Sie sind auf Seite 1von 3

For interactive

Neale-Wade
INFORMATION
ICT Community
COMMUNICATION
revision College
exercises,
TECHNOLOGYgames and other internet links go to:
* This revision booklet offers you the key information you need to be familiar w
Introduction
*ithThe
Remember
forcourse yourtheyou
mockexam
are
andisstudying
final
worthGCSE40%
is Specification
examstheincoursework
and ICT. A (short
60% course) Information and
Communication
The
Topics
exam coversTechnology a wide range fromofAQA.
topics linked to ICT, but most questions are lin
ked &topics
The
Networks,
Applications
Data
Modelling,
ICT
Page to12
9Ð63Society
11 theSystems
transfer,
usesoftware
covered
Controlofprocessing,
&ICT
&are:
Components
Simulation
in society.
storage & security
Systems
Information
Difference
Input
Output
Storage
Basic
Key
Inputs
pointsperipherals
networking
Ðperipherals
and
devices
thebetween
Components
systems
rawanddata information
Ð that
media
inputs,is fed
storage,
andinto
dataan
processing
information
and system.
outputs Number of ways of d
oing thisÐ data
Storage via inputis stored
peripherals.
in the information system so it can be used when needed.
Can be stored temporarily (while a program is running) or more long-term via st
orage devices.
Processing Ð term used to describe the way information systems convert raw data in
to usefulÐ the
Outputs information.
visible or audible result of data processing Ð information that can be
Feedback
Think
Diagram
used.Ð p. Outputs
what
Ð 10term
is the
are difference
used made
whenviaoutputs
output
between
areperipherals
used
information
for further
and data?
inputs.
Input peripherals Ð peripherals are pieces of hardware connected to a computer. I
nput peripherals
Examples
[Manual input]
of input Keyboards,
are
peripherals
devicesconcept
that
are:keyboard,
input datatouchinto screens,
the system.mouse, keypad, microp
hone, joystick.
[Automated input] Bar code reader, OMR (Optical Mark Recognition), OCR (Optical
Character Recognition), Scanners, Infrared detectors, Pressure sensors, Light se
nsors, peripherals
Output Card readers,Ð devices MICR (Magnetic
that provide
Ink Character
information
Recognition]
in an accessible form after
data processing.
Examples
Speakers, ofPrinters
output (Inkjet,
peripherals Dotare:
matrix, Thermal, Laser), VDU / Monitor, Plotters
, Motors
Some
Also
Storage
Backing devices
EPOS
EFTPOS
Media
devices
storage
terminals
areis
terminals
and
both used
Media
-input
ÐElectronic
toElectronic
keep
and data
output:
Point
Funds
or programs.
ofTransfer
Sale Backing
at the storage
Point ofdevices
Sale are th
e hardware peripherals used to store data. These devices write data onto backin
g storage
Hard Disksmedia Ð usually
and read builtitinto
back.the computer itself, usually storing the operating
Floppy
system,Disks applications
Ð removable andstorage.
the userÕsRelatively
data. small amount of data generally 1.44
megabytesÐ Compact
CD-ROMS and slowDisk-Read-Only
access times. Memory Can beÐwritten
read bytolaser
manybeams
times.in the CD Drive. Hold
over 600 megabytes of data and much quicker to access than a floppy disk. Norm
ally DVDs
Also write(Digital
once, read Versatile
many, although
Disks) and someZIPCD-Roms
drivesare
(high-capacity
re-writable.removable disk
s similar
Basic
LANs
WANs
Workstation
Server Ðnetworking
Local
ÐWide
computer
toÐArea
floppy
Area
PC on
Networks
Networks
where
adisks)
network.
shared
ÐÐcover
computers
datadifferent
files
on and
onesites.
site.
software are stored. Some networks
have many servers.
Advantages of networks Examples
Ð sharing
include
of information,
file server,easy web communication,
server and e-mailexpensive
server.per
ipherals (e.g. colour laser printers) can be shared, central installation of sof
tware makes upgrades
Disadvantages of networks easierÐ can
+ allow
be expensive
tight control
to setover
up,data.
vulnerable to security pro
blems, vulnerable to server crashes, complex networks require a network manage t
o keep it Ðrunning.
Passwords usernames and passwords allow users to log onto their files. Yet user
s much change their passwords frequently to prevent access by someone who has di
scovered the password and to reduce the chances of someone discovering the passw
Data security on networks Ð by limited access rights of the network to certain use
ord.
rs, restricting the physical access to the network, using virus scanners, making
sure important files are read-only, making regular back-ups and using a firewal
l to prevent intruders from the Internet.
Applications
Function
The
Database
Word
Charts
Spreadsheets
Desk
Web
Graphics
Drawing
Key
Software
types
design
points
processing
top ofofprograms
management
Ðpublishing
applications
softwarethat are
applications software
software
run onwithin
used
computer
the systems.
system Two types of software Ð opera
ting systems
Operating
Applications Systems
Ðandperform
applications
Ð controls
real-world
the hardware
jobs thatandpeople
run the
wantapplications
to do i.e. Word Processing
, Spreadsheets, DTP, Computer Aided Design, Databases, Web design. ÒSoftware desi
gned to do a useful
Word-processors Ð allow job users
for peopleÓ.
to enter, edit and save text. Useful when a lot of
text needs Ðtofunction
Mail-Merge be entered of aorword-processor
when high quality allowing
presentation
you to send,
is needed.
for example, a sta
ndard letter to many people. Fields are set up for variable data. These fields
are filled by merging with a data source Ð for example the Wordprocessor gets the
Also
namesWord-processors
and
Spell
Cut, addresses
Copy
Checkandhavefrom
Pastemore
a database.
advanced features: Graphics capabilities, tables,
Database
styles, management
indexes, templates Ð databases
and are
hyperlinks.
organised collections of data stored on a comp
uter system. Databases are created and managed with Database Management systems
Tables
Rows
Columns
Field
(DBMS) Ðnames
ÐÐdata
records
fields
Ð titles
is stored forinthetables
different records e.g. if the records were ÔMr JonesÕ, Õ28
yearsfield
Key
Queries
Reports
Forms ÐoldÕ,
Ð printed
screen
- unique
questioning
theobjects
fieldnames
output
field
the
that
that
from
database
would
make
aidentifies
database
beÐÔNameÕ,
entering
extracting
aand
record
ÔAgeÕ.
retrieving
exactly what
datainformation
easier. Often
is required
calle
d a Ôuser interfaceÕ for a database. When designing a form, you need to consider wh
at informationÐ spreadsheets
Spreadsheets the database are requires.
designed to perform calculations. Data and calcul
ationsTopcan
Desk Columns
Graphs
Validation
Publishing
be set/and
Charts
upÐRows
(DTP)
checks
to Ðmodel
column,
Ð to
useful
situations
ensure
bar,
forcorrect
line,
producing
suchpiedata
asDiagram
Ðleaflets,
a entry
think
company
p.and
when
budget
books,
34calculation
eachnewspapers
is best used.
and a
dvertisements.
Advantages Ð imagesCan can alsobebepositioned
used to createand shaped
simplemore
websites.
accurately than with a Wordp
Graphics software Ð used to create and manipulate images. Used for drawings and d
rocessor.
iagrams, creating and editing web elements such as buttons, editing pre-existing
Clip
images Artsuch Ð prepared
as thoseimagesscannedthatincan
or beproduced
inserted by to
digital
allowcameras.
people who are not artist
s to includeÐ where
Bit-mapped professional-looking
pictures are represented
images in as their
a set
work.
of dots. Each dot is stored
separately in a file. If enlarged, the dots simply get bigger producing a jagge
d image. Can be very large files unless compressed (made smaller) e.g. .gif or
.jpg format.
Vector Ð images as mathematical instructions. Vector graphics have smaller file s
izes and smooth rescaling. When resized no jagged images are visible. However,
Web
complicated
design software
images Ðsuchusedastophoto
createimages
webpages.
do not Similar
convert to word
Vectorprocessors,
images easily.
web de
sign software allow users to create HTML (Hyper-text markup language) files to u
pload to the internet.
Presentational software Ð slideshow makers / creators that allow users to present
graphics
Think Ð whatand are
textexamples
for presentations.
of all these different types of application software?
Gathering
Storing
Processing
Security
Key
Data points
transfer
preparation
data
data
data Ð data needs to be ÔtidyÕ. Computers are much better at processing d
ata that
Forms Ð usedis organised
to input data
logically
Ð paperandforms
consistently.
are used to collect data whereas screen for
ms are for Ða checking
Verification
Validation Ðcomputer
checkingof
operator
that
datadata
attothe
use.time of
entered intoinput
a computer
Ð checksystem
carriedisabout
accurate.
by the soft
ware toprocessing
Batch
Direct (Random)
make sureAccess
Ðthe
collection
data
FilesisÐofreasonable.
where
datarecords
over a are
period,
not stored
followedonelater
afterbyanother,
processing
sto
red on Access
Serial disk. FilesAllowsÐforwhereimmediate
one recordaccess.
is stored after another Ð usually stored on t
ape. Can
Output Ð cantakebeainlong
manytime
forms.
to search
Can bethrough.
signals to devices such as heaters, lights
(e.g. traffic lights) or motors (e.g. washing machine). Usually output is somet
hing of
Form visual
outputsuchÐ factual
as via ainformation
screen or oncanpaper.
be displayed as text, tables, diagrams an
d graphs. data loss Ð data can be lost or damaged by hardware failure such as a d
Accidental
amaged disk drive, software and management problems such as bugs or failed ÔsavesÕ,
operator Ðerror
Security datasuch
is soasimportant
accidentaltodeletions
most businesses
or disasters
that great
such care
as fires.
must be taken o
f it. Loss
Dealing withorviruses
corruption
Ð preventing
of data access
could threaten
via floppy
an disks,
entire scan
organisation.
incoming e-mails w
ith an upuptoÐ an
Backing dateorganisation
virus checker. needs to keep backup copies of its important data. S
ervers are usually backed up to tape on a regular basis. Online-backup and (for
Data
smallencryption
jobs) floppy Ð data
diskcanbackups
be madearemorealsosecure
used.through encryption Ð where it is disg
uised to-prevent
Malicious
Hacking Acts Ð authorised
unauthorised accessing
accessof files. Can be prevented by correctly set-up
security and Firewalls (hardware or software programs designed to prevent access
Viruses
to the -network
computer or programs
PC) written by malicious or maladjusted individuals desi
gned to damage files or disk drives. Can be prevented through the use of Virus
Checkers and
Malicious Employees
FirewallsÐ employees who work in IT sometimes cause deliberate damage t
o files and network configurations because of grievances.
Modelling,
Computer
Modelling
Control
Data-logging
Key
Simulation
Modelpoints
Ð when
software
models
software
Control
a real-life
& Simulation
situation is represented by computer software. Models ar
e useful forofmaking
Advantages using Models
predictions
Ð muchÐ cheaper
calculations
than using
based real
on rules
items,
andresults
data. can be ob
tained more quickly
Disadvantages of usingthanModels
in real-life,
Ð it is raredangerous
for theexperiments
exact rulescanandbedata
simulated.
to be perf
ectly known. Predictions based on models are only approximations i.e. they can
go wrong!Ð flight simulators, games, science experiments, weather forecasting, eco
Examples
nomic models
Modelling software
and virtual
Ð software
reality.
written for very specific modelling purposes such as
Data-Logging
Examples
for monitoring
Ð climatic
Ð using
Formula
data
a computer
1over
racing
a long
tocars.
collect
period,data
temperature
Ð ideal for
changes
scientific
duringexperiments
a chemical
Data-logging
process, radiationis usefuloutput
because
fromisa itstar,
automated,
gases produced
accurate,
during
allows
photosynthesis.
for data to be
collected over long or short periods of time, allows data to be stored for later
Sensors
analysisÐ input
and graphs
devices
caninbeboth
plotted
dataautomatically.
logging and control applications. Convert phy
sical quantities
Sampling Examples
intervalsÐinto
pressure,
Ð the
electrical
timeinfra-red,
thevoltages.
computer
thermistors,
is set to pHcollect
sensors
data.
and many
The time
moreÉinter
val is the time between each collection of data. It is important to select a se
nsible time
Computer control
interval.
Ð computers can be connected to output devices that carry out act
ions. TheProcessing
Real-time computer software
Ð where processing
makes decisionsof incoming
based ondata
theisinputs
immediate.
from sensors.
For exampl
e: Traffic lights Ð input = car passes over wires buried in road, action = lights
ICT points
change.
Growth
Data
Communications
Heath
The
Key
Information
and
Data
misuse
and
ofsociety
Protection
information
safety
systems Act
technology inand
society
has its
created
effectsan entire
on society
new industry. Many thousands of pe
opleÐnow
ICT
Examples
Information
makejobs
of their
created:
Communication
livingProgrammers,
directly
Technology
in Systems
the IT world.
Managers, Technicians, Consultant
s, Data Processing Staff, Network Designers, Network Managers, Web Designers, Te
chnical
New industries:
authors.Mobile Telecommunications, ATM (Automatic Teller Machines Ð cash m
achines which rely on online checks to validate requests) and many companies hav
e arisen
Old / Changed
becausejobs:
of Many
the Internet.
traditional jobs have disappeared with less demand for
manual labour. Typesetters (used to set out newspapers) and some factory worker
s (replaced
Changed jobs:byMost
morejobs
ÔreliableÕ
have changed
robots).as a result of computers. For example secr
etaries can use office software, shop assistants scan bar codes and police use d
atabases to track
Teleworking: Computers
criminals.
and computer
ICT hascommunication
had an enormoushaveimpact
made working
on society.
from home a
Advantages: less travel, working hours to suit the individual, no need to live n
possibility.
ear the work place,
Disadvantages: Less social
savingscontact,
of expensive
a suitable
officeroom
space.
has to be found at home, lik
elihood
EPOS
EFTPOS
CreditÐ cards
ÐElectronic
ofElectronic
interruptions
Ð allow
Point
Funds
theofholder
orTransfer
Sale
distractions
to borrow
at Pointfrom
money
offamily.
Sale
when making a purchase and settle
up later.
Debit cards Ð transfer money that is already in someoneÕs bank account to settle a b
ÔCashless societyÕ Ð some people thing that eventually few transactions will be in cas
ill.
h. Smart cards will allow you to charge them up with money and use them for sma
ll transactions. However, some people prefer to use money, some people may not
be able to obtain bank accounts or credit and small transactions are often only
possibleandthrough
Health Safetycash.
Ð people who use computers can suffer from health problems. Som
e issues areunder
Legislation only the
now Health
appearing andbecause
Safety atcomputer
Work Act
use(together
has grownwith
so rapidly.
European Dire
Stress Ðcovers
ctives) job security
some ofthreatened
these problems.
by introduction of new computer systems, worry ab
out coping with new technology and ways of working. Information overload where
users areand
Muscular pressurised
Joint problems
to produce
Ð Repetitive
more andStrain
more information.
Injury (RSI) pains resulting from
carrying out an activity repeatedly. Posture Ð people who spend a long time sitti
ng at aissues
Safety PC needsÐ computers
to ensureare theyoften
are insitting
control
correctly.
of situations that are potentially
hazardous to people. These systems are designed to be fail-safe. Include aircr
aft navigation,
Visual problems ÐAirEyestrain,
Traffic Control,
leading toNuclear
headaches
powerand
stations.
discomfort. Flicker effect
of screens can trigger headaches. Offices sometimes have lighting conditions th
at make reading
Remedies Ð anti-glare
the screen
screens,
difficult.
larger, higher resolution monitors (more comfortabl
e to look
Safety issues
at),atcorrect
work Ðpositioning
Electrical equipment,
of monitors,riskregular
of electric
eye-tests
shock,
for trailing
employees.lea
ds can beÐ computers
Privacy tripped over.make it easier for people to access information. For any part
icular person there is a huge amount of data stored on many databases. Privacy
concerns include where organisations with data use the information for direct ma
rketing,ofcriminals
Misuse computers/athackers
work Ðcanemployees
find private
can abuse
information
computerabout
resources
people.
by playing ga
mes when they should be working, by installing illegal software, by viewing Ôquest
ionableÕ websites, circulating offensive or irrelevant material via company e-mail
. Many
Data Protection
companiesActhaveÐ 1984
a code
(revised
of conduct
1988)toActdeal
designed
with such
to cover
matters.
storage of persona
l datasubject
Data on computer
Ð an individual
systems. who is the subject of stored data. Data subjects hav
e rights
Details
Data
Personal
mustofdata
under
not
Datamust
bethe
Protection
acquired
DatabeProtection
not and
passed
Act:processed
toAct.
otherunlawfully.
organisations without the consent of t
he data
Personal
Suitable
Data mustsubject.
shoulddata
measures
only
beshould
be must
the used
minimum
bebe
for
accurate
taken
a specific
required
toandensure
for
uppurpose.
tothe
the date.
purpose
safetyand
of must
personal
not be
data.
kept longer
than islegislation
Other reasonable.includes: Computer Misuse Act (1990) and The Copyright, Design
s and14Patents Act (1989).
Page

Das könnte Ihnen auch gefallen