CH6 Book Notes
CH6 Book Notes
6.1 Communication
There are several communication systems that make use of ICT technology.
For example:
» newsletters and posters
» websites
» multimedia presentations
» media streaming DTP: Desktop publishing software creates layouts of text and
media files for publishing in print or digital formats, such as
» e-publications. newspapers, magazines, brochures, ebooks, blogs, and online
publications.
6.1.1 Communication media
Newsletters and posters Software used: word processor, DTP (Desktop publishing)
Newsletters and posters can be produced very easily using, most commonly, a
word processor. Often, the newsletter or poster will have photos which have
110
6.1 Communication
been taken specially or have been downloaded from the internet (with the
permission of the copyright holder). The following sequence is fairly typical of
how such a document would be produced on a computer system. The sequence is
not always necessarily in the order shown; it can vary depending on what already
exists or what needs to be created):
» First a word-processor application would be opened
» Photos could be obtained by:
– using a digital camera and taking photos
– searching for images/photos on the internet, or suitable photos could
already be stored on the hard drive or cloud
– using hard copy photos, which could be scanned in.
» If necessary, camera images would then be uploaded (either by connecting the
camera or camera memory card) to the computer via a USB port, or by using
Bluetooth connectivity).
» Photos from all selected sources would then be saved to a file on the HDD or SSD.
» When the user is finally ready to produce the document, the photos would be
imported from the file stored on the HDD/SSD.
» Once imported, photos would need to be cropped, edited and/or resized.
» Text would be typed in using a keyboard.
» Alternatively, any previously saved text would need to be imported.
» Photos need to be placed in their correct position and the text wrapped.
» Finally, the whole document would need to undergo proofreading for errors
and then saved, ready for printing.
Very often, other features, such as a spell checker, would be used to make sure
no mistakes had been made. Care needs to be taken when using a spell checker
for the following reasons:
» The language used in checking the spelling could be different; for example,
British English and American English often have different spellings of words.
» Names or proper nouns might be highlighted as an error by the spell checker,
but may be acceptable.
» Similar sounding words need to be checked; for example, where, were or wear
all sound the same but have very different meanings – these will not be Link
picked up by the spell checker (but might be picked up by a grammar checker).
» The (correct) highlighted word may not exist in the spell checker dictionary. Other word-
processing features
could be used
Exercise 6a when producing the
Find out what other word-processing features would need to be used when newsletter or poster;
producing a newsletter or poster. For each feature identified, write down how you refer to Chapter 17
would use it to produce a professional-looking document. for more information.
Posters are a good way of publicising, for example, a sporting event or an publicising: give out information
advertisement for a forthcoming movie. A sporting event poster would need to about (a product, person, or
include at least the following information: company) for advertising or
promotional purposes.
» what the event is and where it will take place
» date, time and place of event
» admission fees (if any) information for sport event
» contact details
» other information (such as whether there will be a crèche or facilities for
people with disabilities).
TRUE CRIME
1 pm untill 4 pm.
new song.
No entry fee.
Refer to chapters in
Créche, reception tent, free
parking
the second half of
August 22nd 2022 this book wherever
necessary.
112
Poster: may use plotters, use Glossy papers 6.1 Communication
As with newsletters, posters can be printed out using high-quality printers or ADV:
can be posted online. Printed posters can be any size. Large posters have the 1- not necessary need to have
advantage that they are eye-catching and usually very difficult to miss. They are computer or internet connection
used in many countries on the sides of roads so motorists see them on their way to 2- you have physical copy
work. By placing the posters in strategic positions, it is possible to target certain
people rather than the general public (for example, advertising expensive cars by
dis ADV
placing the posters on buildings or advertising hoardings in financial districts in 1- need to be distributed by hand
big cities). The drawback is the cost of display (the advertising areas can only be 2- printing cost
rented) and that they are subject to weather conditions, so only have a limited life. 3- restricted to small target
audience
Websites
Rather than producing newsletters and posters by printing them out, it is
possible to use websites for advertising. This method of advertising requires
a company to either develop their own website or pay another company to
advertise on their website.
Using the first option may require the company to either employ a team of web
designers or go to a specialist company with experience in website design. It
may also be necessary to buy hardware and software to develop and store the develop website needs
website. This method can therefore be expensive, but the cost does not stop
there. It will be necessary to use programmers to make sure that their website is
safe from hackers and from pharming attacks.
It has, however, become much easier and cheaper for individuals or small organisations small companies uses
to create and host their own website, using off-the-shelf content management systems off-the-shelf content manager
to organise content, and pay hosting fees to rent space on a web server. system (CMS)
CMS use human-friendly
The big advantage to websites is that they offer worldwide advertising capability interface rather than needing to
and there is no need to buy paper and other consumables, or pay people to work directly with code.
deliver newsletters or flyers. Before deciding which is the best way to advertise
their goods or services, companies have to weigh up the advantages and
disadvantages of both methods.
Websites tend to be used to advertise goods or services which require national
or international coverage. They can cover almost anything from car sales to
advertising a musician’s forthcoming album. The main reasons for using websites,
rather than newsletters or posters for advertising products and services, are
summarised in Table 6.1.
▼ Table 6.1 Advantages and disadvantages of using websites for communication
V.I.
Advantages Disadvantages
» sound/video/animation can be added » websites can be hacked into and modified or viruses introduced
» links to other pages and websites can be » risk of potential pharming
added in hyperlinks and hot spots » it is necessary for the potential customers to have a computer and internet
» buttons to navigate/move around the connection
website, leading to more information » it is not as portable as a paper-based system (although with modern
» ‘hit counters’ allow the owner to see smartphones and phablets this is fast becoming untrue)
detailed information about how many » possible for customers to go to undesirable websites (either by accident or
people have visited the website as a result of a pharming attack) – this can lead to distrust from customers
» can be seen by a global audience » there is a need for the company to maintain the website once it is set up –
» cannot be defaced or thrown away this can be expensive
» it is much easier to update a website » because it is a global system, it is more difficult to target the correct
(and there is no need to do a reprint and audience using website advertising
then distribute the new version) » still need to find a way for people to find out about the website
113
6 ICT applications
Multimedia presentations
Presentations that use animation, video and sound or music are generally much
more interesting than static presentations done on slides or paper. produced: software package
Presentations are produced using one of the many software packages on the example presentation software
market and then used with a multimedia projector so that the whole audience
is able to see the presentation. There are many advantages and disadvantages for use multimedia projector to
display it to audience
this type of presentation, with some examples listed below.
Advantages of multimedia presentations
» use of sound and animation/video effects which are more likely to grab
the attention of the audience, and can make the presentation easier to
understand
» possible to have interactive hyperlinks built into the presentation; this
means the presentation could access a company’s website or even key
files stored on the cloud (such as video footage, images, spreadsheets
and so on)
» use of transition effects allow a presentation to display facts in a key or
chronological order
» can be interactive
» more flexible; because of the links to websites and other external systems
(for example, the cloud), the presentation can be tailored to suit a particular
audience.
Media streaming
Media streaming is when users watch movies/videos or listen to music on
devices connected to the internet. When using media streaming there is no need
to actually download and save the video or audio files.
Streaming is a continuous transmission of video or audio files from a remote Streaming:
server where the files are stored. This means data is transmitted and played in watch online (real time)
real time. In contrast, when downloading it is necessary for the user to store
Downloading:
the entire file on the computer’s HDD or SSD before they can watch the video
- store file on device
or listen to the music. This uses up valuable storage space and download times - take up storage space
for a two-hour video can be up to one hour, depending on the internet speed - need download time
and the video quality. depending on Internet speed
With streaming, the file is sent as a series of packets of data. Each packet is
interpreted by the web browser. Streaming only works well if the internet speed
is stable, and at least 25 Mbits/second (for an HD video).
114
6.1 Communication
Because the playback of the media files is usually much faster than the rate
at which data is received over the internet, data packets are buffered in the
computer. Buffering makes sure the video plays back smoothly without freezing.
While the buffer is receiving data packets, it will be sending the data from the
previous data packets to the playback device. In this way, there appears to be
no gaps in the received data. Obviously, having a large buffer will considerably
reduce the possibility of freezing the play back.
Buffer: preloading data packet into a
reserved section of memory
or
Data Data Data A region of a memory used to temporarily
packet packet packet Data packets being received
9 8 7
store data while it is being moved from one
place to another
BUFFER
Data packets sent to Playback
playback device device
e-publications
Most material which is published on paper is also available in an electronic
format. For example:
» e-books
» digital magazines
» digital newspapers
» digital libraries.
115
6 ICT applications
Exercise 6c
Write down as many advantages and disadvantages you can think of for offering
customers e-publications rather than paper-based publications. Write a
paragraph describing each advantage and disadvantage.
Each tower transmits within its own cell. If you are driving a car and get to
the edge of a cell, the mobile phone signal starts to weaken. This is recognised
by the network and the mobile phone then picks up the signal in one of the
adjacent cells. If a person is making a call or sending a text to somebody in a
different country, then satellite technology is used to enable the communication
to take place.
Mobile devices either use a SIM (subscriber identity module) card to allow it
to connect to the mobile phone cellular network, or they use wireless internet
connectivity. Together they allow all of the following features:
» SMS (short message service) messaging
» phone calls
» Voice over Internet Protocol (VoIP) communication
» video calling
» internet access.
116
6.1 Communication
Phone calls
Link
Probably the most obvious use of a mobile phone is its ability to make a phone
call on the move. Because mobile phones are so small and they have their own For more information
power source, they are an ideal way of keeping in touch anywhere, provided there on the features of
is a network signal. Mobile phone networks are still not as stable as landline mobile phones, refer
systems and for that reason alone, landline phones are still in common use. back to Chapter 1.
Using mobile phones to make phone calls has the following advantages:
» There is no need to look for an operational public telephone in an emergency.
» It is possible to conduct business or personal phone calls on the move. small
» It is easier to keep in contact with co-workers at the office no matter where have their own power supply
you are.
Internet access
Access to the internet from a mobile device is another valuable feature. Any
mobile device can connect to the internet either using a wireless broadband ▲ Figure 6.5 Cloud video
connection or via the mobile phone network. Due to the use of smaller screens, calling
internet pages displayed on mobile phones are often different to those
on desktop or laptop computers. Software detects which type of device is
connecting to a website, which then sends out the web page optimised for that Link
device. Mobile devices also have a built-in feature which automatically selects
wireless broadband connectivity (if possible), instead of the mobile phone See Chapter 4 for
more on Wi-Fi
network, when connecting to the internet. This has the following advantages:
networks.
» less expensive (mobile phone company ‘data plans’ often have a cap on how
much data can be downloaded, and charge for exceeding this maximum)
how software shows web page
» lower power consumption (Wi-Fi routers are usually much closer than
the mobile phone towers; the longer the range, the greater the power
consumption) mobile device first choose
» quality of service (Wi-Fi usually offers greater bandwidth than the mobile wireless broadband connectivity
phone network giving the possibility of downloading more data more quickly). then
it chooses mobile phone network
6.2.1 Computeruse
modelling predict
A computer model: is the use of
computers to represent real life
computerized
A simulation is the creation of a model of a real system in order to study the situations. These models are
behaviour of the system. The model is computer-generated and is based on usually financial, scientific or
mathematical representations. mathematical.
The whole idea is to try and find out how a system behaves, predict the
behaviour of the system in the future and see if it is possible to influence this
future behaviour.
computer modelling for
Advantages of using models 1- prediction (ex: weather, flood)
» Using computer models is less expensive than having to build the real thing 2- finance
(for example, a bridge!). 3- construction (ex: bridge,
building)
» On many occasions it is safer to use a computer model (some real situations
are hazardous, for example, chemical processes).
» Computer modelling allows you to try out various different scenarios in
advance.
» It is nearly impossible to try out some tasks in advance in real life because of
the high risk involved or the remoteness (for example, in space, under the sea,
in nuclear reactors, when crash testing cars, etc.).
» It is often faster to use a computer model than do the real thing (some
applications would take years before a result was known, for example, climate-
change calculations, population growth, etc.).
118
6.2 Modelling applications
119
6 ICT applications
All of these scenarios can be tested using a computer model. The design can then
be modified on the computer if any of the above scenarios caused the bridge to
fail. After a number of modifications, a final design will be decided on. To ensure
▲ Figure 6.7 Wind-tunnel
the computer model gives good results, a scale model of the bridge would then tests on a new bridge
be constructed and subjected to wind-tunnel (and other) trials. scale model = physical model
design
Similar methods are used when designing new buildings, particularly skyscrapers.
Again, computer models are used, often in conjunction with wind-tunnel tests on - design computer model
a scale model. When testing the building using a computer model, a number of - check scenarios and modify
model
scenarios need to be considered: when design new building
- final model is decided
» what is the effect of natural phenomena, such as hurricane winds, flooding, - build scale (physical model)
earthquakes and any other potentially damaging phenomena (wind movement - test physical model for
is a key issue with tall buildings; a 100-storey building may sway one metre to other trials (ex: wind-tunnel)
the left and then one metre to the right, cycling every ten seconds, in strong
winds – can the building survive such movement, will such movement be
unpleasant or frightening to human occupants, and so on)
» the effect of a disaster, such as a fire – how does the structure stand up to
such scenarios?
» how is it possible to move people around the building efficiently (some large
structures have over 5000 people working in them and there is a need to
model elevator movements to move people efficiently)?
All of these scenarios can be tested using a computer model. The design
can then be modified on the computer if any of the above scenarios caused
120
6.2 Modelling applications
the building to fail to meet any of its design criteria. After a number of
modifications, a final design will be decided on. To ensure the computer model
gives good results, a scale model of the building is then constructed and it is
subjected to wind-tunnel trials:
Figure 6.9 shows the management of the flood protection system in the city of
Venice as an example.
Flooding of the city over many years has led to the building of a number of
flood barriers. It is useful to use computer models to understand how these
flood barriers will react to a range of possible flooding scenarios. It is possible
to try out several different solutions, using the model, before actually building
▲ Figure 6.9 Flood
any flood defences. Following the computer modelling results, Venice decided management barriers
to develop a computer-based system rather than build a manual flood defence
system. The main advantages of doing this are:
» Sensors could be used out in the bay area to monitor sea height and wave -data is more accurate
height (and possibly other factors, such as wind speeds); using sensors would -data taken more frequently
give a much faster response to any deteriorating conditions in the bay.
» Using a computer system is safer, since using humans to monitor conditions -prediction made from data is
could potentially put them at risk. easily
» Data collection is continuous and more accurate than manual measurements
(readings can also be taken more frequently). - people alerted faster
» Because of the faster response to changing conditions, city dwellers can be
warned well in advance of any flooding actually taking place.
» Data from the sensors could also be fed into the simulation modelling the
flood area; this could lead to further improvements as more data is gathered,
which means the simulation becomes closer to reality.
Traffic management prediction
Computer modelling can be used in traffic management. We will consider two
different situations.
Closure of motorway lanes
Repairs need to be made to part of the central barriers on an eight-lane motorway.
The company given the task of carrying out these repairs needs to model the
impact of the roadworks on the traffic flow. They have decided there are two ways
of controlling traffic which need to be modelled. The two models shown in Figure
6.10 will appear on the computer screens, representing the motorway lanes.
The company will run model ‘A’ and model ‘B’ using different traffic densities at
different times of the day to see which one allows for the best traffic flow. The
122
6.2 Modelling applications
model will also try out the effect of different speed limits through the roadworks.
They will also simulate the effects of a breakdown to see how this would impact
on the traffic flow. By changing conditions in the simulation, it becomes possible
to find an optimum design which allows the traffic to flow freely, but also allows
the repairs to be done as quickly as possible. This is considerably safer, cheaper and
much quicker than trying out different traffic closures on a real motorway.
Traffic light simulation
Figure 6.11 shows a second use of computer modelling in traffic management – a
set of traffic lights are to be modelled at a Y-junction.
accurately (that is, by comparing the model’s results with actual traffic flow dis adv for sensor
(ex: flood, traffic)
data) then different scenarios can be tried out. For example: - expensive
» varying the timing of the lights and observing how the traffic flow was affected - in setting is not accurate it
» changing the number of vehicles stopped at part of the junction and then may give false reading
changing the timing of the lights to see how the traffic flow is affected - prone to error if it gits dirt on
it
» increasing or decreasing traffic flow in all directions
» considering how emergency vehicles affect traffic flow at different times of the day.
How would the system work in real life? Link
» Sensors in the road gather data and count the number of vehicles at the junction.
Also refer to Section
» This data is sent to a control box or to a computer (it will need to be 6.10, which describes
converted first into a form understood by the computer). Analogue to digital the use of automated
» The gathered data is compared to data stored in the system (the stored data number plate
is based on model/simulation predictions which were used to optimise the recognition (ANPR)
traffic flow). systems – another
» The control box or computer ‘decides’ what action needs to be taken. way to carry out
» Signals are then sent out to the traffic lights to change their timing if necessary. traffic management.
Low
Low
2.3 inches rain
66mph gusts
am
e t Stre
J
High
Exercise 6d
Create a spreadsheet to do some personal financial modelling. Include the monthly income in one row and
then show all the monthly outgoings. For example:
A B C D E F G
Month 1 Month 2 Month 3 Month 4 Totals
Income ($):
Outgoings: food
cinema
clothes
other
savings
Extend the list as much as you want or change the outgoings to be more realistic if necessary. Insert some
values into the spreadsheet and then change a few values to see the effect on your finances. Add extra
columns or extra outgoings to extend the spreadsheet. Finally, try creating a graph of your income against
outgoings for each month and for a year (do a prediction for the year after four months, for example).
125
6 ICT applications
Exercise 6e
Here is a list of five simulations/models and also a list of five reasons why models are carried out. Try and
match the five simulations to the BEST REASON why that simulation would be done.
Simulation Reason
SIMULATING BRIDGE LOADING Take too long to get results back from real thing
126
6.3 Computer controlled systems
Robots are very good at repetitive tasks. However, if there are many different
tasks to carry out (for example, making specialist glassware for some scientific
work), then it is often better to use human operators.
Advantages in using robots
» They can work in environments harmful to human operators.
» They can work non-stop (24/7).
» They are less expensive in the long term (although expensive to buy initially,
they do not need wages).
» They have higher productivity (do not need holidays, etc.).
» They provide greater consistency (for example, every car coming off a
production line is identical).
» They can do boring, repetitive tasks, leaving humans free to do other more
skilled work (for example, quality control or design work).
» They can carry out different tasks by fitting them with different end-effectors
(attachments); for example, a spray gun, a welding gun, and so on.
The production line will be continuous, with various robots at each station given
a specific task. Using robots in this way leads to: Advantages
» faster operations (the number of cans of baked beans filled is 120 per minute)
» much greater productivity (the production can run 24 hours a day for every day)
» greater consistency (every can contains exactly the correct weight of baked beans)
» built-in quality control (automatic testing for foreign material, such as metal
filings, which would result in automatic rejection from the production line)
» reduced cost to the consumer (although initial robot arms are expensive, there
are far fewer staff in the factory who would need wages).
Let us take a closer view of how robots could be used in a bottling plant.
it uses sensors
» Sensor 1 (a pressure sensor, light sensor or camera) detects the presence of a
1- sensor to detect the object
bottle; this sensor is constantly sending signals back to the computer. (pressure, light, camera)
» When the signal from sensor 1 indicates a bottle is present, the computer sends a 2- sensor to check the filling
signal to an actuator which opens a valve allowing liquid to flow into the bottle. liquid level
» Sensor 2 (a level sensor) is used to detect the correct liquid height in the (level)
bottle; this sensor sends continuous signals back to the computer.
127
6 ICT applications
actuator
operating valve
valve
computer sensor 2
sensor 1
» When the signal from sensor 2 indicates the bottle is full, the computer sends
a signal to an actuator to close the valve.
» The computer then sends another signal to a second actuator which operates
a motor to move the conveyer belt to allow the next empty bottle to take its
correct position.
» The whole process is continuous until stopped for maintenance, errors
occurring or a change in the process.
Exercise 6f
Find out about five industrial processes that use production line control.
In each case, find out the functions of robots at each stage in the process.
In each case, find the advantages and disadvantages of using robots on the
production line
128
6.4 School management systems
black) on the rear of the card. The student would have to sign the card and also
write their unique student ID on the back of the card. The magnetic stripe would
Paul Smith-012 234 555
contain the name of the school, the name of the student, the student’s data of
birth and their unique ID (registration) number.
▲ Figure 6.15 Student
Each morning the student would arrive at school and swipe their ID card through registration card
a magnetic card reader. The data read would identify the student and the time Morning: Student arrive
and date they entered the school’s premises. This data would now be stored on - swipe card
a database. On leaving the school (either at lunchtime or at the end of the day), - magnetic card reader reads
the ID card would again be swiped. This would now record the leaving time and card magnetic strip
date on the database. This would give a very comprehensive record of when the - student ID, time, date saved
on database
student attended the school and the number of hours they attended. It would
also be a more secure method in the event of, for example, a fire. Using the leaving
paper-based system, a student could register then just go home, but with an ID - swipe card
card system, the student’s attendance would be known at all times. The school - record leaving time and date
would now be able to account for every student on the school premises. At the on database
end of a semester (or school year), the database could be interrogated and it
would give an accurate attendance record for the student. This attendance record * This record when the students
could then be sent out to parents or checked by teachers on a regular basis. attend school and number of
hours they attend
There are further functions that could be used such as: also data can be analyzed
» the use of a PIN to stop another student swiping in with the wrong card
» the use of GPS tracking (see Section 6.11) so the exact whereabouts of a
student would be known; this would require the addition of a chip in the
ID card so that the tracking system could identify them (see Section 6.11
for information on RFID) – however, there are privacy concerns surrounding
location tracking.
129
6 ICT applications
Student performance
Teachers could make considerable use of spreadsheets to monitor the
performance of their students. Essentially, spreadsheets could record the test - Save student data (grades,
results of each student over a term/year. This would allow a teacher to easily see behavior, reports)
- compare/analyze student
how they were performing against other students in the same subjects. It would
results
also be easy to import data into a report, for example, summarising a student’s - produce report to
performance over the academic year. management, parents
School management systems are used to record the performance of students. - produce end-of-year,
Performance can consist of both academic achievement and behaviour. To end-of-term reports
- Data can be available to other
produce an end-of-term or end-of-year report, the system would need to have users of the system
access to the following data:
» student’s exam and test results in all subjects studied over the term/year parents/ school:
» behavioural data (this would include attendance records and, for example, - can log on and check students
number of times the student was in detention) marks, reports
- receive immediate feedback
» CAT scores (these are standardisation test results to enable each student to be - less cost since no printed
measured against a standard). reports
After processing this data, the system could produce:
» the average grades for all students in a class
» class and year group reports showing academic and behavioural performance.
Computer-aided learning
Computer-aided learning (CAL) is the use of computer-based systems to assist in
the academic teaching of students. They are designed to enhance, and not replace,
traditional classroom teaching. Students would use computers as part of their
learning and complete online tests to monitor their performance. If a student
encounters a problem, CAL is not always able to help the student, however, and in
those cases, students would need to take steps to find additional help.
Advantages of using CAL to enhance the learning process
» Students can learn when they want to and at their own pace.
» It allows virtual reality (VR) learning to be used; with VR, the student is fully
immersed into the learning environment.
» The student can stop at any point and return later to continue where they left off.
» It is possible to re-take tests until the student reaches the required skills level.
» CAL can make learning more interactive.
» CAL makes use of various multimedia (for example, short video clips,
animation, music and interactive learning methods).
130
6.5 Booking systems
» The real goal of CAL is to stimulate student learning and not actually replace
teacher-based learning; CAL, if used properly, should be an integrated part of
the student’s learning process.
» CAL can make use of multiple-choice questions (MCQs) which can be marked
immediately by the computer system, giving instantaneous feedback to the
student; other assessment methods can be used, such as fill in the missing
words, crossword puzzles, linking correct terms to descriptions and gaming.
» It can deliver micro-learning; this is where a topic is broken down into small
modules which are easy to learn, and is when CAL is most effective.
» Very often there are no printed tickets, which saves postal costs and also
allows ‘impulse’ bookings only a few hours in advance.
» Online booking allows the use of modern smartphone and tablet Apps
technology; the customer is sent a QR code which contains all the booking
information necessary (this QR code is stored on the smartphone or tablet and
only needs to be scanned at, for example, the theatre or airport on arrival). ▲ Figure 6.16 Example
of a booking QR code
Disadvantages
» The setting up and maintenance of online booking systems is expensive.
» All customers using this service need access to a computer or mobile phone
and a reliable internet connection.
» It is often more difficult to cancel the booking and get your money back using
online systems.
» If the server is down for maintenance, or if the systems breaks down, it
becomes impossible to book seats by any method (temporary paper-based
systems cannot be used in case of the risk of double-booking occurring).
» If the websites are not well designed, it can be difficult to make exactly
the booking you want or can lead you to make mistakes; this is a particular
issue with flight bookings where correcting an error can cost the customer an
additional fee. ex: book flight
» Booking online does not allow you to build a personal relationship with a -------------------
travel agent who might offer free upgrades or special offers which may not be 1- make sure you have an internet
available to online bookings. connection
2- log on to the company website
The travel industry Transportation: flight, bus and train 3- open booking form
4- user fill needed field in the form
As an example, we will consider booking a flight online. A form similar to the 5- system automatically search
one shown in Figure 6.17 would appear on the screen. The user only needs to fill available flights, and give list of
in the appropriate fields and the system will automatically search for available them
flights, make bookings and transfer the funds from their bank account. Unless 6- user choose one of available
something goes wrong, there will be no need to talk to a human operator at any flights and confirm booking
stage of the booking process. 7- user enter payment details and
confirm
8- system transfer booking money
H&S to flight bank account
flight booking
Input: User will select the
?
Schedule requirements of the
Need help
Departing 13 JUN 2021 at Any time
If you need help using this part of the site, please
booking. E.g. date of flights,
Returning 20 JUN 2021 at Any time
review our information about Flight booking. Airports, Location etc.
Are you flexible by +/– 1 day?
My flight will be Return One way Multistop >
Route Don’t forget insurance
Process: checking if
From Include low-cost airlines For peace of mind, we provide comprehensive online
travel insurance
bookings are possible
To Direct flights only
(availability)
Traveller(s)
Adult(s) Child(ren) Infants i Be informed
How can I get the cheapest deal?
1 0 0
• Saturday night stay
Output: booking
(2-11 years) (1 infant per • Buy a return ticket confirmations /rejections
adult) • Book early
• Try different airports Payment
132
6.5 Booking systems
Exercise 6g
Using the screenshot in Figure 6.17, describe the stages when a person logs on to
a flight booking website and makes a booking. Describe how the seats are booked,
how double-booking is prevented, how the customer’s tickets are produced and
how payment is made.
Also investigate the latest ways of creating e-tickets, such as using apps on
smartphones, and so on. Why are these new methods better than printing out a
confirmation email to act as the e-ticket?
11 12 13 14 15 16 17 6
5
8 9 10 18 1 7
4 9 2 8
3 7 11 12 13 14 15 16 17 0 2 9
6
2 5 8 9 10 18 1 2
2 10
1 9
E 1 3
4
6
7 11 12 13 14 15 16 17 20
2
23 E
10 18 1 2 24
2 5 8 9 19 2 2 25
1 4 7 10 11 12 13 14 15 16 0 23
D 3 6 9 17 1 2 1 2 D
2 5 7 8 8 19 2
24
25
4 6 23
C
1
2
3
3
4
5
UPPER CIRCLE 20
21
22
24
25
C
B 1 2 A B
1
A 12 13 14 15
8 9 10 11 16 1
7 7 1
6 11 12 13 14 15 16 8 19
5 9 10
4 7 8 17 1
8 1
20
21
6 10 11 12 13
3 5 7 8 9 14 15 9 2 22
2 4 5 6 0
21 23
1 3 4 17 18 19 20 21 22 16 22
E 2 16 23 24 17 E
3
3 14 15 2 5 1 8 23
1 2 1 16 17 18 19 20 21 22 26 19
D 1 1 12 15 23 2 2 7 D
C 1 0 1 1 2 13 14 4 25 28 C
B 1 B
01 26
A 1
DRESS CIRCLE A
29
9 30
8
8
9 27
28 31 The seating display at the
7
29
7 M W W 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W M
venue is shown on the screen
32
6
33
5
30
6
L 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 W W L
34
31
4
32
K 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 K
33
36
3
2
34
J 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 J
2
35
B B
1
A H 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 H A
G W 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 G on the screen display and then
F 1 2 3 4 5 6 7 16 17 18 19 20 21 W F clicks CONFIRM to go to the
E 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 E
D 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 D
next part of the process
C W W 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 C
B 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 W W B
A 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 A
» The customer then enters their personal details or indicates that they are a
returning customer (in which case the website being used will already have
their details).
» Payment method is then selected and payment made.
» The theatre seats are then booked in the customer’s name.
» The final details are again shown on the screen.
» An email is sent to the customer which may contain a QR code which contains
all their booking details (this acts as their e-ticket); the QR code is then
scanned at the venue.
» The database is finally updated with the booking transaction and the seats
are permanently confirmed as no longer available.
NORTH
SOUTH
The customer will need to select the event, the required day(s), number of
people and preferred seats. Because the seats are often sold in blocks, the Booking steps
database will be searched to see if there are any seats available on the chosen
date. Available seats will not show on the booking map, which is different to
the concert/cinema booking system. If there is availability, the customer will
be offered seats in the block. If the customer is happy with the option, they
simply confirm the booking and payment is made online. Confirmation will
be sent via email and/or possibly a QR code, which can be downloaded to the
customer’s smartphone; this QR code will act as their event ticket(s). Some
sporting events do not book seats (such as a golf tournament) in which case
the booking will simply be entry to the event.
The advantages and disadvantages of booking sports events online are the same
as for online booking of concert and cinema tickets.
One additional feature often offered with sporting events, is the ability to also
book flights and hotels if the event takes place overseas.
134
6.6 Banking systems
135
6 ICT applications
example:
One common use of EFT is the payment of salaries to the staff of a company.
On the day when payments are made, the company informs the bank to transfer
money from their account into the bank accounts of their employees.
1- company request amount of Company’s Employee’s 2- company account will decrease (debit)
account accounts according to salaries amount (ex: 10,000)
money to be paid to employees
+$5000
3- each employee account will be increased
COMPANY EFT instructions (credit) according to his/her salary
+$4000
(ex: emp1 = 5000, emp2 = 2000, emp3 = 3000)
–$50 000
+$3000
Advantages of EFT
» It is a very secure payment method.
» It is a very quick payment method.
» It is less expensive than, for example, using cheques.
» The customer has the right to dispute an EFT payment for up to 60 days.
Disadvantages of EFT
» Once an amount has been transferred the bank cannot reverse a transaction
(requires a full dispute investigation).
» The customer needs to have funds available immediately (unlike when using a
Hodder Bank
cheque).
» It cannot guarantee the recipient (someone with a fake ID could collect the
money).
VALID
FROM
VISA
Credit/debit card transactions Chip
Many credit/debit cards are equipped with a chip as well as a magnetic stripe – ▲ Figure 6.22 Example of
the chip contains key information such as the PIN. credit/debit smart card
This system is designed to enhance security because it is better than relying only
Debit = - / decrease
on a signature. Paying for items using a chip and PIN card is a form of electronic
Credit = + / increase
funds transfer (EFT). In this example, suppose a customer goes into a restaurant
to pay for a meal using a chip and PIN card:
» The PIN is entered using a keypad.
» The card is checked to see if it is valid (check on expiry date, whether stolen ex: pay for a meal in
card, etc.). a restaurant
» The PIN is read from the chip on the card and is compared to the one just
keyed in.
» If they are the same, then the transaction can proceed.
137
6 ICT applications
Cheques
Cheques are one of the oldest ways of paying somebody for services or goods.
Because it is a relatively expensive, slow and less secure way of making
payments, cheques are slowly being phased out.
The advantages and disadvantages of using cheques are shown in Table 6.4.
▼ Table 6.4 Advantages and disadvantages of using cheques
Important
Advantages Disadvantages
» more convenient and safer than cash » cheques are not legal tender and can be
» it is possible to stop payments if refused
necessary » it is a slow method of payment
» a cheque can be drawn any time (up to six » easier for fraudsters than credit card or
months after it was dated and signed) debit card payment methods
» cheques can be post-dated » relatively expensive payment method
» cheques can be traced if they are 'lost'
138
6.6 Banking systems
In this method, cheques are cleared using an image-based system that speeds up
the cheque clearing process considerably.
When a cheque is paid in to a bank, an electronic image is made of the cheque using
OCR software. All of the bank details plus the sum of money to be paid are read.
Hodder bank
So, suppose someone uses a bank called Hodder Bank and they pay a cheque for
$50 to a company called H&S Ltd, who bank with the Smith Bank. How is the H&S
bank account credited with $50? Smith bank
» The first step is called out clearing. At this stage, when Smith Bank are
presented with the cheque, a camera takes an image of the cheque and OCR
software turns this image into an electronic data format.
» Smith Bank uses this electronic data to create a digital record of the money to
be paid, the sort code on the cheque and the account number on the cheque.
» The cheque image and digital record are added to a file of other cheque
images paid in that day. There are a number of files made. Each file contains
all the cheque images and digital records for a particular bank. Therefore,
there will be a file for Hodder Bank created by Smith Bank containing cheque
data referring to Hodder Bank only; other banks will have their own files
created containing cheque data referring to their bank only.
» Smith Bank now sends all the files to a central facility. One of the files
contains all cheques relating to Hodder Bank. The central facility processes
this file in the following way:
– It breaks the file down into individual payment messages.
– It does a payment validation.
– It creates and sends a ‘request to pay’ message to Hodder Bank. This
includes a copy of the cheque images as well as the encoded information
(sort code, account number and payment amount).
» Hodder Bank receives a stream of ‘request to pay’ images and carries out
the transactions. A ‘no pay’ decision will be made if the person paying has
insufficient funds, if their account is blocked, if the cheque has not been
signed or if there is suspected fraud.
» Once a ‘pay’ or ‘no pay’ message has been received, the central facility routes
the ‘pay/no pay’ response to Smith Bank.
» All of this happens usually in less than 24 hours; still slow compared to card
payments, but much faster than the older paper-based method.
139
6 ICT applications
Internet banking
Because of the many similarities, internet banking is fully covered in Section 6.9
along with online shopping.
Use of 3D printers
3D printers were first introduced in Chapter 3. Their use in a number of fields is rapidly
progressing. One of the most innovative uses is in the field of medicine. The following
is just a small insight into the many developments taking place across the world.
Surgical and diagnostic aids
It is possible to print out anatomical parts using 3D printers. These are used as
an aid towards diagnosis and surgical procedures. The patient is scanned using:
» CT (computed tomography) – which involves producing images of the internal
parts of the body in a series of thin slices less than 0.1 mm thick, or patient scanned using
» MRI (magnetic resonance imaging) – this uses strong magnetic fields and
radio waves to produce a series of images of the internal organs in the body.
140
6.7 Computers in medicine
Advice
‘Biomimetic’ refers to the imitation of elements that occur in nature (such as
human cells) to create solutions to human anatomy problems.
‘Bio-inks’ are biological inks developed to work with 3D inkjet printers. By using
3D layering, they produce artificial live tissue. These biological inks are made up of ▲ Figure 6.25 Artificial
human cells and other materials (usually biopolymer gels). blood vessels produced
using 3D printing
Figure 6.25 shows a photograph of artificial blood vessels created from a 3D technique
printer.
141
6 ICT applications
Customised medicines
3D printing techniques now allow scientists to customise medicines to suit the
individual. This is known as patient-centric medicine. 3D printed medicines
are sometimes referred to as printlets (printed tablets). As newly developed
medicines are now very potent, and can have different effects on different people,
there is now a need to review the manufacturing methods used to produce them.
3D printing offers the possibility of creating personalised medicine which allows
automatically controlled release of the medicine into the patient. It even allows
multiple medicines, within a single printlet, to make fixed-dose combinations and
allows for the optimum release of each medicine into the body.
technology: vapour printing
3D printing achieves all this by adopting a new 3D inkjet technology, known as layering of multiple medicine
vapour printing. This is a new technique where layering of multiple medicines can can be done by spraying
be done by spraying them as a fine gas. The vapour printing process works by them as fine gas
evaporating a powdered medicine and then combining it with nitrogen gas. The
resultant gas is then sprayed onto a cooled surface where it crystallises to form a
thin film. The building up of several of these thin films (using 3D printing) forms
the desired tablet with a carefully controlled geometry. Traditional medicines, in
tablet form, are formed by compression of the powder; each compressed tablet has
the same shape. By exploring the connection between geometry of the tablet and
the release of the medicine, it is possible to create the most effective medicine
release profile for each patient. Some of the advantages of this technology include:
» tailor-made medicines to suit the individual
» better control of medicine release into the body
» saves money (many modern medicines are very expensive)
» better targeting of the medicine so its effects can be optimised
» less chance of an overdose of the medicine, thus reducing harmful side-effects
(for example, chemotherapy medicines can have very unwelcome side-effects;
by reducing the release of the medicine to suit the individual, it will not only
work better but also cause fewer harmful side-effects).
Link
▲ Figure 6.26 Examples of 3D generated medicines in tablet form
Refer to Figure 2.36
in Chapter 2 to see
In the future it should be possible to send medicines to local pharmacies in the
how 3D printing uses
form of a blueprint; each blueprint would be custom-made for a patient. By CAD or blueprint
supplying the necessary materials, it would then be possible to print out the designs.
customised medicines for each patient using the blueprint.
142
6.8 Expert systems
Explanation system
» This informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
» For example, suppose the user was investigating a series of symptoms in a
patient and the expert system gave the diagnosis of mercury poisoning; the
explanation system would explain its reasoning with a statement such as
‘impaired vision, lack of coordination, weak muscles, slurred speech and the
patient used to work in a paint factory’. The user could then probe deeper
if necessary.
» The expert system will supply a conclusion and any suggested actions to
take; the important thing is it will also give the percentage probability of
the accuracy of its conclusions (for example, the following statement could
be made: ‘Based on the information given to me, the probability of finding
oil bearing rocks in location 123AD21G is about 21%’).
Inference engine
» This is the main processing element of the expert system.
» The inference engine acts like a search engine examining the knowledge base
for information/data that matches the queries.
» It is responsible for gathering information from the user by asking a series of
questions and applying responses where necessary; each question being asked
is based on the previous responses.
» The inference engine is the problem-solving part of the expert system, which
makes use of inference rules in the rules base.
» Because the knowledge base is a collection of objects and attributes,
the inference engine attempts to use information gathered from the
user to find an object that matches (making use of the rules base to
find a match).
Knowledge base
» The knowledge base is a repository of facts.
» It stores all the knowledge about an area of expertise obtained from a number
of expert resources.
» It is basically a collection of objects and their attributes (see the example in
Table 6.5).
144
6.8 Expert systems
146
6.8 Expert systems
dis advantage
is fairly simple, but some national and international routes can be very complex.
The inputs needed for the delivery system are: Exercise 6h
» the number of drop-off points and their location 1 Write down three
» the distance between the drop-off points advantages of
» the type of vehicle used using an expert
» delivery times expected at each drop-off point system in route
scheduling.
» layout of the road network.
2 Write down three
disadvantages of
using an expert
system in route
Exercise 6i scheduling.
56
24
B G
16
)
six
6(
11
18
E
5
10 5
19 H 21
A C J
8
8
5
10
F
16
16 10
D 26
I
The map above shows the distances between ten towns, in kilometres.
A delivery company has to deliver a parcel from town ‘A’ to town ‘J’.
Work out the shortest possible route the delivery van can take.
Exercise 6j
1 Write a sequence of instructions to show how the following expert systems
would be set up:
a identification of a chemical found at, for example, a crime scene
b a strategy game, such as chess
c engine diagnostics for a racing car.
2 Write a sequence of instructions to show how the following expert systems
would be used to:
a diagnose circuit board faults in television sets
b identify an ‘unknown’ chemical compound
c identify a new species of flower
d produce the best route for a delivery vehicle.
147
6 ICT applications
Exercise 6k
Which expert system terms are being described below?
1 A repository of facts made up of a collection of objects and their attributes.
2 It informs the user of the reasoning behind the expert system’s conclusions
and recommended actions.
3 It is made up of a user interface, explanation system and inference engine.
4 It contains a set of inference rules.
» Once the barcode has been found, the appropriate record is accessed.
» The price of the item is then found and sent back to the POS together with a
product description.
» The stock level for the item is found in the record and is reduced by one and
the new stock level is written back to the file. - stock <= minimum
- order item
– If the number in stock of the item is less than or equal to the
re-order/minimum number in stock, then the computer automatically orders
a batch of items from the suppliers (supplier information would be found
on another file called the order file or supplier file – the barcode would be
the link between the two files). relationship
– Once goods have been ordered, the item is flagged on the file to indicate when goods are ordered they
an order has been placed; this now prevents re-order action being triggered are flagged to prevent re-order
every time this item is scanned until the new stock arrives.
when goods arrive barcode on
– When new goods arrive, the barcodes on the cartons will be used to update cartoon will be used to
the stock files; also any flags associated with these goods will be removed 1- update stock file
so that the stock checks can start to be made again. 2- remove any flag
» The above procedure is repeated until all the items in the customer’s basket/
trolley have been scanned.
» When all the items have been scanned, the customer is given an itemised bill
showing a list (with prices) of everything they have bought.
» The computer also updates the files containing the daily takings. daily log file
» If the customer has a loyalty card, the system will also automatically update
their points total.
Most supermarkets now allow customers to scan their own items at special
checkouts; these basically work the same way as the normal POS terminals.
Electronic funds transfer at point-of-sale (EFTPOS)
When payment is made by card or electronic device (such as a mobile phone) at the
POS terminal, it is known as electronic funds transfer at the point-of-sale (EFTPOS).
The process of checking credit and debit cards at a supermarket EFTPOS is
much the same as was described for paying a restaurant bill in Section 6.6. The
communication between the supermarket EFTPOS terminals and the bank take
place through a secure connection over the internet.
We will consider payment by the following methods:
» chip and PIN
» contactless cards
» near field communication (NFC) devices.
Chip and PIN
The use of chip and PIN was discussed in Section 6.6. In the case of payment at
a supermarket, this is usually done by inserting the card into a reader and then
the procedure is identical to that described in Section 6.6. The reader makes a
connection with the chip embedded in the card. By entering the PIN, a customer Link
is carrying out a security check. The PIN and encrypted data from the chip is now
sent to the customer’s bank. If all security checks are OK (for example, a check For more on chip and
whether the card has been stolen and a check whether the expiry date has been PIN and contactless
exceeded) and the customer has sufficient funds, then an authorisation code is cards see Sections 6.6
and 2.2.
sent back to the terminal and the funds are transferred to the supermarket’s bank.
149
6 ICT applications
Contactless cards
The use of contactless card payments was discussed in Section 2.2, together with
their advantages and disadvantages.
Near field communication (NFC) devices
Near field communication (NFC) technology is discussed in more detail in
Section 6.10. When using NFC payment at a POS terminal the sequence of events
taking place is:
» The electronic device (for example, mobile phone) is held close to the NFC
reader (the terminal); this only works up to a distance of 5 cm, so the devices
need to be very close together.
» When the NFC (contactless) payment is initiated, the NFC terminal and
electronic device (smartphone) pass encrypted data back and forth to each
other to enable the payment to be made.
» This is very secure because NFC communications are encrypted and are
dynamic (which means encrypted data being shared changes every time a
transaction takes place).
» Mobile phone manufacturers use tokenisation to improve security.
1- user take photo of credit card
Use of tokenisation with mobile phones using smartphone camera
Tokenisation is used when setting up a mobile wallet. The user takes a
photograph of their credit card using the smartphone’s camera. The details 2- details (card no, name of bank)
on the card (such as card number and name of bank) are securely sent by the are securely sent from smartphone
manufacturer/ mobile wallet to the
smartphone manufacturer/mobile wallet company to the bank that issued
bank that issued the card
the card. The bank replaces the details on the card with a series of randomly
generated numbers (called tokens), which they send back to the mobile 3- Bank replace details on the card
phone manufacturer, who then programs this random number into the user’s with a random number (token)
smartphone. This random number is then the one used for transactions.
This means that retailers or other third parties involved in mobile wallet 4- token sent back to mobile
transactions never have access to real credit card details – if their systems are manufacturer who program
hacked then the stored credit card details are not the real ones and therefore random number (token) into user
useless to the hackers. smartphone
Many smartphones are also protected by touch ID or face ID technology, which 5- random number (token) in used
means that even if the smartphone is stolen, the thief still cannot use the for transaction (not actual data/
smartphone to make payments. actual card number)
150
Tokenization: a process by which a piece of sensitive data, such as a credit card number, is replaced by a
surrogate/random value known as a token. Protect card data and increase security when paying
6.9 Computers in the retail industry
» There are possible health risks associated with online shopping or banking
because of lack of exercise; if people physically go shopping then they are
getting some exercise.
» Security issues are a major concern (for example, hacking, stealing credit
card details, etc.) as are viruses and other malware (for example, phishing,
pharming, and so on).
» Accidentally using fraudulent bank or shopping websites is always a risk and
this is linked to security issues.
» It is necessary to have a computer and to pay for the internet to take part in
online shopping and banking.
» Unlike high-street shopping, it is only possible to see a picture of the goods,
(which might not portray the exact colour of an item of clothing, for example)
and nor can you try something on to see if it fits before buying them; you
also have to wait several days for the goods to arrive and returning goods may
be expensive and time consuming.
» Next-day delivery of individual items leads to more delivery traffic and pollution.
» High-street shops and banks are closing because of the increase in online
shopping and banking and this is leading to deserted high streets.
» Local independent retailers may lose out to huge multinational retail companies.
» It is easier to make errors with online banking and transfer money incorrectly
to different accounts.
Exercise 6l
1 Revisit the earlier sections of this chapter and other parts of the book.
Gather together your information and then write an article on the advantages
and disadvantages of shopping on the internet compared to shopping on
the high street.
Consider aspects such as convenience, costs and security.
2 Find out as many areas as you can in the retail industry that use barcodes
(including QR codes) and explain why barcodes are used. What other methods exist
which could replace barcodes? Why have these other methods not been adopted?
152
6.10 Recognition systems
FIRE Academy
Term 1 Week 4 (2022)
Tutor Group: 7AS
RC
FD
AE
BE
HK
TL
SM
AN
LN
AP
AR
SW
The database can be searched or sorted to find data about the attendance of any
student. - Pencil or pen marks are
scanned in by the OMR (Optical
Use of OMR to read multiple-choice question (MCQ) papers
Mark Reader).
Completed multiple-choice forms can be scanned in using OMR. The forms have
timing marks down one side – these timing marks pass under the first column - scanner is used to scan papers
sensor of the scanner. These marks indicate the position of each question on the
paper. Using OMR software, a template is created to map out the X-Y coordinates - sensor is used to read the
marked answer (light sensor)
153
- Form has timing marks ==> marks pass under scanner sensor ==> marks indicate position of each question paper
- using OMR software, template is created to map X-Y coordinates of each lozenge (filled or unfilled area)
- value is assigned to each lozenge
6 ICT applications
of each lozenge (area which is filled in by pencil/ink or left blank) – a value information on OMR sheet
is then assigned to each lozenge. As each question is scanned, a light passes (pre-printed form)
through the scanner which picks up the position of any lozenge which has been 1- lozenges
2- details of the test
filled in by pencil/ink. The position of the filled in lozenges is compared to 3- Student/ person name
the corresponding coordinates on the ‘answer sheet template’. If the position 4- Student/ person ID
matches to the X-Y coordinates, then the answer is recorded as being correct. The5- Questions numbers
scanned results are exported to a database or spreadsheet. 6- Center number
If more than one lozenge is filled in for each question, then the OMR software 7- Center name
8- Date of birth
simply discards that result. Marking MCQ sheets using OMR is much quicker
and more accurate than doing the task manually. Because the results are
Student information
automatically exported to a database or spreadsheet, it is much easier to analyse
the results.
Advantages of OMR devices
» It is a very fast way of inputting the results of a survey, etc. – the documents
are fed in automatically and there is no user input.
» Because there is no typing, they are more accurate than keying in the data.
» They are more accurate than OCR methods. - much easier to analyze results because data
is automatically exported to database or spreadsheet
Disadvantages of OMR devices
» The forms need to be carefully designed to make sure the marks/shading are
correctly positioned to gather accurate information. Link
» There can be problems if they have not been filled in correctly, and sometimes
have to be manually checked before being read – this is both time consuming A comparison
and expensive. between OCR and
OMR devices was
» They often only work with black pen or pencil.
covered in
» They are limited to the questions on the paper; it is not possible to get Section 2.2.4.
expansion to answers in a questionnaire, for example.
- not suitable for text input
Barcode readers - Have to use prepared forms which may be expensive
Please refer to Chapter 2 (Section 2.2.5) for information about barcode readers,
including their advantages and disadvantages.
QR code readers
Please refer to Chapter 2 (Section 2.2.6) for information about QR code readers,
including their advantages and disadvantages.
Optical character recognition (OCR) Scanned text is converted into a format which can be edited
The uses, advantages and disadvantages of optical character recognition
(OCR) were discussed in Chapter 2 (Section 2.2.4). One important use of OCR
was in the clearing of bank cheques, as discussed in Section 6.6. However,
there is one additional, important application of OCR that should be
mentioned here.
Automated number plate recognition (ANPR) systems 1 ABC 234
Automatic number plate recognition (ANPR) systems are used to read the
number plates on cars in a number of applications.
▲ Figure 6.32 Sample
In the example that follows, we will describe how ANPR is used in a car vehicle with number
park to enable entry and exit to be automatically controlled by a computer plate
system.
Sensors are used to detect a car (if its gone over the line) and a signal will be send to a camera to take a
photo, the photo is sent to the microprocessor to extract the image of the number plate using OCR
154
6.10 Recognition systems
example: using ANPR in car park
Step 1
A sensor detects a vehicle and sends a signal to instruct a camera to capture
an image of the front of the vehicle (often an infrared camera is used to give a CCTV camera
clearer image and for use at night).
Camera
Step 2 locate plate =>change contrast => segmented => OCR => stored (DB)
i An algorithm is used to locate and isolate the number plate from the image
taken by the camera. This algorithm also takes into account the size of the
number plate and any damage or orientation. 1ABC234
ii The brightness and contrast of the number plate is first adjusted
(this ensures that the characters can be clearly read). 1ABC234
Each character on the number plate is then segmented.
iii Each character is then recognised using OCR software. The characters are 1ABC234
converted into a string of editable text by the software.
iv This text string is then stored on a database.
Step 3
Once all of this has happened, the car park barrier is raised and the motorist is
issued with a ticket. The ticket shows the date and time of entering the car park.
Step 4
When the motorist returns to the car park, they insert their ticket into a machine
which calculates the car park charges. The payment is registered on the database.
The motorist then drives to the exit barrier and the ANPR system again reads the
number plate and checks its database. If the number plate is recognised (and
payment made), the exit barrier is raised.
Advantages of ANPR
» It can be used to automatically monitor average speed of vehicles over a
stretch of road; this can be used in smart traffic management systems (see monitoring
also Section 6.2).
» There is no need to employ car park security guards, which saves money.
» It is a much faster system than having to check a ticket at the exit; car parks
can issue tickets on entry, but this ticket is simply used for payment purposes
by the motorist before leaving the car park and is not used at the exit since
payment will now be linked to the number plate on the car.
» It can be used to automatically control the entry and exit to a car park or
private roads.
155
6 ICT applications
Disadvantages of ANPR
» There is a lack of manned security car park surveillance which could lead to could not prevent vandalism
vandalism (and other crimes) because nobody is checking on a regular basis; or crime (less security)
CCTV is often used, but this is often just used ‘after the event’.
» There could be invasion of privacy issues due to the recording of drivers’ - expensive: need to buy
number plates. cameras, sensors and programs
» Damaged or very dirty number plates will not be recognised by the system.
» Number plate cloning; the ANPR system only recognises the number plate and
not the car, so it is possible for a car to be fitted with a cloned number plate
thus by-passing car park security, for example.
care may have a fake number plate
Exercise 6m
Describe how automated number plate recognition (ANPR) systems can be used
in smart traffic management systems. Your description should include how ANPR
is used and how the data gathered by ANPR would be used in traffic management
control and monitoring.
First of all, we will consider the advantages and disadvantages of using RFID.
Advantages of RFID
» No line-of-sight contact is necessary; the tags can be read from a distance.
» It is a very robust and reliable technology.
» Tags are much more difficult to forge than barcodes; barcodes can be altered
or even damaged, but RFID tags are more robust and difficult to alter.
» RFID tags can reduce the number of staff needed in, for example, a warehouse
because tracking of items is automatic (thus reducing costs).
» It provides a very fast read rate (typically < 100 milliseconds to respond).
» It allows bi-directional data transfer (that is, it allows read and write
operations to take place).
» Bulk detection is possible (that is, detect several RFID tags at the same time).
156
6.10 Recognition systems
Disadvantages of RFID
» Tag collision – this is when the signals from two or more tags overlap,
interfering with each other.
» Because RFID uses radio waves, they are relatively easy to jam or interrupt.
» It is relatively easy to hack into the data/signal transmitted by the tag.
» Although there is a potential saving in staff wages, the initial cost of an RFID
system is more expensive than a comparable barcode system.
Tracking of stock
As mentioned in Chapter 2, RFID readers use radio waves to read and capture
information stored on a tag. Depending on the power of the radio waves used,
the tag can be read from several metres (for example, in livestock tracking) to
only a few millimetres (for example, in contactless card payments). The RFID tag
is made up of two components:
» a microchip that stores and processes information
» an antenna which is used to receive and transmit data/information.
The tags can be passive or active. Passive tags use the reader’s radio wave
energy to relay back the information, whereas active tags use a small embedded
battery to power the RFID. Passive tags are the most widely used because they
are smaller and cheaper to implement than active tags. Because active tags have
their own power supply, they can be read from up to 50 metres away.
RFID tag
reader
antenna
chip
computer
Tracking of stock using RFID involves either tracking of livestock (on a farm) or
goods in a shop, supermarket or distribution centre.
» Livestock tracking is used to:
– keep track of the whereabouts of every animal on a farm using active tags
– allow farmers to identify who owns an animal; particularly important where
animals graze freely on farms where it is possible for animals to stray into
neighbouring fields
– keep data about the animals on the tag (for example, medical history, date
of birth, identification (passport) number, and so on).
» Retail make use of RFID tags in the following ways:
– similar to barcodes, but can contain much more information and do not
require any manual scanning; details, such as price, description, and so on,
can all be stored on the tag and then automatically read at a checkout –
a big advantage is that several tags can be read at the same time, thus
speeding up the checkout process
157
6 ICT applications
158
6.10 Recognition systems
How smartphones use NFC to make payments was discussed in Section 6.9; the
following notes give some further information about how NFC works. There are
three distinct modes of operation with NFC:
» Peer-to-peer mode (used by smartphones):
– This allows two NFC-enabled devices to exchange information with
each other (for example, two smartphones sharing links, contacts and
photographs with each other by tapping them together).
– Both devices switch between being active (when sending data) and being
passive (when receiving data).
» Read/write mode:
– This is a one-way transmission of data.
– The passive device (for example, a tablet) links up with another device and
reads data from it.
– This is used, for example, when an active tag is sending out advertising
data to other devices.
» Card emulation mode:
– In this mode, an NFC device can function as a smart or contactless card.
– This allows the card to make payments (already discussed in Chapter 2).
– It is often used as way of entering public transport systems, where the card
is placed on an NFC reader to allow access to, for example, a metro system.
NFC has a range up to 5 cm and has a transmission rate of about 420 kilobits Both use wireless connection
per second, which is much smaller than Wi-Fi or Bluetooth. However, NFC has
very fast connectivity since, unlike Bluetooth, there is no need to pair the two
devices connecting. Radio-frequency Identification (RFID) systems communicate
Biometric recognition systems between an antenna or a reader and a tag attached to an object,
while Bluetooth technology is used to communicate between two
Biometric recognitions systems include: Bluetooth-compatible devices.
» face recognition
» iris and retina recognition
» finger and thumb recognition
» hand recognition
» voice recognition.
Face recognition, and finger and thumb recognition systems are covered in depth
in Chapter 8. Hand recognition (gesture control) and voice recognition systems
are covered Chapter 1.
The advantages and disadvantages of different biometric recognition systems are
covered in Table 8.3. For completeness, we will consider two additional examples
here: retina recognition and iris recognition.
Retina recognition
» The retina is the light-sensitive area at the back of the eye that has a unique
pattern of blood vessels.
» The retina cannot be seen without specialised equipment – this means it is a
secure technology, but more expensive to implement. - ADV: cannot be copied
» The special equipment is used to take an infrared photograph of the retina.
» It is quite invasive – the subject has to sit very still and stare directly into
the light source.
- disadvantages: very intrusive
» It is slower to scan and verify.
» It is only used in very specialised high-security settings.
159
6 ICT applications
Iris recognition
» The iris is the coloured part of the eye, surrounding the pupil.
» A digital camera is utilised which uses both visible and near infrared light to
take a sharp photograph of a person’s iris.
» The method produces a unique pattern of a person’s iris by locating and taking
an image of:
dis advantages:
– the centre of the pupil - expensive
– the edge of the pupil - very intrusive
– the edge of the iris - uses a lot of memory for the data Link
– the eyelids and eye lashes. to be stored
Advantages See Section 8.3 for
The system works with contact lenses and glasses, and for blind people. It is more on biometric
used as a method for uniquely identifying a person and, because of the speed of recognition systems,
verification (less than 5 seconds), is used a security system in the following areas: and Section 1.3 for
voice and gesture
» immigration control (in some countries)
recognition.
» some banks have introduced this in some branches as a security feature.
Global positioning systems (GPS) are used to determine the exact location of
a number of modes of transport (for example, aeroplanes, cars, ships, etc.). Cars
usually refer to GPS as satellite navigation systems (i.e. ‘satnav’).
Advice
While the term GPS is often used generically, it actually refers to a specific global
navigation satellite system (GNSS) owned and run by the USA. There are other
GNSS that perform the same function, including the Russian GLONASS and the
EU’s Galileo.
160
6.11 Satellite systems
Satellite 1
- Satellites transmit signal to earth
- Computers receive signal
Exact location
of transport
- Data from satellite include position and time
- Computers calculate exact position according to signals
Satellite 2
from three satellites
Satellite 3
▲ Figure 6.37 Three satellite system
A1234
A1236
A1235
Exact location of the car
161
6 ICT applications
The following example shows how these layering techniques are used to produce
a visually effective answer to a query made in the GIS system:
State boundaries
+ National parks
and forests
+ Emission
monitoring
locations
Carrying out queries on GIS systems (in a method similar to internet searches)
will find data that matches the query. The data will be displayed in the form of
a diagram, map or set of tables. By zooming into the map, it is possible to find
finer details about the layering data used.
Examples of the use of GIS
» Emergency services use GIS to send the closest emergency personnel to a
location.
» Biologists and environmentalists use GIS to protect animal life and plants in
certain vulnerable areas (which meet a certain criteria after carrying out a
search on the database).
» Teachers can use GIS in their geography, science or engineering lessons.
162
6.11 Satellite systems
Advantages of GIS
» It allows geographical and thematic data of any kind to be combined in a way
which shows how they are connected to each other.
» It allows the handling and exploration of huge amounts of data (massive
number crunching).
» It allows data to be integrated from a wide range of very different sources
(which appear at first to be totally unconnected).
Disadvantages of GIS
» The learning curve on GIS software can be very long.
» GIS software is very expensive.
» GIS requires enormous amounts of data to be input (thus increasing the
chances of errors).
» It is difficult to make GIS programs which are both fast and user-friendly; GIS
requires very complex command language interfaces to work properly.
Satellites systems are used to transmit television, telephone and internet data
around the world. used to transmit data from one part of the planet to another
Advantages of media communication systems
» They have good global coverage (covers the majority of the Earth’s surface).
» They are cheaper, faster and safer than laying cables in difficult or
treacherous terrain.
» They have a very high bandwidth.
» It is relatively easy to expand the network (there are numerous companies
now manufacturing satellites for various uses).
» Security in satellite transmission is very good due to the fact that data is
coded and the receiver requires decoding equipment to read the data.
» During emergency situations it is relatively easy to move stations on the
ground from one place to another; satellites can also change their orbits if
necessary, using built-in boosters.
» They are well-suited for broadcasting, that is, one satellite signal being picked
up by many different receivers on the ground.
» Satellite receivers on the ground can be portable, enabling mobile
communication in very remote locations.
164
Exam-style questions
Exam-style questions
1 The managers of a company are concerned about illegal parking in their car
park. Drivers are parking their cars in the private car park and then walking
to the local football match. There have been a few instances of damage
to employees’ cars. A decision has been made to install a number plate
recognition system and barrier so they can control cars entering and leaving
the car park. Anyone visiting the company will need to register their car’s
number plate with the receptionist prior to their visit.
a Explain how this system could check that a car approaching the barrier
had been registered with the receptionist beforehand. [4]
b After a visitor parks their car, they have to report to the receptionist.
They are then given a badge which contains an RFID tag. The chip in
this tag is read to allow the visitor access to certain floors in the building.
Prior to this electronic system, badges contained a barcode. Discuss the
advantages and disadvantages of using RFID chips rather than barcodes
on visitor’s badges. [6]
c The company would like to offer visitors access to their facilities,
such as the restaurant, coffee shop and gift shop. Before arriving
at the company, visitors are sent a QR code which they can download
to their smartphone.
Describe how the visitor could use a QR code to find out more about
the company. [3]
d Payment at the restaurant is made using an NFC-enabled smartphone.
Explain:
i what is meant by NFC [2]
ii how the smartphone can be used to make payments. [3]
2 You have been asked by your teacher to use a word processor to create a
brochure for a new intake of pupils. The brochure will consist of:
» Images of the school taken from a digital camera.
» Printed archive photographs.
» Information about the school already stored in text files.
» Information to be typed directly into the brochure.
a Describe the steps which you will need to take to create the brochure. [6]
b When the brochure is being created, the word processing software
automatically checks the spelling of the text as it is typed in and may
suggest alternative words.
Explain why the suggestions may not always be appropriate. [3]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q7 a & b,
October/November 2019
165
6 ICT applications
3 Robots are being used in the oil industry to find new deposits under the
Earth’s surface.
a Give three advantages of using robots rather than humans when
searching for new oil deposits. [3]
b Give two disadvantages of using robots rather than humans. [2]
4 An automatic washing machine contains a device to read RFID chips sewn
into clothing. When an item of clothing is placed in the washing
machine it is scanned.
a Describe how the data is read from the RFID chip. [2]
b Explain the benefits of using RFID technology in a washing machine. [2]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q9,
May/June 2017
5 The city of Venice is in danger of being damaged due to rising sea levels.
A new computer controlled flood defence system is being planned. The
developers of the system are using a spreadsheet to model the plan.
a Give three reasons why computer models are used to simulate the flood
defence system. [3]
b The city uses a manual system for detecting flood waters.
This relies on people watching for the rising levels of water.
Explain why creating a computerised system is better than using the
manual system. [4]
c The developers have used the results from the model to choose a
computer controlled flood defence system. It will have a barrier which
can open or close.
Describe the role of the microprocessor in such a system. [5]
Cambridge IGCSE Information and Communication Technology (0417) Paper 11 Q10,
May/June 2017
166
Exam-style questions
9 Seven statements are shown on the left and seven computer terms are
shown on the right.
By drawing arrows, connect each description to the correct computer
term.[6]
Users watch movies or sound files on a Biomimetics
device connected to the internet; there is
no need to download the files first
167
6 ICT applications
168