Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
WJEC GCSE ICT: Revise and Test Guide Unit 3 12 Organisations Key Word Finder Find the following key words in this chapter and write your own definition of each in the boxes. ATM Expert System Access Rights Bionics Revision Map Page 1 of 3 WJEC ICT Revision Guide Unit 1 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 Add more stems to this revision map to note down what you learn in this chapter. Banking Data Protection Control Organisations AI Payroll ecommerce 12.1 Banking Revise it ICT is used in banking for tasks like withdrawing cash and online account management. Data is input, processed and output in the following ways in banking: Page 2 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 •Cheques are printed in magnetic ink and are scanned in using magnetic ink character recognition (MICR) to capture details like bank account number and sort code accurately. •ATMs (Automatic Teller Machines) are cashpoints where you can withdraw money. You insert your debit card into a chip and PIN reader. You key in a PIN (personal identification number) and the amount required using a keyboard. Input Processing Output •Cheques are bundled together at the end of each day and the bank will then start the process of transferring money to your account. This is an example of batch processing. • With ATMs, the customer can withdraw money within a few seconds. This is nearly realtime processing, but not quite because there is a bit of a delay. It is instead a form of real-time transaction processing. •With cheques, the amount stated on the cheque is reprinted using special magnetic ink. This requires a special type of magnetic ink printer. •With ATMs, you can view your balance on the ATM screen. There is also a receipt printer where you can get a printout of the balance currently in your account. •You can also transfer money online using a normal computer and the Internet. You can output account details on your computer screen or print transactions. Databases: In online banking, databases may contain the following fields: bank account number, sort code, customer name, customer address, transaction amount. Software: Transactions can be downloaded from online banking and a spreadsheet can be used to store data, perform calculations and create graphs or charts. Verification: When writing a cheque, the customer visually checks the amount is correct. Double keying may be needed before sending big amounts of money. Validation: Since batch processing is used for cheques, a batch total check may be used. In online banking, a format check may check that usernames are entered correctly. Security: In online banking, customer details are encrypted to stop them being intercepted by hackers. All accounts are password protected. Backup: A bank may use two computer systems – one spare to takeover if the other fails. Test it 1. Give two types of processing used in banking and an appropriate use for each. (4 marks) 2. Explain three fields which would be required in a customer database for a bank. (6 marks) Page 3 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.2 E-Commerce Revise it E-commerce is buying or selling online using a computer. Data is input, processed and output in the following ways in e-commerce (Internet businesses): Input Processing Output The customer enters their details and selects the products they want by using a keyboard/mouse. Real-time transaction processing is used to approve the debit card payments. A receipt will be sent via email to the customer. This can be viewed on screen or printed by the customer. Databases: In e-commerce, databases may contain the following fields: product ID, product name, quantity, size, colour, customer address, customer name, payment method. Software: An email client will be needed to view the receipt and a web browser is needed to view the e-commerce site. Verification: When creating an account on a shopping site, it is likely that double keying of important fields like email address and password will be required. Validation: Presence checks will make sure that fields such as password are not left blank. For some age-restricted goods like alcohol, a range check on the date of birth is needed. Security: Normally, debit card details are sent via an encrypted, secure server. This starts with https:// not http:// in the web browser address bar (the ‘s’ stands for secure). Backup: Backups of all orders may be kept on a separate computer in a different location. E-commerce means businesses which are trading on the Internet. Many shops who trade on the high street also trade online. Test it 3. Explain what is meant by e-commerce. (2 marks) 4. State three fields that would be contained in a database for a clothes shop. (3 marks) Page 4 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.3 Payroll and Mail Handling Revise it Payroll software works out what wages to pay employees depending on the hours worked and what tax needs to be paid to the government. Mail handling is using a computer to send to personalised letters to customers automatically. It is also known as mail merge. Data is input, processed and output in the following ways in payroll and mail handling: Input •In payroll, hours worked are typed using a keyboard. Optical mark recognition (OMR) can also scan in the hours worked from paper timesheets. •In mail handling, customer details can be input by the customer on the Internet, or typed in by a company employee using a keyboard. Processing •In payroll, all of the timesheets will be batch processed at the end of the month or week in order to calculate wages. •In mail handling, a query will be used to find all customers satisfying certain criteria (e.g. not ordered in six months). •A payroll system will output a payslip using a printer. This will contain information about what tax or national insurance contributions have been taken. •The output of a mail handling system is a mail merged letter, which is printed and sent to customers' homes. Output Databases: In payroll, the database will use fields like: national insurance number, date of birth, employee name. In mail handling it will use: customer name, address, order date. Software: Specialised payroll software packages or spreadsheets are used for payroll. Word processing or desktop publishing software can be used for mail handling. Verification: In payroll, a batch total can be used to check all timesheets have been processed. In mail handling, a visual check of the address details is needed. Validation: In payroll, a data type check can ensure that all hours are number and all wages are currency. In mail handling, format checks can check the postcode. Security: Access rights (usernames with different privileges) are used in both organisations to ensure that only employees who need to see the data are able to view it. Backup: Backups could be made to a computer in a different location. Test it 5. Give two input devices used in payroll systems. (2 marks) 6. Give three fields used in a mail handling database. (3 marks) Page 5 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.4 Control Processes (Feedback) and Robotics/Bionics Revise it Control systems using feedback are systems where the output affects the input. Robotics involves devices which are programmed to do things by giving them a set of instructions. Bionics is often used alongside robotics. This is where nature is used when designing modern technology. Robotics arms can be built, for example, by trying to copy the muscles which make human arms work. Here is one example of the input, processing and output involved in a feedback control system of a robotic arm. In this example, a safety feedback system stops the robotic arm moving if someone comes near it. This is called a feedback loop because this process will be repeated – or looped – hundreds of times per second when the arm is moving. Robotic arms are used in manufacturing. Input •Passive infrared (PIR) sensors in the robotic arm will tell the computer if it is near an object. Output Processing •If the computer tells it to, the robotic arm will continue to move by a very small amount using a motor output device. •The computer will decide whether to continue moving the arm depending on whether it is near an object. For safety, real-time processing is required here. The advantages of using robots/bionics in control systems are: o Robots do not take breaks and can work 24 hours a day. o They do not need to be constantly paid wages. o Jobs can be carried out with greater accuracy and in dangerous situations. The disadvantages are: o There is a high initial cost of robotics in factories. o Even though some staff to maintain robots are needed, assembly line jobs will be lost. Test it 7. Explain what is meant by the term robotics. (2 marks) 8. Explain what is meant by the term bionics. (2 marks) Page 6 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.5 Artificial Intelligence (AI) and Expert Systems Revise it Artificial intelligence, or AI for short, is a type of computer program that tries to give machines human-like intelligence (learning from different experiences, for example). Expert systems use artificial intelligence to try to make decisions. Expert systems can be used for a variety of different things. Here is one example of an expert system used for medical diagnosis: Input A patient is asked textual questions by the expert system's user interface. The patient then gives replies to the computer system using a keyboard. Processing Each answer will probably be sent using real-time transaction processing. The computer can change the questions it asks depending on the answer to previous questions. The computer will use the answers to search its huge knowledge base of illnesses. It will use an inference engine to make diagnosis decisions based on sets of rules. Output The diagnosis can be returned with along with a probability percentage depending on how sure the computer is of the answer. This will probably be displayed on a normal computer monitor or can be printed. The computer can send the patient to a human GP if it thinks it is necessary. Databases: In a medical expert system, some possible fields are: height, weight, BMI, number of alcohol units consumed per week, cigarettes smoked per day. Software: Expert systems used in medicine can sometimes be accessed by a normal Internet browser program. Verification: GIGO (Garbage In, Garbage Out) is important here. A visual check by the patient is required to make sure that the symptoms entered are accurate – if not, the diagnosis will be inaccurate. Validation: Range checks can make sure that sensible heights and weights are entered. Security: Different usernames and passwords will be needed because medical information is covered by the Data Protection Act. Backup: Backups could be made to a remote server in a different location. Test it 9. Explain the three components of an expert system in a medical context. (6 marks) 10. Explain what is meant by an expert system. (2 marks) Page 7 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.6 Data Protection Methods Revise it A lot of personal and important information can be stored using networks. It is necessary to use data protection methods to make sure that all data is kept safe and secure. There are four methods of data protection you need to know: Physical protection Backup copies of all data can be made in case the original is lost or destroyed. Data can be sent to another computer via the Internet automatically. Restricted physical access Biometric scans of retinas or fingerprints can be used to stop people gaining unauthorised access to rooms containing computers with important data. Restricted access to data Monitoring Transaction logs will store information about everything that has happened on a system. This deters people from committing computer crimes. Using access rights people can do different tasks depending on their username. Some people can only read data whilst others can write data. •A hierarchy of passwords or access rights makes sure that employees can only change things which are vital to their job. Only managers will be able to see and change everything. • Encryption scrambles data going over the Internet. If it gets stolen, thieves cannot understand encrypted data. When planning backups, the following is important: medium (type of storage), frequency (how often it takes place) and role (who does the backup). Test it 11. Explain what is meant by encryption and explain why this is a suitable method of data protection. (4 marks) 12. Explain what is meant by a backup. (2 marks) Page 8 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011 WJEC GCSE ICT: Revise and Test Guide Unit 3 12.1 Banking 38. Real-time transaction (1 mark) for ATM withdrawals (1 mark); batch (1 mark) for cheque clearance (1 mark). 39. Up to six (3x state field, 3x reason for field), e.g. account number (1 mark) is a unique identifier (1 mark); address (1 mark) to send statements (1 mark); sort code (1 mark) to know where account was opened (1 mark). 40. Businesses which are trading (1 mark) on the Internet (1 mark). 41. One mark per suitable field to three marks max, e.g. product ID, product name, quantity, size, colour, customer address, customer name, payment method. 42. Keyboard (1 mark); OMR (1 mark). 43. Any three suitable fields (1 mark each up to a maximum of three marks), e.g. customer name, address, last order date. 44. A programmable device (1 mark) by giving a set of instructions (1 mark). 45. Use human nature (1 mark) to help design technology (1 mark). 12.2 E-commerce 12.3 Payroll and Mail Handling 12.4 Control Topic 12.5 Expert Systems 12.6 Data Protection Methods Answers 46. Up to six: knowledge base (1 mark) of illnesses (1 mark); inference engine (1 mark) for diagnosis (1 mark); user interface (1 mark) to enter symptoms (1 mark). 47. Uses artificial intelligence (1 mark) to aid decision-making (1 mark). 48. Scrambles data (1 mark) being transferred over the Internet (1 mark); data cannot be read (1 mark) if stolen or intercepted (1 mark). 49. A copy of data (1 mark) in case the original is lost (1 mark). Page 9 of 3 WJEC ICT Revision Guide Unit 3 © ZigZag Education 2011