• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Hardware and software ICT revision notes

Extracts from this document...


GNVQ INFORMATION TECHNOLOGY HARDWARE & SOFTWARE REVISION NOTES Name ICT GNVQ REVISION PROGRAMME FOR UNIT HARDWARE & SOFTWARE This unit helps you to: * understand ICT specifications for hardware and software * select an ICT system and configure it to meet the needs of users * write a program to improve efficient use of application software (macros) * write a program to display hypertext information (html) * understand and develop good practice in your use of ICT The topics are: * hardware * software * computer programming * html programs * macro programs * standard ways of working Hardware ICT systems are made up of hardware and software. You must learn to identify and know the purpose of the components (pieces) of hardware that make up an ICT system, including: * input devices * output devices * main processing unit * cables and connectors. Some hardware components are inside the main processing unit. You will need to understand the purpose of these and how they affect the ICT system specification, including: * disk drives (floppy, hard) * CD ROM drive * memory (RAM and ROM) * ports (input and output connectors) * motherboard * central processing unit (CPU) * data and software on computers can be stored in different ways. You will need to know the different types of storage used, including: * RAM (random-access memory) * ROM (read-only memory) * magnetic disk (hard, floppy) * optical storage (for example CD ROM, DVD) You will need to be able to compare the different types of storage for: * volatility (loss when power removed) * storage capacity * speed of access and retrieval * read capability * write capability * cost. ...read more.


* Clip-art * Simple shapes such as circles, rectangles etc. * Photographic images from a scanner or digital camera can be manipulated in a graphics package * Computer aided design programmes help architects and designers produce technical drawings * Other industries use graphics packages to help them with their work - e.g., fashion designers, publishing companies * Graphics files use a lot of memory so need a computer with a powerful CPU, a large hard drive and lots of RAM, together with a high resolution monitor and colour printer Personal Organisers * Schedulers or electronic diaries are used in many large companies to recors appointments, meetings, contact details etc. * Can be set up to provide reminders of important events or dates. * When used over a network they enable you to see when other people might be available for meetings etc and can save a lot of time in making telephone calls when trying to arrange a meeting. When a free slot is found, the meeting details can be entered in all the diaries at the same time E-Mail * An increasingly popular way to communicate with people all over the world * E-mails can be sent to individuals or a list of people. * Much quicker than telephone or letters * Data files can be attached to e-mails - e.g. a spreadsheet, database or word processed document. * The recipient can read the e-mail, save it, delete it, forward it to someone else or reply to you immediately Utilities * Often used to check the performance of a computer system * Most common is probably a virus checker, this scans all files, detects and removes viruses from floppy disks and hard drives. ...read more.


* call or create a new template * modify application software configuration (set options, customise) Templates A template is a blueprint for the text, graphics and formatting in a document. A Fax template for example contains the company name, a date field and placeholders to indicate where to type the recipient's name, address, fax and phone numbers, the number of pages and the message text. The benefits of a template are: * They can be used time and time again * They save time inputting basic data * They reduce errors * They mean that all documents based on the template have the same layout, so providing a consistent company image Standard Ways of Working Note: What you need to know and be able to do to implement standard ways of working is described in detail in Unit A: Presenting information (Intermediate). The following is a shortened version of these requirements written to apply specifically to this unit. To develop good practice in your use of ICT you must: * plan your work to produce what is required to given deadlines * keep a log of ICT problems you met and how you solved them * evaluate your work and suggest how it might be improved * proof-read your products (on screen) to ensure accuracy and economic use of material * keep backup copies of files on another disk and/or in another location * save work regularly using different filenames * keep information free from viruses * respect confidentiality * respect copyright When setting up or using ICT systems, you must be able to work safely. You must ensure that: * cables do not cause an obstacle hazard * cables and connectors are electrically safe * you replace consumable materials correctly * physical working environment and position (ergonomics) are acceptable D.M.Hislop Hardware & Software Revision Notes Page 9 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    computer program which attempts to reproduce the performance of a human mainly experts at a specialised task. A wide variety of methods can be used to simulate the performance of the expert, the most common are knowledgebase which uses knowledge representation to gain the information.

  2. Computer systems assignment 1

    If working on XP there are always more security risks than linux as there are less viruses created to infect linux than XP. Using utilities There are number of utilities that support and maintain the performance and security of computer systems.

  1. AS ICT Corsework - Mr Brookes K-Fit Ltd

    I expect that all the hyperlinks will work correctly and link to the correct page. Test Two - Image Loading I am testing that all the images are working and load up correctly Go through all the images refreshing the page 2 - 3 times to check that the image of the page is working properly.

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    Yours sincerely A.Gooman Azhar Gooman Email Dear IT Technical Support Staff I am producing this email as a guide to you in relation to the system getting updated on Tuesday 13th January 2009 for the whole day. This email will consist of what is happening and when also the procedure

  1. HTML. HTML (Hyper Text Markup Language), it isnt a programming language; it is a ...

    With a majority of features, XHTML 1.0 is a reformulation of HTML 4.01 in XML, and combines the strength of HTML 4 with the power of XML. XHTML 1.0 was the first major change to HTML since HTML 4.0 was released in 1997.

  2. Describe the hardware and software used to create and edit graphic images and compare ...

    Having little RAM will cause programs such as Photoshop to run very slowly. Another main limitation of RAM is that it is volatile memory meaning that when the power goes off, the information is gone. This means there is always risk of losing data.

  1. Future Developments in ICT

    Software must always make efficient use of the hardware available to it, to extract the maximum performance; it must evolve with hardware, if not slightly faster! The problem that arises is, can multiple cores complete the same task faster than one?

  2. Small Office Network Implementation - hardware and security.

    One example of this is using one-time passwords. * Firewalls - Filter network traffic to allow only valid traffic and services. * Virtual Private Networks (VPNs) - Hide traffic content to prevent unwanted disclosure to unauthorized or malicious individuals. * Vulnerability patching - Apply fixes or measures to stop the exploitation of known vulnerabilities.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work