Vous êtes sur la page 1sur 64

APPLIED ICT NOTES

BY
USMAN FAROOQ BUTT

CHAP 1 AICT

SM

FA

BU

TT

ICT SYSTEMS

USMAN FAROOQ BUTT

CHAP 1 AICT

SM

FA

O
O

BU

TT

ICT SYSTEMS

USMAN FAROOQ BUTT

CHAP 1 AICT

SM

FA

O
O

BU

TT

ICT SYSTEMS

USMAN FAROOQ BUTT

CHAP 1 AICT

ICT SYSTEMS

Portable communication devices :

SM

FA

O
O

BU

TT

Mobile phones
Different aspects include text messaging, phone calls, sending photos, sending videos,
emails, use of the Internet as well as eventual use of live streaming of television programmes.
Are used for communicating personally and for business use in remote areas and whilst
travelling. Uses of sending photos and videos as well as video calls in addition to voice calls.
Used for sending urgent messages which dont necessarily interrupt business conferences.
Portable DVD players
These work in an identical fashion to ordinary DVD players but are built to a smaller scale
and are therefore portable. Used as in car entertainment in addition to any other on the
move activities. Tend to be used for personal use rather than in business.
Portable media players (MP3 players)
Used to record data and play it back. e.g. music, computer data, Internet downloads etc.
Apart from personal use where they are taking over from other portable music devices they
tend to be used in business computer applications. Personal use enables the downloading of
music and radio/television programmes. They can be used for downloading data from the
Internet or the movement of large amounts of data from one computer to another in a
similar manner to memory sticks.
Global positioning systems
Used to pinpoint positions on the earths surface and send this information back to GPS
receivers. These are used in navigation and for accurate pinpointing of position for entry into
geographic information systems. Can be used to accurately pinpoint positions of enemy
artillery etc.
Satellite navigation systems
These are just an extension of GPS to produce routes for cars, lorries etc. Used to produce
routes for car and lorry drivers. They are being experimented with in the routing of trains
Personal digital assistants
These come in many forms even as mobile phones. They usually come with word processing,
database, and spreadsheet and scheduling software. They are used to store addresses, phone
numbers, and e-mail addresses, to-do lists. They can take notes, track appointments and
perform calculations. Used by professionals who tend to be on the move. For example,
doctors on call, engineers on site, travelling salesmen etc. They tend to be more convenient
than laptops where users who are remote from desktop computers still have access to phone
lines etc.
Bluetooth devices
These come in many shapes and sizes, these only work over short distances because of the
weak signals. These are used for purposes where physical linking of computers or devices is
impractical. Used for operating mobile phones when hands free operation is essential such as
in cars, whilst using computers etc
Handheld computers
These cover all aspects of small computers such as mobile phones, PDAs but extend to the
use of such devices where greater computer power is required rather than that just for
business/office based activities. Used mainly in areas where stand alone or network
computers are impracticable. Areas where power supply is variable are typical users of these.
They are also used for environmental studies in uses where portability is key.
Barcode check
A calculation is performed on a long series of digits to produce another digit
This digit is then added to the end of the string.
The computer re-calculates the digit when data is entered
To check whether it gives the same result.

USMAN FAROOQ BUTT

BU

TT

Explain how a Satellite Navigation (Sat Nav) system operates.


Driver enters destination address
Satnav provides instructions/gives turn by turn for driver/calculates route to reach address
Satnav refreshes screen frequently
Informs when arriving at destination
Offers additional information such as delays/eta/can take into account traffic conditions
can show distance travelled
Relies on signal from satellites which can be blocked
OR
Uses Global Positioning System (GPS)
Satnav reads data from satellites
Use of data from (minimum) 3 satellites
Uses time stamps/codes from satellites
Maps stored on device
Calculates position, speed and direction
Generates display data to show on map
Loads voice files to state message

SM

A
N

FA
R

O
O

Benefits:
Traffic can be avoided with suggested alternative routing
ETA can be given
Multi destination routes can be optimised
Can have pre-planned route for drivers
Can be used to help track the progress/route of driver/car
Distance travelled by cars recorded for download into computers (servicing)
Gives more precise instructions for driving to destination
Could be used to attract customers as can be used in advertising
Can be used to help locate vehicle/customers if problem with car
Drawbacks:
Can be expensive to install and maintain/keep up to date
Must be able to detect enough satellites to operate
Sky scrapers/trees/buildings/tunnels/large structures can block satellite transmissions/signals
Units can fail leaving drivers without a plan
Drivers can become too reliant on the system
Customer may not know how to operate the device

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

CONTROL SYSTEMS:

BU

TT

Refrigerator:
Parts and their Functions:
Condensing unit allows refrigerant to cool/cools gas to form liquid and is situated at rear of
refrigerator.
Evaporation unit absorbs heat from surrounds thereby cooling it and is situated inside
refrigerator.
Use of microprocessor:
Temperature sensor monitors temperature inside the refrigerator. Contact switch/pressure
sensor fitted to the door. (Number pad) fitted to input the required temperature. Data from the
sensors converted to digital using an ADC. (Microprocessor) compares temperature data from
the sensor with the pre-set value. If the temperature is higher/lower than preset value a signal is
sent to the actuator. (If higher) actuator switches the compressor on or (if lower) actuator
switches the compressor off. Digital to analogue conversion required. Microprocessor sends
data to LEDs indicating the current refrigerator temperature. Microprocessor compares data
from pressure sensor to zero. If it is zero, microprocessor sends a signal to the actuator to switch
the buzzer on. Timer to calculate how long the door had been left open.
Different size of machines and different temperatures would be required in Supermarket
chillers, freezers, wholesale butchers and breweries.

A Valve
B Evaporating unit
C Compressor
D Condensing unit

SM

A
N

FA

O
O

Air Conditioning System:


Diagram:

Function of Microprocessor:
The system controls the amount of heat being let out of the system. Pressure sensor located
between the condensing unit and the valve. The valve is controlled by microprocessor to reduce
or increase the flow of refrigerant. Microprocessor compares the pressure of the refrigerant to
the pre-set value. If pressure of refrigerant is above preset value microprocessor opens valve
wider. If pressure of refrigerant is below preset value microprocessor makes valve opening
narrower. Touch screen is used to input the required temperature. Microprocessor compares the
temperature of the room to the pre-set value.
If temperature of the room is above the pre-set value the fans remain on/are switched on by
microprocessor or microprocessor increases their speed. If temperature of the room is below the
pre-set value the fans remain/switched off by the microprocessor.
Programmable logic controller (PLC) & Proportionalintegralderivative (PID):
They are used to read a set of digital and analogue inputs, apply a set of logic statements, and
generate a set of analogue and digital outputs. In controlling temperature, the room
temperature would be an input to the PLC. The logical statements would compare the pre set
value to the input temperature and decide whether more or less heating was necessary to keep

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

the temperature constant. A PLC output would then either open or close a hot water valve
depending on whether more or less hot water was needed.
PID is a proportionalintegralderivative algorithm. Used when preset value is a constant. PLC
stores preset value of temperature. Temperature is input from sensors. A set of logic statements
is used. PID causes the PLC to make proportional changes to the temperature by switching the
compressor on for short periods of time. PLC/PID is used to compare temperature with a preset value. PID calculates difference between the input value and the preset value. If below, PLC
switches heating element on/switches off compressor for a short time. If above, PLC switches
heating element off/switches on compressor for a short time. PLC/PID checks the difference
again. If still below, PLC switches heating element on for a short time. If still above, PLC
switches off compressor for a short time. Until preset value is reached

BU

TT

Medical use (ICU):


Patients condition is monitored using microprocessor/computer and sensors. Sensors used to
monitor blood pressure, pulse rate, body temperature. Sensors feed back body functions to the
microprocessor/computer. Values are converted from analogue to digital.
Microprocessor/computer is pre-set with the normal range of values. Microprocessor/computer
is (constantly) comparing the data fed back by the sensor .to these pre-set values. If any data is
outside the pre-set range the computer sounds an alarm. The process is continuous.

FA
R

O
O

Car Manufacture And Robots:


Functions of different parts (End effector):
Cameras to inspect work. Welding guns to weld parts of the car body together. Grippers to pick
up parts and place them somewhere else. Vacuum cups to pick up parts. Drills to make holes in
the car body. Screwdrivers to place and tighten screws. Spanners to place and tighten nuts.
Riveters to place and tighten rivets. Spray guns to paint the car body. Polishers/finishers to
produce a shiny finish after painting. Sanders to prepare body for painting. Pressure sensors are
used to tell the computer whether the effector is being held firmly enough or too firmly.

SM

A
N

Programming a robot:
The programmer controls the robot physically/manually. The programmer guides the arm
through each step by physically holding the arm. The programmer has sensors attached to
his/her arm. The sensors allow data to be transmitted back to the computer.
The programmer can also use a remote control. The programmer guides the arm through each
step by using a remote control (handheld controller) .
The computer stores the sequence of movements as a program in its memory.
Advantages of robots:
After initial expenditure its cheaper to operate robots/lower running costs compared to paying
a human. They can work for long periods of time on one task. They work continuously as they
dont strike/take holidays/have shift changes. Health issues reduced for workers. Safety issues
reduced for workers. Can lift heavier objects than a human/more than one human may be
needed to lift a box. Greater accuracy than humans. Consistent standard as they dont get tired.
Disadvantages of robots:
Setup and maintenance costs. Is unable to cope with unusual circumstances
Staff need to be retrained leading to higher costs and loss of workers for a period of time
Robots in Loading:
The robot stores the process in its memory. Light sensor detects presence of hardware.
Processor initiates process. Motors move arm into position. Grabber is used to hold hardware.

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Microprocessor uses data from pressure sensor to ensure grip is not too tight. Motors move arm
to lift weight onto lorry. The robot uses sensors to make sure it moves just the right amount.
Batch process control.
Some applications require that certain amounts of raw materials are combined in specific ways
for particular lengths of time. An example is the production of adhesives and glues. These
normally require the mixing of raw materials in a heated vessel for a period of time. This results
in a glue or adhesive being produced. Other important examples are the production of food,
beverages and medicine. Batch processes are generally used to produce relatively small amounts
of the product per year.
e.g. Food mixing process: Raw materials are mixed for a certain length of time. Amount of
each ingredient is controlled by computer. Length of time for each stage controlled by computer.
Temperature controlled by computer

BU

TT

Discrete process control.


This is when specific items are produced like the wheels of a car.
e.g. Food packing process. Like an on/off or stop/start process. The computer control
involved in putting mixture into cartons is discrete. In between cartons the robot pauses/stops.
A carton is packed, the next carton comes along, the robot packs it exactly the same

WORKING PRACTICES:

FA
R

O
O

Continuous Process Control:


The control of the water temperature in a heating jacket, for example, is an example of
continuous process control. Some important continuous processes are the production of fuels,
chemicals and plastics. Continuous processes, in manufacturing, are used to produce very large
quantities of product per year.
e.g. Food processing industry Used in storing process. Used in processes which appear to be
unending. Temperature has to be maintained continuously

A
N

Teleworking: Working at a distance from your employer, either at home, on the road, or at a
locally-based centre

SM

Advantages to Employer:
Dont have to spend so much on air conditioning/heating. Dont have to rent or build large
offices/can build or rent smaller offices. Dont have to pay travelling expenses for conferences
(video conferences will be used).Greater income from increased productivity due to more
content workforce, improved motivation skills, retention, flexible staffing and improved
customer service.
Advantages to employees:
Dont have to spend money on fuel/transport travelling to work. Time is not wasted
travelling/more free time because of less travelling. Dont have the stress of travelling to work in
rush hour .Can spend more time with their family/can arrange their work schedule to suit
themselves.
Disadvantages to employer:
Difficult to keep track of projects/workers. Have to subsidize workers computers. Some
companies have management systems and cultures that are not (yet) well adapted to the
flexibility. Not all tasks are best performed in a self managing environment

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Disadvantages to employee:
Miss the personal contact with colleagues/more difficult to discuss ideas with colleagues. Home
based telework is inappropriate for some people. Many homes are not well equipped for some
kinds of telework.
Social and economic benefits
Reduced traffic congestion, reduced total travel and consequent pollution, wider employment
/work opportunities, access to work for people with specific difficulties and economic
regeneration.
Personal qualities to be able to telework:
Be well motivated. Have good communication skills. Have good self-discipline/doesnt require
supervision. Have good time management skills/can meet deadlines. Be well organized.

BU

TT

Hardware Requirements:
Broadband connection/router to connect to the internet to send emails to company. A fax
machine to send/receive documents. A landline/mobile phone to communicate with colleagues.
A printer to print documents and for faxing. A scanner to input documents so they can be sent
as email attachments. Video conferencing hardware to communicate with other workers.

FA
R

O
O

Video Conferencing:
Manage a Video Conference:
Delegates agree a date and time. Send a reminder shortly before start including access to
password/PIN. Ensure webcam, microphone and speakers ready. Carry out tests on microphone
and speakers/headphones. Adjust webcam so teacher can be seen. Log on to the Internet
Ensure video conferencing software/internet connection is running properly/installed. Create
room(s)/environment. Enter virtual room. Communicate by speaking into a microphone.
Looking at the webcam. Load/examine/share documents using appropriate software. Discuss
modifications or additions to the documents.

SM

A
N

System Requirement:
PC (with mouse and keyboard). Monitor. Speakers/headphones to hear other delegates.
Broadband network connection/router. Webcam so images of each delegate can be transmitted.
Microphone. Assemble equipment/load software/access the internet/connect to the internet.
Need to log on to system/conference. Webcam normally fixed to top of monitor/moved to
ensure delegates can be seen. Communicate by speaking into the microphone. Communicate by
looking at the webcam. Examine documents using normal software/share documents using
conferencing software. Discuss modifications to documents and physically make amendments.
Advantages:
You can see the facial expressions/body language of other participants. It is cheaper to set
up/operate/organise than a phone conference. You can see/amend/share documents that you
want to discuss with each other. Easier to identify whose turn it is/who wants to contribute next.
Phone conferencing:
The conference is booked with the phone company. Organiser is given two PINs, own personal
PIN and participants PIN. Organiser tells participants their PIN and organiser dials number and
enters own PIN. Each participant dials a common number and enters a PIN to join conference.
All participants need a touchtone phone.

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Mobile/cellphone:
Can be used to contact one recipient and to text to many recipients
Use VOIP:
Connect to internet and logon to system call number of recipient(s) and speak with recipient(s)
Use laptop/PDA
Can be used to send email
Instant messaging
Log on to email provider/instant messaging software. Send message to other recipients/Send
group emails and ask for immediate response.

BU

TT

Fax Machine
Fax machine is connected to a phone line. Other persons fax machine number is dialed. The
data is scanned then transmitted through phone lines and printed by other persons fax
machine. Speed of transmission is slow. The quality of the print will not be good. Recipient can
only receive one print at a time. People sending prints might be unable to as the line might be
busy.

FA
R

O
O

Electronic fax Machine


Saves time/trouble of going to the fax machine to retrieve/send faxes. Equipment costs are
lower as there is no need for a dedicated fax machine/phone line. Confidential faxes are more
secure whereas on a manual fax any worker could pick it up. Faxes can be downloaded
remotely/dont have to be in office to receive faxes. It is easier to send to many recipients at the
same time.
ADVERTISEMENT:

SM

A
N

Product advertising
The advertising of a single product such as car/computer/chocolate bar/soft drink etc.
Business advertising
The advertising of a single company name such as (any reasonable example of a type of
company).
Service advertising
The advertising of services such as insurance/government/tourism/banking etc.
Others WEBSITES:
It is cheaper than paying/employing a programmer/designer to create/maintain it. A Pop-up
instantly grabs the attention of the customer. Pop ups may create unhappy customers who may
avoid that company in future and this will have poor impression of the company/will tend to
ignore them. Customers will use pop-up blocking (software) which doesnt allow them to appear.
Pop-unders are small windows placed underneath the web page being accessed. Dont appear to
users until they close the page they are working on. Are not removed by pop-up blocking.
The customer regards pop-unders as less of an inconvenience than pop-ups. Pop-ups and popunders can both be linked to the organisations own website. Can make their own website better
suited to their needs. Own website has shorter delay in updating/improving advertising.
Company doesnt have as much control over the hosts website as it would over its own. May be
so many other companies advertising on host website the companys may not be seen/not as
much advertising can be used/limited space available. More people may see it if its on someone
elses website.

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Software and Hardware in creating website:


Web authoring package to create web site. Word-processing package for typing text /tables etc.
DTP for creating pages for website. Spreadsheet to create statistical tables/graphs for inclusion
in the website. Database to create files of data for inclusion in the website. Communications
software to connect to Internet. Web browser to see how the web site appears to users. Software
for editing scanned/downloaded images.
Graphics tablet to input drawings/designs. Scanner to scan (hard copy) images/text.
Microphone to create voice overs/ input engine sounds. Video camera to create/input videos for
including in website. Video digitiser to input videos (from an external source). Digital camera to
take photographs/upload photographs. Midi instruments to input background music/theme
tunes

BU

TT

FLYERS:
Can be produced using own PCs and printer. Flyers usually produced using DTP/Word
processing software Flyers are leaflets given out to individuals/households. Flyer doesnt take
very long to produce. You can distribute them so that they only go to the people you want to see
them. Flyers are often just thrown away and ignored. Flyers can take longer time to deliver once
printed. It is a cheaper method than creating a web page/paying a company to advertise on their
website/advertising on local radio/television. Prospective customers may not have
computers/internet/regular electricity supply. You can target specific groups/cant guarantee all
the intended audience would see a poster/web site.

FA
R

O
O

POSTERS:
Posters are much large (possibly A0). Flyers are leaflets given out to individuals/households.
Posters are put in strategic locations. Posters more likely to be produced using Presentation
software. Posters require specialised printer. Posters will not necessarily be noticed by
everybody/are in a fixed location. Posters are more permanent/difficult to ignore once noticed.
Takes less time to put up a poster.

SM

A
N

PHONE:
Can be sure all targeted customers are reached. It is more personal so will attract customers. It
is more interactive/questions can be answered immediately. Can see immediately how
successful advertising campaign is/know reasonably accurately how many customers they will
have. Easier to persuade customers to purchase items. Can contact customers who dont already
have a computer so would not see the website/can. Contact customers whose internet speed is
so slow they are reluctant to use it and so might not see the website.
WEBSITES:
Use of the internet. Produced using web authoring software A cheap form of advertising
nationally and internationally. More expensive initially to have own website - web designer has
to be employed and can be can be expensive to maintain. Can produce a website to own
specification. Website has more features than most other forms. Has range of multimedia sound, video/ animation,(text, images). Can have hyperlinks to other sites/pages. Websites are
easier to update as you dont have to reprint many copies. A much wider area/potential
customer base is covered cheaply by using a website. A much wider area/potential customer
base is covered by using a website. Websites create better impression with customers. Helping a
website to become popular is the use of free advertising on the Internet by making the most of
search engines. This requires features such as the inclusion of good spelling, the use of metatags.

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Multimedia Presentations:
Multimedia presentations/slide show - used on purpose-built display monitors placed in
strategic locations. The presentation/slide show is produced using presentation software. Has
range of multimedia - sound, video/ animation,(text, images). Other features e.g. slide transition
effects, special text effects, image transition. Always on while mall or store is open. The user
cannot switch it off. Quicker to update than an Internet site or television commercial
Presentations have multimedia features. Presentations are easier to update as you dont have to
reprint many copies.
Slide Shows:
Sound could be used in voiceovers/welcome from manager. Soothing background music to
create a comfortable feel to the website. Video of demonstrations of the products/recordings of
satisfied customers. Animation to demonstrate products. Hyperlinks to navigate between
slides/link to companys website. Navigation button to navigate between slides/return to start

O
O

BU

TT

E-MAILS:
E-mail to customers. Use of attachments may dissuade customers from reading the
advertisement. Customers may treat it as junk mail and so not read it. Specific customers can be
targeted. Attachment can be created easily using DTP. DTP allows character shapes, variety of
patterns, colours. Can be sent to world wide audience. Easy to create an email and mailmerge.
Emails may be mistaken for spam. Email addresses may be difficult to collect. Easy/cheap to
send same message to many people at the same time.
TEACHING & LEARNING:

SM

A
N

FA
R

Computer Assessing Students performance:


Student records responses on OMR. Computer scans OMR. Computer asks questions of the
students. Student inputs responses on computer. Responses are compared with stored answers.
Assessment can be either formative or summative. Summative is responses are recorded and a
total mark awarded. No suggestions for improvement are provided. Formative uses the results
of students answers to form a judgment on progress. Areas for improvement are provided to the
student. On screen marking is used by examination boards. Scripts are scanned into the system.
Examiner logs on and marks script online. Manual marking still requires examiners to submit
marks using OMR forms. Teacher can enter marks into a spreadsheet/database. Can chart
results to show progress/comparative performance. Mark for each question is saved to
candidates record. Marks are totaled and saved to candidates record.
CAL (Computer Aided Learning):
Use of computers as learning resource/teachers can use email to send resources to students/can
put them on the school intranet. Does not replace the teacher. Part of an integrated approach to
teaching. Learning technology is only part of whole approach. Should be integrated with text
books, worksheets. Teacher is still in control/takes responsibility for where learning will go.
Students investigate and research using computers. Use of DVDs/interactive whiteboards
/(multimedia/overhead) projectors/televisions. Sometimes use overlay keyboards.
CAI (computer aided instruction)
Involves the computer taking over the whole learning process. First of all the computer assesses
the students ability with a pre-test. The materials are presented in a manner which makes it
easy for the student to navigate from page to page. It provides repetitive drills to improve the
student's command of knowledge as well as providing game-based drills to increase learning

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

enjoyment. It assesses student progress with a test at the end of the lesson as well as recording
student scores and progress for later inspection
CAA (Computer aided assessment)
This is now considered to be the use of computers to test students and to assess their progress.
This can either be in a summative manner or in a formative manner. Summative assessment is
the assessment of a student and giving them a mark or grade. An example of this type of
assessment is the on-line assessment being used by the Qualifications and Curriculum Authority
who are piloting the testing of students in ICT at the age of 14 in the UK. Pupils take two fifty
minute tests where they are asked a variety of questions and have to perform a series of tasks.
These are assessed and a level is then produced. Formative testing tests the ability of students
but tells them what they have learned and what weaknesses they have and it also suggests ways
in which they could improve. Any grade or mark resulting from this form of assessment tends
not to be as important as the formative judgments.

FA
R

O
O

BU

TT

Use of Spreadsheets:
Separate sheets can be used to store information about different classes. Store test marks, exam
marks, predicted grades, targets and attendance records. Scores can be plotted in graphs. Used
to chart progress. Grades/percentages can be calculated from raw scores.
Statistics/averages/totals can be calculated, percentage attendance/number of days
attended/number of days absent, difference between target grades and actual performance can
be used. Conditional formatting/extra column used to show progress/underachievement/
overachievement. Cells formatted red for low achieving students/symbol placed in extra column
Cells formatted green for high/normal achieving students/different symbol placed in extra
column. Statistics can be used for comparison/results of all students can be compared
Data can be filtered to list best/worst performing students. Reports can be created. Reports can
be sent to head/parents/students using email/internet.

A
N

Summative assessment:
Is performed by the computer asking questions and recording responses. A total mark is
calculated/given by the computer. The teacher and student are informed of the scores by the
computer system. Computer offers no suggestions for improvement.

SM

Formative assessment
The computer asks questions and records responses. Computer uses responses to specific
questions to form a judgement on specific progress. The program normally outputs areas for
improvement.
Hardware and Software:
Speakers to hear output from presentation/websites. Overlay/Concept keyboard to select
options. Scanner to input hard copy research materials. Printer to printout assignments/notes.
Joystick to play games built in to CAI lessons. Video equipment to film practical activities as
evidence for coursework portfolios.
Database to record student scores. Spreadsheet to store data/to plot student progress charts.
Web browser to look up resources for worksheets. Word processing software to produce
worksheets/type up reports/prepare lessons. Presentation software to produce lesson
slideshows.
General use of ICT:
ICT make lessons more interesting/entertaining. ICT make lessons more varied. Internet allows
students to investigate ideas. Internet allows students to carry out research. Neatness of

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

students work makes it easier for teacher to mark. ICT provides more interactive learning
environment. ICT resources can help students with special needs. Teachers have more varied
teaching aids/can make use of multimedia in lessons. Teachers can use/produce computer
based tests/can use ICT to assess students performance. Teachers can use spreadsheets
/databases to record test scores/produce graphs of progress. Easier to compare class/students
performance. Tests can be computer-marked. Computers can provide feedback on tests.
PUBLISHING:

BU

TT

Typesetting
Kerning: The process of adjusting the space between individual letters in words.
Leading: The space between lines on a page
Importance: They need to be compatible with the size/type of font in the headings/headlines.
Font type needs to be easy to read. Font size needs to be small enough for stories to fit on a page.
Font size needs to be large enough to read.
Newspaper:
Method of process control:
Continuous process control. Used in processes which appear to be unending. Paper machine
would have continuous output of paper onto rolls. Manufacturing processes are used to produce
very large quantities of product per year.

O
O

Use of ICT:
Type up/edit story using word processor/DTP. Type up story using laptop. Import images from
digital camera/phone. Edit images using picture editing software. If using laptop, connect
Laptop to Internet using mobile phone/WIFI hotspot/dongle. Email story to editors office

FA
R

Editorial work:
Editorial staff (collect and) edit the stories to remove mistakes. Page layout of the newspaper is
created. Typesetting/fonts and font size chosen. Proofread for accuracy.

SM

A
N

Sending of newspaper:
Electronic signals are used to send the pages up to a satellite which transmits the signal to the
printing plant. Signal is received by the antenna/receiver and passed over to Computer-to-Plate
equipment.

Signal Processing / Facsimile transmission


Using satellite equipment. (Electronic) Signals are used to send the pages (up to satellite).
Which broadcasts the signal to each printing plant. Signal is received by the antenna and passed
over to Computer-to-Plate equipment. The digital signal is changed to a laser beam. A new plate
is created. The plate is then loaded on to the printing press.
Role of computers in plate making and typesetting
Layout of every page is designed. Appropriate font and font size chosen. Format chosen/leading
/kerning/widows and orphans. A digital "printer's file" is created for the entire document.
Transfer printers file by burning a CD/or over a network. Film negatives are produced from
digital files. Light is allowed to pass through the film negatives to expose the printing plate
The image is transferred from the negative to the plate

USMAN FAROOQ BUTT

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

TIME MANAGEMENT:

O
O

BU

TT

Usage:
Computer/software organises meeting times. Software used to keep a record of appointments.
Software provides alerts regarding imminent start of meetings. Software has a calendar function
which can be used as a diary. Software advises when clashes occur, arranging workload. Usage
reports give a breakdown of the time required or spent on individual tasks. By allocating times
for tasks realistically it is possible to ensure members of a team have equitable workloads.
Software contributes to the management of such projects by identifying project progress and
providing daily and weekly planning.
Advantages:
Software helps to ensure that project is completed within timescale and budget. Organises
meeting times. Provides alerts regarding imminent start of meetings. Can organise users tasks.
Makes it possible to ensure members of a team have equitable workloads. Provides a critical
path analysis. Identifies project progress. Helps daily and weekly planning. Can act as a
stopwatch device. Reminds the user how long they have been working on that task/how long
left. Enables user to see what emphasis is being placed on each task. Can be used to produce
Gantt charts. Help to plan out the tasks that are involved in a process. Graphically represent
progress in projects. Are used to plan the whole process including parallel and sequential
activities. Used to arrange tasks so that parallel tasks finish at the same time. Software has a
Calendar function. Calendar enables user to keep a record of his appointments/meeting times.
Advises user of/user could easily see any clashes (of meetings scheduled for the same time and
date). Public calendar identifies a suitable time for a meeting of all members of a team.

A
N

FA
R

Gantt Chart:
Tasks are arranged on Gantt chart so that the parallel tasks finish at the same time. Tasks are
arranged on Gantt chart so that sequential tasks start when previous task completed. Blocks of
days for each task are shaded in. Headings are dates. Identifies the critical path. Can identify
when it would be sensible to hold meetings. Shows key dates/start and finish dates. Indicates
which tasks have to be completed before the next task can begin. Can help to identify who is
available to work on a specific task.

SM

Critical path management means finding the optimum time to be spent on individual tasks.
Critical path is the order in which tasks must be completed so that the entire project is
completed on time.

Sequential activities which cannot take place until others have happened. Example design
of new system cannot take place until after the analysis of the existing system is completed
Parallel activities which are independent of one another. Examples such as interviewing
personnel and completing questionnaires/producing user documentation and technical
documentation.
Organising a meeting:
Open private calendar to see when user is free. Open the public calendar showing when other
workers are free. Identify a suitable time when user is free and when others are free/where there
are no clashes. Type in the details of the meeting. Notify others of time/date of meeting. Sets an
alarm to alert user when the meeting starts.

USMAN FAROOQ BUTT

10

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

Arranging workload
This is done by using task usage reports which give a breakdown of the time required or spent
on individual tasks. By allocating times for tasks realistically it is possible to ensure members of
a team have equitable workloads.
Research and development projects
Business software helps to support these projects with calendars, time scales and Gantt charts
Construction project management
Construction project management is not just specific to the construction of buildings. This
method of project management is now applied to different types of project. It involves a critical
path method of scheduling. The software contribute to the management of such projects by
identifying project progress and providing daily and weekly planning

BU

TT

PDAs:
Appointments are easier to organize. Reminders of appointments can be set automatically.
Makes it easier to retrieve/phone client phone numbers. Use project development software to
keep plan of action for each client. Can spread out appointments throughout the week. Can keep
in touch with clients/other workers using email. Can normally access emails wherever they are.

O
O

CALL CENTRES:

FA
R

Hardware:
A computer to process the calls and a telephone set/headset to speak with customers. A telecom
switch to enable the WAN to receive telephone calls. Computer to process the calls/look up
customer information/to record orders. Monitor to display customer/call details. Telephone
set/headset to speak with/listen to customers. Keyboard to type up details of the call/action
taken

SM

A
N

Software:
Computer telephony integration software. CTI software is used to combine the data and voice
input to the system. Calling-line information display such as caller's number/number dialed.
Software enables on-screen phone control such as automatic answer, hang up, hold, conference.
CTI software requires a dedicated telephony server. Software sends commands from a user's
computer to a telephony server. Software directs phone call to appropriate operator. Database to
hold records of calls/to provide link to stock/orders database. Database software to enable
customer orders to be input to the main computer. Database to hold records of calls/to provide
link to stock/orders database. Database software to enable customer orders to be input to the
main computer database
First-party call control
Allows operator to have a direct connection between their computer and the phone set.
Allows the operators computer to control the functions of the operators phone.
Third-party call control
Requires a dedicated telephony server to connect the telephone network and the computer
Network. Operators phone communicates directly with the server. The server controls all the
phones. The server can direct a call to the appropriate operator. Any computer in the system can
control any phone. Supervisors can intervene if the call proves too complex for the operator to
handle. First party is only suitable for small call centres.

USMAN FAROOQ BUTT

11

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

CTI
Used to combine the data and voice input to the system. Calling-line information display caller's
number, number dialed. Customer account information can be displayed. On-screen phone
control. Answer, hang up, hold, conference. Software sends commands from a user's computer
to a telephony server. Software directs phone call to appropriate operator. Multiple dialling
techniques/fast dial/ preview/predictive dial. 1stnd 3rd party.

O
O

BU

TT

IVR:
Interactive voice response software/software that does not require a human. Response
/automatic services such as account information can be accessed using the IVR software.
Caller is presented with an options menu. Option is selected by pressing the keys on the
phonepad/speaking into the phone. Customer responds to questions about their account to
identify the customer. Data and call is automatically routed to the relevant department or
person required.
It asks the caller to select from a menu. It asks the caller to enter information using a keypad. It
asks the caller to enter information by answering yes/no/saying words. It translates key presses
through the tones produced by the phone. It detects spoken words using speech recognition.
Upon receiving data it gives the balance of the account. Call can be directed to an operator.
Disadvantages:
Can take a long time to navigate through the menus/may be in a queue if you want to speak with
an operator. The menus might provide too many/too few options. Too much information may be
provided at the beginning of the call. Voice prompts might be hard to understand. IVR may not
understand your accent/voice.

SM

A
N

FA
R

Overseas Calling centres:


Advantages:
Phone operators will be paid less. Buildings needed to house call centres will be cheaper to
buy/rent. Call centre opening during normal hours in some countries would be unsociable hours
in other country. Leading to a lower wage bill. The operators would be better qualified. The
operators would be more motivated.
Disadvantages:
The operator might not understand other dialects. The customer might not understand
operators accent. Operators might have difficulty with other culture. Operators may be inclined
to stick to script/may be unable to answer out of the ordinary questions.

PAYROLL SYSTEM:

Data in master file:


Name. Contact details i.e.phone/address. Tax history. National Insurance history. Pay so far this
year. Holiday entitlement. Pension contributions. Rate of pay. Tax code. Job title. Employee
number/id number/payroll number/works number. Social security/national insurance number.
Department worked in. Date employed. Bank details. Payment method. Date of birth.
Transaction file contains workers number and hours worked.
2nd file: Deletion of a record such as a worker leaving employment
Change/amendment to a record such as a worker changing address/job title/phone
Addition of a record such as when a new employee starts with the company
Payslips (Updation of old Master File):
Batch processing is used at the end of each pay period. Transaction file is sorted into same order
as master file. Sorted on employee number. First record in the transaction file is read and first

USMAN FAROOQ BUTT

12

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

record in the old master file is read. If records dont match computer writes old master file
record to new master file. If it matches, computer calculates the pay using rate of pay from
master file and using hours worked from transaction file. Computer calculates the income tax
/insurance/pension contributions and computer subtracts these from pay. Processed record is
written to new master file. Payslip printed (to file). Process is repeated until end of old master
file. Master file is updated. Payslips are printed.

BU

TT

Overall Outputs:
Payslips with description of information included. Financial reports of payroll statistics.
Error/Exception reporting. An employee earning unusually large amount of money. Employee
has been on emergency tax code for very long time. Two employees having same NI number.
Reports showing hours worked per individual. Report showing cost information by department
or individual. Reports including the analysis of the turnover of employees together with
detailed absence reports. Payments to employees automatically generated using BACS. Tax paid
by all employees. NI contributions for all employees. The amount of money paid to each bank.
All earnings and deductions of employees. All earnings and deductions of employees by
department. Tax and NI payments automatically made direct to the Inland Revenue.
Specification of money required by company for payment to workers/Inland Revenue. Wages so
far this year. Income tax so far this year. Employer insurance contribution so far this year.
Employee insurance contribution so far this year. Pay date. Pension contributions so far this
year.

FA
R

O
O

Organising data on master files:


Files will be held in an indexed sequential manner. Table of indexes is stored. The index will
allow for direct access. Needed when accessing individual worker records quickly. When a
workers details are required by human resources staff. The records will be held sequentially to
allow for serial access used to process all records one after the other, when producing payslips.

A
N

Most payroll software allows cash books to be updated automatically deducting payments to
employees. Payments to employees are automatically generated using BACS as well as tax and
NI payments automatically made direct to the Inland Revenue.

SM

DATA MANAGEMENT:

File Structures:
Type of database is chosen (flat file/relational), if it is going to be a relational database, number
of tables is decided upon a key field to identify each record and relationships are designed.
Entity relationship diagrams are designed. Type of access is decided on if indexed sequential,
index is chosen and table of indices designed. Appropriate field names are chosen relating to
data content of field and unique name. Field type is selected such as text, number, Boolean
appropriate to field contents. Field lengths are chosen so that space/memory is not wasted but
leaves room for expansion. Validation rules such as range checks, invalid character checks,
check digits are chosen appropriate to field contents error message(s) designed. Field
descriptions are included which adequately inform about field contents
Sequential file systems:
A file where records are stored one after the other using a key field to order them.
Sequential access means that data is accessed in a predetermined, ordered sequence. Sequential
access is sometimes the only way of accessing the data, for example if it is on a tape. It may also
be the access method we desire to use since the application requires processing a sequence of
data elements in order. In data structures, a data structure is said to have sequential access if

USMAN FAROOQ BUTT

13

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

one can only visit the values it contains in one particular order. Batch processing requires the
use of sequential access an example being a payroll system where every worker has to be paid.
Since all the records have to be read anyway, the order in which they are stored is not important.

BU

TT

Indexed sequential & random access files:


In an Indexed Sequential Access Method system, data is organized into records which are
composed of fixed length fields. Records are stored sequentially, originally to speed access on a
tape system. A separate table is kept of the indexes which are pointers into the tables.
This allows individual records to be retrieved without having to search the entire set of data. The
key feature of ISAM is that the index tables are small and can be searched quickly. This allows
the database to access only the records it needs. Additionally modifications to the data do not
require changes to other data, only the table and indexes in question. Random access is the
ability to access any random element of a group in the same length of time. The opposite is
sequential access, where a remote element takes longer time to access. In data structures,
random access implies the ability to access any entry in a list of numbers in identical time. Very
few data structures can guarantee this, other than arrays. Random access is critical to many
functions such as fast sorting and binary searches. The use of this type of file system can be
found in hybrid systems i.e. batch and interrogational processing combined. This is particularly
useful when, say, payroll and personnel records are combined.

FA
R

O
O

Indexed sequential method: (Magnetic Disc)


They may need to send out monthly statements. Statements may be batch processed. Orders
may be on a transaction file for a short time. Transaction file will be sorted in customer number
order. Master file will need to be in sequential order for batch processing. For ease of updating
using transaction file. Customer may phone to enquire about progress of an order. Fast access to
data will be required. Indexes will make sequential file faster to search.

SM

A
N

Relational database systems:


A relational database is a database which consists of two or more linked tables of data. The link
is through a key field. Key field will be used as a foreign key in the linked table. Strictly speaking,
the term refers to a specific collection of data but it is normally used together with the software
managing that collection of data. Data from one table combined with data from other table(s)
when producing reports. Can select different fields from each table for output. SQL is used for
queries and producing reports. That software is more correctly called a relational database
management system (RDBMS). They are mainly used as Interrogational databases e.g.
customer database linked to sales records.
Advantages compared to 2 separate files:
Data is not repeated so less storage capacity needed. Data retrieval is quicker/easier to search
for information. If data was duplicated hackers would have easier access to data. Easier to
expand. Data only needs to be amended once. Easier to produce reports with cross-tabular data
rather than separate files.
USE OF DATA MANAGEMENT:
Hierarchical database management systems:
In hierarchical database management systems, data is organized into a tree-like structure in
such a way that it cannot have too many relationships. The structure allows information to be
repeated using parent/child relationships. An example would be: an organisation has records of
employees in a table called Employees. In the table there would be fields such as : First Name,
Last Name. Job Name and Wage. The company also has data about the employees children in a
separate table called Children with fields such as: First Name, Last Name and DOB.

USMAN FAROOQ BUTT

14

CHAP 2 AICT

HOW ORGANISATIONS USE ICT 1

The Employee table represents a parent segment and the Children table represents a Child
segment. These 2 segments form a hierarchy where an employee may have many children but
each child may only have 1 parent. Hierarchical structures were widely used in the first
mainframe database management systems. However, owing to their restrictions, they often
cannot be used to relate structures that exist in the real world. Hierarchical relationships
between different types of data can make it very easy to answer some questions, but very
difficult to answer others. If a one-to-many relationship is violated (e.g., a patient can have more
than one physician) then the hierarchy becomes a network. While the hierarchical model is rare
in modern databases, it is common in many other means of storing information, ranging from
file systems to the Windows registry to XML documents. It is used in systems such as On Line
Analytical Processing which specialises in business reporting such as sales marketing,
management reporting, business performance management (BPM) and also budgeting and
forecasting.

SM

A
N

FA
R

O
O

BU

TT

Network database management systems:


One type of network dbms is a distributed database. A distributed database is a database that is
under the control of a central database management system (DBMS) in which storage devices
are not all attached to a common CPU. It may be stored in multiple computers located in the
same physical location, or may be dispersed over a network of interconnected computers.
Collections of data (e.g. in a database) can be distributed across multiple physical locations. A
distributed database is distributed into separate partitions/fragments. Each partition/fragment
of a distributed database may be duplicated. The other type of network database is one which is
held centrally but can be accessed simultaneously by many users remotely using a WAN or
locally as part of a LAN. Good examples are large organisations spread over wide geographical
areas such as police officers using the PNC (Police National Computer in the UK) and the DVLA
(Driver and Vehicle Licensing Authority) which can also be accessed by police officers remotely.

USMAN FAROOQ BUTT

15

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Online Transactions
Transferring funds online are done in these steps
Type in user ID or username. Asked for security information. Type in section of password.
Type in favourite place/mothers maiden name/date of birth. Page will have a list of the
customers accounts and account numbers. Click on account. Click on transfer money. Click
on account/type in account number to transfer money to. Type in amount. Select date of
transfer. Click confirm. Can pay their car tax, their council tax, parking fines e.g.PAYPAL.

BU

TT

Online Shopping
Features of well-developed online shopping website
An easy-to-remember domain name. A secure method of accepting payments. Descriptions
/pricing/photos of goods. Usernames and passwords to make the system secure. Customers
are able to contact shop directly via e-mail. Allows customers to make use of their orders
stored in a database. Allows customers to see their order and maintain their own accounts.
A shopping basket to hold goods you are going to buy. Prospective customers should be able
to use a temporary shopping basket if they are a guest. Permanent shopping basket if they
are returning customers. Searches and advanced searches can be carried out easily. Allow
customers to progress smoothly to the checkout/navigate from category to category easily.
Orders can be tracked. Wish lists which enable users to store the goods they might want to
buy in the future. People who bought A also bought B recommendations.

FA

Concerns of customers with online shopping


Hackers can intercept personal data/payment details. Personal data are encrypted when they
are transferred over the Internet so if a hacker intercepts data, he is unable to decipher the
meaning of the data because the data can only be decoded if the receiving network server has
the correct encryption key. More common for fraudsters to use methods such as phishing,
pharming. More common to attach spyware in order to obtain customer data. If customer's
credit or debit card is used fraudulently, in many countries the card company must refund
them. Customer's have consumer rights such as refunds for faulty goods. Generally,
customers only ever use reputable sites. Could be a fraudulent website. You cant check the
quality of the goods/you cant be sure the goods are in stock/goods dont arrive/are of the
wrong quality/wrong goods delivered. The order confirmation may be delayed/not be
received. Employees who have access to the payment details must sign a duty of confidence
document.

SM

Registering on an online shopping website


Click on register button to take you to the registration page. Enter choice of username to
identify the customer to the system. Enter choice of password to make the account more
secure. Enter an e-mail address so customer can be sent notification that they have received
the order/so shops can tell the customer when the order has been dispatched. Confirm email
address/password by entering it again to verify the original one is correct. Enter name to
ensure that the goods/bill are addressed to the correct person. Enter answer to chosen
security question as an extra layer of security in addition to a password/so that you can
request a new password if the original is forgotten.
Security issues involved with such a website.
The customers personal data/payment details can be intercepted by a hacker.
Personal data/payment details could be used by the hacker to defraud the shop.
Personal data/payment details could be used by the hacker to defraud the customer.
Personal data/payment details could be used to log on to the shops computer system and
order a large number of products products can be dispatched to another address other than
the credit owners. The hacker can sell on the goods. Credit card details can be used to make
purchases at a number of other shops.

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Benefits to company introducing online shopping


Dont have to rent/build large call centers so save money. They can employ fewer staff and
pay less in staff wages. Dont have to pay as much in running costs such as electricity,
heating/air conditioning and lighting at call centers. Because of their lower costs, they can
offer cheaper goods thus attracting more customers. Shoppers can shop 24/7 so company
could gain increased profits Internet more likely to attract customers worldwide increasing
profits.
Drawbacks to the company of introducing on-line shopping
Less personal touch so it is harder to sell other services. Potential for fraud so company loses
money. Interception of account information by hackers so company loses money. Running
costs/initial cost such as having to pay website developers. Initial costs such as buying the
hardware when starting up. May need to retrain staff which is costly/time consuming

BU

TT

Procedure of purchasing
Type in or select shop website from favourites. Browse product categories. Browse individual
products. Place selected products in shopping basket. Go to the checkout. Enter username
and password. Enter billing address. Enter shipping address. Customers who are not
previously registered must type in personal details. Choose method of payment. Choose
method/speed of delivery. Confirm order and log off.

SM

FA

O
O

Advantages and disadvantages to the customer of using online shopping


Items are usually cheaper as staff costs are lower. Customers can spend time comparing
products and prices without being rushed being able to use the power of the internet to seek
out the lowest prices for items or services. Can shop at time of their own choice. Can use
favourite shop even at a distance. Shops can remember customers shopping list - don't have
to reorder. Don't have to spend time going around different shops/travelling to shop.
Disabled people dont have to leave house. Can look at wide range of shops all around the
world. Greater choice of manufacturers. No travelling expenses.
Security concerns arise due to data transmitted over internet. Phishing and pharming are
common methods used by fraudsters. Can order goods and they don't get delivered/are not
to the same standard as those ordered. May be hidden costs such as delivery charges.
Viruses may be downloaded. Where the purchase involves obtaining goods from another
country issues can be fluctuating exchange rates for foreign currencies, local and
international laws and delivery methods.

Problems with credit card use for online shopping


May not have a credit card. Credit card details may be intercepted by hackers. Hackers would
need to know username and password. Most systems are extremely difficult to hack into
contrary to popular belief. Data is encrypted when being transmitted. Impossible to crack the
encryption without a key.
Online Banking
Hardware
Modem/Router to connect to the system/Internet. Mouse to select options/services.
Keyboard to type in username/password/amounts. Internet browser to connect to the
service.
Fears of customers
Bank details may be intercepted by hackers/description of spyware/key logging. Hackers
would need to know username and password. Most systems are extremely difficult to hack
into contrary to popular belief. Data is encrypted when being transmitted. Impossible to
crack the encryption without a key. Customer perception could be a problem as it could lead
to a reduction in the number of customers.

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Responsibilities the bank has with regard to its customers


Need to protect confidentiality of data/duty of confidence to prevent customer data being
made public. Need to comply with data protection rules. Should not pass on information
from bank to other organisations to avoid customer being compromised.

TT

Advantages and Disadvantages of security measures by bank


Advantage of User id/passwords is that only authorised users have access to the data.
Disadvantage of User id/passwords is that users can forget their passwords.
Advantage of encryption is that unauthorised people will not understand the data.
Disadvantage of encryption is that it is just possible to crack encryption codes.
Advantage of duty of confidence requirement in employment contracts is it discourages
workers from spreading personal data around. Disadvantage of duty of confidence
requirement in employment contracts is that bank is relying on workers having sufficient
integrity to abide by this.
Advantage is that anonymised information is omitted wherever possible. Disadvantage of
anonymised information is that some identifiable information may remain included.
Advantage of firewall is that it prevents unauthorised computers/users from accessing
the system. Disadvantage of firewall is that it slows down the performance of computers.
General disadvantage of any of these is that it restricts individual access by authorized users.

FA

O
O

BU

Security threats that the bank and customers must guard against when using
online banking.
Employees may copy data to pass on to criminals who use the data to make illegal
transactions. Phishing email appears to be from customer's bank asks for customers
details password, card/account number, other security details, email makes up plausible
reason and includes a website address for customer to go to which looks just like the actual
banks website but is a fake website. Pharming fraudster redirects genuine websites traffic
to own website, customer is now sending personal details to fraudsters website.
Spyware is downloaded which is software used to gather user's personal details. Spyware
detects key presses of user logging on to bank site.
Hacking to get customer personal information to use against the individual/to commit fraud
and in order to transmit viruses.

SM

Features of a well designed online banking website:


Must have a website with an easy-to-remember domain name that is related to the bank. A
list of users accounts and balances. Easy to see list of services available. Allow customers to
navigate from service to service easily. Facility to print out statements/order statements.
Prompts to type in usernames and passwords to make the system secure. Prompts to ask for
other required information (favourite place/date etc.) to make the system secure. Customers
must be able to contact bank directly. Allow customers to manage their own accounts. Allow
customers to pay bills. Allow customers to amend/create standing orders/direct debits.
Allow customers to order a new PIN. Allow customers to stop a cheque. Allow customers to
see recent/pending transactions. Allow customers to apply for a loan. User guide to the
system/interactive demonstration of the system/FAQs.
Features offered by online banking.
Have access to up-to-date bank statements/can check account balances/transaction history.
Can bank at any time of day/anywhere there is an internet connection/use web enabled
phones. Can pay bills/can set up/change standing orders/automatic payments. Can transfer
funds between the customers different accounts. Can apply for a loan/can apply for a new
account/apply to close an account. Can set up/increase overdrafts. Higher interest rates for
savers because of lower costs. Can amend personal details. Offers security features such as
username, password, https, encryption. Can stop a cheque. Help in the form of FAQs,
tutorials.

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Benefits of online banking for the bank.


Save costs as dont have to rent so many high street premises. Employ fewer staff therefore
less paid in staff wages. Save costs of printing/sending statements. Lower running costs,
fewer branches so less electricity, heating and lighting. Because of lower costs can offer
higher rates of interest for savers and lower rates of interest for borrowers. These rates
attract more customers. Less likelihood of the bank being robbed. Less money is spent on
security staff.
Drawbacks of online banking for the bank.
Initially high redundancy payments. Initial cost of setting up system will be high. Running
costs will be high due to paying website developers. May lose customers who prefer face to
face banking/whose internet speed is too slow to be viable/who may be worried about
hacking. Harder to sell other services since there is a less personal service. Increased
interception of data by hackers leading to fraud. Some staff will need to retrain which is
costly/time consuming.

BU

TT

How banks prevent hacking


Only ask for certain characters of password. Use drop down menus to select password.
Use TANs and two factor authentication. Bank provides customers with up to date anti
spyware.

SM

FA

O
O

Methods used to improve the security of a customers data when they want to
access their account
Single password not considered by banks to be sufficient protection. Limited number of
characters from password are asked for leading to hacker not being able to guess whole
password. Additional information such as mothers maiden name/favourite place/phone
number/date of birth. Additional information may be commonly known. Key logging
software can detect full passwords/additional information. Data is encrypted allowing only
users/computers with the key to decipher it/hackers only see meaningless strings of
characters. Encryption is not sufficient if hacker uses key logging software. Anti spyware can
detect spyware/keylogging software. Anti- spyware needs constant updating. TANs
passwords which are sent by post/email and are used once and only have few minutes
validity reducing time hacker has to intercept it. Virtual keyboard used to type in passwords.
Drop down lists used to select letters of password. Key logging software cant detect key
presses. Different characters from password are asked for at each log on leading to hacker
not being able to use part of password already intercepted. Sometimes (random occurrence)
same three characters are asked for making it easier for hacker to access account.
Two factor authentication customer inserts card into chip and pin device and types in PIN
and a pass number is produced, hacker would need to have access to the Chip and PIN
device, debit/credit card and the users password to be able to hack into account pass
number changes each time of use. Firewalls reduces risk of unauthorised access but dont
prevent it totally. User can be timed out after a period of inactivity preventing another
person using the site
Social and ethical implications of bank workers being able to access customers
personal information or Ways the bank can safeguard the privacy and
confidentiality of customer data.
Bank workers have a personal duty of confidence to individuals whose data is stored. Bank
workers should have a personal duty of confidence to their employer. Workers must not tell
any unauthorised person about personal data which is held. Bank must not use information
for any reason except with the permission of the individual. Workers must be asked to treat
the information as confidential/it must be obvious to them that the information is given in
confidence. Employer should ask employee to sign a confidentiality agreement. Bank should
take responsibility for any information which is passed on. Only the least amount of
information that could identify the individual should be used. Online services allow

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

organisations to have access to the most private of data. Examples names, addresses,
phone numbers, financial situation. Information should not be passed on from organisation
to organisation without authorization from the individual. Anonymised information should
always omit personal details wherever possible. Aggregated information should never
identify individuals. Companies/workers must ensure the security of customer data. Workers
must ensure only relevant data is used. Workers should ensure they only use up to
date/accurate information.
Info asked to customer on phone banking
User name/account number/credit card number/user id. Mothers maiden name. Favourite
place. Date of birth. PIN. Email address. Password.
Why short password is asked
Hacker can only get hold of three characters in one go. Hacker might need to know the whole
password to get into account. Will probably be different three characters asked for at next log
in. Hackers would need to intercept password several times to get into account.

SM

FA

O
O

BU

TT

Changes in employment with stores closing


Increased unemployment for checkout operators/sales people
Increased unemployment for security staff
Increased unemployment for staff who organise stock control
Increased employment for technical staff/programmers
Increased employment for van drivers
Increased employment for call centre operators
General Staff unemployment
Unemployment has occurred as many jobs involving car workers have been replaced by
robots. Many clerical duties involved with applications such as payroll are now performed by
computers. Car park attendants have been replaced by microprocessor operated machines.
Many shop workers and bank workers have lost their jobs because of on-line services
Technical staff employment opportunities
The use of ICT obviously makes more jobs available for technically qualified people such as
computer programmers, systems analysts, computer technicians and people who can
perform robot maintenance.
In addition, call centres have created fresh opportunities particularly for women in the
developed countries and for men and women in developing countries.

Online Services and Working Patterns


Changes in employment patterns
Increased unemployment for specific bank workers such as cheque processing workers
/cashiers. Increased employment for technical staff. Some workers may have to/will have the
opportunity to go part time. There will be the opportunity to job share. There will be the
opportunity for flexible working hours. Workers will need to have the ability to move from
branch to branch. Workers may gain new skills. Compressed hours may become available.
Some operators are able to work from home. May lead to more operators being given jobs.
Increased unemployment for some existing workers. Some checkout operators will have a
more menial role in the warehouse. Some checkout operators will be promoted as office
staff. Increased employment for van drivers. Some workers will need to be retrained.
Part time working
Working a limited number of hours/working less than the normal working hours of a full
time employee

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Effects of working part-time.


Lower wages due to fewer hours worked. Lower wages as part time workers tend to be on
lower rates of pay. May have to find another job to supplement income. Less likely to receive
in job training. Very difficult to become part of companys pension scheme. May have to
work unsociable hours/shifts. More free time/more leisure time/more time to spend with
family due to fewer hours worked.
Job sharing
Two people sharing a job normally done by one person. Each person is paid on part time
basis though together they do a full time job. One person works specific days /mornings
/afternoons while other works remainder.

BU

TT

Benefits to the company of their staff sharing jobs


The two workers can have different skills, knowledge and experience. Getting the skills of
two workers for the price of one. Working fewer hours may be fresher and more productive.
When the business is particularly busy can get the two workers to work together. It doesnt
matter that at less busy times neither is working. If one worker is ill or on holiday, part of the
job still gets done/other worker can be invited to cover. May mean that workers stay with the
business since they might leave if they had to work full time. No need to (spend money on)
train(ing) a new person. Fewer redundancy payments needed.

O
O

Drawbacks to the bank of their staff sharing jobs


Money may need to be spent on providing an extra desk or additional equipment. May be
extra training costs associated with training both workers. Difficult to arrange training
/meeting times/working hours to suit all workers. May be difficult to maintain
communication between workers. May be difficult to maintain continuity. Problem may
occur which only worker who is not there can solve.

FA

Flexible working hours


Gives workers some choice about what times of day they work.
Hours can vary from day to day.
Workers work the same number of hours each week.
Can choose when to do these hours, providing it fits in with what other workers want and
employer agrees.

SM

Benefits to the company of flexi hours


Can enable business to be open for longer during the day. Business might want the repairs to
go on from early in the morning to late at night. Can match working hours with busy and
not-so-busy times. Easier to allow for technicians personal needs which leads to a reduction
in absenteeism/improved punctuality. Working flexitime hours would appeal to many
technicians so it helps recruitment/ reduces the number of staff leaving for another job
reduces the need for training new staff. Working flexitime hours is popular leading to greater
productivity.
Benefits to employees of flexi hours
Allows employees to organise their working lives to suit their personal needs. Can choose to
work off peak hours as travelling to work outside peak times is easier and cheaper. If
employees stay late to finish a job, they can take time off at a later date. If the job requires
great concentration, it can be done at quiet times of day.
Compressed hours
Working for same number of hours as a normal working week but over fewer days

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Ability to move from branch to branch


With many companies having centralised computer systems, it is not as important which
office workers operate from. They will still be able to access their work.
Advantages of working patterns
Part time working/job sharing helps to retain and attract staff. When fully trained staff are
retained no need to train new workers. Stores open in the evening so part time staff can be
used for unsociable hours. Workers can be fresher and more creative can use a number of
employees at busier times/fewer at quieter times. Flexible working hours/ Compressed
hours lead to shops being open for longer periods. Allowing for individual workers needs
improves absenteeism/punctuality. Appeals to employees so helps recruitment and retention
of staff. Employers can match employees working hours with busy and not so busy times.
Job sharing, where employer gets two sets of skills for the cost of employing one worker.

BU

TT

Security and Privacy of Data


Data protection rules:
Data must be: Kept secure; Fairly and lawfully processed; Processed for limited purposes;
Adequate, relevant and not excessive; Accurate and up to date; Not kept longer than
necessary; Processed in accordance with the individuals rights; Not transferred to countries
outside that country unless it has adequate protection for the individual interests of the
individual or another person.

O
O

What could happen if the company did not obey data protection rules
Employees, who are not supposed to, could see the information. Data might be inaccurate
/not up to date and e.g. products could be sent to the wrong address. It could be possible to
build up detailed files on people without their knowledge or permission. Data could be sold
to other companies without the data subjects permission. Data could be used for purposes
other than those it was collected for.

SM

FA

Data protection is necessary because (In a Relational Database)


Personal data is kept on computers such as names/addresses/financial information/medical
records/criminal records/employment history. Searches of databases for personal
information are much faster with computers than if it is stored on paper. These computers
can be linked to communications networks like the Internet or private company networks.
This allows databases to be used across an organisation/be shared between organisations
very quickly. With more and more organisations using computers there is a danger the
information could be misused or could get into the wrong hands. Data can be easily copied
and can be changed with little evidence being left. Without data protection rules, people who
are not supposed to could see the information and it could be possible to build up detailed
files on people without their knowledge or permission.
Duty of confidence:
Employees who handle confidential information about individuals have a personal duty of
confidence both to the individuals and to their employer. They must not tell anybody except
with the permission of the person who told them. They must not use the information for any
reason except with the permission of the person who told them. If they attempt to tell
somebody/use the information the person who told them can take out a legal injunction
preventing them. In order for a duty of confidence to exist, the employee must be asked to
treat the information as confidential/it must be obvious that the information is given in
confidence. Employer will ask the employee to sign a confidentiality agreement.

USMAN FAROOQ BUTT

CHAP 3 AICT

THE IMPACT OF ICT ON SOCIETY 1

Summarising the information to minimize negative social and ethical


implications
Anonymised information is information about individuals without mentioning the person by
name. Aggregated information is where personal details of individuals are combined to
provide information without naming those individuals. Summarised information does not
always safeguard personal information because it is possible to guess the salaries of workers
if the department/position is mentioned. There may be only one worker in a specific
department and so it is obvious who the company is referring to.

TT

Health and Safety


Health and safety problems result from continuous computer use
Typing at a keyboard continuously can cause RSI/wrist problems/finger problems. Gripping
a mouse and repetitive clicking can cause RSI/wrist problems/finger problems/carpal tunnel
syndrome. Sitting in the same position all day can cause lower back pain and deep vein
thrombosis. Staring at a computer screen all day can cause problems with ones sight and can
cause eye strain/headaches due to glare from screen. Poor positioning of screen can cause
upper back/neck/shoulder pain.
Too many plugs connected to a socket can be a fire hazard. Bare wires/spilt drinks can cause
electrocution. Trailing wires can cause tripping.

SM

FA

O
O

BU

Reduction of health and safety issues


Use ergonometric/ergonomic keyboards. Get up and walk around every so often. Improve
the lighting in the room/ have anti glare screens. Height, position and distance from worker
of screens/keyboards should be optimized. Good quality seating that supports the
back/sitting in an appropriate position. Height-adjustable seating.
Dont overload sockets. Only allow qualified electricians to install electrical equipment.
Equipment should be checked regularly. Cabling should be tied up/trunked. Electrical
equipment must be located away from water supplies. Do not take drinks near electrical
equipment. Have several carbon dioxide fire extinguishers. Benching/work desks should be
sturdy enough to take the weight of heavy equipment/do not allow heavy equipment to
overhang.

USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

TT

ANALYSIS
Different methods of researching a situation
Examining documents
All documents which are used within a system need to be examined. These will be eventually
duplicated or replaced with alternative versions or even discarded in the new system. The
types of document which need to be examined are Data capture forms, system
documentation, business reports, invoices, bills, letters etc. Examining the documents is
necessary where there is lots of paperwork.
Advantage: Can see which documents relate to input information and output information.
This enables the analyst to produce documentation of the system. This can be done whilst
producing a data flow diagram. The volume of data could be determined. The format of the
input and output can be determined. Each part of the system needs to be examined to see
what specific inputs, outputs and processing are required.
For example: in a school system, the input would be the details of the students; the
processing would be the calculation of the test scores/percentages and the output would be
lists of students and their test scores.
Disadvantage: Can take a long time to collate documents and may not be able to take
users opinions into account.

BU

Observing employees and watching over the whole process


The aim of observation is to find out what actually happens, not what the workers think
observers expect to see. Observation is needed where gaining an accurate view of what
exactly goes on would be difficult otherwise and where workers cannot be interrupted
Advantage It is fairly straightforward to watch how data flow around a system.
e.g. observing teachers lessons enables the systems analyst to see the process as a whole
Disadvantage Hawthorne effect- subjects improve or modify an aspect of their behavior
being experimentally measured simply in response to the fact that they know they are being
studied

SM

FA

Interview employees/managers face to face


Determine the people to interview, establish objectives for the interview, prepare for the
interview, conduct the interview, document the interview, evaluate the interview and what
causes unsuccessful interviews. Interview a small number of workers to get a snapshot of the
existing system. Interviewing is used when there is sufficient time, when it is relatively easy
to get people together.
Advantage: Interviewer can move away from their script and ask a more in-depth
question and if a particular response is given, can interpret body language.
Disadvantage: A great deal of time and energy is spent on producing the most appropriate
script or lists of questions. An interview can take more time to organise and it is extremely
difficult to repeat so it is vital that the questions asked are the right ones. Workers have to be
available at the time the systems analyst wants to interview them but they may not have the
time, can take a long time to interview all the employees and interviewees might try and
provide answers which they think the interviewer wants to hear.
Questionnaire
Distributing questionnaires to employees using written questions to gather responses/where
whole workforce response is required. Questionnaires are used when it is difficult to get
people together and to save time in gathering responses.
Advantage: Can be anonymous and answers tend to be, on the whole, more accurate.
Everyone can complete the questionnaire at the same time instead of one after the other
(as with interviews)/can complete it at their leisure. They are impersonal and can be
anonymous so workers might exaggerate their answers as they.
Disadvantage: it is very difficult to ask further questions based on the response to another
Question. Know there is no comeback /questions cannot be amended in the light of replies.
USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

BU

TT

A great deal of time is spent on preparing questionnaires in order that the right type of
question is asked in order that the most relevant information is gathered.
General activities in Analysis after research and advantages
After all the fact finding methods have been completed and the results are collated the next
stage is to use these to define all inputs, outputs and processing. Recording information
using data flow diagrams/interview transcripts/questionnaire analysis. Identifying problems
with the current system using the data already recorded about the current system. Identify
suitable hardware and software for the new system. Making generalised recommendations
using the data already recorded about the current system such as volume of data. Identify
user and information requirements using transcripts of interviews with users/ observation.
Identify the sources and volume of input data and collection methods.
By examining all the documents, this will enable the systems analyst to identify the
documents which are currently being used to input data to the existing system. Observation
will enable the systems analyst to determine the frequency of the addition and/or deletion of
records. Identify manual and computer procedures necessary to achieve the current output.
Identifying problems with the current system
Observation, examination of documents, questionnaires, interviews all contribute to the
creation of DFDs which will help the systems analyst to identify current problems.
Identifying suitable hardware and software for a new system
Analysing required outputs, storage and processing requirements using the DFDs will allow
the Systems Analyst to make generalised recommendations for the software and hardware.
Identifying the user and information requirements
Collating the interview transcripts, questionnaires and documents will enable the systems
analyst to identify what the user requires and what information the system will require.

SM

FA

O
O

Recording information about the current system


It follows that there is a need for recording the facts since keeping accurate records is
essential. The basic rule is write it down. Here follows some guidelines for good
documentation. The first is that information must be recorded as soon as possible. The
simplest recording method should be used and the work must be understandable.
Documentation material must be organised. The best way of doing this is to use data flow
diagrams (both Level 0 DFD context diagram and Level 1 DFD current system), system
flowcharts.
Data Flow Diagram DFD (e.g. in a school system)
Terminator - When data flows from or to somebody or somewhere outside the system, that
somebody or somewhere is called a terminator. Here teacher is a terminator.
Process box - The data from the user (e.g. teachers) are the marks which are processed to
produce the candidates results. The processing of the marks is put in a process box.
Store - The actual data output from the system such as the candidate grades (are recorded
for future use).
Data flow arrows - Each arrow is labeled to show what data is flowing at that point in the
diagram whether it be marks or grades
DFD is a graphical method of recording the inputs, outputs and processing. DFD shows the
inputs, outputs and processes of the system. The actual hardware and software will not be
recommended at this stage. Using the data flow diagram, the required outputs will be known,
the storage requirements will be known and the processing requirements will be known.
Recommendations/suggestions for the software and hardware will be made.
DFDs consist of terminators, flow arrows, processes and stores. The terminators and
flow arrows in the DFD show the volume of input data helping in an appropriate method
of input to the system can be decided upon. Terminators and flow arrows out of the system
indicate the quantity/ format of the output which leads to decisions on appropriate output
devices. Looking at the processes involved in the manual process will give an idea about the
size and speed of the processor required and type of software needed. Stores in the DFD will
show how much data needs to be stored. This is needed to identify the size and number of
storage devices. Data flow represented by arrows. Different levels 0,1,2
USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

Systems Flowchart
Uses particular input, output, storage and processing symbols. Represents inputs, outputs
and processing. Generally a method of designing a systems solution. Not found very often in
the analysis stage. Storage represented by a storage medium in a computerised system.
Outputs is represented by an output box. Data flow represented by arrows. Inputs
represented by input medium symbols.
DESIGN

FA

O
O

BU

TT

Items that the systems analyst will need to include at the Design stage and
factors that will influence the choice of item.

SM

Reasons for designing different items, e.g.


Field name -- So that the contents of the field are easily identifiable/so that no two fields
have the same name
Field type -- So that validation can be more easily performed/text or Boolean can be chosen
when appropriate to save storage space
Field length -- So that record lengths are not too long/when chosen appropriately saves
storage space
Validation rules -- So that the number of errors in input data is reduced
Key field -- To make it easier to sort data/to uniquely identify each record in a database/to
make it easier to search databases
Designing screen display
Forward and backward buttons to go to the next/previous record. First and last buttons to go
to the first/last record in the database. Drop down menus to select a file/record. Go to button
so that the desired record can be typed in. Search button so that the desired record can be
found.
Key factors when designing
Must meet user requirements. Will need to be set out so that it is easy to use. Will need to be
attractive to look at. Will need to limit the possibility of inaccurate data being entered.
Workers should not be distracted by an over-elaborate screen design. Must contain
guidelines to the worker on how to fill in any data entry forms. Must allowing them to
navigate from one screen to another without any difficulty. Elements of file structure such as
field length will affect the field spacing. Elements of file structure such as number of fields
will affect the font size/number of screens.
USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

Advantages of well designed application form:


Fewer errors in completing/easier to complete the form because there are individual
character boxes. Fewer errors in completing/easier to complete the form because there could
be Boolean tick boxes. Fewer errors in completing the form/easier to complete because
closed questions/restricted number of answers. Fewer errors in reading the form as OMR
could be used. Fewer errors in completing the form/easier to complete because there are
instructions on how to fill in the form. Easier to read completed forms because there are
individual character boxes. Fewer errors when operator enters data into computer as it is
easier to read completed forms. Less likely to get lost as there will be clear instructions where
to send the form.

BU

TT

Designing Validation Routines


Length check - Works number/tax code/social security number/sort code/account number
Format/picture check - Works number/tax code/social security number/sort code/date of
birth
Invalid character check - Tax Code/sort code/account number/number of days
Range check - Income tax/gross pay/net pay/number of days
Check digit - Account number
Boolean check Gender
Presence check - Works number/tax code/sort code/account number/social security
number/gender/rate of pay/date of birth/number of days

O
O

DEVELOPMENT AND TESTING

SM

FA

Each module will need to be tested with different types of test data. The system will also
need to be tested as a whole.
Methods to test each module:
Using live data/normal data/data which is acceptable/valid. Using data outside the
range/wrong type/either end of the range. A set of test data is selected, including normal,
abnormal and extreme data. Data will be accepted or rejected by system
It is expected that abnormal data will be rejected, normal data will be accepted and extreme
data will be accepted. Expected results and actual results are recorded in a table. Actual and
expected results are compared. If validation rules dont trap errors then will need to be
amended. Live data could be used which allows comparison between actual results and
previous system results.

Live data
Live data is data that has already been used in the existing system. It is used because the
outputs are already known. Test results from new system can easily be compared with
outputs of existing system. Data can be chosen for when previously encountered special
/unusual circumstances existed. Data can be chosen for when it was a normal day to day
situation. Analyst will also choose another session where it was quite an average session.
If there are differences between the results amendments will need to be made to the system.
Improvements that could be needed as a result of testing
Prior to the implementation any improvements which might be needed are made to the
system in the light of the testing of the system. These could be amended data structures or
even amended program modules in line with the results of testing.
IMPLEMENTATION
Parallel running: Involves running the old system alongside the new system
Advantages: If there is a problem with the new system still have the old system as a backup
unlike phased implementation/direct changeover/pilot running
USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

Disadvantages: Is more expensive than direct changeover because two sets of workers
have to be paid. It is a slower method of implementation than direct changeover.
Phased implementation: Involves implementing one part of the system at a time.
Involves running part of new system whilst old system still operates with other parts. The
existing system is gradually replaced by the new system.
Advantages: Cheaper than parallel running as you dont employ two complete sets of
workers. If there is a problem with the new system still have bulk of old system to fall back
on unlike direct changeover. Training can be gradual in parallel running and phased
implementation unlike direct changeover. Changes can be made if problems occur with
phased and parallel unlike direct changeover.
Disadvantages: It is a slower method of implementation than direct changeover.
There is only one system required (e.g. student records) so this may not be appropriate

BU

TT

Pilot running: Involves running new system in one branch of the organisation whilst old
system still operates in other branches
Advantages: Cheaper than parallel running as you dont employ two complete sets of
workers. If there is a problem with the new system it only affects one branch unlike other
methods. Other branches can learn from the mistakes made in first branch to have the new
system. If it is successful the whole company can take it on
Disadvantages: It is a slower method of implementation than direct changeover
Pilot is unsuitable for situation where there is only one department being computerised

FA

O
O

Direct changeover: Involves replacing the old system with the new system all in one go
Advantages: Cheaper than parallel running as you dont have to employ two sets of workers
Quicker as there is no delay waiting for bugs to be fixed unlike other methods/benefits
of the new system become apparent immediately unlike other methods
Disadvantages: If there is a problem you dont have the old system to fall back on unlike
other methods.
DOCUMENTATION

SM

User documentation
Screenshots / descriptions of how to use the software to show how to save a file, perform a
search, sort data, print data, add records, delete records and edit records. The purpose of the
system to give an overall description of what the system does. The input and output formats
so that you know how to enter data and know what the output will look like. The hardware
and software needed to run the system so that the user doesnt use the wrong hardware
/software. Examples of sample runs of the system so that the user can tell if they are using
the system in the correct way. Troubleshooting guide/a list of Frequently Asked Questions to
know what to do when errors occur.
Advantages: Saves computer company time in the long run as they will not be contacted on
a regular basis. Saves computer company time in the long run as they will not need to visit
users to show them how to use the system. Save money as they wont need to employ as
many customer support staff.
Technical documentation purpose
Produced specifically for systems analysts/programmers. Helps when the system needs
further development/upgrading/improvements. Helpful should any errors occur in the
system and system needs amending to get rid of these errors.

USMAN FAROOQ BUTT

CHAP 4 AICT

SYSTEMS LIFE CYCLE

System documentation
A detailed overview of the whole system. Data Flow Diagrams/systems flowcharts to show
the results of systems analysis and what is expected of the system. Overall design decisions
to see the choice of hardware and software and see the file structure/ input and output
formats. Test plan and test results to be reused when systems analyst debugs system systems
flowcharts. Test data/test plans so that systems analyst can see the results of these/test
results. Gives an overall view of solution
Program documentation:
A description and purpose of the software - what the software does and its features. The
reasons for choosing those pieces of existing software. Modules that were used instead of the
programmer having to write code. Input and output data formats that have been used.
Program flowcharts that were produced at the design stage. Program listing. A complete copy
of the code used. Annotation explaining what each module of code does. Input and output
data formats. Program flowcharts/algorithms. Notes that will help any future programmer to
make modifications to the system a complete copy of the code used.

TT

EVALUATION

O
O

BU

How new system is evaluated


Test results are used to evaluate the new system. Expected results are compared with actual
results. If there are differences refinements will be necessary. User is asked for his/her views
on the new system. Final system compared with design. Limitations are used to make
improvements to the system. (A table) showing the type of test, test data, expected results,
actual results and a comment on the results.

SM

FA

How evaluation results are used


Test results will help the systems analyst to make judgements and identify limitations.
Comparison will be made of the actual results with the expected results. If the results are not
as expected system will need to refined. Comments in the comparison table contribute to the
evaluation. Obtaining feedback from the user. Could observe users performing set tasks.
Interview the users to gather their responses about what they thought of the system and how
easy it was to use. Questionnaires to all the workers to ask them how easy they found it to
use. The results could be analysed statistically. Identifying limitations of the system. Any
extensions to the system users have said they would like. Making improvements to the
system. Evaluate results of testing against the requirement specification. Evaluate the results
of user testing.
Identifying limitation
Compare actual test results with expected results. Discuss with managers how successful the
new system has been in meeting the original objectives/requirements specification.
Get information about how easy the system is to use (questionnaires/interviews). See if the
users have accepted/are happy to work with new system (observation). Observe how long it
takes to complete a certain task. Record any extensions to the system that users have said
they would like.

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

EXPERT SYSTEMS
Working:
System asks questions user responds on screen and future questions are based on user
responses. Searches knowledge base for information to match response. Uses rules base and
inference engine to simulate human reasoning. Makes use of an explanation system to
indicate how answer found. Rules base made up of inference rules and inference engine uses
these to draw conclusions output often in the form of probability/risk to company,etc.

BU

TT

Parts:
Explanation system: Providing a trace of the reasoning that produced a decision
User interface: Using a display to allow user to input data/request
Inference engine: Uses the data input for reasoning. Links to the knowledge base.
Links to rules base/matches rules that apply to current question and selects applicable rules.
Applies applicable rules. Uses forward/backward chaining to reason/arrive at solutions
Passes on next question to user which reasons by chaining used in conjunction with rules
base to reason through a problem to provide a solution.
Knowledge base editor: Used to edit data and input/update facts.
Knowledge base parts: Facts base: Holds the data collected from experts
Rules base: Holds the rules as a series of IFTHEN Tests the input data and carries
Backward/forward chaining

FA

Expert system is set up in following steps:


Knowledge engineer collects information from experts and from other systems and carries
out data mining. A knowledge base is then designed. Forward chaining in implemented in
system. Rules base is then designed to be used by the inference engine. A suitable user
interface is developed with validation rules. Knowledge Engineer then designs the questions
for a user and creates an explanation system for output. System would be checked using data
with known outcomes. Production of user manuals/training of staff in E/S use is then carried
out. A test plan designed with known answers from experts and finally an implementation
plan is set up.

SM

Knowledge base editting:


Using built in text editor of the system. System adds new facts automatically to database
from company server. Remote access to knowledge base and amended by research staff using
text editor directly on knowledge base.

Knowledge Engineer working:


Collects data from experts and then decides what data is relevant. Then he enters data into
knowledge base and designs and creates knowledge base. Undertakes data mining, edits
knowledge base and designs and creates the rules base.
e.g.Medical application: Interviewing medical experts in the field of medicine under
consideration/expert doctors to gather information. Selecting relevant data to be included.
Data mining using previous research reports/the internet. Sorting relevant diseases and
symptoms from the data collected.
Advantages (In random situations):
Reduces time taken for a technician to find a fault. Improves customer service/standing. Can
predict problems. Saves company money due to faster service time. Needs less skilled work
force. Much faster to reach a decision for bank. Reduced number of bad debts for bank as
gives more accurate advice than a bank employee which leads to better customer satisfaction.
Reduced staffing required to deal with customer requests so lowers payroll.
Reduced chance of errors helps the doctor make a diagnosis. Portable systems can be used
anywhere. Emotionally separates the doctor from the patient

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

Disadvantages (In random situations)


Capital cost. Work force need some training in its use. Needs updating. Need one in every
garage Expensive to set up e.g. collect data/create program. Extensive training for doctor on
how to use system needed. Needs to be kept up to date at all times. Requires work station in
all offices therefore potential security risks.
MONITORING AND MEASUREMENT

BU

TT

WEATHER monitoring:
Light sensor to measure level of light received
Anemometer/motion detector to measure wind speed
Temperature sensor to measure air/water/ground temperature
Humidity sensor to measure amount of water vapour in the air
Rain gauge using bucket and float linked to potentiometer or force sensor - to measure
rainfall
pH sensor to measure acid/alkali level of e.g. water
O2 sensor to measure oxygen level in air/water
CO2 sensor to measure carbon dioxide level in air/water
Sensors are placed in balloons/weather stations. Information is collected from satellites.
Store observations from pilots and uses observation data from shipping.

O
O

Use of collected infromation to draw conclusion (e.g. weather forecast):


Information from the sensors is read and compared to information stored on files already.
Known weather patterns from the past are compared and predictions made based on these
comparisons. Produces weather maps showing isobars, temperatures, etc.
Computer can show graphically how weather (e.g. clouds) will change over time and can do
statistical analysis and predict probability that certain weather will occur.

FA

Use of WHATIF condition (e.g. in weather forecast):


Information over time fed into computer model. Based on changes in weather patterns,
computer carries out statistical predictions. It is then able to change parameters to see how it
affects climate. Needs data over very long periods of time over many years predictions are
compared to actual climatic conditions to refine the model. Use spreadsheets and statistical
software packages.

SM

Advantages (Random conditions):


Gives 24/7 cover qualified e.g. leaving nurses free to deal with other matters/lower costs
using microprocessor rather than nurses. Humans can misinterpret signs/microprocessor
can detect small changes. Can be programmed to monitor specific areas. Rapid response to
any problems. Can monitor several parameters at once. Need for fewer highly trained staff.
Can be linked into auto administration of drugs. More accurate measurements than a
human. More reliable results than a human.
PROJECT MANAGEMENT
How project management software ensures task completion:
GANNT CHART:
Shows clearly the stages/tasks in a big project/project milestones. Can be used as a
communication device between team members. Can be used to motivate teams by showing
progress. Allows tasks to be better co-ordinated. Problems can be resolved by seeing the
effect of moving resources. Permits time management of project/shows end time of project
Allows flexibility in project management. Permits more efficient management of tasks/show
timings of each task/deadlines. Parallel and sequential tasks with appropriate examples can
be represented. Progress of each task with appropriate example can be shown allows

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

emailing of tasks/project information to others automatically/post to website or download


project information. Allows use of PERT charts and resource graphs
Milestones identifiedsuch as selection of hardware components. Time required for each
stage set. Project broken into smaller tasks. Tasks that can run in parallel identifiedsuch as
write software and design casing. Tasks dependent upon previous ones identifiede.g.
cannot determine software until hardware decided. % Progress reported week by week.
Alarms if task is late/ reminder when task due to finish or start. Critical path identified
through whole project. Allocate resources. Identify workloads. Event chain diagrams
MODELLING

BU

TT

Financial Model:
Company inputs Cost of materials, cost of manufacturing, projected sales figures,
estimated selling price of system, projected economic conditions, profit margin required and
variable to adjust for break even calculation.
Model outputs production costs/staff required and profit prediction made
System values are adjusted-what if scenario such as using different materials, using
different contractors using different locations and using different time frames.
Use of goal-seek/break even point. Costs of individual parts are totalled

SM

FA

O
O

Models/Prototypes:
How MODELS are produced by printers after using CAD
Thin layer of powder sprayed from ink jet spray head. Machine repeats process building up
layer after layer to form object. It uses slicing (tomographic) technology. Places a binder/glue
during the layering process. Can use plaster or ceramic in powder form
Other devices used in CAD
Graph plotter produce large scale drawings on paper very accurate drawings on paper to
any scale
Large screen to allow development of new designs/products allows enlargement of
components allows use of light pens (etc.)
Second monitor to show commands
Advs of prototypes/models made using CAD
Can handle/see components (before expensive tooling up). Less expensive than making a
model by conventional methods. Can test model (before expensive tooling up)
Use and features of CAD:
Computer Aided Design is used by engineers to design accurate drawings of a component
Component/prototype can be tested before it is produced
Can modify designs as result of testing under variety of conditions
3D views can be created from 2D drawings
Can zoom/view from different angles
Walk through/virtual prototype to show product/product interiors/alternative views
Use of library of elements to choose from plus example of elements e.g. windows
Total cost of a product can be calculated using a database of parts held by program
CAM
Computer Aided Manufacture linked to computer system
CAD generates a list of instructions for the Computer Numerically Controlled lathe/similar
appropriate device
To cut product to designed dimensions
Using LOGO type commands
And monitoring the dimensions of the prototype

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

Data collection (e.g. in supermarket CHECKOUT)


METHOD
- information gathered from a shop already using new system
- data gathered at different times of the day
- data gathered on different days of the week
- customers are interviewed after processing/observer watch the customers being served
- POS records examined to find data
- a number of till operators/customers sampled for questionnaire
- sensors/data loggers count and time customers
Data gathered
- number of customers at a given time of day
- number of tills/checkouts
- number of items per customer throughout the day
- time taken to serve a customer
- as a function of number of items

Headphones for communications/hear


instructions
LEDs for information on buttons/switches
to show status/warnings
TFT displays for aircraft status readout/in
instrument panels
Joystick/flight yoke for use by hand linked
to potentiometer to record movement by
pilot/manoeuvre aircraft
Pedals for use by feet linked to sensor to
record movement by pilot
Instruments/dials/display showing
current conditions of plane
Navigation display to show
direction/location

O
O

SM

FA

Devices in Flight Simulator:


Numerous sensors
motors to alter seats, simulator cage
movements, etc.
hydraulic rams
screens to show flight data
system to save pilot reactions
printer to give hard copy of landing and
take off performance
buzzers (etc.) to warn of
problems/incorrect pilot reactions
DAC/DAC to send information to and
operate motors
actuators to control motors
powerful speakers to add realistic sound
levels

BU

TT

Purpose Built:
Software written for a specific purpose. Can be expensive due to time needed to write it/long
time to write. Can be expensive due to need for programmers. Can easily make changes to
software as it tested in real situations. Can run faster since only carries out the specific tasks
has unique features for the task in hand. Speed of processing program is higher.

Interaction of hardware and pilot


Pilot makes changes to controls and sensors give feedback to system. Information from
sensors is compared to stored data. Then computer sends signals to motors to change
position etc. use of ADC and DAC interfaces. System sounds warning sounds/buzzers
system updates displays for pilot and it automatically records data during training.
Experience of engine failure in flight simulator
Supervisor/pilot selects event. Software creates the required outputs using DAC outputs to
simulate e.g. sharp descent e.g. change in engine note. Alarm signal/ change in status
display. Pilots reactions are recorded by system on hard disk for review. Pilot inputs data by
e.g. pushing on joystick/pedals/pressing control
Advantages (In different situation):
Car driving: Safer than learning on roads, might attract existing customers who then
buy cars for young people, marketing ploy to attract news coverage, can repeat a manoeuvre
many times and situations can be simulated.

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

Flight simulator:
There may be no aircraft available to permit training. Passengers would not be happy if a
trainee was undertaking tasks so passenger reassurance of quality. Extremely unusual events
can be programmed into the simulator. Events can be repeated as often as required. The
operator can adapt the program to suit trainees performance. Training can be recorded for
future use/automatic assessment. Weather conditions can be created at will. Dangerous
scenarios can be simulated with no risk to the pilot so safer. Reduces risk of accident causing
costs for airline so training costs to the airline can be lower. Can be scheduled more flexibly
that aircraft. Controller can try out various scenarios to see how pilot reacts. Pilot can be
automatically assessed.
Disadvantages (In different situation):
Car driving: Costs company money to buy and maintain and might not be taken seriously
by young people
Flight simulator: Pilots may not consider the simulator as real. Simulators are very
expensive to buy and run. Not all events/parameters/conditions can be simulated

TT

MARKET RESEARCH

BU

Primary research: Prospective/existing customers interviewed/questioned by


organisation
Secondary research: Examine data already published to determine preferences and
prototype version shown to selected audience and reactions gathered.

SM

FA

O
O

General Methods: (Primary)


Send out questionnaires/surveys to target groups. Research what competitors are doing.
Customer uses a web site to complete questionnaire. Monitor sales of items from the shops.
Store all the information on databases and later analyse the information. Produce report
showing results of the surveys. Carry out personal interviewing in shop/street. Carry out
telephone/email surveys of target groups using a computer based script. Web sites/popups ask views/collect information online. Research results
competitors/academics/consumer trends. Target groups log on to discussion board (i.e.
forum) to give their opinions. Input results from questionnaires using ICT e.g. OMR reader
Store all the information on a database and (later) analyse the information

Explanation of Primary Methods:


Computer Assisted Personal Interviewing where both interviewer and interviewee are
together in same room
Questions are put by the computer program
Interviewer asks questions as prompted by computer program
An interviewer keys in responses from interviewee directly into a purpose-built computer
program on a small device or on a laptop
Computer Assisted Telephone Interviewing where interviewer is usually in a call
centre
Computer dials number from a database of potential customers
Using software based systems to make calls and then connect interviewer with
interviewee
Interviewer asks questions as prompted by the computer program
Keys in responses from interviewee directly into a purpose-built computer program
Computer Aided Web Interviewing where interviewee accesses online questionnaire
Interviewees need access to Internet and web browser
Questions are multiple choice
Computer used responses to one question to choose next question to ask
Use of branching logic statements to choose which questions to ask

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

Interview guests in room/after visit


Track use while guests in room
Analyse data and display in graphs/reports/summary tables
Use questionnaires to collect information from guest
Left in room/checkout Sent by email
Analyse research results: Since questions are multiple choice can be directly input into
computer system hence requiring no human interpretation. Results stored in a
database/spreadsheet. Filters can be applied to select interviewees e.g. by age group/gender.
Results presented as report/graph
RESEARCH APPLICATIONS

BU

TT

Pharmaceutical
Previous results of research work stored can X-match results and save time and money
Results from tests on certain drugs stored so avoids need to repeat expensive tests. Can
predict likely outcome of doing certain tests on drugs. Computers can automatically control
and monitor mixing of ingredients. Storage of analysis results/can check analysis results
against specification. Do statistical analysis of results. Requirement for super computer due
to amount of processing. Administering drug trials feedback and monitoring
Scientific
Formulae would be created to represent the situation. Variables would be adjusted to follow
planned route. Results would be output graphically. Time scale could be altered e.g. the
reaction to a drug. Use of what-if scenarios and goal seek

O
O

STOCK CONTROL

FA

Working of Stock Control system:


The bar code is read and stock file holds details of item sold. Record found on stock file using
key fields/bar code number. Number if items in stock reduced by 1 for each item sold
If number in stock Y re-order level, automatic order sent out. When new stock arrives, stock
levels of that item increased accordingly. Automatic print out of stock levels

SM

Advantages:
No one required to place price labels on goods as held in stock database
Trends can be identified such as best selling products
More accurate monitoring of stock levels due to automatic updating of stock database
Stock file updated using bar code:
Bar code is read at the POS terminal. Bar code is unique identifier of the product and the key
field in stock file/database. Bar code number is searched for on file until matching record
found. Number of that item is stock is reduced by 1 and system checks value against
minimum stock level. If min stock level reached/below then system automatically re-orders.
Automatic printout of orders/sends message to suppliers. When new goods arrive, bar codes
allow update of number in stock.
Information about product held in stock control system:
Product ID a unique identifier
Supplier code for re-ordering purposes
Product description/name/type to display on till/receipt
Item price/discount to use on till/sales
Supplier/cost price for accounts/records
Product weight for legal purposes/customer information
Expiration/sell by date for stock management purposes
Number in stock for management purposes

USMAN FAROOQ BUTT

CHAP 5 AICT

HOW ORGANISATIONS USE ICT 2

Re-order level trigger for re-order


Re-order quantity quantity to re-order
Date of last order/when last order placed
Just In Time:
Customer orders trigger a need to restock. Computer sends order to supplier. Supplies are
ordered to arrive at the warehouse as required e.g. within 48 hours. As required for
selling/distribution. Could be sent direct to customer. Avoids need for large stores. Reduces
cost by not having a lot of unsold items on shelves.

BU

TT

EFTPOS:
Customers are served in less time due to scanners being faster than manual entry. Till
operators are monitored providing store with performance figures. Accurate addition
of/correct prices given in customer bills. Fewer customer complaints/greater customer
satisfaction. Errors identified more easily/less time spent on re-checking bills. No one
required to place prices on goods as held in stock database. Fewer staff required for shelfstacking/monitoring required so reduced wage bill/more profit. Trends can be identified
such as best-selling products. Required storage space for the shop reduced as less slowselling stock needs to be stored. Trends in number of shoppers can be identified
to enable store to schedule till operators. How quickly/slowly items are selling due to
comparison of dates with last order.

SM

FA

O
O

PC VS SUPER COMP
PC used for office/home tasks v. supercomputer for complex number-crunching/calculations
Supercomputer typically used for (large scale) scientific or engineering work/ PC used for
office processing
PC physically smaller than supercomputer
PC less expensive than a supercomputer
PCs are suited to generalised computing tasks v. supercomputers often customised
PCs usually constructed from cheaper components than a supercomputer
A supercomputer can do billions of calculations v. a PC does not
Supercomputer carries out more processes per second/ FLOPS
A supercomputer is permanently on v. a PC is usually not always on
Supercomputer has many more processors than a PC
Supercomputer has more RAM/memory compared to a PC
Supercomputer uses tailor made/customised operating system
Supercomputer can support more users at same time than a PC
Security monitoring requires processing power of supercomputer to handle volume of trafficPC could not cope in the time frame

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

HOME ENTERTAINMENT:
Features of a home entertainment system
Can access digital media stored on e.g. CDs, DVDs, Blu-ray, flash memory. Can access
remotely stored digital media from e.g. the internet, media streamers, locally stored files.
Can access analogue media. Has LEDs to display information. Can accept/use/play a range
of audio/video formats. Provides a number of different sound and vision outputs for
connection to other devices. Can use DRM to ensure media is protected from unauthorised
use or copying/gives authorization for playback. Can use several loudspeakers for surround
/multi-channel sound. It usually has a remote control to e.g. adjust sound output format.
Can have HD television for high-quality pictures. Can have 3-D television for greater realism
in images. Can have a hard-disk recorder.

BU

TT

Advances in technology which have led to music CDs being replaced by other
media
Ability to download music straight to a computer. Plug and play devices/ease of USB port.
Music downloaded to MP3 players. Reduced size of hard discs leading to smaller players.
Increased capacity of storage media (flash memory or HD) holding more tracks. Improved
compression techniques reducing size of files. Reduced size of batteries leading to smaller
devices. Increased battery capacity leading to longer play time. Improvements to user
interaction with hardware via HMI. Broadband enables much more downloading of music
files. Most modern music is already held in a digital format. Solid state memory leads to
more robust players. Use of hard drives to store music rather than CDs. Home entertainment
system that combines TV, etc.

FA

Why CD and DVD files are being converted into MP3 and MP4 format
Audio and video files are usually very large/MP3 or MP4 files are smaller. MP3/4
compresses files by up to 90% e.g. a 60Mbyte CD track becomes a 6Mbyte MP3 file.
Sound/video quality is maintained. Normal data compression doesnt reduce file very much
and loses quality. Allows a vast number of files to be stored on MP3/4 devices. Faster
download over Internet due to compression. Faster downloads due to increased broadband
speeds. It is now possibly to buy on-line and download the MP file. Easier to store MP3 files
on HD than to have lots of shelves holding disks. Increased storage capacity of solid state
devices has increased demand for MP3 MP4 files.

SM

Differences b/w use of MP3 players and CDs for storing music in digital form
MP3 uses compression but CD audio is uncompressed. MP3 players use hard disks/flash
memory whereas CD audio is stored on optical media. MP3 players have large capacity so
store more songs/tracks than CD media while CD media is limited to 70/80 minutes. MP3
player content can be changed/deleted but CD content cannot be changed.
How it is possible to store many thousands of songs on media player
Files are compressed MP3 file is 1/10th the size of a normal song file. Developments in
CODECs. Removes high frequency information. However: higher the bit rate, larger the file,
less can be stored but music quality is better. More compression results in lower quality
sound.
Technological developments by which CDs and movie DVDs will be phased out
Possible to download files from the Internet. Much more material on the Internet. Torrent
type of usage more prevalent. MP3/4 players/flash memory cards are more available/have
larger capacities/cheaper hard. Video on demand being promoted by service providers.
Blue ray technology with more information/higher quality. MP3/I-Pod docking stations have
replaced CD players. Combined mobile phone/MP3/movie players.

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

Use of different items


MP3: Compatible format for media playing systems. Playback music files\ability to listen to
music files. Data is compressed compared to a CD. Results in 90% compression, reducing file
size/additional storage.
USB port: Enables music to be transferred to from the HMC (note to markers include
playing or recording). Upload firmware upgrades. Linking to other hardware
Secure Digital Memory card: SD is used to record programmes on DAB radio.
Programmes/files can be transferred to music centre. Music on music centre can be recorded
onto SD card and transferred to mobile phone. Additional storage device.
TV programmes terrestrial transmission method
Programmes are created in broadcasting centre and sent to a local transmitter. Sound and
vision sent separately and combined at transmitter station. Radio/electromagnetic wave
signal sent from local transmitter mast. Received by directional aerial/aerial pointing
towards transmitter.

BU

TT

Satellite television working method


Programs are sent to a central switching station for encoding/modulating/uplink.
Encryption of signal. Signals sent to satellite in stationary orbit. Satellite transcodes signal
onto signal for transmitting from transponder. Satellite sends signals to earth. Dish on
property collects signal. Shape of dish ensures signal converges on LNB (low noise
blockdown) converter. The signal is amplified by the LNB. Satellite receiver box converts
signal understood by tv. Signals received need to be decoded/decrypted and (use of a viewing
card) allows decryption to be carried out.

O
O

Hardware which is used to receive digital signals rather than analogue signals
Use of satellite dishes rather than an aerial. High speed cable to UBR/service. LNB to reduce
received frequencies. Need for digital receiver/decoders connected to TV.

SM

FA

Reasons for converting to satellite television (Advantages)


Can carry more channels that a terrestrial system. Able to access more customers via
satellite/only need to have line-of-sight of the satellite. More revenue possible as can charge
for access to services. Higher perceived quality of service/picture. Can provide more HD
channels as higher bandwidth available. Can charge for pay-per-view channels/events.
More consistent reception/less susceptible to interference/weather. Signals not blocked by
hills/buildings as much/easily as terrestrial signals. No need to have multiple transmitters
across the country. No need for distribution network to transmitters. No need to plan
transmitter coverage. Provides a more detailed Electronic Programme Guide (EPG) for
viewers/customers. Terrestrial transmitters produce a lot of waste heat/power wasted in
cooling. More tv stations available/can receive programs transmitted from overseas/other
side of world. The dish is more compact than a large TV aerial. Interactive shows can attract
more viewers. Programmes can be repeated filling extra channels. One satellite can cover a
much wider area than a terrestrial system. High definition sound/picture. Better format for
compression. Better quality recordings possible. More sophisticated programme guide.
Disadvantages
Can break up (pixelate) if signal is interrupted. Time lag. Requires special electronic
decoders. Hardware can be more expensive.
Video-on-demand
Streamed/downloaded video/audio content from remote server. Distributed by IPTV over a
network. Use of menu to select content. Viewer can watch/listen at their own convenience
/when they want to. Use of pause/rewind/fast forward. Received by set top box /computer
/mobile device.

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

Interactive games consoles


These started as solo devices but now offer sophisticated graphics requiring powerful
processors and graphics engines. These target user group- 25 male with disposable incomes not younger people. Now it is possible to play with other users all over the world, provided
the console has the necessary link to the Internet.
AUCTIONS:
Steps taken when using an internet auction website for the first time
Register with auction site/set up account by setting up user ID and password and security
question. Use captcha/authentication process. Accept conditions. Set up categories of goods
to sell. Display good details/descriptions with images and price. Set auction time limit with
buy now price and shipping costs. Payment options. Returns policy with contact details.
Confirmation options. Allow feedback and comments.

O
O

BU

TT

Features of auction website


Login/logout feature. Menu/list of sections of products sold e.g. TVs. Hyperlinks to latest
offerings, product details and details of damage to items. Watch list for items buyer
interested in. Search facility to find a specific music centre/camera etc. Bid lists to show
latest bids on items. Time remaining for bidding facility. Buy now facility to avoid having to
bid. Highest bid facilities to alert of highest bid/new bid. Link to secure payment form.
Currency conversion facilities/show in different currencies. Shopping basket with products
chosen/checkout facilities. Secure payment facilities/storage of credit card or payment
details. Delivery/order/purchase/order history tracking facilities. Contact details for BAC
/feedback options. FAQs/Help facilities. Site map of website.

FA

Security issues that could arise when using internet auction websites
Log in details may be accessed and used by others to bid on goods. Personal contact details
may be stolen and misused/used in identity theft. Financial/credit card detail may be stolen
and used to purchase goods/in fraudulent transactions. Website may carry malware so, e.g.
Trojans/viruses/spyware/adware may be downloaded to the computer. Personal contact
details may be stolen and misused/used in identity theft. Details may be used for advertising
/spam emails.

SM

Benefits and drawbacks to the customers of buying goods on auction websites


Benefits: Can buy/bid at any time and from any location. Can use any Internet-enabled
device. Can compare prices with other sellers prices. No need to spend money on travelling
to shop and no need to waste time travelling to shop.
Drawbacks: Cannot actually examine the goods/must rely on sellers description. Must
have credit/debit/suitable payment method available. Must wait for seller to despatch
goods/goods to arrive. Seller may not be reliable/may not send goods. Limited protection by
consumer legislation against fraud or faulty goods or misrepresentation. Owners of auction
site may not support claims against seller.
How problems could be overcome
Unauthorised users take control of site which is prevented by firewall. Delete information on
web site prevented by access rights to web pages. Insertion of virus onto site prevented by up
to date antivirus software used on traffic to site. Add spyware to site to ensnare users
use firewall to trap such traffic/anti-spyware. Keep access details of registered users in a
secure server away from web site files. Fake goods/false sellers on site can be overcome by
seller ratings and guarantees. Data could be intercepted so use encryption technique.
Users/buyers can become addicted to online auctions, take up too much time/restrict time
available for other activities/spend too much money so get into debt. Reduce time spent
/have a strict spending limit/block online auction sites/take up other leisure time activities.

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

Advantages of auction sites


Wider choice of tickets available. prices may be lower (if somebody no longer wants product)
Can buy products from overseas not advertised in own country. Can buy product even if sold
out.
BOOKING:
Steps that a customer would take when using the website to book a room
Search for hotels in e.g.Brazil. Choose language. Select dates start/end date/duration of stay,
number of rooms, number of occupants and select facilities/options. Enter personal details
such as home/contact details, payment details credit/debit card to guarantee/pay for rooms.
Confirmation of booking print/save at once/via email.

BU

TT

Cinema Ticket Booking


Cinema branch to go to the correct branch/cinema location. Date to state when you want to
go/define when tickets required. Time of performance to state which performance you want
to see/establish exactly when seats required. Film title to which film you want to see.
Number of seats so that system can find a block of seats for customer and group to sit
Together. Credit card number for payment to be made immediately to secure tickets.
Address for security in using card. Email address to provide receipt/ticket reference
number/confirmation of tickets. Name to identify the purchaser/match billing address
/authorise payment/ to use as verification when collecting tickets. Login details if user has
an account with the cinema.

O
O

Information in confirmation of ticket


Transaction number/booking reference number. Unique code for receiving/collecting
tickets. Receipt with price/cost details. Contact details of cinema/ticket agent.

FA

Method of ticket production by computer


On-line processing of tickets. Step-by-step processing of tickets. Credit card used for booking
placed into kiosk. System asks for surname as confirmation of ID. Kiosk lists bookings made.
Correct booking selected. Tickets printed out. Receipt issued

SM

Security Features of website to make transaction secure


A clear message on the screen stating how transaction is safe. Notice to state that digital
certificates is not from the cinema site. A padlock in the browser. Use of HTTPS mode in
URL. The use of a password system to create account if required/ to use the card
How Internet has encouraged the rapid growth of air travel to foreign countries
Online ticket sales provide ability to search for cheapest air ticket. Allows customer to choose
seating from the screen plans. Easy for companies to inform customers of special deals. Easy
to search for destinations anywhere in the world. Immediate purchase of tickets online. Can
print tickets at home so no need to visit shop. Ability to allow for automatic check in by
storing personal details on airline files. Search engines can easily search all airlines for best
deals. Airlines/agents send emails with offers. Last minute deals possible via Internet e.g. for
flights with empty seats. Research facility on destination. Read online reviews of
country/hotels.
Advantages to the company of allowing visitors to buy tickets in advance
Fewer complaints from customers about queuing times. More customers due to faster
system. Fewer staff required at turnstiles (to admit visitors). Advanced planning possible
from trend in purchasing. Reduced printing costs as company will be printing fewer tickets
themselves. Company will have some advance notice of prospective visitor numbers.
Customers buying tickets in advance would have to use the website and therefore see any

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

advertising which generates revenue for the company. Customers buying tickets in advance
would have to use the website and will be able to leave feedback for the company. The
company can attract more customers by using a website.
Benefits to the airline of offering online booking
Wider customer base. Tickets can be booked at any time/from anywhere - better customer
satisfaction. Reduced number of staff/reduced number of offices/no commission to agents
for selling tickets so reduced costs. Faster processing of bookings/faster check in - better
customer satisfaction. No double booking so better customer satisfaction. Advanced notice of
customer requirements e.g. meals/seat allocations. Can operate outside normal business
hours. Less risk of losing ticket. Faster check-in process.

BU

TT

Information that a customer would expect to have to input in order to book a


ticket
Departure pint to show where the train is to be boarded. Destination point to show which
trains are available. Date of travel to show when the journey is to be made. Time of travel to
show which train to catch. Class of travel to choose the standard of seat to be used. Single or
return journey depending on whether the journey was one way or a return to departure
point. Number of adults to show how many seats are needed at full price. Number of children
to show how many seats are needed at reduced price. Seat reservations to ensure that there is
a place to sit/room on the train. Special requirements e.g. accessibility. Contact details
/email address to which the confirmation is to be sent.

SM

FA

O
O

Benefits and drawbacks of online booking to the customer and the company
Customer: Benefits: No need to travel/queue/go to booking kiosk, office or agent for
tickets to make advance bookings. Can cost less as there is no need to travel to ticket office,
kiosk or agent. Can be used to make a booking at any time of day. Tickets can be obtained
quicker than using ticket office. On-line might have special offers as agent/office/company
costs are lower. Can compare prices at leisure.
Drawbacks: Must be computer literate/have a system e.g. smartphone/have an internet
connection. Cannot ask detailed questions unlike a human. System might be down- unlike a
timetable book so cannot make a booking at that time/have to wait which can be
inconvenient. Need a credit card to make bookings/collect tickets at departure point.
Company: Benefits: Requires less office staff so overheads are reduced e.g. smaller
booking offices. Can be quickly updated with latest offers/news. Better customer satisfaction
due to e.g. faster service. Can hold more information than a human.
Drawbacks: Expensive to employ programmers/purchase hardware/set up and maintain.
Vulnerable to hacking so is vulnerable to fraud. Must be kept up to date to provide the
correct information. Less personal touch. No opportunity to sell extras to customers e.g. seat
reservations/travel insurance.
How company provides the details for the customer to print their tickets and
ensure each ticket was unique
Company sends out ticket details to customer via email. Use of web form for input. Web page
/email instructions how to print ticket. Print out unique bar codes on the tickets which
match up with credit card details. Name of customer + id code on the ticket. Details of
customer verified on web page.
Stop two people from using the same electronic ticket
Security features when ticket issued e.g. customer must provide passport number, proof of
ID (e.g. passport) and details when using e-ticket e.g. customer last name.
Impact on society of electronic ticketing
Unemployment for clerical workers. New employment in technical work. Shorter working
times/more flexible working for staff. Less time spent queuing at check-in/buying tickets.

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

No need to wait for tickets to arrive. Less time spent in the process of checking in. E-tickets
have encouraged more travellers benefiting certain societies/countries. Increases digital
divide as customers need Internet access.
Advantages and Disadvantages of on-line services in general
Can do shopping and banking from home. Can be used at any time of day unlike shops
/banks. Much wider choice (of services) available. Can book/buy tickets online. Broadband
makes more services available. Even if live in small town, have access to services. Use of
laptops/wireless connections to allow disabled people to use services anywhere. Disabled can
participate instead of going out. Easier to compare services online. No need to travel to store
(saves money and time). Safer to use the Internet because e.g. no chance of mugging.
The digital divide is broadened. Access to legal information leads to armchair lawyers. Risk
of fraud (money taken from your account whilst e-shopping), risk of personal id stolen (from
Government files), stealing credit card details, bogus websites, may be no human advice on
service, changing/deleting key data once files accessed, spreading of viruses via emails and
open to spamming.

TT

ALL LEVELS OF GOVERNMENT:

SM

FA

O
O

BU

Reasons residents use local government website


Population could apply to go on electoral register. Read local government news. Log into
their local tax records. Email local government. Apply for official documents e.g. driving
license or passport. Search for local government decisions on planning/budgets/policies.
Read a blog from local government. Look for a job with local government, see location of job
centres/employment agencies, online training services, online recruitment facilities and
search for employment opportunities. Pay tax/bills to local government. Apply for grants.
Identify members of govt. Look up maps. Access details of registered businesses. Find details
of local facilities. Opening times of services/schools/ tourism/hospitals. Voting online for
local elections. Submit a tender for a contract. Education and learning opportunities such as
places in senior schools/universities and allowances paid to students. Motoring such as
driving licence/car tax. Home such as regulations for building/selling. Community such as
local councillors/crime rates/contacts. Employment such as local government vacancies.
Financial matters such as rates, tax benefits, pensions. Health information such as local
doctors, hospitals, safe practices, with details of medicines, details of common ailments and
how to treat/cure them, names and contact details of doctors /hospitals/health centres,
comparisons of waiting lists allowing choices for treatment to be made and facilities for
booking appointments with doctors. Travel and transport such as bus times/company
details, passports. Environment such as recycling centres, progress towards targets. Crime
such as location of police stations, crime figures for state, location of courts.
Legal rights such as DPA, consumer rights, citizenship issues. Electoral issues such as
registration of voters/electoral timetables/online voting.
Advantages to the Government of online personal applications
People can have better access to forms when and where they wish. Lowers many costs
/overheads of offices and officers. Gives people better image of government. Less chance of
bribery and corruption.
Method by which individuals could pay their tax bills online
Money transfer from own online bank account using electronic funds transfer. Use of a credit
/debit card on the government website. Use of a third party financial transaction service.
COMPUTER FRAUD:
Ways computer fraud can take place
Personal details can be stolen from post/from company databases leading to identity theft.
Phishing to acquire e.g. usernames/IDs/passwords by pretending to be a trusted entity to

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

gain access to e.g. bank accounts. Pharming to redirect user to a bogus/fake/rival website.
Money taken from personal accounts as a result of pharming/phishing. Tickets intercepted
from online booking details. Loss of bank/credit card details so tickets purchased and
intercepted by others. Skimming of credit cards. Spyware to steal e.g. login details/account
numbers. Hacking resulting in loss of personal details/logon details/usernames/passwords
leading to e.g. theft of money from bank accounts/unauthorised use of credit cards.
Negative effects of shopping systems:
Worsens the digital divide due to some people not having ICT resources. Changing job
patterns in high street shops, fewer customers on high street/more ICT based jobs /fewer
unskilled jobs. Identity theft, deleting/amending/distributing personal details. Open to
computer fraud, money taken from credit cards/goods intercepted from online order details
/hacking into systems. More addictive, easy to spend too much. Lack of socializing
/exercise/try before you buy.

SM

FA

O
O

BU

TT

ANTI-SOCIAL USE OF ICT:

Anti-social use of ict by students:


Students could hack into school system and obtain tests/answers to tests. Students could
change test marks on system to get better grades. Students could alter teachers reports
/gradings to get better references. Students could pass on students details to others.
Students could access private information such as medical records. Students could cyberbully others. Students could deface school websites. Students could send viruses etc to
others. Email addresses harvested used to sell to third parties.
Actions that a hacker might take when attempting to breach the security of
website:
Take control of the site which can be prevented by firewall. Delete information on web site
prevented by access rights to web pages. Insert virus onto site prevented by up to date
antivirus software used on traffic to site. Add spyware/key loggers to site to capture details of
user. Use firewall to trap such traffic/anti-spyware. Access details of registered users which
should be kept in a secure server away from web site files/encrypt.

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

CATERING FOR DISABBILITIES:


Features the computer system should have:
Touch screen with menus operated by head wands. Foot operated devices for pointing by.
Speech synthesis for dumb users. Microphones for physically handicapped to communicate.
Large tracker ball devices for physically handicapped to navigate. Special keyboards /concept
keyboards for physically handicapped to select options. Software magnifier for visually
impaired.
Problems a disabled person might have when using internet:
Physically disabled people could have difficulty in using mouse/keyboard for site navigation.
Visually impaired with difficulty in reading text due to, e.g. font and in understanding images
due to colour/contrast. Hearing impaired with difficulty in following commentaries/audio
instructions/movie or video soundtracks e.g. speed of information flow/background noise
levels. People with cognitive impairment/learning difficulties have difficulty understanding
instructions so create an incorrect transaction.

BU

TT

Features in the website to make it easier to access by disabled people:


Use of alt tags/alternative text for images. Simplify complex language into simpler words
/sentence constructs. Audio instructions can be downloaded. Alternative telephone line
dedicated to accessibility issues staffed by trained personnel. Increase in font size. Zoom
/magnifying feature. Use of different background colours.

O
O

ICT help for physically disabled person to live a fuller life and join society:
ICT enables communication from home such as fax, email, accessing WWW. ICT devices
enable a disabled person to operate a computer such as input by foot switch etc. Disabled can
work from home using ICT. Disabled can access information to help them lead a better life
e.g. grants from local government.

SM

FA

Help in different areas:


Booking a theatre ticket: Can book at any time of day without leaving house, can search
for a show and can find the ticket office. Select space for disabled people and can pay using ecommerce.
Employment: Can research jobs using www. Can undertake online training to obtain a job.
He can work from home and can design own web site to attract employers. He can write
letters/emails for jobs.
Health care: Can research health matters/use online diagnostic systems and can buy
medicines online. Can book appointments online with health professionals and can email for
advice. They can join forums for their disability.
THE DIGITAL DIVIDE / INFORMATION LITERACY:
Perceived/worrying gap between people who have skills and access and those who do not
have skills and access to IT services
Limited ICT skills:
Lack of computer skills e.g. not skilled in application use e.g. word-processing. Unable to
apply or jobs online. Lack of skills in e.g. searching for information. Reduced access to
information. Reduced ability to evaluate information/news. Reduction in ability to
communicate information.
Lack of ICT access and skills disadvantaging communities:
Low incomes - unable to afford computers/internet. Age - too old to tackle new technology
Inability to participate in e-world due to limited access to: Education services: limiting
school education/university entrance no access to research facilities. Health services e.g. lack
of access to doctor or dentist services lowering life expectancy or no access to online services

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

e.g. NHS Direct. Employment opportunities: not knowing if there are vacancies in big
cities/going to big city and being turned away and no applications for jobs. Smaller market
for local products: no online sales for e.g. craft ware due to no online advertising. Local
government community services: unaware of house stock availability and planning
applications. Local government news service: updates not easily accessed and policies not
easily accessed. Communications limited due to lack of infrastructure, reduced speed of
communication leading to no use of web services such as e-commerce, email, information
searching.

BU

TT

Technical developments in ICT/Education reducing the digital divide:


ICT components have fallen in price due to improvements in production. Telecoms cost is
also falling i.e. cheaper laptops and mobile phones. New smaller processors have produced
smaller/cheaper PCs. Developments in ICT encourages recycling of older equipment that can
be used e.g. discarded PCs and 2nd hand mobile phones. Advances in devices enables
disabled people to use ICT. Online shopping enables housebound people freedom of choice.
More/cheaper Computer based training by the local governments. Computers provided in
public places for people to use. Open source software has improved for users. Electric power
provided manually- e.g. windup systems. Broadband is being introduced into more
areas/attracting more customers. Improved telecom links to remote areas e.g. more satellites
hence more widespread network for mobile phones. Enables information to be more
accessible. Mobile phone broadband development. Local govt can provide courses in using
computers. Develop CBL courses for self instruction. Provide trainers to go into villages to
run courses. Purchase low cost systems for the villages. Prepare written training material for
villages. Provide the necessary telecoms hardware for villages. Creating forums for self help.

O
O

USE OF ICT IN TEACHING:

SM

FA

Computers in staff training:


CAI (computer aided instruction) or CBT (computer based training) uses
computer to deliver subject knowledge.
CAL (computer aided learning) or CBL (computer based learning) doesnt replace
teacher /lesson and is used as a learning resource in same way as text book used, teacher
controls the learning process.
CMC (computer mediated communications) uses email, instant messaging and chat
rooms which allow tasks to be sent/received by email.
CAA (computer aided assessment) asks questions and records responses (summative
assessment) and no suggestions for improvement given or reviews answers to specific
questions (formative assessment) where suggests areas of improvement based on responses.
Allows on screen marking to be done.
Disadvantages: Very sterile learning environment, easier to cheat, tendency to do other
things if not supervised, health risks associated with over-use of computers, some trainees
may not be computer literate, expensive to create resources, no expert assistance if required
to answer unusual question and fails if power cut/computer breakdown unlike teacher led
course.
Advantages and Disadvantages of CAL:
Can work at own speed. Can work when you want. Can re-run sections. Can come back any
time they want/pause training at any point. Get immediate performance feedback.
Immediate assessment made. Can include multimedia elements. No need for teacher
/classroom so cost saving. Easy to keep up to date/amend. Can be tailored to exact needs.
Difficult to monitor any malpractice/work rates. Little student/student or student/teacher
interaction. Very specific training/doesnt allow discussions of novel situations. Can be
expensive to produce CAL initially. Student can be distracted by e.g. browsing emails/games

USMAN FAROOQ BUTT

CHAP 6 AICT

THE IMPACT OF ICT ON SOCIETY 2

Marking Examinations and ICT:


Written examination papers are entered electronically into the computer system.
Examination papers are scanned in and converted electronically to a file on server/database
and stored in a format to allow interface with marking software.
Reasons: Faster broadband connections allow transmission of the large files. Wider
availability of broadband and cost of broadband for examiners has fallen. High speed/high
quality scanners and processor speed in computers has improved. Improvements in security
software/protocols. Use of multi-screen/high resolution screen by examiners. Reduced cost
in ICT systems enabling examiners to buy high specification PCs. Software developed for onscreen marking. It is now commercially viable to develop the software.
Advantages and disadvantages: No fees for examiners/ fewer staff required lowering
costs. Reduced costs of administration. Fewer examiner meetings required therefore
cheaper. Less likelihood of scripts going missing in transit. (Better customer relations due to)
faster results service for candidates. Increased detailed statistics available. Initial hardware
setup costs. Initial cost of software. Errors due to faulty mark readers. Errors due to
inaccurate completion of OMR sheets. Answers not strictly worded as per mark scheme may
not be given credit. Possible software errors. Loss of power can lead to no marking.

TT

INFORMATION SERVICES:

SM

FA

O
O

BU

LEGAL SYSTEMS:
Students can show understanding and knowledge of how ICT, mainly through the WWW,
provides useful information and services to users.
They can find local information on a range of problems of a legal nature. Again this topic
could lead to presentation or a quiz.
Increased access to legal information
Increased involvement in focus groups
More able to influence political representatives

USMAN FAROOQ BUTT

10

CHAP 7 AICT

COMPUTER NETWORKS

Internet Protocols

TT

Internet Protocols
FTP/file transfer protocol - for uploading data/files/pages to web server or website
HTTP/hypertext transfer protocol - for accessing or viewing/displaying content web pages
HTTPS/hypertext transfer protocol secure - for secure data transfer between web pages
SMTP - for email
IMAP/ Internet Message Access Protocol - transfer of email over SSL
TCP/IP/Transmission control protocol/Internet protocol - for packet transmission, provides
end-to-end connectivity specifying how data should be formatted for transmission/
addressed /transmitted/routed/received at destination
SSH/secure shell - for secure access to log into remote computers and manage them/execute
commands
POP3/Post Office Protocol ver.3 - used by email clients to transfer email using TCP/IP
Telnet/telecommunication network - to allow remote access for maintenance/configuration
of servers , used to gain access to another users computer/remote access to server, used to
transfer/access data, requires a password login id, lacks security, uses TCP/IP protocol (as a
lower level)

BU

Layers of Protocols
Physical - basic communication takes place at this layer
Data link - go between from network layer to physical layer and acts on requests for services
from network
Network/internet - forwarding packets (data gets to source) and is also responsible for
routing
Transport - divides data into packets for transmission and adds addresses of source device
Applications - delivers services to network/internet layer

FA

Ethernet
Basic set of protocols that are used to operate a LAN. An Ethernet LAN is made up of devices
that send or receive data (PCs, printers, server), network devices that receive and forward
data packets (hub, switch, router) and the medium connecting the device (fibre optic, coaxial
cable).

SM

TCP/IP
TCP ensures data is transmitted accurately while IP makes sure data is delivered to correct
address.
Items of information contained in the header of a data packet under TCP/IP:
Source port/IP address which is the port of sending device. Destination port/IP address to
know where the data is to be forwarded. Number in the sequence of packets. ACK number (if
set). Data offset value showing where the header ends and data begins. Checksum for error
detection. Options flag to permit further information. Padding to fill in header before data.
Total length of packet. Time to live.
Handshaking and Parity checking
The initial communication between two devices that enables exchange of data to take place.
Parity checking verifies that data is transmitted accurately/correctly. Parity can be even or
odd according to number of 1 bits, first bit of a byte is parity bit; next 7 are packet of data
e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity, 0 1 1 1 0 1 0 0 only needed a 0 since
already even parity. If packet arrives at destination and parity doesnt match up then an error
in transmission has occurred. If more than one bit has been changed or bits transposed,
parity check may not pick up transmission error. Block parity can be used to locate errors in
blocks of data.

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

Network Hardware
Network hub
It is used to connect computers to server/computer. It is not very efficient network device.
Sends data to all linked devices, may amplify received signal and works at MAC level.
In short, receives and/or sends packets to all devices connected to it.
Switches
These are advancement on a hub. Switch directs the data stream only to the addressed device
and prevents congestion on segment of network. It uses a list of device addresses and
redirects ack packet directly to sending computer and works at MAC level.
In short, switches direct flow of data packets to specific/individual devices connected to it
and stores details of MAC address of connected device(s) in order to direct packets. Reads
the IP address of recipients system, then looks up the port for this system and then sends
the packet directly to this. Blocks/does not send transmission/data to other ports.

BU

TT

Routers
Routers are gateway device that links LANs to make a WAN. It includes a firewall. These
direct packets according to their IP address, stores list of connected devices, redirects
packets to correct switch/hub and translates protocols (between networks).
Routers provide low level addressing via MAC address.

SM

FA

O
O

Dedicated cabling
Twisted pair: Electrical cable with at least two central wire conductors surrounded by layers
of insulation. Carries data at high speed, has higher bandwidth than WiFi, reduction in data
loss due to lower susceptibility to electrical/magnetic interference, lower susceptibility to
interception and fairly cheap to run a link.
Fibre optic: Made of high quality glass using light as carrier of data. It provides higher speed
data transfer than copper or WiFi, bandwidth is greater than copper or WiFi, longer lengths
possible c.f. copper cable, can be used for external links between buildings and more secure
as data cannot be read while in transit/glass has to be broken to be tapped into. It is easier to
increase bandwidth using fibre optics. Expensive to purchase and install, difficult to repair
breaks/damage compared to copper cable and can be easily broken/snapped compared to
copper cable.
Copper cable: New protocols can increase data transmission rates, these are easy to install as
no cabling is required, easy to add a new system and not as expensive to purchase/install as
fibre optic cables. But easier to intercept, has limited range, limited users to each access
point and requires repeaters/hubs over long lengths.
Servers
File servers - store user data
PCs carry out home/office task such as e.g. internet access, office tasks, have smaller backing
storage size e.g. smaller hard disks, usually have slower/fewer processors than file servers.
Fileservers store larger files e.g. databases than PCs, store user data for access over a
network, reduce the need for users to have local backing storage in their own computer,
control network access rights and allow access by multiple users/PCs at same time.
Application servers - distribute software to client devices, storage of company files/data/ web
site and allow access/login by staff using remote devices on network/from internet.
Proxy server act as intermediary between client devices and servers, to cache frequent
requests for data/web pages to speed up access for client device, acts as a buffer between a
LAN and a WAN/Internet, filters requests from users/returned pages, uses a cache of
requested pages hence reducing time to download a page, only requires 1 network link to the
Internet, enables better management of the usage of the Internet, forwards user requests to
appropriate server, returns web pages requested if allowed, stores pages for faster browsing.

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

Network Interface Card/NIC


Used for a system to communicate with network, it is interface between network cable and
computer, used to prepare and send network traffic to/from computer and receive network
traffic and pass it to computer.
Bridge
Links sectors of network and converts protocols of one network to those of another.
Network Types

O
O

BU

TT

LAN Topologies
Ring: Each computer (including the server) is connected to each of its neighbors and data is
transmitted around the network. Performs well if network traffic is heavy, faulty connection
between 2 stations can cause network crash and difficult to add a new device once network
already set up.
Bus: Each computer is connected to a common spine consisting of cabling with network
leads attached to it and each computer. Each end of spine has a terminator so that data does
not disappear into thin air. Easy to add in new devices even if network already set up, one
device failing doesnt affect rest of network, no need to rely on hub or switch, less cabling
needed reducing cost, hard to identify problem if fault occurs and if there is a fault in spine,
all stations on network fail. Bus network topology is now out-dated.
Star: Each computer is connected to a central hub or switch. If one device fails, rest of
network is not affected, can investigate network problems while it is running, if the hub
breaks down the whole network crashes and requires more cabling.
Hybrid/Tree: Made up of star networks where each hub and the server are connected to a
common bustype backbone. Has same advs and disadvs as of star and bus topologies. It is
difficult network to wire up in hybrid topology.

SM

FA

Intranets
It is private computer network made using Internet protocols/IP to share company
information/data/files securely.
USES: Store information that is specific to company and is not in the public domain e.g. sales
figures, social events, company news announcement, personnel directory with telephone
numbers and email address. Can stop staff using the internet for their own purposes, can
control pages uploaded/downloaded on server and allow access to templates/common files.
Intranets provide secure local email and enable employees to co-ordinate activities e.g. book
video conference suite/arrange a meeting through seeing one anothers diaries. Intranet
provides fast access to company data, forums can be set up for discussion of confidential
matters and provides a means of informing employees about news. Intranet allows
downloading of user profile to desktop, share files projects between employees, blogs for
projects and have internal website for hotel/company only. Intranet is used for distribution
of company notices/bulletins so all employees can access them/doesnt have to be sent out
individually and allows employees to work on projects at same time such as annual reports.
Enables different type of system /smartphones to access information as uses Internet
protocols, uses a web browser to access pages so no special software expense, users require
ID and password to gain access and Intranet is independent of the Internet but holds less
pages/information than the internet.
BENEFITS: Can access company documents from anywhere in company (as and when
needed).
Increase in workforce productivity as employees can locate company
documents/templates/data (using web browser). No need to send/produce hardcopy to
every employee as can use email/instant messaging between employees. Increase in
collaboration between employees with all information available, saving time.
Company/corporate knowledge/information easily updated sent to/available to all
employees. Reduced costs as employees view online compared to hardcopy. Intranet can
restrict access to outside network/Internet leading to greater productivity. Data/company

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

information is more secure because intranet is private. Can restrict/control access to content
on intranet e.g. restrictions to content, restrictions to who can view/access content.

O
O

BU

TT

Wi-Fi (Wireless Fidelty):


Communication is by radio waves. No need for wires hence less costs installing, easy to just
fit an access point than wire up a switch, most laptops have WiFi and can quickly be given
access rights and enables mobile connections. Use of shared spectrum/different frequency,
requires wireless NIC and used by mobile devices to connect to network.
Wireless access point provides Wifi and allows staff to use portable devices/laptops/mobile
or cell phones to connect to network.
Benefits: New protocols can increase data transmission rates, easy to install, no cabling is
required and easy to add a new system/node/device to network.
Drawbacks: Easier to intercept data, limited range and allows limited number of users to
each access point.
Differences between the use of WiFi and fixed cables
No need for sockets at all/users can use anywhere in room with WIFI/sockets need to placed
where convenient for users with cables. Range may be limited/poor connection in some
rooms/parts of room with Wifi whereas connection is always good with cables. Connection
must be secure with Wifi but no need for secure connection with cables. Limited
bandwidth/data transfer rate with WiFi but greater bandwidth with cables. Can connect
more than one device with WiFi but only one device can be connected per socket with cables.
WiFi can be cheap/easy to install but cables need proper installation and can be expensive to
wire all rooms. High power consumption with WiFi but low power consumption with cables.
Interference from other devices with WiFi but little interference with cables. Low data
transmission rates with WiFi but high data transmission rates with cables.

FA

Features of WAN
Covers a large area/multinational networks, enables geographically distant offices to access
the intranet allows intranets to be spread over different LANS, consist of LANs connected
with routers and communications links, uses various protocols to communicate over long
distances and different offices can co-operate on projects such as annual reports.

SM

Hardware needed to connect computers together to form LANs and WANs


Network hub to send data packets to correct device. Number of devices connected to it,
doesnt read data just sends it on to other computers in network, sometimes amplifies the
signal (active hub), a passive hub doesnt amplify signal.
Switched hub (switch), normal hubs only allow one packet of data through at a time,
switches know addresses of each device, when sent packet from device notes address of
sending device forwards packet to other computers and hubs/switches which are connected
to it (except sending computer).
Router/bridge to act as a gateway/link to WAN, enables data to be routed between different
networks, choses another route if traffic heavy, can incorporate a firewall and its function is
to transport TCP/IP protocols between two networks and to allow private networks to be
connected to other networks such as the internet.
Cabling can be twisted pair, coaxial or fibre optics/wireless communication link.
Servers to link computers/store files/applications, can be for storage, web, proxy, email, etc.
Network interface card (nic), allows the processor to connect to a server.
Allocated IP address of the computer
VPN (Virtual Private Network):
Secure means of tunnelling using public network. It is cheaper than creating a private WAN.
Used by staff remotely to access system, provide secure/private transmission of company
data between remote locations, provide tunnelling using routing protocols to connect
company sites together

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

Sends encrypted data, provides confidentiality, uses TCP/IP protocol, through the
internet/not a physical network. Uses tunnelling from one LAN to another/VPN client makes
tunnel to server. VPN uses public communication links. Packets are encapsulated within
packets of native transmission network.
Network Security
Physical: Authorised access to data using locked rooms and using security guards

SM

FA

O
O

BU

TT

Software
Firewall: Monitor and stops unauthorised traffic. Examines IP address in packet and uses
look up table of allowed IP address/forbidden addresses. Checks allowed domain names in
allowed/forbidden table. Filters on keywords/code sequences in data packets, blocks/allows
ports for data transmission, can be set to stealth mode so that packets are not bounced back,
can act as a proxy server to control access and can act as authenticator for remote access e.g.
manages passwords.
Encryption: Changing confidential data such as customer credit card numbers into
meaningless (scrambled) data so data can be safely transmitted/cannot be understood if
intercepted. An encryption key is used to encode data and key is used to decode data stream.
The longer the key the more secure is the encoding.
Digital Certification: Issued by a trusted organization and allows server and client PC to trust
each other/are who they say they are/allows secure transactions. Used in secure servers
(https). Used as an attachment to an email and verifies the identity of the sender. Recipient
holds the public key to decode message.
Authentication Techniques: Use of password and user ID and digital certificate supplied to
user. Can require the use of two techniques to gain access to system. Unique feature that only
you have that identifies you e.g. a fingerprint/biometric feature/use of biometric data to
identify unique individual. Unique knowledge that only you know that identifies you e.g. a
security question. Unique object that only you own that identifies you e.g. a bank card.
Device to generate one off code/TAN sent by email.Use of chip and PIN. IP address logging.
Security question/letters from a security code . Bank to call back/text message customers.
Others: Anti-spam software uses filtering to automatically delete junk mail/reduce
unnecessary traffic on network. Anti pop up software denies unwanted sites. Anti-spyware
software stopping cookies/keylogging. Viruses sent to the system so use anti-virus software
which is updated regularly.

Electronic Conferencing

Hardware: Phone handsets (landline or mobile) for telephone conferencing and webcams,
microphones and speakers for videoconferencing.
Software
Conferencing software/Skype - compresses audio and video elements produced by the Input
devices/microphones and webcams. CODEC - enables sufficient data to be transmitted
quickly enough to be in real time. Software has feature to record conference. Echo
cancellation software allows talking in real time to take place and keeps communication
synchronized. Communication software allows system access to internet/satellite link to
permit transmission. Software creating UDP packets and encryption software for signal.
VOIP Voice over Internet Protocol: Uses Internet/Intranet to carry telephone calls, sound
input is compressed for transmission, requires dedicated software, inter-branch/
international calls are cheaper than landline calls, other Internet services are compatible e.g.
file exchange and audio conferencing to carry voice/audio conversations, can be computerbased or connected to ordinary telephones, allows automatic routing of calls/answering
services

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

Reasons for use of VOIP: Telephone number stays with computer/laptop so same number
wherever user is in world, telephone numbers are independent of location so no need to
store/use different numbers, internet phones are portable and can be used anywhere there is
broadband connection, call forwarding/call waiting/voicemail/caller ID and three-way
calling are available, can have multiple users/two or more participants/ conference calls and
can use existing PCs/network instead of dedicated telephone system.

FA

O
O

BU

TT

Video-conferencing
Setting up video conferencing suite:
Large screen monitors (digital) projector to enable delegates a realistic view, high
quality/HD webcam / HQ/HD webcam on each station that can move and zoom to take
images in real time to relay back to other delegates, several microphones/speakers/headsets
to enable delegates to be heard clearly, call up device to enable access to communication link.
Delegates sit in front of screens with microphones to pick up sound, cameras provide wide
angle view of room and can be zoomed onto a speaker and chairperson controls meeting.
Broadband connection/satellite link to suite really needs high bandwidth.
Advantages to the company of using video conferencing:
Computer files can be updated in real time, can be set up at short notice to overcome crises,
regular meetings become viable, initial hardware costs are offset by savings in travel costs,
safety aspects no risk of kidnapping/terrorism and no travelling time required away from
office hence more productive.
Recent developments that have led to increase in use of VC:
Increase in terrorist attacks has driven the need for video conferencing, faster
communication /broadband connections and wider availability of high speed links.
Companies have tended to become global, faster processors in computers now allow for jerkfree images, multi-screen technology and general improvements in technology has lowered
costs/improved image quality. Increased costs of flying/fuel/taxes on flying and cost of
venues and increased awareness of environmental issues so less willing to travel.
How video-conferencing software enables group meetings to take place:
Noise cancellation prevents unwanted audio elements, uses a codec for compression and
compression ratio can be very high/100s to 1, codec converts audio/video into digital bit
stream, audio and video but stream converted into data packets for transmission over
internet, keeps audio and video synchronized and large screen is divided into sections.

SM

Phone conferencing: Participants just log in with touch keys, cheaper running costs than
other conferencing, time has to be agreed with participants, call has to be set up with server,
cannot see other participants and never sure whose turn it is to speak.
Instant messaging: Easier to use than e.g. video-conferencing, need to log in, cheaper
provided there is internet access, not really suitable for large groups of users, some
companies block use and can be insecure for e.g. transferring confidential documents.
Comparison of VOIP and IM against VC
VOIP is voice over IP allowing communication over the internet. Disadvantages include
need for a special phone or headset in many cases, free calls can only be made if recipient
uses same system and advantages include international/long distance calls are at local rate
or even free, less hardware needed than with video conferencing reducing costs and cannot
see body language/facial expression. Instant messaging allows interaction between users
across internet. Disadvantages include video is poor unlike VOIP, interaction can be slow
and poor synchronization. Advantages include interaction with various IP addresses, video
can be used unlike VOIP, less expensive hardware needed than with video conferencing and
only require low speed internet connection (unlike VC).

USMAN FAROOQ BUTT

CHAP 7 AICT

COMPUTER NETWORKS

Miscellaneous

BU

TT

Describe how the Internet has quickly grown since its introduction in the 1990s
Expansion of the provision of broadband
Price of computers has fallen dramatically over the last few years
Improved search engines
Faster operating systems/software allow multimedia
Large memory capacities (hard drives, DVD), large files to be downloaded and stored
Wireless connections to share Internet service
Other devices (e.g. mobiles, digital boxes, portable music players )
Introduction of online services expanded its use e.g. remote photo storage
Social networking such as chat/personal web space
Greater capacity of Internet backbone
Operating system development faster data processing
More multimedia content posted on WWW
Web authoring software improved making its easier to create own web site
Online banking, shopping and auctions
Music downloads
Movie/TV programme downloads
Video conferencing using Internet, VoIP
Businesses using WANs

SM

FA

O
O

How the Internet has encouraged rapid growth of air travel to foreign countries
online ticket sales
ability to search for cheapest air ticket
allows customer to choose seating from the screen plans
easy for companies to inform customers of special deals
easy to search for destinations anywhere in the world
immediate purchase of tickets online
print tickets at home/no need to visit shop
ability to allow for automatic check in by storing personal details on airline files
search engines can easily search all airlines for best deals
airlines/agents send emails with offers
last minute deals possible via Internet e.g. for flights with empty seats
research facility on destination
read online reviews of country/hotels

USMAN FAROOQ BUTT

AICT

EXTENSION

Features of the new system listed in the systems specification


Data capture form for ease of entry, input devices suitable for disabled, screen layouts, report
layouts for different target users, validation routines to ensure only valid data can be entered
and data file structure required to meet needs of system.
What a computer virus is, how a virus might cause damage to computer and
how anti-virus software would detect viruses
Computer program/code/application/script/software which can replicate itself and can send
itself/copies to other computer systems/devices.
It can delete files, can edit/amend files and can replace system files to slow computer/alter
behaviour of computer.
Antivirus scans computers disks/memory and monitors computer ports for filenames that
match those is a database of viruses and for suspicious activity by software/applications and
scan files for suspicious code.

BU

TT

Benefits of using CAD in designing farm tools


Any designer can access the design from anywhere/other offices so designs can be created
more quickly/reviewed. Designs are easily edited/altered so no need to redraw. Designs are
accurate/precise with no human errors. Use of libraries of shapes/items so no need to
redraw. Accurate measurements on drawings for use in e.g. cost analysis. Assist in
calculating costs for production runs. Can be used to output to 3D printers to print
models/prototypes.

FA

O
O

Off-the-shelf packages
Can be available quicker than purpose-written packages as they are readily available in the
market place. Costs is less than purpose-written packages. Has been fully tested before
launch unlike purpose-written packages. There are forums to offer help and advice unlike
with purpose-written packages. Company provides help desk but slower response than
purpose-written packages. May offer more features than purpose-written packages. Do not
need to be customised unlike purpose-written packages. Do not need to be adapted for use if
circumstances change unlike purpose-written packages. Can be quickly adapted to meet
users requirements.

SM

URL: Uniform Resource Locator


Is the address of the resource to download/view
HTML: Hyper Text Mark up Language
Combines text, images, multimedia into a webpage/for display in pages in a web browser
Networking hardware to establish wireless connection
Wireless NIC that fits into computer with an aerial this receives and transmits radio
waves to the access point/ translates radio signal into data with correct protocol.
Access point a radio device linked to the server which transmits data to an area/controls
access to server with table lookup.
Wireless router which allows the network to access the Internet/acts as an access
point/connects LAN to WAN.
Use of mail merging to send personalized communications to customers
Used to target appropriate customers. Create standard document using fields from customer
database using customer database as the data source, query the data base for appropriate
customers and use of mail merge wizards. When merged each document is personal to that
customer also use mail merge facilities to address envelopes/create labels.
Dot matrix printer
This uses physical pressure/impact and impact printer goes through several pages.

USMAN FAROOQ BUTT

AICT

EXTENSION

Help for customers if they have problem with online order


Ability to send an email with query, frequently answered questions (FAQ) section, online
help chat/email system, telephone call centre, operators provided with a script to assist
customer, drop down boxes with helpful hints/automatic advice, help wizards and company
contact details for snail mail/to visit.
Hardware and software requirements of video conferencing system
Webcams to capture images, microphones and loudspeakers to hear others, large computer
screens to see captured images, high speed internet connections/routers for data
transmission, high speed processor to produce good quality images/smoother motion,
compression software to reduce data transmitted, communications software to establish link
between sites/protocol, sometimes sound/picture quality not good due to delay in signals
requirement for high bandwidth to avoid video breakup, time difference can be a problem,
link to server using password and ID and software to cover security issues (hacking, etc.).

BU

TT

How the information could be put on the site so that it can be easily downloaded
Hyperlinks could be used to download files with text or images. Use pdf format to save
download time. Thumbnails could be used to enable download of images in larger size. Video
files could be accessed using hot spots. Web page design program used to add these features.
Sound in background could be included.

FA

O
O

Use of supercomputers to produce weather forecasts


Complex models created and data provided by sensors such as air pressure, humidity,
temperature, rainfall, wind speed. Data is input into model and calculations carried
out/performed and enormous number of calculations are carried out. Weather reports are
input that are collected around the globe. It searches for a match in past conditions. Software
makes prediction based on past data as it observes patterns in current conditions and makes
predictions and selects most likely forecast. Creates output charts to screens and uses
plotters to print out charts/maps of pressures/wind speeds. Human forecaster confirms
forecast.

SM

Help to call centre operators by computer on dealing with customer enquiries


Computer software provides the script and prompts operator to ask appropriate questions
and leads onto suitable advice provided. Can give access to technical help, can provide access
to product stock file (to tell customer if item in stock) and can provide operator with (email)
link to higher technical level/moving off script. Stores customer file information/can display
customer file information.
Contents of reports produced from the DBMS in CTI
Call response time: Average time of call by operator used to rank operators, identify weaker
operators for training/sacking and comparison with previous sessions.
Number of calls: Statistics on number of calls made, proportion of calls rejected, totals calls
by operator and identification of best operator for prize.
Costs: Costs associated with survey, operators total time, call costs and computer time costs.
Online facility to choose insurance policies
Advantages: Can obtain quote any time of day, can compare several quotes in less time, web
site searches all allied insurance companies, no embarrassment when asked personal
questions, information on site can be updated faster than material in an office and being
online there is no pressure to rush.
Disadvantages: Some companies dont allow quotes through secondary web sites unless
insurance requirements fairly standard, difficult to obtain/tailor policy to meet user
requirements on line, lack of personal explanation of terms and open to spamming by
search companies.

USMAN FAROOQ BUTT

AICT

EXTENSION

Video conferencing use by bank and school (outline)


Hardware and software comparison e.g. bandwidth, size of screens, costs, dedicated suites
How they are used compared e.g. high level directors discussion compared to learning
projects in school, security considerations, communications requirements and quality of
transmission.

SM

FA

O
O

BU

TT

Effects of the use of online services on society

Information stored on machine readable ID cards or passports


Ethnic group, sex, marital status, any criminal activity, address, date of birth, place of birth,
occupation, country of origin, passport number, personal ID number, expiry date, biometric
data such as photograph, passport type, country of issue, nationality, entry and exit stamps
with dates/ countries visited, issuing office and holders signature.
Reasons for use
Security forces can check if someone is an illegal immigrant and can store on file any
terrorist activities/membership of certain groups.
Electronic components in the passport
Embedded chip in one of the passport pages / similar in concept to a smart card holding
biometric and other data and use of embedded ring circuit/RFID for communication.
Advantages and disadvantages of using a computerised passport system
Can tell straight away if passport is genuine, can tell straight away if passport reported
stolen/lost, can tell straight away if passport is withdrawn, countries visited on previous
occasions stored on file, can hold vital information (e.g. if person is member of terrorist
group), can check if photo on file matches up with numbers, possible infringement of civil

USMAN FAROOQ BUTT

AICT

EXTENSION

liberties, access to personal information and increased costs to public/passport holder.


Information on the chip is quicker to read by computer, easier to update from a computer,
more information can be stored on the electronic passports, more difficult to tamper with
the information, more difficult to produce illegal/non-authorised/forged passports, difficult
for somebody to use the wrong/stolen passport, remote processing of passport (using RFID),
could be a smart card or facial/iris recognition system.
Electronic fingerprinting improves airport security
Take fingerprints on non-air side of airport restricting access to secure areas for
staff/passengers, re-take fingerprints on boarding side, fingerprints are stored electronically
and can be accessed at any terminal, very difficult to forge a finger print/ fingerprints
provide greater security, system check if 2 sets of fingerprints match up, compares
fingerprints with pre-stored values on security database/passport, it is possible to store the
fingerprints electronically on passport, computer database can match fingerprint to a suspect
if passport false, computer database can match fingerprint to known criminal and audit trail
of employee movements.

O
O

BU

TT

Providing details for customer to print their tickets and ensure uniqueness
Company sends out ticket details to customer via email, use of web form for input, web
page/email instructions how to print ticket, print out unique bar codes on the tickets which
match up with credit card details, name of customer + id code on the ticket and details of
customer verified on web page.
Security features when ticket issued e.g. customer must provide passport number, need
proof of ID (e.g. passport) and need to provide customer details when using e-ticket e.g.
customer last name.

FA

How system matches e-ticket to a passenger when they check in at the airport
Lead passenger will have paid by credit card number and has to give passport number, name
matched up with credit card holder and/or passport, ticket details emailed to lead passenger,
email printout used as confirmation, email contains a unique (bar) code which identifies
passenger and check-in details match up with stored passenger details.

SM

Advantages of e-tickets when compared to paper-based tickets


Reduces booking expenses for airline, no need to print out tickets and no need for postage or
envelopes, saving on staff and accommodation costs, passenger feels more in control by
selecting seats in advance, more convenient/easily re-printed, cant be lost/stolen/misplaced, less prone to fraud, passenger can print out own ticket, no waiting for delivery,
speeds up check-in at airport benefits passengers and airline/cuts down queues, easier for
passenger to buy tickets (i.e. online bookings/no need to go to travel agent), system
remembers customer details from history and membership number and simpler for
passengers at airport; only need a form of id.
Explain the impact on society of electronic ticketing
Unemployment for clerical workers, new employment in technical work, shorter working
times/more flexible working for staff, less time spent queuing at check-in/buying tickets, no
need to wait for tickets to arrive, less time spent in the process of checking in, e-tickets have
encouraged more travelers benefiting certain societies/countries and increases digital divide
as customers need Internet access.
Advantages of allowing visitors to buy tickets in advance
Fewer complaints from customers about queuing times, more customers due to faster
system, fewer staff required at turnstiles (to admit visitors), advanced planning possible
from trend in purchasing, reduced printing costs as company will be printing fewer tickets
themselves and company will have some advance notice of prospective visitor numbers.

USMAN FAROOQ BUTT

AICT

EXTENSION

Customers buying tickets in advance would have to use the website and therefore see any
advertising which generates revenue for the company will be able to leave feedback for the
company and company can attract more customers by using a website.

SM

FA

O
O

BU

TT

Touch screen is used in zoo


The format of the input screen
Easy to read screen such as suitable font, suitable font size, appropriate background colour,
appropriate spacing (at least two features), use of multi-choice questions, drop down list
with alternative animal features, radio buttons with two possibilities/ or yes no questions,
question such as does the animal have 4 legs and buttons to either quit or start again.
Output after the visitor has input all of the details
The probability of the animal being certain species, suggested possible animals species,
pictures of possible animals (so user can select correct animal), sounds of the possible
animals (so user can select correct animal), location on map of animals in zoo and buttons to
either quit or start again.

USMAN FAROOQ BUTT

Vous aimerez peut-être aussi