Types of ICT Systems

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is a key advantage of using ICT systems in business operations?

  • Reduced ability to handle vast amounts of information
  • Increased costs and delays related to manual inventions
  • Improved productivity and reduced costs (correct)
  • Decreased productivity due to system complexities

A Netbook is intended to be a very small desktop that is optimized for Internet and email access, with a long battery life.

False (B)

Which input device uses a stylus on a flat surface to create drawings in the computer?

  • Graphics Tablet (correct)
  • Scanner
  • Touch Screen
  • Trackerball

A ______ is a type of digital video camera where the image captured is viewed using a computer and the internet.

<p>webcam</p> Signup and view all the answers

Match the memory type with its correct description.

<p>RAM = Volatile memory used to store data and instructions currently being processed. ROM = Permanent memory that stores the computer's startup instructions. Flash Memory = A type of EPROM that retains data without power; used for BIOS and memory cards.</p> Signup and view all the answers

Which of the following storage devices uses layers and is commonly used for distributing HD material such as movies?

<p>Blu-Ray Disc (B)</p> Signup and view all the answers

Which network type is most commonly used to connect devices within a small geographical area, such as an office or home?

<p>LAN (Local Area Network) (A)</p> Signup and view all the answers

A 'firewall' is a hardware or software system designed to prevent unauthorized access to a computer system or network.

<p>True (A)</p> Signup and view all the answers

What is the security benefit of encrypting data?

<p>Data is unreadable without the encryption key</p> Signup and view all the answers

A ______ is a type of program that disguises or hides its true intentions and causes damage or disruption to a computer system.

<p>virus</p> Signup and view all the answers

Which activity is considered software piracy?

<p>Downloading music without paying (B)</p> Signup and view all the answers

What is the primary goal of 'phishing'?

<p>To obtain sensitive information for identity theft (A)</p> Signup and view all the answers

Ergonomics mainly deals with reducing injury by properly designing and arranging the computer seating and system.

<p>True (A)</p> Signup and view all the answers

Aside from using strong passwords what is another recommendation to protect your online personal data?

<p>Use caution when sharing data and what web pages you access.</p> Signup and view all the answers

Easy ways ways are found to pay the employees in a company using ______ or computer aided design are used in designing for ______.

<p>payroll, engineering</p> Signup and view all the answers

Flashcards

Desktop PC

A PC with basic components like a monitor, keyboard, system unit and mouse.

Laptop

A portable computer, larger and heavier than a notebook.

Notebook

A small, light laptop, about the size of an oversized book.

Netbook

Very small laptop optimized for internet and email.

Signup and view all the flashcards

Handheld Computer (PDA)

Small computer that fits in one hand; often touch-sensitive.

Signup and view all the flashcards

Smartphone

Mobile phone with PDA functions; used for personal record-keeping/navigation.

Signup and view all the flashcards

Mainframe Computer

Very large and expensive computer, supporting hundreds/thousands of users.

Signup and view all the flashcards

Supercomputer

Fastest type of computer, for specialized, calculation-intensive applications.

Signup and view all the flashcards

Embedded Computer

Computer built into a specific application with limited, dedicated functions.

Signup and view all the flashcards

Joystick

A device providing similar control to a mouse, often built into gamepads.

Signup and view all the flashcards

Graphics tablet

A flat pad used with a stylus for creating drawings in a computer.

Signup and view all the flashcards

Scanner

Device that reads printed data into a computer.

Signup and view all the flashcards

Digital Camera

Device that stores pictures on a memory card.

Signup and view all the flashcards

Webcam

Digital video camera that transmits images over the Web to a computer.

Signup and view all the flashcards

Microphone

A device used to record sound and provide voice commands.

Signup and view all the flashcards

Study Notes

Types of ICT Systems

  • Desktop PCs typically include a monitor, keyboard, system unit, and mouse
  • Laptops are slightly larger and heavier than A4 paper
  • Notebooks are smaller, lighter laptops, about the size of an oversized book
  • Netbook computers are very small laptops optimized for Internet and email with long battery life and are easy to carry.
  • Handheld computers like PDAs (Personal Digital Assistants) or palmtops fit in one hand and have touch screens; though keyboards can be attached to them, typing a long document is difficult
  • Smartphones combine mobile phones with PDA functions, including personal record-keeping and satellite navigation
  • Mainframe computers are large, expensive, and can support hundreds or thousands of simultaneous users
  • Supercomputers are the fastest computers used for specialized applications requiring immense calculations, such as weather forecasting, animated graphics or petroleum exploration
  • Embedded computers are designed for specific tasks within a device and may be very small, like those built into a single microchip
  • Game consoles are PCs designed specifically for playing games

Importance of ICT Systems

  • ICT systems increase productivity by enabling more tasks to be completed in less time, at a reduced cost compared to pre-computer methods
  • ICT facilitates managing and processing vast amounts of data quickly
  • ICT enables rapid transmission and reception of information

Input Devices

Keyboard

  • The keyboard is a commonly used input method.
  • Numeric keyboards have keys mainly for numbers, A QWERTY keyboard may optionally have a built-in numeric keypad
  • Keyboards are widely used in workplaces and are almost always available as an input device
  • Many people are familiar with QWERTY keyboards
  • Efficient keyboard use requires knowledge of the layout and touch-typing skills

Mouse

  • The mouse is commonly used as a pointing device
  • Some types use a ball to detect movement, while optical mice use light

Tracker Ball

  • The tracker ball is an upside-down mouse, operated with your thumb

Joystick

  • The joystick is a lever providing similar control to a mouse with a slightly different behavior
  • Joysticks can be stand-alone or built into gamepads

Graphics tablet

  • Graphics tablets are rectangular pads that come in different sizes
  • They work with a stylus for drawing on a computer
  • Some styluses, like pucks, come with cross-hairs for tracing lines
  • Styluses can be pen-shaped
  • Graphics tablets are used for computer-aided design and drawing

Scanner

  • Scanners can read printed data into a computer
  • A handheld scanner reads images when dragged over them
  • Flatbed scanners capture the image of a document placed on their surface
  • Sheet-fed scanners pull the image through rollers
  • Scanners quickly convert printed images to electronic form
  • The data input accuracy is hard to verify

Digital camera

  • Digital cameras store pictures on memory cards
  • Pictures can be transferred to computers for editing or viewing
  • They can also be viewed on TVs equipped with memory card readers
  • Pictures are composed of small dots; higher dot density yields better quality
  • Eight mega-pixel cameras produce higher quality output than two mega-pixel cameras
  • Digital video cameras (camcorders) record moving images, saving them on memory cards, DVDs, miniDV tapes, or built-in hard disks

Webcam

  • Webcams display captured images on a computer screen
  • The computer connects to the webcam over the web
  • The webcam can provide a live feed from a location
  • Webcams can be used for virtual communication
  • Webcams can be used in classroom settings for remote instruction
  • Webcam photos and videos can be saved digitally enabling easier, more reliable and extensive backups
  • Digital photos and videos can be displayed on various devices and sent via email
  • Digital video can also be broadcast over the Internet for on-demand access
  • Webcams can create needs for more storage because users tend to have more photos and longer videos
  • High-quality photos and videos are very large files using up more bandwidth and slowing down the network when emailing/broadcasting over the Internet

Microphone

  • The microphone is used for recording sound, voice commands, and communication over the internet

Touch screen

  • The touch screen functions as both an input and output device, with tablet PCs, PDAs and smart phones widely utilizing them
  • Users can interact by touching on-screen words/images

Optical Mark Recognition (OMR)

  • OMR technology is utilized to interpret pencil marks on paper using a special reader that recognizes the position of the mark
  • The OMR requires no typing
  • OMR data input avoids typing, making it faster and less expensive
  • The person filling in the form is responsible for accuracy
  • OMR forms must be printed accurately, therefore printing costs can be more expensive
  • Verification checks are unlikely, increasing chances of undetectable errors

Optical Character Recognition (OCR)

  • OCR is the computer identification of printed or written text
  • OCR scanners input printed text to computers where it is recognized and stored as word-processable text
  • OCR software often comes bundled with scanners for handwriting readability
  • Text printed on paper can be converted to electronic form for easier editing
  • OCR can be particularly useful for creating electronic versions of books before computers

Bar code scanner

  • Bar code scanners read the pattern of bars representing a printed items code number
  • A bar code scanner often uses a small laser beam to read the reflected light pattern.
  • Bar code scanners are either hand-held or built into supermarket checkout counters

Biometric scanner

  • A biometric scanner makes personal identifications based on unique physical characteristics via face, retinal, fingerprint, geometric, and voice recognition
  • Biometric scanners are embedded in mobile phones, laptops, desktops, and smart cards
  • They can control entry to premises and even replace car keys
  • Using biometric scanners removes the need to memorize/carry personal identification
  • Biometrics prevents theft and fraud by requiring personal presence
  • Current biometric identification is not always accurate and may reject access for permitted users and allow unauthorized access

Magnetic Stripe Reader

  • The magnetic stripe reader reads a magnetic stripe on a plastic card
  • Magnetic stripe cards include bank/credit cards
  • Some readers can write information back onto the stripe
  • The stripes store permanent account numbers or values that could change like cash withdrawal limits
  • Use of magnetic strips is a widely accepted form of identification due to its small size and portability
  • Data is recorded in electronic form and can be directly input into a computer quickly and efficiently
  • Electromagnetic radiation can affect the data on magnetic stripes
  • Magnetic stripe data is easy to copy or delete, increasing the risk of theft and fraud

Chip and PIN

  • Chip and PIN (personal identification number) cards use a microprocessor chip, similar to magnetic stripe cards
  • The chips process and store information
  • Special devices read/write information
  • Bank/credit cards have started utilizing Chip and PIN technology
  • The card can be used to withdraw cash
  • PIN entry is encrypted to match known PIN to proceed
  • This method is easily used for identification
  • Because the chip stores electronic data it can be input into a computer directly
  • Chip data is more secure than the magnetic stripe
  • Chip data can be updated after transactions
  • Electromagnetic radiation can affect data on chip cards
  • Cards may still be copied/edited by determined criminals

Sensors

  • Sensors input data into the computer about the environment
  • Sensors have a variety of shapes, sizes, and uses
  • Sensors are useful recording light intensity, pressure, and temperature
  • Sensors require the use of an ADC (analogue-to-digital converter) which converts a low voltage sent from the sensors into readable digital signals
  • Sensors can be placed in dangerous locations
  • Sensor are able to continuously and reliably record data
  • Sensors can record data humans can't sense, such as humidity
  • The data is automatically recorded for computer processing
  • Data is able to be collected remotely reducing the need for travel
  • Sensors cannot interpret the data
  • They can only detect a limited amount of different data

Processors

CPU

  • A processor or microprocessor is built into a microchip containing memory and other components

Graphics card (aka video card or display card)

  • The graphics card houses within the system unit, controls the signals going to the monitor screen
  • Higher quality graphics produce clearer graphics
  • Some computer games demand advanced display cards

Sound card

  • A sound card controls all input and output of audio, converting analogue input from sources like the microphone/speakers into digital signals which are processed by the computer, multimedia applications etc.

Output Devices

Monitor

  • Monitors, or visual display units (VDUs), vary widely in styles and quality, affecting factors like color, resolution, and clarity
  • Although a monitor picture appears sharp, images comprise picture elements (pixels); viewed from a distance the picture would resemble jagged pixelation
  • Monitors enables GUIs (graphical user interface)
  • They are interactive and have intuitive on-screen use
  • Screen size limits extent and detail of the image
  • Screen displays can be difficult to read for people with impaired sight

Printer

  • Impact printers strike the paper through an inked ribbon to make marks
  • Non-impact printers do not strike the paper
  • Inkjet printers spray dots of ink to form shapes, are quiet, create good quality outputs, create colored prints, and are popular for homes and small offices
  • Laser printers use a laser to create patterns of ink on a drum which transfers the ink and adheres it to the paper through heat, creating high quality prints very quickly
  • Laser printers are more expensive than inkjet printers and often print in color
  • Thermal printers mark heat-sensitive paper using heated wires
  • Thermal dye printers heat dyes into a gas for the highest quality color printing, though this is expensive and requires special paper
  • Thermal wax printers use molten wax to create tiny dots that blend into tones
  • Printers have buffers to store data and not disrupt the system while the computer prints
  • Print jobs from networks are first put in queue on a server, and then sent to the printer, making the process of printing in that manner known as spooling
  • Printers with smaller dots will have higher print quality measured in dots per inch (dpi)
  • A4 printer paper is a common material used for different types of paper
  • High volume printers use paper with perforations so outputted pages can be easily separated from the rest
  • Other printers use carbon copy paper

Photo Printer

  • Images can be printed from a digital camera by plugging a memory card into the printer itself, or by connecting the camera another way
  • Some prints can be viewed without a computer
  • Many people and organizations still use paper media for legacy formats
  • Printing is slow and expensive
  • Paper is bulky and deteriorates in storage
  • Printed media may be harder to access, may only be accessed by small groups, may be difficult and more expensive

Multi-Function Printers

  • Newer printers combine scanners and fax machines
  • Using this set up gives the user effective photocopying and printing capabilities
  • Multifunction devices take up less space and money than their alternatives
  • Multi function printers more modern and more likely to be used than their replacements
  • A lack of function in some regions of the device can render it entirely unavailable
  • Only one person can use the multi function device at a time

Plotter

  • A plotter prints lines on paper using different colored pens, and are frequently used for computer aided design.
  • Flatbed plotters hold the paper while the pen moves
  • Other plotters have the pen move while the paper progresses forward and backwards
  • Electric wires may also be used to draw patterns on the paper
  • Larger sheets are more expensive
  • Plotters print very slowly

Data projector

  • Data projectors create the image displayed on computer screens
  • An audience is presented with the image on a larger screen
  • Data projections are used for presentations in business settings or home entertainment
  • Interactive whiteboards are panels used with data projections that have a touch sensing feature for interacting with what is being displayed
  • Some interactive whiteboards utilize special technology while some utilize capacitive or resistive technology

Speakers

  • Speakers output audio used in many settings
  • Speakers enable speech synthesis
  • Speakers lead to multimedia application usefulness
  • Speaker output is intuitive with computer programs
  • Those with hearing impairments may have a difficult time working with speakers
  • Voice recognition systems can be difficult

Control Devices

  • Computer applications use control devices or actuators that control other events
  • Examples of control devices are valves, heaters, coolers, and motors
  • Actuators can perform physical tasks and control systems
  • Actuators can act as a hazard if their instructions are not known to the user

Configuring Systems

  • High speed processors and large memories are required to run systems
  • An office system requires office tools
  • Video gaming systems require video cards and high quality sound cards
  • Both categories require a high quality operating system

System Software

  • An operating system controls hardware
  • The OS's capabilities include I/O (input/output) control, error handling, resource allocation, file-handling, and providing a user interface

Applications Software

Office Productivity

  • Office software increases productivity
  • This includes desktop publishing, word processing, managing spreadsheets, and databases

Web Authoring

  • Web authoring creates internet accessible web pages using software and HTML
  • Adobe Dreamweaver gives more control

Image and sound editing

  • Image and sound editing software gives users control in different media files

Presentation

  • Presentation software allows the speaker to have an audience view the presentation on a monitor through text, notes, and graphs

Project Management

  • Software can be used to complete different tasks and projects

Backing Storage

Data capacity terminology

  • One kilobyte (KB) is equivalent to 1024 bytes
  • One megabyte (MB) is equivalent to 1024 KB or 1,048,576 bytes
  • One gigabyte (GB) is equivalent to 1024 MB
  • One terabyte (TB) is equivalent to 1024 GB

Main Memory

  • Memory stores programs

Main Memory

  • Data or instructions must be placed into main memory
  • Main memory is also known as primary storage

RAM

  • RAM, random access memory, data in it can be accessed in any order, read/written to, is volatile; RAM clears upon turning off the computer

ROM

  • ROM, or Read-only memory, has data that can be accessed in any order, but not changed
  • ROM is intended for permanent data and is non-volatile as it doesn't clear when the computer is turned off

Types of ROM

  • PROM or Programmable Read-Only Memory, contains no data after manufactured; third party company inserts data and locks it in
  • EPROM, or Erasable Programmable Read-Only Memory, gets original data in the same PROM does, but if necessary, can be erased using a special light or electric charge

RAM vs. ROM

  • RAM can be written to and read from
  • ROM, or read only memory can only be read
  • RAM holds program being run and data being processed, while ROM stores it
  • RAM is volatile, it clears when the computer turns off; ROM is non, it retains data when powered off
  • RAM microchips are supplied as a module plugged into the motherboard, while ROM is already installed

Storage Devices

Hard disks (HDD)

  • These drives store and retrieve digital data using rotating magnetic disks or platters
  • Data is stored in concentric tracks on each disk with corresponding tracks existing above and below, forming a cylinder
  • Each surface has a read/write head that can traverse over the spinning disk
  • The total storage capacity on a hard disk=readable sides x number of cylinders x sector per track x bytes per sector
  • Redundant Array of Inexpensive Drives(RAID) carry copies on hard drives
  • If one falls, data is recovered from others
  • External Hard Disks are robust, small, lightweight, are easily carried around, and attach to a computer through an USB socket

Optical discs

  • Compact discs use 700 MB of data and are 4/100 of an inch thick, read by laser
  • The pattern of etched data is in a long spiral track covered by thin layers of acrylic and aluminum
  • Digital Versatile discs(DVDs) can store 4.7 GB of data and dual versions are capable of 18 GB
  • CD-R/DVD-R can have data written before becoming read only
  • CD-RW/DVD-RW have up to only 1000 writes
  • DVDs-RAM can be completely sealed and have 100000 writes and are used in computer camcorders with approximately 30 years of data lasting
  • HD are used with DVD high res audio and video but found a rival and eventually ceased because of the rival format
  • Blu-ray distributes HD as a dual sided DVD almost 10x as strong

Flash memory

  • Flash memory is a type of EPROM, it can be quickly reset and rewritten while keeping the data when power off
  • Commonly, the the basic input and output system (BIOS) will use flash memory

Magnetic tape

  • Tape is mostly used for back-upped data with a large surface area by wrapping data on a reel
  • Data has to be accessed though a serial connection leading to slow speeds

Networking

LANs

  • LANs (local area networks) are collections of computers sharing peripherals, information, and communication locally, functioning independently or as network workstation
  • LANs share files and software
  • They are used to communicate
  • Devices stream media
  • Computers utilize all connected devices
  • Buying single licenses are more efficient than single versions
  • The user can share devices through Internet
  • Setting up servers and connections causes expensive damage and data corruptions, and is vulnerable to viruses
  • Client systems require specialized programs for each server
  • Access is granted to network computers from the terminal or network

Types of LAN

  • Client/server networks designate computers as servers, with other computers available as clients
  • A file server handles files, while a print server handles printing, server software manages system services and security, and any computer granting to any type of network via, such as with a main frame network, known as a terminal

Peer-to-peer network

  • Peer-to-peer networks allows users to exchange data across most computers, used mainly in small businesses

Cabled LAN

  • In cabled LANs, attached cables transmit data over systems, all on a network interface

Wireless LAN

  • Wireless LANs use access, interfaces, and routers to transmit data between systems
  • Wireless access points use radio signals, encryption, and wireless cards, coaxial routers use the Internet to transmit data

Bluetooth

  • Bluetooth is a wireless system used for computer, phone, or personal data sharing with 720 kbps via 10 meters

WANs

  • WAN can connect networks, transmitting data through multiple lines like phone/fiber/satellite cables, used by businesses and universities to share data

IP address

  • Each internet computer has unique IP (internet protocol) addresses, 32-bit and comprised of four number sets of three each and with periods
  • The IP address is either static or dynamic

Benefits of establishing a network

  • Hundreds of computers can use devices
  • People can continuously share data and easily communicate
  • Internet can be accessed
  • Streaming media can be downloaded
  • Software can be delivered

Network Security

Hacking

  • Hacking is unauthorized access of your computer or files
  • Protection comes through username and password, restrict file access to authorized users only, firewalls

spam

  • Spam and unsolicited emails cause problems and are a virus threat
  • Prevention comes through a spam filter and virus detection software

Phishing

  • A phishing attack attempts to steal information like login details
  • One method of protection utilizes spelling and grammar checks look for correct bank information
  • Report all suspicious emails by breaking/repairing the connection and contacting the email sender, if no reply is received it is probably fraudulent

Pharming

  • Pharming collects personal data by connecting fake sites to antivirus programs to detect

Adware

  • To protect against adverts and pop ups, block pop-ups, use ad block programs like SpyBot Search and Destroy

Access to inappropriate information

  • The access of children to illegal content is controlled by settings such as CYBERsitter, notify a breach with emails, record URLs, and control various settings

Cookies

  • A cookie manager blocks cookies to control data settings

Requirements for Connecting

Wireless devices

  • Modems provide connection of systems through telephone lines
  • Routers wirelessly connect systems through wireless access-points
  • Gateways connect two operating systems

Software

Web browsers

  • Browsers show computer information though internet
  • Different browsers, such as Microsoft Internet Explorer and Mozilla Firefox, achieve the same main point which is allowing users to access web based information

Email client

  • Used over the internet to deliver emails, and allow digital communication

Type of Connection

Broadband

  • Common with telephone wires, data is spread though fiber optic or coaxial lines and connect through ADSL
  • Broadband connects through high radio communication

Dial Up

  • Telephone lines connect users to different internet connection channels

WiFi

  • The internet can use radio waves as connectors

VPN

  • Virtual private networks protect network through encoded protocols and internet access

Features of Common Internet Services

Services

  • The Internet is provided through service providers or ISP, that distribute the internet to different users

Uses

  • View data
  • Search engines like Google
  • Email
  • Online shopping
  • Banking
  • Customer and program maintenance

Access

  • Download programs. printer programs
  • Discuss bulletin information and view discussion threads
  • Join chat lines
  • Join conferences
Intranets
  • LANs are like copies of the internet within an office
  • Many groups use the web's function to publish notices or adverts among employees
  • Intranets centralize organizational procedures and data

Impacts of ICT

Negative Effects

  • Some jobs have been lost due to computers
  • Factories use robots, reducing human labor
  • Workers cannot work as fast as robots
  • Automation replaces many factory jobs
  • The company saves money because robots do not need compensation

Secretarial Work

  • Employee production on paper has decreased due to employees writing their private documents on computers

Accounting

  • Calculations are made much faster

Newspaper Printing

  • DTP software quickly writes newspapers
  • The internet has caused security breaches and crimes
  • Software being downloaded for free that cost money
  • Illegal media downloaded or accessed on illegal websites and from illegal parties
  • Personal Data may include
  1. Collection Notification
  2. Data is kept private
  3. Must be secure
  • Personal data must have ways to protect your information
  • Internet uploaders in countries must be careful what is downloaded

Safety

  • Ergonomics are meant to lessen issues when using computers
  • Keyboards should support the hands when in a proper place
  • Look at the user

Intense Computer use is associated with:

  • Constant strain/tendons
  • Redness or trouble with vision
  • Bad or incorrect posture leading to pain
  • Fatigue
  • Electric shock
  • Cables

Computer Crime

Software Piracy

  • Software is made at a copyright so no one hacks or takes free usage
  • Illegally media

Hacking

  • Users cannot access data unless with permission

Identity Theft

  • Spy-ware is used without other's knowledge

Phishing

  • Identity taken by various details

Physical Security

  • Rooms guarded by doors prevent un-accesses and also keep hardware from being damaged such as CCTV to deter thieves and a second safe to protect back-up files, secure hardware from damage thieves, and make contingency plans, so systems carry on

Software Security

  • Use passwords, block level passes, or firewall, the network can be restored
  • Data must be scrambled, and wireless network

Personal Responsibility

  • Be cautious of all data or access by cyber users
  • Cyberbullying or sharing is prohibited

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

ICT Components Quiz
14 questions

ICT Components Quiz

VigilantEuropium avatar
VigilantEuropium
ICT System Types and Software Overview
40 questions

ICT System Types and Software Overview

HighSpiritedJubilation7883 avatar
HighSpiritedJubilation7883
Understanding ICT Systems
40 questions

Understanding ICT Systems

HearteningJudgment9907 avatar
HearteningJudgment9907
Use Quizgecko on...
Browser
Browser