
Concept keyboards enable fast data entry, as there is no need to type in whole
commands.
They are waterproof, which is useful in a restaurant environment.
These keyboards are tamper proof and so are useful in certain applications
(e.g. at unmanned airport information kiosks), preventing people from keying in
information which could potentially corrupt the computer system.
Numeric keypads
A numeric keypad is used to enter numbers only (although some have a function
key to allow input of alphabetic characters).
Uses
Advantages
Numeric keypads are faster than standard keyboards for entry of numeric data.
Since many are small devices (e.g. mobile phones), they are very easy to carry
around.
Disadvantages
Mice
The mouse is an example of a pointing device. A ball is used
underneath the mouse to detect movement, so by moving the
mouse around the user can control the position of a pointer on
the screen. There are usually two buttons, which have different
functions: very often the left button is used to select something
by double clicking it and the right button brings up drop-down
menus (see Figure 2.1).
Many mice also have a scroll button, which speeds up the
Figure 2.1 Example
process of moving through a document.
of a drop-down menu
9
Uses
Advantages
Disadvantages
People with restricted hand/wrist movement can find it hard to operate a mouse.
Mice are easily damaged and the older type of mouse also quickly becomes
clogged up with dirt.
They are difficult to use if there is no flat surface readily available (e.g. on an
aeroplane).
Touchpads
Touchpads are used in many laptop computers as a pointing device. The pointer is
controlled by the user moving their finger on the touchpad and then gently tapping it to
simulate the left hand button of a mouse (i.e. selection). They also have buttons under
the touchpad which serve the same function as the left and right buttons on a mouse.
Uses
The uses of a touchpad are the same as those of a mouse.
Advantages
Disadvantages
10
Trackerballs
Trackerballs are similar to a mouse, except that the ball is on the top of the device and
the user controls the pointer on the screen by rotating the ball with the hand. Some
trackerballs have two buttons which have the same function as the left- and right-hand
mouse buttons. If they have a third button, this is equivalent to a double click.
Uses
Advantages
Disadvantages
Trackerballs are not supplied with the computer as standard, so they are more
expensive.
User may need training since they are not standard equipment.
Remote controls
A remote control is used to control the operation of other devices remotely by
using infra red signals. The buttons on the keypad are used to select options (such as
television stations, sound levels on a hifi, timings on a DVD recorder, etc.).
Uses
Advantages
Disadvantages
People with limited hand/wrist movement can find them hard to use.
The signal between the control and the device can be easily blocked.
11
Joysticks
Joysticks have similar functions to mice and trackerballs. By gripping the stick, a
pointer on the screen can be controlled and buttons are used to make selections.
Often they have another button on the top of the stick that is used for gaming
purposes, e.g. to fire a weapon.
Uses
Advantages
Disadvantages
It is more difficult to control the on-screen pointer with a joystick than with
other devices, such as a mouse.
Touch screens
With this system the user can choose an option by simply touching the button/icon
on the screen. The selection is automatically made without the need for any
pointing device.
Uses
Touch screens are used for self-service tills, e.g. petrol stations, where the user
just touches the screen to select the fuel grade and payment method.
Touch screens are used where selections are made on screen, for example ATMs,
point of sale terminals (e.g. at restaurants), public information systems at
airports, railway stations, tourist offices.
Personal digital assistants (PDAs), mobile phones and satellite navigation systems
use touch screens.
Interactive white boards used for education are large touch screens.
Touch screens are used in computer base training (CBT) where selections are
made in answering on screen testing.
Advantages
Touch screens enable faster entry of options than using a keyboard or a mouse.
It is very easy to choose options.
It is a user friendly method for inputting data, so no training is necessary.
Touch screens are tamper proof, preventing people from keying in information
which could potentially corrupt the computer system (e.g. at unmanned ticket
collection kiosks).
Disadvantages
12
Uses
Magnetic strip
Credit and debit cards have magnetic stripes that are used by ATMs or EFTPOS
(electronic funds transfer point of sale) terminals.
Security cards for entry to buildings, hotel rooms, etc. use magnetic stripes.
Travel systems (e.g. train and underground tickets) use magnetic stripes.
Advantages
AUTHORISED SIGNATURE
S.J.Driver
Contact Customer
Services on
0840 5661 496
or from abroad
+44 5568 123 123
Disadvantages
If the magnetic stripe gets damaged (e.g. due to exposure to a strong magnetic
field or excessive use) the data is lost.
The card needs to be in close contact with the reader, so magnetic stripe readers
dont work at a distance.
Since the information is not human readable, this can be a disadvantage in some
applications (e.g. hotel room numbers are not printed on the card, so there needs
to be another way of showing the information for the customer).
Uses
Loyalty cards, ID cards and public transport passes use smart cards.
Smart cards can be used to track customer/passenger movements (e.g. on a metro
system).
They are used with satellite systems to decode program signals.
Smart cards are used for electronic passports and driving licences.
13
Some smart cards (e.g. transport tickets) are used instead of money, reducing the
need to carry cash.
The chip on the card does not need to be in contact with reader, so there is less
damage compared with a magnetic stripe reader.
Data is more secure, since it is easier to copy information on a magnetic stripe
than it is to copy information on a chip.
Disadvantages
If the card is lost, information stored on the chip could be used in identity theft.
Uses
Chip and PIN readers are used where payments are made using cards
(restaurants, supermarkets, travel agents, etc.).
Advantages
Chip and PIN readers provide a more secure payment system than requiring a
signature or using a magnetic stripe, since the PIN typed in must match up with
PIN stored on chip.
Chip and PIN readers provide a more robust system than magnetic stripe readers,
since the chip does not need to be in contact with the reader.
Disadvantages
Since the customer types in the PIN, they need to be careful that it isnt read by
somebody else, thus giving an opportunity for fraud.
Scanners
Scanners are used to enter information on hard copy (e.g. text documents,
photographs) into a computer. The most common type is the flat bed (as shown
here) which is made up of a glass panel and lid. The hard copy document or photo is
scanned by a light source and produces a computer-readable image.
The subsequent image can then be manipulated using a drawing package. Images
can also be used with optical character recognition (OCR) software to allow the
information to used in a word processor, desktop publishing, presentation software,
etc. Specialist scanners exist which are designed to carry out a specific task,
e.g. barcode scanners (discussed later in this section).
Uses
14
Scanners are used to scan in documents and convert them into a format for use in
various software packages.
Old and valuable documents and books can be scanned, thus protecting the
originals from damage through handling and also producing records in case the
paper copies are lost or destroyed.
Non-digital photographs need to be scanned if they are to be stored on computer.
Images can be stored for editing at a later date (paper documents cannot be
edited unless they are scanned first).
Scanners are much faster and more accurate (i.e. no typing errors) than typing in
documents again.
It is possible to recover damaged documents and photographs by scanning them
and then using appropriate software to produce an acceptable copy.
Disadvantages
The quality can be limited, depending on how good the scanner resolution is.
Barcode readers
Barcode readers are used to read information in the form of a bar code (illustrated
in Figure 2.4). The readers are usually in the form of a barcode scanner and are
often built into POS terminals in supermarkets. Handheld scanners or wands (as
shown here) are also very common for reading barcodes if portability is required
(e.g. if the barcodes are on large or fixed objects).
Uses
Barcode scanners are used in supermarkets and other shops where the goods are
marked with a barcode; the barcodes are used to give information about the
product, which enables automatic stock control, itemised billing, etc. to take place.
They are used in libraries, to scan both users library cards and barcodes on
books, in order to keep track of books on loan.
They are used as a safety function in many companies to ensure that electrical
equipment is checked on a regular basis. Barcodes are placed on an item to
identify it and a database holds all the information related to that barcode so it is
possible to interrogate the system as part of a safety audit.
Advantages
Scanning barcodes is much faster than keying in data manually and fewer
mistakes are made.
When barcodes are used as a way of recording data, they can improve safety.
Barcodes enable automatic stock control.
Barcode scanning is a tried and trusted technology.
When an item price is changed, only the central database needs to be updated.
There is no need to change the prices individually on each item.
Disadvantages
15
OMR devices
Optical mark recognition (OMR) is a system which can read marks written in pen
or pencil. The places where the pen or pencil marks can be made are clearly shown
on the form, for example:
1 2
In this example, a pencil mark has been made between the dots on answer 1. The
position of the mark is stored in the computers memory after being read by the
OMR device.
Uses
Advantages
It is a very fast way of inputting the results of a survey, etc. the documents are
fed in automatically and there is no user input.
Since there is no typing, it is more accurate than keying in the data.
OMR is more accurate than OCR (discussed later in this section).
Disadvantages
The forms need to be carefully designed to make sure that the marks/shading are
correctly positioned to gather accurate information.
There can be problems if the forms havent been filled in correctly and sometimes
they have to be manually checked before being read by the OMR device this is
both time consuming and expensive.
OCR readers
Optical character recognition (OCR) is the name given to software that takes
scanned text and converts it into a computer readable form. The text can then be
used in various application packages such as word processors, desktop publishers
and presentation software.
Uses
One of the most recent uses is in the processing of passports and identity cards.
OCR is used when scanning in documents so that they can be modified using a
word processor or desktop publisher package.
Advantages
Disadvantages
16
MICR devices
Magnetic ink character recognition (MICR) is a
Characters
read by
system which can read characters printed in a special ink
MICR
(containing iron particles). Only certain characters written
in a standard font can be read, for example the characters
at the bottom of a bank cheque (see Figure 2.5). These
characters are converted into a form that the computer
can understand and then stored in a computer file.
Figure 2.5 A bank cheque
Uses
Advantages
MICR offers greater security than OCR since the printed characters cannot
be altered.
There is no manual input, thus errors are reduced.
Even if somebody writes over the magnetic ink characters (e.g. with a signature)
they can still be read.
Disadvantages
Only certain characters can be read and the number of different characters is
very limited.
It is a more expensive method than other methods used in direct data entry.
Digital cameras
Digital cameras are rapidly replacing traditional, film-based cameras. Once
photographs are stored in memory, they are easily transferred to a computer using a
universal serial bus (USB) connection (see Figure 2.6). Once saved, the images
can be manipulated (e.g. cropped, re-sized, contrast altered, etc.).
Uses
Advantages
Figure 2.6 USB
connectors
17
The camera user needs to be computer literate to use the cameras properly; also
the transferring, storing and manipulating of the images via a computer requires
some understanding of how computers work.
There is some artistry lost since clever software now corrects errors in the
photographs (e.g. incorrect exposure, removal of red eye, etc.).
The resolution is not yet as good as traditional cameras, although this is
improving all the time. The quality of photographs depends on the number of
pixels (many cameras now offer more than 10 mega pixels per image), quality of
lens, etc.
Images often need to be compressed to reduce the amount of memory used
(a single image can use more than 2 Mbytes of memory, for example).
It is possible to fill up computer memory very quickly with several photographs of
the same subject in an attempt to find the perfect snap shot.
Webcams
Webcams are similar to digital video cameras; however, they are connected directly
to the computer (through a USB port) and they do not have a memory. The
information that the webcam picks up is transmitted directly to the computer. Many
computer systems now have webcams built into the top of their monitors as
standard equipment.
Uses
While chatting online, many people use webcams as a more personal way of
having a conversation.
They are used to enable video conferencing to take place (discussed in Chapter 4).
Advantages
Disadvantages
Webcams have very limited features and the picture is often of poor quality.
They need to be connected to the computer, although this is less of an issue with
laptop computers when the webcam is built into the monitor lid.
Microphones
Microphones can be connected directly to a computer. Sounds can be inputted and
then manipulated. The input sound is converted to an analogue signal and then
converted into a digital signal. The computers sound card usually does this
automatically (i.e. it acts as an analogue to digital converter (ADC).
18
Advantages
Disadvantages
Sensors
This section deals with analogue sensors. A sensor is a device which inputs data to
a computer, where the data is a measurement of some physical quantity which is
continuously changing (e.g. temperature, light, moisture, etc.). These physical
quantities are analogue in nature. Since computers only understand digital data
(i.e. 1s and 0s), the information from the sensors needs to be converted into a digital
form. This is done using an analogue to digital converter (ADC).
Uses
Sensors are used in monitoring and control applications the type of sensor depends
on the application (see Table 2.1). When monitoring, the data sent to the computer
is often transferred directly to a spreadsheet package (e.g. taking measurements in a
scientific experiment, measuring atmospheric pollution, etc.).
Type of sensor
Applications
Temperature
Pressure
Light
Sound
Humidity/moisture
pH
19
Readings taken using sensors are generally more accurate that those taken by
human operators.
Readings are continuous, so there is no break in the monitoring.
Because it is a continuous process, any necessary action (control system) or
warning (monitoring system) will be initiated immediately.
The system can be automatic, removing the need for human intervention. This is
particularly important if the process is hazardous or needs precise
control/monitoring.
Disadvantages
Faulty sensors can give spurious results (e.g. if the sensors on the rear bumper of
a car which monitor for obstacles become dirty, they may either not identify an
obstacle or give a continuous alarm).
Graphics tablets
A graphics tablet is used with a stylus to produce freehand drawings for example.
The images produced can then be stored in a file on a computer.
Uses
Advantages
Disadvantages
They are more expensive than other pointing devices, such as a mouse.
Light pens
Light pens contain sensors that send signals to a computer whenever light changes
are detected. At the moment, the devices only work with cathode ray tube (CRT)
monitors (see Section 2.1) because they rely on the screen image being built up row
by row by an electron beam. The screen is refreshed 50 times every second, so the
computer is able to determine the pens position by noting exactly when the light
pen detected the electron beam passing its tip. Systems to operate with thin film
transistor (TFT) monitors are still at the development stage.
Uses
20
Disadvantages
CRT monitors
CRT monitors are the least expensive type of monitor, although they are becoming
increasingly rare as TFT monitors are now taking over. They come in various sizes.
They use an electron gun to fire against a phosphor screen, which creates a picture
that is made up of tiny dots. Each dot is coloured red, green or blue the intensity
of each coloured dot makes up the vast range of colours interpreted by the eye.
Uses
CRT monitors are used as the primary output device for computers so the user
can see immediately what they are typing in.
They are used with light pens, for example to allow designs to be created on screen.
Advantages
CRT monitors still produce a higher quality image than TFT monitors.
The angle of viewing is still better than with a TFT monitor.
They work with light pens in computer-aided design and computer-aided
manufacturing (CAD/CAM) applications.
Disadvantages
CRT monitors tend to be rather heavy and are a weight hazard if not supported
properly.
They run very hot and can cause fires if left unattended (especially as they get older).
They consume considerably more power than the modern TFT monitors.
They can flicker, which can lead to headaches and eyesight problems with
prolonged use.
21
TFT monitors
TFT monitors are taking over from CRT monitors as the main output device. One
of the reasons for the rapid development of laptop computers can be attributed to
the advancements made in TFT technology. The screen is made up of thousands of
tiny pixels, which are made up of transistors controlled by a microprocessor. Each
pixel has three transistors, coloured red, green or blue; the intensity of each governs
the effective colour of the pixel seen by the eye.
Uses
TFT monitors are used as the primary output device for computers so the user
can see immediately what they are typing in.
They are an integral part of laptop computers.
Advantages
TFT monitors are lightweight, so do not pose the same risks as CRT monitors.
They produce less glare than CRT monitors and also emit less radiation.
They consume much less power and do not generate as much heat as a CRT
monitor.
Disadvantages
The angle of viewing a TFT monitor is fairly critical, with the image appearing
unclear when viewed slightly from the side. This can be an issue if several people
are looking at a screen at the same time.
The definition is sometimes not as good as CRT monitors.
TFT monitors cannot yet be used with light pens, so these monitors cannot be
used in CAD if light pens are used to create and edit drawings.
Laser printers
Laser printers produce very high-quality hard copy output. The print rate per page
is very quick if a large number of pages are being printed. They rely on large buffer
memories, where the data for the whole document is stored before the pages can be
printed out.
Uses
Laser printers are used where noise levels need to be kept low (e.g. in an office).
They are the best option for fast high quality high volume printing.
Advantages
22
Printing is fast for high volumes. If only a few pages are to be printed they are
little faster than inkjet printers.
They can handle very large print jobs.
The quality is consistently high.
Toner cartridges last for a long time, so laser printers can be a cost effective
option, particularly if colour outputs are not required.
Inkjet printers
Inkjet printers are used to produce good quality hard copies. Although the quality is
not quite as good as that from laser printers, it is far better than that from dot matrix
printers. Unlike laser printers, inkjet printers do not have large buffers, so printing is
done a bit at a time. This is why printing is sometimes paused, since the whole page
cant be stored in the buffer and it has to wait for the computer to send more data.
Uses
Inkjet printers are used where low output volumes are required.
If high-quality printing is required for single pages (or only a small print job)
then these printers are ideal, for example they are very good at producing photo
quality printouts.
3D inkjet printers are now being used in industry to produce prototypes (see below).
Advantages
Disadvantages
The output is slow if several copies needed, as there is little buffer capacity to
store the pages.
The ink cartridges run out too quickly to be used for large print jobs.
Printing can smudge if the user is not careful.
Inkjet printers can be expensive to run if they are used a lot, since original ink
cartridges are expensive.
3D inkjet printers
These are a new type of printer that produce solid 3D models using modified inkjet
technology. In this technology, known as tomography, thin layers of fine powder
(plaster, resin and starch) are bonded together as a 3D model is slowly built up
(each layer is only about 0.25 mm thick). Figure 2.7 shows some items produced on
a 3D inkjet printer these are known as prototypes.
23
Inkjet printers are used to produce prototypes which actually work from CAD
packages, photograph images, stored drawings, etc.
Scale models are produced in colour before the real thing is manufactured.
The ultimate objective is to produce organic objects (such as replacement human
organs) using this layering technology.
Advantages
Disadvantages
Uses
Advantages
Dot matrix printers can be used in environments which would be a problem for
laser or inkjet printers (e.g. dusty, dirty or moist atmospheres).
Carbon copies or multi-part outputs can be produced.
They are very cheap to run and maintain.
They are easy to use if continuous stationery is required (e.g. long print jobs such
as wages slips).
Disadvantages
24
Plotters
Plotters (also known as graph plotters) are devices that produce hard copies, but
operate in a different way to printers. They are not limited to normal printer paper
size and are capable of producing highly accurate, very large drawings and posters.
The most common types are pen plotters (which use coloured pens to draw),
electrostatic (similar method to laser printers) and inkjet plotters. With pen plotters
the coloured pens are controlled by a computer and the paper can move backwards
and forwards to allow accurate shapes to be drawn.
Uses
Advantages
Disadvantages
Speakers
Speakers can be connected directly to a computer or are built into the monitor or
casing (as in a laptop computer). Digital data from the computer is converted into
analogue form, using a digital to analogue converter (DAC). The signal is then
amplified through the speakers.
Uses
Multimedia projectors
Multimedia projectors receive signals that can be either analogue or digital,
although most modern projectors only work with digital inputs. The signal source is
usually from a computer, television or DVD player. The image from the source is
magnified and projected onto a large screen. The devices usually work with a remote
control, but can also use virtual mouse technology which actually becomes a cordless
PC mouse with the same features as a mouse. It is then possible to direct the
computer presentation without being tied to the computer. Another feature of the
virtual mouse is the laser pointer. Most multimedia projectors take input from
various types of video format such as NTSC, PAL or SECAM.
25
Multimedia projectors are used for training presentations (to allow the whole
audience to see the images from a computer).
They are also used for advertising presentations (large images showing product
features of, for example, a new car, can be shown at exhibitions, shopping
malls, etc.).
Home cinema systems (projecting the images from a DVD or television) use
multimedia projectors.
Advantages
They enable many people to see a presentation rather than all of them crowding
round a small computer screen.
They avoid the need for several networked computers. For example, when
looking at a video clip on an internet site, everybody can see the video on the
large screen rather than logging on to a number of computers.
Disadvantages
Actuators
Actuators are transducers and are used to take signals from a computer and
convert them into some form of motion, for example operating motors, pumps,
switches and valves. As part of the control process, digital signals are sent from the
computer to an actuator to operate a device. Usually, conversion of the digital signal
to analogue is required first (using a DAC).
Motors
The motor is turned on or off by the actuator.
Uses
26
Buzzers
The buzzers are switched on or off by the actuator.
Uses
Buzzers are used in cookers and microwave ovens to tell the operator when the
cooking process is complete.
They are used in burglar alarm systems to warn if intruders are present.
Lights
The actuator is connected to the switch that turns the lights on or off.
Uses
Heaters
Actuators are connected to switches which turn the heater on or off.
Uses
Heaters are used in automatic washing machines, cookers and central heating
systems.
Heaters are used in automatic greenhouses to control the temperature.
27
CHAPTER
Serial access
With this system, to access data it is necessary to start at the beginning and then
access each piece of data in turn until the required information is found.
It is primarily used on magnetic tape systems and is a very slow form of access. It
is used in applications where speed of access or
A
where the order in which the data is accessed is
Old
data stored
not important, for example in utility billing,
on magnetic
tape
New tape
clearing bank cheques or producing pay slips.
produced by
merging
When a magnetic tape needs updating, an
B
A and B
New
data
to
additional tape is required so that the old
be merged with
old data
information can be merged with the new data
(itself often on another tape, but the new data
could be stored in various ways) to produce the Figure 3.1 Updating the data on a
magnetic tape
updated tape (see Figure 3.1).
Direct access
This method is used with magnetic disks and with optical media (such as CDs and
DVDs). The computer uses a key field to calculate where data has been stored. It is
then able to access the data directly from the calculated position. Consequently,
access is much faster than with serial access.
It is used in applications where access speed is vital (e.g. in real-time process
control systems such as controlling a chemical plant or online systems such as
booking air tickets or automatic stock control).
When updating media which uses direct access, the new data is written to the
next available location and its position is calculated using the built-in algorithm.
Uses
Fixed hard drives are used to store the operating system and working data.
They are used for storing applications software that needs fast retrieval and
storage of data.
Real-time systems (e.g. robots, control of a chemical plant) and online systems
(e.g. booking airline tickets, automatic stock control (using EPOS)) used fixed
hard drives.
They are used in file servers for computer networks.
Advantages
They have a very fast data transfer rate and fast access times to data.
They have very large memory capacities.
Disadvantages
They can be fairly easily damaged (e.g. if the correct shut-down procedure on a
laptop computer has not been correctly carried out and the computer is then moved).
They lack portability unless a portable hard disk drive is used (see next sub-section).
Uses
Portable hard disks can be used as back-up systems to prevent loss of data.
They can be used to transfer data, files and software between computers.
Advantages
The data access time and data transfer rate is very fast.
They have large memory capacities.
They can be used as a method of transferring information between computers.
Disadvantages
30
As with fixed drives, a portable hard disk can be easily damaged if the user
accidentally drops it or does not shut it down correctly after use.
Uses
Advantages
Disadvantages
Floppy disks have a very low memory capacity when compared to CD/DVDs,
for example.
Very few modern computers have floppy disk drives.
The data transfer rate is slow compared to more modern data storage devices.
Floppy disks are not very robust.
Magnetic tapes
A magnetic tape is a very thin strip of plastic which is coated in a magnetic layer.
They are read and written to by a read/write head. The data is stored in magnetic areas
which represent 1s and 0s. Data is written to and read from the tape in sequence
(i.e. in order) for example, if five records A, B, C, D and E were stored they would
be in the order E D C B A on the tape; so if record B was to be read it would be
necessary to read E, D and C first before getting to the required record. This is known
as serial access. This type of storage is useless in a real-time or online application (due
to the very slow access speeds) and is best suited to offline or batch processing.
Uses
Magnetic tapes are used in applications where batch processing is used, for
example in clearing bank cheques, utility billing (gas, electricity, water) and
producing pay slips. In these applications, there is no need for any specific
processing order and speed of data access is not important).
They are used as a back-up media since all the data needs to be stored.
Advantages
They are generally less expensive than the equivalent-capacity hard disk.
It is a very robust technology.
The data transfer rate is fast.
31
Uses
Advantages
They hold far more data than floppy disks, so one CD/DVD could replace several
floppy disks in some applications.
They are less expensive than hard disk drive systems.
Disadvantages
The data transfer rate and data access time are slower than for hard disks.
Uses
They are used for home recordings of music (CD-Rs) and films (DVD-Rs).
They are used to store data to be kept for later use or to be transferred to another
computer.
They are used in applications where it is necessary to prevent the deletion or
over-writing of important data).
Advantages
Disadvantages
They can only be recorded once, so if an error occurs then the disk has to be
thrown away.
Not all CD/DVD players can read CD-R/DVD-R.
Uses
CD-RWs and DVD-RWs are used to record radio and television programmes,
but can be recorded over time and time again.
They are used in closed circuit television (CCTV) systems.
Advantages
Disadvantages
DVD-RAM
DVD-RAM is a recent addition to the optical media group. Unlike other CD and
DVD formats, DVD-RAMs have several discrete concentric tracks rather than a
single spiral track. This gives them the advantage that writing and reading can occur
at the same time. This makes it possible to watch an already recorded television
33
Uses
Advantages
Disadvantages
Blu-ray disks
Blu-ray disks have the largest capacity of all the optical media available and go up
to 100 Gbyte (at the present time). The laser beam used is at the blue/violet end of
the spectrum, rather than red which is the colour of the lasers used in other optical
media. Consequently, the light used has a shorter wavelength, allowing more data to
be stored/read on the disk.
Uses
34
They have a very large storage capacity, and so are ideal for storing high
definition films.
The data transfer rate is very fast.
The data access speed is also greater than with other optical media.
Disadvantages
Uses
Memory sticks and pen drives are used for transporting files between computers
or as a back-up store.
They are used as a security device a dongle to prevent software piracy.
35
Disadvantages
Uses
Advantages
Flash memory cards are very compact, so they can be easily removed and used in
another device or used for transferring photos directly to a computer or printer.
Since they are solid state memories, they are very robust.
Disadvantages
36
They are expensive per Gbyte of memory when compared to hard drive disks.
They have a finite life in terms of the number of times they can be read from or
written to.
They have a lower storage capacity than hard disks.
CHAPTER
Computer networks
4.1 Introduction
Most computer systems are now connected together in some way to form what is
known as a network. This ranges from the basic school/home network of only a few
computers (often set up to share resources such as printers or software) to large
networks such as the internet which effectively allows any computer connected to it
to communicate with any other computer similarly connected.
This chapter considers the types of networks that exist and the many features that
are available because of networking.
37
Ring networks
Ring networks, shown in Figure 4.1, are
becoming less popular. Every computer in the
network is connected in a ring, including the server.
Data is transmitted around the ring and each
computer only removes the data which is relevant
to it. This allows each computer to send and receive
data since they all have a unique
identification/address.
Advantages
Disadvantages
If there is a fault in the wiring between two computers then the whole network
will fail.
Adding a new device or computer to the network can be difficult since it has to
be placed between two existing devices.
Bus networks
In a bus network, illustrated in Figure 4.2, each computer or device is connected to
a common central line. Data travels along this central line until it reaches the
computer or device that requires it. The ends of the line have terminators to prevent,
for example, signal bounce, which would cause data interference.
Computer networks
Advantages
Disadvantages
Star networks
With a star network, shown in Figure 4.3, each
computer or device is connected via a central
hub or switch. Data is sent to the hub which
then sends out data along every cable to every
computer or device (no checking is done to see
where the data should be sent).
Hub/switch
Advantages
Disadvantages
Tree network
A tree network has a central line (just like a bus network) connecting together a
series of star networks, as shown in Figure 4.4. The server is also connected to this
central line. Because of its flexibility, and the fact that it has the advantages of both
bus and star networks, this topology is becoming increasingly popular.
The advantages and disadvantages are the same as for bus and star networks.
Hub
Hub
Hub
39
AP
AP
AP
The AP receives and transmits data between the WLAN and the wired network
structure. End users access the WLAN through WLAN adapters, which are built
into the devices or are plug-in modules.
Advantages
All computers can access the same services and resources (e.g. printers, scanners,
internet access from anywhere within range of the APs).
There is no cabling to individual computers and devices so safety is improved.
The system is more flexible, since users can move their laptops from their desks.
Adding new computers and devices is very easy (all that is required is a WLAN
adapter, provided the device is within range of an AP) and costs are reduced since
no extra cabling is needed.
Disadvantages
Security is a big issue since anyone with a WLAN-enabled laptop computer can
access a network if it can pick up a signal. It is therefore necessary to adopt
complex data encryption techniques.
There may be problems of interference which can affect the signal.
The data transfer rate is slower than in a wired LAN.
WiFi
WiFi refers to any system where it is possible to connect to a network or to a single
computer through wireless communications, for example:
on the WLAN described above
PDAs and other handheld devices
40
Computer networks
WiFi systems rely on some form of AP, which uses radio frequency technology to
enable the device to receive and send signals.
Note that WiFi is not short for wireless fidelity (a common misconception!).
Rather, it is the trademark name for any product which is based on the IEEE
802.11 standard.
WiFi hotspots are places where you can access WiFi (free or paid). They exist in
public places such as airports, hotels and internet cafs. It is possible to logon to free
WiFi hotspots unless they are protected by passwords. Software exists which can be
loaded onto a laptop computer which then searches for non-protected WiFi systems.
The practice of driving around in a car looking for these unsecured WiFi hotspots is
known as war driving and poses a security risk to any unsecured WiFi system.
Bluetooth
Bluetooth is an example of wireless personal area networking (WPAN)
technology. Spread spectrum transmission (radio waves) is used to provide wireless
links between mobile phones, computers and other handheld devices and allow
connection to the internet.
With this system, it is possible to create a small home network, for example, to
allow communication between any PDA, mobile phone, computer, media player
and printer. The range is, however, quite small (about 10 metres). Examples of its
use include the transfer of photographs from a digital camera to a mobile phone or
the transfer of phone details to a computer. It behaves like a mini-LAN.
Network hubs
Network hubs are hardware devices that can have a number of devices/computers
connected to them. Its main task is to take any data received via one of the ports and
then send out this data from all of the ports. Each computer/device will receive the
data, whether it is relevant or not.
Switches
Switches are similar to hubs but are more efficient in the way they distribute data.
A hub learns which devices are connected to which ports. Each device has a media
access control (MAC) address which identifies it uniquely. Data packets sent to
the switch will have a mac address giving the source and receiving device. If a device
X is always sending the switch data via port 4 then it learns that X must be
connected to that port; any data packet which is intended for X only is then sent
through port 4 and not through any of the others. This means that the network
traffic only goes to where it is needed and so a switch is more efficient than a hub,
especially when the network is very busy.
Bridges
Bridges are devices that connect one LAN to another LAN that uses the same
protocol (the rules that determine the format and transmission of data). They decide
whether a message from a user is going to another user on the same LAN or to a user
on a different LAN. The bridge examines each message and passes on those known to
be on the same LAN and forwards messages meant for a user on a different LAN.
In networks that use bridges, workstation addresses are not specific to their
location and therefore messages are actually sent out to every workstation on the
network. However, only the target workstation accepts this message. Networks
using bridges are interconnected LANs since sending out every message to every
workstation would flood a large network with unnecessary traffic.
Routers
42
Since large companies often have more than one network there are occasions when
the computers in one network want to communicate with the computers in one of
the other networks. Routers are often used to connect the LANs together and also
connect them to the internet.
Computer networks
Routers inspect the data packages sent to it from any computer on any of the
networks connected to it. Since every computer on the same network has the same first
part of an internet protocol (IP) address, the router is able to send the data package
to the appropriate switch and it will then be delivered using the mac destination address
in the data packet. If this mac address doesnt match any device on the network it passes
on to another switch on the same network until the device is found.
Websites
The web is made up of millions of these websites (e.g. www.hoddereducation.com)
and millions of web pages (e.g. Hodder Education front page, shown in Figure 4.6).
Web pages are documents on a computer screen which may consist of text, pictures,
sounds, animation or video (i.e. multimedia). A website consists of many of these
pages linked together.
44
Computer networks
These were discussed in Section 4.3 as part of modems and are summarised in
Table 4.1.
Type of access
Description
4.5 Intranets
Many companies use an intranet as well as the internet. The simple definition of an
intranet is a computer network based on internet technology that is designed to
meet the internal needs for sharing information within a single
organisation/company. There are number of reasons for doing this.
It is safer since there is less chance of external hacking or viruses.
It is possible to prevent employees from accessing unwanted websites.
Companies can ensure that the information available is specific to their needs.
It is easier to send out sensitive messages that will remain only within the company.
It is now worth comparing the internet with intranets:
The term internet comes from the phrase international network.
The term intranet comes from the phrase internal restricted access network.
An intranet is used to give local information relevant to the company whereas the
internet covers topics of global interest.
It is possible to block out certain internet sites using an intranet. This is much
more difficult to do from the internet.
An intranet requires password entry and can only be accessed from agreed
points, whereas the internet can be accessed from anywhere provided the user
has an ISP account.
45
User IDs
When logging on to any network system, a user will be asked to type in a user ID.
This assigns the user privileges once the logon procedure is successful. For example,
on a network, top level privilege would be for an administrator, who is able to set
passwords, delete files from the server, etc., whilst a user privilege may only allow
access to their own work area.
Passwords
After keying in the user ID, the user will then be requested to type in their
password. This should be a combination of letters and numbers which would be
difficult for somebody else to guess. When the password is typed in it often shows
on the screen as ******** so nobody overlooking can see what the user has typed
in. If the users password doesnt match up with the user ID then access will be
denied. Many systems ask for the password to be typed in twice as a verification
check (check on input errors). To help protect the system, users are only allowed to
type in their password a finite number of times three times is usually the maximum
number of tries allowed before the system locks the user out. After that, the user will
be unable to logon until the system administrator has re-set their password.
When using some internet websites, if a user forgets their password they can
request the password to be sent to their email address. The password is never shown
on the computer screen for reasons of security.
Encryption
Encryption is the converting of data into a code by scrambling it or encoding it.
This is done by employing encryption software (or an encryption key). Since the
data is all jumbled up it appears meaningless to a hacker or anyone who illegally
accesses the data. It should be stressed that this technique does not prevent illegal
access, it only makes the data useless to somebody if they dont have the necessary
decryption software (or decryption key). It is used to protect sensitive data (such as
a persons banking details).
46
Computer networks
Encryption keys are much more complex than the one above, in order to prevent
computers being used to crack the code. Very sophisticated algorithms are used
which make the codes almost unbreakable.
Authentication techniques
As shown above, there are many ways in which a computer user can prove who they are.
This is called authentication, and a type of authentication is used in the banking
example that follows. Most systems adopt the following authentication logic:
something you know e.g. PIN/password
something belonging to you e.g. your bank card
something unique to you e.g. your fingerprints.
At least two of these are needed at the moment when a user has to prove who they
are. For example, the following banking example uses:
something you know surname, reference number, PIN, date last logged on
something belonging to you card put into card reader to produce the 8-digit code.
In future, the third feature will be introduced (such as a fingerprint scanner attached
to a computer to uniquely identify the user).
H&S Bank.co.uk
Banking example
next
H&S Bank.co.uk
The 7 character
next
H&S Bank.co.uk
H&S Bank.co.uk
next
47
Fax
The term fax is short for the word facsimile. With this system, documents are
scanned electronically and converted into a bit map image (a bit is a binary digit and
is a 1 or a 0). This is then transmitted as a series of electrical signals through the
telephone network. The receiving fax machine converts this electronic image and
prints it out on paper.
It is also possible to generate fax signals from a computer to allow files and
documents to be sent to a fax machine this saves printing out the document first
and then passing it through a fax machine. Fax/modem software in the computer
converts the image into a form recognised by a fax machine. However, this is not as
efficient as the email system where the electronic copy is sent and is then stored
electronically thus permitting the document to be edited, for example.
Email
This is an electronic method for sending text and attachments from one computer to
another over a network (see Section 4.4 for further details).
The advantages of using email include:
the speed of sending and receiving replies using the email system
the low cost, since stamps, paper and envelopes are not needed
not needing to leave home to send the mail.
Disadvantages include:
the possibility of virus threats and hacking
the need for the email address to be completely correct
the inability to send bulky objects via emails.
Video conferencing
This is a method of communication between people at two separate locations
(e.g. in different countries). This is done in real time and makes use of a LAN, if
internal, or through a WAN, e.g. the internet, if national or international. The
system works in real time and uses additional hardware such as webcams, large
monitors/television screens, microphones and speakers.
The system also uses special software such as:
CODEC, which converts and compresses analogue data into digital data to send
down digital lines
echo cancellation software, which allows talking in real time and synchronises
communications.
Delegates at one end speak into a microphone and look at a webcam. The other
delegates can see them and hear them using large monitors and speakers.
There are potential problems with these systems such as time lag (the time it
takes for the signal to reach its destination, which can be difficult when trying to
have a conversation since there seems to be a delay). Also, sound quality and picture
quality can be poor unless expensive hardware and software is used.
48
Computer networks
However, these systems are becoming increasingly popular as the cost of
travelling increases and the risk of terrorist attacks becomes higher. One large
company, which reduced travelling from Europe to USA and used video
conferencing wherever possible to discuss product development, claims to have
saved several million US dollars over a 12-month period. The savings were due to
reduced travelling (mostly air fares) and to reduced overnight accommodation. Since
little or no travelling is involved meetings can be held at short notice, but time
differences between countries can become an issue.
VOIP
Voice over internet protocol (VOIP) is a method used to talk to people using the
internet. VOIP converts sound (picked up by the computer microphone or special
VOIP telephone plugged into the USB port of the computer) into discrete digital
packets which can be sent to their destination via the internet. One of the big advantages
is that it is either free (if the talking is done computer to computer, i.e. both computers
have VOIP telephones or use their built-in/plugged-in microphones and speakers) or at
a local rate to anywhere in the world (when VOIP is used to communicate with a
mobile or land line telephone rather than another computer).
To work in real time this system requires a broadband ISP. The main problems
are usually sound quality (echo and weird sounds are both common faults).
Security is also a main concern with VOIP, as it is with other internet technologies.
The most prominent security issues over VOIP are:
identity and service theft
viruses and malware (malicious software)
spamming (sending junk mail)
phishing attacks (the act of sending an email to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into surrendering
private information that will be used for identity theft).
49
CHAPTER
Data types
5.1 Introduction
Data can exist in many forms, and so there are various defined types of data that
computers use. All the data that is stored on computers is digital, but lots of types
of data in the real world involve physical measurements of continuously varying
data. These need to be converted into digital data for storage and manipulation on
a computer.
Data frequently needs to be stored in a logical sequence to allow access and/or
searching to be done at some later stage. One of the most common methods of data
storage is the use of databases.
Logical/Boolean data
Boolean data (or logic data type) can have only two values: true or false. This
works if there are only two possible responses to a question or situation, i.e. (Yes or
No), (True or False) or (1 or 0).
This is made most use of when carrying out a search in a database or on the
internet. In these cases, logical operators are used which are based on true
(i.e. binary 1) or false (i.e. binary 0) logic.
50
Data types
The AND operator
Consider the list of seven students in Table 5.1.
Name
Sex
Height (m)
Male
1.6
Male
1.7
Female
1.5
Female
1.7
Male
1.4
Female
1.6
Male
1.5
Sex
Sex logic
status
Height (m)
Height logic
status
Male
True
1.6
False
Male
True
1.7
True
Female
False
1.5
False
Female
False
1.7
True
Male
True
1.4
False
Female
False
1.6
False
Male
True
1.5
False
Table 5.2 Logic status for search query (Sex = Male) AND (Height (m) > 1.6)
Note that the logic operator called AND looks for the situation where something is
true in both groups. For example, consider two groups X and Y where X = {1, 2, 3, 4}
and Y = {3, 4, 5, 6}. The statement X AND Y would be equal to {3, 4} since it is true
that 3 and 4 are the only items which are common (i.e. true) to both groups (see
Table 5.3).
51
Number is in group X
Number is in group Y
True
False
True
False
True
True
True
True
False
True
False
True
In the student database only example B contains items which are true (common) to
both groups (i.e Male and 1.7 m).
The OR operator
Now consider a different search:
(Sex = Female) OR (Height (m) < 1.6)
This gives the logic status shown in Table 5.4. There are five matches where the
search condition is true for (Sex = Female) OR true for (Height (m) < 1.6):
names C, D, E, F and G.
Name
Sex
Sex logic
status
Height (m)
Height logic
status
Male
False
1.6
False
Male
False
1.7
False
Female
True
1.5
True
Female
True
1.7
False
Male
False
1.4
True
Female
True
1.6
False
Male
False
1.5
True
Table 5.4 Logic status for search query (Sex = Female) OR (Height (m) < 1.6)
Note that the logic operator called OR looks for the situation where something is true
in either group. For example, consider two groups X and Y where X = {1, 2, 3, 4}
and Y = {3, 4, 5, 6}. The statement X OR Y would be equal to {1, 2, 3, 4, 5, 6} since
it is true that all six numbers occur in either group (see Table 5.5).
52
Data types
Number
Number is in group X
Number is in group Y
True
False
True
False
True
True
True
True
False
True
False
True
In the student database example, C, D, E, F and G contain items which are true in
either group.
Numeric data
Numeric data can be in two forms: integer (whole numbers) or real (containing
decimals). For example, 3416 is an integer, but 34.16 is real.
Examples of integers include the number of floors in a hotel, the number of
students in a class or the number of wheels on a car. Examples of real numbers
include temperatures, price of an item in a shop or a persons height in metres.
Numeric data also includes zero (0) and negative numbers such as 4516 (integer)
or 30.26 (real).
Date data
Date can be written in many forms, for example:
dd/mm/yyyy (dd = day, mm = month and yy/yyyy = year), e.g. 19/08/2009
dd/mm/yy, e.g. 19/08/09
dd.mm.yy, e.g. 19.08.09
yyyy-mm-dd, e.g. 2009-08-19.
All of the above examples use a number form of the month, but it can also be
written as the full word or the three-letter abbreviation:
dd mmmm yyyy, e.g. 19 August 2009
dd-mmm-yyyy, e.g. 19-Aug-2009.
All the above are accepted as date in most application packages (such as spreadsheets
and databases) where the format is particularly important due to data manipulation
(e.g. sorting) or searching.
53
FILE
Record 1
F = field
Record 2
Record 3
1416
J. Smith
30/05/2003
Sales
Record 2
1417
K. Shah
11/02/1989
Manager
Record 3
1431
R. Marques
15/10/2001
Finance
Record 4
1452
T. Rodriguez
27/09/1995
Sales
Record 5
1461
V. Schultz
09/12/2005
Graduate
field
field
field
field
FILE
In reality, COMPANY EMPLOYEE FILE would be much larger, containing all the
records for all the companys employees. This type of file is often referred to as a flat
file structure.
5.4 Databases
A database is a collection of information which is structured in some way to permit
manipulation and searching of data.
54
Data types
User
User
Front end 1
User
User
Front end 2
Central database
interface
Database files
Relational databases
Relational databases were first introduced in 1970 following the work of F. F.
Codd, a researcher at IBM.
Relational databases consist of a number of separate tables which are related (a
table is made up of rows and columns in much the same way as a spreadsheet is
structured). Each table contains a primary (key) field that is also a field in at least
one other table. It is possible to combine data from different tables to produce a
report which only contains the required information.
Relational databases do not need to repeat data, which is one of the problems of
flat file structure (in the example that follows, three flat files would be needed
containing repeated fields of key data since there would be no links connecting each
file). Information is stored in separate tables only connected by the primary (key)
field. Other advantages of relational databases include:
faster data retrieval (because of links between tables)
easy expansion of the database by adding extra data or new tables
the need to change data in only one table all other references to this data will
then also be up to date, resulting in what is known as data integrity.
Tables can also contain foreign keys that relate tables in the database to one
another. A foreign key in one table is a primary key in another.
We will now look at an example that shows the structure of tables in a relational
database. In this example, there are three connected tables. It is important to note
that in commercial databases there will be several tables connected together. The
examples shown here contain only two or three and are being used to show the
principle of relational databases.
Example
A garage sells cars and keeps a database of sales, customers and servicing, as shown
in Figure 5.4 overleaf.
The primary (key) field is Car number and the column is shaded red).
The foreign key fields are Invoice number and Engine ID and these are
shaded green.
Information from all three tables is linked together so, for example, if a car
service was due then by typing in Car number the customers details and servicing
details are brought up on the screen. This means information can be sent to the
customer as a reminder. Once the service is carried out, the servicing table will be
updated which means all other references to it will also be up to date.
To help you understand these complex structures, go through the following
exercise, which contains a flat data structure and a relational database.
55
Link through
the primary
key: Car
number
Make of car
Value ($)
Date car
sold
Mileage at
sale (km)
A 111 BBB
VW Golf
20 500
20/01/09
18,100
C 202 ART
SEAT Leon
19 450
15/03/09
25,509
N 105 BRM
Toyota Aygo
12 700
18/12/08
16,702
R 541 KTT
FIAT Punto
13 400
04/09/08
12,212
S 229 RRP
Honda Civic
16 600
17/11/08
21,099
Invoice
number
Car
number
Customer
name
242986
R 541 KTT
243001
S 229 RRP
243221
N 105 BRM
243811
A 111 BBB
244002
Garage
sales
table
Customer
details
Annual
mileage (km)
J. Klaus
12 Ford Road
15,000
K. Chan
25,000
D. Mejia
56 Ligo Road
18,000
B. Bipan
20,000
C 202 ART
T. Gunter
87 Pebble Drive
15,000
Engine ID
Car
number
Service
mileage
Date of
last service
Any recalls
outstanding?
AF123452
C 202 ART
40,000
10/03/09
Yes
AST23455
R 541 KTT
32,000
29/08/08
No
BB219009
A 111 BBB
38,000
10/01/09
No
CD567899
N 105 BRM
30,000
12/12/08
No
FFF34567
S 229 RRP
39,000
14/11/08
Yes
Customer
details
table
Servicing
table
Exercise 5a
Example 1
Table 5.6 shows a flat data structure.
Employee
number
Name of
employee
Date joined
Salary ($)
Department
Telephone
number
A6121
Mr J. Bloggs
30/01/2000
18,000
Sales
B4142
Ms N. Kahn
19/02/2001
25,000
Accounts
B5041
Ms R. Spacek
04/11/2001
19,000
Sales
A3046
Mr K. Silva
15/12/2003
40,000
Legal
A5211
Mr N. Choudry
01/07/2004
25,000
Accounts
56
Data types
Example 2
The database shown in Table 5.7 contains two linked tables. The database is being used to keep a record of which
customers have borrowed CDs from the music lending library.
CD stock table
Barcode
CD title
CD Artist
Year released
Number of tracks
77779287727
Seasons End
Marillion
1989
10
99969313424
Kingdom of Rust
Doves
2009
24354273506
Let It Go
Nada Surf
2002
11
94639624829
Interpol
2007
02498669105
The Invitation
Thirteen Senses
2004
12
45099625627
Seal
Seal
1994
10
Customer name
Telephone number
CD borrowed
M10411
Mr K. Sahz
02498669105
15/10/2009
M21516
Mr D. Silva
77779287727
14/10/2009
F18113
Mr A. Adak
45099625627
14/10/2009
M20004
Mr R. Choudhury
24354273506
12/10/2009
F16117
Ms L. Smith
94639624829
11/10/2009
F50316
Mr M. Egodi
99969313424
10/10/2009
a
b
c
d
e
f
g
Furnace
ADC
Digital
signal
Analogue
signal from
sensor
Digital
computer
Valve
DAC
Gas supply
Analogue
signal to control
valve
Digital
signal
Temperature
values stored
on file
58
CHAPTER
6.1 Introduction
The use of ICT has affected our everyday lives in many ways. These range from the
effects of ICT on society in general, such as the changes in types and styles of
employment, to the convenience that it offers the individual, through services such
as online shopping and banking. However, in addition to providing new
opportunities, ICT has introduced its own problem, such as issues relating to
copyright, security of both companies and individuals, and health and safety. This
chapter discusses many of these effects.
Impact on employment
The introduction of ICT has led to unemployment in many areas such as:
manufacturing, where robots have taken over many tasks (e.g. paint spraying in a
car factory)
computer-controlled warehouses, which are automatic and require no personnel
to be present
labour-intensive work (e.g. in the printing industry, checking football pools,
filing, etc.).
However, it is also true that some new jobs have been created with the introduction
of ICT. These include writing software, maintenance of robots and other ICT
equipment and work connected with internet sites (setting sites up, maintaining
them, etc.).
The overall work- related effects on people can be summarised as follows:
the need to be re-trained because of the introduction of new technology, e.g. how
to operate or maintain the new machinery which is being introduced to do the
work previously done by a person
a cleaner working environment where robots have taken over many of the dirty
manual tasks
61
de-skilling of the workforce, as jobs where high skills were needed in the past are
now done by computer systems (e.g. the use of DTP software in the printing
industry, CAD software in producing engineering drawings, etc.)
a safer working environment (e.g. fewer people working in noisy factories)
fewer manual tasks, since tasks such as heavy lifting are now done by robots.
Companies have also gained from the introduction of ICT systems. For example:
there is no need to employ as many people to do the tasks, thus reducing
labour costs
robots do not take holidays, get sick or take coffee breaks, resulting in higher
productivity
whilst the quality is not necessarily better, there is greater consistency in the
products made (e.g. every car coming off a production line will be identical).
Advantages
62
There is no longer a need to travel into the town centre thus reducing costs
(money for fuel, bus fares, etc.) and time spent shopping. It also helps to reduce
town centre congestion and pollution.
Users now have access to a worldwide market and can thus look for products that
are cheaper. This is less expensive and less time consuming than having to shop
around by the more conventional methods. They also have access to a much
wider choice of goods.
Disabled and elderly people can now get access to shops and banks without the
need to leave home. This helps to keep them part of society since they can now
do all the things taken for granted by able-bodied people.
Because it is online, shopping and banking can be done at any time on any day of
the week this is termed 24/7. This is particularly helpful to people who work,
since shops/banks would normally be closed when they finished work.
People can spend more time doing other things. For example, going shopping to
the supermarket probably took up a lot of time; by doing this online people are
now free to do more leisure activities, for example.
There is the possibility of isolation and lack of socialisation if people stay at home
to do all their shopping and banking.
There are possible health risks associated with online shopping and banking
(discussed in Section 6.7).
Security issues (e.g.) are a major concern. These include:
hacking, stealing credit card details, etc. (discussed in Section 6.3)
viruses and other malware (e.g. phishing, pharming, etc., discussed in Section 6.5)
fraudulent websites (discussed in Section 6.5).
It is necessary to have a computer and to pay for line rental to take part in online
shopping and banking. Also the telephone line will be tied up if the user does not
have a broadband connection.
Unlike high street shopping, it is not possible to see (or try on) the goods first
before buying them. The goods also take several days to arrive.
There is a risk of lack of exercise if people do all their shopping and banking at
the computer.
High street shops and banks are closing because of the increase in online
shopping and banking and this is leading to ghost towns forming.
Disadvantages
64
Disadvantages
Reliability of information
There is always the risk of finding undesirable websites (as discussed in Section 6.4).
There is also a risk of doubtful websites which are not genuine and could lead to
a number of problems such as undesirable web links, security risks, etc.
Security risks are a very large problem and are discussed in the following section.
65
Security issues
The risk of viruses and hacking has already been discussed in Section 6.3. The use of
passwords, user IDs, encryption, firewalls and other software protection was also
discussed in Section 6.3. However, there are other security risks (not necessarily as a
result of viruses or hacking) associated with connecting to the internet. These
security risks are now discussed in some depth.
Phishing
Phishing is a fraudulent operation involving the use of emails. The creator sends out
a legitimate-looking email, hoping to gather personal and financial information from
the recipient of the email. To make it more realistic (and therefore even more
dangerous!) the message will appear to have come from some legitimate source
(such as a famous bank). As soon as an unsuspecting user clicks on the link they are
sent to a spoof website where they will be asked for personal information including
credit card details, PINs, etc. which could lead to identity theft.
Many ISPs now attempt to filter out phishing emails, but users should always be
aware that a risk still exists and should be suspicious of any emails requesting
unsolicited personal details.
Pharming
Pharming is a scam in which malicious code is installed on a computer hard disk or
a server. This code has the ability to misdirect users to fraudulent websites, usually
without their knowledge or consent.
Whereas phishing requires an email to be sent out to every person who has been
targeted, pharming does not require emails to be sent out to everybody and can
therefore target a much larger group of people much more easily. Also, no conscious
action needs to necessarily be made by the user (such as opening an email), which
means the user will probably have no idea at all that have been targeted. Basically,
pharming works like this:
A hacker/pharmer will first infect the users computer with a virus, either by
sending an email or by installing software on their computer when they first visit
their website. It could also be installed as part of something the user chooses to
install from a website (so the user doesnt necessarily have to open an email to
become infected). Once infected, the virus would send the user to a fake website that
looks almost identical to the one they really wanted to visit. Consequently, personal
information from the users computer can picked up by the pharmer/hacker.
Certain anti-spyware, anti-virus software or anti-pharming software can be used
to identify this code and correct the corruption.
Spam
Spam is electronic junk mail and is a type of advertising from a company sent out to a
target mailing list. It is usually harmless but it can clog up the networks, slowing them
down, or fill up a users mail box. It is therefore more of a nuisance than a security risk.
Many ISPs are good at filtering out spam. In fact, some are so efficient that it is
often necessary to put legitimate email addresses into a contacts list/address book to
ensure that wanted emails are not filtered out by mistake.
66
Cookies
Cookies are small files sent to a users computer via their web browser when they
visit certain websites. They store information about the users and this data is
accessed each time they visit the website. For example:
they remember who the user is and send messages such as Welcome Daniel each
time they log onto the website
they recognise a users buying preferences; e.g. if a user buys CDs, pop ups
(adverts) related to their buying habits will appear on the users screen each time
they visit the website.
Without cookies, the web server would have no way of knowing that the user had
visited the website before.
Blogs
Blogs (which is an abbreviation for web logs) are personal internet journals where the
writer (or blogger) will type in their observations on some topic (e.g. a political view)
or even provide links to certain relevant websites. No training is needed to do this.
Blogs tend to range from minor projects where people just gossip about some
topic (such as the performance of an actor in a recent film) through to important
subjects such as politics, advertising products or raising awareness of a certain key
event taking place. However, comments made are not immune from the law and
bloggers can still be prosecuted for making offensive statements about people!
67
Wikis
The word wiki comes from a Hawaiian word meaning fast. Wikis are software
allowing users to easily create and edit web pages using any web browser. A wiki will
support hyperlinks and has very simple syntax (language rules) for creating pages.
They have often been described as web pages with an edit button. Anyone can use
wikis, which means that the content should always be treated with some caution. One
of the most common examples of a wiki is the online encyclopedia Wikipedia.
Folksonomies
Folksonomies are closely related to tagging and literally mean management of people.
Tagging is a type of social bookmarking where a user can tag any web page with words
that describe its contents. Anyone can view web pages corresponding to a specific tag.
In folksonomies, the visual representation is a tag cloud this is a sequence of words of
different sizes that represent popular tags by showing them in a larger font size. One of
the most common examples is Flickr.
68
Health aspects
Table 6.3 highlights a number of health issues, together with possible solutions to
either minimise the risk or eliminate it altogether.
Health risk
Solution
use screens that can be tilted to ensure the neck is at the correct angle
Eyestrain (caused by
staring at a computer
screen too long or bad
lighting in the room)
ensure that there is no screen flicker, since this can lead to eye problems
change to LCD screens where flicker is less of a problem than with CRT screens
take regular breaks and try focusing on a point which is some distance away
Headaches
69
Safety aspects
Table 6.4 gives a number of safety issues, together with possible solutions to
eliminate or minimise the risk.
Safety hazard
Electrocution
Fire risk
70
CHAPTER
7.1 Introduction
This chapter looks at how ICT is used in everyday life and discusses the many
advantages and drawbacks of using computer systems to replace or enhance
applications which were previously paper or manually based.
71
Multimedia presentations
Presentations using animation, video and sound/music are generally much more
interesting than a presentation done on slides or paper.
The presentations are produced using one of the many software packages on the
market and then used with a multimedia projector so that the whole audience is able
to see the presentation. Some of the advantages of this type of presentation include:
the use of sound and animation/video effects
interactive/hyperlinks built into the presentation
the fact that it is more likely to hold the audiences attention.
Some of the disadvantages include:
the need to have special equipment, which can be expensive
sometimes the requirement for internet access within the presentation, if the user
wishes to access files (e.g. music or video) from websites or up-to-date
information (e.g. weather reports) which needs a live connection.
Paper-based presentations
It is always possible to produce presentations in a hardcopy format rather than the
system described above. This has the following advantages:
Disabled people do not have to go to the venue to see the presentation.
It is possible to print it out in Braille for the benefit of blind people.
The recipient can read the presentation at any time they want.
The recipients have a permanent copy, which they can refer to at any time they want.
There are, however, disadvantages:
The presentation needs to be distributed in some way.
There are no special effects (sound, video, animation).
There are printing costs (paper, ink, etc.).
Websites
72
Rather than producing flyers and posters by printing them out, it is possible to use
websites for advertising and communication. There are a number of advantages and
disadvantages of using this technique.
Advantages include:
the ability to add sound/video/animation
links to other websites/hyperlinks
the use of hot spots
buttons to navigate/move around the website
hit counters to see who has visited the websites.
Disadvantages include:
the fact that websites can be hacked into and modified or viruses introduced
the need for a computer and internet connection
its lack of portability compared with a paper-based system
the need to maintain the website once it is set up.
Music production
The generation of music and the production of music scores can now be done by
computer systems with the appropriate software, for example:
music samplers and mixers allow the original tracks that were recorded in the
studio to be modified in any way that the producer wants
electronic instruments (like guitars and organs) can play back through electronic
effects machines
synthesisers combine simple wave forms to produce complex music creations
electronic organs can mimic any other instrument
music scores can be generated from the music itself using software
software can automatically correct music notes in a score
there is no need to understand music notation to write a music score
music notes are automatically printed out in the correct format.
Cartoon animations
Animation can be produced using computer hardware and software. With 3D
animation, objects are designed on a computer and a 3D skeleton produced. The
parts of the skeleton are moved by the animator using key frames (these frames
define the start point and end point to give a smooth animation effect). The
difference in the appearance of the skeleton in these key frames is automatically
calculated by the software and is known as tweening or morphing. The final stage
is to make a realistic image by a technique known as rendering.
Advantages
A1234
A1236
A1235
The driver does not have to consult Figure 7.3 Car position shown on a sat nav
paper maps while driving, so it is
screen
far safer.
It removes errors, as it can warn drivers about one way streets, street closures, etc.
The system can warn the driver about the location of speed cameras, again aiding
safety.
The system can estimate the time of arrival.
It is also possible to program in the fastest route, a route to avoid towns, etc.
The system can give useful information such as the location of petrol stations.
Disadvantages
If the maps are not kept up to date, they can give incorrect instructions.
Unless the system is sophisticated, road closures, due to accidents or road works,
can cause problems.
Loss of satellite signals can cause problems.
If an incorrect start point or end point is keyed in, the system will give incorrect
information.
Surveys
A
or
A
or
A
C D
Suppose a small business is interested in finding out information about the buying
habits of a number of customers. Questionnaires or surveys will be either handed
out to people or posted on a website to allow them to be filled in online. Paper
questionnaires will be filled in either by shading in circles, ticking in boxes or
connecting two points to select the correct response (see Figure 7.4).
Online questionnaires would tend to use the first option (using radio buttons)
since this is a quick and easy method for gathering data.
Paper surveys are then scanned in using optical mark recognition (OMR) or
optical character recognition (OCR) methods and the information is transferred to a
database. The advantages of doing this rather than checking each one by hand are that:
it is faster to get results
there are fewer errors
it is easier to do a statistical analysis
it is less expensive to carry out, since it needs fewer people.
Online questionnaires have the added advantage that no data preparation is needed,
as the results are sent directly to a database for analysis.
75
76
Failure to abide by these simple rules can lead to a fine and/or imprisonment to
anyone who holds data about individuals.
There are general guidelines about how to stop data being obtained unlawfully:
Dont leave personal information lying around on a desk when not being used.
Lock all filing cabinets at the end of the day or when an office is unmanned for
any length of time.
Do not leave data on a monitor if unattended or log off from a computer system
if it is to be unattended for a time.
All of the above are in addition to the number of safeguards discussed throughout
this book (such as ways to prevent hacking, phishing, pharming, etc.).
Record keeping
To evaluate the advantages of using a computer system for record keeping, we will
consider the case of a small bookshop. This shop keeps files on the books in stock
and on their customer base. Using a simple database it would be easy to keep this
information in electronic form. This would make it easy to contact customers if a
particular book was just published or to check on their buying habits. If a customer
came into the shop it would also be far easier to search for a particular book (based
on title, author or ISBN). No paper records would need to be kept which would
lead to the following advantages to the shop:
Less room would used up in the shop since no paper record would need to be kept.
It would be quicker and easier to find details of a particular book or find out
whether or not it was in stock.
The system would be less expensive, since it wouldnt be necessary to employ
somebody to do all the filing and searching.
There would be fewer errors since no manual checking of paper files would be done.
There are some disadvantages of the system:
The shop would need to buy a computer and software to run the system.
It would take a lot of time and effort to transfer all the paper files to the database.
77
Figure 7.7 A
junction controlled
by traffic lights
78
To demonstrate a more complex simulation, the following scenario has been chosen:
a set of traffic lights are to be modelled at a Y-junction, as shown in Figure 7.7.
In this simulation it is necessary to consider:
how and what data needs to be collected
how the simulation is carried out
how the system would work in real life.
Data collection
Since the success (or failure) of a simulation model depends on how realistic it is,
data needs to be collected by watching traffic for a long period of time at the
Y-junction. This is best done by using induction loop sensors which count the
number of vehicles at each junction. Manual data collection is possible but is prone
to errors and is difficult to do over an 18-hour period per day, for example. The
following data is an indication of what would need to be collected:
the number of vehicles passing the junction in all directions
the time of day for the vehicle count
how many vehicles build up at the junction at different times of the day
how vehicle movements change at weekends, bank holidays, etc.
how long it takes a vehicle to clear the junction
how long it takes the slowest vehicle to pass through the junction
the movements made by vehicles (e.g. left turns, right turns, filtering, etc.)
additional environmental factors, such as whether there are pedestrian
crossings nearby.
They are less expensive than having to build the real thing (e.g. a bridge).
On many occasions it is safer to run a simulation some real situations are
hazardous (e.g. chemical processes).
With simulations, various scenarios can be tried out in advance.
It is nearly impossible to try out some tasks in real life because of the high risk
involved or the remoteness (e.g. in outer space, under the sea, in nuclear reactors,
crash testing cars, etc.).
It is often faster to do a simulation than the real thing. Some applications could
take years before a result was known (e.g. climate change calculations, population
growth, etc.).
79
Reason
Pilot training
Environmental modelling
Space exploration
Batch processing
With batch processing, a number of tasks (jobs) are all collected together over a set
period of time. The jobs are then loaded into a computer system (known as a job
queue) and processed all at once (in a batch). Once the batch processing starts, no
user interaction is needed. This type of processing can only be done where there are
no timing constraints, i.e. files dont need to be updated immediately or a response
from the computer is not needed straight away.
A big advantage of batch processing is that the jobs can be processed when the
computer system is less busy (e.g. overnight), so the use of resources is being
optimised. Areas where batch processing is used include billing systems
(e.g. electricity, gas, water and telephone), payroll systems and processing of bank
cheques. Section 7.9 considers batch processing applications in more detail.
Turtle graphics
This is based on the computer language called LOGO and is now usually known as
turtle graphics. It is essentially the control of the movement of a turtle on a
computer screen by a number of key instructions which can be typed in. The most
common commands are given in Table 7.1. Thus, to draw the shape shown in bold
in Figure 7.8, the instructions listed in Table 7.2 need to be carried out. Note that
there are two possible sequences of instructions, which will both draw the same
shape the second option makes use of Repeat instructions and so is more efficient
in its coding.
START
END
Command
Meaning
FORWARD x
Move x cm forward
BACKWARD x
Move x cm backward
LEFT d
RIGHT d
REPEAT n
ENDREPEAT
PENUP
PENDOWN
Option 1 instructions
Option 2 instructions
Pendown
Forward 40
Pendown
Pendown
Left 90
Left 90
Left 90
Forward 20
Forward 40
Pendown
Repeat 3
Repeat 3
Right 90
Forward 20
Forward 40
Right 90
Forward 40
Right 90
Right 90
Forward 40
Right 90
Forward 40
Endrepeat
Endrepeat
Forward 40
Right 90
Forward 20
Right 90
Forward 40
Penup
Forward 20
Right 90
Left 90
Penup
Forward 40
Forward 40
Left 90
Left 90
Remember also that it was stressed in Section 5.5 that the analogue data from the
sensors needs to be converted into digital data using an analogue to digital
converter (ADC) so that the computer can understand and process the data from
the sensors. If the computer sends signals to motors, valves, etc. then this data also
needs to be converted to analogue using a digital to analogue converter (DAC) so
that the computer can effectively control these devices.
We will now consider a number of monitoring and control applications. There
are so many examples to choose from that it is important that you understand the
principle behind each process so that this can be adapted to suit other examples.
82
Sensors read key vital signs (such as pulse/heart rate, temperature, blood
pressure, respiration, etc.).
The data from the sensors is converted into digital using an ADC.
The data is stored in the computers memory.
The computer compares the data from the sensors with the values stored in its
memory.
The results are output on a screen in the form of graphs and/or digital read-outs.
An alarm is activated if any of the data is outside acceptable parameters.
The system continues to monitor the patient until the computer is turned off.
Computer
ADC
Sensors read data from the river (oxygen levels and acidity levels using a pH
sensor).
The data from the sensors is converted into digital using an ADC.
The computer stores the received data.
The oxygen levels and acidity levels are compared to the historical data stored in
memory and they are also compared to alarm levels stored in memory.
One of two things will now happen: either the data is transferred to a CD/DVD
or to a memory stick and taken away for analysis later or the computer is
connected into a mobile phone network and transmits the data back
automatically to the monitoring station.
83
humidity
too low
too high
moisture
too low
too high
Sensors taking
readings from
surroundings
ADC
Computer
too low
Devices under
computer
control
temperature
too high
DAC
pH
too low
too high
light
too low
Computer processing
7.8 Robotics
Robots are used in many areas of manufacturing, from heavy work right through to
delicate operations. Examples include paint spraying of car bodies, welding
bodywork on cars, manufacturing of microchips, manufacturing electrical goods and
automatic warehouses.
Control of robots is either through embedded microprocessors (see Section 7.3)
or linked to a computer system. Programming of the robot to do a task is generally
done in one of two ways:
The robot is programmed with a sequence of instructions which allow it to carry
out a series of tasks (e.g. spraying a car body with paint).
Alternatively, a human operator manually carries out a series of tasks and how
each task is done is relayed back to the robot (embedded processor) or
controlling computer. The sequence of instructions is remembered so that the
robot can automatically carry out each task identically each time (e.g. assembling
parts in a television).
Robots are often equipped with sensors so they can gather important information
about their surroundings. Sensors also prevent them from doing stupid things, such
as stopping a robot spraying a car if no car is present, or stopping the spraying
operation if the supply of paint has run out, etc.
Robots are very good at repetitive tasks. However, if there are many different
tasks (e.g. making specialist glassware for some scientific work) then it is often
better to still use human operators.
Advantages
Disadvantages
Robots find it difficult to do unusual tasks (e.g. one-off glassware for a chemical
company).
They replace skilled labour, leading to unemployment.
Since robots do many of the tasks once done by humans, there is a risk of de-skilling.
Because robots are independent of the skills base, factories can be moved
anywhere in the world, again causing unemployment.
85
Payroll
At the end of each pay period (usually weekly or monthly) a company needs to pay
its employees. Payroll systems are used to calculate wages and print out pay slips.
The inputs are: employee details from file (e.g. rate of pay, tax code, bank
details), number of hours worked (often obtained from a timesheet), any
overtime working, holidays, etc.
The processing done is calculation of: gross pay, any deductions (tax, national
insurance), net pay, etc.
The outputs are: printed pay slips, updating of the employee file, transfer to
Bankers Automated Clearing Service (BACS) if wages paid into a bank account, etc.
Information from
the employees file
Make back-up
copy of the files
New information
from timesheets
Output reports
and error reports
Batch
processing
Update
employees file
Output the
pay slips
Billing systems
Because companies send out their bill/invoices on a pre-determined date, all the
information is gathered together and then processed in one go (batch). Consider an
electricity billing system:
The inputs are: customer details (address), charge per kW (unit) of power,
previous readings, new readings taken from the electricity meter, bank account
details (if using direct debit), etc.
The processing done is calculation of: number of units of electricity used
(i.e. new reading minus old reading), customers cost (i.e. units used times charge
per unit), monthly payments made (if using direct debit), outstanding amount
owed or carried over to next bill, etc.
The outputs are: bill showing all the details, updating of customer file,
production of request for payment if not done through direct debit, etc.
The diagram of this process is very similar to that shown in Figure 7.11 for the
payroll system.
11
5 1 0 4 3 1 1 2 0 1 7
2
10
1 Add together the digits in the odd positions and multiply the sum by 3:
5 + 0 + 3 +1 + 0 + 7 = 16
16 3 = 48
2 Add together the digits in the even positions:
1+4+1+2+1=9
3 Add the two results together: 48 + 9 = 57
4 To find the check digit, calculate what needs to be added to 57 to make the next
multiple of 10 i.e. 60. Thus, the check digit is 3.
Hence the final code is 5 1 0 4 3 1 1 2 0 1 7 3.
Every time the barcode is read, this calculation is performed to ensure that it has
been scanned correctly.
Barcodes are used in the following applications:
library book systems (see Section 7.13)
administration systems (e.g. in hospitals)
passport and ID card systems
some burglar alarm systems
equipment checking systems (safety records on maintenance of equipment)
automatic stock control systems (described in this section).
The following description is a detailed account of how barcodes are used to control
stock levels automatically in a supermarket. Other retailers use similar systems with
only minor differences.
Barcodes are attached to all the items sold by the supermarket.
Each barcode is associated with a stock file, which contains details such as prices,
stock levels, product descriptions. The barcode acts as the primary key in the file.
A customer takes their trolley/basket to the EPOS terminal once they have
completed their shopping.
The barcode on each item is scanned at the EPOS.
If the barcode cannot be read, then the EPOS operator has to key in the number
manually.
The barcode is searched for on the stock file record by record until a match is found.
The appropriate record is accessed.
The price of the item is sent back to the EPOS, together with a product description.
The stock level for the item is found in the record and is reduced by 1.
The new stock level is written back to the file.
87
If the stock level of the item is less than or equal to the re-order/minimum stock
level then the computer automatically orders a batch of items from the suppliers.
(Supplier information would be found on another file called the order file or
supplier file the barcode would be the link between the two files.)
Once goods have been ordered, a flag is assigned to this item in the file to
indicate an order has been placed; this now prevents re-order action being
triggered every time this item is scanned before the new stock arrives.
The above procedure is repeated until all the items in the customers
basket/trolley have been scanned.
When all the items have been scanned, the customer is given an itemised bill
showing a list (with prices) of everything they have bought.
The computer updates the files containing the daily takings.
If the customer has a loyalty card, the system will also automatically update their
points total.
When new goods arrive, the barcodes on the cartons will be used to update the
stock files. Also, any flags associated with these goods will be removed so that the
stock checks can start to be made again.
Some newer supermarkets now allow customers to scan their own items at special
checkouts. These basically work in the same way as the normal EPOS terminals.
88
ROUTE SEEKERS
flight booking
Schedule
Departing 13 JUN 2009
Returning 20 JUN 2009
My flight will be
Return
at Any time
at Any time
One way
Multistop
Route
From
To
Transaction is OK.
Money is dispensed.
Although ATMS are very convenient for customers, they do have a few disadvantages:
They are often in places where theft can take place unnoticed.
Fake ATMs can be set up to gather information about the card and retain the card.
Some banks charge customers for the use of ATMs.
Someone else could see the PIN being entered and could use this to commit
fraud at a later date (also known as shoulder surfing).
89
Credcard
1234 6942 1157 7002
VALID
FROM
05/06
EXPIRES
END
09/12
VISA
Chip
Many credit cards are equipped with a chip as well as a magnetic stripe (see Figure 7.14)
this contains key information such as the PIN.
This system is designed to enhance security since it is better than relying only on
a signature. When paying for items using a chip and PIN card, a form of electronic
funds transfer (EFT) takes place. In this example, a customer pays for a meal in a
restaurant using a chip and PIN card:
The waiter inserts the card into the chip and PIN reader.
The restaurants bank contacts the customers bank.
The card is checked to see if it is valid (expiry date, whether stolen card, etc.).
If the card is stolen or expired then the transaction is terminated.
The customer enters the PIN using a keypad.
The PIN is read from the chip on the card and is compared to the one just keyed in.
If they are the same, then the transaction can proceed.
If they are different, the transaction is terminated.
A check is then made on whether they have enough funds.
If there are not enough funds available, then the transaction is terminated.
Otherwise, the transaction is authorised.
An authorisation code is sent to the restaurant.
The price of the meal is deducted from the customers account.
The same amount of money is credited to the restaurants bank account.
A receipt is produced as proof of purchase.
Exercise 7b
Indicate which of the following tasks is batch processing or online (both types).
Description
Producing a monthly payroll
Processing bank cheques at the end of the month
Using an ATM to obtain cash
Booking seats for a train journey
Monitoring a patient in an intensive care unit
Manual stock taking system done at the end of each day
Welding of a car body using a robot
A satellite navigation system
Producing and updating a dictionary or encyclopedia
Printing out mobile phone bills at the end of the month
Getting prices of items at an EPOS terminal in a
supermarket
90
Batch
Online
NAME
LIBRARY
a) 9 7 8 8 5 2 6 3 0 5 4 8 9
b)
Mr A. N. Other
H & S Library
Book title
Date
published
Number of
books
Date due
back
Borrowers number
Name of
author
Borrowers name
Borrowers details
Barcode of book
borrowed
When a borrower takes out a book, the books barcode is scanned. The book
details are then found on the book file.
The borrowers library card barcode is then scanned for the borrowers unique
number. The book file is linked to the borrowers file and both files are updated
to indicate which book has been borrowed and when it is due back.
On a daily basis, the borrowers file is interrogated by the computer to see
which books are overdue for return:
The computer reads a record from the book file.
It compares the date due back with the current date.
If the date due back is less than (or equal to) the current date (i.e. earlier
date)
using the barcode number of the book
the book file is linked to the borrowers file
and the corresponding record is read from the borrowers file.
The customer details are then found and a letter or email is automatically sent out.
The next record in the book file is then read
until the whole file has been checked.
91
Experts in the field are interviewed to find out what is needed in the expert
system.
Data is then collected from these experts.
A knowledge base (defined below) is designed and then created.
The rules base (defined below) is designed and created.
An inference engine (defined below) is designed and created.
The input screen and output format are also designed and created this is
known as the user interface.
The expert system is tested against known conditions and scenarios.
It is also checked to see if it meets the original specification.
Experts are interviewed about how effective it is before the expert system goes
out on general release.
Advantages
Disadvantages
92
Inference engine
This is software that attempts to derive answers from the knowledge base using a
form of reasoning. It is how expert systems appear to use human-like reasoning
when accessing information from the knowledge base in an effort to find a
conclusion to a given problem. The inference engine is a type of reasoning engine.
Rules base
This is made up of a series of inference rules (e.g. IF the country is in South
America AND the language used is Portuguese THEN the country must be Brazil).
These inference rules are used by the inference engine to draw conclusions. They
closely follow human-like reasoning.
93
CHAPTER
In this chapter you will learn about systems analysis and design, specifically:
the analysis stage
the design stage:
validation
verification
the development stage
the testing stage
the implementation stage, particularly changeover methods
documentation
user documentation
technical documentation
evaluation.
8.1 Introduction
A systems analysis team is often brought in to review an
existing system and suggest a number of improvements. The
existing method used may be either a manual paper-based
system or a computer-based operation that is no longer
regarded as adequate for the task.
There are many stages in systems analysis, as shown in
Figure 8.1. These are covered in Sections 8.2 to 8.7.
Analysis
Design
Implementation
Documentation
94
Description of
existing system
Description of
existing system
Description of
existing system
Description of
existing system
identify
problems
objectives
constraints
projected
costs
essential
requirements
desirable
features
development Cost-benefit
plan
analysis
boundaries
Let us now consider the first item in the analysis stage fact finding. There are four
common methods used in fact finding, which have been summarised in Table 8.1
overleaf. The methods are: observation, questionnaires, interviews and looking at
existing paperwork.
Verification
Verification is a way of preventing errors when data is copied from one medium to
another (e.g. from paper to disk/CD). There are two common ways that verification
checks are carried out:
Double entry: in this method, data is entered twice, using two different people.
The computer compares the two entries, either after data entry or during the data
entry process, and identifies any differences.
Visual check: this is the checking for errors by comparing entered data on the
screen with the data in the original document (this is not the same as proof reading).
Validation
Validation is a process where data is checked to see if it satisfies certain criteria when
input into a computer, for example to see if the data falls within accepted
boundaries. A number of validation techniques exist and Table 8.2 highlights some
of the more common ones used when writing computer software.
95
96
Involves watching personnel using the
existing system to find out exactly how it
works.
Observation
Questionnaires
Interviewing
Description
Name of method
Advantages
Disadvantages
Description
Example/s
Range check
Length check
Character/type check
Format/picture check
Limit check
Presence check
Checks if data is actually present and has not In an electronic form, a persons telephone
been missed out.
number may be a required field and if no
data is present this should give rise to an
error message.
Consistency check
Checks if fields correspond (tie up) with each If Mr has been typed into a field called title
other.
then the gender field must contain either
M or Male.
Check digit
Development stages
If the system contains files (e.g. a database) then the file structure needs to be
finalised at this stage (e.g. what type of data is being stored in each field, length of
each field, which field will be the key field, how the data files will be linked, etc.).
Once the file structure has been determined, it is then created and fully tested to
make sure it is robust when the system actually goes live.
Since it is important that the correct data is stored in files, there are certain
techniques that need to be adopted to make sure the data populating the file/s and
database/s is at least of the right type and that it conforms to certain rules. Validation
routines and verification methods (discussed in Section 8.3) are used to ensure this
happens. Again, these routines have to be fully tested to ensure they do trap
unwanted data but also to make sure any data transferred from a paper-based system
to an electronic system has been done accurately.
97
Testing strategies
Testing of each module needs to be done to ensure each one functions correctly on
its own. Once the development of each module is completed, the whole system
needs to be tested (i.e. all modules functioning together). Even though each
individual module may work satisfactorily, when they are all put together there may
be data clashes, incompatibility and memory issues, etc.
All of this may lead to a need to improve the input and output methods, file and
database structures, validation and verification methods, etc. Then the system will
need to be fully tested again. It is a very time-consuming process but the system has
to be as perfect as possible before it goes live.
Testing will use many different types of data, which will fall into one of three
categories: normal, extreme or abnormal. Let us suppose one of the fields in a
database is the date and this must be in the form dd/mm/yyyy, where each element
of the date must be numeric:
Normal: this is data which is acceptable/valid and has an expected (known)
outcome, e.g. the month can be any whole number in the range 1 to 12.
Extreme: this is data at the limits of acceptability/validity, e.g. the month can be
either of the two end values i.e. 1 or 12.
Abnormal: this is data outside the limits of acceptability/validity and should be
rejected or cause an error message. For example, all the following values are not
allowed as inputs for the month:
negative numbers (e.g. 1, 15)
any value greater than 12 (e.g. 32, 45)
letters or other non-numeric data (e.g. July)
non-integer values (e.g. 3.5, 10.75).
8.5 Implementation
98
Direct
Parallel running
Pilot implementation
Phased implementation
Description
Changeover method
If the latest part fails, it is only necessary to go back in the system to the point of
failure, hence failure is not disastrous.
It is possible to ensure the system works properly before expanding.
This is more expensive than direct changeover, since it is necessary to evaluate
each phase before moving to the next stage.
If the new system fails, only one part of the company is affected.
It is possible to train staff in one area only, which is much faster and less costly
than parallel running.
The costs are also less than parallel running, since only one part of the system is
being used in the pilot.
It is more expensive than direct changeover, since each pilot scheme needs to be
evaluated before the next stage is introduced.
If the new system fails, the old system is still available as a back-up.
It is possible to train staff gradually.
Staff have time to get used to the new system.
It is more expensive than direct changeover, since extra staff are needed to run
both systems together.
99
Relative costs
Input needed by
the user
Input needed by
systems team
Impact of failure
Direct
Low
Medium
Low*
High
Parallel
High
High
Low
Low
Pilot
Medium
Low
Medium
Low
Phased
Medium
Medium
Medium
Medium
8.6 Documentation
Once the new system is fully developed, a considerable amount of documentation
needs to be produced a) for the end user, and b) for people who may need to modify
or develop the system further at some later stage. There is some overlap between the
two types of documentation, but the basic requirements are shown below.
User documentation
User documentation is designed to help users to learn how to use the software or
system. This can consist of any of the following:
the purpose of the system/program/software package
how to log in/log out
how to load/run the software
how to save files
how to do a search
how to sort data
how to do printouts
how to add, delete or amend records
screen layouts (input)
print layouts (output)
hardware requirements
software requirements
sample runs (with test data and results)
error handling/meaning of errors
troubleshooting guide/help lines/FAQs
tutorials.
Technical documentation
Technical documentation is designed to help programmers and analysts who need
to make improvements to the system or repair/maintain the system. This can consist
of any of the following:
purpose of the system/program/software
program listing/coding
programming language used
flowchart/algorithm
100
input formats
hardware requirements
software requirements
minimum memory requirements
known bugs in the system
list of variables used (and their meaning/description)
file structures
sample runs (with test data and results)
output formats
validation rules
meaning of error messages.
8.7 Evaluation
Once a system is up and running it is necessary to do some evaluation and carry out
any maintenance, if necessary. The following is a list of some of the things
considered when evaluating how well the new system has worked. This can
ultimately lead back to a re-design of part of the system if there is strong evidence to
suggest that changes need be made. If you look back to Figure 8.1 in Section 8.1,
you will see that the evaluation stage feeds back into the design stage. To evaluate
the system, the analyst will:
compare the final solution with the original requirement
identify any limitations in the system
identify any necessary improvements that need to be made
evaluate the users responses to using the new system
compare test results from the new system with results from the old system
compare the performance of the new system with the performance of the old system
observe users performing set tasks, comparing old with new
measure the time taken to complete tasks, comparing old with new
interview users to gather responses about how well the new system works
give out questionnaires to gather responses about the ease of use of the new system.
Some results from the evaluation may require changes to either hardware or software.
Hardware may need to be updated because:
of feedback from end users
new hardware comes on the market, making change necessary
there are changes within the company which require new devices to be added or
updated.
Software may need to be updated because:
of feedback from end users
changes to the company structure or how the company works may need
modifications to the software
changes in legislation may need modifications to the software.
101