Document Details

IntriguingConcertina

Uploaded by IntriguingConcertina

Ankara Yıldırım Beyazıt University

Tags

ict notes computer science technology education

Summary

This document is a set of notes on ICT. It covers various topics within ICT, including input and output devices, networks, and cloud computing.

Full Transcript

ICT Notes Input and Output Devices​ 2 Input Devices:​ 2 Networks​ 2 Cloud C...

ICT Notes Input and Output Devices​ 2 Input Devices:​ 2 Networks​ 2 Cloud Computing​ 3 Bluetooth & Wi-Fi​ 5 Anti-Malware and Antivirus Software​ 6 Electronic Conferencing​ 7 Microprocessors​ 7 Communication Media​ 8 Online/ICT Safety​ 9 Physical Health Problems:​ 9 Mental Health Problems:​ 10 Lifestyle Issues:​ 10 Preventative Measures:​ 10 Social Problems Associated with Prolonged Exposure to Social Media and the Internet​ 11 Computer-Controlled Systems​ 11 School Management Systems​ 13 Banking Systems and Applications​ 14 Information Systems in Medicine​ 15 Expert System​ 15 ​ Input and Output devices ​ The effects of using ICT - Including Online Safety (Little for the including online safety) ​ Booking and banking systems ​ Computers in medicine ​ Communication ​ Computer Controlled Systems ​ Electronic conferencing ​ Networks ​ Bluetooth and Wi-Fi ​ Cloud systems ​ Microprocessors Input and Output Devices Input Devices 1.​ Scanners: ○​ 2D Scanners: ​ Commonly used to digitize documents and images. ​ Can save files in formats like JPEG or use OCR (Optical Character Recognition) software to convert scanned text into editable files. ○​ 3D Scanners: ​ Capture three-dimensional objects using x, y, and z coordinates. ​ Utilize technologies like lasers, magnetic resonance, and white light to create digital 3D models. 2.​ QR Codes: ○​ Matrix-based codes that store up to 7,000 digits, compared to 30 digits in traditional barcodes. ○​ Scannable with smartphones, used for linking to websites or advertising without manual data entry. 3.​ Digital Cameras: ○​ Controlled by microprocessors for automatic tasks like adjusting shutter speed, focus, aperture, and reducing red-eye. ○​ Images are saved digitally for easy sharing or editing. 4.​ Keyboards: ○​ The most common input device for data entry, converting keystrokes into ASCII values. ○​ Connected via USB, wireless, or virtual touchscreens (as in tablets and smartphones). 5.​ Pointing Devices: ○​ Mouse: Optical (LED-based) or mechanical, connected via USB or wireless. Used for precise cursor movement and icon selection. ○​ Trackerball: Stationary alternative to a mouse, controlled by moving a ball, suitable for limited desk space or specialized tasks. 6.​ Microphones: ○​ Input sound into a computer for various purposes: ​ Voiceovers for presentations. ​ Voice and speech recognition systems. ​ Enabling communication for disabled users. 7.​ Touchscreens: ○​ Commonly used in mobile devices and tablets, combining input and display functions. ○​ Capacitive: Durable, responsive, supports multi-touch, but works only with fingers or special styluses. ○​ Infra-red: Allows input via fingers, gloves, or styluses, with good durability but higher cost. ○​ Resistive: Inexpensive, works with various inputs, but less durable and lacks multi-touch capability. Output Devices 1.​ Printers: ○​ Inkjet Printers: ​ Use thermal bubble or piezoelectric methods to deposit ink. ​ Ideal for small-scale printing but slower and prone to smudging. ○​ Laser Printers: ​ Use static electricity and dry toner for faster, high-volume printing. ​ Suitable for offices but larger and more expensive than inkjets. ○​ 3D Printers: ​ Use additive manufacturing to build objects layer by layer. ​ Materials include resin, metal, or ceramic powders. Used in industries, hospitals, and for prototyping. 2.​ Light Projectors: ○​ DLP Projectors: High-quality and used for large-scale applications like cinemas. ○​ LCD Projectors: Affordable but lower image quality, used in classrooms and meetings. 3.​ Monitors: ○​ CRT Monitors: Bulky and outdated. ○​ LCD Monitors: Lightweight, energy-efficient, and widely used. ○​ LED Monitors: Advanced LCD technology using LED backlighting. ○​ OLED Monitors: Latest innovation, offering thin, lightweight, and flexible displays. 4.​ Speakers: Amplify sound for communication, entertainment, or presentations. Sensors and Robotics 1.​ Sensors: ○​ Pressure Sensors: Measure pressure changes (e.g., air in tires). ○​ Infrared Sensors: Detect movement and are often paired with pressure sensors for security systems. ○​ Security systems: Sensors compare current data to stored values, triggering alarms if discrepancies occur. 2.​ Robotics: ○​ Robots must be capable of moving, sensing, and planning actions: ​ Movement: Controlled by actuators for precision. ​ Sensing: Uses sensors to detect obstacles and interact with objects. ​ Planning and Acting: Decisions based on sensor input processed by an onboard processor. Comparisons and Features 1.​ Printer Comparison: ○​ Monochrome laser printers are more cost-effective and faster than color laser printers, which require additional cartridges and mixing. ○​ Color printers are larger and heavier but produce vibrant outputs. 2.​ Touchscreen Technologies: ○​ Capacitive screens are durable and responsive but limited to finger input. ○​ Infra-red screens allow multiple input types but are expensive. ○​ Resistive screens are cost-effective but less durable and lack multi-touch support. Networks Computer Networks: ​ Definition: Two or more devices connected to exchange data. ​ Types of networks (LAN, WAN, WLAN). ​ Components like routers, switches, hubs, and bridges. ​ Advantages (e.g., sharing resources, centralized data) and disadvantages (e.g., risk of hacking, equipment cost). Network Devices: ​ Router: Connects networks, directs data packets. ​ Switch and Hub: Facilitates connections in a LAN. ​ Modem: Converts analogue signals to digital. ​ Network Interface Card (NIC) and bridges. Wireless Technologies: ​ Wi-Fi: Enables wireless network access with portability but can be less secure and slower. ​ Bluetooth: Short-range connections for small data transfers. Internet and Intranet: ​ Internet: Public and global, with extensive but less curated content. ​ Intranet: Private, organization-specific, and more secure. Network Environments: ​ LAN: Small, localized networks. ​ WAN: Wider geographic coverage. ​ WLAN: Wireless variation of LAN. Network Setup and ISP: ​ Steps for configuring networks. ​ Role of ISPs in providing internet access and additional services. Access Devices: ​ Comparison of desktops, laptops, tablets, and smartphones for network access. Cloud Computing 25.11.2024 ​ Allows u to pay for what you use - not in in-premise ○​ Cost incentive ​ Cloud storage solutions by company ​ More security for cloud ​ Data recovery established ​ Third-party companies do maintenance for businesses ​ Cloud computing is the delivery of services through the internet ​ Better data security ​ Easy to scale up and down in the business framework ​ Access it from anywhere if possible. ​ Deployment model: ○​ Public cloud ​ Third-party organisations are built for everyone ○​ Private cloud ​ Operated by a single organisation ○​ Hybrid cloud ​ Dynamic option ​ Different models: ○​ IaaS ○​ PaaS ○​ SaaS ​ Handles all components of the organisation ​ Cloud computing services ○​ Amazon ○​ Azure ○​ Google Disadvantages: ​ No longer in control ​ You may not get all the features ​ There is no redundancy (repetition) and inconsistency in backing up ​ Bandwidth issues ​ Security risks ○​ Cybersecurity attacks ​ 4.88 million average cost of data breach ​ 88% breaches by human error- increase to 99 in 2025 according to a study by Gartner (Security software conference) ​ 194 days to identify breach/ 292 to contain (Varonis- deals with cyber security software) ​ 41-58% of small businesses experience a cyber threat (UK Gov) ​ Downtime can threaten businesses: their revenues, and customers and cause data failure ○​ 2020- Google downtime for 1 hour ○​ 2024- Microsoft- by Crowd Strike update ​ Vendor lock-in ○​ Compatibility issues with different platforms ​ Cost ○​ Hidden costs and mismanagement of resources can lead to unnecessary spending. ​ ​ Performance issues ○​ Impact performance and productivity such as internet issues ○​ Especially in areas that lack efficient network connections- discouraging entrepreneurial growth in lower-income nations Bluetooth & Wi-Fi Bluetooth vs Wi-Fi Differences and Applications: ​ Bluetooth: ○​ Best for low-bandwidth applications and short-range connections (5–30 meters). ○​ Commonly used with mobile phones, keyboards, mice, and other small devices. ○​ Transfers data at lower speeds (800 Kbps) and uses less power. ○​ Simple to use and connect up to seven devices. ​ Wi-Fi: ○​ Designed for full-scale networks with a higher bandwidth (up to 600 Mbps). ○​ Offers a greater range (up to 95 meters indoors and more with advanced technology). ○​ Requires wireless routers and adaptors, with higher power consumption. ○​ More complex setup but provides better security and speed. Key Comparisons: ​ Frequency: ○​ Bluetooth (2.4 GHz) vs. Wi-Fi (2.4, 3.6, 5 GHz). ​ Cost: ○​ Bluetooth is cheaper. ​ Power: ○​ Bluetooth consumes less power, while Wi-Fi uses more. ​ Security: ○​ Wi-Fi offers better security when configured properly. ​ Ease of Use: ○​ Bluetooth is simpler, while Wi-Fi requires configuration. ​ Latency: ○​ Bluetooth has higher latency (200 ms) compared to Wi-Fi (150 ms). How they works: ​ Wi-Fi ○​ Your device sends a request (e.g., to load a webpage) to the router. ○​ The router forwards it to the modem, which connects to the internet. ○​ The response (data) is sent back to your device. ​ Bluetooth ○​ Bluetooth uses low-power radio waves (2.4 GHz) to create a wireless connection. ○​ Devices must be within a short range of each other (5–30 meters) to connect. ○​ The two devices pair by exchanging security keys to establish a secure connection. ○​ Once paired, data like audio, files, or commands is transferred between the devices. ○​ Bluetooth is designed for low-bandwidth applications, with speeds up to 2.1 Mbps. ○​ It consumes very little power, making it suitable for small, battery-operated devices. ○​ A single Bluetooth connection can support up to 7 devices at the same time. ○​ Common uses include connecting headphones, keyboards, mice, and transferring small files. Anti-Malware and Antivirus Software 27.11.2024 ​ Virus and malware differences ○​ Malware is a program that downloads itself and can be used for malicious reasons ○​ A virus can do the same as malware but can replicate itself ​ Virus software can find viruses by checking file identifications ​ Anti-malware- do the same things as virus software and have things running in the background: ○​ New Malware is developed quickly and thus anti-malware updates regularly ​ You should have both anti-malware and antivirus software on your computer ​ Antivirus software: ○​ Scan your files, dig through all your files and compile data about those files ○​ Detect files by comparing codes in your files to its database of known viruses and any malicious files will be flagged. ○​ Remove viruses by rechecking flagged files; if it is confirmed that it is a virus, then it is deleted. ​ How Anti-Malware software detects and handles malware files: ○​ Signature-based Detection ○​ Heuristic Analysis ○​ Sandboxing ○​ Cloud-based Lookups ○​ Real-time Protection ○​ Rootkit Detection and Automated Updates Electronic Conferencing 28.11.2024 ​ Conferencing calls connect the world ​ Video conferencing is more expensive but people see body language and other visual elements. ​ Audio conferencing is cheaper and is utilised in the business worl.d Microprocessors 4.12.2024 ​ Microprocessors are compact, integrated circuits that serve as a computer's central processing unit (CPU) or other electronic device. It is responsible for executing instructions and processing data. ​ Task 1: List of home devices that use microprocessors ○​ Laptop ○​ Airfryer ○​ Washing Machine ○​ Television ○​ Internet Router ○​ Vacuum ○​ Electronic toothbrush ○​ Heating System ○​ Smoke Alarm ○​ Wireless Mouse ​ How would the highlighted devices perform without the microprocessor? ○​ Many vacuums in 2024 will use microprocessors to allow for increased energy efficiency and offer multiple cleaning modes. But with microprocessors, we would save time vacuuming and sometimes they could be more efficient as the device wastes more energy trying to clean certain surfaces. ○​ Heating systems would require manual extension to use and it would make it harder for… Communication Media Media Advantages Disadvantages Flyers/Brochures/ ​ They can be used to advertise a company ​ People tend to throw them Newsletters or a product to a certain group of people. away if they aren’t ​ Contains in-depth information about the interesting enough company and product. ​ They need to purchase paper and other consumables and they have less coverage compared to other media like websites. Posters ​ They are eye-catching and usually very ​ The cost of the display as hard to miss especially if they are placed the advertising areas can in a strategic position to target certain only be rented. demographics. ​ The posters are subject to weather conditions leading to a limited life. Multimedia ​ It is more eye-catching due to the use of ​ The multimedia presentation sound, animation and video effects. This is susceptible to equipment makes the presentation easier to failure which could lead to understand. disaster. ​ Facts are displayed in a key or ​ It is expensive since you chronological order through the use of might have to purchase transition effects. special equipment ​ Hyperlinks and other interactive elements ​ Often the focus gets shifted make it possible to access a company’s to multimedia presentation website or key files stored on the cloud. rather than the message. ​ The presentation can be made very ​ Too many animation effects flexible and tailored to suit a particular or too much text or images audience. could result in not passing the intended message to the audience. ​ Internet access may be needed wherever the presentation has any external links in it. Paper-based ​ The recipient can read the hard copy of ​ There are printing costs of presentation the presentation any time they want. paper, ink and other ​ They have access to a permanent copy to consumables. refer back to. ​ Someone has to physically ​ It is a big advantage for disabled people distribute the hard copies of as they don’t have to go to the venue to the presentation and this see the presentation. could be time-consuming ​ Blind people can be provided with a and troublesome if it is a printout of it in Braille. large crowd. ​ It is very bland with no special effects like sound, video or animation. How do mobile phones work? Advantages of a mobile phone over a landline. Mobile phones work through the transmission of data through mobile phone networks which happen by making use of towers inside many cells which are networked together to cover large areas. Phones connect to the closest tower and when you move, the connection is transmitted to the next tower. There are many advantages of a mobile phone over a landline such as being able to conduct calls whilst on the move or being able to connect with co-workers, family, and friends no matter where you are. In case of any emergency, there is no need to have an operational public telephone nearby, unlike on a landline. Moreover, with a mobile phone, you can message a person even if their phone is off. Text messages are less expensive and are quicker than making phone calls. Online/ICT Safety 9.12.2024 EXAM ​QUESTION When using computers, people suffer from Repetitive Strain Injury (RSI) 1.​ Describe the term RSI. Include in your answer the causes of RSI. (3) a.​ Repetitive Strain Injury is the performance of monotonous action -such as typing or clicking a mouse-which can cause pain, aches, and numbness in certain muscles. RSI is caused by many factors such as poor posture, lifestyle issues (such as lack of breaks between work sessions etc.) and the excessive use of certain muscles, to name the least. 2.​ Identify three methods of reducing the effects of RSI. (3) a.​ Take regular breaks to allow muscles to recover b.​ Maintain good posture by sitting upright with back support etc. c.​ Minimise repetitive movements by alternating tasks Physical Health Problems: ​ Repetitive Strain Injuries (RSI): ○​ Caused by repeated actions like typing or using a mouse, leading to conditions such as carpal tunnel syndrome. ​ Back and Neck Problems: ○​ Poor posture during prolonged computer use can result in pain and discomfort. ​ Eye Strain: ○​ Extended screen time can cause Computer Vision Syndrome (CVS), leading to headaches, dry eyes, and difficulty focusing. Mental Health Problems: ​ Stress and Anxiety: ○​ Deadlines, technical issues, and digital overload can increase stress and anxiety levels. ​ Addiction: ○​ Overuse of the internet or gaming can negatively impact personal, family, and academic life. Lifestyle Issues: ​ Sedentary Lifestyle: ○​ Long periods of inactivity can contribute to weight gain and heart disease. ​ Sleep Disorders: ○​ Exposure to screen light before bedtime disrupts circadian rhythm, causing sleep issues. Preventative Measures: ​ Ergonomics: ○​ Adjust workstations to reduce physical strain (e.g., supportive chairs, screens at eye level). ​ Regular Breaks: ○​ Stretch, rest eyes, and change posture frequently. ​ Screen Filters: ○​ Use filters to minimize glare and harsh light from devices. ​ Stress Management: ○​ Balance work and relaxation with mindfulness or meditation. ​ Healthy Lifestyle: ○​ Maintain a balanced diet and include regular physical activity in daily routines. Social Problems Associated with Prolonged Exposure to Social Media and the Internet ​ Mental Health Issues: ○​ Anxiety, depression, and low self-esteem from online comparisons. ○​ Cyberbullying and online harassment. ○​ Addiction leading to neglect of real-life responsibilities. ​ Social Isolation: ○​ Reduced in-person interactions and weakened social bonds. ○​ Poor development of social skills and emotional intelligence. ​ Distorted Self-Image: ○​ Unrealistic beauty standards causing body dissatisfaction. ○​ Dependence on likes and validation for self-worth. ​ Echo Chambers and Polarization: ○​ Exposure to one-sided views fosters intolerance and extreme opinions. ○​ Increased political and social polarization. ​ Reduced Productivity: ○​ Distractions from notifications and social media scrolling. ○​ Procrastination and loss of focus. ​ Privacy Concerns: ○​ Risks of stalking, identity theft, and misuse of personal data. ○​ Oversharing content that impacts future opportunities. ​ Physical Health Issues: ○​ Sedentary behaviour leading to obesity and other health problems. ○​ Eye strain and sleep disturbances from excessive screen time. ​ Impact on Relationships: ○​ Lower quality face-to-face communication. ○​ Conflicts from overuse of devices or online jealousy. ​ Misinformation and Fake News: ○​ Spread of false information, causing societal harm and mistrust. ○​ Development of warped world-views from unverified content. ​ Cultural and Generational Gaps: ○​ Disconnect between generations due to differing online habits. ○​ Diminished appreciation for traditional values. Computer-Controlled Systems 11.12.2024 ​ Advantages of Computer Control: ○​ Respond quicker than humans ○​ Easily replaced ○​ The computer does the work ○​ Revolutionised manufacturing ​ Disadvantages of Computer Control: ○​ Initial set-up costs are high for the computers ○​ Computers are replacing humans- job losses ○​ Susceptible to human error ○​ Misuse of technology (for military war, etc.) ○​ Power Consumption is high ​ Robots are computerised systems with a motorised construction capable of interacting with the environment. It can contain sensors, which provide feedback data on the robot’s current situation, and a system to process this information so that the next action can be determined. ○​ E.X, Automatic Teller Machine (ATM), Bomb disposable ​ ‘Robots’ have existed within society for centuries. ​ Computer Numerical Control (CNC) was first developed in 1958 and is used in industry. ​ A negative Feedback Loop is used for simple processes. ​ Sophisticated controllers are needed for more complex processes that are impacted by external factors (friction, gravity etc.) ​ PID Controllers ○​ Uses ​ Advanced robots require many control loops. ​ Emergence of Androids and other robotic technologies like self-driving cars ○​ Still needs a lot of development ○​ Weapons being developed for military purposes using computerised systems The future of robots? ‘Robot’ is a vague word, and it compasses different agents which include androids, which are more complex and humanoid computer systems, and limited computer-controlled systems. But I would like to focus on androids specifically because they are spectacular but are also so advanced that it has made us, humans, ponder how dangerous those androids can become. Samsung has developed computerised systems for military purposes, such as sentry weapons and more. This military technology can be developed into something more lethal and humanoid since a lack of regulation can encourage corporations, governments and individuals to pursue such goals. Moreover, since most of the world has become digitalised it can become a weak point since computerised systems can gain control… School Management Systems 13.12.2024 What data do school management systems hold? School management systems (SMS) hold various data regarding students and staff. For example, they can collect data from students’ previous school reports; their nationality; their joining date; what their parents’ jobs are, etc. These systems also hold sensitive data such as payment information (for parents) and payroll information (for staff). They also have data that help manage the different facilities in the school. What common characteristics do booking systems have? ​ Search ​ Filtering ​ Bilingual features ​ Multi-currency ​ Dates ​ Offers ​ Availability ​ Client information ​ Cancellation ​ Sorting Data Banking Systems and Applications 16.12.2024 ​ Banking systems encompass a range of financial institutions and technologies that facilitate the management of money, provision of credit, and execution of financial transactions. ​ Automated Teller Machines (ATMs):​ ○​ Perform banking activities such as cash withdrawals, balance inquiries, and fund transfers. ○​ Process involves card insertion, PIN verification, and service selection. ○​ Disadvantages: ​ Security risks like theft and fraudulent machines. ​ Possible usage fees from some banks. ​ Internet Banking:​ ○​ Manage bank accounts online, including fund transfers, bill payments, and statement requests. ○​ Advantages: ​ 24/7 accessibility. ​ Convenience for individuals with mobility challenges. ​ Reduces the need for physical travel. ○​ Disadvantages: ​ Vulnerable to internet-related risks like fraud and data breaches. ​ Advantages of Online Banking and Shopping:​ ○​ Eliminates the need for physical travel, saving time and costs. ○​ 24/7 access to services for convenience. ○​ Broader selection of goods and services globally. ○​ Reduces physical queues, enhancing efficiency. ​ Disadvantages of Online Banking and Shopping:​ ○​ Susceptible to fraud, hacking, and other internet-related risks. ​ Information Systems in Medicine ​ What might be able to 3D print to aid medicine? ○​ Model simulation for surgeries ○​ More efficient creation of surgical tools into the market ○​ Create tissues and organs using biocompatible materials. ​ And other implants such as crowns. ○​ Used to create prosthetics ○​ Personalised medication for patients so they don’t have to through drug trials Expert System ​ A form of AI that are providing with knowledge to solve problems. ​ There are multiple benefits to using Expert Systems: ○​ High level of experience ○​ High accuracy ○​ Consistent results ○​ Ability to store vast amount of facts ○​ Multiple expertise in 1 system ○​ Fast response times ○​ Unbiased reporting ​ There are also some disadvantages: ○​ Users need to be trained ○​ Set up and maintenance are expensive ○​ They give cold responses ○​ Only as good as information entered ○​ Users might make dangerous assumptions ​ Components of an Expert System ○​ UI (User Interface) ○​ Inference engine - where decisions are made ○​ Knowledge base-where data is stored ○​ Rules base - where rules are stored ​ Expert systems are computer programs that utilise Artificial Intelligence and are used to mimic the expertise and knowledge of an expert in a particular field. Expert systems are implemented in many sectors, such as medicine, to diagnose a person’s illness. They have components that support its function: a knowledge base (which holds the data), an inference engine (which pulls relevant information from the knowledge base), and a user interface that interacts with the user to give answers to the questions or problems.

Use Quizgecko on...
Browser
Browser