Beruflich Dokumente
Kultur Dokumente
June 2010
MIHIR KHUBCHANDANI
Section 1:
1. Hardware and Software:
Hardware is the physical component s that makes up a computer
system, for example the keyboard, mouse, and monitor. Software is
the general programs that control the computer system. There are
two types of software: Systems software are programs that allow
the hardware to run properly and applications software are
programs that allow the user to do specific tasks.
2. Main components of a computer System:
A typical computer system consists of hardware, software, and
processors. Processors contain the CPU, internal hard disk, the RAM
and the ROM.
RAM
Temporary storage
Volatile
ROM
3. Operating Systems:
Command Line Interface: The user must type in instructions to choose
from the possible options. Therefore, the user must be fluent with the
command language. This is also a slow way of entering data. However, the
advantage of this is that the user has direct communication with the
computer, and does not have be restricted to the options shown.
Graphical User Interface: GUI allows the user to interact with the
computer, where the lists are all displayed as icons. Once the item is
selected, the system then automatically carries out the required
instructions. This is easy to use, and is faster, but is restricted.
4. Types of computer:
PC/Desktop Computer
Laptops
Netbooks
PDAs
Mainframes
Not portable
Many wires are needed
Easy to lose/Steal
Awkward to use the
keyboard and mouse
No heat dissipation
No optical drives
Same as that of a
laptop
Can be used anywhere Hard to enter text
Lightweight
quickly
Very Fast
Expensive
Large memory
Large space needed.
Section 2:
1. Input devices:
Keyboards
Numeric
Keypads
Mice
Touchpads
Trackerballs
Remote Control
Joysticks
Touch screens
Magnetic Stripe
Readers
Smart Card
Readers
Chip and PIN
Scanner
Barcodes
OMR
OCR
MICR
Faster
Small
Fast
No need for a surface
Easy for disabled
Accurate
Takes up less space
Allows wireless control
3D
Easy to use
Fastest entry
Easy to use
Tamper proof
Fast
Error-free
Secure data
Reduces the need for
carrying cash
Secure data
Secure
Robust
Fast and accurate
Recovery of damaged
files
Error-free
Fast
EFTPOS
Fast
Accurate
****
Security
Error-Proof
Small keys
Order of numbers isnt
intuitive
Not so robust
Needs a flat surface
Harder to use
Less flexibility
Expensive
May need training
Signal blockages
Harder compared to a
mouse
Limited number of options
Gets dirty
Needs to be in contact
Not human readable
Expensive
Barcodes can be swapped
by customers
Forms must be carefully
designed
Cannot read handwriting
Not so accurate
Expensive
Specific characters only are
readable
Cameras
Webcams
Microphones
Sensors
Graphics Tablet
Easier to use
Cheaper
Stores more
Video conferencing
Fastest
Safer
Accurate
Continuous readings
Automatic
Flexibility
Accurate
No artistry
Needs computer knowledge
Poor quality
Takes up memory
Not so accurate
Can go faulty
Expensive
Not good as a pointing
device
2. Output Devices:
CRT Monitor
High Quality
Work with light pens
TFT Monitor
Light
No glare
Less power used
Laser Printers
Inkjet Printer
Dot Matrix
Printer
Plotters
Speakers
Projectors
Fast
Large volume
Quality
High Quality
Cheaper
Lightweight
Carbon copies
Continuous stationery
Cheap
Large sizes
High quality
Accurate
Allows presentations
Heavy
Become hot
Flicker
Not as good definition
Not good for more than one
user
No use for light pens
Expensive
Ozone produced
Slow
Ink cartridges run out fast
Noisy
Costly to buy
Slow and poor quality
Slow
Expensive
Fuzzy
Need to turn off the lights
Expensive
Section 3:
1. Backing up Data: Backing up refers to the copying of files and data to a
different medium. This is to prevent the loss of data through hacking,
physical conditions (such as a fire), and so that duplicates can be
worked on elsewhere.
2. Types of access:
Serial Access: The data is read from the beginning and then
each piece of data is read until the required file is found. This
is used in batch processing systems, and is relatively slow.
Magnetic Tapes
CD-ROM/DVD-ROM
CD-R/DVD-R
CD-RW/DVD-RW
DVD-RAM
Blu-ray Disks
Pen Drives
Very fast
Very large memory
space
Fast
Can be used for file
transfer
Can be reused
Low cost
Easily damaged
No portability
Easily damaged
Cheap
Robust
Fast
Stores more data than Slower than hard disks
Floppy
Cheaper than hard
disk
Cheaper
Not reusable
Becomes a ROM
Not compatible with all
drives
Reusable
Data could be
Not as wasteful
overwritten by accident
Expensive
Long life
Not as compatible
Fast
Expensive
No need to burn
Large memory
Large storage
Expensive
Fast
Encryption
requirements
Compact
Easy to lose
Robust
No file protection
Large file space
Portable
Fast
Robust
Compact
Large memory
Expensive
Needs a memory card
reader drive.
Section 4:
1. Common types of network:
Local Area Networks: This is a network within one building. A LAN
consists of many computers and devices connected to hubs or
switches, which are connected to a router to allow the LAN to have
access to a WAN. The advantage of this is the sharing of resources,
communication amongst the users, and there is a single network
administrator to control the network. However, viruses spread easily,
printer queues develop, access is slow, and if the server crashes, then
the network fails.
Section 5:
1. Types of data:
Boolean: This data has only two values: true or false. This works for yes
and no questions.
Section 6:
1. Software copyright: This is the protection authors and publishers have
regarding the use of their software. In this sense, the software cannot be
copied and resold, used in numerous computers, rented, or reused.
2. Viruses and Hacking: A Virus is a program that replicates itself and causes
harm on a computer system, causing the system to crash, files to be lost,
and data to be corrupted. Viruses can be prevented by using antivirus
software, prevention of illegal items, and use of firewalls. Hacking is the
act of gaining access to a computer system or network without
authorization.
3. The effects of ICT on society:
Impact on employment: ICT has led to unemployment in factories,
warehouses, and labor intensive jobs
Some jobs have also been created with ICT, such as computer technicians.
Other workers needed to be retrained, and all manual work is now done by
robots. Now, fewer employees are needed, productivity improves, and
quality and convenience are improved.
Banking and Shopping: There has been a surge in the usage of online
shopping and online banking, meaning that more employees are needed
in this area. More people stay home to shop or bank, which means money
is saved, shops can explore a wider market, disabled and elderly find it
easier, and jobs can be done 24/7, and also, time can be put to better use.
However, there is less interaction, there are security issues, there is no
help from sales staff, and new business are growing from outside the town.
Microprocessors: These are mini CPUs, which help make human life easier.
They are divided into two categories, labour saving devices, and other
Health
Back and neck strain
RSI
Eyestrain
Headaches
Dry Skin and respiratory
problems due to printers fumes
Safety
Electrocution
Trailing wires
Falling Equipment
Fire
Section 7.1
1. Communications Applications:
Multimedia presentations: This is the usage of presentation software to
create a presentation with animations, video and sound. These can also
have interactive buttons and are more eye catching .However, this needs
special software and equipment.
Printed Presentation: Hard copies of the presentation are supplied to the
audience. This makes it easier to remember, allows note taking, and helps
those who cannot leave home. But this is expensive and is plain and
bland.
Flyers and Posters: These are made with DTP. These can be colorful, and
printed in mass, and look very professional.
Websites: This is a great way to advertise, as it allows anything to be
done, and can combine sounds, videos, hyperlinks, and buttons to make it
attractive and lasting and accessible.
2. Satellite Communications:
Mobile Networks: Mobile phones communicate with each other over wide
networks, using towers to transmit data. Each tower provides service up to
a certain range, then the next tower takes over.
Embedded Web Technology: This is an online service that allows
communication with devices such as alarms at home.
Global Positioning System: This shows the users exact location.
3. Data Handling:
Surveys can be carried out using OCR and OMR, and also could be online.
Recording can be direct to a database, and this also allows for mail merge.
4. Modelling and Simulations:
A simulation is the creation of a model of a real life scenario in order to
study the behavior of the scenario. This is then used to predict the
outcomes in real life, thus saving time, money and energy.
Section 7.2
1. Types of Processing:
Batch Processing: In this, a number of tasks are all collected over a period
of time and then are processed together in one batch. This works where
there is no real time constraints. The advantage of this is that since the
computer is not constantly working, there is now resource wastage.
Real Time Processing: This is an example of online processing. In this, the
computer responds to the situation immediately.
2. Control Applications:
Turtle Graphics: This is based on the LOGO computer language, and is a
way to experiment different instructions to see the behavior of the floor
turtle.
Sensors Applications: There are two types of control applications, Timed
and Monitored. In monitored events, the computer reviews the sensor data
and updates its files, and can give a warning signal if the readings are out
of the requirements. In control applications, the computer again does take
frequent readings, and if the readings are not correct, it takes action to
rectify the readings. Monitoring is used in hospitals, for alarm systems,
and in environmental systems. Control is used for traffic lights,
greenhouses, and for central heating.
3. Robotics: Robots are used in many areas of manufacturing, for heavy work
or even delicate operations. These robots have sensors, which help to
4.
5.
6.
7.
Section 8:
1. Analysis:
Collecting data, using interviews, observation, examining existing system
work, and sending out questionnaires
Identifying problems with the system
Identifying the objectives
Producing a cost benefit analysis and a data flow diagram
2. Design:
In this, key parts of the system are design, such as the screen layout,
input forms, reports, flowcharts, verification methods, and etc.
Checks
Checks
Checks
Checks
met
Checks
Checks
Checks
3. Development and Testing: Development allows for the file structures, user
interface, validation routines, and hardware to be made. Testing uses
different test data to check the system works.
o Normal: Within the range
o Extreme: Maximum and Minimum of the range
o Live: Outside the range
4. Implementation:
Direct Changeover: Immediate switch off ad switch on
Parallel Implementation: When both systems are used for a while
Pilot Running: Its implemented one phase and one office at a time
Phased Implementation: Implemented in pieces.
5. Documentation:
User
Purpose of system
Logging in and out
How tos
Screen layout
Error screens
FAQs
Sample Runs
Technical
Program Coding
Validation Routines
Flowcharts
Input formats
File structures
Outputs
List of variables.
6. Evaluation: The system is compared with the brief, limitations are found,
improvements are identified, and the responses are checked.