For internal use of KMB students only
Strand 3: IT systems
Introduction
The hardware topic deals with a computer system consisting of input devices, output devices, a central processing unit and storage. ITGS students are required to understand the meaning of the terms and concepts listed here and, where appropriate, briefly describe how they work.
The increasing tendency to develop hardware in modular units raises a range of social impacts and ethical issues such as the use of non-renewable natural resources, the global transportation of manufactured components and their eventual disposal by individuals, organizations and governments.
Students are expected to discuss possible solutions and evaluate their effectiveness.
Possible scenario
A computer user is planning to upgrade their current computer system to a newer model and must use their knowledge to:
understand the specifications of the proposed new system
evaluate other physical considerations that may influence the choice of the physical environment of the proposed new system, such as ergonomics and other health-related issues
suggest upgrades to the computer system to take advantage of improvements in components, such as processing speed
describe how the proper disposal of the old computer system can take place and whether the choice of computer may be affected by the manufacturer’s policies on disposal.
IT concepts to address in this topic
The computer system
Types of computers: personal digital assistant (PDA), laptop, desktop computer
MAC address
Motherboard
Central processing unit (CPU), microprocessor, clock speed: for example, megahertz (MHz), gigahertz (GHz), terahertz (THz)
Primary storage: read-only memory (ROM), random-access memory (RAM)
Secondary storage: optical, magnetic, flash memory: for example, USB (universal serial bus) flash drive
Bit, byte, kilobyte (KB), megabyte (MB), gigabyte (GB), terabyte (TB), petabyte (PB), exabyte (EB), zettabyte (ZB), yottabyte (YB)
Character encoding: ASCII (Unicode and American Standard Code for Information Interchange)
Ports
Input and output devices
Keyboards, mice, touch pads
Optical mark recognition (OMR), optical character recognition (OCR), magnetic ink character recognition (MICR), radio frequency identification (RFID), radio tag, bar code scanners, magnetic stripe readers
Microphones
Smart card readers
Webcams, digital cameras, digital video cameras
Sensors, probes, real-time data collection
Composite devices: for example, game controllers
Touch-sensitive devices: for example, pads
Printers, monitors, speakers, projectors
CD-ROM (compact disc read-only memory), DVD (digital versatile/video disk) readers and burners
ASSESSMENT PRACTICE
Assessment objective 1: Knowledge and Understanding
Identify two characteristics of random access memory (RAM).
RAM stores data that is currently being used
RAM stores instructions from the software programs that are currently running
RAM is volatile – will be erased when the computer is turned off
RAM is both readable and writable
accessing data in RAM is much faster than accessing it from the hard disk
reading data from RAM is usually faster than from ROM
RAM addresses can be accessed in any order
RAM is an example of primary storage.
Award [1] mark for identifying each characteristic of random access memory up to a maximum of [2] marks.
Identify two devices that could be used to store a backup of the files that employees have saved on their laptops.
USB drive/flash drive/thumb drive/SD card/pen drive
external hard drive (accept responses without “external”)
online servers / cloud storage
DVD/CD
magnetic tape / tape cartridges.
Award [1] mark for identifying a device that could be used to store the backup to a maximum of [2] marks.
Assessment objective 2: Application and analysis
Analyse the advantages and disadvantages of using cloud-based storage for an RZX employee’s work files.
Advantages:
files stored in the cloud can be accessed from anywhere with internet access
files stored in the cloud can be accessed from multiple devices
if more storage space is needed then RZX can arrange with the cloud storage provider to make this possible almost immediately
security measures are provided by the cloud service (backups, firewalls, access, encryption of stored files etc) which may reduce the burden on RZX’s IT department
it may be cost effective for RZX to purchase cloud storage rather than purchasing extra storage
the IT department will spend less time managing staff files
files stored in the cloud would not take up storage space on the laptop
computers leaving more room for applications etc.
cloud storage located in countries with strong privacy laws could help protect stored files from access by third parties
files stored in the cloud could be shared between employees / worked-on collaboratively etc.
storing files in the cloud reduces the chance of important files being deleted during the vacation maintenance by the IT department.
Disadvantages:
files cannot be accessed if there is no internet access
if internet access is unavailable staff files cannot be saved in the cloud. Employees may save files to their laptop. This can lead to problems as files could be deleted/lost or even accessed by an unauthorized user
employees may find if there are issues relating to the storage of their data getting them resolved may be more time consuming than simply walking to an employee in the same office
security of staff files depends on the security measures provided by the cloud service. RZX needs to be assured that the cloud security is adequate
cloud storage located in countries with weak privacy laws could risk files being accessed by third parties.
Assessment objective 3: Synthesis and evaluation
The disposal of old IT equipment is becoming a problem. RZX is considering two options:
donating the equipment to a charitable organization
sending the equipment to a recycling service.
Evaluate the implications of these two options.
Donating the equipment:
may be seen as an altruistic gesture and good PR for the company
is a relatively simple process and ensures that existing equipment can extend its working life
there may be financial benefits from donating such as tax relief compared to recycling
donating provides IT equipment to less fortunate people
a disclaimer would be essential so the recipients don’t expect RZX to install/set up the donated equipment or fix any problems
all proprietary software would need to be deleted as this would breach licensing agreements
all personal and company files would need to be deleted to avoid privacy and security issues
recipients might just discard equipment when it no longer works instead of recycling it
charitable organization would need IT support/infrastructure.
Recycling the equipment:
recycling is a better option for items that cannot be donated as they are out of date
will reduce the environmental impact as less raw materials may need to be extracted, etc
may be a straighter forward process than donating, the items are simply collected from the offices
the recycling process may be unethical, for example, children working long hours in poor conditions in some countries
untrained / unprotected recyclers may be exposed to harmful chemicals/ toxins
not all parts can be recycled so there is still waste that needs to be disposed of
all personal and company files would need to be deleted to avoid privacy and security issues.
recycling can be more expensive than donating (eg. recycling fees)
charities who could benefit from donated equipment will lose-out as the equipment is being sent for re-cycling instead.
Issues relating to proprietary software and company/personal files also apply to recycling as the equipment could be taken home by someone at the recycling depot.
In part (c) of this question it is expected there will be a balance in the ITGS terminology between IT technical terminology and the terminology related to social and ethical impacts.