ICT 0417 – Input and Output Devices: Direct Data‑Entry Devices
Learning Outcomes (Mapped to Assessment Objectives)
- AO1 – Knowledge: Identify the characteristics, typical uses, advantages, disadvantages, security considerations, health & safety issues and environmental impact of each direct data‑entry device.
- AO2 – Application: Choose the most appropriate device for a given ICT solution and justify the choice using the life‑cycle checklist.
- AO3 – Analysis: Evaluate the impact of a device on security, health & safety, the environment and data‑format requirements.
Key Terms (Glossary)
| Term | Definition (syllabus language) |
|---|
| Chip (Smart‑card) | A micro‑processor embedded in a card that can store, process and encrypt data. |
| RFID tag | A small electronic device that contains an antenna and a chip; it can be passive (no battery) or active (battery‑powered). |
| Anti‑collision | Technology that allows a reader to communicate with several RFID tags at the same time and separate their responses. |
| OCR | Optical Character Recognition – software that converts scanned printed or handwritten text into editable digital characters. |
| OMR | Optical Mark Recognition – hardware that detects the presence or absence of a dark mark in a predefined position. |
| QR‑code | Quick‑Response 2‑D barcode that can store up to 7 KB of alphanumeric data and can be read by a camera‑based scanner. |
| NFC | Near‑Field Communication – a short‑range (≤ 10 cm) wireless protocol based on RFID, used for contactless data exchange. |
| Encryption | The process of converting data into a coded form that can only be read with a decryption key. |
| Data‑protection legislation | Legal frameworks such as the UK Data Protection Act 2018 and GDPR that require personal data to be processed securely and only for a lawful purpose. |
Systems Life‑Cycle Checklist for Selecting a Direct Data‑Entry Device
- Analysis: Identify the type of data (numeric, alphanumeric, binary), volume, speed required and security level.
- Design: Match device characteristics to the analysis (e.g., contactless vs. contact, read‑only vs. read‑write).
- Implementation: Plan integration (hardware ports, drivers, software APIs) and data‑format handling (CSV, XML, JSON).
- Testing: Verify read accuracy, error‑rate, speed, and security (encryption, authentication).
- Maintenance: Schedule firmware updates, cleaning, battery replacement (if any) and disposal of e‑waste.
Quick‑Reference Chart – Device Summary
| Device | Typical Uses | Data Format (common export) | Security Level* | Environmental Impact |
|---|
| Magnetic‑Stripe Reader (MSR) | Bank cards, loyalty cards, transport tickets | CSV (fixed fields) | Low – easily cloned | Low (paper cards only) |
| Chip & PIN (EMV) Reader | Debit/credit cards, e‑passports, secure ID | Encrypted XML/JSON | High – dynamic data & PIN | Medium (electronic cards) |
| RFID Reader | Asset tracking, access fobs, livestock ID | CSV or binary tag data | Medium‑High – can use encryption | Medium‑High (tags may be disposable) |
| OMR Reader | Multiple‑choice tests, surveys, ballots | CSV (binary 0/1 per field) | Low – relies on physical security of forms | Low (paper forms) |
| OCR Scanner | Invoice processing, document archiving | Editable text (DOCX, TXT) or XML | Medium – depends on software encryption | Medium (energy use, paper waste reduced) |
| 1‑D Bar‑Code Reader | Retail checkout, inventory, library books | CSV (code + item ID) | Low‑Medium – easy to copy | Low (paper labels) |
| 2‑D QR‑Code Reader | Mobile payments, event tickets, URL linking | CSV or JSON (code + payload) | Medium – can embed encryption or digital signatures | Low (printed on existing media) |
| NFC Reader | Contactless payment, smart‑poster interaction, access control | Encrypted NDEF messages (binary) | High – short range + encryption | Low‑Medium (hand‑held readers consume power) |
*Security Level is a qualitative indication based on typical implementation; actual security depends on configuration and supporting software.
Direct Data‑Entry Devices – Detailed Tables
1. Magnetic‑Stripe Reader (MSR)
| Aspect | Details |
|---|
| Characteristics | Contact‑based reader that detects magnetic flux changes on a stripe; usually a swipe or dip motion. |
| Typical Uses | Bank/credit cards, loyalty cards, transport tickets, employee ID badges. |
| Advantages | - Low purchase and maintenance cost.
- Very fast read time (< 0.5 s).
- Simple integration with POS, access‑control and ticketing software.
|
| Disadvantages | - Limited storage (≈ 2–3 KB) and static data – cannot be updated.
- Stripe wears out with repeated use, reducing reliability.
- Easy to clone or skim with inexpensive hardware.
|
| Security Considerations | - Primary threat: data skimming and cloning.
- Mitigation: combine with a Chip & PIN transaction, use CVV verification, and apply encryption when data is transferred to back‑end systems (end‑to‑end encryption required by data‑protection legislation).
- Ensure compliance with the UK Data Protection Act 2018 – store only the data needed for the transaction and delete it securely afterwards.
|
| Health & Safety | - Ergonomic: place the reader at waist height to avoid repetitive bending.
- E‑safety: keep the device clean; contaminated surfaces can harbour bacteria – clean with alcohol wipes.
|
| Environmental Impact | Plastic cards are disposable; encourage reuse of cards and recycling programmes for end‑of‑life cards. |
| Data‑Format Implications | Usually exported as fixed‑field CSV files (e.g., card number, expiry date, service code). |
2. Chip & PIN (EMV) Reader
| Aspect | Details |
|---|
| Characteristics | Contact smart‑card reader that accesses a micro‑processor chip; requires card insertion and a personal identification number (PIN). Supports dynamic data generation and strong encryption. |
| Typical Uses | Debit/credit cards, secure employee ID cards, e‑passports, contactless payment terminals (when paired with NFC). |
| Advantages | - High security – encrypted transaction data and PIN verification.
- Data on the chip can be updated (e.g., balance, access rights).
- Chip is protected inside the card – resistant to wear and environmental damage.
|
| Disadvantages | - Higher acquisition cost than magnetic‑stripe readers.
- Longer transaction time (2–3 s) due to cryptographic processing.
- Requires a powered PIN pad and regular firmware updates.
|
| Security Considerations | - Threats: card‑present fraud, malware on the terminal, relay attacks.
- Mitigation: end‑to‑end encryption (E2EE), secure PIN entry (tamper‑evident PIN pad), regular firmware patches, and compliance with PCI‑DSS standards.
- Data‑protection legislation mandates that personal data (e.g., cardholder name) be stored only in encrypted form and retained for the minimum period required.
|
| Health & Safety | - Position the PIN pad to keep wrists neutral; provide a wrist rest if the device is used for long periods.
- Clean the keypad regularly to minimise bacterial growth.
- Follow e‑safety guidelines – keep the terminal away from liquids and ensure the power cable is not a trip hazard.
|
| Environmental Impact | Cards contain plastic and a small chip; encourage reuse and proper recycling of expired cards. |
| Data‑Format Implications | Exported as encrypted XML or JSON files; often integrated directly with banking APIs that require specific message formats (ISO‑8583). |
3. Radio‑Frequency Identification (RFID) Reader
| Aspect | Details |
|---|
| Characteristics | Uses radio waves (125 kHz, 13.56 MHz or UHF) to communicate with RFID tags. Can be contactless (near‑field) or long‑range (active tags with battery). Supports read‑only or read‑write operations and anti‑collision for multiple tags. |
| Typical Uses | Inventory & asset tracking, access control (key‑fobs), contactless payment, livestock identification, library management. |
| Advantages | - No line‑of‑sight required; tags can be read through packaging.
- Multiple tags can be read simultaneously (anti‑collision).
- Fast read/write cycles (milliseconds).
- Durable tags survive harsh environments (temperature, moisture).
|
| Disadvantages | - Potential interference from metal surfaces or liquids.
- Higher initial cost for readers and tag infrastructure.
- Passive tags have limited range (centimetres to a few metres).
|
| Security Considerations | - Threats: eavesdropping, cloning, unauthorized reads, relay attacks.
- Mitigation: tag‑level encryption, mutual authentication protocols, use of short‑range standards (e.g., NFC), physical shielding (Faraday cages) for high‑security zones.
- When personal data is stored on tags, GDPR requires that the data be pseudonymised or encrypted and that a data‑retention policy be in place.
|
| Health & Safety | - RF exposure from passive tags is negligible; active tags emit low‑power RF – still advise keeping readers away from high‑traffic walkways to avoid accidental contact.
- E‑safety: ensure cables are insulated and that readers are mounted securely to prevent tripping hazards.
|
| Environmental Impact | Passive tags are cheap and often disposable – encourage bulk recycling programmes. Active tags contain batteries; they must be disposed of as hazardous waste. |
| Data‑Format Implications | Tag data can be exported as CSV (ID, timestamp, location) or as binary blobs for integration with asset‑management databases. |
4. Optical Mark Recognition (OMR) Reader
| Aspect | Details |
|---|
| Characteristics | Detects the presence or absence of a dark mark in a pre‑designed grid using a light source and an array of photodetectors. Produces binary data (marked = 1, unmarked = 0). |
| Typical Uses | Multiple‑choice examinations, surveys, attendance sheets, voting ballots. |
| Advantages | - Very fast processing of large volumes of forms.
- Low error rate when forms are correctly completed.
- Simple, inexpensive hardware compared with OCR.
|
| Disadvantages | - Requires specially designed forms with precise mark positions.
- Cannot interpret free‑form handwriting or partially filled bubbles.
- Limited to binary (yes/no) data.
|
| Security Considerations | - Risk of form tampering (e.g., adding extra marks after the fact).
- Mitigation: use secure paper, unique form IDs, watermarks and maintain an audit trail of scanned images.
- When personal data is collected, store scanned images securely and delete originals after verification to meet data‑protection requirements.
|
| Health & Safety | - Minimal physical risk; ensure good ambient lighting to avoid eye strain when operators manually verify marks.
- E‑safety: keep the scanner’s power cable away from walkways and use surge protectors.
|
| Environmental Impact | Uses paper forms – encourage double‑sided printing and recycling of completed sheets. |
| Data‑Format Implications | Exports typically as CSV where each column represents a question/item and each row a respondent. |
5. Optical Character Recognition (OCR) Scanner
| Aspect | Details |
|---|
| Characteristics | Scans printed or handwritten text and converts it into editable digital characters using pattern‑matching, feature extraction and, increasingly, machine‑learning algorithms. |
| Typical Uses | Digitising printed documents, invoice processing, passport/ID scanning, archival of books and newspapers. |
| Advantages | - Greatly reduces manual data‑entry time.
- Creates searchable, editable electronic archives.
- Modern software handles many fonts, layouts and even cursive handwriting (with variable accuracy).
|
| Disadvantages | - Accuracy drops with poor print quality, unusual fonts, stains or cursive writing.
- Requires post‑processing (proof‑reading) to correct errors.
- Initial software licence can be costly for schools.
|
| Security Considerations | - Sensitive data may be exposed during scanning or while stored on the workstation.
- Mitigation: scan directly to encrypted folders, enforce strong passwords on the workstation, limit user access, and delete originals securely after verification.
- Comply with data‑protection legislation by maintaining a record of processing activities (ROPA).
|
| Health & Safety | - Prolonged use of flat‑bed scanners can cause repetitive‑strain injuries – provide adjustable height workstations and encourage micro‑breaks.
- E‑safety: keep the scanner’s power cable tidy, use anti‑static mats, and ensure the device is grounded.
|
| Environmental Impact | Reduces paper storage needs; however, scanners consume electricity – switch off when not in use and consider energy‑efficient models. |
| Data‑Format Implications | Outputs can be plain text (TXT), formatted documents (DOCX, PDF with OCR layer) or structured XML/JSON for import into databases. |
6. 1‑D Bar‑Code Reader
| Aspect | Details |
|---|
| Characteristics | Uses a laser or LED to illuminate a series of parallel bars; the reflected light pattern is decoded into numeric or alphanumeric data (typically up to 20 characters). |
| Typical Uses | Retail checkout, inventory control, shipping labels, library book tracking. |
| Advantages | - Very low cost; ubiquitous in retail and logistics.
- Fast read speed (milliseconds).
- Easy integration with databases and POS software.
|
| Disadvantages | - Requires a clear line‑of‑sight; damaged or dirty bars cause read errors.
- Limited data capacity (usually ≤ 20 characters).
- Not suitable for very small items where space is constrained.
|
| Security Considerations | - Easy to duplicate; counterfeit bar‑codes can be printed.
- Mitigation: combine with a serial number or check‑digit verification, or use 2‑D codes for higher security.
- When bar‑codes contain personal data, encrypt the data before printing and store the decryption key securely.
|
| Health & Safety | - Minimal ergonomic risk; keep the scanner at a comfortable height.
- E‑safety: ensure the laser class is safe for everyday use (most scanners are Class 1 or Class 2).
|
| Environmental Impact | Paper labels generate waste – encourage recyclable label stock and use digital receipts where possible. |
| Data‑Format Implications | Usually exported as CSV (code, product ID, quantity) or directly inserted into a relational database. |
7. QR‑Code Reader (2‑D Bar‑Code)
| Aspect | Details |
|---|
| Characteristics | Camera‑based scanner that reads a matrix of black‑and‑white squares. Can store up to 7 KB of alphanumeric data, URLs, or binary payloads. Error‑correction levels allow partial damage. |
| Typical Uses | Mobile payments, event tickets, product information, URL linking on posters, contactless authentication. |
| Advantages | - High data capacity compared with 1‑D codes.
- Can be printed on almost any surface, including packaging and screens.
- Reader is often a smartphone camera – no extra hardware needed.
|
| Disadvantages | - Requires a camera with sufficient resolution; older devices may struggle.
- Scanning speed can be slower in low‑light conditions.
- Security depends on the application – a QR‑code can direct users to malicious URLs.
|
| Security Considerations | - Threats: phishing via malicious URLs, data leakage if the code contains personal information.
- Mitigation: validate the URL before opening, use signed QR‑codes (digital signature embedded), and encrypt any personal data stored in the payload.
- Follow GDPR principles – do not embed personally identifiable information (PII) unless it is encrypted.
|
| Health & Safety | - Ergonomic: hold the device at eye level to avoid neck strain.
- E‑safety: ensure the device’s camera lens is clean; avoid scanning in bright sunlight which can cause glare.
|
| Environmental Impact | Printed QR‑codes use the same paper or packaging as the product; no additional electronic waste. |
| Data‑Format Implications | Exported as JSON or CSV (code ID, payload, timestamp) for integration with web‑services. |
8. NFC Reader (Near‑Field Communication)
| Aspect | Details |
|---|
| Characteristics | Short‑range (≤ 10 cm) wireless protocol based on RFID (13.56 MHz). Allows two‑way data exchange; commonly built into smartphones, payment terminals and access‑control panels. |
| Typical Uses | Contactless payment (Apple Pay, Google Pay), smart‑poster interactions, secure building access, ticketing, data transfer between devices. |
| Advantages | - Very secure due to short range – reduces eavesdropping risk.
- Supports encrypted communication and mutual authentication.
- Power‑free passive tags (no battery required).
- Widely supported by modern smartphones – no extra hardware for many users.
|
| Disadvantages | - Limited to very short distances; user must bring devices close together.
- Compatibility issues between different NFC standards (ISO/IEC 14443 vs. 15693).
- Implementation cost for dedicated readers in large‑scale installations.
|
| Security Considerations | - Threats: relay attacks, data‑skimming, malware on the host device.
- Mitigation: use secure element on the device, enable tokenisation for payments, enforce mutual authentication and encrypt all NDEF messages.
- Compliance with PCI‑DSS (for payments) and GDPR (for any personal data transferred).
|
| Health & Safety | - RF exposure is negligible; still advise keeping readers away from high‑traffic walkways to avoid accidental contact.
- E‑safety: ensure firmware is kept up‑to‑date to protect against known vulnerabilities.
|
| Environmental Impact | Passive NFC tags are cheap and often single‑use – encourage recycling programmes. Readers are low‑power devices. |
| Data‑Format Implications | Data is exchanged as NDEF (NFC Data Exchange Format) messages – can be stored as binary blobs or converted to JSON for backend systems. |
Linking Devices to the Wider ICT Syllabus
- Section 1 – Types & Components of Computer Systems: Direct data‑entry devices are peripheral hardware that convert physical information into digital form.
- Section 4 – Networks: Many readers (RFID, NFC, QR‑code scanners) communicate with networked databases via Wi‑Fi or Ethernet.
- Section 5 – Effects of Using IT: Health & safety notes above, plus environmental impact for each device.
- Section 8 – Safety & Security: Security considerations reference encryption, authentication, passwords and data‑protection legislation.
- Section 10 – File Management: Data‑format implications show how captured data can be stored as CSV, XML, JSON or directly in a database.
- Section 7 – Systems Life‑Cycle: The checklist provides a structured approach to selecting and implementing a device.
Summary
Direct data‑entry devices range from simple magnetic‑stripe readers to sophisticated NFC and RFID systems. Choosing the right device requires analysing the data type, speed, security level, ergonomic impact and environmental considerations. By applying the life‑cycle checklist and referencing the security and health‑safety guidance in this note, students can meet all AO1–AO3 requirements of the Cambridge IGCSE ICT 0417 syllabus.