Monthly Archives: February 2014

Introduction:

Testing should be done throughout the development of the solution. The reason for the test plan is because you would not want to proceed onto the next part of a solution unless you were sure that the first part worked properly.
It is vital to keep tracking of all the tests you have performed. This is then put together in a document called a test plan.

Problems caused by using ICT equipment:

Stress
This is a major factor in work-related illness. Symptoms can include headaches, stomach ulcers, sleeplessness and
loss of appetite.
ICT systems put additional pressure on employees:
•  They may be used to monitor performance.
•  They induce fear and panic particularly in older people.
•  Constantly bring about the need to perform new tasks that you may not be able to cope with.
•  It can be impossible to escape them.
•  Information overload.
•  New software can be difficult to use

RSI (Repetitive Strain Injury)
Caused by excess use of a keyboard, mouse and even mobile phones (used for texting) and can usually affect the
hands, wrists, elbows, arms, shoulders and / or neck. It can be very painful and debilitating. Once it develops, it
tends to recur. This is caused by repeated similar movements and incorrect use of the keyboard, i.e. resting the
wrists on the desk whilst typing. Many laptops have a built in wrist rest due to the positioning of the keyboard
and are therefore better to use. Ways of reducing RSI is to have a wrist rest, take frequent breaks and have the
keyboard at the right height.

Eyestrain
Brought on by long hours spent in front of a screen. Although there is no evidence that computers cause
permanent damage, they do accelerate current problems.

Factors that could contribute to eyestrain are:
•  Glare from lighting affecting the screen.
•  Lighting that shines directly on the screen or causes shadows.
•  Constantly refocusing – i.e. looking down at a paper and back to the screen.
•  Sitting too close to the screen – should be about 2 – 3 feet away.

Eyestrain can be prevented or reduced by taking regular breaks from working at the computer, every 10 minutes
or so looking into the distance and therefore relaxing the muscles of the eye, use blinds to reduce the glare on the
screen and sit at least 3 feet from the screen.

Info 2: Topic 7 What Can ICT Provide

What can ICT provide:

  1. Fast Repetitive Processing: Due to the introcudtion of ICT many business transactions can be performed quickly by the processors in computers.

Examples of where fast repetitive processing would be required:

  • Processing of credit card accounts
  • Producing itemized phone bills
  • Production of accurate weather forecasts
  • Production of Utility Bills
  • Processing transactions in e commerce system

2.  Vast Storage Capacity: The storage now offered by ICT systems are now at a stage were they are almost limitless and cheaper than it used to be. Vast storage capacity can be available in these forms:

  • ROM and RAM which allow many applications to be run together
  • Optical Media such as DVD-RW are ideal for the storage of photographs, videos and multimedia programs
  • Flash/Pen Drives which allow data to be transferred from one computer to another quickly.

3.  The facility to search and combine data in many different ways that would otherwise be impossible. Communication technologies such as networks and the internet mean that data can be obtained quickly from different sources and combined together such as CCTV footage to solve a crime.

4. Improved presentation of information: Nowadays it’s very easy to obtain images due to being able to copy them from the internet and using digital cameras. This is similar with video and audio files. This can enable materials such as video files and images to be incorporated into material such as brochures and presentations.

5. Improved accessibility to Information and services: In the modern era, it is possible to shop for groceries and other items from home which is hugely beneficial to elderly and disabled people. Due to an improved access to information an individual is able to access these services and information:

  • Latest News
  • Reviews for books, films and holiday destinations
  • Opening times for stores
  • Content on any subject imaginable

 

6. Improved security of data and processes: Data can now be kept more securely in ICT systems. For  example:

  • Logs can be kept to show and enable user permissions to only allow certain people to access particular information.
  • Bio-metric Security which can be used to check that only authorized people have access to ICT systems
  • Processes such as the transfer of data can be secured by using encryption technology so that if the data was obtained illegally the security of the data wouldn’t be compromised as the thief wouldn’t be able to understand the data.

In regards to networks, security can be centralized by:

  • A single backup being taken to back up all files on the network
  • Someone being given responsibility for taking the backup copies of information and data

 

However, there are limitations with ICT which are usually caused by hardware limitations, software limitations, communications limitations, current legislation and inappropriate design for systems and poor data control mechanisms.

Hardware limitations

  1. Amount of main memory: The more memory, the more data that can be held for immediate access it from disk which takes time.
  2. Large amounts of memory are needed for multi tasking in which the more programs an individual is working on the more demand they’re putting on the memory.
  3. Printers have some memory known as buffer memory. Buffer memory allows the computer to get on with other work whilst the printer prints. However, a disadvantage of buffer memory is that it would restrict a user from carrying on working during large print sessions

 

Communication Limitations

Most computers are now networked. There are two main communications limitations:

  1. Network topology: The network topology is the way in which the computers are linked together. Certain topologies can only contain a certain maximum number of terminals.
  2. Network has grown too big: If terminals keep getting added to a network without any other changes the whole network will start to run slow in which file transfer will take a long time which may frustrate users.

 

Software Limitations

There are a number of software limitations such as:

  1. Ability to transfer data as data is frequently passed from one piece of software to another. If one piece of software is unable to read the data produced by a different piece of software, it would be a serious limitation.
  2. Poorly designed software causes user frustration and stress and can also cause RSI if excess keyboard input is unnecessarily needed.
  3. Software often come with bugs which cause systems to crash.

 

Fitting in with current legislation

The data protection act 1998 covers the way personal data can be processed. This means that organizations cannot simply process this personal data in the way they’d have liked to but instead have to obey the law.

An example of a limitation of the Data Protection Act (1998) is that if theres a development of a huge database which is to be used by the government and some private organizations where by they’ll be able to access the same set of information will not be able to occur. This is due to the Data Protection Act (1998) stating that data collection of one or specified purposes can’t be used for different purposes. Without a change in the law this would limit the use of the database.

 

In appropriate system design

In appropriate system design is usually caused by inexperienced project development, lack of management and a lack of control which may lead to stress, frustration and RSI.

 

Poor or inappropriate data control mechanisms

Data control mechanisms should be put in place by individuals or organizations to protect data.  Ways this is done:

  1. No proper verification or validation: Data control mechanisms ensure that the data entered into and processed by the ICT system are correct and that human errors have been avoided. Appropriate verification and validation checks must be in place to prevent, as far as possible, introducing errors during the data input stage. A database containing incorrect information cannot be relied upon and places serious limitations on the systems’d usefulness.
  2. No proper limits to access: There may no longer be no proper access controls in place to limit access to personal data, which may cause the Data Protection Act (1998) to be breached.
  3. No backup procedures: There may be no backup procedures in place and this can cause the loss of important data.

 

Limitations in the information ICT produces:

If an ICT system is developed without proper analysis and consultation with the clients and users, then when it is first used the users will soon identify things that the system should have produced but doesn’t.  The perfect ICT system is almost impossible to produce, because you would need infinite time and money and these are always restricted.

ICT systems don’t always provide the most appropriate solutions

There are many different ways to solve a problem and some use ICT and some don’t. An artist or designer may like to use an art package or computer aided design software to produce a drawing or design. Some artists may feel that they can be more creative simply by using pencil and paper for their initial designs.

 

Types of processing

ICT systems take data and processes it to produce information
INPUT -> PROCESS -> OUTPUT

Processing can be divided into the following three types:

  1. Batch
  2. Transaction
  3. Real-time

Batch Processing is when all the inputs needed are collected, batched together, inputted and processed in one go. The main features of batch processing include:

  • Once the input data has been entered,the processing takes place automatically in which there is no human intervention during processing.
  • Data builds up over time and it’s then processed periodically (e.g every month or week)
  • Used for large volumes of transactions
  • Transactions are processed as a group and not processed individually

Examples of batch processing:

  • Marking and processing of multiple choice examination/ test papers.
  • Cheque clearing in banks
  • Preparing a company’s monthly payroll using input time data collected from time sheets/clock cards

 

Transaction processing is a form of processing each transaction as it arises such as:

  • An order being taken
  • A customer making a payment

A flight being booked
A theatre seat being reserved

Features of a transaction processing system include:

  • It’s an example of an interactive system as there is constant communication between the user and the computer
  • A transaction is dealt with as soon as it occurs in which each transaction is completed before the next transaction is begun.
  • Ideal for booking systems as it’ll be impossible to book the same seat twice

Examples of transaction processing:

  • Booking systems for holidays , concerts and sports events
  • Insurance quotes/ renewals
  • Taking or orders for goods over the telephone

Real-time processing is the processing where the input data is processed immediately as it arrives in which the results have a direct effect on the next sets of data.

Examples of real time processing:

  • Flight control where automatic pilot or fly-by-wire computer system takes over flying the plane using the input data such as from the computer containing the flight plan and data from the sensors on the plane.
  • In high speed action games where an immediate response is needed.

Evaluation is very important as it looks back at the work that has been produced and reviews the progress in meeting the requirements set by the client. In order to produce a good evaluation you need to understand what  has been done and any mistakes you have made must be corrected.