ICT - 2 - ICTweb

Download Report

Transcript ICT - 2 - ICTweb

AS LEVEL ICT – MODULE 2
Revision Slides
Introduction to Computer
Systems
Components of a computer
Input & Output devices
Processor
Memory
Storage
ASCII
Data Capture
Keyboard entry
Voices entry
Key to disk systems
Mouse, joystick, light pen & touch screen
MICR
Smart Cards
Magnetic Stripe
Bar Codes
Validation & Verification
Data Capture
Types of error
Batch processing
Validation checks
Presence Check
Format check
Check Digit
Range check
File lookup check
Verification
Detecting
transmission errors
Accuracy and validity
Introduction to Databases
What is a database
Problems with flat
files
Retrieving information
Redundant data
from a database
Errors on input
Flat files
Problems with
modifying data
Problems with
updating data
Relational Databases
Using multiple tables
Putting data in correct tables
Significance of field types
Primary Key
Tables, Forms, Queries &
Reports
Tables
Forms
Queries
Reports
Selecting a suitable output format
Systems Software
What is an operating system
Functions of an operating system
Utility programs
The DOS operating system
Command-driven interface
Graphical user interface
DOS / Windows / UNIX / LINUX
Categories of Software
Systems software
Applications software
General purpose software
Integrated packages
Generic & specific software
Generic Software
Word Processing
Spreadsheets
Databases
Electronic Mail
Presentation Graphics
Application generators
Report generators
Web browsers
Capabilities of Software
Object linking & embedding
The need for portability of data
Problems with portability
Upgradability
Criteria for selecting a software package
Evaluating software
Software reliability
Modes of Processing
Transactions
Master & transaction files
Batch processing
Interactive processing
Real time & pseudo real time processing
Criteria for choice of processing mode
Processing Different Types
of Data
Representing numbers
Real numbers
Digitised sound
MIDI
Bit-mapped graphics
Vector graphics
Storage Devices
Primary & secondary
sources
File processing
concepts
Floppy & ZIP disks
How data is stored
Hard disks
Magnetic tape
CD ROM
WORM disks
Magneto-optical disks
Microfiche
Security of Data
Issues of privacy
Threats of
information systems
Data Integrity
Standard clerical
procedures
Write-protecting disks
User ID’s &
passwords
Access rights
Securing against
fraudulent use
Protection against
viruses
Biometrics
Communications
security
Disaster Planning
Backup
Periodic backup
Backup strategies
Backup hardware
Backing up on line databases
Factors in a backup strategy
Recovery procedures
Output Devices
Printers
Dot Matrix
Ink jet
Laser
Plotters
VDU
Communicating with
the CPU
Parallel & serial
transmission
Buffering
Spooling
Installing hardware
devices
Network Environments
Advantages &
disadvantages of
LANs
Server vs. Peer to
peer networks
Wide Area Networks
Communications links
Communications
media
ISDN lines
Bridges & gateways
Modems
Synchronous and
asynchronous
transmission
Protocol
Factors affecting
transmission speed
User Interfaces
Importance of good
interface design
Designing usable
systems
Interface styles
Command line
interface Menus
Natural Language
Forms & dialogue
boxes
WIMP interface
Advantaged of a
command user
interface
Speech input
Speech / sound
output