Free Shipping in Australia
Proud to be B-Corp

'AS' Level ICT (3rd Ed) Pat M. Heathcote

'AS' Level ICT (3rd Ed) By Pat M. Heathcote

'AS' Level ICT (3rd Ed) by Pat M. Heathcote

Condition - Good
Only 1 left


This 'AS' Level textbook covers Modules 1, 2 and 3 of the AQA Information and Communications Technology 'A' Level course. Case studies are used throughout to illustrate the concepts as they are explained, and questions from past examination papers are included to give plenty of practice at written work.

'AS' Level ICT (3rd Ed) Summary

'AS' Level ICT (3rd Ed) by Pat M. Heathcote

This 'AS' Level textbook covers Modules 1, 2 and 3 of the AQA Information and Communications Technology 'A' Level course and is also suitable for a wide range of IT courses including 'A' Level, GNVQ, HNC, first year degree courses in Information Technology and numerous other courses having an ICT element or module. Case studies are used throughout to illustrate the concepts as they are explained, and questions from past examination papers are included to give plenty of practice at written work. Additional resources for teachers and students are available from the publisher's website (

'AS' Level ICT (3rd Ed) Reviews

An excellent text specifically tailored for the AS course., 19 September, 2000 Reviewer: J Heppell from England, Europe Based on Heathcote's standard A level text this version has a few unchanged chapters, however it is widely updated with new examples, case studies and exam questions. The description of database design is particularly clear. The questions with worked answers and examiners comment at the end of each section are a valuable resource for teachers and students. General additions include: a greater emphasis on the Internet and web connectivity, protocols, security and encryption. Good value, certainly required reading for AS candidates.

Table of Contents

Section One Chapter 1 - The Role of ICT Computing - a look backwards Computers and employment The changing nature of employment What is Information and Communications Technology? Personal qualities for ICT professionals Chapter 2 - ICT in Business and Commerce ICT in banking Shopping on the Internet Advantages to business Advantages to the customers Doing the weekly shopping online The drawbacks of online commerce Case study: Fake eBay site Business-to-Business Finding new suppliers Setting up a Web site Chapter 3 - ICT in Manufacturing Introduction Case study: The sweet smell of success Computer-aided design (CAD) Computer-aided manufacturing (CAM) Case study: Subcontracting sector uses ICT Robots Why use robots? Chapter 4 - ICT in a Caring Society Introduction Computers in medicine Case study: Robot surgeon operates Case study: Computer simulation cuts clinical trial cost of new drugs Expert systems used in medical diagnosis Computers and the disabled Case study: Eyes in the sky Chapter 5 - ICT in Education Computers in schools Will computers replace teachers? Case study: An educational experiment Multimedia in schools The Internet in schools Restricting access Chapter 6 - Role of Communication Systems Introduction The Internet The World Wide Web Electronic bulletin boards Intranets Electronic mail (E-mail) Case study: Monitoring employee e-mail Hardware required to access the Internet Software and services required to access the Internet Telephones Case Study: The Internet revolution Facsimile transmission (Fax) Voice mail Teleconferencing Chapter 7 - ICT at Home Introduction Statistics on Internet usage Using a search engine Case study: About Google Uses of the Internet Case study: Friends Reunited Teleworking Benefits of teleworking The problems of teleworking Case study: Teleworkers use Modems not Motors Chapter 8 - Data, Information and Knowledge Input-process-output Data and Information Garbage in, garbage out The encoding of data Knowledge Access to knowledge Case study: Collecting information Sources of data Encoding information as data Case study: 'Nightmare' scheme to track every pupil Quality of data Chapter 9 - Information as a Commodity The importance of information Case study Collecting and analysing data Information as a commodity Usefulness of data Coding value judgements The benefits of ICT Case study: Ford and Microsoft invest in joint venture Limitations in the use of information technology systems Chapter 10 - Computer Crime and the Law Computer crime and malpractice Hacking Theft of data Fraud on the Internet Case study: Cyber theft to net millions Viruses 'Logic bombs' Digital crime and the law The Computer Misuse Act of 1990 Case study: Online blackmailers Software and music copyright laws Case study: Spears warns against piracy Chapter 11 - Protecting ICT Systems Internal and external threats to ICT systems Case study: Safety and Privacy of NHS records Measures to protect ICT systems from illegal access Case study: Numbers up as encryption code cracked Types of backup Other security measures Issues surrounding access to the Internet Case study: Caught on the Net Chapter 12 - Data Protection Legislation Personal privacy Case study: James Wiggins - a true story The Data Protection Act The Data Protection Principles Useful definitions from the 1984 Act Data Subjects The Data Protection Registrar A data user's Register entry Exemptions from the Act The rights of data subjects Case Study: A universal entitlement card Chapter 13 - Health and Safety Computers and health Stress Case study: Information overload Repetitive strain injury (RSI) Case study: Bank staff 'driven to injury' Eyestrain Extremely low frequency (ELF) radiation Case study: Health risks of mobile phones Computers, health and the law Classrooom menace: ignore it and you may end up in court The ergonomic environment Software can be hazardous to your health ICT1 - Sample Questions and Answers SECTION 2 Chapter 14 - Introduction to Computer Systems The components of a computer Input and output devices The processor Main memory RAM and ROM Auxiliary storage Internal storage of data The ASCII code Chapter 15 - Data Capture Keyboard data entry Key-to-disk systems Voice data entry Scanners and OCR Case study: Automating college enrolment Mouse, joystick, light pen, touch screen Magnetic Ink Character Recognition (MICR) Magnetic stripe Smart cards Optical Mark Recognition (OMR) Bar code reader or scanner Benefits of using bar codes Other uses of bar codes Hand-held input devices Chapter 16 - Verification and Validation Data capture Types of error Batch processing Validation checks Check digits Verification Detecting transmission errors Accuracy and validity Case study: Market research survey Chapter 17 - Introduction to Databases What is a database? Retrieving information from a database Databases vs. Database Management Systems Flat files Problems with flat files Redundant data Errors on input Problems with updating data Problems with modifying data Summary Using multiple tables Solving the problems of single table databases Flat file information storage and retrieval systems Chapter 18 - Relational Databases Relational databases Putting data into the correct tables Creating a database table in MS Access The significance of field types Primary key Chapter 19 - Tables, Forms, Queries and Reports The basic components of a database The tables for the Library application Forms Queries Creating the Loan form from the new query Reports Selecting a suitable output format Chapter 20 - Systems Software What is an operating system? Functions of an operating system Utility programs The DOS operating system The command-driven interface The Apple Macintosh graphical user interface (GUI) The Windows operating system UNIX Linux Chapter 21 - Categories of Software Categorising software Systems software Applications software General purpose software Integrated packages and software suites Common user interface Generic and specific software Chapter 22 - Generic Software Generic software Word processing Spreadsheets Spreadsheet features Databases and Electronic Mail Presentation Graphics Application generators Report generators Web browsers Facilities offered by a browser Search engines Working with the Web Chapter 23 - Capabilities of Software Object Linking and Embedding (OLE) About linked and embedded objects The need for portability of data Problems with portability Upgradability Criteria for selecting a software package Evaluating software Software reliability Chapter 24 - Modes of Processing Processing methods Transactions Master files and transaction files Batch processing Stages in batch processing Interactive processing Real-time and pseudo real-time processing Criteria for choice of processing mode Chapter 25 - Processing Different Types of Data Types of data Representing numbers Binary arithmetic Real numbers Digitised sound MIDI (Musical Instrument Digital Interface) Bitmapped graphics Bitmapped versus vector-based graphics Chapter 26 - Storage Devices Primary and secondary storage File processing concepts Floppy disks and Zip disks How data is stored Hard disks for microcomputers Hard disks for minis and mainframes Magnetic tape Uses of magnetic tape CD-ROM CR-R disks CD Rewritables Case study: Computers in court Chapter 27 - Security of Data Issues of privacy Case study: TRW Information Service Threats to information systems Data integrity Standard clerical procedures Write-protecting disks User IDs and passwords Access rights Securing against fraudulent use or malicious damage Protection against viruses Biometric security measures Case study: Iris recognition technology Communications security Disaster planning Case study: Safe as Houses Periodic backups Backup strategies Backup hardware Backing up on-line databases Factors in a backup strategy Recovery procedures Chapter 28 - Output Devices Printers Dot matrix printer Ink jet printers Laser printers Plotters Visual display unit (VDU) Communicating with the CPU Parallel and serial data transmission Buffering Spooling Installing hardware devices such as a printer Chapter 29 - Network Environments Communications networks Advantages and disadvantages of LANs Network topologies Star network Advantages of a star network Disadvantage of a star network Bus network Ring network Server-based vs peer-to-peer networks Wide area networks Communications links Communications media ISDN lines Bridges and gateways Hardware required for networking Chapter 30 - User Interfaces Introduction The importance of good interface design Designing usable systems Interface styles Command-line interface Menus Natural language Advantages and disadvantages of natural language dialogue Forms and dialogue boxes The WIMP interface Advantages of a common user interface Speech input (voice recognition) Speech/sound output Case study: Putting patients in the picture ICT2 - Sample Questions and Answers SECTION 3 Chapter 31 - Tackling a Minor Project Planning the time schedule The project requirements Chapter 32 - Specification and Analysis Selecting a project Investigating the user's requirements Establishing the objectives Writing up the specification Chapter 33 - Design Design tasks Database design (for a database project) Data descriptions Input Output Menu design Test plan Writing up the design and implementation Chapter 34 - Implementation and Testing Organisation is the key The implementation Testing objectives Steps in software testing Drawing up a test plan Selecting tests for the test plan Presenting the test results Chapter 35 - Documentation Introduction Should the documentation be word-processed? Word-processing skills Putting it all together The title page Table of contents Specification Design and Implementation Testing User manual Evaluation Appendix A AQA Specification Appendix B Book List Index 001 1904467547 TOCP Chapter 1 Computer systems Chapter 2 Manual input methods Chapter 3 Direct input methods Chapter 4 Data storage Chapter 5 Output devices Case study 1 ICT in supermarkets Chapter 6 Operating systems Chapter 7 User interfaces Chapter 8 Application software Chapter 9 Data handling Chapter 10 Collecting and checking data Case study 2 ICT and the police Chapter 11 Spreadsheets Chapter 12 Word processing Chapter 13 Computer graphics Chapter 14 Desk Top Publishing Chapter 15 Web design Chapter 16 Computer models Chapter 17 Computer control Case study 3 ICT in manufacturing Chapter 18 The systems life cycle Chapter 19 Computer networks Chapter 20 The Internet Chapter 21 Electronic communication Chapter 22 Computer crime Chapter 23 Data protection Chapter 24 Health and safety Case study 4 ICT and banks

Additional information

'AS' Level ICT (3rd Ed) by Pat M. Heathcote
Used - Good
Pearson Education Limited
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - 'AS' Level ICT (3rd Ed)