Podcast
Questions and Answers
Which of the following is a key advantage of using ICT systems in business operations?
Which of the following is a key advantage of using ICT systems in business operations?
- Reduced ability to handle vast amounts of information
- Increased costs and delays related to manual inventions
- Improved productivity and reduced costs (correct)
- Decreased productivity due to system complexities
A Netbook is intended to be a very small desktop that is optimized for Internet and email access, with a long battery life.
A Netbook is intended to be a very small desktop that is optimized for Internet and email access, with a long battery life.
False (B)
Which input device uses a stylus on a flat surface to create drawings in the computer?
Which input device uses a stylus on a flat surface to create drawings in the computer?
- Graphics Tablet (correct)
- Scanner
- Touch Screen
- Trackerball
A ______ is a type of digital video camera where the image captured is viewed using a computer and the internet.
A ______ is a type of digital video camera where the image captured is viewed using a computer and the internet.
Match the memory type with its correct description.
Match the memory type with its correct description.
Which of the following storage devices uses layers and is commonly used for distributing HD material such as movies?
Which of the following storage devices uses layers and is commonly used for distributing HD material such as movies?
Which network type is most commonly used to connect devices within a small geographical area, such as an office or home?
Which network type is most commonly used to connect devices within a small geographical area, such as an office or home?
A 'firewall' is a hardware or software system designed to prevent unauthorized access to a computer system or network.
A 'firewall' is a hardware or software system designed to prevent unauthorized access to a computer system or network.
What is the security benefit of encrypting data?
What is the security benefit of encrypting data?
A ______ is a type of program that disguises or hides its true intentions and causes damage or disruption to a computer system.
A ______ is a type of program that disguises or hides its true intentions and causes damage or disruption to a computer system.
Which activity is considered software piracy?
Which activity is considered software piracy?
What is the primary goal of 'phishing'?
What is the primary goal of 'phishing'?
Ergonomics mainly deals with reducing injury by properly designing and arranging the computer seating and system.
Ergonomics mainly deals with reducing injury by properly designing and arranging the computer seating and system.
Aside from using strong passwords what is another recommendation to protect your online personal data?
Aside from using strong passwords what is another recommendation to protect your online personal data?
Easy ways ways are found to pay the employees in a company using ______ or computer aided design are used in designing for ______.
Easy ways ways are found to pay the employees in a company using ______ or computer aided design are used in designing for ______.
Flashcards
Desktop PC
Desktop PC
A PC with basic components like a monitor, keyboard, system unit and mouse.
Laptop
Laptop
A portable computer, larger and heavier than a notebook.
Notebook
Notebook
A small, light laptop, about the size of an oversized book.
Netbook
Netbook
Signup and view all the flashcards
Handheld Computer (PDA)
Handheld Computer (PDA)
Signup and view all the flashcards
Smartphone
Smartphone
Signup and view all the flashcards
Mainframe Computer
Mainframe Computer
Signup and view all the flashcards
Supercomputer
Supercomputer
Signup and view all the flashcards
Embedded Computer
Embedded Computer
Signup and view all the flashcards
Joystick
Joystick
Signup and view all the flashcards
Graphics tablet
Graphics tablet
Signup and view all the flashcards
Scanner
Scanner
Signup and view all the flashcards
Digital Camera
Digital Camera
Signup and view all the flashcards
Webcam
Webcam
Signup and view all the flashcards
Microphone
Microphone
Signup and view all the flashcards
Study Notes
Types of ICT Systems
- Desktop PCs typically include a monitor, keyboard, system unit, and mouse
- Laptops are slightly larger and heavier than A4 paper
- Notebooks are smaller, lighter laptops, about the size of an oversized book
- Netbook computers are very small laptops optimized for Internet and email with long battery life and are easy to carry.
- Handheld computers like PDAs (Personal Digital Assistants) or palmtops fit in one hand and have touch screens; though keyboards can be attached to them, typing a long document is difficult
- Smartphones combine mobile phones with PDA functions, including personal record-keeping and satellite navigation
- Mainframe computers are large, expensive, and can support hundreds or thousands of simultaneous users
- Supercomputers are the fastest computers used for specialized applications requiring immense calculations, such as weather forecasting, animated graphics or petroleum exploration
- Embedded computers are designed for specific tasks within a device and may be very small, like those built into a single microchip
- Game consoles are PCs designed specifically for playing games
Importance of ICT Systems
- ICT systems increase productivity by enabling more tasks to be completed in less time, at a reduced cost compared to pre-computer methods
- ICT facilitates managing and processing vast amounts of data quickly
- ICT enables rapid transmission and reception of information
Input Devices
Keyboard
- The keyboard is a commonly used input method.
- Numeric keyboards have keys mainly for numbers, A QWERTY keyboard may optionally have a built-in numeric keypad
- Keyboards are widely used in workplaces and are almost always available as an input device
- Many people are familiar with QWERTY keyboards
- Efficient keyboard use requires knowledge of the layout and touch-typing skills
Mouse
- The mouse is commonly used as a pointing device
- Some types use a ball to detect movement, while optical mice use light
Tracker Ball
- The tracker ball is an upside-down mouse, operated with your thumb
Joystick
- The joystick is a lever providing similar control to a mouse with a slightly different behavior
- Joysticks can be stand-alone or built into gamepads
Graphics tablet
- Graphics tablets are rectangular pads that come in different sizes
- They work with a stylus for drawing on a computer
- Some styluses, like pucks, come with cross-hairs for tracing lines
- Styluses can be pen-shaped
- Graphics tablets are used for computer-aided design and drawing
Scanner
- Scanners can read printed data into a computer
- A handheld scanner reads images when dragged over them
- Flatbed scanners capture the image of a document placed on their surface
- Sheet-fed scanners pull the image through rollers
- Scanners quickly convert printed images to electronic form
- The data input accuracy is hard to verify
Digital camera
- Digital cameras store pictures on memory cards
- Pictures can be transferred to computers for editing or viewing
- They can also be viewed on TVs equipped with memory card readers
- Pictures are composed of small dots; higher dot density yields better quality
- Eight mega-pixel cameras produce higher quality output than two mega-pixel cameras
- Digital video cameras (camcorders) record moving images, saving them on memory cards, DVDs, miniDV tapes, or built-in hard disks
Webcam
- Webcams display captured images on a computer screen
- The computer connects to the webcam over the web
- The webcam can provide a live feed from a location
- Webcams can be used for virtual communication
- Webcams can be used in classroom settings for remote instruction
- Webcam photos and videos can be saved digitally enabling easier, more reliable and extensive backups
- Digital photos and videos can be displayed on various devices and sent via email
- Digital video can also be broadcast over the Internet for on-demand access
- Webcams can create needs for more storage because users tend to have more photos and longer videos
- High-quality photos and videos are very large files using up more bandwidth and slowing down the network when emailing/broadcasting over the Internet
Microphone
- The microphone is used for recording sound, voice commands, and communication over the internet
Touch screen
- The touch screen functions as both an input and output device, with tablet PCs, PDAs and smart phones widely utilizing them
- Users can interact by touching on-screen words/images
Optical Mark Recognition (OMR)
- OMR technology is utilized to interpret pencil marks on paper using a special reader that recognizes the position of the mark
- The OMR requires no typing
- OMR data input avoids typing, making it faster and less expensive
- The person filling in the form is responsible for accuracy
- OMR forms must be printed accurately, therefore printing costs can be more expensive
- Verification checks are unlikely, increasing chances of undetectable errors
Optical Character Recognition (OCR)
- OCR is the computer identification of printed or written text
- OCR scanners input printed text to computers where it is recognized and stored as word-processable text
- OCR software often comes bundled with scanners for handwriting readability
- Text printed on paper can be converted to electronic form for easier editing
- OCR can be particularly useful for creating electronic versions of books before computers
Bar code scanner
- Bar code scanners read the pattern of bars representing a printed items code number
- A bar code scanner often uses a small laser beam to read the reflected light pattern.
- Bar code scanners are either hand-held or built into supermarket checkout counters
Biometric scanner
- A biometric scanner makes personal identifications based on unique physical characteristics via face, retinal, fingerprint, geometric, and voice recognition
- Biometric scanners are embedded in mobile phones, laptops, desktops, and smart cards
- They can control entry to premises and even replace car keys
- Using biometric scanners removes the need to memorize/carry personal identification
- Biometrics prevents theft and fraud by requiring personal presence
- Current biometric identification is not always accurate and may reject access for permitted users and allow unauthorized access
Magnetic Stripe Reader
- The magnetic stripe reader reads a magnetic stripe on a plastic card
- Magnetic stripe cards include bank/credit cards
- Some readers can write information back onto the stripe
- The stripes store permanent account numbers or values that could change like cash withdrawal limits
- Use of magnetic strips is a widely accepted form of identification due to its small size and portability
- Data is recorded in electronic form and can be directly input into a computer quickly and efficiently
- Electromagnetic radiation can affect the data on magnetic stripes
- Magnetic stripe data is easy to copy or delete, increasing the risk of theft and fraud
Chip and PIN
- Chip and PIN (personal identification number) cards use a microprocessor chip, similar to magnetic stripe cards
- The chips process and store information
- Special devices read/write information
- Bank/credit cards have started utilizing Chip and PIN technology
- The card can be used to withdraw cash
- PIN entry is encrypted to match known PIN to proceed
- This method is easily used for identification
- Because the chip stores electronic data it can be input into a computer directly
- Chip data is more secure than the magnetic stripe
- Chip data can be updated after transactions
- Electromagnetic radiation can affect data on chip cards
- Cards may still be copied/edited by determined criminals
Sensors
- Sensors input data into the computer about the environment
- Sensors have a variety of shapes, sizes, and uses
- Sensors are useful recording light intensity, pressure, and temperature
- Sensors require the use of an ADC (analogue-to-digital converter) which converts a low voltage sent from the sensors into readable digital signals
- Sensors can be placed in dangerous locations
- Sensor are able to continuously and reliably record data
- Sensors can record data humans can't sense, such as humidity
- The data is automatically recorded for computer processing
- Data is able to be collected remotely reducing the need for travel
- Sensors cannot interpret the data
- They can only detect a limited amount of different data
Processors
CPU
- A processor or microprocessor is built into a microchip containing memory and other components
Graphics card (aka video card or display card)
- The graphics card houses within the system unit, controls the signals going to the monitor screen
- Higher quality graphics produce clearer graphics
- Some computer games demand advanced display cards
Sound card
- A sound card controls all input and output of audio, converting analogue input from sources like the microphone/speakers into digital signals which are processed by the computer, multimedia applications etc.
Output Devices
Monitor
- Monitors, or visual display units (VDUs), vary widely in styles and quality, affecting factors like color, resolution, and clarity
- Although a monitor picture appears sharp, images comprise picture elements (pixels); viewed from a distance the picture would resemble jagged pixelation
- Monitors enables GUIs (graphical user interface)
- They are interactive and have intuitive on-screen use
- Screen size limits extent and detail of the image
- Screen displays can be difficult to read for people with impaired sight
Printer
- Impact printers strike the paper through an inked ribbon to make marks
- Non-impact printers do not strike the paper
- Inkjet printers spray dots of ink to form shapes, are quiet, create good quality outputs, create colored prints, and are popular for homes and small offices
- Laser printers use a laser to create patterns of ink on a drum which transfers the ink and adheres it to the paper through heat, creating high quality prints very quickly
- Laser printers are more expensive than inkjet printers and often print in color
- Thermal printers mark heat-sensitive paper using heated wires
- Thermal dye printers heat dyes into a gas for the highest quality color printing, though this is expensive and requires special paper
- Thermal wax printers use molten wax to create tiny dots that blend into tones
- Printers have buffers to store data and not disrupt the system while the computer prints
- Print jobs from networks are first put in queue on a server, and then sent to the printer, making the process of printing in that manner known as spooling
- Printers with smaller dots will have higher print quality measured in dots per inch (dpi)
- A4 printer paper is a common material used for different types of paper
- High volume printers use paper with perforations so outputted pages can be easily separated from the rest
- Other printers use carbon copy paper
Photo Printer
- Images can be printed from a digital camera by plugging a memory card into the printer itself, or by connecting the camera another way
- Some prints can be viewed without a computer
- Many people and organizations still use paper media for legacy formats
- Printing is slow and expensive
- Paper is bulky and deteriorates in storage
- Printed media may be harder to access, may only be accessed by small groups, may be difficult and more expensive
Multi-Function Printers
- Newer printers combine scanners and fax machines
- Using this set up gives the user effective photocopying and printing capabilities
- Multifunction devices take up less space and money than their alternatives
- Multi function printers more modern and more likely to be used than their replacements
- A lack of function in some regions of the device can render it entirely unavailable
- Only one person can use the multi function device at a time
Plotter
- A plotter prints lines on paper using different colored pens, and are frequently used for computer aided design.
- Flatbed plotters hold the paper while the pen moves
- Other plotters have the pen move while the paper progresses forward and backwards
- Electric wires may also be used to draw patterns on the paper
- Larger sheets are more expensive
- Plotters print very slowly
Data projector
- Data projectors create the image displayed on computer screens
- An audience is presented with the image on a larger screen
- Data projections are used for presentations in business settings or home entertainment
- Interactive whiteboards are panels used with data projections that have a touch sensing feature for interacting with what is being displayed
- Some interactive whiteboards utilize special technology while some utilize capacitive or resistive technology
Speakers
- Speakers output audio used in many settings
- Speakers enable speech synthesis
- Speakers lead to multimedia application usefulness
- Speaker output is intuitive with computer programs
- Those with hearing impairments may have a difficult time working with speakers
- Voice recognition systems can be difficult
Control Devices
- Computer applications use control devices or actuators that control other events
- Examples of control devices are valves, heaters, coolers, and motors
- Actuators can perform physical tasks and control systems
- Actuators can act as a hazard if their instructions are not known to the user
Configuring Systems
- High speed processors and large memories are required to run systems
- An office system requires office tools
- Video gaming systems require video cards and high quality sound cards
- Both categories require a high quality operating system
System Software
- An operating system controls hardware
- The OS's capabilities include I/O (input/output) control, error handling, resource allocation, file-handling, and providing a user interface
Applications Software
Office Productivity
- Office software increases productivity
- This includes desktop publishing, word processing, managing spreadsheets, and databases
Web Authoring
- Web authoring creates internet accessible web pages using software and HTML
- Adobe Dreamweaver gives more control
Image and sound editing
- Image and sound editing software gives users control in different media files
Presentation
- Presentation software allows the speaker to have an audience view the presentation on a monitor through text, notes, and graphs
Project Management
- Software can be used to complete different tasks and projects
Backing Storage
Data capacity terminology
- One kilobyte (KB) is equivalent to 1024 bytes
- One megabyte (MB) is equivalent to 1024 KB or 1,048,576 bytes
- One gigabyte (GB) is equivalent to 1024 MB
- One terabyte (TB) is equivalent to 1024 GB
Main Memory
- Memory stores programs
Main Memory
- Data or instructions must be placed into main memory
- Main memory is also known as primary storage
RAM
- RAM, random access memory, data in it can be accessed in any order, read/written to, is volatile; RAM clears upon turning off the computer
ROM
- ROM, or Read-only memory, has data that can be accessed in any order, but not changed
- ROM is intended for permanent data and is non-volatile as it doesn't clear when the computer is turned off
Types of ROM
- PROM or Programmable Read-Only Memory, contains no data after manufactured; third party company inserts data and locks it in
- EPROM, or Erasable Programmable Read-Only Memory, gets original data in the same PROM does, but if necessary, can be erased using a special light or electric charge
RAM vs. ROM
- RAM can be written to and read from
- ROM, or read only memory can only be read
- RAM holds program being run and data being processed, while ROM stores it
- RAM is volatile, it clears when the computer turns off; ROM is non, it retains data when powered off
- RAM microchips are supplied as a module plugged into the motherboard, while ROM is already installed
Storage Devices
Hard disks (HDD)
- These drives store and retrieve digital data using rotating magnetic disks or platters
- Data is stored in concentric tracks on each disk with corresponding tracks existing above and below, forming a cylinder
- Each surface has a read/write head that can traverse over the spinning disk
- The total storage capacity on a hard disk=readable sides x number of cylinders x sector per track x bytes per sector
- Redundant Array of Inexpensive Drives(RAID) carry copies on hard drives
- If one falls, data is recovered from others
- External Hard Disks are robust, small, lightweight, are easily carried around, and attach to a computer through an USB socket
Optical discs
- Compact discs use 700 MB of data and are 4/100 of an inch thick, read by laser
- The pattern of etched data is in a long spiral track covered by thin layers of acrylic and aluminum
- Digital Versatile discs(DVDs) can store 4.7 GB of data and dual versions are capable of 18 GB
- CD-R/DVD-R can have data written before becoming read only
- CD-RW/DVD-RW have up to only 1000 writes
- DVDs-RAM can be completely sealed and have 100000 writes and are used in computer camcorders with approximately 30 years of data lasting
- HD are used with DVD high res audio and video but found a rival and eventually ceased because of the rival format
- Blu-ray distributes HD as a dual sided DVD almost 10x as strong
Flash memory
- Flash memory is a type of EPROM, it can be quickly reset and rewritten while keeping the data when power off
- Commonly, the the basic input and output system (BIOS) will use flash memory
Magnetic tape
- Tape is mostly used for back-upped data with a large surface area by wrapping data on a reel
- Data has to be accessed though a serial connection leading to slow speeds
Networking
LANs
- LANs (local area networks) are collections of computers sharing peripherals, information, and communication locally, functioning independently or as network workstation
- LANs share files and software
- They are used to communicate
- Devices stream media
- Computers utilize all connected devices
- Buying single licenses are more efficient than single versions
- The user can share devices through Internet
- Setting up servers and connections causes expensive damage and data corruptions, and is vulnerable to viruses
- Client systems require specialized programs for each server
- Access is granted to network computers from the terminal or network
Types of LAN
- Client/server networks designate computers as servers, with other computers available as clients
- A file server handles files, while a print server handles printing, server software manages system services and security, and any computer granting to any type of network via, such as with a main frame network, known as a terminal
Peer-to-peer network
- Peer-to-peer networks allows users to exchange data across most computers, used mainly in small businesses
Cabled LAN
- In cabled LANs, attached cables transmit data over systems, all on a network interface
Wireless LAN
- Wireless LANs use access, interfaces, and routers to transmit data between systems
- Wireless access points use radio signals, encryption, and wireless cards, coaxial routers use the Internet to transmit data
Bluetooth
- Bluetooth is a wireless system used for computer, phone, or personal data sharing with 720 kbps via 10 meters
WANs
- WAN can connect networks, transmitting data through multiple lines like phone/fiber/satellite cables, used by businesses and universities to share data
IP address
- Each internet computer has unique IP (internet protocol) addresses, 32-bit and comprised of four number sets of three each and with periods
- The IP address is either static or dynamic
Benefits of establishing a network
- Hundreds of computers can use devices
- People can continuously share data and easily communicate
- Internet can be accessed
- Streaming media can be downloaded
- Software can be delivered
Network Security
Hacking
- Hacking is unauthorized access of your computer or files
- Protection comes through username and password, restrict file access to authorized users only, firewalls
spam
- Spam and unsolicited emails cause problems and are a virus threat
- Prevention comes through a spam filter and virus detection software
Phishing
- A phishing attack attempts to steal information like login details
- One method of protection utilizes spelling and grammar checks look for correct bank information
- Report all suspicious emails by breaking/repairing the connection and contacting the email sender, if no reply is received it is probably fraudulent
Pharming
- Pharming collects personal data by connecting fake sites to antivirus programs to detect
Adware
- To protect against adverts and pop ups, block pop-ups, use ad block programs like SpyBot Search and Destroy
Access to inappropriate information
- The access of children to illegal content is controlled by settings such as CYBERsitter, notify a breach with emails, record URLs, and control various settings
Cookies
- A cookie manager blocks cookies to control data settings
Requirements for Connecting
Wireless devices
- Modems provide connection of systems through telephone lines
- Routers wirelessly connect systems through wireless access-points
- Gateways connect two operating systems
Software
Web browsers
- Browsers show computer information though internet
- Different browsers, such as Microsoft Internet Explorer and Mozilla Firefox, achieve the same main point which is allowing users to access web based information
Email client
- Used over the internet to deliver emails, and allow digital communication
Type of Connection
Broadband
- Common with telephone wires, data is spread though fiber optic or coaxial lines and connect through ADSL
- Broadband connects through high radio communication
Dial Up
- Telephone lines connect users to different internet connection channels
WiFi
- The internet can use radio waves as connectors
VPN
- Virtual private networks protect network through encoded protocols and internet access
Features of Common Internet Services
Services
- The Internet is provided through service providers or ISP, that distribute the internet to different users
Uses
- View data
- Search engines like Google
- Online shopping
- Banking
- Customer and program maintenance
Access
- Download programs. printer programs
- Discuss bulletin information and view discussion threads
- Join chat lines
- Join conferences
Intranets
- LANs are like copies of the internet within an office
- Many groups use the web's function to publish notices or adverts among employees
- Intranets centralize organizational procedures and data
Impacts of ICT
Negative Effects
- Some jobs have been lost due to computers
- Factories use robots, reducing human labor
- Workers cannot work as fast as robots
- Automation replaces many factory jobs
- The company saves money because robots do not need compensation
Secretarial Work
- Employee production on paper has decreased due to employees writing their private documents on computers
Accounting
- Calculations are made much faster
Newspaper Printing
- DTP software quickly writes newspapers
Legal issues
- The internet has caused security breaches and crimes
- Software being downloaded for free that cost money
- Illegal media downloaded or accessed on illegal websites and from illegal parties
Legal Constraints
- Personal Data may include
- Collection Notification
- Data is kept private
- Must be secure
- Personal data must have ways to protect your information
- Internet uploaders in countries must be careful what is downloaded
Safety
- Ergonomics are meant to lessen issues when using computers
- Keyboards should support the hands when in a proper place
- Look at the user
Intense Computer use is associated with:
- Constant strain/tendons
- Redness or trouble with vision
- Bad or incorrect posture leading to pain
- Fatigue
- Electric shock
- Cables
Computer Crime
Software Piracy
- Software is made at a copyright so no one hacks or takes free usage
- Illegally media
Hacking
- Users cannot access data unless with permission
Identity Theft
- Spy-ware is used without other's knowledge
Phishing
- Identity taken by various details
Physical Security
- Rooms guarded by doors prevent un-accesses and also keep hardware from being damaged such as CCTV to deter thieves and a second safe to protect back-up files, secure hardware from damage thieves, and make contingency plans, so systems carry on
Software Security
- Use passwords, block level passes, or firewall, the network can be restored
- Data must be scrambled, and wireless network
Personal Responsibility
- Be cautious of all data or access by cyber users
- Cyberbullying or sharing is prohibited
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.