OCR GCSE ICT short course
B061 ICT in today's world ICT systems in the home, at school and in society. current and emerging technologies and the impact that advances in technology may have on people.
- Created by: berthile
- Created on: 22-05-11 12:32
Systems
Components of computer system:
CPU (Central Processing Unit), internal/main memory (primary storage), backing storage (secondary storage), input / output devices and power supplies
Microprocessor technology:
palm top & PDA, laptop, PC, mainframe computer, super computer, embedded systems
See notes for pros and cons of each system
Difference between hardware and software:
hardware is the physical components, software is instructions and program
Hardware
Input devices: keyboard and pads, mouse, joystick, tracker ball, touch pad, microphone, remote control, scanner, digital camera, web cam, touch screen, bar code reader, magnetic stripes, chip & pin, sensors, MIDI instrument
Output devices: monitor/screen, printer, speakers, head/earphones, digital projector, plotter, activator
Storage devices: hard disk, optical storage device, magnetic tape, drives, flash memory devices
Communication devices: modem, router, hub, network interface card
Find out what each device is used for:
Find out the pros and cons of each device:
Presenting information
Types and purpose of different ways of presenting information:
word processing and DTP software, slide show, multimedia and web authoring software
The use of ICT teools and features/facilities for presenting information:
efficiency and quality of work, ease of transfer
See provided notes on the above
Integration between and within software applications:
integrating sections from one application into another, charts, tables, original graphics from programs into word processing files.
Manipulating data
Data types: alphanumeric, text, numeric (integer, currency, percentages, decimal, fraction), date/time, limited choice (drop-down list, radion buttons, tick lists), object, logical/Bolean (yes/No, Male/Female) types
Design of file structures: folders, subfolders, filenames, file types, paths, how encoding affects data entry and retreival
Design of data capture methods: pros and cons of usin data capture and collection methods: forms questionnaires, online forms, chip and PIN, OMR, barcode reader, voice recognition, biometrics and RFID tags
Validation: range, type, format, presence, parity check and check digit
Verification: batch totals, hash totals, double keying, visual checks
Data handling software1
Features of spreadsheet software: cell, cell reference, row, column, show/column labels, enter edit cell content, key field, cell grid-lines, cell ranges, replication, formation, merging cell, formulae, functions, automatic recalculation, sorting rows/column, graph/chart, creation and development to suit numerical information (bar/pie chart, line graph, scatter-gram and use of scale, title axis title, key legend), layout of worksheets and linked sheets.
Features of modelling software: how data model may be used to answer 'what if' questions and the benefit of being able to answer such questions.
Data modelling: 'what if' questions, formulae, functions, variables, modelling different scenarios, verification of results (accuracy and plausibility)
Data handling software2
Features of database software: field (column) and record (row), field names, key field (unique), primary key, file; create a database, insert/delete field/records, enter and edit field contents, organise and select records, view databases structure, control the content of reports by selection of fields and use of headings, control the format of report (header and footer) creation & development of charts/graphs
Typical tasks for which data handling software can be used: organising data, collecting data, amending existing data, deleting redundant data, select/search/filter records, sort on one or more fields (in ascending/descending order)
Database and Spreadsheet: Relational vs Flatfile database:
Emerging data handling applications: models for financial forecasting, queuing, weather forecasting, flight simulators, expert systems for decision marking.
Keeping data safe and secure
Backup and archiving: backing up data/programs, keeping information archives safe, use of backing storabe media
Secure and safe practices using ICT: protecting data from accidental destruction, and deliberate damage User Security methods and devices: user IDs, password, encryption, restricted physical access (eg biometric scans, electronic passes), restricted access to data (eg hierarchy of passwords, access rights, encryption), monitoring (transaction logs, key logging software)
Maliscious software and damages it can cause: viruses and other malware Minimise risk of damage: anti-virus software, firewalls, malware detection
Avoiding loss/disclosure of personal data to unauthorised users. Data encription and when / why it is used: The translation of data into a secret code. used for data security, autehtication of digital signature when data is vital.
Legal, social ethical and environmental issues whe
Legislation and use of ICT: Computer Misuse Act, DPA (Data Protection Act), copy right design and patents act etc
Issues related to prolonged use of ICT: stress, eyes problems, wrist problems, RSI (Repetitive Strain Injury), back and neck problems
User interfaces design: good design and their impact on the health of users
Effect of ICT systems on the life experience of disabled people: screen filters, voice recognition software, text to voice software, customised desktop environments, Braille keyboards, specialist input devices, communication and control device, software accessibility option
Legal, social ethical and environmental issues whe
Safety issues related to using computers and measures to prevent accidents:
taking breaks, appropriate lighting, eyes tests, wrist rest and other support devices, adjustable seating, monitor positioning, avoid hazards, electrical safety measures
Environmental impact of digital devices:
their use, deployment, recycling and disposal
Social and ethical implication of the electronic transmission of personal information:
monitoring/detecting loss or corruption of information, preventing the abuse of personal information, the purpose and costing of national databases, national ID card, CCTV, government access to personal data, the surveillance society
How ICT systems are used
start, access, exit and shut down ICT systems
selecting and adjusting system setting and user preferences
selection and use of user interfaces
management of folder structure and files for safe storage and retrieval of information
Networking: types of network, components and pros and cons of networks
Troubleshooting
Common problems encountered when using ICT:sotware freeze, error dialogues, storage full, paper jams, hardware malfunction
Toubleshooting activities: hardware, software troubleshooting
Difference between hardware and software problems and solution
Monitoring, measuring and control technologies
Types of sensors and their use:
sensors and actuators for visible, tactile audible and other physical signals
Pros and cons of computetrised data logging: ...
Writing a sequence of instructions to control a screen image or external device:
light buzzers, sound or turtle, using repeated instructions, procedures and variables
Use of ICT to control and monitor areas of everyday living:
applications that utilise data logging and control, analogue-digital conversion, control and feedback loops and the associated hardware and software
ICT and modern living
How ICT systems change people's life:
communication, shopping, gaming, entertainment, education and training, banking and financial services, social networking, online/remote working, pros and cons and dangers of using ICT/Internet
The impact of emerging technologies on organisations:
artificial intelligence, robotics, biometrics, vision enhancement, computer-assisted transaction, quantum cryptography, 3D and holographic imaging, 3D printing, virtual reality
Software
Systeme software: Operating systems, utility software, drivers
Application software: word processor, DPT (DeskTop Publishing), spreadsheet, DBM (DataBase Management), multimedia, slideshow, web authoring, photo-editing, video-editing, slideshow graphic manipulation software
Programming software: compilers, debuggers, interpreters, linkers, editors
File types used to support: document (.doc. .ppt etc), image (gift, vector, jpeg), audio (wave, MIDI, mp3, mp4), video (mpeg ...), executable (.exe)
See notes provided for pros and cons and appropriate use of applications software
Communications a
Communication services: voice telephones, SMS (text msgs), instant messaging, fax, email, chat room, forums, bulleting boards, Voice-over-IP (VoIP), video conferencing .
See provided notes for pros and cons different methds of communication
Sharing, exchanging and managing information: Sharing files: (file naming conventions and online safety version control), secure transfer / access (read/white permission) of data.
Safe / responsible use of communication services: showing respect towards others, complying with data protection regulations, staying safe (disclosure of personal data, appropriate use of images and language)
Communication software: web browsers, email software, messaging and file transfer
Communications b
The use of the Internet: communication, commerve, leisure and information retrieval
Controlling ICT systems remotely: remote control / access to computer systems
Monitoring and tracking systems: worker monitoring/loging (key logging, worker call monitoring/recording software), cookies, electronic surveillance, mobile phone triangulation, autimatic number plate recognition, CCTV cameras
Emerging connection/communication technologies: wireless, WiFi, mobile technologies, Bluetooth, GIS (Geographical Information System)
Comments
Report
Report
Report
Report