ch4 To 7 Notes
ch4 To 7 Notes
A network is a series of computer systems that are linked together so that they are able to share
computing power or storage facilities. The link may be between computers in the same building or
between computers in different parts of the country or even in different parts of the world.
4.1 Networks:
4.1.1 Network devices:
Modems
A modem (modulator demodulator) is a device that converts a computer’s digital signal into an
analogue signal for transmission over an existing telephone line and back again.
Dial-up modems operate at transmission speeds of about 60 kilobits per second, which is extremely
slow.
Modem broadband or ADSL (asymmetric digital subscriber line) modems operate at up to 100
Mbits/second when using fibre-optic cables and 20 Mbits/second when using copper cables. ADSL
modems allow telephone conversations and internet traffic to occur at the same time because of the
of the wide bandwidth signal used.
Cable modems allow cable television providers to offer internet access as well as receiving
television signals.
Hubs:
A hub is a device that can have a number of other devices or computers connected to it to
form a LAN. It does not read any of the data in the packets which arrive from a computer, but just
sends them on to all the computers on the network, including the one that sent it. Using a hub is not
a very secure or efficient method of data distribution.
Switches:
Switches connect a number of devices together to form a LAN. Switches are
able to look at a data packet, target the computer for which it is intended, and send it. This helps to
42
ICT I.G.C.S.E.
speed up data transmission in a network. Each device has a media access control (MAC) address
which identifies it uniquely. Data packets sent to switches will have a MAC address identifying the
source of the data and additional address identifying each device that should receive the data.
Bridges:
Bridges are devices that connect one LAN to another LAN that uses the same protocol. A large
network can get very busy. A bridge allows a large network to be segmented and stops unnecessary
traffic being passed around the network.
Routers:
Routers enable data packets to be routed between the different networks to join a LAN to a WAN.
Broadband routers sit behind a firewall.
The router’s main function is to transmit internet and transmission protocols between two networks
and allow private networks to be connected together.
Packets of data contain the following information:
• header to identify the data packet
• the sender’s IP address
• the receiver’s IP address
• how many data packets make up the whole ‘message’ the identity number of each packet
When a router receives a packet of data, it checks the destination IP address against the stored
routing table. The routing table stores the MAC address of the device, the assigned IP address and
the lease time the IP address is assigned for. The bits forming the destination IP address in the data
packet are used to point to the correct route. The packet is sent to a number of routers until it
reaches its final destination.
Network cables
Network cables have the following advantages over Wi-Fi:
43
ICT I.G.C.S.E.
• faster data transfer rates
• can be more secure than wireless networks.
4.1.2 Internet Protocol (IP) and Media Access Control (MAC) addresses:
Each device on the internet is assigned for each internet session by the ISP a unique address known
as IP address.
The IP address gives the location of a device on the internet whereas the MAC address identifies the
device connected to the internet.
Bluetooth:
Bluetooth sends and receives radio waves in band of 79 different frequencies (known as channels).
Devices using Bluetooth automatically detect and connect to each other. Each communicating pair
uses different channel.
Bluetooth creates a secure Wireless Personal Area Network (WPAN) based on key encryption.
Uses of Bluetooth:
• when transferring data between two or more devices that are very close together (<30 meters
distance)
• When the speed of data transmission is not critical
• For low-bandwidth applications (for example, when sending music files from a mobile phone to
a headset).
44
ICT I.G.C.S.E.
Each webpage has a unique address that helps web browsers to find them. The address is known as
the Uniform Resource Locator (URL).
There are three common ways of accessing the internet offered by service providers:
45
ICT I.G.C.S.E.
• dial-up access
• cable internet access
• digital subscriber line (DSL) (broadband) internet access.
Intranet:
Many companies use an Intranet as well as the Internet. An Intranet is ‘a computer network based
on internet technology that is designed to meet the internal needs for sharing information within a
single organisation.
There are a number of reasons for adopting Intranets rather than using the Internet:
• It is safer since there is less chance of external hacking or viruses.
• It is possible to prevent employees from accessing unwanted websites
• Companies can ensure that the information available is specific to their needs.
• It is possible to create extranets that allow intranets to be extended outside the organisation but
with the same advantages as an intranet.
46
ICT I.G.C.S.E.
Disadvantages:
1. Easier spread of viruses.
2. Printer queues can be frustrating.
3. Slower access to the internet.
4. Increased security risks when compared to stand-alone computers.
5. If the main server breaks down, the network will no longer function.
Disadvantages:
1. Security can be a big issue since the signal can be picked up.
2. There may be problems of interference, which can affect the signal.
3. The data transfer rate is slower than in wired LAN.
47
ICT I.G.C.S.E.
48
ICT I.G.C.S.E.
49
ICT I.G.C.S.E.
Security issues:
Ways of protecting passwords:
• Run anti-spyware software
• Change passwords regularly
• Passwords should not be easy to guess. Strong passwords should contain: o at least one capital
letter o at least one numerical value o at least one other keyboard character (such as @, &)
4.2.2 Authentication:
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security.
Some forms of authentication include:
user IDs and passwords
• digital certificates
A digital certificate is a pair of files stored on a user’s computer – these are used in the security
of data sent over the internet. Each pair of files is divided into a public key and a private key.
• biometrics
Biometrics relies on certain unique characteristics of human beings; examples include:
fingerprint scans, signature recognition, retina scans, iris recognition, face recognition, voice
recognition.
4.2.3 Viruses:
A virus is a self-replicate program that corrupts a computer system. A virus attaches itself to files,
leading to:
• computer crashes
• loss of files - system files when lost computer malfunctions.
• corruption of the data stored on files.
Antivirus software:
• they check software or files before they are run or loaded on a computer.
• antivirus software compares a possible virus against a database of known viruses.
50
ICT I.G.C.S.E.
• they check software for types of behaviour that could indicate a possible virus (heuristic
checking)
• any possible files or programs that are infected are put into quarantine.
• antivirus software needs to be kept up to date.
• Full systems checks need to be carried out regularly.
51
ICT I.G.C.S.E.
Disadvantages of using e-mail:
1. Spam forms 85% of all e-mails in the world.
2. Might pass on viruses.
3. Cannot send physical objects.
4. Have to have a computer with an Internet connection.
5. Cannot send original of signatures.
Faxes (Facsimile): i)
Physical fax:
A fax machine is like a long distance photocopier. The document is put into the fax machine at one
end and a copy comes out of a fax machine at the other end. The original is first scanned with a
beam of light and then converted into electronic signals that can be passed along telephone lines.
ii)
Electronic faxing:
Electronic faxing makes use of computer technology and the internet.
Emails:
• More secure than faxes because password protected.
• No need to print the document so saving cost and environmentally friendly.
• The document is usually of a better quality
• Documents received in emails can be modified
• It is much easier to send to multiple recipients at the same time
• People are more likely to have access to email accounts than a fax machine
Video conferencing is a communication method that uses both video and sound. It is carried out in
real time and makes use of some form of network. The basic hardware includes:
Hardware needed:
• Microphones
52
ICT I.G.C.S.E.
• Web Cams
• Speakers
• Large monitors/television screens
Software needed:
• Webcam and microphone software drivers
• CODEC: coder–decoder or compression-decompression echo cancellation software.
Advantages of Video conferencing:
1. Conferences can be called at short notice.
2. Cost is reduced:
• Reduced travelling costs
• No need to pay for hotel accommodation
3. Don’t have to carry documents to conference.
4. Employees will not travel to unsafe places around the world.
Voice over Internet protocol (VOIP) is a method used to talk to people using the Internet. One of
the big advantages is that it is either free or at a local rate to anywhere in the world. The main
problems are usually sound quality (echo and ‘weird sounds’ are both common faults). The security
issues over VOIP are:
• identity theft
• viruses and malware (malicious software)
• spamming (sending junk mail)
• phishing attacks (the act of sending an email to a user falsely claiming to be an established
legitimate enterprise in an attempt to scam the user into surrendering private information
that will be used for identity theft).
53
ICT I.G.C.S.E.
Web conferencing:
Web conferencing (webinar) uses the internet to permit conferencing to take place. Multiple
computers are connected to the internet. As with video conferencing it is carried out in real time
and allows the following type of meetings to take place:
• business meetings to discuss new ideas
• presentation
• online education or training
Web conferencing links into video conferencing and audio conferencing through the use of
webcams and built in microphones and speakers.
54
ICT I.G.C.S.E.
A systems analysis team is brought in to review an existing system and suggest a number of
improvements.
55
ICT I.G.C.S.E.
5.1 Analysis:
The analysis stage involves examining the existing system in detail. The basic steps can be
summarised as follows:
1. Research or collect data from the current system
2. Describe of the current system – establishing the inputs, outputs and
Feasibility study
processing being done
3. Identify of the problem with the current system
4. Agree the objectives with the clients
5. Identify and agree customer requirements
6. Interpret customer requirements
7. Produce a cost-benefit analysis
8. Identify suitable hardware and software
9. Produce a data flow diagram
2. Interview: Involves a one-to-one question-and-answer session between the analyst and the
employee/customer.
Advantage: The questions do not have to be fixed in advance; the analyst can change them
according to the answers the interviewees give.
Disadvantages:
i. Interviewing takes a lot of time.
ii. It is relatively expensive, due to the use of the analyst’s time. iii. The
interviewee cannot remain anonymous.
56
ICT I.G.C.S.E.
3. Workers and/or customers filling questionnaires to gather facts in a fast way.
Advantages:
i. These are much less time-consuming than interviews.
ii. Individuals can remain anonymous if they want. iii. It is relatively
inexpensive method.
Disadvantages:
i. Often the number of returned questionnaires is low.
ii. Analyst can’t change questions halfway through.
iii. There is no immediate way to clarify a vague or incomplete answer to a question.
4. Looking at existing paperwork: All documents that are used within a system need to be
examined. The documents may be, for example, bills, invoices, letters, order forms, payslips,
etc. The analyst will be looking for answers to questions such as: How is the data collected?
What data is collected? What happens to this data after it has been collected?
Advantages:
i. The analyst can see for themselves how the paper system operates.
ii. A lot can be discovered about an organisation by examining the documents that it uses.
Disadvantages:
i. It can be very time consuming.
ii. Because of the analyst's time, it is a relatively expensive method.
iii. The documentation is often difficult to understand, so it may be necessary to ask someone to
explain it. This means that we are back to the interview again.
5.2 Design:
Having analysed the existing system, the next stage is to design the key parts of the recommended
system. A list of tasks is summarized here: Design the data capture forms / input forms
• Design screen layouts
• Design the outputs in the form of screen displays and printed reports
• Producing system flowcharts and/or pseudo code
• Select/design validation rules that need to be used
• Design the file structures and tables (field names, field types, field lengths, field description,
selection of key field, how the data files will be linked, etc)
• Produce any algorithms or program flowcharts
• designing a testing strategy plan
5.2.1 Data capture forms:
These forms allow the data to be input into the system.
57
ICT I.G.C.S.E.
Navigation aids:
• Back/previous record button
• Forward/next record button
• New record button
• Submit/save button
• First record button
• Last record button
• Exit button/return to homepage button
• Move to top of page if long form
• Search facility
59
ICT I.G.C.S.E.
(e) Format / Picture Check:
Each position within a data item is tested against the item’s pattern to ensure that only valid values
are present.
Example: Date should be in the form dd/mm/yyyy.
(f) Presence Check: checks that the data has been entered.
(g) Consistency Check: checks to see that fields match each other.
Example:
If 'Mr' has been typed into a field called title then the gender field must contain either 'M' or 'Male'
60
ICT I.G.C.S.E.
It is necessary to produce a testing strategy or plan to ensure all the possible scenarios have been
tested.
5.3.1 Development:
After the data structures have been designed, they will need to be created using the software or
programming language recommended by the systems analyst. The programmer will produce the
program code needed to solve the problem.
5.3.3Testing strategies:
After testing each module the whole system is tested. Even though each individual module may
work satisfactory, when they are all put together there may be data clashes, etc.
A system is tested by using both test data and live data.
As a result of testing, data/file structures, validation routines, input methods, output formats may
need to be amended/improved.
5.4 Implementation:
After the system is fully tested, the systems analyst will want to get the system up and running. His
next steps will be
• to train staff on the new system,
• transfer paper files or electronic files to the new system and choose a
method of changeover to the new system.
Methods of changeover:
1. Direct changeover:
61
ICT I.G.C.S.E.
New system replaces the existing system immediately. This method can only be used when the new
system has been thoroughly tested. Once the old system is closed down it cannot be reintroduced.
Advantages:
i. The benefits are immediate.
ii. Costs are reduced – since only one system is used there is no need to pay for two sets of
staff. iii. There is less likelihood of malfunction since the new system will have been fully tested.
Disadvantages:
i. If there are problems, there is no backup system.
ii. It can be difficult to make improvements to the new system and keep it working.
2. Parallel running:
The old and new systems are run side by side for a time before the new system takes over
altogether. Advantages:
i. If the new system fails, the old system is still available as a backup.
ii. Staff can be trained to use the new system gradually.
Disadvantages:
i. Two sets of workers have to be paid to keep both system running. ii.
It takes a lot longer to fully implement than direct changeover.
3. Pilot running:
Pilot running is the method adopted by large organisations. The new system is implemented in one
branch of the organisation whilst the other branches continue with their existing system. Workers
from other branches can be taught on the new system before it is introduced to their branch.
Advantages:
i. If the system does not work properly, not all branches are affected.
ii. The later branches benefit by learning from the mistakes made in earlier branches. iii.
The costs are less than parallel running.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. It is more expensive than direct changeover, since each pilot scheme needs to be evaluated before
the next stage is introduced.
4. Phased implementation:
62
ICT I.G.C.S.E.
Phased Implementation involves the introduction of the new system one part at a time. When the
system is working perfectly another aspect can be moved onto the new system until all aspects have
been transferred to the new system.
Advantages:
i. If the latest part fails, it is only necessary to go back in the system to the point of failure. ii.
Workers have time to get used to the new system.
iii. Don’t have to pay two sets of staff.
Disadvantages:
i. It is a slow method of implementation compared with direct changeover.
ii. If the new system doesn’t work properly, it is not possible to fall back on the old system.
iii. It is more expensive than direct changeover, since it is necessary to evaluate each phase before
moving to the next stage.
5.5 Documentation:
5.5.1 User Documentation:
It is provided to help users operate the new system. It is written in non technical terms. It includes:
• Purpose of the system
• Limitations of the system
• Hardware and software requirements
• Input and output formats
• How to save files, do a search, sort data, etc
• Sample runs
• Error messages
• Trouble-shooting guide
• Frequently Asked Questions
• Tutorials
63
ICT I.G.C.S.E.
• Hardware and software requirements
• File structures
• Known bugs in the system
• Sample runs (with test data and results)
• List of variables
• Validation routines
5.6 Evaluation:
After the system has been developed, tested and implemented, it must be evaluated. There are a
number of stages in the evaluation process.
A system is usually evaluated against a set of criteria:
• Is the system reliable?
• Does the system do what it was intended to do?
• Is the system easy to use?
• Is the new system efficient?
• Is the solution appropriate?
64
ICT I.G.C.S.E.
The four main areas where ICT has had an effect on employment include:
• Shop work – online shopping has reduced the need for high street shops
• Banking – the introduction of ATMs and online banking has led to the closure of many
branches
• Office work – spreadsheets, word processors and databases have taken over many of the
tasks carried out by office staff.
Manufacturing:
Car manufacturing makes use of robotics. Robots are capable of carrying out the following tasks:
• spraying the bodies with paint
• assembling all the body parts
• assembly of the engine and transmission fitting the windscreens.
Fitting seats, dashboards and interior trim are usually carried out by a skilled worker.
Factory workers have had to retrain to gain the following new skills:
65
ICT I.G.C.S.E.
• maintenance of the robots
• quality control
• design and development
• marketing
• training other workers.
There has been a large increase in job opportunities in some areas, for example:
• network managers and computer technicians
• website designers
• programmers to write operating systems, application software and computer games.
• computer engineers (who build and maintain computer systems) delivery drivers to deliver
goods to customers.
Job sharing:
With job sharing, a full time job is divided between two part-time workers. Both workers are doing
the same job; one picks up the work where the other left off.
Compressed hours:
In compressed hours, an employee works their full hours for the week but works fewer days.
68
ICT I.G.C.S.E.
7.1 Physical security:
7.1.1 Health aspects:
Eyestrain (caused by staring at a computer • use an anti-glare screen or use window blinds
screen too long or bad lighting in the room) • have eyes tested regularly
• take regular breaks
• ensure that there is no screen flicker
69
ICT I.G.C.S.E.
Fire risk:
• ensure good ventilation in the room
• have a fully tested Co2/dry fine fire extinguisher nearby
• fire exits must be kept clear at all times and not blocked by equipment
• electrical sockets should not be overloaded
• reduce voltage requirements - LCD screens instead of CRT monitors
• cables are not to be coiled – the heat generated may be sufficient to start a fire
7.2 E-safety:
E-safety refers to safety when using the internet, i.e. keeping personal data safe and applies to any
of the following devices:
• mobile phones
• computer or tablet
• game console
• wireless technology
70
ICT I.G.C.S.E.
It is also important to be careful when using online gaming since it carries its own risks. Some of
the known risks reported over years include:
• violence in the game itself, which can lead to violent behaviour in reality
• predators
• cyber bullying
• use of webcams
• voice-masking technology
• viruses, phishing or spyware are examples of problems associated with certain online gaming.
Encryption makes files unreadable if accessed illegally but it does not prevent hacking.
7.3.2 Phishing
The creator sends out legitimate-looking emails to target users. As soon as the recipient clicks on a
link in the email or attachment, they are sent to a fake website or they are fooled into giving
personal data in replying to the email. The email often appears to come from a trusted source, such
as a bank.
Effects of phishing:
• The creator of the email can gain personal data, such as bank account data or credit card
numbers, from the user.
• This can lead to fraud or identity theft.
Smishing uses the SMS system of mobile phones to send out fake text messages.
Vishing uses a voice mail message to trick the user into calling the telephone number contained in
the message.
7.3.3 Pharming
This is malicious code installed on a user’s computer or on a web server. The code will redirect the
user to a fake website without their knowledge.
Effects of pharming:
• The creator of the malicious code can gain personal data, such as bank account data or credit
card numbers, from users when they visit the fake website.
72
ICT I.G.C.S.E.
• Pharming can lead to fraud or identity theft.
7.3.5 Spam
Spam, often referred to as junk email, is usually sent out to a recipient who is on a mailing list or
mailing group. While spam is rarely a security risk, it can lead to denial of services. Denial of
services is an attack on a network that is designed to slow the network down by flooding it with
useless traffic. Spam can be linked to phishing attacks or even the spread of computer viruses.
Spam can also affect mobile phones through text messaging and sometimes referred to as ‘spasms’.
7.3.7 Cookies
Cookies are small amounts of text that are sent and received through the web browser as we search
or visit internet sites. Cookies track the pages you have visited and save these on your computer
with information about you.
Cookies can be useful if you visit a website frequently and do not wish to enter your login details
each time, but they allow websites you have not visited to know which webpages you have viewed.
• helps prevent viruses or hackers gaining access to the user’s computer or network by blocking IP
addresses but hackers can still have access if they are using an allowed computer
• the user is warned if some software on their system is trying to access an external data source
7.4.3 Encryption
Encryption is the name given to the converting of data (plain text) into a code (cypher script) by
scrambling it. Even if a hacker gains access to the data he will not be able to understand it. The key
used to encrypt (or encode) the message is known as the encryption key; the key used to decrypt (or
decipher) the message is known as the decryption key.
7.4.4 Authentication
Authentication is used to verify that data comes from a secure and trusted source. It works with
encryption to strengthen internet security. Digital certificates
A digital certificate is a pair of files stored on a user’s computer. Each pair of files is divided into:
• a public key
• a private key
When sending an email, the message is more secure by attaching a digital certificate made up of six
parts:
• the sender’s email address
• the name of the digital certificate owner
• a serial number
• expiry date
• public key
• digital signature of certificate authority (CA)
Operating systems and web browsers maintain lists of trusted CAs.
Passwords
Biometrics
Online credit fraud
Online credit card fraud happens for the following reasons:
• hackers gaining access to a user’s computer through the use of spyware, phishing or pharming.
• the breaking of passwords
• sometimes the URL is altered very slightly in the email and the user ends up visiting a fake
website so it is better to type in the URL.
• it is relatively easy to tap in to wireless networks without password protection
• Wi-Fi hotspots in public places are not secure
• cloud and some retail companies are targets for hackers
75
ICT I.G.C.S.E.
Cloud security
Several computer manufacturers encourage customers to store or backup their files on a medium
known as the cloud. Users purchase cloud storage and can then access all their files from any
device anywhere in the world.
Advantages:
• no need to carry memory sticks
• no need to pay for large storage capacity on your computer
• cloud companies ensure that your files are backed up
• the ability to synchronise (sync) files ensures they are automatically updated across all devices
allows several users to edit and collaborate on a single file
Data security:
Companies that transfer vast amount of confidential data from their own systems to a cloud service
provider are relinquishing control of their own data security.
Data loss:
There is a risk that important and irreplaceable data could be lost from cloud storage facilities.
76