Académique Documents
Professionnel Documents
Culture Documents
AS ICT (9626)
Theory Workbook
September 2016
Student Name:
Contents
Week 1 Lesson 1
define information and show how data can become information through context and meaning
define knowledge and Explain that information becomes knowledge when human experience is applied
Specimen - 2017
Accuracy
Relevance
Age
It is common for much of the data collected and entered into a system to have some degree of repetition and
redundancy i.e. extra information that does not add anything.
And this pattern or repetition is why it is efficient to code the data in some way.
Let's take the example of collecting data about a person's gender. People can be either 'Male' or 'Female'.
Whilst these two options are easily understood by all, imagine having to enter the word 'Male' and 'Female' into a
system many hundreds of times. It is a waste of time and effort because no extra information is contained in the full
words compared to a single letter.
The other issue is that no matter how accurate a person is at data entry, at some stage they are likely to make a
mistake and might spell 'Male' as 'Mail' or 'Female' as 'Femal'. This type of mistake will make any results from your
database queries unreliable.
Instead of entering 'Male' or 'Female' you could code the data and instead enter it as 'M' or 'F'.
Simply having to enter one letter instead of a possible six will speed up data entry. It will also cut down on the risk
of mistakes being made with spelling.
In our example, the words 'Male' or 'Female' have been coded so that they become 'M' or 'F'.
When data has been coded it makes it easier to use validation to check if the data entered is sensible. With the
example above, the person entering the data could still make a mistake and enter 'S' instead of 'M' or 'F'.
But if you set up validation so that the field will only accept the letters 'M' or 'F' and absolutely nothing else then
that should further cut down on possible mistakes.
Note that validation can only check if the data is sensible and within reasonable limits, it cannot check whether the
data is accurate. Somebody could still enter 'F' instead of 'M'.
Every letter that you store in your database system will take at least one byte of storage. If you store 'Female' as 'F'
then you will save five bytes of storage space. If the system belongs to a large organisation, there might be many
thousands or millions of records stored - simply by coding one field, a huge amount of hard disk storage can be
saved.
It stands to reason that the smaller the size of your database, the faster it will be to search and produce results.
Thus by coding data and keeping the size of the system to a minimum the more time you can save in the long run
when running queries.
Codecs
Data Encryption:
Symmetric Key Encryption (plain text, cypher text and use of a key)
Asymmetric Key Encryption (plain text, cypher text and use of a private and public key)
Cipher Encryption (Substitution and reposition)
Encryption is the process of converting information into a form that is meaningless to anyone except holders of a key.
In cryptography, plaintext is ordinary readable text before being encrypted into ciphertext or after being decrypted
About Cyphers
Most common ciphers involved some form or substitution or transposition of alphabetical letters. Substitution means to
substitute one character for another while transposition is some form of repositioning characters within the message (which
literally scrambles the information).
In the digital age, ciphers changed and are generally based on two types of algorithms--one using the same key to encrypt and
decrypt (symmetric encryption), and one using different keys to encrypt and decrypt (asymmetric encryption). The one that uses
symmetric keys falls under private-key cryptography, while asymmetric key algorithms falls under public-key cryptography.
Alice must then give a copy of this key to Bob. She must make sure that nobody else can get to the key. (So maybe Alice will visit
Bob and give him a copy of the key on a memory stick or floppy disc).
Now that Bob has a copy of the key, each time Alice needs to send him a message she starts by encrypting it using special
encryption software and the secret key.
The encrypted message now looks like a jumble of random letters and numbers. Alice then sends the encrypted message to
Bob.
She can use a public network like the Internet, since, even if it gets stolen, the encrypted message cannot be read or
understood without the key.
When Bob receives the message, he uses special decryption software and his copy of the secret key to decrypt the message.
Advantages
a) Data is scrambled into unreadable form/only person/computer with key can understand data
b) increasing the length of a key increases the strength of the encryption
Disadvantages:
a) It is slower than normal browsing. It takes a while for the browser to do the maths required to scramble the message and
another delay on the server that has to unscramble the data.
c) It can be a complicated business running a secure server, so very often, ordinary online shops will hire a specialist 'Payment
Gateway' such as 'WorldPay' or 'Paypal' to handle payments for them.
Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of
random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting
each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt
and decrypt all messages that use this key.
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which require two
separate keys, one of which is secret (or private) and one of which is public.
Asymmetric Encryption
The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into
the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which
there are two related keys--a key pair. A public key is made freely available to anyone who might want to send you a message. A
second, private key is kept secret, so that only you know it.
Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the
same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be
decrypted by using the matching public key.
This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A
problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing
power to both encrypt and decrypt the content of the message.
On a hard disk
..
..
..
In e-mail
..
..
..
On HTTPS websites
..
..
..
discuss encryption protocols (including: the purpose of Secure Socket Layer (SSL)/Transport Layer Security (TLS)
and the use of SSL/TLS in client server communication)
The SSL protocol is used by millions of e-Business providers to protect their customers, ensuring their online
transactions remain confidential. A web page should use encryption expected to submit confidential data, including
credit card details, passwords or any personal information. All web browsers have the ability to interact with secured
sites so long as the site's certificate is from a recognized certificate authority.
Encryption Hiding what is sent from one computer to another. The data is scrambled up so that it
becomes meaningless to someone without the key to decrypt it.
Identification Making sure that the computer you speaking to is the one you trust
Web servers and web browsers rely on the Secure Sockets Layer (SSL) protocol to help users protect their data during
transfer by creating a uniquely encrypted channel for private communications over the public Internet. Each SSL
Certificate consists of a key pair as well as verified identification information. When a web browser (or client) points
to a secured website, the server shares the public key with the client to establish an encryption method and a unique
session key. The client confirms that it recognizes and trusts the issuer of the SSL Certificate. This process is known as
the "SSL handshake" and it begins a secure session that protects message privacy, message integrity, and server
security.
SSL Certificates are small data files that digitally bind a cryptographic key to an organizations details. When installed
on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a
browser. Typically, SSL is used to secure credit card transactions, data transfer and logins, and more recently is
becoming the norm when securing browsing of social media sites. SSL Certificates bind together:
An organization needs to install the SSL Certificate onto its web server to initiate secure sessions with browsers.
Depending on the type of SSL Certificate applied for, the organization will need to go through differing levels of
vetting. Once installed, it is possible to connect to the website over https://www.domain.com, as this tells the server
to establish a secure connection with the browser. Once a secure connection is established, all web traffic between
the web server and the web browser will be secure. Browsers tell visitors a website is SSL secure via several visible
trust indicators:
To view the actual contents of the Certificate click the "Details" tab:
Questions:
What are the two main purposes of SSL?
Which applications use SSL?
What is a SSL certificate and what does it contain?
How does SSL work? Draw a block diagram to represent the steps
Questions:
What is the purpose of TLS?
What are the two main layers that make up a TLS?
How is TLS different to SSL?
Description Example
presence check
range check
type check
length check
format check
check digit
lookup check
consistency check
limit check
Analyse verification methods (including: visual checking and double data entry)
Visual Checking
Double Entry
2.1 Hardware
Computer hardware is the collection of physical elements that constitutes a computer system. Computer hardware is
the physical parts or components of a computer, such as the monitor, mouse, keyboard, computer data storage, hard
disk drive (HDD), graphic cards, sound cards, memory, motherboard, and so on, all of which are physical objects that
are tangible. In contrast, software is instructions that can be stored and run by hardware.
Evaluate internal hardware devices (including: central processing unit (CPU), motherboard, random access memory
(RAM), read only memory (ROM), graphics card, sound card, hard disk drive (HDD), solid state drive (SSD))
Graphics cards
Sound cards
EXTERNAL HARDWARE
Cloud
Monitor
Keyboard
Mouse
Laser Printer
Inkjet
Dot matrix
Plotter
Web cam
Scanner
Optical character
reader (OCR)
Pen drive
Memory card
..
Evaluate storage devices (including: magnetic tape drive, optical, hard disk drive (HDD), solid state drive (SSD))
Optical
Drives
Solid state
drive (SSD)
Windows MAC
Linux
Specimen - 2017
An operating system controls the operation of the computer system by managing the computer's memory, processes,
and all of its software and hardware. Without the operating system the computer will not work. Describe the following
features of systems software:
Device
drivers
Utilities
Compilers
Interpreters
Linkers
Word processing
Spreadsheet
Control software
Measuring software
Communications software
Windows
Characteristics :
Characteristics:
Characteristics:
46
Dialogue Interface
Gesture based Interface Advantages Disadvantages
Font size
Layout
Quantity
of
information
Controls
A mental model is an explanation of someone's thought process about how something works in the real world.
Mental models include what a person thinks is true, not necessarily what is actually true.
Mental models are similar in structure to the thing or concept they represent.
Mental models allow a person to predict the results of his actions.
Mental models are simpler than the thing or concept they represent. They include only enough information to
allow accurate predictions.
1. An image (needed if the mental model is of a physical thing). If the mental model is of a physical object, the
model should contain a simplified image that serves as a template for that object
2. A script (needed if the mental model has a process). If the mental model is of a process, it should contain
some sort of description of that process. The best way to present the script will varyit might be a series of
steps expressed verbally, a flowchart, or a decision tree.
Describe the role of different utility software (including: anti-virus, back-up, data compression, disk defragmentation,
formatting, file-copying, and deleting)
Back-up
Data compression
Disk defragmentation
Formatting
File-copying, and
deleting
Advantages Disadvantages
Custom written software
Off-the-shelf software
The programmer will choose to use a certain computer language with which to write code. For example they may
favour the language C++ or they may choose Python. In either case the programmer writes a series of statements to
form his computer program.
The code a compiler generates is stored as an 'executable file'. Another name for an executable file is the 'object
file', (not a generally popular term but your exam question may mention it). When this file is run, the machine code
commands that it contains begin to be processed by the CPU.
A compiler produces fast, efficient code that are stored as an executable file. Once the compiler has done its job,
you can pack it away. Just run the 'exe' file.
So why are there different ways of doing things? Why bother with interpreters?
An interpreter will translate each line of source code into machine language and then execute that machine code
directly.
Advantages of interpreters
1. Debugging
Imagine you are busy programmer and you want to make sure that each line of the source code you are typing in, is
error free.
As we have mentioned, simple typos will trip you up, miss a comma, semi colon, bracket in the grammar of the high
level language and you wiill see a long, de-moralising, list of errors to be fixed in your source code (many of which are
spurious, adding to the hassle!). What if a program could check each line of code as you generate it.
This is one important role of interpreters, it makes debugging simpler as it immediately checks your source code.
2. Less memory
Another advantage is memory. It uses less memory than an exectuable file because only a few lines of source code
needs to be in memory at any one time.
Some interpreters execute code within a 'virtual machine'. For example the Flash Player and the Java Virtual machine.
These have been designed to dis-allow code from directly accessing the computer. So you may crash the virtual
machine with faulty code, but most likely the host computer will still be running just fine.
The biggest disadvantage is speed. Interpreted code runs slower than compiled code.
This is because the interpreter has to analyse and convert each line of source code (or bytecode) into machine code
before it can be executed.
Compiler Interpreter
Fast, creates executable file that runs directly on the CPU Slower, interprets code one line at a time
Debugging is easier. Each line of code is analysed and checked
Debugging is more difficult. One error can produce many before being executed
spurious errors
Less likely to crash as the instructions are being carried out either
More likely to crash the computer. The machine code is on the interpreters' command line or within a virtual machine
running directly on the CPU environment which is protecting the computer from being
directly accessed by the code.
Weaker Intellectual property as the source code (or bytecode)
has to be available at run time. For example if you write a Flash
Easier to protect Intellectual Property as the machine code
Actionscript application, you can easily get de-compilers that
is difficult to understand
convert the p-code back into actionscript source code (unless you
use encryption, but that is another story).
Uses more memory - all the execution code needs to be
Uses less memory, source code only has to be present one line at
loaded into memory, although tricks like Dynamic Link
a time in memory
Libraries lessen this problem
Unauthorised modification to the code more difficult. The
Easier to modify as the instructions are at a high level and so the
executable is in the form of machine code. So it is difficult to
program flow is easier to understand and modify.
understand program flow.
Specimen - 2017
Produces a signal based on the field around permanent magnets, coils, and
electrical devices. It features a rotating sensor tip to measure both
transverse and longitudinal magnetic fields.
evaluate the use of monitoring technologies in everyday life (including: CCTV monitoring, environmental monitoring,
workplace monitoring)
CCTV monitoring
Environmental monitoring
Workplace monitoring
6. If temperature of the room is above the pre-set value the fans remain on/are switched on by the microprocessor
or microprocessor increases their speed
7. If temperature of the room is below the pre-set value the fans remain/switched off by the microprocessor
5. Microprocessor compares temperature data from the sensor with the pre-set value
6. If the temperature is higher/lower than preset value a signal is sent to the actuator
6. Microprocessor compares temperature data from the sensor with the pre-set value
7. If the temperature is higher/lower than preset value a signal is sent to the actuator
Intensive Care
1. Sensors monitor the patients heart rate, pulse rate, body temperature, blood pressure
2. The computer is pre-set with normal range of values which is compared with the ones fed back by the sensors
6. Microprocessor compares the data from the sensor with the pre-set value
7. Microprocessor compares the data from the sensors with the pre-set values
8. If the data received is higher/lower than the pre-set value then the computer sounds an alarm for the Medical staffs
attention
describe how personal data can be gathered by unauthorised persons (including: by smishing, vishing, phishing and
pharming), and how this might be prevented
Malware Description
Trojan Horse
Worms
Adware
Malicious Bots
Ransomware
Specimen - 2017
Head Aches
Water by machines
Overloaded sockets
Electrocution
Over heating
Fire
Explain that the digital divide refers to the gap between people and regions that have access to aspects of modern
technology (including: telephone, television, personal computers and the internet), and those that do not or those that
have restricted access
...
...
...
...
socioeconomic groups
...
...
...
...
...
...
...
Specimen - 2017
Advantages Disadvantages
Local area
Network (LAN)
Wide Area
Network (WAN)
Advantages Disadvantages
Peer to Peer
Client Server
Virtual Private Network
Advantages Disadvantages
Explain the difference between the internet and the World Wide Web
Specimen - 2017
Advantages Disadvantages
Hardware required:
Software required:
Hardware required:
Software required:
81
discuss the impact of video conferencing on society (including: the general public, legislation, education, medicine,
business, media)
A payroll system is software which organizes all the tasks of employee payment and the filing of employee taxes. It
involves:
Transaction Files
Contains the transactions; changes that are supposed to be made to the data in the
master file. For example, each of the following employees have earned the following for
this particular week.
Each transaction has a code which tells the computer what to do with the data in the
transaction file. For example:
A Addition - Add a record
C Change Change a record
D Delete a record
Master Files:
Holds the actual data that is supposed to be processed and holds the resultant data after the process is completed
(updated salaries from the transaction file.) The data can be organized using keys.
1. The transaction file is sorted in the same order as the master file e.g. By an ID such as employee number
2. The computer reads the first record record in the transaction file and the first record in the master file
3. If the IDs dont match the computer writes the master file record to the new master file
4. Then write the information from the old master file with the updates from the transaction file to the new
master file.
5. If the transaction relates to rate of pay , the computer calculates the pay using the rate of pay from the
master file and hours worked from the transaction file. It also deducts any taxes from total pay.
6. Processed record is written to master file and the process is repeated until the end of the master file
7. If transaction relates to deletion or amendment the then the old master file record is not written to the new
master file
8. If amendment or insertion is required then the data in the transaction file is written to the new master file
Description Examples
Batch
Online
Real-time