Information Technology: Howard Campbell
Information Technology: Howard Campbell
Technology
for CSEC® Examinations 2nd Edition
Howard Campbell
Comparing secondary storage media 23 Career opportunities related to the Internet 127
Career opportunities in IT-related industries 127
3 Input and output devices 28
Computer applications in business and industry 127
Data collection basics 29
Computer-aided design 128
Input, input devices and input media 29
Computers in science and technology 129
Input devices in the home 31
Computers in education 130
Input devices in the retail trade 32
Computer applications in recreation and
Output devices 37
entertainment 131
4 The Internet and communications technology 47
Telework – telecommuting and telemarketing 131
Data communication and networks 48
The World Wide Web (WWW) 55
Part 2: Problem-solving and
Communicating globally using network-based tools 57
programming
5 Data storage and manipulation 62
Number systems 63 10 Problem-solving and program design 135
iii
Part 3: Productivity tools 16 Mastering database management 292
Introduction to databases 293
12 Mastering word processing 195
Creating and populating a database 295
Introduction to word processing 196
17 Information integration 336
Creating a document 199
Using data from Microsoft Access in Microsoft Excel 336
Columns and tables 203
Using data from Microsoft Excel in Microsoft
Working with graphics 206
PowerPoint 338
Document editing 208
Perform a mail merge using an external data source 338
Formatting 216
13 Mastering presentations 231 The School-Based Assessment
Presentations 232
18 Mastering the School-Based Assessment 345
Creating a presentation 235
Requirements of the School-Based Assessment 345
14 Mastering web page design 243
Mark allocation 346
Introduction to web page design 244
Some tips to help you master the SBA 346
Creating simple web pages 244
Practice your way to a high SBA score 346
Creating and hosting your own website 248
Key skills and mark allocation 353
15 Mastering spreadsheets 250
Introduction to spreadsheets 251 Answers to multiple-choice questions 356
Features of spreadsheets 252
Creating and setting up your workbook 254
Glossary 357
iv
Page finder
This page finder gives you Syllabus sections
the page number for all
Section 7: Spreadsheets
hardware and software
Section 5: Information
Information Technology
Section 8: Database
Section 3: Program
implications of ICT
syllabus at your fingertips.
implementation
management
processing
design
Objective 1 3 137 170 48 92 196 251 293
Objective 2 6 138 169 53 93 208 252 293
Objective 3 16 139 171 53 95 216 267 293
Objective 4 15 140 184 107 97 221 270 295
Objective 5 23 140 173 109 99 201 261 295
Objective 6 18 141 174 127 100 210 262 298
Objective 7 29 145 175 128 100 203 266 319
Objective 8 37 157 180 126 216 267 302
Objective 9 63 159 185 125 215 259 313
Objective 10 8 183 338 262 313
(within the syllabus sections)
v
About this book
This book isn’t just words on a page.
This book contains a range of different features to introduce, teach and highlight key
11
information throughout the course. These pages explain how to use them. The larger column
contains the main text and diagrams; you can read straight down it without interruption.
The smaller column contains other useful facts, so make sure you use it to check your
understanding. You should remember to spend time studying The computer
the figures and diagrams as well as
the text.
system
A list of objectives at the beginning of
each chapter tells you what topics you will By the end of ✓ define what a computer is
this chapter
be covering. They will help you to plan By the end
✓ describe a general-purpose computer system
✓ define what a computer is
youof should
✓ identify the major components that make up a typical computer system
and measure your learning. this chapter
to: describe a general-purpose computer system
be able ✓
you should
✓ explain
✓ identify the the function
major components thatofmake
the central processing
up a typical unit
computer system
be able to:
explain
✓ explain the
✓ the
function function
of the central of memoryunit
processing
✓ explain the function of memory
✓ explain the function of storage
explain the function of storage
✓ explain the function of input and output devices
✓ ✓ the
explain function of input and output devices
✓ ✓ interpret
interpret thespecifi
the hardware hardware
cationsspecifi cations
of a computer of a computer system.
system.
The concept maps represent knowledge Answers to ITQs ITQ1 (a) A telecommunications
Concept map
ITQ3 (a) Fibre optic; (b) fibre optic;
organisation visually to help you learn technology providing wireless data,
General-purpose (c) twisted pair.
more meaningfully and enhance your Computer Systems
voice and video over long distances; ITQ4 To download multimedia
(b) Digicel; (c) (i) facilitates more
knowledge integration. You can use them commercial activities as e-commerce
content such as music and movies.
include major components ITQ5 Any THREE of: (a) to
as tools to help connect prior knowledge perform major functions
facilities can be made available in
examples communicate using electronic data
with new information. places not served by wired telephone
interchange (b) to publish catalogues
processing input storage service or wired
output CPU: network; (ii) storage:
secondary provides input/output
control
for wholesalers and trade partners
opportunities CD-ROM
forunitthe development of devices
3 • Input and output devices ALU DVD (c) to share training programmes
more innovative products/services. hard disk (d) to provide team collaboration
ITQ2 (a) A hub is a passive flash drives
device, such as
environments.
IT portfolio general-purpose:
switch memory cards
is intelligent; (b) switch
desktops ITQ6 Any THREE of:.biz.com,.info.
forwards data packets between
1 In this activity you will explore printers. laptops primary memory: output devices: name,.net.org,.pro
input devices:
computers
notebooks on one network, ROM router printers keyboard
a Interview at least five persons andforwards find outdata
netbooks the make
packets and
RAM model ofmonitors
between the printer they use. For example, if you
mouse
smartphones PROM speakers microphone
interviewed me, I would tell you computer I use a Samsung
networks. ML-2165W).
multimedia projectors scanner
b Conduct research to get more details about each of the printers based on the make bar code and
readersmodel supplied.
c Copy the following table in your portfolio and complete it. Note that I have completed the first row based on
research done about my printer.
Make & Model Impact or Non-Impact Type Print Speed Print Resolution (dpi)
The expanded IT Portfolio now provides Samsung ML-2165W Non-Impact Laser 21 PPM 1200
more opportunities for you to extend IT portfolio
and reinforce the knowledge and skills 1 This activity will explore the concepts related to data communications and networking.
d Paste a picture of each of the printers.
introduced throughout the chapter. Most a Check out the computer lab at school (make sure to get permission from your teacher before you do so); ask the
2 In this activityquestions:
following you will explore input and output devices.
of the activities involve field or web-based a2 Visiti Are
thethe
webcomputers
site of an networked?
online computer store (www.cdw.com, www.provantage.com or www.newegg.com).
investigations. b Download
ii What types
at least TWO pictures
of cabling of EACH of the following devices.
are used?
i barcode
iii Is there reader
a server? iv optical mouse
iiiv electronic signature
Is the central capture
connecting device
device v wireless
a hub, switch keyboard
or router?
iiiv optical
Is theremark reader
Internet (OMR)
access?
cb Print
Record all the
yourimages
findingsandinpaste
your them into your portfolio, complete with a brief description (make, model, price
portfolio.
2 Inand
thiskey features).
activity you will explore concepts related to Wi-Fi and the Internet. Conduct research (read books, use search
dengines
Compare your
on the Webpictures with at least
and interview twoand
people) other people
record yourin your class.
findings Note
in your the similarities and differences.
portfolio:
a What is the name of the organisation that owns the Wi-Fi trademark?
A wide assortment of game-based and Instructions.indd 1
b When was the term ‘Wi-Fi’ first used commercially?
1/21/14 11:17 AM
Summary
Operational procedures • Data security is all about identifying and assessing computer security risks.
Figure 8.11 Windows Firewall is • A computer security risk is any event, action or situation – intentional or not – that could lead to the loss of
implemented as a software-only file security
Backing up data computer systems and the data they contain.
mechanism and is a component of the It is unwise to rely on a single storage device for storing important data. • Data integrity is concerned with ensuring the accuracy, completeness and internal consistency of the data stored in
operating system. The device and the data it contains may fall prey to one of the accidental or a database.
deliberate actions or events mentioned earlier. To safeguard data, it is good • Physical access restrictions can prevent unauthorised personnel from damaging the computer hardware.
ITQ15 practice to copy data to another storage device or media.
• Access to IT systems can be restricted by requiring all legitimate users to input a valid username and password
List THREE potential threats to a backup Adopting a regular backup system such as the Grandfather-Father-Son
before being able to gain access to the system.
media? System means that if disaster should strike the organisation can recover almost
all of its data quickly and business can continue as usual. It is important to • A firewall acts as a barrier between a computer system and an external network.
keep each generation of backup separate from the rest. The son can be kept • Encryption, overwrite protection, password, and making a file read-only access are mechanisms that may be used
in the computer room, the father in a fireproof cabinet and the grandfather to help maintain file integrity.
A backup is a safety copy of files that can be
in another building. For a fast-moving business backups may be taken every • Individual files can be protected using encryption techniques that require the reader to have a correct password to
used to recover data in case of an event that
causes data damage or loss. day rather than every week. If a hard disk drive fails the most recent backup, decrypt the file.
the son, can be used to restore the data. In the event of a fire in the computer
• Viruses, Trojans and worms are malicious program that may infect and do harm to a computer system and its data;
room destroying the son backup and the computer system, the father backup
up-to-date antivirus software can protect computer systems from virus attacks.
can be used to restore the company data. In the worst case, a whole building
may be flooded but the grandfather backup can still be used to restore the data. • Computer fraud involves the use of computers to illegally obtain money, goods or services. There are many types
of computer fraud including identity theft, credit card fraud, electronic eavesdropping and surveillance.
(a) (b) • Backups are copies of files that can be restored in the event that the original files are lost through hardware failure,
accidental deletion or computer fraud whereas an archive comprises the files created, received and accumulated
over time and retained for historical use.
Answers to ITQs ITQ1 The following are SOME ITQ2 (a) The file containing
possible situations: (a) hard disk the credit card details OR the file
failure caused by intermittent power containing the student’s assignment.
outages causes partial data loss; (b) (b) The file with credit card details
hard disk failure caused by a power may have been accidentally selected
surge causes total data loss; (c) laptop and copied to the USB drive; the file
containing the data is stolen from a with the assignment may have been
parked motor vehicle; (d) the file with intentionally copied to the USB flash
the data is copied by an unauthorised drive by the accounting clerk. (c) Any
person without the knowledge of the reasonable explanation consistent
Figure 8.13 (a) The Backup or Restore tool is one of the Windows operating system accessories. (b) A user may choose what to back up and also owner; (e) an employee copies data with the answer in (b).
what device to store the data on. from the file for his/her personal use.
118 119
vii
8 Data security
Concept map
Data
misuse:
computer fraud laws software restrictions: hardware access procedures:
credit card fraud encryption restrictions: archiving
electronic eavesdropping firewall biometric systems backup and recovery
identity theft overwrite protection guards disaster recovery mechanisms
industrial espionage passwords locks
propaganda read-only access fire/waterproof cabinets
software piracy restricted access
storage of inaccurate information virus protection
surveillance
violation of privacy
computer security risk ❯ A computer security risk is any event, action or situation – intentional or
not – that could lead to the loss of computer systems and the data they contain.
Data security allows individuals and organisations to assess the risks
to which their computer systems and data is exposed, and determine and
implement suitable countermeasures. It is important that an organisation
protects its data adequately. Data that is damaged, lost, stolen or misused can
cost the business money, its reputation or even the life of the business itself.
The business may eventually have to close!
108