Sunday 29 April 2012

The Big Question

Increased use of ICT has led to changing patterns of employment due to the increased use of ICT

I partially agree with the statement because teleworking has now became an important part of employment for many companies and profesions such as jounalism. Teleworking allows for people to work from home exactly the same way they would work in an office, teleworking can benifit both the worker and the company as it saves the worker money on transport to work and allows them to be more creative in an area they feel comfortable in. However some workers may not be as productive without any supervision and may get easily distracted in their home so will be less productive. This shows that ICT has changed the way people can be employed and the role they can play in the company as ICT allows for more flexibility in both hours worked and the type of job a worker can do.

In addition ICT has improved workforce skills as when a new ICT system is implemented into the workplace to replace an out dated system the staff must be trained in how to correctly use the system so that the ICT system is benificial for them, and does not hinder their performance. Furthermore if a company already has an ICT system then before hiring someone they will make sure that the worker will have the correct qualification, therefore this will encourage more people to achieve qualifications in an effort to improve there skills with ICT which will allow them to excel at work.

Employers can now monitor the workforce using their ICT system this can be a great benifit to the company as they can keep this a secret and find out which workers are not being productive with the use of computers, this then enables the company to disiplin them of find another employe. On the other hand if the company informs the workers of the capability to monitor the work done, this may encourage the workers to be more productive as they feel feel pressured into working as they know they could be being watched, also it will limit the use of personal internet use which can be a major problem.

In conclusion ICT had led to many changes in emplyment and in the workforce as ICT enables simple tasks to be carried out more efficiently and also allows a lot of flexibility in the workplace as ICT allows workers to work for home and share documents with other workers on the ICT system. Finally ICT has changed the patterns of emplyment due to skills being needed to operate the system and the ability to work from home which means you do not need to look local when hiring someone.

Thursday 26 April 2012

Operating Systems

Why do you think that Operarting Systems are necessary in order for a computer to run effectively?

The OS (Operating System) ensures that all the software has access to the different resources it need to run successfully and controls the running and scheduling of all these processes and manages the share of the Central Processing Unit's processing time that is used by the different processes, making the computer run effictively.
Explain four tasks performed by an Operating System?
Functions Of Operating System
Today most operating systems perform the following important functions:
1. Processor management, that is, assignment of processor to different tasks being performed by the computer system.
2. Memory management, that is, allocation of main memory and other storage areas to the system programmes as well as user programmes and data.
3. Input/output management, that is, co-ordination and assignment of the different output and input device while one or more programmes are being executed.
4. File management, that is, the storage of file of various storage devices to another. It also allows all files to be easily changed and modified through the use of text editors or some other files manipulation routines.

5. Establishment and enforcement of a priority system. That is, it determines and maintains the order in which jobs are to be executed in the computer system.
6. Automatic transition from job to job as directed by special control statements.
7. Interpretation of commands and instructions.
8. Coordination and assignment of compilers, assemblers, utility programs, and other software to the various user of the computer system.
9. Facilities easy communication between the computer system and the computer operator (human). It also establishes data security and integrity
There are many different brands of Operating System. Identify four of the most common ones.
Linux
Windows
Lion
IOS
Explain how an Operating System can manage numerous people working at the same time. What is this called?
An operating system can manage numerous people working on at the same time becasue of the following features.

MULTI-USER:This allows one or more user to log into a system. Thus the operating system must contain a user account database, which contains user name, default home directory, user passwords and user right.

MULTIPROCESSING:This allows two or more processes to be used at a time. Here the operating system must decide if it can run the different processes on individual processors. It must also manage the common memory between processors

MEMORY MANAGEMENT:This involves allocating, and often to create a virtual memory for program. Paging which means organizing data so that the program data is loaded into pages of memory. Another method of managing memory is swapping. This involves swapping the content of memory to disk storage.

MULTI-THREADING:Processes are often split into smaller task, named threads. This thread allows smoother operations
Utility programs provide a "toolbox" of common tasks which help the computer to run more effeciently. Identify and explain three utilities that are available.

  • Anti-virus utilities scan for computer viruses.

  • Backup utilities can make a copy of all information stored on a disk, and restore either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental deletion).

  • Data compression utilities output a shorter stream or a smaller file when provided with a stream or file.

  • Disk checkers can scan operating hard drive.
  •  Explain the difference between the three different methods of processing and provide and example of each

    Batch Processing
    •This is a method where the information to be organized is sorted into groups to allow for efficient and sequential processing.

    Online Processing
    •This is a method that utilizes Internet connections and equipment directly attached to a computer. It is used mainly for information recording and research.

    Real-Time Processing
    •This technique has the ability to respond almost immediately to various signals in order to acquire and process information.

    Distributed Processing
    •This method is commonly utilized by remote workstations connected to one big central workstation or server. ATMs are good examples of this data processing method.
    For each of the following tasks that can be performed on a computer, state whether they would be a job for the operating system or an application;




    Controlling the engine management for a car                Application

    Writing a letter                                                                Application

    Backing up the system                                                    Operating System

    Calculating company accounts                                          Application

    Allocating memory to allow programs to run                   Operating System

    Writing a report                                                              Application

    Communication with a partner                                           Application















    Wednesday 18 April 2012

    User Interfaces

    Explain what "user interface" means.

    An interface is a set of commands or menus through which a user communicates with a program. A command-driven interface is one in which you enter commands. A menu-driven interface is one in which you select command choices from various menus displayed on the screen.
    The user interface is one of the most important parts of any program because it determines how easily you can make the program do what you want. A powerful program with a poorly designed user interface has little value. Graphical user interfaces (GUIs) that use windows, icons, and pop-up menus have become standard on personal computers.

    What are the three main types of user interface called?

    Graphical user interface

     is sometimes shortened to GUI. The user chooses an option usually by pointing a mouse at an icon representing that option

    Menu driven interfaces

    The user is offered a simple menu from which to choose an option. One menu often leads to a further menu. Part of the screen may have an instruction followed by a numbered list of options to choose from.

    Command-line interfaces

    A command-line interface allows the user to interact with the computer by typing in commands. The computer displays a prompt, the user keys in the command and presses enter or return.

    Explain what you need to do to use a command line driven U.I


    To get to the command line on your computer click on the Start button, click on Run, then type "cmd" in the run box. You will go to a black box called DOS. You will also see the command line prompt C:>, this is where you type in DOS commands. You can use DOS commands to do just about anything you can do in Windows except it's more work, you can copy, move, del files, etc. To get out of DOS just type Exit at the command prompt. You need to find yourself a book on DOS commands to know how to work it.

    Explain what D.O.S means

    Disk operating System

    Advantages of using a command-line driven U.I

  • Experienced users who know the commands can work very quickly without having to find their way around menus.
  • An advantage of command driven programs is that they do not need the memory and processing power of the latest computer and will often run on lower spec machines.
  • Command driven programs do not need to run in Windows.
  • A command-line interface can run many programs, for example a batch file could launch half a dozen programs to do its task.

  • Disadvantages of using a command-line driven U.I
    • Commands must be typed correctly and in the right order or the command will not work
    • An inexperienced user can sometimes find a command driven program difficult to use because of the number of commands that have to be learnt


    Add of an image of a command line U.I



    Explain how a menu U.I works

    The user is offered a simple menu from which to choose an option. One menu often leads to a further menu. Part of the screen may have an instruction followed by a numbered list of options to choose from.

    A menu bar is the set of options at the top of the screen. When an option is chosen a drop-down menu may be offered.
    Features of menu driven interfaces include:
    • They are easy to use as the user does not have to remember sets of commands.
    • They are user friendly - you can often guess your way around the options.
    • They can be irritating if there are too many levels of menus to move around - with a command-line interface you can go to the option required immediately.
    Windows Media Centre full screen menu, options shown include: music, TV + movies, recorded tv, play dvd, online media

    List the advantages of a Menu driven U.I
  • They are easy to use as the user does not have to remember sets of commands.
  • They are user friendly - you can often guess your way around the options
  • Anybody can use them easily

  • List the disadvantages of a menu driven U.I

  • They can be irritating if there are too many levels of menus to move around - with a command-line interface you can go to the option required immediately.
  • A poorly designed menu interface may be slow to use
  • It can be irritating if there are too many menu screens to work through - users get annoyed or bored if it takes too long.
    menu interface- You often can't go to the exact place you want right at the start. You have to work your way through the menu screens even if you know where you want to get to.
    - The menu can take up a large part of the screen so you have to keep flicking back and forwards between applications
    - If the menu is poorly designed it might be hard to read e.g. writing is too small for people with poor sight, colours might clash and be difficult to read, font style might be hard to read.


  • Image of a menu driven U.I


    Explain how a menu G.U.I works

    A GUI allows the user of a computer to communicate with the computer by moving a pointer around on a screen and clicking a button. There are many ways to move a pointer around the screen. The most common is a "mouse" which has a tiny ball that rolls around on a "mousepad." Sensors keep track of where the mouse moves and translate that into movement onto the computer's screen. Buttons on the mouse tell the computer you want to do something.
    There are other ways to move a pointer around including trackballs, buttons, touchpads, touchscreens, joysticks and video game controllers.
    The computer will do different things depending upon where the pointer is on the screen and how a button is pressed. A program on the computer is constantly checking for the location of the pointer on the screen, any movement of the mouse, and any buttons pressed. It even checks to see how fast they are pressed. This program will decide what the user wanted to do by these actions and try to do it.
    For example, if you move the pointer on the screen over the file menu and press a mouse button you will see a list appear. Moving the pointer down the list to print and clicking again will tell the computer that you want to print a paper copy of this page. It will respond by creating a new dialog box asking you how you want to have the page print out.

    What does W.I.M.P stand for?

    Window, Icon, Menu, Pointing Device

    List the advantage of using a G.U.I

    Advantages
    - it can be user-friendly and speed up the user's work.
    - it can be more attractive for non-technical people.
    - in general, it looks more professional (but this does not mean it is always the best solution).
    List the disadvantage of using a G.U.I

    Disadvantages
    - when it is not properly built, it can be very difficult to work with.
    - it generally requires more memory resources than a non-graphical one.
    - it might require the installation of additional software, e.g., the "runtime environment" in the case of java.
    - depending on the programmer, it might require more time to be implemented
    Image of G.U.I



    What key points should any designer of a U.I take into consideration when they are designing a new one?

    1) Who your audience is? Physicists and Motorcycle lovers are different audiences. How technically saavy is your average user? Your interface should explain itself to the right users.

    2) What exactly are you going to do? How easy it will be for a user to use your system as they desire? A form with 50 buttons on it is a little overwhelming. A web page with 20 modules on it is just noisy.

    3) Will your application need to support more then 1 language?

    4) How hard would it be to make your application a webpage, a gui form and a console application?
    Keep your code for data and logic seperate from the UI.

    Sunday 15 April 2012

    ICT BLOGGER HOMEWORK EASTER




    Networks


    Networks can be made locally or gloabally. A  local network is called a LAN which stands for Locan Area Network.  A global network is called  WAN which stands for Wide Area Network
    There are three types of network connections. Ring Bus and Star

    A Bus Network






    Advantages


  • The bus is simple, reliable in very small networks, easy to use, and easy to understand.


  • The bus requires the least amount of cable to connect the computers together and is therefore less expensive than other cabling arrangements.


  • It is easy to extend a bus. Two cables can be joined into one longer cable with a BNC barrel connector, making a longer cable and allowing more computers to join the network.


  • A repeater can also be used to extend a bus; a repeater boosts the signal and allows it to travel a longer distance.

  • Disadvantage

    Only one computer at a time can send a message; therefore, the number of computers attached to a bus network can significantly affect the speed of the network. A computer must wait until the bus is free before it can transmit.




    A Star Network

     



    Each computer on a star network communicates with a central hub that resends the message either to all the computers (in abroadcast star network) or only to the destination computer (in a switched star network). The hub in a broadcast star network can be active or passive.
    An active hub regenerates the electrical signal and sends it to all the computers connected to it. This type of hub is often called amultiport repeater.


    Advantages


  • It is easy to modify and add new computers to a star network without disturbing the rest of the network. You simply run a new line from the computer to the central location and plug it into the hub. When the capacity of the central hub is exceeded, you can replace it with one that has a larger number of ports to plug lines into.


  • The center of a star network is a good place to diagnose network faults. Intelligent hubs (hubs with microprocessors that implement features in addition to repeating network signals) also provide for centralized monitoring and management of the network.


  • Single computer failures do not necessarily bring down the whole star network. The hub can detect a network fault and isolate the offending computer or network cable and allow the rest of the network to continue operating.


  • You can use several cable types in the same network with a hub that can accommodate multiple cable types.


  •  Disadvantages



  • If the central hub fails, the whole network fails to operate.


  • Many star networks require a device at the central point to rebroadcast or switch network traffic.


  • It costs more to cable a star network because all network cables must be pulled to one central point, requiring more cable than other networking topologies.





  •  A Ring Network




    Every computer is connected to the next computer in the ring, and each retransmits what it receives from the previous computer. The messages flow around the ring in one direction. Since each computer retransmits what it receives, a ring is an active network and is not subject to the signal loss problems a bus experiences.



    Advantages


  • Because every computer is given equal access to the token, no one computer can monopolize the network.


  • The fair sharing of the network allows the network to degrade gracefully (continue to function in a useful, if slower, manner rather than fail once capacity is exceeded) as more users are added.


  • Disadvantages


  • Failure of one computer on the ring can affect the whole network.


  • It is difficult to troubleshoot a ring network.


  • Adding or removing computers disrupts the network.





  • Generic Software

    Generic software is software which many companies make an example of this is a word processor, a spread sheet sorftware and a powerpoint software.

    Generic software include buttons and logos that can be easily recognised so that the use fo the button is clear even if the user has never used this specific software, an example of this would be the save icon as it is the same or very similar on all software.










    Computer Misuse Act

    Data stored electronically is easier to misuse; that software should not be copied without permission; the consequences of software piracy; that hacking can lead to corruption of data, either accidentally or on purpose.

    Types of computer misuse

    Misuse of computers and communications systems comes in several forms:

    Hacking

    Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.

    Data misuse and unauthorised transfer or copying

    Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks, memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.

    Copying and distributing copyrighted software, music and film

    This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations.

    Email and chat room abuses

    Internet services such as chat rooms and email have been the subject of many well-publicised cases of impersonation and deception where people who are online pretend to have a different identity. Chat rooms have been used to spread rumours about well known personalities. A growing area of abuse of the Internet is email spam, where millions of emails are sent to advertise both legal and illegal products and services.

    Pornography

    A lot of indecent material and pornography is available through the Internet and can be stored in electronic form. There have been several cases of material, which is classified as illegal, or which shows illegal acts, being found stored on computers followed by prosecutions for possession of the material.

    Identity and financial abuses

    This topic includes misuse of stolen or fictional credit card numbers to obtain goods or services on the Internet, and use of computers in financial frauds. These can range from complex well thought out deceptions to simple uses such as printing counterfeit money with colour printers.

    Viruses

    Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files.

    The Computer Misuse Act (1990)

    This was passed by Parliament and made three new offences:
    1. Accessing computer material without permission, eg looking at someone else's files.
    2. Accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account.
    3. Altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account.

    The Data Protection Act

    This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.



    Copyright

    Copyright law

    This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the Copyright section.
    There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.


    Weblogs + Social Networks






    What is social networking?

    Social networking sites, while they include the ability to post written material to the web like blogs do, revolve much more around the ability of an individual to build a web "presence" and to create visible links with others in the network. What writing there is on a social networking site is often in computer slang, intended to be "different." These sites often allow the ability to place music, photo, and video content on the site, allowing the individual to showcase their likes and dislikes. A form of text messaging is often included as well, with a history of the messages appearing on the site. Again, all of the features of social networking sites are intended to create social interactions with others.