Sunday, December 7, 2014

End Year Exam Markscheme

Question 1 answers in Question 1 in marking scheme in link below
Question 2 answers in question 2 in the marking scheme below

Question 3 answers in question 2 in the marking scheme below

Monday, November 24, 2014

Network Functionality

Wifi Security
What is the difference between WPA, WEP and WAP in wifi security

Define what Protocols are and write brief notes on network Protocols in the link below below;
https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols

Obtain further notes on

  • Synchronous and asynchronous transmissions
  • What is a remote access
  • What is the difference between broadband and bandwidth. Give examples
  • Obtain notes on bit rates and show how to calculate the time taken to download 3gb music file using 100 Mbps

Attempt all the activities in the links below
http://wps.prenhall.com/bp_beekman_tomtech_10/183/46880/12001471.cw/index.html

http://wps.prenhall.com/bp_beekman_compconf_7/29/7508/1922285.cw/index.html

http://wps.prenhall.com/bp_beekman_tomtech_9/104/26867/6877973.cw/index.html

Cloud computing quizzes
http://www.proprofs.com/quiz-school/story.php?title=introduction-to-cloud-computing

http://www.proprofs.com/quiz-school/story.php?title=cloud-computing-basics

http://www.proprofs.com/quiz-school/story.php?title=cloud-computing-quiz

http://www.proprofs.com/quiz-school/story.php?title=cloud-computing-foundations-quiz


Monday, November 3, 2014

Computer computer network hardware, types of networks and topologies notes

Use the following links to write short notes on the following and use diagrams where possible.

Network Hardware;
Hub, Switches, Modem, Bridges, Cables, Routers, Gateway, Multiplexors, NIC, Repeaters,
http://computernetworkingnotes.com/comptia-n-plus-study-guide/network-devices-hub-switch-router.html

http://www.igcseict.info/theory/4/hware/

http://blog.teachbook.com.au/index.php/computer-science/networking-2/networking/

Networks Communications channels
twisted pair, fibre optics, coaxial cables, wireless LANs
http://fcit.usf.edu/network/chap4/chap4.htm

http://www.slideshare.net/kummathikala/communication-channels-and-types

http://what-when-how.com/data-communications-and-networking/communication-media-data-communications-and-networking/

Network Types,
LAN, WAN, MAN, SAN, VLAN, PAN,
http://education-portal.com/academy/lesson/types-of-networks-lan-wan-wlan-man-san-pan-epn-vpn.html#lesson

http://www.codesandtutorials.com/networking/basics/computer_network-types.php

http://compinfopro.com/types-of-network-pan-man-wlan-san-can-dan/

Network topologies
http://www.ianswer4u.com/2011/05/network-topology-types-of-network.html#axzz3HuXdcPtW

http://www.studytonight.com/computer-networks/network-topology-types

Write further notes on the following;


Further network types notes
  • Internet, extranet, intranet, VPN
Notes on wireless technologies using suitable diagrams advantages and disadvantage of each
Wifi and wimax notes
http://www.slideshare.net/MihirVora1/wifi-and-wimax
Write further  notes on the following;
Network operating system
  • it definition
  • functions
  • examples

Cloud computing
  • Definition of cloud computing
  • how cloud computing functions and describe it main features
  • the models/services of cloud computing
  • Advantages and disadvantages of using cloud computing
  • examples of cloud computing application or users.
  • Common social / ethical issues arising from using cloud computing services.



Sunday, October 26, 2014

Databases News Article.

Read the different databases related news articles and in each of the article;
  • Try to identify the most relevant social and ethical significance
  • Describe and understand any technology system or IT terminology listed
  • list the impacts of the technology
  • Identify one main problem and provide at least a solution.
News articles on biometrics databases
http://www.homelandsecuritynewswire.com/topics/biometric-databases

Stories of databases breaches
http://www.hackersnewsbulletin.com/category/database-breached

The 15 worst data security breaches of the 21st Century
http://www.csoonline.com/article/2130877/data-protection/the-15-worst-data-security-breaches-of-the-21st-century.html


Monday, October 6, 2014

Databases News Articles

Read the news articles assigned to you:
You will have 10 minutes to read and 5 minutes to present using the guidelines below.

  • What is your article all about ? and how does it link to the topic database?
  • Identify the most appropriate social /ethical significance
  • Mention the different stakeholders
  • Name IT technologies and systems in referred to in the article
  • Outline the impact of the technology
  • State one main problem of technology/system and suggest one solution the main problem identified. 

Barbara
http://www.bbc.co.uk/newsbeat/17226257

Ann
http://www.bbc.com/news/technology-16812064

Joshua
http://www.theguardian.com/technology/2012/jan/13/google-kenyan-rival-mocality-database

Aliasgar
http://www.bbc.co.uk/news/world-middle-east-16526067

Dinar
http://www.theguardian.com/technology/2012/jan/08/hackers-expose-defence-intelligence-officials?newsfeed=true

Khaleel
http://www.bbc.co.uk/news/uk-england-essex-15923444

Paul
http://www.bbc.co.uk/news/technology-15690187

Husnah
http://www.csoonline.com/article/2129187/data-protection/chinese-hackers-blamed-for-huge-south-korean-database-theft.html

Sharleen
http://www.bbc.co.uk/news/world-us-canada-16330396

Jhanvi
http://bigstory.ap.org/article/spread-dna-databases-sparks-ethical-concerns

Ashiqa
http://news.bbc.co.uk/2/hi/uk/7177152.stm

http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html

http://consciouslifenews.com/government-dna-databases-privacy-risk/#




Wednesday, October 1, 2014

Database Project

Create a database product that can be used to solve a unique problem within your immediate environment/community. The task will be done in pairs. The pairs should be gender balanced.

Your database should;
  • have at least two related tables
  • at least four queries with some complex calculations applied
  • a well designed switchboard and at least three forms
  • some macros
  • at least three well designed reports
As a pair you will present to the rest how the product works. The assessment rubric will be posted in Managebac.

N/B Any DBMS can be used for this project.

Thursday, September 18, 2014

Reviewing software

Use the online resources to attempt the software activities
http://wps.prenhall.com/bp_beekman_tomtech_10/

Read some notes and questions in the link below
http://www.docstoc.com/docs/109185308/ITGS---Banking-worksheet-2---answersheet

Saturday, September 13, 2014

Friday Lesson 4 Activity

Read the following two news article and respond to the following questions for each article.
http://www.huffingtonpost.com/2012/02/26/billboard-with-face-recognition-technology-ad-women-not-men_n_1302286.html

http://www.china.org.cn/business/2012-10/29/content_26934653.htm


Criterion A; 
  • What is the main social / ethical issue raised in the article?
  • Copy an extract from the article that supports issue stated.
  • Identify the main primary stakeholders in the article.

Criterion B; 
  • List down the IT concepts and terms explicitly stated in the article 
  • List down other IT concepts and terms that would be necessary to describe the technology.
  • What do you think may contribute to the Issue identified in A to exist? 

Criterion C; 
  • List down the advantages and disadvantages of the IT technology/system to the stakeholders in the article.
  • Name other stakeholders that can be impacted and not directly stated in the article.

Criterion D; 
  • State one main problem to the stakeholders of the technology/system described in the article. 
  • State one solution to the problem stated above.
  • State one strength and one limitation of your suggested solution.

Monday, September 8, 2014

Computer Software

Write brief notes on the following;

  • Application software: word processing, desktop publishing, presentations, photo and video editing, music and sound development, website development
  • System software: operating systems and utilities programs.
  • Interfaces: graphical user interface (GUI), command line interface (CLI), menu-driven interface (MDI), voice interface.
  • Distinguish between the following in terms of licencing: shareware, public domain, freeware, proprietary and open source software.
  • Licensing authorities: for Business Software Alliance (BSA), what is their role. Which other examples exist?
  • Commercial and custom-built (bespoke) software, Web-based software: What is the difference?
  • Software Registration process: What is a serial number, warranty, copyright agreement.
  • User support: what is the function of the following in any software developed? manuals, assistants, tutorials, help systems, “Read Me” files, Macros, templates, wizards.
  • Define file formats: Why do different software have different file formats? for example, RTF (rich text format), TXT (text), PDF (portable document format), XLS, (Excel spreadsheet), SWF (small web format), ZIP (zipped file), JPG/JPEG (Joint Photographic Experts Group bitmap), PNG (portable network graphics bitmap), CSV (comma-separated values), HTM/HTML (hypertext markup language).
  • Data transfer: ASCII (American Standard Code for Information Interchange), tab-delimited text file, zipped file, 
System utilities
  • What is the role of Defragmentation/optimization and disk utility software, Backup, file management, account and accessibility management.
  • Distinguish between; Virus, Trojan horse, malware, logic bomb, worm
  • Distinguish between Compression/decompression (lossless, lossy)
  • What is Colour synchronization as a computer utility feature.

Sunday, September 7, 2014

Monday, September 1, 2014

Computer Hardware

Write brief notes on the following. Use images for the devices described.
The computer system:
      Types of computers: personal digital assistant (PDA), laptop, desktop computer, mainframe computer, supercomputer etc
      Internal hardware parts of a computer; MAC address/ Motherboard/ Central processing unit (CPU), microprocessor, clock speed: for example, megahertz (MHz), gigahertz(GHz), terahertz (THz)/Primary storage: read-only memory (ROM), random-access memory (RAM)/Secondary storage: optical, magnetic, flash memory: for example, USB (universal serial bus) flash drive/
      Measure of storage: Bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB),zettabyte (ZB), yottabyte (YB)/Character encoding: ASCII (Unicode and American Standard Code for Information Interchange)/Ports
Input and output devices
      Input devices: Keyboards, mice, touch pads/ Optical mark recognition (OMR), optical character recognition (OCR), magnetic ink character recognition (MICR), radio frequency identification (RFID), radio tag, bar code scanners, magnetic stripe readers/Microphones/ Smart card readers/ Webcams, digital cameras/digital video cameras/Sensors, probes, real-time data collection/Composite devices: for example, game controllers/Touch-sensitive devices:

      Output devices: Printers, monitors, speakers, projectors/CD-ROM (compact disc read-only memory), DVD (digital versatile/video disk) readers and burners.

     Some Resources for Reference
     http://www.authorstream.com/Presentation/MissBenjamin-112909-computer-hardware-introduction-input-output-devices-software-system-education-ppt-powerpoint/
 

    http://www.computerhope.com/jargon/i/inputdev.htm

   






Wednesday, August 27, 2014

Politics and Government: Investigatation

Create a PowerPoint or Prezi presentation or use any other presentation solution for the assigned work; This is research on technologies used in politics and Governance. The task will be assessed based on the depth of the investigation and clarity.
The presentation should ;
  • be of a maximum of 10 pages
  • have each page include a relevant image or diagram for clarifications.
  • Include important related concepts and terminologies
  • Outline both positive and negative implications
  • Describe some relevant social and ethical issues
  • give practical examples from research of their application
  • shows the list of  sources used in the last page.
Ann
Online campaigning

Joshua
Online fund-raising and advertising

Sharleen
Government online tax return system

Khaleel
Military information management system

Barbara
Government biometric system

Ashiqa
Police surveillance

Aliasger
Smart weapons

Husnah
Cyberwarfare

Jhanvi
Passport control and applications

Dinar
Mangement of medical system

Paul
Battlefield technologies

Monday, August 25, 2014

E-voting

Secure method of E-voting
Watch the video http://www.ted.com/talks/david_bismark_e_voting_without_fraud
What is opinion on the method? Reflect in your notebook 

Online voting system
Create your own voting system using https://www.simplyvoting.com/
Would you recommend such solution for the SRC election? why or why not? 
Reflect in your note book.

E-voting video
Share any video with e-voting content. Post the link in the comment space below.

Write brief notes on; 
- what is e-voting
- Common problems associated with e-voting
- Name an describe some of solutions developed for the e-voting problems.
- Describe the different devices that are used in e-voting systems.


Further readings
http://people.howstuffworks.com/e-voting.htm

http://www.vvk.ee/voting-methods-in-estonia/engindex/

Politics and Government :E-voting

Your task is to find out a government, organization, or institution that used e-voting system and fill out the information in table below.
What is e-voting?


Name the Government /Organization / Institution
Name of the E-voting System
Outline the advantages and disadvantages of the System
Common Terms and concepts used in its development and application
Common Social and ethical issues stated or implied.






















Tuesday, August 19, 2014

Social and Ethical Significance

Task 1
Read the article assigned;
a) Strand 1 : State the most relevant social /ethical issue raised.

b) Strand 2 : Outline the IT terms and concepts stated directly or will be relevant to know

c) Strand  3 :  Name the application areas the issues directly impacts.

d) Outline the key stakeholders.

Husnah:
http://news.bbc.co.uk/2/hi/uk_news/education/8593727.stm

Khaleel
http://www.nytimes.com/2010/10/09/us/politics/09vote.html?_r=3&

Sharleen
http://www.nytimes.com/2012/08/20/technology/coming-next-doctors-prescribing-apps-to-patients.html?pagewanted=all

Ann
http://cars.aol.co.uk/2014/08/19/alarm-tells-drivers-to-put-phone-down-when-driving/

Ashiqa
http://www.smh.com.au/digital-life/cartech/take-it-easy-driver-mr-mcgoogles-at-the-wheel-20120509-1ycyx.html

Joshua
http://www.theage.com.au/technology/technology-news/facial-recognition--the-case-for-and-against-total-surveillance-20111122-1nry4.html

Paul
http://www.abc.net.au/4corners/stories/2013/05/27/3766576.htm

Dinar
http://www.bbc.com/news/business-24898367

Barbara
http://www.bbc.com/news/technology-16000381

Jhanvi
http://news.bbc.co.uk/2/hi/programmes/click_online/9759415.stm


Task 2
Research for a current news article with any of the ITGS social / ethical issues raised.
Use the technology news links below;
http://www.telegraph.co.uk/technology/

http://www.pcpro.co.uk/news

http://www.nytimes.com/pages/technology/index.html?adxnnl=1&adxnnlx=1192450463-60eQX/iE88/FBzGmb4C3Xg


Monday, August 18, 2014

Welcome to the ITGS Class of 2015-2016


Please click on the link below to get the full ITGS syllabus
ITGS Complete Guide

TASK 1: Main terms
Read the guide on page 4, 5, and 6.

From the reading;
a) what is the difference between 

   i) Information Technology (IT) and Information system?
   
   ii) Social impacts and ethical considerations?

   iii) ITGS project and ITGS Extended Essay?

b) How is ITGS different from Computer science and how are they similar?

    Post your comments in the comment below.

    You will need a gmail account to able to post.

TASK 2 : Social and Ethical Significance
Read the guide on page 20 - 22. and you can also watch the Youtube on  https://www.youtube.com/watch?v=4qiMTuruk0M
identify the correct social / ethical significance in the descriptions in the handout provided.

Task 3:
Watch the video in the page below
http://www.itgsnews.com/2013/02/robotic-technology-for-hospitals.html

a) Strand 1: What are some of the possible social and ethical significance that can arise from the news video.

b) Strand 2: What are some of the application areas relevant to the news video?

c) Strand 3: What are some of the IT terms and concepts arising from the video directly or indirectly?

Sunday, April 6, 2014

Case Study Revision Questions

Tips

How should students cite their research on Paper 3?
Answer:
Evidence of independent research includes details that relate to:
  • explaining specific examples that the students had investigated and/or researched using secondary research and primary investigation or research
  • visitations made by the students during the investigation and the relevance to the question asked
  • presentations/interviews from real stakeholders that are involved in real scenarios similar to the case study
  • any other research and/or investigation from secondary and/or primary sources - literally any methods for data collection as well as the actual information that was acquired beyond what is stated in the case study.
The student must refer to specifically to the source/investigation as well as the information they found out and its significance.

Useful News Articles

What Is the Future of Publishing?http://www.forbes.com/sites/nickmorgan/2012/07/12/what-is-the-future-of-publishing/

Publishers aren't facing up to the challenge of mobile

Six digital publishing startups to watch
more readings


Visit the following link and attempt the questions posted in them

http://blogs.swa-jkt.com/swa/brianduffy/2013/04/03/itgs-case-study-questions/

Must Read Article
http://pando.com/2013/01/02/seven-publishing-trends-that-will-define-2013/

Revision Paper 2 Articles.
http://www.globaljaya.net/secondary/IT/y11_itgs_2012/default.aspx

Saturday, March 22, 2014

Social and Ethical Significance

Read and state the most relevant social/ethical significance for each of the articles below; Post your comments in this blog stating why?

1. http://www.smh.com.au/digital-life/cartech/take-it-easy-driver-mr-mcgoogles-at-the-wheel-20120509-1ycyx.html

2. http://www.theage.com.au/technology/technology-news/facial-recognition--the-case-for-and-against-total-surveillance-20111122-1nry4.html

3. http://www.abc.net.au/4corners/stories/2013/05/27/3766576.htm

4. http://www.bbc.com/news/business-24898367

5. http://www.bbc.com/news/technology-16000381

6. http://news.bbc.co.uk/2/hi/programmes/click_online/9759415.stm

7. http://news.bbc.co.uk/2/hi/programmes/click_online/9755718.stm

8. http://news.bbc.co.uk/2/hi/programmes/click_online/9766176.stm

9. http://www.theage.com.au/digital-life/games/online-game-theft-earns-realworld-conviction-20120201-1qs00.html

10. http://edition.cnn.com/2012/02/10/tech/love-in-the-air-social-media/index.html

11.  http://www.smh.com.au/technology/technology-news/canadian-uses-ipad-to-enter-us-after-forgetting-his-passport-20120104-1pk4w.html

12. http://www.theage.com.au/technology/sci-tech/robots-starting-to-feel-the-love-20130918-2tzey.html

13. http://www.smh.com.au/digital-life/cartech/take-it-easy-driver-mr-mcgoogles-at-the-wheel-20120509-1ycyx.html

14. http://au.news.yahoo.com/thewest/latest/a/18787505/hackers-try-to-blackmail-girl-13/

15. http://www.nytimes.com/2013/11/10/business/they-loved-your-gpa-then-they-saw-your-tweets.html?_r=0&adxnnl=1&adxnnlx=1395519661-gF3mIWR+j0HhQu7JDuk2dg

16. http://www.nytimes.com/2010/10/17/business/17digi.html?_r=1&scp=1&sq=Digital%20domain%20randall%20stross&st=cse

17. http://www.itwire.com/business-it-news/networking/50325-new-wifi-standards-support-mesh-networks-a-promise-higher-data-rates

18. http://aftermathnews.wordpress.com/2008/08/10/%E2%80%98fakeproof%E2%80%99-e-passport-is-cloned-in-minutes/

19. http://www.bbc.co.uk/news/technology-15459005

20. http://www.theage.com.au/it-pro/government-it/virtual-lessons-bring-the-world-to-country-students-20130727-2dsj3.html

21. http://www.cbc.ca/undertheinfluence/season-2/2013/03/30/hyper-targeting-how-brands-track-you-online-1/

22. http://www.eweek.com/c/a/Security/Stanford-Hospital-Contractor-Leaks-20000-Patient-Records-to-Public-Website-642765/

http://www.zdnet.com/blog/small-business-matters/how-safe-is-your-surfing-few-smbs-have-social-networking-security-policy/510

23. http://www.nytimes.com/2010/08/17/world/asia/17north.html?ref=world










Tuesday, January 21, 2014

Public and Personal Communication

Revision link
http://itgsopedia.wikispaces.com/3.5+Personal+and+public+communications

https://sites.google.com/site/mrstevensonstechclassroom/home/strand-3-it-systems/personal-public-communications

Prepare a poster and  brief short notes or points on the assigned tasks; The poster should emailed to me for printing.
Vrinda 
a) Hand held devices 
  • Name and describe some hand held computer devices
  • What are some functions of these devices? 
  • Obtain the different images of the hand held devices.
Leslie & Parthivi
    b) GPS system
    • Define GPS
    • Describe how GPS works. (use a suitable diagram)
    • Describe the different applications or uses of GPS system
    • List some common problems of GPS system.
    Abizer  
      c) Navigation system 
      • Describe any IT navigation systems you know
      • How do navigation systems work?
      • Outline some common problems or issues associated with Navigation systems.
      Nikita 
         d) Cell/Mobile phones
        • Define a smartphone;
        • What are some common features and applications of smartphones
        • Distinguish between 4G and 3G technologies as used by mobile companies.
        • Distinguish between the following types of mobile phone networks; GSM, GPRS, CDMA, Mobitex and EDGE
         Huda 
           e) Digital Radio/TV
          • Define Digital Radio/TV.
          • Describe how digital Radio and Digital TV works. (use diagrams where possible)
          • What are some of their benefits
          • What are some of the commons problems associated with digital Radio/TV. 
          Mohammed
             f) Embedded Systems
            • Define what an embedded system is
            • Describe different IT embedded systems
            • What are the benefits of using embedded systems.
             Shristi
            g) Geotagging
            • What is geotagging
            • Describe how geotagging works
            • Name applications that use geotagging
            • What are some commons issues arising from using geotags?

            Thursday, January 9, 2014

            ITGS Project Criterion E, Criterion F and Criterion G

            Checklist list for Criterion E, Criterion F and Criterion G

            Criterion E: Product development
            Tick
            The different techniques used to develop the product have been identified.

            The product includes at least three complex techniques identified in criterion D.

            The appropriateness of the product structure has been justified.

            Screenshots along with justifications have been used to illustrate the choice of the techniques used to develop the product.

            All sources have been cited using an appropriate referencing style (APA).

            The technical documentation is approximately 1,000 words.


            Criterion F: Product evaluation and future product development
            Tick
            Feedback from client

            Appropriate feedback has been obtained from the client.

            The evidence for the consultation to obtain feedback from the client has been linked to the cover page.

            Product evaluation

            The evaluation refers to the requirement specifications in criterion B and the test plan in criterion D.

            The evaluation explicitly refers to the feedback obtained from the client.

            Future product development

            The recommendations are appropriate to the client for the future development of the product.

            The product evaluation and future product development is approximately 400 words.


            Criterion G: Required elements
            Tick
            Evidence of testing and functionality

            The product has sufficient extent to enable its effectiveness and functionality to be evaluated.

            The product has been thoroughly tested in a range of situations to ensure that no tests will fail.

            The tests used to ensure the functionality correspond to those in the completed test plan.

            Cover page

            The cover page template has been used.

            The student’s details have been added where appropriate.

            The cover page has been saved in HTM/HTML format.

            File naming and folder structures

            One folder called “product” has been created, which holds the product.

            The product folder structure is intuitive and allows files to be located easily.

            One folder called “documentation” has been created, which holds the eight documentation files: there are no other files or sub-folders within this folder.

            The documentation is easy to navigate and uses the file names prescribed in the guide.

            All links within the project are relative.

            There is appropriate use of file names throughout the project.


            Final check
            The organization of the project prescribed in the guide has been adhered to.

            The project is no more than 2,000 words.

            The links within the product and documentation (where appropriate) are relative, allowing portability.

            The project has been tested in more than one location under different conditions.

            The correct forms have been used for the cover page, analysis, and project schedule and product design.

            There are no appendices in the project.