Académique Documents
Professionnel Documents
Culture Documents
BY
USMAN FAROOQ BUTT
CHAP 1 AICT
SM
FA
BU
TT
ICT SYSTEMS
CHAP 1 AICT
SM
FA
O
O
BU
TT
ICT SYSTEMS
CHAP 1 AICT
SM
FA
O
O
BU
TT
ICT SYSTEMS
CHAP 1 AICT
ICT SYSTEMS
SM
FA
O
O
BU
TT
Mobile phones
Different aspects include text messaging, phone calls, sending photos, sending videos,
emails, use of the Internet as well as eventual use of live streaming of television programmes.
Are used for communicating personally and for business use in remote areas and whilst
travelling. Uses of sending photos and videos as well as video calls in addition to voice calls.
Used for sending urgent messages which dont necessarily interrupt business conferences.
Portable DVD players
These work in an identical fashion to ordinary DVD players but are built to a smaller scale
and are therefore portable. Used as in car entertainment in addition to any other on the
move activities. Tend to be used for personal use rather than in business.
Portable media players (MP3 players)
Used to record data and play it back. e.g. music, computer data, Internet downloads etc.
Apart from personal use where they are taking over from other portable music devices they
tend to be used in business computer applications. Personal use enables the downloading of
music and radio/television programmes. They can be used for downloading data from the
Internet or the movement of large amounts of data from one computer to another in a
similar manner to memory sticks.
Global positioning systems
Used to pinpoint positions on the earths surface and send this information back to GPS
receivers. These are used in navigation and for accurate pinpointing of position for entry into
geographic information systems. Can be used to accurately pinpoint positions of enemy
artillery etc.
Satellite navigation systems
These are just an extension of GPS to produce routes for cars, lorries etc. Used to produce
routes for car and lorry drivers. They are being experimented with in the routing of trains
Personal digital assistants
These come in many forms even as mobile phones. They usually come with word processing,
database, and spreadsheet and scheduling software. They are used to store addresses, phone
numbers, and e-mail addresses, to-do lists. They can take notes, track appointments and
perform calculations. Used by professionals who tend to be on the move. For example,
doctors on call, engineers on site, travelling salesmen etc. They tend to be more convenient
than laptops where users who are remote from desktop computers still have access to phone
lines etc.
Bluetooth devices
These come in many shapes and sizes, these only work over short distances because of the
weak signals. These are used for purposes where physical linking of computers or devices is
impractical. Used for operating mobile phones when hands free operation is essential such as
in cars, whilst using computers etc
Handheld computers
These cover all aspects of small computers such as mobile phones, PDAs but extend to the
use of such devices where greater computer power is required rather than that just for
business/office based activities. Used mainly in areas where stand alone or network
computers are impracticable. Areas where power supply is variable are typical users of these.
They are also used for environmental studies in uses where portability is key.
Barcode check
A calculation is performed on a long series of digits to produce another digit
This digit is then added to the end of the string.
The computer re-calculates the digit when data is entered
To check whether it gives the same result.
BU
TT
SM
A
N
FA
R
O
O
Benefits:
Traffic can be avoided with suggested alternative routing
ETA can be given
Multi destination routes can be optimised
Can have pre-planned route for drivers
Can be used to help track the progress/route of driver/car
Distance travelled by cars recorded for download into computers (servicing)
Gives more precise instructions for driving to destination
Could be used to attract customers as can be used in advertising
Can be used to help locate vehicle/customers if problem with car
Drawbacks:
Can be expensive to install and maintain/keep up to date
Must be able to detect enough satellites to operate
Sky scrapers/trees/buildings/tunnels/large structures can block satellite transmissions/signals
Units can fail leaving drivers without a plan
Drivers can become too reliant on the system
Customer may not know how to operate the device
CHAP 2 AICT
CONTROL SYSTEMS:
BU
TT
Refrigerator:
Parts and their Functions:
Condensing unit allows refrigerant to cool/cools gas to form liquid and is situated at rear of
refrigerator.
Evaporation unit absorbs heat from surrounds thereby cooling it and is situated inside
refrigerator.
Use of microprocessor:
Temperature sensor monitors temperature inside the refrigerator. Contact switch/pressure
sensor fitted to the door. (Number pad) fitted to input the required temperature. Data from the
sensors converted to digital using an ADC. (Microprocessor) compares temperature data from
the sensor with the pre-set value. If the temperature is higher/lower than preset value a signal is
sent to the actuator. (If higher) actuator switches the compressor on or (if lower) actuator
switches the compressor off. Digital to analogue conversion required. Microprocessor sends
data to LEDs indicating the current refrigerator temperature. Microprocessor compares data
from pressure sensor to zero. If it is zero, microprocessor sends a signal to the actuator to switch
the buzzer on. Timer to calculate how long the door had been left open.
Different size of machines and different temperatures would be required in Supermarket
chillers, freezers, wholesale butchers and breweries.
A Valve
B Evaporating unit
C Compressor
D Condensing unit
SM
A
N
FA
O
O
Function of Microprocessor:
The system controls the amount of heat being let out of the system. Pressure sensor located
between the condensing unit and the valve. The valve is controlled by microprocessor to reduce
or increase the flow of refrigerant. Microprocessor compares the pressure of the refrigerant to
the pre-set value. If pressure of refrigerant is above preset value microprocessor opens valve
wider. If pressure of refrigerant is below preset value microprocessor makes valve opening
narrower. Touch screen is used to input the required temperature. Microprocessor compares the
temperature of the room to the pre-set value.
If temperature of the room is above the pre-set value the fans remain on/are switched on by
microprocessor or microprocessor increases their speed. If temperature of the room is below the
pre-set value the fans remain/switched off by the microprocessor.
Programmable logic controller (PLC) & Proportionalintegralderivative (PID):
They are used to read a set of digital and analogue inputs, apply a set of logic statements, and
generate a set of analogue and digital outputs. In controlling temperature, the room
temperature would be an input to the PLC. The logical statements would compare the pre set
value to the input temperature and decide whether more or less heating was necessary to keep
CHAP 2 AICT
the temperature constant. A PLC output would then either open or close a hot water valve
depending on whether more or less hot water was needed.
PID is a proportionalintegralderivative algorithm. Used when preset value is a constant. PLC
stores preset value of temperature. Temperature is input from sensors. A set of logic statements
is used. PID causes the PLC to make proportional changes to the temperature by switching the
compressor on for short periods of time. PLC/PID is used to compare temperature with a preset value. PID calculates difference between the input value and the preset value. If below, PLC
switches heating element on/switches off compressor for a short time. If above, PLC switches
heating element off/switches on compressor for a short time. PLC/PID checks the difference
again. If still below, PLC switches heating element on for a short time. If still above, PLC
switches off compressor for a short time. Until preset value is reached
BU
TT
FA
R
O
O
SM
A
N
Programming a robot:
The programmer controls the robot physically/manually. The programmer guides the arm
through each step by physically holding the arm. The programmer has sensors attached to
his/her arm. The sensors allow data to be transmitted back to the computer.
The programmer can also use a remote control. The programmer guides the arm through each
step by using a remote control (handheld controller) .
The computer stores the sequence of movements as a program in its memory.
Advantages of robots:
After initial expenditure its cheaper to operate robots/lower running costs compared to paying
a human. They can work for long periods of time on one task. They work continuously as they
dont strike/take holidays/have shift changes. Health issues reduced for workers. Safety issues
reduced for workers. Can lift heavier objects than a human/more than one human may be
needed to lift a box. Greater accuracy than humans. Consistent standard as they dont get tired.
Disadvantages of robots:
Setup and maintenance costs. Is unable to cope with unusual circumstances
Staff need to be retrained leading to higher costs and loss of workers for a period of time
Robots in Loading:
The robot stores the process in its memory. Light sensor detects presence of hardware.
Processor initiates process. Motors move arm into position. Grabber is used to hold hardware.
CHAP 2 AICT
Microprocessor uses data from pressure sensor to ensure grip is not too tight. Motors move arm
to lift weight onto lorry. The robot uses sensors to make sure it moves just the right amount.
Batch process control.
Some applications require that certain amounts of raw materials are combined in specific ways
for particular lengths of time. An example is the production of adhesives and glues. These
normally require the mixing of raw materials in a heated vessel for a period of time. This results
in a glue or adhesive being produced. Other important examples are the production of food,
beverages and medicine. Batch processes are generally used to produce relatively small amounts
of the product per year.
e.g. Food mixing process: Raw materials are mixed for a certain length of time. Amount of
each ingredient is controlled by computer. Length of time for each stage controlled by computer.
Temperature controlled by computer
BU
TT
WORKING PRACTICES:
FA
R
O
O
A
N
Teleworking: Working at a distance from your employer, either at home, on the road, or at a
locally-based centre
SM
Advantages to Employer:
Dont have to spend so much on air conditioning/heating. Dont have to rent or build large
offices/can build or rent smaller offices. Dont have to pay travelling expenses for conferences
(video conferences will be used).Greater income from increased productivity due to more
content workforce, improved motivation skills, retention, flexible staffing and improved
customer service.
Advantages to employees:
Dont have to spend money on fuel/transport travelling to work. Time is not wasted
travelling/more free time because of less travelling. Dont have the stress of travelling to work in
rush hour .Can spend more time with their family/can arrange their work schedule to suit
themselves.
Disadvantages to employer:
Difficult to keep track of projects/workers. Have to subsidize workers computers. Some
companies have management systems and cultures that are not (yet) well adapted to the
flexibility. Not all tasks are best performed in a self managing environment
CHAP 2 AICT
Disadvantages to employee:
Miss the personal contact with colleagues/more difficult to discuss ideas with colleagues. Home
based telework is inappropriate for some people. Many homes are not well equipped for some
kinds of telework.
Social and economic benefits
Reduced traffic congestion, reduced total travel and consequent pollution, wider employment
/work opportunities, access to work for people with specific difficulties and economic
regeneration.
Personal qualities to be able to telework:
Be well motivated. Have good communication skills. Have good self-discipline/doesnt require
supervision. Have good time management skills/can meet deadlines. Be well organized.
BU
TT
Hardware Requirements:
Broadband connection/router to connect to the internet to send emails to company. A fax
machine to send/receive documents. A landline/mobile phone to communicate with colleagues.
A printer to print documents and for faxing. A scanner to input documents so they can be sent
as email attachments. Video conferencing hardware to communicate with other workers.
FA
R
O
O
Video Conferencing:
Manage a Video Conference:
Delegates agree a date and time. Send a reminder shortly before start including access to
password/PIN. Ensure webcam, microphone and speakers ready. Carry out tests on microphone
and speakers/headphones. Adjust webcam so teacher can be seen. Log on to the Internet
Ensure video conferencing software/internet connection is running properly/installed. Create
room(s)/environment. Enter virtual room. Communicate by speaking into a microphone.
Looking at the webcam. Load/examine/share documents using appropriate software. Discuss
modifications or additions to the documents.
SM
A
N
System Requirement:
PC (with mouse and keyboard). Monitor. Speakers/headphones to hear other delegates.
Broadband network connection/router. Webcam so images of each delegate can be transmitted.
Microphone. Assemble equipment/load software/access the internet/connect to the internet.
Need to log on to system/conference. Webcam normally fixed to top of monitor/moved to
ensure delegates can be seen. Communicate by speaking into the microphone. Communicate by
looking at the webcam. Examine documents using normal software/share documents using
conferencing software. Discuss modifications to documents and physically make amendments.
Advantages:
You can see the facial expressions/body language of other participants. It is cheaper to set
up/operate/organise than a phone conference. You can see/amend/share documents that you
want to discuss with each other. Easier to identify whose turn it is/who wants to contribute next.
Phone conferencing:
The conference is booked with the phone company. Organiser is given two PINs, own personal
PIN and participants PIN. Organiser tells participants their PIN and organiser dials number and
enters own PIN. Each participant dials a common number and enters a PIN to join conference.
All participants need a touchtone phone.
CHAP 2 AICT
Mobile/cellphone:
Can be used to contact one recipient and to text to many recipients
Use VOIP:
Connect to internet and logon to system call number of recipient(s) and speak with recipient(s)
Use laptop/PDA
Can be used to send email
Instant messaging
Log on to email provider/instant messaging software. Send message to other recipients/Send
group emails and ask for immediate response.
BU
TT
Fax Machine
Fax machine is connected to a phone line. Other persons fax machine number is dialed. The
data is scanned then transmitted through phone lines and printed by other persons fax
machine. Speed of transmission is slow. The quality of the print will not be good. Recipient can
only receive one print at a time. People sending prints might be unable to as the line might be
busy.
FA
R
O
O
SM
A
N
Product advertising
The advertising of a single product such as car/computer/chocolate bar/soft drink etc.
Business advertising
The advertising of a single company name such as (any reasonable example of a type of
company).
Service advertising
The advertising of services such as insurance/government/tourism/banking etc.
Others WEBSITES:
It is cheaper than paying/employing a programmer/designer to create/maintain it. A Pop-up
instantly grabs the attention of the customer. Pop ups may create unhappy customers who may
avoid that company in future and this will have poor impression of the company/will tend to
ignore them. Customers will use pop-up blocking (software) which doesnt allow them to appear.
Pop-unders are small windows placed underneath the web page being accessed. Dont appear to
users until they close the page they are working on. Are not removed by pop-up blocking.
The customer regards pop-unders as less of an inconvenience than pop-ups. Pop-ups and popunders can both be linked to the organisations own website. Can make their own website better
suited to their needs. Own website has shorter delay in updating/improving advertising.
Company doesnt have as much control over the hosts website as it would over its own. May be
so many other companies advertising on host website the companys may not be seen/not as
much advertising can be used/limited space available. More people may see it if its on someone
elses website.
CHAP 2 AICT
BU
TT
FLYERS:
Can be produced using own PCs and printer. Flyers usually produced using DTP/Word
processing software Flyers are leaflets given out to individuals/households. Flyer doesnt take
very long to produce. You can distribute them so that they only go to the people you want to see
them. Flyers are often just thrown away and ignored. Flyers can take longer time to deliver once
printed. It is a cheaper method than creating a web page/paying a company to advertise on their
website/advertising on local radio/television. Prospective customers may not have
computers/internet/regular electricity supply. You can target specific groups/cant guarantee all
the intended audience would see a poster/web site.
FA
R
O
O
POSTERS:
Posters are much large (possibly A0). Flyers are leaflets given out to individuals/households.
Posters are put in strategic locations. Posters more likely to be produced using Presentation
software. Posters require specialised printer. Posters will not necessarily be noticed by
everybody/are in a fixed location. Posters are more permanent/difficult to ignore once noticed.
Takes less time to put up a poster.
SM
A
N
PHONE:
Can be sure all targeted customers are reached. It is more personal so will attract customers. It
is more interactive/questions can be answered immediately. Can see immediately how
successful advertising campaign is/know reasonably accurately how many customers they will
have. Easier to persuade customers to purchase items. Can contact customers who dont already
have a computer so would not see the website/can. Contact customers whose internet speed is
so slow they are reluctant to use it and so might not see the website.
WEBSITES:
Use of the internet. Produced using web authoring software A cheap form of advertising
nationally and internationally. More expensive initially to have own website - web designer has
to be employed and can be can be expensive to maintain. Can produce a website to own
specification. Website has more features than most other forms. Has range of multimedia sound, video/ animation,(text, images). Can have hyperlinks to other sites/pages. Websites are
easier to update as you dont have to reprint many copies. A much wider area/potential
customer base is covered cheaply by using a website. A much wider area/potential customer
base is covered by using a website. Websites create better impression with customers. Helping a
website to become popular is the use of free advertising on the Internet by making the most of
search engines. This requires features such as the inclusion of good spelling, the use of metatags.
CHAP 2 AICT
Multimedia Presentations:
Multimedia presentations/slide show - used on purpose-built display monitors placed in
strategic locations. The presentation/slide show is produced using presentation software. Has
range of multimedia - sound, video/ animation,(text, images). Other features e.g. slide transition
effects, special text effects, image transition. Always on while mall or store is open. The user
cannot switch it off. Quicker to update than an Internet site or television commercial
Presentations have multimedia features. Presentations are easier to update as you dont have to
reprint many copies.
Slide Shows:
Sound could be used in voiceovers/welcome from manager. Soothing background music to
create a comfortable feel to the website. Video of demonstrations of the products/recordings of
satisfied customers. Animation to demonstrate products. Hyperlinks to navigate between
slides/link to companys website. Navigation button to navigate between slides/return to start
O
O
BU
TT
E-MAILS:
E-mail to customers. Use of attachments may dissuade customers from reading the
advertisement. Customers may treat it as junk mail and so not read it. Specific customers can be
targeted. Attachment can be created easily using DTP. DTP allows character shapes, variety of
patterns, colours. Can be sent to world wide audience. Easy to create an email and mailmerge.
Emails may be mistaken for spam. Email addresses may be difficult to collect. Easy/cheap to
send same message to many people at the same time.
TEACHING & LEARNING:
SM
A
N
FA
R
CHAP 2 AICT
enjoyment. It assesses student progress with a test at the end of the lesson as well as recording
student scores and progress for later inspection
CAA (Computer aided assessment)
This is now considered to be the use of computers to test students and to assess their progress.
This can either be in a summative manner or in a formative manner. Summative assessment is
the assessment of a student and giving them a mark or grade. An example of this type of
assessment is the on-line assessment being used by the Qualifications and Curriculum Authority
who are piloting the testing of students in ICT at the age of 14 in the UK. Pupils take two fifty
minute tests where they are asked a variety of questions and have to perform a series of tasks.
These are assessed and a level is then produced. Formative testing tests the ability of students
but tells them what they have learned and what weaknesses they have and it also suggests ways
in which they could improve. Any grade or mark resulting from this form of assessment tends
not to be as important as the formative judgments.
FA
R
O
O
BU
TT
Use of Spreadsheets:
Separate sheets can be used to store information about different classes. Store test marks, exam
marks, predicted grades, targets and attendance records. Scores can be plotted in graphs. Used
to chart progress. Grades/percentages can be calculated from raw scores.
Statistics/averages/totals can be calculated, percentage attendance/number of days
attended/number of days absent, difference between target grades and actual performance can
be used. Conditional formatting/extra column used to show progress/underachievement/
overachievement. Cells formatted red for low achieving students/symbol placed in extra column
Cells formatted green for high/normal achieving students/different symbol placed in extra
column. Statistics can be used for comparison/results of all students can be compared
Data can be filtered to list best/worst performing students. Reports can be created. Reports can
be sent to head/parents/students using email/internet.
A
N
Summative assessment:
Is performed by the computer asking questions and recording responses. A total mark is
calculated/given by the computer. The teacher and student are informed of the scores by the
computer system. Computer offers no suggestions for improvement.
SM
Formative assessment
The computer asks questions and records responses. Computer uses responses to specific
questions to form a judgement on specific progress. The program normally outputs areas for
improvement.
Hardware and Software:
Speakers to hear output from presentation/websites. Overlay/Concept keyboard to select
options. Scanner to input hard copy research materials. Printer to printout assignments/notes.
Joystick to play games built in to CAI lessons. Video equipment to film practical activities as
evidence for coursework portfolios.
Database to record student scores. Spreadsheet to store data/to plot student progress charts.
Web browser to look up resources for worksheets. Word processing software to produce
worksheets/type up reports/prepare lessons. Presentation software to produce lesson
slideshows.
General use of ICT:
ICT make lessons more interesting/entertaining. ICT make lessons more varied. Internet allows
students to investigate ideas. Internet allows students to carry out research. Neatness of
CHAP 2 AICT
students work makes it easier for teacher to mark. ICT provides more interactive learning
environment. ICT resources can help students with special needs. Teachers have more varied
teaching aids/can make use of multimedia in lessons. Teachers can use/produce computer
based tests/can use ICT to assess students performance. Teachers can use spreadsheets
/databases to record test scores/produce graphs of progress. Easier to compare class/students
performance. Tests can be computer-marked. Computers can provide feedback on tests.
PUBLISHING:
BU
TT
Typesetting
Kerning: The process of adjusting the space between individual letters in words.
Leading: The space between lines on a page
Importance: They need to be compatible with the size/type of font in the headings/headlines.
Font type needs to be easy to read. Font size needs to be small enough for stories to fit on a page.
Font size needs to be large enough to read.
Newspaper:
Method of process control:
Continuous process control. Used in processes which appear to be unending. Paper machine
would have continuous output of paper onto rolls. Manufacturing processes are used to produce
very large quantities of product per year.
O
O
Use of ICT:
Type up/edit story using word processor/DTP. Type up story using laptop. Import images from
digital camera/phone. Edit images using picture editing software. If using laptop, connect
Laptop to Internet using mobile phone/WIFI hotspot/dongle. Email story to editors office
FA
R
Editorial work:
Editorial staff (collect and) edit the stories to remove mistakes. Page layout of the newspaper is
created. Typesetting/fonts and font size chosen. Proofread for accuracy.
SM
A
N
Sending of newspaper:
Electronic signals are used to send the pages up to a satellite which transmits the signal to the
printing plant. Signal is received by the antenna/receiver and passed over to Computer-to-Plate
equipment.
CHAP 2 AICT
TIME MANAGEMENT:
O
O
BU
TT
Usage:
Computer/software organises meeting times. Software used to keep a record of appointments.
Software provides alerts regarding imminent start of meetings. Software has a calendar function
which can be used as a diary. Software advises when clashes occur, arranging workload. Usage
reports give a breakdown of the time required or spent on individual tasks. By allocating times
for tasks realistically it is possible to ensure members of a team have equitable workloads.
Software contributes to the management of such projects by identifying project progress and
providing daily and weekly planning.
Advantages:
Software helps to ensure that project is completed within timescale and budget. Organises
meeting times. Provides alerts regarding imminent start of meetings. Can organise users tasks.
Makes it possible to ensure members of a team have equitable workloads. Provides a critical
path analysis. Identifies project progress. Helps daily and weekly planning. Can act as a
stopwatch device. Reminds the user how long they have been working on that task/how long
left. Enables user to see what emphasis is being placed on each task. Can be used to produce
Gantt charts. Help to plan out the tasks that are involved in a process. Graphically represent
progress in projects. Are used to plan the whole process including parallel and sequential
activities. Used to arrange tasks so that parallel tasks finish at the same time. Software has a
Calendar function. Calendar enables user to keep a record of his appointments/meeting times.
Advises user of/user could easily see any clashes (of meetings scheduled for the same time and
date). Public calendar identifies a suitable time for a meeting of all members of a team.
A
N
FA
R
Gantt Chart:
Tasks are arranged on Gantt chart so that the parallel tasks finish at the same time. Tasks are
arranged on Gantt chart so that sequential tasks start when previous task completed. Blocks of
days for each task are shaded in. Headings are dates. Identifies the critical path. Can identify
when it would be sensible to hold meetings. Shows key dates/start and finish dates. Indicates
which tasks have to be completed before the next task can begin. Can help to identify who is
available to work on a specific task.
SM
Critical path management means finding the optimum time to be spent on individual tasks.
Critical path is the order in which tasks must be completed so that the entire project is
completed on time.
Sequential activities which cannot take place until others have happened. Example design
of new system cannot take place until after the analysis of the existing system is completed
Parallel activities which are independent of one another. Examples such as interviewing
personnel and completing questionnaires/producing user documentation and technical
documentation.
Organising a meeting:
Open private calendar to see when user is free. Open the public calendar showing when other
workers are free. Identify a suitable time when user is free and when others are free/where there
are no clashes. Type in the details of the meeting. Notify others of time/date of meeting. Sets an
alarm to alert user when the meeting starts.
10
CHAP 2 AICT
Arranging workload
This is done by using task usage reports which give a breakdown of the time required or spent
on individual tasks. By allocating times for tasks realistically it is possible to ensure members of
a team have equitable workloads.
Research and development projects
Business software helps to support these projects with calendars, time scales and Gantt charts
Construction project management
Construction project management is not just specific to the construction of buildings. This
method of project management is now applied to different types of project. It involves a critical
path method of scheduling. The software contribute to the management of such projects by
identifying project progress and providing daily and weekly planning
BU
TT
PDAs:
Appointments are easier to organize. Reminders of appointments can be set automatically.
Makes it easier to retrieve/phone client phone numbers. Use project development software to
keep plan of action for each client. Can spread out appointments throughout the week. Can keep
in touch with clients/other workers using email. Can normally access emails wherever they are.
O
O
CALL CENTRES:
FA
R
Hardware:
A computer to process the calls and a telephone set/headset to speak with customers. A telecom
switch to enable the WAN to receive telephone calls. Computer to process the calls/look up
customer information/to record orders. Monitor to display customer/call details. Telephone
set/headset to speak with/listen to customers. Keyboard to type up details of the call/action
taken
SM
A
N
Software:
Computer telephony integration software. CTI software is used to combine the data and voice
input to the system. Calling-line information display such as caller's number/number dialed.
Software enables on-screen phone control such as automatic answer, hang up, hold, conference.
CTI software requires a dedicated telephony server. Software sends commands from a user's
computer to a telephony server. Software directs phone call to appropriate operator. Database to
hold records of calls/to provide link to stock/orders database. Database software to enable
customer orders to be input to the main computer. Database to hold records of calls/to provide
link to stock/orders database. Database software to enable customer orders to be input to the
main computer database
First-party call control
Allows operator to have a direct connection between their computer and the phone set.
Allows the operators computer to control the functions of the operators phone.
Third-party call control
Requires a dedicated telephony server to connect the telephone network and the computer
Network. Operators phone communicates directly with the server. The server controls all the
phones. The server can direct a call to the appropriate operator. Any computer in the system can
control any phone. Supervisors can intervene if the call proves too complex for the operator to
handle. First party is only suitable for small call centres.
11
CHAP 2 AICT
CTI
Used to combine the data and voice input to the system. Calling-line information display caller's
number, number dialed. Customer account information can be displayed. On-screen phone
control. Answer, hang up, hold, conference. Software sends commands from a user's computer
to a telephony server. Software directs phone call to appropriate operator. Multiple dialling
techniques/fast dial/ preview/predictive dial. 1stnd 3rd party.
O
O
BU
TT
IVR:
Interactive voice response software/software that does not require a human. Response
/automatic services such as account information can be accessed using the IVR software.
Caller is presented with an options menu. Option is selected by pressing the keys on the
phonepad/speaking into the phone. Customer responds to questions about their account to
identify the customer. Data and call is automatically routed to the relevant department or
person required.
It asks the caller to select from a menu. It asks the caller to enter information using a keypad. It
asks the caller to enter information by answering yes/no/saying words. It translates key presses
through the tones produced by the phone. It detects spoken words using speech recognition.
Upon receiving data it gives the balance of the account. Call can be directed to an operator.
Disadvantages:
Can take a long time to navigate through the menus/may be in a queue if you want to speak with
an operator. The menus might provide too many/too few options. Too much information may be
provided at the beginning of the call. Voice prompts might be hard to understand. IVR may not
understand your accent/voice.
SM
A
N
FA
R
PAYROLL SYSTEM:
12
CHAP 2 AICT
record in the old master file is read. If records dont match computer writes old master file
record to new master file. If it matches, computer calculates the pay using rate of pay from
master file and using hours worked from transaction file. Computer calculates the income tax
/insurance/pension contributions and computer subtracts these from pay. Processed record is
written to new master file. Payslip printed (to file). Process is repeated until end of old master
file. Master file is updated. Payslips are printed.
BU
TT
Overall Outputs:
Payslips with description of information included. Financial reports of payroll statistics.
Error/Exception reporting. An employee earning unusually large amount of money. Employee
has been on emergency tax code for very long time. Two employees having same NI number.
Reports showing hours worked per individual. Report showing cost information by department
or individual. Reports including the analysis of the turnover of employees together with
detailed absence reports. Payments to employees automatically generated using BACS. Tax paid
by all employees. NI contributions for all employees. The amount of money paid to each bank.
All earnings and deductions of employees. All earnings and deductions of employees by
department. Tax and NI payments automatically made direct to the Inland Revenue.
Specification of money required by company for payment to workers/Inland Revenue. Wages so
far this year. Income tax so far this year. Employer insurance contribution so far this year.
Employee insurance contribution so far this year. Pay date. Pension contributions so far this
year.
FA
R
O
O
A
N
Most payroll software allows cash books to be updated automatically deducting payments to
employees. Payments to employees are automatically generated using BACS as well as tax and
NI payments automatically made direct to the Inland Revenue.
SM
DATA MANAGEMENT:
File Structures:
Type of database is chosen (flat file/relational), if it is going to be a relational database, number
of tables is decided upon a key field to identify each record and relationships are designed.
Entity relationship diagrams are designed. Type of access is decided on if indexed sequential,
index is chosen and table of indices designed. Appropriate field names are chosen relating to
data content of field and unique name. Field type is selected such as text, number, Boolean
appropriate to field contents. Field lengths are chosen so that space/memory is not wasted but
leaves room for expansion. Validation rules such as range checks, invalid character checks,
check digits are chosen appropriate to field contents error message(s) designed. Field
descriptions are included which adequately inform about field contents
Sequential file systems:
A file where records are stored one after the other using a key field to order them.
Sequential access means that data is accessed in a predetermined, ordered sequence. Sequential
access is sometimes the only way of accessing the data, for example if it is on a tape. It may also
be the access method we desire to use since the application requires processing a sequence of
data elements in order. In data structures, a data structure is said to have sequential access if
13
CHAP 2 AICT
one can only visit the values it contains in one particular order. Batch processing requires the
use of sequential access an example being a payroll system where every worker has to be paid.
Since all the records have to be read anyway, the order in which they are stored is not important.
BU
TT
FA
R
O
O
SM
A
N
14
CHAP 2 AICT
The Employee table represents a parent segment and the Children table represents a Child
segment. These 2 segments form a hierarchy where an employee may have many children but
each child may only have 1 parent. Hierarchical structures were widely used in the first
mainframe database management systems. However, owing to their restrictions, they often
cannot be used to relate structures that exist in the real world. Hierarchical relationships
between different types of data can make it very easy to answer some questions, but very
difficult to answer others. If a one-to-many relationship is violated (e.g., a patient can have more
than one physician) then the hierarchy becomes a network. While the hierarchical model is rare
in modern databases, it is common in many other means of storing information, ranging from
file systems to the Windows registry to XML documents. It is used in systems such as On Line
Analytical Processing which specialises in business reporting such as sales marketing,
management reporting, business performance management (BPM) and also budgeting and
forecasting.
SM
A
N
FA
R
O
O
BU
TT
15
CHAP 3 AICT
Online Transactions
Transferring funds online are done in these steps
Type in user ID or username. Asked for security information. Type in section of password.
Type in favourite place/mothers maiden name/date of birth. Page will have a list of the
customers accounts and account numbers. Click on account. Click on transfer money. Click
on account/type in account number to transfer money to. Type in amount. Select date of
transfer. Click confirm. Can pay their car tax, their council tax, parking fines e.g.PAYPAL.
BU
TT
Online Shopping
Features of well-developed online shopping website
An easy-to-remember domain name. A secure method of accepting payments. Descriptions
/pricing/photos of goods. Usernames and passwords to make the system secure. Customers
are able to contact shop directly via e-mail. Allows customers to make use of their orders
stored in a database. Allows customers to see their order and maintain their own accounts.
A shopping basket to hold goods you are going to buy. Prospective customers should be able
to use a temporary shopping basket if they are a guest. Permanent shopping basket if they
are returning customers. Searches and advanced searches can be carried out easily. Allow
customers to progress smoothly to the checkout/navigate from category to category easily.
Orders can be tracked. Wish lists which enable users to store the goods they might want to
buy in the future. People who bought A also bought B recommendations.
FA
SM
CHAP 3 AICT
BU
TT
Procedure of purchasing
Type in or select shop website from favourites. Browse product categories. Browse individual
products. Place selected products in shopping basket. Go to the checkout. Enter username
and password. Enter billing address. Enter shipping address. Customers who are not
previously registered must type in personal details. Choose method of payment. Choose
method/speed of delivery. Confirm order and log off.
SM
FA
O
O
CHAP 3 AICT
TT
FA
O
O
BU
Security threats that the bank and customers must guard against when using
online banking.
Employees may copy data to pass on to criminals who use the data to make illegal
transactions. Phishing email appears to be from customer's bank asks for customers
details password, card/account number, other security details, email makes up plausible
reason and includes a website address for customer to go to which looks just like the actual
banks website but is a fake website. Pharming fraudster redirects genuine websites traffic
to own website, customer is now sending personal details to fraudsters website.
Spyware is downloaded which is software used to gather user's personal details. Spyware
detects key presses of user logging on to bank site.
Hacking to get customer personal information to use against the individual/to commit fraud
and in order to transmit viruses.
SM
CHAP 3 AICT
BU
TT
SM
FA
O
O
Methods used to improve the security of a customers data when they want to
access their account
Single password not considered by banks to be sufficient protection. Limited number of
characters from password are asked for leading to hacker not being able to guess whole
password. Additional information such as mothers maiden name/favourite place/phone
number/date of birth. Additional information may be commonly known. Key logging
software can detect full passwords/additional information. Data is encrypted allowing only
users/computers with the key to decipher it/hackers only see meaningless strings of
characters. Encryption is not sufficient if hacker uses key logging software. Anti spyware can
detect spyware/keylogging software. Anti- spyware needs constant updating. TANs
passwords which are sent by post/email and are used once and only have few minutes
validity reducing time hacker has to intercept it. Virtual keyboard used to type in passwords.
Drop down lists used to select letters of password. Key logging software cant detect key
presses. Different characters from password are asked for at each log on leading to hacker
not being able to use part of password already intercepted. Sometimes (random occurrence)
same three characters are asked for making it easier for hacker to access account.
Two factor authentication customer inserts card into chip and pin device and types in PIN
and a pass number is produced, hacker would need to have access to the Chip and PIN
device, debit/credit card and the users password to be able to hack into account pass
number changes each time of use. Firewalls reduces risk of unauthorised access but dont
prevent it totally. User can be timed out after a period of inactivity preventing another
person using the site
Social and ethical implications of bank workers being able to access customers
personal information or Ways the bank can safeguard the privacy and
confidentiality of customer data.
Bank workers have a personal duty of confidence to individuals whose data is stored. Bank
workers should have a personal duty of confidence to their employer. Workers must not tell
any unauthorised person about personal data which is held. Bank must not use information
for any reason except with the permission of the individual. Workers must be asked to treat
the information as confidential/it must be obvious to them that the information is given in
confidence. Employer should ask employee to sign a confidentiality agreement. Bank should
take responsibility for any information which is passed on. Only the least amount of
information that could identify the individual should be used. Online services allow
CHAP 3 AICT
organisations to have access to the most private of data. Examples names, addresses,
phone numbers, financial situation. Information should not be passed on from organisation
to organisation without authorization from the individual. Anonymised information should
always omit personal details wherever possible. Aggregated information should never
identify individuals. Companies/workers must ensure the security of customer data. Workers
must ensure only relevant data is used. Workers should ensure they only use up to
date/accurate information.
Info asked to customer on phone banking
User name/account number/credit card number/user id. Mothers maiden name. Favourite
place. Date of birth. PIN. Email address. Password.
Why short password is asked
Hacker can only get hold of three characters in one go. Hacker might need to know the whole
password to get into account. Will probably be different three characters asked for at next log
in. Hackers would need to intercept password several times to get into account.
SM
FA
O
O
BU
TT
CHAP 3 AICT
BU
TT
O
O
FA
SM
CHAP 3 AICT
BU
TT
O
O
What could happen if the company did not obey data protection rules
Employees, who are not supposed to, could see the information. Data might be inaccurate
/not up to date and e.g. products could be sent to the wrong address. It could be possible to
build up detailed files on people without their knowledge or permission. Data could be sold
to other companies without the data subjects permission. Data could be used for purposes
other than those it was collected for.
SM
FA
CHAP 3 AICT
TT
SM
FA
O
O
BU
CHAP 4 AICT
TT
ANALYSIS
Different methods of researching a situation
Examining documents
All documents which are used within a system need to be examined. These will be eventually
duplicated or replaced with alternative versions or even discarded in the new system. The
types of document which need to be examined are Data capture forms, system
documentation, business reports, invoices, bills, letters etc. Examining the documents is
necessary where there is lots of paperwork.
Advantage: Can see which documents relate to input information and output information.
This enables the analyst to produce documentation of the system. This can be done whilst
producing a data flow diagram. The volume of data could be determined. The format of the
input and output can be determined. Each part of the system needs to be examined to see
what specific inputs, outputs and processing are required.
For example: in a school system, the input would be the details of the students; the
processing would be the calculation of the test scores/percentages and the output would be
lists of students and their test scores.
Disadvantage: Can take a long time to collate documents and may not be able to take
users opinions into account.
BU
SM
FA
CHAP 4 AICT
BU
TT
A great deal of time is spent on preparing questionnaires in order that the right type of
question is asked in order that the most relevant information is gathered.
General activities in Analysis after research and advantages
After all the fact finding methods have been completed and the results are collated the next
stage is to use these to define all inputs, outputs and processing. Recording information
using data flow diagrams/interview transcripts/questionnaire analysis. Identifying problems
with the current system using the data already recorded about the current system. Identify
suitable hardware and software for the new system. Making generalised recommendations
using the data already recorded about the current system such as volume of data. Identify
user and information requirements using transcripts of interviews with users/ observation.
Identify the sources and volume of input data and collection methods.
By examining all the documents, this will enable the systems analyst to identify the
documents which are currently being used to input data to the existing system. Observation
will enable the systems analyst to determine the frequency of the addition and/or deletion of
records. Identify manual and computer procedures necessary to achieve the current output.
Identifying problems with the current system
Observation, examination of documents, questionnaires, interviews all contribute to the
creation of DFDs which will help the systems analyst to identify current problems.
Identifying suitable hardware and software for a new system
Analysing required outputs, storage and processing requirements using the DFDs will allow
the Systems Analyst to make generalised recommendations for the software and hardware.
Identifying the user and information requirements
Collating the interview transcripts, questionnaires and documents will enable the systems
analyst to identify what the user requires and what information the system will require.
SM
FA
O
O
CHAP 4 AICT
Systems Flowchart
Uses particular input, output, storage and processing symbols. Represents inputs, outputs
and processing. Generally a method of designing a systems solution. Not found very often in
the analysis stage. Storage represented by a storage medium in a computerised system.
Outputs is represented by an output box. Data flow represented by arrows. Inputs
represented by input medium symbols.
DESIGN
FA
O
O
BU
TT
Items that the systems analyst will need to include at the Design stage and
factors that will influence the choice of item.
SM
CHAP 4 AICT
BU
TT
O
O
SM
FA
Each module will need to be tested with different types of test data. The system will also
need to be tested as a whole.
Methods to test each module:
Using live data/normal data/data which is acceptable/valid. Using data outside the
range/wrong type/either end of the range. A set of test data is selected, including normal,
abnormal and extreme data. Data will be accepted or rejected by system
It is expected that abnormal data will be rejected, normal data will be accepted and extreme
data will be accepted. Expected results and actual results are recorded in a table. Actual and
expected results are compared. If validation rules dont trap errors then will need to be
amended. Live data could be used which allows comparison between actual results and
previous system results.
Live data
Live data is data that has already been used in the existing system. It is used because the
outputs are already known. Test results from new system can easily be compared with
outputs of existing system. Data can be chosen for when previously encountered special
/unusual circumstances existed. Data can be chosen for when it was a normal day to day
situation. Analyst will also choose another session where it was quite an average session.
If there are differences between the results amendments will need to be made to the system.
Improvements that could be needed as a result of testing
Prior to the implementation any improvements which might be needed are made to the
system in the light of the testing of the system. These could be amended data structures or
even amended program modules in line with the results of testing.
IMPLEMENTATION
Parallel running: Involves running the old system alongside the new system
Advantages: If there is a problem with the new system still have the old system as a backup
unlike phased implementation/direct changeover/pilot running
USMAN FAROOQ BUTT
CHAP 4 AICT
Disadvantages: Is more expensive than direct changeover because two sets of workers
have to be paid. It is a slower method of implementation than direct changeover.
Phased implementation: Involves implementing one part of the system at a time.
Involves running part of new system whilst old system still operates with other parts. The
existing system is gradually replaced by the new system.
Advantages: Cheaper than parallel running as you dont employ two complete sets of
workers. If there is a problem with the new system still have bulk of old system to fall back
on unlike direct changeover. Training can be gradual in parallel running and phased
implementation unlike direct changeover. Changes can be made if problems occur with
phased and parallel unlike direct changeover.
Disadvantages: It is a slower method of implementation than direct changeover.
There is only one system required (e.g. student records) so this may not be appropriate
BU
TT
Pilot running: Involves running new system in one branch of the organisation whilst old
system still operates in other branches
Advantages: Cheaper than parallel running as you dont employ two complete sets of
workers. If there is a problem with the new system it only affects one branch unlike other
methods. Other branches can learn from the mistakes made in first branch to have the new
system. If it is successful the whole company can take it on
Disadvantages: It is a slower method of implementation than direct changeover
Pilot is unsuitable for situation where there is only one department being computerised
FA
O
O
Direct changeover: Involves replacing the old system with the new system all in one go
Advantages: Cheaper than parallel running as you dont have to employ two sets of workers
Quicker as there is no delay waiting for bugs to be fixed unlike other methods/benefits
of the new system become apparent immediately unlike other methods
Disadvantages: If there is a problem you dont have the old system to fall back on unlike
other methods.
DOCUMENTATION
SM
User documentation
Screenshots / descriptions of how to use the software to show how to save a file, perform a
search, sort data, print data, add records, delete records and edit records. The purpose of the
system to give an overall description of what the system does. The input and output formats
so that you know how to enter data and know what the output will look like. The hardware
and software needed to run the system so that the user doesnt use the wrong hardware
/software. Examples of sample runs of the system so that the user can tell if they are using
the system in the correct way. Troubleshooting guide/a list of Frequently Asked Questions to
know what to do when errors occur.
Advantages: Saves computer company time in the long run as they will not be contacted on
a regular basis. Saves computer company time in the long run as they will not need to visit
users to show them how to use the system. Save money as they wont need to employ as
many customer support staff.
Technical documentation purpose
Produced specifically for systems analysts/programmers. Helps when the system needs
further development/upgrading/improvements. Helpful should any errors occur in the
system and system needs amending to get rid of these errors.
CHAP 4 AICT
System documentation
A detailed overview of the whole system. Data Flow Diagrams/systems flowcharts to show
the results of systems analysis and what is expected of the system. Overall design decisions
to see the choice of hardware and software and see the file structure/ input and output
formats. Test plan and test results to be reused when systems analyst debugs system systems
flowcharts. Test data/test plans so that systems analyst can see the results of these/test
results. Gives an overall view of solution
Program documentation:
A description and purpose of the software - what the software does and its features. The
reasons for choosing those pieces of existing software. Modules that were used instead of the
programmer having to write code. Input and output data formats that have been used.
Program flowcharts that were produced at the design stage. Program listing. A complete copy
of the code used. Annotation explaining what each module of code does. Input and output
data formats. Program flowcharts/algorithms. Notes that will help any future programmer to
make modifications to the system a complete copy of the code used.
TT
EVALUATION
O
O
BU
SM
FA
CHAP 5 AICT
EXPERT SYSTEMS
Working:
System asks questions user responds on screen and future questions are based on user
responses. Searches knowledge base for information to match response. Uses rules base and
inference engine to simulate human reasoning. Makes use of an explanation system to
indicate how answer found. Rules base made up of inference rules and inference engine uses
these to draw conclusions output often in the form of probability/risk to company,etc.
BU
TT
Parts:
Explanation system: Providing a trace of the reasoning that produced a decision
User interface: Using a display to allow user to input data/request
Inference engine: Uses the data input for reasoning. Links to the knowledge base.
Links to rules base/matches rules that apply to current question and selects applicable rules.
Applies applicable rules. Uses forward/backward chaining to reason/arrive at solutions
Passes on next question to user which reasons by chaining used in conjunction with rules
base to reason through a problem to provide a solution.
Knowledge base editor: Used to edit data and input/update facts.
Knowledge base parts: Facts base: Holds the data collected from experts
Rules base: Holds the rules as a series of IFTHEN Tests the input data and carries
Backward/forward chaining
FA
SM
CHAP 5 AICT
BU
TT
WEATHER monitoring:
Light sensor to measure level of light received
Anemometer/motion detector to measure wind speed
Temperature sensor to measure air/water/ground temperature
Humidity sensor to measure amount of water vapour in the air
Rain gauge using bucket and float linked to potentiometer or force sensor - to measure
rainfall
pH sensor to measure acid/alkali level of e.g. water
O2 sensor to measure oxygen level in air/water
CO2 sensor to measure carbon dioxide level in air/water
Sensors are placed in balloons/weather stations. Information is collected from satellites.
Store observations from pilots and uses observation data from shipping.
O
O
FA
SM
CHAP 5 AICT
BU
TT
Financial Model:
Company inputs Cost of materials, cost of manufacturing, projected sales figures,
estimated selling price of system, projected economic conditions, profit margin required and
variable to adjust for break even calculation.
Model outputs production costs/staff required and profit prediction made
System values are adjusted-what if scenario such as using different materials, using
different contractors using different locations and using different time frames.
Use of goal-seek/break even point. Costs of individual parts are totalled
SM
FA
O
O
Models/Prototypes:
How MODELS are produced by printers after using CAD
Thin layer of powder sprayed from ink jet spray head. Machine repeats process building up
layer after layer to form object. It uses slicing (tomographic) technology. Places a binder/glue
during the layering process. Can use plaster or ceramic in powder form
Other devices used in CAD
Graph plotter produce large scale drawings on paper very accurate drawings on paper to
any scale
Large screen to allow development of new designs/products allows enlargement of
components allows use of light pens (etc.)
Second monitor to show commands
Advs of prototypes/models made using CAD
Can handle/see components (before expensive tooling up). Less expensive than making a
model by conventional methods. Can test model (before expensive tooling up)
Use and features of CAD:
Computer Aided Design is used by engineers to design accurate drawings of a component
Component/prototype can be tested before it is produced
Can modify designs as result of testing under variety of conditions
3D views can be created from 2D drawings
Can zoom/view from different angles
Walk through/virtual prototype to show product/product interiors/alternative views
Use of library of elements to choose from plus example of elements e.g. windows
Total cost of a product can be calculated using a database of parts held by program
CAM
Computer Aided Manufacture linked to computer system
CAD generates a list of instructions for the Computer Numerically Controlled lathe/similar
appropriate device
To cut product to designed dimensions
Using LOGO type commands
And monitoring the dimensions of the prototype
CHAP 5 AICT
O
O
SM
FA
BU
TT
Purpose Built:
Software written for a specific purpose. Can be expensive due to time needed to write it/long
time to write. Can be expensive due to need for programmers. Can easily make changes to
software as it tested in real situations. Can run faster since only carries out the specific tasks
has unique features for the task in hand. Speed of processing program is higher.
CHAP 5 AICT
Flight simulator:
There may be no aircraft available to permit training. Passengers would not be happy if a
trainee was undertaking tasks so passenger reassurance of quality. Extremely unusual events
can be programmed into the simulator. Events can be repeated as often as required. The
operator can adapt the program to suit trainees performance. Training can be recorded for
future use/automatic assessment. Weather conditions can be created at will. Dangerous
scenarios can be simulated with no risk to the pilot so safer. Reduces risk of accident causing
costs for airline so training costs to the airline can be lower. Can be scheduled more flexibly
that aircraft. Controller can try out various scenarios to see how pilot reacts. Pilot can be
automatically assessed.
Disadvantages (In different situation):
Car driving: Costs company money to buy and maintain and might not be taken seriously
by young people
Flight simulator: Pilots may not consider the simulator as real. Simulators are very
expensive to buy and run. Not all events/parameters/conditions can be simulated
TT
MARKET RESEARCH
BU
SM
FA
O
O
CHAP 5 AICT
BU
TT
Pharmaceutical
Previous results of research work stored can X-match results and save time and money
Results from tests on certain drugs stored so avoids need to repeat expensive tests. Can
predict likely outcome of doing certain tests on drugs. Computers can automatically control
and monitor mixing of ingredients. Storage of analysis results/can check analysis results
against specification. Do statistical analysis of results. Requirement for super computer due
to amount of processing. Administering drug trials feedback and monitoring
Scientific
Formulae would be created to represent the situation. Variables would be adjusted to follow
planned route. Results would be output graphically. Time scale could be altered e.g. the
reaction to a drug. Use of what-if scenarios and goal seek
O
O
STOCK CONTROL
FA
SM
Advantages:
No one required to place price labels on goods as held in stock database
Trends can be identified such as best selling products
More accurate monitoring of stock levels due to automatic updating of stock database
Stock file updated using bar code:
Bar code is read at the POS terminal. Bar code is unique identifier of the product and the key
field in stock file/database. Bar code number is searched for on file until matching record
found. Number of that item is stock is reduced by 1 and system checks value against
minimum stock level. If min stock level reached/below then system automatically re-orders.
Automatic printout of orders/sends message to suppliers. When new goods arrive, bar codes
allow update of number in stock.
Information about product held in stock control system:
Product ID a unique identifier
Supplier code for re-ordering purposes
Product description/name/type to display on till/receipt
Item price/discount to use on till/sales
Supplier/cost price for accounts/records
Product weight for legal purposes/customer information
Expiration/sell by date for stock management purposes
Number in stock for management purposes
CHAP 5 AICT
BU
TT
EFTPOS:
Customers are served in less time due to scanners being faster than manual entry. Till
operators are monitored providing store with performance figures. Accurate addition
of/correct prices given in customer bills. Fewer customer complaints/greater customer
satisfaction. Errors identified more easily/less time spent on re-checking bills. No one
required to place prices on goods as held in stock database. Fewer staff required for shelfstacking/monitoring required so reduced wage bill/more profit. Trends can be identified
such as best-selling products. Required storage space for the shop reduced as less slowselling stock needs to be stored. Trends in number of shoppers can be identified
to enable store to schedule till operators. How quickly/slowly items are selling due to
comparison of dates with last order.
SM
FA
O
O
PC VS SUPER COMP
PC used for office/home tasks v. supercomputer for complex number-crunching/calculations
Supercomputer typically used for (large scale) scientific or engineering work/ PC used for
office processing
PC physically smaller than supercomputer
PC less expensive than a supercomputer
PCs are suited to generalised computing tasks v. supercomputers often customised
PCs usually constructed from cheaper components than a supercomputer
A supercomputer can do billions of calculations v. a PC does not
Supercomputer carries out more processes per second/ FLOPS
A supercomputer is permanently on v. a PC is usually not always on
Supercomputer has many more processors than a PC
Supercomputer has more RAM/memory compared to a PC
Supercomputer uses tailor made/customised operating system
Supercomputer can support more users at same time than a PC
Security monitoring requires processing power of supercomputer to handle volume of trafficPC could not cope in the time frame
CHAP 6 AICT
HOME ENTERTAINMENT:
Features of a home entertainment system
Can access digital media stored on e.g. CDs, DVDs, Blu-ray, flash memory. Can access
remotely stored digital media from e.g. the internet, media streamers, locally stored files.
Can access analogue media. Has LEDs to display information. Can accept/use/play a range
of audio/video formats. Provides a number of different sound and vision outputs for
connection to other devices. Can use DRM to ensure media is protected from unauthorised
use or copying/gives authorization for playback. Can use several loudspeakers for surround
/multi-channel sound. It usually has a remote control to e.g. adjust sound output format.
Can have HD television for high-quality pictures. Can have 3-D television for greater realism
in images. Can have a hard-disk recorder.
BU
TT
Advances in technology which have led to music CDs being replaced by other
media
Ability to download music straight to a computer. Plug and play devices/ease of USB port.
Music downloaded to MP3 players. Reduced size of hard discs leading to smaller players.
Increased capacity of storage media (flash memory or HD) holding more tracks. Improved
compression techniques reducing size of files. Reduced size of batteries leading to smaller
devices. Increased battery capacity leading to longer play time. Improvements to user
interaction with hardware via HMI. Broadband enables much more downloading of music
files. Most modern music is already held in a digital format. Solid state memory leads to
more robust players. Use of hard drives to store music rather than CDs. Home entertainment
system that combines TV, etc.
FA
Why CD and DVD files are being converted into MP3 and MP4 format
Audio and video files are usually very large/MP3 or MP4 files are smaller. MP3/4
compresses files by up to 90% e.g. a 60Mbyte CD track becomes a 6Mbyte MP3 file.
Sound/video quality is maintained. Normal data compression doesnt reduce file very much
and loses quality. Allows a vast number of files to be stored on MP3/4 devices. Faster
download over Internet due to compression. Faster downloads due to increased broadband
speeds. It is now possibly to buy on-line and download the MP file. Easier to store MP3 files
on HD than to have lots of shelves holding disks. Increased storage capacity of solid state
devices has increased demand for MP3 MP4 files.
SM
Differences b/w use of MP3 players and CDs for storing music in digital form
MP3 uses compression but CD audio is uncompressed. MP3 players use hard disks/flash
memory whereas CD audio is stored on optical media. MP3 players have large capacity so
store more songs/tracks than CD media while CD media is limited to 70/80 minutes. MP3
player content can be changed/deleted but CD content cannot be changed.
How it is possible to store many thousands of songs on media player
Files are compressed MP3 file is 1/10th the size of a normal song file. Developments in
CODECs. Removes high frequency information. However: higher the bit rate, larger the file,
less can be stored but music quality is better. More compression results in lower quality
sound.
Technological developments by which CDs and movie DVDs will be phased out
Possible to download files from the Internet. Much more material on the Internet. Torrent
type of usage more prevalent. MP3/4 players/flash memory cards are more available/have
larger capacities/cheaper hard. Video on demand being promoted by service providers.
Blue ray technology with more information/higher quality. MP3/I-Pod docking stations have
replaced CD players. Combined mobile phone/MP3/movie players.
CHAP 6 AICT
BU
TT
O
O
Hardware which is used to receive digital signals rather than analogue signals
Use of satellite dishes rather than an aerial. High speed cable to UBR/service. LNB to reduce
received frequencies. Need for digital receiver/decoders connected to TV.
SM
FA
CHAP 6 AICT
O
O
BU
TT
FA
Security issues that could arise when using internet auction websites
Log in details may be accessed and used by others to bid on goods. Personal contact details
may be stolen and misused/used in identity theft. Financial/credit card detail may be stolen
and used to purchase goods/in fraudulent transactions. Website may carry malware so, e.g.
Trojans/viruses/spyware/adware may be downloaded to the computer. Personal contact
details may be stolen and misused/used in identity theft. Details may be used for advertising
/spam emails.
SM
CHAP 6 AICT
BU
TT
O
O
FA
SM
CHAP 6 AICT
advertising which generates revenue for the company. Customers buying tickets in advance
would have to use the website and will be able to leave feedback for the company. The
company can attract more customers by using a website.
Benefits to the airline of offering online booking
Wider customer base. Tickets can be booked at any time/from anywhere - better customer
satisfaction. Reduced number of staff/reduced number of offices/no commission to agents
for selling tickets so reduced costs. Faster processing of bookings/faster check in - better
customer satisfaction. No double booking so better customer satisfaction. Advanced notice of
customer requirements e.g. meals/seat allocations. Can operate outside normal business
hours. Less risk of losing ticket. Faster check-in process.
BU
TT
SM
FA
O
O
Benefits and drawbacks of online booking to the customer and the company
Customer: Benefits: No need to travel/queue/go to booking kiosk, office or agent for
tickets to make advance bookings. Can cost less as there is no need to travel to ticket office,
kiosk or agent. Can be used to make a booking at any time of day. Tickets can be obtained
quicker than using ticket office. On-line might have special offers as agent/office/company
costs are lower. Can compare prices at leisure.
Drawbacks: Must be computer literate/have a system e.g. smartphone/have an internet
connection. Cannot ask detailed questions unlike a human. System might be down- unlike a
timetable book so cannot make a booking at that time/have to wait which can be
inconvenient. Need a credit card to make bookings/collect tickets at departure point.
Company: Benefits: Requires less office staff so overheads are reduced e.g. smaller
booking offices. Can be quickly updated with latest offers/news. Better customer satisfaction
due to e.g. faster service. Can hold more information than a human.
Drawbacks: Expensive to employ programmers/purchase hardware/set up and maintain.
Vulnerable to hacking so is vulnerable to fraud. Must be kept up to date to provide the
correct information. Less personal touch. No opportunity to sell extras to customers e.g. seat
reservations/travel insurance.
How company provides the details for the customer to print their tickets and
ensure each ticket was unique
Company sends out ticket details to customer via email. Use of web form for input. Web page
/email instructions how to print ticket. Print out unique bar codes on the tickets which
match up with credit card details. Name of customer + id code on the ticket. Details of
customer verified on web page.
Stop two people from using the same electronic ticket
Security features when ticket issued e.g. customer must provide passport number, proof of
ID (e.g. passport) and details when using e-ticket e.g. customer last name.
Impact on society of electronic ticketing
Unemployment for clerical workers. New employment in technical work. Shorter working
times/more flexible working for staff. Less time spent queuing at check-in/buying tickets.
CHAP 6 AICT
No need to wait for tickets to arrive. Less time spent in the process of checking in. E-tickets
have encouraged more travellers benefiting certain societies/countries. Increases digital
divide as customers need Internet access.
Advantages and Disadvantages of on-line services in general
Can do shopping and banking from home. Can be used at any time of day unlike shops
/banks. Much wider choice (of services) available. Can book/buy tickets online. Broadband
makes more services available. Even if live in small town, have access to services. Use of
laptops/wireless connections to allow disabled people to use services anywhere. Disabled can
participate instead of going out. Easier to compare services online. No need to travel to store
(saves money and time). Safer to use the Internet because e.g. no chance of mugging.
The digital divide is broadened. Access to legal information leads to armchair lawyers. Risk
of fraud (money taken from your account whilst e-shopping), risk of personal id stolen (from
Government files), stealing credit card details, bogus websites, may be no human advice on
service, changing/deleting key data once files accessed, spreading of viruses via emails and
open to spamming.
TT
SM
FA
O
O
BU
CHAP 6 AICT
gain access to e.g. bank accounts. Pharming to redirect user to a bogus/fake/rival website.
Money taken from personal accounts as a result of pharming/phishing. Tickets intercepted
from online booking details. Loss of bank/credit card details so tickets purchased and
intercepted by others. Skimming of credit cards. Spyware to steal e.g. login details/account
numbers. Hacking resulting in loss of personal details/logon details/usernames/passwords
leading to e.g. theft of money from bank accounts/unauthorised use of credit cards.
Negative effects of shopping systems:
Worsens the digital divide due to some people not having ICT resources. Changing job
patterns in high street shops, fewer customers on high street/more ICT based jobs /fewer
unskilled jobs. Identity theft, deleting/amending/distributing personal details. Open to
computer fraud, money taken from credit cards/goods intercepted from online order details
/hacking into systems. More addictive, easy to spend too much. Lack of socializing
/exercise/try before you buy.
SM
FA
O
O
BU
TT
CHAP 6 AICT
BU
TT
O
O
ICT help for physically disabled person to live a fuller life and join society:
ICT enables communication from home such as fax, email, accessing WWW. ICT devices
enable a disabled person to operate a computer such as input by foot switch etc. Disabled can
work from home using ICT. Disabled can access information to help them lead a better life
e.g. grants from local government.
SM
FA
CHAP 6 AICT
e.g. NHS Direct. Employment opportunities: not knowing if there are vacancies in big
cities/going to big city and being turned away and no applications for jobs. Smaller market
for local products: no online sales for e.g. craft ware due to no online advertising. Local
government community services: unaware of house stock availability and planning
applications. Local government news service: updates not easily accessed and policies not
easily accessed. Communications limited due to lack of infrastructure, reduced speed of
communication leading to no use of web services such as e-commerce, email, information
searching.
BU
TT
O
O
SM
FA
CHAP 6 AICT
TT
INFORMATION SERVICES:
SM
FA
O
O
BU
LEGAL SYSTEMS:
Students can show understanding and knowledge of how ICT, mainly through the WWW,
provides useful information and services to users.
They can find local information on a range of problems of a legal nature. Again this topic
could lead to presentation or a quiz.
Increased access to legal information
Increased involvement in focus groups
More able to influence political representatives
10
CHAP 7 AICT
COMPUTER NETWORKS
Internet Protocols
TT
Internet Protocols
FTP/file transfer protocol - for uploading data/files/pages to web server or website
HTTP/hypertext transfer protocol - for accessing or viewing/displaying content web pages
HTTPS/hypertext transfer protocol secure - for secure data transfer between web pages
SMTP - for email
IMAP/ Internet Message Access Protocol - transfer of email over SSL
TCP/IP/Transmission control protocol/Internet protocol - for packet transmission, provides
end-to-end connectivity specifying how data should be formatted for transmission/
addressed /transmitted/routed/received at destination
SSH/secure shell - for secure access to log into remote computers and manage them/execute
commands
POP3/Post Office Protocol ver.3 - used by email clients to transfer email using TCP/IP
Telnet/telecommunication network - to allow remote access for maintenance/configuration
of servers , used to gain access to another users computer/remote access to server, used to
transfer/access data, requires a password login id, lacks security, uses TCP/IP protocol (as a
lower level)
BU
Layers of Protocols
Physical - basic communication takes place at this layer
Data link - go between from network layer to physical layer and acts on requests for services
from network
Network/internet - forwarding packets (data gets to source) and is also responsible for
routing
Transport - divides data into packets for transmission and adds addresses of source device
Applications - delivers services to network/internet layer
FA
Ethernet
Basic set of protocols that are used to operate a LAN. An Ethernet LAN is made up of devices
that send or receive data (PCs, printers, server), network devices that receive and forward
data packets (hub, switch, router) and the medium connecting the device (fibre optic, coaxial
cable).
SM
TCP/IP
TCP ensures data is transmitted accurately while IP makes sure data is delivered to correct
address.
Items of information contained in the header of a data packet under TCP/IP:
Source port/IP address which is the port of sending device. Destination port/IP address to
know where the data is to be forwarded. Number in the sequence of packets. ACK number (if
set). Data offset value showing where the header ends and data begins. Checksum for error
detection. Options flag to permit further information. Padding to fill in header before data.
Total length of packet. Time to live.
Handshaking and Parity checking
The initial communication between two devices that enables exchange of data to take place.
Parity checking verifies that data is transmitted accurately/correctly. Parity can be even or
odd according to number of 1 bits, first bit of a byte is parity bit; next 7 are packet of data
e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity, 0 1 1 1 0 1 0 0 only needed a 0 since
already even parity. If packet arrives at destination and parity doesnt match up then an error
in transmission has occurred. If more than one bit has been changed or bits transposed,
parity check may not pick up transmission error. Block parity can be used to locate errors in
blocks of data.
CHAP 7 AICT
COMPUTER NETWORKS
Network Hardware
Network hub
It is used to connect computers to server/computer. It is not very efficient network device.
Sends data to all linked devices, may amplify received signal and works at MAC level.
In short, receives and/or sends packets to all devices connected to it.
Switches
These are advancement on a hub. Switch directs the data stream only to the addressed device
and prevents congestion on segment of network. It uses a list of device addresses and
redirects ack packet directly to sending computer and works at MAC level.
In short, switches direct flow of data packets to specific/individual devices connected to it
and stores details of MAC address of connected device(s) in order to direct packets. Reads
the IP address of recipients system, then looks up the port for this system and then sends
the packet directly to this. Blocks/does not send transmission/data to other ports.
BU
TT
Routers
Routers are gateway device that links LANs to make a WAN. It includes a firewall. These
direct packets according to their IP address, stores list of connected devices, redirects
packets to correct switch/hub and translates protocols (between networks).
Routers provide low level addressing via MAC address.
SM
FA
O
O
Dedicated cabling
Twisted pair: Electrical cable with at least two central wire conductors surrounded by layers
of insulation. Carries data at high speed, has higher bandwidth than WiFi, reduction in data
loss due to lower susceptibility to electrical/magnetic interference, lower susceptibility to
interception and fairly cheap to run a link.
Fibre optic: Made of high quality glass using light as carrier of data. It provides higher speed
data transfer than copper or WiFi, bandwidth is greater than copper or WiFi, longer lengths
possible c.f. copper cable, can be used for external links between buildings and more secure
as data cannot be read while in transit/glass has to be broken to be tapped into. It is easier to
increase bandwidth using fibre optics. Expensive to purchase and install, difficult to repair
breaks/damage compared to copper cable and can be easily broken/snapped compared to
copper cable.
Copper cable: New protocols can increase data transmission rates, these are easy to install as
no cabling is required, easy to add a new system and not as expensive to purchase/install as
fibre optic cables. But easier to intercept, has limited range, limited users to each access
point and requires repeaters/hubs over long lengths.
Servers
File servers - store user data
PCs carry out home/office task such as e.g. internet access, office tasks, have smaller backing
storage size e.g. smaller hard disks, usually have slower/fewer processors than file servers.
Fileservers store larger files e.g. databases than PCs, store user data for access over a
network, reduce the need for users to have local backing storage in their own computer,
control network access rights and allow access by multiple users/PCs at same time.
Application servers - distribute software to client devices, storage of company files/data/ web
site and allow access/login by staff using remote devices on network/from internet.
Proxy server act as intermediary between client devices and servers, to cache frequent
requests for data/web pages to speed up access for client device, acts as a buffer between a
LAN and a WAN/Internet, filters requests from users/returned pages, uses a cache of
requested pages hence reducing time to download a page, only requires 1 network link to the
Internet, enables better management of the usage of the Internet, forwards user requests to
appropriate server, returns web pages requested if allowed, stores pages for faster browsing.
CHAP 7 AICT
COMPUTER NETWORKS
O
O
BU
TT
LAN Topologies
Ring: Each computer (including the server) is connected to each of its neighbors and data is
transmitted around the network. Performs well if network traffic is heavy, faulty connection
between 2 stations can cause network crash and difficult to add a new device once network
already set up.
Bus: Each computer is connected to a common spine consisting of cabling with network
leads attached to it and each computer. Each end of spine has a terminator so that data does
not disappear into thin air. Easy to add in new devices even if network already set up, one
device failing doesnt affect rest of network, no need to rely on hub or switch, less cabling
needed reducing cost, hard to identify problem if fault occurs and if there is a fault in spine,
all stations on network fail. Bus network topology is now out-dated.
Star: Each computer is connected to a central hub or switch. If one device fails, rest of
network is not affected, can investigate network problems while it is running, if the hub
breaks down the whole network crashes and requires more cabling.
Hybrid/Tree: Made up of star networks where each hub and the server are connected to a
common bustype backbone. Has same advs and disadvs as of star and bus topologies. It is
difficult network to wire up in hybrid topology.
SM
FA
Intranets
It is private computer network made using Internet protocols/IP to share company
information/data/files securely.
USES: Store information that is specific to company and is not in the public domain e.g. sales
figures, social events, company news announcement, personnel directory with telephone
numbers and email address. Can stop staff using the internet for their own purposes, can
control pages uploaded/downloaded on server and allow access to templates/common files.
Intranets provide secure local email and enable employees to co-ordinate activities e.g. book
video conference suite/arrange a meeting through seeing one anothers diaries. Intranet
provides fast access to company data, forums can be set up for discussion of confidential
matters and provides a means of informing employees about news. Intranet allows
downloading of user profile to desktop, share files projects between employees, blogs for
projects and have internal website for hotel/company only. Intranet is used for distribution
of company notices/bulletins so all employees can access them/doesnt have to be sent out
individually and allows employees to work on projects at same time such as annual reports.
Enables different type of system /smartphones to access information as uses Internet
protocols, uses a web browser to access pages so no special software expense, users require
ID and password to gain access and Intranet is independent of the Internet but holds less
pages/information than the internet.
BENEFITS: Can access company documents from anywhere in company (as and when
needed).
Increase in workforce productivity as employees can locate company
documents/templates/data (using web browser). No need to send/produce hardcopy to
every employee as can use email/instant messaging between employees. Increase in
collaboration between employees with all information available, saving time.
Company/corporate knowledge/information easily updated sent to/available to all
employees. Reduced costs as employees view online compared to hardcopy. Intranet can
restrict access to outside network/Internet leading to greater productivity. Data/company
CHAP 7 AICT
COMPUTER NETWORKS
information is more secure because intranet is private. Can restrict/control access to content
on intranet e.g. restrictions to content, restrictions to who can view/access content.
O
O
BU
TT
FA
Features of WAN
Covers a large area/multinational networks, enables geographically distant offices to access
the intranet allows intranets to be spread over different LANS, consist of LANs connected
with routers and communications links, uses various protocols to communicate over long
distances and different offices can co-operate on projects such as annual reports.
SM
CHAP 7 AICT
COMPUTER NETWORKS
Sends encrypted data, provides confidentiality, uses TCP/IP protocol, through the
internet/not a physical network. Uses tunnelling from one LAN to another/VPN client makes
tunnel to server. VPN uses public communication links. Packets are encapsulated within
packets of native transmission network.
Network Security
Physical: Authorised access to data using locked rooms and using security guards
SM
FA
O
O
BU
TT
Software
Firewall: Monitor and stops unauthorised traffic. Examines IP address in packet and uses
look up table of allowed IP address/forbidden addresses. Checks allowed domain names in
allowed/forbidden table. Filters on keywords/code sequences in data packets, blocks/allows
ports for data transmission, can be set to stealth mode so that packets are not bounced back,
can act as a proxy server to control access and can act as authenticator for remote access e.g.
manages passwords.
Encryption: Changing confidential data such as customer credit card numbers into
meaningless (scrambled) data so data can be safely transmitted/cannot be understood if
intercepted. An encryption key is used to encode data and key is used to decode data stream.
The longer the key the more secure is the encoding.
Digital Certification: Issued by a trusted organization and allows server and client PC to trust
each other/are who they say they are/allows secure transactions. Used in secure servers
(https). Used as an attachment to an email and verifies the identity of the sender. Recipient
holds the public key to decode message.
Authentication Techniques: Use of password and user ID and digital certificate supplied to
user. Can require the use of two techniques to gain access to system. Unique feature that only
you have that identifies you e.g. a fingerprint/biometric feature/use of biometric data to
identify unique individual. Unique knowledge that only you know that identifies you e.g. a
security question. Unique object that only you own that identifies you e.g. a bank card.
Device to generate one off code/TAN sent by email.Use of chip and PIN. IP address logging.
Security question/letters from a security code . Bank to call back/text message customers.
Others: Anti-spam software uses filtering to automatically delete junk mail/reduce
unnecessary traffic on network. Anti pop up software denies unwanted sites. Anti-spyware
software stopping cookies/keylogging. Viruses sent to the system so use anti-virus software
which is updated regularly.
Electronic Conferencing
Hardware: Phone handsets (landline or mobile) for telephone conferencing and webcams,
microphones and speakers for videoconferencing.
Software
Conferencing software/Skype - compresses audio and video elements produced by the Input
devices/microphones and webcams. CODEC - enables sufficient data to be transmitted
quickly enough to be in real time. Software has feature to record conference. Echo
cancellation software allows talking in real time to take place and keeps communication
synchronized. Communication software allows system access to internet/satellite link to
permit transmission. Software creating UDP packets and encryption software for signal.
VOIP Voice over Internet Protocol: Uses Internet/Intranet to carry telephone calls, sound
input is compressed for transmission, requires dedicated software, inter-branch/
international calls are cheaper than landline calls, other Internet services are compatible e.g.
file exchange and audio conferencing to carry voice/audio conversations, can be computerbased or connected to ordinary telephones, allows automatic routing of calls/answering
services
CHAP 7 AICT
COMPUTER NETWORKS
Reasons for use of VOIP: Telephone number stays with computer/laptop so same number
wherever user is in world, telephone numbers are independent of location so no need to
store/use different numbers, internet phones are portable and can be used anywhere there is
broadband connection, call forwarding/call waiting/voicemail/caller ID and three-way
calling are available, can have multiple users/two or more participants/ conference calls and
can use existing PCs/network instead of dedicated telephone system.
FA
O
O
BU
TT
Video-conferencing
Setting up video conferencing suite:
Large screen monitors (digital) projector to enable delegates a realistic view, high
quality/HD webcam / HQ/HD webcam on each station that can move and zoom to take
images in real time to relay back to other delegates, several microphones/speakers/headsets
to enable delegates to be heard clearly, call up device to enable access to communication link.
Delegates sit in front of screens with microphones to pick up sound, cameras provide wide
angle view of room and can be zoomed onto a speaker and chairperson controls meeting.
Broadband connection/satellite link to suite really needs high bandwidth.
Advantages to the company of using video conferencing:
Computer files can be updated in real time, can be set up at short notice to overcome crises,
regular meetings become viable, initial hardware costs are offset by savings in travel costs,
safety aspects no risk of kidnapping/terrorism and no travelling time required away from
office hence more productive.
Recent developments that have led to increase in use of VC:
Increase in terrorist attacks has driven the need for video conferencing, faster
communication /broadband connections and wider availability of high speed links.
Companies have tended to become global, faster processors in computers now allow for jerkfree images, multi-screen technology and general improvements in technology has lowered
costs/improved image quality. Increased costs of flying/fuel/taxes on flying and cost of
venues and increased awareness of environmental issues so less willing to travel.
How video-conferencing software enables group meetings to take place:
Noise cancellation prevents unwanted audio elements, uses a codec for compression and
compression ratio can be very high/100s to 1, codec converts audio/video into digital bit
stream, audio and video but stream converted into data packets for transmission over
internet, keeps audio and video synchronized and large screen is divided into sections.
SM
Phone conferencing: Participants just log in with touch keys, cheaper running costs than
other conferencing, time has to be agreed with participants, call has to be set up with server,
cannot see other participants and never sure whose turn it is to speak.
Instant messaging: Easier to use than e.g. video-conferencing, need to log in, cheaper
provided there is internet access, not really suitable for large groups of users, some
companies block use and can be insecure for e.g. transferring confidential documents.
Comparison of VOIP and IM against VC
VOIP is voice over IP allowing communication over the internet. Disadvantages include
need for a special phone or headset in many cases, free calls can only be made if recipient
uses same system and advantages include international/long distance calls are at local rate
or even free, less hardware needed than with video conferencing reducing costs and cannot
see body language/facial expression. Instant messaging allows interaction between users
across internet. Disadvantages include video is poor unlike VOIP, interaction can be slow
and poor synchronization. Advantages include interaction with various IP addresses, video
can be used unlike VOIP, less expensive hardware needed than with video conferencing and
only require low speed internet connection (unlike VC).
CHAP 7 AICT
COMPUTER NETWORKS
Miscellaneous
BU
TT
Describe how the Internet has quickly grown since its introduction in the 1990s
Expansion of the provision of broadband
Price of computers has fallen dramatically over the last few years
Improved search engines
Faster operating systems/software allow multimedia
Large memory capacities (hard drives, DVD), large files to be downloaded and stored
Wireless connections to share Internet service
Other devices (e.g. mobiles, digital boxes, portable music players )
Introduction of online services expanded its use e.g. remote photo storage
Social networking such as chat/personal web space
Greater capacity of Internet backbone
Operating system development faster data processing
More multimedia content posted on WWW
Web authoring software improved making its easier to create own web site
Online banking, shopping and auctions
Music downloads
Movie/TV programme downloads
Video conferencing using Internet, VoIP
Businesses using WANs
SM
FA
O
O
How the Internet has encouraged rapid growth of air travel to foreign countries
online ticket sales
ability to search for cheapest air ticket
allows customer to choose seating from the screen plans
easy for companies to inform customers of special deals
easy to search for destinations anywhere in the world
immediate purchase of tickets online
print tickets at home/no need to visit shop
ability to allow for automatic check in by storing personal details on airline files
search engines can easily search all airlines for best deals
airlines/agents send emails with offers
last minute deals possible via Internet e.g. for flights with empty seats
research facility on destination
read online reviews of country/hotels
AICT
EXTENSION
BU
TT
FA
O
O
Off-the-shelf packages
Can be available quicker than purpose-written packages as they are readily available in the
market place. Costs is less than purpose-written packages. Has been fully tested before
launch unlike purpose-written packages. There are forums to offer help and advice unlike
with purpose-written packages. Company provides help desk but slower response than
purpose-written packages. May offer more features than purpose-written packages. Do not
need to be customised unlike purpose-written packages. Do not need to be adapted for use if
circumstances change unlike purpose-written packages. Can be quickly adapted to meet
users requirements.
SM
AICT
EXTENSION
BU
TT
How the information could be put on the site so that it can be easily downloaded
Hyperlinks could be used to download files with text or images. Use pdf format to save
download time. Thumbnails could be used to enable download of images in larger size. Video
files could be accessed using hot spots. Web page design program used to add these features.
Sound in background could be included.
FA
O
O
SM
AICT
EXTENSION
SM
FA
O
O
BU
TT
AICT
EXTENSION
O
O
BU
TT
Providing details for customer to print their tickets and ensure uniqueness
Company sends out ticket details to customer via email, use of web form for input, web
page/email instructions how to print ticket, print out unique bar codes on the tickets which
match up with credit card details, name of customer + id code on the ticket and details of
customer verified on web page.
Security features when ticket issued e.g. customer must provide passport number, need
proof of ID (e.g. passport) and need to provide customer details when using e-ticket e.g.
customer last name.
FA
How system matches e-ticket to a passenger when they check in at the airport
Lead passenger will have paid by credit card number and has to give passport number, name
matched up with credit card holder and/or passport, ticket details emailed to lead passenger,
email printout used as confirmation, email contains a unique (bar) code which identifies
passenger and check-in details match up with stored passenger details.
SM
AICT
EXTENSION
Customers buying tickets in advance would have to use the website and therefore see any
advertising which generates revenue for the company will be able to leave feedback for the
company and company can attract more customers by using a website.
SM
FA
O
O
BU
TT