information technology for csec® examinations · pp32(b), 46(fig 2), getty/marek mnich p31(lc),...

9
Information Technology for CSEC ® Examinations 2nd Edition Howard Campbell CSEC ® is a registered trade mark of the Caribbean Examination Council (CXC). INFORMATION TECHNOLOGY for CSEC ® EXAMINATIONS SECOND EDITION is an independent publication and has not been authorized, sponsored, or otherwise approved by CXC.

Upload: trandan

Post on 17-Jun-2018

237 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

Information Technologyfor CSEC® Examinations 2nd Edition

Howard Campbell

CSEC® is a registered trade mark of the Caribbean Examination Council (CXC). INFORMATION TECHNOLOGY for CSEC® EXAMINATIONS SECOND EDITION is an independent publication and has not been authorized, sponsored, or otherwise approved by CXC.

Page 2: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

ISBN 978-0-230-48336-1 AER

Macmillan Education4 Crinan Street, London, N1 9XWA division of Macmillan Publishers Limited

Companies and representatives throughout the world.

www.macmillan-caribbean.com

ISBN: 978-0-230-42694-8 AER

Text © Howard Campbell 2014Design and illustration © Macmillan Publishers Limited 2014The author has asserted his rights to be identified as the author of this work in accordance with the Copyright, Design and Patents Act 1988.

First published 2010 This edition published 2014

All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, transmitted in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers.

Typeset by E Clicks Enterprise, MalaysiaDesigned by Macmillan EducationIllustrated by TechTypeCover design by Clare WebberCover image by Corbis/JGI/Jamie Grill/Blend Images and Devon ShawPicture research by Catherine Dunn

The author and publishers would like to thank the following consultants and education professionals for their contribution to this edition:Consultants: Keith Burkette (St. Mary’s College, Trinidad and Tobago), Gareth Byrne (UK) and Alan Wood (UK)Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Kesha Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Michael ScottSpecial thanks to Channyatt Bullock-Ramsamooj, Ministry of Education, St. Vincent and the Grenadines, for facilitating a team review.

The author and publishers would like to thank the following for permission to reproduce their photographs:

Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8, Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/ Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i), Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc), Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl), Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35; Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a division of Macmillan Publishers Ltd p58(cr); Science Photo Library p51, Science Photo Library/CHASSENET p37(blt), Science Photo Library/DAVID PARKER p129, Science Photo Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl), SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108; Theyummytruth.com – a great combination of eye-grabbing imagery and easy-to-navigate functionality p58(cl).

These materials may contain links for third party websites. We have no control over, and are not responsible for, the contents of such third party websites. Please use care when accessing them.

Macmillan Education4 Crinan Street, London, N1 9XWA division of Macmillan Publishers Limited

Companies and representatives throughout the world.

www.macmillan-caribbean.com

ISBN: 978-0-230-42694-8 AER

Text © Howard Campbell 2014Design and illustration © Macmillan Publishers Limited 2014The author has asserted his rights to be identified as the author of this work in accordance with the Copyright, Design and Patents Act 1988.

First published 2010 This edition published 2014

All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, transmitted in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers.

Typeset by E Clicks Enterprise, MalaysiaDesigned by Macmillan EducationIllustrated by TechTypeCover design by Clare WebberCover image by Corbis/JGI/Jamie Grill/Blend Images and Devon ShawPicture research by Catherine Dunn

The author and publishers would like to thank the following consultants and education professionals for their contribution to this edition:Consultants: Keith Burkette (St. Mary’s College, Trinidad and Tobago), Gareth Byrne (UK) and Alan Wood (UK)Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Kesha Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Michael ScottSpecial thanks to Channyatt Bullock-Ramsamooj, Ministry of Education, St. Vincent and the Grenadines, for facilitating a team review.

The author and publishers would like to thank the following for permission to reproduce their photographs:

Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8, Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/ Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i), Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc), Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl), Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35; Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a division of Macmillan Publishers Ltd p58(cr); Science Photo Library p51, Science Photo Library/CHASSENET p37(blt), Science Photo Library/DAVID PARKER p129, Science Photo Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl), SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108; Theyummytruth.com – a great combination of eye-grabbing imagery and easy-to-navigate functionality p58(cl).

These materials may contain links for third party websites. We have no control over, and are not responsible for, the contents of such third party websites. Please use care when accessing them.

Macmillan Education4 Crinan Street, London, N1 9XWA division of Macmillan Publishers Limited

Companies and representatives throughout the world.

www.macmillan-caribbean.com

ISBN: 978-0-230-42694-8 AER

Text © Howard Campbell 2014Design and illustration © Macmillan Publishers Limited 2014The author has asserted his rights to be identified as the author of this work in accordance with the Copyright, Design and Patents Act 1988.

First published 2010 This edition published 2014

All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, transmitted in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers.

Typeset by E Clicks Enterprise, MalaysiaDesigned by Macmillan EducationIllustrated by TechTypeCover design by Clare WebberCover image by Corbis/JGI/Jamie Grill/Blend Images and Devon ShawPicture research by Catherine Dunn

The author and publishers would like to thank the following consultants and education professionals for their contribution to this edition:Consultants: Keith Burkette (St. Mary’s College, Trinidad and Tobago), Gareth Byrne (UK) and Alan Wood (UK)Teachers: Jamaica: Huntley Anderson, Shawnette Dewar, Kesha Fraser, Meleseia Hawthorne, Janice Jones, Haidie Morant, Aggrie Osbourne; St. Vincent: Sherricea Burgin, Soyini Clarke-Palmer, Sheddie Conliff, Veneisha Daniel, Suzanna Leigertwood Ollivierre, Michael ScottSpecial thanks to Channyatt Bullock-Ramsamooj, Ministry of Education, St. Vincent and the Grenadines, for facilitating a team review.

The author and publishers would like to thank the following for permission to reproduce their photographs:

Alamy/Art Directors & TRIP p41(b), Alamy/Pashkov Andrey p22(br), Alamy/Art Directors & TRIP p23, Alamy/Ted Foxx p39(a), Alamy/David Hancock p115(tcl), Alamy/Jiri Hera p8, Alamy/ D. Hurst p116(cl), Alamy/Brian Jackson p116(cr), Alamy/ Konstantin Iliev p49(l), Alamy/ Image Source p116(tl), Alamy/Indigo Photo Agency p31(brc), Alamy/Christopher King p27(i), Alamy/ Christopher King p17, Alamy/Marek Kosmal p31(blc), Alamy/ Ilene MacDonald p115(tl), Alamy/ Oleksiy Maksymenko p38, Alamy/Nenov Brothers Photography p50(bc), Alamy/Niels Poulsen p39(c), Alamy/NUAGE p50(a), Alamy/Guy Primo p115(bc), Alamy/Jeremy Sutton-Hibbert p115(tcr), Alamy/Aleksandr Ugorenkov p31(bll), Alamy/Finnbarr Webster p22(bl), Alamy/Westend61 GmbH p27(iv), Alamy/Shaun Wilkinson p49(r), Alamy/ ZUMA Press, Inc. p37(bl); Art Directors/Helene Rogers p129(bl); Howard Campbell p30(a); Corbis/Chris Collins p3(desktop), Corbis/ JLP/Jose L. Pelaez p232(c), Corbis/Ocean p46(fig1), Corbis/Edward Rozzo p37(cl), Corbis/ Gonçalo Silva/Demotix p41(c), Corbis/ Wavebreak Media LTD p35; Getty Images pp86, 232(b), Getty/AtomA p3(phone), Getty/Pawea Bartkowski p32(tl), Getty/Michael Bodmann p20, Getty/Keith Brofsky p116(c), Getty/Peter Dazeley pp34(blt), Getty/Felbert+Eickenberg/STOCK4B p115(br), Getty/Maciej Frolow p3(tablet), Getty/Halfdark p33(bl), Getty/Jetta Productions p33(tl), Getty/Howard Kingsnorth p3(laptop), Getty/Stephen Krow p27(ii), Getty/Ryan McVay p31(bl), Getty/Edgaras Marozas pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), Getty/Greg Nicholas p39(b), Getty/Neustockimages p130(tl), Getty/nullplus p34(blb), Getty/Oktaydegirmenci p33(b), Getty/George Pchemyan p27(iii), Getty/Chris Pritchard p95, Getty/Rouzes p39(t), Getty/Baris Simsek p48, Getty/Thinkstock Images p115(tr), Getty/Tsuji p31(br); Macmillan Education pp36(t), p115 (bl); NPG- a division of Macmillan Publishers Ltd p58(cr); Science Photo Library p51, Science Photo Library/CHASSENET p37(blt), Science Photo Library/DAVID PARKER p129, Science Photo Library/MARTIN RIEDL p232(a); Superstock/Corbis p36(bl), SuperStock/Cusp pp33(a), 46(fig3), 128(tl); Thinkstock p108; Theyummytruth.com – a great combination of eye-grabbing imagery and easy-to-navigate functionality p58(cl).

These materials may contain links for third party websites. We have no control over, and are not responsible for, the contents of such third party websites. Please use care when accessing them.

Page 3: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

iii

ContentsPage Finder v

About this book vi

Part 1: Theory1 The computer system 2

What is a computer? 3

Categories of computer systems 4

Components of a typical computer system 6

Interpreting computer specifications 8

2 Primary and secondary storage 13

How do primary and secondary storage differ? 14

How is storage capacity measured? 14

Types of primary storage devices 16

Secondary storage media 18

Comparing secondary storage media 23

3 Input and output devices 28

Data collection basics 29

Input, input devices and input media 29

Input devices in the home 31

Input devices in the retail trade 32

Output devices 37

4 The Internet and communications technology 47

Data communication and networks 48

The World Wide Web (WWW) 55

Communicating globally using network-based tools 57

5 Data storage and manipulation 62

Number systems 63

Binary addition 67

Binary subtraction 69

Representing integers 69

Storing text data 73

6 System programs and application programs 77

The difference between system programs and applications programs 78

System software 78

Functions of an operating system 79

Processing modes 83

Application programs 84

7 Information processing 91

Data, information and information processing 92

Data: Sources, verification and validation 95

File organisation and access 100

8 Data security 107

Introduction to data security 107

Common vulnerabilities and threats 109

Data misuse 111

Protecting your computer system 114

Operational procedures 118

9 The impact of ICT on jobs, skills and careers 124

The impact of Information Technology on jobs 124

Computer-related professions 125

Career opportunities for hardware support professionals 125

Career opportunities related to the Internet 127

Career opportunities in IT-related industries 127

Computer applications in business and industry 127

Computer-aided design 128

Computers in science and technology 129

Computers in education 130

Computer applications in recreation and entertainment 131

Telework – telecommuting and telemarketing 131

Part 2: Problem-solving and programming

10 Problem-solving and program design 135

Introduction to problem-solving 136

BVI Boat Hire 137

Problem partitioning (Creating an I-P-O chart) 137

Constants and variables 138

Data types 140

The concept of an algorithm 140

Ways of representing algorithms 141

Developing algorithms to solve simple problems 145

11 Program implementation 168

Generations of programming languages 169

Levels of programming languages 170

Implementing a program: The five steps 171

Writing programs in Pascal 173

Testing and debugging techniques 183

Arrays 185

Page 4: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

iv

Part 3: Productivity tools

12 Mastering word processing 195

Introduction to word processing 196

Creating a document 199

Columns and tables 203

Working with graphics 206

Document editing 208

Formatting 216

13 Mastering presentations 231

Presentations 232

Creating a presentation 235

14 Mastering web page design 243

Introduction to web page design 244

Creating simple web pages 244

Creating and hosting your own website 248

15 Mastering spreadsheets 250

Introduction to spreadsheets 251

Features of spreadsheets 252

Creating and setting up your workbook 254

Data extraction 279

16 Mastering database management 292

Introduction to databases 293

Creating and populating a database 295

17 Information integration 336

Using data from Microsoft Access in Microsoft Excel 336

Using data from Microsoft Excel in Microsoft PowerPoint 338

Perform a mail merge using an external data source 338

The School-Based Assessment

18 Mastering the School-Based Assessment 345

Requirements of the School-Based Assessment 345

Mark allocation 346

Some tips to help you master the SBA 346

Practice your way to a high SBA score 346

Key skills and mark allocation 353

Answers to multiple-choice questions 356

Glossary 357

Index 363

Page 5: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

v

Syllabus sections

Sec

tio

n 1

: F

un

dam

enta

ls o

f h

ard

war

e an

d s

oft

war

e

Sec

tio

n 2

: P

robl

em-s

olv

ing

and

pro

gram

des

ign

Sec

tio

n 3

: P

rogr

am

imp

lem

enta

tio

n

Sec

tio

n 4

: A

pp

lica

tio

ns

and

im

pli

cati

on

s o

f IC

T

Sec

tio

n 5

: In

form

atio

n

pro

cess

ing

Sec

tio

n 6

: W

ord

pro

cess

ing,

p

rese

nta

tio

n a

nd

web

pag

e d

esig

n

Sec

tio

n 7

: S

pre

adsh

eets

Sec

tio

n 8

: D

atab

ase

man

agem

ent

Sp

eci

fic

ob

ject

ive

s

(wit

hin

th

e sy

llab

us

sect

ion

s)

Objective 1 3 137 170 48 92 196 251 293

Objective 2 6 138 169 53 93 208 252 293

Objective 3 16 139 171 53 95 216 267 293

Objective 4 15 140 184 107 97 221 270 295

Objective 5 23 140 173 109 99 201 261 295

Objective 6 18 141 174 127 100 210 262 298

Objective 7 29 145 175 128 100 203 266 319

Objective 8 37 157 180 126 216 267 302

Objective 9 63 159 185 125 215 259 313

Objective 10 8 183 338 262 313

Objective 11 78 172 213 274 321

Objective 12 80 201 279

Objective 13 83 232 276

Objective 14 84 233 282

Objective 15 80 235 282

Objective 16 236

Objective 17 236

Objective 18 236

Objective 19 239

Objective 20 237

Objective 21 237

Objective 22 239

Objective 23 239

Objective 24 244

Objective 25 244

Objective 26 246

Objective 27 247

Objective 28 247

Page finderThis page finder gives you the page number for all the objectives from each section in the new CSEC® Information Technology syllabus at your fingertips.

Page 6: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

vi

About this bookThis book isn’t just words on a page.

This book contains a range of different features to introduce, teach and highlight key information throughout the course. These pages explain how to use them. The larger column contains the main text and diagrams; you can read straight down it without interruption.

The smaller column contains other useful facts, so make sure you use it to check your understanding. You should remember to spend time studying the fi gures and diagrams as well as the text.

✓ defi ne what a computer is

✓ describe a general-purpose computer system

✓ identify the major components that make up a typical computer system

✓ explain the function of the central processing unit

✓ explain the function of memory

✓ explain the function of storage

✓ explain the function of input and output devices

✓ interpret the hardware specifi cations of a computer system.

By the end ofthis chapteryou should be able to:

1

Instructions.indd 1 1/21/14 11:17 AM

4 • The Internet and communications technology

Answers to ITQs ITQ1 (a) A telecommunications technology providing wireless data, voice and video over long distances; (b) Digicel; (c) (i) facilitates more commercial activities as e-commerce facilities can be made available in places not served by wired telephone service or wired network; (ii) provides opportunities for the development of more innovative products/services.

ITQ2 (a) A hub is a passive device, switch is intelligent; (b) switch forwards data packets between computers on one network, router forwards data packets between computer networks.

ITQ3 (a) Fibre optic; (b) fibre optic; (c) twisted pair.

ITQ4 To download multimedia content such as music and movies.

ITQ5 Any THREE of: (a) to communicate using electronic data interchange (b) to publish catalogues for wholesalers and trade partners (c) to share training programmes (d) to provide team collaboration environments.

ITQ6 Any THREE of:.biz.com,.info.name,.net.org,.pro

IT portfolio1 This activity will explore the concepts related to data communications and networking.

a Check out the computer lab at school (make sure to get permission from your teacher before you do so); ask the following questions: i Are the computers networked? ii What types of cabling are used? iii Is there a server? iv Is the central connecting device a hub, switch or router? v Is there Internet access?

b Record your findings in your portfolio.

2 In this activity you will explore concepts related to Wi-Fi and the Internet. Conduct research (read books, use search engines on the Web and interview people) and record your findings in your portfolio:

a What is the name of the organisation that owns the Wi-Fi trademark?b When was the term ‘Wi-Fi’ first used commercially?c What wireless networking standard is used by Wi-Fi?d Describe the THREE most recent variations of the Wi-Fi standard. Ensure that you make mention of distance

limitations.e What does the logo look like? Have you ever seen the logo on a product or its packaging? Paste an image of the

logo in your portfolio.f Visit your local Internet café and find out if they offer VoIP telephone calls. What hardware and software

components are required?g Download Skype and make a VoIP telephone call. How does the cost and call quality compare with a call made

via a fixed line or mobile telephone?

59

IT portfolio1 In this activity you will explore printers.

a Interview at least five persons and find out the make and model of the printer they use. For example, if you interviewed me, I would tell you I use a Samsung ML-2165W).

b Conduct research to get more details about each of the printers based on the make and model supplied.c Copy the following table in your portfolio and complete it. Note that I have completed the first row based on

research done about my printer.

Make & Model Impact or Non-Impact Type Print Speed Print Resolution (dpi)Samsung ML-2165W Non-Impact Laser 21 PPM 1200

d Paste a picture of each of the printers.

2 In this activity you will explore input and output devices.

a Visit the web site of an online computer store (www.cdw.com, www.provantage.com or www.newegg.com).b Download at least TWO pictures of EACH of the following devices.

i barcode reader iv optical mouse ii electronic signature capture device v wireless keyboard iii optical mark reader (OMR)

c Print all the images and paste them into your portfolio, complete with a brief description (make, model, price and key features).

d Compare your pictures with at least two other people in your class. Note the similarities and differences.

Group activities1 This is a small-group activity for 3–4 people.

a Each group member should collect at least TWO source documents generated in each of the following scenarios:• a classroom environment• a home• a micro or small business (ask the Principles of Business teacher at your school what this is)• a meeting of a sports team or co-curricular activity (Cadet, Key Club, etc.)

b Compare the documents collected from each area. Note their similarities and differences.c Classify all the documents as either human-readable or machine- readable.d Suggest which device(s) are ideal for reading the documents categorised as machine-readable.e Paste the documents in your portfolio and record your findings next to each of them.

2 Your local police station has just received a donation of a digital camera and US$800 to purchase a printer suitable for printing crime-scene photos. The officer in charge of the station has sought your help to select a suitable printer. You have to co-opt two of your classmates to undertake this task. You are required to:

a Assess the needs of the police station and make a list of the TWO types of printers that the group believe are most suitable.

b For EACH type, identify TWO named printers available for sale at a local computer store or online retailer. Complete the table below.

Type 1 Type 2Printer 1 Printer 2 Printer 3 Printer 4

BrandModelResolutionPrint speedMemory capacityPrice

c Based on your findings, make a recommendation to the officer in charge.Place a copy of the recommendation in your portfolio.

3 • Input and output devices

44

A list of objectives at the beginning of each chapter tells you what topics you will be covering. They will help you to plan and measure your learning.

11

1 • The computer system

Examination-style questionsMultiple-choice questionsInstructions: Each of the following questions has four suggested responses labelled (A), (B), (C) or (D). Read each question carefully then select the most suitable response.

1 ____________ is an area of a computer that temporarily holds data that is waiting to be processed, stored, or output.

(A) Memory (B) Storage (C) Input (D) Output

2 The microprocessor’s ____________ unit fetches each instruction.

(A) instruction(B) integrated(C) circuit(D) control

3 Which of the following is likely to have the LEAST processing power?

(A) game consoles(B) mobile computers(C) mobile devices(D) servers

4 In what order do ICT systems deal with data?

(A) process, input, output (B) input, output, process (C) input, process, output (D) input, process, save.

5 The ____________ is dedicated to perform arithmetic operations, such as addition and subtraction.

(A) CPU (B) CU (C) ALU (D) ATA

6 What is a computer’s main internal backing store?

(A) CD-ROM (B) ROM (C) hard disk (D) processor

TEST BANK

7 The component that stores the program and data currently being executed is:

(A) arithmetic logic unit(B) floppy diskette(C) main memory(D) secondary storage

8 Which of the rows in the following table does NOT contain the correct information?

Computer specification

Hardware component

I 2.4 GHz Clock speed II 2 GB DDR Memory speed and type III 500 GB Hard drive capacity IV 5,400 RPM Hard drive speed

(A) I and II(B) II ONLY(C) II and III(D) IV ONLY

9 Specialised computer hardware can be used for home entertainment. Which one of the following is NOT specialised gaming hardware?

(A) Wii(C) Xbox(B) PlayStation(D) Super Mario Cart

10 Carefully consider the following statements about printed books and netbook-type computers. Which of these statements are UNTRUE?

I A computer and a netbook both store information.

II Books are portable, netbooks are not. III Computers are programmable, books are not. IV Computers only store small amounts of

information whereas books store a large amount of information.

(A) I and III ONLY(B) II and III ONLY(C) II and IV ONLY(D) I, II and IV ONLY

9780230426948_01_1_12.indd 11 8/7/14 4:33 PM

This is the style of question you may come across in your exam. Your teacher will suggest how you can use them, but they will measure what you have learnt and help to identify any gaps in your knowledge so you can revisit the relevant sections of the book.

The concept maps represent knowledge organisation visually to help you learn more meaningfully and enhance your knowledge integration. You can use them as tools to help connect prior knowledge with new information.

The expanded IT Portfolio now provides more opportunities for you to extend and reinforce the knowledge and skills introduced throughout the chapter. Most of the activities involve fi eld or web-based investigations.

A wide assortment of game-based and real-world problems is presented for small groups to complete. You and your classmates can improve on ideas as you share in fi nding solutions in an environment where the group evaluates its own success.

2

✓ defi ne what a computer is

✓ describe a general-purpose computer system

✓ identify the major components that make up a typical computer system

✓ explain the function of the central processing unit

✓ explain the function of memory

✓ explain the function of storage

✓ explain the function of input and output devices

✓ interpret the hardware specifi cations of a computer system.

By the end ofthis chapteryou should be able to:

1 The computer system

Concept mapConcept map

General-purposeComputer Systems

CPU:control unit

ALU

primary memory:ROMRAM

PROM

output devices:printersmonitorsspeakers

multimedia projectors

input devices:keyboardmouse

microphonescanner

bar code readers

general-purpose:desktopslaptops

notebooksnetbooks

smartphones

secondary storage:CD-ROM

DVDhard disk

flash drivesmemory cards

include major componentsperform major functions

processing input storage output

examples

such as

input/outputdevices

Page 7: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

vii

Each image has a caption and a fi gure number to help with cross-referencing.

Suggested answers to the In-Text Questions will allow you to assess yourself.

The smaller column cancontain key facts. It isgood practice to spendtime reading this columnas well as the main text sothat you don’t miss anyimportant information.

The fi rst time an important new word appears in the text, it is highlighted at the side. Sometimes a short defi nition is given in the main text. An in-depth explanation is provided in the glossary at the back of the book.

There are a wide variety of activities to complete so that you can reinforce and extend your knowledge and skills that are covered in each chapter.

Summaries of the key facts from each module will help you check your understanding.

Where you see this icon, you will fi nd an In-Text Question (ITQ). These are spread throughout each chapter and will help you to check your progress. If you can’t answer the ITQ, you should refresh your knowledge by re-reading the relevant paragraphs in the main text. Answers to the ITQs are found at the end of each chapter.

ITQ1

118

8 • Data security

Operational proceduresBacking up dataIt is unwise to rely on a single storage device for storing important data. The device and the data it contains may fall prey to one of the accidental or deliberate actions or events mentioned earlier. To safeguard data, it is good practice to copy data to another storage device or media.

Adopting a regular backup system such as the Grandfather-Father-Son System means that if disaster should strike the organisation can recover almost all of its data quickly and business can continue as usual. It is important to keep each generation of backup separate from the rest. The son can be kept in the computer room, the father in a fireproof cabinet and the grandfather in another building. For a fast-moving business backups may be taken every day rather than every week. If a hard disk drive fails the most recent backup, the son, can be used to restore the data. In the event of a fire in the computer room destroying the son backup and the computer system, the father backup can be used to restore the company data. In the worst case, a whole building may be flooded but the grandfather backup can still be used to restore the data.

List THREE potential threats to a backup media?

ITQ15

A backup is a safety copy of files that can be used to recover data in case of an event that causes data damage or loss.

Figure 8.12 Passwords are a sequence of letters, numbers and special characters that must be supplied to access a resource. Passwords and usernames can be used so that only authorised users can log on to the system. In a secure system each individual user or group of users will be allocated privilege to access only the files and resources they need to perform their jobs.

Sign in to Online Banking

User ID:Password:

Sign In >

Figure 8.11 Windows Firewall is implemented as a software-only file security mechanism and is a component of the operating system.

Activity 8.4 Log on to FirstCaribbean International bank’s website at www.cibcfcib.com, then search for ‘Improving your own security’. Read some of the important steps that you can take to protect yourself online.

Figure 8.13 (a) The Backup or Restore tool is one of the Windows operating system accessories. (b) A user may choose what to back up and also what device to store the data on.

(a) (b)

119

8 • Data security

Grandfather, father and son.Grandfather: backup of the system from 2 weeks agoFather: last week’s backupSon: this week’s backup. Next week all the backups are older so the father becomes the grandfather, the son becomes the father, and a new son backup is created.

Archiving dataAn archive comprises the files created or received by an institution or organisation during the course of routine business that are stored because of their value.

Depending on the nature of the data, some companies may archive data monthly, others quarterly or annually. These files are usually stored on removable media such as DVDs or magnetic tapes and kept in a secure location. Files in an archive will be kept for a period of time and then destroyed.

archive ❯

Summary• Data security is all about identifying and assessing computer security risks.

• A computer security risk is any event, action or situation – intentional or not – that could lead to the loss of computer systems and the data they contain.

• Data integrity is concerned with ensuring the accuracy, completeness and internal consistency of the data stored in a database.

• Physical access restrictions can prevent unauthorised personnel from damaging the computer hardware.

• Access to IT systems can be restricted by requiring all legitimate users to input a valid username and password before being able to gain access to the system.

• A firewall acts as a barrier between a computer system and an external network.

• Encryption, overwrite protection, password, and making a file read-only access are mechanisms that may be used to help maintain file integrity.

• Individual files can be protected using encryption techniques that require the reader to have a correct password to decrypt the file.

• Viruses, Trojans and worms are malicious program that may infect and do harm to a computer system and its data; up-to-date antivirus software can protect computer systems from virus attacks.

• Computer fraud involves the use of computers to illegally obtain money, goods or services. There are many types of computer fraud including identity theft, credit card fraud, electronic eavesdropping and surveillance.

• Backups are copies of files that can be restored in the event that the original files are lost through hardware failure, accidental deletion or computer fraud whereas an archive comprises the files created, received and accumulated over time and retained for historical use.

Answers to ITQs ITQ1 The following are SOME possible situations: (a) hard disk failure caused by intermittent power outages causes partial data loss; (b) hard disk failure caused by a power surge causes total data loss; (c) laptop containing the data is stolen from a parked motor vehicle; (d) the file with the data is copied by an unauthorised person without the knowledge of the owner; (e) an employee copies data from the file for his/her personal use.

ITQ2 (a) The file containing the credit card details OR the file containing the student’s assignment. (b) The file with credit card details may have been accidentally selected and copied to the USB drive; the file with the assignment may have been intentionally copied to the USB flash drive by the accounting clerk. (c) Any reasonable explanation consistent with the answer in (b).

Page 8: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

✓ identify common threats to the security of data

✓ identify common threats to the integrity of data

✓ outline ways by which information can be misused

✓ describe measures to secure data

✓ describe measures to maintain data integrity.

By the end ofthis chapteryou should be able to:

8 Data security

Concept map

may be protected usingsubject to

misuse:computer fraudcredit card fraud

electronic eavesdroppingidentity theft

industrial espionagepropaganda

software piracystorage of inaccurate information

surveillanceviolation of privacy

software restrictions:encryption

firewalloverwrite protection

passwordsread-only accessrestricted accessvirus protection

hardware access restrictions:

biometric systemsguardslocks

fire/waterproof cabinets

procedures:archiving

backup and recoverydisaster recovery mechanisms

laws

Data

Introduction to data securityWhy is there a need for data security?Existing manual systems are often computerised to improve the effi ciency of an organisation. As the system becomes operational, data is captured, processed, stored and disseminated. Organisations and their customers – other organisations and individuals – become dependent on computer systems and the information they provide. There are some drawbacks to computerisation. These include:

• data theft or loss

• loss of data integrity

• increased exposure of data and information to misuse

Data security is all about identifying and assessing computer security risks.data security ❯

Page 9: Information Technology for CSEC® Examinations · pp32(b), 46(fig 2), Getty/Marek Mnich p31(lc), ... interchange (b) to publish catalogues for wholesalers and trade partners (c) to

108

8 • Data security

A computer security risk is any event, action or situation – intentional or not – that could lead to the loss of computer systems and the data they contain.

Data security allows individuals and organisations to assess the risks to which their computer systems and data is exposed, and determine and implement suitable countermeasures. It is important that an organisation protects its data adequately. Data that is damaged, lost, stolen or misused can cost the business money, its reputation or even the life of the business itself. The business may eventually have to close!

What are the main elements of data security?

computer security risk ❯

Element Meaning Example # 1 ABC Pharmacy

Example # 2Customer Jan Doyle

Vulnerability Exposure to the possibility of being attacked or harmed

Computer system is connected to a wide area network. It is also used to access their insurance company’s extranet.

Customer fills prescriptions at the pharmacy and makes payments using credit and debit cards.

Threat A statement of an intention to inflict damage

Data may be intercepted as it transmitted from the pharmacy to the insurance company.

Credit card data and personal data may be accessed by an unauthorised person.

Attack Actual action that causes damage Credit card data stolen over a period of weeks by an eavesdropper.

Unauthorised purchases made with credit card.

Countermeasure An action taken to prevent an attack or minimise its effect

Encrypt data before transmission. Use a credit or debit card with chip-and-pin technology.

What kind of data is at risk?Data in every format and at every stage of the processing cycle is vulnerable.

• Data being captured

• Data collected and awaiting processing

• Data being processed

• Data stored on removable media

• Data stored on networks

• Data in file libraries

• Data being transmitted over a communications network

• Data that has been backed up

• Data that has been archived

How are data security and integrity related?Data security and data integrity are two different concepts. Whereas data security is concerned with identifying and assessing risk, data integrity is concerned with ensuring the accuracy, completeness and internal consistency of the data stored in a database.

Data security plays a key role in maintaining data integrity as it provides the mechanism to safeguard files from corruption and unauthorised access.

Consider the following scenario.An accountant creates an electronic spreadsheet containing the credit card

details of 500 customers and saves this file on the desktop of his computer. He leaves his desk for a few hours to attend to company business. In his absence, an accounting clerk seizes the opportunity to use the computer to complete a school assignment. She creates a few files in the process and saves them on the desktop. When she is finished, she copies the assignment files, and

ITQ1Briefly describe THREE situations that may result in the damage, loss, theft or misuse of data that is stored on the hard disk of a computer system.

ITQ1

data integrity ❯

Table 8.1 Main elements of data security.

Figure 8.1 A credit card with a microchip may help to prevent credit card fraud.