R001 - Amazon S3
|Year 11 |
|R001 |
|ICT |
|Theory Content |R001- Understanding computer systems |
| |LO1 |
| |Hardware devices –portable & non-portable |
| |Input/output devices |
| |System software |
| |Application software |
| |Storage and connectivity of devices |
| |Assistive technology |
| |Using Technology to monitor and track |
| |LO2 |
| |Data capture methods |
| |File formats |
| |Validation and verification |
| |Data storage and transfer |
| |Back-ups and recovery systems |
| |LO3 |
| |Business communications |
| |Diary management software |
| |Collaborative documents |
| |LO4 |
| |Moral and ethical issues of using ICT in business |
| |Computer use legislation |
| |the implications and consequences of data loss, corruption and theft |
| |Threats to the security of data; |
| |Using automatic and manual updating facilities for operating systems and security software |
|Useful Websites/resources |egaict. |
| |teach- |
| |BBC Bitesize |
| |Teaching notes on The S Drive (student on EGA area) |
| |Notes in your exercise books |
Revision Tips
What are some good methods to use??
• Revise, Revise, Revise
• Revise with a friend and test your self
• Do practice papers/questions then compare your answers to the mark scheme
• Create flash cards for key definitions, include images
• Do a little revision, often (30 minutes a day)
• Download the Cambridge Nationals Revision app for Iphone and Android
Tips for the long answer question
1. Always give both sides of the argument (for and against)
2. Aim to give at least 2- 3 points for each side
3. Use full sentences, even if you have a bulleted list
4. Use some relevant ICT key terms
Spotting Key words and what they mean
• State- simply give the answer
• List – no need for a paragraph or full sentences. Make a list of the answers
• Describe- Say what the answer is and describe by giving an example
• Explain – Use the PEE (Point, Evidence, and Explain) process
Tips for completing the paper
• Answer ALL questions
• Read each question at least twice
• Look at the number of marks allocated to the question and make sure you at least give the same number if matching points
• Answer the questions you know first, then go back to the ones you are not quite sure about
• Do not leave any blank spaces
|Cambridge Nationals in ICT Unit 1 – “Understanding Computer Systems” Pre-release topics |
|Most likely topics are highlighted in green |
|Topic |Understood? |Maybe… |Need to revise |
|LO1 – UNDERSTAND HOW ICT CAN BE USED TO MEET BUSINESS NEEDS |
|1 How ICT is used by individuals and businesses |
|How ICT is used | | | |
|The difference between desktop and portable systems | | | |
|Portable computer systems | | | |
|Advantages and disadvantages of different types of computer system | | | |
|Input devices | | | |
|Output devices | | | |
|Storage devices | | | |
|Connectivity devices | | | |
|Choosing and configuring systems | | | |
|Using computer systems and devices for remote working | | | |
|System software | | | |
|Application software (revise database software in particular) | | | |
|2 Factors affecting the choice of system |
|How various factors affect the choice of a computer system | | | |
|3 Connecting peripherals to a computer systems |
|Connecting computer peripherals | | | |
|4 Connecting to a wireless network |
|Connecting devices to wireless networks | | | |
|Remote access to networks | | | |
|5 Monitoring of employees by organisations |
|Monitoring employees | | | |
|LO2 – KNOW HOW TO WORK WITH INFORMATION AND DATA TO MEET SPECIFIED BUSINESS NEEDS |
|1 Data capture methods |
|Data | | | |
|How data is captured | | | |
|Paper forms and online forms | | | |
|Automated data capture | | | |
|Topic |Understood? |Maybe… |Need to revise |
|2 Storing data |
|File formats (revise open file formats and pdf document file format in particular) | | | |
|Data security | | | |
|3 Data transfer |
|Data transferring technologies | | | |
|Factors affecting the choice of data transfer methods | | | |
|4 Backups and recovery |
|Backups | | | |
|Factors affecting the choice of backup method | | | |
|LO3 – KNOW HOW ICT CAN BE USED TO SUPPORT BUSINESS WORKING PRACTICES |
|1 How businesses can communicate with employees and others working remotely |
|Communication methods and how they support businesses | | | |
|Advantages and disadvantages of communication methods | | | |
|Email and email etiquette | | | |
|2 How diary management software can be used to organise work schedules |
|Diary management software (DMS) | | | |
|3 Creating and editing documents collaboratively |
|Creating and editing documents collaboratively | | | |
|LO4 – UNDERSTAND HOW LEGAL, ETHICAL, SAFETY AND SECURITY ISSUES AFFECT HOW COMPUTERS SHOULD BE USED |
|1 How legislation affects business computer users |
|Computing legislation and the CMA | | | |
|Health and safety legislation | | | |
|The Data Protection Act (DPA) | | | |
|The Copyright, Designs and Patents Act | | | |
|2 How moral and ethical issues affect business computer users |
|Personal data and cyber bullying | | | |
|Monitoring of individuals by organisations | | | |
|3 The implications and consequences for organisations of data loss, corruption and theft |
|Data loss, corruption and theft | | | |
|4 Threats to data security |
|Threats to data security | | | |
|Actions to minimise risks | | | |
|Automatic and manual updating facilities for operating systems and security software | | | |
LO1: Understanding how ICT can be used to meet business needs
Hardware devices –portable & non-portable (desktop Computer systems)
Desktop computer systems are usually found in office environments. They are usually to large and heavy to move from place to place.
Portable devices are computer devices that allow you to work on the go. They tend to be small and lightweight; easy to carry around.
Examples include:
– Laptops
– Netbooks
– Mobile phones
– Tablets (I pad, Android Tablet)
– handheld consoles (PSPs)
– Media players (e.g. iPods, mp3 or video players)
Features of some portable devices
[pic]
Input/Output/Storage/connectivity devices
INPUT DEVICES- allow you to enter data into a computer system
OUTPUT DEVICES- allow you to get information from a computer system
STORAGE DEVICES- These allow you to save work created on a computer system
CONNECTIVITY DEVICES- These allow computer system to connect up to a network such as the Internet
Below is a table that shows you some examples of devices that come under each category
|INPPUT |OUTPUT |STORAGE |Connectivity |
|Keyboard |printer |CD R/CD RW |Modem |
|Mouse |Monitor/screen |DVD R/ DVD RW |Router |
|Microphone |touchscreen |USB Drive |Wireless Router |
|Webcam |speakers |Desktop Hard Drive |Wi-Fi dongle/Wireless NIC |
|Joystick |headphones |External Hard Drive |Network Card (NIC) |
|Game controller |Projector |SD card |Switch |
|touchscreen |Interactive whiteboard |Floppy Disk* |Wireless Access Point (WAP) |
|Touch screen stylus/pen |Graph Plotter |Magnetic Tape | |
|Scanner |Laser Cutter |Solid Sate Drive | |
|Key pad | | | |
|Touch pad | | | |
|Specialist keyboards (braille) | | | |
|Remote controls | | | |
|Bar code reader/scanner | | | |
|Chip and Pin reader | | | |
|Magnetic Strip reader | | | |
|MIDI (connects musical instruments to | | | |
|computer systems using specialists interface)| | | |
|Camera | | | |
|sensors | | | |
Tip: Can you find any other INPUT/OUTPUT or STORAGE devices?
More examples with images
[pic]
[pic]
Storage and connectivity of devices
Storage capacity: how much space a storage device has available
Different storage devices use different methods to save data. The Four main methods are
• Optical : CD , DVD , Blu-Ray
• Magnetic: magnetic tape, floppy disks, cassettes, some desktop hard drives
• Solid State (no moving parts!!): USB, SD cards
• Cloud Storage: google drop box, I cloud, sky drive
Peripheral devices
A computer peripheral is a device that is connected to a computer system but is not part of the computer system itself/ examples include printers, scanners, cameras, etc.
|Wired peripheral |Wireless peripheral |
|USB (universal serial bus) cable: allows fast data transfer |Wi-Fi- no physical cabling needed, easy to transfer but can be slow, can have |
| |large bandwidth |
|Firewire: high speed connection similar to USB. More expensive and less popular|Bluetooth- requires devices to be paired and use a password key; low bandwidth |
| |so can send limited amounts of data |
| |Infrared- need devices to be very close, usually 1 metre |
Connecting to a wireless network
You need a network name [SSID: Service Set Identifier] and a password [network key/security key]
Assistive technology: another word for this is Accessibility
This is when computer systems are adapted in a way that would allow users with a physical disability to use them
Assistive Technologies come under two categories
– Devices
– Software and software settings
Accessibility Devices
[pic]
Accessibility Software
[pic]
Software
Most business would run some sort of
1. Operating System
2. A range of Application software
They can choose to use one of two types of software
1. Paid for software e.g. windows, Microsoft Office Suit
2. Free/open Source software e.g. Linux
System Software
System software refers to the operating system and all utility programs that manage a computer.
Types of System Software
• Operating System
– (Windows, Mac OSX, Android etc.)
• Utility Software
– Anti-Virus Software
– Disk Cleaners
– File Managers
– Screensavers
– Disk defragmenters
– File encryption software
– Backup Software
– Archiving Software
• Drivers and Firmware
Application software
Application software is software that causes a computer to perform useful tasks beyond the running of the computer itself. Software applications are often called programs, applications or apps.
Types of Application software
• Word processors
• Desktop publishing software
• Spreadsheets
• Database management software
• Multimedia software
• Gaming software
• Web browsers
• Apps for portable devices
• Presentation software
• Photo-editing software
• Video-editing software
• Graphics manipulation software
• Communications software
• Social networking
• Chat rooms
• Instant messaging
• Email
• File transfer/file sharing
Choosing a computer system
The computer systems that large businesses and organisations choose for their employees are crucial. The following four factors affect these choices
1. Cost: too cheap or too expensive
2. Availability: can you get more of the same if you need it?
3. Suitability for user needs: will it be used in an office of on the go?
4. Data security: how easy is it to keep your data secure on this system
Configuring computer systems
These types of computers will have
• A suitable sized monitor that is adjustable
• Ergonomic keyboards suitable for long periods of typing
• A mouse
• Large and fast Hard disk capacity
• DVD.CD rewriter to load software and make backups/archives
• Ability to connect to the network and Internet (network card)
• Suitable desk space to hold all components
Software in offices can be configured in the following ways
• Changing the language
• Adjusting time and date
• Adjusting the screen resolution (useful for some visual impairments, dyslexics and colour blindness
• The size and colour of text on screen
• The arrangement of icons or window displays
• Enlarging/zooming in on sections f the screen
• Audible warnings- text to speech and speech to text
Monitoring an tracking
Many companied use different technologies to track both their employees and company owned devices/vehicles.
GPS – Global Positioning system. Uses four satellites for accurate positioning. Each satellite receives signals from the device that is used to calculate the position on the earth’s surface.
Electronic Tagging- uses a device that is monitored by a base unit. The base unit alerts authorities if the tag goes out of range
RFID- radio frequency Identification- is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information
Internet and Email Monitoring- companies may; block inappropriate websites from use, scan emails to ensure that no viruses or inappropriate words are used and keep automatic records and backups of all emails that are sent or received by the company systems
Company Policy- companies will have a policy about the way employees use the internet, telephone and email. They must inform their employees that their use of Internet and communications is monitored.
LO2: Knowing how to work with information and data to meet specific business needs
Data capture methods
Manual
Use either paper based or online data capture forms
|Paper based |Online |
|Usually pre-printed |Used to enter data directly into a computer system. |
|Include instructions as to how to fill it out |Often used over the Internet via websites |
|Includes questions and prompts with spaces for the answers |Useful for collecting new customer details |
|Often include examples of how the data should be entered | |
|Can be completed by either a member of staff asking questions or by the | |
|customer/client | |
Examples
Automatic
This method uses sensors such as temperature sensors and cameras
Examples include
• Barometers, rainfall gauges and temperature sensors that collect data used in weather predictions
• Speed cameras that collect data about speed as well as an image of the vehicle
[pic]
When designing a data capture form you have to pay attention to a few things
– The format of the data
– The number of spaces available to enter data
– Examples of how data should be entered
– Clear and simple instructions
This will make sure that data is entered in a suitable format
Factors that affect the Data capture method that you choose
• The factors include
– The nature of the information- is it text, numbers, etc
– Location of the information- is it from a place that could be dangerous for humans, Can it be done easily by a machine, freeing up staff to do other jobs
– The cost of collection- does the business have resources to develop expensive online media, is the business large or small
– The method of collection (paper based forms)-costs to print, buy paper, pay staff for data entry and data checking, can be difficult to read hand writing
– Analogue & Digital collection- analogue data must be converted to digital data for use by computer systems. Sensor collect data in analogue and use an analogue to digital converter in order to send it to the computer system
– The security of the Data- all data collected must be kept secure (Data protection Act), must prevent; loss or damage, unauthorised access
File formats
[pic]
Validation and verification
Validation checks that data entered is of the right type
• Some common validation checks include:
o Presence check- has data been entered
o Data type check- is data of the correct data type
o Format check- is the data in the correct format, e.g. dd/mm/yyyy
o Range check- is data within the limits that have been set
o Character check-make sure only allowed characters are entered, e.g. Post codes cannot contain # or @
o Check digit- is added to a number that has been calculated form a collection of digits. When the digits, example a bar code, is read the check digit is re-calculated to make sure it has been read accurately
Verification checks that data is entered exactly as it is shown on the original data capture sheet
There are two methods
• Proof reading- suitable for small amounts of data
• Double entry- suitable for large amounts of data
o Data is entered twice by two different people and then compared by the computer for accuracy
Data storage and transfer
Data types
Data Security
Data can be kept secure by
• Using a robust back up system
• Using passwords to protect saved files and folders
o User different user access rights and permissions (read only/read-write/etc)
• Using encryption when transferring information
• Physical security – locked doors, RFID tags on equipment, etc
Back-ups and recovery systems
Back-ups: copies of files and documents that are currently in use. Backups are made regularly and stored away from the computer system
Back up frequency: will depend on the size of the business and how important the data is. Most companies will make backup every day. Banks make back-ups every few minutes so that data is up to date
At home or at school you can do backups less frequently but you should back up important documents such as school work regularly in case of loss.
Archives: copies of documents and files that are not currently being used but need to be stored for referencing purposes. These are made at longer intervals
Factors affecting the choice of method for backup or archive
[pic]
[pic]
LO3: Knowing how ICT can be used to support business working practices
Business communications
Communication is very important in any business. Some common communication methods include
• Telephone
• SMS text messaging
• Email
• VOIP (voice over Internet Protocol) e.g. SKYPE
• Instant Messaging
• Chat rooms
• Forums
• Bulletin Boards
• Video Conferencing
• Blogs
• Webcams
• Social Networking
Advantages and disadvantages if different methods
[pic]
[pic]
[pic][pic]
[pic]
[pic]
[pic]
Diary management software
Diary management Software is useful for employees who work remotely as they can use it to coordinate their diaries with other colleagues
Diary Management software (DMS) allows you to complete the following tasks:
1. Create Meetings and appointments- creates a list of all those who are attending, also shows clashes and suggest alternatives
2. Invite Participants- will email those participants who need to attend a meeting
3. Create tasks and Projects- can create a list of tasks with who is mean to complete it, the priority of the task and the deadline for it. Some DMS will allow you to create tasks for others. Tasks lists can be shared
4. Create to-do lists- usually small tasks that need to be completed and d can be used as reminders.
5. Set Reminders-can automatically remind a user of an appointment/meeting. Reminders can also be attached to a task
6. Share diaries- some allow employees to share their diaries or to keep some things personal
[pic]
[pic]
Collaborative documents
Some examples of business Documents include:
• Letters
• Memo
• Invoices
• Order Forms
• Websites
• Reports
• Presentations
• Leaflets/Brochures
These may be for internal or external use. They may also be formal or informal
Ways that you could collaborate on a document
1. Put it in a shared area for shared access
a. Shared area on network
b. Use of a cloud service
2. Sharing Documents – allows more than one person to work on a document at the same time
3. Inserting Comments into draft documents- This is a feature of a word processor such as MS Word. It allows you to add comments to a draft document. This could be used to provide feedback to other employees who are also working on the same document
4. Editing and Tracking changes- This is a feature of a word processor such as MS Word. This allows people to edit and make changes to a document. The changes are tracked by being highlighted in a different colour. Tracking highlights insertions, deletions and corrections. More than one person can edit and track a document at the same time
[pic]
The version of the document that has all the tracking is known as the Mark-up version
5. Reviewing a document- each suggested change made and tracked can be accepted or rejected by the creator of the document
LO4: Understanding how legal, ethical, safety and security issues affect how computers should be used
Moral and ethical issues of using ICT in business
The increased use of computers and the Internet means that users need to be aware of moral and ethical issues. These include things like;
The use and abuse of personal and private data – this is governed by legislation but is of great concern to those whose information is kept
Cyber bullying- using Internet and technology to cause harm or intimidate another
Monitoring of individuals by organisations – it may be important for employers to monitor the tasks that their employees do. Tools used for monitoring include CCTV, swipe ID badges, RFID id badges, etc.
Call monitoring/recording – most companies record phone calls to and from the business
Cookies- are simple ’text files’ which you can read using the Notebook program on your own PC. Typically, they contain two pieces of information: a site name and unique user ID. It lets the website know that you have visited that site before. From the end of May 2012, a new EU law came into effect that requires all sites that use cookies to seek your express permission to store and retrieve data about your browsing habits.
Key logging - a key logger is a piece of hardware or software that logs the real time key strokes of a computer user
Electronic costumer surveillance – many retail businesses offer a loyalty card scheme. This allows them to keep track of what a customer buys and where. Every time a purchase is made the loyalty card number is captured. Businesses may use this information to send vouchers and promotions to these customers
Mobile Phone positioning – use 3 mobile phone masts to triangulate the mobile phone position. GPS may also be used. This technology can be used by emergency services such as fire, police and ambulance to find the location where a call was made. The flip side is that this can invade the privacy of the mobile phone user
[pic]
Computer Use legislation
There are four main areas of law that relate to the use of computers in the UK
1. Health and Safety
2. Computer Misuse
3. Copyright and Patents Act
4. Data Protection Act
Organisations are required to comply with all laws affecting the use of computers in the workplace and to keep up to date with any changes.
Health and Safety regulations state that Employers must
6. Analyse workstation, assess and reduce risks
7. Ensure that workstation meet minimum requirements
8. Plan work so that there are breaks or changes to activity
9. Arrange and pay for eye tests and glasses (if special ones are need)
10. Provide health and safety training and information
Health risks associated with the use of computers
• Eye strain- make sure the screen is not too far away or too dim/too bright. Take regular breaks
• RSI (repetitive strain Injury) - repetitive actions can cause this. Also known as carpel tunnel syndrome
• Headaches- caused by issues with vision or poor ventilation
• Neck and Back strain- cause by poor posture. Ensure you use a back and height adjustable chair
Physical Safety
Employees should make sure that they
• Use proper chairs that have back support and are height adjustable
• Do not eat or drink around the computer
• Do not tamper with cables and equipment
• Place computer equipment so that it does not fall or get knocked over
• Take care of their own health and safety and the safety of others
Data Protection Act
This law protects the owners of data and not the data itself. There a 8 principles (see BBC Bitesize)
Data must be:
1. fairly and lawfully processed (used)
2. used for limited purposes
3. adequate and relevant, only what is needed may be used
4. accurate
5. not kept for longer than is necessary
6. accessible to the individual and able to be corrected or removed where necessary
7. secure
8. not transferred to countries without adequate protection
[pic]
Copyright, design and Patents Act
There are three main ways in which this act is broken
1. Using software without the correct software license
2. Downloading files illegally from the internet
3. Copying and sharing music, CDs DVDs and software
Computer Misuse Act
There are three main parts to this act
1. Unauthorised access to computer materials
2. Unauthorised access with intent to commit or facilitate the commission of further offences
3. Unauthorised acts with intent to impair or with recklessness as to impairing the operation of a computer
The implications and consequences of data loss, corruption and theft
Businesses rely on the data it stores to keep the business running. Therefore data s lost, stolen or corrupted can have a serious impact
Legal implications- the DPA and Computer misuse act are the main legislations that apply to the use and security of data in computer systems
Threats to the security of data
[pic]
[pic]
Steps to reduce the risk
• Use different password for different websites/accounts
• Check websites for the padlock symbol
• Do not open unsolicited emails or emails from unknown senders
• Use a firewall
• Anti-virus software
• Anti-Spam software
• Data encryption software
Using automatic and manual updating facilities for operating systems and security software
It is important that software is kept up to date. Most software creators will make changes or fixes to their software after the software is released.
Automatic updates- many operating systems have a built in facility to automatically update software, usually at shutdown or start up times.
Some security software also update in real time (when to computer is connected to the Internet)
The advantage: The user does not have to remember to update or have to fiddle with any of the software settings
Manual update of software- Manual update of the operating system or security software can be dangerous because if the user forgets them the system may be left vulnerable to threats. For example, if a security software update is checked at 5pm but a new virus is released overnight, that system may be vulnerable to attack for the whole of the next day
Disadvantage: updates may take a long time. If updates are set for times when the system is shut down or off line, they may never get done
Advantage: the user can look at update before applying them to see if they are necessary
Glossary
Hardware- The physical components of a computer system that you can see and touch
Software- The computer programs or applications that you use to complete tasks on the computer system
Hot-desking- where employees may share a desktop computer system by using the same computer but at different times
Tailor made software (Bespoke) is software that is made to the specifications of a client. In other words it is custom made, bespoke, or 'tailored' to address a specific need. This kind of software can be expensive as it has to be designed by a team who are making software to specific needs for a specific organisation.
Off the shelf software is more general and produced for the masses. Although it probably also costs a lot of money to make, it is cheaper to buy because it can be bought by anyone.
Bandwidth- is the maximum amount of data that can travel along a communications channel in a given time.
Firewall- is software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set
User ID – this is a username that identifies a person as being authorized to use a network
Password- this is usually used with a User ID to identify and secure data on a network. May also be applied to individual files and folder or as a security to connect to a wireless network
Encryption- is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can
Data- is raw material that has not been processed and has no meaning
Information is data that has been processed and is now meaningful
Data transfer means sending data from one place to another
Device- physical equipment
Implication- the impact, consequence or effect of an action
Capture- to collect data
Feature- a tool that allows you to perform specific tasks
Draw back- disadvantage or negative consequence
Database – software that allows you to store large amounts of data in an organised way e.g. MS Access
• Features: tables, Queries, Reports, Forms, Validation
Spreadsheet – Software that allows you to perform calculations and create graphs using numerical data e.g. MS Excel
• Features: calculations, sorting & filtering, graphs
-----------------------
R001
Understanding Computer Systems- Revisions Guide
• Floppy disk (now obsolete) - 1.44 MB
• CD - 700MB
• DVD - 4.7GB (4,812.8MB)
• Blu-Ray- 25GB (25,600MB
•
Online Data Capture Form
Paper Based Data Capture Form
To do: research the following methods used to capture and store data
Matrix Bar codes
RFID tags
NFC (near field communications)
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- amazon fees calculator
- amazon calculator profit
- amazon revenue calculator
- amazon cloud revenue 2018
- finance calculator amazon 2
- finance calculator amazon 5
- finance calculator amazon 3
- trending products on amazon 2019
- amazon web services revenue
- amazon investor relations
- amazon profit calculator 2018
- amazon seller profit calculator