0 ratings0% found this document useful (0 votes) 85 views25 pagesIct Theory Revision
ict olevel theory revision
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Mohamed Mamdouh
Types of Computers
Co or ns Smart Phone
Y thasapeterneat | 7 moneuntsonsakesup | 7 Kisoneunesortakesupless | y Risone ontsoit takes
Thay aretess tke tobe | ¥ Theyre portable They are portable They ate portable
damaged they are nat | / lnternet connection maybe | / Internet connection maybe | Y lnternet connection
portable betcerasdavice using Witt | better as device Is using 4G may be better as
ie tho most powartat ¥ foatertolosaupthe oparaing | devicete using 86
Poets {ype of computers system 1 Weanbe used to make
tis the cheapest typeof Lower power consumaton phone cals
computers therefore batteries astlonger_| ¥ Lower power
Has separatable parts so ¥ Front and back acingcameras | "consumption therefore
leant upgraded andit ae included batteristnet longer
component i faulty it
willbe replaced easly 2
tis notporable * Ewiiertoneai/ote % Eater to tenons 1% Srallzersen ate sok
= Gatteries can runout % teuses toueh seen not ould couse eye stain
* tfonepiece of hardware eyboorathereforecanbe | Small keyboards 20
breaks ean be more harder to use fan cause RS!
iit to repace Batteries cn runout
More likely tobe damaged tess standard ports
asthey ae poraale,
& Iteant be upgraded
# Sereensare smaller
eee’
Hardware
Physieal component that makes the computer
Internal Hardware
por {ecified othe instructions of a computer program. performs base atthmetl caleulationé and otc operates lng ALU
{rthmetiea! Log Uniti performs input ad outaut operations ofthe computer using EU (Control Unit)
Corer) the main pried eet board that contains the man components ofthe computer
pon ‘RAM and ROM (wil be clecusted later =
ACTS I ables the computer to process and dplaygraghics (mages and ideo
eomrrons Tensbles the computer to input, process, and deliver sound
eeanner rs sed to store information ike software and files
Scanned with CamScannerMohamed Mamdouh
Input Devices
+ Keyboard: used to enter characters (type in text or essays)
© Numeric Keypad: used to enter numbers only such as in ATMs
+ Pointing Devices:
= Mouse: Used with desktops
— Touchpad: Used with laptops
= Tracker ball: Used by people with limited motor skils
+ Joystick / Driving Wheel: used to move objects around the screen in computer video games
+ Touch screen: an output device that is also an input device
Scanner: used to scan hard copy images
© Light Pen: Used to select objects on CRT screens. and Drawing on screen
Microphone: used to input sound
© Barcode Reader: used to read barcodes from products at POS
‘Advantages per
Told much more information than normal barcode, ‘More than one QR format is
fewer errors than with baftodes _ | available Ma
fewer errors than with barcodes asit uses mobile camera TTY ar codes can be used to transmit
e987 to transmit GR codes either as text messages or Images malicious codes
+ Cameras: Used to input photographs and moving pictures often pre-recorded
+ Direct Data Entry Devices:
ro rene Contactless card read
fered a
fed Cheapest Expensive Expensive
SeDkecee —FSt Slower Faster
ieee me meee Yes I No a
eer yes | No | Taal ‘No: _if |
Position [At the back of the card | Atthe front of the card_| [Wise the card
| Less secured (uses encryption
Small daly limit
Can take money twice
‘Transactions done without being
aware
Less secured More secured
(No PIN code} (PIN code)
‘© OMR and OCR:
OMR
(Optical Mark Reader)
ie MCA Questions ‘© Convert scanned image to text file which can
Questionnaires _be edited by another software
PERESEIEM % Very fast correction Faster data entry
disadvantag Expensive for printing as the paper must be Very expensive
accurate Not working with handwriting
‘The marks must be fully shaded Not all letters are identified correctly
Radio frequency identification reader (RFID): used to read data from tag from a distance
= How itworks?
41. When the tag passes by the reader, the reader detects it.
2, The reader sends radio waves with energy to activate the chip as itis @ passive.
3, The tag will broadcast the information stored on the chip to the reader through the antenna
Scanned with CamScannerMohamed, MAMARYB.antages:
the tag can be read from a distance 4 Ituses radio waves 50 its easy to jam or interrupt
very robust and reliable technology 4+ Itis easy to hack data transmitted by a tag
Very fast read rate and bulk detection is possible ‘© More expensive than a barcode system |
Bidirectional data transfer ‘+ Tag collsion (two tags interfering with each other)
Output Devices
* CRT Monitor: outputs soft copy where space is not a problem
+ TFT Monitor: Outputs soft copy in small space, it reduces eye strain and uses less power than CRT but itis expensive
+ Projector: outputs slide shows for a large number of people
Speakers: outputs sound
Printers:
Cem
irr low medium | high
Brace high speed medium speed low speed
Quality IN high high y low
ed most
Highest (changing cartridges
frequently)
es ee lowest Expensi
Peers most suitable
Stationery separate sheets separate sheets Continuous sheets
Crd a Jw carbon copies
feces Non-impact Non-Impact Impact
It uses laser to draw the
printout on the drum, then
Cad
The ink droplets will be
rayed directly into the |
toner attract to the drum, “Pre¥
paper through the nozzle of
then toner transfer print
‘ ink cartridge.
image to plain pa
‘+30 Printer: used to print solid objects using resin
= How it works?
‘A digital copy is made of the model using CAO software
Software slices the model into hundreds of layers
A printer that prints by
pressing metal pins against
an ink ribbon onto the paper
2
3. 3D printer creates the model layer by layer
4. Binds them together
Tt Cet
Easier to edit individual objects Can be used forilegal production |
‘© Graph plotter: used to print very large printouts very accurately
Advantages cant
Very high-quality output. Very slow at printing
Able to produce large drawings to a high accuracy _ Expensive equipment o purchase initially
‘Able to print on a varity of materials very large physical footprint compared toa printer
ms
Scanned with CamScannerMohamed Manemory and Backing Storage
RAM vs. ROM
RAM Oy
(Creme eu) (Read Only Me
rl
Store data currently inuse | Store instructions to startup the computer
Larger | Smaller
Ser Volatile Non-volatile
ferent Read and write Read only
‘+ Memory VS Backing Storage?
Backing Storage
rad RAM. ROM. ||_Magnet, Optical, Solid State
Streinsconstostupthe | rods Permanent strate
Store data currently inuse
_ Store data computer ndlrgr storage capacty
Perens Wake ead onlyand smal storage OpSGR/LI Slower Accu Speed
ios Eat
Fixed HO (HOD), Portable HO,
iMieaietiee CD, DVD, Bluray SDCard, Pen dive, 55D |
eng “Less Portable Portable Very Portable
Expensive per GB F:
tesco mage Cheaper rer G8 Very Expensive per 68
rere Very large Small Large
oud
or
es Ne large ‘Medium Smaller, ighter
Fast
Speed {Except magnetic tape asit uses Slow Very Fast access speed
serial access} a =] |
Robust Not Robust
PROM TgE — (butmaybe damaged asithas (Can be scratched and broken Very Robust
moving parts) easily) {
Perentan Laree ‘Medium I Small
“+ HDD vs. SSD:
7. Bigger Smaller, hte
a _ less — More
Pod Moving pants canbe damaged To moving pars, fu
ro tittenose | Silent
Pee Sou [Tver at
ere hie | x
Backup:
Backups an extra copy of important ile stored away from the orginal copy incase of damage or loss of original
‘copy such as (virus or hacker deleting the data, Accidental delete of data or corruption of HD)
+ Cloud Backing Storage
Cloud is large groups of remote networked servers that allow centralised data storage
‘Advantages os
¥_ needs access to the internet to be used x more chance oft being hacked asitis onallthe time
canbe used on different devices _ User loses control on his own data _
7 only pay for what you use Difficult to delete all copies =
automatic backup takes place x Slower download/upload than storage media
Visca Seay x ieee cf storing in the cloud may be expensive in the long
Scanned with CamScannerMohamed Mamdouh
Software
Software is programs and data used for controlling the operation of a computer
eee pratt
ssotwarethathelps he ver fo dois tasks is seftwareneded bythe computer to work rape
amples and uses (Never ue brand mame! txamples and uses:
‘© Word Processing: Used to prepore text ‘+ Operating System: Manages computers functions including
documents. hardware devices (input/output). Also provides users with |
‘© Spreadsheet: Use to create to organise and interface and itoads and runs application software. Such as:
‘manipulate numeric data. ogue based interface, Gesture based interface, GUI and CLI
‘© Database: Database is used to store and organise Compiler: Translate o program (HLt- High Level Language) into
dota using fields and records. ‘9 machine code (code understood by the computer).
© Photo Editing: Used to edit digital mages to Interpreter: some as compiler but it translates the program line
either touch up orto apply various formatting byline
techniques. Linker: Lik mare than one object fle ond combine them into
+ Presentation design: Used for creating single program
presentations. Device driver Allows hardlvare devices to run on the computer
© Applet: small applications that perform a single Including printers, sound, graphics and network cords.
task on a device (they are usually embedded in Utilities: Help to manage and maintain computer resources ond
‘an HTML page on a website and can be performance by running specific tasks
‘executed from within a browser)
‘App: software which con perform a fairly
substontiol task
‘CAD Software: This Is software used ta help in
the creation, manipulation, modification and
analysis ofa drawing/design. t can be used to
jroduce 20 or 3D diagrams
een) eee
Both are interfaces for operating systems and used to control hardware and software
‘The users in diect communication with the The user does not need to learn any commands
computer. ¥ Itis more user-friendly
‘The users not restricted to a umber of pre-
determined options
tis possible to alter computer configuration
settings
‘The user needs to earna number ofcommands. | x It uses up considerably more computer memory
Allommands need to be typed in, which takes than a CU interface
time, x Theuserslimited tothe icons provided on the
ach command must betyped in using the correct | screen
format x Needs a more complex operating system
Gul uses more processing power
Gul uses more memory
Pray
errs
‘© Dialogue Based Interface: Use the human voice to give commands to a computer system.
Advantages: Pes
very useful for people with aisabiities *_stllunvellable with many commands not being recognised |
7 use asa secur feature, because voie recognition |_* canbe quite complex to set up |
could be used to identify person user needs to know which commands can be sed
‘Gesture Based Interface: Gesture recognition allows humans to interface with a computer in a more natural
fashion without the need for any mechanical devices
replaces mechanical input devices possible for unintentional movement tobe picked up
no physical contact required only works fairy near to the camera or sensor
no training needed to interface with the computer ‘may only accept a imited number of movements
Scanned with CamScannerMohamed Mamdouh
“> Software Copyrights:
Software copyright is a lawful protection given to authors and publishers to protect their software.
+ How to break (breach) copyrights??1
— Sellcopies or give them without owner permission
= Software piracy: making illegal copies of software.
= Use code from the copyrighted software without owner pe
Use the name of copyrighted software.
— Buy pirated software.
+ Howto protect copyrights?’
= When software is being installed, the user may be asked to key ina unique reference number or
product key
= Some software will only run ifthe CD, DVD or memory stick is actually in the drive
= Some software will only run if a dongle is plugged into one of the USB ports
= Users are asked to read a license agreement and tick “I agree”
ion,
Scanned with CamScannerMohamed Mamdouh Unit 2
Network Types
+ Types of LAN:
Type of connection —_ [ae
Tripping over cables Yes
cre More dificult.
Sener eee) Higher
Pernod More difficult
Can connect mobiles
Allows portability during use
‘+ Types of Radio waves:
Easier
__tower
Easier i
E Wider | Smaller
Higher |__tower |
More aa
range
eer]
oe eae iz
Pe nen tte eer cs)
cn
ees
i
¢ How to connect/send to device using Bluetooth?!
1. Your device automatically detects nearby devices
2. Your device pairs to the other device ifin range
3. Your device send data to its Bluetooth connector
4, Datais converted to radio waves and send to the receiver
Encryption using password
| consumes more energy _ More ff
Make networks | Transfer data
“> LAN vs. WAN:
eo nes
Dad P Private | Public
Read imited Unlimited
fore Close toeach other __ Far away from each other
* Intranet vs. Internet:
Internet
= Bothare networks
+ Both are communication systems such as emails
‘= Both are information systems = -
[ened
Similarities
oe ~ Public Private
{using world wide web) (within single organization)
"Moderated |
Not moderated can post anything
foes)
Et igh ik of hacking and downloading vruses_|__Lowerriskof hacking and downloading vinses
coe Many resources iy Less resources a]
for “tess reliable More reliable
cheaper to acess andsetup __ More expensive to setup, acess and malntain
Takes lesstime to setup = Time consuming tosetup—__
More features such as online chat, Internet | Less features such as creating extranet (part of
phony, online conference, Online Gaming, intranet that can be accessed by authored ouside
Email oA users), Internal ile transfer, send and receive emails
rd
Time
oe
Scanned with CamScannerMohamed Mamdouh Unit 2
Network Requirements
“+ Hardware:
+ Network interface Card: Placed inside the computer tobe able to connect to any network device, stores the MAC
address ofthe device n the network
‘Bridge: network device connects one LAN (or device) to another with the same protocol.
+ Hub: network device sends the data packet from a computer to all devices connected to it
© Switch: A device that connects a number of other devices and sends data to one specific device only in the
same LAN using MAC addresses.
+ Data packets: any data being transmitted over a network. It contains (IP address of both sender and
receiver, part of the message, number of each packer, total number of packets)
‘© Router: network device connects a LAN to the internet, sends the data through the fastest route available. It uses
and stores IP addresses of all connected devices inthe routing table.
+ How the data from a routers routed?
1. Datais sent in data packets to sender’s computer's router.
2. Each data packet contains an IP address and MAC address ofthe destination router.
3. Data packet is sent to the router with the IP address,
44, When its artved to destination router, Datais sett the destination computer using MAC address
5. The router uses the IP address to work out the best route available.
+ IPaddress vs. MAC address:
ee
IRidentifes computer on the network | Itis unique hardware identifier
use
roa yes. | No
cred 1sP Manufacturer
FEEEIN — Snumbersseparated by dots | 6 pairs of hexadecimal
+ Software:
‘+ Internet browser: Software used to view and open websites. It uses URL (Uniform resource locater) to access the
website,
+ URL components eg. WWW.Google.COM.£G/videos/chapter.mp4:
1. Protocol: set of rules agreed by sender and recipients when data is transferred between devices.
HTTP (Hyper Text transfer Protocol) Eunene
“Transfers the content of awebpage intoabrowserfor | Fllesare transferred from one device to
| viewing_ S
racic) at Webserver |
‘Small files
con
2. WWW (World wide web}: interlinked HTML pages that can be accessed over the Internet,
om CN
itisa worldwide collection of, ‘WWW uses the internat to access information from web servers using web |
interconnected networks and devices _ browsers th ii |
Uses Internet Protocol (IP) ses hts) protocols to send hypertext markup language (HTML) documents
allows online chatting (via text, audio 1,3 collection of mulkimedia web pages and other Information on websites |
and video) _ a
3. Domain Name (Google): unique name identify website
4, Domain Type (.com):it identifies the type of website
5. File path (/videos): where datais stored in the web server
6, File Name. File format (Chapter.mp4)
‘Search Engine: website used to search for information on other websites. Disadvantages of search engine:
Information overload, May be more irrelevant information, Search engines may not include all web pages and
Search engine company may be paid to display certain web pages
Definition
Corr
i
Scanned with CamScannerv
v
v
Mohamed Mamdouh Unit 2
Internet Service Provider (ISP)
‘A company that provides Internet access to customers (to access the internet an ISP subscription is needed. It
provides IP address, Router, space on cloud to store files domain name and space ona server to create website
Network Gains
°
Communication:
‘+ Email: sending softcopy messages to computer using computers (tablets, laptops and smartphones)
‘* Internet telephony / VOIP (Voice Over Internet Protocol): A service that enables people to use the Internet as.
the transmission medium for telephone cals
‘© Video Conference: Its the use of internet to allow people in two or more locations to communicate using video
and audio streaming, Disadvantages compared with other methods of conference: It need expensive hardware and
there may be lag and lip sync due to internet problems. The connection may not be stable.
* Audio Conference: same as video-conference but people can only hear each other and its one over
telephone network. Advantages compared to video conference: more stable connection and cheaper to
setup. Disadvantages compared to other conference methods: can't see each other.
‘Web Conference: Its conducted online. Participants tend to be sat at computers and can view the same
screen, It tend to be interactive. Organizer allows participants to clicka link to ask questions .participants
are then queued. Itis possible to draw or write on a ‘whiteboard’ using keyboard and mouse
Online Conference vs. face to face mee
time and cost of travel
‘suitable for disabled people + _ high risk of misunderstanding
‘Y_meetings can be held at shortnotice | __* Can'tsigndocuments
+ Accessing Website:
‘© Blog: A personal internet journal, where the Owner post and others comment and it takes the form of discussion. It
sorted in chronological order (from recent to oldest)
‘Wiki: website that allows a group of people to edit the content ofeach other which used to post information,
«Forum: Website where posts are related to a specific issue
‘+ Moderated: posts are controlled by admin, ithas rules and policy and those that break the rules are banned
* Unmoderated: Do not have an administrator, Posts are not controlled. People write what they want.
‘+ Social Networking: Dedicated website & app. It interacts with other users and can be used tofind people with
similar interests. They enable people to share photos and videos. Members are given free instant
‘messaging, video chatting and can create pages.
‘* Researching for information:
Cer or
tages
Many Resources 2 _Itis too easy tobe distracted when searching onthe internet
Data tends to be up to date x The internet is not regulated so it may be unteliable
internet has limitless amounts of information * _ Information on the internet is not organised
ch engine is fastand easy x
How) ‘to check reliability ofinformation o on, nthe internet?
‘Make sure the same information is found on more than one website
Make sure the author is well qualified on the topic
Make sure the website is updated recently
I the website is sponsored by a well-known organization itis more reliable
I the website is reputable and well known source of information its reliable
‘The end of the URL indicates the type ofthe website (.edu is more reliable than com)
Avoid websites with excessive advertisements
Scanned with CamScannerMohamed Mamdouh
Hacking: Gaining unauthorised accessto8
computer sytem
Virus: A vires is 3 piece of sofware code that
Infects «computer and has the ability to
tepleate tsallSuch as worms, adware,
‘Phishing This i 2scarinvoling email that
ooking ike a legitimate email. tis sent
containing link the user clicks the nk and is
Sent toa website where personal details are
asked oe
‘Smishing:Atoxt message EMS]
tecewed/sent contains lnk hen user taps
link and ase for personal information
isting: This uses a voicemail message 13
{rik the user into calling the telephone
‘number contained in the message.
‘Pharming: viru sent contating
‘malicious code when the user types nthe
LURL (ofthe bank) airects 9 user 9
fraudulent website As the user enters the
tals they are coped to crimina's website
‘SPAM: Clectronic lnk email tht
Unsolicited messages sent in bulk by email
and can consist of unwanted adverts
‘Spyware (key-ogsing SW): Records every
keystroke on he keyboard
Saves it ina lo ean ans the fg ie
back to the hackers
Interception during transler: Confidential
data could be intercepted by hackers while
being transferred over the internet.
+ ata can be deleted
+ Data canbe changed and
corrupted
1» Canteadto he misuse of
persona data
Hard dish could be fed up
‘The computer I performing
routine tasks 3 ot more slowly
Software doesn't work propery
4+ takes persona nfo
How to detect?
urges you fors quik reply
+ several grammar mistakes
takes persona info
+ GainPersonal data
2 Tisiseanlead to aud or
idonty thet
= Takes time to deal witht
CCanslow down networks
Can up the receivers mai box
and that fl up hard disk
= Canreada password being typed
+ Takes confdentat data
unit 2
Network Risks
‘Use of firewalls software sts between the comauter andthe router to fer
cata,
Encryption: encoding data so that only authorized people who have the key
‘can decoded data, 1'changes the data into a form thats not understandable.
“Authentication: sa technique to verity thatthe person who's accessing the
{sts on a computer fan authorized user
Insta an uptodate ant-veus
‘Scan the per-drive a5 i inserted into his computer
‘Be not download media ram an unknown source without scanning R
‘Don't open or download attachments form unknewn Senders without scanning
theres
‘Do net reply to emai that asks for confidential data
Report any suspicious att,
Must have dial erticate
(title of securty to verfy he emai comes from a known and trusted
source contains: exity dte, ders of the owner and sera number)
Report any smashing ater
"Never give your personal details over the mebile phone
"Never eck on links n text messages trom unexpected pecple
‘Block any unknown umber
[Never give your personal details over the mobile phone
Use an uptodate ant yore and ant ius to remove pharming code
(Check sites carefully before a inks clicked
‘Donot reply to spam emails
Urea spam emai titer
Block unknown senders
DDonot sgn upto commercial malig sts
soup to te anti-spyware software
Use on sreen keyboard when entering password
‘URL sare with HTTPS Hyper Text Transfer Protocol Secured (t means that its
‘secured using SS. (Secure socket layer which Security techoolgy that
‘encrypts dats between the server and the cent to make sur al ata
private)
Scanned with CamScannerMohamed Mamdouh
Unit 2
Some Important Questions & comparisons
‘+ Compare between different authentication techniques:
ee)
‘Time taken for adding the data
Price’
orig
Can be forgotten?
ener
enna
eT)
| raster
Cheaper | Moree
Yes
Yes
Yes
No
oT
1 | Slower |
Tae expense |
we |
=i
ves |
“* Discuss the advantages and disadvantages of different biometrics techniques:
‘non-intrusive method
ray
i «elatively inexpensive technology
* tis affected by changes in lighting or age
very high accuracy
iVsane the most developed techniques itis very intrusive
very easy touse 2X itcan make mistakes
+ smal storage requirements
ce | worinrusive X high errr rate
¥_ relatively low-cost technology is
ates very high accuracy Tis very intrusive
+ dificult to replicate ‘elatively iow and expensive
v
¥
¥
Read very fast and relatively inexpensive
using tokens.
fee
1L. The customer inserts their debit card into the top of the
token device (first authentication step) and the device
either recognises the card or rejects it.
2. Aone-time password is then shown on the device sereen
3. The customer now goes back to thoir bank web page and
Explain what is meant by two factor authentication:
a one-time pass code is sent back to her either in an email or as a text message to her mobile phone directly or by
% a person's voice can be easly recorded
low accuracy
ER
Software installed ona users device, such asa smartphone...
‘When the website requests the user to authenticate who they
are, the user opens the app on thei smartphone. The app.
{generates a one-time password (OTP) whichis valid for less
than a minute.
enters the OTP
4. They are now given access to thelr account.
‘+ Advantages and disadvantages of policing the internet?
Helps to prevent legal materi from Beng shown
Help to prevent pomcgraphy
Helps to prevent discussion groups that inte hatred and racim
Ensure copyright aus are enforced
Freedom of speech is restricted
‘Very difficult to enforce asthe internet spans cont
Unsuitable material is easly avallable in other ways
Very expensive torintain
+ What is meant by DPA (Data protection Act) and how to apply?!
DPAs are laws that protect the rights of individual about whom personal data (It is any data concerning a living person who
can identified by this data such as: Name, Address, Date of birth, banking detaits) is obtained, stored and processed.
* Do not keep data longer than required
+ Domotcallect data thats not required
* Donot pass on the data without the owner's permission
= Only certain employees can view the data and handle it
= Keep the data safe and secure (encryption, firewall, password)
‘= Only use the data for the reasons given to the owner
Keep the data up to data.
Scanned with CamScannerMohamed Mamdouh Unit 2
“+ What is meant by E-safety and how to apply?
Keep personal data safe so that others cannot use it against us (such as Blackmail, spreading rumors and identity theft) and
itallows freedom of speech. It helps to make people more responsible as they use netiquette.
Cees Cet
Never send people photos of yourself + Only open emails from known sources.
Always maintain your privacy settings on + Onlyemail people youknow
* Only use websites recommended by teachers + Never use personal details in emails.
* Use appropriate search conditions when using search | * Never include school's name or photos of students wearing school
aa sews chad
Docker eer anon ne acs MR =a ae tore we pee Fos el a]
iene nd emer core cE ae caioamesmee ais
Never arrange to meet anyone alone
Avoid misuse of image.
‘Always use appropriate language.
How anti-virus works?
1. The anti-virus scan programs or files before run
This done by comparing files against database of Known viruses.
3, Ifafileis infected, two options appear: Delete file OR Quarantine file
4, If quarantine file is chosen:
— The anti-virus isolates the infected file so the virus can’t replicate itself to other files
= Cleans the file
= Check that file to see if ts safe to open.
Scanned with CamScannerMohamed Mamdouh Unit 3
Banking
+ Steps of Cash withdraw, deposit and checking balance:
«Enter Card
ee + Enter Language
+_Enter PIN code
+ Check that cards not expired (by comparing today’ date with expiry date)
ag + Check that pin code enteredis identical tothe one stored on the card
Check thatthe cardis not reported stolen
CheekBalance | Cash withraw ‘Cash Deposit Cheque Deposit.
Master file is ‘+ Customer enters amount of money Customer enters, ©The customer
searched to find required amount of moneyto inserts the
the account Master file is searched to find the bbe deposited cheaue.
umber account number + Master fileis + OCR device will
Corresponding Customer's account is checked to searched tofind the | read the
balance isread see ift has sufficient funds secount number cheque details
from master file Make sure thatthe amount within |* Customerinsertsthe | including the
Balance is the dally limit cash amount of
displayed Ifthe amount of money is available + Cashiscounted money
and does not exceed the daiylimit + Themasterfileis | + Theamount
the transaction is authorized Updated by appears on the
The master file is updated by inereasing the screen and the
decreasing the account balance of account balance of customer
the customer the customer confirmsthe
amount.
Receipts
printed
+ card's
returned __|
Soy
‘© Receipts printed Receipts printed + Receiptis printed
© Cordis returned Card isreturned + Cardisretumed
Cry
ia Cash is output
+ Advantages and disadvantages of using ATMs
TT eT
ATMs are more widelyavalable than bank branches | *__Notallservces are avalible in ATM =
ATW are avallable when banks arecosed | * Theresa cal limit on amount of cash withdrawn frm ATM.
ATMS offer choice of language (useuliftraeling] | Some banks charge customers for using ATMS =|
~¥Canuse ATM of any bank to witharaw cash [a Cash withdrawal iit are often impose
& Clearing of bank cheques:
1. The cheques is verified by Make sure it snot fake using MICR and itis signed
2. Information from bank cheaves is collected such as amount, due date, payer account number, receiver account
number, cheque serial number, bank sort code
When due date come:
1. The bank makes sure that the amount of money is avallable inthe payer's account
2. Dectease the balance of the payer's account in the master File
33. Increase the balance ofthe recipient’ account inthe master
44. Send bank statements to both customers
Phone Banking:
Pern
The customer calls the bank's phone number
The customer key in thee acount numbor |
git PIN o elected numbers from the PIN orusing twin factor authentication
actions | _Thecustomer wil then see various option for transactions
thecore | “The customer chooses one ofthe options by choosing the correct
= = ‘option.
Modelling
Jenerated model ofa real system in order to study the behavior of the
‘Online Banking
~The customer access the bank’s website
They are then requested to enter a four.
The customer will then hear various options for tr
“The customer chooses one ofthe options by pressing
key or by speaking the number.
{A simulation is the creation of a computer-8
system and itis based on mathematical representations.
re
rE
7 Nlows you to try out various diferent scenarios in advance | x there wil always bea diference between the results from
"and ess expensive to build the real thing. ‘modelling and realty andit is very costly
7 itis safer and faster to use a computer model = =
Scanned with CamScannerMohamed Mamdouh Unit 3
Control System
Store Preset Value
Receive Compare Takes action
How control system works?
1. Sensor: will continuously measure the physical variables, reads only analogue data
2. ADC: Analogue to Digital Converter (converts data read by the sensor to be understood by microprocessor).
3. The role of microprocessor in control system:
‘+ It stores the required preset value
‘+ Microprocessor receives the data from the sensor
‘* Itcompares the received readings with preset value
‘¢ It sends signal with action to control u
> ifrecelved readings are greater than preset value
+f recelved readings are lower than preset value
'* This process is continuous
4. Control Unit: performs the action
+ Types of sensors and Control Unit:
| Temperature: used to measure temperature [ight bulb/LED: source of ight
| Pressure: used to measure pressure or weight Heater/eoollng uit: controls the temperature
| Light: used to measure intensity of ight/indiation 6f movement | Alarm/Suzzer:erestes sound
| pi: used to measure pH | Motor: controls movement of ob
‘Advantages and disadvantages of microprocessor controlled devices:
‘Advantages CIT
‘More lesure time and more time to work so they can increase thelr income (Can ead to lazines
‘More secure lifestyle (due to presence of automatic alarms) Lack of fitness/exercise
‘Can leave home while household tasks are_being done by equipment [Manual household skills are lost
Can control the devices remotely using WiFi: ] Can lead to unhealthy eating due
Voice control can be used to activate the devices so good for disabled | to dependency on ready meals
people ifestyle becomes more expensive
‘Wireless 50 no tripping over wires
Home surveillance from afar
Leads to laziness as voice control used
‘Other people can hack devices
Can be affected by walls and distance
wR SS
Measurement System
‘Measurement system is the monitoring/recording of physical variables without the microprocessor taking action
Control System is when the microprocessor takes action depending on sensor readings
Store data forlater use
‘Make Graphs
Make Prediction
“+ Advantages and disadvantages of robots/measurement system:
Ce EE
¥__Canwork in dangerous conditions where humans can’t work | x High inital cost
"7_Itcan work 24/7 without taking breaks oF sh %_ Maintenance cost is more expensive as staff needed
More accurate readings 2X _ Requires backup systems, which are expensive
Higher productivity x They replace skilled workers, leading to de-skiling
‘More consistent readings and outputs Workers nsive
¥ Cheaper in the long run as no salaries needed * Ifsomething goes wrong, it may be difficult to find the
‘error
Scanned with CamScannerMohamed Mamdouh Unit 3
Health and Safety
Health issues: problems due to long use of computers.
Cor) Caused by How to protect?
Staring at computer screens fora long '¢ Use anti-glare screen filter
time ad ae ¢ Take regular breaks
Sitting in a wrong position in front of the Sit in an upright position - Take regular
computer fora longtime breaks or use ergonomic chair
‘© Sitting on an adjustable chair
Take regular breaks
Long use of mouse (pain in wrist) Use wrist rest or Take regular breaks
Use ergonomic keyboard or Take
regular breaks
DoE
cron
cerry Looking up or down at the screen.
eee
PES PEECRGROMEE Long use of keyboard (pain in wrist)
¢ Safety Issues: problems due to an accident.
Por
“ripping over cables Keep wires in underground ducts
Risk of electric shock _ Keep wires well insulated and Avoid drinks in presence of computers
Riskoffire | Don't overload sockets and Avoid overheating of equipment
People trapped in emergencies | Keep computers in a U-shape and wellspaced to enable easy exit
Heavy equipment falling | put equipment atthe centr of the table oron ground
ANPR
1. Asensor detects a vehicle then It sends a signal to the processor to instruct the camera to capture an image for the
2. Aprogramis used to isolate the number plate from the image and adjust the brightness and contrast of image
3, Each character is recognized using OCR then itis stored in the database
Online Booking
“Steps of online booking
Caen ne rn nnn eer cmnnreetiocecihe |3) theses hnbel tga hace
as |?" Rettonyeftcregued Boling "| reser (otra frcosrmaton
A) Trccezorerantmsbyenteing—]1 Te csone cosy nee
seseacapnennetho | poral detalsandpoynenntnd | 6). Payment metas sent tothe user
Soa | SSacres :
Rae pment ae
71 Greco ented ee eocrl|) ea ee
the master file ee
“Advantages and disadvantages of online booking:
‘Advantages Pee
Prevents double booking —_ Setting up is expensive =
Bookings can be made 24/7 Booking mistakes ean be more easily made
Saves cout of traveling to the Booking ace the system crashes during the booking the booking may not be made
Saves time as no néed to travel tothe booking office Internet accessis needed to run the booking system therefore the cost may
“Usually cheaper as lower overheads be increased 7 Z
Retail Applications
+ Steps of automatic reorder system:
1. The barcode is scanned by the barcode reader (or typed in manually)
2. The products table is searched to find this barcode
3. When found:
‘+The corresponding number in stock s decreased by the amount sold
‘+ Number in stock is compared with reorder level
44, number in stock s less than reorder level then reorder s necessary:
‘©The reorder quantity corresponding to the products read
Scanned with CamScannerCommunication media refers to a method of delivering and receiving data/information using telecommuni
Mohamed Mamdouh Unit 3
‘+ The supplier ID corresponding to the product is read then searched by it in supplier's table
+ The corresponding contact details are used to contact the supplier.
Steps of EFTPOS (Electronic Fund Transfer Point of Sale):
‘The seller's bank’s computer contacts the customer's bank's computer
The card is checked ifit is valid(Not expired, PIN code entered is identical to stored PIN on chip and not reported
stolen)
3. The seller enters the amount (if using contactless card, then The reader checks the amount to pay is less than the
‘contactless limit)
4, ifnot valid or not enough money the transaction is terminated, If valid and enough money the transaction
continues
5, The price of the purchase is deducted from the customer's account
Transferred to the seller's account
7. Receipts sent to the printer
Media communication systems
+ How its used in satellite television and satellite phones?
1, Signals are beamed to satellite from a satellite dish on earth via radio waves.
‘The signals are delivered by carrier waves which consist of radio waves. Each signal has its own frequency and
bandwidth
3. Once the data reaches the satellite, it boosts the signal before ending it back to earth,
Signals then resent to earth
The satellite dish receives the signal
+ Advantages and disadvantages of media communication system:
eT
advantages:
[¥_They have good global coverage ____ | There is atime delay in receipt of the signals
‘¥_They are cheaper, faster and safer than laying cables |The signals received can be affected by bad weather
‘7 Satelite receivers on the ground can be portable. |x TSunspot activity ean affect the performance ofa satelite
v
Secunty in satellite transmission is very good due tothe fact =
that datas coded and the receiver requires decoding
equipment to read the data, i
If they are not ina fixed position relative tothe Earth then
they need to be monitored and controlled on a regular basis
Navigation (how the satnav works?)
1, Destination is input by driver then Exact position of moter vehicle is continually calculated using GPS
+ using dota transmitted from 3/4 soelites,Soteltes transmit rodio signals tothe Earth
+ Software in the smart watch interpret the signals to locate its position
2, The Satellite navigation system contains pre-stored road maps
3. The car's pos displayed on the map and the route displayed
4, Algorithm calculates the route from current car's position to destination makes allowances for traffic jams
s.
6
Car system receives regular updates of traffic conditions using GIS
Calculates the journey time using satellite navigation system and outputs the journey time and the directions.
“Advantages and disadvantages of GIS:
‘the handling and exploration of huge amounts of data GiS software is very expensive
allows data to be integrated from a wide range of very
different sources
Wallows geographical and thematic data ofany Kind to be
‘combined in a way which shows how they are connected to each
other.
+ Advantages and disadvantages of GPS:
ee
[ieremoves errors and can give useful information.
‘The system can estimate the time of arrival.
IRis also possible to program in the fastest route
GIS requires enormous amounts of data to be input (thus
increasing the chances of error). |
tis difficult to make GIS programs which are both fast and user-
friendly
CT
‘they can give incorrect instructions if not up to date
Loss of satelite signals can eause problems
Han incorrect data in the system will give incorrect information
ae
Scanned with CamScannerMohamed Mamdouh Unit 3
Emerging Technology and Robotics
VR (Virtual Reality) system: A computer-generated simulation uses a three-dimensional environment that can be
interacted within a real or physical way. The equipment is fitted with sensors
‘Input devices used: Cameras, Motion sensors, Joystick/driving wheel
+ Output devices used: Data goggles, speakers
+ Uses: Virtual museums, Flight simulation, Medical training and Driving simulation.
+ Augmented Reality: allow the user to experience the relationship between digital (virtual) and physical (real)
worlds, virtual information and objects are overlaid onto real-world situations
‘+ Artificial intelligence (Al): The use of a computer to perform tasks that mimic or duplicate the functions of the
human brain, tis a technology by which a program updates itself automatically through learning from its own
experience.
COT oe
7 roboaynot ure shun through aclonoriacten [= —eaugleadto mary obloses ina numberof aes
robots must obey are gen byhumanewihoutquesion |" _{2B2derey nteehrlogyan th abi tocar out tasks
Y _arobot must protect itself ~__|* toss of skills
+ Drones unmanned (allots / remote contralid yng devices,
‘Advantages: Less expensive, can be flown closer to the land, Lse ek tolif as ther iso ghterew and
has smal ste so itean go where people cant
+ Disadvantages: May go out of rang, Les responsive, Slower to react and ean lose the signal due to the
electra charges inthe storms.
Some Important Questions
“+ Advantages and disadvantages of online vs. physical scenario:
Customers advantages
saves time of travelling and waiting in queues
Save costof transportation
available 24 hrs
suitable for physically disabled people
Can be used from any location
Organization advantages
‘Customers disadvantages
‘isk of hacking and defraud
‘needs Internet connection & creditcard
(Mistakes can be easily made
[Mistakes are more difficult to rectify due to the speed of
‘operation
sss
Cees
‘saves coston rent (fewer branches) % High intial cost 1o make secure website
Y saves cost of salaries (fewer employees) Expensive maintenance cost
wider range of customers (disabled /far-amay) X Need toretrain the employees soit is expensive
Yess isk of physical robbery x
The company can better target customers
“= Advantages and disadvantages of autonomous vehicle:
‘Advantages: Disadvantages
¥ 9 Safar beeaulen evr Tersved, eadieg19fewer | _veryexpenive system to satu inthe Fst place
‘Y Better for the environment beeause vehicles wil operate The ever-present fear of hacking into the vehicle's control
mote efficiently _ _ system _ —
= Security and safety issues oftware glitches could be
Y Reduced traffic congestion eee
‘7 Reduced travel times Driver and passenger reluctance ofthe new technology
‘7 Suess-tree parking for motorists = Reduction inthe need for taxis could lead to unemployment
¢ Advantages and disadvantages of Rail and airline network control systems:
ree Pes
i Ahacker could gain access tothe computerised system and
¥ Smart motorways constantly adapt to traffic canitions anion al]
Poorly designed systems could compromise safety
If the computer system falls then the whole transport system
‘could be brought toa standstil
2 ANPR systems mean that innocent poople’s movements can
easily be tracked,
Read from notes School system and Medicine
“7 Trasportsysteme are more efiient
Traffic offences can be automatically penalised using ANPR.
“7 Computerised control systems minimise human eror, which |
reduces the rate of accidents
Scanned with CamScannerMohamed Mamdouh Unit 4
Analysis
Importance of analysis
‘© Important to meet the needs of the user
+ More efficient system is produced that does what the users require
‘identify problems with the system to avold them inthe new system
«identify user and information requirements (needed to solve the identified problems) to fulfill them in the new
system
Methods of analysis:
Cor] POTETT vantages
Interview 7 Allows moredetaled answerstobe given | Time consuming tcomplete all the interviews
employers, rather than questionnaires = Notanonymous
managers ¥ The questions can be expanded or modified * Both the members and the interviewer have to
Ke Questions can be explained | be free at the same time:
| can see body language _* Expensive due to analyst's time
Questionnaire 7 Fasterto compete al questionnaires than Tend not tobe popular with users
employees sing interviews Tooitexible cannot ask follow up questions
V Cheaper toproduce questionnairesthan | _Asit's anonymous people may nt take I
pay/employ an interviewer seriously
¥ Indiidats can remain anonymous therefore Cannot expand on thei answerslimited in thee
they are more truthful responses
Mote people can answer the questionnaire
than canbe interviewed
Analysis the results canbe quicker with
questionnaires Ac |
Observation) | 7 Reliable data [Fos pepe doe or canoe o
% Better eveal view of the whole sytem/all dont workas usual while being watched
the Inputs and outputs ofthe system |
Y Better overall view of the whole system/all
L _|___ the inputs and outputs of the system | os :
Examining = Information can be obtained which isnot | Time consuming to go through the documents
le using other methods, % Expensive method as the analyst will have to
documents of the
spend time going through documents.
“existing system _
Design and development
* Database File Structure:
Design field names, field types, field sizes, primary key and validation checks
Input methods (Input Screen and data capture form|
Perrenoa
Input Seren
Text:
‘© Text must be easily expressed
‘+ Font must have appropriate size, style and colour
Boxes:
Box must fit to the data ‘© Box must ft to the data
Choose appropriate box type (Text box, Drop down ‘+ Choose appropriate box type (Text box and check
menu, Radio button and check box) box)
‘Navigation Button to ease data entry ‘No navigation buttons J
General:
Consistent layout
* Good Colour Scheme
+ Well Use of white space_ __
Boxi
* Processing: must design calculations and comparisons
+ Output Methods: must design output screen and report layout.
Scanned with CamScannerMohamed Mamdouh Testing
+ Explain how to test a system?
+ Unit Test tests the operation of each module
+ Modules are tested separately
+ Modif testing tests the relationships between each module
+ Module testing tests the data passing into and out ofthe modules
+ Easier to find errors in madule testing
+ System Test: Whole system testingiscaried out after module testing, Whole system tess the combined
modules. checks thatthe system works as itis supposed To match the user requirements.
Test data:
‘+ Normal Test Data: data within the range of acceptability and its of the correct type
‘© Abnormal Test Data: Data that is outside the boundaries of acceptability or it is ofthe wrong type
‘© Extreme Test Data: Data that ison the boundary of acceptability
‘© Live Test Data: Data which has been used with the current system and the results are known,
Implementation
ry ‘Advantages Earn
oTrabercs eine
See RerrIrMm © Teor Ln nest fay tal be
persreetroniemeenrgm “Cost bet
% More expensive as each part needs to
be evaluated befare moving on
More time consuming as each part
needs to be evaluated before moving.
DCC CENRSEEM “ithe current partfailsthennot |
ere nr all the system is ost
the system fails then only
branch is affected
Pilot running: Whole system is CCheaperas trainings carried | * More time consuming as the
implemented in one branch at atime branch by branch changeover fs spread out
Less time consuming as training
carried out branch by branch
lew aya new system fails, old system
pian canbe used asa backup 2X High cost of cunning two systems.
Laird ashae AG hon Possible to gradually train staff
Documentation
Cera
For the user to help him: For another programmer to help im:
+ interact with the system ‘© fixthe system incase of any
‘+ deal with any simple problems faced while ‘malfunction
using the system Update the system if more
functionality is needed
or ‘= sample runs/glossary of terms ‘© program flowcharts
‘= how touse the system + file structures
‘© error messages ‘© program coding/algorithm
= frequently asked questions + list ofvariables
= trouble-shooting guide validation routines
erred ‘+ software and hardware requirements,
Perens purpose of the system
+ limitations of the system
input and Output formats
40
Scanned with CamScannerMohamed Mamdouh Evaluation
+ Why?
To make sure users are satisfied with the system;
How?
Interviews and questior
© Comparing the system with the original requirements,
Expert System
make sure the system: does its jab, is easy to use and has no problems
snnaires with the users to collect thelr opinions and responses after using the system
“ Use of Expert system:
Mineral prospecting, Car engine fault diagnosis, Medical diagnosis, Chess games.
“ Components of the expert system
USE
Knowledge i_,
Base
Create
«> How to us
1. Questions about the (.
2. These answers are taken by rules base to make conclusions
3. Conclusions taken by inference engine to search in the knowledge base to find matching records
4,
‘The matching records will be output to the user on the output screen
_) are asked by the system, answers to these questions are entered by the user.
How to create an expert system?
1. Collect information from experts by interviews
2. Design and create knowledge base to contain the information collected
3. Design and ereate inference engine to search for records in the knowledge base
‘4, Design and create rules base to make conclusions about the inputs
5.
Design and create input and output screens for the user to interact with the system
Scanned with CamScannerMohamed Mamdouh
Practical in Theory
Access
“» Database Terminology:
Pema
‘Atable that contains all
‘Arrow contal
formation about all data.
allinformation about one person
‘A column containing one particular informa
tion forall people.
xmation for all people and can’t be empty.
fields in different tables
| ~ A column containing unique infor Bs
Tris only present in relational database and act as link between.
ry Pree
Pee
‘Types:
Coovaiars
How to make data base?!
Open database
Create new table of —— data
Create new table of data
Import the data from the ——-
Select primary and foreign keys
from the ——
‘Set up the relationship
~ Flat File Vs. Relational Database:
Can contain letters, numbers, symbols, etc.
Contains only numbers and must be used in calculat
‘© Integer: Number doesn’t contain decimal
Decimal: Number contains decimal
+ Currency: Money _
Date in any format
Only two possible options
Import the data for the ~~ from the ~--~ records
boards
Link the two database tables using a primary and a foreign key
Ceo ee
‘Add/Edit Data Easier ‘More Complex
Setup ‘More Complex Easier
Time fo setup ‘More time Less time
“Understand More Complex Easier |
Price | Expensive Checp__
Sorting More Complex | __Easier
Filter ___ More Complex Easier
Duplication No Yes
Update _ Easy More Complex _
Security I Better Lower (No)
Processing Power More less
++ How to make sure data entered is correct??!
Sar Verification Seen
| incorrect logieal entries
‘Computer
Pend
Pari
+ Types of Verification methods:
Double Data Entry:
Typing errors
Errors in data source | -
‘Man or Computer
| Spelling and grammar mistakes
Computer a
User enters data twice and computer compares the two entries to make sure they are identical.
Visual Check:
User visually compares data entered with data source to make sure they are identical.
na
Scanned with CamScannerSA
heck
Mohamed Mamdouh
Validation Types:
Pen
‘Make sure numbers entered are within specific i
Data Type: Numeric, Date
‘Make sure the exact correct number of ch: ers have eae
Tenath ci ‘of characters have been entered
ee anna Data Type: ALL _
Format check: | Make sure letters, numbers, specific: ‘symbols are in their specified position a
comet cr DataType:Text, Date se
Lookup check: ‘Make sure data entered is one of the specified ‘options 7 — -
meme oatatypertet
| Make sure the field is not left blank a a a 7 = as
Presence Check: |
[saree seer HT
Certain calculation performed on the numbers ofa barcode and the result must be equal othe
Check digit: check digit *
Data Type: Barcode
[rvee check | Deere mst be feet toe
Database VS. Paperwork:
_| Data type: ALL
ad
ero) Faster | Slower
res Ensier | More Complex
Peat) Easier | More complex
STU OEMEE More secured | Less secured
ee ue Yes | |
re Yes No
loree More Expensive | Cheaper _ |
CEM Yes (in Mail Merge)| No
Excel
> Excel Functions:
+ =Vlookup (C9, $A$2:$B$4, 2, False):
1.
2.
Take the value in cell (Lookup Value)
(Table Array)
3. when found retum the corresponding value in column (Column index number)
+ =Xlookup (C9, SAS2:SAS4, SB$2:$BS4, 2, False)
1
2.
Take the value in cell (Lookup Value)
search foritin (lookup Array)
3._when found retum the corresponding value in column (Return array)
1
IF( B2>=50, “Pass”, “Fail”)
If cell B2is greater than or equal 50
2. Display Pass
3. Otherwise display Fail
COUNTIF (SB$2:SBS7, “Liverpoo!”):
1. Count in cells 82 to B7
2. the cells that contain a value of Liverpool
‘SUMIF (SB$2:SBS7, “Liverpool”, $C$2:SC$7);
1. Go to cells B2 to B7
2
search for items similar to Liverpool
3. when found add the corresponding values in cells C2 to C7
Scanned with CamScannerMohamed Mamdouh Practical in Theory
*» How it works?
+ How to Filter?
4. Highlight the required column
2. Select filter
3. Select number fiter (or text fer)
4, untick all the cells that are not needed
+ How to freeze?
1. Highlight/select the required row / column
2. Select freeze rows
+ How to sort?
1, Highlight the required table
2. Click on sort
3. Click sort by the required column
4, Click on ascending order
+ How to protect table?
1. Select the whole sheet
2. Right click then Format cells
3. Click Protection tab ...
4, ... unlock cells
5. Highlight Required Cells
8. Lock cells.
+ How to replicate cells?
1, Click on the required cell
2. Move to the bottom right hand side of the cell
3, Select drag handle / ctoss / black box
4, Drag handle / cross to required cell
* How to Format Cell?71
1. Select the required cell
2. Format cell
3. Select 2 decimal places
+ Important Definition:
+ Function:
A function is a pre-defined piece of code, Function has a pre-defined name in the software.
They are used inside formulae, Functions can be used to simplify complicated calculations
Formula:
A formula can contain a function, Formulas can be simple calculations, Formulas can be
typed directly into the formula bar
Absolute Reference:
The reference of the cell does not change when replicated, Uses a $ to show the absolute
reference.
+ Relative Reference:
The reference of the cell change when replicated
Named Range:
Used if a range of cells are to be used many times, Easier to remember a name rather than
the cell references, If the range of cells moves the reference remains within the workbook
oy
Scanned with CamScannerMohamed Mamdouh Practical in Theory
Charts
+ How to choose the Chart?
+ Bar chart
Column charts are typically used to compare several items in a specific range of values.
+ Pie chart
f you are asked to represent percentage value
+ Line Chart
typically used to show trends over a period of time.
+ How to make a chart??
Select required cell
Insert chart
Select required type of charts
Add or edit titles
label the axes or legend.
fren
Word
> Definitions:
+ Page Orientation:
‘A page can be portrait or landscape.
© Gutter Margin:
‘The special margin that is placed at the top or edge to clear the text from the fold in a page
+ Header:
This is an area at the top of every page.
+ Points:
unit used to measure the size of a font
+ Aspect Ratio:
the width changes automatically as the height is increased.
+ Widow:
‘When the last line of the paragraph is the first line of a new page
+ Orphan:
‘When the first line of a paragraph appears as the last line of a page
+ Text Wrapping
Text is written around an image in a word processed document.
+ Image Rotate:
Turn an image a number of degrees clockwise or anti-clockwise
Extras
“+ How to reduce the document size?
Compress the images to a smaller size (JPEG)
Compress the document to a smaller size
Change the file type (.TXT)
Save as PDF
Replace the images with place holders.
* Define house style?
a house style is a set of rules which state how all documents and written communication from a
business should be formatted. Such as (same font, same margins and white space, same logos,
same language used, same position of the image and simitar graphics)
Scanned with CamScannerMohamed Mamdouh
“> Generic File Format:
files are savé
PEG (Joint Photographic expert group)
PNG (Portable Network Graphics) :
ocd
‘GIF (Graphic Interchange format)
TAT (Text fle)
PPMTETEEE RTF (Rich toxt formal)
PDF (Portable document format) .
BRRERIE Cs (comma Separated value)
HTML (Hyper Text Markup Language),
Prey —_
co
ee
Term Pern
Pad clicking on the link
jing on word or image.
‘An attribute
Cre Within a hypertink
‘Created using HTML
Content / Structural L
Can consist of text, images
fend
Pree ee
a al browser
Cees
fed in that format they can be used in different type
mriccne
SharePoint
Method of accessing webpages from the current webpage
Can be used to specify the URL of the page
“Weontains scripting language
defines how different elements behave
Practical in Theory
ication software
Used for complex images
Used for saving storage
Used for transferring logos
High Quality & High storage size _
‘Allow stil or moving images to be
stored e
Very litle or no formatling
‘Any formatting is lost when saved
Takes less space
‘Capable of basic font formatting
Paragraph formatting, bulleted list,
images
‘Takes more space —
Display text and graphics in the same
fixed layout on any computer screen
Reduces filesize of read only
document.
Data saved in text format
Used with spreadsheet or database
Text based language used to create
webpage
allows web browsers to display
“information in different way _
Allow stylesheet to be attached to
‘each webpage to define how to
display HTML Elements
Without needing to contain styl
Container that holds any type of data
Stored in a compressed format
Used to save storage in computer
Generic archive file format,
cor hypertinks
used to create the structure of the web page.
This layer is defined by CSS (Cascading Siyle Sheets)
Contain styles that indicate how the document should be displayed in
‘This is used to display and format elements within the web page
Scanned with CamScanner