0% found this document useful (0 votes)
85 views25 pages

Ict Theory Revision

ict olevel theory revision

Uploaded by

Jana Ayman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
85 views25 pages

Ict Theory Revision

ict olevel theory revision

Uploaded by

Jana Ayman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 25
Mohamed Mamdouh Types of Computers Co or ns Smart Phone Y thasapeterneat | 7 moneuntsonsakesup | 7 Kisoneunesortakesupless | y Risone ontsoit takes Thay aretess tke tobe | ¥ Theyre portable They are portable They ate portable damaged they are nat | / lnternet connection maybe | / Internet connection maybe | Y lnternet connection portable betcerasdavice using Witt | better as device Is using 4G may be better as ie tho most powartat ¥ foatertolosaupthe oparaing | devicete using 86 Poets {ype of computers system 1 Weanbe used to make tis the cheapest typeof Lower power consumaton phone cals computers therefore batteries astlonger_| ¥ Lower power Has separatable parts so ¥ Front and back acingcameras | "consumption therefore leant upgraded andit ae included batteristnet longer component i faulty it willbe replaced easly 2 tis notporable * Ewiiertoneai/ote % Eater to tenons 1% Srallzersen ate sok = Gatteries can runout % teuses toueh seen not ould couse eye stain * tfonepiece of hardware eyboorathereforecanbe | Small keyboards 20 breaks ean be more harder to use fan cause RS! iit to repace Batteries cn runout More likely tobe damaged tess standard ports asthey ae poraale, & Iteant be upgraded # Sereensare smaller eee’ Hardware Physieal component that makes the computer Internal Hardware por {ecified othe instructions of a computer program. performs base atthmetl caleulationé and otc operates lng ALU {rthmetiea! Log Uniti performs input ad outaut operations ofthe computer using EU (Control Unit) Corer) the main pried eet board that contains the man components ofthe computer pon ‘RAM and ROM (wil be clecusted later = ACTS I ables the computer to process and dplaygraghics (mages and ideo eomrrons Tensbles the computer to input, process, and deliver sound eeanner rs sed to store information ike software and files Scanned with CamScanner Mohamed Mamdouh Input Devices + Keyboard: used to enter characters (type in text or essays) © Numeric Keypad: used to enter numbers only such as in ATMs + Pointing Devices: = Mouse: Used with desktops — Touchpad: Used with laptops = Tracker ball: Used by people with limited motor skils + Joystick / Driving Wheel: used to move objects around the screen in computer video games + Touch screen: an output device that is also an input device Scanner: used to scan hard copy images © Light Pen: Used to select objects on CRT screens. and Drawing on screen Microphone: used to input sound © Barcode Reader: used to read barcodes from products at POS ‘Advantages per Told much more information than normal barcode, ‘More than one QR format is fewer errors than with baftodes _ | available Ma fewer errors than with barcodes asit uses mobile camera TTY ar codes can be used to transmit e987 to transmit GR codes either as text messages or Images malicious codes + Cameras: Used to input photographs and moving pictures often pre-recorded + Direct Data Entry Devices: ro rene Contactless card read fered a fed Cheapest Expensive Expensive SeDkecee —FSt Slower Faster ieee me meee Yes I No a eer yes | No | Taal ‘No: _if | Position [At the back of the card | Atthe front of the card_| [Wise the card | Less secured (uses encryption Small daly limit Can take money twice ‘Transactions done without being aware Less secured More secured (No PIN code} (PIN code) ‘© OMR and OCR: OMR (Optical Mark Reader) ie MCA Questions ‘© Convert scanned image to text file which can Questionnaires _be edited by another software PERESEIEM % Very fast correction Faster data entry disadvantag Expensive for printing as the paper must be Very expensive accurate Not working with handwriting ‘The marks must be fully shaded Not all letters are identified correctly Radio frequency identification reader (RFID): used to read data from tag from a distance = How itworks? 41. When the tag passes by the reader, the reader detects it. 2, The reader sends radio waves with energy to activate the chip as itis @ passive. 3, The tag will broadcast the information stored on the chip to the reader through the antenna Scanned with CamScanner Mohamed, MAMARYB.antages: the tag can be read from a distance 4 Ituses radio waves 50 its easy to jam or interrupt very robust and reliable technology 4+ Itis easy to hack data transmitted by a tag Very fast read rate and bulk detection is possible ‘© More expensive than a barcode system | Bidirectional data transfer ‘+ Tag collsion (two tags interfering with each other) Output Devices * CRT Monitor: outputs soft copy where space is not a problem + TFT Monitor: Outputs soft copy in small space, it reduces eye strain and uses less power than CRT but itis expensive + Projector: outputs slide shows for a large number of people Speakers: outputs sound Printers: Cem irr low medium | high Brace high speed medium speed low speed Quality IN high high y low ed most Highest (changing cartridges frequently) es ee lowest Expensi Peers most suitable Stationery separate sheets separate sheets Continuous sheets Crd a Jw carbon copies feces Non-impact Non-Impact Impact It uses laser to draw the printout on the drum, then Cad The ink droplets will be rayed directly into the | toner attract to the drum, “Pre¥ paper through the nozzle of then toner transfer print ‘ ink cartridge. image to plain pa ‘+30 Printer: used to print solid objects using resin = How it works? ‘A digital copy is made of the model using CAO software Software slices the model into hundreds of layers A printer that prints by pressing metal pins against an ink ribbon onto the paper 2 3. 3D printer creates the model layer by layer 4. Binds them together Tt Cet Easier to edit individual objects Can be used forilegal production | ‘© Graph plotter: used to print very large printouts very accurately Advantages cant Very high-quality output. Very slow at printing Able to produce large drawings to a high accuracy _ Expensive equipment o purchase initially ‘Able to print on a varity of materials very large physical footprint compared toa printer ms Scanned with CamScanner Mohamed Manemory and Backing Storage RAM vs. ROM RAM Oy (Creme eu) (Read Only Me rl Store data currently inuse | Store instructions to startup the computer Larger | Smaller Ser Volatile Non-volatile ferent Read and write Read only ‘+ Memory VS Backing Storage? Backing Storage rad RAM. ROM. ||_Magnet, Optical, Solid State Streinsconstostupthe | rods Permanent strate Store data currently inuse _ Store data computer ndlrgr storage capacty Perens Wake ead onlyand smal storage OpSGR/LI Slower Accu Speed ios Eat Fixed HO (HOD), Portable HO, iMieaietiee CD, DVD, Bluray SDCard, Pen dive, 55D | eng “Less Portable Portable Very Portable Expensive per GB F: tesco mage Cheaper rer G8 Very Expensive per 68 rere Very large Small Large oud or es Ne large ‘Medium Smaller, ighter Fast Speed {Except magnetic tape asit uses Slow Very Fast access speed serial access} a =] | Robust Not Robust PROM TgE — (butmaybe damaged asithas (Can be scratched and broken Very Robust moving parts) easily) { Perentan Laree ‘Medium I Small “+ HDD vs. SSD: 7. Bigger Smaller, hte a _ less — More Pod Moving pants canbe damaged To moving pars, fu ro tittenose | Silent Pee Sou [Tver at ere hie | x Backup: Backups an extra copy of important ile stored away from the orginal copy incase of damage or loss of original ‘copy such as (virus or hacker deleting the data, Accidental delete of data or corruption of HD) + Cloud Backing Storage Cloud is large groups of remote networked servers that allow centralised data storage ‘Advantages os ¥_ needs access to the internet to be used x more chance oft being hacked asitis onallthe time canbe used on different devices _ User loses control on his own data _ 7 only pay for what you use Difficult to delete all copies = automatic backup takes place x Slower download/upload than storage media Visca Seay x ieee cf storing in the cloud may be expensive in the long Scanned with CamScanner Mohamed Mamdouh Software Software is programs and data used for controlling the operation of a computer eee pratt ssotwarethathelps he ver fo dois tasks is seftwareneded bythe computer to work rape amples and uses (Never ue brand mame! txamples and uses: ‘© Word Processing: Used to prepore text ‘+ Operating System: Manages computers functions including documents. hardware devices (input/output). Also provides users with | ‘© Spreadsheet: Use to create to organise and interface and itoads and runs application software. Such as: ‘manipulate numeric data. ogue based interface, Gesture based interface, GUI and CLI ‘© Database: Database is used to store and organise Compiler: Translate o program (HLt- High Level Language) into dota using fields and records. ‘9 machine code (code understood by the computer). © Photo Editing: Used to edit digital mages to Interpreter: some as compiler but it translates the program line either touch up orto apply various formatting byline techniques. Linker: Lik mare than one object fle ond combine them into + Presentation design: Used for creating single program presentations. Device driver Allows hardlvare devices to run on the computer © Applet: small applications that perform a single Including printers, sound, graphics and network cords. task on a device (they are usually embedded in Utilities: Help to manage and maintain computer resources ond ‘an HTML page on a website and can be performance by running specific tasks ‘executed from within a browser) ‘App: software which con perform a fairly substontiol task ‘CAD Software: This Is software used ta help in the creation, manipulation, modification and analysis ofa drawing/design. t can be used to jroduce 20 or 3D diagrams een) eee Both are interfaces for operating systems and used to control hardware and software ‘The users in diect communication with the The user does not need to learn any commands computer. ¥ Itis more user-friendly ‘The users not restricted to a umber of pre- determined options tis possible to alter computer configuration settings ‘The user needs to earna number ofcommands. | x It uses up considerably more computer memory Allommands need to be typed in, which takes than a CU interface time, x Theuserslimited tothe icons provided on the ach command must betyped in using the correct | screen format x Needs a more complex operating system Gul uses more processing power Gul uses more memory Pray errs ‘© Dialogue Based Interface: Use the human voice to give commands to a computer system. Advantages: Pes very useful for people with aisabiities *_stllunvellable with many commands not being recognised | 7 use asa secur feature, because voie recognition |_* canbe quite complex to set up | could be used to identify person user needs to know which commands can be sed ‘Gesture Based Interface: Gesture recognition allows humans to interface with a computer in a more natural fashion without the need for any mechanical devices replaces mechanical input devices possible for unintentional movement tobe picked up no physical contact required only works fairy near to the camera or sensor no training needed to interface with the computer ‘may only accept a imited number of movements Scanned with CamScanner Mohamed Mamdouh “> Software Copyrights: Software copyright is a lawful protection given to authors and publishers to protect their software. + How to break (breach) copyrights??1 — Sellcopies or give them without owner permission = Software piracy: making illegal copies of software. = Use code from the copyrighted software without owner pe Use the name of copyrighted software. — Buy pirated software. + Howto protect copyrights?’ = When software is being installed, the user may be asked to key ina unique reference number or product key = Some software will only run ifthe CD, DVD or memory stick is actually in the drive = Some software will only run if a dongle is plugged into one of the USB ports = Users are asked to read a license agreement and tick “I agree” ion, Scanned with CamScanner Mohamed Mamdouh Unit 2 Network Types + Types of LAN: Type of connection —_ [ae Tripping over cables Yes cre More dificult. Sener eee) Higher Pernod More difficult Can connect mobiles Allows portability during use ‘+ Types of Radio waves: Easier __tower Easier i E Wider | Smaller Higher |__tower | More aa range eer] oe eae iz Pe nen tte eer cs) cn ees i ¢ How to connect/send to device using Bluetooth?! 1. Your device automatically detects nearby devices 2. Your device pairs to the other device ifin range 3. Your device send data to its Bluetooth connector 4, Datais converted to radio waves and send to the receiver Encryption using password | consumes more energy _ More ff Make networks | Transfer data “> LAN vs. WAN: eo nes Dad P Private | Public Read imited Unlimited fore Close toeach other __ Far away from each other * Intranet vs. Internet: Internet = Bothare networks + Both are communication systems such as emails ‘= Both are information systems = - [ened Similarities oe ~ Public Private {using world wide web) (within single organization) "Moderated | Not moderated can post anything foes) Et igh ik of hacking and downloading vruses_|__Lowerriskof hacking and downloading vinses coe Many resources iy Less resources a] for “tess reliable More reliable cheaper to acess andsetup __ More expensive to setup, acess and malntain Takes lesstime to setup = Time consuming tosetup—__ More features such as online chat, Internet | Less features such as creating extranet (part of phony, online conference, Online Gaming, intranet that can be accessed by authored ouside Email oA users), Internal ile transfer, send and receive emails rd Time oe Scanned with CamScanner Mohamed Mamdouh Unit 2 Network Requirements “+ Hardware: + Network interface Card: Placed inside the computer tobe able to connect to any network device, stores the MAC address ofthe device n the network ‘Bridge: network device connects one LAN (or device) to another with the same protocol. + Hub: network device sends the data packet from a computer to all devices connected to it © Switch: A device that connects a number of other devices and sends data to one specific device only in the same LAN using MAC addresses. + Data packets: any data being transmitted over a network. It contains (IP address of both sender and receiver, part of the message, number of each packer, total number of packets) ‘© Router: network device connects a LAN to the internet, sends the data through the fastest route available. It uses and stores IP addresses of all connected devices inthe routing table. + How the data from a routers routed? 1. Datais sent in data packets to sender’s computer's router. 2. Each data packet contains an IP address and MAC address ofthe destination router. 3. Data packet is sent to the router with the IP address, 44, When its artved to destination router, Datais sett the destination computer using MAC address 5. The router uses the IP address to work out the best route available. + IPaddress vs. MAC address: ee IRidentifes computer on the network | Itis unique hardware identifier use roa yes. | No cred 1sP Manufacturer FEEEIN — Snumbersseparated by dots | 6 pairs of hexadecimal + Software: ‘+ Internet browser: Software used to view and open websites. It uses URL (Uniform resource locater) to access the website, + URL components eg. WWW.Google.COM.£G/videos/chapter.mp4: 1. Protocol: set of rules agreed by sender and recipients when data is transferred between devices. HTTP (Hyper Text transfer Protocol) Eunene “Transfers the content of awebpage intoabrowserfor | Fllesare transferred from one device to | viewing_ S racic) at Webserver | ‘Small files con 2. WWW (World wide web}: interlinked HTML pages that can be accessed over the Internet, om CN itisa worldwide collection of, ‘WWW uses the internat to access information from web servers using web | interconnected networks and devices _ browsers th ii | Uses Internet Protocol (IP) ses hts) protocols to send hypertext markup language (HTML) documents allows online chatting (via text, audio 1,3 collection of mulkimedia web pages and other Information on websites | and video) _ a 3. Domain Name (Google): unique name identify website 4, Domain Type (.com):it identifies the type of website 5. File path (/videos): where datais stored in the web server 6, File Name. File format (Chapter.mp4) ‘Search Engine: website used to search for information on other websites. Disadvantages of search engine: Information overload, May be more irrelevant information, Search engines may not include all web pages and Search engine company may be paid to display certain web pages Definition Corr i Scanned with CamScanner v v v Mohamed Mamdouh Unit 2 Internet Service Provider (ISP) ‘A company that provides Internet access to customers (to access the internet an ISP subscription is needed. It provides IP address, Router, space on cloud to store files domain name and space ona server to create website Network Gains ° Communication: ‘+ Email: sending softcopy messages to computer using computers (tablets, laptops and smartphones) ‘* Internet telephony / VOIP (Voice Over Internet Protocol): A service that enables people to use the Internet as. the transmission medium for telephone cals ‘© Video Conference: Its the use of internet to allow people in two or more locations to communicate using video and audio streaming, Disadvantages compared with other methods of conference: It need expensive hardware and there may be lag and lip sync due to internet problems. The connection may not be stable. * Audio Conference: same as video-conference but people can only hear each other and its one over telephone network. Advantages compared to video conference: more stable connection and cheaper to setup. Disadvantages compared to other conference methods: can't see each other. ‘Web Conference: Its conducted online. Participants tend to be sat at computers and can view the same screen, It tend to be interactive. Organizer allows participants to clicka link to ask questions .participants are then queued. Itis possible to draw or write on a ‘whiteboard’ using keyboard and mouse Online Conference vs. face to face mee time and cost of travel ‘suitable for disabled people + _ high risk of misunderstanding ‘Y_meetings can be held at shortnotice | __* Can'tsigndocuments + Accessing Website: ‘© Blog: A personal internet journal, where the Owner post and others comment and it takes the form of discussion. It sorted in chronological order (from recent to oldest) ‘Wiki: website that allows a group of people to edit the content ofeach other which used to post information, «Forum: Website where posts are related to a specific issue ‘+ Moderated: posts are controlled by admin, ithas rules and policy and those that break the rules are banned * Unmoderated: Do not have an administrator, Posts are not controlled. People write what they want. ‘+ Social Networking: Dedicated website & app. It interacts with other users and can be used tofind people with similar interests. They enable people to share photos and videos. Members are given free instant ‘messaging, video chatting and can create pages. ‘* Researching for information: Cer or tages Many Resources 2 _Itis too easy tobe distracted when searching onthe internet Data tends to be up to date x The internet is not regulated so it may be unteliable internet has limitless amounts of information * _ Information on the internet is not organised ch engine is fastand easy x How) ‘to check reliability ofinformation o on, nthe internet? ‘Make sure the same information is found on more than one website Make sure the author is well qualified on the topic Make sure the website is updated recently I the website is sponsored by a well-known organization itis more reliable I the website is reputable and well known source of information its reliable ‘The end of the URL indicates the type ofthe website (.edu is more reliable than com) Avoid websites with excessive advertisements Scanned with CamScanner Mohamed Mamdouh Hacking: Gaining unauthorised accessto8 computer sytem Virus: A vires is 3 piece of sofware code that Infects «computer and has the ability to tepleate tsallSuch as worms, adware, ‘Phishing This i 2scarinvoling email that ooking ike a legitimate email. tis sent containing link the user clicks the nk and is Sent toa website where personal details are asked oe ‘Smishing:Atoxt message EMS] tecewed/sent contains lnk hen user taps link and ase for personal information isting: This uses a voicemail message 13 {rik the user into calling the telephone ‘number contained in the message. ‘Pharming: viru sent contating ‘malicious code when the user types nthe LURL (ofthe bank) airects 9 user 9 fraudulent website As the user enters the tals they are coped to crimina's website ‘SPAM: Clectronic lnk email tht Unsolicited messages sent in bulk by email and can consist of unwanted adverts ‘Spyware (key-ogsing SW): Records every keystroke on he keyboard Saves it ina lo ean ans the fg ie back to the hackers Interception during transler: Confidential data could be intercepted by hackers while being transferred over the internet. + ata can be deleted + Data canbe changed and corrupted 1» Canteadto he misuse of persona data Hard dish could be fed up ‘The computer I performing routine tasks 3 ot more slowly Software doesn't work propery 4+ takes persona nfo How to detect? urges you fors quik reply + several grammar mistakes takes persona info + GainPersonal data 2 Tisiseanlead to aud or idonty thet = Takes time to deal witht CCanslow down networks Can up the receivers mai box and that fl up hard disk = Canreada password being typed + Takes confdentat data unit 2 Network Risks ‘Use of firewalls software sts between the comauter andthe router to fer cata, Encryption: encoding data so that only authorized people who have the key ‘can decoded data, 1'changes the data into a form thats not understandable. “Authentication: sa technique to verity thatthe person who's accessing the {sts on a computer fan authorized user Insta an uptodate ant-veus ‘Scan the per-drive a5 i inserted into his computer ‘Be not download media ram an unknown source without scanning R ‘Don't open or download attachments form unknewn Senders without scanning theres ‘Do net reply to emai that asks for confidential data Report any suspicious att, Must have dial erticate (title of securty to verfy he emai comes from a known and trusted source contains: exity dte, ders of the owner and sera number) Report any smashing ater "Never give your personal details over the mebile phone "Never eck on links n text messages trom unexpected pecple ‘Block any unknown umber [Never give your personal details over the mobile phone Use an uptodate ant yore and ant ius to remove pharming code (Check sites carefully before a inks clicked ‘Donot reply to spam emails Urea spam emai titer Block unknown senders DDonot sgn upto commercial malig sts soup to te anti-spyware software Use on sreen keyboard when entering password ‘URL sare with HTTPS Hyper Text Transfer Protocol Secured (t means that its ‘secured using SS. (Secure socket layer which Security techoolgy that ‘encrypts dats between the server and the cent to make sur al ata private) Scanned with CamScanner Mohamed Mamdouh Unit 2 Some Important Questions & comparisons ‘+ Compare between different authentication techniques: ee) ‘Time taken for adding the data Price’ orig Can be forgotten? ener enna eT) | raster Cheaper | Moree Yes Yes Yes No oT 1 | Slower | Tae expense | we | =i ves | “* Discuss the advantages and disadvantages of different biometrics techniques: ‘non-intrusive method ray i «elatively inexpensive technology * tis affected by changes in lighting or age very high accuracy iVsane the most developed techniques itis very intrusive very easy touse 2X itcan make mistakes + smal storage requirements ce | worinrusive X high errr rate ¥_ relatively low-cost technology is ates very high accuracy Tis very intrusive + dificult to replicate ‘elatively iow and expensive v ¥ ¥ Read very fast and relatively inexpensive using tokens. fee 1L. The customer inserts their debit card into the top of the token device (first authentication step) and the device either recognises the card or rejects it. 2. Aone-time password is then shown on the device sereen 3. The customer now goes back to thoir bank web page and Explain what is meant by two factor authentication: a one-time pass code is sent back to her either in an email or as a text message to her mobile phone directly or by % a person's voice can be easly recorded low accuracy ER Software installed ona users device, such asa smartphone... ‘When the website requests the user to authenticate who they are, the user opens the app on thei smartphone. The app. {generates a one-time password (OTP) whichis valid for less than a minute. enters the OTP 4. They are now given access to thelr account. ‘+ Advantages and disadvantages of policing the internet? Helps to prevent legal materi from Beng shown Help to prevent pomcgraphy Helps to prevent discussion groups that inte hatred and racim Ensure copyright aus are enforced Freedom of speech is restricted ‘Very difficult to enforce asthe internet spans cont Unsuitable material is easly avallable in other ways Very expensive torintain + What is meant by DPA (Data protection Act) and how to apply?! DPAs are laws that protect the rights of individual about whom personal data (It is any data concerning a living person who can identified by this data such as: Name, Address, Date of birth, banking detaits) is obtained, stored and processed. * Do not keep data longer than required + Domotcallect data thats not required * Donot pass on the data without the owner's permission = Only certain employees can view the data and handle it = Keep the data safe and secure (encryption, firewall, password) ‘= Only use the data for the reasons given to the owner Keep the data up to data. Scanned with CamScanner Mohamed Mamdouh Unit 2 “+ What is meant by E-safety and how to apply? Keep personal data safe so that others cannot use it against us (such as Blackmail, spreading rumors and identity theft) and itallows freedom of speech. It helps to make people more responsible as they use netiquette. Cees Cet Never send people photos of yourself + Only open emails from known sources. Always maintain your privacy settings on + Onlyemail people youknow * Only use websites recommended by teachers + Never use personal details in emails. * Use appropriate search conditions when using search | * Never include school's name or photos of students wearing school aa sews chad Docker eer anon ne acs MR =a ae tore we pee Fos el a] iene nd emer core cE ae caioamesmee ais Never arrange to meet anyone alone Avoid misuse of image. ‘Always use appropriate language. How anti-virus works? 1. The anti-virus scan programs or files before run This done by comparing files against database of Known viruses. 3, Ifafileis infected, two options appear: Delete file OR Quarantine file 4, If quarantine file is chosen: — The anti-virus isolates the infected file so the virus can’t replicate itself to other files = Cleans the file = Check that file to see if ts safe to open. Scanned with CamScanner Mohamed Mamdouh Unit 3 Banking + Steps of Cash withdraw, deposit and checking balance: «Enter Card ee + Enter Language +_Enter PIN code + Check that cards not expired (by comparing today’ date with expiry date) ag + Check that pin code enteredis identical tothe one stored on the card Check thatthe cardis not reported stolen CheekBalance | Cash withraw ‘Cash Deposit Cheque Deposit. Master file is ‘+ Customer enters amount of money Customer enters, ©The customer searched to find required amount of moneyto inserts the the account Master file is searched to find the bbe deposited cheaue. umber account number + Master fileis + OCR device will Corresponding Customer's account is checked to searched tofind the | read the balance isread see ift has sufficient funds secount number cheque details from master file Make sure thatthe amount within |* Customerinsertsthe | including the Balance is the dally limit cash amount of displayed Ifthe amount of money is available + Cashiscounted money and does not exceed the daiylimit + Themasterfileis | + Theamount the transaction is authorized Updated by appears on the The master file is updated by inereasing the screen and the decreasing the account balance of account balance of customer the customer the customer confirmsthe amount. Receipts printed + card's returned __| Soy ‘© Receipts printed Receipts printed + Receiptis printed © Cordis returned Card isreturned + Cardisretumed Cry ia Cash is output + Advantages and disadvantages of using ATMs TT eT ATMs are more widelyavalable than bank branches | *__Notallservces are avalible in ATM = ATW are avallable when banks arecosed | * Theresa cal limit on amount of cash withdrawn frm ATM. ATMS offer choice of language (useuliftraeling] | Some banks charge customers for using ATMS =| ~¥Canuse ATM of any bank to witharaw cash [a Cash withdrawal iit are often impose & Clearing of bank cheques: 1. The cheques is verified by Make sure it snot fake using MICR and itis signed 2. Information from bank cheaves is collected such as amount, due date, payer account number, receiver account number, cheque serial number, bank sort code When due date come: 1. The bank makes sure that the amount of money is avallable inthe payer's account 2. Dectease the balance of the payer's account in the master File 33. Increase the balance ofthe recipient’ account inthe master 44. Send bank statements to both customers Phone Banking: Pern The customer calls the bank's phone number The customer key in thee acount numbor | git PIN o elected numbers from the PIN orusing twin factor authentication actions | _Thecustomer wil then see various option for transactions thecore | “The customer chooses one ofthe options by choosing the correct = = ‘option. Modelling Jenerated model ofa real system in order to study the behavior of the ‘Online Banking ~The customer access the bank’s website They are then requested to enter a four. The customer will then hear various options for tr “The customer chooses one ofthe options by pressing key or by speaking the number. {A simulation is the creation of a computer-8 system and itis based on mathematical representations. re rE 7 Nlows you to try out various diferent scenarios in advance | x there wil always bea diference between the results from "and ess expensive to build the real thing. ‘modelling and realty andit is very costly 7 itis safer and faster to use a computer model = = Scanned with CamScanner Mohamed Mamdouh Unit 3 Control System Store Preset Value Receive Compare Takes action How control system works? 1. Sensor: will continuously measure the physical variables, reads only analogue data 2. ADC: Analogue to Digital Converter (converts data read by the sensor to be understood by microprocessor). 3. The role of microprocessor in control system: ‘+ It stores the required preset value ‘+ Microprocessor receives the data from the sensor ‘* Itcompares the received readings with preset value ‘¢ It sends signal with action to control u > ifrecelved readings are greater than preset value +f recelved readings are lower than preset value '* This process is continuous 4. Control Unit: performs the action + Types of sensors and Control Unit: | Temperature: used to measure temperature [ight bulb/LED: source of ight | Pressure: used to measure pressure or weight Heater/eoollng uit: controls the temperature | Light: used to measure intensity of ight/indiation 6f movement | Alarm/Suzzer:erestes sound | pi: used to measure pH | Motor: controls movement of ob ‘Advantages and disadvantages of microprocessor controlled devices: ‘Advantages CIT ‘More lesure time and more time to work so they can increase thelr income (Can ead to lazines ‘More secure lifestyle (due to presence of automatic alarms) Lack of fitness/exercise ‘Can leave home while household tasks are_being done by equipment [Manual household skills are lost Can control the devices remotely using WiFi: ] Can lead to unhealthy eating due Voice control can be used to activate the devices so good for disabled | to dependency on ready meals people ifestyle becomes more expensive ‘Wireless 50 no tripping over wires Home surveillance from afar Leads to laziness as voice control used ‘Other people can hack devices Can be affected by walls and distance wR SS Measurement System ‘Measurement system is the monitoring/recording of physical variables without the microprocessor taking action Control System is when the microprocessor takes action depending on sensor readings Store data forlater use ‘Make Graphs Make Prediction “+ Advantages and disadvantages of robots/measurement system: Ce EE ¥__Canwork in dangerous conditions where humans can’t work | x High inital cost "7_Itcan work 24/7 without taking breaks oF sh %_ Maintenance cost is more expensive as staff needed More accurate readings 2X _ Requires backup systems, which are expensive Higher productivity x They replace skilled workers, leading to de-skiling ‘More consistent readings and outputs Workers nsive ¥ Cheaper in the long run as no salaries needed * Ifsomething goes wrong, it may be difficult to find the ‘error Scanned with CamScanner Mohamed Mamdouh Unit 3 Health and Safety Health issues: problems due to long use of computers. Cor) Caused by How to protect? Staring at computer screens fora long '¢ Use anti-glare screen filter time ad ae ¢ Take regular breaks Sitting in a wrong position in front of the Sit in an upright position - Take regular computer fora longtime breaks or use ergonomic chair ‘© Sitting on an adjustable chair Take regular breaks Long use of mouse (pain in wrist) Use wrist rest or Take regular breaks Use ergonomic keyboard or Take regular breaks DoE cron cerry Looking up or down at the screen. eee PES PEECRGROMEE Long use of keyboard (pain in wrist) ¢ Safety Issues: problems due to an accident. Por “ripping over cables Keep wires in underground ducts Risk of electric shock _ Keep wires well insulated and Avoid drinks in presence of computers Riskoffire | Don't overload sockets and Avoid overheating of equipment People trapped in emergencies | Keep computers in a U-shape and wellspaced to enable easy exit Heavy equipment falling | put equipment atthe centr of the table oron ground ANPR 1. Asensor detects a vehicle then It sends a signal to the processor to instruct the camera to capture an image for the 2. Aprogramis used to isolate the number plate from the image and adjust the brightness and contrast of image 3, Each character is recognized using OCR then itis stored in the database Online Booking “Steps of online booking Caen ne rn nnn eer cmnnreetiocecihe |3) theses hnbel tga hace as |?" Rettonyeftcregued Boling "| reser (otra frcosrmaton A) Trccezorerantmsbyenteing—]1 Te csone cosy nee seseacapnennetho | poral detalsandpoynenntnd | 6). Payment metas sent tothe user Soa | SSacres : Rae pment ae 71 Greco ented ee eocrl|) ea ee the master file ee “Advantages and disadvantages of online booking: ‘Advantages Pee Prevents double booking —_ Setting up is expensive = Bookings can be made 24/7 Booking mistakes ean be more easily made Saves cout of traveling to the Booking ace the system crashes during the booking the booking may not be made Saves time as no néed to travel tothe booking office Internet accessis needed to run the booking system therefore the cost may “Usually cheaper as lower overheads be increased 7 Z Retail Applications + Steps of automatic reorder system: 1. The barcode is scanned by the barcode reader (or typed in manually) 2. The products table is searched to find this barcode 3. When found: ‘+The corresponding number in stock s decreased by the amount sold ‘+ Number in stock is compared with reorder level 44, number in stock s less than reorder level then reorder s necessary: ‘©The reorder quantity corresponding to the products read Scanned with CamScanner Communication media refers to a method of delivering and receiving data/information using telecommuni Mohamed Mamdouh Unit 3 ‘+ The supplier ID corresponding to the product is read then searched by it in supplier's table + The corresponding contact details are used to contact the supplier. Steps of EFTPOS (Electronic Fund Transfer Point of Sale): ‘The seller's bank’s computer contacts the customer's bank's computer The card is checked ifit is valid(Not expired, PIN code entered is identical to stored PIN on chip and not reported stolen) 3. The seller enters the amount (if using contactless card, then The reader checks the amount to pay is less than the ‘contactless limit) 4, ifnot valid or not enough money the transaction is terminated, If valid and enough money the transaction continues 5, The price of the purchase is deducted from the customer's account Transferred to the seller's account 7. Receipts sent to the printer Media communication systems + How its used in satellite television and satellite phones? 1, Signals are beamed to satellite from a satellite dish on earth via radio waves. ‘The signals are delivered by carrier waves which consist of radio waves. Each signal has its own frequency and bandwidth 3. Once the data reaches the satellite, it boosts the signal before ending it back to earth, Signals then resent to earth The satellite dish receives the signal + Advantages and disadvantages of media communication system: eT advantages: [¥_They have good global coverage ____ | There is atime delay in receipt of the signals ‘¥_They are cheaper, faster and safer than laying cables |The signals received can be affected by bad weather ‘7 Satelite receivers on the ground can be portable. |x TSunspot activity ean affect the performance ofa satelite v Secunty in satellite transmission is very good due tothe fact = that datas coded and the receiver requires decoding equipment to read the data, i If they are not ina fixed position relative tothe Earth then they need to be monitored and controlled on a regular basis Navigation (how the satnav works?) 1, Destination is input by driver then Exact position of moter vehicle is continually calculated using GPS + using dota transmitted from 3/4 soelites,Soteltes transmit rodio signals tothe Earth + Software in the smart watch interpret the signals to locate its position 2, The Satellite navigation system contains pre-stored road maps 3. The car's pos displayed on the map and the route displayed 4, Algorithm calculates the route from current car's position to destination makes allowances for traffic jams s. 6 Car system receives regular updates of traffic conditions using GIS Calculates the journey time using satellite navigation system and outputs the journey time and the directions. “Advantages and disadvantages of GIS: ‘the handling and exploration of huge amounts of data GiS software is very expensive allows data to be integrated from a wide range of very different sources Wallows geographical and thematic data ofany Kind to be ‘combined in a way which shows how they are connected to each other. + Advantages and disadvantages of GPS: ee [ieremoves errors and can give useful information. ‘The system can estimate the time of arrival. IRis also possible to program in the fastest route GIS requires enormous amounts of data to be input (thus increasing the chances of error). | tis difficult to make GIS programs which are both fast and user- friendly CT ‘they can give incorrect instructions if not up to date Loss of satelite signals can eause problems Han incorrect data in the system will give incorrect information ae Scanned with CamScanner Mohamed Mamdouh Unit 3 Emerging Technology and Robotics VR (Virtual Reality) system: A computer-generated simulation uses a three-dimensional environment that can be interacted within a real or physical way. The equipment is fitted with sensors ‘Input devices used: Cameras, Motion sensors, Joystick/driving wheel + Output devices used: Data goggles, speakers + Uses: Virtual museums, Flight simulation, Medical training and Driving simulation. + Augmented Reality: allow the user to experience the relationship between digital (virtual) and physical (real) worlds, virtual information and objects are overlaid onto real-world situations ‘+ Artificial intelligence (Al): The use of a computer to perform tasks that mimic or duplicate the functions of the human brain, tis a technology by which a program updates itself automatically through learning from its own experience. COT oe 7 roboaynot ure shun through aclonoriacten [= —eaugleadto mary obloses ina numberof aes robots must obey are gen byhumanewihoutquesion |" _{2B2derey nteehrlogyan th abi tocar out tasks Y _arobot must protect itself ~__|* toss of skills + Drones unmanned (allots / remote contralid yng devices, ‘Advantages: Less expensive, can be flown closer to the land, Lse ek tolif as ther iso ghterew and has smal ste so itean go where people cant + Disadvantages: May go out of rang, Les responsive, Slower to react and ean lose the signal due to the electra charges inthe storms. Some Important Questions “+ Advantages and disadvantages of online vs. physical scenario: Customers advantages saves time of travelling and waiting in queues Save costof transportation available 24 hrs suitable for physically disabled people Can be used from any location Organization advantages ‘Customers disadvantages ‘isk of hacking and defraud ‘needs Internet connection & creditcard (Mistakes can be easily made [Mistakes are more difficult to rectify due to the speed of ‘operation sss Cees ‘saves coston rent (fewer branches) % High intial cost 1o make secure website Y saves cost of salaries (fewer employees) Expensive maintenance cost wider range of customers (disabled /far-amay) X Need toretrain the employees soit is expensive Yess isk of physical robbery x The company can better target customers “= Advantages and disadvantages of autonomous vehicle: ‘Advantages: Disadvantages ¥ 9 Safar beeaulen evr Tersved, eadieg19fewer | _veryexpenive system to satu inthe Fst place ‘Y Better for the environment beeause vehicles wil operate The ever-present fear of hacking into the vehicle's control mote efficiently _ _ system _ — = Security and safety issues oftware glitches could be Y Reduced traffic congestion eee ‘7 Reduced travel times Driver and passenger reluctance ofthe new technology ‘7 Suess-tree parking for motorists = Reduction inthe need for taxis could lead to unemployment ¢ Advantages and disadvantages of Rail and airline network control systems: ree Pes i Ahacker could gain access tothe computerised system and ¥ Smart motorways constantly adapt to traffic canitions anion al] Poorly designed systems could compromise safety If the computer system falls then the whole transport system ‘could be brought toa standstil 2 ANPR systems mean that innocent poople’s movements can easily be tracked, Read from notes School system and Medicine “7 Trasportsysteme are more efiient Traffic offences can be automatically penalised using ANPR. “7 Computerised control systems minimise human eror, which | reduces the rate of accidents Scanned with CamScanner Mohamed Mamdouh Unit 4 Analysis Importance of analysis ‘© Important to meet the needs of the user + More efficient system is produced that does what the users require ‘identify problems with the system to avold them inthe new system «identify user and information requirements (needed to solve the identified problems) to fulfill them in the new system Methods of analysis: Cor] POTETT vantages Interview 7 Allows moredetaled answerstobe given | Time consuming tcomplete all the interviews employers, rather than questionnaires = Notanonymous managers ¥ The questions can be expanded or modified * Both the members and the interviewer have to Ke Questions can be explained | be free at the same time: | can see body language _* Expensive due to analyst's time Questionnaire 7 Fasterto compete al questionnaires than Tend not tobe popular with users employees sing interviews Tooitexible cannot ask follow up questions V Cheaper toproduce questionnairesthan | _Asit's anonymous people may nt take I pay/employ an interviewer seriously ¥ Indiidats can remain anonymous therefore Cannot expand on thei answerslimited in thee they are more truthful responses Mote people can answer the questionnaire than canbe interviewed Analysis the results canbe quicker with questionnaires Ac | Observation) | 7 Reliable data [Fos pepe doe or canoe o % Better eveal view of the whole sytem/all dont workas usual while being watched the Inputs and outputs ofthe system | Y Better overall view of the whole system/all L _|___ the inputs and outputs of the system | os : Examining = Information can be obtained which isnot | Time consuming to go through the documents le using other methods, % Expensive method as the analyst will have to documents of the spend time going through documents. “existing system _ Design and development * Database File Structure: Design field names, field types, field sizes, primary key and validation checks Input methods (Input Screen and data capture form| Perrenoa Input Seren Text: ‘© Text must be easily expressed ‘+ Font must have appropriate size, style and colour Boxes: Box must fit to the data ‘© Box must ft to the data Choose appropriate box type (Text box, Drop down ‘+ Choose appropriate box type (Text box and check menu, Radio button and check box) box) ‘Navigation Button to ease data entry ‘No navigation buttons J General: Consistent layout * Good Colour Scheme + Well Use of white space_ __ Boxi * Processing: must design calculations and comparisons + Output Methods: must design output screen and report layout. Scanned with CamScanner Mohamed Mamdouh Testing + Explain how to test a system? + Unit Test tests the operation of each module + Modules are tested separately + Modif testing tests the relationships between each module + Module testing tests the data passing into and out ofthe modules + Easier to find errors in madule testing + System Test: Whole system testingiscaried out after module testing, Whole system tess the combined modules. checks thatthe system works as itis supposed To match the user requirements. Test data: ‘+ Normal Test Data: data within the range of acceptability and its of the correct type ‘© Abnormal Test Data: Data that is outside the boundaries of acceptability or it is ofthe wrong type ‘© Extreme Test Data: Data that ison the boundary of acceptability ‘© Live Test Data: Data which has been used with the current system and the results are known, Implementation ry ‘Advantages Earn oTrabercs eine See RerrIrMm © Teor Ln nest fay tal be persreetroniemeenrgm “Cost bet % More expensive as each part needs to be evaluated befare moving on More time consuming as each part needs to be evaluated before moving. DCC CENRSEEM “ithe current partfailsthennot | ere nr all the system is ost the system fails then only branch is affected Pilot running: Whole system is CCheaperas trainings carried | * More time consuming as the implemented in one branch at atime branch by branch changeover fs spread out Less time consuming as training carried out branch by branch lew aya new system fails, old system pian canbe used asa backup 2X High cost of cunning two systems. Laird ashae AG hon Possible to gradually train staff Documentation Cera For the user to help him: For another programmer to help im: + interact with the system ‘© fixthe system incase of any ‘+ deal with any simple problems faced while ‘malfunction using the system Update the system if more functionality is needed or ‘= sample runs/glossary of terms ‘© program flowcharts ‘= how touse the system + file structures ‘© error messages ‘© program coding/algorithm = frequently asked questions + list ofvariables = trouble-shooting guide validation routines erred ‘+ software and hardware requirements, Perens purpose of the system + limitations of the system input and Output formats 40 Scanned with CamScanner Mohamed Mamdouh Evaluation + Why? To make sure users are satisfied with the system; How? Interviews and questior © Comparing the system with the original requirements, Expert System make sure the system: does its jab, is easy to use and has no problems snnaires with the users to collect thelr opinions and responses after using the system “ Use of Expert system: Mineral prospecting, Car engine fault diagnosis, Medical diagnosis, Chess games. “ Components of the expert system USE Knowledge i_, Base Create «> How to us 1. Questions about the (. 2. These answers are taken by rules base to make conclusions 3. Conclusions taken by inference engine to search in the knowledge base to find matching records 4, ‘The matching records will be output to the user on the output screen _) are asked by the system, answers to these questions are entered by the user. How to create an expert system? 1. Collect information from experts by interviews 2. Design and create knowledge base to contain the information collected 3. Design and ereate inference engine to search for records in the knowledge base ‘4, Design and create rules base to make conclusions about the inputs 5. Design and create input and output screens for the user to interact with the system Scanned with CamScanner Mohamed Mamdouh Practical in Theory Access “» Database Terminology: Pema ‘Atable that contains all ‘Arrow contal formation about all data. allinformation about one person ‘A column containing one particular informa tion forall people. xmation for all people and can’t be empty. fields in different tables | ~ A column containing unique infor Bs Tris only present in relational database and act as link between. ry Pree Pee ‘Types: Coovaiars How to make data base?! Open database Create new table of —— data Create new table of data Import the data from the ——- Select primary and foreign keys from the —— ‘Set up the relationship ~ Flat File Vs. Relational Database: Can contain letters, numbers, symbols, etc. Contains only numbers and must be used in calculat ‘© Integer: Number doesn’t contain decimal Decimal: Number contains decimal + Currency: Money _ Date in any format Only two possible options Import the data for the ~~ from the ~--~ records boards Link the two database tables using a primary and a foreign key Ceo ee ‘Add/Edit Data Easier ‘More Complex Setup ‘More Complex Easier Time fo setup ‘More time Less time “Understand More Complex Easier | Price | Expensive Checp__ Sorting More Complex | __Easier Filter ___ More Complex Easier Duplication No Yes Update _ Easy More Complex _ Security I Better Lower (No) Processing Power More less ++ How to make sure data entered is correct??! Sar Verification Seen | incorrect logieal entries ‘Computer Pend Pari + Types of Verification methods: Double Data Entry: Typing errors Errors in data source | - ‘Man or Computer | Spelling and grammar mistakes Computer a User enters data twice and computer compares the two entries to make sure they are identical. Visual Check: User visually compares data entered with data source to make sure they are identical. na Scanned with CamScanner SA heck Mohamed Mamdouh Validation Types: Pen ‘Make sure numbers entered are within specific i Data Type: Numeric, Date ‘Make sure the exact correct number of ch: ers have eae Tenath ci ‘of characters have been entered ee anna Data Type: ALL _ Format check: | Make sure letters, numbers, specific: ‘symbols are in their specified position a comet cr DataType:Text, Date se Lookup check: ‘Make sure data entered is one of the specified ‘options 7 — - meme oatatypertet | Make sure the field is not left blank a a a 7 = as Presence Check: | [saree seer HT Certain calculation performed on the numbers ofa barcode and the result must be equal othe Check digit: check digit * Data Type: Barcode [rvee check | Deere mst be feet toe Database VS. Paperwork: _| Data type: ALL ad ero) Faster | Slower res Ensier | More Complex Peat) Easier | More complex STU OEMEE More secured | Less secured ee ue Yes | | re Yes No loree More Expensive | Cheaper _ | CEM Yes (in Mail Merge)| No Excel > Excel Functions: + =Vlookup (C9, $A$2:$B$4, 2, False): 1. 2. Take the value in cell (Lookup Value) (Table Array) 3. when found retum the corresponding value in column (Column index number) + =Xlookup (C9, SAS2:SAS4, SB$2:$BS4, 2, False) 1 2. Take the value in cell (Lookup Value) search foritin (lookup Array) 3._when found retum the corresponding value in column (Return array) 1 IF( B2>=50, “Pass”, “Fail”) If cell B2is greater than or equal 50 2. Display Pass 3. Otherwise display Fail COUNTIF (SB$2:SBS7, “Liverpoo!”): 1. Count in cells 82 to B7 2. the cells that contain a value of Liverpool ‘SUMIF (SB$2:SBS7, “Liverpool”, $C$2:SC$7); 1. Go to cells B2 to B7 2 search for items similar to Liverpool 3. when found add the corresponding values in cells C2 to C7 Scanned with CamScanner Mohamed Mamdouh Practical in Theory *» How it works? + How to Filter? 4. Highlight the required column 2. Select filter 3. Select number fiter (or text fer) 4, untick all the cells that are not needed + How to freeze? 1. Highlight/select the required row / column 2. Select freeze rows + How to sort? 1, Highlight the required table 2. Click on sort 3. Click sort by the required column 4, Click on ascending order + How to protect table? 1. Select the whole sheet 2. Right click then Format cells 3. Click Protection tab ... 4, ... unlock cells 5. Highlight Required Cells 8. Lock cells. + How to replicate cells? 1, Click on the required cell 2. Move to the bottom right hand side of the cell 3, Select drag handle / ctoss / black box 4, Drag handle / cross to required cell * How to Format Cell?71 1. Select the required cell 2. Format cell 3. Select 2 decimal places + Important Definition: + Function: A function is a pre-defined piece of code, Function has a pre-defined name in the software. They are used inside formulae, Functions can be used to simplify complicated calculations Formula: A formula can contain a function, Formulas can be simple calculations, Formulas can be typed directly into the formula bar Absolute Reference: The reference of the cell does not change when replicated, Uses a $ to show the absolute reference. + Relative Reference: The reference of the cell change when replicated Named Range: Used if a range of cells are to be used many times, Easier to remember a name rather than the cell references, If the range of cells moves the reference remains within the workbook oy Scanned with CamScanner Mohamed Mamdouh Practical in Theory Charts + How to choose the Chart? + Bar chart Column charts are typically used to compare several items in a specific range of values. + Pie chart f you are asked to represent percentage value + Line Chart typically used to show trends over a period of time. + How to make a chart?? Select required cell Insert chart Select required type of charts Add or edit titles label the axes or legend. fren Word > Definitions: + Page Orientation: ‘A page can be portrait or landscape. © Gutter Margin: ‘The special margin that is placed at the top or edge to clear the text from the fold in a page + Header: This is an area at the top of every page. + Points: unit used to measure the size of a font + Aspect Ratio: the width changes automatically as the height is increased. + Widow: ‘When the last line of the paragraph is the first line of a new page + Orphan: ‘When the first line of a paragraph appears as the last line of a page + Text Wrapping Text is written around an image in a word processed document. + Image Rotate: Turn an image a number of degrees clockwise or anti-clockwise Extras “+ How to reduce the document size? Compress the images to a smaller size (JPEG) Compress the document to a smaller size Change the file type (.TXT) Save as PDF Replace the images with place holders. * Define house style? a house style is a set of rules which state how all documents and written communication from a business should be formatted. Such as (same font, same margins and white space, same logos, same language used, same position of the image and simitar graphics) Scanned with CamScanner Mohamed Mamdouh “> Generic File Format: files are savé PEG (Joint Photographic expert group) PNG (Portable Network Graphics) : ocd ‘GIF (Graphic Interchange format) TAT (Text fle) PPMTETEEE RTF (Rich toxt formal) PDF (Portable document format) . BRRERIE Cs (comma Separated value) HTML (Hyper Text Markup Language), Prey —_ co ee Term Pern Pad clicking on the link jing on word or image. ‘An attribute Cre Within a hypertink ‘Created using HTML Content / Structural L Can consist of text, images fend Pree ee a al browser Cees fed in that format they can be used in different type mriccne SharePoint Method of accessing webpages from the current webpage Can be used to specify the URL of the page “Weontains scripting language defines how different elements behave Practical in Theory ication software Used for complex images Used for saving storage Used for transferring logos High Quality & High storage size _ ‘Allow stil or moving images to be stored e Very litle or no formatling ‘Any formatting is lost when saved Takes less space ‘Capable of basic font formatting Paragraph formatting, bulleted list, images ‘Takes more space — Display text and graphics in the same fixed layout on any computer screen Reduces filesize of read only document. Data saved in text format Used with spreadsheet or database Text based language used to create webpage allows web browsers to display “information in different way _ Allow stylesheet to be attached to ‘each webpage to define how to display HTML Elements Without needing to contain styl Container that holds any type of data Stored in a compressed format Used to save storage in computer Generic archive file format, cor hypertinks used to create the structure of the web page. This layer is defined by CSS (Cascading Siyle Sheets) Contain styles that indicate how the document should be displayed in ‘This is used to display and format elements within the web page Scanned with CamScanner

You might also like