· web viewpay for appropriate eye and eyesight tests by an optician general working environment...

8
Data Capture Forms Online forms - Simple, easy to use forms where spelling can be checked as the user types in their data. Further advice and guidance can be given to the person filling in the form. Paper based forms -Also and simple to fill in, if spelling mistakes are made new forms have to be issued. Easily damaged and not very secure compared to online forms Coding Data- Once you have got the completed DCF. It needs to be Data Capture Methods – Data Capture is the method of collecting data from the outside world. E.g. entering data via a keyboard onto an application form is a method of data capture. The ideal of method data capture would be; Completely accurate, Cheap (to buy and run) Automatic (to keep wage costs low), Fast Control system sensors - Automatic systems are used in everyday life from monitoring the temperature in a room, water quality, light levels and pressure sensors. Data collected by sensors is analogue and is then converted to digital so the computer can read the data. Barcode readers - Simple, quick solution used commonly in shops. Items are given a series of black and white lines that represent a number. The number is a item number stored on a database. Using the barcode reader the computer systems is able to locate further product details such as price. Can scan quickly and read barcodes fro a distance. If damaged the must enter data by keyboard. Expensive to set up. Near Field Communication (NFC) - Used more in smartphones and the contactless payment cards. NFC is used to help make quick financial transactions. Creates radio links over a very short distance to another device. Radio Frequency Identification Device (RFID) - Is a small tag that is used to track items using radio signals, security for valuable items and can store data to identify items. Data from the device can be read from a distance. Used for stock control, used in libraries and season tickets. Data Security– Network Security - You should always back up your data on a regular basis. Keep a second copy of important files on a external hard drive, zip disk, USB flash solid state drive or magnetic tape and store it separately from your PC. Your data is much more valuable than your computer equipment - it’s priceless. You can protect your PC equipment with insurance, but this will not replace your data! Physical security means that the hardware of the network is protected from theft and kept safe. Fire protection- fire doors, smoke doors, fire proof safes etc. Alarms-rooms containing the server should be alarmed. Locks-all rooms with services inside and have limited recorded access to them. Visibility-avoid putting computers on ground flour and where they are visible to passers by Access security means that there is a limit to the amount of access a user has to the information held on the network. Authorisation levels, user names and passwords, Read/Write access Data security means that there are measures taken to prevent the loss of data held on the system. Use virus checkers to check information is not corrupted. Firewalls to prevent hackers from accessing data from the internet. Use biometric methods e.g. fingerprinting, retina scanning, face recognition. Encryption – is the process of coding files before they are sent over networks/internet to protect them from hackers. Also coding information on the pc so if the computer is stolen files cannot be read. Monitoring software monitors network usage for unusual activity e.g. entering lots of passwords to try and gain access, this would then lock them out of the network Transaction logs – they monitor usage and produce an audit trail e.g. a deleted file will have the date and time of deletion and which member of staff deleted it Archiving - Archiving is a backup that is taken in case the original is lost. Archives are the backups that are not needed in the immediate short term but maybe required for future reference. Instead of saving these files on computer it is better to save them on backing removable storage (as mentioned previously) and Legal, Social, Ethical & Environmental Issues Health & Safety The law states that an employer must: Provide tiltable screens Provide anti-glare screen filters Provide adjustable chairs Provide foot supports Make sure lighting is suitable Make sure workstations are not cramped Plan work at a computer so that there are frequent breaks Pay for appropriate eye and eyesight tests by an optician General working environment There should be no trailing wires Food and drink should not be placed near a machine Electrical sockets must not be overloaded There must be adequate space around the machines Heating and ventilation must be suitable Lighting must be suitable with no glare or reflections Benches must be strong enough to support the computers Possible dangers and solutions Back problems: Many computer users suffer serious back problems. This is probably due to a poor posture or an awkward position while sitting at a computer. Solutions: Health & Safety – Eyestrain Eyes can become strained after staring at a computer screen for a long time, particularly if working in bad light, in glare or with a flickering screen. Solutions Screen filters can remove a high percentage of the harmful rays emitted from a computer screen. Use screens that do not flicker. Health & Safety – Ozone irritation Health experts have suggested that ozone emitted from laser printers can lead to breathing problems. Solution It is recommended that laser printers should be situated at least one metre away from where people are sitting and there

Upload: vodat

Post on 12-Apr-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Data Capture Forms – Online forms - Simple, easy to use forms where spelling can be checked as the user types in their data. Further advice and guidance can be given to the person filling in the form.Paper based forms -Also and simple to fill in, if spelling mistakes are made new forms have to be issued. Easily damaged and not very secure compared to online formsCoding Data- Once you have got the completed DCF. It needs to be typed up into either a Spreadsheet or a database. To save space and also be easier and quicker to enter the data can be CODED. Examples of this: Y or N instead of Yes or No, M or F instead of Male or Female120930 instead of 12 September 1930

Data Capture Methods – Data Capture is the method of collecting data from the outside world. E.g. entering data via a keyboard onto an application form is a method of data capture. The ideal of method data capture would be; Completely accurate, Cheap (to buy and run)Automatic (to keep wage costs low), FastControl system sensors - Automatic systems are used in everyday life from monitoring the temperature in a room, water quality, light levels and pressure sensors. Data collected by sensors is analogue and is then converted to digital so the computer can read the data.Barcode readers - Simple, quick solution used commonly in shops. Items are given a series of black and white lines that represent a number. The number is a item number stored on a database. Using the barcode reader the computer systems is able to locate further product details such as price. Can scan quickly and read barcodes fro a distance. If damaged the must enter data by keyboard. Expensive to set up.Near Field Communication (NFC) - Used more in smartphones and the contactless payment cards. NFC is used to help make quick financial transactions. Creates radio links over a very short distance to another device.Radio Frequency Identification Device (RFID) - Is a small tag that is used to track items using radio signals, security for valuable items and can store data to identify items. Data from the device can be read from a distance. Used for stock control, used in libraries and season tickets.Chip and Pin – is used to capture credit/debit card data when making purchases. Reduces Fraud but are expensive and sometimes people forget their PIN numbersOMR (Optical Marker Recognition) – Reads marks made on a form for example questionnaires, registers or lottery tickets. Read at high speed, automatic and quite cheap Some forms can’t be read, or are folded and create jamsVoice Recognition – Uses a microphone and special software to recognise spoken words, numbers and commands. Faster to talk than type, reduces RSI, good for disabled. Doesn’t work well with background noise, can make a lot of mistakesBiometrics – Makes use of features of the human body that are unique to a person e.g. retina display, finger prints. These can gain entry to rooms, buildings or computers. Very reliable, don’t need keys, magnetic strip etc. Worry about the privacy of data stored, very expensive

Data Security– Network Security - You should always back up your data on a regular basis. Keep a second copy of important files on a external hard drive, zip disk, USB flash solid state drive or magnetic tape and store it separately from your PC. Your data is much more valuable than your computer equipment - it’s priceless. You can protect your PC equipment with insurance, but this will not replace your data!Physical security means that the hardware of the network is protected from theft and kept safe. Fire protection- fire doors, smoke doors, fire proof safes etc. Alarms-rooms containing the server should be alarmed. Locks-all rooms with services inside and have limited recorded access to them. Visibility-avoid putting computers on ground flour and where they are visible to passers byAccess security means that there is a limit to the amount of access a user has to the information held on the network. Authorisation levels, user names and passwords, Read/Write accessData security means that there are measures taken to prevent the loss of data held on the system. Use virus checkers to check information is not corrupted. Firewalls to prevent hackers from accessing data from the internet. Use biometric methods e.g. fingerprinting, retina scanning, face recognition.Encryption – is the process of coding files before they are sent over networks/internet to protect them from hackers. Also coding information on the pc so if the computer is stolen files cannot be read.Monitoring software monitors network usage for unusual activity e.g. entering lots of passwords to try and gain access, this would then lock them out of the networkTransaction logs – they monitor usage and produce an audit trail e.g. a deleted file will have the date and time of deletion and which member of staff deleted itArchiving - Archiving is a backup that is taken in case the original is lost. Archives are the backups that are not needed in the immediate short term but maybe required for future reference. Instead of saving these files on computer it is better to save them on backing removable storage (as mentioned previously) and store them in a fireproof building away from the main siteComputer Viruses - Viruses are small programs which are designed to cause damage to a computer or whole networks. They can delete files, programs etc They can also spy on your online use. Examples Trojans, boot sector, key logging software tracks what you are typing e.g. a password etc. Your PC can catch a virus by sharing files on disks/CDs, viewing/downloading files on the web, USB flash drives and from e-mail attachments (these may contain EXE. Files). The only protection against this is having anti-virus software installed on your machineProtection from Viruses - Scan files for viruses before opening them. Make sure you keep your antivirus software up to date – 300 viruses are released into the wild every month – it only takes one to wreak havoc on your computer. Run a scan regularly.If on broadband, install a firewall to keep hackers away from your personal data. These help to filter out unauthorised requests from outside users.Malware - Malicious software Programs that can alter systems software e.g. to redirect it to other sites. Take over your computer remotely. Programs that make your computer run slow.

Legal, Social, Ethical & Environmental Issues Health & SafetyThe law states that an employer must:Provide tiltable screens Provide anti-glare screen filters Provide adjustable chairs Provide foot supports Make sure lighting is suitableMake sure workstations are not cramped Plan work at a computer so that there are frequent breaks Pay for appropriate eye and eyesight tests by an opticianGeneral working environmentThere should be no trailing wires Food and drink should not be placed near a machine Electrical sockets must not be overloaded There must be adequate space around the machinesHeating and ventilation must be suitable Lighting must be suitable with no glare or reflections Benches must be strong enough to support the computersPossible dangers and solutionsBack problems: Many computer users suffer serious back problems. This is probably due to a poor posture or an awkward position while sitting at a computer. Solutions: A fully adjustable chair should avoid poor posture Footrests can reduce these problems Screens should tilt and turn to a position that avoids awkward movementsRepetitive Strain Injury (RSI):Repetitive Strain Injury (RSI) is damage to the fingers, wrists and other parts of the body due to repeated movements over a long period of time. Solution: To prevent RSI, make sure your posture is correct, use wrist rests and have a five-minute break from typing every hour.

Health & Safety – Eyestrain Eyes can become strained after staring at a computer screen for a long time, particularly if working in bad light, in glare or with a flickering screen. Solutions Screen filters can remove a high percentage of the harmful rays emitted from a computer screen. Use screens that do not flicker. Take regular breaks - do not work for more than one hour without a break. Lighting must be suitable and blinds fitted to windows to reduce glare

Health & Safety – Ozone irritation Health experts have suggested that ozone emitted from laser printers can lead to breathing problems.Solution It is recommended that laser printers should be situated at least one metre away from where people are sitting and there should be good ventilation in the area

Legal Issues – Computers and the LawThe Computer Misuse Act 1990No laws specifically to deal with computer crime prior to 1990Hacking - Unauthorised user who attempts to or gains access to an information system Virus - A virus is a program written to cause mischief or damage to a computer system. The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and virusesThere are three principles to the act:1. It is illegal to access unauthorised data e.g. Hacking. 2. It is illegal to access unauthorised data with the intent to commit a crime. 3. It is illegal to access unauthorised data and change it e.g. Planting viruses and deleting files.

The Data Protection Act 1998 - sets out to protect the privacy of personal information.Data subjects are people who have data held about them – just about everybody really. Data users are the people or organisations who hold the data. There are far more data users than many people think. There are 8 principlesThe Law states all Data must be:1. Fairly and lawfully processed (used) 2. Used for limited purposes 3. Adequate and relevant. Only what is needed may be used 4. Accurate 5. Not kept for longer than is necessary 6. Accessible to the individual and able to be corrected or removed where necessary 7. Secure 8. Not transferred to countries without adequate protection.Your Rights: See what data is being held about them if they ask the data user. They may have to pay to see it

change anything that is wrong Refuse to have some data stored at all, if it might cause damage or distress Refuse to allow processing for direct marketing – junk mail Complain to the Data Protection Commission if they think the rules have been broken claim

compensation if they can prove they have been caused damage by a data controller breaking the rules.

Exemptions: National security – you cannot demand to see your data if national security is at stake Police investigations – information being used to prevent crime is not covered (though police records are)

Copyright, Designs and Patents Act 1988This Act was introduced to protect the investment of time, money and effort by the people who create original pieces of work. This can mean authors of books, composers of music, the makers of a film, a computer game designer or a company that creates applications such as word processing software. They all invest a great deal of time and money to produce these things and quite rightly, their work belongs to them.As you have seen, the Act protects a wide range of work, both written and computer based.We are more concerned here with the ICT examples. Some of these are:Copying software – YOU NEED SOFTWARE LICENCESCopying or downloading music Copying images or photographs from the web Copying text from web pages and using it in your work or posting it onto your website and pretending it is your own work.

Data Logging and Sensors – Data Logging - The term 'data logging' refers to collecting or gathering data over a period of time.Sensors are used to take readings or measurements at regular intervals of their environment. The sensors could be collecting data on a wide range of thing such as temperature, humidity, pressure, wind speed, water currents, electrical voltage, pH readings etc. The sensors may be either analogue or digital. If they take analogue readings, an Analogue to Digital Converter (ADC) will be needed to convert the signal into digital data which the computer can understand. As the sensor takes a reading, the data is sent though a cable or wireless link to the data logger. The data logger usually stores the data for a period of time before sending it in a large batch to a computer which will process and analyse it. A data logger is often a hand-held battery-operated device which has a large amount of memory.Remote Data LoggingRemote data logging means that the sensors collect data 'out in the field' and pass it to a portable data logger. The data logger then relays the data either wirelessly, by fibre-optic cables or possibly even by satellite, back to a computer ready for analysis.Logging Interval The computer controlling the process will take readings at regular

intervals. The time interval for data logging is the time between readings. If the measured value changes very rapidly then the time interval

needs to be rapid as well, otherwise crucial events will be missed.Period of LoggingThe computer will also make a record of when the readings are taken. The logging period is the total length of time over which readings are taken.Advantages of Data Logging Data Logging can be used in remote or dangerous situations. Data logging can be carried out 24 hours a day, 365 days of the

year. Time intervals for collecting data can be very frequent and regular,

for example, hundreds of measurements per second. Can be set up to start at a time in the future. No need to have a person present. Data logging is often more accurate because there is no likelihood

of human error.Disadvantages of Data Logging If the data logging equipment breaks down or malfunctions, some

data could be lost or not recorded Equipment can be expensive for small tasks The equipment will only take readings at the logging interval which

has been set up. If something unexpected happens between recordings, the data will not be collected.

Bluetooth – A wireless technology which allows one device to talk and connect to another. It wirelessly transmits a signal that can be received by any device using the software.Can transmit through walls and other non-metal barriers.It can be used in anything (phones, computers, even TVs). It is secure and has a long battery life.Bluetooth headset can be used by drivers to talk on the phone while travelling to a job.Sending/Receiving files to the phones with information about a new job or when a job is finished.To allow for Wireless controllers when working with wires underground..INFRA REDLike Bluetooth it connects two devices together, it then sends and receives the information through electromagnetic waves. Widely used in most audio and video remote controlsAdvantagesCheap to install Uses little power.Secure, as the items need to be pointed at each other. DisadvantagesBoth devices have to be in a straight line Both devices need to be close to each other to pass the signals.

Networks – A computer network is a number of computers linked together to allow them to share resources. Networked computers can share hardware, software and data.

Most computer networks have at least one server. A server is a powerful computer that provides one or more services to a network and its users. For example, file storage and email.LANs and WANsThere are two main types of network:1.Local Area Network (LAN)A LAN covers a small area such as one site or building, eg a school or a college.2.Wide Area Network (WAN)A WAN covers a large geographical area. Most WANs are made from several LANs connected together.The Internet is a WAN.A network of bank cash dispensers is a WAN. A school network is usually a LAN.LANs are often connected to WANs, for example a school network could be connected to the Internet. WANs can be connected together using the Internet, leased lines or satellite links.

LANSAdvantagesSharing devices such as printers saves money.Site (software) licences are likely to be cheaper than buying several standalone licences.Files can easily be shared between users.Network users can communicate by email and instant messenger.Security is good - users cannot see other users' files unlike on stand-alone machines.Data is easy to backup as all the data is stored on the file server.DisadvantagesPurchasing the network cabling and file servers can be expensive.Managing a large network is complicated, requires training and a network manager usually needs to be employed.If the file server breaks down the files on the file server become inaccessible. Email might still work if it is on a separate server. The computers can still be used but are isolated. Viruses can spread to other computers throughout a computer network. There is a danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, eg a firewall.Network TopologiesBusRingStarWhat hardware do you need for a LAN network?• File Server : Runs software, stores files.• Terminals : Workstations that give network access.• Print Server : Queues up all print jobs from users in network.• Cables (wire/optic) : Sends data• Switch/Router – direct data packets

Networks Continued - INTERNETIntranets and ExtranetsIntranet is similar to the Internet but is internal to an organisation. An INTERNAL NETWORKUsers access the Intranet through a user name and password. Enables users to share information and communicate via electronic messaging. View pages like webpages – like an internal website (a bit like the shared area)Extranet - An Extranet can be accessed from outside the Intranet by authorised users via a user name and password. A NETWORK that can accessed EXTERNALLY. E.g. VLEWANComputers on LANs in one building can be connected to computers on LANs in another building usually through the telephone system, often using a modem. They can also be connected via fibre optic cables or satellite. By linking LANs together, the network is no longer local to one building, it is now spread over a wide area. It is known as a Wide Area Network (WAN). The largest WAN in existence is the Internet?What extra hardware do you need for a WAN network? A MODEM.ProtocolsComputers on a network must all have a way of being able to 'talk' or 'communicate' with one another and they do this by following a protocol. FTP is file transfer protocol.A protocol is a set of rules which define: How to establish communication between the machines The format of any data which is to be exchanged between the machines How errors in the data will be detected How errors will be corrected Methods of compressing the data to transmit it faster and more efficiently How the connection between the machines is to be terminated

The protocol that is used on most LANs and the Internet is known as the TCP/IP protocol.BandwidthThe higher the bandwidth, the quicker the data will flow along the line…Web pages loaded quicker.Multimedia is downloaded faster.Internet connection is faster.Less network traffic.Quicker response time.Connecting to the InternetSingle users can connect to the Internet. Special Hardware and Software is required to allow people to access the Internet. As well as an electronic device (PC, Tablet etc.) you need: Internet Service Provider.Browser Software. Telecommunications line e.g. ISDN, ADSL. Modem/Broadband Modem/ISDN adapter.WI-FI – (Wireless Fidelity) – Wireless NetworksA wireless network uses radio waves to transmit information, just like cell phones, televisions and radios do. Here's what happens:A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a wired/fibre optic connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.

WI-FI Continued –HotspotsA Wi-Fi hotspot is simply an area with an accessible wireless network. The term is most often used to refer to wireless networks in public areas like airports and coffee shops.Being able to connect to the Internet in public hotspots is extremely convenient. Wireless home networks are convenient as well. They allow you to easily connect multiple computers and to move them from place to place without disconnecting and reconnecting wires.BENEFITS of wireless Having lots of wires running throughout a building can be costly and awkward to maintain. Any breakages in the wired connection will also have to be manually fixed.Freedom to move around the office, roads or houses.Freedom to work at any time of the day not just when the office is open.Advantages of Mobile DevicesExcellent for wireless internet services.Compact (keyboard and touchpad are built-in).Bluetooth and wireless built-inPortability (great if you travel a lot), Small and light in size.Apps can add more functions.Many of the same features you'll find on a desktopGPS for navigation.Longer battery life than most laptops.Increased Productivity.Photograph issues with cable boxes or peoples TV boxes.Can access networks or browse the Internet through 3G/4G.Saves time, travel to and from workDisadvantages of Mobile DevicesData Security - Cable Ties Ltd need to keep their data safe while letting mobile devices of workers access all the data necessary. Cost - Having to pay for the device and also the data plans and the devices can raise the cost for Cable Ties Ltd. Creating guidelines and security for the devices can cost money.Easy to lose, or be stolen. Lost/stolen devices account for a significant amount of lost data for companies/Cable Ties LtdFor transferring data a high quality of connectivity is needed to be able to send the data. This may not be available for all workmen of Cable Ties Ltd depending on the area they are working.No source of power for charging

User Interfaces –People need a way of interacting with machines if they are to be useful.The three main types of user interface are; Command-driven Menu-driven Graphical or GUI.

Command Driven InterfaceA Command Line Interface allows the user to interact directly with the computer system by typing in commands (instructions) into a screen. You cannot just type in any kind of instruction of course, because the computer will only react to a definite set of words.AdvantagesIf the user knows the correct commands then this type of interface can be much faster than any other type of interface.This type of interface needs much less memory (RAM) in order to use it than other user interfaces.This type of interface does not use as much CPU processing time as the others do.A low resolution, cheaper monitor can be used with this type of user interface.DisadvantagesFor someone who has never used a command line interface it can be very confusing. Commands have to be typed in precisely, if there is a spelling error the command will fail.Menu-driven InterfaceThis type of interface lets you interact with a computer or device by working your way through a series of screens or menus. Think about your iPod or mobile phone, they both use a menu driven interface. You are presented with a menu, you make a choice and then the next menu appears on the screen. You make another choice and so on.AdvantagesThey are extremely easy to use, someone who has never seen the interface before can work out what to do.There are no commands to learn or remember.Step-by-step options are given so that the user doesn't have to remember anything.They don't need huge amounts of processing power or memory.DisadvantagesA poorly designed menu interface may be slow to use. It can be irritating if there are too many menu screens to work through - users get annoyed or bored if it takes too long.Graphical User InterfaceA graphical user interface is the most common type of user interface seen today. it is a very 'friendly' way for people to interact with the computer because it makes use of pictures, graphics and icons - hence why it is called 'graphical'.A GUI (pronounced gooey) is also known as a WIMP interface because it makes use of:Windows - a rectangular area on the screen where the commonly used applications run. Icons - a picture or symbol which is used to represent a software application or hardware device .Menus - a list of options from which the user can choose what they require. Pointers - a symbol such as an arrow which moves around the screen as you move your mouse. Helps you to select objects.

User Interfaces Continued: –AdvantagesThis type of user interface is extremely easy to use, especially for a beginner.It is easy to explore and find your way around the system using a GUI. You do not have to learn complicated commands. There are usually good help facilities provided with GUIs.You get the benefit of WYSIWYG.They let you exchange data between different software applications.DisadvantagesGUI take up a much larger amount of hard disk space than other interfaces.GUI need significantly more memory (RAM) to run than other interface types.GUI use more processing power than other types of interface. GUI can be slow for experienced programmers to use, they find CLI interfaces much faster to use.User Interface DesignIt is the job of a user interface to make a program easy to use. A good user interface should:- Be attractive and pleasing to the eye.- Be easy to use.- Ensure all screens are consistent.- Have all options clearly shown.- Have clear warning messages when someone makes a mistake.- Have online help and support.Teleworking ContinuedDisadvantages for the IndividualThey are not always sure that people are putting in the right amount of hours.Work might not be delivered on time.Workers might not be at home to receive an email or urgent telephone call.Work might be of a lower standard than when produced in the officeHard to motivate staff and have a feeling of a good company spirit. Managers still like face to face contact with employees.Firms might have to address the criticism that they are running 'digital sweatshops‘.There might be legal issues such as insurance and health and safety implications.

Remote Working and Teleworking – Many organizations allow some employees to work from homeHome working/teleworking is made possible using ICT equipment and servicesHardware and Software Required for TeleworkingHardwareWebcam for video inputMicrophone for audio inputSpeakers or Headphones for audio outputPrinter for printing hard copies of documents Desktop pc, Laptop, Palmtop, Tablet, Smartphone etcCommunication DevicesInternet Broadband connectionISP – Internet Service Provider e.g. BT, Virgin, Sky etcRouter that provides WI-FIRemote DesktopAccess to works Extranet – this is accessed remotely and not on your own computer for security reasonsUsername and password and Access Rights to works extranetAdvantagesFor individualsYou can work the hours you want, so if you like to get up at 6am and finish by lunchtime, you can do that. Likewise, if you are a sleepyhead, you can stay in bed until noon and work until late in the evening. It makes possible to work around family commitments, for example young children or elderly parents.You can take a break when you want one. You can stop to chat to a friend if the phone rings or watch something on the TV. It saves a huge amount of time that would normally be spent travelling to work. There is no need to spend an hour each morning and evening stuck in traffic jams. You can spend that time working instead. You save the cost of petrol that you would normally need to travel to work and also the cost of car parking tickets.AdvantagesFor the organisationThey can employ people who don't live near to the office. This means they can choose people who might be willing to work for lower wages. They can even employ people from other countries.If there is a shortage of skilled labour in the local area then they can get the skilled staff that they need from elsewhere in the countryThey might be able to keep hold of valuable members of staff who might otherwise leave, for example, women who have just had a baby. They can have smaller premises so they save money on rent, car parking space, heat etc.They get workers who might be more committed or work harder.Disadvantages for the IndividualIt is hard to feel like you can ever get away from work. You might end up working longer hours than you would in an office. You think, 'I'll just do a bit more, I'll just check my email'.You might always be 'on call'. Because you are at home, the office might think that you are always available to do just a bit more workSometimes it can be hard to motivate yourself. There can be a lot of distractions . You can miss out on the social side of work. There is no team spirit, no one to talk to and you can feel lonelyIt might affect your career prospects. If a promotion comes up in the office, you might not be thought about for the role.

ICT and People with disabilities – HardwareInput devices Input devices may be modified to make them easier to see and understand:• Keyboards with lowercase keys• Keyboards with big keys.• Large print keyboard with high contrast colours (such as white on black, black on white, etc)• Embossed locator dots help find the ‘home’ keys, F and J, on the keyboard.• Scroll wheels on mice remove the need to locate the scrolling interface on the computer screen.• Foot mouse - Foot operated mice.Other input devices which improve accessibility: • trackballs, • joysticks, • graphics tablets, • touchpads, • touch screens, • foot mice, • a microphone with speech recognition software, • Sip-and-puff inputSoftware can also make input devices easier to use:• Keyboard shortcuts and MouseKeys allow the user to substitute keyboarding for mouse actions. • Macro recorders can greatly extend the range and sophistication of keyboard shortcuts by recording a sequence of instructions.• Sticky Keys allows characters or commands to be typed without having to hold down a modifier key (Shift, Ctrl, Alt) while pressing a second key. Similarly, ClickLock is a Microsoft Windows features that remembers a mouse button is down so that items can be highlighted or dragged without holding the mouse button down throughout.• Customization of pointer appearance, such as size, colour and shape.• Predictive text – uses a dictionary to suggest what is being typed.• Spell checkers and grammar checkersLearning difficulties• Age appropriate software – software which develops skills of people of different ages.• Cause and effect software – users can do something to make things happen.• Hand-eye co-ordination skills software – click, dragging software.• Mind mapping software – allows users to plan out learning or a thought.• Study skills software – allows users to develop and refine the way they study.• Text-to-speech – types out what is being said by the user.

Web Accessibility (Website Options) There are guidelines which specify how a website should look to make it properly accessible. Companies are fully responsible (and legally bound) to make a website accessible.

- Text only site- ALT tags – Alternative description for people who cannot see pictures correctly.- Centred web-site – 90% of elderly people miss information down the edge of the page.- Zoom facility.- Colour schemes - allowing users to change colours and sizes of text easily.- Hyperlinks – text based and make obvious sense.

Visual impairment Choice of appropriate hardware and software will depend on the user's level of functional vision.Hardware• Large monitors. (larger in size or resolution). • Touch-Screen’s• Graphics Tablets• Video magnifier. Printed materials and objects are placed under a camera and the magnified image is displayed onto a screen.• Scanner. A device used in conjunction with OCR software. The printed document is scanned and converted into electronic text, which can then be displayed on screen as recognisable text. • Refreshable Braille display. An electronic tactile device which is placed under the computer keyboard. A line of cells, that move up and down to represent a line of text on the computer screen, enables the user to read the contents of the computer screen in Braille.• Electronic Notetaker. A portable computer with a Braille or QWERTY keyboard and synthetic speech. Some models have an integrated Braille display.• Braille embosser. Embosses Braille output from a computer by punching dots onto paper. It connects to a computer in the same way as a text printer.Software

Customization of graphical user interfaces (like Windows) to alter the colours and size of desktops, short-cut icons, menu bars and scroll bars.• Screen magnifiers• Screen readers• Optical character recognition. Converts the printed word into text, via a scanner.• Braille translation. Converts the printed word into Braille, which can then be embossed via a Braille embosser.• Text-to-speech and Speech-to-text• Spell checkers and Grammar checkersDeafness and hearing loss• Fire alarm paging system• Loop system (portable and fixed)• Radio aids • Telecommunications device for the deaf (Text Phone)• Teletext & Subtitles• Audio Description Service (Sky)• Vibrating fire alarm placed under pillow when asleep.• Door bell lighting system – lights flash when doorbell is pressed)•Wakamaru – a system which provides companionship reminds users to take medicine and calls for help if something is wrong.•CARE (Call Reassurance) community based program that calls seniors at home ensuring their well-being. Accessibility in Operating Systems (Like Windows and Apple OSX) - Screen Magnifiers - Zoom-- Speech Recognition- Themes (different colour schemes)- Predictive text- Mouse Keys (shortcut keys)- Talking Alerts- Auditory alerts (e.g. beep on error).- Voice Commands- Narration

Communications – Communications – Monitoring and Tracking Systems File Formats

Video Conferencing – Advantages and Disadvantages

ICT and Modern Living

ICT in Education Many schools are now moving over to using electronic registration. Details are uploaded to the school administration system and attendance is automatically updated within a few seconds of the register being taken. Students can participate in lessons by highlighting or selecting things on the whiteboard Swipe cards for students and even the latest fingerprint identification systems Most schools are now using electronic Management Information Systems. They can search for a student using the computer and find out all of the relevant details in a matter of seconds. Online resources through research Online Assessment VLEs - using resources Interactive whiteboards

ICT in Banking Online Banking Transfer money between accounts Make payment for bills Apply for loans

ICT and Modern Living

ICT Entertainment Digital Photography – change/enhance image Online Gambling – place bets or play bingo Social Networking – Online Dating – Busy people find it easier to meet partners Watch TV programmes – Digital networks like SKY or VIRGIN or

use BBC iPlayer. Streaming Music or Videos – Using tablets to stream data Listening to music – Digital radio Browsing the Internet – many websites of interest Reading – Online magazines and papers

ICT and GamingGames can range from chess, cards to fast paced arcade games. You will need a fast processor, large screen, large amount of RAM, Graphics card, disk drive, sound card, speakers and specialist input devices such as joysticks or consoles.AdvantagesYou can learn from them, Enjoyable, Encourages teamworkDisadvantagesAddictive, little physical activity, violent, waste time school work can suffer, health problems.

ICT and Modern LivingShopping Online

Advantages to store Fewer staff to pay No fancy shop to pay for Cheaper to advertise from Web page Faster to ... E-mail customers rather than mail them

about.. Create an e-business Shorter hours become possible Sales at any time of the day 24/7 Can deal with more people at the same time Wider market Less shopliftingDisadvantages to store Local people might not know you are there Staff can waste time just surfing the net Access/ISP can cost money Virus issues Hacking issues / fraudAdvantages to Customer Cheaper because company overheads

reduced (any named one) Can order 24/7 Can order without leaving the house Wider range of products (i.e. US or

Japanese versions) No transport costs Quickly search for items they want Common items savedDisadvantages to Customers Slower to get goods, rather than getting it

from a local shop Goods may be faulty when they arrive or it’s

slower to get replacement. Danger of fraud/hacking credit card details

given on-line/identity theft Restricted access if computer broken/no

computer or internet access Harder to check the reliability of the

company, rather than a local store. Not feel a personal service Loss or damage in transit Need to have credit/debit card/PayPal

accountCan’t try out/see goodsDanger of viruses (1)

ICT and Modern LivingSocial Networking – Facebook, Twitter, Myspace etc1) Share: Social networks allow you to share your thoughts, activities, recent events and much moreYou can share your stories, successes, services and any other aspects of your life through a social network2) Show - Social networks allow you to show your image and all other life photos through your ‘Wall’ or ‘Timeline’ This allows the social community to see exactly who you are and put a ‘face’ to your name3) Socialise - Communicate through commented on status updates, photos, videos and any ‘links’ Stay in constant touch with contacts through online chat or direct messagesDisadvantages of Social NetworkingAddiction, spending too much time on them, Bullying, Paedophiles looking for victims, share too much information possible employers may see, Identity theft

Social and ethical implications of the electronic transmission of personal information

Features and Purposes of Computing Devices

Input Devices – Mouse, keyboard, Touch Screen, remote Control, Webcam, Microphone, Joystick, Touchpad, Concept Keyboard, OMR, OCR,MICR, Barcode reader, Track Ball, Magnetic StripOutput Devices – Screen, monitor, speakers, projectors, LEDs, Printers, Motors, Actuators, Buzzers, PlottersStorage Devices – Magnetic – Cheap and high storage capacity, portable. Optical (DVD) – Less storage, cheap and portable. Hard Drives – Cheapish, portable, high storage capacity, portable. Flash Drives – Quite cheap, High capacity storage, Solid State – No moving parts, portable. CLOUD Storage – good for remote working. SD Cards – cheap, portable, high storage – Remember CASECost How much does the storage cost? Are there cheaper alternatives?Availability Is the technology widely available? Can it be easily replaced if there is a fault?Security Will the data be secure? Who will be able to access the data? Where will the

backups be kept?Ease of Use

How easy is it to back up? How easy is it to restore if there is data loss.

Computer System – INPUT PROCESS, OUTPUT – PROCESS CPU, Arithmetic Logic Unit, Control Unit, Intermediate Access Store. BACKING STORE

Operating Software - An operating system (or OS) is a computer program which controls everything the computer does. Without it, a computer cannot run. The software that acts as the communicator between your computer's hardware and you. Load and run applications, Share out (and manage) memory, Communicate with peripherals, Accept data from input devices, Provide an interface, Store data, folders etc

Utilities Software - Utility programs are part of the systems software. They are designed to do one or two specific but vital tasks very well. File compression – ZIP compresses for storage or sending via communication links, Anti Virus Software – prevent corruption of data, security issues, Firewalls – prevent unauthorised access.

Applications Software – WP, Spreadsheet, Database, Presentation etc

Bespoke or Specialist Software - The company will get the exact software/system that they need. The software will work exactly how they want it to work. The software will only have the features that they specifically need in their business.

Open Source Software - Open-source software (OSS) is computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.

RAM – Random Access Memory. It is where information to run the programmes that are being used currently my the processor, is held. It is a temporary type of memory which means it clears when you lose power or shut down the computer.This is known as volatile memory. An advantage of RAM is that the more RAM you have, the faster your computer can multitask or work when completing tasks such as streaming videos and running multiple applications eg. Different types of software. A Disadvantage is that it is volatile, information can be lost when it isn't saved.ROM - ROM stands for Read only Memory. ROM is computer memory on which data has been pre-recorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as being non-volatile, whereas RAM is volatile.

Bits, Bytes and Data – Bit - each individual 1 or 0 is called a bit – short for binary digit.Byte - 8 bits is called a byte.Kilobyte 1 kilobyte (1KB or simply 1K) is about a thousand bytes.Megabyte 1 megabyte (1MB) is about a million bytes. Gigabyte 1 gigabyte (1GB) is about a thousand million bytes.Terabyte 1 terabyte (1TB) is about 1,000,000,000,000 bytes.

Data Handling Software – the features of SPREADSHEET software: cells, cell references, rows, columns (and their height and width), show row/column labels, enter and edit cell content, key fields, cell gridlines, cell ranges, replication, formatting, merging cells, formulae, functions, automatic recalculation, sorting rows/columns, graph/chart. how a data model may be used to answer ‘what if’ questions and the benefit of being able to answer such questions using a data

model Database - A file is a set of related records e.g. a file of patients. A record is a collection of data about a particular person, object or concept e.g. the data about one patient. A field is a subdivision of a record which holds a particular item of data with a given data type e.g. Medicine quantity (data type is number), Patient name (data type is text), Primary Key field(s) to uniquely identify a record. Create queries to search data. Reports to display findings.Flat File Database - A flat-file database is a simple database that stores all data in a single table in one file. Advantage - used to create simple lists. Disadvantages - Large amounts of duplicated data, difficult to updateRelational Database - The problems associated with flat files can be solved by moving some of the data out of the main table and into other tables. Advantages -Avoids data duplication (redundancy), data stored once, linked by key fields, all data available via relational links in key fields. Disadvantages - More complicated to design and create a relational database than a flat file system.Data management - Validation –the checks a computer carries out when data is input, it checks that the data is sensible. Types List, Range, Presence, check digit, Presence A check to see if data has been enteredData type Data is the correct type e.g numbers for a telephone numberFormat Data is in the correct format, e.g. DD/MM/YYYYRange Data is in the correct limits, e.g. Birthdate, between 0 and 100Character Data has the correct characters, e.g. no # in the postcodeVerification – Ensures the data is accurate. Use double-entry and proof reading to check accuracy.File and Folders - A FOLDER is a container for storing files. A SUB-FOLDER is a folder within a folder. This may be CLIENTS, TECHNICIANS, EQUIPMENT etc and then FILES

ControlThe role of computers in control• Computers can respond very rapidly to change.• Systems can run 24 hours a day, 365 days a year.• Control systems can operate in places that humans would find dangerous or awkward.• Outputs are consistent and error free.•Computers can process data quickly and machines can operate faster than humans.Computers are now used to control many types of devices such as:• Air conditioning and central heating systems in large buildings• Security systems and burglar alarms• Manufacturing processes• Traffic lights and pedestrian crossingsThe role of sensors in controlSensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor. For example:• A security alarm system may have an infrared sensor which sends a signal when the beam is broken.• A heat sensitive sensor in the corner of a room may detect the presence of a person.• Temperature sensors could be used to control the heating in a large building.Other physical quantities that can be transmitted directly to the computer's processor include:• Rainfall/water levels• Radiation level• PH level• Oxygen levelAnalogue to digital conversionData such as pressure, light and temperature is analogue data. Computers can only work with digital data. An interface box or analogue to digital converter (ADC) is needed to convert the analogue data from the sensors into digital data the computer can process.Feedback CycleFeedback cycle for a fish tankThe control program stores the highest and lowest acceptable water levels and what action to take if they're exceeded.Stages of the feedback cycle1. water level falls too low2. sensor detects water level is too low3. valve opened to let water in4. sensor detects water level is too high5. valve opened to let water out