R001 - Amazon S3



|Year 11 |

|R001 |

|ICT |

|Theory Content |R001- Understanding computer systems |

| |LO1 |

| |Hardware devices –portable & non-portable |

| |Input/output devices |

| |System software |

| |Application software |

| |Storage and connectivity of devices |

| |Assistive technology |

| |Using Technology to monitor and track |

| |LO2 |

| |Data capture methods |

| |File formats |

| |Validation and verification |

| |Data storage and transfer |

| |Back-ups and recovery systems |

| |LO3 |

| |Business communications |

| |Diary management software |

| |Collaborative documents |

| |LO4 |

| |Moral and ethical issues of using ICT in business |

| |Computer use legislation |

| |the implications and consequences of data loss, corruption and theft |

| |Threats to the security of data; |

| |Using automatic and manual updating facilities for operating systems and security software |

|Useful Websites/resources |egaict. |

| |teach- |

| |BBC Bitesize |

| |Teaching notes on The S Drive (student on EGA area) |

| |Notes in your exercise books |

Revision Tips

What are some good methods to use??

• Revise, Revise, Revise

• Revise with a friend and test your self

• Do practice papers/questions then compare your answers to the mark scheme

• Create flash cards for key definitions, include images

• Do a little revision, often (30 minutes a day)

• Download the Cambridge Nationals Revision app for Iphone and Android

Tips for the long answer question

1. Always give both sides of the argument (for and against)

2. Aim to give at least 2- 3 points for each side

3. Use full sentences, even if you have a bulleted list

4. Use some relevant ICT key terms

Spotting Key words and what they mean

• State- simply give the answer

• List – no need for a paragraph or full sentences. Make a list of the answers

• Describe- Say what the answer is and describe by giving an example

• Explain – Use the PEE (Point, Evidence, and Explain) process

Tips for completing the paper

• Answer ALL questions

• Read each question at least twice

• Look at the number of marks allocated to the question and make sure you at least give the same number if matching points

• Answer the questions you know first, then go back to the ones you are not quite sure about

• Do not leave any blank spaces

|Cambridge Nationals in ICT Unit 1 – “Understanding Computer Systems” Pre-release topics |

|Most likely topics are highlighted in green |

|Topic |Understood? |Maybe… |Need to revise |

|LO1 – UNDERSTAND HOW ICT CAN BE USED TO MEET BUSINESS NEEDS |

|1 How ICT is used by individuals and businesses |

|How ICT is used | | | |

|The difference between desktop and portable systems | | | |

|Portable computer systems | | | |

|Advantages and disadvantages of different types of computer system | | | |

|Input devices | | | |

|Output devices | | | |

|Storage devices | | | |

|Connectivity devices | | | |

|Choosing and configuring systems | | | |

|Using computer systems and devices for remote working | | | |

|System software | | | |

|Application software (revise database software in particular) | | | |

|2 Factors affecting the choice of system |

|How various factors affect the choice of a computer system | | | |

|3 Connecting peripherals to a computer systems |

|Connecting computer peripherals | | | |

|4 Connecting to a wireless network |

|Connecting devices to wireless networks | | | |

|Remote access to networks | | | |

|5 Monitoring of employees by organisations |

|Monitoring employees | | | |

|LO2 – KNOW HOW TO WORK WITH INFORMATION AND DATA TO MEET SPECIFIED BUSINESS NEEDS |

|1 Data capture methods |

|Data | | | |

|How data is captured | | | |

|Paper forms and online forms | | | |

|Automated data capture | | | |

|Topic |Understood? |Maybe… |Need to revise |

|2 Storing data |

|File formats (revise open file formats and pdf document file format in particular) | | | |

|Data security | | | |

|3 Data transfer |

|Data transferring technologies | | | |

|Factors affecting the choice of data transfer methods | | | |

|4 Backups and recovery |

|Backups | | | |

|Factors affecting the choice of backup method | | | |

|LO3 – KNOW HOW ICT CAN BE USED TO SUPPORT BUSINESS WORKING PRACTICES |

|1 How businesses can communicate with employees and others working remotely |

|Communication methods and how they support businesses | | | |

|Advantages and disadvantages of communication methods | | | |

|Email and email etiquette | | | |

|2 How diary management software can be used to organise work schedules |

|Diary management software (DMS) | | | |

|3 Creating and editing documents collaboratively |

|Creating and editing documents collaboratively | | | |

|LO4 – UNDERSTAND HOW LEGAL, ETHICAL, SAFETY AND SECURITY ISSUES AFFECT HOW COMPUTERS SHOULD BE USED |

|1 How legislation affects business computer users |

|Computing legislation and the CMA | | | |

|Health and safety legislation | | | |

|The Data Protection Act (DPA) | | | |

|The Copyright, Designs and Patents Act | | | |

|2 How moral and ethical issues affect business computer users |

|Personal data and cyber bullying | | | |

|Monitoring of individuals by organisations | | | |

|3 The implications and consequences for organisations of data loss, corruption and theft |

|Data loss, corruption and theft | | | |

|4 Threats to data security |

|Threats to data security | | | |

|Actions to minimise risks | | | |

|Automatic and manual updating facilities for operating systems and security software | | | |

LO1: Understanding how ICT can be used to meet business needs

Hardware devices –portable & non-portable (desktop Computer systems)

Desktop computer systems are usually found in office environments. They are usually to large and heavy to move from place to place.

Portable devices are computer devices that allow you to work on the go. They tend to be small and lightweight; easy to carry around.

Examples include:

– Laptops

– Netbooks

– Mobile phones

– Tablets (I pad, Android Tablet)

– handheld consoles (PSPs)

– Media players (e.g. iPods, mp3 or video players)

Features of some portable devices

[pic]

Input/Output/Storage/connectivity devices

INPUT DEVICES- allow you to enter data into a computer system

OUTPUT DEVICES- allow you to get information from a computer system

STORAGE DEVICES- These allow you to save work created on a computer system

CONNECTIVITY DEVICES- These allow computer system to connect up to a network such as the Internet

Below is a table that shows you some examples of devices that come under each category

|INPPUT |OUTPUT |STORAGE |Connectivity |

|Keyboard |printer |CD R/CD RW |Modem |

|Mouse |Monitor/screen |DVD R/ DVD RW |Router |

|Microphone |touchscreen |USB Drive |Wireless Router |

|Webcam |speakers |Desktop Hard Drive |Wi-Fi dongle/Wireless NIC |

|Joystick |headphones |External Hard Drive |Network Card (NIC) |

|Game controller |Projector |SD card |Switch |

|touchscreen |Interactive whiteboard |Floppy Disk* |Wireless Access Point (WAP) |

|Touch screen stylus/pen |Graph Plotter |Magnetic Tape | |

|Scanner |Laser Cutter |Solid Sate Drive | |

|Key pad | | | |

|Touch pad | | | |

|Specialist keyboards (braille) | | | |

|Remote controls | | | |

|Bar code reader/scanner | | | |

|Chip and Pin reader | | | |

|Magnetic Strip reader | | | |

|MIDI (connects musical instruments to | | | |

|computer systems using specialists interface)| | | |

|Camera | | | |

|sensors | | | |

Tip: Can you find any other INPUT/OUTPUT or STORAGE devices?

More examples with images

[pic]

[pic]

Storage and connectivity of devices

Storage capacity: how much space a storage device has available

Different storage devices use different methods to save data. The Four main methods are

• Optical : CD , DVD , Blu-Ray

• Magnetic: magnetic tape, floppy disks, cassettes, some desktop hard drives

• Solid State (no moving parts!!): USB, SD cards

• Cloud Storage: google drop box, I cloud, sky drive

Peripheral devices

A computer peripheral is a device that is connected to a computer system but is not part of the computer system itself/ examples include printers, scanners, cameras, etc.

|Wired peripheral |Wireless peripheral |

|USB (universal serial bus) cable: allows fast data transfer |Wi-Fi- no physical cabling needed, easy to transfer but can be slow, can have |

| |large bandwidth |

|Firewire: high speed connection similar to USB. More expensive and less popular|Bluetooth- requires devices to be paired and use a password key; low bandwidth |

| |so can send limited amounts of data |

| |Infrared- need devices to be very close, usually 1 metre |

Connecting to a wireless network

You need a network name [SSID: Service Set Identifier] and a password [network key/security key]

Assistive technology: another word for this is Accessibility

This is when computer systems are adapted in a way that would allow users with a physical disability to use them

Assistive Technologies come under two categories

– Devices

– Software and software settings

Accessibility Devices

[pic]

Accessibility Software

[pic]

Software

Most business would run some sort of

1. Operating System

2. A range of Application software

They can choose to use one of two types of software

1. Paid for software e.g. windows, Microsoft Office Suit

2. Free/open Source software e.g. Linux

System Software

System software refers to the operating system and all utility programs that manage a computer.

Types of System Software

• Operating System

– (Windows, Mac OSX, Android etc.)

• Utility Software

– Anti-Virus Software

– Disk Cleaners

– File Managers

– Screensavers

– Disk defragmenters

– File encryption software

– Backup Software

– Archiving Software

• Drivers and Firmware

Application software

Application software is software that causes a computer to perform useful tasks beyond the running of the computer itself. Software applications are often called programs, applications or apps.

Types of Application software

• Word processors

• Desktop publishing software

• Spreadsheets

• Database management software

• Multimedia software

• Gaming software

• Web browsers

• Apps for portable devices

• Presentation software

• Photo-editing software

• Video-editing software

• Graphics manipulation software

• Communications software

• Social networking

• Chat rooms

• Instant messaging

• Email

• File transfer/file sharing

Choosing a computer system

The computer systems that large businesses and organisations choose for their employees are crucial. The following four factors affect these choices

1. Cost: too cheap or too expensive

2. Availability: can you get more of the same if you need it?

3. Suitability for user needs: will it be used in an office of on the go?

4. Data security: how easy is it to keep your data secure on this system

Configuring computer systems

These types of computers will have

• A suitable sized monitor that is adjustable

• Ergonomic keyboards suitable for long periods of typing

• A mouse

• Large and fast Hard disk capacity

• DVD.CD rewriter to load software and make backups/archives

• Ability to connect to the network and Internet (network card)

• Suitable desk space to hold all components

Software in offices can be configured in the following ways

• Changing the language

• Adjusting time and date

• Adjusting the screen resolution (useful for some visual impairments, dyslexics and colour blindness

• The size and colour of text on screen

• The arrangement of icons or window displays

• Enlarging/zooming in on sections f the screen

• Audible warnings- text to speech and speech to text

Monitoring an tracking

Many companied use different technologies to track both their employees and company owned devices/vehicles.

GPS – Global Positioning system. Uses four satellites for accurate positioning. Each satellite receives signals from the device that is used to calculate the position on the earth’s surface.

Electronic Tagging- uses a device that is monitored by a base unit. The base unit alerts authorities if the tag goes out of range

RFID- radio frequency Identification- is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information

Internet and Email Monitoring- companies may; block inappropriate websites from use, scan emails to ensure that no viruses or inappropriate words are used and keep automatic records and backups of all emails that are sent or received by the company systems

Company Policy- companies will have a policy about the way employees use the internet, telephone and email. They must inform their employees that their use of Internet and communications is monitored.

LO2: Knowing how to work with information and data to meet specific business needs

Data capture methods

Manual

Use either paper based or online data capture forms

|Paper based |Online |

|Usually pre-printed |Used to enter data directly into a computer system. |

|Include instructions as to how to fill it out |Often used over the Internet via websites |

|Includes questions and prompts with spaces for the answers |Useful for collecting new customer details |

|Often include examples of how the data should be entered | |

|Can be completed by either a member of staff asking questions or by the | |

|customer/client | |

Examples

Automatic

This method uses sensors such as temperature sensors and cameras

Examples include

• Barometers, rainfall gauges and temperature sensors that collect data used in weather predictions

• Speed cameras that collect data about speed as well as an image of the vehicle

[pic]

When designing a data capture form you have to pay attention to a few things

– The format of the data

– The number of spaces available to enter data

– Examples of how data should be entered

– Clear and simple instructions

This will make sure that data is entered in a suitable format

Factors that affect the Data capture method that you choose

• The factors include

– The nature of the information- is it text, numbers, etc

– Location of the information- is it from a place that could be dangerous for humans, Can it be done easily by a machine, freeing up staff to do other jobs

– The cost of collection- does the business have resources to develop expensive online media, is the business large or small

– The method of collection (paper based forms)-costs to print, buy paper, pay staff for data entry and data checking, can be difficult to read hand writing

– Analogue & Digital collection- analogue data must be converted to digital data for use by computer systems. Sensor collect data in analogue and use an analogue to digital converter in order to send it to the computer system

– The security of the Data- all data collected must be kept secure (Data protection Act), must prevent; loss or damage, unauthorised access

File formats

[pic]

Validation and verification

Validation checks that data entered is of the right type

• Some common validation checks include:

o Presence check- has data been entered

o Data type check- is data of the correct data type

o Format check- is the data in the correct format, e.g. dd/mm/yyyy

o Range check- is data within the limits that have been set

o Character check-make sure only allowed characters are entered, e.g. Post codes cannot contain # or @

o Check digit- is added to a number that has been calculated form a collection of digits. When the digits, example a bar code, is read the check digit is re-calculated to make sure it has been read accurately

Verification checks that data is entered exactly as it is shown on the original data capture sheet

There are two methods

• Proof reading- suitable for small amounts of data

• Double entry- suitable for large amounts of data

o Data is entered twice by two different people and then compared by the computer for accuracy

Data storage and transfer

Data types

Data Security

Data can be kept secure by

• Using a robust back up system

• Using passwords to protect saved files and folders

o User different user access rights and permissions (read only/read-write/etc)

• Using encryption when transferring information

• Physical security – locked doors, RFID tags on equipment, etc

Back-ups and recovery systems

Back-ups: copies of files and documents that are currently in use. Backups are made regularly and stored away from the computer system

Back up frequency: will depend on the size of the business and how important the data is. Most companies will make backup every day. Banks make back-ups every few minutes so that data is up to date

At home or at school you can do backups less frequently but you should back up important documents such as school work regularly in case of loss.

Archives: copies of documents and files that are not currently being used but need to be stored for referencing purposes. These are made at longer intervals

Factors affecting the choice of method for backup or archive

[pic]

[pic]

LO3: Knowing how ICT can be used to support business working practices

Business communications

Communication is very important in any business. Some common communication methods include

• Telephone

• SMS text messaging

• Email

• VOIP (voice over Internet Protocol) e.g. SKYPE

• Instant Messaging

• Chat rooms

• Forums

• Bulletin Boards

• Video Conferencing

• Blogs

• Webcams

• Social Networking

Advantages and disadvantages if different methods

[pic]

[pic]

[pic][pic]

[pic]

[pic]

[pic]

Diary management software

Diary management Software is useful for employees who work remotely as they can use it to coordinate their diaries with other colleagues

Diary Management software (DMS) allows you to complete the following tasks:

1. Create Meetings and appointments- creates a list of all those who are attending, also shows clashes and suggest alternatives

2. Invite Participants- will email those participants who need to attend a meeting

3. Create tasks and Projects- can create a list of tasks with who is mean to complete it, the priority of the task and the deadline for it. Some DMS will allow you to create tasks for others. Tasks lists can be shared

4. Create to-do lists- usually small tasks that need to be completed and d can be used as reminders.

5. Set Reminders-can automatically remind a user of an appointment/meeting. Reminders can also be attached to a task

6. Share diaries- some allow employees to share their diaries or to keep some things personal

[pic]

[pic]

Collaborative documents

Some examples of business Documents include:

• Letters

• Memo

• Invoices

• Order Forms

• Websites

• Reports

• Presentations

• Leaflets/Brochures

These may be for internal or external use. They may also be formal or informal

Ways that you could collaborate on a document

1. Put it in a shared area for shared access

a. Shared area on network

b. Use of a cloud service

2. Sharing Documents – allows more than one person to work on a document at the same time

3. Inserting Comments into draft documents- This is a feature of a word processor such as MS Word. It allows you to add comments to a draft document. This could be used to provide feedback to other employees who are also working on the same document

4. Editing and Tracking changes- This is a feature of a word processor such as MS Word. This allows people to edit and make changes to a document. The changes are tracked by being highlighted in a different colour. Tracking highlights insertions, deletions and corrections. More than one person can edit and track a document at the same time

[pic]

The version of the document that has all the tracking is known as the Mark-up version

5. Reviewing a document- each suggested change made and tracked can be accepted or rejected by the creator of the document

LO4: Understanding how legal, ethical, safety and security issues affect how computers should be used

Moral and ethical issues of using ICT in business

The increased use of computers and the Internet means that users need to be aware of moral and ethical issues. These include things like;

The use and abuse of personal and private data – this is governed by legislation but is of great concern to those whose information is kept

Cyber bullying- using Internet and technology to cause harm or intimidate another

Monitoring of individuals by organisations – it may be important for employers to monitor the tasks that their employees do. Tools used for monitoring include CCTV, swipe ID badges, RFID id badges, etc.

Call monitoring/recording – most companies record phone calls to and from the business

Cookies- are simple ’text files’ which you can read using the Notebook program on your own PC. Typically, they contain two pieces of information: a site name and unique user ID. It lets the website know that you have visited that site before. From the end of May 2012, a new EU law came into effect that requires all sites that use cookies to seek your express permission to store and retrieve data about your browsing habits.

Key logging - a key logger is a piece of hardware or software that logs the real time key strokes of a computer user

Electronic costumer surveillance – many retail businesses offer a loyalty card scheme. This allows them to keep track of what a customer buys and where. Every time a purchase is made the loyalty card number is captured. Businesses may use this information to send vouchers and promotions to these customers

Mobile Phone positioning – use 3 mobile phone masts to triangulate the mobile phone position. GPS may also be used. This technology can be used by emergency services such as fire, police and ambulance to find the location where a call was made. The flip side is that this can invade the privacy of the mobile phone user

[pic]

Computer Use legislation

There are four main areas of law that relate to the use of computers in the UK

1. Health and Safety

2. Computer Misuse

3. Copyright and Patents Act

4. Data Protection Act

Organisations are required to comply with all laws affecting the use of computers in the workplace and to keep up to date with any changes.

Health and Safety regulations state that Employers must

6. Analyse workstation, assess and reduce risks

7. Ensure that workstation meet minimum requirements

8. Plan work so that there are breaks or changes to activity

9. Arrange and pay for eye tests and glasses (if special ones are need)

10. Provide health and safety training and information

Health risks associated with the use of computers

• Eye strain- make sure the screen is not too far away or too dim/too bright. Take regular breaks

• RSI (repetitive strain Injury) - repetitive actions can cause this. Also known as carpel tunnel syndrome

• Headaches- caused by issues with vision or poor ventilation

• Neck and Back strain- cause by poor posture. Ensure you use a back and height adjustable chair

Physical Safety

Employees should make sure that they

• Use proper chairs that have back support and are height adjustable

• Do not eat or drink around the computer

• Do not tamper with cables and equipment

• Place computer equipment so that it does not fall or get knocked over

• Take care of their own health and safety and the safety of others

Data Protection Act

This law protects the owners of data and not the data itself. There a 8 principles (see BBC Bitesize)

Data must be:

1. fairly and lawfully processed (used)

2. used for limited purposes

3. adequate and relevant, only what is needed may be used

4. accurate

5. not kept for longer than is necessary

6. accessible to the individual and able to be corrected or removed where necessary

7. secure

8. not transferred to countries without adequate protection

[pic]

Copyright, design and Patents Act

There are three main ways in which this act is broken

1. Using software without the correct software license

2. Downloading files illegally from the internet

3. Copying and sharing music, CDs DVDs and software

Computer Misuse Act

There are three main parts to this act

1. Unauthorised access to computer materials

2. Unauthorised access with intent to commit or facilitate the commission of further offences

3. Unauthorised acts with intent to impair or with recklessness as to impairing the operation of a computer

The implications and consequences of data loss, corruption and theft

Businesses rely on the data it stores to keep the business running. Therefore data s lost, stolen or corrupted can have a serious impact

Legal implications- the DPA and Computer misuse act are the main legislations that apply to the use and security of data in computer systems

Threats to the security of data

[pic]

[pic]

Steps to reduce the risk

• Use different password for different websites/accounts

• Check websites for the padlock symbol

• Do not open unsolicited emails or emails from unknown senders

• Use a firewall

• Anti-virus software

• Anti-Spam software

• Data encryption software

Using automatic and manual updating facilities for operating systems and security software

It is important that software is kept up to date. Most software creators will make changes or fixes to their software after the software is released.

Automatic updates- many operating systems have a built in facility to automatically update software, usually at shutdown or start up times.

Some security software also update in real time (when to computer is connected to the Internet)

The advantage: The user does not have to remember to update or have to fiddle with any of the software settings

Manual update of software- Manual update of the operating system or security software can be dangerous because if the user forgets them the system may be left vulnerable to threats. For example, if a security software update is checked at 5pm but a new virus is released overnight, that system may be vulnerable to attack for the whole of the next day

Disadvantage: updates may take a long time. If updates are set for times when the system is shut down or off line, they may never get done

Advantage: the user can look at update before applying them to see if they are necessary

Glossary

Hardware- The physical components of a computer system that you can see and touch

Software- The computer programs or applications that you use to complete tasks on the computer system

Hot-desking- where employees may share a desktop computer system by using the same computer but at different times

Tailor made software (Bespoke) is software that is made to the specifications of a client. In other words it is custom made, bespoke, or 'tailored' to address a specific need. This kind of software can be expensive as it has to be designed by a team who are making software to specific needs for a specific organisation.

Off the shelf software is more general and produced for the masses. Although it probably also costs a lot of money to make, it is cheaper to buy because it can be bought by anyone.

Bandwidth- is the maximum amount of data that can travel along a communications channel in a given time.

Firewall- is software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set

User ID – this is a username that identifies a person as being authorized to use a network

Password- this is usually used with a User ID to identify and secure data on a network. May also be applied to individual files and folder or as a security to connect to a wireless network

Encryption- is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can

Data- is raw material that has not been processed and has no meaning

Information is data that has been processed and is now meaningful

Data transfer means sending data from one place to another

Device- physical equipment

Implication- the impact, consequence or effect of an action

Capture- to collect data

Feature- a tool that allows you to perform specific tasks

Draw back- disadvantage or negative consequence

Database – software that allows you to store large amounts of data in an organised way e.g. MS Access

• Features: tables, Queries, Reports, Forms, Validation

Spreadsheet – Software that allows you to perform calculations and create graphs using numerical data e.g. MS Excel

• Features: calculations, sorting & filtering, graphs

-----------------------

R001

Understanding Computer Systems- Revisions Guide

• Floppy disk (now obsolete) - 1.44 MB

• CD - 700MB

• DVD - 4.7GB (4,812.8MB)

• Blu-Ray- 25GB (25,600MB



Online Data Capture Form

Paper Based Data Capture Form

To do: research the following methods used to capture and store data

Matrix Bar codes

RFID tags

NFC (near field communications)

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download