17-IGCSE ICT1-THE SYSTEM LIFE CYCLE 1Quick View
ersintezbasaran

17-IGCSE ICT1-THE SYSTEM LIFE CYCLE 1

(0)
<p><strong>THE SYSTEM LIFE CYCLE</strong></p> <p>7.1 analysis</p> <p>7.2 design</p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>Ø Methods of researching an existing system</p> <p>Ø Recording and analysing information about the current system</p> <p>Ø System specification</p> <p>Ø Describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation</p> <p>Ø Produce designs to solve a given problem</p> <p>Ø Design data capture forms and screen layouts</p> <p>Ø Design report layouts and screen displays</p> <p>Ø Design validation routines (including length check, type check, format check, presence check, check digit)</p> <p>Ø Design the required data/file structures (e.g. field length, field name, data type)</p> <p><strong>INTRODUCTION</strong></p> <p>System life cycle is necessary to review an existing system and suggest a number of improvements.</p> <p>There are many stages in systems analysis.</p> <p>The main stages in the systems life cycle includes analysis, design, development and testing, implementation, documentation and evaluation.</p>
18-IGCSE ICT1-THE SYSTEM LIFE CYCLE 2Quick View
ersintezbasaran

18-IGCSE ICT1-THE SYSTEM LIFE CYCLE 2

(0)
<p><strong>THE SYSTEM LIFE CYCLE</strong></p> <p>7.3 development and testing</p> <p>7.4 implementation</p> <p>7.5 documentation</p> <p>7.6 evaluation</p> <p><strong>LEARNING OBJECTIVES</strong></p> <ul> <li> <p>Testing designs</p> </li> <li> <p>Testing strategies</p> </li> <li> <p>Improvements needed as a result of testing</p> </li> <li> <p>Different methods of system implementation</p> </li> <li> <p>Methods of implementation</p> </li> <li> <p>Technical documentation for an information system</p> </li> <li> <p>User documentation for an information system</p> </li> <li> <p>Describe the need to evaluate a solution in terms of the efficiency of the solution, the ease of use of the solution, and the appropriateness of the solution</p> </li> <li> <p>Describe the need for a variety of evaluation strategies e.g.</p> </li> </ul> <p>INTRODUCTION</p> <p>System life cycle is necessary to review an existing system and suggest a number of improvements.</p> <p>7.3.1 Development</p> <p>After designing, the system should be created and tested fully by the system analysts.</p> <ul> <li> <p>If the system contains files like database then the file structure would need to be finalized at this stage.</p> </li> <li> <p>With the stored correct data and certain techniques, validation routines and verification methods are used to ensure for unwanted data and to make sure that any data transferred from a paper­ based system to an electronic system has been done accurately in this stage.</p> </li> </ul>
19-IGCSE ICT1-SAFETY AND SECURITYQuick View
ersintezbasaran

19-IGCSE ICT1-SAFETY AND SECURITY

(0)
<p><strong>SAFETY AND SECURITY</strong></p> <p>8.1. Physical safety</p> <p>8.2. e-Safety</p> <p>8.3. Security of data</p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>•Describe common physical safety issues and what causes them</p> <p>•Describe some simple strategies for preventing these issues</p> <p>•Evaluate own use of IT equipment and develop strategies to minimise the potential safety risks</p> <p>•Explain what is meant by personal data</p> <p>•Explain why personal data should be confidential and protected</p> <p>•Explain how to avoid inappropriate disclosure of personal data</p> <p>•Discuss why e-safety is needed</p> <p>•Evaluate own use of the internet and use strategies to minimise the potential dangers,</p> <p>•Evaluate own use of email and use strategies to minimise the potential dangers,</p> <p>•Evaluate own use of social media/networking sites, instant messaging and internet chat rooms and use strategies to minimise the potential dangers,</p> <p>•Describe measures which should be taken when playing games on the internet</p> <p>•Effective security of data</p> <p>•Security of data online</p> <p>INTRODUCTION</p> <p>Safety and security are two health and security risks during using the computers especially with the internet.</p> <p>It can be required additional knowledge to know how to protect yourself from external attacks, which can come from anywhere.</p>
12-IGCSE ICT1-ICT APPLICATIONS 2Quick View
ersintezbasaran

12-IGCSE ICT1-ICT APPLICATIONS 2

(0)
<p><strong>ICT APPLICATIONS PART 2</strong></p> <p>6.2. Data handling applications</p> <p>6.3. Measurement applications</p> <p><strong>LEARNING OBJECTIVES</strong></p> <ul> <li> <p>Describe the use of a range of data handling applications</p> </li> <li> <p>Describe a range of measurement applications (e.g. scientific experiments, weather stations)</p> </li> <li> <p>Explain the difference between analogue data and digital data</p> </li> <li> <p>Explain the need for conversion between analogue and digital data</p> </li> <li> <p>Describe the use of microprocessors and computers in a number of applications (e.g. pollution monitoring, intensive care units in hospitals)</p> </li> <li> <p>Discuss the advantages and disadvantages of using computers in measurement rather than humans</p> </li> </ul>
14-IGCSE ICT1-ICT APPLICATIONS 4Quick View
ersintezbasaran

14-IGCSE ICT1-ICT APPLICATIONS 4

(0)
<p><strong>ICT APPLICATIONS PART4</strong></p> <p>6.5 Modelling applications</p> <p>6.6 Applications in manufacturing industries</p> <p>6.7 School management systems</p> <p>6.8 Booking systems</p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>= Describe the use of computer modeling in spreadsheets (e.g. for personal finance)</p> <p>= Describe a range of computer-controlled applications (e.g. robotics in manufacture and production line control)</p> <p>= Discuss the advantages and disadvantages of using computer-controlled systems rather than humans</p> <p>= Describe how systems are used to manage learner registration and attendance</p> <p>= Describe how systems can be used to record learner performance</p> <p>= Describe how systems can be used for organizing examinations, creating timetables and managing teaching cover/substitution</p> <p>= Identify areas where booking systems are used (e.g. travel industry, theatre and cinemas)</p> <p>= Describe the online processing involved in booking tickets</p> <p>= Discuss the advantages and disadvantages of online booking systems</p>
15-IGCSE ICT1-ICT APPLICATIONS 5Quick View
ersintezbasaran

15-IGCSE ICT1-ICT APPLICATIONS 5

(0)
<p><strong>ICT APPLICATIONS PART5</strong></p> <p>6.9 Banking applications</p> <p>6.11 Computers in medicine</p> <p>6.12 Computers in libraries</p> <p><strong>LEARNING OBJECTIVES</strong></p> <ul> <li> <p>Describe the computer processing involved in Electronic Funds Transfer (EFT)</p> </li> <li> <p>Describe the computer processing involved in using Automatic Teller Machines (ATM)</p> </li> <li> <p>Describe the use of processing credit/debit card transactions</p> </li> <li> <p>Describe the clearing of cheques</p> </li> <li> <p>Describe phone banking</p> </li> <li> <p>Describe internet banking, and discuss the advantages and disadvantages of it</p> </li> <li> <p>Describe the contents of information systems in medicine</p> </li> <li> <p>Describe how 3D printers can be used in producing medical aids</p> </li> <li> <p>Describe the files used in libraries</p> </li> <li> <p>Describe the computer processing involved in the issue of books, including the use of direct data entry methods</p> </li> <li> <p>Describe the automatic processing involved in issuing reminders for overdue books</p> </li> </ul> <p><strong>INTRODUCTIONS</strong></p> <p>6.9 Banking applications</p> <p>Banking transactions have now become easier with technology.</p> <p>Especially,</p> <ul> <li> <p>the use of automatic teller machines (ATMs)</p> </li> <li> <p>internet banking</p> </li> <li> <p>telephone banking</p> </li> <li> <p>chip and PIN technology</p> </li> <li> <p>clearing of cheques</p> </li> <li> <p>electronic funds transfer are common examples of it.</p> </li> </ul>
13-IGCSE ICT1-ICT APPLICATIONS 3Quick View
ersintezbasaran

13-IGCSE ICT1-ICT APPLICATIONS 3

(0)
<p><strong>ICT APPLICATIONS PART3</strong></p> <p>6.4. Microprocessors in control applications</p> <p><strong>LEARNING OBJECTIVES</strong></p> <ul> <li> <p>Describe the role of a microprocessor or computer in control applications, including the role of the pre-set value,</p> </li> <li> <p>Describe the use of computer control in applications (e.g. turtle graphics, automatic washing machines, automatic cookers, computer-controlled central heating systems, burglar alarms, computer-controlled glasshouse)</p> </li> </ul> <p><strong>INTRODUCTIONS</strong></p> <p>In control applications, sensors send data to the microprocessor or computer to store incoming data value.</p> <p>The microprocessor/computer will take some action which will ultimately affect the next input value it receives. By the action, they control the application.</p>
16-IGCSE ICT1-ICT APPLICATIONS 6Quick View
ersintezbasaran

16-IGCSE ICT1-ICT APPLICATIONS 6

(0)
<p><strong>ICT APPLICATIONS PART6</strong></p> <p>6.10 expert systems</p> <p>6.13 computers in the retail industry</p> <p>6.14 recognition systems</p> <p>6.15 Monitoring and tracking systems</p> <p>6.16 Satellite systems</p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>Ø Identify a range of applications which use expert systems</p> <p>Ø Identify the components of an expert system</p> <p>Ø Describe how an expert system is used to suggest diagnoses</p> <p>Ø Describe the use of point of sale (POS) terminals, how the stock file is updated automatically, and how new stock can be ordered automatically</p> <p>Ø Describe the use of electronic funds transfer at point of sale (EFTPOS) terminals</p> <p>Ø Describe internet shopping</p> <p>Ø Discuss the advantages and disadvantages of internet shopping</p> <p>Ø Describe how recognition systems work</p> <p>Ø Describe how number plate recognition systems work</p> <p>Ø Describe the processing of cheques</p> <p>Ø Describe the processing of OMR media</p> <p>Ø Describe how RFID is used in a range of applications</p> <p>Ø Describe how a workforce or member of the public can be monitored or logged</p> <p>Ø Describe how the use of cookies can be used to monitor a person’s internet activity</p> <p>Ø Describe the use of key-logging</p> <p>Ø Describe how worker/employee call monitors can be used</p> <p>Ø Describe the use of automatic number plate recognition</p> <p>Ø Describe the use of different satellite systems</p> <p><strong>INTRODUCTIONS</strong></p> <p>6.10 expert systems</p> <p>These systems are used to improve the simulation of expertise and knowledge in a particular field.</p>
6-IGCSE ICT1-STORAGE DEVICES&MEDIA1Quick View
ersintezbasaran

6-IGCSE ICT1-STORAGE DEVICES&MEDIA1

(0)
<p><strong>Storage Devices and Media</strong><br /> 3.1 Backing up of Data<br /> 3.2 Types of Access</p> <p>LEARNING OBJECTIVES</p> <ul> <li>Identify storage devices and their uses, e.g.</li> <li>Describe the advantages and disadvantages of the above devices.</li> </ul> <p>3.1. Backing up of data<br /> 3.1.1. What is backing up of data?<br /> Backing up refers to the copying of files/data to a different medium (disk, tape, flash drive, etc.) in case of a problem with the main secondary storage device.</p>
9-IGCSE ICT1-NETWORKS&THE EFFECTSofUSING THEM2Quick View
ersintezbasaran

9-IGCSE ICT1-NETWORKS&THE EFFECTSofUSING THEM2

(0)
<p>NETWORKS AND THE EFFECTS OF USING THEM</p> <p>4.2. Network Issues and Communication</p> <p>LEARNING OBJECTIVES</p> <p>-Security issues regarding data transfer,</p> <p>-Network communication.</p> <p>4.2.1. Network security</p> <p>There are some security aspects such as hacking, phishing, pharming, and viruses in the digital world. Internet security is also a very important aspect needed to be careful.</p>
10-IGCSE ICT1-THE EFFECTS OF USING ICTQuick View
ersintezbasaran

10-IGCSE ICT1-THE EFFECTS OF USING ICT

(0)
<p><strong>THE EFFECTS OF USING ICT</strong></p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>5.1 The effects of ICT on employment<br /> 5.2 The effects of ICT on working patterns<br /> 5.3 Microprocessor-controlled devices in the home</p> <p><strong>INTRODUCTION</strong></p> <p>The four main areas where ICT has had an effect on employment include:<br /> -Manufacturing like spraying metal items<br /> -Shop work like online shopping<br /> -Banking like ATMs and online banking<br /> -Office work like spreadsheets and word docs</p>
8-IGCSE ICT1-NETWORKS&THE EFFECTSofUSING THEM1Quick View
ersintezbasaran

8-IGCSE ICT1-NETWORKS&THE EFFECTSofUSING THEM1

(0)
<p><strong>NETWORKS AND THE EFFECTS OF USING THEM</strong></p> <p>4.1. Networks</p> <p><strong>LEARNING OBJECTIVES</strong></p> <p>-Understand how a router works and its purpose</p> <p>-Understand the use of other common network devices, including network interface cards, hubs, bridges, switches, modems</p> <p>-Understand the use of WiFi and Bluetooth in networks</p> <p>-Understand how to set up and configure a small network</p> <p>-Understand the characteristics and purpose of common network environments, such as intranets and the internets.</p> <p>INTRODUCTION</p> <p>A Network is which computer system that is connected together in some way.</p> <p>These systems can be either a few computers or devices.</p> <p>It can be either many computers or the internet.</p>
11-IGCSE ICT1-ICT APPLICATIONS 1Quick View
ersintezbasaran

11-IGCSE ICT1-ICT APPLICATIONS 1

(0)
<p><strong>ICT APPLICATIONS PART1</strong></p> <p>6.1. Communication applications</p> <p><strong>LEARNING OBJECTIVES</strong></p> <ul> <li> <p>Describe a range of communication applications</p> </li> <li> <p>Describe the use of mobile phones for communication</p> </li> <li> <p>Describe the use of internet telephony, including Voice Over Internet Protocol (VOIP)</p> </li> <li> <p>Describe applications for publicity and corporate image publications</p> </li> </ul>
7-IGCSE ICT1-STORAGE DEVICES&MEDIA2Quick View
ersintezbasaran

7-IGCSE ICT1-STORAGE DEVICES&MEDIA2

(0)
<p><strong>Storage Devices and Media</strong><br /> 3.3 Secondary Storage Media</p> <p>LEARNING OBJECTIVES</p> <ul> <li>Identify storage devices and their uses, e.g.</li> <li>Describe the advantages and disadvantages of the above devices.</li> </ul> <p>All systems have storage media devices and are simply categorized as Primary storage media and Secondary storage media.</p> <p><strong>Primary storage media</strong></p> <p>Primary storage is commonly referred to as primary memory which is volatile (temporary) such as the RAM which tends to lose data as soon as the computer reboots or loses power.</p> <p><strong>Secondary storage media</strong></p> <p>Secondary storage is used to store data or information on a long-term basis, more like non-volatile (permanently) such as Hard Disk Drives.</p>
5-IGCSE ICT1-INPUT&OUTPUT DEVICES2Quick View
ersintezbasaran

5-IGCSE ICT1-INPUT&OUTPUT DEVICES2

(0)
<p><strong>INPUT AND OUTPUT DEVICES</strong><br /> 2.2. Direct data entry and associated devices</p> <p>LEARNING OBJECTIVES</p> <ul> <li>Describe direct data entry and associated devices, e.g. magnetic and optical readers.</li> <li>Identify the advantages and disadvantages in comparison with others.</li> </ul>