Computer Studies Handout
Computer Studies Handout
Contents
Topic Page
Introduction 2
Input and output devices 5
Storage devices and Media 29
Types and components of a computer system 46
Networks 53
Ways in which ICT is used 60
The effects of using ICT 93
Systems analysis and design 101
Problem solution including algorithm design ( for 0420 Computer studies only) 120
Generic software and organisation of Data (including data types) 134
How to answer exam questions 148
Appendix 1 Past exam paper (November 2009)
Appendix 2 Marking scheme (November 2009)
Introduction
What is a computer?
Definition 2
A computer is a general purpose machine which processes data according to stored
instructions. A computer is designed to perform, complex and repetitive tasks fast while
maintaining a high level of accuracy and precision.
No matter how fast a computer can go, you should realise that your mind is far
much better than any computer in existence, it‘s your mind which develops and
improves of the capabilities of the computer.
Definition 3
A computer is an electronic device which works under the control of stored programs, it
automatically accepts data as input, stores the data, processes it and then gives out information
as output.
From the above definition (definition 3), there are a number of new terms which we have to
define before going further the new terms have been underlined.
Program A program is a set of instructions which directs the operations of a
computer. A program tells the computer what to do.
Data Data refers to raw facts which are entered into the computer for
processing. Data may or may not make sense to the receiver, e.g
05.08.02 which can be taken to be a date, time, code or anything. The
word data is in plural while the singular for data is datum.
Information is data meaningfully put together, or it can be referred to as
Information data which has been processed. In computing there is a difference
between data and information. The difference between data and
information is that information is processed while data are the raw facts
still to be processed.
Input The term input refers data sent into the computer for processing. You
should realise that in most cases we enter data into the computer and not
information, this is so because the main purpose of a computer is to
process data.
Store To store is to keep, retain or save data for later use, this is achieved
through the use of storage devices such as a magnetic dis.
Process To process is to make some calculations and logical comparisons on
data. Processing in a computer is done in the CPU by the Arithmetic and
Logic Unit (ALU)
Output Output refers to the information obtained from the computer after
processing. Same as with input you should realise that in most cases we
obtain information from the computer and not data, hence it is not
appropriate to define output as data obtained from the computer although
it is possible to obtain data from the computer especially with turnaround
documents
The most important system software is an operating system which is part of the system software.
An operating system is a set of programs which drives the computer. The operating system is responsible for
supporting the application software, monitoring sequences of events in the computer system, controlling the
resources of the computer system (e.g. distribution of memory and handling peripheral devices) and supporting
communications between the elements making up the computer system.
System software can be classified into two, operating systems and Utilities, the table below classifies system
software and gives examples.
System software
Operating systems Utilities
MS-DOS Norton Utilities
Windows 98 LapLink
Windows NT Windows 3.x
Windows XP Compilers
Windows vista
MacOS (e.g. System 7)
UNIX
VAX/VMS
MVS
Application programs or packages (groups of programs) are designed to enable the computer to undertake a
specific task, such as writing a letter using a word processor. There are several other application packages such
as a CAD program, accounts packages, and many others.
The table below classifies application software and gives examples for each group.
Application software
Word Processors Databases Spreadsheets Presentation Games
Word Access Excel PowerPoint Hearts
Amipro Dbase Lotus 123 Paint shop Solitaire
Word Perfect FileMaker Quatrro Pro Corel Draw Freecell
The other type of software is programming languages. Programming languages are used to create all other
software whether it is system or application software. Modern programming environments have graphical user
interfaces (GUI) which uses symbolic icons, drag-and-drop technique and English-like statements. Visual Basic is
the most popular example of such environments. Programming in visual environment creates an impression that it
is very easy to write programs
What is Hardware?
Hardware refers to the physical/tangible components of a computer for example a keyboard. Hardware devices
are commonly referred to as peripherals.
A peripheral is a computer component connected (linked) to the CPU but located outside the CPU, for example a
keyboard or a mouse.
Hardware Components
All computers require at least 5 basic hardware components for them to operate:
Input device: An instrument used to enter data into the computer for example a
keyboard and a mouse. The input device enables the user to enter data and
instructions into the computer.
Output device: A component used to display or printout information from the computer for example a
VDU, printer, or any other device that displays or prints the results of processing.
Main Memory: A temporary storage space for data and programs being processed and the immediate
results of processing.
Secondary storage device: Permanent storage space for data for example a magnetic disk, flash
disc, magnetic tape, etc. Secondary storage devices keep large amounts of data.
Central processing unit (CPU): The brain of the computer, the CPU is the component which actually
executes instructions.
The 5 basic hardware components of a computer can be represented by a diagram as shown below.
CPU
Control Unit
Secondary Storage
Input Devices
An input device is an is an instrument used to enter data into the computer for processing.
With the Direct data capture devices data is transferred automatically from the source document
into the computer, for example from a bar code reader to the computer at a Point of sale (POS)
terminal in a supermarket, therefore eliminating the need for the user to enter the data using a
keyboard.
Advantages
1. They are faster when entering data
2. They eliminate transcription errors
Disadvantages
1. They are more expensive than the commonly used input devices such as the
keyboard.
(b) identify suitable uses of the input devices stating the advantages and disadvantages of each:
Keyboard
The keyboard is the most common input device used to enter text and numeric data into the
computer. The most common type of a keyboard is the QWERTY
keyboard which is named after the top row character of its text characters
which spell the word QWERTY. The QWERTY keyboard follows the same
key layout as the traditional typewriter except that it has some additional
keys such as the function keys like F1, a separate numeric keypad and
other control keys used to control the functions of the computer like the
sleep key. Each key of the keys on the keyboard has a switch which when pressed will send a
binary code to the computer.
Uses
• Keyboards are used to input text, for example into a word-processed document. There are
other devices used for copying text, so keyboards tend to be used where the text concerned is
original and is entered directly by the author of the document. Examples of such documents are
letters, business documents, user guides etc.
• Keyboards are also used to type commands into a computer, for example pressing the control
(Ctrl) key at the same time as pressing X (to cut selected text) or C (to copy the selected text) or
V (to paste the selected text).
• They are also used to type in unusual selections of characters, such as passwords.
1. They allow accurate entry of data, in combination with a monitor to check accuracy.
2. They allow quick entry of original text.
3. They are robust devices.
4. Concept keyboards are helpful to people with disabilities
5. Reliable when entering data in the form of text and numbers
6. Usually supplied together with the computer, so there are no additional costs
Disadvantages
1. Conventional keyboards can be difficult for people with disabilities to use.
2. They take up more space than other input devices.
3. Slow to enter data and to access menus compared with direct data entry devices such as
barcode readers, and magnetic ink character recognition (MICR) and optical mark
recognition (OMR) devices.
4. .Difficult to use when one wants to move objects on the screen
5. Prone to transcription errors
Ergonomic keyboard
This is a specialised keyboard designed to minimise on
Repetitive Stress Injury (RSI) to fingers. The ergonomic
keyboard attempts to place the keys in a way which makes it
easy to reach out for the keys, it is sometimes referred to as the
Concept keyboard
Advantages:
– Faster when making non-text selections for example making menu choices on the till of take-
away outlet
– The keyboard is waterproof which makes it ideal for restaurants and take-away outlets
where there is dirt and a high risk of splashes.
Disadvantage:
– Poor for text or numeric data entry. However in most cases the concept keyboard has a
numeric keypad so the operator can enter other products not programmed to the keyboard
or the quantity sold.
Numeric keypads
A numeric keypad is used specifically to enter numbers, although alphabetic
characters can be entered by using the function key.
Uses
They are used in situations where only digits have to be entered, for example:
• at electronic point of sale (EPOS) terminals, where they are very useful when a barcode is
damaged; when this happens, the checkout operator can key in the number using the numeric
keypad
• with automated teller machines (ATMs)
• on mobile phones
• when delegates at a conference need to record theft responses to questions
• when inserting personal identification numbers (PINs), such as for chip and PIN credit/debit
cards.
Mouse
A mouse in the next most common input device, it can only be used in Graphical User
Interface (GUI) environments. A mouse is used for menu selection and controlling the
movement of the cursor on the screen. To move the curser one has to slide the
mouse on a flat surface, this will in turn roll the ball underneath the mouse which then
turns two rods on the mouse which will send a signal to move the cursor on the screen.
The newer mice no longer use the ball which becomes difficult to use when it becomes dirty,
instead they use a laser beam which is more efficient than the rolling ball.
A mouse has two buttons and in most cases a scroll button in the middle. The left button is
usually used to make menu selections and to drag objects around the screen. The right button
is usually for shortcut menus, when clicked a pop up menu will come which usually contains
commonly used options. The scroll button is used to scroll up and down on a page, some
mouse models are now wireless.
Uses
• Mice are used to move the pointer on the screen a well as for selecting items such as check
boxes, radio buttons and options from a drop-down menu.
• They can be used to draw objects in drawing and art packages.
Advantages
– Faster to use when making menu selections and navigating through a long document.
– Ideal for use with desktop computers
– Usually supplied with a standard computer, therefore its cheap as there are no additional
cost to buy it.
– They allow faster entry of the chosen option, compared with typing on a keyboard.
– They allow fast navigation through slideshows! websites.
– They are smaller and more compact than keyboards.
Touch pads
A touchpad is incorporated into most laptops and is meant to
simulate the use of the mouse. It usually has two buttons close to it,
similar to a mouse, but these tend to be sunk below the level of the
touchpad itself. The user touches the touchpad with a finger and by
gently tapping it can make choices on menus, and so on. By
keeping the finger in contact with the touchpad and moving the
finger around, the user can control the pointer on the screen.
Uses
On a laptop a touchpad can be used in much the same way as a mouse is with a desktop
computer. It can be used to move the pointer on the screen as well as for selecting items such
as check boxes, radio buttons and options from a drop-down menu.
Advantages:
• They allow faster entry of the chosen option compared with typing on a keyboard.
• They allow fast navigation through slideshows/ websites.
• l hey are integrated within the laptop computer and don‘t have to be plugged in.
Disadvantages:
• People with disabilities can find them difficult to use.
• Many users find them difficult to control compared to a mouse.
• They can be difficult to use for entering data other than menu choices, radio buttons or by
means of hyperlinks.
Tracker ball
A tracker ball operates the same way as a mouse, it looks more like a mouse which
is placed upside down. A tracker ball has buttons just like a standard mouse, it is
more ideal where there is limited flat space and this is the reason why they are
commonly used with laptops. Unlike a mouse a tracker ball is not supplied together
with a computer and therefore there are additional costs.
Uses
• They can used for any application by people with disabilities or RSI where the use of a mouse
would be too difficult.
• They are used in control applications where objects on a screen are used to control a process.
• Pilots on fast ferry ships and air traffic controllers use them to control the appearance of radar
screens and their contents.
Advantages:
• They do not require the fine control that a mouse does.
• They are easier for people with disabilities or RSI to use.
Disadvantages:
• It is difficult to enter data that the button has not been programmed for.
• They can be slower for selecting options compared
with using a mouse.
Video digitisers
A video digitiser is used to input video to a computer from a television or
video camera. In order for the computer to be able to handle the resulting
images the video has to be converted from analogue to digital using the
digitiser. Video digitisers are usually video cards that are fined into your
computer.
Remote controls
A remote control is used to control other devices remotely by emitting an
infrared signal to the external device. Buttons are pressed to choose
different options such as selecting channels on the television or radio,
changing the sound volume, setting times for recordings, and much more.
Remote controls are small, so that they can be held in the hand, and
wireless, communicating with the device by means of infrared signals.
Uses
They are mainly used with home-entertainment device such as televisions, satellite boxes,
video I digital versatile disk (DVD) recorders and stereo systems.
Advantages:
• They can be any distance from the device and still operate it.
• People who have difficulty walking find it easier t control devices.
Disadvantages:
• People with disabilities or RSI can find it difficult use.
• If somebody or an object comes between the remote control and the device, the device can no
longer L controlled remotely.
Joystick
A joystick is commonly used for playing computer games. A joystick is looks more
like a gear lever. The stick on the joystick is surrounded by switches which are
closed as the joystick is moved in the direction of that particular switch (left/right and
up/down). The joystick has buttons to control further switches used when playing
games e.g. to jump, fire, e.t.c.
Uses
• They are used with video/computer games.
• They are used in the training of airline pilots to control various aspects of flying an aircraft.
Disadvantages:
• They can be difficult to use for entering data other than menu choices, radio buttons or by
means of hyperlinks.
• It is more difficult to control the pointer than other windows, icons, menu and pointer (WIMP)
input devices.
Microphone
A microphone is used to enter data into the computer in the form of sound. There
was a lot of talk about voice recognition software in the late 90s but however the use
of such systems to enter text into the computer has remained very much limited.
Voice recognition software if used makes it faster and easier to enter data as there
will be no need for typists as people will simply speak as the computer types. Voice
input is also helpful for the visually impaired and those who cannot type using their hands
because of a disability.
Uses
• Microphones are used most often to input speech for incorporation as a voiceover in slide
shows or in web pages.
• They are used to input dictated text for use with voice recognition software. The software is
used to convert the speech into text so that it can be used with other software packages such
as word processors.
Advantages:
• Changes to the sound/voice can be done in real time rather than recording it and inputting the
recording.
• It is quicker to input text by speaking into the microphone rather than typing it in.
Disadvantages:
• When inputting a voiceover, the computer cannot be used for any other purpose at that time.
• Voice recognition software is not as accurate as using a keyboard.
Bar codes are commonly found on packaging and the code gives the following items of data:
1. country code
2. manufacture code
3. Item code
4. Check digit
WAND
A bar code reader is used to read the code. The reader uses a laser beam that is sensitive to
the different reflections from the lines and the spaces. The reader converts the reflected light
into digital data that is transferred to a computer for processing.
Uses
• They are used in all kinds of shops, wherever the details of products represented by code
numbers need to be input.
• In libraries, they are used to input the book number and library-card number.
Advantages:
• They are faster than typing the number in using a keypad.
• It is a more accurate method of data entry compared with typing the number in.
Disadvantages:
1. Input is limited to a number code only.
2. Not ideal for items which need weighing such as meat and also on large items like a
refrigerator.
3. They can be expensive.
Radio frequency identification (RFID) tags are attached to objects so that the
object can be identified through the use of radio waves. The tag consists of two
parts: an integrated circuit storing information about the object, and a miniature
aerial for transmitting and receiving radio signals. The reader is used to transmit
a radio signal in order to communicate with the RFID tag. It then uses the data it
receives to identify the object. Some RFID readers are handheld and some called portals are
used at doors to detect objects passing through the doorway or entrance or exit to a building.
Uses
• They are used in passports in a number of countries.
• They are used by companies to track movements of their products and for stock taking.
• They are used in pet identification.
• In some libraries, they are replacing the use of
barcodes on books.
Advantages:
• Unlike barcode readers, they can cope with objects between the tag and the reader.
• They can be read from and written to.
Disadvantages:
• They are more expensive than other methods of input.
• When used to hold personal data, people‘s movements can be tracked easily, leading to lack
of privacy.
Scanner
A scanner is used to digitise images and text from a printed document. Scanners can be used
together with Optical Character Recognition (OCR) to convert scanned text data
into actual text which can be edited on the computer. The main traditional
application of scanners has been to enter pictures into the computer but with
introduction of digital cameras has reduced the use scanners in this area. Advancement in
technology has made it easier for people to use a scanner together with a printer as a
photocopier and also through the internet a scanner can be used as a fax machine.
Uses
• Scanners are used to scan documents that can be converted into text-based documents using
OCR software.
• They are used to scan old documents for keeping records; for example, birth, death and
wedding certificates.
• They are used to scan images that can be transferred as faxes.
• Photographers use scanners to obtain digital images of photographs. Not all photographers
use digital cameras and even those that do, still have many photographs in their collection
which were produced using a traditional form of camera.
• They are used as barcode readers.
advantages:
• Scanners allow images to be stored for further editing.
• Using OCR on printed documents saves time
with typing the text in again.
• using a barcode scanner is quicker than typing in
the barcode.
Disadvantages:
• The accuracy of reproduction is limited.
Digital camera
A digital camera is used to take photos just like a normal camera and
it is then connected to the computer through a USB (Universal Serial
Bus) port to enable the photos to be downloaded onto the computer.
A digital camera has a facility to store photos on a memory stick
which can be placed inside the camera, the size of the memory stick
will determine the number of photos which can be stored on the camera.
Uses
Advantages:
• Digital cameras produce better quality photographs than a traditional camera.
• It is quicker to upload a number of images than to scan them in.
• It is quicker to upload images than to have a film developed.
• A memory card can hold more images than a roll of film.
• Cheaper as no film is used therefore eliminating the cost of buying a film and the cost of
developing the film
• Unwanted images can be deleted straight away
• One can navigate through the photos after taking them
Disadvantages:
• They are more expensive than traditional cameras.
• Batteries need changing more often than with traditional cameras.
Web cameras
Webcams are similar to video cameras but are connected directly to the
computer. They have no storage capability but instead transmit directly to the
computer. Another major difference is that they tend not to be used as portable
devices. They are, in effect, miniature video cameras with no storage facility
other than that provided by the computer.
Uses
High-quality webcams are used by businesses in videoconferencing to input moving pictures
from a fixed position into a computer.
Advantages:
• They can be online constantly.
• They provide elderly or disabled people with the opportunity to stay in touch visually with
friends and relatives without leaving their home.
Disadvantages:
• A webcam has very limited features, for example no zoom facility.
• They are not portable, as they must be connected to a computer.
• The software is fairly limited, often failing to include video-editing facilities.
Uses
• They can be used anywhere a payment is made using a bank or credit card, such as:
in bank ATMs
as part of electronic funds transfer at point of sale (EFTPOS) terminals in supermarkets
and other types of shops and restaurants.
• In security, they are used to prevent unauthorised access to restricted buildings or hotel
rooms.
Advantages:
• They allow faster entry of data compared with typing on a keyboard.
• Data entry is more accurate than with a keyboard.
• Data entry is more secure than with a keyboard.
• Their use prevents entry to restricted areas without a card.
Disadvantages:
• If the strip is damaged, data has to be entered manually, resulting in loss of speed at EFTPOS
terminals.
• If the strip is damaged or the card is lost, the holder cannot gain access to the building or hotel
room.
Advantages:
• They allow immediate updating, thereby preventing fraud.
• The cards do not need to be in immediate contact with the reader and so receive less damage
through regular use.
• Data entry is more secure than using a magnetic strip.
• Their use prevents entry to restricted areas without a card.
Disadvantages:
• If the card is lost the owner loses a proportion, if not all of the money value of the card.
• There is a lot of information on some cards — if the card is stolen, hackers can use it for
fraudulent purposes and identity theft.
Uses
Chip and PIN readers are used wherever a payment ne to be made; for example, in restaurants,
supermarkets, shops of all descriptions, travel agents and banks.
Advantages:
• They allow secure transactions to take place, as without the PIN the transaction cannot
proceed.
• They save time in the transaction compared with using cash or cheques.
• Chips are more robust than magnetic strips.
Disadvantages:
• If the customer forgets their PIN, the transaction has to be cancelled.
• The card holder needs to be very careful to protect their PIN when using their card.
On the other hand digital data is data in discrete notation or simply data in binary form which is
a series zeros (0s) and ones (1s)
A computer can only understand data in binary form hence data from a sensor needs to be
converted to digital form before it can be processed by a computer and this is done by a device
known as an analogue to digital converter (ADC). In some instances a data logger is used in
place of a sensor to collect the data. A data logger has the ability to record the physical data,
temporary store the data and then convert the data to digital form. The data logger is later
connected to the computer where the data stored on the logger is later downloaded onto a
computer. The data logger is ideal in situations where the data to be recorded is from a remote
location where it is not possible to carry the computer to that particular location for example
recording the PH level from a river.
There is a wide variety of sensors, these include: temperature, sound, water level, oxygen
level, movement, pulse rate, humidity, acceleration, pressure, proximity, pH (acidity and
alkalinity), speed and many others.
Uses
• Temperature sensors are used in automatic washing machines. The temperature is input to
the microprocessor, which compares it with a preset value. If the reading is lower than the
preset value, the microprocessor switches on the heater. If the temperature is higher than the
preset value, it switches off the heater unless the heater is already off, in which case the
microprocessor takes no action. This process is continuous until the washing cycle has finished.
Temperature sensors are also used in a similar fashion with automatic cookers, central heating
controllers and computer-controlled greenhouses.
• Pressure sensors can he used with burglar alarms, normally under carpets by doors and
windows. The microprocessor is programmed with a preset value, normally 104%; although it
cannot be zero — otherwise, if a piece of paper, for example, fell on the sensor, the alarm
would sound. The microprocessor monitors the readings, continuously checking that the preset
value has not been exceeded. If it is, then a siren or loud noise is triggered by the
microprocessor. They are also used in automatic washing machines to check that the weight of
the clothes is not higher than the preset value, otherwise it triggers a warning light or sound. In
addition, they are used as part of a robotic arm that grips objects and also in production line
control.
• Light sensors are used in computer-controlled greenhouses, with preset values input to the
microprocessor. Unlike with most other sensors, there are at least two preset values: one is for
a cloudy day; the other for night-time. The microprocessor continuously monitors the readings
MlDI instruments
These are musical instruments connected to computer using a musical
instrument digital interface (MID!). This can either be to operate to the
instrument or be an integral part of it.
The MIDI interface converts the output signals from the instrument rr a
digital form understood by the computer.
Uses
• A performance can be directly recorded onto a computer and stored as a MIDI file.
• MID! files can in turn be used to supplement other instruments. For example, if a group of
musicians are lacking a particular instrument, they can use
pre-recorded MID! file.
.Advantages
• They allow flies to be produced that can be manipulated.
• Any errors in performance can be removed.
- -.Vantages:
• The music produced can sound manufactured rather than spontaneous.
There are two ways in which a touch screen can work, one
is by use of infra-red beams which are broken when one touches the screen therefore sending a
signal to the software of the exact position where the infra-red beam has been broken, and this
is then used to determine the selection made by the user. The other one is by way of pressure
being exerted by the touch which then makes a connection to two layers of conducting plastic
which then sends a signal to the computer.
Uses
• They are used in many applications, including:
• ATMs by bank customers
• EPOS terminals in cafes and other retail outlets, with buttons on the screen representing
prices for products
• Tourist-information kiosks and for public-transport enquiries
• personal digital assistants (PDAs), for choosing options and handwriting recognition
• interactive white hoards in education.
Advantages:
• They allow faster entry of the chosen option
compared with typing on a keyboard.
• It is easier to select options than by using a mouse.
• People with disabilities can find them easier :o use.
• There is less likelihood of selecting a wrong option.
Disadvantages:
• it can be difficult to enter data other than from a
list/set of options.
• The screen is fairly firm, so RSI could result from continual use of a finger to select options.
Graphic Tablet
This is a flat pad which one can draw or write with a special pen. A graphic tablet
is mostly used in architectural drawing with CAD software or in general artwork.
A graphic tablet enables greater control on the pen enabling one to write as if
you are using a normal pen and paper.
Uses
• Graphics tablets are often used to create computer graphics.
• In East Asia, graphics tablets are widely used :o write Chinese, Japanese and other language
characters, as users find it easier than typing these characters on a keyboard.
• Tablets are used to produce technical drawings and in computer-aided design (CAD).
Advantages:
• They allow alterations to occur as the drawings are input, rather than later, as happens with a
scanned image.
• They are a more accurate way of drawing than using a mouse.
Disadvantages:
• They are more expensive than mice.
• They can be difficult to use in choosing menu selections.
OCR is commonly used to read prices off clothing tags in a shop and also to read post codes on
letters at the postal sorting offices. However here in Malawi we don‘t have post codes and
therefore we would not expect the local postal system to use an OCR. The main advantage of
an OCR is that the data in both machine and human readable which makes data verification
easy.
Advantages:
• It is a faster method of data entry compared with manually typing in the document.
• It is an easier method of entering data for people with disabilities.
Disadvantages:
• A lot of errors are produced.
• They cannot read handwriting very well.
Advantages:
• It is a quick method of data entry.
• These devices produce greater accuracy of input than using OCR.
• It is easy for the user to fill in the form or paper to be processed.
Disadvantages:
• Compared with manual methods of marking, it is an inaccurate method. Forms sometimes
need to be manually checked prior to input.
• Forms have to be carefully designed, and this can be expensive.
Uses
When you receive a cheque and deposit it in your bank, the amount on the cheque and your
account details are added to the cheque in magnetic ink in front of other magnetic ink character
recognisable number (usually just below the signature). The cheque is then sent to a clearing
bank to be read by another MIC reading machine and the written amounts are then transferred
between accounts by computers automatically.
Advantages:
• They are more secure than OCR as they cannot be tampered with.
• It is a more accurate method than OCR or manually inputting the information.
• Cheques can be read even if they have been overwritten.
Disadvantages:
• There is a limit to the character set that can be used.
• It is an expensive method of data entry.
CRT Monitors:
The computer monitor which is also known as the screen or VDU (Visual
Display Unit) is the commonest output device found on the computers. The
VDU uses a cathode ray tube to fire electron onto a thin coating of phosphor
dots inside the computer. The process results in the dots glowing therefore
forming a pixel.
Uses
Advantages:
• They are cheaper than thin film transistor (TFT) monitors.
• They produce better quality images than TFT monitors, in terms of colour display and refresh
time.
• The screen display can be viewed from a number of angles.
• The VDU is quiet
• It is environmentally friendly as is does not waste paper.
Liquid crystal displays (LCDs) - these use tiny crystals which work through polarisation of light
using a electromagnetic field. This is used together with special filters which can block the
passage of light. LCDs are lighter and use less power than a normal monitor which makes them
more ideal for laptops and are also used in watches and calculators.
TFT monitors
TFT or LCD monitors can be used in applications where space is limited, such
as small offices. They are, however, becoming more and more popular for
normal use, as prices fall. The screen contains thousands of miniature
transistors that are activated by the processor. Each pixel is formed by three
separate colour transistors: red, green and blue.
Uses
• They are often used when only one person needs to view the screen at a time.
• A TFT screen is an integral part of a laptop.
Advantages:
• They are easy to carry and manoeuvre.
• They produce less glare than CRT monitors.
• They emit less radiation than CRT monitors.
Disadvantages:
• The angle at which they can be viewed is limited.
• There is an inconsistency of colour tones when viewed from different angles.
• Videos can have slight blurring.
• They are more expensive than CRT monitors.
Printers
Printers can be placed into two main groups, namely impact and non impact printers.
Impact printers
The impact printers have a print head which moves across the paper, the head has
a set of pins which are pushed out on specific positions to form the shape of the
required character. The pins are directed to a ribbon which then strikes on the
paper therefore making a print. The impact printer like the dot matrix printer prints
Uses
They are used in noisy industrial environments, such as garages and car servicing, car sales
and car repair services.
Advantages:
They can work in environments which would cause problems for laser and inkjet printers,
as dirt and oil in the atmosphere do not affect their performance (robust).
Cheaper than the non impact printers
Ideal in situations where carbon copies are required as it can print more than one copy at
a time
Continuous print jobs using pre-printed stationery are more easily managed.
Disadvantages
Ink-jet printer
Ink-jet printers use tiny nozzles which spray different coloured inks onto paper
to produce a character or a graphic image. The inkjet printer is ideal for home
use where there is no heavy printing.
Uses
• They are used where there are low output volumes;
the need to change cartridges at regular intervals / renders them unsuitable for high-volume
output processes. They therefore tend to be used in small offices and stand-alone systems.
• They are very good when applications require very high-quality output and where speed is not
an issue, for example digital camera applications.
• Inkjet printers are being developed that will create three-dimensional models. Successive
layers of plaster or resin are placed on top of each other using the inkjet nozzle. Layers of
adhesive may be ‗printed‘ on top of each layer to fix them together. The result is a three-
dimensional model representation using computer-aided design (CAD) software.
Disadvantages:
• They are slow to print more than one page.
• They are more expensive to run because inkjet cartridges do not last as long as toner
cartridges.
• In very long print jobs, the printing could stop due to the need to change an ink cartridge.
Laser printer
The laser printer uses the same technology as the photocopiers, it uses toner ink
which is transferred to paper and then fixed in by heat and pressure. The laser
printer is ideal for office and business use where there is bulky printing.
Uses
• They are used in applications where low noise is essential, for example most networked
systems.
• They are essential in applications which require fast, high-quality, high-volume output, for
example in most offices and schools.
Advantages:
• Fast output is achieved.
• Running costs are cheaper than for inkjet printers.
• Large printout Jobs can be carried out quickly.
• The quality tends to be higher than other printers.
• Toner cartridges last much longer than inkjet cartridges and so laser printers can be used on
longer print runs than inkjet printers.
Disadvantages:
• They are limited in the paper size that they can take.
• Initial costs are high as they are expensive.
• The first page can be slow to print.
Plotters are often used by architects in engineering applications for drawing building plans.
Plotters are also used in science engineering to print circuit boards and machine parts.
• Plotters are still used to produce printouts of graphs, but are more frequently used to produce
blueprints, such as plans for the construction of a building, since these can be very large. ihey
are also used in other technical drawing and CAD applications.
• They are sometimes used to produce billboards and signs by replacing the pen with a cutter
and using special vinyl film on paper. This type of plotter can also be used to cut garments to
order.
Advantages:
Disadvantage
Braille printer
Braille printer convert text into the Braille code, this printer produces patterns of raised dots on
paper for use by the blind.
Speaker:
Speaker can play music from the computer and also used for speech synthesis. The speaker is
an integral part of multimedia computers. It is vital for entertainment on the computer be it
playing games, watching a movie or playing an audio CD. Speakers are also useful for blind
users where text output can be synthesised.
Uses
• Speakers are required to play sound files attached to multimedia presentations and websites.
• Computers and MP3 players are used to play music from CDs and DVDs,
• Speakers are an integral part of home entertainment Systems.
Lights:
LEDs are power devices which use low power and emits light. LEDs are used to indicate
various actions on a device for example ―power on‖ for the computer which is indicated by a
This section examines a limited number of output devices associated with computer control.
Uses
• In the home they are used in automatic washing machines to make the drum go round. They
are used in automatic cookers to switch on the heater fans. They cause water pumps to come
on in central heating systems. They are also used in computer- controlled greenhouses to open
the windows and switch on fans. They cause dishes that are being cooked to go round in a
microwave,
• In industry they are used to move robot arms and on production lines they cause the Conveyor
belt to go round. They are also used to cause component parts to he picked up and placed
accurately where they should go.
• In computers themselves they are used to cause moving parts to work in disk drives, both
optical and magnetic, as well as in scanners, printers and plotters
Actuators
Actuators are used to convert computer signals into movement.
Some devices such as motors are considered to be actuators in
their own right. Others, such as light bulbs and heaters, are
passive even when attached to a computer unless an intermediary
actuator is included. In these cases the actuator would convert a
computer signal into movement to cause the light bulb or the heater to come on.
Buzzers
Uses
• They are used in mobile phones designed specifically for young people. If someone feels
threatened they can hold down the # key on the phone and it actives an extremely loud buzzer.
CPU
CPU is short for Central Processing Unit. The CPU is the brains of the
computer, it is sometimes referred to as the processor or central
processor. The CPU is the computer itself where the calculations and
logical comparisons on data take place. The CPU determines the
power of the computer and all the other components which can be supported by
the computer depend on the CPU.
Most computers have a single processor but large computer systems can have many
processors. If a computer has more than one processor it is called a multiprocessor system.
The ordinary microcomputer consists of a single processor that fits on a single chip. This
processor is called a microprocessor (A complete computer on a single silicon chip).
The arithmetic logic unit (ALU), which performs the arithmetic and logical operations on
data.
The control unit, which controls the overall running of the computer, it extracts
instructions from memory and decodes and executes them.
The scientific unit for measuring storage capacity is a byte, a byte is made up of 8bits. A bit is a
binary digit which is either a (0)zero or a 1 (one). One byte (a collection of 8 bits) make up a
character. If you group bytes together you will get a kilobyte (KB), a kilobyte is made up of 1024
bytes. Above a kilobyte comes a megabyte (MB) which is a collection of 1 048 576 bytes. Next
after a megabyte is a gigabyte (GB) which is equivalent to approximately 1000 megabytes
(1000MB).
NB. A bit is a binary digit, either a zero or a one (not a zero and a one.)
Storage device
A storage device is an instrument used to keep/retain/save data for later use for example a hard
disk. Storage devices can be divided into two;
Primary store
Secondary Store.
The primary store is used to store data currently being used, the immediate results of
processing and the instructions waiting for
processing. Primary store is volatile (Switching
power off erases all data in the primary store).
RAM (Random Access Memory) chips are used for
primary store. Primary storage is the fastest but most expensive type of storage. The RAM in a
computer is where the operating system is loaded to when the computer is switched on.
Application software programs are also copied to RAM when they are loaded, for example a
word processor or game is loaded into RAM before it can be used.
Apart from the processor itself the RAM is next single most important factor which determines
the speed of a computer, the more RAM you have installed in your computer the better.
(NOTE: For completeness, it is worth mentioning that two types of RAM exist called SRAM
(static RAM) and DRAM (dynamic RAM) – SRAM doesn‘t need to be constantly refreshed to
retain its memory unlike DRAM. Also note that computers use cache which is a portion of
memory made from SRAM. Memory caching works since programs usually access the same
data or instructions over and over again. By retaining as much information as possible in SRAM,
the computer operates more quickly (cache is usually termed level 1, 2 or 3 (termed L1, L2 or
L3).
Q Name the 3 types of data which are stored in the main memory.
ROM holds the instructions for starting up the computer. This type of memory can only be read and
cannot be altered (i.e. deleted or written to) and is non-volatile (i.e. it doesn‘t lose its contents when the
computer is switched off).
Read only memory can be read from but cannot be written to, it is used to store firmware.
Firmware refers to programs hardwired onto the computer by the computer manufacturer
containing instructions telling the computer how to load the operating system.
ROM-BIOS
BIOS stands for Basic Input Output System, it holds the software required to provide the lowest
level of interface between the computer and its peripheral devices. The software in the BIOS is
also responsible for loading the operating system and this software come already written onto
the BIOS chips from the manufactures.
RAM vs ROM
The difference between RAM and ROM can be summarised by the table below.
RAM ROM
Loses data when the computer is switched off Does not lose data when the computer is
(Volatile) switched off (None volatile)
Information in RAM can be edited (add, delete, Information in ROM cannot be edited i.e You
modify) i.e, you can read and write. can only read from but cannot write to.
Types of ROM
PROM (programmable read-only memory): This is a memory chip which is supplied blank with a facility
which enables a user through special software to write programs onto it. But once the PROM has been
written to one cannot wipe it clean and use it to store something else. Just like ROM, PROM is non-volatile.
Secondary store is the storage location where data which is not currently needed is stored, but
ready to be retrieved when needed. Secondary store is non-volatile (switching power off does
not erase the data ). Examples include Hard disks, floppy Disks, Compact Disks, Magnetic
tapes, and many others. Backing store is used to hold both programs and data.
It is always slower to access data from secondary store than from primary store.
Data stored in backing storage is retained when the computer is turned off but data
stored in main/internal memory is lost.
When the user wants to access the data from backing storage it is copied to the
main/internal memory of the computer.
Direct access
Offers random access to data, where one can go straight to the wanted record e.g. on a disk.
Time taken to retrieve a file does not depend on its location on the storage media. To access
data on a direct access device one can go straight to the desired record without going through
preceding records. Direct access storage is most appropriate for real time and online systems
such as ATMs, Process control, Airline reservations, where data has to be processed as soon
as it is entered.
Disadvantage
Direct access storage media is more expensive than serial access storage media.
Serial Access
In a serial access system records are accessed in the order in which they are stored, to access
a record you have to go through all its preceding records usually done on a magnetic tape. In
serial access the records are not sorted in any particular order and this is common with
transaction files and such files will need to be sorted before they can be used to update the
master file.
Sequential Access
In a serial access system records are accessed in ascending or descending key sequence
(order) for example on a magnetic tape.
The hard disk is usually the default secondary storage media for a typical computer.
The hard disk is made up of a number of disks held on a spindle. Data can be stored
on either surface of each disk with each surface having its own read/write head
making it faster to read the data from a disk. The operating system, applications
software (e.g. word-processor, database, spreadsheet, etc.), games and any program or data is
usually stored on a hard disk. Typical home/school computers have a disk capacity of about
120 gigabytes. The storage capacity of hard disks has evolved quite rapidly from an average of
500 megabytes about a decade ago to as much as 120 gigabytes today.
Data on a magnetic disk is stored in the form of magnetised spots on the flat disk surface
organised into tracks and sectors. The circular surfaces constantly rotate at high speeds
around the read/ write to enable data to be written to or read from them.
Uses
Fixed hard disks are essential in any system that requires fast data access times and fast
data transfer rates.
• They are used in real-time system such as robotics, rocket launching, etc.
• They are essential in any online system such as booking systems, EPOS stock control
and electronic funds transfer.
• They are used in file servers in computer networks.
Advantages
Very fast access to data (provides random access), The access speed is about 25
milliseconds for faster disks and about 60 seconds or more for the slow access ones.
Easier to update as data can be updated in situ (Implying that data can be updated
where it is as compared to magnetic tape where one needs another tape to hold the
changes.
More robust as the actual disk is sealed in a cover.
They have a very large capacity.
Disadvantages
These are used to store data in exactly the same way as fixed hard disk but, as their
name suggests, they can be easily disconnected from a
computer. They are used to transfer large files from one
computer to another. They often have a capacity in excess of
500 GB and so can store much larger files than an optical disk.
Uses
They are used as backup media and for transferring large files from one computer to
another. They are particularly useful for transferring server software from one network to
another.
Advantages:
• Data access times are fast.
• The data transfer rate is fast.
• They have a large capacity.
Disadvantages:
• If dropped, they are easily damaged.
• The transfer rates are not as fast as with fixed drives.
• They are more expensive than other forms of removable media, such as CDs or DVDs.
Floppy disks:
Floppy disks used to be the most common backing store media for personal computers
but they are quickly being replaced by flash disks. The 3½ inch floppy disks can be found
on most microcomputers, they have a storage capacity of 1.44 MB of data which is
enough to hold a book of about 400 pages of text (graphics/picture take up more space
that text). The 3½ inch floppies replaced the historic 5¼ inch floppies which had a
capacity of 720MB.
Advantages
Disadvantages:
A zip disk is high storage removable storage media usually used for backing
up office applications, Photos, videos, music and presentations. A Zip disk
has a higher storage capacity than floppy capable of storing up to about
70MB and a faster access speed of about 2.5MB per second.
Jaz disk
Magnetic Tape:
Uses
They are used in any application that requires an extremely large storage capacity and
where the speed of accessing data is not an overriding requirement, such as:
• batch-processing situations, for example updating bank accounts with cheques
• utility billing systems, where all customer bills are produced at the same time and every
customer record has to be processed
• payroll applications, because all records have to be read in sequence, so direct access
has no advantage in this case
• making backups, as this is also an application where every item of data has to be read.
Advantages:
• They are cheaper bit for bit than using disks.
• They are very robust as they are encased in a cartridge.
• They are easier to remove and keep away from the computer than equivalent-sized
disks.
• The data transfer rate is fast.
• Magnetic tape can store large quantities of data as compared to most other removable
storage media.
• Suitable in situations where all records have to be accessed for example a payroll
system.
1. Slow to access data this is because one cannot go directly to a required record
on the tape.
2. Difficult to update as they cannot be updated in situ, when one wants to update
records on a tape s/he has to use another tape and transfer all the new records to
a new tape.
3. Tapes can be easily damaged because the plastic strip has to pass through an
open area where it is read from therefore exposing it to possible damage.
CD ROMs/DVD ROMs
This form of optical disk is read only memory (ROM), which means it
can only be read from. It cannot he recorded over. The main
difference between CDs and DVDs are their capacity. DVDs can hold
up to ten times the amount of data that a CD can store; DVD writers
use a shorter wavelength of laser light than CD writers do, so the pit on the disk surface is a
lot smaller and more can be stored in the same space. Both forms of the media are portable
and most CDs can he read using a DVD drive but not vice versa.
Uses
They are used for applications which require the prevention of deletion of data, accidental or
otherwise.
• CD ROMs are used to store music albums and to provide audio output in home
entertainment systems. ihey are also used to store software, con1putr games and reference
books such as encyclopedias.
• DVD ROMs are mainly used for storing films, but are increasingly being used for data
storage.
Advantages:
• 1)VDs hold more data than a CD.
• CDs are cheaper to buy than a DVD.
• Beth hold much more data than a floppy disk.
• Both are cheaper than hard disks.
• Both are more robust than hard disks.
Disadvantages:
• Data transfer rates for both CDs and DVDs are slower than hard disks.
• Data access times are longer than for hard disks.
Uses
• They used for home recordings of music on CD as on DVD.
• They are both used for storing and transferring data from one machine to another.
Advantages
• They are cheaper than CD/DVD RWs.
• Once burned they cannot be accidentally written
Disadvantages
• They can only be recorded on once. If a mistake is then the disk needs to be thrown away.
• If several versions of a file are written to the disk, there is less space available than on
C1)/DVD RWs.
• Not all CD players will read CD Rs.
Uses
DVD RWs are frequently used for recording a television programme that would otherwise be
missed. This recording can then be erased after viewing, ready for recording of another
programme.
Advantages
• They can be used more than once.
• Different versions of files can be overwritten, thereby virtually increasing capacity
Disadvantages:
• Their cost makes them impractical for use as permanent backup media, unlike CD/DVD Rs.
• Files can be overwritten accidentally, unlike with CD/DVD ROMs.
DVD RAMs
The digital versatile disk random access memory (DVD RAM) is a newer technology. The
recording surface is an alloy coating, as with DVD RWs. However, the
data is stored in concentric tracks like magnetic media, unlike the single
spiral of a single track
that is used in other optical media. They usually come in cases that
have to be loaded into the DVD RAM drive. They have the same
properties as DVD RW but have quicker access times. Writing and
Uses
• DVD RAMs are used for general data storage.
• They are used for archiving, as they are longer lasting than other media.
• In some camcorders, they are used for recording video.
Advantages:
• They have a greater capacity than CD/DVDs.
• They are more durable than DVDs, in that they can be overwritten more times.
Disadvantages:
• They are not compatible with most DVD players.
• They are more expensive than other types of DVD media.
Blu-ray disks
These have the largest capacity of all optical disks; 25 Gb, 50 Gb and 100
Gb. The increased capacity is due to the fact that it uses a shorter wavelength
for its laser beam, using light that is close to the blue/violet spectra (hence its
name) rather than the red light used by other optical devices. They are coated
in a protective lacquer to prevent damage to the surface but operate in a
similar fashion to other optical disks. They are used for storing films (movies):
25 Gb equates to 2 hours high definition (HD) television, 13 hours standard definition television.
It is possible to play back video on a disk while simultaneously recording high definition video.
Uses
• Their main use is in home video game consoles.
• Devices have been developed to facilitate the playing and recording of videos.
• PCs and laptops are being developed that use blu-ray disk drives for data storage as well as
playing videos.
• They are used in many camcorders.
Advantages:
• They store more than other optical media.
• Data transfer rates are high.
• Access speeds are higher with blu-ray players than with other optical devices.
Disadvantages:
• They arc very expensive compared with other data storage media.
• There have been problems with the encryption techniques used to prevent piracy.
Uses
They are used in portable music players. but have been superseded by MP3 players, iPods,
and so on.
Advantages:
• Minidisks can be recorded over more times than other media.
• They are more robust than other optical media.
Disadvantages;
• Minidisks have slower transfer rates than other disks.
• They hold less data than other music players.
• They are more expensive than other portable players.
Uses
• They are used to transport files and backup data from computer to computer.
• They are used by system and network administrators for carrying software fixes.
Advantages:
• They are more compact than equivalent optical or magnetic media.
• They are more robust than other forms of memory, even surviving being washed
• They do not need software drivers to operate.
Uses
• They are used for storing photographs in digital cameras.
• They are used in mobile phones to store phone numbers, photographs, etc.
• They are used in MP3 players to store music.
• They are used as backing storage in many handheld computers.
• They are more compact than equivalent optical or magnetic media.
Advantages
• are more compact than equivalent optical or magnetic media.
Disadvantages
• they are more expensive per Gbyte than hard disk
• they can only he used for a particular number of read/write operations.
• they have lower storage capacity than hard disk
Some storage devices can access data very quickly, whilst others are extremely slow...
* Note: Modern back-up tapes have very fast access speeds, but only to save/read data sequentially (they
are serial access devices). Tapes are very slow if you want to read files out of order, since the tape has to
be rewound and fast-forwarded.
MP4 (MPEG-4)
MPEG-4 files are in a format that can hold a mixture of multimedia objects such as audio, video, images,
animation, etc. MP4 players again use compression technology to store data in files. They operate in
much the same way as MP3 players described above.
Flash memories
These are non-volatile re-writable memories evolved from the EEPROM; they are often connected to the
USB port on the computer enabling a user to transfer files between computers.
SD (secure digital) cards are a type of flash memory used in digital cameras and mobile phones. XD
(extreme digital) cards are also a type of flash memory used in digital cameras and are similar to SD
cards.
The stripe is split up into three tracks which are read by a magnetic stripe reader. Usually only tracks 1
and 2 are used. The information stored usually follows the following format:
(* the optional data often contains a PIN verification code or card verification code)
Devices that can be carried on one‘s person, this includes devices that communicate with us
and not just devices that we use to communicate with other people.
Mobile phones
Mobile phones work using the transmission of electromagnetic radio waves. They have a
transceiver which is only powerful enough to transmit or receive information from the nearest
mobile phone mast or tower. This must be within 10 kilometres of the phone.
Mobile phones are used primarily for making phone calls for personal and business use.
However; most phones have other features as well, such as Internet access, a personal digital
assistant (PDA) interface, games and e-mail and text facilities. They are used to store
information about personal contacts. They are also used to watch television and can be used to
record video or still photographs.
Uses
• They are mainly used to make business and personal phone calls.
• They are particularly useful in remote areas with satellite dishes if a landline is unavailable.
• They are a convenient method of sending and receiving urgent messages for business
purposes without necessarily interrupting conferences.
Advantages
• They can be used while travelling if a public phone is unavailable.
• They can be used to send photographs/video footage.
Disadvantages
• They cost more to use than a landline.
• The quality of photographs/video can be poor.
• They can lose connection if travelling through a ‗blind spot‘
• Displays are still small compared to other devices.
• They have a limited battery life.
These work in exactly the same way as conventional DVD players but come equipped with a
built-in screen. The size of the player is smaller, as is the screen, so making them easy to carry.
They are mainly for personal use rather than business. They are used in cars/planes/trains for
passengers to watch while on a long journey.
Advantages:
• They are small and compact.
• They can play music from CDs.
Disadvantages:
• The screen is low resolution and the quality of viewing can be poor.
• The screen is small, making it difficult to view.
Uses
• They can be used for downloading music and radio! television programmes.
• They can be used for downloading data from the Internet or the movement of large amounts of
data from one computer to another in a similar way to memory sticks.
Advantages:
• They are compact.
• They can hold up to 100 GB of data.
Disadvantages:
• They have very small screens.
• The earphones that come with the player are low quality
Global positioning systems (GPS) work by making use of satellites that orbit the earth. There
are a number of these satellites, such that at least four are visible in the sky to any point on the
Earth‘s surface. Receivers are used in navigation (see below) and for drawing maps as well as
for military purposes. The exact position of the receiver can be determined by carrying out
calculations based on the position of the satellites and the time taken for the signals to get to
the receiver. Three satellites would normally be enough for this purpose but the use of four
makes it a very accurate system.
Uses
Advantages:
• Positioning and distance travelled can be achieved regardless of the surrounding terrain, tall
trees or buildings.
• Greater accuracy for measuring distances than using cars or bicycles.
Disadvantages
• Transmission of data can be a little slow at times, leading to slight inaccuracies.
• They are expensive devices.
Advantages:
• They are quicker to use than a normal road map.
• They receive tip-to-date traffic conditions.
Disadvantages:
• The display is very small.
• Unsuitable roads can be recommended.
Mobile phones are considered to be handheld computers, as are PDAs are a particular kind of
hand held computer that come with many of the modern technologies. They are fitted with a
touch screen that is navigated using a detachable stylus. Text is entered using a keyboard
which appears on the screen. PDAs have several features including basic database, word
processing and spreadsheet software. They have the ability to be used as phones, to connect to
larger computers using Bluetooth technology, to access the internet and to use GPS. Some
PDAs that are used as phones may not have a touch screen but use a keyboard instead.
Uses
They are used by professionals whose job requires them to be travelling for some or much of
the time, for example doctors who are on call can keep track of patients‘ records.
•.Computer engineers who move from installation to installation can use them to keep records of
their day to day activities, as well as scheduling appointments and carrying any software ‗fixes‘
that need to be used on systems.
Advantages
• can be used remote from the place of work.
• are easier to carry than laptops.
Disadvantages
• Difficult to enter much text.
• They are about as expensive as laptops.
• They have a limited operating system.
• They have limited application software.
Bluetooth
Bluetooth was developed by a Scandinavian company and was named after King Harald Batan
of Denmark, whose nickname was Bluetooth. It uses radio waves to connect devices such as a
headset and a mobile phone. The maximum distance over which two devices can communicate
is usually 10 metres, although greater distances are possible with a power boost. The data
transfer rate is usually lower than 1Mbit per second.
Wireless fidelity (WiFi) is an alternative to Bluetooth and is used for all but the smallest of
wireless communication areas.
Uses
• It is used for communication between a mobile phone and a headset so that drivers can
concentrate on driving.
• A mouse, keyboard and printer can be connected wirelessly to a PC using Bluetooth.
• Data can be transferred between devices such as photographs from one mobile phone to
another.
• Games consoles use Bluetooth to connect to their wireless controllers.
Advantages:
• It can be used for a variety of applications, whereas WiFi is only used in local area networks
(LANs) where cables would otherwise be used.
• It has cheaper hardware requirements than WiFi.
• It consumes less power than WiFi.
Disadvantages:
• The data transfer rate is slower than with WiFi.
• It covers smaller distances than WiFi.
Peripheral Devices
What are Peripheral devices?
Peripheral devices are devices connected to the computer but external in relation to the
processing unit. If a peripheral device is disconnected, the computer will still be able to work;
only functions performed by this peripheral device will not be available. For example, if you
Peripheral devices can reside inside the computer case or outside. For example, a mouse, a
keyboard, a monitor is always outside the case and they are connected to the computer via
ports, which are situated on the back of the case. Disk drives are positioned inside the case and
they are connected directly to the motherboard via a data cable.
Questions
1. Name the methods used to represent information on A, B, C, D and E using the words
from the list below.
Computers can be classified into various groups depending on size, cost and use. Basically
computers can be classified into 3 groups, namely micro-computer, mainframe and super
computer.
1. Microcomputers – this is the most common class of computers usually used by the
home, office and school users. They can be divided into different types:
a. Desk top computers – the most common in this group which
comes complete with a CPU both with a relatively small hard
disk, a floppy drive, CD/ DVD rom. It also comes with the
monitor, mouse and a keyboard
Laptop computers have the obvious advantage over desk top computers (PCs) in that they are fully
portable. This is of particular value if a user wishes to do work away from the office (e.g. when travelling)
or if they want the freedom to work anywhere within a building taking full advantage of WiFi technology.
One of the main considerations when buying a laptop is the battery life. This can depend on a number of
things but one major factor is the processor specification. The following is a list for consideration:
- the processor should consume as little power as possible thereby prolonging internal
battery life
- the processor should run as cool as possible minimising the problems associated with
heat dissipation
- no fans needed to cool the processor thus reducing the load on the internal battery
c. Palm-tops & PDAs (personal digital assistants) - These are small hand-held
computers. PDAs are used as diaries and also used to store contacts. PDA are
usually supplied with a word processor or a spreadsheet, internet and email
software. PDAs can be linked to bigger computers in the same way phones can
be linked to computers that‘s though a direct cable or the use of infa-red links or
even blue tooth.
Single user system – A systems which allows only one person to use the computer
at a time like the PCs here at school.
Single-user on-line systems...
allows for interaction between user and job, to influence future processing with the
user directly linked to the computer.
Example : Using a microcomputer for playing a computer game; word-processing;
Multi-user On-line systems (Multi-access systems)
- This is whereby two or more users can have access to a central computer concurrently
and interactively.
Example : users using terminals to access and run software on a central computer.
The main purpose of the operating system is to provide for an interface between the user
and the computer and as such different software houses have designed different
operating system environments with the aim of developing the most suitable environment
given a task.
Advantages
i. More secure than GUI
ii. Uses less memory and storage space
iii. It is more open as it does not restrict options available to the user and hence this
type of interface is ideal for system administrator and system developers
iv. Does not require specialised hardware & software
Disadvantages
i. Difficult to learn/use
Advantages
i. User friendly (easy to use)
ii. Less errors when entering commands
iii. Faster to use as one just clicks on an icon
iv. Offers better memory management
v. Allows multitasking
Disadvantages
i. Uses more memory/ storage space
ii. Requires specialised hardware (cannot run on old 386 machines)
5. Natural language
This interface enables the user to ―talk‖ with the computer where the computer asks
questions and the user will answer back using a microphone. With this type of interface the
user is required to go through a set of words before using the system to enable the system
to understand the user‘s pronunciations.
1. Buffering
A buffer is a temporary storage space for data in transit from a fast processor to a slow
peripheral (e.g. a printer) to cater for differences in processing speeds e.g. printer buffer.
Types of system
Candidates should be able to distinguish between the different types of system, to describe
what is needed to support them, to explain which is the most suitable for any given application
and to discuss the consequent implications for the user. Candidates should be able to describe
particular problems in the management of the various types of system, such as conflicting
access to common data or critical timing considerations.
Real-time processing
This is an online system where data is processed as soon as it is entered and the results
of processing are produced quickly and sufficiently to affect the current environment.
Example : a control system
When booking seats on a flight, for example, real time (transaction) processing would be
used. Response to a query needs to be very fast and once a seat is booked it needs to
(NOTE: the above is sometimes referred to as pseudo real time since some applications don‘t
need immediate updating of the files)
Sensors send data (via an analogue to digital converter – ADC) to a computer or microprocessor which
decides whether or not to take action (based on comparison with stored data). If a change needs to be
made, the computer/microprocessor sends signals (via a digital to analogue converter – DAC) to the
devices being controlled and alters their status (e.g. turn a heater on if a temperature sensor indicates
that a temperature is too low) – actuators are often used to open valves, turn on equipment, etc. As this
is continuously monitored, eventually the temperature will equal the stored value in the
computer/microprocessor – this will then cause the heater to be turned off.
In real time (transaction) processing files are often updated in real time (e.g. when booking flights on an
airplane); but in real time process control, physical quantities (such as temperature) are continuously
monitored and the input is processed sufficiently quickly to be capable of influencing the data source.
Multi-programming
In this system the computer may store a number of different programs in its memory
which can be concurrently using a single processor. To achieve this each stored program
will receive a time-slice of processing time in turns.
Multi-tasking
The simultaneous execution to two or more programs on the same computer. Example :
On a PC you can have a number of windows open with different applications running in
each window. A typical example would be someone typing a document using a word
processor while at the same time playing a CD and printing another document.
Batch processing – This is offline processing where a number of tasks (or jobs) are all
collected together over a set period of time. They are then all loaded into the computer
system (in a job queue) and processed in one go (or batch). Once a batch job begins, it
continues until it is completed or an error is encountered. No user interaction is required
once execution begins.
An intranet (LAN): An intranet provides information on web pages but the information can only
be accessed from the local network.
Advantages:
An Intranet is free because it does not involve phone links.
Information can be easily updated and shared inside a company or school.
The web pages can be viewed using a standard web page browser.
More of the information will be useful because it was created for particular users.
Advantages:
Millions of people contribute information.
Data can be rapidly added and updated to reach a huge audience.
It can be used to sell goods to a world-wide market.
Disadvantages:
There is a lot of useless information, much of which is out of data and it can be very
difficult to find what you want.
Much of the information is misleading or has not been checked for accuracy.
It is not regulated and offensive and illegal material exists.
Issues such as security become even more important as potential hackers could possibly
be trying to break into a computer system from anywhere in the world.
The following is a list of options to use to link computers in a Wide Area Network.
Telecommunication line
Satellite Link
UHF / radio link
Fibre Optic cable
Network topology.
Network topology refers to the physical way in which computers in a network are joined
together. There are 3 types of network topologies (for this level) namely, Star network, ring
network and bus network.
Star Network
Key
Terminal
Server (Host)
With this type of network, a central computer is the centre of all connections where all others
computers in the network are connected to. The connections around the central computer (hub)
make the network look like a star.
Advantages:
Cable failure is easy to locate and does not affect other users.
Provides centralised control to data
Good performance because every computer has a direct cable link
Network Performance is not significantly affected by the number of computers on the
network.
Easy to add new terminals and easy to set up.
Disadvantages:
Ring Network
Key
Terminal
Server (Hub)
Comments
Advantages:
Disadvantages:
There is dependence on one cable. If the cable fails at one point then, all the
terminals will be affected.
Cable failure is difficult to isolate as its difficult to identify the affected area
Difficult to add new terminals
Since data is passed through the nodes, therefore if one node is down then the other
terminals will not be able to communicate.
Server (Hub)
Comments
Terminals are placed along a line with all the terminals tapping from the main line, it is
sometimes called the multi-drop line.
Advantages:
If the main cable fails, a number of computers located after fail point will be affected.
Network performance goes down under heavy load
Requires proper termination at the end of the cable to prevent reflected signals.
Slower data transmission rates as data travels in both directions therefore collisions
occur and data has to be re-sent.
Comments
2 - all the advantages and disadvantages of both types of networks described above apply to
this system; it is quickly gaining in popularity since it has all the good features of bus and star
topologies
Control system
The use of a computer to monitor and control non-computer systems Control systems usually
involve collection of analogue (Physical) data, which is then analysed and allows for user
interaction. (More on control systems will be covered under computer applications.
Automated systems
Automated systems are similar to control systems in nature but however they are dedicated to
one task and have limited ability to collect and analyse data. Automated systems are have
limited ability to allow users to interact with users. Automated systems are usually found on
embedded systems such as a washing machine, microwave oven, e.t.c.
Multimedia
In short multimedia is mixed media, which is the combination of text, video, graphics, animation,
and sound.
Software requirements
Media player
Speech synthesiser
Speech recognition software
Questions
(1) (a) Name two household appliances that are microprocessor controlled.
(b) Describe what functions the microprocessor controls in the named appliances.
(2) (a) Name four different types of sensors and give an application for each one named.
(b) Choose one of your named applications and describe how the sensors are used to control
and monitor it.
(3) (a) Describe the main differences between Random Access Memory (RAM) and Read Only
Memory (ROM).
(b) Various external, removable memory devices exist. Choose which device (using a different
one in each case) you would use for the following, and give a reason for your choice:
(i) storing multimedia files
(ii) storing music files
(iii) storing documents produced on a word processor
(4) A number of specialised input/output devices have been developed to help disabled people
use computer systems.
Name three input/output devices and describe how they would help a disabled person.
(5) Compare the type of data that would be stored on a barcode with the data that would be
stored on a credit card magnetic stripe.
Describe the different types of validation checks that would be made on data stored on:
(i) barcodes
(ii) magnetic stripes on credit cards
(6) A railway station management team has decided to set up automatic information kiosks to
keep passengers up to date with train times, cancellations, and general information.
(a) Which input devices could be used at these information kiosks?
(b) What advantages do these kiosks give customers compared to an information desk manned
by a human operator?
(c) What advantages does this system give to the station management?
(7) (a) Give four functions carried out by a typical operating system.
(b) Describe the main differences between real time (transaction) processing and real time process
control.
(c) Give two applications that would use:
(i) real time (transaction) processing
(ii) real time process control
(9) A very large city library is changing over to a fully computerised system to control all their operations.
The training department has been asked to develop a presentation to explain to the library staff how their
new system will affect them.
(a) What features should the trainer use in the design of the presentation to make it is as interesting as
possible?
(b) The presentation is to be stored on a laptop computer. What features make the laptop computer ideal
for this application?
(c) Many of the books in the library have been scanned in and stored on the computer.
What advantages does this give to the customer?
(10) (a) A music file is 45 Mbyte in length. Approximately how much memory space would this same file
need if stored in MP3 format?
(b) Describe how it is possible to store considerably more data on a DVD than on a CD even though
dimensionally they are the same?
(c) Why have CDs and DVDs taken over from floppy disks as the main secondary storage media on
home computer systems?
(a) communication applications (such as the internet, email, fax, electronic conferencing, mobile
telephones and internet telephony services)
(b) applications for publicity and corporate image publications (such as business cards,
letterheads, flyers and brochures)
(c) applications in manufacturing industries (such as robotics in manufacture and production line
control)
(d) applications for finance departments (such as billing systems, stock control and payroll)
(e) school management systems (including registration, records and reports)
(f) booking systems (such as those in the travel industry, the theatre and cinemas)
(g) applications in banking (including Electronic Funds Transfer (EFT), ATMs for cash
withdrawals and bill paying, credit/debit cards, cheque clearing, phone banking, internet
banking)
(h) applications in medicine (including doctors‘ information systems, hospital and pharmacy
records, monitoring and expert systems for diagnosis)
(i) applications in libraries (such as records of books and borrowers and the issue of books)
(j) the use of expert systems (for example in mineral prospecting, car engine fault diagnosis,
medical diagnosis, chess games)
(k) applications in the retail industry (stock control, POS, EFTPOS, internet shopping, automatic
reordering)
What is IT
In short IT is the joining of two major technologies, that is Computing and Communication, this
covers the use of computers to gather, store, process and transmit data. Examples in this area
can be taken from electronic mail, fax, electronic conferencing, information retrieval and
database systems, office automation and library system, view data systems multimedia system
and virtual reality.
Internet
An international network of computers, joined together for communication purposes.
Electronic mail
Email refers to messages sent from one computer to another electronically using computers.
Disadvantages
the sender composes a message (and attaches a file if required) and sends it
- this message is sent to an ISP (Internet Service Provider) mail server
- the mail server examines the address associated with the message and decides how to route
the message
- the message travels over the internet arriving at the recipient‘s ISP mail server
- the message is then held in the recipient‘s electronic mail box
- to read the message, the recipient logs on to their mail server
- the message is then retrieved and sent to the recipient‘s computer
- the system is always ―on‖/no need to dial into ISP every time you want access
- the connection rate/data transfer rate is much higher (for example broadband operates at 11
000 kbps compared to the dial up rate of 60 kbps)
- there is a flat monthly rate with broadband (dial up is charged per hour of usage)
- it is possible to use the telephone at the same as the internet with broadband/the line isn‘t tied
up
- broadband permits other facilities such as ―skype‖/VOIP
Wireless technology (WiFi) allows connection of a computer to the Internet without the need for
connecting cables. A router (containing a modem and external aerial) is connected to a telephone line
and it is then possible for any computer within range to communicate with the router and allow Internet
access – the link between computer and router is completely wireless.. The main advantage of doing this
is clearly the portability (i.e. can go anywhere within range since no wires are needed).
It isn‘t just computers that can be linked without wires, various peripheral devices can be linked to a
computer system without the need for a physical, wired connection. For example:
- printers
- keyboards
- mouse
- digital cameras
In order for one to be able to use email you need to have access to the internet and the special hardware and
software required for one to be send or receive mails the internet include
Modem ( a device to convert digital signals from the computer to analogue form which can be transmitted
over telephone line and vise-versa)
Communication software (eg Internet explorer, Netscape Navigator, Outlook Express)
ISP – Internet Service Provider (eg. Mweb, Zain, Skyband, TNM,etc.)
Phone line / telecommunication line ( to link up the computers)
The above facilities are used in developed countries to make purchases while at home using the normal TV set, it
is also used by the shops to market their goods.
Advantages
Quicker than going to the shops
Cheaper as you don‘t have to go the shops
Convenient as you can shop in the comfort of your home.
Disadvantages
You cannot feel or touch the items you would have bought
People can gain access to your credit card details and misuse it.
Electronic conferencing
Video conferencing continues to grow in popularity. Why is this? Some of the reasons are listed below:
- communication links are now much faster therefore images, sound quality etc. are now far
better
- safety reasons (increase in world-wide terrorist activity, frequent travelling, etc. are all risks to
company employees if they have to travel to meetings)
- costs (the money saved on not having to travel, accommodation costs, lost time to the company
whilst employees are out of the office travelling to meetings, etc.)
The hardware and software needed to run video conferencing is very sophisticated. Apart from the
obvious items (i.e. large screen, computer and devices such as mouse, etc.) the following briefly
describes what is needed to have a video conference:
The use of a computer to enable people in different geographical areas to hold a meeting simultaneously through a
network.
Advantages.
Cheaper as you cut down on transport and accommodation costs
Faster as you eliminate travel time to the conference venue
Disadvantages
Lack of human interaction
It is not widely available especially in the developing nations where telecommunication is either not fully
developed or very slow.
Office automation
The use of computers and other electronic equipment to create, store, process and communicate information in a
office (carryout office duties), leading to a paperless office.
As indicated above, a number of devices are used to interface with virtual reality systems. These can be
summarised below:
Data goggles/helmets – these use display screens and optical systems that send 3D images to the eyes.
Motion sensors measure the position and orientation of the head; this information is sent back to a
Areas of use
Entertainment Used in films/television as special effects (e.g. the ―holodeck‖ in Star Trek: The Next
Generation and the Brazilian tv show Conquista da Titã where the studio audience wear
VR helmets in a space simulation). Virtual reality is also used in many computer arcade
games.
Marketing Used in virtual tours around houses and hotels, kitchen designs, ergonomics, etc.
Training Areas of use include: military training, medical/dental training, teaching personnel how to
use equipment and in general areas where training is dangerous and/or expensive e.g. .
flight simulators, car driving simulators, operating devices under water or in outer space,
etc.
Design Design of chemical and nuclear plants, ergonomic studies (e.g. factory layouts), helping to
develop devices for handicapped people, etc.
Simulation – Imitation of a real life situation using a computer model e.g. Flight simulation.
Search Engines
The most effective way of finding information on the internet is to use a search engine. However, it is just
as easy to use these inefficiently as well as efficiently.
When a search condition is entered, inclusion of statements such as AND (or + sign) and OR will help
narrow down the search. Also, the use of quotes (― ―) can also help. If these are not used, many
irrelevant (and sometimes unwanted!!) results (known as hits) can be displayed by the search engine.
For example:
Type in: CIE and the search engine would return about 22 million hits
Type in: CIE+sample papers and the search engine would return about 1.2 million hits
Type in: CIE+sample papers+ICT and the search engine would return about 6,500 hits
Security
When using the Internet, security can be enhanced using encryption. Credit and debit card transactions
can also be protected by a special type of password control. For example, if a user chooses the
The user will then type in O P E and the card purchase will be authorised. This additional protection is
used as well as encryption.
Some of the new systems use a chip and PIN card which is slotted into the keyboard and is used as
additional security. The user slots the card into the side of the keyboard and is required to type in a PIN
before the Internet can be accessed. This gives an additional level of security since it is necessary to
have the card, know the PIN associated with the card AND also know the user‘s log in id and
password!!!
In general, increased use of computers has led to many of the above affects . Other aspects to consider
include:
- deskilling of the work force (e.g CAD has taken over draftsman skills, word processors
have taken over many office-based duties, etc.)
- the need to re-train the workforce in the use of new software/computers.
Computer systems have allowed companies to set up call centres in other countries where potential cost
savings can be made. This, of course, can lead to job losses in the host country. The main advantages
to companies adopting call centres overseas includes:
- if strikes or other problems occur in one country it is possible to transfer work elsewhere
- reduced costs in countries where labour costs are lower
- reduced costs due to incentives/grants by countries keen to set up call centre offices
- round the clock customer support (one of the advantages of time differences is the
possibility of 24/7 cover)
Information centres
Airports, supermarkets, and any application where information needs to be relayed to customers, gain
benefit from having automatic information kiosks rather than having manned desks. These allow
customers to automatically obtain information when they require it. Output is normally on a screen but
the input devices can vary and are usually:
- touch screens (with menu options)
- mouse/trackerballs to select options
- limited options keyboard
- light pens (although these are becoming increasingly less common)
(keyboards are usually not offered since the number of options is limited and the owners of the system
don‘t want customers keying in information and attempting to ―hack‖ into the system).
Using this automated information system affords the following advantages to the customers and
company:
- the system can be linked into websites to give live updates (very useful option at airports,
bus terminals, railway stations, etc.)
- information is usually more up to date using this method
- no language problems (manually operated desks may have limited language capability)
- no need to wait in queues
- companies can advertise special offers, special services, key notices, etc.
- lower costs to companies (fewer staff needed)
- automatic information kiosks are always open
Computers can also be used for security purposes in banks through the use of security cameras and access cards.
Transaction – an event which takes place in business which involves the exchange of goods and services.
b. Hospital Administration
- Computers are used in hospitals to keep patients and staff records
- Information such as the patient‘s personal information (Name, address, phone number, age, e.t.c) and patient‘s
medical history is stored on the computer instead of the traditional card index file.
c. Stock control
- Computers are used to control the daily activities in an organisation by managing stock
- For each item in stock a record is created
- Each record is given a unique identifier (Key field) – A unique identifier used to identify a record
uniquely e.g ID Number/code number
- Other records that may make up an item record are – Item name, description, supplier, cost price,
sale price, quantity in stock, re-order level, e.t.c.
- In stock control systems the computer automatically subtracts an item sold from the quantity in
stock and is able to display information such as items which would have reached their re-order
level, fast moving stocks and slow moving stocks.
Most businesses need to hold stocks of goods. Shops need to hold stocks of goods they sell, and manufacturers
need to hold stocks of raw materials and finished goods they make. The task of recording and maintaining stock
levels is called stock control.
A stock control system must keep an up-to-date record of all the stock held and place orders for fresh deliveries if
stock runs low. Large shops, supermarkets and factories use computerised stock control systems.
- to keep business expenses to a minimum, goods must not be overstocked. By keeping stocks to a minimum, a
business can limit the amount of money invested in stock and also reduce the risk of stock deteriorating before it
can be sold. Minimum stock levels also reduce storage costs such as warehousing, heating, lighting and security.
The POS terminal only needs to pass the bar code on each item past a laser
scanner. The scanner reads the code number stored in the bar code and sends it
directly to a computer. The computer checks the code and, if it is valid, looks up the
product's name and price in data files held on disc. The name and price are sent back
to the POS terminal. In this way the POS terminal can print out an itemised receipt.
Each terminal has a keyboard that can be used if a bar-code cannot be read.
As each item is sold, the stock files are updated and orders are printed when they become necessary.
BUT...
- some newer supermarkets now allow customers to scan their own basket/trolley and pay for the
items/goods using credit card or cash (essentially the stock control system is the same for both
methods)
Q 1.Describe three ways you could modify a typical input/output environment to enable people
with disabilities to use the computer system. [3]
Cashless society
A society which does not use hard cash for transactions but instead uses plastic money (Debit or credit cards)
Electronic scabbing
The transfer of word processing duties from striking workers in one location, to non striking workers in another
location electronically using computers.
There are many advantages and disadvantages of using CAD rather than manually producing drawings
using pen and paper:
advantages of CAD disadvantages of CAD
- it is easier to modify drawings - risk of deskilling
- a library of parts can be kept - high training costs to use packages
- ability to do automatic costings - can move work overseas
- ability to model the design - one CAD operator can do work of 5
- can do ergonomic study manual draftsmen
Developments
CAD packages can now be linked to 3D ink jet printers which produce an actual prototype model by
building up slices/layers in fine powder (e.g. resin) which are bonded by an adhesive from the print head.
The models produced actually work.
This saves time and money since an actual prototype doesn‘t need to be made.
1. Traffic Light System : The computer controls the sequences of lights displayed at a
cross-roads to ensure that cars do not crash Additionally the computer operates a
pedestrian crossing to let pedestrians cross the road when a button is pressed.
2. Greenhouse : The computer controls the temperature in a greenhouse to maintain the
conditions required for the plants in it to grow. If the temperature gets too cold then the
computer turns on a heater to keep the plants warm.
3. Robot Arm : The computer controls the movement of a robot arm which sprays parts of
a car body. The arm must only spray when the body part is present and must then follow
a programmed spraying path. The arm must stop if any foreign object, such as a human
being, gets in its way.
4. Chemical and nuclear plants (opening and closing valves, safety systems, etc.), etc.
How it is done
- sensors gather information from the application being monitored or controlled
- the data being gathered is often analogue in nature and therefore requires translating into
digital using an analogue to digital converter (ADC) to enable the computer or
microprocessor to ―understand‖ and process the data from the sensors
- the computer or microprocessor will compare the incoming data with the data values
stored in memory
- if monitoring, the computer/microprocessor system will warn the user in the form of a
sound (e.g. a siren if a burglar alarm, a loud beeping sound if monitoring patients in a
hospital) and/or read outs (e.g. heart rate trace in hospital monitoring system, temperature
reading on a chemical plant).
- if a control system, the computer will send a signal to a device which will be converted to
analogue using a DAC (analogue to digital converter); actuators are usually employed to
operate devices like valves, heaters, etc.
- the device will be instructed to switch on or off (e.g. if controlling a central heating system,
if temperature > set temperature a heater will be switched off and/or a cooling fan
switched on; if the temperature is below the set point then the heating will be switched on
and/or a cooling fan switched off)
- the computer/microprocessor system will continually monitor the data coming from the
sensors
The collection of analogue data using sensors is usually referred to as data logging
Data Logging – Automatic collection of analogue data from the source by analogue devices
which is then passed to the data logger which temporarily stores the data and converts it to
digital form before passing to the computer for processing.
Analogue data – Data in physical notation or data which varies continuously e.g. on a clock,
voltmeter or analogue speedometer.
ADC – Analogue to digital converter – a device which converts data from analogue (physical)
form to digital (0s and 1s) form.
DAC – Digital to Analogue Converter – a device which converts discrete (0s &1s) to data in
physical notation. The DAC is usually used in control system to move the actuators for the
manual operations to take place.
Feedback – Output from a process which is used to adjust/ modified its input.
ADC DAC
INPUT Process Output
feedback
Sensors
These detect changes in the physical or chemical
environment and convert them into electrical
signals. These signals can then be digitised and
used by the computer.
Examples of sensors
Computers are now used to control the operation of many machines and everyday devices.
When a computer is used to control a machine, the computer circuit board is installed inside the
machine and the input sensors and output control devices are then connected to these circuits
and this is called an embedded computer. The only inputs may be from the sensors in the
machine so a keyboard might not be needed. Outputs often control motors, switches and relays
rather than displaying information on a monitor.
Q Modern car engines use fuel injection systems which are controlled by microprocessors
called Engine Control Units (ECUs). The fuel injection system controls the amount of fuel
that goes into the engine. Sensors monitor engine conditions and feed the data back to the ECUs.
(a) Name two types of sensors used to monitor engine conditions. [2]
(b) Describe how information from the sensors is used to control the fuel injection system. [3]
(c) Give an advantage of using automatic fuel injection systems rather than simpler mechanical
fuel devices. [1]
(d) The fuel injection system operates in real time.
Why would batch processing not be appropriate in this application? [1]
Although the purchase cost is high for computerised machines in factories, the
operating costs are low compared to the wages for people doing the job.
Computers work without the need for a break.
The quality of output from the machine is consistent.
Machines can handle both very heavy or very precise tasks.
Machines can work in places that are uncomfortable or dangerous for humans.
Computers process data very quickly so the machines can operate faster than
humans.
Computers can operate the machines with data from a range of sources and sensors.
Q [June 06 q8]
Data-logging is used for monitoring the level of oxygen in a river.
(a) State one item of hardware that is used to collect the oxygen data. [1]
(b) Explain how the oxygen data is processed by the computer. [2]
(c) State two ways that the oxygen data could be displayed for a user to understand.[2]
(d) Explain what the computer would do if the amount of oxygen in the water is too high. [1]
(e) Give two advantages of using data-logging for monitoring the oxygen data in a river.[2]
Example: An oven contains an embedded processor. The owner can use a web-ready mobile phone
anywhere to control the oven remotely. By accessing a web site he is able to send instructions to control
the oven.
It is possible to control any device in this way if it contains an embedded processor e.g. television, DVD
player/recorder, washing machine, scientific experiments in remote areas such as outer space.
Embedded computers need to input data from both the sensors in the machine and from the
surrounding environment. Examples of input and output devices and the processing that takes
place are shown in the examples below:
Robotic arm
Household devices
(Note: also check out the section on Embedded web Technology in booklet 1)
Many household devices now use microprocessors to control their various functions. The following is just
a sample of common devices (showing some of the functions controlled by the microprocessor and
general notes on the application; it is worth doing further research to find out more about these devices):
Digital cameras
The microprocessor would be used to control the following functions, for example:
- shutter speed
- lens focus
- flash
- aperture (light intensity)
(Note 1: the sensitivity of the camera depends on the number of pixels used to represent the picture
taken e.g. an 8 mega pixel camera takes a sharper image than a 5 mega pixel camera. The camera
memory size also dictates how many photos can be taken or limits the pixel size of a photo. The
sharpness of the image also depends largely on the lens quality.
Note 2: the advantages of digital cameras over manual cameras include: no processing costs (since
there is no need to develop film or make prints), easy to delete unwanted photos, direct transfer of
photos from camera to computer through the USB port (no need to scan in photos), easier to modify
photos on screen (e.g. crop, change colour density, etc.) etc.)
Washing machines
The microprocessor would be used to control the following features, for example:
- water temperature
- time for each cycle
- the wash cycle (when to add powder, when to rinse, etc.)
- loading (i.e. weight of the washing in the drum)
(Note 1: the main advantages are that these machines are fully automatic (wash programs are fully
stored) which makes them easy to use, they are cheaper to manufacture (modular design) and generally
more reliable).
Digital televisions
The microprocessor would be used to control the following features, for example:
- automatically tuning into television stations
- allow digital signals to be decoded
- since constantly monitoring signal strength (etc.) far better sound and picture quality
result)
- allows interface with many devices
- controls picture and sound quality (factory settings can be stored, etc.)
- in built diagnostics in case of faults
(Note 1: signals to televisions are now sent digitally so need a computer to interpret and decode these
signals into a picture/sound; need multi-functional system to control plasma and LCD screens)
Microwave Oven
Inputs devices: door switch; switches to allow
setting of time and power.
Processing: the processor compares the current
temperature with preset temperature and compares
the current time with preset.
Output devices: Switches: microwave generator
on/off, turntable motor, fan motor, light, warning
buzzer; screen display of inputs and timings.
(b) For the device you named in (a) above, describe the input to the microprocessor, the
processing and the output from the microprocessor. [6]
2. Digital cameras do not use film. Therefore, there is no need to pay to develop the film and
produce prints.
(a) Give two other advantages of using digital cameras rather than traditional cameras. [2]
(b) On what does the quality of the pictures taken by the digital camera mainly depend? [1]
Robotics
Robots can contain embedded processors or be linked to a computer system. They are pre-programmed
to do a specific task or ―taught‖ to remember instructions from a human operator carrying out the task
manually e.g. teaching a robot to spray a car with paint. In summary:
- the robot is programmed with a series of instructions which enable it to carry out a series of tasks
- alternatively, an operator manually carries out a series of tasks which are relayed back to the robot;
these instructions are remembered so that the robot can carry out the tasks automatically
Robots rely on processors and sensors. The sensors gather information so that the robot knows it is
alright to do the task (e.g. is a car in position to be sprayed, is there an obstruction to prevent the robot
doing its task, if the robot is spraying a car has the supply of paint run out, etc). They are capable of
doing some pseudo-intelligent tasks (e.g. different sized cars to be painted) but essentially any non-
standard routine is better dealt with by human beings.
Disadvantages of Robots.
- they can find it difficult to deal with ―unusual‖ circumstances e.g. a door is missing from a
car waiting on the paint spraying line
- tend to reduce labour requirements (therefore causing unemployment)
- since robots take over many of the tasks done by humans de-skilling is a real risk
- work can be done anywhere, therefore factories can be moved to anywhere in the world
(again a cause for unemployment risks)
Areas where we use computers
- car assembly, lifting heavy objects, spray paining, welding, manufacture of
electronic components e.g. VCRs, computers, radio where the is VLI (Very large
integration – to many components on one place.
In motor vehicles the system is called satellite navigation (sat nav). The on board computer contains pre-
stored road maps. The vehicle‘s exact location, based on satellite positioning, can be shown on the map;
the driver can then be given verbal directions e.g. “turn left into Pendle Road” OR a screen output
showing the vehicle moving on the map:
This is far safer since a driver of a vehicle doesn‘t have to consult maps whilst driving. It also removes
error (e.g. going the wrong way down a one-way street). Sat nav systems can also give additional
information such as position of speed cameras, estimate time of arrival, etc. GPS can now be used to
monitor a vehicle‘s position if it has broken down (additional safety feature) or has been stolen (known
as vehicle tracking system).
In airplanes GPS can also pinpoint its exact location in case of an accident which enables search teams
to quickly respond to the incident.
The system, once set up, needs to be tested using data with known outcomes to see if it functions
correctly.
If it is being used to diagnose faults, the expert system will output the probable fault and how to
rectify/deal with the problem. Usually a % probability of the accuracy of the diagnosis will be given so the
end user can decide whether or not to accept the recommendations.
The system uses a rule base and an inference engine together to simulate human reasoning when
analysing a problem and arriving at a conclusion. To simulate human processes it is necessary to have a
vast amount of information stored in the knowledge base and the reasoning set out as a set of rules in
the rule base.
In the above example, the response Why? came up since the user wanted to know the Expert System‘s
thought processes. The system would give the possible response ―I am trying to find the make of car you
require. Up to now, coupes are not likely. It is possible that saloon cars are a likely option. I know that
you like high performance which gives me strong evidence that the car should include a manual
gearbox”.
The above is how an Explanation System might work where questions like why or how are dealt with.
Inference Rules use an if-statement and a then-statement. This gives Expert Systems the ability to find
solutions to diagnostic and prescriptive problems. For example:
If the make of car includes high performance and you want Italian style
Then the car you want is probably a Maserati Quattroporte
A rules base is made up of many such inference rules and the inference engine uses these to draw its
conclusions.
Another example of an expert system is a mineral exploration system used to identify mineral
deposits.
Q An online control system is being used to maintain the correct temperature and humidity
(Moisture level) in a room where lenses are being made.
(a) (i) State how the data is collected and how it is converted to enable it to be
stored [3]
(ii) Describe the processing which takes place in order to maintain the correct
temperature and humidity in the room. Refer to feedback in your answer [5]
(b) Describe an additional task which the online control system could undertake [2]
7. Education / Training
Computers are used in education in a variety of ways. The uses include storing students‘
records, typing letters for correspondence between the school and other stake holders, keeping
stocks of books and any other educational equipment. There are other uses of computers
which are directly linked to education such as the use of computers in research, or even the use
of a computer to learn which is commonly known as CAL (Computer Aided Learning) and also
for CAT (Computer Aided testing). Computers are also used in science to simulate
experiments.
Simulation
Imitation of a real life situation using a computer model e.g. Flight simulation or in the classroom
for subjects like physics, chemistry experiments can be simulated on the computer.
To demonstrate how a simulation can be developed for use in a real situation the following
example has been chosen. The scenario chosen is a series of traffic lights at two busy
junctions:
To make this as realistic as possible, data needs to be gathered over a long period of time. This
can be done by sensors in/near the road, using cameras or manual data collection. Data
gathered includes:
- count the number of vehicles passing in all directions at each junction …..
- ….. at a particular time of day
- count how many cars build up at a junction before lights change
- is it a week day or weekend or bank holiday
- how long it takes to clear vehicles at a junction
- other data (e.g. pedestrian crossings)
- time for largest/slowest vehicle to pass through a junction
- other factors (e.g. filtering of traffic to the right or left)
Another example of simulation is predicting weather (i.e. a weather forecaster). In this case we
will consider how/what data is collected, how the simulation is done and consider how it can be
used in predicted possible climate changes. We won‘t consider stage (3) here (how the system
works in real time) since this simulator doesn‘t control anything and stages (4) and (5) above
will be the same.
Advantages of simulation.
Simulations are built for a variety of reasons
Economic
Crash testing cars, planes or trains is extremely expensive, a computer model would
save a vast amount of money in the long run. A model can be adjusted when the design
of an object changes.
It is difficult or sometimes impossible to test the effects of radiation from a nuclear
meltdown or explosion in real life because of the potential danger to people therefore
scientists have to rely on simulations to predict the possible consequences.
Robot welders or painters are simulations of the real thing but with well-known economic
advantages. They work accurately 24 hours a day, without holidays, breaks, complaints
or pay. They can be reprogrammed as needed to perform different tasks
Training is usually a repetitive process that many people will undergo at different times.
It is cheaper to build a computer based training programme that many people can use
than pay a human to repeat the same lectures or tutorials over and over again. Time can
be spent in perfecting the courses so that the best learning environment possible is
produced.
The entertainment industry has brought us simulations of aspects of life in all its real and
imaginary forms as computer games for PCs, consoles and arcade machines.
Computer games generate large incomes.
The military have to be prepared in the event of war. Much real-life training and testing
goes on but it is impossible to practise for the invasion of London or a war in a foreign
land. Simulations that provide an experience of the landscape and conditions are the
best possible preparation.
Limitations of simulations
A model will never be as accurate as the real thing because all its properties and
functions can never be reproduced in exactly the same way because of our lack of
understanding and the vast numbers of measurements required.
The success of the model very much depends on the complexity of the real life object,
system or phenomenon, the amount of data available, how well it is understood and on
the technical skills of the programmers.
Example: Scientists would like to produce model cats or other animals to use for testing
that are biologically identical to the real thing but irrespective of how much data is
collected, man does not have the technology or understanding to fully replicate life.
The differences in appearance between key frames are automatically calculated by the computer – this
is called TWEENING or MORPHING. The animation is finally RENDERED (i.e. turned into a realistic
image).
Computer animation uses a technique called avars (animation variable) where the starting point is
usually a series of stick figures; e.g. Toy Story used over 700 avars (1 avar = position of each feature
e.g. the mouth). Successive sets of avars control all movement of the animated character. Once the stick
model is moving in the required way, avars are incorporated into full wire frame models. Finally, surfaces
are added requiring a process called rendering (i.e. turned into a realistic image).
There are several ways of generating avar values to get realistic movement. One way is to use markers
on a real person (or whatever is being animated) acting out a part and track the movements by video
camera. Alternatively, avars can be set manually using a joystick. Software produces a level of quality
for movie animation that would take many years to produce by hand and would employ several
cartoonists/animators. This all saves considerable time and money to the film and television producers.
Avatars are another example of animation. These are often used to represent people either in 3-D (as
used in computer games) and in 2-D (as used in internet message boards). Some avatars are animated
consisting of a sequence of images played one after the other.
Ultimately, animators want to create a human image which moves and interacts with its background in
such a away that the viewers can‘t tell if a particular scene is computer generated or produced by real
actions in front of an actual movie camera.
The advantages of training people using computer systems (such as CBT) include:
- trainees can work at their own speed
- trainees can learn when they want
- it is possible to re-run sections of the training program if necessary
- possible to come back at any time/pause training program at any point
- user gets immediate assessment of performance
- possible to include multi-media elements in the training package
- no need to have a teacher/classroom – potential cost savings therefore possible
- it is easier to keep up to date/amend
Students of medicine and dentistry spend a lot of time learning about human anatomy by
dissecting bodies during the first two years of their training. Universities rely on bodies
being donated to science but sometimes there may be a shortage. The storage,
preservation and preparation of the bodies requires technical help and is expensive.
Simulation has begun to provide an alternative method of studying anatomy with the help
of computers.
This term is used for any training or education methods that are computer based.
Multimedia teaching materials with text, graphics, video and sound are used in a way that
most people find more stimulating than a text book, but this method is by no means
suited to all. People who suffer from epilepsy or migraines may be unable to use
computers because the flicker from the screens may trigger attacks.
Online quizzes or tests that are instantly marked and students able to assess their own
progress without any unwanted comments from teachers 'with attitude'.
Computers are ever patient, you can repeat the same piece of work as frequently as you
need to and whenever it is convenient for you.
Excellent lectures or lessons could be filmed to remove endless repetition for teachers
and add convenience for students. You can watch a video of any lecture that you've
missed at a later date or to revise a topic you don't understand.
It is an ideal method for students who are unable to get to a school or college because of
disability or location.
Students can learn at their own pace
Creates suitable learning environment
Disadvantages of CAL:
Computers are unable to understand and respond to questions in natural language.
Computers don't encourage you to learn when you don't really feel like it or chase you up
for missed assignments. A high degree of self-motivation is required.
Learning may become a socially isolating activity for some. (Lack of human interaction)
Questions
(1) (a) Give three features you would expect to see in a typical Computer Aided Design (CAD) package.
(b) A company uses CAD to design a child‘s toy. Give two advantages of using CAD in this application.
(3) (a) A large house with eight bed rooms is to be protected by an intruder surveillance system (burglar
alarm).
Describe how sensors and a microprocessor would interact to monitor for intruders and sound an alarm
if a break in occurs.
(b) Describe the main differences between a computer being used in a monitoring application and a
computer used in a control application.
(5) A bus has been fitted with a Global Positioning Satellite (GPS) navigation system (sat nav).
(a) Describe how the sat nav computer calculates the exact location of the bus.
(b) How does the sat nav system indicate to the bus driver the correct route that needs to be taken to
reach the required destination?
(c) What are the advantages to the bus driver of having GPS installed?
(7) (a) Describe four security issues associated with linking a computer to the internet. How is it possible
to guard against each of these security issues?
(b) Describe the differences between the internet and an intranet.
(8) A supermarket has decided to model queues at the check outs using simulation software.
(a) Describe how data is collected for the simulation/model.
(b) Describe how the simulation/modelling is carried out.
(c) Describe the advantages of using a simulation.
(d) Give two other uses of simulations.
(9) Describe how computer hardware and software are used to create animation effects in films and
television programmes.
(10) (a) Describe how it is possible to have a video conference between delegates in two different
countries.
(b) Give the main reasons why video conferencing has become increasingly popular.
When looking at the effects of using ICT, the main question to ask is, ―has the introduction of
computers brought more harm than good?‖
Arguments against
Computers are cheaper than people so if a computer can do the job then it will lead
to higher unemployment.
De-Skilling People are loosing their skills they would have gained
The storage of personal data held on computer has eroded people's privacy.
Robots are now performing many of the manual tasks such as assembly work and
paint spraying in factories.
Many industrial processes operate 24 hours a day and are continually being
monitored and controlled by computers.
There are fewer paper-based systems in offices. Some jobs such as filing clerks no
longer exist. New jobs involving computers have been created.
More and more people work form home, with the advantage of no travelling and the
freedom of being able to live in any part of the country (or the world for that matter).
The following is a list of ICT devices which help people with disabilities
Device Application
Touch screens + head wand For people who can‘t use a keyboard allowing input; also helps people
with learning difficulties since icons are easier to understand
On-screen keyboards For people who can‘t use keyboards (use head wand to select letters)
Voice recognition Blind and partially-sighted people can communicate with a computer
using microphone and software (keyboard and touch screens can‘t be
used)
Trackerball Easier to use than a mouse if people have problems using their arms
and hands or if they have a coordination problem
Trackerball Easier to use than a mouse if people have problems using their arms
and hands or if they have a coordination problem
Large font size/use of colour Helps people who are partially-sighted since the larger icons and/or
colourful outputs on large screens are much easier to see
Braille printers Dot matrix printers can be modified to produce raised dots (i.e. Braille) –
this helps blind and partially-sighted people to read the output
Voice synthesis Loud speakers and special software are used to output information in
the form of sound to help blind and partially-sighted people; it also helps
people who have difficulty reading/understanding text
Large/concept keyboards These help people who have difficulty using normal keyboards (either
because of difficulty using hands/ arms or coordination problems)
Prediction software To help dyslexic people when typing
Foot activated controls To allow people with restricted hand/arm movement to communicate
Cause Protection
Power failure 1. Uninterruptible Power Supply (UPS)
2. Standby generator
System failure 1. Backup
2. Standby computer
Virus attack Use of ant-virus software and firewalls to prevent
viruses entering a computer. It is also sensible not to
open emails/ attachments from ―unknown‖ sources; it
also helps to only load software from disks/cds which
are originals
Hacking Use of passwords and ids to prevent illegal access
to files. Also locking the computer itself or locking
the computer room can help here. Encryption stops
the information being read even if access has been
gained to a file but won‘t stop hacking!!
Corruption/Loss of Data can viruses can be protected against as described above
occur in a number of ways: - as above (also see note 2 below)
- viruses - accidental damage is best guarded against by keeping
- hackers back up files or use the Grandfather-Father-Son (GFS)
- accidental damage method; also use of passwords and ids can help by
- hardware faults restricting access in the first place
- software faults - protection against hardware faults could be to keep
back ups or use GFS; use of UPS (in case of power
- incorrect computer operation loss) and parallel system also help
- keeping back up files or using GFS would help here
- backing up files would guard against problems caused
by incorrect power down of the system
Note 1: Viruses don‘t just infect computers, they can also affect mobile phones, MP3 players etc. – any
device which can download files from a source such as the internet is potentially at risk.
Note 2: Backing up may allow files that have become lost/corrupted (due to hacking or viruses) to be
reinstated; however, this would not recover the system nor would it prevent hacking/viruses affecting a
system in the first place.
Note 3: Other problems such as spam, pop ups, cookies, etc. are more of a nuisance (although they can
considerably slow down the operation of a computer system) and can be blocked or made inactive
(since they can become active without the user‘s knowledge) using suitable software.
However backup is the main method of minimising data loss as it can be used in most of the
causes of data loss.
A copy of the original used when the original gets corrupted, mainly done on floppies,
magnetic tapes and CD. This is because the above media can be stored away from the
main computer and only retrieved when the need arises.
Computer crime
The use of a computer or knowledge of a computer to commit a crime
Computer Fraud
Any money related crime committed with the use or knowledge of a computer e.g. the
salami technique.
Software piracy - This is the illegal copying or use of software without proper
certification. It could be said that the use of personal computers has made many users
into thieves. How many people could honestly say that they have purchased all the
software on their hard disks?
Hacking - Hacking means gaining illegal access to someone else's computer system by
breaking or cracking a password. Many people see this type of thing as a challenge and
not as an illegal activity.
Sending Viruses
Sending hate email or any unsolicited mails (spam).
Virus
A virus is program designed to fail other programs, it has the ability to duplicate itself without the
user‘s intention. There are basically two types of viruses, namely Time bombs and logic bombs.
Time bombs such as Friday the 13th are triggered by time, they only become active on a
particular date. While Logic bombs are triggered by conditions on the PC.
Spreading of Viruses
Virus Protection.
You can protect your computer from viruses by
1. Installing anti-virus software
2. Scan disks and mails for viruses before opening them
3. using authentic software
One problem with the Internet is that all the information is freely available once the user is
connected. There are news areas on the Internet, which contain large amounts of illegal
pornographic material. Material that is illegal in some countries but may be perfectly legal in
others.
Advantages
It is far more convenient not to have to use cash. Mortgage and loan repayments, gas,
electricity and phone bills are paid automatically so you don't need to remember to pay
them.
You no longer need to take large sums of money out of the building society or bank to
pay for expensive items: the risk of being robbed is reduced.
You don't have to queue at the bank, building society or cash machine to get money out.
Credit cards allow people to buy goods and then decide whether to pay for them at the
end of the month or obtain them on credit, paying a proportion each month.
Disadvantages
Credit is normally given only to people who are working and have a steady source of
income, so certain people won't be able to get it.
It is possible for people to spend more than they can really afford so they can easily get
into debt.
More information is kept about individuals. Inevitably some of this will be incorrect and
lead to people wrongly being refused cash or credit cards.
It is harder for people to keep track of how much they have spent, since statements are
usually sent only once a month, although statements can usually be obtained more
frequently if they are requested.
Speed camera systems and camera systems, which detect cars jumping red lights,
deter people from offending.
Computer controlled camera systems deter violent crime in many city centres.
Tagging of offenders means that they are less likely to commit crimes whilst on bail.
Tagging systems on bikes, cars and other property reduces the chances of them
being stolen.
Computer controlled house security systems deter some burglars.
Finger print matching system where finger prints details of people are stored on the
computer and latter finger prints from crime scenes will be matched with the ones in
the computer to get details of criminals.
Crime detection
IT can be used to catch criminals and some of the ways it can do this are as follows:
The Police National Computer (PNC) is used to hold details of all crimes committed
and criminals.
The National Criminal Intelligence System is a computer system used to piece
together information about individual criminals and their illegal activities. The
computer can interact with the data supplied by Interpol, the PNC, Customs and
Excise, the Inland Revenue, and the bank and building society computers. This
system is used to gather material on organised crimes such as drug smuggling.
DNA profiling and fingerprinting systems enables valuable, and often conclusive,
evidence to be collected.
Police headquarters computers for each police force are used in the day-to-day
administration of all the usual police work.
(3) (a) Give three features you would expect to see in a typical Computer Aided Design (CAD) package.
(b) A company uses CAD to design a child‘s toy. Give two advantages of using CAD in this application.
(5) (a) A large house with eight bed rooms is to be protected by an intruder surveillance system (burglar
alarm).
Describe how sensors and a microprocessor would interact to monitor for intruders and sound an
alarm if a break in occurs.
(b) Describe the main differences between a computer being used in a monitoring application and a
computer used in a control application.
(7) A bus has been fitted with a Global Positioning Satellite (GPS) navigation system (sat nav).
(a) Describe how the sat nav computer calculates the exact location of the bus.
(b) How does the sat nav system indicate to the bus driver the correct route that needs to be taken to
reach the required destination?
(c) What are the advantages to the bus driver of having GPS installed?
(9) (a) Describe four security issues associated with linking a computer to the internet. How is it possible
to guard against each of these security issues?
(b) Describe the differences between the internet and an inranet.
(10) A supermarket has decided to model queues at the check outs using simulation software.
(a) Describe how data is collected for the simulation/model.
(11) Describe how computer hardware and software are used to create animation effects in films and
television programmes.
(12) (a) Describe how it is possible to have a video conference between delegates in two different
countries.
(b) Give the main reasons why video conferencing has become increasingly popular.
Analysis
(a) describe different methods of researching a situation
(b) state the need for recording and analyzing information about the current system
(c) state the need for identifying features of the existing system
Design
(a) state the need for producing designs • need for designing documents, files, forms/inputs,
reports/outputs and validation
(b) produce designs to solve a given problem • design data capture forms and screen layouts
(c) choose the method of verification
Implementation
(a) Describe the different methods of system implementation
(b) Identify suitable situations for the use of different methods of system implementation, giving
advantages and disadvantages of each
Documentation
(a) identify the components of technical documentation for an information system
(b) identify the components of user documentation for an information system
Evaluation
t (a) explain the need for evaluating a new system • in terms of the efficiency of the solution
(b) state the need for a variety of evaluation strategies
Problem
definition
Maintenance Feasibility
Study
Analysis
Implementation
Design
Development
Sometimes known as Systems Engineering or the Systems Life Cycle, this refers to a systematic approach to
solving a problem in which the solution to a problem is divided into several stages. Basically there are four stages
to systems analysis and design but these stages can be further split to say 5 or seven stages. We will start with
the five stages and have a brief rundown of what goes on at each of the stages then we will proceed to seven
stages plus a detailed look at the system life cycle.
1. Analysis
A study of the current system is carried out to identify the problems
being faced by the system. There are various methods used to study the current system these
include, Interview, Questionnaire, Study, Reading, Observation/ automated method.
2. Design
This involves planning of the output, input layouts, designing the files
structures, and deciding on the storage type.
3. Development
Development involves, Program development, coding of programs,
testing of programs and Equipment acquisition. Program development involves writing
4. Implementation
This is the stage when the new system is put into use.
5. Maintenance
Maintenance involves looking after the system and correcting any
errors. There are two types of maintenance, namely corrective
maintenance and perfective maintenance.
The above stages can be further split into 7 stages:
1. Problem definition / Identification of the problem
2. Feasibility Study
3. Analysis / Investigation
4. Design
5. Development
6. Implementation
7. Maintenance / Review
Problem Definition.
This is the first stage in systems analysis, and the starting point is the user request where the users of the system
after having experienced problems with their system would talk with the system analyst with the aim of having their
problems solved. Results of this stage will be written down and make up a document known as the terms of
reference.
Feasibility Study.
The feasibility study is concerned with five aspects: Technical, Economic, Legal, Operational, Social and Time
Schedule(TELOST)
Technical feasibility.
Technical feasibility involves checking to see if technology exists to implement the new system. On technical
feasibility people will be asking this question ―With the available technology will the system work?‖ Because of
advances in technology a system which was not feasible a couple of years ago is now feasible (Workable/
achievable)
Economic feasibility
Economic feasibility involves looking at cost –effectiveness of the proposed system. The question asked at this
stage is, ―.. will the new system will be cost effective.‖ If the costs of introducing the new system are by far higher
than the economic benefits of the system , then its not worth the hustle.
Legal feasibility
Legal feasibility checks the new system with the laws of the of the country to see if it will not violate any laws.
Operational Feasibility
Social feasibility
This is concerned with the effects on the workers and the customers. The questions asked here are – will the
introduction of the new system: _
- Result in redundancies or need retraining or re-location of some workforce?
- Result in de-skilling of some jobs
Timescale (Schedule)
Schedule feasibility is concerned with the time it will take to develop the new system and checking whether the new
system can be created within the required time frame.
If the feasibility study is accepted then the systems analyst moves to the next stage which is a full
analysis of the system.
Q A hotel has decided to invest in a new computer system. A systems analyst is asked to do a feasibility study
of the existing system.
(a) Give 3 reasons for a feasibility study / what is the purpose of a feasibility study [3]
(b) List and outline 5 stages of the system life cycle (in their correct order)[5]
1. Analysis
Sometimes known as the investigation stage where a study of the current system is carried out
to get a complete understating of the current system.
NB in all the above stages including the current stage analysis most of the tasks involve the old
system and there is no talk about the new system.
To carryout a study of a system there are number of methods one can use, these are known as
fact finding methods/ techniques.
Disadvantages - people are generally uncomfortable being watched and may work in a different way
- what they are watching may not be representative of a typical day‘s work
- if workers perform tasks that violate standard procedures, they may not do this when
being watched!!
2. Questionnaires
This involves sending out questionnaires to the work force and/or to customers to find out their views of
the existing system and to find out how some of the key tasks are carried out. As with observation, there
are a number of advantages and disadvantages in using this technique:
Advantages.
Useful when you want to collect data from a large number of people
People may feel free to write their opinions
questions can be answered quickly
an inexpensive way of gathering data from a large number of people
allows individuals to remain anonymous
it is quick to analyse data
Disadvantages
Difficult to compile effective questionnaires
One will never know if the rightful people responded (some may delegate to their kids)
Rate of returning of questionnaires is usually poor as a number of people(respondents)
may forget to return the questionnaires.
questions asked tend to be rather inflexible
no immediate way to clarify a vague/incomplete answer to a question
it is difficult to prepare a good questionnaire
3. Interviewing
This involves a one to one question and answer session between the analyst and
employee/customer. A good method if the analyst wants to probe deeply into one specific aspect of
the existing system.
Advantages
Points raised can be immediately clarified
Can verify what one is saying by looking at the body language
Flexible as questions can be changed or modified during the course of the interview to
suite the needs.
opportunity to motivate the interviewee to give open and free answers to the analyst‘s questions
allows the analyst to probe for more feedback from the interviewee (easier to extend a topic than
it is when using questionnaires)
Reading this involves reading through the documentation and procedures associated with the
system. This allows the analyst to see how paper files are kept, look at operating instructions and
training manuals, check accounts, etc. This will give the analyst some idea of the scale of the problem,
memory size requirements, type of input/output devices needed, and so on. They will often gain
information not obtained by any of the other methods described above. However, it can be a very time
consuming exercise.
Q A school wanted to change its manual students‘ record system to a computerized system because they were
encountering some problems as they had increased their enrolment. A systems analyst is asked to do a
feasibility study of the existing system.
(a) Describe 3 fact finding techniques which the analyst may use. [3]
(b) The analyst has recommended the company should purchase a Database management System.
- Give one advantage and one disadvantage of purchasing a pre-written software package. [2]
2. Design
A design or plan of how the new system would function is made, this includes writing of
algorithms and drawing of systems flow charts.
The following is a list of tasks that are usually done (this is by no means an exhaustive list):
• design the data capture forms/input forms
• design the screen layouts
• design output forms and reports
• produce systems flowcharts and/or pseudocode
• select/design any validation rules that need to be used
• select the most appropriate data verification method(s)
• file structures/tables need to be designed/agreed
• select/design the hardware requirements for the new system
• select/design the software requirements
• produce any algorithms or program flowcharts
• design a testing strategy/plan
The design of a computer system can be divided into four main areas:
(i) Output design
(ii) Input design
(iii) Files Design
(iv) System Processing and general program design
The stages are carried out in the order given above, starting with output design this is because
the output required for a system will determine the input design which will in turn determine the
files and the systems processing.
During output design fields to be used are identified and defined, before we look at examples of
fields lets define a few key terms here.
Field A single data entity in a record/ a collection of related characters which when grouped
together make up a record.
Record A collection of related fields
Database A collection of related record/files organized in a way that can be manipulated by a
database program.
Taking for example a school administration system used to store students records including
personal details and fees payment details, fields to expect in such a system include the
following
At the design stage the system analyst will use a number of design tools some of the tools
include.
1. Top down design (Modular approach)
2. Prototyping
3. Application generator
Prototyping.
In prototyping you build a working model of the system in order to have it tested and approved before building the final product.
Q What are the advantages and disadvantages of using prototyping as a tool for the systems analyst?
Application Generator.
Applications generators are software tools which can be used to create systems. The user
describes the input, output, data and files, and what needs to be done. The application
generator will then use this information to generate a program or suite of programs.
Development
At the development stage the programmers will code, test and debug the programs.
CODE PROGRAM
In short to code is to write a program. This is the process of converting our solution i.e. the
algorithm (flowchart/pseudo code) into an actual computer program. Here we choose a suitable
programming language and use the syntax and semantics of that language.
Syntax means the correct way or ―grammar‖ of writing a command or series of commands,
including all the proper options and command-line statements.
Semantics means the logical meaning of a statement, separate from the grammatical structure.
(Rules and regulations that govern a particular language)
Once coding is complete, you will enter the program into the computer. The computer will then
translate the program into machine code.
There are two main ways of translating a program from source code to machine code namely
3. Interpreting
4. Compiling
Interpreter
An interpreter is a translator program which concerts a program from source to object (machine)
code line by line. An interpreter will not move to the next line until an error on the previous line
Advantages of an interpreter
Easy to debug errors
Cheaper a translator usually to not have to be bought separately from the other software.
Disadvantages
Slow to execute as the program needs to be translated every time it is run.
Less secure as users have access to the source code and can easily make changes.
Compiler
A compiler is a translator programs which converts the whole source code to machine code
at once and keeps a separate copy of the machine which can be run without need to
recompile. After compilation the programmer will have three files, namely the source code
(original program written by the programmer), Object code (the program which will be run on
the computer) and a list of errors (used for debugging the program).
Advantages
Faster to execute as there is no need to compile the program every time it is run.
More secure as the object code which is given to the users cannot be modified.
Portable as the object code produced is an executable program which can be run on any
machine.
Disadvantages
Difficult to debug as the program gives the programmer a list of errors and the
programmer has to rely on only that list to debug errors unlike the interpreters which
gives various diagnostic tools.
More expensive as the compile has to be purchased separately from the other software
programs.
Compilation means converting the source code i.e. the user‘s program which is written using a
high level language, into machine code, which is machine – understandable language.
Compilation results in certain kinds of errors which are indicated by the computer after the
process is over. These errors have to be corrected and then the program recompiled. The
process continues until the program is error free. Next we must verify that our program does
everything that it is supposed to do. Invariably, computer programs do not work properly the first
time. The three types of errors that are normally encountered are:
Syntax
Execution
Logical
Syntax Errors
A syntax error is a violation of a programming rule for example misspelling a reserved words
like typing LEP A = 5 instead of typing LET A = 5.
Logical Errors
A logical error is an error which comes out ass a result of incorrectly laying out statements
which results in the program producing wrong results. The computer does not detect logical
errors.
For example, for calculating the net salary of an employee the formula is
Net Salary = Basic Salary + Allowances – Deductions
This will obviously produce a wrong result. Such errors can be detected only by a dry run.
To correct these errors, we have to go through the algorithm of the program. These errors are
easily detected, by running some sample problems, for which we know the answer. Most of
these errors can be eliminated by properly designing the program. A complete scan and careful
dry run and walk through are some of the ways in which these errors can be removed.
Execution Errors
These are runtime errors which will prevent a program from running properly for example
division by zero or an endless loop.
Infinite loops
Data incorrect or in wrong order
Incorrect filename
Divide check errors. These checks appear when a quantity is divided by zero or by a
number which is very nearly equal to zero.
DEBUGGING
Debugging is the process of locating and correcting an error in a program. It contrasts with
testing, which is the process of detecting the error initially.
it is necessary to develop a proper testing strategy to ensure all possible scenarios are covered
and that all error trapping techniques are fully tested; for example if inputting data to represent
somebody‘s age, the test plan may include: 0, 5, -2, fred, 3.5, 215, 85 etc. to see whether each
piece of data is correctly dealt with; test data often falls into 3 types:
or
this is data which is acceptable/valid and has expected outcomes (for example, if a date is
being input the day should be in the range 1 to 31)
Extreme Data.
Data at the edges or boundaries, in our example above the example the extreme data would be
0 and 100. This data should also be accepted by the program.
Or
this is data at the limits of acceptability/validity (for example, if a date is being input, the two
values at the extreme limits of valid days would be 1 and 31)
Abnormal Data
Out of range data, in our marks example abnormal data will include data such as -3, -7, 102,
180 e.t.c and this data must be rejected by the program.
Or
this is data outside the limits of acceptability/validity and should cause an error message to be
generated (for example, if a date is being input the day can‘t be -1 or 50 etc.)
2. Implementation
This is the stage when the new system is put into use. The main steps in implementation are
Equipment acquisition (buying of new office furniture, air conditioners, cabling, e.t.c)
Installing the hardware (Installation of the software)
Training and Education (Users will be trained on how to use the hardware and software)
Creation of Master files (Data for all master files has to be entered before the new system is
put into use)
Fully test the new system once installed
transfer the paper files across to the new system; this may involve the following:
- scanning in the documents
- keying in the data
- create databases etc. to allow downloading of files etc.
When putting into use the new system the systems analyst has to decide on the best method of
conversion (way of putting the new system into use).
Direct changeover
Old
New
This a complete replacement of the old system by the new system at one go where the user
stops using the old system today and starts using the new system the next day. Usually done
over the weekend. The advantage of this method is that it is fast and efficient, with minimum
duplication of work.
This method can be disastrous if the new system fails at any point
- however, the benefits are immediate and less time is wasted
- costs are reduced (only one system in use so save on staff costs)
- less likelihood of a malfunction since the new system will have been fully tested
Parallel conversion
Old
New
The old system continues alongside the new system for a few weeks or months. The
advantage of this method is that the results of the new system can be checked against the
known results and if any problems are noted operation may continue under the old system while
errors are being rectified. However the disadvantage is that it puts strain on staff as there will
be duplication of work (some on the old system others on the new system doing the same
work). In some instances say a supermarket checkout customers may resent the double
checkout system.
If the new system goes down for any reason, you still have the old system to fall back on so a
failure wouldn‘t be disastrous
- it is possible to gradually train staff/time to get used to the new system
- more expensive than direct since need extra staff to run both systems
- more time consuming since both systems need to be run and evaluated
Phased changeover
Old System
New System
in this technique only part of the new system is introduced and only when it proves to work
satisfactorily is the next part introduced, and so on, until the old system is fully replaced
- if the latest part fails, only need to go back in the system to the point of failure; hence a
failure
isn‘t disastrous
This system is usually used with larger systems that can be broken down into individual
modules which can be implemented separately at different times. In this system a few customer
accounts can be put on the computerized system while the others remain on the old (manual)
system. Phased changeover can be direct or parallel. The main advantage of phased
changeover is that the burden of the workload is spread over time and gives users an
opportunity to learn from problems of a previous phase. However it is difficult to have control
over a system operating in two modes as different users will be treated differently for the same
operation.
Pilot Changeover
with this technique, the new system is introduced into one part of the company (e.g. into one
warehouse of a supermarket) and its performance assessed
- if the new system fails only one part is affected; the rest is still functional
- it is possible to fully train staff in one area only which is much quicker and less costly
than
parallel
- the costs are also less than parallel since only one system is being used in the pilot
warehouse
The following table summarises the risks involved in all four methods:
(c) New Millennium Spares is a company that sells motor parts. The company has a
Sales Department, a Purchasing Department and a Stores Department. The
sales department sells parts to customers on credit. The purchasing department
orders parts from suppliers. The stores department is responsible for receiving
purchased parts, keeping stocks and dispatching parts to the sales Department.
In order to computerize all its operations the company engaged the services of a systems
analyst.
(i) The systems analyst carried out a feasibility study. Give two reasons for the
feasibility study. [2]
(ii) The company accepted the systems analyst‘s recommendation to proceed with
computerization. The system analyst carried out a detailed investigation of the
existing operations of the departments.
State three fact-finding methods that he could have used in the investigation [3]
(iii) The systems analyst recommended the company should install a Local Area
Network (LAN) and purchase a Database management system (DBMS). All the
Departments will use a centralized database.
Give one advantage and one disadvantage of purchasing a pre-written software package.
[1]
(iv) Suggest two fields in the central database that will be shared by all the three
departments. [2]
(v) For each department suggest one field that will be part of the database, but will
only be used by that Department.
Purchasing Department [1]
Sales Department [1]
Stores Department [1]
During maintenance the programmers will be looking after the new system and there are three
types of maintenance.
Perfective Maintenance
Is done when the system is running perfectly but there is room for improvement.
Adaptive maintenance
Done when the environment changes, e.g. change in tax policies, business grows bigger, e.t.c
Corrective Maintenance
Done when errors are discovered in the system and they need to be corrected.
DOCUMENTATION
Documentation should not be viewed as a stand alone stage in the system life cycle, instead it
is a ongoing stating from the word go until maintenance because there is need to keep records
of everything done to help with maintenance at a latter stage.
1. User Documentation
Intended for the user with instructions on how to run/start the program, enter data, to exit the
program, samples of input data and output results, what problems to expect, how to handle
them, etc.
2. Technical Documentation
Intended for the programmers with instructions on how to debug errors and will consist of
flowcharts/pseudo codes/, program listings and detailed written statements of algorithms and
procedures involved. Documentation is necessary for program maintenance. Without proper
documentation, it will be difficult to change a program at a later date.
It is a misled notion that documentation is the last step in system development. In fact, it should
be interwoven with the entire phase of the programming process, especially with the design and
implementation, because documentation is supposed to enable individuals to understand the
logic of programs.
System flowcharts
System flowcharts are used to show how all the components in a system link together (e.g.
input, storage, output, processing, etc.). They are very different to normal flowcharts since they
don‘t go into detail of how something is actually done – they are a general overview. The table
below shows the most common system flow chart symbols:
Questions
(1) (a) A systems analyst was brought in to computerise a paper-based car sales system. What methods
could be used to gather data about the existing system? Give reasons for your choice.
(b) What would need to be done before the new computerised system became ―live‖?
(c) Why would PILOT and PARALLEL change over methods be suitable in this application?
(2) A program is written to input daily temperatures. Name three types of test data that could be used.
Give examples of each type of test data which could be used and discuss the outputs you would expect
to get.
(3) Name five tasks that would be carried out at the DESIGN stage in systems analysis.
(4) Name four methods used to change over from a manual system to a new computerised system.
Discuss the relative advantages and disadvantages of these four methods.
(5) Describe how the effectiveness of a new computer system can be assessed.
(6) What tools exist to help the analyst draw up an action plan and ensure that the project is completed
on time and to budget?
(7) What information would a systems analyst need to gather to decide on what hardware is required for
a new computerised system?
(9) Choose six symbols used in systems flow charts and explain what each symbol means.
(10) A company selling CDs and DVDs presently uses a manual, paper-based system to keep track of:
- stock levels
- files containing CD and DVD information
- sales information
If the customer has already found the CD/DVD in the shop s/he takes it to the desk and the shop
assistant finds the item file to check for its price. The customer pays for the CD/DVD and the following
then happens:
- shop assistant fills out a sales receipt and puts it into a file
- at the end of the day, all the sales are recorded and the number of each item in stock is
updated
- if the number of items are low a request for new stock is filled out
- the value of the day‘s sales are recorded in an accounts book.
A customer goes into the shop and finds a CD/DVD s/he wants to buy. The shop assistant scans the bar
code on the item and the CD/DVD details have been found including its price. The stock files are
updated (i.e. 1 is reduced from the number in stock) and the takings file updated. The stock levels for
that item are checked and an automatic order is sent out after accessing the supplier database.
If the customer has requested the assistant to find a particular CD/DVD the assistant keys in the
name/artist and finds out if the item is in stock, where it can be found and it‘s price (the next stage is the
same as above). If the item isn‘t in stock, the assistant takes the customer details and updates the
database and adds a request for the item to be ordered and this is added to the customer‘s file.
a. Draw the systems flow charts to show how the above system will work.
b. Discuss the advantages of the new computerised system when compared to the manual
paper-based system.
c. Why would the new system reduce the shop‘s costs?
Flow Charts
A flow chart is a pictorial representation of the flow of data in a system. Flow charts are mainly
used to describe the processes a program will go through, in a way a flow chart is another way
of representing an algorithm. The main advantage of using a flow chart as compared to the use
of an algorithm is that a flow chart is easier to interpret, even for non computer people.
In a program flow chart, various symbols are used to represent specific processes
Start or end
Process
Input or output
Decision
Programming constructs
There are 3 programming constructs used in flow chart and algorithm design, namely:
Sequence
Sequence
In sequence a statement or block of statements is executed in the order in which they are given
and each statement is executed once.
Start Start
Print area
End
End
Selection
Start Start
T T
Statement 3 Grade = Pass
End End
In the example 1 above (format) statement 2 is only executed if the condition is false and
statement 3 is only executed if the condition is true. However statement 4 is outside the
condition block hence it is executed regardless of the condition being true or false.
Q Draw a flow chart to grade a mark into the following grades – (A – 70 to 100), (B – 60 to 69), (C – 50 to 59) , (D – 45 to
49), (E – 35 to 44) and (F – 0 to 34)
In iteration, a statement or block of statements for a given number of times or repeatedly until a
condition become true or false
Start
Statement 1
T
Statement 2
Statement 3
Example 2 ( a flow chart to print all odd numbers between 0 and 10)
Start
N=1
N < 10 F End
?
T
Print N
N=N+2
Q Draw a flow chart to print all even numbers between 0 and 20 (inclusive)
A system is used to keep the temperature of the greenhouse between 20°C and 26°C. If the
temperature drops below 20°C then a heater is turned on to warm the greenhouse up. If the
temperature rises above 26°C then a fan is turned on to cool the greenhouse down.
A car repair garage uses a computer system to produce invoices and keep track of the parts it
has in stock. The system uses two files :
When a repair is completed the mechanic records the parts that were used on a form. These
parts are then entered into the computer by an operator. The list of parts that is entered is
checked against the stock list to reduce the likelihood of the operator making a mistake. If the
operator enters the name of a part that does not exist then an error report is displayed. When
the parts list has been entered the cost of the parts is looked up in the stock file and an invoice
(bill) is printed for the customer.
Every night the computer system checks the stock file. A report is printed to indicate which parts
need to be ordered from the garage's suppliers. Details of any orders are placed in the orders
file.
When a delivery of new parts is made to the garage the person making the delivery gives the
garage a delivery note. The delivery note contains a list of the parts that have been delivered.
The list of new parts is entered into the computer by an operator. If any parts have been
The structure of this system can be shown using the following system flowchart :
Customer file
Q Describe tow types of diagrams that can be used by a systems analyst when producing system
documentation.
Algorithms
Candidates should have experience of representing algorithms informally (as structure diagrams, flowcharts, step
sequences, descriptions) and more formally in pseudocode. Candidates should appreciate the main requirements
of a programming language, to allow manipulation of data of various types and structures, including control of input
and output, and to provide for selection, repetition and subprogram intercommunication. Candidates should have a
simple understanding of the functions of interpreters, compilers and assemblers, and an appreciation of the
benefits offered by the existence of a range of languages, both high and low level.
What is an algorithm?
In algorithm design same in flow chart design there are 3 basic constructs used namely
Sequence, Selection and Iteration.
In sequence a statement or block of statements is executed in the order in which they are given
and each statement is executed once.
Example 2 (Algorithm)
An algorithm to find the area of a triangle
Start
Input Base
Input height
Area = (0.5 * base) * height {nb. The area of a triangle = ½ base multiplied by height]
Print area
End
Example 3 (algorithm)
An algorithm to find the area of a circle (assuming the radius is given)
Start
Input radius
Area = 22/7 * radius * radius {nb. area of a circle = πr2}
Print area
Stop
Q Write an algorithm to find the area of a circle assuming the diameter is given.
There are very few algorithms which can be written using sequence alone since most of the
actions require some selection.
Example 1
Start
Statement 1
IF <Condition> THEN
Statement 2
Statement 3
ELSE
Statement 4
ENDIF
Statement 5
End
In this case statement 2 and 3 will only be executed if the condition is true and statement 5 will
only be executed if the condition is false.
Example 2 (algorithm)
An algorithm to grade a mark into pass or fail.
Start
Input mark
IF mark >= 50 THEN
Grade = Pass
ELSE
Grade = Fail
ENDIF
PRINT Grade
End
An algorithm to grade marks into Distinction, Credit, Pass and Fail, (given Distinction = 80 –
100, Credit = 70 – 79, Pass = 50 – 69 and Fail = 0 – 49)
Start
Input mark
IF mark >= 80 THEN
Grade = Distinction
ELSE
IF mark >= 70 THEN
Grade = Credit
ELSE
IF Mark >= 50 THEN
Grade = Pass
Else
Grade = Fail
ENDIF
ENDIF
ENDIF
Print Grade
End
Q Write an algorithm to grade marks into the following grades (A – 75 to 100), (B – 60 to 74), C (50 – 50 to 59), (D = 45 to
49), (E = 35 to 44) and (F = 0 to 34)
Apart fro the IF … THEN … ELSE construct there is the CASE ..SELECT which is easier to use
on multiple selections.
Example 4 (format)
SELECT CASE
CASE of Expressionlist
CASE expression 1
Statement
CASE expression 2
Statement
CASE expression 3
Statement
END SELECT
Start
Input Mark
SELECT CASE mark
CASE mark 80 to 100
Grade = Distinction
CASE mark 70 to 79
Grade = Credit
CASE mark 50 to 59
Grade = Pass
OTHERWISE
Grade = Fail
End Select
Print Grade
Q The following algorithm inputs air speeds (which must be in multiples of 100) and outputs a
suitable message.
1 input a speed
2 whole = speed/100
3 case whole of
4 0,1,2 : result = slow
5 3, 4, 5, 6 : result = normal
8 7, 8, 9 : result = high
7 otherwise whole = -1
8 endcase
9 if whole = -1 then
10 output ―abnormal reading‖
11 else output result, ―speed‖
(a) Dry run the above algorithm for the following Input data and complete the Output
column in the table: [3]
Input Output
150
400
800
(b) State what would happen if line 2 had been missed out of the algorithm.[2]
In iteration, a statement or block of statements for a given number of times or repeatedly until a
condition become true or false
Example (format)
Start
Statement 1
While <condition> Do
Statement 2
Statement 3
Endwhile
Statement 4
End
Example 2
An algorithm to print 2,4,6,..10 (even number from 2 to 10)
Start
X=2
While X < 11 Do
Print X
X=X+2 {this line will increment x by 2 every time the loop is executed}
Endwhile
End
Q Write an algorithm to print odd numbers from 1 to 9 inclusive using the WHILE ..ENDWHILE construct
Test on exit
In a test on exit loop the condition is placed at the end of the loop and the loop has to be to be
eceuted at least once.
Example 1 (format)
Start
Statement 1
Repeat
Statement 2
Statement 3
Until <condition>
Statement 4
End
Start
X=1
Repeat
Print X
X=X+2
Until X > 9
End
Q Write an algorithm to print even numbers from 2 to 10 inclusive using the REPEAT … UNTIL construct
Example 1 (format)
Start
Statement 1
For <variable> = start to finish
Statement 1
Statement 2
Next <variable>
End
Example 2
An algorithm to print 2,4,6,..10
Start
y=2
For X = 1 to 5
Print y
y=y+2
Next X
End
Most of the work on this part will be covered through practical work.
Application programs or packages (groups of programs) are designed to enable the computer to
tackle a specific task, such as writing a letter.
Examples:
Word processing - for writing letters, reports and other documents. Examples: Microsoft
Word, Word Perfect.
Essentially in DTP, a user creates a page layout with text, graphics, photos and other elements. The
following is a list of key differences to word processors:
- most word processors force users to work on a document in a linear fashion (i.e. paragraph by
paragraph and page by page); with DTP it is possible to place elements on the page and then
move them around as you wish to create the desired product.
- elements repeated throughout a document (e.g. a company logo) can be placed in master pages
rather than setting up each page individually as would be the case with a word processor.
- text is usually imported from a word processor or is typed into the document directly using a
frame. This allows you to create the layout first, link the frames together and add the text into the
frames later (e.g. in newsletters and magazines where layouts are created before any of the
actual text becomes available).
Databases are used to collect and organise information. Most database have all of the following
properties:
Tables
Data is stored in rows and columns (much like a spreadsheet – the main difference is how the data is
organised). Each row in a table is called a record which is made up of a number of fields (columns in the
table). The data type in the fields is usually either text, numeric or date/time. Most databases contain a
number of tables which are usually linked together in some way.
Forms
Forms are commonly called data entry screens since they are the user interface which allows data in the
tables to be viewed, entered or edited. Forms permit the control of how other users interact with the
information in the database e.g. only allow certain fields to be seen or only allow certain operations to be
carried out. This subsequently helps the protection of the information and also ensures it is entered
correctly.
Reports
Reports are produced as a result of questions such as ―how many times has a type of car broken down‖
or ―which cities have the highest house prices‖. Reports can be printed out, viewed on the screen or
exported (e.g. to a word processor, an email message, etc.).
Queries
Queries most commonly allow information to be retrieved from tables. Since the information is often
spread across several tables, queries allow it to be viewed as one single datasheet. They also allow
filtering so only the records required are seen. Queries can be either results seen directly on the screen
or the output to another form or report. Example of a query: (house > 200 000) OR (no_of_rooms < 4).
- it is made up of columns and rows; each row is identified by a number and each column is
identified with a letter (or letters)
- each cell is identified by its column id and row id e.g. A4, ET300 etc.
- a cell may contain a label (text entry such as MEAN VALUE) or a value (which can be a number,
a date, a formula, result of a calculation, or currency)
- the cursor identifies the current cell selected; it is possible to click on to a cell and a ―+‖ sign
appears in the bottom right hand corner; by dragging the formula down it is possible to replicate it
in other cells
- - formulas are used to represent a mathematical function
- e.g. = (C5 * D5) * 100
- = A5 + B5 + C5+ D5
- - functions allow computations to take place
- e.g. SUM, AVERAGE, MAX, MIN
- e.g. the second formula above could be written as = SUM(A5:D5)
- - it is also possible to use mathematical/logical expressions within cells
- e.g. IF G5 > 100 THEN ―Y‖ ELSE ―N‖
- it is also possible to create charts and graphs from spreadsheets (e.g. using a chart
wizard)
Also known as authorware; this is a program that helps in the writing of hypertext or multimedia
applications. Authoring tools usually allow the creation of the actual required application by linking
together objects which can be text, graphics, music file, etc. By defining the relationship between objects
it is possible to produce very useful and eye catching applications.
Many authoring packages support a scripting language to allow for even more sophisticated applications
to be produced. Scripting languages have pre-built functionality (such as menu styles, graphic displays,
etc.) that is embedded within HTML. These pre-built functions allow users to engage with a web-site in
real time.
The distinction between authoring tools and programming tools is not at first obvious. However,
authoring tools require less technical knowledge to master and are usually used for applications that
present a mixture of text, graphics, and audio/music files.
Off-the-shelf – advantages
- tends to be less expensive since development costs can be spread over the many users
- can be more sophisticated since large sales bring in considerable revenue which can be used to
enable a lot of development to be done.
- there will be considerable support from other user groups
- sharing of files with other packages is usually easier since they are likely to be compatible (e.g.
Excel and Word)
- the package is available immediately – no need to wait for development period
- tried and trusted software since usually highly developed due to considerable user feedback
Off-the-shelf – disadvantages
- can be over-complex as it tries to cover as many aspects as possible (e.g. most users of Word
only utilise about 10% of its features)
- the software is often a compromise since it is intended for many users all with different
requirements
- may be very complex to learn because of the complexity caused through having unwanted
features
- may not fit exactly into the company requirements causing a compromise in the way it has to be
used within the organisation
- if there are major concerns with a software problem it is unlikely that it will be fixed immediately
(since it may cause problems with other users and/or cause software instability)
Bespoke Software – advantages
- specifically designed for the application and therefore more efficient and will only contain the
features wanted; since it will be devoid of unwanted features the software can take its specific
requirements to new levels which will make it very powerful
- can be customised to interface with all other software within the company thus preventing
software clashes
- easier to use since very specific and the writers of the software can also be involved in the
training of staff which will be geared towards their requirements
Macros
A macro is a name or key that represents a series of commands or key strokes. Many applications allow
single word or single nominated key on a keyboard to perform a whole series of actions. Macros can be
either written as required and then stored or stored in a library for future use.
For example, suppose you want some data to be input into a spreadsheet if the result of a calculation in
cell K40 is negative:
move to cell K40
is result of calculation < 0
if < 0 then load file “error report”
if >= 0 then output value
Macros can be very sophisticated and save the operator a lot of time. For example, the name and
address in a word processor could be set up by pressing key F1 and the system brings information from
a related database.
Other software
Other software, such as web browsers and search engines, communications software (including emails)
and graphics interfaces are all covered in other booklets and the information won‘t be duplicated here.
Data verification and data validation are two methods of making sure no errors occur in the data
before processing takes place. (Make sure you know the difference between them!)
Data Verification
This is a check to see if data has been keyed in correctly. The data is keyed in twice, and the
computer will only accept the data for processing if the two versions are identical. Another way
of data verification is comparing against the source which is known as proof reading.
Double entry in this method, data is entered twice (using two different people); the data is only
accepted if both versions match up. Often used to verify passwords by asking
them to be typed in again by the same person.
Visual check this is checking for errors by comparing entered data with the original document
(NOTE: this is not the same as proof reading!!).
Parity check this is used to check data following potential transmission errors; an extra bit is
added to each binary number before transmission – e.g. EVEN parity makes sure
Data Validation
A check to see if the data is correct on entry using a program before it is processed.
There are a number of different data validation checks which can be carried out...These are
some of them...
Range check this checks whether data is within given/acceptable values e.g. checks if a
person‘s age is > 0 but is also < 140.
Length check this checks if the input data contains the required number of characters e.g. if a
field needs 6 digits, then inputting 5 digits or 7 digits, for example, should be
rejected.
Character check this checks that the input data doesn‘t contain invalid (type check) characters; e.g.
a person‘s name shouldn‘t contain numbers.
Format check this checks that data is in a specified format (template) e.g. (picture check) date
should be in the form dd/mm/yyyy.
Limit check this is similar to a range check except only ONE of the limits (boundaries) is
checked e.g. input data must be > 10.
Presence check check that data is actually present and not missed out e.g. in an electronic form,
somebody‘s telephone number may be a required field.
Consistency check/ this checks if fields correspond (tie up) with each other e.g. if Cross field check Mr.
has been typed into a field called ―Title‖ then the ―Gender‖ field must contain M or
Male.
Check digit this is an extra digit added to a number which is calculated from the digits; the
computer re-calculates and validates the check digit following input of the number
This section shows how check digits are calculated. The ISBN-10 (used on books) has been chosen as
the example; this uses a modulo 11 system which includes the letter X to represent the number 10.
(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 2 x 9 + 0 x 8 + 1 x 7 + 5 x 6 + 3 x 5 + 0 x 4 +8 x 3 + 2 x 2
= 0 + 18 + 0 + 7 + 30 + 15 + 0 + 24 + 4
= 98
(iii) the total is then divided by 11 (modulo – 11) and the remainder, if any, is subtracted from 11 to give
the check digit.
98 ÷ 11 = 8 remainder 10
11 – 10 = 1
Example 2
To check the correctness of a check digit the computer re-calculates it as follows:
0 -1 3 1 -5 2 4 4 7 -X ← number
10 9 8 7 6 5 4 3 2 1 ← digit position
(ii) each digit is then multiplied by its digit position and the totals added together
0 x 10 + 1 x 9 + 3 x 8 + 1 x 7 + 5 x 6 + 2 x 5 + 4 x 4 + 4 x 3 + 7 x 2 + X x 1
= 0 + 9 + 24 + 7 + 30 + 10 + 16 + 12 + 14 + 10 (recall that X = 10)
= 132
(iii) the total is then divided by 11; if there is no remainder then the check digit is correct:
132 ÷ 11 = 12 remainder 0
When a database is designed, all the fields are set to accept a particular data type. This helps
check for the wrong type of data being entered and makes sure the data is stored as efficiently
as possible. It also means it will be sorted correctly.
Alphanumeric/text - a field of this data type will accept both numbers and text.
When to use - if you want to enter text or a mixture of text and numbers.
When NOT to use - if you want to store only numbers or only dates. You can
enter numbers or dates into text fields but they would get sorted as if they were
words and could not easily be used for any calculations.
Numeric - a field of this data type is used to store numbers. There are two types of
numeric field you need to know about:
Real - used for decimal numbers such as 3.4, 3.1427 and 6.0 etc. Real numbers
can be formatted as currency (i.e. £5.67) or to a fixed number of decimal places
(i.e. entering 3.1427 into a real number field formatted to two decimal places
would mean it appeared as 3.14)
When to use - if the field is going to be used to store numbers with decimal
places such as 'height', 'length' etc.
Integer - used for whole numbers.
When to use - if the field is only going to be used to store whole numbers, i.e.
'number of children', 'car doors' etc.
Logical/Boolean - a field of this data type will only let you enter a 'Yes' or a 'No'. This
may be as text (YES/NO or TRUE/FALSE) or as a tick/blank.
When to use - when you only need to store something as 'true' or 'false' or store whether
something exists or does not exist.
Date - this special field stores days, months and years so that records can be sorted
correctly. Date fields can display the date information in different formats such as the full
name of the day/month (28th August 1961) or the numerical versions (28/08/61)
When to use - for any field which will be used to store date information.
Examples of use:
You will often get a question about a table from a database. It can be very easy to mix up a
question about field names with one about field data types.
For example:
Item Stock code Size (cm) Manufacturer Date purchased Plastic?
Hose clip T0090 0.90 Fisher 28-07-2002 No
Hose clip T0135 1.35 Fisher 28-07-2002 No
Joining clip K0118 0.90 Asus 28-04-2001 Yes
Extension hose L0035 100.00 Fisher 28-02-2000 Yes
If you are asked to name a field then look the row at the top which should have all the
field names. In this example, 'Item', 'Stock code' etc. are the field names.
If you are asked to identify the key field then look for a column of numbers or
numbers/text that identifies each item uniquely. In this example the 'stock code' is the
key field as each item in stock would be given a unique code to avoid confusing it with
any other item.
If you are asked to describe a suitable data type for a particular field then you must look
at the type of data being stored in each column.
If the data is text or a mixture of text & numbers (including spaces or brackets
etc.) then the data type would be text.
If the data is numeric then the data type would be numeric but you also need to
say if it should be real or integer. (Remember, use real if the data has decimal
places and integer when all the data is whole numbers)
If the data is in the form of a date then the data type would be date. It does not
matter if the date is stored in a numeric form (i.e. 28-08-61 or 28/8/1961) or written
out fully (i.e.28th August 1961).
If the data seems to have only two options, particularly 'yes' or 'no' then the
data type should be logical/Boolean.
2. A database has been set up by a car dealer to maintain information on cars currently
available for sale. A section of the database is shown below.
(a) Which column has been used to sort the data? [1]
(b) What formula has been entered in cell G2 to calculate Allen‘s average mark? [1]
(c) The IT results need to be sorted so that the highest mark is at the top. Describe how
this sort could be done. [2]
(d) The formula IF(G5 > 45, ―PASS‖, ―FAIL‖) is entered in cell H5. What output appears? [1]
(e) State the validation check that should be carried out on data entered in cells C2 to F8 to
ensure values over 100 are not input. [1]
(f) The school has kept the spreadsheets of all the examination results for the last five
years. What feature of the spreadsheet software would allow the results to be easily
compared? [1]
(1) Describe four methods used for automatic data capture. Give a different application for each of the
methods chosen.
(5) A burglar alarm system uses an 8 – bit register. The first 4 bits indicate if a sensor has picked up an
intruder (shown with a 1 – value) and the second four bits indicate the zone where the sensor has picked
up an intruder:
For example:
(6) A company is using a word processor to produce a page advertising their products. Unfortunately,
the information wouldn‘t fit onto one single page.
Which five features of a word processor could be used to ensure that the advert fits onto one page only.
(7) A college has invested in a computer system to help carry out the following tasks:
- advertise their college (both on the Internet and by paper leaflets)
- keep a track of student and staff information/contact details
- keep a track of payments and fees
- produce on line courses for the students
Describe four software packages the college could use to carry out the above tasks and explain why
each software package has been chosen.
(8) Describe three fundamental differences between word processors and desk top publishing
packages.
(9) The following spreadsheet has been set up to compare the depreciation of 8 new cars over a 4 year
period.
A B C D E F G
1 name of car new price Value after Value after Value after Value after Depreciation
($) year 1 ($) year 2 ($) year 3 ($) year 4 ($) over 4 years
(%)
2 Fiat Bravo 150 28 000 21 000 15 600 11 200 9 800 65
3 Honda Civic ―R‖ 36 000 28 800 23 400 20 000 18 000 50
4 Range Rover SE 80 000 64 000 60 000 50 000 48 000 40
5 Mitsubishi Lancer 20 000 12 000 9 000 6 400 5 000 75
6 Citroen C8 LX 40 000 20 000 13 200 10 000 8 000 80
7 BMW 320 Conv. 72 000 57 600 50 000 43 200 36 000 50
8 Audi A3 1.6 SE 30 000 22 500 18 000 15 000 12 000 60
9 Mercedes SLK 68 000 57 800 51 000 48 000 45 600 33
350
10 Mean Deprecn 56.6
11 Highest Deprecn. 80.0
a. What formula must be in cell G4 to find the depreciation on a Range Rover after 4 years?
b. What formula must be in cell G10 to calculate the mean (average) depreciation of all 8
cars?
c. What formula must be in cell G11 to find the highest (maximum) depreciation of all 8
cars?
(10) A database has been set up to compare certain features of freezers. A section of the database is
shown below.
Item I.d. Price ($) Lowest temp Capacity (m3) Warranty Colour
0
( C) (years)
A 300 - 20 0.16 1 white
B 250 - 18 0.15 1 silver
C 400 - 22 0.25 2 white
D 300 - 20 0.18 3 white
E 520 - 40 0.35 3 silver
F 360 - 25 0.30 1 white
G 410 - 30 0.30 2 white
H 290 - 18 0.20 2 silver
KEY WORDS