ICT in Today’s World.

1 ICT in Today’s World ...
Author: Lucinda Edwards
0 downloads 3 Views

1 ICT in Today’s World

2 Index 1: ICT Systems 2: Exchanging Information3: Presenting Information 4: Manipulating Data 5: Data Security 6: Issues of ICT 7: Using ICT Systems 8: Monitoring and Control 9: ICT and Modern Living

3 ICT Systems 1.1: Computer Systems 1.2: Hardware 1.3: Software

4 ICT Systems Types of System Personal ComputersStandard systems for everyday personal tasks. Usually operate stand-alone with a shared web connection. Mainframes Mainly used by large businesses for bulk processing. Operate as a group of virtual machines rather than a single system. Supercomputers High-end, ultra-fast machines capable of performing complex calculations at high speeds. Use parallel processing, and so can carry out several tasks simultaneously. Often used in research establishments. Extension: research quantum computers and a basic outline of how they function.

5 ICT Systems Embedded SystemsEMBEDDED SYSTEM – system with a dedicated function within a larger electrical system. The output of one system goes straight in as the input of another. Found in MP3 players, DVD players, digital watches… Advantages: Disadvantages: Save common user settings, making appliances more convenient to use. Complex and so cannot be repaired by the user. Free up time for the user to carry out other tasks. More expensive than simple systems. Can intelligently and accurately control events, such as washing machine temperature. Tricky to fix even for qualified repairmen and so often have to be completely replaced.

6 ICT Systems Hardware HARDWARE – the physical parts which make up a computer system. Different hardware can be categorised as follows: Input – allow users to enter data into the system Output – allow the system to transfer/display data Processing – carry out the calculations and instructions required for the system to function Storage – where data and information is stored.

7 ICT Systems IPOS Cycle This is the fundamental principle of all ICT systems. It stands for input, processing, output and storage. Input Processing Output Storage

8 ICT Systems Input DevicesAcross from top-left: keyboard, graphic tablet, barcode scanner, webcam and microphone.

9 ICT Systems Output DevicesAcross from top-left: printer, speakers, plotter and screen/monitor.

10 ICT Systems In-Built StoragePrimary Storage – referred to as the memory of the computer. Random Access Memory – temporary storage used to hold data being used by the system at that point. The storage is what’s known as volatile - data is lost when the system is switched off. Read Only Memory – non-volatile and permanent storage which holds the instructions which the computer runs before loading the operating system (the BIOS – Basic Input/Output System). Secondary Storage – holds permanent data, stores it even when not powered. Separate from the main processor and usually some kind of hard disk. The hard disk consists of metal disks with read/write heads which move across the surface.

11 ICT Systems Removable StorageAcross from top-left: Compact Discs (CDs)/Digital Versatile Disks (DVDs), Micro Secure Disk (SD) card and Universal Serial Bus (USB) stick.

12 ICT Systems Digital and AnalogueAnalogue data is analogous – the data is not the ‘real’ data, rather the closest equivalent. It changes smoothly, unlike binary which changes in fixed steps. A computer system deals in binary, a literal system of 1s and 0s. All data is expressed in this way, and the table below shows the way that numbers are stored in binary. 128 64 32 16 8 4 2 1 67 121 7 Therefore if data is in analogue form, it has to first be converted to its digital equivalent so that the computer can ‘understand’ (process) it.

13 ICT Systems Software SOFTWARE – provide the instructions which the system requires to carry out tasks given to it. Different software can be categorised as follows: Operating Systems Utility Software Drivers Applications Programming Software

14 ICT Systems GUI and CLI What do they stand for and which is which?

15 ICT Systems GUI and CLI What do they stand for and which is which?Graphical User Interface Windows Icons Menus Pointers Command Line Interface Text-based input Must know correct syntax Less user friendly

16 ICT Systems Operating Systems What does an operating system do?Memory management Provide a GUI Hardware/software installation Disk management What’s so good about them? Real-time operation Interactivity Multi-tasking

17 ICT Systems Utility SoftwareUtility software is functional – it performs one or two tasks exceptionally well but does nothing else. For example: Anti-viral software File conversion Defragmentation manager File repair Crash dump interpreter. Many utility programs come as part of an OS, for example defragmentation managers.

18 ICT Systems ApplicationsAcross from top-left: Google Chrome, Spotify, Microsoft PowerPoint, IDLE Python GUI and RPG Maker VX.

19 ICT Systems Worked Exam Questions The image shows a computerised data logger which is designed to be worn on a person’s wrist. From the diagram, identify one component for input and one for output. (2) The device contains an analogue to digital converter. Explain why this is required. (2)

20 ICT Systems Worked Exam Questions The image shows a computerised data logger which is designed to be worn on a person’s wrist. From the diagram, identify one component for input and one for output. (2) Input: buttons, sensors, on/off switch (1) Output: speaker, screen (1) The device contains an analogue to digital converter. Explain why this is required. (2) Sensor logs data in analogue form (1) Computers can only read digital data (1)

21 Exchanging Information2.1: Communication Services 2.2: Sharing Information Securely 2.3: Responsible Communications 2.4: Communications Software 2.5: The Internet 2.6: Control and Monitoring 2.7: New Technologies

22 Email SMS Instant Messaging Video-conferencing VoIP FaxExchanging Information Communication Services SMS Instant Messaging Video-conferencing VoIP Fax Internet Forums Chat Rooms Cloud Storage Discuss possible advantages and disadvantages of these, making a list in your notes.

23 Exchanging InformationSecure Sharing Data can be encrypted to prevent it being intercepted during transmission. An encryption cipher, such as an RSA algorithm, scrambles the data between the sender and the receiver, preventing it from being intercepted and read. Files can be encrypted in storage through the use of a service such as BitLocker or the in-built encryption in Microsoft Office. Extension: use a Microsoft Windows operating system to try encrypting a removable storage device using BitLocker.

24 Exchanging InformationResponsible Sharing Copyright Theft – Illegal downloading of copyrighted material including text, media and software. Flaming – Sending hostile or insulting messages to other users via . Spam – Sending bulk messages to other users via , usually used for advertising purposes. Defamatory Statements – Untrue communications which harm a person’s reputation. Other online hazards include fraudulent websites, malware and phishing scams.

25 Exchanging InformationCommunications Software Across from top-left: Google Chrome, Facebook Messenger, Skype, Microsoft Outlook and File Transfer Protocol (FTP) software.

26 Find the meanings of the following key terms: POP3 SMTP URL ISP BCC Exchanging Information Communications Software Find the meanings of the following key terms: POP3 SMTP URL ISP BCC FTP Cookies

27 Exchanging InformationCommunications Software Find the meanings of the following key terms: POP3 – Post Office Protocol 3 The standard protocol for receiving s. SMTP – Simple Mail Transfer Protocol The standard protocol for sending s, which are then read using POP3. URL – Uniform Resource Locator Technical term for a web address. ISP – Internet Service Provider Supplies a connection to the internet, such as BT Broadband. BCC – Blind Carbon Copy Field for adding an extra recipient without other recipients seeing. FTP – File Transfer Protocol Protocol used to transfer files from one host to another over a network such as the internet. Cookies Small text-based files created by visiting websites and stored on a local machine.

28 Exchanging InformationThe Internet (WAN) A Wide Area Network is a network which covers a broad area – i.e. any telecommunications network which links together computers and local networks over a large area. The internet is the best example of this. ADVANTAGES: DISADVANTAGES: Online shopping is available 24/7. Children can stumble onto inappropriate websites. Easily accessible information on a wide range of topics. Some information is biased and/or incorrect. Media files and software can be downloaded, some for free. Internet crime, such as identity theft, is on the rise. Communication services keep people in contact around the globe. High street retailers struggle to compete with increased online shopping and close.

29 Exchanging InformationLocal Area Networks Extension: suggest a program that I could have used to make a better picture! N.B: Point of Sale (POS) terminal was related to the May 2015 B063 study, OCER Theatre.

30 Exchanging InformationControl and Monitoring Across from top-left: Global Positioning System (GPS), Closed Circuit Television Camera (CCTV), Chrome Remote Desktop and remote control. Extension: install the Chrome Remote Desktop app onto your phone and use it with the desktop extension to try controlling your PC.

31 Exchanging InformationNew Technologies Across from top-left: mobile phone, Geographic Information System (GIS) map, satellites and Bluetooth (still considered new or ‘emerging’ by the specification).

32 Give a technical description of how emails are sent and received. (2)Exchanging Information Worked Exam Questions State 2 pieces of technology which are likely to be found in a office building’s Local Area Network. (2) Give a technical description of how s are sent and received. (2) Question 1 Any 2 of the following for 1 mark each: Switch, workstation (computer), Wi-Fi router, backup server, printer, mobile devices. Question 2 Mention of SMTP for sending (1) Mention of POP3 for receiving (1)

33 Presenting Information3.1: Word Processing and DTP 3.2: Slideshows and Multimedia 3.3: Web Authoring 3.4: Image Manipulation 3.5: Integrating Information

34 WP and DTP 3: Presenting Information Word ProcessingFeatures common to both: Headings Borders Tables Grouping… Word Processing Desktop Publishing Letters Posters Essays Leaflets Memos Business Cards Reports Magazines

35 Presentations Presenting Information Standard text formatting options.Action buttons can be used as hyperlinks. Standard text formatting options. Rehearse timings for perfection. Extension: go through this complete presentation and identify various specific features of it. Slide list window Notes pages, can be printed as a hand-out.

36 Multimedia Presenting InformationPossible answers: play/pause button, volume control, playlists, and seek bar. What unique features of multimedia software can you identify from the screenshot?

37 Presenting InformationWeb Authoring Web authoring software is a type of application which is used for creating webpages. They include features such as: Design/HTML views Flash tools JavaScript elements RSS feeds Counters Test environments FTP support. N.B: web 2.0 technologies were included in the May 2015 B063 study, OCER Theatre. Web 2.0 – Interactive website elements, sometimes called dynamic content, such as search boxes.

38 Image Manipulation Presenting InformationSoftware for the specific task of editing picture files. Features include: Filters Layers Selection Cropping Morphing Colour balance Air brush Cloning Resizing.

39 Integrating InformationPresenting Information Integrating Information 2 main methods for moving and linking data between and within software packages: Copy and paste User selects data which is then saved in a temporary area known as the clipboard. Held data can then be inserted into the desired location. Object Linking and Embedment A sophisticated method for sharing data between 2 applications. The link is kept updated, so if changes made to a linked-from file, these will be reflected in the linked-to file. Extension: everyone uses copy and paste, but try to use object linking as part of your B062 assessment!

40 Presenting InformationWorked Exam Questions Task: Software: Creating a leaflet Creating a webpage Editing digital images Storing customer details Complete the table by stating the most suitable type of software for each task. (4)

41 Presenting InformationWorked Exam Questions Task: Software: Creating a leaflet Desktop publishing (1) Creating a webpage Web Authoring (1) Editing digital images Image Manipulator (1) Storing customer details Database (1) Complete the table by stating the most suitable type of software for each task. (4) Any mention of names of specific software packages will not be rewarded. The question asks for the type of software and giving a name, such as Microsoft Word, is not answering the question! N.B: using specific software packages is the easiest way to lose 4 marks in this case. This COULD be the difference between grades in the real exam.

42 Presenting InformationWorked Exam Questions Explain how multimedia features of presentation software can be used to enhance a presentation. (6) 1 mark, up to a maximum of 3, for stating multimedia features of presentation software, such as: Hyperlinks (1) Voice-over (1) Images (1) Animation sequences(1) Additional mark for each explanation, for example: Pictures and images (1) can be used in the presentation to demonstrate or convey visually what is being said, making it more understandable for the reader (1). No credit for mentioning non-multimedia features, such as text formatting.

43 Manipulating Data 4.1: Data Types 4.2: Data Capture 4.3: Spreadsheets4.4: Databases 4.5: Validation and Verification

44 Manipulating Data Data Types Alphanumeric Numerical Date/Time ImageBoolean

45 Manipulating Data Data Types Alphanumeric Numerical Date/Time ImageData which can be any letter, number or other symbol. Numerical Simply put, a number. It cannot start with a zero, which so they cannot be used to store phone numbers! Date/Time Usually selected from a pop-up window or wizard. Image A picture is broken down into individual pixels which are then translated into binary code. Boolean A choice of 2 values – yes/no, true/false and so on. This is related to binary code (see unit 1). Notes: understanding that numerical data types cannot be used for phone numbers is likely to be a key part of your B062 assessment, and is a good way for the exams to test your understanding (as well as knowledge) of what can be viewed as an easy topic. Extension: relate the table of binary code on slide 12 and 256 colour BMP picture format to aid understanding of how an image is translated into binary code.

46 Manipulating Data Data Capture Methods of collecting data:Online forms Paper forms Biometrics Optical Mark Readers (OMR) Barcode scanners Voice recognition Chip and PIN Radio Frequency Identification (RFID) List an advantage and a disadvantage for each of these in your notes.

47 Formulae and functions Automatic recalculation Sorting data Manipulating Data Spreadsheets Spreadsheet – a table of values displayed as a grid with rows and columns. Formulae and functions Automatic recalculation Sorting data Charts and graphs Programmable macros Data modelling.

48 For example: $A$1, $B$4, $C$6.Manipulating Data Relative vs. Absolute A relative reference will adjust itself with its host formula. For example, if the formula is moved 2 cells down, the reference will also move 2 cells down. For example: A1, B4, C6. An absolute reference will always refer to the exact same cell, even if the formula is moved. In Microsoft Excel, this is done by adding a dollar sign ($) to the reference. For example: $A$1, $B$4, $C$6.

49 Modelling tools include: Goal seek Scenario manager Data table. Manipulating Data Analysing Data A spreadsheet model is where a series of equations are inserted into a spreadsheet to simulate a real situation. This can be used to make informed financial decisions. Modelling tools include: Goal seek Scenario manager Data table. This are known as scenario manager tools – they can be used to set up various situations to see how the data changes under certain conditions.

50 Manipulating Data Flat-File Databases Define these key database terms:Field Record Report Query Form

51 Manipulating Data Flat-File Databases Define these key terms:Field – one piece of data about a database object. Record – collection of fields about a database object. Report – method of summarising and presenting information from a database. Query – requests for information, created using set criteria. Form – interactive and more user-friendly method of database interaction. In a flat-file database, all of the data is contained in a single table. Whilst they are simple and straightforward to use, they become difficult to manage when the amount of data becomes too much or too varied.

52 Manipulating Data Relational DatabasesPrimary Key – A means of identifying records in a table. Usually a field with some variety of ID number. Foreign Key - A field in one relational table which is matched to the primary key of another, used to create the relationship. One-to-One Relationship – Where one record in a relational table matches to only one other in another table. Many-to-One Relationship – Where a record in a relational table matches up to multiple others in another table.

53 Manipulating Data Relational DatabasesMany-to-One relationships in Microsoft Access. For example, a single customer (the ‘one’) can have many seats booked in their name (the ‘many’).

54 Manipulating Data Relational Databases Why use a relational database?Input effort is reduced Increased reliability of data Reduced data redundancy (as data is only stored once). However they are complex – both to create and troubleshoot. Extension: try creating both a flat-file and a relational database (for example in Microsoft Access) as a practical exploration of the two database types.

55 Manipulating Data Checking DataVALIDATION – ensuring that data is sensible, reasonable, complete and within acceptable boundaries. An example is when you set up a condition which ensures that a person’s name only includes letters. Includes: presence, data type, length, range and format checks. VERIFICATION – checking that the data which has been inputted is identical to the original. An example is when you are forced to enter a new password twice (double keying) to ensure they are both the same.

56 Manipulating Data Worked Exam QuestionsExplain the advantages of using a relational database over a flat file database. (4) Any two of the following pairs of statements for full marks: Input effort is reduced (1) Data is entered once, making them easier and more convenient to use (1). Reduced data redundancy (1) As data is stored once and then used when needed (1). Improved data reliability (1) Because data is entered once, variations and mistakes are reduced (1).

57 Manipulating Data Worked Exam QuestionsThe image shows a spreadsheet made in Microsoft Excel. Give the reference of a cell which contains: A value (1) A formula (1) How can the data in column B be checked to ensure it is correct? You will gain marks for using the correct specialist terms in your answer. (3) Extension: use the screenshot to identify specific features of spreadsheet software.

58 Manipulating Data Worked Exam Questions B/C4-14, G/H4-12 (1) B1 (1)It can be validated (1) by setting up a data type check (1) to ensure that the inputted data is a date (1).

59 Data Security 5.1: Backups and Archiving 5.2: Protecting Data5.3: Encryption 5.4: Malware 5.5: Hacking

60 Data Security Backups and ArchivingBACKUP – a copy of a file which is separately from the original and can be used to replace the original if it is lost or corrupted. ARCHIVE – a collection of outdated backups which make up a record of a file’s history. When creating a backup or archive, it is important to consider the following: What data needs to be backed up? How often does the backup need to be created? Where will the data be stored?

61 Data Security Physical MethodsAcross from top-left: safe, CCTV camera, loop lock, landmine and a bear trap. Extension: which of these are you likely to realistically use and why? What would be the specific issue of using a landmine to protect your data?

62 Data Security Virtual MethodsAcross from top-left: password, antivirus, honeypot and firewall.

63 Data Security Protecting Data ChallengeYou are in charge of security at a large corporation. At this company, data is stored on a central server with USB drives commonly used by staff. There are no facilities for securely storing these devices. There have been a recent spate break-ins which have led to data being stolen. The data have been in a variety of formats, from USB memory sticks to the secondary storage drives themselves. Several attacks from anonymous hacking groups have also led to data being compromised.

64 Any relevant human factors.Data Security Protecting Data Challenge You are to design a system which will keep the data secure from break-ins and “hack-attacks”. Your solution should include: Physical methods Virtual methods Any relevant human factors.

65 Data Security Protecting Data Challenge

66 Increased guard patrolsData Security Protecting Data Challenge The answer? PHYSICAL METHODS VIRTUAL METHODS HUMAN FACTORS CCTV cameras Strong passwords Increased secrecy Coded doors Honeypots Must secure USB keys Safes Firewalls Receptionist Secured workstations Antivirus Log USB movements Alarm system IDS Increased guard patrols Secured switches Access rights

67 Attempted InterceptionData Security Encryption Encryption prevents data from being intercepted and read whilst it is being transmitted from the sender to the receiver. The data is scrambled with the use of a cipher, such as an RSA algorithm so that it only makes sense to the intended recipient. Sender “Hello world” Receiver Message “dfghjklnfvbn” Attempted Interception Extension: use the internet to research a few different ciphers, then try to encrypt various sentences with them.

68 Data Security Malware MALWARE – software which has an adverse effect on a computer system. It is usually installed without the user’s knowledge or consent, and can have a wide range of effects. Some can simply display annoying advertisements (adware), whilst others will multiply and corrupt files. Types of malware include: Viruses Worms Trojan Horses Spyware Rootkits Adware Ransom-ware

69 Data Security Preventing MalwareYou can prevent malware from being installed on your system in a number of ways: Install an anti-virus Keep it regularly updated Run regular scans Treat unknown files with caution Instantly delete spam s.

70 Data Security Hacking HACKING – The process of accessing (or attempting to) a computer system without authorisation (see Computer Misuse Act). Hackers will often use key-logging software, which records all of the keystrokes made by the user. This is often a simple way of stealing passwords and credit card details. The best way to prevent hackers is by installing a working firewall. Intrusion Detection Systems (IDS may also be used to monitor the network/device for unauthorised users.

71 Issues of ICT 6.1: Computer Misuse Act 19906.2: Data Protection Act 1998 6.3: P.D.G.C. 6.4: Copyright Design and Patents Act 1988 6.5: EC Directive 2002 6.6: Health and Safety 6.7: Accessibility

72 Issues of ICT Computer Misuse ActLevel 1 - unauthorised access to programs or data as a nuisance. Level 2 - unauthorised access with a further criminal intent. Level 3 - unauthorised modification of computer data. Companies such as OCER Theatre must ensure that their systems are not used for such actions. This can involve usage policies to prevent users from accessing the necessary functions and working with authorities when a contravention does occur. N.B: the case study link was taken from May 2015 and may not be strictly relevant to future exams.

73 Issues of ICT Data Protection Act Data subjects have the right to:Compensation for an unauthorised disclosure or inaccurate data Access data about them and have it rectified. They must be told: Why the data has to be stored Who will be able to access it How it will be collected Types of data that will be stored Anyone to whom the data may be passed on to.

74 Issues of ICT Data Protection Act Data must be: Processed lawfullyHeld for a specific purpose Adequate, relevant and not excessive Kept accurate Not kept longer than necessary Processed in accordance with the subject Held securely Not transferred outside of Europe. This excludes crime, research, tax and accounts data – such as police records and the census. Come up with an action that OCER Theatre must take for each principle. N.B: the case study link was taken from May 2015 and may not be strictly relevant to future exams.

75 Issues of ICT P.D.G.C. Stands for Personal Data Guardianship Code.A social awareness guidance rather than a legal act. Covers: Accountability Visibility Consent Access Stewardship Responsibility.

76 Issues of ICT Copyright Design and Patents Act 1988This act was introduced to protect the intellectual property of both individuals and organisations. It makes it illegal to make unauthorised downloads or to use copyrighted files without the correct permission. OCER Theatre must ensure that they have the correct permissions to use any music they play during intervals and images used in programs. They also must ensure that they possess the correct software licensing: Single-user – one machine may run the software. Multi-user – several machines may run it. Site License – everyone with network access may use the software. N.B: the case study link was taken from May 2015 and may not be strictly relevant to future exams. Licensing software IS relevant to exams when discussing the legality of using software.

77 Link to terms and conditions Statement that the email is marketing. Exchanging Information EC Directive 2002 marketing used by companies such as OCER Theatre must include certain things for them to be legal: Trading name Contact details Trade registry number Opt-out link Link to terms and conditions Statement that the is marketing. Information must also be displayed on their website and during transactions.

78 Issues of ICT Health and SafetyAcross from top-left: eye strain, Repetitive Strain Injury (RSI), back pain, wrist pain and radioactivity.

79 Issues of ICT AccessibilityThere are various features of ICT, both hardware and software, which have been designed to aid people with disabilities: Screen filters Magnifiers Braille keyboards Voice control Adjustable height desks.

80 Issues of ICT Worked Exam QuestionsThe following question is an example of an extended writing question. These are worth 8 marks and there will generally be at least two of them in the exam. They are also marked differently – using descriptions of different levels of achievement. Answering a question like this fully and within the time you have requires you to pick out EXACTLY what is required from the question, as is shown on the next slide.

81 Issues of ICT Irrelevant!Worked Exam Questions Irrelevant! Many companies store the personal details of their customers. Explain how the Data Protection Act tries to protect the rights of customers. Your quality of written communication will be assessed as part of your answer. (8) Subject matter WHAT and HOW What are its aims? Extension: take other 6 and 8 mark questions from other subjects and identify: The command word The subject matter Any irrelevant information Any specified additional points to cover. Spelling, grammar, key terms 8 marks – at least 4 different developed points

82 Issues of ICT 7-8 marks Worked Exam Questions 4-6 marks 0-3 marksCandidates will discuss how the principles stated in the DPA attempt to protect the rights of customers. Most of the DPA principles will be discussed. The information will be relevant, clear, organised and presented in a structured and coherent format. Specialist terms will be used correctly and appropriately. There will be few, if any, errors in grammar, punctuation and spelling. 4-6 marks Candidates will discuss how the principles stated in the DPA attempt to protect the rights of customers. Some of DPA principles will be discussed. Examples used will be for the most part relevant. The discussions used may be brief. For the most part, the information will be relevant and presented in a structured and coherent format. Specialist terms will be used appropriately and for the most part correctly. There may be occasional errors in grammar, punctuation and spelling. 0-3 marks Candidates will only address some aspects of the principles stated in the DPA attempt to protect the rights of customers. Examples, if used, may lack relevance. Answers may be in the form of a list. There will be little or no use of specialist terms. Errors of grammar, punctuation and spelling may be intrusive.

83 Issues of ICT Worked Exam Questions Describe potential health implications of using a computer for long periods of time. (4) A call centre wants to reduce the number of health insurance claims made by its employees. Give 2 ways in which they can do this. (2) Question 1 Improper seating (1) can lead to backache/neck strain (1) Improper lighting/monitor glare (1) can lead to eye strain (1) Excessive keyboard use (1) can lead to RSI (1) Inability to ‘switch off’ (1) can lead to stress (1) Question 2 Eye strain – well lit working environment (1) Backache – ergonomic seating/desk area (1) Stress – introduce mandatory breaks (1)

84 Using ICT Systems 7.1: How ICT is Used 7.2: Troubleshooting

85 Using ICT Systems Using Systems Switch User Log on as someone else.It is important to use the correct procedures when switching a computer on and off: Switch User Log on as someone else. Log On/Off Log yourself out of the OS, but leave the computer on for someone else. Shutdown Completely turn off the computer. Restart Switch the computer off and back on again. Sleep Put the computer into a ‘semi-off’ state which is quick to open again. Hibernate Power-saving state which saves open documents and programs before switching off. Lock Requires your password to return to normal operation. Extension: explorer where these options can be found on multiple operating systems.

86 Using ICT Systems Folder StructureTREE – the structure of saving, often involving files within folders. PATH – following a file saved from source to destination. An example of a path is: C:\Users\Joe\MyDocuments\GCSE\ICT\B061\B061_Complete.ppt

87 Using ICT Systems FilenamesA filename consists of the actual name and the extension, which denotes the program used to open the file. Examples of extensions include: .docx – Microsoft Word .jpeg – Paint, Adobe Photoshop… .mp3 – Windows Media Player .css – Adobe Dreamweaver When naming a file or folder, the name should always be reflective of its contents. This allows you to easily find saved files, and prevents accidental deletion.

88 Using ICT Systems Troubleshooting Symptom: Problem: Solution:Blue Screen Hardware failure Reinstall or replace the faulty part. No display Loose cable Properly plug in the cable to the correct port. Software freeze Not enough CPU or RAM available. Ctrl-Alt-Del then end the process. Endless looping at system start-up. BIOS attempting to load OS from removable storage media. Unplug all removable storage devices. Files do not print. Paper jam Gently pull out the offending piece of paper.

89 Monitoring and Control8.1: Sensors 8.2: Data Logging 8.3: Controlling Devices

90 Sensors Monitoring and ControlSENSOR – a device which measures a physical quantity. Sensors almost always record data in analogue form, and so the data has to first be converted before it can be processed by a computer system. Common quantities which sensors measure include: Temperature Light Pressure.

91 Data Logging Computer Interface Box Sensor Monitoring and ControlA computer is attached to a sensor and is left to collect data over a period of time with little to no human intervention. ADVANTAGES: DISADVANTAGES: Fast and accurate readings. Interference can affect the data. Functions constantly. Equipment can be expensive. Can be used remotely and in hazardous environments. Only a single link in the chain has to be broken for it all to fail.

92 Device being controlledMonitoring and Control Control-Feedback Loop Computer Interface Box Sensor Device being controlled Control Data is first collected by the sensor. This is sent to the computer as normal through the interface box. The computer analyses this data and uses it to produce an appropriate output through the device being controlled. Example: a joystick controlling a robotic arm.

93 Monitoring and ControlControl-Feedback Loop This diagram shows a ‘real-life’ control-feedback loop – the reflex arc of your own body!

94 Monitoring and ControlControlled Devices Across from top-left: hover drone, LEDs, speaker, hydraulic arm and a motor.

95 Explain how a control-feedback loop works. (3) Monitoring and Control Worked Exam Questions Explain how a control-feedback loop works. (3) State 2 examples of devices which can be controlled. (2) Question 1: Data is gathered by a sensor (1), and then sent to the computer. The computer analyses the data (1) and uses it to produce an appropriate output through the controlled device (1). Question 2: Any 2 for 1 mark each: Buzzer Light Actuator Etc.

96 ICT and Modern Living 9.1: Online Services 9.2: Employment9.3: Collaboration 9.4: The Internet 9.5: Leisure 9.6: The Future of ICT

97 There are some questions around security of data.ICT and Modern Living Online Services Banking Shopping PROS 24/7 access to financial services. Small businesses can thrive due to reduced costs. Convenient as banking can be done without leaving the house. Those with disabilities can manage their lives, giving them independence. CONS There are some questions around security of data. Services do not always function and can be offline for long periods of time. High-street retailers can be forced to close due to a lack of business. Extension: research amongst family and friends what online services they use and what pros and cons they have experienced when using them. Then take the results of the survey and store them in a suitable database.

98 Employment ICT and Modern LivingThe increased use of ICT in workplaces have led to changing patterns of employment: Increased working from home. Tasks have been made faster and easier. Roles with flexible hours are ever-more common. Some sectors have seen increased unemployment.

99 Collaboration ICT and Modern LivingICT allows people to work more collaboratively and more easily, for example with the use of project management software. Shared workspaces, communications technologies and workflow tools also aid people in working collaboratively. Videoconferencing also allows people to work collaboratively: ADVANTAGES: DISADVANTAGES: Meetings can be arranged quickly at short notice. Reliant on broadband and other technology which can fail. No need to travel. Different time zones can interfere. Can see a person’s body language on video. All parties require the correct hardware and software.

100 The Internet ICT and Modern LivingINTERNET – a worldwide network comprised of LANs and WANs with no central governing body and no control over the content on it. There are several hazards of using the internet, including phishing scams and malware. However there are always 2 sides to using ICT: ADVANTAGES: DISADVANTAGES: Vast amount of information available 24/7. Cannot guarantee the reliability of information. Easily communicate with others. Lack of central control. Helps to prevent information from becoming lost. Ideal platform for dangerous or illegal information.

101 Leisure ICT and Modern LivingHow has ICT changed the way that people spend their leisure time? People may interact face-to-face less. Increased use of ICT devices for chores. Use of computers for research. Health implications – back problems, eyestrain. Health related uses – training, measuring parameters. Do not have to travel for entertainment. Stay in contact with friends over long distances. Harder to ‘switch-off’ and de-stress. Sort these into positive and negatives, giving a reason for your choice.

102 Leisure ICT and Modern Living PositivesIncreased use of ICT devices for chores: Which frees up time for other pursuits. Use of computers for research: Find a range of relevant information faster and with more convenience. Health related uses – training, measuring parameters: Help keep fit more easily. Do not have to travel for entertainment: Which makes it easier and more convenient. Communicate with friends over long distances: Stay in contact despite the physical divide. Negatives Harder to ‘switch-off’ and de-stress: Can lead to stress-related illnesses. People may interact face-to-face less: Leading to greater social reclusion. Health implications – back problems, eyestrain: Depends on the implication but generally can lead to great pain.

103 The Past of ICT ICT and Modern LivingThe Manchester Mark 1 – world’s first stored-program digital computer, circa

104 ICT and Modern Living The Past of ICT The Macbook Air –2014.

105 The Past of ICT ICT and Modern LivingIt took just 65 years to go from a computer the size of a building to one that you can keep in your bag (!)

106 The Future of ICT ICT and Modern LivingClip 1 Clip 2 What outlooks on the future of ICT do the 2 clips show? How are these outlooks different? Clip 1: https://www.youtube.com/watch?v=PKwq7b2i-vc – The Matrix (1999) Clip 2: https://www.youtube.com/watch?v=v1uyQZNg2vE – Google Glass advert

107 The Future of ICT ICT and Modern LivingResearch and make notes on the following topics: Google Glass Artificial Intelligence Oculus Rift Cyber Warfare. Make sure that your notes include: What they are Any positives of them Any negatives of them How they might affect the way we live our lives. Then also make a note of how you have conducted your online research and add these to your notes on ICT and education.