Unit 1 Identify 5 stages of the Systems life cycle Unit 1 Unit 1 Describe the problem definition stage of the systems life cycle Unit 1 Describe the Documentation stage of the systems life cycle Describe the Installation stage of the systems life cycle Unit 1 Unit 1 Identify the different methods an analyst might use when investigating a system Unit 1 Describe the throw-away prototyping methodology Unit 1 Describe the RAD software development methodology Describe the evolutionary prototyping methodology Unit 1 What are the benefits and drawbacks of the prototyping methodology Unit 1 What are the Advantages and Disadvantages of the RAD methodology Looking at the existing system to see how it can be improved Identify why the current system does not meet the requirements of the organisation Feasibility report written at the end to justify and explain new system software A strategy for installation needs deciding based on time scale and the organisation Parallel, Phased, Pilot or Direct Training of the employees is completed during this stage Prototypes are the first attempt at a design which are then extended and enhanced Evolutionary - when a prototype is developed and evaluated by the end user. Using feedback a second prototype is developed and evaluated. This process is repeated until the last one meets requirements. Advantages Reduced time and less development costs if requirements being met Improved and increased user involvement Disadvantages Confusion between the prototype and the finished system Excessive development time of the prototype Benefits End user is involved at all stages and developed in 6 months End users do not have to define all requirements Disadvantages System functionality may not be acceptable Needs a good Project manager as timescale hard to keep within 6 months Problem Definition Investigation and Analysis Design Implementation Testing (or Installation, Documentation, Evaluation and maintenance) Documentation of a system needs to be created and given to the end user. Detailed Program specification so that if any maintenance is needed in the future then programmers can see this. Operating procedures Recovery Procedures User Manuals Questionnaires Interviews Meetings Document Analysis Observations Prototypes are the first attempt at a design. Throw-away—is when a working model of various parts of a system is developed after a small investigation. The prototype is developed and evaluated by the end user, but this is not used in the final solution and is…..thrown away. RAD is a software development method that aims to create a quick solution (usually within 6 months). Business owners play an active part in the cycle giving constant feedback on prototypes, working to create the final system Unit 1 Describe the contents of the Requirements Specification Unit 1 Describe the contents of the System Specification Unit 1 Describe the contents of the Design Specification Unit 1 Identify the roles and responsibilities of a project team Unit 1 Unit 1 Describe Critical Path Analysis and how it is used Describe the four main features of a gantt chart and how it is used Unit 1 Unit 1 Identify the four main tools/ techniques used for data modelling Unit 2 Explain how a users perception can be taken into account when designing an Interface Explain the importance of a test plan and testing of a system Unit 2 Describe mental model and how it can be applied to a user Interface This is developed by the systems designer Purpose of the system Inputs and outputs of a system, including the Interface The hardware to be used Programming language to be used This is developed by systems analyst Should clearly define what the system should do What the purpose of the system is Proposed timescale of the project End user constraints including budget and time Describes the facilities and outputs the new system should provide Project Manager Systems Analyst Systems Designer Programmer Tester A gantt chart is used for project planning and is a diagram that shows tasks as blocks of time. Four main features are... Milestones Resources Status Dependencies Operation Requirements (w hat the system should carry out) Information Requirements (w hat information the system provides to end user) Volume Requirements (how m uch processing to be handled) A CPA diagram is a tool used for project planning. CPA is the process of identifying how the tasks within a project fit together so all are in logical order and w ith minimum delay Test Plan is a formal document that lists and structures all tests to be carried out. Testing is important Make sure the system meets the design spec Make sure the system returns correct results and actually works Give confidence to end users if system passes tests successfully If a user has a mental model of the computer and knowledge of how it works then they can use it more effectively. The design of a user interface must take into account the perception of the majority of users Entity Relationship Diagram (ERD) State Transition Diagram (STD) Data Flow Diagram (DFD) Flowchart Common perceptions built into the Interface such as “green for go or good and red for stop or wrong”. Sound is also important, where perceptions of a sad sound associate (incorrect) or positive sound as (correct) Unit 2 Unit 2 Identify three different types of processing Unit 2 What is an OS and what does it manage Unit 2 What factors must be considered when designing a Human Computer Interface Describe the user interface design tool known as the Model Human Processor (MHP) Unit 3 Unit 3 Describe the facilities of IRC Unit 3 Compare the different types of broadband connection ADSL and Leased Line stating where they are best used. Unit 3 Identify and explain all of the components used in a cellular phone network List the actions that take place when a mobile phone calls a land line phone Unit 3 Identify how satellites can be used in communication systems Designing Computer Based Systems A program that controls the entire operation of the computer system Responsible for allocating memory, processor time and use of peripheral devices MHP attempts to portray the user of a computer system as a computer with memory areas and processors ADSL—Uses existing copper telephone lines to provide broadband Internet. Mainly used in homes. Leased Line— Exists only between two locations. Guaranteed bandwidth. Used by large businesses and organisations 1. Caller dials landline number 2. Request sent to BST for the cell the mobile is connected too. 3. Request passed to MSC 4. MSC checks the callers status (ie enough credit) 5. MSC connects the call to the PSTN Batch Processing (processes batches of data when the system is not busy at night e.g. payroll wages) Interactive Processing (each transaction processed one at a time e.g ticket booking website) Real-time Processing (Data processed as soon as received e.g Air Traffic Control) Colour Layout Quantity of information Font size Complexity of language Types of controls IRC (Internet Relay Chat) also known as messaging software Two or more people can communicate using text Keep a log of the conversation Sending files in a conversation Use of emoticons MS—Mobile Stations BST—Base Station Transceiver MSC—Mobile Switching Centre BSC– Base Station Controller PSTN— Public Switched Telephone Network Global Positioning (GPS) Weather Data Transfer Satellite Television Unit 3 Describe the characteristics of a LAN Unit 3 Describe the characteristics of a Virtual Network Unit 3 Unit 3 Describe the characteristics of a WAN Unit 3 Describe the characteristics of an Intranet Unit 3 Identify the 6 different types of server on a network Unit 3 Describe the advantages of setting up a Client-Server network Unit 3 Describe the term Bandwidth What is an Extranet? Unit 3 Describe the advantages of setting up a peer to peer network Unit 3 Why is it important to have high bandwidth WAN (computers are not close together, external communications line needed such as telephone line, router to connect) LAN (computers are within a local geographic area, computers have network cards, share devices, software and data) Provides services for one organisation that are secure and internal where employees with have a username and password to access. Internal email, internal web pages, chat and file transfer) Virtual Network (allows computers to communicate within a LAN who do not know that they are part of a larger network) Mail server Print Server Proxy Server Print Server Backup Server Application Server When an employee connects to a companies Intranet externally either from home or on the move. Must enter User name and Pwd. There is no reliance on a single server Backups managed centrally Data available from any computer Peer to peer network easy to set up Security and antivirus is managed centrally Each computer works independently Application software is managed and deployed to clients so it does not have to be installed on each machine Generally setup in a small business or home Bandwidth measures how much data can be transferred along the communications channel. A higher bandwidth means that more data can flow per second and has a positive impact on data transfer. Networks Unit 3 Unit 3 Describe the characteristics of a Switch Identify the device used to extend the range of cables Unit 3 Unit 3 What hardware component needs to be installed to connect a stand alone computer to a network? Describe the characteristics of a Hub Unit 3 Unit 3 Describe the characteristics of a WAP Describe the characteristics of a Router Unit 3 Unit 3 State the function of a bridge What is a MAC address? Unit 3 Unit 3 Describe two applications of Bluetooth Identify three Optical communication methods Networks Repeater (Can sit betw een tw o segments of cable. Used over distances longer than 100m) A device that connects more than one computer to create a LAN. Examines data packets to send to correct ports. Switches can be configured to manage data packets giving priority Network Interface Card (NIC) Or Wireless Network Interface Card (WNIC) A device that connects more than one computer to create a LAN (Least Intelligent). Does not examine data packets but will broadcast to every port. Devices have to filter data packets intended for it. Connects more than one computer to create a LAN (Most Intelligent). Mainly used to connect a LAN with a WAN. Examines data packets, stores IP addresses of devices to ensure sending down most efficient route Wireless Access Point (WAP) Connects to a network and broadcasts a wireless signal. Enables wireless devices such as laptops, PDA and mobile phones to connect. A unique address found on... Network Interface Cards and Wireless Network Interface Cards (e.g. 00:1D:D8:B7:1C:00 ) A bridge is used to connect two LAN’s together. (Is software based and a PC can act as a bridge) Bluetooth headset working with mobile phone Transferring files between two mobiles Connecting a mobile phone to laptop Laser Infrared Fibre Optic Networks Unit 4 Unit 4 Describe the use of ICT in the Banking sector How is ICT used within weather forecasting Unit 4 Unit 4 What are the Advantages of Computer Based Training to the trainee? Unit 4 What are the Advantages of Computer Based Training to the tutor? Unit 4 Identify three methods of distributing databases Explain the security issues of distributed databases Unit 4 Unit 4 What are the components of an Expert System Describe and give examples of where an Expert System might be used Unit 4 Unit 4 How can an MIS help managers and assist in decision making? Identify the range of services offered by digital television networks Apps of ICT Credit/Debit Card Cheques (MICR) ATM Machines (withdrawing cash, mini statement, balance, changing PIN, deposit cheque) Measuring and recording data (temperature, wind speed etc) Modelling a forecast Producing a forecast Does not need to plan materials, saves time Work can be marked electronically Easily identify common areas of weakness in topics Multimedia methods such as images, animations, sounds and videos Interactive quizzes Monitor own progress Can receive feedback on progress Work at own pace Interception of Data (due to data being moved around) Partitioned Database Replicated Database Physical Access to data Centralised Database with Indexes Consistency and Integrity of data Knowledge Base Medical Diagnosis Mobile phone fault diagnosis Printer trouble shooting Inference Engine User Interface Pay per view Voting Game show participation Choose camera angles Feedback comments to TV Interactive recording/live pause Identify trends in sales for different products (e.g sales of ice cream in summer) Monitor budgets and actual expenditure Monitoring labour input and contribution to the organisation. Apps of ICT Unit 4 Describe the Internal Resources of a System Unit 5 What are the advantages of custom written software Unit 5 Identify the Four methods for installing a new computer based system Unit 5 What factors will influence the decisions about upgrading and installing new hardware and software Unit 6 Explain why consultation, participation and communication is needed when managing change Unit 4 Describe three characteristics of a Finance system Unit 4 Describe three characteristics of a Stock control system Unit 5 Identify and describe the three different types of maintenance Unit 6 Identify the factors that must be considered when managing change Unit 6 Explain the advantages of being a member of a professional body such as the BCS Stores data about a companies finances. Placing orders for products Reports showing profit and loss Setting budgets for company Monitoring orders Forecasting for future cash Main purpose is to ensure stock levels are maintained Minimum stock levels to maintain Re-order amounts for each product Have current up to date info for each product Planned deliveries of replacement stock Location of stock, where it can be found Human (the people that use and m aintain the system) Technological (consists of the equipment for the system i.e. computers, printers) Accommodation (these are the buildings , offices and property) Also known as Bespoke software Will fill the purpose and meet all of the clients requirements The end user owns the system and can sell it on to recoup costs Likely to only require limited memory in hardware to run as program small Corrective (corrects bugs or errors in the system) Adaptive (updates the softw are with new features as a clients requirements may change) Perfective (enhances a w orking system, better layout and interface) Parallel Phased Pilot Direct Staff Capability Staff Views Systems and software Equipment Accommodation Expertise of staff (do they have the skills or will they need to be retrained?) Costs (is it affordable?) Benefits of the change (is it worth it?) Current systems (what's wrong with existing system?) Recognition of experience in IT industry Opportunities for training and career development Discuss issues on forums with other members Keep up to date with latest technology Consultation— Consult staff via meetings and letter to inform them Communication—Must explain the need for change and how it affects the workers Participation—Staff to be involved with the change to help it go through Unit 6 Describe the term authentication and identify three methods of this. Unit 6 Why is it important for organisations to keep data confidential Unit 5 Describe the Phased method of Installation Unit 6 Describe the term encryption Unit 5 Describe the Direct method of Installation Encryption is where data is scrambled and locked using an encryption key. If the data packet is intercepted it cannot be read. It must be unscrambled using the decryption key. Reviews of a system should be scheduled to occur on a regular basis using a review strategy. Reviews allow users to report any problems Ensure that the system does not become out of date Authentication is used to prove a person is who they say they are. Password/PIN Finger Print Retina Scan Voice Recognition To comply with the data protection act Keeping data that is commercially sensitive from competitors Used within larger systems when the software can be separated into smaller subsystems. Each subsystem is installed one at a time, if there are any problems it is small enough to correct.
© Copyright 2026 Paperzz