Download Revision Resources File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Data (Star Trek) wikipedia , lookup

Computer vision wikipedia , lookup

Pattern recognition wikipedia , lookup

Time series wikipedia , lookup

Transcript
WJEC GCSE ICT: Revise and Test Guide Unit 3
12 Organisations
Key Word Finder
Find the following key words in this chapter and write your own definition of each in the boxes.
ATM
Expert System
Access Rights
Bionics
Revision Map
Page 1 of
3
WJEC ICT Revision Guide Unit 1
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
Add more stems to this revision map to note down what you learn in this chapter.
Banking
Data
Protection
Control
Organisations
AI
Payroll
ecommerce
12.1 Banking
Revise it


ICT is used in banking for tasks like withdrawing cash and online account management.
Data is input, processed and output in the following ways in banking:
Page 2 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
•Cheques are printed in magnetic ink and are scanned in using magnetic ink character
recognition (MICR) to capture details like bank account number and sort code
accurately.
•ATMs (Automatic Teller Machines) are cashpoints where you can withdraw money. You
insert your debit card into a chip and PIN reader. You key in a PIN (personal
identification number) and the amount required using a keyboard.
Input
Processing
Output






•Cheques are bundled together at the end of each day and the bank will then start the
process of transferring money to your account. This is an example of batch processing.
• With ATMs, the customer can withdraw money within a few seconds. This is nearly realtime processing, but not quite because there is a bit of a delay. It is instead a form of
real-time transaction processing.
•With cheques, the amount stated on the cheque is reprinted using special magnetic ink.
This requires a special type of magnetic ink printer.
•With ATMs, you can view your balance on the ATM screen. There is also a receipt
printer where you can get a printout of the balance currently in your account.
•You can also transfer money online using a normal computer and the Internet. You can
output account details on your computer screen or print transactions.
Databases: In online banking, databases may contain the following fields: bank account
number, sort code, customer name, customer address, transaction amount.
Software: Transactions can be downloaded from online banking and a spreadsheet can be
used to store data, perform calculations and create graphs or charts.
Verification: When writing a cheque, the customer visually checks the amount is correct.
Double keying may be needed before sending big amounts of money.
Validation: Since batch processing is used for cheques, a batch total check may be used. In
online banking, a format check may check that usernames are entered correctly.
Security: In online banking, customer details are encrypted to stop them being intercepted
by hackers. All accounts are password protected.
Backup: A bank may use two computer systems – one spare to takeover if the other fails.
Test it
1. Give two types of processing used in banking and an appropriate use for each. (4 marks)
2. Explain three fields which would be required in a customer database for a bank. (6 marks)
Page 3 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.2 E-Commerce
Revise it


E-commerce is buying or selling online using a computer.
Data is input, processed and output in the following ways in e-commerce (Internet businesses):
Input
Processing
Output
The customer enters their
details and selects the
products they want by using
a keyboard/mouse.
Real-time transaction
processing is used to
approve the debit card
payments.
A receipt will be sent via
email to the customer. This
can be viewed on screen or
printed by the customer.






Databases: In e-commerce, databases may contain the following fields: product ID,
product name, quantity, size, colour, customer address, customer name, payment method.
Software: An email client will be needed to view the receipt and a web browser is needed
to view the e-commerce site.
Verification: When creating an account on a shopping site, it is likely that double keying of
important fields like email address and password will be required.
Validation: Presence checks will make sure that fields such as password are not left blank.
For some age-restricted goods like alcohol, a range check on the date of birth is needed.
Security: Normally, debit card details are sent via an encrypted, secure server. This starts
with https:// not http:// in the web browser address bar (the ‘s’ stands for secure).
Backup: Backups of all orders may be kept on a separate computer in a different location.
E-commerce means businesses
which are trading on the Internet.
Many shops who trade on the
high street also trade online.
Test it
3. Explain what is meant by e-commerce. (2 marks)
4. State three fields that would be contained in a database for a clothes shop. (3 marks)
Page 4 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.3 Payroll and Mail Handling
Revise it

Payroll software works out what wages to pay employees depending on the hours worked and
what tax needs to be paid to the government.
Mail handling is using a computer to send to personalised letters to customers automatically. It is
also known as mail merge.
Data is input, processed and output in the following ways in payroll and mail handling:


Input
•In payroll, hours worked are typed using a keyboard. Optical mark
recognition (OMR) can also scan in the hours worked from paper
timesheets.
•In mail handling, customer details can be input by the customer on
the Internet, or typed in by a company employee using a keyboard.
Processing
•In payroll, all of the timesheets will be batch processed at the end
of the month or week in order to calculate wages.
•In mail handling, a query will be used to find all customers
satisfying certain criteria (e.g. not ordered in six months).
•A payroll system will output a payslip using a printer. This will
contain information about what tax or national insurance
contributions have been taken.
•The output of a mail handling system is a mail merged letter,
which is printed and sent to customers' homes.
Output






Databases: In payroll, the database will use fields like: national insurance number, date of
birth, employee name. In mail handling it will use: customer name, address, order date.
Software: Specialised payroll software packages or spreadsheets are used for payroll.
Word processing or desktop publishing software can be used for mail handling.
Verification: In payroll, a batch total can be used to check all timesheets have been
processed. In mail handling, a visual check of the address details is needed.
Validation: In payroll, a data type check can ensure that all hours are number and all
wages are currency. In mail handling, format checks can check the postcode.
Security: Access rights (usernames with different privileges) are used in both organisations
to ensure that only employees who need to see the data are able to view it.
Backup: Backups could be made to a computer in a different location.
Test it
5. Give two input devices used in payroll systems. (2 marks)
6. Give three fields used in a mail handling database. (3 marks)
Page 5 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.4 Control Processes (Feedback) and Robotics/Bionics
Revise it




Control systems using feedback are systems where the output affects
the input.
Robotics involves devices which are programmed to do things by
giving them a set of instructions.
Bionics is often used alongside robotics. This is where nature is used
when designing modern technology. Robotics arms can be built, for
example, by trying to copy the muscles which make human arms work.
Here is one example of the input, processing and output involved in a
feedback control system of a robotic arm. In this example, a safety
feedback system stops the robotic arm moving if someone comes
near it. This is called a feedback loop because this process will be
repeated – or looped – hundreds of times per second when the arm is
moving.
Robotic arms are used
in manufacturing.
Input
•Passive infrared (PIR) sensors in
the robotic arm will tell the
computer if it is near an object.


Output
Processing
•If the computer tells it to, the
robotic arm will continue to move
by a very small amount using a
motor output device.
•The computer will decide whether to
continue moving the arm depending on
whether it is near an object. For safety,
real-time processing is required here.
The advantages of using robots/bionics in control systems are:
o Robots do not take breaks and can work 24 hours a day.
o They do not need to be constantly paid wages.
o Jobs can be carried out with greater accuracy and in dangerous situations.
The disadvantages are:
o There is a high initial cost of robotics in factories.
o Even though some staff to maintain robots are needed, assembly line jobs will be
lost.
Test it
7. Explain what is meant by the term robotics. (2 marks)
8. Explain what is meant by the term bionics. (2 marks)
Page 6 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.5 Artificial Intelligence (AI) and Expert Systems
Revise it

Artificial intelligence, or AI for short, is a type of computer program that tries to give
machines human-like intelligence (learning from different experiences, for example).
Expert systems use artificial intelligence to try to make decisions.
Expert systems can be used for a variety of different things. Here is one example of an
expert system used for medical diagnosis:


Input
A patient is asked textual questions by the expert system's user interface. The patient then gives
replies to the computer system using a keyboard.
Processing
Each answer will probably be sent using real-time transaction processing. The computer can
change the questions it asks depending on the answer to previous questions. The computer will
use the answers to search its huge knowledge base of illnesses. It will use an inference engine
to make diagnosis decisions based on sets of rules.
Output
The diagnosis can be returned with along with a probability percentage depending on how sure
the computer is of the answer. This will probably be displayed on a normal computer monitor or
can be printed. The computer can send the patient to a human GP if it thinks it is necessary.






Databases: In a medical expert system, some possible fields are: height, weight, BMI,
number of alcohol units consumed per week, cigarettes smoked per day.
Software: Expert systems used in medicine can sometimes be accessed by a normal
Internet browser program.
Verification: GIGO (Garbage In, Garbage Out) is important here. A visual check by the
patient is required to make sure that the symptoms entered are accurate – if not, the
diagnosis will be inaccurate.
Validation: Range checks can make sure that sensible heights and weights are entered.
Security: Different usernames and passwords will be needed because medical information
is covered by the Data Protection Act.
Backup: Backups could be made to a remote server in a different location.
Test it
9. Explain the three components of an expert system in a medical context. (6 marks)
10. Explain what is meant by an expert system. (2 marks)
Page 7 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.6 Data Protection Methods
Revise it

A lot of personal and important information can be stored using networks. It is necessary
to use data protection methods to make sure that all data is kept safe and secure. There
are four methods of data protection you need to know:
Physical protection
Backup copies of all data can
be made in case the original is
lost or destroyed. Data can be
sent to another computer via
the Internet automatically.
Restricted physical
access
Biometric scans of retinas or
fingerprints can be used to
stop people gaining
unauthorised access to rooms
containing computers with
important data.
Restricted access to data
Monitoring
Transaction logs will store
information about everything
that has happened on a
system. This deters people
from committing computer
crimes.
Using access rights people
can do different tasks
depending on their
username. Some people can
only read data whilst others
can write data.
•A hierarchy of passwords or
access rights makes sure that
employees can only change
things which are vital to their
job. Only managers will be able
to see and change everything.
• Encryption scrambles data
going over the Internet. If it
gets stolen, thieves cannot
understand encrypted data.
When planning backups, the
following is important:
medium (type of storage),
frequency (how often it takes
place) and role (who does the
backup).
Test it
11. Explain what is meant by encryption and explain why this is a suitable method of data
protection. (4 marks)
12. Explain what is meant by a backup. (2 marks)
Page 8 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011
WJEC GCSE ICT: Revise and Test Guide Unit 3
12.1 Banking
38. Real-time transaction (1 mark) for ATM withdrawals (1 mark); batch (1
mark) for cheque clearance (1 mark).
39. Up to six (3x state field, 3x reason for field), e.g. account number (1
mark) is a unique identifier (1 mark); address (1 mark) to send statements
(1 mark); sort code (1 mark) to know where account was opened (1 mark).
40. Businesses which are trading (1 mark) on the Internet (1 mark).
41. One mark per suitable field to three marks max, e.g. product ID, product
name, quantity, size, colour, customer address, customer name, payment
method.
42. Keyboard (1 mark); OMR (1 mark).
43. Any three suitable fields (1 mark each up to a maximum of three marks),
e.g. customer name, address, last order date.
44. A programmable device (1 mark) by giving a set of instructions (1 mark).
45. Use human nature (1 mark) to help design technology (1 mark).
12.2 E-commerce
12.3 Payroll and
Mail Handling
12.4 Control
Topic
12.5 Expert
Systems
12.6 Data
Protection
Methods
Answers
46. Up to six: knowledge base (1 mark) of illnesses (1 mark); inference engine (1
mark) for diagnosis (1 mark); user interface (1 mark) to enter symptoms (1 mark).
47. Uses artificial intelligence (1 mark) to aid decision-making (1 mark).
48. Scrambles data (1 mark) being transferred over the Internet (1 mark); data
cannot be read (1 mark) if stolen or intercepted (1 mark).
49. A copy of data (1 mark) in case the original is lost (1 mark).
Page 9 of
3
WJEC ICT Revision Guide Unit 3
© ZigZag Education 2011