Learning Objectives
LO1– Understanding Computer Systems
|
LO2 – Know how to work with information and data to meet specified business needs
|
---|---|
LO3 - Know how ICT can be used to support business working practices.
|
LO4 – Understand how legal, ethical, safety and security issues affect how computers should be used.
|
LO1 – Understanding Computer Systems
Desktop PC |
Advantages
|
Disadvantages
|
---|---|---|
Laptops |
Advantages
|
Disadvantages
|
Net book |
Advantages
|
Disadvantages
|
Tablet |
Advantages
|
Disadvantages
|
Smartphone |
Advantages
|
Disadvantages
|
Hard Disk Drive (HDD) |
The largest, Hard Disc Drives can hold several terabytes (TB). Fit internally in computers, cannot be unplugged whenever and swapped. |
---|---|
External Hard Drive |
Can hold almost as much data as HDDS, though is portable and can plug into almost any machine using a USB port. Can be expensive for the large drives. |
USB Flash Memory |
Pocket size memory, very portable and can plug into almost any machine using a USB port. Very cheap. |
Blue Ray |
Hold much more than DVDs and CDs, though the technology is currently expensive and can only play with expensive blue ray drives/players. |
DVD-ROM/RW |
Holds several gigabytes (GB), much more than a CD and becoming much more common . Becoming much cheaper. |
CD-ROM/RW |
Only holds around 700 megabytes (MB), as more computers come with DVD RW Drives CDs are slowing being replaced. Very cheap. |
Switch
Modem
WAP (Wireless Access Point)
This is a device that is attached, but not actually part of the computer system. They can be connect by Wi-Fi, Bluetooth or by a wire.
Puff-Suck Switch
Braille Keyboard
Foot Mouse
Text to Speech Software
Speech to Text Software
Zoom
USB (Universal Serial Bus)
Firewire
GPS (Global Positions System)
Using satellites a locations of a GPS receive device (e.g. smart phone) can be located anywhere on Earth at anytime. GPS uses four satellites for each location, where their locations (distance lines on the diagram) meet is where the receiver (e.g. smart phone) is.
This is commonly used to:
Navigate locations/addresses in real time (while travelling) via Sat Nav.
Check in a location vie a Social Network.
Monitor employees locations.
Tracking lost/stolen goods (e.g. laptops, smart phones).
...
Electronic Tagging
Electronic tagging commonly used to tag criminals to ensure they do not leave their house after a certain time. This is a tag, which if moves over a certain distance from its base unit will alert the authorities (and the criminal will be arrested).
Monitoring Internet and Communications
It is the responsibility of a company to ensure that their Internet and e-mail is used appropriately. For example, estate agents should only using the internet to look up properties, not to gamble, watch online TV or social network.
Possible Procedures:
Internet access to certain, inappropriate websites can be restricts.
E-Mails can be scanned for viruses
E-mails can be scanned for inappropriate words/phrases
E-mails can be saved and backed up
Telephone conversations can be recorded.
Notes: A company must, by law, make the employee aware of their ‘Company Policy’ in terms of monitoring their Internet and Communications. They must also let others know when their phone calls may be recorded (e.g. customers).
An Operating System manages hardware and allows programs to be run on a computer. There are two types of operating system, GUI or Command Line (DOS) and Graphical User Interface (Windows, OSX ...). Command line uses coded commands to perform tasks. GUIs use images, icons, animations, menus and windows.
Mobile Device Operating Systems
Firewall
A Firewall allows a users to select what programs can use the Internet, blocking the rest. It also prevents other computers connecting to yours, preventing hackers.
Hardware Firewalls – This a Box like machines which are much faster than software files. For a large network (business/school) a hardware firewall is essentials. Though, they’re very expensive and difficult to set up.
Anti Virus
Anti Virus software scans for harmful programs (viruses), detects and deletes them.
Updates form the Internet is frequents, keeping it up-to-date with all modern viruses.
Backup
This utility software automatically copies the files from one machine and put them onto another. For example a school will have some backup software which automatically copies all of the files from the server and put these copies onto a backup server in a different location. If this is damaged, hacked or stolen, the backup copies can be recovered, putting them back onto the new server.
Backup Device Examples:
|
|
---|
E-mail software allows users to log in multiple e-mail accounts through an application. Other Features:
|
||
---|---|---|
Web Browsing | Web browsers allow us to browse the Internet. Features:
|
|
Word Processing | Word Processing software allows us write and produce documents (e.g. letters, reports, books, magazines, newspapers...). Features:
|
|
Database | Database software allows us to create a system that can hold masses of data/information. We can then search and separate this data as we wish, displaying it in professional reports. Features:
|
|
Spreadsheets | A spreadsheet allows us to manage and calculate masses of numerical data using functions and formulas. We can use these calculations to produce instant graphs and formatting options that make it easier to read an analyse. Features:
|
|
Multimedia | Multimedia software allows different media sources, such as text, images, animation, film and audio to be combined and presented to an audience. Interaction, like buttons, can also be added. Features:
|
|
Presentation | Slide shows can combine text and images to display a series of slides in aid of presentations. Features:
|
LO2 – Know how to work with information and data to meet specified business needs
Things to consider
Things to avoid
Data Validation
Folder Structure and File Names
File Formats
Text | Data | Audio | Video | Image | Other |
---|---|---|---|---|---|
.doc and .docx Word Document |
.csv Saves as text with commas to separate data |
.m4a Store compressed audio/video (iTunes) |
.avi Microsfots compressed video format |
.bmp Bit Map image, uncompressed |
.ppt and .pptx PowerPoint Slideshows documents. |
.msg Outlook e-mail document |
.xmlstores data as text, works in most programs | .mid MIDI file (musical instrument digital interface) |
.flv Flash animation or video file |
.jpg Stores digital photos, can be compressed |
Can contain text and images. Works on all computer systems |
.rft Rich text (with colour etc...), opened in all word processors |
.mp3 Compressed audio format used by most programs |
.mov Quicktime video file |
.png Stores digital photos, can be compressed |
||
.txt Text files, opened in all word processors |
.wav Large audio format used by Windows systems |
.gif Small image file which is not high quality, but ideal for low detailed images |
|||
.wma Windows Media player format, usually quit large |
Zipping & Compressing Files
Advantages
Large amounts of Files and folders can be extracted anywhere in the exact same order and condition.
Large amount of files and folders are stored as a single file.
Large amounts of files and folders are compressed to a smaller size while being stored as a single ZIP file.
They can then be e-mailed and downloaded quicker.
Large amount of files and folders can be e-mailed or transferred as a single file and extracted anywhere.
LO3 - Know how ICT can be used to support business working practices.
Voice Telephone |
|
|
---|---|---|
SMS |
|
|
Instant Messaging |
|
|
|
|
|
Chat Rooms |
|
|
Forums |
|
|
Bulletin Boards |
|
|
---|---|---|
VoIP (Voice over Internet Protocol) |
|
|
Video Conferencing |
|
|
Webcams |
|
|
---|---|---|
Blogs |
|
|
Social Networking |
|
|
E-mail Etiquette
Use an appropriate subject line
Follow the agreed email policy within the business
Check the message content before hitting the send button
Include a signature on any business emails
Be polite
Messages should be written in plain English with careful use of abbreviations
Do not write the message in capitals letters
Check if the emails should be replied to all the sending list or just the person the emails was originally from
Tell people the format of any attachments you send if they’re anything other than standard. E.g. Microsoft Office file types
-
LO4 – Understand how legal, ethical, safety and security issues affect how computers should be used.
Analyse workstations and assess and reduce risks
Ensure the workstations meet the minimum requirements
Plan work so that there are breaks or changes of activity
Arrange and pay for eye tests and glasses (if special ones are needed)
Provide health and safety training and information
RSI (Repetitive Strain Injury)
Headaches
Neck and back pain
Eye Strain
ID Cards with RFID Chips and Key Fobs
Cards or Fobs are each paired with each holder. This is great for security as they work like keys but copies can only be made by the building administration
Logs can be kept where each person goes and when
Some people would find that logs kept on their whereabouts within a building is invading their privacy
Like keys, ID Cards and Fobs can be stolen, though ID Cards usually have a photograph
CCTV
Some people would have issues of being watched all of the time, invading their privacy
By law, could not have them in public toilets
By law could not have them in changing rooms
Call Monitoring/Recording
Many organisations record calls made. This allows them to keep logs of all calls made, should any issues arise in the future (e.g. customer complaints). Calls are also recorded din telephone sales for staff training.
This also deters employees for making private phones calls from work and encourages them to stay on task (as they’re being monitored) work.
Consumer Surveillance
Loyalty cards are common with shops, especially supermarkets. This allows the business to track which customer is buying what (swiped for points on every purchase), targeting offers at particular people.
For example, if a person buys a lot of baby food and nappies, then the store know to send this person offers of baby products, making the advertising much more targeted and affective.
Organisations which store data must keep this secure. If it is on paper then it must be in locked cabinets and rooms. If it is digital other percussions must be taken...
These software programs allows files to be scrambled up so no one can read/open them. A specific ‘Secret Key’ program is then needed to unscramble the file and make it readable.
Automatic Software Updates
If Operating Systems are set to ‘Auto Update’, this usually happens when the computer is shutting down, noticeable if taking a while to turn off.
Security software (Anti Virus, firewalls...) will automatically update while the computer is being used, this is to tackle any new viruses instantly.
Manual Software Updates
Manual updating an operating system can leave it outdated as the user may forget to check for updates. This could lead to certain software packages not working correctly as they need the attest versions (common with smart phone applications).
Manual updates of security software can leave it open to the threat of new viruses.