Wednesday 18 April 2012

User Interfaces

1. Explain in your own words what the term 'user interface' means

A user interface is what you see on the screen when the computer is turned on. For an example, the cursor, icons and menus. These allow the computer user to operate the computer and get something done.
 

2. What are the three main types of user interface called?
  • GUI (Graphical user interface)
  • Command line interface
  • Menu driven interface
 

3. Explain what you need to do to use a command line driven U.I
To use a command line interface the user needs to directly enter commands into the computer in order to get it to do something. You need to type the exact command into the computer, you cannot create your own commands and you need to make sure you have typed them in correctly else they won't work. In the past many computer users used a command line interface but nowadays people don't know these commands so they aren't used anymore.

 

4. Explain what D.O.S means
This is a Disk Operating System. this was used in many old computers. It uses a command line interface.



5. List the advantages of using a command line driven U.I
  • If the user knows the correct codes for the commands then this can be quicker
  • This user interface takes up much less RAM (memory) than others
  • Does not take up as much CPU processing time as others
  • A cheaper monitor can be used
  • Does not require user interface to be run
6. List the disadvantages of using a command line driven U.I
  • Can be confusing for new users
  • If you type in an instruction that is incorrect then you may need to start all over again
  • Commands will fail if you type in something incorrect
  • There is a lot of commands that need to be learnt which take up time and certain people may find it difficult


8. Explain how a menu U.I works
A menu driven interface works by a user navigating through a series of menus and lists. A user can only select something that appears in the list, they can't randomly type anything or select something that isn't there. However than can go back to the previous list if they have selected something incorrectly.


9. List the advantages of using a menu driven U.I
  • A user can only select what is in the list, not any random option or create their own
  • You don't have to learn commands, you just need to be able to read
  • If you don't know what you're doing you can guess your way through the options
  • Not much memory is used
  • menu interfaces can be spoken as well as visual i.e telephone
  • Step by step options are used so a user doesn't have to remember anything
10. List the disadvantages of using a menu driven U.I
  • If the menu is poorly designed then a user will get lost through the options
  • Menus can take up a large part of the screen so a lot of flicking backwards and forwards may be needed
  • A user can get bored if the menus take too long to go through


13. What does WIMP stand for?

Windows
Icons
Menus
Pointers

14. The advantages of using a GUI:

  • East to use, especially for beginners
  • You do not have to learn lots of complicated commands
  • There are usually help functions
  • WYSIWYG benefits
  • You can exchange data between different software applicants
15. The disadvantages of GUI:

  • Takes up a lot of hard disk
  • They need more RAM to run
  • They use more processing power than other user interfaces
  • Can be slow for experienced programmers to use


When designing a new user interface the designer needs to consider the following points:

  • Is there a help function for new users of people who don't understand?
  • are there any images or sounds that can help the user to use the interface?
  • Is the layout suitable and easy to navigate around? Does it take long to load?
  • Are different things colour coordinated?
  • Does it take up much RAM or hard disk?
  • How much will it cost?
  • Are similar things from another interface going to be present on the new one? Will they be the same so users don't get confused?

Monday 2 April 2012

Web Logs and Social Networking

Web logs (blogs) are websites which people use to share information about events in their life, videos, work and photos. It is a good way to find out about other people, for an example, celebrities.

People use web blogs as a way to share their life to others who may be interested. A web blog is just like a personal online diary where you can record anything. Some examples are:

  • News - from ordinary people or from famous people
  • Food places - people can share ideas about the different places they have visited and whether they think others should be encouraged to visit too
  • Entertainment - some celebrities keep you up to date with what is happening right now and if there are any upcoming events or programmes for you to watch out for
Social Networking is also a great way to keep up to date with other people. Some examples include Facebook, MySpace, Bebo and Twitter. On some of these sites you can add friends and view who is online. This is a very good function because if you go to message somebody you know how long it will take for them to view it. You can also see pictures of other people and share some of your own. You can also set up group messages and share important updates with your friends.

However, Twitter may be similar to Facebook, but it's not the same. On Twitter you can follow anybody and anybody can follow you. Usually people don't have an issue with random people following them as long as they aren't causing any trouble. Though, there are some people on Twitter who enjoy following others and creating arguments between themselves and other people.

there are many advantages of social networking, here are a few:

  • Helps build online communities - this can be good is you are shy, disabled or don't live near your friends
  • Allows you to make friends with anybody, especially people who are friends with your friends
  • You can express your opinion and discuss it with others
  • You can see what other people are doing and see what they have done
  • You can chat about your school life and learning with other class mates
However, where there are advantages, there are always disadvantages:

  • People may copy your images, claim them as their own, or place them on other websites that you may not know about or agree with
  • Paedophiles use blogs and social networking to search for young people who they can talk to and meet up with. They may also be able to view your photos and see what you are doing
  • People may be able to identify you purely by your image, without needing any details
  • People may begin to stalk you as they can see what you are doing and whether you are online or not
  • Employers sometimes search social networking sites to see if people are suitable applicants for a job
  • People start rumours which then quickly spread around the world
  • People can become addicted, therefore lacking other life skills

Computer Misuse Act and Copyright and Parents Act

The Computer Misuse Act was formed in 1990 and was aimed to deal with misuses of computers as they were becoming more popular around the world. The Act clearly states what is classed as causing an offence, some examples include:
  • Deliberately planting or transferring viruses to other computers which causes damage to the computer system and its data
  • Using somebody else's or an organisations' computer to carry out work
  • Hacking into another users' computer system intending to view information or alter it
  • Using a computer to commit fraud in any way
As computers became more popular throughout the world, hackers started to evolve. A hacker is somebody who gains unauthorised access to an ICT system. The main way they do this is by using the internet to hack into computers which share information through the Internet. Hackers can use the information that they gain in many ways, for an example, they may have viewed private data about another person with the intent to use it as black mail in the future. They may also damage or alter the data if they feel the need to. However, a hacker may not do anything with the information they have gained, therefore the owner may not find out about it.

As hackers became more common, computer users had to find a way to stop these people invading their computer systems. Firewalls are software and hardware which filter out unauthorized requests from people outside the network. They are also designed so that only certain data can be in the network, i.e false data cannot be inputted by a hacker if they get into the system and want to change it. It is now recommended that networks that use the Internet invest in a firewall.

Computer viruses cause a major threat to ICT systems. A virus replicates itself and transfers to other computers. This problem won't be too bad if you have a stand alone computer, but if you have several computers connected in one large network then this will be a massive problem. Viruses can display unnecessary messages on the computer screen, delete programmes, use up storage (making programmes run slowly) and spy your access to the internet. Spying on the internet is a massive problem because hackers can then obtain your personal information and use your credit card details to do things such as order expensive goods online that you don't want or know about.

All computers should be fitted with a virus checker or scanner which detects and deletes viruses before they effect your computer. However, it is important to update your viruse scanner or checker on a regular basis so that you will be protected against the latest viruses.

To help your computer into not catching a virus, here are some tips that you should follow when using your computer:

  • Ignore emails with file attachments or hyperlinks from people you don'y know or trust
  • Do not download information or access strange websites which are likely to have viruses that will damage your computer
  • Do not allow other people to use memory sticks in your computer until they have been scanned first
  • Install a virus checker/scanner

There are many physical methods that a person with valuable data can do to prevent unauthorized people from gaining access to their work. Here are some examples:
  • A computer user could clamp their computer to their desk, meaning that it can only be moved by the person with the key (who is the owner of the computer and the information inside) this may make it impossible for the computer to be moved without being damaged, which will mean that the information inside may also be damaged which defeats the idea of trying to steal the machine.
  • CCTV cameras can be positioned around the building so that intruders will be caught. They could also be positioned in the same room as the computer so that it can be protected against other staff members who may have access to the building, but not the computer.
  • Locks can be attached to doors so that the only people who have access are those with keys. However, these locks may be broken by some people who are desperate to steal information/misuse the computer. Though this will make it obvious to the owner that their computer is lost or damaged when they return to their property.
  • The location of the computer is important. For an example, you may want to locate your computer in a high building so that people walking past cannot see. You may also want to disguise the building as much as possible so that it doesn't look like a target.
The Copyright Law was created in 1988 when people began to spend a lot of time and money on creating their own pieces of work. Some examples of this include music, images, pieces of software and books. The Copyright designs and Parents Act protects an individual's property from being copied. Below are some examples of actions which are illegal to carry out:

  • Copying or downloading software illegally
  • Copying images or text without permission or claiming it as your own
  • Using peer to peer file sharing software i.e Limewire which got closed down
  • Running more copies of software than is allowed by the site licence
Once you have created your own work, there are some methods which you can use to protect it from plagiarism. Plagiarism is when you pass on somebody else's work as your own. An example of this is completing your ICT coursework but copying off the person next to you. If using somebody else's work is acceptable with what you are doing then you must state the name of the person who originally created it, where you got it from and when you got it.

Below is a link to a powerpoint about the Copyright Law: http://www.teach-ict.com/gcse/theory/dpa/theory/ict_legislation/legislation.html

Generic software features

Generic software features are parts of a software which adapt themselves to many different tasks. A lot of companies use generic software (MS Word, Access, Powerpoint) which all contain similar software features such as the ability to type, add hyperlinks, insert images and much more. You can also attach these files to emails to send to other people. Generic software is easy to purchase as it is off the shelf and can carry out many simple tasks. You don't need to design your own software if you were going to perform calculations, type letters or view images.

However, some companies carry out work that cannot be done with generic software features as it is more complicated. This then requires people to use Bespoke software as the software is specially adapted to each person using it. This can then allow an individual to produce their own work without limitations that generic software provides.

Below is a link to there definition of generic software and some examples of when it is used: http://www.teach-ict.com/glossary/G/genericsoftware.htm

Networks

A network is where two or more computers are connected. This means that they can share files and information with each other. People may use networks instead of stand alone machines as they all share the same information. Also, if a piece of software needs to be downloaded to more than one computer then having a network would make this more efficient as it would only need to be downloaded to the network and then it would automatically be on every computer on the system.

Computers can be connected by a LAN or a WAN. LAN stands for 'Local Area Network' and WAN stands for 'Wide Area Network'. These are two different types of terminal networks which can be adapted to how you use your computer. For an example, in your home you may use a LAN. This is because your house is in one building (or small geographical area) meaning that information doesn't need to be sent over a wide area. However, if you were working for a company and you needed to share information with somebody in another city, country or continent then you would need to use a WAN as this would enable you to share your information over such a wide geographical area.

Also, in a LAN computers are usually connected through a bus or star circuit. A bus circuit consists of several computers, terminators and servers such as a pint server and a file server. A bus circuit is a good circuit to use in a LAN because if there is a break in the chain then only one computer will be down. This therefore proves that a Bus circuit is more efficient than a ring circuit because in a ring circuit all of the computers are in one large ring, meaning that if there is a break in the circuit then the entire system is down. However, if you are willing to splash your cash then you may want to invest in a star network which links each individual computer directly to the servers. It costs a lot of money to do this as they is much more equipment needed and it will take a lot of time to set up. Though, there will be less network traffic so the system will be quite effective.

Cables can be used to connect computers in a network. In the past people would use ordinary cables. These weren't very efficient because not a lot of information can be sent very far without the system suffering from a lot of traffic. There is therefore a lot of interference and the data is sent painfully slowly. Now, people may use fibre optic cables which converts information into pulses of light which reflect through and bounce off the glass inside the cable. This is very fast and there is no interference. There is very little or no network traffic caused.

Below are links to pages which explain these ideas further:

Bus network animation: http://www.teach-ict.com/gcse/hardware/networks/djp/mov_busnetwork.swf

Ring network animation: http://www.teach-ict.com/gcse/hardware/networks/djp/mov_ringnetwork.swf

Star network animation: http://www.teach-ict.com/gcse/hardware/networks/djp/mov_starnetwork.swf

Network toplogies presentation: http://www.teach-ict.com/contributors/clare_belshaw/networks/networks.html

Hardware and software in a LAN: http://www.teach-ict.com/gcse/hardware/networks/theory/network_components/network_components.html

Network communications: http://www.teach-ict.com/gcse/hardware/networks/theory/network_communications/network_communications.html