0% found this document useful (0 votes)
210 views

Computer Studies Handout

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views

Computer Studies Handout

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 150

ICT / Computer Studies Handout – IGCSE

Contents

Topic Page
Introduction 2
Input and output devices 5
Storage devices and Media 29
Types and components of a computer system 46
Networks 53
Ways in which ICT is used 60
The effects of using ICT 93
Systems analysis and design 101
Problem solution including algorithm design ( for 0420 Computer studies only) 120
Generic software and organisation of Data (including data types) 134
How to answer exam questions 148
Appendix 1 Past exam paper (November 2009)
Appendix 2 Marking scheme (November 2009)

Introduction
What is a computer?

Computer Studies Handout 1


Definition 1
A computer is an electronic devise used to process data.

Definition 2
A computer is a general purpose machine which processes data according to stored
instructions. A computer is designed to perform, complex and repetitive tasks fast while
maintaining a high level of accuracy and precision.

No matter how fast a computer can go, you should realise that your mind is far
much better than any computer in existence, it‘s your mind which develops and
improves of the capabilities of the computer.

Definition 3
A computer is an electronic device which works under the control of stored programs, it
automatically accepts data as input, stores the data, processes it and then gives out information
as output.

From the above definition (definition 3), there are a number of new terms which we have to
define before going further the new terms have been underlined.
Program A program is a set of instructions which directs the operations of a
computer. A program tells the computer what to do.
Data Data refers to raw facts which are entered into the computer for
processing. Data may or may not make sense to the receiver, e.g
05.08.02 which can be taken to be a date, time, code or anything. The
word data is in plural while the singular for data is datum.
Information is data meaningfully put together, or it can be referred to as
Information data which has been processed. In computing there is a difference
between data and information. The difference between data and
information is that information is processed while data are the raw facts
still to be processed.
Input The term input refers data sent into the computer for processing. You
should realise that in most cases we enter data into the computer and not
information, this is so because the main purpose of a computer is to
process data.
Store To store is to keep, retain or save data for later use, this is achieved
through the use of storage devices such as a magnetic dis.
Process To process is to make some calculations and logical comparisons on
data. Processing in a computer is done in the CPU by the Arithmetic and
Logic Unit (ALU)
Output Output refers to the information obtained from the computer after
processing. Same as with input you should realise that in most cases we
obtain information from the computer and not data, hence it is not
appropriate to define output as data obtained from the computer although
it is possible to obtain data from the computer especially with turnaround
documents

A computer system can be divided into two major parts, namely


1. Hardware
2. Software

Computer Studies Handout 2


Hence we can safely say Computer system = Hardware + Software
What is Software?
Software refers to a set of programs which tells the computer what to do. Software is used to control the hardware
of the computer system and to interface the user to the computer. A computer system cannot function without
software, whatever instructions you give to the computer would need software for the computer to be able to
execute them.

Software is usually classified as system software and application software.

The most important system software is an operating system which is part of the system software.

What is an Operating system?

An operating system is a set of programs which drives the computer. The operating system is responsible for
supporting the application software, monitoring sequences of events in the computer system, controlling the
resources of the computer system (e.g. distribution of memory and handling peripheral devices) and supporting
communications between the elements making up the computer system.

System software can be classified into two, operating systems and Utilities, the table below classifies system
software and gives examples.

System software
Operating systems Utilities
MS-DOS Norton Utilities
Windows 98 LapLink
Windows NT Windows 3.x
Windows XP Compilers
Windows vista
MacOS (e.g. System 7)
UNIX
VAX/VMS
MVS

Application programs or packages (groups of programs) are designed to enable the computer to undertake a
specific task, such as writing a letter using a word processor. There are several other application packages such
as a CAD program, accounts packages, and many others.

The table below classifies application software and gives examples for each group.
Application software
Word Processors Databases Spreadsheets Presentation Games
Word Access Excel PowerPoint Hearts
Amipro Dbase Lotus 123 Paint shop Solitaire
Word Perfect FileMaker Quatrro Pro Corel Draw Freecell

The other type of software is programming languages. Programming languages are used to create all other
software whether it is system or application software. Modern programming environments have graphical user
interfaces (GUI) which uses symbolic icons, drag-and-drop technique and English-like statements. Visual Basic is
the most popular example of such environments. Programming in visual environment creates an impression that it
is very easy to write programs

Computer Studies Handout 3


We will have a detailed look on software in the other chapters to follow.

What is Hardware?

Hardware refers to the physical/tangible components of a computer for example a keyboard. Hardware devices
are commonly referred to as peripherals.

A peripheral is a computer component connected (linked) to the CPU but located outside the CPU, for example a
keyboard or a mouse.

Hardware Components

All computers require at least 5 basic hardware components for them to operate:

 Input device: An instrument used to enter data into the computer for example a
keyboard and a mouse. The input device enables the user to enter data and
instructions into the computer.
 Output device: A component used to display or printout information from the computer for example a
VDU, printer, or any other device that displays or prints the results of processing.
 Main Memory: A temporary storage space for data and programs being processed and the immediate
results of processing.
 Secondary storage device: Permanent storage space for data for example a magnetic disk, flash
disc, magnetic tape, etc. Secondary storage devices keep large amounts of data.
 Central processing unit (CPU): The brain of the computer, the CPU is the component which actually
executes instructions.

The 5 basic hardware components of a computer can be represented by a diagram as shown below.

Five classes of hardware

CPU
Control Unit

Arithmetic & Logic Unit Output


Input

Main Memory (Primary


Store)

Secondary Storage

Input Devices

An input device is an is an instrument used to enter data into the computer for processing.

Keyboard Mouse Scanner Joystick

Computer Studies Handout 4


Input devices can be divided into two groups.
1. Manual Input devices
2. Direct data capture (Automated input devices)

Direct data entry input devices


Direct data entry input devises are used to enter data automatically into the computer without
need to type the data. Examples devices used for direct data capture include, Optical character
readers(OCR), magnetic Ink Character Readers (MICR), Optical Mark Readers (OMR), Bar
code readers, sensors and many other devices.

With the Direct data capture devices data is transferred automatically from the source document
into the computer, for example from a bar code reader to the computer at a Point of sale (POS)
terminal in a supermarket, therefore eliminating the need for the user to enter the data using a
keyboard.

Advantages
1. They are faster when entering data
2. They eliminate transcription errors
Disadvantages
1. They are more expensive than the commonly used input devices such as the
keyboard.

Manual Input devices.


Manual input devices are the most common data entry devices, most of them like the keyboard
usually come with the computer and therefore inexpensive. Other examples of manual input
devices are mouse, touch screen, track ball and many others. The main advantage of manual
input devices is that they are inexpensive but however their major disadvantage is that they are
prone to transcription errors and slow when entering data.

Identification and use of Input devices


Candidates should be able to:
(a) identify the following input devices:
keyboards, numeric keypads, pointing devices (including mouse, touch pad and tracker ball), remote
controls, joysticks, touch screens, magnetic stripe readers, chip readers, PIN pads, scanners, digital

Computer Studies Handout 5


cameras, microphones, sensors, graphics tablet, MICR, OMR, OCR, barcode readers, video cameras,
web cams, light pens.

(b) identify suitable uses of the input devices stating the advantages and disadvantages of each:

Keyboard
The keyboard is the most common input device used to enter text and numeric data into the
computer. The most common type of a keyboard is the QWERTY
keyboard which is named after the top row character of its text characters
which spell the word QWERTY. The QWERTY keyboard follows the same
key layout as the traditional typewriter except that it has some additional
keys such as the function keys like F1, a separate numeric keypad and
other control keys used to control the functions of the computer like the
sleep key. Each key of the keys on the keyboard has a switch which when pressed will send a
binary code to the computer.

Uses
• Keyboards are used to input text, for example into a word-processed document. There are
other devices used for copying text, so keyboards tend to be used where the text concerned is
original and is entered directly by the author of the document. Examples of such documents are
letters, business documents, user guides etc.
• Keyboards are also used to type commands into a computer, for example pressing the control
(Ctrl) key at the same time as pressing X (to cut selected text) or C (to copy the selected text) or
V (to paste the selected text).
• They are also used to type in unusual selections of characters, such as passwords.

Advantages of using a keyboard

1. They allow accurate entry of data, in combination with a monitor to check accuracy.
2. They allow quick entry of original text.
3. They are robust devices.
4. Concept keyboards are helpful to people with disabilities
5. Reliable when entering data in the form of text and numbers
6. Usually supplied together with the computer, so there are no additional costs

Disadvantages
1. Conventional keyboards can be difficult for people with disabilities to use.
2. They take up more space than other input devices.
3. Slow to enter data and to access menus compared with direct data entry devices such as
barcode readers, and magnetic ink character recognition (MICR) and optical mark
recognition (OMR) devices.
4. .Difficult to use when one wants to move objects on the screen
5. Prone to transcription errors

Ergonomic keyboard
This is a specialised keyboard designed to minimise on
Repetitive Stress Injury (RSI) to fingers. The ergonomic
keyboard attempts to place the keys in a way which makes it
easy to reach out for the keys, it is sometimes referred to as the

Computer Studies Handout 6


natural keyboard. The arrangement of keys on an ergonomic keyboard is different from
the traditional keyboard, this was done to make it less strenuous to use and faster to
type. However the different arrangement of keys has made it difficult for users to adjust
to them thereby preventing Widespread acceptance for them.

Concept keyboard

Also known as the membrane or overlay keyboard. Concept keyboards are


used where fast input is needed through making selections from a limited
range of choices. Commonly used in restaurants where the operators would
simply touch the image on the keyboard to make a selection and the
computer responds correctly according to the key pressed.

Advantages:

– Faster when making non-text selections for example making menu choices on the till of take-
away outlet
– The keyboard is waterproof which makes it ideal for restaurants and take-away outlets
where there is dirt and a high risk of splashes.

Disadvantage:

– Poor for text or numeric data entry. However in most cases the concept keyboard has a
numeric keypad so the operator can enter other products not programmed to the keyboard
or the quantity sold.

1.4 Braille Keyboard. The Braille keyboard is made up of a pattern of


raised dots which can be felt. This type of a keyboard is mainly designed for
the visually impaired. Apart from the Braille keyboard there are also some
keyboards with large and colourful keys which are easier for those who are
not totally visually impaired.

Numeric keypads
A numeric keypad is used specifically to enter numbers, although alphabetic
characters can be entered by using the function key.

Uses
They are used in situations where only digits have to be entered, for example:
• at electronic point of sale (EPOS) terminals, where they are very useful when a barcode is
damaged; when this happens, the checkout operator can key in the number using the numeric
keypad
• with automated teller machines (ATMs)
• on mobile phones
• when delegates at a conference need to record theft responses to questions
• when inserting personal identification numbers (PINs), such as for chip and PIN credit/debit
cards.

Computer Studies Handout 7


Advantages:
1. They are small and compact and can be carried easily.
2. Many devices can he connected to the same computer at conventions.
3. They are easy to cover up when entering a PIN.
Disadvantages:
1. It is difficult to enter text.
2. They can be too small for the numbers to he used effectively.

Mouse
A mouse in the next most common input device, it can only be used in Graphical User
Interface (GUI) environments. A mouse is used for menu selection and controlling the
movement of the cursor on the screen. To move the curser one has to slide the
mouse on a flat surface, this will in turn roll the ball underneath the mouse which then
turns two rods on the mouse which will send a signal to move the cursor on the screen.

The newer mice no longer use the ball which becomes difficult to use when it becomes dirty,
instead they use a laser beam which is more efficient than the rolling ball.

A mouse has two buttons and in most cases a scroll button in the middle. The left button is
usually used to make menu selections and to drag objects around the screen. The right button
is usually for shortcut menus, when clicked a pop up menu will come which usually contains
commonly used options. The scroll button is used to scroll up and down on a page, some
mouse models are now wireless.

Uses
• Mice are used to move the pointer on the screen a well as for selecting items such as check
boxes, radio buttons and options from a drop-down menu.
• They can be used to draw objects in drawing and art packages.

Advantages
– Faster to use when making menu selections and navigating through a long document.
– Ideal for use with desktop computers
– Usually supplied with a standard computer, therefore its cheap as there are no additional
cost to buy it.
– They allow faster entry of the chosen option, compared with typing on a keyboard.
– They allow fast navigation through slideshows! websites.
– They are smaller and more compact than keyboards.

Computer Studies Handout 8


Disadvantages
 Requires a flat space close to the computer.
 They can be difficult to use for people with disabilities.
 They can be difficult to use for entering data other than choices on a menu, radio buttons
or by means of hyperlinks.

Touch pads
A touchpad is incorporated into most laptops and is meant to
simulate the use of the mouse. It usually has two buttons close to it,
similar to a mouse, but these tend to be sunk below the level of the
touchpad itself. The user touches the touchpad with a finger and by
gently tapping it can make choices on menus, and so on. By
keeping the finger in contact with the touchpad and moving the
finger around, the user can control the pointer on the screen.

Uses
On a laptop a touchpad can be used in much the same way as a mouse is with a desktop
computer. It can be used to move the pointer on the screen as well as for selecting items such
as check boxes, radio buttons and options from a drop-down menu.

Advantages:
• They allow faster entry of the chosen option compared with typing on a keyboard.
• They allow fast navigation through slideshows/ websites.
• l hey are integrated within the laptop computer and don‘t have to be plugged in.

Disadvantages:
• People with disabilities can find them difficult to use.
• Many users find them difficult to control compared to a mouse.
• They can be difficult to use for entering data other than menu choices, radio buttons or by
means of hyperlinks.

Tracker ball
A tracker ball operates the same way as a mouse, it looks more like a mouse which
is placed upside down. A tracker ball has buttons just like a standard mouse, it is
more ideal where there is limited flat space and this is the reason why they are
commonly used with laptops. Unlike a mouse a tracker ball is not supplied together
with a computer and therefore there are additional costs.

Uses
• They can used for any application by people with disabilities or RSI where the use of a mouse
would be too difficult.
• They are used in control applications where objects on a screen are used to control a process.
• Pilots on fast ferry ships and air traffic controllers use them to control the appearance of radar
screens and their contents.

Advantages:
• They do not require the fine control that a mouse does.
• They are easier for people with disabilities or RSI to use.

Computer Studies Handout 9


• They can be more accurate when positioning thc pointer on a screen.
• They are fixed, so they cannot be knocked accidentally (for example, onto the floor, where a
disabled person could have problems retrieving them).

Disadvantages:
• It is difficult to enter data that the button has not been programmed for.
• They can be slower for selecting options compared
with using a mouse.

Video digitisers
A video digitiser is used to input video to a computer from a television or
video camera. In order for the computer to be able to handle the resulting
images the video has to be converted from analogue to digital using the
digitiser. Video digitisers are usually video cards that are fined into your
computer.

Remote controls
A remote control is used to control other devices remotely by emitting an
infrared signal to the external device. Buttons are pressed to choose
different options such as selecting channels on the television or radio,
changing the sound volume, setting times for recordings, and much more.
Remote controls are small, so that they can be held in the hand, and
wireless, communicating with the device by means of infrared signals.

Uses
They are mainly used with home-entertainment device such as televisions, satellite boxes,
video I digital versatile disk (DVD) recorders and stereo systems.

Advantages:
• They can be any distance from the device and still operate it.
• People who have difficulty walking find it easier t control devices.

Disadvantages:
• People with disabilities or RSI can find it difficult use.
• If somebody or an object comes between the remote control and the device, the device can no
longer L controlled remotely.

Joystick
A joystick is commonly used for playing computer games. A joystick is looks more
like a gear lever. The stick on the joystick is surrounded by switches which are
closed as the joystick is moved in the direction of that particular switch (left/right and
up/down). The joystick has buttons to control further switches used when playing
games e.g. to jump, fire, e.t.c.

Uses
• They are used with video/computer games.
• They are used in the training of airline pilots to control various aspects of flying an aircraft.

Computer Studies Handout 10


Advantages:
• They allow faster entry on the chosen option compared with typing on a keyboard.
• They can be used to control objects in three dimensions.

Disadvantages:
• They can be difficult to use for entering data other than menu choices, radio buttons or by
means of hyperlinks.
• It is more difficult to control the pointer than other windows, icons, menu and pointer (WIMP)
input devices.

Microphone
A microphone is used to enter data into the computer in the form of sound. There
was a lot of talk about voice recognition software in the late 90s but however the use
of such systems to enter text into the computer has remained very much limited.
Voice recognition software if used makes it faster and easier to enter data as there
will be no need for typists as people will simply speak as the computer types. Voice
input is also helpful for the visually impaired and those who cannot type using their hands
because of a disability.

Uses
• Microphones are used most often to input speech for incorporation as a voiceover in slide
shows or in web pages.
• They are used to input dictated text for use with voice recognition software. The software is
used to convert the speech into text so that it can be used with other software packages such
as word processors.

Advantages:
• Changes to the sound/voice can be done in real time rather than recording it and inputting the
recording.
• It is quicker to input text by speaking into the microphone rather than typing it in.

Disadvantages:
• When inputting a voiceover, the computer cannot be used for any other purpose at that time.
• Voice recognition software is not as accurate as using a keyboard.

Bar code reader


A bar code is a series of thick and thin lines representing a number. The sequence of bars and
spaces of different thickness represents a series of numbers. A bar code reader
is therefore an input device used to read bar codes from a product.

Bar codes are commonly found on packaging and the code gives the following items of data:
1. country code
2. manufacture code
3. Item code
4. Check digit

WAND

Computer Studies Handout 11


The code read off the bar code at the Point Of Sale (POS) terminal is then sent to main
computer where the price, description of the item will be retrieved and send back to the POS
terminal.

A bar code reader is used to read the code. The reader uses a laser beam that is sensitive to
the different reflections from the lines and the spaces. The reader converts the reflected light
into digital data that is transferred to a computer for processing.

Input devices used to read a bar code.


1. Scanner
2. Wand
3. Light pen

Uses
• They are used in all kinds of shops, wherever the details of products represented by code
numbers need to be input.
• In libraries, they are used to input the book number and library-card number.

Advantages:
• They are faster than typing the number in using a keypad.
• It is a more accurate method of data entry compared with typing the number in.

Disadvantages:
1. Input is limited to a number code only.
2. Not ideal for items which need weighing such as meat and also on large items like a
refrigerator.
3. They can be expensive.

Radio frequency identification (RFID)

Radio frequency identification (RFID) tags are attached to objects so that the
object can be identified through the use of radio waves. The tag consists of two
parts: an integrated circuit storing information about the object, and a miniature
aerial for transmitting and receiving radio signals. The reader is used to transmit
a radio signal in order to communicate with the RFID tag. It then uses the data it
receives to identify the object. Some RFID readers are handheld and some called portals are
used at doors to detect objects passing through the doorway or entrance or exit to a building.

Uses
• They are used in passports in a number of countries.
• They are used by companies to track movements of their products and for stock taking.
• They are used in pet identification.
• In some libraries, they are replacing the use of
barcodes on books.

Advantages:
• Unlike barcode readers, they can cope with objects between the tag and the reader.
• They can be read from and written to.

Computer Studies Handout 12


• They are more difficult to copy than a barcode.
• Tags are very robust.

Disadvantages:
• They are more expensive than other methods of input.
• When used to hold personal data, people‘s movements can be tracked easily, leading to lack
of privacy.

Scanner
A scanner is used to digitise images and text from a printed document. Scanners can be used
together with Optical Character Recognition (OCR) to convert scanned text data
into actual text which can be edited on the computer. The main traditional
application of scanners has been to enter pictures into the computer but with
introduction of digital cameras has reduced the use scanners in this area. Advancement in
technology has made it easier for people to use a scanner together with a printer as a
photocopier and also through the internet a scanner can be used as a fax machine.

Uses
• Scanners are used to scan documents that can be converted into text-based documents using
OCR software.
• They are used to scan old documents for keeping records; for example, birth, death and
wedding certificates.
• They are used to scan images that can be transferred as faxes.
• Photographers use scanners to obtain digital images of photographs. Not all photographers
use digital cameras and even those that do, still have many photographs in their collection
which were produced using a traditional form of camera.
• They are used as barcode readers.

advantages:
• Scanners allow images to be stored for further editing.
• Using OCR on printed documents saves time
with typing the text in again.
• using a barcode scanner is quicker than typing in
the barcode.

Disadvantages:
• The accuracy of reproduction is limited.

Digital camera
A digital camera is used to take photos just like a normal camera and
it is then connected to the computer through a USB (Universal Serial
Bus) port to enable the photos to be downloaded onto the computer.
A digital camera has a facility to store photos on a memory stick
which can be placed inside the camera, the size of the memory stick
will determine the number of photos which can be stored on the camera.

Uses

Computer Studies Handout 13


• They are used by professional photographers in their work and by amateur photographers for
personal use,
• They are used to insert photographs directly into all types of software, including presentation
software, word processors, desktop-publishing software and database software.

Advantages:
• Digital cameras produce better quality photographs than a traditional camera.
• It is quicker to upload a number of images than to scan them in.
• It is quicker to upload images than to have a film developed.
• A memory card can hold more images than a roll of film.
• Cheaper as no film is used therefore eliminating the cost of buying a film and the cost of
developing the film
• Unwanted images can be deleted straight away
• One can navigate through the photos after taking them

Disadvantages:
• They are more expensive than traditional cameras.
• Batteries need changing more often than with traditional cameras.

Web cameras

Webcams are similar to video cameras but are connected directly to the
computer. They have no storage capability but instead transmit directly to the
computer. Another major difference is that they tend not to be used as portable
devices. They are, in effect, miniature video cameras with no storage facility
other than that provided by the computer.

Uses
High-quality webcams are used by businesses in videoconferencing to input moving pictures
from a fixed position into a computer.

Advantages:
• They can be online constantly.
• They provide elderly or disabled people with the opportunity to stay in touch visually with
friends and relatives without leaving their home.

Disadvantages:
• A webcam has very limited features, for example no zoom facility.
• They are not portable, as they must be connected to a computer.
• The software is fairly limited, often failing to include video-editing facilities.

Digital Video Camera


A digital video camera operates in the same way as a digital camera, but in
addition to handling photos the video camera can also deal with videos. The
videos can be stored on the camera and later transferred to a computer where
it can be edited.

Computer Studies Handout 14


Magnetic Stripe Reader
Magnetic stripes are thin strips of magnetic tape which are usually found on the
back of plastic credit and debit cards. When the card is inserted into Automatic
Teller Machine (ATM) or a swipe machine in a supermarket the tapes slides past
a read head just like the one used in a tape recorder. This reads the data from
the stripe which is then transferred to a computer.

Uses
• They can be used anywhere a payment is made using a bank or credit card, such as:
 in bank ATMs
 as part of electronic funds transfer at point of sale (EFTPOS) terminals in supermarkets
and other types of shops and restaurants.
• In security, they are used to prevent unauthorised access to restricted buildings or hotel
rooms.

Advantages:
• They allow faster entry of data compared with typing on a keyboard.
• Data entry is more accurate than with a keyboard.
• Data entry is more secure than with a keyboard.
• Their use prevents entry to restricted areas without a card.

Disadvantages:
• If the strip is damaged, data has to be entered manually, resulting in loss of speed at EFTPOS
terminals.
• If the strip is damaged or the card is lost, the holder cannot gain access to the building or hotel
room.

Smart card readers


Smart cards are often referred to as chip cards. They are similar in
appearance to a magnetic strip card, but information is stored on a chip on
the card. This can be used for storing a PIN and/or other personal data. The
chip can be updated and so, in the case of a payment card, can be used to
store the amount of money left on the card. Debit and credit cards do not
store the amount of money left on the card as they can be used without a reader (e.g. paying in
a telephone transaction); in this case, the money in the account would not match the amount
stored in the chip. Other types of smart card serve as loyalty cards, with the number of loyalty
points being updated on the chip when a customer uses the loyalty card to buy goods at a shop.
These cards have greater memory storage and security of data than a magnetic strip card, They
can also process data on the card.

Computer Studies Handout 15


Uses
• Smart cards are used as payment cards (e.g. phone cards), loyalty cards, identification cards
and public transport tickets.
• They are used with satellite broadcasters to decode television programmes.
• They are used with subscriber identification modules (SIMs) in mobile telephones.
• They are used as electronic passports and in driving licences.

Advantages:
• They allow immediate updating, thereby preventing fraud.
• The cards do not need to be in immediate contact with the reader and so receive less damage
through regular use.
• Data entry is more secure than using a magnetic strip.
• Their use prevents entry to restricted areas without a card.

Disadvantages:
• If the card is lost the owner loses a proportion, if not all of the money value of the card.
• There is a lot of information on some cards — if the card is stolen, hackers can use it for
fraudulent purposes and identity theft.

Chip and PIN readers


These are a type of smart card reader, but tend to be used only at
EFTPOS terminals. There are a number of versions of these readers.
For example, the combined PIN pad and chip reader does not have a
magnetic strip reader. This device has a slot for inserting the chip
card manually, a keypad for entering the PIN and a small display to
show instructions and indicate progress of the transaction.
Some chip and PIN readers have a separate magnetic strip reader
slot, either down one side or across the top or bottom of the reader.
The data on the chip contains much the same information as is to be
found in the strip on a magnetic strip card. It contains account
information, but, more importantly, contains the PIN (personal
identification number). The card cannot be used unless the person
knows the PIN.

Uses
Chip and PIN readers are used wherever a payment ne to be made; for example, in restaurants,
supermarkets, shops of all descriptions, travel agents and banks.

Advantages:
• They allow secure transactions to take place, as without the PIN the transaction cannot
proceed.
• They save time in the transaction compared with using cash or cheques.
• Chips are more robust than magnetic strips.

Disadvantages:
• If the customer forgets their PIN, the transaction has to be cancelled.
• The card holder needs to be very careful to protect their PIN when using their card.

Computer Studies Handout 16


Sensor
A sensor is an analogue input device which records physical data from the source which is then
transferred to an Analogue to Digital Converter (ADC) for it to be changed to digital form which
can be processed by a computer.

Analogue data is data in physical notation which varies


continuously like data on a clock (analogue clock), or on an
analogue speedometer where the value of the data is
represented by the physical position of a pointer i.e. the minute
hand.

On the other hand digital data is data in discrete notation or simply data in binary form which is
a series zeros (0s) and ones (1s)

A computer can only understand data in binary form hence data from a sensor needs to be
converted to digital form before it can be processed by a computer and this is done by a device
known as an analogue to digital converter (ADC). In some instances a data logger is used in
place of a sensor to collect the data. A data logger has the ability to record the physical data,
temporary store the data and then convert the data to digital form. The data logger is later
connected to the computer where the data stored on the logger is later downloaded onto a
computer. The data logger is ideal in situations where the data to be recorded is from a remote
location where it is not possible to carry the computer to that particular location for example
recording the PH level from a river.

There is a wide variety of sensors, these include: temperature, sound, water level, oxygen
level, movement, pulse rate, humidity, acceleration, pressure, proximity, pH (acidity and
alkalinity), speed and many others.

Uses
• Temperature sensors are used in automatic washing machines. The temperature is input to
the microprocessor, which compares it with a preset value. If the reading is lower than the
preset value, the microprocessor switches on the heater. If the temperature is higher than the
preset value, it switches off the heater unless the heater is already off, in which case the
microprocessor takes no action. This process is continuous until the washing cycle has finished.
Temperature sensors are also used in a similar fashion with automatic cookers, central heating
controllers and computer-controlled greenhouses.
• Pressure sensors can he used with burglar alarms, normally under carpets by doors and
windows. The microprocessor is programmed with a preset value, normally 104%; although it
cannot be zero — otherwise, if a piece of paper, for example, fell on the sensor, the alarm
would sound. The microprocessor monitors the readings, continuously checking that the preset
value has not been exceeded. If it is, then a siren or loud noise is triggered by the
microprocessor. They are also used in automatic washing machines to check that the weight of
the clothes is not higher than the preset value, otherwise it triggers a warning light or sound. In
addition, they are used as part of a robotic arm that grips objects and also in production line
control.
• Light sensors are used in computer-controlled greenhouses, with preset values input to the
microprocessor. Unlike with most other sensors, there are at least two preset values: one is for
a cloudy day; the other for night-time. The microprocessor continuously monitors the readings

Computer Studies Handout 17


from the sensors. If the reading falls below the lower value, it must be night-time, so the
microprocessor switches off the light (or if it is already off does nothing). If it is higher than this
value hut lower than the higher value, it switches on the light. If it is higher than the higher value
the microprocessor switches off the light (or if it is a] ready off does nothing). llight sensors are
also used in burglar- alarm systems to see if a light beam has been broken by a burglar. It can
be used in automatic washing machines where the amount of light passing through the water
can be detected; if it is lois then the water is cloudy and the cycle should finish. They are also
used as part of robotic arms and in production-line control. They can be used in street lights,
where the microprocessor switches them on if the readings from the light sensor indicate that it
is getting dark.
• Sound sensors can be used in a microphone. They can also be used in burglar-alarm
systems whereby if the preset value is exceeded the microprocessor switches on the alarm.
• Humidity sensors are sometimes referred to as moisture sensors and are used to detect the
amount of moisture present. They are used in computer-controlled greenhouses, where the
microprocessor compares the readings of the sensor with a preset value. If it is lower than this
value, the microprocessor switches on water sprinklers. These sensors are also used in
washing machines to enable the microprocessor to determine whether there is sufficient water
in the drum or not.

Advantages of using sensors:


• The readings are more accurate than those taken by humans.
• Readings are taken continuously and so the microprocessor can take immediate action.
• They facilitate automatic processes so that humans can do other tasks.

Disadvantages of using sensors:


• If there is a power cut, readings cannot be taken.
• Initial setup costs are high

MlDI instruments
These are musical instruments connected to computer using a musical
instrument digital interface (MID!). This can either be to operate to the
instrument or be an integral part of it.

The MIDI interface converts the output signals from the instrument rr a
digital form understood by the computer.

Uses
• A performance can be directly recorded onto a computer and stored as a MIDI file.
• MID! files can in turn be used to supplement other instruments. For example, if a group of
musicians are lacking a particular instrument, they can use
pre-recorded MID! file.

.Advantages
• They allow flies to be produced that can be manipulated.
• Any errors in performance can be removed.
- -.Vantages:
• The music produced can sound manufactured rather than spontaneous.

Computer Studies Handout 18


Touch screen
A touch screen enables a user to control the computer by touching or pointing
to a position on the screen. A touch screen offers a more
direct and flexible way of communicating with the computer,
however it is not ideal for entering large amounts of data or
making a selection from detailed objects with options too
close to each other.

There are two ways in which a touch screen can work, one
is by use of infra-red beams which are broken when one touches the screen therefore sending a
signal to the software of the exact position where the infra-red beam has been broken, and this
is then used to determine the selection made by the user. The other one is by way of pressure
being exerted by the touch which then makes a connection to two layers of conducting plastic
which then sends a signal to the computer.

Uses
• They are used in many applications, including:
• ATMs by bank customers
• EPOS terminals in cafes and other retail outlets, with buttons on the screen representing
prices for products
• Tourist-information kiosks and for public-transport enquiries
• personal digital assistants (PDAs), for choosing options and handwriting recognition
• interactive white hoards in education.

Advantages:
• They allow faster entry of the chosen option
compared with typing on a keyboard.
• It is easier to select options than by using a mouse.
• People with disabilities can find them easier :o use.
• There is less likelihood of selecting a wrong option.

Disadvantages:
• it can be difficult to enter data other than from a
list/set of options.
• The screen is fairly firm, so RSI could result from continual use of a finger to select options.

Graphic Tablet
This is a flat pad which one can draw or write with a special pen. A graphic tablet
is mostly used in architectural drawing with CAD software or in general artwork.
A graphic tablet enables greater control on the pen enabling one to write as if
you are using a normal pen and paper.

Uses
• Graphics tablets are often used to create computer graphics.
• In East Asia, graphics tablets are widely used :o write Chinese, Japanese and other language
characters, as users find it easier than typing these characters on a keyboard.
• Tablets are used to produce technical drawings and in computer-aided design (CAD).

Computer Studies Handout 19


• In some situations, users prefer to use a graphics tablet rather than a mouse as a pointing
device.

Advantages:
• They allow alterations to occur as the drawings are input, rather than later, as happens with a
scanned image.
• They are a more accurate way of drawing than using a mouse.

Disadvantages:
• They are more expensive than mice.
• They can be difficult to use in choosing menu selections.

Optical Character Reader


This is an input device used to read specially shaped character on a printed
or even hand written document. The OCR software then converts the
scanned image of text to a real text file which can be edited by a computer
program (usually a word processor), this is achieved through recognition of
each character from the document by way of matching with the nearest
character in the OCR software database. These days a standard scanner
can operate as an OCR, but however reading of data in tables is very inaccurate as the output
may not be as close to the original as possible.

OCR is commonly used to read prices off clothing tags in a shop and also to read post codes on
letters at the postal sorting offices. However here in Malawi we don‘t have post codes and
therefore we would not expect the local postal system to use an OCR. The main advantage of
an OCR is that the data in both machine and human readable which makes data verification
easy.

Advantages:
• It is a faster method of data entry compared with manually typing in the document.
• It is an easier method of entering data for people with disabilities.

Disadvantages:
• A lot of errors are produced.
• They cannot read handwriting very well.

Optical mark reader (OMR)


An optical mark reader is an input device which used infra-red
light to scan marks on predetermined positions on a pre-printed
form for example on a lottery ticket or on multiple choice exam
answer sheets. The OMR operates in the same way as with a
bar code reader.

An infra-red light is passed over a marked sheet, the light is


reflected back when a position on the sheet is marked, the position of the mark is then passed
back to the computer. The software will then match the position from which the light was
reflected with the information on the sheet which is programmed in the computer.

Computer Studies Handout 20


Uses
• They are used for the processing of many types of form; for example, registers and
examination responses.
• A form of OMR is used to input barcodes.

Advantages:
• It is a quick method of data entry.
• These devices produce greater accuracy of input than using OCR.
• It is easy for the user to fill in the form or paper to be processed.

Disadvantages:
• Compared with manual methods of marking, it is an inaccurate method. Forms sometimes
need to be manually checked prior to input.
• Forms have to be carefully designed, and this can be expensive.
Uses

Magnetic ink character reader (MICR)


A magnetic ink character reader is an input device used to read characters written using a
special ink which contains iron particles which can be magnetised when the characters are
passed through a magnetic ink character reader. The
process of reading the data is known as magnetic ink
character recognition.

The magnetic ink character reader is mostly used in banks on bank


cheques, this is mainly because this type of data input provides a high level
of security as any attempt to alter the number will be ignored by the reader therefore minimising
forgeries. Another advantage of the use of magnetic ink character recognition is that it is not
affected by dirt or creasing.

When you receive a cheque and deposit it in your bank, the amount on the cheque and your
account details are added to the cheque in magnetic ink in front of other magnetic ink character
recognisable number (usually just below the signature). The cheque is then sent to a clearing
bank to be read by another MIC reading machine and the written amounts are then transferred
between accounts by computers automatically.

Items of data written in MICR form on the cheque


1. Cheque number
2. Account number of the drawer
3. Branch number

Advantages:
• They are more secure than OCR as they cannot be tampered with.
• It is a more accurate method than OCR or manually inputting the information.
• Cheques can be read even if they have been overwritten.

Disadvantages:
• There is a limit to the character set that can be used.
• It is an expensive method of data entry.

Computer Studies Handout 21


Output Devices
An output device is an instrument (computer peripheral) used to display the results of
processing for example a monitor or a printer. Some of these devices hold temporary output
(e.g. monitors and speakers), while others produce hard copy (e.g. printers and plotters).
There is also the type of output device used in computer control. These will all be described
in this section.

Output devices can be divided into two groups;


 Hard copy output devices
 Soft copy output device.

Hard copy output devices.


This refers to devices which give out output in the form of a printout which can be carried
around such as output from a printer or a plotter.

Soft copy output devices


Soft copy output devices only allow people to view or listen to the information, but the
information cannot be taken away from the computer, for example output on a monitor or
from speakers.

CRT Monitors:

The computer monitor which is also known as the screen or VDU (Visual
Display Unit) is the commonest output device found on the computers. The
VDU uses a cathode ray tube to fire electron onto a thin coating of phosphor
dots inside the computer. The process results in the dots glowing therefore
forming a pixel.

Uses

• They are used in environments where space is not a problem.


• They are used when more than one user may need to view the screen simultaneously such as
in design use, for example when several designers may need to offer suggestions on a
prototype.

Advantages:
• They are cheaper than thin film transistor (TFT) monitors.
• They produce better quality images than TFT monitors, in terms of colour display and refresh
time.
• The screen display can be viewed from a number of angles.
• The VDU is quiet
• It is environmentally friendly as is does not waste paper.

Computer Studies Handout 22


Disadvantages:
• They are difficult to lift and manoeuvre.
• They emit harmful radiation in very small quantities.
• They can have a flickering screen, so prolonged use can cause headaches and eyesight
problems.
• it does not give a permanent copy to keep
• It is not suitable for users with visual problems as the flickering light can affect the eyes.

Liquid crystal displays (LCDs) - these use tiny crystals which work through polarisation of light
using a electromagnetic field. This is used together with special filters which can block the
passage of light. LCDs are lighter and use less power than a normal monitor which makes them
more ideal for laptops and are also used in watches and calculators.

TFT monitors

TFT or LCD monitors can be used in applications where space is limited, such
as small offices. They are, however, becoming more and more popular for
normal use, as prices fall. The screen contains thousands of miniature
transistors that are activated by the processor. Each pixel is formed by three
separate colour transistors: red, green and blue.

Uses

• They are often used when only one person needs to view the screen at a time.
• A TFT screen is an integral part of a laptop.

Advantages:
• They are easy to carry and manoeuvre.
• They produce less glare than CRT monitors.
• They emit less radiation than CRT monitors.

Disadvantages:
• The angle at which they can be viewed is limited.
• There is an inconsistency of colour tones when viewed from different angles.
• Videos can have slight blurring.
• They are more expensive than CRT monitors.

Printers

Printers can be placed into two main groups, namely impact and non impact printers.

Impact printers

The impact printers have a print head which moves across the paper, the head has
a set of pins which are pushed out on specific positions to form the shape of the
required character. The pins are directed to a ribbon which then strikes on the
paper therefore making a print. The impact printer like the dot matrix printer prints

Computer Studies Handout 23


line by line and each line can be printed several times to improve on the quality.

Uses
They are used in noisy industrial environments, such as garages and car servicing, car sales
and car repair services.

Advantages:
 They can work in environments which would cause problems for laser and inkjet printers,
as dirt and oil in the atmosphere do not affect their performance (robust).
 Cheaper than the non impact printers
 Ideal in situations where carbon copies are required as it can print more than one copy at
a time
 Continuous print jobs using pre-printed stationery are more easily managed.

Disadvantages

 Slow when printing


 Makes noise and therefore not ideal for office use
 Printing quality is very low hence ideal for draft copies

Non impact printers


There are two types of non impact printers, the ink-jet printers and the laser printer.

Ink-jet printer
Ink-jet printers use tiny nozzles which spray different coloured inks onto paper
to produce a character or a graphic image. The inkjet printer is ideal for home
use where there is no heavy printing.

Uses
• They are used where there are low output volumes;
the need to change cartridges at regular intervals / renders them unsuitable for high-volume
output processes. They therefore tend to be used in small offices and stand-alone systems.
• They are very good when applications require very high-quality output and where speed is not
an issue, for example digital camera applications.

• Inkjet printers are being developed that will create three-dimensional models. Successive
layers of plaster or resin are placed on top of each other using the inkjet nozzle. Layers of
adhesive may be ‗printed‘ on top of each layer to fix them together. The result is a three-
dimensional model representation using computer-aided design (CAD) software.

Computer Studies Handout 24


Advantages:
• They produce high-quality output.
• They are fast for printing one-page documents.
• They are cheaper to buy than other printers.
• They are easier to move than other printers.

Disadvantages:
• They are slow to print more than one page.
• They are more expensive to run because inkjet cartridges do not last as long as toner
cartridges.
• In very long print jobs, the printing could stop due to the need to change an ink cartridge.

Laser printer
The laser printer uses the same technology as the photocopiers, it uses toner ink
which is transferred to paper and then fixed in by heat and pressure. The laser
printer is ideal for office and business use where there is bulky printing.

Uses
• They are used in applications where low noise is essential, for example most networked
systems.
• They are essential in applications which require fast, high-quality, high-volume output, for
example in most offices and schools.

Advantages:
• Fast output is achieved.
• Running costs are cheaper than for inkjet printers.
• Large printout Jobs can be carried out quickly.
• The quality tends to be higher than other printers.
• Toner cartridges last much longer than inkjet cartridges and so laser printers can be used on
longer print runs than inkjet printers.

Disadvantages:
• They are limited in the paper size that they can take.
• Initial costs are high as they are expensive.
• The first page can be slow to print.

Graphics plotter - Flat-bed plotters are high precision printers used


to draw on paper with coloured ink pens. The plotters use motors
which move an arm across the paper in the ‗x‘ direction and a pen
unit up and down the arm in the ‗y‘ direction. An electromagnet lifts
and drops the pen onto the paper.

Plotters are often used by architects in engineering applications for drawing building plans.
Plotters are also used in science engineering to print circuit boards and machine parts.

Computer Studies Handout 25


Uses

• Plotters are still used to produce printouts of graphs, but are more frequently used to produce
blueprints, such as plans for the construction of a building, since these can be very large. ihey
are also used in other technical drawing and CAD applications.

• They are sometimes used to produce billboards and signs by replacing the pen with a cutter
and using special vinyl film on paper. This type of plotter can also be used to cut garments to
order.

Advantages:

 They can produce large printouts up to the size of a small room.


 The graphic output is of very high quality.
 They are fast when printing
 They are more accurate

Disadvantage

• They are more expensive than standard printers


• Filled areas of colour are difficult to produce using pen plotters.

Braille printer

Braille printer convert text into the Braille code, this printer produces patterns of raised dots on
paper for use by the blind.

Speaker:

Speaker can play music from the computer and also used for speech synthesis. The speaker is
an integral part of multimedia computers. It is vital for entertainment on the computer be it
playing games, watching a movie or playing an audio CD. Speakers are also useful for blind
users where text output can be synthesised.

Uses
• Speakers are required to play sound files attached to multimedia presentations and websites.
• Computers and MP3 players are used to play music from CDs and DVDs,
• Speakers are an integral part of home entertainment Systems.

Lights:

Light-emitting diode (LED) –

LEDs are power devices which use low power and emits light. LEDs are used to indicate
various actions on a device for example ―power on‖ for the computer which is indicated by a

Computer Studies Handout 26


green light and other actions like a flashing red light for 'hard disk‘ in operation. The LED is also
found on the monitor and many other control systems.

Control output devices

This section examines a limited number of output devices associated with computer control.

Relay switches & motors:

A computer can be programmed control traffic lights or electric motors in control


systems. In such systems the computer is programmed to turn switches ‗on and off‘
at the set times or depending on certain conditions. Motors are also used in the
industry to control robotic arms which are used to assemble cars, lift heavy items
and spray body parts

Uses

• Motors are used in many computer control applications

• In the home they are used in automatic washing machines to make the drum go round. They
are used in automatic cookers to switch on the heater fans. They cause water pumps to come
on in central heating systems. They are also used in computer- controlled greenhouses to open
the windows and switch on fans. They cause dishes that are being cooked to go round in a
microwave,

• In industry they are used to move robot arms and on production lines they cause the Conveyor
belt to go round. They are also used to cause component parts to he picked up and placed
accurately where they should go.

• In computers themselves they are used to cause moving parts to work in disk drives, both
optical and magnetic, as well as in scanners, printers and plotters

Actuators
Actuators are used to convert computer signals into movement.
Some devices such as motors are considered to be actuators in
their own right. Others, such as light bulbs and heaters, are
passive even when attached to a computer unless an intermediary
actuator is included. In these cases the actuator would convert a
computer signal into movement to cause the light bulb or the heater to come on.

Buzzers

An actuator is connected from the computer to the buzzer. The


actuator is set to switch the buzzer either on or off.

Uses

Computer Studies Handout 27


• Buzzers are used in automatic cookers and microwaves to tell you when the cooking process
has been completed.

• They are used in mobile phones designed specifically for young people. If someone feels
threatened they can hold down the # key on the phone and it actives an extremely loud buzzer.

CPU
CPU is short for Central Processing Unit. The CPU is the brains of the
computer, it is sometimes referred to as the processor or central
processor. The CPU is the computer itself where the calculations and
logical comparisons on data take place. The CPU determines the
power of the computer and all the other components which can be supported by
the computer depend on the CPU.

Most computers have a single processor but large computer systems can have many
processors. If a computer has more than one processor it is called a multiprocessor system.
The ordinary microcomputer consists of a single processor that fits on a single chip. This
processor is called a microprocessor (A complete computer on a single silicon chip).

Q Distinguish between a microprocessor and a multiprocessor system.

Two components of a CPU are:

 The arithmetic logic unit (ALU), which performs the arithmetic and logical operations on
data.
 The control unit, which controls the overall running of the computer, it extracts
instructions from memory and decodes and executes them.

Computer Studies Handout 28


Storage devices and media
The ability of a computer to store data is one of the main advantage of using the computer as in
most cases there will be need for one to go back and retrieve previously saved data, modify it
and they reproduce the data.

The scientific unit for measuring storage capacity is a byte, a byte is made up of 8bits. A bit is a
binary digit which is either a (0)zero or a 1 (one). One byte (a collection of 8 bits) make up a
character. If you group bytes together you will get a kilobyte (KB), a kilobyte is made up of 1024
bytes. Above a kilobyte comes a megabyte (MB) which is a collection of 1 048 576 bytes. Next
after a megabyte is a gigabyte (GB) which is equivalent to approximately 1000 megabytes
(1000MB).

NB. A bit is a binary digit, either a zero or a one (not a zero and a one.)

Storage device
A storage device is an instrument used to keep/retain/save data for later use for example a hard
disk. Storage devices can be divided into two;
 Primary store
 Secondary Store.

Primary Storage (Main Memory / RAM)

The primary store is used to store data currently being used, the immediate results of
processing and the instructions waiting for
processing. Primary store is volatile (Switching
power off erases all data in the primary store).
RAM (Random Access Memory) chips are used for
primary store. Primary storage is the fastest but most expensive type of storage. The RAM in a
computer is where the operating system is loaded to when the computer is switched on.
Application software programs are also copied to RAM when they are loaded, for example a
word processor or game is loaded into RAM before it can be used.

Apart from the processor itself the RAM is next single most important factor which determines
the speed of a computer, the more RAM you have installed in your computer the better.

(NOTE: For completeness, it is worth mentioning that two types of RAM exist called SRAM
(static RAM) and DRAM (dynamic RAM) – SRAM doesn‘t need to be constantly refreshed to
retain its memory unlike DRAM. Also note that computers use cache which is a portion of
memory made from SRAM. Memory caching works since programs usually access the same
data or instructions over and over again. By retaining as much information as possible in SRAM,
the computer operates more quickly (cache is usually termed level 1, 2 or 3 (termed L1, L2 or
L3).

Q Name the 3 types of data which are stored in the main memory.

Computer Studies Handout 29


Read Only Memory (ROM)

ROM holds the instructions for starting up the computer. This type of memory can only be read and
cannot be altered (i.e. deleted or written to) and is non-volatile (i.e. it doesn‘t lose its contents when the
computer is switched off).

Read only memory can be read from but cannot be written to, it is used to store firmware.
Firmware refers to programs hardwired onto the computer by the computer manufacturer
containing instructions telling the computer how to load the operating system.

ROM-BIOS
BIOS stands for Basic Input Output System, it holds the software required to provide the lowest
level of interface between the computer and its peripheral devices. The software in the BIOS is
also responsible for loading the operating system and this software come already written onto
the BIOS chips from the manufactures.

RAM vs ROM
The difference between RAM and ROM can be summarised by the table below.
RAM ROM
Loses data when the computer is switched off Does not lose data when the computer is
(Volatile) switched off (None volatile)
Information in RAM can be edited (add, delete, Information in ROM cannot be edited i.e You
modify) i.e, you can read and write. can only read from but cannot write to.

Types of ROM
 PROM (programmable read-only memory): This is a memory chip which is supplied blank with a facility
which enables a user through special software to write programs onto it. But once the PROM has been
written to one cannot wipe it clean and use it to store something else. Just like ROM, PROM is non-volatile.

 EPROM (erasable programmable read-only memory): An EPROM is a


special type of PROM that can be erased by exposing it to ultraviolet light. EPROM allows users change
programs which would have been written to them.

 EEPROM (electrically erasable programmable read-only memory): This is another variation of a


PROM which can be erased by exposing it to an electrical charge.

Secondary Storage (Auxiliary Storage / Backing store)

Secondary store is the storage location where data which is not currently needed is stored, but
ready to be retrieved when needed. Secondary store is non-volatile (switching power off does
not erase the data ). Examples include Hard disks, floppy Disks, Compact Disks, Magnetic
tapes, and many others. Backing store is used to hold both programs and data.

Facts on secondary store

 It is always slower to access data from secondary store than from primary store.
 Data stored in backing storage is retained when the computer is turned off but data
stored in main/internal memory is lost.
 When the user wants to access the data from backing storage it is copied to the
main/internal memory of the computer.

Computer Studies Handout 30


Floppy disk Compact Disk Magnetic Tape Flash disk

Secondary Storage devices can be divided into two;


1. Direct access.
2. Serial access

Direct access
Offers random access to data, where one can go straight to the wanted record e.g. on a disk.
Time taken to retrieve a file does not depend on its location on the storage media. To access
data on a direct access device one can go straight to the desired record without going through
preceding records. Direct access storage is most appropriate for real time and online systems
such as ATMs, Process control, Airline reservations, where data has to be processed as soon
as it is entered.

Online – When one is directly linked to the computer


Real-time – an online system which processes data as soon as it is entered and the results are
produced quickly to affect the current environment, e.g. airline reservation and process control
systems.

Advantages of direct access storage devices


i. Offers faster access to data as compared to serial access.
ii. Files are easy to update as they can be updated in situ

Disadvantage
Direct access storage media is more expensive than serial access storage media.

Serial Access
In a serial access system records are accessed in the order in which they are stored, to access
a record you have to go through all its preceding records usually done on a magnetic tape. In
serial access the records are not sorted in any particular order and this is common with
transaction files and such files will need to be sorted before they can be used to update the
master file.

Sequential Access
In a serial access system records are accessed in ascending or descending key sequence
(order) for example on a magnetic tape.

Q What is the difference between serial access and sequential access?

Advantages of serial access


1. Uses inexpensive media such as a magnetic tape.
2. ideal for situations where all records will need to be accessed e.g a payroll
3. Enhances/enforces creation of backup files

Computer Studies Handout 31


Disadvantages
1. Slow to access data as access to a record depends on its location on the storage media
2. Difficult to update as records cannot be updated in situ

Magnetic Storage Devices


Hard disk:

The hard disk is usually the default secondary storage media for a typical computer.
The hard disk is made up of a number of disks held on a spindle. Data can be stored
on either surface of each disk with each surface having its own read/write head
making it faster to read the data from a disk. The operating system, applications
software (e.g. word-processor, database, spreadsheet, etc.), games and any program or data is
usually stored on a hard disk. Typical home/school computers have a disk capacity of about
120 gigabytes. The storage capacity of hard disks has evolved quite rapidly from an average of
500 megabytes about a decade ago to as much as 120 gigabytes today.

Data on a magnetic disk is stored in the form of magnetised spots on the flat disk surface
organised into tracks and sectors. The circular surfaces constantly rotate at high speeds
around the read/ write to enable data to be written to or read from them.

Uses
Fixed hard disks are essential in any system that requires fast data access times and fast
data transfer rates.
• They are used in real-time system such as robotics, rocket launching, etc.
• They are essential in any online system such as booking systems, EPOS stock control
and electronic funds transfer.
• They are used in file servers in computer networks.

Advantages

 Very fast access to data (provides random access), The access speed is about 25
milliseconds for faster disks and about 60 seconds or more for the slow access ones.
 Easier to update as data can be updated in situ (Implying that data can be updated
where it is as compared to magnetic tape where one needs another tape to hold the
changes.
 More robust as the actual disk is sealed in a cover.
 They have a very large capacity.

Disadvantages

 Hard disks are more expensive than magnetic tapes.


 Hard disks are fixed inside the computer and therefore not portable.

Computer Studies Handout 32


Portable hard disks

These are used to store data in exactly the same way as fixed hard disk but, as their
name suggests, they can be easily disconnected from a
computer. They are used to transfer large files from one
computer to another. They often have a capacity in excess of
500 GB and so can store much larger files than an optical disk.

Uses
They are used as backup media and for transferring large files from one computer to
another. They are particularly useful for transferring server software from one network to
another.

Advantages:
• Data access times are fast.
• The data transfer rate is fast.
• They have a large capacity.

Disadvantages:
• If dropped, they are easily damaged.
• The transfer rates are not as fast as with fixed drives.
• They are more expensive than other forms of removable media, such as CDs or DVDs.

Floppy disks:

Floppy disks used to be the most common backing store media for personal computers
but they are quickly being replaced by flash disks. The 3½ inch floppy disks can be found
on most microcomputers, they have a storage capacity of 1.44 MB of data which is
enough to hold a book of about 400 pages of text (graphics/picture take up more space
that text). The 3½ inch floppies replaced the historic 5¼ inch floppies which had a
capacity of 720MB.

Advantages

 helpful for transferring data from one computer to another


 helpful for back-up of small files.

Disadvantages:

 They are easily damaged if not well looked after


 Strong magnetic fields can damage or alter the data.
 They are slow to access because unlike hard disks which constantly rotate floppies
only start spinning when accessed. The access speed is about 0.06MB per Second

Computer Studies Handout 33


Zip Disk

A zip disk is high storage removable storage media usually used for backing
up office applications, Photos, videos, music and presentations. A Zip disk
has a higher storage capacity than floppy capable of storing up to about
70MB and a faster access speed of about 2.5MB per second.

Jaz disk

Jaz drives are high storage removable media capable of storing up to 2


gigabytes which are quite useful when moving large office application files.
Jaz drives have an average seek time of about 10ms and an average data
transfer rate of 7MB per second. The storage capacity although higher
than that of a zip disk is quite far below that of a hard disk.

Magnetic Tape:

A serial access storage media made up of a plastic strip which is magnetisable


using an oxide coating. A magnetic tape was the most prominent backup
storage media in the early days because of its high storage capacity. Tapes are
quite suitable for backing up hard disks because of their storage capacity a
copy of which can be kept in a safe place away from the computer.

Uses
They are used in any application that requires an extremely large storage capacity and
where the speed of accessing data is not an overriding requirement, such as:
• batch-processing situations, for example updating bank accounts with cheques
• utility billing systems, where all customer bills are produced at the same time and every
customer record has to be processed
• payroll applications, because all records have to be read in sequence, so direct access
has no advantage in this case
• making backups, as this is also an application where every item of data has to be read.

Advantages:
• They are cheaper bit for bit than using disks.
• They are very robust as they are encased in a cartridge.
• They are easier to remove and keep away from the computer than equivalent-sized
disks.
• The data transfer rate is fast.
• Magnetic tape can store large quantities of data as compared to most other removable
storage media.
• Suitable in situations where all records have to be accessed for example a payroll
system.

Computer Studies Handout 34


Disadvantages:

1. Slow to access data this is because one cannot go directly to a required record
on the tape.
2. Difficult to update as they cannot be updated in situ, when one wants to update
records on a tape s/he has to use another tape and transfer all the new records to
a new tape.
3. Tapes can be easily damaged because the plastic strip has to pass through an
open area where it is read from therefore exposing it to possible damage.

Optical backing storage media such as CDs and DVDs

CD ROMs/DVD ROMs

This form of optical disk is read only memory (ROM), which means it
can only be read from. It cannot he recorded over. The main
difference between CDs and DVDs are their capacity. DVDs can hold
up to ten times the amount of data that a CD can store; DVD writers
use a shorter wavelength of laser light than CD writers do, so the pit on the disk surface is a
lot smaller and more can be stored in the same space. Both forms of the media are portable
and most CDs can he read using a DVD drive but not vice versa.

Uses
They are used for applications which require the prevention of deletion of data, accidental or
otherwise.
• CD ROMs are used to store music albums and to provide audio output in home
entertainment systems. ihey are also used to store software, con1putr games and reference
books such as encyclopedias.
• DVD ROMs are mainly used for storing films, but are increasingly being used for data
storage.

Advantages:
• 1)VDs hold more data than a CD.
• CDs are cheaper to buy than a DVD.
• Beth hold much more data than a floppy disk.
• Both are cheaper than hard disks.
• Both are more robust than hard disks.

Disadvantages:
• Data transfer rates for both CDs and DVDs are slower than hard disks.
• Data access times are longer than for hard disks.

CD-Rs and DVD-Rs


The R in their names stands for recordable. They can be written to once, and then they
become CD or

Computer Studies Handout 35


DVD ROMs. The feature that enables them to be recorded over is the use of a very thin Layer
of organic material. There are no pits formed on the surface. Instead, the laser beam causes
spots on the dye cover to be heated up. The reading process distinguishes between the heated
and unheated spots. As for CD and DVD ROMs, the DVD recorder uses a shorter wavelength
of light than the which enables smaller spots to be heated hence more data to be stored. A
different dye has to be used with a DVD because of the shorter wavelength.

Uses
• They used for home recordings of music on CD as on DVD.
• They are both used for storing and transferring data from one machine to another.

Advantages
• They are cheaper than CD/DVD RWs.
• Once burned they cannot be accidentally written

Disadvantages
• They can only be recorded on once. If a mistake is then the disk needs to be thrown away.
• If several versions of a file are written to the disk, there is less space available than on
C1)/DVD RWs.
• Not all CD players will read CD Rs.

CD RWs and DVD RWs


These are rewritable (RW) optical disks and can be written to several times. Unlike CD/DVD Rs
they do not become CD or DVD ROMs after being written to once. The recording surface of CD
and DVD RWs is a metallic alloy layer. The power of the laser changes spots on the surface
from one phase to the other by causing it to melt or freeze. The surface appears to be pitted like
a CD or DVD but this is just an optical effect.

Uses
DVD RWs are frequently used for recording a television programme that would otherwise be
missed. This recording can then be erased after viewing, ready for recording of another
programme.

Advantages
• They can be used more than once.
• Different versions of files can be overwritten, thereby virtually increasing capacity
Disadvantages:
• Their cost makes them impractical for use as permanent backup media, unlike CD/DVD Rs.
• Files can be overwritten accidentally, unlike with CD/DVD ROMs.

DVD RAMs
The digital versatile disk random access memory (DVD RAM) is a newer technology. The
recording surface is an alloy coating, as with DVD RWs. However, the
data is stored in concentric tracks like magnetic media, unlike the single
spiral of a single track
that is used in other optical media. They usually come in cases that
have to be loaded into the DVD RAM drive. They have the same
properties as DVD RW but have quicker access times. Writing and

Computer Studies Handout 36


reading can occur simultaneously) so it is possible to record one programme whilst watching
another. They are much longer lasting than other forms of optical media and can be rewritten
approximately 100 times more than a DVD RW Writing to disk is more reliable because the
drive has an inbuilt data check to ensure data is written to the disk accurately

Uses
• DVD RAMs are used for general data storage.
• They are used for archiving, as they are longer lasting than other media.
• In some camcorders, they are used for recording video.

Advantages:
• They have a greater capacity than CD/DVDs.
• They are more durable than DVDs, in that they can be overwritten more times.

Disadvantages:
• They are not compatible with most DVD players.
• They are more expensive than other types of DVD media.

Blu-ray disks
These have the largest capacity of all optical disks; 25 Gb, 50 Gb and 100
Gb. The increased capacity is due to the fact that it uses a shorter wavelength
for its laser beam, using light that is close to the blue/violet spectra (hence its
name) rather than the red light used by other optical devices. They are coated
in a protective lacquer to prevent damage to the surface but operate in a
similar fashion to other optical disks. They are used for storing films (movies):
25 Gb equates to 2 hours high definition (HD) television, 13 hours standard definition television.
It is possible to play back video on a disk while simultaneously recording high definition video.

Uses
• Their main use is in home video game consoles.
• Devices have been developed to facilitate the playing and recording of videos.
• PCs and laptops are being developed that use blu-ray disk drives for data storage as well as
playing videos.
• They are used in many camcorders.

Advantages:
• They store more than other optical media.
• Data transfer rates are high.
• Access speeds are higher with blu-ray players than with other optical devices.

Disadvantages:
• They arc very expensive compared with other data storage media.
• There have been problems with the encryption techniques used to prevent piracy.

Computer Studies Handout 37


Minidisks
This is a form of hybrid media, that is to say it uses both magnetic and optical
methods to record data.
A laser is used to heat one side of the disk which makes it easy for the disk to be
magnetised. A magnetic head is used to magnetise spots on the other side of the
disk to record data. The data is read using only the laser. Disks can he recorded over several
times. The disk is permanently housed in a cartridge. Although extremely popular in Japan, it
has not enjoyed as much success elsewhere.

Uses
They are used in portable music players. but have been superseded by MP3 players, iPods,
and so on.

Advantages:
• Minidisks can be recorded over more times than other media.
• They are more robust than other optical media.

Disadvantages;
• Minidisks have slower transfer rates than other disks.
• They hold less data than other music players.
• They are more expensive than other portable players.

Solid state backing storage


We now move away from optical media and move on to other types, which are not necessarily
optical or magnetic. Solid state backing storage is basically a silicon chip consisting of a grid of
columns and rows of cells, each cell comprising two transistors separated by a thin oxide layer.
The cell has a value of I or 0 depending on its charge. They have no moving parts and so are
less likely to break down. They are used as removable storage in flash memory, in the form of
eithe memory cards or memory sticks, as described below

Memory sticks/pen drives


These can store up to several Gigabytes. In order that the data stored
on a memory stick can be used,
the memory stick must be connected to a computer, achieved by means
of a USB connector. In order to work, the memory stick draws power
from the computer via the USB interface.

Uses
• They are used to transport files and backup data from computer to computer.
• They are used by system and network administrators for carrying software fixes.

Advantages:
• They are more compact than equivalent optical or magnetic media.
• They are more robust than other forms of memory, even surviving being washed
• They do not need software drivers to operate.

Computer Studies Handout 38


Disadvantages
• Flash drives cannot be write protected.
• They are more expensive per Gbyte than hard disk

Flash memory cards


Flash memory cards is a form of electronically erasable read-only memory (EEPROM). It is a
solid state memory.

Uses
• They are used for storing photographs in digital cameras.
• They are used in mobile phones to store phone numbers, photographs, etc.
• They are used in MP3 players to store music.
• They are used as backing storage in many handheld computers.
• They are more compact than equivalent optical or magnetic media.

Advantages
• are more compact than equivalent optical or magnetic media.

Disadvantages
• they are more expensive per Gbyte than hard disk
• they can only he used for a particular number of read/write operations.
• they have lower storage capacity than hard disk

Some storage devices can access data very quickly, whilst others are extremely slow...

* Note: Modern back-up tapes have very fast access speeds, but only to save/read data sequentially (they
are serial access devices). Tapes are very slow if you want to read files out of order, since the tape has to
be rewound and fast-forwarded.

Access speeds are measured in bytes per second (Bps).


Slow devices have speeds measured in thousands of Bps (kBps).

Computer Studies Handout 39


MP3 (MPEG-3)
MPEG-3 uses an audio compression technology; it compresses CD-quality sound by a factor of about 10
whilst retaining most of the quality e.g. a 60 Mbyte CD track is turned into a 6 Mbyte MP3 file. Music data
is often stored on an MP3 player which plugs into the computer through a USB port. The music data is
downloaded to the MP3 player where it is stored in a file. The player has its own internal battery which
allows a user to listen to the music files through personal head phones or connect the player to an
external sound amplification unit. Variations of MP3 players (e.g. I-pods) exist which use their own file
structures when storing music; these require compatible software to enable files to be stored in the
correct format.

MP4 (MPEG-4)

MPEG-4 files are in a format that can hold a mixture of multimedia objects such as audio, video, images,
animation, etc. MP4 players again use compression technology to store data in files. They operate in
much the same way as MP3 players described above.

Flash memories
These are non-volatile re-writable memories evolved from the EEPROM; they are often connected to the
USB port on the computer enabling a user to transfer files between computers.

SD (secure digital) cards are a type of flash memory used in digital cameras and mobile phones. XD
(extreme digital) cards are also a type of flash memory used in digital cameras and are similar to SD
cards.

Credit cards and smart cards


Credit cards contain a magnetic stripe on the back which is made up of iron-based particles in a plastic
film.

The stripe is split up into three tracks which are read by a magnetic stripe reader. Usually only tracks 1
and 2 are used. The information stored usually follows the following format:

track 2 track 1 description


√ √ start sentinel (1 character only)
√ format code (―B‖) (1 character only)
√ √ account number (19 characters)
√ √ separator (1 character only)
√ √ country code (3 characters)
√ name (between 2 and 26 characters)
√ separator (1 character only)
√ √ expiry date or separator (4 or 1 character(s))
√ √ service code (3 characters)
√ √ optional data to fill up (max record length – 79)*
√ end sentinel (1 character only)
√ √ character check (1 character only)

(* the optional data often contains a PIN verification code or card verification code)

Differences between primary store & secondary store


Primary store Secondary store
Located closer to the CPU Located away from the CPU
Loses data when power is off (volatile) Does not lose data when power is
switched off (non volatile)

Computer Studies Handout 40


Smaller in size Bigger in size
Stores less data Sores more data
Expensive Cheaper than primary store
Faster to access data Slow to access data
Comparing storage devices:
Storage 1 CD-ROM (650 MB) = 451 Floppy disks (1.44 MB)
capacity 1 DVD (4.7 GB) = 7 CD-ROM's (650 MB)
Access Harddrive CD-ROM Floppy disk
speed 1000 KB/s 100 KB/s 36 KB/s

What is a peripheral Device?

Portable communication devices

Devices that can be carried on one‘s person, this includes devices that communicate with us
and not just devices that we use to communicate with other people.

Mobile phones
Mobile phones work using the transmission of electromagnetic radio waves. They have a
transceiver which is only powerful enough to transmit or receive information from the nearest
mobile phone mast or tower. This must be within 10 kilometres of the phone.

Mobile phones are used primarily for making phone calls for personal and business use.
However; most phones have other features as well, such as Internet access, a personal digital
assistant (PDA) interface, games and e-mail and text facilities. They are used to store
information about personal contacts. They are also used to watch television and can be used to
record video or still photographs.

Uses
• They are mainly used to make business and personal phone calls.
• They are particularly useful in remote areas with satellite dishes if a landline is unavailable.
• They are a convenient method of sending and receiving urgent messages for business
purposes without necessarily interrupting conferences.

Advantages
• They can be used while travelling if a public phone is unavailable.
• They can be used to send photographs/video footage.

Disadvantages
• They cost more to use than a landline.
• The quality of photographs/video can be poor.
• They can lose connection if travelling through a ‗blind spot‘
• Displays are still small compared to other devices.
• They have a limited battery life.

Computer Studies Handout 41


Portable DVD players

These work in exactly the same way as conventional DVD players but come equipped with a
built-in screen. The size of the player is smaller, as is the screen, so making them easy to carry.
They are mainly for personal use rather than business. They are used in cars/planes/trains for
passengers to watch while on a long journey.

Advantages:
• They are small and compact.
• They can play music from CDs.

Disadvantages:
• The screen is low resolution and the quality of viewing can be poor.
• The screen is small, making it difficult to view.

Portable media players


These can be basic devices for storing music for playback using earphones. There are also
more advanced devices, with screens that are capable of playing back video or can be used for
video games. They can be connected to speakers to enhance the quality of the output. Although
the batteries have to be recharged from time to time, they can be connected to home computers
that can charge the battery while allowing the user to listen to the music. Connecting the player
to the computer also enables the downloading of music and data files as well as Internet data.
Various methods of data storage are used, depending on the manufacturer, including small hard
disks, micro drives and flash memory.

Uses
• They can be used for downloading music and radio! television programmes.
• They can be used for downloading data from the Internet or the movement of large amounts of
data from one computer to another in a similar way to memory sticks.

Advantages:
• They are compact.
• They can hold up to 100 GB of data.
Disadvantages:
• They have very small screens.
• The earphones that come with the player are low quality

Global positioning systems (see also computer applications)

Global positioning systems (GPS) work by making use of satellites that orbit the earth. There
are a number of these satellites, such that at least four are visible in the sky to any point on the
Earth‘s surface. Receivers are used in navigation (see below) and for drawing maps as well as
for military purposes. The exact position of the receiver can be determined by carrying out
calculations based on the position of the satellites and the time taken for the signals to get to
the receiver. Three satellites would normally be enough for this purpose but the use of four
makes it a very accurate system.

Uses

Computer Studies Handout 42


• GPS can be used by runners to pinpoint their position, distance travelled and speed.
• They are also used by surveyors.

Advantages:
• Positioning and distance travelled can be achieved regardless of the surrounding terrain, tall
trees or buildings.
• Greater accuracy for measuring distances than using cars or bicycles.

Disadvantages
• Transmission of data can be a little slow at times, leading to slight inaccuracies.
• They are expensive devices.

Satellite navigation systems


Using GPS and stored data the system can be used to quickly calculate a route. The GPS
calculates the position of the driver and the stored data consists of data about all roads in the
country in the form of map coordinates. Up-to-date information about traffic congestion or
accidents are also fed to the device using radio waves.
Uses
These are used by drivers to produce a route for their ca or lorries, including alternative routes
in the case of a traffic jam.

Advantages:
• They are quicker to use than a normal road map.
• They receive tip-to-date traffic conditions.

Disadvantages:
• The display is very small.
• Unsuitable roads can be recommended.

Handheld computers, including PDAs


These refer to any type of small computer that can be carried in one hand. They have small
screens and are used mainly in areas where the power can not be relied upon. They are also
very useful for travellers due to their portability,

Mobile phones are considered to be handheld computers, as are PDAs are a particular kind of
hand held computer that come with many of the modern technologies. They are fitted with a
touch screen that is navigated using a detachable stylus. Text is entered using a keyboard
which appears on the screen. PDAs have several features including basic database, word
processing and spreadsheet software. They have the ability to be used as phones, to connect to
larger computers using Bluetooth technology, to access the internet and to use GPS. Some
PDAs that are used as phones may not have a touch screen but use a keyboard instead.

Uses
They are used by professionals whose job requires them to be travelling for some or much of
the time, for example doctors who are on call can keep track of patients‘ records.
•.Computer engineers who move from installation to installation can use them to keep records of
their day to day activities, as well as scheduling appointments and carrying any software ‗fixes‘
that need to be used on systems.

Computer Studies Handout 43


• They are used to store addresses, phone numbers e-mail addresses as well as keeping track
of appointments.

Advantages
• can be used remote from the place of work.
• are easier to carry than laptops.

Disadvantages
• Difficult to enter much text.
• They are about as expensive as laptops.
• They have a limited operating system.
• They have limited application software.

Bluetooth
Bluetooth was developed by a Scandinavian company and was named after King Harald Batan
of Denmark, whose nickname was Bluetooth. It uses radio waves to connect devices such as a
headset and a mobile phone. The maximum distance over which two devices can communicate
is usually 10 metres, although greater distances are possible with a power boost. The data
transfer rate is usually lower than 1Mbit per second.

Wireless fidelity (WiFi) is an alternative to Bluetooth and is used for all but the smallest of
wireless communication areas.

Uses
• It is used for communication between a mobile phone and a headset so that drivers can
concentrate on driving.
• A mouse, keyboard and printer can be connected wirelessly to a PC using Bluetooth.
• Data can be transferred between devices such as photographs from one mobile phone to
another.
• Games consoles use Bluetooth to connect to their wireless controllers.

Advantages:
• It can be used for a variety of applications, whereas WiFi is only used in local area networks
(LANs) where cables would otherwise be used.
• It has cheaper hardware requirements than WiFi.
• It consumes less power than WiFi.

Disadvantages:
• The data transfer rate is slower than with WiFi.
• It covers smaller distances than WiFi.

Peripheral Devices
What are Peripheral devices?

Peripheral devices are devices connected to the computer but external in relation to the
processing unit. If a peripheral device is disconnected, the computer will still be able to work;
only functions performed by this peripheral device will not be available. For example, if you

Computer Studies Handout 44


disconnect a keyboard, you would not be able to type in information but you will be able work
with the graphical user interface by clicking the mouse. If you remove the hard disk, you will
have to start up your computer using floppy disk and you will have to save your data on floppy
disks only but the computer will still be working.

Peripheral devices can reside inside the computer case or outside. For example, a mouse, a
keyboard, a monitor is always outside the case and they are connected to the computer via
ports, which are situated on the back of the case. Disk drives are positioned inside the case and
they are connected directly to the motherboard via a data cable.

Questions

1. Name the methods used to represent information on A, B, C, D and E using the words
from the list below.

Bar code Chip DVD ROM


Flash memory Graphics tablet Light pen
Magnetic ink characters Magnetic stripe Optical marks
Optically read characters Plotter Remote control [5]

2. Name two items which are input devices.

Buzzer Dot matrix printer Graph plotter


Graphics tablet Laser printer Touch screen [2]

3. Name two items which are storage devices.


Bar code reader Keyboard Laser printer
Memory stick Mouse Zip disc drive [2]

4. Ring two input devices.


Bar code reader Joystick Monitor
Plotter Printer Speaker [2]

Computer Studies Handout 45


Types and components of a Computer System

Computers can be classified into various groups depending on size, cost and use. Basically
computers can be classified into 3 groups, namely micro-computer, mainframe and super
computer.

1. Microcomputers – this is the most common class of computers usually used by the
home, office and school users. They can be divided into different types:
a. Desk top computers – the most common in this group which
comes complete with a CPU both with a relatively small hard
disk, a floppy drive, CD/ DVD rom. It also comes with the
monitor, mouse and a keyboard

b. Notebooks (laptops) - these are small and portable making


them easy to carry around. The lap top can run both on the
mains or on a rechargeable batteries making them handy for
business people who would want to have access to their work from anywhere.
Laptops normally use touch pads instead of a mouse and also have a fixed
keyboard.

Laptop computers have the obvious advantage over desk top computers (PCs) in that they are fully
portable. This is of particular value if a user wishes to do work away from the office (e.g. when travelling)
or if they want the freedom to work anywhere within a building taking full advantage of WiFi technology.
One of the main considerations when buying a laptop is the battery life. This can depend on a number of
things but one major factor is the processor specification. The following is a list for consideration:
- the processor should consume as little power as possible thereby prolonging internal
battery life
- the processor should run as cool as possible minimising the problems associated with
heat dissipation
- no fans needed to cool the processor thus reducing the load on the internal battery

The main disadvantages of laptops compared to desk top PCs are:

- they tend to be more expensive to purchase


- it is easier to steal a laptop
- security risks (if sensitive data is stored on the internal hard drive)
- laptops tend to have a lower specification than an equivalent desk top computer

c. Palm-tops & PDAs (personal digital assistants) - These are small hand-held
computers. PDAs are used as diaries and also used to store contacts. PDA are
usually supplied with a word processor or a spreadsheet, internet and email
software. PDAs can be linked to bigger computers in the same way phones can
be linked to computers that‘s though a direct cable or the use of infa-red links or
even blue tooth.

Computer Studies Handout 46


d. Embedded computers - A number of home devices these days contain a built in
computer for example a washing machine, digital camera, television set,
microwave oven and many other home devices. The built in computers gives
functionality to these devices enabling them to perform a number operations
without the user intervention for example the microwave oven which is able to go
through a number of routines when preparing food and is able to adjust
temperature and switch the unit off when its done.
2. Main-frame computers – the next bigger size than the microcomputer group but smaller
than the super computer. Mainframe computers are capable of processing and storing
huge amounts of data and handling a number of users. They would be used by large
utility companies such electricity supply companies as well as banks etc.
3. Super computers - these are the fastest and the most expensive
computers with an average cost of over 50 million US$. Super computers
are mainly used for scientific research and to control large networks in
banks and in the military. In simple terms a supercomputer is a big
mainframe computer.

Operating system facilities

What is an operating system?


An operating system is a set of programs residing in the main memory (RAM) which drives the
computer.

Functions of an operating system.


1. It starts/ boots up the computer
2. Performs memory management (Where more than one program is loaded, the
operating system has to allocate sections of memory (partitions) to each program.)
3. Performs security management by way of checking for user name and passwords
4. Loads programs to be used for example loading the application software such as
a word processor or a spreadsheet.
5. Performs back up management (Including the creation, updating and deletion of
files. Managing the FAT (File Allocation Table) and the directory of files.
6. Performs utility management (Formatting a disk, scan disk, defrag mentation,
zipping e.t.c)
7. Performs Interrupt handling (Detecting and servicing interrupts, also known as
error handling)
8. I/O Control Controlling data flow to and from peripherals
9. provides a user interface
10. device management (input/output control)
11. security (e.g. log on, passwords, etc.)
12. spooling
13. batch processing
14. multiprogramming
15. error reporting and handling
16. - processor management
17. - maintain user accounts

Q State three tasks done by the operating system.

Computer Studies Handout 47


Types of System
Aim
Candidates should be able to distinguish between the different types of system, to describe what is needed to
support them, to explain which is the most suitable for any given application and to discuss the consequent
implications for the user. Candidates should be able to describe particular problems in the management of the
various types of system, such as conflicting access to common data or critical timing considerations.

 Single user system – A systems which allows only one person to use the computer
at a time like the PCs here at school.
 Single-user on-line systems...
allows for interaction between user and job, to influence future processing with the
user directly linked to the computer.
Example : Using a microcomputer for playing a computer game; word-processing;
 Multi-user On-line systems (Multi-access systems)
- This is whereby two or more users can have access to a central computer concurrently
and interactively.
Example : users using terminals to access and run software on a central computer.

Operating system facilities:

The main purpose of the operating system is to provide for an interface between the user
and the computer and as such different software houses have designed different
operating system environments with the aim of developing the most suitable environment
given a task.

Operation system environment/ interface


There are four main types of interfaces provided for by operating systems, namely
1. Command line interface
2. Graphical user interface
3. Menu based interface
4. form based interface

1. Command line interface


This is a type of an interface where the user has to type in the commands when entering
instructions e.g. when using DOS. This type of interface is difficult to use as one has to
remember the commands.

Advantages
i. More secure than GUI
ii. Uses less memory and storage space
iii. It is more open as it does not restrict options available to the user and hence this
type of interface is ideal for system administrator and system developers
iv. Does not require specialised hardware & software

Disadvantages
i. Difficult to learn/use

Computer Studies Handout 48


ii. Slow to enter commands as one has to type
iii. Does not allow multitasking

2. Graphical user Interface (GUI)


A WIMP (Windows Icon Menu Pointer) system of interaction with the computer which allows
users click on icons (graphical images) to carry out a command.

Advantages
i. User friendly (easy to use)
ii. Less errors when entering commands
iii. Faster to use as one just clicks on an icon
iv. Offers better memory management
v. Allows multitasking

Disadvantages
i. Uses more memory/ storage space
ii. Requires specialised hardware (cannot run on old 386 machines)

3. Menu based interface


This is a type of an interface where the user will select options from a list of menu options which
can be pull down or pop up menus. The menu based interface is more ideal in situations where
there are limited options and the user knows the available options.

4. Form based interface


With this type of an interface the computer will display a form for the user to fill in information
on predetermined positions. This type of an interface is ideal in situations where the user is
collecting information from clients over the phone and the operator will be typing in the
information.

5. Natural language
This interface enables the user to ―talk‖ with the computer where the computer asks
questions and the user will answer back using a microphone. With this type of interface the
user is required to go through a set of words before using the system to enable the system
to understand the user‘s pronunciations.

Peripheral device control


The operating system has to use a number of techniques to enable optimum and efficient
running of the computer when controlling several peripherals connected to the computer. (Take
for example the mouse is being clicked the hard disk has to save data, the monitor is displaying
the information while the printer is printing and at the same time all this has to be held in
memory).

1. Buffering
A buffer is a temporary storage space for data in transit from a fast processor to a slow
peripheral (e.g. a printer) to cater for differences in processing speeds e.g. printer buffer.

Computer Studies Handout 49


So buffering is a technique used to ensure optimum utilisation of the CPU in this case where
the data from the CPU is all released to the buffer and later released at a slow speed which
matches that of the printer thereby releasing the CPU to carry out other tasks (another
example of a buffer is the keyboard buffer.)

Q Name any other example of a buffer other than a printer buffer.

2. Spooling – (Simultaneous Peripheral Operation OnLIniNG) An extension of buffering but


in this case data from a fast peripheral is spooled (written) to a fast peripheral before
being released at low speed to the slow peripheral. Taking for example large volumes of
data which needs to be printed may be too big for a buffer and therefore is written to
Hard disk which is faster than a printer but not as fast as the CPU and then released at a
rate which matches that of the printer.
3. Interrupt – A signal generated by a peripheral which alters the sequence in the which
the operating system carries out its functions (e.g. if one is using the computer while
printing and the printer runs out of paper the printer will generate an interrupt which will
display a message on the computer)
4. Handshaking – Exchange of signals between two communicating devices to establish
readiness to communicate.
5. Polling – Checking of a peripheral by the CPU to see if it requires processor attention.
This is done in a round robin way.
6. Check sum A total obtained from adding up a block of data which is sent together with
the block recalculated at the end and compared against the stored one to see there has
not been an error in the transmission of data.

Types of system
Candidates should be able to distinguish between the different types of system, to describe
what is needed to support them, to explain which is the most suitable for any given application
and to discuss the consequent implications for the user. Candidates should be able to describe
particular problems in the management of the various types of system, such as conflicting
access to common data or critical timing considerations.

 Real-time processing
This is an online system where data is processed as soon as it is entered and the results
of processing are produced quickly and sufficiently to affect the current environment.
Example : a control system

 Real-time transaction processing


This is an on-line system in which individual, discrete transactions are processed as they
occur.
Example : an airline booking system; a supermarket stock control system.

When booking seats on a flight, for example, real time (transaction) processing would be
used. Response to a query needs to be very fast and once a seat is booked it needs to

Computer Studies Handout 50


marked as ―not available‖ immediately to avoid any risk of double booking. Using this
example of booking seats on a flight, the following sequence of events would take place:
- customer/travel agent contacts the airline
- the customer/travel agents types in the day/time of flight and number of travellers
- the customer/travel agent types in the departure airport and the destination airport
- the airline database is searched and availability of seats checked
- if seats are available on the required day/time then a booking is made
- the database/file is updated immediately to indicate that these seats are no longer
available and prevents double booking from occurring
- if no seats are available a message is sent back to the customer/travel agent
- this uses real time (transaction) processing since the files are updated in real time;
interrogation of files will have access to totally updated information

(NOTE: the above is sometimes referred to as pseudo real time since some applications don‘t
need immediate updating of the files)

Real time process control


Process control is a real time system. But this is very different to real time (transaction) processing; this
system usually involves sensors and feed back loops i.e. the output can influence the next input to the
system.

Sensors send data (via an analogue to digital converter – ADC) to a computer or microprocessor which
decides whether or not to take action (based on comparison with stored data). If a change needs to be
made, the computer/microprocessor sends signals (via a digital to analogue converter – DAC) to the
devices being controlled and alters their status (e.g. turn a heater on if a temperature sensor indicates
that a temperature is too low) – actuators are often used to open valves, turn on equipment, etc. As this
is continuously monitored, eventually the temperature will equal the stored value in the
computer/microprocessor – this will then cause the heater to be turned off.

In real time (transaction) processing files are often updated in real time (e.g. when booking flights on an
airplane); but in real time process control, physical quantities (such as temperature) are continuously
monitored and the input is processed sufficiently quickly to be capable of influencing the data source.

 Multi-programming

In this system the computer may store a number of different programs in its memory
which can be concurrently using a single processor. To achieve this each stored program
will receive a time-slice of processing time in turns.

 Multi-tasking
The simultaneous execution to two or more programs on the same computer. Example :
On a PC you can have a number of windows open with different applications running in
each window. A typical example would be someone typing a document using a word
processor while at the same time playing a CD and printing another document.

Batch processing – This is offline processing where a number of tasks (or jobs) are all
collected together over a set period of time. They are then all loaded into the computer
system (in a job queue) and processed in one go (or batch). Once a batch job begins, it
continues until it is completed or an error is encountered. No user interaction is required
once execution begins.

Computer Studies Handout 51


This has the advantage that jobs can be processed when computer resources are less
busy (e.g. during the evening or at night); thereby utilising an expensive resource.

Batch processing is often used in the following application areas:


- billing systems (gas, electricity, water, etc.)
- payroll systems
- processing cheques

Online – when one is directly linked to the computer.


Offline – When one is not directly linked to the computer

Computer Studies Handout 52


Network systems
A computer network is group of computer linked
together for the purpose of sharing resources and to
enable users to communicate

The advantages of networking:


 Computers can communicate with each
other and share data and files.
 Computing power and/or storage facilities
can be shared.
 Hardware such as printers can be shared.
 Software can be shared.
 There is control over which programs and settings a user has access to.

The disadvantages of networking:


 A virus can spread more easily. If a virus gets into one computer, it is likely to spread
quickly across the network because they are linked.
 As data is shared there is a greater need for security. Users of the network have to have
user ids and passwords.
 The cost of installing the equipment is greater. Cabling can be expensive to buy and to
install.

Common Network Environments:

There are two types of networks, namely:


1. Local Area network (LAN)
2. Wide Area Network (WAN)

Local Area network (LAN)


A group of computers linked together in the same geographical area e.g. a room, building or
campus.

Wide Area Network (WAN)


A group of computers linked together in different geographical areas e.g. different cities, towns
or continents.

An intranet (LAN): An intranet provides information on web pages but the information can only
be accessed from the local network.

Advantages:
 An Intranet is free because it does not involve phone links.
 Information can be easily updated and shared inside a company or school.
 The web pages can be viewed using a standard web page browser.
 More of the information will be useful because it was created for particular users.

Computer Studies Handout 53


Disadvantages:
 Information cannot be shared outside the local network.

Communication media for an Intranet (LAN)


The following is a list of options to use to link computers in a Local Area Network.
 UTP cable
 Coaxial cable
 Wireless
 Fibre Optic cable

The Internet (WAN)


The Internet is a world-wide network of linked computers sharing a vast amount of information.

Advantages:
 Millions of people contribute information.
 Data can be rapidly added and updated to reach a huge audience.
 It can be used to sell goods to a world-wide market.
Disadvantages:
 There is a lot of useless information, much of which is out of data and it can be very
difficult to find what you want.
 Much of the information is misleading or has not been checked for accuracy.
 It is not regulated and offensive and illegal material exists.
 Issues such as security become even more important as potential hackers could possibly
be trying to break into a computer system from anywhere in the world.

The following is a list of options to use to link computers in a Wide Area Network.
 Telecommunication line
 Satellite Link
 UHF / radio link
 Fibre Optic cable

Network topology.
Network topology refers to the physical way in which computers in a network are joined
together. There are 3 types of network topologies (for this level) namely, Star network, ring
network and bus network.

Star Network

Key
Terminal

Server (Host)

Printer (Shared network resource)

Computer Studies Handout 54


Comments

1 - if one station/connection fails the other devices are not affected


2 - if the central hub breaks down, the whole network fails
3 - it is easier to identify faults using this type of topology
4 - it is easy to expand this type of network

With this type of network, a central computer is the centre of all connections where all others
computers in the network are connected to. The connections around the central computer (hub)
make the network look like a star.

Advantages:

 Cable failure is easy to locate and does not affect other users.
 Provides centralised control to data
 Good performance because every computer has a direct cable link
 Network Performance is not significantly affected by the number of computers on the
network.
 Easy to add new terminals and easy to set up.

Disadvantages:

 Expensive because it uses a lot of cables which is expensive to install.


 Requires extra hardware such as hubs and/or switches.
 If the central computer goes down the whole network will be affected(goes down)

Ring Network

Key

Terminal

Server (Hub)

Printer (shared network resource)

Comments

1 - a faulty connection between two stations can cause network failure


2 - it is difficult to add a new station/device as it has to come between 2 existing stations
3 - this type works well during heavy loading
4 - it is possible to create large networks using this topology

Computer Studies Handout 55


The ring network is also known as the peer to peer network, the terminals are connected in a
circle with all the nodes having equal importance (hence the name peer to peer).

Advantages:

 Cheap to install because it uses less cables.


 There is no dependence on a server
 There is faster flow of data because the data only flows in one direction therefore
eliminating collisions as a result minimising the need for data to be re-sent.
 New terminals can be added with little impact on data transfer speed.

Disadvantages:

 There is dependence on one cable. If the cable fails at one point then, all the
terminals will be affected.
 Cable failure is difficult to isolate as its difficult to identify the affected area
 Difficult to add new terminals
 Since data is passed through the nodes, therefore if one node is down then the other
terminals will not be able to communicate.

Bus (line) Network


Key
Terminal

Server (Hub)

Printer (shared network


resource)

Comments

1 - requires less cabling than a star network


2 - if there is a central cable problem the entire network goes down
3 - less expensive network than the other systems
4 - works best with a limited number of stations; performance worsens as new stations added

Terminals are placed along a line with all the terminals tapping from the main line, it is
sometimes called the multi-drop line.

Advantages:

 Cheap to install because it uses the least amount of cable.


 Quick and easy to setup.
 Easier than a ring network to trace a cable failure but not as easy as the star network.

Computer Studies Handout 56


Disadvantages:

 If the main cable fails, a number of computers located after fail point will be affected.
 Network performance goes down under heavy load
 Requires proper termination at the end of the cable to prevent reflected signals.
 Slower data transmission rates as data travels in both directions therefore collisions
occur and data has to be re-sent.

Hybrid Network /Tree

Comments

1 - this features star nodes on a bus network

2 - all the advantages and disadvantages of both types of networks described above apply to
this system; it is quickly gaining in popularity since it has all the good features of bus and star
topologies

Control system
The use of a computer to monitor and control non-computer systems Control systems usually
involve collection of analogue (Physical) data, which is then analysed and allows for user
interaction. (More on control systems will be covered under computer applications.

Automated systems
Automated systems are similar to control systems in nature but however they are dedicated to
one task and have limited ability to collect and analyse data. Automated systems are have
limited ability to allow users to interact with users. Automated systems are usually found on
embedded systems such as a washing machine, microwave oven, e.t.c.

Multimedia
In short multimedia is mixed media, which is the combination of text, video, graphics, animation,
and sound.

Special hardware requirements for a multimedia system


 CD drive / DVD drive
 Speakers
 Sound card

Computer Studies Handout 57


 Microphone
These are the special (extra) hardware requirements but, the other requirements like the
monitor and printer are still required.

Software requirements
 Media player
 Speech synthesiser
 Speech recognition software

Questions

(1) (a) Name two household appliances that are microprocessor controlled.
(b) Describe what functions the microprocessor controls in the named appliances.

(2) (a) Name four different types of sensors and give an application for each one named.
(b) Choose one of your named applications and describe how the sensors are used to control
and monitor it.

(3) (a) Describe the main differences between Random Access Memory (RAM) and Read Only
Memory (ROM).
(b) Various external, removable memory devices exist. Choose which device (using a different
one in each case) you would use for the following, and give a reason for your choice:
(i) storing multimedia files
(ii) storing music files
(iii) storing documents produced on a word processor

(4) A number of specialised input/output devices have been developed to help disabled people
use computer systems.
Name three input/output devices and describe how they would help a disabled person.

(5) Compare the type of data that would be stored on a barcode with the data that would be
stored on a credit card magnetic stripe.
Describe the different types of validation checks that would be made on data stored on:
(i) barcodes
(ii) magnetic stripes on credit cards

(6) A railway station management team has decided to set up automatic information kiosks to
keep passengers up to date with train times, cancellations, and general information.
(a) Which input devices could be used at these information kiosks?
(b) What advantages do these kiosks give customers compared to an information desk manned
by a human operator?
(c) What advantages does this system give to the station management?

Computer Studies Handout 58


(d) Using the space below show a typical ―home page‖ which could be presented to passengers at the
railway station. Show any links, menus, etc. which you think would be needed to make the system as
user friendly as possible.

(7) (a) Give four functions carried out by a typical operating system.
(b) Describe the main differences between real time (transaction) processing and real time process
control.
(c) Give two applications that would use:
(i) real time (transaction) processing
(ii) real time process control

(8) (a) Draw diagrams of a ring network and a star network


(b) Give one advantage and one disadvantage for each of the above network topologies.

(9) A very large city library is changing over to a fully computerised system to control all their operations.
The training department has been asked to develop a presentation to explain to the library staff how their
new system will affect them.
(a) What features should the trainer use in the design of the presentation to make it is as interesting as
possible?
(b) The presentation is to be stored on a laptop computer. What features make the laptop computer ideal
for this application?
(c) Many of the books in the library have been scanned in and stored on the computer.
What advantages does this give to the customer?

(10) (a) A music file is 45 Mbyte in length. Approximately how much memory space would this same file
need if stored in MP3 format?
(b) Describe how it is possible to store considerably more data on a DVD than on a CD even though
dimensionally they are the same?
(c) Why have CDs and DVDs taken over from floppy disks as the main secondary storage media on
home computer systems?

Computer Studies Handout 59


The ways in which ICT is used
Candidates should have an understanding of a range of ICT applications in their
everyday life and be aware of the impact of ICT in terms of:

(a) communication applications (such as newsletters, websites, multimedia presentations, music


scores, cartoons, flyers and posters)
(b) interactive communication applications (such as blogs, wikis and social networking websites)
(c) data handling applications (such as surveys, address lists, tuck shop records, clubs and
society records, school reports and school libraries)
(d) measurement applications (such as scientific experiments, electronic timing and
environmental monitoring)
(e) control applications (such as turtle graphics, control of lights, buzzers and motors, automatic
washing machines, automatic cookers, central heating controllers, burglar alarms, video
recorders/players, microwave ovens and computer controlled greenhouse)
(f) modelling applications (such as 3D modelling, simulation (e.g. flight, driving and queue
management) and use of spreadsheets for personal finance and tuck shop finances)

Candidates should understand the differences between batch processing, online


processing and realtime processing. They should have an understanding of a wider
range of work-related ICT applications and their effects, including:

(a) communication applications (such as the internet, email, fax, electronic conferencing, mobile
telephones and internet telephony services)
(b) applications for publicity and corporate image publications (such as business cards,
letterheads, flyers and brochures)
(c) applications in manufacturing industries (such as robotics in manufacture and production line
control)
(d) applications for finance departments (such as billing systems, stock control and payroll)
(e) school management systems (including registration, records and reports)
(f) booking systems (such as those in the travel industry, the theatre and cinemas)
(g) applications in banking (including Electronic Funds Transfer (EFT), ATMs for cash
withdrawals and bill paying, credit/debit cards, cheque clearing, phone banking, internet
banking)
(h) applications in medicine (including doctors‘ information systems, hospital and pharmacy
records, monitoring and expert systems for diagnosis)
(i) applications in libraries (such as records of books and borrowers and the issue of books)
(j) the use of expert systems (for example in mineral prospecting, car engine fault diagnosis,
medical diagnosis, chess games)
(k) applications in the retail industry (stock control, POS, EFTPOS, internet shopping, automatic
reordering)

Computer Studies Handout 60


General application areas
The general computer application areas are listed below, every other computer use can be
classified under the areas listed.

1. Communication and information systems, on-line services, remote databases;


2. Commercial and general data processing;
3. Industrial, technical and scientific uses;
4. Monitoring and control systems;
5. Automation and robotics;
6. Expert systems and artificial intelligence;
7. Education, training and entertainment

Communication & Information systems.


The use of computer in communication is generally referred to as IT.

What is IT

In short IT is the joining of two major technologies, that is Computing and Communication, this
covers the use of computers to gather, store, process and transmit data. Examples in this area
can be taken from electronic mail, fax, electronic conferencing, information retrieval and
database systems, office automation and library system, view data systems multimedia system
and virtual reality.

Internet
An international network of computers, joined together for communication purposes.

Services Available on the Internet


Downloading of information which includes games, research/educational resources, etc.
E-commerce (Electronic commerce) – Buying and selling over the internet.
E-mail (Electronic mail) including chats
E-Banking (Electronic banking)
E-Government

Electronic mail

Email refers to messages sent from one computer to another electronically using computers.

Advantages of using email

 Faster to send messages than letter post


 Convenient as it can be sent from the comfort of your home
 it could be argued that the email system is cheaper since there is no need to buy webcams,
special software, etc.
 Can send the same message to several people without having to re-type it
 Weightless as no paper used
 Secure through the use of passwords
 Can check the mail log to see a list of messages sent

Computer Studies Handout 61


 24 hour service – can be sent at any time of the day
 can receive your mail from any part of the word.
 there are no language problems (systems can translate messages sent)
 it is possible to read emails whenever you want – there are no issues of time differences as
would be the case with video conferencing. If some delegates lived in the USA and the others
lived in India, for example, the time difference is 10 to 14 hours which could be a problem)

Disadvantages

 Setup costs are high


 Viruses can be received with mail
 Still not generally available

the sender composes a message (and attaches a file if required) and sends it
- this message is sent to an ISP (Internet Service Provider) mail server
- the mail server examines the address associated with the message and decides how to route
the message
- the message travels over the internet arriving at the recipient‘s ISP mail server
- the message is then held in the recipient‘s electronic mail box
- to read the message, the recipient logs on to their mail server
- the message is then retrieved and sent to the recipient‘s computer

Wireless Technology (WiFi) and Broadband


Most areas in the world now offer broadband rather than dial up for connecting to the internet. The
advantages of broadband over dial up include:

- the system is always ―on‖/no need to dial into ISP every time you want access
- the connection rate/data transfer rate is much higher (for example broadband operates at 11
000 kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour of usage)
- it is possible to use the telephone at the same as the internet with broadband/the line isn‘t tied
up
- broadband permits other facilities such as ―skype‖/VOIP

Wireless technology (WiFi) allows connection of a computer to the Internet without the need for
connecting cables. A router (containing a modem and external aerial) is connected to a telephone line
and it is then possible for any computer within range to communicate with the router and allow Internet
access – the link between computer and router is completely wireless.. The main advantage of doing this
is clearly the portability (i.e. can go anywhere within range since no wires are needed).

There are, however, a number of disadvantages:


- the range can be very limited
- possible interference from nearby electronic devices
- security issues (i.e. tapping illegally into WiFi networks)
- access speed/transfer rate is often slower using wireless systems

It isn‘t just computers that can be linked without wires, various peripheral devices can be linked to a
computer system without the need for a physical, wired connection. For example:
- printers
- keyboards
- mouse
- digital cameras

Computer Studies Handout 62


Intranets
Many companies use intranets as well as the internet. The simple definition is ―An intranet is a computer
network based on internet technology, that is designed to meet the internal needs for sharing information
within a single organisation/company‖. The main reasons for doing this include:
- safer since there is less chance of external hacking or viruses
- it is possible to prevent employees from accessing unwanted web sites
- companies can ensure that the information available is specific to their needs only
- it is easier to send out ―sensitive‖ messages to remain within the company only

Some comparisons between internet and intranet include:


- the INTERNET is INTERnational NETwork
- an INTRANET is INTernal Restricted Access NETwork
- the intranet only gives local information relevant to the company/organisation
- it is possible to block access to certain sites using the intranet
- it is not always necessary to have external modems when using intranets
- information for use on intranets is stored on local servers
- the internet can be accessed from anywhere
- the internet is available to anyone, whereas the intranet requires password entry
- the intranet is behind a firewall

In order for one to be able to use email you need to have access to the internet and the special hardware and
software required for one to be send or receive mails the internet include
 Modem ( a device to convert digital signals from the computer to analogue form which can be transmitted
over telephone line and vise-versa)
 Communication software (eg Internet explorer, Netscape Navigator, Outlook Express)
 ISP – Internet Service Provider (eg. Mweb, Zain, Skyband, TNM,etc.)
 Phone line / telecommunication line ( to link up the computers)

Videotex/ Viewdata and Teletex


Videotex refers to sending and receiving information over phone which is displayed on the TV screen.
Viewdata Videotex which is two way and allows one to send and receive messages
Teletex – One way videotext e.g TV broadcast.

The above facilities are used in developed countries to make purchases while at home using the normal TV set, it
is also used by the shops to market their goods.

Advantages
 Quicker than going to the shops
 Cheaper as you don‘t have to go the shops
 Convenient as you can shop in the comfort of your home.

Disadvantages
 You cannot feel or touch the items you would have bought
 People can gain access to your credit card details and misuse it.

Electronic conferencing
Video conferencing continues to grow in popularity. Why is this? Some of the reasons are listed below:
- communication links are now much faster therefore images, sound quality etc. are now far
better
- safety reasons (increase in world-wide terrorist activity, frequent travelling, etc. are all risks to
company employees if they have to travel to meetings)
- costs (the money saved on not having to travel, accommodation costs, lost time to the company
whilst employees are out of the office travelling to meetings, etc.)

Computer Studies Handout 63


- improvements to the work/general environment (employees can work from home, less travel
means less stress to employees but also means less pollution, disabled employees are no longer
disadvantaged, etc.)
- because of the above, it is possible to hold a meeting at short notice

The hardware and software needed to run video conferencing is very sophisticated. Apart from the
obvious items (i.e. large screen, computer and devices such as mouse, etc.) the following briefly
describes what is needed to have a video conference:

- delegates speak into a central microphone


- webcam takes a video image
- delegates hear speech through loud speaker system at each venue
- the system uses internet/WAN/modem to transmit data
- requires use of compression software for video/audio signals
- systems may use CODEC (which converts and compresses analogue data into digital data for
sending down digital lines)
- requirement for echo cancellation software (this allows talking in real time and keeps
communications synchronised)
- video images and audio are seen/heard in real time on large monitors/through loud speakers

The use of a computer to enable people in different geographical areas to hold a meeting simultaneously through a
network.

Advantages.
 Cheaper as you cut down on transport and accommodation costs
 Faster as you eliminate travel time to the conference venue

Disadvantages
 Lack of human interaction
 It is not widely available especially in the developing nations where telecommunication is either not fully
developed or very slow.
Office automation
The use of computers and other electronic equipment to create, store, process and communicate information in a
office (carryout office duties), leading to a paperless office.

Computer applications leading to a paperless office


E-mail
Internet
Networked computers
Video conferencing

Virtual Reality (VR)


This is an artificial 3D environment created by a computer system. Very often the user wears data
goggles, data helmet or data gloves to give a feeling of ―being there‖. Apart from feeding sensory input to
the user, these devices also monitor user actions e.g. data goggles track eye movement and respond by
sending new video input.

Special Hardware requirements for Virtual Reality

As indicated above, a number of devices are used to interface with virtual reality systems. These can be
summarised below:

Data goggles/helmets – these use display screens and optical systems that send 3D images to the eyes.
Motion sensors measure the position and orientation of the head; this information is sent back to a

Computer Studies Handout 64


computer which enables it to adjust the image being sent to the user. Data gloves, suits containing
sensors and joysticks are all used to interface with a virtual reality system depending on the application.
The CAVE is a VR system which provides the illusion of 3D by projecting images on the walls and floor
of a room. Participants wearing data goggles can enter the room and freely walk about. Sensors in the
goggles and in the room continually track the participants‘ position and adjust the images based on this
information.

Areas of use
Entertainment Used in films/television as special effects (e.g. the ―holodeck‖ in Star Trek: The Next
Generation and the Brazilian tv show Conquista da Titã where the studio audience wear
VR helmets in a space simulation). Virtual reality is also used in many computer arcade
games.
Marketing Used in virtual tours around houses and hotels, kitchen designs, ergonomics, etc.
Training Areas of use include: military training, medical/dental training, teaching personnel how to
use equipment and in general areas where training is dangerous and/or expensive e.g. .
flight simulators, car driving simulators, operating devices under water or in outer space,
etc.
Design Design of chemical and nuclear plants, ergonomic studies (e.g. factory layouts), helping to
develop devices for handicapped people, etc.

How we create virtual reality images for use on a computer system


When a virtual tour of, for example, a house is shown on a website the images need to be first created
and then manipulated. The following summarises how this can be done (a similar method/technique
could be used for various applications):
- take photos with, for example, a digital camera
- the photos are taken from a single point (reference point)
- the camera is rotated around the room as a number of photos are taken
- the images are ―stitched‖ together using special imaging software
- photo images are re-sized and re-configured for Internet use
- use hotspots on the web page to allow a user to move around the house (e.g. from room to
room). Integrate plans and maps into the image to allow user to navigate the house.
- developments such as broadband, large computer memories and compression software have
allowed virtual tours to be offered on the Internet and/or CD/DVD files.

Computer Studies Handout 65


Advantages of using virtual reality
- it is safer (since techniques can be tried out in advance without the dangers of the real
operation e.g. maintaining a nuclear plant where it is possible to try a task on a computer
first to learn how to do it; if mistakes are made the results would be harmless; e.g. doing a
medical task on a ―virtual‖ patient is much safer in case of mistakes, etc.)
- cost savings (no need to build the real thing which could save large sums of money e.g.
testing out a real moon buggy or building a part of a chemical plant would be very
expensive).
- it is possible to do tasks which would normally be impossible (e.g. walking inside a
nuclear reactor, doing a task in outer space, etc.)
- there is a feeling of ―being there‖ which makes the training more realistic and can allow a
number of very realistic scenarios to be tested out e.g. how to deal with an emergency on
a chemical plant which could be made to be really realistic!!

Simulation – Imitation of a real life situation using a computer model e.g. Flight simulation.

1.8 The internet


Web sites need to be set up to maximise information supplied to customers and to ensure they are as
helpful and self-contained as possible. If customers are continually telephoning or contacting the
company by email then the web site isn‘t being effective as it should. The following general features
should be found on most web sites in one form or another (this list is by no means exhaustive):
- shopping basket
- secure site when using credit/debit cards
- ―when customer bought X, they also bought Y‖ facility
- search facility for artist/tile/item ……
- drop down boxes to choose categories
- help facilities/how to get in touch with the company if a problem exists
- currency converters for international customers
- date/sales confirmation by automatic email
- saved customer details/customised pages
- ability to track status of orders
- ability to listen to/view/see video/see product ……..
- recognise customer as soon as they log on
When designing web pages it is necessary to supply the correct spacing for customer information
(and/or use drop down menus), buttons to navigate to other web pages, etc.

Search Engines
The most effective way of finding information on the internet is to use a search engine. However, it is just
as easy to use these inefficiently as well as efficiently.

When a search condition is entered, inclusion of statements such as AND (or + sign) and OR will help
narrow down the search. Also, the use of quotes (― ―) can also help. If these are not used, many
irrelevant (and sometimes unwanted!!) results (known as hits) can be displayed by the search engine.

For example:

Type in: CIE and the search engine would return about 22 million hits
Type in: CIE+sample papers and the search engine would return about 1.2 million hits
Type in: CIE+sample papers+ICT and the search engine would return about 6,500 hits
Security

When using the Internet, security can be enhanced using encryption. Credit and debit card transactions
can also be protected by a special type of password control. For example, if a user chooses the

Computer Studies Handout 66


password COMPUTE34 to protect their credit card, when they buy something over the internet the card
nd th th
issuer will ask the user an additional question such as: ―Please type in the 2 , 4 and 7 character of
your password in the following boxes:

The user will then type in O P E and the card purchase will be authorised. This additional protection is
used as well as encryption.

Some of the new systems use a chip and PIN card which is slotted into the keyboard and is used as
additional security. The user slots the card into the side of the keyboard and is required to type in a PIN
before the Internet can be accessed. This gives an additional level of security since it is necessary to
have the card, know the PIN associated with the card AND also know the user‘s log in id and
password!!!

How society is affected


Buying goods and services (e.g. banking) over the internet has both positive and negative aspects on
society. These can be summarised below:

Positive aspects for society Negative aspects for society


Shops and banks are open 24/7 Close down of shops/banks in city centres
Access to shops and banks is worldwide Increased risk of fraud/hacking
Less pollution since less travelling Less personal service/more impersonal
Disabled people are not disadvantaged (no need to travel) Loss of jobs due to closures of
shops/banks
Busy people can shop/bank when they want and where Less social interaction between people –
they want just sit at home using computer
If you live in a remote area, it is much easier to access Less activity for people – leads to a less
shops/banks healthy/overweight population
Less expensive (cost savings to shop/ bank + more Less environmentally friendly since more
competition – savings are passed on to the customer) goods sent out by post – waste from
packaging significantly increases

In general, increased use of computers has led to many of the above affects . Other aspects to consider
include:
- deskilling of the work force (e.g CAD has taken over draftsman skills, word processors
have taken over many office-based duties, etc.)
- the need to re-train the workforce in the use of new software/computers.

Computer systems have allowed companies to set up call centres in other countries where potential cost
savings can be made. This, of course, can lead to job losses in the host country. The main advantages
to companies adopting call centres overseas includes:

- if strikes or other problems occur in one country it is possible to transfer work elsewhere
- reduced costs in countries where labour costs are lower
- reduced costs due to incentives/grants by countries keen to set up call centre offices
- round the clock customer support (one of the advantages of time differences is the
possibility of 24/7 cover)

Computer Studies Handout 67


 There are, of course, disadvantages to having call centres overseas:
- language and culture problems
- animosity to overseas call centres (leading to loss of customers)
- need for extensive re-training which is time consuming and expensive
- time differences (can lead to health problems in call centre work force who need to work
unsocial hours to target key markets)
- technology (does the infrastructure exist to service high tech equipment?)

General Security Issues


Many issues exist when linking a computer system to the Internet or indeed to any external link via a
network set up. There are ways of guarding against this. The following is a list of potential problems and
ways of protecting against the problems:

Information centres

Airports, supermarkets, and any application where information needs to be relayed to customers, gain
benefit from having automatic information kiosks rather than having manned desks. These allow
customers to automatically obtain information when they require it. Output is normally on a screen but
the input devices can vary and are usually:
- touch screens (with menu options)
- mouse/trackerballs to select options
- limited options keyboard
- light pens (although these are becoming increasingly less common)
(keyboards are usually not offered since the number of options is limited and the owners of the system
don‘t want customers keying in information and attempting to ―hack‖ into the system).

Using this automated information system affords the following advantages to the customers and
company:
- the system can be linked into websites to give live updates (very useful option at airports,
bus terminals, railway stations, etc.)
- information is usually more up to date using this method
- no language problems (manually operated desks may have limited language capability)
- no need to wait in queues
- companies can advertise special offers, special services, key notices, etc.
- lower costs to companies (fewer staff needed)
- automatic information kiosks are always open

2. Commercial and general data processing


(a) Banking
Computers are used in banks for transaction processing in the banking hall (By the bank tellers) and at ATM
machines for cash withdrawal, balance enquiry, cheque book request and many other banking facilities.

Computers can also be used for security purposes in banks through the use of security cameras and access cards.

Advantages of using ATMs


 offer faster processing (faster throughput)
 Less paperwork
 Offer 24 hour service
 Located at convenient places like shopping malls thereby eliminating the need to travel to the banking
hall.

Transaction – an event which takes place in business which involves the exchange of goods and services.

Computer Studies Handout 68


Advantages of using computers in banks
 Less paperwork
 Improved security
 Faster processing
 Less labour

Advantages for the tellers


 Less paperwork

Advantages for the customers


 Improved security
 Faster processing/throughput
 Access an account online

b. Hospital Administration
- Computers are used in hospitals to keep patients and staff records
- Information such as the patient‘s personal information (Name, address, phone number, age, e.t.c) and patient‘s
medical history is stored on the computer instead of the traditional card index file.

Advantages of using the computer over card index file


 Faster to access a record as compared to card index
 Easy to update as compared to card index
 Does not take up much storage space in the room
 Improved security by way of passwords
 Easier to make back-up information

Disadvantages of using the computer


 Needs specialised training
 Cannot be used when there is no electricity
 Less jobs
 Expensive to setup & maintain

c. Stock control
- Computers are used to control the daily activities in an organisation by managing stock
- For each item in stock a record is created
- Each record is given a unique identifier (Key field) – A unique identifier used to identify a record
uniquely e.g ID Number/code number
- Other records that may make up an item record are – Item name, description, supplier, cost price,
sale price, quantity in stock, re-order level, e.t.c.
- In stock control systems the computer automatically subtracts an item sold from the quantity in
stock and is able to display information such as items which would have reached their re-order
level, fast moving stocks and slow moving stocks.

Example : Supermarket Stock Control

Most businesses need to hold stocks of goods. Shops need to hold stocks of goods they sell, and manufacturers
need to hold stocks of raw materials and finished goods they make. The task of recording and maintaining stock
levels is called stock control.

A stock control system must keep an up-to-date record of all the stock held and place orders for fresh deliveries if
stock runs low. Large shops, supermarkets and factories use computerised stock control systems.

Importance of stock control -

Computer Studies Handout 69


- adequate stocks must be maintained to supply a customer with goods with minimum delay. If customers find
goods are regularly out of stock they will go elsewhere.

- to keep business expenses to a minimum, goods must not be overstocked. By keeping stocks to a minimum, a
business can limit the amount of money invested in stock and also reduce the risk of stock deteriorating before it
can be sold. Minimum stock levels also reduce storage costs such as warehousing, heating, lighting and security.

A real-time stock control system in a supermarket :

The POS terminal only needs to pass the bar code on each item past a laser
scanner. The scanner reads the code number stored in the bar code and sends it
directly to a computer. The computer checks the code and, if it is valid, looks up the
product's name and price in data files held on disc. The name and price are sent back
to the POS terminal. In this way the POS terminal can print out an itemised receipt.

Each terminal has a keyboard that can be used if a bar-code cannot be read.

As each item is sold, the stock files are updated and orders are printed when they become necessary.

 customer service is much quicker, reducing queues.


 few mistakes in charging customers.
 prices can be changed easily.
 fully itemised bill can be provided for the customer.
 no staff needed for counting stock on shelves

BUT...

 the cost of the equipment is very high


 prices are usually only marked on shelves and not on individual items. Customer confusion?

Sample Application 2 – Automatic Stock Control System in a Supermarket


- bar codes are attached to all goods/items sold by the supermarket as a means of identification
- each bar code is associated with a stock file on a computer database
- the customer takes their basket/trolley to the POS terminal
- the bar code on the product is scanned at the point of sale (POS) terminal
- if the bar code can‘t be read, the POS operator has to key in the bar code number manually
using a keyboard/key pad
- the bar code is searched for on the database
- once the bar code is identified/found, the appropriate file/record is accessed
- the price of the good/item is found and sent back to the POS
- the stock level of the item is reduced by 1
- if the stock level is less than or equal to the re-order/minimum stock level then the system
automatically re-orders goods/items from the suppliers
- this procedure is repeated until all the items in the customer‘s basket/trolley have been scanned
- when all items/goods have been scanned, the customer is given an itemised bill showing a list
(with prices) of everything they have bought
- the computer also updates the files containing the daily takings
- if the customer has a loyalty card, the system automatically updates their points total

Computer Studies Handout 70


- when new goods arrive, the bar codes are used to update the stock files

- some newer supermarkets now allow customers to scan their own basket/trolley and pay for the
items/goods using credit card or cash (essentially the stock control system is the same for both
methods)

Q 1.Describe three ways you could modify a typical input/output environment to enable people
with disabilities to use the computer system. [3]

2.Items sold in supermarkets are all marked with bar codes.


(a) Customers are given an itemised bill at the checkout. Give two advantages to the customer.[2]
(b) Give two ways the information on the bar code can be input at the checkout. [2]
(c) Describe how bar codes are used in automatic stock control. [3]

Field – a single data item in a record


Record – a group of related fields
Database – A collection/group of related records organised in a way which can be manipulated by a database
program.

EFT – (Electronic Fund Transfer)


Transfer of money from one account to another electronically using computers without handling cash.

EFTPOS – Electronic Funds Transfer at a Point Of Sale)


The use of bank cards to pay for goods in a supermarket at the purchase point using the swipe machine.

Cashless society
A society which does not use hard cash for transactions but instead uses plastic money (Debit or credit cards)

Computer applications leading to a cashless society


 EFT
 E-commerce
 Use of credit cards

Electronic scabbing
The transfer of word processing duties from striking workers in one location, to non striking workers in another
location electronically using computers.

3. Industrial Technical & Scientific uses


Computers can be used in industry to design items (Computer Aided Design- CAD)/ Computer Aided Manufacture
(CAM), image processing, simulation and modelling. Computers can also be used in weather forecasting.

Computer-Aided Design (CAD)


CAD is used in the design and development of new products in a variety of applications both at home
and on a commercial/industrial basis. Examples of typical CAD applications include:
- aerospace
- architecture
- car/vehicle design
- construction (e.g. roads, services, surveying, tunnels, bridges, etc.)
- consumer goods (e.g kettles, toasters, etc.)
- digital circuits
- factory layouts (e.g. ergonomics)
- fashion design

Computer Studies Handout 71


- garden/landscape gardening
- heating systems
- interior designs (houses, offices, etc.)
- lighting systems (e.g. to get lighting effects at a concert)
- machinery design
- plant design (chemical, nuclear, etc.)
- ship building
CAD systems usually require considerable processor power and a number of input and output devices;
for example:
- large screens
- light pens
- devices such as trackerballs, mouse and graphics tablets
- plotters to draw scale and full size drawings
- high specification graphics cards
- spacemouse/spaceball
- some systems support stereoscopic drawings where 3D spectacles can be worn and the user
sees a 3D image
The features usually found in a CAD package include:
- wire frame
- 2D and 3D modelling
- library of parts which can be used in new drawings
- validation and verification of designs against original specification
- ability to link with computer-aided manufacture (CAM)
- facility to calculate the mass of the actual object once built
- facility to calculate the cost of producing the article
- features such as rotation, colour, zoom, etc.
- simulation of designs without the need to build a prototype
- create engineering drawings from solid models
- import and export to allow the exchange of data with other software packages
- kinematics (i.e. check moving parts in assemblies don‘t interfere with each other)
- routing of cables and hoses

There are many advantages and disadvantages of using CAD rather than manually producing drawings
using pen and paper:
advantages of CAD disadvantages of CAD
- it is easier to modify drawings - risk of deskilling
- a library of parts can be kept - high training costs to use packages
- ability to do automatic costings - can move work overseas
- ability to model the design - one CAD operator can do work of 5
- can do ergonomic study manual draftsmen
Developments
CAD packages can now be linked to 3D ink jet printers which produce an actual prototype model by
building up slices/layers in fine powder (e.g. resin) which are bonded by an adhesive from the print head.
The models produced actually work.
This saves time and money since an actual prototype doesn‘t need to be made.

Computer Aided Manufacture


The use of output from CAD as input to control a computer in the manufacturing process. Computers can be used
in all stages of a production process. This is done using equipment such as lathes, milling machines, drilling
machines and robots.

Computer Studies Handout 72


4. Monitoring and Control systems
Control System
The use of a computer to control the operation of some non-computer equipment, usually
involving some monitoring and logging of physical quantities. Control systems provide for some
analysis of performance and allow for some user interaction. Examples of control systems
include, greenhouse system, chemical process control, traffic control and many other systems.
Whereas monitoring systems do not make changes to the process being monitored the control
system can adjust and as therefore can allow for user interaction.

Examples Control Systems

1. Traffic Light System : The computer controls the sequences of lights displayed at a
cross-roads to ensure that cars do not crash Additionally the computer operates a
pedestrian crossing to let pedestrians cross the road when a button is pressed.
2. Greenhouse : The computer controls the temperature in a greenhouse to maintain the
conditions required for the plants in it to grow. If the temperature gets too cold then the
computer turns on a heater to keep the plants warm.
3. Robot Arm : The computer controls the movement of a robot arm which sprays parts of
a car body. The arm must only spray when the body part is present and must then follow
a programmed spraying path. The arm must stop if any foreign object, such as a human
being, gets in its way.
4. Chemical and nuclear plants (opening and closing valves, safety systems, etc.), etc.

Examples Monitoring systems


Monitoring hospitals (monitoring patient‘s vital signs), chemical and nuclear plants (monitoring key
parameters), burglar alarms (monitoring for intruders), etc.

How it is done
- sensors gather information from the application being monitored or controlled
- the data being gathered is often analogue in nature and therefore requires translating into
digital using an analogue to digital converter (ADC) to enable the computer or
microprocessor to ―understand‖ and process the data from the sensors
- the computer or microprocessor will compare the incoming data with the data values
stored in memory
- if monitoring, the computer/microprocessor system will warn the user in the form of a
sound (e.g. a siren if a burglar alarm, a loud beeping sound if monitoring patients in a
hospital) and/or read outs (e.g. heart rate trace in hospital monitoring system, temperature
reading on a chemical plant).
- if a control system, the computer will send a signal to a device which will be converted to
analogue using a DAC (analogue to digital converter); actuators are usually employed to
operate devices like valves, heaters, etc.
- the device will be instructed to switch on or off (e.g. if controlling a central heating system,
if temperature > set temperature a heater will be switched off and/or a cooling fan
switched on; if the temperature is below the set point then the heating will be switched on
and/or a cooling fan switched off)
- the computer/microprocessor system will continually monitor the data coming from the
sensors

Computer Studies Handout 73


- in chemical and nuclear plants, there is often a combination of monitoring and control
taking place. Information from sensors is often displayed on a control panel where
operators can see key values and alarm conditions (e.g. if a system monitors
0 0
temperatures and 110 C is the normal temperature and 120 C is the alarm temperature,
the control panel will show normal, present and alarm values in the form of read outs –
either the computer will automatically take action if necessary or the operator will take
action (i.e. over-ride the system if necessary).

Why is this done?


Monitoring and control using computers/microprocessors is often done for the following reasons:
- it is safer (faster response to non-standard conditions and they don‘t get tired and miss
key data)
- computers work 24/7 (even though humans can work in shifts there is always the danger
of missing information at shift handover etc.)
- computers are more accurate and can take more frequent readings (e.g. if readings need
to be taken every 30 seconds, humans can make mistakes or miss readings or even find
it impossible to take readings at such short time intervals)
- data can be automatically displayed and analysed without the need to enter data
manually (which in itself could introduce errors into the system)

The collection of analogue data using sensors is usually referred to as data logging

Data Logging – Automatic collection of analogue data from the source by analogue devices
which is then passed to the data logger which temporarily stores the data and converts it to
digital form before passing to the computer for processing.

Analogue data – Data in physical notation or data which varies continuously e.g. on a clock,
voltmeter or analogue speedometer.

ADC – Analogue to digital converter – a device which converts data from analogue (physical)
form to digital (0s and 1s) form.

DAC – Digital to Analogue Converter – a device which converts discrete (0s &1s) to data in
physical notation. The DAC is usually used in control system to move the actuators for the
manual operations to take place.

The process control (steps)

1. Data is collected by analogue devices (e.g temperature sensor)


2. Passed on to the data logger or ADC which coverts data to digital form and
passed on to the computer for processing
3. Processing – Computer compares data from sensor (Actual) with preset (wanted)
4. Output – signals to switch off power/stop the process / alarm, e.t.c

Feedback – Output from a process which is used to adjust/ modified its input.

Computer Studies Handout 74


A process control system can be represented by the diagram below.

ADC DAC
INPUT Process Output

feedback

Advantages of using sensors to record data

1. provides 24 hour service


2. No need for human presence
3. data is accurate
4. does not interfere with the process being recorded

Sensors
These detect changes in the physical or chemical
environment and convert them into electrical
signals. These signals can then be digitised and
used by the computer.

Examples of sensors

There are a huge range of possible sensors and


they include: heat; light; sound; movement;
magnetism; pressure; strain; acidity (pH); oxygen
levels; liquid levels; humidity; pulse rates; salinity;
water flow; speed and acceleration. Switch sensors can detect angles of tilt or whether
something is open or closed. Sensors are often used when data logging.

Computer Studies Handout 75


Examples of sensors and their uses

Sensor type Possible applications


temperature (1) (1) Used in controlling central heating systems
(2) (2) Used to control/monitor temperatures in chemical processes
moisture (1) monitoring of greenhouse environment
(2) any process where moisture is an issue (e.g. production of tablets in a
pharmaceutical company)
oxygen (1) environment (e.g. measuring oxygen content in a river to check for pollution)
light (1) growth control in a greenhouse
(2) traffic lights to detect the presence of a vehicle
(3) on automatic doors to detect the presence of a person
infra red (1) detecting an intruder by breaking an infra red beam
(2) counting (e.g. counting coins as each one breaks the beam)
pressure (1) detecting intruders in a burglar alarm system
(2) some systems still use these to count vehicles on the road
acoustic (1) picks up sound (e.g. burglar alarm system)
(2) detecting liquids moving in pipes (chemical processes)
motion (1) detecting speed (e.g. radar guns measuring vehicle speed)
pH (1) used to measure acidity in rivers (pollution monitoring)
(2) used in greenhouses to monitor soil acidity
(3) used to monitor/control chemical process where acidity levels are important
proximity/dista (1) these tend to be versions of the above (e.g. light or infra red)
nce

Computers are now used to control the operation of many machines and everyday devices.

When a computer is used to control a machine, the computer circuit board is installed inside the
machine and the input sensors and output control devices are then connected to these circuits
and this is called an embedded computer. The only inputs may be from the sensors in the
machine so a keyboard might not be needed. Outputs often control motors, switches and relays
rather than displaying information on a monitor.

Q Modern car engines use fuel injection systems which are controlled by microprocessors
called Engine Control Units (ECUs). The fuel injection system controls the amount of fuel
that goes into the engine. Sensors monitor engine conditions and feed the data back to the ECUs.

(a) Name two types of sensors used to monitor engine conditions. [2]
(b) Describe how information from the sensors is used to control the fuel injection system. [3]
(c) Give an advantage of using automatic fuel injection systems rather than simpler mechanical
fuel devices. [1]
(d) The fuel injection system operates in real time.
Why would batch processing not be appropriate in this application? [1]

Computer Studies Handout 76


The computer control program is usually written using a ‗normal‘ computer and ‗downloaded‘
into the embedded computer. The software program is stored in a ROM (read only memory)
chip and runs automatically when the machine is switched on. Some 'programs' (for example,
those used to control robots) can be 'learnt' by copying the actions of a human doing the task.

The benefits of using computers for control are as follows:

 Although the purchase cost is high for computerised machines in factories, the
operating costs are low compared to the wages for people doing the job.
 Computers work without the need for a break.
 The quality of output from the machine is consistent.
 Machines can handle both very heavy or very precise tasks.
 Machines can work in places that are uncomfortable or dangerous for humans.
 Computers process data very quickly so the machines can operate faster than
humans.
 Computers can operate the machines with data from a range of sources and sensors.

Q [June 06 q8]
Data-logging is used for monitoring the level of oxygen in a river.
(a) State one item of hardware that is used to collect the oxygen data. [1]
(b) Explain how the oxygen data is processed by the computer. [2]
(c) State two ways that the oxygen data could be displayed for a user to understand.[2]
(d) Explain what the computer would do if the amount of oxygen in the water is too high. [1]
(e) Give two advantages of using data-logging for monitoring the oxygen data in a river.[2]

Embedded Web Technology (EWT)


This is a new technology that uses the Internet in real time to control/interact with a device which
contains an embedded system/microprocessor. The user needs to be authorised to do this and can
control a device anywhere using a web browser (e.g. from a computer or even a mobile phone which is
web-enabled).

Example: An oven contains an embedded processor. The owner can use a web-ready mobile phone
anywhere to control the oven remotely. By accessing a web site he is able to send instructions to control
the oven.

It is possible to control any device in this way if it contains an embedded processor e.g. television, DVD
player/recorder, washing machine, scientific experiments in remote areas such as outer space.

Embedded computers need to input data from both the sensors in the machine and from the
surrounding environment. Examples of input and output devices and the processing that takes
place are shown in the examples below:

Robotic arm

Computer Studies Handout 77


Inputs devices: Movement coordinates entered at a keyboard or memorised as a skilled
worker guides the arm in a learning process, pressure sensors, position sensors, switches.
Processing: Arm follows a pattern of movements held in memory. Switches operate the tools,
e.g. spray painting car bodies on a car manufacturing production line. Sensors on the arm
detect and feedback information on its position in relation to the job.
Output devices: Switches to control movement (electric motors, pneumatic valves or hydraulic
pumps) and to operate tools being used by the arm.

Household devices
(Note: also check out the section on Embedded web Technology in booklet 1)
Many household devices now use microprocessors to control their various functions. The following is just
a sample of common devices (showing some of the functions controlled by the microprocessor and
general notes on the application; it is worth doing further research to find out more about these devices):
Digital cameras
The microprocessor would be used to control the following functions, for example:
- shutter speed
- lens focus
- flash
- aperture (light intensity)
(Note 1: the sensitivity of the camera depends on the number of pixels used to represent the picture
taken e.g. an 8 mega pixel camera takes a sharper image than a 5 mega pixel camera. The camera
memory size also dictates how many photos can be taken or limits the pixel size of a photo. The
sharpness of the image also depends largely on the lens quality.

Note 2: the advantages of digital cameras over manual cameras include: no processing costs (since
there is no need to develop film or make prints), easy to delete unwanted photos, direct transfer of
photos from camera to computer through the USB port (no need to scan in photos), easier to modify
photos on screen (e.g. crop, change colour density, etc.) etc.)

Washing machines
The microprocessor would be used to control the following features, for example:
- water temperature
- time for each cycle
- the wash cycle (when to add powder, when to rinse, etc.)
- loading (i.e. weight of the washing in the drum)
(Note 1: the main advantages are that these machines are fully automatic (wash programs are fully
stored) which makes them easy to use, they are cheaper to manufacture (modular design) and generally
more reliable).

Digital televisions
The microprocessor would be used to control the following features, for example:
- automatically tuning into television stations
- allow digital signals to be decoded
- since constantly monitoring signal strength (etc.) far better sound and picture quality
result)
- allows interface with many devices
- controls picture and sound quality (factory settings can be stored, etc.)
- in built diagnostics in case of faults
(Note 1: signals to televisions are now sent digitally so need a computer to interpret and decode these
signals into a picture/sound; need multi-functional system to control plasma and LCD screens)

Computer Studies Handout 78


Input and output devices
Input and output devices need to be matched up to the computer application. Several of these have
been covered already in booklet 1:
- computer-aided design (large screens, graph plotters, etc.)
- virtual reality (data goggles, data gloves, etc.)
- control/monitoring applications (sensors, ADC/DAC, actuators, etc.)

Automatic Washing Machine


Inputs devices: Temperature sensor and water
level sensor measure water temperature and level.
Switches used on the door; washing options
selection buttons and dials.
Processing: a program compares the current
temperature with preset temperature and compare
the current water level with preset

Output devices: switches off heat supply, alarm or a


light indicator

Microwave Oven
Inputs devices: door switch; switches to allow
setting of time and power.
Processing: the processor compares the current
temperature with preset temperature and compares
the current time with preset.
Output devices: Switches: microwave generator
on/off, turntable motor, fan motor, light, warning
buzzer; screen display of inputs and timings.

Q 1. (a) Name any household item which contains a microprocessor [1]

(b) For the device you named in (a) above, describe the input to the microprocessor, the
processing and the output from the microprocessor. [6]

2. Digital cameras do not use film. Therefore, there is no need to pay to develop the film and
produce prints.
(a) Give two other advantages of using digital cameras rather than traditional cameras. [2]
(b) On what does the quality of the pictures taken by the digital camera mainly depend? [1]

Computer Studies Handout 79


5. Automation and Robotics
There are many factories where robots are used in the production line especially in the car manufacturing industry.
Jobs that robots do are generally jobs which humans would find boring and repetitive or jobs that may be
dangerous.

Robotics
Robots can contain embedded processors or be linked to a computer system. They are pre-programmed
to do a specific task or ―taught‖ to remember instructions from a human operator carrying out the task
manually e.g. teaching a robot to spray a car with paint. In summary:
- the robot is programmed with a series of instructions which enable it to carry out a series of tasks
- alternatively, an operator manually carries out a series of tasks which are relayed back to the robot;
these instructions are remembered so that the robot can carry out the tasks automatically
Robots rely on processors and sensors. The sensors gather information so that the robot knows it is
alright to do the task (e.g. is a car in position to be sprayed, is there an obstruction to prevent the robot
doing its task, if the robot is spraying a car has the supply of paint run out, etc). They are capable of
doing some pseudo-intelligent tasks (e.g. different sized cars to be painted) but essentially any non-
standard routine is better dealt with by human beings.

Advantages of using Robots


- they are capable of working in conditions hazardous to humans
- they can work non-stop; they don‘t need a break / Can work 24hrs a day
- less expensive in the long run since robots don‘t need to be paid any wages
- generally more productive (can usually do a given task in a shorter time than a human)
- not necessarily more accurate than humans, but the standard of work is certainly more
consistent
- removes the need to do boring, very repetitive tasks leaving humans free to do the more skilled
work such as quality control etc.

Disadvantages of Robots.
- they can find it difficult to deal with ―unusual‖ circumstances e.g. a door is missing from a
car waiting on the paint spraying line
- tend to reduce labour requirements (therefore causing unemployment)
- since robots take over many of the tasks done by humans de-skilling is a real risk
- work can be done anywhere, therefore factories can be moved to anywhere in the world
(again a cause for unemployment risks)
Areas where we use computers
- car assembly, lifting heavy objects, spray paining, welding, manufacture of
electronic components e.g. VCRs, computers, radio where the is VLI (Very large
integration – to many components on one place.

1.6 Global Positioning Satellites (GPS)

Computer Studies Handout 80


Global positioning satellite (GPS) systems are used to determine the exact location of a car, airplane,
ship or any conveyance which travels from one place to another. In vehicles these systems are often
referred to as satellite navigation systems (sat nav).
Satellites in outer space transmit signals to the Earth. Computers in vehicles (e.g. car, airplane or ship)
receive and interpret these signals. Positioning depends on very accurate timing – atomic clocks are
used because of their accuracy to within a fraction of a second per day. Each satellite transmits data
indicating its position and time. The computer in the vehicle calculates its location based on the
information from at least three satellites (in the case of airplanes, it is also possible to determine the
height as well as position); this can be shown diagrammatically as:

In motor vehicles the system is called satellite navigation (sat nav). The on board computer contains pre-
stored road maps. The vehicle‘s exact location, based on satellite positioning, can be shown on the map;
the driver can then be given verbal directions e.g. “turn left into Pendle Road” OR a screen output
showing the vehicle moving on the map:

This is far safer since a driver of a vehicle doesn‘t have to consult maps whilst driving. It also removes
error (e.g. going the wrong way down a one-way street). Sat nav systems can also give additional
information such as position of speed cameras, estimate time of arrival, etc. GPS can now be used to
monitor a vehicle‘s position if it has broken down (additional safety feature) or has been stolen (known
as vehicle tracking system).
In airplanes GPS can also pinpoint its exact location in case of an accident which enables search teams
to quickly respond to the incident.

Computer Studies Handout 81


What can go wrong?
- maps not up to date therefore instructed to carry out an incorrect manoeuvre (e.g. turn into a road
which no longer exists)
- unless the system is very sophisticated, road closures due to accidents or road works will cause
problems to a sat nav system
- signal loss can cause problems with GPS systems
- potential interferences from external sources (major problem on aircraft)
- incorrect start and end point keyed into system (!!!)

Q (a) State two places where robots are used.


(b) State two benefits of using robots.

6. Expert systems and Artificial Intelligence


Expert Systems
These systems have been developed to mimic the expertise and knowledge of an expert in a particular
field. For example:
- prospecting for oil or minerals
- diagnosing a person‘s illness
- diagnostics (e.g. finding faults in a car engine, finding faults on a circuit board, etc.)
- tax and financial calculations
- complex ―thinking‖ tasks such as chess
- route scheduling for delivery vehicles
- identification of plants, animals and chemical compounds (for example)
The Basic System
A basic expert system is made up of the following elements:

Expert System Shell


(Note: The Working Store contains the Facts and Rule Base)

An expert system is made up of the following components


1. a large database of information
2. an inference engine (which interrogates the database)
3. a set of rules that it has to follow
4. Interface

Computer Studies Handout 82


Setting up an Expert System
- information is gathered from experts in the field
- the knowledge base is created
- information gathered from experts is added to the knowledge base
- the rule (base) is created
- the inference engine is created
- the user interface is designed/created (often use Yes/No options or multichoice)

The system, once set up, needs to be tested using data with known outcomes to see if it functions
correctly.

If it is being used to diagnose faults, the expert system will output the probable fault and how to
rectify/deal with the problem. Usually a % probability of the accuracy of the diagnosis will be given so the
end user can decide whether or not to accept the recommendations.

How does it work?


Consider this set of questions?
Q: Do you know which car you want?
A: No
Q: Is there any make of car you would prefer?
A: No
Q: Do you want 2 doors?
A: No
Q: Do you want high performance?
A: Yes
Q: When you have a big engine, do you need a manual gearbox?
A: Why?

The system uses a rule base and an inference engine together to simulate human reasoning when
analysing a problem and arriving at a conclusion. To simulate human processes it is necessary to have a
vast amount of information stored in the knowledge base and the reasoning set out as a set of rules in
the rule base.

In the above example, the response Why? came up since the user wanted to know the Expert System‘s
thought processes. The system would give the possible response ―I am trying to find the make of car you
require. Up to now, coupes are not likely. It is possible that saloon cars are a likely option. I know that
you like high performance which gives me strong evidence that the car should include a manual
gearbox”.

The above is how an Explanation System might work where questions like why or how are dealt with.
Inference Rules use an if-statement and a then-statement. This gives Expert Systems the ability to find
solutions to diagnostic and prescriptive problems. For example:

If the make of car includes high performance and you want Italian style
Then the car you want is probably a Maserati Quattroporte

A rules base is made up of many such inference rules and the inference engine uses these to draw its
conclusions.

Computer Studies Handout 83


Advantages of using expert systems
- provides consistent answers
- never ―forgets‖ to ask a question in determining the logic
- reduces the time taken to solve a problem
- less skilled work force needed, therefore potentially can save money
- A large database of information can be added and can be kept up to date
- Computer access specialist knowledge which a doctor may not have.

Disadvantages of using expert systems


- lacks common sense in some of the decision making processes
- errors in the knowledge base can lead to incorrect decisions being made
- cannot adapt to changing environments unless the knowledge base is continually updated
- expensive system to set up in the first place
- needs considerable training to ensure system used correctly by operators
- Lack of human interaction
- There is need for one to have computer knowledge

Input Needed for medical diagnosis system


- temperature, symptoms, blood pressure, e.t.c

Another example of an expert system is a mineral exploration system used to identify mineral
deposits.

Input needed for mineral exploration systems


- soil type, rock types, historic activity at that place e.g. recent volcanic activities,
co-ordinates (location)

Q An Expert System is to be created to help


diagnose faults in electronic components.

The diagram in Fig. 1 summarises how the


knowledge base was created and how it is
used to help technicians. Some parts of the
diagram have been left blank.

(a) Complete the diagram in Fig. 1 by


putting the following statements in the
correct boxes:
1 Inference engine queries the
knowledge base
2 Display results
3 Collect data from experts
4 Create knowledge base and rule
base. [3]
(b) Describe a typical input interface you
would find on a diagnostic Expert System.
[1]
(c) Describe the output you would expect to
Fig 1
see from this system. [1]
(d) Give another example of an Expert System. [1]

Computer Studies Handout 84


Artificial Intelligence
A computer based application that enables a user to interact with the computer in a human like
manner, in AI the computer is able to reason like a human being and the system is able to learn
from experience e.g. Expert system.

Q An online control system is being used to maintain the correct temperature and humidity
(Moisture level) in a room where lenses are being made.

(a) (i) State how the data is collected and how it is converted to enable it to be
stored [3]
(ii) Describe the processing which takes place in order to maintain the correct
temperature and humidity in the room. Refer to feedback in your answer [5]
(b) Describe an additional task which the online control system could undertake [2]

7. Education / Training
Computers are used in education in a variety of ways. The uses include storing students‘
records, typing letters for correspondence between the school and other stake holders, keeping
stocks of books and any other educational equipment. There are other uses of computers
which are directly linked to education such as the use of computers in research, or even the use
of a computer to learn which is commonly known as CAL (Computer Aided Learning) and also
for CAT (Computer Aided testing). Computers are also used in science to simulate
experiments.

Simulation
Imitation of a real life situation using a computer model e.g. Flight simulation or in the classroom
for subjects like physics, chemistry experiments can be simulated on the computer.

To demonstrate how a simulation can be developed for use in a real situation the following
example has been chosen. The scenario chosen is a series of traffic lights at two busy
junctions:

In this simulation it is necessary to consider:


(1) how and what data is gathered
(2) how the simulation is done
(3) how the system would work in real life
(4) why simulations are done
(5) other examples of simulations

Computer Studies Handout 85


(1) How and what data is gathered

To make this as realistic as possible, data needs to be gathered over a long period of time. This
can be done by sensors in/near the road, using cameras or manual data collection. Data
gathered includes:
- count the number of vehicles passing in all directions at each junction …..
- ….. at a particular time of day
- count how many cars build up at a junction before lights change
- is it a week day or weekend or bank holiday
- how long it takes to clear vehicles at a junction
- other data (e.g. pedestrian crossings)
- time for largest/slowest vehicle to pass through a junction
- other factors (e.g. filtering of traffic to the right or left)

(2) How the simulation is done


The data is entered into the computer and the simulation is run. The following scenarios may be
tried out:
- timing of lights varied to see how the traffic flow is affected
- build up number of vehicles stopped at a junction and change timing of lights to see
how it affects the traffic flow
- increase/decrease traffic flow in all directions to see how the traffic is affected
- try out the impact of accidents
- consider passage of emergency vehicles
- effect of adding in pedestrian crossings
- once the simulation is run, the timing of the lights is determined and how they interact
so that the maximum traffic flow is achieved; fault scenarios (e.g. an accident) and their
impact are considered

(3) How the system would work in real time


- sensors in/near the road gather data (these can be light/infra red sensors, induction
loops, pressure sensors, etc.) – the data is usually number of vehicles passing a
particular point
- the data is sent to a control box or computer system
- the gathered data is compared to data stored in the system (the stored data is based on
simulation runs, how the number of vehicles at a junction at a particular time of day
affects the traffic flow, etc.)
- the control box or computer ―decides‖ what course of action to take and …..
- ….. sends signals to the traffic lights to change timing if necessary
- as with any system involving sensors, ADC and DAC interfaces may be needed

(4) Advantages of carrying out simulations


- saves cost (rather than doing the real thing)
- safer (scenarios tried out on the simulation first before used in reality)
- possible to try out various scenarios in advance
- some environments make simulations the only way to carry out a task beforehand (e.g.
outer space, under sea, chemical processes, nuclear reactors, crash testing cars, etc.)
- faster (no need to build and test real system, so it is possible to get results more
quickly)

Computer Studies Handout 86


(5) Other examples of simulations
- training (e.g. pilots, drivers, etc.)
- running/testing chemical plants and nuclear plants
- trying out equipment to be used under sea or in outer space
- crash testing cars
- financial simulations (e.g. stock market predictions based on various scenarios)
- population growth (i.e. predict how the world‘s population will increase based on a
number of different scenarios)
- queues (e.g. simulating queues at supermarket checkouts for example)
- weather (refer to next section)

Another example of simulation is predicting weather (i.e. a weather forecaster). In this case we
will consider how/what data is collected, how the simulation is done and consider how it can be
used in predicted possible climate changes. We won‘t consider stage (3) here (how the system
works in real time) since this simulator doesn‘t control anything and stages (4) and (5) above
will be the same.

(1) How and what data is collected


- sensors measure pressure, temperature, relative humidity, wind speed and wind
direction
- sensors are placed in weather balloons and/or weather stations
- information is also got from satellites
- pilots also send in information regarding weather conditions during long flights

(2) How the simulation is done


- information from the sensors/satellites sent to computer
- this data is compared to information stored on files …..
- ….. which contain known weather patterns from the past
- ….. predictions are made based on these comparisons
- produces weather maps showing isobars, temperatures, etc.
- computer can show graphically how weather (e.g. cloud formations) will change with
time (i.e. predict weather patterns) – this is often presented as a computer- generated
video showing how clouds build up, how temperature and pressure changes over, for
example, the next 7 days, wind speeds etc.

Computer Studies Handout 87


- it is also possible to do statistical analysis and predict the percent probability that certain
weather conditions will occur.

(3) How future environment/climate changes can be predicted


- information over time is fed into a climate/weather model
- based on changes in weather patterns, carries out a statistical prediction
- model is able to change parameters to see how future climate can be affected
- needs to review a lot of previous data over a number of years to check if changes are genuine
or just cyclical
- over, for example 20 years, predictions compared to actual climate conditions to validate/further
refine the model
- can make use of spreadsheets and statistical software packages

Computer Studies Handout 88


 Emergency First Aid
 Many First Aid courses train people in resuscitation. Special life-size dummies are used
to practice on. People learn to give mouth to mouth resuscitation and cardiac
resuscitation. The resusciannie dolls or dummies simulate real people in that they have a
mouth and nostrils that can be breathed into. The chest can be massaged or pressed.
More recent dummies have built-in responsive signals to indicate successful
resuscitation.

Advantages of simulation.
Simulations are built for a variety of reasons

 Economic
 Crash testing cars, planes or trains is extremely expensive, a computer model would
save a vast amount of money in the long run. A model can be adjusted when the design
of an object changes.
 It is difficult or sometimes impossible to test the effects of radiation from a nuclear
meltdown or explosion in real life because of the potential danger to people therefore
scientists have to rely on simulations to predict the possible consequences.
 Robot welders or painters are simulations of the real thing but with well-known economic
advantages. They work accurately 24 hours a day, without holidays, breaks, complaints
or pay. They can be reprogrammed as needed to perform different tasks
 Training is usually a repetitive process that many people will undergo at different times.
It is cheaper to build a computer based training programme that many people can use
than pay a human to repeat the same lectures or tutorials over and over again. Time can
be spent in perfecting the courses so that the best learning environment possible is
produced.
 The entertainment industry has brought us simulations of aspects of life in all its real and
imaginary forms as computer games for PCs, consoles and arcade machines.
Computer games generate large incomes.
 The military have to be prepared in the event of war. Much real-life training and testing
goes on but it is impossible to practise for the invasion of London or a war in a foreign
land. Simulations that provide an experience of the landscape and conditions are the
best possible preparation.

Limitations of simulations

 A model will never be as accurate as the real thing because all its properties and
functions can never be reproduced in exactly the same way because of our lack of
understanding and the vast numbers of measurements required.
 The success of the model very much depends on the complexity of the real life object,
system or phenomenon, the amount of data available, how well it is understood and on
the technical skills of the programmers.
 Example: Scientists would like to produce model cats or other animals to use for testing
that are biologically identical to the real thing but irrespective of how much data is
collected, man does not have the technology or understanding to fully replicate life.

Computer Studies Handout 89


However, models of mechanical or electronic objects are much easier to build because
they‘re simpler, better understood and behave in ways that are programmed by people.

Training and Entertainment


Music
Computer hardware and software advances have changed how music is generated and produced. Some
of the key reasons for this have been summarised below:
- actual musical notes can be generated from the music itself by software
- music samplers and mixers give an almost limitless ability to alter the original tracks recorded in
a studio
- software can automatically correct notes
- don‘t need to understand music notation to write a musical score
- electric instruments (such as guitars and organs) play back through electronic effects machines
- synthesisers combine simple wave forms to produce more complex sounds
- electric organs can now mimic almost any instrument (including a full orchestra!!)
- automatic rhythm
- music notes automatically printed out in the correct format
There are many other software and hardware developments; the above is just a summary of the more
common elements.

Animation/Cartoons in Films and Video/Television


Computer animation is the art of creating moving images via computer hardware and software.
For 3D animation, objects are designed on a computer and a 3D skeleton is produced. The limbs,
mouth, eyes, etc. are moved by the animator using key frames (these define the start point and end
point of a smooth transition to make the animation as realistic as possible).

The differences in appearance between key frames are automatically calculated by the computer – this
is called TWEENING or MORPHING. The animation is finally RENDERED (i.e. turned into a realistic
image).

Computer animation uses a technique called avars (animation variable) where the starting point is
usually a series of stick figures; e.g. Toy Story used over 700 avars (1 avar = position of each feature
e.g. the mouth). Successive sets of avars control all movement of the animated character. Once the stick
model is moving in the required way, avars are incorporated into full wire frame models. Finally, surfaces
are added requiring a process called rendering (i.e. turned into a realistic image).

There are several ways of generating avar values to get realistic movement. One way is to use markers
on a real person (or whatever is being animated) acting out a part and track the movements by video
camera. Alternatively, avars can be set manually using a joystick. Software produces a level of quality
for movie animation that would take many years to produce by hand and would employ several
cartoonists/animators. This all saves considerable time and money to the film and television producers.

Avatars are another example of animation. These are often used to represent people either in 3-D (as
used in computer games) and in 2-D (as used in internet message boards). Some avatars are animated
consisting of a sequence of images played one after the other.

Ultimately, animators want to create a human image which moves and interacts with its background in
such a away that the viewers can‘t tell if a particular scene is computer generated or produced by real
actions in front of an actual movie camera.

Computer Studies Handout 90


Special effects in many modern films (televisions) all use computer animation to produce fantasy worlds.

Computer Based Training


CBT makes use of a computer system to train people in a number of applications. It makes use of
multimedia and self-assessment with minimum input needed from a human trainer.

The advantages of training people using computer systems (such as CBT) include:
- trainees can work at their own speed
- trainees can learn when they want
- it is possible to re-run sections of the training program if necessary
- possible to come back at any time/pause training program at any point
- user gets immediate assessment of performance
- possible to include multi-media elements in the training package
- no need to have a teacher/classroom – potential cost savings therefore possible
- it is easier to keep up to date/amend

 Students of medicine and dentistry spend a lot of time learning about human anatomy by
dissecting bodies during the first two years of their training. Universities rely on bodies
being donated to science but sometimes there may be a shortage. The storage,
preservation and preparation of the bodies requires technical help and is expensive.
Simulation has begun to provide an alternative method of studying anatomy with the help
of computers.

Computer Aided Learning CAL

 This term is used for any training or education methods that are computer based.
Multimedia teaching materials with text, graphics, video and sound are used in a way that
most people find more stimulating than a text book, but this method is by no means
suited to all. People who suffer from epilepsy or migraines may be unable to use
computers because the flicker from the screens may trigger attacks.

There are many advantages of Computer Aided Learning:

 Online quizzes or tests that are instantly marked and students able to assess their own
progress without any unwanted comments from teachers 'with attitude'.
 Computers are ever patient, you can repeat the same piece of work as frequently as you
need to and whenever it is convenient for you.
 Excellent lectures or lessons could be filmed to remove endless repetition for teachers
and add convenience for students. You can watch a video of any lecture that you've
missed at a later date or to revise a topic you don't understand.
 It is an ideal method for students who are unable to get to a school or college because of
disability or location.
 Students can learn at their own pace
 Creates suitable learning environment
Disadvantages of CAL:
 Computers are unable to understand and respond to questions in natural language.
 Computers don't encourage you to learn when you don't really feel like it or chase you up
for missed assignments. A high degree of self-motivation is required.
 Learning may become a socially isolating activity for some. (Lack of human interaction)

Computer Studies Handout 91


Q (a) Give two ways that computers can help teachers teach a lesson. [2]
(b) Give two ways that teachers could use a computer system to send work electronically to
students who are absent from a lesson. [2]

Questions
(1) (a) Give three features you would expect to see in a typical Computer Aided Design (CAD) package.
(b) A company uses CAD to design a child‘s toy. Give two advantages of using CAD in this application.

(2) (a) What is meant by virtual reality?


(b) A hotel decides to offer a virtual tour of its facilities on a web site.
(i) Describe how images are created and processed for use in the virtual tour.
(ii) What features would you expect to see on the virtual tour web site?
(c) Give two other applications of virtual reality.

(3) (a) A large house with eight bed rooms is to be protected by an intruder surveillance system (burglar
alarm).
Describe how sensors and a microprocessor would interact to monitor for intruders and sound an alarm
if a break in occurs.
(b) Describe the main differences between a computer being used in a monitoring application and a
computer used in a control application.

(4) Robots are being used to spray some metal parts.


(a) Describe two problems the robot might encounter and how these could be overcome.
(b) In general, what are the advantages of using robots rather than human workers in manufacturing
industries?

(5) A bus has been fitted with a Global Positioning Satellite (GPS) navigation system (sat nav).
(a) Describe how the sat nav computer calculates the exact location of the bus.
(b) How does the sat nav system indicate to the bus driver the correct route that needs to be taken to
reach the required destination?
(c) What are the advantages to the bus driver of having GPS installed?

(6) An expert system is to be created to identify chemical compounds.


(a) Describe how the expert system would be set up and made ready for use.
(b) Explain the function of the Explanation System which forms part of the expert system.

(7) (a) Describe four security issues associated with linking a computer to the internet. How is it possible
to guard against each of these security issues?
(b) Describe the differences between the internet and an intranet.

(8) A supermarket has decided to model queues at the check outs using simulation software.
(a) Describe how data is collected for the simulation/model.
(b) Describe how the simulation/modelling is carried out.
(c) Describe the advantages of using a simulation.
(d) Give two other uses of simulations.

(9) Describe how computer hardware and software are used to create animation effects in films and
television programmes.

(10) (a) Describe how it is possible to have a video conference between delegates in two different
countries.
(b) Give the main reasons why video conferencing has become increasingly popular.

Computer Studies Handout 92


The effects of using ICT
Candidates should be able to:
(a) explain what is meant by software copyright
(b) describe what a computer virus is, what hacking is and explain the measures that must be
taken in order to protect against hacking and viruses
(c) describe the effects of information and communication technology on patterns of
employment, including areas of work where there is increased unemployment
(d) describe the effects of microprocessor-controlled devices in the home, including their effects
on leisure time, social interaction and the need to leave the home
(e) describe the capabilities and limitations of ICT
(f) describe the use of internet developments such as Web 2.0, blogs, wikis, digital media
uploading websites, and new types of social networking websites
(g) discuss issues relating to information found on the internet, including unreliability,
undesirability and the security of data transfer including phishing, pharming and SPAM
(h) describe the potential health problems related to the prolonged use of ICT equipment, for
example repetitive strain injury (RSI), back problems, eye problems and some simple strategies
for preventing these problems
(i) describe a range of safety issues related to using computers and measures for preventing
accidents

When looking at the effects of using ICT, the main question to ask is, ―has the introduction of
computers brought more harm than good?‖

Advantages (the good effects)

 The introduction of computers has led to the production of quality products


 Computers operate faster than humans hence people can now work fewer hours
while maintaining same standard of living. This leads to creation of more leisure time
will improve people's quality of life, while at the same time opening employment
opportunities in the tourism industry.
 Higher productivity of computers leads to production of more goods and therefore
reduction in prices (products become cheaper)
 There are many tasks that would be impossible without the use of IT. Air-traffic
control, credit cards, space travel and medical research are just some examples.
 New jobs are being created by the introduction of IT e.g. programming, network
managing etc.
 The jobs replaced by computers are the rather mundane ones. People are free to do
more interesting tasks.

Arguments against

 Computers are cheaper than people so if a computer can do the job then it will lead
to higher unemployment.
 De-Skilling People are loosing their skills they would have gained
 The storage of personal data held on computer has eroded people's privacy.

Computer Studies Handout 93


Changing Employment Patterns
With the introduction of computer controlled technology employment patterns have changed
considerably. Changes include the following:

 Robots are now performing many of the manual tasks such as assembly work and
paint spraying in factories.
 Many industrial processes operate 24 hours a day and are continually being
monitored and controlled by computers.
 There are fewer paper-based systems in offices. Some jobs such as filing clerks no
longer exist. New jobs involving computers have been created.
 More and more people work form home, with the advantage of no travelling and the
freedom of being able to live in any part of the country (or the world for that matter).

ICT and the disabled

The following is a list of ICT devices which help people with disabilities

Device Application
Touch screens + head wand For people who can‘t use a keyboard allowing input; also helps people
with learning difficulties since icons are easier to understand

On-screen keyboards For people who can‘t use keyboards (use head wand to select letters)
Voice recognition Blind and partially-sighted people can communicate with a computer
using microphone and software (keyboard and touch screens can‘t be
used)
Trackerball Easier to use than a mouse if people have problems using their arms
and hands or if they have a coordination problem
Trackerball Easier to use than a mouse if people have problems using their arms
and hands or if they have a coordination problem
Large font size/use of colour Helps people who are partially-sighted since the larger icons and/or
colourful outputs on large screens are much easier to see
Braille printers Dot matrix printers can be modified to produce raised dots (i.e. Braille) –
this helps blind and partially-sighted people to read the output
Voice synthesis Loud speakers and special software are used to output information in
the form of sound to help blind and partially-sighted people; it also helps
people who have difficulty reading/understanding text
Large/concept keyboards These help people who have difficulty using normal keyboards (either
because of difficulty using hands/ arms or coordination problems)
Prediction software To help dyslexic people when typing
Foot activated controls To allow people with restricted hand/arm movement to communicate

Computer Studies Handout 94


Consequences of system failure.
Data on a computer can be lost because of various reasons, below is a table showing the
cause of data loss and a suggested way of protecting data.

Cause Protection
Power failure 1. Uninterruptible Power Supply (UPS)
2. Standby generator
System failure 1. Backup
2. Standby computer
Virus attack Use of ant-virus software and firewalls to prevent
viruses entering a computer. It is also sensible not to
open emails/ attachments from ―unknown‖ sources; it
also helps to only load software from disks/cds which
are originals
Hacking Use of passwords and ids to prevent illegal access
to files. Also locking the computer itself or locking
the computer room can help here. Encryption stops
the information being read even if access has been
gained to a file but won‘t stop hacking!!
Corruption/Loss of Data can viruses can be protected against as described above
occur in a number of ways: - as above (also see note 2 below)
- viruses - accidental damage is best guarded against by keeping
- hackers back up files or use the Grandfather-Father-Son (GFS)
- accidental damage method; also use of passwords and ids can help by
- hardware faults restricting access in the first place
- software faults - protection against hardware faults could be to keep
back ups or use GFS; use of UPS (in case of power
- incorrect computer operation loss) and parallel system also help
- keeping back up files or using GFS would help here
- backing up files would guard against problems caused
by incorrect power down of the system

Note 1: Viruses don‘t just infect computers, they can also affect mobile phones, MP3 players etc. – any
device which can download files from a source such as the internet is potentially at risk.

Note 2: Backing up may allow files that have become lost/corrupted (due to hacking or viruses) to be
reinstated; however, this would not recover the system nor would it prevent hacking/viruses affecting a
system in the first place.

Note 3: Other problems such as spam, pop ups, cookies, etc. are more of a nuisance (although they can
considerably slow down the operation of a computer system) and can be blocked or made inactive
(since they can become active without the user‘s knowledge) using suitable software.

However backup is the main method of minimising data loss as it can be used in most of the
causes of data loss.

Computer Studies Handout 95


What is a backup?

A copy of the original used when the original gets corrupted, mainly done on floppies,
magnetic tapes and CD. This is because the above media can be stored away from the
main computer and only retrieved when the need arises.

Q a. Give one effect of hacking.


b. Give two ways of protecting computer systems against hacking.

Computer crime
The use of a computer or knowledge of a computer to commit a crime

 Computer Fraud
Any money related crime committed with the use or knowledge of a computer e.g. the
salami technique.

 Software piracy - This is the illegal copying or use of software without proper
certification. It could be said that the use of personal computers has made many users
into thieves. How many people could honestly say that they have purchased all the
software on their hard disks?
 Hacking - Hacking means gaining illegal access to someone else's computer system by
breaking or cracking a password. Many people see this type of thing as a challenge and
not as an illegal activity.

 Sending Viruses
 Sending hate email or any unsolicited mails (spam).

Virus

A virus is program designed to fail other programs, it has the ability to duplicate itself without the
user‘s intention. There are basically two types of viruses, namely Time bombs and logic bombs.

Time bombs such as Friday the 13th are triggered by time, they only become active on a
particular date. While Logic bombs are triggered by conditions on the PC.

Spreading of Viruses

A virus can spread through


 Sharing of disks
 Networks
 Using pirated software
 the internet.

Virus Protection.
You can protect your computer from viruses by
1. Installing anti-virus software
2. Scan disks and mails for viruses before opening them
3. using authentic software

Computer Studies Handout 96


4. installing firewalls.
5. Avoid sharing of disks

Social and ethical considerations for the Internet


The Internet provides access to a variety of information on every topic and this information
comes from many different countries throughout the world.

One problem with the Internet is that all the information is freely available once the user is
connected. There are news areas on the Internet, which contain large amounts of illegal
pornographic material. Material that is illegal in some countries but may be perfectly legal in
others.

Social considerations for a cashless society


A future without any form of cash is unlikely but over the last ten years the use of cash for
making payments has reduced considerably. We will now look at the advantages and
disadvantage of a cashless society.

Advantages

 It is far more convenient not to have to use cash. Mortgage and loan repayments, gas,
electricity and phone bills are paid automatically so you don't need to remember to pay
them.
 You no longer need to take large sums of money out of the building society or bank to
pay for expensive items: the risk of being robbed is reduced.
 You don't have to queue at the bank, building society or cash machine to get money out.
 Credit cards allow people to buy goods and then decide whether to pay for them at the
end of the month or obtain them on credit, paying a proportion each month.

Disadvantages

 Credit is normally given only to people who are working and have a steady source of
income, so certain people won't be able to get it.
 It is possible for people to spend more than they can really afford so they can easily get
into debt.
 More information is kept about individuals. Inevitably some of this will be incorrect and
lead to people wrongly being refused cash or credit cards.
 It is harder for people to keep track of how much they have spent, since statements are
usually sent only once a month, although statements can usually be obtained more
frequently if they are requested.

Computer Studies Handout 97


Crime prevention and detection
ICT can be used to help prevent crime and the systems employed include the following.

 Speed camera systems and camera systems, which detect cars jumping red lights,
deter people from offending.
 Computer controlled camera systems deter violent crime in many city centres.
 Tagging of offenders means that they are less likely to commit crimes whilst on bail.
 Tagging systems on bikes, cars and other property reduces the chances of them
being stolen.
 Computer controlled house security systems deter some burglars.
 Finger print matching system where finger prints details of people are stored on the
computer and latter finger prints from crime scenes will be matched with the ones in
the computer to get details of criminals.

Crime detection
 IT can be used to catch criminals and some of the ways it can do this are as follows:
 The Police National Computer (PNC) is used to hold details of all crimes committed
and criminals.
 The National Criminal Intelligence System is a computer system used to piece
together information about individual criminals and their illegal activities. The
computer can interact with the data supplied by Interpol, the PNC, Customs and
Excise, the Inland Revenue, and the bank and building society computers. This
system is used to gather material on organised crimes such as drug smuggling.
 DNA profiling and fingerprinting systems enables valuable, and often conclusive,
evidence to be collected.
 Police headquarters computers for each police force are used in the day-to-day
administration of all the usual police work.

Data protection Legislation


These are laws passed to protect personal data. How much information have companies got
about you? What protection is there on this personal information? Here are the 8 points of the
Data Protection Act:

 Data must be kept secure.


 Data stored must be relevant.
 Data stored must be kept no longer than necessary.
 Data stored must be kept accurate and up to date.
 Data must be obtained and processed lawfully.
 Data must be obtained and specified for lawful purposes.
 Data must be processed within the data subject's rights.
 Data must not be transferred to countries that do not have suitable data protection
laws.

Q Many bank customers now bank on-line using the Internet.


(a) State two advantages for the bank of on-line banking. [2]
(b) State two disadvantages for a bank customer of on-line banking. [2]
(c) State three data protection rules that could apply to the customer data stored by the bank [3]

Computer Studies Handout 98


Questions
1. Use of computing and communication technologies has meant that many workers can now
work from home, rather than having to travel to the office.
State one advantage and one disadvantage of working from home from the point of view of:
(i) the worker
(ii) the company.

2. A hospital has decided to computerise its administration system.


(a) Give three ways this could affect the hospital workers. [3]
The hospital will be using a database which holds confidential personal data.
(b) State two precautions that the hospital should take to prevent unauthorised access to
the data. [2]
(c) Describe how the database could be recovered if it became corrupted. [1]
(d) Give one example, in each case, of when it would be necessary to amend data, delete
data and insert data into the patient database.

(3) (a) Give three features you would expect to see in a typical Computer Aided Design (CAD) package.
(b) A company uses CAD to design a child‘s toy. Give two advantages of using CAD in this application.

(4) (a) What is meant by virtual reality?


(b) A hotel decides to offer a virtual tour of its facilities on a web site.
(i) Describe how images are created and processed for use in the virtual tour.
(ii) What features would you expect to see on the virtual tour web site?
(c) Give two other applications of virtual reality.

(5) (a) A large house with eight bed rooms is to be protected by an intruder surveillance system (burglar
alarm).
Describe how sensors and a microprocessor would interact to monitor for intruders and sound an
alarm if a break in occurs.
(b) Describe the main differences between a computer being used in a monitoring application and a
computer used in a control application.

(6) Robots are being used to spray some metal parts.


(a) Describe two problems the robot might encounter and how these could be overcome.
(b) In general, what are the advantages of using robots rather than human workers in manufacturing
industries?

(7) A bus has been fitted with a Global Positioning Satellite (GPS) navigation system (sat nav).
(a) Describe how the sat nav computer calculates the exact location of the bus.
(b) How does the sat nav system indicate to the bus driver the correct route that needs to be taken to
reach the required destination?
(c) What are the advantages to the bus driver of having GPS installed?

(8) An expert system is to be created to identify chemical compounds.


(a) Describe how the expert system would be set up and made ready for use.
(b) Explain the function of the Explanation System which forms part of the expert system.

(9) (a) Describe four security issues associated with linking a computer to the internet. How is it possible
to guard against each of these security issues?
(b) Describe the differences between the internet and an inranet.

(10) A supermarket has decided to model queues at the check outs using simulation software.
(a) Describe how data is collected for the simulation/model.

Computer Studies Handout 99


(b) Describe how the simulation/modelling is carried out.
(c) Describe the advantages of using a simulation.
(d) Give two other uses of simulations.

(11) Describe how computer hardware and software are used to create animation effects in films and
television programmes.

(12) (a) Describe how it is possible to have a video conference between delegates in two different
countries.

(b) Give the main reasons why video conferencing has become increasingly popular.

Computer Studies Handout 100


Systems Analysis & Design

Candidates should be able to:

Analysis
(a) describe different methods of researching a situation
(b) state the need for recording and analyzing information about the current system
(c) state the need for identifying features of the existing system
Design
(a) state the need for producing designs • need for designing documents, files, forms/inputs,
reports/outputs and validation
(b) produce designs to solve a given problem • design data capture forms and screen layouts
(c) choose the method of verification

Development and testing


(a) understand that the system is created from the designs and then tested
(b) describe testing strategies • testing each module with normal/live data
(c) understand that improvements could be needed as a result of testing

Implementation
(a) Describe the different methods of system implementation
(b) Identify suitable situations for the use of different methods of system implementation, giving
advantages and disadvantages of each

Documentation
(a) identify the components of technical documentation for an information system
(b) identify the components of user documentation for an information system

Evaluation
t (a) explain the need for evaluating a new system • in terms of the efficiency of the solution
(b) state the need for a variety of evaluation strategies

Computer Studies Handout 101


The systems Life cycle

Problem
definition

Maintenance Feasibility
Study

Analysis
Implementation

Design
Development

Sometimes known as Systems Engineering or the Systems Life Cycle, this refers to a systematic approach to
solving a problem in which the solution to a problem is divided into several stages. Basically there are four stages
to systems analysis and design but these stages can be further split to say 5 or seven stages. We will start with
the five stages and have a brief rundown of what goes on at each of the stages then we will proceed to seven
stages plus a detailed look at the system life cycle.

Five stages for systems analysis & Design


1. Analysis
2. Design
3. Development
4. Implementation
5. Maintenance

1. Analysis
A study of the current system is carried out to identify the problems
being faced by the system. There are various methods used to study the current system these
include, Interview, Questionnaire, Study, Reading, Observation/ automated method.

2. Design
This involves planning of the output, input layouts, designing the files
structures, and deciding on the storage type.
3. Development
Development involves, Program development, coding of programs,
testing of programs and Equipment acquisition. Program development involves writing

Computer Studies Handout 102


of program specifications by the analyst or senior programmer while equipment acquisition refers to buying of
equipment.

4. Implementation
This is the stage when the new system is put into use.
5. Maintenance
Maintenance involves looking after the system and correcting any
errors. There are two types of maintenance, namely corrective
maintenance and perfective maintenance.
The above stages can be further split into 7 stages:
1. Problem definition / Identification of the problem
2. Feasibility Study
3. Analysis / Investigation
4. Design
5. Development
6. Implementation
7. Maintenance / Review

Problem Definition.
This is the first stage in systems analysis, and the starting point is the user request where the users of the system
after having experienced problems with their system would talk with the system analyst with the aim of having their
problems solved. Results of this stage will be written down and make up a document known as the terms of
reference.

The terms of reference may contain:


- Objectives (What the new system seeks to achieve)
- Constraints
- Timescale (when a solution is required)
- Reports or outputs required
- Problems (from the users‘ point of view)
- Suggested solutions ( from the users‘ point of view)

Feasibility Study.
The feasibility study is concerned with five aspects: Technical, Economic, Legal, Operational, Social and Time
Schedule(TELOST)

Technical feasibility.
Technical feasibility involves checking to see if technology exists to implement the new system. On technical
feasibility people will be asking this question ―With the available technology will the system work?‖ Because of
advances in technology a system which was not feasible a couple of years ago is now feasible (Workable/
achievable)

Economic feasibility
Economic feasibility involves looking at cost –effectiveness of the proposed system. The question asked at this
stage is, ―.. will the new system will be cost effective.‖ If the costs of introducing the new system are by far higher
than the economic benefits of the system , then its not worth the hustle.

Legal feasibility
Legal feasibility checks the new system with the laws of the of the country to see if it will not violate any laws.

Operational Feasibility

Computer Studies Handout 103


Operational feasibility looks at whether the current work practices are able to support the new system and see if the
new system is realistic.

Social feasibility
This is concerned with the effects on the workers and the customers. The questions asked here are – will the
introduction of the new system: _
- Result in redundancies or need retraining or re-location of some workforce?
- Result in de-skilling of some jobs

Timescale (Schedule)
Schedule feasibility is concerned with the time it will take to develop the new system and checking whether the new
system can be created within the required time frame.

Some aspects of the study include:


• Terms of reference: - objectives
- boundaries
- constraints
• Description of the existing system (including any problems and the projected costs)

• Criteria (essential requirements and desirable features of the proposed system)

• Solution (including development plan and cost/benefit analysis)

If the feasibility study is accepted then the systems analyst moves to the next stage which is a full
analysis of the system.

Q A hotel has decided to invest in a new computer system. A systems analyst is asked to do a feasibility study
of the existing system.
(a) Give 3 reasons for a feasibility study / what is the purpose of a feasibility study [3]
(b) List and outline 5 stages of the system life cycle (in their correct order)[5]

1. Analysis
Sometimes known as the investigation stage where a study of the current system is carried out
to get a complete understating of the current system.

NB in all the above stages including the current stage analysis most of the tasks involve the old
system and there is no talk about the new system.

The analysis involves some or all of the following stages:


• Fact finding – this is usually done in four ways (see page 2)
• Understanding the current system
• Produce data flow diagrams
• Identify the user requirements
• Interpret the user requirements
• Agree the objectives with the user
• Collect data from the current system

To carryout a study of a system there are number of methods one can use, these are known as
fact finding methods/ techniques.

Computer Studies Handout 104


1. Observing the existing system first hand
This involves watching the personnel using the existing system to find out exactly how it works. There
are a number of advantages and disadvantages of using this method to gather information about the
existing system:

Advantages - the analyst obtains reliable data


- it is possible to see exactly what is being done
- this is an inexpensive method compared to other techniques

Disadvantages - people are generally uncomfortable being watched and may work in a different way
- what they are watching may not be representative of a typical day‘s work
- if workers perform tasks that violate standard procedures, they may not do this when
being watched!!

2. Questionnaires
This involves sending out questionnaires to the work force and/or to customers to find out their views of
the existing system and to find out how some of the key tasks are carried out. As with observation, there
are a number of advantages and disadvantages in using this technique:

Advantages.
 Useful when you want to collect data from a large number of people
 People may feel free to write their opinions
 questions can be answered quickly
 an inexpensive way of gathering data from a large number of people
 allows individuals to remain anonymous
 it is quick to analyse data

Disadvantages
 Difficult to compile effective questionnaires
 One will never know if the rightful people responded (some may delegate to their kids)
 Rate of returning of questionnaires is usually poor as a number of people(respondents)
may forget to return the questionnaires.
 questions asked tend to be rather inflexible
 no immediate way to clarify a vague/incomplete answer to a question
 it is difficult to prepare a good questionnaire

3. Interviewing

This involves a one to one question and answer session between the analyst and
employee/customer. A good method if the analyst wants to probe deeply into one specific aspect of
the existing system.

Advantages
 Points raised can be immediately clarified
 Can verify what one is saying by looking at the body language
 Flexible as questions can be changed or modified during the course of the interview to
suite the needs.
 opportunity to motivate the interviewee to give open and free answers to the analyst‘s questions
 allows the analyst to probe for more feedback from the interviewee (easier to extend a topic than
it is when using questionnaires)

Computer Studies Handout 105


Disadvantages
 Time consuming especially if a number of people have to be interviewed
 People to be interviewed may be hostile or may not feel free to tell the truth (they will tell
you how things are supposed to be done instead of how things are done)
 can be expensive to carry out
 - unable to remain anonymous

Reading this involves reading through the documentation and procedures associated with the
system. This allows the analyst to see how paper files are kept, look at operating instructions and
training manuals, check accounts, etc. This will give the analyst some idea of the scale of the problem,
memory size requirements, type of input/output devices needed, and so on. They will often gain
information not obtained by any of the other methods described above. However, it can be a very time
consuming exercise.

Q A school wanted to change its manual students‘ record system to a computerized system because they were
encountering some problems as they had increased their enrolment. A systems analyst is asked to do a
feasibility study of the existing system.
(a) Describe 3 fact finding techniques which the analyst may use. [3]
(b) The analyst has recommended the company should purchase a Database management System.
- Give one advantage and one disadvantage of purchasing a pre-written software package. [2]

2. Design
A design or plan of how the new system would function is made, this includes writing of
algorithms and drawing of systems flow charts.

The following is a list of tasks that are usually done (this is by no means an exhaustive list):
• design the data capture forms/input forms
• design the screen layouts
• design output forms and reports
• produce systems flowcharts and/or pseudocode
• select/design any validation rules that need to be used
• select the most appropriate data verification method(s)
• file structures/tables need to be designed/agreed
• select/design the hardware requirements for the new system
• select/design the software requirements
• produce any algorithms or program flowcharts
• design a testing strategy/plan

The design of a computer system can be divided into four main areas:
(i) Output design
(ii) Input design
(iii) Files Design
(iv) System Processing and general program design

The stages are carried out in the order given above, starting with output design this is because
the output required for a system will determine the input design which will in turn determine the
files and the systems processing.

Computer Studies Handout 106


Q Describe any three tasks carried out during the design of a new system.

During output design fields to be used are identified and defined, before we look at examples of
fields lets define a few key terms here.

Field A single data entity in a record/ a collection of related characters which when grouped
together make up a record.
Record A collection of related fields
Database A collection of related record/files organized in a way that can be manipulated by a
database program.

Taking for example a school administration system used to store students records including
personal details and fees payment details, fields to expect in such a system include the
following

Student Number (Key field)


Student name
Sex
Date of Birth
Class
Club
Sport
Tel Number
Address
Next of keen
And many other fields.

Each record must have a key field. What is a key field?


A key field is a unique non repeating field used to identify a record uniquely. The word
uniquely is supposed to be there because each of the fields in a database identifies a record but
only the key field does it uniquely.

Q A hotel has decided to invest in a new computer system.


(a)State three tasks in the design of this new system. [3]
(b) List any 5 fields you would expect to find in the hotel administration system, one of them
must be a key field. [5]

At the design stage the system analyst will use a number of design tools some of the tools
include.
1. Top down design (Modular approach)
2. Prototyping
3. Application generator

Top down design


Also known as the modular approach, where a larger problem is first broken down into smaller
manageable problems which will be solved independently.

Advantages of using modules

Computer Studies Handout 107


1. They enable a program to be developed in stages/ programmers can concentrate on one
task at a time
2. Enables creation of a library of modules which can be used in other program without
having to re-write them.
3. Allows several programmers to work on one problem making it faster.
4. Modules can be tested individually
5. You can easily add a module
6. Easy to locate and correct errors in a program as the module with the error will only need
attention.
7. Modules can be tested independently.

Q State four benefits of using modular programming to develop a program [4]

Prototyping.
In prototyping you build a working model of the system in order to have it tested and approved before building the final product.

Q What are the advantages and disadvantages of using prototyping as a tool for the systems analyst?

Application Generator.
Applications generators are software tools which can be used to create systems. The user
describes the input, output, data and files, and what needs to be done. The application
generator will then use this information to generate a program or suite of programs.

Development
At the development stage the programmers will code, test and debug the programs.

CODE PROGRAM
In short to code is to write a program. This is the process of converting our solution i.e. the
algorithm (flowchart/pseudo code) into an actual computer program. Here we choose a suitable
programming language and use the syntax and semantics of that language.

Syntax means the correct way or ―grammar‖ of writing a command or series of commands,
including all the proper options and command-line statements.

Semantics means the logical meaning of a statement, separate from the grammatical structure.
(Rules and regulations that govern a particular language)

TEST AND DEBUG PROGRAM

Once coding is complete, you will enter the program into the computer. The computer will then
translate the program into machine code.

There are two main ways of translating a program from source code to machine code namely
3. Interpreting
4. Compiling
Interpreter
An interpreter is a translator program which concerts a program from source to object (machine)
code line by line. An interpreter will not move to the next line until an error on the previous line

Computer Studies Handout 108


is corrected. With an interpreter the source code will need to be converted to machine code
every time a program is run making it slow to execute.

Advantages of an interpreter
 Easy to debug errors
 Cheaper a translator usually to not have to be bought separately from the other software.
Disadvantages
 Slow to execute as the program needs to be translated every time it is run.
 Less secure as users have access to the source code and can easily make changes.

Compiler
A compiler is a translator programs which converts the whole source code to machine code
at once and keeps a separate copy of the machine which can be run without need to
recompile. After compilation the programmer will have three files, namely the source code
(original program written by the programmer), Object code (the program which will be run on
the computer) and a list of errors (used for debugging the program).

Advantages
 Faster to execute as there is no need to compile the program every time it is run.
 More secure as the object code which is given to the users cannot be modified.
 Portable as the object code produced is an executable program which can be run on any
machine.

Disadvantages
 Difficult to debug as the program gives the programmer a list of errors and the
programmer has to rely on only that list to debug errors unlike the interpreters which
gives various diagnostic tools.
 More expensive as the compile has to be purchased separately from the other software
programs.

Compilation means converting the source code i.e. the user‘s program which is written using a
high level language, into machine code, which is machine – understandable language.

Compilation results in certain kinds of errors which are indicated by the computer after the
process is over. These errors have to be corrected and then the program recompiled. The
process continues until the program is error free. Next we must verify that our program does
everything that it is supposed to do. Invariably, computer programs do not work properly the first
time. The three types of errors that are normally encountered are:

 Syntax
 Execution
 Logical

Syntax Errors
A syntax error is a violation of a programming rule for example misspelling a reserved words
like typing LEP A = 5 instead of typing LET A = 5.

Computer Studies Handout 109


Syntax errors occur when a computer language compiler cannot understand a command
entered by the programmer. When such an error is encountered the computer rejects the
program and prints out an error message. These errors are encountered during compilation and
are very easy to correct. In many cases, these errors arise due to spelling mistakes, missing
commas, etc and incorrect syntax. For example, in FoxPro if we type APEND instead of
APPEND this causes a syntax error.

Logical Errors
A logical error is an error which comes out ass a result of incorrectly laying out statements
which results in the program producing wrong results. The computer does not detect logical
errors.

For example, for calculating the net salary of an employee the formula is
Net Salary = Basic Salary + Allowances – Deductions

But through oversight, while coding, the formula is written as


Net Salary = Basic Salary – Allowances + Deductions

This will obviously produce a wrong result. Such errors can be detected only by a dry run.

To correct these errors, we have to go through the algorithm of the program. These errors are
easily detected, by running some sample problems, for which we know the answer. Most of
these errors can be eliminated by properly designing the program. A complete scan and careful
dry run and walk through are some of the ways in which these errors can be removed.

Execution Errors
These are runtime errors which will prevent a program from running properly for example
division by zero or an endless loop.

Typical examples of execution errors are:

 Infinite loops
 Data incorrect or in wrong order
 Incorrect filename
 Divide check errors. These checks appear when a quantity is divided by zero or by a
number which is very nearly equal to zero.

DEBUGGING

Debugging is the process of locating and correcting an error in a program. It contrasts with
testing, which is the process of detecting the error initially.

it is necessary to develop a proper testing strategy to ensure all possible scenarios are covered
and that all error trapping techniques are fully tested; for example if inputting data to represent
somebody‘s age, the test plan may include: 0, 5, -2, fred, 3.5, 215, 85 etc. to see whether each
piece of data is correctly dealt with; test data often falls into 3 types:

Computer Studies Handout 110


Standard Data.
Data within the range say for example on student marks which should range from 0 – 100 then
standard data would include marks from 0 through to 100 (e.g. 1,4,6,90 e.t.c). This data should
be accepted by the program.

or
this is data which is acceptable/valid and has expected outcomes (for example, if a date is
being input the day should be in the range 1 to 31)

Extreme Data.
Data at the edges or boundaries, in our example above the example the extreme data would be
0 and 100. This data should also be accepted by the program.

Or
this is data at the limits of acceptability/validity (for example, if a date is being input, the two
values at the extreme limits of valid days would be 1 and 31)

Abnormal Data
Out of range data, in our marks example abnormal data will include data such as -3, -7, 102,
180 e.t.c and this data must be rejected by the program.

Or
this is data outside the limits of acceptability/validity and should cause an error message to be
generated (for example, if a date is being input the day can‘t be -1 or 50 etc.)

2. Implementation
This is the stage when the new system is put into use. The main steps in implementation are
Equipment acquisition (buying of new office furniture, air conditioners, cabling, e.t.c)
Installing the hardware (Installation of the software)
Training and Education (Users will be trained on how to use the hardware and software)
Creation of Master files (Data for all master files has to be entered before the new system is
put into use)
Fully test the new system once installed
transfer the paper files across to the new system; this may involve the following:
- scanning in the documents
- keying in the data
- create databases etc. to allow downloading of files etc.

When putting into use the new system the systems analyst has to decide on the best method of
conversion (way of putting the new system into use).

Computer Studies Handout 111


Methods of conversion

Direct changeover
Old

New

This a complete replacement of the old system by the new system at one go where the user
stops using the old system today and starts using the new system the next day. Usually done
over the weekend. The advantage of this method is that it is fast and efficient, with minimum
duplication of work.

This method can be disastrous if the new system fails at any point
- however, the benefits are immediate and less time is wasted
- costs are reduced (only one system in use so save on staff costs)
- less likelihood of a malfunction since the new system will have been fully tested

Parallel conversion

Old

New

The old system continues alongside the new system for a few weeks or months. The
advantage of this method is that the results of the new system can be checked against the
known results and if any problems are noted operation may continue under the old system while
errors are being rectified. However the disadvantage is that it puts strain on staff as there will
be duplication of work (some on the old system others on the new system doing the same
work). In some instances say a supermarket checkout customers may resent the double
checkout system.

If the new system goes down for any reason, you still have the old system to fall back on so a
failure wouldn‘t be disastrous
- it is possible to gradually train staff/time to get used to the new system
- more expensive than direct since need extra staff to run both systems
- more time consuming since both systems need to be run and evaluated
Phased changeover

Old System
New System

in this technique only part of the new system is introduced and only when it proves to work
satisfactorily is the next part introduced, and so on, until the old system is fully replaced
- if the latest part fails, only need to go back in the system to the point of failure; hence a
failure
isn‘t disastrous

Computer Studies Handout 112


- more expansive than direct since it is necessary to evaluate each phase before moving
to the
next stage
- can ensure the system works properly before expanding

This system is usually used with larger systems that can be broken down into individual
modules which can be implemented separately at different times. In this system a few customer
accounts can be put on the computerized system while the others remain on the old (manual)
system. Phased changeover can be direct or parallel. The main advantage of phased
changeover is that the burden of the workload is spread over time and gives users an
opportunity to learn from problems of a previous phase. However it is difficult to have control
over a system operating in two modes as different users will be treated differently for the same
operation.

Pilot Changeover
with this technique, the new system is introduced into one part of the company (e.g. into one
warehouse of a supermarket) and its performance assessed
- if the new system fails only one part is affected; the rest is still functional
- it is possible to fully train staff in one area only which is much quicker and less costly
than
parallel
- the costs are also less than parallel since only one system is being used in the pilot
warehouse

The following table summarises the risks involved in all four methods:

Computer Studies Handout 113


Q 1.(a) Define the following terms:
(i) Field [1]
(ii) Record [1]
(iii) Database [1]

(c) New Millennium Spares is a company that sells motor parts. The company has a
Sales Department, a Purchasing Department and a Stores Department. The
sales department sells parts to customers on credit. The purchasing department
orders parts from suppliers. The stores department is responsible for receiving
purchased parts, keeping stocks and dispatching parts to the sales Department.

In order to computerize all its operations the company engaged the services of a systems
analyst.

(i) The systems analyst carried out a feasibility study. Give two reasons for the
feasibility study. [2]
(ii) The company accepted the systems analyst‘s recommendation to proceed with
computerization. The system analyst carried out a detailed investigation of the
existing operations of the departments.

State three fact-finding methods that he could have used in the investigation [3]
(iii) The systems analyst recommended the company should install a Local Area
Network (LAN) and purchase a Database management system (DBMS). All the
Departments will use a centralized database.

Give one advantage and one disadvantage of purchasing a pre-written software package.
[1]

(iv) Suggest two fields in the central database that will be shared by all the three
departments. [2]
(v) For each department suggest one field that will be part of the database, but will
only be used by that Department.
Purchasing Department [1]
Sales Department [1]
Stores Department [1]

(vi) Give three advantages of a DBMS [3]


(vii) State two disadvantages of a DBMS. [2]
(viii) The systems analyst has recommended a phased change-over at the
implementation stage.
(a) Suggest one advantage of phased changeover. [1]
(b) State two other changeover methods. [2]
2. Describe the two types of documentation which should be produced for this system. [4]
3. After some time the system has to be maintained state and explain the three types of
maintenance required. [6]
4. List any 4 duties of a systems analyst [4]
[33 marks]

Computer Studies Handout 114


3. Maintenance
Once a system is up and running it is necessary to do some evaluation and carry out
maintenance if necessary. This is summarised below:

• compare final solution with the original requirement


• identify any limitations in the system
• identify any necessary improvements that need to be made
• evaluate the user’s responses to using the new system
• compare test results from new system with results from the old system
• compare performance of new system with performance of old system
• update hardware as new items come on the market or the company changes in any way
which requires new devices to be added/updated
• update software if necessary if company structure changes or legislation is introduced
which affects how the company operates

(text in bold refers to evaluation and text in normal refers to maintenance)

During maintenance the programmers will be looking after the new system and there are three
types of maintenance.

Perfective Maintenance
Is done when the system is running perfectly but there is room for improvement.
Adaptive maintenance
Done when the environment changes, e.g. change in tax policies, business grows bigger, e.t.c
Corrective Maintenance
Done when errors are discovered in the system and they need to be corrected.

DOCUMENTATION
Documentation should not be viewed as a stand alone stage in the system life cycle, instead it
is a ongoing stating from the word go until maintenance because there is need to keep records
of everything done to help with maintenance at a latter stage.

There are two types of documentation.

1. User Documentation
Intended for the user with instructions on how to run/start the program, enter data, to exit the
program, samples of input data and output results, what problems to expect, how to handle
them, etc.

this usually consists of:


- how to load/run the software
- how to save files
- how to do a search
- how to sort data
- how to do print outs
- how to add, delete or amend records
- the purpose of the system/program/software package

Computer Studies Handout 115


- screen layouts (input)
- print layouts (output)
- hardware requirements
- software requirements
- sample runs (with results and actual test data used)
- error handling/meaning of errors
- troubleshooting guide/help lines/FAQs
- how to log in/log out

2. Technical Documentation
Intended for the programmers with instructions on how to debug errors and will consist of
flowcharts/pseudo codes/, program listings and detailed written statements of algorithms and
procedures involved. Documentation is necessary for program maintenance. Without proper
documentation, it will be difficult to change a program at a later date.

It is a misled notion that documentation is the last step in system development. In fact, it should
be interwoven with the entire phase of the programming process, especially with the design and
implementation, because documentation is supposed to enable individuals to understand the
logic of programs.

this usually consists of:


- program listing/coding
- programming language(s) used
- flowchart/algorithm
- purpose of the system/program/software
- input formats
- hardware requirements
- software requirements
- minimum memory requirements
- known ―bugs‖ in the system
- list of variables used (and their meaning/description)
- file structures
- sample runs (with results and actual test data used)
- output formats
- validation rules

The systems Analyst


A person responsible for the analysis, design and implementation of a system to assess the
suitability of computerization.

Duties of the Systems analyst


1. Carries out a study of the current system (Archaeologist)
2. Plans and designs the new system
3. co-ordinates communication between the Management – Workforce – Users
(Communicator)
4. Documents the new system
5. Carries out the feasibility study and recommends computerization or no computerization.
6. Implements the new system

Computer Studies Handout 116


Q 11 A mail order company is considering using a computer system for stock control and order
processing.
(a) Give two fact finding methods that would be used. [2]
(b) Give two items that would be included in the feasibility report. [2]
(c) Give three tasks that would be done at the design stage. [3]
(d) Describe one way that the conversion from the old system to the new system could be
done. [1]

System flowcharts
System flowcharts are used to show how all the components in a system link together (e.g.
input, storage, output, processing, etc.). They are very different to normal flowcharts since they
don‘t go into detail of how something is actually done – they are a general overview. The table
below shows the most common system flow chart symbols:

Computer Studies Handout 117


A simple example of a systems flowchart is shown below:

Questions
(1) (a) A systems analyst was brought in to computerise a paper-based car sales system. What methods
could be used to gather data about the existing system? Give reasons for your choice.

(b) What would need to be done before the new computerised system became ―live‖?
(c) Why would PILOT and PARALLEL change over methods be suitable in this application?

(2) A program is written to input daily temperatures. Name three types of test data that could be used.
Give examples of each type of test data which could be used and discuss the outputs you would expect
to get.

(3) Name five tasks that would be carried out at the DESIGN stage in systems analysis.

(4) Name four methods used to change over from a manual system to a new computerised system.
Discuss the relative advantages and disadvantages of these four methods.

(5) Describe how the effectiveness of a new computer system can be assessed.

(6) What tools exist to help the analyst draw up an action plan and ensure that the project is completed
on time and to budget?

(7) What information would a systems analyst need to gather to decide on what hardware is required for
a new computerised system?

Computer Studies Handout 118


(8) What five items need to be included in the USER GUIDE and in the TECHNICAL GUIDE of a newly
developed computerised system?

(9) Choose six symbols used in systems flow charts and explain what each symbol means.
(10) A company selling CDs and DVDs presently uses a manual, paper-based system to keep track of:
- stock levels
- files containing CD and DVD information
- sales information

The company has shops in five major cities.


When a customer comes into the shop s/he goes to the desk and either asks the assistant to find a
particular CD/DVD. The shop assistant locates the files for the item the customer has requested and,
(i) checks if it is stock
(ii) checks the price of the CD/DVD
(iii) finds where the CD/DVD is in the shop

If the customer has already found the CD/DVD in the shop s/he takes it to the desk and the shop
assistant finds the item file to check for its price. The customer pays for the CD/DVD and the following
then happens:
- shop assistant fills out a sales receipt and puts it into a file
- at the end of the day, all the sales are recorded and the number of each item in stock is
updated
- if the number of items are low a request for new stock is filled out
- the value of the day‘s sales are recorded in an accounts book.

The new system


The system is to be computerised. The following will be created:
(i) all CD and DVD data will be stored on a database
(ii) all items for sale will have a bar code on them
(iii) a sales file will be set up
(iv) a database will be created showing supplier and customer details

A customer goes into the shop and finds a CD/DVD s/he wants to buy. The shop assistant scans the bar
code on the item and the CD/DVD details have been found including its price. The stock files are
updated (i.e. 1 is reduced from the number in stock) and the takings file updated. The stock levels for
that item are checked and an automatic order is sent out after accessing the supplier database.
If the customer has requested the assistant to find a particular CD/DVD the assistant keys in the
name/artist and finds out if the item is in stock, where it can be found and it‘s price (the next stage is the
same as above). If the item isn‘t in stock, the assistant takes the customer details and updates the
database and adds a request for the item to be ordered and this is added to the customer‘s file.

a. Draw the systems flow charts to show how the above system will work.
b. Discuss the advantages of the new computerised system when compared to the manual
paper-based system.
c. Why would the new system reduce the shop‘s costs?

Computer Studies Handout 119


Problem solution including algorithm design and programming concepts
(This topic is for students intending to write computer studies 0420 or Zimsec
computer studies 7014)
Aim
The aim of this section of the syllabus is to cover the design, development, implementation, maintenance and
review principles, which include techniques and tools which relate to the solution to a problem. A study of these
topics is reinforced through practical work and illustrated by a consideration of existing problem solutions in
computer applications.

Flow Charts

A flow chart is a pictorial representation of the flow of data in a system. Flow charts are mainly
used to describe the processes a program will go through, in a way a flow chart is another way
of representing an algorithm. The main advantage of using a flow chart as compared to the use
of an algorithm is that a flow chart is easier to interpret, even for non computer people.

Program flow chart symbols

In a program flow chart, various symbols are used to represent specific processes

Start or end

Process

Input or output

Decision

Some flow chart symbols

Programming constructs
There are 3 programming constructs used in flow chart and algorithm design, namely:
 Sequence

Computer Studies Handout 120


 Selection
 Iteration

Sequence

In sequence a statement or block of statements is executed in the order in which they are given
and each statement is executed once.

Example 1 (format) Example 2 ( a flow chart to calculate the area of a


rectangle)

Start Start

Statement 1 Input Length

Statement 2 Input Width

Area = length * width


Statement 3

Print area
End

End

Q Draw a flow chart to calculate the area of a triangle

Selection

In selection a statement or block of statements is executed depending of a condition.

Computer Studies Handout 121


Example 1 (format) Example 2 ( a flow chart to grade a mark into pass/fail)

Start Start

Statement 1 Input Mark

Condition F Statement 2 Mark >=50 F Grade = Fail


? ?

T T
Statement 3 Grade = Pass

Statement 4 Print Grade

End End

In the example 1 above (format) statement 2 is only executed if the condition is false and
statement 3 is only executed if the condition is true. However statement 4 is outside the
condition block hence it is executed regardless of the condition being true or false.

Q Draw a flow chart to grade a mark into the following grades – (A – 70 to 100), (B – 60 to 69), (C – 50 to 59) , (D – 45 to
49), (E – 35 to 44) and (F – 0 to 34)

Iteration / repetition / loop

In iteration, a statement or block of statements for a given number of times or repeatedly until a
condition become true or false

Computer Studies Handout 122


Example 1 (format)

Start

Statement 1

Condition F Statement 4 End


?

T
Statement 2

Statement 3

Example 2 ( a flow chart to print all odd numbers between 0 and 10)

Start

N=1

N < 10 F End
?

T
Print N

N=N+2

Q Draw a flow chart to print all even numbers between 0 and 20 (inclusive)

Computer Studies Handout 123


Other examples

A system is used to keep the temperature of the greenhouse between 20°C and 26°C. If the
temperature drops below 20°C then a heater is turned on to warm the greenhouse up. If the
temperature rises above 26°C then a fan is turned on to cool the greenhouse down.

System Flowchart Example : Car Repair Garage

A car repair garage uses a computer system to produce invoices and keep track of the parts it
has in stock. The system uses two files :

 Stock File : Contains details of all parts that are in stock.


 Orders File : Contains details of all parts that are on order.

When a repair is completed the mechanic records the parts that were used on a form. These
parts are then entered into the computer by an operator. The list of parts that is entered is
checked against the stock list to reduce the likelihood of the operator making a mistake. If the
operator enters the name of a part that does not exist then an error report is displayed. When
the parts list has been entered the cost of the parts is looked up in the stock file and an invoice
(bill) is printed for the customer.

Every night the computer system checks the stock file. A report is printed to indicate which parts
need to be ordered from the garage's suppliers. Details of any orders are placed in the orders
file.

When a delivery of new parts is made to the garage the person making the delivery gives the
garage a delivery note. The delivery note contains a list of the parts that have been delivered.
The list of new parts is entered into the computer by an operator. If any parts have been

Computer Studies Handout 124


delivered that were not ordered then an error report is printed. When an order is delivered the
information about the order is removed from the orders file and the stock file is updated.

The structure of this system can be shown using the following system flowchart :

Data flow diagrams


These are simple diagrams to show how data flows through an organisation. They include
human as well as computer processes. No detail is given of how is stored.
Some data flow diagram symbols
Order customer OK
Process

Data store Customer credit check send order


Status warehouse
Entity/data source
Credit
Data flow
Status

Customer file

Q Describe tow types of diagrams that can be used by a systems analyst when producing system
documentation.

Computer Studies Handout 125


Q Study the following flowchart very carefully.

Algorithms

Candidates should have experience of representing algorithms informally (as structure diagrams, flowcharts, step
sequences, descriptions) and more formally in pseudocode. Candidates should appreciate the main requirements
of a programming language, to allow manipulation of data of various types and structures, including control of input
and output, and to provide for selection, repetition and subprogram intercommunication. Candidates should have a
simple understanding of the functions of interpreters, compilers and assemblers, and an appreciation of the
benefits offered by the existence of a range of languages, both high and low level.

What is an algorithm?

An algorithm is a sequence of steps which when followed mechanically (blindly) will


lead to a solution of a problem.

In algorithm design same in flow chart design there are 3 basic constructs used namely
Sequence, Selection and Iteration.

Computer Studies Handout 126


Sequence

In sequence a statement or block of statements is executed in the order in which they are given
and each statement is executed once.

Example 1 (format / structure)


Start
Statement 1
Statement 2
Statement 3
End

Example 2 (Algorithm)
An algorithm to find the area of a triangle

Start
Input Base
Input height
Area = (0.5 * base) * height {nb. The area of a triangle = ½ base multiplied by height]
Print area
End

Q Write an algorithm to find the area of a rectangle

Example 3 (algorithm)
An algorithm to find the area of a circle (assuming the radius is given)

Start
Input radius
Area = 22/7 * radius * radius {nb. area of a circle = πr2}
Print area
Stop

Q Write an algorithm to find the area of a circle assuming the diameter is given.

There are very few algorithms which can be written using sequence alone since most of the
actions require some selection.

Computer Studies Handout 127


Selection

In selection a statement or block of statements is executed depending of a condition.

Example 1

Start
Statement 1
IF <Condition> THEN
Statement 2
Statement 3
ELSE
Statement 4
ENDIF
Statement 5
End

In this case statement 2 and 3 will only be executed if the condition is true and statement 5 will
only be executed if the condition is false.

Example 2 (algorithm)
An algorithm to grade a mark into pass or fail.

Start
Input mark
IF mark >= 50 THEN
Grade = Pass
ELSE
Grade = Fail
ENDIF
PRINT Grade
End

Computer Studies Handout 128


Example 3

An algorithm to grade marks into Distinction, Credit, Pass and Fail, (given Distinction = 80 –
100, Credit = 70 – 79, Pass = 50 – 69 and Fail = 0 – 49)

Start
Input mark
IF mark >= 80 THEN
Grade = Distinction
ELSE
IF mark >= 70 THEN
Grade = Credit
ELSE
IF Mark >= 50 THEN
Grade = Pass
Else
Grade = Fail
ENDIF
ENDIF
ENDIF
Print Grade
End

Q Write an algorithm to grade marks into the following grades (A – 75 to 100), (B – 60 to 74), C (50 – 50 to 59), (D = 45 to
49), (E = 35 to 44) and (F = 0 to 34)

Apart fro the IF … THEN … ELSE construct there is the CASE ..SELECT which is easier to use
on multiple selections.

Example 4 (format)

SELECT CASE
CASE of Expressionlist
CASE expression 1
Statement
CASE expression 2
Statement
CASE expression 3
Statement
END SELECT

Computer Studies Handout 129


Example 4 (Algorithm)
Algorithm to grade marks (same as example 3)

Start
Input Mark
SELECT CASE mark
CASE mark 80 to 100
Grade = Distinction
CASE mark 70 to 79
Grade = Credit
CASE mark 50 to 59
Grade = Pass
OTHERWISE
Grade = Fail
End Select
Print Grade

Q The following algorithm inputs air speeds (which must be in multiples of 100) and outputs a
suitable message.
1 input a speed
2 whole = speed/100
3 case whole of
4 0,1,2 : result = slow
5 3, 4, 5, 6 : result = normal
8 7, 8, 9 : result = high
7 otherwise whole = -1
8 endcase
9 if whole = -1 then
10 output ―abnormal reading‖
11 else output result, ―speed‖

(a) Dry run the above algorithm for the following Input data and complete the Output
column in the table: [3]
Input Output
150
400
800

(b) State what would happen if line 2 had been missed out of the algorithm.[2]

Iteration / repetition / loop

In iteration, a statement or block of statements for a given number of times or repeatedly until a
condition become true or false

Looping constructs can be categorises into three parts, namely;


 Test on entry
 Test on exit
 Loop for a specified number of times

Computer Studies Handout 130


Test on Entry
In a test on entry loop the condition is placed at the top of the loop and is tested first before the
statement or block of statements is executed.

Example (format)

Start
Statement 1
While <condition> Do
Statement 2
Statement 3
Endwhile
Statement 4
End

Example 2
An algorithm to print 2,4,6,..10 (even number from 2 to 10)

Start
X=2
While X < 11 Do
Print X
X=X+2 {this line will increment x by 2 every time the loop is executed}
Endwhile
End

Q Write an algorithm to print odd numbers from 1 to 9 inclusive using the WHILE ..ENDWHILE construct

Test on exit
In a test on exit loop the condition is placed at the end of the loop and the loop has to be to be
eceuted at least once.

Example 1 (format)

Start
Statement 1
Repeat
Statement 2
Statement 3
Until <condition>
Statement 4
End

Computer Studies Handout 131


Example 2
An algorithm to print 1,3,5, ..9 (odd numbers from 1 to 9)

Start
X=1
Repeat
Print X
X=X+2
Until X > 9
End

Q Write an algorithm to print even numbers from 2 to 10 inclusive using the REPEAT … UNTIL construct

Loop for a specified number of times

Here a statement or block of statements is executed for a stated number of times

Example 1 (format)

Start
Statement 1
For <variable> = start to finish
Statement 1
Statement 2
Next <variable>
End

Example 2
An algorithm to print 2,4,6,..10

Start
y=2
For X = 1 to 5
Print y
y=y+2
Next X
End

Computer Studies Handout 132


Data types, Generic software and the organisation of data
The aim of this section is to acquaint the candidates with a broad view of generic software packages. It is expected
that these will be experienced through practical work. Although candidates may choose to become expert in the
use of a particular package, only a general knowledge is required of the kinds of features typical of generic
packages.

Most of the work on this part will be covered through practical work.

Application programs or packages (groups of programs) are designed to enable the computer to
tackle a specific task, such as writing a letter.

Examples:
Word processing - for writing letters, reports and other documents. Examples: Microsoft
Word, Word Perfect.

Main features available in all word processors:


- ability to set the page size and page orientation
- ability to change font style and font size (e.g. arial, courier, times new roman, etc.)
- ability to change margins (top, bottom and sides)
- page format (e.g. paragraphs, columns, etc.)
- importing text, graphics and pictures into the document body
- inserting and deleting text
- cut and paste/copy and paste (to prevent the need to re-type sections of text or to move/remove
text)
- search and replace based on key words
- word wrap (e.g. auto adjust a line to fit into paragraph alignment such as straight margins on left
and right, etc.)
- file management (create/delete/move/search for files)
- headers and footers and the automatic numbering of pages
- graphics (embed drawings and graphs into the document)
- macros (see later notes)
- merge (merge text files from one file into another e.g. mail merge)
- ability to send documents to a printer
- carry out a word count on the document
- add and manipulate tables in the main body of the document
- windows (edit 2 or more documents at the same time)
- WYSIWYG (what you see is what you get) – preview document to see how it will look when
printed
- spell checkers, language check and thesaurus
- simple translation from one language to another; for example:

Computer Studies Handout 133


Desk-top Publishing (DTP) - for producing posters, leaflets and newspapers.
Examples: Microsoft Publisher, Adobe PageMaker.
Facilities include: ability to import text and images from other programs or from disk plus ability
to position them individually on the page. Usually have some text editing tools included.

Essentially in DTP, a user creates a page layout with text, graphics, photos and other elements. The
following is a list of key differences to word processors:
- most word processors force users to work on a document in a linear fashion (i.e. paragraph by
paragraph and page by page); with DTP it is possible to place elements on the page and then
move them around as you wish to create the desired product.
- elements repeated throughout a document (e.g. a company logo) can be placed in master pages
rather than setting up each page individually as would be the case with a word processor.
- text is usually imported from a word processor or is typed into the document directly using a
frame. This allows you to create the layout first, link the frames together and add the text into the
frames later (e.g. in newsletters and magazines where layouts are created before any of the
actual text becomes available).

Data handling - for creating databases.


Examples: Datapower2, Pinpoint, Microsoft Access.
Facilities include: creation & editing of fields, sorting and searching records and displaying data
in graphical or chart form.

Databases are used to collect and organise information. Most database have all of the following
properties:

Tables
Data is stored in rows and columns (much like a spreadsheet – the main difference is how the data is
organised). Each row in a table is called a record which is made up of a number of fields (columns in the
table). The data type in the fields is usually either text, numeric or date/time. Most databases contain a
number of tables which are usually linked together in some way.

Forms
Forms are commonly called data entry screens since they are the user interface which allows data in the
tables to be viewed, entered or edited. Forms permit the control of how other users interact with the
information in the database e.g. only allow certain fields to be seen or only allow certain operations to be
carried out. This subsequently helps the protection of the information and also ensures it is entered
correctly.

Reports
Reports are produced as a result of questions such as ―how many times has a type of car broken down‖
or ―which cities have the highest house prices‖. Reports can be printed out, viewed on the screen or
exported (e.g. to a word processor, an email message, etc.).

Queries

Queries most commonly allow information to be retrieved from tables. Since the information is often
spread across several tables, queries allow it to be viewed as one single datasheet. They also allow
filtering so only the records required are seen. Queries can be either results seen directly on the screen
or the output to another form or report. Example of a query: (house > 200 000) OR (no_of_rooms < 4).

Computer Studies Handout 134


Spreadsheet modelling - for producing invoices and cost plans. Can be used to create
models, simulations or expert systems for others to use.
Examples: Microsoft Excel, Lotus 1-2-3.
Facilities include: entry of formulas to perform calculations, also ability to display data in
graphical and chart form. Acts rather like a multifunction pocket calculator, but once set up for a
particular purpose there is no need to remember all the formula and functions each time you
use it.

- it is made up of columns and rows; each row is identified by a number and each column is
identified with a letter (or letters)
- each cell is identified by its column id and row id e.g. A4, ET300 etc.
- a cell may contain a label (text entry such as MEAN VALUE) or a value (which can be a number,
a date, a formula, result of a calculation, or currency)
- the cursor identifies the current cell selected; it is possible to click on to a cell and a ―+‖ sign
appears in the bottom right hand corner; by dragging the formula down it is possible to replicate it
in other cells
- - formulas are used to represent a mathematical function
- e.g. = (C5 * D5) * 100
- = A5 + B5 + C5+ D5
- - functions allow computations to take place
- e.g. SUM, AVERAGE, MAX, MIN
- e.g. the second formula above could be written as = SUM(A5:D5)
- - it is also possible to use mathematical/logical expressions within cells
- e.g. IF G5 > 100 THEN ―Y‖ ELSE ―N‖
- it is also possible to create charts and graphs from spreadsheets (e.g. using a chart
wizard)

Graphics package - for drawing and painting.


Examples: Microsoft Paintbrush, Serif Photoshop.
Facilities include: cropping, resizing, various digital filters, drawing, painting and editing
tools.

Computer-Aided Design (CAD) - for floor layouts and product design.


Examples: 2D Design, AutoCad. Facilities include: various drawing and editing tools and
ability to scale accurately, sometimes in three dimensions and with ability to rotate in any
direction.

Presentation software - for demonstrations and lectures to live audiences.


Examples: Microsoft Powerpoint, RM Illuminatus.
Facilities provided to produce and edit on screen multimedia presentations involving text,
images, video and sound.

Music software - for composing a musical performance.


Example: Sibelius.
Facilities provided to create, edit, store, print and play scripts; to record, process and
replay a variety of sounds via input from a music keyboard and other "midi" instruments.

Computer Studies Handout 135


Authoring Software

Also known as authorware; this is a program that helps in the writing of hypertext or multimedia
applications. Authoring tools usually allow the creation of the actual required application by linking
together objects which can be text, graphics, music file, etc. By defining the relationship between objects
it is possible to produce very useful and eye catching applications.
Many authoring packages support a scripting language to allow for even more sophisticated applications
to be produced. Scripting languages have pre-built functionality (such as menu styles, graphic displays,
etc.) that is embedded within HTML. These pre-built functions allow users to engage with a web-site in
real time.

The distinction between authoring tools and programming tools is not at first obvious. However,
authoring tools require less technical knowledge to master and are usually used for applications that
present a mixture of text, graphics, and audio/music files.

Bespoke versus off-the-shelf software


Usually software packages are bought off-the-shelf. However, certain applications (usually for
commercial businesses, industrial companies, etc.) require specially written software which is unique to
that customer and is known as bespoke software.
There are many advantages and disadvantages of both systems.

Off-the-shelf – advantages
- tends to be less expensive since development costs can be spread over the many users
- can be more sophisticated since large sales bring in considerable revenue which can be used to
enable a lot of development to be done.
- there will be considerable support from other user groups
- sharing of files with other packages is usually easier since they are likely to be compatible (e.g.
Excel and Word)
- the package is available immediately – no need to wait for development period
- tried and trusted software since usually highly developed due to considerable user feedback

Off-the-shelf – disadvantages
- can be over-complex as it tries to cover as many aspects as possible (e.g. most users of Word
only utilise about 10% of its features)
- the software is often a compromise since it is intended for many users all with different
requirements
- may be very complex to learn because of the complexity caused through having unwanted
features
- may not fit exactly into the company requirements causing a compromise in the way it has to be
used within the organisation
- if there are major concerns with a software problem it is unlikely that it will be fixed immediately
(since it may cause problems with other users and/or cause software instability)
Bespoke Software – advantages
- specifically designed for the application and therefore more efficient and will only contain the
features wanted; since it will be devoid of unwanted features the software can take its specific
requirements to new levels which will make it very powerful
- can be customised to interface with all other software within the company thus preventing
software clashes
- easier to use since very specific and the writers of the software can also be involved in the
training of staff which will be geared towards their requirements

Computer Studies Handout 136


- can be modified/updated as the company‘s requirements change
- much better customer support since they will be in direct contact with the software designers

Bespoke Software – disadvantages


- very dependent on the suppliers of the software; if they go out of business there will be little or no
support if problems occur
- less likely to be as well developed/tested as off-the-shelf software
- much more expensive since all the development costs need to be met by the company (but efficiency
savings may compensate for this and it may prove to be less expensive in the long run)
- the development time can be very long which may cause problems
- difficult to tell how good the final software package will be (could be a real problem if the company have
waited 2 to 3 years to receive their new software only to find it doesn‘t meet their needs!!)

Macros
A macro is a name or key that represents a series of commands or key strokes. Many applications allow
single word or single nominated key on a keyboard to perform a whole series of actions. Macros can be
either written as required and then stored or stored in a library for future use.
For example, suppose you want some data to be input into a spreadsheet if the result of a calculation in
cell K40 is negative:
move to cell K40
is result of calculation < 0
if < 0 then load file “error report”
if >= 0 then output value

Macros can be very sophisticated and save the operator a lot of time. For example, the name and
address in a word processor could be set up by pressing key F1 and the system brings information from
a related database.

Other software

Other software, such as web browsers and search engines, communications software (including emails)
and graphics interfaces are all covered in other booklets and the information won‘t be duplicated here.

Checking for errors on Data

Data verification and data validation are two methods of making sure no errors occur in the data
before processing takes place. (Make sure you know the difference between them!)

Data Verification

This is a check to see if data has been keyed in correctly. The data is keyed in twice, and the
computer will only accept the data for processing if the two versions are identical. Another way
of data verification is comparing against the source which is known as proof reading.

Double entry in this method, data is entered twice (using two different people); the data is only
accepted if both versions match up. Often used to verify passwords by asking
them to be typed in again by the same person.
Visual check this is checking for errors by comparing entered data with the original document
(NOTE: this is not the same as proof reading!!).
Parity check this is used to check data following potential transmission errors; an extra bit is
added to each binary number before transmission – e.g. EVEN parity makes sure

Computer Studies Handout 137


each number has an even number of 1 – bits;

Example: if 11000110 is sent (four 1‘s)


and 11100110 is received (five 1‘s)

then the system will know an error has occurred.

Data Validation

A check to see if the data is correct on entry using a program before it is processed.

There are a number of different data validation checks which can be carried out...These are
some of them...

Range check this checks whether data is within given/acceptable values e.g. checks if a
person‘s age is > 0 but is also < 140.

Length check this checks if the input data contains the required number of characters e.g. if a
field needs 6 digits, then inputting 5 digits or 7 digits, for example, should be
rejected.

Character check this checks that the input data doesn‘t contain invalid (type check) characters; e.g.
a person‘s name shouldn‘t contain numbers.

Format check this checks that data is in a specified format (template) e.g. (picture check) date
should be in the form dd/mm/yyyy.

Limit check this is similar to a range check except only ONE of the limits (boundaries) is
checked e.g. input data must be > 10.

Presence check check that data is actually present and not missed out e.g. in an electronic form,
somebody‘s telephone number may be a required field.

Consistency check/ this checks if fields correspond (tie up) with each other e.g. if Cross field check Mr.
has been typed into a field called ―Title‖ then the ―Gender‖ field must contain M or
Male.

Check digit this is an extra digit added to a number which is calculated from the digits; the
computer re-calculates and validates the check digit following input of the number

(NOTE: check digits can identify 3 types of error:


(1) if 2 digits have been inverted e.g. 23459 instead of 23549
(2) an incorrect digit entered e.g. 23559 instead of 23549
(3) a digit missed out all together e.g. 2359 instead of 23549)

Calculation of a check digit using the modulus 11 method

This section shows how check digits are calculated. The ISBN-10 (used on books) has been chosen as
the example; this uses a modulo 11 system which includes the letter X to represent the number 10.

Computer Studies Handout 138


Example 1
To calculate the check digit for the ISBN 0 - 2 0 1 - 5 3 0 8 2 - ?

(i) the position of each digit is considered:


0 -2 0 1 -5 3 0 8 2 -? ← Number
10 9 8 7 6 5 4 3 2 1 ← digit position

(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 2 x 9 + 0 x 8 + 1 x 7 + 5 x 6 + 3 x 5 + 0 x 4 +8 x 3 + 2 x 2
= 0 + 18 + 0 + 7 + 30 + 15 + 0 + 24 + 4
= 98
(iii) the total is then divided by 11 (modulo – 11) and the remainder, if any, is subtracted from 11 to give
the check digit.

98 ÷ 11 = 8 remainder 10

11 – 10 = 1

this gives a check digit of 1

final ISBN becomes 0 -2 0 1 - 5 3 0 8 2 - 1

Example 2
To check the correctness of a check digit the computer re-calculates it as follows:

The ISBN to check is: 0 - 1 3 1 5 - 2 4 4 7 - X

(i) the position of each digit is considered:

0 -1 3 1 -5 2 4 4 7 -X ← number

10 9 8 7 6 5 4 3 2 1 ← digit position

(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 1 x 9 + 3 x 8 + 1 x 7 + 5 x 6 + 2 x 5 + 4 x 4 + 4 x 3 + 7 x 2 + X x 1
= 0 + 9 + 24 + 7 + 30 + 10 + 16 + 12 + 14 + 10 (recall that X = 10)
= 132

(iii) the total is then divided by 11; if there is no remainder then the check digit is correct:
132 ÷ 11 = 12 remainder 0

hence the check digit is correct

Computer Studies Handout 139


Data Types:

When a database is designed, all the fields are set to accept a particular data type. This helps
check for the wrong type of data being entered and makes sure the data is stored as efficiently
as possible. It also means it will be sorted correctly.

Alphanumeric/text - a field of this data type will accept both numbers and text.
When to use - if you want to enter text or a mixture of text and numbers.
When NOT to use - if you want to store only numbers or only dates. You can
enter numbers or dates into text fields but they would get sorted as if they were
words and could not easily be used for any calculations.
Numeric - a field of this data type is used to store numbers. There are two types of
numeric field you need to know about:
Real - used for decimal numbers such as 3.4, 3.1427 and 6.0 etc. Real numbers
can be formatted as currency (i.e. £5.67) or to a fixed number of decimal places
(i.e. entering 3.1427 into a real number field formatted to two decimal places
would mean it appeared as 3.14)
When to use - if the field is going to be used to store numbers with decimal
places such as 'height', 'length' etc.
Integer - used for whole numbers.
When to use - if the field is only going to be used to store whole numbers, i.e.
'number of children', 'car doors' etc.
Logical/Boolean - a field of this data type will only let you enter a 'Yes' or a 'No'. This
may be as text (YES/NO or TRUE/FALSE) or as a tick/blank.
When to use - when you only need to store something as 'true' or 'false' or store whether
something exists or does not exist.
Date - this special field stores days, months and years so that records can be sorted
correctly. Date fields can display the date information in different formats such as the full
name of the day/month (28th August 1961) or the numerical versions (28/08/61)
When to use - for any field which will be used to store date information.

Examples of use:

A football club uses a database to store details of its players.

Data such as Surname and First name is stored in text fields.


The players car registration is mixture of text and numbers so it is stored in a text field.
The height of the player (in metres) is a decimal number so it is stored in a real number
field.
The number of goals scored is a whole number so it is stored in an integer number field.
The player's date of birth (DOB) is a date so it is stored in a date field.
The players telephone number has a space between the code and the actual number so
it is stored in a text field.
Information such whether the player is right or left footed is stored using a
logical/Boolean field. The field is labelled as 'Right footed?' and the entry is either a
TICK or left blank.

Computer Studies Handout 140


Examination questions on this topic

You will often get a question about a table from a database. It can be very easy to mix up a
question about field names with one about field data types.

For example:
Item Stock code Size (cm) Manufacturer Date purchased Plastic?
Hose clip T0090 0.90 Fisher 28-07-2002 No
Hose clip T0135 1.35 Fisher 28-07-2002 No
Joining clip K0118 0.90 Asus 28-04-2001 Yes
Extension hose L0035 100.00 Fisher 28-02-2000 Yes

If you are asked to name a field then look the row at the top which should have all the
field names. In this example, 'Item', 'Stock code' etc. are the field names.
If you are asked to identify the key field then look for a column of numbers or
numbers/text that identifies each item uniquely. In this example the 'stock code' is the
key field as each item in stock would be given a unique code to avoid confusing it with
any other item.
If you are asked to describe a suitable data type for a particular field then you must look
at the type of data being stored in each column.
If the data is text or a mixture of text & numbers (including spaces or brackets
etc.) then the data type would be text.
If the data is numeric then the data type would be numeric but you also need to
say if it should be real or integer. (Remember, use real if the data has decimal
places and integer when all the data is whole numbers)
If the data is in the form of a date then the data type would be date. It does not
matter if the date is stored in a numeric form (i.e. 28-08-61 or 28/8/1961) or written
out fully (i.e.28th August 1961).
If the data seems to have only two options, particularly 'yes' or 'no' then the
data type should be logical/Boolean.

Computer Studies Handout 141


Generic software questions

1 The spreadsheet shows the computer equipment on loan to a staff member in a


company.

Cells B13 and C7:E13 contain formulae.

(a) State a cell that contains a data item. [1]


(b) Describe how the numbers in the range of cells B7:E13 can be changed to include money symbols. [2]
(c) Give a formula that could be in cell B13 to calculate the total value of the equipment in Year 1. [1]
(d) Each year the value of the equipment is halved. State a formula that could be in cell C7 to calculate the
value of the PC system in Year 2. [1]
(e) If the value in cell B10 is changed to 60, state all the cells where the values would change automatically.
(f) On the spreadsheet diagram shade the cells that must be selected in order to create and label a chart
showing the Total value ($) of the computer equipment for Years 1, 2,3 and 4. [2]

2. A database has been set up by a car dealer to maintain information on cars currently
available for sale. A section of the database is shown below.

Computer Studies Handout 142


(a) How many records are shown in the section of the database above? [1]
(b) If the following query was input
(Top Speed (kph) > 250) OR (Doors = 2)
using Ref No only, which items would be output? [2]
(c) Write down a query which outputs cars which cost more than $60 000 and have a 0-100 kph time
(sec) of less than 7.0. [2]
(d) The car dealership has decided to produce a website which allows potential customers to search its
database of cars on-line.
Give two advantages to the car dealership of doing this. [2]

3. A school keeps a spreadsheet of examination results in four subjects. Part of the


spreadsheet is shown below.

(a) Which column has been used to sort the data? [1]
(b) What formula has been entered in cell G2 to calculate Allen‘s average mark? [1]
(c) The IT results need to be sorted so that the highest mark is at the top. Describe how
this sort could be done. [2]
(d) The formula IF(G5 > 45, ―PASS‖, ―FAIL‖) is entered in cell H5. What output appears? [1]
(e) State the validation check that should be carried out on data entered in cells C2 to F8 to
ensure values over 100 are not input. [1]
(f) The school has kept the spreadsheets of all the examination results for the last five
years. What feature of the spreadsheet software would allow the results to be easily
compared? [1]

(1) Describe four methods used for automatic data capture. Give a different application for each of the
methods chosen.

(2) A record contains the following fields:


- Title (Mr/Mrs/Miss) and Sex (Male or Female)
- Date of birth (written in the form dd/mm/yyyy)
- Pay Number (which is made up of 8 digits)
- Telephone Number
- Pay
Give a different validation check for each of the above fields and explain why it is used.

Computer Studies Handout 143


(3) A system uses the ISBN-10 (modulo 11) method to generate and validate bar codes:
- each digit in the number is multiplied by its digit position
- the result of each multiplication is added to a total
- the total is then divided by 11
- the remainder is subtracted from 11 to give the check digit (if the remainder is 10, the letter ―X‖ is
used as the check digit)
a) Which of the following numbers have the correct check digit?
(i) 0–555–21622–5
(ii) 0–121–90021–X
b) Calculate the check digit for the following number:
(i) 0 – 1 5 0 – 2 4 6 2 2 – ………
(ii) Discuss the types of errors that check digits can identify.

(4) (a) Describe three ways of carrying out verification checks.


(b) Give two examples where verification checks would be made.

(5) A burglar alarm system uses an 8 – bit register. The first 4 bits indicate if a sensor has picked up an
intruder (shown with a 1 – value) and the second four bits indicate the zone where the sensor has picked
up an intruder:

(where A = window sensors


B = floor sensors
C = door sensors
D = infra red heat sensors)

For example:

Indicates: window sensor detected an intruder in zone (8 + 4 + 2) 14

(a) What do the following indicate:

Computer Studies Handout 144


(b) What would be the binary pattern for a window broken and an infra red sensor detecting an intruder
both in zone 15?

(6) A company is using a word processor to produce a page advertising their products. Unfortunately,
the information wouldn‘t fit onto one single page.

Which five features of a word processor could be used to ensure that the advert fits onto one page only.

(7) A college has invested in a computer system to help carry out the following tasks:
- advertise their college (both on the Internet and by paper leaflets)
- keep a track of student and staff information/contact details
- keep a track of payments and fees
- produce on line courses for the students

Describe four software packages the college could use to carry out the above tasks and explain why
each software package has been chosen.

(8) Describe three fundamental differences between word processors and desk top publishing
packages.

(9) The following spreadsheet has been set up to compare the depreciation of 8 new cars over a 4 year
period.

A B C D E F G
1 name of car new price Value after Value after Value after Value after Depreciation
($) year 1 ($) year 2 ($) year 3 ($) year 4 ($) over 4 years
(%)
2 Fiat Bravo 150 28 000 21 000 15 600 11 200 9 800 65
3 Honda Civic ―R‖ 36 000 28 800 23 400 20 000 18 000 50
4 Range Rover SE 80 000 64 000 60 000 50 000 48 000 40
5 Mitsubishi Lancer 20 000 12 000 9 000 6 400 5 000 75
6 Citroen C8 LX 40 000 20 000 13 200 10 000 8 000 80
7 BMW 320 Conv. 72 000 57 600 50 000 43 200 36 000 50
8 Audi A3 1.6 SE 30 000 22 500 18 000 15 000 12 000 60
9 Mercedes SLK 68 000 57 800 51 000 48 000 45 600 33
350
10 Mean Deprecn 56.6
11 Highest Deprecn. 80.0

a. What formula must be in cell G4 to find the depreciation on a Range Rover after 4 years?
b. What formula must be in cell G10 to calculate the mean (average) depreciation of all 8
cars?
c. What formula must be in cell G11 to find the highest (maximum) depreciation of all 8
cars?

Computer Studies Handout 145


d. Describe how it would be possible to predict the value of each car after 5 years and after
10 years?

(10) A database has been set up to compare certain features of freezers. A section of the database is
shown below.
Item I.d. Price ($) Lowest temp Capacity (m3) Warranty Colour
0
( C) (years)
A 300 - 20 0.16 1 white
B 250 - 18 0.15 1 silver
C 400 - 22 0.25 2 white
D 300 - 20 0.18 3 white
E 520 - 40 0.35 3 silver
F 360 - 25 0.30 1 white
G 410 - 30 0.30 2 white
H 290 - 18 0.20 2 silver

a) How may records are shown in this section of the database?


b) What items would be output if the following search condition was input:

(Price($) > 300 OR Warranty(years) > 1) AND (Colour = ―silver‖) ?


c) Give the search condition to find all freezers which operate below - 250C and have a
3
capacity of more than 0.25 m .

Good Luck to you all – Baba vaTadiwa

Computer Studies Handout 146


HOW TO ANSWER EXAM QUESTIONS
READ AND UNDERSTAND
READ EACH QUESTION CAREFULLY (AT LEAST TWICE)
IDENTIFY THE KEYWORD
LOOK FOR ANY NUMBERS IN THE QUESTION e.g.. List THREE
LOOK AT THE NUMBER OF MARKS ALLOCATED

KEY WORDS

Computer Studies Handout 147


Computer Studies Handout 148
Computer Studies Handout 149
Computer Studies Handout 150

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy