Some Facts to Remember: product check

30
Implications of the use of ICT: ICT in shops and banks Questions about how ICT is used within Shops and banks are very popular. They can take different formats, so it is important to know the key terms and basic knowledge about these topics. You will find that a lot of it is common sense. Some Facts to Remember: Bar codes: contain details about the product, and ends with a check digit, so the computer can validate that the data is correct. EPOS: (Electronic Point of Sale) the bar code details are scanned into the system by a laser scanner, which is connected to the store’s computer system. The computer then reduces the recorded stock of the product and more stock can be automatically ordered. EFTPOS: (Electronic Funds Transfer) when customers pay for shopping using debit cards instead of cash. A potential problem of EFTPOS is card fraud. To reduce this chance the card has a place for the customer’s signature. They all have a PIN number and the customer has to enter their PIN number when they purchase items with their credit/debit cards. 1.2

Transcript of Some Facts to Remember: product check

Implications of the use of ICT: ICT in shops and banks

Questions about how ICT is used within Shops and banks are very popular. They can

take different formats, so it is important to know the key terms and basic knowledge

about these topics. You will find that a lot of it is common sense. Some Facts to

Remember: Bar codes: contain details about the product, and ends with a check

digit, so the computer can

validate that the data is correct.

EPOS: (Electronic Point of

Sale) the bar code details are

scanned into the system by a

laser scanner, which is connected

to the store’s computer system.

The computer then reduces the

recorded stock of the product and

more stock can be automatically

ordered.

EFTPOS: (Electronic

Funds Transfer) when

customers pay for shopping using

debit cards instead of cash. A

potential problem of EFTPOS is

card fraud. To reduce this chance the card has a place for the

customer’s signature. They all have a PIN number and the

customer has to enter their PIN number when they purchase

items with their credit/debit

cards.

1.2

Top tip

If you imagine yourself being served this will help you answer this question.

Top tip

Incorrect answers to this would be packing bags. You are looking for services that are offered by the POS. e.g. discounts, receipts, Buy one, get one free, loyalty cards, cash back, etc.

To do: Label the image below to show which devices

are inputs and which are outputs

ICT in Retail & Banking Part 2

How barcodes work

It is important to know how ICT is used within banks.

There are three main ways.

1) Computers are used to

process cheques.

There are three sets of numbers on the bottom of the cheque these are:

cheque number, sort code and

account number. They are typed

using Magnetic Ink. All cheques go to

a clearing-house, where they are read

MICR – Magnetic Ink using MICR.

Character Recognition The main benefits of this, is that it is quicker and

more accurate than

processing the cheques by hand.

2) ATMs.

ATM stands for Automatic Telling

Machine. By putting a bank card in a person can withdraw money.

On the back of the card is a magnetic

stripe containing the customer’s account number, bank sort code and

the maximum amount they can withdraw each day.

Banks like ATM’s because they can

employ fewer cashiers and offer 24hour service. Customers like them

because they can get cash where and

when they need it.

3) Home banking.

Home banking uses the Internet or

telephone to give customers access to their bank accounts 24 hours a day.

Problems for banks Benefits for banks

High level security Paper costs are

needed lower

Still security breaches Less storage space

happen/hackers needed

Credit & Debit Cards

Cards play an increasingly important role

in retail and banking and as a result, have

become increasingly targeted by

criminals.

Types of card

Credit Cards

Give the user access to borrowed money and can often be used anywhere.

They are usually more expensive to use and charge high interest rates

Debit Card

Give the user easy access to money in their own account and usually can be used in

fewer places. They are generally cheaper to own and use than credit cards.

You can also use ATMs to:

Check your balance

Top up your mobile

Order a new pin or cheque book

• Test it – Banks, Retail & Data Capture

How Cards work

Cards work by combining features such Chip and Pin

with signatures , verification codes and magstripes

Magstripes ( or magnetic stripes )

Contain information such as Country Code and Name

and Account Number

Cards and Crime

Cards (and card details) are often stolen for crimes

like Fraud , Theft and Identity Theft

Top tip You may sometimes be asked to explain the advantages or cards for customers, banks or even shops

ICT in Retail & Banking Part 3

Top tip

When a question asks for advantages or disadvantages of something be careful to remember who it is concerning . In this question the advantages are for the customer not the bank. Other ways of Capturing Data

LOOK!

You will often be asked to identify other ways that data is captured electronically.

Pay close attention to these examples. You may only be given these and asked how they are used.

O ptical M ark R ecognition

Uses infra red light to scan

marks entered onto forms

such as lottery tickets,

multiple choice exam papers

and registers

Good for large amounts, but

must be entered accurately

O ptical C haracter R ecognition

uses scanner to convert hand written or

typed text into digital format

good for easy data capture – prone to mistakes

• Test it – Banks, Retail & Data Capture

Implications of the use of ICT:

Communication & Networks

Examiners like asking questions about E-mail and networks.

E-mail (Electronic Mail) is a way of sending messages (and documents) from one computer to another. The messages are often text-based, and are usually sent via a PC

connected to the Internet. But you can also use a WAP mobile phone or a digital television.

Networks – a network is when two or more computers are connected together to communicate. The Internet is a type of network.

1.3

E - Mail Positives

1) It’s quick - e - mails take seconds to send

2) It’s cheap - e - mails are cheaper than posting or faxing

3) Sensing a message to many people is easy -

and grouping addresses is as easy as sending to one person.

E - Mail Negatives

1) The sender and receiver both need Internet access and e - mail accounts.

2) The hardware and software is expensive.

3) Get a single letter of the address wrong, and the message won’t be delivered.

4) The message sits in the recipient’s mailbox until they next look at their e - mail account.

[email protected]

User

name

domain

name

organisation

code

Country

code

The parts of an e - mail address

To do: Use this website to make a list of e - mail features: http://www.bbc.co.uk/schools/gcsebitesi

ze/ict/datacomm/1emailrev2.shtml

LAN’s (Local Area Networks) are the networks you see in most schools and offices. WAN’s (Wide Area Networks) are used when the computers that need to be connected together are in different places.

Networks: Advantages

1) Peripherals such as printers can be shared amongst many different users.

2) Terminals are cheaper than stand - alone PC’s.

3) Software can be shared

amongst different users. 4) Communication across the

network is cheap and fast .

Networks: Disadvantages

1) Cabling can be expensive to install and replace.

2) A fault with the server will prevent the whole network from working .

3) Security measures are needed to restrict access to the network.

4) WAN’s are vulnerable to hackers and viruses .

Network Topologies

Networks come in many shapes and sizes.

Each has advantages and disadvantages

The Internet is:

all networks linked

together

Bus Network Single connection for all computers Easy to make but only works well when small.

Ring Network Sends messages through shared link. No server needed, but one machine fails and whole network fails

Star Network Machines linked to central server Stable and easy to manage but if server fails, network fails

Mesh Network All machines linked to multiple others Fast and powerful buts lots of redundant machines

Network Rules There are a number of techniques organisations use to maintain network

security. Some are shown below:

Network Protection Methods Relevant Rules/Policies

Usernames & Passwords Must not be shared with others

used to prevent unauthorised access Change password frequently

Firewalls & Virus Checkers Don’t install unchecked files Block and/or

Check for viruses

Backups & Protection Backup files and make sure

Copies made of important files network is physically secure Locks, and

safe storage of discs

Policies and Laws No hacking or tampering with files

Employees must follow policies No accessing or sharing of

Laws such as Data Protection Act inappropriate or illegal content

No unauthorised sharing of files or

protected information/data

To do: Below are a list of terms you may be asked about. Link

up the term with the correct definition:

Malware Junk e-mails sent to many recipients Trojan Horse Software

designed to do damage or exploit security weaknesses

Identity Theft A harmful program or application that is

disguised as something else

Spam

Stealing and using personal details to commit fraud or theft

Want to find out more?

http://www.didcotgirls.oxon.sch.uk/depts/it/gcse/notes/security/index.htm

Awww!….shuck s you guys

• Test it – Communication & Networks

• Test it – Communication & Networks

1.4

Humans and ComputersHumans and Computers Graphical User InterfaceGraphical User Interface

It’s all about Gooeys and WIMPs nowadays!

In order to make the process of using computers

easier, software designers such as Doug Engelbart,

Steve Jobs and Bill Gates came up with ways of

combining lots of computer applications into one

G raphical U ser I nterface (GUIs or “Gooey” for short)

LOOK!

You will often be asked to list the above features of a GUI, so it’s worth remembering what W.I.M.P stands for

To Do: Identify the four features of a GUI on the picture below

W indow

I con

M enu

P ointer

1.5 Knowledge,

Information & Data

Examiners are always keen

to check that you understand

the difference between

Knowledge, Information &

Data. Therefore, it’s worth

taking time to make sure you

do in fact know this.

Data is words,

numbers, dates,

images, sounds etc

without context.

e.g.

Information is a

collection of words,

numbers, dates,

images, sounds etc put

into

context, i.e. to give them

meaning. . e.g.

Knowledge is the ability to understand information and to then

form judgements, e.g. “Newport have won ten games

Hmmmn,.... I just know I know this one!!!

love

Fluffy bunny loves you

Newport 22, Pompey nil

Newport

Kenny is 22

LOOK!

You will often be asked to just

Give definitions

of what

data, knowledge and information are, so it is worth practising these definitions

opinions, make predictions in a row, therefore I predict and

decisions based on that they will be promoted!”

understanding.

Want to find out more?

http://www.bbc.co.uk/schools/gcsebitesize/ict/databases/0datainforev1.shtml

• Test it – Humans & Computers

1.7 Control and Automation

3. Processor

Often a computer.

Want to find out more?

http://www.bbc.co.uk/schools/gcsebitesize/ict/measurecontrol/0computercontrolrev1.shtml

• Test it – Control

The Internet & World Wide Web 1.8 Advantages, Disadvantages

& Dangers

Cheers Tim!

Since Tim Berners-Lee and his team created the World

Wide Web to enhance the Internet, www based

services and technologies have gone from strength to

strength and now affect almost every aspect of our

lives.

The benefits are enormous; but there are also disadvantages and dangers

to using these technologies.

To Do:

Describe a system that Fred

could use to make getting in

and out of his office easier

( Make sure you use the key terms )

One of the biggest advantages of the www is how it makes buying and

selling products and services ( usually called E-Commerce) easy. E.g.

Search engines make Websites can be accessed at any Shopping carts make finding what

you want easier time from anywhere paying easy

The Internet & World Wide Web

Advantages, Disadvantages & Dangers

E-safety

Because of its size, complexity, ease of access and speed of development, it is hard to

make sure the Internet is safe. You need to be able to show that you are aware of the

dangers you may encounter on the web and what you can do to avoid them. In the exam

you will often be asked to explain some of the following:

1.8

WWW

Advantages

24 /7/365 access

Interactive

More choice

Lower costs

Compare items

easily

Instant access to

information

Stay at home

communication

Access to software

Access to services

E - mail

Instant Messaging

WWW

Disadvantages

Cost of access

Distance

Long delivery times

Spamming

Dodgy software

Dodgy Content

Reliability

Privacy

No access for all

To Do!

You may be asked to give examples for buyers or sellers. Write down advantages

and disadvantages for buyers and sellers for

each of the examples listed above.

-As is says on the tin Copyright

Tell Parents -Damage/Infection/Theft

Share info. with care Check where possible

Block if possible In in doubt, don’t

Look for royalty-free content

Want to find out more?

http://www.teach-ict.com/ks3/internet_safety/staying_safe/stayingsafe1.htm

Chat rooms

- Stranger Danger

Use nickname

Don’t share personal info Stay in public chat rooms

Don’t accept attachments

Don’t agree to meet

Passwords

- Fraud/Theft/Bullying

Do not share

Use 3ncrypt3d passwords

Change regularly

Don’t use personal data such as birthdates

Cyber - bullying

• Test it – Internet